* elf-bfd.h (struct elf_backend_data): New function pointer member
[deliverable/binutils-gdb.git] / bfd / elflink.h
CommitLineData
252b5132 1/* ELF linker support.
68bfbfcc 2 Copyright 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003
7898deda 3 Free Software Foundation, Inc.
252b5132 4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
252b5132
RH
20
21/* ELF linker code. */
22
29ca8dc5
NS
23#include "safe-ctype.h"
24
268b6b39
AM
25static bfd_boolean elf_link_add_object_symbols (bfd *, struct bfd_link_info *);
26static bfd_boolean elf_link_add_archive_symbols (bfd *,
27 struct bfd_link_info *);
28static bfd_boolean elf_finalize_dynstr (bfd *, struct bfd_link_info *);
29static bfd_boolean elf_collect_hash_codes (struct elf_link_hash_entry *,
30 void *);
31static bfd_boolean elf_section_ignore_discarded_relocs (asection *);
252b5132
RH
32
33/* Given an ELF BFD, add symbols to the global hash table as
34 appropriate. */
35
b34976b6 36bfd_boolean
268b6b39 37elf_bfd_link_add_symbols (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
38{
39 switch (bfd_get_format (abfd))
40 {
41 case bfd_object:
42 return elf_link_add_object_symbols (abfd, info);
43 case bfd_archive:
44 return elf_link_add_archive_symbols (abfd, info);
45 default:
46 bfd_set_error (bfd_error_wrong_format);
b34976b6 47 return FALSE;
252b5132
RH
48 }
49}
50\f
b34976b6
AM
51/* Return TRUE iff this is a non-common, definition of a non-function symbol. */
52static bfd_boolean
268b6b39
AM
53is_global_data_symbol_definition (bfd *abfd ATTRIBUTE_UNUSED,
54 Elf_Internal_Sym *sym)
48dfb430
NC
55{
56 /* Local symbols do not count, but target specific ones might. */
57 if (ELF_ST_BIND (sym->st_info) != STB_GLOBAL
58 && ELF_ST_BIND (sym->st_info) < STB_LOOS)
b34976b6 59 return FALSE;
48dfb430 60
7da9d88f
NC
61 /* Function symbols do not count. */
62 if (ELF_ST_TYPE (sym->st_info) == STT_FUNC)
b34976b6 63 return FALSE;
7da9d88f 64
48dfb430
NC
65 /* If the section is undefined, then so is the symbol. */
66 if (sym->st_shndx == SHN_UNDEF)
b34976b6 67 return FALSE;
3e932841 68
48dfb430
NC
69 /* If the symbol is defined in the common section, then
70 it is a common definition and so does not count. */
71 if (sym->st_shndx == SHN_COMMON)
b34976b6 72 return FALSE;
48dfb430
NC
73
74 /* If the symbol is in a target specific section then we
75 must rely upon the backend to tell us what it is. */
76 if (sym->st_shndx >= SHN_LORESERVE && sym->st_shndx < SHN_ABS)
77 /* FIXME - this function is not coded yet:
3e932841 78
48dfb430 79 return _bfd_is_global_symbol_definition (abfd, sym);
3e932841 80
48dfb430
NC
81 Instead for now assume that the definition is not global,
82 Even if this is wrong, at least the linker will behave
83 in the same way that it used to do. */
b34976b6 84 return FALSE;
3e932841 85
b34976b6 86 return TRUE;
48dfb430
NC
87}
88
a3a8c91d 89/* Search the symbol table of the archive element of the archive ABFD
4e8a9624 90 whose archive map contains a mention of SYMDEF, and determine if
a3a8c91d 91 the symbol is defined in this element. */
b34976b6 92static bfd_boolean
268b6b39 93elf_link_is_defined_archive_symbol (bfd * abfd, carsym * symdef)
a3a8c91d
NC
94{
95 Elf_Internal_Shdr * hdr;
dc810e39
AM
96 bfd_size_type symcount;
97 bfd_size_type extsymcount;
98 bfd_size_type extsymoff;
6cdc0ccc
AM
99 Elf_Internal_Sym *isymbuf;
100 Elf_Internal_Sym *isym;
101 Elf_Internal_Sym *isymend;
b34976b6 102 bfd_boolean result;
3e932841 103
a3a8c91d 104 abfd = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
268b6b39 105 if (abfd == NULL)
b34976b6 106 return FALSE;
a3a8c91d
NC
107
108 if (! bfd_check_format (abfd, bfd_object))
b34976b6 109 return FALSE;
a3a8c91d 110
48dfb430
NC
111 /* If we have already included the element containing this symbol in the
112 link then we do not need to include it again. Just claim that any symbol
113 it contains is not a definition, so that our caller will not decide to
114 (re)include this element. */
115 if (abfd->archive_pass)
b34976b6 116 return FALSE;
3e932841 117
a3a8c91d
NC
118 /* Select the appropriate symbol table. */
119 if ((abfd->flags & DYNAMIC) == 0 || elf_dynsymtab (abfd) == 0)
6cdc0ccc 120 hdr = &elf_tdata (abfd)->symtab_hdr;
a3a8c91d 121 else
6cdc0ccc 122 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
a3a8c91d
NC
123
124 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
125
126 /* The sh_info field of the symtab header tells us where the
127 external symbols start. We don't care about the local symbols. */
128 if (elf_bad_symtab (abfd))
129 {
130 extsymcount = symcount;
131 extsymoff = 0;
132 }
133 else
134 {
135 extsymcount = symcount - hdr->sh_info;
136 extsymoff = hdr->sh_info;
137 }
138
6cdc0ccc 139 if (extsymcount == 0)
b34976b6 140 return FALSE;
a3a8c91d 141
6cdc0ccc
AM
142 /* Read in the symbol table. */
143 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
144 NULL, NULL, NULL);
145 if (isymbuf == NULL)
b34976b6 146 return FALSE;
a3a8c91d
NC
147
148 /* Scan the symbol table looking for SYMDEF. */
b34976b6 149 result = FALSE;
6cdc0ccc 150 for (isym = isymbuf, isymend = isymbuf + extsymcount; isym < isymend; isym++)
a3a8c91d 151 {
6cdc0ccc 152 const char *name;
a3a8c91d 153
6cdc0ccc
AM
154 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
155 isym->st_name);
268b6b39 156 if (name == NULL)
a3a8c91d
NC
157 break;
158
159 if (strcmp (name, symdef->name) == 0)
160 {
6cdc0ccc 161 result = is_global_data_symbol_definition (abfd, isym);
a3a8c91d
NC
162 break;
163 }
164 }
165
6cdc0ccc 166 free (isymbuf);
3e932841 167
a3a8c91d
NC
168 return result;
169}
170\f
252b5132
RH
171/* Add symbols from an ELF archive file to the linker hash table. We
172 don't use _bfd_generic_link_add_archive_symbols because of a
173 problem which arises on UnixWare. The UnixWare libc.so is an
174 archive which includes an entry libc.so.1 which defines a bunch of
175 symbols. The libc.so archive also includes a number of other
176 object files, which also define symbols, some of which are the same
177 as those defined in libc.so.1. Correct linking requires that we
178 consider each object file in turn, and include it if it defines any
179 symbols we need. _bfd_generic_link_add_archive_symbols does not do
180 this; it looks through the list of undefined symbols, and includes
181 any object file which defines them. When this algorithm is used on
182 UnixWare, it winds up pulling in libc.so.1 early and defining a
183 bunch of symbols. This means that some of the other objects in the
184 archive are not included in the link, which is incorrect since they
185 precede libc.so.1 in the archive.
186
187 Fortunately, ELF archive handling is simpler than that done by
188 _bfd_generic_link_add_archive_symbols, which has to allow for a.out
189 oddities. In ELF, if we find a symbol in the archive map, and the
190 symbol is currently undefined, we know that we must pull in that
191 object file.
192
193 Unfortunately, we do have to make multiple passes over the symbol
194 table until nothing further is resolved. */
195
b34976b6 196static bfd_boolean
268b6b39 197elf_link_add_archive_symbols (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
198{
199 symindex c;
b34976b6
AM
200 bfd_boolean *defined = NULL;
201 bfd_boolean *included = NULL;
252b5132 202 carsym *symdefs;
b34976b6 203 bfd_boolean loop;
dc810e39 204 bfd_size_type amt;
252b5132
RH
205
206 if (! bfd_has_map (abfd))
207 {
208 /* An empty archive is a special case. */
268b6b39 209 if (bfd_openr_next_archived_file (abfd, NULL) == NULL)
b34976b6 210 return TRUE;
252b5132 211 bfd_set_error (bfd_error_no_armap);
b34976b6 212 return FALSE;
252b5132
RH
213 }
214
215 /* Keep track of all symbols we know to be already defined, and all
216 files we know to be already included. This is to speed up the
217 second and subsequent passes. */
218 c = bfd_ardata (abfd)->symdef_count;
219 if (c == 0)
b34976b6 220 return TRUE;
dc810e39 221 amt = c;
b34976b6 222 amt *= sizeof (bfd_boolean);
268b6b39
AM
223 defined = bfd_zmalloc (amt);
224 included = bfd_zmalloc (amt);
225 if (defined == NULL || included == NULL)
252b5132 226 goto error_return;
252b5132
RH
227
228 symdefs = bfd_ardata (abfd)->symdefs;
229
230 do
231 {
232 file_ptr last;
233 symindex i;
234 carsym *symdef;
235 carsym *symdefend;
236
b34976b6 237 loop = FALSE;
252b5132
RH
238 last = -1;
239
240 symdef = symdefs;
241 symdefend = symdef + c;
242 for (i = 0; symdef < symdefend; symdef++, i++)
243 {
244 struct elf_link_hash_entry *h;
245 bfd *element;
246 struct bfd_link_hash_entry *undefs_tail;
247 symindex mark;
248
249 if (defined[i] || included[i])
250 continue;
251 if (symdef->file_offset == last)
252 {
b34976b6 253 included[i] = TRUE;
252b5132
RH
254 continue;
255 }
256
257 h = elf_link_hash_lookup (elf_hash_table (info), symdef->name,
b34976b6 258 FALSE, FALSE, FALSE);
252b5132
RH
259
260 if (h == NULL)
261 {
262 char *p, *copy;
48fc70a2 263 size_t len, first;
252b5132
RH
264
265 /* If this is a default version (the name contains @@),
48fc70a2
AM
266 look up the symbol again with only one `@' as well
267 as without the version. The effect is that references
268 to the symbol with and without the version will be
269 matched by the default symbol in the archive. */
252b5132
RH
270
271 p = strchr (symdef->name, ELF_VER_CHR);
272 if (p == NULL || p[1] != ELF_VER_CHR)
273 continue;
274
48fc70a2
AM
275 /* First check with only one `@'. */
276 len = strlen (symdef->name);
268b6b39 277 copy = bfd_alloc (abfd, len);
252b5132
RH
278 if (copy == NULL)
279 goto error_return;
48fc70a2
AM
280 first = p - symdef->name + 1;
281 memcpy (copy, symdef->name, first);
282 memcpy (copy + first, symdef->name + first + 1, len - first);
252b5132
RH
283
284 h = elf_link_hash_lookup (elf_hash_table (info), copy,
b34976b6 285 FALSE, FALSE, FALSE);
252b5132 286
48fc70a2 287 if (h == NULL)
58821868 288 {
48fc70a2
AM
289 /* We also need to check references to the symbol
290 without the version. */
291
292 copy[first - 1] = '\0';
293 h = elf_link_hash_lookup (elf_hash_table (info),
b34976b6 294 copy, FALSE, FALSE, FALSE);
48fc70a2
AM
295 }
296
252b5132
RH
297 bfd_release (abfd, copy);
298 }
299
300 if (h == NULL)
301 continue;
302
a3a8c91d
NC
303 if (h->root.type == bfd_link_hash_common)
304 {
305 /* We currently have a common symbol. The archive map contains
306 a reference to this symbol, so we may want to include it. We
307 only want to include it however, if this archive element
308 contains a definition of the symbol, not just another common
309 declaration of it.
310
311 Unfortunately some archivers (including GNU ar) will put
312 declarations of common symbols into their archive maps, as
313 well as real definitions, so we cannot just go by the archive
314 map alone. Instead we must read in the element's symbol
315 table and check that to see what kind of symbol definition
316 this is. */
317 if (! elf_link_is_defined_archive_symbol (abfd, symdef))
318 continue;
319 }
320 else if (h->root.type != bfd_link_hash_undefined)
252b5132
RH
321 {
322 if (h->root.type != bfd_link_hash_undefweak)
b34976b6 323 defined[i] = TRUE;
252b5132
RH
324 continue;
325 }
326
327 /* We need to include this archive member. */
252b5132 328 element = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
268b6b39 329 if (element == NULL)
252b5132
RH
330 goto error_return;
331
332 if (! bfd_check_format (element, bfd_object))
333 goto error_return;
334
335 /* Doublecheck that we have not included this object
336 already--it should be impossible, but there may be
337 something wrong with the archive. */
338 if (element->archive_pass != 0)
339 {
340 bfd_set_error (bfd_error_bad_value);
341 goto error_return;
342 }
343 element->archive_pass = 1;
344
345 undefs_tail = info->hash->undefs_tail;
346
347 if (! (*info->callbacks->add_archive_element) (info, element,
348 symdef->name))
349 goto error_return;
350 if (! elf_link_add_object_symbols (element, info))
351 goto error_return;
352
353 /* If there are any new undefined symbols, we need to make
354 another pass through the archive in order to see whether
355 they can be defined. FIXME: This isn't perfect, because
356 common symbols wind up on undefs_tail and because an
357 undefined symbol which is defined later on in this pass
358 does not require another pass. This isn't a bug, but it
359 does make the code less efficient than it could be. */
360 if (undefs_tail != info->hash->undefs_tail)
b34976b6 361 loop = TRUE;
252b5132
RH
362
363 /* Look backward to mark all symbols from this object file
364 which we have already seen in this pass. */
365 mark = i;
366 do
367 {
b34976b6 368 included[mark] = TRUE;
252b5132
RH
369 if (mark == 0)
370 break;
371 --mark;
372 }
373 while (symdefs[mark].file_offset == symdef->file_offset);
374
375 /* We mark subsequent symbols from this object file as we go
376 on through the loop. */
377 last = symdef->file_offset;
378 }
379 }
380 while (loop);
381
382 free (defined);
383 free (included);
384
b34976b6 385 return TRUE;
252b5132
RH
386
387 error_return:
268b6b39 388 if (defined != NULL)
252b5132 389 free (defined);
268b6b39 390 if (included != NULL)
252b5132 391 free (included);
b34976b6 392 return FALSE;
252b5132
RH
393}
394
45d6a902 395/* Add symbols from an ELF object file to the linker hash table. */
252b5132 396
b34976b6 397static bfd_boolean
268b6b39 398elf_link_add_object_symbols (bfd *abfd, struct bfd_link_info *info)
252b5132 399{
45d6a902 400 bfd_boolean (*add_symbol_hook)
268b6b39
AM
401 (bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
402 const char **, flagword *, asection **, bfd_vma *);
45d6a902 403 bfd_boolean (*check_relocs)
268b6b39 404 (bfd *, struct bfd_link_info *, asection *, const Elf_Internal_Rela *);
45d6a902
AM
405 bfd_boolean collect;
406 Elf_Internal_Shdr *hdr;
407 bfd_size_type symcount;
408 bfd_size_type extsymcount;
409 bfd_size_type extsymoff;
410 struct elf_link_hash_entry **sym_hash;
411 bfd_boolean dynamic;
412 Elf_External_Versym *extversym = NULL;
413 Elf_External_Versym *ever;
414 struct elf_link_hash_entry *weaks;
415 struct elf_link_hash_entry **nondeflt_vers = NULL;
416 bfd_size_type nondeflt_vers_cnt = 0;
417 Elf_Internal_Sym *isymbuf = NULL;
418 Elf_Internal_Sym *isym;
419 Elf_Internal_Sym *isymend;
9c5bfbb7 420 const struct elf_backend_data *bed;
45d6a902
AM
421 bfd_boolean dt_needed;
422 struct elf_link_hash_table * hash_table;
423 bfd_size_type amt;
252b5132 424
45d6a902 425 hash_table = elf_hash_table (info);
252b5132 426
45d6a902
AM
427 bed = get_elf_backend_data (abfd);
428 add_symbol_hook = bed->elf_add_symbol_hook;
429 collect = bed->collect;
252b5132 430
45d6a902
AM
431 if ((abfd->flags & DYNAMIC) == 0)
432 dynamic = FALSE;
252b5132 433 else
252b5132 434 {
45d6a902 435 dynamic = TRUE;
252b5132 436
45d6a902
AM
437 /* You can't use -r against a dynamic object. Also, there's no
438 hope of using a dynamic object which does not exactly match
439 the format of the output file. */
1049f94e 440 if (info->relocatable || info->hash->creator != abfd->xvec)
45d6a902
AM
441 {
442 bfd_set_error (bfd_error_invalid_operation);
443 goto error_return;
444 }
252b5132
RH
445 }
446
45d6a902
AM
447 /* As a GNU extension, any input sections which are named
448 .gnu.warning.SYMBOL are treated as warning symbols for the given
449 symbol. This differs from .gnu.warning sections, which generate
450 warnings when they are included in an output file. */
36af4a4e 451 if (info->executable)
45d6a902
AM
452 {
453 asection *s;
b4536acd 454
45d6a902
AM
455 for (s = abfd->sections; s != NULL; s = s->next)
456 {
457 const char *name;
252b5132 458
45d6a902
AM
459 name = bfd_get_section_name (abfd, s);
460 if (strncmp (name, ".gnu.warning.", sizeof ".gnu.warning." - 1) == 0)
461 {
462 char *msg;
463 bfd_size_type sz;
8c675694
NC
464 bfd_size_type prefix_len;
465 const char * gnu_warning_prefix = _("warning: ");
252b5132 466
45d6a902 467 name += sizeof ".gnu.warning." - 1;
0035bd7b 468
45d6a902
AM
469 /* If this is a shared object, then look up the symbol
470 in the hash table. If it is there, and it is already
471 been defined, then we will not be using the entry
472 from this shared object, so we don't need to warn.
473 FIXME: If we see the definition in a regular object
474 later on, we will warn, but we shouldn't. The only
475 fix is to keep track of what warnings we are supposed
476 to emit, and then handle them all at the end of the
477 link. */
478 if (dynamic && abfd->xvec == info->hash->creator)
479 {
480 struct elf_link_hash_entry *h;
0035bd7b 481
45d6a902
AM
482 h = elf_link_hash_lookup (hash_table, name,
483 FALSE, FALSE, TRUE);
0035bd7b 484
45d6a902
AM
485 /* FIXME: What about bfd_link_hash_common? */
486 if (h != NULL
487 && (h->root.type == bfd_link_hash_defined
488 || h->root.type == bfd_link_hash_defweak))
489 {
490 /* We don't want to issue this warning. Clobber
491 the section size so that the warning does not
492 get copied into the output file. */
493 s->_raw_size = 0;
494 continue;
495 }
496 }
0035bd7b 497
45d6a902 498 sz = bfd_section_size (abfd, s);
8c675694
NC
499 prefix_len = strlen (gnu_warning_prefix);
500 msg = bfd_alloc (abfd, prefix_len + sz + 1);
45d6a902
AM
501 if (msg == NULL)
502 goto error_return;
252b5132 503
8c675694
NC
504 strcpy (msg, gnu_warning_prefix);
505 if (! bfd_get_section_contents (abfd, s, msg + prefix_len, 0, sz))
45d6a902 506 goto error_return;
252b5132 507
8c675694 508 msg[prefix_len + sz] = '\0';
252b5132 509
45d6a902 510 if (! (_bfd_generic_link_add_one_symbol
268b6b39
AM
511 (info, abfd, name, BSF_WARNING, s, 0, msg,
512 FALSE, collect, NULL)))
45d6a902 513 goto error_return;
252b5132 514
1049f94e 515 if (! info->relocatable)
45d6a902
AM
516 {
517 /* Clobber the section size so that the warning does
518 not get copied into the output file. */
519 s->_raw_size = 0;
520 }
1b1fe8fe 521 }
d31e3dfe 522 }
1b1fe8fe
L
523 }
524
45d6a902
AM
525 dt_needed = FALSE;
526 if (! dynamic)
c424e0e9 527 {
45d6a902
AM
528 /* If we are creating a shared library, create all the dynamic
529 sections immediately. We need to attach them to something,
530 so we attach them to this BFD, provided it is the right
531 format. FIXME: If there are no input BFD's of the same
532 format as the output, we can't make a shared library. */
533 if (info->shared
534 && is_elf_hash_table (info)
535 && ! hash_table->dynamic_sections_created
536 && abfd->xvec == info->hash->creator)
c424e0e9 537 {
45d6a902
AM
538 if (! _bfd_elf_link_create_dynamic_sections (abfd, info))
539 goto error_return;
c424e0e9
L
540 }
541 }
45d6a902
AM
542 else if (! is_elf_hash_table (info))
543 goto error_return;
c424e0e9 544 else
c424e0e9 545 {
45d6a902
AM
546 asection *s;
547 bfd_boolean add_needed;
548 const char *name;
549 bfd_size_type oldsize;
550 bfd_size_type strindex;
551 struct bfd_link_needed_list *rpath = NULL, *runpath = NULL;
252b5132 552
45d6a902
AM
553 /* ld --just-symbols and dynamic objects don't mix very well.
554 Test for --just-symbols by looking at info set up by
555 _bfd_elf_link_just_syms. */
556 if ((s = abfd->sections) != NULL
557 && s->sec_info_type == ELF_INFO_TYPE_JUST_SYMS)
558 goto error_return;
252b5132 559
45d6a902
AM
560 /* Find the name to use in a DT_NEEDED entry that refers to this
561 object. If the object has a DT_SONAME entry, we use it.
562 Otherwise, if the generic linker stuck something in
563 elf_dt_name, we use that. Otherwise, we just use the file
564 name. If the generic linker put a null string into
565 elf_dt_name, we don't make a DT_NEEDED entry at all, even if
566 there is a DT_SONAME entry. */
567 add_needed = TRUE;
568 name = bfd_get_filename (abfd);
569 if (elf_dt_name (abfd) != NULL)
570 {
571 name = elf_dt_name (abfd);
572 if (*name == '\0')
573 {
574 if (elf_dt_soname (abfd) != NULL)
575 dt_needed = TRUE;
252b5132 576
45d6a902
AM
577 add_needed = FALSE;
578 }
579 }
580 s = bfd_get_section_by_name (abfd, ".dynamic");
581 if (s != NULL)
582 {
583 Elf_External_Dyn *dynbuf = NULL;
584 Elf_External_Dyn *extdyn;
585 Elf_External_Dyn *extdynend;
586 int elfsec;
587 unsigned long shlink;
252b5132 588
268b6b39 589 dynbuf = bfd_malloc (s->_raw_size);
45d6a902
AM
590 if (dynbuf == NULL)
591 goto error_return;
252b5132 592
268b6b39 593 if (! bfd_get_section_contents (abfd, s, dynbuf, 0, s->_raw_size))
45d6a902 594 goto error_free_dyn;
252b5132 595
45d6a902
AM
596 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
597 if (elfsec == -1)
598 goto error_free_dyn;
599 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132 600
45d6a902
AM
601 extdyn = dynbuf;
602 extdynend = extdyn + s->_raw_size / sizeof (Elf_External_Dyn);
603 for (; extdyn < extdynend; extdyn++)
604 {
605 Elf_Internal_Dyn dyn;
252b5132 606
45d6a902
AM
607 elf_swap_dyn_in (abfd, extdyn, &dyn);
608 if (dyn.d_tag == DT_SONAME)
609 {
610 unsigned int tagv = dyn.d_un.d_val;
611 name = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
612 if (name == NULL)
613 goto error_free_dyn;
614 }
615 if (dyn.d_tag == DT_NEEDED)
616 {
617 struct bfd_link_needed_list *n, **pn;
618 char *fnm, *anm;
619 unsigned int tagv = dyn.d_un.d_val;
252b5132 620
45d6a902 621 amt = sizeof (struct bfd_link_needed_list);
268b6b39 622 n = bfd_alloc (abfd, amt);
45d6a902
AM
623 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
624 if (n == NULL || fnm == NULL)
625 goto error_free_dyn;
626 amt = strlen (fnm) + 1;
627 anm = bfd_alloc (abfd, amt);
628 if (anm == NULL)
629 goto error_free_dyn;
268b6b39 630 memcpy (anm, fnm, amt);
45d6a902
AM
631 n->name = anm;
632 n->by = abfd;
633 n->next = NULL;
634 for (pn = & hash_table->needed;
635 *pn != NULL;
636 pn = &(*pn)->next)
637 ;
638 *pn = n;
639 }
640 if (dyn.d_tag == DT_RUNPATH)
641 {
642 struct bfd_link_needed_list *n, **pn;
643 char *fnm, *anm;
644 unsigned int tagv = dyn.d_un.d_val;
252b5132 645
45d6a902 646 amt = sizeof (struct bfd_link_needed_list);
268b6b39 647 n = bfd_alloc (abfd, amt);
45d6a902
AM
648 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
649 if (n == NULL || fnm == NULL)
650 goto error_free_dyn;
651 amt = strlen (fnm) + 1;
652 anm = bfd_alloc (abfd, amt);
653 if (anm == NULL)
654 goto error_free_dyn;
268b6b39 655 memcpy (anm, fnm, amt);
45d6a902
AM
656 n->name = anm;
657 n->by = abfd;
658 n->next = NULL;
659 for (pn = & runpath;
660 *pn != NULL;
661 pn = &(*pn)->next)
662 ;
663 *pn = n;
664 }
665 /* Ignore DT_RPATH if we have seen DT_RUNPATH. */
666 if (!runpath && dyn.d_tag == DT_RPATH)
667 {
668 struct bfd_link_needed_list *n, **pn;
669 char *fnm, *anm;
670 unsigned int tagv = dyn.d_un.d_val;
252b5132 671
45d6a902 672 amt = sizeof (struct bfd_link_needed_list);
268b6b39 673 n = bfd_alloc (abfd, amt);
45d6a902
AM
674 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
675 if (n == NULL || fnm == NULL)
676 goto error_free_dyn;
677 amt = strlen (fnm) + 1;
678 anm = bfd_alloc (abfd, amt);
679 if (anm == NULL)
680 {
681 error_free_dyn:
682 free (dynbuf);
683 goto error_return;
684 }
268b6b39 685 memcpy (anm, fnm, amt);
45d6a902
AM
686 n->name = anm;
687 n->by = abfd;
688 n->next = NULL;
689 for (pn = & rpath;
690 *pn != NULL;
691 pn = &(*pn)->next)
692 ;
693 *pn = n;
694 }
695 }
252b5132 696
45d6a902
AM
697 free (dynbuf);
698 }
252b5132 699
45d6a902
AM
700 /* DT_RUNPATH overrides DT_RPATH. Do _NOT_ bfd_release, as that
701 frees all more recently bfd_alloc'd blocks as well. */
702 if (runpath)
703 rpath = runpath;
3c0a515d 704
45d6a902 705 if (rpath)
3c0a515d 706 {
45d6a902
AM
707 struct bfd_link_needed_list **pn;
708 for (pn = & hash_table->runpath;
709 *pn != NULL;
710 pn = &(*pn)->next)
711 ;
712 *pn = rpath;
3c0a515d 713 }
252b5132 714
45d6a902
AM
715 /* We do not want to include any of the sections in a dynamic
716 object in the output file. We hack by simply clobbering the
717 list of sections in the BFD. This could be handled more
718 cleanly by, say, a new section flag; the existing
719 SEC_NEVER_LOAD flag is not the one we want, because that one
720 still implies that the section takes up space in the output
721 file. */
722 bfd_section_list_clear (abfd);
0525d26e 723
45d6a902
AM
724 /* If this is the first dynamic object found in the link, create
725 the special sections required for dynamic linking. */
726 if (! hash_table->dynamic_sections_created)
727 if (! _bfd_elf_link_create_dynamic_sections (abfd, info))
728 goto error_return;
0525d26e 729
45d6a902
AM
730 if (add_needed)
731 {
732 /* Add a DT_NEEDED entry for this dynamic object. */
733 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
734 strindex = _bfd_elf_strtab_add (hash_table->dynstr, name, FALSE);
735 if (strindex == (bfd_size_type) -1)
736 goto error_return;
252b5132 737
45d6a902
AM
738 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
739 {
740 asection *sdyn;
741 Elf_External_Dyn *dyncon, *dynconend;
215007a6 742
45d6a902
AM
743 /* The hash table size did not change, which means that
744 the dynamic object name was already entered. If we
745 have already included this dynamic object in the
746 link, just ignore it. There is no reason to include
747 a particular dynamic object more than once. */
748 sdyn = bfd_get_section_by_name (hash_table->dynobj, ".dynamic");
749 BFD_ASSERT (sdyn != NULL);
215007a6 750
45d6a902
AM
751 dyncon = (Elf_External_Dyn *) sdyn->contents;
752 dynconend = (Elf_External_Dyn *) (sdyn->contents +
753 sdyn->_raw_size);
754 for (; dyncon < dynconend; dyncon++)
755 {
756 Elf_Internal_Dyn dyn;
215007a6 757
45d6a902
AM
758 elf_swap_dyn_in (hash_table->dynobj, dyncon, & dyn);
759 if (dyn.d_tag == DT_NEEDED
760 && dyn.d_un.d_val == strindex)
761 {
762 _bfd_elf_strtab_delref (hash_table->dynstr, strindex);
763 return TRUE;
764 }
765 }
766 }
767
268b6b39 768 if (! elf_add_dynamic_entry (info, DT_NEEDED, strindex))
45d6a902 769 goto error_return;
215007a6 770 }
45d6a902
AM
771
772 /* Save the SONAME, if there is one, because sometimes the
773 linker emulation code will need to know it. */
774 if (*name == '\0')
775 name = basename (bfd_get_filename (abfd));
776 elf_dt_name (abfd) = name;
215007a6
L
777 }
778
45d6a902
AM
779 /* If this is a dynamic object, we always link against the .dynsym
780 symbol table, not the .symtab symbol table. The dynamic linker
781 will only see the .dynsym symbol table, so there is no reason to
782 look at .symtab for a dynamic object. */
215007a6 783
45d6a902
AM
784 if (! dynamic || elf_dynsymtab (abfd) == 0)
785 hdr = &elf_tdata (abfd)->symtab_hdr;
786 else
787 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
215007a6 788
45d6a902 789 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
d31e3dfe 790
45d6a902
AM
791 /* The sh_info field of the symtab header tells us where the
792 external symbols start. We don't care about the local symbols at
793 this point. */
794 if (elf_bad_symtab (abfd))
215007a6 795 {
45d6a902
AM
796 extsymcount = symcount;
797 extsymoff = 0;
215007a6
L
798 }
799 else
800 {
45d6a902
AM
801 extsymcount = symcount - hdr->sh_info;
802 extsymoff = hdr->sh_info;
215007a6
L
803 }
804
45d6a902
AM
805 sym_hash = NULL;
806 if (extsymcount != 0)
215007a6 807 {
45d6a902
AM
808 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
809 NULL, NULL, NULL);
810 if (isymbuf == NULL)
811 goto error_return;
215007a6 812
45d6a902
AM
813 /* We store a pointer to the hash table entry for each external
814 symbol. */
815 amt = extsymcount * sizeof (struct elf_link_hash_entry *);
268b6b39 816 sym_hash = bfd_alloc (abfd, amt);
45d6a902
AM
817 if (sym_hash == NULL)
818 goto error_free_sym;
819 elf_sym_hashes (abfd) = sym_hash;
820 }
215007a6 821
45d6a902
AM
822 if (dynamic)
823 {
824 /* Read in any version definitions. */
825 if (! _bfd_elf_slurp_version_tables (abfd))
826 goto error_free_sym;
215007a6 827
45d6a902
AM
828 /* Read in the symbol versions, but don't bother to convert them
829 to internal format. */
830 if (elf_dynversym (abfd) != 0)
215007a6 831 {
45d6a902
AM
832 Elf_Internal_Shdr *versymhdr;
833
834 versymhdr = &elf_tdata (abfd)->dynversym_hdr;
268b6b39 835 extversym = bfd_malloc (versymhdr->sh_size);
45d6a902
AM
836 if (extversym == NULL)
837 goto error_free_sym;
838 amt = versymhdr->sh_size;
839 if (bfd_seek (abfd, versymhdr->sh_offset, SEEK_SET) != 0
268b6b39 840 || bfd_bread (extversym, amt, abfd) != amt)
45d6a902 841 goto error_free_vers;
215007a6
L
842 }
843 }
844
45d6a902 845 weaks = NULL;
215007a6 846
45d6a902
AM
847 ever = extversym != NULL ? extversym + extsymoff : NULL;
848 for (isym = isymbuf, isymend = isymbuf + extsymcount;
849 isym < isymend;
850 isym++, sym_hash++, ever = (ever != NULL ? ever + 1 : NULL))
851 {
852 int bind;
853 bfd_vma value;
854 asection *sec;
855 flagword flags;
856 const char *name;
857 struct elf_link_hash_entry *h;
858 bfd_boolean definition;
859 bfd_boolean size_change_ok;
860 bfd_boolean type_change_ok;
861 bfd_boolean new_weakdef;
862 bfd_boolean override;
863 unsigned int old_alignment;
864 bfd *old_bfd;
215007a6 865
45d6a902 866 override = FALSE;
d31e3dfe 867
45d6a902
AM
868 flags = BSF_NO_FLAGS;
869 sec = NULL;
870 value = isym->st_value;
871 *sym_hash = NULL;
215007a6 872
45d6a902
AM
873 bind = ELF_ST_BIND (isym->st_info);
874 if (bind == STB_LOCAL)
875 {
876 /* This should be impossible, since ELF requires that all
877 global symbols follow all local symbols, and that sh_info
878 point to the first global symbol. Unfortunatealy, Irix 5
879 screws this up. */
880 continue;
881 }
882 else if (bind == STB_GLOBAL)
883 {
884 if (isym->st_shndx != SHN_UNDEF
885 && isym->st_shndx != SHN_COMMON)
886 flags = BSF_GLOBAL;
887 }
888 else if (bind == STB_WEAK)
889 flags = BSF_WEAK;
890 else
891 {
892 /* Leave it up to the processor backend. */
893 }
215007a6 894
45d6a902
AM
895 if (isym->st_shndx == SHN_UNDEF)
896 sec = bfd_und_section_ptr;
897 else if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
898 {
899 sec = section_from_elf_index (abfd, isym->st_shndx);
900 if (sec == NULL)
901 sec = bfd_abs_section_ptr;
902 else if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
903 value -= sec->vma;
904 }
905 else if (isym->st_shndx == SHN_ABS)
906 sec = bfd_abs_section_ptr;
907 else if (isym->st_shndx == SHN_COMMON)
908 {
909 sec = bfd_com_section_ptr;
910 /* What ELF calls the size we call the value. What ELF
911 calls the value we call the alignment. */
912 value = isym->st_size;
913 }
914 else
215007a6 915 {
45d6a902
AM
916 /* Leave it up to the processor backend. */
917 }
918
919 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
920 isym->st_name);
268b6b39 921 if (name == NULL)
45d6a902 922 goto error_free_vers;
215007a6 923
45d6a902
AM
924 if (isym->st_shndx == SHN_COMMON
925 && ELF_ST_TYPE (isym->st_info) == STT_TLS)
926 {
927 asection *tcomm = bfd_get_section_by_name (abfd, ".tcommon");
215007a6 928
45d6a902 929 if (tcomm == NULL)
215007a6 930 {
45d6a902
AM
931 tcomm = bfd_make_section (abfd, ".tcommon");
932 if (tcomm == NULL
933 || !bfd_set_section_flags (abfd, tcomm, (SEC_ALLOC
934 | SEC_IS_COMMON
935 | SEC_LINKER_CREATED
936 | SEC_THREAD_LOCAL)))
937 goto error_free_vers;
215007a6 938 }
45d6a902 939 sec = tcomm;
215007a6 940 }
45d6a902
AM
941 else if (add_symbol_hook)
942 {
943 if (! (*add_symbol_hook) (abfd, info, isym, &name, &flags, &sec,
944 &value))
945 goto error_free_vers;
252b5132 946
45d6a902
AM
947 /* The hook function sets the name to NULL if this symbol
948 should be skipped for some reason. */
268b6b39 949 if (name == NULL)
45d6a902
AM
950 continue;
951 }
252b5132 952
45d6a902 953 /* Sanity check that all possibilities were handled. */
268b6b39 954 if (sec == NULL)
252b5132 955 {
45d6a902
AM
956 bfd_set_error (bfd_error_bad_value);
957 goto error_free_vers;
252b5132 958 }
252b5132 959
45d6a902
AM
960 if (bfd_is_und_section (sec)
961 || bfd_is_com_section (sec))
962 definition = FALSE;
963 else
964 definition = TRUE;
252b5132 965
45d6a902
AM
966 size_change_ok = FALSE;
967 type_change_ok = get_elf_backend_data (abfd)->type_change_ok;
968 old_alignment = 0;
969 old_bfd = NULL;
970
971 if (info->hash->creator->flavour == bfd_target_elf_flavour)
252b5132 972 {
45d6a902
AM
973 Elf_Internal_Versym iver;
974 unsigned int vernum = 0;
975 bfd_boolean skip;
252b5132 976
45d6a902 977 if (ever != NULL)
252b5132 978 {
45d6a902
AM
979 _bfd_elf_swap_versym_in (abfd, ever, &iver);
980 vernum = iver.vs_vers & VERSYM_VERSION;
252b5132 981
45d6a902
AM
982 /* If this is a hidden symbol, or if it is not version
983 1, we append the version name to the symbol name.
