* coff-h8300.c (h8300_reloc16_extra_cases): Use input section
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
8615f3f2 4 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
1b74d094
BW
22/*
23SECTION
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
b34976b6 209bfd_boolean
217aa764 210bfd_elf_mkobject (bfd *abfd)
252b5132 211{
c044fabd
KH
212 /* This just does initialization. */
213 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 214 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 215 if (elf_tdata (abfd) == 0)
b34976b6 216 return FALSE;
c044fabd
KH
217 /* Since everything is done at close time, do we need any
218 initialization? */
252b5132 219
b34976b6 220 return TRUE;
252b5132
RH
221}
222
b34976b6 223bfd_boolean
217aa764 224bfd_elf_mkcorefile (bfd *abfd)
252b5132 225{
c044fabd 226 /* I think this can be done just like an object file. */
252b5132
RH
227 return bfd_elf_mkobject (abfd);
228}
229
230char *
217aa764 231bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
232{
233 Elf_Internal_Shdr **i_shdrp;
f075ee0c 234 bfd_byte *shstrtab = NULL;
dc810e39
AM
235 file_ptr offset;
236 bfd_size_type shstrtabsize;
252b5132
RH
237
238 i_shdrp = elf_elfsections (abfd);
239 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 240 return NULL;
252b5132 241
f075ee0c 242 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
243 if (shstrtab == NULL)
244 {
c044fabd 245 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
246 offset = i_shdrp[shindex]->sh_offset;
247 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
248
249 /* Allocate and clear an extra byte at the end, to prevent crashes
250 in case the string table is not terminated. */
251 if (shstrtabsize + 1 == 0
252 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
253 || bfd_seek (abfd, offset, SEEK_SET) != 0)
254 shstrtab = NULL;
255 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
256 {
257 if (bfd_get_error () != bfd_error_system_call)
258 bfd_set_error (bfd_error_file_truncated);
259 shstrtab = NULL;
260 }
261 else
262 shstrtab[shstrtabsize] = '\0';
217aa764 263 i_shdrp[shindex]->contents = shstrtab;
252b5132 264 }
f075ee0c 265 return (char *) shstrtab;
252b5132
RH
266}
267
268char *
217aa764
AM
269bfd_elf_string_from_elf_section (bfd *abfd,
270 unsigned int shindex,
271 unsigned int strindex)
252b5132
RH
272{
273 Elf_Internal_Shdr *hdr;
274
275 if (strindex == 0)
276 return "";
277
278 hdr = elf_elfsections (abfd)[shindex];
279
280 if (hdr->contents == NULL
281 && bfd_elf_get_str_section (abfd, shindex) == NULL)
282 return NULL;
283
284 if (strindex >= hdr->sh_size)
285 {
1b3a8575 286 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 287 (*_bfd_error_handler)
d003868e
AM
288 (_("%B: invalid string offset %u >= %lu for section `%s'"),
289 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 290 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 291 ? ".shstrtab"
1b3a8575 292 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
293 return "";
294 }
295
296 return ((char *) hdr->contents) + strindex;
297}
298
6cdc0ccc
AM
299/* Read and convert symbols to internal format.
300 SYMCOUNT specifies the number of symbols to read, starting from
301 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
302 are non-NULL, they are used to store the internal symbols, external
303 symbols, and symbol section index extensions, respectively. */
304
305Elf_Internal_Sym *
217aa764
AM
306bfd_elf_get_elf_syms (bfd *ibfd,
307 Elf_Internal_Shdr *symtab_hdr,
308 size_t symcount,
309 size_t symoffset,
310 Elf_Internal_Sym *intsym_buf,
311 void *extsym_buf,
312 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
313{
314 Elf_Internal_Shdr *shndx_hdr;
217aa764 315 void *alloc_ext;
df622259 316 const bfd_byte *esym;
6cdc0ccc
AM
317 Elf_External_Sym_Shndx *alloc_extshndx;
318 Elf_External_Sym_Shndx *shndx;
319 Elf_Internal_Sym *isym;
320 Elf_Internal_Sym *isymend;
9c5bfbb7 321 const struct elf_backend_data *bed;
6cdc0ccc
AM
322 size_t extsym_size;
323 bfd_size_type amt;
324 file_ptr pos;
325
326 if (symcount == 0)
327 return intsym_buf;
328
329 /* Normal syms might have section extension entries. */
330 shndx_hdr = NULL;
331 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
332 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
333
334 /* Read the symbols. */
335 alloc_ext = NULL;
336 alloc_extshndx = NULL;
337 bed = get_elf_backend_data (ibfd);
338 extsym_size = bed->s->sizeof_sym;
339 amt = symcount * extsym_size;
340 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
341 if (extsym_buf == NULL)
342 {
d0fb9a8d 343 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
344 extsym_buf = alloc_ext;
345 }
346 if (extsym_buf == NULL
347 || bfd_seek (ibfd, pos, SEEK_SET) != 0
348 || bfd_bread (extsym_buf, amt, ibfd) != amt)
349 {
350 intsym_buf = NULL;
351 goto out;
352 }
353
354 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
355 extshndx_buf = NULL;
356 else
357 {
358 amt = symcount * sizeof (Elf_External_Sym_Shndx);
359 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
360 if (extshndx_buf == NULL)
361 {
d0fb9a8d
JJ
362 alloc_extshndx = bfd_malloc2 (symcount,
363 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
364 extshndx_buf = alloc_extshndx;
365 }
366 if (extshndx_buf == NULL
367 || bfd_seek (ibfd, pos, SEEK_SET) != 0
368 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
369 {
370 intsym_buf = NULL;
371 goto out;
372 }
373 }
374
375 if (intsym_buf == NULL)
376 {
d0fb9a8d 377 intsym_buf = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
6cdc0ccc
AM
378 if (intsym_buf == NULL)
379 goto out;
380 }
381
382 /* Convert the symbols to internal form. */
383 isymend = intsym_buf + symcount;
384 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
385 isym < isymend;
386 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 387 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
388
389 out:
390 if (alloc_ext != NULL)
391 free (alloc_ext);
392 if (alloc_extshndx != NULL)
393 free (alloc_extshndx);
394
395 return intsym_buf;
396}
397
5cab59f6
AM
398/* Look up a symbol name. */
399const char *
be8dd2ca
AM
400bfd_elf_sym_name (bfd *abfd,
401 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
402 Elf_Internal_Sym *isym,
403 asection *sym_sec)
5cab59f6 404{
26c61ae5 405 const char *name;
5cab59f6 406 unsigned int iname = isym->st_name;
be8dd2ca 407 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 408
138f35cc
JJ
409 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
410 /* Check for a bogus st_shndx to avoid crashing. */
411 && isym->st_shndx < elf_numsections (abfd)
412 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
413 {
414 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
415 shindex = elf_elfheader (abfd)->e_shstrndx;
416 }
417
26c61ae5
L
418 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
419 if (name == NULL)
420 name = "(null)";
421 else if (sym_sec && *name == '\0')
422 name = bfd_section_name (abfd, sym_sec);
423
424 return name;
5cab59f6
AM
425}
426
dbb410c3
AM
427/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
428 sections. The first element is the flags, the rest are section
429 pointers. */
430
431typedef union elf_internal_group {
432 Elf_Internal_Shdr *shdr;
433 unsigned int flags;
434} Elf_Internal_Group;
435
b885599b
AM
436/* Return the name of the group signature symbol. Why isn't the
437 signature just a string? */
438
439static const char *
217aa764 440group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 441{
9dce4196 442 Elf_Internal_Shdr *hdr;
9dce4196
AM
443 unsigned char esym[sizeof (Elf64_External_Sym)];
444 Elf_External_Sym_Shndx eshndx;
445 Elf_Internal_Sym isym;
b885599b 446
13792e9d
L
447 /* First we need to ensure the symbol table is available. Make sure
448 that it is a symbol table section. */
449 hdr = elf_elfsections (abfd) [ghdr->sh_link];
450 if (hdr->sh_type != SHT_SYMTAB
451 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
452 return NULL;
453
9dce4196
AM
454 /* Go read the symbol. */
455 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
456 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
457 &isym, esym, &eshndx) == NULL)
b885599b 458 return NULL;
9dce4196 459
26c61ae5 460 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
461}
462
dbb410c3
AM
463/* Set next_in_group list pointer, and group name for NEWSECT. */
464
b34976b6 465static bfd_boolean
217aa764 466setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
467{
468 unsigned int num_group = elf_tdata (abfd)->num_group;
469
470 /* If num_group is zero, read in all SHT_GROUP sections. The count
471 is set to -1 if there are no SHT_GROUP sections. */
472 if (num_group == 0)
473 {
474 unsigned int i, shnum;
475
476 /* First count the number of groups. If we have a SHT_GROUP
477 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 478 shnum = elf_numsections (abfd);
dbb410c3
AM
479 num_group = 0;
480 for (i = 0; i < shnum; i++)
481 {
482 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
483 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
484 num_group += 1;
485 }
486
487 if (num_group == 0)
20dbb49d
L
488 {
489 num_group = (unsigned) -1;
490 elf_tdata (abfd)->num_group = num_group;
491 }
492 else
dbb410c3
AM
493 {
494 /* We keep a list of elf section headers for group sections,
495 so we can find them quickly. */
20dbb49d 496 bfd_size_type amt;
d0fb9a8d 497
20dbb49d 498 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
499 elf_tdata (abfd)->group_sect_ptr
500 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 501 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 502 return FALSE;
dbb410c3
AM
503
504 num_group = 0;
505 for (i = 0; i < shnum; i++)
506 {
507 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
508 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
509 {
973ffd63 510 unsigned char *src;
dbb410c3
AM
511 Elf_Internal_Group *dest;
512
513 /* Add to list of sections. */
514 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
515 num_group += 1;
516
517 /* Read the raw contents. */
518 BFD_ASSERT (sizeof (*dest) >= 4);
519 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
520 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
521 sizeof (*dest) / 4);
dbb410c3
AM
522 if (shdr->contents == NULL
523 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
524 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
525 != shdr->sh_size))
b34976b6 526 return FALSE;
dbb410c3
AM
527
528 /* Translate raw contents, a flag word followed by an
529 array of elf section indices all in target byte order,
530 to the flag word followed by an array of elf section
531 pointers. */
532 src = shdr->contents + shdr->sh_size;
533 dest = (Elf_Internal_Group *) (shdr->contents + amt);
534 while (1)
535 {
536 unsigned int idx;
537
538 src -= 4;
539 --dest;
540 idx = H_GET_32 (abfd, src);
541 if (src == shdr->contents)
542 {
543 dest->flags = idx;
b885599b
AM
544 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
545 shdr->bfd_section->flags
546 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
547 break;
548 }
549 if (idx >= shnum)
550 {
551 ((*_bfd_error_handler)
d003868e 552 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
553 idx = 0;
554 }
555 dest->shdr = elf_elfsections (abfd)[idx];
556 }
557 }
558 }
559 }
560 }
561
562 if (num_group != (unsigned) -1)
563 {
564 unsigned int i;
565
566 for (i = 0; i < num_group; i++)
567 {
568 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
569 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
570 unsigned int n_elt = shdr->sh_size / 4;
571
572 /* Look through this group's sections to see if current
573 section is a member. */
574 while (--n_elt != 0)
575 if ((++idx)->shdr == hdr)
576 {
e0e8c97f 577 asection *s = NULL;
dbb410c3
AM
578
579 /* We are a member of this group. Go looking through
580 other members to see if any others are linked via
581 next_in_group. */
582 idx = (Elf_Internal_Group *) shdr->contents;
583 n_elt = shdr->sh_size / 4;
584 while (--n_elt != 0)
585 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 586 && elf_next_in_group (s) != NULL)
dbb410c3
AM
587 break;
588 if (n_elt != 0)
589 {
dbb410c3
AM
590 /* Snarf the group name from other member, and
591 insert current section in circular list. */
945906ff
AM
592 elf_group_name (newsect) = elf_group_name (s);
593 elf_next_in_group (newsect) = elf_next_in_group (s);
594 elf_next_in_group (s) = newsect;
dbb410c3
AM
595 }
596 else
597 {
dbb410c3
AM
598 const char *gname;
599
b885599b
AM
600 gname = group_signature (abfd, shdr);
601 if (gname == NULL)
b34976b6 602 return FALSE;
945906ff 603 elf_group_name (newsect) = gname;
dbb410c3
AM
604
605 /* Start a circular list with one element. */
945906ff 606 elf_next_in_group (newsect) = newsect;
dbb410c3 607 }
b885599b 608
9dce4196
AM
609 /* If the group section has been created, point to the
610 new member. */
dbb410c3 611 if (shdr->bfd_section != NULL)
945906ff 612 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 613
dbb410c3
AM
614 i = num_group - 1;
615 break;
616 }
617 }
618 }
619
945906ff 620 if (elf_group_name (newsect) == NULL)
dbb410c3 621 {
d003868e
AM
622 (*_bfd_error_handler) (_("%B: no group info for section %A"),
623 abfd, newsect);
dbb410c3 624 }
b34976b6 625 return TRUE;
dbb410c3
AM
626}
627
3d7f7666 628bfd_boolean
dd863624 629_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
630{
631 unsigned int i;
632 unsigned int num_group = elf_tdata (abfd)->num_group;
633 bfd_boolean result = TRUE;
dd863624
L
634 asection *s;
635
636 /* Process SHF_LINK_ORDER. */
637 for (s = abfd->sections; s != NULL; s = s->next)
638 {
639 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
640 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
641 {
642 unsigned int elfsec = this_hdr->sh_link;
643 /* FIXME: The old Intel compiler and old strip/objcopy may
644 not set the sh_link or sh_info fields. Hence we could
645 get the situation where elfsec is 0. */
646 if (elfsec == 0)
647 {
648 const struct elf_backend_data *bed
649 = get_elf_backend_data (abfd);
650 if (bed->link_order_error_handler)
651 bed->link_order_error_handler
652 (_("%B: warning: sh_link not set for section `%A'"),
653 abfd, s);
654 }
655 else
656 {
25bbc984
L
657 asection *link;
658
dd863624 659 this_hdr = elf_elfsections (abfd)[elfsec];
25bbc984
L
660
661 /* PR 1991, 2008:
662 Some strip/objcopy may leave an incorrect value in
663 sh_link. We don't want to proceed. */
664 link = this_hdr->bfd_section;
665 if (link == NULL)
666 {
667 (*_bfd_error_handler)
668 (_("%B: sh_link [%d] in section `%A' is incorrect"),
669 s->owner, s, elfsec);
670 result = FALSE;
671 }
672
673 elf_linked_to_section (s) = link;
dd863624
L
674 }
675 }
676 }
3d7f7666 677
dd863624 678 /* Process section groups. */
3d7f7666
L
679 if (num_group == (unsigned) -1)
680 return result;
681
682 for (i = 0; i < num_group; i++)
683 {
684 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
685 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
686 unsigned int n_elt = shdr->sh_size / 4;
687
688 while (--n_elt != 0)
689 if ((++idx)->shdr->bfd_section)
690 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
691 else if (idx->shdr->sh_type == SHT_RELA
692 || idx->shdr->sh_type == SHT_REL)
693 /* We won't include relocation sections in section groups in
694 output object files. We adjust the group section size here
695 so that relocatable link will work correctly when
696 relocation sections are in section group in input object
697 files. */
698 shdr->bfd_section->size -= 4;
699 else
700 {
701 /* There are some unknown sections in the group. */
702 (*_bfd_error_handler)
d003868e
AM
703 (_("%B: unknown [%d] section `%s' in group [%s]"),
704 abfd,
3d7f7666 705 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
706 bfd_elf_string_from_elf_section (abfd,
707 (elf_elfheader (abfd)
708 ->e_shstrndx),
709 idx->shdr->sh_name),
3d7f7666
L
710 shdr->bfd_section->name);
711 result = FALSE;
712 }
713 }
714 return result;
715}
716
72adc230
AM
717bfd_boolean
718bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
719{
720 return elf_next_in_group (sec) != NULL;
721}
722
252b5132
RH
723/* Make a BFD section from an ELF section. We store a pointer to the
724 BFD section in the bfd_section field of the header. */
725
b34976b6 726bfd_boolean
217aa764
AM
727_bfd_elf_make_section_from_shdr (bfd *abfd,
728 Elf_Internal_Shdr *hdr,
6dc132d9
L
729 const char *name,
730 int shindex)
252b5132
RH
731{
732 asection *newsect;
733 flagword flags;
9c5bfbb7 734 const struct elf_backend_data *bed;
252b5132
RH
735
736 if (hdr->bfd_section != NULL)
737 {
738 BFD_ASSERT (strcmp (name,
739 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 740 return TRUE;
252b5132
RH
741 }
742
743 newsect = bfd_make_section_anyway (abfd, name);
744 if (newsect == NULL)
b34976b6 745 return FALSE;
252b5132 746
1829f4b2
AM
747 hdr->bfd_section = newsect;
748 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 749 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 750
2f89ff8d
L
751 /* Always use the real type/flags. */
752 elf_section_type (newsect) = hdr->sh_type;
753 elf_section_flags (newsect) = hdr->sh_flags;
754
252b5132
RH
755 newsect->filepos = hdr->sh_offset;
756
757 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
758 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
759 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 760 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 761 return FALSE;
252b5132
RH
762
763 flags = SEC_NO_FLAGS;
764 if (hdr->sh_type != SHT_NOBITS)
765 flags |= SEC_HAS_CONTENTS;
dbb410c3 766 if (hdr->sh_type == SHT_GROUP)
b3096250 767 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
768 if ((hdr->sh_flags & SHF_ALLOC) != 0)
769 {
770 flags |= SEC_ALLOC;
771 if (hdr->sh_type != SHT_NOBITS)
772 flags |= SEC_LOAD;
773 }
774 if ((hdr->sh_flags & SHF_WRITE) == 0)
775 flags |= SEC_READONLY;
776 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
777 flags |= SEC_CODE;
778 else if ((flags & SEC_LOAD) != 0)
779 flags |= SEC_DATA;
f5fa8ca2
JJ
780 if ((hdr->sh_flags & SHF_MERGE) != 0)
781 {
782 flags |= SEC_MERGE;
783 newsect->entsize = hdr->sh_entsize;
784 if ((hdr->sh_flags & SHF_STRINGS) != 0)
785 flags |= SEC_STRINGS;
786 }
dbb410c3
AM
787 if (hdr->sh_flags & SHF_GROUP)
788 if (!setup_group (abfd, hdr, newsect))
b34976b6 789 return FALSE;
13ae64f3
JJ
790 if ((hdr->sh_flags & SHF_TLS) != 0)
791 flags |= SEC_THREAD_LOCAL;
252b5132 792
3d2b39cf 793 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 794 {
3d2b39cf
L
795 /* The debugging sections appear to be recognized only by name,
796 not any sort of flag. Their SEC_ALLOC bits are cleared. */
797 static const struct
798 {
799 const char *name;
800 int len;
801 } debug_sections [] =
802 {
803 { "debug", 5 }, /* 'd' */
804 { NULL, 0 }, /* 'e' */
805 { NULL, 0 }, /* 'f' */
806 { "gnu.linkonce.wi.", 17 }, /* 'g' */
807 { NULL, 0 }, /* 'h' */
808 { NULL, 0 }, /* 'i' */
809 { NULL, 0 }, /* 'j' */
810 { NULL, 0 }, /* 'k' */
811 { "line", 4 }, /* 'l' */
812 { NULL, 0 }, /* 'm' */
813 { NULL, 0 }, /* 'n' */
814 { NULL, 0 }, /* 'o' */
815 { NULL, 0 }, /* 'p' */
816 { NULL, 0 }, /* 'q' */
817 { NULL, 0 }, /* 'r' */
818 { "stab", 4 } /* 's' */
819 };
820
821 if (name [0] == '.')
822 {
823 int i = name [1] - 'd';
824 if (i >= 0
825 && i < (int) ARRAY_SIZE (debug_sections)
826 && debug_sections [i].name != NULL
827 && strncmp (&name [1], debug_sections [i].name,
828 debug_sections [i].len) == 0)
829 flags |= SEC_DEBUGGING;
830 }
831 }
252b5132
RH
832
833 /* As a GNU extension, if the name begins with .gnu.linkonce, we
834 only link a single copy of the section. This is used to support
835 g++. g++ will emit each template expansion in its own section.
836 The symbols will be defined as weak, so that multiple definitions
837 are permitted. The GNU linker extension is to actually discard
838 all but one of the sections. */
b885599b
AM
839 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
840 && elf_next_in_group (newsect) == NULL)
252b5132
RH
841 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
842
fa152c49
JW
843 bed = get_elf_backend_data (abfd);
844 if (bed->elf_backend_section_flags)
845 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 846 return FALSE;
fa152c49 847
252b5132 848 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 849 return FALSE;
252b5132
RH
850
851 if ((flags & SEC_ALLOC) != 0)
852 {
853 Elf_Internal_Phdr *phdr;
854 unsigned int i;
855
856 /* Look through the phdrs to see if we need to adjust the lma.
857 If all the p_paddr fields are zero, we ignore them, since
858 some ELF linkers produce such output. */
859 phdr = elf_tdata (abfd)->phdr;
860 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
861 {
862 if (phdr->p_paddr != 0)
863 break;
864 }
865 if (i < elf_elfheader (abfd)->e_phnum)
866 {
867 phdr = elf_tdata (abfd)->phdr;
868 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
869 {
e0e8c97f
NC
870 /* This section is part of this segment if its file
871 offset plus size lies within the segment's memory
872 span and, if the section is loaded, the extent of the
47d9a591 873 loaded data lies within the extent of the segment.
bf36db18
NC
874
875 Note - we used to check the p_paddr field as well, and
876 refuse to set the LMA if it was 0. This is wrong
dba143ef 877 though, as a perfectly valid initialised segment can
bf36db18 878 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 879 place special significance on the address 0 and
bf36db18
NC
880 executables need to be able to have a segment which
881 covers this address. */
252b5132 882 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
883 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
884 && (hdr->sh_offset + hdr->sh_size
885 <= phdr->p_offset + phdr->p_memsz)
252b5132 886 && ((flags & SEC_LOAD) == 0
d7866f04
AM
887 || (hdr->sh_offset + hdr->sh_size
888 <= phdr->p_offset + phdr->p_filesz)))
252b5132 889 {
dba143ef 890 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
891 newsect->lma = (phdr->p_paddr
892 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
893 else
894 /* We used to use the same adjustment for SEC_LOAD
895 sections, but that doesn't work if the segment
896 is packed with code from multiple VMAs.
897 Instead we calculate the section LMA based on
898 the segment LMA. It is assumed that the
899 segment will contain sections with contiguous
900 LMAs, even if the VMAs are not. */
901 newsect->lma = (phdr->p_paddr
902 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
903
904 /* With contiguous segments, we can't tell from file
905 offsets whether a section with zero size should
906 be placed at the end of one segment or the
907 beginning of the next. Decide based on vaddr. */
908 if (hdr->sh_addr >= phdr->p_vaddr
909 && (hdr->sh_addr + hdr->sh_size
910 <= phdr->p_vaddr + phdr->p_memsz))
911 break;
252b5132
RH
912 }
913 }
914 }
915 }
916
b34976b6 917 return TRUE;
252b5132
RH
918}
919
920/*
921INTERNAL_FUNCTION
922 bfd_elf_find_section
923
924SYNOPSIS
925 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
926
927DESCRIPTION
928 Helper functions for GDB to locate the string tables.
929 Since BFD hides string tables from callers, GDB needs to use an
930 internal hook to find them. Sun's .stabstr, in particular,
931 isn't even pointed to by the .stab section, so ordinary
932 mechanisms wouldn't work to find it, even if we had some.
933*/
934
935struct elf_internal_shdr *
217aa764 936bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
937{
938 Elf_Internal_Shdr **i_shdrp;
939 char *shstrtab;
940 unsigned int max;
941 unsigned int i;
942
943 i_shdrp = elf_elfsections (abfd);
944 if (i_shdrp != NULL)
945 {
9ad5cbcf
AM
946 shstrtab = bfd_elf_get_str_section (abfd,
947 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
948 if (shstrtab != NULL)
949 {
9ad5cbcf 950 max = elf_numsections (abfd);
252b5132
RH
951 for (i = 1; i < max; i++)
952 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
953 return i_shdrp[i];
954 }
955 }
956 return 0;
957}
958
959const char *const bfd_elf_section_type_names[] = {
960 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
961 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
962 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
963};
964
1049f94e 965/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
966 output, and the reloc is against an external symbol, and nothing
967 has given us any additional addend, the resulting reloc will also
968 be against the same symbol. In such a case, we don't want to
969 change anything about the way the reloc is handled, since it will
970 all be done at final link time. Rather than put special case code
971 into bfd_perform_relocation, all the reloc types use this howto
972 function. It just short circuits the reloc if producing
1049f94e 973 relocatable output against an external symbol. */
252b5132 974
252b5132 975bfd_reloc_status_type
217aa764
AM
976bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
977 arelent *reloc_entry,
978 asymbol *symbol,
979 void *data ATTRIBUTE_UNUSED,
980 asection *input_section,
981 bfd *output_bfd,
982 char **error_message ATTRIBUTE_UNUSED)
983{
984 if (output_bfd != NULL
252b5132
RH
985 && (symbol->flags & BSF_SECTION_SYM) == 0
986 && (! reloc_entry->howto->partial_inplace
987 || reloc_entry->addend == 0))
988 {
989 reloc_entry->address += input_section->output_offset;
990 return bfd_reloc_ok;
991 }
992
993 return bfd_reloc_continue;
994}
995\f
d3c456e9
JJ
996/* Make sure sec_info_type is cleared if sec_info is cleared too. */
997
998static void
217aa764
AM
999merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
1000 asection *sec)
d3c456e9 1001{
68bfbfcc
AM
1002 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
1003 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
1004}
1005
8550eb6e
JJ
1006/* Finish SHF_MERGE section merging. */
1007
b34976b6 1008bfd_boolean
217aa764 1009_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 1010{
57ceae94
AM
1011 bfd *ibfd;
1012 asection *sec;
1013
0eddce27 1014 if (!is_elf_hash_table (info->hash))
b34976b6 1015 return FALSE;
57ceae94
AM
1016
1017 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1018 if ((ibfd->flags & DYNAMIC) == 0)
1019 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
1020 if ((sec->flags & SEC_MERGE) != 0
1021 && !bfd_is_abs_section (sec->output_section))
1022 {
1023 struct bfd_elf_section_data *secdata;
1024
1025 secdata = elf_section_data (sec);
1026 if (! _bfd_add_merge_section (abfd,
1027 &elf_hash_table (info)->merge_info,
1028 sec, &secdata->sec_info))
1029 return FALSE;
1030 else if (secdata->sec_info)
1031 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
1032 }
1033
1034 if (elf_hash_table (info)->merge_info != NULL)
1035 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 1036 merge_sections_remove_hook);
b34976b6 1037 return TRUE;
8550eb6e 1038}
2d653fc7
AM
1039
1040void
217aa764 1041_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1042{
1043 sec->output_section = bfd_abs_section_ptr;
1044 sec->output_offset = sec->vma;
0eddce27 1045 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1046 return;
1047
68bfbfcc 1048 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1049}
8550eb6e 1050\f
0ac4564e
L
1051/* Copy the program header and other data from one object module to
1052 another. */
252b5132 1053
b34976b6 1054bfd_boolean
217aa764 1055_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1056{
1057 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1058 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1059 return TRUE;
2d502050
L
1060
1061 BFD_ASSERT (!elf_flags_init (obfd)
1062 || (elf_elfheader (obfd)->e_flags
1063 == elf_elfheader (ibfd)->e_flags));
1064
0ac4564e 1065 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1066 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1067 elf_flags_init (obfd) = TRUE;
1068 return TRUE;
2d502050
L
1069}
1070
f0b79d91
L
1071/* Print out the program headers. */
1072
b34976b6 1073bfd_boolean
217aa764 1074_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1075{
217aa764 1076 FILE *f = farg;
252b5132
RH
1077 Elf_Internal_Phdr *p;
1078 asection *s;
1079 bfd_byte *dynbuf = NULL;
1080
1081 p = elf_tdata (abfd)->phdr;
1082 if (p != NULL)
1083 {
1084 unsigned int i, c;
1085
1086 fprintf (f, _("\nProgram Header:\n"));
1087 c = elf_elfheader (abfd)->e_phnum;
1088 for (i = 0; i < c; i++, p++)
1089 {
dc810e39 1090 const char *pt;
252b5132
RH
1091 char buf[20];
1092
1093 switch (p->p_type)
1094 {
dc810e39
AM
1095 case PT_NULL: pt = "NULL"; break;
1096 case PT_LOAD: pt = "LOAD"; break;
1097 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1098 case PT_INTERP: pt = "INTERP"; break;
1099 case PT_NOTE: pt = "NOTE"; break;
1100 case PT_SHLIB: pt = "SHLIB"; break;
1101 case PT_PHDR: pt = "PHDR"; break;
13ae64f3 1102 case PT_TLS: pt = "TLS"; break;
65765700 1103 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
9ee5e499 1104 case PT_GNU_STACK: pt = "STACK"; break;
8c37241b 1105 case PT_GNU_RELRO: pt = "RELRO"; break;
dc810e39 1106 default: sprintf (buf, "0x%lx", p->p_type); pt = buf; break;
252b5132 1107 }
dc810e39 1108 fprintf (f, "%8s off 0x", pt);
60b89a18 1109 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1110 fprintf (f, " vaddr 0x");
60b89a18 1111 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1112 fprintf (f, " paddr 0x");
60b89a18 1113 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1114 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1115 fprintf (f, " filesz 0x");
60b89a18 1116 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1117 fprintf (f, " memsz 0x");
60b89a18 1118 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1119 fprintf (f, " flags %c%c%c",
1120 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1121 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1122 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1123 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1124 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1125 fprintf (f, "\n");
1126 }
1127 }
1128
1129 s = bfd_get_section_by_name (abfd, ".dynamic");
1130 if (s != NULL)
1131 {
1132 int elfsec;
dc810e39 1133 unsigned long shlink;
252b5132
RH
1134 bfd_byte *extdyn, *extdynend;
1135 size_t extdynsize;
217aa764 1136 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1137
1138 fprintf (f, _("\nDynamic Section:\n"));
1139
eea6121a 1140 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1141 goto error_return;
1142
1143 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1144 if (elfsec == -1)
1145 goto error_return;
dc810e39 1146 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1147
1148 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1149 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1150
1151 extdyn = dynbuf;
eea6121a 1152 extdynend = extdyn + s->size;
252b5132
RH
1153 for (; extdyn < extdynend; extdyn += extdynsize)
1154 {
1155 Elf_Internal_Dyn dyn;
1156 const char *name;
1157 char ab[20];
b34976b6 1158 bfd_boolean stringp;
252b5132 1159
217aa764 1160 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1161
1162 if (dyn.d_tag == DT_NULL)
1163 break;
1164
b34976b6 1165 stringp = FALSE;
252b5132
RH
1166 switch (dyn.d_tag)
1167 {
1168 default:
1169 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1170 name = ab;
1171 break;
1172
b34976b6 1173 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1174 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1175 case DT_PLTGOT: name = "PLTGOT"; break;
1176 case DT_HASH: name = "HASH"; break;
1177 case DT_STRTAB: name = "STRTAB"; break;
1178 case DT_SYMTAB: name = "SYMTAB"; break;
1179 case DT_RELA: name = "RELA"; break;
1180 case DT_RELASZ: name = "RELASZ"; break;
1181 case DT_RELAENT: name = "RELAENT"; break;
1182 case DT_STRSZ: name = "STRSZ"; break;
1183 case DT_SYMENT: name = "SYMENT"; break;
1184 case DT_INIT: name = "INIT"; break;
1185 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1186 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1187 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1188 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1189 case DT_REL: name = "REL"; break;
1190 case DT_RELSZ: name = "RELSZ"; break;
1191 case DT_RELENT: name = "RELENT"; break;
1192 case DT_PLTREL: name = "PLTREL"; break;
1193 case DT_DEBUG: name = "DEBUG"; break;
1194 case DT_TEXTREL: name = "TEXTREL"; break;
1195 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1196 case DT_BIND_NOW: name = "BIND_NOW"; break;
1197 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1198 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1199 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1200 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1201 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1202 case DT_FLAGS: name = "FLAGS"; break;
1203 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1204 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1205 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1206 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1207 case DT_MOVEENT: name = "MOVEENT"; break;
1208 case DT_MOVESZ: name = "MOVESZ"; break;
1209 case DT_FEATURE: name = "FEATURE"; break;
1210 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1211 case DT_SYMINSZ: name = "SYMINSZ"; break;
1212 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1213 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1214 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1215 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1216 case DT_PLTPAD: name = "PLTPAD"; break;
1217 case DT_MOVETAB: name = "MOVETAB"; break;
1218 case DT_SYMINFO: name = "SYMINFO"; break;
1219 case DT_RELACOUNT: name = "RELACOUNT"; break;
1220 case DT_RELCOUNT: name = "RELCOUNT"; break;
1221 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1222 case DT_VERSYM: name = "VERSYM"; break;
1223 case DT_VERDEF: name = "VERDEF"; break;
1224 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1225 case DT_VERNEED: name = "VERNEED"; break;
1226 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1227 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1228 case DT_USED: name = "USED"; break;
b34976b6 1229 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1230 }
1231
1232 fprintf (f, " %-11s ", name);
1233 if (! stringp)
1234 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1235 else
1236 {
1237 const char *string;
dc810e39 1238 unsigned int tagv = dyn.d_un.d_val;
252b5132 1239
dc810e39 1240 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1241 if (string == NULL)
1242 goto error_return;
1243 fprintf (f, "%s", string);
1244 }
1245 fprintf (f, "\n");
1246 }
1247
1248 free (dynbuf);
1249 dynbuf = NULL;
1250 }
1251
1252 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1253 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1254 {
fc0e6df6 1255 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1256 return FALSE;
252b5132
RH
1257 }
1258
1259 if (elf_dynverdef (abfd) != 0)
1260 {
1261 Elf_Internal_Verdef *t;
1262
1263 fprintf (f, _("\nVersion definitions:\n"));
1264 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1265 {
1266 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1267 t->vd_flags, t->vd_hash,
1268 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1269 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1270 {
1271 Elf_Internal_Verdaux *a;
1272
1273 fprintf (f, "\t");
1274 for (a = t->vd_auxptr->vda_nextptr;
1275 a != NULL;
1276 a = a->vda_nextptr)
d0fb9a8d
JJ
1277 fprintf (f, "%s ",
1278 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1279 fprintf (f, "\n");
1280 }
1281 }
1282 }
1283
1284 if (elf_dynverref (abfd) != 0)
1285 {
1286 Elf_Internal_Verneed *t;
1287
1288 fprintf (f, _("\nVersion References:\n"));
1289 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1290 {
1291 Elf_Internal_Vernaux *a;
1292
d0fb9a8d
JJ
1293 fprintf (f, _(" required from %s:\n"),
1294 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1295 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1296 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1297 a->vna_flags, a->vna_other,
1298 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1299 }
1300 }
1301
b34976b6 1302 return TRUE;
252b5132
RH
1303
1304 error_return:
1305 if (dynbuf != NULL)
1306 free (dynbuf);
b34976b6 1307 return FALSE;
252b5132
RH
1308}
1309
1310/* Display ELF-specific fields of a symbol. */
1311
1312void
217aa764
AM
1313bfd_elf_print_symbol (bfd *abfd,
1314 void *filep,
1315 asymbol *symbol,
1316 bfd_print_symbol_type how)
252b5132 1317{
217aa764 1318 FILE *file = filep;
252b5132
RH
1319 switch (how)
1320 {
1321 case bfd_print_symbol_name:
1322 fprintf (file, "%s", symbol->name);
1323 break;
1324 case bfd_print_symbol_more:
1325 fprintf (file, "elf ");
60b89a18 1326 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1327 fprintf (file, " %lx", (long) symbol->flags);
1328 break;
1329 case bfd_print_symbol_all:
1330 {
4e8a9624
AM
1331 const char *section_name;
1332 const char *name = NULL;
9c5bfbb7 1333 const struct elf_backend_data *bed;
7a13edea 1334 unsigned char st_other;
dbb410c3 1335 bfd_vma val;
c044fabd 1336
252b5132 1337 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1338
1339 bed = get_elf_backend_data (abfd);
1340 if (bed->elf_backend_print_symbol_all)
c044fabd 1341 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1342
1343 if (name == NULL)
1344 {
7ee38065 1345 name = symbol->name;
217aa764 1346 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1347 }
1348
252b5132
RH
1349 fprintf (file, " %s\t", section_name);
1350 /* Print the "other" value for a symbol. For common symbols,
1351 we've already printed the size; now print the alignment.
