]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
* bfdlink.h (struct bfd_link_order): Tweak comment.
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
8615f3f2 4 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
1b74d094
BW
22/*
23SECTION
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
b34976b6 209bfd_boolean
217aa764 210bfd_elf_mkobject (bfd *abfd)
252b5132 211{
c044fabd
KH
212 /* This just does initialization. */
213 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 214 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 215 if (elf_tdata (abfd) == 0)
b34976b6 216 return FALSE;
c044fabd
KH
217 /* Since everything is done at close time, do we need any
218 initialization? */
252b5132 219
b34976b6 220 return TRUE;
252b5132
RH
221}
222
b34976b6 223bfd_boolean
217aa764 224bfd_elf_mkcorefile (bfd *abfd)
252b5132 225{
c044fabd 226 /* I think this can be done just like an object file. */
252b5132
RH
227 return bfd_elf_mkobject (abfd);
228}
229
230char *
217aa764 231bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
232{
233 Elf_Internal_Shdr **i_shdrp;
f075ee0c 234 bfd_byte *shstrtab = NULL;
dc810e39
AM
235 file_ptr offset;
236 bfd_size_type shstrtabsize;
252b5132
RH
237
238 i_shdrp = elf_elfsections (abfd);
239 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 240 return NULL;
252b5132 241
f075ee0c 242 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
243 if (shstrtab == NULL)
244 {
c044fabd 245 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
246 offset = i_shdrp[shindex]->sh_offset;
247 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
248
249 /* Allocate and clear an extra byte at the end, to prevent crashes
250 in case the string table is not terminated. */
251 if (shstrtabsize + 1 == 0
252 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
253 || bfd_seek (abfd, offset, SEEK_SET) != 0)
254 shstrtab = NULL;
255 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
256 {
257 if (bfd_get_error () != bfd_error_system_call)
258 bfd_set_error (bfd_error_file_truncated);
259 shstrtab = NULL;
260 }
261 else
262 shstrtab[shstrtabsize] = '\0';
217aa764 263 i_shdrp[shindex]->contents = shstrtab;
252b5132 264 }
f075ee0c 265 return (char *) shstrtab;
252b5132
RH
266}
267
268char *
217aa764
AM
269bfd_elf_string_from_elf_section (bfd *abfd,
270 unsigned int shindex,
271 unsigned int strindex)
252b5132
RH
272{
273 Elf_Internal_Shdr *hdr;
274
275 if (strindex == 0)
276 return "";
277
278 hdr = elf_elfsections (abfd)[shindex];
279
280 if (hdr->contents == NULL
281 && bfd_elf_get_str_section (abfd, shindex) == NULL)
282 return NULL;
283
284 if (strindex >= hdr->sh_size)
285 {
1b3a8575 286 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 287 (*_bfd_error_handler)
d003868e
AM
288 (_("%B: invalid string offset %u >= %lu for section `%s'"),
289 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 290 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 291 ? ".shstrtab"
1b3a8575 292 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
293 return "";
294 }
295
296 return ((char *) hdr->contents) + strindex;
297}
298
6cdc0ccc
AM
299/* Read and convert symbols to internal format.
300 SYMCOUNT specifies the number of symbols to read, starting from
301 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
302 are non-NULL, they are used to store the internal symbols, external
303 symbols, and symbol section index extensions, respectively. */
304
305Elf_Internal_Sym *
217aa764
AM
306bfd_elf_get_elf_syms (bfd *ibfd,
307 Elf_Internal_Shdr *symtab_hdr,
308 size_t symcount,
309 size_t symoffset,
310 Elf_Internal_Sym *intsym_buf,
311 void *extsym_buf,
312 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
313{
314 Elf_Internal_Shdr *shndx_hdr;
217aa764 315 void *alloc_ext;
df622259 316 const bfd_byte *esym;
6cdc0ccc
AM
317 Elf_External_Sym_Shndx *alloc_extshndx;
318 Elf_External_Sym_Shndx *shndx;
319 Elf_Internal_Sym *isym;
320 Elf_Internal_Sym *isymend;
9c5bfbb7 321 const struct elf_backend_data *bed;
6cdc0ccc
AM
322 size_t extsym_size;
323 bfd_size_type amt;
324 file_ptr pos;
325
326 if (symcount == 0)
327 return intsym_buf;
328
329 /* Normal syms might have section extension entries. */
330 shndx_hdr = NULL;
331 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
332 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
333
334 /* Read the symbols. */
335 alloc_ext = NULL;
336 alloc_extshndx = NULL;
337 bed = get_elf_backend_data (ibfd);
338 extsym_size = bed->s->sizeof_sym;
339 amt = symcount * extsym_size;
340 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
341 if (extsym_buf == NULL)
342 {
d0fb9a8d 343 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
344 extsym_buf = alloc_ext;
345 }
346 if (extsym_buf == NULL
347 || bfd_seek (ibfd, pos, SEEK_SET) != 0
348 || bfd_bread (extsym_buf, amt, ibfd) != amt)
349 {
350 intsym_buf = NULL;
351 goto out;
352 }
353
354 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
355 extshndx_buf = NULL;
356 else
357 {
358 amt = symcount * sizeof (Elf_External_Sym_Shndx);
359 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
360 if (extshndx_buf == NULL)
361 {
d0fb9a8d
JJ
362 alloc_extshndx = bfd_malloc2 (symcount,
363 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
364 extshndx_buf = alloc_extshndx;
365 }
366 if (extshndx_buf == NULL
367 || bfd_seek (ibfd, pos, SEEK_SET) != 0
368 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
369 {
370 intsym_buf = NULL;
371 goto out;
372 }
373 }
374
375 if (intsym_buf == NULL)
376 {
d0fb9a8d 377 intsym_buf = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
6cdc0ccc
AM
378 if (intsym_buf == NULL)
379 goto out;
380 }
381
382 /* Convert the symbols to internal form. */
383 isymend = intsym_buf + symcount;
384 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
385 isym < isymend;
386 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 387 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
388
389 out:
390 if (alloc_ext != NULL)
391 free (alloc_ext);
392 if (alloc_extshndx != NULL)
393 free (alloc_extshndx);
394
395 return intsym_buf;
396}
397
5cab59f6
AM
398/* Look up a symbol name. */
399const char *
be8dd2ca
AM
400bfd_elf_sym_name (bfd *abfd,
401 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
402 Elf_Internal_Sym *isym,
403 asection *sym_sec)
5cab59f6 404{
26c61ae5 405 const char *name;
5cab59f6 406 unsigned int iname = isym->st_name;
be8dd2ca 407 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 408
138f35cc
JJ
409 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
410 /* Check for a bogus st_shndx to avoid crashing. */
411 && isym->st_shndx < elf_numsections (abfd)
412 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
413 {
414 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
415 shindex = elf_elfheader (abfd)->e_shstrndx;
416 }
417
26c61ae5
L
418 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
419 if (name == NULL)
420 name = "(null)";
421 else if (sym_sec && *name == '\0')
422 name = bfd_section_name (abfd, sym_sec);
423
424 return name;
5cab59f6
AM
425}
426
dbb410c3
AM
427/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
428 sections. The first element is the flags, the rest are section
429 pointers. */
430
431typedef union elf_internal_group {
432 Elf_Internal_Shdr *shdr;
433 unsigned int flags;
434} Elf_Internal_Group;
435
b885599b
AM
436/* Return the name of the group signature symbol. Why isn't the
437 signature just a string? */
438
439static const char *
217aa764 440group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 441{
9dce4196 442 Elf_Internal_Shdr *hdr;
9dce4196
AM
443 unsigned char esym[sizeof (Elf64_External_Sym)];
444 Elf_External_Sym_Shndx eshndx;
445 Elf_Internal_Sym isym;
b885599b 446
13792e9d
L
447 /* First we need to ensure the symbol table is available. Make sure
448 that it is a symbol table section. */
449 hdr = elf_elfsections (abfd) [ghdr->sh_link];
450 if (hdr->sh_type != SHT_SYMTAB
451 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
452 return NULL;
453
9dce4196
AM
454 /* Go read the symbol. */
455 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
456 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
457 &isym, esym, &eshndx) == NULL)
b885599b 458 return NULL;
9dce4196 459
26c61ae5 460 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
461}
462
dbb410c3
AM
463/* Set next_in_group list pointer, and group name for NEWSECT. */
464
b34976b6 465static bfd_boolean
217aa764 466setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
467{
468 unsigned int num_group = elf_tdata (abfd)->num_group;
469
470 /* If num_group is zero, read in all SHT_GROUP sections. The count
471 is set to -1 if there are no SHT_GROUP sections. */
472 if (num_group == 0)
473 {
474 unsigned int i, shnum;
475
476 /* First count the number of groups. If we have a SHT_GROUP
477 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 478 shnum = elf_numsections (abfd);
dbb410c3
AM
479 num_group = 0;
480 for (i = 0; i < shnum; i++)
481 {
482 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
483 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
484 num_group += 1;
485 }
486
487 if (num_group == 0)
20dbb49d
L
488 {
489 num_group = (unsigned) -1;
490 elf_tdata (abfd)->num_group = num_group;
491 }
492 else
dbb410c3
AM
493 {
494 /* We keep a list of elf section headers for group sections,
495 so we can find them quickly. */
20dbb49d 496 bfd_size_type amt;
d0fb9a8d 497
20dbb49d 498 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
499 elf_tdata (abfd)->group_sect_ptr
500 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 501 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 502 return FALSE;
dbb410c3
AM
503
504 num_group = 0;
505 for (i = 0; i < shnum; i++)
506 {
507 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
508 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
509 {
973ffd63 510 unsigned char *src;
dbb410c3
AM
511 Elf_Internal_Group *dest;
512
513 /* Add to list of sections. */
514 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
515 num_group += 1;
516
517 /* Read the raw contents. */
518 BFD_ASSERT (sizeof (*dest) >= 4);
519 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
520 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
521 sizeof (*dest) / 4);
dbb410c3
AM
522 if (shdr->contents == NULL
523 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
524 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
525 != shdr->sh_size))
b34976b6 526 return FALSE;
dbb410c3
AM
527
528 /* Translate raw contents, a flag word followed by an
529 array of elf section indices all in target byte order,
530 to the flag word followed by an array of elf section
531 pointers. */
532 src = shdr->contents + shdr->sh_size;
533 dest = (Elf_Internal_Group *) (shdr->contents + amt);
534 while (1)
535 {
536 unsigned int idx;
537
538 src -= 4;
539 --dest;
540 idx = H_GET_32 (abfd, src);
541 if (src == shdr->contents)
542 {
543 dest->flags = idx;
b885599b
AM
544 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
545 shdr->bfd_section->flags
546 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
547 break;
548 }
549 if (idx >= shnum)
550 {
551 ((*_bfd_error_handler)
d003868e 552 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
553 idx = 0;
554 }
555 dest->shdr = elf_elfsections (abfd)[idx];
556 }
557 }
558 }
559 }
560 }
561
562 if (num_group != (unsigned) -1)
563 {
564 unsigned int i;
565
566 for (i = 0; i < num_group; i++)
567 {
568 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
569 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
570 unsigned int n_elt = shdr->sh_size / 4;
571
572 /* Look through this group's sections to see if current
573 section is a member. */
574 while (--n_elt != 0)
575 if ((++idx)->shdr == hdr)
576 {
e0e8c97f 577 asection *s = NULL;
dbb410c3
AM
578
579 /* We are a member of this group. Go looking through
580 other members to see if any others are linked via
581 next_in_group. */
582 idx = (Elf_Internal_Group *) shdr->contents;
583 n_elt = shdr->sh_size / 4;
584 while (--n_elt != 0)
585 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 586 && elf_next_in_group (s) != NULL)
dbb410c3
AM
587 break;
588 if (n_elt != 0)
589 {
dbb410c3
AM
590 /* Snarf the group name from other member, and
591 insert current section in circular list. */
945906ff
AM
592 elf_group_name (newsect) = elf_group_name (s);
593 elf_next_in_group (newsect) = elf_next_in_group (s);
594 elf_next_in_group (s) = newsect;
dbb410c3
AM
595 }
596 else
597 {
dbb410c3
AM
598 const char *gname;
599
b885599b
AM
600 gname = group_signature (abfd, shdr);
601 if (gname == NULL)
b34976b6 602 return FALSE;
945906ff 603 elf_group_name (newsect) = gname;
dbb410c3
AM
604
605 /* Start a circular list with one element. */
945906ff 606 elf_next_in_group (newsect) = newsect;
dbb410c3 607 }
b885599b 608
9dce4196
AM
609 /* If the group section has been created, point to the
610 new member. */
dbb410c3 611 if (shdr->bfd_section != NULL)
945906ff 612 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 613
dbb410c3
AM
614 i = num_group - 1;
615 break;
616 }
617 }
618 }
619
945906ff 620 if (elf_group_name (newsect) == NULL)
dbb410c3 621 {
d003868e
AM
622 (*_bfd_error_handler) (_("%B: no group info for section %A"),
623 abfd, newsect);
dbb410c3 624 }
b34976b6 625 return TRUE;
dbb410c3
AM
626}
627
3d7f7666 628bfd_boolean
dd863624 629_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
630{
631 unsigned int i;
632 unsigned int num_group = elf_tdata (abfd)->num_group;
633 bfd_boolean result = TRUE;
dd863624
L
634 asection *s;
635
636 /* Process SHF_LINK_ORDER. */
637 for (s = abfd->sections; s != NULL; s = s->next)
638 {
639 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
640 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
641 {
642 unsigned int elfsec = this_hdr->sh_link;
643 /* FIXME: The old Intel compiler and old strip/objcopy may
644 not set the sh_link or sh_info fields. Hence we could
645 get the situation where elfsec is 0. */
646 if (elfsec == 0)
647 {
648 const struct elf_backend_data *bed
649 = get_elf_backend_data (abfd);
650 if (bed->link_order_error_handler)
651 bed->link_order_error_handler
652 (_("%B: warning: sh_link not set for section `%A'"),
653 abfd, s);
654 }
655 else
656 {
657 this_hdr = elf_elfsections (abfd)[elfsec];
658 elf_linked_to_section (s) = this_hdr->bfd_section;
659 }
660 }
661 }
3d7f7666 662
dd863624 663 /* Process section groups. */
3d7f7666
L
664 if (num_group == (unsigned) -1)
665 return result;
666
667 for (i = 0; i < num_group; i++)
668 {
669 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
670 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
671 unsigned int n_elt = shdr->sh_size / 4;
672
673 while (--n_elt != 0)
674 if ((++idx)->shdr->bfd_section)
675 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
676 else if (idx->shdr->sh_type == SHT_RELA
677 || idx->shdr->sh_type == SHT_REL)
678 /* We won't include relocation sections in section groups in
679 output object files. We adjust the group section size here
680 so that relocatable link will work correctly when
681 relocation sections are in section group in input object
682 files. */
683 shdr->bfd_section->size -= 4;
684 else
685 {
686 /* There are some unknown sections in the group. */
687 (*_bfd_error_handler)
d003868e
AM
688 (_("%B: unknown [%d] section `%s' in group [%s]"),
689 abfd,
3d7f7666 690 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
691 bfd_elf_string_from_elf_section (abfd,
692 (elf_elfheader (abfd)
693 ->e_shstrndx),
694 idx->shdr->sh_name),
3d7f7666
L
695 shdr->bfd_section->name);
696 result = FALSE;
697 }
698 }
699 return result;
700}
701
72adc230
AM
702bfd_boolean
703bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
704{
705 return elf_next_in_group (sec) != NULL;
706}
707
252b5132
RH
708/* Make a BFD section from an ELF section. We store a pointer to the
709 BFD section in the bfd_section field of the header. */
710
b34976b6 711bfd_boolean
217aa764
AM
712_bfd_elf_make_section_from_shdr (bfd *abfd,
713 Elf_Internal_Shdr *hdr,
6dc132d9
L
714 const char *name,
715 int shindex)
252b5132
RH
716{
717 asection *newsect;
718 flagword flags;
9c5bfbb7 719 const struct elf_backend_data *bed;
252b5132
RH
720
721 if (hdr->bfd_section != NULL)
722 {
723 BFD_ASSERT (strcmp (name,
724 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 725 return TRUE;
252b5132
RH
726 }
727
728 newsect = bfd_make_section_anyway (abfd, name);
729 if (newsect == NULL)
b34976b6 730 return FALSE;
252b5132 731
1829f4b2
AM
732 hdr->bfd_section = newsect;
733 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 734 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 735
2f89ff8d
L
736 /* Always use the real type/flags. */
737 elf_section_type (newsect) = hdr->sh_type;
738 elf_section_flags (newsect) = hdr->sh_flags;
739
252b5132
RH
740 newsect->filepos = hdr->sh_offset;
741
742 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
743 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
744 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 745 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 746 return FALSE;
252b5132
RH
747
748 flags = SEC_NO_FLAGS;
749 if (hdr->sh_type != SHT_NOBITS)
750 flags |= SEC_HAS_CONTENTS;
dbb410c3 751 if (hdr->sh_type == SHT_GROUP)
b3096250 752 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
753 if ((hdr->sh_flags & SHF_ALLOC) != 0)
754 {
755 flags |= SEC_ALLOC;
756 if (hdr->sh_type != SHT_NOBITS)
757 flags |= SEC_LOAD;
758 }
759 if ((hdr->sh_flags & SHF_WRITE) == 0)
760 flags |= SEC_READONLY;
761 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
762 flags |= SEC_CODE;
763 else if ((flags & SEC_LOAD) != 0)
764 flags |= SEC_DATA;
f5fa8ca2
JJ
765 if ((hdr->sh_flags & SHF_MERGE) != 0)
766 {
767 flags |= SEC_MERGE;
768 newsect->entsize = hdr->sh_entsize;
769 if ((hdr->sh_flags & SHF_STRINGS) != 0)
770 flags |= SEC_STRINGS;
771 }
dbb410c3
AM
772 if (hdr->sh_flags & SHF_GROUP)
773 if (!setup_group (abfd, hdr, newsect))
b34976b6 774 return FALSE;
13ae64f3
JJ
775 if ((hdr->sh_flags & SHF_TLS) != 0)
776 flags |= SEC_THREAD_LOCAL;
252b5132 777
3d2b39cf 778 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 779 {
3d2b39cf
L
780 /* The debugging sections appear to be recognized only by name,
781 not any sort of flag. Their SEC_ALLOC bits are cleared. */
782 static const struct
783 {
784 const char *name;
785 int len;
786 } debug_sections [] =
787 {
788 { "debug", 5 }, /* 'd' */
789 { NULL, 0 }, /* 'e' */
790 { NULL, 0 }, /* 'f' */
791 { "gnu.linkonce.wi.", 17 }, /* 'g' */
792 { NULL, 0 }, /* 'h' */
793 { NULL, 0 }, /* 'i' */
794 { NULL, 0 }, /* 'j' */
795 { NULL, 0 }, /* 'k' */
796 { "line", 4 }, /* 'l' */
797 { NULL, 0 }, /* 'm' */
798 { NULL, 0 }, /* 'n' */
799 { NULL, 0 }, /* 'o' */
800 { NULL, 0 }, /* 'p' */
801 { NULL, 0 }, /* 'q' */
802 { NULL, 0 }, /* 'r' */
803 { "stab", 4 } /* 's' */
804 };
805
806 if (name [0] == '.')
807 {
808 int i = name [1] - 'd';
809 if (i >= 0
810 && i < (int) ARRAY_SIZE (debug_sections)
811 && debug_sections [i].name != NULL
812 && strncmp (&name [1], debug_sections [i].name,
813 debug_sections [i].len) == 0)
814 flags |= SEC_DEBUGGING;
815 }
816 }
252b5132
RH
817
818 /* As a GNU extension, if the name begins with .gnu.linkonce, we
819 only link a single copy of the section. This is used to support
820 g++. g++ will emit each template expansion in its own section.
821 The symbols will be defined as weak, so that multiple definitions
822 are permitted. The GNU linker extension is to actually discard
823 all but one of the sections. */
b885599b
AM
824 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
825 && elf_next_in_group (newsect) == NULL)
252b5132
RH
826 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
827
fa152c49
JW
828 bed = get_elf_backend_data (abfd);
829 if (bed->elf_backend_section_flags)
830 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 831 return FALSE;
fa152c49 832
252b5132 833 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 834 return FALSE;
252b5132
RH
835
836 if ((flags & SEC_ALLOC) != 0)
837 {
838 Elf_Internal_Phdr *phdr;
839 unsigned int i;
840
841 /* Look through the phdrs to see if we need to adjust the lma.
842 If all the p_paddr fields are zero, we ignore them, since
843 some ELF linkers produce such output. */
844 phdr = elf_tdata (abfd)->phdr;
845 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
846 {
847 if (phdr->p_paddr != 0)
848 break;
849 }
850 if (i < elf_elfheader (abfd)->e_phnum)
851 {
852 phdr = elf_tdata (abfd)->phdr;
853 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
854 {
e0e8c97f
NC
855 /* This section is part of this segment if its file
856 offset plus size lies within the segment's memory
857 span and, if the section is loaded, the extent of the
47d9a591 858 loaded data lies within the extent of the segment.
bf36db18
NC
859
860 Note - we used to check the p_paddr field as well, and
861 refuse to set the LMA if it was 0. This is wrong
dba143ef 862 though, as a perfectly valid initialised segment can
bf36db18 863 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 864 place special significance on the address 0 and
bf36db18
NC
865 executables need to be able to have a segment which
866 covers this address. */
252b5132 867 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
868 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
869 && (hdr->sh_offset + hdr->sh_size
870 <= phdr->p_offset + phdr->p_memsz)
252b5132 871 && ((flags & SEC_LOAD) == 0
d7866f04
AM
872 || (hdr->sh_offset + hdr->sh_size
873 <= phdr->p_offset + phdr->p_filesz)))
252b5132 874 {
dba143ef 875 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
876 newsect->lma = (phdr->p_paddr
877 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
878 else
879 /* We used to use the same adjustment for SEC_LOAD
880 sections, but that doesn't work if the segment
881 is packed with code from multiple VMAs.
882 Instead we calculate the section LMA based on
883 the segment LMA. It is assumed that the
884 segment will contain sections with contiguous
885 LMAs, even if the VMAs are not. */
886 newsect->lma = (phdr->p_paddr
887 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
888
889 /* With contiguous segments, we can't tell from file
890 offsets whether a section with zero size should
891 be placed at the end of one segment or the
892 beginning of the next. Decide based on vaddr. */
893 if (hdr->sh_addr >= phdr->p_vaddr
894 && (hdr->sh_addr + hdr->sh_size
895 <= phdr->p_vaddr + phdr->p_memsz))
896 break;
252b5132
RH
897 }
898 }
899 }
900 }
901
b34976b6 902 return TRUE;
252b5132
RH
903}
904
905/*
906INTERNAL_FUNCTION
907 bfd_elf_find_section
908
909SYNOPSIS
910 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
911
912DESCRIPTION
913 Helper functions for GDB to locate the string tables.
914 Since BFD hides string tables from callers, GDB needs to use an
915 internal hook to find them. Sun's .stabstr, in particular,
916 isn't even pointed to by the .stab section, so ordinary
917 mechanisms wouldn't work to find it, even if we had some.
918*/
919
920struct elf_internal_shdr *
217aa764 921bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
922{
923 Elf_Internal_Shdr **i_shdrp;
924 char *shstrtab;
925 unsigned int max;
926 unsigned int i;
927
928 i_shdrp = elf_elfsections (abfd);
929 if (i_shdrp != NULL)
930 {
9ad5cbcf
AM
931 shstrtab = bfd_elf_get_str_section (abfd,
932 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
933 if (shstrtab != NULL)
934 {
9ad5cbcf 935 max = elf_numsections (abfd);
252b5132
RH
936 for (i = 1; i < max; i++)
937 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
938 return i_shdrp[i];
939 }
940 }
941 return 0;
942}
943
944const char *const bfd_elf_section_type_names[] = {
945 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
946 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
947 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
948};
949
1049f94e 950/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
951 output, and the reloc is against an external symbol, and nothing
952 has given us any additional addend, the resulting reloc will also
953 be against the same symbol. In such a case, we don't want to
954 change anything about the way the reloc is handled, since it will
955 all be done at final link time. Rather than put special case code
956 into bfd_perform_relocation, all the reloc types use this howto
957 function. It just short circuits the reloc if producing
1049f94e 958 relocatable output against an external symbol. */
252b5132 959
252b5132 960bfd_reloc_status_type
217aa764
AM
961bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
962 arelent *reloc_entry,
963 asymbol *symbol,
964 void *data ATTRIBUTE_UNUSED,
965 asection *input_section,
966 bfd *output_bfd,
967 char **error_message ATTRIBUTE_UNUSED)
968{
969 if (output_bfd != NULL
252b5132
RH
970 && (symbol->flags & BSF_SECTION_SYM) == 0
971 && (! reloc_entry->howto->partial_inplace
972 || reloc_entry->addend == 0))
973 {
974 reloc_entry->address += input_section->output_offset;
975 return bfd_reloc_ok;
976 }
977
978 return bfd_reloc_continue;
979}
980\f
d3c456e9
JJ
981/* Make sure sec_info_type is cleared if sec_info is cleared too. */
982
983static void
217aa764
AM
984merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
985 asection *sec)
d3c456e9 986{
68bfbfcc
AM
987 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
988 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
989}
990
8550eb6e
JJ
991/* Finish SHF_MERGE section merging. */
992
b34976b6 993bfd_boolean
217aa764 994_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 995{
57ceae94
AM
996 bfd *ibfd;
997 asection *sec;
998
0eddce27 999 if (!is_elf_hash_table (info->hash))
b34976b6 1000 return FALSE;
57ceae94
AM
1001
1002 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1003 if ((ibfd->flags & DYNAMIC) == 0)
1004 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
1005 if ((sec->flags & SEC_MERGE) != 0
1006 && !bfd_is_abs_section (sec->output_section))
1007 {
1008 struct bfd_elf_section_data *secdata;
1009
1010 secdata = elf_section_data (sec);
1011 if (! _bfd_add_merge_section (abfd,
1012 &elf_hash_table (info)->merge_info,
1013 sec, &secdata->sec_info))
1014 return FALSE;
1015 else if (secdata->sec_info)
1016 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
1017 }
1018
1019 if (elf_hash_table (info)->merge_info != NULL)
1020 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 1021 merge_sections_remove_hook);
b34976b6 1022 return TRUE;
8550eb6e 1023}
2d653fc7
AM
1024
1025void
217aa764 1026_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1027{
1028 sec->output_section = bfd_abs_section_ptr;
1029 sec->output_offset = sec->vma;
0eddce27 1030 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1031 return;
1032
68bfbfcc 1033 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1034}
8550eb6e 1035\f
0ac4564e
L
1036/* Copy the program header and other data from one object module to
1037 another. */
252b5132 1038
b34976b6 1039bfd_boolean
217aa764 1040_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1041{
1042 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1043 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1044 return TRUE;
2d502050
L
1045
1046 BFD_ASSERT (!elf_flags_init (obfd)
1047 || (elf_elfheader (obfd)->e_flags
1048 == elf_elfheader (ibfd)->e_flags));
1049
0ac4564e 1050 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1051 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1052 elf_flags_init (obfd) = TRUE;
1053 return TRUE;
2d502050
L
1054}
1055
f0b79d91
L
1056/* Print out the program headers. */
1057
b34976b6 1058bfd_boolean
217aa764 1059_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1060{
217aa764 1061 FILE *f = farg;
252b5132
RH
1062 Elf_Internal_Phdr *p;
1063 asection *s;
1064 bfd_byte *dynbuf = NULL;
1065
1066 p = elf_tdata (abfd)->phdr;
1067 if (p != NULL)
1068 {
1069 unsigned int i, c;
1070
1071 fprintf (f, _("\nProgram Header:\n"));
1072 c = elf_elfheader (abfd)->e_phnum;
1073 for (i = 0; i < c; i++, p++)
1074 {
dc810e39 1075 const char *pt;
252b5132
RH
1076 char buf[20];
1077
1078 switch (p->p_type)
1079 {
dc810e39
AM
1080 case PT_NULL: pt = "NULL"; break;
1081 case PT_LOAD: pt = "LOAD"; break;
1082 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1083 case PT_INTERP: pt = "INTERP"; break;
1084 case PT_NOTE: pt = "NOTE"; break;
1085 case PT_SHLIB: pt = "SHLIB"; break;
1086 case PT_PHDR: pt = "PHDR"; break;
13ae64f3 1087 case PT_TLS: pt = "TLS"; break;
65765700 1088 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
9ee5e499 1089 case PT_GNU_STACK: pt = "STACK"; break;
8c37241b 1090 case PT_GNU_RELRO: pt = "RELRO"; break;
dc810e39 1091 default: sprintf (buf, "0x%lx", p->p_type); pt = buf; break;
252b5132 1092 }
dc810e39 1093 fprintf (f, "%8s off 0x", pt);
60b89a18 1094 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1095 fprintf (f, " vaddr 0x");
60b89a18 1096 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1097 fprintf (f, " paddr 0x");
60b89a18 1098 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1099 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1100 fprintf (f, " filesz 0x");
60b89a18 1101 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1102 fprintf (f, " memsz 0x");
60b89a18 1103 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1104 fprintf (f, " flags %c%c%c",
1105 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1106 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1107 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1108 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1109 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1110 fprintf (f, "\n");
1111 }
1112 }
1113
1114 s = bfd_get_section_by_name (abfd, ".dynamic");
1115 if (s != NULL)
1116 {
1117 int elfsec;
dc810e39 1118 unsigned long shlink;
252b5132
RH
1119 bfd_byte *extdyn, *extdynend;
1120 size_t extdynsize;
217aa764 1121 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1122
1123 fprintf (f, _("\nDynamic Section:\n"));
1124
eea6121a 1125 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1126 goto error_return;
1127
1128 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1129 if (elfsec == -1)
1130 goto error_return;
dc810e39 1131 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1132
1133 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1134 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1135
1136 extdyn = dynbuf;
eea6121a 1137 extdynend = extdyn + s->size;
252b5132
RH
1138 for (; extdyn < extdynend; extdyn += extdynsize)
1139 {
1140 Elf_Internal_Dyn dyn;
1141 const char *name;
1142 char ab[20];
b34976b6 1143 bfd_boolean stringp;
252b5132 1144
217aa764 1145 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1146
1147 if (dyn.d_tag == DT_NULL)
1148 break;
1149
b34976b6 1150 stringp = FALSE;
252b5132
RH
1151 switch (dyn.d_tag)
1152 {
1153 default:
1154 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1155 name = ab;
1156 break;
1157
b34976b6 1158 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1159 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1160 case DT_PLTGOT: name = "PLTGOT"; break;
1161 case DT_HASH: name = "HASH"; break;
1162 case DT_STRTAB: name = "STRTAB"; break;
1163 case DT_SYMTAB: name = "SYMTAB"; break;
1164 case DT_RELA: name = "RELA"; break;
1165 case DT_RELASZ: name = "RELASZ"; break;
1166 case DT_RELAENT: name = "RELAENT"; break;
1167 case DT_STRSZ: name = "STRSZ"; break;
1168 case DT_SYMENT: name = "SYMENT"; break;
1169 case DT_INIT: name = "INIT"; break;
1170 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1171 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1172 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1173 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1174 case DT_REL: name = "REL"; break;
1175 case DT_RELSZ: name = "RELSZ"; break;
1176 case DT_RELENT: name = "RELENT"; break;
1177 case DT_PLTREL: name = "PLTREL"; break;
1178 case DT_DEBUG: name = "DEBUG"; break;
1179 case DT_TEXTREL: name = "TEXTREL"; break;
1180 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1181 case DT_BIND_NOW: name = "BIND_NOW"; break;
1182 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1183 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1184 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1185 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1186 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1187 case DT_FLAGS: name = "FLAGS"; break;
1188 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1189 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1190 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1191 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1192 case DT_MOVEENT: name = "MOVEENT"; break;
1193 case DT_MOVESZ: name = "MOVESZ"; break;
1194 case DT_FEATURE: name = "FEATURE"; break;
1195 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1196 case DT_SYMINSZ: name = "SYMINSZ"; break;
1197 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1198 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1199 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1200 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1201 case DT_PLTPAD: name = "PLTPAD"; break;
1202 case DT_MOVETAB: name = "MOVETAB"; break;
1203 case DT_SYMINFO: name = "SYMINFO"; break;
1204 case DT_RELACOUNT: name = "RELACOUNT"; break;
1205 case DT_RELCOUNT: name = "RELCOUNT"; break;
1206 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1207 case DT_VERSYM: name = "VERSYM"; break;
1208 case DT_VERDEF: name = "VERDEF"; break;
1209 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1210 case DT_VERNEED: name = "VERNEED"; break;
1211 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1212 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1213 case DT_USED: name = "USED"; break;
b34976b6 1214 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1215 }
1216
1217 fprintf (f, " %-11s ", name);
1218 if (! stringp)
1219 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1220 else
1221 {
1222 const char *string;
dc810e39 1223 unsigned int tagv = dyn.d_un.d_val;
252b5132 1224
dc810e39 1225 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1226 if (string == NULL)
1227 goto error_return;
1228 fprintf (f, "%s", string);
1229 }
1230 fprintf (f, "\n");
1231 }
1232
1233 free (dynbuf);
1234 dynbuf = NULL;
1235 }
1236
1237 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1238 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1239 {
fc0e6df6 1240 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1241 return FALSE;
252b5132
RH
1242 }
1243
1244 if (elf_dynverdef (abfd) != 0)
1245 {
1246 Elf_Internal_Verdef *t;
1247
1248 fprintf (f, _("\nVersion definitions:\n"));
1249 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1250 {
1251 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1252 t->vd_flags, t->vd_hash,
1253 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1254 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1255 {
1256 Elf_Internal_Verdaux *a;
1257
1258 fprintf (f, "\t");
1259 for (a = t->vd_auxptr->vda_nextptr;
1260 a != NULL;
1261 a = a->vda_nextptr)
d0fb9a8d
JJ
1262 fprintf (f, "%s ",
1263 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1264 fprintf (f, "\n");
1265 }
1266 }
1267 }
1268
1269 if (elf_dynverref (abfd) != 0)
1270 {
1271 Elf_Internal_Verneed *t;
1272
1273 fprintf (f, _("\nVersion References:\n"));
1274 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1275 {
1276 Elf_Internal_Vernaux *a;
1277
d0fb9a8d
JJ
1278 fprintf (f, _(" required from %s:\n"),
1279 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1280 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1281 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1282 a->vna_flags, a->vna_other,
1283 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1284 }
1285 }
1286
b34976b6 1287 return TRUE;
252b5132
RH
1288
1289 error_return:
1290 if (dynbuf != NULL)
1291 free (dynbuf);
b34976b6 1292 return FALSE;
252b5132
RH
1293}
1294
1295/* Display ELF-specific fields of a symbol. */
1296
1297void
217aa764
AM
1298bfd_elf_print_symbol (bfd *abfd,
1299 void *filep,
1300 asymbol *symbol,
1301 bfd_print_symbol_type how)
252b5132 1302{
217aa764 1303 FILE *file = filep;
252b5132
RH
1304 switch (how)
1305 {
1306 case bfd_print_symbol_name:
1307 fprintf (file, "%s", symbol->name);
1308 break;
1309 case bfd_print_symbol_more:
1310 fprintf (file, "elf ");
60b89a18 1311 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1312 fprintf (file, " %lx", (long) symbol->flags);
1313 break;
1314 case bfd_print_symbol_all:
1315 {
4e8a9624
AM
1316 const char *section_name;
1317 const char *name = NULL;
9c5bfbb7 1318 const struct elf_backend_data *bed;
7a13edea 1319 unsigned char st_other;
dbb410c3 1320 bfd_vma val;
c044fabd 1321
252b5132 1322 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1323
1324 bed = get_elf_backend_data (abfd);
1325 if (bed->elf_backend_print_symbol_all)
c044fabd 1326 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1327
1328 if (name == NULL)
1329 {
7ee38065 1330 name = symbol->name;
217aa764 1331 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1332 }
1333
252b5132
RH
1334 fprintf (file, " %s\t", section_name);
1335 /* Print the "other" value for a symbol. For common symbols,
1336 we've already printed the size; now print the alignment.