984 However, we do not modify a non-hidden absolute
985 symbol, because it might be the version symbol
986 itself. FIXME: What if it isn't? */
987 if ((iver.vs_vers & VERSYM_HIDDEN) != 0
988 || (vernum > 1 && ! bfd_is_abs_section (sec)))
252b5132 989 {
45d6a902
AM
990 const char *verstr;
991 size_t namelen, verlen, newlen;
992 char *newname, *p;
252b5132 993
45d6a902 994 if (isym->st_shndx != SHN_UNDEF)
252b5132 995 {
45d6a902
AM
996 if (vernum > elf_tdata (abfd)->dynverdef_hdr.sh_info)
997 {
998 (*_bfd_error_handler)
999 (_("%s: %s: invalid version %u (max %d)"),
1000 bfd_archive_filename (abfd), name, vernum,
1001 elf_tdata (abfd)->dynverdef_hdr.sh_info);
1002 bfd_set_error (bfd_error_bad_value);
1003 goto error_free_vers;
1004 }
1005 else if (vernum > 1)
1006 verstr =
1007 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1008 else
1009 verstr = "";
6cdc0ccc 1010 }
45d6a902
AM
1011 else
1012 {
1013 /* We cannot simply test for the number of
1014 entries in the VERNEED section since the
1015 numbers for the needed versions do not start
1016 at 0. */
1017 Elf_Internal_Verneed *t;
252b5132 1018
45d6a902
AM
1019 verstr = NULL;
1020 for (t = elf_tdata (abfd)->verref;
1021 t != NULL;
1022 t = t->vn_nextref)
1023 {
1024 Elf_Internal_Vernaux *a;
252b5132 1025
45d6a902
AM
1026 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1027 {
1028 if (a->vna_other == vernum)
1029 {
1030 verstr = a->vna_nodename;
1031 break;
1032 }
1033 }
1034 if (a != NULL)
1035 break;
1036 }
1037 if (verstr == NULL)
1038 {
1039 (*_bfd_error_handler)
1040 (_("%s: %s: invalid needed version %d"),
1041 bfd_archive_filename (abfd), name, vernum);
1042 bfd_set_error (bfd_error_bad_value);
1043 goto error_free_vers;
1044 }
1045 }
252b5132 1046
45d6a902
AM
1047 namelen = strlen (name);
1048 verlen = strlen (verstr);
1049 newlen = namelen + verlen + 2;
1050 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
1051 && isym->st_shndx != SHN_UNDEF)
1052 ++newlen;
252b5132 1053
268b6b39 1054 newname = bfd_alloc (abfd, newlen);
45d6a902
AM
1055 if (newname == NULL)
1056 goto error_free_vers;
1057 memcpy (newname, name, namelen);
1058 p = newname + namelen;
1059 *p++ = ELF_VER_CHR;
1060 /* If this is a defined non-hidden version symbol,
1061 we add another @ to the name. This indicates the
1062 default version of the symbol. */
1063 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
1064 && isym->st_shndx != SHN_UNDEF)
1065 *p++ = ELF_VER_CHR;
1066 memcpy (p, verstr, verlen + 1);
252b5132 1067
45d6a902
AM
1068 name = newname;
1069 }
1070 }
252b5132 1071
45d6a902
AM
1072 if (!_bfd_elf_merge_symbol (abfd, info, name, isym, &sec, &value,
1073 sym_hash, &skip, &override,
1074 &type_change_ok, &size_change_ok,
1075 dt_needed))
1076 goto error_free_vers;
252b5132 1077
45d6a902
AM
1078 if (skip)
1079 continue;
252b5132 1080
45d6a902
AM
1081 if (override)
1082 definition = FALSE;
252b5132 1083
45d6a902
AM
1084 h = *sym_hash;
1085 while (h->root.type == bfd_link_hash_indirect
1086 || h->root.type == bfd_link_hash_warning)
1087 h = (struct elf_link_hash_entry *) h->root.u.i.link;
252b5132 1088
45d6a902
AM
1089 /* Remember the old alignment if this is a common symbol, so
1090 that we don't reduce the alignment later on. We can't
1091 check later, because _bfd_generic_link_add_one_symbol
1092 will set a default for the alignment which we want to
1093 override. We also remember the old bfd where the existing
1094 definition comes from. */
1095 switch (h->root.type)
1096 {
1097 default:
1098 break;
252b5132 1099
45d6a902
AM
1100 case bfd_link_hash_defined:
1101 case bfd_link_hash_defweak:
1102 old_bfd = h->root.u.def.section->owner;
1103 break;
1104
1105 case bfd_link_hash_common:
1106 old_bfd = h->root.u.c.p->section->owner;
1107 old_alignment = h->root.u.c.p->alignment_power;
1108 break;
1109 }
252b5132 1110
45d6a902
AM
1111 if (elf_tdata (abfd)->verdef != NULL
1112 && ! override
1113 && vernum > 1
1114 && definition)
1115 h->verinfo.verdef = &elf_tdata (abfd)->verdef[vernum - 1];
1116 }
252b5132 1117
45d6a902 1118 if (! (_bfd_generic_link_add_one_symbol
268b6b39
AM
1119 (info, abfd, name, flags, sec, value, NULL, FALSE, collect,
1120 (struct bfd_link_hash_entry **) sym_hash)))
45d6a902 1121 goto error_free_vers;
252b5132 1122
45d6a902
AM
1123 h = *sym_hash;
1124 while (h->root.type == bfd_link_hash_indirect
1125 || h->root.type == bfd_link_hash_warning)
1126 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1127 *sym_hash = h;
252b5132 1128
45d6a902
AM
1129 new_weakdef = FALSE;
1130 if (dynamic
1131 && definition
1132 && (flags & BSF_WEAK) != 0
1133 && ELF_ST_TYPE (isym->st_info) != STT_FUNC
1134 && info->hash->creator->flavour == bfd_target_elf_flavour
1135 && h->weakdef == NULL)
1136 {
1137 /* Keep a list of all weak defined non function symbols from
1138 a dynamic object, using the weakdef field. Later in this
1139 function we will set the weakdef field to the correct
1140 value. We only put non-function symbols from dynamic
1141 objects on this list, because that happens to be the only
1142 time we need to know the normal symbol corresponding to a
1143 weak symbol, and the information is time consuming to
1144 figure out. If the weakdef field is not already NULL,
1145 then this symbol was already defined by some previous
1146 dynamic object, and we will be using that previous
1147 definition anyhow. */
252b5132 1148
45d6a902
AM
1149 h->weakdef = weaks;
1150 weaks = h;
1151 new_weakdef = TRUE;
252b5132
RH
1152 }
1153
45d6a902
AM
1154 /* Set the alignment of a common symbol. */
1155 if (isym->st_shndx == SHN_COMMON
1156 && h->root.type == bfd_link_hash_common)
252b5132 1157 {
45d6a902
AM
1158 unsigned int align;
1159
1160 align = bfd_log2 (isym->st_value);
1161 if (align > old_alignment
1162 /* Permit an alignment power of zero if an alignment of one
1163 is specified and no other alignments have been specified. */
1164 || (isym->st_value == 1 && old_alignment == 0))
1165 h->root.u.c.p->alignment_power = align;
1166 else
1167 h->root.u.c.p->alignment_power = old_alignment;
252b5132 1168 }
252b5132 1169
45d6a902
AM
1170 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1171 {
1172 int old_flags;
1173 bfd_boolean dynsym;
1174 int new_flag;
1175
1176 /* Check the alignment when a common symbol is involved. This
1177 can change when a common symbol is overriden by a normal
1178 definition or a common symbol is ignored due to the old
1179 normal definition. We need to make sure the maximum
1180 alignment is maintained. */
1181 if ((old_alignment || isym->st_shndx == SHN_COMMON)
1182 && h->root.type != bfd_link_hash_common)
1183 {
1184 unsigned int common_align;
1185 unsigned int normal_align;
1186 unsigned int symbol_align;
1187 bfd *normal_bfd;
1188 bfd *common_bfd;
1189
1190 symbol_align = ffs (h->root.u.def.value) - 1;
40a0491a
AM
1191 if (h->root.u.def.section->owner != NULL
1192 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
45d6a902
AM
1193 {
1194 normal_align = h->root.u.def.section->alignment_power;
1195 if (normal_align > symbol_align)
1196 normal_align = symbol_align;
1197 }
1198 else
1199 normal_align = symbol_align;
1200
1201 if (old_alignment)
1202 {
1203 common_align = old_alignment;
1204 common_bfd = old_bfd;
1205 normal_bfd = abfd;
1206 }
1207 else
1208 {
1209 common_align = bfd_log2 (isym->st_value);
1210 common_bfd = abfd;
1211 normal_bfd = old_bfd;
1212 }
1213
1214 if (normal_align < common_align)
1215 (*_bfd_error_handler)
1216 (_("Warning: alignment %u of symbol `%s' in %s is smaller than %u in %s"),
1217 1 << normal_align,
1218 name,
1219 bfd_archive_filename (normal_bfd),
1220 1 << common_align,
1221 bfd_archive_filename (common_bfd));
1222 }
252b5132 1223
45d6a902
AM
1224 /* Remember the symbol size and type. */
1225 if (isym->st_size != 0
1226 && (definition || h->size == 0))
1227 {
1228 if (h->size != 0 && h->size != isym->st_size && ! size_change_ok)
1229 (*_bfd_error_handler)
1230 (_("Warning: size of symbol `%s' changed from %lu in %s to %lu in %s"),
1231 name, (unsigned long) h->size,
1232 bfd_archive_filename (old_bfd),
1233 (unsigned long) isym->st_size,
1234 bfd_archive_filename (abfd));
252b5132 1235
45d6a902
AM
1236 h->size = isym->st_size;
1237 }
252b5132 1238
45d6a902
AM
1239 /* If this is a common symbol, then we always want H->SIZE
1240 to be the size of the common symbol. The code just above
1241 won't fix the size if a common symbol becomes larger. We
1242 don't warn about a size change here, because that is
1243 covered by --warn-common. */
1244 if (h->root.type == bfd_link_hash_common)
1245 h->size = h->root.u.c.size;
252b5132 1246
45d6a902
AM
1247 if (ELF_ST_TYPE (isym->st_info) != STT_NOTYPE
1248 && (definition || h->type == STT_NOTYPE))
1249 {
1250 if (h->type != STT_NOTYPE
1251 && h->type != ELF_ST_TYPE (isym->st_info)
1252 && ! type_change_ok)
1253 (*_bfd_error_handler)
1254 (_("Warning: type of symbol `%s' changed from %d to %d in %s"),
1255 name, h->type, ELF_ST_TYPE (isym->st_info),
1256 bfd_archive_filename (abfd));
252b5132 1257
45d6a902
AM
1258 h->type = ELF_ST_TYPE (isym->st_info);
1259 }
252b5132 1260
45d6a902
AM
1261 /* If st_other has a processor-specific meaning, specific
1262 code might be needed here. We never merge the visibility
1263 attribute with the one from a dynamic object. */
9bf7216d
KK
1264 if (bed->elf_backend_merge_symbol_attribute)
1265 (*bed->elf_backend_merge_symbol_attribute) (h, isym, definition,
1266 dynamic);
1267
45d6a902
AM
1268 if (isym->st_other != 0 && !dynamic)
1269 {
1270 unsigned char hvis, symvis, other, nvis;
252b5132 1271
45d6a902
AM
1272 /* Take the balance of OTHER from the definition. */
1273 other = (definition ? isym->st_other : h->other);
1274 other &= ~ ELF_ST_VISIBILITY (-1);
8ea2e4bd 1275
45d6a902
AM
1276 /* Combine visibilities, using the most constraining one. */
1277 hvis = ELF_ST_VISIBILITY (h->other);
1278 symvis = ELF_ST_VISIBILITY (isym->st_other);
1279 if (! hvis)
1280 nvis = symvis;
1281 else if (! symvis)
1282 nvis = hvis;
1283 else
1284 nvis = hvis < symvis ? hvis : symvis;
51b64d56 1285
45d6a902
AM
1286 h->other = other | nvis;
1287 }
252b5132 1288
45d6a902
AM
1289 /* Set a flag in the hash table entry indicating the type of
1290 reference or definition we just found. Keep a count of
1291 the number of dynamic symbols we find. A dynamic symbol
1292 is one which is referenced or defined by both a regular
1293 object and a shared object. */
1294 old_flags = h->elf_link_hash_flags;
1295 dynsym = FALSE;
1296 if (! dynamic)
1297 {
1298 if (! definition)
1299 {
1300 new_flag = ELF_LINK_HASH_REF_REGULAR;
1301 if (bind != STB_WEAK)
1302 new_flag |= ELF_LINK_HASH_REF_REGULAR_NONWEAK;
1303 }
1304 else
1305 new_flag = ELF_LINK_HASH_DEF_REGULAR;
36af4a4e 1306 if (! info->executable
45d6a902
AM
1307 || (old_flags & (ELF_LINK_HASH_DEF_DYNAMIC
1308 | ELF_LINK_HASH_REF_DYNAMIC)) != 0)
1309 dynsym = TRUE;
1310 }
1311 else
1312 {
1313 if (! definition)
1314 new_flag = ELF_LINK_HASH_REF_DYNAMIC;
1315 else
1316 new_flag = ELF_LINK_HASH_DEF_DYNAMIC;
1317 if ((old_flags & (ELF_LINK_HASH_DEF_REGULAR
1318 | ELF_LINK_HASH_REF_REGULAR)) != 0
1319 || (h->weakdef != NULL
1320 && ! new_weakdef
1321 && h->weakdef->dynindx != -1))
1322 dynsym = TRUE;
1323 }
252b5132 1324
45d6a902 1325 h->elf_link_hash_flags |= new_flag;
252b5132 1326
45d6a902
AM
1327 /* Check to see if we need to add an indirect symbol for
1328 the default name. */
1329 if (definition || h->root.type == bfd_link_hash_common)
1330 if (!_bfd_elf_add_default_symbol (abfd, info, h, name, isym,
1331 &sec, &value, &dynsym,
1332 override, dt_needed))
1333 goto error_free_vers;
68f69152 1334
45d6a902
AM
1335 if (definition && !dynamic)
1336 {
1337 char *p = strchr (name, ELF_VER_CHR);
1338 if (p != NULL && p[1] != ELF_VER_CHR)
1339 {
1340 /* Queue non-default versions so that .symver x, x@FOO
1341 aliases can be checked. */
1342 if (! nondeflt_vers)
1343 {
1344 amt = (isymend - isym + 1)
1345 * sizeof (struct elf_link_hash_entry *);
1346 nondeflt_vers = bfd_malloc (amt);
1347 }
1348 nondeflt_vers [nondeflt_vers_cnt++] = h;
1349 }
1350 }
252b5132 1351
45d6a902
AM
1352 if (dynsym && h->dynindx == -1)
1353 {
1354 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
1355 goto error_free_vers;
1356 if (h->weakdef != NULL
1357 && ! new_weakdef
1358 && h->weakdef->dynindx == -1)
1359 {
1360 if (! _bfd_elf_link_record_dynamic_symbol (info, h->weakdef))
1361 goto error_free_vers;
1362 }
1363 }
1364 else if (dynsym && h->dynindx != -1)
1365 /* If the symbol already has a dynamic index, but
1366 visibility says it should not be visible, turn it into
1367 a local symbol. */
1368 switch (ELF_ST_VISIBILITY (h->other))
1369 {
1370 case STV_INTERNAL:
1371 case STV_HIDDEN:
1372 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
1373 break;
1374 }
252b5132 1375
45d6a902
AM
1376 if (dt_needed && definition
1377 && (h->elf_link_hash_flags
1378 & ELF_LINK_HASH_REF_REGULAR) != 0)
1379 {
1380 bfd_size_type oldsize;
1381 bfd_size_type strindex;
252b5132 1382
45d6a902
AM
1383 if (! is_elf_hash_table (info))
1384 goto error_free_vers;
252b5132 1385
45d6a902
AM
1386 /* The symbol from a DT_NEEDED object is referenced from
1387 the regular object to create a dynamic executable. We
1388 have to make sure there is a DT_NEEDED entry for it. */
252b5132 1389
45d6a902
AM
1390 dt_needed = FALSE;
1391 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
1392 strindex = _bfd_elf_strtab_add (hash_table->dynstr,
1393 elf_dt_soname (abfd), FALSE);
1394 if (strindex == (bfd_size_type) -1)
1395 goto error_free_vers;
252b5132 1396
45d6a902
AM
1397 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
1398 {
1399 asection *sdyn;
1400 Elf_External_Dyn *dyncon, *dynconend;
252b5132 1401
45d6a902
AM
1402 sdyn = bfd_get_section_by_name (hash_table->dynobj,
1403 ".dynamic");
1404 BFD_ASSERT (sdyn != NULL);
252b5132 1405
45d6a902
AM
1406 dyncon = (Elf_External_Dyn *) sdyn->contents;
1407 dynconend = (Elf_External_Dyn *) (sdyn->contents +
1408 sdyn->_raw_size);
1409 for (; dyncon < dynconend; dyncon++)
1410 {
1411 Elf_Internal_Dyn dyn;
252b5132 1412
45d6a902
AM
1413 elf_swap_dyn_in (hash_table->dynobj,
1414 dyncon, &dyn);
1415 BFD_ASSERT (dyn.d_tag != DT_NEEDED ||
1416 dyn.d_un.d_val != strindex);
1417 }
1418 }
252b5132 1419
268b6b39 1420 if (! elf_add_dynamic_entry (info, DT_NEEDED, strindex))
45d6a902 1421 goto error_free_vers;
252b5132
RH
1422 }
1423 }
45d6a902 1424 }
252b5132 1425
45d6a902
AM
1426 /* Now that all the symbols from this input file are created, handle
1427 .symver foo, foo@BAR such that any relocs against foo become foo@BAR. */
1428 if (nondeflt_vers != NULL)
1429 {
1430 bfd_size_type cnt, symidx;
391a809a 1431
45d6a902 1432 for (cnt = 0; cnt < nondeflt_vers_cnt; ++cnt)
ea44b734 1433 {
45d6a902
AM
1434 struct elf_link_hash_entry *h = nondeflt_vers[cnt], *hi;
1435 char *shortname, *p;
ea44b734 1436
45d6a902
AM
1437 p = strchr (h->root.root.string, ELF_VER_CHR);
1438 if (p == NULL
1439 || (h->root.type != bfd_link_hash_defined
1440 && h->root.type != bfd_link_hash_defweak))
1441 continue;
31941635 1442
45d6a902
AM
1443 amt = p - h->root.root.string;
1444 shortname = bfd_malloc (amt + 1);
1445 memcpy (shortname, h->root.root.string, amt);
1446 shortname[amt] = '\0';
31941635 1447
45d6a902
AM
1448 hi = (struct elf_link_hash_entry *)
1449 bfd_link_hash_lookup (info->hash, shortname,
1450 FALSE, FALSE, FALSE);
1451 if (hi != NULL
1452 && hi->root.type == h->root.type
1453 && hi->root.u.def.value == h->root.u.def.value
1454 && hi->root.u.def.section == h->root.u.def.section)
1455 {
1456 (*bed->elf_backend_hide_symbol) (info, hi, TRUE);
1457 hi->root.type = bfd_link_hash_indirect;
1458 hi->root.u.i.link = (struct bfd_link_hash_entry *) h;
1459 (*bed->elf_backend_copy_indirect_symbol) (bed, h, hi);
1460 sym_hash = elf_sym_hashes (abfd);
1461 if (sym_hash)
1462 for (symidx = 0; symidx < extsymcount; ++symidx)
1463 if (sym_hash[symidx] == hi)
1464 {
1465 sym_hash[symidx] = h;
1466 break;
1467 }
1468 }
1469 free (shortname);
1470 }
1471 free (nondeflt_vers);
1472 nondeflt_vers = NULL;
1473 }
31941635 1474
45d6a902
AM
1475 if (extversym != NULL)
1476 {
1477 free (extversym);
1478 extversym = NULL;
1479 }
31941635 1480
45d6a902
AM
1481 if (isymbuf != NULL)
1482 free (isymbuf);
1483 isymbuf = NULL;
31941635 1484
45d6a902
AM
1485 /* Now set the weakdefs field correctly for all the weak defined
1486 symbols we found. The only way to do this is to search all the
1487 symbols. Since we only need the information for non functions in
1488 dynamic objects, that's the only time we actually put anything on
1489 the list WEAKS. We need this information so that if a regular
1490 object refers to a symbol defined weakly in a dynamic object, the
1491 real symbol in the dynamic object is also put in the dynamic
1492 symbols; we also must arrange for both symbols to point to the
1493 same memory location. We could handle the general case of symbol
1494 aliasing, but a general symbol alias can only be generated in
1495 assembler code, handling it correctly would be very time
1496 consuming, and other ELF linkers don't handle general aliasing
1497 either. */
1498 while (weaks != NULL)
1499 {
1500 struct elf_link_hash_entry *hlook;
1501 asection *slook;
1502 bfd_vma vlook;
1503 struct elf_link_hash_entry **hpp;
1504 struct elf_link_hash_entry **hppend;
252b5132 1505
45d6a902
AM
1506 hlook = weaks;
1507 weaks = hlook->weakdef;
1508 hlook->weakdef = NULL;
252b5132 1509
45d6a902
AM
1510 BFD_ASSERT (hlook->root.type == bfd_link_hash_defined
1511 || hlook->root.type == bfd_link_hash_defweak
1512 || hlook->root.type == bfd_link_hash_common
1513 || hlook->root.type == bfd_link_hash_indirect);
1514 slook = hlook->root.u.def.section;
1515 vlook = hlook->root.u.def.value;
1516
1517 hpp = elf_sym_hashes (abfd);
1518 hppend = hpp + extsymcount;
1519 for (; hpp < hppend; hpp++)
31941635 1520 {
45d6a902 1521 struct elf_link_hash_entry *h;
31941635 1522
45d6a902
AM
1523 h = *hpp;
1524 if (h != NULL && h != hlook
1525 && h->root.type == bfd_link_hash_defined
1526 && h->root.u.def.section == slook
1527 && h->root.u.def.value == vlook)
31941635 1528 {
45d6a902 1529 hlook->weakdef = h;
252b5132 1530
45d6a902
AM
1531 /* If the weak definition is in the list of dynamic
1532 symbols, make sure the real definition is put there
1533 as well. */
1534 if (hlook->dynindx != -1
1535 && h->dynindx == -1)
1536 {
1537 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
1538 goto error_return;
1539 }
f0c2e336 1540
45d6a902
AM
1541 /* If the real definition is in the list of dynamic
1542 symbols, make sure the weak definition is put there
1543 as well. If we don't do this, then the dynamic
1544 loader might not merge the entries for the real
1545 definition and the weak definition. */
1546 if (h->dynindx != -1
1547 && hlook->dynindx == -1)
1548 {
1549 if (! _bfd_elf_link_record_dynamic_symbol (info, hlook))
1550 goto error_return;
1551 }
1552 break;
1553 }
252b5132 1554 }
45d6a902 1555 }
f0c2e336 1556
45d6a902
AM
1557 /* If this object is the same format as the output object, and it is
1558 not a shared library, then let the backend look through the
1559 relocs.
fa7ea4d8 1560
45d6a902
AM
1561 This is required to build global offset table entries and to
1562 arrange for dynamic relocs. It is not required for the
1563 particular common case of linking non PIC code, even when linking
1564 against shared libraries, but unfortunately there is no way of
1565 knowing whether an object file has been compiled PIC or not.
1566 Looking through the relocs is not particularly time consuming.
1567 The problem is that we must either (1) keep the relocs in memory,
1568 which causes the linker to require additional runtime memory or
1569 (2) read the relocs twice from the input file, which wastes time.
1570 This would be a good case for using mmap.
60166579 1571
45d6a902
AM
1572 I have no idea how to handle linking PIC code into a file of a
1573 different format. It probably can't be done. */
1574 check_relocs = get_elf_backend_data (abfd)->check_relocs;
1575 if (! dynamic
1576 && abfd->xvec == info->hash->creator
1577 && check_relocs != NULL)
1578 {
1579 asection *o;
fa7ea4d8 1580
45d6a902 1581 for (o = abfd->sections; o != NULL; o = o->next)
fa7ea4d8 1582 {
45d6a902
AM
1583 Elf_Internal_Rela *internal_relocs;
1584 bfd_boolean ok;
1585
1586 if ((o->flags & SEC_RELOC) == 0
1587 || o->reloc_count == 0
1588 || ((info->strip == strip_all || info->strip == strip_debugger)
1589 && (o->flags & SEC_DEBUGGING) != 0)
1590 || bfd_is_abs_section (o->output_section))
1591 continue;
1592
268b6b39
AM
1593 internal_relocs = _bfd_elf_link_read_relocs (abfd, o, NULL, NULL,
1594 info->keep_memory);
45d6a902
AM
1595 if (internal_relocs == NULL)
1596 goto error_return;
1597
1598 ok = (*check_relocs) (abfd, info, o, internal_relocs);
1599
1600 if (elf_section_data (o)->relocs != internal_relocs)
1601 free (internal_relocs);
1602
1603 if (! ok)
1604 goto error_return;
fa7ea4d8 1605 }
45d6a902 1606 }
30831527 1607
45d6a902
AM
1608 /* If this is a non-traditional link, try to optimize the handling
1609 of the .stab/.stabstr sections. */
1610 if (! dynamic
1611 && ! info->traditional_format
1612 && info->hash->creator->flavour == bfd_target_elf_flavour
1613 && is_elf_hash_table (info)
1614 && (info->strip != strip_all && info->strip != strip_debugger))
1615 {
29ca8dc5
NS
1616 asection *stabstr;
1617
1618 stabstr = bfd_get_section_by_name (abfd, ".stabstr");
1619 if (stabstr != NULL)
fc8c40a0 1620 {
29ca8dc5
NS
1621 bfd_size_type string_offset = 0;
1622 asection *stab;
1623
1624 for (stab = abfd->sections; stab; stab = stab->next)
1625 if (strncmp (".stab", stab->name, 5) == 0
1626 && (!stab->name[5] ||
1627 (stab->name[5] == '.' && ISDIGIT (stab->name[6])))
1628 && (stab->flags & SEC_MERGE) == 0
1629 && !bfd_is_abs_section (stab->output_section))
1630 {
1631 struct bfd_elf_section_data *secdata;
1632
1633 secdata = elf_section_data (stab);
1634 if (! _bfd_link_section_stabs (abfd,
1635 & hash_table->stab_info,
1636 stab, stabstr,
1637 &secdata->sec_info,
1638 &string_offset))
1639 goto error_return;
1640 if (secdata->sec_info)
1641 stab->sec_info_type = ELF_INFO_TYPE_STABS;
45d6a902 1642 }
fc8c40a0 1643 }
252b5132
RH
1644 }
1645
1049f94e 1646 if (! info->relocatable && ! dynamic
45d6a902 1647 && is_elf_hash_table (info))
252b5132 1648 {
252b5132 1649 asection *s;
252b5132 1650
45d6a902
AM
1651 for (s = abfd->sections; s != NULL; s = s->next)
1652 if ((s->flags & SEC_MERGE) != 0
1653 && !bfd_is_abs_section (s->output_section))
1654 {
1655 struct bfd_elf_section_data *secdata;
252b5132 1656
45d6a902
AM
1657 secdata = elf_section_data (s);
1658 if (! _bfd_merge_section (abfd,
1659 & hash_table->merge_info,
1660 s, &secdata->sec_info))
1661 goto error_return;
1662 else if (secdata->sec_info)
1663 s->sec_info_type = ELF_INFO_TYPE_MERGE;
1664 }
1665 }
252b5132 1666
45d6a902
AM
1667 if (is_elf_hash_table (info))
1668 {
1669 /* Add this bfd to the loaded list. */
1670 struct elf_link_loaded_list *n;
6b9b879a 1671
268b6b39 1672 n = bfd_alloc (abfd, sizeof (struct elf_link_loaded_list));
45d6a902
AM
1673 if (n == NULL)
1674 goto error_return;
1675 n->abfd = abfd;
1676 n->next = hash_table->loaded;
1677 hash_table->loaded = n;
1678 }
252b5132 1679
45d6a902 1680 return TRUE;
252b5132 1681
45d6a902
AM
1682 error_free_vers:
1683 if (nondeflt_vers != NULL)
1684 free (nondeflt_vers);
1685 if (extversym != NULL)
1686 free (extversym);
1687 error_free_sym:
1688 if (isymbuf != NULL)
1689 free (isymbuf);
1690 error_return:
1691 return FALSE;
1692}
252b5132 1693
45d6a902 1694/* Add an entry to the .dynamic table. */
252b5132 1695
45d6a902 1696bfd_boolean
268b6b39 1697elf_add_dynamic_entry (struct bfd_link_info *info, bfd_vma tag, bfd_vma val)
45d6a902
AM
1698{
1699 Elf_Internal_Dyn dyn;
1700 bfd *dynobj;
1701 asection *s;
1702 bfd_size_type newsize;
1703 bfd_byte *newcontents;
252b5132 1704
45d6a902
AM
1705 if (! is_elf_hash_table (info))
1706 return FALSE;
252b5132 1707
45d6a902
AM
1708 dynobj = elf_hash_table (info)->dynobj;
1709
1710 s = bfd_get_section_by_name (dynobj, ".dynamic");
1711 BFD_ASSERT (s != NULL);
1712
1713 newsize = s->_raw_size + sizeof (Elf_External_Dyn);
268b6b39 1714 newcontents = bfd_realloc (s->contents, newsize);
45d6a902
AM
1715 if (newcontents == NULL)
1716 return FALSE;
1717
1718 dyn.d_tag = tag;
1719 dyn.d_un.d_val = val;
1720 elf_swap_dyn_out (dynobj, &dyn,
1721 (Elf_External_Dyn *) (newcontents + s->_raw_size));
1722
1723 s->_raw_size = newsize;
1724 s->contents = newcontents;
1725
1726 return TRUE;
1727}
1728\f
1729/* Array used to determine the number of hash table buckets to use
1730 based on the number of symbols there are. If there are fewer than
1731 3 symbols we use 1 bucket, fewer than 17 symbols we use 3 buckets,
1732 fewer than 37 we use 17 buckets, and so forth. We never use more
1733 than 32771 buckets. */
252b5132 1734
45d6a902
AM
1735static const size_t elf_buckets[] =
1736{
1737 1, 3, 17, 37, 67, 97, 131, 197, 263, 521, 1031, 2053, 4099, 8209,
1738 16411, 32771, 0
1739};
252b5132 1740
45d6a902
AM
1741/* Compute bucket count for hashing table. We do not use a static set
1742 of possible tables sizes anymore. Instead we determine for all
1743 possible reasonable sizes of the table the outcome (i.e., the
1744 number of collisions etc) and choose the best solution. The
1745 weighting functions are not too simple to allow the table to grow
1746 without bounds. Instead one of the weighting factors is the size.
