2005-10-25 H.J. Lu <hongjiu.lu@intel.com>
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
8615f3f2 4 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
1b74d094
BW
22/*
23SECTION
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
b34976b6 209bfd_boolean
217aa764 210bfd_elf_mkobject (bfd *abfd)
252b5132 211{
c044fabd
KH
212 /* This just does initialization. */
213 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 214 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 215 if (elf_tdata (abfd) == 0)
b34976b6 216 return FALSE;
c044fabd
KH
217 /* Since everything is done at close time, do we need any
218 initialization? */
252b5132 219
b34976b6 220 return TRUE;
252b5132
RH
221}
222
b34976b6 223bfd_boolean
217aa764 224bfd_elf_mkcorefile (bfd *abfd)
252b5132 225{
c044fabd 226 /* I think this can be done just like an object file. */
252b5132
RH
227 return bfd_elf_mkobject (abfd);
228}
229
230char *
217aa764 231bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
232{
233 Elf_Internal_Shdr **i_shdrp;
f075ee0c 234 bfd_byte *shstrtab = NULL;
dc810e39
AM
235 file_ptr offset;
236 bfd_size_type shstrtabsize;
252b5132
RH
237
238 i_shdrp = elf_elfsections (abfd);
239 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 240 return NULL;
252b5132 241
f075ee0c 242 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
243 if (shstrtab == NULL)
244 {
c044fabd 245 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
246 offset = i_shdrp[shindex]->sh_offset;
247 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
248
249 /* Allocate and clear an extra byte at the end, to prevent crashes
250 in case the string table is not terminated. */
251 if (shstrtabsize + 1 == 0
252 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
253 || bfd_seek (abfd, offset, SEEK_SET) != 0)
254 shstrtab = NULL;
255 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
256 {
257 if (bfd_get_error () != bfd_error_system_call)
258 bfd_set_error (bfd_error_file_truncated);
259 shstrtab = NULL;
260 }
261 else
262 shstrtab[shstrtabsize] = '\0';
217aa764 263 i_shdrp[shindex]->contents = shstrtab;
252b5132 264 }
f075ee0c 265 return (char *) shstrtab;
252b5132
RH
266}
267
268char *
217aa764
AM
269bfd_elf_string_from_elf_section (bfd *abfd,
270 unsigned int shindex,
271 unsigned int strindex)
252b5132
RH
272{
273 Elf_Internal_Shdr *hdr;
274
275 if (strindex == 0)
276 return "";
277
278 hdr = elf_elfsections (abfd)[shindex];
279
280 if (hdr->contents == NULL
281 && bfd_elf_get_str_section (abfd, shindex) == NULL)
282 return NULL;
283
284 if (strindex >= hdr->sh_size)
285 {
1b3a8575 286 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 287 (*_bfd_error_handler)
d003868e
AM
288 (_("%B: invalid string offset %u >= %lu for section `%s'"),
289 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 290 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 291 ? ".shstrtab"
1b3a8575 292 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
293 return "";
294 }
295
296 return ((char *) hdr->contents) + strindex;
297}
298
6cdc0ccc
AM
299/* Read and convert symbols to internal format.
300 SYMCOUNT specifies the number of symbols to read, starting from
301 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
302 are non-NULL, they are used to store the internal symbols, external
303 symbols, and symbol section index extensions, respectively. */
304
305Elf_Internal_Sym *
217aa764
AM
306bfd_elf_get_elf_syms (bfd *ibfd,
307 Elf_Internal_Shdr *symtab_hdr,
308 size_t symcount,
309 size_t symoffset,
310 Elf_Internal_Sym *intsym_buf,
311 void *extsym_buf,
312 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
313{
314 Elf_Internal_Shdr *shndx_hdr;
217aa764 315 void *alloc_ext;
df622259 316 const bfd_byte *esym;
6cdc0ccc
AM
317 Elf_External_Sym_Shndx *alloc_extshndx;
318 Elf_External_Sym_Shndx *shndx;
319 Elf_Internal_Sym *isym;
320 Elf_Internal_Sym *isymend;
9c5bfbb7 321 const struct elf_backend_data *bed;
6cdc0ccc
AM
322 size_t extsym_size;
323 bfd_size_type amt;
324 file_ptr pos;
325
326 if (symcount == 0)
327 return intsym_buf;
328
329 /* Normal syms might have section extension entries. */
330 shndx_hdr = NULL;
331 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
332 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
333
334 /* Read the symbols. */
335 alloc_ext = NULL;
336 alloc_extshndx = NULL;
337 bed = get_elf_backend_data (ibfd);
338 extsym_size = bed->s->sizeof_sym;
339 amt = symcount * extsym_size;
340 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
341 if (extsym_buf == NULL)
342 {
d0fb9a8d 343 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
344 extsym_buf = alloc_ext;
345 }
346 if (extsym_buf == NULL
347 || bfd_seek (ibfd, pos, SEEK_SET) != 0
348 || bfd_bread (extsym_buf, amt, ibfd) != amt)
349 {
350 intsym_buf = NULL;
351 goto out;
352 }
353
354 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
355 extshndx_buf = NULL;
356 else
357 {
358 amt = symcount * sizeof (Elf_External_Sym_Shndx);
359 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
360 if (extshndx_buf == NULL)
361 {
d0fb9a8d
JJ
362 alloc_extshndx = bfd_malloc2 (symcount,
363 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
364 extshndx_buf = alloc_extshndx;
365 }
366 if (extshndx_buf == NULL
367 || bfd_seek (ibfd, pos, SEEK_SET) != 0
368 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
369 {
370 intsym_buf = NULL;
371 goto out;
372 }
373 }
374
375 if (intsym_buf == NULL)
376 {
d0fb9a8d 377 intsym_buf = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
6cdc0ccc
AM
378 if (intsym_buf == NULL)
379 goto out;
380 }
381
382 /* Convert the symbols to internal form. */
383 isymend = intsym_buf + symcount;
384 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
385 isym < isymend;
386 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 387 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
388
389 out:
390 if (alloc_ext != NULL)
391 free (alloc_ext);
392 if (alloc_extshndx != NULL)
393 free (alloc_extshndx);
394
395 return intsym_buf;
396}
397
5cab59f6
AM
398/* Look up a symbol name. */
399const char *
be8dd2ca
AM
400bfd_elf_sym_name (bfd *abfd,
401 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
402 Elf_Internal_Sym *isym,
403 asection *sym_sec)
5cab59f6 404{
26c61ae5 405 const char *name;
5cab59f6 406 unsigned int iname = isym->st_name;
be8dd2ca 407 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 408
138f35cc
JJ
409 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
410 /* Check for a bogus st_shndx to avoid crashing. */
411 && isym->st_shndx < elf_numsections (abfd)
412 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
413 {
414 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
415 shindex = elf_elfheader (abfd)->e_shstrndx;
416 }
417
26c61ae5
L
418 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
419 if (name == NULL)
420 name = "(null)";
421 else if (sym_sec && *name == '\0')
422 name = bfd_section_name (abfd, sym_sec);
423
424 return name;
5cab59f6
AM
425}
426
dbb410c3
AM
427/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
428 sections. The first element is the flags, the rest are section
429 pointers. */
430
431typedef union elf_internal_group {
432 Elf_Internal_Shdr *shdr;
433 unsigned int flags;
434} Elf_Internal_Group;
435
b885599b
AM
436/* Return the name of the group signature symbol. Why isn't the
437 signature just a string? */
438
439static const char *
217aa764 440group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 441{
9dce4196 442 Elf_Internal_Shdr *hdr;
9dce4196
AM
443 unsigned char esym[sizeof (Elf64_External_Sym)];
444 Elf_External_Sym_Shndx eshndx;
445 Elf_Internal_Sym isym;
b885599b 446
13792e9d
L
447 /* First we need to ensure the symbol table is available. Make sure
448 that it is a symbol table section. */
449 hdr = elf_elfsections (abfd) [ghdr->sh_link];
450 if (hdr->sh_type != SHT_SYMTAB
451 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
452 return NULL;
453
9dce4196
AM
454 /* Go read the symbol. */
455 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
456 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
457 &isym, esym, &eshndx) == NULL)
b885599b 458 return NULL;
9dce4196 459
26c61ae5 460 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
461}
462
dbb410c3
AM
463/* Set next_in_group list pointer, and group name for NEWSECT. */
464
b34976b6 465static bfd_boolean
217aa764 466setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
467{
468 unsigned int num_group = elf_tdata (abfd)->num_group;
469
470 /* If num_group is zero, read in all SHT_GROUP sections. The count
471 is set to -1 if there are no SHT_GROUP sections. */
472 if (num_group == 0)
473 {
474 unsigned int i, shnum;
475
476 /* First count the number of groups. If we have a SHT_GROUP
477 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 478 shnum = elf_numsections (abfd);
dbb410c3
AM
479 num_group = 0;
480 for (i = 0; i < shnum; i++)
481 {
482 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
483 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
484 num_group += 1;
485 }
486
487 if (num_group == 0)
20dbb49d
L
488 {
489 num_group = (unsigned) -1;
490 elf_tdata (abfd)->num_group = num_group;
491 }
492 else
dbb410c3
AM
493 {
494 /* We keep a list of elf section headers for group sections,
495 so we can find them quickly. */
20dbb49d 496 bfd_size_type amt;
d0fb9a8d 497
20dbb49d 498 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
499 elf_tdata (abfd)->group_sect_ptr
500 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 501 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 502 return FALSE;
dbb410c3
AM
503
504 num_group = 0;
505 for (i = 0; i < shnum; i++)
506 {
507 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
508 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
509 {
973ffd63 510 unsigned char *src;
dbb410c3
AM
511 Elf_Internal_Group *dest;
512
513 /* Add to list of sections. */
514 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
515 num_group += 1;
516
517 /* Read the raw contents. */
518 BFD_ASSERT (sizeof (*dest) >= 4);
519 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
520 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
521 sizeof (*dest) / 4);
dbb410c3
AM
522 if (shdr->contents == NULL
523 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
524 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
525 != shdr->sh_size))
b34976b6 526 return FALSE;
dbb410c3
AM
527
528 /* Translate raw contents, a flag word followed by an
529 array of elf section indices all in target byte order,
530 to the flag word followed by an array of elf section
531 pointers. */
532 src = shdr->contents + shdr->sh_size;
533 dest = (Elf_Internal_Group *) (shdr->contents + amt);
534 while (1)
535 {
536 unsigned int idx;
537
538 src -= 4;
539 --dest;
540 idx = H_GET_32 (abfd, src);
541 if (src == shdr->contents)
542 {
543 dest->flags = idx;
b885599b
AM
544 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
545 shdr->bfd_section->flags
546 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
547 break;
548 }
549 if (idx >= shnum)
550 {
551 ((*_bfd_error_handler)
d003868e 552 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
553 idx = 0;
554 }
555 dest->shdr = elf_elfsections (abfd)[idx];
556 }
557 }
558 }
559 }
560 }
561
562 if (num_group != (unsigned) -1)
563 {
564 unsigned int i;
565
566 for (i = 0; i < num_group; i++)
567 {
568 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
569 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