1337 For other symbols, we have no specified alignment, and
1338 we've printed the address; now print the size. */
dbb410c3
AM
1339 if (bfd_is_com_section (symbol->section))
1340 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1341 else
1342 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1343 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1344
1345 /* If we have version information, print it. */
1346 if (elf_tdata (abfd)->dynversym_section != 0
1347 && (elf_tdata (abfd)->dynverdef_section != 0
1348 || elf_tdata (abfd)->dynverref_section != 0))
1349 {
1350 unsigned int vernum;
1351 const char *version_string;
1352
1353 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1354
1355 if (vernum == 0)
1356 version_string = "";
1357 else if (vernum == 1)
1358 version_string = "Base";
1359 else if (vernum <= elf_tdata (abfd)->cverdefs)
1360 version_string =
1361 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1362 else
1363 {
1364 Elf_Internal_Verneed *t;
1365
1366 version_string = "";
1367 for (t = elf_tdata (abfd)->verref;
1368 t != NULL;
1369 t = t->vn_nextref)
1370 {
1371 Elf_Internal_Vernaux *a;
1372
1373 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1374 {
1375 if (a->vna_other == vernum)
1376 {
1377 version_string = a->vna_nodename;
1378 break;
1379 }
1380 }
1381 }
1382 }
1383
1384 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1385 fprintf (file, " %-11s", version_string);
1386 else
1387 {
1388 int i;
1389
1390 fprintf (file, " (%s)", version_string);
1391 for (i = 10 - strlen (version_string); i > 0; --i)
1392 putc (' ', file);
1393 }
1394 }
1395
1396 /* If the st_other field is not zero, print it. */
7a13edea 1397 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1398
7a13edea
NC
1399 switch (st_other)
1400 {
1401 case 0: break;
1402 case STV_INTERNAL: fprintf (file, " .internal"); break;
1403 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1404 case STV_PROTECTED: fprintf (file, " .protected"); break;
1405 default:
1406 /* Some other non-defined flags are also present, so print
1407 everything hex. */
1408 fprintf (file, " 0x%02x", (unsigned int) st_other);
1409 }
252b5132 1410
587ff49e 1411 fprintf (file, " %s", name);
252b5132
RH
1412 }
1413 break;
1414 }
1415}
1416\f
1417/* Create an entry in an ELF linker hash table. */
1418
1419struct bfd_hash_entry *
217aa764
AM
1420_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1421 struct bfd_hash_table *table,
1422 const char *string)
252b5132 1423{
252b5132
RH
1424 /* Allocate the structure if it has not already been allocated by a
1425 subclass. */
51b64d56
AM
1426 if (entry == NULL)
1427 {
1428 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1429 if (entry == NULL)
1430 return entry;
1431 }
252b5132
RH
1432
1433 /* Call the allocation method of the superclass. */
51b64d56
AM
1434 entry = _bfd_link_hash_newfunc (entry, table, string);
1435 if (entry != NULL)
252b5132 1436 {
51b64d56
AM
1437 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1438 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1439
252b5132
RH
1440 /* Set local fields. */
1441 ret->indx = -1;
252b5132 1442 ret->dynindx = -1;
a6aa5195
AM
1443 ret->got = htab->init_got_refcount;
1444 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1445 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1446 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1447 /* Assume that we have been called by a non-ELF symbol reader.
1448 This flag is then reset by the code which reads an ELF input
1449 file. This ensures that a symbol created by a non-ELF symbol
1450 reader will have the flag set correctly. */
f5385ebf 1451 ret->non_elf = 1;
252b5132
RH
1452 }
1453
51b64d56 1454 return entry;
252b5132
RH
1455}
1456
2920b85c 1457/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1458 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1459
c61b8717 1460void
fcfa13d2 1461_bfd_elf_link_hash_copy_indirect (struct bfd_link_info *info,
217aa764
AM
1462 struct elf_link_hash_entry *dir,
1463 struct elf_link_hash_entry *ind)
2920b85c 1464{
fcfa13d2 1465 struct elf_link_hash_table *htab;
3c3e9281 1466
2920b85c
RH
1467 /* Copy down any references that we may have already seen to the
1468 symbol which just became indirect. */
1469
f5385ebf
AM
1470 dir->ref_dynamic |= ind->ref_dynamic;
1471 dir->ref_regular |= ind->ref_regular;
1472 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1473 dir->non_got_ref |= ind->non_got_ref;
1474 dir->needs_plt |= ind->needs_plt;
1475 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1476
1e370bd2 1477 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1478 return;
1479
51b64d56 1480 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1481 These may have been already set up by a check_relocs routine. */
fcfa13d2
AM
1482 htab = elf_hash_table (info);
1483 if (ind->got.refcount > htab->init_got_refcount.refcount)
2920b85c 1484 {
fcfa13d2
AM
1485 if (dir->got.refcount < 0)
1486 dir->got.refcount = 0;
1487 dir->got.refcount += ind->got.refcount;
1488 ind->got.refcount = htab->init_got_refcount.refcount;
2920b85c 1489 }
2920b85c 1490
fcfa13d2 1491 if (ind->plt.refcount > htab->init_plt_refcount.refcount)
2920b85c 1492 {
fcfa13d2
AM
1493 if (dir->plt.refcount < 0)
1494 dir->plt.refcount = 0;
1495 dir->plt.refcount += ind->plt.refcount;
1496 ind->plt.refcount = htab->init_plt_refcount.refcount;
2920b85c 1497 }
2920b85c 1498
fcfa13d2 1499 if (ind->dynindx != -1)
2920b85c 1500 {
fcfa13d2
AM
1501 if (dir->dynindx != -1)
1502 _bfd_elf_strtab_delref (htab->dynstr, dir->dynstr_index);
2920b85c
RH
1503 dir->dynindx = ind->dynindx;
1504 dir->dynstr_index = ind->dynstr_index;
1505 ind->dynindx = -1;
1506 ind->dynstr_index = 0;
1507 }
2920b85c
RH
1508}
1509
c61b8717 1510void
217aa764
AM
1511_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1512 struct elf_link_hash_entry *h,
1513 bfd_boolean force_local)
2920b85c 1514{
a6aa5195 1515 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1516 h->needs_plt = 0;
e5094212
AM
1517 if (force_local)
1518 {
f5385ebf 1519 h->forced_local = 1;
e5094212
AM
1520 if (h->dynindx != -1)
1521 {
1522 h->dynindx = -1;
1523 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1524 h->dynstr_index);
1525 }
1526 }
2920b85c
RH
1527}
1528
252b5132
RH
1529/* Initialize an ELF linker hash table. */
1530
b34976b6 1531bfd_boolean
217aa764
AM
1532_bfd_elf_link_hash_table_init
1533 (struct elf_link_hash_table *table,
1534 bfd *abfd,
1535 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1536 struct bfd_hash_table *,
1537 const char *))
252b5132 1538{
b34976b6 1539 bfd_boolean ret;
a6aa5195 1540 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1541
b34976b6 1542 table->dynamic_sections_created = FALSE;
252b5132 1543 table->dynobj = NULL;
a6aa5195
AM
1544 table->init_got_refcount.refcount = can_refcount - 1;
1545 table->init_plt_refcount.refcount = can_refcount - 1;
1546 table->init_got_offset.offset = -(bfd_vma) 1;
1547 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1548 /* The first dynamic symbol is a dummy. */
1549 table->dynsymcount = 1;
1550 table->dynstr = NULL;
1551 table->bucketcount = 0;
1552 table->needed = NULL;
1553 table->hgot = NULL;
f5fa8ca2 1554 table->merge_info = NULL;
3722b82f 1555 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1556 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1557 table->dynlocal = NULL;
73722af0 1558 table->runpath = NULL;
e1918d23
AM
1559 table->tls_sec = NULL;
1560 table->tls_size = 0;
73722af0 1561 table->loaded = NULL;
67687978 1562 table->is_relocatable_executable = FALSE;
73722af0
AM
1563
1564 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc);
8ea2e4bd
NC
1565 table->root.type = bfd_link_elf_hash_table;
1566
1567 return ret;
252b5132
RH
1568}
1569
1570/* Create an ELF linker hash table. */
1571
1572struct bfd_link_hash_table *
217aa764 1573_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1574{
1575 struct elf_link_hash_table *ret;
dc810e39 1576 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1577
217aa764
AM
1578 ret = bfd_malloc (amt);
1579 if (ret == NULL)
252b5132
RH
1580 return NULL;
1581
1582 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc))
1583 {
e2d34d7d 1584 free (ret);
252b5132
RH
1585 return NULL;
1586 }
1587
1588 return &ret->root;
1589}
1590
1591/* This is a hook for the ELF emulation code in the generic linker to
1592 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1593 entry for a dynamic object. */
252b5132
RH
1594
1595void
217aa764 1596bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1597{
1598 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1599 && bfd_get_format (abfd) == bfd_object)
1600 elf_dt_name (abfd) = name;
1601}
1602
e56f61be
L
1603int
1604bfd_elf_get_dyn_lib_class (bfd *abfd)
1605{
1606 int lib_class;
1607 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1608 && bfd_get_format (abfd) == bfd_object)
1609 lib_class = elf_dyn_lib_class (abfd);
1610 else
1611 lib_class = 0;
1612 return lib_class;
1613}
1614
74816898 1615void
4a43e768 1616bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1617{
1618 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1619 && bfd_get_format (abfd) == bfd_object)
4a43e768 1620 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1621}
1622
252b5132
RH
1623/* Get the list of DT_NEEDED entries for a link. This is a hook for
1624 the linker ELF emulation code. */
1625
1626struct bfd_link_needed_list *
217aa764
AM
1627bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1628 struct bfd_link_info *info)
252b5132 1629{
0eddce27 1630 if (! is_elf_hash_table (info->hash))
252b5132
RH
1631 return NULL;
1632 return elf_hash_table (info)->needed;
1633}
1634
a963dc6a
L
1635/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1636 hook for the linker ELF emulation code. */
1637
1638struct bfd_link_needed_list *
217aa764
AM
1639bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1640 struct bfd_link_info *info)
a963dc6a 1641{
0eddce27 1642 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1643 return NULL;
1644 return elf_hash_table (info)->runpath;
1645}
1646
252b5132
RH
1647/* Get the name actually used for a dynamic object for a link. This
1648 is the SONAME entry if there is one. Otherwise, it is the string
1649 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1650
1651const char *
217aa764 1652bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1653{
1654 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1655 && bfd_get_format (abfd) == bfd_object)
1656 return elf_dt_name (abfd);
1657 return NULL;
1658}
1659
1660/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1661 the ELF linker emulation code. */
1662
b34976b6 1663bfd_boolean
217aa764
AM
1664bfd_elf_get_bfd_needed_list (bfd *abfd,
1665 struct bfd_link_needed_list **pneeded)
252b5132
RH
1666{
1667 asection *s;
1668 bfd_byte *dynbuf = NULL;
1669 int elfsec;
dc810e39 1670 unsigned long shlink;
252b5132
RH
1671 bfd_byte *extdyn, *extdynend;
1672 size_t extdynsize;
217aa764 1673 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1674
1675 *pneeded = NULL;
1676
1677 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1678 || bfd_get_format (abfd) != bfd_object)
b34976b6 1679 return TRUE;
252b5132
RH
1680
1681 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1682 if (s == NULL || s->size == 0)
b34976b6 1683 return TRUE;
252b5132 1684
eea6121a 1685 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1686 goto error_return;
1687
1688 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1689 if (elfsec == -1)
1690 goto error_return;
1691
dc810e39 1692 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1693
1694 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1695 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1696
1697 extdyn = dynbuf;
eea6121a 1698 extdynend = extdyn + s->size;
252b5132
RH
1699 for (; extdyn < extdynend; extdyn += extdynsize)
1700 {
1701 Elf_Internal_Dyn dyn;
1702
217aa764 1703 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1704
1705 if (dyn.d_tag == DT_NULL)
1706 break;
1707
1708 if (dyn.d_tag == DT_NEEDED)
1709 {
1710 const char *string;
1711 struct bfd_link_needed_list *l;
dc810e39
AM
1712 unsigned int tagv = dyn.d_un.d_val;
1713 bfd_size_type amt;
252b5132 1714
dc810e39 1715 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1716 if (string == NULL)
1717 goto error_return;
1718
dc810e39 1719 amt = sizeof *l;
217aa764 1720 l = bfd_alloc (abfd, amt);
252b5132
RH
1721 if (l == NULL)
1722 goto error_return;
1723
1724 l->by = abfd;
1725 l->name = string;
1726 l->next = *pneeded;
1727 *pneeded = l;
1728 }
1729 }
1730
1731 free (dynbuf);
1732
b34976b6 1733 return TRUE;
252b5132
RH
1734
1735 error_return:
1736 if (dynbuf != NULL)
1737 free (dynbuf);
b34976b6 1738 return FALSE;
252b5132
RH
1739}
1740\f
1741/* Allocate an ELF string table--force the first byte to be zero. */
1742
1743struct bfd_strtab_hash *
217aa764 1744_bfd_elf_stringtab_init (void)
252b5132
RH
1745{
1746 struct bfd_strtab_hash *ret;
1747
1748 ret = _bfd_stringtab_init ();
1749 if (ret != NULL)
1750 {
1751 bfd_size_type loc;
1752
b34976b6 1753 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1754 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1755 if (loc == (bfd_size_type) -1)
1756 {
1757 _bfd_stringtab_free (ret);
1758 ret = NULL;
1759 }
1760 }
1761 return ret;
1762}
1763\f
1764/* ELF .o/exec file reading */
1765
c044fabd 1766/* Create a new bfd section from an ELF section header. */
252b5132 1767
b34976b6 1768bfd_boolean
217aa764 1769bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1770{
1771 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1772 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1773 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1774 const char *name;
252b5132 1775
1b3a8575
AM
1776 name = bfd_elf_string_from_elf_section (abfd,
1777 elf_elfheader (abfd)->e_shstrndx,
1778 hdr->sh_name);
933d961a
JJ
1779 if (name == NULL)
1780 return FALSE;
252b5132
RH
1781
1782 switch (hdr->sh_type)
1783 {
1784 case SHT_NULL:
1785 /* Inactive section. Throw it away. */
b34976b6 1786 return TRUE;
252b5132
RH
1787
1788 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1789 case SHT_NOBITS: /* .bss section. */
1790 case SHT_HASH: /* .hash section. */
1791 case SHT_NOTE: /* .note section. */
25e27870
L
1792 case SHT_INIT_ARRAY: /* .init_array section. */
1793 case SHT_FINI_ARRAY: /* .fini_array section. */
1794 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1795 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1796 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1797
797fc050 1798 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1799 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1800 return FALSE;
8e0ed13f
NC
1801 if (hdr->sh_link > elf_numsections (abfd)
1802 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1803 return FALSE;
797fc050
AM
1804 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1805 {
1806 Elf_Internal_Shdr *dynsymhdr;
1807
1808 /* The shared libraries distributed with hpux11 have a bogus
1809 sh_link field for the ".dynamic" section. Find the
1810 string table for the ".dynsym" section instead. */
1811 if (elf_dynsymtab (abfd) != 0)
1812 {
1813 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1814 hdr->sh_link = dynsymhdr->sh_link;
1815 }
1816 else
1817 {
1818 unsigned int i, num_sec;
1819
1820 num_sec = elf_numsections (abfd);
1821 for (i = 1; i < num_sec; i++)
1822 {
1823 dynsymhdr = elf_elfsections (abfd)[i];
1824 if (dynsymhdr->sh_type == SHT_DYNSYM)
1825 {
1826 hdr->sh_link = dynsymhdr->sh_link;
1827 break;
1828 }
1829 }
1830 }
1831 }
1832 break;
1833
252b5132
RH
1834 case SHT_SYMTAB: /* A symbol table */
1835 if (elf_onesymtab (abfd) == shindex)
b34976b6 1836 return TRUE;
252b5132 1837
a50b2160
JJ
1838 if (hdr->sh_entsize != bed->s->sizeof_sym)
1839 return FALSE;
252b5132
RH
1840 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1841 elf_onesymtab (abfd) = shindex;
1842 elf_tdata (abfd)->symtab_hdr = *hdr;
1843 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1844 abfd->flags |= HAS_SYMS;
1845
1846 /* Sometimes a shared object will map in the symbol table. If
1847 SHF_ALLOC is set, and this is a shared object, then we also
1848 treat this section as a BFD section. We can not base the
1849 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1850 set in a relocatable object file, which would confuse the
252b5132
RH
1851 linker. */
1852 if ((hdr->sh_flags & SHF_ALLOC) != 0
1853 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1854 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1855 shindex))
b34976b6 1856 return FALSE;
252b5132 1857
1b3a8575
AM
1858 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1859 can't read symbols without that section loaded as well. It
1860 is most likely specified by the next section header. */
1861 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1862 {
1863 unsigned int i, num_sec;
1864
1865 num_sec = elf_numsections (abfd);
1866 for (i = shindex + 1; i < num_sec; i++)
1867 {
1868 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1869 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1870 && hdr2->sh_link == shindex)
1871 break;
1872 }
1873 if (i == num_sec)
1874 for (i = 1; i < shindex; i++)
1875 {
1876 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1877 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1878 && hdr2->sh_link == shindex)
1879 break;
1880 }
1881 if (i != shindex)
1882 return bfd_section_from_shdr (abfd, i);
1883 }
b34976b6 1884 return TRUE;
252b5132
RH
1885
1886 case SHT_DYNSYM: /* A dynamic symbol table */
1887 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1888 return TRUE;
252b5132 1889
a50b2160
JJ
1890 if (hdr->sh_entsize != bed->s->sizeof_sym)
1891 return FALSE;
252b5132
RH
1892 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1893 elf_dynsymtab (abfd) = shindex;
1894 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1895 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1896 abfd->flags |= HAS_SYMS;
1897
1898 /* Besides being a symbol table, we also treat this as a regular
1899 section, so that objcopy can handle it. */
6dc132d9 1900 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1901
9ad5cbcf
AM
1902 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1903 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1904 return TRUE;
9ad5cbcf 1905
1b3a8575 1906 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1907 elf_symtab_shndx (abfd) = shindex;
1908 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1909 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1910 return TRUE;
9ad5cbcf 1911
252b5132
RH
1912 case SHT_STRTAB: /* A string table */
1913 if (hdr->bfd_section != NULL)
b34976b6 1914 return TRUE;
252b5132
RH
1915 if (ehdr->e_shstrndx == shindex)
1916 {
1917 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1918 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1919 return TRUE;
252b5132 1920 }
1b3a8575
AM
1921 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1922 {
1923 symtab_strtab:
1924 elf_tdata (abfd)->strtab_hdr = *hdr;
1925 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1926 return TRUE;
1927 }
1928 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1929 {
1930 dynsymtab_strtab:
1931 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1932 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1933 elf_elfsections (abfd)[shindex] = hdr;
1934 /* We also treat this as a regular section, so that objcopy
1935 can handle it. */
6dc132d9
L
1936 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1937 shindex);
1b3a8575 1938 }
252b5132 1939
1b3a8575
AM
1940 /* If the string table isn't one of the above, then treat it as a
1941 regular section. We need to scan all the headers to be sure,
1942 just in case this strtab section appeared before the above. */
1943 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1944 {
1945 unsigned int i, num_sec;
252b5132 1946
1b3a8575
AM
1947 num_sec = elf_numsections (abfd);
1948 for (i = 1; i < num_sec; i++)
1949 {
1950 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1951 if (hdr2->sh_link == shindex)
1952 {
933d961a
JJ
1953 /* Prevent endless recursion on broken objects. */
1954 if (i == shindex)
1955 return FALSE;
1b3a8575
AM
1956 if (! bfd_section_from_shdr (abfd, i))
1957 return FALSE;
1958 if (elf_onesymtab (abfd) == i)
1959 goto symtab_strtab;
1960 if (elf_dynsymtab (abfd) == i)
1961 goto dynsymtab_strtab;
1962 }
1963 }
1964 }
6dc132d9 1965 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1966
1967 case SHT_REL:
1968 case SHT_RELA:
1969 /* *These* do a lot of work -- but build no sections! */
1970 {
1971 asection *target_sect;
1972 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1973 unsigned int num_sec = elf_numsections (abfd);
252b5132 1974
aa2ca951
JJ
1975 if (hdr->sh_entsize
1976 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1977 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1978 return FALSE;
1979
03ae5f59 1980 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1981 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1982 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1983 {
1984 ((*_bfd_error_handler)
d003868e
AM
1985 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1986 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1987 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1988 shindex);
03ae5f59
ILT
1989 }
1990
252b5132
RH
1991 /* For some incomprehensible reason Oracle distributes
1992 libraries for Solaris in which some of the objects have
1993 bogus sh_link fields. It would be nice if we could just
1994 reject them, but, unfortunately, some people need to use
1995 them. We scan through the section headers; if we find only
1996 one suitable symbol table, we clobber the sh_link to point
1997 to it. I hope this doesn't break anything. */
1998 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1999 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2000 {
9ad5cbcf 2001 unsigned int scan;
252b5132
RH
2002 int found;
2003
2004 found = 0;
9ad5cbcf 2005 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2006 {
2007 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2008 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2009 {
2010 if (found != 0)
2011 {
2012 found = 0;
2013 break;
2014 }
2015 found = scan;
2016 }
2017 }
2018 if (found != 0)
2019 hdr->sh_link = found;
2020 }
2021
2022 /* Get the symbol table. */
1b3a8575
AM
2023 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2024 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2025 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 2026 return FALSE;
252b5132
RH
2027
2028 /* If this reloc section does not use the main symbol table we
2029 don't treat it as a reloc section. BFD can't adequately
2030 represent such a section, so at least for now, we don't
c044fabd 2031 try. We just present it as a normal section. We also
60bcf0fa 2032 can't use it as a reloc section if it points to the null
c044fabd 2033 section. */
60bcf0fa 2034 if (hdr->sh_link != elf_onesymtab (abfd) || hdr->sh_info == SHN_UNDEF)
6dc132d9
L
2035 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2036 shindex);
252b5132 2037
a50b2160
JJ
2038 /* Prevent endless recursion on broken objects. */
2039 if (elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2040 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2041 return FALSE;
252b5132 2042 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2043 return FALSE;
252b5132
RH
2044 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2045 if (target_sect == NULL)
b34976b6 2046 return FALSE;
252b5132
RH
2047
2048 if ((target_sect->flags & SEC_RELOC) == 0
2049 || target_sect->reloc_count == 0)
2050 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2051 else
2052 {
dc810e39 2053 bfd_size_type amt;
252b5132 2054 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2055 amt = sizeof (*hdr2);
217aa764 2056 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2057 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2058 }
2059 *hdr2 = *hdr;
2060 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2061 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2062 target_sect->flags |= SEC_RELOC;
2063 target_sect->relocation = NULL;
2064 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2065 /* In the section to which the relocations apply, mark whether
2066 its relocations are of the REL or RELA variety. */
72730e0c 2067 if (hdr->sh_size != 0)
68bfbfcc 2068 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2069 abfd->flags |= HAS_RELOC;
b34976b6 2070 return TRUE;
252b5132
RH
2071 }
2072 break;
2073
2074 case SHT_GNU_verdef:
2075 elf_dynverdef (abfd) = shindex;
2076 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2077 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2078 break;
2079
2080 case SHT_GNU_versym:
a50b2160
JJ
2081 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2082 return FALSE;
252b5132
RH
2083 elf_dynversym (abfd) = shindex;
2084 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2085 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2086 break;
2087
2088 case SHT_GNU_verneed:
2089 elf_dynverref (abfd) = shindex;
2090 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2091 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2092 break;
2093
2094 case SHT_SHLIB:
b34976b6 2095 return TRUE;
252b5132 2096
dbb410c3 2097 case SHT_GROUP:
b885599b
AM
2098 /* We need a BFD section for objcopy and relocatable linking,
2099 and it's handy to have the signature available as the section
2100 name. */
a50b2160
JJ
2101 if (hdr->sh_entsize != GRP_ENTRY_SIZE)
2102 return FALSE;
b885599b
AM
2103 name = group_signature (abfd, hdr);
2104 if (name == NULL)
b34976b6 2105 return FALSE;
6dc132d9 2106 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2107 return FALSE;
dbb410c3
AM
2108 if (hdr->contents != NULL)
2109 {
2110 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2111 unsigned int n_elt = hdr->sh_size / 4;
2112 asection *s;
2113
b885599b
AM
2114 if (idx->flags & GRP_COMDAT)
2115 hdr->bfd_section->flags
2116 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2117
45c5e9ed
L
2118 /* We try to keep the same section order as it comes in. */
2119 idx += n_elt;
dbb410c3 2120 while (--n_elt != 0)
45c5e9ed 2121 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2122 && elf_next_in_group (s) != NULL)
dbb410c3 2123 {
945906ff 2124 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2125 break;
2126 }
2127 }
2128 break;
2129
252b5132
RH
2130 default:
2131 /* Check for any processor-specific section types. */
6dc132d9
L
2132 return bed->elf_backend_section_from_shdr (abfd, hdr, name,
2133 shindex);
252b5132
RH
2134 }
2135
b34976b6 2136 return TRUE;
252b5132
RH
2137}
2138
ec338859
AM
2139/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2140 Return SEC for sections that have no elf section, and NULL on error. */
2141
2142asection *
217aa764
AM
2143bfd_section_from_r_symndx (bfd *abfd,
2144 struct sym_sec_cache *cache,
2145 asection *sec,
2146 unsigned long r_symndx)
ec338859 2147{
ec338859 2148 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2149 unsigned char esym[sizeof (Elf64_External_Sym)];
2150 Elf_External_Sym_Shndx eshndx;
2151 Elf_Internal_Sym isym;
ec338859
AM
2152 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2153
2154 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2155 return cache->sec[ent];
2156
2157 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2158 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2159 &isym, esym, &eshndx) == NULL)
ec338859 2160 return NULL;
9ad5cbcf 2161
ec338859
AM
2162 if (cache->abfd != abfd)
2163 {
2164 memset (cache->indx, -1, sizeof (cache->indx));
2165 cache->abfd = abfd;
2166 }
2167 cache->indx[ent] = r_symndx;
2168 cache->sec[ent] = sec;
50bc7936
AM
2169 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2170 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2171 {
2172 asection *s;
6cdc0ccc 2173 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2174 if (s != NULL)
2175 cache->sec[ent] = s;
2176 }
2177 return cache->sec[ent];
2178}
2179
252b5132
RH
2180/* Given an ELF section number, retrieve the corresponding BFD
2181 section. */
2182
2183asection *
217aa764 2184bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2185{
9ad5cbcf 2186 if (index >= elf_numsections (abfd))
252b5132
RH
2187 return NULL;
2188 return elf_elfsections (abfd)[index]->bfd_section;
2189}
2190
b35d266b 2191static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2192{
7dcb9820 2193 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7f4d3958
L
2194 { NULL, 0, 0, 0, 0 }
2195};
2196
b35d266b 2197static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2198{
7dcb9820 2199 { ".comment", 8, 0, SHT_PROGBITS, 0 },
7f4d3958
L
2200 { NULL, 0, 0, 0, 0 }
2201};
2202
b35d266b 2203static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2204{
7dcb9820
AM
2205 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2206 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2207 { ".debug", 6, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2208 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2209 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2210 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2211 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2212 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2213 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2214 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
7f4d3958
L
2215 { NULL, 0, 0, 0, 0 }
2216};
2217
b35d266b 2218static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958
L
2219{
2220 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2221 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2222 { NULL, 0, 0, 0, 0 }
2223};
2224
b35d266b 2225static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958
L
2226{
2227 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820 2228 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2229 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2230 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2231 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
7f4d3958
L
2232 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2233 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
2234 { NULL, 0, 0, 0, 0 }
2235};
2236
b35d266b 2237static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958
L
2238{
2239 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2240 { NULL, 0, 0, 0, 0 }
2241};
2242
b35d266b 2243static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958
L
2244{
2245 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2246 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2247 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2248 { NULL, 0, 0, 0, 0 }
2249};
2250
b35d266b 2251static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958
L
2252{
2253 { ".line", 5, 0, SHT_PROGBITS, 0 },
2254 { NULL, 0, 0, 0, 0 }
2255};
2256
b35d266b 2257static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2258{
45c5e9ed 2259 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820 2260 { ".note", 5, -1, SHT_NOTE, 0 },
7f4d3958
L
2261 { NULL, 0, 0, 0, 0 }
2262};
2263
b35d266b 2264static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958
L
2265{
2266 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2267 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2268 { NULL, 0, 0, 0, 0 }
2269};
2270
b35d266b 2271static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958
L
2272{
2273 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2274 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
7dcb9820
AM
2275 { ".rela", 5, -1, SHT_RELA, 0 },
2276 { ".rel", 4, -1, SHT_REL, 0 },
7f4d3958
L
2277 { NULL, 0, 0, 0, 0 }
2278};
2279
b35d266b 2280static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958
L
2281{
2282 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2283 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2284 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
7dcb9820
AM
2285 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2286 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2287};
2288
b35d266b 2289static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958
L
2290{
2291 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2292 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2293 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2294 { NULL, 0, 0, 0, 0 }
2295};
2296
b35d266b 2297static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2298{
7f4d3958
L
2299 special_sections_b, /* 'b' */
2300 special_sections_c, /* 'b' */
2301 special_sections_d, /* 'd' */
2302 NULL, /* 'e' */
2303 special_sections_f, /* 'f' */
2304 special_sections_g, /* 'g' */
2305 special_sections_h, /* 'h' */
2306 special_sections_i, /* 'i' */
2307 NULL, /* 'j' */
2308 NULL, /* 'k' */
2309 special_sections_l, /* 'l' */
2310 NULL, /* 'm' */
2311 special_sections_n, /* 'n' */
2312 NULL, /* 'o' */
2313 special_sections_p, /* 'p' */
2314 NULL, /* 'q' */
2315 special_sections_r, /* 'r' */
2316 special_sections_s, /* 's' */
2317 special_sections_t, /* 't' */
7f4d3958
L
2318};
2319
551b43fd
AM
2320const struct bfd_elf_special_section *
2321_bfd_elf_get_special_section (const char *name,
2322 const struct bfd_elf_special_section *spec,
2323 unsigned int rela)
2f89ff8d
L
2324{
2325 int i;
7f4d3958 2326 int len;
7f4d3958 2327
551b43fd 2328 len = strlen (name);
7f4d3958 2329
551b43fd 2330 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2331 {
2332 int suffix_len;
551b43fd 2333 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2334
2335 if (len < prefix_len)
2336 continue;
551b43fd 2337 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2338 continue;
2339
551b43fd 2340 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2341 if (suffix_len <= 0)
2342 {
2343 if (name[prefix_len] != 0)
2344 {
2345 if (suffix_len == 0)
2346 continue;
2347 if (name[prefix_len] != '.'