1747 Therefore the result is always a good payoff between few collisions
1748 (= short chain lengths) and table size. */
1749static size_t
268b6b39 1750compute_bucket_count (struct bfd_link_info *info)
45d6a902
AM
1751{
1752 size_t dynsymcount = elf_hash_table (info)->dynsymcount;
1753 size_t best_size = 0;
1754 unsigned long int *hashcodes;
1755 unsigned long int *hashcodesp;
1756 unsigned long int i;
1757 bfd_size_type amt;
252b5132 1758
45d6a902
AM
1759 /* Compute the hash values for all exported symbols. At the same
1760 time store the values in an array so that we could use them for
1761 optimizations. */
1762 amt = dynsymcount;
1763 amt *= sizeof (unsigned long int);
268b6b39 1764 hashcodes = bfd_malloc (amt);
45d6a902
AM
1765 if (hashcodes == NULL)
1766 return 0;
1767 hashcodesp = hashcodes;
252b5132 1768
45d6a902
AM
1769 /* Put all hash values in HASHCODES. */
1770 elf_link_hash_traverse (elf_hash_table (info),
1771 elf_collect_hash_codes, &hashcodesp);
252b5132 1772
45d6a902
AM
1773 /* We have a problem here. The following code to optimize the table
1774 size requires an integer type with more the 32 bits. If
1775 BFD_HOST_U_64_BIT is set we know about such a type. */
1776#ifdef BFD_HOST_U_64_BIT
1777 if (info->optimize)
1778 {
1779 unsigned long int nsyms = hashcodesp - hashcodes;
1780 size_t minsize;
1781 size_t maxsize;
1782 BFD_HOST_U_64_BIT best_chlen = ~((BFD_HOST_U_64_BIT) 0);
1783 unsigned long int *counts ;
252b5132 1784
45d6a902
AM
1785 /* Possible optimization parameters: if we have NSYMS symbols we say
1786 that the hashing table must at least have NSYMS/4 and at most
1787 2*NSYMS buckets. */
1788 minsize = nsyms / 4;
1789 if (minsize == 0)
1790 minsize = 1;
1791 best_size = maxsize = nsyms * 2;
252b5132 1792
45d6a902
AM
1793 /* Create array where we count the collisions in. We must use bfd_malloc
1794 since the size could be large. */
1795 amt = maxsize;
1796 amt *= sizeof (unsigned long int);
268b6b39 1797 counts = bfd_malloc (amt);
45d6a902
AM
1798 if (counts == NULL)
1799 {
1800 free (hashcodes);
1801 return 0;
1802 }
252b5132 1803
45d6a902
AM
1804 /* Compute the "optimal" size for the hash table. The criteria is a
1805 minimal chain length. The minor criteria is (of course) the size
1806 of the table. */
1807 for (i = minsize; i < maxsize; ++i)
1808 {
1809 /* Walk through the array of hashcodes and count the collisions. */
1810 BFD_HOST_U_64_BIT max;
1811 unsigned long int j;
1812 unsigned long int fact;
252b5132 1813
45d6a902 1814 memset (counts, '\0', i * sizeof (unsigned long int));
252b5132 1815
45d6a902
AM
1816 /* Determine how often each hash bucket is used. */
1817 for (j = 0; j < nsyms; ++j)
1818 ++counts[hashcodes[j] % i];
252b5132 1819
45d6a902
AM
1820 /* For the weight function we need some information about the
1821 pagesize on the target. This is information need not be 100%
1822 accurate. Since this information is not available (so far) we
1823 define it here to a reasonable default value. If it is crucial
1824 to have a better value some day simply define this value. */
1825# ifndef BFD_TARGET_PAGESIZE
1826# define BFD_TARGET_PAGESIZE (4096)
1827# endif
252b5132 1828
45d6a902
AM
1829 /* We in any case need 2 + NSYMS entries for the size values and
1830 the chains. */
1831 max = (2 + nsyms) * (ARCH_SIZE / 8);
252b5132 1832
45d6a902
AM
1833# if 1
1834 /* Variant 1: optimize for short chains. We add the squares
1835 of all the chain lengths (which favous many small chain
1836 over a few long chains). */
1837 for (j = 0; j < i; ++j)
1838 max += counts[j] * counts[j];
252b5132 1839
45d6a902
AM
1840 /* This adds penalties for the overall size of the table. */
1841 fact = i / (BFD_TARGET_PAGESIZE / (ARCH_SIZE / 8)) + 1;
1842 max *= fact * fact;
1843# else
1844 /* Variant 2: Optimize a lot more for small table. Here we
1845 also add squares of the size but we also add penalties for
1846 empty slots (the +1 term). */
1847 for (j = 0; j < i; ++j)
1848 max += (1 + counts[j]) * (1 + counts[j]);
252b5132 1849
45d6a902
AM
1850 /* The overall size of the table is considered, but not as
1851 strong as in variant 1, where it is squared. */
1852 fact = i / (BFD_TARGET_PAGESIZE / (ARCH_SIZE / 8)) + 1;
1853 max *= fact;
1854# endif
252b5132 1855
45d6a902
AM
1856 /* Compare with current best results. */
1857 if (max < best_chlen)
1858 {
1859 best_chlen = max;
1860 best_size = i;
252b5132 1861 }
d6cf2879
L
1862 }
1863
45d6a902
AM
1864 free (counts);
1865 }
1866 else
1867#endif /* defined (BFD_HOST_U_64_BIT) */
1868 {
1869 /* This is the fallback solution if no 64bit type is available or if we
1870 are not supposed to spend much time on optimizations. We select the
1871 bucket count using a fixed set of numbers. */
1872 for (i = 0; elf_buckets[i] != 0; i++)
d6cf2879 1873 {
45d6a902
AM
1874 best_size = elf_buckets[i];
1875 if (dynsymcount < elf_buckets[i + 1])
1876 break;
d6cf2879 1877 }
45d6a902 1878 }
d6cf2879 1879
45d6a902
AM
1880 /* Free the arrays we needed. */
1881 free (hashcodes);
252b5132 1882
45d6a902
AM
1883 return best_size;
1884}
252b5132 1885
45d6a902
AM
1886/* Set up the sizes and contents of the ELF dynamic sections. This is
1887 called by the ELF linker emulation before_allocation routine. We
1888 must set the sizes of the sections before the linker sets the
1889 addresses of the various sections. */
252b5132 1890
45d6a902 1891bfd_boolean
268b6b39
AM
1892NAME(bfd_elf,size_dynamic_sections) (bfd *output_bfd,
1893 const char *soname,
1894 const char *rpath,
1895 const char *filter_shlib,
1896 const char * const *auxiliary_filters,
1897 struct bfd_link_info *info,
1898 asection **sinterpptr,
1899 struct bfd_elf_version_tree *verdefs)
45d6a902
AM
1900{
1901 bfd_size_type soname_indx;
1902 bfd *dynobj;
9c5bfbb7 1903 const struct elf_backend_data *bed;
45d6a902 1904 struct elf_assign_sym_version_info asvinfo;
252b5132 1905
45d6a902 1906 *sinterpptr = NULL;
252b5132 1907
45d6a902 1908 soname_indx = (bfd_size_type) -1;
252b5132 1909
45d6a902
AM
1910 if (info->hash->creator->flavour != bfd_target_elf_flavour)
1911 return TRUE;
252b5132 1912
45d6a902
AM
1913 if (! is_elf_hash_table (info))
1914 return TRUE;
252b5132 1915
9ee5e499
JJ
1916 if (info->execstack)
1917 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | PF_X;
1918 else if (info->noexecstack)
1919 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W;
1920 else
1921 {
1922 bfd *inputobj;
1923 asection *notesec = NULL;
1924 int exec = 0;
1925
1926 for (inputobj = info->input_bfds;
1927 inputobj;
1928 inputobj = inputobj->link_next)
1929 {
1930 asection *s;
1931
1932 if (inputobj->flags & DYNAMIC)
1933 continue;
1934 s = bfd_get_section_by_name (inputobj, ".note.GNU-stack");
1935 if (s)
1936 {
1937 if (s->flags & SEC_CODE)
1938 exec = PF_X;
1939 notesec = s;
1940 }
1941 else
1942 exec = PF_X;
1943 }
1944 if (notesec)
1945 {
1946 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | exec;
1049f94e 1947 if (exec && info->relocatable
9ee5e499
JJ
1948 && notesec->output_section != bfd_abs_section_ptr)
1949 notesec->output_section->flags |= SEC_CODE;
1950 }
1951 }
1952
45d6a902
AM
1953 /* Any syms created from now on start with -1 in
1954 got.refcount/offset and plt.refcount/offset. */
1955 elf_hash_table (info)->init_refcount = elf_hash_table (info)->init_offset;
252b5132 1956
45d6a902
AM
1957 /* The backend may have to create some sections regardless of whether
1958 we're dynamic or not. */
1959 bed = get_elf_backend_data (output_bfd);
1960 if (bed->elf_backend_always_size_sections
1961 && ! (*bed->elf_backend_always_size_sections) (output_bfd, info))
1962 return FALSE;
252b5132 1963
45d6a902 1964 dynobj = elf_hash_table (info)->dynobj;
252b5132 1965
45d6a902
AM
1966 /* If there were no dynamic objects in the link, there is nothing to
1967 do here. */
1968 if (dynobj == NULL)
1969 return TRUE;
252b5132 1970
45d6a902
AM
1971 if (! _bfd_elf_maybe_strip_eh_frame_hdr (info))
1972 return FALSE;
252b5132 1973
45d6a902
AM
1974 if (elf_hash_table (info)->dynamic_sections_created)
1975 {
1976 struct elf_info_failed eif;
1977 struct elf_link_hash_entry *h;
1978 asection *dynstr;
1979 struct bfd_elf_version_tree *t;
1980 struct bfd_elf_version_expr *d;
1981 bfd_boolean all_defined;
30b30c21 1982
45d6a902
AM
1983 *sinterpptr = bfd_get_section_by_name (dynobj, ".interp");
1984 BFD_ASSERT (*sinterpptr != NULL || info->shared);
252b5132 1985
45d6a902 1986 if (soname != NULL)
252b5132 1987 {
45d6a902
AM
1988 soname_indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
1989 soname, TRUE);
1990 if (soname_indx == (bfd_size_type) -1
268b6b39 1991 || ! elf_add_dynamic_entry (info, DT_SONAME, soname_indx))
45d6a902 1992 return FALSE;
252b5132 1993 }
45d6a902
AM
1994
1995 if (info->symbolic)
252b5132 1996 {
268b6b39 1997 if (! elf_add_dynamic_entry (info, DT_SYMBOLIC, 0))
b34976b6 1998 return FALSE;
45d6a902
AM
1999 info->flags |= DF_SYMBOLIC;
2000 }
252b5132 2001
45d6a902
AM
2002 if (rpath != NULL)
2003 {
2004 bfd_size_type indx;
2005
2006 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr, rpath,
2007 TRUE);
2008 if (info->new_dtags)
2009 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr, indx);
2010 if (indx == (bfd_size_type) -1
268b6b39 2011 || ! elf_add_dynamic_entry (info, DT_RPATH, indx)
45d6a902 2012 || (info->new_dtags
268b6b39 2013 && ! elf_add_dynamic_entry (info, DT_RUNPATH, indx)))
b34976b6 2014 return FALSE;
252b5132
RH
2015 }
2016
45d6a902 2017 if (filter_shlib != NULL)
fc8c40a0 2018 {
45d6a902 2019 bfd_size_type indx;
fc8c40a0 2020
45d6a902
AM
2021 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
2022 filter_shlib, TRUE);
2023 if (indx == (bfd_size_type) -1
268b6b39 2024 || ! elf_add_dynamic_entry (info, DT_FILTER, indx))
45d6a902 2025 return FALSE;
fc8c40a0 2026 }
252b5132 2027
45d6a902
AM
2028 if (auxiliary_filters != NULL)
2029 {
2030 const char * const *p;
252b5132 2031
45d6a902
AM
2032 for (p = auxiliary_filters; *p != NULL; p++)
2033 {
2034 bfd_size_type indx;
2035
2036 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
2037 *p, TRUE);
2038 if (indx == (bfd_size_type) -1
268b6b39 2039 || ! elf_add_dynamic_entry (info, DT_AUXILIARY, indx))
45d6a902
AM
2040 return FALSE;
2041 }
2042 }
2043
2044 eif.info = info;
2045 eif.verdefs = verdefs;
2046 eif.failed = FALSE;
252b5132 2047
45d6a902
AM
2048 /* If we are supposed to export all symbols into the dynamic symbol
2049 table (this is not the normal case), then do so. */
2050 if (info->export_dynamic)
2051 {
2052 elf_link_hash_traverse (elf_hash_table (info),
2053 _bfd_elf_export_symbol,
268b6b39 2054 &eif);
45d6a902
AM
2055 if (eif.failed)
2056 return FALSE;
2057 }
252b5132 2058
45d6a902
AM
2059 /* Make all global versions with definiton. */
2060 for (t = verdefs; t != NULL; t = t->next)
2061 for (d = t->globals; d != NULL; d = d->next)
2062 if (!d->symver && strchr (d->pattern, '*') == NULL)
2063 {
2064 const char *verstr, *name;
2065 size_t namelen, verlen, newlen;
2066 char *newname, *p;
2067 struct elf_link_hash_entry *newh;
252b5132 2068
45d6a902
AM
2069 name = d->pattern;
2070 namelen = strlen (name);
2071 verstr = t->name;
2072 verlen = strlen (verstr);
2073 newlen = namelen + verlen + 3;
2b0f7ef9 2074
268b6b39 2075 newname = bfd_malloc (newlen);
45d6a902
AM
2076 if (newname == NULL)
2077 return FALSE;
2078 memcpy (newname, name, namelen);
2b0f7ef9 2079
45d6a902
AM
2080 /* Check the hidden versioned definition. */
2081 p = newname + namelen;
2082 *p++ = ELF_VER_CHR;
2083 memcpy (p, verstr, verlen + 1);
2084 newh = elf_link_hash_lookup (elf_hash_table (info),
2085 newname, FALSE, FALSE,
2086 FALSE);
2087 if (newh == NULL
2088 || (newh->root.type != bfd_link_hash_defined
2089 && newh->root.type != bfd_link_hash_defweak))
2090 {
2091 /* Check the default versioned definition. */
2092 *p++ = ELF_VER_CHR;
2093 memcpy (p, verstr, verlen + 1);
2094 newh = elf_link_hash_lookup (elf_hash_table (info),
2095 newname, FALSE, FALSE,
2096 FALSE);
2097 }
2098 free (newname);
252b5132 2099
45d6a902
AM
2100 /* Mark this version if there is a definition and it is
2101 not defined in a shared object. */
2102 if (newh != NULL
2103 && ((newh->elf_link_hash_flags
2104 & ELF_LINK_HASH_DEF_DYNAMIC) == 0)
2105 && (newh->root.type == bfd_link_hash_defined
2106 || newh->root.type == bfd_link_hash_defweak))
2107 d->symver = 1;
2108 }
252b5132 2109
45d6a902
AM
2110 /* Attach all the symbols to their version information. */
2111 asvinfo.output_bfd = output_bfd;
2112 asvinfo.info = info;
2113 asvinfo.verdefs = verdefs;
2114 asvinfo.failed = FALSE;
c44233aa 2115
45d6a902
AM
2116 elf_link_hash_traverse (elf_hash_table (info),
2117 _bfd_elf_link_assign_sym_version,
268b6b39 2118 &asvinfo);
45d6a902
AM
2119 if (asvinfo.failed)
2120 return FALSE;
c44233aa 2121
45d6a902
AM
2122 if (!info->allow_undefined_version)
2123 {
2124 /* Check if all global versions have a definiton. */
2125 all_defined = TRUE;
2126 for (t = verdefs; t != NULL; t = t->next)
2127 for (d = t->globals; d != NULL; d = d->next)
2128 if (!d->symver && !d->script
2129 && strchr (d->pattern, '*') == NULL)
2130 {
2131 (*_bfd_error_handler)
2132 (_("%s: undefined version: %s"),
2133 d->pattern, t->name);
2134 all_defined = FALSE;
2135 }
2b0f7ef9 2136
45d6a902
AM
2137 if (!all_defined)
2138 {
2139 bfd_set_error (bfd_error_bad_value);
2140 return FALSE;
2141 }
2142 }
e92d460e 2143
45d6a902
AM
2144 /* Find all symbols which were defined in a dynamic object and make
2145 the backend pick a reasonable value for them. */
2146 elf_link_hash_traverse (elf_hash_table (info),
2147 _bfd_elf_adjust_dynamic_symbol,
268b6b39 2148 &eif);
45d6a902
AM
2149 if (eif.failed)
2150 return FALSE;
2b0f7ef9 2151
45d6a902
AM
2152 /* Add some entries to the .dynamic section. We fill in some of the
2153 values later, in elf_bfd_final_link, but we must add the entries
2154 now so that we know the final size of the .dynamic section. */
2b0f7ef9 2155
45d6a902
AM
2156 /* If there are initialization and/or finalization functions to
2157 call then add the corresponding DT_INIT/DT_FINI entries. */
2158 h = (info->init_function
2159 ? elf_link_hash_lookup (elf_hash_table (info),
2160 info->init_function, FALSE,
2161 FALSE, FALSE)
2162 : NULL);
2163 if (h != NULL
2164 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
2165 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
2166 {
268b6b39 2167 if (! elf_add_dynamic_entry (info, DT_INIT, 0))
45d6a902
AM
2168 return FALSE;
2169 }
2170 h = (info->fini_function
2171 ? elf_link_hash_lookup (elf_hash_table (info),
2172 info->fini_function, FALSE,
2173 FALSE, FALSE)
2174 : NULL);
2175 if (h != NULL
2176 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
2177 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
2178 {
268b6b39 2179 if (! elf_add_dynamic_entry (info, DT_FINI, 0))
45d6a902
AM
2180 return FALSE;
2181 }
2b0f7ef9 2182
45d6a902
AM
2183 if (bfd_get_section_by_name (output_bfd, ".preinit_array") != NULL)
2184 {
2185 /* DT_PREINIT_ARRAY is not allowed in shared library. */
36af4a4e 2186 if (! info->executable)
45d6a902
AM
2187 {
2188 bfd *sub;
2189 asection *o;
2b0f7ef9 2190
45d6a902
AM
2191 for (sub = info->input_bfds; sub != NULL;
2192 sub = sub->link_next)
2193 for (o = sub->sections; o != NULL; o = o->next)
2194 if (elf_section_data (o)->this_hdr.sh_type
2195 == SHT_PREINIT_ARRAY)
2196 {
2197 (*_bfd_error_handler)
2198 (_("%s: .preinit_array section is not allowed in DSO"),
2199 bfd_archive_filename (sub));
2200 break;
2201 }
2b0f7ef9 2202
45d6a902
AM
2203 bfd_set_error (bfd_error_nonrepresentable_section);
2204 return FALSE;
2205 }
2b0f7ef9 2206
268b6b39
AM
2207 if (!elf_add_dynamic_entry (info, DT_PREINIT_ARRAY, 0)
2208 || !elf_add_dynamic_entry (info, DT_PREINIT_ARRAYSZ, 0))
45d6a902
AM
2209 return FALSE;
2210 }
2211 if (bfd_get_section_by_name (output_bfd, ".init_array") != NULL)
2b0f7ef9 2212 {
268b6b39
AM
2213 if (!elf_add_dynamic_entry (info, DT_INIT_ARRAY, 0)
2214 || !elf_add_dynamic_entry (info, DT_INIT_ARRAYSZ, 0))
45d6a902
AM
2215 return FALSE;
2216 }
2217 if (bfd_get_section_by_name (output_bfd, ".fini_array") != NULL)
2218 {
268b6b39
AM
2219 if (!elf_add_dynamic_entry (info, DT_FINI_ARRAY, 0)
2220 || !elf_add_dynamic_entry (info, DT_FINI_ARRAYSZ, 0))
45d6a902 2221 return FALSE;
2b0f7ef9 2222 }
2b0f7ef9 2223
45d6a902
AM
2224 dynstr = bfd_get_section_by_name (dynobj, ".dynstr");
2225 /* If .dynstr is excluded from the link, we don't want any of
2226 these tags. Strictly, we should be checking each section
2227 individually; This quick check covers for the case where
2228 someone does a /DISCARD/ : { *(*) }. */
2229 if (dynstr != NULL && dynstr->output_section != bfd_abs_section_ptr)
2230 {
2231 bfd_size_type strsize;
2232
2233 strsize = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
268b6b39
AM
2234 if (! elf_add_dynamic_entry (info, DT_HASH, 0)
2235 || ! elf_add_dynamic_entry (info, DT_STRTAB, 0)
2236 || ! elf_add_dynamic_entry (info, DT_SYMTAB, 0)
2237 || ! elf_add_dynamic_entry (info, DT_STRSZ, strsize)
2238 || ! elf_add_dynamic_entry (info, DT_SYMENT,
2239 sizeof (Elf_External_Sym)))
45d6a902
AM
2240 return FALSE;
2241 }
2242 }
2b0f7ef9 2243
45d6a902
AM
2244 /* The backend must work out the sizes of all the other dynamic
2245 sections. */
2246 if (bed->elf_backend_size_dynamic_sections
2247 && ! (*bed->elf_backend_size_dynamic_sections) (output_bfd, info))
2248 return FALSE;
2b0f7ef9 2249
45d6a902 2250 if (elf_hash_table (info)->dynamic_sections_created)
2b0f7ef9 2251 {
45d6a902 2252 bfd_size_type dynsymcount;
2b0f7ef9 2253 asection *s;
45d6a902
AM
2254 size_t bucketcount = 0;
2255 size_t hash_entry_size;
2256 unsigned int dtagcount;
c44233aa 2257
45d6a902 2258 /* Set up the version definition section. */
2b0f7ef9 2259 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
45d6a902 2260 BFD_ASSERT (s != NULL);
2b0f7ef9 2261
45d6a902
AM
2262 /* We may have created additional version definitions if we are
2263 just linking a regular application. */
2264 verdefs = asvinfo.verdefs;
c44233aa 2265
45d6a902
AM
2266 /* Skip anonymous version tag. */
2267 if (verdefs != NULL && verdefs->vernum == 0)
2268 verdefs = verdefs->next;
2269
2270 if (verdefs == NULL)
2271 _bfd_strip_section_from_output (info, s);
2272 else
2b0f7ef9 2273 {
45d6a902
AM
2274 unsigned int cdefs;
2275 bfd_size_type size;
2276 struct bfd_elf_version_tree *t;
2277 bfd_byte *p;
2278 Elf_Internal_Verdef def;
2279 Elf_Internal_Verdaux defaux;
2280
2281 cdefs = 0;
2282 size = 0;
2283
2284 /* Make space for the base version. */
2285 size += sizeof (Elf_External_Verdef);
2286 size += sizeof (Elf_External_Verdaux);
2287 ++cdefs;
2288
2289 for (t = verdefs; t != NULL; t = t->next)
2b0f7ef9 2290 {
45d6a902
AM
2291 struct bfd_elf_version_deps *n;
2292
2293 size += sizeof (Elf_External_Verdef);
2294 size += sizeof (Elf_External_Verdaux);
2295 ++cdefs;
2296
2297 for (n = t->deps; n != NULL; n = n->next)
2298 size += sizeof (Elf_External_Verdaux);
2b0f7ef9 2299 }
2b0f7ef9 2300
45d6a902 2301 s->_raw_size = size;
268b6b39 2302 s->contents = bfd_alloc (output_bfd, s->_raw_size);
45d6a902
AM
2303 if (s->contents == NULL && s->_raw_size != 0)
2304 return FALSE;
2b0f7ef9 2305
45d6a902 2306 /* Fill in the version definition section. */
252b5132 2307
45d6a902 2308 p = s->contents;
94b6c40a 2309
45d6a902
AM
2310 def.vd_version = VER_DEF_CURRENT;
2311 def.vd_flags = VER_FLG_BASE;
2312 def.vd_ndx = 1;
2313 def.vd_cnt = 1;
2314 def.vd_aux = sizeof (Elf_External_Verdef);
2315 def.vd_next = (sizeof (Elf_External_Verdef)
2316 + sizeof (Elf_External_Verdaux));
252b5132 2317
45d6a902 2318 if (soname_indx != (bfd_size_type) -1)
252b5132 2319 {
45d6a902
AM
2320 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
2321 soname_indx);
2322 def.vd_hash = bfd_elf_hash (soname);
2323 defaux.vda_name = soname_indx;
252b5132 2324 }
45d6a902
AM
2325 else
2326 {
2327 const char *name;
2328 bfd_size_type indx;
252b5132 2329
45d6a902
AM
2330 name = basename (output_bfd->filename);
2331 def.vd_hash = bfd_elf_hash (name);
2332 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
2333 name, FALSE);
2334 if (indx == (bfd_size_type) -1)
2335 return FALSE;
2336 defaux.vda_name = indx;
2337 }
2338 defaux.vda_next = 0;
8ea2e4bd 2339
45d6a902
AM
2340 _bfd_elf_swap_verdef_out (output_bfd, &def,
2341 (Elf_External_Verdef *) p);
2342 p += sizeof (Elf_External_Verdef);
2343 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
2344 (Elf_External_Verdaux *) p);
2345 p += sizeof (Elf_External_Verdaux);
e5094212 2346
45d6a902
AM
2347 for (t = verdefs; t != NULL; t = t->next)
2348 {
2349 unsigned int cdeps;
2350 struct bfd_elf_version_deps *n;
2351 struct elf_link_hash_entry *h;
2352 struct bfd_link_hash_entry *bh;
252b5132 2353
45d6a902
AM
2354 cdeps = 0;
2355 for (n = t->deps; n != NULL; n = n->next)
2356 ++cdeps;
ef5aade5 2357
45d6a902
AM
2358 /* Add a symbol representing this version. */
2359 bh = NULL;
2360 if (! (_bfd_generic_link_add_one_symbol
2361 (info, dynobj, t->name, BSF_GLOBAL, bfd_abs_section_ptr,
268b6b39 2362 0, NULL, FALSE,
45d6a902
AM
2363 get_elf_backend_data (dynobj)->collect, &bh)))
2364 return FALSE;
2365 h = (struct elf_link_hash_entry *) bh;
2366 h->elf_link_hash_flags &= ~ ELF_LINK_NON_ELF;
2367 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2368 h->type = STT_OBJECT;
2369 h->verinfo.vertree = t;
fc4cc5bb 2370
45d6a902
AM
2371 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2372 return FALSE;
2373
2374 def.vd_version = VER_DEF_CURRENT;
2375 def.vd_flags = 0;
2376 if (t->globals == NULL && t->locals == NULL && ! t->used)
2377 def.vd_flags |= VER_FLG_WEAK;
2378 def.vd_ndx = t->vernum + 1;
2379 def.vd_cnt = cdeps + 1;
2380 def.vd_hash = bfd_elf_hash (t->name);
2381 def.vd_aux = sizeof (Elf_External_Verdef);
2382 if (t->next != NULL)
2383 def.vd_next = (sizeof (Elf_External_Verdef)
2384 + (cdeps + 1) * sizeof (Elf_External_Verdaux));
2385 else
2386 def.vd_next = 0;
2387
2388 _bfd_elf_swap_verdef_out (output_bfd, &def,
2389 (Elf_External_Verdef *) p);
2390 p += sizeof (Elf_External_Verdef);
2391
2392 defaux.vda_name = h->dynstr_index;
2393 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
2394 h->dynstr_index);
2395 if (t->deps == NULL)
2396 defaux.vda_next = 0;
2397 else
2398 defaux.vda_next = sizeof (Elf_External_Verdaux);
2399 t->name_indx = defaux.vda_name;
2400
2401 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
2402 (Elf_External_Verdaux *) p);
2403 p += sizeof (Elf_External_Verdaux);
2404
2405 for (n = t->deps; n != NULL; n = n->next)
2406 {
2407 if (n->version_needed == NULL)
2408 {
2409 /* This can happen if there was an error in the
2410 version script. */
2411 defaux.vda_name = 0;
2412 }
2413 else
2414 {
2415 defaux.vda_name = n->version_needed->name_indx;
2416 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
2417 defaux.vda_name);
2418 }
2419 if (n->next == NULL)
2420 defaux.vda_next = 0;
2421 else
2422 defaux.vda_next = sizeof (Elf_External_Verdaux);
2423
2424 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
2425 (Elf_External_Verdaux *) p);
2426 p += sizeof (Elf_External_Verdaux);
2427 }
2428 }
2429
268b6b39
AM
2430 if (! elf_add_dynamic_entry (info, DT_VERDEF, 0)
2431 || ! elf_add_dynamic_entry (info, DT_VERDEFNUM, cdefs))
45d6a902
AM
2432 return FALSE;
2433
2434 elf_tdata (output_bfd)->cverdefs = cdefs;
2435 }
8e67855b 2436
45d6a902 2437 if ((info->new_dtags && info->flags) || (info->flags & DF_STATIC_TLS))
0a991dfe 2438 {
268b6b39 2439 if (! elf_add_dynamic_entry (info, DT_FLAGS, info->flags))
45d6a902
AM
2440 return FALSE;
2441 }
0a991dfe 2442
45d6a902
AM
2443 if (info->flags_1)
2444 {
36af4a4e 2445 if (info->executable)
45d6a902
AM
2446 info->flags_1 &= ~ (DF_1_INITFIRST
2447 | DF_1_NODELETE
2448 | DF_1_NOOPEN);
268b6b39 2449 if (! elf_add_dynamic_entry (info, DT_FLAGS_1, info->flags_1))
45d6a902 2450 return FALSE;
0a991dfe 2451 }
fc4cc5bb 2452
45d6a902 2453 /* Work out the size of the version reference section. */
252b5132 2454
45d6a902
AM
2455 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
2456 BFD_ASSERT (s != NULL);
2457 {
2458 struct elf_find_verdep_info sinfo;
252b5132 2459
45d6a902
AM
2460 sinfo.output_bfd = output_bfd;
2461 sinfo.info = info;
2462 sinfo.vers = elf_tdata (output_bfd)->cverdefs;
2463 if (sinfo.vers == 0)
2464 sinfo.vers = 1;
2465 sinfo.failed = FALSE;
252b5132 2466
45d6a902
AM
2467 elf_link_hash_traverse (elf_hash_table (info),
2468 _bfd_elf_link_find_version_dependencies,
268b6b39 2469 &sinfo);
5cab59f6 2470
45d6a902
AM
2471 if (elf_tdata (output_bfd)->verref == NULL)
2472 _bfd_strip_section_from_output (info, s);
2473 else
2474 {
2475 Elf_Internal_Verneed *t;
2476 unsigned int size;
2477 unsigned int crefs;
2478 bfd_byte *p;
e92d460e 2479
45d6a902
AM
2480 /* Build the version definition section. */
2481 size = 0;
2482 crefs = 0;
2483 for (t = elf_tdata (output_bfd)->verref;
2484 t != NULL;
2485 t = t->vn_nextref)
2486 {
2487 Elf_Internal_Vernaux *a;
e92d460e 2488
45d6a902
AM
2489 size += sizeof (Elf_External_Verneed);
2490 ++crefs;
2491 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
2492 size += sizeof (Elf_External_Vernaux);
2493 }
252b5132 2494
45d6a902 2495 s->_raw_size = size;
268b6b39 2496 s->contents = bfd_alloc (output_bfd, s->_raw_size);
45d6a902
AM
2497 if (s->contents == NULL)
2498 return FALSE;
252b5132 2499
45d6a902
AM
2500 p = s->contents;
2501 for (t = elf_tdata (output_bfd)->verref;
2502 t != NULL;
2503 t = t->vn_nextref)
2504 {
2505 unsigned int caux;
2506 Elf_Internal_Vernaux *a;
2507 bfd_size_type indx;
252b5132 2508
45d6a902
AM
2509 caux = 0;
2510 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
2511 ++caux;
252b5132 2512
45d6a902
AM
2513 t->vn_version = VER_NEED_CURRENT;
2514 t->vn_cnt = caux;
2515 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
2516 elf_dt_name (t->vn_bfd) != NULL
2517 ? elf_dt_name (t->vn_bfd)
2518 : basename (t->vn_bfd->filename),
2519 FALSE);
2520 if (indx == (bfd_size_type) -1)
2521 return FALSE;
2522 t->vn_file = indx;
2523 t->vn_aux = sizeof (Elf_External_Verneed);
2524 if (t->vn_nextref == NULL)
2525 t->vn_next = 0;
2526 else
2527 t->vn_next = (sizeof (Elf_External_Verneed)
2528 + caux * sizeof (Elf_External_Vernaux));
252b5132 2529
45d6a902
AM
2530 _bfd_elf_swap_verneed_out (output_bfd, t,
2531 (Elf_External_Verneed *) p);
2532 p += sizeof (Elf_External_Verneed);
252b5132 2533
45d6a902
AM
2534 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
2535 {
2536 a->vna_hash = bfd_elf_hash (a->vna_nodename);
2537 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
2538 a->vna_nodename, FALSE);
2539 if (indx == (bfd_size_type) -1)
2540 return FALSE;
2541 a->vna_name = indx;
2542 if (a->vna_nextptr == NULL)
2543 a->vna_next = 0;
2544 else
2545 a->vna_next = sizeof (Elf_External_Vernaux);
252b5132 2546
45d6a902
AM
2547 _bfd_elf_swap_vernaux_out (output_bfd, a,
2548 (Elf_External_Vernaux *) p);
2549 p += sizeof (Elf_External_Vernaux);
2550 }
2551 }
252b5132 2552
268b6b39
AM
2553 if (! elf_add_dynamic_entry (info, DT_VERNEED, 0)
2554 || ! elf_add_dynamic_entry (info, DT_VERNEEDNUM, crefs))
45d6a902 2555 return FALSE;
252b5132 2556
45d6a902
AM
2557 elf_tdata (output_bfd)->cverrefs = crefs;
2558 }
2559 }
252b5132 2560
45d6a902
AM
2561 /* Assign dynsym indicies. In a shared library we generate a
2562 section symbol for each output section, which come first.