570 unsigned int n_elt = shdr->sh_size / 4;
571
572 /* Look through this group's sections to see if current
573 section is a member. */
574 while (--n_elt != 0)
575 if ((++idx)->shdr == hdr)
576 {
e0e8c97f 577 asection *s = NULL;
dbb410c3
AM
578
579 /* We are a member of this group. Go looking through
580 other members to see if any others are linked via
581 next_in_group. */
582 idx = (Elf_Internal_Group *) shdr->contents;
583 n_elt = shdr->sh_size / 4;
584 while (--n_elt != 0)
585 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 586 && elf_next_in_group (s) != NULL)
dbb410c3
AM
587 break;
588 if (n_elt != 0)
589 {
dbb410c3
AM
590 /* Snarf the group name from other member, and
591 insert current section in circular list. */
945906ff
AM
592 elf_group_name (newsect) = elf_group_name (s);
593 elf_next_in_group (newsect) = elf_next_in_group (s);
594 elf_next_in_group (s) = newsect;
dbb410c3
AM
595 }
596 else
597 {
dbb410c3
AM
598 const char *gname;
599
b885599b
AM
600 gname = group_signature (abfd, shdr);
601 if (gname == NULL)
b34976b6 602 return FALSE;
945906ff 603 elf_group_name (newsect) = gname;
dbb410c3
AM
604
605 /* Start a circular list with one element. */
945906ff 606 elf_next_in_group (newsect) = newsect;
dbb410c3 607 }
b885599b 608
9dce4196
AM
609 /* If the group section has been created, point to the
610 new member. */
dbb410c3 611 if (shdr->bfd_section != NULL)
945906ff 612 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 613
dbb410c3
AM
614 i = num_group - 1;
615 break;
616 }
617 }
618 }
619
945906ff 620 if (elf_group_name (newsect) == NULL)
dbb410c3 621 {
d003868e
AM
622 (*_bfd_error_handler) (_("%B: no group info for section %A"),
623 abfd, newsect);
dbb410c3 624 }
b34976b6 625 return TRUE;
dbb410c3
AM
626}
627
3d7f7666 628bfd_boolean
dd863624 629_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
630{
631 unsigned int i;
632 unsigned int num_group = elf_tdata (abfd)->num_group;
633 bfd_boolean result = TRUE;
dd863624
L
634 asection *s;
635
636 /* Process SHF_LINK_ORDER. */
637 for (s = abfd->sections; s != NULL; s = s->next)
638 {
639 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
640 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
641 {
642 unsigned int elfsec = this_hdr->sh_link;
643 /* FIXME: The old Intel compiler and old strip/objcopy may
644 not set the sh_link or sh_info fields. Hence we could
645 get the situation where elfsec is 0. */
646 if (elfsec == 0)
647 {
648 const struct elf_backend_data *bed
649 = get_elf_backend_data (abfd);
650 if (bed->link_order_error_handler)
651 bed->link_order_error_handler
652 (_("%B: warning: sh_link not set for section `%A'"),
653 abfd, s);
654 }
655 else
656 {
657 this_hdr = elf_elfsections (abfd)[elfsec];
658 elf_linked_to_section (s) = this_hdr->bfd_section;
659 }
660 }
661 }
3d7f7666 662
dd863624 663 /* Process section groups. */
3d7f7666
L
664 if (num_group == (unsigned) -1)
665 return result;
666
667 for (i = 0; i < num_group; i++)
668 {
669 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
670 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
671 unsigned int n_elt = shdr->sh_size / 4;
672
673 while (--n_elt != 0)
674 if ((++idx)->shdr->bfd_section)
675 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
676 else if (idx->shdr->sh_type == SHT_RELA
677 || idx->shdr->sh_type == SHT_REL)
678 /* We won't include relocation sections in section groups in
679 output object files. We adjust the group section size here
680 so that relocatable link will work correctly when
681 relocation sections are in section group in input object
682 files. */
683 shdr->bfd_section->size -= 4;
684 else
685 {
686 /* There are some unknown sections in the group. */
687 (*_bfd_error_handler)
d003868e
AM
688 (_("%B: unknown [%d] section `%s' in group [%s]"),
689 abfd,
3d7f7666 690 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
691 bfd_elf_string_from_elf_section (abfd,
692 (elf_elfheader (abfd)
693 ->e_shstrndx),
694 idx->shdr->sh_name),
3d7f7666
L
695 shdr->bfd_section->name);
696 result = FALSE;
697 }
698 }
699 return result;
700}
701
72adc230
AM
702bfd_boolean
703bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
704{
705 return elf_next_in_group (sec) != NULL;
706}
707
252b5132
RH
708/* Make a BFD section from an ELF section. We store a pointer to the
709 BFD section in the bfd_section field of the header. */
710
b34976b6 711bfd_boolean
217aa764
AM
712_bfd_elf_make_section_from_shdr (bfd *abfd,
713 Elf_Internal_Shdr *hdr,
6dc132d9
L
714 const char *name,
715 int shindex)
252b5132
RH
716{
717 asection *newsect;
718 flagword flags;
9c5bfbb7 719 const struct elf_backend_data *bed;
252b5132
RH
720
721 if (hdr->bfd_section != NULL)
722 {
723 BFD_ASSERT (strcmp (name,
724 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 725 return TRUE;
252b5132
RH
726 }
727
728 newsect = bfd_make_section_anyway (abfd, name);
729 if (newsect == NULL)
b34976b6 730 return FALSE;
252b5132 731
1829f4b2
AM
732 hdr->bfd_section = newsect;
733 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 734 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 735
2f89ff8d
L
736 /* Always use the real type/flags. */
737 elf_section_type (newsect) = hdr->sh_type;
738 elf_section_flags (newsect) = hdr->sh_flags;
739
252b5132
RH
740 newsect->filepos = hdr->sh_offset;
741
742 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
743 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
744 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 745 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 746 return FALSE;
252b5132
RH
747
748 flags = SEC_NO_FLAGS;
749 if (hdr->sh_type != SHT_NOBITS)
750 flags |= SEC_HAS_CONTENTS;
dbb410c3 751 if (hdr->sh_type == SHT_GROUP)
b3096250 752 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
753 if ((hdr->sh_flags & SHF_ALLOC) != 0)
754 {
755 flags |= SEC_ALLOC;
756 if (hdr->sh_type != SHT_NOBITS)
757 flags |= SEC_LOAD;
758 }
759 if ((hdr->sh_flags & SHF_WRITE) == 0)
760 flags |= SEC_READONLY;
761 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
762 flags |= SEC_CODE;
763 else if ((flags & SEC_LOAD) != 0)
764 flags |= SEC_DATA;
f5fa8ca2
JJ
765 if ((hdr->sh_flags & SHF_MERGE) != 0)
766 {
767 flags |= SEC_MERGE;
768 newsect->entsize = hdr->sh_entsize;
769 if ((hdr->sh_flags & SHF_STRINGS) != 0)
770 flags |= SEC_STRINGS;
771 }
dbb410c3
AM
772 if (hdr->sh_flags & SHF_GROUP)
773 if (!setup_group (abfd, hdr, newsect))
b34976b6 774 return FALSE;
13ae64f3
JJ
775 if ((hdr->sh_flags & SHF_TLS) != 0)
776 flags |= SEC_THREAD_LOCAL;
252b5132 777
3d2b39cf 778 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 779 {
3d2b39cf
L
780 /* The debugging sections appear to be recognized only by name,
781 not any sort of flag. Their SEC_ALLOC bits are cleared. */
782 static const struct
783 {
784 const char *name;
785 int len;
786 } debug_sections [] =
787 {
788 { "debug", 5 }, /* 'd' */
789 { NULL, 0 }, /* 'e' */
790 { NULL, 0 }, /* 'f' */
791 { "gnu.linkonce.wi.", 17 }, /* 'g' */
792 { NULL, 0 }, /* 'h' */
793 { NULL, 0 }, /* 'i' */
794 { NULL, 0 }, /* 'j' */
795 { NULL, 0 }, /* 'k' */
796 { "line", 4 }, /* 'l' */
797 { NULL, 0 }, /* 'm' */
798 { NULL, 0 }, /* 'n' */
799 { NULL, 0 }, /* 'o' */
800 { NULL, 0 }, /* 'p' */
801 { NULL, 0 }, /* 'q' */
802 { NULL, 0 }, /* 'r' */
803 { "stab", 4 } /* 's' */
804 };
805
806 if (name [0] == '.')
807 {
808 int i = name [1] - 'd';
809 if (i >= 0
810 && i < (int) ARRAY_SIZE (debug_sections)
811 && debug_sections [i].name != NULL
812 && strncmp (&name [1], debug_sections [i].name,
813 debug_sections [i].len) == 0)
814 flags |= SEC_DEBUGGING;
815 }
816 }
252b5132
RH
817
818 /* As a GNU extension, if the name begins with .gnu.linkonce, we
819 only link a single copy of the section. This is used to support
820 g++. g++ will emit each template expansion in its own section.
821 The symbols will be defined as weak, so that multiple definitions
822 are permitted. The GNU linker extension is to actually discard
823 all but one of the sections. */
b885599b
AM
824 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
825 && elf_next_in_group (newsect) == NULL)
252b5132
RH
826 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
827
fa152c49
JW
828 bed = get_elf_backend_data (abfd);
829 if (bed->elf_backend_section_flags)
830 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 831 return FALSE;
fa152c49 832
252b5132 833 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 834 return FALSE;
252b5132
RH
835
836 if ((flags & SEC_ALLOC) != 0)
837 {
838 Elf_Internal_Phdr *phdr;
839 unsigned int i;
840
841 /* Look through the phdrs to see if we need to adjust the lma.
842 If all the p_paddr fields are zero, we ignore them, since
843 some ELF linkers produce such output. */
844 phdr = elf_tdata (abfd)->phdr;
845 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
846 {
847 if (phdr->p_paddr != 0)
848 break;
849 }
850 if (i < elf_elfheader (abfd)->e_phnum)
851 {
852 phdr = elf_tdata (abfd)->phdr;
853 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
854 {
e0e8c97f
NC
855 /* This section is part of this segment if its file
856 offset plus size lies within the segment's memory
857 span and, if the section is loaded, the extent of the
47d9a591 858 loaded data lies within the extent of the segment.
bf36db18
NC
859
860 Note - we used to check the p_paddr field as well, and
861 refuse to set the LMA if it was 0. This is wrong
dba143ef 862 though, as a perfectly valid initialised segment can
bf36db18 863 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 864 place special significance on the address 0 and
bf36db18
NC
865 executables need to be able to have a segment which
866 covers this address. */
252b5132 867 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
868 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
869 && (hdr->sh_offset + hdr->sh_size
870 <= phdr->p_offset + phdr->p_memsz)
252b5132 871 && ((flags & SEC_LOAD) == 0
d7866f04
AM
872 || (hdr->sh_offset + hdr->sh_size
873 <= phdr->p_offset + phdr->p_filesz)))
252b5132 874 {
dba143ef 875 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
876 newsect->lma = (phdr->p_paddr
877 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
878 else
879 /* We used to use the same adjustment for SEC_LOAD
880 sections, but that doesn't work if the segment
881 is packed with code from multiple VMAs.
882 Instead we calculate the section LMA based on
883 the segment LMA. It is assumed that the
884 segment will contain sections with contiguous
885 LMAs, even if the VMAs are not. */
886 newsect->lma = (phdr->p_paddr
887 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
888
889 /* With contiguous segments, we can't tell from file
890 offsets whether a section with zero size should
891 be placed at the end of one segment or the
892 beginning of the next. Decide based on vaddr. */
893 if (hdr->sh_addr >= phdr->p_vaddr
894 && (hdr->sh_addr + hdr->sh_size
895 <= phdr->p_vaddr + phdr->p_memsz))
896 break;
252b5132
RH
897 }
898 }
899 }
900 }
901
b34976b6 902 return TRUE;
252b5132
RH
903}
904
905/*
906INTERNAL_FUNCTION
907 bfd_elf_find_section
908
909SYNOPSIS
910 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
911
912DESCRIPTION
913 Helper functions for GDB to locate the string tables.
914 Since BFD hides string tables from callers, GDB needs to use an
915 internal hook to find them. Sun's .stabstr, in particular,
916 isn't even pointed to by the .stab section, so ordinary
917 mechanisms wouldn't work to find it, even if we had some.
