* elflink.h (elf_bfd_final_link): Apportion reloc counts to rel_hdr
[deliverable/binutils-gdb.git] / bfd / elflink.h
1 /* ELF linker support.
2 Copyright 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003
3 Free Software Foundation, Inc.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
21 /* ELF linker code. */
22
23 /* This struct is used to pass information to routines called via
24 elf_link_hash_traverse which must return failure. */
25
26 struct elf_info_failed
27 {
28 bfd_boolean failed;
29 struct bfd_link_info *info;
30 struct bfd_elf_version_tree *verdefs;
31 };
32
33 static bfd_boolean is_global_data_symbol_definition
34 PARAMS ((bfd *, Elf_Internal_Sym *));
35 static bfd_boolean elf_link_is_defined_archive_symbol
36 PARAMS ((bfd *, carsym *));
37 static bfd_boolean elf_link_add_object_symbols
38 PARAMS ((bfd *, struct bfd_link_info *));
39 static bfd_boolean elf_link_add_archive_symbols
40 PARAMS ((bfd *, struct bfd_link_info *));
41 static bfd_boolean elf_merge_symbol
42 PARAMS ((bfd *, struct bfd_link_info *, const char *,
43 Elf_Internal_Sym *, asection **, bfd_vma *,
44 struct elf_link_hash_entry **, bfd_boolean *, bfd_boolean *,
45 bfd_boolean *, bfd_boolean));
46 static bfd_boolean elf_add_default_symbol
47 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
48 const char *, Elf_Internal_Sym *, asection **, bfd_vma *,
49 bfd_boolean *, bfd_boolean, bfd_boolean));
50 static bfd_boolean elf_export_symbol
51 PARAMS ((struct elf_link_hash_entry *, PTR));
52 static bfd_boolean elf_finalize_dynstr
53 PARAMS ((bfd *, struct bfd_link_info *));
54 static bfd_boolean elf_fix_symbol_flags
55 PARAMS ((struct elf_link_hash_entry *, struct elf_info_failed *));
56 static bfd_boolean elf_adjust_dynamic_symbol
57 PARAMS ((struct elf_link_hash_entry *, PTR));
58 static bfd_boolean elf_link_find_version_dependencies
59 PARAMS ((struct elf_link_hash_entry *, PTR));
60 static bfd_boolean elf_link_assign_sym_version
61 PARAMS ((struct elf_link_hash_entry *, PTR));
62 static bfd_boolean elf_collect_hash_codes
63 PARAMS ((struct elf_link_hash_entry *, PTR));
64 static bfd_boolean elf_link_read_relocs_from_section
65 PARAMS ((bfd *, Elf_Internal_Shdr *, PTR, Elf_Internal_Rela *));
66 static size_t compute_bucket_count
67 PARAMS ((struct bfd_link_info *));
68 static bfd_boolean elf_link_output_relocs
69 PARAMS ((bfd *, asection *, Elf_Internal_Shdr *, Elf_Internal_Rela *));
70 static bfd_boolean elf_link_size_reloc_section
71 PARAMS ((bfd *, Elf_Internal_Shdr *, asection *));
72 static void elf_link_adjust_relocs
73 PARAMS ((bfd *, Elf_Internal_Shdr *, unsigned int,
74 struct elf_link_hash_entry **));
75 static int elf_link_sort_cmp1
76 PARAMS ((const void *, const void *));
77 static int elf_link_sort_cmp2
78 PARAMS ((const void *, const void *));
79 static size_t elf_link_sort_relocs
80 PARAMS ((bfd *, struct bfd_link_info *, asection **));
81 static bfd_boolean elf_section_ignore_discarded_relocs
82 PARAMS ((asection *));
83
84 /* Given an ELF BFD, add symbols to the global hash table as
85 appropriate. */
86
87 bfd_boolean
88 elf_bfd_link_add_symbols (abfd, info)
89 bfd *abfd;
90 struct bfd_link_info *info;
91 {
92 switch (bfd_get_format (abfd))
93 {
94 case bfd_object:
95 return elf_link_add_object_symbols (abfd, info);
96 case bfd_archive:
97 return elf_link_add_archive_symbols (abfd, info);
98 default:
99 bfd_set_error (bfd_error_wrong_format);
100 return FALSE;
101 }
102 }
103 \f
104 /* Return TRUE iff this is a non-common, definition of a non-function symbol. */
105 static bfd_boolean
106 is_global_data_symbol_definition (abfd, sym)
107 bfd * abfd ATTRIBUTE_UNUSED;
108 Elf_Internal_Sym * sym;
109 {
110 /* Local symbols do not count, but target specific ones might. */
111 if (ELF_ST_BIND (sym->st_info) != STB_GLOBAL
112 && ELF_ST_BIND (sym->st_info) < STB_LOOS)
113 return FALSE;
114
115 /* Function symbols do not count. */
116 if (ELF_ST_TYPE (sym->st_info) == STT_FUNC)
117 return FALSE;
118
119 /* If the section is undefined, then so is the symbol. */
120 if (sym->st_shndx == SHN_UNDEF)
121 return FALSE;
122
123 /* If the symbol is defined in the common section, then
124 it is a common definition and so does not count. */
125 if (sym->st_shndx == SHN_COMMON)
126 return FALSE;
127
128 /* If the symbol is in a target specific section then we
129 must rely upon the backend to tell us what it is. */
130 if (sym->st_shndx >= SHN_LORESERVE && sym->st_shndx < SHN_ABS)
131 /* FIXME - this function is not coded yet:
132
133 return _bfd_is_global_symbol_definition (abfd, sym);
134
135 Instead for now assume that the definition is not global,
136 Even if this is wrong, at least the linker will behave
137 in the same way that it used to do. */
138 return FALSE;
139
140 return TRUE;
141 }
142
143 /* Search the symbol table of the archive element of the archive ABFD
144 whose archive map contains a mention of SYMDEF, and determine if
145 the symbol is defined in this element. */
146 static bfd_boolean
147 elf_link_is_defined_archive_symbol (abfd, symdef)
148 bfd * abfd;
149 carsym * symdef;
150 {
151 Elf_Internal_Shdr * hdr;
152 bfd_size_type symcount;
153 bfd_size_type extsymcount;
154 bfd_size_type extsymoff;
155 Elf_Internal_Sym *isymbuf;
156 Elf_Internal_Sym *isym;
157 Elf_Internal_Sym *isymend;
158 bfd_boolean result;
159
160 abfd = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
161 if (abfd == (bfd *) NULL)
162 return FALSE;
163
164 if (! bfd_check_format (abfd, bfd_object))
165 return FALSE;
166
167 /* If we have already included the element containing this symbol in the
168 link then we do not need to include it again. Just claim that any symbol
169 it contains is not a definition, so that our caller will not decide to
170 (re)include this element. */
171 if (abfd->archive_pass)
172 return FALSE;
173
174 /* Select the appropriate symbol table. */
175 if ((abfd->flags & DYNAMIC) == 0 || elf_dynsymtab (abfd) == 0)
176 hdr = &elf_tdata (abfd)->symtab_hdr;
177 else
178 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
179
180 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
181
182 /* The sh_info field of the symtab header tells us where the
183 external symbols start. We don't care about the local symbols. */
184 if (elf_bad_symtab (abfd))
185 {
186 extsymcount = symcount;
187 extsymoff = 0;
188 }
189 else
190 {
191 extsymcount = symcount - hdr->sh_info;
192 extsymoff = hdr->sh_info;
193 }
194
195 if (extsymcount == 0)
196 return FALSE;
197
198 /* Read in the symbol table. */
199 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
200 NULL, NULL, NULL);
201 if (isymbuf == NULL)
202 return FALSE;
203
204 /* Scan the symbol table looking for SYMDEF. */
205 result = FALSE;
206 for (isym = isymbuf, isymend = isymbuf + extsymcount; isym < isymend; isym++)
207 {
208 const char *name;
209
210 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
211 isym->st_name);
212 if (name == (const char *) NULL)
213 break;
214
215 if (strcmp (name, symdef->name) == 0)
216 {
217 result = is_global_data_symbol_definition (abfd, isym);
218 break;
219 }
220 }
221
222 free (isymbuf);
223
224 return result;
225 }
226 \f
227 /* Add symbols from an ELF archive file to the linker hash table. We
228 don't use _bfd_generic_link_add_archive_symbols because of a
229 problem which arises on UnixWare. The UnixWare libc.so is an
230 archive which includes an entry libc.so.1 which defines a bunch of
231 symbols. The libc.so archive also includes a number of other
232 object files, which also define symbols, some of which are the same
233 as those defined in libc.so.1. Correct linking requires that we
234 consider each object file in turn, and include it if it defines any
235 symbols we need. _bfd_generic_link_add_archive_symbols does not do
236 this; it looks through the list of undefined symbols, and includes
237 any object file which defines them. When this algorithm is used on
238 UnixWare, it winds up pulling in libc.so.1 early and defining a
239 bunch of symbols. This means that some of the other objects in the
240 archive are not included in the link, which is incorrect since they
241 precede libc.so.1 in the archive.
242
243 Fortunately, ELF archive handling is simpler than that done by
244 _bfd_generic_link_add_archive_symbols, which has to allow for a.out
245 oddities. In ELF, if we find a symbol in the archive map, and the
246 symbol is currently undefined, we know that we must pull in that
247 object file.
248
249 Unfortunately, we do have to make multiple passes over the symbol
250 table until nothing further is resolved. */
251
252 static bfd_boolean
253 elf_link_add_archive_symbols (abfd, info)
254 bfd *abfd;
255 struct bfd_link_info *info;
256 {
257 symindex c;
258 bfd_boolean *defined = NULL;
259 bfd_boolean *included = NULL;
260 carsym *symdefs;
261 bfd_boolean loop;
262 bfd_size_type amt;
263
264 if (! bfd_has_map (abfd))
265 {
266 /* An empty archive is a special case. */
267 if (bfd_openr_next_archived_file (abfd, (bfd *) NULL) == NULL)
268 return TRUE;
269 bfd_set_error (bfd_error_no_armap);
270 return FALSE;
271 }
272
273 /* Keep track of all symbols we know to be already defined, and all
274 files we know to be already included. This is to speed up the
275 second and subsequent passes. */
276 c = bfd_ardata (abfd)->symdef_count;
277 if (c == 0)
278 return TRUE;
279 amt = c;
280 amt *= sizeof (bfd_boolean);
281 defined = (bfd_boolean *) bfd_zmalloc (amt);
282 included = (bfd_boolean *) bfd_zmalloc (amt);
283 if (defined == (bfd_boolean *) NULL || included == (bfd_boolean *) NULL)
284 goto error_return;
285
286 symdefs = bfd_ardata (abfd)->symdefs;
287
288 do
289 {
290 file_ptr last;
291 symindex i;
292 carsym *symdef;
293 carsym *symdefend;
294
295 loop = FALSE;
296 last = -1;
297
298 symdef = symdefs;
299 symdefend = symdef + c;
300 for (i = 0; symdef < symdefend; symdef++, i++)
301 {
302 struct elf_link_hash_entry *h;
303 bfd *element;
304 struct bfd_link_hash_entry *undefs_tail;
305 symindex mark;
306
307 if (defined[i] || included[i])
308 continue;
309 if (symdef->file_offset == last)
310 {
311 included[i] = TRUE;
312 continue;
313 }
314
315 h = elf_link_hash_lookup (elf_hash_table (info), symdef->name,
316 FALSE, FALSE, FALSE);
317
318 if (h == NULL)
319 {
320 char *p, *copy;
321 size_t len, first;
322
323 /* If this is a default version (the name contains @@),
324 look up the symbol again with only one `@' as well
325 as without the version. The effect is that references
326 to the symbol with and without the version will be
327 matched by the default symbol in the archive. */
328
329 p = strchr (symdef->name, ELF_VER_CHR);
330 if (p == NULL || p[1] != ELF_VER_CHR)
331 continue;
332
333 /* First check with only one `@'. */
334 len = strlen (symdef->name);
335 copy = bfd_alloc (abfd, (bfd_size_type) len);
336 if (copy == NULL)
337 goto error_return;
338 first = p - symdef->name + 1;
339 memcpy (copy, symdef->name, first);
340 memcpy (copy + first, symdef->name + first + 1, len - first);
341
342 h = elf_link_hash_lookup (elf_hash_table (info), copy,
343 FALSE, FALSE, FALSE);
344
345 if (h == NULL)
346 {
347 /* We also need to check references to the symbol
348 without the version. */
349
350 copy[first - 1] = '\0';
351 h = elf_link_hash_lookup (elf_hash_table (info),
352 copy, FALSE, FALSE, FALSE);
353 }
354
355 bfd_release (abfd, copy);
356 }
357
358 if (h == NULL)
359 continue;
360
361 if (h->root.type == bfd_link_hash_common)
362 {
363 /* We currently have a common symbol. The archive map contains
364 a reference to this symbol, so we may want to include it. We
365 only want to include it however, if this archive element
366 contains a definition of the symbol, not just another common
367 declaration of it.
368
369 Unfortunately some archivers (including GNU ar) will put
370 declarations of common symbols into their archive maps, as
371 well as real definitions, so we cannot just go by the archive
372 map alone. Instead we must read in the element's symbol
373 table and check that to see what kind of symbol definition
374 this is. */
375 if (! elf_link_is_defined_archive_symbol (abfd, symdef))
376 continue;
377 }
378 else if (h->root.type != bfd_link_hash_undefined)
379 {
380 if (h->root.type != bfd_link_hash_undefweak)
381 defined[i] = TRUE;
382 continue;
383 }
384
385 /* We need to include this archive member. */
386 element = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
387 if (element == (bfd *) NULL)
388 goto error_return;
389
390 if (! bfd_check_format (element, bfd_object))
391 goto error_return;
392
393 /* Doublecheck that we have not included this object
394 already--it should be impossible, but there may be
395 something wrong with the archive. */
396 if (element->archive_pass != 0)
397 {
398 bfd_set_error (bfd_error_bad_value);
399 goto error_return;
400 }
401 element->archive_pass = 1;
402
403 undefs_tail = info->hash->undefs_tail;
404
405 if (! (*info->callbacks->add_archive_element) (info, element,
406 symdef->name))
407 goto error_return;
408 if (! elf_link_add_object_symbols (element, info))
409 goto error_return;
410
411 /* If there are any new undefined symbols, we need to make
412 another pass through the archive in order to see whether
413 they can be defined. FIXME: This isn't perfect, because
414 common symbols wind up on undefs_tail and because an
415 undefined symbol which is defined later on in this pass
416 does not require another pass. This isn't a bug, but it
417 does make the code less efficient than it could be. */
418 if (undefs_tail != info->hash->undefs_tail)
419 loop = TRUE;
420
421 /* Look backward to mark all symbols from this object file
422 which we have already seen in this pass. */
423 mark = i;
424 do
425 {
426 included[mark] = TRUE;
427 if (mark == 0)
428 break;
429 --mark;
430 }
431 while (symdefs[mark].file_offset == symdef->file_offset);
432
433 /* We mark subsequent symbols from this object file as we go
434 on through the loop. */
435 last = symdef->file_offset;
436 }
437 }
438 while (loop);
439
440 free (defined);
441 free (included);
442
443 return TRUE;
444
445 error_return:
446 if (defined != (bfd_boolean *) NULL)
447 free (defined);
448 if (included != (bfd_boolean *) NULL)
449 free (included);
450 return FALSE;
451 }
452
453 /* This function is called when we want to define a new symbol. It
454 handles the various cases which arise when we find a definition in
455 a dynamic object, or when there is already a definition in a
456 dynamic object. The new symbol is described by NAME, SYM, PSEC,
457 and PVALUE. We set SYM_HASH to the hash table entry. We set
458 OVERRIDE if the old symbol is overriding a new definition. We set
459 TYPE_CHANGE_OK if it is OK for the type to change. We set
460 SIZE_CHANGE_OK if it is OK for the size to change. By OK to
461 change, we mean that we shouldn't warn if the type or size does
462 change. DT_NEEDED indicates if it comes from a DT_NEEDED entry of
463 a shared object. */
464
465 static bfd_boolean
466 elf_merge_symbol (abfd, info, name, sym, psec, pvalue, sym_hash,
467 override, type_change_ok, size_change_ok, dt_needed)
468 bfd *abfd;
469 struct bfd_link_info *info;
470 const char *name;
471 Elf_Internal_Sym *sym;
472 asection **psec;
473 bfd_vma *pvalue;
474 struct elf_link_hash_entry **sym_hash;
475 bfd_boolean *override;
476 bfd_boolean *type_change_ok;
477 bfd_boolean *size_change_ok;
478 bfd_boolean dt_needed;
479 {
480 asection *sec;
481 struct elf_link_hash_entry *h;
482 int bind;
483 bfd *oldbfd;
484 bfd_boolean newdyn, olddyn, olddef, newdef, newdyncommon, olddyncommon;
485
486 *override = FALSE;
487
488 sec = *psec;
489 bind = ELF_ST_BIND (sym->st_info);
490
491 if (! bfd_is_und_section (sec))
492 h = elf_link_hash_lookup (elf_hash_table (info), name, TRUE, FALSE, FALSE);
493 else
494 h = ((struct elf_link_hash_entry *)
495 bfd_wrapped_link_hash_lookup (abfd, info, name, TRUE, FALSE, FALSE));
496 if (h == NULL)
497 return FALSE;
498 *sym_hash = h;
499
500 /* This code is for coping with dynamic objects, and is only useful
501 if we are doing an ELF link. */
502 if (info->hash->creator != abfd->xvec)
503 return TRUE;
504
505 /* For merging, we only care about real symbols. */
506
507 while (h->root.type == bfd_link_hash_indirect
508 || h->root.type == bfd_link_hash_warning)
509 h = (struct elf_link_hash_entry *) h->root.u.i.link;
510
511 /* If we just created the symbol, mark it as being an ELF symbol.
512 Other than that, there is nothing to do--there is no merge issue
513 with a newly defined symbol--so we just return. */
514
515 if (h->root.type == bfd_link_hash_new)
516 {
517 h->elf_link_hash_flags &=~ ELF_LINK_NON_ELF;
518 return TRUE;
519 }
520
521 /* OLDBFD is a BFD associated with the existing symbol. */
522
523 switch (h->root.type)
524 {
525 default:
526 oldbfd = NULL;
527 break;
528
529 case bfd_link_hash_undefined:
530 case bfd_link_hash_undefweak:
531 oldbfd = h->root.u.undef.abfd;
532 break;
533
534 case bfd_link_hash_defined:
535 case bfd_link_hash_defweak:
536 oldbfd = h->root.u.def.section->owner;
537 break;
538
539 case bfd_link_hash_common:
540 oldbfd = h->root.u.c.p->section->owner;
541 break;
542 }
543
544 /* In cases involving weak versioned symbols, we may wind up trying
545 to merge a symbol with itself. Catch that here, to avoid the
546 confusion that results if we try to override a symbol with
547 itself. The additional tests catch cases like
548 _GLOBAL_OFFSET_TABLE_, which are regular symbols defined in a
549 dynamic object, which we do want to handle here. */
550 if (abfd == oldbfd
551 && ((abfd->flags & DYNAMIC) == 0
552 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0))
553 return TRUE;
554
555 /* NEWDYN and OLDDYN indicate whether the new or old symbol,
556 respectively, is from a dynamic object. */
557
558 if ((abfd->flags & DYNAMIC) != 0)
559 newdyn = TRUE;
560 else
561 newdyn = FALSE;
562
563 if (oldbfd != NULL)
564 olddyn = (oldbfd->flags & DYNAMIC) != 0;
565 else
566 {
567 asection *hsec;
568
569 /* This code handles the special SHN_MIPS_{TEXT,DATA} section
570 indices used by MIPS ELF. */
571 switch (h->root.type)
572 {
573 default:
574 hsec = NULL;
575 break;
576
577 case bfd_link_hash_defined:
578 case bfd_link_hash_defweak:
579 hsec = h->root.u.def.section;
580 break;
581
582 case bfd_link_hash_common:
583 hsec = h->root.u.c.p->section;
584 break;
585 }
586
587 if (hsec == NULL)
588 olddyn = FALSE;
589 else
590 olddyn = (hsec->symbol->flags & BSF_DYNAMIC) != 0;
591 }
592
593 /* NEWDEF and OLDDEF indicate whether the new or old symbol,
594 respectively, appear to be a definition rather than reference. */
595
596 if (bfd_is_und_section (sec) || bfd_is_com_section (sec))
597 newdef = FALSE;
598 else
599 newdef = TRUE;
600
601 if (h->root.type == bfd_link_hash_undefined
602 || h->root.type == bfd_link_hash_undefweak
603 || h->root.type == bfd_link_hash_common)
604 olddef = FALSE;
605 else
606 olddef = TRUE;
607
608 /* NEWDYNCOMMON and OLDDYNCOMMON indicate whether the new or old
609 symbol, respectively, appears to be a common symbol in a dynamic
610 object. If a symbol appears in an uninitialized section, and is
611 not weak, and is not a function, then it may be a common symbol
612 which was resolved when the dynamic object was created. We want
613 to treat such symbols specially, because they raise special
614 considerations when setting the symbol size: if the symbol
615 appears as a common symbol in a regular object, and the size in
616 the regular object is larger, we must make sure that we use the
617 larger size. This problematic case can always be avoided in C,
618 but it must be handled correctly when using Fortran shared
619 libraries.
620
621 Note that if NEWDYNCOMMON is set, NEWDEF will be set, and
622 likewise for OLDDYNCOMMON and OLDDEF.
623
624 Note that this test is just a heuristic, and that it is quite
625 possible to have an uninitialized symbol in a shared object which
626 is really a definition, rather than a common symbol. This could
627 lead to some minor confusion when the symbol really is a common
628 symbol in some regular object. However, I think it will be
629 harmless. */
630
631 if (newdyn
632 && newdef
633 && (sec->flags & SEC_ALLOC) != 0
634 && (sec->flags & SEC_LOAD) == 0
635 && sym->st_size > 0
636 && bind != STB_WEAK
637 && ELF_ST_TYPE (sym->st_info) != STT_FUNC)
638 newdyncommon = TRUE;
639 else
640 newdyncommon = FALSE;
641
642 if (olddyn
643 && olddef
644 && h->root.type == bfd_link_hash_defined
645 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
646 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
647 && (h->root.u.def.section->flags & SEC_LOAD) == 0
648 && h->size > 0
649 && h->type != STT_FUNC)
650 olddyncommon = TRUE;
651 else
652 olddyncommon = FALSE;
653
654 /* It's OK to change the type if either the existing symbol or the
655 new symbol is weak unless it comes from a DT_NEEDED entry of
656 a shared object, in which case, the DT_NEEDED entry may not be
657 required at the run time. */
658
659 if ((! dt_needed && h->root.type == bfd_link_hash_defweak)
660 || h->root.type == bfd_link_hash_undefweak
661 || bind == STB_WEAK)
662 *type_change_ok = TRUE;
663
664 /* It's OK to change the size if either the existing symbol or the
665 new symbol is weak, or if the old symbol is undefined. */
666
667 if (*type_change_ok
668 || h->root.type == bfd_link_hash_undefined)
669 *size_change_ok = TRUE;
670
671 /* If both the old and the new symbols look like common symbols in a
672 dynamic object, set the size of the symbol to the larger of the
673 two. */
674
675 if (olddyncommon
676 && newdyncommon
677 && sym->st_size != h->size)
678 {
679 /* Since we think we have two common symbols, issue a multiple
680 common warning if desired. Note that we only warn if the
681 size is different. If the size is the same, we simply let
682 the old symbol override the new one as normally happens with
683 symbols defined in dynamic objects. */
684
685 if (! ((*info->callbacks->multiple_common)
686 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
687 h->size, abfd, bfd_link_hash_common, sym->st_size)))
688 return FALSE;
689
690 if (sym->st_size > h->size)
691 h->size = sym->st_size;
692
693 *size_change_ok = TRUE;
694 }
695
696 /* If we are looking at a dynamic object, and we have found a
697 definition, we need to see if the symbol was already defined by
698 some other object. If so, we want to use the existing
699 definition, and we do not want to report a multiple symbol
700 definition error; we do this by clobbering *PSEC to be
701 bfd_und_section_ptr.
702
703 We treat a common symbol as a definition if the symbol in the
704 shared library is a function, since common symbols always
705 represent variables; this can cause confusion in principle, but
706 any such confusion would seem to indicate an erroneous program or
707 shared library. We also permit a common symbol in a regular
708 object to override a weak symbol in a shared object.
709
710 We prefer a non-weak definition in a shared library to a weak
711 definition in the executable unless it comes from a DT_NEEDED
712 entry of a shared object, in which case, the DT_NEEDED entry
713 may not be required at the run time. */
714
715 if (newdyn
716 && newdef
717 && (olddef
718 || (h->root.type == bfd_link_hash_common
719 && (bind == STB_WEAK
720 || ELF_ST_TYPE (sym->st_info) == STT_FUNC)))
721 && (h->root.type != bfd_link_hash_defweak
722 || dt_needed
723 || bind == STB_WEAK))
724 {
725 *override = TRUE;
726 newdef = FALSE;
727 newdyncommon = FALSE;
728
729 *psec = sec = bfd_und_section_ptr;
730 *size_change_ok = TRUE;
731
732 /* If we get here when the old symbol is a common symbol, then
733 we are explicitly letting it override a weak symbol or
734 function in a dynamic object, and we don't want to warn about
735 a type change. If the old symbol is a defined symbol, a type
736 change warning may still be appropriate. */
737
738 if (h->root.type == bfd_link_hash_common)
739 *type_change_ok = TRUE;
740 }
741
742 /* Handle the special case of an old common symbol merging with a
743 new symbol which looks like a common symbol in a shared object.
744 We change *PSEC and *PVALUE to make the new symbol look like a
745 common symbol, and let _bfd_generic_link_add_one_symbol will do
746 the right thing. */
747
748 if (newdyncommon
749 && h->root.type == bfd_link_hash_common)
750 {
751 *override = TRUE;
752 newdef = FALSE;
753 newdyncommon = FALSE;
754 *pvalue = sym->st_size;
755 *psec = sec = bfd_com_section_ptr;
756 *size_change_ok = TRUE;
757 }
758
759 /* If the old symbol is from a dynamic object, and the new symbol is
760 a definition which is not from a dynamic object, then the new
761 symbol overrides the old symbol. Symbols from regular files
762 always take precedence over symbols from dynamic objects, even if
763 they are defined after the dynamic object in the link.
764
765 As above, we again permit a common symbol in a regular object to
766 override a definition in a shared object if the shared object
767 symbol is a function or is weak.
768
769 As above, we permit a non-weak definition in a shared object to
770 override a weak definition in a regular object. */
771
772 if (! newdyn
773 && (newdef
774 || (bfd_is_com_section (sec)
775 && (h->root.type == bfd_link_hash_defweak
776 || h->type == STT_FUNC)))
777 && olddyn
778 && olddef
779 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
780 && (bind != STB_WEAK
781 || h->root.type == bfd_link_hash_defweak))
782 {
783 /* Change the hash table entry to undefined, and let
784 _bfd_generic_link_add_one_symbol do the right thing with the
785 new definition. */
786
787 h->root.type = bfd_link_hash_undefined;
788 h->root.u.undef.abfd = h->root.u.def.section->owner;
789 *size_change_ok = TRUE;
790
791 olddef = FALSE;
792 olddyncommon = FALSE;
793
794 /* We again permit a type change when a common symbol may be
795 overriding a function. */
796
797 if (bfd_is_com_section (sec))
798 *type_change_ok = TRUE;
799
800 /* This union may have been set to be non-NULL when this symbol
801 was seen in a dynamic object. We must force the union to be
802 NULL, so that it is correct for a regular symbol. */
803
804 h->verinfo.vertree = NULL;
805
806 /* In this special case, if H is the target of an indirection,
807 we want the caller to frob with H rather than with the
808 indirect symbol. That will permit the caller to redefine the
809 target of the indirection, rather than the indirect symbol
810 itself. FIXME: This will break the -y option if we store a
811 symbol with a different name. */
812 *sym_hash = h;
813 }
814
815 /* Handle the special case of a new common symbol merging with an
816 old symbol that looks like it might be a common symbol defined in
817 a shared object. Note that we have already handled the case in
818 which a new common symbol should simply override the definition
819 in the shared library. */
820
821 if (! newdyn
822 && bfd_is_com_section (sec)
823 && olddyncommon)
824 {
825 /* It would be best if we could set the hash table entry to a
826 common symbol, but we don't know what to use for the section
827 or the alignment. */
828 if (! ((*info->callbacks->multiple_common)
829 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
830 h->size, abfd, bfd_link_hash_common, sym->st_size)))
831 return FALSE;
832
833 /* If the predumed common symbol in the dynamic object is
834 larger, pretend that the new symbol has its size. */
835
836 if (h->size > *pvalue)
837 *pvalue = h->size;
838
839 /* FIXME: We no longer know the alignment required by the symbol
840 in the dynamic object, so we just wind up using the one from
841 the regular object. */
842
843 olddef = FALSE;
844 olddyncommon = FALSE;
845
846 h->root.type = bfd_link_hash_undefined;
847 h->root.u.undef.abfd = h->root.u.def.section->owner;
848
849 *size_change_ok = TRUE;
850 *type_change_ok = TRUE;
851
852 h->verinfo.vertree = NULL;
853 }
854
855 /* Handle the special case of a weak definition in a regular object
856 followed by a non-weak definition in a shared object. In this
857 case, we prefer the definition in the shared object unless it
858 comes from a DT_NEEDED entry of a shared object, in which case,
859 the DT_NEEDED entry may not be required at the run time. */
860 if (olddef
861 && ! dt_needed
862 && h->root.type == bfd_link_hash_defweak
863 && newdef
864 && newdyn
865 && bind != STB_WEAK)
866 {
867 /* To make this work we have to frob the flags so that the rest
868 of the code does not think we are using the regular
869 definition. */
870 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
871 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
872 else if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0)
873 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_DYNAMIC;
874 h->elf_link_hash_flags &= ~ (ELF_LINK_HASH_DEF_REGULAR
875 | ELF_LINK_HASH_DEF_DYNAMIC);
876
877 /* If H is the target of an indirection, we want the caller to
878 use H rather than the indirect symbol. Otherwise if we are
879 defining a new indirect symbol we will wind up attaching it
880 to the entry we are overriding. */
881 *sym_hash = h;
882 }
883
884 /* Handle the special case of a non-weak definition in a shared
885 object followed by a weak definition in a regular object. In
886 this case we prefer to definition in the shared object. To make
887 this work we have to tell the caller to not treat the new symbol
888 as a definition. */
889 if (olddef
890 && olddyn
891 && h->root.type != bfd_link_hash_defweak
892 && newdef
893 && ! newdyn
894 && bind == STB_WEAK)
895 *override = TRUE;
896
897 return TRUE;
898 }
899
900 /* This function is called to create an indirect symbol from the
901 default for the symbol with the default version if needed. The
902 symbol is described by H, NAME, SYM, PSEC, VALUE, and OVERRIDE. We
903 set DYNSYM if the new indirect symbol is dynamic. DT_NEEDED
904 indicates if it comes from a DT_NEEDED entry of a shared object. */
905
906 static bfd_boolean
907 elf_add_default_symbol (abfd, info, h, name, sym, psec, value,
908 dynsym, override, dt_needed)
909 bfd *abfd;
910 struct bfd_link_info *info;
911 struct elf_link_hash_entry *h;
912 const char *name;
913 Elf_Internal_Sym *sym;
914 asection **psec;
915 bfd_vma *value;
916 bfd_boolean *dynsym;
917 bfd_boolean override;
918 bfd_boolean dt_needed;
919 {
920 bfd_boolean type_change_ok;
921 bfd_boolean size_change_ok;
922 char *shortname;
923 struct elf_link_hash_entry *hi;
924 struct bfd_link_hash_entry *bh;
925 struct elf_backend_data *bed;
926 bfd_boolean collect;
927 bfd_boolean dynamic;
928 char *p;
929 size_t len, shortlen;
930 asection *sec;
931
932 /* If this symbol has a version, and it is the default version, we
933 create an indirect symbol from the default name to the fully
934 decorated name. This will cause external references which do not
935 specify a version to be bound to this version of the symbol. */
936 p = strchr (name, ELF_VER_CHR);
937 if (p == NULL || p[1] != ELF_VER_CHR)
938 return TRUE;
939
940 if (override)
941 {
942 /* We are overridden by an old defition. We need to check if we
943 need to create the indirect symbol from the default name. */
944 hi = elf_link_hash_lookup (elf_hash_table (info), name, TRUE,
945 FALSE, FALSE);
946 BFD_ASSERT (hi != NULL);
947 if (hi == h)
948 return TRUE;
949 while (hi->root.type == bfd_link_hash_indirect
950 || hi->root.type == bfd_link_hash_warning)
951 {
952 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
953 if (hi == h)
954 return TRUE;
955 }
956 }
957
958 bed = get_elf_backend_data (abfd);
959 collect = bed->collect;
960 dynamic = (abfd->flags & DYNAMIC) != 0;
961
962 shortlen = p - name;
963 shortname = bfd_hash_allocate (&info->hash->table, shortlen + 1);
964 if (shortname == NULL)
965 return FALSE;
966 memcpy (shortname, name, shortlen);
967 shortname[shortlen] = '\0';
968
969 /* We are going to create a new symbol. Merge it with any existing
970 symbol with this name. For the purposes of the merge, act as
971 though we were defining the symbol we just defined, although we
972 actually going to define an indirect symbol. */
973 type_change_ok = FALSE;
974 size_change_ok = FALSE;
975 sec = *psec;
976 if (! elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
977 &hi, &override, &type_change_ok,
978 &size_change_ok, dt_needed))
979 return FALSE;
980
981 if (! override)
982 {
983 bh = &hi->root;
984 if (! (_bfd_generic_link_add_one_symbol
985 (info, abfd, shortname, BSF_INDIRECT, bfd_ind_section_ptr,
986 (bfd_vma) 0, name, FALSE, collect, &bh)))
987 return FALSE;
988 hi = (struct elf_link_hash_entry *) bh;
989 }
990 else
991 {
992 /* In this case the symbol named SHORTNAME is overriding the
993 indirect symbol we want to add. We were planning on making
994 SHORTNAME an indirect symbol referring to NAME. SHORTNAME
995 is the name without a version. NAME is the fully versioned
996 name, and it is the default version.
997
998 Overriding means that we already saw a definition for the
999 symbol SHORTNAME in a regular object, and it is overriding
1000 the symbol defined in the dynamic object.
