]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
Clarify ANSI, not POSIX, terminal escapes in ChangeLog
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
8615f3f2 4 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
661a3fd4 22/* SECTION
47d9a591 23
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
b34976b6 209bfd_boolean
217aa764 210bfd_elf_mkobject (bfd *abfd)
252b5132 211{
c044fabd
KH
212 /* This just does initialization. */
213 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 214 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 215 if (elf_tdata (abfd) == 0)
b34976b6 216 return FALSE;
c044fabd
KH
217 /* Since everything is done at close time, do we need any
218 initialization? */
252b5132 219
b34976b6 220 return TRUE;
252b5132
RH
221}
222
b34976b6 223bfd_boolean
217aa764 224bfd_elf_mkcorefile (bfd *abfd)
252b5132 225{
c044fabd 226 /* I think this can be done just like an object file. */
252b5132
RH
227 return bfd_elf_mkobject (abfd);
228}
229
230char *
217aa764 231bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
232{
233 Elf_Internal_Shdr **i_shdrp;
f075ee0c 234 bfd_byte *shstrtab = NULL;
dc810e39
AM
235 file_ptr offset;
236 bfd_size_type shstrtabsize;
252b5132
RH
237
238 i_shdrp = elf_elfsections (abfd);
239 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 240 return NULL;
252b5132 241
f075ee0c 242 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
243 if (shstrtab == NULL)
244 {
c044fabd 245 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
246 offset = i_shdrp[shindex]->sh_offset;
247 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
248
249 /* Allocate and clear an extra byte at the end, to prevent crashes
250 in case the string table is not terminated. */
251 if (shstrtabsize + 1 == 0
252 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
253 || bfd_seek (abfd, offset, SEEK_SET) != 0)
254 shstrtab = NULL;
255 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
256 {
257 if (bfd_get_error () != bfd_error_system_call)
258 bfd_set_error (bfd_error_file_truncated);
259 shstrtab = NULL;
260 }
261 else
262 shstrtab[shstrtabsize] = '\0';
217aa764 263 i_shdrp[shindex]->contents = shstrtab;
252b5132 264 }
f075ee0c 265 return (char *) shstrtab;
252b5132
RH
266}
267
268char *
217aa764
AM
269bfd_elf_string_from_elf_section (bfd *abfd,
270 unsigned int shindex,
271 unsigned int strindex)
252b5132
RH
272{
273 Elf_Internal_Shdr *hdr;
274
275 if (strindex == 0)
276 return "";
277
278 hdr = elf_elfsections (abfd)[shindex];
279
280 if (hdr->contents == NULL
281 && bfd_elf_get_str_section (abfd, shindex) == NULL)
282 return NULL;
283
284 if (strindex >= hdr->sh_size)
285 {
1b3a8575 286 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 287 (*_bfd_error_handler)
d003868e
AM
288 (_("%B: invalid string offset %u >= %lu for section `%s'"),
289 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 290 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 291 ? ".shstrtab"
1b3a8575 292 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
293 return "";
294 }
295
296 return ((char *) hdr->contents) + strindex;
297}
298
6cdc0ccc
AM
299/* Read and convert symbols to internal format.
300 SYMCOUNT specifies the number of symbols to read, starting from
301 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
302 are non-NULL, they are used to store the internal symbols, external
303 symbols, and symbol section index extensions, respectively. */
304
305Elf_Internal_Sym *
217aa764
AM
306bfd_elf_get_elf_syms (bfd *ibfd,
307 Elf_Internal_Shdr *symtab_hdr,
308 size_t symcount,
309 size_t symoffset,
310 Elf_Internal_Sym *intsym_buf,
311 void *extsym_buf,
312 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
313{
314 Elf_Internal_Shdr *shndx_hdr;
217aa764 315 void *alloc_ext;
df622259 316 const bfd_byte *esym;
6cdc0ccc
AM
317 Elf_External_Sym_Shndx *alloc_extshndx;
318 Elf_External_Sym_Shndx *shndx;
319 Elf_Internal_Sym *isym;
320 Elf_Internal_Sym *isymend;
9c5bfbb7 321 const struct elf_backend_data *bed;
6cdc0ccc
AM
322 size_t extsym_size;
323 bfd_size_type amt;
324 file_ptr pos;
325
326 if (symcount == 0)
327 return intsym_buf;
328
329 /* Normal syms might have section extension entries. */
330 shndx_hdr = NULL;
331 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
332 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
333
334 /* Read the symbols. */
335 alloc_ext = NULL;
336 alloc_extshndx = NULL;
337 bed = get_elf_backend_data (ibfd);
338 extsym_size = bed->s->sizeof_sym;
339 amt = symcount * extsym_size;
340 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
341 if (extsym_buf == NULL)
342 {
d0fb9a8d 343 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
344 extsym_buf = alloc_ext;
345 }
346 if (extsym_buf == NULL
347 || bfd_seek (ibfd, pos, SEEK_SET) != 0
348 || bfd_bread (extsym_buf, amt, ibfd) != amt)
349 {
350 intsym_buf = NULL;
351 goto out;
352 }
353
354 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
355 extshndx_buf = NULL;
356 else
357 {
358 amt = symcount * sizeof (Elf_External_Sym_Shndx);
359 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
360 if (extshndx_buf == NULL)
361 {
d0fb9a8d
JJ
362 alloc_extshndx = bfd_malloc2 (symcount,
363 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
364 extshndx_buf = alloc_extshndx;
365 }
366 if (extshndx_buf == NULL
367 || bfd_seek (ibfd, pos, SEEK_SET) != 0
368 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
369 {
370 intsym_buf = NULL;
371 goto out;
372 }
373 }
374
375 if (intsym_buf == NULL)
376 {
d0fb9a8d 377 intsym_buf = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
6cdc0ccc
AM
378 if (intsym_buf == NULL)
379 goto out;
380 }
381
382 /* Convert the symbols to internal form. */
383 isymend = intsym_buf + symcount;
384 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
385 isym < isymend;
386 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 387 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
388
389 out:
390 if (alloc_ext != NULL)
391 free (alloc_ext);
392 if (alloc_extshndx != NULL)
393 free (alloc_extshndx);
394
395 return intsym_buf;
396}
397
5cab59f6
AM
398/* Look up a symbol name. */
399const char *
be8dd2ca
AM
400bfd_elf_sym_name (bfd *abfd,
401 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
402 Elf_Internal_Sym *isym,
403 asection *sym_sec)
5cab59f6 404{
26c61ae5 405 const char *name;
5cab59f6 406 unsigned int iname = isym->st_name;
be8dd2ca 407 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 408
138f35cc
JJ
409 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
410 /* Check for a bogus st_shndx to avoid crashing. */
411 && isym->st_shndx < elf_numsections (abfd)
412 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
413 {
414 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
415 shindex = elf_elfheader (abfd)->e_shstrndx;
416 }
417
26c61ae5
L
418 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
419 if (name == NULL)
420 name = "(null)";
421 else if (sym_sec && *name == '\0')
422 name = bfd_section_name (abfd, sym_sec);
423
424 return name;
5cab59f6
AM
425}
426
dbb410c3
AM
427/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
428 sections. The first element is the flags, the rest are section
429 pointers. */
430
431typedef union elf_internal_group {
432 Elf_Internal_Shdr *shdr;
433 unsigned int flags;
434} Elf_Internal_Group;
435
b885599b
AM
436/* Return the name of the group signature symbol. Why isn't the
437 signature just a string? */
438
439static const char *
217aa764 440group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 441{
9dce4196 442 Elf_Internal_Shdr *hdr;
9dce4196
AM
443 unsigned char esym[sizeof (Elf64_External_Sym)];
444 Elf_External_Sym_Shndx eshndx;
445 Elf_Internal_Sym isym;
b885599b 446
13792e9d
L
447 /* First we need to ensure the symbol table is available. Make sure
448 that it is a symbol table section. */
449 hdr = elf_elfsections (abfd) [ghdr->sh_link];
450 if (hdr->sh_type != SHT_SYMTAB
451 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
452 return NULL;
453
9dce4196
AM
454 /* Go read the symbol. */
455 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
456 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
457 &isym, esym, &eshndx) == NULL)
b885599b 458 return NULL;
9dce4196 459
26c61ae5 460 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
461}
462
dbb410c3
AM
463/* Set next_in_group list pointer, and group name for NEWSECT. */
464
b34976b6 465static bfd_boolean
217aa764 466setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
467{
468 unsigned int num_group = elf_tdata (abfd)->num_group;
469
470 /* If num_group is zero, read in all SHT_GROUP sections. The count
471 is set to -1 if there are no SHT_GROUP sections. */
472 if (num_group == 0)
473 {
474 unsigned int i, shnum;
475
476 /* First count the number of groups. If we have a SHT_GROUP
477 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 478 shnum = elf_numsections (abfd);
dbb410c3
AM
479 num_group = 0;
480 for (i = 0; i < shnum; i++)
481 {
482 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
483 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
484 num_group += 1;
485 }
486
487 if (num_group == 0)
20dbb49d
L
488 {
489 num_group = (unsigned) -1;
490 elf_tdata (abfd)->num_group = num_group;
491 }
492 else
dbb410c3
AM
493 {
494 /* We keep a list of elf section headers for group sections,
495 so we can find them quickly. */
20dbb49d 496 bfd_size_type amt;
d0fb9a8d 497
20dbb49d 498 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
499 elf_tdata (abfd)->group_sect_ptr
500 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 501 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 502 return FALSE;
dbb410c3
AM
503
504 num_group = 0;
505 for (i = 0; i < shnum; i++)
506 {
507 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
508 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
509 {
973ffd63 510 unsigned char *src;
dbb410c3
AM
511 Elf_Internal_Group *dest;
512
513 /* Add to list of sections. */
514 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
515 num_group += 1;
516
517 /* Read the raw contents. */
518 BFD_ASSERT (sizeof (*dest) >= 4);
519 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
520 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
521 sizeof (*dest) / 4);
dbb410c3
AM
522 if (shdr->contents == NULL
523 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
524 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
525 != shdr->sh_size))
b34976b6 526 return FALSE;
dbb410c3
AM
527
528 /* Translate raw contents, a flag word followed by an
529 array of elf section indices all in target byte order,
530 to the flag word followed by an array of elf section
531 pointers. */
532 src = shdr->contents + shdr->sh_size;
533 dest = (Elf_Internal_Group *) (shdr->contents + amt);
534 while (1)
535 {
536 unsigned int idx;
537
538 src -= 4;
539 --dest;
540 idx = H_GET_32 (abfd, src);
541 if (src == shdr->contents)
542 {
543 dest->flags = idx;
b885599b
AM
544 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
545 shdr->bfd_section->flags
546 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
547 break;
548 }
549 if (idx >= shnum)
550 {
551 ((*_bfd_error_handler)
d003868e 552 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
553 idx = 0;
554 }
555 dest->shdr = elf_elfsections (abfd)[idx];
556 }
557 }
558 }
559 }
560 }
561
562 if (num_group != (unsigned) -1)
563 {
564 unsigned int i;
565
566 for (i = 0; i < num_group; i++)
567 {
568 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
569 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
570 unsigned int n_elt = shdr->sh_size / 4;
571
572 /* Look through this group's sections to see if current
573 section is a member. */
574 while (--n_elt != 0)
575 if ((++idx)->shdr == hdr)
576 {
e0e8c97f 577 asection *s = NULL;
dbb410c3
AM
578
579 /* We are a member of this group. Go looking through
580 other members to see if any others are linked via
581 next_in_group. */
582 idx = (Elf_Internal_Group *) shdr->contents;
583 n_elt = shdr->sh_size / 4;
584 while (--n_elt != 0)
585 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 586 && elf_next_in_group (s) != NULL)
dbb410c3
AM
587 break;
588 if (n_elt != 0)
589 {
dbb410c3
AM
590 /* Snarf the group name from other member, and
591 insert current section in circular list. */
945906ff
AM
592 elf_group_name (newsect) = elf_group_name (s);
593 elf_next_in_group (newsect) = elf_next_in_group (s);
594 elf_next_in_group (s) = newsect;
dbb410c3
AM
595 }
596 else
597 {
dbb410c3
AM
598 const char *gname;
599
b885599b
AM
600 gname = group_signature (abfd, shdr);
601 if (gname == NULL)
b34976b6 602 return FALSE;
945906ff 603 elf_group_name (newsect) = gname;
dbb410c3
AM
604
605 /* Start a circular list with one element. */
945906ff 606 elf_next_in_group (newsect) = newsect;
dbb410c3 607 }
b885599b 608
9dce4196
AM
609 /* If the group section has been created, point to the
610 new member. */
dbb410c3 611 if (shdr->bfd_section != NULL)
945906ff 612 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 613
dbb410c3
AM
614 i = num_group - 1;
615 break;
616 }
617 }
618 }
619
945906ff 620 if (elf_group_name (newsect) == NULL)
dbb410c3 621 {
d003868e
AM
622 (*_bfd_error_handler) (_("%B: no group info for section %A"),
623 abfd, newsect);
dbb410c3 624 }
b34976b6 625 return TRUE;
dbb410c3
AM
626}
627
3d7f7666
L
628bfd_boolean
629_bfd_elf_setup_group_pointers (bfd *abfd)
630{
631 unsigned int i;
632 unsigned int num_group = elf_tdata (abfd)->num_group;
633 bfd_boolean result = TRUE;
634
635 if (num_group == (unsigned) -1)
636 return result;
637
638 for (i = 0; i < num_group; i++)
639 {
640 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
641 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
642 unsigned int n_elt = shdr->sh_size / 4;
643
644 while (--n_elt != 0)
645 if ((++idx)->shdr->bfd_section)
646 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
647 else if (idx->shdr->sh_type == SHT_RELA
648 || idx->shdr->sh_type == SHT_REL)
649 /* We won't include relocation sections in section groups in
650 output object files. We adjust the group section size here
651 so that relocatable link will work correctly when
652 relocation sections are in section group in input object
653 files. */
654 shdr->bfd_section->size -= 4;
655 else
656 {
657 /* There are some unknown sections in the group. */
658 (*_bfd_error_handler)
d003868e
AM
659 (_("%B: unknown [%d] section `%s' in group [%s]"),
660 abfd,
3d7f7666 661 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
662 bfd_elf_string_from_elf_section (abfd,
663 (elf_elfheader (abfd)
664 ->e_shstrndx),
665 idx->shdr->sh_name),
3d7f7666
L
666 shdr->bfd_section->name);
667 result = FALSE;
668 }
669 }
670 return result;
671}
672
72adc230
AM
673bfd_boolean
674bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
675{
676 return elf_next_in_group (sec) != NULL;
677}
678
252b5132
RH
679/* Make a BFD section from an ELF section. We store a pointer to the
680 BFD section in the bfd_section field of the header. */
681
b34976b6 682bfd_boolean
217aa764
AM
683_bfd_elf_make_section_from_shdr (bfd *abfd,
684 Elf_Internal_Shdr *hdr,
6dc132d9
L
685 const char *name,
686 int shindex)
252b5132
RH
687{
688 asection *newsect;
689 flagword flags;
9c5bfbb7 690 const struct elf_backend_data *bed;
252b5132
RH
691
692 if (hdr->bfd_section != NULL)
693 {
694 BFD_ASSERT (strcmp (name,
695 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 696 return TRUE;
252b5132
RH
697 }
698
699 newsect = bfd_make_section_anyway (abfd, name);
700 if (newsect == NULL)
b34976b6 701 return FALSE;
252b5132 702
1829f4b2
AM
703 hdr->bfd_section = newsect;
704 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 705 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 706
2f89ff8d
L
707 /* Always use the real type/flags. */
708 elf_section_type (newsect) = hdr->sh_type;
709 elf_section_flags (newsect) = hdr->sh_flags;
710
252b5132
RH
711 newsect->filepos = hdr->sh_offset;
712
713 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
714 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
715 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 716 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 717 return FALSE;
252b5132
RH
718
719 flags = SEC_NO_FLAGS;
720 if (hdr->sh_type != SHT_NOBITS)
721 flags |= SEC_HAS_CONTENTS;
dbb410c3 722 if (hdr->sh_type == SHT_GROUP)
b3096250 723 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
724 if ((hdr->sh_flags & SHF_ALLOC) != 0)
725 {
726 flags |= SEC_ALLOC;
727 if (hdr->sh_type != SHT_NOBITS)
728 flags |= SEC_LOAD;
729 }
730 if ((hdr->sh_flags & SHF_WRITE) == 0)
731 flags |= SEC_READONLY;
732 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
733 flags |= SEC_CODE;
734 else if ((flags & SEC_LOAD) != 0)
735 flags |= SEC_DATA;
f5fa8ca2
JJ
736 if ((hdr->sh_flags & SHF_MERGE) != 0)
737 {
738 flags |= SEC_MERGE;
739 newsect->entsize = hdr->sh_entsize;
740 if ((hdr->sh_flags & SHF_STRINGS) != 0)
741 flags |= SEC_STRINGS;
742 }
dbb410c3
AM
743 if (hdr->sh_flags & SHF_GROUP)
744 if (!setup_group (abfd, hdr, newsect))
b34976b6 745 return FALSE;
13ae64f3
JJ
746 if ((hdr->sh_flags & SHF_TLS) != 0)
747 flags |= SEC_THREAD_LOCAL;
252b5132 748
3d2b39cf 749 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 750 {
3d2b39cf
L
751 /* The debugging sections appear to be recognized only by name,
752 not any sort of flag. Their SEC_ALLOC bits are cleared. */
753 static const struct
754 {
755 const char *name;
756 int len;
757 } debug_sections [] =
758 {
759 { "debug", 5 }, /* 'd' */
760 { NULL, 0 }, /* 'e' */
761 { NULL, 0 }, /* 'f' */
762 { "gnu.linkonce.wi.", 17 }, /* 'g' */
763 { NULL, 0 }, /* 'h' */
764 { NULL, 0 }, /* 'i' */
765 { NULL, 0 }, /* 'j' */
766 { NULL, 0 }, /* 'k' */
767 { "line", 4 }, /* 'l' */
768 { NULL, 0 }, /* 'm' */
769 { NULL, 0 }, /* 'n' */
770 { NULL, 0 }, /* 'o' */
771 { NULL, 0 }, /* 'p' */
772 { NULL, 0 }, /* 'q' */
773 { NULL, 0 }, /* 'r' */
774 { "stab", 4 } /* 's' */
775 };
776
777 if (name [0] == '.')
778 {
779 int i = name [1] - 'd';
780 if (i >= 0
781 && i < (int) ARRAY_SIZE (debug_sections)
782 && debug_sections [i].name != NULL
783 && strncmp (&name [1], debug_sections [i].name,
784 debug_sections [i].len) == 0)
785 flags |= SEC_DEBUGGING;
786 }
787 }
252b5132
RH
788
789 /* As a GNU extension, if the name begins with .gnu.linkonce, we
790 only link a single copy of the section. This is used to support
791 g++. g++ will emit each template expansion in its own section.
792 The symbols will be defined as weak, so that multiple definitions
793 are permitted. The GNU linker extension is to actually discard
794 all but one of the sections. */
b885599b
AM
795 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
796 && elf_next_in_group (newsect) == NULL)
252b5132
RH
797 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
798
fa152c49
JW
799 bed = get_elf_backend_data (abfd);
800 if (bed->elf_backend_section_flags)
801 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 802 return FALSE;
fa152c49 803
252b5132 804 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 805 return FALSE;
252b5132
RH
806
807 if ((flags & SEC_ALLOC) != 0)
808 {
809 Elf_Internal_Phdr *phdr;
810 unsigned int i;
811
812 /* Look through the phdrs to see if we need to adjust the lma.
813 If all the p_paddr fields are zero, we ignore them, since
814 some ELF linkers produce such output. */
815 phdr = elf_tdata (abfd)->phdr;
816 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
817 {
818 if (phdr->p_paddr != 0)
819 break;
820 }
821 if (i < elf_elfheader (abfd)->e_phnum)
822 {
823 phdr = elf_tdata (abfd)->phdr;
824 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
825 {
e0e8c97f
NC
826 /* This section is part of this segment if its file
827 offset plus size lies within the segment's memory
828 span and, if the section is loaded, the extent of the
47d9a591 829 loaded data lies within the extent of the segment.
bf36db18
NC
830
831 Note - we used to check the p_paddr field as well, and
832 refuse to set the LMA if it was 0. This is wrong
dba143ef 833 though, as a perfectly valid initialised segment can
bf36db18 834 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 835 place special significance on the address 0 and
bf36db18
NC
836 executables need to be able to have a segment which
837 covers this address. */
252b5132 838 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
839 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
840 && (hdr->sh_offset + hdr->sh_size
841 <= phdr->p_offset + phdr->p_memsz)
252b5132 842 && ((flags & SEC_LOAD) == 0
d7866f04
AM
843 || (hdr->sh_offset + hdr->sh_size
844 <= phdr->p_offset + phdr->p_filesz)))
252b5132 845 {
dba143ef 846 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
847 newsect->lma = (phdr->p_paddr
848 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
849 else
850 /* We used to use the same adjustment for SEC_LOAD
851 sections, but that doesn't work if the segment
852 is packed with code from multiple VMAs.
853 Instead we calculate the section LMA based on
854 the segment LMA. It is assumed that the
855 segment will contain sections with contiguous
856 LMAs, even if the VMAs are not. */
857 newsect->lma = (phdr->p_paddr
858 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
859
860 /* With contiguous segments, we can't tell from file
861 offsets whether a section with zero size should
862 be placed at the end of one segment or the
863 beginning of the next. Decide based on vaddr. */
864 if (hdr->sh_addr >= phdr->p_vaddr
865 && (hdr->sh_addr + hdr->sh_size
866 <= phdr->p_vaddr + phdr->p_memsz))
867 break;
252b5132
RH
868 }
869 }
870 }
871 }
872
b34976b6 873 return TRUE;
252b5132
RH
874}
875
876/*
877INTERNAL_FUNCTION
878 bfd_elf_find_section
879
880SYNOPSIS
881 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
882
883DESCRIPTION
884 Helper functions for GDB to locate the string tables.
885 Since BFD hides string tables from callers, GDB needs to use an
886 internal hook to find them. Sun's .stabstr, in particular,
887 isn't even pointed to by the .stab section, so ordinary
888 mechanisms wouldn't work to find it, even if we had some.
889*/
890
891struct elf_internal_shdr *
217aa764 892bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
893{
894 Elf_Internal_Shdr **i_shdrp;
895 char *shstrtab;
896 unsigned int max;
897 unsigned int i;
898
899 i_shdrp = elf_elfsections (abfd);
900 if (i_shdrp != NULL)
901 {
9ad5cbcf
AM
902 shstrtab = bfd_elf_get_str_section (abfd,
903 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
904 if (shstrtab != NULL)
905 {
9ad5cbcf 906 max = elf_numsections (abfd);
252b5132
RH
907 for (i = 1; i < max; i++)
908 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
909 return i_shdrp[i];
910 }
911 }
912 return 0;
913}
914
915const char *const bfd_elf_section_type_names[] = {
916 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
917 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
918 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
919};
920
1049f94e 921/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
922 output, and the reloc is against an external symbol, and nothing
923 has given us any additional addend, the resulting reloc will also
924 be against the same symbol. In such a case, we don't want to
925 change anything about the way the reloc is handled, since it will
926 all be done at final link time. Rather than put special case code
927 into bfd_perform_relocation, all the reloc types use this howto
928 function. It just short circuits the reloc if producing
1049f94e 929 relocatable output against an external symbol. */
252b5132 930
252b5132 931bfd_reloc_status_type
217aa764
AM
932bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
933 arelent *reloc_entry,
934 asymbol *symbol,
935 void *data ATTRIBUTE_UNUSED,
936 asection *input_section,
937 bfd *output_bfd,
938 char **error_message ATTRIBUTE_UNUSED)
939{
940 if (output_bfd != NULL
252b5132
RH
941 && (symbol->flags & BSF_SECTION_SYM) == 0
942 && (! reloc_entry->howto->partial_inplace
943 || reloc_entry->addend == 0))
944 {
945 reloc_entry->address += input_section->output_offset;
946 return bfd_reloc_ok;
947 }
948
949 return bfd_reloc_continue;
950}
951\f
d3c456e9
JJ
952/* Make sure sec_info_type is cleared if sec_info is cleared too. */
953
954static void
217aa764
AM
955merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
956 asection *sec)
d3c456e9 957{
68bfbfcc
AM
958 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
959 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
960}
961
8550eb6e
JJ
962/* Finish SHF_MERGE section merging. */
963
b34976b6 964bfd_boolean
217aa764 965_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 966{
57ceae94
AM
967 bfd *ibfd;
968 asection *sec;
969
0eddce27 970 if (!is_elf_hash_table (info->hash))
b34976b6 971 return FALSE;
57ceae94
AM
972
973 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
974 if ((ibfd->flags & DYNAMIC) == 0)
975 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
976 if ((sec->flags & SEC_MERGE) != 0
977 && !bfd_is_abs_section (sec->output_section))
978 {
979 struct bfd_elf_section_data *secdata;
980
981 secdata = elf_section_data (sec);
982 if (! _bfd_add_merge_section (abfd,
983 &elf_hash_table (info)->merge_info,
984 sec, &secdata->sec_info))
985 return FALSE;
986 else if (secdata->sec_info)
987 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
988 }
989
990 if (elf_hash_table (info)->merge_info != NULL)
991 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 992 merge_sections_remove_hook);
b34976b6 993 return TRUE;
8550eb6e 994}
2d653fc7
AM
995
996void
217aa764 997_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
998{
999 sec->output_section = bfd_abs_section_ptr;
1000 sec->output_offset = sec->vma;
0eddce27 1001 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1002 return;
1003
68bfbfcc 1004 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1005}
8550eb6e 1006\f
0ac4564e
L
1007/* Copy the program header and other data from one object module to
1008 another. */
252b5132 1009
b34976b6 1010bfd_boolean
217aa764 1011_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1012{
1013 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1014 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1015 return TRUE;
2d502050
L
1016
1017 BFD_ASSERT (!elf_flags_init (obfd)
1018 || (elf_elfheader (obfd)->e_flags
1019 == elf_elfheader (ibfd)->e_flags));
1020
0ac4564e 1021 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1022 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1023 elf_flags_init (obfd) = TRUE;
1024 return TRUE;
2d502050
L
1025}
1026
f0b79d91
L
1027/* Print out the program headers. */
1028
b34976b6 1029bfd_boolean
217aa764 1030_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1031{
217aa764 1032 FILE *f = farg;
252b5132
RH
1033 Elf_Internal_Phdr *p;
1034 asection *s;
1035 bfd_byte *dynbuf = NULL;
1036
1037 p = elf_tdata (abfd)->phdr;
1038 if (p != NULL)
1039 {
1040 unsigned int i, c;
1041
1042 fprintf (f, _("\nProgram Header:\n"));
1043 c = elf_elfheader (abfd)->e_phnum;
1044 for (i = 0; i < c; i++, p++)
1045 {
dc810e39 1046 const char *pt;
252b5132
RH
1047 char buf[20];
1048
1049 switch (p->p_type)
1050 {
dc810e39
AM
1051 case PT_NULL: pt = "NULL"; break;
1052 case PT_LOAD: pt = "LOAD"; break;
1053 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1054 case PT_INTERP: pt = "INTERP"; break;
1055 case PT_NOTE: pt = "NOTE"; break;
1056 case PT_SHLIB: pt = "SHLIB"; break;
1057 case PT_PHDR: pt = "PHDR"; break;
13ae64f3 1058 case PT_TLS: pt = "TLS"; break;
65765700 1059 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
9ee5e499 1060 case PT_GNU_STACK: pt = "STACK"; break;
8c37241b 1061 case PT_GNU_RELRO: pt = "RELRO"; break;
dc810e39 1062 default: sprintf (buf, "0x%lx", p->p_type); pt = buf; break;
252b5132 1063 }
dc810e39 1064 fprintf (f, "%8s off 0x", pt);
60b89a18 1065 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1066 fprintf (f, " vaddr 0x");
60b89a18 1067 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1068 fprintf (f, " paddr 0x");
60b89a18 1069 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1070 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1071 fprintf (f, " filesz 0x");
60b89a18 1072 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1073 fprintf (f, " memsz 0x");
60b89a18 1074 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1075 fprintf (f, " flags %c%c%c",
1076 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1077 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1078 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1079 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1080 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1081 fprintf (f, "\n");
1082 }
1083 }
1084
1085 s = bfd_get_section_by_name (abfd, ".dynamic");
1086 if (s != NULL)
1087 {
1088 int elfsec;
dc810e39 1089 unsigned long shlink;
252b5132
RH
1090 bfd_byte *extdyn, *extdynend;
1091 size_t extdynsize;
217aa764 1092 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1093
1094 fprintf (f, _("\nDynamic Section:\n"));
1095
eea6121a 1096 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1097 goto error_return;
1098
1099 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1100 if (elfsec == -1)
1101 goto error_return;
dc810e39 1102 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1103
1104 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1105 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1106
1107 extdyn = dynbuf;
eea6121a 1108 extdynend = extdyn + s->size;
252b5132
RH
1109 for (; extdyn < extdynend; extdyn += extdynsize)
1110 {
1111 Elf_Internal_Dyn dyn;
1112 const char *name;
1113 char ab[20];
b34976b6 1114 bfd_boolean stringp;
252b5132 1115
217aa764 1116 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1117
1118 if (dyn.d_tag == DT_NULL)
1119 break;
1120
b34976b6 1121 stringp = FALSE;
252b5132
RH
1122 switch (dyn.d_tag)
1123 {
1124 default:
1125 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1126 name = ab;
1127 break;
1128
b34976b6 1129 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1130 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1131 case DT_PLTGOT: name = "PLTGOT"; break;
1132 case DT_HASH: name = "HASH"; break;
1133 case DT_STRTAB: name = "STRTAB"; break;
1134 case DT_SYMTAB: name = "SYMTAB"; break;
1135 case DT_RELA: name = "RELA"; break;
1136 case DT_RELASZ: name = "RELASZ"; break;
1137 case DT_RELAENT: name = "RELAENT"; break;
1138 case DT_STRSZ: name = "STRSZ"; break;
1139 case DT_SYMENT: name = "SYMENT"; break;
1140 case DT_INIT: name = "INIT"; break;
1141 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1142 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1143 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1144 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1145 case DT_REL: name = "REL"; break;
1146 case DT_RELSZ: name = "RELSZ"; break;
1147 case DT_RELENT: name = "RELENT"; break;
1148 case DT_PLTREL: name = "PLTREL"; break;
1149 case DT_DEBUG: name = "DEBUG"; break;
1150 case DT_TEXTREL: name = "TEXTREL"; break;
1151 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1152 case DT_BIND_NOW: name = "BIND_NOW"; break;
1153 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1154 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1155 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1156 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1157 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1158 case DT_FLAGS: name = "FLAGS"; break;
1159 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1160 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1161 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1162 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1163 case DT_MOVEENT: name = "MOVEENT"; break;
1164 case DT_MOVESZ: name = "MOVESZ"; break;
1165 case DT_FEATURE: name = "FEATURE"; break;
1166 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1167 case DT_SYMINSZ: name = "SYMINSZ"; break;
1168 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1169 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1170 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1171 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1172 case DT_PLTPAD: name = "PLTPAD"; break;
1173 case DT_MOVETAB: name = "MOVETAB"; break;
1174 case DT_SYMINFO: name = "SYMINFO"; break;
1175 case DT_RELACOUNT: name = "RELACOUNT"; break;
1176 case DT_RELCOUNT: name = "RELCOUNT"; break;
1177 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1178 case DT_VERSYM: name = "VERSYM"; break;
1179 case DT_VERDEF: name = "VERDEF"; break;
1180 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1181 case DT_VERNEED: name = "VERNEED"; break;
1182 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1183 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1184 case DT_USED: name = "USED"; break;
b34976b6 1185 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1186 }
1187
1188 fprintf (f, " %-11s ", name);
1189 if (! stringp)
1190 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1191 else
1192 {
1193 const char *string;
dc810e39 1194 unsigned int tagv = dyn.d_un.d_val;
252b5132 1195
dc810e39 1196 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1197 if (string == NULL)
1198 goto error_return;
1199 fprintf (f, "%s", string);
1200 }
1201 fprintf (f, "\n");
1202 }
1203
1204 free (dynbuf);
1205 dynbuf = NULL;
1206 }
1207
1208 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1209 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1210 {
fc0e6df6 1211 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1212 return FALSE;
252b5132
RH
1213 }
1214
1215 if (elf_dynverdef (abfd) != 0)
1216 {
1217 Elf_Internal_Verdef *t;
1218
1219 fprintf (f, _("\nVersion definitions:\n"));
1220 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1221 {
1222 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1223 t->vd_flags, t->vd_hash,
1224 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1225 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1226 {
1227 Elf_Internal_Verdaux *a;
1228
1229 fprintf (f, "\t");
1230 for (a = t->vd_auxptr->vda_nextptr;
1231 a != NULL;
1232 a = a->vda_nextptr)
d0fb9a8d
JJ
1233 fprintf (f, "%s ",
1234 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1235 fprintf (f, "\n");
1236 }
1237 }
1238 }
1239
1240 if (elf_dynverref (abfd) != 0)
1241 {
1242 Elf_Internal_Verneed *t;
1243
1244 fprintf (f, _("\nVersion References:\n"));
1245 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1246 {
1247 Elf_Internal_Vernaux *a;
1248
d0fb9a8d
JJ
1249 fprintf (f, _(" required from %s:\n"),
1250 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1251 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1252 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1253 a->vna_flags, a->vna_other,
1254 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1255 }
1256 }
1257
b34976b6 1258 return TRUE;
252b5132
RH
1259
1260 error_return:
1261 if (dynbuf != NULL)
1262 free (dynbuf);
b34976b6 1263 return FALSE;
252b5132
RH
1264}
1265
1266/* Display ELF-specific fields of a symbol. */
1267
1268void
217aa764
AM
1269bfd_elf_print_symbol (bfd *abfd,
1270 void *filep,
1271 asymbol *symbol,
1272 bfd_print_symbol_type how)
252b5132 1273{
217aa764 1274 FILE *file = filep;
252b5132
RH
1275 switch (how)
1276 {
1277 case bfd_print_symbol_name:
1278 fprintf (file, "%s", symbol->name);
1279 break;
1280 case bfd_print_symbol_more:
1281 fprintf (file, "elf ");
60b89a18 1282 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1283 fprintf (file, " %lx", (long) symbol->flags);
1284 break;
1285 case bfd_print_symbol_all:
1286 {
4e8a9624
AM
1287 const char *section_name;
1288 const char *name = NULL;
9c5bfbb7 1289 const struct elf_backend_data *bed;
7a13edea 1290 unsigned char st_other;
dbb410c3 1291 bfd_vma val;
c044fabd 1292
252b5132 1293 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1294
1295 bed = get_elf_backend_data (abfd);
1296 if (bed->elf_backend_print_symbol_all)
c044fabd 1297 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1298
1299 if (name == NULL)
1300 {
7ee38065 1301 name = symbol->name;
217aa764 1302 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1303 }
1304
252b5132
RH
1305 fprintf (file, " %s\t", section_name);
1306 /* Print the "other" value for a symbol. For common symbols,
1307 we've already printed the size; now print the alignment.