2563 Next come all of the back-end allocated local dynamic syms,
2564 followed by the rest of the global symbols. */
e92d460e 2565
45d6a902 2566 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info);
bc2b6df7 2567
45d6a902
AM
2568 /* Work out the size of the symbol version section. */
2569 s = bfd_get_section_by_name (dynobj, ".gnu.version");
2570 BFD_ASSERT (s != NULL);
2571 if (dynsymcount == 0
2572 || (verdefs == NULL && elf_tdata (output_bfd)->verref == NULL))
252b5132 2573 {
45d6a902
AM
2574 _bfd_strip_section_from_output (info, s);
2575 /* The DYNSYMCOUNT might have changed if we were going to
2576 output a dynamic symbol table entry for S. */
2577 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info);
252b5132 2578 }
45d6a902 2579 else
c44233aa 2580 {
45d6a902 2581 s->_raw_size = dynsymcount * sizeof (Elf_External_Versym);
268b6b39 2582 s->contents = bfd_zalloc (output_bfd, s->_raw_size);
45d6a902
AM
2583 if (s->contents == NULL)
2584 return FALSE;
252b5132 2585
268b6b39 2586 if (! elf_add_dynamic_entry (info, DT_VERSYM, 0))
45d6a902
AM
2587 return FALSE;
2588 }
252b5132 2589
45d6a902
AM
2590 /* Set the size of the .dynsym and .hash sections. We counted
2591 the number of dynamic symbols in elf_link_add_object_symbols.
2592 We will build the contents of .dynsym and .hash when we build
2593 the final symbol table, because until then we do not know the
2594 correct value to give the symbols. We built the .dynstr
2595 section as we went along in elf_link_add_object_symbols. */
2596 s = bfd_get_section_by_name (dynobj, ".dynsym");
2597 BFD_ASSERT (s != NULL);
2598 s->_raw_size = dynsymcount * sizeof (Elf_External_Sym);
268b6b39 2599 s->contents = bfd_alloc (output_bfd, s->_raw_size);
45d6a902
AM
2600 if (s->contents == NULL && s->_raw_size != 0)
2601 return FALSE;
252b5132 2602
45d6a902 2603 if (dynsymcount != 0)
252b5132 2604 {
45d6a902
AM
2605 Elf_Internal_Sym isym;
2606
2607 /* The first entry in .dynsym is a dummy symbol. */
2608 isym.st_value = 0;
2609 isym.st_size = 0;
2610 isym.st_name = 0;
2611 isym.st_info = 0;
2612 isym.st_other = 0;
2613 isym.st_shndx = 0;
268b6b39 2614 elf_swap_symbol_out (output_bfd, &isym, s->contents, 0);
252b5132
RH
2615 }
2616
45d6a902
AM
2617 /* Compute the size of the hashing table. As a side effect this
2618 computes the hash values for all the names we export. */
2619 bucketcount = compute_bucket_count (info);
2620
2621 s = bfd_get_section_by_name (dynobj, ".hash");
2622 BFD_ASSERT (s != NULL);
2623 hash_entry_size = elf_section_data (s)->this_hdr.sh_entsize;
2624 s->_raw_size = ((2 + bucketcount + dynsymcount) * hash_entry_size);
268b6b39 2625 s->contents = bfd_zalloc (output_bfd, s->_raw_size);
45d6a902
AM
2626 if (s->contents == NULL)
2627 return FALSE;
252b5132 2628
268b6b39
AM
2629 bfd_put (8 * hash_entry_size, output_bfd, bucketcount, s->contents);
2630 bfd_put (8 * hash_entry_size, output_bfd, dynsymcount,
45d6a902 2631 s->contents + hash_entry_size);
252b5132 2632
45d6a902 2633 elf_hash_table (info)->bucketcount = bucketcount;
252b5132 2634
45d6a902
AM
2635 s = bfd_get_section_by_name (dynobj, ".dynstr");
2636 BFD_ASSERT (s != NULL);
252b5132 2637
45d6a902 2638 elf_finalize_dynstr (output_bfd, info);
252b5132 2639
45d6a902 2640 s->_raw_size = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
252b5132 2641
45d6a902 2642 for (dtagcount = 0; dtagcount <= info->spare_dynamic_tags; ++dtagcount)
268b6b39 2643 if (! elf_add_dynamic_entry (info, DT_NULL, 0))
45d6a902
AM
2644 return FALSE;
2645 }
252b5132 2646
b34976b6 2647 return TRUE;
252b5132 2648}
45d6a902
AM
2649\f
2650/* This function is used to adjust offsets into .dynstr for
2651 dynamic symbols. This is called via elf_link_hash_traverse. */
252b5132 2652
b34976b6 2653static bfd_boolean
268b6b39 2654elf_adjust_dynstr_offsets (struct elf_link_hash_entry *h, void *data)
252b5132 2655{
268b6b39 2656 struct elf_strtab_hash *dynstr = data;
252b5132 2657
e92d460e
AM
2658 if (h->root.type == bfd_link_hash_warning)
2659 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2660
45d6a902
AM
2661 if (h->dynindx != -1)
2662 h->dynstr_index = _bfd_elf_strtab_offset (dynstr, h->dynstr_index);
2663 return TRUE;
2664}
252b5132 2665
45d6a902
AM
2666/* Assign string offsets in .dynstr, update all structures referencing
2667 them. */
252b5132 2668
45d6a902 2669static bfd_boolean
268b6b39 2670elf_finalize_dynstr (bfd *output_bfd, struct bfd_link_info *info)
45d6a902
AM
2671{
2672 struct elf_link_local_dynamic_entry *entry;
2673 struct elf_strtab_hash *dynstr = elf_hash_table (info)->dynstr;
2674 bfd *dynobj = elf_hash_table (info)->dynobj;
2675 asection *sdyn;
2676 bfd_size_type size;
2677 Elf_External_Dyn *dyncon, *dynconend;
252b5132 2678
45d6a902
AM
2679 _bfd_elf_strtab_finalize (dynstr);
2680 size = _bfd_elf_strtab_size (dynstr);
252b5132 2681
45d6a902
AM
2682 /* Update all .dynamic entries referencing .dynstr strings. */
2683 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2684 BFD_ASSERT (sdyn != NULL);
252b5132 2685
45d6a902
AM
2686 dyncon = (Elf_External_Dyn *) sdyn->contents;
2687 dynconend = (Elf_External_Dyn *) (sdyn->contents +
2688 sdyn->_raw_size);
2689 for (; dyncon < dynconend; dyncon++)
2690 {
2691 Elf_Internal_Dyn dyn;
252b5132 2692
45d6a902
AM
2693 elf_swap_dyn_in (dynobj, dyncon, & dyn);
2694 switch (dyn.d_tag)
252b5132 2695 {
45d6a902
AM
2696 case DT_STRSZ:
2697 dyn.d_un.d_val = size;
2698 elf_swap_dyn_out (dynobj, & dyn, dyncon);
2699 break;
2700 case DT_NEEDED:
2701 case DT_SONAME:
2702 case DT_RPATH:
2703 case DT_RUNPATH:
2704 case DT_FILTER:
2705 case DT_AUXILIARY:
2706 dyn.d_un.d_val = _bfd_elf_strtab_offset (dynstr, dyn.d_un.d_val);
2707 elf_swap_dyn_out (dynobj, & dyn, dyncon);
2708 break;
2709 default:
2710 break;
2711 }
2712 }
252b5132 2713
45d6a902
AM
2714 /* Now update local dynamic symbols. */
2715 for (entry = elf_hash_table (info)->dynlocal; entry ; entry = entry->next)
2716 entry->isym.st_name = _bfd_elf_strtab_offset (dynstr,
2717 entry->isym.st_name);
252b5132 2718
45d6a902
AM
2719 /* And the rest of dynamic symbols. */
2720 elf_link_hash_traverse (elf_hash_table (info),
2721 elf_adjust_dynstr_offsets, dynstr);
252b5132 2722
45d6a902
AM
2723 /* Adjust version definitions. */
2724 if (elf_tdata (output_bfd)->cverdefs)
2725 {
2726 asection *s;
2727 bfd_byte *p;
2728 bfd_size_type i;
2729 Elf_Internal_Verdef def;
2730 Elf_Internal_Verdaux defaux;
252b5132 2731
45d6a902
AM
2732 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
2733 p = (bfd_byte *) s->contents;
2734 do
252b5132 2735 {
45d6a902
AM
2736 _bfd_elf_swap_verdef_in (output_bfd, (Elf_External_Verdef *) p,
2737 &def);
2738 p += sizeof (Elf_External_Verdef);
2739 for (i = 0; i < def.vd_cnt; ++i)
252b5132 2740 {
45d6a902
AM
2741 _bfd_elf_swap_verdaux_in (output_bfd,
2742 (Elf_External_Verdaux *) p, &defaux);
2743 defaux.vda_name = _bfd_elf_strtab_offset (dynstr,
2744 defaux.vda_name);
2745 _bfd_elf_swap_verdaux_out (output_bfd,
2746 &defaux, (Elf_External_Verdaux *) p);
2747 p += sizeof (Elf_External_Verdaux);
252b5132 2748 }
252b5132 2749 }
45d6a902 2750 while (def.vd_next);
252b5132
RH
2751 }
2752
45d6a902
AM
2753 /* Adjust version references. */
2754 if (elf_tdata (output_bfd)->verref)
252b5132 2755 {
45d6a902
AM
2756 asection *s;
2757 bfd_byte *p;
2758 bfd_size_type i;
2759 Elf_Internal_Verneed need;
2760 Elf_Internal_Vernaux needaux;
252b5132 2761
45d6a902
AM
2762 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
2763 p = (bfd_byte *) s->contents;
2764 do
252b5132 2765 {
45d6a902
AM
2766 _bfd_elf_swap_verneed_in (output_bfd, (Elf_External_Verneed *) p,
2767 &need);
2768 need.vn_file = _bfd_elf_strtab_offset (dynstr, need.vn_file);
2769 _bfd_elf_swap_verneed_out (output_bfd, &need,
2770 (Elf_External_Verneed *) p);
2771 p += sizeof (Elf_External_Verneed);
2772 for (i = 0; i < need.vn_cnt; ++i)
252b5132 2773 {
45d6a902
AM
2774 _bfd_elf_swap_vernaux_in (output_bfd,
2775 (Elf_External_Vernaux *) p, &needaux);
2776 needaux.vna_name = _bfd_elf_strtab_offset (dynstr,
2777 needaux.vna_name);
2778 _bfd_elf_swap_vernaux_out (output_bfd,
2779 &needaux,
2780 (Elf_External_Vernaux *) p);
2781 p += sizeof (Elf_External_Vernaux);
252b5132
RH
2782 }
2783 }
45d6a902 2784 while (need.vn_next);
252b5132
RH
2785 }
2786
b34976b6 2787 return TRUE;
252b5132 2788}
252b5132
RH
2789\f
2790/* Final phase of ELF linker. */
2791
2792/* A structure we use to avoid passing large numbers of arguments. */
2793
2794struct elf_final_link_info
2795{
2796 /* General link information. */
2797 struct bfd_link_info *info;
2798 /* Output BFD. */
2799 bfd *output_bfd;
2800 /* Symbol string table. */
2801 struct bfd_strtab_hash *symstrtab;
2802 /* .dynsym section. */
2803 asection *dynsym_sec;
2804 /* .hash section. */
2805 asection *hash_sec;
2806 /* symbol version section (.gnu.version). */
2807 asection *symver_sec;
13ae64f3
JJ
2808 /* first SHF_TLS section (if any). */
2809 asection *first_tls_sec;
252b5132
RH
2810 /* Buffer large enough to hold contents of any section. */
2811 bfd_byte *contents;
2812 /* Buffer large enough to hold external relocs of any section. */
268b6b39 2813 void *external_relocs;
252b5132
RH
2814 /* Buffer large enough to hold internal relocs of any section. */
2815 Elf_Internal_Rela *internal_relocs;
2816 /* Buffer large enough to hold external local symbols of any input
2817 BFD. */
2818 Elf_External_Sym *external_syms;
9ad5cbcf
AM
2819 /* And a buffer for symbol section indices. */
2820 Elf_External_Sym_Shndx *locsym_shndx;
252b5132
RH
2821 /* Buffer large enough to hold internal local symbols of any input
2822 BFD. */
2823 Elf_Internal_Sym *internal_syms;
2824 /* Array large enough to hold a symbol index for each local symbol
2825 of any input BFD. */
2826 long *indices;
2827 /* Array large enough to hold a section pointer for each local
2828 symbol of any input BFD. */
2829 asection **sections;
2830 /* Buffer to hold swapped out symbols. */
2831 Elf_External_Sym *symbuf;
9ad5cbcf
AM
2832 /* And one for symbol section indices. */
2833 Elf_External_Sym_Shndx *symshndxbuf;
252b5132
RH
2834 /* Number of swapped out symbols in buffer. */
2835 size_t symbuf_count;
2836 /* Number of symbols which fit in symbuf. */
2837 size_t symbuf_size;
c97e73dd
AM
2838 /* And same for symshndxbuf. */
2839 size_t shndxbuf_size;
252b5132
RH
2840};
2841
b34976b6 2842static bfd_boolean elf_link_output_sym
268b6b39 2843 (struct elf_final_link_info *, const char *, Elf_Internal_Sym *, asection *);
b34976b6 2844static bfd_boolean elf_link_flush_output_syms
268b6b39 2845 (struct elf_final_link_info *);
b34976b6 2846static bfd_boolean elf_link_output_extsym
268b6b39 2847 (struct elf_link_hash_entry *, void *);
b34976b6 2848static bfd_boolean elf_link_input_bfd
268b6b39 2849 (struct elf_final_link_info *, bfd *);
b34976b6 2850static bfd_boolean elf_reloc_link_order
268b6b39 2851 (bfd *, struct bfd_link_info *, asection *, struct bfd_link_order *);
252b5132
RH
2852
2853/* This struct is used to pass information to elf_link_output_extsym. */
2854
2855struct elf_outext_info
2856{
b34976b6
AM
2857 bfd_boolean failed;
2858 bfd_boolean localsyms;
252b5132
RH
2859 struct elf_final_link_info *finfo;
2860};
2861
1049f94e 2862/* When performing a relocatable link, the input relocations are
31367b81
MM
2863 preserved. But, if they reference global symbols, the indices
2864 referenced must be updated. Update all the relocations in
2865 REL_HDR (there are COUNT of them), using the data in REL_HASH. */
2866
2867static void
268b6b39
AM
2868elf_link_adjust_relocs (bfd *abfd,
2869 Elf_Internal_Shdr *rel_hdr,
2870 unsigned int count,
2871 struct elf_link_hash_entry **rel_hash)
31367b81
MM
2872{
2873 unsigned int i;
9c5bfbb7 2874 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
947216bf 2875 bfd_byte *erela;
268b6b39
AM
2876 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
2877 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
209f668e 2878
947216bf 2879 if (rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
209f668e 2880 {
947216bf
AM
2881 swap_in = bed->s->swap_reloc_in;
2882 swap_out = bed->s->swap_reloc_out;
209f668e 2883 }
947216bf 2884 else if (rel_hdr->sh_entsize == sizeof (Elf_External_Rela))
209f668e 2885 {
947216bf
AM
2886 swap_in = bed->s->swap_reloca_in;
2887 swap_out = bed->s->swap_reloca_out;
209f668e 2888 }
947216bf
AM
2889 else
2890 abort ();
2891
2892 if (bed->s->int_rels_per_ext_rel > MAX_INT_RELS_PER_EXT_REL)
2893 abort ();
31367b81 2894
947216bf
AM
2895 erela = rel_hdr->contents;
2896 for (i = 0; i < count; i++, rel_hash++, erela += rel_hdr->sh_entsize)
31367b81 2897 {
947216bf
AM
2898 Elf_Internal_Rela irela[MAX_INT_RELS_PER_EXT_REL];
2899 unsigned int j;
2900
31367b81
MM
2901 if (*rel_hash == NULL)
2902 continue;
2903
2904 BFD_ASSERT ((*rel_hash)->indx >= 0);
2905
947216bf
AM
2906 (*swap_in) (abfd, erela, irela);
2907 for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
2908 irela[j].r_info = ELF_R_INFO ((*rel_hash)->indx,
2909 ELF_R_TYPE (irela[j].r_info));
2910 (*swap_out) (abfd, irela, erela);
31367b81
MM
2911 }
2912}
2913
58821868
AM
2914struct elf_link_sort_rela
2915{
db6751f2
JJ
2916 bfd_vma offset;
2917 enum elf_reloc_type_class type;
947216bf
AM
2918 /* We use this as an array of size int_rels_per_ext_rel. */
2919 Elf_Internal_Rela rela[1];
db6751f2
JJ
2920};
2921
2922static int
268b6b39 2923elf_link_sort_cmp1 (const void *A, const void *B)
db6751f2 2924{
268b6b39
AM
2925 const struct elf_link_sort_rela *a = A;
2926 const struct elf_link_sort_rela *b = B;
db6751f2
JJ
2927 int relativea, relativeb;
2928
2929 relativea = a->type == reloc_class_relative;
2930 relativeb = b->type == reloc_class_relative;
2931
2932 if (relativea < relativeb)
db6751f2 2933 return 1;
fcfbdf31
JJ
2934 if (relativea > relativeb)
2935 return -1;
947216bf 2936 if (ELF_R_SYM (a->rela->r_info) < ELF_R_SYM (b->rela->r_info))
db6751f2 2937 return -1;
947216bf 2938 if (ELF_R_SYM (a->rela->r_info) > ELF_R_SYM (b->rela->r_info))
db6751f2 2939 return 1;
947216bf 2940 if (a->rela->r_offset < b->rela->r_offset)
db6751f2 2941 return -1;
947216bf 2942 if (a->rela->r_offset > b->rela->r_offset)
db6751f2
JJ
2943 return 1;
2944 return 0;
2945}
2946
2947static int
268b6b39 2948elf_link_sort_cmp2 (const void *A, const void *B)
db6751f2 2949{
268b6b39
AM
2950 const struct elf_link_sort_rela *a = A;
2951 const struct elf_link_sort_rela *b = B;
db6751f2
JJ
2952 int copya, copyb;
2953
2954 if (a->offset < b->offset)
2955 return -1;
2956 if (a->offset > b->offset)
2957 return 1;
290394d6
JJ
2958 copya = (a->type == reloc_class_copy) * 2 + (a->type == reloc_class_plt);
2959 copyb = (b->type == reloc_class_copy) * 2 + (b->type == reloc_class_plt);
db6751f2
JJ
2960 if (copya < copyb)
2961 return -1;
2962 if (copya > copyb)
2963 return 1;
947216bf 2964 if (a->rela->r_offset < b->rela->r_offset)
db6751f2 2965 return -1;
947216bf 2966 if (a->rela->r_offset > b->rela->r_offset)
db6751f2
JJ
2967 return 1;
2968 return 0;
2969}
2970
2971static size_t
268b6b39 2972elf_link_sort_relocs (bfd *abfd, struct bfd_link_info *info, asection **psec)
db6751f2 2973{
e717da7e 2974 asection *reldyn;
f51e552e 2975 bfd_size_type count, size;
947216bf
AM
2976 size_t i, ret, sort_elt, ext_size;
2977 bfd_byte *sort, *s_non_relative, *p;
2978 struct elf_link_sort_rela *sq;
9c5bfbb7 2979 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
033fd5f9 2980 int i2e = bed->s->int_rels_per_ext_rel;
268b6b39
AM
2981 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
2982 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
e717da7e 2983 struct bfd_link_order *lo;
db6751f2
JJ
2984
2985 reldyn = bfd_get_section_by_name (abfd, ".rela.dyn");
2986 if (reldyn == NULL || reldyn->_raw_size == 0)
2987 {
2988 reldyn = bfd_get_section_by_name (abfd, ".rel.dyn");
2989 if (reldyn == NULL || reldyn->_raw_size == 0)
2990 return 0;
947216bf
AM
2991 ext_size = sizeof (Elf_External_Rel);
2992 swap_in = bed->s->swap_reloc_in;
2993 swap_out = bed->s->swap_reloc_out;
db6751f2
JJ
2994 }
2995 else
947216bf
AM
2996 {
2997 ext_size = sizeof (Elf_External_Rela);
2998 swap_in = bed->s->swap_reloca_in;
2999 swap_out = bed->s->swap_reloca_out;
3000 }
3001 count = reldyn->_raw_size / ext_size;
db6751f2
JJ
3002
3003 size = 0;
e717da7e
AM
3004 for (lo = reldyn->link_order_head; lo != NULL; lo = lo->next)
3005 if (lo->type == bfd_indirect_link_order)
3006 {
3007 asection *o = lo->u.indirect.section;
3008 size += o->_raw_size;
3009 }
db6751f2
JJ
3010
3011 if (size != reldyn->_raw_size)
3012 return 0;
3013
947216bf
AM
3014 sort_elt = (sizeof (struct elf_link_sort_rela)
3015 + (i2e - 1) * sizeof (Elf_Internal_Rela));
3016 sort = bfd_zmalloc (sort_elt * count);
3017 if (sort == NULL)
db6751f2
JJ
3018 {
3019 (*info->callbacks->warning)
268b6b39 3020 (info, _("Not enough memory to sort relocations"), 0, abfd, 0, 0);
db6751f2
JJ
3021 return 0;
3022 }
3023
e717da7e
AM
3024 for (lo = reldyn->link_order_head; lo != NULL; lo = lo->next)
3025 if (lo->type == bfd_indirect_link_order)
db6751f2 3026 {
947216bf 3027 bfd_byte *erel, *erelend;
e717da7e 3028 asection *o = lo->u.indirect.section;
db6751f2 3029
947216bf
AM
3030 erel = o->contents;
3031 erelend = o->contents + o->_raw_size;
3032 p = sort + o->output_offset / ext_size * sort_elt;
3033 while (erel < erelend)
db6751f2 3034 {
947216bf
AM
3035 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
3036 (*swap_in) (abfd, erel, s->rela);
3037 s->type = (*bed->elf_backend_reloc_type_class) (s->rela);
3038 p += sort_elt;
3039 erel += ext_size;
db6751f2
JJ
3040 }
3041 }
3042
268b6b39 3043 qsort (sort, count, sort_elt, elf_link_sort_cmp1);
947216bf
AM
3044
3045 for (i = 0, p = sort; i < count; i++, p += sort_elt)
db6751f2 3046 {
947216bf
AM
3047 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
3048 if (s->type != reloc_class_relative)
3049 break;
db6751f2 3050 }
947216bf
AM
3051 ret = i;
3052 s_non_relative = p;
3053
3054 sq = (struct elf_link_sort_rela *) s_non_relative;
3055 for (; i < count; i++, p += sort_elt)
3056 {
3057 struct elf_link_sort_rela *sp = (struct elf_link_sort_rela *) p;
3058 if (ELF_R_SYM (sp->rela->r_info) != ELF_R_SYM (sq->rela->r_info))
3059 sq = sp;
3060 sp->offset = sq->rela->r_offset;
3061 }
3062
268b6b39 3063 qsort (s_non_relative, count - ret, sort_elt, elf_link_sort_cmp2);
dc810e39 3064
e717da7e
AM
3065 for (lo = reldyn->link_order_head; lo != NULL; lo = lo->next)
3066 if (lo->type == bfd_indirect_link_order)
db6751f2 3067 {
947216bf 3068 bfd_byte *erel, *erelend;
e717da7e 3069 asection *o = lo->u.indirect.section;
db6751f2 3070
947216bf
AM
3071 erel = o->contents;
3072 erelend = o->contents + o->_raw_size;
3073 p = sort + o->output_offset / ext_size * sort_elt;
3074 while (erel < erelend)
db6751f2 3075 {
947216bf
AM
3076 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
3077 (*swap_out) (abfd, s->rela, erel);
3078 p += sort_elt;
3079 erel += ext_size;
db6751f2
JJ
3080 }
3081 }
3082
5ed6aba4 3083 free (sort);
db6751f2
JJ
3084 *psec = reldyn;
3085 return ret;
3086}
3087
252b5132
RH
3088/* Do the final step of an ELF link. */
3089
b34976b6 3090bfd_boolean
268b6b39 3091elf_bfd_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132 3092{
b34976b6
AM
3093 bfd_boolean dynamic;
3094 bfd_boolean emit_relocs;
252b5132
RH
3095 bfd *dynobj;
3096 struct elf_final_link_info finfo;
3097 register asection *o;
3098 register struct bfd_link_order *p;
3099 register bfd *sub;
dc810e39
AM
3100 bfd_size_type max_contents_size;
3101 bfd_size_type max_external_reloc_size;
3102 bfd_size_type max_internal_reloc_count;
3103 bfd_size_type max_sym_count;
9ad5cbcf 3104 bfd_size_type max_sym_shndx_count;
252b5132
RH
3105 file_ptr off;
3106 Elf_Internal_Sym elfsym;
3107 unsigned int i;
3108 Elf_Internal_Shdr *symtab_hdr;
c97e73dd 3109 Elf_Internal_Shdr *symtab_shndx_hdr;
252b5132 3110 Elf_Internal_Shdr *symstrtab_hdr;
9c5bfbb7 3111 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 3112 struct elf_outext_info eoinfo;
b34976b6 3113 bfd_boolean merged;
db6751f2
JJ
3114 size_t relativecount = 0;
3115 asection *reldyn = 0;
dc810e39 3116 bfd_size_type amt;
252b5132 3117
8ea2e4bd 3118 if (! is_elf_hash_table (info))
b34976b6 3119 return FALSE;
8ea2e4bd 3120
252b5132
RH
3121 if (info->shared)
3122 abfd->flags |= DYNAMIC;
3123
3124 dynamic = elf_hash_table (info)->dynamic_sections_created;
3125 dynobj = elf_hash_table (info)->dynobj;
3126
1049f94e 3127 emit_relocs = (info->relocatable
c44233aa
AM
3128 || info->emitrelocations
3129 || bed->elf_backend_emit_relocs);
9317eacc 3130
252b5132
RH
3131 finfo.info = info;
3132 finfo.output_bfd = abfd;
3133 finfo.symstrtab = elf_stringtab_init ();
3134 if (finfo.symstrtab == NULL)
b34976b6 3135 return FALSE;
252b5132
RH
3136
3137 if (! dynamic)
3138 {
3139 finfo.dynsym_sec = NULL;
3140 finfo.hash_sec = NULL;
3141 finfo.symver_sec = NULL;
3142 }
3143 else
3144 {
3145 finfo.dynsym_sec = bfd_get_section_by_name (dynobj, ".dynsym");
3146 finfo.hash_sec = bfd_get_section_by_name (dynobj, ".hash");
3147 BFD_ASSERT (finfo.dynsym_sec != NULL && finfo.hash_sec != NULL);
3148 finfo.symver_sec = bfd_get_section_by_name (dynobj, ".gnu.version");
3149 /* Note that it is OK if symver_sec is NULL. */
3150 }
3151
3152 finfo.contents = NULL;
3153 finfo.external_relocs = NULL;
3154 finfo.internal_relocs = NULL;
3155 finfo.external_syms = NULL;
9ad5cbcf 3156 finfo.locsym_shndx = NULL;
252b5132
RH
3157 finfo.internal_syms = NULL;
3158 finfo.indices = NULL;
3159 finfo.sections = NULL;
3160 finfo.symbuf = NULL;
9ad5cbcf 3161 finfo.symshndxbuf = NULL;
252b5132 3162 finfo.symbuf_count = 0;
c97e73dd 3163 finfo.shndxbuf_size = 0;
13ae64f3 3164 finfo.first_tls_sec = NULL;
268b6b39 3165 for (o = abfd->sections; o != NULL; o = o->next)
13ae64f3
JJ
3166 if ((o->flags & SEC_THREAD_LOCAL) != 0
3167 && (o->flags & SEC_LOAD) != 0)
3168 {
3169 finfo.first_tls_sec = o;
3170 break;
3171 }
252b5132
RH
3172
3173 /* Count up the number of relocations we will output for each output
3174 section, so that we know the sizes of the reloc sections. We
3175 also figure out some maximum sizes. */
3176 max_contents_size = 0;
3177 max_external_reloc_size = 0;
3178 max_internal_reloc_count = 0;
3179 max_sym_count = 0;
9ad5cbcf 3180 max_sym_shndx_count = 0;
b34976b6 3181 merged = FALSE;
268b6b39 3182 for (o = abfd->sections; o != NULL; o = o->next)
252b5132 3183 {
3f9a32bd 3184 struct bfd_elf_section_data *esdo = elf_section_data (o);
252b5132
RH
3185 o->reloc_count = 0;
3186
3187 for (p = o->link_order_head; p != NULL; p = p->next)
3188 {
3f9a32bd
AM
3189 unsigned int reloc_count = 0;
3190 struct bfd_elf_section_data *esdi = NULL;
3191 unsigned int *rel_count1;
3192
252b5132
RH
3193 if (p->type == bfd_section_reloc_link_order
3194 || p->type == bfd_symbol_reloc_link_order)
3f9a32bd 3195 reloc_count = 1;
252b5132
RH
3196 else if (p->type == bfd_indirect_link_order)
3197 {
3198 asection *sec;
3199
3200 sec = p->u.indirect.section;
3f9a32bd 3201 esdi = elf_section_data (sec);
252b5132
RH
3202
3203 /* Mark all sections which are to be included in the
3204 link. This will normally be every section. We need
3205 to do this so that we can identify any sections which
3206 the linker has decided to not include. */
b34976b6 3207 sec->linker_mark = TRUE;
252b5132 3208
f5fa8ca2 3209 if (sec->flags & SEC_MERGE)
b34976b6 3210 merged = TRUE;
f5fa8ca2 3211
1049f94e 3212 if (info->relocatable || info->emitrelocations)
3f9a32bd 3213 reloc_count = sec->reloc_count;
c44233aa 3214 else if (bed->elf_backend_count_relocs)
9317eacc
CM
3215 {
3216 Elf_Internal_Rela * relocs;
3217
268b6b39
AM
3218 relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
3219 info->keep_memory);
9317eacc 3220
3f9a32bd 3221 reloc_count = (*bed->elf_backend_count_relocs) (sec, relocs);
9317eacc 3222
6cdc0ccc 3223 if (elf_section_data (o)->relocs != relocs)
9317eacc
CM
3224 free (relocs);
3225 }
252b5132
RH
3226
3227 if (sec->_raw_size > max_contents_size)
3228 max_contents_size = sec->_raw_size;
3229 if (sec->_cooked_size > max_contents_size)
3230 max_contents_size = sec->_cooked_size;
3231
3232 /* We are interested in just local symbols, not all
3233 symbols. */
3234 if (bfd_get_flavour (sec->owner) == bfd_target_elf_flavour
3235 && (sec->owner->flags & DYNAMIC) == 0)
3236 {
3237 size_t sym_count;
3238
3239 if (elf_bad_symtab (sec->owner))
3240 sym_count = (elf_tdata (sec->owner)->symtab_hdr.sh_size
3241 / sizeof (Elf_External_Sym));
3242 else
3243 sym_count = elf_tdata (sec->owner)->symtab_hdr.sh_info;
3244
3245 if (sym_count > max_sym_count)
3246 max_sym_count = sym_count;
3247
9ad5cbcf
AM
3248 if (sym_count > max_sym_shndx_count
3249 && elf_symtab_shndx (sec->owner) != 0)
3250 max_sym_shndx_count = sym_count;
3251
252b5132
RH
3252 if ((sec->flags & SEC_RELOC) != 0)
3253 {
3254 size_t ext_size;
3255
3256 ext_size = elf_section_data (sec)->rel_hdr.sh_size;
3257 if (ext_size > max_external_reloc_size)
3258 max_external_reloc_size = ext_size;
3259 if (sec->reloc_count > max_internal_reloc_count)
3260 max_internal_reloc_count = sec->reloc_count;
3261 }
3262 }
3263 }
3f9a32bd
AM
3264
3265 if (reloc_count == 0)
3266 continue;
3267
3268 o->reloc_count += reloc_count;
3269
3270 /* MIPS may have a mix of REL and RELA relocs on sections.