1001
1002 When this happens, we actually want to change NAME, the
1003 symbol we just added, to refer to SHORTNAME. This will cause
1004 references to NAME in the shared object to become references
1005 to SHORTNAME in the regular object. This is what we expect
1006 when we override a function in a shared object: that the
1007 references in the shared object will be mapped to the
1008 definition in the regular object. */
1009
1010 while (hi->root.type == bfd_link_hash_indirect
1011 || hi->root.type == bfd_link_hash_warning)
1012 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1013
1014 h->root.type = bfd_link_hash_indirect;
1015 h->root.u.i.link = (struct bfd_link_hash_entry *) hi;
1016 if (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)
1017 {
1018 h->elf_link_hash_flags &=~ ELF_LINK_HASH_DEF_DYNAMIC;
1019 hi->elf_link_hash_flags |= ELF_LINK_HASH_REF_DYNAMIC;
1020 if (hi->elf_link_hash_flags
1021 & (ELF_LINK_HASH_REF_REGULAR
1022 | ELF_LINK_HASH_DEF_REGULAR))
1023 {
1024 if (! _bfd_elf_link_record_dynamic_symbol (info, hi))
1025 return FALSE;
1026 }
1027 }
1028
1029 /* Now set HI to H, so that the following code will set the
1030 other fields correctly. */
1031 hi = h;
1032 }
1033
1034 /* If there is a duplicate definition somewhere, then HI may not
1035 point to an indirect symbol. We will have reported an error to
1036 the user in that case. */
1037
1038 if (hi->root.type == bfd_link_hash_indirect)
1039 {
1040 struct elf_link_hash_entry *ht;
1041
1042 /* If the symbol became indirect, then we assume that we have
1043 not seen a definition before. */
1044 BFD_ASSERT ((hi->elf_link_hash_flags
1045 & (ELF_LINK_HASH_DEF_DYNAMIC
1046 | ELF_LINK_HASH_DEF_REGULAR)) == 0);
1047
1048 ht = (struct elf_link_hash_entry *) hi->root.u.i.link;
1049 (*bed->elf_backend_copy_indirect_symbol) (bed, ht, hi);
1050
1051 /* See if the new flags lead us to realize that the symbol must
1052 be dynamic. */
1053 if (! *dynsym)
1054 {
1055 if (! dynamic)
1056 {
1057 if (info->shared
1058 || ((hi->elf_link_hash_flags
1059 & ELF_LINK_HASH_REF_DYNAMIC) != 0))
1060 *dynsym = TRUE;
1061 }
1062 else
1063 {
1064 if ((hi->elf_link_hash_flags
1065 & ELF_LINK_HASH_REF_REGULAR) != 0)
1066 *dynsym = TRUE;
1067 }
1068 }
1069 }
1070
1071 /* We also need to define an indirection from the nondefault version
1072 of the symbol. */
1073
1074 len = strlen (name);
1075 shortname = bfd_hash_allocate (&info->hash->table, len);
1076 if (shortname == NULL)
1077 return FALSE;
1078 memcpy (shortname, name, shortlen);
1079 memcpy (shortname + shortlen, p + 1, len - shortlen);
1080
1081 /* Once again, merge with any existing symbol. */
1082 type_change_ok = FALSE;
1083 size_change_ok = FALSE;
1084 sec = *psec;
1085 if (! elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
1086 &hi, &override, &type_change_ok,
1087 &size_change_ok, dt_needed))
1088 return FALSE;
1089
1090 if (override)
1091 {
1092 /* Here SHORTNAME is a versioned name, so we don't expect to see
1093 the type of override we do in the case above unless it is
1094 overridden by a versioned definiton. */
1095 if (hi->root.type != bfd_link_hash_defined
1096 && hi->root.type != bfd_link_hash_defweak)
1097 (*_bfd_error_handler)
1098 (_("%s: warning: unexpected redefinition of indirect versioned symbol `%s'"),
1099 bfd_archive_filename (abfd), shortname);
1100 }
1101 else
1102 {
1103 bh = &hi->root;
1104 if (! (_bfd_generic_link_add_one_symbol
1105 (info, abfd, shortname, BSF_INDIRECT,
1106 bfd_ind_section_ptr, (bfd_vma) 0, name, FALSE, collect, &bh)))
1107 return FALSE;
1108 hi = (struct elf_link_hash_entry *) bh;
1109
1110 /* If there is a duplicate definition somewhere, then HI may not
1111 point to an indirect symbol. We will have reported an error
1112 to the user in that case. */
1113
1114 if (hi->root.type == bfd_link_hash_indirect)
1115 {
1116 /* If the symbol became indirect, then we assume that we have
1117 not seen a definition before. */
1118 BFD_ASSERT ((hi->elf_link_hash_flags
1119 & (ELF_LINK_HASH_DEF_DYNAMIC
1120 | ELF_LINK_HASH_DEF_REGULAR)) == 0);
1121
1122 (*bed->elf_backend_copy_indirect_symbol) (bed, h, hi);
1123
1124 /* See if the new flags lead us to realize that the symbol
1125 must be dynamic. */
1126 if (! *dynsym)
1127 {
1128 if (! dynamic)
1129 {
1130 if (info->shared
1131 || ((hi->elf_link_hash_flags
1132 & ELF_LINK_HASH_REF_DYNAMIC) != 0))
1133 *dynsym = TRUE;
1134 }
1135 else
1136 {
1137 if ((hi->elf_link_hash_flags
1138 & ELF_LINK_HASH_REF_REGULAR) != 0)
1139 *dynsym = TRUE;
1140 }
1141 }
1142 }
1143 }
1144
1145 return TRUE;
1146 }
1147
1148 /* Add symbols from an ELF object file to the linker hash table. */
1149
1150 static bfd_boolean
1151 elf_link_add_object_symbols (abfd, info)
1152 bfd *abfd;
1153 struct bfd_link_info *info;
1154 {
1155 bfd_boolean (*add_symbol_hook)
1156 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
1157 const char **, flagword *, asection **, bfd_vma *));
1158 bfd_boolean (*check_relocs)
1159 PARAMS ((bfd *, struct bfd_link_info *, asection *,
1160 const Elf_Internal_Rela *));
1161 bfd_boolean collect;
1162 Elf_Internal_Shdr *hdr;
1163 bfd_size_type symcount;
1164 bfd_size_type extsymcount;
1165 bfd_size_type extsymoff;
1166 struct elf_link_hash_entry **sym_hash;
1167 bfd_boolean dynamic;
1168 Elf_External_Versym *extversym = NULL;
1169 Elf_External_Versym *ever;
1170 struct elf_link_hash_entry *weaks;
1171 struct elf_link_hash_entry **nondeflt_vers = NULL;
1172 bfd_size_type nondeflt_vers_cnt = 0;
1173 Elf_Internal_Sym *isymbuf = NULL;
1174 Elf_Internal_Sym *isym;
1175 Elf_Internal_Sym *isymend;
1176 struct elf_backend_data *bed;
1177 bfd_boolean dt_needed;
1178 struct elf_link_hash_table * hash_table;
1179 bfd_size_type amt;
1180
1181 hash_table = elf_hash_table (info);
1182
1183 bed = get_elf_backend_data (abfd);
1184 add_symbol_hook = bed->elf_add_symbol_hook;
1185 collect = bed->collect;
1186
1187 if ((abfd->flags & DYNAMIC) == 0)
1188 dynamic = FALSE;
1189 else
1190 {
1191 dynamic = TRUE;
1192
1193 /* You can't use -r against a dynamic object. Also, there's no
1194 hope of using a dynamic object which does not exactly match
1195 the format of the output file. */
1196 if (info->relocateable || info->hash->creator != abfd->xvec)
1197 {
1198 bfd_set_error (bfd_error_invalid_operation);
1199 goto error_return;
1200 }
1201 }
1202
1203 /* As a GNU extension, any input sections which are named
1204 .gnu.warning.SYMBOL are treated as warning symbols for the given
1205 symbol. This differs from .gnu.warning sections, which generate
1206 warnings when they are included in an output file. */
1207 if (! info->shared)
1208 {
1209 asection *s;
1210
1211 for (s = abfd->sections; s != NULL; s = s->next)
1212 {
1213 const char *name;
1214
1215 name = bfd_get_section_name (abfd, s);
1216 if (strncmp (name, ".gnu.warning.", sizeof ".gnu.warning." - 1) == 0)
1217 {
1218 char *msg;
1219 bfd_size_type sz;
1220
1221 name += sizeof ".gnu.warning." - 1;
1222
1223 /* If this is a shared object, then look up the symbol
1224 in the hash table. If it is there, and it is already
1225 been defined, then we will not be using the entry
1226 from this shared object, so we don't need to warn.
1227 FIXME: If we see the definition in a regular object
1228 later on, we will warn, but we shouldn't. The only
1229 fix is to keep track of what warnings we are supposed
1230 to emit, and then handle them all at the end of the
1231 link. */
1232 if (dynamic && abfd->xvec == info->hash->creator)
1233 {
1234 struct elf_link_hash_entry *h;
1235
1236 h = elf_link_hash_lookup (hash_table, name,
1237 FALSE, FALSE, TRUE);
1238
1239 /* FIXME: What about bfd_link_hash_common? */
1240 if (h != NULL
1241 && (h->root.type == bfd_link_hash_defined
1242 || h->root.type == bfd_link_hash_defweak))
1243 {
1244 /* We don't want to issue this warning. Clobber
1245 the section size so that the warning does not
1246 get copied into the output file. */
1247 s->_raw_size = 0;
1248 continue;
1249 }
1250 }
1251
1252 sz = bfd_section_size (abfd, s);
1253 msg = (char *) bfd_alloc (abfd, sz + 1);
1254 if (msg == NULL)
1255 goto error_return;
1256
1257 if (! bfd_get_section_contents (abfd, s, msg, (file_ptr) 0, sz))
1258 goto error_return;
1259
1260 msg[sz] = '\0';
1261
1262 if (! (_bfd_generic_link_add_one_symbol
1263 (info, abfd, name, BSF_WARNING, s, (bfd_vma) 0, msg,
1264 FALSE, collect, (struct bfd_link_hash_entry **) NULL)))
1265 goto error_return;
1266
1267 if (! info->relocateable)
1268 {
1269 /* Clobber the section size so that the warning does
1270 not get copied into the output file. */
1271 s->_raw_size = 0;
1272 }
1273 }
1274 }
1275 }
1276
1277 dt_needed = FALSE;
1278 if (! dynamic)
1279 {
1280 /* If we are creating a shared library, create all the dynamic
1281 sections immediately. We need to attach them to something,
1282 so we attach them to this BFD, provided it is the right
1283 format. FIXME: If there are no input BFD's of the same
1284 format as the output, we can't make a shared library. */
1285 if (info->shared
1286 && is_elf_hash_table (info)
1287 && ! hash_table->dynamic_sections_created
1288 && abfd->xvec == info->hash->creator)
1289 {
1290 if (! elf_link_create_dynamic_sections (abfd, info))
1291 goto error_return;
1292 }
1293 }
1294 else if (! is_elf_hash_table (info))
1295 goto error_return;
1296 else
1297 {
1298 asection *s;
1299 bfd_boolean add_needed;
1300 const char *name;
1301 bfd_size_type oldsize;
1302 bfd_size_type strindex;
1303 struct bfd_link_needed_list *rpath = NULL, *runpath = NULL;
1304
1305 /* ld --just-symbols and dynamic objects don't mix very well.
1306 Test for --just-symbols by looking at info set up by
1307 _bfd_elf_link_just_syms. */
1308 if ((s = abfd->sections) != NULL
1309 && s->sec_info_type == ELF_INFO_TYPE_JUST_SYMS)
1310 goto error_return;
1311
1312 /* Find the name to use in a DT_NEEDED entry that refers to this
1313 object. If the object has a DT_SONAME entry, we use it.
1314 Otherwise, if the generic linker stuck something in
1315 elf_dt_name, we use that. Otherwise, we just use the file
1316 name. If the generic linker put a null string into
1317 elf_dt_name, we don't make a DT_NEEDED entry at all, even if
1318 there is a DT_SONAME entry. */
1319 add_needed = TRUE;
1320 name = bfd_get_filename (abfd);
1321 if (elf_dt_name (abfd) != NULL)
1322 {
1323 name = elf_dt_name (abfd);
1324 if (*name == '\0')
1325 {
1326 if (elf_dt_soname (abfd) != NULL)
1327 dt_needed = TRUE;
1328
1329 add_needed = FALSE;
1330 }
1331 }
1332 s = bfd_get_section_by_name (abfd, ".dynamic");
1333 if (s != NULL)
1334 {
1335 Elf_External_Dyn *dynbuf = NULL;
1336 Elf_External_Dyn *extdyn;
1337 Elf_External_Dyn *extdynend;
1338 int elfsec;
1339 unsigned long shlink;
1340
1341 dynbuf = (Elf_External_Dyn *) bfd_malloc (s->_raw_size);
1342 if (dynbuf == NULL)
1343 goto error_return;
1344
1345 if (! bfd_get_section_contents (abfd, s, (PTR) dynbuf,
1346 (file_ptr) 0, s->_raw_size))
1347 goto error_free_dyn;
1348
1349 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1350 if (elfsec == -1)
1351 goto error_free_dyn;
1352 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
1353
1354 extdyn = dynbuf;
1355 extdynend = extdyn + s->_raw_size / sizeof (Elf_External_Dyn);
1356 for (; extdyn < extdynend; extdyn++)
1357 {
1358 Elf_Internal_Dyn dyn;
1359
1360 elf_swap_dyn_in (abfd, extdyn, &dyn);
1361 if (dyn.d_tag == DT_SONAME)
1362 {
1363 unsigned int tagv = dyn.d_un.d_val;
1364 name = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1365 if (name == NULL)
1366 goto error_free_dyn;
1367 }
1368 if (dyn.d_tag == DT_NEEDED)
1369 {
1370 struct bfd_link_needed_list *n, **pn;
1371 char *fnm, *anm;
1372 unsigned int tagv = dyn.d_un.d_val;
1373
1374 amt = sizeof (struct bfd_link_needed_list);
1375 n = (struct bfd_link_needed_list *) bfd_alloc (abfd, amt);
1376 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1377 if (n == NULL || fnm == NULL)
1378 goto error_free_dyn;
1379 amt = strlen (fnm) + 1;
1380 anm = bfd_alloc (abfd, amt);
1381 if (anm == NULL)
1382 goto error_free_dyn;
1383 memcpy (anm, fnm, (size_t) amt);
1384 n->name = anm;
1385 n->by = abfd;
1386 n->next = NULL;
1387 for (pn = & hash_table->needed;
1388 *pn != NULL;
1389 pn = &(*pn)->next)
1390 ;
1391 *pn = n;
1392 }
1393 if (dyn.d_tag == DT_RUNPATH)
1394 {
1395 struct bfd_link_needed_list *n, **pn;
1396 char *fnm, *anm;
1397 unsigned int tagv = dyn.d_un.d_val;
1398
1399 amt = sizeof (struct bfd_link_needed_list);
1400 n = (struct bfd_link_needed_list *) bfd_alloc (abfd, amt);
1401 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1402 if (n == NULL || fnm == NULL)
1403 goto error_free_dyn;
1404 amt = strlen (fnm) + 1;
1405 anm = bfd_alloc (abfd, amt);
1406 if (anm == NULL)
1407 goto error_free_dyn;
1408 memcpy (anm, fnm, (size_t) amt);
1409 n->name = anm;
1410 n->by = abfd;
1411 n->next = NULL;
1412 for (pn = & runpath;
1413 *pn != NULL;
1414 pn = &(*pn)->next)
1415 ;
1416 *pn = n;
1417 }
1418 /* Ignore DT_RPATH if we have seen DT_RUNPATH. */
1419 if (!runpath && dyn.d_tag == DT_RPATH)
1420 {
1421 struct bfd_link_needed_list *n, **pn;
1422 char *fnm, *anm;
1423 unsigned int tagv = dyn.d_un.d_val;
1424
1425 amt = sizeof (struct bfd_link_needed_list);
1426 n = (struct bfd_link_needed_list *) bfd_alloc (abfd, amt);
1427 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1428 if (n == NULL || fnm == NULL)
1429 goto error_free_dyn;
1430 amt = strlen (fnm) + 1;
1431 anm = bfd_alloc (abfd, amt);
1432 if (anm == NULL)
1433 {
1434 error_free_dyn:
1435 free (dynbuf);
1436 goto error_return;
1437 }
1438 memcpy (anm, fnm, (size_t) amt);
1439 n->name = anm;
1440 n->by = abfd;
1441 n->next = NULL;
1442 for (pn = & rpath;
1443 *pn != NULL;
1444 pn = &(*pn)->next)
1445 ;
1446 *pn = n;
1447 }
1448 }
1449
1450 free (dynbuf);
1451 }
1452
1453 /* DT_RUNPATH overrides DT_RPATH. Do _NOT_ bfd_release, as that
1454 frees all more recently bfd_alloc'd blocks as well. */
1455 if (runpath)
1456 rpath = runpath;
1457
1458 if (rpath)
1459 {
1460 struct bfd_link_needed_list **pn;
1461 for (pn = & hash_table->runpath;
1462 *pn != NULL;
1463 pn = &(*pn)->next)
1464 ;
1465 *pn = rpath;
1466 }
1467
1468 /* We do not want to include any of the sections in a dynamic
1469 object in the output file. We hack by simply clobbering the
1470 list of sections in the BFD. This could be handled more
1471 cleanly by, say, a new section flag; the existing
1472 SEC_NEVER_LOAD flag is not the one we want, because that one
1473 still implies that the section takes up space in the output
1474 file. */
1475 bfd_section_list_clear (abfd);
1476
1477 /* If this is the first dynamic object found in the link, create
1478 the special sections required for dynamic linking. */
1479 if (! hash_table->dynamic_sections_created)
1480 if (! elf_link_create_dynamic_sections (abfd, info))
1481 goto error_return;
1482
1483 if (add_needed)
1484 {
1485 /* Add a DT_NEEDED entry for this dynamic object. */
1486 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
1487 strindex = _bfd_elf_strtab_add (hash_table->dynstr, name, FALSE);
1488 if (strindex == (bfd_size_type) -1)
1489 goto error_return;
1490
1491 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
1492 {
1493 asection *sdyn;
1494 Elf_External_Dyn *dyncon, *dynconend;
1495
1496 /* The hash table size did not change, which means that
1497 the dynamic object name was already entered. If we
1498 have already included this dynamic object in the
1499 link, just ignore it. There is no reason to include
1500 a particular dynamic object more than once. */
1501 sdyn = bfd_get_section_by_name (hash_table->dynobj, ".dynamic");
1502 BFD_ASSERT (sdyn != NULL);
1503
1504 dyncon = (Elf_External_Dyn *) sdyn->contents;
1505 dynconend = (Elf_External_Dyn *) (sdyn->contents +
1506 sdyn->_raw_size);
1507 for (; dyncon < dynconend; dyncon++)
1508 {
1509 Elf_Internal_Dyn dyn;
1510
1511 elf_swap_dyn_in (hash_table->dynobj, dyncon, & dyn);
1512 if (dyn.d_tag == DT_NEEDED
1513 && dyn.d_un.d_val == strindex)
1514 {
1515 _bfd_elf_strtab_delref (hash_table->dynstr, strindex);
1516 return TRUE;
1517 }
1518 }
1519 }
1520
1521 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_NEEDED, strindex))
1522 goto error_return;
1523 }
1524
1525 /* Save the SONAME, if there is one, because sometimes the
1526 linker emulation code will need to know it. */
1527 if (*name == '\0')
1528 name = basename (bfd_get_filename (abfd));
1529 elf_dt_name (abfd) = name;
1530 }
1531
1532 /* If this is a dynamic object, we always link against the .dynsym
1533 symbol table, not the .symtab symbol table. The dynamic linker
1534 will only see the .dynsym symbol table, so there is no reason to
1535 look at .symtab for a dynamic object. */
1536
1537 if (! dynamic || elf_dynsymtab (abfd) == 0)
1538 hdr = &elf_tdata (abfd)->symtab_hdr;
1539 else
1540 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1541
1542 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
1543
1544 /* The sh_info field of the symtab header tells us where the
1545 external symbols start. We don't care about the local symbols at
1546 this point. */
1547 if (elf_bad_symtab (abfd))
1548 {
1549 extsymcount = symcount;
1550 extsymoff = 0;
1551 }
1552 else
1553 {
1554 extsymcount = symcount - hdr->sh_info;
1555 extsymoff = hdr->sh_info;
1556 }
1557
1558 sym_hash = NULL;
1559 if (extsymcount != 0)
1560 {
1561 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
1562 NULL, NULL, NULL);
1563 if (isymbuf == NULL)
1564 goto error_return;
1565
1566 /* We store a pointer to the hash table entry for each external
1567 symbol. */
1568 amt = extsymcount * sizeof (struct elf_link_hash_entry *);
1569 sym_hash = (struct elf_link_hash_entry **) bfd_alloc (abfd, amt);
1570 if (sym_hash == NULL)
1571 goto error_free_sym;
1572 elf_sym_hashes (abfd) = sym_hash;
1573 }
1574
1575 if (dynamic)
1576 {
1577 /* Read in any version definitions. */
1578 if (! _bfd_elf_slurp_version_tables (abfd))
1579 goto error_free_sym;
1580
1581 /* Read in the symbol versions, but don't bother to convert them
1582 to internal format. */
1583 if (elf_dynversym (abfd) != 0)
1584 {
1585 Elf_Internal_Shdr *versymhdr;
1586
1587 versymhdr = &elf_tdata (abfd)->dynversym_hdr;
1588 extversym = (Elf_External_Versym *) bfd_malloc (versymhdr->sh_size);
1589 if (extversym == NULL)
1590 goto error_free_sym;
1591 amt = versymhdr->sh_size;
1592 if (bfd_seek (abfd, versymhdr->sh_offset, SEEK_SET) != 0
1593 || bfd_bread ((PTR) extversym, amt, abfd) != amt)
1594 goto error_free_vers;
1595 }
1596 }
1597
1598 weaks = NULL;
1599
1600 ever = extversym != NULL ? extversym + extsymoff : NULL;
1601 for (isym = isymbuf, isymend = isymbuf + extsymcount;
1602 isym < isymend;
1603 isym++, sym_hash++, ever = (ever != NULL ? ever + 1 : NULL))
1604 {
1605 int bind;
1606 bfd_vma value;
1607 asection *sec;
1608 flagword flags;
1609 const char *name;
1610 struct elf_link_hash_entry *h;
1611 bfd_boolean definition;
1612 bfd_boolean size_change_ok, type_change_ok;
1613 bfd_boolean new_weakdef;
1614 unsigned int old_alignment;
1615 bfd_boolean override;
1616
1617 override = FALSE;
1618
1619 flags = BSF_NO_FLAGS;
1620 sec = NULL;
1621 value = isym->st_value;
1622 *sym_hash = NULL;
1623
1624 bind = ELF_ST_BIND (isym->st_info);
1625 if (bind == STB_LOCAL)
1626 {
1627 /* This should be impossible, since ELF requires that all
1628 global symbols follow all local symbols, and that sh_info
1629 point to the first global symbol. Unfortunatealy, Irix 5
1630 screws this up. */
1631 continue;
1632 }
1633 else if (bind == STB_GLOBAL)
1634 {
1635 if (isym->st_shndx != SHN_UNDEF
1636 && isym->st_shndx != SHN_COMMON)
1637 flags = BSF_GLOBAL;
1638 }
1639 else if (bind == STB_WEAK)
1640 flags = BSF_WEAK;
1641 else
1642 {
1643 /* Leave it up to the processor backend. */
1644 }
1645
1646 if (isym->st_shndx == SHN_UNDEF)
1647 sec = bfd_und_section_ptr;
1648 else if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
1649 {
1650 sec = section_from_elf_index (abfd, isym->st_shndx);
1651 if (sec == NULL)
1652 sec = bfd_abs_section_ptr;
1653 else if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
1654 value -= sec->vma;
1655 }
1656 else if (isym->st_shndx == SHN_ABS)
1657 sec = bfd_abs_section_ptr;
1658 else if (isym->st_shndx == SHN_COMMON)
1659 {
1660 sec = bfd_com_section_ptr;
1661 /* What ELF calls the size we call the value. What ELF
1662 calls the value we call the alignment. */
1663 value = isym->st_size;
1664 }
1665 else
1666 {
1667 /* Leave it up to the processor backend. */
1668 }
1669
1670 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
1671 isym->st_name);
1672 if (name == (const char *) NULL)
1673 goto error_free_vers;
1674
1675 if (isym->st_shndx == SHN_COMMON
1676 && ELF_ST_TYPE (isym->st_info) == STT_TLS)
1677 {
1678 asection *tcomm = bfd_get_section_by_name (abfd, ".tcommon");
1679
1680 if (tcomm == NULL)
1681 {
1682 tcomm = bfd_make_section (abfd, ".tcommon");
1683 if (tcomm == NULL
1684 || !bfd_set_section_flags (abfd, tcomm, (SEC_ALLOC
1685 | SEC_IS_COMMON
1686 | SEC_LINKER_CREATED
1687 | SEC_THREAD_LOCAL)))
1688 goto error_free_vers;
1689 }
1690 sec = tcomm;
1691 }
1692 else if (add_symbol_hook)
1693 {
1694 if (! (*add_symbol_hook) (abfd, info, isym, &name, &flags, &sec,
1695 &value))
1696 goto error_free_vers;
1697
1698 /* The hook function sets the name to NULL if this symbol
1699 should be skipped for some reason. */
1700 if (name == (const char *) NULL)
1701 continue;
1702 }
1703
1704 /* Sanity check that all possibilities were handled. */
1705 if (sec == (asection *) NULL)
1706 {
1707 bfd_set_error (bfd_error_bad_value);
1708 goto error_free_vers;
1709 }
1710
1711 if (bfd_is_und_section (sec)
1712 || bfd_is_com_section (sec))
1713 definition = FALSE;
1714 else
1715 definition = TRUE;
1716
1717 size_change_ok = FALSE;
1718 type_change_ok = get_elf_backend_data (abfd)->type_change_ok;
1719 old_alignment = 0;
1720 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1721 {
1722 Elf_Internal_Versym iver;
1723 unsigned int vernum = 0;
1724
1725 if (ever != NULL)
1726 {
1727 _bfd_elf_swap_versym_in (abfd, ever, &iver);
1728 vernum = iver.vs_vers & VERSYM_VERSION;
1729
1730 /* If this is a hidden symbol, or if it is not version
1731 1, we append the version name to the symbol name.
1732 However, we do not modify a non-hidden absolute
1733 symbol, because it might be the version symbol
1734 itself. FIXME: What if it isn't? */
1735 if ((iver.vs_vers & VERSYM_HIDDEN) != 0
1736 || (vernum > 1 && ! bfd_is_abs_section (sec)))
1737 {
1738 const char *verstr;
1739 size_t namelen, verlen, newlen;
1740 char *newname, *p;
1741
1742 if (isym->st_shndx != SHN_UNDEF)
1743 {
1744 if (vernum > elf_tdata (abfd)->dynverdef_hdr.sh_info)
1745 {
1746 (*_bfd_error_handler)
1747 (_("%s: %s: invalid version %u (max %d)"),
1748 bfd_archive_filename (abfd), name, vernum,
1749 elf_tdata (abfd)->dynverdef_hdr.sh_info);
1750 bfd_set_error (bfd_error_bad_value);
1751 goto error_free_vers;
1752 }
1753 else if (vernum > 1)
1754 verstr =
1755 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1756 else
1757 verstr = "";
1758 }
1759 else
1760 {
1761 /* We cannot simply test for the number of
1762 entries in the VERNEED section since the
1763 numbers for the needed versions do not start
1764 at 0. */
1765 Elf_Internal_Verneed *t;
1766
1767 verstr = NULL;
1768 for (t = elf_tdata (abfd)->verref;
1769 t != NULL;
1770 t = t->vn_nextref)
1771 {
1772 Elf_Internal_Vernaux *a;
1773
1774 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1775 {
1776 if (a->vna_other == vernum)
1777 {
1778 verstr = a->vna_nodename;
1779 break;
1780 }
1781 }
1782 if (a != NULL)
1783 break;
1784 }
1785 if (verstr == NULL)
1786 {
1787 (*_bfd_error_handler)
1788 (_("%s: %s: invalid needed version %d"),
1789 bfd_archive_filename (abfd), name, vernum);
1790 bfd_set_error (bfd_error_bad_value);
1791 goto error_free_vers;
1792 }
1793 }
1794
1795 namelen = strlen (name);
1796 verlen = strlen (verstr);
1797 newlen = namelen + verlen + 2;
1798 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
1799 && isym->st_shndx != SHN_UNDEF)
1800 ++newlen;
1801
1802 newname = (char *) bfd_alloc (abfd, (bfd_size_type) newlen);
1803 if (newname == NULL)
1804 goto error_free_vers;
1805 memcpy (newname, name, namelen);
1806 p = newname + namelen;
1807 *p++ = ELF_VER_CHR;
1808 /* If this is a defined non-hidden version symbol,
1809 we add another @ to the name. This indicates the
1810 default version of the symbol. */
1811 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
1812 && isym->st_shndx != SHN_UNDEF)
1813 *p++ = ELF_VER_CHR;
1814 memcpy (p, verstr, verlen + 1);
1815
1816 name = newname;
1817 }
1818 }
1819
1820 if (! elf_merge_symbol (abfd, info, name, isym, &sec, &value,
1821 sym_hash, &override, &type_change_ok,
1822 &size_change_ok, dt_needed))
1823 goto error_free_vers;
1824
1825 if (override)
1826 definition = FALSE;
1827
1828 h = *sym_hash;
1829 while (h->root.type == bfd_link_hash_indirect
1830 || h->root.type == bfd_link_hash_warning)
1831 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1832
1833 /* Remember the old alignment if this is a common symbol, so
1834 that we don't reduce the alignment later on. We can't
1835 check later, because _bfd_generic_link_add_one_symbol
1836 will set a default for the alignment which we want to
1837 override. */
1838 if (h->root.type == bfd_link_hash_common)
1839 old_alignment = h->root.u.c.p->alignment_power;
1840
1841 if (elf_tdata (abfd)->verdef != NULL
1842 && ! override
1843 && vernum > 1
1844 && definition)
1845 h->verinfo.verdef = &elf_tdata (abfd)->verdef[vernum - 1];
1846 }
1847
1848 if (! (_bfd_generic_link_add_one_symbol
1849 (info, abfd, name, flags, sec, value, (const char *) NULL,
1850 FALSE, collect, (struct bfd_link_hash_entry **) sym_hash)))
1851 goto error_free_vers;
1852
1853 h = *sym_hash;
1854 while (h->root.type == bfd_link_hash_indirect
1855 || h->root.type == bfd_link_hash_warning)
1856 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1857 *sym_hash = h;
1858
1859 new_weakdef = FALSE;
1860 if (dynamic
1861 && definition
1862 && (flags & BSF_WEAK) != 0
1863 && ELF_ST_TYPE (isym->st_info) != STT_FUNC
1864 && info->hash->creator->flavour == bfd_target_elf_flavour
1865 && h->weakdef == NULL)
1866 {
1867 /* Keep a list of all weak defined non function symbols from
1868 a dynamic object, using the weakdef field. Later in this
1869 function we will set the weakdef field to the correct
1870 value. We only put non-function symbols from dynamic
1871 objects on this list, because that happens to be the only
1872 time we need to know the normal symbol corresponding to a
1873 weak symbol, and the information is time consuming to
1874 figure out. If the weakdef field is not already NULL,
1875 then this symbol was already defined by some previous
1876 dynamic object, and we will be using that previous
1877 definition anyhow. */
1878
1879 h->weakdef = weaks;
1880 weaks = h;
1881 new_weakdef = TRUE;
1882 }
1883
1884 /* Set the alignment of a common symbol. */
1885 if (isym->st_shndx == SHN_COMMON
1886 && h->root.type == bfd_link_hash_common)
1887 {
1888 unsigned int align;
1889
1890 align = bfd_log2 (isym->st_value);
1891 if (align > old_alignment
1892 /* Permit an alignment power of zero if an alignment of one
1893 is specified and no other alignments have been specified. */
1894 || (isym->st_value == 1 && old_alignment == 0))
1895 h->root.u.c.p->alignment_power = align;
1896 }
1897
1898 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1899 {
1900 int old_flags;
1901 bfd_boolean dynsym;
1902 int new_flag;
1903
1904 /* Remember the symbol size and type. */
1905 if (isym->st_size != 0
1906 && (definition || h->size == 0))
1907 {
1908 if (h->size != 0 && h->size != isym->st_size && ! size_change_ok)
1909 (*_bfd_error_handler)
1910 (_("Warning: size of symbol `%s' changed from %lu to %lu in %s"),
1911 name, (unsigned long) h->size,
1912 (unsigned long) isym->st_size, bfd_archive_filename (abfd));
1913
1914 h->size = isym->st_size;
1915 }
1916
1917 /* If this is a common symbol, then we always want H->SIZE
1918 to be the size of the common symbol. The code just above
1919 won't fix the size if a common symbol becomes larger. We
1920 don't warn about a size change here, because that is
1921 covered by --warn-common. */
1922 if (h->root.type == bfd_link_hash_common)
1923 h->size = h->root.u.c.size;
1924
1925 if (ELF_ST_TYPE (isym->st_info) != STT_NOTYPE
1926 && (definition || h->type == STT_NOTYPE))
1927 {
1928 if (h->type != STT_NOTYPE
1929 && h->type != ELF_ST_TYPE (isym->st_info)
1930 && ! type_change_ok)
1931 (*_bfd_error_handler)
1932 (_("Warning: type of symbol `%s' changed from %d to %d in %s"),
1933 name, h->type, ELF_ST_TYPE (isym->st_info),
1934 bfd_archive_filename (abfd));
1935
1936 h->type = ELF_ST_TYPE (isym->st_info);
1937 }
1938
1939 /* If st_other has a processor-specific meaning, specific code
1940 might be needed here. */
1941 if (isym->st_other != 0)
1942 {
1943 unsigned char hvis, symvis, other;
1944
1945 /* Take the balance of OTHER from the definition. */
1946 other = (definition ? isym->st_other : h->other);
1947 other &= ~ ELF_ST_VISIBILITY (-1);
1948
1949 /* Combine visibilities, using the most constraining one. */
1950 hvis = ELF_ST_VISIBILITY (h->other);
1951 symvis = ELF_ST_VISIBILITY (isym->st_other);
1952
1953 h->other = other | (hvis > symvis ? hvis : symvis);
1954 }
1955
1956 /* Set a flag in the hash table entry indicating the type of
1957 reference or definition we just found. Keep a count of
1958 the number of dynamic symbols we find. A dynamic symbol
1959 is one which is referenced or defined by both a regular
1960 object and a shared object. */
1961 old_flags = h->elf_link_hash_flags;
1962 dynsym = FALSE;
1963 if (! dynamic)
1964 {
1965 if (! definition)
1966 {
1967 new_flag = ELF_LINK_HASH_REF_REGULAR;
1968 if (bind != STB_WEAK)
1969 new_flag |= ELF_LINK_HASH_REF_REGULAR_NONWEAK;
1970 }
1971 else
1972 new_flag = ELF_LINK_HASH_DEF_REGULAR;
1973 if (info->shared
1974 || (old_flags & (ELF_LINK_HASH_DEF_DYNAMIC
1975 | ELF_LINK_HASH_REF_DYNAMIC)) != 0)
1976 dynsym = TRUE;
1977 }
1978 else
1979 {
1980 if (! definition)
1981 new_flag = ELF_LINK_HASH_REF_DYNAMIC;
1982 else
1983 new_flag = ELF_LINK_HASH_DEF_DYNAMIC;
1984 if ((old_flags & (ELF_LINK_HASH_DEF_REGULAR
1985 | ELF_LINK_HASH_REF_REGULAR)) != 0
1986 || (h->weakdef != NULL
1987 && ! new_weakdef
1988 && h->weakdef->dynindx != -1))
1989 dynsym = TRUE;
1990 }
1991
1992 h->elf_link_hash_flags |= new_flag;
1993
1994 /* Check to see if we need to add an indirect symbol for
1995 the default name. */
1996 if (definition || h->root.type == bfd_link_hash_common)
1997 if (! elf_add_default_symbol (abfd, info, h, name, isym,
1998 &sec, &value, &dynsym,
1999 override, dt_needed))
2000 goto error_free_vers;
2001
2002 if (definition && (abfd->flags & DYNAMIC) == 0)
2003 {
2004 char *p = strchr (name, ELF_VER_CHR);
2005 if (p != NULL && p[1] != ELF_VER_CHR)
2006 {
2007 /* Queue non-default versions so that .symver x, x@FOO
2008 aliases can be checked. */
2009 if (! nondeflt_vers)
2010 {
2011 amt = (isymend - isym + 1)
2012 * sizeof (struct elf_link_hash_entry *);
2013 nondeflt_vers = bfd_malloc (amt);
2014 }
2015 nondeflt_vers [nondeflt_vers_cnt++] = h;
2016 }
2017 }
2018
2019 if (dynsym && h->dynindx == -1)
2020 {
2021 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2022 goto error_free_vers;
2023 if (h->weakdef != NULL
2024 && ! new_weakdef
2025 && h->weakdef->dynindx == -1)
2026 {
2027 if (! _bfd_elf_link_record_dynamic_symbol (info, h->weakdef))
2028 goto error_free_vers;
2029 }
2030 }
2031 else if (dynsym && h->dynindx != -1)
2032 /* If the symbol already has a dynamic index, but
2033 visibility says it should not be visible, turn it into
2034 a local symbol. */
2035 switch (ELF_ST_VISIBILITY (h->other))
2036 {
2037 case STV_INTERNAL:
2038 case STV_HIDDEN:
2039 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
2040 break;
2041 }
2042
2043 if (dt_needed && definition
2044 && (h->elf_link_hash_flags
2045 & ELF_LINK_HASH_REF_REGULAR) != 0)
2046 {
2047 bfd_size_type oldsize;
2048 bfd_size_type strindex;
2049
2050 if (! is_elf_hash_table (info))
2051 goto error_free_vers;
2052
2053 /* The symbol from a DT_NEEDED object is referenced from
2054 the regular object to create a dynamic executable. We
2055 have to make sure there is a DT_NEEDED entry for it. */
2056
2057 dt_needed = FALSE;
2058 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
2059 strindex = _bfd_elf_strtab_add (hash_table->dynstr,
2060 elf_dt_soname (abfd), FALSE);
2061 if (strindex == (bfd_size_type) -1)
2062 goto error_free_vers;
2063
2064 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
2065 {
2066 asection *sdyn;
2067 Elf_External_Dyn *dyncon, *dynconend;
2068
2069 sdyn = bfd_get_section_by_name (hash_table->dynobj,
2070 ".dynamic");
2071 BFD_ASSERT (sdyn != NULL);
2072
2073 dyncon = (Elf_External_Dyn *) sdyn->contents;
2074 dynconend = (Elf_External_Dyn *) (sdyn->contents +
2075 sdyn->_raw_size);
2076 for (; dyncon < dynconend; dyncon++)
2077 {
2078 Elf_Internal_Dyn dyn;
2079
2080 elf_swap_dyn_in (hash_table->dynobj,
2081 dyncon, &dyn);
2082 BFD_ASSERT (dyn.d_tag != DT_NEEDED ||
2083 dyn.d_un.d_val != strindex);
2084 }
2085 }
2086
2087 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_NEEDED, strindex))
2088 goto error_free_vers;
2089 }
2090 }
2091 }
2092
2093 /* Now that all the symbols from this input file are created, handle
2094 .symver foo, foo@BAR such that any relocs against foo become foo@BAR. */
2095 if (nondeflt_vers != NULL)
2096 {
2097 bfd_size_type cnt, symidx;
2098
2099 for (cnt = 0; cnt < nondeflt_vers_cnt; ++cnt)
2100 {
2101 struct elf_link_hash_entry *h = nondeflt_vers[cnt], *hi;
2102 char *shortname, *p;
2103
2104 p = strchr (h->root.root.string, ELF_VER_CHR);
2105 if (p == NULL
2106 || (h->root.type != bfd_link_hash_defined
2107 && h->root.type != bfd_link_hash_defweak))
2108 continue;
2109
2110 amt = p - h->root.root.string;
2111 shortname = bfd_malloc (amt + 1);
2112 memcpy (shortname, h->root.root.string, amt);
2113 shortname[amt] = '\0';
2114
2115 hi = (struct elf_link_hash_entry *)
2116 bfd_link_hash_lookup (info->hash, shortname,
2117 FALSE, FALSE, FALSE);
2118 if (hi != NULL
2119 && hi->root.type == h->root.type
2120 && hi->root.u.def.value == h->root.u.def.value
2121 && hi->root.u.def.section == h->root.u.def.section)
2122 {
2123 (*bed->elf_backend_hide_symbol) (info, hi, TRUE);
2124 hi->root.type = bfd_link_hash_indirect;
2125 hi->root.u.i.link = (struct bfd_link_hash_entry *) h;
2126 (*bed->elf_backend_copy_indirect_symbol) (bed, h, hi);
2127 sym_hash = elf_sym_hashes (abfd);
2128 if (sym_hash)
2129 for (symidx = 0; symidx < extsymcount; ++symidx)
2130 if (sym_hash[symidx] == hi)
2131 {
2132 sym_hash[symidx] = h;
2133 break;
2134 }
2135 }
2136 free (shortname);
2137 }
2138 free (nondeflt_vers);
2139 nondeflt_vers = NULL;
2140 }
2141
2142 if (extversym != NULL)
2143 {
2144 free (extversym);
2145 extversym = NULL;
2146 }
2147
2148 if (isymbuf != NULL)
2149 free (isymbuf);
2150 isymbuf = NULL;
2151
2152 /* Now set the weakdefs field correctly for all the weak defined
2153 symbols we found. The only way to do this is to search all the
2154 symbols. Since we only need the information for non functions in
2155 dynamic objects, that's the only time we actually put anything on
2156 the list WEAKS. We need this information so that if a regular
2157 object refers to a symbol defined weakly in a dynamic object, the
2158 real symbol in the dynamic object is also put in the dynamic
2159 symbols; we also must arrange for both symbols to point to the
2160 same memory location. We could handle the general case of symbol
2161 aliasing, but a general symbol alias can only be generated in
2162 assembler code, handling it correctly would be very time
2163 consuming, and other ELF linkers don't handle general aliasing
2164 either. */
2165 while (weaks != NULL)
2166 {
2167 struct elf_link_hash_entry *hlook;
2168 asection *slook;
2169 bfd_vma vlook;
2170 struct elf_link_hash_entry **hpp;
2171 struct elf_link_hash_entry **hppend;
2172
2173 hlook = weaks;
2174 weaks = hlook->weakdef;
2175 hlook->weakdef = NULL;
2176
2177 BFD_ASSERT (hlook->root.type == bfd_link_hash_defined
2178 || hlook->root.type == bfd_link_hash_defweak
2179 || hlook->root.type == bfd_link_hash_common
2180 || hlook->root.type == bfd_link_hash_indirect);
2181 slook = hlook->root.u.def.section;
2182 vlook = hlook->root.u.def.value;
2183
2184 hpp = elf_sym_hashes (abfd);
2185 hppend = hpp + extsymcount;
2186 for (; hpp < hppend; hpp++)
2187 {
2188 struct elf_link_hash_entry *h;
2189
2190 h = *hpp;
2191 if (h != NULL && h != hlook
2192 && h->root.type == bfd_link_hash_defined
2193 && h->root.u.def.section == slook
2194 && h->root.u.def.value == vlook)
2195 {
2196 hlook->weakdef = h;
2197
2198 /* If the weak definition is in the list of dynamic
2199 symbols, make sure the real definition is put there
2200 as well. */
2201 if (hlook->dynindx != -1
2202 && h->dynindx == -1)
2203 {
2204 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2205 goto error_return;
2206 }
2207
2208 /* If the real definition is in the list of dynamic
2209 symbols, make sure the weak definition is put there
2210 as well. If we don't do this, then the dynamic
2211 loader might not merge the entries for the real
2212 definition and the weak definition. */
2213 if (h->dynindx != -1
2214 && hlook->dynindx == -1)
2215 {
2216 if (! _bfd_elf_link_record_dynamic_symbol (info, hlook))
2217 goto error_return;
2218 }
2219 break;
2220 }
2221 }
2222 }
2223
2224 /* If this object is the same format as the output object, and it is
2225 not a shared library, then let the backend look through the
2226 relocs.