1308 For other symbols, we have no specified alignment, and
1309 we've printed the address; now print the size. */
dbb410c3
AM
1310 if (bfd_is_com_section (symbol->section))
1311 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1312 else
1313 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1314 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1315
1316 /* If we have version information, print it. */
1317 if (elf_tdata (abfd)->dynversym_section != 0
1318 && (elf_tdata (abfd)->dynverdef_section != 0
1319 || elf_tdata (abfd)->dynverref_section != 0))
1320 {
1321 unsigned int vernum;
1322 const char *version_string;
1323
1324 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1325
1326 if (vernum == 0)
1327 version_string = "";
1328 else if (vernum == 1)
1329 version_string = "Base";
1330 else if (vernum <= elf_tdata (abfd)->cverdefs)
1331 version_string =
1332 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1333 else
1334 {
1335 Elf_Internal_Verneed *t;
1336
1337 version_string = "";
1338 for (t = elf_tdata (abfd)->verref;
1339 t != NULL;
1340 t = t->vn_nextref)
1341 {
1342 Elf_Internal_Vernaux *a;
1343
1344 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1345 {
1346 if (a->vna_other == vernum)
1347 {
1348 version_string = a->vna_nodename;
1349 break;
1350 }
1351 }
1352 }
1353 }
1354
1355 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1356 fprintf (file, " %-11s", version_string);
1357 else
1358 {
1359 int i;
1360
1361 fprintf (file, " (%s)", version_string);
1362 for (i = 10 - strlen (version_string); i > 0; --i)
1363 putc (' ', file);
1364 }
1365 }
1366
1367 /* If the st_other field is not zero, print it. */
7a13edea 1368 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1369
7a13edea
NC
1370 switch (st_other)
1371 {
1372 case 0: break;
1373 case STV_INTERNAL: fprintf (file, " .internal"); break;
1374 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1375 case STV_PROTECTED: fprintf (file, " .protected"); break;
1376 default:
1377 /* Some other non-defined flags are also present, so print
1378 everything hex. */
1379 fprintf (file, " 0x%02x", (unsigned int) st_other);
1380 }
252b5132 1381
587ff49e 1382 fprintf (file, " %s", name);
252b5132
RH
1383 }
1384 break;
1385 }
1386}
1387\f
1388/* Create an entry in an ELF linker hash table. */
1389
1390struct bfd_hash_entry *
217aa764
AM
1391_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1392 struct bfd_hash_table *table,
1393 const char *string)
252b5132 1394{
252b5132
RH
1395 /* Allocate the structure if it has not already been allocated by a
1396 subclass. */
51b64d56
AM
1397 if (entry == NULL)
1398 {
1399 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1400 if (entry == NULL)
1401 return entry;
1402 }
252b5132
RH
1403
1404 /* Call the allocation method of the superclass. */
51b64d56
AM
1405 entry = _bfd_link_hash_newfunc (entry, table, string);
1406 if (entry != NULL)
252b5132 1407 {
51b64d56
AM
1408 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1409 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1410
252b5132
RH
1411 /* Set local fields. */
1412 ret->indx = -1;
252b5132 1413 ret->dynindx = -1;
a6aa5195
AM
1414 ret->got = htab->init_got_refcount;
1415 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1416 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1417 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1418 /* Assume that we have been called by a non-ELF symbol reader.
1419 This flag is then reset by the code which reads an ELF input
1420 file. This ensures that a symbol created by a non-ELF symbol
1421 reader will have the flag set correctly. */
f5385ebf 1422 ret->non_elf = 1;
252b5132
RH
1423 }
1424
51b64d56 1425 return entry;
252b5132
RH
1426}
1427
2920b85c 1428/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1429 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1430
c61b8717 1431void
9c5bfbb7 1432_bfd_elf_link_hash_copy_indirect (const struct elf_backend_data *bed,
217aa764
AM
1433 struct elf_link_hash_entry *dir,
1434 struct elf_link_hash_entry *ind)
2920b85c 1435{
3c3e9281 1436 bfd_signed_vma tmp;
b48fa14c 1437 bfd_signed_vma lowest_valid = bed->can_refcount;
3c3e9281 1438
2920b85c
RH
1439 /* Copy down any references that we may have already seen to the
1440 symbol which just became indirect. */
1441
f5385ebf
AM
1442 dir->ref_dynamic |= ind->ref_dynamic;
1443 dir->ref_regular |= ind->ref_regular;
1444 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1445 dir->non_got_ref |= ind->non_got_ref;
1446 dir->needs_plt |= ind->needs_plt;
1447 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1448
1e370bd2 1449 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1450 return;
1451
51b64d56 1452 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1453 These may have been already set up by a check_relocs routine. */
3c3e9281 1454 tmp = dir->got.refcount;
b48fa14c 1455 if (tmp < lowest_valid)
2920b85c 1456 {
51b64d56 1457 dir->got.refcount = ind->got.refcount;
3c3e9281 1458 ind->got.refcount = tmp;
2920b85c 1459 }
3c3e9281 1460 else
b48fa14c 1461 BFD_ASSERT (ind->got.refcount < lowest_valid);
2920b85c 1462
3c3e9281 1463 tmp = dir->plt.refcount;
b48fa14c 1464 if (tmp < lowest_valid)
2920b85c 1465 {
51b64d56 1466 dir->plt.refcount = ind->plt.refcount;
3c3e9281 1467 ind->plt.refcount = tmp;
2920b85c 1468 }
3c3e9281 1469 else
b48fa14c 1470 BFD_ASSERT (ind->plt.refcount < lowest_valid);
2920b85c
RH
1471
1472 if (dir->dynindx == -1)
1473 {
1474 dir->dynindx = ind->dynindx;
1475 dir->dynstr_index = ind->dynstr_index;
1476 ind->dynindx = -1;
1477 ind->dynstr_index = 0;
1478 }
3c3e9281
AM
1479 else
1480 BFD_ASSERT (ind->dynindx == -1);
2920b85c
RH
1481}
1482
c61b8717 1483void
217aa764
AM
1484_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1485 struct elf_link_hash_entry *h,
1486 bfd_boolean force_local)
2920b85c 1487{
a6aa5195 1488 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1489 h->needs_plt = 0;
e5094212
AM
1490 if (force_local)
1491 {
f5385ebf 1492 h->forced_local = 1;
e5094212
AM
1493 if (h->dynindx != -1)
1494 {
1495 h->dynindx = -1;
1496 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1497 h->dynstr_index);
1498 }
1499 }
2920b85c
RH
1500}
1501
252b5132
RH
1502/* Initialize an ELF linker hash table. */
1503
b34976b6 1504bfd_boolean
217aa764
AM
1505_bfd_elf_link_hash_table_init
1506 (struct elf_link_hash_table *table,
1507 bfd *abfd,
1508 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1509 struct bfd_hash_table *,
1510 const char *))
252b5132 1511{
b34976b6 1512 bfd_boolean ret;
a6aa5195 1513 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1514
b34976b6 1515 table->dynamic_sections_created = FALSE;
252b5132 1516 table->dynobj = NULL;
a6aa5195
AM
1517 table->init_got_refcount.refcount = can_refcount - 1;
1518 table->init_plt_refcount.refcount = can_refcount - 1;
1519 table->init_got_offset.offset = -(bfd_vma) 1;
1520 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1521 /* The first dynamic symbol is a dummy. */
1522 table->dynsymcount = 1;
1523 table->dynstr = NULL;
1524 table->bucketcount = 0;
1525 table->needed = NULL;
1526 table->hgot = NULL;
f5fa8ca2 1527 table->merge_info = NULL;
3722b82f 1528 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1529 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1530 table->dynlocal = NULL;
73722af0 1531 table->runpath = NULL;
e1918d23
AM
1532 table->tls_sec = NULL;
1533 table->tls_size = 0;
73722af0 1534 table->loaded = NULL;
67687978 1535 table->is_relocatable_executable = FALSE;
73722af0
AM
1536
1537 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc);
8ea2e4bd
NC
1538 table->root.type = bfd_link_elf_hash_table;
1539
1540 return ret;
252b5132
RH
1541}
1542
1543/* Create an ELF linker hash table. */
1544
1545struct bfd_link_hash_table *
217aa764 1546_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1547{
1548 struct elf_link_hash_table *ret;
dc810e39 1549 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1550
217aa764
AM
1551 ret = bfd_malloc (amt);
1552 if (ret == NULL)
252b5132
RH
1553 return NULL;
1554
1555 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc))
1556 {
e2d34d7d 1557 free (ret);
252b5132
RH
1558 return NULL;
1559 }
1560
1561 return &ret->root;
1562}
1563
1564/* This is a hook for the ELF emulation code in the generic linker to
1565 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1566 entry for a dynamic object. */
252b5132
RH
1567
1568void
217aa764 1569bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1570{
1571 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1572 && bfd_get_format (abfd) == bfd_object)
1573 elf_dt_name (abfd) = name;
1574}
1575
e56f61be
L
1576int
1577bfd_elf_get_dyn_lib_class (bfd *abfd)
1578{
1579 int lib_class;
1580 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1581 && bfd_get_format (abfd) == bfd_object)
1582 lib_class = elf_dyn_lib_class (abfd);
1583 else
1584 lib_class = 0;
1585 return lib_class;
1586}
1587
74816898 1588void
4a43e768 1589bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1590{
1591 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1592 && bfd_get_format (abfd) == bfd_object)
4a43e768 1593 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1594}
1595
252b5132
RH
1596/* Get the list of DT_NEEDED entries for a link. This is a hook for
1597 the linker ELF emulation code. */
1598
1599struct bfd_link_needed_list *
217aa764
AM
1600bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1601 struct bfd_link_info *info)
252b5132 1602{
0eddce27 1603 if (! is_elf_hash_table (info->hash))
252b5132
RH
1604 return NULL;
1605 return elf_hash_table (info)->needed;
1606}
1607
a963dc6a
L
1608/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1609 hook for the linker ELF emulation code. */
1610
1611struct bfd_link_needed_list *
217aa764
AM
1612bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1613 struct bfd_link_info *info)
a963dc6a 1614{
0eddce27 1615 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1616 return NULL;
1617 return elf_hash_table (info)->runpath;
1618}
1619
252b5132
RH
1620/* Get the name actually used for a dynamic object for a link. This
1621 is the SONAME entry if there is one. Otherwise, it is the string
1622 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1623
1624const char *
217aa764 1625bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1626{
1627 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1628 && bfd_get_format (abfd) == bfd_object)
1629 return elf_dt_name (abfd);
1630 return NULL;
1631}
1632
1633/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1634 the ELF linker emulation code. */
1635
b34976b6 1636bfd_boolean
217aa764
AM
1637bfd_elf_get_bfd_needed_list (bfd *abfd,
1638 struct bfd_link_needed_list **pneeded)
252b5132
RH
1639{
1640 asection *s;
1641 bfd_byte *dynbuf = NULL;
1642 int elfsec;
dc810e39 1643 unsigned long shlink;
252b5132
RH
1644 bfd_byte *extdyn, *extdynend;
1645 size_t extdynsize;
217aa764 1646 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1647
1648 *pneeded = NULL;
1649
1650 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1651 || bfd_get_format (abfd) != bfd_object)
b34976b6 1652 return TRUE;
252b5132
RH
1653
1654 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1655 if (s == NULL || s->size == 0)
b34976b6 1656 return TRUE;
252b5132 1657
eea6121a 1658 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1659 goto error_return;
1660
1661 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1662 if (elfsec == -1)
1663 goto error_return;
1664
dc810e39 1665 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1666
1667 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1668 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1669
1670 extdyn = dynbuf;
eea6121a 1671 extdynend = extdyn + s->size;
252b5132
RH
1672 for (; extdyn < extdynend; extdyn += extdynsize)
1673 {
1674 Elf_Internal_Dyn dyn;
1675
217aa764 1676 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1677
1678 if (dyn.d_tag == DT_NULL)
1679 break;
1680
1681 if (dyn.d_tag == DT_NEEDED)
1682 {
1683 const char *string;
1684 struct bfd_link_needed_list *l;
dc810e39
AM
1685 unsigned int tagv = dyn.d_un.d_val;
1686 bfd_size_type amt;
252b5132 1687
dc810e39 1688 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1689 if (string == NULL)
1690 goto error_return;
1691
dc810e39 1692 amt = sizeof *l;
217aa764 1693 l = bfd_alloc (abfd, amt);
252b5132
RH
1694 if (l == NULL)
1695 goto error_return;
1696
1697 l->by = abfd;
1698 l->name = string;
1699 l->next = *pneeded;
1700 *pneeded = l;
1701 }
1702 }
1703
1704 free (dynbuf);
1705
b34976b6 1706 return TRUE;
252b5132
RH
1707
1708 error_return:
1709 if (dynbuf != NULL)
1710 free (dynbuf);
b34976b6 1711 return FALSE;
252b5132
RH
1712}
1713\f
1714/* Allocate an ELF string table--force the first byte to be zero. */
1715
1716struct bfd_strtab_hash *
217aa764 1717_bfd_elf_stringtab_init (void)
252b5132
RH
1718{
1719 struct bfd_strtab_hash *ret;
1720
1721 ret = _bfd_stringtab_init ();
1722 if (ret != NULL)
1723 {
1724 bfd_size_type loc;
1725
b34976b6 1726 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1727 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1728 if (loc == (bfd_size_type) -1)
1729 {
1730 _bfd_stringtab_free (ret);
1731 ret = NULL;
1732 }
1733 }
1734 return ret;
1735}
1736\f
1737/* ELF .o/exec file reading */
1738
c044fabd 1739/* Create a new bfd section from an ELF section header. */
252b5132 1740
b34976b6 1741bfd_boolean
217aa764 1742bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1743{
1744 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1745 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1746 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1747 const char *name;
252b5132 1748
1b3a8575
AM
1749 name = bfd_elf_string_from_elf_section (abfd,
1750 elf_elfheader (abfd)->e_shstrndx,
1751 hdr->sh_name);
933d961a
JJ
1752 if (name == NULL)
1753 return FALSE;
252b5132
RH
1754
1755 switch (hdr->sh_type)
1756 {
1757 case SHT_NULL:
1758 /* Inactive section. Throw it away. */
b34976b6 1759 return TRUE;
252b5132
RH
1760
1761 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1762 case SHT_NOBITS: /* .bss section. */
1763 case SHT_HASH: /* .hash section. */
1764 case SHT_NOTE: /* .note section. */
25e27870
L
1765 case SHT_INIT_ARRAY: /* .init_array section. */
1766 case SHT_FINI_ARRAY: /* .fini_array section. */
1767 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1768 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1769 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1770
797fc050 1771 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1772 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1773 return FALSE;
8e0ed13f
NC
1774 if (hdr->sh_link > elf_numsections (abfd)
1775 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1776 return FALSE;
797fc050
AM
1777 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1778 {
1779 Elf_Internal_Shdr *dynsymhdr;
1780
1781 /* The shared libraries distributed with hpux11 have a bogus
1782 sh_link field for the ".dynamic" section. Find the
1783 string table for the ".dynsym" section instead. */
1784 if (elf_dynsymtab (abfd) != 0)
1785 {
1786 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1787 hdr->sh_link = dynsymhdr->sh_link;
1788 }
1789 else
1790 {
1791 unsigned int i, num_sec;
1792
1793 num_sec = elf_numsections (abfd);
1794 for (i = 1; i < num_sec; i++)
1795 {
1796 dynsymhdr = elf_elfsections (abfd)[i];
1797 if (dynsymhdr->sh_type == SHT_DYNSYM)
1798 {
1799 hdr->sh_link = dynsymhdr->sh_link;
1800 break;
1801 }
1802 }
1803 }
1804 }
1805 break;
1806
252b5132
RH
1807 case SHT_SYMTAB: /* A symbol table */
1808 if (elf_onesymtab (abfd) == shindex)
b34976b6 1809 return TRUE;
252b5132 1810
a50b2160
JJ
1811 if (hdr->sh_entsize != bed->s->sizeof_sym)
1812 return FALSE;
252b5132
RH
1813 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1814 elf_onesymtab (abfd) = shindex;
1815 elf_tdata (abfd)->symtab_hdr = *hdr;
1816 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1817 abfd->flags |= HAS_SYMS;
1818
1819 /* Sometimes a shared object will map in the symbol table. If
1820 SHF_ALLOC is set, and this is a shared object, then we also
1821 treat this section as a BFD section. We can not base the
1822 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1823 set in a relocatable object file, which would confuse the
252b5132
RH
1824 linker. */
1825 if ((hdr->sh_flags & SHF_ALLOC) != 0
1826 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1827 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1828 shindex))
b34976b6 1829 return FALSE;
252b5132 1830
1b3a8575
AM
1831 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1832 can't read symbols without that section loaded as well. It
1833 is most likely specified by the next section header. */
1834 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1835 {
1836 unsigned int i, num_sec;
1837
1838 num_sec = elf_numsections (abfd);
1839 for (i = shindex + 1; i < num_sec; i++)
1840 {
1841 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1842 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1843 && hdr2->sh_link == shindex)
1844 break;
1845 }
1846 if (i == num_sec)
1847 for (i = 1; i < shindex; i++)
1848 {
1849 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1850 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1851 && hdr2->sh_link == shindex)
1852 break;
1853 }
1854 if (i != shindex)
1855 return bfd_section_from_shdr (abfd, i);
1856 }
b34976b6 1857 return TRUE;
252b5132
RH
1858
1859 case SHT_DYNSYM: /* A dynamic symbol table */
1860 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1861 return TRUE;
252b5132 1862
a50b2160
JJ
1863 if (hdr->sh_entsize != bed->s->sizeof_sym)
1864 return FALSE;
252b5132
RH
1865 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1866 elf_dynsymtab (abfd) = shindex;
1867 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1868 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1869 abfd->flags |= HAS_SYMS;
1870
1871 /* Besides being a symbol table, we also treat this as a regular
1872 section, so that objcopy can handle it. */
6dc132d9 1873 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1874
9ad5cbcf
AM
1875 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1876 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1877 return TRUE;
9ad5cbcf 1878
1b3a8575 1879 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1880 elf_symtab_shndx (abfd) = shindex;
1881 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1882 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1883 return TRUE;
9ad5cbcf 1884
252b5132
RH
1885 case SHT_STRTAB: /* A string table */
1886 if (hdr->bfd_section != NULL)
b34976b6 1887 return TRUE;
252b5132
RH
1888 if (ehdr->e_shstrndx == shindex)
1889 {
1890 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1891 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1892 return TRUE;
252b5132 1893 }
1b3a8575
AM
1894 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1895 {
1896 symtab_strtab:
1897 elf_tdata (abfd)->strtab_hdr = *hdr;
1898 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1899 return TRUE;
1900 }
1901 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1902 {
1903 dynsymtab_strtab:
1904 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1905 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1906 elf_elfsections (abfd)[shindex] = hdr;
1907 /* We also treat this as a regular section, so that objcopy
1908 can handle it. */
6dc132d9
L
1909 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1910 shindex);
1b3a8575 1911 }
252b5132 1912
1b3a8575
AM
1913 /* If the string table isn't one of the above, then treat it as a
1914 regular section. We need to scan all the headers to be sure,
1915 just in case this strtab section appeared before the above. */
1916 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1917 {
1918 unsigned int i, num_sec;
252b5132 1919
1b3a8575
AM
1920 num_sec = elf_numsections (abfd);
1921 for (i = 1; i < num_sec; i++)
1922 {
1923 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1924 if (hdr2->sh_link == shindex)
1925 {
933d961a
JJ
1926 /* Prevent endless recursion on broken objects. */
1927 if (i == shindex)
1928 return FALSE;
1b3a8575
AM
1929 if (! bfd_section_from_shdr (abfd, i))
1930 return FALSE;
1931 if (elf_onesymtab (abfd) == i)
1932 goto symtab_strtab;
1933 if (elf_dynsymtab (abfd) == i)
1934 goto dynsymtab_strtab;
1935 }
1936 }
1937 }
6dc132d9 1938 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1939
1940 case SHT_REL:
1941 case SHT_RELA:
1942 /* *These* do a lot of work -- but build no sections! */
1943 {
1944 asection *target_sect;
1945 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1946 unsigned int num_sec = elf_numsections (abfd);
252b5132 1947
aa2ca951
JJ
1948 if (hdr->sh_entsize
1949 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1950 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1951 return FALSE;
1952
03ae5f59 1953 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1954 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1955 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1956 {
1957 ((*_bfd_error_handler)
d003868e
AM
1958 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1959 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1960 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1961 shindex);
03ae5f59
ILT
1962 }
1963
252b5132
RH
1964 /* For some incomprehensible reason Oracle distributes
1965 libraries for Solaris in which some of the objects have
1966 bogus sh_link fields. It would be nice if we could just
1967 reject them, but, unfortunately, some people need to use
1968 them. We scan through the section headers; if we find only
1969 one suitable symbol table, we clobber the sh_link to point
1970 to it. I hope this doesn't break anything. */
1971 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1972 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1973 {
9ad5cbcf 1974 unsigned int scan;
252b5132
RH
1975 int found;
1976
1977 found = 0;
9ad5cbcf 1978 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1979 {
1980 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1981 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1982 {
1983 if (found != 0)
1984 {
1985 found = 0;
1986 break;
1987 }
1988 found = scan;
1989 }
1990 }
1991 if (found != 0)
1992 hdr->sh_link = found;
1993 }
1994
1995 /* Get the symbol table. */
1b3a8575
AM
1996 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1997 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1998 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1999 return FALSE;
252b5132
RH
2000
2001 /* If this reloc section does not use the main symbol table we
2002 don't treat it as a reloc section. BFD can't adequately
2003 represent such a section, so at least for now, we don't
c044fabd 2004 try. We just present it as a normal section. We also
60bcf0fa 2005 can't use it as a reloc section if it points to the null
c044fabd 2006 section. */
60bcf0fa 2007 if (hdr->sh_link != elf_onesymtab (abfd) || hdr->sh_info == SHN_UNDEF)
6dc132d9
L
2008 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2009 shindex);
252b5132 2010
a50b2160
JJ
2011 /* Prevent endless recursion on broken objects. */
2012 if (elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2013 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2014 return FALSE;
252b5132 2015 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2016 return FALSE;
252b5132
RH
2017 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2018 if (target_sect == NULL)
b34976b6 2019 return FALSE;
252b5132
RH
2020
2021 if ((target_sect->flags & SEC_RELOC) == 0
2022 || target_sect->reloc_count == 0)
2023 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2024 else
2025 {
dc810e39 2026 bfd_size_type amt;
252b5132 2027 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2028 amt = sizeof (*hdr2);
217aa764 2029 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2030 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2031 }
2032 *hdr2 = *hdr;
2033 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2034 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2035 target_sect->flags |= SEC_RELOC;
2036 target_sect->relocation = NULL;
2037 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2038 /* In the section to which the relocations apply, mark whether
2039 its relocations are of the REL or RELA variety. */
72730e0c 2040 if (hdr->sh_size != 0)
68bfbfcc 2041 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2042 abfd->flags |= HAS_RELOC;
b34976b6 2043 return TRUE;
252b5132
RH
2044 }
2045 break;
2046
2047 case SHT_GNU_verdef:
2048 elf_dynverdef (abfd) = shindex;
2049 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2050 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2051 break;
2052
2053 case SHT_GNU_versym:
a50b2160
JJ
2054 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2055 return FALSE;
252b5132
RH
2056 elf_dynversym (abfd) = shindex;
2057 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2058 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2059 break;
2060
2061 case SHT_GNU_verneed:
2062 elf_dynverref (abfd) = shindex;
2063 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2064 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2065 break;
2066
2067 case SHT_SHLIB:
b34976b6 2068 return TRUE;
252b5132 2069
dbb410c3 2070 case SHT_GROUP:
b885599b
AM
2071 /* We need a BFD section for objcopy and relocatable linking,
2072 and it's handy to have the signature available as the section
2073 name. */
a50b2160
JJ
2074 if (hdr->sh_entsize != GRP_ENTRY_SIZE)
2075 return FALSE;
b885599b
AM
2076 name = group_signature (abfd, hdr);
2077 if (name == NULL)
b34976b6 2078 return FALSE;
6dc132d9 2079 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2080 return FALSE;
dbb410c3
AM
2081 if (hdr->contents != NULL)
2082 {
2083 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2084 unsigned int n_elt = hdr->sh_size / 4;
2085 asection *s;
2086
b885599b
AM
2087 if (idx->flags & GRP_COMDAT)
2088 hdr->bfd_section->flags
2089 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2090
45c5e9ed
L
2091 /* We try to keep the same section order as it comes in. */
2092 idx += n_elt;
dbb410c3 2093 while (--n_elt != 0)
45c5e9ed 2094 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2095 && elf_next_in_group (s) != NULL)
dbb410c3 2096 {
945906ff 2097 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2098 break;
2099 }
2100 }
2101 break;
2102
252b5132
RH
2103 default:
2104 /* Check for any processor-specific section types. */
6dc132d9
L
2105 return bed->elf_backend_section_from_shdr (abfd, hdr, name,
2106 shindex);
252b5132
RH
2107 }
2108
b34976b6 2109 return TRUE;
252b5132
RH
2110}
2111
ec338859
AM
2112/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2113 Return SEC for sections that have no elf section, and NULL on error. */
2114
2115asection *
217aa764
AM
2116bfd_section_from_r_symndx (bfd *abfd,
2117 struct sym_sec_cache *cache,
2118 asection *sec,
2119 unsigned long r_symndx)
ec338859 2120{
ec338859 2121 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2122 unsigned char esym[sizeof (Elf64_External_Sym)];
2123 Elf_External_Sym_Shndx eshndx;
2124 Elf_Internal_Sym isym;
ec338859
AM
2125 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2126
2127 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2128 return cache->sec[ent];
2129
2130 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2131 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2132 &isym, esym, &eshndx) == NULL)
ec338859 2133 return NULL;
9ad5cbcf 2134
ec338859
AM
2135 if (cache->abfd != abfd)
2136 {
2137 memset (cache->indx, -1, sizeof (cache->indx));
2138 cache->abfd = abfd;
2139 }
2140 cache->indx[ent] = r_symndx;
2141 cache->sec[ent] = sec;
50bc7936
AM
2142 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2143 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2144 {
2145 asection *s;
6cdc0ccc 2146 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2147 if (s != NULL)
2148 cache->sec[ent] = s;
2149 }
2150 return cache->sec[ent];
2151}
2152
252b5132
RH
2153/* Given an ELF section number, retrieve the corresponding BFD
2154 section. */
2155
2156asection *
217aa764 2157bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2158{
9ad5cbcf 2159 if (index >= elf_numsections (abfd))
252b5132
RH
2160 return NULL;
2161 return elf_elfsections (abfd)[index]->bfd_section;
2162}
2163
b35d266b 2164static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2165{
7dcb9820 2166 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7f4d3958
L
2167 { NULL, 0, 0, 0, 0 }
2168};
2169
b35d266b 2170static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2171{
7dcb9820 2172 { ".comment", 8, 0, SHT_PROGBITS, 0 },
7f4d3958
L
2173 { NULL, 0, 0, 0, 0 }
2174};
2175
b35d266b 2176static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2177{
7dcb9820
AM
2178 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2179 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2180 { ".debug", 6, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2181 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2182 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2183 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2184 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2185 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2186 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2187 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
7f4d3958
L
2188 { NULL, 0, 0, 0, 0 }
2189};
2190
b35d266b 2191static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958
L
2192{
2193 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2194 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2195 { NULL, 0, 0, 0, 0 }
2196};
2197
b35d266b 2198static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958
L
2199{
2200 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820 2201 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2202 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2203 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2204 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
7f4d3958
L
2205 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2206 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
2207 { NULL, 0, 0, 0, 0 }
2208};
2209
b35d266b 2210static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958
L
2211{
2212 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2213 { NULL, 0, 0, 0, 0 }
2214};
2215
b35d266b 2216static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958
L
2217{
2218 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2219 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2220 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2221 { NULL, 0, 0, 0, 0 }
2222};
2223
b35d266b 2224static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958
L
2225{
2226 { ".line", 5, 0, SHT_PROGBITS, 0 },
2227 { NULL, 0, 0, 0, 0 }
2228};
2229
b35d266b 2230static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2231{
45c5e9ed 2232 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820 2233 { ".note", 5, -1, SHT_NOTE, 0 },
7f4d3958
L
2234 { NULL, 0, 0, 0, 0 }
2235};
2236
b35d266b 2237static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958
L
2238{
2239 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2240 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2241 { NULL, 0, 0, 0, 0 }
2242};
2243
b35d266b 2244static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958
L
2245{
2246 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2247 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
7dcb9820
AM
2248 { ".rela", 5, -1, SHT_RELA, 0 },
2249 { ".rel", 4, -1, SHT_REL, 0 },
7f4d3958
L
2250 { NULL, 0, 0, 0, 0 }
2251};
2252
b35d266b 2253static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958
L
2254{
2255 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2256 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2257 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
7dcb9820
AM
2258 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2259 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2260};
2261
b35d266b 2262static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958
L
2263{
2264 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2265 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2266 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2267 { NULL, 0, 0, 0, 0 }
2268};
2269
b35d266b 2270static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2271{
7f4d3958
L
2272 special_sections_b, /* 'b' */
2273 special_sections_c, /* 'b' */
2274 special_sections_d, /* 'd' */
2275 NULL, /* 'e' */
2276 special_sections_f, /* 'f' */
2277 special_sections_g, /* 'g' */
2278 special_sections_h, /* 'h' */
2279 special_sections_i, /* 'i' */
2280 NULL, /* 'j' */
2281 NULL, /* 'k' */
2282 special_sections_l, /* 'l' */
2283 NULL, /* 'm' */
2284 special_sections_n, /* 'n' */
2285 NULL, /* 'o' */
2286 special_sections_p, /* 'p' */
2287 NULL, /* 'q' */
2288 special_sections_r, /* 'r' */
2289 special_sections_s, /* 's' */
2290 special_sections_t, /* 't' */
7f4d3958
L
2291};
2292
551b43fd
AM
2293const struct bfd_elf_special_section *
2294_bfd_elf_get_special_section (const char *name,
2295 const struct bfd_elf_special_section *spec,
2296 unsigned int rela)
2f89ff8d
L
2297{
2298 int i;
7f4d3958 2299 int len;
7f4d3958 2300
551b43fd 2301 len = strlen (name);
7f4d3958 2302
551b43fd 2303 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2304 {
2305 int suffix_len;
551b43fd 2306 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2307
2308 if (len < prefix_len)
2309 continue;
551b43fd 2310 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2311 continue;
2312
551b43fd 2313 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2314 if (suffix_len <= 0)
2315 {
2316 if (name[prefix_len] != 0)
2317 {
2318 if (suffix_len == 0)
2319 continue;
2320 if (name[prefix_len] != '.'