2348 && (suffix_len == -2
551b43fd 2349 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2350 continue;
2351 }
2352 }
2353 else
2354 {
2355 if (len < prefix_len + suffix_len)
2356 continue;
2357 if (memcmp (name + len - suffix_len,
551b43fd 2358 spec[i].prefix + prefix_len,
7dcb9820
AM
2359 suffix_len) != 0)
2360 continue;
2361 }
551b43fd 2362 return &spec[i];
7dcb9820 2363 }
2f89ff8d
L
2364
2365 return NULL;
2366}
2367
7dcb9820 2368const struct bfd_elf_special_section *
29ef7005 2369_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2370{
551b43fd
AM
2371 int i;
2372 const struct bfd_elf_special_section *spec;
29ef7005 2373 const struct elf_backend_data *bed;
2f89ff8d
L
2374
2375 /* See if this is one of the special sections. */
551b43fd
AM
2376 if (sec->name == NULL)
2377 return NULL;
2f89ff8d 2378
29ef7005
L
2379 bed = get_elf_backend_data (abfd);
2380 spec = bed->special_sections;
2381 if (spec)
2382 {
2383 spec = _bfd_elf_get_special_section (sec->name,
2384 bed->special_sections,
2385 sec->use_rela_p);
2386 if (spec != NULL)
2387 return spec;
2388 }
2389
551b43fd
AM
2390 if (sec->name[0] != '.')
2391 return NULL;
2f89ff8d 2392
551b43fd
AM
2393 i = sec->name[1] - 'b';
2394 if (i < 0 || i > 't' - 'b')
2395 return NULL;
2396
2397 spec = special_sections[i];
2f89ff8d 2398
551b43fd
AM
2399 if (spec == NULL)
2400 return NULL;
2401
2402 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2403}
2404
b34976b6 2405bfd_boolean
217aa764 2406_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2407{
2408 struct bfd_elf_section_data *sdata;
551b43fd 2409 const struct elf_backend_data *bed;
7dcb9820 2410 const struct bfd_elf_special_section *ssect;
252b5132 2411
f0abc2a1
AM
2412 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2413 if (sdata == NULL)
2414 {
217aa764 2415 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2416 if (sdata == NULL)
2417 return FALSE;
217aa764 2418 sec->used_by_bfd = sdata;
f0abc2a1 2419 }
bf572ba0 2420
551b43fd
AM
2421 /* Indicate whether or not this section should use RELA relocations. */
2422 bed = get_elf_backend_data (abfd);
2423 sec->use_rela_p = bed->default_use_rela_p;
2424
3496cb2a
L
2425 /* When we read a file, we don't need section type and flags unless
2426 it is a linker created section. They will be overridden in
2427 _bfd_elf_make_section_from_shdr anyway. */
2428 if (abfd->direction != read_direction
2429 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2430 {
551b43fd 2431 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2432 if (ssect != NULL)
2433 {
2434 elf_section_type (sec) = ssect->type;
2435 elf_section_flags (sec) = ssect->attr;
2436 }
2f89ff8d
L
2437 }
2438
b34976b6 2439 return TRUE;
252b5132
RH
2440}
2441
2442/* Create a new bfd section from an ELF program header.
2443
2444 Since program segments have no names, we generate a synthetic name
2445 of the form segment<NUM>, where NUM is generally the index in the
2446 program header table. For segments that are split (see below) we
2447 generate the names segment<NUM>a and segment<NUM>b.
2448
2449 Note that some program segments may have a file size that is different than
2450 (less than) the memory size. All this means is that at execution the
2451 system must allocate the amount of memory specified by the memory size,
2452 but only initialize it with the first "file size" bytes read from the
2453 file. This would occur for example, with program segments consisting
2454 of combined data+bss.
2455
2456 To handle the above situation, this routine generates TWO bfd sections
2457 for the single program segment. The first has the length specified by
2458 the file size of the segment, and the second has the length specified
2459 by the difference between the two sizes. In effect, the segment is split
2460 into it's initialized and uninitialized parts.
2461
2462 */
2463
b34976b6 2464bfd_boolean
217aa764
AM
2465_bfd_elf_make_section_from_phdr (bfd *abfd,
2466 Elf_Internal_Phdr *hdr,
2467 int index,
2468 const char *typename)
252b5132
RH
2469{
2470 asection *newsect;
2471 char *name;
2472 char namebuf[64];
d4c88bbb 2473 size_t len;
252b5132
RH
2474 int split;
2475
2476 split = ((hdr->p_memsz > 0)
2477 && (hdr->p_filesz > 0)
2478 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2479 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2480 len = strlen (namebuf) + 1;
217aa764 2481 name = bfd_alloc (abfd, len);
252b5132 2482 if (!name)
b34976b6 2483 return FALSE;
d4c88bbb 2484 memcpy (name, namebuf, len);
252b5132
RH
2485 newsect = bfd_make_section (abfd, name);
2486 if (newsect == NULL)
b34976b6 2487 return FALSE;
252b5132
RH
2488 newsect->vma = hdr->p_vaddr;
2489 newsect->lma = hdr->p_paddr;
eea6121a 2490 newsect->size = hdr->p_filesz;
252b5132
RH
2491 newsect->filepos = hdr->p_offset;
2492 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2493 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2494 if (hdr->p_type == PT_LOAD)
2495 {
2496 newsect->flags |= SEC_ALLOC;
2497 newsect->flags |= SEC_LOAD;
2498 if (hdr->p_flags & PF_X)
2499 {
2500 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2501 may be data. */
252b5132
RH
2502 newsect->flags |= SEC_CODE;
2503 }
2504 }
2505 if (!(hdr->p_flags & PF_W))
2506 {
2507 newsect->flags |= SEC_READONLY;
2508 }
2509
2510 if (split)
2511 {
27ac83bf 2512 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2513 len = strlen (namebuf) + 1;
217aa764 2514 name = bfd_alloc (abfd, len);
252b5132 2515 if (!name)
b34976b6 2516 return FALSE;
d4c88bbb 2517 memcpy (name, namebuf, len);
252b5132
RH
2518 newsect = bfd_make_section (abfd, name);
2519 if (newsect == NULL)
b34976b6 2520 return FALSE;
252b5132
RH
2521 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2522 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2523 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2524 if (hdr->p_type == PT_LOAD)
2525 {
2526 newsect->flags |= SEC_ALLOC;
2527 if (hdr->p_flags & PF_X)
2528 newsect->flags |= SEC_CODE;
2529 }
2530 if (!(hdr->p_flags & PF_W))
2531 newsect->flags |= SEC_READONLY;
2532 }
2533
b34976b6 2534 return TRUE;
252b5132
RH
2535}
2536
b34976b6 2537bfd_boolean
217aa764 2538bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2539{
9c5bfbb7 2540 const struct elf_backend_data *bed;
20cfcaae
NC
2541
2542 switch (hdr->p_type)
2543 {
2544 case PT_NULL:
2545 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2546
2547 case PT_LOAD:
2548 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2549
2550 case PT_DYNAMIC:
2551 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2552
2553 case PT_INTERP:
2554 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2555
2556 case PT_NOTE:
2557 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2558 return FALSE;
217aa764 2559 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2560 return FALSE;
2561 return TRUE;
20cfcaae
NC
2562
2563 case PT_SHLIB:
2564 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2565
2566 case PT_PHDR:
2567 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2568
811072d8
RM
2569 case PT_GNU_EH_FRAME:
2570 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2571 "eh_frame_hdr");
2572
9ee5e499
JJ
2573 case PT_GNU_STACK:
2574 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2575
8c37241b
JJ
2576 case PT_GNU_RELRO:
2577 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2578
20cfcaae 2579 default:
8c1acd09 2580 /* Check for any processor-specific program segment types. */
20cfcaae 2581 bed = get_elf_backend_data (abfd);
d27f5fa1 2582 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2583 }
2584}
2585
23bc299b 2586/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2587 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2588 relocations; otherwise, we use REL relocations. */
2589
b34976b6 2590bfd_boolean
217aa764
AM
2591_bfd_elf_init_reloc_shdr (bfd *abfd,
2592 Elf_Internal_Shdr *rel_hdr,
2593 asection *asect,
2594 bfd_boolean use_rela_p)
23bc299b
MM
2595{
2596 char *name;
9c5bfbb7 2597 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2598 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2599
dc810e39 2600 name = bfd_alloc (abfd, amt);
23bc299b 2601 if (name == NULL)
b34976b6 2602 return FALSE;
23bc299b
MM
2603 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2604 rel_hdr->sh_name =
2b0f7ef9 2605 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2606 FALSE);
23bc299b 2607 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2608 return FALSE;
23bc299b
MM
2609 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2610 rel_hdr->sh_entsize = (use_rela_p
2611 ? bed->s->sizeof_rela
2612 : bed->s->sizeof_rel);
45d6a902 2613 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2614 rel_hdr->sh_flags = 0;
2615 rel_hdr->sh_addr = 0;
2616 rel_hdr->sh_size = 0;
2617 rel_hdr->sh_offset = 0;
2618
b34976b6 2619 return TRUE;
23bc299b
MM
2620}
2621
252b5132
RH
2622/* Set up an ELF internal section header for a section. */
2623
252b5132 2624static void
217aa764 2625elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2626{
9c5bfbb7 2627 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2628 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2629 Elf_Internal_Shdr *this_hdr;
2630
2631 if (*failedptr)
2632 {
2633 /* We already failed; just get out of the bfd_map_over_sections
2634 loop. */
2635 return;
2636 }
2637
2638 this_hdr = &elf_section_data (asect)->this_hdr;
2639
e57b5356
AM
2640 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2641 asect->name, FALSE);
2642 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2643 {
b34976b6 2644 *failedptr = TRUE;
252b5132
RH
2645 return;
2646 }
2647
a4d8e49b 2648 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2649
2650 if ((asect->flags & SEC_ALLOC) != 0
2651 || asect->user_set_vma)
2652 this_hdr->sh_addr = asect->vma;
2653 else
2654 this_hdr->sh_addr = 0;
2655
2656 this_hdr->sh_offset = 0;
eea6121a 2657 this_hdr->sh_size = asect->size;
252b5132
RH
2658 this_hdr->sh_link = 0;
2659 this_hdr->sh_addralign = 1 << asect->alignment_power;
2660 /* The sh_entsize and sh_info fields may have been set already by
2661 copy_private_section_data. */
2662
2663 this_hdr->bfd_section = asect;
2664 this_hdr->contents = NULL;
2665
3cddba1e
L
2666 /* If the section type is unspecified, we set it based on
2667 asect->flags. */
2668 if (this_hdr->sh_type == SHT_NULL)
2669 {
45c5e9ed 2670 if ((asect->flags & SEC_GROUP) != 0)
ccd2ec6a 2671 this_hdr->sh_type = SHT_GROUP;
45c5e9ed 2672 else if ((asect->flags & SEC_ALLOC) != 0
3cddba1e
L
2673 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2674 || (asect->flags & SEC_NEVER_LOAD) != 0))
2675 this_hdr->sh_type = SHT_NOBITS;
2676 else
2677 this_hdr->sh_type = SHT_PROGBITS;
2678 }
2679
2f89ff8d 2680 switch (this_hdr->sh_type)
252b5132 2681 {
2f89ff8d 2682 default:
2f89ff8d
L
2683 break;
2684
2685 case SHT_STRTAB:
2686 case SHT_INIT_ARRAY:
2687 case SHT_FINI_ARRAY:
2688 case SHT_PREINIT_ARRAY:
2689 case SHT_NOTE:
2690 case SHT_NOBITS:
2691 case SHT_PROGBITS:
2692 break;
2693
2694 case SHT_HASH:
c7ac6ff8 2695 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2696 break;
5de3bf90 2697
2f89ff8d 2698 case SHT_DYNSYM:
252b5132 2699 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2700 break;
2701
2702 case SHT_DYNAMIC:
252b5132 2703 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2704 break;
2705
2706 case SHT_RELA:
2707 if (get_elf_backend_data (abfd)->may_use_rela_p)
2708 this_hdr->sh_entsize = bed->s->sizeof_rela;
2709 break;
2710
2711 case SHT_REL:
2712 if (get_elf_backend_data (abfd)->may_use_rel_p)
2713 this_hdr->sh_entsize = bed->s->sizeof_rel;
2714 break;
2715
2716 case SHT_GNU_versym:
252b5132 2717 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2718 break;
2719
2720 case SHT_GNU_verdef:
252b5132
RH
2721 this_hdr->sh_entsize = 0;
2722 /* objcopy or strip will copy over sh_info, but may not set
2723 cverdefs. The linker will set cverdefs, but sh_info will be
2724 zero. */
2725 if (this_hdr->sh_info == 0)
2726 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2727 else
2728 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2729 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2730 break;
2731
2732 case SHT_GNU_verneed:
252b5132
RH
2733 this_hdr->sh_entsize = 0;
2734 /* objcopy or strip will copy over sh_info, but may not set
2735 cverrefs. The linker will set cverrefs, but sh_info will be
2736 zero. */
2737 if (this_hdr->sh_info == 0)
2738 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2739 else
2740 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2741 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2742 break;
2743
2744 case SHT_GROUP:
dbb410c3 2745 this_hdr->sh_entsize = 4;
2f89ff8d 2746 break;
dbb410c3 2747 }
252b5132
RH
2748
2749 if ((asect->flags & SEC_ALLOC) != 0)
2750 this_hdr->sh_flags |= SHF_ALLOC;
2751 if ((asect->flags & SEC_READONLY) == 0)
2752 this_hdr->sh_flags |= SHF_WRITE;
2753 if ((asect->flags & SEC_CODE) != 0)
2754 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2755 if ((asect->flags & SEC_MERGE) != 0)
2756 {
2757 this_hdr->sh_flags |= SHF_MERGE;
2758 this_hdr->sh_entsize = asect->entsize;
2759 if ((asect->flags & SEC_STRINGS) != 0)
2760 this_hdr->sh_flags |= SHF_STRINGS;
2761 }
1126897b 2762 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2763 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2764 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2765 {
2766 this_hdr->sh_flags |= SHF_TLS;
eea6121a 2767 if (asect->size == 0 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60
JJ
2768 {
2769 struct bfd_link_order *o;
b34976b6 2770
704afa60 2771 this_hdr->sh_size = 0;
8423293d 2772 for (o = asect->map_head.link_order; o != NULL; o = o->next)
704afa60
JJ
2773 if (this_hdr->sh_size < o->offset + o->size)
2774 this_hdr->sh_size = o->offset + o->size;
2775 if (this_hdr->sh_size)
2776 this_hdr->sh_type = SHT_NOBITS;
2777 }
2778 }
252b5132
RH
2779
2780 /* Check for processor-specific section types. */
e1fddb6b
AO
2781 if (bed->elf_backend_fake_sections
2782 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2783 *failedptr = TRUE;
252b5132
RH
2784
2785 /* If the section has relocs, set up a section header for the
23bc299b
MM
2786 SHT_REL[A] section. If two relocation sections are required for
2787 this section, it is up to the processor-specific back-end to
c044fabd 2788 create the other. */
23bc299b 2789 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2790 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2791 &elf_section_data (asect)->rel_hdr,
c044fabd 2792 asect,
68bfbfcc 2793 asect->use_rela_p))
b34976b6 2794 *failedptr = TRUE;
252b5132
RH
2795}
2796
dbb410c3
AM
2797/* Fill in the contents of a SHT_GROUP section. */
2798
1126897b 2799void
217aa764 2800bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2801{
217aa764 2802 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2803 unsigned long symindx;
9dce4196 2804 asection *elt, *first;
dbb410c3 2805 unsigned char *loc;
b34976b6 2806 bfd_boolean gas;
dbb410c3 2807
7e4111ad
L
2808 /* Ignore linker created group section. See elfNN_ia64_object_p in
2809 elfxx-ia64.c. */
2810 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2811 || *failedptr)
2812 return;
2813
1126897b
AM
2814 symindx = 0;
2815 if (elf_group_id (sec) != NULL)
2816 symindx = elf_group_id (sec)->udata.i;
2817
2818 if (symindx == 0)
2819 {
2820 /* If called from the assembler, swap_out_syms will have set up
2821 elf_section_syms; If called for "ld -r", use target_index. */
2822 if (elf_section_syms (abfd) != NULL)
2823 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2824 else
2825 symindx = sec->target_index;
2826 }
dbb410c3
AM
2827 elf_section_data (sec)->this_hdr.sh_info = symindx;
2828
1126897b 2829 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2830 gas = TRUE;
dbb410c3
AM
2831 if (sec->contents == NULL)
2832 {
b34976b6 2833 gas = FALSE;
eea6121a 2834 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2835
2836 /* Arrange for the section to be written out. */
2837 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2838 if (sec->contents == NULL)
2839 {
b34976b6 2840 *failedptr = TRUE;
dbb410c3
AM
2841 return;
2842 }
2843 }
2844
eea6121a 2845 loc = sec->contents + sec->size;
dbb410c3 2846
9dce4196
AM
2847 /* Get the pointer to the first section in the group that gas
2848 squirreled away here. objcopy arranges for this to be set to the
2849 start of the input section group. */
2850 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2851
2852 /* First element is a flag word. Rest of section is elf section
2853 indices for all the sections of the group. Write them backwards
2854 just to keep the group in the same order as given in .section
2855 directives, not that it matters. */
2856 while (elt != NULL)
2857 {
9dce4196
AM
2858 asection *s;
2859 unsigned int idx;
2860
dbb410c3 2861 loc -= 4;
9dce4196
AM
2862 s = elt;
2863 if (!gas)
2864 s = s->output_section;
2865 idx = 0;
2866 if (s != NULL)
2867 idx = elf_section_data (s)->this_idx;
2868 H_PUT_32 (abfd, idx, loc);
945906ff 2869 elt = elf_next_in_group (elt);
9dce4196
AM
2870 if (elt == first)
2871 break;
dbb410c3
AM
2872 }
2873
3d7f7666 2874 if ((loc -= 4) != sec->contents)
9dce4196 2875 abort ();
dbb410c3 2876
9dce4196 2877 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2878}
2879
252b5132
RH
2880/* Assign all ELF section numbers. The dummy first section is handled here
2881 too. The link/info pointers for the standard section types are filled
2882 in here too, while we're at it. */
2883
b34976b6 2884static bfd_boolean
da9f89d4 2885assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2886{
2887 struct elf_obj_tdata *t = elf_tdata (abfd);
2888 asection *sec;
2b0f7ef9 2889 unsigned int section_number, secn;
252b5132 2890 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2891 struct bfd_elf_section_data *d;
252b5132
RH
2892
2893 section_number = 1;
2894
2b0f7ef9
JJ
2895 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2896
da9f89d4
L
2897 /* SHT_GROUP sections are in relocatable files only. */
2898 if (link_info == NULL || link_info->relocatable)
252b5132 2899 {
da9f89d4 2900 /* Put SHT_GROUP sections first. */
04dd1667 2901 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2902 {
5daa8fe7 2903 d = elf_section_data (sec);
da9f89d4
L
2904
2905 if (d->this_hdr.sh_type == SHT_GROUP)
2906 {
5daa8fe7 2907 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2908 {
2909 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2910 bfd_section_list_remove (abfd, sec);
da9f89d4 2911 abfd->section_count--;
da9f89d4
L
2912 }
2913 else
2914 {
2915 if (section_number == SHN_LORESERVE)
2916 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2917 d->this_idx = section_number++;
2918 }
2919 }
47cc2cf5
PB
2920 }
2921 }
2922
2923 for (sec = abfd->sections; sec; sec = sec->next)
2924 {
2925 d = elf_section_data (sec);
2926
2927 if (d->this_hdr.sh_type != SHT_GROUP)
2928 {
2929 if (section_number == SHN_LORESERVE)
2930 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2931 d->this_idx = section_number++;
2932 }
2b0f7ef9 2933 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2934 if ((sec->flags & SEC_RELOC) == 0)
2935 d->rel_idx = 0;
2936 else
2b0f7ef9 2937 {
9ad5cbcf
AM
2938 if (section_number == SHN_LORESERVE)
2939 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2940 d->rel_idx = section_number++;
2941 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2942 }
23bc299b
MM
2943
2944 if (d->rel_hdr2)
2b0f7ef9 2945 {
9ad5cbcf
AM
2946 if (section_number == SHN_LORESERVE)
2947 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2948 d->rel_idx2 = section_number++;
2949 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2950 }
23bc299b
MM
2951 else
2952 d->rel_idx2 = 0;
252b5132
RH
2953 }
2954
9ad5cbcf
AM
2955 if (section_number == SHN_LORESERVE)
2956 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2957 t->shstrtab_section = section_number++;
2b0f7ef9 2958 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2959 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2960
2961 if (bfd_get_symcount (abfd) > 0)
2962 {
9ad5cbcf
AM
2963 if (section_number == SHN_LORESERVE)
2964 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2965 t->symtab_section = section_number++;
2b0f7ef9 2966 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2967 if (section_number > SHN_LORESERVE - 2)
2968 {
2969 if (section_number == SHN_LORESERVE)
2970 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2971 t->symtab_shndx_section = section_number++;
2972 t->symtab_shndx_hdr.sh_name
2973 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2974 ".symtab_shndx", FALSE);
9ad5cbcf 2975 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2976 return FALSE;
9ad5cbcf
AM
2977 }
2978 if (section_number == SHN_LORESERVE)
2979 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2980 t->strtab_section = section_number++;
2b0f7ef9 2981 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2982 }
2983
2b0f7ef9
JJ
2984 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2985 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2986
2987 elf_numsections (abfd) = section_number;
252b5132 2988 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
2989 if (section_number > SHN_LORESERVE)
2990 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
2991
2992 /* Set up the list of section header pointers, in agreement with the
2993 indices. */
d0fb9a8d 2994 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 2995 if (i_shdrp == NULL)
b34976b6 2996 return FALSE;
252b5132 2997
d0fb9a8d 2998 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
2999 if (i_shdrp[0] == NULL)
3000 {
3001 bfd_release (abfd, i_shdrp);
b34976b6 3002 return FALSE;
252b5132 3003 }
252b5132
RH
3004
3005 elf_elfsections (abfd) = i_shdrp;
3006
3007 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3008 if (bfd_get_symcount (abfd) > 0)
3009 {
3010 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3011 if (elf_numsections (abfd) > SHN_LORESERVE)
3012 {
3013 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3014 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3015 }
252b5132
RH
3016 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3017 t->symtab_hdr.sh_link = t->strtab_section;
3018 }
38ce5b11 3019
252b5132
RH
3020 for (sec = abfd->sections; sec; sec = sec->next)
3021 {
3022 struct bfd_elf_section_data *d = elf_section_data (sec);
3023 asection *s;
3024 const char *name;
3025
3026 i_shdrp[d->this_idx] = &d->this_hdr;
3027 if (d->rel_idx != 0)
3028 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3029 if (d->rel_idx2 != 0)
3030 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3031
3032 /* Fill in the sh_link and sh_info fields while we're at it. */
3033
3034 /* sh_link of a reloc section is the section index of the symbol
3035 table. sh_info is the section index of the section to which
3036 the relocation entries apply. */
3037 if (d->rel_idx != 0)
3038 {
3039 d->rel_hdr.sh_link = t->symtab_section;
3040 d->rel_hdr.sh_info = d->this_idx;
3041 }
23bc299b
MM
3042 if (d->rel_idx2 != 0)
3043 {
3044 d->rel_hdr2->sh_link = t->symtab_section;
3045 d->rel_hdr2->sh_info = d->this_idx;
3046 }
252b5132 3047
38ce5b11
L
3048 /* We need to set up sh_link for SHF_LINK_ORDER. */
3049 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3050 {
3051 s = elf_linked_to_section (sec);
3052 if (s)
38ce5b11 3053 {
ccd2ec6a 3054 if (link_info != NULL)
38ce5b11 3055 {
ccd2ec6a
L
3056 /* For linker, elf_linked_to_section points to the
3057 input section. */
3058 if (elf_discarded_section (s))
38ce5b11 3059 {
ccd2ec6a
L
3060 asection *kept;
3061 (*_bfd_error_handler)
3062 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3063 abfd, d->this_hdr.bfd_section,
3064 s, s->owner);
3065 /* Point to the kept section if it has the same
3066 size as the discarded one. */
3067 kept = _bfd_elf_check_kept_section (s);
3068 if (kept == NULL)
185d09ad 3069 {
ccd2ec6a
L
3070 bfd_set_error (bfd_error_bad_value);
3071 return FALSE;
185d09ad 3072 }
ccd2ec6a 3073 s = kept;
38ce5b11 3074 }
ccd2ec6a
L
3075 s = s->output_section;
3076 BFD_ASSERT (s != NULL);
38ce5b11 3077 }
ccd2ec6a
L
3078 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3079 }
3080 else
3081 {
3082 /* PR 290:
3083 The Intel C compiler generates SHT_IA_64_UNWIND with
3084 SHF_LINK_ORDER. But it doesn't set the sh_link or
3085 sh_info fields. Hence we could get the situation
3086 where s is NULL. */
3087 const struct elf_backend_data *bed
3088 = get_elf_backend_data (abfd);
3089 if (bed->link_order_error_handler)
3090 bed->link_order_error_handler
3091 (_("%B: warning: sh_link not set for section `%A'"),
3092 abfd, sec);
38ce5b11
L
3093 }
3094 }
3095
252b5132
RH
3096 switch (d->this_hdr.sh_type)
3097 {
3098 case SHT_REL:
3099 case SHT_RELA:
3100 /* A reloc section which we are treating as a normal BFD
3101 section. sh_link is the section index of the symbol
3102 table. sh_info is the section index of the section to
3103 which the relocation entries apply. We assume that an
3104 allocated reloc section uses the dynamic symbol table.
3105 FIXME: How can we be sure? */
3106 s = bfd_get_section_by_name (abfd, ".dynsym");
3107 if (s != NULL)
3108 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3109
3110 /* We look up the section the relocs apply to by name. */
3111 name = sec->name;
3112 if (d->this_hdr.sh_type == SHT_REL)
3113 name += 4;
3114 else
3115 name += 5;
3116 s = bfd_get_section_by_name (abfd, name);
3117 if (s != NULL)
3118 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3119 break;
3120
3121 case SHT_STRTAB:
3122 /* We assume that a section named .stab*str is a stabs
3123 string section. We look for a section with the same name
3124 but without the trailing ``str'', and set its sh_link
3125 field to point to this section. */
3126 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
3127 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3128 {
3129 size_t len;
3130 char *alc;
3131
3132 len = strlen (sec->name);
217aa764 3133 alc = bfd_malloc (len - 2);
252b5132 3134 if (alc == NULL)
b34976b6 3135 return FALSE;
d4c88bbb 3136 memcpy (alc, sec->name, len - 3);
252b5132
RH
3137 alc[len - 3] = '\0';
3138 s = bfd_get_section_by_name (abfd, alc);
3139 free (alc);
3140 if (s != NULL)
3141 {
3142 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3143
3144 /* This is a .stab section. */
0594c12d
AM
3145 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3146 elf_section_data (s)->this_hdr.sh_entsize
3147 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3148 }
3149 }
3150 break;
3151
3152 case SHT_DYNAMIC:
3153 case SHT_DYNSYM:
3154 case SHT_GNU_verneed:
3155 case SHT_GNU_verdef:
3156 /* sh_link is the section header index of the string table
3157 used for the dynamic entries, or the symbol table, or the
3158 version strings. */
3159 s = bfd_get_section_by_name (abfd, ".dynstr");
3160 if (s != NULL)
3161 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3162 break;
3163
7f1204bb
JJ
3164 case SHT_GNU_LIBLIST:
3165 /* sh_link is the section header index of the prelink library
3166 list
3167 used for the dynamic entries, or the symbol table, or the
3168 version strings. */
3169 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3170 ? ".dynstr" : ".gnu.libstr");
3171 if (s != NULL)
3172 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3173 break;
3174
252b5132
RH
3175 case SHT_HASH:
3176 case SHT_GNU_versym:
3177 /* sh_link is the section header index of the symbol table
3178 this hash table or version table is for. */
3179 s = bfd_get_section_by_name (abfd, ".dynsym");
3180 if (s != NULL)
3181 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3182 break;
dbb410c3
AM
3183
3184 case SHT_GROUP:
3185 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3186 }
3187 }
3188
2b0f7ef9 3189 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3190 if (i_shdrp[secn] == NULL)
3191 i_shdrp[secn] = i_shdrp[0];
3192 else
3193 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3194 i_shdrp[secn]->sh_name);
b34976b6 3195 return TRUE;
252b5132
RH
3196}
3197
3198/* Map symbol from it's internal number to the external number, moving
3199 all local symbols to be at the head of the list. */
3200
268b6b39 3201static int
217aa764 3202sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3203{
3204 /* If the backend has a special mapping, use it. */
9c5bfbb7 3205 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3206 if (bed->elf_backend_sym_is_global)
3207 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3208
3209 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3210 || bfd_is_und_section (bfd_get_section (sym))
3211 || bfd_is_com_section (bfd_get_section (sym)));
3212}
3213
b34976b6 3214static bfd_boolean
217aa764 3215elf_map_symbols (bfd *abfd)
252b5132 3216{
dc810e39 3217 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3218 asymbol **syms = bfd_get_outsymbols (abfd);
3219 asymbol **sect_syms;
dc810e39
AM
3220 unsigned int num_locals = 0;
3221 unsigned int num_globals = 0;
3222 unsigned int num_locals2 = 0;
3223 unsigned int num_globals2 = 0;
252b5132 3224 int max_index = 0;
dc810e39 3225 unsigned int idx;
252b5132
RH
3226 asection *asect;
3227 asymbol **new_syms;
252b5132
RH
3228
3229#ifdef DEBUG
3230 fprintf (stderr, "elf_map_symbols\n");
3231 fflush (stderr);
3232#endif
3233
252b5132
RH
3234 for (asect = abfd->sections; asect; asect = asect->next)
3235 {
3236 if (max_index < asect->index)
3237 max_index = asect->index;
3238 }
3239
3240 max_index++;
d0fb9a8d 3241 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3242 if (sect_syms == NULL)
b34976b6 3243 return FALSE;
252b5132 3244 elf_section_syms (abfd) = sect_syms;
4e89ac30 3245 elf_num_section_syms (abfd) = max_index;
252b5132 3246
079e9a2f
AM
3247 /* Init sect_syms entries for any section symbols we have already
3248 decided to output. */
252b5132
RH
3249 for (idx = 0; idx < symcount; idx++)
3250 {
dc810e39 3251 asymbol *sym = syms[idx];
c044fabd 3252
252b5132
RH
3253 if ((sym->flags & BSF_SECTION_SYM) != 0
3254 && sym->value == 0)
3255 {
3256 asection *sec;
3257
3258 sec = sym->section;
3259
3260 if (sec->owner != NULL)
3261 {
3262 if (sec->owner != abfd)
3263 {
3264 if (sec->output_offset != 0)
3265 continue;
c044fabd 3266
252b5132
RH
3267 sec = sec->output_section;
3268
079e9a2f
AM
3269 /* Empty sections in the input files may have had a
3270 section symbol created for them. (See the comment
3271 near the end of _bfd_generic_link_output_symbols in
3272 linker.c). If the linker script discards such
3273 sections then we will reach this point. Since we know
3274 that we cannot avoid this case, we detect it and skip
3275 the abort and the assignment to the sect_syms array.