2227
2228 This is required to build global offset table entries and to
2229 arrange for dynamic relocs. It is not required for the
2230 particular common case of linking non PIC code, even when linking
2231 against shared libraries, but unfortunately there is no way of
2232 knowing whether an object file has been compiled PIC or not.
2233 Looking through the relocs is not particularly time consuming.
2234 The problem is that we must either (1) keep the relocs in memory,
2235 which causes the linker to require additional runtime memory or
2236 (2) read the relocs twice from the input file, which wastes time.
2237 This would be a good case for using mmap.
2238
2239 I have no idea how to handle linking PIC code into a file of a
2240 different format. It probably can't be done. */
2241 check_relocs = get_elf_backend_data (abfd)->check_relocs;
2242 if (! dynamic
2243 && abfd->xvec == info->hash->creator
2244 && check_relocs != NULL)
2245 {
2246 asection *o;
2247
2248 for (o = abfd->sections; o != NULL; o = o->next)
2249 {
2250 Elf_Internal_Rela *internal_relocs;
2251 bfd_boolean ok;
2252
2253 if ((o->flags & SEC_RELOC) == 0
2254 || o->reloc_count == 0
2255 || ((info->strip == strip_all || info->strip == strip_debugger)
2256 && (o->flags & SEC_DEBUGGING) != 0)
2257 || bfd_is_abs_section (o->output_section))
2258 continue;
2259
2260 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
2261 (abfd, o, (PTR) NULL,
2262 (Elf_Internal_Rela *) NULL,
2263 info->keep_memory));
2264 if (internal_relocs == NULL)
2265 goto error_return;
2266
2267 ok = (*check_relocs) (abfd, info, o, internal_relocs);
2268
2269 if (elf_section_data (o)->relocs != internal_relocs)
2270 free (internal_relocs);
2271
2272 if (! ok)
2273 goto error_return;
2274 }
2275 }
2276
2277 /* If this is a non-traditional link, try to optimize the handling
2278 of the .stab/.stabstr sections. */
2279 if (! dynamic
2280 && ! info->traditional_format
2281 && info->hash->creator->flavour == bfd_target_elf_flavour
2282 && is_elf_hash_table (info)
2283 && (info->strip != strip_all && info->strip != strip_debugger))
2284 {
2285 asection *stab, *stabstr;
2286
2287 stab = bfd_get_section_by_name (abfd, ".stab");
2288 if (stab != NULL
2289 && (stab->flags & SEC_MERGE) == 0
2290 && !bfd_is_abs_section (stab->output_section))
2291 {
2292 stabstr = bfd_get_section_by_name (abfd, ".stabstr");
2293
2294 if (stabstr != NULL)
2295 {
2296 struct bfd_elf_section_data *secdata;
2297
2298 secdata = elf_section_data (stab);
2299 if (! _bfd_link_section_stabs (abfd,
2300 & hash_table->stab_info,
2301 stab, stabstr,
2302 &secdata->sec_info))
2303 goto error_return;
2304 if (secdata->sec_info)
2305 stab->sec_info_type = ELF_INFO_TYPE_STABS;
2306 }
2307 }
2308 }
2309
2310 if (! info->relocateable && ! dynamic
2311 && is_elf_hash_table (info))
2312 {
2313 asection *s;
2314
2315 for (s = abfd->sections; s != NULL; s = s->next)
2316 if ((s->flags & SEC_MERGE) != 0
2317 && !bfd_is_abs_section (s->output_section))
2318 {
2319 struct bfd_elf_section_data *secdata;
2320
2321 secdata = elf_section_data (s);
2322 if (! _bfd_merge_section (abfd,
2323 & hash_table->merge_info,
2324 s, &secdata->sec_info))
2325 goto error_return;
2326 else if (secdata->sec_info)
2327 s->sec_info_type = ELF_INFO_TYPE_MERGE;
2328 }
2329 }
2330
2331 if (is_elf_hash_table (info))
2332 {
2333 /* Add this bfd to the loaded list. */
2334 struct elf_link_loaded_list *n;
2335
2336 n = ((struct elf_link_loaded_list *)
2337 bfd_alloc (abfd, sizeof (struct elf_link_loaded_list)));
2338 if (n == NULL)
2339 goto error_return;
2340 n->abfd = abfd;
2341 n->next = hash_table->loaded;
2342 hash_table->loaded = n;
2343 }
2344
2345 return TRUE;
2346
2347 error_free_vers:
2348 if (nondeflt_vers != NULL)
2349 free (nondeflt_vers);
2350 if (extversym != NULL)
2351 free (extversym);
2352 error_free_sym:
2353 if (isymbuf != NULL)
2354 free (isymbuf);
2355 error_return:
2356 return FALSE;
2357 }
2358
2359 /* Create some sections which will be filled in with dynamic linking
2360 information. ABFD is an input file which requires dynamic sections
2361 to be created. The dynamic sections take up virtual memory space
2362 when the final executable is run, so we need to create them before
2363 addresses are assigned to the output sections. We work out the
2364 actual contents and size of these sections later. */
2365
2366 bfd_boolean
2367 elf_link_create_dynamic_sections (abfd, info)
2368 bfd *abfd;
2369 struct bfd_link_info *info;
2370 {
2371 flagword flags;
2372 register asection *s;
2373 struct elf_link_hash_entry *h;
2374 struct bfd_link_hash_entry *bh;
2375 struct elf_backend_data *bed;
2376
2377 if (! is_elf_hash_table (info))
2378 return FALSE;
2379
2380 if (elf_hash_table (info)->dynamic_sections_created)
2381 return TRUE;
2382
2383 /* Make sure that all dynamic sections use the same input BFD. */
2384 if (elf_hash_table (info)->dynobj == NULL)
2385 elf_hash_table (info)->dynobj = abfd;
2386 else
2387 abfd = elf_hash_table (info)->dynobj;
2388
2389 /* Note that we set the SEC_IN_MEMORY flag for all of these
2390 sections. */
2391 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
2392 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2393
2394 /* A dynamically linked executable has a .interp section, but a
2395 shared library does not. */
2396 if (! info->shared)
2397 {
2398 s = bfd_make_section (abfd, ".interp");
2399 if (s == NULL
2400 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
2401 return FALSE;
2402 }
2403
2404 if (! info->traditional_format
2405 && info->hash->creator->flavour == bfd_target_elf_flavour)
2406 {
2407 s = bfd_make_section (abfd, ".eh_frame_hdr");
2408 if (s == NULL
2409 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2410 || ! bfd_set_section_alignment (abfd, s, 2))
2411 return FALSE;
2412 elf_hash_table (info)->eh_info.hdr_sec = s;
2413 }
2414
2415 /* Create sections to hold version informations. These are removed
2416 if they are not needed. */
2417 s = bfd_make_section (abfd, ".gnu.version_d");
2418 if (s == NULL
2419 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2420 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2421 return FALSE;
2422
2423 s = bfd_make_section (abfd, ".gnu.version");
2424 if (s == NULL
2425 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2426 || ! bfd_set_section_alignment (abfd, s, 1))
2427 return FALSE;
2428
2429 s = bfd_make_section (abfd, ".gnu.version_r");
2430 if (s == NULL
2431 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2432 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2433 return FALSE;
2434
2435 s = bfd_make_section (abfd, ".dynsym");
2436 if (s == NULL
2437 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2438 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2439 return FALSE;
2440
2441 s = bfd_make_section (abfd, ".dynstr");
2442 if (s == NULL
2443 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
2444 return FALSE;
2445
2446 /* Create a strtab to hold the dynamic symbol names. */
2447 if (elf_hash_table (info)->dynstr == NULL)
2448 {
2449 elf_hash_table (info)->dynstr = _bfd_elf_strtab_init ();
2450 if (elf_hash_table (info)->dynstr == NULL)
2451 return FALSE;
2452 }
2453
2454 s = bfd_make_section (abfd, ".dynamic");
2455 if (s == NULL
2456 || ! bfd_set_section_flags (abfd, s, flags)
2457 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2458 return FALSE;
2459
2460 /* The special symbol _DYNAMIC is always set to the start of the
2461 .dynamic section. This call occurs before we have processed the
2462 symbols for any dynamic object, so we don't have to worry about
2463 overriding a dynamic definition. We could set _DYNAMIC in a
2464 linker script, but we only want to define it if we are, in fact,
2465 creating a .dynamic section. We don't want to define it if there
2466 is no .dynamic section, since on some ELF platforms the start up
2467 code examines it to decide how to initialize the process. */
2468 bh = NULL;
2469 if (! (_bfd_generic_link_add_one_symbol
2470 (info, abfd, "_DYNAMIC", BSF_GLOBAL, s, (bfd_vma) 0,
2471 (const char *) 0, FALSE, get_elf_backend_data (abfd)->collect, &bh)))
2472 return FALSE;
2473 h = (struct elf_link_hash_entry *) bh;
2474 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2475 h->type = STT_OBJECT;
2476
2477 if (info->shared
2478 && ! _bfd_elf_link_record_dynamic_symbol (info, h))
2479 return FALSE;
2480
2481 bed = get_elf_backend_data (abfd);
2482
2483 s = bfd_make_section (abfd, ".hash");
2484 if (s == NULL
2485 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2486 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2487 return FALSE;
2488 elf_section_data (s)->this_hdr.sh_entsize = bed->s->sizeof_hash_entry;
2489
2490 /* Let the backend create the rest of the sections. This lets the
2491 backend set the right flags. The backend will normally create
2492 the .got and .plt sections. */
2493 if (! (*bed->elf_backend_create_dynamic_sections) (abfd, info))
2494 return FALSE;
2495
2496 elf_hash_table (info)->dynamic_sections_created = TRUE;
2497
2498 return TRUE;
2499 }
2500
2501 /* Add an entry to the .dynamic table. */
2502
2503 bfd_boolean
2504 elf_add_dynamic_entry (info, tag, val)
2505 struct bfd_link_info *info;
2506 bfd_vma tag;
2507 bfd_vma val;
2508 {
2509 Elf_Internal_Dyn dyn;
2510 bfd *dynobj;
2511 asection *s;
2512 bfd_size_type newsize;
2513 bfd_byte *newcontents;
2514
2515 if (! is_elf_hash_table (info))
2516 return FALSE;
2517
2518 dynobj = elf_hash_table (info)->dynobj;
2519
2520 s = bfd_get_section_by_name (dynobj, ".dynamic");
2521 BFD_ASSERT (s != NULL);
2522
2523 newsize = s->_raw_size + sizeof (Elf_External_Dyn);
2524 newcontents = (bfd_byte *) bfd_realloc (s->contents, newsize);
2525 if (newcontents == NULL)
2526 return FALSE;
2527
2528 dyn.d_tag = tag;
2529 dyn.d_un.d_val = val;
2530 elf_swap_dyn_out (dynobj, &dyn,
2531 (Elf_External_Dyn *) (newcontents + s->_raw_size));
2532
2533 s->_raw_size = newsize;
2534 s->contents = newcontents;
2535
2536 return TRUE;
2537 }
2538 \f
2539 /* Read and swap the relocs from the section indicated by SHDR. This
2540 may be either a REL or a RELA section. The relocations are
2541 translated into RELA relocations and stored in INTERNAL_RELOCS,
2542 which should have already been allocated to contain enough space.
2543 The EXTERNAL_RELOCS are a buffer where the external form of the
2544 relocations should be stored.
2545
2546 Returns FALSE if something goes wrong. */
2547
2548 static bfd_boolean
2549 elf_link_read_relocs_from_section (abfd, shdr, external_relocs,
2550 internal_relocs)
2551 bfd *abfd;
2552 Elf_Internal_Shdr *shdr;
2553 PTR external_relocs;
2554 Elf_Internal_Rela *internal_relocs;
2555 {
2556 struct elf_backend_data *bed;
2557 void (*swap_in) PARAMS ((bfd *, const bfd_byte *, Elf_Internal_Rela *));
2558 const bfd_byte *erela;
2559 const bfd_byte *erelaend;
2560 Elf_Internal_Rela *irela;
2561
2562 /* If there aren't any relocations, that's OK. */
2563 if (!shdr)
2564 return TRUE;
2565
2566 /* Position ourselves at the start of the section. */
2567 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0)
2568 return FALSE;
2569
2570 /* Read the relocations. */
2571 if (bfd_bread (external_relocs, shdr->sh_size, abfd) != shdr->sh_size)
2572 return FALSE;
2573
2574 bed = get_elf_backend_data (abfd);
2575
2576 /* Convert the external relocations to the internal format. */
2577 if (shdr->sh_entsize == sizeof (Elf_External_Rel))
2578 swap_in = bed->s->swap_reloc_in;
2579 else if (shdr->sh_entsize == sizeof (Elf_External_Rela))
2580 swap_in = bed->s->swap_reloca_in;
2581 else
2582 abort ();
2583
2584 erela = external_relocs;
2585 erelaend = erela + NUM_SHDR_ENTRIES (shdr) * shdr->sh_entsize;
2586 irela = internal_relocs;
2587 while (erela < erelaend)
2588 {
2589 (*swap_in) (abfd, erela, irela);
2590 irela += bed->s->int_rels_per_ext_rel;
2591 erela += shdr->sh_entsize;
2592 }
2593
2594 return TRUE;
2595 }
2596
2597 /* Read and swap the relocs for a section O. They may have been
2598 cached. If the EXTERNAL_RELOCS and INTERNAL_RELOCS arguments are
2599 not NULL, they are used as buffers to read into. They are known to
2600 be large enough. If the INTERNAL_RELOCS relocs argument is NULL,
2601 the return value is allocated using either malloc or bfd_alloc,
2602 according to the KEEP_MEMORY argument. If O has two relocation
2603 sections (both REL and RELA relocations), then the REL_HDR
2604 relocations will appear first in INTERNAL_RELOCS, followed by the
2605 REL_HDR2 relocations. */
2606
2607 Elf_Internal_Rela *
2608 NAME(_bfd_elf,link_read_relocs) (abfd, o, external_relocs, internal_relocs,
2609 keep_memory)
2610 bfd *abfd;
2611 asection *o;
2612 PTR external_relocs;
2613 Elf_Internal_Rela *internal_relocs;
2614 bfd_boolean keep_memory;
2615 {
2616 Elf_Internal_Shdr *rel_hdr;
2617 PTR alloc1 = NULL;
2618 Elf_Internal_Rela *alloc2 = NULL;
2619 struct elf_backend_data *bed = get_elf_backend_data (abfd);
2620
2621 if (elf_section_data (o)->relocs != NULL)
2622 return elf_section_data (o)->relocs;
2623
2624 if (o->reloc_count == 0)
2625 return NULL;
2626
2627 rel_hdr = &elf_section_data (o)->rel_hdr;
2628
2629 if (internal_relocs == NULL)
2630 {
2631 bfd_size_type size;
2632
2633 size = o->reloc_count;
2634 size *= bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rela);
2635 if (keep_memory)
2636 internal_relocs = (Elf_Internal_Rela *) bfd_alloc (abfd, size);
2637 else
2638 internal_relocs = alloc2 = (Elf_Internal_Rela *) bfd_malloc (size);
2639 if (internal_relocs == NULL)
2640 goto error_return;
2641 }
2642
2643 if (external_relocs == NULL)
2644 {
2645 bfd_size_type size = rel_hdr->sh_size;
2646
2647 if (elf_section_data (o)->rel_hdr2)
2648 size += elf_section_data (o)->rel_hdr2->sh_size;
2649 alloc1 = (PTR) bfd_malloc (size);
2650 if (alloc1 == NULL)
2651 goto error_return;
2652 external_relocs = alloc1;
2653 }
2654
2655 if (!elf_link_read_relocs_from_section (abfd, rel_hdr,
2656 external_relocs,
2657 internal_relocs))
2658 goto error_return;
2659 if (!elf_link_read_relocs_from_section
2660 (abfd,
2661 elf_section_data (o)->rel_hdr2,
2662 ((bfd_byte *) external_relocs) + rel_hdr->sh_size,
2663 internal_relocs + (NUM_SHDR_ENTRIES (rel_hdr)
2664 * bed->s->int_rels_per_ext_rel)))
2665 goto error_return;
2666
2667 /* Cache the results for next time, if we can. */
2668 if (keep_memory)
2669 elf_section_data (o)->relocs = internal_relocs;
2670
2671 if (alloc1 != NULL)
2672 free (alloc1);
2673
2674 /* Don't free alloc2, since if it was allocated we are passing it
2675 back (under the name of internal_relocs). */
2676
2677 return internal_relocs;
2678
2679 error_return:
2680 if (alloc1 != NULL)
2681 free (alloc1);
2682 if (alloc2 != NULL)
2683 free (alloc2);
2684 return NULL;
2685 }
2686 \f
2687 /* Record an assignment to a symbol made by a linker script. We need
2688 this in case some dynamic object refers to this symbol. */
2689
2690 bfd_boolean
2691 NAME(bfd_elf,record_link_assignment) (output_bfd, info, name, provide)
2692 bfd *output_bfd ATTRIBUTE_UNUSED;
2693 struct bfd_link_info *info;
2694 const char *name;
2695 bfd_boolean provide;
2696 {
2697 struct elf_link_hash_entry *h;
2698
2699 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2700 return TRUE;
2701
2702 h = elf_link_hash_lookup (elf_hash_table (info), name, TRUE, TRUE, FALSE);
2703 if (h == NULL)
2704 return FALSE;
2705
2706 if (h->root.type == bfd_link_hash_new)
2707 h->elf_link_hash_flags &= ~ELF_LINK_NON_ELF;
2708
2709 /* If this symbol is being provided by the linker script, and it is
2710 currently defined by a dynamic object, but not by a regular
2711 object, then mark it as undefined so that the generic linker will
2712 force the correct value. */
2713 if (provide
2714 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2715 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2716 h->root.type = bfd_link_hash_undefined;
2717
2718 /* If this symbol is not being provided by the linker script, and it is
2719 currently defined by a dynamic object, but not by a regular object,
2720 then clear out any version information because the symbol will not be
2721 associated with the dynamic object any more. */
2722 if (!provide
2723 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2724 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2725 h->verinfo.verdef = NULL;
2726
2727 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2728
2729 if (((h->elf_link_hash_flags & (ELF_LINK_HASH_DEF_DYNAMIC
2730 | ELF_LINK_HASH_REF_DYNAMIC)) != 0
2731 || info->shared)
2732 && h->dynindx == -1)
2733 {
2734 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2735 return FALSE;
2736
2737 /* If this is a weak defined symbol, and we know a corresponding
2738 real symbol from the same dynamic object, make sure the real
2739 symbol is also made into a dynamic symbol. */
2740 if (h->weakdef != NULL
2741 && h->weakdef->dynindx == -1)
2742 {
2743 if (! _bfd_elf_link_record_dynamic_symbol (info, h->weakdef))
2744 return FALSE;
2745 }
2746 }
2747
2748 return TRUE;
2749 }
2750 \f
2751 /* This structure is used to pass information to
2752 elf_link_assign_sym_version. */
2753
2754 struct elf_assign_sym_version_info
2755 {
2756 /* Output BFD. */
2757 bfd *output_bfd;
2758 /* General link information. */
2759 struct bfd_link_info *info;
2760 /* Version tree. */
2761 struct bfd_elf_version_tree *verdefs;
2762 /* Whether we had a failure. */
2763 bfd_boolean failed;
2764 };
2765
2766 /* This structure is used to pass information to
2767 elf_link_find_version_dependencies. */
2768
2769 struct elf_find_verdep_info
2770 {
2771 /* Output BFD. */
2772 bfd *output_bfd;
2773 /* General link information. */
2774 struct bfd_link_info *info;
2775 /* The number of dependencies. */
2776 unsigned int vers;
2777 /* Whether we had a failure. */
2778 bfd_boolean failed;
2779 };
2780
2781 /* Array used to determine the number of hash table buckets to use
2782 based on the number of symbols there are. If there are fewer than
2783 3 symbols we use 1 bucket, fewer than 17 symbols we use 3 buckets,
2784 fewer than 37 we use 17 buckets, and so forth. We never use more
2785 than 32771 buckets. */
2786
2787 static const size_t elf_buckets[] =
2788 {
2789 1, 3, 17, 37, 67, 97, 131, 197, 263, 521, 1031, 2053, 4099, 8209,
2790 16411, 32771, 0
2791 };
2792
2793 /* Compute bucket count for hashing table. We do not use a static set
2794 of possible tables sizes anymore. Instead we determine for all
2795 possible reasonable sizes of the table the outcome (i.e., the
2796 number of collisions etc) and choose the best solution. The
2797 weighting functions are not too simple to allow the table to grow
2798 without bounds. Instead one of the weighting factors is the size.
2799 Therefore the result is always a good payoff between few collisions
2800 (= short chain lengths) and table size. */
2801 static size_t
2802 compute_bucket_count (info)
2803 struct bfd_link_info *info;
2804 {
2805 size_t dynsymcount = elf_hash_table (info)->dynsymcount;
2806 size_t best_size = 0;
2807 unsigned long int *hashcodes;
2808 unsigned long int *hashcodesp;
2809 unsigned long int i;
2810 bfd_size_type amt;
2811
2812 /* Compute the hash values for all exported symbols. At the same
2813 time store the values in an array so that we could use them for
2814 optimizations. */
2815 amt = dynsymcount;
2816 amt *= sizeof (unsigned long int);
2817 hashcodes = (unsigned long int *) bfd_malloc (amt);
2818 if (hashcodes == NULL)
2819 return 0;
2820 hashcodesp = hashcodes;
2821
2822 /* Put all hash values in HASHCODES. */
2823 elf_link_hash_traverse (elf_hash_table (info),
2824 elf_collect_hash_codes, &hashcodesp);
2825
2826 /* We have a problem here. The following code to optimize the table
2827 size requires an integer type with more the 32 bits. If
2828 BFD_HOST_U_64_BIT is set we know about such a type. */
2829 #ifdef BFD_HOST_U_64_BIT
2830 if (info->optimize)
2831 {
2832 unsigned long int nsyms = hashcodesp - hashcodes;
2833 size_t minsize;
2834 size_t maxsize;
2835 BFD_HOST_U_64_BIT best_chlen = ~((BFD_HOST_U_64_BIT) 0);
2836 unsigned long int *counts ;
2837
2838 /* Possible optimization parameters: if we have NSYMS symbols we say
2839 that the hashing table must at least have NSYMS/4 and at most
2840 2*NSYMS buckets. */
2841 minsize = nsyms / 4;
2842 if (minsize == 0)
2843 minsize = 1;
2844 best_size = maxsize = nsyms * 2;
2845
2846 /* Create array where we count the collisions in. We must use bfd_malloc
2847 since the size could be large. */
2848 amt = maxsize;
2849 amt *= sizeof (unsigned long int);
2850 counts = (unsigned long int *) bfd_malloc (amt);
2851 if (counts == NULL)
2852 {
2853 free (hashcodes);
2854 return 0;
2855 }
2856
2857 /* Compute the "optimal" size for the hash table. The criteria is a
2858 minimal chain length. The minor criteria is (of course) the size
2859 of the table. */
2860 for (i = minsize; i < maxsize; ++i)
2861 {
2862 /* Walk through the array of hashcodes and count the collisions. */
2863 BFD_HOST_U_64_BIT max;
2864 unsigned long int j;
2865 unsigned long int fact;
2866
2867 memset (counts, '\0', i * sizeof (unsigned long int));
2868
2869 /* Determine how often each hash bucket is used. */
2870 for (j = 0; j < nsyms; ++j)
2871 ++counts[hashcodes[j] % i];
2872
2873 /* For the weight function we need some information about the
2874 pagesize on the target. This is information need not be 100%
2875 accurate. Since this information is not available (so far) we
2876 define it here to a reasonable default value. If it is crucial
2877 to have a better value some day simply define this value. */
2878 # ifndef BFD_TARGET_PAGESIZE
2879 # define BFD_TARGET_PAGESIZE (4096)
2880 # endif
2881
2882 /* We in any case need 2 + NSYMS entries for the size values and
2883 the chains. */
2884 max = (2 + nsyms) * (ARCH_SIZE / 8);
2885
2886 # if 1
2887 /* Variant 1: optimize for short chains. We add the squares
2888 of all the chain lengths (which favous many small chain
2889 over a few long chains). */
2890 for (j = 0; j < i; ++j)
2891 max += counts[j] * counts[j];
2892
2893 /* This adds penalties for the overall size of the table. */
2894 fact = i / (BFD_TARGET_PAGESIZE / (ARCH_SIZE / 8)) + 1;
2895 max *= fact * fact;
2896 # else
2897 /* Variant 2: Optimize a lot more for small table. Here we
2898 also add squares of the size but we also add penalties for
2899 empty slots (the +1 term). */
2900 for (j = 0; j < i; ++j)
2901 max += (1 + counts[j]) * (1 + counts[j]);
2902
2903 /* The overall size of the table is considered, but not as
2904 strong as in variant 1, where it is squared. */
2905 fact = i / (BFD_TARGET_PAGESIZE / (ARCH_SIZE / 8)) + 1;
2906 max *= fact;
2907 # endif
2908
2909 /* Compare with current best results. */
2910 if (max < best_chlen)
2911 {
2912 best_chlen = max;
2913 best_size = i;
2914 }
2915 }
2916
2917 free (counts);
2918 }
2919 else
2920 #endif /* defined (BFD_HOST_U_64_BIT) */
2921 {
2922 /* This is the fallback solution if no 64bit type is available or if we
2923 are not supposed to spend much time on optimizations. We select the
2924 bucket count using a fixed set of numbers. */
2925 for (i = 0; elf_buckets[i] != 0; i++)
2926 {
2927 best_size = elf_buckets[i];
2928 if (dynsymcount < elf_buckets[i + 1])
2929 break;
2930 }
2931 }
2932
2933 /* Free the arrays we needed. */
2934 free (hashcodes);
2935
2936 return best_size;
2937 }
2938
2939 /* Set up the sizes and contents of the ELF dynamic sections. This is
2940 called by the ELF linker emulation before_allocation routine. We
2941 must set the sizes of the sections before the linker sets the
2942 addresses of the various sections. */
2943
2944 bfd_boolean
2945 NAME(bfd_elf,size_dynamic_sections) (output_bfd, soname, rpath,
2946 filter_shlib,
2947 auxiliary_filters, info, sinterpptr,
2948 verdefs)
2949 bfd *output_bfd;
2950 const char *soname;
2951 const char *rpath;
2952 const char *filter_shlib;
2953 const char * const *auxiliary_filters;
2954 struct bfd_link_info *info;
2955 asection **sinterpptr;
2956 struct bfd_elf_version_tree *verdefs;
2957 {
2958 bfd_size_type soname_indx;
2959 bfd *dynobj;
2960 struct elf_backend_data *bed;
2961 struct elf_assign_sym_version_info asvinfo;
2962
2963 *sinterpptr = NULL;
2964
2965 soname_indx = (bfd_size_type) -1;
2966
2967 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2968 return TRUE;
2969
2970 if (! is_elf_hash_table (info))
2971 return TRUE;
2972
2973 /* Any syms created from now on start with -1 in
2974 got.refcount/offset and plt.refcount/offset. */
2975 elf_hash_table (info)->init_refcount = elf_hash_table (info)->init_offset;
2976
2977 /* The backend may have to create some sections regardless of whether
2978 we're dynamic or not. */
2979 bed = get_elf_backend_data (output_bfd);
2980 if (bed->elf_backend_always_size_sections
2981 && ! (*bed->elf_backend_always_size_sections) (output_bfd, info))
2982 return FALSE;
2983
2984 dynobj = elf_hash_table (info)->dynobj;
2985
2986 /* If there were no dynamic objects in the link, there is nothing to
2987 do here. */
2988 if (dynobj == NULL)
2989 return TRUE;
2990
2991 if (! _bfd_elf_maybe_strip_eh_frame_hdr (info))
2992 return FALSE;
2993
2994 if (elf_hash_table (info)->dynamic_sections_created)
2995 {
2996 struct elf_info_failed eif;
2997 struct elf_link_hash_entry *h;
2998 asection *dynstr;
2999 struct bfd_elf_version_tree *t;
3000 struct bfd_elf_version_expr *d;
3001 bfd_boolean all_defined;
3002
3003 *sinterpptr = bfd_get_section_by_name (dynobj, ".interp");
3004 BFD_ASSERT (*sinterpptr != NULL || info->shared);
3005
3006 if (soname != NULL)
3007 {
3008 soname_indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3009 soname, TRUE);
3010 if (soname_indx == (bfd_size_type) -1
3011 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_SONAME,
3012 soname_indx))
3013 return FALSE;
3014 }
3015
3016 if (info->symbolic)
3017 {
3018 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_SYMBOLIC,
3019 (bfd_vma) 0))
3020 return FALSE;
3021 info->flags |= DF_SYMBOLIC;
3022 }
3023
3024 if (rpath != NULL)
3025 {
3026 bfd_size_type indx;
3027
3028 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr, rpath,
3029 TRUE);
3030 if (info->new_dtags)
3031 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr, indx);
3032 if (indx == (bfd_size_type) -1
3033 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_RPATH, indx)
3034 || (info->new_dtags
3035 && ! elf_add_dynamic_entry (info, (bfd_vma) DT_RUNPATH,
3036 indx)))
3037 return FALSE;
3038 }
3039
3040 if (filter_shlib != NULL)
3041 {
3042 bfd_size_type indx;
3043
3044 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3045 filter_shlib, TRUE);
3046 if (indx == (bfd_size_type) -1
3047 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_FILTER, indx))
3048 return FALSE;
3049 }
3050
3051 if (auxiliary_filters != NULL)
3052 {
3053 const char * const *p;
3054
3055 for (p = auxiliary_filters; *p != NULL; p++)
3056 {
3057 bfd_size_type indx;
3058
3059 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3060 *p, TRUE);
3061 if (indx == (bfd_size_type) -1
3062 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_AUXILIARY,
3063 indx))
3064 return FALSE;
3065 }
3066 }
3067
3068 eif.info = info;
3069 eif.verdefs = verdefs;
3070 eif.failed = FALSE;
3071
3072 /* If we are supposed to export all symbols into the dynamic symbol
3073 table (this is not the normal case), then do so. */
3074 if (info->export_dynamic)
3075 {
3076 elf_link_hash_traverse (elf_hash_table (info), elf_export_symbol,
3077 (PTR) &eif);
3078 if (eif.failed)
3079 return FALSE;
3080 }
3081
3082 /* Make all global versions with definiton. */
3083 for (t = verdefs; t != NULL; t = t->next)
3084 for (d = t->globals; d != NULL; d = d->next)
3085 if (!d->symver && strchr (d->pattern, '*') == NULL)
3086 {
3087 const char *verstr, *name;
3088 size_t namelen, verlen, newlen;
3089 char *newname, *p;
3090 struct elf_link_hash_entry *newh;
3091
3092 name = d->pattern;
3093 namelen = strlen (name);
3094 verstr = t->name;
3095 verlen = strlen (verstr);
3096 newlen = namelen + verlen + 3;
3097
3098 newname = (char *) bfd_malloc ((bfd_size_type) newlen);
3099 if (newname == NULL)
3100 return FALSE;
3101 memcpy (newname, name, namelen);
3102
3103 /* Check the hidden versioned definition. */
3104 p = newname + namelen;
3105 *p++ = ELF_VER_CHR;
3106 memcpy (p, verstr, verlen + 1);
3107 newh = elf_link_hash_lookup (elf_hash_table (info),
3108 newname, FALSE, FALSE,
3109 FALSE);
3110 if (newh == NULL
3111 || (newh->root.type != bfd_link_hash_defined
3112 && newh->root.type != bfd_link_hash_defweak))
3113 {
3114 /* Check the default versioned definition. */
3115 *p++ = ELF_VER_CHR;
3116 memcpy (p, verstr, verlen + 1);
3117 newh = elf_link_hash_lookup (elf_hash_table (info),
3118 newname, FALSE, FALSE,
3119 FALSE);
3120 }
3121 free (newname);
3122
3123 /* Mark this version if there is a definition and it is
3124 not defined in a shared object. */
3125 if (newh != NULL
3126 && ((newh->elf_link_hash_flags
3127 & ELF_LINK_HASH_DEF_DYNAMIC) == 0)
3128 && (newh->root.type == bfd_link_hash_defined
3129 || newh->root.type == bfd_link_hash_defweak))
3130 d->symver = 1;
3131 }
3132
3133 /* Attach all the symbols to their version information. */
3134 asvinfo.output_bfd = output_bfd;
3135 asvinfo.info = info;
3136 asvinfo.verdefs = verdefs;
3137 asvinfo.failed = FALSE;
3138
3139 elf_link_hash_traverse (elf_hash_table (info),
3140 elf_link_assign_sym_version,
3141 (PTR) &asvinfo);
3142 if (asvinfo.failed)
3143 return FALSE;
3144
3145 if (!info->allow_undefined_version)
3146 {
3147 /* Check if all global versions have a definiton. */
3148 all_defined = TRUE;
3149 for (t = verdefs; t != NULL; t = t->next)
3150 for (d = t->globals; d != NULL; d = d->next)
3151 if (!d->symver && !d->script
3152 && strchr (d->pattern, '*') == NULL)
3153 {
3154 (*_bfd_error_handler)
3155 (_("%s: undefined version: %s"),
3156 d->pattern, t->name);
3157 all_defined = FALSE;
3158 }
3159
3160 if (!all_defined)
3161 {
3162 bfd_set_error (bfd_error_bad_value);
3163 return FALSE;
3164 }
3165 }
3166
3167 /* Find all symbols which were defined in a dynamic object and make
3168 the backend pick a reasonable value for them. */
3169 elf_link_hash_traverse (elf_hash_table (info),
3170 elf_adjust_dynamic_symbol,
3171 (PTR) &eif);
3172 if (eif.failed)
3173 return FALSE;
3174
3175 /* Add some entries to the .dynamic section. We fill in some of the
3176 values later, in elf_bfd_final_link, but we must add the entries
3177 now so that we know the final size of the .dynamic section. */
3178
3179 /* If there are initialization and/or finalization functions to
3180 call then add the corresponding DT_INIT/DT_FINI entries. */
3181 h = (info->init_function
3182 ? elf_link_hash_lookup (elf_hash_table (info),
3183 info->init_function, FALSE,
3184 FALSE, FALSE)
3185 : NULL);
3186 if (h != NULL
3187 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
3188 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
3189 {
3190 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_INIT, (bfd_vma) 0))
3191 return FALSE;
3192 }
3193 h = (info->fini_function
3194 ? elf_link_hash_lookup (elf_hash_table (info),
3195 info->fini_function, FALSE,
3196 FALSE, FALSE)
3197 : NULL);
3198 if (h != NULL
3199 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
3200 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
3201 {
3202 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_FINI, (bfd_vma) 0))
3203 return FALSE;
3204 }
3205
3206 if (bfd_get_section_by_name (output_bfd, ".preinit_array") != NULL)
3207 {
3208 /* DT_PREINIT_ARRAY is not allowed in shared library. */
3209 if (info->shared)
3210 {
3211 bfd *sub;
3212 asection *o;