918*/
919
920struct elf_internal_shdr *
217aa764 921bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
922{
923 Elf_Internal_Shdr **i_shdrp;
924 char *shstrtab;
925 unsigned int max;
926 unsigned int i;
927
928 i_shdrp = elf_elfsections (abfd);
929 if (i_shdrp != NULL)
930 {
9ad5cbcf
AM
931 shstrtab = bfd_elf_get_str_section (abfd,
932 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
933 if (shstrtab != NULL)
934 {
9ad5cbcf 935 max = elf_numsections (abfd);
252b5132
RH
936 for (i = 1; i < max; i++)
937 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
938 return i_shdrp[i];
939 }
940 }
941 return 0;
942}
943
944const char *const bfd_elf_section_type_names[] = {
945 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
946 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
947 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
948};
949
1049f94e 950/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
951 output, and the reloc is against an external symbol, and nothing
952 has given us any additional addend, the resulting reloc will also
953 be against the same symbol. In such a case, we don't want to
954 change anything about the way the reloc is handled, since it will
955 all be done at final link time. Rather than put special case code
956 into bfd_perform_relocation, all the reloc types use this howto
957 function. It just short circuits the reloc if producing
1049f94e 958 relocatable output against an external symbol. */
252b5132 959
252b5132 960bfd_reloc_status_type
217aa764
AM
961bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
962 arelent *reloc_entry,
963 asymbol *symbol,
964 void *data ATTRIBUTE_UNUSED,
965 asection *input_section,
966 bfd *output_bfd,
967 char **error_message ATTRIBUTE_UNUSED)
968{
969 if (output_bfd != NULL
252b5132
RH
970 && (symbol->flags & BSF_SECTION_SYM) == 0
971 && (! reloc_entry->howto->partial_inplace
972 || reloc_entry->addend == 0))
973 {
974 reloc_entry->address += input_section->output_offset;
975 return bfd_reloc_ok;
976 }
977
978 return bfd_reloc_continue;
979}
980\f
d3c456e9
JJ
981/* Make sure sec_info_type is cleared if sec_info is cleared too. */
982
983static void
217aa764
AM
984merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
985 asection *sec)
d3c456e9 986{
68bfbfcc
AM
987 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
988 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
989}
990
8550eb6e
JJ
991/* Finish SHF_MERGE section merging. */
992
b34976b6 993bfd_boolean
217aa764 994_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 995{
57ceae94
AM
996 bfd *ibfd;
997 asection *sec;
998
0eddce27 999 if (!is_elf_hash_table (info->hash))
b34976b6 1000 return FALSE;
57ceae94
AM
1001
1002 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1003 if ((ibfd->flags & DYNAMIC) == 0)
1004 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
1005 if ((sec->flags & SEC_MERGE) != 0
1006 && !bfd_is_abs_section (sec->output_section))
1007 {
1008 struct bfd_elf_section_data *secdata;
1009
1010 secdata = elf_section_data (sec);
1011 if (! _bfd_add_merge_section (abfd,
1012 &elf_hash_table (info)->merge_info,
1013 sec, &secdata->sec_info))
1014 return FALSE;
1015 else if (secdata->sec_info)
1016 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
1017 }
1018
1019 if (elf_hash_table (info)->merge_info != NULL)
1020 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 1021 merge_sections_remove_hook);
b34976b6 1022 return TRUE;
8550eb6e 1023}
2d653fc7
AM
1024
1025void
217aa764 1026_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1027{
1028 sec->output_section = bfd_abs_section_ptr;
1029 sec->output_offset = sec->vma;
0eddce27 1030 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1031 return;
1032
68bfbfcc 1033 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1034}
8550eb6e 1035\f
0ac4564e
L
1036/* Copy the program header and other data from one object module to
1037 another. */
252b5132 1038
b34976b6 1039bfd_boolean
217aa764 1040_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1041{
1042 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1043 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1044 return TRUE;
2d502050
L
1045
1046 BFD_ASSERT (!elf_flags_init (obfd)
1047 || (elf_elfheader (obfd)->e_flags
1048 == elf_elfheader (ibfd)->e_flags));
1049
0ac4564e 1050 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1051 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1052 elf_flags_init (obfd) = TRUE;
1053 return TRUE;
2d502050
L
1054}
1055
f0b79d91
L
1056/* Print out the program headers. */
1057
b34976b6 1058bfd_boolean
217aa764 1059_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1060{
217aa764 1061 FILE *f = farg;
252b5132
RH
1062 Elf_Internal_Phdr *p;
1063 asection *s;
1064 bfd_byte *dynbuf = NULL;
1065
1066 p = elf_tdata (abfd)->phdr;
1067 if (p != NULL)
1068 {
1069 unsigned int i, c;
1070
1071 fprintf (f, _("\nProgram Header:\n"));
1072 c = elf_elfheader (abfd)->e_phnum;
1073 for (i = 0; i < c; i++, p++)
1074 {
dc810e39 1075 const char *pt;
252b5132
RH
1076 char buf[20];
1077
1078 switch (p->p_type)
1079 {
dc810e39
AM
1080 case PT_NULL: pt = "NULL"; break;
1081 case PT_LOAD: pt = "LOAD"; break;
1082 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1083 case PT_INTERP: pt = "INTERP"; break;
1084 case PT_NOTE: pt = "NOTE"; break;
1085 case PT_SHLIB: pt = "SHLIB"; break;
1086 case PT_PHDR: pt = "PHDR"; break;
13ae64f3 1087 case PT_TLS: pt = "TLS"; break;
65765700 1088 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
9ee5e499 1089 case PT_GNU_STACK: pt = "STACK"; break;
8c37241b 1090 case PT_GNU_RELRO: pt = "RELRO"; break;
dc810e39 1091 default: sprintf (buf, "0x%lx", p->p_type); pt = buf; break;
252b5132 1092 }
dc810e39 1093 fprintf (f, "%8s off 0x", pt);
60b89a18 1094 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1095 fprintf (f, " vaddr 0x");
60b89a18 1096 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1097 fprintf (f, " paddr 0x");
60b89a18 1098 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1099 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1100 fprintf (f, " filesz 0x");
60b89a18 1101 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1102 fprintf (f, " memsz 0x");
60b89a18 1103 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1104 fprintf (f, " flags %c%c%c",
1105 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1106 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1107 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1108 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1109 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1110 fprintf (f, "\n");
1111 }
1112 }
1113
1114 s = bfd_get_section_by_name (abfd, ".dynamic");
1115 if (s != NULL)
1116 {
1117 int elfsec;
dc810e39 1118 unsigned long shlink;
252b5132
RH
1119 bfd_byte *extdyn, *extdynend;
1120 size_t extdynsize;
217aa764 1121 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1122
1123 fprintf (f, _("\nDynamic Section:\n"));
1124
eea6121a 1125 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1126 goto error_return;
1127
1128 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1129 if (elfsec == -1)
1130 goto error_return;
dc810e39 1131 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1132
1133 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1134 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1135
1136 extdyn = dynbuf;
eea6121a 1137 extdynend = extdyn + s->size;
252b5132
RH
1138 for (; extdyn < extdynend; extdyn += extdynsize)
1139 {
1140 Elf_Internal_Dyn dyn;
1141 const char *name;
1142 char ab[20];
b34976b6 1143 bfd_boolean stringp;
252b5132 1144
217aa764 1145 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1146
1147 if (dyn.d_tag == DT_NULL)
1148 break;
1149
b34976b6 1150 stringp = FALSE;
252b5132
RH
1151 switch (dyn.d_tag)
1152 {
1153 default:
1154 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1155 name = ab;
1156 break;
1157
b34976b6 1158 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1159 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1160 case DT_PLTGOT: name = "PLTGOT"; break;
1161 case DT_HASH: name = "HASH"; break;
1162 case DT_STRTAB: name = "STRTAB"; break;
1163 case DT_SYMTAB: name = "SYMTAB"; break;
1164 case DT_RELA: name = "RELA"; break;
1165 case DT_RELASZ: name = "RELASZ"; break;
1166 case DT_RELAENT: name = "RELAENT"; break;
1167 case DT_STRSZ: name = "STRSZ"; break;
1168 case DT_SYMENT: name = "SYMENT"; break;
1169 case DT_INIT: name = "INIT"; break;
1170 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1171 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1172 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1173 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1174 case DT_REL: name = "REL"; break;
1175 case DT_RELSZ: name = "RELSZ"; break;
1176 case DT_RELENT: name = "RELENT"; break;
1177 case DT_PLTREL: name = "PLTREL"; break;
1178 case DT_DEBUG: name = "DEBUG"; break;
1179 case DT_TEXTREL: name = "TEXTREL"; break;
1180 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1181 case DT_BIND_NOW: name = "BIND_NOW"; break;
1182 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1183 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1184 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1185 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1186 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1187 case DT_FLAGS: name = "FLAGS"; break;
1188 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1189 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1190 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1191 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1192 case DT_MOVEENT: name = "MOVEENT"; break;
1193 case DT_MOVESZ: name = "MOVESZ"; break;
1194 case DT_FEATURE: name = "FEATURE"; break;
1195 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1196 case DT_SYMINSZ: name = "SYMINSZ"; break;
1197 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1198 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1199 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1200 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1201 case DT_PLTPAD: name = "PLTPAD"; break;
1202 case DT_MOVETAB: name = "MOVETAB"; break;
1203 case DT_SYMINFO: name = "SYMINFO"; break;
1204 case DT_RELACOUNT: name = "RELACOUNT"; break;
1205 case DT_RELCOUNT: name = "RELCOUNT"; break;
1206 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1207 case DT_VERSYM: name = "VERSYM"; break;
1208 case DT_VERDEF: name = "VERDEF"; break;
1209 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1210 case DT_VERNEED: name = "VERNEED"; break;
1211 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1212 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1213 case DT_USED: name = "USED"; break;
b34976b6 1214 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1215 }
1216
1217 fprintf (f, " %-11s ", name);
1218 if (! stringp)
1219 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1220 else
1221 {
1222 const char *string;
dc810e39 1223 unsigned int tagv = dyn.d_un.d_val;
252b5132 1224
dc810e39 1225 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1226 if (string == NULL)
1227 goto error_return;
1228 fprintf (f, "%s", string);
1229 }
1230 fprintf (f, "\n");
1231 }
1232
1233 free (dynbuf);
1234 dynbuf = NULL;
1235 }
1236
1237 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1238 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1239 {
fc0e6df6 1240 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1241 return FALSE;
252b5132
RH
1242 }
1243
1244 if (elf_dynverdef (abfd) != 0)
1245 {
1246 Elf_Internal_Verdef *t;
1247
1248 fprintf (f, _("\nVersion definitions:\n"));
1249 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1250 {
1251 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1252 t->vd_flags, t->vd_hash,
1253 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1254 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1255 {
1256 Elf_Internal_Verdaux *a;
1257
1258 fprintf (f, "\t");
1259 for (a = t->vd_auxptr->vda_nextptr;
1260 a != NULL;
1261 a = a->vda_nextptr)
d0fb9a8d
JJ
1262 fprintf (f, "%s ",
1263 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1264 fprintf (f, "\n");
1265 }
1266 }
1267 }
1268
1269 if (elf_dynverref (abfd) != 0)
1270 {
1271 Elf_Internal_Verneed *t;
1272
1273 fprintf (f, _("\nVersion References:\n"));
1274 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1275 {
1276 Elf_Internal_Vernaux *a;
1277
d0fb9a8d
JJ
1278 fprintf (f, _(" required from %s:\n"),
1279 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1280 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1281 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1282 a->vna_flags, a->vna_other,
1283 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1284 }
1285 }
1286
b34976b6 1287 return TRUE;
252b5132
RH
1288
1289 error_return:
1290 if (dynbuf != NULL)
1291 free (dynbuf);
b34976b6 1292 return FALSE;
252b5132
RH
1293}
1294
1295/* Display ELF-specific fields of a symbol. */
1296
1297void
217aa764
AM
1298bfd_elf_print_symbol (bfd *abfd,
1299 void *filep,
1300 asymbol *symbol,
1301 bfd_print_symbol_type how)
252b5132 1302{
217aa764 1303 FILE *file = filep;
252b5132
RH
1304 switch (how)
1305 {
1306 case bfd_print_symbol_name:
1307 fprintf (file, "%s", symbol->name);
1308 break;
1309 case bfd_print_symbol_more:
1310 fprintf (file, "elf ");
60b89a18 1311 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1312 fprintf (file, " %lx", (long) symbol->flags);
1313 break;
1314 case bfd_print_symbol_all:
1315 {
4e8a9624
AM
1316 const char *section_name;
1317 const char *name = NULL;
9c5bfbb7 1318 const struct elf_backend_data *bed;
7a13edea 1319 unsigned char st_other;
dbb410c3 1320 bfd_vma val;
c044fabd 1321
252b5132 1322 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1323
1324 bed = get_elf_backend_data (abfd);
1325 if (bed->elf_backend_print_symbol_all)
c044fabd 1326 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1327
1328 if (name == NULL)
1329 {
7ee38065 1330 name = symbol->name;
217aa764 1331 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1332 }
1333
252b5132
RH
1334 fprintf (file, " %s\t", section_name);
1335 /* Print the "other" value for a symbol. For common symbols,
1336 we've already printed the size; now print the alignment.