1352 For other symbols, we have no specified alignment, and
1353 we've printed the address; now print the size. */
dbb410c3
AM
1354 if (bfd_is_com_section (symbol->section))
1355 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1356 else
1357 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1358 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1359
1360 /* If we have version information, print it. */
1361 if (elf_tdata (abfd)->dynversym_section != 0
1362 && (elf_tdata (abfd)->dynverdef_section != 0
1363 || elf_tdata (abfd)->dynverref_section != 0))
1364 {
1365 unsigned int vernum;
1366 const char *version_string;
1367
1368 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1369
1370 if (vernum == 0)
1371 version_string = "";
1372 else if (vernum == 1)
1373 version_string = "Base";
1374 else if (vernum <= elf_tdata (abfd)->cverdefs)
1375 version_string =
1376 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1377 else
1378 {
1379 Elf_Internal_Verneed *t;
1380
1381 version_string = "";
1382 for (t = elf_tdata (abfd)->verref;
1383 t != NULL;
1384 t = t->vn_nextref)
1385 {
1386 Elf_Internal_Vernaux *a;
1387
1388 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1389 {
1390 if (a->vna_other == vernum)
1391 {
1392 version_string = a->vna_nodename;
1393 break;
1394 }
1395 }
1396 }
1397 }
1398
1399 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1400 fprintf (file, " %-11s", version_string);
1401 else
1402 {
1403 int i;
1404
1405 fprintf (file, " (%s)", version_string);
1406 for (i = 10 - strlen (version_string); i > 0; --i)
1407 putc (' ', file);
1408 }
1409 }
1410
1411 /* If the st_other field is not zero, print it. */
7a13edea 1412 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1413
7a13edea
NC
1414 switch (st_other)
1415 {
1416 case 0: break;
1417 case STV_INTERNAL: fprintf (file, " .internal"); break;
1418 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1419 case STV_PROTECTED: fprintf (file, " .protected"); break;
1420 default:
1421 /* Some other non-defined flags are also present, so print
1422 everything hex. */
1423 fprintf (file, " 0x%02x", (unsigned int) st_other);
1424 }
252b5132 1425
587ff49e 1426 fprintf (file, " %s", name);
252b5132
RH
1427 }
1428 break;
1429 }
1430}
1431\f
1432/* Create an entry in an ELF linker hash table. */
1433
1434struct bfd_hash_entry *
217aa764
AM
1435_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1436 struct bfd_hash_table *table,
1437 const char *string)
252b5132 1438{
252b5132
RH
1439 /* Allocate the structure if it has not already been allocated by a
1440 subclass. */
51b64d56
AM
1441 if (entry == NULL)
1442 {
1443 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1444 if (entry == NULL)
1445 return entry;
1446 }
252b5132
RH
1447
1448 /* Call the allocation method of the superclass. */
51b64d56
AM
1449 entry = _bfd_link_hash_newfunc (entry, table, string);
1450 if (entry != NULL)
252b5132 1451 {
51b64d56
AM
1452 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1453 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1454
252b5132
RH
1455 /* Set local fields. */
1456 ret->indx = -1;
252b5132 1457 ret->dynindx = -1;
a6aa5195
AM
1458 ret->got = htab->init_got_refcount;
1459 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1460 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1461 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1462 /* Assume that we have been called by a non-ELF symbol reader.
1463 This flag is then reset by the code which reads an ELF input
1464 file. This ensures that a symbol created by a non-ELF symbol
1465 reader will have the flag set correctly. */
f5385ebf 1466 ret->non_elf = 1;
252b5132
RH
1467 }
1468
51b64d56 1469 return entry;
252b5132
RH
1470}
1471
2920b85c 1472/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1473 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1474
c61b8717 1475void
fcfa13d2 1476_bfd_elf_link_hash_copy_indirect (struct bfd_link_info *info,
217aa764
AM
1477 struct elf_link_hash_entry *dir,
1478 struct elf_link_hash_entry *ind)
2920b85c 1479{
fcfa13d2 1480 struct elf_link_hash_table *htab;
3c3e9281 1481
2920b85c
RH
1482 /* Copy down any references that we may have already seen to the
1483 symbol which just became indirect. */
1484
f5385ebf
AM
1485 dir->ref_dynamic |= ind->ref_dynamic;
1486 dir->ref_regular |= ind->ref_regular;
1487 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1488 dir->non_got_ref |= ind->non_got_ref;
1489 dir->needs_plt |= ind->needs_plt;
1490 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1491
1e370bd2 1492 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1493 return;
1494
51b64d56 1495 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1496 These may have been already set up by a check_relocs routine. */
fcfa13d2
AM
1497 htab = elf_hash_table (info);
1498 if (ind->got.refcount > htab->init_got_refcount.refcount)
2920b85c 1499 {
fcfa13d2
AM
1500 if (dir->got.refcount < 0)
1501 dir->got.refcount = 0;
1502 dir->got.refcount += ind->got.refcount;
1503 ind->got.refcount = htab->init_got_refcount.refcount;
2920b85c 1504 }
2920b85c 1505
fcfa13d2 1506 if (ind->plt.refcount > htab->init_plt_refcount.refcount)
2920b85c 1507 {
fcfa13d2
AM
1508 if (dir->plt.refcount < 0)
1509 dir->plt.refcount = 0;
1510 dir->plt.refcount += ind->plt.refcount;
1511 ind->plt.refcount = htab->init_plt_refcount.refcount;
2920b85c 1512 }
2920b85c 1513
fcfa13d2 1514 if (ind->dynindx != -1)
2920b85c 1515 {
fcfa13d2
AM
1516 if (dir->dynindx != -1)
1517 _bfd_elf_strtab_delref (htab->dynstr, dir->dynstr_index);
2920b85c
RH
1518 dir->dynindx = ind->dynindx;
1519 dir->dynstr_index = ind->dynstr_index;
1520 ind->dynindx = -1;
1521 ind->dynstr_index = 0;
1522 }
2920b85c
RH
1523}
1524
c61b8717 1525void
217aa764
AM
1526_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1527 struct elf_link_hash_entry *h,
1528 bfd_boolean force_local)
2920b85c 1529{
a6aa5195 1530 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1531 h->needs_plt = 0;
e5094212
AM
1532 if (force_local)
1533 {
f5385ebf 1534 h->forced_local = 1;
e5094212
AM
1535 if (h->dynindx != -1)
1536 {
1537 h->dynindx = -1;
1538 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1539 h->dynstr_index);
1540 }
1541 }
2920b85c
RH
1542}
1543
252b5132
RH
1544/* Initialize an ELF linker hash table. */
1545
b34976b6 1546bfd_boolean
217aa764
AM
1547_bfd_elf_link_hash_table_init
1548 (struct elf_link_hash_table *table,
1549 bfd *abfd,
1550 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1551 struct bfd_hash_table *,
1552 const char *))
252b5132 1553{
b34976b6 1554 bfd_boolean ret;
a6aa5195 1555 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1556
b34976b6 1557 table->dynamic_sections_created = FALSE;
252b5132 1558 table->dynobj = NULL;
a6aa5195
AM
1559 table->init_got_refcount.refcount = can_refcount - 1;
1560 table->init_plt_refcount.refcount = can_refcount - 1;
1561 table->init_got_offset.offset = -(bfd_vma) 1;
1562 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1563 /* The first dynamic symbol is a dummy. */
1564 table->dynsymcount = 1;
1565 table->dynstr = NULL;
1566 table->bucketcount = 0;
1567 table->needed = NULL;
1568 table->hgot = NULL;
f5fa8ca2 1569 table->merge_info = NULL;
3722b82f 1570 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1571 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1572 table->dynlocal = NULL;
73722af0 1573 table->runpath = NULL;
e1918d23
AM
1574 table->tls_sec = NULL;
1575 table->tls_size = 0;
73722af0 1576 table->loaded = NULL;
67687978 1577 table->is_relocatable_executable = FALSE;
73722af0
AM
1578
1579 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc);
8ea2e4bd
NC
1580 table->root.type = bfd_link_elf_hash_table;
1581
1582 return ret;
252b5132
RH
1583}
1584
1585/* Create an ELF linker hash table. */
1586
1587struct bfd_link_hash_table *
217aa764 1588_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1589{
1590 struct elf_link_hash_table *ret;
dc810e39 1591 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1592
217aa764
AM
1593 ret = bfd_malloc (amt);
1594 if (ret == NULL)
252b5132
RH
1595 return NULL;
1596
1597 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc))
1598 {
e2d34d7d 1599 free (ret);
252b5132
RH
1600 return NULL;
1601 }
1602
1603 return &ret->root;
1604}
1605
1606/* This is a hook for the ELF emulation code in the generic linker to
1607 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1608 entry for a dynamic object. */
252b5132
RH
1609
1610void
217aa764 1611bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1612{
1613 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1614 && bfd_get_format (abfd) == bfd_object)
1615 elf_dt_name (abfd) = name;
1616}
1617
e56f61be
L
1618int
1619bfd_elf_get_dyn_lib_class (bfd *abfd)
1620{
1621 int lib_class;
1622 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1623 && bfd_get_format (abfd) == bfd_object)
1624 lib_class = elf_dyn_lib_class (abfd);
1625 else
1626 lib_class = 0;
1627 return lib_class;
1628}
1629
74816898 1630void
4a43e768 1631bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1632{
1633 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1634 && bfd_get_format (abfd) == bfd_object)
4a43e768 1635 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1636}
1637
252b5132
RH
1638/* Get the list of DT_NEEDED entries for a link. This is a hook for
1639 the linker ELF emulation code. */
1640
1641struct bfd_link_needed_list *
217aa764
AM
1642bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1643 struct bfd_link_info *info)
252b5132 1644{
0eddce27 1645 if (! is_elf_hash_table (info->hash))
252b5132
RH
1646 return NULL;
1647 return elf_hash_table (info)->needed;
1648}
1649
a963dc6a
L
1650/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1651 hook for the linker ELF emulation code. */
1652
1653struct bfd_link_needed_list *
217aa764
AM
1654bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1655 struct bfd_link_info *info)
a963dc6a 1656{
0eddce27 1657 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1658 return NULL;
1659 return elf_hash_table (info)->runpath;
1660}
1661
252b5132
RH
1662/* Get the name actually used for a dynamic object for a link. This
1663 is the SONAME entry if there is one. Otherwise, it is the string
1664 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1665
1666const char *
217aa764 1667bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1668{
1669 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1670 && bfd_get_format (abfd) == bfd_object)
1671 return elf_dt_name (abfd);
1672 return NULL;
1673}
1674
1675/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1676 the ELF linker emulation code. */
1677
b34976b6 1678bfd_boolean
217aa764
AM
1679bfd_elf_get_bfd_needed_list (bfd *abfd,
1680 struct bfd_link_needed_list **pneeded)
252b5132
RH
1681{
1682 asection *s;
1683 bfd_byte *dynbuf = NULL;
1684 int elfsec;
dc810e39 1685 unsigned long shlink;
252b5132
RH
1686 bfd_byte *extdyn, *extdynend;
1687 size_t extdynsize;
217aa764 1688 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1689
1690 *pneeded = NULL;
1691
1692 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1693 || bfd_get_format (abfd) != bfd_object)
b34976b6 1694 return TRUE;
252b5132
RH
1695
1696 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1697 if (s == NULL || s->size == 0)
b34976b6 1698 return TRUE;
252b5132 1699
eea6121a 1700 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1701 goto error_return;
1702
1703 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1704 if (elfsec == -1)
1705 goto error_return;
1706
dc810e39 1707 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1708
1709 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1710 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1711
1712 extdyn = dynbuf;
eea6121a 1713 extdynend = extdyn + s->size;
252b5132
RH
1714 for (; extdyn < extdynend; extdyn += extdynsize)
1715 {
1716 Elf_Internal_Dyn dyn;
1717
217aa764 1718 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1719
1720 if (dyn.d_tag == DT_NULL)
1721 break;
1722
1723 if (dyn.d_tag == DT_NEEDED)
1724 {
1725 const char *string;
1726 struct bfd_link_needed_list *l;
dc810e39
AM
1727 unsigned int tagv = dyn.d_un.d_val;
1728 bfd_size_type amt;
252b5132 1729
dc810e39 1730 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1731 if (string == NULL)
1732 goto error_return;
1733
dc810e39 1734 amt = sizeof *l;
217aa764 1735 l = bfd_alloc (abfd, amt);
252b5132
RH
1736 if (l == NULL)
1737 goto error_return;
1738
1739 l->by = abfd;
1740 l->name = string;
1741 l->next = *pneeded;
1742 *pneeded = l;
1743 }
1744 }
1745
1746 free (dynbuf);
1747
b34976b6 1748 return TRUE;
252b5132
RH
1749
1750 error_return:
1751 if (dynbuf != NULL)
1752 free (dynbuf);
b34976b6 1753 return FALSE;
252b5132
RH
1754}
1755\f
1756/* Allocate an ELF string table--force the first byte to be zero. */
1757
1758struct bfd_strtab_hash *
217aa764 1759_bfd_elf_stringtab_init (void)
252b5132
RH
1760{
1761 struct bfd_strtab_hash *ret;
1762
1763 ret = _bfd_stringtab_init ();
1764 if (ret != NULL)
1765 {
1766 bfd_size_type loc;
1767
b34976b6 1768 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1769 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1770 if (loc == (bfd_size_type) -1)
1771 {
1772 _bfd_stringtab_free (ret);
1773 ret = NULL;
1774 }
1775 }
1776 return ret;
1777}
1778\f
1779/* ELF .o/exec file reading */
1780
c044fabd 1781/* Create a new bfd section from an ELF section header. */
252b5132 1782
b34976b6 1783bfd_boolean
217aa764 1784bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1785{
1786 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1787 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1788 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1789 const char *name;
252b5132 1790
1b3a8575
AM
1791 name = bfd_elf_string_from_elf_section (abfd,
1792 elf_elfheader (abfd)->e_shstrndx,
1793 hdr->sh_name);
933d961a
JJ
1794 if (name == NULL)
1795 return FALSE;
252b5132
RH
1796
1797 switch (hdr->sh_type)
1798 {
1799 case SHT_NULL:
1800 /* Inactive section. Throw it away. */
b34976b6 1801 return TRUE;
252b5132
RH
1802
1803 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1804 case SHT_NOBITS: /* .bss section. */
1805 case SHT_HASH: /* .hash section. */
1806 case SHT_NOTE: /* .note section. */
25e27870
L
1807 case SHT_INIT_ARRAY: /* .init_array section. */
1808 case SHT_FINI_ARRAY: /* .fini_array section. */
1809 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1810 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1811 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1812
797fc050 1813 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1814 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1815 return FALSE;
8e0ed13f
NC
1816 if (hdr->sh_link > elf_numsections (abfd)
1817 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1818 return FALSE;
797fc050
AM
1819 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1820 {
1821 Elf_Internal_Shdr *dynsymhdr;
1822
1823 /* The shared libraries distributed with hpux11 have a bogus
1824 sh_link field for the ".dynamic" section. Find the
1825 string table for the ".dynsym" section instead. */
1826 if (elf_dynsymtab (abfd) != 0)
1827 {
1828 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1829 hdr->sh_link = dynsymhdr->sh_link;
1830 }
1831 else
1832 {
1833 unsigned int i, num_sec;
1834
1835 num_sec = elf_numsections (abfd);
1836 for (i = 1; i < num_sec; i++)
1837 {
1838 dynsymhdr = elf_elfsections (abfd)[i];
1839 if (dynsymhdr->sh_type == SHT_DYNSYM)
1840 {
1841 hdr->sh_link = dynsymhdr->sh_link;
1842 break;
1843 }
1844 }
1845 }
1846 }
1847 break;
1848
252b5132
RH
1849 case SHT_SYMTAB: /* A symbol table */
1850 if (elf_onesymtab (abfd) == shindex)
b34976b6 1851 return TRUE;
252b5132 1852
a50b2160
JJ
1853 if (hdr->sh_entsize != bed->s->sizeof_sym)
1854 return FALSE;
252b5132
RH
1855 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1856 elf_onesymtab (abfd) = shindex;
1857 elf_tdata (abfd)->symtab_hdr = *hdr;
1858 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1859 abfd->flags |= HAS_SYMS;
1860
1861 /* Sometimes a shared object will map in the symbol table. If
1862 SHF_ALLOC is set, and this is a shared object, then we also
1863 treat this section as a BFD section. We can not base the
1864 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1865 set in a relocatable object file, which would confuse the
252b5132
RH
1866 linker. */
1867 if ((hdr->sh_flags & SHF_ALLOC) != 0
1868 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1869 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1870 shindex))
b34976b6 1871 return FALSE;
252b5132 1872
1b3a8575
AM
1873 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1874 can't read symbols without that section loaded as well. It
1875 is most likely specified by the next section header. */
1876 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1877 {
1878 unsigned int i, num_sec;
1879
1880 num_sec = elf_numsections (abfd);
1881 for (i = shindex + 1; i < num_sec; i++)
1882 {
1883 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1884 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1885 && hdr2->sh_link == shindex)
1886 break;
1887 }
1888 if (i == num_sec)
1889 for (i = 1; i < shindex; i++)
1890 {
1891 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1892 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1893 && hdr2->sh_link == shindex)
1894 break;
1895 }
1896 if (i != shindex)
1897 return bfd_section_from_shdr (abfd, i);
1898 }
b34976b6 1899 return TRUE;
252b5132
RH
1900
1901 case SHT_DYNSYM: /* A dynamic symbol table */
1902 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1903 return TRUE;
252b5132 1904
a50b2160
JJ
1905 if (hdr->sh_entsize != bed->s->sizeof_sym)
1906 return FALSE;
252b5132
RH
1907 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1908 elf_dynsymtab (abfd) = shindex;
1909 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1910 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1911 abfd->flags |= HAS_SYMS;
1912
1913 /* Besides being a symbol table, we also treat this as a regular
1914 section, so that objcopy can handle it. */
6dc132d9 1915 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1916
9ad5cbcf
AM
1917 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1918 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1919 return TRUE;
9ad5cbcf 1920
1b3a8575 1921 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1922 elf_symtab_shndx (abfd) = shindex;
1923 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1924 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1925 return TRUE;
9ad5cbcf 1926
252b5132
RH
1927 case SHT_STRTAB: /* A string table */
1928 if (hdr->bfd_section != NULL)
b34976b6 1929 return TRUE;
252b5132
RH
1930 if (ehdr->e_shstrndx == shindex)
1931 {
1932 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1933 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1934 return TRUE;
252b5132 1935 }
1b3a8575
AM
1936 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1937 {
1938 symtab_strtab:
1939 elf_tdata (abfd)->strtab_hdr = *hdr;
1940 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1941 return TRUE;
1942 }
1943 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1944 {
1945 dynsymtab_strtab:
1946 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1947 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1948 elf_elfsections (abfd)[shindex] = hdr;
1949 /* We also treat this as a regular section, so that objcopy
1950 can handle it. */
6dc132d9
L
1951 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1952 shindex);
1b3a8575 1953 }
252b5132 1954
1b3a8575
AM
1955 /* If the string table isn't one of the above, then treat it as a
1956 regular section. We need to scan all the headers to be sure,
1957 just in case this strtab section appeared before the above. */
1958 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1959 {
1960 unsigned int i, num_sec;
252b5132 1961
1b3a8575
AM
1962 num_sec = elf_numsections (abfd);
1963 for (i = 1; i < num_sec; i++)
1964 {
1965 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1966 if (hdr2->sh_link == shindex)
1967 {
933d961a
JJ
1968 /* Prevent endless recursion on broken objects. */
1969 if (i == shindex)
1970 return FALSE;
1b3a8575
AM
1971 if (! bfd_section_from_shdr (abfd, i))
1972 return FALSE;
1973 if (elf_onesymtab (abfd) == i)
1974 goto symtab_strtab;
1975 if (elf_dynsymtab (abfd) == i)
1976 goto dynsymtab_strtab;
1977 }
1978 }
1979 }
6dc132d9 1980 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1981
1982 case SHT_REL:
1983 case SHT_RELA:
1984 /* *These* do a lot of work -- but build no sections! */
1985 {
1986 asection *target_sect;
1987 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1988 unsigned int num_sec = elf_numsections (abfd);
252b5132 1989
aa2ca951
JJ
1990 if (hdr->sh_entsize
1991 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1992 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1993 return FALSE;
1994
03ae5f59 1995 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1996 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1997 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1998 {
1999 ((*_bfd_error_handler)
d003868e
AM
2000 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2001 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
2002 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2003 shindex);
03ae5f59
ILT
2004 }
2005
252b5132
RH
2006 /* For some incomprehensible reason Oracle distributes
2007 libraries for Solaris in which some of the objects have
2008 bogus sh_link fields. It would be nice if we could just
2009 reject them, but, unfortunately, some people need to use
2010 them. We scan through the section headers; if we find only
2011 one suitable symbol table, we clobber the sh_link to point
2012 to it. I hope this doesn't break anything. */
2013 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2014 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2015 {
9ad5cbcf 2016 unsigned int scan;
252b5132
RH
2017 int found;
2018
2019 found = 0;
9ad5cbcf 2020 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2021 {
2022 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2023 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2024 {
2025 if (found != 0)
2026 {
2027 found = 0;
2028 break;
2029 }
2030 found = scan;
2031 }
2032 }
2033 if (found != 0)
2034 hdr->sh_link = found;
2035 }
2036
2037 /* Get the symbol table. */
1b3a8575
AM
2038 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2039 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2040 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 2041 return FALSE;
252b5132
RH
2042
2043 /* If this reloc section does not use the main symbol table we
2044 don't treat it as a reloc section. BFD can't adequately
2045 represent such a section, so at least for now, we don't
c044fabd 2046 try. We just present it as a normal section. We also
60bcf0fa 2047 can't use it as a reloc section if it points to the null
c044fabd 2048 section. */
60bcf0fa 2049 if (hdr->sh_link != elf_onesymtab (abfd) || hdr->sh_info == SHN_UNDEF)
6dc132d9
L
2050 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2051 shindex);
252b5132 2052
a50b2160
JJ
2053 /* Prevent endless recursion on broken objects. */
2054 if (elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2055 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2056 return FALSE;
252b5132 2057 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2058 return FALSE;
252b5132
RH
2059 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2060 if (target_sect == NULL)
b34976b6 2061 return FALSE;
252b5132
RH
2062
2063 if ((target_sect->flags & SEC_RELOC) == 0
2064 || target_sect->reloc_count == 0)
2065 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2066 else
2067 {
dc810e39 2068 bfd_size_type amt;
252b5132 2069 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2070 amt = sizeof (*hdr2);
217aa764 2071 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2072 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2073 }
2074 *hdr2 = *hdr;
2075 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2076 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2077 target_sect->flags |= SEC_RELOC;
2078 target_sect->relocation = NULL;
2079 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2080 /* In the section to which the relocations apply, mark whether
2081 its relocations are of the REL or RELA variety. */
72730e0c 2082 if (hdr->sh_size != 0)
68bfbfcc 2083 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2084 abfd->flags |= HAS_RELOC;
b34976b6 2085 return TRUE;
252b5132
RH
2086 }
2087 break;
2088
2089 case SHT_GNU_verdef:
2090 elf_dynverdef (abfd) = shindex;
2091 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2092 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2093 break;
2094
2095 case SHT_GNU_versym:
a50b2160
JJ
2096 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2097 return FALSE;
252b5132
RH
2098 elf_dynversym (abfd) = shindex;
2099 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2100 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2101 break;
2102
2103 case SHT_GNU_verneed:
2104 elf_dynverref (abfd) = shindex;
2105 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2106 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2107 break;
2108
2109 case SHT_SHLIB:
b34976b6 2110 return TRUE;
252b5132 2111
dbb410c3 2112 case SHT_GROUP:
b885599b
AM
2113 /* We need a BFD section for objcopy and relocatable linking,
2114 and it's handy to have the signature available as the section
2115 name. */
a50b2160
JJ
2116 if (hdr->sh_entsize != GRP_ENTRY_SIZE)
2117 return FALSE;
b885599b
AM
2118 name = group_signature (abfd, hdr);
2119 if (name == NULL)
b34976b6 2120 return FALSE;
6dc132d9 2121 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2122 return FALSE;
dbb410c3
AM
2123 if (hdr->contents != NULL)
2124 {
2125 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2126 unsigned int n_elt = hdr->sh_size / 4;
2127 asection *s;
2128
b885599b
AM
2129 if (idx->flags & GRP_COMDAT)
2130 hdr->bfd_section->flags
2131 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2132
45c5e9ed
L
2133 /* We try to keep the same section order as it comes in. */
2134 idx += n_elt;
dbb410c3 2135 while (--n_elt != 0)
45c5e9ed 2136 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2137 && elf_next_in_group (s) != NULL)
dbb410c3 2138 {
945906ff 2139 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2140 break;
2141 }
2142 }
2143 break;
2144
252b5132
RH
2145 default:
2146 /* Check for any processor-specific section types. */
6dc132d9
L
2147 return bed->elf_backend_section_from_shdr (abfd, hdr, name,
2148 shindex);
252b5132
RH
2149 }
2150
b34976b6 2151 return TRUE;
252b5132
RH
2152}
2153
ec338859
AM
2154/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2155 Return SEC for sections that have no elf section, and NULL on error. */
2156
2157asection *
217aa764
AM
2158bfd_section_from_r_symndx (bfd *abfd,
2159 struct sym_sec_cache *cache,
2160 asection *sec,
2161 unsigned long r_symndx)
ec338859 2162{
ec338859 2163 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2164 unsigned char esym[sizeof (Elf64_External_Sym)];
2165 Elf_External_Sym_Shndx eshndx;
2166 Elf_Internal_Sym isym;
ec338859
AM
2167 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2168
2169 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2170 return cache->sec[ent];
2171
2172 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2173 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2174 &isym, esym, &eshndx) == NULL)
ec338859 2175 return NULL;
9ad5cbcf 2176
ec338859
AM
2177 if (cache->abfd != abfd)
2178 {
2179 memset (cache->indx, -1, sizeof (cache->indx));
2180 cache->abfd = abfd;
2181 }
2182 cache->indx[ent] = r_symndx;
2183 cache->sec[ent] = sec;
50bc7936
AM
2184 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2185 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2186 {
2187 asection *s;
6cdc0ccc 2188 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2189 if (s != NULL)
2190 cache->sec[ent] = s;
2191 }
2192 return cache->sec[ent];
2193}
2194
252b5132
RH
2195/* Given an ELF section number, retrieve the corresponding BFD
2196 section. */
2197
2198asection *
217aa764 2199bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2200{
9ad5cbcf 2201 if (index >= elf_numsections (abfd))
252b5132
RH
2202 return NULL;
2203 return elf_elfsections (abfd)[index]->bfd_section;
2204}
2205
b35d266b 2206static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2207{
7dcb9820 2208 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7f4d3958
L
2209 { NULL, 0, 0, 0, 0 }
2210};
2211
b35d266b 2212static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2213{
7dcb9820 2214 { ".comment", 8, 0, SHT_PROGBITS, 0 },
7f4d3958
L
2215 { NULL, 0, 0, 0, 0 }
2216};
2217
b35d266b 2218static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2219{
7dcb9820
AM
2220 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2221 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2222 { ".debug", 6, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2223 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2224 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2225 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2226 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2227 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2228 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2229 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
7f4d3958
L
2230 { NULL, 0, 0, 0, 0 }
2231};
2232
b35d266b 2233static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958
L
2234{
2235 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2236 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2237 { NULL, 0, 0, 0, 0 }
2238};
2239
b35d266b 2240static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958
L
2241{
2242 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820 2243 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2244 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2245 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2246 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
7f4d3958
L
2247 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2248 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
2249 { NULL, 0, 0, 0, 0 }
2250};
2251
b35d266b 2252static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958
L
2253{
2254 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2255 { NULL, 0, 0, 0, 0 }
2256};
2257
b35d266b 2258static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958
L
2259{
2260 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2261 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2262 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2263 { NULL, 0, 0, 0, 0 }
2264};
2265
b35d266b 2266static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958
L
2267{
2268 { ".line", 5, 0, SHT_PROGBITS, 0 },
2269 { NULL, 0, 0, 0, 0 }
2270};
2271
b35d266b 2272static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2273{
45c5e9ed 2274 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820 2275 { ".note", 5, -1, SHT_NOTE, 0 },
7f4d3958
L
2276 { NULL, 0, 0, 0, 0 }
2277};
2278
b35d266b 2279static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958
L
2280{
2281 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2282 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2283 { NULL, 0, 0, 0, 0 }
2284};
2285
b35d266b 2286static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958
L
2287{
2288 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2289 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
7dcb9820
AM
2290 { ".rela", 5, -1, SHT_RELA, 0 },
2291 { ".rel", 4, -1, SHT_REL, 0 },
7f4d3958
L
2292 { NULL, 0, 0, 0, 0 }
2293};
2294
b35d266b 2295static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958
L
2296{
2297 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2298 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2299 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
7dcb9820
AM
2300 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2301 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2302};
2303
b35d266b 2304static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958
L
2305{
2306 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2307 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2308 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2309 { NULL, 0, 0, 0, 0 }
2310};
2311
b35d266b 2312static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2313{
7f4d3958
L
2314 special_sections_b, /* 'b' */
2315 special_sections_c, /* 'b' */
2316 special_sections_d, /* 'd' */
2317 NULL, /* 'e' */
2318 special_sections_f, /* 'f' */
2319 special_sections_g, /* 'g' */
2320 special_sections_h, /* 'h' */
2321 special_sections_i, /* 'i' */
2322 NULL, /* 'j' */
2323 NULL, /* 'k' */
2324 special_sections_l, /* 'l' */
2325 NULL, /* 'm' */
2326 special_sections_n, /* 'n' */
2327 NULL, /* 'o' */
2328 special_sections_p, /* 'p' */
2329 NULL, /* 'q' */
2330 special_sections_r, /* 'r' */
2331 special_sections_s, /* 's' */
2332 special_sections_t, /* 't' */
7f4d3958
L
2333};
2334
551b43fd
AM
2335const struct bfd_elf_special_section *
2336_bfd_elf_get_special_section (const char *name,
2337 const struct bfd_elf_special_section *spec,
2338 unsigned int rela)
2f89ff8d
L
2339{
2340 int i;
7f4d3958 2341 int len;
7f4d3958 2342
551b43fd 2343 len = strlen (name);
7f4d3958 2344
551b43fd 2345 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2346 {
2347 int suffix_len;
551b43fd 2348 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2349
2350 if (len < prefix_len)
2351 continue;
551b43fd 2352 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2353 continue;
2354
551b43fd 2355 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2356 if (suffix_len <= 0)
2357 {
2358 if (name[prefix_len] != 0)
2359 {
2360 if (suffix_len == 0)
2361 continue;
2362 if (name[prefix_len] != '.'