3213
3214 for (sub = info->input_bfds; sub != NULL;
3215 sub = sub->link_next)
3216 for (o = sub->sections; o != NULL; o = o->next)
3217 if (elf_section_data (o)->this_hdr.sh_type
3218 == SHT_PREINIT_ARRAY)
3219 {
3220 (*_bfd_error_handler)
3221 (_("%s: .preinit_array section is not allowed in DSO"),
3222 bfd_archive_filename (sub));
3223 break;
3224 }
3225
3226 bfd_set_error (bfd_error_nonrepresentable_section);
3227 return FALSE;
3228 }
3229
3230 if (!elf_add_dynamic_entry (info, (bfd_vma) DT_PREINIT_ARRAY,
3231 (bfd_vma) 0)
3232 || !elf_add_dynamic_entry (info, (bfd_vma) DT_PREINIT_ARRAYSZ,
3233 (bfd_vma) 0))
3234 return FALSE;
3235 }
3236 if (bfd_get_section_by_name (output_bfd, ".init_array") != NULL)
3237 {
3238 if (!elf_add_dynamic_entry (info, (bfd_vma) DT_INIT_ARRAY,
3239 (bfd_vma) 0)
3240 || !elf_add_dynamic_entry (info, (bfd_vma) DT_INIT_ARRAYSZ,
3241 (bfd_vma) 0))
3242 return FALSE;
3243 }
3244 if (bfd_get_section_by_name (output_bfd, ".fini_array") != NULL)
3245 {
3246 if (!elf_add_dynamic_entry (info, (bfd_vma) DT_FINI_ARRAY,
3247 (bfd_vma) 0)
3248 || !elf_add_dynamic_entry (info, (bfd_vma) DT_FINI_ARRAYSZ,
3249 (bfd_vma) 0))
3250 return FALSE;
3251 }
3252
3253 dynstr = bfd_get_section_by_name (dynobj, ".dynstr");
3254 /* If .dynstr is excluded from the link, we don't want any of
3255 these tags. Strictly, we should be checking each section
3256 individually; This quick check covers for the case where
3257 someone does a /DISCARD/ : { *(*) }. */
3258 if (dynstr != NULL && dynstr->output_section != bfd_abs_section_ptr)
3259 {
3260 bfd_size_type strsize;
3261
3262 strsize = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
3263 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_HASH, (bfd_vma) 0)
3264 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_STRTAB, (bfd_vma) 0)
3265 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_SYMTAB, (bfd_vma) 0)
3266 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_STRSZ, strsize)
3267 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_SYMENT,
3268 (bfd_vma) sizeof (Elf_External_Sym)))
3269 return FALSE;
3270 }
3271 }
3272
3273 /* The backend must work out the sizes of all the other dynamic
3274 sections. */
3275 if (bed->elf_backend_size_dynamic_sections
3276 && ! (*bed->elf_backend_size_dynamic_sections) (output_bfd, info))
3277 return FALSE;
3278
3279 if (elf_hash_table (info)->dynamic_sections_created)
3280 {
3281 bfd_size_type dynsymcount;
3282 asection *s;
3283 size_t bucketcount = 0;
3284 size_t hash_entry_size;
3285 unsigned int dtagcount;
3286
3287 /* Set up the version definition section. */
3288 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
3289 BFD_ASSERT (s != NULL);
3290
3291 /* We may have created additional version definitions if we are
3292 just linking a regular application. */
3293 verdefs = asvinfo.verdefs;
3294
3295 /* Skip anonymous version tag. */
3296 if (verdefs != NULL && verdefs->vernum == 0)
3297 verdefs = verdefs->next;
3298
3299 if (verdefs == NULL)
3300 _bfd_strip_section_from_output (info, s);
3301 else
3302 {
3303 unsigned int cdefs;
3304 bfd_size_type size;
3305 struct bfd_elf_version_tree *t;
3306 bfd_byte *p;
3307 Elf_Internal_Verdef def;
3308 Elf_Internal_Verdaux defaux;
3309
3310 cdefs = 0;
3311 size = 0;
3312
3313 /* Make space for the base version. */
3314 size += sizeof (Elf_External_Verdef);
3315 size += sizeof (Elf_External_Verdaux);
3316 ++cdefs;
3317
3318 for (t = verdefs; t != NULL; t = t->next)
3319 {
3320 struct bfd_elf_version_deps *n;
3321
3322 size += sizeof (Elf_External_Verdef);
3323 size += sizeof (Elf_External_Verdaux);
3324 ++cdefs;
3325
3326 for (n = t->deps; n != NULL; n = n->next)
3327 size += sizeof (Elf_External_Verdaux);
3328 }
3329
3330 s->_raw_size = size;
3331 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3332 if (s->contents == NULL && s->_raw_size != 0)
3333 return FALSE;
3334
3335 /* Fill in the version definition section. */
3336
3337 p = s->contents;
3338
3339 def.vd_version = VER_DEF_CURRENT;
3340 def.vd_flags = VER_FLG_BASE;
3341 def.vd_ndx = 1;
3342 def.vd_cnt = 1;
3343 def.vd_aux = sizeof (Elf_External_Verdef);
3344 def.vd_next = (sizeof (Elf_External_Verdef)
3345 + sizeof (Elf_External_Verdaux));
3346
3347 if (soname_indx != (bfd_size_type) -1)
3348 {
3349 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
3350 soname_indx);
3351 def.vd_hash = bfd_elf_hash (soname);
3352 defaux.vda_name = soname_indx;
3353 }
3354 else
3355 {
3356 const char *name;
3357 bfd_size_type indx;
3358
3359 name = basename (output_bfd->filename);
3360 def.vd_hash = bfd_elf_hash (name);
3361 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3362 name, FALSE);
3363 if (indx == (bfd_size_type) -1)
3364 return FALSE;
3365 defaux.vda_name = indx;
3366 }
3367 defaux.vda_next = 0;
3368
3369 _bfd_elf_swap_verdef_out (output_bfd, &def,
3370 (Elf_External_Verdef *) p);
3371 p += sizeof (Elf_External_Verdef);
3372 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3373 (Elf_External_Verdaux *) p);
3374 p += sizeof (Elf_External_Verdaux);
3375
3376 for (t = verdefs; t != NULL; t = t->next)
3377 {
3378 unsigned int cdeps;
3379 struct bfd_elf_version_deps *n;
3380 struct elf_link_hash_entry *h;
3381 struct bfd_link_hash_entry *bh;
3382
3383 cdeps = 0;
3384 for (n = t->deps; n != NULL; n = n->next)
3385 ++cdeps;
3386
3387 /* Add a symbol representing this version. */
3388 bh = NULL;
3389 if (! (_bfd_generic_link_add_one_symbol
3390 (info, dynobj, t->name, BSF_GLOBAL, bfd_abs_section_ptr,
3391 (bfd_vma) 0, (const char *) NULL, FALSE,
3392 get_elf_backend_data (dynobj)->collect, &bh)))
3393 return FALSE;
3394 h = (struct elf_link_hash_entry *) bh;
3395 h->elf_link_hash_flags &= ~ ELF_LINK_NON_ELF;
3396 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3397 h->type = STT_OBJECT;
3398 h->verinfo.vertree = t;
3399
3400 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
3401 return FALSE;
3402
3403 def.vd_version = VER_DEF_CURRENT;
3404 def.vd_flags = 0;
3405 if (t->globals == NULL && t->locals == NULL && ! t->used)
3406 def.vd_flags |= VER_FLG_WEAK;
3407 def.vd_ndx = t->vernum + 1;
3408 def.vd_cnt = cdeps + 1;
3409 def.vd_hash = bfd_elf_hash (t->name);
3410 def.vd_aux = sizeof (Elf_External_Verdef);
3411 if (t->next != NULL)
3412 def.vd_next = (sizeof (Elf_External_Verdef)
3413 + (cdeps + 1) * sizeof (Elf_External_Verdaux));
3414 else
3415 def.vd_next = 0;
3416
3417 _bfd_elf_swap_verdef_out (output_bfd, &def,
3418 (Elf_External_Verdef *) p);
3419 p += sizeof (Elf_External_Verdef);
3420
3421 defaux.vda_name = h->dynstr_index;
3422 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
3423 h->dynstr_index);
3424 if (t->deps == NULL)
3425 defaux.vda_next = 0;
3426 else
3427 defaux.vda_next = sizeof (Elf_External_Verdaux);
3428 t->name_indx = defaux.vda_name;
3429
3430 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3431 (Elf_External_Verdaux *) p);
3432 p += sizeof (Elf_External_Verdaux);
3433
3434 for (n = t->deps; n != NULL; n = n->next)
3435 {
3436 if (n->version_needed == NULL)
3437 {
3438 /* This can happen if there was an error in the
3439 version script. */
3440 defaux.vda_name = 0;
3441 }
3442 else
3443 {
3444 defaux.vda_name = n->version_needed->name_indx;
3445 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
3446 defaux.vda_name);
3447 }
3448 if (n->next == NULL)
3449 defaux.vda_next = 0;
3450 else
3451 defaux.vda_next = sizeof (Elf_External_Verdaux);
3452
3453 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3454 (Elf_External_Verdaux *) p);
3455 p += sizeof (Elf_External_Verdaux);
3456 }
3457 }
3458
3459 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_VERDEF, (bfd_vma) 0)
3460 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_VERDEFNUM,
3461 (bfd_vma) cdefs))
3462 return FALSE;
3463
3464 elf_tdata (output_bfd)->cverdefs = cdefs;
3465 }
3466
3467 if ((info->new_dtags && info->flags) || (info->flags & DF_STATIC_TLS))
3468 {
3469 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_FLAGS, info->flags))
3470 return FALSE;
3471 }
3472
3473 if (info->flags_1)
3474 {
3475 if (! info->shared)
3476 info->flags_1 &= ~ (DF_1_INITFIRST
3477 | DF_1_NODELETE
3478 | DF_1_NOOPEN);
3479 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_FLAGS_1,
3480 info->flags_1))
3481 return FALSE;
3482 }
3483
3484 /* Work out the size of the version reference section. */
3485
3486 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
3487 BFD_ASSERT (s != NULL);
3488 {
3489 struct elf_find_verdep_info sinfo;
3490
3491 sinfo.output_bfd = output_bfd;
3492 sinfo.info = info;
3493 sinfo.vers = elf_tdata (output_bfd)->cverdefs;
3494 if (sinfo.vers == 0)
3495 sinfo.vers = 1;
3496 sinfo.failed = FALSE;
3497
3498 elf_link_hash_traverse (elf_hash_table (info),
3499 elf_link_find_version_dependencies,
3500 (PTR) &sinfo);
3501
3502 if (elf_tdata (output_bfd)->verref == NULL)
3503 _bfd_strip_section_from_output (info, s);
3504 else
3505 {
3506 Elf_Internal_Verneed *t;
3507 unsigned int size;
3508 unsigned int crefs;
3509 bfd_byte *p;
3510
3511 /* Build the version definition section. */
3512 size = 0;
3513 crefs = 0;
3514 for (t = elf_tdata (output_bfd)->verref;
3515 t != NULL;
3516 t = t->vn_nextref)
3517 {
3518 Elf_Internal_Vernaux *a;
3519
3520 size += sizeof (Elf_External_Verneed);
3521 ++crefs;
3522 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3523 size += sizeof (Elf_External_Vernaux);
3524 }
3525
3526 s->_raw_size = size;
3527 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3528 if (s->contents == NULL)
3529 return FALSE;
3530
3531 p = s->contents;
3532 for (t = elf_tdata (output_bfd)->verref;
3533 t != NULL;
3534 t = t->vn_nextref)
3535 {
3536 unsigned int caux;
3537 Elf_Internal_Vernaux *a;
3538 bfd_size_type indx;
3539
3540 caux = 0;
3541 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3542 ++caux;
3543
3544 t->vn_version = VER_NEED_CURRENT;
3545 t->vn_cnt = caux;
3546 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3547 elf_dt_name (t->vn_bfd) != NULL
3548 ? elf_dt_name (t->vn_bfd)
3549 : basename (t->vn_bfd->filename),
3550 FALSE);
3551 if (indx == (bfd_size_type) -1)
3552 return FALSE;
3553 t->vn_file = indx;
3554 t->vn_aux = sizeof (Elf_External_Verneed);
3555 if (t->vn_nextref == NULL)
3556 t->vn_next = 0;
3557 else
3558 t->vn_next = (sizeof (Elf_External_Verneed)
3559 + caux * sizeof (Elf_External_Vernaux));
3560
3561 _bfd_elf_swap_verneed_out (output_bfd, t,
3562 (Elf_External_Verneed *) p);
3563 p += sizeof (Elf_External_Verneed);
3564
3565 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3566 {
3567 a->vna_hash = bfd_elf_hash (a->vna_nodename);
3568 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3569 a->vna_nodename, FALSE);
3570 if (indx == (bfd_size_type) -1)
3571 return FALSE;
3572 a->vna_name = indx;
3573 if (a->vna_nextptr == NULL)
3574 a->vna_next = 0;
3575 else
3576 a->vna_next = sizeof (Elf_External_Vernaux);
3577
3578 _bfd_elf_swap_vernaux_out (output_bfd, a,
3579 (Elf_External_Vernaux *) p);
3580 p += sizeof (Elf_External_Vernaux);
3581 }
3582 }
3583
3584 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_VERNEED,
3585 (bfd_vma) 0)
3586 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_VERNEEDNUM,
3587 (bfd_vma) crefs))
3588 return FALSE;
3589
3590 elf_tdata (output_bfd)->cverrefs = crefs;
3591 }
3592 }
3593
3594 /* Assign dynsym indicies. In a shared library we generate a
3595 section symbol for each output section, which come first.
3596 Next come all of the back-end allocated local dynamic syms,
3597 followed by the rest of the global symbols. */
3598
3599 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info);
3600
3601 /* Work out the size of the symbol version section. */
3602 s = bfd_get_section_by_name (dynobj, ".gnu.version");
3603 BFD_ASSERT (s != NULL);
3604 if (dynsymcount == 0
3605 || (verdefs == NULL && elf_tdata (output_bfd)->verref == NULL))
3606 {
3607 _bfd_strip_section_from_output (info, s);
3608 /* The DYNSYMCOUNT might have changed if we were going to
3609 output a dynamic symbol table entry for S. */
3610 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info);
3611 }
3612 else
3613 {
3614 s->_raw_size = dynsymcount * sizeof (Elf_External_Versym);
3615 s->contents = (bfd_byte *) bfd_zalloc (output_bfd, s->_raw_size);
3616 if (s->contents == NULL)
3617 return FALSE;
3618
3619 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_VERSYM, (bfd_vma) 0))
3620 return FALSE;
3621 }
3622
3623 /* Set the size of the .dynsym and .hash sections. We counted
3624 the number of dynamic symbols in elf_link_add_object_symbols.
3625 We will build the contents of .dynsym and .hash when we build
3626 the final symbol table, because until then we do not know the
3627 correct value to give the symbols. We built the .dynstr
3628 section as we went along in elf_link_add_object_symbols. */
3629 s = bfd_get_section_by_name (dynobj, ".dynsym");
3630 BFD_ASSERT (s != NULL);
3631 s->_raw_size = dynsymcount * sizeof (Elf_External_Sym);
3632 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3633 if (s->contents == NULL && s->_raw_size != 0)
3634 return FALSE;
3635
3636 if (dynsymcount != 0)
3637 {
3638 Elf_Internal_Sym isym;
3639
3640 /* The first entry in .dynsym is a dummy symbol. */
3641 isym.st_value = 0;
3642 isym.st_size = 0;
3643 isym.st_name = 0;
3644 isym.st_info = 0;
3645 isym.st_other = 0;
3646 isym.st_shndx = 0;
3647 elf_swap_symbol_out (output_bfd, &isym, (PTR) s->contents, (PTR) 0);
3648 }
3649
3650 /* Compute the size of the hashing table. As a side effect this
3651 computes the hash values for all the names we export. */
3652 bucketcount = compute_bucket_count (info);
3653
3654 s = bfd_get_section_by_name (dynobj, ".hash");
3655 BFD_ASSERT (s != NULL);
3656 hash_entry_size = elf_section_data (s)->this_hdr.sh_entsize;
3657 s->_raw_size = ((2 + bucketcount + dynsymcount) * hash_entry_size);
3658 s->contents = (bfd_byte *) bfd_zalloc (output_bfd, s->_raw_size);
3659 if (s->contents == NULL)
3660 return FALSE;
3661
3662 bfd_put (8 * hash_entry_size, output_bfd, (bfd_vma) bucketcount,
3663 s->contents);
3664 bfd_put (8 * hash_entry_size, output_bfd, (bfd_vma) dynsymcount,
3665 s->contents + hash_entry_size);
3666
3667 elf_hash_table (info)->bucketcount = bucketcount;
3668
3669 s = bfd_get_section_by_name (dynobj, ".dynstr");
3670 BFD_ASSERT (s != NULL);
3671
3672 elf_finalize_dynstr (output_bfd, info);
3673
3674 s->_raw_size = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
3675
3676 for (dtagcount = 0; dtagcount <= info->spare_dynamic_tags; ++dtagcount)
3677 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_NULL, (bfd_vma) 0))
3678 return FALSE;
3679 }
3680
3681 return TRUE;
3682 }
3683 \f
3684 /* This function is used to adjust offsets into .dynstr for
3685 dynamic symbols. This is called via elf_link_hash_traverse. */
3686
3687 static bfd_boolean elf_adjust_dynstr_offsets
3688 PARAMS ((struct elf_link_hash_entry *, PTR));
3689
3690 static bfd_boolean
3691 elf_adjust_dynstr_offsets (h, data)
3692 struct elf_link_hash_entry *h;
3693 PTR data;
3694 {
3695 struct elf_strtab_hash *dynstr = (struct elf_strtab_hash *) data;
3696
3697 if (h->root.type == bfd_link_hash_warning)
3698 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3699
3700 if (h->dynindx != -1)
3701 h->dynstr_index = _bfd_elf_strtab_offset (dynstr, h->dynstr_index);
3702 return TRUE;
3703 }
3704
3705 /* Assign string offsets in .dynstr, update all structures referencing
3706 them. */
3707
3708 static bfd_boolean
3709 elf_finalize_dynstr (output_bfd, info)
3710 bfd *output_bfd;
3711 struct bfd_link_info *info;
3712 {
3713 struct elf_link_local_dynamic_entry *entry;
3714 struct elf_strtab_hash *dynstr = elf_hash_table (info)->dynstr;
3715 bfd *dynobj = elf_hash_table (info)->dynobj;
3716 asection *sdyn;
3717 bfd_size_type size;
3718 Elf_External_Dyn *dyncon, *dynconend;
3719
3720 _bfd_elf_strtab_finalize (dynstr);
3721 size = _bfd_elf_strtab_size (dynstr);
3722
3723 /* Update all .dynamic entries referencing .dynstr strings. */
3724 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
3725 BFD_ASSERT (sdyn != NULL);
3726
3727 dyncon = (Elf_External_Dyn *) sdyn->contents;
3728 dynconend = (Elf_External_Dyn *) (sdyn->contents +
3729 sdyn->_raw_size);
3730 for (; dyncon < dynconend; dyncon++)
3731 {
3732 Elf_Internal_Dyn dyn;
3733
3734 elf_swap_dyn_in (dynobj, dyncon, & dyn);
3735 switch (dyn.d_tag)
3736 {
3737 case DT_STRSZ:
3738 dyn.d_un.d_val = size;
3739 elf_swap_dyn_out (dynobj, & dyn, dyncon);
3740 break;
3741 case DT_NEEDED:
3742 case DT_SONAME:
3743 case DT_RPATH:
3744 case DT_RUNPATH:
3745 case DT_FILTER:
3746 case DT_AUXILIARY:
3747 dyn.d_un.d_val = _bfd_elf_strtab_offset (dynstr, dyn.d_un.d_val);
3748 elf_swap_dyn_out (dynobj, & dyn, dyncon);
3749 break;
3750 default:
3751 break;
3752 }
3753 }
3754
3755 /* Now update local dynamic symbols. */
3756 for (entry = elf_hash_table (info)->dynlocal; entry ; entry = entry->next)
3757 entry->isym.st_name = _bfd_elf_strtab_offset (dynstr,
3758 entry->isym.st_name);
3759
3760 /* And the rest of dynamic symbols. */
3761 elf_link_hash_traverse (elf_hash_table (info),
3762 elf_adjust_dynstr_offsets, dynstr);
3763
3764 /* Adjust version definitions. */
3765 if (elf_tdata (output_bfd)->cverdefs)
3766 {
3767 asection *s;
3768 bfd_byte *p;
3769 bfd_size_type i;
3770 Elf_Internal_Verdef def;
3771 Elf_Internal_Verdaux defaux;
3772
3773 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
3774 p = (bfd_byte *) s->contents;
3775 do
3776 {
3777 _bfd_elf_swap_verdef_in (output_bfd, (Elf_External_Verdef *) p,
3778 &def);
3779 p += sizeof (Elf_External_Verdef);
3780 for (i = 0; i < def.vd_cnt; ++i)
3781 {
3782 _bfd_elf_swap_verdaux_in (output_bfd,
3783 (Elf_External_Verdaux *) p, &defaux);
3784 defaux.vda_name = _bfd_elf_strtab_offset (dynstr,
3785 defaux.vda_name);
3786 _bfd_elf_swap_verdaux_out (output_bfd,
3787 &defaux, (Elf_External_Verdaux *) p);
3788 p += sizeof (Elf_External_Verdaux);
3789 }
3790 }
3791 while (def.vd_next);
3792 }
3793
3794 /* Adjust version references. */
3795 if (elf_tdata (output_bfd)->verref)
3796 {
3797 asection *s;
3798 bfd_byte *p;
3799 bfd_size_type i;
3800 Elf_Internal_Verneed need;
3801 Elf_Internal_Vernaux needaux;
3802
3803 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
3804 p = (bfd_byte *) s->contents;
3805 do
3806 {
3807 _bfd_elf_swap_verneed_in (output_bfd, (Elf_External_Verneed *) p,
3808 &need);
3809 need.vn_file = _bfd_elf_strtab_offset (dynstr, need.vn_file);
3810 _bfd_elf_swap_verneed_out (output_bfd, &need,
3811 (Elf_External_Verneed *) p);
3812 p += sizeof (Elf_External_Verneed);
3813 for (i = 0; i < need.vn_cnt; ++i)
3814 {
3815 _bfd_elf_swap_vernaux_in (output_bfd,
3816 (Elf_External_Vernaux *) p, &needaux);
3817 needaux.vna_name = _bfd_elf_strtab_offset (dynstr,
3818 needaux.vna_name);
3819 _bfd_elf_swap_vernaux_out (output_bfd,
3820 &needaux,
3821 (Elf_External_Vernaux *) p);
3822 p += sizeof (Elf_External_Vernaux);
3823 }
3824 }
3825 while (need.vn_next);
3826 }
3827
3828 return TRUE;
3829 }
3830
3831 /* Fix up the flags for a symbol. This handles various cases which
3832 can only be fixed after all the input files are seen. This is
3833 currently called by both adjust_dynamic_symbol and
3834 assign_sym_version, which is unnecessary but perhaps more robust in
3835 the face of future changes. */
3836
3837 static bfd_boolean
3838 elf_fix_symbol_flags (h, eif)
3839 struct elf_link_hash_entry *h;
3840 struct elf_info_failed *eif;
3841 {
3842 /* If this symbol was mentioned in a non-ELF file, try to set
3843 DEF_REGULAR and REF_REGULAR correctly. This is the only way to
3844 permit a non-ELF file to correctly refer to a symbol defined in
3845 an ELF dynamic object. */
3846 if ((h->elf_link_hash_flags & ELF_LINK_NON_ELF) != 0)
3847 {
3848 while (h->root.type == bfd_link_hash_indirect)
3849 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3850
3851 if (h->root.type != bfd_link_hash_defined
3852 && h->root.type != bfd_link_hash_defweak)
3853 h->elf_link_hash_flags |= (ELF_LINK_HASH_REF_REGULAR
3854 | ELF_LINK_HASH_REF_REGULAR_NONWEAK);
3855 else
3856 {
3857 if (h->root.u.def.section->owner != NULL
3858 && (bfd_get_flavour (h->root.u.def.section->owner)
3859 == bfd_target_elf_flavour))
3860 h->elf_link_hash_flags |= (ELF_LINK_HASH_REF_REGULAR
3861 | ELF_LINK_HASH_REF_REGULAR_NONWEAK);
3862 else
3863 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3864 }
3865
3866 if (h->dynindx == -1
3867 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3868 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
3869 {
3870 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
3871 {
3872 eif->failed = TRUE;
3873 return FALSE;
3874 }
3875 }
3876 }
3877 else
3878 {
3879 /* Unfortunately, ELF_LINK_NON_ELF is only correct if the symbol
3880 was first seen in a non-ELF file. Fortunately, if the symbol
3881 was first seen in an ELF file, we're probably OK unless the
3882 symbol was defined in a non-ELF file. Catch that case here.
3883 FIXME: We're still in trouble if the symbol was first seen in
3884 a dynamic object, and then later in a non-ELF regular object. */
3885 if ((h->root.type == bfd_link_hash_defined
3886 || h->root.type == bfd_link_hash_defweak)
3887 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
3888 && (h->root.u.def.section->owner != NULL
3889 ? (bfd_get_flavour (h->root.u.def.section->owner)
3890 != bfd_target_elf_flavour)
3891 : (bfd_is_abs_section (h->root.u.def.section)
3892 && (h->elf_link_hash_flags
3893 & ELF_LINK_HASH_DEF_DYNAMIC) == 0)))
3894 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3895 }
3896
3897 /* If this is a final link, and the symbol was defined as a common
3898 symbol in a regular object file, and there was no definition in
3899 any dynamic object, then the linker will have allocated space for
3900 the symbol in a common section but the ELF_LINK_HASH_DEF_REGULAR
3901 flag will not have been set. */
3902 if (h->root.type == bfd_link_hash_defined
3903 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
3904 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
3905 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
3906 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
3907 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3908
3909 /* If -Bsymbolic was used (which means to bind references to global
3910 symbols to the definition within the shared object), and this
3911 symbol was defined in a regular object, then it actually doesn't
3912 need a PLT entry, and we can accomplish that by forcing it local.
3913 Likewise, if the symbol has hidden or internal visibility.
3914 FIXME: It might be that we also do not need a PLT for other
3915 non-hidden visibilities, but we would have to tell that to the
3916 backend specifically; we can't just clear PLT-related data here. */
3917 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0
3918 && eif->info->shared
3919 && is_elf_hash_table (eif->info)
3920 && (eif->info->symbolic
3921 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
3922 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN)
3923 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
3924 {
3925 struct elf_backend_data *bed;
3926 bfd_boolean force_local;
3927
3928 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
3929
3930 force_local = (ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
3931 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN);
3932 (*bed->elf_backend_hide_symbol) (eif->info, h, force_local);
3933 }
3934
3935 /* If this is a weak defined symbol in a dynamic object, and we know
3936 the real definition in the dynamic object, copy interesting flags
3937 over to the real definition. */
3938 if (h->weakdef != NULL)
3939 {
3940 struct elf_link_hash_entry *weakdef;
3941
3942 weakdef = h->weakdef;
3943 if (h->root.type == bfd_link_hash_indirect)
3944 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3945
3946 BFD_ASSERT (h->root.type == bfd_link_hash_defined
3947 || h->root.type == bfd_link_hash_defweak);
3948 BFD_ASSERT (weakdef->root.type == bfd_link_hash_defined
3949 || weakdef->root.type == bfd_link_hash_defweak);
3950 BFD_ASSERT (weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC);
3951
3952 /* If the real definition is defined by a regular object file,
3953 don't do anything special. See the longer description in
3954 elf_adjust_dynamic_symbol, below. */
3955 if ((weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
3956 h->weakdef = NULL;
3957 else
3958 {
3959 struct elf_backend_data *bed;
3960
3961 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
3962 (*bed->elf_backend_copy_indirect_symbol) (bed, weakdef, h);
3963 }
3964 }
3965
3966 return TRUE;
3967 }
3968
3969 /* Make the backend pick a good value for a dynamic symbol. This is
3970 called via elf_link_hash_traverse, and also calls itself
3971 recursively. */
3972
3973 static bfd_boolean
3974 elf_adjust_dynamic_symbol (h, data)
3975 struct elf_link_hash_entry *h;
3976 PTR data;
3977 {
3978 struct elf_info_failed *eif = (struct elf_info_failed *) data;
3979 bfd *dynobj;
3980 struct elf_backend_data *bed;
3981
3982 if (! is_elf_hash_table (eif->info))
3983 return FALSE;
3984
3985 if (h->root.type == bfd_link_hash_warning)
3986 {
3987 h->plt = elf_hash_table (eif->info)->init_offset;
3988 h->got = elf_hash_table (eif->info)->init_offset;
3989
3990 /* When warning symbols are created, they **replace** the "real"
3991 entry in the hash table, thus we never get to see the real
3992 symbol in a hash traversal. So look at it now. */
3993 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3994 }
3995
3996 /* Ignore indirect symbols. These are added by the versioning code. */
3997 if (h->root.type == bfd_link_hash_indirect)
3998 return TRUE;
3999
4000 /* Fix the symbol flags. */
4001 if (! elf_fix_symbol_flags (h, eif))
4002 return FALSE;
4003
4004 /* If this symbol does not require a PLT entry, and it is not
4005 defined by a dynamic object, or is not referenced by a regular
4006 object, ignore it. We do have to handle a weak defined symbol,
4007 even if no regular object refers to it, if we decided to add it
4008 to the dynamic symbol table. FIXME: Do we normally need to worry
4009 about symbols which are defined by one dynamic object and
4010 referenced by another one? */
4011 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) == 0
4012 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
4013 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
4014 || ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0
4015 && (h->weakdef == NULL || h->weakdef->dynindx == -1))))
4016 {
4017 h->plt = elf_hash_table (eif->info)->init_offset;
4018 return TRUE;
4019 }
4020
4021 /* If we've already adjusted this symbol, don't do it again. This
4022 can happen via a recursive call. */
4023 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
4024 return TRUE;
4025
4026 /* Don't look at this symbol again. Note that we must set this
4027 after checking the above conditions, because we may look at a
4028 symbol once, decide not to do anything, and then get called
4029 recursively later after REF_REGULAR is set below. */
4030 h->elf_link_hash_flags |= ELF_LINK_HASH_DYNAMIC_ADJUSTED;
4031
4032 /* If this is a weak definition, and we know a real definition, and
4033 the real symbol is not itself defined by a regular object file,
4034 then get a good value for the real definition. We handle the
4035 real symbol first, for the convenience of the backend routine.
4036
4037 Note that there is a confusing case here. If the real definition
4038 is defined by a regular object file, we don't get the real symbol
4039 from the dynamic object, but we do get the weak symbol. If the
4040 processor backend uses a COPY reloc, then if some routine in the
4041 dynamic object changes the real symbol, we will not see that
4042 change in the corresponding weak symbol. This is the way other
4043 ELF linkers work as well, and seems to be a result of the shared
4044 library model.
4045
4046 I will clarify this issue. Most SVR4 shared libraries define the
4047 variable _timezone and define timezone as a weak synonym. The
4048 tzset call changes _timezone. If you write
4049 extern int timezone;
4050 int _timezone = 5;
4051 int main () { tzset (); printf ("%d %d\n", timezone, _timezone); }
4052 you might expect that, since timezone is a synonym for _timezone,
4053 the same number will print both times. However, if the processor
4054 backend uses a COPY reloc, then actually timezone will be copied
4055 into your process image, and, since you define _timezone
4056 yourself, _timezone will not. Thus timezone and _timezone will
4057 wind up at different memory locations. The tzset call will set
4058 _timezone, leaving timezone unchanged. */
4059
4060 if (h->weakdef != NULL)
4061 {
4062 /* If we get to this point, we know there is an implicit
4063 reference by a regular object file via the weak symbol H.
4064 FIXME: Is this really true? What if the traversal finds
4065 H->WEAKDEF before it finds H? */
4066 h->weakdef->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
4067
4068 if (! elf_adjust_dynamic_symbol (h->weakdef, (PTR) eif))
4069 return FALSE;
4070 }
4071
4072 /* If a symbol has no type and no size and does not require a PLT
4073 entry, then we are probably about to do the wrong thing here: we
4074 are probably going to create a COPY reloc for an empty object.
4075 This case can arise when a shared object is built with assembly
4076 code, and the assembly code fails to set the symbol type. */
4077 if (h->size == 0
4078 && h->type == STT_NOTYPE
4079 && (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) == 0)
4080 (*_bfd_error_handler)
4081 (_("warning: type and size of dynamic symbol `%s' are not defined"),
4082 h->root.root.string);
4083
4084 dynobj = elf_hash_table (eif->info)->dynobj;
4085 bed = get_elf_backend_data (dynobj);
4086 if (! (*bed->elf_backend_adjust_dynamic_symbol) (eif->info, h))
4087 {
4088 eif->failed = TRUE;
4089 return FALSE;
4090 }
4091
4092 return TRUE;
4093 }
4094 \f
4095 /* This routine is used to export all defined symbols into the dynamic
4096 symbol table. It is called via elf_link_hash_traverse. */
4097
4098 static bfd_boolean
4099 elf_export_symbol (h, data)
4100 struct elf_link_hash_entry *h;
4101 PTR data;
4102 {
4103 struct elf_info_failed *eif = (struct elf_info_failed *) data;
4104
4105 /* Ignore indirect symbols. These are added by the versioning code. */
4106 if (h->root.type == bfd_link_hash_indirect)
4107 return TRUE;
4108
4109 if (h->root.type == bfd_link_hash_warning)
4110 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4111
4112 if (h->dynindx == -1
4113 && (h->elf_link_hash_flags
4114 & (ELF_LINK_HASH_DEF_REGULAR | ELF_LINK_HASH_REF_REGULAR)) != 0)
4115 {
4116 struct bfd_elf_version_tree *t;
4117 struct bfd_elf_version_expr *d;
4118
4119 for (t = eif->verdefs; t != NULL; t = t->next)
4120 {
4121 if (t->globals != NULL)
4122 {
4123 for (d = t->globals; d != NULL; d = d->next)
4124 {
4125 if ((*d->match) (d, h->root.root.string))
4126 goto doit;
4127 }
4128 }
4129
4130 if (t->locals != NULL)
4131 {
4132 for (d = t->locals ; d != NULL; d = d->next)
4133 {
4134 if ((*d->match) (d, h->root.root.string))
4135 return TRUE;
4136 }
4137 }
4138 }
4139
4140 if (!eif->verdefs)
4141 {
4142 doit:
4143 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
4144 {
4145 eif->failed = TRUE;
4146 return FALSE;
4147 }
4148 }
4149 }
4150
4151 return TRUE;
4152 }
4153 \f
4154 /* Look through the symbols which are defined in other shared
4155 libraries and referenced here. Update the list of version
4156 dependencies. This will be put into the .gnu.version_r section.