3271 To support this curious ABI we keep reloc counts in
3272 elf_section_data too. We must be careful to add the
3273 relocations from the input section to the right output
3274 count. FIXME: Get rid of one count. We have
3275 o->reloc_count == esdo->rel_count + esdo->rel_count2. */
3276 rel_count1 = &esdo->rel_count;
3277 if (esdi != NULL)
3278 {
3279 bfd_boolean same_size;
3280 bfd_size_type entsize1;
3281
3282 entsize1 = esdi->rel_hdr.sh_entsize;
3283 BFD_ASSERT (entsize1 == sizeof (Elf_External_Rel)
3284 || entsize1 == sizeof (Elf_External_Rela));
3285 same_size = (!o->use_rela_p
3286 == (entsize1 == sizeof (Elf_External_Rel)));
3287
3288 if (!same_size)
3289 rel_count1 = &esdo->rel_count2;
3290
3291 if (esdi->rel_hdr2 != NULL)
3292 {
3293 bfd_size_type entsize2 = esdi->rel_hdr2->sh_entsize;
3294 unsigned int alt_count;
3295 unsigned int *rel_count2;
3296
3297 BFD_ASSERT (entsize2 != entsize1
3298 && (entsize2 == sizeof (Elf_External_Rel)
3299 || entsize2 == sizeof (Elf_External_Rela)));
3300
3301 rel_count2 = &esdo->rel_count2;
3302 if (!same_size)
3303 rel_count2 = &esdo->rel_count;
3304
3305 /* The following is probably too simplistic if the
3306 backend counts output relocs unusually. */
3307 BFD_ASSERT (bed->elf_backend_count_relocs == NULL);
3308 alt_count = NUM_SHDR_ENTRIES (esdi->rel_hdr2);
3309 *rel_count2 += alt_count;
3310 reloc_count -= alt_count;
3311 }
3312 }
3313 *rel_count1 += reloc_count;
252b5132
RH
3314 }
3315
3316 if (o->reloc_count > 0)
3317 o->flags |= SEC_RELOC;
3318 else
3319 {
3320 /* Explicitly clear the SEC_RELOC flag. The linker tends to
3321 set it (this is probably a bug) and if it is set
3322 assign_section_numbers will create a reloc section. */
3323 o->flags &=~ SEC_RELOC;
3324 }
3325
3326 /* If the SEC_ALLOC flag is not set, force the section VMA to
3327 zero. This is done in elf_fake_sections as well, but forcing
3328 the VMA to 0 here will ensure that relocs against these
3329 sections are handled correctly. */
3330 if ((o->flags & SEC_ALLOC) == 0
3331 && ! o->user_set_vma)
3332 o->vma = 0;
3333 }
3334
1049f94e 3335 if (! info->relocatable && merged)
f5fa8ca2 3336 elf_link_hash_traverse (elf_hash_table (info),
268b6b39 3337 _bfd_elf_link_sec_merge_syms, abfd);
f5fa8ca2 3338
252b5132
RH
3339 /* Figure out the file positions for everything but the symbol table
3340 and the relocs. We set symcount to force assign_section_numbers
3341 to create a symbol table. */
3342 bfd_get_symcount (abfd) = info->strip == strip_all ? 0 : 1;
3343 BFD_ASSERT (! abfd->output_has_begun);
3344 if (! _bfd_elf_compute_section_file_positions (abfd, info))
3345 goto error_return;
3346
3347 /* That created the reloc sections. Set their sizes, and assign
3348 them file positions, and allocate some buffers. */
3349 for (o = abfd->sections; o != NULL; o = o->next)
3350 {
3351 if ((o->flags & SEC_RELOC) != 0)
3352 {
45d6a902
AM
3353 if (!(_bfd_elf_link_size_reloc_section
3354 (abfd, &elf_section_data (o)->rel_hdr, o)))
252b5132
RH
3355 goto error_return;
3356
23bc299b 3357 if (elf_section_data (o)->rel_hdr2
45d6a902
AM
3358 && !(_bfd_elf_link_size_reloc_section
3359 (abfd, elf_section_data (o)->rel_hdr2, o)))
252b5132 3360 goto error_return;
252b5132 3361 }
b037af20
MM
3362
3363 /* Now, reset REL_COUNT and REL_COUNT2 so that we can use them
3e932841 3364 to count upwards while actually outputting the relocations. */
b037af20
MM
3365 elf_section_data (o)->rel_count = 0;
3366 elf_section_data (o)->rel_count2 = 0;
252b5132
RH
3367 }
3368
3369 _bfd_elf_assign_file_positions_for_relocs (abfd);
3370
3371 /* We have now assigned file positions for all the sections except
3372 .symtab and .strtab. We start the .symtab section at the current
3373 file position, and write directly to it. We build the .strtab
3374 section in memory. */
3375 bfd_get_symcount (abfd) = 0;
3376 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3377 /* sh_name is set in prep_headers. */
3378 symtab_hdr->sh_type = SHT_SYMTAB;
c97e73dd 3379 /* sh_flags, sh_addr and sh_size all start off zero. */
252b5132
RH
3380 symtab_hdr->sh_entsize = sizeof (Elf_External_Sym);
3381 /* sh_link is set in assign_section_numbers. */
3382 /* sh_info is set below. */
3383 /* sh_offset is set just below. */
45d6a902 3384 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
252b5132
RH
3385
3386 off = elf_tdata (abfd)->next_file_pos;
b34976b6 3387 off = _bfd_elf_assign_file_position_for_section (symtab_hdr, off, TRUE);
252b5132
RH
3388
3389 /* Note that at this point elf_tdata (abfd)->next_file_pos is
3390 incorrect. We do not yet know the size of the .symtab section.
3391 We correct next_file_pos below, after we do know the size. */
3392
3393 /* Allocate a buffer to hold swapped out symbols. This is to avoid
3394 continuously seeking to the right position in the file. */
3395 if (! info->keep_memory || max_sym_count < 20)
3396 finfo.symbuf_size = 20;
3397 else
3398 finfo.symbuf_size = max_sym_count;
dc810e39
AM
3399 amt = finfo.symbuf_size;
3400 amt *= sizeof (Elf_External_Sym);
268b6b39 3401 finfo.symbuf = bfd_malloc (amt);
252b5132
RH
3402 if (finfo.symbuf == NULL)
3403 goto error_return;
9ad5cbcf
AM
3404 if (elf_numsections (abfd) > SHN_LORESERVE)
3405 {
c97e73dd
AM
3406 /* Wild guess at number of output symbols. realloc'd as needed. */
3407 amt = 2 * max_sym_count + elf_numsections (abfd) + 1000;
3408 finfo.shndxbuf_size = amt;
9ad5cbcf 3409 amt *= sizeof (Elf_External_Sym_Shndx);
268b6b39 3410 finfo.symshndxbuf = bfd_zmalloc (amt);
9ad5cbcf
AM
3411 if (finfo.symshndxbuf == NULL)
3412 goto error_return;
3413 }
252b5132
RH
3414
3415 /* Start writing out the symbol table. The first symbol is always a
3416 dummy symbol. */
9317eacc
CM
3417 if (info->strip != strip_all
3418 || emit_relocs)
252b5132
RH
3419 {
3420 elfsym.st_value = 0;
3421 elfsym.st_size = 0;
3422 elfsym.st_info = 0;
3423 elfsym.st_other = 0;
3424 elfsym.st_shndx = SHN_UNDEF;
268b6b39 3425 if (! elf_link_output_sym (&finfo, NULL, &elfsym, bfd_und_section_ptr))
252b5132
RH
3426 goto error_return;
3427 }
3428
3429#if 0
3430 /* Some standard ELF linkers do this, but we don't because it causes
3431 bootstrap comparison failures. */
3432 /* Output a file symbol for the output file as the second symbol.
3433 We output this even if we are discarding local symbols, although
3434 I'm not sure if this is correct. */
3435 elfsym.st_value = 0;
3436 elfsym.st_size = 0;
3437 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
3438 elfsym.st_other = 0;
3439 elfsym.st_shndx = SHN_ABS;
3440 if (! elf_link_output_sym (&finfo, bfd_get_filename (abfd),
3441 &elfsym, bfd_abs_section_ptr))
3442 goto error_return;
3443#endif
3444
3445 /* Output a symbol for each section. We output these even if we are
3446 discarding local symbols, since they are used for relocs. These
3447 symbols have no names. We store the index of each one in the
3448 index field of the section, so that we can find it again when
3449 outputting relocs. */
9317eacc
CM
3450 if (info->strip != strip_all
3451 || emit_relocs)
252b5132
RH
3452 {
3453 elfsym.st_size = 0;
3454 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
3455 elfsym.st_other = 0;
9ad5cbcf 3456 for (i = 1; i < elf_numsections (abfd); i++)
252b5132
RH
3457 {
3458 o = section_from_elf_index (abfd, i);
3459 if (o != NULL)
3460 o->target_index = bfd_get_symcount (abfd);
3461 elfsym.st_shndx = i;
1049f94e 3462 if (info->relocatable || o == NULL)
252b5132
RH
3463 elfsym.st_value = 0;
3464 else
3465 elfsym.st_value = o->vma;
268b6b39 3466 if (! elf_link_output_sym (&finfo, NULL, &elfsym, o))
252b5132 3467 goto error_return;
c97e73dd 3468 if (i == SHN_LORESERVE - 1)
9ad5cbcf 3469 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
3470 }
3471 }
3472
3473 /* Allocate some memory to hold information read in from the input
3474 files. */
9ad5cbcf
AM
3475 if (max_contents_size != 0)
3476 {
268b6b39 3477 finfo.contents = bfd_malloc (max_contents_size);
9ad5cbcf
AM
3478 if (finfo.contents == NULL)
3479 goto error_return;
3480 }
3481
3482 if (max_external_reloc_size != 0)
3483 {
268b6b39 3484 finfo.external_relocs = bfd_malloc (max_external_reloc_size);
9ad5cbcf
AM
3485 if (finfo.external_relocs == NULL)
3486 goto error_return;
3487 }
3488
3489 if (max_internal_reloc_count != 0)
3490 {
3491 amt = max_internal_reloc_count * bed->s->int_rels_per_ext_rel;
3492 amt *= sizeof (Elf_Internal_Rela);
268b6b39 3493 finfo.internal_relocs = bfd_malloc (amt);
9ad5cbcf
AM
3494 if (finfo.internal_relocs == NULL)
3495 goto error_return;
3496 }
3497
3498 if (max_sym_count != 0)
3499 {
3500 amt = max_sym_count * sizeof (Elf_External_Sym);
268b6b39 3501 finfo.external_syms = bfd_malloc (amt);
9ad5cbcf
AM
3502 if (finfo.external_syms == NULL)
3503 goto error_return;
3504
3505 amt = max_sym_count * sizeof (Elf_Internal_Sym);
268b6b39 3506 finfo.internal_syms = bfd_malloc (amt);
9ad5cbcf
AM
3507 if (finfo.internal_syms == NULL)
3508 goto error_return;
3509
3510 amt = max_sym_count * sizeof (long);
268b6b39 3511 finfo.indices = bfd_malloc (amt);
9ad5cbcf
AM
3512 if (finfo.indices == NULL)
3513 goto error_return;
3514
3515 amt = max_sym_count * sizeof (asection *);
268b6b39 3516 finfo.sections = bfd_malloc (amt);
9ad5cbcf
AM
3517 if (finfo.sections == NULL)
3518 goto error_return;
3519 }
3520
3521 if (max_sym_shndx_count != 0)
3522 {
3523 amt = max_sym_shndx_count * sizeof (Elf_External_Sym_Shndx);
268b6b39 3524 finfo.locsym_shndx = bfd_malloc (amt);
9ad5cbcf
AM
3525 if (finfo.locsym_shndx == NULL)
3526 goto error_return;
3527 }
252b5132 3528
13ae64f3
JJ
3529 if (finfo.first_tls_sec)
3530 {
3531 unsigned int align = 0;
3532 bfd_vma base = finfo.first_tls_sec->vma, end = 0;
3533 asection *sec;
3534
3535 for (sec = finfo.first_tls_sec;
3536 sec && (sec->flags & SEC_THREAD_LOCAL);
3537 sec = sec->next)
3538 {
3539 bfd_vma size = sec->_raw_size;
3540
3541 if (bfd_get_section_alignment (abfd, sec) > align)
3542 align = bfd_get_section_alignment (abfd, sec);
3543 if (sec->_raw_size == 0 && (sec->flags & SEC_HAS_CONTENTS) == 0)
3544 {
3545 struct bfd_link_order *o;
3546
3547 size = 0;
3548 for (o = sec->link_order_head; o != NULL; o = o->next)
3549 if (size < o->offset + o->size)
58821868 3550 size = o->offset + o->size;
13ae64f3
JJ
3551 }
3552 end = sec->vma + size;
3553 }
3554 elf_hash_table (info)->tls_segment
3555 = bfd_zalloc (abfd, sizeof (struct elf_link_tls_segment));
3556 if (elf_hash_table (info)->tls_segment == NULL)
3557 goto error_return;
3558 elf_hash_table (info)->tls_segment->start = base;
3559 elf_hash_table (info)->tls_segment->size = end - base;
3560 elf_hash_table (info)->tls_segment->align = align;
3561 }
3562
252b5132
RH
3563 /* Since ELF permits relocations to be against local symbols, we
3564 must have the local symbols available when we do the relocations.
3565 Since we would rather only read the local symbols once, and we
3566 would rather not keep them in memory, we handle all the
3567 relocations for a single input file at the same time.
3568
3569 Unfortunately, there is no way to know the total number of local
3570 symbols until we have seen all of them, and the local symbol
3571 indices precede the global symbol indices. This means that when
1049f94e 3572 we are generating relocatable output, and we see a reloc against
252b5132
RH
3573 a global symbol, we can not know the symbol index until we have
3574 finished examining all the local symbols to see which ones we are
3575 going to output. To deal with this, we keep the relocations in
3576 memory, and don't output them until the end of the link. This is
3577 an unfortunate waste of memory, but I don't see a good way around
1049f94e 3578 it. Fortunately, it only happens when performing a relocatable
252b5132
RH
3579 link, which is not the common case. FIXME: If keep_memory is set
3580 we could write the relocs out and then read them again; I don't
3581 know how bad the memory loss will be. */
3582
3583 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
b34976b6 3584 sub->output_has_begun = FALSE;
252b5132
RH
3585 for (o = abfd->sections; o != NULL; o = o->next)
3586 {
3587 for (p = o->link_order_head; p != NULL; p = p->next)
3588 {
3589 if (p->type == bfd_indirect_link_order
a50c1845 3590 && (bfd_get_flavour ((sub = p->u.indirect.section->owner))
4ddafab0 3591 == bfd_target_elf_flavour)
a50c1845 3592 && elf_elfheader (sub)->e_ident[EI_CLASS] == bed->s->elfclass)
252b5132 3593 {
252b5132
RH
3594 if (! sub->output_has_begun)
3595 {
3596 if (! elf_link_input_bfd (&finfo, sub))
3597 goto error_return;
b34976b6 3598 sub->output_has_begun = TRUE;
252b5132
RH
3599 }
3600 }
3601 else if (p->type == bfd_section_reloc_link_order
3602 || p->type == bfd_symbol_reloc_link_order)
3603 {
3604 if (! elf_reloc_link_order (abfd, info, o, p))
3605 goto error_return;
3606 }
3607 else
3608 {
3609 if (! _bfd_default_link_order (abfd, info, o, p))
3610 goto error_return;
3611 }
3612 }
3613 }
3614
c44233aa
AM
3615 /* Output any global symbols that got converted to local in a
3616 version script or due to symbol visibility. We do this in a
3617 separate step since ELF requires all local symbols to appear
3618 prior to any global symbols. FIXME: We should only do this if
3619 some global symbols were, in fact, converted to become local.
3620 FIXME: Will this work correctly with the Irix 5 linker? */
b34976b6 3621 eoinfo.failed = FALSE;
c44233aa 3622 eoinfo.finfo = &finfo;
b34976b6 3623 eoinfo.localsyms = TRUE;
c44233aa 3624 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
268b6b39 3625 &eoinfo);
c44233aa 3626 if (eoinfo.failed)
b34976b6 3627 return FALSE;
c44233aa 3628
252b5132 3629 /* That wrote out all the local symbols. Finish up the symbol table
5cc7c785
L
3630 with the global symbols. Even if we want to strip everything we
3631 can, we still need to deal with those global symbols that got
3e932841 3632 converted to local in a version script. */
252b5132 3633
30b30c21 3634 /* The sh_info field records the index of the first non local symbol. */
252b5132 3635 symtab_hdr->sh_info = bfd_get_symcount (abfd);
30b30c21 3636
fc8c40a0
AM
3637 if (dynamic
3638 && finfo.dynsym_sec->output_section != bfd_abs_section_ptr)
30b30c21
RH
3639 {
3640 Elf_Internal_Sym sym;
3641 Elf_External_Sym *dynsym =
a7b97311 3642 (Elf_External_Sym *) finfo.dynsym_sec->contents;
71a40b32 3643 long last_local = 0;
30b30c21
RH
3644
3645 /* Write out the section symbols for the output sections. */
3646 if (info->shared)
3647 {
3648 asection *s;
3649
3650 sym.st_size = 0;
3651 sym.st_name = 0;
3652 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
3653 sym.st_other = 0;
3654
3655 for (s = abfd->sections; s != NULL; s = s->next)
3656 {
3657 int indx;
9ad5cbcf
AM
3658 Elf_External_Sym *dest;
3659
30b30c21
RH
3660 indx = elf_section_data (s)->this_idx;
3661 BFD_ASSERT (indx > 0);
3662 sym.st_shndx = indx;
3663 sym.st_value = s->vma;
9ad5cbcf 3664 dest = dynsym + elf_section_data (s)->dynindx;
268b6b39 3665 elf_swap_symbol_out (abfd, &sym, dest, 0);
30b30c21
RH
3666 }
3667
3668 last_local = bfd_count_sections (abfd);
3669 }
3670
3671 /* Write out the local dynsyms. */
3672 if (elf_hash_table (info)->dynlocal)
3673 {
3674 struct elf_link_local_dynamic_entry *e;
3675 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
3676 {
318da145 3677 asection *s;
9ad5cbcf 3678 Elf_External_Sym *dest;
30b30c21 3679
b037af20
MM
3680 sym.st_size = e->isym.st_size;
3681 sym.st_other = e->isym.st_other;
3682
1fa0ddb3
RH
3683 /* Copy the internal symbol as is.
3684 Note that we saved a word of storage and overwrote
c44233aa
AM
3685 the original st_name with the dynstr_index. */
3686 sym = e->isym;
30b30c21 3687
c8e5ddc8 3688 if (e->isym.st_shndx != SHN_UNDEF
58821868
AM
3689 && (e->isym.st_shndx < SHN_LORESERVE
3690 || e->isym.st_shndx > SHN_HIRESERVE))
587ff49e
RH
3691 {
3692 s = bfd_section_from_elf_index (e->input_bfd,
3693 e->isym.st_shndx);
3694
3695 sym.st_shndx =
3696 elf_section_data (s->output_section)->this_idx;
3697 sym.st_value = (s->output_section->vma
3698 + s->output_offset
3699 + e->isym.st_value);
3700 }
30b30c21
RH
3701
3702 if (last_local < e->dynindx)
3703 last_local = e->dynindx;
3704
9ad5cbcf 3705 dest = dynsym + e->dynindx;
268b6b39 3706 elf_swap_symbol_out (abfd, &sym, dest, 0);
30b30c21
RH
3707 }
3708 }
3709
71a40b32
ILT
3710 elf_section_data (finfo.dynsym_sec->output_section)->this_hdr.sh_info =
3711 last_local + 1;
30b30c21 3712 }
252b5132
RH
3713
3714 /* We get the global symbols from the hash table. */
b34976b6
AM
3715 eoinfo.failed = FALSE;
3716 eoinfo.localsyms = FALSE;
252b5132
RH
3717 eoinfo.finfo = &finfo;
3718 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
268b6b39 3719 &eoinfo);
252b5132 3720 if (eoinfo.failed)
b34976b6 3721 return FALSE;
252b5132 3722
587ff49e
RH
3723 /* If backend needs to output some symbols not present in the hash
3724 table, do it now. */
3725 if (bed->elf_backend_output_arch_syms)
3726 {
b34976b6 3727 typedef bfd_boolean (*out_sym_func)
268b6b39 3728 (void *, const char *, Elf_Internal_Sym *, asection *);
dc810e39
AM
3729
3730 if (! ((*bed->elf_backend_output_arch_syms)
268b6b39 3731 (abfd, info, &finfo, (out_sym_func) elf_link_output_sym)))
b34976b6 3732 return FALSE;
3e932841 3733 }
587ff49e 3734
252b5132
RH
3735 /* Flush all symbols to the file. */
3736 if (! elf_link_flush_output_syms (&finfo))
b34976b6 3737 return FALSE;
252b5132
RH
3738
3739 /* Now we know the size of the symtab section. */
3740 off += symtab_hdr->sh_size;
3741
c97e73dd
AM
3742 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3743 if (symtab_shndx_hdr->sh_name != 0)
3744 {
3745 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
3746 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
3747 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
3748 amt = bfd_get_symcount (abfd) * sizeof (Elf_External_Sym_Shndx);
3749 symtab_shndx_hdr->sh_size = amt;
3750
3751 off = _bfd_elf_assign_file_position_for_section (symtab_shndx_hdr,
b34976b6 3752 off, TRUE);
c97e73dd
AM
3753
3754 if (bfd_seek (abfd, symtab_shndx_hdr->sh_offset, SEEK_SET) != 0
268b6b39 3755 || (bfd_bwrite (finfo.symshndxbuf, amt, abfd) != amt))
b34976b6 3756 return FALSE;
c97e73dd
AM
3757 }
3758
3759
252b5132
RH
3760 /* Finish up and write out the symbol string table (.strtab)
3761 section. */
3762 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
3763 /* sh_name was set in prep_headers. */
3764 symstrtab_hdr->sh_type = SHT_STRTAB;
3765 symstrtab_hdr->sh_flags = 0;
3766 symstrtab_hdr->sh_addr = 0;
3767 symstrtab_hdr->sh_size = _bfd_stringtab_size (finfo.symstrtab);
3768 symstrtab_hdr->sh_entsize = 0;
3769 symstrtab_hdr->sh_link = 0;
3770 symstrtab_hdr->sh_info = 0;
3771 /* sh_offset is set just below. */
3772 symstrtab_hdr->sh_addralign = 1;
3773
b34976b6 3774 off = _bfd_elf_assign_file_position_for_section (symstrtab_hdr, off, TRUE);
252b5132
RH
3775 elf_tdata (abfd)->next_file_pos = off;
3776
3777 if (bfd_get_symcount (abfd) > 0)
3778 {
3779 if (bfd_seek (abfd, symstrtab_hdr->sh_offset, SEEK_SET) != 0
3780 || ! _bfd_stringtab_emit (abfd, finfo.symstrtab))
b34976b6 3781 return FALSE;
252b5132
RH
3782 }
3783
3784 /* Adjust the relocs to have the correct symbol indices. */
3785 for (o = abfd->sections; o != NULL; o = o->next)
3786 {
252b5132
RH
3787 if ((o->flags & SEC_RELOC) == 0)
3788 continue;
3789
3e932841 3790 elf_link_adjust_relocs (abfd, &elf_section_data (o)->rel_hdr,
31367b81
MM
3791 elf_section_data (o)->rel_count,
3792 elf_section_data (o)->rel_hashes);
3793 if (elf_section_data (o)->rel_hdr2 != NULL)
3794 elf_link_adjust_relocs (abfd, elf_section_data (o)->rel_hdr2,
3795 elf_section_data (o)->rel_count2,
3e932841 3796 (elf_section_data (o)->rel_hashes
31367b81 3797 + elf_section_data (o)->rel_count));
252b5132
RH
3798
3799 /* Set the reloc_count field to 0 to prevent write_relocs from
3800 trying to swap the relocs out itself. */
3801 o->reloc_count = 0;
3802 }
3803
db6751f2
JJ
3804 if (dynamic && info->combreloc && dynobj != NULL)
3805 relativecount = elf_link_sort_relocs (abfd, info, &reldyn);
3806
252b5132
RH
3807 /* If we are linking against a dynamic object, or generating a
3808 shared library, finish up the dynamic linking information. */
3809 if (dynamic)
3810 {
3811 Elf_External_Dyn *dyncon, *dynconend;
3812
3813 /* Fix up .dynamic entries. */
3814 o = bfd_get_section_by_name (dynobj, ".dynamic");
3815 BFD_ASSERT (o != NULL);
3816
3817 dyncon = (Elf_External_Dyn *) o->contents;
3818 dynconend = (Elf_External_Dyn *) (o->contents + o->_raw_size);
3819 for (; dyncon < dynconend; dyncon++)
3820 {
3821 Elf_Internal_Dyn dyn;
3822 const char *name;
3823 unsigned int type;
3824
3825 elf_swap_dyn_in (dynobj, dyncon, &dyn);
3826
3827 switch (dyn.d_tag)
3828 {
3829 default:
3830 break;
db6751f2
JJ
3831 case DT_NULL:
3832 if (relativecount > 0 && dyncon + 1 < dynconend)
3833 {
3834 switch (elf_section_data (reldyn)->this_hdr.sh_type)
3835 {
3836 case SHT_REL: dyn.d_tag = DT_RELCOUNT; break;
3837 case SHT_RELA: dyn.d_tag = DT_RELACOUNT; break;
3838 default: break;
3839 }
3840 if (dyn.d_tag != DT_NULL)
3841 {
3842 dyn.d_un.d_val = relativecount;
3843 elf_swap_dyn_out (dynobj, &dyn, dyncon);
3844 relativecount = 0;
3845 }
3846 }
3847 break;
252b5132 3848 case DT_INIT:
f0c2e336 3849 name = info->init_function;
252b5132
RH
3850 goto get_sym;
3851 case DT_FINI:
f0c2e336 3852 name = info->fini_function;
252b5132
RH
3853 get_sym:
3854 {
3855 struct elf_link_hash_entry *h;
3856
3857 h = elf_link_hash_lookup (elf_hash_table (info), name,
b34976b6 3858 FALSE, FALSE, TRUE);
252b5132
RH
3859 if (h != NULL
3860 && (h->root.type == bfd_link_hash_defined
3861 || h->root.type == bfd_link_hash_defweak))
3862 {
3863 dyn.d_un.d_val = h->root.u.def.value;
3864 o = h->root.u.def.section;
3865 if (o->output_section != NULL)
3866 dyn.d_un.d_val += (o->output_section->vma
3867 + o->output_offset);
3868 else
3869 {
3870 /* The symbol is imported from another shared
3871 library and does not apply to this one. */
3872 dyn.d_un.d_val = 0;
3873 }
3874
3875 elf_swap_dyn_out (dynobj, &dyn, dyncon);
3876 }
3877 }
3878 break;
3879
30831527
RH
3880 case DT_PREINIT_ARRAYSZ:
3881 name = ".preinit_array";
3882 goto get_size;
3883 case DT_INIT_ARRAYSZ:
3884 name = ".init_array";
3885 goto get_size;
3886 case DT_FINI_ARRAYSZ:
3887 name = ".fini_array";
3888 get_size:
3889 o = bfd_get_section_by_name (abfd, name);
2cb69dd3
JL
3890 if (o == NULL)
3891 {
3892 (*_bfd_error_handler)
3893 (_("%s: could not find output section %s"),
3894 bfd_get_filename (abfd), name);
3895 goto error_return;
3896 }
25e27870
L
3897 if (o->_raw_size == 0)
3898 (*_bfd_error_handler)
3899 (_("warning: %s section has zero size"), name);
30831527
RH
3900 dyn.d_un.d_val = o->_raw_size;
3901 elf_swap_dyn_out (dynobj, &dyn, dyncon);
3902 break;
3903
3904 case DT_PREINIT_ARRAY:
3905 name = ".preinit_array";
3906 goto get_vma;
3907 case DT_INIT_ARRAY:
3908 name = ".init_array";
3909 goto get_vma;
3910 case DT_FINI_ARRAY:
3911 name = ".fini_array";
3912 goto get_vma;
3913
252b5132
RH
3914 case DT_HASH:
3915 name = ".hash";
3916 goto get_vma;
3917 case DT_STRTAB:
3918 name = ".dynstr";
3919 goto get_vma;
3920 case DT_SYMTAB:
3921 name = ".dynsym";
3922 goto get_vma;
3923 case DT_VERDEF:
3924 name = ".gnu.version_d";
3925 goto get_vma;
3926 case DT_VERNEED:
3927 name = ".gnu.version_r";
3928 goto get_vma;
3929 case DT_VERSYM:
3930 name = ".gnu.version";
3931 get_vma:
3932 o = bfd_get_section_by_name (abfd, name);
2cb69dd3
JL
3933 if (o == NULL)
3934 {
3935 (*_bfd_error_handler)
3936 (_("%s: could not find output section %s"),
3937 bfd_get_filename (abfd), name);
3938 goto error_return;
3939 }
252b5132
RH
3940 dyn.d_un.d_ptr = o->vma;
3941 elf_swap_dyn_out (dynobj, &dyn, dyncon);
3942 break;
3943
3944 case DT_REL:
3945 case DT_RELA:
3946 case DT_RELSZ:
3947 case DT_RELASZ:
3948 if (dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
3949 type = SHT_REL;
3950 else
3951 type = SHT_RELA;
3952 dyn.d_un.d_val = 0;
9ad5cbcf 3953 for (i = 1; i < elf_numsections (abfd); i++)
252b5132
RH
3954 {
3955 Elf_Internal_Shdr *hdr;
3956
3957 hdr = elf_elfsections (abfd)[i];
3958 if (hdr->sh_type == type
3959 && (hdr->sh_flags & SHF_ALLOC) != 0)
3960 {
3961 if (dyn.d_tag == DT_RELSZ || dyn.d_tag == DT_RELASZ)
3962 dyn.d_un.d_val += hdr->sh_size;
3963 else
3964 {
3965 if (dyn.d_un.d_val == 0
3966 || hdr->sh_addr < dyn.d_un.d_val)
3967 dyn.d_un.d_val = hdr->sh_addr;
3968 }
3969 }
3970 }
3971 elf_swap_dyn_out (dynobj, &dyn, dyncon);
3972 break;
3973 }
3974 }
3975 }
3976
3977 /* If we have created any dynamic sections, then output them. */
3978 if (dynobj != NULL)
3979 {
3980 if (! (*bed->elf_backend_finish_dynamic_sections) (abfd, info))
3981 goto error_return;
3982
3983 for (o = dynobj->sections; o != NULL; o = o->next)
3984 {
3985 if ((o->flags & SEC_HAS_CONTENTS) == 0
fc8c40a0
AM
3986 || o->_raw_size == 0
3987 || o->output_section == bfd_abs_section_ptr)
252b5132
RH
3988 continue;
3989 if ((o->flags & SEC_LINKER_CREATED) == 0)
3990 {
3991 /* At this point, we are only interested in sections
45d6a902 3992 created by _bfd_elf_link_create_dynamic_sections. */
252b5132
RH
3993 continue;
3994 }
3995 if ((elf_section_data (o->output_section)->this_hdr.sh_type
3996 != SHT_STRTAB)
3997 || strcmp (bfd_get_section_name (abfd, o), ".dynstr") != 0)
3998 {
3999 if (! bfd_set_section_contents (abfd, o->output_section,
dc810e39
AM
4000 o->contents,
4001 (file_ptr) o->output_offset,
252b5132
RH
4002 o->_raw_size))
4003 goto error_return;
4004 }
4005 else
4006 {
252b5132 4007 /* The contents of the .dynstr section are actually in a
c44233aa 4008 stringtab. */
252b5132
RH
4009 off = elf_section_data (o->output_section)->this_hdr.sh_offset;
4010 if (bfd_seek (abfd, off, SEEK_SET) != 0
2b0f7ef9
JJ
4011 || ! _bfd_elf_strtab_emit (abfd,
4012 elf_hash_table (info)->dynstr))
252b5132
RH
4013 goto error_return;
4014 }
4015 }
4016 }
4017
1049f94e 4018 if (info->relocatable)
1126897b 4019 {
b34976b6 4020 bfd_boolean failed = FALSE;
1126897b
AM
4021
4022 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
4023 if (failed)
4024 goto error_return;
4025 }
4026
252b5132
RH
4027 /* If we have optimized stabs strings, output them. */
4028 if (elf_hash_table (info)->stab_info != NULL)
4029 {
4030 if (! _bfd_write_stab_strings (abfd, &elf_hash_table (info)->stab_info))
4031 goto error_return;
4032 }
4033
126495ed 4034 if (info->eh_frame_hdr)
65765700 4035 {
126495ed
AM
4036 if (! _bfd_elf_write_section_eh_frame_hdr (abfd, info))
4037 goto error_return;
65765700
JJ
4038 }
4039
252b5132
RH
4040 if (finfo.symstrtab != NULL)
4041 _bfd_stringtab_free (finfo.symstrtab);
4042 if (finfo.contents != NULL)
4043 free (finfo.contents);
4044 if (finfo.external_relocs != NULL)
4045 free (finfo.external_relocs);
4046 if (finfo.internal_relocs != NULL)
4047 free (finfo.internal_relocs);
4048 if (finfo.external_syms != NULL)
4049 free (finfo.external_syms);
9ad5cbcf
AM
4050 if (finfo.locsym_shndx != NULL)
4051 free (finfo.locsym_shndx);
252b5132
RH
4052 if (finfo.internal_syms != NULL)
4053 free (finfo.internal_syms);
4054 if (finfo.indices != NULL)
4055 free (finfo.indices);
4056 if (finfo.sections != NULL)
4057 free (finfo.sections);
4058 if (finfo.symbuf != NULL)
4059 free (finfo.symbuf);
9ad5cbcf 4060 if (finfo.symshndxbuf != NULL)
c97e73dd 4061 free (finfo.symshndxbuf);
252b5132
RH
4062 for (o = abfd->sections; o != NULL; o = o->next)
4063 {
4064 if ((o->flags & SEC_RELOC) != 0
4065 && elf_section_data (o)->rel_hashes != NULL)
c44233aa 4066 free (elf_section_data (o)->rel_hashes);
252b5132
RH
4067 }
4068
b34976b6 4069 elf_tdata (abfd)->linker = TRUE;
252b5132 4070
b34976b6 4071 return TRUE;
252b5132
RH
4072
4073 error_return:
4074 if (finfo.symstrtab != NULL)
4075 _bfd_stringtab_free (finfo.symstrtab);
4076 if (finfo.contents != NULL)
4077 free (finfo.contents);
4078 if (finfo.external_relocs != NULL)
4079 free (finfo.external_relocs);
4080 if (finfo.internal_relocs != NULL)
4081 free (finfo.internal_relocs);
4082 if (finfo.external_syms != NULL)
4083 free (finfo.external_syms);
9ad5cbcf
AM
4084 if (finfo.locsym_shndx != NULL)
4085 free (finfo.locsym_shndx);
252b5132
RH
4086 if (finfo.internal_syms != NULL)
4087 free (finfo.internal_syms);
4088 if (finfo.indices != NULL)
4089 free (finfo.indices);
4090 if (finfo.sections != NULL)
4091 free (finfo.sections);
4092 if (finfo.symbuf != NULL)
4093 free (finfo.symbuf);
9ad5cbcf 4094 if (finfo.symshndxbuf != NULL)
c97e73dd 4095 free (finfo.symshndxbuf);
252b5132
RH
4096 for (o = abfd->sections; o != NULL; o = o->next)
4097 {
4098 if ((o->flags & SEC_RELOC) != 0
4099 && elf_section_data (o)->rel_hashes != NULL)
4100 free (elf_section_data (o)->rel_hashes);
4101 }
4102
b34976b6 4103 return FALSE;
252b5132
RH
4104}
4105
4106/* Add a symbol to the output symbol table. */
4107
b34976b6 4108static bfd_boolean
268b6b39
AM
4109elf_link_output_sym (struct elf_final_link_info *finfo,
4110 const char *name,
4111 Elf_Internal_Sym *elfsym,
4112 asection *input_sec)
252b5132 4113{
9ad5cbcf
AM
4114 Elf_External_Sym *dest;
4115 Elf_External_Sym_Shndx *destshndx;
b34976b6 4116 bfd_boolean (*output_symbol_hook)
268b6b39
AM
4117 (bfd *, struct bfd_link_info *info, const char *,
4118 Elf_Internal_Sym *, asection *);
252b5132
RH
4119
4120 output_symbol_hook = get_elf_backend_data (finfo->output_bfd)->
4121 elf_backend_link_output_symbol_hook;
4122 if (output_symbol_hook != NULL)
4123 {
4124 if (! ((*output_symbol_hook)
4125 (finfo->output_bfd, finfo->info, name, elfsym, input_sec)))
b34976b6 4126 return FALSE;
252b5132
RH
4127 }
4128
268b6b39 4129 if (name == NULL || *name == '\0')
252b5132
RH
4130 elfsym->st_name = 0;
4131 else if (input_sec->flags & SEC_EXCLUDE)
4132 elfsym->st_name = 0;
4133 else
4134 {
4135 elfsym->st_name = (unsigned long) _bfd_stringtab_add (finfo->symstrtab,
b34976b6 4136 name, TRUE, FALSE);
252b5132 4137 if (elfsym->st_name == (unsigned long) -1)
b34976b6 4138 return FALSE;
252b5132
RH
4139 }
4140
4141 if (finfo->symbuf_count >= finfo->symbuf_size)
4142 {
4143 if (! elf_link_flush_output_syms (finfo))
b34976b6 4144 return FALSE;
252b5132
RH
4145 }
4146
9ad5cbcf
AM
4147 dest = finfo->symbuf + finfo->symbuf_count;
4148 destshndx = finfo->symshndxbuf;
4149 if (destshndx != NULL)
c97e73dd
AM
4150 {
4151 if (bfd_get_symcount (finfo->output_bfd) >= finfo->shndxbuf_size)
4152 {
4153 bfd_size_type amt;
252b5132 4154
c97e73dd
AM
4155 amt = finfo->shndxbuf_size * sizeof (Elf_External_Sym_Shndx);
4156 finfo->symshndxbuf = destshndx = bfd_realloc (destshndx, amt * 2);
4157 if (destshndx == NULL)
b34976b6 4158 return FALSE;
c97e73dd
AM
4159 memset ((char *) destshndx + amt, 0, amt);
4160 finfo->shndxbuf_size *= 2;
4161 }
4162 destshndx += bfd_get_symcount (finfo->output_bfd);
4163 }
4164
268b6b39 4165 elf_swap_symbol_out (finfo->output_bfd, elfsym, dest, destshndx);
c97e73dd
AM
4166 finfo->symbuf_count += 1;
4167 bfd_get_symcount (finfo->output_bfd) += 1;
252b5132 4168
b34976b6 4169 return TRUE;
252b5132
RH
4170}
4171
4172/* Flush the output symbols to the file. */
4173
b34976b6 4174static bfd_boolean
268b6b39 4175elf_link_flush_output_syms (struct elf_final_link_info *finfo)
252b5132
RH
4176{
4177 if (finfo->symbuf_count > 0)
4178 {
9ad5cbcf 4179 Elf_Internal_Shdr *hdr;
dc810e39
AM
4180 file_ptr pos;
4181 bfd_size_type amt;
252b5132 4182
9ad5cbcf
AM
4183 hdr = &elf_tdata (finfo->output_bfd)->symtab_hdr;
4184 pos = hdr->sh_offset + hdr->sh_size;
dc810e39
AM
4185 amt = finfo->symbuf_count * sizeof (Elf_External_Sym);
4186 if (bfd_seek (finfo->output_bfd, pos, SEEK_SET) != 0
268b6b39 4187 || bfd_bwrite (finfo->symbuf, amt, finfo->output_bfd) != amt)
b34976b6 4188 return FALSE;
252b5132 4189
9ad5cbcf 4190 hdr->sh_size += amt;
252b5132
RH
4191 finfo->symbuf_count = 0;
4192 }
4193
b34976b6 4194 return TRUE;
252b5132
RH
4195}
4196
f5d44ba0
AM
4197/* For DSOs loaded in via a DT_NEEDED entry, emulate ld.so in
4198 allowing an unsatisfied unversioned symbol in the DSO to match a
71552942
L
4199 versioned symbol that would normally require an explicit version.