2363 && (suffix_len == -2
551b43fd 2364 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2365 continue;
2366 }
2367 }
2368 else
2369 {
2370 if (len < prefix_len + suffix_len)
2371 continue;
2372 if (memcmp (name + len - suffix_len,
551b43fd 2373 spec[i].prefix + prefix_len,
7dcb9820
AM
2374 suffix_len) != 0)
2375 continue;
2376 }
551b43fd 2377 return &spec[i];
7dcb9820 2378 }
2f89ff8d
L
2379
2380 return NULL;
2381}
2382
7dcb9820 2383const struct bfd_elf_special_section *
29ef7005 2384_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2385{
551b43fd
AM
2386 int i;
2387 const struct bfd_elf_special_section *spec;
29ef7005 2388 const struct elf_backend_data *bed;
2f89ff8d
L
2389
2390 /* See if this is one of the special sections. */
551b43fd
AM
2391 if (sec->name == NULL)
2392 return NULL;
2f89ff8d 2393
29ef7005
L
2394 bed = get_elf_backend_data (abfd);
2395 spec = bed->special_sections;
2396 if (spec)
2397 {
2398 spec = _bfd_elf_get_special_section (sec->name,
2399 bed->special_sections,
2400 sec->use_rela_p);
2401 if (spec != NULL)
2402 return spec;
2403 }
2404
551b43fd
AM
2405 if (sec->name[0] != '.')
2406 return NULL;
2f89ff8d 2407
551b43fd
AM
2408 i = sec->name[1] - 'b';
2409 if (i < 0 || i > 't' - 'b')
2410 return NULL;
2411
2412 spec = special_sections[i];
2f89ff8d 2413
551b43fd
AM
2414 if (spec == NULL)
2415 return NULL;
2416
2417 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2418}
2419
b34976b6 2420bfd_boolean
217aa764 2421_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2422{
2423 struct bfd_elf_section_data *sdata;
551b43fd 2424 const struct elf_backend_data *bed;
7dcb9820 2425 const struct bfd_elf_special_section *ssect;
252b5132 2426
f0abc2a1
AM
2427 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2428 if (sdata == NULL)
2429 {
217aa764 2430 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2431 if (sdata == NULL)
2432 return FALSE;
217aa764 2433 sec->used_by_bfd = sdata;
f0abc2a1 2434 }
bf572ba0 2435
551b43fd
AM
2436 /* Indicate whether or not this section should use RELA relocations. */
2437 bed = get_elf_backend_data (abfd);
2438 sec->use_rela_p = bed->default_use_rela_p;
2439
3496cb2a
L
2440 /* When we read a file, we don't need section type and flags unless
2441 it is a linker created section. They will be overridden in
2442 _bfd_elf_make_section_from_shdr anyway. */
2443 if (abfd->direction != read_direction
2444 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2445 {
551b43fd 2446 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2447 if (ssect != NULL)
2448 {
2449 elf_section_type (sec) = ssect->type;
2450 elf_section_flags (sec) = ssect->attr;
2451 }
2f89ff8d
L
2452 }
2453
b34976b6 2454 return TRUE;
252b5132
RH
2455}
2456
2457/* Create a new bfd section from an ELF program header.
2458
2459 Since program segments have no names, we generate a synthetic name
2460 of the form segment<NUM>, where NUM is generally the index in the
2461 program header table. For segments that are split (see below) we
2462 generate the names segment<NUM>a and segment<NUM>b.
2463
2464 Note that some program segments may have a file size that is different than
2465 (less than) the memory size. All this means is that at execution the
2466 system must allocate the amount of memory specified by the memory size,
2467 but only initialize it with the first "file size" bytes read from the
2468 file. This would occur for example, with program segments consisting
2469 of combined data+bss.
2470
2471 To handle the above situation, this routine generates TWO bfd sections
2472 for the single program segment. The first has the length specified by
2473 the file size of the segment, and the second has the length specified
2474 by the difference between the two sizes. In effect, the segment is split
2475 into it's initialized and uninitialized parts.
2476
2477 */
2478
b34976b6 2479bfd_boolean
217aa764
AM
2480_bfd_elf_make_section_from_phdr (bfd *abfd,
2481 Elf_Internal_Phdr *hdr,
2482 int index,
2483 const char *typename)
252b5132
RH
2484{
2485 asection *newsect;
2486 char *name;
2487 char namebuf[64];
d4c88bbb 2488 size_t len;
252b5132
RH
2489 int split;
2490
2491 split = ((hdr->p_memsz > 0)
2492 && (hdr->p_filesz > 0)
2493 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2494 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2495 len = strlen (namebuf) + 1;
217aa764 2496 name = bfd_alloc (abfd, len);
252b5132 2497 if (!name)
b34976b6 2498 return FALSE;
d4c88bbb 2499 memcpy (name, namebuf, len);
252b5132
RH
2500 newsect = bfd_make_section (abfd, name);
2501 if (newsect == NULL)
b34976b6 2502 return FALSE;
252b5132
RH
2503 newsect->vma = hdr->p_vaddr;
2504 newsect->lma = hdr->p_paddr;
eea6121a 2505 newsect->size = hdr->p_filesz;
252b5132
RH
2506 newsect->filepos = hdr->p_offset;
2507 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2508 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2509 if (hdr->p_type == PT_LOAD)
2510 {
2511 newsect->flags |= SEC_ALLOC;
2512 newsect->flags |= SEC_LOAD;
2513 if (hdr->p_flags & PF_X)
2514 {
2515 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2516 may be data. */
252b5132
RH
2517 newsect->flags |= SEC_CODE;
2518 }
2519 }
2520 if (!(hdr->p_flags & PF_W))
2521 {
2522 newsect->flags |= SEC_READONLY;
2523 }
2524
2525 if (split)
2526 {
27ac83bf 2527 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2528 len = strlen (namebuf) + 1;
217aa764 2529 name = bfd_alloc (abfd, len);
252b5132 2530 if (!name)
b34976b6 2531 return FALSE;
d4c88bbb 2532 memcpy (name, namebuf, len);
252b5132
RH
2533 newsect = bfd_make_section (abfd, name);
2534 if (newsect == NULL)
b34976b6 2535 return FALSE;
252b5132
RH
2536 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2537 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2538 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2539 if (hdr->p_type == PT_LOAD)
2540 {
2541 newsect->flags |= SEC_ALLOC;
2542 if (hdr->p_flags & PF_X)
2543 newsect->flags |= SEC_CODE;
2544 }
2545 if (!(hdr->p_flags & PF_W))
2546 newsect->flags |= SEC_READONLY;
2547 }
2548
b34976b6 2549 return TRUE;
252b5132
RH
2550}
2551
b34976b6 2552bfd_boolean
217aa764 2553bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2554{
9c5bfbb7 2555 const struct elf_backend_data *bed;
20cfcaae
NC
2556
2557 switch (hdr->p_type)
2558 {
2559 case PT_NULL:
2560 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2561
2562 case PT_LOAD:
2563 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2564
2565 case PT_DYNAMIC:
2566 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2567
2568 case PT_INTERP:
2569 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2570
2571 case PT_NOTE:
2572 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2573 return FALSE;
217aa764 2574 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2575 return FALSE;
2576 return TRUE;
20cfcaae
NC
2577
2578 case PT_SHLIB:
2579 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2580
2581 case PT_PHDR:
2582 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2583
811072d8
RM
2584 case PT_GNU_EH_FRAME:
2585 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2586 "eh_frame_hdr");
2587
9ee5e499
JJ
2588 case PT_GNU_STACK:
2589 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2590
8c37241b
JJ
2591 case PT_GNU_RELRO:
2592 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2593
20cfcaae 2594 default:
8c1acd09 2595 /* Check for any processor-specific program segment types. */
20cfcaae 2596 bed = get_elf_backend_data (abfd);
d27f5fa1 2597 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2598 }
2599}
2600
23bc299b 2601/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2602 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2603 relocations; otherwise, we use REL relocations. */
2604
b34976b6 2605bfd_boolean
217aa764
AM
2606_bfd_elf_init_reloc_shdr (bfd *abfd,
2607 Elf_Internal_Shdr *rel_hdr,
2608 asection *asect,
2609 bfd_boolean use_rela_p)
23bc299b
MM
2610{
2611 char *name;
9c5bfbb7 2612 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2613 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2614
dc810e39 2615 name = bfd_alloc (abfd, amt);
23bc299b 2616 if (name == NULL)
b34976b6 2617 return FALSE;
23bc299b
MM
2618 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2619 rel_hdr->sh_name =
2b0f7ef9 2620 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2621 FALSE);
23bc299b 2622 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2623 return FALSE;
23bc299b
MM
2624 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2625 rel_hdr->sh_entsize = (use_rela_p
2626 ? bed->s->sizeof_rela
2627 : bed->s->sizeof_rel);
45d6a902 2628 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2629 rel_hdr->sh_flags = 0;
2630 rel_hdr->sh_addr = 0;
2631 rel_hdr->sh_size = 0;
2632 rel_hdr->sh_offset = 0;
2633
b34976b6 2634 return TRUE;
23bc299b
MM
2635}
2636
252b5132
RH
2637/* Set up an ELF internal section header for a section. */
2638
252b5132 2639static void
217aa764 2640elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2641{
9c5bfbb7 2642 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2643 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2644 Elf_Internal_Shdr *this_hdr;
2645
2646 if (*failedptr)
2647 {
2648 /* We already failed; just get out of the bfd_map_over_sections
2649 loop. */
2650 return;
2651 }
2652
2653 this_hdr = &elf_section_data (asect)->this_hdr;
2654
e57b5356
AM
2655 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2656 asect->name, FALSE);
2657 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2658 {
b34976b6 2659 *failedptr = TRUE;
252b5132
RH
2660 return;
2661 }
2662
a4d8e49b 2663 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2664
2665 if ((asect->flags & SEC_ALLOC) != 0
2666 || asect->user_set_vma)
2667 this_hdr->sh_addr = asect->vma;
2668 else
2669 this_hdr->sh_addr = 0;
2670
2671 this_hdr->sh_offset = 0;
eea6121a 2672 this_hdr->sh_size = asect->size;
252b5132
RH
2673 this_hdr->sh_link = 0;
2674 this_hdr->sh_addralign = 1 << asect->alignment_power;
2675 /* The sh_entsize and sh_info fields may have been set already by
2676 copy_private_section_data. */
2677
2678 this_hdr->bfd_section = asect;
2679 this_hdr->contents = NULL;
2680
3cddba1e
L
2681 /* If the section type is unspecified, we set it based on
2682 asect->flags. */
2683 if (this_hdr->sh_type == SHT_NULL)
2684 {
45c5e9ed 2685 if ((asect->flags & SEC_GROUP) != 0)
ccd2ec6a 2686 this_hdr->sh_type = SHT_GROUP;
45c5e9ed 2687 else if ((asect->flags & SEC_ALLOC) != 0
3cddba1e
L
2688 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2689 || (asect->flags & SEC_NEVER_LOAD) != 0))
2690 this_hdr->sh_type = SHT_NOBITS;
2691 else
2692 this_hdr->sh_type = SHT_PROGBITS;
2693 }
2694
2f89ff8d 2695 switch (this_hdr->sh_type)
252b5132 2696 {
2f89ff8d 2697 default:
2f89ff8d
L
2698 break;
2699
2700 case SHT_STRTAB:
2701 case SHT_INIT_ARRAY:
2702 case SHT_FINI_ARRAY:
2703 case SHT_PREINIT_ARRAY:
2704 case SHT_NOTE:
2705 case SHT_NOBITS:
2706 case SHT_PROGBITS:
2707 break;
2708
2709 case SHT_HASH:
c7ac6ff8 2710 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2711 break;
5de3bf90 2712
2f89ff8d 2713 case SHT_DYNSYM:
252b5132 2714 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2715 break;
2716
2717 case SHT_DYNAMIC:
252b5132 2718 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2719 break;
2720
2721 case SHT_RELA:
2722 if (get_elf_backend_data (abfd)->may_use_rela_p)
2723 this_hdr->sh_entsize = bed->s->sizeof_rela;
2724 break;
2725
2726 case SHT_REL:
2727 if (get_elf_backend_data (abfd)->may_use_rel_p)
2728 this_hdr->sh_entsize = bed->s->sizeof_rel;
2729 break;
2730
2731 case SHT_GNU_versym:
252b5132 2732 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2733 break;
2734
2735 case SHT_GNU_verdef:
252b5132
RH
2736 this_hdr->sh_entsize = 0;
2737 /* objcopy or strip will copy over sh_info, but may not set
2738 cverdefs. The linker will set cverdefs, but sh_info will be
2739 zero. */
2740 if (this_hdr->sh_info == 0)
2741 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2742 else
2743 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2744 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2745 break;
2746
2747 case SHT_GNU_verneed:
252b5132
RH
2748 this_hdr->sh_entsize = 0;
2749 /* objcopy or strip will copy over sh_info, but may not set
2750 cverrefs. The linker will set cverrefs, but sh_info will be
2751 zero. */
2752 if (this_hdr->sh_info == 0)
2753 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2754 else
2755 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2756 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2757 break;
2758
2759 case SHT_GROUP:
dbb410c3 2760 this_hdr->sh_entsize = 4;
2f89ff8d 2761 break;
dbb410c3 2762 }
252b5132
RH
2763
2764 if ((asect->flags & SEC_ALLOC) != 0)
2765 this_hdr->sh_flags |= SHF_ALLOC;
2766 if ((asect->flags & SEC_READONLY) == 0)
2767 this_hdr->sh_flags |= SHF_WRITE;
2768 if ((asect->flags & SEC_CODE) != 0)
2769 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2770 if ((asect->flags & SEC_MERGE) != 0)
2771 {
2772 this_hdr->sh_flags |= SHF_MERGE;
2773 this_hdr->sh_entsize = asect->entsize;
2774 if ((asect->flags & SEC_STRINGS) != 0)
2775 this_hdr->sh_flags |= SHF_STRINGS;
2776 }
1126897b 2777 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2778 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2779 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2780 {
2781 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2782 if (asect->size == 0
2783 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2784 {
3a800eb9 2785 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2786
704afa60 2787 this_hdr->sh_size = 0;
3a800eb9
AM
2788 if (o != NULL)
2789 {
704afa60 2790 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2791 if (this_hdr->sh_size != 0)
2792 this_hdr->sh_type = SHT_NOBITS;
2793 }
704afa60
JJ
2794 }
2795 }
252b5132
RH
2796
2797 /* Check for processor-specific section types. */
e1fddb6b
AO
2798 if (bed->elf_backend_fake_sections
2799 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2800 *failedptr = TRUE;
252b5132
RH
2801
2802 /* If the section has relocs, set up a section header for the
23bc299b
MM
2803 SHT_REL[A] section. If two relocation sections are required for
2804 this section, it is up to the processor-specific back-end to
c044fabd 2805 create the other. */
23bc299b 2806 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2807 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2808 &elf_section_data (asect)->rel_hdr,
c044fabd 2809 asect,
68bfbfcc 2810 asect->use_rela_p))
b34976b6 2811 *failedptr = TRUE;
252b5132
RH
2812}
2813
dbb410c3
AM
2814/* Fill in the contents of a SHT_GROUP section. */
2815
1126897b 2816void
217aa764 2817bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2818{
217aa764 2819 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2820 unsigned long symindx;
9dce4196 2821 asection *elt, *first;
dbb410c3 2822 unsigned char *loc;
b34976b6 2823 bfd_boolean gas;
dbb410c3 2824
7e4111ad
L
2825 /* Ignore linker created group section. See elfNN_ia64_object_p in
2826 elfxx-ia64.c. */
2827 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2828 || *failedptr)
2829 return;
2830
1126897b
AM
2831 symindx = 0;
2832 if (elf_group_id (sec) != NULL)
2833 symindx = elf_group_id (sec)->udata.i;
2834
2835 if (symindx == 0)
2836 {
2837 /* If called from the assembler, swap_out_syms will have set up
2838 elf_section_syms; If called for "ld -r", use target_index. */
2839 if (elf_section_syms (abfd) != NULL)
2840 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2841 else
2842 symindx = sec->target_index;
2843 }
dbb410c3
AM
2844 elf_section_data (sec)->this_hdr.sh_info = symindx;
2845
1126897b 2846 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2847 gas = TRUE;
dbb410c3
AM
2848 if (sec->contents == NULL)
2849 {
b34976b6 2850 gas = FALSE;
eea6121a 2851 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2852
2853 /* Arrange for the section to be written out. */
2854 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2855 if (sec->contents == NULL)
2856 {
b34976b6 2857 *failedptr = TRUE;
dbb410c3
AM
2858 return;
2859 }
2860 }
2861
eea6121a 2862 loc = sec->contents + sec->size;
dbb410c3 2863
9dce4196
AM
2864 /* Get the pointer to the first section in the group that gas
2865 squirreled away here. objcopy arranges for this to be set to the
2866 start of the input section group. */
2867 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2868
2869 /* First element is a flag word. Rest of section is elf section
2870 indices for all the sections of the group. Write them backwards
2871 just to keep the group in the same order as given in .section
2872 directives, not that it matters. */
2873 while (elt != NULL)
2874 {
9dce4196
AM
2875 asection *s;
2876 unsigned int idx;
2877
dbb410c3 2878 loc -= 4;
9dce4196
AM
2879 s = elt;
2880 if (!gas)
2881 s = s->output_section;
2882 idx = 0;
2883 if (s != NULL)
2884 idx = elf_section_data (s)->this_idx;
2885 H_PUT_32 (abfd, idx, loc);
945906ff 2886 elt = elf_next_in_group (elt);
9dce4196
AM
2887 if (elt == first)
2888 break;
dbb410c3
AM
2889 }
2890
3d7f7666 2891 if ((loc -= 4) != sec->contents)
9dce4196 2892 abort ();
dbb410c3 2893
9dce4196 2894 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2895}
2896
252b5132
RH
2897/* Assign all ELF section numbers. The dummy first section is handled here
2898 too. The link/info pointers for the standard section types are filled
2899 in here too, while we're at it. */
2900
b34976b6 2901static bfd_boolean
da9f89d4 2902assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2903{
2904 struct elf_obj_tdata *t = elf_tdata (abfd);
2905 asection *sec;
2b0f7ef9 2906 unsigned int section_number, secn;
252b5132 2907 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2908 struct bfd_elf_section_data *d;
252b5132
RH
2909
2910 section_number = 1;
2911
2b0f7ef9
JJ
2912 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2913
da9f89d4
L
2914 /* SHT_GROUP sections are in relocatable files only. */
2915 if (link_info == NULL || link_info->relocatable)
252b5132 2916 {
da9f89d4 2917 /* Put SHT_GROUP sections first. */
04dd1667 2918 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2919 {
5daa8fe7 2920 d = elf_section_data (sec);
da9f89d4
L
2921
2922 if (d->this_hdr.sh_type == SHT_GROUP)
2923 {
5daa8fe7 2924 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2925 {
2926 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2927 bfd_section_list_remove (abfd, sec);
da9f89d4 2928 abfd->section_count--;
da9f89d4
L
2929 }
2930 else
2931 {
2932 if (section_number == SHN_LORESERVE)
2933 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2934 d->this_idx = section_number++;
2935 }
2936 }
47cc2cf5
PB
2937 }
2938 }
2939
2940 for (sec = abfd->sections; sec; sec = sec->next)
2941 {
2942 d = elf_section_data (sec);
2943
2944 if (d->this_hdr.sh_type != SHT_GROUP)
2945 {
2946 if (section_number == SHN_LORESERVE)
2947 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2948 d->this_idx = section_number++;
2949 }
2b0f7ef9 2950 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2951 if ((sec->flags & SEC_RELOC) == 0)
2952 d->rel_idx = 0;
2953 else
2b0f7ef9 2954 {
9ad5cbcf
AM
2955 if (section_number == SHN_LORESERVE)
2956 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2957 d->rel_idx = section_number++;
2958 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2959 }
23bc299b
MM
2960
2961 if (d->rel_hdr2)
2b0f7ef9 2962 {
9ad5cbcf
AM
2963 if (section_number == SHN_LORESERVE)
2964 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2965 d->rel_idx2 = section_number++;
2966 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2967 }
23bc299b
MM
2968 else
2969 d->rel_idx2 = 0;
252b5132
RH
2970 }
2971
9ad5cbcf
AM
2972 if (section_number == SHN_LORESERVE)
2973 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2974 t->shstrtab_section = section_number++;
2b0f7ef9 2975 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2976 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2977
2978 if (bfd_get_symcount (abfd) > 0)
2979 {
9ad5cbcf
AM
2980 if (section_number == SHN_LORESERVE)
2981 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2982 t->symtab_section = section_number++;
2b0f7ef9 2983 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2984 if (section_number > SHN_LORESERVE - 2)
2985 {
2986 if (section_number == SHN_LORESERVE)
2987 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2988 t->symtab_shndx_section = section_number++;
2989 t->symtab_shndx_hdr.sh_name
2990 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2991 ".symtab_shndx", FALSE);
9ad5cbcf 2992 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2993 return FALSE;
9ad5cbcf
AM
2994 }
2995 if (section_number == SHN_LORESERVE)
2996 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2997 t->strtab_section = section_number++;
2b0f7ef9 2998 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2999 }
3000
2b0f7ef9
JJ
3001 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3002 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3003
3004 elf_numsections (abfd) = section_number;
252b5132 3005 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
3006 if (section_number > SHN_LORESERVE)
3007 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
3008
3009 /* Set up the list of section header pointers, in agreement with the
3010 indices. */
d0fb9a8d 3011 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 3012 if (i_shdrp == NULL)
b34976b6 3013 return FALSE;
252b5132 3014
d0fb9a8d 3015 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
3016 if (i_shdrp[0] == NULL)
3017 {
3018 bfd_release (abfd, i_shdrp);
b34976b6 3019 return FALSE;
252b5132 3020 }
252b5132
RH
3021
3022 elf_elfsections (abfd) = i_shdrp;
3023
3024 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3025 if (bfd_get_symcount (abfd) > 0)
3026 {
3027 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3028 if (elf_numsections (abfd) > SHN_LORESERVE)
3029 {
3030 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3031 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3032 }
252b5132
RH
3033 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3034 t->symtab_hdr.sh_link = t->strtab_section;
3035 }
38ce5b11 3036
252b5132
RH
3037 for (sec = abfd->sections; sec; sec = sec->next)
3038 {
3039 struct bfd_elf_section_data *d = elf_section_data (sec);
3040 asection *s;
3041 const char *name;
3042
3043 i_shdrp[d->this_idx] = &d->this_hdr;
3044 if (d->rel_idx != 0)
3045 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3046 if (d->rel_idx2 != 0)
3047 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3048
3049 /* Fill in the sh_link and sh_info fields while we're at it. */
3050
3051 /* sh_link of a reloc section is the section index of the symbol
3052 table. sh_info is the section index of the section to which
3053 the relocation entries apply. */
3054 if (d->rel_idx != 0)
3055 {
3056 d->rel_hdr.sh_link = t->symtab_section;
3057 d->rel_hdr.sh_info = d->this_idx;
3058 }
23bc299b
MM
3059 if (d->rel_idx2 != 0)
3060 {
3061 d->rel_hdr2->sh_link = t->symtab_section;
3062 d->rel_hdr2->sh_info = d->this_idx;
3063 }
252b5132 3064
38ce5b11
L
3065 /* We need to set up sh_link for SHF_LINK_ORDER. */
3066 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3067 {
3068 s = elf_linked_to_section (sec);
3069 if (s)
38ce5b11 3070 {
f2876037 3071 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3072 if (link_info != NULL)
38ce5b11 3073 {
f2876037 3074 /* Check discarded linkonce section. */
ccd2ec6a 3075 if (elf_discarded_section (s))
38ce5b11 3076 {
ccd2ec6a
L
3077 asection *kept;
3078 (*_bfd_error_handler)
3079 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3080 abfd, d->this_hdr.bfd_section,
3081 s, s->owner);
3082 /* Point to the kept section if it has the same
3083 size as the discarded one. */
3084 kept = _bfd_elf_check_kept_section (s);
3085 if (kept == NULL)
185d09ad 3086 {
ccd2ec6a
L
3087 bfd_set_error (bfd_error_bad_value);
3088 return FALSE;
185d09ad 3089 }
ccd2ec6a 3090 s = kept;
38ce5b11 3091 }
e424ecc8 3092
ccd2ec6a
L
3093 s = s->output_section;
3094 BFD_ASSERT (s != NULL);
38ce5b11 3095 }
f2876037
L
3096 else
3097 {
3098 /* Handle objcopy. */
3099 if (s->output_section == NULL)
3100 {
3101 (*_bfd_error_handler)
3102 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3103 abfd, d->this_hdr.bfd_section, s, s->owner);
3104 bfd_set_error (bfd_error_bad_value);
3105 return FALSE;
3106 }
3107 s = s->output_section;
3108 }
ccd2ec6a
L
3109 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3110 }
3111 else
3112 {
3113 /* PR 290:
3114 The Intel C compiler generates SHT_IA_64_UNWIND with
3115 SHF_LINK_ORDER. But it doesn't set the sh_link or
3116 sh_info fields. Hence we could get the situation
3117 where s is NULL. */
3118 const struct elf_backend_data *bed
3119 = get_elf_backend_data (abfd);
3120 if (bed->link_order_error_handler)
3121 bed->link_order_error_handler
3122 (_("%B: warning: sh_link not set for section `%A'"),
3123 abfd, sec);
38ce5b11
L
3124 }
3125 }
3126
252b5132
RH
3127 switch (d->this_hdr.sh_type)
3128 {
3129 case SHT_REL:
3130 case SHT_RELA:
3131 /* A reloc section which we are treating as a normal BFD
3132 section. sh_link is the section index of the symbol
3133 table. sh_info is the section index of the section to
3134 which the relocation entries apply. We assume that an
3135 allocated reloc section uses the dynamic symbol table.
3136 FIXME: How can we be sure? */
3137 s = bfd_get_section_by_name (abfd, ".dynsym");
3138 if (s != NULL)
3139 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3140
3141 /* We look up the section the relocs apply to by name. */
3142 name = sec->name;
3143 if (d->this_hdr.sh_type == SHT_REL)
3144 name += 4;
3145 else
3146 name += 5;
3147 s = bfd_get_section_by_name (abfd, name);
3148 if (s != NULL)
3149 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3150 break;
3151
3152 case SHT_STRTAB:
3153 /* We assume that a section named .stab*str is a stabs
3154 string section. We look for a section with the same name
3155 but without the trailing ``str'', and set its sh_link
3156 field to point to this section. */
3157 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
3158 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3159 {
3160 size_t len;
3161 char *alc;
3162
3163 len = strlen (sec->name);
217aa764 3164 alc = bfd_malloc (len - 2);
252b5132 3165 if (alc == NULL)
b34976b6 3166 return FALSE;
d4c88bbb 3167 memcpy (alc, sec->name, len - 3);
252b5132
RH
3168 alc[len - 3] = '\0';
3169 s = bfd_get_section_by_name (abfd, alc);
3170 free (alc);
3171 if (s != NULL)
3172 {
3173 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3174
3175 /* This is a .stab section. */
0594c12d
AM
3176 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3177 elf_section_data (s)->this_hdr.sh_entsize
3178 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3179 }
3180 }
3181 break;
3182
3183 case SHT_DYNAMIC:
3184 case SHT_DYNSYM:
3185 case SHT_GNU_verneed:
3186 case SHT_GNU_verdef:
3187 /* sh_link is the section header index of the string table
3188 used for the dynamic entries, or the symbol table, or the
3189 version strings. */
3190 s = bfd_get_section_by_name (abfd, ".dynstr");
3191 if (s != NULL)
3192 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3193 break;
3194
7f1204bb
JJ
3195 case SHT_GNU_LIBLIST:
3196 /* sh_link is the section header index of the prelink library
3197 list
3198 used for the dynamic entries, or the symbol table, or the
3199 version strings. */
3200 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3201 ? ".dynstr" : ".gnu.libstr");
3202 if (s != NULL)
3203 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3204 break;
3205
252b5132
RH
3206 case SHT_HASH:
3207 case SHT_GNU_versym:
3208 /* sh_link is the section header index of the symbol table
3209 this hash table or version table is for. */
3210 s = bfd_get_section_by_name (abfd, ".dynsym");
3211 if (s != NULL)
3212 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3213 break;
dbb410c3
AM
3214
3215 case SHT_GROUP:
3216 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3217 }
3218 }
3219
2b0f7ef9 3220 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3221 if (i_shdrp[secn] == NULL)
3222 i_shdrp[secn] = i_shdrp[0];
3223 else
3224 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3225 i_shdrp[secn]->sh_name);
b34976b6 3226 return TRUE;
252b5132
RH
3227}
3228
3229/* Map symbol from it's internal number to the external number, moving
3230 all local symbols to be at the head of the list. */
3231
268b6b39 3232static int
217aa764 3233sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3234{
3235 /* If the backend has a special mapping, use it. */
9c5bfbb7 3236 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3237 if (bed->elf_backend_sym_is_global)
3238 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3239
3240 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3241 || bfd_is_und_section (bfd_get_section (sym))
3242 || bfd_is_com_section (bfd_get_section (sym)));
3243}
3244
b34976b6 3245static bfd_boolean
217aa764 3246elf_map_symbols (bfd *abfd)
252b5132 3247{
dc810e39 3248 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3249 asymbol **syms = bfd_get_outsymbols (abfd);
3250 asymbol **sect_syms;
dc810e39
AM
3251 unsigned int num_locals = 0;
3252 unsigned int num_globals = 0;
3253 unsigned int num_locals2 = 0;
3254 unsigned int num_globals2 = 0;
252b5132 3255 int max_index = 0;
dc810e39 3256 unsigned int idx;
252b5132
RH
3257 asection *asect;
3258 asymbol **new_syms;
252b5132
RH
3259
3260#ifdef DEBUG
3261 fprintf (stderr, "elf_map_symbols\n");
3262 fflush (stderr);
3263#endif
3264
252b5132
RH
3265 for (asect = abfd->sections; asect; asect = asect->next)
3266 {
3267 if (max_index < asect->index)
3268 max_index = asect->index;
3269 }
3270
3271 max_index++;
d0fb9a8d 3272 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3273 if (sect_syms == NULL)
b34976b6 3274 return FALSE;
252b5132 3275 elf_section_syms (abfd) = sect_syms;
4e89ac30 3276 elf_num_section_syms (abfd) = max_index;
252b5132 3277
079e9a2f
AM
3278 /* Init sect_syms entries for any section symbols we have already
3279 decided to output. */
252b5132
RH
3280 for (idx = 0; idx < symcount; idx++)
3281 {
dc810e39 3282 asymbol *sym = syms[idx];
c044fabd 3283
252b5132
RH
3284 if ((sym->flags & BSF_SECTION_SYM) != 0
3285 && sym->value == 0)
3286 {
3287 asection *sec;
3288
3289 sec = sym->section;
3290
3291 if (sec->owner != NULL)
3292 {
3293 if (sec->owner != abfd)
3294 {
3295 if (sec->output_offset != 0)
3296 continue;
c044fabd 3297
252b5132
RH
3298 sec = sec->output_section;
3299
079e9a2f
AM
3300 /* Empty sections in the input files may have had a
3301 section symbol created for them. (See the comment
3302 near the end of _bfd_generic_link_output_symbols in
3303 linker.c). If the linker script discards such
3304 sections then we will reach this point. Since we know
3305 that we cannot avoid this case, we detect it and skip
3306 the abort and the assignment to the sect_syms array.