4157 This function is called via elf_link_hash_traverse. */
4158
4159 static bfd_boolean
4160 elf_link_find_version_dependencies (h, data)
4161 struct elf_link_hash_entry *h;
4162 PTR data;
4163 {
4164 struct elf_find_verdep_info *rinfo = (struct elf_find_verdep_info *) data;
4165 Elf_Internal_Verneed *t;
4166 Elf_Internal_Vernaux *a;
4167 bfd_size_type amt;
4168
4169 if (h->root.type == bfd_link_hash_warning)
4170 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4171
4172 /* We only care about symbols defined in shared objects with version
4173 information. */
4174 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
4175 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
4176 || h->dynindx == -1
4177 || h->verinfo.verdef == NULL)
4178 return TRUE;
4179
4180 /* See if we already know about this version. */
4181 for (t = elf_tdata (rinfo->output_bfd)->verref; t != NULL; t = t->vn_nextref)
4182 {
4183 if (t->vn_bfd != h->verinfo.verdef->vd_bfd)
4184 continue;
4185
4186 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
4187 if (a->vna_nodename == h->verinfo.verdef->vd_nodename)
4188 return TRUE;
4189
4190 break;
4191 }
4192
4193 /* This is a new version. Add it to tree we are building. */
4194
4195 if (t == NULL)
4196 {
4197 amt = sizeof *t;
4198 t = (Elf_Internal_Verneed *) bfd_zalloc (rinfo->output_bfd, amt);
4199 if (t == NULL)
4200 {
4201 rinfo->failed = TRUE;
4202 return FALSE;
4203 }
4204
4205 t->vn_bfd = h->verinfo.verdef->vd_bfd;
4206 t->vn_nextref = elf_tdata (rinfo->output_bfd)->verref;
4207 elf_tdata (rinfo->output_bfd)->verref = t;
4208 }
4209
4210 amt = sizeof *a;
4211 a = (Elf_Internal_Vernaux *) bfd_zalloc (rinfo->output_bfd, amt);
4212
4213 /* Note that we are copying a string pointer here, and testing it
4214 above. If bfd_elf_string_from_elf_section is ever changed to
4215 discard the string data when low in memory, this will have to be
4216 fixed. */
4217 a->vna_nodename = h->verinfo.verdef->vd_nodename;
4218
4219 a->vna_flags = h->verinfo.verdef->vd_flags;
4220 a->vna_nextptr = t->vn_auxptr;
4221
4222 h->verinfo.verdef->vd_exp_refno = rinfo->vers;
4223 ++rinfo->vers;
4224
4225 a->vna_other = h->verinfo.verdef->vd_exp_refno + 1;
4226
4227 t->vn_auxptr = a;
4228
4229 return TRUE;
4230 }
4231
4232 /* Figure out appropriate versions for all the symbols. We may not
4233 have the version number script until we have read all of the input
4234 files, so until that point we don't know which symbols should be
4235 local. This function is called via elf_link_hash_traverse. */
4236
4237 static bfd_boolean
4238 elf_link_assign_sym_version (h, data)
4239 struct elf_link_hash_entry *h;
4240 PTR data;
4241 {
4242 struct elf_assign_sym_version_info *sinfo;
4243 struct bfd_link_info *info;
4244 struct elf_backend_data *bed;
4245 struct elf_info_failed eif;
4246 char *p;
4247 bfd_size_type amt;
4248
4249 sinfo = (struct elf_assign_sym_version_info *) data;
4250 info = sinfo->info;
4251
4252 if (h->root.type == bfd_link_hash_warning)
4253 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4254
4255 /* Fix the symbol flags. */
4256 eif.failed = FALSE;
4257 eif.info = info;
4258 if (! elf_fix_symbol_flags (h, &eif))
4259 {
4260 if (eif.failed)
4261 sinfo->failed = TRUE;
4262 return FALSE;
4263 }
4264
4265 /* We only need version numbers for symbols defined in regular
4266 objects. */
4267 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4268 return TRUE;
4269
4270 bed = get_elf_backend_data (sinfo->output_bfd);
4271 p = strchr (h->root.root.string, ELF_VER_CHR);
4272 if (p != NULL && h->verinfo.vertree == NULL)
4273 {
4274 struct bfd_elf_version_tree *t;
4275 bfd_boolean hidden;
4276
4277 hidden = TRUE;
4278
4279 /* There are two consecutive ELF_VER_CHR characters if this is
4280 not a hidden symbol. */
4281 ++p;
4282 if (*p == ELF_VER_CHR)
4283 {
4284 hidden = FALSE;
4285 ++p;
4286 }
4287
4288 /* If there is no version string, we can just return out. */
4289 if (*p == '\0')
4290 {
4291 if (hidden)
4292 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
4293 return TRUE;
4294 }
4295
4296 /* Look for the version. If we find it, it is no longer weak. */
4297 for (t = sinfo->verdefs; t != NULL; t = t->next)
4298 {
4299 if (strcmp (t->name, p) == 0)
4300 {
4301 size_t len;
4302 char *alc;
4303 struct bfd_elf_version_expr *d;
4304
4305 len = p - h->root.root.string;
4306 alc = bfd_malloc ((bfd_size_type) len);
4307 if (alc == NULL)
4308 return FALSE;
4309 memcpy (alc, h->root.root.string, len - 1);
4310 alc[len - 1] = '\0';
4311 if (alc[len - 2] == ELF_VER_CHR)
4312 alc[len - 2] = '\0';
4313
4314 h->verinfo.vertree = t;
4315 t->used = TRUE;
4316 d = NULL;
4317
4318 if (t->globals != NULL)
4319 {
4320 for (d = t->globals; d != NULL; d = d->next)
4321 if ((*d->match) (d, alc))
4322 break;
4323 }
4324
4325 /* See if there is anything to force this symbol to
4326 local scope. */
4327 if (d == NULL && t->locals != NULL)
4328 {
4329 for (d = t->locals; d != NULL; d = d->next)
4330 {
4331 if ((*d->match) (d, alc))
4332 {
4333 if (h->dynindx != -1
4334 && info->shared
4335 && ! info->export_dynamic)
4336 {
4337 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
4338 }
4339
4340 break;
4341 }
4342 }
4343 }
4344
4345 free (alc);
4346 break;
4347 }
4348 }
4349
4350 /* If we are building an application, we need to create a
4351 version node for this version. */
4352 if (t == NULL && ! info->shared)
4353 {
4354 struct bfd_elf_version_tree **pp;
4355 int version_index;
4356
4357 /* If we aren't going to export this symbol, we don't need
4358 to worry about it. */
4359 if (h->dynindx == -1)
4360 return TRUE;
4361
4362 amt = sizeof *t;
4363 t = ((struct bfd_elf_version_tree *)
4364 bfd_alloc (sinfo->output_bfd, amt));
4365 if (t == NULL)
4366 {
4367 sinfo->failed = TRUE;
4368 return FALSE;
4369 }
4370
4371 t->next = NULL;
4372 t->name = p;
4373 t->globals = NULL;
4374 t->locals = NULL;
4375 t->deps = NULL;
4376 t->name_indx = (unsigned int) -1;
4377 t->used = TRUE;
4378
4379 version_index = 1;
4380 /* Don't count anonymous version tag. */
4381 if (sinfo->verdefs != NULL && sinfo->verdefs->vernum == 0)
4382 version_index = 0;
4383 for (pp = &sinfo->verdefs; *pp != NULL; pp = &(*pp)->next)
4384 ++version_index;
4385 t->vernum = version_index;
4386
4387 *pp = t;
4388
4389 h->verinfo.vertree = t;
4390 }
4391 else if (t == NULL)
4392 {
4393 /* We could not find the version for a symbol when
4394 generating a shared archive. Return an error. */
4395 (*_bfd_error_handler)
4396 (_("%s: undefined versioned symbol name %s"),
4397 bfd_get_filename (sinfo->output_bfd), h->root.root.string);
4398 bfd_set_error (bfd_error_bad_value);
4399 sinfo->failed = TRUE;
4400 return FALSE;
4401 }
4402
4403 if (hidden)
4404 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
4405 }
4406
4407 /* If we don't have a version for this symbol, see if we can find
4408 something. */
4409 if (h->verinfo.vertree == NULL && sinfo->verdefs != NULL)
4410 {
4411 struct bfd_elf_version_tree *t;
4412 struct bfd_elf_version_tree *local_ver;
4413 struct bfd_elf_version_expr *d;
4414
4415 /* See if can find what version this symbol is in. If the
4416 symbol is supposed to be local, then don't actually register
4417 it. */
4418 local_ver = NULL;
4419 for (t = sinfo->verdefs; t != NULL; t = t->next)
4420 {
4421 if (t->globals != NULL)
4422 {
4423 bfd_boolean matched;
4424
4425 matched = FALSE;
4426 for (d = t->globals; d != NULL; d = d->next)
4427 {
4428 if ((*d->match) (d, h->root.root.string))
4429 {
4430 if (d->symver)
4431 matched = TRUE;
4432 else
4433 {
4434 /* There is a version without definition. Make
4435 the symbol the default definition for this
4436 version. */
4437 h->verinfo.vertree = t;
4438 local_ver = NULL;
4439 d->script = 1;
4440 break;
4441 }
4442 }
4443 }
4444
4445 if (d != NULL)
4446 break;
4447 else if (matched)
4448 /* There is no undefined version for this symbol. Hide the
4449 default one. */
4450 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
4451 }
4452
4453 if (t->locals != NULL)
4454 {
4455 for (d = t->locals; d != NULL; d = d->next)
4456 {
4457 /* If the match is "*", keep looking for a more
4458 explicit, perhaps even global, match. */
4459 if (d->pattern[0] == '*' && d->pattern[1] == '\0')
4460 local_ver = t;
4461 else if ((*d->match) (d, h->root.root.string))
4462 {
4463 local_ver = t;
4464 break;
4465 }
4466 }
4467
4468 if (d != NULL)
4469 break;
4470 }
4471 }
4472
4473 if (local_ver != NULL)
4474 {
4475 h->verinfo.vertree = local_ver;
4476 if (h->dynindx != -1
4477 && info->shared
4478 && ! info->export_dynamic)
4479 {
4480 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
4481 }
4482 }
4483 }
4484
4485 return TRUE;
4486 }
4487 \f
4488 /* Final phase of ELF linker. */
4489
4490 /* A structure we use to avoid passing large numbers of arguments. */
4491
4492 struct elf_final_link_info
4493 {
4494 /* General link information. */
4495 struct bfd_link_info *info;
4496 /* Output BFD. */
4497 bfd *output_bfd;
4498 /* Symbol string table. */
4499 struct bfd_strtab_hash *symstrtab;
4500 /* .dynsym section. */
4501 asection *dynsym_sec;
4502 /* .hash section. */
4503 asection *hash_sec;
4504 /* symbol version section (.gnu.version). */
4505 asection *symver_sec;
4506 /* first SHF_TLS section (if any). */
4507 asection *first_tls_sec;
4508 /* Buffer large enough to hold contents of any section. */
4509 bfd_byte *contents;
4510 /* Buffer large enough to hold external relocs of any section. */
4511 PTR external_relocs;
4512 /* Buffer large enough to hold internal relocs of any section. */
4513 Elf_Internal_Rela *internal_relocs;
4514 /* Buffer large enough to hold external local symbols of any input
4515 BFD. */
4516 Elf_External_Sym *external_syms;
4517 /* And a buffer for symbol section indices. */
4518 Elf_External_Sym_Shndx *locsym_shndx;
4519 /* Buffer large enough to hold internal local symbols of any input
4520 BFD. */
4521 Elf_Internal_Sym *internal_syms;
4522 /* Array large enough to hold a symbol index for each local symbol
4523 of any input BFD. */
4524 long *indices;
4525 /* Array large enough to hold a section pointer for each local
4526 symbol of any input BFD. */
4527 asection **sections;
4528 /* Buffer to hold swapped out symbols. */
4529 Elf_External_Sym *symbuf;
4530 /* And one for symbol section indices. */
4531 Elf_External_Sym_Shndx *symshndxbuf;
4532 /* Number of swapped out symbols in buffer. */
4533 size_t symbuf_count;
4534 /* Number of symbols which fit in symbuf. */
4535 size_t symbuf_size;
4536 /* And same for symshndxbuf. */
4537 size_t shndxbuf_size;
4538 };
4539
4540 static bfd_boolean elf_link_output_sym
4541 PARAMS ((struct elf_final_link_info *, const char *,
4542 Elf_Internal_Sym *, asection *));
4543 static bfd_boolean elf_link_flush_output_syms
4544 PARAMS ((struct elf_final_link_info *));
4545 static bfd_boolean elf_link_output_extsym
4546 PARAMS ((struct elf_link_hash_entry *, PTR));
4547 static bfd_boolean elf_link_sec_merge_syms
4548 PARAMS ((struct elf_link_hash_entry *, PTR));
4549 static bfd_boolean elf_link_check_versioned_symbol
4550 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
4551 static bfd_boolean elf_link_input_bfd
4552 PARAMS ((struct elf_final_link_info *, bfd *));
4553 static bfd_boolean elf_reloc_link_order
4554 PARAMS ((bfd *, struct bfd_link_info *, asection *,
4555 struct bfd_link_order *));
4556
4557 /* This struct is used to pass information to elf_link_output_extsym. */
4558
4559 struct elf_outext_info
4560 {
4561 bfd_boolean failed;
4562 bfd_boolean localsyms;
4563 struct elf_final_link_info *finfo;
4564 };
4565
4566 /* Compute the size of, and allocate space for, REL_HDR which is the
4567 section header for a section containing relocations for O. */
4568
4569 static bfd_boolean
4570 elf_link_size_reloc_section (abfd, rel_hdr, o)
4571 bfd *abfd;
4572 Elf_Internal_Shdr *rel_hdr;
4573 asection *o;
4574 {
4575 bfd_size_type reloc_count;
4576 bfd_size_type num_rel_hashes;
4577
4578 /* Figure out how many relocations there will be. */
4579 if (rel_hdr == &elf_section_data (o)->rel_hdr)
4580 reloc_count = elf_section_data (o)->rel_count;
4581 else
4582 reloc_count = elf_section_data (o)->rel_count2;
4583
4584 num_rel_hashes = o->reloc_count;
4585 if (num_rel_hashes < reloc_count)
4586 num_rel_hashes = reloc_count;
4587
4588 /* That allows us to calculate the size of the section. */
4589 rel_hdr->sh_size = rel_hdr->sh_entsize * reloc_count;
4590
4591 /* The contents field must last into write_object_contents, so we
4592 allocate it with bfd_alloc rather than malloc. Also since we
4593 cannot be sure that the contents will actually be filled in,
4594 we zero the allocated space. */
4595 rel_hdr->contents = (PTR) bfd_zalloc (abfd, rel_hdr->sh_size);
4596 if (rel_hdr->contents == NULL && rel_hdr->sh_size != 0)
4597 return FALSE;
4598
4599 /* We only allocate one set of hash entries, so we only do it the
4600 first time we are called. */
4601 if (elf_section_data (o)->rel_hashes == NULL
4602 && num_rel_hashes)
4603 {
4604 struct elf_link_hash_entry **p;
4605
4606 p = ((struct elf_link_hash_entry **)
4607 bfd_zmalloc (num_rel_hashes
4608 * sizeof (struct elf_link_hash_entry *)));
4609 if (p == NULL)
4610 return FALSE;
4611
4612 elf_section_data (o)->rel_hashes = p;
4613 }
4614
4615 return TRUE;
4616 }
4617
4618 /* When performing a relocateable link, the input relocations are
4619 preserved. But, if they reference global symbols, the indices
4620 referenced must be updated. Update all the relocations in
4621 REL_HDR (there are COUNT of them), using the data in REL_HASH. */
4622
4623 static void
4624 elf_link_adjust_relocs (abfd, rel_hdr, count, rel_hash)
4625 bfd *abfd;
4626 Elf_Internal_Shdr *rel_hdr;
4627 unsigned int count;
4628 struct elf_link_hash_entry **rel_hash;
4629 {
4630 unsigned int i;
4631 struct elf_backend_data *bed = get_elf_backend_data (abfd);
4632 bfd_byte *erela;
4633 void (*swap_in) PARAMS ((bfd *, const bfd_byte *, Elf_Internal_Rela *));
4634 void (*swap_out) PARAMS ((bfd *, const Elf_Internal_Rela *, bfd_byte *));
4635
4636 if (rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
4637 {
4638 swap_in = bed->s->swap_reloc_in;
4639 swap_out = bed->s->swap_reloc_out;
4640 }
4641 else if (rel_hdr->sh_entsize == sizeof (Elf_External_Rela))
4642 {
4643 swap_in = bed->s->swap_reloca_in;
4644 swap_out = bed->s->swap_reloca_out;
4645 }
4646 else
4647 abort ();
4648
4649 if (bed->s->int_rels_per_ext_rel > MAX_INT_RELS_PER_EXT_REL)
4650 abort ();
4651
4652 erela = rel_hdr->contents;
4653 for (i = 0; i < count; i++, rel_hash++, erela += rel_hdr->sh_entsize)
4654 {
4655 Elf_Internal_Rela irela[MAX_INT_RELS_PER_EXT_REL];
4656 unsigned int j;
4657
4658 if (*rel_hash == NULL)
4659 continue;
4660
4661 BFD_ASSERT ((*rel_hash)->indx >= 0);
4662
4663 (*swap_in) (abfd, erela, irela);
4664 for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
4665 irela[j].r_info = ELF_R_INFO ((*rel_hash)->indx,
4666 ELF_R_TYPE (irela[j].r_info));
4667 (*swap_out) (abfd, irela, erela);
4668 }
4669 }
4670
4671 struct elf_link_sort_rela
4672 {
4673 bfd_vma offset;
4674 enum elf_reloc_type_class type;
4675 /* We use this as an array of size int_rels_per_ext_rel. */
4676 Elf_Internal_Rela rela[1];
4677 };
4678
4679 static int
4680 elf_link_sort_cmp1 (A, B)
4681 const PTR A;
4682 const PTR B;
4683 {
4684 struct elf_link_sort_rela *a = (struct elf_link_sort_rela *) A;
4685 struct elf_link_sort_rela *b = (struct elf_link_sort_rela *) B;
4686 int relativea, relativeb;
4687
4688 relativea = a->type == reloc_class_relative;
4689 relativeb = b->type == reloc_class_relative;
4690
4691 if (relativea < relativeb)
4692 return 1;
4693 if (relativea > relativeb)
4694 return -1;
4695 if (ELF_R_SYM (a->rela->r_info) < ELF_R_SYM (b->rela->r_info))
4696 return -1;
4697 if (ELF_R_SYM (a->rela->r_info) > ELF_R_SYM (b->rela->r_info))
4698 return 1;
4699 if (a->rela->r_offset < b->rela->r_offset)
4700 return -1;
4701 if (a->rela->r_offset > b->rela->r_offset)
4702 return 1;
4703 return 0;
4704 }
4705
4706 static int
4707 elf_link_sort_cmp2 (A, B)
4708 const PTR A;
4709 const PTR B;
4710 {
4711 struct elf_link_sort_rela *a = (struct elf_link_sort_rela *) A;
4712 struct elf_link_sort_rela *b = (struct elf_link_sort_rela *) B;
4713 int copya, copyb;
4714
4715 if (a->offset < b->offset)
4716 return -1;
4717 if (a->offset > b->offset)
4718 return 1;
4719 copya = (a->type == reloc_class_copy) * 2 + (a->type == reloc_class_plt);
4720 copyb = (b->type == reloc_class_copy) * 2 + (b->type == reloc_class_plt);
4721 if (copya < copyb)
4722 return -1;
4723 if (copya > copyb)
4724 return 1;
4725 if (a->rela->r_offset < b->rela->r_offset)
4726 return -1;
4727 if (a->rela->r_offset > b->rela->r_offset)
4728 return 1;
4729 return 0;
4730 }
4731
4732 static size_t
4733 elf_link_sort_relocs (abfd, info, psec)
4734 bfd *abfd;
4735 struct bfd_link_info *info;
4736 asection **psec;
4737 {
4738 bfd *dynobj = elf_hash_table (info)->dynobj;
4739 asection *reldyn, *o;
4740 bfd_size_type count, size;
4741 size_t i, ret, sort_elt, ext_size;
4742 bfd_byte *sort, *s_non_relative, *p;
4743 struct elf_link_sort_rela *sq;
4744 struct elf_backend_data *bed = get_elf_backend_data (abfd);
4745 int i2e = bed->s->int_rels_per_ext_rel;
4746 void (*swap_in) PARAMS ((bfd *, const bfd_byte *, Elf_Internal_Rela *));
4747 void (*swap_out) PARAMS ((bfd *, const Elf_Internal_Rela *, bfd_byte *));
4748
4749 reldyn = bfd_get_section_by_name (abfd, ".rela.dyn");
4750 if (reldyn == NULL || reldyn->_raw_size == 0)
4751 {
4752 reldyn = bfd_get_section_by_name (abfd, ".rel.dyn");
4753 if (reldyn == NULL || reldyn->_raw_size == 0)
4754 return 0;
4755 ext_size = sizeof (Elf_External_Rel);
4756 swap_in = bed->s->swap_reloc_in;
4757 swap_out = bed->s->swap_reloc_out;
4758 }
4759 else
4760 {
4761 ext_size = sizeof (Elf_External_Rela);
4762 swap_in = bed->s->swap_reloca_in;
4763 swap_out = bed->s->swap_reloca_out;
4764 }
4765 count = reldyn->_raw_size / ext_size;
4766
4767 size = 0;
4768 for (o = dynobj->sections; o != NULL; o = o->next)
4769 if ((o->flags & (SEC_HAS_CONTENTS|SEC_LINKER_CREATED))
4770 == (SEC_HAS_CONTENTS|SEC_LINKER_CREATED)
4771 && o->output_section == reldyn)
4772 size += o->_raw_size;
4773
4774 if (size != reldyn->_raw_size)
4775 return 0;
4776
4777 sort_elt = (sizeof (struct elf_link_sort_rela)
4778 + (i2e - 1) * sizeof (Elf_Internal_Rela));
4779 sort = bfd_zmalloc (sort_elt * count);
4780 if (sort == NULL)
4781 {
4782 (*info->callbacks->warning)
4783 (info, _("Not enough memory to sort relocations"), 0, abfd, 0,
4784 (bfd_vma) 0);
4785 return 0;
4786 }
4787
4788 for (o = dynobj->sections; o != NULL; o = o->next)
4789 if ((o->flags & (SEC_HAS_CONTENTS|SEC_LINKER_CREATED))
4790 == (SEC_HAS_CONTENTS|SEC_LINKER_CREATED)
4791 && o->output_section == reldyn)
4792 {
4793 bfd_byte *erel, *erelend;
4794
4795 erel = o->contents;
4796 erelend = o->contents + o->_raw_size;
4797 p = sort + o->output_offset / ext_size * sort_elt;
4798 while (erel < erelend)
4799 {
4800 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
4801 (*swap_in) (abfd, erel, s->rela);
4802 s->type = (*bed->elf_backend_reloc_type_class) (s->rela);
4803 p += sort_elt;
4804 erel += ext_size;
4805 }
4806 }
4807
4808 qsort (sort, (size_t) count, sort_elt, elf_link_sort_cmp1);
4809
4810 for (i = 0, p = sort; i < count; i++, p += sort_elt)
4811 {
4812 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
4813 if (s->type != reloc_class_relative)
4814 break;
4815 }
4816 ret = i;
4817 s_non_relative = p;
4818
4819 sq = (struct elf_link_sort_rela *) s_non_relative;
4820 for (; i < count; i++, p += sort_elt)
4821 {
4822 struct elf_link_sort_rela *sp = (struct elf_link_sort_rela *) p;
4823 if (ELF_R_SYM (sp->rela->r_info) != ELF_R_SYM (sq->rela->r_info))
4824 sq = sp;
4825 sp->offset = sq->rela->r_offset;
4826 }
4827
4828 qsort (s_non_relative, (size_t) count - ret, sort_elt, elf_link_sort_cmp2);
4829
4830 for (o = dynobj->sections; o != NULL; o = o->next)
4831 if ((o->flags & (SEC_HAS_CONTENTS|SEC_LINKER_CREATED))
4832 == (SEC_HAS_CONTENTS|SEC_LINKER_CREATED)
4833 && o->output_section == reldyn)
4834 {
4835 bfd_byte *erel, *erelend;
4836
4837 erel = o->contents;
4838 erelend = o->contents + o->_raw_size;
4839 p = sort + o->output_offset / ext_size * sort_elt;
4840 while (erel < erelend)
4841 {
4842 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
4843 (*swap_out) (abfd, s->rela, erel);
4844 p += sort_elt;
4845 erel += ext_size;
4846 }
4847 }
4848
4849 *psec = reldyn;
4850 return ret;
4851 }
4852
4853 /* Do the final step of an ELF link. */
4854
4855 bfd_boolean
4856 elf_bfd_final_link (abfd, info)
4857 bfd *abfd;
4858 struct bfd_link_info *info;
4859 {
4860 bfd_boolean dynamic;
4861 bfd_boolean emit_relocs;
4862 bfd *dynobj;
4863 struct elf_final_link_info finfo;
4864 register asection *o;
4865 register struct bfd_link_order *p;
4866 register bfd *sub;
4867 bfd_size_type max_contents_size;
4868 bfd_size_type max_external_reloc_size;
4869 bfd_size_type max_internal_reloc_count;
4870 bfd_size_type max_sym_count;
4871 bfd_size_type max_sym_shndx_count;
4872 file_ptr off;
4873 Elf_Internal_Sym elfsym;
4874 unsigned int i;
4875 Elf_Internal_Shdr *symtab_hdr;
4876 Elf_Internal_Shdr *symtab_shndx_hdr;
4877 Elf_Internal_Shdr *symstrtab_hdr;
4878 struct elf_backend_data *bed = get_elf_backend_data (abfd);
4879 struct elf_outext_info eoinfo;
4880 bfd_boolean merged;
4881 size_t relativecount = 0;
4882 asection *reldyn = 0;
4883 bfd_size_type amt;
4884
4885 if (! is_elf_hash_table (info))
4886 return FALSE;
4887
4888 if (info->shared)
4889 abfd->flags |= DYNAMIC;
4890
4891 dynamic = elf_hash_table (info)->dynamic_sections_created;
4892 dynobj = elf_hash_table (info)->dynobj;
4893
4894 emit_relocs = (info->relocateable
4895 || info->emitrelocations
4896 || bed->elf_backend_emit_relocs);
4897
4898 finfo.info = info;
4899 finfo.output_bfd = abfd;
4900 finfo.symstrtab = elf_stringtab_init ();
4901 if (finfo.symstrtab == NULL)
4902 return FALSE;
4903
4904 if (! dynamic)
4905 {
4906 finfo.dynsym_sec = NULL;
4907 finfo.hash_sec = NULL;
4908 finfo.symver_sec = NULL;
4909 }
4910 else
4911 {
4912 finfo.dynsym_sec = bfd_get_section_by_name (dynobj, ".dynsym");
4913 finfo.hash_sec = bfd_get_section_by_name (dynobj, ".hash");
4914 BFD_ASSERT (finfo.dynsym_sec != NULL && finfo.hash_sec != NULL);
4915 finfo.symver_sec = bfd_get_section_by_name (dynobj, ".gnu.version");
4916 /* Note that it is OK if symver_sec is NULL. */
4917 }
4918
4919 finfo.contents = NULL;
4920 finfo.external_relocs = NULL;
4921 finfo.internal_relocs = NULL;
4922 finfo.external_syms = NULL;
4923 finfo.locsym_shndx = NULL;
4924 finfo.internal_syms = NULL;
4925 finfo.indices = NULL;
4926 finfo.sections = NULL;
4927 finfo.symbuf = NULL;
4928 finfo.symshndxbuf = NULL;
4929 finfo.symbuf_count = 0;
4930 finfo.shndxbuf_size = 0;
4931 finfo.first_tls_sec = NULL;
4932 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
4933 if ((o->flags & SEC_THREAD_LOCAL) != 0
4934 && (o->flags & SEC_LOAD) != 0)
4935 {
4936 finfo.first_tls_sec = o;
4937 break;
4938 }
4939
4940 /* Count up the number of relocations we will output for each output
4941 section, so that we know the sizes of the reloc sections. We
4942 also figure out some maximum sizes. */
4943 max_contents_size = 0;
4944 max_external_reloc_size = 0;
4945 max_internal_reloc_count = 0;
4946 max_sym_count = 0;
4947 max_sym_shndx_count = 0;
4948 merged = FALSE;
4949 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
4950 {
4951 struct bfd_elf_section_data *esdo = elf_section_data (o);
4952 o->reloc_count = 0;
4953
4954 for (p = o->link_order_head; p != NULL; p = p->next)
4955 {
4956 unsigned int reloc_count = 0;
4957 struct bfd_elf_section_data *esdi = NULL;
4958 unsigned int *rel_count1;
4959
4960 if (p->type == bfd_section_reloc_link_order
4961 || p->type == bfd_symbol_reloc_link_order)
4962 reloc_count = 1;
4963 else if (p->type == bfd_indirect_link_order)
4964 {
4965 asection *sec;
4966
4967 sec = p->u.indirect.section;
4968 esdi = elf_section_data (sec);
4969
4970 /* Mark all sections which are to be included in the
4971 link. This will normally be every section. We need
4972 to do this so that we can identify any sections which
4973 the linker has decided to not include. */
4974 sec->linker_mark = TRUE;
4975
4976 if (sec->flags & SEC_MERGE)
4977 merged = TRUE;
4978
4979 if (info->relocateable || info->emitrelocations)
4980 reloc_count = sec->reloc_count;
4981 else if (bed->elf_backend_count_relocs)
4982 {
4983 Elf_Internal_Rela * relocs;
4984
4985 relocs = (NAME(_bfd_elf,link_read_relocs)
4986 (abfd, sec, (PTR) NULL,
4987 (Elf_Internal_Rela *) NULL, info->keep_memory));
4988
4989 reloc_count = (*bed->elf_backend_count_relocs) (sec, relocs);
4990
4991 if (elf_section_data (o)->relocs != relocs)
4992 free (relocs);
4993 }
4994
4995 if (sec->_raw_size > max_contents_size)
4996 max_contents_size = sec->_raw_size;
4997 if (sec->_cooked_size > max_contents_size)
4998 max_contents_size = sec->_cooked_size;
4999
5000 /* We are interested in just local symbols, not all
5001 symbols. */
5002 if (bfd_get_flavour (sec->owner) == bfd_target_elf_flavour
5003 && (sec->owner->flags & DYNAMIC) == 0)
5004 {
5005 size_t sym_count;
5006
5007 if (elf_bad_symtab (sec->owner))
5008 sym_count = (elf_tdata (sec->owner)->symtab_hdr.sh_size
5009 / sizeof (Elf_External_Sym));
5010 else
5011 sym_count = elf_tdata (sec->owner)->symtab_hdr.sh_info;
5012
5013 if (sym_count > max_sym_count)
5014 max_sym_count = sym_count;
5015
5016 if (sym_count > max_sym_shndx_count
5017 && elf_symtab_shndx (sec->owner) != 0)
5018 max_sym_shndx_count = sym_count;
5019
5020 if ((sec->flags & SEC_RELOC) != 0)
5021 {
5022 size_t ext_size;
5023
5024 ext_size = elf_section_data (sec)->rel_hdr.sh_size;
5025 if (ext_size > max_external_reloc_size)
5026 max_external_reloc_size = ext_size;
5027 if (sec->reloc_count > max_internal_reloc_count)
5028 max_internal_reloc_count = sec->reloc_count;
5029 }
5030 }
5031 }
5032
5033 if (reloc_count == 0)
5034 continue;
5035
5036 o->reloc_count += reloc_count;
5037
5038 /* MIPS may have a mix of REL and RELA relocs on sections.
5039 To support this curious ABI we keep reloc counts in
5040 elf_section_data too. We must be careful to add the
5041 relocations from the input section to the right output
5042 count. FIXME: Get rid of one count. We have
5043 o->reloc_count == esdo->rel_count + esdo->rel_count2. */
5044 rel_count1 = &esdo->rel_count;
5045 if (esdi != NULL)
5046 {
5047 bfd_boolean same_size;
5048 bfd_size_type entsize1;
5049
5050 entsize1 = esdi->rel_hdr.sh_entsize;
5051 BFD_ASSERT (entsize1 == sizeof (Elf_External_Rel)
5052 || entsize1 == sizeof (Elf_External_Rela));
5053 same_size = (!o->use_rela_p
5054 == (entsize1 == sizeof (Elf_External_Rel)));
5055
5056 if (!same_size)
5057 rel_count1 = &esdo->rel_count2;
5058
5059 if (esdi->rel_hdr2 != NULL)
5060 {
5061 bfd_size_type entsize2 = esdi->rel_hdr2->sh_entsize;
5062 unsigned int alt_count;
5063 unsigned int *rel_count2;
5064
5065 BFD_ASSERT (entsize2 != entsize1
5066 && (entsize2 == sizeof (Elf_External_Rel)
5067 || entsize2 == sizeof (Elf_External_Rela)));
5068
5069 rel_count2 = &esdo->rel_count2;
5070 if (!same_size)
5071 rel_count2 = &esdo->rel_count;
5072
5073 /* The following is probably too simplistic if the
5074 backend counts output relocs unusually. */
5075 BFD_ASSERT (bed->elf_backend_count_relocs == NULL);
5076 alt_count = NUM_SHDR_ENTRIES (esdi->rel_hdr2);
5077 *rel_count2 += alt_count;
5078 reloc_count -= alt_count;
5079 }
5080 }
5081 *rel_count1 += reloc_count;
5082 }
5083
5084 if (o->reloc_count > 0)
5085 o->flags |= SEC_RELOC;
5086 else
5087 {
5088 /* Explicitly clear the SEC_RELOC flag. The linker tends to
5089 set it (this is probably a bug) and if it is set
5090 assign_section_numbers will create a reloc section. */
5091 o->flags &=~ SEC_RELOC;
5092 }
5093
5094 /* If the SEC_ALLOC flag is not set, force the section VMA to
5095 zero. This is done in elf_fake_sections as well, but forcing
5096 the VMA to 0 here will ensure that relocs against these
5097 sections are handled correctly. */
5098 if ((o->flags & SEC_ALLOC) == 0
5099 && ! o->user_set_vma)
5100 o->vma = 0;
5101 }
5102
5103 if (! info->relocateable && merged)
5104 elf_link_hash_traverse (elf_hash_table (info),
5105 elf_link_sec_merge_syms, (PTR) abfd);
5106
5107 /* Figure out the file positions for everything but the symbol table
5108 and the relocs. We set symcount to force assign_section_numbers
5109 to create a symbol table. */
5110 bfd_get_symcount (abfd) = info->strip == strip_all ? 0 : 1;
5111 BFD_ASSERT (! abfd->output_has_begun);
5112 if (! _bfd_elf_compute_section_file_positions (abfd, info))
5113 goto error_return;
5114
5115 /* That created the reloc sections. Set their sizes, and assign
5116 them file positions, and allocate some buffers. */
5117 for (o = abfd->sections; o != NULL; o = o->next)
5118 {
5119 if ((o->flags & SEC_RELOC) != 0)
5120 {
5121 if (!elf_link_size_reloc_section (abfd,
5122 &elf_section_data (o)->rel_hdr,
5123 o))
5124 goto error_return;
5125
5126 if (elf_section_data (o)->rel_hdr2
5127 && !elf_link_size_reloc_section (abfd,
5128 elf_section_data (o)->rel_hdr2,
5129 o))
5130 goto error_return;
5131 }
5132
5133 /* Now, reset REL_COUNT and REL_COUNT2 so that we can use them
5134 to count upwards while actually outputting the relocations. */
5135 elf_section_data (o)->rel_count = 0;
5136 elf_section_data (o)->rel_count2 = 0;
5137 }
5138
5139 _bfd_elf_assign_file_positions_for_relocs (abfd);
5140
5141 /* We have now assigned file positions for all the sections except
5142 .symtab and .strtab. We start the .symtab section at the current
5143 file position, and write directly to it. We build the .strtab
5144 section in memory. */
5145 bfd_get_symcount (abfd) = 0;
5146 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5147 /* sh_name is set in prep_headers. */
5148 symtab_hdr->sh_type = SHT_SYMTAB;
5149 /* sh_flags, sh_addr and sh_size all start off zero. */
5150 symtab_hdr->sh_entsize = sizeof (Elf_External_Sym);
5151 /* sh_link is set in assign_section_numbers. */
5152 /* sh_info is set below. */
5153 /* sh_offset is set just below. */
5154 symtab_hdr->sh_addralign = bed->s->file_align;
5155
5156 off = elf_tdata (abfd)->next_file_pos;
5157 off = _bfd_elf_assign_file_position_for_section (symtab_hdr, off, TRUE);
5158
5159 /* Note that at this point elf_tdata (abfd)->next_file_pos is
5160 incorrect. We do not yet know the size of the .symtab section.
5161 We correct next_file_pos below, after we do know the size. */
5162
5163 /* Allocate a buffer to hold swapped out symbols. This is to avoid
5164 continuously seeking to the right position in the file. */
5165 if (! info->keep_memory || max_sym_count < 20)
5166 finfo.symbuf_size = 20;
5167 else
5168 finfo.symbuf_size = max_sym_count;
5169 amt = finfo.symbuf_size;
5170 amt *= sizeof (Elf_External_Sym);
5171 finfo.symbuf = (Elf_External_Sym *) bfd_malloc (amt);
5172 if (finfo.symbuf == NULL)
5173 goto error_return;
5174 if (elf_numsections (abfd) > SHN_LORESERVE)
5175 {
5176 /* Wild guess at number of output symbols. realloc'd as needed. */
5177 amt = 2 * max_sym_count + elf_numsections (abfd) + 1000;
5178 finfo.shndxbuf_size = amt;
5179 amt *= sizeof (Elf_External_Sym_Shndx);
5180 finfo.symshndxbuf = (Elf_External_Sym_Shndx *) bfd_zmalloc (amt);
5181 if (finfo.symshndxbuf == NULL)
5182 goto error_return;
5183 }
5184
5185 /* Start writing out the symbol table. The first symbol is always a
5186 dummy symbol. */
5187 if (info->strip != strip_all
5188 || emit_relocs)
5189 {
5190 elfsym.st_value = 0;
5191 elfsym.st_size = 0;
5192 elfsym.st_info = 0;
5193 elfsym.st_other = 0;
5194 elfsym.st_shndx = SHN_UNDEF;
5195 if (! elf_link_output_sym (&finfo, (const char *) NULL,
5196 &elfsym, bfd_und_section_ptr))
5197 goto error_return;
5198 }
5199
5200 #if 0
5201 /* Some standard ELF linkers do this, but we don't because it causes
5202 bootstrap comparison failures. */
5203 /* Output a file symbol for the output file as the second symbol.
5204 We output this even if we are discarding local symbols, although
5205 I'm not sure if this is correct. */
5206 elfsym.st_value = 0;
5207 elfsym.st_size = 0;
5208 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
5209 elfsym.st_other = 0;
5210 elfsym.st_shndx = SHN_ABS;
5211 if (! elf_link_output_sym (&finfo, bfd_get_filename (abfd),
5212 &elfsym, bfd_abs_section_ptr))
5213 goto error_return;
5214 #endif
5215
5216 /* Output a symbol for each section. We output these even if we are
5217 discarding local symbols, since they are used for relocs. These
5218 symbols have no names. We store the index of each one in the
5219 index field of the section, so that we can find it again when
5220 outputting relocs. */
5221 if (info->strip != strip_all
5222 || emit_relocs)
5223 {
5224 elfsym.st_size = 0;
5225 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5226 elfsym.st_other = 0;
5227 for (i = 1; i < elf_numsections (abfd); i++)
5228 {
5229 o = section_from_elf_index (abfd, i);
5230 if (o != NULL)
5231 o->target_index = bfd_get_symcount (abfd);
5232 elfsym.st_shndx = i;
5233 if (info->relocateable || o == NULL)
5234 elfsym.st_value = 0;
5235 else
5236 elfsym.st_value = o->vma;
5237 if (! elf_link_output_sym (&finfo, (const char *) NULL,
5238 &elfsym, o))
5239 goto error_return;
5240 if (i == SHN_LORESERVE - 1)
5241 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
5242 }
5243 }
5244
5245 /* Allocate some memory to hold information read in from the input
5246 files. */
5247 if (max_contents_size != 0)
5248 {
5249 finfo.contents = (bfd_byte *) bfd_malloc (max_contents_size);
5250 if (finfo.contents == NULL)
5251 goto error_return;
5252 }
5253
5254 if (max_external_reloc_size != 0)
5255 {
5256 finfo.external_relocs = (PTR) bfd_malloc (max_external_reloc_size);
5257 if (finfo.external_relocs == NULL)
5258 goto error_return;
5259 }
5260
5261 if (max_internal_reloc_count != 0)
5262 {
5263 amt = max_internal_reloc_count * bed->s->int_rels_per_ext_rel;
5264 amt *= sizeof (Elf_Internal_Rela);
5265 finfo.internal_relocs = (Elf_Internal_Rela *) bfd_malloc (amt);
5266 if (finfo.internal_relocs == NULL)
5267 goto error_return;
5268 }
5269
5270 if (max_sym_count != 0)
5271 {
5272 amt = max_sym_count * sizeof (Elf_External_Sym);
5273 finfo.external_syms = (Elf_External_Sym *) bfd_malloc (amt);
5274 if (finfo.external_syms == NULL)
5275 goto error_return;
5276
5277 amt = max_sym_count * sizeof (Elf_Internal_Sym);
5278 finfo.internal_syms = (Elf_Internal_Sym *) bfd_malloc (amt);
5279 if (finfo.internal_syms == NULL)
5280 goto error_return;
5281
5282 amt = max_sym_count * sizeof (long);
5283 finfo.indices = (long *) bfd_malloc (amt);
5284 if (finfo.indices == NULL)
5285 goto error_return;
5286
5287 amt = max_sym_count * sizeof (asection *);
5288 finfo.sections = (asection **) bfd_malloc (amt);
5289 if (finfo.sections == NULL)
5290 goto error_return;
5291 }
5292
5293 if (max_sym_shndx_count != 0)
5294 {
5295 amt = max_sym_shndx_count * sizeof (Elf_External_Sym_Shndx);
5296 finfo.locsym_shndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
5297 if (finfo.locsym_shndx == NULL)
5298 goto error_return;
5299 }
5300
5301 if (finfo.first_tls_sec)
5302 {
5303 unsigned int align = 0;
5304 bfd_vma base = finfo.first_tls_sec->vma, end = 0;
5305 asection *sec;
5306
5307 for (sec = finfo.first_tls_sec;
5308 sec && (sec->flags & SEC_THREAD_LOCAL);
5309 sec = sec->next)
5310 {
5311 bfd_vma size = sec->_raw_size;
5312
5313 if (bfd_get_section_alignment (abfd, sec) > align)
5314 align = bfd_get_section_alignment (abfd, sec);
5315 if (sec->_raw_size == 0 && (sec->flags & SEC_HAS_CONTENTS) == 0)
5316 {
5317 struct bfd_link_order *o;
5318
5319 size = 0;
5320 for (o = sec->link_order_head; o != NULL; o = o->next)
5321 if (size < o->offset + o->size)
5322 size = o->offset + o->size;
5323 }
5324 end = sec->vma + size;
5325 }
5326 elf_hash_table (info)->tls_segment
5327 = bfd_zalloc (abfd, sizeof (struct elf_link_tls_segment));
5328 if (elf_hash_table (info)->tls_segment == NULL)
5329 goto error_return;
5330 elf_hash_table (info)->tls_segment->start = base;
5331 elf_hash_table (info)->tls_segment->size = end - base;
5332 elf_hash_table (info)->tls_segment->align = align;
5333 }
5334
5335 /* Since ELF permits relocations to be against local symbols, we
5336 must have the local symbols available when we do the relocations.