1337 For other symbols, we have no specified alignment, and
1338 we've printed the address; now print the size. */
dbb410c3
AM
1339 if (bfd_is_com_section (symbol->section))
1340 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1341 else
1342 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1343 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1344
1345 /* If we have version information, print it. */
1346 if (elf_tdata (abfd)->dynversym_section != 0
1347 && (elf_tdata (abfd)->dynverdef_section != 0
1348 || elf_tdata (abfd)->dynverref_section != 0))
1349 {
1350 unsigned int vernum;
1351 const char *version_string;
1352
1353 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1354
1355 if (vernum == 0)
1356 version_string = "";
1357 else if (vernum == 1)
1358 version_string = "Base";
1359 else if (vernum <= elf_tdata (abfd)->cverdefs)
1360 version_string =
1361 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1362 else
1363 {
1364 Elf_Internal_Verneed *t;
1365
1366 version_string = "";
1367 for (t = elf_tdata (abfd)->verref;
1368 t != NULL;
1369 t = t->vn_nextref)
1370 {
1371 Elf_Internal_Vernaux *a;
1372
1373 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1374 {
1375 if (a->vna_other == vernum)
1376 {
1377 version_string = a->vna_nodename;
1378 break;
1379 }
1380 }
1381 }
1382 }
1383
1384 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1385 fprintf (file, " %-11s", version_string);
1386 else
1387 {
1388 int i;
1389
1390 fprintf (file, " (%s)", version_string);
1391 for (i = 10 - strlen (version_string); i > 0; --i)
1392 putc (' ', file);
1393 }
1394 }
1395
1396 /* If the st_other field is not zero, print it. */
7a13edea 1397 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1398
7a13edea
NC
1399 switch (st_other)
1400 {
1401 case 0: break;
1402 case STV_INTERNAL: fprintf (file, " .internal"); break;
1403 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1404 case STV_PROTECTED: fprintf (file, " .protected"); break;
1405 default:
1406 /* Some other non-defined flags are also present, so print
1407 everything hex. */
1408 fprintf (file, " 0x%02x", (unsigned int) st_other);
1409 }
252b5132 1410
587ff49e 1411 fprintf (file, " %s", name);
252b5132
RH
1412 }
1413 break;
1414 }
1415}
1416\f
1417/* Create an entry in an ELF linker hash table. */
1418
1419struct bfd_hash_entry *
217aa764
AM
1420_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1421 struct bfd_hash_table *table,
1422 const char *string)
252b5132 1423{
252b5132
RH
1424 /* Allocate the structure if it has not already been allocated by a
1425 subclass. */
51b64d56
AM
1426 if (entry == NULL)
1427 {
1428 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1429 if (entry == NULL)
1430 return entry;
1431 }
252b5132
RH
1432
1433 /* Call the allocation method of the superclass. */
51b64d56
AM
1434 entry = _bfd_link_hash_newfunc (entry, table, string);
1435 if (entry != NULL)
252b5132 1436 {
51b64d56
AM
1437 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1438 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1439
252b5132
RH
1440 /* Set local fields. */
1441 ret->indx = -1;
252b5132 1442 ret->dynindx = -1;
a6aa5195
AM
1443 ret->got = htab->init_got_refcount;
1444 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1445 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1446 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1447 /* Assume that we have been called by a non-ELF symbol reader.
1448 This flag is then reset by the code which reads an ELF input
1449 file. This ensures that a symbol created by a non-ELF symbol
1450 reader will have the flag set correctly. */
f5385ebf 1451 ret->non_elf = 1;
252b5132
RH
1452 }
1453
51b64d56 1454 return entry;
252b5132
RH
1455}
1456
2920b85c 1457/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1458 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1459
c61b8717 1460void
9c5bfbb7 1461_bfd_elf_link_hash_copy_indirect (const struct elf_backend_data *bed,
217aa764
AM
1462 struct elf_link_hash_entry *dir,
1463 struct elf_link_hash_entry *ind)
2920b85c 1464{
3c3e9281 1465 bfd_signed_vma tmp;
b48fa14c 1466 bfd_signed_vma lowest_valid = bed->can_refcount;
3c3e9281 1467
2920b85c
RH
1468 /* Copy down any references that we may have already seen to the
1469 symbol which just became indirect. */
1470
f5385ebf
AM
1471 dir->ref_dynamic |= ind->ref_dynamic;
1472 dir->ref_regular |= ind->ref_regular;
1473 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1474 dir->non_got_ref |= ind->non_got_ref;
1475 dir->needs_plt |= ind->needs_plt;
1476 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1477
1e370bd2 1478 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1479 return;
1480
51b64d56 1481 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1482 These may have been already set up by a check_relocs routine. */
3c3e9281 1483 tmp = dir->got.refcount;
b48fa14c 1484 if (tmp < lowest_valid)
2920b85c 1485 {
51b64d56 1486 dir->got.refcount = ind->got.refcount;
3c3e9281 1487 ind->got.refcount = tmp;
2920b85c 1488 }
3c3e9281 1489 else
b48fa14c 1490 BFD_ASSERT (ind->got.refcount < lowest_valid);
2920b85c 1491
3c3e9281 1492 tmp = dir->plt.refcount;
b48fa14c 1493 if (tmp < lowest_valid)
2920b85c 1494 {
51b64d56 1495 dir->plt.refcount = ind->plt.refcount;
3c3e9281 1496 ind->plt.refcount = tmp;
2920b85c 1497 }
3c3e9281 1498 else
b48fa14c 1499 BFD_ASSERT (ind->plt.refcount < lowest_valid);
2920b85c
RH
1500
1501 if (dir->dynindx == -1)
1502 {
1503 dir->dynindx = ind->dynindx;
1504 dir->dynstr_index = ind->dynstr_index;
1505 ind->dynindx = -1;
1506 ind->dynstr_index = 0;
1507 }
3c3e9281
AM
1508 else
1509 BFD_ASSERT (ind->dynindx == -1);
2920b85c
RH
1510}
1511
c61b8717 1512void
217aa764
AM
1513_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1514 struct elf_link_hash_entry *h,
1515 bfd_boolean force_local)
2920b85c 1516{
a6aa5195 1517 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1518 h->needs_plt = 0;
e5094212
AM
1519 if (force_local)
1520 {
f5385ebf 1521 h->forced_local = 1;
e5094212
AM
1522 if (h->dynindx != -1)
1523 {
1524 h->dynindx = -1;
1525 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1526 h->dynstr_index);
1527 }
1528 }
2920b85c
RH
1529}
1530
252b5132
RH
1531/* Initialize an ELF linker hash table. */
1532
b34976b6 1533bfd_boolean
217aa764
AM
1534_bfd_elf_link_hash_table_init
1535 (struct elf_link_hash_table *table,
1536 bfd *abfd,
1537 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1538 struct bfd_hash_table *,
1539 const char *))
252b5132 1540{
b34976b6 1541 bfd_boolean ret;
a6aa5195 1542 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1543
b34976b6 1544 table->dynamic_sections_created = FALSE;
252b5132 1545 table->dynobj = NULL;
a6aa5195
AM
1546 table->init_got_refcount.refcount = can_refcount - 1;
1547 table->init_plt_refcount.refcount = can_refcount - 1;
1548 table->init_got_offset.offset = -(bfd_vma) 1;
1549 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1550 /* The first dynamic symbol is a dummy. */
1551 table->dynsymcount = 1;
1552 table->dynstr = NULL;
1553 table->bucketcount = 0;
1554 table->needed = NULL;
1555 table->hgot = NULL;
f5fa8ca2 1556 table->merge_info = NULL;
3722b82f 1557 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1558 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1559 table->dynlocal = NULL;
73722af0 1560 table->runpath = NULL;
e1918d23
AM
1561 table->tls_sec = NULL;
1562 table->tls_size = 0;
73722af0 1563 table->loaded = NULL;
67687978 1564 table->is_relocatable_executable = FALSE;
73722af0
AM
1565
1566 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc);
8ea2e4bd
NC
1567 table->root.type = bfd_link_elf_hash_table;
1568
1569 return ret;
252b5132
RH
1570}
1571
1572/* Create an ELF linker hash table. */
1573
1574struct bfd_link_hash_table *
217aa764 1575_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1576{
1577 struct elf_link_hash_table *ret;
dc810e39 1578 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1579
217aa764
AM
1580 ret = bfd_malloc (amt);
1581 if (ret == NULL)
252b5132
RH
1582 return NULL;
1583
1584 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc))
1585 {
e2d34d7d 1586 free (ret);
252b5132
RH
1587 return NULL;
1588 }
1589
1590 return &ret->root;
1591}
1592
1593/* This is a hook for the ELF emulation code in the generic linker to
1594 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1595 entry for a dynamic object. */
252b5132
RH
1596
1597void
217aa764 1598bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1599{
1600 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1601 && bfd_get_format (abfd) == bfd_object)
1602 elf_dt_name (abfd) = name;
1603}
1604
e56f61be
L
1605int
1606bfd_elf_get_dyn_lib_class (bfd *abfd)
1607{
1608 int lib_class;
1609 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1610 && bfd_get_format (abfd) == bfd_object)
1611 lib_class = elf_dyn_lib_class (abfd);
1612 else
1613 lib_class = 0;
1614 return lib_class;
1615}
1616
74816898 1617void
4a43e768 1618bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1619{
1620 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1621 && bfd_get_format (abfd) == bfd_object)
4a43e768 1622 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1623}
1624
252b5132
RH
1625/* Get the list of DT_NEEDED entries for a link. This is a hook for
1626 the linker ELF emulation code. */
1627
1628struct bfd_link_needed_list *
217aa764
AM
1629bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1630 struct bfd_link_info *info)
252b5132 1631{
0eddce27 1632 if (! is_elf_hash_table (info->hash))
252b5132
RH
1633 return NULL;
1634 return elf_hash_table (info)->needed;
1635}
1636
a963dc6a
L
1637/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1638 hook for the linker ELF emulation code. */
1639
1640struct bfd_link_needed_list *
217aa764
AM
1641bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1642 struct bfd_link_info *info)
a963dc6a 1643{
0eddce27 1644 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1645 return NULL;
1646 return elf_hash_table (info)->runpath;
1647}
1648
252b5132
RH
1649/* Get the name actually used for a dynamic object for a link. This
1650 is the SONAME entry if there is one. Otherwise, it is the string
1651 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1652
1653const char *
217aa764 1654bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1655{
1656 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1657 && bfd_get_format (abfd) == bfd_object)
1658 return elf_dt_name (abfd);
1659 return NULL;
1660}
1661
1662/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1663 the ELF linker emulation code. */
1664
b34976b6 1665bfd_boolean
217aa764
AM
1666bfd_elf_get_bfd_needed_list (bfd *abfd,
1667 struct bfd_link_needed_list **pneeded)
252b5132
RH
1668{
1669 asection *s;
1670 bfd_byte *dynbuf = NULL;
1671 int elfsec;
dc810e39 1672 unsigned long shlink;
252b5132
RH
1673 bfd_byte *extdyn, *extdynend;
1674 size_t extdynsize;
217aa764 1675 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1676
1677 *pneeded = NULL;
1678
1679 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1680 || bfd_get_format (abfd) != bfd_object)
b34976b6 1681 return TRUE;
252b5132
RH
1682
1683 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1684 if (s == NULL || s->size == 0)
b34976b6 1685 return TRUE;
252b5132 1686
eea6121a 1687 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1688 goto error_return;
1689
1690 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1691 if (elfsec == -1)
1692 goto error_return;
1693
dc810e39 1694 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1695
1696 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1697 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1698
1699 extdyn = dynbuf;
eea6121a 1700 extdynend = extdyn + s->size;
252b5132
RH
1701 for (; extdyn < extdynend; extdyn += extdynsize)
1702 {
1703 Elf_Internal_Dyn dyn;
1704
217aa764 1705 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1706
1707 if (dyn.d_tag == DT_NULL)
1708 break;
1709
1710 if (dyn.d_tag == DT_NEEDED)
1711 {
1712 const char *string;
1713 struct bfd_link_needed_list *l;
dc810e39
AM
1714 unsigned int tagv = dyn.d_un.d_val;
1715 bfd_size_type amt;
252b5132 1716
dc810e39 1717 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1718 if (string == NULL)
1719 goto error_return;
1720
dc810e39 1721 amt = sizeof *l;
217aa764 1722 l = bfd_alloc (abfd, amt);
252b5132
RH
1723 if (l == NULL)
1724 goto error_return;
1725
1726 l->by = abfd;
1727 l->name = string;
1728 l->next = *pneeded;
1729 *pneeded = l;
1730 }
1731 }
1732
1733 free (dynbuf);
1734
b34976b6 1735 return TRUE;