2321 && (suffix_len == -2
551b43fd 2322 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2323 continue;
2324 }
2325 }
2326 else
2327 {
2328 if (len < prefix_len + suffix_len)
2329 continue;
2330 if (memcmp (name + len - suffix_len,
551b43fd 2331 spec[i].prefix + prefix_len,
7dcb9820
AM
2332 suffix_len) != 0)
2333 continue;
2334 }
551b43fd 2335 return &spec[i];
7dcb9820 2336 }
2f89ff8d
L
2337
2338 return NULL;
2339}
2340
7dcb9820 2341const struct bfd_elf_special_section *
29ef7005 2342_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2343{
551b43fd
AM
2344 int i;
2345 const struct bfd_elf_special_section *spec;
29ef7005 2346 const struct elf_backend_data *bed;
2f89ff8d
L
2347
2348 /* See if this is one of the special sections. */
551b43fd
AM
2349 if (sec->name == NULL)
2350 return NULL;
2f89ff8d 2351
29ef7005
L
2352 bed = get_elf_backend_data (abfd);
2353 spec = bed->special_sections;
2354 if (spec)
2355 {
2356 spec = _bfd_elf_get_special_section (sec->name,
2357 bed->special_sections,
2358 sec->use_rela_p);
2359 if (spec != NULL)
2360 return spec;
2361 }
2362
551b43fd
AM
2363 if (sec->name[0] != '.')
2364 return NULL;
2f89ff8d 2365
551b43fd
AM
2366 i = sec->name[1] - 'b';
2367 if (i < 0 || i > 't' - 'b')
2368 return NULL;
2369
2370 spec = special_sections[i];
2f89ff8d 2371
551b43fd
AM
2372 if (spec == NULL)
2373 return NULL;
2374
2375 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2376}
2377
b34976b6 2378bfd_boolean
217aa764 2379_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2380{
2381 struct bfd_elf_section_data *sdata;
551b43fd 2382 const struct elf_backend_data *bed;
7dcb9820 2383 const struct bfd_elf_special_section *ssect;
252b5132 2384
f0abc2a1
AM
2385 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2386 if (sdata == NULL)
2387 {
217aa764 2388 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2389 if (sdata == NULL)
2390 return FALSE;
217aa764 2391 sec->used_by_bfd = sdata;
f0abc2a1 2392 }
bf572ba0 2393
551b43fd
AM
2394 /* Indicate whether or not this section should use RELA relocations. */
2395 bed = get_elf_backend_data (abfd);
2396 sec->use_rela_p = bed->default_use_rela_p;
2397
3496cb2a
L
2398 /* When we read a file, we don't need section type and flags unless
2399 it is a linker created section. They will be overridden in
2400 _bfd_elf_make_section_from_shdr anyway. */
2401 if (abfd->direction != read_direction
2402 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2403 {
551b43fd 2404 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2405 if (ssect != NULL)
2406 {
2407 elf_section_type (sec) = ssect->type;
2408 elf_section_flags (sec) = ssect->attr;
2409 }
2f89ff8d
L
2410 }
2411
b34976b6 2412 return TRUE;
252b5132
RH
2413}
2414
2415/* Create a new bfd section from an ELF program header.
2416
2417 Since program segments have no names, we generate a synthetic name
2418 of the form segment<NUM>, where NUM is generally the index in the
2419 program header table. For segments that are split (see below) we
2420 generate the names segment<NUM>a and segment<NUM>b.
2421
2422 Note that some program segments may have a file size that is different than
2423 (less than) the memory size. All this means is that at execution the
2424 system must allocate the amount of memory specified by the memory size,
2425 but only initialize it with the first "file size" bytes read from the
2426 file. This would occur for example, with program segments consisting
2427 of combined data+bss.
2428
2429 To handle the above situation, this routine generates TWO bfd sections
2430 for the single program segment. The first has the length specified by
2431 the file size of the segment, and the second has the length specified
2432 by the difference between the two sizes. In effect, the segment is split
2433 into it's initialized and uninitialized parts.
2434
2435 */
2436
b34976b6 2437bfd_boolean
217aa764
AM
2438_bfd_elf_make_section_from_phdr (bfd *abfd,
2439 Elf_Internal_Phdr *hdr,
2440 int index,
2441 const char *typename)
252b5132
RH
2442{
2443 asection *newsect;
2444 char *name;
2445 char namebuf[64];
d4c88bbb 2446 size_t len;
252b5132
RH
2447 int split;
2448
2449 split = ((hdr->p_memsz > 0)
2450 && (hdr->p_filesz > 0)
2451 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2452 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2453 len = strlen (namebuf) + 1;
217aa764 2454 name = bfd_alloc (abfd, len);
252b5132 2455 if (!name)
b34976b6 2456 return FALSE;
d4c88bbb 2457 memcpy (name, namebuf, len);
252b5132
RH
2458 newsect = bfd_make_section (abfd, name);
2459 if (newsect == NULL)
b34976b6 2460 return FALSE;
252b5132
RH
2461 newsect->vma = hdr->p_vaddr;
2462 newsect->lma = hdr->p_paddr;
eea6121a 2463 newsect->size = hdr->p_filesz;
252b5132
RH
2464 newsect->filepos = hdr->p_offset;
2465 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2466 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2467 if (hdr->p_type == PT_LOAD)
2468 {
2469 newsect->flags |= SEC_ALLOC;
2470 newsect->flags |= SEC_LOAD;
2471 if (hdr->p_flags & PF_X)
2472 {
2473 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2474 may be data. */
252b5132
RH
2475 newsect->flags |= SEC_CODE;
2476 }
2477 }
2478 if (!(hdr->p_flags & PF_W))
2479 {
2480 newsect->flags |= SEC_READONLY;
2481 }
2482
2483 if (split)
2484 {
27ac83bf 2485 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2486 len = strlen (namebuf) + 1;
217aa764 2487 name = bfd_alloc (abfd, len);
252b5132 2488 if (!name)
b34976b6 2489 return FALSE;
d4c88bbb 2490 memcpy (name, namebuf, len);
252b5132
RH
2491 newsect = bfd_make_section (abfd, name);
2492 if (newsect == NULL)
b34976b6 2493 return FALSE;
252b5132
RH
2494 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2495 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2496 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2497 if (hdr->p_type == PT_LOAD)
2498 {
2499 newsect->flags |= SEC_ALLOC;
2500 if (hdr->p_flags & PF_X)
2501 newsect->flags |= SEC_CODE;
2502 }
2503 if (!(hdr->p_flags & PF_W))
2504 newsect->flags |= SEC_READONLY;
2505 }
2506
b34976b6 2507 return TRUE;
252b5132
RH
2508}
2509
b34976b6 2510bfd_boolean
217aa764 2511bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2512{
9c5bfbb7 2513 const struct elf_backend_data *bed;
20cfcaae
NC
2514
2515 switch (hdr->p_type)
2516 {
2517 case PT_NULL:
2518 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2519
2520 case PT_LOAD:
2521 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2522
2523 case PT_DYNAMIC:
2524 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2525
2526 case PT_INTERP:
2527 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2528
2529 case PT_NOTE:
2530 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2531 return FALSE;
217aa764 2532 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2533 return FALSE;
2534 return TRUE;
20cfcaae
NC
2535
2536 case PT_SHLIB:
2537 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2538
2539 case PT_PHDR:
2540 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2541
811072d8
RM
2542 case PT_GNU_EH_FRAME:
2543 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2544 "eh_frame_hdr");
2545
9ee5e499
JJ
2546 case PT_GNU_STACK:
2547 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2548
8c37241b
JJ
2549 case PT_GNU_RELRO:
2550 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2551
20cfcaae 2552 default:
8c1acd09 2553 /* Check for any processor-specific program segment types. */
20cfcaae 2554 bed = get_elf_backend_data (abfd);
d27f5fa1 2555 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2556 }
2557}
2558
23bc299b 2559/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2560 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2561 relocations; otherwise, we use REL relocations. */
2562
b34976b6 2563bfd_boolean
217aa764
AM
2564_bfd_elf_init_reloc_shdr (bfd *abfd,
2565 Elf_Internal_Shdr *rel_hdr,
2566 asection *asect,
2567 bfd_boolean use_rela_p)
23bc299b
MM
2568{
2569 char *name;
9c5bfbb7 2570 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2571 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2572
dc810e39 2573 name = bfd_alloc (abfd, amt);
23bc299b 2574 if (name == NULL)
b34976b6 2575 return FALSE;
23bc299b
MM
2576 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2577 rel_hdr->sh_name =
2b0f7ef9 2578 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2579 FALSE);
23bc299b 2580 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2581 return FALSE;
23bc299b
MM
2582 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2583 rel_hdr->sh_entsize = (use_rela_p
2584 ? bed->s->sizeof_rela
2585 : bed->s->sizeof_rel);
45d6a902 2586 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2587 rel_hdr->sh_flags = 0;
2588 rel_hdr->sh_addr = 0;
2589 rel_hdr->sh_size = 0;
2590 rel_hdr->sh_offset = 0;
2591
b34976b6 2592 return TRUE;
23bc299b
MM
2593}
2594
252b5132
RH
2595/* Set up an ELF internal section header for a section. */
2596
252b5132 2597static void
217aa764 2598elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2599{
9c5bfbb7 2600 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2601 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2602 Elf_Internal_Shdr *this_hdr;
2603
2604 if (*failedptr)
2605 {
2606 /* We already failed; just get out of the bfd_map_over_sections
2607 loop. */
2608 return;
2609 }
2610
2611 this_hdr = &elf_section_data (asect)->this_hdr;
2612
e57b5356
AM
2613 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2614 asect->name, FALSE);
2615 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2616 {
b34976b6 2617 *failedptr = TRUE;
252b5132
RH
2618 return;
2619 }
2620
2621 this_hdr->sh_flags = 0;
2622
2623 if ((asect->flags & SEC_ALLOC) != 0
2624 || asect->user_set_vma)
2625 this_hdr->sh_addr = asect->vma;
2626 else
2627 this_hdr->sh_addr = 0;
2628
2629 this_hdr->sh_offset = 0;
eea6121a 2630 this_hdr->sh_size = asect->size;
252b5132
RH
2631 this_hdr->sh_link = 0;
2632 this_hdr->sh_addralign = 1 << asect->alignment_power;
2633 /* The sh_entsize and sh_info fields may have been set already by
2634 copy_private_section_data. */
2635
2636 this_hdr->bfd_section = asect;
2637 this_hdr->contents = NULL;
2638
3cddba1e
L
2639 /* If the section type is unspecified, we set it based on
2640 asect->flags. */
2641 if (this_hdr->sh_type == SHT_NULL)
2642 {
45c5e9ed
L
2643 if ((asect->flags & SEC_GROUP) != 0)
2644 {
2645 /* We also need to mark SHF_GROUP here for relocatable
2646 link. */
2647 struct bfd_link_order *l;
2648 asection *elt;
2649
8423293d 2650 for (l = asect->map_head.link_order; l != NULL; l = l->next)
45c5e9ed
L
2651 if (l->type == bfd_indirect_link_order
2652 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
2653 do
2654 {
2655 /* The name is not important. Anything will do. */
2656 elf_group_name (elt->output_section) = "G";
2657 elf_section_flags (elt->output_section) |= SHF_GROUP;
2658
2659 elt = elf_next_in_group (elt);
2660 /* During a relocatable link, the lists are
2661 circular. */
2662 }
2663 while (elt != elf_next_in_group (l->u.indirect.section));
2664
2665 this_hdr->sh_type = SHT_GROUP;
2666 }
2667 else if ((asect->flags & SEC_ALLOC) != 0
3cddba1e
L
2668 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2669 || (asect->flags & SEC_NEVER_LOAD) != 0))
2670 this_hdr->sh_type = SHT_NOBITS;
2671 else
2672 this_hdr->sh_type = SHT_PROGBITS;
2673 }
2674
2f89ff8d 2675 switch (this_hdr->sh_type)
252b5132 2676 {
2f89ff8d 2677 default:
2f89ff8d
L
2678 break;
2679
2680 case SHT_STRTAB:
2681 case SHT_INIT_ARRAY:
2682 case SHT_FINI_ARRAY:
2683 case SHT_PREINIT_ARRAY:
2684 case SHT_NOTE:
2685 case SHT_NOBITS:
2686 case SHT_PROGBITS:
2687 break;
2688
2689 case SHT_HASH:
c7ac6ff8 2690 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2691 break;
5de3bf90 2692
2f89ff8d 2693 case SHT_DYNSYM:
252b5132 2694 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2695 break;
2696
2697 case SHT_DYNAMIC:
252b5132 2698 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2699 break;
2700
2701 case SHT_RELA:
2702 if (get_elf_backend_data (abfd)->may_use_rela_p)
2703 this_hdr->sh_entsize = bed->s->sizeof_rela;
2704 break;
2705
2706 case SHT_REL:
2707 if (get_elf_backend_data (abfd)->may_use_rel_p)
2708 this_hdr->sh_entsize = bed->s->sizeof_rel;
2709 break;
2710
2711 case SHT_GNU_versym:
252b5132 2712 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2713 break;
2714
2715 case SHT_GNU_verdef:
252b5132
RH
2716 this_hdr->sh_entsize = 0;
2717 /* objcopy or strip will copy over sh_info, but may not set
2718 cverdefs. The linker will set cverdefs, but sh_info will be
2719 zero. */
2720 if (this_hdr->sh_info == 0)
2721 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2722 else
2723 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2724 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2725 break;
2726
2727 case SHT_GNU_verneed:
252b5132
RH
2728 this_hdr->sh_entsize = 0;
2729 /* objcopy or strip will copy over sh_info, but may not set
2730 cverrefs. The linker will set cverrefs, but sh_info will be
2731 zero. */
2732 if (this_hdr->sh_info == 0)
2733 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2734 else
2735 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2736 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2737 break;
2738
2739 case SHT_GROUP:
dbb410c3 2740 this_hdr->sh_entsize = 4;
2f89ff8d 2741 break;
dbb410c3 2742 }
252b5132
RH
2743
2744 if ((asect->flags & SEC_ALLOC) != 0)
2745 this_hdr->sh_flags |= SHF_ALLOC;
2746 if ((asect->flags & SEC_READONLY) == 0)
2747 this_hdr->sh_flags |= SHF_WRITE;
2748 if ((asect->flags & SEC_CODE) != 0)
2749 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2750 if ((asect->flags & SEC_MERGE) != 0)
2751 {
2752 this_hdr->sh_flags |= SHF_MERGE;
2753 this_hdr->sh_entsize = asect->entsize;
2754 if ((asect->flags & SEC_STRINGS) != 0)
2755 this_hdr->sh_flags |= SHF_STRINGS;
2756 }
1126897b 2757 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2758 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2759 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2760 {
2761 this_hdr->sh_flags |= SHF_TLS;
eea6121a 2762 if (asect->size == 0 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60
JJ
2763 {
2764 struct bfd_link_order *o;
b34976b6 2765
704afa60 2766 this_hdr->sh_size = 0;
8423293d 2767 for (o = asect->map_head.link_order; o != NULL; o = o->next)
704afa60
JJ
2768 if (this_hdr->sh_size < o->offset + o->size)
2769 this_hdr->sh_size = o->offset + o->size;
2770 if (this_hdr->sh_size)
2771 this_hdr->sh_type = SHT_NOBITS;
2772 }
2773 }
252b5132
RH
2774
2775 /* Check for processor-specific section types. */
e1fddb6b
AO
2776 if (bed->elf_backend_fake_sections
2777 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2778 *failedptr = TRUE;
252b5132
RH
2779
2780 /* If the section has relocs, set up a section header for the
23bc299b
MM
2781 SHT_REL[A] section. If two relocation sections are required for
2782 this section, it is up to the processor-specific back-end to
c044fabd 2783 create the other. */
23bc299b 2784 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2785 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2786 &elf_section_data (asect)->rel_hdr,
c044fabd 2787 asect,
68bfbfcc 2788 asect->use_rela_p))
b34976b6 2789 *failedptr = TRUE;
252b5132
RH
2790}
2791
dbb410c3
AM
2792/* Fill in the contents of a SHT_GROUP section. */
2793
1126897b 2794void
217aa764 2795bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2796{
217aa764 2797 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2798 unsigned long symindx;
9dce4196 2799 asection *elt, *first;
dbb410c3
AM
2800 unsigned char *loc;
2801 struct bfd_link_order *l;
b34976b6 2802 bfd_boolean gas;
dbb410c3 2803
7e4111ad
L
2804 /* Ignore linker created group section. See elfNN_ia64_object_p in
2805 elfxx-ia64.c. */
2806 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2807 || *failedptr)
2808 return;
2809
1126897b
AM
2810 symindx = 0;
2811 if (elf_group_id (sec) != NULL)
2812 symindx = elf_group_id (sec)->udata.i;
2813
2814 if (symindx == 0)
2815 {
2816 /* If called from the assembler, swap_out_syms will have set up
2817 elf_section_syms; If called for "ld -r", use target_index. */
2818 if (elf_section_syms (abfd) != NULL)
2819 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2820 else
2821 symindx = sec->target_index;
2822 }
dbb410c3
AM
2823 elf_section_data (sec)->this_hdr.sh_info = symindx;
2824
1126897b 2825 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2826 gas = TRUE;
dbb410c3
AM
2827 if (sec->contents == NULL)
2828 {
b34976b6 2829 gas = FALSE;
eea6121a 2830 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2831
2832 /* Arrange for the section to be written out. */
2833 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2834 if (sec->contents == NULL)
2835 {
b34976b6 2836 *failedptr = TRUE;
dbb410c3
AM
2837 return;
2838 }
2839 }
2840
eea6121a 2841 loc = sec->contents + sec->size;
dbb410c3 2842
9dce4196
AM
2843 /* Get the pointer to the first section in the group that gas
2844 squirreled away here. objcopy arranges for this to be set to the
2845 start of the input section group. */
2846 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2847
2848 /* First element is a flag word. Rest of section is elf section
2849 indices for all the sections of the group. Write them backwards
2850 just to keep the group in the same order as given in .section
2851 directives, not that it matters. */
2852 while (elt != NULL)
2853 {
9dce4196
AM
2854 asection *s;
2855 unsigned int idx;
2856
dbb410c3 2857 loc -= 4;
9dce4196
AM
2858 s = elt;
2859 if (!gas)
2860 s = s->output_section;
2861 idx = 0;
2862 if (s != NULL)
2863 idx = elf_section_data (s)->this_idx;
2864 H_PUT_32 (abfd, idx, loc);
945906ff 2865 elt = elf_next_in_group (elt);
9dce4196
AM
2866 if (elt == first)
2867 break;
dbb410c3
AM
2868 }
2869
2870 /* If this is a relocatable link, then the above did nothing because
2871 SEC is the output section. Look through the input sections
2872 instead. */
8423293d 2873 for (l = sec->map_head.link_order; l != NULL; l = l->next)
dbb410c3 2874 if (l->type == bfd_indirect_link_order
945906ff 2875 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
dbb410c3
AM
2876 do
2877 {
2878 loc -= 4;
2879 H_PUT_32 (abfd,
2880 elf_section_data (elt->output_section)->this_idx, loc);
945906ff 2881 elt = elf_next_in_group (elt);
dbb410c3
AM
2882 /* During a relocatable link, the lists are circular. */
2883 }
945906ff 2884 while (elt != elf_next_in_group (l->u.indirect.section));
dbb410c3 2885
3d7f7666 2886 if ((loc -= 4) != sec->contents)
9dce4196 2887 abort ();
dbb410c3 2888
9dce4196 2889 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2890}
2891
252b5132
RH
2892/* Assign all ELF section numbers. The dummy first section is handled here
2893 too. The link/info pointers for the standard section types are filled
2894 in here too, while we're at it. */
2895
b34976b6 2896static bfd_boolean
da9f89d4 2897assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2898{
2899 struct elf_obj_tdata *t = elf_tdata (abfd);
2900 asection *sec;
2b0f7ef9 2901 unsigned int section_number, secn;
252b5132 2902 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2903 struct bfd_elf_section_data *d;
252b5132
RH
2904
2905 section_number = 1;
2906
2b0f7ef9
JJ
2907 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2908
da9f89d4
L
2909 /* SHT_GROUP sections are in relocatable files only. */
2910 if (link_info == NULL || link_info->relocatable)
252b5132 2911 {
da9f89d4 2912 /* Put SHT_GROUP sections first. */
04dd1667 2913 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2914 {
5daa8fe7 2915 d = elf_section_data (sec);
da9f89d4
L
2916
2917 if (d->this_hdr.sh_type == SHT_GROUP)
2918 {
5daa8fe7 2919 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2920 {
2921 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2922 bfd_section_list_remove (abfd, sec);
da9f89d4 2923 abfd->section_count--;
da9f89d4
L
2924 }
2925 else
2926 {
2927 if (section_number == SHN_LORESERVE)
2928 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2929 d->this_idx = section_number++;
2930 }
2931 }
47cc2cf5
PB
2932 }
2933 }
2934
2935 for (sec = abfd->sections; sec; sec = sec->next)
2936 {
2937 d = elf_section_data (sec);
2938
2939 if (d->this_hdr.sh_type != SHT_GROUP)
2940 {
2941 if (section_number == SHN_LORESERVE)
2942 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2943 d->this_idx = section_number++;
2944 }
2b0f7ef9 2945 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2946 if ((sec->flags & SEC_RELOC) == 0)
2947 d->rel_idx = 0;
2948 else
2b0f7ef9 2949 {
9ad5cbcf
AM
2950 if (section_number == SHN_LORESERVE)
2951 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2952 d->rel_idx = section_number++;
2953 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2954 }
23bc299b
MM
2955
2956 if (d->rel_hdr2)
2b0f7ef9 2957 {
9ad5cbcf
AM
2958 if (section_number == SHN_LORESERVE)
2959 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2960 d->rel_idx2 = section_number++;
2961 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2962 }
23bc299b
MM
2963 else
2964 d->rel_idx2 = 0;
252b5132
RH
2965 }
2966
9ad5cbcf
AM
2967 if (section_number == SHN_LORESERVE)
2968 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2969 t->shstrtab_section = section_number++;
2b0f7ef9 2970 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2971 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2972
2973 if (bfd_get_symcount (abfd) > 0)
2974 {
9ad5cbcf
AM
2975 if (section_number == SHN_LORESERVE)
2976 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2977 t->symtab_section = section_number++;
2b0f7ef9 2978 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2979 if (section_number > SHN_LORESERVE - 2)
2980 {
2981 if (section_number == SHN_LORESERVE)
2982 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2983 t->symtab_shndx_section = section_number++;
2984 t->symtab_shndx_hdr.sh_name
2985 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2986 ".symtab_shndx", FALSE);
9ad5cbcf 2987 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2988 return FALSE;
9ad5cbcf
AM
2989 }
2990 if (section_number == SHN_LORESERVE)
2991 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2992 t->strtab_section = section_number++;
2b0f7ef9 2993 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2994 }
2995
2b0f7ef9
JJ
2996 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2997 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2998
2999 elf_numsections (abfd) = section_number;
252b5132 3000 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
3001 if (section_number > SHN_LORESERVE)
3002 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
3003
3004 /* Set up the list of section header pointers, in agreement with the
3005 indices. */
d0fb9a8d 3006 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 3007 if (i_shdrp == NULL)
b34976b6 3008 return FALSE;
252b5132 3009
d0fb9a8d 3010 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
3011 if (i_shdrp[0] == NULL)
3012 {
3013 bfd_release (abfd, i_shdrp);
b34976b6 3014 return FALSE;
252b5132 3015 }
252b5132
RH
3016
3017 elf_elfsections (abfd) = i_shdrp;
3018
3019 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3020 if (bfd_get_symcount (abfd) > 0)
3021 {
3022 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3023 if (elf_numsections (abfd) > SHN_LORESERVE)
3024 {
3025 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3026 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3027 }
252b5132
RH
3028 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3029 t->symtab_hdr.sh_link = t->strtab_section;
3030 }
38ce5b11 3031
252b5132
RH
3032 for (sec = abfd->sections; sec; sec = sec->next)
3033 {
3034 struct bfd_elf_section_data *d = elf_section_data (sec);
3035 asection *s;
3036 const char *name;
3037
3038 i_shdrp[d->this_idx] = &d->this_hdr;
3039 if (d->rel_idx != 0)
3040 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3041 if (d->rel_idx2 != 0)
3042 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3043
3044 /* Fill in the sh_link and sh_info fields while we're at it. */
3045
3046 /* sh_link of a reloc section is the section index of the symbol
3047 table. sh_info is the section index of the section to which
3048 the relocation entries apply. */
3049 if (d->rel_idx != 0)
3050 {
3051 d->rel_hdr.sh_link = t->symtab_section;
3052 d->rel_hdr.sh_info = d->this_idx;
3053 }
23bc299b
MM
3054 if (d->rel_idx2 != 0)
3055 {
3056 d->rel_hdr2->sh_link = t->symtab_section;
3057 d->rel_hdr2->sh_info = d->this_idx;
3058 }
252b5132 3059
38ce5b11
L
3060 /* We need to set up sh_link for SHF_LINK_ORDER. */
3061 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3062 {
3063 s = elf_linked_to_section (sec);
3064 if (s)
3065 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3066 else
3067 {
3068 struct bfd_link_order *p;
3069
3070 /* Find out what the corresponding section in output
3071 is. */
8423293d 3072 for (p = sec->map_head.link_order; p != NULL; p = p->next)
38ce5b11
L
3073 {
3074 s = p->u.indirect.section;
3075 if (p->type == bfd_indirect_link_order
3076 && (bfd_get_flavour (s->owner)
3077 == bfd_target_elf_flavour))
3078 {
3079 Elf_Internal_Shdr ** const elf_shdrp
3080 = elf_elfsections (s->owner);
3081 int elfsec
3082 = _bfd_elf_section_from_bfd_section (s->owner, s);
3083 elfsec = elf_shdrp[elfsec]->sh_link;
185d09ad
L
3084 /* PR 290:
3085 The Intel C compiler generates SHT_IA_64_UNWIND with
ff01938b 3086 SHF_LINK_ORDER. But it doesn't set the sh_link or
185d09ad
L
3087 sh_info fields. Hence we could get the situation
3088 where elfsec is 0. */
3089 if (elfsec == 0)
3090 {
3091 const struct elf_backend_data *bed
3092 = get_elf_backend_data (abfd);
3093 if (bed->link_order_error_handler)
d003868e 3094 bed->link_order_error_handler
28b13744 3095 (_("%B: warning: sh_link not set for section `%A'"),
d003868e 3096 abfd, s);
185d09ad
L
3097 }
3098 else
3099 {
01b3c8ab
L
3100 s = elf_shdrp[elfsec]->bfd_section;
3101 if (elf_discarded_section (s))
3102 {
3103 asection *kept;
3104 (*_bfd_error_handler)
3105 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3106 abfd, d->this_hdr.bfd_section,
3107 s, s->owner);
3108 /* Point to the kept section if it has
3109 the same size as the discarded
3110 one. */
3111 kept = _bfd_elf_check_kept_section (s);
3112 if (kept == NULL)
3113 {
3114 bfd_set_error (bfd_error_bad_value);
3115 return FALSE;
3116 }
2796fd96 3117 s = kept;
01b3c8ab
L
3118 }
3119 s = s->output_section;
185d09ad
L
3120 BFD_ASSERT (s != NULL);
3121 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3122 }
38ce5b11
L
3123 break;
3124 }
3125 }
3126 }
3127 }
3128
252b5132
RH
3129 switch (d->this_hdr.sh_type)
3130 {
3131 case SHT_REL:
3132 case SHT_RELA:
3133 /* A reloc section which we are treating as a normal BFD
3134 section. sh_link is the section index of the symbol
3135 table. sh_info is the section index of the section to
3136 which the relocation entries apply. We assume that an
3137 allocated reloc section uses the dynamic symbol table.
3138 FIXME: How can we be sure? */
3139 s = bfd_get_section_by_name (abfd, ".dynsym");
3140 if (s != NULL)
3141 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3142
3143 /* We look up the section the relocs apply to by name. */
3144 name = sec->name;
3145 if (d->this_hdr.sh_type == SHT_REL)
3146 name += 4;
3147 else
3148 name += 5;
3149 s = bfd_get_section_by_name (abfd, name);
3150 if (s != NULL)
3151 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3152 break;
3153
3154 case SHT_STRTAB:
3155 /* We assume that a section named .stab*str is a stabs
3156 string section. We look for a section with the same name
3157 but without the trailing ``str'', and set its sh_link
3158 field to point to this section. */
3159 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
3160 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3161 {
3162 size_t len;
3163 char *alc;
3164
3165 len = strlen (sec->name);
217aa764 3166 alc = bfd_malloc (len - 2);
252b5132 3167 if (alc == NULL)
b34976b6 3168 return FALSE;
d4c88bbb 3169 memcpy (alc, sec->name, len - 3);
252b5132
RH
3170 alc[len - 3] = '\0';
3171 s = bfd_get_section_by_name (abfd, alc);
3172 free (alc);
3173 if (s != NULL)
3174 {
3175 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3176
3177 /* This is a .stab section. */
0594c12d
AM
3178 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3179 elf_section_data (s)->this_hdr.sh_entsize
3180 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3181 }
3182 }
3183 break;
3184
3185 case SHT_DYNAMIC:
3186 case SHT_DYNSYM:
3187 case SHT_GNU_verneed:
3188 case SHT_GNU_verdef:
3189 /* sh_link is the section header index of the string table
3190 used for the dynamic entries, or the symbol table, or the
3191 version strings. */
3192 s = bfd_get_section_by_name (abfd, ".dynstr");
3193 if (s != NULL)
3194 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3195 break;
3196
7f1204bb
JJ
3197 case SHT_GNU_LIBLIST:
3198 /* sh_link is the section header index of the prelink library
3199 list
3200 used for the dynamic entries, or the symbol table, or the
3201 version strings. */
3202 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3203 ? ".dynstr" : ".gnu.libstr");
3204 if (s != NULL)
3205 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3206 break;
3207
252b5132
RH
3208 case SHT_HASH:
3209 case SHT_GNU_versym:
3210 /* sh_link is the section header index of the symbol table
3211 this hash table or version table is for. */
3212 s = bfd_get_section_by_name (abfd, ".dynsym");
3213 if (s != NULL)
3214 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3215 break;
dbb410c3
AM
3216
3217 case SHT_GROUP:
3218 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3219 }
3220 }
3221
2b0f7ef9 3222 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3223 if (i_shdrp[secn] == NULL)
3224 i_shdrp[secn] = i_shdrp[0];
3225 else
3226 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3227 i_shdrp[secn]->sh_name);
b34976b6 3228 return TRUE;
252b5132
RH
3229}
3230
3231/* Map symbol from it's internal number to the external number, moving
3232 all local symbols to be at the head of the list. */
3233
268b6b39 3234static int
217aa764 3235sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3236{
3237 /* If the backend has a special mapping, use it. */
9c5bfbb7 3238 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3239 if (bed->elf_backend_sym_is_global)
3240 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3241
3242 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3243 || bfd_is_und_section (bfd_get_section (sym))
3244 || bfd_is_com_section (bfd_get_section (sym)));
3245}
3246
b34976b6 3247static bfd_boolean
217aa764 3248elf_map_symbols (bfd *abfd)
252b5132 3249{
dc810e39 3250 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3251 asymbol **syms = bfd_get_outsymbols (abfd);
3252 asymbol **sect_syms;
dc810e39
AM
3253 unsigned int num_locals = 0;
3254 unsigned int num_globals = 0;
3255 unsigned int num_locals2 = 0;
3256 unsigned int num_globals2 = 0;
252b5132 3257 int max_index = 0;
dc810e39 3258 unsigned int idx;
252b5132
RH
3259 asection *asect;
3260 asymbol **new_syms;
252b5132
RH
3261
3262#ifdef DEBUG
3263 fprintf (stderr, "elf_map_symbols\n");
3264 fflush (stderr);
3265#endif
3266
252b5132
RH
3267 for (asect = abfd->sections; asect; asect = asect->next)
3268 {
3269 if (max_index < asect->index)
3270 max_index = asect->index;
3271 }
3272
3273 max_index++;
d0fb9a8d 3274 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3275 if (sect_syms == NULL)
b34976b6 3276 return FALSE;
252b5132 3277 elf_section_syms (abfd) = sect_syms;
4e89ac30 3278 elf_num_section_syms (abfd) = max_index;
252b5132 3279
079e9a2f
AM
3280 /* Init sect_syms entries for any section symbols we have already
3281 decided to output. */
252b5132
RH
3282 for (idx = 0; idx < symcount; idx++)
3283 {
dc810e39 3284 asymbol *sym = syms[idx];
c044fabd 3285
252b5132
RH
3286 if ((sym->flags & BSF_SECTION_SYM) != 0
3287 && sym->value == 0)
3288 {
3289 asection *sec;
3290
3291 sec = sym->section;
3292
3293 if (sec->owner != NULL)
3294 {
3295 if (sec->owner != abfd)
3296 {
3297 if (sec->output_offset != 0)
3298 continue;
c044fabd 3299
252b5132
RH
3300 sec = sec->output_section;
3301
079e9a2f
AM
3302 /* Empty sections in the input files may have had a
3303 section symbol created for them. (See the comment
3304 near the end of _bfd_generic_link_output_symbols in
3305 linker.c). If the linker script discards such
3306 sections then we will reach this point. Since we know
3307 that we cannot avoid this case, we detect it and skip
3308 the abort and the assignment to the sect_syms array.