3276 To reproduce this particular case try running the
3277 linker testsuite test ld-scripts/weak.exp for an ELF
3278 port that uses the generic linker. */
252b5132
RH
3279 if (sec->owner == NULL)
3280 continue;
3281
3282 BFD_ASSERT (sec->owner == abfd);
3283 }
3284 sect_syms[sec->index] = syms[idx];
3285 }
3286 }
3287 }
3288
252b5132
RH
3289 /* Classify all of the symbols. */
3290 for (idx = 0; idx < symcount; idx++)
3291 {
3292 if (!sym_is_global (abfd, syms[idx]))
3293 num_locals++;
3294 else
3295 num_globals++;
3296 }
079e9a2f
AM
3297
3298 /* We will be adding a section symbol for each BFD section. Most normal
3299 sections will already have a section symbol in outsymbols, but
3300 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3301 at least in that case. */
252b5132
RH
3302 for (asect = abfd->sections; asect; asect = asect->next)
3303 {
079e9a2f 3304 if (sect_syms[asect->index] == NULL)
252b5132 3305 {
079e9a2f 3306 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3307 num_locals++;
3308 else
3309 num_globals++;
252b5132
RH
3310 }
3311 }
3312
3313 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3314 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3315
252b5132 3316 if (new_syms == NULL)
b34976b6 3317 return FALSE;
252b5132
RH
3318
3319 for (idx = 0; idx < symcount; idx++)
3320 {
3321 asymbol *sym = syms[idx];
dc810e39 3322 unsigned int i;
252b5132
RH
3323
3324 if (!sym_is_global (abfd, sym))
3325 i = num_locals2++;
3326 else
3327 i = num_locals + num_globals2++;
3328 new_syms[i] = sym;
3329 sym->udata.i = i + 1;
3330 }
3331 for (asect = abfd->sections; asect; asect = asect->next)
3332 {
079e9a2f 3333 if (sect_syms[asect->index] == NULL)
252b5132 3334 {
079e9a2f 3335 asymbol *sym = asect->symbol;
dc810e39 3336 unsigned int i;
252b5132 3337
079e9a2f 3338 sect_syms[asect->index] = sym;
252b5132
RH
3339 if (!sym_is_global (abfd, sym))
3340 i = num_locals2++;
3341 else
3342 i = num_locals + num_globals2++;
3343 new_syms[i] = sym;
3344 sym->udata.i = i + 1;
3345 }
3346 }
3347
3348 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3349
3350 elf_num_locals (abfd) = num_locals;
3351 elf_num_globals (abfd) = num_globals;
b34976b6 3352 return TRUE;
252b5132
RH
3353}
3354
3355/* Align to the maximum file alignment that could be required for any
3356 ELF data structure. */
3357
268b6b39 3358static inline file_ptr
217aa764 3359align_file_position (file_ptr off, int align)
252b5132
RH
3360{
3361 return (off + align - 1) & ~(align - 1);
3362}
3363
3364/* Assign a file position to a section, optionally aligning to the
3365 required section alignment. */
3366
217aa764
AM
3367file_ptr
3368_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3369 file_ptr offset,
3370 bfd_boolean align)
252b5132
RH
3371{
3372 if (align)
3373 {
3374 unsigned int al;
3375
3376 al = i_shdrp->sh_addralign;
3377 if (al > 1)
3378 offset = BFD_ALIGN (offset, al);
3379 }
3380 i_shdrp->sh_offset = offset;
3381 if (i_shdrp->bfd_section != NULL)
3382 i_shdrp->bfd_section->filepos = offset;
3383 if (i_shdrp->sh_type != SHT_NOBITS)
3384 offset += i_shdrp->sh_size;
3385 return offset;
3386}
3387
3388/* Compute the file positions we are going to put the sections at, and
3389 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3390 is not NULL, this is being called by the ELF backend linker. */
3391
b34976b6 3392bfd_boolean
217aa764
AM
3393_bfd_elf_compute_section_file_positions (bfd *abfd,
3394 struct bfd_link_info *link_info)
252b5132 3395{
9c5bfbb7 3396 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3397 bfd_boolean failed;
4b6c0f2f 3398 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3399 Elf_Internal_Shdr *shstrtab_hdr;
3400
3401 if (abfd->output_has_begun)
b34976b6 3402 return TRUE;
252b5132
RH
3403
3404 /* Do any elf backend specific processing first. */
3405 if (bed->elf_backend_begin_write_processing)
3406 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3407
3408 if (! prep_headers (abfd))
b34976b6 3409 return FALSE;
252b5132 3410
e6c51ed4
NC
3411 /* Post process the headers if necessary. */
3412 if (bed->elf_backend_post_process_headers)
3413 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3414
b34976b6 3415 failed = FALSE;
252b5132
RH
3416 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3417 if (failed)
b34976b6 3418 return FALSE;
252b5132 3419
da9f89d4 3420 if (!assign_section_numbers (abfd, link_info))
b34976b6 3421 return FALSE;
252b5132
RH
3422
3423 /* The backend linker builds symbol table information itself. */
3424 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3425 {
3426 /* Non-zero if doing a relocatable link. */
3427 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3428
3429 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3430 return FALSE;
252b5132
RH
3431 }
3432
1126897b 3433 if (link_info == NULL)
dbb410c3 3434 {
1126897b 3435 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3436 if (failed)
b34976b6 3437 return FALSE;
dbb410c3
AM
3438 }
3439
252b5132
RH
3440 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3441 /* sh_name was set in prep_headers. */
3442 shstrtab_hdr->sh_type = SHT_STRTAB;
3443 shstrtab_hdr->sh_flags = 0;
3444 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3445 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3446 shstrtab_hdr->sh_entsize = 0;
3447 shstrtab_hdr->sh_link = 0;
3448 shstrtab_hdr->sh_info = 0;
3449 /* sh_offset is set in assign_file_positions_except_relocs. */
3450 shstrtab_hdr->sh_addralign = 1;
3451
c84fca4d 3452 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3453 return FALSE;
252b5132
RH
3454
3455 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3456 {
3457 file_ptr off;
3458 Elf_Internal_Shdr *hdr;
3459
3460 off = elf_tdata (abfd)->next_file_pos;
3461
3462 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3463 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3464
9ad5cbcf
AM
3465 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3466 if (hdr->sh_size != 0)
b34976b6 3467 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3468
252b5132 3469 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3470 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3471
3472 elf_tdata (abfd)->next_file_pos = off;
3473
3474 /* Now that we know where the .strtab section goes, write it
3475 out. */
3476 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3477 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3478 return FALSE;
252b5132
RH
3479 _bfd_stringtab_free (strtab);
3480 }
3481
b34976b6 3482 abfd->output_has_begun = TRUE;
252b5132 3483
b34976b6 3484 return TRUE;
252b5132
RH
3485}
3486
3487/* Create a mapping from a set of sections to a program segment. */
3488
217aa764
AM
3489static struct elf_segment_map *
3490make_mapping (bfd *abfd,
3491 asection **sections,
3492 unsigned int from,
3493 unsigned int to,
3494 bfd_boolean phdr)
252b5132
RH
3495{
3496 struct elf_segment_map *m;
3497 unsigned int i;
3498 asection **hdrpp;
dc810e39 3499 bfd_size_type amt;
252b5132 3500
dc810e39
AM
3501 amt = sizeof (struct elf_segment_map);
3502 amt += (to - from - 1) * sizeof (asection *);
217aa764 3503 m = bfd_zalloc (abfd, amt);
252b5132
RH
3504 if (m == NULL)
3505 return NULL;
3506 m->next = NULL;
3507 m->p_type = PT_LOAD;
3508 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3509 m->sections[i - from] = *hdrpp;
3510 m->count = to - from;
3511
3512 if (from == 0 && phdr)
3513 {
3514 /* Include the headers in the first PT_LOAD segment. */
3515 m->includes_filehdr = 1;
3516 m->includes_phdrs = 1;
3517 }
3518
3519 return m;
3520}
3521
229fcec5
MM
3522/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3523 on failure. */
3524
3525struct elf_segment_map *
3526_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3527{
3528 struct elf_segment_map *m;
3529
3530 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3531 if (m == NULL)
3532 return NULL;
3533 m->next = NULL;
3534 m->p_type = PT_DYNAMIC;
3535 m->count = 1;
3536 m->sections[0] = dynsec;
3537
3538 return m;
3539}
3540
252b5132
RH
3541/* Set up a mapping from BFD sections to program segments. */
3542
b34976b6 3543static bfd_boolean
217aa764 3544map_sections_to_segments (bfd *abfd)
252b5132
RH
3545{
3546 asection **sections = NULL;
3547 asection *s;
3548 unsigned int i;
3549 unsigned int count;
3550 struct elf_segment_map *mfirst;
3551 struct elf_segment_map **pm;
3552 struct elf_segment_map *m;
3553 asection *last_hdr;
baaff79e 3554 bfd_vma last_size;
252b5132
RH
3555 unsigned int phdr_index;
3556 bfd_vma maxpagesize;
3557 asection **hdrpp;
b34976b6
AM
3558 bfd_boolean phdr_in_segment = TRUE;
3559 bfd_boolean writable;
13ae64f3
JJ
3560 int tls_count = 0;
3561 asection *first_tls = NULL;
65765700 3562 asection *dynsec, *eh_frame_hdr;
dc810e39 3563 bfd_size_type amt;
252b5132
RH
3564
3565 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3566 return TRUE;
252b5132
RH
3567
3568 if (bfd_count_sections (abfd) == 0)
b34976b6 3569 return TRUE;
252b5132
RH
3570
3571 /* Select the allocated sections, and sort them. */
3572
d0fb9a8d 3573 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
252b5132
RH
3574 if (sections == NULL)
3575 goto error_return;
3576
3577 i = 0;
3578 for (s = abfd->sections; s != NULL; s = s->next)
3579 {
3580 if ((s->flags & SEC_ALLOC) != 0)
3581 {
3582 sections[i] = s;
3583 ++i;
3584 }
3585 }
3586 BFD_ASSERT (i <= bfd_count_sections (abfd));
3587 count = i;
3588
3589 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3590
3591 /* Build the mapping. */
3592
3593 mfirst = NULL;
3594 pm = &mfirst;
3595
3596 /* If we have a .interp section, then create a PT_PHDR segment for
3597 the program headers and a PT_INTERP segment for the .interp
3598 section. */
3599 s = bfd_get_section_by_name (abfd, ".interp");
3600 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3601 {
dc810e39 3602 amt = sizeof (struct elf_segment_map);
217aa764 3603 m = bfd_zalloc (abfd, amt);
252b5132
RH
3604 if (m == NULL)
3605 goto error_return;
3606 m->next = NULL;
3607 m->p_type = PT_PHDR;
3608 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3609 m->p_flags = PF_R | PF_X;
3610 m->p_flags_valid = 1;
3611 m->includes_phdrs = 1;
3612
3613 *pm = m;
3614 pm = &m->next;
3615
dc810e39 3616 amt = sizeof (struct elf_segment_map);
217aa764 3617 m = bfd_zalloc (abfd, amt);
252b5132
RH
3618 if (m == NULL)
3619 goto error_return;
3620 m->next = NULL;
3621 m->p_type = PT_INTERP;
3622 m->count = 1;
3623 m->sections[0] = s;
3624
3625 *pm = m;
3626 pm = &m->next;
3627 }
3628
3629 /* Look through the sections. We put sections in the same program
3630 segment when the start of the second section can be placed within
3631 a few bytes of the end of the first section. */
3632 last_hdr = NULL;
baaff79e 3633 last_size = 0;
252b5132
RH
3634 phdr_index = 0;
3635 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3636 writable = FALSE;
252b5132
RH
3637 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3638 if (dynsec != NULL
3639 && (dynsec->flags & SEC_LOAD) == 0)
3640 dynsec = NULL;
3641
3642 /* Deal with -Ttext or something similar such that the first section
3643 is not adjacent to the program headers. This is an
3644 approximation, since at this point we don't know exactly how many
3645 program headers we will need. */
3646 if (count > 0)
3647 {
3648 bfd_size_type phdr_size;
3649
3650 phdr_size = elf_tdata (abfd)->program_header_size;
3651 if (phdr_size == 0)
3652 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3653 if ((abfd->flags & D_PAGED) == 0
3654 || sections[0]->lma < phdr_size
3655 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3656 phdr_in_segment = FALSE;
252b5132
RH
3657 }
3658
3659 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3660 {
3661 asection *hdr;
b34976b6 3662 bfd_boolean new_segment;
252b5132
RH
3663
3664 hdr = *hdrpp;
3665
3666 /* See if this section and the last one will fit in the same
3667 segment. */
3668
3669 if (last_hdr == NULL)
3670 {
3671 /* If we don't have a segment yet, then we don't need a new
3672 one (we build the last one after this loop). */
b34976b6 3673 new_segment = FALSE;
252b5132
RH
3674 }
3675 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3676 {
3677 /* If this section has a different relation between the
3678 virtual address and the load address, then we need a new
3679 segment. */
b34976b6 3680 new_segment = TRUE;
252b5132 3681 }
baaff79e 3682 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3683 < BFD_ALIGN (hdr->lma, maxpagesize))
3684 {
3685 /* If putting this section in this segment would force us to
3686 skip a page in the segment, then we need a new segment. */
b34976b6 3687 new_segment = TRUE;
252b5132 3688 }
baaff79e
JJ
3689 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3690 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3691 {
3692 /* We don't want to put a loadable section after a
baaff79e
JJ
3693 nonloadable section in the same segment.
3694 Consider .tbss sections as loadable for this purpose. */
b34976b6 3695 new_segment = TRUE;
252b5132
RH
3696 }
3697 else if ((abfd->flags & D_PAGED) == 0)
3698 {
3699 /* If the file is not demand paged, which means that we
3700 don't require the sections to be correctly aligned in the
3701 file, then there is no other reason for a new segment. */
b34976b6 3702 new_segment = FALSE;
252b5132
RH
3703 }
3704 else if (! writable
3705 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3706 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3707 & ~(maxpagesize - 1))
3708 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3709 {
3710 /* We don't want to put a writable section in a read only
3711 segment, unless they are on the same page in memory
3712 anyhow. We already know that the last section does not
3713 bring us past the current section on the page, so the
3714 only case in which the new section is not on the same
3715 page as the previous section is when the previous section
3716 ends precisely on a page boundary. */
b34976b6 3717 new_segment = TRUE;
252b5132
RH
3718 }
3719 else
3720 {
3721 /* Otherwise, we can use the same segment. */
b34976b6 3722 new_segment = FALSE;
252b5132
RH
3723 }
3724
3725 if (! new_segment)
3726 {
3727 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3728 writable = TRUE;
baaff79e
JJ
3729 last_hdr = hdr;
3730 /* .tbss sections effectively have zero size. */
e5caec89 3731 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3732 last_size = hdr->size;
baaff79e
JJ
3733 else
3734 last_size = 0;
252b5132
RH
3735 continue;
3736 }
3737
3738 /* We need a new program segment. We must create a new program
3739 header holding all the sections from phdr_index until hdr. */
3740
3741 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3742 if (m == NULL)
3743 goto error_return;
3744
3745 *pm = m;
3746 pm = &m->next;
3747
3748 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3749 writable = TRUE;
252b5132 3750 else
b34976b6 3751 writable = FALSE;
252b5132
RH
3752
3753 last_hdr = hdr;
baaff79e
JJ
3754 /* .tbss sections effectively have zero size. */
3755 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3756 last_size = hdr->size;
baaff79e
JJ
3757 else
3758 last_size = 0;
252b5132 3759 phdr_index = i;
b34976b6 3760 phdr_in_segment = FALSE;
252b5132
RH
3761 }
3762
3763 /* Create a final PT_LOAD program segment. */
3764 if (last_hdr != NULL)
3765 {
3766 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3767 if (m == NULL)
3768 goto error_return;
3769
3770 *pm = m;
3771 pm = &m->next;
3772 }
3773
3774 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3775 if (dynsec != NULL)
3776 {
229fcec5 3777 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3778 if (m == NULL)
3779 goto error_return;
252b5132
RH
3780 *pm = m;
3781 pm = &m->next;
3782 }
3783
3784 /* For each loadable .note section, add a PT_NOTE segment. We don't
3785 use bfd_get_section_by_name, because if we link together
3786 nonloadable .note sections and loadable .note sections, we will
3787 generate two .note sections in the output file. FIXME: Using
3788 names for section types is bogus anyhow. */
3789 for (s = abfd->sections; s != NULL; s = s->next)
3790 {
3791 if ((s->flags & SEC_LOAD) != 0
3792 && strncmp (s->name, ".note", 5) == 0)
3793 {
dc810e39 3794 amt = sizeof (struct elf_segment_map);
217aa764 3795 m = bfd_zalloc (abfd, amt);
252b5132
RH
3796 if (m == NULL)
3797 goto error_return;
3798 m->next = NULL;
3799 m->p_type = PT_NOTE;
3800 m->count = 1;
3801 m->sections[0] = s;
3802
3803 *pm = m;
3804 pm = &m->next;
3805 }
13ae64f3
JJ
3806 if (s->flags & SEC_THREAD_LOCAL)
3807 {
3808 if (! tls_count)
3809 first_tls = s;
3810 tls_count++;
3811 }
3812 }
3813
3814 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3815 if (tls_count > 0)
3816 {
3817 int i;
3818
3819 amt = sizeof (struct elf_segment_map);
3820 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3821 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3822 if (m == NULL)
3823 goto error_return;
3824 m->next = NULL;
3825 m->p_type = PT_TLS;
3826 m->count = tls_count;
3827 /* Mandated PF_R. */
3828 m->p_flags = PF_R;
3829 m->p_flags_valid = 1;
3830 for (i = 0; i < tls_count; ++i)
3831 {
3832 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3833 m->sections[i] = first_tls;
3834 first_tls = first_tls->next;
3835 }
3836
3837 *pm = m;
3838 pm = &m->next;
252b5132
RH
3839 }
3840
65765700
JJ
3841 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3842 segment. */
126495ed
AM
3843 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3844 if (eh_frame_hdr != NULL
3845 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3846 {
3847 amt = sizeof (struct elf_segment_map);
217aa764 3848 m = bfd_zalloc (abfd, amt);
65765700
JJ
3849 if (m == NULL)
3850 goto error_return;
3851 m->next = NULL;
3852 m->p_type = PT_GNU_EH_FRAME;
3853 m->count = 1;
126495ed 3854 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3855
3856 *pm = m;
3857 pm = &m->next;
3858 }
3859
9ee5e499
JJ
3860 if (elf_tdata (abfd)->stack_flags)
3861 {
3862 amt = sizeof (struct elf_segment_map);
217aa764 3863 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3864 if (m == NULL)
3865 goto error_return;
3866 m->next = NULL;
3867 m->p_type = PT_GNU_STACK;
3868 m->p_flags = elf_tdata (abfd)->stack_flags;
3869 m->p_flags_valid = 1;
3870
3871 *pm = m;
3872 pm = &m->next;
3873 }
3874
8c37241b
JJ
3875 if (elf_tdata (abfd)->relro)
3876 {
3877 amt = sizeof (struct elf_segment_map);
3878 m = bfd_zalloc (abfd, amt);
3879 if (m == NULL)
3880 goto error_return;
3881 m->next = NULL;
3882 m->p_type = PT_GNU_RELRO;
3883 m->p_flags = PF_R;
3884 m->p_flags_valid = 1;
3885
3886 *pm = m;
3887 pm = &m->next;
3888 }
3889
252b5132
RH
3890 free (sections);
3891 sections = NULL;
3892
3893 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3894 return TRUE;
252b5132
RH
3895
3896 error_return:
3897 if (sections != NULL)
3898 free (sections);
b34976b6 3899 return FALSE;
252b5132
RH
3900}
3901
3902/* Sort sections by address. */
3903
3904static int
217aa764 3905elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3906{
3907 const asection *sec1 = *(const asection **) arg1;
3908 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3909 bfd_size_type size1, size2;
252b5132
RH
3910
3911 /* Sort by LMA first, since this is the address used to
3912 place the section into a segment. */
3913 if (sec1->lma < sec2->lma)
3914 return -1;
3915 else if (sec1->lma > sec2->lma)
3916 return 1;
3917
3918 /* Then sort by VMA. Normally the LMA and the VMA will be
3919 the same, and this will do nothing. */
3920 if (sec1->vma < sec2->vma)
3921 return -1;
3922 else if (sec1->vma > sec2->vma)
3923 return 1;
3924
3925 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3926
07c6e936 3927#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3928
3929 if (TOEND (sec1))
3930 {
3931 if (TOEND (sec2))
00a7cdc5
NC
3932 {
3933 /* If the indicies are the same, do not return 0
3934 here, but continue to try the next comparison. */
3935 if (sec1->target_index - sec2->target_index != 0)
3936 return sec1->target_index - sec2->target_index;
3937 }
252b5132
RH
3938 else
3939 return 1;
3940 }
00a7cdc5 3941 else if (TOEND (sec2))
252b5132
RH
3942 return -1;
3943
3944#undef TOEND
3945
00a7cdc5
NC
3946 /* Sort by size, to put zero sized sections
3947 before others at the same address. */
252b5132 3948
eea6121a
AM
3949 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
3950 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
3951
3952 if (size1 < size2)
252b5132 3953 return -1;
eecdbe52 3954 if (size1 > size2)
252b5132
RH
3955 return 1;
3956
3957 return sec1->target_index - sec2->target_index;
3958}
3959
340b6d91
AC
3960/* Ian Lance Taylor writes:
3961
3962 We shouldn't be using % with a negative signed number. That's just
3963 not good. We have to make sure either that the number is not
3964 negative, or that the number has an unsigned type. When the types
3965 are all the same size they wind up as unsigned. When file_ptr is a
3966 larger signed type, the arithmetic winds up as signed long long,
3967 which is wrong.
3968
3969 What we're trying to say here is something like ``increase OFF by
3970 the least amount that will cause it to be equal to the VMA modulo
3971 the page size.'' */
3972/* In other words, something like:
3973
3974 vma_offset = m->sections[0]->vma % bed->maxpagesize;
3975 off_offset = off % bed->maxpagesize;
3976 if (vma_offset < off_offset)
3977 adjustment = vma_offset + bed->maxpagesize - off_offset;
3978 else
3979 adjustment = vma_offset - off_offset;
3980
3981 which can can be collapsed into the expression below. */
3982
3983static file_ptr
3984vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
3985{
3986 return ((vma - off) % maxpagesize);
3987}
3988
252b5132
RH
3989/* Assign file positions to the sections based on the mapping from
3990 sections to segments. This function also sets up some fields in
3991 the file header, and writes out the program headers. */
3992
b34976b6 3993static bfd_boolean
c84fca4d 3994assign_file_positions_for_segments (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3995{
3996 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3997 unsigned int count;
3998 struct elf_segment_map *m;
3999 unsigned int alloc;
4000 Elf_Internal_Phdr *phdrs;
4001 file_ptr off, voff;
4002 bfd_vma filehdr_vaddr, filehdr_paddr;
4003 bfd_vma phdrs_vaddr, phdrs_paddr;
4004 Elf_Internal_Phdr *p;
4005
4006 if (elf_tdata (abfd)->segment_map == NULL)
4007 {
4008 if (! map_sections_to_segments (abfd))
b34976b6 4009 return FALSE;
252b5132 4010 }
1ed89aa9
NC
4011 else
4012 {
4013 /* The placement algorithm assumes that non allocated sections are
4014 not in PT_LOAD segments. We ensure this here by removing such
540b09cb
AM
4015 sections from the segment map. We also remove excluded
4016 sections. */
1ed89aa9
NC
4017 for (m = elf_tdata (abfd)->segment_map;
4018 m != NULL;
4019 m = m->next)
4020 {
4021 unsigned int new_count;
4022 unsigned int i;
4023
1ed89aa9
NC
4024 new_count = 0;
4025 for (i = 0; i < m->count; i ++)
4026 {
540b09cb
AM
4027 if ((m->sections[i]->flags & SEC_EXCLUDE) == 0
4028 && ((m->sections[i]->flags & SEC_ALLOC) != 0
4029 || m->p_type != PT_LOAD))
1ed89aa9 4030 {
47d9a591 4031 if (i != new_count)
1ed89aa9
NC
4032 m->sections[new_count] = m->sections[i];
4033
4034 new_count ++;
4035 }
4036 }
4037
4038 if (new_count != m->count)
4039 m->count = new_count;
4040 }
4041 }
252b5132
RH
4042
4043 if (bed->elf_backend_modify_segment_map)
4044 {
c84fca4d 4045 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 4046 return FALSE;
252b5132
RH
4047 }
4048
4049 count = 0;
4050 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4051 ++count;
4052
4053 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4054 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4055 elf_elfheader (abfd)->e_phnum = count;
4056
4057 if (count == 0)
0ebdbb83
BW
4058 {
4059 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4060 return TRUE;
4061 }
252b5132
RH
4062
4063 /* If we already counted the number of program segments, make sure
4064 that we allocated enough space. This happens when SIZEOF_HEADERS
4065 is used in a linker script. */
4066 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
4067 if (alloc != 0 && count > alloc)
4068 {
4069 ((*_bfd_error_handler)
b301b248
AM
4070 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
4071 abfd, alloc, count));
252b5132 4072 bfd_set_error (bfd_error_bad_value);
b34976b6 4073 return FALSE;
252b5132
RH
4074 }
4075
4076 if (alloc == 0)
4077 alloc = count;
4078
d0fb9a8d 4079 phdrs = bfd_alloc2 (abfd, alloc, sizeof (Elf_Internal_Phdr));
252b5132 4080 if (phdrs == NULL)
b34976b6 4081 return FALSE;
252b5132
RH
4082
4083 off = bed->s->sizeof_ehdr;
4084 off += alloc * bed->s->sizeof_phdr;
4085
4086 filehdr_vaddr = 0;
4087 filehdr_paddr = 0;
4088 phdrs_vaddr = 0;
4089 phdrs_paddr = 0;
4090
4091 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4092 m != NULL;
4093 m = m->next, p++)
4094 {
4095 unsigned int i;
4096 asection **secpp;
4097
4098 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4099 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4100 not be done to the PT_NOTE section of a corefile, which may
4101 contain several pseudo-sections artificially created by bfd.
4102 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4103 if (m->count > 1
4104 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4105 && m->p_type == PT_NOTE))
252b5132
RH
4106 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4107 elf_sort_sections);
4108
b301b248
AM
4109 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4110 number of sections with contents contributing to both p_filesz
4111 and p_memsz, followed by a number of sections with no contents
4112 that just contribute to p_memsz. In this loop, OFF tracks next
4113 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4114 an adjustment we use for segments that have no file contents
4115 but need zero filled memory allocation. */
4116 voff = 0;
252b5132 4117 p->p_type = m->p_type;
28a7f3e7 4118 p->p_flags = m->p_flags;
252b5132
RH
4119
4120 if (p->p_type == PT_LOAD
b301b248 4121 && m->count > 0)
252b5132 4122 {
b301b248
AM
4123 bfd_size_type align;
4124 bfd_vma adjust;
a49e53ed 4125 unsigned int align_power = 0;
b301b248 4126
a49e53ed 4127 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4128 {
a49e53ed 4129 unsigned int secalign;
252b5132 4130
a49e53ed
AM
4131 secalign = bfd_get_section_alignment (abfd, *secpp);
4132 if (secalign > align_power)
4133 align_power = secalign;
b301b248 4134 }
a49e53ed
AM
4135 align = (bfd_size_type) 1 << align_power;
4136
4137 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > align)
4138 align = bed->maxpagesize;
252b5132 4139
b301b248
AM
4140 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4141 off += adjust;
4142 if (adjust != 0
4143 && !m->includes_filehdr
4144 && !m->includes_phdrs
4145 && (ufile_ptr) off >= align)
4146 {
4147 /* If the first section isn't loadable, the same holds for
4148 any other sections. Since the segment won't need file
4149 space, we can make p_offset overlap some prior segment.
4150 However, .tbss is special. If a segment starts with
4151 .tbss, we need to look at the next section to decide
4152 whether the segment has any loadable sections. */
4153 i = 0;
5efb6261 4154 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
4155 {
4156 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4157 || ++i >= m->count)
4158 {
4159 off -= adjust;
4160 voff = adjust - align;
4161 break;
4162 }
4163 }
252b5132
RH
4164 }
4165 }
b1a6d0b1
NC
4166 /* Make sure the .dynamic section is the first section in the
4167 PT_DYNAMIC segment. */
4168 else if (p->p_type == PT_DYNAMIC
4169 && m->count > 1
4170 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4171 {
4172 _bfd_error_handler
b301b248
AM
4173 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4174 abfd);
b1a6d0b1
NC
4175 bfd_set_error (bfd_error_bad_value);
4176 return FALSE;
4177 }
252b5132
RH
4178
4179 if (m->count == 0)
4180 p->p_vaddr = 0;
4181 else
4182 p->p_vaddr = m->sections[0]->vma;
4183
4184 if (m->p_paddr_valid)
4185 p->p_paddr = m->p_paddr;
4186 else if (m->count == 0)
4187 p->p_paddr = 0;
4188 else
4189 p->p_paddr = m->sections[0]->lma;
4190
4191 if (p->p_type == PT_LOAD
4192 && (abfd->flags & D_PAGED) != 0)
4193 p->p_align = bed->maxpagesize;
4194 else if (m->count == 0)
45d6a902 4195 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
4196 else
4197 p->p_align = 0;
4198
4199 p->p_offset = 0;
4200 p->p_filesz = 0;
4201 p->p_memsz = 0;
4202
4203 if (m->includes_filehdr)
4204 {
4205 if (! m->p_flags_valid)
4206 p->p_flags |= PF_R;
4207 p->p_offset = 0;
4208 p->p_filesz = bed->s->sizeof_ehdr;
4209 p->p_memsz = bed->s->sizeof_ehdr;
4210 if (m->count > 0)
4211 {
4212 BFD_ASSERT (p->p_type == PT_LOAD);
4213
4214 if (p->p_vaddr < (bfd_vma) off)
4215 {
caf47ea6 4216 (*_bfd_error_handler)
b301b248
AM
4217 (_("%B: Not enough room for program headers, try linking with -N"),
4218 abfd);
252b5132 4219 bfd_set_error (bfd_error_bad_value);
b34976b6 4220 return FALSE;
252b5132
RH
4221 }
4222
4223 p->p_vaddr -= off;
4224 if (! m->p_paddr_valid)
4225 p->p_paddr -= off;
4226 }
4227 if (p->p_type == PT_LOAD)
4228 {
4229 filehdr_vaddr = p->p_vaddr;
4230 filehdr_paddr = p->p_paddr;
4231 }
4232 }
4233
4234 if (m->includes_phdrs)
4235 {
4236 if (! m->p_flags_valid)
4237 p->p_flags |= PF_R;
4238
4239 if (m->includes_filehdr)
4240 {
4241 if (p->p_type == PT_LOAD)
4242 {
4243 phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr;
4244 phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr;
4245 }
4246 }
4247 else
4248 {
4249 p->p_offset = bed->s->sizeof_ehdr;
4250
4251 if (m->count > 0)
4252 {
4253 BFD_ASSERT (p->p_type == PT_LOAD);
4254 p->p_vaddr -= off - p->p_offset;
4255 if (! m->p_paddr_valid)
4256 p->p_paddr -= off - p->p_offset;
4257 }
4258
4259 if (p->p_type == PT_LOAD)
4260 {
4261 phdrs_vaddr = p->p_vaddr;
4262 phdrs_paddr = p->p_paddr;
4263 }
4264 else
4265 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4266 }
4267
4268 p->p_filesz += alloc * bed->s->sizeof_phdr;
4269 p->p_memsz += alloc * bed->s->sizeof_phdr;
4270 }
4271
4272 if (p->p_type == PT_LOAD
4273 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4274 {
4275 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4276 p->p_offset = off + voff;
252b5132
RH
4277 else
4278 {
4279 file_ptr adjust;
4280
4281 adjust = off - (p->p_offset + p->p_filesz);
4282 p->p_filesz += adjust;
4283 p->p_memsz += adjust;
4284 }
4285 }
4286
252b5132
RH
4287 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4288 {
4289 asection *sec;
4290 flagword flags;
4291 bfd_size_type align;
4292
4293 sec = *secpp;
4294 flags = sec->flags;
4295 align = 1 << bfd_get_section_alignment (abfd, sec);
4296
b301b248
AM
4297 if (p->p_type == PT_LOAD
4298 || p->p_type == PT_TLS)
252b5132
RH
4299 {
4300 bfd_signed_vma adjust;
4301
5efb6261 4302 if ((flags & SEC_LOAD) != 0)
252b5132 4303 {
b301b248 4304 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4305 if (adjust < 0)
b301b248
AM
4306 {
4307 (*_bfd_error_handler)
4308 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4309 abfd, sec, (unsigned long) sec->lma);
4310 adjust = 0;
4311 }
4312 off += adjust;
4313 p->p_filesz += adjust;
4314 p->p_memsz += adjust;
252b5132 4315 }
b301b248
AM
4316 /* .tbss is special. It doesn't contribute to p_memsz of
4317 normal segments. */
4318 else if ((flags & SEC_THREAD_LOCAL) == 0
4319 || p->p_type == PT_TLS)
252b5132
RH
4320 {
4321 /* The section VMA must equal the file position
b301b248
AM
4322 modulo the page size. */
4323 bfd_size_type page = align;
a49e53ed 4324 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > page)
b301b248
AM
4325 page = bed->maxpagesize;
4326 adjust = vma_page_aligned_bias (sec->vma,
4327 p->p_vaddr + p->p_memsz,
4328 page);
252b5132 4329 p->p_memsz += adjust;
252b5132 4330 }
252b5132
RH
4331 }
4332
4333 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4334 {
b301b248
AM
4335 /* The section at i == 0 is the one that actually contains
4336 everything. */
4a938328
MS
4337 if (i == 0)
4338 {
252b5132 4339 sec->filepos = off;
eea6121a 4340 off += sec->size;
b301b248
AM
4341 p->p_filesz = sec->size;
4342 p->p_memsz = 0;
4343 p->p_align = 1;
252b5132 4344 }
4a938328 4345 else
252b5132 4346 {
b301b248 4347 /* The rest are fake sections that shouldn't be written. */
252b5132 4348 sec->filepos = 0;
eea6121a 4349 sec->size = 0;
b301b248
AM
4350 sec->flags = 0;
4351 continue;
252b5132 4352 }
252b5132
RH
4353 }
4354 else
4355 {
b301b248
AM
4356 if (p->p_type == PT_LOAD)
4357 {
4358 sec->filepos = off;
5efb6261
AM
4359 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4360 1997, and the exact reason for it isn't clear. One
4361 plausible explanation is that it is to work around
4362 a problem we have with linker scripts using data
4363 statements in NOLOAD sections. I don't think it
4364 makes a great deal of sense to have such a section
4365 assigned to a PT_LOAD segment, but apparently
4366 people do this. The data statement results in a
4367 bfd_data_link_order being built, and these need
4368 section contents to write into. Eventually, we get
4369 to _bfd_elf_write_object_contents which writes any
4370 section with contents to the output. Make room
4371 here for the write, so that following segments are
4372 not trashed. */
4373 if ((flags & SEC_LOAD) != 0
4374 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4375 off += sec->size;
4376 }
252b5132 4377
5efb6261 4378 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4379 {
4380 p->p_filesz += sec->size;
4381 p->p_memsz += sec->size;
4382 }
4b6c0f2f
NC
4383 /* PR ld/594: Sections in note segments which are not loaded
4384 contribute to the file size but not the in-memory size. */
4385 else if (p->p_type == PT_NOTE
4386 && (flags & SEC_HAS_CONTENTS) != 0)
4387 p->p_filesz += sec->size;
4388
b301b248
AM
4389 /* .tbss is special. It doesn't contribute to p_memsz of
4390 normal segments. */
4391 else if ((flags & SEC_THREAD_LOCAL) == 0
4392 || p->p_type == PT_TLS)
4393 p->p_memsz += sec->size;
252b5132 4394
13ae64f3 4395 if (p->p_type == PT_TLS
eea6121a 4396 && sec->size == 0
13ae64f3
JJ
4397 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4398 {
4399 struct bfd_link_order *o;
4400 bfd_vma tbss_size = 0;
4401
8423293d 4402 for (o = sec->map_head.link_order; o != NULL; o = o->next)
13ae64f3
JJ
4403 if (tbss_size < o->offset + o->size)
4404 tbss_size = o->offset + o->size;
4405
4406 p->p_memsz += tbss_size;
4407 }
4408
252b5132
RH
4409 if (align > p->p_align
4410 && (p->p_type != PT_LOAD || (abfd->flags & D_PAGED) == 0))
4411 p->p_align = align;
4412 }
4413
4414 if (! m->p_flags_valid)
4415 {
4416 p->p_flags |= PF_R;
4417 if ((flags & SEC_CODE) != 0)
4418 p->p_flags |= PF_X;
4419 if ((flags & SEC_READONLY) == 0)
4420 p->p_flags |= PF_W;
4421 }
4422 }
4423 }
4424
4425 /* Now that we have set the section file positions, we can set up
4426 the file positions for the non PT_LOAD segments. */
4427 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4428 m != NULL;
4429 m = m->next, p++)
4430 {
4431 if (p->p_type != PT_LOAD && m->count > 0)
4432 {
4433 BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs);
229fcec5
MM
4434 /* If the section has not yet been assigned a file position,
4435 do so now. The ARM BPABI requires that .dynamic section
4436 not be marked SEC_ALLOC because it is not part of any
4437 PT_LOAD segment, so it will not be processed above. */
4438 if (p->p_type == PT_DYNAMIC && m->sections[0]->filepos == 0)
4439 {
4440 unsigned int i;
4441 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4442
4443 i = 1;
4444 while (i_shdrpp[i]->bfd_section != m->sections[0])
4445 ++i;
4446 off = (_bfd_elf_assign_file_position_for_section
4447 (i_shdrpp[i], off, TRUE));
4448 p->p_filesz = m->sections[0]->size;
4449 }
252b5132
RH
4450 p->p_offset = m->sections[0]->filepos;
4451 }
4452 if (m->count == 0)
4453 {
4454 if (m->includes_filehdr)
4455 {
4456 p->p_vaddr = filehdr_vaddr;
4457 if (! m->p_paddr_valid)
4458 p->p_paddr = filehdr_paddr;
4459 }
4460 else if (m->includes_phdrs)
4461 {
4462 p->p_vaddr = phdrs_vaddr;
4463 if (! m->p_paddr_valid)
4464 p->p_paddr = phdrs_paddr;
4465 }
8c37241b
JJ
4466 else if (p->p_type == PT_GNU_RELRO)
4467 {
4468 Elf_Internal_Phdr *lp;
4469
4470 for (lp = phdrs; lp < phdrs + count; ++lp)
4471 {
4472 if (lp->p_type == PT_LOAD
4473 && lp->p_vaddr <= link_info->relro_end
4474 && lp->p_vaddr >= link_info->relro_start
4475 && lp->p_vaddr + lp->p_filesz
4476 >= link_info->relro_end)
4477 break;
4478 }
4479
4480 if (lp < phdrs + count
4481 && link_info->relro_end > lp->p_vaddr)
4482 {
4483 p->p_vaddr = lp->p_vaddr;
4484 p->p_paddr = lp->p_paddr;
4485 p->p_offset = lp->p_offset;
4486 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4487 p->p_memsz = p->p_filesz;
4488 p->p_align = 1;
4489 p->p_flags = (lp->p_flags & ~PF_W);
4490 }
4491 else
4492 {
4493 memset (p, 0, sizeof *p);
4494 p->p_type = PT_NULL;
4495 }
4496 }
252b5132
RH
4497 }
4498 }
4499
4500 /* Clear out any program headers we allocated but did not use. */
4501 for (; count < alloc; count++, p++)
4502 {
4503 memset (p, 0, sizeof *p);
4504 p->p_type = PT_NULL;
4505 }
4506
4507 elf_tdata (abfd)->phdr = phdrs;
4508
4509 elf_tdata (abfd)->next_file_pos = off;
4510
4511 /* Write out the program headers. */
dc810e39 4512 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
252b5132 4513 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0)
b34976b6 4514 return FALSE;
252b5132 4515
b34976b6 4516 return TRUE;
252b5132
RH
4517}
4518
4519/* Get the size of the program header.