252b5132
RH
1736
1737 error_return:
1738 if (dynbuf != NULL)
1739 free (dynbuf);
b34976b6 1740 return FALSE;
252b5132
RH
1741}
1742\f
1743/* Allocate an ELF string table--force the first byte to be zero. */
1744
1745struct bfd_strtab_hash *
217aa764 1746_bfd_elf_stringtab_init (void)
252b5132
RH
1747{
1748 struct bfd_strtab_hash *ret;
1749
1750 ret = _bfd_stringtab_init ();
1751 if (ret != NULL)
1752 {
1753 bfd_size_type loc;
1754
b34976b6 1755 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1756 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1757 if (loc == (bfd_size_type) -1)
1758 {
1759 _bfd_stringtab_free (ret);
1760 ret = NULL;
1761 }
1762 }
1763 return ret;
1764}
1765\f
1766/* ELF .o/exec file reading */
1767
c044fabd 1768/* Create a new bfd section from an ELF section header. */
252b5132 1769
b34976b6 1770bfd_boolean
217aa764 1771bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1772{
1773 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1774 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1775 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1776 const char *name;
252b5132 1777
1b3a8575
AM
1778 name = bfd_elf_string_from_elf_section (abfd,
1779 elf_elfheader (abfd)->e_shstrndx,
1780 hdr->sh_name);
933d961a
JJ
1781 if (name == NULL)
1782 return FALSE;
252b5132
RH
1783
1784 switch (hdr->sh_type)
1785 {
1786 case SHT_NULL:
1787 /* Inactive section. Throw it away. */
b34976b6 1788 return TRUE;
252b5132
RH
1789
1790 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1791 case SHT_NOBITS: /* .bss section. */
1792 case SHT_HASH: /* .hash section. */
1793 case SHT_NOTE: /* .note section. */
25e27870
L
1794 case SHT_INIT_ARRAY: /* .init_array section. */
1795 case SHT_FINI_ARRAY: /* .fini_array section. */
1796 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1797 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1798 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1799
797fc050 1800 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1801 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1802 return FALSE;
8e0ed13f
NC
1803 if (hdr->sh_link > elf_numsections (abfd)
1804 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1805 return FALSE;
797fc050
AM
1806 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1807 {
1808 Elf_Internal_Shdr *dynsymhdr;
1809
1810 /* The shared libraries distributed with hpux11 have a bogus
1811 sh_link field for the ".dynamic" section. Find the
1812 string table for the ".dynsym" section instead. */
1813 if (elf_dynsymtab (abfd) != 0)
1814 {
1815 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1816 hdr->sh_link = dynsymhdr->sh_link;
1817 }
1818 else
1819 {
1820 unsigned int i, num_sec;
1821
1822 num_sec = elf_numsections (abfd);
1823 for (i = 1; i < num_sec; i++)
1824 {
1825 dynsymhdr = elf_elfsections (abfd)[i];
1826 if (dynsymhdr->sh_type == SHT_DYNSYM)
1827 {
1828 hdr->sh_link = dynsymhdr->sh_link;
1829 break;
1830 }
1831 }
1832 }
1833 }
1834 break;
1835
252b5132
RH
1836 case SHT_SYMTAB: /* A symbol table */
1837 if (elf_onesymtab (abfd) == shindex)
b34976b6 1838 return TRUE;
252b5132 1839
a50b2160
JJ
1840 if (hdr->sh_entsize != bed->s->sizeof_sym)
1841 return FALSE;
252b5132
RH
1842 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1843 elf_onesymtab (abfd) = shindex;
1844 elf_tdata (abfd)->symtab_hdr = *hdr;
1845 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1846 abfd->flags |= HAS_SYMS;
1847
1848 /* Sometimes a shared object will map in the symbol table. If
1849 SHF_ALLOC is set, and this is a shared object, then we also
1850 treat this section as a BFD section. We can not base the
1851 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1852 set in a relocatable object file, which would confuse the
252b5132
RH
1853 linker. */
1854 if ((hdr->sh_flags & SHF_ALLOC) != 0
1855 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1856 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1857 shindex))
b34976b6 1858 return FALSE;
252b5132 1859
1b3a8575
AM
1860 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1861 can't read symbols without that section loaded as well. It
1862 is most likely specified by the next section header. */
1863 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1864 {
1865 unsigned int i, num_sec;
1866
1867 num_sec = elf_numsections (abfd);
1868 for (i = shindex + 1; i < num_sec; i++)
1869 {
1870 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1871 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1872 && hdr2->sh_link == shindex)
1873 break;
1874 }
1875 if (i == num_sec)
1876 for (i = 1; i < shindex; i++)
1877 {
1878 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1879 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1880 && hdr2->sh_link == shindex)
1881 break;
1882 }
1883 if (i != shindex)
1884 return bfd_section_from_shdr (abfd, i);
1885 }
b34976b6 1886 return TRUE;
252b5132
RH
1887
1888 case SHT_DYNSYM: /* A dynamic symbol table */
1889 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1890 return TRUE;
252b5132 1891
a50b2160
JJ
1892 if (hdr->sh_entsize != bed->s->sizeof_sym)
1893 return FALSE;
252b5132
RH
1894 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1895 elf_dynsymtab (abfd) = shindex;
1896 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1897 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1898 abfd->flags |= HAS_SYMS;
1899
1900 /* Besides being a symbol table, we also treat this as a regular
1901 section, so that objcopy can handle it. */
6dc132d9 1902 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1903
9ad5cbcf
AM
1904 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1905 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1906 return TRUE;
9ad5cbcf 1907
1b3a8575 1908 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1909 elf_symtab_shndx (abfd) = shindex;
1910 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1911 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1912 return TRUE;
9ad5cbcf 1913
252b5132
RH
1914 case SHT_STRTAB: /* A string table */
1915 if (hdr->bfd_section != NULL)
b34976b6 1916 return TRUE;
252b5132
RH
1917 if (ehdr->e_shstrndx == shindex)
1918 {
1919 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1920 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1921 return TRUE;
252b5132 1922 }
1b3a8575
AM
1923 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1924 {
1925 symtab_strtab:
1926 elf_tdata (abfd)->strtab_hdr = *hdr;
1927 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1928 return TRUE;
1929 }
1930 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1931 {
1932 dynsymtab_strtab:
1933 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1934 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1935 elf_elfsections (abfd)[shindex] = hdr;
1936 /* We also treat this as a regular section, so that objcopy
1937 can handle it. */
6dc132d9
L
1938 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1939 shindex);
1b3a8575 1940 }
252b5132 1941
1b3a8575
AM
1942 /* If the string table isn't one of the above, then treat it as a
1943 regular section. We need to scan all the headers to be sure,
1944 just in case this strtab section appeared before the above. */
1945 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1946 {
1947 unsigned int i, num_sec;
252b5132 1948
1b3a8575
AM
1949 num_sec = elf_numsections (abfd);
1950 for (i = 1; i < num_sec; i++)
1951 {
1952 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1953 if (hdr2->sh_link == shindex)
1954 {
933d961a
JJ
1955 /* Prevent endless recursion on broken objects. */
1956 if (i == shindex)
1957 return FALSE;
1b3a8575
AM
1958 if (! bfd_section_from_shdr (abfd, i))
1959 return FALSE;
1960 if (elf_onesymtab (abfd) == i)
1961 goto symtab_strtab;
1962 if (elf_dynsymtab (abfd) == i)
1963 goto dynsymtab_strtab;
1964 }
1965 }
1966 }
6dc132d9 1967 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1968
1969 case SHT_REL:
1970 case SHT_RELA:
1971 /* *These* do a lot of work -- but build no sections! */
1972 {
1973 asection *target_sect;
1974 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1975 unsigned int num_sec = elf_numsections (abfd);
252b5132 1976
aa2ca951
JJ
1977 if (hdr->sh_entsize
1978 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1979 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1980 return FALSE;
1981
03ae5f59 1982 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1983 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1984 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1985 {
1986 ((*_bfd_error_handler)
d003868e
AM
1987 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1988 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1989 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1990 shindex);
03ae5f59
ILT
1991 }
1992
252b5132
RH
1993 /* For some incomprehensible reason Oracle distributes
1994 libraries for Solaris in which some of the objects have
1995 bogus sh_link fields. It would be nice if we could just
1996 reject them, but, unfortunately, some people need to use
1997 them. We scan through the section headers; if we find only
1998 one suitable symbol table, we clobber the sh_link to point
1999 to it. I hope this doesn't break anything. */
2000 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2001 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2002 {
9ad5cbcf 2003 unsigned int scan;
252b5132
RH
2004 int found;
2005
2006 found = 0;
9ad5cbcf 2007 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2008 {
2009 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2010 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2011 {
2012 if (found != 0)
2013 {
2014 found = 0;
2015 break;
2016 }
2017 found = scan;
2018 }
2019 }
2020 if (found != 0)
2021 hdr->sh_link = found;
2022 }
2023
2024 /* Get the symbol table. */
1b3a8575
AM
2025 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2026 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2027 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 2028 return FALSE;
252b5132
RH
2029
2030 /* If this reloc section does not use the main symbol table we
2031 don't treat it as a reloc section. BFD can't adequately
2032 represent such a section, so at least for now, we don't
c044fabd 2033 try. We just present it as a normal section. We also
60bcf0fa 2034 can't use it as a reloc section if it points to the null
c044fabd 2035 section. */
60bcf0fa 2036 if (hdr->sh_link != elf_onesymtab (abfd) || hdr->sh_info == SHN_UNDEF)
6dc132d9
L
2037 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2038 shindex);
252b5132 2039
a50b2160
JJ
2040 /* Prevent endless recursion on broken objects. */
2041 if (elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2042 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2043 return FALSE;
252b5132 2044 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2045 return FALSE;
252b5132
RH
2046 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2047 if (target_sect == NULL)
b34976b6 2048 return FALSE;
252b5132
RH
2049
2050 if ((target_sect->flags & SEC_RELOC) == 0
2051 || target_sect->reloc_count == 0)
2052 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2053 else
2054 {
dc810e39 2055 bfd_size_type amt;
252b5132 2056 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2057 amt = sizeof (*hdr2);
217aa764 2058 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2059 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2060 }
2061 *hdr2 = *hdr;
2062 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2063 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2064 target_sect->flags |= SEC_RELOC;
2065 target_sect->relocation = NULL;
2066 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2067 /* In the section to which the relocations apply, mark whether
2068 its relocations are of the REL or RELA variety. */
72730e0c 2069 if (hdr->sh_size != 0)
68bfbfcc 2070 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2071 abfd->flags |= HAS_RELOC;
b34976b6 2072 return TRUE;
252b5132
RH
2073 }
2074 break;
2075
2076 case SHT_GNU_verdef:
2077 elf_dynverdef (abfd) = shindex;
2078 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2079 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2080 break;
2081
2082 case SHT_GNU_versym:
a50b2160
JJ
2083 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2084 return FALSE;
252b5132
RH
2085 elf_dynversym (abfd) = shindex;
2086 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2087 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2088 break;
2089
2090 case SHT_GNU_verneed:
2091 elf_dynverref (abfd) = shindex;