5337 Since we would rather only read the local symbols once, and we
5338 would rather not keep them in memory, we handle all the
5339 relocations for a single input file at the same time.
5340
5341 Unfortunately, there is no way to know the total number of local
5342 symbols until we have seen all of them, and the local symbol
5343 indices precede the global symbol indices. This means that when
5344 we are generating relocateable output, and we see a reloc against
5345 a global symbol, we can not know the symbol index until we have
5346 finished examining all the local symbols to see which ones we are
5347 going to output. To deal with this, we keep the relocations in
5348 memory, and don't output them until the end of the link. This is
5349 an unfortunate waste of memory, but I don't see a good way around
5350 it. Fortunately, it only happens when performing a relocateable
5351 link, which is not the common case. FIXME: If keep_memory is set
5352 we could write the relocs out and then read them again; I don't
5353 know how bad the memory loss will be. */
5354
5355 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
5356 sub->output_has_begun = FALSE;
5357 for (o = abfd->sections; o != NULL; o = o->next)
5358 {
5359 for (p = o->link_order_head; p != NULL; p = p->next)
5360 {
5361 if (p->type == bfd_indirect_link_order
5362 && (bfd_get_flavour ((sub = p->u.indirect.section->owner))
5363 == bfd_target_elf_flavour)
5364 && elf_elfheader (sub)->e_ident[EI_CLASS] == bed->s->elfclass)
5365 {
5366 if (! sub->output_has_begun)
5367 {
5368 if (! elf_link_input_bfd (&finfo, sub))
5369 goto error_return;
5370 sub->output_has_begun = TRUE;
5371 }
5372 }
5373 else if (p->type == bfd_section_reloc_link_order
5374 || p->type == bfd_symbol_reloc_link_order)
5375 {
5376 if (! elf_reloc_link_order (abfd, info, o, p))
5377 goto error_return;
5378 }
5379 else
5380 {
5381 if (! _bfd_default_link_order (abfd, info, o, p))
5382 goto error_return;
5383 }
5384 }
5385 }
5386
5387 /* Output any global symbols that got converted to local in a
5388 version script or due to symbol visibility. We do this in a
5389 separate step since ELF requires all local symbols to appear
5390 prior to any global symbols. FIXME: We should only do this if
5391 some global symbols were, in fact, converted to become local.
5392 FIXME: Will this work correctly with the Irix 5 linker? */
5393 eoinfo.failed = FALSE;
5394 eoinfo.finfo = &finfo;
5395 eoinfo.localsyms = TRUE;
5396 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
5397 (PTR) &eoinfo);
5398 if (eoinfo.failed)
5399 return FALSE;
5400
5401 /* That wrote out all the local symbols. Finish up the symbol table
5402 with the global symbols. Even if we want to strip everything we
5403 can, we still need to deal with those global symbols that got
5404 converted to local in a version script. */
5405
5406 /* The sh_info field records the index of the first non local symbol. */
5407 symtab_hdr->sh_info = bfd_get_symcount (abfd);
5408
5409 if (dynamic
5410 && finfo.dynsym_sec->output_section != bfd_abs_section_ptr)
5411 {
5412 Elf_Internal_Sym sym;
5413 Elf_External_Sym *dynsym =
5414 (Elf_External_Sym *) finfo.dynsym_sec->contents;
5415 long last_local = 0;
5416
5417 /* Write out the section symbols for the output sections. */
5418 if (info->shared)
5419 {
5420 asection *s;
5421
5422 sym.st_size = 0;
5423 sym.st_name = 0;
5424 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5425 sym.st_other = 0;
5426
5427 for (s = abfd->sections; s != NULL; s = s->next)
5428 {
5429 int indx;
5430 Elf_External_Sym *dest;
5431
5432 indx = elf_section_data (s)->this_idx;
5433 BFD_ASSERT (indx > 0);
5434 sym.st_shndx = indx;
5435 sym.st_value = s->vma;
5436 dest = dynsym + elf_section_data (s)->dynindx;
5437 elf_swap_symbol_out (abfd, &sym, (PTR) dest, (PTR) 0);
5438 }
5439
5440 last_local = bfd_count_sections (abfd);
5441 }
5442
5443 /* Write out the local dynsyms. */
5444 if (elf_hash_table (info)->dynlocal)
5445 {
5446 struct elf_link_local_dynamic_entry *e;
5447 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
5448 {
5449 asection *s;
5450 Elf_External_Sym *dest;
5451
5452 sym.st_size = e->isym.st_size;
5453 sym.st_other = e->isym.st_other;
5454
5455 /* Copy the internal symbol as is.
5456 Note that we saved a word of storage and overwrote
5457 the original st_name with the dynstr_index. */
5458 sym = e->isym;
5459
5460 if (e->isym.st_shndx != SHN_UNDEF
5461 && (e->isym.st_shndx < SHN_LORESERVE
5462 || e->isym.st_shndx > SHN_HIRESERVE))
5463 {
5464 s = bfd_section_from_elf_index (e->input_bfd,
5465 e->isym.st_shndx);
5466
5467 sym.st_shndx =
5468 elf_section_data (s->output_section)->this_idx;
5469 sym.st_value = (s->output_section->vma
5470 + s->output_offset
5471 + e->isym.st_value);
5472 }
5473
5474 if (last_local < e->dynindx)
5475 last_local = e->dynindx;
5476
5477 dest = dynsym + e->dynindx;
5478 elf_swap_symbol_out (abfd, &sym, (PTR) dest, (PTR) 0);
5479 }
5480 }
5481
5482 elf_section_data (finfo.dynsym_sec->output_section)->this_hdr.sh_info =
5483 last_local + 1;
5484 }
5485
5486 /* We get the global symbols from the hash table. */
5487 eoinfo.failed = FALSE;
5488 eoinfo.localsyms = FALSE;
5489 eoinfo.finfo = &finfo;
5490 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
5491 (PTR) &eoinfo);
5492 if (eoinfo.failed)
5493 return FALSE;
5494
5495 /* If backend needs to output some symbols not present in the hash
5496 table, do it now. */
5497 if (bed->elf_backend_output_arch_syms)
5498 {
5499 typedef bfd_boolean (*out_sym_func)
5500 PARAMS ((PTR, const char *, Elf_Internal_Sym *, asection *));
5501
5502 if (! ((*bed->elf_backend_output_arch_syms)
5503 (abfd, info, (PTR) &finfo, (out_sym_func) elf_link_output_sym)))
5504 return FALSE;
5505 }
5506
5507 /* Flush all symbols to the file. */
5508 if (! elf_link_flush_output_syms (&finfo))
5509 return FALSE;
5510
5511 /* Now we know the size of the symtab section. */
5512 off += symtab_hdr->sh_size;
5513
5514 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5515 if (symtab_shndx_hdr->sh_name != 0)
5516 {
5517 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5518 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5519 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5520 amt = bfd_get_symcount (abfd) * sizeof (Elf_External_Sym_Shndx);
5521 symtab_shndx_hdr->sh_size = amt;
5522
5523 off = _bfd_elf_assign_file_position_for_section (symtab_shndx_hdr,
5524 off, TRUE);
5525
5526 if (bfd_seek (abfd, symtab_shndx_hdr->sh_offset, SEEK_SET) != 0
5527 || (bfd_bwrite ((PTR) finfo.symshndxbuf, amt, abfd) != amt))
5528 return FALSE;
5529 }
5530
5531
5532 /* Finish up and write out the symbol string table (.strtab)
5533 section. */
5534 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5535 /* sh_name was set in prep_headers. */
5536 symstrtab_hdr->sh_type = SHT_STRTAB;
5537 symstrtab_hdr->sh_flags = 0;
5538 symstrtab_hdr->sh_addr = 0;
5539 symstrtab_hdr->sh_size = _bfd_stringtab_size (finfo.symstrtab);
5540 symstrtab_hdr->sh_entsize = 0;
5541 symstrtab_hdr->sh_link = 0;
5542 symstrtab_hdr->sh_info = 0;
5543 /* sh_offset is set just below. */
5544 symstrtab_hdr->sh_addralign = 1;
5545
5546 off = _bfd_elf_assign_file_position_for_section (symstrtab_hdr, off, TRUE);
5547 elf_tdata (abfd)->next_file_pos = off;
5548
5549 if (bfd_get_symcount (abfd) > 0)
5550 {
5551 if (bfd_seek (abfd, symstrtab_hdr->sh_offset, SEEK_SET) != 0
5552 || ! _bfd_stringtab_emit (abfd, finfo.symstrtab))
5553 return FALSE;
5554 }
5555
5556 /* Adjust the relocs to have the correct symbol indices. */
5557 for (o = abfd->sections; o != NULL; o = o->next)
5558 {
5559 if ((o->flags & SEC_RELOC) == 0)
5560 continue;
5561
5562 elf_link_adjust_relocs (abfd, &elf_section_data (o)->rel_hdr,
5563 elf_section_data (o)->rel_count,
5564 elf_section_data (o)->rel_hashes);
5565 if (elf_section_data (o)->rel_hdr2 != NULL)
5566 elf_link_adjust_relocs (abfd, elf_section_data (o)->rel_hdr2,
5567 elf_section_data (o)->rel_count2,
5568 (elf_section_data (o)->rel_hashes
5569 + elf_section_data (o)->rel_count));
5570
5571 /* Set the reloc_count field to 0 to prevent write_relocs from
5572 trying to swap the relocs out itself. */
5573 o->reloc_count = 0;
5574 }
5575
5576 if (dynamic && info->combreloc && dynobj != NULL)
5577 relativecount = elf_link_sort_relocs (abfd, info, &reldyn);
5578
5579 /* If we are linking against a dynamic object, or generating a
5580 shared library, finish up the dynamic linking information. */
5581 if (dynamic)
5582 {
5583 Elf_External_Dyn *dyncon, *dynconend;
5584
5585 /* Fix up .dynamic entries. */
5586 o = bfd_get_section_by_name (dynobj, ".dynamic");
5587 BFD_ASSERT (o != NULL);
5588
5589 dyncon = (Elf_External_Dyn *) o->contents;
5590 dynconend = (Elf_External_Dyn *) (o->contents + o->_raw_size);
5591 for (; dyncon < dynconend; dyncon++)
5592 {
5593 Elf_Internal_Dyn dyn;
5594 const char *name;
5595 unsigned int type;
5596
5597 elf_swap_dyn_in (dynobj, dyncon, &dyn);
5598
5599 switch (dyn.d_tag)
5600 {
5601 default:
5602 break;
5603 case DT_NULL:
5604 if (relativecount > 0 && dyncon + 1 < dynconend)
5605 {
5606 switch (elf_section_data (reldyn)->this_hdr.sh_type)
5607 {
5608 case SHT_REL: dyn.d_tag = DT_RELCOUNT; break;
5609 case SHT_RELA: dyn.d_tag = DT_RELACOUNT; break;
5610 default: break;
5611 }
5612 if (dyn.d_tag != DT_NULL)
5613 {
5614 dyn.d_un.d_val = relativecount;
5615 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5616 relativecount = 0;
5617 }
5618 }
5619 break;
5620 case DT_INIT:
5621 name = info->init_function;
5622 goto get_sym;
5623 case DT_FINI:
5624 name = info->fini_function;
5625 get_sym:
5626 {
5627 struct elf_link_hash_entry *h;
5628
5629 h = elf_link_hash_lookup (elf_hash_table (info), name,
5630 FALSE, FALSE, TRUE);
5631 if (h != NULL
5632 && (h->root.type == bfd_link_hash_defined
5633 || h->root.type == bfd_link_hash_defweak))
5634 {
5635 dyn.d_un.d_val = h->root.u.def.value;
5636 o = h->root.u.def.section;
5637 if (o->output_section != NULL)
5638 dyn.d_un.d_val += (o->output_section->vma
5639 + o->output_offset);
5640 else
5641 {
5642 /* The symbol is imported from another shared
5643 library and does not apply to this one. */
5644 dyn.d_un.d_val = 0;
5645 }
5646
5647 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5648 }
5649 }
5650 break;
5651
5652 case DT_PREINIT_ARRAYSZ:
5653 name = ".preinit_array";
5654 goto get_size;
5655 case DT_INIT_ARRAYSZ:
5656 name = ".init_array";
5657 goto get_size;
5658 case DT_FINI_ARRAYSZ:
5659 name = ".fini_array";
5660 get_size:
5661 o = bfd_get_section_by_name (abfd, name);
5662 if (o == NULL)
5663 {
5664 (*_bfd_error_handler)
5665 (_("%s: could not find output section %s"),
5666 bfd_get_filename (abfd), name);
5667 goto error_return;
5668 }
5669 if (o->_raw_size == 0)
5670 (*_bfd_error_handler)
5671 (_("warning: %s section has zero size"), name);
5672 dyn.d_un.d_val = o->_raw_size;
5673 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5674 break;
5675
5676 case DT_PREINIT_ARRAY:
5677 name = ".preinit_array";
5678 goto get_vma;
5679 case DT_INIT_ARRAY:
5680 name = ".init_array";
5681 goto get_vma;
5682 case DT_FINI_ARRAY:
5683 name = ".fini_array";
5684 goto get_vma;
5685
5686 case DT_HASH:
5687 name = ".hash";
5688 goto get_vma;
5689 case DT_STRTAB:
5690 name = ".dynstr";
5691 goto get_vma;
5692 case DT_SYMTAB:
5693 name = ".dynsym";
5694 goto get_vma;
5695 case DT_VERDEF:
5696 name = ".gnu.version_d";
5697 goto get_vma;
5698 case DT_VERNEED:
5699 name = ".gnu.version_r";
5700 goto get_vma;
5701 case DT_VERSYM:
5702 name = ".gnu.version";
5703 get_vma:
5704 o = bfd_get_section_by_name (abfd, name);
5705 if (o == NULL)
5706 {
5707 (*_bfd_error_handler)
5708 (_("%s: could not find output section %s"),
5709 bfd_get_filename (abfd), name);
5710 goto error_return;
5711 }
5712 dyn.d_un.d_ptr = o->vma;
5713 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5714 break;
5715
5716 case DT_REL:
5717 case DT_RELA:
5718 case DT_RELSZ:
5719 case DT_RELASZ:
5720 if (dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
5721 type = SHT_REL;
5722 else
5723 type = SHT_RELA;
5724 dyn.d_un.d_val = 0;
5725 for (i = 1; i < elf_numsections (abfd); i++)
5726 {
5727 Elf_Internal_Shdr *hdr;
5728
5729 hdr = elf_elfsections (abfd)[i];
5730 if (hdr->sh_type == type
5731 && (hdr->sh_flags & SHF_ALLOC) != 0)
5732 {
5733 if (dyn.d_tag == DT_RELSZ || dyn.d_tag == DT_RELASZ)
5734 dyn.d_un.d_val += hdr->sh_size;
5735 else
5736 {
5737 if (dyn.d_un.d_val == 0
5738 || hdr->sh_addr < dyn.d_un.d_val)
5739 dyn.d_un.d_val = hdr->sh_addr;
5740 }
5741 }
5742 }
5743 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5744 break;
5745 }
5746 }
5747 }
5748
5749 /* If we have created any dynamic sections, then output them. */
5750 if (dynobj != NULL)
5751 {
5752 if (! (*bed->elf_backend_finish_dynamic_sections) (abfd, info))
5753 goto error_return;
5754
5755 for (o = dynobj->sections; o != NULL; o = o->next)
5756 {
5757 if ((o->flags & SEC_HAS_CONTENTS) == 0
5758 || o->_raw_size == 0
5759 || o->output_section == bfd_abs_section_ptr)
5760 continue;
5761 if ((o->flags & SEC_LINKER_CREATED) == 0)
5762 {
5763 /* At this point, we are only interested in sections
5764 created by elf_link_create_dynamic_sections. */
5765 continue;
5766 }
5767 if ((elf_section_data (o->output_section)->this_hdr.sh_type
5768 != SHT_STRTAB)
5769 || strcmp (bfd_get_section_name (abfd, o), ".dynstr") != 0)
5770 {
5771 if (! bfd_set_section_contents (abfd, o->output_section,
5772 o->contents,
5773 (file_ptr) o->output_offset,
5774 o->_raw_size))
5775 goto error_return;
5776 }
5777 else
5778 {
5779 /* The contents of the .dynstr section are actually in a
5780 stringtab. */
5781 off = elf_section_data (o->output_section)->this_hdr.sh_offset;
5782 if (bfd_seek (abfd, off, SEEK_SET) != 0
5783 || ! _bfd_elf_strtab_emit (abfd,
5784 elf_hash_table (info)->dynstr))
5785 goto error_return;
5786 }
5787 }
5788 }
5789
5790 if (info->relocateable)
5791 {
5792 bfd_boolean failed = FALSE;
5793
5794 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
5795 if (failed)
5796 goto error_return;
5797 }
5798
5799 /* If we have optimized stabs strings, output them. */
5800 if (elf_hash_table (info)->stab_info != NULL)
5801 {
5802 if (! _bfd_write_stab_strings (abfd, &elf_hash_table (info)->stab_info))
5803 goto error_return;
5804 }
5805
5806 if (info->eh_frame_hdr)
5807 {
5808 if (! _bfd_elf_write_section_eh_frame_hdr (abfd, info))
5809 goto error_return;
5810 }
5811
5812 if (finfo.symstrtab != NULL)
5813 _bfd_stringtab_free (finfo.symstrtab);
5814 if (finfo.contents != NULL)
5815 free (finfo.contents);
5816 if (finfo.external_relocs != NULL)
5817 free (finfo.external_relocs);
5818 if (finfo.internal_relocs != NULL)
5819 free (finfo.internal_relocs);
5820 if (finfo.external_syms != NULL)
5821 free (finfo.external_syms);
5822 if (finfo.locsym_shndx != NULL)
5823 free (finfo.locsym_shndx);
5824 if (finfo.internal_syms != NULL)
5825 free (finfo.internal_syms);
5826 if (finfo.indices != NULL)
5827 free (finfo.indices);
5828 if (finfo.sections != NULL)
5829 free (finfo.sections);
5830 if (finfo.symbuf != NULL)
5831 free (finfo.symbuf);
5832 if (finfo.symshndxbuf != NULL)
5833 free (finfo.symshndxbuf);
5834 for (o = abfd->sections; o != NULL; o = o->next)
5835 {
5836 if ((o->flags & SEC_RELOC) != 0
5837 && elf_section_data (o)->rel_hashes != NULL)
5838 free (elf_section_data (o)->rel_hashes);
5839 }
5840
5841 elf_tdata (abfd)->linker = TRUE;
5842
5843 return TRUE;
5844
5845 error_return:
5846 if (finfo.symstrtab != NULL)
5847 _bfd_stringtab_free (finfo.symstrtab);
5848 if (finfo.contents != NULL)
5849 free (finfo.contents);
5850 if (finfo.external_relocs != NULL)
5851 free (finfo.external_relocs);
5852 if (finfo.internal_relocs != NULL)
5853 free (finfo.internal_relocs);
5854 if (finfo.external_syms != NULL)
5855 free (finfo.external_syms);
5856 if (finfo.locsym_shndx != NULL)
5857 free (finfo.locsym_shndx);
5858 if (finfo.internal_syms != NULL)
5859 free (finfo.internal_syms);
5860 if (finfo.indices != NULL)
5861 free (finfo.indices);
5862 if (finfo.sections != NULL)
5863 free (finfo.sections);
5864 if (finfo.symbuf != NULL)
5865 free (finfo.symbuf);
5866 if (finfo.symshndxbuf != NULL)
5867 free (finfo.symshndxbuf);
5868 for (o = abfd->sections; o != NULL; o = o->next)
5869 {
5870 if ((o->flags & SEC_RELOC) != 0
5871 && elf_section_data (o)->rel_hashes != NULL)
5872 free (elf_section_data (o)->rel_hashes);
5873 }
5874
5875 return FALSE;
5876 }
5877
5878 /* Add a symbol to the output symbol table. */
5879
5880 static bfd_boolean
5881 elf_link_output_sym (finfo, name, elfsym, input_sec)
5882 struct elf_final_link_info *finfo;
5883 const char *name;
5884 Elf_Internal_Sym *elfsym;
5885 asection *input_sec;
5886 {
5887 Elf_External_Sym *dest;
5888 Elf_External_Sym_Shndx *destshndx;
5889 bfd_boolean (*output_symbol_hook)
5890 PARAMS ((bfd *, struct bfd_link_info *info, const char *,
5891 Elf_Internal_Sym *, asection *));
5892
5893 output_symbol_hook = get_elf_backend_data (finfo->output_bfd)->
5894 elf_backend_link_output_symbol_hook;
5895 if (output_symbol_hook != NULL)
5896 {
5897 if (! ((*output_symbol_hook)
5898 (finfo->output_bfd, finfo->info, name, elfsym, input_sec)))
5899 return FALSE;
5900 }
5901
5902 if (name == (const char *) NULL || *name == '\0')
5903 elfsym->st_name = 0;
5904 else if (input_sec->flags & SEC_EXCLUDE)
5905 elfsym->st_name = 0;
5906 else
5907 {
5908 elfsym->st_name = (unsigned long) _bfd_stringtab_add (finfo->symstrtab,
5909 name, TRUE, FALSE);
5910 if (elfsym->st_name == (unsigned long) -1)
5911 return FALSE;
5912 }
5913
5914 if (finfo->symbuf_count >= finfo->symbuf_size)
5915 {
5916 if (! elf_link_flush_output_syms (finfo))
5917 return FALSE;
5918 }
5919
5920 dest = finfo->symbuf + finfo->symbuf_count;
5921 destshndx = finfo->symshndxbuf;
5922 if (destshndx != NULL)
5923 {
5924 if (bfd_get_symcount (finfo->output_bfd) >= finfo->shndxbuf_size)
5925 {
5926 bfd_size_type amt;
5927
5928 amt = finfo->shndxbuf_size * sizeof (Elf_External_Sym_Shndx);
5929 finfo->symshndxbuf = destshndx = bfd_realloc (destshndx, amt * 2);
5930 if (destshndx == NULL)
5931 return FALSE;
5932 memset ((char *) destshndx + amt, 0, amt);
5933 finfo->shndxbuf_size *= 2;
5934 }
5935 destshndx += bfd_get_symcount (finfo->output_bfd);
5936 }
5937
5938 elf_swap_symbol_out (finfo->output_bfd, elfsym, (PTR) dest, (PTR) destshndx);
5939 finfo->symbuf_count += 1;
5940 bfd_get_symcount (finfo->output_bfd) += 1;
5941
5942 return TRUE;
5943 }
5944
5945 /* Flush the output symbols to the file. */
5946
5947 static bfd_boolean
5948 elf_link_flush_output_syms (finfo)
5949 struct elf_final_link_info *finfo;
5950 {
5951 if (finfo->symbuf_count > 0)
5952 {
5953 Elf_Internal_Shdr *hdr;
5954 file_ptr pos;
5955 bfd_size_type amt;
5956
5957 hdr = &elf_tdata (finfo->output_bfd)->symtab_hdr;
5958 pos = hdr->sh_offset + hdr->sh_size;
5959 amt = finfo->symbuf_count * sizeof (Elf_External_Sym);
5960 if (bfd_seek (finfo->output_bfd, pos, SEEK_SET) != 0
5961 || bfd_bwrite ((PTR) finfo->symbuf, amt, finfo->output_bfd) != amt)
5962 return FALSE;
5963
5964 hdr->sh_size += amt;
5965 finfo->symbuf_count = 0;
5966 }
5967
5968 return TRUE;
5969 }
5970
5971 /* Adjust all external symbols pointing into SEC_MERGE sections
5972 to reflect the object merging within the sections. */
5973
5974 static bfd_boolean
5975 elf_link_sec_merge_syms (h, data)
5976 struct elf_link_hash_entry *h;
5977 PTR data;
5978 {
5979 asection *sec;
5980
5981 if (h->root.type == bfd_link_hash_warning)
5982 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5983
5984 if ((h->root.type == bfd_link_hash_defined
5985 || h->root.type == bfd_link_hash_defweak)
5986 && ((sec = h->root.u.def.section)->flags & SEC_MERGE)
5987 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
5988 {
5989 bfd *output_bfd = (bfd *) data;
5990
5991 h->root.u.def.value =
5992 _bfd_merged_section_offset (output_bfd,
5993 &h->root.u.def.section,
5994 elf_section_data (sec)->sec_info,
5995 h->root.u.def.value, (bfd_vma) 0);
5996 }
5997
5998 return TRUE;
5999 }
6000
6001 /* For DSOs loaded in via a DT_NEEDED entry, emulate ld.so in
6002 allowing an unsatisfied unversioned symbol in the DSO to match a
6003 versioned symbol that would normally require an explicit version. */
6004
6005 static bfd_boolean
6006 elf_link_check_versioned_symbol (info, h)
6007 struct bfd_link_info *info;
6008 struct elf_link_hash_entry *h;
6009 {
6010 bfd *undef_bfd = h->root.u.undef.abfd;
6011 struct elf_link_loaded_list *loaded;
6012
6013 if ((undef_bfd->flags & DYNAMIC) == 0
6014 || info->hash->creator->flavour != bfd_target_elf_flavour
6015 || elf_dt_soname (h->root.u.undef.abfd) == NULL)
6016 return FALSE;
6017
6018 for (loaded = elf_hash_table (info)->loaded;
6019 loaded != NULL;
6020 loaded = loaded->next)
6021 {
6022 bfd *input;
6023 Elf_Internal_Shdr *hdr;
6024 bfd_size_type symcount;
6025 bfd_size_type extsymcount;
6026 bfd_size_type extsymoff;
6027 Elf_Internal_Shdr *versymhdr;
6028 Elf_Internal_Sym *isym;
6029 Elf_Internal_Sym *isymend;
6030 Elf_Internal_Sym *isymbuf;
6031 Elf_External_Versym *ever;
6032 Elf_External_Versym *extversym;
6033
6034 input = loaded->abfd;
6035
6036 /* We check each DSO for a possible hidden versioned definition. */
6037 if (input == undef_bfd
6038 || (input->flags & DYNAMIC) == 0
6039 || elf_dynversym (input) == 0)
6040 continue;
6041
6042 hdr = &elf_tdata (input)->dynsymtab_hdr;
6043
6044 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
6045 if (elf_bad_symtab (input))
6046 {
6047 extsymcount = symcount;
6048 extsymoff = 0;
6049 }
6050 else
6051 {
6052 extsymcount = symcount - hdr->sh_info;
6053 extsymoff = hdr->sh_info;
6054 }
6055
6056 if (extsymcount == 0)
6057 continue;
6058
6059 isymbuf = bfd_elf_get_elf_syms (input, hdr, extsymcount, extsymoff,
6060 NULL, NULL, NULL);
6061 if (isymbuf == NULL)
6062 return FALSE;
6063
6064 /* Read in any version definitions. */
6065 versymhdr = &elf_tdata (input)->dynversym_hdr;
6066 extversym = (Elf_External_Versym *) bfd_malloc (versymhdr->sh_size);
6067 if (extversym == NULL)
6068 goto error_ret;
6069
6070 if (bfd_seek (input, versymhdr->sh_offset, SEEK_SET) != 0
6071 || (bfd_bread ((PTR) extversym, versymhdr->sh_size, input)
6072 != versymhdr->sh_size))
6073 {
6074 free (extversym);
6075 error_ret:
6076 free (isymbuf);
6077 return FALSE;
6078 }
6079
6080 ever = extversym + extsymoff;
6081 isymend = isymbuf + extsymcount;
6082 for (isym = isymbuf; isym < isymend; isym++, ever++)
6083 {
6084 const char *name;
6085 Elf_Internal_Versym iver;
6086
6087 if (ELF_ST_BIND (isym->st_info) == STB_LOCAL
6088 || isym->st_shndx == SHN_UNDEF)
6089 continue;
6090
6091 name = bfd_elf_string_from_elf_section (input,
6092 hdr->sh_link,
6093 isym->st_name);
6094 if (strcmp (name, h->root.root.string) != 0)
6095 continue;
6096
6097 _bfd_elf_swap_versym_in (input, ever, &iver);
6098
6099 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
6100 {
6101 /* If we have a non-hidden versioned sym, then it should
6102 have provided a definition for the undefined sym. */
6103 abort ();
6104 }
6105
6106 if ((iver.vs_vers & VERSYM_VERSION) == 2)
6107 {
6108 /* This is the oldest (default) sym. We can use it. */
6109 free (extversym);
6110 free (isymbuf);
6111 return TRUE;
6112 }
6113 }
6114
6115 free (extversym);
6116 free (isymbuf);
6117 }
6118
6119 return FALSE;
6120 }
6121
6122 /* Add an external symbol to the symbol table. This is called from
6123 the hash table traversal routine. When generating a shared object,
6124 we go through the symbol table twice. The first time we output
6125 anything that might have been forced to local scope in a version
6126 script. The second time we output the symbols that are still
6127 global symbols. */
6128
6129 static bfd_boolean
6130 elf_link_output_extsym (h, data)
6131 struct elf_link_hash_entry *h;
6132 PTR data;
6133 {
6134 struct elf_outext_info *eoinfo = (struct elf_outext_info *) data;
6135 struct elf_final_link_info *finfo = eoinfo->finfo;
6136 bfd_boolean strip;
6137 Elf_Internal_Sym sym;
6138 asection *input_sec;
6139
6140 if (h->root.type == bfd_link_hash_warning)
6141 {
6142 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6143 if (h->root.type == bfd_link_hash_new)
6144 return TRUE;
6145 }
6146
6147 /* Decide whether to output this symbol in this pass. */
6148 if (eoinfo->localsyms)
6149 {
6150 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
6151 return TRUE;
6152 }
6153 else
6154 {
6155 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
6156 return TRUE;
6157 }
6158
6159 /* If we are not creating a shared library, and this symbol is
6160 referenced by a shared library but is not defined anywhere, then
6161 warn that it is undefined. If we do not do this, the runtime
6162 linker will complain that the symbol is undefined when the
6163 program is run. We don't have to worry about symbols that are
6164 referenced by regular files, because we will already have issued
6165 warnings for them. */
6166 if (! finfo->info->relocateable
6167 && (! finfo->info->shared || ! finfo->info->allow_shlib_undefined)
6168 && h->root.type == bfd_link_hash_undefined
6169 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0
6170 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0
6171 && ! elf_link_check_versioned_symbol (finfo->info, h))
6172 {
6173 if (! ((*finfo->info->callbacks->undefined_symbol)
6174 (finfo->info, h->root.root.string, h->root.u.undef.abfd,
6175 (asection *) NULL, (bfd_vma) 0, TRUE)))
6176 {
6177 eoinfo->failed = TRUE;
6178 return FALSE;
6179 }
6180 }
6181
6182 /* We don't want to output symbols that have never been mentioned by
6183 a regular file, or that we have been told to strip. However, if
6184 h->indx is set to -2, the symbol is used by a reloc and we must
6185 output it. */
6186 if (h->indx == -2)
6187 strip = FALSE;
6188 else if (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
6189 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0)
6190 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
6191 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0)
6192 strip = TRUE;
6193 else if (finfo->info->strip == strip_all)
6194 strip = TRUE;
6195 else if (finfo->info->strip == strip_some
6196 && bfd_hash_lookup (finfo->info->keep_hash,
6197 h->root.root.string, FALSE, FALSE) == NULL)
6198 strip = TRUE;
6199 else if (finfo->info->strip_discarded
6200 && (h->root.type == bfd_link_hash_defined
6201 || h->root.type == bfd_link_hash_defweak)
6202 && elf_discarded_section (h->root.u.def.section))
6203 strip = TRUE;
6204 else
6205 strip = FALSE;
6206
6207 /* If we're stripping it, and it's not a dynamic symbol, there's
6208 nothing else to do unless it is a forced local symbol. */
6209 if (strip
6210 && h->dynindx == -1
6211 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
6212 return TRUE;
6213
6214 sym.st_value = 0;
6215 sym.st_size = h->size;
6216 sym.st_other = h->other;
6217 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
6218 sym.st_info = ELF_ST_INFO (STB_LOCAL, h->type);
6219 else if (h->root.type == bfd_link_hash_undefweak
6220 || h->root.type == bfd_link_hash_defweak)
6221 sym.st_info = ELF_ST_INFO (STB_WEAK, h->type);
6222 else
6223 sym.st_info = ELF_ST_INFO (STB_GLOBAL, h->type);
6224
6225 switch (h->root.type)
6226 {
6227 default:
6228 case bfd_link_hash_new:
6229 case bfd_link_hash_warning:
6230 abort ();
6231 return FALSE;
6232
6233 case bfd_link_hash_undefined:
6234 case bfd_link_hash_undefweak:
6235 input_sec = bfd_und_section_ptr;
6236 sym.st_shndx = SHN_UNDEF;
6237 break;
6238
6239 case bfd_link_hash_defined:
6240 case bfd_link_hash_defweak:
6241 {
6242 input_sec = h->root.u.def.section;
6243 if (input_sec->output_section != NULL)
6244 {
6245 sym.st_shndx =
6246 _bfd_elf_section_from_bfd_section (finfo->output_bfd,
6247 input_sec->output_section);
6248 if (sym.st_shndx == SHN_BAD)
6249 {
6250 (*_bfd_error_handler)
6251 (_("%s: could not find output section %s for input section %s"),
6252 bfd_get_filename (finfo->output_bfd),
6253 input_sec->output_section->name,
6254 input_sec->name);
6255 eoinfo->failed = TRUE;
6256 return FALSE;
6257 }
6258
6259 /* ELF symbols in relocateable files are section relative,
6260 but in nonrelocateable files they are virtual
6261 addresses. */
6262 sym.st_value = h->root.u.def.value + input_sec->output_offset;
6263 if (! finfo->info->relocateable)
6264 {
6265 sym.st_value += input_sec->output_section->vma;
6266 if (h->type == STT_TLS)
6267 {
6268 /* STT_TLS symbols are relative to PT_TLS segment
6269 base. */
6270 BFD_ASSERT (finfo->first_tls_sec != NULL);
6271 sym.st_value -= finfo->first_tls_sec->vma;
6272 }
6273 }
6274 }
6275 else
6276 {
6277 BFD_ASSERT (input_sec->owner == NULL
6278 || (input_sec->owner->flags & DYNAMIC) != 0);
6279 sym.st_shndx = SHN_UNDEF;
6280 input_sec = bfd_und_section_ptr;
6281 }
6282 }
6283 break;
6284
6285 case bfd_link_hash_common:
6286 input_sec = h->root.u.c.p->section;
6287 sym.st_shndx = SHN_COMMON;
6288 sym.st_value = 1 << h->root.u.c.p->alignment_power;
6289 break;
6290
6291 case bfd_link_hash_indirect:
6292 /* These symbols are created by symbol versioning. They point
6293 to the decorated version of the name. For example, if the
6294 symbol foo@@GNU_1.2 is the default, which should be used when
6295 foo is used with no version, then we add an indirect symbol
6296 foo which points to foo@@GNU_1.2. We ignore these symbols,
6297 since the indirected symbol is already in the hash table. */
6298 return TRUE;
6299 }
6300
6301 /* Give the processor backend a chance to tweak the symbol value,
6302 and also to finish up anything that needs to be done for this
6303 symbol. FIXME: Not calling elf_backend_finish_dynamic_symbol for
6304 forced local syms when non-shared is due to a historical quirk. */
6305 if ((h->dynindx != -1
6306 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
6307 && (finfo->info->shared
6308 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
6309 && elf_hash_table (finfo->info)->dynamic_sections_created)
6310 {
6311 struct elf_backend_data *bed;
6312
6313 bed = get_elf_backend_data (finfo->output_bfd);
6314 if (! ((*bed->elf_backend_finish_dynamic_symbol)
6315 (finfo->output_bfd, finfo->info, h, &sym)))
6316 {
6317 eoinfo->failed = TRUE;
6318 return FALSE;
6319 }
6320 }
6321
6322 /* If we are marking the symbol as undefined, and there are no
6323 non-weak references to this symbol from a regular object, then
6324 mark the symbol as weak undefined; if there are non-weak
6325 references, mark the symbol as strong. We can't do this earlier,
6326 because it might not be marked as undefined until the
6327 finish_dynamic_symbol routine gets through with it. */
6328 if (sym.st_shndx == SHN_UNDEF
6329 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
6330 && (ELF_ST_BIND (sym.st_info) == STB_GLOBAL
6331 || ELF_ST_BIND (sym.st_info) == STB_WEAK))
6332 {
6333 int bindtype;
6334
6335 if ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR_NONWEAK) != 0)
6336 bindtype = STB_GLOBAL;
6337 else
6338 bindtype = STB_WEAK;
6339 sym.st_info = ELF_ST_INFO (bindtype, ELF_ST_TYPE (sym.st_info));
6340 }
6341
6342 /* If a symbol is not defined locally, we clear the visibility field. */
6343 if (! finfo->info->relocateable
6344 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
6345 sym.st_other &= ~ ELF_ST_VISIBILITY (-1);
6346
6347 /* If this symbol should be put in the .dynsym section, then put it
6348 there now. We already know the symbol index. We also fill in
6349 the entry in the .hash section. */
6350 if (h->dynindx != -1
6351 && elf_hash_table (finfo->info)->dynamic_sections_created)
6352 {
6353 size_t bucketcount;
6354 size_t bucket;
6355 size_t hash_entry_size;
6356 bfd_byte *bucketpos;
6357 bfd_vma chain;
6358 Elf_External_Sym *esym;
6359
6360 sym.st_name = h->dynstr_index;
6361 esym = (Elf_External_Sym *) finfo->dynsym_sec->contents + h->dynindx;
6362 elf_swap_symbol_out (finfo->output_bfd, &sym, (PTR) esym, (PTR) 0);
6363
6364 bucketcount = elf_hash_table (finfo->info)->bucketcount;
6365 bucket = h->elf_hash_value % bucketcount;
6366 hash_entry_size
6367 = elf_section_data (finfo->hash_sec)->this_hdr.sh_entsize;
6368 bucketpos = ((bfd_byte *) finfo->hash_sec->contents
6369 + (bucket + 2) * hash_entry_size);
6370 chain = bfd_get (8 * hash_entry_size, finfo->output_bfd, bucketpos);
6371 bfd_put (8 * hash_entry_size, finfo->output_bfd, (bfd_vma) h->dynindx,
6372 bucketpos);
6373 bfd_put (8 * hash_entry_size, finfo->output_bfd, chain,
6374 ((bfd_byte *) finfo->hash_sec->contents
6375 + (bucketcount + 2 + h->dynindx) * hash_entry_size));
6376
6377 if (finfo->symver_sec != NULL && finfo->symver_sec->contents != NULL)
6378 {
6379 Elf_Internal_Versym iversym;
6380 Elf_External_Versym *eversym;
6381
6382 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
6383 {
6384 if (h->verinfo.verdef == NULL)
6385 iversym.vs_vers = 0;
6386 else
6387 iversym.vs_vers = h->verinfo.verdef->vd_exp_refno + 1;
6388 }
6389 else
6390 {
6391 if (h->verinfo.vertree == NULL)
6392 iversym.vs_vers = 1;
6393 else
6394 iversym.vs_vers = h->verinfo.vertree->vernum + 1;
6395 }
6396
6397 if ((h->elf_link_hash_flags & ELF_LINK_HIDDEN) != 0)
6398 iversym.vs_vers |= VERSYM_HIDDEN;
6399
6400 eversym = (Elf_External_Versym *) finfo->symver_sec->contents;
6401 eversym += h->dynindx;
6402 _bfd_elf_swap_versym_out (finfo->output_bfd, &iversym, eversym);
6403 }
6404 }
6405
6406 /* If we're stripping it, then it was just a dynamic symbol, and
6407 there's nothing else to do. */
6408 if (strip || (input_sec->flags & SEC_EXCLUDE) != 0)
6409 return TRUE;
6410
6411 h->indx = bfd_get_symcount (finfo->output_bfd);
6412
6413 if (! elf_link_output_sym (finfo, h->root.root.string, &sym, input_sec))
6414 {
6415 eoinfo->failed = TRUE;
6416 return FALSE;
6417 }
6418
6419 return TRUE;
6420 }
6421
6422 /* Copy the relocations indicated by the INTERNAL_RELOCS (which
6423 originated from the section given by INPUT_REL_HDR) to the
6424 OUTPUT_BFD. */
6425
6426 static bfd_boolean
6427 elf_link_output_relocs (output_bfd, input_section, input_rel_hdr,
6428 internal_relocs)
6429 bfd *output_bfd;
6430 asection *input_section;
6431 Elf_Internal_Shdr *input_rel_hdr;
6432 Elf_Internal_Rela *internal_relocs;
6433 {
6434 Elf_Internal_Rela *irela;
6435 Elf_Internal_Rela *irelaend;
6436 bfd_byte *erel;
6437 Elf_Internal_Shdr *output_rel_hdr;
6438 asection *output_section;
6439 unsigned int *rel_countp = NULL;
6440 struct elf_backend_data *bed;
6441 void (*swap_out) PARAMS ((bfd *, const Elf_Internal_Rela *, bfd_byte *));
6442
6443 output_section = input_section->output_section;
6444 output_rel_hdr = NULL;
6445
6446 if (elf_section_data (output_section)->rel_hdr.sh_entsize
6447 == input_rel_hdr->sh_entsize)
6448 {
6449 output_rel_hdr = &elf_section_data (output_section)->rel_hdr;
6450 rel_countp = &elf_section_data (output_section)->rel_count;
6451 }
6452 else if (elf_section_data (output_section)->rel_hdr2
6453 && (elf_section_data (output_section)->rel_hdr2->sh_entsize
6454 == input_rel_hdr->sh_entsize))
6455 {
6456 output_rel_hdr = elf_section_data (output_section)->rel_hdr2;
6457 rel_countp = &elf_section_data (output_section)->rel_count2;
6458 }
6459 else
6460 {
6461 (*_bfd_error_handler)
6462 (_("%s: relocation size mismatch in %s section %s"),
6463 bfd_get_filename (output_bfd),
6464 bfd_archive_filename (input_section->owner),
6465 input_section->name);
6466 bfd_set_error (bfd_error_wrong_object_format);
6467 return FALSE;
6468 }
6469
6470 bed = get_elf_backend_data (output_bfd);
6471 if (input_rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
6472 swap_out = bed->s->swap_reloc_out;
6473 else if (input_rel_hdr->sh_entsize == sizeof (Elf_External_Rela))
6474 swap_out = bed->s->swap_reloca_out;
6475 else
6476 abort ();
6477
6478 erel = output_rel_hdr->contents;
6479 erel += *rel_countp * input_rel_hdr->sh_entsize;
6480 irela = internal_relocs;
6481 irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr)
6482 * bed->s->int_rels_per_ext_rel);
6483 while (irela < irelaend)
6484 {
6485 (*swap_out) (output_bfd, irela, erel);
6486 irela += bed->s->int_rels_per_ext_rel;
6487 erel += input_rel_hdr->sh_entsize;
6488 }
6489
6490 /* Bump the counter, so that we know where to add the next set of
6491 relocations. */
6492 *rel_countp += NUM_SHDR_ENTRIES (input_rel_hdr);
6493
6494 return TRUE;
6495 }
6496
6497 /* Link an input file into the linker output file. This function
6498 handles all the sections and relocations of the input file at once.