4520
4521 If this is called by the linker before any of the section VMA's are set, it
4522 can't calculate the correct value for a strange memory layout. This only
4523 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4524 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4525 data segment (exclusive of .interp and .dynamic).
4526
4527 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4528 will be two segments. */
4529
4530static bfd_size_type
217aa764 4531get_program_header_size (bfd *abfd)
252b5132
RH
4532{
4533 size_t segs;
4534 asection *s;
9c5bfbb7 4535 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4536
4537 /* We can't return a different result each time we're called. */
4538 if (elf_tdata (abfd)->program_header_size != 0)
4539 return elf_tdata (abfd)->program_header_size;
4540
4541 if (elf_tdata (abfd)->segment_map != NULL)
4542 {
4543 struct elf_segment_map *m;
4544
4545 segs = 0;
4546 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4547 ++segs;
4548 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4549 return elf_tdata (abfd)->program_header_size;
4550 }
4551
4552 /* Assume we will need exactly two PT_LOAD segments: one for text
4553 and one for data. */
4554 segs = 2;
4555
4556 s = bfd_get_section_by_name (abfd, ".interp");
4557 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4558 {
4559 /* If we have a loadable interpreter section, we need a
4560 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4561 PT_PHDR segment, although that may not be true for all
252b5132
RH
4562 targets. */
4563 segs += 2;
4564 }
4565
4566 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4567 {
4568 /* We need a PT_DYNAMIC segment. */
4569 ++segs;
4570 }
4571
126495ed 4572 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4573 {
4574 /* We need a PT_GNU_EH_FRAME segment. */
4575 ++segs;
4576 }
4577
9ee5e499
JJ
4578 if (elf_tdata (abfd)->stack_flags)
4579 {
4580 /* We need a PT_GNU_STACK segment. */
4581 ++segs;
4582 }
4583
8c37241b
JJ
4584 if (elf_tdata (abfd)->relro)
4585 {
4586 /* We need a PT_GNU_RELRO segment. */
4587 ++segs;
4588 }
4589
252b5132
RH
4590 for (s = abfd->sections; s != NULL; s = s->next)
4591 {
4592 if ((s->flags & SEC_LOAD) != 0
4593 && strncmp (s->name, ".note", 5) == 0)
4594 {
4595 /* We need a PT_NOTE segment. */
4596 ++segs;
4597 }
4598 }
4599
13ae64f3
JJ
4600 for (s = abfd->sections; s != NULL; s = s->next)
4601 {
4602 if (s->flags & SEC_THREAD_LOCAL)
4603 {
4604 /* We need a PT_TLS segment. */
4605 ++segs;
4606 break;
4607 }
4608 }
4609
252b5132
RH
4610 /* Let the backend count up any program headers it might need. */
4611 if (bed->elf_backend_additional_program_headers)
4612 {
4613 int a;
4614
4615 a = (*bed->elf_backend_additional_program_headers) (abfd);
4616 if (a == -1)
4617 abort ();
4618 segs += a;
4619 }
4620
4621 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4622 return elf_tdata (abfd)->program_header_size;
4623}
4624
4625/* Work out the file positions of all the sections. This is called by
4626 _bfd_elf_compute_section_file_positions. All the section sizes and
4627 VMAs must be known before this is called.
4628
e0638f70
AM
4629 Reloc sections come in two flavours: Those processed specially as
4630 "side-channel" data attached to a section to which they apply, and
4631 those that bfd doesn't process as relocations. The latter sort are
4632 stored in a normal bfd section by bfd_section_from_shdr. We don't
4633 consider the former sort here, unless they form part of the loadable
4634 image. Reloc sections not assigned here will be handled later by
4635 assign_file_positions_for_relocs.
252b5132
RH
4636
4637 We also don't set the positions of the .symtab and .strtab here. */
4638
b34976b6 4639static bfd_boolean
c84fca4d
AO
4640assign_file_positions_except_relocs (bfd *abfd,
4641 struct bfd_link_info *link_info)
252b5132
RH
4642{
4643 struct elf_obj_tdata * const tdata = elf_tdata (abfd);
4644 Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd);
4645 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
9ad5cbcf 4646 unsigned int num_sec = elf_numsections (abfd);
252b5132 4647 file_ptr off;
9c5bfbb7 4648 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4649
4650 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4651 && bfd_get_format (abfd) != bfd_core)
4652 {
4653 Elf_Internal_Shdr **hdrpp;
4654 unsigned int i;
4655
4656 /* Start after the ELF header. */
4657 off = i_ehdrp->e_ehsize;
4658
4659 /* We are not creating an executable, which means that we are
4660 not creating a program header, and that the actual order of
4661 the sections in the file is unimportant. */
9ad5cbcf 4662 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4663 {
4664 Elf_Internal_Shdr *hdr;
4665
4666 hdr = *hdrpp;
e0638f70
AM
4667 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4668 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4669 || i == tdata->symtab_section
4670 || i == tdata->symtab_shndx_section
252b5132
RH
4671 || i == tdata->strtab_section)
4672 {
4673 hdr->sh_offset = -1;
252b5132 4674 }
9ad5cbcf 4675 else
b34976b6 4676 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4677
9ad5cbcf
AM
4678 if (i == SHN_LORESERVE - 1)
4679 {
4680 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4681 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4682 }
252b5132
RH
4683 }
4684 }
4685 else
4686 {
4687 unsigned int i;
4688 Elf_Internal_Shdr **hdrpp;
4689
4690 /* Assign file positions for the loaded sections based on the
4691 assignment of sections to segments. */
c84fca4d 4692 if (! assign_file_positions_for_segments (abfd, link_info))
b34976b6 4693 return FALSE;
252b5132
RH
4694
4695 /* Assign file positions for the other sections. */
4696
4697 off = elf_tdata (abfd)->next_file_pos;
9ad5cbcf 4698 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4699 {
4700 Elf_Internal_Shdr *hdr;
4701
4702 hdr = *hdrpp;
4703 if (hdr->bfd_section != NULL
4704 && hdr->bfd_section->filepos != 0)
4705 hdr->sh_offset = hdr->bfd_section->filepos;
4706 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4707 {
4708 ((*_bfd_error_handler)
b301b248
AM
4709 (_("%B: warning: allocated section `%s' not in segment"),
4710 abfd,
252b5132
RH
4711 (hdr->bfd_section == NULL
4712 ? "*unknown*"
4713 : hdr->bfd_section->name)));
4714 if ((abfd->flags & D_PAGED) != 0)
340b6d91
AC
4715 off += vma_page_aligned_bias (hdr->sh_addr, off,
4716 bed->maxpagesize);
252b5132 4717 else
340b6d91
AC
4718 off += vma_page_aligned_bias (hdr->sh_addr, off,
4719 hdr->sh_addralign);
252b5132 4720 off = _bfd_elf_assign_file_position_for_section (hdr, off,
b34976b6 4721 FALSE);
252b5132 4722 }
e0638f70
AM
4723 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4724 && hdr->bfd_section == NULL)
252b5132 4725 || hdr == i_shdrpp[tdata->symtab_section]
9ad5cbcf 4726 || hdr == i_shdrpp[tdata->symtab_shndx_section]
252b5132
RH
4727 || hdr == i_shdrpp[tdata->strtab_section])
4728 hdr->sh_offset = -1;
4729 else
b34976b6 4730 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf
AM
4731
4732 if (i == SHN_LORESERVE - 1)
4733 {
4734 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4735 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4736 }
252b5132
RH
4737 }
4738 }
4739
4740 /* Place the section headers. */
45d6a902 4741 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4742 i_ehdrp->e_shoff = off;
4743 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4744
4745 elf_tdata (abfd)->next_file_pos = off;
4746
b34976b6 4747 return TRUE;
252b5132
RH
4748}
4749
b34976b6 4750static bfd_boolean
217aa764 4751prep_headers (bfd *abfd)
252b5132
RH
4752{
4753 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4754 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4755 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4756 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4757 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4758
4759 i_ehdrp = elf_elfheader (abfd);
4760 i_shdrp = elf_elfsections (abfd);
4761
2b0f7ef9 4762 shstrtab = _bfd_elf_strtab_init ();
252b5132 4763 if (shstrtab == NULL)
b34976b6 4764 return FALSE;
252b5132
RH
4765
4766 elf_shstrtab (abfd) = shstrtab;
4767
4768 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4769 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4770 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4771 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4772
4773 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4774 i_ehdrp->e_ident[EI_DATA] =
4775 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4776 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4777
252b5132
RH
4778 if ((abfd->flags & DYNAMIC) != 0)
4779 i_ehdrp->e_type = ET_DYN;
4780 else if ((abfd->flags & EXEC_P) != 0)
4781 i_ehdrp->e_type = ET_EXEC;
4782 else if (bfd_get_format (abfd) == bfd_core)
4783 i_ehdrp->e_type = ET_CORE;
4784 else
4785 i_ehdrp->e_type = ET_REL;
4786
4787 switch (bfd_get_arch (abfd))
4788 {
4789 case bfd_arch_unknown:
4790 i_ehdrp->e_machine = EM_NONE;
4791 break;
aa4f99bb
AO
4792
4793 /* There used to be a long list of cases here, each one setting
4794 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4795 in the corresponding bfd definition. To avoid duplication,
4796 the switch was removed. Machines that need special handling
4797 can generally do it in elf_backend_final_write_processing(),
4798 unless they need the information earlier than the final write.
4799 Such need can generally be supplied by replacing the tests for
4800 e_machine with the conditions used to determine it. */
252b5132 4801 default:
9c5bfbb7
AM
4802 i_ehdrp->e_machine = bed->elf_machine_code;
4803 }
aa4f99bb 4804
252b5132
RH
4805 i_ehdrp->e_version = bed->s->ev_current;
4806 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4807
c044fabd 4808 /* No program header, for now. */
252b5132
RH
4809 i_ehdrp->e_phoff = 0;
4810 i_ehdrp->e_phentsize = 0;
4811 i_ehdrp->e_phnum = 0;
4812
c044fabd 4813 /* Each bfd section is section header entry. */
252b5132
RH
4814 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4815 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4816
c044fabd 4817 /* If we're building an executable, we'll need a program header table. */
252b5132 4818 if (abfd->flags & EXEC_P)
0e71e495
BE
4819 /* It all happens later. */
4820 ;
252b5132
RH
4821 else
4822 {
4823 i_ehdrp->e_phentsize = 0;
4824 i_phdrp = 0;
4825 i_ehdrp->e_phoff = 0;
4826 }
4827
4828 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4829 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4830 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4831 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4832 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4833 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4834 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4835 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4836 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4837 return FALSE;
252b5132 4838
b34976b6 4839 return TRUE;
252b5132
RH
4840}
4841
4842/* Assign file positions for all the reloc sections which are not part
4843 of the loadable file image. */
4844
4845void
217aa764 4846_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4847{
4848 file_ptr off;
9ad5cbcf 4849 unsigned int i, num_sec;
252b5132
RH
4850 Elf_Internal_Shdr **shdrpp;
4851
4852 off = elf_tdata (abfd)->next_file_pos;
4853
9ad5cbcf
AM
4854 num_sec = elf_numsections (abfd);
4855 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4856 {
4857 Elf_Internal_Shdr *shdrp;
4858
4859 shdrp = *shdrpp;
4860 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4861 && shdrp->sh_offset == -1)
b34976b6 4862 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4863 }
4864
4865 elf_tdata (abfd)->next_file_pos = off;
4866}
4867
b34976b6 4868bfd_boolean
217aa764 4869_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4870{
9c5bfbb7 4871 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4872 Elf_Internal_Ehdr *i_ehdrp;
4873 Elf_Internal_Shdr **i_shdrp;
b34976b6 4874 bfd_boolean failed;
9ad5cbcf 4875 unsigned int count, num_sec;
252b5132
RH
4876
4877 if (! abfd->output_has_begun
217aa764 4878 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4879 return FALSE;
252b5132
RH
4880
4881 i_shdrp = elf_elfsections (abfd);
4882 i_ehdrp = elf_elfheader (abfd);
4883
b34976b6 4884 failed = FALSE;
252b5132
RH
4885 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4886 if (failed)
b34976b6 4887 return FALSE;
252b5132
RH
4888
4889 _bfd_elf_assign_file_positions_for_relocs (abfd);
4890
c044fabd 4891 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4892 num_sec = elf_numsections (abfd);
4893 for (count = 1; count < num_sec; count++)
252b5132
RH
4894 {
4895 if (bed->elf_backend_section_processing)
4896 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4897 if (i_shdrp[count]->contents)
4898 {
dc810e39
AM
4899 bfd_size_type amt = i_shdrp[count]->sh_size;
4900
252b5132 4901 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4902 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4903 return FALSE;
252b5132 4904 }
9ad5cbcf
AM
4905 if (count == SHN_LORESERVE - 1)
4906 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4907 }
4908
4909 /* Write out the section header names. */
26ae6d5e
DJ
4910 if (elf_shstrtab (abfd) != NULL
4911 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
4912 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4913 return FALSE;
252b5132
RH
4914
4915 if (bed->elf_backend_final_write_processing)
4916 (*bed->elf_backend_final_write_processing) (abfd,
4917 elf_tdata (abfd)->linker);
4918
4919 return bed->s->write_shdrs_and_ehdr (abfd);
4920}
4921
b34976b6 4922bfd_boolean
217aa764 4923_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4924{
c044fabd 4925 /* Hopefully this can be done just like an object file. */
252b5132
RH
4926 return _bfd_elf_write_object_contents (abfd);
4927}
c044fabd
KH
4928
4929/* Given a section, search the header to find them. */
4930
252b5132 4931int
198beae2 4932_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4933{
9c5bfbb7 4934 const struct elf_backend_data *bed;
252b5132 4935 int index;
252b5132 4936
9ad5cbcf
AM
4937 if (elf_section_data (asect) != NULL
4938 && elf_section_data (asect)->this_idx != 0)
4939 return elf_section_data (asect)->this_idx;
4940
4941 if (bfd_is_abs_section (asect))
af746e92
AM
4942 index = SHN_ABS;
4943 else if (bfd_is_com_section (asect))
4944 index = SHN_COMMON;
4945 else if (bfd_is_und_section (asect))
4946 index = SHN_UNDEF;
4947 else
6dc132d9 4948 index = -1;
252b5132 4949
af746e92 4950 bed = get_elf_backend_data (abfd);
252b5132
RH
4951 if (bed->elf_backend_section_from_bfd_section)
4952 {
af746e92 4953 int retval = index;
9ad5cbcf 4954
af746e92
AM
4955 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
4956 return retval;
252b5132
RH
4957 }
4958
af746e92
AM
4959 if (index == -1)
4960 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 4961
af746e92 4962 return index;
252b5132
RH
4963}
4964
4965/* Given a BFD symbol, return the index in the ELF symbol table, or -1
4966 on error. */
4967
4968int
217aa764 4969_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
4970{
4971 asymbol *asym_ptr = *asym_ptr_ptr;
4972 int idx;
4973 flagword flags = asym_ptr->flags;
4974
4975 /* When gas creates relocations against local labels, it creates its
4976 own symbol for the section, but does put the symbol into the
4977 symbol chain, so udata is 0. When the linker is generating
4978 relocatable output, this section symbol may be for one of the
4979 input sections rather than the output section. */
4980 if (asym_ptr->udata.i == 0
4981 && (flags & BSF_SECTION_SYM)
4982 && asym_ptr->section)
4983 {
4984 int indx;
4985
4986 if (asym_ptr->section->output_section != NULL)
4987 indx = asym_ptr->section->output_section->index;
4988 else
4989 indx = asym_ptr->section->index;
4e89ac30
L
4990 if (indx < elf_num_section_syms (abfd)
4991 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
4992 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
4993 }
4994
4995 idx = asym_ptr->udata.i;
4996
4997 if (idx == 0)
4998 {
4999 /* This case can occur when using --strip-symbol on a symbol
5000 which is used in a relocation entry. */
5001 (*_bfd_error_handler)
d003868e
AM
5002 (_("%B: symbol `%s' required but not present"),
5003 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5004 bfd_set_error (bfd_error_no_symbols);
5005 return -1;
5006 }
5007
5008#if DEBUG & 4
5009 {
5010 fprintf (stderr,
661a3fd4 5011 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5012 (long) asym_ptr, asym_ptr->name, idx, flags,
5013 elf_symbol_flags (flags));
5014 fflush (stderr);
5015 }
5016#endif
5017
5018 return idx;
5019}
5020
5021/* Copy private BFD data. This copies any program header information. */
5022
b34976b6 5023static bfd_boolean
217aa764 5024copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132 5025{
b34976b6
AM
5026 Elf_Internal_Ehdr *iehdr;
5027 struct elf_segment_map *map;
5028 struct elf_segment_map *map_first;
5029 struct elf_segment_map **pointer_to_map;
5030 Elf_Internal_Phdr *segment;
5031 asection *section;
5032 unsigned int i;
5033 unsigned int num_segments;
5034 bfd_boolean phdr_included = FALSE;
5035 bfd_vma maxpagesize;
5036 struct elf_segment_map *phdr_adjust_seg = NULL;
5037 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5038 const struct elf_backend_data *bed;
bc67d8a6 5039
c044fabd 5040 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 5041 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5042 return TRUE;
252b5132
RH
5043
5044 if (elf_tdata (ibfd)->phdr == NULL)
b34976b6 5045 return TRUE;
252b5132 5046
caf47ea6 5047 bed = get_elf_backend_data (ibfd);
252b5132
RH
5048 iehdr = elf_elfheader (ibfd);
5049
bc67d8a6 5050 map_first = NULL;
c044fabd 5051 pointer_to_map = &map_first;
252b5132
RH
5052
5053 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5054 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5055
5056 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5057#define SEGMENT_END(segment, start) \
5058 (start + (segment->p_memsz > segment->p_filesz \
5059 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5060
eecdbe52
JJ
5061#define SECTION_SIZE(section, segment) \
5062 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5063 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5064 ? section->size : 0)
eecdbe52 5065
b34976b6 5066 /* Returns TRUE if the given section is contained within
bc67d8a6 5067 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5068#define IS_CONTAINED_BY_VMA(section, segment) \
5069 (section->vma >= segment->p_vaddr \
eecdbe52 5070 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5071 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5072
b34976b6 5073 /* Returns TRUE if the given section is contained within
bc67d8a6 5074 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5075#define IS_CONTAINED_BY_LMA(section, segment, base) \
5076 (section->lma >= base \
eecdbe52 5077 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5078 <= SEGMENT_END (segment, base)))
252b5132 5079
c044fabd 5080 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5081#define IS_COREFILE_NOTE(p, s) \
5082 (p->p_type == PT_NOTE \
5083 && bfd_get_format (ibfd) == bfd_core \
5084 && s->vma == 0 && s->lma == 0 \
5085 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5086 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5087 <= p->p_offset + p->p_filesz))
252b5132
RH
5088
5089 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5090 linker, which generates a PT_INTERP section with p_vaddr and
5091 p_memsz set to 0. */
aecc8f8a
AM
5092#define IS_SOLARIS_PT_INTERP(p, s) \
5093 (p->p_vaddr == 0 \
5094 && p->p_paddr == 0 \
5095 && p->p_memsz == 0 \
5096 && p->p_filesz > 0 \
5097 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5098 && s->size > 0 \
aecc8f8a 5099 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5100 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5101 <= p->p_offset + p->p_filesz))
5c440b1e 5102
bc67d8a6
NC
5103 /* Decide if the given section should be included in the given segment.
5104 A section will be included if:
f5ffc919
NC
5105 1. It is within the address space of the segment -- we use the LMA
5106 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5107 2. It is an allocated segment,
5108 3. There is an output section associated with it,
eecdbe52 5109 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5110 5. PT_GNU_STACK segments do not include any sections.
5111 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5112 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5113 8. PT_DYNAMIC should not contain empty sections at the beginning
5114 (with the possible exception of .dynamic). */
caf47ea6 5115#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5116 ((((segment->p_paddr \
5117 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5118 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5119 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5120 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5121 && section->output_section != NULL \
03394ac9 5122 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5123 && (segment->p_type != PT_TLS \
5124 || (section->flags & SEC_THREAD_LOCAL)) \
5125 && (segment->p_type == PT_LOAD \
5126 || segment->p_type == PT_TLS \
5127 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5128 && (segment->p_type != PT_DYNAMIC \
5129 || SECTION_SIZE (section, segment) > 0 \
5130 || (segment->p_paddr \
5131 ? segment->p_paddr != section->lma \
5132 : segment->p_vaddr != section->vma) \
5133 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5134 == 0)) \
82e51918 5135 && ! section->segment_mark)
bc67d8a6 5136
b34976b6 5137 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5138#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5139 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5140
5141 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5142 their VMA address ranges and their LMA address ranges overlap.
5143 It is possible to have overlapping VMA ranges without overlapping LMA
5144 ranges. RedBoot images for example can have both .data and .bss mapped
5145 to the same VMA range, but with the .data section mapped to a different
5146 LMA. */
aecc8f8a 5147#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5148 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5149 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5150 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5151 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5152
5153 /* Initialise the segment mark field. */
5154 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5155 section->segment_mark = FALSE;
bc67d8a6 5156
252b5132 5157 /* Scan through the segments specified in the program header
bc67d8a6 5158 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5159 in the loadable segments. These can be created by weird
aecc8f8a 5160 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5161 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5162 i < num_segments;
c044fabd 5163 i++, segment++)
252b5132 5164 {
252b5132 5165 unsigned int j;
c044fabd 5166 Elf_Internal_Phdr *segment2;
252b5132 5167
aecc8f8a
AM
5168 if (segment->p_type == PT_INTERP)
5169 for (section = ibfd->sections; section; section = section->next)
5170 if (IS_SOLARIS_PT_INTERP (segment, section))
5171 {
5172 /* Mininal change so that the normal section to segment
4cc11e76 5173 assignment code will work. */
aecc8f8a
AM
5174 segment->p_vaddr = section->vma;
5175 break;
5176 }
5177
bc67d8a6
NC
5178 if (segment->p_type != PT_LOAD)
5179 continue;
c044fabd 5180
bc67d8a6 5181 /* Determine if this segment overlaps any previous segments. */
c044fabd 5182 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5183 {
5184 bfd_signed_vma extra_length;
c044fabd 5185
bc67d8a6
NC
5186 if (segment2->p_type != PT_LOAD
5187 || ! SEGMENT_OVERLAPS (segment, segment2))
5188 continue;
c044fabd 5189
bc67d8a6
NC
5190 /* Merge the two segments together. */
5191 if (segment2->p_vaddr < segment->p_vaddr)
5192 {
c044fabd
KH
5193 /* Extend SEGMENT2 to include SEGMENT and then delete
5194 SEGMENT. */
bc67d8a6
NC
5195 extra_length =
5196 SEGMENT_END (segment, segment->p_vaddr)
5197 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5198
bc67d8a6
NC
5199 if (extra_length > 0)
5200 {
5201 segment2->p_memsz += extra_length;
5202 segment2->p_filesz += extra_length;
5203 }
c044fabd 5204
bc67d8a6 5205 segment->p_type = PT_NULL;
c044fabd 5206
bc67d8a6
NC
5207 /* Since we have deleted P we must restart the outer loop. */
5208 i = 0;
5209 segment = elf_tdata (ibfd)->phdr;
5210 break;
5211 }
5212 else
5213 {
c044fabd
KH
5214 /* Extend SEGMENT to include SEGMENT2 and then delete
5215 SEGMENT2. */
bc67d8a6
NC
5216 extra_length =
5217 SEGMENT_END (segment2, segment2->p_vaddr)
5218 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5219
bc67d8a6
NC
5220 if (extra_length > 0)
5221 {
5222 segment->p_memsz += extra_length;
5223 segment->p_filesz += extra_length;
5224 }
c044fabd 5225
bc67d8a6
NC
5226 segment2->p_type = PT_NULL;
5227 }
5228 }
5229 }
c044fabd 5230
bc67d8a6
NC
5231 /* The second scan attempts to assign sections to segments. */
5232 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5233 i < num_segments;
5234 i ++, segment ++)
5235 {
5236 unsigned int section_count;
5237 asection ** sections;
5238 asection * output_section;
5239 unsigned int isec;
5240 bfd_vma matching_lma;
5241 bfd_vma suggested_lma;
5242 unsigned int j;
dc810e39 5243 bfd_size_type amt;
bc67d8a6
NC
5244
5245 if (segment->p_type == PT_NULL)
5246 continue;
c044fabd 5247
bc67d8a6 5248 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5249 for (section = ibfd->sections, section_count = 0;
5250 section != NULL;
5251 section = section->next)
caf47ea6 5252 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5253 ++section_count;
811072d8 5254
b5f852ea
NC
5255 /* Allocate a segment map big enough to contain
5256 all of the sections we have selected. */
dc810e39
AM
5257 amt = sizeof (struct elf_segment_map);
5258 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5259 map = bfd_alloc (obfd, amt);
bc67d8a6 5260 if (map == NULL)
b34976b6 5261 return FALSE;
252b5132
RH
5262
5263 /* Initialise the fields of the segment map. Default to
5264 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5265 map->next = NULL;
5266 map->p_type = segment->p_type;
5267 map->p_flags = segment->p_flags;
5268 map->p_flags_valid = 1;
5269 map->p_paddr = segment->p_paddr;
5270 map->p_paddr_valid = 1;
252b5132
RH
5271
5272 /* Determine if this segment contains the ELF file header
5273 and if it contains the program headers themselves. */
bc67d8a6
NC
5274 map->includes_filehdr = (segment->p_offset == 0
5275 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5276
bc67d8a6 5277 map->includes_phdrs = 0;
252b5132 5278
bc67d8a6 5279 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5280 {
bc67d8a6
NC
5281 map->includes_phdrs =
5282 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5283 && (segment->p_offset + segment->p_filesz
252b5132
RH
5284 >= ((bfd_vma) iehdr->e_phoff
5285 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5286
bc67d8a6 5287 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5288 phdr_included = TRUE;
252b5132
RH
5289 }
5290
bc67d8a6 5291 if (section_count == 0)
252b5132
RH
5292 {
5293 /* Special segments, such as the PT_PHDR segment, may contain
5294 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5295 something. They are allowed by the ELF spec however, so only
5296 a warning is produced. */
bc67d8a6 5297 if (segment->p_type == PT_LOAD)
caf47ea6 5298 (*_bfd_error_handler)
d003868e
AM
5299 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5300 ibfd);
252b5132 5301
bc67d8a6 5302 map->count = 0;
c044fabd
KH
5303 *pointer_to_map = map;
5304 pointer_to_map = &map->next;
252b5132
RH
5305
5306 continue;
5307 }
5308
5309 /* Now scan the sections in the input BFD again and attempt
5310 to add their corresponding output sections to the segment map.
5311 The problem here is how to handle an output section which has
5312 been moved (ie had its LMA changed). There are four possibilities:
5313
5314 1. None of the sections have been moved.
5315 In this case we can continue to use the segment LMA from the
5316 input BFD.
5317
5318 2. All of the sections have been moved by the same amount.
5319 In this case we can change the segment's LMA to match the LMA
5320 of the first section.
5321
5322 3. Some of the sections have been moved, others have not.
5323 In this case those sections which have not been moved can be
5324 placed in the current segment which will have to have its size,
5325 and possibly its LMA changed, and a new segment or segments will
5326 have to be created to contain the other sections.
5327
b5f852ea 5328 4. The sections have been moved, but not by the same amount.
252b5132
RH
5329 In this case we can change the segment's LMA to match the LMA
5330 of the first section and we will have to create a new segment
5331 or segments to contain the other sections.
5332
5333 In order to save time, we allocate an array to hold the section
5334 pointers that we are interested in. As these sections get assigned
5335 to a segment, they are removed from this array. */
5336
0b14c2aa
L
5337 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5338 to work around this long long bug. */
d0fb9a8d 5339 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5340 if (sections == NULL)
b34976b6 5341 return FALSE;
252b5132
RH
5342
5343 /* Step One: Scan for segment vs section LMA conflicts.