3309 To reproduce this particular case try running the
3310 linker testsuite test ld-scripts/weak.exp for an ELF
3311 port that uses the generic linker. */
252b5132
RH
3312 if (sec->owner == NULL)
3313 continue;
3314
3315 BFD_ASSERT (sec->owner == abfd);
3316 }
3317 sect_syms[sec->index] = syms[idx];
3318 }
3319 }
3320 }
3321
252b5132
RH
3322 /* Classify all of the symbols. */
3323 for (idx = 0; idx < symcount; idx++)
3324 {
3325 if (!sym_is_global (abfd, syms[idx]))
3326 num_locals++;
3327 else
3328 num_globals++;
3329 }
079e9a2f
AM
3330
3331 /* We will be adding a section symbol for each BFD section. Most normal
3332 sections will already have a section symbol in outsymbols, but
3333 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3334 at least in that case. */
252b5132
RH
3335 for (asect = abfd->sections; asect; asect = asect->next)
3336 {
079e9a2f 3337 if (sect_syms[asect->index] == NULL)
252b5132 3338 {
079e9a2f 3339 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3340 num_locals++;
3341 else
3342 num_globals++;
252b5132
RH
3343 }
3344 }
3345
3346 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3347 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3348
252b5132 3349 if (new_syms == NULL)
b34976b6 3350 return FALSE;
252b5132
RH
3351
3352 for (idx = 0; idx < symcount; idx++)
3353 {
3354 asymbol *sym = syms[idx];
dc810e39 3355 unsigned int i;
252b5132
RH
3356
3357 if (!sym_is_global (abfd, sym))
3358 i = num_locals2++;
3359 else
3360 i = num_locals + num_globals2++;
3361 new_syms[i] = sym;
3362 sym->udata.i = i + 1;
3363 }
3364 for (asect = abfd->sections; asect; asect = asect->next)
3365 {
079e9a2f 3366 if (sect_syms[asect->index] == NULL)
252b5132 3367 {
079e9a2f 3368 asymbol *sym = asect->symbol;
dc810e39 3369 unsigned int i;
252b5132 3370
079e9a2f 3371 sect_syms[asect->index] = sym;
252b5132
RH
3372 if (!sym_is_global (abfd, sym))
3373 i = num_locals2++;
3374 else
3375 i = num_locals + num_globals2++;
3376 new_syms[i] = sym;
3377 sym->udata.i = i + 1;
3378 }
3379 }
3380
3381 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3382
3383 elf_num_locals (abfd) = num_locals;
3384 elf_num_globals (abfd) = num_globals;
b34976b6 3385 return TRUE;
252b5132
RH
3386}
3387
3388/* Align to the maximum file alignment that could be required for any
3389 ELF data structure. */
3390
268b6b39 3391static inline file_ptr
217aa764 3392align_file_position (file_ptr off, int align)
252b5132
RH
3393{
3394 return (off + align - 1) & ~(align - 1);
3395}
3396
3397/* Assign a file position to a section, optionally aligning to the
3398 required section alignment. */
3399
217aa764
AM
3400file_ptr
3401_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3402 file_ptr offset,
3403 bfd_boolean align)
252b5132
RH
3404{
3405 if (align)
3406 {
3407 unsigned int al;
3408
3409 al = i_shdrp->sh_addralign;
3410 if (al > 1)
3411 offset = BFD_ALIGN (offset, al);
3412 }
3413 i_shdrp->sh_offset = offset;
3414 if (i_shdrp->bfd_section != NULL)
3415 i_shdrp->bfd_section->filepos = offset;
3416 if (i_shdrp->sh_type != SHT_NOBITS)
3417 offset += i_shdrp->sh_size;
3418 return offset;
3419}
3420
3421/* Compute the file positions we are going to put the sections at, and
3422 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3423 is not NULL, this is being called by the ELF backend linker. */
3424
b34976b6 3425bfd_boolean
217aa764
AM
3426_bfd_elf_compute_section_file_positions (bfd *abfd,
3427 struct bfd_link_info *link_info)
252b5132 3428{
9c5bfbb7 3429 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3430 bfd_boolean failed;
4b6c0f2f 3431 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3432 Elf_Internal_Shdr *shstrtab_hdr;
3433
3434 if (abfd->output_has_begun)
b34976b6 3435 return TRUE;
252b5132
RH
3436
3437 /* Do any elf backend specific processing first. */
3438 if (bed->elf_backend_begin_write_processing)
3439 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3440
3441 if (! prep_headers (abfd))
b34976b6 3442 return FALSE;
252b5132 3443
e6c51ed4
NC
3444 /* Post process the headers if necessary. */
3445 if (bed->elf_backend_post_process_headers)
3446 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3447
b34976b6 3448 failed = FALSE;
252b5132
RH
3449 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3450 if (failed)
b34976b6 3451 return FALSE;
252b5132 3452
da9f89d4 3453 if (!assign_section_numbers (abfd, link_info))
b34976b6 3454 return FALSE;
252b5132
RH
3455
3456 /* The backend linker builds symbol table information itself. */
3457 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3458 {
3459 /* Non-zero if doing a relocatable link. */
3460 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3461
3462 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3463 return FALSE;
252b5132
RH
3464 }
3465
1126897b 3466 if (link_info == NULL)
dbb410c3 3467 {
1126897b 3468 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3469 if (failed)
b34976b6 3470 return FALSE;
dbb410c3
AM
3471 }
3472
252b5132
RH
3473 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3474 /* sh_name was set in prep_headers. */
3475 shstrtab_hdr->sh_type = SHT_STRTAB;
3476 shstrtab_hdr->sh_flags = 0;
3477 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3478 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3479 shstrtab_hdr->sh_entsize = 0;
3480 shstrtab_hdr->sh_link = 0;
3481 shstrtab_hdr->sh_info = 0;
3482 /* sh_offset is set in assign_file_positions_except_relocs. */
3483 shstrtab_hdr->sh_addralign = 1;
3484
c84fca4d 3485 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3486 return FALSE;
252b5132
RH
3487
3488 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3489 {
3490 file_ptr off;
3491 Elf_Internal_Shdr *hdr;
3492
3493 off = elf_tdata (abfd)->next_file_pos;
3494
3495 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3496 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3497
9ad5cbcf
AM
3498 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3499 if (hdr->sh_size != 0)
b34976b6 3500 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3501
252b5132 3502 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3503 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3504
3505 elf_tdata (abfd)->next_file_pos = off;
3506
3507 /* Now that we know where the .strtab section goes, write it
3508 out. */
3509 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3510 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3511 return FALSE;
252b5132
RH
3512 _bfd_stringtab_free (strtab);
3513 }
3514
b34976b6 3515 abfd->output_has_begun = TRUE;
252b5132 3516
b34976b6 3517 return TRUE;
252b5132
RH
3518}
3519
3520/* Create a mapping from a set of sections to a program segment. */
3521
217aa764
AM
3522static struct elf_segment_map *
3523make_mapping (bfd *abfd,
3524 asection **sections,
3525 unsigned int from,
3526 unsigned int to,
3527 bfd_boolean phdr)
252b5132
RH
3528{
3529 struct elf_segment_map *m;
3530 unsigned int i;
3531 asection **hdrpp;
dc810e39 3532 bfd_size_type amt;
252b5132 3533
dc810e39
AM
3534 amt = sizeof (struct elf_segment_map);
3535 amt += (to - from - 1) * sizeof (asection *);
217aa764 3536 m = bfd_zalloc (abfd, amt);
252b5132
RH
3537 if (m == NULL)
3538 return NULL;
3539 m->next = NULL;
3540 m->p_type = PT_LOAD;
3541 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3542 m->sections[i - from] = *hdrpp;
3543 m->count = to - from;
3544
3545 if (from == 0 && phdr)
3546 {
3547 /* Include the headers in the first PT_LOAD segment. */
3548 m->includes_filehdr = 1;
3549 m->includes_phdrs = 1;
3550 }
3551
3552 return m;
3553}
3554
229fcec5
MM
3555/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3556 on failure. */
3557
3558struct elf_segment_map *
3559_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3560{
3561 struct elf_segment_map *m;
3562
3563 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3564 if (m == NULL)
3565 return NULL;
3566 m->next = NULL;
3567 m->p_type = PT_DYNAMIC;
3568 m->count = 1;
3569 m->sections[0] = dynsec;
3570
3571 return m;
3572}
3573
252b5132
RH
3574/* Set up a mapping from BFD sections to program segments. */
3575
b34976b6 3576static bfd_boolean
217aa764 3577map_sections_to_segments (bfd *abfd)
252b5132
RH
3578{
3579 asection **sections = NULL;
3580 asection *s;
3581 unsigned int i;
3582 unsigned int count;
3583 struct elf_segment_map *mfirst;
3584 struct elf_segment_map **pm;
3585 struct elf_segment_map *m;
3586 asection *last_hdr;
baaff79e 3587 bfd_vma last_size;
252b5132
RH
3588 unsigned int phdr_index;
3589 bfd_vma maxpagesize;
3590 asection **hdrpp;
b34976b6
AM
3591 bfd_boolean phdr_in_segment = TRUE;
3592 bfd_boolean writable;
13ae64f3
JJ
3593 int tls_count = 0;
3594 asection *first_tls = NULL;
65765700 3595 asection *dynsec, *eh_frame_hdr;
dc810e39 3596 bfd_size_type amt;
252b5132
RH
3597
3598 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3599 return TRUE;
252b5132
RH
3600
3601 if (bfd_count_sections (abfd) == 0)
b34976b6 3602 return TRUE;
252b5132
RH
3603
3604 /* Select the allocated sections, and sort them. */
3605
d0fb9a8d 3606 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
252b5132
RH
3607 if (sections == NULL)
3608 goto error_return;
3609
3610 i = 0;
3611 for (s = abfd->sections; s != NULL; s = s->next)
3612 {
3613 if ((s->flags & SEC_ALLOC) != 0)
3614 {
3615 sections[i] = s;
3616 ++i;
3617 }
3618 }
3619 BFD_ASSERT (i <= bfd_count_sections (abfd));
3620 count = i;
3621
3622 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3623
3624 /* Build the mapping. */
3625
3626 mfirst = NULL;
3627 pm = &mfirst;
3628
3629 /* If we have a .interp section, then create a PT_PHDR segment for
3630 the program headers and a PT_INTERP segment for the .interp
3631 section. */
3632 s = bfd_get_section_by_name (abfd, ".interp");
3633 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3634 {
dc810e39 3635 amt = sizeof (struct elf_segment_map);
217aa764 3636 m = bfd_zalloc (abfd, amt);
252b5132
RH
3637 if (m == NULL)
3638 goto error_return;
3639 m->next = NULL;
3640 m->p_type = PT_PHDR;
3641 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3642 m->p_flags = PF_R | PF_X;
3643 m->p_flags_valid = 1;
3644 m->includes_phdrs = 1;
3645
3646 *pm = m;
3647 pm = &m->next;
3648
dc810e39 3649 amt = sizeof (struct elf_segment_map);
217aa764 3650 m = bfd_zalloc (abfd, amt);
252b5132
RH
3651 if (m == NULL)
3652 goto error_return;
3653 m->next = NULL;
3654 m->p_type = PT_INTERP;
3655 m->count = 1;
3656 m->sections[0] = s;
3657
3658 *pm = m;
3659 pm = &m->next;
3660 }
3661
3662 /* Look through the sections. We put sections in the same program
3663 segment when the start of the second section can be placed within
3664 a few bytes of the end of the first section. */
3665 last_hdr = NULL;
baaff79e 3666 last_size = 0;
252b5132
RH
3667 phdr_index = 0;
3668 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3669 writable = FALSE;
252b5132
RH
3670 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3671 if (dynsec != NULL
3672 && (dynsec->flags & SEC_LOAD) == 0)
3673 dynsec = NULL;
3674
3675 /* Deal with -Ttext or something similar such that the first section
3676 is not adjacent to the program headers. This is an
3677 approximation, since at this point we don't know exactly how many
3678 program headers we will need. */
3679 if (count > 0)
3680 {
3681 bfd_size_type phdr_size;
3682
3683 phdr_size = elf_tdata (abfd)->program_header_size;
3684 if (phdr_size == 0)
3685 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3686 if ((abfd->flags & D_PAGED) == 0
3687 || sections[0]->lma < phdr_size
3688 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3689 phdr_in_segment = FALSE;
252b5132
RH
3690 }
3691
3692 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3693 {
3694 asection *hdr;
b34976b6 3695 bfd_boolean new_segment;
252b5132
RH
3696
3697 hdr = *hdrpp;
3698
3699 /* See if this section and the last one will fit in the same
3700 segment. */
3701
3702 if (last_hdr == NULL)
3703 {
3704 /* If we don't have a segment yet, then we don't need a new
3705 one (we build the last one after this loop). */
b34976b6 3706 new_segment = FALSE;
252b5132
RH
3707 }
3708 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3709 {
3710 /* If this section has a different relation between the
3711 virtual address and the load address, then we need a new
3712 segment. */
b34976b6 3713 new_segment = TRUE;
252b5132 3714 }
baaff79e 3715 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3716 < BFD_ALIGN (hdr->lma, maxpagesize))
3717 {
3718 /* If putting this section in this segment would force us to
3719 skip a page in the segment, then we need a new segment. */
b34976b6 3720 new_segment = TRUE;
252b5132 3721 }
baaff79e
JJ
3722 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3723 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3724 {
3725 /* We don't want to put a loadable section after a
baaff79e
JJ
3726 nonloadable section in the same segment.
3727 Consider .tbss sections as loadable for this purpose. */
b34976b6 3728 new_segment = TRUE;
252b5132
RH
3729 }
3730 else if ((abfd->flags & D_PAGED) == 0)
3731 {
3732 /* If the file is not demand paged, which means that we
3733 don't require the sections to be correctly aligned in the
3734 file, then there is no other reason for a new segment. */
b34976b6 3735 new_segment = FALSE;
252b5132
RH
3736 }
3737 else if (! writable
3738 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3739 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3740 & ~(maxpagesize - 1))
3741 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3742 {
3743 /* We don't want to put a writable section in a read only
3744 segment, unless they are on the same page in memory
3745 anyhow. We already know that the last section does not
3746 bring us past the current section on the page, so the
3747 only case in which the new section is not on the same
3748 page as the previous section is when the previous section
3749 ends precisely on a page boundary. */
b34976b6 3750 new_segment = TRUE;
252b5132
RH
3751 }
3752 else
3753 {
3754 /* Otherwise, we can use the same segment. */
b34976b6 3755 new_segment = FALSE;
252b5132
RH
3756 }
3757
3758 if (! new_segment)
3759 {
3760 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3761 writable = TRUE;
baaff79e
JJ
3762 last_hdr = hdr;
3763 /* .tbss sections effectively have zero size. */
e5caec89 3764 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3765 last_size = hdr->size;
baaff79e
JJ
3766 else
3767 last_size = 0;
252b5132
RH
3768 continue;
3769 }
3770
3771 /* We need a new program segment. We must create a new program
3772 header holding all the sections from phdr_index until hdr. */
3773
3774 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3775 if (m == NULL)
3776 goto error_return;
3777
3778 *pm = m;
3779 pm = &m->next;
3780
3781 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3782 writable = TRUE;
252b5132 3783 else
b34976b6 3784 writable = FALSE;
252b5132
RH
3785
3786 last_hdr = hdr;
baaff79e
JJ
3787 /* .tbss sections effectively have zero size. */
3788 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3789 last_size = hdr->size;
baaff79e
JJ
3790 else
3791 last_size = 0;
252b5132 3792 phdr_index = i;
b34976b6 3793 phdr_in_segment = FALSE;
252b5132
RH
3794 }
3795
3796 /* Create a final PT_LOAD program segment. */
3797 if (last_hdr != NULL)
3798 {
3799 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3800 if (m == NULL)
3801 goto error_return;
3802
3803 *pm = m;
3804 pm = &m->next;
3805 }
3806
3807 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3808 if (dynsec != NULL)
3809 {
229fcec5 3810 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3811 if (m == NULL)
3812 goto error_return;
252b5132
RH
3813 *pm = m;
3814 pm = &m->next;
3815 }
3816
3817 /* For each loadable .note section, add a PT_NOTE segment. We don't
3818 use bfd_get_section_by_name, because if we link together
3819 nonloadable .note sections and loadable .note sections, we will
3820 generate two .note sections in the output file. FIXME: Using
3821 names for section types is bogus anyhow. */
3822 for (s = abfd->sections; s != NULL; s = s->next)
3823 {
3824 if ((s->flags & SEC_LOAD) != 0
3825 && strncmp (s->name, ".note", 5) == 0)
3826 {
dc810e39 3827 amt = sizeof (struct elf_segment_map);
217aa764 3828 m = bfd_zalloc (abfd, amt);
252b5132
RH
3829 if (m == NULL)
3830 goto error_return;
3831 m->next = NULL;
3832 m->p_type = PT_NOTE;
3833 m->count = 1;
3834 m->sections[0] = s;
3835
3836 *pm = m;
3837 pm = &m->next;
3838 }
13ae64f3
JJ
3839 if (s->flags & SEC_THREAD_LOCAL)
3840 {
3841 if (! tls_count)
3842 first_tls = s;
3843 tls_count++;
3844 }
3845 }
3846
3847 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3848 if (tls_count > 0)
3849 {
3850 int i;
3851
3852 amt = sizeof (struct elf_segment_map);
3853 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3854 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3855 if (m == NULL)
3856 goto error_return;
3857 m->next = NULL;
3858 m->p_type = PT_TLS;
3859 m->count = tls_count;
3860 /* Mandated PF_R. */
3861 m->p_flags = PF_R;
3862 m->p_flags_valid = 1;
3863 for (i = 0; i < tls_count; ++i)
3864 {
3865 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3866 m->sections[i] = first_tls;
3867 first_tls = first_tls->next;
3868 }
3869
3870 *pm = m;
3871 pm = &m->next;
252b5132
RH
3872 }
3873
65765700
JJ
3874 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3875 segment. */
126495ed
AM
3876 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3877 if (eh_frame_hdr != NULL
3878 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3879 {
3880 amt = sizeof (struct elf_segment_map);
217aa764 3881 m = bfd_zalloc (abfd, amt);
65765700
JJ
3882 if (m == NULL)
3883 goto error_return;
3884 m->next = NULL;
3885 m->p_type = PT_GNU_EH_FRAME;
3886 m->count = 1;
126495ed 3887 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3888
3889 *pm = m;
3890 pm = &m->next;
3891 }
3892
9ee5e499
JJ
3893 if (elf_tdata (abfd)->stack_flags)
3894 {
3895 amt = sizeof (struct elf_segment_map);
217aa764 3896 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3897 if (m == NULL)
3898 goto error_return;
3899 m->next = NULL;
3900 m->p_type = PT_GNU_STACK;
3901 m->p_flags = elf_tdata (abfd)->stack_flags;
3902 m->p_flags_valid = 1;
3903
3904 *pm = m;
3905 pm = &m->next;
3906 }
3907
8c37241b
JJ
3908 if (elf_tdata (abfd)->relro)
3909 {
3910 amt = sizeof (struct elf_segment_map);
3911 m = bfd_zalloc (abfd, amt);
3912 if (m == NULL)
3913 goto error_return;
3914 m->next = NULL;
3915 m->p_type = PT_GNU_RELRO;
3916 m->p_flags = PF_R;
3917 m->p_flags_valid = 1;
3918
3919 *pm = m;
3920 pm = &m->next;
3921 }
3922
252b5132
RH
3923 free (sections);
3924 sections = NULL;
3925
3926 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3927 return TRUE;
252b5132
RH
3928
3929 error_return:
3930 if (sections != NULL)
3931 free (sections);
b34976b6 3932 return FALSE;
252b5132
RH
3933}
3934
3935/* Sort sections by address. */
3936
3937static int
217aa764 3938elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3939{
3940 const asection *sec1 = *(const asection **) arg1;
3941 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3942 bfd_size_type size1, size2;
252b5132
RH
3943
3944 /* Sort by LMA first, since this is the address used to
3945 place the section into a segment. */
3946 if (sec1->lma < sec2->lma)
3947 return -1;
3948 else if (sec1->lma > sec2->lma)
3949 return 1;
3950
3951 /* Then sort by VMA. Normally the LMA and the VMA will be
3952 the same, and this will do nothing. */
3953 if (sec1->vma < sec2->vma)
3954 return -1;
3955 else if (sec1->vma > sec2->vma)
3956 return 1;
3957
3958 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3959
07c6e936 3960#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3961
3962 if (TOEND (sec1))
3963 {
3964 if (TOEND (sec2))
00a7cdc5
NC
3965 {
3966 /* If the indicies are the same, do not return 0
3967 here, but continue to try the next comparison. */
3968 if (sec1->target_index - sec2->target_index != 0)
3969 return sec1->target_index - sec2->target_index;
3970 }
252b5132
RH
3971 else
3972 return 1;
3973 }
00a7cdc5 3974 else if (TOEND (sec2))
252b5132
RH
3975 return -1;
3976
3977#undef TOEND
3978
00a7cdc5
NC
3979 /* Sort by size, to put zero sized sections
3980 before others at the same address. */
252b5132 3981
eea6121a
AM
3982 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
3983 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
3984
3985 if (size1 < size2)
252b5132 3986 return -1;
eecdbe52 3987 if (size1 > size2)
252b5132
RH
3988 return 1;
3989
3990 return sec1->target_index - sec2->target_index;
3991}
3992
340b6d91
AC
3993/* Ian Lance Taylor writes:
3994
3995 We shouldn't be using % with a negative signed number. That's just
3996 not good. We have to make sure either that the number is not
3997 negative, or that the number has an unsigned type. When the types
3998 are all the same size they wind up as unsigned. When file_ptr is a
3999 larger signed type, the arithmetic winds up as signed long long,
4000 which is wrong.
4001
4002 What we're trying to say here is something like ``increase OFF by
4003 the least amount that will cause it to be equal to the VMA modulo
4004 the page size.'' */
4005/* In other words, something like:
4006
4007 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4008 off_offset = off % bed->maxpagesize;
4009 if (vma_offset < off_offset)
4010 adjustment = vma_offset + bed->maxpagesize - off_offset;
4011 else
4012 adjustment = vma_offset - off_offset;
4013
4014 which can can be collapsed into the expression below. */
4015
4016static file_ptr
4017vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4018{
4019 return ((vma - off) % maxpagesize);
4020}
4021
252b5132
RH
4022/* Assign file positions to the sections based on the mapping from
4023 sections to segments. This function also sets up some fields in
4024 the file header, and writes out the program headers. */
4025
b34976b6 4026static bfd_boolean
c84fca4d 4027assign_file_positions_for_segments (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
4028{
4029 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4030 unsigned int count;
4031 struct elf_segment_map *m;
4032 unsigned int alloc;
4033 Elf_Internal_Phdr *phdrs;
4034 file_ptr off, voff;
4035 bfd_vma filehdr_vaddr, filehdr_paddr;
4036 bfd_vma phdrs_vaddr, phdrs_paddr;
4037 Elf_Internal_Phdr *p;
4038
4039 if (elf_tdata (abfd)->segment_map == NULL)
4040 {
4041 if (! map_sections_to_segments (abfd))
b34976b6 4042 return FALSE;
252b5132 4043 }
1ed89aa9
NC
4044 else
4045 {
4046 /* The placement algorithm assumes that non allocated sections are
4047 not in PT_LOAD segments. We ensure this here by removing such
540b09cb
AM
4048 sections from the segment map. We also remove excluded
4049 sections. */
1ed89aa9
NC
4050 for (m = elf_tdata (abfd)->segment_map;
4051 m != NULL;
4052 m = m->next)
4053 {
4054 unsigned int new_count;
4055 unsigned int i;
4056
1ed89aa9
NC
4057 new_count = 0;
4058 for (i = 0; i < m->count; i ++)
4059 {
540b09cb
AM
4060 if ((m->sections[i]->flags & SEC_EXCLUDE) == 0
4061 && ((m->sections[i]->flags & SEC_ALLOC) != 0
4062 || m->p_type != PT_LOAD))
1ed89aa9 4063 {
47d9a591 4064 if (i != new_count)
1ed89aa9
NC
4065 m->sections[new_count] = m->sections[i];
4066
4067 new_count ++;
4068 }
4069 }
4070
4071 if (new_count != m->count)
4072 m->count = new_count;
4073 }
4074 }
252b5132
RH
4075
4076 if (bed->elf_backend_modify_segment_map)
4077 {
c84fca4d 4078 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 4079 return FALSE;
252b5132
RH
4080 }
4081
4082 count = 0;
4083 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4084 ++count;
4085
4086 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4087 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4088 elf_elfheader (abfd)->e_phnum = count;
4089
4090 if (count == 0)
0ebdbb83
BW
4091 {
4092 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4093 return TRUE;
4094 }
252b5132
RH
4095
4096 /* If we already counted the number of program segments, make sure
4097 that we allocated enough space. This happens when SIZEOF_HEADERS
4098 is used in a linker script. */
4099 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
4100 if (alloc != 0 && count > alloc)
4101 {
4102 ((*_bfd_error_handler)
b301b248
AM
4103 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
4104 abfd, alloc, count));
252b5132 4105 bfd_set_error (bfd_error_bad_value);
b34976b6 4106 return FALSE;
252b5132
RH
4107 }
4108
4109 if (alloc == 0)
4110 alloc = count;
4111
d0fb9a8d 4112 phdrs = bfd_alloc2 (abfd, alloc, sizeof (Elf_Internal_Phdr));
252b5132 4113 if (phdrs == NULL)
b34976b6 4114 return FALSE;
252b5132
RH
4115
4116 off = bed->s->sizeof_ehdr;
4117 off += alloc * bed->s->sizeof_phdr;
4118
4119 filehdr_vaddr = 0;
4120 filehdr_paddr = 0;
4121 phdrs_vaddr = 0;
4122 phdrs_paddr = 0;
4123
4124 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4125 m != NULL;
4126 m = m->next, p++)
4127 {
4128 unsigned int i;
4129 asection **secpp;
4130
4131 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4132 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4133 not be done to the PT_NOTE section of a corefile, which may
4134 contain several pseudo-sections artificially created by bfd.
4135 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4136 if (m->count > 1
4137 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4138 && m->p_type == PT_NOTE))
252b5132
RH
4139 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4140 elf_sort_sections);
4141
b301b248
AM
4142 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4143 number of sections with contents contributing to both p_filesz
4144 and p_memsz, followed by a number of sections with no contents
4145 that just contribute to p_memsz. In this loop, OFF tracks next
4146 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4147 an adjustment we use for segments that have no file contents
4148 but need zero filled memory allocation. */
4149 voff = 0;
252b5132 4150 p->p_type = m->p_type;
28a7f3e7 4151 p->p_flags = m->p_flags;
252b5132
RH
4152
4153 if (p->p_type == PT_LOAD
b301b248 4154 && m->count > 0)
252b5132 4155 {
b301b248
AM
4156 bfd_size_type align;
4157 bfd_vma adjust;
a49e53ed 4158 unsigned int align_power = 0;
b301b248 4159
a49e53ed 4160 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4161 {
a49e53ed 4162 unsigned int secalign;
252b5132 4163
a49e53ed
AM
4164 secalign = bfd_get_section_alignment (abfd, *secpp);
4165 if (secalign > align_power)
4166 align_power = secalign;
b301b248 4167 }
a49e53ed
AM
4168 align = (bfd_size_type) 1 << align_power;
4169
4170 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > align)
4171 align = bed->maxpagesize;
252b5132 4172
b301b248
AM
4173 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4174 off += adjust;
4175 if (adjust != 0
4176 && !m->includes_filehdr
4177 && !m->includes_phdrs
4178 && (ufile_ptr) off >= align)
4179 {
4180 /* If the first section isn't loadable, the same holds for
4181 any other sections. Since the segment won't need file
4182 space, we can make p_offset overlap some prior segment.