4200 We also handle the case that a DSO references a hidden symbol
4201 which may be satisfied by a versioned symbol in another DSO. */
f5d44ba0 4202
b34976b6 4203static bfd_boolean
268b6b39
AM
4204elf_link_check_versioned_symbol (struct bfd_link_info *info,
4205 struct elf_link_hash_entry *h)
f5d44ba0 4206{
71552942 4207 bfd *abfd;
f5d44ba0 4208 struct elf_link_loaded_list *loaded;
f5d44ba0 4209
71552942 4210 if (info->hash->creator->flavour != bfd_target_elf_flavour)
b34976b6 4211 return FALSE;
f5d44ba0 4212
71552942
L
4213 switch (h->root.type)
4214 {
4215 default:
4216 abfd = NULL;
4217 break;
4218
4219 case bfd_link_hash_undefined:
4220 case bfd_link_hash_undefweak:
4221 abfd = h->root.u.undef.abfd;
4222 if ((abfd->flags & DYNAMIC) == 0 || elf_dt_soname (abfd) == NULL)
4223 return FALSE;
4224 break;
4225
4226 case bfd_link_hash_defined:
4227 case bfd_link_hash_defweak:
4228 abfd = h->root.u.def.section->owner;
4229 break;
4230
4231 case bfd_link_hash_common:
4232 abfd = h->root.u.c.p->section->owner;
4233 break;
4234 }
4235 BFD_ASSERT (abfd != NULL);
4236
f5d44ba0
AM
4237 for (loaded = elf_hash_table (info)->loaded;
4238 loaded != NULL;
4239 loaded = loaded->next)
4240 {
4241 bfd *input;
4242 Elf_Internal_Shdr *hdr;
4243 bfd_size_type symcount;
4244 bfd_size_type extsymcount;
4245 bfd_size_type extsymoff;
4246 Elf_Internal_Shdr *versymhdr;
6cdc0ccc
AM
4247 Elf_Internal_Sym *isym;
4248 Elf_Internal_Sym *isymend;
4249 Elf_Internal_Sym *isymbuf;
f5d44ba0 4250 Elf_External_Versym *ever;
6cdc0ccc 4251 Elf_External_Versym *extversym;
f5d44ba0
AM
4252
4253 input = loaded->abfd;
4254
4255 /* We check each DSO for a possible hidden versioned definition. */
71552942 4256 if (input == abfd
f5d44ba0
AM
4257 || (input->flags & DYNAMIC) == 0
4258 || elf_dynversym (input) == 0)
4259 continue;
4260
4261 hdr = &elf_tdata (input)->dynsymtab_hdr;
4262
4263 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
4264 if (elf_bad_symtab (input))
4265 {
4266 extsymcount = symcount;
4267 extsymoff = 0;
4268 }
4269 else
4270 {
4271 extsymcount = symcount - hdr->sh_info;
4272 extsymoff = hdr->sh_info;
4273 }
4274
4275 if (extsymcount == 0)
4276 continue;
4277
6cdc0ccc
AM
4278 isymbuf = bfd_elf_get_elf_syms (input, hdr, extsymcount, extsymoff,
4279 NULL, NULL, NULL);
4280 if (isymbuf == NULL)
b34976b6 4281 return FALSE;
f5d44ba0 4282
f5d44ba0
AM
4283 /* Read in any version definitions. */
4284 versymhdr = &elf_tdata (input)->dynversym_hdr;
268b6b39 4285 extversym = bfd_malloc (versymhdr->sh_size);
f5d44ba0
AM
4286 if (extversym == NULL)
4287 goto error_ret;
4288
4289 if (bfd_seek (input, versymhdr->sh_offset, SEEK_SET) != 0
268b6b39 4290 || (bfd_bread (extversym, versymhdr->sh_size, input)
f5d44ba0
AM
4291 != versymhdr->sh_size))
4292 {
4293 free (extversym);
4294 error_ret:
6cdc0ccc 4295 free (isymbuf);
b34976b6 4296 return FALSE;
f5d44ba0
AM
4297 }
4298
4299 ever = extversym + extsymoff;
6cdc0ccc
AM
4300 isymend = isymbuf + extsymcount;
4301 for (isym = isymbuf; isym < isymend; isym++, ever++)
f5d44ba0
AM
4302 {
4303 const char *name;
f5d44ba0 4304 Elf_Internal_Versym iver;
a15d9d3a 4305 unsigned short version_index;
f5d44ba0 4306
6cdc0ccc
AM
4307 if (ELF_ST_BIND (isym->st_info) == STB_LOCAL
4308 || isym->st_shndx == SHN_UNDEF)
f5d44ba0
AM
4309 continue;
4310
4311 name = bfd_elf_string_from_elf_section (input,
4312 hdr->sh_link,
6cdc0ccc 4313 isym->st_name);
f5d44ba0
AM
4314 if (strcmp (name, h->root.root.string) != 0)
4315 continue;
4316
4317 _bfd_elf_swap_versym_in (input, ever, &iver);
4318
4319 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
4320 {
4321 /* If we have a non-hidden versioned sym, then it should
4322 have provided a definition for the undefined sym. */
4323 abort ();
4324 }
4325
a15d9d3a
L
4326 version_index = iver.vs_vers & VERSYM_VERSION;
4327 if (version_index == 1 || version_index == 2)
f5d44ba0 4328 {
a15d9d3a 4329 /* This is the base or first version. We can use it. */
f5d44ba0 4330 free (extversym);
6cdc0ccc 4331 free (isymbuf);
b34976b6 4332 return TRUE;
f5d44ba0
AM
4333 }
4334 }
4335
4336 free (extversym);
6cdc0ccc 4337 free (isymbuf);
f5d44ba0
AM
4338 }
4339
b34976b6 4340 return FALSE;
f5d44ba0
AM
4341}
4342
252b5132
RH
4343/* Add an external symbol to the symbol table. This is called from
4344 the hash table traversal routine. When generating a shared object,
4345 we go through the symbol table twice. The first time we output
4346 anything that might have been forced to local scope in a version
4347 script. The second time we output the symbols that are still
4348 global symbols. */
4349
b34976b6 4350static bfd_boolean
268b6b39 4351elf_link_output_extsym (struct elf_link_hash_entry *h, void *data)
252b5132 4352{
268b6b39 4353 struct elf_outext_info *eoinfo = data;
252b5132 4354 struct elf_final_link_info *finfo = eoinfo->finfo;
b34976b6 4355 bfd_boolean strip;
252b5132
RH
4356 Elf_Internal_Sym sym;
4357 asection *input_sec;
4358
e92d460e
AM
4359 if (h->root.type == bfd_link_hash_warning)
4360 {
4361 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4362 if (h->root.type == bfd_link_hash_new)
b34976b6 4363 return TRUE;
e92d460e
AM
4364 }
4365
252b5132
RH
4366 /* Decide whether to output this symbol in this pass. */
4367 if (eoinfo->localsyms)
4368 {
4369 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
b34976b6 4370 return TRUE;
252b5132
RH
4371 }
4372 else
4373 {
4374 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
b34976b6 4375 return TRUE;
252b5132
RH
4376 }
4377
560e09e9
NC
4378 /* If we have an undefined symbol reference here then it must have
4379 come from a shared library that is being linked in. (Undefined
4380 references in regular files have already been handled). If we
4381 are reporting errors for this situation then do so now. */
4382 if (h->root.type == bfd_link_hash_undefined
252b5132 4383 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0
f5d44ba0 4384 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0
560e09e9
NC
4385 && ! elf_link_check_versioned_symbol (finfo->info, h)
4386 && finfo->info->unresolved_syms_in_shared_libs != RM_IGNORE)
252b5132
RH
4387 {
4388 if (! ((*finfo->info->callbacks->undefined_symbol)
4389 (finfo->info, h->root.root.string, h->root.u.undef.abfd,
560e09e9 4390 NULL, 0, finfo->info->unresolved_syms_in_shared_libs == RM_GENERATE_ERROR)))
252b5132 4391 {
b34976b6
AM
4392 eoinfo->failed = TRUE;
4393 return FALSE;
252b5132
RH
4394 }
4395 }
4396
1b1fe8fe
L
4397 /* We should also warn if a forced local symbol is referenced from
4398 shared libraries. */
1049f94e 4399 if (! finfo->info->relocatable
560e09e9 4400 && (! finfo->info->shared)
1b1fe8fe 4401 && (h->elf_link_hash_flags
560e09e9 4402 & (ELF_LINK_FORCED_LOCAL | ELF_LINK_HASH_REF_DYNAMIC | ELF_LINK_DYNAMIC_DEF | ELF_LINK_DYNAMIC_WEAK))
71552942
L
4403 == (ELF_LINK_FORCED_LOCAL | ELF_LINK_HASH_REF_DYNAMIC)
4404 && ! elf_link_check_versioned_symbol (finfo->info, h))
1b1fe8fe
L
4405 {
4406 (*_bfd_error_handler)
4407 (_("%s: %s symbol `%s' in %s is referenced by DSO"),
4408 bfd_get_filename (finfo->output_bfd),
4409 ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
4410 ? "internal"
4411 : ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
4412 ? "hidden" : "local",
4413 h->root.root.string,
4414 bfd_archive_filename (h->root.u.def.section->owner));
4415 eoinfo->failed = TRUE;
4416 return FALSE;
4417 }
4418
252b5132
RH
4419 /* We don't want to output symbols that have never been mentioned by
4420 a regular file, or that we have been told to strip. However, if
4421 h->indx is set to -2, the symbol is used by a reloc and we must
4422 output it. */
4423 if (h->indx == -2)
b34976b6 4424 strip = FALSE;
252b5132
RH
4425 else if (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4426 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0)
4427 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
4428 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0)
b34976b6 4429 strip = TRUE;
75828352
AM
4430 else if (finfo->info->strip == strip_all)
4431 strip = TRUE;
4432 else if (finfo->info->strip == strip_some
4433 && bfd_hash_lookup (finfo->info->keep_hash,
4434 h->root.root.string, FALSE, FALSE) == NULL)
4435 strip = TRUE;
4436 else if (finfo->info->strip_discarded
4437 && (h->root.type == bfd_link_hash_defined
4438 || h->root.type == bfd_link_hash_defweak)
4439 && elf_discarded_section (h->root.u.def.section))
b34976b6 4440 strip = TRUE;
252b5132 4441 else
b34976b6 4442 strip = FALSE;
252b5132
RH
4443
4444 /* If we're stripping it, and it's not a dynamic symbol, there's
2bd171e0
ILT
4445 nothing else to do unless it is a forced local symbol. */
4446 if (strip
4447 && h->dynindx == -1
4448 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
b34976b6 4449 return TRUE;
252b5132
RH
4450
4451 sym.st_value = 0;
4452 sym.st_size = h->size;
4453 sym.st_other = h->other;
4454 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
4455 sym.st_info = ELF_ST_INFO (STB_LOCAL, h->type);
4456 else if (h->root.type == bfd_link_hash_undefweak
4457 || h->root.type == bfd_link_hash_defweak)
4458 sym.st_info = ELF_ST_INFO (STB_WEAK, h->type);
4459 else
4460 sym.st_info = ELF_ST_INFO (STB_GLOBAL, h->type);
4461
4462 switch (h->root.type)
4463 {
4464 default:
4465 case bfd_link_hash_new:
e92d460e 4466 case bfd_link_hash_warning:
252b5132 4467 abort ();
b34976b6 4468 return FALSE;
252b5132
RH
4469
4470 case bfd_link_hash_undefined:
252b5132
RH
4471 case bfd_link_hash_undefweak:
4472 input_sec = bfd_und_section_ptr;
4473 sym.st_shndx = SHN_UNDEF;
4474 break;
4475
4476 case bfd_link_hash_defined:
4477 case bfd_link_hash_defweak:
4478 {
4479 input_sec = h->root.u.def.section;
4480 if (input_sec->output_section != NULL)
4481 {
4482 sym.st_shndx =
4483 _bfd_elf_section_from_bfd_section (finfo->output_bfd,
4484 input_sec->output_section);
9ad5cbcf 4485 if (sym.st_shndx == SHN_BAD)
252b5132
RH
4486 {
4487 (*_bfd_error_handler)
4488 (_("%s: could not find output section %s for input section %s"),
4489 bfd_get_filename (finfo->output_bfd),
4490 input_sec->output_section->name,
4491 input_sec->name);
b34976b6
AM
4492 eoinfo->failed = TRUE;
4493 return FALSE;
252b5132
RH
4494 }
4495
1049f94e
AM
4496 /* ELF symbols in relocatable files are section relative,
4497 but in nonrelocatable files they are virtual
252b5132
RH
4498 addresses. */
4499 sym.st_value = h->root.u.def.value + input_sec->output_offset;
1049f94e 4500 if (! finfo->info->relocatable)
13ae64f3
JJ
4501 {
4502 sym.st_value += input_sec->output_section->vma;
4503 if (h->type == STT_TLS)
4504 {
4505 /* STT_TLS symbols are relative to PT_TLS segment
4506 base. */
4507 BFD_ASSERT (finfo->first_tls_sec != NULL);
4508 sym.st_value -= finfo->first_tls_sec->vma;
4509 }
4510 }
252b5132
RH
4511 }
4512 else
4513 {
4514 BFD_ASSERT (input_sec->owner == NULL
4515 || (input_sec->owner->flags & DYNAMIC) != 0);
4516 sym.st_shndx = SHN_UNDEF;
4517 input_sec = bfd_und_section_ptr;
4518 }
4519 }
4520 break;
4521
4522 case bfd_link_hash_common:
4523 input_sec = h->root.u.c.p->section;
4524 sym.st_shndx = SHN_COMMON;
4525 sym.st_value = 1 << h->root.u.c.p->alignment_power;
4526 break;
4527
4528 case bfd_link_hash_indirect:
4529 /* These symbols are created by symbol versioning. They point
c44233aa
AM
4530 to the decorated version of the name. For example, if the
4531 symbol foo@@GNU_1.2 is the default, which should be used when
4532 foo is used with no version, then we add an indirect symbol
4533 foo which points to foo@@GNU_1.2. We ignore these symbols,
4534 since the indirected symbol is already in the hash table. */
b34976b6 4535 return TRUE;
252b5132
RH
4536 }
4537
4538 /* Give the processor backend a chance to tweak the symbol value,
4539 and also to finish up anything that needs to be done for this
c44233aa
AM
4540 symbol. FIXME: Not calling elf_backend_finish_dynamic_symbol for
4541 forced local syms when non-shared is due to a historical quirk. */
252b5132
RH
4542 if ((h->dynindx != -1
4543 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
ef5aade5
L
4544 && ((finfo->info->shared
4545 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
4546 || h->root.type != bfd_link_hash_undefweak))
c44233aa 4547 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
252b5132
RH
4548 && elf_hash_table (finfo->info)->dynamic_sections_created)
4549 {
9c5bfbb7 4550 const struct elf_backend_data *bed;
252b5132
RH
4551
4552 bed = get_elf_backend_data (finfo->output_bfd);
4553 if (! ((*bed->elf_backend_finish_dynamic_symbol)
4554 (finfo->output_bfd, finfo->info, h, &sym)))
4555 {
b34976b6
AM
4556 eoinfo->failed = TRUE;
4557 return FALSE;
252b5132
RH
4558 }
4559 }
4560
4561 /* If we are marking the symbol as undefined, and there are no
4562 non-weak references to this symbol from a regular object, then
91d3970e
ILT
4563 mark the symbol as weak undefined; if there are non-weak
4564 references, mark the symbol as strong. We can't do this earlier,
252b5132
RH
4565 because it might not be marked as undefined until the
4566 finish_dynamic_symbol routine gets through with it. */
4567 if (sym.st_shndx == SHN_UNDEF
252b5132 4568 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
a7b97311
AM
4569 && (ELF_ST_BIND (sym.st_info) == STB_GLOBAL
4570 || ELF_ST_BIND (sym.st_info) == STB_WEAK))
91d3970e
ILT
4571 {
4572 int bindtype;
4573
4574 if ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR_NONWEAK) != 0)
4575 bindtype = STB_GLOBAL;
4576 else
4577 bindtype = STB_WEAK;
4578 sym.st_info = ELF_ST_INFO (bindtype, ELF_ST_TYPE (sym.st_info));
4579 }
252b5132 4580
1b1fe8fe
L
4581 /* If a non-weak symbol with non-default visibility is not defined
4582 locally, it is a fatal error. */
1049f94e 4583 if (! finfo->info->relocatable
9c7a29a3 4584 && ELF_ST_VISIBILITY (sym.st_other) != STV_DEFAULT
1b1fe8fe 4585 && ELF_ST_BIND (sym.st_info) != STB_WEAK
22d5e339 4586 && h->root.type == bfd_link_hash_undefined
2cd533b7 4587 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1b1fe8fe
L
4588 {
4589 (*_bfd_error_handler)
4590 (_("%s: %s symbol `%s' isn't defined"),
4591 bfd_get_filename (finfo->output_bfd),
4592 ELF_ST_VISIBILITY (sym.st_other) == STV_PROTECTED
4593 ? "protected"
4594 : ELF_ST_VISIBILITY (sym.st_other) == STV_INTERNAL
4595 ? "internal" : "hidden",
4596 h->root.root.string);
4597 eoinfo->failed = TRUE;
4598 return FALSE;
4599 }
32c092c3 4600
252b5132 4601 /* If this symbol should be put in the .dynsym section, then put it
f5d44ba0
AM
4602 there now. We already know the symbol index. We also fill in
4603 the entry in the .hash section. */
252b5132
RH
4604 if (h->dynindx != -1
4605 && elf_hash_table (finfo->info)->dynamic_sections_created)
4606 {
4607 size_t bucketcount;
4608 size_t bucket;
c7ac6ff8 4609 size_t hash_entry_size;
252b5132
RH
4610 bfd_byte *bucketpos;
4611 bfd_vma chain;
dc810e39 4612 Elf_External_Sym *esym;
252b5132
RH
4613
4614 sym.st_name = h->dynstr_index;
dc810e39 4615 esym = (Elf_External_Sym *) finfo->dynsym_sec->contents + h->dynindx;
268b6b39 4616 elf_swap_symbol_out (finfo->output_bfd, &sym, esym, 0);
252b5132
RH
4617
4618 bucketcount = elf_hash_table (finfo->info)->bucketcount;
4619 bucket = h->elf_hash_value % bucketcount;
3e932841 4620 hash_entry_size
c7ac6ff8 4621 = elf_section_data (finfo->hash_sec)->this_hdr.sh_entsize;
252b5132 4622 bucketpos = ((bfd_byte *) finfo->hash_sec->contents
c7ac6ff8
MM
4623 + (bucket + 2) * hash_entry_size);
4624 chain = bfd_get (8 * hash_entry_size, finfo->output_bfd, bucketpos);
268b6b39 4625 bfd_put (8 * hash_entry_size, finfo->output_bfd, h->dynindx, bucketpos);
c7ac6ff8
MM
4626 bfd_put (8 * hash_entry_size, finfo->output_bfd, chain,
4627 ((bfd_byte *) finfo->hash_sec->contents
4628 + (bucketcount + 2 + h->dynindx) * hash_entry_size));
252b5132
RH
4629
4630 if (finfo->symver_sec != NULL && finfo->symver_sec->contents != NULL)
4631 {
4632 Elf_Internal_Versym iversym;
dc810e39 4633 Elf_External_Versym *eversym;
252b5132
RH
4634
4635 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4636 {
4637 if (h->verinfo.verdef == NULL)
4638 iversym.vs_vers = 0;
4639 else
4640 iversym.vs_vers = h->verinfo.verdef->vd_exp_refno + 1;
4641 }
4642 else
4643 {
4644 if (h->verinfo.vertree == NULL)
4645 iversym.vs_vers = 1;
4646 else
4647 iversym.vs_vers = h->verinfo.vertree->vernum + 1;
4648 }
4649
4650 if ((h->elf_link_hash_flags & ELF_LINK_HIDDEN) != 0)
4651 iversym.vs_vers |= VERSYM_HIDDEN;
4652
dc810e39
AM
4653 eversym = (Elf_External_Versym *) finfo->symver_sec->contents;
4654 eversym += h->dynindx;
4655 _bfd_elf_swap_versym_out (finfo->output_bfd, &iversym, eversym);
252b5132
RH
4656 }
4657 }
4658
4659 /* If we're stripping it, then it was just a dynamic symbol, and
4660 there's nothing else to do. */
7330fb86 4661 if (strip || (input_sec->flags & SEC_EXCLUDE) != 0)
b34976b6 4662 return TRUE;
252b5132
RH
4663
4664 h->indx = bfd_get_symcount (finfo->output_bfd);
4665
4666 if (! elf_link_output_sym (finfo, h->root.root.string, &sym, input_sec))
4667 {
b34976b6
AM
4668 eoinfo->failed = TRUE;
4669 return FALSE;
252b5132
RH
4670 }
4671
b34976b6 4672 return TRUE;
252b5132
RH
4673}
4674
4675/* Link an input file into the linker output file. This function
4676 handles all the sections and relocations of the input file at once.
4677 This is so that we only have to read the local symbols once, and
4678 don't have to keep them in memory. */
4679
b34976b6 4680static bfd_boolean
268b6b39 4681elf_link_input_bfd (struct elf_final_link_info *finfo, bfd *input_bfd)
252b5132 4682{
b34976b6 4683 bfd_boolean (*relocate_section)
268b6b39
AM
4684 (bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
4685 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **);
252b5132
RH
4686 bfd *output_bfd;
4687 Elf_Internal_Shdr *symtab_hdr;
4688 size_t locsymcount;
4689 size_t extsymoff;
6cdc0ccc 4690 Elf_Internal_Sym *isymbuf;
252b5132 4691 Elf_Internal_Sym *isym;
6cdc0ccc 4692 Elf_Internal_Sym *isymend;
252b5132
RH
4693 long *pindex;
4694 asection **ppsection;
4695 asection *o;
9c5bfbb7 4696 const struct elf_backend_data *bed;
b34976b6 4697 bfd_boolean emit_relocs;
f8deed93 4698 struct elf_link_hash_entry **sym_hashes;
252b5132
RH
4699
4700 output_bfd = finfo->output_bfd;
c7ac6ff8
MM
4701 bed = get_elf_backend_data (output_bfd);
4702 relocate_section = bed->elf_backend_relocate_section;
252b5132
RH
4703
4704 /* If this is a dynamic object, we don't want to do anything here:
4705 we don't want the local symbols, and we don't want the section
4706 contents. */
4707 if ((input_bfd->flags & DYNAMIC) != 0)
b34976b6 4708 return TRUE;
252b5132 4709
1049f94e 4710 emit_relocs = (finfo->info->relocatable
c44233aa
AM
4711 || finfo->info->emitrelocations
4712 || bed->elf_backend_emit_relocs);
9317eacc 4713
252b5132
RH
4714 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
4715 if (elf_bad_symtab (input_bfd))
4716 {
4717 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
4718 extsymoff = 0;
4719 }
4720 else
4721 {
4722 locsymcount = symtab_hdr->sh_info;
4723 extsymoff = symtab_hdr->sh_info;
4724 }
4725
4726 /* Read the local symbols. */
6cdc0ccc
AM
4727 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
4728 if (isymbuf == NULL && locsymcount != 0)
4729 {
4730 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, locsymcount, 0,
4731 finfo->internal_syms,
4732 finfo->external_syms,
4733 finfo->locsym_shndx);
4734 if (isymbuf == NULL)
b34976b6 4735 return FALSE;
252b5132
RH
4736 }
4737
6cdc0ccc
AM
4738 /* Find local symbol sections and adjust values of symbols in
4739 SEC_MERGE sections. Write out those local symbols we know are
4740 going into the output file. */
4741 isymend = isymbuf + locsymcount;
4742 for (isym = isymbuf, pindex = finfo->indices, ppsection = finfo->sections;
4743 isym < isymend;
4744 isym++, pindex++, ppsection++)
252b5132
RH
4745 {
4746 asection *isec;
4747 const char *name;
4748 Elf_Internal_Sym osym;
4749
252b5132
RH
4750 *pindex = -1;
4751
4752 if (elf_bad_symtab (input_bfd))
4753 {
4754 if (ELF_ST_BIND (isym->st_info) != STB_LOCAL)
4755 {
4756 *ppsection = NULL;
4757 continue;
4758 }
4759 }
4760
4761 if (isym->st_shndx == SHN_UNDEF)
862517b6 4762 isec = bfd_und_section_ptr;
9ad5cbcf
AM
4763 else if (isym->st_shndx < SHN_LORESERVE
4764 || isym->st_shndx > SHN_HIRESERVE)
f5fa8ca2
JJ
4765 {
4766 isec = section_from_elf_index (input_bfd, isym->st_shndx);
65765700 4767 if (isec
68bfbfcc 4768 && isec->sec_info_type == ELF_INFO_TYPE_MERGE
f5fa8ca2
JJ
4769 && ELF_ST_TYPE (isym->st_info) != STT_SECTION)
4770 isym->st_value =
4771 _bfd_merged_section_offset (output_bfd, &isec,
65765700 4772 elf_section_data (isec)->sec_info,
268b6b39 4773 isym->st_value, 0);
f5fa8ca2 4774 }
252b5132 4775 else if (isym->st_shndx == SHN_ABS)
862517b6 4776 isec = bfd_abs_section_ptr;
252b5132 4777 else if (isym->st_shndx == SHN_COMMON)
862517b6 4778 isec = bfd_com_section_ptr;
252b5132
RH
4779 else
4780 {
4781 /* Who knows? */
4782 isec = NULL;
4783 }
4784
4785 *ppsection = isec;
4786
4787 /* Don't output the first, undefined, symbol. */
6cdc0ccc 4788 if (ppsection == finfo->sections)
252b5132
RH
4789 continue;
4790
24376d1b
AM
4791 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
4792 {
24376d1b
AM
4793 /* We never output section symbols. Instead, we use the
4794 section symbol of the corresponding section in the output
4795 file. */
4796 continue;
4797 }
4798
252b5132
RH
4799 /* If we are stripping all symbols, we don't want to output this
4800 one. */
4801 if (finfo->info->strip == strip_all)
4802 continue;
4803
252b5132 4804 /* If we are discarding all local symbols, we don't want to
1049f94e 4805 output this one. If we are generating a relocatable output
252b5132
RH
4806 file, then some of the local symbols may be required by
4807 relocs; we output them below as we discover that they are
4808 needed. */
4809 if (finfo->info->discard == discard_all)
4810 continue;
4811
4812 /* If this symbol is defined in a section which we are
c44233aa
AM
4813 discarding, we don't need to keep it, but note that
4814 linker_mark is only reliable for sections that have contents.