5344 Also add the sections to the section array allocated above.
5345 Also add the sections to the current segment. In the common
5346 case, where the sections have not been moved, this means that
5347 we have completely filled the segment, and there is nothing
5348 more to do. */
252b5132 5349 isec = 0;
72730e0c 5350 matching_lma = 0;
252b5132
RH
5351 suggested_lma = 0;
5352
bc67d8a6
NC
5353 for (j = 0, section = ibfd->sections;
5354 section != NULL;
5355 section = section->next)
252b5132 5356 {
caf47ea6 5357 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5358 {
bc67d8a6
NC
5359 output_section = section->output_section;
5360
5361 sections[j ++] = section;
252b5132
RH
5362
5363 /* The Solaris native linker always sets p_paddr to 0.
5364 We try to catch that case here, and set it to the
5e8d7549
NC
5365 correct value. Note - some backends require that
5366 p_paddr be left as zero. */
bc67d8a6 5367 if (segment->p_paddr == 0
4455705d 5368 && segment->p_vaddr != 0
5e8d7549 5369 && (! bed->want_p_paddr_set_to_zero)
252b5132 5370 && isec == 0
bc67d8a6
NC
5371 && output_section->lma != 0
5372 && (output_section->vma == (segment->p_vaddr
5373 + (map->includes_filehdr
5374 ? iehdr->e_ehsize
5375 : 0)
5376 + (map->includes_phdrs
079e9a2f
AM
5377 ? (iehdr->e_phnum
5378 * iehdr->e_phentsize)
bc67d8a6
NC
5379 : 0))))
5380 map->p_paddr = segment->p_vaddr;
252b5132
RH
5381
5382 /* Match up the physical address of the segment with the
5383 LMA address of the output section. */
bc67d8a6 5384 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5385 || IS_COREFILE_NOTE (segment, section)
5386 || (bed->want_p_paddr_set_to_zero &&
5387 IS_CONTAINED_BY_VMA (output_section, segment))
5388 )
252b5132
RH
5389 {
5390 if (matching_lma == 0)
bc67d8a6 5391 matching_lma = output_section->lma;
252b5132
RH
5392
5393 /* We assume that if the section fits within the segment
bc67d8a6 5394 then it does not overlap any other section within that
252b5132 5395 segment. */
bc67d8a6 5396 map->sections[isec ++] = output_section;
252b5132
RH
5397 }
5398 else if (suggested_lma == 0)
bc67d8a6 5399 suggested_lma = output_section->lma;
252b5132
RH
5400 }
5401 }
5402
bc67d8a6 5403 BFD_ASSERT (j == section_count);
252b5132
RH
5404
5405 /* Step Two: Adjust the physical address of the current segment,
5406 if necessary. */
bc67d8a6 5407 if (isec == section_count)
252b5132
RH
5408 {
5409 /* All of the sections fitted within the segment as currently
5410 specified. This is the default case. Add the segment to
5411 the list of built segments and carry on to process the next
5412 program header in the input BFD. */
bc67d8a6 5413 map->count = section_count;
c044fabd
KH
5414 *pointer_to_map = map;
5415 pointer_to_map = &map->next;
252b5132
RH
5416
5417 free (sections);
5418 continue;
5419 }
252b5132
RH
5420 else
5421 {
72730e0c
AM
5422 if (matching_lma != 0)
5423 {
5424 /* At least one section fits inside the current segment.
5425 Keep it, but modify its physical address to match the
5426 LMA of the first section that fitted. */
bc67d8a6 5427 map->p_paddr = matching_lma;
72730e0c
AM
5428 }
5429 else
5430 {
5431 /* None of the sections fitted inside the current segment.
5432 Change the current segment's physical address to match
5433 the LMA of the first section. */
bc67d8a6 5434 map->p_paddr = suggested_lma;
72730e0c
AM
5435 }
5436
bc67d8a6
NC
5437 /* Offset the segment physical address from the lma
5438 to allow for space taken up by elf headers. */
5439 if (map->includes_filehdr)
5440 map->p_paddr -= iehdr->e_ehsize;
252b5132 5441
bc67d8a6
NC
5442 if (map->includes_phdrs)
5443 {
5444 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5445
5446 /* iehdr->e_phnum is just an estimate of the number
5447 of program headers that we will need. Make a note
5448 here of the number we used and the segment we chose
5449 to hold these headers, so that we can adjust the
5450 offset when we know the correct value. */
5451 phdr_adjust_num = iehdr->e_phnum;
5452 phdr_adjust_seg = map;
5453 }
252b5132
RH
5454 }
5455
5456 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5457 those that fit to the current segment and removing them from the
252b5132
RH
5458 sections array; but making sure not to leave large gaps. Once all
5459 possible sections have been assigned to the current segment it is
5460 added to the list of built segments and if sections still remain
5461 to be assigned, a new segment is constructed before repeating
5462 the loop. */
5463 isec = 0;
5464 do
5465 {
bc67d8a6 5466 map->count = 0;
252b5132
RH
5467 suggested_lma = 0;
5468
5469 /* Fill the current segment with sections that fit. */
bc67d8a6 5470 for (j = 0; j < section_count; j++)
252b5132 5471 {
bc67d8a6 5472 section = sections[j];
252b5132 5473
bc67d8a6 5474 if (section == NULL)
252b5132
RH
5475 continue;
5476
bc67d8a6 5477 output_section = section->output_section;
252b5132 5478
bc67d8a6 5479 BFD_ASSERT (output_section != NULL);
c044fabd 5480
bc67d8a6
NC
5481 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5482 || IS_COREFILE_NOTE (segment, section))
252b5132 5483 {
bc67d8a6 5484 if (map->count == 0)
252b5132
RH
5485 {
5486 /* If the first section in a segment does not start at
bc67d8a6
NC
5487 the beginning of the segment, then something is
5488 wrong. */
5489 if (output_section->lma !=
5490 (map->p_paddr
5491 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5492 + (map->includes_phdrs
5493 ? iehdr->e_phnum * iehdr->e_phentsize
5494 : 0)))
252b5132
RH
5495 abort ();
5496 }
5497 else
5498 {
5499 asection * prev_sec;
252b5132 5500
bc67d8a6 5501 prev_sec = map->sections[map->count - 1];
252b5132
RH
5502
5503 /* If the gap between the end of the previous section
bc67d8a6
NC
5504 and the start of this section is more than
5505 maxpagesize then we need to start a new segment. */
eea6121a 5506 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5507 maxpagesize)
caf47ea6 5508 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5509 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5510 > output_section->lma))
252b5132
RH
5511 {
5512 if (suggested_lma == 0)
bc67d8a6 5513 suggested_lma = output_section->lma;
252b5132
RH
5514
5515 continue;
5516 }
5517 }
5518
bc67d8a6 5519 map->sections[map->count++] = output_section;
252b5132
RH
5520 ++isec;
5521 sections[j] = NULL;
b34976b6 5522 section->segment_mark = TRUE;
252b5132
RH
5523 }
5524 else if (suggested_lma == 0)
bc67d8a6 5525 suggested_lma = output_section->lma;
252b5132
RH
5526 }
5527
bc67d8a6 5528 BFD_ASSERT (map->count > 0);
252b5132
RH
5529
5530 /* Add the current segment to the list of built segments. */
c044fabd
KH
5531 *pointer_to_map = map;
5532 pointer_to_map = &map->next;
252b5132 5533
bc67d8a6 5534 if (isec < section_count)
252b5132
RH
5535 {
5536 /* We still have not allocated all of the sections to
5537 segments. Create a new segment here, initialise it
5538 and carry on looping. */
dc810e39
AM
5539 amt = sizeof (struct elf_segment_map);
5540 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5541 map = bfd_alloc (obfd, amt);
bc67d8a6 5542 if (map == NULL)
5ed6aba4
NC
5543 {
5544 free (sections);
5545 return FALSE;
5546 }
252b5132
RH
5547
5548 /* Initialise the fields of the segment map. Set the physical
5549 physical address to the LMA of the first section that has
5550 not yet been assigned. */
bc67d8a6
NC
5551 map->next = NULL;
5552 map->p_type = segment->p_type;
5553 map->p_flags = segment->p_flags;
5554 map->p_flags_valid = 1;
5555 map->p_paddr = suggested_lma;
5556 map->p_paddr_valid = 1;
5557 map->includes_filehdr = 0;
5558 map->includes_phdrs = 0;
252b5132
RH
5559 }
5560 }
bc67d8a6 5561 while (isec < section_count);
252b5132
RH
5562
5563 free (sections);
5564 }
5565
5566 /* The Solaris linker creates program headers in which all the
5567 p_paddr fields are zero. When we try to objcopy or strip such a
5568 file, we get confused. Check for this case, and if we find it
5569 reset the p_paddr_valid fields. */
bc67d8a6
NC
5570 for (map = map_first; map != NULL; map = map->next)
5571 if (map->p_paddr != 0)
252b5132 5572 break;
bc67d8a6 5573 if (map == NULL)
b5f852ea
NC
5574 for (map = map_first; map != NULL; map = map->next)
5575 map->p_paddr_valid = 0;
252b5132 5576
bc67d8a6
NC
5577 elf_tdata (obfd)->segment_map = map_first;
5578
5579 /* If we had to estimate the number of program headers that were
9ad5cbcf 5580 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5581 the offset if necessary. */
5582 if (phdr_adjust_seg != NULL)
5583 {
5584 unsigned int count;
c044fabd 5585
bc67d8a6 5586 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5587 count++;
252b5132 5588
bc67d8a6
NC
5589 if (count > phdr_adjust_num)
5590 phdr_adjust_seg->p_paddr
5591 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5592 }
c044fabd 5593
bc67d8a6 5594#undef SEGMENT_END
eecdbe52 5595#undef SECTION_SIZE
bc67d8a6
NC
5596#undef IS_CONTAINED_BY_VMA
5597#undef IS_CONTAINED_BY_LMA
252b5132 5598#undef IS_COREFILE_NOTE
bc67d8a6
NC
5599#undef IS_SOLARIS_PT_INTERP
5600#undef INCLUDE_SECTION_IN_SEGMENT
5601#undef SEGMENT_AFTER_SEGMENT
5602#undef SEGMENT_OVERLAPS
b34976b6 5603 return TRUE;
252b5132
RH
5604}
5605
ccd2ec6a
L
5606/* Initialize private output section information from input section. */
5607
5608bfd_boolean
5609_bfd_elf_init_private_section_data (bfd *ibfd,
5610 asection *isec,
5611 bfd *obfd,
5612 asection *osec,
5613 struct bfd_link_info *link_info)
5614
5615{
5616 Elf_Internal_Shdr *ihdr, *ohdr;
5617 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
5618
5619 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5620 || obfd->xvec->flavour != bfd_target_elf_flavour)
5621 return TRUE;
5622
5623 /* FIXME: What if the output ELF section type has been set to
5624 something different? */
5625 if (elf_section_type (osec) == SHT_NULL)
5626 elf_section_type (osec) = elf_section_type (isec);
5627
5628 /* Set things up for objcopy and relocatable link. The output
5629 SHT_GROUP section will have its elf_next_in_group pointing back
5630 to the input group members. Ignore linker created group section.
5631 See elfNN_ia64_object_p in elfxx-ia64.c. */
5632
5633 if (need_group)
5634 {
5635 if (elf_sec_group (isec) == NULL
5636 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5637 {
5638 if (elf_section_flags (isec) & SHF_GROUP)
5639 elf_section_flags (osec) |= SHF_GROUP;
5640 elf_next_in_group (osec) = elf_next_in_group (isec);
5641 elf_group_name (osec) = elf_group_name (isec);
5642 }
5643 }
5644
5645 ihdr = &elf_section_data (isec)->this_hdr;
5646
5647 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
5648 don't use the output section of the linked-to section since it
5649 may be NULL at this point. */
5650 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
5651 {
5652 ohdr = &elf_section_data (osec)->this_hdr;
5653 ohdr->sh_flags |= SHF_LINK_ORDER;
5654 elf_linked_to_section (osec) = elf_linked_to_section (isec);
5655 }
5656
5657 osec->use_rela_p = isec->use_rela_p;
5658
5659 return TRUE;
5660}
5661
252b5132
RH
5662/* Copy private section information. This copies over the entsize
5663 field, and sometimes the info field. */
5664
b34976b6 5665bfd_boolean
217aa764
AM
5666_bfd_elf_copy_private_section_data (bfd *ibfd,
5667 asection *isec,
5668 bfd *obfd,
5669 asection *osec)
252b5132
RH
5670{
5671 Elf_Internal_Shdr *ihdr, *ohdr;
5672
5673 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5674 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5675 return TRUE;
252b5132 5676
252b5132
RH
5677 ihdr = &elf_section_data (isec)->this_hdr;
5678 ohdr = &elf_section_data (osec)->this_hdr;
5679
5680 ohdr->sh_entsize = ihdr->sh_entsize;
5681
5682 if (ihdr->sh_type == SHT_SYMTAB
5683 || ihdr->sh_type == SHT_DYNSYM
5684 || ihdr->sh_type == SHT_GNU_verneed
5685 || ihdr->sh_type == SHT_GNU_verdef)
5686 ohdr->sh_info = ihdr->sh_info;
5687
ccd2ec6a
L
5688 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
5689 NULL);
252b5132
RH
5690}
5691
80fccad2
BW
5692/* Copy private header information. */
5693
5694bfd_boolean
5695_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
5696{
5697 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5698 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5699 return TRUE;
5700
5701 /* Copy over private BFD data if it has not already been copied.
5702 This must be done here, rather than in the copy_private_bfd_data
5703 entry point, because the latter is called after the section
5704 contents have been set, which means that the program headers have
5705 already been worked out. */
5706 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
5707 {
5708 if (! copy_private_bfd_data (ibfd, obfd))
5709 return FALSE;
5710 }
5711
5712 return TRUE;
5713}
5714
252b5132
RH
5715/* Copy private symbol information. If this symbol is in a section
5716 which we did not map into a BFD section, try to map the section
5717 index correctly. We use special macro definitions for the mapped
5718 section indices; these definitions are interpreted by the
5719 swap_out_syms function. */
5720
9ad5cbcf
AM
5721#define MAP_ONESYMTAB (SHN_HIOS + 1)
5722#define MAP_DYNSYMTAB (SHN_HIOS + 2)
5723#define MAP_STRTAB (SHN_HIOS + 3)
5724#define MAP_SHSTRTAB (SHN_HIOS + 4)
5725#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 5726
b34976b6 5727bfd_boolean
217aa764
AM
5728_bfd_elf_copy_private_symbol_data (bfd *ibfd,
5729 asymbol *isymarg,
5730 bfd *obfd,
5731 asymbol *osymarg)
252b5132
RH
5732{
5733 elf_symbol_type *isym, *osym;
5734
5735 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5736 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5737 return TRUE;
252b5132
RH
5738
5739 isym = elf_symbol_from (ibfd, isymarg);
5740 osym = elf_symbol_from (obfd, osymarg);
5741
5742 if (isym != NULL
5743 && osym != NULL
5744 && bfd_is_abs_section (isym->symbol.section))
5745 {
5746 unsigned int shndx;
5747
5748 shndx = isym->internal_elf_sym.st_shndx;
5749 if (shndx == elf_onesymtab (ibfd))
5750 shndx = MAP_ONESYMTAB;
5751 else if (shndx == elf_dynsymtab (ibfd))
5752 shndx = MAP_DYNSYMTAB;
5753 else if (shndx == elf_tdata (ibfd)->strtab_section)
5754 shndx = MAP_STRTAB;
5755 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
5756 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
5757 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
5758 shndx = MAP_SYM_SHNDX;
252b5132
RH
5759 osym->internal_elf_sym.st_shndx = shndx;
5760 }
5761
b34976b6 5762 return TRUE;
252b5132
RH
5763}
5764
5765/* Swap out the symbols. */
5766
b34976b6 5767static bfd_boolean
217aa764
AM
5768swap_out_syms (bfd *abfd,
5769 struct bfd_strtab_hash **sttp,
5770 int relocatable_p)
252b5132 5771{
9c5bfbb7 5772 const struct elf_backend_data *bed;
079e9a2f
AM
5773 int symcount;
5774 asymbol **syms;
5775 struct bfd_strtab_hash *stt;
5776 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 5777 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 5778 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
5779 bfd_byte *outbound_syms;
5780 bfd_byte *outbound_shndx;
079e9a2f
AM
5781 int idx;
5782 bfd_size_type amt;
174fd7f9 5783 bfd_boolean name_local_sections;
252b5132
RH
5784
5785 if (!elf_map_symbols (abfd))
b34976b6 5786 return FALSE;
252b5132 5787
c044fabd 5788 /* Dump out the symtabs. */
079e9a2f
AM
5789 stt = _bfd_elf_stringtab_init ();
5790 if (stt == NULL)
b34976b6 5791 return FALSE;
252b5132 5792
079e9a2f
AM
5793 bed = get_elf_backend_data (abfd);
5794 symcount = bfd_get_symcount (abfd);
5795 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5796 symtab_hdr->sh_type = SHT_SYMTAB;
5797 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
5798 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
5799 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 5800 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
5801
5802 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5803 symstrtab_hdr->sh_type = SHT_STRTAB;
5804
d0fb9a8d 5805 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 5806 if (outbound_syms == NULL)
5ed6aba4
NC
5807 {
5808 _bfd_stringtab_free (stt);
5809 return FALSE;
5810 }
217aa764 5811 symtab_hdr->contents = outbound_syms;
252b5132 5812
9ad5cbcf
AM
5813 outbound_shndx = NULL;
5814 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5815 if (symtab_shndx_hdr->sh_name != 0)
5816 {
5817 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
5818 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
5819 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 5820 if (outbound_shndx == NULL)
5ed6aba4
NC
5821 {
5822 _bfd_stringtab_free (stt);
5823 return FALSE;
5824 }
5825
9ad5cbcf
AM
5826 symtab_shndx_hdr->contents = outbound_shndx;
5827 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5828 symtab_shndx_hdr->sh_size = amt;
5829 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5830 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5831 }
5832
589e6347 5833 /* Now generate the data (for "contents"). */
079e9a2f
AM
5834 {
5835 /* Fill in zeroth symbol and swap it out. */
5836 Elf_Internal_Sym sym;
5837 sym.st_name = 0;
5838 sym.st_value = 0;
5839 sym.st_size = 0;
5840 sym.st_info = 0;
5841 sym.st_other = 0;
5842 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 5843 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5844 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5845 if (outbound_shndx != NULL)
5846 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5847 }
252b5132 5848
174fd7f9
RS
5849 name_local_sections
5850 = (bed->elf_backend_name_local_section_symbols
5851 && bed->elf_backend_name_local_section_symbols (abfd));
5852
079e9a2f
AM
5853 syms = bfd_get_outsymbols (abfd);
5854 for (idx = 0; idx < symcount; idx++)
252b5132 5855 {
252b5132 5856 Elf_Internal_Sym sym;
079e9a2f
AM
5857 bfd_vma value = syms[idx]->value;
5858 elf_symbol_type *type_ptr;
5859 flagword flags = syms[idx]->flags;
5860 int type;
252b5132 5861
174fd7f9
RS
5862 if (!name_local_sections
5863 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
5864 {
5865 /* Local section symbols have no name. */
5866 sym.st_name = 0;
5867 }
5868 else
5869 {
5870 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
5871 syms[idx]->name,
b34976b6 5872 TRUE, FALSE);
079e9a2f 5873 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
5874 {
5875 _bfd_stringtab_free (stt);
5876 return FALSE;
5877 }
079e9a2f 5878 }
252b5132 5879
079e9a2f 5880 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 5881
079e9a2f
AM
5882 if ((flags & BSF_SECTION_SYM) == 0
5883 && bfd_is_com_section (syms[idx]->section))
5884 {
5885 /* ELF common symbols put the alignment into the `value' field,
5886 and the size into the `size' field. This is backwards from
5887 how BFD handles it, so reverse it here. */
5888 sym.st_size = value;
5889 if (type_ptr == NULL
5890 || type_ptr->internal_elf_sym.st_value == 0)
5891 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
5892 else
5893 sym.st_value = type_ptr->internal_elf_sym.st_value;
5894 sym.st_shndx = _bfd_elf_section_from_bfd_section
5895 (abfd, syms[idx]->section);
5896 }
5897 else
5898 {
5899 asection *sec = syms[idx]->section;
5900 int shndx;
252b5132 5901
079e9a2f
AM
5902 if (sec->output_section)
5903 {
5904 value += sec->output_offset;
5905 sec = sec->output_section;
5906 }
589e6347 5907
079e9a2f
AM
5908 /* Don't add in the section vma for relocatable output. */
5909 if (! relocatable_p)
5910 value += sec->vma;
5911 sym.st_value = value;
5912 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
5913
5914 if (bfd_is_abs_section (sec)
5915 && type_ptr != NULL
5916 && type_ptr->internal_elf_sym.st_shndx != 0)
5917 {
5918 /* This symbol is in a real ELF section which we did
5919 not create as a BFD section. Undo the mapping done
5920 by copy_private_symbol_data. */
5921 shndx = type_ptr->internal_elf_sym.st_shndx;
5922 switch (shndx)
5923 {
5924 case MAP_ONESYMTAB:
5925 shndx = elf_onesymtab (abfd);
5926 break;
5927 case MAP_DYNSYMTAB:
5928 shndx = elf_dynsymtab (abfd);
5929 break;
5930 case MAP_STRTAB:
5931 shndx = elf_tdata (abfd)->strtab_section;
5932 break;
5933 case MAP_SHSTRTAB:
5934 shndx = elf_tdata (abfd)->shstrtab_section;
5935 break;
9ad5cbcf
AM
5936 case MAP_SYM_SHNDX:
5937 shndx = elf_tdata (abfd)->symtab_shndx_section;
5938 break;
079e9a2f
AM
5939 default:
5940 break;
5941 }
5942 }
5943 else
5944 {
5945 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 5946
079e9a2f
AM
5947 if (shndx == -1)
5948 {
5949 asection *sec2;
5950
5951 /* Writing this would be a hell of a lot easier if
5952 we had some decent documentation on bfd, and
5953 knew what to expect of the library, and what to
5954 demand of applications. For example, it
5955 appears that `objcopy' might not set the
5956 section of a symbol to be a section that is
5957 actually in the output file. */
5958 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
5959 if (sec2 == NULL)
5960 {
5961 _bfd_error_handler (_("\
5962Unable to find equivalent output section for symbol '%s' from section '%s'"),
5963 syms[idx]->name ? syms[idx]->name : "<Local sym>",
5964 sec->name);
811072d8 5965 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 5966 _bfd_stringtab_free (stt);
589e6347
NC
5967 return FALSE;
5968 }
811072d8 5969
079e9a2f
AM
5970 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
5971 BFD_ASSERT (shndx != -1);
5972 }
5973 }
252b5132 5974
079e9a2f
AM
5975 sym.st_shndx = shndx;
5976 }
252b5132 5977
13ae64f3
JJ
5978 if ((flags & BSF_THREAD_LOCAL) != 0)
5979 type = STT_TLS;
5980 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
5981 type = STT_FUNC;
5982 else if ((flags & BSF_OBJECT) != 0)
5983 type = STT_OBJECT;
5984 else
5985 type = STT_NOTYPE;
252b5132 5986
13ae64f3
JJ
5987 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
5988 type = STT_TLS;
5989
589e6347 5990 /* Processor-specific types. */
079e9a2f
AM
5991 if (type_ptr != NULL
5992 && bed->elf_backend_get_symbol_type)
5993 type = ((*bed->elf_backend_get_symbol_type)
5994 (&type_ptr->internal_elf_sym, type));
252b5132 5995
079e9a2f
AM
5996 if (flags & BSF_SECTION_SYM)
5997 {
5998 if (flags & BSF_GLOBAL)
5999 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6000 else
6001 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6002 }
6003 else if (bfd_is_com_section (syms[idx]->section))
6004 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
6005 else if (bfd_is_und_section (syms[idx]->section))
6006 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6007 ? STB_WEAK
6008 : STB_GLOBAL),
6009 type);
6010 else if (flags & BSF_FILE)
6011 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6012 else
6013 {
6014 int bind = STB_LOCAL;
252b5132 6015
079e9a2f
AM
6016 if (flags & BSF_LOCAL)
6017 bind = STB_LOCAL;
6018 else if (flags & BSF_WEAK)
6019 bind = STB_WEAK;
6020 else if (flags & BSF_GLOBAL)
6021 bind = STB_GLOBAL;
252b5132 6022
079e9a2f
AM
6023 sym.st_info = ELF_ST_INFO (bind, type);
6024 }
252b5132 6025
079e9a2f
AM
6026 if (type_ptr != NULL)
6027 sym.st_other = type_ptr->internal_elf_sym.st_other;
6028 else
6029 sym.st_other = 0;
252b5132 6030
9ad5cbcf 6031 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6032 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6033 if (outbound_shndx != NULL)
6034 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6035 }
252b5132 6036
079e9a2f
AM
6037 *sttp = stt;
6038 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6039 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6040
079e9a2f
AM
6041 symstrtab_hdr->sh_flags = 0;
6042 symstrtab_hdr->sh_addr = 0;
6043 symstrtab_hdr->sh_entsize = 0;
6044 symstrtab_hdr->sh_link = 0;
6045 symstrtab_hdr->sh_info = 0;
6046 symstrtab_hdr->sh_addralign = 1;
252b5132 6047
b34976b6 6048 return TRUE;
252b5132
RH
6049}
6050
6051/* Return the number of bytes required to hold the symtab vector.