4183 However, .tbss is special. If a segment starts with
4184 .tbss, we need to look at the next section to decide
4185 whether the segment has any loadable sections. */
4186 i = 0;
5efb6261 4187 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
4188 {
4189 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4190 || ++i >= m->count)
4191 {
4192 off -= adjust;
4193 voff = adjust - align;
4194 break;
4195 }
4196 }
252b5132
RH
4197 }
4198 }
b1a6d0b1
NC
4199 /* Make sure the .dynamic section is the first section in the
4200 PT_DYNAMIC segment. */
4201 else if (p->p_type == PT_DYNAMIC
4202 && m->count > 1
4203 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4204 {
4205 _bfd_error_handler
b301b248
AM
4206 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4207 abfd);
b1a6d0b1
NC
4208 bfd_set_error (bfd_error_bad_value);
4209 return FALSE;
4210 }
252b5132
RH
4211
4212 if (m->count == 0)
4213 p->p_vaddr = 0;
4214 else
4215 p->p_vaddr = m->sections[0]->vma;
4216
4217 if (m->p_paddr_valid)
4218 p->p_paddr = m->p_paddr;
4219 else if (m->count == 0)
4220 p->p_paddr = 0;
4221 else
4222 p->p_paddr = m->sections[0]->lma;
4223
4224 if (p->p_type == PT_LOAD
4225 && (abfd->flags & D_PAGED) != 0)
4226 p->p_align = bed->maxpagesize;
4227 else if (m->count == 0)
45d6a902 4228 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
4229 else
4230 p->p_align = 0;
4231
4232 p->p_offset = 0;
4233 p->p_filesz = 0;
4234 p->p_memsz = 0;
4235
4236 if (m->includes_filehdr)
4237 {
4238 if (! m->p_flags_valid)
4239 p->p_flags |= PF_R;
4240 p->p_offset = 0;
4241 p->p_filesz = bed->s->sizeof_ehdr;
4242 p->p_memsz = bed->s->sizeof_ehdr;
4243 if (m->count > 0)
4244 {
4245 BFD_ASSERT (p->p_type == PT_LOAD);
4246
4247 if (p->p_vaddr < (bfd_vma) off)
4248 {
caf47ea6 4249 (*_bfd_error_handler)
b301b248
AM
4250 (_("%B: Not enough room for program headers, try linking with -N"),
4251 abfd);
252b5132 4252 bfd_set_error (bfd_error_bad_value);
b34976b6 4253 return FALSE;
252b5132
RH
4254 }
4255
4256 p->p_vaddr -= off;
4257 if (! m->p_paddr_valid)
4258 p->p_paddr -= off;
4259 }
4260 if (p->p_type == PT_LOAD)
4261 {
4262 filehdr_vaddr = p->p_vaddr;
4263 filehdr_paddr = p->p_paddr;
4264 }
4265 }
4266
4267 if (m->includes_phdrs)
4268 {
4269 if (! m->p_flags_valid)
4270 p->p_flags |= PF_R;
4271
4272 if (m->includes_filehdr)
4273 {
4274 if (p->p_type == PT_LOAD)
4275 {
4276 phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr;
4277 phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr;
4278 }
4279 }
4280 else
4281 {
4282 p->p_offset = bed->s->sizeof_ehdr;
4283
4284 if (m->count > 0)
4285 {
4286 BFD_ASSERT (p->p_type == PT_LOAD);
4287 p->p_vaddr -= off - p->p_offset;
4288 if (! m->p_paddr_valid)
4289 p->p_paddr -= off - p->p_offset;
4290 }
4291
4292 if (p->p_type == PT_LOAD)
4293 {
4294 phdrs_vaddr = p->p_vaddr;
4295 phdrs_paddr = p->p_paddr;
4296 }
4297 else
4298 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4299 }
4300
4301 p->p_filesz += alloc * bed->s->sizeof_phdr;
4302 p->p_memsz += alloc * bed->s->sizeof_phdr;
4303 }
4304
4305 if (p->p_type == PT_LOAD
4306 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4307 {
4308 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4309 p->p_offset = off + voff;
252b5132
RH
4310 else
4311 {
4312 file_ptr adjust;
4313
4314 adjust = off - (p->p_offset + p->p_filesz);
4315 p->p_filesz += adjust;
4316 p->p_memsz += adjust;
4317 }
4318 }
4319
252b5132
RH
4320 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4321 {
4322 asection *sec;
4323 flagword flags;
4324 bfd_size_type align;
4325
4326 sec = *secpp;
4327 flags = sec->flags;
4328 align = 1 << bfd_get_section_alignment (abfd, sec);
4329
b301b248
AM
4330 if (p->p_type == PT_LOAD
4331 || p->p_type == PT_TLS)
252b5132
RH
4332 {
4333 bfd_signed_vma adjust;
4334
5efb6261 4335 if ((flags & SEC_LOAD) != 0)
252b5132 4336 {
b301b248 4337 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4338 if (adjust < 0)
b301b248
AM
4339 {
4340 (*_bfd_error_handler)
4341 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4342 abfd, sec, (unsigned long) sec->lma);
4343 adjust = 0;
4344 }
4345 off += adjust;
4346 p->p_filesz += adjust;
4347 p->p_memsz += adjust;
252b5132 4348 }
b301b248
AM
4349 /* .tbss is special. It doesn't contribute to p_memsz of
4350 normal segments. */
4351 else if ((flags & SEC_THREAD_LOCAL) == 0
4352 || p->p_type == PT_TLS)
252b5132
RH
4353 {
4354 /* The section VMA must equal the file position
b301b248
AM
4355 modulo the page size. */
4356 bfd_size_type page = align;
a49e53ed 4357 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > page)
b301b248
AM
4358 page = bed->maxpagesize;
4359 adjust = vma_page_aligned_bias (sec->vma,
4360 p->p_vaddr + p->p_memsz,
4361 page);
252b5132 4362 p->p_memsz += adjust;
252b5132 4363 }
252b5132
RH
4364 }
4365
4366 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4367 {
b301b248
AM
4368 /* The section at i == 0 is the one that actually contains
4369 everything. */
4a938328
MS
4370 if (i == 0)
4371 {
252b5132 4372 sec->filepos = off;
eea6121a 4373 off += sec->size;
b301b248
AM
4374 p->p_filesz = sec->size;
4375 p->p_memsz = 0;
4376 p->p_align = 1;
252b5132 4377 }
4a938328 4378 else
252b5132 4379 {
b301b248 4380 /* The rest are fake sections that shouldn't be written. */
252b5132 4381 sec->filepos = 0;
eea6121a 4382 sec->size = 0;
b301b248
AM
4383 sec->flags = 0;
4384 continue;
252b5132 4385 }
252b5132
RH
4386 }
4387 else
4388 {
b301b248
AM
4389 if (p->p_type == PT_LOAD)
4390 {
4391 sec->filepos = off;
5efb6261
AM
4392 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4393 1997, and the exact reason for it isn't clear. One
4394 plausible explanation is that it is to work around
4395 a problem we have with linker scripts using data
4396 statements in NOLOAD sections. I don't think it
4397 makes a great deal of sense to have such a section
4398 assigned to a PT_LOAD segment, but apparently
4399 people do this. The data statement results in a
4400 bfd_data_link_order being built, and these need
4401 section contents to write into. Eventually, we get
4402 to _bfd_elf_write_object_contents which writes any
4403 section with contents to the output. Make room
4404 here for the write, so that following segments are
4405 not trashed. */
4406 if ((flags & SEC_LOAD) != 0
4407 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4408 off += sec->size;
4409 }
252b5132 4410
5efb6261 4411 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4412 {
4413 p->p_filesz += sec->size;
4414 p->p_memsz += sec->size;
4415 }
4b6c0f2f
NC
4416 /* PR ld/594: Sections in note segments which are not loaded
4417 contribute to the file size but not the in-memory size. */
4418 else if (p->p_type == PT_NOTE
4419 && (flags & SEC_HAS_CONTENTS) != 0)
4420 p->p_filesz += sec->size;
4421
b301b248
AM
4422 /* .tbss is special. It doesn't contribute to p_memsz of
4423 normal segments. */
4424 else if ((flags & SEC_THREAD_LOCAL) == 0
4425 || p->p_type == PT_TLS)
4426 p->p_memsz += sec->size;
252b5132 4427
13ae64f3 4428 if (p->p_type == PT_TLS
eea6121a 4429 && sec->size == 0
13ae64f3
JJ
4430 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4431 {
4432 struct bfd_link_order *o;
4433 bfd_vma tbss_size = 0;
4434
8423293d 4435 for (o = sec->map_head.link_order; o != NULL; o = o->next)
13ae64f3
JJ
4436 if (tbss_size < o->offset + o->size)
4437 tbss_size = o->offset + o->size;
4438
4439 p->p_memsz += tbss_size;
4440 }
4441
252b5132
RH
4442 if (align > p->p_align
4443 && (p->p_type != PT_LOAD || (abfd->flags & D_PAGED) == 0))
4444 p->p_align = align;
4445 }
4446
4447 if (! m->p_flags_valid)
4448 {
4449 p->p_flags |= PF_R;
4450 if ((flags & SEC_CODE) != 0)
4451 p->p_flags |= PF_X;
4452 if ((flags & SEC_READONLY) == 0)
4453 p->p_flags |= PF_W;
4454 }
4455 }
4456 }
4457
4458 /* Now that we have set the section file positions, we can set up
4459 the file positions for the non PT_LOAD segments. */
4460 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4461 m != NULL;
4462 m = m->next, p++)
4463 {
4464 if (p->p_type != PT_LOAD && m->count > 0)
4465 {
4466 BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs);
229fcec5
MM
4467 /* If the section has not yet been assigned a file position,
4468 do so now. The ARM BPABI requires that .dynamic section
4469 not be marked SEC_ALLOC because it is not part of any
4470 PT_LOAD segment, so it will not be processed above. */
4471 if (p->p_type == PT_DYNAMIC && m->sections[0]->filepos == 0)
4472 {
4473 unsigned int i;
4474 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4475
4476 i = 1;
4477 while (i_shdrpp[i]->bfd_section != m->sections[0])
4478 ++i;
4479 off = (_bfd_elf_assign_file_position_for_section
4480 (i_shdrpp[i], off, TRUE));
4481 p->p_filesz = m->sections[0]->size;
4482 }
252b5132
RH
4483 p->p_offset = m->sections[0]->filepos;
4484 }
4485 if (m->count == 0)
4486 {
4487 if (m->includes_filehdr)
4488 {
4489 p->p_vaddr = filehdr_vaddr;
4490 if (! m->p_paddr_valid)
4491 p->p_paddr = filehdr_paddr;
4492 }
4493 else if (m->includes_phdrs)
4494 {
4495 p->p_vaddr = phdrs_vaddr;
4496 if (! m->p_paddr_valid)
4497 p->p_paddr = phdrs_paddr;
4498 }
8c37241b
JJ
4499 else if (p->p_type == PT_GNU_RELRO)
4500 {
4501 Elf_Internal_Phdr *lp;
4502
4503 for (lp = phdrs; lp < phdrs + count; ++lp)
4504 {
4505 if (lp->p_type == PT_LOAD
4506 && lp->p_vaddr <= link_info->relro_end
4507 && lp->p_vaddr >= link_info->relro_start
4508 && lp->p_vaddr + lp->p_filesz
4509 >= link_info->relro_end)
4510 break;
4511 }
4512
4513 if (lp < phdrs + count
4514 && link_info->relro_end > lp->p_vaddr)
4515 {
4516 p->p_vaddr = lp->p_vaddr;
4517 p->p_paddr = lp->p_paddr;
4518 p->p_offset = lp->p_offset;
4519 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4520 p->p_memsz = p->p_filesz;
4521 p->p_align = 1;
4522 p->p_flags = (lp->p_flags & ~PF_W);
4523 }
4524 else
4525 {
4526 memset (p, 0, sizeof *p);
4527 p->p_type = PT_NULL;
4528 }
4529 }
252b5132
RH
4530 }
4531 }
4532
4533 /* Clear out any program headers we allocated but did not use. */
4534 for (; count < alloc; count++, p++)
4535 {
4536 memset (p, 0, sizeof *p);
4537 p->p_type = PT_NULL;
4538 }
4539
4540 elf_tdata (abfd)->phdr = phdrs;
4541
4542 elf_tdata (abfd)->next_file_pos = off;
4543
4544 /* Write out the program headers. */
dc810e39 4545 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
252b5132 4546 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0)
b34976b6 4547 return FALSE;
252b5132 4548
b34976b6 4549 return TRUE;
252b5132
RH
4550}
4551
4552/* Get the size of the program header.
4553
4554 If this is called by the linker before any of the section VMA's are set, it
4555 can't calculate the correct value for a strange memory layout. This only
4556 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4557 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4558 data segment (exclusive of .interp and .dynamic).
4559
4560 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4561 will be two segments. */
4562
4563static bfd_size_type
217aa764 4564get_program_header_size (bfd *abfd)
252b5132
RH
4565{
4566 size_t segs;
4567 asection *s;
9c5bfbb7 4568 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4569
4570 /* We can't return a different result each time we're called. */
4571 if (elf_tdata (abfd)->program_header_size != 0)
4572 return elf_tdata (abfd)->program_header_size;
4573
4574 if (elf_tdata (abfd)->segment_map != NULL)
4575 {
4576 struct elf_segment_map *m;
4577
4578 segs = 0;
4579 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4580 ++segs;
4581 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4582 return elf_tdata (abfd)->program_header_size;
4583 }
4584
4585 /* Assume we will need exactly two PT_LOAD segments: one for text
4586 and one for data. */
4587 segs = 2;
4588
4589 s = bfd_get_section_by_name (abfd, ".interp");
4590 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4591 {
4592 /* If we have a loadable interpreter section, we need a
4593 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4594 PT_PHDR segment, although that may not be true for all
252b5132
RH
4595 targets. */
4596 segs += 2;
4597 }
4598
4599 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4600 {
4601 /* We need a PT_DYNAMIC segment. */
4602 ++segs;
4603 }
4604
126495ed 4605 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4606 {
4607 /* We need a PT_GNU_EH_FRAME segment. */
4608 ++segs;
4609 }
4610
9ee5e499
JJ
4611 if (elf_tdata (abfd)->stack_flags)
4612 {
4613 /* We need a PT_GNU_STACK segment. */
4614 ++segs;
4615 }
4616
8c37241b
JJ
4617 if (elf_tdata (abfd)->relro)
4618 {
4619 /* We need a PT_GNU_RELRO segment. */
4620 ++segs;
4621 }
4622
252b5132
RH
4623 for (s = abfd->sections; s != NULL; s = s->next)
4624 {
4625 if ((s->flags & SEC_LOAD) != 0
4626 && strncmp (s->name, ".note", 5) == 0)
4627 {
4628 /* We need a PT_NOTE segment. */
4629 ++segs;
4630 }
4631 }
4632
13ae64f3
JJ
4633 for (s = abfd->sections; s != NULL; s = s->next)
4634 {
4635 if (s->flags & SEC_THREAD_LOCAL)
4636 {
4637 /* We need a PT_TLS segment. */
4638 ++segs;
4639 break;
4640 }
4641 }
4642
252b5132
RH
4643 /* Let the backend count up any program headers it might need. */
4644 if (bed->elf_backend_additional_program_headers)
4645 {
4646 int a;
4647
4648 a = (*bed->elf_backend_additional_program_headers) (abfd);
4649 if (a == -1)
4650 abort ();
4651 segs += a;
4652 }
4653
4654 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4655 return elf_tdata (abfd)->program_header_size;
4656}
4657
4658/* Work out the file positions of all the sections. This is called by
4659 _bfd_elf_compute_section_file_positions. All the section sizes and
4660 VMAs must be known before this is called.
4661
e0638f70
AM
4662 Reloc sections come in two flavours: Those processed specially as
4663 "side-channel" data attached to a section to which they apply, and
4664 those that bfd doesn't process as relocations. The latter sort are
4665 stored in a normal bfd section by bfd_section_from_shdr. We don't
4666 consider the former sort here, unless they form part of the loadable
4667 image. Reloc sections not assigned here will be handled later by
4668 assign_file_positions_for_relocs.
252b5132
RH
4669
4670 We also don't set the positions of the .symtab and .strtab here. */
4671
b34976b6 4672static bfd_boolean
c84fca4d
AO
4673assign_file_positions_except_relocs (bfd *abfd,
4674 struct bfd_link_info *link_info)
252b5132
RH
4675{
4676 struct elf_obj_tdata * const tdata = elf_tdata (abfd);
4677 Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd);
4678 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
9ad5cbcf 4679 unsigned int num_sec = elf_numsections (abfd);
252b5132 4680 file_ptr off;
9c5bfbb7 4681 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4682
4683 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4684 && bfd_get_format (abfd) != bfd_core)
4685 {
4686 Elf_Internal_Shdr **hdrpp;
4687 unsigned int i;
4688
4689 /* Start after the ELF header. */
4690 off = i_ehdrp->e_ehsize;
4691
4692 /* We are not creating an executable, which means that we are
4693 not creating a program header, and that the actual order of
4694 the sections in the file is unimportant. */
9ad5cbcf 4695 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4696 {
4697 Elf_Internal_Shdr *hdr;
4698
4699 hdr = *hdrpp;
e0638f70
AM
4700 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4701 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4702 || i == tdata->symtab_section
4703 || i == tdata->symtab_shndx_section
252b5132
RH
4704 || i == tdata->strtab_section)
4705 {
4706 hdr->sh_offset = -1;
252b5132 4707 }
9ad5cbcf 4708 else
b34976b6 4709 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4710
9ad5cbcf
AM
4711 if (i == SHN_LORESERVE - 1)
4712 {
4713 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4714 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4715 }
252b5132
RH
4716 }
4717 }
4718 else
4719 {
4720 unsigned int i;
4721 Elf_Internal_Shdr **hdrpp;
4722
4723 /* Assign file positions for the loaded sections based on the
4724 assignment of sections to segments. */
c84fca4d 4725 if (! assign_file_positions_for_segments (abfd, link_info))
b34976b6 4726 return FALSE;
252b5132
RH
4727
4728 /* Assign file positions for the other sections. */
4729
4730 off = elf_tdata (abfd)->next_file_pos;
9ad5cbcf 4731 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4732 {
4733 Elf_Internal_Shdr *hdr;
4734
4735 hdr = *hdrpp;
4736 if (hdr->bfd_section != NULL
4737 && hdr->bfd_section->filepos != 0)
4738 hdr->sh_offset = hdr->bfd_section->filepos;
4739 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4740 {
4741 ((*_bfd_error_handler)
b301b248
AM
4742 (_("%B: warning: allocated section `%s' not in segment"),
4743 abfd,
252b5132
RH
4744 (hdr->bfd_section == NULL
4745 ? "*unknown*"
4746 : hdr->bfd_section->name)));
4747 if ((abfd->flags & D_PAGED) != 0)
340b6d91
AC
4748 off += vma_page_aligned_bias (hdr->sh_addr, off,
4749 bed->maxpagesize);
252b5132 4750 else
340b6d91
AC
4751 off += vma_page_aligned_bias (hdr->sh_addr, off,
4752 hdr->sh_addralign);
252b5132 4753 off = _bfd_elf_assign_file_position_for_section (hdr, off,
b34976b6 4754 FALSE);
252b5132 4755 }
e0638f70
AM
4756 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4757 && hdr->bfd_section == NULL)
252b5132 4758 || hdr == i_shdrpp[tdata->symtab_section]
9ad5cbcf 4759 || hdr == i_shdrpp[tdata->symtab_shndx_section]
252b5132
RH
4760 || hdr == i_shdrpp[tdata->strtab_section])
4761 hdr->sh_offset = -1;
4762 else
b34976b6 4763 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf
AM
4764
4765 if (i == SHN_LORESERVE - 1)
4766 {
4767 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4768 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4769 }
252b5132
RH
4770 }
4771 }
4772
4773 /* Place the section headers. */
45d6a902 4774 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4775 i_ehdrp->e_shoff = off;
4776 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4777
4778 elf_tdata (abfd)->next_file_pos = off;
4779
b34976b6 4780 return TRUE;
252b5132
RH
4781}
4782
b34976b6 4783static bfd_boolean
217aa764 4784prep_headers (bfd *abfd)
252b5132
RH
4785{
4786 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4787 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4788 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4789 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4790 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4791
4792 i_ehdrp = elf_elfheader (abfd);
4793 i_shdrp = elf_elfsections (abfd);
4794
2b0f7ef9 4795 shstrtab = _bfd_elf_strtab_init ();
252b5132 4796 if (shstrtab == NULL)
b34976b6 4797 return FALSE;
252b5132
RH
4798
4799 elf_shstrtab (abfd) = shstrtab;
4800
4801 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4802 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4803 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4804 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4805
4806 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4807 i_ehdrp->e_ident[EI_DATA] =
4808 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4809 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4810
252b5132
RH
4811 if ((abfd->flags & DYNAMIC) != 0)
4812 i_ehdrp->e_type = ET_DYN;
4813 else if ((abfd->flags & EXEC_P) != 0)
4814 i_ehdrp->e_type = ET_EXEC;
4815 else if (bfd_get_format (abfd) == bfd_core)
4816 i_ehdrp->e_type = ET_CORE;
4817 else
4818 i_ehdrp->e_type = ET_REL;
4819
4820 switch (bfd_get_arch (abfd))
4821 {
4822 case bfd_arch_unknown:
4823 i_ehdrp->e_machine = EM_NONE;
4824 break;
aa4f99bb
AO
4825
4826 /* There used to be a long list of cases here, each one setting
4827 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4828 in the corresponding bfd definition. To avoid duplication,
4829 the switch was removed. Machines that need special handling
4830 can generally do it in elf_backend_final_write_processing(),
4831 unless they need the information earlier than the final write.
4832 Such need can generally be supplied by replacing the tests for
4833 e_machine with the conditions used to determine it. */
252b5132 4834 default:
9c5bfbb7
AM
4835 i_ehdrp->e_machine = bed->elf_machine_code;
4836 }
aa4f99bb 4837
252b5132
RH
4838 i_ehdrp->e_version = bed->s->ev_current;
4839 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4840
c044fabd 4841 /* No program header, for now. */
252b5132
RH
4842 i_ehdrp->e_phoff = 0;
4843 i_ehdrp->e_phentsize = 0;
4844 i_ehdrp->e_phnum = 0;
4845
c044fabd 4846 /* Each bfd section is section header entry. */
252b5132
RH
4847 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4848 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4849
c044fabd 4850 /* If we're building an executable, we'll need a program header table. */
252b5132 4851 if (abfd->flags & EXEC_P)
0e71e495
BE
4852 /* It all happens later. */
4853 ;
252b5132
RH
4854 else
4855 {
4856 i_ehdrp->e_phentsize = 0;
4857 i_phdrp = 0;
4858 i_ehdrp->e_phoff = 0;
4859 }
4860
4861 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4862 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4863 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4864 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4865 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4866 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4867 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4868 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4869 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4870 return FALSE;
252b5132 4871
b34976b6 4872 return TRUE;
252b5132
RH
4873}
4874
4875/* Assign file positions for all the reloc sections which are not part
4876 of the loadable file image. */
4877
4878void
217aa764 4879_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4880{
4881 file_ptr off;
9ad5cbcf 4882 unsigned int i, num_sec;
252b5132
RH
4883 Elf_Internal_Shdr **shdrpp;
4884
4885 off = elf_tdata (abfd)->next_file_pos;
4886
9ad5cbcf
AM
4887 num_sec = elf_numsections (abfd);
4888 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4889 {
4890 Elf_Internal_Shdr *shdrp;
4891
4892 shdrp = *shdrpp;
4893 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4894 && shdrp->sh_offset == -1)
b34976b6 4895 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4896 }
4897
4898 elf_tdata (abfd)->next_file_pos = off;
4899}
4900
b34976b6 4901bfd_boolean
217aa764 4902_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4903{
9c5bfbb7 4904 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4905 Elf_Internal_Ehdr *i_ehdrp;
4906 Elf_Internal_Shdr **i_shdrp;
b34976b6 4907 bfd_boolean failed;
9ad5cbcf 4908 unsigned int count, num_sec;
252b5132
RH
4909
4910 if (! abfd->output_has_begun
217aa764 4911 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4912 return FALSE;
252b5132
RH
4913
4914 i_shdrp = elf_elfsections (abfd);
4915 i_ehdrp = elf_elfheader (abfd);
4916
b34976b6 4917 failed = FALSE;
252b5132
RH
4918 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4919 if (failed)
b34976b6 4920 return FALSE;
252b5132
RH
4921
4922 _bfd_elf_assign_file_positions_for_relocs (abfd);
4923
c044fabd 4924 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4925 num_sec = elf_numsections (abfd);
4926 for (count = 1; count < num_sec; count++)
252b5132
RH
4927 {
4928 if (bed->elf_backend_section_processing)
4929 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4930 if (i_shdrp[count]->contents)
4931 {
dc810e39
AM
4932 bfd_size_type amt = i_shdrp[count]->sh_size;
4933
252b5132 4934 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4935 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4936 return FALSE;
252b5132 4937 }
9ad5cbcf
AM
4938 if (count == SHN_LORESERVE - 1)
4939 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4940 }
4941
4942 /* Write out the section header names. */
26ae6d5e
DJ
4943 if (elf_shstrtab (abfd) != NULL
4944 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
4945 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4946 return FALSE;
252b5132
RH
4947
4948 if (bed->elf_backend_final_write_processing)
4949 (*bed->elf_backend_final_write_processing) (abfd,
4950 elf_tdata (abfd)->linker);
4951
4952 return bed->s->write_shdrs_and_ehdr (abfd);
4953}
4954
b34976b6 4955bfd_boolean
217aa764 4956_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4957{
c044fabd 4958 /* Hopefully this can be done just like an object file. */
252b5132
RH
4959 return _bfd_elf_write_object_contents (abfd);
4960}
c044fabd
KH
4961
4962/* Given a section, search the header to find them. */
4963
252b5132 4964int
198beae2 4965_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4966{
9c5bfbb7 4967 const struct elf_backend_data *bed;
252b5132 4968 int index;
252b5132 4969
9ad5cbcf
AM
4970 if (elf_section_data (asect) != NULL
4971 && elf_section_data (asect)->this_idx != 0)
4972 return elf_section_data (asect)->this_idx;
4973
4974 if (bfd_is_abs_section (asect))
af746e92
AM
4975 index = SHN_ABS;
4976 else if (bfd_is_com_section (asect))
4977 index = SHN_COMMON;
4978 else if (bfd_is_und_section (asect))
4979 index = SHN_UNDEF;
4980 else
6dc132d9 4981 index = -1;
252b5132 4982
af746e92 4983 bed = get_elf_backend_data (abfd);
252b5132
RH
4984 if (bed->elf_backend_section_from_bfd_section)
4985 {
af746e92 4986 int retval = index;
9ad5cbcf 4987
af746e92
AM
4988 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
4989 return retval;
252b5132
RH
4990 }
4991
af746e92
AM
4992 if (index == -1)
4993 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 4994
af746e92 4995 return index;
252b5132
RH
4996}
4997
4998/* Given a BFD symbol, return the index in the ELF symbol table, or -1
4999 on error. */
5000
5001int
217aa764 5002_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5003{
5004 asymbol *asym_ptr = *asym_ptr_ptr;
5005 int idx;
5006 flagword flags = asym_ptr->flags;
5007
5008 /* When gas creates relocations against local labels, it creates its
5009 own symbol for the section, but does put the symbol into the
5010 symbol chain, so udata is 0. When the linker is generating
5011 relocatable output, this section symbol may be for one of the
5012 input sections rather than the output section. */
5013 if (asym_ptr->udata.i == 0
5014 && (flags & BSF_SECTION_SYM)
5015 && asym_ptr->section)
5016 {
5017 int indx;
5018
5019 if (asym_ptr->section->output_section != NULL)
5020 indx = asym_ptr->section->output_section->index;
5021 else
5022 indx = asym_ptr->section->index;
4e89ac30
L
5023 if (indx < elf_num_section_syms (abfd)
5024 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5025 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5026 }
5027
5028 idx = asym_ptr->udata.i;
5029
5030 if (idx == 0)
5031 {
5032 /* This case can occur when using --strip-symbol on a symbol
5033 which is used in a relocation entry. */
5034 (*_bfd_error_handler)
d003868e
AM
5035 (_("%B: symbol `%s' required but not present"),
5036 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5037 bfd_set_error (bfd_error_no_symbols);
5038 return -1;
5039 }
5040
5041#if DEBUG & 4
5042 {
5043 fprintf (stderr,
661a3fd4 5044 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5045 (long) asym_ptr, asym_ptr->name, idx, flags,
5046 elf_symbol_flags (flags));
5047 fflush (stderr);
5048 }
5049#endif
5050
5051 return idx;
5052}
5053
5054/* Copy private BFD data. This copies any program header information. */
5055
b34976b6 5056static bfd_boolean
217aa764 5057copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132 5058{
b34976b6
AM
5059 Elf_Internal_Ehdr *iehdr;
5060 struct elf_segment_map *map;
5061 struct elf_segment_map *map_first;
5062 struct elf_segment_map **pointer_to_map;
5063 Elf_Internal_Phdr *segment;
5064 asection *section;
5065 unsigned int i;
5066 unsigned int num_segments;
5067 bfd_boolean phdr_included = FALSE;
5068 bfd_vma maxpagesize;
5069 struct elf_segment_map *phdr_adjust_seg = NULL;
5070 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5071 const struct elf_backend_data *bed;
bc67d8a6 5072
c044fabd 5073 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 5074 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5075 return TRUE;
252b5132
RH
5076
5077 if (elf_tdata (ibfd)->phdr == NULL)
b34976b6 5078 return TRUE;
252b5132 5079
caf47ea6 5080 bed = get_elf_backend_data (ibfd);
252b5132
RH
5081 iehdr = elf_elfheader (ibfd);
5082
bc67d8a6 5083 map_first = NULL;
c044fabd 5084 pointer_to_map = &map_first;
252b5132
RH
5085
5086 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5087 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5088
5089 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5090#define SEGMENT_END(segment, start) \
5091 (start + (segment->p_memsz > segment->p_filesz \
5092 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5093
eecdbe52
JJ
5094#define SECTION_SIZE(section, segment) \
5095 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5096 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5097 ? section->size : 0)
eecdbe52 5098
b34976b6 5099 /* Returns TRUE if the given section is contained within
bc67d8a6 5100 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5101#define IS_CONTAINED_BY_VMA(section, segment) \
5102 (section->vma >= segment->p_vaddr \
eecdbe52 5103 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5104 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5105
b34976b6 5106 /* Returns TRUE if the given section is contained within
bc67d8a6 5107 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5108#define IS_CONTAINED_BY_LMA(section, segment, base) \
5109 (section->lma >= base \
eecdbe52 5110 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5111 <= SEGMENT_END (segment, base)))
252b5132 5112
c044fabd 5113 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5114#define IS_COREFILE_NOTE(p, s) \
5115 (p->p_type == PT_NOTE \
5116 && bfd_get_format (ibfd) == bfd_core \
5117 && s->vma == 0 && s->lma == 0 \
5118 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5119 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5120 <= p->p_offset + p->p_filesz))
252b5132
RH
5121
5122 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5123 linker, which generates a PT_INTERP section with p_vaddr and
5124 p_memsz set to 0. */
aecc8f8a
AM
5125#define IS_SOLARIS_PT_INTERP(p, s) \
5126 (p->p_vaddr == 0 \
5127 && p->p_paddr == 0 \
5128 && p->p_memsz == 0 \
5129 && p->p_filesz > 0 \
5130 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5131 && s->size > 0 \
aecc8f8a 5132 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5133 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5134 <= p->p_offset + p->p_filesz))
5c440b1e 5135
bc67d8a6
NC
5136 /* Decide if the given section should be included in the given segment.
5137 A section will be included if:
f5ffc919
NC
5138 1. It is within the address space of the segment -- we use the LMA
5139 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5140 2. It is an allocated segment,
5141 3. There is an output section associated with it,
eecdbe52 5142 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5143 5. PT_GNU_STACK segments do not include any sections.
5144 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5145 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5146 8. PT_DYNAMIC should not contain empty sections at the beginning
5147 (with the possible exception of .dynamic). */
caf47ea6 5148#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5149 ((((segment->p_paddr \
5150 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5151 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5152 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5153 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5154 && section->output_section != NULL \
03394ac9 5155 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5156 && (segment->p_type != PT_TLS \
5157 || (section->flags & SEC_THREAD_LOCAL)) \
5158 && (segment->p_type == PT_LOAD \
5159 || segment->p_type == PT_TLS \
5160 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5161 && (segment->p_type != PT_DYNAMIC \
5162 || SECTION_SIZE (section, segment) > 0 \
5163 || (segment->p_paddr \
5164 ? segment->p_paddr != section->lma \
5165 : segment->p_vaddr != section->vma) \
5166 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5167 == 0)) \
82e51918 5168 && ! section->segment_mark)
bc67d8a6 5169
b34976b6 5170 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5171#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5172 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5173
5174 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5175 their VMA address ranges and their LMA address ranges overlap.
5176 It is possible to have overlapping VMA ranges without overlapping LMA
5177 ranges. RedBoot images for example can have both .data and .bss mapped
5178 to the same VMA range, but with the .data section mapped to a different
5179 LMA. */
aecc8f8a 5180#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5181 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5182 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5183 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5184 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5185
5186 /* Initialise the segment mark field. */
5187 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5188 section->segment_mark = FALSE;
bc67d8a6 5189
252b5132 5190 /* Scan through the segments specified in the program header
bc67d8a6 5191 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5192 in the loadable segments. These can be created by weird
aecc8f8a 5193 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5194 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5195 i < num_segments;
c044fabd 5196 i++, segment++)
252b5132 5197 {
252b5132 5198 unsigned int j;
c044fabd 5199 Elf_Internal_Phdr *segment2;
252b5132 5200
aecc8f8a
AM
5201 if (segment->p_type == PT_INTERP)
5202 for (section = ibfd->sections; section; section = section->next)
5203 if (IS_SOLARIS_PT_INTERP (segment, section))
5204 {
5205 /* Mininal change so that the normal section to segment
4cc11e76 5206 assignment code will work. */
aecc8f8a
AM
5207 segment->p_vaddr = section->vma;
5208 break;
5209 }
5210
bc67d8a6
NC
5211 if (segment->p_type != PT_LOAD)
5212 continue;
c044fabd 5213
bc67d8a6 5214 /* Determine if this segment overlaps any previous segments. */
c044fabd 5215 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5216 {
5217 bfd_signed_vma extra_length;
c044fabd 5218
bc67d8a6
NC
5219 if (segment2->p_type != PT_LOAD
5220 || ! SEGMENT_OVERLAPS (segment, segment2))
5221 continue;
c044fabd 5222
bc67d8a6
NC
5223 /* Merge the two segments together. */
5224 if (segment2->p_vaddr < segment->p_vaddr)
5225 {
c044fabd
KH
5226 /* Extend SEGMENT2 to include SEGMENT and then delete
5227 SEGMENT. */
bc67d8a6
NC
5228 extra_length =
5229 SEGMENT_END (segment, segment->p_vaddr)
5230 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5231
bc67d8a6
NC
5232 if (extra_length > 0)
5233 {
5234 segment2->p_memsz += extra_length;
5235 segment2->p_filesz += extra_length;
5236 }
c044fabd 5237
bc67d8a6 5238 segment->p_type = PT_NULL;
c044fabd 5239
bc67d8a6
NC
5240 /* Since we have deleted P we must restart the outer loop. */
5241 i = 0;
5242 segment = elf_tdata (ibfd)->phdr;
5243 break;
5244 }
5245 else
5246 {
c044fabd
KH
5247 /* Extend SEGMENT to include SEGMENT2 and then delete
5248 SEGMENT2. */
bc67d8a6
NC
5249 extra_length =
5250 SEGMENT_END (segment2, segment2->p_vaddr)
5251 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5252
bc67d8a6
NC
5253 if (extra_length > 0)
5254 {
5255 segment->p_memsz += extra_length;
5256 segment->p_filesz += extra_length;
5257 }
c044fabd 5258
bc67d8a6
NC
5259 segment2->p_type = PT_NULL;
5260 }
5261 }
5262 }
c044fabd 5263
bc67d8a6
NC
5264 /* The second scan attempts to assign sections to segments. */
5265 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5266 i < num_segments;
5267 i ++, segment ++)
5268 {
5269 unsigned int section_count;
5270 asection ** sections;
5271 asection * output_section;
5272 unsigned int isec;
5273 bfd_vma matching_lma;
5274 bfd_vma suggested_lma;
5275 unsigned int j;
dc810e39 5276 bfd_size_type amt;
bc67d8a6
NC
5277
5278 if (segment->p_type == PT_NULL)
5279 continue;
c044fabd 5280
bc67d8a6 5281 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5282 for (section = ibfd->sections, section_count = 0;
5283 section != NULL;
5284 section = section->next)
caf47ea6 5285 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5286 ++section_count;
811072d8 5287
b5f852ea
NC
5288 /* Allocate a segment map big enough to contain
5289 all of the sections we have selected. */
dc810e39
AM
5290 amt = sizeof (struct elf_segment_map);
5291 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5292 map = bfd_alloc (obfd, amt);
bc67d8a6 5293 if (map == NULL)
b34976b6 5294 return FALSE;
252b5132
RH
5295
5296 /* Initialise the fields of the segment map. Default to
5297 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5298 map->next = NULL;
5299 map->p_type = segment->p_type;
5300 map->p_flags = segment->p_flags;
5301 map->p_flags_valid = 1;
5302 map->p_paddr = segment->p_paddr;
5303 map->p_paddr_valid = 1;
252b5132
RH
5304
5305 /* Determine if this segment contains the ELF file header
5306 and if it contains the program headers themselves. */
bc67d8a6
NC
5307 map->includes_filehdr = (segment->p_offset == 0
5308 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5309
bc67d8a6 5310 map->includes_phdrs = 0;
252b5132 5311
bc67d8a6 5312 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5313 {
bc67d8a6
NC
5314 map->includes_phdrs =
5315 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5316 && (segment->p_offset + segment->p_filesz
252b5132
RH
5317 >= ((bfd_vma) iehdr->e_phoff
5318 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5319
bc67d8a6 5320 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5321 phdr_included = TRUE;
252b5132
RH
5322 }
5323
bc67d8a6 5324 if (section_count == 0)
252b5132
RH
5325 {
5326 /* Special segments, such as the PT_PHDR segment, may contain
5327 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5328 something. They are allowed by the ELF spec however, so only
5329 a warning is produced. */
bc67d8a6 5330 if (segment->p_type == PT_LOAD)
caf47ea6 5331 (*_bfd_error_handler)
d003868e
AM
5332 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5333 ibfd);
252b5132 5334
bc67d8a6 5335 map->count = 0;
c044fabd
KH
5336 *pointer_to_map = map;
5337 pointer_to_map = &map->next;
252b5132
RH
5338
5339 continue;
5340 }
5341
5342 /* Now scan the sections in the input BFD again and attempt
5343 to add their corresponding output sections to the segment map.