4815 For the benefit of the MIPS ELF linker, we check SEC_EXCLUDE
4816 as well as linker_mark. */
9ad5cbcf 4817 if ((isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
252b5132
RH
4818 && isec != NULL
4819 && ((! isec->linker_mark && (isec->flags & SEC_HAS_CONTENTS) != 0)
1049f94e 4820 || (! finfo->info->relocatable
252b5132
RH
4821 && (isec->flags & SEC_EXCLUDE) != 0)))
4822 continue;
4823
4824 /* Get the name of the symbol. */
4825 name = bfd_elf_string_from_elf_section (input_bfd, symtab_hdr->sh_link,
4826 isym->st_name);
4827 if (name == NULL)
b34976b6 4828 return FALSE;
252b5132
RH
4829
4830 /* See if we are discarding symbols with this name. */
4831 if ((finfo->info->strip == strip_some
b34976b6 4832 && (bfd_hash_lookup (finfo->info->keep_hash, name, FALSE, FALSE)
252b5132 4833 == NULL))
f5fa8ca2 4834 || (((finfo->info->discard == discard_sec_merge
1049f94e 4835 && (isec->flags & SEC_MERGE) && ! finfo->info->relocatable)
f5fa8ca2 4836 || finfo->info->discard == discard_l)
252b5132
RH
4837 && bfd_is_local_label_name (input_bfd, name)))
4838 continue;
4839
4840 /* If we get here, we are going to output this symbol. */
4841
4842 osym = *isym;
4843
4844 /* Adjust the section index for the output file. */
4845 osym.st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
4846 isec->output_section);
9ad5cbcf 4847 if (osym.st_shndx == SHN_BAD)
b34976b6 4848 return FALSE;
252b5132
RH
4849
4850 *pindex = bfd_get_symcount (output_bfd);
4851
1049f94e 4852 /* ELF symbols in relocatable files are section relative, but
252b5132
RH
4853 in executable files they are virtual addresses. Note that
4854 this code assumes that all ELF sections have an associated
4855 BFD section with a reasonable value for output_offset; below
4856 we assume that they also have a reasonable value for
4857 output_section. Any special sections must be set up to meet
4858 these requirements. */
4859 osym.st_value += isec->output_offset;
1049f94e 4860 if (! finfo->info->relocatable)
13ae64f3
JJ
4861 {
4862 osym.st_value += isec->output_section->vma;
4863 if (ELF_ST_TYPE (osym.st_info) == STT_TLS)
4864 {
4865 /* STT_TLS symbols are relative to PT_TLS segment base. */
4866 BFD_ASSERT (finfo->first_tls_sec != NULL);
4867 osym.st_value -= finfo->first_tls_sec->vma;
4868 }
4869 }
252b5132
RH
4870
4871 if (! elf_link_output_sym (finfo, name, &osym, isec))
b34976b6 4872 return FALSE;
252b5132
RH
4873 }
4874
4875 /* Relocate the contents of each section. */
f8deed93 4876 sym_hashes = elf_sym_hashes (input_bfd);
252b5132
RH
4877 for (o = input_bfd->sections; o != NULL; o = o->next)
4878 {
4879 bfd_byte *contents;
4880
4881 if (! o->linker_mark)
4882 {
4883 /* This section was omitted from the link. */
4884 continue;
4885 }
4886
4887 if ((o->flags & SEC_HAS_CONTENTS) == 0
4888 || (o->_raw_size == 0 && (o->flags & SEC_RELOC) == 0))
4889 continue;
4890
4891 if ((o->flags & SEC_LINKER_CREATED) != 0)
4892 {
45d6a902 4893 /* Section was created by _bfd_elf_link_create_dynamic_sections
252b5132
RH
4894 or somesuch. */
4895 continue;
4896 }
4897
4898 /* Get the contents of the section. They have been cached by a
c44233aa
AM
4899 relaxation routine. Note that o is a section in an input
4900 file, so the contents field will not have been set by any of
4901 the routines which work on output files. */
252b5132
RH
4902 if (elf_section_data (o)->this_hdr.contents != NULL)
4903 contents = elf_section_data (o)->this_hdr.contents;
4904 else
4905 {
4906 contents = finfo->contents;
268b6b39
AM
4907 if (! bfd_get_section_contents (input_bfd, o, contents, 0,
4908 o->_raw_size))
b34976b6 4909 return FALSE;
252b5132
RH
4910 }
4911
4912 if ((o->flags & SEC_RELOC) != 0)
4913 {
4914 Elf_Internal_Rela *internal_relocs;
4915
4916 /* Get the swapped relocs. */
45d6a902
AM
4917 internal_relocs
4918 = _bfd_elf_link_read_relocs (input_bfd, o, finfo->external_relocs,
4919 finfo->internal_relocs, FALSE);
252b5132
RH
4920 if (internal_relocs == NULL
4921 && o->reloc_count > 0)
b34976b6 4922 return FALSE;
252b5132 4923
ec338859
AM
4924 /* Run through the relocs looking for any against symbols
4925 from discarded sections and section symbols from
4926 removed link-once sections. Complain about relocs
4927 against discarded sections. Zero relocs against removed
f97b9cb8
L
4928 link-once sections. Preserve debug information as much
4929 as we can. */
4930 if (!elf_section_ignore_discarded_relocs (o))
ec338859
AM
4931 {
4932 Elf_Internal_Rela *rel, *relend;
50b4d486 4933
ec338859
AM
4934 rel = internal_relocs;
4935 relend = rel + o->reloc_count * bed->s->int_rels_per_ext_rel;
4936 for ( ; rel < relend; rel++)
4937 {
4938 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
f97b9cb8 4939 asection *sec;
ec338859
AM
4940
4941 if (r_symndx >= locsymcount
4942 || (elf_bad_symtab (input_bfd)
4943 && finfo->sections[r_symndx] == NULL))
4944 {
4945 struct elf_link_hash_entry *h;
4946
4947 h = sym_hashes[r_symndx - extsymoff];
4948 while (h->root.type == bfd_link_hash_indirect
4949 || h->root.type == bfd_link_hash_warning)
4950 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4951
4952 /* Complain if the definition comes from a
4953 discarded section. */
f97b9cb8 4954 sec = h->root.u.def.section;
ec338859
AM
4955 if ((h->root.type == bfd_link_hash_defined
4956 || h->root.type == bfd_link_hash_defweak)
f97b9cb8 4957 && elf_discarded_section (sec))
ec338859 4958 {
ec338859
AM
4959 if ((o->flags & SEC_DEBUGGING) != 0)
4960 {
45e9217a 4961 BFD_ASSERT (r_symndx != 0);
f97b9cb8
L
4962 /* Try to preserve debug information. */
4963 if ((o->flags & SEC_DEBUGGING) != 0
4964 && sec->kept_section != NULL
6e35c4da 4965 && sec->_raw_size == sec->kept_section->_raw_size)
f97b9cb8
L
4966 h->root.u.def.section
4967 = sec->kept_section;
4968 else
4969 memset (rel, 0, sizeof (*rel));
ec338859
AM
4970 }
4971 else
6f6f27f8
L
4972 finfo->info->callbacks->error_handler
4973 (LD_DEFINITION_IN_DISCARDED_SECTION,
4974 _("%T: discarded in section `%s' from %s\n"),
4975 h->root.root.string,
4976 h->root.root.string,
4977 h->root.u.def.section->name,
4978 bfd_archive_filename (h->root.u.def.section->owner));
ec338859
AM
4979 }
4980 }
4981 else
4982 {
f97b9cb8 4983 sec = finfo->sections[r_symndx];
50b4d486 4984
ed4de5e2 4985 if (sec != NULL && elf_discarded_section (sec))
f9f32305 4986 {
ad43ed4c
L
4987 if ((o->flags & SEC_DEBUGGING) != 0
4988 || (sec->flags & SEC_LINK_ONCE) != 0)
f9f32305 4989 {
45e9217a 4990 BFD_ASSERT (r_symndx != 0);
f97b9cb8
L
4991 /* Try to preserve debug information. */
4992 if ((o->flags & SEC_DEBUGGING) != 0
4993 && sec->kept_section != NULL
6e35c4da 4994 && sec->_raw_size == sec->kept_section->_raw_size)
f97b9cb8
L
4995 finfo->sections[r_symndx]
4996 = sec->kept_section;
4997 else
4998 {
4999 rel->r_info
5000 = ELF_R_INFO (0, ELF_R_TYPE (rel->r_info));
5001 rel->r_addend = 0;
5002 }
f9f32305
AM
5003 }
5004 else
f9f32305 5005 {
6f6f27f8
L
5006 static int count;
5007 int ok;
5008 char *buf;
5009
5010 ok = asprintf (&buf, "local symbol %d",
5011 count++);
5012 if (ok <= 0)
5013 buf = (char *) "local symbol";
5014 finfo->info->callbacks->error_handler
5015 (LD_DEFINITION_IN_DISCARDED_SECTION,
5016 _("%T: discarded in section `%s' from %s\n"),
5017 buf, buf, sec->name,
5018 bfd_archive_filename (input_bfd));
5019 if (ok != -1)
f9f32305 5020 free (buf);
ec338859
AM
5021 }
5022 }
5023 }
5024 }
5025 }
50b4d486 5026
252b5132
RH
5027 /* Relocate the section by invoking a back end routine.
5028
5029 The back end routine is responsible for adjusting the
5030 section contents as necessary, and (if using Rela relocs
1049f94e 5031 and generating a relocatable output file) adjusting the
252b5132
RH
5032 reloc addend as necessary.
5033
5034 The back end routine does not have to worry about setting
5035 the reloc address or the reloc symbol index.
5036
5037 The back end routine is given a pointer to the swapped in
5038 internal symbols, and can access the hash table entries
5039 for the external symbols via elf_sym_hashes (input_bfd).
5040
1049f94e 5041 When generating relocatable output, the back end routine
252b5132
RH
5042 must handle STB_LOCAL/STT_SECTION symbols specially. The
5043 output symbol is going to be a section symbol
5044 corresponding to the output section, which will require
5045 the addend to be adjusted. */
5046
5047 if (! (*relocate_section) (output_bfd, finfo->info,
5048 input_bfd, o, contents,
5049 internal_relocs,
6cdc0ccc 5050 isymbuf,
252b5132 5051 finfo->sections))
b34976b6 5052 return FALSE;
252b5132 5053
9317eacc 5054 if (emit_relocs)
252b5132
RH
5055 {
5056 Elf_Internal_Rela *irela;
5057 Elf_Internal_Rela *irelaend;
73722af0 5058 bfd_vma last_offset;
252b5132 5059 struct elf_link_hash_entry **rel_hash;
c89583f8 5060 Elf_Internal_Shdr *input_rel_hdr, *input_rel_hdr2;
4e8a9624 5061 unsigned int next_erel;
b34976b6 5062 bfd_boolean (*reloc_emitter)
268b6b39 5063 (bfd *, asection *, Elf_Internal_Shdr *, Elf_Internal_Rela *);
b34976b6 5064 bfd_boolean rela_normal;
b491616a
AM
5065
5066 input_rel_hdr = &elf_section_data (o)->rel_hdr;
5067 rela_normal = (bed->rela_normal
5068 && (input_rel_hdr->sh_entsize
5069 == sizeof (Elf_External_Rela)));
252b5132
RH
5070
5071 /* Adjust the reloc addresses and symbol indices. */
5072
5073 irela = internal_relocs;
dc810e39 5074 irelaend = irela + o->reloc_count * bed->s->int_rels_per_ext_rel;
252b5132 5075 rel_hash = (elf_section_data (o->output_section)->rel_hashes
31367b81
MM
5076 + elf_section_data (o->output_section)->rel_count
5077 + elf_section_data (o->output_section)->rel_count2);
73722af0 5078 last_offset = o->output_offset;
1049f94e 5079 if (!finfo->info->relocatable)
73722af0 5080 last_offset += o->output_section->vma;
209f668e 5081 for (next_erel = 0; irela < irelaend; irela++, next_erel++)
252b5132
RH
5082 {
5083 unsigned long r_symndx;
252b5132 5084 asection *sec;
fad2542d 5085 Elf_Internal_Sym sym;
252b5132 5086
209f668e
NC
5087 if (next_erel == bed->s->int_rels_per_ext_rel)
5088 {
5089 rel_hash++;
5090 next_erel = 0;
5091 }
5092
d6fe2dc1
AM
5093 irela->r_offset = _bfd_elf_section_offset (output_bfd,
5094 finfo->info, o,
5095 irela->r_offset);
5096 if (irela->r_offset >= (bfd_vma) -2)
5097 {
73722af0
AM
5098 /* This is a reloc for a deleted entry or somesuch.
5099 Turn it into an R_*_NONE reloc, at the same
5100 offset as the last reloc. elf_eh_frame.c and
5101 elf_bfd_discard_info rely on reloc offsets
b34976b6 5102 being ordered. */
73722af0
AM
5103 irela->r_offset = last_offset;
5104 irela->r_info = 0;
5105 irela->r_addend = 0;
d6fe2dc1
AM
5106 continue;
5107 }
5108
252b5132
RH
5109 irela->r_offset += o->output_offset;
5110
7ad34365 5111 /* Relocs in an executable have to be virtual addresses. */
1049f94e 5112 if (!finfo->info->relocatable)
7ad34365
NC
5113 irela->r_offset += o->output_section->vma;
5114
73722af0 5115 last_offset = irela->r_offset;
252b5132 5116
73722af0
AM
5117 r_symndx = ELF_R_SYM (irela->r_info);
5118 if (r_symndx == STN_UNDEF)
252b5132
RH
5119 continue;
5120
5121 if (r_symndx >= locsymcount
5122 || (elf_bad_symtab (input_bfd)
5123 && finfo->sections[r_symndx] == NULL))
5124 {
5125 struct elf_link_hash_entry *rh;
209f668e 5126 unsigned long indx;
252b5132
RH
5127
5128 /* This is a reloc against a global symbol. We
5129 have not yet output all the local symbols, so
5130 we do not know the symbol index of any global
5131 symbol. We set the rel_hash entry for this
5132 reloc to point to the global hash table entry
5133 for this symbol. The symbol index is then
5134 set at the end of elf_bfd_final_link. */
5135 indx = r_symndx - extsymoff;
5136 rh = elf_sym_hashes (input_bfd)[indx];
5137 while (rh->root.type == bfd_link_hash_indirect
5138 || rh->root.type == bfd_link_hash_warning)
5139 rh = (struct elf_link_hash_entry *) rh->root.u.i.link;
5140
5141 /* Setting the index to -2 tells
5142 elf_link_output_extsym that this symbol is
5143 used by a reloc. */
5144 BFD_ASSERT (rh->indx < 0);
5145 rh->indx = -2;
5146
5147 *rel_hash = rh;
5148
5149 continue;
5150 }
5151
3e932841 5152 /* This is a reloc against a local symbol. */
252b5132
RH
5153
5154 *rel_hash = NULL;
fad2542d 5155 sym = isymbuf[r_symndx];
252b5132 5156 sec = finfo->sections[r_symndx];
fad2542d 5157 if (ELF_ST_TYPE (sym.st_info) == STT_SECTION)
252b5132
RH
5158 {
5159 /* I suppose the backend ought to fill in the
5160 section of any STT_SECTION symbol against a
5161 processor specific section. If we have
5162 discarded a section, the output_section will
5163 be the absolute section. */
b491616a
AM
5164 if (bfd_is_abs_section (sec)
5165 || (sec != NULL
5166 && bfd_is_abs_section (sec->output_section)))
252b5132
RH
5167 r_symndx = 0;
5168 else if (sec == NULL || sec->owner == NULL)
5169 {
5170 bfd_set_error (bfd_error_bad_value);
b34976b6 5171 return FALSE;
252b5132
RH
5172 }
5173 else
5174 {
5175 r_symndx = sec->output_section->target_index;
5176 BFD_ASSERT (r_symndx != 0);
5177 }
b491616a
AM
5178
5179 /* Adjust the addend according to where the
f5d44ba0 5180 section winds up in the output section. */
b491616a
AM
5181 if (rela_normal)
5182 irela->r_addend += sec->output_offset;
252b5132
RH
5183 }
5184 else
5185 {
5186 if (finfo->indices[r_symndx] == -1)
5187 {
dc810e39 5188 unsigned long shlink;
252b5132
RH
5189 const char *name;
5190 asection *osec;
5191
5192 if (finfo->info->strip == strip_all)
5193 {
5194 /* You can't do ld -r -s. */
5195 bfd_set_error (bfd_error_invalid_operation);
b34976b6 5196 return FALSE;
252b5132
RH
5197 }
5198
5199 /* This symbol was skipped earlier, but
5200 since it is needed by a reloc, we
5201 must output it now. */
dc810e39 5202 shlink = symtab_hdr->sh_link;
a7b97311 5203 name = (bfd_elf_string_from_elf_section
fad2542d 5204 (input_bfd, shlink, sym.st_name));
252b5132 5205 if (name == NULL)
b34976b6 5206 return FALSE;
252b5132
RH
5207
5208 osec = sec->output_section;
fad2542d 5209 sym.st_shndx =
252b5132
RH
5210 _bfd_elf_section_from_bfd_section (output_bfd,
5211 osec);
fad2542d 5212 if (sym.st_shndx == SHN_BAD)
b34976b6 5213 return FALSE;
252b5132 5214
fad2542d 5215 sym.st_value += sec->output_offset;
1049f94e 5216 if (! finfo->info->relocatable)
13ae64f3 5217 {
fad2542d
AM
5218 sym.st_value += osec->vma;
5219 if (ELF_ST_TYPE (sym.st_info) == STT_TLS)
13ae64f3
JJ
5220 {
5221 /* STT_TLS symbols are relative to PT_TLS
5222 segment base. */
5223 BFD_ASSERT (finfo->first_tls_sec != NULL);
fad2542d 5224 sym.st_value -= finfo->first_tls_sec->vma;
13ae64f3
JJ
5225 }
5226 }
252b5132 5227
a7b97311
AM
5228 finfo->indices[r_symndx]
5229 = bfd_get_symcount (output_bfd);
252b5132 5230
fad2542d 5231 if (! elf_link_output_sym (finfo, name, &sym, sec))
b34976b6 5232 return FALSE;
252b5132
RH
5233 }
5234
5235 r_symndx = finfo->indices[r_symndx];
5236 }
5237
5238 irela->r_info = ELF_R_INFO (r_symndx,
5239 ELF_R_TYPE (irela->r_info));
5240 }
5241
5242 /* Swap out the relocs. */
c44233aa 5243 if (bed->elf_backend_emit_relocs
1049f94e 5244 && !(finfo->info->relocatable
a7b97311 5245 || finfo->info->emitrelocations))
c44233aa
AM
5246 reloc_emitter = bed->elf_backend_emit_relocs;
5247 else
45d6a902 5248 reloc_emitter = _bfd_elf_link_output_relocs;
9317eacc 5249
c89583f8
AM
5250 if (input_rel_hdr->sh_size != 0
5251 && ! (*reloc_emitter) (output_bfd, o, input_rel_hdr,
5252 internal_relocs))
b34976b6 5253 return FALSE;
9317eacc 5254
c89583f8
AM
5255 input_rel_hdr2 = elf_section_data (o)->rel_hdr2;
5256 if (input_rel_hdr2 && input_rel_hdr2->sh_size != 0)
c44233aa
AM
5257 {
5258 internal_relocs += (NUM_SHDR_ENTRIES (input_rel_hdr)
dc810e39 5259 * bed->s->int_rels_per_ext_rel);
c89583f8 5260 if (! (*reloc_emitter) (output_bfd, o, input_rel_hdr2,
41241523 5261 internal_relocs))
b34976b6 5262 return FALSE;
c44233aa 5263 }
252b5132
RH
5264 }
5265 }
5266
5267 /* Write out the modified section contents. */
73d074b4 5268 if (bed->elf_backend_write_section
f9f32305 5269 && (*bed->elf_backend_write_section) (output_bfd, o, contents))
73d074b4
DJ
5270 {
5271 /* Section written out. */
5272 }
68bfbfcc 5273 else switch (o->sec_info_type)
f5fa8ca2 5274 {
65765700 5275 case ELF_INFO_TYPE_STABS:
f5fa8ca2 5276 if (! (_bfd_write_section_stabs
65765700
JJ
5277 (output_bfd,
5278 &elf_hash_table (finfo->info)->stab_info,
5279 o, &elf_section_data (o)->sec_info, contents)))
b34976b6 5280 return FALSE;
65765700
JJ
5281 break;
5282 case ELF_INFO_TYPE_MERGE:
126495ed
AM
5283 if (! _bfd_write_merged_section (output_bfd, o,
5284 elf_section_data (o)->sec_info))
b34976b6 5285 return FALSE;
65765700
JJ
5286 break;
5287 case ELF_INFO_TYPE_EH_FRAME:
5288 {
126495ed
AM
5289 if (! _bfd_elf_write_section_eh_frame (output_bfd, finfo->info,
5290 o, contents))
b34976b6 5291 return FALSE;
65765700
JJ
5292 }
5293 break;
5294 default:
5295 {
5296 bfd_size_type sec_size;
5297
5298 sec_size = (o->_cooked_size != 0 ? o->_cooked_size : o->_raw_size);
5299 if (! (o->flags & SEC_EXCLUDE)
5300 && ! bfd_set_section_contents (output_bfd, o->output_section,
5301 contents,
5302 (file_ptr) o->output_offset,
5303 sec_size))
b34976b6 5304 return FALSE;
65765700
JJ
5305 }
5306 break;
252b5132
RH
5307 }
5308 }
5309
b34976b6 5310 return TRUE;
252b5132
RH
5311}
5312
5313/* Generate a reloc when linking an ELF file. This is a reloc
5314 requested by the linker, and does come from any input file. This
5315 is used to build constructor and destructor tables when linking
5316 with -Ur. */
5317
b34976b6 5318static bfd_boolean
268b6b39
AM
5319elf_reloc_link_order (bfd *output_bfd,
5320 struct bfd_link_info *info,
5321 asection *output_section,
5322 struct bfd_link_order *link_order)
252b5132
RH
5323{
5324 reloc_howto_type *howto;
5325 long indx;
5326 bfd_vma offset;
5327 bfd_vma addend;
5328 struct elf_link_hash_entry **rel_hash_ptr;
5329 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 5330 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
947216bf
AM
5331 Elf_Internal_Rela irel[MAX_INT_RELS_PER_EXT_REL];
5332 bfd_byte *erel;
5333 unsigned int i;
252b5132
RH
5334
5335 howto = bfd_reloc_type_lookup (output_bfd, link_order->u.reloc.p->reloc);
5336 if (howto == NULL)
5337 {
5338 bfd_set_error (bfd_error_bad_value);
b34976b6 5339 return FALSE;
252b5132
RH
5340 }
5341
5342 addend = link_order->u.reloc.p->addend;
5343
5344 /* Figure out the symbol index. */
5345 rel_hash_ptr = (elf_section_data (output_section)->rel_hashes
31367b81
MM
5346 + elf_section_data (output_section)->rel_count
5347 + elf_section_data (output_section)->rel_count2);
252b5132
RH
5348 if (link_order->type == bfd_section_reloc_link_order)
5349 {
5350 indx = link_order->u.reloc.p->u.section->target_index;
5351 BFD_ASSERT (indx != 0);
5352 *rel_hash_ptr = NULL;
5353 }
5354 else
5355 {
5356 struct elf_link_hash_entry *h;
5357
5358 /* Treat a reloc against a defined symbol as though it were
c44233aa 5359 actually against the section. */
252b5132
RH
5360 h = ((struct elf_link_hash_entry *)
5361 bfd_wrapped_link_hash_lookup (output_bfd, info,
5362 link_order->u.reloc.p->u.name,
b34976b6 5363 FALSE, FALSE, TRUE));
252b5132
RH
5364 if (h != NULL
5365 && (h->root.type == bfd_link_hash_defined
5366 || h->root.type == bfd_link_hash_defweak))
5367 {
5368 asection *section;
5369
5370 section = h->root.u.def.section;
5371 indx = section->output_section->target_index;
5372 *rel_hash_ptr = NULL;
5373 /* It seems that we ought to add the symbol value to the
c44233aa
AM
5374 addend here, but in practice it has already been added
5375 because it was passed to constructor_callback. */
252b5132
RH
5376 addend += section->output_section->vma + section->output_offset;
5377 }
5378 else if (h != NULL)
5379 {
5380 /* Setting the index to -2 tells elf_link_output_extsym that
5381 this symbol is used by a reloc. */
5382 h->indx = -2;
5383 *rel_hash_ptr = h;
5384 indx = 0;
5385 }
5386 else
5387 {
5388 if (! ((*info->callbacks->unattached_reloc)
268b6b39 5389 (info, link_order->u.reloc.p->u.name, NULL, NULL, 0)))
b34976b6 5390 return FALSE;
252b5132
RH
5391 indx = 0;
5392 }
5393 }
5394
5395 /* If this is an inplace reloc, we must write the addend into the
5396 object file. */
5397 if (howto->partial_inplace && addend != 0)
5398 {
5399 bfd_size_type size;
5400 bfd_reloc_status_type rstat;
5401 bfd_byte *buf;
b34976b6 5402 bfd_boolean ok;
dc810e39 5403 const char *sym_name;
252b5132
RH
5404
5405 size = bfd_get_reloc_size (howto);
268b6b39
AM
5406 buf = bfd_zmalloc (size);
5407 if (buf == NULL)
b34976b6 5408 return FALSE;
268b6b39 5409 rstat = _bfd_relocate_contents (howto, output_bfd, addend, buf);
252b5132
RH
5410 switch (rstat)
5411 {
5412 case bfd_reloc_ok:
5413 break;
dc810e39 5414
252b5132
RH
5415 default:
5416 case bfd_reloc_outofrange:
5417 abort ();
dc810e39 5418
252b5132 5419 case bfd_reloc_overflow:
dc810e39
AM
5420 if (link_order->type == bfd_section_reloc_link_order)
5421 sym_name = bfd_section_name (output_bfd,
5422 link_order->u.reloc.p->u.section);
5423 else
5424 sym_name = link_order->u.reloc.p->u.name;
252b5132 5425 if (! ((*info->callbacks->reloc_overflow)
268b6b39 5426 (info, sym_name, howto->name, addend, NULL, NULL, 0)))
252b5132
RH
5427 {
5428 free (buf);
b34976b6 5429 return FALSE;
252b5132
RH
5430 }
5431 break;
5432 }
268b6b39
AM
5433 ok = bfd_set_section_contents (output_bfd, output_section, buf,
5434 link_order->offset, size);
252b5132
RH
5435 free (buf);
5436 if (! ok)
b34976b6 5437 return FALSE;
252b5132
RH
5438 }
5439
5440 /* The address of a reloc is relative to the section in a
1049f94e 5441 relocatable file, and is a virtual address in an executable
252b5132
RH
5442 file. */
5443 offset = link_order->offset;
1049f94e 5444 if (! info->relocatable)
252b5132
RH
5445 offset += output_section->vma;
5446
947216bf
AM
5447 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
5448 {
5449 irel[i].r_offset = offset;
5450 irel[i].r_info = 0;
5451 irel[i].r_addend = 0;
5452 }
5453 irel[0].r_info = ELF_R_INFO (indx, howto->type);
252b5132 5454
947216bf
AM
5455 rel_hdr = &elf_section_data (output_section)->rel_hdr;
5456 erel = rel_hdr->contents;
252b5132
RH
5457 if (rel_hdr->sh_type == SHT_REL)
5458 {
947216bf
AM
5459 erel += (elf_section_data (output_section)->rel_count
5460 * sizeof (Elf_External_Rel));
5461 (*bed->s->swap_reloc_out) (output_bfd, irel, erel);
252b5132
RH
5462 }
5463 else
5464 {
947216bf
AM
5465 irel[0].r_addend = addend;
5466 erel += (elf_section_data (output_section)->rel_count
5467 * sizeof (Elf_External_Rela));
5468 (*bed->s->swap_reloca_out) (output_bfd, irel, erel);
252b5132
RH
5469 }
5470
0525d26e 5471 ++elf_section_data (output_section)->rel_count;
252b5132 5472
b34976b6 5473 return TRUE;
252b5132 5474}
252b5132 5475\f
252b5132
RH
5476/* Garbage collect unused sections. */
5477
b34976b6 5478static bfd_boolean elf_gc_sweep_symbol
268b6b39 5479 (struct elf_link_hash_entry *, void *);
252b5132 5480
b34976b6 5481static bfd_boolean elf_gc_allocate_got_offsets
268b6b39 5482 (struct elf_link_hash_entry *, void *);
252b5132
RH
5483
5484/* The mark phase of garbage collection. For a given section, mark
dbb410c3
AM
5485 it and any sections in this section's group, and all the sections
5486 which define symbols to which it refers. */
252b5132 5487
b34976b6 5488typedef asection * (*gc_mark_hook_fn)
268b6b39
AM
5489 (asection *, struct bfd_link_info *, Elf_Internal_Rela *,
5490 struct elf_link_hash_entry *, Elf_Internal_Sym *);
b34976b6
AM
5491
5492static bfd_boolean
268b6b39
AM
5493elf_gc_mark (struct bfd_link_info *info,
5494 asection *sec,
5495 gc_mark_hook_fn gc_mark_hook)
252b5132 5496{
b34976b6 5497 bfd_boolean ret;
dbb410c3 5498 asection *group_sec;
252b5132
RH
5499
5500 sec->gc_mark = 1;
5501
dbb410c3
AM
5502 /* Mark all the sections in the group. */
5503 group_sec = elf_section_data (sec)->next_in_group;
5504 if (group_sec && !group_sec->gc_mark)
5505 if (!elf_gc_mark (info, group_sec, gc_mark_hook))
b34976b6 5506 return FALSE;
252b5132 5507
dbb410c3 5508 /* Look through the section relocs. */
b34976b6 5509 ret = TRUE;
252b5132
RH
5510 if ((sec->flags & SEC_RELOC) != 0 && sec->reloc_count > 0)
5511 {
5512 Elf_Internal_Rela *relstart, *rel, *relend;
5513 Elf_Internal_Shdr *symtab_hdr;
5514 struct elf_link_hash_entry **sym_hashes;
5515 size_t nlocsyms;
5516 size_t extsymoff;
252b5132 5517 bfd *input_bfd = sec->owner;
9c5bfbb7 5518 const struct elf_backend_data *bed = get_elf_backend_data (input_bfd);
6cdc0ccc 5519 Elf_Internal_Sym *isym = NULL;
252b5132
RH
5520
5521 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
5522 sym_hashes = elf_sym_hashes (input_bfd);
5523
5524 /* Read the local symbols. */
5525 if (elf_bad_symtab (input_bfd))
5526 {
5527 nlocsyms = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
c44233aa 5528 extsymoff = 0;
252b5132
RH
5529 }
5530 else
5531 extsymoff = nlocsyms = symtab_hdr->sh_info;
9ad5cbcf 5532
6cdc0ccc
AM
5533 isym = (Elf_Internal_Sym *) symtab_hdr->contents;
5534 if (isym == NULL && nlocsyms != 0)
9ad5cbcf 5535 {
6cdc0ccc
AM
5536 isym = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, nlocsyms, 0,
5537 NULL, NULL, NULL);
5538 if (isym == NULL)
b34976b6 5539 return FALSE;
9ad5cbcf
AM
5540 }
5541
252b5132 5542 /* Read the relocations. */
268b6b39 5543 relstart = _bfd_elf_link_read_relocs (input_bfd, sec, NULL, NULL,
45d6a902 5544 info->keep_memory);
252b5132
RH
5545 if (relstart == NULL)
5546 {
b34976b6 5547 ret = FALSE;
252b5132
RH
5548 goto out1;
5549 }
c7ac6ff8 5550 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
252b5132
RH
5551
5552 for (rel = relstart; rel < relend; rel++)
5553 {
5554 unsigned long r_symndx;
5555 asection *rsec;
5556 struct elf_link_hash_entry *h;
252b5132
RH
5557
5558 r_symndx = ELF_R_SYM (rel->r_info);
5559 if (r_symndx == 0)
5560 continue;
5561
6cdc0ccc
AM
5562 if (r_symndx >= nlocsyms
5563 || ELF_ST_BIND (isym[r_symndx].st_info) != STB_LOCAL)