6052
6053 Note that we base it on the count plus 1, since we will null terminate
6054 the vector allocated based on this size. However, the ELF symbol table
6055 always has a dummy entry as symbol #0, so it ends up even. */
6056
6057long
217aa764 6058_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6059{
6060 long symcount;
6061 long symtab_size;
6062 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6063
6064 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6065 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6066 if (symcount > 0)
6067 symtab_size -= sizeof (asymbol *);
252b5132
RH
6068
6069 return symtab_size;
6070}
6071
6072long
217aa764 6073_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6074{
6075 long symcount;
6076 long symtab_size;
6077 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6078
6079 if (elf_dynsymtab (abfd) == 0)
6080 {
6081 bfd_set_error (bfd_error_invalid_operation);
6082 return -1;
6083 }
6084
6085 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6086 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6087 if (symcount > 0)
6088 symtab_size -= sizeof (asymbol *);
252b5132
RH
6089
6090 return symtab_size;
6091}
6092
6093long
217aa764
AM
6094_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6095 sec_ptr asect)
252b5132
RH
6096{
6097 return (asect->reloc_count + 1) * sizeof (arelent *);
6098}
6099
6100/* Canonicalize the relocs. */
6101
6102long
217aa764
AM
6103_bfd_elf_canonicalize_reloc (bfd *abfd,
6104 sec_ptr section,
6105 arelent **relptr,
6106 asymbol **symbols)
252b5132
RH
6107{
6108 arelent *tblptr;
6109 unsigned int i;
9c5bfbb7 6110 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6111
b34976b6 6112 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6113 return -1;
6114
6115 tblptr = section->relocation;
6116 for (i = 0; i < section->reloc_count; i++)
6117 *relptr++ = tblptr++;
6118
6119 *relptr = NULL;
6120
6121 return section->reloc_count;
6122}
6123
6124long
6cee3f79 6125_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6126{
9c5bfbb7 6127 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6128 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6129
6130 if (symcount >= 0)
6131 bfd_get_symcount (abfd) = symcount;
6132 return symcount;
6133}
6134
6135long
217aa764
AM
6136_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6137 asymbol **allocation)
252b5132 6138{
9c5bfbb7 6139 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6140 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6141
6142 if (symcount >= 0)
6143 bfd_get_dynamic_symcount (abfd) = symcount;
6144 return symcount;
252b5132
RH
6145}
6146
8615f3f2
AM
6147/* Return the size required for the dynamic reloc entries. Any loadable
6148 section that was actually installed in the BFD, and has type SHT_REL
6149 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6150 dynamic reloc section. */
252b5132
RH
6151
6152long
217aa764 6153_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6154{
6155 long ret;
6156 asection *s;
6157
6158 if (elf_dynsymtab (abfd) == 0)
6159 {
6160 bfd_set_error (bfd_error_invalid_operation);
6161 return -1;
6162 }
6163
6164 ret = sizeof (arelent *);
6165 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6166 if ((s->flags & SEC_LOAD) != 0
6167 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6168 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6169 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6170 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6171 * sizeof (arelent *));
6172
6173 return ret;
6174}
6175
8615f3f2
AM
6176/* Canonicalize the dynamic relocation entries. Note that we return the
6177 dynamic relocations as a single block, although they are actually
6178 associated with particular sections; the interface, which was
6179 designed for SunOS style shared libraries, expects that there is only
6180 one set of dynamic relocs. Any loadable section that was actually
6181 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6182 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6183
6184long
217aa764
AM
6185_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6186 arelent **storage,
6187 asymbol **syms)
252b5132 6188{
217aa764 6189 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6190 asection *s;
6191 long ret;
6192
6193 if (elf_dynsymtab (abfd) == 0)
6194 {
6195 bfd_set_error (bfd_error_invalid_operation);
6196 return -1;
6197 }
6198
6199 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6200 ret = 0;
6201 for (s = abfd->sections; s != NULL; s = s->next)
6202 {
8615f3f2
AM
6203 if ((s->flags & SEC_LOAD) != 0
6204 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6205 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6206 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6207 {
6208 arelent *p;
6209 long count, i;
6210
b34976b6 6211 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6212 return -1;
eea6121a 6213 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6214 p = s->relocation;
6215 for (i = 0; i < count; i++)
6216 *storage++ = p++;
6217 ret += count;
6218 }
6219 }
6220
6221 *storage = NULL;
6222
6223 return ret;
6224}
6225\f
6226/* Read in the version information. */
6227
b34976b6 6228bfd_boolean
fc0e6df6 6229_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6230{
6231 bfd_byte *contents = NULL;
fc0e6df6
PB
6232 unsigned int freeidx = 0;
6233
6234 if (elf_dynverref (abfd) != 0)
6235 {
6236 Elf_Internal_Shdr *hdr;
6237 Elf_External_Verneed *everneed;
6238 Elf_Internal_Verneed *iverneed;
6239 unsigned int i;
d0fb9a8d 6240 bfd_byte *contents_end;
fc0e6df6
PB
6241
6242 hdr = &elf_tdata (abfd)->dynverref_hdr;
6243
d0fb9a8d
JJ
6244 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6245 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6246 if (elf_tdata (abfd)->verref == NULL)
6247 goto error_return;
6248
6249 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6250
6251 contents = bfd_malloc (hdr->sh_size);
6252 if (contents == NULL)
d0fb9a8d
JJ
6253 {
6254error_return_verref:
6255 elf_tdata (abfd)->verref = NULL;
6256 elf_tdata (abfd)->cverrefs = 0;
6257 goto error_return;
6258 }
fc0e6df6
PB
6259 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6260 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6261 goto error_return_verref;
fc0e6df6 6262
d0fb9a8d
JJ
6263 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6264 goto error_return_verref;
6265
6266 BFD_ASSERT (sizeof (Elf_External_Verneed)
6267 == sizeof (Elf_External_Vernaux));
6268 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6269 everneed = (Elf_External_Verneed *) contents;
6270 iverneed = elf_tdata (abfd)->verref;
6271 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6272 {
6273 Elf_External_Vernaux *evernaux;
6274 Elf_Internal_Vernaux *ivernaux;
6275 unsigned int j;
6276
6277 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6278
6279 iverneed->vn_bfd = abfd;
6280
6281 iverneed->vn_filename =
6282 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6283 iverneed->vn_file);
6284 if (iverneed->vn_filename == NULL)
d0fb9a8d 6285 goto error_return_verref;
fc0e6df6 6286
d0fb9a8d
JJ
6287 if (iverneed->vn_cnt == 0)
6288 iverneed->vn_auxptr = NULL;
6289 else
6290 {
6291 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6292 sizeof (Elf_Internal_Vernaux));
6293 if (iverneed->vn_auxptr == NULL)
6294 goto error_return_verref;
6295 }
6296
6297 if (iverneed->vn_aux
6298 > (size_t) (contents_end - (bfd_byte *) everneed))
6299 goto error_return_verref;
fc0e6df6
PB
6300
6301 evernaux = ((Elf_External_Vernaux *)
6302 ((bfd_byte *) everneed + iverneed->vn_aux));
6303 ivernaux = iverneed->vn_auxptr;
6304 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6305 {
6306 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6307
6308 ivernaux->vna_nodename =
6309 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6310 ivernaux->vna_name);
6311 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6312 goto error_return_verref;
fc0e6df6
PB
6313
6314 if (j + 1 < iverneed->vn_cnt)
6315 ivernaux->vna_nextptr = ivernaux + 1;
6316 else
6317 ivernaux->vna_nextptr = NULL;
6318
d0fb9a8d
JJ
6319 if (ivernaux->vna_next
6320 > (size_t) (contents_end - (bfd_byte *) evernaux))
6321 goto error_return_verref;
6322
fc0e6df6
PB
6323 evernaux = ((Elf_External_Vernaux *)
6324 ((bfd_byte *) evernaux + ivernaux->vna_next));
6325
6326 if (ivernaux->vna_other > freeidx)
6327 freeidx = ivernaux->vna_other;
6328 }
6329
6330 if (i + 1 < hdr->sh_info)
6331 iverneed->vn_nextref = iverneed + 1;
6332 else
6333 iverneed->vn_nextref = NULL;
6334
d0fb9a8d
JJ
6335 if (iverneed->vn_next
6336 > (size_t) (contents_end - (bfd_byte *) everneed))
6337 goto error_return_verref;
6338
fc0e6df6
PB
6339 everneed = ((Elf_External_Verneed *)
6340 ((bfd_byte *) everneed + iverneed->vn_next));
6341 }
6342
6343 free (contents);
6344 contents = NULL;
6345 }
252b5132
RH
6346
6347 if (elf_dynverdef (abfd) != 0)
6348 {
6349 Elf_Internal_Shdr *hdr;
6350 Elf_External_Verdef *everdef;
6351 Elf_Internal_Verdef *iverdef;
f631889e
UD
6352 Elf_Internal_Verdef *iverdefarr;
6353 Elf_Internal_Verdef iverdefmem;
252b5132 6354 unsigned int i;
062e2358 6355 unsigned int maxidx;
d0fb9a8d 6356 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6357
6358 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6359
217aa764 6360 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6361 if (contents == NULL)
6362 goto error_return;
6363 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6364 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6365 goto error_return;
6366
d0fb9a8d
JJ
6367 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6368 goto error_return;
6369
6370 BFD_ASSERT (sizeof (Elf_External_Verdef)
6371 >= sizeof (Elf_External_Verdaux));
6372 contents_end_def = contents + hdr->sh_size
6373 - sizeof (Elf_External_Verdef);
6374 contents_end_aux = contents + hdr->sh_size
6375 - sizeof (Elf_External_Verdaux);
6376
f631889e
UD
6377 /* We know the number of entries in the section but not the maximum
6378 index. Therefore we have to run through all entries and find
6379 the maximum. */
252b5132 6380 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6381 maxidx = 0;
6382 for (i = 0; i < hdr->sh_info; ++i)
6383 {
6384 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6385
062e2358
AM
6386 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6387 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6388
d0fb9a8d
JJ
6389 if (iverdefmem.vd_next
6390 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6391 goto error_return;
6392
f631889e
UD
6393 everdef = ((Elf_External_Verdef *)
6394 ((bfd_byte *) everdef + iverdefmem.vd_next));
6395 }
6396
fc0e6df6
PB
6397 if (default_imported_symver)
6398 {
6399 if (freeidx > maxidx)
6400 maxidx = ++freeidx;
6401 else
6402 freeidx = ++maxidx;
6403 }
d0fb9a8d
JJ
6404 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6405 sizeof (Elf_Internal_Verdef));
f631889e
UD
6406 if (elf_tdata (abfd)->verdef == NULL)
6407 goto error_return;
6408
6409 elf_tdata (abfd)->cverdefs = maxidx;
6410
6411 everdef = (Elf_External_Verdef *) contents;
6412 iverdefarr = elf_tdata (abfd)->verdef;
6413 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6414 {
6415 Elf_External_Verdaux *everdaux;
6416 Elf_Internal_Verdaux *iverdaux;
6417 unsigned int j;
6418
f631889e
UD
6419 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6420
d0fb9a8d
JJ
6421 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6422 {
6423error_return_verdef:
6424 elf_tdata (abfd)->verdef = NULL;
6425 elf_tdata (abfd)->cverdefs = 0;
6426 goto error_return;
6427 }
6428
f631889e
UD
6429 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6430 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6431
6432 iverdef->vd_bfd = abfd;
6433
d0fb9a8d
JJ
6434 if (iverdef->vd_cnt == 0)
6435 iverdef->vd_auxptr = NULL;
6436 else
6437 {
6438 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6439 sizeof (Elf_Internal_Verdaux));
6440 if (iverdef->vd_auxptr == NULL)
6441 goto error_return_verdef;
6442 }
6443
6444 if (iverdef->vd_aux
6445 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6446 goto error_return_verdef;
252b5132
RH
6447
6448 everdaux = ((Elf_External_Verdaux *)
6449 ((bfd_byte *) everdef + iverdef->vd_aux));
6450 iverdaux = iverdef->vd_auxptr;
6451 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6452 {
6453 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6454
6455 iverdaux->vda_nodename =
6456 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6457 iverdaux->vda_name);
6458 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6459 goto error_return_verdef;
252b5132
RH
6460
6461 if (j + 1 < iverdef->vd_cnt)
6462 iverdaux->vda_nextptr = iverdaux + 1;
6463 else
6464 iverdaux->vda_nextptr = NULL;
6465
d0fb9a8d
JJ
6466 if (iverdaux->vda_next
6467 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6468 goto error_return_verdef;
6469
252b5132
RH
6470 everdaux = ((Elf_External_Verdaux *)
6471 ((bfd_byte *) everdaux + iverdaux->vda_next));
6472 }
6473
d0fb9a8d
JJ
6474 if (iverdef->vd_cnt)
6475 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6476
d0fb9a8d 6477 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6478 iverdef->vd_nextdef = iverdef + 1;
6479 else
6480 iverdef->vd_nextdef = NULL;
6481
6482 everdef = ((Elf_External_Verdef *)
6483 ((bfd_byte *) everdef + iverdef->vd_next));
6484 }
6485
6486 free (contents);
6487 contents = NULL;
6488 }
fc0e6df6 6489 else if (default_imported_symver)
252b5132 6490 {
fc0e6df6
PB
6491 if (freeidx < 3)
6492 freeidx = 3;
6493 else
6494 freeidx++;
252b5132 6495
d0fb9a8d
JJ
6496 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6497 sizeof (Elf_Internal_Verdef));
fc0e6df6 6498 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6499 goto error_return;
6500
fc0e6df6
PB
6501 elf_tdata (abfd)->cverdefs = freeidx;
6502 }
252b5132 6503
fc0e6df6
PB
6504 /* Create a default version based on the soname. */
6505 if (default_imported_symver)
6506 {
6507 Elf_Internal_Verdef *iverdef;
6508 Elf_Internal_Verdaux *iverdaux;
252b5132 6509
fc0e6df6 6510 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6511
fc0e6df6
PB
6512 iverdef->vd_version = VER_DEF_CURRENT;
6513 iverdef->vd_flags = 0;
6514 iverdef->vd_ndx = freeidx;
6515 iverdef->vd_cnt = 1;
252b5132 6516
fc0e6df6 6517 iverdef->vd_bfd = abfd;
252b5132 6518
fc0e6df6
PB
6519 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6520 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6521 goto error_return_verdef;
fc0e6df6 6522 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6523 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6524 if (iverdef->vd_auxptr == NULL)
6525 goto error_return_verdef;
252b5132 6526
fc0e6df6
PB
6527 iverdaux = iverdef->vd_auxptr;
6528 iverdaux->vda_nodename = iverdef->vd_nodename;
6529 iverdaux->vda_nextptr = NULL;
252b5132
RH
6530 }
6531
b34976b6 6532 return TRUE;
252b5132
RH
6533
6534 error_return:
5ed6aba4 6535 if (contents != NULL)
252b5132 6536 free (contents);
b34976b6 6537 return FALSE;
252b5132
RH
6538}
6539\f
6540asymbol *
217aa764 6541_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6542{
6543 elf_symbol_type *newsym;
dc810e39 6544 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6545
217aa764 6546 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6547 if (!newsym)
6548 return NULL;
6549 else
6550 {
6551 newsym->symbol.the_bfd = abfd;
6552 return &newsym->symbol;
6553 }
6554}
6555
6556void
217aa764
AM
6557_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6558 asymbol *symbol,
6559 symbol_info *ret)
252b5132
RH
6560{
6561 bfd_symbol_info (symbol, ret);
6562}
6563
6564/* Return whether a symbol name implies a local symbol. Most targets
6565 use this function for the is_local_label_name entry point, but some
6566 override it. */
6567
b34976b6 6568bfd_boolean
217aa764
AM
6569_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6570 const char *name)
252b5132
RH
6571{
6572 /* Normal local symbols start with ``.L''. */
6573 if (name[0] == '.' && name[1] == 'L')
b34976b6 6574 return TRUE;
252b5132
RH
6575
6576 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6577 DWARF debugging symbols starting with ``..''. */
6578 if (name[0] == '.' && name[1] == '.')
b34976b6 6579 return TRUE;
252b5132
RH
6580
6581 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6582 emitting DWARF debugging output. I suspect this is actually a
6583 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6584 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6585 underscore to be emitted on some ELF targets). For ease of use,
6586 we treat such symbols as local. */
6587 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6588 return TRUE;
252b5132 6589
b34976b6 6590 return FALSE;
252b5132
RH
6591}
6592
6593alent *
217aa764
AM
6594_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6595 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6596{
6597 abort ();
6598 return NULL;
6599}
6600
b34976b6 6601bfd_boolean
217aa764
AM
6602_bfd_elf_set_arch_mach (bfd *abfd,
6603 enum bfd_architecture arch,
6604 unsigned long machine)
252b5132
RH
6605{
6606 /* If this isn't the right architecture for this backend, and this
6607 isn't the generic backend, fail. */
6608 if (arch != get_elf_backend_data (abfd)->arch
6609 && arch != bfd_arch_unknown
6610 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6611 return FALSE;
252b5132
RH
6612
6613 return bfd_default_set_arch_mach (abfd, arch, machine);
6614}
6615
d1fad7c6
NC
6616/* Find the function to a particular section and offset,
6617 for error reporting. */
252b5132 6618
b34976b6 6619static bfd_boolean
217aa764
AM
6620elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6621 asection *section,
6622 asymbol **symbols,
6623 bfd_vma offset,
6624 const char **filename_ptr,
6625 const char **functionname_ptr)
252b5132 6626{
252b5132 6627 const char *filename;
57426232 6628 asymbol *func, *file;
252b5132
RH
6629 bfd_vma low_func;
6630 asymbol **p;
57426232
JB
6631 /* ??? Given multiple file symbols, it is impossible to reliably
6632 choose the right file name for global symbols. File symbols are
6633 local symbols, and thus all file symbols must sort before any
6634 global symbols. The ELF spec may be interpreted to say that a
6635 file symbol must sort before other local symbols, but currently
6636 ld -r doesn't do this. So, for ld -r output, it is possible to
6637 make a better choice of file name for local symbols by ignoring
6638 file symbols appearing after a given local symbol. */
6639 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6640
252b5132
RH
6641 filename = NULL;
6642 func = NULL;
57426232 6643 file = NULL;
252b5132 6644 low_func = 0;
57426232 6645 state = nothing_seen;
252b5132
RH
6646
6647 for (p = symbols; *p != NULL; p++)
6648 {
6649 elf_symbol_type *q;
6650
6651 q = (elf_symbol_type *) *p;
6652
252b5132
RH
6653 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6654 {
6655 default:
6656 break;
6657 case STT_FILE:
57426232
JB
6658 file = &q->symbol;
6659 if (state == symbol_seen)
6660 state = file_after_symbol_seen;
6661 continue;
6662 case STT_SECTION:
6663 continue;
252b5132
RH
6664 case STT_NOTYPE:
6665 case STT_FUNC:
6b40fcba 6666 if (bfd_get_section (&q->symbol) == section
252b5132
RH
6667 && q->symbol.value >= low_func
6668 && q->symbol.value <= offset)
6669 {
6670 func = (asymbol *) q;
6671 low_func = q->symbol.value;
57426232
JB
6672 if (file == NULL)
6673 filename = NULL;
6674 else if (ELF_ST_BIND (q->internal_elf_sym.st_info) != STB_LOCAL
6675 && state == file_after_symbol_seen)
6676 filename = NULL;
6677 else
6678 filename = bfd_asymbol_name (file);
252b5132
RH
6679 }
6680 break;
6681 }
57426232
JB
6682 if (state == nothing_seen)
6683 state = symbol_seen;
252b5132
RH
6684 }
6685
6686 if (func == NULL)
b34976b6 6687 return FALSE;
252b5132 6688
d1fad7c6
NC
6689 if (filename_ptr)
6690 *filename_ptr = filename;
6691 if (functionname_ptr)
6692 *functionname_ptr = bfd_asymbol_name (func);
6693
b34976b6 6694 return TRUE;
d1fad7c6
NC
6695}
6696
6697/* Find the nearest line to a particular section and offset,
6698 for error reporting. */
6699
b34976b6 6700bfd_boolean
217aa764
AM
6701_bfd_elf_find_nearest_line (bfd *abfd,
6702 asection *section,
6703 asymbol **symbols,
6704 bfd_vma offset,
6705 const char **filename_ptr,
6706 const char **functionname_ptr,
6707 unsigned int *line_ptr)
d1fad7c6 6708{
b34976b6 6709 bfd_boolean found;
d1fad7c6
NC
6710
6711 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6712 filename_ptr, functionname_ptr,
6713 line_ptr))
d1fad7c6
NC
6714 {
6715 if (!*functionname_ptr)
4e8a9624
AM
6716 elf_find_function (abfd, section, symbols, offset,
6717 *filename_ptr ? NULL : filename_ptr,
6718 functionname_ptr);
6719
b34976b6 6720 return TRUE;
d1fad7c6
NC
6721 }
6722
6723 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6724 filename_ptr, functionname_ptr,
6725 line_ptr, 0,
6726 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
6727 {
6728 if (!*functionname_ptr)
4e8a9624
AM
6729 elf_find_function (abfd, section, symbols, offset,
6730 *filename_ptr ? NULL : filename_ptr,
6731 functionname_ptr);
6732
b34976b6 6733 return TRUE;
d1fad7c6
NC
6734 }
6735
6736 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
6737 &found, filename_ptr,
6738 functionname_ptr, line_ptr,
6739 &elf_tdata (abfd)->line_info))
b34976b6 6740 return FALSE;
dc43ada5 6741 if (found && (*functionname_ptr || *line_ptr))
b34976b6 6742 return TRUE;
d1fad7c6
NC
6743
6744 if (symbols == NULL)
b34976b6 6745 return FALSE;
d1fad7c6
NC
6746
6747 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 6748 filename_ptr, functionname_ptr))
b34976b6 6749 return FALSE;
d1fad7c6 6750
252b5132 6751 *line_ptr = 0;
b34976b6 6752 return TRUE;
252b5132
RH
6753}
6754
5420f73d
L
6755/* Find the line for a symbol. */
6756
6757bfd_boolean
6758_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
6759 const char **filename_ptr, unsigned int *line_ptr)
6760{
6761 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
6762 filename_ptr, line_ptr, 0,
6763 &elf_tdata (abfd)->dwarf2_find_line_info);
6764}
6765
4ab527b0
FF
6766/* After a call to bfd_find_nearest_line, successive calls to
6767 bfd_find_inliner_info can be used to get source information about
6768 each level of function inlining that terminated at the address
6769 passed to bfd_find_nearest_line. Currently this is only supported
6770 for DWARF2 with appropriate DWARF3 extensions. */
6771
6772bfd_boolean
6773_bfd_elf_find_inliner_info (bfd *abfd,
6774 const char **filename_ptr,
6775 const char **functionname_ptr,
6776 unsigned int *line_ptr)
6777{
6778 bfd_boolean found;
6779 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
6780 functionname_ptr, line_ptr,
6781 & elf_tdata (abfd)->dwarf2_find_line_info);
6782 return found;
6783}
6784
252b5132 6785int
217aa764 6786_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
6787{
6788 int ret;
6789
6790 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
6791 if (! reloc)
6792 ret += get_program_header_size (abfd);
6793 return ret;
6794}
6795
b34976b6 6796bfd_boolean
217aa764
AM
6797_bfd_elf_set_section_contents (bfd *abfd,
6798 sec_ptr section,
0f867abe 6799 const void *location,
217aa764
AM
6800 file_ptr offset,
6801 bfd_size_type count)
252b5132
RH
6802{
6803 Elf_Internal_Shdr *hdr;
dc810e39 6804 bfd_signed_vma pos;
252b5132
RH
6805
6806 if (! abfd->output_has_begun
217aa764 6807 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6808 return FALSE;
252b5132
RH
6809
6810 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
6811 pos = hdr->sh_offset + offset;
6812 if (bfd_seek (abfd, pos, SEEK_SET) != 0
6813 || bfd_bwrite (location, count, abfd) != count)
b34976b6 6814 return FALSE;
252b5132 6815
b34976b6 6816 return TRUE;
252b5132
RH
6817}
6818
6819void
217aa764
AM
6820_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
6821 arelent *cache_ptr ATTRIBUTE_UNUSED,
6822 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
6823{
6824 abort ();
6825}
6826
252b5132
RH
6827/* Try to convert a non-ELF reloc into an ELF one. */
6828
b34976b6 6829bfd_boolean
217aa764 6830_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 6831{
c044fabd 6832 /* Check whether we really have an ELF howto. */
252b5132
RH
6833
6834 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
6835 {
6836 bfd_reloc_code_real_type code;
6837 reloc_howto_type *howto;
6838
6839 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 6840 equivalent ELF reloc. */
252b5132
RH
6841
6842 if (areloc->howto->pc_relative)
6843 {
6844 switch (areloc->howto->bitsize)
6845 {
6846 case 8:
6847 code = BFD_RELOC_8_PCREL;
6848 break;
6849 case 12:
6850 code = BFD_RELOC_12_PCREL;
6851 break;
6852 case 16:
6853 code = BFD_RELOC_16_PCREL;
6854 break;
6855 case 24:
6856 code = BFD_RELOC_24_PCREL;
6857 break;
6858 case 32:
6859 code = BFD_RELOC_32_PCREL;
6860 break;
6861 case 64:
6862 code = BFD_RELOC_64_PCREL;
6863 break;
6864 default:
6865 goto fail;
6866 }
6867
6868 howto = bfd_reloc_type_lookup (abfd, code);
6869
6870 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
6871 {
6872 if (howto->pcrel_offset)
6873 areloc->addend += areloc->address;
6874 else
6875 areloc->addend -= areloc->address; /* addend is unsigned!! */
6876 }
6877 }
6878 else
6879 {
6880 switch (areloc->howto->bitsize)
6881 {
6882 case 8:
6883 code = BFD_RELOC_8;
6884 break;
6885 case 14:
6886 code = BFD_RELOC_14;
6887 break;
6888 case 16:
6889 code = BFD_RELOC_16;
6890 break;
6891 case 26:
6892 code = BFD_RELOC_26;
6893 break;
6894 case 32:
6895 code = BFD_RELOC_32;
6896 break;
6897 case 64:
6898 code = BFD_RELOC_64;
6899 break;
6900 default:
6901 goto fail;
6902 }
6903
6904 howto = bfd_reloc_type_lookup (abfd, code);
6905 }
6906
6907 if (howto)
6908 areloc->howto = howto;
6909 else
6910 goto fail;
6911 }
6912
b34976b6 6913 return TRUE;
252b5132
RH
6914
6915 fail:
6916 (*_bfd_error_handler)
d003868e
AM
6917 (_("%B: unsupported relocation type %s"),
6918 abfd, areloc->howto->name);
252b5132 6919 bfd_set_error (bfd_error_bad_value);
b34976b6 6920 return FALSE;
252b5132
RH
6921}
6922
b34976b6 6923bfd_boolean
217aa764 6924_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
6925{
6926 if (bfd_get_format (abfd) == bfd_object)
6927 {
6928 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 6929 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 6930 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
6931 }
6932
6933 return _bfd_generic_close_and_cleanup (abfd);
6934}
6935
6936/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
6937 in the relocation's offset. Thus we cannot allow any sort of sanity
6938 range-checking to interfere. There is nothing else to do in processing
6939 this reloc. */
6940
6941bfd_reloc_status_type
217aa764
AM
6942_bfd_elf_rel_vtable_reloc_fn
6943 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 6944 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
6945 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
6946 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
6947{
6948 return bfd_reloc_ok;
6949}
252b5132
RH
6950\f
6951/* Elf core file support. Much of this only works on native
6952 toolchains, since we rely on knowing the
6953 machine-dependent procfs structure in order to pick
c044fabd 6954 out details about the corefile. */
252b5132
RH
6955
6956#ifdef HAVE_SYS_PROCFS_H
6957# include <sys/procfs.h>
6958#endif
6959
c044fabd 6960/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
6961
6962static int
217aa764 6963elfcore_make_pid (bfd *abfd)
252b5132
RH
6964{
6965 return ((elf_tdata (abfd)->core_lwpid << 16)
6966 + (elf_tdata (abfd)->core_pid));
6967}
6968
252b5132
RH
6969/* If there isn't a section called NAME, make one, using
6970 data from SECT. Note, this function will generate a
6971 reference to NAME, so you shouldn't deallocate or
c044fabd 6972 overwrite it. */
252b5132 6973
b34976b6 6974static bfd_boolean
217aa764 6975elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 6976{
c044fabd 6977 asection *sect2;
252b5132
RH
6978
6979 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 6980 return TRUE;
252b5132
RH
6981
6982 sect2 = bfd_make_section (abfd, name);
6983 if (sect2 == NULL)
b34976b6 6984 return FALSE;
252b5132 6985
eea6121a 6986 sect2->size = sect->size;
252b5132
RH
6987 sect2->filepos = sect->filepos;
6988 sect2->flags = sect->flags;
6989 sect2->alignment_power = sect->alignment_power;
b34976b6 6990 return TRUE;
252b5132
RH
6991}
6992
bb0082d6
AM
6993/* Create a pseudosection containing SIZE bytes at FILEPOS. This
6994 actually creates up to two pseudosections:
6995 - For the single-threaded case, a section named NAME, unless
6996 such a section already exists.
6997 - For the multi-threaded case, a section named "NAME/PID", where
6998 PID is elfcore_make_pid (abfd).
6999 Both pseudosections have identical contents. */
b34976b6 7000bfd_boolean
217aa764
AM
7001_bfd_elfcore_make_pseudosection (bfd *abfd,
7002 char *name,
7003 size_t size,
7004 ufile_ptr filepos)
bb0082d6
AM
7005{
7006 char buf[100];
7007 char *threaded_name;
d4c88bbb 7008 size_t len;
bb0082d6
AM
7009 asection *sect;
7010
7011 /* Build the section name. */
7012
7013 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7014 len = strlen (buf) + 1;
217aa764 7015 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7016 if (threaded_name == NULL)
b34976b6 7017 return FALSE;
d4c88bbb 7018 memcpy (threaded_name, buf, len);
bb0082d6 7019
62f3bb11 7020 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 7021 if (sect == NULL)
b34976b6 7022 return FALSE;
eea6121a 7023 sect->size = size;
bb0082d6
AM
7024 sect->filepos = filepos;
7025 sect->flags = SEC_HAS_CONTENTS;
7026 sect->alignment_power = 2;
7027
936e320b 7028 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7029}
7030
252b5132 7031/* prstatus_t exists on:
4a938328 7032 solaris 2.5+
252b5132
RH
7033 linux 2.[01] + glibc
7034 unixware 4.2
7035*/
7036
7037#if defined (HAVE_PRSTATUS_T)
a7b97311 7038
b34976b6 7039static bfd_boolean
217aa764 7040elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7041{
eea6121a 7042 size_t size;
7ee38065 7043 int offset;
252b5132 7044
4a938328
MS
7045 if (note->descsz == sizeof (prstatus_t))
7046 {
7047 prstatus_t prstat;
252b5132 7048
eea6121a 7049 size = sizeof (prstat.pr_reg);
7ee38065 7050 offset = offsetof (prstatus_t, pr_reg);
4a938328 7051 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7052
fa49d224
NC
7053 /* Do not overwrite the core signal if it
7054 has already been set by another thread. */
7055 if (elf_tdata (abfd)->core_signal == 0)
7056 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7057 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7058
4a938328
MS
7059 /* pr_who exists on:
7060 solaris 2.5+
7061 unixware 4.2
7062 pr_who doesn't exist on:
7063 linux 2.[01]
7064 */
252b5132 7065#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7066 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7067#endif
4a938328 7068 }
7ee38065 7069#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7070 else if (note->descsz == sizeof (prstatus32_t))
7071 {
7072 /* 64-bit host, 32-bit corefile */
7073 prstatus32_t prstat;
7074
eea6121a 7075 size = sizeof (prstat.pr_reg);
7ee38065 7076 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7077 memcpy (&prstat, note->descdata, sizeof (prstat));
7078
fa49d224
NC
7079 /* Do not overwrite the core signal if it
7080 has already been set by another thread. */
7081 if (elf_tdata (abfd)->core_signal == 0)
7082 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7083 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7084
7085 /* pr_who exists on:
7086 solaris 2.5+
7087 unixware 4.2
7088 pr_who doesn't exist on:
7089 linux 2.[01]
7090 */
7ee38065 7091#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7092 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7093#endif
7094 }
7ee38065 7095#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7096 else
7097 {
7098 /* Fail - we don't know how to handle any other
7099 note size (ie. data object type). */
b34976b6 7100 return TRUE;
4a938328 7101 }
252b5132 7102
bb0082d6 7103 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7104 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7105 size, note->descpos + offset);
252b5132
RH
7106}
7107#endif /* defined (HAVE_PRSTATUS_T) */
7108
bb0082d6 7109/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7110static bfd_boolean
217aa764
AM
7111elfcore_make_note_pseudosection (bfd *abfd,
7112 char *name,
7113 Elf_Internal_Note *note)
252b5132 7114{
936e320b
AM
7115 return _bfd_elfcore_make_pseudosection (abfd, name,
7116 note->descsz, note->descpos);
252b5132
RH
7117}
7118
ff08c6bb
JB
7119/* There isn't a consistent prfpregset_t across platforms,
7120 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7121 data structure apart. */
7122
b34976b6 7123static bfd_boolean
217aa764 7124elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7125{
7126 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7127}
7128
ff08c6bb
JB
7129/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7130 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7131 literally. */
c044fabd 7132
b34976b6 7133static bfd_boolean
217aa764 7134elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7135{
7136 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7137}
7138
252b5132 7139#if defined (HAVE_PRPSINFO_T)
4a938328 7140typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7141#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7142typedef prpsinfo32_t elfcore_psinfo32_t;
7143#endif
252b5132
RH
7144#endif
7145
7146#if defined (HAVE_PSINFO_T)
4a938328 7147typedef psinfo_t elfcore_psinfo_t;
7ee38065 7148#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7149typedef psinfo32_t elfcore_psinfo32_t;
7150#endif
252b5132
RH
7151#endif
7152
252b5132
RH
7153/* return a malloc'ed copy of a string at START which is at
7154 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7155 the copy will always have a terminating '\0'. */
252b5132 7156
936e320b 7157char *
217aa764 7158_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7159{
dc810e39 7160 char *dups;
c044fabd 7161 char *end = memchr (start, '\0', max);
dc810e39 7162 size_t len;
252b5132
RH
7163
7164 if (end == NULL)
7165 len = max;
7166 else
7167 len = end - start;
7168
217aa764 7169 dups = bfd_alloc (abfd, len + 1);
dc810e39 7170 if (dups == NULL)
252b5132
RH
7171 return NULL;
7172
dc810e39
AM
7173 memcpy (dups, start, len);
7174 dups[len] = '\0';
252b5132 7175
dc810e39 7176 return dups;
252b5132
RH
7177}
7178
bb0082d6 7179#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7180static bfd_boolean
217aa764 7181elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7182{
4a938328
MS
7183 if (note->descsz == sizeof (elfcore_psinfo_t))
7184 {
7185 elfcore_psinfo_t psinfo;
252b5132 7186
7ee38065 7187 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7188
4a938328 7189 elf_tdata (abfd)->core_program
936e320b
AM
7190 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7191 sizeof (psinfo.pr_fname));
252b5132 7192
4a938328 7193 elf_tdata (abfd)->core_command
936e320b
AM
7194 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7195 sizeof (psinfo.pr_psargs));
4a938328 7196 }
7ee38065 7197#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7198 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7199 {
7200 /* 64-bit host, 32-bit corefile */
7201 elfcore_psinfo32_t psinfo;
7202
7ee38065 7203 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7204
4a938328 7205 elf_tdata (abfd)->core_program
936e320b
AM
7206 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7207 sizeof (psinfo.pr_fname));
4a938328
MS
7208
7209 elf_tdata (abfd)->core_command
936e320b
AM
7210 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7211 sizeof (psinfo.pr_psargs));
4a938328
MS
7212 }
7213#endif
7214
7215 else
7216 {
7217 /* Fail - we don't know how to handle any other
7218 note size (ie. data object type). */
b34976b6 7219 return TRUE;
4a938328 7220 }
252b5132
RH
7221
7222 /* Note that for some reason, a spurious space is tacked
7223 onto the end of the args in some (at least one anyway)
c044fabd 7224 implementations, so strip it off if it exists. */
252b5132
RH
7225
7226 {
c044fabd 7227 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7228 int n = strlen (command);
7229
7230 if (0 < n && command[n - 1] == ' ')
7231 command[n - 1] = '\0';
7232 }
7233
b34976b6 7234 return TRUE;
252b5132
RH
7235}
7236#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7237
252b5132 7238#if defined (HAVE_PSTATUS_T)
b34976b6 7239static bfd_boolean
217aa764 7240elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7241{
f572a39d
AM
7242 if (note->descsz == sizeof (pstatus_t)
7243#if defined (HAVE_PXSTATUS_T)
7244 || note->descsz == sizeof (pxstatus_t)
7245#endif
7246 )
4a938328
MS
7247 {
7248 pstatus_t pstat;
252b5132 7249
4a938328 7250 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7251
4a938328
MS
7252 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7253 }
7ee38065 7254#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7255 else if (note->descsz == sizeof (pstatus32_t))
7256 {
7257 /* 64-bit host, 32-bit corefile */