5344 The problem here is how to handle an output section which has
5345 been moved (ie had its LMA changed). There are four possibilities:
5346
5347 1. None of the sections have been moved.
5348 In this case we can continue to use the segment LMA from the
5349 input BFD.
5350
5351 2. All of the sections have been moved by the same amount.
5352 In this case we can change the segment's LMA to match the LMA
5353 of the first section.
5354
5355 3. Some of the sections have been moved, others have not.
5356 In this case those sections which have not been moved can be
5357 placed in the current segment which will have to have its size,
5358 and possibly its LMA changed, and a new segment or segments will
5359 have to be created to contain the other sections.
5360
b5f852ea 5361 4. The sections have been moved, but not by the same amount.
252b5132
RH
5362 In this case we can change the segment's LMA to match the LMA
5363 of the first section and we will have to create a new segment
5364 or segments to contain the other sections.
5365
5366 In order to save time, we allocate an array to hold the section
5367 pointers that we are interested in. As these sections get assigned
5368 to a segment, they are removed from this array. */
5369
0b14c2aa
L
5370 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5371 to work around this long long bug. */
d0fb9a8d 5372 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5373 if (sections == NULL)
b34976b6 5374 return FALSE;
252b5132
RH
5375
5376 /* Step One: Scan for segment vs section LMA conflicts.
5377 Also add the sections to the section array allocated above.
5378 Also add the sections to the current segment. In the common
5379 case, where the sections have not been moved, this means that
5380 we have completely filled the segment, and there is nothing
5381 more to do. */
252b5132 5382 isec = 0;
72730e0c 5383 matching_lma = 0;
252b5132
RH
5384 suggested_lma = 0;
5385
bc67d8a6
NC
5386 for (j = 0, section = ibfd->sections;
5387 section != NULL;
5388 section = section->next)
252b5132 5389 {
caf47ea6 5390 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5391 {
bc67d8a6
NC
5392 output_section = section->output_section;
5393
5394 sections[j ++] = section;
252b5132
RH
5395
5396 /* The Solaris native linker always sets p_paddr to 0.
5397 We try to catch that case here, and set it to the
5e8d7549
NC
5398 correct value. Note - some backends require that
5399 p_paddr be left as zero. */
bc67d8a6 5400 if (segment->p_paddr == 0
4455705d 5401 && segment->p_vaddr != 0
5e8d7549 5402 && (! bed->want_p_paddr_set_to_zero)
252b5132 5403 && isec == 0
bc67d8a6
NC
5404 && output_section->lma != 0
5405 && (output_section->vma == (segment->p_vaddr
5406 + (map->includes_filehdr
5407 ? iehdr->e_ehsize
5408 : 0)
5409 + (map->includes_phdrs
079e9a2f
AM
5410 ? (iehdr->e_phnum
5411 * iehdr->e_phentsize)
bc67d8a6
NC
5412 : 0))))
5413 map->p_paddr = segment->p_vaddr;
252b5132
RH
5414
5415 /* Match up the physical address of the segment with the
5416 LMA address of the output section. */
bc67d8a6 5417 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5418 || IS_COREFILE_NOTE (segment, section)
5419 || (bed->want_p_paddr_set_to_zero &&
5420 IS_CONTAINED_BY_VMA (output_section, segment))
5421 )
252b5132
RH
5422 {
5423 if (matching_lma == 0)
bc67d8a6 5424 matching_lma = output_section->lma;
252b5132
RH
5425
5426 /* We assume that if the section fits within the segment
bc67d8a6 5427 then it does not overlap any other section within that
252b5132 5428 segment. */
bc67d8a6 5429 map->sections[isec ++] = output_section;
252b5132
RH
5430 }
5431 else if (suggested_lma == 0)
bc67d8a6 5432 suggested_lma = output_section->lma;
252b5132
RH
5433 }
5434 }
5435
bc67d8a6 5436 BFD_ASSERT (j == section_count);
252b5132
RH
5437
5438 /* Step Two: Adjust the physical address of the current segment,
5439 if necessary. */
bc67d8a6 5440 if (isec == section_count)
252b5132
RH
5441 {
5442 /* All of the sections fitted within the segment as currently
5443 specified. This is the default case. Add the segment to
5444 the list of built segments and carry on to process the next
5445 program header in the input BFD. */
bc67d8a6 5446 map->count = section_count;
c044fabd
KH
5447 *pointer_to_map = map;
5448 pointer_to_map = &map->next;
252b5132
RH
5449
5450 free (sections);
5451 continue;
5452 }
252b5132
RH
5453 else
5454 {
72730e0c
AM
5455 if (matching_lma != 0)
5456 {
5457 /* At least one section fits inside the current segment.
5458 Keep it, but modify its physical address to match the
5459 LMA of the first section that fitted. */
bc67d8a6 5460 map->p_paddr = matching_lma;
72730e0c
AM
5461 }
5462 else
5463 {
5464 /* None of the sections fitted inside the current segment.
5465 Change the current segment's physical address to match
5466 the LMA of the first section. */
bc67d8a6 5467 map->p_paddr = suggested_lma;
72730e0c
AM
5468 }
5469
bc67d8a6
NC
5470 /* Offset the segment physical address from the lma
5471 to allow for space taken up by elf headers. */
5472 if (map->includes_filehdr)
5473 map->p_paddr -= iehdr->e_ehsize;
252b5132 5474
bc67d8a6
NC
5475 if (map->includes_phdrs)
5476 {
5477 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5478
5479 /* iehdr->e_phnum is just an estimate of the number
5480 of program headers that we will need. Make a note
5481 here of the number we used and the segment we chose
5482 to hold these headers, so that we can adjust the
5483 offset when we know the correct value. */
5484 phdr_adjust_num = iehdr->e_phnum;
5485 phdr_adjust_seg = map;
5486 }
252b5132
RH
5487 }
5488
5489 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5490 those that fit to the current segment and removing them from the
252b5132
RH
5491 sections array; but making sure not to leave large gaps. Once all
5492 possible sections have been assigned to the current segment it is
5493 added to the list of built segments and if sections still remain
5494 to be assigned, a new segment is constructed before repeating
5495 the loop. */
5496 isec = 0;
5497 do
5498 {
bc67d8a6 5499 map->count = 0;
252b5132
RH
5500 suggested_lma = 0;
5501
5502 /* Fill the current segment with sections that fit. */
bc67d8a6 5503 for (j = 0; j < section_count; j++)
252b5132 5504 {
bc67d8a6 5505 section = sections[j];
252b5132 5506
bc67d8a6 5507 if (section == NULL)
252b5132
RH
5508 continue;
5509
bc67d8a6 5510 output_section = section->output_section;
252b5132 5511
bc67d8a6 5512 BFD_ASSERT (output_section != NULL);
c044fabd 5513
bc67d8a6
NC
5514 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5515 || IS_COREFILE_NOTE (segment, section))
252b5132 5516 {
bc67d8a6 5517 if (map->count == 0)
252b5132
RH
5518 {
5519 /* If the first section in a segment does not start at
bc67d8a6
NC
5520 the beginning of the segment, then something is
5521 wrong. */
5522 if (output_section->lma !=
5523 (map->p_paddr
5524 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5525 + (map->includes_phdrs
5526 ? iehdr->e_phnum * iehdr->e_phentsize
5527 : 0)))
252b5132
RH
5528 abort ();
5529 }
5530 else
5531 {
5532 asection * prev_sec;
252b5132 5533
bc67d8a6 5534 prev_sec = map->sections[map->count - 1];
252b5132
RH
5535
5536 /* If the gap between the end of the previous section
bc67d8a6
NC
5537 and the start of this section is more than
5538 maxpagesize then we need to start a new segment. */
eea6121a 5539 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5540 maxpagesize)
caf47ea6 5541 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5542 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5543 > output_section->lma))
252b5132
RH
5544 {
5545 if (suggested_lma == 0)
bc67d8a6 5546 suggested_lma = output_section->lma;
252b5132
RH
5547
5548 continue;
5549 }
5550 }
5551
bc67d8a6 5552 map->sections[map->count++] = output_section;
252b5132
RH
5553 ++isec;
5554 sections[j] = NULL;
b34976b6 5555 section->segment_mark = TRUE;
252b5132
RH
5556 }
5557 else if (suggested_lma == 0)
bc67d8a6 5558 suggested_lma = output_section->lma;
252b5132
RH
5559 }
5560
bc67d8a6 5561 BFD_ASSERT (map->count > 0);
252b5132
RH
5562
5563 /* Add the current segment to the list of built segments. */
c044fabd
KH
5564 *pointer_to_map = map;
5565 pointer_to_map = &map->next;
252b5132 5566
bc67d8a6 5567 if (isec < section_count)
252b5132
RH
5568 {
5569 /* We still have not allocated all of the sections to
5570 segments. Create a new segment here, initialise it
5571 and carry on looping. */
dc810e39
AM
5572 amt = sizeof (struct elf_segment_map);
5573 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5574 map = bfd_alloc (obfd, amt);
bc67d8a6 5575 if (map == NULL)
5ed6aba4
NC
5576 {
5577 free (sections);
5578 return FALSE;
5579 }
252b5132
RH
5580
5581 /* Initialise the fields of the segment map. Set the physical
5582 physical address to the LMA of the first section that has
5583 not yet been assigned. */
bc67d8a6
NC
5584 map->next = NULL;
5585 map->p_type = segment->p_type;
5586 map->p_flags = segment->p_flags;
5587 map->p_flags_valid = 1;
5588 map->p_paddr = suggested_lma;
5589 map->p_paddr_valid = 1;
5590 map->includes_filehdr = 0;
5591 map->includes_phdrs = 0;
252b5132
RH
5592 }
5593 }
bc67d8a6 5594 while (isec < section_count);
252b5132
RH
5595
5596 free (sections);
5597 }
5598
5599 /* The Solaris linker creates program headers in which all the
5600 p_paddr fields are zero. When we try to objcopy or strip such a
5601 file, we get confused. Check for this case, and if we find it
5602 reset the p_paddr_valid fields. */
bc67d8a6
NC
5603 for (map = map_first; map != NULL; map = map->next)
5604 if (map->p_paddr != 0)
252b5132 5605 break;
bc67d8a6 5606 if (map == NULL)
b5f852ea
NC
5607 for (map = map_first; map != NULL; map = map->next)
5608 map->p_paddr_valid = 0;
252b5132 5609
bc67d8a6
NC
5610 elf_tdata (obfd)->segment_map = map_first;
5611
5612 /* If we had to estimate the number of program headers that were
9ad5cbcf 5613 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5614 the offset if necessary. */
5615 if (phdr_adjust_seg != NULL)
5616 {
5617 unsigned int count;
c044fabd 5618
bc67d8a6 5619 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5620 count++;
252b5132 5621
bc67d8a6
NC
5622 if (count > phdr_adjust_num)
5623 phdr_adjust_seg->p_paddr
5624 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5625 }
c044fabd 5626
bc67d8a6 5627#undef SEGMENT_END
eecdbe52 5628#undef SECTION_SIZE
bc67d8a6
NC
5629#undef IS_CONTAINED_BY_VMA
5630#undef IS_CONTAINED_BY_LMA
252b5132 5631#undef IS_COREFILE_NOTE
bc67d8a6
NC
5632#undef IS_SOLARIS_PT_INTERP
5633#undef INCLUDE_SECTION_IN_SEGMENT
5634#undef SEGMENT_AFTER_SEGMENT
5635#undef SEGMENT_OVERLAPS
b34976b6 5636 return TRUE;
252b5132
RH
5637}
5638
5639/* Copy private section information. This copies over the entsize
5640 field, and sometimes the info field. */
5641
b34976b6 5642bfd_boolean
217aa764
AM
5643_bfd_elf_copy_private_section_data (bfd *ibfd,
5644 asection *isec,
5645 bfd *obfd,
5646 asection *osec)
252b5132
RH
5647{
5648 Elf_Internal_Shdr *ihdr, *ohdr;
5649
5650 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5651 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5652 return TRUE;
252b5132 5653
252b5132
RH
5654 ihdr = &elf_section_data (isec)->this_hdr;
5655 ohdr = &elf_section_data (osec)->this_hdr;
5656
5657 ohdr->sh_entsize = ihdr->sh_entsize;
5658
5659 if (ihdr->sh_type == SHT_SYMTAB
5660 || ihdr->sh_type == SHT_DYNSYM
5661 || ihdr->sh_type == SHT_GNU_verneed
5662 || ihdr->sh_type == SHT_GNU_verdef)
5663 ohdr->sh_info = ihdr->sh_info;
5664
9dce4196
AM
5665 /* Set things up for objcopy. The output SHT_GROUP section will
5666 have its elf_next_in_group pointing back to the input group
278d8f37
L
5667 members. Ignore linker created group section. See
5668 elfNN_ia64_object_p in elfxx-ia64.c. */
5669 if (elf_sec_group (isec) == NULL
5670 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5671 {
5672 elf_next_in_group (osec) = elf_next_in_group (isec);
5673 elf_group_name (osec) = elf_group_name (isec);
5674 }
9dce4196 5675
68bfbfcc 5676 osec->use_rela_p = isec->use_rela_p;
bf572ba0 5677
b34976b6 5678 return TRUE;
252b5132
RH
5679}
5680
80fccad2
BW
5681/* Copy private header information. */
5682
5683bfd_boolean
5684_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
5685{
5686 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5687 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5688 return TRUE;
5689
5690 /* Copy over private BFD data if it has not already been copied.
5691 This must be done here, rather than in the copy_private_bfd_data
5692 entry point, because the latter is called after the section
5693 contents have been set, which means that the program headers have
5694 already been worked out. */
5695 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
5696 {
5697 if (! copy_private_bfd_data (ibfd, obfd))
5698 return FALSE;
5699 }
5700
5701 return TRUE;
5702}
5703
252b5132
RH
5704/* Copy private symbol information. If this symbol is in a section
5705 which we did not map into a BFD section, try to map the section
5706 index correctly. We use special macro definitions for the mapped
5707 section indices; these definitions are interpreted by the
5708 swap_out_syms function. */
5709
9ad5cbcf
AM
5710#define MAP_ONESYMTAB (SHN_HIOS + 1)
5711#define MAP_DYNSYMTAB (SHN_HIOS + 2)
5712#define MAP_STRTAB (SHN_HIOS + 3)
5713#define MAP_SHSTRTAB (SHN_HIOS + 4)
5714#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 5715
b34976b6 5716bfd_boolean
217aa764
AM
5717_bfd_elf_copy_private_symbol_data (bfd *ibfd,
5718 asymbol *isymarg,
5719 bfd *obfd,
5720 asymbol *osymarg)
252b5132
RH
5721{
5722 elf_symbol_type *isym, *osym;
5723
5724 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5725 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5726 return TRUE;
252b5132
RH
5727
5728 isym = elf_symbol_from (ibfd, isymarg);
5729 osym = elf_symbol_from (obfd, osymarg);
5730
5731 if (isym != NULL
5732 && osym != NULL
5733 && bfd_is_abs_section (isym->symbol.section))
5734 {
5735 unsigned int shndx;
5736
5737 shndx = isym->internal_elf_sym.st_shndx;
5738 if (shndx == elf_onesymtab (ibfd))
5739 shndx = MAP_ONESYMTAB;
5740 else if (shndx == elf_dynsymtab (ibfd))
5741 shndx = MAP_DYNSYMTAB;
5742 else if (shndx == elf_tdata (ibfd)->strtab_section)
5743 shndx = MAP_STRTAB;
5744 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
5745 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
5746 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
5747 shndx = MAP_SYM_SHNDX;
252b5132
RH
5748 osym->internal_elf_sym.st_shndx = shndx;
5749 }
5750
b34976b6 5751 return TRUE;
252b5132
RH
5752}
5753
5754/* Swap out the symbols. */
5755
b34976b6 5756static bfd_boolean
217aa764
AM
5757swap_out_syms (bfd *abfd,
5758 struct bfd_strtab_hash **sttp,
5759 int relocatable_p)
252b5132 5760{
9c5bfbb7 5761 const struct elf_backend_data *bed;
079e9a2f
AM
5762 int symcount;
5763 asymbol **syms;
5764 struct bfd_strtab_hash *stt;
5765 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 5766 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 5767 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
5768 bfd_byte *outbound_syms;
5769 bfd_byte *outbound_shndx;
079e9a2f
AM
5770 int idx;
5771 bfd_size_type amt;
174fd7f9 5772 bfd_boolean name_local_sections;
252b5132
RH
5773
5774 if (!elf_map_symbols (abfd))
b34976b6 5775 return FALSE;
252b5132 5776
c044fabd 5777 /* Dump out the symtabs. */
079e9a2f
AM
5778 stt = _bfd_elf_stringtab_init ();
5779 if (stt == NULL)
b34976b6 5780 return FALSE;
252b5132 5781
079e9a2f
AM
5782 bed = get_elf_backend_data (abfd);
5783 symcount = bfd_get_symcount (abfd);
5784 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5785 symtab_hdr->sh_type = SHT_SYMTAB;
5786 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
5787 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
5788 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 5789 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
5790
5791 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5792 symstrtab_hdr->sh_type = SHT_STRTAB;
5793
d0fb9a8d 5794 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 5795 if (outbound_syms == NULL)
5ed6aba4
NC
5796 {
5797 _bfd_stringtab_free (stt);
5798 return FALSE;
5799 }
217aa764 5800 symtab_hdr->contents = outbound_syms;
252b5132 5801
9ad5cbcf
AM
5802 outbound_shndx = NULL;
5803 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5804 if (symtab_shndx_hdr->sh_name != 0)
5805 {
5806 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
5807 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
5808 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 5809 if (outbound_shndx == NULL)
5ed6aba4
NC
5810 {
5811 _bfd_stringtab_free (stt);
5812 return FALSE;
5813 }
5814
9ad5cbcf
AM
5815 symtab_shndx_hdr->contents = outbound_shndx;
5816 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5817 symtab_shndx_hdr->sh_size = amt;
5818 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5819 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5820 }
5821
589e6347 5822 /* Now generate the data (for "contents"). */
079e9a2f
AM
5823 {
5824 /* Fill in zeroth symbol and swap it out. */
5825 Elf_Internal_Sym sym;
5826 sym.st_name = 0;
5827 sym.st_value = 0;
5828 sym.st_size = 0;
5829 sym.st_info = 0;
5830 sym.st_other = 0;
5831 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 5832 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5833 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5834 if (outbound_shndx != NULL)
5835 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5836 }
252b5132 5837
174fd7f9
RS
5838 name_local_sections
5839 = (bed->elf_backend_name_local_section_symbols
5840 && bed->elf_backend_name_local_section_symbols (abfd));
5841
079e9a2f
AM
5842 syms = bfd_get_outsymbols (abfd);
5843 for (idx = 0; idx < symcount; idx++)
252b5132 5844 {
252b5132 5845 Elf_Internal_Sym sym;
079e9a2f
AM
5846 bfd_vma value = syms[idx]->value;
5847 elf_symbol_type *type_ptr;
5848 flagword flags = syms[idx]->flags;
5849 int type;
252b5132 5850
174fd7f9
RS
5851 if (!name_local_sections
5852 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
5853 {
5854 /* Local section symbols have no name. */
5855 sym.st_name = 0;
5856 }
5857 else
5858 {
5859 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
5860 syms[idx]->name,
b34976b6 5861 TRUE, FALSE);
079e9a2f 5862 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
5863 {
5864 _bfd_stringtab_free (stt);
5865 return FALSE;
5866 }
079e9a2f 5867 }
252b5132 5868
079e9a2f 5869 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 5870
079e9a2f
AM
5871 if ((flags & BSF_SECTION_SYM) == 0
5872 && bfd_is_com_section (syms[idx]->section))
5873 {
5874 /* ELF common symbols put the alignment into the `value' field,
5875 and the size into the `size' field. This is backwards from
5876 how BFD handles it, so reverse it here. */
5877 sym.st_size = value;
5878 if (type_ptr == NULL
5879 || type_ptr->internal_elf_sym.st_value == 0)
5880 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
5881 else
5882 sym.st_value = type_ptr->internal_elf_sym.st_value;
5883 sym.st_shndx = _bfd_elf_section_from_bfd_section
5884 (abfd, syms[idx]->section);
5885 }
5886 else
5887 {
5888 asection *sec = syms[idx]->section;
5889 int shndx;
252b5132 5890
079e9a2f
AM
5891 if (sec->output_section)
5892 {
5893 value += sec->output_offset;
5894 sec = sec->output_section;
5895 }
589e6347 5896
079e9a2f
AM
5897 /* Don't add in the section vma for relocatable output. */
5898 if (! relocatable_p)
5899 value += sec->vma;
5900 sym.st_value = value;
5901 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
5902
5903 if (bfd_is_abs_section (sec)
5904 && type_ptr != NULL
5905 && type_ptr->internal_elf_sym.st_shndx != 0)
5906 {
5907 /* This symbol is in a real ELF section which we did
5908 not create as a BFD section. Undo the mapping done
5909 by copy_private_symbol_data. */
5910 shndx = type_ptr->internal_elf_sym.st_shndx;
5911 switch (shndx)
5912 {
5913 case MAP_ONESYMTAB:
5914 shndx = elf_onesymtab (abfd);
5915 break;
5916 case MAP_DYNSYMTAB:
5917 shndx = elf_dynsymtab (abfd);
5918 break;
5919 case MAP_STRTAB:
5920 shndx = elf_tdata (abfd)->strtab_section;
5921 break;
5922 case MAP_SHSTRTAB:
5923 shndx = elf_tdata (abfd)->shstrtab_section;
5924 break;
9ad5cbcf
AM
5925 case MAP_SYM_SHNDX:
5926 shndx = elf_tdata (abfd)->symtab_shndx_section;
5927 break;
079e9a2f
AM
5928 default:
5929 break;
5930 }
5931 }
5932 else
5933 {
5934 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 5935
079e9a2f
AM
5936 if (shndx == -1)
5937 {
5938 asection *sec2;
5939
5940 /* Writing this would be a hell of a lot easier if
5941 we had some decent documentation on bfd, and
5942 knew what to expect of the library, and what to
5943 demand of applications. For example, it
5944 appears that `objcopy' might not set the
5945 section of a symbol to be a section that is
5946 actually in the output file. */
5947 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
5948 if (sec2 == NULL)
5949 {
5950 _bfd_error_handler (_("\
5951Unable to find equivalent output section for symbol '%s' from section '%s'"),
5952 syms[idx]->name ? syms[idx]->name : "<Local sym>",
5953 sec->name);
811072d8 5954 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 5955 _bfd_stringtab_free (stt);
589e6347
NC
5956 return FALSE;
5957 }
811072d8 5958
079e9a2f
AM
5959 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
5960 BFD_ASSERT (shndx != -1);
5961 }
5962 }
252b5132 5963
079e9a2f
AM
5964 sym.st_shndx = shndx;
5965 }
252b5132 5966
13ae64f3
JJ
5967 if ((flags & BSF_THREAD_LOCAL) != 0)
5968 type = STT_TLS;
5969 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
5970 type = STT_FUNC;
5971 else if ((flags & BSF_OBJECT) != 0)
5972 type = STT_OBJECT;
5973 else
5974 type = STT_NOTYPE;
252b5132 5975
13ae64f3
JJ
5976 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
5977 type = STT_TLS;
5978
589e6347 5979 /* Processor-specific types. */
079e9a2f
AM
5980 if (type_ptr != NULL
5981 && bed->elf_backend_get_symbol_type)
5982 type = ((*bed->elf_backend_get_symbol_type)
5983 (&type_ptr->internal_elf_sym, type));
252b5132 5984
079e9a2f
AM
5985 if (flags & BSF_SECTION_SYM)
5986 {
5987 if (flags & BSF_GLOBAL)
5988 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
5989 else
5990 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5991 }
5992 else if (bfd_is_com_section (syms[idx]->section))
5993 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
5994 else if (bfd_is_und_section (syms[idx]->section))
5995 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
5996 ? STB_WEAK
5997 : STB_GLOBAL),
5998 type);
5999 else if (flags & BSF_FILE)
6000 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6001 else
6002 {
6003 int bind = STB_LOCAL;
252b5132 6004
079e9a2f
AM
6005 if (flags & BSF_LOCAL)
6006 bind = STB_LOCAL;
6007 else if (flags & BSF_WEAK)
6008 bind = STB_WEAK;
6009 else if (flags & BSF_GLOBAL)
6010 bind = STB_GLOBAL;
252b5132 6011
079e9a2f
AM
6012 sym.st_info = ELF_ST_INFO (bind, type);
6013 }
252b5132 6014
079e9a2f
AM
6015 if (type_ptr != NULL)
6016 sym.st_other = type_ptr->internal_elf_sym.st_other;
6017 else
6018 sym.st_other = 0;
252b5132 6019
9ad5cbcf 6020 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6021 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6022 if (outbound_shndx != NULL)
6023 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6024 }
252b5132 6025
079e9a2f
AM
6026 *sttp = stt;
6027 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6028 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6029
079e9a2f
AM
6030 symstrtab_hdr->sh_flags = 0;
6031 symstrtab_hdr->sh_addr = 0;
6032 symstrtab_hdr->sh_entsize = 0;
6033 symstrtab_hdr->sh_link = 0;
6034 symstrtab_hdr->sh_info = 0;
6035 symstrtab_hdr->sh_addralign = 1;
252b5132 6036
b34976b6 6037 return TRUE;
252b5132
RH
6038}
6039
6040/* Return the number of bytes required to hold the symtab vector.