2092 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2093 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2094 break;
2095
2096 case SHT_SHLIB:
b34976b6 2097 return TRUE;
252b5132 2098
dbb410c3 2099 case SHT_GROUP:
b885599b
AM
2100 /* We need a BFD section for objcopy and relocatable linking,
2101 and it's handy to have the signature available as the section
2102 name. */
a50b2160
JJ
2103 if (hdr->sh_entsize != GRP_ENTRY_SIZE)
2104 return FALSE;
b885599b
AM
2105 name = group_signature (abfd, hdr);
2106 if (name == NULL)
b34976b6 2107 return FALSE;
6dc132d9 2108 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2109 return FALSE;
dbb410c3
AM
2110 if (hdr->contents != NULL)
2111 {
2112 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2113 unsigned int n_elt = hdr->sh_size / 4;
2114 asection *s;
2115
b885599b
AM
2116 if (idx->flags & GRP_COMDAT)
2117 hdr->bfd_section->flags
2118 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2119
45c5e9ed
L
2120 /* We try to keep the same section order as it comes in. */
2121 idx += n_elt;
dbb410c3 2122 while (--n_elt != 0)
45c5e9ed 2123 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2124 && elf_next_in_group (s) != NULL)
dbb410c3 2125 {
945906ff 2126 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2127 break;
2128 }
2129 }
2130 break;
2131
252b5132
RH
2132 default:
2133 /* Check for any processor-specific section types. */
6dc132d9
L
2134 return bed->elf_backend_section_from_shdr (abfd, hdr, name,
2135 shindex);
252b5132
RH
2136 }
2137
b34976b6 2138 return TRUE;
252b5132
RH
2139}
2140
ec338859
AM
2141/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2142 Return SEC for sections that have no elf section, and NULL on error. */
2143
2144asection *
217aa764
AM
2145bfd_section_from_r_symndx (bfd *abfd,
2146 struct sym_sec_cache *cache,
2147 asection *sec,
2148 unsigned long r_symndx)
ec338859 2149{
ec338859 2150 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2151 unsigned char esym[sizeof (Elf64_External_Sym)];
2152 Elf_External_Sym_Shndx eshndx;
2153 Elf_Internal_Sym isym;
ec338859
AM
2154 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2155
2156 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2157 return cache->sec[ent];
2158
2159 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2160 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2161 &isym, esym, &eshndx) == NULL)
ec338859 2162 return NULL;
9ad5cbcf 2163
ec338859
AM
2164 if (cache->abfd != abfd)
2165 {
2166 memset (cache->indx, -1, sizeof (cache->indx));
2167 cache->abfd = abfd;
2168 }
2169 cache->indx[ent] = r_symndx;
2170 cache->sec[ent] = sec;
50bc7936
AM
2171 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2172 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2173 {
2174 asection *s;
6cdc0ccc 2175 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2176 if (s != NULL)
2177 cache->sec[ent] = s;
2178 }
2179 return cache->sec[ent];
2180}
2181
252b5132
RH
2182/* Given an ELF section number, retrieve the corresponding BFD
2183 section. */
2184
2185asection *
217aa764 2186bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2187{
9ad5cbcf 2188 if (index >= elf_numsections (abfd))
252b5132
RH
2189 return NULL;
2190 return elf_elfsections (abfd)[index]->bfd_section;
2191}
2192
b35d266b 2193static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2194{
7dcb9820 2195 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7f4d3958
L
2196 { NULL, 0, 0, 0, 0 }
2197};
2198
b35d266b 2199static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2200{
7dcb9820 2201 { ".comment", 8, 0, SHT_PROGBITS, 0 },
7f4d3958
L
2202 { NULL, 0, 0, 0, 0 }
2203};
2204
b35d266b 2205static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2206{
7dcb9820
AM
2207 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2208 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2209 { ".debug", 6, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2210 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2211 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2212 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2213 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2214 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2215 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2216 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
7f4d3958
L
2217 { NULL, 0, 0, 0, 0 }
2218};
2219
b35d266b 2220static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958
L
2221{
2222 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2223 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2224 { NULL, 0, 0, 0, 0 }
2225};
2226
b35d266b 2227static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958
L
2228{
2229 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820 2230 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2231 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2232 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2233 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
7f4d3958
L
2234 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2235 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
2236 { NULL, 0, 0, 0, 0 }
2237};
2238
b35d266b 2239static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958
L
2240{
2241 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2242 { NULL, 0, 0, 0, 0 }
2243};
2244
b35d266b 2245static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958
L
2246{
2247 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2248 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2249 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2250 { NULL, 0, 0, 0, 0 }
2251};
2252
b35d266b 2253static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958
L
2254{
2255 { ".line", 5, 0, SHT_PROGBITS, 0 },
2256 { NULL, 0, 0, 0, 0 }
2257};
2258
b35d266b 2259static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2260{
45c5e9ed 2261 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820 2262 { ".note", 5, -1, SHT_NOTE, 0 },
7f4d3958
L
2263 { NULL, 0, 0, 0, 0 }
2264};
2265
b35d266b 2266static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958
L
2267{
2268 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2269 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2270 { NULL, 0, 0, 0, 0 }
2271};
2272
b35d266b 2273static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958
L
2274{
2275 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2276 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
7dcb9820
AM
2277 { ".rela", 5, -1, SHT_RELA, 0 },
2278 { ".rel", 4, -1, SHT_REL, 0 },
7f4d3958
L
2279 { NULL, 0, 0, 0, 0 }
2280};
2281
b35d266b 2282static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958
L
2283{
2284 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2285 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2286 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
7dcb9820
AM
2287 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2288 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2289};
2290
b35d266b 2291static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958
L
2292{
2293 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2294 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2295 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2296 { NULL, 0, 0, 0, 0 }
2297};
2298
b35d266b 2299static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2300{
7f4d3958
L
2301 special_sections_b, /* 'b' */
2302 special_sections_c, /* 'b' */
2303 special_sections_d, /* 'd' */
2304 NULL, /* 'e' */
2305 special_sections_f, /* 'f' */
2306 special_sections_g, /* 'g' */
2307 special_sections_h, /* 'h' */
2308 special_sections_i, /* 'i' */
2309 NULL, /* 'j' */
2310 NULL, /* 'k' */
2311 special_sections_l, /* 'l' */
2312 NULL, /* 'm' */
2313 special_sections_n, /* 'n' */
2314 NULL, /* 'o' */
2315 special_sections_p, /* 'p' */
2316 NULL, /* 'q' */
2317 special_sections_r, /* 'r' */
2318 special_sections_s, /* 's' */
2319 special_sections_t, /* 't' */
7f4d3958
L
2320};
2321
551b43fd
AM
2322const struct bfd_elf_special_section *
2323_bfd_elf_get_special_section (const char *name,
2324 const struct bfd_elf_special_section *spec,
2325 unsigned int rela)
2f89ff8d
L
2326{
2327 int i;
7f4d3958 2328 int len;
7f4d3958 2329
551b43fd 2330 len = strlen (name);
7f4d3958 2331
551b43fd 2332 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2333 {
2334 int suffix_len;
551b43fd 2335 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2336
2337 if (len < prefix_len)
2338 continue;
551b43fd 2339 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2340 continue;
2341
551b43fd 2342 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2343 if (suffix_len <= 0)
2344 {
2345 if (name[prefix_len] != 0)
2346 {
2347 if (suffix_len == 0)
2348 continue;
2349 if (name[prefix_len] != '.'
2350 && (suffix_len == -2
551b43fd 2351 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2352 continue;
2353 }
2354 }
2355 else
2356 {
2357 if (len < prefix_len + suffix_len)
2358 continue;
2359 if (memcmp (name + len - suffix_len,
551b43fd 2360 spec[i].prefix + prefix_len,
7dcb9820
AM
2361 suffix_len) != 0)
2362 continue;
2363 }
551b43fd 2364 return &spec[i];
7dcb9820 2365 }
2f89ff8d
L
2366
2367 return NULL;
2368}
2369
7dcb9820 2370const struct bfd_elf_special_section *
29ef7005 2371_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2372{
551b43fd
AM
2373 int i;
2374 const struct bfd_elf_special_section *spec;
29ef7005 2375 const struct elf_backend_data *bed;
2f89ff8d
L
2376
2377 /* See if this is one of the special sections. */
551b43fd
AM
2378 if (sec->name == NULL)
2379 return NULL;
2f89ff8d 2380
29ef7005
L
2381 bed = get_elf_backend_data (abfd);
2382 spec = bed->special_sections;
2383 if (spec)
2384 {
2385 spec = _bfd_elf_get_special_section (sec->name,
2386 bed->special_sections,
2387 sec->use_rela_p);
2388 if (spec != NULL)
2389 return spec;
2390 }
2391
551b43fd
AM
2392 if (sec->name[0] != '.')
2393 return NULL;
2f89ff8d 2394
551b43fd
AM
2395 i = sec->name[1] - 'b';
2396 if (i < 0 || i > 't' - 'b')
2397 return NULL;
2398
2399 spec = special_sections[i];
2f89ff8d 2400
551b43fd
AM
2401 if (spec == NULL)
2402 return NULL;
2403
2404 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2405}
2406
b34976b6 2407bfd_boolean
217aa764 2408_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2409{
2410 struct bfd_elf_section_data *sdata;
551b43fd 2411 const struct elf_backend_data *bed;
7dcb9820 2412 const struct bfd_elf_special_section *ssect;
252b5132 2413
f0abc2a1
AM
2414 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2415 if (sdata == NULL)
2416 {
217aa764 2417 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2418 if (sdata == NULL)
2419 return FALSE;
217aa764 2420 sec->used_by_bfd = sdata;
f0abc2a1 2421 }
bf572ba0 2422
551b43fd
AM
2423 /* Indicate whether or not this section should use RELA relocations. */
2424 bed = get_elf_backend_data (abfd);
2425 sec->use_rela_p = bed->default_use_rela_p;
2426
3496cb2a
L
2427 /* When we read a file, we don't need section type and flags unless
2428 it is a linker created section. They will be overridden in
2429 _bfd_elf_make_section_from_shdr anyway. */
2430 if (abfd->direction != read_direction
2431 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2432 {
551b43fd 2433 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2434 if (ssect != NULL)
2435 {
2436 elf_section_type (sec) = ssect->type;
2437 elf_section_flags (sec) = ssect->attr;
2438 }
2f89ff8d
L
2439 }
2440
b34976b6 2441 return TRUE;
252b5132
RH
2442}
2443
2444/* Create a new bfd section from an ELF program header.
2445
2446 Since program segments have no names, we generate a synthetic name
2447 of the form segment<NUM>, where NUM is generally the index in the
2448 program header table. For segments that are split (see below) we
2449 generate the names segment<NUM>a and segment<NUM>b.
2450
2451 Note that some program segments may have a file size that is different than
2452 (less than) the memory size. All this means is that at execution the
2453 system must allocate the amount of memory specified by the memory size,
2454 but only initialize it with the first "file size" bytes read from the
2455 file. This would occur for example, with program segments consisting
2456 of combined data+bss.
2457
2458 To handle the above situation, this routine generates TWO bfd sections
2459 for the single program segment. The first has the length specified by
2460 the file size of the segment, and the second has the length specified
2461 by the difference between the two sizes. In effect, the segment is split
2462 into it's initialized and uninitialized parts.