6499 This is so that we only have to read the local symbols once, and
6500 don't have to keep them in memory. */
6501
6502 static bfd_boolean
6503 elf_link_input_bfd (finfo, input_bfd)
6504 struct elf_final_link_info *finfo;
6505 bfd *input_bfd;
6506 {
6507 bfd_boolean (*relocate_section)
6508 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
6509 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
6510 bfd *output_bfd;
6511 Elf_Internal_Shdr *symtab_hdr;
6512 size_t locsymcount;
6513 size_t extsymoff;
6514 Elf_Internal_Sym *isymbuf;
6515 Elf_Internal_Sym *isym;
6516 Elf_Internal_Sym *isymend;
6517 long *pindex;
6518 asection **ppsection;
6519 asection *o;
6520 struct elf_backend_data *bed;
6521 bfd_boolean emit_relocs;
6522 struct elf_link_hash_entry **sym_hashes;
6523
6524 output_bfd = finfo->output_bfd;
6525 bed = get_elf_backend_data (output_bfd);
6526 relocate_section = bed->elf_backend_relocate_section;
6527
6528 /* If this is a dynamic object, we don't want to do anything here:
6529 we don't want the local symbols, and we don't want the section
6530 contents. */
6531 if ((input_bfd->flags & DYNAMIC) != 0)
6532 return TRUE;
6533
6534 emit_relocs = (finfo->info->relocateable
6535 || finfo->info->emitrelocations
6536 || bed->elf_backend_emit_relocs);
6537
6538 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6539 if (elf_bad_symtab (input_bfd))
6540 {
6541 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
6542 extsymoff = 0;
6543 }
6544 else
6545 {
6546 locsymcount = symtab_hdr->sh_info;
6547 extsymoff = symtab_hdr->sh_info;
6548 }
6549
6550 /* Read the local symbols. */
6551 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6552 if (isymbuf == NULL && locsymcount != 0)
6553 {
6554 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, locsymcount, 0,
6555 finfo->internal_syms,
6556 finfo->external_syms,
6557 finfo->locsym_shndx);
6558 if (isymbuf == NULL)
6559 return FALSE;
6560 }
6561
6562 /* Find local symbol sections and adjust values of symbols in
6563 SEC_MERGE sections. Write out those local symbols we know are
6564 going into the output file. */
6565 isymend = isymbuf + locsymcount;
6566 for (isym = isymbuf, pindex = finfo->indices, ppsection = finfo->sections;
6567 isym < isymend;
6568 isym++, pindex++, ppsection++)
6569 {
6570 asection *isec;
6571 const char *name;
6572 Elf_Internal_Sym osym;
6573
6574 *pindex = -1;
6575
6576 if (elf_bad_symtab (input_bfd))
6577 {
6578 if (ELF_ST_BIND (isym->st_info) != STB_LOCAL)
6579 {
6580 *ppsection = NULL;
6581 continue;
6582 }
6583 }
6584
6585 if (isym->st_shndx == SHN_UNDEF)
6586 isec = bfd_und_section_ptr;
6587 else if (isym->st_shndx < SHN_LORESERVE
6588 || isym->st_shndx > SHN_HIRESERVE)
6589 {
6590 isec = section_from_elf_index (input_bfd, isym->st_shndx);
6591 if (isec
6592 && isec->sec_info_type == ELF_INFO_TYPE_MERGE
6593 && ELF_ST_TYPE (isym->st_info) != STT_SECTION)
6594 isym->st_value =
6595 _bfd_merged_section_offset (output_bfd, &isec,
6596 elf_section_data (isec)->sec_info,
6597 isym->st_value, (bfd_vma) 0);
6598 }
6599 else if (isym->st_shndx == SHN_ABS)
6600 isec = bfd_abs_section_ptr;
6601 else if (isym->st_shndx == SHN_COMMON)
6602 isec = bfd_com_section_ptr;
6603 else
6604 {
6605 /* Who knows? */
6606 isec = NULL;
6607 }
6608
6609 *ppsection = isec;
6610
6611 /* Don't output the first, undefined, symbol. */
6612 if (ppsection == finfo->sections)
6613 continue;
6614
6615 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
6616 {
6617 /* We never output section symbols. Instead, we use the
6618 section symbol of the corresponding section in the output
6619 file. */
6620 continue;
6621 }
6622
6623 /* If we are stripping all symbols, we don't want to output this
6624 one. */
6625 if (finfo->info->strip == strip_all)
6626 continue;
6627
6628 /* If we are discarding all local symbols, we don't want to
6629 output this one. If we are generating a relocateable output
6630 file, then some of the local symbols may be required by
6631 relocs; we output them below as we discover that they are
6632 needed. */
6633 if (finfo->info->discard == discard_all)
6634 continue;
6635
6636 /* If this symbol is defined in a section which we are
6637 discarding, we don't need to keep it, but note that
6638 linker_mark is only reliable for sections that have contents.
6639 For the benefit of the MIPS ELF linker, we check SEC_EXCLUDE
6640 as well as linker_mark. */
6641 if ((isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
6642 && isec != NULL
6643 && ((! isec->linker_mark && (isec->flags & SEC_HAS_CONTENTS) != 0)
6644 || (! finfo->info->relocateable
6645 && (isec->flags & SEC_EXCLUDE) != 0)))
6646 continue;
6647
6648 /* Get the name of the symbol. */
6649 name = bfd_elf_string_from_elf_section (input_bfd, symtab_hdr->sh_link,
6650 isym->st_name);
6651 if (name == NULL)
6652 return FALSE;
6653
6654 /* See if we are discarding symbols with this name. */
6655 if ((finfo->info->strip == strip_some
6656 && (bfd_hash_lookup (finfo->info->keep_hash, name, FALSE, FALSE)
6657 == NULL))
6658 || (((finfo->info->discard == discard_sec_merge
6659 && (isec->flags & SEC_MERGE) && ! finfo->info->relocateable)
6660 || finfo->info->discard == discard_l)
6661 && bfd_is_local_label_name (input_bfd, name)))
6662 continue;
6663
6664 /* If we get here, we are going to output this symbol. */
6665
6666 osym = *isym;
6667
6668 /* Adjust the section index for the output file. */
6669 osym.st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
6670 isec->output_section);
6671 if (osym.st_shndx == SHN_BAD)
6672 return FALSE;
6673
6674 *pindex = bfd_get_symcount (output_bfd);
6675
6676 /* ELF symbols in relocateable files are section relative, but
6677 in executable files they are virtual addresses. Note that
6678 this code assumes that all ELF sections have an associated
6679 BFD section with a reasonable value for output_offset; below
6680 we assume that they also have a reasonable value for
6681 output_section. Any special sections must be set up to meet
6682 these requirements. */
6683 osym.st_value += isec->output_offset;
6684 if (! finfo->info->relocateable)
6685 {
6686 osym.st_value += isec->output_section->vma;
6687 if (ELF_ST_TYPE (osym.st_info) == STT_TLS)
6688 {
6689 /* STT_TLS symbols are relative to PT_TLS segment base. */
6690 BFD_ASSERT (finfo->first_tls_sec != NULL);
6691 osym.st_value -= finfo->first_tls_sec->vma;
6692 }
6693 }
6694
6695 if (! elf_link_output_sym (finfo, name, &osym, isec))
6696 return FALSE;
6697 }
6698
6699 /* Relocate the contents of each section. */
6700 sym_hashes = elf_sym_hashes (input_bfd);
6701 for (o = input_bfd->sections; o != NULL; o = o->next)
6702 {
6703 bfd_byte *contents;
6704
6705 if (! o->linker_mark)
6706 {
6707 /* This section was omitted from the link. */
6708 continue;
6709 }
6710
6711 if ((o->flags & SEC_HAS_CONTENTS) == 0
6712 || (o->_raw_size == 0 && (o->flags & SEC_RELOC) == 0))
6713 continue;
6714
6715 if ((o->flags & SEC_LINKER_CREATED) != 0)
6716 {
6717 /* Section was created by elf_link_create_dynamic_sections
6718 or somesuch. */
6719 continue;
6720 }
6721
6722 /* Get the contents of the section. They have been cached by a
6723 relaxation routine. Note that o is a section in an input
6724 file, so the contents field will not have been set by any of
6725 the routines which work on output files. */
6726 if (elf_section_data (o)->this_hdr.contents != NULL)
6727 contents = elf_section_data (o)->this_hdr.contents;
6728 else
6729 {
6730 contents = finfo->contents;
6731 if (! bfd_get_section_contents (input_bfd, o, contents,
6732 (file_ptr) 0, o->_raw_size))
6733 return FALSE;
6734 }
6735
6736 if ((o->flags & SEC_RELOC) != 0)
6737 {
6738 Elf_Internal_Rela *internal_relocs;
6739
6740 /* Get the swapped relocs. */
6741 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
6742 (input_bfd, o, finfo->external_relocs,
6743 finfo->internal_relocs, FALSE));
6744 if (internal_relocs == NULL
6745 && o->reloc_count > 0)
6746 return FALSE;
6747
6748 /* Run through the relocs looking for any against symbols
6749 from discarded sections and section symbols from
6750 removed link-once sections. Complain about relocs
6751 against discarded sections. Zero relocs against removed
6752 link-once sections. */
6753 if (!finfo->info->relocateable
6754 && !elf_section_ignore_discarded_relocs (o))
6755 {
6756 Elf_Internal_Rela *rel, *relend;
6757
6758 rel = internal_relocs;
6759 relend = rel + o->reloc_count * bed->s->int_rels_per_ext_rel;
6760 for ( ; rel < relend; rel++)
6761 {
6762 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
6763
6764 if (r_symndx >= locsymcount
6765 || (elf_bad_symtab (input_bfd)
6766 && finfo->sections[r_symndx] == NULL))
6767 {
6768 struct elf_link_hash_entry *h;
6769
6770 h = sym_hashes[r_symndx - extsymoff];
6771 while (h->root.type == bfd_link_hash_indirect
6772 || h->root.type == bfd_link_hash_warning)
6773 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6774
6775 /* Complain if the definition comes from a
6776 discarded section. */
6777 if ((h->root.type == bfd_link_hash_defined
6778 || h->root.type == bfd_link_hash_defweak)
6779 && elf_discarded_section (h->root.u.def.section))
6780 {
6781 if ((o->flags & SEC_DEBUGGING) != 0)
6782 {
6783 BFD_ASSERT (r_symndx != 0);
6784 memset (rel, 0, sizeof (*rel));
6785 }
6786 else
6787 {
6788 if (! ((*finfo->info->callbacks->undefined_symbol)
6789 (finfo->info, h->root.root.string,
6790 input_bfd, o, rel->r_offset,
6791 TRUE)))
6792 return FALSE;
6793 }
6794 }
6795 }
6796 else
6797 {
6798 asection *sec = finfo->sections[r_symndx];
6799
6800 if (sec != NULL && elf_discarded_section (sec))
6801 {
6802 if ((o->flags & SEC_DEBUGGING) != 0
6803 || (sec->flags & SEC_LINK_ONCE) != 0)
6804 {
6805 BFD_ASSERT (r_symndx != 0);
6806 rel->r_info
6807 = ELF_R_INFO (0, ELF_R_TYPE (rel->r_info));
6808 rel->r_addend = 0;
6809 }
6810 else
6811 {
6812 bfd_boolean ok;
6813 const char *msg
6814 = _("local symbols in discarded section %s");
6815 bfd_size_type amt
6816 = strlen (sec->name) + strlen (msg) - 1;
6817 char *buf = (char *) bfd_malloc (amt);
6818
6819 if (buf != NULL)
6820 sprintf (buf, msg, sec->name);
6821 else
6822 buf = (char *) sec->name;
6823 ok = (*finfo->info->callbacks
6824 ->undefined_symbol) (finfo->info, buf,
6825 input_bfd, o,
6826 rel->r_offset,
6827 TRUE);
6828 if (buf != sec->name)
6829 free (buf);
6830 if (!ok)
6831 return FALSE;
6832 }
6833 }
6834 }
6835 }
6836 }
6837
6838 /* Relocate the section by invoking a back end routine.
6839
6840 The back end routine is responsible for adjusting the
6841 section contents as necessary, and (if using Rela relocs
6842 and generating a relocateable output file) adjusting the
6843 reloc addend as necessary.
6844
6845 The back end routine does not have to worry about setting
6846 the reloc address or the reloc symbol index.
6847
6848 The back end routine is given a pointer to the swapped in
6849 internal symbols, and can access the hash table entries
6850 for the external symbols via elf_sym_hashes (input_bfd).
6851
6852 When generating relocateable output, the back end routine
6853 must handle STB_LOCAL/STT_SECTION symbols specially. The
6854 output symbol is going to be a section symbol
6855 corresponding to the output section, which will require
6856 the addend to be adjusted. */
6857
6858 if (! (*relocate_section) (output_bfd, finfo->info,
6859 input_bfd, o, contents,
6860 internal_relocs,
6861 isymbuf,
6862 finfo->sections))
6863 return FALSE;
6864
6865 if (emit_relocs)
6866 {
6867 Elf_Internal_Rela *irela;
6868 Elf_Internal_Rela *irelaend;
6869 bfd_vma last_offset;
6870 struct elf_link_hash_entry **rel_hash;
6871 Elf_Internal_Shdr *input_rel_hdr, *input_rel_hdr2;
6872 unsigned int next_erel;
6873 bfd_boolean (*reloc_emitter)
6874 PARAMS ((bfd *, asection *, Elf_Internal_Shdr *,
6875 Elf_Internal_Rela *));
6876 bfd_boolean rela_normal;
6877
6878 input_rel_hdr = &elf_section_data (o)->rel_hdr;
6879 rela_normal = (bed->rela_normal
6880 && (input_rel_hdr->sh_entsize
6881 == sizeof (Elf_External_Rela)));
6882
6883 /* Adjust the reloc addresses and symbol indices. */
6884
6885 irela = internal_relocs;
6886 irelaend = irela + o->reloc_count * bed->s->int_rels_per_ext_rel;
6887 rel_hash = (elf_section_data (o->output_section)->rel_hashes
6888 + elf_section_data (o->output_section)->rel_count
6889 + elf_section_data (o->output_section)->rel_count2);
6890 last_offset = o->output_offset;
6891 if (!finfo->info->relocateable)
6892 last_offset += o->output_section->vma;
6893 for (next_erel = 0; irela < irelaend; irela++, next_erel++)
6894 {
6895 unsigned long r_symndx;
6896 asection *sec;
6897 Elf_Internal_Sym sym;
6898
6899 if (next_erel == bed->s->int_rels_per_ext_rel)
6900 {
6901 rel_hash++;
6902 next_erel = 0;
6903 }
6904
6905 irela->r_offset = _bfd_elf_section_offset (output_bfd,
6906 finfo->info, o,
6907 irela->r_offset);
6908 if (irela->r_offset >= (bfd_vma) -2)
6909 {
6910 /* This is a reloc for a deleted entry or somesuch.
6911 Turn it into an R_*_NONE reloc, at the same
6912 offset as the last reloc. elf_eh_frame.c and
6913 elf_bfd_discard_info rely on reloc offsets
6914 being ordered. */
6915 irela->r_offset = last_offset;
6916 irela->r_info = 0;
6917 irela->r_addend = 0;
6918 continue;
6919 }
6920
6921 irela->r_offset += o->output_offset;
6922
6923 /* Relocs in an executable have to be virtual addresses. */
6924 if (!finfo->info->relocateable)
6925 irela->r_offset += o->output_section->vma;
6926
6927 last_offset = irela->r_offset;
6928
6929 r_symndx = ELF_R_SYM (irela->r_info);
6930 if (r_symndx == STN_UNDEF)
6931 continue;
6932
6933 if (r_symndx >= locsymcount
6934 || (elf_bad_symtab (input_bfd)
6935 && finfo->sections[r_symndx] == NULL))
6936 {
6937 struct elf_link_hash_entry *rh;
6938 unsigned long indx;
6939
6940 /* This is a reloc against a global symbol. We
6941 have not yet output all the local symbols, so
6942 we do not know the symbol index of any global
6943 symbol. We set the rel_hash entry for this
6944 reloc to point to the global hash table entry
6945 for this symbol. The symbol index is then
6946 set at the end of elf_bfd_final_link. */
6947 indx = r_symndx - extsymoff;
6948 rh = elf_sym_hashes (input_bfd)[indx];
6949 while (rh->root.type == bfd_link_hash_indirect
6950 || rh->root.type == bfd_link_hash_warning)
6951 rh = (struct elf_link_hash_entry *) rh->root.u.i.link;
6952
6953 /* Setting the index to -2 tells
6954 elf_link_output_extsym that this symbol is
6955 used by a reloc. */
6956 BFD_ASSERT (rh->indx < 0);
6957 rh->indx = -2;
6958
6959 *rel_hash = rh;
6960
6961 continue;
6962 }
6963
6964 /* This is a reloc against a local symbol. */
6965
6966 *rel_hash = NULL;
6967 sym = isymbuf[r_symndx];
6968 sec = finfo->sections[r_symndx];
6969 if (ELF_ST_TYPE (sym.st_info) == STT_SECTION)
6970 {
6971 /* I suppose the backend ought to fill in the
6972 section of any STT_SECTION symbol against a
6973 processor specific section. If we have
6974 discarded a section, the output_section will
6975 be the absolute section. */
6976 if (bfd_is_abs_section (sec)
6977 || (sec != NULL
6978 && bfd_is_abs_section (sec->output_section)))
6979 r_symndx = 0;
6980 else if (sec == NULL || sec->owner == NULL)
6981 {
6982 bfd_set_error (bfd_error_bad_value);
6983 return FALSE;
6984 }
6985 else
6986 {
6987 r_symndx = sec->output_section->target_index;
6988 BFD_ASSERT (r_symndx != 0);
6989 }
6990
6991 /* Adjust the addend according to where the
6992 section winds up in the output section. */
6993 if (rela_normal)
6994 irela->r_addend += sec->output_offset;
6995 }
6996 else
6997 {
6998 if (finfo->indices[r_symndx] == -1)
6999 {
7000 unsigned long shlink;
7001 const char *name;
7002 asection *osec;
7003
7004 if (finfo->info->strip == strip_all)
7005 {
7006 /* You can't do ld -r -s. */
7007 bfd_set_error (bfd_error_invalid_operation);
7008 return FALSE;
7009 }
7010
7011 /* This symbol was skipped earlier, but
7012 since it is needed by a reloc, we
7013 must output it now. */
7014 shlink = symtab_hdr->sh_link;
7015 name = (bfd_elf_string_from_elf_section
7016 (input_bfd, shlink, sym.st_name));
7017 if (name == NULL)
7018 return FALSE;
7019
7020 osec = sec->output_section;
7021 sym.st_shndx =
7022 _bfd_elf_section_from_bfd_section (output_bfd,
7023 osec);
7024 if (sym.st_shndx == SHN_BAD)
7025 return FALSE;
7026
7027 sym.st_value += sec->output_offset;
7028 if (! finfo->info->relocateable)
7029 {
7030 sym.st_value += osec->vma;
7031 if (ELF_ST_TYPE (sym.st_info) == STT_TLS)
7032 {
7033 /* STT_TLS symbols are relative to PT_TLS
7034 segment base. */
7035 BFD_ASSERT (finfo->first_tls_sec != NULL);
7036 sym.st_value -= finfo->first_tls_sec->vma;
7037 }
7038 }
7039
7040 finfo->indices[r_symndx]
7041 = bfd_get_symcount (output_bfd);
7042
7043 if (! elf_link_output_sym (finfo, name, &sym, sec))
7044 return FALSE;
7045 }
7046
7047 r_symndx = finfo->indices[r_symndx];
7048 }
7049
7050 irela->r_info = ELF_R_INFO (r_symndx,
7051 ELF_R_TYPE (irela->r_info));
7052 }
7053
7054 /* Swap out the relocs. */
7055 if (bed->elf_backend_emit_relocs
7056 && !(finfo->info->relocateable
7057 || finfo->info->emitrelocations))
7058 reloc_emitter = bed->elf_backend_emit_relocs;
7059 else
7060 reloc_emitter = elf_link_output_relocs;
7061
7062 if (input_rel_hdr->sh_size != 0
7063 && ! (*reloc_emitter) (output_bfd, o, input_rel_hdr,
7064 internal_relocs))
7065 return FALSE;
7066
7067 input_rel_hdr2 = elf_section_data (o)->rel_hdr2;
7068 if (input_rel_hdr2 && input_rel_hdr2->sh_size != 0)
7069 {
7070 internal_relocs += (NUM_SHDR_ENTRIES (input_rel_hdr)
7071 * bed->s->int_rels_per_ext_rel);
7072 if (! (*reloc_emitter) (output_bfd, o, input_rel_hdr2,
7073 internal_relocs))
7074 return FALSE;
7075 }
7076 }
7077 }
7078
7079 /* Write out the modified section contents. */
7080 if (bed->elf_backend_write_section
7081 && (*bed->elf_backend_write_section) (output_bfd, o, contents))
7082 {
7083 /* Section written out. */
7084 }
7085 else switch (o->sec_info_type)
7086 {
7087 case ELF_INFO_TYPE_STABS:
7088 if (! (_bfd_write_section_stabs
7089 (output_bfd,
7090 &elf_hash_table (finfo->info)->stab_info,
7091 o, &elf_section_data (o)->sec_info, contents)))
7092 return FALSE;
7093 break;
7094 case ELF_INFO_TYPE_MERGE:
7095 if (! _bfd_write_merged_section (output_bfd, o,
7096 elf_section_data (o)->sec_info))
7097 return FALSE;
7098 break;
7099 case ELF_INFO_TYPE_EH_FRAME:
7100 {
7101 if (! _bfd_elf_write_section_eh_frame (output_bfd, finfo->info,
7102 o, contents))
7103 return FALSE;
7104 }
7105 break;
7106 default:
7107 {
7108 bfd_size_type sec_size;
7109
7110 sec_size = (o->_cooked_size != 0 ? o->_cooked_size : o->_raw_size);
7111 if (! (o->flags & SEC_EXCLUDE)
7112 && ! bfd_set_section_contents (output_bfd, o->output_section,
7113 contents,
7114 (file_ptr) o->output_offset,
7115 sec_size))
7116 return FALSE;
7117 }
7118 break;
7119 }
7120 }
7121
7122 return TRUE;
7123 }
7124
7125 /* Generate a reloc when linking an ELF file. This is a reloc
7126 requested by the linker, and does come from any input file. This
7127 is used to build constructor and destructor tables when linking
7128 with -Ur. */
7129
7130 static bfd_boolean
7131 elf_reloc_link_order (output_bfd, info, output_section, link_order)
7132 bfd *output_bfd;
7133 struct bfd_link_info *info;
7134 asection *output_section;
7135 struct bfd_link_order *link_order;
7136 {
7137 reloc_howto_type *howto;
7138 long indx;
7139 bfd_vma offset;
7140 bfd_vma addend;
7141 struct elf_link_hash_entry **rel_hash_ptr;
7142 Elf_Internal_Shdr *rel_hdr;
7143 struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
7144 Elf_Internal_Rela irel[MAX_INT_RELS_PER_EXT_REL];
7145 bfd_byte *erel;
7146 unsigned int i;
7147
7148 howto = bfd_reloc_type_lookup (output_bfd, link_order->u.reloc.p->reloc);
7149 if (howto == NULL)
7150 {
7151 bfd_set_error (bfd_error_bad_value);
7152 return FALSE;
7153 }
7154
7155 addend = link_order->u.reloc.p->addend;
7156
7157 /* Figure out the symbol index. */
7158 rel_hash_ptr = (elf_section_data (output_section)->rel_hashes
7159 + elf_section_data (output_section)->rel_count
7160 + elf_section_data (output_section)->rel_count2);
7161 if (link_order->type == bfd_section_reloc_link_order)
7162 {
7163 indx = link_order->u.reloc.p->u.section->target_index;
7164 BFD_ASSERT (indx != 0);
7165 *rel_hash_ptr = NULL;
7166 }
7167 else
7168 {
7169 struct elf_link_hash_entry *h;
7170
7171 /* Treat a reloc against a defined symbol as though it were
7172 actually against the section. */
7173 h = ((struct elf_link_hash_entry *)
7174 bfd_wrapped_link_hash_lookup (output_bfd, info,
7175 link_order->u.reloc.p->u.name,
7176 FALSE, FALSE, TRUE));
7177 if (h != NULL
7178 && (h->root.type == bfd_link_hash_defined
7179 || h->root.type == bfd_link_hash_defweak))
7180 {
7181 asection *section;
7182
7183 section = h->root.u.def.section;
7184 indx = section->output_section->target_index;
7185 *rel_hash_ptr = NULL;
7186 /* It seems that we ought to add the symbol value to the
7187 addend here, but in practice it has already been added
7188 because it was passed to constructor_callback. */
7189 addend += section->output_section->vma + section->output_offset;
7190 }
7191 else if (h != NULL)
7192 {
7193 /* Setting the index to -2 tells elf_link_output_extsym that
7194 this symbol is used by a reloc. */
7195 h->indx = -2;
7196 *rel_hash_ptr = h;
7197 indx = 0;
7198 }
7199 else
7200 {
7201 if (! ((*info->callbacks->unattached_reloc)
7202 (info, link_order->u.reloc.p->u.name, (bfd *) NULL,
7203 (asection *) NULL, (bfd_vma) 0)))
7204 return FALSE;
7205 indx = 0;
7206 }
7207 }
7208
7209 /* If this is an inplace reloc, we must write the addend into the
7210 object file. */
7211 if (howto->partial_inplace && addend != 0)
7212 {
7213 bfd_size_type size;
7214 bfd_reloc_status_type rstat;
7215 bfd_byte *buf;
7216 bfd_boolean ok;
7217 const char *sym_name;
7218
7219 size = bfd_get_reloc_size (howto);
7220 buf = (bfd_byte *) bfd_zmalloc (size);
7221 if (buf == (bfd_byte *) NULL)
7222 return FALSE;
7223 rstat = _bfd_relocate_contents (howto, output_bfd, (bfd_vma) addend, buf);
7224 switch (rstat)
7225 {
7226 case bfd_reloc_ok:
7227 break;
7228
7229 default:
7230 case bfd_reloc_outofrange:
7231 abort ();
7232
7233 case bfd_reloc_overflow:
7234 if (link_order->type == bfd_section_reloc_link_order)
7235 sym_name = bfd_section_name (output_bfd,
7236 link_order->u.reloc.p->u.section);
7237 else
7238 sym_name = link_order->u.reloc.p->u.name;
7239 if (! ((*info->callbacks->reloc_overflow)
7240 (info, sym_name, howto->name, addend,
7241 (bfd *) NULL, (asection *) NULL, (bfd_vma) 0)))
7242 {
7243 free (buf);
7244 return FALSE;
7245 }
7246 break;
7247 }
7248 ok = bfd_set_section_contents (output_bfd, output_section, (PTR) buf,
7249 (file_ptr) link_order->offset, size);
7250 free (buf);
7251 if (! ok)
7252 return FALSE;
7253 }
7254
7255 /* The address of a reloc is relative to the section in a
7256 relocateable file, and is a virtual address in an executable
7257 file. */
7258 offset = link_order->offset;
7259 if (! info->relocateable)
7260 offset += output_section->vma;
7261
7262 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
7263 {
7264 irel[i].r_offset = offset;
7265 irel[i].r_info = 0;
7266 irel[i].r_addend = 0;
7267 }
7268 irel[0].r_info = ELF_R_INFO (indx, howto->type);
7269
7270 rel_hdr = &elf_section_data (output_section)->rel_hdr;
7271 erel = rel_hdr->contents;
7272 if (rel_hdr->sh_type == SHT_REL)
7273 {
7274 erel += (elf_section_data (output_section)->rel_count
7275 * sizeof (Elf_External_Rel));
7276 (*bed->s->swap_reloc_out) (output_bfd, irel, erel);
7277 }
7278 else
7279 {
7280 irel[0].r_addend = addend;
7281 erel += (elf_section_data (output_section)->rel_count
7282 * sizeof (Elf_External_Rela));
7283 (*bed->s->swap_reloca_out) (output_bfd, irel, erel);
7284 }
7285
7286 ++elf_section_data (output_section)->rel_count;
7287
7288 return TRUE;
7289 }
7290 \f
7291 /* Allocate a pointer to live in a linker created section. */
7292
7293 bfd_boolean
7294 elf_create_pointer_linker_section (abfd, info, lsect, h, rel)
7295 bfd *abfd;
7296 struct bfd_link_info *info;
7297 elf_linker_section_t *lsect;
7298 struct elf_link_hash_entry *h;
7299 const Elf_Internal_Rela *rel;
7300 {
7301 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
7302 elf_linker_section_pointers_t *linker_section_ptr;
7303 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
7304 bfd_size_type amt;
7305
7306 BFD_ASSERT (lsect != NULL);
7307
7308 /* Is this a global symbol? */
7309 if (h != NULL)
7310 {
7311 /* Has this symbol already been allocated? If so, our work is done. */
7312 if (_bfd_elf_find_pointer_linker_section (h->linker_section_pointer,
7313 rel->r_addend,
7314 lsect->which))
7315 return TRUE;
7316
7317 ptr_linker_section_ptr = &h->linker_section_pointer;
7318 /* Make sure this symbol is output as a dynamic symbol. */
7319 if (h->dynindx == -1)
7320 {
7321 if (! elf_link_record_dynamic_symbol (info, h))
7322 return FALSE;
7323 }
7324
7325 if (lsect->rel_section)
7326 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
7327 }
7328 else
7329 {
7330 /* Allocation of a pointer to a local symbol. */
7331 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
7332
7333 /* Allocate a table to hold the local symbols if first time. */
7334 if (!ptr)
7335 {
7336 unsigned int num_symbols = elf_tdata (abfd)->symtab_hdr.sh_info;
7337 register unsigned int i;
7338
7339 amt = num_symbols;
7340 amt *= sizeof (elf_linker_section_pointers_t *);
7341 ptr = (elf_linker_section_pointers_t **) bfd_alloc (abfd, amt);
7342
7343 if (!ptr)
7344 return FALSE;
7345
7346 elf_local_ptr_offsets (abfd) = ptr;
7347 for (i = 0; i < num_symbols; i++)
7348 ptr[i] = (elf_linker_section_pointers_t *) 0;
7349 }
7350
7351 /* Has this symbol already been allocated? If so, our work is done. */
7352 if (_bfd_elf_find_pointer_linker_section (ptr[r_symndx],
7353 rel->r_addend,
7354 lsect->which))
7355 return TRUE;
7356
7357 ptr_linker_section_ptr = &ptr[r_symndx];
7358
7359 if (info->shared)
7360 {
7361 /* If we are generating a shared object, we need to
7362 output a R_<xxx>_RELATIVE reloc so that the
7363 dynamic linker can adjust this GOT entry. */
7364 BFD_ASSERT (lsect->rel_section != NULL);
7365 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
7366 }
7367 }
7368
7369 /* Allocate space for a pointer in the linker section, and allocate
7370 a new pointer record from internal memory. */
7371 BFD_ASSERT (ptr_linker_section_ptr != NULL);
7372 amt = sizeof (elf_linker_section_pointers_t);
7373 linker_section_ptr = (elf_linker_section_pointers_t *) bfd_alloc (abfd, amt);
7374
7375 if (!linker_section_ptr)
7376 return FALSE;
7377
7378 linker_section_ptr->next = *ptr_linker_section_ptr;
7379 linker_section_ptr->addend = rel->r_addend;
7380 linker_section_ptr->which = lsect->which;
7381 linker_section_ptr->written_address_p = FALSE;
7382 *ptr_linker_section_ptr = linker_section_ptr;
7383
7384 #if 0
7385 if (lsect->hole_size && lsect->hole_offset < lsect->max_hole_offset)
7386 {
7387 linker_section_ptr->offset = (lsect->section->_raw_size
7388 - lsect->hole_size + (ARCH_SIZE / 8));
7389 lsect->hole_offset += ARCH_SIZE / 8;
7390 lsect->sym_offset += ARCH_SIZE / 8;
7391 if (lsect->sym_hash)
7392 {
7393 /* Bump up symbol value if needed. */
7394 lsect->sym_hash->root.u.def.value += ARCH_SIZE / 8;
7395 #ifdef DEBUG
7396 fprintf (stderr, "Bump up %s by %ld, current value = %ld\n",
7397 lsect->sym_hash->root.root.string,
7398 (long) ARCH_SIZE / 8,
7399 (long) lsect->sym_hash->root.u.def.value);
7400 #endif
7401 }
7402 }
7403 else
7404 #endif
7405 linker_section_ptr->offset = lsect->section->_raw_size;
7406
7407 lsect->section->_raw_size += ARCH_SIZE / 8;
7408
7409 #ifdef DEBUG
7410 fprintf (stderr,
7411 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
7412 lsect->name, (long) linker_section_ptr->offset,
7413 (long) lsect->section->_raw_size);
7414 #endif
7415
7416 return TRUE;
7417 }
7418 \f
7419 #if ARCH_SIZE==64
7420 #define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_64 (BFD, VAL, ADDR)
7421 #endif
7422 #if ARCH_SIZE==32
7423 #define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_32 (BFD, VAL, ADDR)
7424 #endif
7425
7426 /* Fill in the address for a pointer generated in a linker section. */
7427
7428 bfd_vma
7429 elf_finish_pointer_linker_section (output_bfd, input_bfd, info, lsect, h,
7430 relocation, rel, relative_reloc)
7431 bfd *output_bfd;
7432 bfd *input_bfd;
7433 struct bfd_link_info *info;
7434 elf_linker_section_t *lsect;
7435 struct elf_link_hash_entry *h;
7436 bfd_vma relocation;
7437 const Elf_Internal_Rela *rel;
7438 int relative_reloc;
7439 {
7440 elf_linker_section_pointers_t *linker_section_ptr;
7441
7442 BFD_ASSERT (lsect != NULL);
7443
7444 if (h != NULL)
7445 {
7446 /* Handle global symbol. */
7447 linker_section_ptr = (_bfd_elf_find_pointer_linker_section
7448 (h->linker_section_pointer,
7449 rel->r_addend,
7450 lsect->which));
7451
7452 BFD_ASSERT (linker_section_ptr != NULL);
7453
7454 if (! elf_hash_table (info)->dynamic_sections_created
7455 || (info->shared
7456 && info->symbolic
7457 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
7458 {
7459 /* This is actually a static link, or it is a
7460 -Bsymbolic link and the symbol is defined
7461 locally. We must initialize this entry in the
7462 global section.