3307 To reproduce this particular case try running the
3308 linker testsuite test ld-scripts/weak.exp for an ELF
3309 port that uses the generic linker. */
252b5132
RH
3310 if (sec->owner == NULL)
3311 continue;
3312
3313 BFD_ASSERT (sec->owner == abfd);
3314 }
3315 sect_syms[sec->index] = syms[idx];
3316 }
3317 }
3318 }
3319
252b5132
RH
3320 /* Classify all of the symbols. */
3321 for (idx = 0; idx < symcount; idx++)
3322 {
3323 if (!sym_is_global (abfd, syms[idx]))
3324 num_locals++;
3325 else
3326 num_globals++;
3327 }
079e9a2f
AM
3328
3329 /* We will be adding a section symbol for each BFD section. Most normal
3330 sections will already have a section symbol in outsymbols, but
3331 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3332 at least in that case. */
252b5132
RH
3333 for (asect = abfd->sections; asect; asect = asect->next)
3334 {
079e9a2f 3335 if (sect_syms[asect->index] == NULL)
252b5132 3336 {
079e9a2f 3337 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3338 num_locals++;
3339 else
3340 num_globals++;
252b5132
RH
3341 }
3342 }
3343
3344 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3345 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3346
252b5132 3347 if (new_syms == NULL)
b34976b6 3348 return FALSE;
252b5132
RH
3349
3350 for (idx = 0; idx < symcount; idx++)
3351 {
3352 asymbol *sym = syms[idx];
dc810e39 3353 unsigned int i;
252b5132
RH
3354
3355 if (!sym_is_global (abfd, sym))
3356 i = num_locals2++;
3357 else
3358 i = num_locals + num_globals2++;
3359 new_syms[i] = sym;
3360 sym->udata.i = i + 1;
3361 }
3362 for (asect = abfd->sections; asect; asect = asect->next)
3363 {
079e9a2f 3364 if (sect_syms[asect->index] == NULL)
252b5132 3365 {
079e9a2f 3366 asymbol *sym = asect->symbol;
dc810e39 3367 unsigned int i;
252b5132 3368
079e9a2f 3369 sect_syms[asect->index] = sym;
252b5132
RH
3370 if (!sym_is_global (abfd, sym))
3371 i = num_locals2++;
3372 else
3373 i = num_locals + num_globals2++;
3374 new_syms[i] = sym;
3375 sym->udata.i = i + 1;
3376 }
3377 }
3378
3379 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3380
3381 elf_num_locals (abfd) = num_locals;
3382 elf_num_globals (abfd) = num_globals;
b34976b6 3383 return TRUE;
252b5132
RH
3384}
3385
3386/* Align to the maximum file alignment that could be required for any
3387 ELF data structure. */
3388
268b6b39 3389static inline file_ptr
217aa764 3390align_file_position (file_ptr off, int align)
252b5132
RH
3391{
3392 return (off + align - 1) & ~(align - 1);
3393}
3394
3395/* Assign a file position to a section, optionally aligning to the
3396 required section alignment. */
3397
217aa764
AM
3398file_ptr
3399_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3400 file_ptr offset,
3401 bfd_boolean align)
252b5132
RH
3402{
3403 if (align)
3404 {
3405 unsigned int al;
3406
3407 al = i_shdrp->sh_addralign;
3408 if (al > 1)
3409 offset = BFD_ALIGN (offset, al);
3410 }
3411 i_shdrp->sh_offset = offset;
3412 if (i_shdrp->bfd_section != NULL)
3413 i_shdrp->bfd_section->filepos = offset;
3414 if (i_shdrp->sh_type != SHT_NOBITS)
3415 offset += i_shdrp->sh_size;
3416 return offset;
3417}
3418
3419/* Compute the file positions we are going to put the sections at, and
3420 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3421 is not NULL, this is being called by the ELF backend linker. */
3422
b34976b6 3423bfd_boolean
217aa764
AM
3424_bfd_elf_compute_section_file_positions (bfd *abfd,
3425 struct bfd_link_info *link_info)
252b5132 3426{
9c5bfbb7 3427 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3428 bfd_boolean failed;
4b6c0f2f 3429 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3430 Elf_Internal_Shdr *shstrtab_hdr;
3431
3432 if (abfd->output_has_begun)
b34976b6 3433 return TRUE;
252b5132
RH
3434
3435 /* Do any elf backend specific processing first. */
3436 if (bed->elf_backend_begin_write_processing)
3437 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3438
3439 if (! prep_headers (abfd))
b34976b6 3440 return FALSE;
252b5132 3441
e6c51ed4
NC
3442 /* Post process the headers if necessary. */
3443 if (bed->elf_backend_post_process_headers)
3444 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3445
b34976b6 3446 failed = FALSE;
252b5132
RH
3447 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3448 if (failed)
b34976b6 3449 return FALSE;
252b5132 3450
da9f89d4 3451 if (!assign_section_numbers (abfd, link_info))
b34976b6 3452 return FALSE;
252b5132
RH
3453
3454 /* The backend linker builds symbol table information itself. */
3455 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3456 {
3457 /* Non-zero if doing a relocatable link. */
3458 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3459
3460 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3461 return FALSE;
252b5132
RH
3462 }
3463
1126897b 3464 if (link_info == NULL)
dbb410c3 3465 {
1126897b 3466 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3467 if (failed)
b34976b6 3468 return FALSE;
dbb410c3
AM
3469 }
3470
252b5132
RH
3471 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3472 /* sh_name was set in prep_headers. */
3473 shstrtab_hdr->sh_type = SHT_STRTAB;
3474 shstrtab_hdr->sh_flags = 0;
3475 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3476 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3477 shstrtab_hdr->sh_entsize = 0;
3478 shstrtab_hdr->sh_link = 0;
3479 shstrtab_hdr->sh_info = 0;
3480 /* sh_offset is set in assign_file_positions_except_relocs. */
3481 shstrtab_hdr->sh_addralign = 1;
3482
c84fca4d 3483 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3484 return FALSE;
252b5132
RH
3485
3486 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3487 {
3488 file_ptr off;
3489 Elf_Internal_Shdr *hdr;
3490
3491 off = elf_tdata (abfd)->next_file_pos;
3492
3493 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3494 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3495
9ad5cbcf
AM
3496 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3497 if (hdr->sh_size != 0)
b34976b6 3498 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3499
252b5132 3500 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3501 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3502
3503 elf_tdata (abfd)->next_file_pos = off;
3504
3505 /* Now that we know where the .strtab section goes, write it
3506 out. */
3507 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3508 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3509 return FALSE;
252b5132
RH
3510 _bfd_stringtab_free (strtab);
3511 }
3512
b34976b6 3513 abfd->output_has_begun = TRUE;
252b5132 3514
b34976b6 3515 return TRUE;
252b5132
RH
3516}
3517
3518/* Create a mapping from a set of sections to a program segment. */
3519
217aa764
AM
3520static struct elf_segment_map *
3521make_mapping (bfd *abfd,
3522 asection **sections,
3523 unsigned int from,
3524 unsigned int to,
3525 bfd_boolean phdr)
252b5132
RH
3526{
3527 struct elf_segment_map *m;
3528 unsigned int i;
3529 asection **hdrpp;
dc810e39 3530 bfd_size_type amt;
252b5132 3531
dc810e39
AM
3532 amt = sizeof (struct elf_segment_map);
3533 amt += (to - from - 1) * sizeof (asection *);
217aa764 3534 m = bfd_zalloc (abfd, amt);
252b5132
RH
3535 if (m == NULL)
3536 return NULL;
3537 m->next = NULL;
3538 m->p_type = PT_LOAD;
3539 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3540 m->sections[i - from] = *hdrpp;
3541 m->count = to - from;
3542
3543 if (from == 0 && phdr)
3544 {
3545 /* Include the headers in the first PT_LOAD segment. */
3546 m->includes_filehdr = 1;
3547 m->includes_phdrs = 1;
3548 }
3549
3550 return m;
3551}
3552
229fcec5
MM
3553/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3554 on failure. */
3555
3556struct elf_segment_map *
3557_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3558{
3559 struct elf_segment_map *m;
3560
3561 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3562 if (m == NULL)
3563 return NULL;
3564 m->next = NULL;
3565 m->p_type = PT_DYNAMIC;
3566 m->count = 1;
3567 m->sections[0] = dynsec;
3568
3569 return m;
3570}
3571
252b5132
RH
3572/* Set up a mapping from BFD sections to program segments. */
3573
b34976b6 3574static bfd_boolean
217aa764 3575map_sections_to_segments (bfd *abfd)
252b5132
RH
3576{
3577 asection **sections = NULL;
3578 asection *s;
3579 unsigned int i;
3580 unsigned int count;
3581 struct elf_segment_map *mfirst;
3582 struct elf_segment_map **pm;
3583 struct elf_segment_map *m;
3584 asection *last_hdr;
baaff79e 3585 bfd_vma last_size;
252b5132
RH
3586 unsigned int phdr_index;
3587 bfd_vma maxpagesize;
3588 asection **hdrpp;
b34976b6
AM
3589 bfd_boolean phdr_in_segment = TRUE;
3590 bfd_boolean writable;
13ae64f3
JJ
3591 int tls_count = 0;
3592 asection *first_tls = NULL;
65765700 3593 asection *dynsec, *eh_frame_hdr;
dc810e39 3594 bfd_size_type amt;
252b5132
RH
3595
3596 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3597 return TRUE;
252b5132
RH
3598
3599 if (bfd_count_sections (abfd) == 0)
b34976b6 3600 return TRUE;
252b5132
RH
3601
3602 /* Select the allocated sections, and sort them. */
3603
d0fb9a8d 3604 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
252b5132
RH
3605 if (sections == NULL)
3606 goto error_return;
3607
3608 i = 0;
3609 for (s = abfd->sections; s != NULL; s = s->next)
3610 {
3611 if ((s->flags & SEC_ALLOC) != 0)
3612 {
3613 sections[i] = s;
3614 ++i;
3615 }
3616 }
3617 BFD_ASSERT (i <= bfd_count_sections (abfd));
3618 count = i;
3619
3620 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3621
3622 /* Build the mapping. */
3623
3624 mfirst = NULL;
3625 pm = &mfirst;
3626
3627 /* If we have a .interp section, then create a PT_PHDR segment for
3628 the program headers and a PT_INTERP segment for the .interp
3629 section. */
3630 s = bfd_get_section_by_name (abfd, ".interp");
3631 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3632 {
dc810e39 3633 amt = sizeof (struct elf_segment_map);
217aa764 3634 m = bfd_zalloc (abfd, amt);
252b5132
RH
3635 if (m == NULL)
3636 goto error_return;
3637 m->next = NULL;
3638 m->p_type = PT_PHDR;
3639 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3640 m->p_flags = PF_R | PF_X;
3641 m->p_flags_valid = 1;
3642 m->includes_phdrs = 1;
3643
3644 *pm = m;
3645 pm = &m->next;
3646
dc810e39 3647 amt = sizeof (struct elf_segment_map);
217aa764 3648 m = bfd_zalloc (abfd, amt);
252b5132
RH
3649 if (m == NULL)
3650 goto error_return;
3651 m->next = NULL;
3652 m->p_type = PT_INTERP;
3653 m->count = 1;
3654 m->sections[0] = s;
3655
3656 *pm = m;
3657 pm = &m->next;
3658 }
3659
3660 /* Look through the sections. We put sections in the same program
3661 segment when the start of the second section can be placed within
3662 a few bytes of the end of the first section. */
3663 last_hdr = NULL;
baaff79e 3664 last_size = 0;
252b5132
RH
3665 phdr_index = 0;
3666 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3667 writable = FALSE;
252b5132
RH
3668 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3669 if (dynsec != NULL
3670 && (dynsec->flags & SEC_LOAD) == 0)
3671 dynsec = NULL;
3672
3673 /* Deal with -Ttext or something similar such that the first section
3674 is not adjacent to the program headers. This is an
3675 approximation, since at this point we don't know exactly how many
3676 program headers we will need. */
3677 if (count > 0)
3678 {
3679 bfd_size_type phdr_size;
3680
3681 phdr_size = elf_tdata (abfd)->program_header_size;
3682 if (phdr_size == 0)
3683 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3684 if ((abfd->flags & D_PAGED) == 0
3685 || sections[0]->lma < phdr_size
3686 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3687 phdr_in_segment = FALSE;
252b5132
RH
3688 }
3689
3690 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3691 {
3692 asection *hdr;
b34976b6 3693 bfd_boolean new_segment;
252b5132
RH
3694
3695 hdr = *hdrpp;
3696
3697 /* See if this section and the last one will fit in the same
3698 segment. */
3699
3700 if (last_hdr == NULL)
3701 {
3702 /* If we don't have a segment yet, then we don't need a new
3703 one (we build the last one after this loop). */
b34976b6 3704 new_segment = FALSE;
252b5132
RH
3705 }
3706 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3707 {
3708 /* If this section has a different relation between the
3709 virtual address and the load address, then we need a new
3710 segment. */
b34976b6 3711 new_segment = TRUE;
252b5132 3712 }
baaff79e 3713 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3714 < BFD_ALIGN (hdr->lma, maxpagesize))
3715 {
3716 /* If putting this section in this segment would force us to
3717 skip a page in the segment, then we need a new segment. */
b34976b6 3718 new_segment = TRUE;
252b5132 3719 }
baaff79e
JJ
3720 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3721 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3722 {
3723 /* We don't want to put a loadable section after a
baaff79e
JJ
3724 nonloadable section in the same segment.
3725 Consider .tbss sections as loadable for this purpose. */
b34976b6 3726 new_segment = TRUE;
252b5132
RH
3727 }
3728 else if ((abfd->flags & D_PAGED) == 0)
3729 {
3730 /* If the file is not demand paged, which means that we
3731 don't require the sections to be correctly aligned in the
3732 file, then there is no other reason for a new segment. */
b34976b6 3733 new_segment = FALSE;
252b5132
RH
3734 }
3735 else if (! writable
3736 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3737 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3738 & ~(maxpagesize - 1))
3739 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3740 {
3741 /* We don't want to put a writable section in a read only
3742 segment, unless they are on the same page in memory
3743 anyhow. We already know that the last section does not
3744 bring us past the current section on the page, so the
3745 only case in which the new section is not on the same
3746 page as the previous section is when the previous section
3747 ends precisely on a page boundary. */
b34976b6 3748 new_segment = TRUE;
252b5132
RH
3749 }
3750 else
3751 {
3752 /* Otherwise, we can use the same segment. */
b34976b6 3753 new_segment = FALSE;
252b5132
RH
3754 }
3755
3756 if (! new_segment)
3757 {
3758 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3759 writable = TRUE;
baaff79e
JJ
3760 last_hdr = hdr;
3761 /* .tbss sections effectively have zero size. */
e5caec89 3762 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3763 last_size = hdr->size;
baaff79e
JJ
3764 else
3765 last_size = 0;
252b5132
RH
3766 continue;
3767 }
3768
3769 /* We need a new program segment. We must create a new program
3770 header holding all the sections from phdr_index until hdr. */
3771
3772 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3773 if (m == NULL)
3774 goto error_return;
3775
3776 *pm = m;
3777 pm = &m->next;
3778
3779 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3780 writable = TRUE;
252b5132 3781 else
b34976b6 3782 writable = FALSE;
252b5132
RH
3783
3784 last_hdr = hdr;
baaff79e
JJ
3785 /* .tbss sections effectively have zero size. */
3786 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3787 last_size = hdr->size;
baaff79e
JJ
3788 else
3789 last_size = 0;
252b5132 3790 phdr_index = i;
b34976b6 3791 phdr_in_segment = FALSE;
252b5132
RH
3792 }
3793
3794 /* Create a final PT_LOAD program segment. */
3795 if (last_hdr != NULL)
3796 {
3797 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3798 if (m == NULL)
3799 goto error_return;
3800
3801 *pm = m;
3802 pm = &m->next;
3803 }
3804
3805 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3806 if (dynsec != NULL)
3807 {
229fcec5 3808 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3809 if (m == NULL)
3810 goto error_return;
252b5132
RH
3811 *pm = m;
3812 pm = &m->next;
3813 }
3814
3815 /* For each loadable .note section, add a PT_NOTE segment. We don't
3816 use bfd_get_section_by_name, because if we link together
3817 nonloadable .note sections and loadable .note sections, we will
3818 generate two .note sections in the output file. FIXME: Using
3819 names for section types is bogus anyhow. */
3820 for (s = abfd->sections; s != NULL; s = s->next)
3821 {
3822 if ((s->flags & SEC_LOAD) != 0
3823 && strncmp (s->name, ".note", 5) == 0)
3824 {
dc810e39 3825 amt = sizeof (struct elf_segment_map);
217aa764 3826 m = bfd_zalloc (abfd, amt);
252b5132
RH
3827 if (m == NULL)
3828 goto error_return;
3829 m->next = NULL;
3830 m->p_type = PT_NOTE;
3831 m->count = 1;
3832 m->sections[0] = s;
3833
3834 *pm = m;
3835 pm = &m->next;
3836 }
13ae64f3
JJ
3837 if (s->flags & SEC_THREAD_LOCAL)
3838 {
3839 if (! tls_count)
3840 first_tls = s;
3841 tls_count++;
3842 }
3843 }
3844
3845 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3846 if (tls_count > 0)
3847 {
3848 int i;
3849
3850 amt = sizeof (struct elf_segment_map);
3851 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3852 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3853 if (m == NULL)
3854 goto error_return;
3855 m->next = NULL;
3856 m->p_type = PT_TLS;
3857 m->count = tls_count;
3858 /* Mandated PF_R. */
3859 m->p_flags = PF_R;
3860 m->p_flags_valid = 1;
3861 for (i = 0; i < tls_count; ++i)
3862 {
3863 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3864 m->sections[i] = first_tls;
3865 first_tls = first_tls->next;
3866 }
3867
3868 *pm = m;
3869 pm = &m->next;
252b5132
RH
3870 }
3871
65765700
JJ
3872 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3873 segment. */
126495ed
AM
3874 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3875 if (eh_frame_hdr != NULL
3876 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3877 {
3878 amt = sizeof (struct elf_segment_map);
217aa764 3879 m = bfd_zalloc (abfd, amt);
65765700
JJ
3880 if (m == NULL)
3881 goto error_return;
3882 m->next = NULL;
3883 m->p_type = PT_GNU_EH_FRAME;
3884 m->count = 1;
126495ed 3885 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3886
3887 *pm = m;
3888 pm = &m->next;
3889 }
3890
9ee5e499
JJ
3891 if (elf_tdata (abfd)->stack_flags)
3892 {
3893 amt = sizeof (struct elf_segment_map);
217aa764 3894 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3895 if (m == NULL)
3896 goto error_return;
3897 m->next = NULL;
3898 m->p_type = PT_GNU_STACK;
3899 m->p_flags = elf_tdata (abfd)->stack_flags;
3900 m->p_flags_valid = 1;
3901
3902 *pm = m;
3903 pm = &m->next;
3904 }
3905
8c37241b
JJ
3906 if (elf_tdata (abfd)->relro)
3907 {
3908 amt = sizeof (struct elf_segment_map);
3909 m = bfd_zalloc (abfd, amt);
3910 if (m == NULL)
3911 goto error_return;
3912 m->next = NULL;
3913 m->p_type = PT_GNU_RELRO;
3914 m->p_flags = PF_R;
3915 m->p_flags_valid = 1;
3916
3917 *pm = m;
3918 pm = &m->next;
3919 }
3920
252b5132
RH
3921 free (sections);
3922 sections = NULL;
3923
3924 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3925 return TRUE;
252b5132
RH
3926
3927 error_return:
3928 if (sections != NULL)
3929 free (sections);
b34976b6 3930 return FALSE;
252b5132
RH
3931}
3932
3933/* Sort sections by address. */
3934
3935static int
217aa764 3936elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3937{
3938 const asection *sec1 = *(const asection **) arg1;
3939 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3940 bfd_size_type size1, size2;
252b5132
RH
3941
3942 /* Sort by LMA first, since this is the address used to
3943 place the section into a segment. */
3944 if (sec1->lma < sec2->lma)
3945 return -1;
3946 else if (sec1->lma > sec2->lma)
3947 return 1;
3948
3949 /* Then sort by VMA. Normally the LMA and the VMA will be
3950 the same, and this will do nothing. */
3951 if (sec1->vma < sec2->vma)
3952 return -1;
3953 else if (sec1->vma > sec2->vma)
3954 return 1;
3955
3956 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3957
07c6e936 3958#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3959
3960 if (TOEND (sec1))
3961 {
3962 if (TOEND (sec2))
00a7cdc5
NC
3963 {
3964 /* If the indicies are the same, do not return 0
3965 here, but continue to try the next comparison. */
3966 if (sec1->target_index - sec2->target_index != 0)
3967 return sec1->target_index - sec2->target_index;
3968 }
252b5132
RH
3969 else
3970 return 1;
3971 }
00a7cdc5 3972 else if (TOEND (sec2))
252b5132
RH
3973 return -1;
3974
3975#undef TOEND
3976
00a7cdc5
NC
3977 /* Sort by size, to put zero sized sections
3978 before others at the same address. */
252b5132 3979
eea6121a
AM
3980 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
3981 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
3982
3983 if (size1 < size2)
252b5132 3984 return -1;
eecdbe52 3985 if (size1 > size2)
252b5132
RH
3986 return 1;
3987
3988 return sec1->target_index - sec2->target_index;
3989}
3990
340b6d91
AC
3991/* Ian Lance Taylor writes:
3992
3993 We shouldn't be using % with a negative signed number. That's just
3994 not good. We have to make sure either that the number is not
3995 negative, or that the number has an unsigned type. When the types
3996 are all the same size they wind up as unsigned. When file_ptr is a
3997 larger signed type, the arithmetic winds up as signed long long,
3998 which is wrong.
3999
4000 What we're trying to say here is something like ``increase OFF by
4001 the least amount that will cause it to be equal to the VMA modulo
4002 the page size.'' */
4003/* In other words, something like:
4004
4005 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4006 off_offset = off % bed->maxpagesize;
4007 if (vma_offset < off_offset)
4008 adjustment = vma_offset + bed->maxpagesize - off_offset;
4009 else
4010 adjustment = vma_offset - off_offset;
4011
4012 which can can be collapsed into the expression below. */
4013
4014static file_ptr
4015vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4016{
4017 return ((vma - off) % maxpagesize);
4018}
4019
252b5132
RH
4020/* Assign file positions to the sections based on the mapping from
4021 sections to segments. This function also sets up some fields in
4022 the file header, and writes out the program headers. */
4023
b34976b6 4024static bfd_boolean
c84fca4d 4025assign_file_positions_for_segments (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
4026{
4027 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4028 unsigned int count;
4029 struct elf_segment_map *m;
4030 unsigned int alloc;
4031 Elf_Internal_Phdr *phdrs;
4032 file_ptr off, voff;
4033 bfd_vma filehdr_vaddr, filehdr_paddr;
4034 bfd_vma phdrs_vaddr, phdrs_paddr;
4035 Elf_Internal_Phdr *p;
4036
4037 if (elf_tdata (abfd)->segment_map == NULL)
4038 {
4039 if (! map_sections_to_segments (abfd))
b34976b6 4040 return FALSE;
252b5132 4041 }
1ed89aa9
NC
4042 else
4043 {
4044 /* The placement algorithm assumes that non allocated sections are
4045 not in PT_LOAD segments. We ensure this here by removing such
540b09cb
AM
4046 sections from the segment map. We also remove excluded
4047 sections. */
1ed89aa9
NC
4048 for (m = elf_tdata (abfd)->segment_map;
4049 m != NULL;
4050 m = m->next)
4051 {
4052 unsigned int new_count;
4053 unsigned int i;
4054
1ed89aa9
NC
4055 new_count = 0;
4056 for (i = 0; i < m->count; i ++)
4057 {
540b09cb
AM
4058 if ((m->sections[i]->flags & SEC_EXCLUDE) == 0
4059 && ((m->sections[i]->flags & SEC_ALLOC) != 0
4060 || m->p_type != PT_LOAD))
1ed89aa9 4061 {
47d9a591 4062 if (i != new_count)
1ed89aa9
NC
4063 m->sections[new_count] = m->sections[i];
4064
4065 new_count ++;
4066 }
4067 }
4068
4069 if (new_count != m->count)
4070 m->count = new_count;
4071 }
4072 }
252b5132
RH
4073
4074 if (bed->elf_backend_modify_segment_map)
4075 {
c84fca4d 4076 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 4077 return FALSE;
252b5132
RH
4078 }
4079
4080 count = 0;
4081 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4082 ++count;
4083
4084 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4085 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4086 elf_elfheader (abfd)->e_phnum = count;
4087
4088 if (count == 0)
0ebdbb83
BW
4089 {
4090 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4091 return TRUE;
4092 }
252b5132
RH
4093
4094 /* If we already counted the number of program segments, make sure
4095 that we allocated enough space. This happens when SIZEOF_HEADERS
4096 is used in a linker script. */
4097 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
4098 if (alloc != 0 && count > alloc)
4099 {
4100 ((*_bfd_error_handler)
b301b248
AM
4101 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
4102 abfd, alloc, count));
252b5132 4103 bfd_set_error (bfd_error_bad_value);
b34976b6 4104 return FALSE;
252b5132
RH
4105 }
4106
4107 if (alloc == 0)
4108 alloc = count;
4109
d0fb9a8d 4110 phdrs = bfd_alloc2 (abfd, alloc, sizeof (Elf_Internal_Phdr));
252b5132 4111 if (phdrs == NULL)
b34976b6 4112 return FALSE;
252b5132
RH
4113
4114 off = bed->s->sizeof_ehdr;
4115 off += alloc * bed->s->sizeof_phdr;
4116
4117 filehdr_vaddr = 0;
4118 filehdr_paddr = 0;
4119 phdrs_vaddr = 0;
4120 phdrs_paddr = 0;
4121
4122 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4123 m != NULL;
4124 m = m->next, p++)
4125 {
4126 unsigned int i;
4127 asection **secpp;
4128
4129 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4130 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4131 not be done to the PT_NOTE section of a corefile, which may
4132 contain several pseudo-sections artificially created by bfd.
4133 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4134 if (m->count > 1
4135 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4136 && m->p_type == PT_NOTE))
252b5132
RH
4137 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4138 elf_sort_sections);
4139
b301b248
AM
4140 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4141 number of sections with contents contributing to both p_filesz
4142 and p_memsz, followed by a number of sections with no contents
4143 that just contribute to p_memsz. In this loop, OFF tracks next
4144 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4145 an adjustment we use for segments that have no file contents
4146 but need zero filled memory allocation. */
4147 voff = 0;
252b5132 4148 p->p_type = m->p_type;
28a7f3e7 4149 p->p_flags = m->p_flags;
252b5132
RH
4150
4151 if (p->p_type == PT_LOAD
b301b248 4152 && m->count > 0)
252b5132 4153 {
b301b248
AM
4154 bfd_size_type align;
4155 bfd_vma adjust;
a49e53ed 4156 unsigned int align_power = 0;
b301b248 4157
a49e53ed 4158 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4159 {
a49e53ed 4160 unsigned int secalign;
252b5132 4161
a49e53ed
AM
4162 secalign = bfd_get_section_alignment (abfd, *secpp);
4163 if (secalign > align_power)
4164 align_power = secalign;
b301b248 4165 }
a49e53ed
AM
4166 align = (bfd_size_type) 1 << align_power;
4167
4168 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > align)
4169 align = bed->maxpagesize;
252b5132 4170
b301b248
AM
4171 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4172 off += adjust;
4173 if (adjust != 0
4174 && !m->includes_filehdr
4175 && !m->includes_phdrs
4176 && (ufile_ptr) off >= align)
4177 {
4178 /* If the first section isn't loadable, the same holds for
4179 any other sections. Since the segment won't need file
4180 space, we can make p_offset overlap some prior segment.
4181 However, .tbss is special. If a segment starts with
4182 .tbss, we need to look at the next section to decide
4183 whether the segment has any loadable sections. */
4184 i = 0;
5efb6261 4185 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
4186 {
4187 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4188 || ++i >= m->count)
4189 {
4190 off -= adjust;
4191 voff = adjust - align;
4192 break;
4193 }
4194 }
252b5132
RH
4195 }
4196 }
b1a6d0b1
NC
4197 /* Make sure the .dynamic section is the first section in the
4198 PT_DYNAMIC segment. */
4199 else if (p->p_type == PT_DYNAMIC
4200 && m->count > 1
4201 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4202 {
4203 _bfd_error_handler
b301b248
AM
4204 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4205 abfd);
b1a6d0b1
NC
4206 bfd_set_error (bfd_error_bad_value);
4207 return FALSE;
4208 }
252b5132
RH
4209
4210 if (m->count == 0)
4211 p->p_vaddr = 0;
4212 else
4213 p->p_vaddr = m->sections[0]->vma;
4214
4215 if (m->p_paddr_valid)
4216 p->p_paddr = m->p_paddr;
4217 else if (m->count == 0)
4218 p->p_paddr = 0;
4219 else
4220 p->p_paddr = m->sections[0]->lma;
4221
4222 if (p->p_type == PT_LOAD
4223 && (abfd->flags & D_PAGED) != 0)
4224 p->p_align = bed->maxpagesize;
4225 else if (m->count == 0)
45d6a902 4226 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
4227 else
4228 p->p_align = 0;
4229
4230 p->p_offset = 0;
4231 p->p_filesz = 0;
4232 p->p_memsz = 0;
4233
4234 if (m->includes_filehdr)
4235 {
4236 if (! m->p_flags_valid)
4237 p->p_flags |= PF_R;
4238 p->p_offset = 0;
4239 p->p_filesz = bed->s->sizeof_ehdr;
4240 p->p_memsz = bed->s->sizeof_ehdr;
4241 if (m->count > 0)
4242 {
4243 BFD_ASSERT (p->p_type == PT_LOAD);
4244
4245 if (p->p_vaddr < (bfd_vma) off)
4246 {
caf47ea6 4247 (*_bfd_error_handler)
b301b248
AM
4248 (_("%B: Not enough room for program headers, try linking with -N"),
4249 abfd);
252b5132 4250 bfd_set_error (bfd_error_bad_value);
b34976b6 4251 return FALSE;
252b5132
RH
4252 }
4253
4254 p->p_vaddr -= off;
4255 if (! m->p_paddr_valid)
4256 p->p_paddr -= off;
4257 }
4258 if (p->p_type == PT_LOAD)
4259 {
4260 filehdr_vaddr = p->p_vaddr;
4261 filehdr_paddr = p->p_paddr;
4262 }
4263 }
4264
4265 if (m->includes_phdrs)
4266 {
4267 if (! m->p_flags_valid)
4268 p->p_flags |= PF_R;
4269
4270 if (m->includes_filehdr)
4271 {
4272 if (p->p_type == PT_LOAD)
4273 {
4274 phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr;
4275 phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr;
4276 }
4277 }
4278 else
4279 {
4280 p->p_offset = bed->s->sizeof_ehdr;
4281
4282 if (m->count > 0)
4283 {
4284 BFD_ASSERT (p->p_type == PT_LOAD);
4285 p->p_vaddr -= off - p->p_offset;
4286 if (! m->p_paddr_valid)
4287 p->p_paddr -= off - p->p_offset;
4288 }
4289
4290 if (p->p_type == PT_LOAD)
4291 {
4292 phdrs_vaddr = p->p_vaddr;
4293 phdrs_paddr = p->p_paddr;
4294 }
4295 else
4296 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4297 }
4298
4299 p->p_filesz += alloc * bed->s->sizeof_phdr;
4300 p->p_memsz += alloc * bed->s->sizeof_phdr;
4301 }
4302
4303 if (p->p_type == PT_LOAD
4304 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4305 {
4306 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4307 p->p_offset = off + voff;
252b5132
RH
4308 else
4309 {
4310 file_ptr adjust;
4311
4312 adjust = off - (p->p_offset + p->p_filesz);
4313 p->p_filesz += adjust;
4314 p->p_memsz += adjust;
4315 }
4316 }
4317
252b5132
RH
4318 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4319 {
4320 asection *sec;
4321 flagword flags;
4322 bfd_size_type align;
4323
4324 sec = *secpp;
4325 flags = sec->flags;
4326 align = 1 << bfd_get_section_alignment (abfd, sec);
4327
b301b248
AM
4328 if (p->p_type == PT_LOAD
4329 || p->p_type == PT_TLS)
252b5132
RH
4330 {
4331 bfd_signed_vma adjust;
4332
5efb6261 4333 if ((flags & SEC_LOAD) != 0)
252b5132 4334 {
b301b248 4335 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4336 if (adjust < 0)
b301b248
AM
4337 {
4338 (*_bfd_error_handler)
4339 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4340 abfd, sec, (unsigned long) sec->lma);
4341 adjust = 0;
4342 }
4343 off += adjust;
4344 p->p_filesz += adjust;
4345 p->p_memsz += adjust;
252b5132 4346 }
b301b248
AM
4347 /* .tbss is special. It doesn't contribute to p_memsz of
4348 normal segments. */
4349 else if ((flags & SEC_THREAD_LOCAL) == 0
4350 || p->p_type == PT_TLS)
252b5132
RH
4351 {
4352 /* The section VMA must equal the file position
b301b248
AM
4353 modulo the page size. */
4354 bfd_size_type page = align;
a49e53ed 4355 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > page)
b301b248
AM
4356 page = bed->maxpagesize;
4357 adjust = vma_page_aligned_bias (sec->vma,
4358 p->p_vaddr + p->p_memsz,
4359 page);
252b5132 4360 p->p_memsz += adjust;
252b5132 4361 }
252b5132
RH
4362 }
4363
4364 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4365 {
b301b248
AM
4366 /* The section at i == 0 is the one that actually contains
4367 everything. */
4a938328
MS
4368 if (i == 0)
4369 {
252b5132 4370 sec->filepos = off;
eea6121a 4371 off += sec->size;
b301b248
AM
4372 p->p_filesz = sec->size;
4373 p->p_memsz = 0;
4374 p->p_align = 1;
252b5132 4375 }
4a938328 4376 else
252b5132 4377 {
b301b248 4378 /* The rest are fake sections that shouldn't be written. */
252b5132 4379 sec->filepos = 0;
eea6121a 4380 sec->size = 0;
b301b248
AM
4381 sec->flags = 0;
4382 continue;
252b5132 4383 }
252b5132
RH
4384 }
4385 else
4386 {
b301b248
AM
4387 if (p->p_type == PT_LOAD)
4388 {
4389 sec->filepos = off;
5efb6261
AM
4390 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4391 1997, and the exact reason for it isn't clear. One
4392 plausible explanation is that it is to work around
4393 a problem we have with linker scripts using data
4394 statements in NOLOAD sections. I don't think it
4395 makes a great deal of sense to have such a section
4396 assigned to a PT_LOAD segment, but apparently
4397 people do this. The data statement results in a
4398 bfd_data_link_order being built, and these need
4399 section contents to write into. Eventually, we get
4400 to _bfd_elf_write_object_contents which writes any
4401 section with contents to the output. Make room
4402 here for the write, so that following segments are
4403 not trashed. */
4404 if ((flags & SEC_LOAD) != 0
4405 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4406 off += sec->size;
4407 }
252b5132 4408
5efb6261 4409 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4410 {
4411 p->p_filesz += sec->size;
4412 p->p_memsz += sec->size;
4413 }
4b6c0f2f
NC
4414 /* PR ld/594: Sections in note segments which are not loaded
4415 contribute to the file size but not the in-memory size. */
4416 else if (p->p_type == PT_NOTE
4417 && (flags & SEC_HAS_CONTENTS) != 0)
4418 p->p_filesz += sec->size;
4419
b301b248
AM
4420 /* .tbss is special. It doesn't contribute to p_memsz of
4421 normal segments. */
4422 else if ((flags & SEC_THREAD_LOCAL) == 0
4423 || p->p_type == PT_TLS)
4424 p->p_memsz += sec->size;
252b5132 4425
13ae64f3 4426 if (p->p_type == PT_TLS
eea6121a 4427 && sec->size == 0
13ae64f3
JJ
4428 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4429 {
3a800eb9
AM
4430 struct bfd_link_order *o = sec->map_tail.link_order;
4431 if (o != NULL)
4432 p->p_memsz += o->offset + o->size;
13ae64f3
JJ
4433 }
4434
252b5132
RH
4435 if (align > p->p_align
4436 && (p->p_type != PT_LOAD || (abfd->flags & D_PAGED) == 0))
4437 p->p_align = align;
4438 }
4439
4440 if (! m->p_flags_valid)
4441 {
4442 p->p_flags |= PF_R;
4443 if ((flags & SEC_CODE) != 0)
4444 p->p_flags |= PF_X;
4445 if ((flags & SEC_READONLY) == 0)
4446 p->p_flags |= PF_W;
4447 }
4448 }
4449 }
4450
4451 /* Now that we have set the section file positions, we can set up
4452 the file positions for the non PT_LOAD segments. */
4453 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4454 m != NULL;
4455 m = m->next, p++)
4456 {
4457 if (p->p_type != PT_LOAD && m->count > 0)
4458 {
4459 BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs);
229fcec5
MM
4460 /* If the section has not yet been assigned a file position,
4461 do so now. The ARM BPABI requires that .dynamic section
4462 not be marked SEC_ALLOC because it is not part of any
4463 PT_LOAD segment, so it will not be processed above. */
4464 if (p->p_type == PT_DYNAMIC && m->sections[0]->filepos == 0)
4465 {
4466 unsigned int i;
4467 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4468
4469 i = 1;
4470 while (i_shdrpp[i]->bfd_section != m->sections[0])
4471 ++i;
4472 off = (_bfd_elf_assign_file_position_for_section
4473 (i_shdrpp[i], off, TRUE));
4474 p->p_filesz = m->sections[0]->size;
4475 }
252b5132
RH
4476 p->p_offset = m->sections[0]->filepos;
4477 }
4478 if (m->count == 0)
4479 {
4480 if (m->includes_filehdr)
4481 {
4482 p->p_vaddr = filehdr_vaddr;
4483 if (! m->p_paddr_valid)
4484 p->p_paddr = filehdr_paddr;
4485 }
4486 else if (m->includes_phdrs)
4487 {
4488 p->p_vaddr = phdrs_vaddr;
4489 if (! m->p_paddr_valid)
4490 p->p_paddr = phdrs_paddr;
4491 }
8c37241b
JJ
4492 else if (p->p_type == PT_GNU_RELRO)
4493 {
4494 Elf_Internal_Phdr *lp;
4495
4496 for (lp = phdrs; lp < phdrs + count; ++lp)
4497 {
4498 if (lp->p_type == PT_LOAD
4499 && lp->p_vaddr <= link_info->relro_end
4500 && lp->p_vaddr >= link_info->relro_start
4501 && lp->p_vaddr + lp->p_filesz
4502 >= link_info->relro_end)
4503 break;
4504 }
4505
4506 if (lp < phdrs + count
4507 && link_info->relro_end > lp->p_vaddr)
4508 {
4509 p->p_vaddr = lp->p_vaddr;
4510 p->p_paddr = lp->p_paddr;
4511 p->p_offset = lp->p_offset;
4512 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4513 p->p_memsz = p->p_filesz;
4514 p->p_align = 1;
4515 p->p_flags = (lp->p_flags & ~PF_W);
4516 }
4517 else
4518 {
4519 memset (p, 0, sizeof *p);
4520 p->p_type = PT_NULL;
4521 }
4522 }
252b5132
RH
4523 }
4524 }
4525
4526 /* Clear out any program headers we allocated but did not use. */
4527 for (; count < alloc; count++, p++)
4528 {
4529 memset (p, 0, sizeof *p);
4530 p->p_type = PT_NULL;
4531 }
4532
4533 elf_tdata (abfd)->phdr = phdrs;
4534
4535 elf_tdata (abfd)->next_file_pos = off;
4536
4537 /* Write out the program headers. */
dc810e39 4538 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
252b5132 4539 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0)
b34976b6 4540 return FALSE;
252b5132 4541
b34976b6 4542 return TRUE;
252b5132
RH
4543}
4544
4545/* Get the size of the program header.