2463
2464 */
2465
b34976b6 2466bfd_boolean
217aa764
AM
2467_bfd_elf_make_section_from_phdr (bfd *abfd,
2468 Elf_Internal_Phdr *hdr,
2469 int index,
2470 const char *typename)
252b5132
RH
2471{
2472 asection *newsect;
2473 char *name;
2474 char namebuf[64];
d4c88bbb 2475 size_t len;
252b5132
RH
2476 int split;
2477
2478 split = ((hdr->p_memsz > 0)
2479 && (hdr->p_filesz > 0)
2480 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2481 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2482 len = strlen (namebuf) + 1;
217aa764 2483 name = bfd_alloc (abfd, len);
252b5132 2484 if (!name)
b34976b6 2485 return FALSE;
d4c88bbb 2486 memcpy (name, namebuf, len);
252b5132
RH
2487 newsect = bfd_make_section (abfd, name);
2488 if (newsect == NULL)
b34976b6 2489 return FALSE;
252b5132
RH
2490 newsect->vma = hdr->p_vaddr;
2491 newsect->lma = hdr->p_paddr;
eea6121a 2492 newsect->size = hdr->p_filesz;
252b5132
RH
2493 newsect->filepos = hdr->p_offset;
2494 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2495 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2496 if (hdr->p_type == PT_LOAD)
2497 {
2498 newsect->flags |= SEC_ALLOC;
2499 newsect->flags |= SEC_LOAD;
2500 if (hdr->p_flags & PF_X)
2501 {
2502 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2503 may be data. */
252b5132
RH
2504 newsect->flags |= SEC_CODE;
2505 }
2506 }
2507 if (!(hdr->p_flags & PF_W))
2508 {
2509 newsect->flags |= SEC_READONLY;
2510 }
2511
2512 if (split)
2513 {
27ac83bf 2514 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2515 len = strlen (namebuf) + 1;
217aa764 2516 name = bfd_alloc (abfd, len);
252b5132 2517 if (!name)
b34976b6 2518 return FALSE;
d4c88bbb 2519 memcpy (name, namebuf, len);
252b5132
RH
2520 newsect = bfd_make_section (abfd, name);
2521 if (newsect == NULL)
b34976b6 2522 return FALSE;
252b5132
RH
2523 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2524 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2525 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2526 if (hdr->p_type == PT_LOAD)
2527 {
2528 newsect->flags |= SEC_ALLOC;
2529 if (hdr->p_flags & PF_X)
2530 newsect->flags |= SEC_CODE;
2531 }
2532 if (!(hdr->p_flags & PF_W))
2533 newsect->flags |= SEC_READONLY;
2534 }
2535
b34976b6 2536 return TRUE;
252b5132
RH
2537}
2538
b34976b6 2539bfd_boolean
217aa764 2540bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2541{
9c5bfbb7 2542 const struct elf_backend_data *bed;
20cfcaae
NC
2543
2544 switch (hdr->p_type)
2545 {
2546 case PT_NULL:
2547 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2548
2549 case PT_LOAD:
2550 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2551
2552 case PT_DYNAMIC:
2553 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2554
2555 case PT_INTERP:
2556 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2557
2558 case PT_NOTE:
2559 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2560 return FALSE;
217aa764 2561 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2562 return FALSE;
2563 return TRUE;
20cfcaae
NC
2564
2565 case PT_SHLIB:
2566 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2567
2568 case PT_PHDR:
2569 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2570
811072d8
RM
2571 case PT_GNU_EH_FRAME:
2572 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2573 "eh_frame_hdr");
2574
9ee5e499
JJ
2575 case PT_GNU_STACK:
2576 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2577
8c37241b
JJ
2578 case PT_GNU_RELRO:
2579 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2580
20cfcaae 2581 default:
8c1acd09 2582 /* Check for any processor-specific program segment types. */
20cfcaae 2583 bed = get_elf_backend_data (abfd);
d27f5fa1 2584 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2585 }
2586}
2587
23bc299b 2588/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2589 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2590 relocations; otherwise, we use REL relocations. */
2591
b34976b6 2592bfd_boolean
217aa764
AM
2593_bfd_elf_init_reloc_shdr (bfd *abfd,
2594 Elf_Internal_Shdr *rel_hdr,
2595 asection *asect,
2596 bfd_boolean use_rela_p)
23bc299b
MM
2597{
2598 char *name;
9c5bfbb7 2599 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2600 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2601
dc810e39 2602 name = bfd_alloc (abfd, amt);
23bc299b 2603 if (name == NULL)
b34976b6 2604 return FALSE;
23bc299b
MM
2605 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2606 rel_hdr->sh_name =
2b0f7ef9 2607 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2608 FALSE);
23bc299b 2609 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2610 return FALSE;
23bc299b
MM
2611 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2612 rel_hdr->sh_entsize = (use_rela_p
2613 ? bed->s->sizeof_rela
2614 : bed->s->sizeof_rel);
45d6a902 2615 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2616 rel_hdr->sh_flags = 0;
2617 rel_hdr->sh_addr = 0;
2618 rel_hdr->sh_size = 0;
2619 rel_hdr->sh_offset = 0;
2620
b34976b6 2621 return TRUE;
23bc299b
MM
2622}
2623
252b5132
RH
2624/* Set up an ELF internal section header for a section. */
2625
252b5132 2626static void
217aa764 2627elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2628{
9c5bfbb7 2629 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2630 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2631 Elf_Internal_Shdr *this_hdr;
2632
2633 if (*failedptr)
2634 {
2635 /* We already failed; just get out of the bfd_map_over_sections
2636 loop. */
2637 return;
2638 }
2639
2640 this_hdr = &elf_section_data (asect)->this_hdr;
2641
e57b5356
AM
2642 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2643 asect->name, FALSE);
2644 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2645 {
b34976b6 2646 *failedptr = TRUE;
252b5132
RH
2647 return;
2648 }
2649
a4d8e49b 2650 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2651
2652 if ((asect->flags & SEC_ALLOC) != 0
2653 || asect->user_set_vma)
2654 this_hdr->sh_addr = asect->vma;
2655 else
2656 this_hdr->sh_addr = 0;
2657
2658 this_hdr->sh_offset = 0;
eea6121a 2659 this_hdr->sh_size = asect->size;
252b5132
RH
2660 this_hdr->sh_link = 0;
2661 this_hdr->sh_addralign = 1 << asect->alignment_power;
2662 /* The sh_entsize and sh_info fields may have been set already by
2663 copy_private_section_data. */
2664
2665 this_hdr->bfd_section = asect;
2666 this_hdr->contents = NULL;
2667
3cddba1e
L
2668 /* If the section type is unspecified, we set it based on
2669 asect->flags. */
2670 if (this_hdr->sh_type == SHT_NULL)
2671 {
45c5e9ed 2672 if ((asect->flags & SEC_GROUP) != 0)
ccd2ec6a 2673 this_hdr->sh_type = SHT_GROUP;
45c5e9ed 2674 else if ((asect->flags & SEC_ALLOC) != 0
3cddba1e
L
2675 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2676 || (asect->flags & SEC_NEVER_LOAD) != 0))
2677 this_hdr->sh_type = SHT_NOBITS;
2678 else
2679 this_hdr->sh_type = SHT_PROGBITS;
2680 }
2681
2f89ff8d 2682 switch (this_hdr->sh_type)
252b5132 2683 {
2f89ff8d 2684 default:
2f89ff8d
L
2685 break;
2686
2687 case SHT_STRTAB:
2688 case SHT_INIT_ARRAY:
2689 case SHT_FINI_ARRAY:
2690 case SHT_PREINIT_ARRAY:
2691 case SHT_NOTE:
2692 case SHT_NOBITS:
2693 case SHT_PROGBITS:
2694 break;
2695
2696 case SHT_HASH:
c7ac6ff8 2697 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2698 break;
5de3bf90 2699
2f89ff8d 2700 case SHT_DYNSYM:
252b5132 2701 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2702 break;
2703
2704 case SHT_DYNAMIC:
252b5132 2705 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2706 break;
2707
2708 case SHT_RELA:
2709 if (get_elf_backend_data (abfd)->may_use_rela_p)
2710 this_hdr->sh_entsize = bed->s->sizeof_rela;
2711 break;
2712
2713 case SHT_REL:
2714 if (get_elf_backend_data (abfd)->may_use_rel_p)
2715 this_hdr->sh_entsize = bed->s->sizeof_rel;
2716 break;
2717
2718 case SHT_GNU_versym:
252b5132 2719 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2720 break;
2721
2722 case SHT_GNU_verdef:
252b5132
RH
2723 this_hdr->sh_entsize = 0;
2724 /* objcopy or strip will copy over sh_info, but may not set
2725 cverdefs. The linker will set cverdefs, but sh_info will be
2726 zero. */
2727 if (this_hdr->sh_info == 0)
2728 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2729 else
2730 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2731 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2732 break;
2733
2734 case SHT_GNU_verneed:
252b5132
RH
2735 this_hdr->sh_entsize = 0;
2736 /* objcopy or strip will copy over sh_info, but may not set
2737 cverrefs. The linker will set cverrefs, but sh_info will be
2738 zero. */
2739 if (this_hdr->sh_info == 0)
2740 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2741 else
2742 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2743 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2744 break;
2745
2746 case SHT_GROUP:
dbb410c3 2747 this_hdr->sh_entsize = 4;
2f89ff8d 2748 break;
dbb410c3 2749 }
252b5132
RH
2750
2751 if ((asect->flags & SEC_ALLOC) != 0)
2752 this_hdr->sh_flags |= SHF_ALLOC;
2753 if ((asect->flags & SEC_READONLY) == 0)
2754 this_hdr->sh_flags |= SHF_WRITE;
2755 if ((asect->flags & SEC_CODE) != 0)
2756 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2757 if ((asect->flags & SEC_MERGE) != 0)
2758 {
2759 this_hdr->sh_flags |= SHF_MERGE;
2760 this_hdr->sh_entsize = asect->entsize;
2761 if ((asect->flags & SEC_STRINGS) != 0)
2762 this_hdr->sh_flags |= SHF_STRINGS;
2763 }
1126897b 2764 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2765 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2766 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2767 {
2768 this_hdr->sh_flags |= SHF_TLS;
eea6121a 2769 if (asect->size == 0 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60
JJ
2770 {
2771 struct bfd_link_order *o;
b34976b6 2772
704afa60 2773 this_hdr->sh_size = 0;
8423293d 2774 for (o = asect->map_head.link_order; o != NULL; o = o->next)
704afa60
JJ
2775 if (this_hdr->sh_size < o->offset + o->size)
2776 this_hdr->sh_size = o->offset + o->size;
2777 if (this_hdr->sh_size)
2778 this_hdr->sh_type = SHT_NOBITS;
2779 }
2780 }
252b5132
RH
2781
2782 /* Check for processor-specific section types. */
e1fddb6b
AO
2783 if (bed->elf_backend_fake_sections
2784 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2785 *failedptr = TRUE;
252b5132
RH
2786
2787 /* If the section has relocs, set up a section header for the
23bc299b
MM
2788 SHT_REL[A] section. If two relocation sections are required for
2789 this section, it is up to the processor-specific back-end to
c044fabd 2790 create the other. */
23bc299b 2791 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2792 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2793 &elf_section_data (asect)->rel_hdr,
c044fabd 2794 asect,
68bfbfcc 2795 asect->use_rela_p))
b34976b6 2796 *failedptr = TRUE;
252b5132
RH
2797}
2798
dbb410c3
AM
2799/* Fill in the contents of a SHT_GROUP section. */
2800
1126897b 2801void
217aa764 2802bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2803{
217aa764 2804 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2805 unsigned long symindx;
9dce4196 2806 asection *elt, *first;
dbb410c3 2807 unsigned char *loc;
b34976b6 2808 bfd_boolean gas;
dbb410c3 2809
7e4111ad
L
2810 /* Ignore linker created group section. See elfNN_ia64_object_p in
2811 elfxx-ia64.c. */
2812 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2813 || *failedptr)
2814 return;
2815
1126897b
AM
2816 symindx = 0;
2817 if (elf_group_id (sec) != NULL)
2818 symindx = elf_group_id (sec)->udata.i;
2819
2820 if (symindx == 0)
2821 {
2822 /* If called from the assembler, swap_out_syms will have set up
2823 elf_section_syms; If called for "ld -r", use target_index. */
2824 if (elf_section_syms (abfd) != NULL)
2825 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2826 else
2827 symindx = sec->target_index;
2828 }
dbb410c3
AM
2829 elf_section_data (sec)->this_hdr.sh_info = symindx;
2830
1126897b 2831 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2832 gas = TRUE;
dbb410c3
AM
2833 if (sec->contents == NULL)
2834 {
b34976b6 2835 gas = FALSE;
eea6121a 2836 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2837
2838 /* Arrange for the section to be written out. */
2839 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2840 if (sec->contents == NULL)
2841 {
b34976b6 2842 *failedptr = TRUE;
dbb410c3
AM
2843 return;
2844 }
2845 }
2846
eea6121a 2847 loc = sec->contents + sec->size;
dbb410c3 2848
9dce4196
AM
2849 /* Get the pointer to the first section in the group that gas
2850 squirreled away here. objcopy arranges for this to be set to the
2851 start of the input section group. */
2852 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2853
2854 /* First element is a flag word. Rest of section is elf section
2855 indices for all the sections of the group. Write them backwards
2856 just to keep the group in the same order as given in .section
2857 directives, not that it matters. */
2858 while (elt != NULL)
2859 {
9dce4196
AM
2860 asection *s;
2861 unsigned int idx;
2862