6041
6042 Note that we base it on the count plus 1, since we will null terminate
6043 the vector allocated based on this size. However, the ELF symbol table
6044 always has a dummy entry as symbol #0, so it ends up even. */
6045
6046long
217aa764 6047_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6048{
6049 long symcount;
6050 long symtab_size;
6051 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6052
6053 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6054 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6055 if (symcount > 0)
6056 symtab_size -= sizeof (asymbol *);
252b5132
RH
6057
6058 return symtab_size;
6059}
6060
6061long
217aa764 6062_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6063{
6064 long symcount;
6065 long symtab_size;
6066 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6067
6068 if (elf_dynsymtab (abfd) == 0)
6069 {
6070 bfd_set_error (bfd_error_invalid_operation);
6071 return -1;
6072 }
6073
6074 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6075 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6076 if (symcount > 0)
6077 symtab_size -= sizeof (asymbol *);
252b5132
RH
6078
6079 return symtab_size;
6080}
6081
6082long
217aa764
AM
6083_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6084 sec_ptr asect)
252b5132
RH
6085{
6086 return (asect->reloc_count + 1) * sizeof (arelent *);
6087}
6088
6089/* Canonicalize the relocs. */
6090
6091long
217aa764
AM
6092_bfd_elf_canonicalize_reloc (bfd *abfd,
6093 sec_ptr section,
6094 arelent **relptr,
6095 asymbol **symbols)
252b5132
RH
6096{
6097 arelent *tblptr;
6098 unsigned int i;
9c5bfbb7 6099 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6100
b34976b6 6101 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6102 return -1;
6103
6104 tblptr = section->relocation;
6105 for (i = 0; i < section->reloc_count; i++)
6106 *relptr++ = tblptr++;
6107
6108 *relptr = NULL;
6109
6110 return section->reloc_count;
6111}
6112
6113long
6cee3f79 6114_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6115{
9c5bfbb7 6116 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6117 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6118
6119 if (symcount >= 0)
6120 bfd_get_symcount (abfd) = symcount;
6121 return symcount;
6122}
6123
6124long
217aa764
AM
6125_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6126 asymbol **allocation)
252b5132 6127{
9c5bfbb7 6128 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6129 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6130
6131 if (symcount >= 0)
6132 bfd_get_dynamic_symcount (abfd) = symcount;
6133 return symcount;
252b5132
RH
6134}
6135
8615f3f2
AM
6136/* Return the size required for the dynamic reloc entries. Any loadable
6137 section that was actually installed in the BFD, and has type SHT_REL
6138 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6139 dynamic reloc section. */
252b5132
RH
6140
6141long
217aa764 6142_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6143{
6144 long ret;
6145 asection *s;
6146
6147 if (elf_dynsymtab (abfd) == 0)
6148 {
6149 bfd_set_error (bfd_error_invalid_operation);
6150 return -1;
6151 }
6152
6153 ret = sizeof (arelent *);
6154 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6155 if ((s->flags & SEC_LOAD) != 0
6156 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6157 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6158 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6159 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6160 * sizeof (arelent *));
6161
6162 return ret;
6163}
6164
8615f3f2
AM
6165/* Canonicalize the dynamic relocation entries. Note that we return the
6166 dynamic relocations as a single block, although they are actually
6167 associated with particular sections; the interface, which was
6168 designed for SunOS style shared libraries, expects that there is only
6169 one set of dynamic relocs. Any loadable section that was actually
6170 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6171 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6172
6173long
217aa764
AM
6174_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6175 arelent **storage,
6176 asymbol **syms)
252b5132 6177{
217aa764 6178 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6179 asection *s;
6180 long ret;
6181
6182 if (elf_dynsymtab (abfd) == 0)
6183 {
6184 bfd_set_error (bfd_error_invalid_operation);
6185 return -1;
6186 }
6187
6188 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6189 ret = 0;
6190 for (s = abfd->sections; s != NULL; s = s->next)
6191 {
8615f3f2
AM
6192 if ((s->flags & SEC_LOAD) != 0
6193 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6194 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6195 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6196 {
6197 arelent *p;
6198 long count, i;
6199
b34976b6 6200 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6201 return -1;
eea6121a 6202 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6203 p = s->relocation;
6204 for (i = 0; i < count; i++)
6205 *storage++ = p++;
6206 ret += count;
6207 }
6208 }
6209
6210 *storage = NULL;
6211
6212 return ret;
6213}
6214\f
6215/* Read in the version information. */
6216
b34976b6 6217bfd_boolean
fc0e6df6 6218_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6219{
6220 bfd_byte *contents = NULL;
fc0e6df6
PB
6221 unsigned int freeidx = 0;
6222
6223 if (elf_dynverref (abfd) != 0)
6224 {
6225 Elf_Internal_Shdr *hdr;
6226 Elf_External_Verneed *everneed;
6227 Elf_Internal_Verneed *iverneed;
6228 unsigned int i;
d0fb9a8d 6229 bfd_byte *contents_end;
fc0e6df6
PB
6230
6231 hdr = &elf_tdata (abfd)->dynverref_hdr;
6232
d0fb9a8d
JJ
6233 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6234 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6235 if (elf_tdata (abfd)->verref == NULL)
6236 goto error_return;
6237
6238 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6239
6240 contents = bfd_malloc (hdr->sh_size);
6241 if (contents == NULL)
d0fb9a8d
JJ
6242 {
6243error_return_verref:
6244 elf_tdata (abfd)->verref = NULL;
6245 elf_tdata (abfd)->cverrefs = 0;
6246 goto error_return;
6247 }
fc0e6df6
PB
6248 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6249 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6250 goto error_return_verref;
fc0e6df6 6251
d0fb9a8d
JJ
6252 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6253 goto error_return_verref;
6254
6255 BFD_ASSERT (sizeof (Elf_External_Verneed)
6256 == sizeof (Elf_External_Vernaux));
6257 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6258 everneed = (Elf_External_Verneed *) contents;
6259 iverneed = elf_tdata (abfd)->verref;
6260 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6261 {
6262 Elf_External_Vernaux *evernaux;
6263 Elf_Internal_Vernaux *ivernaux;
6264 unsigned int j;
6265
6266 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6267
6268 iverneed->vn_bfd = abfd;
6269
6270 iverneed->vn_filename =
6271 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6272 iverneed->vn_file);
6273 if (iverneed->vn_filename == NULL)
d0fb9a8d 6274 goto error_return_verref;
fc0e6df6 6275
d0fb9a8d
JJ
6276 if (iverneed->vn_cnt == 0)
6277 iverneed->vn_auxptr = NULL;
6278 else
6279 {
6280 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6281 sizeof (Elf_Internal_Vernaux));
6282 if (iverneed->vn_auxptr == NULL)
6283 goto error_return_verref;
6284 }
6285
6286 if (iverneed->vn_aux
6287 > (size_t) (contents_end - (bfd_byte *) everneed))
6288 goto error_return_verref;
fc0e6df6
PB
6289
6290 evernaux = ((Elf_External_Vernaux *)
6291 ((bfd_byte *) everneed + iverneed->vn_aux));
6292 ivernaux = iverneed->vn_auxptr;
6293 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6294 {
6295 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6296
6297 ivernaux->vna_nodename =
6298 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6299 ivernaux->vna_name);
6300 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6301 goto error_return_verref;
fc0e6df6
PB
6302
6303 if (j + 1 < iverneed->vn_cnt)
6304 ivernaux->vna_nextptr = ivernaux + 1;
6305 else
6306 ivernaux->vna_nextptr = NULL;
6307
d0fb9a8d
JJ
6308 if (ivernaux->vna_next
6309 > (size_t) (contents_end - (bfd_byte *) evernaux))
6310 goto error_return_verref;
6311
fc0e6df6
PB
6312 evernaux = ((Elf_External_Vernaux *)
6313 ((bfd_byte *) evernaux + ivernaux->vna_next));
6314
6315 if (ivernaux->vna_other > freeidx)
6316 freeidx = ivernaux->vna_other;
6317 }
6318
6319 if (i + 1 < hdr->sh_info)
6320 iverneed->vn_nextref = iverneed + 1;
6321 else
6322 iverneed->vn_nextref = NULL;
6323
d0fb9a8d
JJ
6324 if (iverneed->vn_next
6325 > (size_t) (contents_end - (bfd_byte *) everneed))
6326 goto error_return_verref;
6327
fc0e6df6
PB
6328 everneed = ((Elf_External_Verneed *)
6329 ((bfd_byte *) everneed + iverneed->vn_next));
6330 }
6331
6332 free (contents);
6333 contents = NULL;
6334 }
252b5132
RH
6335
6336 if (elf_dynverdef (abfd) != 0)
6337 {
6338 Elf_Internal_Shdr *hdr;
6339 Elf_External_Verdef *everdef;
6340 Elf_Internal_Verdef *iverdef;
f631889e
UD
6341 Elf_Internal_Verdef *iverdefarr;
6342 Elf_Internal_Verdef iverdefmem;
252b5132 6343 unsigned int i;
062e2358 6344 unsigned int maxidx;
d0fb9a8d 6345 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6346
6347 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6348
217aa764 6349 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6350 if (contents == NULL)
6351 goto error_return;
6352 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6353 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6354 goto error_return;
6355
d0fb9a8d
JJ
6356 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6357 goto error_return;
6358
6359 BFD_ASSERT (sizeof (Elf_External_Verdef)
6360 >= sizeof (Elf_External_Verdaux));
6361 contents_end_def = contents + hdr->sh_size
6362 - sizeof (Elf_External_Verdef);
6363 contents_end_aux = contents + hdr->sh_size
6364 - sizeof (Elf_External_Verdaux);
6365
f631889e
UD
6366 /* We know the number of entries in the section but not the maximum
6367 index. Therefore we have to run through all entries and find
6368 the maximum. */
252b5132 6369 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6370 maxidx = 0;
6371 for (i = 0; i < hdr->sh_info; ++i)
6372 {
6373 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6374
062e2358
AM
6375 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6376 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6377
d0fb9a8d
JJ
6378 if (iverdefmem.vd_next
6379 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6380 goto error_return;
6381
f631889e
UD
6382 everdef = ((Elf_External_Verdef *)
6383 ((bfd_byte *) everdef + iverdefmem.vd_next));
6384 }
6385
fc0e6df6
PB
6386 if (default_imported_symver)
6387 {
6388 if (freeidx > maxidx)
6389 maxidx = ++freeidx;
6390 else
6391 freeidx = ++maxidx;
6392 }
d0fb9a8d
JJ
6393 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6394 sizeof (Elf_Internal_Verdef));
f631889e
UD
6395 if (elf_tdata (abfd)->verdef == NULL)
6396 goto error_return;
6397
6398 elf_tdata (abfd)->cverdefs = maxidx;
6399
6400 everdef = (Elf_External_Verdef *) contents;
6401 iverdefarr = elf_tdata (abfd)->verdef;
6402 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6403 {
6404 Elf_External_Verdaux *everdaux;
6405 Elf_Internal_Verdaux *iverdaux;
6406 unsigned int j;
6407
f631889e
UD
6408 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6409
d0fb9a8d
JJ
6410 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6411 {
6412error_return_verdef:
6413 elf_tdata (abfd)->verdef = NULL;
6414 elf_tdata (abfd)->cverdefs = 0;
6415 goto error_return;
6416 }
6417
f631889e
UD
6418 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6419 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6420
6421 iverdef->vd_bfd = abfd;
6422
d0fb9a8d
JJ
6423 if (iverdef->vd_cnt == 0)
6424 iverdef->vd_auxptr = NULL;
6425 else
6426 {
6427 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6428 sizeof (Elf_Internal_Verdaux));
6429 if (iverdef->vd_auxptr == NULL)
6430 goto error_return_verdef;
6431 }
6432
6433 if (iverdef->vd_aux
6434 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6435 goto error_return_verdef;
252b5132
RH
6436
6437 everdaux = ((Elf_External_Verdaux *)
6438 ((bfd_byte *) everdef + iverdef->vd_aux));
6439 iverdaux = iverdef->vd_auxptr;
6440 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6441 {
6442 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6443
6444 iverdaux->vda_nodename =
6445 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6446 iverdaux->vda_name);
6447 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6448 goto error_return_verdef;
252b5132
RH
6449
6450 if (j + 1 < iverdef->vd_cnt)
6451 iverdaux->vda_nextptr = iverdaux + 1;
6452 else
6453 iverdaux->vda_nextptr = NULL;
6454
d0fb9a8d
JJ
6455 if (iverdaux->vda_next
6456 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6457 goto error_return_verdef;
6458
252b5132
RH
6459 everdaux = ((Elf_External_Verdaux *)
6460 ((bfd_byte *) everdaux + iverdaux->vda_next));
6461 }
6462
d0fb9a8d
JJ
6463 if (iverdef->vd_cnt)
6464 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6465
d0fb9a8d 6466 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6467 iverdef->vd_nextdef = iverdef + 1;
6468 else
6469 iverdef->vd_nextdef = NULL;
6470
6471 everdef = ((Elf_External_Verdef *)
6472 ((bfd_byte *) everdef + iverdef->vd_next));
6473 }
6474
6475 free (contents);
6476 contents = NULL;
6477 }
fc0e6df6 6478 else if (default_imported_symver)
252b5132 6479 {
fc0e6df6
PB
6480 if (freeidx < 3)
6481 freeidx = 3;
6482 else
6483 freeidx++;
252b5132 6484
d0fb9a8d
JJ
6485 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6486 sizeof (Elf_Internal_Verdef));
fc0e6df6 6487 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6488 goto error_return;
6489
fc0e6df6
PB
6490 elf_tdata (abfd)->cverdefs = freeidx;
6491 }
252b5132 6492
fc0e6df6
PB
6493 /* Create a default version based on the soname. */
6494 if (default_imported_symver)
6495 {
6496 Elf_Internal_Verdef *iverdef;
6497 Elf_Internal_Verdaux *iverdaux;
252b5132 6498
fc0e6df6 6499 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6500
fc0e6df6
PB
6501 iverdef->vd_version = VER_DEF_CURRENT;
6502 iverdef->vd_flags = 0;
6503 iverdef->vd_ndx = freeidx;
6504 iverdef->vd_cnt = 1;
252b5132 6505
fc0e6df6 6506 iverdef->vd_bfd = abfd;
252b5132 6507
fc0e6df6
PB
6508 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6509 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6510 goto error_return_verdef;
fc0e6df6 6511 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6512 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6513 if (iverdef->vd_auxptr == NULL)
6514 goto error_return_verdef;
252b5132 6515
fc0e6df6
PB
6516 iverdaux = iverdef->vd_auxptr;
6517 iverdaux->vda_nodename = iverdef->vd_nodename;
6518 iverdaux->vda_nextptr = NULL;
252b5132
RH
6519 }
6520
b34976b6 6521 return TRUE;
252b5132
RH
6522
6523 error_return:
5ed6aba4 6524 if (contents != NULL)
252b5132 6525 free (contents);
b34976b6 6526 return FALSE;
252b5132
RH
6527}
6528\f
6529asymbol *
217aa764 6530_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6531{
6532 elf_symbol_type *newsym;
dc810e39 6533 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6534
217aa764 6535 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6536 if (!newsym)
6537 return NULL;
6538 else
6539 {
6540 newsym->symbol.the_bfd = abfd;
6541 return &newsym->symbol;
6542 }
6543}
6544
6545void
217aa764
AM
6546_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6547 asymbol *symbol,
6548 symbol_info *ret)
252b5132
RH
6549{
6550 bfd_symbol_info (symbol, ret);
6551}
6552
6553/* Return whether a symbol name implies a local symbol. Most targets
6554 use this function for the is_local_label_name entry point, but some
6555 override it. */
6556
b34976b6 6557bfd_boolean
217aa764
AM
6558_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6559 const char *name)
252b5132
RH
6560{
6561 /* Normal local symbols start with ``.L''. */
6562 if (name[0] == '.' && name[1] == 'L')
b34976b6 6563 return TRUE;
252b5132
RH
6564
6565 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6566 DWARF debugging symbols starting with ``..''. */
6567 if (name[0] == '.' && name[1] == '.')
b34976b6 6568 return TRUE;
252b5132
RH
6569
6570 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6571 emitting DWARF debugging output. I suspect this is actually a
6572 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6573 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6574 underscore to be emitted on some ELF targets). For ease of use,
6575 we treat such symbols as local. */
6576 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6577 return TRUE;
252b5132 6578
b34976b6 6579 return FALSE;
252b5132
RH
6580}
6581
6582alent *
217aa764
AM
6583_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6584 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6585{
6586 abort ();
6587 return NULL;
6588}
6589
b34976b6 6590bfd_boolean
217aa764
AM
6591_bfd_elf_set_arch_mach (bfd *abfd,
6592 enum bfd_architecture arch,
6593 unsigned long machine)
252b5132
RH
6594{
6595 /* If this isn't the right architecture for this backend, and this
6596 isn't the generic backend, fail. */
6597 if (arch != get_elf_backend_data (abfd)->arch
6598 && arch != bfd_arch_unknown
6599 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6600 return FALSE;
252b5132
RH
6601
6602 return bfd_default_set_arch_mach (abfd, arch, machine);
6603}
6604
d1fad7c6
NC
6605/* Find the function to a particular section and offset,
6606 for error reporting. */
252b5132 6607
b34976b6 6608static bfd_boolean
217aa764
AM
6609elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6610 asection *section,
6611 asymbol **symbols,
6612 bfd_vma offset,
6613 const char **filename_ptr,
6614 const char **functionname_ptr)
252b5132 6615{
252b5132 6616 const char *filename;
57426232 6617 asymbol *func, *file;
252b5132
RH
6618 bfd_vma low_func;
6619 asymbol **p;
57426232
JB
6620 /* ??? Given multiple file symbols, it is impossible to reliably
6621 choose the right file name for global symbols. File symbols are
6622 local symbols, and thus all file symbols must sort before any
6623 global symbols. The ELF spec may be interpreted to say that a
6624 file symbol must sort before other local symbols, but currently
6625 ld -r doesn't do this. So, for ld -r output, it is possible to
6626 make a better choice of file name for local symbols by ignoring
6627 file symbols appearing after a given local symbol. */
6628 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6629
252b5132
RH
6630 filename = NULL;
6631 func = NULL;
57426232 6632 file = NULL;
252b5132 6633 low_func = 0;
57426232 6634 state = nothing_seen;
252b5132
RH
6635
6636 for (p = symbols; *p != NULL; p++)
6637 {
6638 elf_symbol_type *q;
6639
6640 q = (elf_symbol_type *) *p;
6641
252b5132
RH
6642 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6643 {
6644 default:
6645 break;
6646 case STT_FILE:
57426232
JB
6647 file = &q->symbol;
6648 if (state == symbol_seen)
6649 state = file_after_symbol_seen;
6650 continue;
6651 case STT_SECTION:
6652 continue;
252b5132
RH
6653 case STT_NOTYPE:
6654 case STT_FUNC:
6b40fcba 6655 if (bfd_get_section (&q->symbol) == section
252b5132
RH
6656 && q->symbol.value >= low_func
6657 && q->symbol.value <= offset)
6658 {
6659 func = (asymbol *) q;
6660 low_func = q->symbol.value;
57426232
JB
6661 if (file == NULL)
6662 filename = NULL;
6663 else if (ELF_ST_BIND (q->internal_elf_sym.st_info) != STB_LOCAL
6664 && state == file_after_symbol_seen)
6665 filename = NULL;
6666 else
6667 filename = bfd_asymbol_name (file);
252b5132
RH
6668 }
6669 break;
6670 }
57426232
JB
6671 if (state == nothing_seen)
6672 state = symbol_seen;
252b5132
RH
6673 }
6674
6675 if (func == NULL)
b34976b6 6676 return FALSE;
252b5132 6677
d1fad7c6
NC
6678 if (filename_ptr)
6679 *filename_ptr = filename;
6680 if (functionname_ptr)
6681 *functionname_ptr = bfd_asymbol_name (func);
6682
b34976b6 6683 return TRUE;
d1fad7c6
NC
6684}
6685
6686/* Find the nearest line to a particular section and offset,
6687 for error reporting. */
6688
b34976b6 6689bfd_boolean
217aa764
AM
6690_bfd_elf_find_nearest_line (bfd *abfd,
6691 asection *section,
6692 asymbol **symbols,
6693 bfd_vma offset,
6694 const char **filename_ptr,
6695 const char **functionname_ptr,
6696 unsigned int *line_ptr)
d1fad7c6 6697{
b34976b6 6698 bfd_boolean found;
d1fad7c6
NC
6699
6700 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6701 filename_ptr, functionname_ptr,
6702 line_ptr))
d1fad7c6
NC
6703 {
6704 if (!*functionname_ptr)
4e8a9624
AM
6705 elf_find_function (abfd, section, symbols, offset,
6706 *filename_ptr ? NULL : filename_ptr,
6707 functionname_ptr);
6708
b34976b6 6709 return TRUE;
d1fad7c6
NC
6710 }
6711
6712 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6713 filename_ptr, functionname_ptr,
6714 line_ptr, 0,
6715 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
6716 {
6717 if (!*functionname_ptr)
4e8a9624
AM
6718 elf_find_function (abfd, section, symbols, offset,
6719 *filename_ptr ? NULL : filename_ptr,
6720 functionname_ptr);
6721
b34976b6 6722 return TRUE;
d1fad7c6
NC
6723 }
6724
6725 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
6726 &found, filename_ptr,
6727 functionname_ptr, line_ptr,
6728 &elf_tdata (abfd)->line_info))
b34976b6 6729 return FALSE;
dc43ada5 6730 if (found && (*functionname_ptr || *line_ptr))
b34976b6 6731 return TRUE;
d1fad7c6
NC
6732
6733 if (symbols == NULL)
b34976b6 6734 return FALSE;
d1fad7c6
NC
6735
6736 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 6737 filename_ptr, functionname_ptr))
b34976b6 6738 return FALSE;
d1fad7c6 6739
252b5132 6740 *line_ptr = 0;
b34976b6 6741 return TRUE;
252b5132
RH
6742}
6743
5420f73d
L
6744/* Find the line for a symbol. */
6745
6746bfd_boolean
6747_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
6748 const char **filename_ptr, unsigned int *line_ptr)
6749{
6750 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
6751 filename_ptr, line_ptr, 0,
6752 &elf_tdata (abfd)->dwarf2_find_line_info);
6753}
6754
4ab527b0
FF
6755/* After a call to bfd_find_nearest_line, successive calls to
6756 bfd_find_inliner_info can be used to get source information about
6757 each level of function inlining that terminated at the address
6758 passed to bfd_find_nearest_line. Currently this is only supported
6759 for DWARF2 with appropriate DWARF3 extensions. */
6760
6761bfd_boolean
6762_bfd_elf_find_inliner_info (bfd *abfd,
6763 const char **filename_ptr,
6764 const char **functionname_ptr,
6765 unsigned int *line_ptr)
6766{
6767 bfd_boolean found;
6768 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
6769 functionname_ptr, line_ptr,
6770 & elf_tdata (abfd)->dwarf2_find_line_info);
6771 return found;
6772}
6773
252b5132 6774int
217aa764 6775_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
6776{
6777 int ret;
6778
6779 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
6780 if (! reloc)
6781 ret += get_program_header_size (abfd);
6782 return ret;
6783}
6784
b34976b6 6785bfd_boolean
217aa764
AM
6786_bfd_elf_set_section_contents (bfd *abfd,
6787 sec_ptr section,
0f867abe 6788 const void *location,
217aa764
AM
6789 file_ptr offset,
6790 bfd_size_type count)
252b5132
RH
6791{
6792 Elf_Internal_Shdr *hdr;
dc810e39 6793 bfd_signed_vma pos;
252b5132
RH
6794
6795 if (! abfd->output_has_begun
217aa764 6796 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6797 return FALSE;
252b5132
RH
6798
6799 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
6800 pos = hdr->sh_offset + offset;
6801 if (bfd_seek (abfd, pos, SEEK_SET) != 0
6802 || bfd_bwrite (location, count, abfd) != count)
b34976b6 6803 return FALSE;
252b5132 6804
b34976b6 6805 return TRUE;
252b5132
RH
6806}
6807
6808void
217aa764
AM
6809_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
6810 arelent *cache_ptr ATTRIBUTE_UNUSED,
6811 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
6812{
6813 abort ();
6814}
6815
252b5132
RH
6816/* Try to convert a non-ELF reloc into an ELF one. */
6817
b34976b6 6818bfd_boolean
217aa764 6819_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 6820{
c044fabd 6821 /* Check whether we really have an ELF howto. */
252b5132
RH
6822
6823 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
6824 {
6825 bfd_reloc_code_real_type code;
6826 reloc_howto_type *howto;
6827
6828 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 6829 equivalent ELF reloc. */
252b5132
RH
6830
6831 if (areloc->howto->pc_relative)
6832 {
6833 switch (areloc->howto->bitsize)
6834 {
6835 case 8:
6836 code = BFD_RELOC_8_PCREL;
6837 break;
6838 case 12:
6839 code = BFD_RELOC_12_PCREL;
6840 break;
6841 case 16:
6842 code = BFD_RELOC_16_PCREL;
6843 break;
6844 case 24:
6845 code = BFD_RELOC_24_PCREL;
6846 break;
6847 case 32:
6848 code = BFD_RELOC_32_PCREL;
6849 break;
6850 case 64:
6851 code = BFD_RELOC_64_PCREL;
6852 break;
6853 default:
6854 goto fail;
6855 }
6856
6857 howto = bfd_reloc_type_lookup (abfd, code);
6858
6859 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
6860 {
6861 if (howto->pcrel_offset)
6862 areloc->addend += areloc->address;
6863 else
6864 areloc->addend -= areloc->address; /* addend is unsigned!! */
6865 }
6866 }
6867 else
6868 {
6869 switch (areloc->howto->bitsize)
6870 {
6871 case 8:
6872 code = BFD_RELOC_8;
6873 break;
6874 case 14:
6875 code = BFD_RELOC_14;
6876 break;
6877 case 16:
6878 code = BFD_RELOC_16;
6879 break;
6880 case 26:
6881 code = BFD_RELOC_26;
6882 break;
6883 case 32:
6884 code = BFD_RELOC_32;
6885 break;
6886 case 64:
6887 code = BFD_RELOC_64;
6888 break;
6889 default:
6890 goto fail;
6891 }
6892
6893 howto = bfd_reloc_type_lookup (abfd, code);
6894 }
6895
6896 if (howto)
6897 areloc->howto = howto;
6898 else
6899 goto fail;
6900 }
6901
b34976b6 6902 return TRUE;
252b5132
RH
6903
6904 fail:
6905 (*_bfd_error_handler)
d003868e
AM
6906 (_("%B: unsupported relocation type %s"),
6907 abfd, areloc->howto->name);
252b5132 6908 bfd_set_error (bfd_error_bad_value);
b34976b6 6909 return FALSE;
252b5132
RH
6910}
6911
b34976b6 6912bfd_boolean
217aa764 6913_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
6914{
6915 if (bfd_get_format (abfd) == bfd_object)
6916 {
6917 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 6918 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 6919 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
6920 }
6921
6922 return _bfd_generic_close_and_cleanup (abfd);
6923}
6924
6925/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
6926 in the relocation's offset. Thus we cannot allow any sort of sanity
6927 range-checking to interfere. There is nothing else to do in processing
6928 this reloc. */
6929
6930bfd_reloc_status_type
217aa764
AM
6931_bfd_elf_rel_vtable_reloc_fn
6932 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 6933 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
6934 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
6935 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
6936{
6937 return bfd_reloc_ok;
6938}
252b5132
RH
6939\f
6940/* Elf core file support. Much of this only works on native
6941 toolchains, since we rely on knowing the
6942 machine-dependent procfs structure in order to pick
c044fabd 6943 out details about the corefile. */
252b5132
RH
6944
6945#ifdef HAVE_SYS_PROCFS_H
6946# include <sys/procfs.h>
6947#endif
6948
c044fabd 6949/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
6950
6951static int
217aa764 6952elfcore_make_pid (bfd *abfd)
252b5132
RH
6953{
6954 return ((elf_tdata (abfd)->core_lwpid << 16)
6955 + (elf_tdata (abfd)->core_pid));
6956}
6957
252b5132
RH
6958/* If there isn't a section called NAME, make one, using
6959 data from SECT. Note, this function will generate a
6960 reference to NAME, so you shouldn't deallocate or
c044fabd 6961 overwrite it. */
252b5132 6962
b34976b6 6963static bfd_boolean
217aa764 6964elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 6965{
c044fabd 6966 asection *sect2;
252b5132
RH
6967
6968 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 6969 return TRUE;
252b5132
RH
6970
6971 sect2 = bfd_make_section (abfd, name);
6972 if (sect2 == NULL)
b34976b6 6973 return FALSE;
252b5132 6974
eea6121a 6975 sect2->size = sect->size;
252b5132
RH
6976 sect2->filepos = sect->filepos;
6977 sect2->flags = sect->flags;
6978 sect2->alignment_power = sect->alignment_power;
b34976b6 6979 return TRUE;
252b5132
RH
6980}
6981
bb0082d6
AM
6982/* Create a pseudosection containing SIZE bytes at FILEPOS. This
6983 actually creates up to two pseudosections:
6984 - For the single-threaded case, a section named NAME, unless
6985 such a section already exists.
6986 - For the multi-threaded case, a section named "NAME/PID", where
6987 PID is elfcore_make_pid (abfd).
6988 Both pseudosections have identical contents. */
b34976b6 6989bfd_boolean
217aa764
AM
6990_bfd_elfcore_make_pseudosection (bfd *abfd,
6991 char *name,
6992 size_t size,
6993 ufile_ptr filepos)
bb0082d6
AM
6994{
6995 char buf[100];
6996 char *threaded_name;
d4c88bbb 6997 size_t len;
bb0082d6
AM
6998 asection *sect;
6999
7000 /* Build the section name. */
7001
7002 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7003 len = strlen (buf) + 1;
217aa764 7004 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7005 if (threaded_name == NULL)
b34976b6 7006 return FALSE;
d4c88bbb 7007 memcpy (threaded_name, buf, len);
bb0082d6 7008
62f3bb11 7009 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 7010 if (sect == NULL)
b34976b6 7011 return FALSE;
eea6121a 7012 sect->size = size;
bb0082d6
AM
7013 sect->filepos = filepos;
7014 sect->flags = SEC_HAS_CONTENTS;
7015 sect->alignment_power = 2;
7016
936e320b 7017 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7018}
7019
252b5132 7020/* prstatus_t exists on:
4a938328 7021 solaris 2.5+
252b5132
RH
7022 linux 2.[01] + glibc
7023 unixware 4.2
7024*/
7025
7026#if defined (HAVE_PRSTATUS_T)
a7b97311 7027
b34976b6 7028static bfd_boolean
217aa764 7029elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7030{
eea6121a 7031 size_t size;
7ee38065 7032 int offset;
252b5132 7033
4a938328
MS
7034 if (note->descsz == sizeof (prstatus_t))
7035 {
7036 prstatus_t prstat;
252b5132 7037
eea6121a 7038 size = sizeof (prstat.pr_reg);
7ee38065 7039 offset = offsetof (prstatus_t, pr_reg);
4a938328 7040 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7041
fa49d224
NC
7042 /* Do not overwrite the core signal if it
7043 has already been set by another thread. */
7044 if (elf_tdata (abfd)->core_signal == 0)
7045 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7046 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7047
4a938328
MS
7048 /* pr_who exists on:
7049 solaris 2.5+
7050 unixware 4.2
7051 pr_who doesn't exist on:
7052 linux 2.[01]
7053 */
252b5132 7054#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7055 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7056#endif
4a938328 7057 }
7ee38065 7058#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7059 else if (note->descsz == sizeof (prstatus32_t))
7060 {
7061 /* 64-bit host, 32-bit corefile */
7062 prstatus32_t prstat;
7063
eea6121a 7064 size = sizeof (prstat.pr_reg);
7ee38065 7065 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7066 memcpy (&prstat, note->descdata, sizeof (prstat));
7067
fa49d224
NC
7068 /* Do not overwrite the core signal if it
7069 has already been set by another thread. */
7070 if (elf_tdata (abfd)->core_signal == 0)
7071 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7072 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7073
7074 /* pr_who exists on:
7075 solaris 2.5+
7076 unixware 4.2
7077 pr_who doesn't exist on:
7078 linux 2.[01]
7079 */
7ee38065 7080#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7081 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7082#endif
7083 }
7ee38065 7084#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7085 else
7086 {
7087 /* Fail - we don't know how to handle any other
7088 note size (ie. data object type). */
b34976b6 7089 return TRUE;
4a938328 7090 }
252b5132 7091
bb0082d6 7092 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7093 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7094 size, note->descpos + offset);
252b5132
RH
7095}
7096#endif /* defined (HAVE_PRSTATUS_T) */
7097
bb0082d6 7098/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7099static bfd_boolean
217aa764
AM
7100elfcore_make_note_pseudosection (bfd *abfd,
7101 char *name,
7102 Elf_Internal_Note *note)
252b5132 7103{
936e320b
AM
7104 return _bfd_elfcore_make_pseudosection (abfd, name,
7105 note->descsz, note->descpos);
252b5132
RH
7106}
7107
ff08c6bb
JB
7108/* There isn't a consistent prfpregset_t across platforms,
7109 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7110 data structure apart. */
7111
b34976b6 7112static bfd_boolean
217aa764 7113elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7114{
7115 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7116}
7117
ff08c6bb
JB
7118/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7119 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7120 literally. */
c044fabd 7121
b34976b6 7122static bfd_boolean
217aa764 7123elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7124{
7125 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7126}
7127
252b5132 7128#if defined (HAVE_PRPSINFO_T)
4a938328 7129typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7130#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7131typedef prpsinfo32_t elfcore_psinfo32_t;
7132#endif
252b5132
RH
7133#endif
7134
7135#if defined (HAVE_PSINFO_T)
4a938328 7136typedef psinfo_t elfcore_psinfo_t;
7ee38065 7137#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7138typedef psinfo32_t elfcore_psinfo32_t;
7139#endif
252b5132
RH
7140#endif
7141
252b5132
RH
7142/* return a malloc'ed copy of a string at START which is at
7143 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7144 the copy will always have a terminating '\0'. */
252b5132 7145
936e320b 7146char *
217aa764 7147_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7148{
dc810e39 7149 char *dups;
c044fabd 7150 char *end = memchr (start, '\0', max);
dc810e39 7151 size_t len;
252b5132
RH
7152
7153 if (end == NULL)
7154 len = max;
7155 else
7156 len = end - start;
7157
217aa764 7158 dups = bfd_alloc (abfd, len + 1);
dc810e39 7159 if (dups == NULL)
252b5132
RH
7160 return NULL;
7161
dc810e39
AM
7162 memcpy (dups, start, len);
7163 dups[len] = '\0';
252b5132 7164
dc810e39 7165 return dups;
252b5132
RH
7166}
7167
bb0082d6 7168#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7169static bfd_boolean
217aa764 7170elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7171{
4a938328
MS
7172 if (note->descsz == sizeof (elfcore_psinfo_t))
7173 {
7174 elfcore_psinfo_t psinfo;
252b5132 7175
7ee38065 7176 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7177
4a938328 7178 elf_tdata (abfd)->core_program
936e320b
AM
7179 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7180 sizeof (psinfo.pr_fname));
252b5132 7181
4a938328 7182 elf_tdata (abfd)->core_command
936e320b
AM
7183 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7184 sizeof (psinfo.pr_psargs));
4a938328 7185 }
7ee38065 7186#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7187 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7188 {
7189 /* 64-bit host, 32-bit corefile */
7190 elfcore_psinfo32_t psinfo;
7191
7ee38065 7192 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7193
4a938328 7194 elf_tdata (abfd)->core_program
936e320b
AM
7195 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7196 sizeof (psinfo.pr_fname));
4a938328
MS
7197
7198 elf_tdata (abfd)->core_command
936e320b
AM
7199 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7200 sizeof (psinfo.pr_psargs));
4a938328
MS
7201 }
7202#endif
7203
7204 else
7205 {
7206 /* Fail - we don't know how to handle any other
7207 note size (ie. data object type). */
b34976b6 7208 return TRUE;
4a938328 7209 }
252b5132
RH
7210
7211 /* Note that for some reason, a spurious space is tacked
7212 onto the end of the args in some (at least one anyway)
c044fabd 7213 implementations, so strip it off if it exists. */
252b5132
RH
7214
7215 {
c044fabd 7216 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7217 int n = strlen (command);
7218
7219 if (0 < n && command[n - 1] == ' ')
7220 command[n - 1] = '\0';
7221 }
7222
b34976b6 7223 return TRUE;
252b5132
RH
7224}
7225#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7226
252b5132 7227#if defined (HAVE_PSTATUS_T)
b34976b6 7228static bfd_boolean
217aa764 7229elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7230{
f572a39d
AM
7231 if (note->descsz == sizeof (pstatus_t)
7232#if defined (HAVE_PXSTATUS_T)