4546
4547 If this is called by the linker before any of the section VMA's are set, it
4548 can't calculate the correct value for a strange memory layout. This only
4549 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4550 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4551 data segment (exclusive of .interp and .dynamic).
4552
4553 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4554 will be two segments. */
4555
4556static bfd_size_type
217aa764 4557get_program_header_size (bfd *abfd)
252b5132
RH
4558{
4559 size_t segs;
4560 asection *s;
9c5bfbb7 4561 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4562
4563 /* We can't return a different result each time we're called. */
4564 if (elf_tdata (abfd)->program_header_size != 0)
4565 return elf_tdata (abfd)->program_header_size;
4566
4567 if (elf_tdata (abfd)->segment_map != NULL)
4568 {
4569 struct elf_segment_map *m;
4570
4571 segs = 0;
4572 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4573 ++segs;
4574 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4575 return elf_tdata (abfd)->program_header_size;
4576 }
4577
4578 /* Assume we will need exactly two PT_LOAD segments: one for text
4579 and one for data. */
4580 segs = 2;
4581
4582 s = bfd_get_section_by_name (abfd, ".interp");
4583 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4584 {
4585 /* If we have a loadable interpreter section, we need a
4586 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4587 PT_PHDR segment, although that may not be true for all
252b5132
RH
4588 targets. */
4589 segs += 2;
4590 }
4591
4592 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4593 {
4594 /* We need a PT_DYNAMIC segment. */
4595 ++segs;
4596 }
4597
126495ed 4598 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4599 {
4600 /* We need a PT_GNU_EH_FRAME segment. */
4601 ++segs;
4602 }
4603
9ee5e499
JJ
4604 if (elf_tdata (abfd)->stack_flags)
4605 {
4606 /* We need a PT_GNU_STACK segment. */
4607 ++segs;
4608 }
4609
8c37241b
JJ
4610 if (elf_tdata (abfd)->relro)
4611 {
4612 /* We need a PT_GNU_RELRO segment. */
4613 ++segs;
4614 }
4615
252b5132
RH
4616 for (s = abfd->sections; s != NULL; s = s->next)
4617 {
4618 if ((s->flags & SEC_LOAD) != 0
4619 && strncmp (s->name, ".note", 5) == 0)
4620 {
4621 /* We need a PT_NOTE segment. */
4622 ++segs;
4623 }
4624 }
4625
13ae64f3
JJ
4626 for (s = abfd->sections; s != NULL; s = s->next)
4627 {
4628 if (s->flags & SEC_THREAD_LOCAL)
4629 {
4630 /* We need a PT_TLS segment. */
4631 ++segs;
4632 break;
4633 }
4634 }
4635
252b5132
RH
4636 /* Let the backend count up any program headers it might need. */
4637 if (bed->elf_backend_additional_program_headers)
4638 {
4639 int a;
4640
4641 a = (*bed->elf_backend_additional_program_headers) (abfd);
4642 if (a == -1)
4643 abort ();
4644 segs += a;
4645 }
4646
4647 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4648 return elf_tdata (abfd)->program_header_size;
4649}
4650
4651/* Work out the file positions of all the sections. This is called by
4652 _bfd_elf_compute_section_file_positions. All the section sizes and
4653 VMAs must be known before this is called.
4654
e0638f70
AM
4655 Reloc sections come in two flavours: Those processed specially as
4656 "side-channel" data attached to a section to which they apply, and
4657 those that bfd doesn't process as relocations. The latter sort are
4658 stored in a normal bfd section by bfd_section_from_shdr. We don't
4659 consider the former sort here, unless they form part of the loadable
4660 image. Reloc sections not assigned here will be handled later by
4661 assign_file_positions_for_relocs.
252b5132
RH
4662
4663 We also don't set the positions of the .symtab and .strtab here. */
4664
b34976b6 4665static bfd_boolean
c84fca4d
AO
4666assign_file_positions_except_relocs (bfd *abfd,
4667 struct bfd_link_info *link_info)
252b5132
RH
4668{
4669 struct elf_obj_tdata * const tdata = elf_tdata (abfd);
4670 Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd);
4671 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
9ad5cbcf 4672 unsigned int num_sec = elf_numsections (abfd);
252b5132 4673 file_ptr off;
9c5bfbb7 4674 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4675
4676 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4677 && bfd_get_format (abfd) != bfd_core)
4678 {
4679 Elf_Internal_Shdr **hdrpp;
4680 unsigned int i;
4681
4682 /* Start after the ELF header. */
4683 off = i_ehdrp->e_ehsize;
4684
4685 /* We are not creating an executable, which means that we are
4686 not creating a program header, and that the actual order of
4687 the sections in the file is unimportant. */
9ad5cbcf 4688 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4689 {
4690 Elf_Internal_Shdr *hdr;
4691
4692 hdr = *hdrpp;
e0638f70
AM
4693 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4694 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4695 || i == tdata->symtab_section
4696 || i == tdata->symtab_shndx_section
252b5132
RH
4697 || i == tdata->strtab_section)
4698 {
4699 hdr->sh_offset = -1;
252b5132 4700 }
9ad5cbcf 4701 else
b34976b6 4702 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4703
9ad5cbcf
AM
4704 if (i == SHN_LORESERVE - 1)
4705 {
4706 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4707 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4708 }
252b5132
RH
4709 }
4710 }
4711 else
4712 {
4713 unsigned int i;
4714 Elf_Internal_Shdr **hdrpp;
4715
4716 /* Assign file positions for the loaded sections based on the
4717 assignment of sections to segments. */
c84fca4d 4718 if (! assign_file_positions_for_segments (abfd, link_info))
b34976b6 4719 return FALSE;
252b5132
RH
4720
4721 /* Assign file positions for the other sections. */
4722
4723 off = elf_tdata (abfd)->next_file_pos;
9ad5cbcf 4724 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4725 {
4726 Elf_Internal_Shdr *hdr;
4727
4728 hdr = *hdrpp;
4729 if (hdr->bfd_section != NULL
4730 && hdr->bfd_section->filepos != 0)
4731 hdr->sh_offset = hdr->bfd_section->filepos;
4732 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4733 {
4734 ((*_bfd_error_handler)
b301b248
AM
4735 (_("%B: warning: allocated section `%s' not in segment"),
4736 abfd,
252b5132
RH
4737 (hdr->bfd_section == NULL
4738 ? "*unknown*"
4739 : hdr->bfd_section->name)));
4740 if ((abfd->flags & D_PAGED) != 0)
340b6d91
AC
4741 off += vma_page_aligned_bias (hdr->sh_addr, off,
4742 bed->maxpagesize);
252b5132 4743 else
340b6d91
AC
4744 off += vma_page_aligned_bias (hdr->sh_addr, off,
4745 hdr->sh_addralign);
252b5132 4746 off = _bfd_elf_assign_file_position_for_section (hdr, off,
b34976b6 4747 FALSE);
252b5132 4748 }
e0638f70
AM
4749 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4750 && hdr->bfd_section == NULL)
252b5132 4751 || hdr == i_shdrpp[tdata->symtab_section]
9ad5cbcf 4752 || hdr == i_shdrpp[tdata->symtab_shndx_section]
252b5132
RH
4753 || hdr == i_shdrpp[tdata->strtab_section])
4754 hdr->sh_offset = -1;
4755 else
b34976b6 4756 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf
AM
4757
4758 if (i == SHN_LORESERVE - 1)
4759 {
4760 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4761 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4762 }
252b5132
RH
4763 }
4764 }
4765
4766 /* Place the section headers. */
45d6a902 4767 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4768 i_ehdrp->e_shoff = off;
4769 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4770
4771 elf_tdata (abfd)->next_file_pos = off;
4772
b34976b6 4773 return TRUE;
252b5132
RH
4774}
4775
b34976b6 4776static bfd_boolean
217aa764 4777prep_headers (bfd *abfd)
252b5132
RH
4778{
4779 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4780 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4781 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4782 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4783 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4784
4785 i_ehdrp = elf_elfheader (abfd);
4786 i_shdrp = elf_elfsections (abfd);
4787
2b0f7ef9 4788 shstrtab = _bfd_elf_strtab_init ();
252b5132 4789 if (shstrtab == NULL)
b34976b6 4790 return FALSE;
252b5132
RH
4791
4792 elf_shstrtab (abfd) = shstrtab;
4793
4794 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4795 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4796 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4797 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4798
4799 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4800 i_ehdrp->e_ident[EI_DATA] =
4801 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4802 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4803
252b5132
RH
4804 if ((abfd->flags & DYNAMIC) != 0)
4805 i_ehdrp->e_type = ET_DYN;
4806 else if ((abfd->flags & EXEC_P) != 0)
4807 i_ehdrp->e_type = ET_EXEC;
4808 else if (bfd_get_format (abfd) == bfd_core)
4809 i_ehdrp->e_type = ET_CORE;
4810 else
4811 i_ehdrp->e_type = ET_REL;
4812
4813 switch (bfd_get_arch (abfd))
4814 {
4815 case bfd_arch_unknown:
4816 i_ehdrp->e_machine = EM_NONE;
4817 break;
aa4f99bb
AO
4818
4819 /* There used to be a long list of cases here, each one setting
4820 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4821 in the corresponding bfd definition. To avoid duplication,
4822 the switch was removed. Machines that need special handling
4823 can generally do it in elf_backend_final_write_processing(),
4824 unless they need the information earlier than the final write.
4825 Such need can generally be supplied by replacing the tests for
4826 e_machine with the conditions used to determine it. */
252b5132 4827 default:
9c5bfbb7
AM
4828 i_ehdrp->e_machine = bed->elf_machine_code;
4829 }
aa4f99bb 4830
252b5132
RH
4831 i_ehdrp->e_version = bed->s->ev_current;
4832 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4833
c044fabd 4834 /* No program header, for now. */
252b5132
RH
4835 i_ehdrp->e_phoff = 0;
4836 i_ehdrp->e_phentsize = 0;
4837 i_ehdrp->e_phnum = 0;
4838
c044fabd 4839 /* Each bfd section is section header entry. */
252b5132
RH
4840 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4841 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4842
c044fabd 4843 /* If we're building an executable, we'll need a program header table. */
252b5132 4844 if (abfd->flags & EXEC_P)
0e71e495
BE
4845 /* It all happens later. */
4846 ;
252b5132
RH
4847 else
4848 {
4849 i_ehdrp->e_phentsize = 0;
4850 i_phdrp = 0;
4851 i_ehdrp->e_phoff = 0;
4852 }
4853
4854 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4855 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4856 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4857 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4858 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4859 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4860 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4861 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4862 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4863 return FALSE;
252b5132 4864
b34976b6 4865 return TRUE;
252b5132
RH
4866}
4867
4868/* Assign file positions for all the reloc sections which are not part
4869 of the loadable file image. */
4870
4871void
217aa764 4872_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4873{
4874 file_ptr off;
9ad5cbcf 4875 unsigned int i, num_sec;
252b5132
RH
4876 Elf_Internal_Shdr **shdrpp;
4877
4878 off = elf_tdata (abfd)->next_file_pos;
4879
9ad5cbcf
AM
4880 num_sec = elf_numsections (abfd);
4881 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4882 {
4883 Elf_Internal_Shdr *shdrp;
4884
4885 shdrp = *shdrpp;
4886 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4887 && shdrp->sh_offset == -1)
b34976b6 4888 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4889 }
4890
4891 elf_tdata (abfd)->next_file_pos = off;
4892}
4893
b34976b6 4894bfd_boolean
217aa764 4895_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4896{
9c5bfbb7 4897 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4898 Elf_Internal_Ehdr *i_ehdrp;
4899 Elf_Internal_Shdr **i_shdrp;
b34976b6 4900 bfd_boolean failed;
9ad5cbcf 4901 unsigned int count, num_sec;
252b5132
RH
4902
4903 if (! abfd->output_has_begun
217aa764 4904 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4905 return FALSE;
252b5132
RH
4906
4907 i_shdrp = elf_elfsections (abfd);
4908 i_ehdrp = elf_elfheader (abfd);
4909
b34976b6 4910 failed = FALSE;
252b5132
RH
4911 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4912 if (failed)
b34976b6 4913 return FALSE;
252b5132
RH
4914
4915 _bfd_elf_assign_file_positions_for_relocs (abfd);
4916
c044fabd 4917 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4918 num_sec = elf_numsections (abfd);
4919 for (count = 1; count < num_sec; count++)
252b5132
RH
4920 {
4921 if (bed->elf_backend_section_processing)
4922 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4923 if (i_shdrp[count]->contents)
4924 {
dc810e39
AM
4925 bfd_size_type amt = i_shdrp[count]->sh_size;
4926
252b5132 4927 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4928 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4929 return FALSE;
252b5132 4930 }
9ad5cbcf
AM
4931 if (count == SHN_LORESERVE - 1)
4932 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4933 }
4934
4935 /* Write out the section header names. */
26ae6d5e
DJ
4936 if (elf_shstrtab (abfd) != NULL
4937 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
4938 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4939 return FALSE;
252b5132
RH
4940
4941 if (bed->elf_backend_final_write_processing)
4942 (*bed->elf_backend_final_write_processing) (abfd,
4943 elf_tdata (abfd)->linker);
4944
4945 return bed->s->write_shdrs_and_ehdr (abfd);
4946}
4947
b34976b6 4948bfd_boolean
217aa764 4949_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4950{
c044fabd 4951 /* Hopefully this can be done just like an object file. */
252b5132
RH
4952 return _bfd_elf_write_object_contents (abfd);
4953}
c044fabd
KH
4954
4955/* Given a section, search the header to find them. */
4956
252b5132 4957int
198beae2 4958_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4959{
9c5bfbb7 4960 const struct elf_backend_data *bed;
252b5132 4961 int index;
252b5132 4962
9ad5cbcf
AM
4963 if (elf_section_data (asect) != NULL
4964 && elf_section_data (asect)->this_idx != 0)
4965 return elf_section_data (asect)->this_idx;
4966
4967 if (bfd_is_abs_section (asect))
af746e92
AM
4968 index = SHN_ABS;
4969 else if (bfd_is_com_section (asect))
4970 index = SHN_COMMON;
4971 else if (bfd_is_und_section (asect))
4972 index = SHN_UNDEF;
4973 else
6dc132d9 4974 index = -1;
252b5132 4975
af746e92 4976 bed = get_elf_backend_data (abfd);
252b5132
RH
4977 if (bed->elf_backend_section_from_bfd_section)
4978 {
af746e92 4979 int retval = index;
9ad5cbcf 4980
af746e92
AM
4981 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
4982 return retval;
252b5132
RH
4983 }
4984
af746e92
AM
4985 if (index == -1)
4986 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 4987
af746e92 4988 return index;
252b5132
RH
4989}
4990
4991/* Given a BFD symbol, return the index in the ELF symbol table, or -1
4992 on error. */
4993
4994int
217aa764 4995_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
4996{
4997 asymbol *asym_ptr = *asym_ptr_ptr;
4998 int idx;
4999 flagword flags = asym_ptr->flags;
5000
5001 /* When gas creates relocations against local labels, it creates its
5002 own symbol for the section, but does put the symbol into the
5003 symbol chain, so udata is 0. When the linker is generating
5004 relocatable output, this section symbol may be for one of the
5005 input sections rather than the output section. */
5006 if (asym_ptr->udata.i == 0
5007 && (flags & BSF_SECTION_SYM)
5008 && asym_ptr->section)
5009 {
5010 int indx;
5011
5012 if (asym_ptr->section->output_section != NULL)
5013 indx = asym_ptr->section->output_section->index;
5014 else
5015 indx = asym_ptr->section->index;
4e89ac30
L
5016 if (indx < elf_num_section_syms (abfd)
5017 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5018 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5019 }
5020
5021 idx = asym_ptr->udata.i;
5022
5023 if (idx == 0)
5024 {
5025 /* This case can occur when using --strip-symbol on a symbol
5026 which is used in a relocation entry. */
5027 (*_bfd_error_handler)
d003868e
AM
5028 (_("%B: symbol `%s' required but not present"),
5029 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5030 bfd_set_error (bfd_error_no_symbols);
5031 return -1;
5032 }
5033
5034#if DEBUG & 4
5035 {
5036 fprintf (stderr,
661a3fd4 5037 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5038 (long) asym_ptr, asym_ptr->name, idx, flags,
5039 elf_symbol_flags (flags));
5040 fflush (stderr);
5041 }
5042#endif
5043
5044 return idx;
5045}
5046
5047/* Copy private BFD data. This copies any program header information. */
5048
b34976b6 5049static bfd_boolean
217aa764 5050copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132 5051{
b34976b6
AM
5052 Elf_Internal_Ehdr *iehdr;
5053 struct elf_segment_map *map;
5054 struct elf_segment_map *map_first;
5055 struct elf_segment_map **pointer_to_map;
5056 Elf_Internal_Phdr *segment;
5057 asection *section;
5058 unsigned int i;
5059 unsigned int num_segments;
5060 bfd_boolean phdr_included = FALSE;
5061 bfd_vma maxpagesize;
5062 struct elf_segment_map *phdr_adjust_seg = NULL;
5063 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5064 const struct elf_backend_data *bed;
bc67d8a6 5065
c044fabd 5066 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 5067 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5068 return TRUE;
252b5132
RH
5069
5070 if (elf_tdata (ibfd)->phdr == NULL)
b34976b6 5071 return TRUE;
252b5132 5072
caf47ea6 5073 bed = get_elf_backend_data (ibfd);
252b5132
RH
5074 iehdr = elf_elfheader (ibfd);
5075
bc67d8a6 5076 map_first = NULL;
c044fabd 5077 pointer_to_map = &map_first;
252b5132
RH
5078
5079 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5080 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5081
5082 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5083#define SEGMENT_END(segment, start) \
5084 (start + (segment->p_memsz > segment->p_filesz \
5085 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5086
eecdbe52
JJ
5087#define SECTION_SIZE(section, segment) \
5088 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5089 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5090 ? section->size : 0)
eecdbe52 5091
b34976b6 5092 /* Returns TRUE if the given section is contained within
bc67d8a6 5093 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5094#define IS_CONTAINED_BY_VMA(section, segment) \
5095 (section->vma >= segment->p_vaddr \
eecdbe52 5096 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5097 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5098
b34976b6 5099 /* Returns TRUE if the given section is contained within
bc67d8a6 5100 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5101#define IS_CONTAINED_BY_LMA(section, segment, base) \
5102 (section->lma >= base \
eecdbe52 5103 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5104 <= SEGMENT_END (segment, base)))
252b5132 5105
c044fabd 5106 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5107#define IS_COREFILE_NOTE(p, s) \
5108 (p->p_type == PT_NOTE \
5109 && bfd_get_format (ibfd) == bfd_core \
5110 && s->vma == 0 && s->lma == 0 \
5111 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5112 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5113 <= p->p_offset + p->p_filesz))
252b5132
RH
5114
5115 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5116 linker, which generates a PT_INTERP section with p_vaddr and
5117 p_memsz set to 0. */
aecc8f8a
AM
5118#define IS_SOLARIS_PT_INTERP(p, s) \
5119 (p->p_vaddr == 0 \
5120 && p->p_paddr == 0 \
5121 && p->p_memsz == 0 \
5122 && p->p_filesz > 0 \
5123 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5124 && s->size > 0 \
aecc8f8a 5125 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5126 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5127 <= p->p_offset + p->p_filesz))
5c440b1e 5128
bc67d8a6
NC
5129 /* Decide if the given section should be included in the given segment.
5130 A section will be included if:
f5ffc919
NC
5131 1. It is within the address space of the segment -- we use the LMA
5132 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5133 2. It is an allocated segment,
5134 3. There is an output section associated with it,
eecdbe52 5135 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5136 5. PT_GNU_STACK segments do not include any sections.
5137 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5138 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5139 8. PT_DYNAMIC should not contain empty sections at the beginning
5140 (with the possible exception of .dynamic). */
caf47ea6 5141#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5142 ((((segment->p_paddr \
5143 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5144 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5145 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5146 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5147 && section->output_section != NULL \
03394ac9 5148 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5149 && (segment->p_type != PT_TLS \
5150 || (section->flags & SEC_THREAD_LOCAL)) \
5151 && (segment->p_type == PT_LOAD \
5152 || segment->p_type == PT_TLS \
5153 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5154 && (segment->p_type != PT_DYNAMIC \
5155 || SECTION_SIZE (section, segment) > 0 \
5156 || (segment->p_paddr \
5157 ? segment->p_paddr != section->lma \
5158 : segment->p_vaddr != section->vma) \
5159 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5160 == 0)) \
82e51918 5161 && ! section->segment_mark)
bc67d8a6 5162
b34976b6 5163 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5164#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5165 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5166
5167 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5168 their VMA address ranges and their LMA address ranges overlap.
5169 It is possible to have overlapping VMA ranges without overlapping LMA
5170 ranges. RedBoot images for example can have both .data and .bss mapped
5171 to the same VMA range, but with the .data section mapped to a different
5172 LMA. */
aecc8f8a 5173#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5174 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5175 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5176 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5177 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5178
5179 /* Initialise the segment mark field. */
5180 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5181 section->segment_mark = FALSE;
bc67d8a6 5182
252b5132 5183 /* Scan through the segments specified in the program header
bc67d8a6 5184 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5185 in the loadable segments. These can be created by weird
aecc8f8a 5186 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5187 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5188 i < num_segments;
c044fabd 5189 i++, segment++)
252b5132 5190 {
252b5132 5191 unsigned int j;
c044fabd 5192 Elf_Internal_Phdr *segment2;
252b5132 5193
aecc8f8a
AM
5194 if (segment->p_type == PT_INTERP)
5195 for (section = ibfd->sections; section; section = section->next)
5196 if (IS_SOLARIS_PT_INTERP (segment, section))
5197 {
5198 /* Mininal change so that the normal section to segment
4cc11e76 5199 assignment code will work. */
aecc8f8a
AM
5200 segment->p_vaddr = section->vma;
5201 break;
5202 }
5203
bc67d8a6
NC
5204 if (segment->p_type != PT_LOAD)
5205 continue;
c044fabd 5206
bc67d8a6 5207 /* Determine if this segment overlaps any previous segments. */
c044fabd 5208 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5209 {
5210 bfd_signed_vma extra_length;
c044fabd 5211
bc67d8a6
NC
5212 if (segment2->p_type != PT_LOAD
5213 || ! SEGMENT_OVERLAPS (segment, segment2))
5214 continue;
c044fabd 5215
bc67d8a6
NC
5216 /* Merge the two segments together. */
5217 if (segment2->p_vaddr < segment->p_vaddr)
5218 {
c044fabd
KH
5219 /* Extend SEGMENT2 to include SEGMENT and then delete
5220 SEGMENT. */
bc67d8a6
NC
5221 extra_length =
5222 SEGMENT_END (segment, segment->p_vaddr)
5223 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5224
bc67d8a6
NC
5225 if (extra_length > 0)
5226 {
5227 segment2->p_memsz += extra_length;
5228 segment2->p_filesz += extra_length;
5229 }
c044fabd 5230
bc67d8a6 5231 segment->p_type = PT_NULL;
c044fabd 5232
bc67d8a6
NC
5233 /* Since we have deleted P we must restart the outer loop. */
5234 i = 0;
5235 segment = elf_tdata (ibfd)->phdr;
5236 break;
5237 }
5238 else
5239 {
c044fabd
KH
5240 /* Extend SEGMENT to include SEGMENT2 and then delete
5241 SEGMENT2. */
bc67d8a6
NC
5242 extra_length =
5243 SEGMENT_END (segment2, segment2->p_vaddr)
5244 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5245
bc67d8a6
NC
5246 if (extra_length > 0)
5247 {
5248 segment->p_memsz += extra_length;
5249 segment->p_filesz += extra_length;
5250 }
c044fabd 5251
bc67d8a6
NC
5252 segment2->p_type = PT_NULL;
5253 }
5254 }
5255 }
c044fabd 5256
bc67d8a6
NC
5257 /* The second scan attempts to assign sections to segments. */
5258 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5259 i < num_segments;
5260 i ++, segment ++)
5261 {
5262 unsigned int section_count;
5263 asection ** sections;
5264 asection * output_section;
5265 unsigned int isec;
5266 bfd_vma matching_lma;
5267 bfd_vma suggested_lma;
5268 unsigned int j;
dc810e39 5269 bfd_size_type amt;
bc67d8a6
NC
5270
5271 if (segment->p_type == PT_NULL)
5272 continue;
c044fabd 5273
bc67d8a6 5274 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5275 for (section = ibfd->sections, section_count = 0;
5276 section != NULL;
5277 section = section->next)
caf47ea6 5278 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5279 ++section_count;
811072d8 5280
b5f852ea
NC
5281 /* Allocate a segment map big enough to contain
5282 all of the sections we have selected. */
dc810e39
AM
5283 amt = sizeof (struct elf_segment_map);
5284 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5285 map = bfd_alloc (obfd, amt);
bc67d8a6 5286 if (map == NULL)
b34976b6 5287 return FALSE;
252b5132
RH
5288
5289 /* Initialise the fields of the segment map. Default to
5290 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5291 map->next = NULL;
5292 map->p_type = segment->p_type;
5293 map->p_flags = segment->p_flags;
5294 map->p_flags_valid = 1;
5295 map->p_paddr = segment->p_paddr;
5296 map->p_paddr_valid = 1;
252b5132
RH
5297
5298 /* Determine if this segment contains the ELF file header
5299 and if it contains the program headers themselves. */
bc67d8a6
NC
5300 map->includes_filehdr = (segment->p_offset == 0
5301 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5302
bc67d8a6 5303 map->includes_phdrs = 0;
252b5132 5304
bc67d8a6 5305 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5306 {
bc67d8a6
NC
5307 map->includes_phdrs =
5308 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5309 && (segment->p_offset + segment->p_filesz
252b5132
RH
5310 >= ((bfd_vma) iehdr->e_phoff
5311 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5312
bc67d8a6 5313 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5314 phdr_included = TRUE;
252b5132
RH
5315 }
5316
bc67d8a6 5317 if (section_count == 0)
252b5132
RH
5318 {
5319 /* Special segments, such as the PT_PHDR segment, may contain
5320 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5321 something. They are allowed by the ELF spec however, so only
5322 a warning is produced. */
bc67d8a6 5323 if (segment->p_type == PT_LOAD)
caf47ea6 5324 (*_bfd_error_handler)
d003868e
AM
5325 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5326 ibfd);
252b5132 5327
bc67d8a6 5328 map->count = 0;
c044fabd
KH
5329 *pointer_to_map = map;
5330 pointer_to_map = &map->next;
252b5132
RH
5331
5332 continue;
5333 }
5334
5335 /* Now scan the sections in the input BFD again and attempt
5336 to add their corresponding output sections to the segment map.
5337 The problem here is how to handle an output section which has
5338 been moved (ie had its LMA changed). There are four possibilities:
5339
5340 1. None of the sections have been moved.
5341 In this case we can continue to use the segment LMA from the
5342 input BFD.
5343
5344 2. All of the sections have been moved by the same amount.
5345 In this case we can change the segment's LMA to match the LMA
5346 of the first section.
5347
5348 3. Some of the sections have been moved, others have not.
5349 In this case those sections which have not been moved can be
5350 placed in the current segment which will have to have its size,
5351 and possibly its LMA changed, and a new segment or segments will
5352 have to be created to contain the other sections.
5353
b5f852ea 5354 4. The sections have been moved, but not by the same amount.
252b5132
RH
5355 In this case we can change the segment's LMA to match the LMA
5356 of the first section and we will have to create a new segment
5357 or segments to contain the other sections.