7463
7464 When doing a dynamic link, we create a .rela.<xxx>
7465 relocation entry to initialize the value. This
7466 is done in the finish_dynamic_symbol routine. */
7467 if (!linker_section_ptr->written_address_p)
7468 {
7469 linker_section_ptr->written_address_p = TRUE;
7470 bfd_put_ptr (output_bfd,
7471 relocation + linker_section_ptr->addend,
7472 (lsect->section->contents
7473 + linker_section_ptr->offset));
7474 }
7475 }
7476 }
7477 else
7478 {
7479 /* Handle local symbol. */
7480 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
7481 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
7482 BFD_ASSERT (elf_local_ptr_offsets (input_bfd)[r_symndx] != NULL);
7483 linker_section_ptr = (_bfd_elf_find_pointer_linker_section
7484 (elf_local_ptr_offsets (input_bfd)[r_symndx],
7485 rel->r_addend,
7486 lsect->which));
7487
7488 BFD_ASSERT (linker_section_ptr != NULL);
7489
7490 /* Write out pointer if it hasn't been rewritten out before. */
7491 if (!linker_section_ptr->written_address_p)
7492 {
7493 linker_section_ptr->written_address_p = TRUE;
7494 bfd_put_ptr (output_bfd, relocation + linker_section_ptr->addend,
7495 lsect->section->contents + linker_section_ptr->offset);
7496
7497 if (info->shared)
7498 {
7499 asection *srel = lsect->rel_section;
7500 Elf_Internal_Rela outrel[MAX_INT_RELS_PER_EXT_REL];
7501 bfd_byte *erel;
7502 struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
7503 unsigned int i;
7504
7505 /* We need to generate a relative reloc for the dynamic
7506 linker. */
7507 if (!srel)
7508 {
7509 srel = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
7510 lsect->rel_name);
7511 lsect->rel_section = srel;
7512 }
7513
7514 BFD_ASSERT (srel != NULL);
7515
7516 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
7517 {
7518 outrel[i].r_offset = (lsect->section->output_section->vma
7519 + lsect->section->output_offset
7520 + linker_section_ptr->offset);
7521 outrel[i].r_info = 0;
7522 outrel[i].r_addend = 0;
7523 }
7524 outrel[0].r_info = ELF_R_INFO (0, relative_reloc);
7525 erel = lsect->section->contents;
7526 erel += (elf_section_data (lsect->section)->rel_count++
7527 * sizeof (Elf_External_Rela));
7528 elf_swap_reloca_out (output_bfd, outrel, erel);
7529 }
7530 }
7531 }
7532
7533 relocation = (lsect->section->output_offset
7534 + linker_section_ptr->offset
7535 - lsect->hole_offset
7536 - lsect->sym_offset);
7537
7538 #ifdef DEBUG
7539 fprintf (stderr,
7540 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7541 lsect->name, (long) relocation, (long) relocation);
7542 #endif
7543
7544 /* Subtract out the addend, because it will get added back in by the normal
7545 processing. */
7546 return relocation - linker_section_ptr->addend;
7547 }
7548 \f
7549 /* Garbage collect unused sections. */
7550
7551 static bfd_boolean elf_gc_mark
7552 PARAMS ((struct bfd_link_info *, asection *,
7553 asection * (*) (asection *, struct bfd_link_info *,
7554 Elf_Internal_Rela *, struct elf_link_hash_entry *,
7555 Elf_Internal_Sym *)));
7556
7557 static bfd_boolean elf_gc_sweep
7558 PARAMS ((struct bfd_link_info *,
7559 bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *,
7560 const Elf_Internal_Rela *)));
7561
7562 static bfd_boolean elf_gc_sweep_symbol
7563 PARAMS ((struct elf_link_hash_entry *, PTR));
7564
7565 static bfd_boolean elf_gc_allocate_got_offsets
7566 PARAMS ((struct elf_link_hash_entry *, PTR));
7567
7568 static bfd_boolean elf_gc_propagate_vtable_entries_used
7569 PARAMS ((struct elf_link_hash_entry *, PTR));
7570
7571 static bfd_boolean elf_gc_smash_unused_vtentry_relocs
7572 PARAMS ((struct elf_link_hash_entry *, PTR));
7573
7574 /* The mark phase of garbage collection. For a given section, mark
7575 it and any sections in this section's group, and all the sections
7576 which define symbols to which it refers. */
7577
7578 typedef asection * (*gc_mark_hook_fn)
7579 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
7580 struct elf_link_hash_entry *, Elf_Internal_Sym *));
7581
7582 static bfd_boolean
7583 elf_gc_mark (info, sec, gc_mark_hook)
7584 struct bfd_link_info *info;
7585 asection *sec;
7586 gc_mark_hook_fn gc_mark_hook;
7587 {
7588 bfd_boolean ret;
7589 asection *group_sec;
7590
7591 sec->gc_mark = 1;
7592
7593 /* Mark all the sections in the group. */
7594 group_sec = elf_section_data (sec)->next_in_group;
7595 if (group_sec && !group_sec->gc_mark)
7596 if (!elf_gc_mark (info, group_sec, gc_mark_hook))
7597 return FALSE;
7598
7599 /* Look through the section relocs. */
7600 ret = TRUE;
7601 if ((sec->flags & SEC_RELOC) != 0 && sec->reloc_count > 0)
7602 {
7603 Elf_Internal_Rela *relstart, *rel, *relend;
7604 Elf_Internal_Shdr *symtab_hdr;
7605 struct elf_link_hash_entry **sym_hashes;
7606 size_t nlocsyms;
7607 size_t extsymoff;
7608 bfd *input_bfd = sec->owner;
7609 struct elf_backend_data *bed = get_elf_backend_data (input_bfd);
7610 Elf_Internal_Sym *isym = NULL;
7611
7612 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
7613 sym_hashes = elf_sym_hashes (input_bfd);
7614
7615 /* Read the local symbols. */
7616 if (elf_bad_symtab (input_bfd))
7617 {
7618 nlocsyms = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
7619 extsymoff = 0;
7620 }
7621 else
7622 extsymoff = nlocsyms = symtab_hdr->sh_info;
7623
7624 isym = (Elf_Internal_Sym *) symtab_hdr->contents;
7625 if (isym == NULL && nlocsyms != 0)
7626 {
7627 isym = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, nlocsyms, 0,
7628 NULL, NULL, NULL);
7629 if (isym == NULL)
7630 return FALSE;
7631 }
7632
7633 /* Read the relocations. */
7634 relstart = (NAME(_bfd_elf,link_read_relocs)
7635 (input_bfd, sec, NULL, (Elf_Internal_Rela *) NULL,
7636 info->keep_memory));
7637 if (relstart == NULL)
7638 {
7639 ret = FALSE;
7640 goto out1;
7641 }
7642 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
7643
7644 for (rel = relstart; rel < relend; rel++)
7645 {
7646 unsigned long r_symndx;
7647 asection *rsec;
7648 struct elf_link_hash_entry *h;
7649
7650 r_symndx = ELF_R_SYM (rel->r_info);
7651 if (r_symndx == 0)
7652 continue;
7653
7654 if (r_symndx >= nlocsyms
7655 || ELF_ST_BIND (isym[r_symndx].st_info) != STB_LOCAL)
7656 {
7657 h = sym_hashes[r_symndx - extsymoff];
7658 rsec = (*gc_mark_hook) (sec, info, rel, h, NULL);
7659 }
7660 else
7661 {
7662 rsec = (*gc_mark_hook) (sec, info, rel, NULL, &isym[r_symndx]);
7663 }
7664
7665 if (rsec && !rsec->gc_mark)
7666 {
7667 if (bfd_get_flavour (rsec->owner) != bfd_target_elf_flavour)
7668 rsec->gc_mark = 1;
7669 else if (!elf_gc_mark (info, rsec, gc_mark_hook))
7670 {
7671 ret = FALSE;
7672 goto out2;
7673 }
7674 }
7675 }
7676
7677 out2:
7678 if (elf_section_data (sec)->relocs != relstart)
7679 free (relstart);
7680 out1:
7681 if (isym != NULL && symtab_hdr->contents != (unsigned char *) isym)
7682 {
7683 if (! info->keep_memory)
7684 free (isym);
7685 else
7686 symtab_hdr->contents = (unsigned char *) isym;
7687 }
7688 }
7689
7690 return ret;
7691 }
7692
7693 /* The sweep phase of garbage collection. Remove all garbage sections. */
7694
7695 typedef bfd_boolean (*gc_sweep_hook_fn)
7696 PARAMS ((bfd *, struct bfd_link_info *, asection *,
7697 const Elf_Internal_Rela *));
7698
7699 static bfd_boolean
7700 elf_gc_sweep (info, gc_sweep_hook)
7701 struct bfd_link_info *info;
7702 gc_sweep_hook_fn gc_sweep_hook;
7703 {
7704 bfd *sub;
7705
7706 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
7707 {
7708 asection *o;
7709
7710 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
7711 continue;
7712
7713 for (o = sub->sections; o != NULL; o = o->next)
7714 {
7715 /* Keep special sections. Keep .debug sections. */
7716 if ((o->flags & SEC_LINKER_CREATED)
7717 || (o->flags & SEC_DEBUGGING))
7718 o->gc_mark = 1;
7719
7720 if (o->gc_mark)
7721 continue;
7722
7723 /* Skip sweeping sections already excluded. */
7724 if (o->flags & SEC_EXCLUDE)
7725 continue;
7726
7727 /* Since this is early in the link process, it is simple
7728 to remove a section from the output. */
7729 o->flags |= SEC_EXCLUDE;
7730
7731 /* But we also have to update some of the relocation
7732 info we collected before. */
7733 if (gc_sweep_hook
7734 && (o->flags & SEC_RELOC) && o->reloc_count > 0)
7735 {
7736 Elf_Internal_Rela *internal_relocs;
7737 bfd_boolean r;
7738
7739 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
7740 (o->owner, o, NULL, NULL, info->keep_memory));
7741 if (internal_relocs == NULL)
7742 return FALSE;
7743
7744 r = (*gc_sweep_hook) (o->owner, info, o, internal_relocs);
7745
7746 if (elf_section_data (o)->relocs != internal_relocs)
7747 free (internal_relocs);
7748
7749 if (!r)
7750 return FALSE;
7751 }
7752 }
7753 }
7754
7755 /* Remove the symbols that were in the swept sections from the dynamic
7756 symbol table. GCFIXME: Anyone know how to get them out of the
7757 static symbol table as well? */
7758 {
7759 int i = 0;
7760
7761 elf_link_hash_traverse (elf_hash_table (info),
7762 elf_gc_sweep_symbol,
7763 (PTR) &i);
7764
7765 elf_hash_table (info)->dynsymcount = i;
7766 }
7767
7768 return TRUE;
7769 }
7770
7771 /* Sweep symbols in swept sections. Called via elf_link_hash_traverse. */
7772
7773 static bfd_boolean
7774 elf_gc_sweep_symbol (h, idxptr)
7775 struct elf_link_hash_entry *h;
7776 PTR idxptr;
7777 {
7778 int *idx = (int *) idxptr;
7779
7780 if (h->root.type == bfd_link_hash_warning)
7781 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7782
7783 if (h->dynindx != -1
7784 && ((h->root.type != bfd_link_hash_defined
7785 && h->root.type != bfd_link_hash_defweak)
7786 || h->root.u.def.section->gc_mark))
7787 h->dynindx = (*idx)++;
7788
7789 return TRUE;
7790 }
7791
7792 /* Propogate collected vtable information. This is called through
7793 elf_link_hash_traverse. */
7794
7795 static bfd_boolean
7796 elf_gc_propagate_vtable_entries_used (h, okp)
7797 struct elf_link_hash_entry *h;
7798 PTR okp;
7799 {
7800 if (h->root.type == bfd_link_hash_warning)
7801 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7802
7803 /* Those that are not vtables. */
7804 if (h->vtable_parent == NULL)
7805 return TRUE;
7806
7807 /* Those vtables that do not have parents, we cannot merge. */
7808 if (h->vtable_parent == (struct elf_link_hash_entry *) -1)
7809 return TRUE;
7810
7811 /* If we've already been done, exit. */
7812 if (h->vtable_entries_used && h->vtable_entries_used[-1])
7813 return TRUE;
7814
7815 /* Make sure the parent's table is up to date. */
7816 elf_gc_propagate_vtable_entries_used (h->vtable_parent, okp);
7817
7818 if (h->vtable_entries_used == NULL)
7819 {
7820 /* None of this table's entries were referenced. Re-use the
7821 parent's table. */
7822 h->vtable_entries_used = h->vtable_parent->vtable_entries_used;
7823 h->vtable_entries_size = h->vtable_parent->vtable_entries_size;
7824 }
7825 else
7826 {
7827 size_t n;
7828 bfd_boolean *cu, *pu;
7829
7830 /* Or the parent's entries into ours. */
7831 cu = h->vtable_entries_used;
7832 cu[-1] = TRUE;
7833 pu = h->vtable_parent->vtable_entries_used;
7834 if (pu != NULL)
7835 {
7836 asection *sec = h->root.u.def.section;
7837 struct elf_backend_data *bed = get_elf_backend_data (sec->owner);
7838 int file_align = bed->s->file_align;
7839
7840 n = h->vtable_parent->vtable_entries_size / file_align;
7841 while (n--)
7842 {
7843 if (*pu)
7844 *cu = TRUE;
7845 pu++;
7846 cu++;
7847 }
7848 }
7849 }
7850
7851 return TRUE;
7852 }
7853
7854 static bfd_boolean
7855 elf_gc_smash_unused_vtentry_relocs (h, okp)
7856 struct elf_link_hash_entry *h;
7857 PTR okp;
7858 {
7859 asection *sec;
7860 bfd_vma hstart, hend;
7861 Elf_Internal_Rela *relstart, *relend, *rel;
7862 struct elf_backend_data *bed;
7863 int file_align;
7864
7865 if (h->root.type == bfd_link_hash_warning)
7866 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7867
7868 /* Take care of both those symbols that do not describe vtables as
7869 well as those that are not loaded. */
7870 if (h->vtable_parent == NULL)
7871 return TRUE;
7872
7873 BFD_ASSERT (h->root.type == bfd_link_hash_defined
7874 || h->root.type == bfd_link_hash_defweak);
7875
7876 sec = h->root.u.def.section;
7877 hstart = h->root.u.def.value;
7878 hend = hstart + h->size;
7879
7880 relstart = (NAME(_bfd_elf,link_read_relocs)
7881 (sec->owner, sec, NULL, (Elf_Internal_Rela *) NULL, TRUE));
7882 if (!relstart)
7883 return *(bfd_boolean *) okp = FALSE;
7884 bed = get_elf_backend_data (sec->owner);
7885 file_align = bed->s->file_align;
7886
7887 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
7888
7889 for (rel = relstart; rel < relend; ++rel)
7890 if (rel->r_offset >= hstart && rel->r_offset < hend)
7891 {
7892 /* If the entry is in use, do nothing. */
7893 if (h->vtable_entries_used
7894 && (rel->r_offset - hstart) < h->vtable_entries_size)
7895 {
7896 bfd_vma entry = (rel->r_offset - hstart) / file_align;
7897 if (h->vtable_entries_used[entry])
7898 continue;
7899 }
7900 /* Otherwise, kill it. */
7901 rel->r_offset = rel->r_info = rel->r_addend = 0;
7902 }
7903
7904 return TRUE;
7905 }
7906
7907 /* Do mark and sweep of unused sections. */
7908
7909 bfd_boolean
7910 elf_gc_sections (abfd, info)
7911 bfd *abfd;
7912 struct bfd_link_info *info;
7913 {
7914 bfd_boolean ok = TRUE;
7915 bfd *sub;
7916 asection * (*gc_mark_hook)
7917 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
7918 struct elf_link_hash_entry *h, Elf_Internal_Sym *));
7919
7920 if (!get_elf_backend_data (abfd)->can_gc_sections
7921 || info->relocateable || info->emitrelocations
7922 || elf_hash_table (info)->dynamic_sections_created)
7923 return TRUE;
7924
7925 /* Apply transitive closure to the vtable entry usage info. */
7926 elf_link_hash_traverse (elf_hash_table (info),
7927 elf_gc_propagate_vtable_entries_used,
7928 (PTR) &ok);
7929 if (!ok)
7930 return FALSE;
7931
7932 /* Kill the vtable relocations that were not used. */
7933 elf_link_hash_traverse (elf_hash_table (info),
7934 elf_gc_smash_unused_vtentry_relocs,
7935 (PTR) &ok);
7936 if (!ok)
7937 return FALSE;
7938
7939 /* Grovel through relocs to find out who stays ... */
7940
7941 gc_mark_hook = get_elf_backend_data (abfd)->gc_mark_hook;
7942 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
7943 {
7944 asection *o;
7945
7946 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
7947 continue;
7948
7949 for (o = sub->sections; o != NULL; o = o->next)
7950 {
7951 if (o->flags & SEC_KEEP)
7952 if (!elf_gc_mark (info, o, gc_mark_hook))
7953 return FALSE;
7954 }
7955 }
7956
7957 /* ... and mark SEC_EXCLUDE for those that go. */
7958 if (!elf_gc_sweep (info, get_elf_backend_data (abfd)->gc_sweep_hook))
7959 return FALSE;
7960
7961 return TRUE;
7962 }
7963 \f
7964 /* Called from check_relocs to record the existance of a VTINHERIT reloc. */
7965
7966 bfd_boolean
7967 elf_gc_record_vtinherit (abfd, sec, h, offset)
7968 bfd *abfd;
7969 asection *sec;
7970 struct elf_link_hash_entry *h;
7971 bfd_vma offset;
7972 {
7973 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
7974 struct elf_link_hash_entry **search, *child;
7975 bfd_size_type extsymcount;
7976
7977 /* The sh_info field of the symtab header tells us where the
7978 external symbols start. We don't care about the local symbols at
7979 this point. */
7980 extsymcount = elf_tdata (abfd)->symtab_hdr.sh_size/sizeof (Elf_External_Sym);
7981 if (!elf_bad_symtab (abfd))
7982 extsymcount -= elf_tdata (abfd)->symtab_hdr.sh_info;
7983
7984 sym_hashes = elf_sym_hashes (abfd);
7985 sym_hashes_end = sym_hashes + extsymcount;
7986
7987 /* Hunt down the child symbol, which is in this section at the same
7988 offset as the relocation. */
7989 for (search = sym_hashes; search != sym_hashes_end; ++search)
7990 {
7991 if ((child = *search) != NULL
7992 && (child->root.type == bfd_link_hash_defined
7993 || child->root.type == bfd_link_hash_defweak)
7994 && child->root.u.def.section == sec
7995 && child->root.u.def.value == offset)
7996 goto win;
7997 }
7998
7999 (*_bfd_error_handler) ("%s: %s+%lu: No symbol found for INHERIT",
8000 bfd_archive_filename (abfd), sec->name,
8001 (unsigned long) offset);
8002 bfd_set_error (bfd_error_invalid_operation);
8003 return FALSE;
8004
8005 win:
8006 if (!h)
8007 {
8008 /* This *should* only be the absolute section. It could potentially
8009 be that someone has defined a non-global vtable though, which
8010 would be bad. It isn't worth paging in the local symbols to be
8011 sure though; that case should simply be handled by the assembler. */
8012
8013 child->vtable_parent = (struct elf_link_hash_entry *) -1;
8014 }
8015 else
8016 child->vtable_parent = h;
8017
8018 return TRUE;
8019 }
8020
8021 /* Called from check_relocs to record the existance of a VTENTRY reloc. */
8022
8023 bfd_boolean
8024 elf_gc_record_vtentry (abfd, sec, h, addend)
8025 bfd *abfd ATTRIBUTE_UNUSED;
8026 asection *sec ATTRIBUTE_UNUSED;
8027 struct elf_link_hash_entry *h;
8028 bfd_vma addend;
8029 {
8030 struct elf_backend_data *bed = get_elf_backend_data (abfd);
8031 int file_align = bed->s->file_align;
8032
8033 if (addend >= h->vtable_entries_size)
8034 {
8035 size_t size, bytes;
8036 bfd_boolean *ptr = h->vtable_entries_used;
8037
8038 /* While the symbol is undefined, we have to be prepared to handle
8039 a zero size. */
8040 if (h->root.type == bfd_link_hash_undefined)
8041 size = addend;
8042 else
8043 {
8044 size = h->size;
8045 if (size < addend)
8046 {
8047 /* Oops! We've got a reference past the defined end of
8048 the table. This is probably a bug -- shall we warn? */
8049 size = addend;
8050 }
8051 }
8052
8053 /* Allocate one extra entry for use as a "done" flag for the
8054 consolidation pass. */
8055 bytes = (size / file_align + 1) * sizeof (bfd_boolean);
8056
8057 if (ptr)
8058 {
8059 ptr = bfd_realloc (ptr - 1, (bfd_size_type) bytes);
8060
8061 if (ptr != NULL)
8062 {
8063 size_t oldbytes;
8064
8065 oldbytes = ((h->vtable_entries_size / file_align + 1)
8066 * sizeof (bfd_boolean));
8067 memset (((char *) ptr) + oldbytes, 0, bytes - oldbytes);
8068 }
8069 }
8070 else
8071 ptr = bfd_zmalloc ((bfd_size_type) bytes);
8072
8073 if (ptr == NULL)
8074 return FALSE;
8075
8076 /* And arrange for that done flag to be at index -1. */
8077 h->vtable_entries_used = ptr + 1;
8078 h->vtable_entries_size = size;
8079 }
8080
8081 h->vtable_entries_used[addend / file_align] = TRUE;
8082
8083 return TRUE;
8084 }
8085
8086 /* And an accompanying bit to work out final got entry offsets once
8087 we're done. Should be called from final_link. */
8088
8089 bfd_boolean
8090 elf_gc_common_finalize_got_offsets (abfd, info)
8091 bfd *abfd;
8092 struct bfd_link_info *info;
8093 {
8094 bfd *i;
8095 struct elf_backend_data *bed = get_elf_backend_data (abfd);
8096 bfd_vma gotoff;
8097
8098 /* The GOT offset is relative to the .got section, but the GOT header is
8099 put into the .got.plt section, if the backend uses it. */
8100 if (bed->want_got_plt)
8101 gotoff = 0;
8102 else
8103 gotoff = bed->got_header_size;
8104
8105 /* Do the local .got entries first. */
8106 for (i = info->input_bfds; i; i = i->link_next)
8107 {
8108 bfd_signed_vma *local_got;
8109 bfd_size_type j, locsymcount;
8110 Elf_Internal_Shdr *symtab_hdr;
8111
8112 if (bfd_get_flavour (i) != bfd_target_elf_flavour)
8113 continue;
8114
8115 local_got = elf_local_got_refcounts (i);
8116 if (!local_got)
8117 continue;
8118
8119 symtab_hdr = &elf_tdata (i)->symtab_hdr;
8120 if (elf_bad_symtab (i))
8121 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
8122 else
8123 locsymcount = symtab_hdr->sh_info;
8124
8125 for (j = 0; j < locsymcount; ++j)
8126 {
8127 if (local_got[j] > 0)
8128 {
8129 local_got[j] = gotoff;
8130 gotoff += ARCH_SIZE / 8;
8131 }
8132 else
8133 local_got[j] = (bfd_vma) -1;
8134 }
8135 }
8136
8137 /* Then the global .got entries. .plt refcounts are handled by
8138 adjust_dynamic_symbol */
8139 elf_link_hash_traverse (elf_hash_table (info),
8140 elf_gc_allocate_got_offsets,
8141 (PTR) &gotoff);
8142 return TRUE;
8143 }
8144
8145 /* We need a special top-level link routine to convert got reference counts
8146 to real got offsets. */
8147
8148 static bfd_boolean
8149 elf_gc_allocate_got_offsets (h, offarg)
8150 struct elf_link_hash_entry *h;
8151 PTR offarg;
8152 {
8153 bfd_vma *off = (bfd_vma *) offarg;
8154
8155 if (h->root.type == bfd_link_hash_warning)
8156 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8157
8158 if (h->got.refcount > 0)
8159 {
8160 h->got.offset = off[0];
8161 off[0] += ARCH_SIZE / 8;
8162 }
8163 else
8164 h->got.offset = (bfd_vma) -1;
8165
8166 return TRUE;
8167 }
8168
8169 /* Many folk need no more in the way of final link than this, once
8170 got entry reference counting is enabled. */
8171
8172 bfd_boolean
8173 elf_gc_common_final_link (abfd, info)
8174 bfd *abfd;
8175 struct bfd_link_info *info;
8176 {
8177 if (!elf_gc_common_finalize_got_offsets (abfd, info))
8178 return FALSE;
8179
8180 /* Invoke the regular ELF backend linker to do all the work. */
8181 return elf_bfd_final_link (abfd, info);
8182 }
8183
8184 /* This function will be called though elf_link_hash_traverse to store
8185 all hash value of the exported symbols in an array. */
8186
8187 static bfd_boolean
8188 elf_collect_hash_codes (h, data)
8189 struct elf_link_hash_entry *h;
8190 PTR data;
8191 {
8192 unsigned long **valuep = (unsigned long **) data;
8193 const char *name;
8194 char *p;
8195 unsigned long ha;
8196 char *alc = NULL;
8197
8198 if (h->root.type == bfd_link_hash_warning)
8199 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8200
8201 /* Ignore indirect symbols. These are added by the versioning code. */
8202 if (h->dynindx == -1)
8203 return TRUE;
8204
8205 name = h->root.root.string;
8206 p = strchr (name, ELF_VER_CHR);
8207 if (p != NULL)
8208 {
8209 alc = bfd_malloc ((bfd_size_type) (p - name + 1));
8210 memcpy (alc, name, (size_t) (p - name));
8211 alc[p - name] = '\0';
8212 name = alc;
8213 }
8214
8215 /* Compute the hash value. */
8216 ha = bfd_elf_hash (name);
8217
8218 /* Store the found hash value in the array given as the argument. */
8219 *(*valuep)++ = ha;
8220
8221 /* And store it in the struct so that we can put it in the hash table
8222 later. */
8223 h->elf_hash_value = ha;
8224
8225 if (alc != NULL)
8226 free (alc);
8227
8228 return TRUE;
8229 }
8230
8231 bfd_boolean
8232 elf_reloc_symbol_deleted_p (offset, cookie)
8233 bfd_vma offset;
8234 PTR cookie;
8235 {
8236 struct elf_reloc_cookie *rcookie = (struct elf_reloc_cookie *) cookie;
8237
8238 if (rcookie->bad_symtab)
8239 rcookie->rel = rcookie->rels;
8240
8241 for (; rcookie->rel < rcookie->relend; rcookie->rel++)
8242 {
8243 unsigned long r_symndx;
8244
8245 if (! rcookie->bad_symtab)
8246 if (rcookie->rel->r_offset > offset)
8247 return FALSE;
8248 if (rcookie->rel->r_offset != offset)
8249 continue;
8250
8251 r_symndx = ELF_R_SYM (rcookie->rel->r_info);
8252 if (r_symndx == SHN_UNDEF)
8253 return TRUE;
8254
8255 if (r_symndx >= rcookie->locsymcount
8256 || ELF_ST_BIND (rcookie->locsyms[r_symndx].st_info) != STB_LOCAL)
8257 {
8258 struct elf_link_hash_entry *h;
8259
8260 h = rcookie->sym_hashes[r_symndx - rcookie->extsymoff];
8261
8262 while (h->root.type == bfd_link_hash_indirect
8263 || h->root.type == bfd_link_hash_warning)
8264 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8265
8266 if ((h->root.type == bfd_link_hash_defined
8267 || h->root.type == bfd_link_hash_defweak)
8268 && elf_discarded_section (h->root.u.def.section))
8269 return TRUE;
8270 else
8271 return FALSE;
8272 }
8273 else
8274 {
8275 /* It's not a relocation against a global symbol,
8276 but it could be a relocation against a local
8277 symbol for a discarded section. */
8278 asection *isec;
8279 Elf_Internal_Sym *isym;
8280
8281 /* Need to: get the symbol; get the section. */
8282 isym = &rcookie->locsyms[r_symndx];
8283 if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
8284 {
8285 isec = section_from_elf_index (rcookie->abfd, isym->st_shndx);
8286 if (isec != NULL && elf_discarded_section (isec))
8287 return TRUE;
8288 }
8289 }
8290 return FALSE;
8291 }
8292 return FALSE;
8293 }
8294
8295 /* Discard unneeded references to discarded sections.
8296 Returns TRUE if any section's size was changed. */
8297 /* This function assumes that the relocations are in sorted order,
8298 which is true for all known assemblers. */
8299
8300 bfd_boolean
8301 elf_bfd_discard_info (output_bfd, info)
8302 bfd *output_bfd;
8303 struct bfd_link_info *info;
8304 {
8305 struct elf_reloc_cookie cookie;
8306 asection *stab, *eh;
8307 Elf_Internal_Shdr *symtab_hdr;
8308 struct elf_backend_data *bed;
8309 bfd *abfd;
8310 unsigned int count;
8311 bfd_boolean ret = FALSE;
8312
8313 if (info->traditional_format
8314 || info->hash->creator->flavour != bfd_target_elf_flavour
8315 || ! is_elf_hash_table (info))
8316 return FALSE;
8317
8318 for (abfd = info->input_bfds; abfd != NULL; abfd = abfd->link_next)
8319 {
8320 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
8321 continue;
8322
8323 bed = get_elf_backend_data (abfd);
8324
8325 if ((abfd->flags & DYNAMIC) != 0)
8326 continue;
8327
8328 eh = bfd_get_section_by_name (abfd, ".eh_frame");
8329 if (eh != NULL
8330 && (eh->_raw_size == 0
8331 || bfd_is_abs_section (eh->output_section)))
8332 eh = NULL;
8333
8334 stab = bfd_get_section_by_name (abfd, ".stab");
8335 if (stab != NULL
8336 && (stab->_raw_size == 0
8337 || bfd_is_abs_section (stab->output_section)
8338 || stab->sec_info_type != ELF_INFO_TYPE_STABS))
8339 stab = NULL;
8340
8341 if (stab == NULL
8342 && eh == NULL
8343 && bed->elf_backend_discard_info == NULL)
8344 continue;
8345
8346 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8347 cookie.abfd = abfd;
8348 cookie.sym_hashes = elf_sym_hashes (abfd);
8349 cookie.bad_symtab = elf_bad_symtab (abfd);
8350 if (cookie.bad_symtab)
8351 {
8352 cookie.locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
8353 cookie.extsymoff = 0;
8354 }
8355 else
8356 {
8357 cookie.locsymcount = symtab_hdr->sh_info;
8358 cookie.extsymoff = symtab_hdr->sh_info;
8359 }
8360
8361 cookie.locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
8362 if (cookie.locsyms == NULL && cookie.locsymcount != 0)
8363 {
8364 cookie.locsyms = bfd_elf_get_elf_syms (abfd, symtab_hdr,
8365 cookie.locsymcount, 0,
8366 NULL, NULL, NULL);
8367 if (cookie.locsyms == NULL)
8368 return FALSE;
8369 }
8370
8371 if (stab != NULL)
8372 {
8373 cookie.rels = NULL;
8374 count = stab->reloc_count;
8375 if (count != 0)
8376 cookie.rels = (NAME(_bfd_elf,link_read_relocs)
8377 (abfd, stab, (PTR) NULL, (Elf_Internal_Rela *) NULL,
8378 info->keep_memory));
8379 if (cookie.rels != NULL)
8380 {
8381 cookie.rel = cookie.rels;
8382 cookie.relend = cookie.rels;
8383 cookie.relend += count * bed->s->int_rels_per_ext_rel;
8384 if (_bfd_discard_section_stabs (abfd, stab,
8385 elf_section_data (stab)->sec_info,
8386 elf_reloc_symbol_deleted_p,
8387 &cookie))
8388 ret = TRUE;
8389 if (elf_section_data (stab)->relocs != cookie.rels)
8390 free (cookie.rels);
8391 }
8392 }
8393
8394 if (eh != NULL)
8395 {
8396 cookie.rels = NULL;
8397 count = eh->reloc_count;
8398 if (count != 0)
8399 cookie.rels = (NAME(_bfd_elf,link_read_relocs)
8400 (abfd, eh, (PTR) NULL, (Elf_Internal_Rela *) NULL,
8401 info->keep_memory));
8402 cookie.rel = cookie.rels;
8403 cookie.relend = cookie.rels;
8404 if (cookie.rels != NULL)
8405 cookie.relend += count * bed->s->int_rels_per_ext_rel;
8406
8407 if (_bfd_elf_discard_section_eh_frame (abfd, info, eh,
8408 elf_reloc_symbol_deleted_p,
8409 &cookie))
8410 ret = TRUE;
8411
8412 if (cookie.rels != NULL
8413 && elf_section_data (eh)->relocs != cookie.rels)
8414 free (cookie.rels);
8415 }
8416
8417 if (bed->elf_backend_discard_info != NULL
8418 && (*bed->elf_backend_discard_info) (abfd, &cookie, info))
8419 ret = TRUE;
8420
8421 if (cookie.locsyms != NULL
8422 && symtab_hdr->contents != (unsigned char *) cookie.locsyms)
8423 {
8424 if (! info->keep_memory)
8425 free (cookie.locsyms);
8426 else
8427 symtab_hdr->contents = (unsigned char *) cookie.locsyms;
8428 }
8429 }
8430
8431 if (info->eh_frame_hdr
8432 && _bfd_elf_discard_section_eh_frame_hdr (output_bfd, info))
8433 ret = TRUE;
8434
8435 return ret;
8436 }
8437
8438 static bfd_boolean
8439 elf_section_ignore_discarded_relocs (sec)
8440 asection *sec;
8441 {
8442 struct elf_backend_data *bed;
8443
8444 switch (sec->sec_info_type)
8445 {
8446 case ELF_INFO_TYPE_STABS:
8447 case ELF_INFO_TYPE_EH_FRAME:
8448 return TRUE;
8449 default:
8450 break;
8451 }
8452
8453 bed = get_elf_backend_data (sec->owner);
8454 if (bed->elf_backend_ignore_discarded_relocs != NULL
8455 && (*bed->elf_backend_ignore_discarded_relocs) (sec))
8456 return TRUE;
8457
8458 return FALSE;
8459 }
This page took 0.242144 seconds and 5 git commands to generate.