7233 || note->descsz == sizeof (pxstatus_t)
7234#endif
7235 )
4a938328
MS
7236 {
7237 pstatus_t pstat;
252b5132 7238
4a938328 7239 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7240
4a938328
MS
7241 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7242 }
7ee38065 7243#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7244 else if (note->descsz == sizeof (pstatus32_t))
7245 {
7246 /* 64-bit host, 32-bit corefile */
7247 pstatus32_t pstat;
252b5132 7248
4a938328 7249 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7250
4a938328
MS
7251 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7252 }
7253#endif
252b5132
RH
7254 /* Could grab some more details from the "representative"
7255 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7256 NT_LWPSTATUS note, presumably. */
252b5132 7257
b34976b6 7258 return TRUE;
252b5132
RH
7259}
7260#endif /* defined (HAVE_PSTATUS_T) */
7261
252b5132 7262#if defined (HAVE_LWPSTATUS_T)
b34976b6 7263static bfd_boolean
217aa764 7264elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7265{
7266 lwpstatus_t lwpstat;
7267 char buf[100];
c044fabd 7268 char *name;
d4c88bbb 7269 size_t len;
c044fabd 7270 asection *sect;
252b5132 7271
f572a39d
AM
7272 if (note->descsz != sizeof (lwpstat)
7273#if defined (HAVE_LWPXSTATUS_T)
7274 && note->descsz != sizeof (lwpxstatus_t)
7275#endif
7276 )
b34976b6 7277 return TRUE;
252b5132
RH
7278
7279 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7280
7281 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7282 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7283
c044fabd 7284 /* Make a ".reg/999" section. */
252b5132
RH
7285
7286 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7287 len = strlen (buf) + 1;
217aa764 7288 name = bfd_alloc (abfd, len);
252b5132 7289 if (name == NULL)
b34976b6 7290 return FALSE;
d4c88bbb 7291 memcpy (name, buf, len);
252b5132 7292
62f3bb11 7293 sect = bfd_make_section_anyway (abfd, name);
252b5132 7294 if (sect == NULL)
b34976b6 7295 return FALSE;
252b5132
RH
7296
7297#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7298 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7299 sect->filepos = note->descpos
7300 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7301#endif
7302
7303#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7304 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7305 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7306#endif
7307
7308 sect->flags = SEC_HAS_CONTENTS;
7309 sect->alignment_power = 2;
7310
7311 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7312 return FALSE;
252b5132
RH
7313
7314 /* Make a ".reg2/999" section */
7315
7316 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7317 len = strlen (buf) + 1;
217aa764 7318 name = bfd_alloc (abfd, len);
252b5132 7319 if (name == NULL)
b34976b6 7320 return FALSE;
d4c88bbb 7321 memcpy (name, buf, len);
252b5132 7322
62f3bb11 7323 sect = bfd_make_section_anyway (abfd, name);
252b5132 7324 if (sect == NULL)
b34976b6 7325 return FALSE;
252b5132
RH
7326
7327#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7328 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7329 sect->filepos = note->descpos
7330 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7331#endif
7332
7333#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7334 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7335 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7336#endif
7337
7338 sect->flags = SEC_HAS_CONTENTS;
7339 sect->alignment_power = 2;
7340
936e320b 7341 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7342}
7343#endif /* defined (HAVE_LWPSTATUS_T) */
7344
16e9c715 7345#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7346static bfd_boolean
217aa764 7347elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7348{
7349 char buf[30];
c044fabd 7350 char *name;
d4c88bbb 7351 size_t len;
c044fabd 7352 asection *sect;
16e9c715
NC
7353 win32_pstatus_t pstatus;
7354
7355 if (note->descsz < sizeof (pstatus))
b34976b6 7356 return TRUE;
16e9c715 7357
e8eab623 7358 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7359
7360 switch (pstatus.data_type)
16e9c715
NC
7361 {
7362 case NOTE_INFO_PROCESS:
7363 /* FIXME: need to add ->core_command. */
7364 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7365 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7366 break;
16e9c715
NC
7367
7368 case NOTE_INFO_THREAD:
7369 /* Make a ".reg/999" section. */
1f170678 7370 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7371
d4c88bbb 7372 len = strlen (buf) + 1;
217aa764 7373 name = bfd_alloc (abfd, len);
16e9c715 7374 if (name == NULL)
b34976b6 7375 return FALSE;
c044fabd 7376
d4c88bbb 7377 memcpy (name, buf, len);
16e9c715 7378
62f3bb11 7379 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7380 if (sect == NULL)
b34976b6 7381 return FALSE;
c044fabd 7382
eea6121a 7383 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7384 sect->filepos = (note->descpos
7385 + offsetof (struct win32_pstatus,
7386 data.thread_info.thread_context));
16e9c715
NC
7387 sect->flags = SEC_HAS_CONTENTS;
7388 sect->alignment_power = 2;
7389
7390 if (pstatus.data.thread_info.is_active_thread)
7391 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7392 return FALSE;
16e9c715
NC
7393 break;
7394
7395 case NOTE_INFO_MODULE:
7396 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7397 sprintf (buf, ".module/%08lx",
7398 (long) pstatus.data.module_info.base_address);
c044fabd 7399
d4c88bbb 7400 len = strlen (buf) + 1;
217aa764 7401 name = bfd_alloc (abfd, len);
16e9c715 7402 if (name == NULL)
b34976b6 7403 return FALSE;
c044fabd 7404
d4c88bbb 7405 memcpy (name, buf, len);
252b5132 7406
62f3bb11 7407 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7408
16e9c715 7409 if (sect == NULL)
b34976b6 7410 return FALSE;
c044fabd 7411
eea6121a 7412 sect->size = note->descsz;
16e9c715
NC
7413 sect->filepos = note->descpos;
7414 sect->flags = SEC_HAS_CONTENTS;
7415 sect->alignment_power = 2;
7416 break;
7417
7418 default:
b34976b6 7419 return TRUE;
16e9c715
NC
7420 }
7421
b34976b6 7422 return TRUE;
16e9c715
NC
7423}
7424#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7425
b34976b6 7426static bfd_boolean
217aa764 7427elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7428{
9c5bfbb7 7429 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7430
252b5132
RH
7431 switch (note->type)
7432 {
7433 default:
b34976b6 7434 return TRUE;
252b5132 7435
252b5132 7436 case NT_PRSTATUS:
bb0082d6
AM
7437 if (bed->elf_backend_grok_prstatus)
7438 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7439 return TRUE;
bb0082d6 7440#if defined (HAVE_PRSTATUS_T)
252b5132 7441 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7442#else
b34976b6 7443 return TRUE;
252b5132
RH
7444#endif
7445
7446#if defined (HAVE_PSTATUS_T)
7447 case NT_PSTATUS:
7448 return elfcore_grok_pstatus (abfd, note);
7449#endif
7450
7451#if defined (HAVE_LWPSTATUS_T)
7452 case NT_LWPSTATUS:
7453 return elfcore_grok_lwpstatus (abfd, note);
7454#endif
7455
7456 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7457 return elfcore_grok_prfpreg (abfd, note);
7458
16e9c715 7459#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7460 case NT_WIN32PSTATUS:
16e9c715
NC
7461 return elfcore_grok_win32pstatus (abfd, note);
7462#endif
7463
c044fabd 7464 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7465 if (note->namesz == 6
7466 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7467 return elfcore_grok_prxfpreg (abfd, note);
7468 else
b34976b6 7469 return TRUE;
ff08c6bb 7470
252b5132
RH
7471 case NT_PRPSINFO:
7472 case NT_PSINFO:
bb0082d6
AM
7473 if (bed->elf_backend_grok_psinfo)
7474 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7475 return TRUE;
bb0082d6 7476#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7477 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7478#else
b34976b6 7479 return TRUE;
252b5132 7480#endif
3333a7c3
RM
7481
7482 case NT_AUXV:
7483 {
62f3bb11 7484 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7485
7486 if (sect == NULL)
7487 return FALSE;
eea6121a 7488 sect->size = note->descsz;
3333a7c3
RM
7489 sect->filepos = note->descpos;
7490 sect->flags = SEC_HAS_CONTENTS;
7491 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7492
7493 return TRUE;
7494 }
252b5132
RH
7495 }
7496}
7497
b34976b6 7498static bfd_boolean
217aa764 7499elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7500{
7501 char *cp;
7502
7503 cp = strchr (note->namedata, '@');
7504 if (cp != NULL)
7505 {
d2b64500 7506 *lwpidp = atoi(cp + 1);
b34976b6 7507 return TRUE;
50b2bdb7 7508 }
b34976b6 7509 return FALSE;
50b2bdb7
AM
7510}
7511
b34976b6 7512static bfd_boolean
217aa764 7513elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7514{
7515
7516 /* Signal number at offset 0x08. */
7517 elf_tdata (abfd)->core_signal
7518 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7519
7520 /* Process ID at offset 0x50. */
7521 elf_tdata (abfd)->core_pid
7522 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7523
7524 /* Command name at 0x7c (max 32 bytes, including nul). */
7525 elf_tdata (abfd)->core_command
7526 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7527
7720ba9f
MK
7528 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7529 note);
50b2bdb7
AM
7530}
7531
b34976b6 7532static bfd_boolean
217aa764 7533elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7534{
7535 int lwp;
7536
7537 if (elfcore_netbsd_get_lwpid (note, &lwp))
7538 elf_tdata (abfd)->core_lwpid = lwp;
7539
b4db1224 7540 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7541 {
7542 /* NetBSD-specific core "procinfo". Note that we expect to
7543 find this note before any of the others, which is fine,
7544 since the kernel writes this note out first when it
7545 creates a core file. */
47d9a591 7546
50b2bdb7
AM
7547 return elfcore_grok_netbsd_procinfo (abfd, note);
7548 }
7549
b4db1224
JT
7550 /* As of Jan 2002 there are no other machine-independent notes
7551 defined for NetBSD core files. If the note type is less
7552 than the start of the machine-dependent note types, we don't
7553 understand it. */
47d9a591 7554
b4db1224 7555 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7556 return TRUE;
50b2bdb7
AM
7557
7558
7559 switch (bfd_get_arch (abfd))
7560 {
7561 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7562 PT_GETFPREGS == mach+2. */
7563
7564 case bfd_arch_alpha:
7565 case bfd_arch_sparc:
7566 switch (note->type)
7567 {
b4db1224 7568 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7569 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7570
b4db1224 7571 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7572 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7573
7574 default:
b34976b6 7575 return TRUE;
50b2bdb7
AM
7576 }
7577
7578 /* On all other arch's, PT_GETREGS == mach+1 and
7579 PT_GETFPREGS == mach+3. */
7580
7581 default:
7582 switch (note->type)
7583 {
b4db1224 7584 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7585 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7586
b4db1224 7587 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7588 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7589
7590 default:
b34976b6 7591 return TRUE;
50b2bdb7
AM
7592 }
7593 }
7594 /* NOTREACHED */
7595}
7596
07c6e936 7597static bfd_boolean
217aa764 7598elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7599{
7600 void *ddata = note->descdata;
7601 char buf[100];
7602 char *name;
7603 asection *sect;
f8843e87
AM
7604 short sig;
7605 unsigned flags;
07c6e936
NC
7606
7607 /* nto_procfs_status 'pid' field is at offset 0. */
7608 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7609
f8843e87
AM
7610 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7611 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7612
7613 /* nto_procfs_status 'flags' field is at offset 8. */
7614 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7615
7616 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7617 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7618 {
7619 elf_tdata (abfd)->core_signal = sig;
7620 elf_tdata (abfd)->core_lwpid = *tid;
7621 }
07c6e936 7622
f8843e87
AM
7623 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7624 do not come from signals so we make sure we set the current
7625 thread just in case. */
7626 if (flags & 0x00000080)
7627 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7628
7629 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7630 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7631
217aa764 7632 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7633 if (name == NULL)
7634 return FALSE;
7635 strcpy (name, buf);
7636
62f3bb11 7637 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7638 if (sect == NULL)
7639 return FALSE;
7640
eea6121a 7641 sect->size = note->descsz;
07c6e936
NC
7642 sect->filepos = note->descpos;
7643 sect->flags = SEC_HAS_CONTENTS;
7644 sect->alignment_power = 2;
7645
7646 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7647}
7648
7649static bfd_boolean
d69f560c
KW
7650elfcore_grok_nto_regs (bfd *abfd,
7651 Elf_Internal_Note *note,
7652 pid_t tid,
7653 char *base)
07c6e936
NC
7654{
7655 char buf[100];
7656 char *name;
7657 asection *sect;
7658
d69f560c 7659 /* Make a "(base)/%d" section. */
7e7353ed 7660 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 7661
217aa764 7662 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7663 if (name == NULL)
7664 return FALSE;
7665 strcpy (name, buf);
7666
62f3bb11 7667 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7668 if (sect == NULL)
7669 return FALSE;
7670
eea6121a 7671 sect->size = note->descsz;
07c6e936
NC
7672 sect->filepos = note->descpos;
7673 sect->flags = SEC_HAS_CONTENTS;
7674 sect->alignment_power = 2;
7675
f8843e87
AM
7676 /* This is the current thread. */
7677 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 7678 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
7679
7680 return TRUE;
07c6e936
NC
7681}
7682
7683#define BFD_QNT_CORE_INFO 7
7684#define BFD_QNT_CORE_STATUS 8
7685#define BFD_QNT_CORE_GREG 9
7686#define BFD_QNT_CORE_FPREG 10
7687
7688static bfd_boolean
217aa764 7689elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
7690{
7691 /* Every GREG section has a STATUS section before it. Store the
811072d8 7692 tid from the previous call to pass down to the next gregs
07c6e936
NC
7693 function. */
7694 static pid_t tid = 1;
7695
7696 switch (note->type)
7697 {
d69f560c
KW
7698 case BFD_QNT_CORE_INFO:
7699 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
7700 case BFD_QNT_CORE_STATUS:
7701 return elfcore_grok_nto_status (abfd, note, &tid);
7702 case BFD_QNT_CORE_GREG:
7703 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
7704 case BFD_QNT_CORE_FPREG:
7705 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
7706 default:
7707 return TRUE;
07c6e936
NC
7708 }
7709}
7710
7c76fa91
MS
7711/* Function: elfcore_write_note
7712
47d9a591 7713 Inputs:
7c76fa91
MS
7714 buffer to hold note
7715 name of note
7716 type of note
7717 data for note
7718 size of data for note
7719
7720 Return:
7721 End of buffer containing note. */
7722
7723char *
217aa764
AM
7724elfcore_write_note (bfd *abfd,
7725 char *buf,
7726 int *bufsiz,
7727 const char *name,
7728 int type,
7729 const void *input,
7730 int size)
7c76fa91
MS
7731{
7732 Elf_External_Note *xnp;
d4c88bbb
AM
7733 size_t namesz;
7734 size_t pad;
7735 size_t newspace;
7c76fa91
MS
7736 char *p, *dest;
7737
d4c88bbb
AM
7738 namesz = 0;
7739 pad = 0;
7740 if (name != NULL)
7741 {
9c5bfbb7 7742 const struct elf_backend_data *bed;
d4c88bbb
AM
7743
7744 namesz = strlen (name) + 1;
7745 bed = get_elf_backend_data (abfd);
45d6a902 7746 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
7747 }
7748
5de3bf90 7749 newspace = 12 + namesz + pad + size;
d4c88bbb 7750
7c76fa91
MS
7751 p = realloc (buf, *bufsiz + newspace);
7752 dest = p + *bufsiz;
7753 *bufsiz += newspace;
7754 xnp = (Elf_External_Note *) dest;
7755 H_PUT_32 (abfd, namesz, xnp->namesz);
7756 H_PUT_32 (abfd, size, xnp->descsz);
7757 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
7758 dest = xnp->name;
7759 if (name != NULL)
7760 {
7761 memcpy (dest, name, namesz);
7762 dest += namesz;
7763 while (pad != 0)
7764 {
7765 *dest++ = '\0';
7766 --pad;
7767 }
7768 }
7769 memcpy (dest, input, size);
7c76fa91
MS
7770 return p;
7771}
7772
7773#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
7774char *
217aa764
AM
7775elfcore_write_prpsinfo (bfd *abfd,
7776 char *buf,
7777 int *bufsiz,
7778 const char *fname,
7779 const char *psargs)
7c76fa91
MS
7780{
7781 int note_type;
7782 char *note_name = "CORE";
7783
7784#if defined (HAVE_PSINFO_T)
7785 psinfo_t data;
7786 note_type = NT_PSINFO;
7787#else
7788 prpsinfo_t data;
7789 note_type = NT_PRPSINFO;
7790#endif
7791
7792 memset (&data, 0, sizeof (data));
7793 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
7794 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 7795 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7796 note_name, note_type, &data, sizeof (data));
7797}
7798#endif /* PSINFO_T or PRPSINFO_T */
7799
7800#if defined (HAVE_PRSTATUS_T)
7801char *
217aa764
AM
7802elfcore_write_prstatus (bfd *abfd,
7803 char *buf,
7804 int *bufsiz,
7805 long pid,
7806 int cursig,
7807 const void *gregs)
7c76fa91
MS
7808{
7809 prstatus_t prstat;
7810 char *note_name = "CORE";
7811
7812 memset (&prstat, 0, sizeof (prstat));
7813 prstat.pr_pid = pid;
7814 prstat.pr_cursig = cursig;
c106e334 7815 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 7816 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7817 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
7818}
7819#endif /* HAVE_PRSTATUS_T */
7820
51316059
MS
7821#if defined (HAVE_LWPSTATUS_T)
7822char *
217aa764
AM
7823elfcore_write_lwpstatus (bfd *abfd,
7824 char *buf,
7825 int *bufsiz,
7826 long pid,
7827 int cursig,
7828 const void *gregs)
51316059
MS
7829{
7830 lwpstatus_t lwpstat;
7831 char *note_name = "CORE";
7832
7833 memset (&lwpstat, 0, sizeof (lwpstat));
7834 lwpstat.pr_lwpid = pid >> 16;
7835 lwpstat.pr_cursig = cursig;
7836#if defined (HAVE_LWPSTATUS_T_PR_REG)
7837 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
7838#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
7839#if !defined(gregs)
7840 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
7841 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
7842#else
7843 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
7844 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
7845#endif
7846#endif
47d9a591 7847 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7848 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
7849}
7850#endif /* HAVE_LWPSTATUS_T */
7851
7c76fa91
MS
7852#if defined (HAVE_PSTATUS_T)
7853char *
217aa764
AM
7854elfcore_write_pstatus (bfd *abfd,
7855 char *buf,
7856 int *bufsiz,
7857 long pid,
7858 int cursig,
7859 const void *gregs)
7c76fa91
MS
7860{
7861 pstatus_t pstat;
7862 char *note_name = "CORE";
7863
51316059
MS
7864 memset (&pstat, 0, sizeof (pstat));
7865 pstat.pr_pid = pid & 0xffff;
47d9a591 7866 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7867 NT_PSTATUS, &pstat, sizeof (pstat));
7868 return buf;
7c76fa91
MS
7869}
7870#endif /* HAVE_PSTATUS_T */
7871
7872char *
217aa764
AM
7873elfcore_write_prfpreg (bfd *abfd,
7874 char *buf,
7875 int *bufsiz,
7876 const void *fpregs,
7877 int size)
7c76fa91
MS
7878{
7879 char *note_name = "CORE";
47d9a591 7880 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7881 note_name, NT_FPREGSET, fpregs, size);
7882}
7883
7884char *
217aa764
AM
7885elfcore_write_prxfpreg (bfd *abfd,
7886 char *buf,
7887 int *bufsiz,
7888 const void *xfpregs,
7889 int size)
7c76fa91
MS
7890{
7891 char *note_name = "LINUX";
47d9a591 7892 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7893 note_name, NT_PRXFPREG, xfpregs, size);
7894}
7895
b34976b6 7896static bfd_boolean
217aa764 7897elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 7898{
c044fabd
KH
7899 char *buf;
7900 char *p;
252b5132
RH
7901
7902 if (size <= 0)
b34976b6 7903 return TRUE;
252b5132 7904
dc810e39 7905 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 7906 return FALSE;
252b5132 7907
dc810e39 7908 buf = bfd_malloc (size);
252b5132 7909 if (buf == NULL)
b34976b6 7910 return FALSE;
252b5132 7911
dc810e39 7912 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
7913 {
7914 error:
7915 free (buf);
b34976b6 7916 return FALSE;
252b5132
RH
7917 }
7918
7919 p = buf;
7920 while (p < buf + size)
7921 {
c044fabd
KH
7922 /* FIXME: bad alignment assumption. */
7923 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
7924 Elf_Internal_Note in;
7925
dc810e39 7926 in.type = H_GET_32 (abfd, xnp->type);
252b5132 7927
dc810e39 7928 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
7929 in.namedata = xnp->name;
7930
dc810e39 7931 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
7932 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
7933 in.descpos = offset + (in.descdata - buf);
7934
50b2bdb7
AM
7935 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
7936 {
7937 if (! elfcore_grok_netbsd_note (abfd, &in))
7938 goto error;
7939 }
07c6e936
NC
7940 else if (strncmp (in.namedata, "QNX", 3) == 0)
7941 {
7942 if (! elfcore_grok_nto_note (abfd, &in))
7943 goto error;
7944 }
50b2bdb7
AM
7945 else
7946 {
7947 if (! elfcore_grok_note (abfd, &in))
7948 goto error;
7949 }
252b5132
RH
7950
7951 p = in.descdata + BFD_ALIGN (in.descsz, 4);
7952 }
7953
7954 free (buf);
b34976b6 7955 return TRUE;
252b5132 7956}
98d8431c
JB
7957\f
7958/* Providing external access to the ELF program header table. */
7959
7960/* Return an upper bound on the number of bytes required to store a
7961 copy of ABFD's program header table entries. Return -1 if an error
7962 occurs; bfd_get_error will return an appropriate code. */
c044fabd 7963
98d8431c 7964long
217aa764 7965bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
7966{
7967 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7968 {
7969 bfd_set_error (bfd_error_wrong_format);
7970 return -1;
7971 }
7972
936e320b 7973 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
7974}
7975
98d8431c
JB
7976/* Copy ABFD's program header table entries to *PHDRS. The entries
7977 will be stored as an array of Elf_Internal_Phdr structures, as
7978 defined in include/elf/internal.h. To find out how large the
7979 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
7980
7981 Return the number of program header table entries read, or -1 if an
7982 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 7983
98d8431c 7984int
217aa764 7985bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
7986{
7987 int num_phdrs;
7988
7989 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7990 {
7991 bfd_set_error (bfd_error_wrong_format);
7992 return -1;
7993 }
7994
7995 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 7996 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
7997 num_phdrs * sizeof (Elf_Internal_Phdr));
7998
7999 return num_phdrs;
8000}
ae4221d7
L
8001
8002void
217aa764 8003_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 8004{
d3b05f8d 8005#ifdef BFD64
ae4221d7
L
8006 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8007
8008 i_ehdrp = elf_elfheader (abfd);
8009 if (i_ehdrp == NULL)
8010 sprintf_vma (buf, value);
8011 else
8012 {
8013 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8014 {
ae4221d7 8015#if BFD_HOST_64BIT_LONG
cc55aec9 8016 sprintf (buf, "%016lx", value);
ae4221d7 8017#else
cc55aec9
AM
8018 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
8019 _bfd_int64_low (value));
ae4221d7 8020#endif
cc55aec9 8021 }
ae4221d7
L
8022 else
8023 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
8024 }
d3b05f8d
L
8025#else
8026 sprintf_vma (buf, value);
8027#endif
ae4221d7
L
8028}
8029
8030void
217aa764 8031_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 8032{
d3b05f8d 8033#ifdef BFD64
ae4221d7
L
8034 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8035
8036 i_ehdrp = elf_elfheader (abfd);
8037 if (i_ehdrp == NULL)
8038 fprintf_vma ((FILE *) stream, value);
8039 else
8040 {
8041 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8042 {
ae4221d7 8043#if BFD_HOST_64BIT_LONG
cc55aec9 8044 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 8045#else
cc55aec9
AM
8046 fprintf ((FILE *) stream, "%08lx%08lx",
8047 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 8048#endif
cc55aec9 8049 }
ae4221d7
L
8050 else
8051 fprintf ((FILE *) stream, "%08lx",
8052 (unsigned long) (value & 0xffffffff));
8053 }
d3b05f8d
L
8054#else
8055 fprintf_vma ((FILE *) stream, value);
8056#endif
ae4221d7 8057}
db6751f2
JJ
8058
8059enum elf_reloc_type_class
217aa764 8060_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8061{
8062 return reloc_class_normal;
8063}
f8df10f4 8064
47d9a591 8065/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8066 relocation against a local symbol. */
8067
8068bfd_vma
217aa764
AM
8069_bfd_elf_rela_local_sym (bfd *abfd,
8070 Elf_Internal_Sym *sym,
8517fae7 8071 asection **psec,
217aa764 8072 Elf_Internal_Rela *rel)
f8df10f4 8073{
8517fae7 8074 asection *sec = *psec;
f8df10f4
JJ
8075 bfd_vma relocation;
8076
8077 relocation = (sec->output_section->vma
8078 + sec->output_offset
8079 + sym->st_value);
8080 if ((sec->flags & SEC_MERGE)
c629eae0 8081 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8082 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8083 {
f8df10f4 8084 rel->r_addend =
8517fae7 8085 _bfd_merged_section_offset (abfd, psec,
65765700 8086 elf_section_data (sec)->sec_info,
753731ee
AM
8087 sym->st_value + rel->r_addend);
8088 if (sec != *psec)
8089 {
8090 /* If we have changed the section, and our original section is
8091 marked with SEC_EXCLUDE, it means that the original
8092 SEC_MERGE section has been completely subsumed in some
8093 other SEC_MERGE section. In this case, we need to leave
8094 some info around for --emit-relocs. */
8095 if ((sec->flags & SEC_EXCLUDE) != 0)
8096 sec->kept_section = *psec;
8097 sec = *psec;
8098 }
8517fae7
AM
8099 rel->r_addend -= relocation;
8100 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8101 }
8102 return relocation;
8103}
c629eae0
JJ
8104
8105bfd_vma
217aa764
AM
8106_bfd_elf_rel_local_sym (bfd *abfd,
8107 Elf_Internal_Sym *sym,
8108 asection **psec,
8109 bfd_vma addend)
47d9a591 8110{
c629eae0
JJ
8111 asection *sec = *psec;
8112
68bfbfcc 8113 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8114 return sym->st_value + addend;
8115
8116 return _bfd_merged_section_offset (abfd, psec,
65765700 8117 elf_section_data (sec)->sec_info,
753731ee 8118 sym->st_value + addend);
c629eae0
JJ
8119}
8120
8121bfd_vma
217aa764 8122_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8123 struct bfd_link_info *info,
217aa764
AM
8124 asection *sec,
8125 bfd_vma offset)
c629eae0 8126{
68bfbfcc 8127 switch (sec->sec_info_type)
65765700
JJ
8128 {
8129 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8130 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8131 offset);
65765700 8132 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8133 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8134 default:
8135 return offset;
8136 }
c629eae0 8137}
3333a7c3
RM
8138\f
8139/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8140 reconstruct an ELF file by reading the segments out of remote memory
8141 based on the ELF file header at EHDR_VMA and the ELF program headers it
8142 points to. If not null, *LOADBASEP is filled in with the difference
8143 between the VMAs from which the segments were read, and the VMAs the
8144 file headers (and hence BFD's idea of each section's VMA) put them at.
8145
8146 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8147 remote memory at target address VMA into the local buffer at MYADDR; it
8148 should return zero on success or an `errno' code on failure. TEMPL must
8149 be a BFD for an ELF target with the word size and byte order found in
8150 the remote memory. */
8151
8152bfd *
217aa764
AM
8153bfd_elf_bfd_from_remote_memory
8154 (bfd *templ,
8155 bfd_vma ehdr_vma,
8156 bfd_vma *loadbasep,
f075ee0c 8157 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8158{
8159 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8160 (templ, ehdr_vma, loadbasep, target_read_memory);
8161}
4c45e5c9
JJ
8162\f
8163long
c9727e01
AM
8164_bfd_elf_get_synthetic_symtab (bfd *abfd,
8165 long symcount ATTRIBUTE_UNUSED,
8166 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8167 long dynsymcount,
c9727e01
AM
8168 asymbol **dynsyms,
8169 asymbol **ret)
4c45e5c9
JJ
8170{
8171 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8172 asection *relplt;
8173 asymbol *s;
8174 const char *relplt_name;
8175 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8176 arelent *p;
8177 long count, i, n;
8178 size_t size;
8179 Elf_Internal_Shdr *hdr;
8180 char *names;
8181 asection *plt;
8182
8615f3f2
AM
8183 *ret = NULL;
8184
90e3cdf2
JJ
8185 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8186 return 0;
8187
8615f3f2
AM
8188 if (dynsymcount <= 0)
8189 return 0;
8190
4c45e5c9
JJ
8191 if (!bed->plt_sym_val)
8192 return 0;
8193
8194 relplt_name = bed->relplt_name;
8195 if (relplt_name == NULL)
8196 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8197 relplt = bfd_get_section_by_name (abfd, relplt_name);
8198 if (relplt == NULL)
8199 return 0;
8200
8201 hdr = &elf_section_data (relplt)->this_hdr;
8202 if (hdr->sh_link != elf_dynsymtab (abfd)
8203 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8204 return 0;
8205
8206 plt = bfd_get_section_by_name (abfd, ".plt");
8207 if (plt == NULL)
8208 return 0;
8209
8210 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8211 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8212 return -1;
8213
eea6121a 8214 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8215 size = count * sizeof (asymbol);
8216 p = relplt->relocation;
8217 for (i = 0; i < count; i++, s++, p++)
8218 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8219
8220 s = *ret = bfd_malloc (size);
8221 if (s == NULL)
8222 return -1;
8223
8224 names = (char *) (s + count);
8225 p = relplt->relocation;
8226 n = 0;
8227 for (i = 0; i < count; i++, s++, p++)
8228 {
8229 size_t len;
8230 bfd_vma addr;
8231
8232 addr = bed->plt_sym_val (i, plt, p);
8233 if (addr == (bfd_vma) -1)
8234 continue;
8235
8236 *s = **p->sym_ptr_ptr;
8237 s->section = plt;
8238 s->value = addr - plt->vma;
8239 s->name = names;
8240 len = strlen ((*p->sym_ptr_ptr)->name);
8241 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8242 names += len;
8243 memcpy (names, "@plt", sizeof ("@plt"));
8244 names += sizeof ("@plt");
8245 ++n;
8246 }
8247
8248 return n;
8249}
3d7f7666
L
8250
8251/* Sort symbol by binding and section. We want to put definitions
8252 sorted by section at the beginning. */
8253
8254static int
8255elf_sort_elf_symbol (const void *arg1, const void *arg2)
8256{
8257 const Elf_Internal_Sym *s1;
8258 const Elf_Internal_Sym *s2;
8259 int shndx;
8260
8261 /* Make sure that undefined symbols are at the end. */
8262 s1 = (const Elf_Internal_Sym *) arg1;
8263 if (s1->st_shndx == SHN_UNDEF)
8264 return 1;
8265 s2 = (const Elf_Internal_Sym *) arg2;
8266 if (s2->st_shndx == SHN_UNDEF)
8267 return -1;
8268
8269 /* Sorted by section index. */
8270 shndx = s1->st_shndx - s2->st_shndx;
8271 if (shndx != 0)
8272 return shndx;
8273
8274 /* Sorted by binding. */
8275 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8276}
8277
8278struct elf_symbol
8279{
8280 Elf_Internal_Sym *sym;
8281 const char *name;
8282};
8283
8284static int
8285elf_sym_name_compare (const void *arg1, const void *arg2)
8286{
8287 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8288 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8289 return strcmp (s1->name, s2->name);
8290}
8291
8292/* Check if 2 sections define the same set of local and global
8293 symbols. */
8294
8295bfd_boolean
8296bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8297{
8298 bfd *bfd1, *bfd2;
8299 const struct elf_backend_data *bed1, *bed2;
8300 Elf_Internal_Shdr *hdr1, *hdr2;
8301 bfd_size_type symcount1, symcount2;
8302 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8303 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8304 Elf_Internal_Sym *isymend;
8305 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8306 bfd_size_type count1, count2, i;
8307 int shndx1, shndx2;
8308 bfd_boolean result;
8309
8310 bfd1 = sec1->owner;
8311 bfd2 = sec2->owner;
8312
8313 /* If both are .gnu.linkonce sections, they have to have the same
8314 section name. */
8315 if (strncmp (sec1->name, ".gnu.linkonce",
8316 sizeof ".gnu.linkonce" - 1) == 0
8317 && strncmp (sec2->name, ".gnu.linkonce",
8318 sizeof ".gnu.linkonce" - 1) == 0)
8319 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8320 sec2->name + sizeof ".gnu.linkonce") == 0;
8321
8322 /* Both sections have to be in ELF. */
8323 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8324 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8325 return FALSE;
8326
8327 if (elf_section_type (sec1) != elf_section_type (sec2))
8328 return FALSE;
8329
8330 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8331 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8332 {
8333 /* If both are members of section groups, they have to have the
8334 same group name. */
8335 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8336 return FALSE;
8337 }
8338
8339 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8340 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8341 if (shndx1 == -1 || shndx2 == -1)
8342 return FALSE;
8343
8344 bed1 = get_elf_backend_data (bfd1);
8345 bed2 = get_elf_backend_data (bfd2);
8346 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8347 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8348 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8349 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8350
8351 if (symcount1 == 0 || symcount2 == 0)
8352 return FALSE;
8353
8354 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8355 NULL, NULL, NULL);
8356 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8357 NULL, NULL, NULL);
8358
8359 result = FALSE;
8360 if (isymbuf1 == NULL || isymbuf2 == NULL)
8361 goto done;
8362
8363 /* Sort symbols by binding and section. Global definitions are at
8364 the beginning. */
8365 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8366 elf_sort_elf_symbol);
8367 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8368 elf_sort_elf_symbol);
8369
8370 /* Count definitions in the section. */
8371 count1 = 0;
8372 for (isym = isymbuf1, isymend = isym + symcount1;
8373 isym < isymend; isym++)
8374 {
8375 if (isym->st_shndx == (unsigned int) shndx1)
8376 {
8377 if (count1 == 0)
8378 isymstart1 = isym;
8379 count1++;
8380 }
8381
8382 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8383 break;
8384 }
8385
8386 count2 = 0;
8387 for (isym = isymbuf2, isymend = isym + symcount2;
8388 isym < isymend; isym++)
8389 {
8390 if (isym->st_shndx == (unsigned int) shndx2)
8391 {
8392 if (count2 == 0)
8393 isymstart2 = isym;
8394 count2++;
8395 }
8396
8397 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8398 break;
8399 }
8400
8401 if (count1 == 0 || count2 == 0 || count1 != count2)
8402 goto done;
8403
8404 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8405 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8406
8407 if (symtable1 == NULL || symtable2 == NULL)
8408 goto done;
8409
8410 symp = symtable1;
8411 for (isym = isymstart1, isymend = isym + count1;
8412 isym < isymend; isym++)
8413 {
8414 symp->sym = isym;
8415 symp->name = bfd_elf_string_from_elf_section (bfd1,
8416 hdr1->sh_link,
8417 isym->st_name);
8418 symp++;
8419 }
8420
8421 symp = symtable2;
8422 for (isym = isymstart2, isymend = isym + count1;
8423 isym < isymend; isym++)
8424 {
8425 symp->sym = isym;
8426 symp->name = bfd_elf_string_from_elf_section (bfd2,
8427 hdr2->sh_link,
8428 isym->st_name);
8429 symp++;
8430 }
8431
8432 /* Sort symbol by name. */
8433 qsort (symtable1, count1, sizeof (struct elf_symbol),
8434 elf_sym_name_compare);
8435 qsort (symtable2, count1, sizeof (struct elf_symbol),
8436 elf_sym_name_compare);
8437
8438 for (i = 0; i < count1; i++)
8439 /* Two symbols must have the same binding, type and name. */
8440 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8441 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8442 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8443 goto done;
8444
8445 result = TRUE;
8446
8447done:
8448 if (symtable1)
8449 free (symtable1);
8450 if (symtable2)
8451 free (symtable2);
8452 if (isymbuf1)
8453 free (isymbuf1);
8454 if (isymbuf2)
8455 free (isymbuf2);
8456
8457 return result;
8458}