5358
5359 In order to save time, we allocate an array to hold the section
5360 pointers that we are interested in. As these sections get assigned
5361 to a segment, they are removed from this array. */
5362
0b14c2aa
L
5363 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5364 to work around this long long bug. */
d0fb9a8d 5365 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5366 if (sections == NULL)
b34976b6 5367 return FALSE;
252b5132
RH
5368
5369 /* Step One: Scan for segment vs section LMA conflicts.
5370 Also add the sections to the section array allocated above.
5371 Also add the sections to the current segment. In the common
5372 case, where the sections have not been moved, this means that
5373 we have completely filled the segment, and there is nothing
5374 more to do. */
252b5132 5375 isec = 0;
72730e0c 5376 matching_lma = 0;
252b5132
RH
5377 suggested_lma = 0;
5378
bc67d8a6
NC
5379 for (j = 0, section = ibfd->sections;
5380 section != NULL;
5381 section = section->next)
252b5132 5382 {
caf47ea6 5383 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5384 {
bc67d8a6
NC
5385 output_section = section->output_section;
5386
5387 sections[j ++] = section;
252b5132
RH
5388
5389 /* The Solaris native linker always sets p_paddr to 0.
5390 We try to catch that case here, and set it to the
5e8d7549
NC
5391 correct value. Note - some backends require that
5392 p_paddr be left as zero. */
bc67d8a6 5393 if (segment->p_paddr == 0
4455705d 5394 && segment->p_vaddr != 0
5e8d7549 5395 && (! bed->want_p_paddr_set_to_zero)
252b5132 5396 && isec == 0
bc67d8a6
NC
5397 && output_section->lma != 0
5398 && (output_section->vma == (segment->p_vaddr
5399 + (map->includes_filehdr
5400 ? iehdr->e_ehsize
5401 : 0)
5402 + (map->includes_phdrs
079e9a2f
AM
5403 ? (iehdr->e_phnum
5404 * iehdr->e_phentsize)
bc67d8a6
NC
5405 : 0))))
5406 map->p_paddr = segment->p_vaddr;
252b5132
RH
5407
5408 /* Match up the physical address of the segment with the
5409 LMA address of the output section. */
bc67d8a6 5410 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5411 || IS_COREFILE_NOTE (segment, section)
5412 || (bed->want_p_paddr_set_to_zero &&
5413 IS_CONTAINED_BY_VMA (output_section, segment))
5414 )
252b5132
RH
5415 {
5416 if (matching_lma == 0)
bc67d8a6 5417 matching_lma = output_section->lma;
252b5132
RH
5418
5419 /* We assume that if the section fits within the segment
bc67d8a6 5420 then it does not overlap any other section within that
252b5132 5421 segment. */
bc67d8a6 5422 map->sections[isec ++] = output_section;
252b5132
RH
5423 }
5424 else if (suggested_lma == 0)
bc67d8a6 5425 suggested_lma = output_section->lma;
252b5132
RH
5426 }
5427 }
5428
bc67d8a6 5429 BFD_ASSERT (j == section_count);
252b5132
RH
5430
5431 /* Step Two: Adjust the physical address of the current segment,
5432 if necessary. */
bc67d8a6 5433 if (isec == section_count)
252b5132
RH
5434 {
5435 /* All of the sections fitted within the segment as currently
5436 specified. This is the default case. Add the segment to
5437 the list of built segments and carry on to process the next
5438 program header in the input BFD. */
bc67d8a6 5439 map->count = section_count;
c044fabd
KH
5440 *pointer_to_map = map;
5441 pointer_to_map = &map->next;
252b5132
RH
5442
5443 free (sections);
5444 continue;
5445 }
252b5132
RH
5446 else
5447 {
72730e0c
AM
5448 if (matching_lma != 0)
5449 {
5450 /* At least one section fits inside the current segment.
5451 Keep it, but modify its physical address to match the
5452 LMA of the first section that fitted. */
bc67d8a6 5453 map->p_paddr = matching_lma;
72730e0c
AM
5454 }
5455 else
5456 {
5457 /* None of the sections fitted inside the current segment.
5458 Change the current segment's physical address to match
5459 the LMA of the first section. */
bc67d8a6 5460 map->p_paddr = suggested_lma;
72730e0c
AM
5461 }
5462
bc67d8a6
NC
5463 /* Offset the segment physical address from the lma
5464 to allow for space taken up by elf headers. */
5465 if (map->includes_filehdr)
5466 map->p_paddr -= iehdr->e_ehsize;
252b5132 5467
bc67d8a6
NC
5468 if (map->includes_phdrs)
5469 {
5470 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5471
5472 /* iehdr->e_phnum is just an estimate of the number
5473 of program headers that we will need. Make a note
5474 here of the number we used and the segment we chose
5475 to hold these headers, so that we can adjust the
5476 offset when we know the correct value. */
5477 phdr_adjust_num = iehdr->e_phnum;
5478 phdr_adjust_seg = map;
5479 }
252b5132
RH
5480 }
5481
5482 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5483 those that fit to the current segment and removing them from the
252b5132
RH
5484 sections array; but making sure not to leave large gaps. Once all
5485 possible sections have been assigned to the current segment it is
5486 added to the list of built segments and if sections still remain
5487 to be assigned, a new segment is constructed before repeating
5488 the loop. */
5489 isec = 0;
5490 do
5491 {
bc67d8a6 5492 map->count = 0;
252b5132
RH
5493 suggested_lma = 0;
5494
5495 /* Fill the current segment with sections that fit. */
bc67d8a6 5496 for (j = 0; j < section_count; j++)
252b5132 5497 {
bc67d8a6 5498 section = sections[j];
252b5132 5499
bc67d8a6 5500 if (section == NULL)
252b5132
RH
5501 continue;
5502
bc67d8a6 5503 output_section = section->output_section;
252b5132 5504
bc67d8a6 5505 BFD_ASSERT (output_section != NULL);
c044fabd 5506
bc67d8a6
NC
5507 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5508 || IS_COREFILE_NOTE (segment, section))
252b5132 5509 {
bc67d8a6 5510 if (map->count == 0)
252b5132
RH
5511 {
5512 /* If the first section in a segment does not start at
bc67d8a6
NC
5513 the beginning of the segment, then something is
5514 wrong. */
5515 if (output_section->lma !=
5516 (map->p_paddr
5517 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5518 + (map->includes_phdrs
5519 ? iehdr->e_phnum * iehdr->e_phentsize
5520 : 0)))
252b5132
RH
5521 abort ();
5522 }
5523 else
5524 {
5525 asection * prev_sec;
252b5132 5526
bc67d8a6 5527 prev_sec = map->sections[map->count - 1];
252b5132
RH
5528
5529 /* If the gap between the end of the previous section
bc67d8a6
NC
5530 and the start of this section is more than
5531 maxpagesize then we need to start a new segment. */
eea6121a 5532 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5533 maxpagesize)
caf47ea6 5534 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5535 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5536 > output_section->lma))
252b5132
RH
5537 {
5538 if (suggested_lma == 0)
bc67d8a6 5539 suggested_lma = output_section->lma;
252b5132
RH
5540
5541 continue;
5542 }
5543 }
5544
bc67d8a6 5545 map->sections[map->count++] = output_section;
252b5132
RH
5546 ++isec;
5547 sections[j] = NULL;
b34976b6 5548 section->segment_mark = TRUE;
252b5132
RH
5549 }
5550 else if (suggested_lma == 0)
bc67d8a6 5551 suggested_lma = output_section->lma;
252b5132
RH
5552 }
5553
bc67d8a6 5554 BFD_ASSERT (map->count > 0);
252b5132
RH
5555
5556 /* Add the current segment to the list of built segments. */
c044fabd
KH
5557 *pointer_to_map = map;
5558 pointer_to_map = &map->next;
252b5132 5559
bc67d8a6 5560 if (isec < section_count)
252b5132
RH
5561 {
5562 /* We still have not allocated all of the sections to
5563 segments. Create a new segment here, initialise it
5564 and carry on looping. */
dc810e39
AM
5565 amt = sizeof (struct elf_segment_map);
5566 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5567 map = bfd_alloc (obfd, amt);
bc67d8a6 5568 if (map == NULL)
5ed6aba4
NC
5569 {
5570 free (sections);
5571 return FALSE;
5572 }
252b5132
RH
5573
5574 /* Initialise the fields of the segment map. Set the physical
5575 physical address to the LMA of the first section that has
5576 not yet been assigned. */
bc67d8a6
NC
5577 map->next = NULL;
5578 map->p_type = segment->p_type;
5579 map->p_flags = segment->p_flags;
5580 map->p_flags_valid = 1;
5581 map->p_paddr = suggested_lma;
5582 map->p_paddr_valid = 1;
5583 map->includes_filehdr = 0;
5584 map->includes_phdrs = 0;
252b5132
RH
5585 }
5586 }
bc67d8a6 5587 while (isec < section_count);
252b5132
RH
5588
5589 free (sections);
5590 }
5591
5592 /* The Solaris linker creates program headers in which all the
5593 p_paddr fields are zero. When we try to objcopy or strip such a
5594 file, we get confused. Check for this case, and if we find it
5595 reset the p_paddr_valid fields. */
bc67d8a6
NC
5596 for (map = map_first; map != NULL; map = map->next)
5597 if (map->p_paddr != 0)
252b5132 5598 break;
bc67d8a6 5599 if (map == NULL)
b5f852ea
NC
5600 for (map = map_first; map != NULL; map = map->next)
5601 map->p_paddr_valid = 0;
252b5132 5602
bc67d8a6
NC
5603 elf_tdata (obfd)->segment_map = map_first;
5604
5605 /* If we had to estimate the number of program headers that were
9ad5cbcf 5606 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5607 the offset if necessary. */
5608 if (phdr_adjust_seg != NULL)
5609 {
5610 unsigned int count;
c044fabd 5611
bc67d8a6 5612 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5613 count++;
252b5132 5614
bc67d8a6
NC
5615 if (count > phdr_adjust_num)
5616 phdr_adjust_seg->p_paddr
5617 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5618 }
c044fabd 5619
bc67d8a6 5620#undef SEGMENT_END
eecdbe52 5621#undef SECTION_SIZE
bc67d8a6
NC
5622#undef IS_CONTAINED_BY_VMA
5623#undef IS_CONTAINED_BY_LMA
252b5132 5624#undef IS_COREFILE_NOTE
bc67d8a6
NC
5625#undef IS_SOLARIS_PT_INTERP
5626#undef INCLUDE_SECTION_IN_SEGMENT
5627#undef SEGMENT_AFTER_SEGMENT
5628#undef SEGMENT_OVERLAPS
b34976b6 5629 return TRUE;
252b5132
RH
5630}
5631
ccd2ec6a
L
5632/* Initialize private output section information from input section. */
5633
5634bfd_boolean
5635_bfd_elf_init_private_section_data (bfd *ibfd,
5636 asection *isec,
5637 bfd *obfd,
5638 asection *osec,
5639 struct bfd_link_info *link_info)
5640
5641{
5642 Elf_Internal_Shdr *ihdr, *ohdr;
5643 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
5644
5645 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5646 || obfd->xvec->flavour != bfd_target_elf_flavour)
5647 return TRUE;
5648
5649 /* FIXME: What if the output ELF section type has been set to
5650 something different? */
5651 if (elf_section_type (osec) == SHT_NULL)
5652 elf_section_type (osec) = elf_section_type (isec);
5653
5654 /* Set things up for objcopy and relocatable link. The output
5655 SHT_GROUP section will have its elf_next_in_group pointing back
5656 to the input group members. Ignore linker created group section.
5657 See elfNN_ia64_object_p in elfxx-ia64.c. */
5658
5659 if (need_group)
5660 {
5661 if (elf_sec_group (isec) == NULL
5662 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5663 {
5664 if (elf_section_flags (isec) & SHF_GROUP)
5665 elf_section_flags (osec) |= SHF_GROUP;
5666 elf_next_in_group (osec) = elf_next_in_group (isec);
5667 elf_group_name (osec) = elf_group_name (isec);
5668 }
5669 }
5670
5671 ihdr = &elf_section_data (isec)->this_hdr;
5672
5673 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
5674 don't use the output section of the linked-to section since it
5675 may be NULL at this point. */
5676 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
5677 {
5678 ohdr = &elf_section_data (osec)->this_hdr;
5679 ohdr->sh_flags |= SHF_LINK_ORDER;
5680 elf_linked_to_section (osec) = elf_linked_to_section (isec);
5681 }
5682
5683 osec->use_rela_p = isec->use_rela_p;
5684
5685 return TRUE;
5686}
5687
252b5132
RH
5688/* Copy private section information. This copies over the entsize
5689 field, and sometimes the info field. */
5690
b34976b6 5691bfd_boolean
217aa764
AM
5692_bfd_elf_copy_private_section_data (bfd *ibfd,
5693 asection *isec,
5694 bfd *obfd,
5695 asection *osec)
252b5132
RH
5696{
5697 Elf_Internal_Shdr *ihdr, *ohdr;
5698
5699 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5700 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5701 return TRUE;
252b5132 5702
252b5132
RH
5703 ihdr = &elf_section_data (isec)->this_hdr;
5704 ohdr = &elf_section_data (osec)->this_hdr;
5705
5706 ohdr->sh_entsize = ihdr->sh_entsize;
5707
5708 if (ihdr->sh_type == SHT_SYMTAB
5709 || ihdr->sh_type == SHT_DYNSYM
5710 || ihdr->sh_type == SHT_GNU_verneed
5711 || ihdr->sh_type == SHT_GNU_verdef)
5712 ohdr->sh_info = ihdr->sh_info;
5713
ccd2ec6a
L
5714 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
5715 NULL);
252b5132
RH
5716}
5717
80fccad2
BW
5718/* Copy private header information. */
5719
5720bfd_boolean
5721_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
5722{
5723 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5724 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5725 return TRUE;
5726
5727 /* Copy over private BFD data if it has not already been copied.
5728 This must be done here, rather than in the copy_private_bfd_data
5729 entry point, because the latter is called after the section
5730 contents have been set, which means that the program headers have
5731 already been worked out. */
5732 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
5733 {
5734 if (! copy_private_bfd_data (ibfd, obfd))
5735 return FALSE;
5736 }
5737
5738 return TRUE;
5739}
5740
252b5132
RH
5741/* Copy private symbol information. If this symbol is in a section
5742 which we did not map into a BFD section, try to map the section
5743 index correctly. We use special macro definitions for the mapped
5744 section indices; these definitions are interpreted by the
5745 swap_out_syms function. */
5746
9ad5cbcf
AM
5747#define MAP_ONESYMTAB (SHN_HIOS + 1)
5748#define MAP_DYNSYMTAB (SHN_HIOS + 2)
5749#define MAP_STRTAB (SHN_HIOS + 3)
5750#define MAP_SHSTRTAB (SHN_HIOS + 4)
5751#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 5752
b34976b6 5753bfd_boolean
217aa764
AM
5754_bfd_elf_copy_private_symbol_data (bfd *ibfd,
5755 asymbol *isymarg,
5756 bfd *obfd,
5757 asymbol *osymarg)
252b5132
RH
5758{
5759 elf_symbol_type *isym, *osym;
5760
5761 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5762 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5763 return TRUE;
252b5132
RH
5764
5765 isym = elf_symbol_from (ibfd, isymarg);
5766 osym = elf_symbol_from (obfd, osymarg);
5767
5768 if (isym != NULL
5769 && osym != NULL
5770 && bfd_is_abs_section (isym->symbol.section))
5771 {
5772 unsigned int shndx;
5773
5774 shndx = isym->internal_elf_sym.st_shndx;
5775 if (shndx == elf_onesymtab (ibfd))
5776 shndx = MAP_ONESYMTAB;
5777 else if (shndx == elf_dynsymtab (ibfd))
5778 shndx = MAP_DYNSYMTAB;
5779 else if (shndx == elf_tdata (ibfd)->strtab_section)
5780 shndx = MAP_STRTAB;
5781 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
5782 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
5783 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
5784 shndx = MAP_SYM_SHNDX;
252b5132
RH
5785 osym->internal_elf_sym.st_shndx = shndx;
5786 }
5787
b34976b6 5788 return TRUE;
252b5132
RH
5789}
5790
5791/* Swap out the symbols. */
5792
b34976b6 5793static bfd_boolean
217aa764
AM
5794swap_out_syms (bfd *abfd,
5795 struct bfd_strtab_hash **sttp,
5796 int relocatable_p)
252b5132 5797{
9c5bfbb7 5798 const struct elf_backend_data *bed;
079e9a2f
AM
5799 int symcount;
5800 asymbol **syms;
5801 struct bfd_strtab_hash *stt;
5802 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 5803 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 5804 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
5805 bfd_byte *outbound_syms;
5806 bfd_byte *outbound_shndx;
079e9a2f
AM
5807 int idx;
5808 bfd_size_type amt;
174fd7f9 5809 bfd_boolean name_local_sections;
252b5132
RH
5810
5811 if (!elf_map_symbols (abfd))
b34976b6 5812 return FALSE;
252b5132 5813
c044fabd 5814 /* Dump out the symtabs. */
079e9a2f
AM
5815 stt = _bfd_elf_stringtab_init ();
5816 if (stt == NULL)
b34976b6 5817 return FALSE;
252b5132 5818
079e9a2f
AM
5819 bed = get_elf_backend_data (abfd);
5820 symcount = bfd_get_symcount (abfd);
5821 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5822 symtab_hdr->sh_type = SHT_SYMTAB;
5823 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
5824 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
5825 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 5826 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
5827
5828 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5829 symstrtab_hdr->sh_type = SHT_STRTAB;
5830
d0fb9a8d 5831 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 5832 if (outbound_syms == NULL)
5ed6aba4
NC
5833 {
5834 _bfd_stringtab_free (stt);
5835 return FALSE;
5836 }
217aa764 5837 symtab_hdr->contents = outbound_syms;
252b5132 5838
9ad5cbcf
AM
5839 outbound_shndx = NULL;
5840 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5841 if (symtab_shndx_hdr->sh_name != 0)
5842 {
5843 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
5844 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
5845 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 5846 if (outbound_shndx == NULL)
5ed6aba4
NC
5847 {
5848 _bfd_stringtab_free (stt);
5849 return FALSE;
5850 }
5851
9ad5cbcf
AM
5852 symtab_shndx_hdr->contents = outbound_shndx;
5853 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5854 symtab_shndx_hdr->sh_size = amt;
5855 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5856 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5857 }
5858
589e6347 5859 /* Now generate the data (for "contents"). */
079e9a2f
AM
5860 {
5861 /* Fill in zeroth symbol and swap it out. */
5862 Elf_Internal_Sym sym;
5863 sym.st_name = 0;
5864 sym.st_value = 0;
5865 sym.st_size = 0;
5866 sym.st_info = 0;
5867 sym.st_other = 0;
5868 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 5869 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5870 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5871 if (outbound_shndx != NULL)
5872 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5873 }
252b5132 5874
174fd7f9
RS
5875 name_local_sections
5876 = (bed->elf_backend_name_local_section_symbols
5877 && bed->elf_backend_name_local_section_symbols (abfd));
5878
079e9a2f
AM
5879 syms = bfd_get_outsymbols (abfd);
5880 for (idx = 0; idx < symcount; idx++)
252b5132 5881 {
252b5132 5882 Elf_Internal_Sym sym;
079e9a2f
AM
5883 bfd_vma value = syms[idx]->value;
5884 elf_symbol_type *type_ptr;
5885 flagword flags = syms[idx]->flags;
5886 int type;
252b5132 5887
174fd7f9
RS
5888 if (!name_local_sections
5889 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
5890 {
5891 /* Local section symbols have no name. */
5892 sym.st_name = 0;
5893 }
5894 else
5895 {
5896 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
5897 syms[idx]->name,
b34976b6 5898 TRUE, FALSE);
079e9a2f 5899 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
5900 {
5901 _bfd_stringtab_free (stt);
5902 return FALSE;
5903 }
079e9a2f 5904 }
252b5132 5905
079e9a2f 5906 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 5907
079e9a2f
AM
5908 if ((flags & BSF_SECTION_SYM) == 0
5909 && bfd_is_com_section (syms[idx]->section))
5910 {
5911 /* ELF common symbols put the alignment into the `value' field,
5912 and the size into the `size' field. This is backwards from
5913 how BFD handles it, so reverse it here. */
5914 sym.st_size = value;
5915 if (type_ptr == NULL
5916 || type_ptr->internal_elf_sym.st_value == 0)
5917 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
5918 else
5919 sym.st_value = type_ptr->internal_elf_sym.st_value;
5920 sym.st_shndx = _bfd_elf_section_from_bfd_section
5921 (abfd, syms[idx]->section);
5922 }
5923 else
5924 {
5925 asection *sec = syms[idx]->section;
5926 int shndx;
252b5132 5927
079e9a2f
AM
5928 if (sec->output_section)
5929 {
5930 value += sec->output_offset;
5931 sec = sec->output_section;
5932 }
589e6347 5933
079e9a2f
AM
5934 /* Don't add in the section vma for relocatable output. */
5935 if (! relocatable_p)
5936 value += sec->vma;
5937 sym.st_value = value;
5938 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
5939
5940 if (bfd_is_abs_section (sec)
5941 && type_ptr != NULL
5942 && type_ptr->internal_elf_sym.st_shndx != 0)
5943 {
5944 /* This symbol is in a real ELF section which we did
5945 not create as a BFD section. Undo the mapping done
5946 by copy_private_symbol_data. */
5947 shndx = type_ptr->internal_elf_sym.st_shndx;
5948 switch (shndx)
5949 {
5950 case MAP_ONESYMTAB:
5951 shndx = elf_onesymtab (abfd);
5952 break;
5953 case MAP_DYNSYMTAB:
5954 shndx = elf_dynsymtab (abfd);
5955 break;
5956 case MAP_STRTAB:
5957 shndx = elf_tdata (abfd)->strtab_section;
5958 break;
5959 case MAP_SHSTRTAB:
5960 shndx = elf_tdata (abfd)->shstrtab_section;
5961 break;
9ad5cbcf
AM
5962 case MAP_SYM_SHNDX:
5963 shndx = elf_tdata (abfd)->symtab_shndx_section;
5964 break;
079e9a2f
AM
5965 default:
5966 break;
5967 }
5968 }
5969 else
5970 {
5971 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 5972
079e9a2f
AM
5973 if (shndx == -1)
5974 {
5975 asection *sec2;
5976
5977 /* Writing this would be a hell of a lot easier if
5978 we had some decent documentation on bfd, and
5979 knew what to expect of the library, and what to
5980 demand of applications. For example, it
5981 appears that `objcopy' might not set the
5982 section of a symbol to be a section that is
5983 actually in the output file. */
5984 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
5985 if (sec2 == NULL)
5986 {
5987 _bfd_error_handler (_("\
5988Unable to find equivalent output section for symbol '%s' from section '%s'"),
5989 syms[idx]->name ? syms[idx]->name : "<Local sym>",
5990 sec->name);
811072d8 5991 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 5992 _bfd_stringtab_free (stt);
589e6347
NC
5993 return FALSE;
5994 }
811072d8 5995
079e9a2f
AM
5996 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
5997 BFD_ASSERT (shndx != -1);
5998 }
5999 }
252b5132 6000
079e9a2f
AM
6001 sym.st_shndx = shndx;
6002 }
252b5132 6003
13ae64f3
JJ
6004 if ((flags & BSF_THREAD_LOCAL) != 0)
6005 type = STT_TLS;
6006 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6007 type = STT_FUNC;
6008 else if ((flags & BSF_OBJECT) != 0)
6009 type = STT_OBJECT;
6010 else
6011 type = STT_NOTYPE;
252b5132 6012
13ae64f3
JJ
6013 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6014 type = STT_TLS;
6015
589e6347 6016 /* Processor-specific types. */
079e9a2f
AM
6017 if (type_ptr != NULL
6018 && bed->elf_backend_get_symbol_type)
6019 type = ((*bed->elf_backend_get_symbol_type)
6020 (&type_ptr->internal_elf_sym, type));
252b5132 6021
079e9a2f
AM
6022 if (flags & BSF_SECTION_SYM)
6023 {
6024 if (flags & BSF_GLOBAL)
6025 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6026 else
6027 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6028 }
6029 else if (bfd_is_com_section (syms[idx]->section))
6030 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
6031 else if (bfd_is_und_section (syms[idx]->section))
6032 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6033 ? STB_WEAK
6034 : STB_GLOBAL),
6035 type);
6036 else if (flags & BSF_FILE)
6037 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6038 else
6039 {
6040 int bind = STB_LOCAL;
252b5132 6041
079e9a2f
AM
6042 if (flags & BSF_LOCAL)
6043 bind = STB_LOCAL;
6044 else if (flags & BSF_WEAK)
6045 bind = STB_WEAK;
6046 else if (flags & BSF_GLOBAL)
6047 bind = STB_GLOBAL;
252b5132 6048
079e9a2f
AM
6049 sym.st_info = ELF_ST_INFO (bind, type);
6050 }
252b5132 6051
079e9a2f
AM
6052 if (type_ptr != NULL)
6053 sym.st_other = type_ptr->internal_elf_sym.st_other;
6054 else
6055 sym.st_other = 0;
252b5132 6056
9ad5cbcf 6057 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6058 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6059 if (outbound_shndx != NULL)
6060 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6061 }
252b5132 6062
079e9a2f
AM
6063 *sttp = stt;
6064 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6065 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6066
079e9a2f
AM
6067 symstrtab_hdr->sh_flags = 0;
6068 symstrtab_hdr->sh_addr = 0;
6069 symstrtab_hdr->sh_entsize = 0;
6070 symstrtab_hdr->sh_link = 0;
6071 symstrtab_hdr->sh_info = 0;
6072 symstrtab_hdr->sh_addralign = 1;
252b5132 6073
b34976b6 6074 return TRUE;
252b5132
RH
6075}
6076
6077/* Return the number of bytes required to hold the symtab vector.