7258 pstatus32_t pstat;
252b5132 7259
4a938328 7260 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7261
4a938328
MS
7262 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7263 }
7264#endif
252b5132
RH
7265 /* Could grab some more details from the "representative"
7266 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7267 NT_LWPSTATUS note, presumably. */
252b5132 7268
b34976b6 7269 return TRUE;
252b5132
RH
7270}
7271#endif /* defined (HAVE_PSTATUS_T) */
7272
252b5132 7273#if defined (HAVE_LWPSTATUS_T)
b34976b6 7274static bfd_boolean
217aa764 7275elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7276{
7277 lwpstatus_t lwpstat;
7278 char buf[100];
c044fabd 7279 char *name;
d4c88bbb 7280 size_t len;
c044fabd 7281 asection *sect;
252b5132 7282
f572a39d
AM
7283 if (note->descsz != sizeof (lwpstat)
7284#if defined (HAVE_LWPXSTATUS_T)
7285 && note->descsz != sizeof (lwpxstatus_t)
7286#endif
7287 )
b34976b6 7288 return TRUE;
252b5132
RH
7289
7290 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7291
7292 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7293 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7294
c044fabd 7295 /* Make a ".reg/999" section. */
252b5132
RH
7296
7297 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7298 len = strlen (buf) + 1;
217aa764 7299 name = bfd_alloc (abfd, len);
252b5132 7300 if (name == NULL)
b34976b6 7301 return FALSE;
d4c88bbb 7302 memcpy (name, buf, len);
252b5132 7303
62f3bb11 7304 sect = bfd_make_section_anyway (abfd, name);
252b5132 7305 if (sect == NULL)
b34976b6 7306 return FALSE;
252b5132
RH
7307
7308#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7309 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7310 sect->filepos = note->descpos
7311 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7312#endif
7313
7314#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7315 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7316 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7317#endif
7318
7319 sect->flags = SEC_HAS_CONTENTS;
7320 sect->alignment_power = 2;
7321
7322 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7323 return FALSE;
252b5132
RH
7324
7325 /* Make a ".reg2/999" section */
7326
7327 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7328 len = strlen (buf) + 1;
217aa764 7329 name = bfd_alloc (abfd, len);
252b5132 7330 if (name == NULL)
b34976b6 7331 return FALSE;
d4c88bbb 7332 memcpy (name, buf, len);
252b5132 7333
62f3bb11 7334 sect = bfd_make_section_anyway (abfd, name);
252b5132 7335 if (sect == NULL)
b34976b6 7336 return FALSE;
252b5132
RH
7337
7338#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7339 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7340 sect->filepos = note->descpos
7341 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7342#endif
7343
7344#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7345 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7346 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7347#endif
7348
7349 sect->flags = SEC_HAS_CONTENTS;
7350 sect->alignment_power = 2;
7351
936e320b 7352 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7353}
7354#endif /* defined (HAVE_LWPSTATUS_T) */
7355
16e9c715 7356#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7357static bfd_boolean
217aa764 7358elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7359{
7360 char buf[30];
c044fabd 7361 char *name;
d4c88bbb 7362 size_t len;
c044fabd 7363 asection *sect;
16e9c715
NC
7364 win32_pstatus_t pstatus;
7365
7366 if (note->descsz < sizeof (pstatus))
b34976b6 7367 return TRUE;
16e9c715 7368
e8eab623 7369 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7370
7371 switch (pstatus.data_type)
16e9c715
NC
7372 {
7373 case NOTE_INFO_PROCESS:
7374 /* FIXME: need to add ->core_command. */
7375 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7376 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7377 break;
16e9c715
NC
7378
7379 case NOTE_INFO_THREAD:
7380 /* Make a ".reg/999" section. */
1f170678 7381 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7382
d4c88bbb 7383 len = strlen (buf) + 1;
217aa764 7384 name = bfd_alloc (abfd, len);
16e9c715 7385 if (name == NULL)
b34976b6 7386 return FALSE;
c044fabd 7387
d4c88bbb 7388 memcpy (name, buf, len);
16e9c715 7389
62f3bb11 7390 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7391 if (sect == NULL)
b34976b6 7392 return FALSE;
c044fabd 7393
eea6121a 7394 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7395 sect->filepos = (note->descpos
7396 + offsetof (struct win32_pstatus,
7397 data.thread_info.thread_context));
16e9c715
NC
7398 sect->flags = SEC_HAS_CONTENTS;
7399 sect->alignment_power = 2;
7400
7401 if (pstatus.data.thread_info.is_active_thread)
7402 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7403 return FALSE;
16e9c715
NC
7404 break;
7405
7406 case NOTE_INFO_MODULE:
7407 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7408 sprintf (buf, ".module/%08lx",
7409 (long) pstatus.data.module_info.base_address);
c044fabd 7410
d4c88bbb 7411 len = strlen (buf) + 1;
217aa764 7412 name = bfd_alloc (abfd, len);
16e9c715 7413 if (name == NULL)
b34976b6 7414 return FALSE;
c044fabd 7415
d4c88bbb 7416 memcpy (name, buf, len);
252b5132 7417
62f3bb11 7418 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7419
16e9c715 7420 if (sect == NULL)
b34976b6 7421 return FALSE;
c044fabd 7422
eea6121a 7423 sect->size = note->descsz;
16e9c715
NC
7424 sect->filepos = note->descpos;
7425 sect->flags = SEC_HAS_CONTENTS;
7426 sect->alignment_power = 2;
7427 break;
7428
7429 default:
b34976b6 7430 return TRUE;
16e9c715
NC
7431 }
7432
b34976b6 7433 return TRUE;
16e9c715
NC
7434}
7435#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7436
b34976b6 7437static bfd_boolean
217aa764 7438elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7439{
9c5bfbb7 7440 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7441
252b5132
RH
7442 switch (note->type)
7443 {
7444 default:
b34976b6 7445 return TRUE;
252b5132 7446
252b5132 7447 case NT_PRSTATUS:
bb0082d6
AM
7448 if (bed->elf_backend_grok_prstatus)
7449 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7450 return TRUE;
bb0082d6 7451#if defined (HAVE_PRSTATUS_T)
252b5132 7452 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7453#else
b34976b6 7454 return TRUE;
252b5132
RH
7455#endif
7456
7457#if defined (HAVE_PSTATUS_T)
7458 case NT_PSTATUS:
7459 return elfcore_grok_pstatus (abfd, note);
7460#endif
7461
7462#if defined (HAVE_LWPSTATUS_T)
7463 case NT_LWPSTATUS:
7464 return elfcore_grok_lwpstatus (abfd, note);
7465#endif
7466
7467 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7468 return elfcore_grok_prfpreg (abfd, note);
7469
16e9c715 7470#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7471 case NT_WIN32PSTATUS:
16e9c715
NC
7472 return elfcore_grok_win32pstatus (abfd, note);
7473#endif
7474
c044fabd 7475 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7476 if (note->namesz == 6
7477 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7478 return elfcore_grok_prxfpreg (abfd, note);
7479 else
b34976b6 7480 return TRUE;
ff08c6bb 7481
252b5132
RH
7482 case NT_PRPSINFO:
7483 case NT_PSINFO:
bb0082d6
AM
7484 if (bed->elf_backend_grok_psinfo)
7485 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7486 return TRUE;
bb0082d6 7487#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7488 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7489#else
b34976b6 7490 return TRUE;
252b5132 7491#endif
3333a7c3
RM
7492
7493 case NT_AUXV:
7494 {
62f3bb11 7495 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7496
7497 if (sect == NULL)
7498 return FALSE;
eea6121a 7499 sect->size = note->descsz;
3333a7c3
RM
7500 sect->filepos = note->descpos;
7501 sect->flags = SEC_HAS_CONTENTS;
7502 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7503
7504 return TRUE;
7505 }
252b5132
RH
7506 }
7507}
7508
b34976b6 7509static bfd_boolean
217aa764 7510elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7511{
7512 char *cp;
7513
7514 cp = strchr (note->namedata, '@');
7515 if (cp != NULL)
7516 {
d2b64500 7517 *lwpidp = atoi(cp + 1);
b34976b6 7518 return TRUE;
50b2bdb7 7519 }
b34976b6 7520 return FALSE;
50b2bdb7
AM
7521}
7522
b34976b6 7523static bfd_boolean
217aa764 7524elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7525{
7526
7527 /* Signal number at offset 0x08. */
7528 elf_tdata (abfd)->core_signal
7529 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7530
7531 /* Process ID at offset 0x50. */
7532 elf_tdata (abfd)->core_pid
7533 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7534
7535 /* Command name at 0x7c (max 32 bytes, including nul). */
7536 elf_tdata (abfd)->core_command
7537 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7538
7720ba9f
MK
7539 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7540 note);
50b2bdb7
AM
7541}
7542
b34976b6 7543static bfd_boolean
217aa764 7544elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7545{
7546 int lwp;
7547
7548 if (elfcore_netbsd_get_lwpid (note, &lwp))
7549 elf_tdata (abfd)->core_lwpid = lwp;
7550
b4db1224 7551 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7552 {
7553 /* NetBSD-specific core "procinfo". Note that we expect to
7554 find this note before any of the others, which is fine,
7555 since the kernel writes this note out first when it
7556 creates a core file. */
47d9a591 7557
50b2bdb7
AM
7558 return elfcore_grok_netbsd_procinfo (abfd, note);
7559 }
7560
b4db1224
JT
7561 /* As of Jan 2002 there are no other machine-independent notes
7562 defined for NetBSD core files. If the note type is less
7563 than the start of the machine-dependent note types, we don't
7564 understand it. */
47d9a591 7565
b4db1224 7566 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7567 return TRUE;
50b2bdb7
AM
7568
7569
7570 switch (bfd_get_arch (abfd))
7571 {
7572 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7573 PT_GETFPREGS == mach+2. */
7574
7575 case bfd_arch_alpha:
7576 case bfd_arch_sparc:
7577 switch (note->type)
7578 {
b4db1224 7579 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7580 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7581
b4db1224 7582 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7583 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7584
7585 default:
b34976b6 7586 return TRUE;
50b2bdb7
AM
7587 }
7588
7589 /* On all other arch's, PT_GETREGS == mach+1 and
7590 PT_GETFPREGS == mach+3. */
7591
7592 default:
7593 switch (note->type)
7594 {
b4db1224 7595 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7596 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7597
b4db1224 7598 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7599 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7600
7601 default:
b34976b6 7602 return TRUE;
50b2bdb7
AM
7603 }
7604 }
7605 /* NOTREACHED */
7606}
7607
07c6e936 7608static bfd_boolean
217aa764 7609elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7610{
7611 void *ddata = note->descdata;
7612 char buf[100];
7613 char *name;
7614 asection *sect;
f8843e87
AM
7615 short sig;
7616 unsigned flags;
07c6e936
NC
7617
7618 /* nto_procfs_status 'pid' field is at offset 0. */
7619 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7620
f8843e87
AM
7621 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7622 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7623
7624 /* nto_procfs_status 'flags' field is at offset 8. */
7625 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7626
7627 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7628 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7629 {
7630 elf_tdata (abfd)->core_signal = sig;
7631 elf_tdata (abfd)->core_lwpid = *tid;
7632 }
07c6e936 7633
f8843e87
AM
7634 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7635 do not come from signals so we make sure we set the current
7636 thread just in case. */
7637 if (flags & 0x00000080)
7638 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7639
7640 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7641 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7642
217aa764 7643 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7644 if (name == NULL)
7645 return FALSE;
7646 strcpy (name, buf);
7647
62f3bb11 7648 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7649 if (sect == NULL)
7650 return FALSE;
7651
eea6121a 7652 sect->size = note->descsz;
07c6e936
NC
7653 sect->filepos = note->descpos;
7654 sect->flags = SEC_HAS_CONTENTS;
7655 sect->alignment_power = 2;
7656
7657 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7658}
7659
7660static bfd_boolean
d69f560c
KW
7661elfcore_grok_nto_regs (bfd *abfd,
7662 Elf_Internal_Note *note,
7663 pid_t tid,
7664 char *base)
07c6e936
NC
7665{
7666 char buf[100];
7667 char *name;
7668 asection *sect;
7669
d69f560c 7670 /* Make a "(base)/%d" section. */
7e7353ed 7671 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 7672
217aa764 7673 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7674 if (name == NULL)
7675 return FALSE;
7676 strcpy (name, buf);
7677
62f3bb11 7678 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7679 if (sect == NULL)
7680 return FALSE;
7681
eea6121a 7682 sect->size = note->descsz;
07c6e936
NC
7683 sect->filepos = note->descpos;
7684 sect->flags = SEC_HAS_CONTENTS;
7685 sect->alignment_power = 2;
7686
f8843e87
AM
7687 /* This is the current thread. */
7688 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 7689 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
7690
7691 return TRUE;
07c6e936
NC
7692}
7693
7694#define BFD_QNT_CORE_INFO 7
7695#define BFD_QNT_CORE_STATUS 8
7696#define BFD_QNT_CORE_GREG 9
7697#define BFD_QNT_CORE_FPREG 10
7698
7699static bfd_boolean
217aa764 7700elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
7701{
7702 /* Every GREG section has a STATUS section before it. Store the
811072d8 7703 tid from the previous call to pass down to the next gregs
07c6e936
NC
7704 function. */
7705 static pid_t tid = 1;
7706
7707 switch (note->type)
7708 {
d69f560c
KW
7709 case BFD_QNT_CORE_INFO:
7710 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
7711 case BFD_QNT_CORE_STATUS:
7712 return elfcore_grok_nto_status (abfd, note, &tid);
7713 case BFD_QNT_CORE_GREG:
7714 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
7715 case BFD_QNT_CORE_FPREG:
7716 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
7717 default:
7718 return TRUE;
07c6e936
NC
7719 }
7720}
7721
7c76fa91
MS
7722/* Function: elfcore_write_note
7723
47d9a591 7724 Inputs:
7c76fa91
MS
7725 buffer to hold note
7726 name of note
7727 type of note
7728 data for note
7729 size of data for note
7730
7731 Return:
7732 End of buffer containing note. */
7733
7734char *
217aa764
AM
7735elfcore_write_note (bfd *abfd,
7736 char *buf,
7737 int *bufsiz,
7738 const char *name,
7739 int type,
7740 const void *input,
7741 int size)
7c76fa91
MS
7742{
7743 Elf_External_Note *xnp;
d4c88bbb
AM
7744 size_t namesz;
7745 size_t pad;
7746 size_t newspace;
7c76fa91
MS
7747 char *p, *dest;
7748
d4c88bbb
AM
7749 namesz = 0;
7750 pad = 0;
7751 if (name != NULL)
7752 {
9c5bfbb7 7753 const struct elf_backend_data *bed;
d4c88bbb
AM
7754
7755 namesz = strlen (name) + 1;
7756 bed = get_elf_backend_data (abfd);
45d6a902 7757 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
7758 }
7759
5de3bf90 7760 newspace = 12 + namesz + pad + size;
d4c88bbb 7761
7c76fa91
MS
7762 p = realloc (buf, *bufsiz + newspace);
7763 dest = p + *bufsiz;
7764 *bufsiz += newspace;
7765 xnp = (Elf_External_Note *) dest;
7766 H_PUT_32 (abfd, namesz, xnp->namesz);
7767 H_PUT_32 (abfd, size, xnp->descsz);
7768 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
7769 dest = xnp->name;
7770 if (name != NULL)
7771 {
7772 memcpy (dest, name, namesz);
7773 dest += namesz;
7774 while (pad != 0)
7775 {
7776 *dest++ = '\0';
7777 --pad;
7778 }
7779 }
7780 memcpy (dest, input, size);
7c76fa91
MS
7781 return p;
7782}
7783
7784#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
7785char *
217aa764
AM
7786elfcore_write_prpsinfo (bfd *abfd,
7787 char *buf,
7788 int *bufsiz,
7789 const char *fname,
7790 const char *psargs)
7c76fa91
MS
7791{
7792 int note_type;
7793 char *note_name = "CORE";
7794
7795#if defined (HAVE_PSINFO_T)
7796 psinfo_t data;
7797 note_type = NT_PSINFO;
7798#else
7799 prpsinfo_t data;
7800 note_type = NT_PRPSINFO;
7801#endif
7802
7803 memset (&data, 0, sizeof (data));
7804 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
7805 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 7806 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7807 note_name, note_type, &data, sizeof (data));
7808}
7809#endif /* PSINFO_T or PRPSINFO_T */
7810
7811#if defined (HAVE_PRSTATUS_T)
7812char *
217aa764
AM
7813elfcore_write_prstatus (bfd *abfd,
7814 char *buf,
7815 int *bufsiz,
7816 long pid,
7817 int cursig,
7818 const void *gregs)
7c76fa91
MS
7819{
7820 prstatus_t prstat;
7821 char *note_name = "CORE";
7822
7823 memset (&prstat, 0, sizeof (prstat));
7824 prstat.pr_pid = pid;
7825 prstat.pr_cursig = cursig;
c106e334 7826 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 7827 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7828 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
7829}
7830#endif /* HAVE_PRSTATUS_T */
7831
51316059
MS
7832#if defined (HAVE_LWPSTATUS_T)
7833char *
217aa764
AM
7834elfcore_write_lwpstatus (bfd *abfd,
7835 char *buf,
7836 int *bufsiz,
7837 long pid,
7838 int cursig,
7839 const void *gregs)
51316059
MS
7840{
7841 lwpstatus_t lwpstat;
7842 char *note_name = "CORE";
7843
7844 memset (&lwpstat, 0, sizeof (lwpstat));
7845 lwpstat.pr_lwpid = pid >> 16;
7846 lwpstat.pr_cursig = cursig;
7847#if defined (HAVE_LWPSTATUS_T_PR_REG)
7848 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
7849#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
7850#if !defined(gregs)
7851 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
7852 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
7853#else
7854 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
7855 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
7856#endif
7857#endif
47d9a591 7858 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7859 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
7860}
7861#endif /* HAVE_LWPSTATUS_T */
7862
7c76fa91
MS
7863#if defined (HAVE_PSTATUS_T)
7864char *
217aa764
AM
7865elfcore_write_pstatus (bfd *abfd,
7866 char *buf,
7867 int *bufsiz,
7868 long pid,
7869 int cursig,
7870 const void *gregs)
7c76fa91
MS
7871{
7872 pstatus_t pstat;
7873 char *note_name = "CORE";
7874
51316059
MS
7875 memset (&pstat, 0, sizeof (pstat));
7876 pstat.pr_pid = pid & 0xffff;
47d9a591 7877 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7878 NT_PSTATUS, &pstat, sizeof (pstat));
7879 return buf;
7c76fa91
MS
7880}
7881#endif /* HAVE_PSTATUS_T */
7882
7883char *
217aa764
AM
7884elfcore_write_prfpreg (bfd *abfd,
7885 char *buf,
7886 int *bufsiz,
7887 const void *fpregs,
7888 int size)
7c76fa91
MS
7889{
7890 char *note_name = "CORE";
47d9a591 7891 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7892 note_name, NT_FPREGSET, fpregs, size);
7893}
7894
7895char *
217aa764
AM
7896elfcore_write_prxfpreg (bfd *abfd,
7897 char *buf,
7898 int *bufsiz,
7899 const void *xfpregs,
7900 int size)
7c76fa91
MS
7901{
7902 char *note_name = "LINUX";
47d9a591 7903 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7904 note_name, NT_PRXFPREG, xfpregs, size);
7905}
7906
b34976b6 7907static bfd_boolean
217aa764 7908elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 7909{
c044fabd
KH
7910 char *buf;
7911 char *p;
252b5132
RH
7912
7913 if (size <= 0)
b34976b6 7914 return TRUE;
252b5132 7915
dc810e39 7916 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 7917 return FALSE;
252b5132 7918
dc810e39 7919 buf = bfd_malloc (size);
252b5132 7920 if (buf == NULL)
b34976b6 7921 return FALSE;
252b5132 7922
dc810e39 7923 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
7924 {
7925 error:
7926 free (buf);
b34976b6 7927 return FALSE;
252b5132
RH
7928 }
7929
7930 p = buf;
7931 while (p < buf + size)
7932 {
c044fabd
KH
7933 /* FIXME: bad alignment assumption. */
7934 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
7935 Elf_Internal_Note in;
7936
dc810e39 7937 in.type = H_GET_32 (abfd, xnp->type);
252b5132 7938
dc810e39 7939 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
7940 in.namedata = xnp->name;
7941
dc810e39 7942 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
7943 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
7944 in.descpos = offset + (in.descdata - buf);
7945
50b2bdb7
AM
7946 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
7947 {
7948 if (! elfcore_grok_netbsd_note (abfd, &in))
7949 goto error;
7950 }
07c6e936
NC
7951 else if (strncmp (in.namedata, "QNX", 3) == 0)
7952 {
7953 if (! elfcore_grok_nto_note (abfd, &in))
7954 goto error;
7955 }
50b2bdb7
AM
7956 else
7957 {
7958 if (! elfcore_grok_note (abfd, &in))
7959 goto error;
7960 }
252b5132
RH
7961
7962 p = in.descdata + BFD_ALIGN (in.descsz, 4);
7963 }
7964
7965 free (buf);
b34976b6 7966 return TRUE;
252b5132 7967}
98d8431c
JB
7968\f
7969/* Providing external access to the ELF program header table. */
7970
7971/* Return an upper bound on the number of bytes required to store a
7972 copy of ABFD's program header table entries. Return -1 if an error
7973 occurs; bfd_get_error will return an appropriate code. */
c044fabd 7974
98d8431c 7975long
217aa764 7976bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
7977{
7978 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7979 {
7980 bfd_set_error (bfd_error_wrong_format);
7981 return -1;
7982 }
7983
936e320b 7984 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
7985}
7986
98d8431c
JB
7987/* Copy ABFD's program header table entries to *PHDRS. The entries
7988 will be stored as an array of Elf_Internal_Phdr structures, as
7989 defined in include/elf/internal.h. To find out how large the
7990 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
7991
7992 Return the number of program header table entries read, or -1 if an
7993 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 7994
98d8431c 7995int
217aa764 7996bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
7997{
7998 int num_phdrs;
7999
8000 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8001 {
8002 bfd_set_error (bfd_error_wrong_format);
8003 return -1;
8004 }
8005
8006 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8007 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8008 num_phdrs * sizeof (Elf_Internal_Phdr));
8009
8010 return num_phdrs;
8011}
ae4221d7
L
8012
8013void
217aa764 8014_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 8015{
d3b05f8d 8016#ifdef BFD64
ae4221d7
L
8017 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8018
8019 i_ehdrp = elf_elfheader (abfd);
8020 if (i_ehdrp == NULL)
8021 sprintf_vma (buf, value);
8022 else
8023 {
8024 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8025 {
ae4221d7 8026#if BFD_HOST_64BIT_LONG
cc55aec9 8027 sprintf (buf, "%016lx", value);
ae4221d7 8028#else
cc55aec9
AM
8029 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
8030 _bfd_int64_low (value));
ae4221d7 8031#endif
cc55aec9 8032 }
ae4221d7
L
8033 else
8034 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
8035 }
d3b05f8d
L
8036#else
8037 sprintf_vma (buf, value);
8038#endif
ae4221d7
L
8039}
8040
8041void
217aa764 8042_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 8043{
d3b05f8d 8044#ifdef BFD64
ae4221d7
L
8045 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8046
8047 i_ehdrp = elf_elfheader (abfd);
8048 if (i_ehdrp == NULL)
8049 fprintf_vma ((FILE *) stream, value);
8050 else
8051 {
8052 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8053 {
ae4221d7 8054#if BFD_HOST_64BIT_LONG
cc55aec9 8055 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 8056#else
cc55aec9
AM
8057 fprintf ((FILE *) stream, "%08lx%08lx",
8058 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 8059#endif
cc55aec9 8060 }
ae4221d7
L
8061 else
8062 fprintf ((FILE *) stream, "%08lx",
8063 (unsigned long) (value & 0xffffffff));
8064 }
d3b05f8d
L
8065#else
8066 fprintf_vma ((FILE *) stream, value);
8067#endif
ae4221d7 8068}
db6751f2
JJ
8069
8070enum elf_reloc_type_class
217aa764 8071_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8072{
8073 return reloc_class_normal;
8074}
f8df10f4 8075
47d9a591 8076/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8077 relocation against a local symbol. */
8078
8079bfd_vma
217aa764
AM
8080_bfd_elf_rela_local_sym (bfd *abfd,
8081 Elf_Internal_Sym *sym,
8517fae7 8082 asection **psec,
217aa764 8083 Elf_Internal_Rela *rel)
f8df10f4 8084{
8517fae7 8085 asection *sec = *psec;
f8df10f4
JJ
8086 bfd_vma relocation;
8087
8088 relocation = (sec->output_section->vma
8089 + sec->output_offset
8090 + sym->st_value);
8091 if ((sec->flags & SEC_MERGE)
c629eae0 8092 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8093 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8094 {
f8df10f4 8095 rel->r_addend =
8517fae7 8096 _bfd_merged_section_offset (abfd, psec,
65765700 8097 elf_section_data (sec)->sec_info,
753731ee
AM
8098 sym->st_value + rel->r_addend);
8099 if (sec != *psec)
8100 {
8101 /* If we have changed the section, and our original section is
8102 marked with SEC_EXCLUDE, it means that the original
8103 SEC_MERGE section has been completely subsumed in some
8104 other SEC_MERGE section. In this case, we need to leave
8105 some info around for --emit-relocs. */
8106 if ((sec->flags & SEC_EXCLUDE) != 0)
8107 sec->kept_section = *psec;
8108 sec = *psec;
8109 }
8517fae7
AM
8110 rel->r_addend -= relocation;
8111 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8112 }
8113 return relocation;
8114}
c629eae0
JJ
8115
8116bfd_vma
217aa764
AM
8117_bfd_elf_rel_local_sym (bfd *abfd,
8118 Elf_Internal_Sym *sym,
8119 asection **psec,
8120 bfd_vma addend)
47d9a591 8121{
c629eae0
JJ
8122 asection *sec = *psec;
8123
68bfbfcc 8124 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8125 return sym->st_value + addend;
8126
8127 return _bfd_merged_section_offset (abfd, psec,
65765700 8128 elf_section_data (sec)->sec_info,
753731ee 8129 sym->st_value + addend);
c629eae0
JJ
8130}
8131
8132bfd_vma
217aa764 8133_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8134 struct bfd_link_info *info,
217aa764
AM
8135 asection *sec,
8136 bfd_vma offset)
c629eae0 8137{
68bfbfcc 8138 switch (sec->sec_info_type)
65765700
JJ
8139 {
8140 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8141 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8142 offset);
65765700 8143 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8144 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8145 default:
8146 return offset;
8147 }
c629eae0 8148}
3333a7c3
RM
8149\f
8150/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8151 reconstruct an ELF file by reading the segments out of remote memory
8152 based on the ELF file header at EHDR_VMA and the ELF program headers it
8153 points to. If not null, *LOADBASEP is filled in with the difference
8154 between the VMAs from which the segments were read, and the VMAs the
8155 file headers (and hence BFD's idea of each section's VMA) put them at.
8156
8157 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8158 remote memory at target address VMA into the local buffer at MYADDR; it
8159 should return zero on success or an `errno' code on failure. TEMPL must
8160 be a BFD for an ELF target with the word size and byte order found in
8161 the remote memory. */
8162
8163bfd *
217aa764
AM
8164bfd_elf_bfd_from_remote_memory
8165 (bfd *templ,
8166 bfd_vma ehdr_vma,
8167 bfd_vma *loadbasep,
f075ee0c 8168 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8169{
8170 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8171 (templ, ehdr_vma, loadbasep, target_read_memory);
8172}
4c45e5c9
JJ
8173\f
8174long
c9727e01
AM
8175_bfd_elf_get_synthetic_symtab (bfd *abfd,
8176 long symcount ATTRIBUTE_UNUSED,
8177 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8178 long dynsymcount,
c9727e01
AM
8179 asymbol **dynsyms,
8180 asymbol **ret)
4c45e5c9
JJ
8181{
8182 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8183 asection *relplt;
8184 asymbol *s;
8185 const char *relplt_name;
8186 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8187 arelent *p;
8188 long count, i, n;
8189 size_t size;
8190 Elf_Internal_Shdr *hdr;
8191 char *names;
8192 asection *plt;
8193
8615f3f2
AM
8194 *ret = NULL;
8195
90e3cdf2
JJ
8196 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8197 return 0;
8198
8615f3f2
AM
8199 if (dynsymcount <= 0)
8200 return 0;
8201
4c45e5c9
JJ
8202 if (!bed->plt_sym_val)
8203 return 0;
8204
8205 relplt_name = bed->relplt_name;
8206 if (relplt_name == NULL)
8207 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8208 relplt = bfd_get_section_by_name (abfd, relplt_name);
8209 if (relplt == NULL)
8210 return 0;
8211
8212 hdr = &elf_section_data (relplt)->this_hdr;
8213 if (hdr->sh_link != elf_dynsymtab (abfd)
8214 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8215 return 0;
8216
8217 plt = bfd_get_section_by_name (abfd, ".plt");
8218 if (plt == NULL)
8219 return 0;
8220
8221 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8222 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8223 return -1;
8224
eea6121a 8225 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8226 size = count * sizeof (asymbol);
8227 p = relplt->relocation;
8228 for (i = 0; i < count; i++, s++, p++)
8229 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8230
8231 s = *ret = bfd_malloc (size);
8232 if (s == NULL)
8233 return -1;
8234
8235 names = (char *) (s + count);
8236 p = relplt->relocation;
8237 n = 0;
8238 for (i = 0; i < count; i++, s++, p++)
8239 {
8240 size_t len;
8241 bfd_vma addr;
8242
8243 addr = bed->plt_sym_val (i, plt, p);
8244 if (addr == (bfd_vma) -1)
8245 continue;
8246
8247 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8248 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8249 we are defining a symbol, ensure one of them is set. */
8250 if ((s->flags & BSF_LOCAL) == 0)
8251 s->flags |= BSF_GLOBAL;
4c45e5c9
JJ
8252 s->section = plt;
8253 s->value = addr - plt->vma;
8254 s->name = names;
8255 len = strlen ((*p->sym_ptr_ptr)->name);
8256 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8257 names += len;
8258 memcpy (names, "@plt", sizeof ("@plt"));
8259 names += sizeof ("@plt");
8260 ++n;
8261 }
8262
8263 return n;
8264}
3d7f7666
L
8265
8266/* Sort symbol by binding and section. We want to put definitions
8267 sorted by section at the beginning. */
8268
8269static int
8270elf_sort_elf_symbol (const void *arg1, const void *arg2)
8271{
8272 const Elf_Internal_Sym *s1;
8273 const Elf_Internal_Sym *s2;
8274 int shndx;
8275
8276 /* Make sure that undefined symbols are at the end. */
8277 s1 = (const Elf_Internal_Sym *) arg1;
8278 if (s1->st_shndx == SHN_UNDEF)
8279 return 1;
8280 s2 = (const Elf_Internal_Sym *) arg2;
8281 if (s2->st_shndx == SHN_UNDEF)
8282 return -1;
8283
8284 /* Sorted by section index. */
8285 shndx = s1->st_shndx - s2->st_shndx;
8286 if (shndx != 0)
8287 return shndx;
8288
8289 /* Sorted by binding. */
8290 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8291}
8292
8293struct elf_symbol
8294{
8295 Elf_Internal_Sym *sym;
8296 const char *name;
8297};
8298
8299static int
8300elf_sym_name_compare (const void *arg1, const void *arg2)
8301{
8302 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8303 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8304 return strcmp (s1->name, s2->name);
8305}
8306
8307/* Check if 2 sections define the same set of local and global
8308 symbols. */
8309
8310bfd_boolean
8311bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8312{
8313 bfd *bfd1, *bfd2;
8314 const struct elf_backend_data *bed1, *bed2;
8315 Elf_Internal_Shdr *hdr1, *hdr2;
8316 bfd_size_type symcount1, symcount2;
8317 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8318 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8319 Elf_Internal_Sym *isymend;
8320 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8321 bfd_size_type count1, count2, i;
8322 int shndx1, shndx2;
8323 bfd_boolean result;
8324
8325 bfd1 = sec1->owner;
8326 bfd2 = sec2->owner;
8327
8328 /* If both are .gnu.linkonce sections, they have to have the same
8329 section name. */
8330 if (strncmp (sec1->name, ".gnu.linkonce",
8331 sizeof ".gnu.linkonce" - 1) == 0
8332 && strncmp (sec2->name, ".gnu.linkonce",
8333 sizeof ".gnu.linkonce" - 1) == 0)
8334 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8335 sec2->name + sizeof ".gnu.linkonce") == 0;
8336
8337 /* Both sections have to be in ELF. */
8338 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8339 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8340 return FALSE;
8341
8342 if (elf_section_type (sec1) != elf_section_type (sec2))
8343 return FALSE;
8344
8345 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8346 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8347 {
8348 /* If both are members of section groups, they have to have the
8349 same group name. */
8350 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8351 return FALSE;
8352 }
8353
8354 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8355 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8356 if (shndx1 == -1 || shndx2 == -1)
8357 return FALSE;
8358
8359 bed1 = get_elf_backend_data (bfd1);
8360 bed2 = get_elf_backend_data (bfd2);
8361 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8362 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8363 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8364 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8365
8366 if (symcount1 == 0 || symcount2 == 0)
8367 return FALSE;
8368
8369 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8370 NULL, NULL, NULL);
8371 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8372 NULL, NULL, NULL);
8373
8374 result = FALSE;
8375 if (isymbuf1 == NULL || isymbuf2 == NULL)
8376 goto done;
8377
8378 /* Sort symbols by binding and section. Global definitions are at
8379 the beginning. */
8380 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8381 elf_sort_elf_symbol);
8382 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8383 elf_sort_elf_symbol);
8384
8385 /* Count definitions in the section. */
8386 count1 = 0;
8387 for (isym = isymbuf1, isymend = isym + symcount1;
8388 isym < isymend; isym++)
8389 {
8390 if (isym->st_shndx == (unsigned int) shndx1)
8391 {
8392 if (count1 == 0)
8393 isymstart1 = isym;
8394 count1++;
8395 }
8396
8397 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8398 break;
8399 }
8400
8401 count2 = 0;
8402 for (isym = isymbuf2, isymend = isym + symcount2;
8403 isym < isymend; isym++)
8404 {
8405 if (isym->st_shndx == (unsigned int) shndx2)
8406 {
8407 if (count2 == 0)
8408 isymstart2 = isym;
8409 count2++;
8410 }
8411
8412 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8413 break;
8414 }
8415
8416 if (count1 == 0 || count2 == 0 || count1 != count2)
8417 goto done;
8418
8419 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8420 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8421
8422 if (symtable1 == NULL || symtable2 == NULL)
8423 goto done;
8424
8425 symp = symtable1;
8426 for (isym = isymstart1, isymend = isym + count1;
8427 isym < isymend; isym++)
8428 {
8429 symp->sym = isym;
8430 symp->name = bfd_elf_string_from_elf_section (bfd1,
8431 hdr1->sh_link,
8432 isym->st_name);
8433 symp++;
8434 }
8435
8436 symp = symtable2;
8437 for (isym = isymstart2, isymend = isym + count1;
8438 isym < isymend; isym++)
8439 {
8440 symp->sym = isym;
8441 symp->name = bfd_elf_string_from_elf_section (bfd2,
8442 hdr2->sh_link,
8443 isym->st_name);
8444 symp++;
8445 }
8446
8447 /* Sort symbol by name. */
8448 qsort (symtable1, count1, sizeof (struct elf_symbol),
8449 elf_sym_name_compare);
8450 qsort (symtable2, count1, sizeof (struct elf_symbol),
8451 elf_sym_name_compare);
8452
8453 for (i = 0; i < count1; i++)
8454 /* Two symbols must have the same binding, type and name. */
8455 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8456 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8457 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8458 goto done;
8459
8460 result = TRUE;
8461
8462done:
8463 if (symtable1)
8464 free (symtable1);
8465 if (symtable2)
8466 free (symtable2);
8467 if (isymbuf1)
8468 free (isymbuf1);
8469 if (isymbuf2)
8470 free (isymbuf2);
8471
8472 return result;
8473}
3b22753a
L
8474
8475/* It is only used by x86-64 so far. */
8476asection _bfd_elf_large_com_section
8477 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
8478 SEC_IS_COMMON, NULL, NULL, "LARGE_COMMON",
8479 0);
ecca9871
L
8480
8481/* Return TRUE if 2 section types are compatible. */
8482
8483bfd_boolean
8484_bfd_elf_match_sections_by_type (bfd *abfd, const asection *asec,
8485 bfd *bbfd, const asection *bsec)
8486{
8487 if (asec == NULL
8488 || bsec == NULL
8489 || abfd->xvec->flavour != bfd_target_elf_flavour
8490 || bbfd->xvec->flavour != bfd_target_elf_flavour)
8491 return TRUE;
8492
8493 return elf_section_type (asec) == elf_section_type (bsec);
8494}