252b5132
RH
5564 {
5565 h = sym_hashes[r_symndx - extsymoff];
1e2f5b6e 5566 rsec = (*gc_mark_hook) (sec, info, rel, h, NULL);
252b5132
RH
5567 }
5568 else
5569 {
6cdc0ccc 5570 rsec = (*gc_mark_hook) (sec, info, rel, NULL, &isym[r_symndx]);
252b5132
RH
5571 }
5572
5573 if (rsec && !rsec->gc_mark)
b91afed7
AM
5574 {
5575 if (bfd_get_flavour (rsec->owner) != bfd_target_elf_flavour)
5576 rsec->gc_mark = 1;
5577 else if (!elf_gc_mark (info, rsec, gc_mark_hook))
5578 {
b34976b6 5579 ret = FALSE;
b91afed7
AM
5580 goto out2;
5581 }
5582 }
252b5132
RH
5583 }
5584
5585 out2:
6cdc0ccc 5586 if (elf_section_data (sec)->relocs != relstart)
252b5132
RH
5587 free (relstart);
5588 out1:
6cdc0ccc
AM
5589 if (isym != NULL && symtab_hdr->contents != (unsigned char *) isym)
5590 {
5591 if (! info->keep_memory)
5592 free (isym);
5593 else
5594 symtab_hdr->contents = (unsigned char *) isym;
5595 }
252b5132
RH
5596 }
5597
5598 return ret;
5599}
5600
5601/* The sweep phase of garbage collection. Remove all garbage sections. */
5602
b34976b6 5603typedef bfd_boolean (*gc_sweep_hook_fn)
268b6b39 5604 (bfd *, struct bfd_link_info *, asection *, const Elf_Internal_Rela *);
b34976b6
AM
5605
5606static bfd_boolean
268b6b39 5607elf_gc_sweep (struct bfd_link_info *info, gc_sweep_hook_fn gc_sweep_hook)
252b5132
RH
5608{
5609 bfd *sub;
5610
5611 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
5612 {
5613 asection *o;
5614
f6af82bd
AM
5615 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
5616 continue;
5617
252b5132
RH
5618 for (o = sub->sections; o != NULL; o = o->next)
5619 {
5620 /* Keep special sections. Keep .debug sections. */
5621 if ((o->flags & SEC_LINKER_CREATED)
5622 || (o->flags & SEC_DEBUGGING))
5623 o->gc_mark = 1;
5624
5625 if (o->gc_mark)
5626 continue;
5627
5628 /* Skip sweeping sections already excluded. */
5629 if (o->flags & SEC_EXCLUDE)
5630 continue;
5631
5632 /* Since this is early in the link process, it is simple
5633 to remove a section from the output. */
5634 o->flags |= SEC_EXCLUDE;
5635
5636 /* But we also have to update some of the relocation
5637 info we collected before. */
5638 if (gc_sweep_hook
5639 && (o->flags & SEC_RELOC) && o->reloc_count > 0)
5640 {
5641 Elf_Internal_Rela *internal_relocs;
b34976b6 5642 bfd_boolean r;
252b5132 5643
45d6a902 5644 internal_relocs
268b6b39 5645 = _bfd_elf_link_read_relocs (o->owner, o, NULL, NULL,
45d6a902 5646 info->keep_memory);
252b5132 5647 if (internal_relocs == NULL)
b34976b6 5648 return FALSE;
252b5132 5649
3e932841 5650 r = (*gc_sweep_hook) (o->owner, info, o, internal_relocs);
252b5132 5651
6cdc0ccc 5652 if (elf_section_data (o)->relocs != internal_relocs)
252b5132
RH
5653 free (internal_relocs);
5654
5655 if (!r)
b34976b6 5656 return FALSE;
252b5132
RH
5657 }
5658 }
5659 }
5660
5661 /* Remove the symbols that were in the swept sections from the dynamic
5662 symbol table. GCFIXME: Anyone know how to get them out of the
5663 static symbol table as well? */
5664 {
5665 int i = 0;
5666
268b6b39 5667 elf_link_hash_traverse (elf_hash_table (info), elf_gc_sweep_symbol, &i);
252b5132
RH
5668
5669 elf_hash_table (info)->dynsymcount = i;
5670 }
5671
b34976b6 5672 return TRUE;
252b5132
RH
5673}
5674
5675/* Sweep symbols in swept sections. Called via elf_link_hash_traverse. */
5676
b34976b6 5677static bfd_boolean
268b6b39 5678elf_gc_sweep_symbol (struct elf_link_hash_entry *h, void *idxptr)
252b5132 5679{
268b6b39 5680 int *idx = idxptr;
252b5132 5681
e92d460e
AM
5682 if (h->root.type == bfd_link_hash_warning)
5683 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5684
252b5132
RH
5685 if (h->dynindx != -1
5686 && ((h->root.type != bfd_link_hash_defined
5687 && h->root.type != bfd_link_hash_defweak)
5688 || h->root.u.def.section->gc_mark))
5689 h->dynindx = (*idx)++;
5690
b34976b6 5691 return TRUE;
252b5132
RH
5692}
5693
5694/* Propogate collected vtable information. This is called through
5695 elf_link_hash_traverse. */
5696
b34976b6 5697static bfd_boolean
268b6b39 5698elf_gc_propagate_vtable_entries_used (struct elf_link_hash_entry *h, void *okp)
252b5132 5699{
e92d460e
AM
5700 if (h->root.type == bfd_link_hash_warning)
5701 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5702
3e932841 5703 /* Those that are not vtables. */
252b5132 5704 if (h->vtable_parent == NULL)
b34976b6 5705 return TRUE;
252b5132
RH
5706
5707 /* Those vtables that do not have parents, we cannot merge. */
5708 if (h->vtable_parent == (struct elf_link_hash_entry *) -1)
b34976b6 5709 return TRUE;
252b5132
RH
5710
5711 /* If we've already been done, exit. */
5712 if (h->vtable_entries_used && h->vtable_entries_used[-1])
b34976b6 5713 return TRUE;
252b5132
RH
5714
5715 /* Make sure the parent's table is up to date. */
5716 elf_gc_propagate_vtable_entries_used (h->vtable_parent, okp);
5717
5718 if (h->vtable_entries_used == NULL)
5719 {
5720 /* None of this table's entries were referenced. Re-use the
5721 parent's table. */
5722 h->vtable_entries_used = h->vtable_parent->vtable_entries_used;
5723 h->vtable_entries_size = h->vtable_parent->vtable_entries_size;
5724 }
5725 else
5726 {
5727 size_t n;
b34976b6 5728 bfd_boolean *cu, *pu;
252b5132
RH
5729
5730 /* Or the parent's entries into ours. */
5731 cu = h->vtable_entries_used;
b34976b6 5732 cu[-1] = TRUE;
252b5132
RH
5733 pu = h->vtable_parent->vtable_entries_used;
5734 if (pu != NULL)
5735 {
9c5bfbb7
AM
5736 const struct elf_backend_data *bed;
5737 unsigned int log_file_align;
0d1ea5c0 5738
9c5bfbb7
AM
5739 bed = get_elf_backend_data (h->root.u.def.section->owner);
5740 log_file_align = bed->s->log_file_align;
45d6a902 5741 n = h->vtable_parent->vtable_entries_size >> log_file_align;
374b596d 5742 while (n--)
252b5132 5743 {
374b596d 5744 if (*pu)
b34976b6 5745 *cu = TRUE;
374b596d
NC
5746 pu++;
5747 cu++;
252b5132
RH
5748 }
5749 }
5750 }
5751
b34976b6 5752 return TRUE;
252b5132
RH
5753}
5754
b34976b6 5755static bfd_boolean
268b6b39 5756elf_gc_smash_unused_vtentry_relocs (struct elf_link_hash_entry *h, void *okp)
252b5132
RH
5757{
5758 asection *sec;
5759 bfd_vma hstart, hend;
5760 Elf_Internal_Rela *relstart, *relend, *rel;
9c5bfbb7 5761 const struct elf_backend_data *bed;
45d6a902 5762 unsigned int log_file_align;
252b5132 5763
e92d460e
AM
5764 if (h->root.type == bfd_link_hash_warning)
5765 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5766
252b5132
RH
5767 /* Take care of both those symbols that do not describe vtables as
5768 well as those that are not loaded. */
5769 if (h->vtable_parent == NULL)
b34976b6 5770 return TRUE;
252b5132
RH
5771
5772 BFD_ASSERT (h->root.type == bfd_link_hash_defined
5773 || h->root.type == bfd_link_hash_defweak);
5774
5775 sec = h->root.u.def.section;
5776 hstart = h->root.u.def.value;
5777 hend = hstart + h->size;
5778
268b6b39 5779 relstart = _bfd_elf_link_read_relocs (sec->owner, sec, NULL, NULL, TRUE);
252b5132 5780 if (!relstart)
b34976b6 5781 return *(bfd_boolean *) okp = FALSE;
c7ac6ff8 5782 bed = get_elf_backend_data (sec->owner);
45d6a902 5783 log_file_align = bed->s->log_file_align;
0d1ea5c0 5784
c7ac6ff8 5785 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
252b5132
RH
5786
5787 for (rel = relstart; rel < relend; ++rel)
5788 if (rel->r_offset >= hstart && rel->r_offset < hend)
5789 {
5790 /* If the entry is in use, do nothing. */
5791 if (h->vtable_entries_used
5792 && (rel->r_offset - hstart) < h->vtable_entries_size)
5793 {
45d6a902 5794 bfd_vma entry = (rel->r_offset - hstart) >> log_file_align;
252b5132
RH
5795 if (h->vtable_entries_used[entry])
5796 continue;
5797 }
5798 /* Otherwise, kill it. */
5799 rel->r_offset = rel->r_info = rel->r_addend = 0;
5800 }
5801
b34976b6 5802 return TRUE;
252b5132
RH
5803}
5804
5805/* Do mark and sweep of unused sections. */
5806
b34976b6 5807bfd_boolean
268b6b39 5808elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
252b5132 5809{
b34976b6 5810 bfd_boolean ok = TRUE;
252b5132
RH
5811 bfd *sub;
5812 asection * (*gc_mark_hook)
268b6b39
AM
5813 (asection *, struct bfd_link_info *, Elf_Internal_Rela *,
5814 struct elf_link_hash_entry *h, Elf_Internal_Sym *);
252b5132
RH
5815
5816 if (!get_elf_backend_data (abfd)->can_gc_sections
1049f94e 5817 || info->relocatable || info->emitrelocations
252b5132 5818 || elf_hash_table (info)->dynamic_sections_created)
b34976b6 5819 return TRUE;
252b5132
RH
5820
5821 /* Apply transitive closure to the vtable entry usage info. */
5822 elf_link_hash_traverse (elf_hash_table (info),
5823 elf_gc_propagate_vtable_entries_used,
268b6b39 5824 &ok);
252b5132 5825 if (!ok)
b34976b6 5826 return FALSE;
252b5132
RH
5827
5828 /* Kill the vtable relocations that were not used. */
5829 elf_link_hash_traverse (elf_hash_table (info),
5830 elf_gc_smash_unused_vtentry_relocs,
268b6b39 5831 &ok);
252b5132 5832 if (!ok)
b34976b6 5833 return FALSE;
252b5132
RH
5834
5835 /* Grovel through relocs to find out who stays ... */
5836
5837 gc_mark_hook = get_elf_backend_data (abfd)->gc_mark_hook;
5838 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
5839 {
5840 asection *o;
f6af82bd
AM
5841
5842 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
5843 continue;
5844
252b5132
RH
5845 for (o = sub->sections; o != NULL; o = o->next)
5846 {
5847 if (o->flags & SEC_KEEP)
c44233aa 5848 if (!elf_gc_mark (info, o, gc_mark_hook))
b34976b6 5849 return FALSE;
252b5132
RH
5850 }
5851 }
5852
5853 /* ... and mark SEC_EXCLUDE for those that go. */
a7b97311 5854 if (!elf_gc_sweep (info, get_elf_backend_data (abfd)->gc_sweep_hook))
b34976b6 5855 return FALSE;
252b5132 5856
b34976b6 5857 return TRUE;
252b5132
RH
5858}
5859\f
5860/* Called from check_relocs to record the existance of a VTINHERIT reloc. */
5861
b34976b6 5862bfd_boolean
268b6b39
AM
5863elf_gc_record_vtinherit (bfd *abfd,
5864 asection *sec,
5865 struct elf_link_hash_entry *h,
5866 bfd_vma offset)
252b5132
RH
5867{
5868 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
5869 struct elf_link_hash_entry **search, *child;
5870 bfd_size_type extsymcount;
5871
5872 /* The sh_info field of the symtab header tells us where the
5873 external symbols start. We don't care about the local symbols at
5874 this point. */
5875 extsymcount = elf_tdata (abfd)->symtab_hdr.sh_size/sizeof (Elf_External_Sym);
5876 if (!elf_bad_symtab (abfd))
5877 extsymcount -= elf_tdata (abfd)->symtab_hdr.sh_info;
5878
5879 sym_hashes = elf_sym_hashes (abfd);
5880 sym_hashes_end = sym_hashes + extsymcount;
5881
5882 /* Hunt down the child symbol, which is in this section at the same
5883 offset as the relocation. */
5884 for (search = sym_hashes; search != sym_hashes_end; ++search)
5885 {
5886 if ((child = *search) != NULL
5887 && (child->root.type == bfd_link_hash_defined
5888 || child->root.type == bfd_link_hash_defweak)
5889 && child->root.u.def.section == sec
5890 && child->root.u.def.value == offset)
5891 goto win;
5892 }
5893
5894 (*_bfd_error_handler) ("%s: %s+%lu: No symbol found for INHERIT",
8f615d07 5895 bfd_archive_filename (abfd), sec->name,
a7b97311 5896 (unsigned long) offset);
252b5132 5897 bfd_set_error (bfd_error_invalid_operation);
b34976b6 5898 return FALSE;
252b5132 5899
dc810e39 5900 win:
252b5132
RH
5901 if (!h)
5902 {
5903 /* This *should* only be the absolute section. It could potentially
5904 be that someone has defined a non-global vtable though, which
5905 would be bad. It isn't worth paging in the local symbols to be
5906 sure though; that case should simply be handled by the assembler. */
5907
5908 child->vtable_parent = (struct elf_link_hash_entry *) -1;
5909 }
5910 else
5911 child->vtable_parent = h;
5912
b34976b6 5913 return TRUE;
252b5132
RH
5914}
5915
5916/* Called from check_relocs to record the existance of a VTENTRY reloc. */
5917
b34976b6 5918bfd_boolean
268b6b39
AM
5919elf_gc_record_vtentry (bfd *abfd ATTRIBUTE_UNUSED,
5920 asection *sec ATTRIBUTE_UNUSED,
5921 struct elf_link_hash_entry *h,
5922 bfd_vma addend)
252b5132 5923{
9c5bfbb7 5924 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
45d6a902 5925 unsigned int log_file_align = bed->s->log_file_align;
0d1ea5c0 5926
64c456e1 5927 if (addend >= h->vtable_entries_size)
252b5132 5928 {
64c456e1 5929 size_t size, bytes, file_align;
b34976b6 5930 bfd_boolean *ptr = h->vtable_entries_used;
252b5132
RH
5931
5932 /* While the symbol is undefined, we have to be prepared to handle
5933 a zero size. */
64c456e1 5934 file_align = 1 << log_file_align;
252b5132 5935 if (h->root.type == bfd_link_hash_undefined)
64c456e1 5936 size = addend + file_align;
252b5132
RH
5937 else
5938 {
5939 size = h->size;
64c456e1 5940 if (addend >= size)
252b5132
RH
5941 {
5942 /* Oops! We've got a reference past the defined end of
5943 the table. This is probably a bug -- shall we warn? */
64c456e1 5944 size = addend + file_align;
252b5132
RH
5945 }
5946 }
64c456e1 5947 size = (size + file_align - 1) & -file_align;
252b5132
RH
5948
5949 /* Allocate one extra entry for use as a "done" flag for the
64c456e1
AM
5950 consolidation pass. */
5951 bytes = ((size >> log_file_align) + 1) * sizeof (bfd_boolean);
252b5132
RH
5952
5953 if (ptr)
5954 {
268b6b39 5955 ptr = bfd_realloc (ptr - 1, bytes);
3e932841 5956
fed79cc6
NC
5957 if (ptr != NULL)
5958 {
5959 size_t oldbytes;
252b5132 5960
45d6a902 5961 oldbytes = (((h->vtable_entries_size >> log_file_align) + 1)
b34976b6 5962 * sizeof (bfd_boolean));
a7b97311 5963 memset (((char *) ptr) + oldbytes, 0, bytes - oldbytes);
fed79cc6 5964 }
252b5132
RH
5965 }
5966 else
268b6b39 5967 ptr = bfd_zmalloc (bytes);
252b5132 5968
fed79cc6 5969 if (ptr == NULL)
b34976b6 5970 return FALSE;
3e932841 5971
252b5132 5972 /* And arrange for that done flag to be at index -1. */
fed79cc6 5973 h->vtable_entries_used = ptr + 1;
252b5132
RH
5974 h->vtable_entries_size = size;
5975 }
3e932841 5976
45d6a902 5977 h->vtable_entries_used[addend >> log_file_align] = TRUE;
252b5132 5978
b34976b6 5979 return TRUE;
252b5132
RH
5980}
5981
5982/* And an accompanying bit to work out final got entry offsets once
5983 we're done. Should be called from final_link. */
5984
b34976b6 5985bfd_boolean
268b6b39
AM
5986elf_gc_common_finalize_got_offsets (bfd *abfd,
5987 struct bfd_link_info *info)
252b5132
RH
5988{
5989 bfd *i;
9c5bfbb7 5990 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5991 bfd_vma gotoff;
5992
5993 /* The GOT offset is relative to the .got section, but the GOT header is
5994 put into the .got.plt section, if the backend uses it. */
5995 if (bed->want_got_plt)
5996 gotoff = 0;
5997 else
5998 gotoff = bed->got_header_size;
5999
6000 /* Do the local .got entries first. */
6001 for (i = info->input_bfds; i; i = i->link_next)
6002 {
f6af82bd 6003 bfd_signed_vma *local_got;
252b5132
RH
6004 bfd_size_type j, locsymcount;
6005 Elf_Internal_Shdr *symtab_hdr;
6006
f6af82bd
AM
6007 if (bfd_get_flavour (i) != bfd_target_elf_flavour)
6008 continue;
6009
6010 local_got = elf_local_got_refcounts (i);
252b5132
RH
6011 if (!local_got)
6012 continue;
6013
6014 symtab_hdr = &elf_tdata (i)->symtab_hdr;
6015 if (elf_bad_symtab (i))
6016 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
6017 else
6018 locsymcount = symtab_hdr->sh_info;
6019
6020 for (j = 0; j < locsymcount; ++j)
6021 {
6022 if (local_got[j] > 0)
6023 {
6024 local_got[j] = gotoff;
6025 gotoff += ARCH_SIZE / 8;
6026 }
6027 else
6028 local_got[j] = (bfd_vma) -1;
6029 }
6030 }
6031
dd5724d5
AM
6032 /* Then the global .got entries. .plt refcounts are handled by
6033 adjust_dynamic_symbol */
252b5132
RH
6034 elf_link_hash_traverse (elf_hash_table (info),
6035 elf_gc_allocate_got_offsets,
268b6b39 6036 &gotoff);
b34976b6 6037 return TRUE;
252b5132
RH
6038}
6039
6040/* We need a special top-level link routine to convert got reference counts
6041 to real got offsets. */
6042
b34976b6 6043static bfd_boolean
268b6b39 6044elf_gc_allocate_got_offsets (struct elf_link_hash_entry *h, void *offarg)
252b5132 6045{
268b6b39 6046 bfd_vma *off = offarg;
252b5132 6047
e92d460e
AM
6048 if (h->root.type == bfd_link_hash_warning)
6049 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6050
252b5132
RH
6051 if (h->got.refcount > 0)
6052 {
6053 h->got.offset = off[0];
6054 off[0] += ARCH_SIZE / 8;
6055 }
6056 else
6057 h->got.offset = (bfd_vma) -1;
6058
b34976b6 6059 return TRUE;
252b5132
RH
6060}
6061
6062/* Many folk need no more in the way of final link than this, once
6063 got entry reference counting is enabled. */
6064
b34976b6 6065bfd_boolean
268b6b39 6066elf_gc_common_final_link (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
6067{
6068 if (!elf_gc_common_finalize_got_offsets (abfd, info))
b34976b6 6069 return FALSE;
252b5132
RH
6070
6071 /* Invoke the regular ELF backend linker to do all the work. */
6072 return elf_bfd_final_link (abfd, info);
6073}
6074
6075/* This function will be called though elf_link_hash_traverse to store
6076 all hash value of the exported symbols in an array. */
6077
b34976b6 6078static bfd_boolean
268b6b39 6079elf_collect_hash_codes (struct elf_link_hash_entry *h, void *data)
252b5132 6080{
268b6b39 6081 unsigned long **valuep = data;
252b5132
RH
6082 const char *name;
6083 char *p;
6084 unsigned long ha;
6085 char *alc = NULL;
6086
e92d460e
AM
6087 if (h->root.type == bfd_link_hash_warning)
6088 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6089
252b5132
RH
6090 /* Ignore indirect symbols. These are added by the versioning code. */
6091 if (h->dynindx == -1)
b34976b6 6092 return TRUE;
252b5132
RH
6093
6094 name = h->root.root.string;
6095 p = strchr (name, ELF_VER_CHR);
6096 if (p != NULL)
6097 {
268b6b39
AM
6098 alc = bfd_malloc (p - name + 1);
6099 memcpy (alc, name, p - name);
252b5132
RH
6100 alc[p - name] = '\0';
6101 name = alc;
6102 }
6103
6104 /* Compute the hash value. */
6105 ha = bfd_elf_hash (name);
6106
6107 /* Store the found hash value in the array given as the argument. */
6108 *(*valuep)++ = ha;
6109
6110 /* And store it in the struct so that we can put it in the hash table
6111 later. */
6112 h->elf_hash_value = ha;
6113
6114 if (alc != NULL)
6115 free (alc);
6116
b34976b6 6117 return TRUE;
252b5132 6118}
73d074b4 6119
b34976b6 6120bfd_boolean
268b6b39 6121elf_reloc_symbol_deleted_p (bfd_vma offset, void *cookie)
73d074b4 6122{
268b6b39 6123 struct elf_reloc_cookie *rcookie = cookie;
73d074b4
DJ
6124
6125 if (rcookie->bad_symtab)
6126 rcookie->rel = rcookie->rels;
6127
6128 for (; rcookie->rel < rcookie->relend; rcookie->rel++)
6129 {
d6fe2dc1 6130 unsigned long r_symndx;
73d074b4
DJ
6131
6132 if (! rcookie->bad_symtab)
6133 if (rcookie->rel->r_offset > offset)
b34976b6 6134 return FALSE;
73d074b4
DJ
6135 if (rcookie->rel->r_offset != offset)
6136 continue;
6137
d6fe2dc1
AM
6138 r_symndx = ELF_R_SYM (rcookie->rel->r_info);
6139 if (r_symndx == SHN_UNDEF)
b34976b6 6140 return TRUE;
d6fe2dc1 6141
73d074b4 6142 if (r_symndx >= rcookie->locsymcount
6cdc0ccc 6143 || ELF_ST_BIND (rcookie->locsyms[r_symndx].st_info) != STB_LOCAL)
73d074b4
DJ
6144 {
6145 struct elf_link_hash_entry *h;
6146
6147 h = rcookie->sym_hashes[r_symndx - rcookie->extsymoff];
6148
6149 while (h->root.type == bfd_link_hash_indirect
6150 || h->root.type == bfd_link_hash_warning)
6151 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6152
6153 if ((h->root.type == bfd_link_hash_defined
6154 || h->root.type == bfd_link_hash_defweak)
ed4de5e2 6155 && elf_discarded_section (h->root.u.def.section))
b34976b6 6156 return TRUE;
73d074b4 6157 else
b34976b6 6158 return FALSE;
73d074b4 6159 }
6cdc0ccc 6160 else
73d074b4
DJ
6161 {
6162 /* It's not a relocation against a global symbol,
44421011 6163 but it could be a relocation against a local
73d074b4
DJ
6164 symbol for a discarded section. */
6165 asection *isec;
6cdc0ccc 6166 Elf_Internal_Sym *isym;
73d074b4
DJ
6167
6168 /* Need to: get the symbol; get the section. */
6cdc0ccc
AM
6169 isym = &rcookie->locsyms[r_symndx];
6170 if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
73d074b4 6171 {
6cdc0ccc 6172 isec = section_from_elf_index (rcookie->abfd, isym->st_shndx);
ed4de5e2 6173 if (isec != NULL && elf_discarded_section (isec))
b34976b6 6174 return TRUE;
73d074b4
DJ
6175 }
6176 }
b34976b6 6177 return FALSE;
73d074b4 6178 }
b34976b6 6179 return FALSE;
73d074b4
DJ
6180}
6181
6182/* Discard unneeded references to discarded sections.
b34976b6 6183 Returns TRUE if any section's size was changed. */
73d074b4 6184/* This function assumes that the relocations are in sorted order,
ab3acfbe 6185 which is true for all known assemblers. */
73d074b4 6186
b34976b6 6187bfd_boolean
268b6b39 6188elf_bfd_discard_info (bfd *output_bfd, struct bfd_link_info *info)
73d074b4
DJ
6189{
6190 struct elf_reloc_cookie cookie;
126495ed 6191 asection *stab, *eh;
73d074b4 6192 Elf_Internal_Shdr *symtab_hdr;
9c5bfbb7 6193 const struct elf_backend_data *bed;
73d074b4 6194 bfd *abfd;
99eb2ac8 6195 unsigned int count;
b34976b6 6196 bfd_boolean ret = FALSE;
73d074b4 6197
d6fe2dc1 6198 if (info->traditional_format
73d074b4 6199 || info->hash->creator->flavour != bfd_target_elf_flavour
65765700 6200 || ! is_elf_hash_table (info))
b34976b6 6201 return FALSE;
65765700 6202
73d074b4
DJ
6203 for (abfd = info->input_bfds; abfd != NULL; abfd = abfd->link_next)
6204 {
163c1c30
L
6205 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6206 continue;
6207
73d074b4
DJ
6208 bed = get_elf_backend_data (abfd);
6209
6210 if ((abfd->flags & DYNAMIC) != 0)
6211 continue;
6212
126495ed 6213 eh = bfd_get_section_by_name (abfd, ".eh_frame");
1049f94e 6214 if (info->relocatable
2d36fe5f
AH
6215 || (eh != NULL
6216 && (eh->_raw_size == 0
6217 || bfd_is_abs_section (eh->output_section))))
126495ed 6218 eh = NULL;
65765700 6219
99eb2ac8
AM
6220 stab = bfd_get_section_by_name (abfd, ".stab");
6221 if (stab != NULL
6222 && (stab->_raw_size == 0
6223 || bfd_is_abs_section (stab->output_section)
68bfbfcc 6224 || stab->sec_info_type != ELF_INFO_TYPE_STABS))
99eb2ac8
AM
6225 stab = NULL;
6226
6227 if (stab == NULL
6228 && eh == NULL
6229 && bed->elf_backend_discard_info == NULL)
73d074b4
DJ
6230 continue;
6231
6232 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
73d074b4
DJ
6233 cookie.abfd = abfd;
6234 cookie.sym_hashes = elf_sym_hashes (abfd);
6235 cookie.bad_symtab = elf_bad_symtab (abfd);
6236 if (cookie.bad_symtab)
6237 {
99eb2ac8 6238 cookie.locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
73d074b4
DJ
6239 cookie.extsymoff = 0;
6240 }
6241 else
6242 {
6243 cookie.locsymcount = symtab_hdr->sh_info;
6244 cookie.extsymoff = symtab_hdr->sh_info;
6245 }
6246
6cdc0ccc
AM
6247 cookie.locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6248 if (cookie.locsyms == NULL && cookie.locsymcount != 0)
c44233aa 6249 {
6cdc0ccc
AM
6250 cookie.locsyms = bfd_elf_get_elf_syms (abfd, symtab_hdr,
6251 cookie.locsymcount, 0,
6252 NULL, NULL, NULL);
c44233aa 6253 if (cookie.locsyms == NULL)
b34976b6 6254 return FALSE;
9ad5cbcf 6255 }
73d074b4 6256
99eb2ac8 6257 if (stab != NULL)
73d074b4 6258 {
99eb2ac8
AM
6259 cookie.rels = NULL;
6260 count = stab->reloc_count;
6261 if (count != 0)
268b6b39
AM
6262 cookie.rels = _bfd_elf_link_read_relocs (abfd, stab, NULL, NULL,
6263 info->keep_memory);
99eb2ac8 6264 if (cookie.rels != NULL)
73d074b4
DJ
6265 {
6266 cookie.rel = cookie.rels;
99eb2ac8
AM
6267 cookie.relend = cookie.rels;
6268 cookie.relend += count * bed->s->int_rels_per_ext_rel;
65765700
JJ
6269 if (_bfd_discard_section_stabs (abfd, stab,
6270 elf_section_data (stab)->sec_info,
73d074b4
DJ
6271 elf_reloc_symbol_deleted_p,
6272 &cookie))
b34976b6 6273 ret = TRUE;
6cdc0ccc 6274 if (elf_section_data (stab)->relocs != cookie.rels)
73d074b4
DJ
6275 free (cookie.rels);
6276 }
6277 }
6278
99eb2ac8 6279 if (eh != NULL)
65765700
JJ
6280 {
6281 cookie.rels = NULL;
99eb2ac8
AM
6282 count = eh->reloc_count;
6283 if (count != 0)
268b6b39
AM
6284 cookie.rels = _bfd_elf_link_read_relocs (abfd, eh, NULL, NULL,
6285 info->keep_memory);
99eb2ac8
AM
6286 cookie.rel = cookie.rels;
6287 cookie.relend = cookie.rels;
6288 if (cookie.rels != NULL)
6289 cookie.relend += count * bed->s->int_rels_per_ext_rel;
6290
126495ed 6291 if (_bfd_elf_discard_section_eh_frame (abfd, info, eh,
65765700
JJ
6292 elf_reloc_symbol_deleted_p,
6293 &cookie))
b34976b6 6294 ret = TRUE;
99eb2ac8
AM
6295
6296 if (cookie.rels != NULL
6297 && elf_section_data (eh)->relocs != cookie.rels)
65765700
JJ
6298 free (cookie.rels);
6299 }
6300
99eb2ac8
AM
6301 if (bed->elf_backend_discard_info != NULL
6302 && (*bed->elf_backend_discard_info) (abfd, &cookie, info))
b34976b6 6303 ret = TRUE;
73d074b4 6304
6cdc0ccc
AM
6305 if (cookie.locsyms != NULL
6306 && symtab_hdr->contents != (unsigned char *) cookie.locsyms)
6307 {
6308 if (! info->keep_memory)
6309 free (cookie.locsyms);
6310 else
6311 symtab_hdr->contents = (unsigned char *) cookie.locsyms;
6312 }
73d074b4 6313 }
65765700 6314
126495ed 6315 if (info->eh_frame_hdr
1049f94e 6316 && !info->relocatable
126495ed 6317 && _bfd_elf_discard_section_eh_frame_hdr (output_bfd, info))
b34976b6 6318 ret = TRUE;
99eb2ac8 6319
73d074b4
DJ
6320 return ret;
6321}
6322
b34976b6 6323static bfd_boolean
268b6b39 6324elf_section_ignore_discarded_relocs (asection *sec)
73d074b4 6325{
9c5bfbb7 6326 const struct elf_backend_data *bed;
40b829d4 6327
68bfbfcc 6328 switch (sec->sec_info_type)
65765700
JJ
6329 {
6330 case ELF_INFO_TYPE_STABS:
6331 case ELF_INFO_TYPE_EH_FRAME:
b34976b6 6332 return TRUE;
65765700
JJ
6333 default:
6334 break;
6335 }
40b829d4
AM
6336
6337 bed = get_elf_backend_data (sec->owner);
6338 if (bed->elf_backend_ignore_discarded_relocs != NULL
6339 && (*bed->elf_backend_ignore_discarded_relocs) (sec))
b34976b6 6340 return TRUE;
65765700 6341
b34976b6 6342 return FALSE;
73d074b4 6343}
This page took 0.806149 seconds and 4 git commands to generate.