6078
6079 Note that we base it on the count plus 1, since we will null terminate
6080 the vector allocated based on this size. However, the ELF symbol table
6081 always has a dummy entry as symbol #0, so it ends up even. */
6082
6083long
217aa764 6084_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6085{
6086 long symcount;
6087 long symtab_size;
6088 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6089
6090 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6091 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6092 if (symcount > 0)
6093 symtab_size -= sizeof (asymbol *);
252b5132
RH
6094
6095 return symtab_size;
6096}
6097
6098long
217aa764 6099_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6100{
6101 long symcount;
6102 long symtab_size;
6103 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6104
6105 if (elf_dynsymtab (abfd) == 0)
6106 {
6107 bfd_set_error (bfd_error_invalid_operation);
6108 return -1;
6109 }
6110
6111 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6112 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6113 if (symcount > 0)
6114 symtab_size -= sizeof (asymbol *);
252b5132
RH
6115
6116 return symtab_size;
6117}
6118
6119long
217aa764
AM
6120_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6121 sec_ptr asect)
252b5132
RH
6122{
6123 return (asect->reloc_count + 1) * sizeof (arelent *);
6124}
6125
6126/* Canonicalize the relocs. */
6127
6128long
217aa764
AM
6129_bfd_elf_canonicalize_reloc (bfd *abfd,
6130 sec_ptr section,
6131 arelent **relptr,
6132 asymbol **symbols)
252b5132
RH
6133{
6134 arelent *tblptr;
6135 unsigned int i;
9c5bfbb7 6136 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6137
b34976b6 6138 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6139 return -1;
6140
6141 tblptr = section->relocation;
6142 for (i = 0; i < section->reloc_count; i++)
6143 *relptr++ = tblptr++;
6144
6145 *relptr = NULL;
6146
6147 return section->reloc_count;
6148}
6149
6150long
6cee3f79 6151_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6152{
9c5bfbb7 6153 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6154 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6155
6156 if (symcount >= 0)
6157 bfd_get_symcount (abfd) = symcount;
6158 return symcount;
6159}
6160
6161long
217aa764
AM
6162_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6163 asymbol **allocation)
252b5132 6164{
9c5bfbb7 6165 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6166 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6167
6168 if (symcount >= 0)
6169 bfd_get_dynamic_symcount (abfd) = symcount;
6170 return symcount;
252b5132
RH
6171}
6172
8615f3f2
AM
6173/* Return the size required for the dynamic reloc entries. Any loadable
6174 section that was actually installed in the BFD, and has type SHT_REL
6175 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6176 dynamic reloc section. */
252b5132
RH
6177
6178long
217aa764 6179_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6180{
6181 long ret;
6182 asection *s;
6183
6184 if (elf_dynsymtab (abfd) == 0)
6185 {
6186 bfd_set_error (bfd_error_invalid_operation);
6187 return -1;
6188 }
6189
6190 ret = sizeof (arelent *);
6191 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6192 if ((s->flags & SEC_LOAD) != 0
6193 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6194 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6195 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6196 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6197 * sizeof (arelent *));
6198
6199 return ret;
6200}
6201
8615f3f2
AM
6202/* Canonicalize the dynamic relocation entries. Note that we return the
6203 dynamic relocations as a single block, although they are actually
6204 associated with particular sections; the interface, which was
6205 designed for SunOS style shared libraries, expects that there is only
6206 one set of dynamic relocs. Any loadable section that was actually
6207 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6208 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6209
6210long
217aa764
AM
6211_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6212 arelent **storage,
6213 asymbol **syms)
252b5132 6214{
217aa764 6215 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6216 asection *s;
6217 long ret;
6218
6219 if (elf_dynsymtab (abfd) == 0)
6220 {
6221 bfd_set_error (bfd_error_invalid_operation);
6222 return -1;
6223 }
6224
6225 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6226 ret = 0;
6227 for (s = abfd->sections; s != NULL; s = s->next)
6228 {
8615f3f2
AM
6229 if ((s->flags & SEC_LOAD) != 0
6230 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6231 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6232 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6233 {
6234 arelent *p;
6235 long count, i;
6236
b34976b6 6237 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6238 return -1;
eea6121a 6239 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6240 p = s->relocation;
6241 for (i = 0; i < count; i++)
6242 *storage++ = p++;
6243 ret += count;
6244 }
6245 }
6246
6247 *storage = NULL;
6248
6249 return ret;
6250}
6251\f
6252/* Read in the version information. */
6253
b34976b6 6254bfd_boolean
fc0e6df6 6255_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6256{
6257 bfd_byte *contents = NULL;
fc0e6df6
PB
6258 unsigned int freeidx = 0;
6259
6260 if (elf_dynverref (abfd) != 0)
6261 {
6262 Elf_Internal_Shdr *hdr;
6263 Elf_External_Verneed *everneed;
6264 Elf_Internal_Verneed *iverneed;
6265 unsigned int i;
d0fb9a8d 6266 bfd_byte *contents_end;
fc0e6df6
PB
6267
6268 hdr = &elf_tdata (abfd)->dynverref_hdr;
6269
d0fb9a8d
JJ
6270 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6271 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6272 if (elf_tdata (abfd)->verref == NULL)
6273 goto error_return;
6274
6275 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6276
6277 contents = bfd_malloc (hdr->sh_size);
6278 if (contents == NULL)
d0fb9a8d
JJ
6279 {
6280error_return_verref:
6281 elf_tdata (abfd)->verref = NULL;
6282 elf_tdata (abfd)->cverrefs = 0;
6283 goto error_return;
6284 }
fc0e6df6
PB
6285 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6286 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6287 goto error_return_verref;
fc0e6df6 6288
d0fb9a8d
JJ
6289 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6290 goto error_return_verref;
6291
6292 BFD_ASSERT (sizeof (Elf_External_Verneed)
6293 == sizeof (Elf_External_Vernaux));
6294 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6295 everneed = (Elf_External_Verneed *) contents;
6296 iverneed = elf_tdata (abfd)->verref;
6297 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6298 {
6299 Elf_External_Vernaux *evernaux;
6300 Elf_Internal_Vernaux *ivernaux;
6301 unsigned int j;
6302
6303 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6304
6305 iverneed->vn_bfd = abfd;
6306
6307 iverneed->vn_filename =
6308 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6309 iverneed->vn_file);
6310 if (iverneed->vn_filename == NULL)
d0fb9a8d 6311 goto error_return_verref;
fc0e6df6 6312
d0fb9a8d
JJ
6313 if (iverneed->vn_cnt == 0)
6314 iverneed->vn_auxptr = NULL;
6315 else
6316 {
6317 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6318 sizeof (Elf_Internal_Vernaux));
6319 if (iverneed->vn_auxptr == NULL)
6320 goto error_return_verref;
6321 }
6322
6323 if (iverneed->vn_aux
6324 > (size_t) (contents_end - (bfd_byte *) everneed))
6325 goto error_return_verref;
fc0e6df6
PB
6326
6327 evernaux = ((Elf_External_Vernaux *)
6328 ((bfd_byte *) everneed + iverneed->vn_aux));
6329 ivernaux = iverneed->vn_auxptr;
6330 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6331 {
6332 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6333
6334 ivernaux->vna_nodename =
6335 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6336 ivernaux->vna_name);
6337 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6338 goto error_return_verref;
fc0e6df6
PB
6339
6340 if (j + 1 < iverneed->vn_cnt)
6341 ivernaux->vna_nextptr = ivernaux + 1;
6342 else
6343 ivernaux->vna_nextptr = NULL;
6344
d0fb9a8d
JJ
6345 if (ivernaux->vna_next
6346 > (size_t) (contents_end - (bfd_byte *) evernaux))
6347 goto error_return_verref;
6348
fc0e6df6
PB
6349 evernaux = ((Elf_External_Vernaux *)
6350 ((bfd_byte *) evernaux + ivernaux->vna_next));
6351
6352 if (ivernaux->vna_other > freeidx)
6353 freeidx = ivernaux->vna_other;
6354 }
6355
6356 if (i + 1 < hdr->sh_info)
6357 iverneed->vn_nextref = iverneed + 1;
6358 else
6359 iverneed->vn_nextref = NULL;
6360
d0fb9a8d
JJ
6361 if (iverneed->vn_next
6362 > (size_t) (contents_end - (bfd_byte *) everneed))
6363 goto error_return_verref;
6364
fc0e6df6
PB
6365 everneed = ((Elf_External_Verneed *)
6366 ((bfd_byte *) everneed + iverneed->vn_next));
6367 }
6368
6369 free (contents);
6370 contents = NULL;
6371 }
252b5132
RH
6372
6373 if (elf_dynverdef (abfd) != 0)
6374 {
6375 Elf_Internal_Shdr *hdr;
6376 Elf_External_Verdef *everdef;
6377 Elf_Internal_Verdef *iverdef;
f631889e
UD
6378 Elf_Internal_Verdef *iverdefarr;
6379 Elf_Internal_Verdef iverdefmem;
252b5132 6380 unsigned int i;
062e2358 6381 unsigned int maxidx;
d0fb9a8d 6382 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6383
6384 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6385
217aa764 6386 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6387 if (contents == NULL)
6388 goto error_return;
6389 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6390 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6391 goto error_return;
6392
d0fb9a8d
JJ
6393 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6394 goto error_return;
6395
6396 BFD_ASSERT (sizeof (Elf_External_Verdef)
6397 >= sizeof (Elf_External_Verdaux));
6398 contents_end_def = contents + hdr->sh_size
6399 - sizeof (Elf_External_Verdef);
6400 contents_end_aux = contents + hdr->sh_size
6401 - sizeof (Elf_External_Verdaux);
6402
f631889e
UD
6403 /* We know the number of entries in the section but not the maximum
6404 index. Therefore we have to run through all entries and find
6405 the maximum. */
252b5132 6406 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6407 maxidx = 0;
6408 for (i = 0; i < hdr->sh_info; ++i)
6409 {
6410 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6411
062e2358
AM
6412 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6413 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6414
d0fb9a8d
JJ
6415 if (iverdefmem.vd_next
6416 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6417 goto error_return;
6418
f631889e
UD
6419 everdef = ((Elf_External_Verdef *)
6420 ((bfd_byte *) everdef + iverdefmem.vd_next));
6421 }
6422
fc0e6df6
PB
6423 if (default_imported_symver)
6424 {
6425 if (freeidx > maxidx)
6426 maxidx = ++freeidx;
6427 else
6428 freeidx = ++maxidx;
6429 }
d0fb9a8d
JJ
6430 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6431 sizeof (Elf_Internal_Verdef));
f631889e
UD
6432 if (elf_tdata (abfd)->verdef == NULL)
6433 goto error_return;
6434
6435 elf_tdata (abfd)->cverdefs = maxidx;
6436
6437 everdef = (Elf_External_Verdef *) contents;
6438 iverdefarr = elf_tdata (abfd)->verdef;
6439 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6440 {
6441 Elf_External_Verdaux *everdaux;
6442 Elf_Internal_Verdaux *iverdaux;
6443 unsigned int j;
6444
f631889e
UD
6445 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6446
d0fb9a8d
JJ
6447 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6448 {
6449error_return_verdef:
6450 elf_tdata (abfd)->verdef = NULL;
6451 elf_tdata (abfd)->cverdefs = 0;
6452 goto error_return;
6453 }
6454
f631889e
UD
6455 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6456 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6457
6458 iverdef->vd_bfd = abfd;
6459
d0fb9a8d
JJ
6460 if (iverdef->vd_cnt == 0)
6461 iverdef->vd_auxptr = NULL;
6462 else
6463 {
6464 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6465 sizeof (Elf_Internal_Verdaux));
6466 if (iverdef->vd_auxptr == NULL)
6467 goto error_return_verdef;
6468 }
6469
6470 if (iverdef->vd_aux
6471 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6472 goto error_return_verdef;
252b5132
RH
6473
6474 everdaux = ((Elf_External_Verdaux *)
6475 ((bfd_byte *) everdef + iverdef->vd_aux));
6476 iverdaux = iverdef->vd_auxptr;
6477 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6478 {
6479 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6480
6481 iverdaux->vda_nodename =
6482 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6483 iverdaux->vda_name);
6484 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6485 goto error_return_verdef;
252b5132
RH
6486
6487 if (j + 1 < iverdef->vd_cnt)
6488 iverdaux->vda_nextptr = iverdaux + 1;
6489 else
6490 iverdaux->vda_nextptr = NULL;
6491
d0fb9a8d
JJ
6492 if (iverdaux->vda_next
6493 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6494 goto error_return_verdef;
6495
252b5132
RH
6496 everdaux = ((Elf_External_Verdaux *)
6497 ((bfd_byte *) everdaux + iverdaux->vda_next));
6498 }
6499
d0fb9a8d
JJ
6500 if (iverdef->vd_cnt)
6501 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6502
d0fb9a8d 6503 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6504 iverdef->vd_nextdef = iverdef + 1;
6505 else
6506 iverdef->vd_nextdef = NULL;
6507
6508 everdef = ((Elf_External_Verdef *)
6509 ((bfd_byte *) everdef + iverdef->vd_next));
6510 }
6511
6512 free (contents);
6513 contents = NULL;
6514 }
fc0e6df6 6515 else if (default_imported_symver)
252b5132 6516 {
fc0e6df6
PB
6517 if (freeidx < 3)
6518 freeidx = 3;
6519 else
6520 freeidx++;
252b5132 6521
d0fb9a8d
JJ
6522 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6523 sizeof (Elf_Internal_Verdef));
fc0e6df6 6524 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6525 goto error_return;
6526
fc0e6df6
PB
6527 elf_tdata (abfd)->cverdefs = freeidx;
6528 }
252b5132 6529
fc0e6df6
PB
6530 /* Create a default version based on the soname. */
6531 if (default_imported_symver)
6532 {
6533 Elf_Internal_Verdef *iverdef;
6534 Elf_Internal_Verdaux *iverdaux;
252b5132 6535
fc0e6df6 6536 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6537
fc0e6df6
PB
6538 iverdef->vd_version = VER_DEF_CURRENT;
6539 iverdef->vd_flags = 0;
6540 iverdef->vd_ndx = freeidx;
6541 iverdef->vd_cnt = 1;
252b5132 6542
fc0e6df6 6543 iverdef->vd_bfd = abfd;
252b5132 6544
fc0e6df6
PB
6545 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6546 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6547 goto error_return_verdef;
fc0e6df6 6548 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6549 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6550 if (iverdef->vd_auxptr == NULL)
6551 goto error_return_verdef;
252b5132 6552
fc0e6df6
PB
6553 iverdaux = iverdef->vd_auxptr;
6554 iverdaux->vda_nodename = iverdef->vd_nodename;
6555 iverdaux->vda_nextptr = NULL;
252b5132
RH
6556 }
6557
b34976b6 6558 return TRUE;
252b5132
RH
6559
6560 error_return:
5ed6aba4 6561 if (contents != NULL)
252b5132 6562 free (contents);
b34976b6 6563 return FALSE;
252b5132
RH
6564}
6565\f
6566asymbol *
217aa764 6567_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6568{
6569 elf_symbol_type *newsym;
dc810e39 6570 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6571
217aa764 6572 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6573 if (!newsym)
6574 return NULL;
6575 else
6576 {
6577 newsym->symbol.the_bfd = abfd;
6578 return &newsym->symbol;
6579 }
6580}
6581
6582void
217aa764
AM
6583_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6584 asymbol *symbol,
6585 symbol_info *ret)
252b5132
RH
6586{
6587 bfd_symbol_info (symbol, ret);
6588}
6589
6590/* Return whether a symbol name implies a local symbol. Most targets
6591 use this function for the is_local_label_name entry point, but some
6592 override it. */
6593
b34976b6 6594bfd_boolean
217aa764
AM
6595_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6596 const char *name)
252b5132
RH
6597{
6598 /* Normal local symbols start with ``.L''. */
6599 if (name[0] == '.' && name[1] == 'L')
b34976b6 6600 return TRUE;
252b5132
RH
6601
6602 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6603 DWARF debugging symbols starting with ``..''. */
6604 if (name[0] == '.' && name[1] == '.')
b34976b6 6605 return TRUE;
252b5132
RH
6606
6607 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6608 emitting DWARF debugging output. I suspect this is actually a
6609 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6610 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6611 underscore to be emitted on some ELF targets). For ease of use,
6612 we treat such symbols as local. */
6613 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6614 return TRUE;
252b5132 6615
b34976b6 6616 return FALSE;
252b5132
RH
6617}
6618
6619alent *
217aa764
AM
6620_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6621 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6622{
6623 abort ();
6624 return NULL;
6625}
6626
b34976b6 6627bfd_boolean
217aa764
AM
6628_bfd_elf_set_arch_mach (bfd *abfd,
6629 enum bfd_architecture arch,
6630 unsigned long machine)
252b5132
RH
6631{
6632 /* If this isn't the right architecture for this backend, and this
6633 isn't the generic backend, fail. */
6634 if (arch != get_elf_backend_data (abfd)->arch
6635 && arch != bfd_arch_unknown
6636 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6637 return FALSE;
252b5132
RH
6638
6639 return bfd_default_set_arch_mach (abfd, arch, machine);
6640}
6641
d1fad7c6
NC
6642/* Find the function to a particular section and offset,
6643 for error reporting. */
252b5132 6644
b34976b6 6645static bfd_boolean
217aa764
AM
6646elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6647 asection *section,
6648 asymbol **symbols,
6649 bfd_vma offset,
6650 const char **filename_ptr,
6651 const char **functionname_ptr)
252b5132 6652{
252b5132 6653 const char *filename;
57426232 6654 asymbol *func, *file;
252b5132
RH
6655 bfd_vma low_func;
6656 asymbol **p;
57426232
JB
6657 /* ??? Given multiple file symbols, it is impossible to reliably
6658 choose the right file name for global symbols. File symbols are
6659 local symbols, and thus all file symbols must sort before any
6660 global symbols. The ELF spec may be interpreted to say that a
6661 file symbol must sort before other local symbols, but currently
6662 ld -r doesn't do this. So, for ld -r output, it is possible to
6663 make a better choice of file name for local symbols by ignoring
6664 file symbols appearing after a given local symbol. */
6665 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6666
252b5132
RH
6667 filename = NULL;
6668 func = NULL;
57426232 6669 file = NULL;
252b5132 6670 low_func = 0;
57426232 6671 state = nothing_seen;
252b5132
RH
6672
6673 for (p = symbols; *p != NULL; p++)
6674 {
6675 elf_symbol_type *q;
6676
6677 q = (elf_symbol_type *) *p;
6678
252b5132
RH
6679 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6680 {
6681 default:
6682 break;
6683 case STT_FILE:
57426232
JB
6684 file = &q->symbol;
6685 if (state == symbol_seen)
6686 state = file_after_symbol_seen;
6687 continue;
6688 case STT_SECTION:
6689 continue;
252b5132
RH
6690 case STT_NOTYPE:
6691 case STT_FUNC:
6b40fcba 6692 if (bfd_get_section (&q->symbol) == section
252b5132
RH
6693 && q->symbol.value >= low_func
6694 && q->symbol.value <= offset)
6695 {
6696 func = (asymbol *) q;
6697 low_func = q->symbol.value;
57426232
JB
6698 if (file == NULL)
6699 filename = NULL;
6700 else if (ELF_ST_BIND (q->internal_elf_sym.st_info) != STB_LOCAL
6701 && state == file_after_symbol_seen)
6702 filename = NULL;
6703 else
6704 filename = bfd_asymbol_name (file);
252b5132
RH
6705 }
6706 break;
6707 }
57426232
JB
6708 if (state == nothing_seen)
6709 state = symbol_seen;
252b5132
RH
6710 }
6711
6712 if (func == NULL)
b34976b6 6713 return FALSE;
252b5132 6714
d1fad7c6
NC
6715 if (filename_ptr)
6716 *filename_ptr = filename;
6717 if (functionname_ptr)
6718 *functionname_ptr = bfd_asymbol_name (func);
6719
b34976b6 6720 return TRUE;
d1fad7c6
NC
6721}
6722
6723/* Find the nearest line to a particular section and offset,
6724 for error reporting. */
6725
b34976b6 6726bfd_boolean
217aa764
AM
6727_bfd_elf_find_nearest_line (bfd *abfd,
6728 asection *section,
6729 asymbol **symbols,
6730 bfd_vma offset,
6731 const char **filename_ptr,
6732 const char **functionname_ptr,
6733 unsigned int *line_ptr)
d1fad7c6 6734{
b34976b6 6735 bfd_boolean found;
d1fad7c6
NC
6736
6737 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6738 filename_ptr, functionname_ptr,
6739 line_ptr))
d1fad7c6
NC
6740 {
6741 if (!*functionname_ptr)
4e8a9624
AM
6742 elf_find_function (abfd, section, symbols, offset,
6743 *filename_ptr ? NULL : filename_ptr,
6744 functionname_ptr);
6745
b34976b6 6746 return TRUE;
d1fad7c6
NC
6747 }
6748
6749 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6750 filename_ptr, functionname_ptr,
6751 line_ptr, 0,
6752 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
6753 {
6754 if (!*functionname_ptr)
4e8a9624
AM
6755 elf_find_function (abfd, section, symbols, offset,
6756 *filename_ptr ? NULL : filename_ptr,
6757 functionname_ptr);
6758
b34976b6 6759 return TRUE;
d1fad7c6
NC
6760 }
6761
6762 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
6763 &found, filename_ptr,
6764 functionname_ptr, line_ptr,
6765 &elf_tdata (abfd)->line_info))
b34976b6 6766 return FALSE;
dc43ada5 6767 if (found && (*functionname_ptr || *line_ptr))
b34976b6 6768 return TRUE;
d1fad7c6
NC
6769
6770 if (symbols == NULL)
b34976b6 6771 return FALSE;
d1fad7c6
NC
6772
6773 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 6774 filename_ptr, functionname_ptr))
b34976b6 6775 return FALSE;
d1fad7c6 6776
252b5132 6777 *line_ptr = 0;
b34976b6 6778 return TRUE;
252b5132
RH
6779}
6780
5420f73d
L
6781/* Find the line for a symbol. */
6782
6783bfd_boolean
6784_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
6785 const char **filename_ptr, unsigned int *line_ptr)
6786{
6787 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
6788 filename_ptr, line_ptr, 0,
6789 &elf_tdata (abfd)->dwarf2_find_line_info);
6790}
6791
4ab527b0
FF
6792/* After a call to bfd_find_nearest_line, successive calls to
6793 bfd_find_inliner_info can be used to get source information about
6794 each level of function inlining that terminated at the address
6795 passed to bfd_find_nearest_line. Currently this is only supported
6796 for DWARF2 with appropriate DWARF3 extensions. */
6797
6798bfd_boolean
6799_bfd_elf_find_inliner_info (bfd *abfd,
6800 const char **filename_ptr,
6801 const char **functionname_ptr,
6802 unsigned int *line_ptr)
6803{
6804 bfd_boolean found;
6805 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
6806 functionname_ptr, line_ptr,
6807 & elf_tdata (abfd)->dwarf2_find_line_info);
6808 return found;
6809}
6810
252b5132 6811int
217aa764 6812_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
6813{
6814 int ret;
6815
6816 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
6817 if (! reloc)
6818 ret += get_program_header_size (abfd);
6819 return ret;
6820}
6821
b34976b6 6822bfd_boolean
217aa764
AM
6823_bfd_elf_set_section_contents (bfd *abfd,
6824 sec_ptr section,
0f867abe 6825 const void *location,
217aa764
AM
6826 file_ptr offset,
6827 bfd_size_type count)
252b5132
RH
6828{
6829 Elf_Internal_Shdr *hdr;
dc810e39 6830 bfd_signed_vma pos;
252b5132
RH
6831
6832 if (! abfd->output_has_begun
217aa764 6833 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6834 return FALSE;
252b5132
RH
6835
6836 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
6837 pos = hdr->sh_offset + offset;
6838 if (bfd_seek (abfd, pos, SEEK_SET) != 0
6839 || bfd_bwrite (location, count, abfd) != count)
b34976b6 6840 return FALSE;
252b5132 6841
b34976b6 6842 return TRUE;
252b5132
RH
6843}
6844
6845void
217aa764
AM
6846_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
6847 arelent *cache_ptr ATTRIBUTE_UNUSED,
6848 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
6849{
6850 abort ();
6851}
6852
252b5132
RH
6853/* Try to convert a non-ELF reloc into an ELF one. */
6854
b34976b6 6855bfd_boolean
217aa764 6856_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 6857{
c044fabd 6858 /* Check whether we really have an ELF howto. */
252b5132
RH
6859
6860 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
6861 {
6862 bfd_reloc_code_real_type code;
6863 reloc_howto_type *howto;
6864
6865 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 6866 equivalent ELF reloc. */
252b5132
RH
6867
6868 if (areloc->howto->pc_relative)
6869 {
6870 switch (areloc->howto->bitsize)
6871 {
6872 case 8:
6873 code = BFD_RELOC_8_PCREL;
6874 break;
6875 case 12:
6876 code = BFD_RELOC_12_PCREL;
6877 break;
6878 case 16:
6879 code = BFD_RELOC_16_PCREL;
6880 break;
6881 case 24:
6882 code = BFD_RELOC_24_PCREL;
6883 break;
6884 case 32:
6885 code = BFD_RELOC_32_PCREL;
6886 break;
6887 case 64:
6888 code = BFD_RELOC_64_PCREL;
6889 break;
6890 default:
6891 goto fail;
6892 }
6893
6894 howto = bfd_reloc_type_lookup (abfd, code);
6895
6896 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
6897 {
6898 if (howto->pcrel_offset)
6899 areloc->addend += areloc->address;
6900 else
6901 areloc->addend -= areloc->address; /* addend is unsigned!! */
6902 }
6903 }
6904 else
6905 {
6906 switch (areloc->howto->bitsize)
6907 {
6908 case 8:
6909 code = BFD_RELOC_8;
6910 break;
6911 case 14:
6912 code = BFD_RELOC_14;
6913 break;
6914 case 16:
6915 code = BFD_RELOC_16;
6916 break;
6917 case 26:
6918 code = BFD_RELOC_26;
6919 break;
6920 case 32:
6921 code = BFD_RELOC_32;
6922 break;
6923 case 64:
6924 code = BFD_RELOC_64;
6925 break;
6926 default:
6927 goto fail;
6928 }
6929
6930 howto = bfd_reloc_type_lookup (abfd, code);
6931 }
6932
6933 if (howto)
6934 areloc->howto = howto;
6935 else
6936 goto fail;
6937 }
6938
b34976b6 6939 return TRUE;
252b5132
RH
6940
6941 fail:
6942 (*_bfd_error_handler)
d003868e
AM
6943 (_("%B: unsupported relocation type %s"),
6944 abfd, areloc->howto->name);
252b5132 6945 bfd_set_error (bfd_error_bad_value);
b34976b6 6946 return FALSE;
252b5132
RH
6947}
6948
b34976b6 6949bfd_boolean
217aa764 6950_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
6951{
6952 if (bfd_get_format (abfd) == bfd_object)
6953 {
6954 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 6955 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 6956 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
6957 }
6958
6959 return _bfd_generic_close_and_cleanup (abfd);
6960}
6961
6962/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
6963 in the relocation's offset. Thus we cannot allow any sort of sanity
6964 range-checking to interfere. There is nothing else to do in processing
6965 this reloc. */
6966
6967bfd_reloc_status_type
217aa764
AM
6968_bfd_elf_rel_vtable_reloc_fn
6969 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 6970 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
6971 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
6972 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
6973{
6974 return bfd_reloc_ok;
6975}
252b5132
RH
6976\f
6977/* Elf core file support. Much of this only works on native
6978 toolchains, since we rely on knowing the
6979 machine-dependent procfs structure in order to pick
c044fabd 6980 out details about the corefile. */
252b5132
RH
6981
6982#ifdef HAVE_SYS_PROCFS_H
6983# include <sys/procfs.h>
6984#endif
6985
c044fabd 6986/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
6987
6988static int
217aa764 6989elfcore_make_pid (bfd *abfd)
252b5132
RH
6990{
6991 return ((elf_tdata (abfd)->core_lwpid << 16)
6992 + (elf_tdata (abfd)->core_pid));
6993}
6994
252b5132
RH
6995/* If there isn't a section called NAME, make one, using
6996 data from SECT. Note, this function will generate a
6997 reference to NAME, so you shouldn't deallocate or
c044fabd 6998 overwrite it. */
252b5132 6999
b34976b6 7000static bfd_boolean
217aa764 7001elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7002{
c044fabd 7003 asection *sect2;
252b5132
RH
7004
7005 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7006 return TRUE;
252b5132
RH
7007
7008 sect2 = bfd_make_section (abfd, name);
7009 if (sect2 == NULL)
b34976b6 7010 return FALSE;
252b5132 7011
eea6121a 7012 sect2->size = sect->size;
252b5132
RH
7013 sect2->filepos = sect->filepos;
7014 sect2->flags = sect->flags;
7015 sect2->alignment_power = sect->alignment_power;
b34976b6 7016 return TRUE;
252b5132
RH
7017}
7018
bb0082d6
AM
7019/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7020 actually creates up to two pseudosections:
7021 - For the single-threaded case, a section named NAME, unless
7022 such a section already exists.
7023 - For the multi-threaded case, a section named "NAME/PID", where
7024 PID is elfcore_make_pid (abfd).
7025 Both pseudosections have identical contents. */
b34976b6 7026bfd_boolean
217aa764
AM
7027_bfd_elfcore_make_pseudosection (bfd *abfd,
7028 char *name,
7029 size_t size,
7030 ufile_ptr filepos)
bb0082d6
AM
7031{
7032 char buf[100];
7033 char *threaded_name;
d4c88bbb 7034 size_t len;
bb0082d6
AM
7035 asection *sect;
7036
7037 /* Build the section name. */
7038
7039 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7040 len = strlen (buf) + 1;
217aa764 7041 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7042 if (threaded_name == NULL)
b34976b6 7043 return FALSE;
d4c88bbb 7044 memcpy (threaded_name, buf, len);
bb0082d6 7045
62f3bb11 7046 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 7047 if (sect == NULL)
b34976b6 7048 return FALSE;
eea6121a 7049 sect->size = size;
bb0082d6
AM
7050 sect->filepos = filepos;
7051 sect->flags = SEC_HAS_CONTENTS;
7052 sect->alignment_power = 2;
7053
936e320b 7054 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7055}
7056
252b5132 7057/* prstatus_t exists on:
4a938328 7058 solaris 2.5+
252b5132
RH
7059 linux 2.[01] + glibc
7060 unixware 4.2
7061*/
7062
7063#if defined (HAVE_PRSTATUS_T)
a7b97311 7064
b34976b6 7065static bfd_boolean
217aa764 7066elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7067{
eea6121a 7068 size_t size;
7ee38065 7069 int offset;
252b5132 7070
4a938328
MS
7071 if (note->descsz == sizeof (prstatus_t))
7072 {
7073 prstatus_t prstat;
252b5132 7074
eea6121a 7075 size = sizeof (prstat.pr_reg);
7ee38065 7076 offset = offsetof (prstatus_t, pr_reg);
4a938328 7077 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7078
fa49d224
NC
7079 /* Do not overwrite the core signal if it
7080 has already been set by another thread. */
7081 if (elf_tdata (abfd)->core_signal == 0)
7082 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7083 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7084
4a938328
MS
7085 /* pr_who exists on:
7086 solaris 2.5+
7087 unixware 4.2
7088 pr_who doesn't exist on:
7089 linux 2.[01]
7090 */
252b5132 7091#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7092 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7093#endif
4a938328 7094 }
7ee38065 7095#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7096 else if (note->descsz == sizeof (prstatus32_t))
7097 {
7098 /* 64-bit host, 32-bit corefile */
7099 prstatus32_t prstat;
7100
eea6121a 7101 size = sizeof (prstat.pr_reg);
7ee38065 7102 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7103 memcpy (&prstat, note->descdata, sizeof (prstat));
7104
fa49d224
NC
7105 /* Do not overwrite the core signal if it
7106 has already been set by another thread. */
7107 if (elf_tdata (abfd)->core_signal == 0)
7108 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7109 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7110
7111 /* pr_who exists on:
7112 solaris 2.5+
7113 unixware 4.2
7114 pr_who doesn't exist on:
7115 linux 2.[01]
7116 */
7ee38065 7117#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7118 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7119#endif
7120 }
7ee38065 7121#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7122 else
7123 {
7124 /* Fail - we don't know how to handle any other
7125 note size (ie. data object type). */
b34976b6 7126 return TRUE;
4a938328 7127 }
252b5132 7128
bb0082d6 7129 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7130 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7131 size, note->descpos + offset);
252b5132
RH
7132}
7133#endif /* defined (HAVE_PRSTATUS_T) */
7134
bb0082d6 7135/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7136static bfd_boolean
217aa764
AM
7137elfcore_make_note_pseudosection (bfd *abfd,
7138 char *name,
7139 Elf_Internal_Note *note)
252b5132 7140{
936e320b
AM
7141 return _bfd_elfcore_make_pseudosection (abfd, name,
7142 note->descsz, note->descpos);
252b5132
RH
7143}
7144
ff08c6bb
JB
7145/* There isn't a consistent prfpregset_t across platforms,
7146 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7147 data structure apart. */
7148
b34976b6 7149static bfd_boolean
217aa764 7150elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7151{
7152 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7153}
7154
ff08c6bb
JB
7155/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7156 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7157 literally. */
c044fabd 7158
b34976b6 7159static bfd_boolean
217aa764 7160elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7161{
7162 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7163}
7164
252b5132 7165#if defined (HAVE_PRPSINFO_T)
4a938328 7166typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7167#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7168typedef prpsinfo32_t elfcore_psinfo32_t;
7169#endif
252b5132
RH
7170#endif
7171
7172#if defined (HAVE_PSINFO_T)
4a938328 7173typedef psinfo_t elfcore_psinfo_t;
7ee38065 7174#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7175typedef psinfo32_t elfcore_psinfo32_t;
7176#endif
252b5132
RH
7177#endif
7178
252b5132
RH
7179/* return a malloc'ed copy of a string at START which is at
7180 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7181 the copy will always have a terminating '\0'. */
252b5132 7182
936e320b 7183char *
217aa764 7184_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7185{
dc810e39 7186 char *dups;
c044fabd 7187 char *end = memchr (start, '\0', max);
dc810e39 7188 size_t len;
252b5132
RH
7189
7190 if (end == NULL)
7191 len = max;
7192 else
7193 len = end - start;
7194
217aa764 7195 dups = bfd_alloc (abfd, len + 1);
dc810e39 7196 if (dups == NULL)
252b5132
RH
7197 return NULL;
7198
dc810e39
AM
7199 memcpy (dups, start, len);
7200 dups[len] = '\0';
252b5132 7201
dc810e39 7202 return dups;
252b5132
RH
7203}
7204
bb0082d6 7205#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7206static bfd_boolean
217aa764 7207elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7208{
4a938328
MS
7209 if (note->descsz == sizeof (elfcore_psinfo_t))
7210 {
7211 elfcore_psinfo_t psinfo;
252b5132 7212
7ee38065 7213 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7214
4a938328 7215 elf_tdata (abfd)->core_program
936e320b
AM
7216 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7217 sizeof (psinfo.pr_fname));
252b5132 7218
4a938328 7219 elf_tdata (abfd)->core_command
936e320b
AM
7220 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7221 sizeof (psinfo.pr_psargs));
4a938328 7222 }
7ee38065 7223#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7224 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7225 {
7226 /* 64-bit host, 32-bit corefile */
7227 elfcore_psinfo32_t psinfo;
7228
7ee38065 7229 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7230
4a938328 7231 elf_tdata (abfd)->core_program
936e320b
AM
7232 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7233 sizeof (psinfo.pr_fname));
4a938328
MS
7234
7235 elf_tdata (abfd)->core_command
936e320b
AM
7236 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7237 sizeof (psinfo.pr_psargs));
4a938328
MS
7238 }
7239#endif
7240
7241 else
7242 {
7243 /* Fail - we don't know how to handle any other
7244 note size (ie. data object type). */
b34976b6 7245 return TRUE;
4a938328 7246 }
252b5132
RH
7247
7248 /* Note that for some reason, a spurious space is tacked
7249 onto the end of the args in some (at least one anyway)
c044fabd 7250 implementations, so strip it off if it exists. */
252b5132
RH
7251
7252 {
c044fabd 7253 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7254 int n = strlen (command);
7255
7256 if (0 < n && command[n - 1] == ' ')
7257 command[n - 1] = '\0';
7258 }
7259
b34976b6 7260 return TRUE;
252b5132
RH
7261}
7262#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7263
252b5132 7264#if defined (HAVE_PSTATUS_T)
b34976b6 7265static bfd_boolean
217aa764 7266elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7267{
f572a39d
AM
7268 if (note->descsz == sizeof (pstatus_t)
7269#if defined (HAVE_PXSTATUS_T)
7270 || note->descsz == sizeof (pxstatus_t)
7271#endif
7272 )
4a938328
MS
7273 {
7274 pstatus_t pstat;
252b5132 7275
4a938328 7276 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7277
4a938328
MS
7278 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7279 }
7ee38065 7280#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7281 else if (note->descsz == sizeof (pstatus32_t))
7282 {
7283 /* 64-bit host, 32-bit corefile */
7284 pstatus32_t pstat;
252b5132 7285
4a938328 7286 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7287
4a938328
MS
7288 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7289 }
7290#endif
252b5132
RH
7291 /* Could grab some more details from the "representative"
7292 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7293 NT_LWPSTATUS note, presumably. */
252b5132 7294
b34976b6 7295 return TRUE;
252b5132
RH
7296}
7297#endif /* defined (HAVE_PSTATUS_T) */
7298
252b5132 7299#if defined (HAVE_LWPSTATUS_T)
b34976b6 7300static bfd_boolean
217aa764 7301elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7302{
7303 lwpstatus_t lwpstat;
7304 char buf[100];
c044fabd 7305 char *name;
d4c88bbb 7306 size_t len;
c044fabd 7307 asection *sect;
252b5132 7308
f572a39d
AM
7309 if (note->descsz != sizeof (lwpstat)
7310#if defined (HAVE_LWPXSTATUS_T)
7311 && note->descsz != sizeof (lwpxstatus_t)
7312#endif
7313 )
b34976b6 7314 return TRUE;
252b5132
RH
7315
7316 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7317
7318 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7319 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7320
c044fabd 7321 /* Make a ".reg/999" section. */
252b5132
RH
7322
7323 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7324 len = strlen (buf) + 1;
217aa764 7325 name = bfd_alloc (abfd, len);
252b5132 7326 if (name == NULL)
b34976b6 7327 return FALSE;
d4c88bbb 7328 memcpy (name, buf, len);
252b5132 7329
62f3bb11 7330 sect = bfd_make_section_anyway (abfd, name);
252b5132 7331 if (sect == NULL)
b34976b6 7332 return FALSE;
252b5132
RH
7333
7334#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7335 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7336 sect->filepos = note->descpos
7337 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7338#endif
7339
7340#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7341 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7342 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7343#endif
7344
7345 sect->flags = SEC_HAS_CONTENTS;
7346 sect->alignment_power = 2;
7347
7348 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7349 return FALSE;
252b5132
RH
7350
7351 /* Make a ".reg2/999" section */
7352
7353 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7354 len = strlen (buf) + 1;
217aa764 7355 name = bfd_alloc (abfd, len);
252b5132 7356 if (name == NULL)
b34976b6 7357 return FALSE;
d4c88bbb 7358 memcpy (name, buf, len);
252b5132 7359
62f3bb11 7360 sect = bfd_make_section_anyway (abfd, name);
252b5132 7361 if (sect == NULL)
b34976b6 7362 return FALSE;
252b5132
RH
7363
7364#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7365 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7366 sect->filepos = note->descpos
7367 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7368#endif
7369
7370#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7371 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7372 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7373#endif
7374
7375 sect->flags = SEC_HAS_CONTENTS;
7376 sect->alignment_power = 2;
7377
936e320b 7378 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7379}
7380#endif /* defined (HAVE_LWPSTATUS_T) */
7381
16e9c715 7382#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7383static bfd_boolean
217aa764 7384elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7385{
7386 char buf[30];
c044fabd 7387 char *name;
d4c88bbb 7388 size_t len;
c044fabd 7389 asection *sect;
16e9c715
NC
7390 win32_pstatus_t pstatus;
7391
7392 if (note->descsz < sizeof (pstatus))
b34976b6 7393 return TRUE;
16e9c715 7394
e8eab623 7395 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7396
7397 switch (pstatus.data_type)
16e9c715
NC
7398 {
7399 case NOTE_INFO_PROCESS:
7400 /* FIXME: need to add ->core_command. */
7401 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7402 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7403 break;
16e9c715
NC
7404
7405 case NOTE_INFO_THREAD:
7406 /* Make a ".reg/999" section. */
1f170678 7407 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7408
d4c88bbb 7409 len = strlen (buf) + 1;
217aa764 7410 name = bfd_alloc (abfd, len);
16e9c715 7411 if (name == NULL)
b34976b6 7412 return FALSE;
c044fabd 7413
d4c88bbb 7414 memcpy (name, buf, len);
16e9c715 7415
62f3bb11 7416 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7417 if (sect == NULL)
b34976b6 7418 return FALSE;
c044fabd 7419
eea6121a 7420 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7421 sect->filepos = (note->descpos
7422 + offsetof (struct win32_pstatus,
7423 data.thread_info.thread_context));
16e9c715
NC
7424 sect->flags = SEC_HAS_CONTENTS;
7425 sect->alignment_power = 2;
7426
7427 if (pstatus.data.thread_info.is_active_thread)
7428 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7429 return FALSE;
16e9c715
NC
7430 break;
7431
7432 case NOTE_INFO_MODULE:
7433 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7434 sprintf (buf, ".module/%08lx",
7435 (long) pstatus.data.module_info.base_address);
c044fabd 7436
d4c88bbb 7437 len = strlen (buf) + 1;
217aa764 7438 name = bfd_alloc (abfd, len);
16e9c715 7439 if (name == NULL)
b34976b6 7440 return FALSE;
c044fabd 7441
d4c88bbb 7442 memcpy (name, buf, len);
252b5132 7443
62f3bb11 7444 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7445
16e9c715 7446 if (sect == NULL)
b34976b6 7447 return FALSE;
c044fabd 7448
eea6121a 7449 sect->size = note->descsz;
16e9c715
NC
7450 sect->filepos = note->descpos;
7451 sect->flags = SEC_HAS_CONTENTS;
7452 sect->alignment_power = 2;
7453 break;
7454
7455 default:
b34976b6 7456 return TRUE;
16e9c715
NC
7457 }
7458
b34976b6 7459 return TRUE;
16e9c715
NC
7460}
7461#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7462
b34976b6 7463static bfd_boolean
217aa764 7464elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7465{
9c5bfbb7 7466 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7467
252b5132
RH
7468 switch (note->type)
7469 {
7470 default:
b34976b6 7471 return TRUE;
252b5132 7472
252b5132 7473 case NT_PRSTATUS:
bb0082d6
AM
7474 if (bed->elf_backend_grok_prstatus)
7475 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7476 return TRUE;
bb0082d6 7477#if defined (HAVE_PRSTATUS_T)
252b5132 7478 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7479#else
b34976b6 7480 return TRUE;
252b5132
RH
7481#endif
7482
7483#if defined (HAVE_PSTATUS_T)
7484 case NT_PSTATUS:
7485 return elfcore_grok_pstatus (abfd, note);
7486#endif
7487
7488#if defined (HAVE_LWPSTATUS_T)
7489 case NT_LWPSTATUS:
7490 return elfcore_grok_lwpstatus (abfd, note);
7491#endif
7492
7493 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7494 return elfcore_grok_prfpreg (abfd, note);
7495
16e9c715 7496#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7497 case NT_WIN32PSTATUS:
16e9c715
NC
7498 return elfcore_grok_win32pstatus (abfd, note);
7499#endif
7500
c044fabd 7501 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7502 if (note->namesz == 6
7503 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7504 return elfcore_grok_prxfpreg (abfd, note);
7505 else
b34976b6 7506 return TRUE;
ff08c6bb 7507
252b5132
RH
7508 case NT_PRPSINFO:
7509 case NT_PSINFO:
bb0082d6
AM
7510 if (bed->elf_backend_grok_psinfo)
7511 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7512 return TRUE;
bb0082d6 7513#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7514 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7515#else
b34976b6 7516 return TRUE;
252b5132 7517#endif
3333a7c3
RM
7518
7519 case NT_AUXV:
7520 {
62f3bb11 7521 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7522
7523 if (sect == NULL)
7524 return FALSE;
eea6121a 7525 sect->size = note->descsz;
3333a7c3
RM
7526 sect->filepos = note->descpos;
7527 sect->flags = SEC_HAS_CONTENTS;
7528 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7529
7530 return TRUE;
7531 }
252b5132
RH
7532 }
7533}
7534
b34976b6 7535static bfd_boolean
217aa764 7536elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7537{
7538 char *cp;
7539
7540 cp = strchr (note->namedata, '@');
7541 if (cp != NULL)
7542 {
d2b64500 7543 *lwpidp = atoi(cp + 1);
b34976b6 7544 return TRUE;
50b2bdb7 7545 }
b34976b6 7546 return FALSE;
50b2bdb7
AM
7547}
7548
b34976b6 7549static bfd_boolean
217aa764 7550elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7551{
7552
7553 /* Signal number at offset 0x08. */
7554 elf_tdata (abfd)->core_signal
7555 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7556
7557 /* Process ID at offset 0x50. */
7558 elf_tdata (abfd)->core_pid
7559 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7560
7561 /* Command name at 0x7c (max 32 bytes, including nul). */
7562 elf_tdata (abfd)->core_command
7563 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7564
7720ba9f
MK
7565 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7566 note);
50b2bdb7
AM
7567}
7568
b34976b6 7569static bfd_boolean
217aa764 7570elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7571{
7572 int lwp;
7573
7574 if (elfcore_netbsd_get_lwpid (note, &lwp))
7575 elf_tdata (abfd)->core_lwpid = lwp;
7576
b4db1224 7577 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7578 {
7579 /* NetBSD-specific core "procinfo". Note that we expect to
7580 find this note before any of the others, which is fine,
7581 since the kernel writes this note out first when it
7582 creates a core file. */
47d9a591 7583
50b2bdb7
AM
7584 return elfcore_grok_netbsd_procinfo (abfd, note);
7585 }
7586
b4db1224
JT
7587 /* As of Jan 2002 there are no other machine-independent notes
7588 defined for NetBSD core files. If the note type is less
7589 than the start of the machine-dependent note types, we don't
7590 understand it. */
47d9a591 7591
b4db1224 7592 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7593 return TRUE;
50b2bdb7
AM
7594
7595
7596 switch (bfd_get_arch (abfd))
7597 {
7598 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7599 PT_GETFPREGS == mach+2. */
7600
7601 case bfd_arch_alpha:
7602 case bfd_arch_sparc:
7603 switch (note->type)
7604 {
b4db1224 7605 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7606 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7607
b4db1224 7608 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7609 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7610
7611 default:
b34976b6 7612 return TRUE;
50b2bdb7
AM
7613 }
7614
7615 /* On all other arch's, PT_GETREGS == mach+1 and
7616 PT_GETFPREGS == mach+3. */
7617
7618 default:
7619 switch (note->type)
7620 {
b4db1224 7621 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7622 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7623
b4db1224 7624 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7625 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7626
7627 default:
b34976b6 7628 return TRUE;
50b2bdb7
AM
7629 }
7630 }
7631 /* NOTREACHED */
7632}
7633
07c6e936 7634static bfd_boolean
217aa764 7635elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7636{
7637 void *ddata = note->descdata;
7638 char buf[100];
7639 char *name;
7640 asection *sect;
f8843e87
AM
7641 short sig;
7642 unsigned flags;
07c6e936
NC
7643
7644 /* nto_procfs_status 'pid' field is at offset 0. */
7645 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7646
f8843e87
AM
7647 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7648 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7649
7650 /* nto_procfs_status 'flags' field is at offset 8. */
7651 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7652
7653 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7654 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7655 {
7656 elf_tdata (abfd)->core_signal = sig;
7657 elf_tdata (abfd)->core_lwpid = *tid;
7658 }
07c6e936 7659
f8843e87
AM
7660 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7661 do not come from signals so we make sure we set the current
7662 thread just in case. */
7663 if (flags & 0x00000080)
7664 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7665
7666 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7667 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7668
217aa764 7669 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7670 if (name == NULL)
7671 return FALSE;
7672 strcpy (name, buf);
7673
62f3bb11 7674 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7675 if (sect == NULL)
7676 return FALSE;
7677
eea6121a 7678 sect->size = note->descsz;
07c6e936
NC
7679 sect->filepos = note->descpos;
7680 sect->flags = SEC_HAS_CONTENTS;
7681 sect->alignment_power = 2;
7682
7683 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7684}
7685
7686static bfd_boolean
d69f560c
KW
7687elfcore_grok_nto_regs (bfd *abfd,
7688 Elf_Internal_Note *note,
7689 pid_t tid,
7690 char *base)
07c6e936
NC
7691{
7692 char buf[100];
7693 char *name;
7694 asection *sect;
7695
d69f560c 7696 /* Make a "(base)/%d" section. */
7e7353ed 7697 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 7698
217aa764 7699 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7700 if (name == NULL)
7701 return FALSE;
7702 strcpy (name, buf);
7703
62f3bb11 7704 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7705 if (sect == NULL)
7706 return FALSE;
7707
eea6121a 7708 sect->size = note->descsz;
07c6e936
NC
7709 sect->filepos = note->descpos;
7710 sect->flags = SEC_HAS_CONTENTS;
7711 sect->alignment_power = 2;
7712
f8843e87
AM
7713 /* This is the current thread. */
7714 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 7715 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
7716
7717 return TRUE;
07c6e936
NC
7718}
7719
7720#define BFD_QNT_CORE_INFO 7
7721#define BFD_QNT_CORE_STATUS 8
7722#define BFD_QNT_CORE_GREG 9
7723#define BFD_QNT_CORE_FPREG 10
7724
7725static bfd_boolean
217aa764 7726elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
7727{
7728 /* Every GREG section has a STATUS section before it. Store the
811072d8 7729 tid from the previous call to pass down to the next gregs
07c6e936
NC
7730 function. */
7731 static pid_t tid = 1;
7732
7733 switch (note->type)
7734 {
d69f560c
KW
7735 case BFD_QNT_CORE_INFO:
7736 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
7737 case BFD_QNT_CORE_STATUS:
7738 return elfcore_grok_nto_status (abfd, note, &tid);
7739 case BFD_QNT_CORE_GREG:
7740 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
7741 case BFD_QNT_CORE_FPREG:
7742 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
7743 default:
7744 return TRUE;
07c6e936
NC
7745 }
7746}
7747
7c76fa91
MS
7748/* Function: elfcore_write_note
7749
47d9a591 7750 Inputs:
7c76fa91
MS
7751 buffer to hold note
7752 name of note
7753 type of note
7754 data for note
7755 size of data for note
7756
7757 Return:
7758 End of buffer containing note. */
7759
7760char *
217aa764
AM
7761elfcore_write_note (bfd *abfd,
7762 char *buf,
7763 int *bufsiz,
7764 const char *name,
7765 int type,
7766 const void *input,
7767 int size)
7c76fa91
MS
7768{
7769 Elf_External_Note *xnp;
d4c88bbb
AM
7770 size_t namesz;
7771 size_t pad;
7772 size_t newspace;
7c76fa91
MS
7773 char *p, *dest;
7774
d4c88bbb
AM
7775 namesz = 0;
7776 pad = 0;
7777 if (name != NULL)
7778 {
9c5bfbb7 7779 const struct elf_backend_data *bed;
d4c88bbb
AM
7780
7781 namesz = strlen (name) + 1;
7782 bed = get_elf_backend_data (abfd);
45d6a902 7783 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
7784 }
7785
5de3bf90 7786 newspace = 12 + namesz + pad + size;
d4c88bbb 7787
7c76fa91
MS
7788 p = realloc (buf, *bufsiz + newspace);
7789 dest = p + *bufsiz;
7790 *bufsiz += newspace;
7791 xnp = (Elf_External_Note *) dest;
7792 H_PUT_32 (abfd, namesz, xnp->namesz);
7793 H_PUT_32 (abfd, size, xnp->descsz);
7794 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
7795 dest = xnp->name;
7796 if (name != NULL)
7797 {
7798 memcpy (dest, name, namesz);
7799 dest += namesz;
7800 while (pad != 0)
7801 {
7802 *dest++ = '\0';
7803 --pad;
7804 }
7805 }
7806 memcpy (dest, input, size);
7c76fa91
MS
7807 return p;
7808}
7809
7810#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
7811char *
217aa764
AM
7812elfcore_write_prpsinfo (bfd *abfd,
7813 char *buf,
7814 int *bufsiz,
7815 const char *fname,
7816 const char *psargs)
7c76fa91
MS
7817{
7818 int note_type;
7819 char *note_name = "CORE";
7820
7821#if defined (HAVE_PSINFO_T)
7822 psinfo_t data;
7823 note_type = NT_PSINFO;
7824#else
7825 prpsinfo_t data;
7826 note_type = NT_PRPSINFO;
7827#endif
7828
7829 memset (&data, 0, sizeof (data));
7830 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
7831 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 7832 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7833 note_name, note_type, &data, sizeof (data));
7834}
7835#endif /* PSINFO_T or PRPSINFO_T */
7836
7837#if defined (HAVE_PRSTATUS_T)
7838char *
217aa764
AM
7839elfcore_write_prstatus (bfd *abfd,
7840 char *buf,
7841 int *bufsiz,
7842 long pid,
7843 int cursig,
7844 const void *gregs)
7c76fa91
MS
7845{
7846 prstatus_t prstat;
7847 char *note_name = "CORE";
7848
7849 memset (&prstat, 0, sizeof (prstat));
7850 prstat.pr_pid = pid;
7851 prstat.pr_cursig = cursig;
c106e334 7852 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 7853 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7854 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
7855}
7856#endif /* HAVE_PRSTATUS_T */
7857
51316059
MS
7858#if defined (HAVE_LWPSTATUS_T)
7859char *
217aa764
AM
7860elfcore_write_lwpstatus (bfd *abfd,
7861 char *buf,
7862 int *bufsiz,
7863 long pid,
7864 int cursig,
7865 const void *gregs)
51316059
MS
7866{
7867 lwpstatus_t lwpstat;
7868 char *note_name = "CORE";
7869
7870 memset (&lwpstat, 0, sizeof (lwpstat));
7871 lwpstat.pr_lwpid = pid >> 16;
7872 lwpstat.pr_cursig = cursig;
7873#if defined (HAVE_LWPSTATUS_T_PR_REG)
7874 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
7875#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
7876#if !defined(gregs)
7877 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
7878 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
7879#else
7880 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
7881 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
7882#endif
7883#endif
47d9a591 7884 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7885 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
7886}
7887#endif /* HAVE_LWPSTATUS_T */
7888
7c76fa91
MS
7889#if defined (HAVE_PSTATUS_T)
7890char *
217aa764
AM
7891elfcore_write_pstatus (bfd *abfd,
7892 char *buf,
7893 int *bufsiz,
7894 long pid,
7895 int cursig,
7896 const void *gregs)
7c76fa91
MS
7897{
7898 pstatus_t pstat;
7899 char *note_name = "CORE";
7900
51316059
MS
7901 memset (&pstat, 0, sizeof (pstat));
7902 pstat.pr_pid = pid & 0xffff;
47d9a591 7903 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7904 NT_PSTATUS, &pstat, sizeof (pstat));
7905 return buf;
7c76fa91
MS
7906}
7907#endif /* HAVE_PSTATUS_T */
7908
7909char *
217aa764
AM
7910elfcore_write_prfpreg (bfd *abfd,
7911 char *buf,
7912 int *bufsiz,
7913 const void *fpregs,
7914 int size)
7c76fa91
MS
7915{
7916 char *note_name = "CORE";
47d9a591 7917 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7918 note_name, NT_FPREGSET, fpregs, size);
7919}
7920
7921char *
217aa764
AM
7922elfcore_write_prxfpreg (bfd *abfd,
7923 char *buf,
7924 int *bufsiz,
7925 const void *xfpregs,
7926 int size)
7c76fa91
MS
7927{
7928 char *note_name = "LINUX";
47d9a591 7929 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7930 note_name, NT_PRXFPREG, xfpregs, size);
7931}
7932
b34976b6 7933static bfd_boolean
217aa764 7934elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 7935{
c044fabd
KH
7936 char *buf;
7937 char *p;
252b5132
RH
7938
7939 if (size <= 0)
b34976b6 7940 return TRUE;
252b5132 7941
dc810e39 7942 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 7943 return FALSE;
252b5132 7944
dc810e39 7945 buf = bfd_malloc (size);
252b5132 7946 if (buf == NULL)
b34976b6 7947 return FALSE;
252b5132 7948
dc810e39 7949 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
7950 {
7951 error:
7952 free (buf);
b34976b6 7953 return FALSE;
252b5132
RH
7954 }
7955
7956 p = buf;
7957 while (p < buf + size)
7958 {
c044fabd
KH
7959 /* FIXME: bad alignment assumption. */
7960 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
7961 Elf_Internal_Note in;
7962
dc810e39 7963 in.type = H_GET_32 (abfd, xnp->type);
252b5132 7964
dc810e39 7965 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
7966 in.namedata = xnp->name;
7967
dc810e39 7968 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
7969 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
7970 in.descpos = offset + (in.descdata - buf);
7971
50b2bdb7
AM
7972 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
7973 {
7974 if (! elfcore_grok_netbsd_note (abfd, &in))
7975 goto error;
7976 }
07c6e936
NC
7977 else if (strncmp (in.namedata, "QNX", 3) == 0)
7978 {
7979 if (! elfcore_grok_nto_note (abfd, &in))
7980 goto error;
7981 }
50b2bdb7
AM
7982 else
7983 {
7984 if (! elfcore_grok_note (abfd, &in))
7985 goto error;
7986 }
252b5132
RH
7987
7988 p = in.descdata + BFD_ALIGN (in.descsz, 4);
7989 }
7990
7991 free (buf);
b34976b6 7992 return TRUE;
252b5132 7993}
98d8431c
JB
7994\f
7995/* Providing external access to the ELF program header table. */
7996
7997/* Return an upper bound on the number of bytes required to store a
7998 copy of ABFD's program header table entries. Return -1 if an error
7999 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8000
98d8431c 8001long
217aa764 8002bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8003{
8004 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8005 {
8006 bfd_set_error (bfd_error_wrong_format);
8007 return -1;
8008 }
8009
936e320b 8010 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8011}
8012
98d8431c
JB
8013/* Copy ABFD's program header table entries to *PHDRS. The entries
8014 will be stored as an array of Elf_Internal_Phdr structures, as
8015 defined in include/elf/internal.h. To find out how large the
8016 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
8017
8018 Return the number of program header table entries read, or -1 if an
8019 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 8020
98d8431c 8021int
217aa764 8022bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
8023{
8024 int num_phdrs;
8025
8026 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8027 {
8028 bfd_set_error (bfd_error_wrong_format);
8029 return -1;
8030 }
8031
8032 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8033 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8034 num_phdrs * sizeof (Elf_Internal_Phdr));
8035
8036 return num_phdrs;
8037}
ae4221d7
L
8038
8039void
217aa764 8040_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 8041{
d3b05f8d 8042#ifdef BFD64
ae4221d7
L
8043 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8044
8045 i_ehdrp = elf_elfheader (abfd);
8046 if (i_ehdrp == NULL)
8047 sprintf_vma (buf, value);
8048 else
8049 {
8050 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8051 {
ae4221d7 8052#if BFD_HOST_64BIT_LONG
cc55aec9 8053 sprintf (buf, "%016lx", value);
ae4221d7 8054#else
cc55aec9
AM
8055 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
8056 _bfd_int64_low (value));
ae4221d7 8057#endif
cc55aec9 8058 }
ae4221d7
L
8059 else
8060 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
8061 }
d3b05f8d
L
8062#else
8063 sprintf_vma (buf, value);
8064#endif
ae4221d7
L
8065}
8066
8067void
217aa764 8068_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 8069{
d3b05f8d 8070#ifdef BFD64
ae4221d7
L
8071 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8072
8073 i_ehdrp = elf_elfheader (abfd);
8074 if (i_ehdrp == NULL)
8075 fprintf_vma ((FILE *) stream, value);
8076 else
8077 {
8078 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8079 {
ae4221d7 8080#if BFD_HOST_64BIT_LONG
cc55aec9 8081 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 8082#else
cc55aec9
AM
8083 fprintf ((FILE *) stream, "%08lx%08lx",
8084 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 8085#endif
cc55aec9 8086 }
ae4221d7
L
8087 else
8088 fprintf ((FILE *) stream, "%08lx",
8089 (unsigned long) (value & 0xffffffff));
8090 }
d3b05f8d
L
8091#else
8092 fprintf_vma ((FILE *) stream, value);
8093#endif
ae4221d7 8094}
db6751f2
JJ
8095
8096enum elf_reloc_type_class
217aa764 8097_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8098{
8099 return reloc_class_normal;
8100}
f8df10f4 8101
47d9a591 8102/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8103 relocation against a local symbol. */
8104
8105bfd_vma
217aa764
AM
8106_bfd_elf_rela_local_sym (bfd *abfd,
8107 Elf_Internal_Sym *sym,
8517fae7 8108 asection **psec,
217aa764 8109 Elf_Internal_Rela *rel)
f8df10f4 8110{
8517fae7 8111 asection *sec = *psec;
f8df10f4
JJ
8112 bfd_vma relocation;
8113
8114 relocation = (sec->output_section->vma
8115 + sec->output_offset
8116 + sym->st_value);
8117 if ((sec->flags & SEC_MERGE)
c629eae0 8118 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8119 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8120 {
f8df10f4 8121 rel->r_addend =
8517fae7 8122 _bfd_merged_section_offset (abfd, psec,
65765700 8123 elf_section_data (sec)->sec_info,
753731ee
AM
8124 sym->st_value + rel->r_addend);
8125 if (sec != *psec)
8126 {
8127 /* If we have changed the section, and our original section is
8128 marked with SEC_EXCLUDE, it means that the original
8129 SEC_MERGE section has been completely subsumed in some
8130 other SEC_MERGE section. In this case, we need to leave
8131 some info around for --emit-relocs. */
8132 if ((sec->flags & SEC_EXCLUDE) != 0)
8133 sec->kept_section = *psec;
8134 sec = *psec;
8135 }
8517fae7
AM
8136 rel->r_addend -= relocation;
8137 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8138 }
8139 return relocation;
8140}
c629eae0
JJ
8141
8142bfd_vma
217aa764
AM
8143_bfd_elf_rel_local_sym (bfd *abfd,
8144 Elf_Internal_Sym *sym,
8145 asection **psec,
8146 bfd_vma addend)
47d9a591 8147{
c629eae0
JJ
8148 asection *sec = *psec;
8149
68bfbfcc 8150 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8151 return sym->st_value + addend;
8152
8153 return _bfd_merged_section_offset (abfd, psec,
65765700 8154 elf_section_data (sec)->sec_info,
753731ee 8155 sym->st_value + addend);
c629eae0
JJ
8156}
8157
8158bfd_vma
217aa764 8159_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8160 struct bfd_link_info *info,
217aa764
AM
8161 asection *sec,
8162 bfd_vma offset)
c629eae0 8163{
68bfbfcc 8164 switch (sec->sec_info_type)
65765700
JJ
8165 {
8166 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8167 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8168 offset);
65765700 8169 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8170 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8171 default:
8172 return offset;
8173 }
c629eae0 8174}
3333a7c3
RM
8175\f
8176/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8177 reconstruct an ELF file by reading the segments out of remote memory
8178 based on the ELF file header at EHDR_VMA and the ELF program headers it
8179 points to. If not null, *LOADBASEP is filled in with the difference
8180 between the VMAs from which the segments were read, and the VMAs the
8181 file headers (and hence BFD's idea of each section's VMA) put them at.
8182
8183 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8184 remote memory at target address VMA into the local buffer at MYADDR; it
8185 should return zero on success or an `errno' code on failure. TEMPL must
8186 be a BFD for an ELF target with the word size and byte order found in
8187 the remote memory. */
8188
8189bfd *
217aa764
AM
8190bfd_elf_bfd_from_remote_memory
8191 (bfd *templ,
8192 bfd_vma ehdr_vma,
8193 bfd_vma *loadbasep,
f075ee0c 8194 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8195{
8196 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8197 (templ, ehdr_vma, loadbasep, target_read_memory);
8198}
4c45e5c9
JJ
8199\f
8200long
c9727e01
AM
8201_bfd_elf_get_synthetic_symtab (bfd *abfd,
8202 long symcount ATTRIBUTE_UNUSED,
8203 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8204 long dynsymcount,
c9727e01
AM
8205 asymbol **dynsyms,
8206 asymbol **ret)
4c45e5c9
JJ
8207{
8208 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8209 asection *relplt;
8210 asymbol *s;
8211 const char *relplt_name;
8212 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8213 arelent *p;
8214 long count, i, n;
8215 size_t size;
8216 Elf_Internal_Shdr *hdr;
8217 char *names;
8218 asection *plt;
8219
8615f3f2
AM
8220 *ret = NULL;
8221
90e3cdf2
JJ
8222 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8223 return 0;
8224
8615f3f2
AM
8225 if (dynsymcount <= 0)
8226 return 0;
8227
4c45e5c9
JJ
8228 if (!bed->plt_sym_val)
8229 return 0;
8230
8231 relplt_name = bed->relplt_name;
8232 if (relplt_name == NULL)
8233 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8234 relplt = bfd_get_section_by_name (abfd, relplt_name);
8235 if (relplt == NULL)
8236 return 0;
8237
8238 hdr = &elf_section_data (relplt)->this_hdr;
8239 if (hdr->sh_link != elf_dynsymtab (abfd)
8240 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8241 return 0;
8242
8243 plt = bfd_get_section_by_name (abfd, ".plt");
8244 if (plt == NULL)
8245 return 0;
8246
8247 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8248 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8249 return -1;
8250
eea6121a 8251 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8252 size = count * sizeof (asymbol);
8253 p = relplt->relocation;
8254 for (i = 0; i < count; i++, s++, p++)
8255 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8256
8257 s = *ret = bfd_malloc (size);
8258 if (s == NULL)
8259 return -1;
8260
8261 names = (char *) (s + count);
8262 p = relplt->relocation;
8263 n = 0;
8264 for (i = 0; i < count; i++, s++, p++)
8265 {
8266 size_t len;
8267 bfd_vma addr;
8268
8269 addr = bed->plt_sym_val (i, plt, p);
8270 if (addr == (bfd_vma) -1)
8271 continue;
8272
8273 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8274 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8275 we are defining a symbol, ensure one of them is set. */
8276 if ((s->flags & BSF_LOCAL) == 0)
8277 s->flags |= BSF_GLOBAL;
4c45e5c9
JJ
8278 s->section = plt;
8279 s->value = addr - plt->vma;
8280 s->name = names;
8281 len = strlen ((*p->sym_ptr_ptr)->name);
8282 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8283 names += len;
8284 memcpy (names, "@plt", sizeof ("@plt"));
8285 names += sizeof ("@plt");
8286 ++n;
8287 }
8288
8289 return n;
8290}
3d7f7666
L
8291
8292/* Sort symbol by binding and section. We want to put definitions
8293 sorted by section at the beginning. */
8294
8295static int
8296elf_sort_elf_symbol (const void *arg1, const void *arg2)
8297{
8298 const Elf_Internal_Sym *s1;
8299 const Elf_Internal_Sym *s2;
8300 int shndx;
8301
8302 /* Make sure that undefined symbols are at the end. */
8303 s1 = (const Elf_Internal_Sym *) arg1;
8304 if (s1->st_shndx == SHN_UNDEF)
8305 return 1;
8306 s2 = (const Elf_Internal_Sym *) arg2;
8307 if (s2->st_shndx == SHN_UNDEF)
8308 return -1;
8309
8310 /* Sorted by section index. */
8311 shndx = s1->st_shndx - s2->st_shndx;
8312 if (shndx != 0)
8313 return shndx;
8314
8315 /* Sorted by binding. */
8316 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8317}
8318
8319struct elf_symbol
8320{
8321 Elf_Internal_Sym *sym;
8322 const char *name;
8323};
8324
8325static int
8326elf_sym_name_compare (const void *arg1, const void *arg2)
8327{
8328 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8329 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8330 return strcmp (s1->name, s2->name);
8331}
8332
8333/* Check if 2 sections define the same set of local and global
8334 symbols. */
8335
8336bfd_boolean
8337bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8338{
8339 bfd *bfd1, *bfd2;
8340 const struct elf_backend_data *bed1, *bed2;
8341 Elf_Internal_Shdr *hdr1, *hdr2;
8342 bfd_size_type symcount1, symcount2;
8343 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8344 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8345 Elf_Internal_Sym *isymend;
8346 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8347 bfd_size_type count1, count2, i;
8348 int shndx1, shndx2;
8349 bfd_boolean result;
8350
8351 bfd1 = sec1->owner;
8352 bfd2 = sec2->owner;
8353
8354 /* If both are .gnu.linkonce sections, they have to have the same
8355 section name. */
8356 if (strncmp (sec1->name, ".gnu.linkonce",
8357 sizeof ".gnu.linkonce" - 1) == 0
8358 && strncmp (sec2->name, ".gnu.linkonce",
8359 sizeof ".gnu.linkonce" - 1) == 0)
8360 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8361 sec2->name + sizeof ".gnu.linkonce") == 0;
8362
8363 /* Both sections have to be in ELF. */
8364 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8365 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8366 return FALSE;
8367
8368 if (elf_section_type (sec1) != elf_section_type (sec2))
8369 return FALSE;
8370
8371 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8372 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8373 {
8374 /* If both are members of section groups, they have to have the
8375 same group name. */
8376 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8377 return FALSE;
8378 }
8379
8380 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8381 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8382 if (shndx1 == -1 || shndx2 == -1)
8383 return FALSE;
8384
8385 bed1 = get_elf_backend_data (bfd1);
8386 bed2 = get_elf_backend_data (bfd2);
8387 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8388 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8389 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8390 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8391
8392 if (symcount1 == 0 || symcount2 == 0)
8393 return FALSE;
8394
8395 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8396 NULL, NULL, NULL);
8397 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8398 NULL, NULL, NULL);
8399
8400 result = FALSE;
8401 if (isymbuf1 == NULL || isymbuf2 == NULL)
8402 goto done;
8403
8404 /* Sort symbols by binding and section. Global definitions are at
8405 the beginning. */
8406 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8407 elf_sort_elf_symbol);
8408 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8409 elf_sort_elf_symbol);
8410
8411 /* Count definitions in the section. */
8412 count1 = 0;
8413 for (isym = isymbuf1, isymend = isym + symcount1;
8414 isym < isymend; isym++)
8415 {
8416 if (isym->st_shndx == (unsigned int) shndx1)
8417 {
8418 if (count1 == 0)
8419 isymstart1 = isym;
8420 count1++;
8421 }
8422
8423 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8424 break;
8425 }
8426
8427 count2 = 0;
8428 for (isym = isymbuf2, isymend = isym + symcount2;
8429 isym < isymend; isym++)
8430 {
8431 if (isym->st_shndx == (unsigned int) shndx2)
8432 {
8433 if (count2 == 0)
8434 isymstart2 = isym;
8435 count2++;
8436 }
8437
8438 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8439 break;
8440 }
8441
8442 if (count1 == 0 || count2 == 0 || count1 != count2)
8443 goto done;
8444
8445 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8446 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8447
8448 if (symtable1 == NULL || symtable2 == NULL)
8449 goto done;
8450
8451 symp = symtable1;
8452 for (isym = isymstart1, isymend = isym + count1;
8453 isym < isymend; isym++)
8454 {
8455 symp->sym = isym;
8456 symp->name = bfd_elf_string_from_elf_section (bfd1,
8457 hdr1->sh_link,
8458 isym->st_name);
8459 symp++;
8460 }
8461
8462 symp = symtable2;
8463 for (isym = isymstart2, isymend = isym + count1;
8464 isym < isymend; isym++)
8465 {
8466 symp->sym = isym;
8467 symp->name = bfd_elf_string_from_elf_section (bfd2,
8468 hdr2->sh_link,
8469 isym->st_name);
8470 symp++;
8471 }
8472
8473 /* Sort symbol by name. */
8474 qsort (symtable1, count1, sizeof (struct elf_symbol),
8475 elf_sym_name_compare);
8476 qsort (symtable2, count1, sizeof (struct elf_symbol),
8477 elf_sym_name_compare);
8478
8479 for (i = 0; i < count1; i++)
8480 /* Two symbols must have the same binding, type and name. */
8481 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8482 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8483 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8484 goto done;
8485
8486 result = TRUE;
8487
8488done:
8489 if (symtable1)
8490 free (symtable1);
8491 if (symtable2)
8492 free (symtable2);
8493 if (isymbuf1)
8494 free (isymbuf1);
8495 if (isymbuf2)
8496 free (isymbuf2);
8497
8498 return result;
8499}
3b22753a
L
8500
8501/* It is only used by x86-64 so far. */
8502asection _bfd_elf_large_com_section
8503 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
8504 SEC_IS_COMMON, NULL, NULL, "LARGE_COMMON",
8505 0);
ecca9871
L
8506
8507/* Return TRUE if 2 section types are compatible. */
8508
8509bfd_boolean
8510_bfd_elf_match_sections_by_type (bfd *abfd, const asection *asec,
8511 bfd *bbfd, const asection *bsec)
8512{
8513 if (asec == NULL
8514 || bsec == NULL
8515 || abfd->xvec->flavour != bfd_target_elf_flavour
8516 || bbfd->xvec->flavour != bfd_target_elf_flavour)
8517 return TRUE;
8518
8519 return elf_section_type (asec) == elf_section_type (bsec);
8520}
This page took 0.911388 seconds and 4 git commands to generate.