dbb410c3 2863 loc -= 4;
9dce4196
AM
2864 s = elt;
2865 if (!gas)
2866 s = s->output_section;
2867 idx = 0;
2868 if (s != NULL)
2869 idx = elf_section_data (s)->this_idx;
2870 H_PUT_32 (abfd, idx, loc);
945906ff 2871 elt = elf_next_in_group (elt);
9dce4196
AM
2872 if (elt == first)
2873 break;
dbb410c3
AM
2874 }
2875
3d7f7666 2876 if ((loc -= 4) != sec->contents)
9dce4196 2877 abort ();
dbb410c3 2878
9dce4196 2879 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2880}
2881
252b5132
RH
2882/* Assign all ELF section numbers. The dummy first section is handled here
2883 too. The link/info pointers for the standard section types are filled
2884 in here too, while we're at it. */
2885
b34976b6 2886static bfd_boolean
da9f89d4 2887assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2888{
2889 struct elf_obj_tdata *t = elf_tdata (abfd);
2890 asection *sec;
2b0f7ef9 2891 unsigned int section_number, secn;
252b5132 2892 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2893 struct bfd_elf_section_data *d;
252b5132
RH
2894
2895 section_number = 1;
2896
2b0f7ef9
JJ
2897 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2898
da9f89d4
L
2899 /* SHT_GROUP sections are in relocatable files only. */
2900 if (link_info == NULL || link_info->relocatable)
252b5132 2901 {
da9f89d4 2902 /* Put SHT_GROUP sections first. */
04dd1667 2903 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2904 {
5daa8fe7 2905 d = elf_section_data (sec);
da9f89d4
L
2906
2907 if (d->this_hdr.sh_type == SHT_GROUP)
2908 {
5daa8fe7 2909 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2910 {
2911 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2912 bfd_section_list_remove (abfd, sec);
da9f89d4 2913 abfd->section_count--;
da9f89d4
L
2914 }
2915 else
2916 {
2917 if (section_number == SHN_LORESERVE)
2918 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2919 d->this_idx = section_number++;
2920 }
2921 }
47cc2cf5
PB
2922 }
2923 }
2924
2925 for (sec = abfd->sections; sec; sec = sec->next)
2926 {
2927 d = elf_section_data (sec);
2928
2929 if (d->this_hdr.sh_type != SHT_GROUP)
2930 {
2931 if (section_number == SHN_LORESERVE)
2932 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2933 d->this_idx = section_number++;
2934 }
2b0f7ef9 2935 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2936 if ((sec->flags & SEC_RELOC) == 0)
2937 d->rel_idx = 0;
2938 else
2b0f7ef9 2939 {
9ad5cbcf
AM
2940 if (section_number == SHN_LORESERVE)
2941 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2942 d->rel_idx = section_number++;
2943 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2944 }
23bc299b
MM
2945
2946 if (d->rel_hdr2)
2b0f7ef9 2947 {
9ad5cbcf
AM
2948 if (section_number == SHN_LORESERVE)
2949 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2950 d->rel_idx2 = section_number++;
2951 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2952 }
23bc299b
MM
2953 else
2954 d->rel_idx2 = 0;
252b5132
RH
2955 }
2956
9ad5cbcf
AM
2957 if (section_number == SHN_LORESERVE)
2958 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2959 t->shstrtab_section = section_number++;
2b0f7ef9 2960 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2961 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2962
2963 if (bfd_get_symcount (abfd) > 0)
2964 {
9ad5cbcf
AM
2965 if (section_number == SHN_LORESERVE)
2966 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2967 t->symtab_section = section_number++;
2b0f7ef9 2968 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2969 if (section_number > SHN_LORESERVE - 2)
2970 {
2971 if (section_number == SHN_LORESERVE)
2972 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2973 t->symtab_shndx_section = section_number++;
2974 t->symtab_shndx_hdr.sh_name
2975 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2976 ".symtab_shndx", FALSE);
9ad5cbcf 2977 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2978 return FALSE;
9ad5cbcf
AM
2979 }
2980 if (section_number == SHN_LORESERVE)
2981 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2982 t->strtab_section = section_number++;
2b0f7ef9 2983 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2984 }
2985
2b0f7ef9
JJ
2986 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2987 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2988
2989 elf_numsections (abfd) = section_number;
252b5132 2990 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
2991 if (section_number > SHN_LORESERVE)
2992 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
2993
2994 /* Set up the list of section header pointers, in agreement with the
2995 indices. */
d0fb9a8d 2996 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 2997 if (i_shdrp == NULL)
b34976b6 2998 return FALSE;
252b5132 2999
d0fb9a8d 3000 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
3001 if (i_shdrp[0] == NULL)
3002 {
3003 bfd_release (abfd, i_shdrp);
b34976b6 3004 return FALSE;
252b5132 3005 }
252b5132
RH
3006
3007 elf_elfsections (abfd) = i_shdrp;
3008
3009 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3010 if (bfd_get_symcount (abfd) > 0)
3011 {
3012 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3013 if (elf_numsections (abfd) > SHN_LORESERVE)
3014 {
3015 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3016 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3017 }
252b5132
RH
3018 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3019 t->symtab_hdr.sh_link = t->strtab_section;
3020 }
38ce5b11 3021
252b5132
RH
3022 for (sec = abfd->sections; sec; sec = sec->next)
3023 {
3024 struct bfd_elf_section_data *d = elf_section_data (sec);
3025 asection *s;
3026 const char *name;
3027
3028 i_shdrp[d->this_idx] = &d->this_hdr;
3029 if (d->rel_idx != 0)
3030 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3031 if (d->rel_idx2 != 0)
3032 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3033
3034 /* Fill in the sh_link and sh_info fields while we're at it. */
3035
3036 /* sh_link of a reloc section is the section index of the symbol
3037 table. sh_info is the section index of the section to which
3038 the relocation entries apply. */
3039 if (d->rel_idx != 0)
3040 {
3041 d->rel_hdr.sh_link = t->symtab_section;
3042 d->rel_hdr.sh_info = d->this_idx;
3043 }
23bc299b
MM
3044 if (d->rel_idx2 != 0)
3045 {
3046 d->rel_hdr2->sh_link = t->symtab_section;
3047 d->rel_hdr2->sh_info = d->this_idx;
3048 }
252b5132 3049
38ce5b11
L
3050 /* We need to set up sh_link for SHF_LINK_ORDER. */
3051 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3052 {
3053 s = elf_linked_to_section (sec);
3054 if (s)
38ce5b11 3055 {
ccd2ec6a 3056 if (link_info != NULL)
38ce5b11 3057 {
ccd2ec6a
L
3058 /* For linker, elf_linked_to_section points to the
3059 input section. */
3060 if (elf_discarded_section (s))
38ce5b11 3061 {
ccd2ec6a
L
3062 asection *kept;
3063 (*_bfd_error_handler)
3064 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3065 abfd, d->this_hdr.bfd_section,
3066 s, s->owner);
3067 /* Point to the kept section if it has the same
3068 size as the discarded one. */
3069 kept = _bfd_elf_check_kept_section (s);
3070 if (kept == NULL)
185d09ad 3071 {
ccd2ec6a
L
3072 bfd_set_error (bfd_error_bad_value);
3073 return FALSE;
185d09ad 3074 }
ccd2ec6a 3075 s = kept;
38ce5b11 3076 }
ccd2ec6a
L
3077 s = s->output_section;
3078 BFD_ASSERT (s != NULL);
38ce5b11 3079 }
ccd2ec6a
L
3080 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3081 }
3082 else
3083 {
3084 /* PR 290:
3085 The Intel C compiler generates SHT_IA_64_UNWIND with
3086 SHF_LINK_ORDER. But it doesn't set the sh_link or
3087 sh_info fields. Hence we could get the situation
3088 where s is NULL. */
3089 const struct elf_backend_data *bed
3090 = get_elf_backend_data (abfd);
3091 if (bed->link_order_error_handler)
3092 bed->link_order_error_handler
3093 (_("%B: warning: sh_link not set for section `%A'"),
3094 abfd, sec);
38ce5b11
L
3095 }
3096 }
3097
252b5132
RH
3098 switch (d->this_hdr.sh_type)
3099 {
3100 case SHT_REL:
3101 case SHT_RELA:
3102 /* A reloc section which we are treating as a normal BFD
3103 section. sh_link is the section index of the symbol
3104 table. sh_info is the section index of the section to
3105 which the relocation entries apply. We assume that an
3106 allocated reloc section uses the dynamic symbol table.
3107 FIXME: How can we be sure? */
3108 s = bfd_get_section_by_name (abfd, ".dynsym");
3109 if (s != NULL)
3110 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3111
3112 /* We look up the section the relocs apply to by name. */
3113 name = sec->name;
3114 if (d->this_hdr.sh_type == SHT_REL)
3115 name += 4;
3116 else
3117 name += 5;
3118 s = bfd_get_section_by_name (abfd, name);
3119 if (s != NULL)
3120 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3121 break;
3122
3123 case SHT_STRTAB:
3124 /* We assume that a section named .stab*str is a stabs
3125 string section. We look for a section with the same name
3126 but without the trailing ``str'', and set its sh_link
3127 field to point to this section. */
3128 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
3129 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3130 {
3131 size_t len;
3132 char *alc;
3133
3134 len = strlen (sec->name);
217aa764 3135 alc = bfd_malloc (len - 2);
252b5132 3136 if (alc == NULL)
b34976b6 3137 return FALSE;
d4c88bbb 3138 memcpy (alc, sec->name, len - 3);
252b5132
RH
3139 alc[len - 3] = '\0';
3140 s = bfd_get_section_by_name (abfd, alc);
3141 free (alc);
3142 if (s != NULL)
3143 {
3144 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3145
3146 /* This is a .stab section. */
0594c12d
AM
3147 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3148 elf_section_data (s)->this_hdr.sh_entsize
3149 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3150 }
3151 }
3152 break;
3153
3154 case SHT_DYNAMIC:
3155 case SHT_DYNSYM:
3156 case SHT_GNU_verneed:
3157 case SHT_GNU_verdef:
3158 /* sh_link is the section header index of the string table
3159 used for the dynamic entries, or the symbol table, or the
3160 version strings. */
3161 s = bfd_get_section_by_name (abfd, ".dynstr");
3162 if (s != NULL)
3163 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3164 break;
3165
7f1204bb
JJ
3166 case SHT_GNU_LIBLIST:
3167 /* sh_link is the section header index of the prelink library
3168 list
3169 used for the dynamic entries, or the symbol table, or the
3170 version strings. */
3171 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3172 ? ".dynstr" : ".gnu.libstr");
3173 if (s != NULL)
3174 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3175 break;
3176
252b5132
RH
3177 case SHT_HASH:
3178 case SHT_GNU_versym:
3179 /* sh_link is the section header index of the symbol table
3180 this hash table or version table is for. */
3181 s = bfd_get_section_by_name (abfd, ".dynsym");
3182 if (s != NULL)
3183 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3184 break;
dbb410c3
AM
3185
3186 case SHT_GROUP:
3187 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3188 }
3189 }
3190
2b0f7ef9 3191 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3192 if (i_shdrp[secn] == NULL)
3193 i_shdrp[secn] = i_shdrp[0];
3194 else
3195 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3196 i_shdrp[secn]->sh_name);
b34976b6 3197 return TRUE;
252b5132
RH
3198}
3199
3200/* Map symbol from it's internal number to the external number, moving
3201 all local symbols to be at the head of the list. */
3202
268b6b39 3203static int
217aa764 3204sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3205{
3206 /* If the backend has a special mapping, use it. */
9c5bfbb7 3207 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3208 if (bed->elf_backend_sym_is_global)
3209 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3210
3211 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3212 || bfd_is_und_section (bfd_get_section (sym))
3213 || bfd_is_com_section (bfd_get_section (sym)));
3214}
3215
b34976b6 3216static bfd_boolean
217aa764 3217elf_map_symbols (bfd *abfd)
252b5132 3218{
dc810e39 3219 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3220 asymbol **syms = bfd_get_outsymbols (abfd);
3221 asymbol **sect_syms;
dc810e39
AM
3222 unsigned int num_locals = 0;
3223 unsigned int num_globals = 0;
3224 unsigned int num_locals2 = 0;
3225 unsigned int num_globals2 = 0;
252b5132 3226 int max_index = 0;
dc810e39 3227 unsigned int idx;
252b5132
RH
3228 asection *asect;
3229 asymbol **new_syms;
252b5132
RH
3230
3231#ifdef DEBUG
3232 fprintf (stderr, "elf_map_symbols\n");
3233 fflush (stderr);
3234#endif
3235
252b5132
RH
3236 for (asect = abfd->sections; asect; asect = asect->next)
3237 {
3238 if (max_index < asect->index)
3239 max_index = asect->index;
3240 }
3241
3242 max_index++;
d0fb9a8d 3243 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3244 if (sect_syms == NULL)
b34976b6 3245 return FALSE;
252b5132 3246 elf_section_syms (abfd) = sect_syms;
4e89ac30 3247 elf_num_section_syms (abfd) = max_index;
252b5132 3248
079e9a2f
AM
3249 /* Init sect_syms entries for any section symbols we have already
3250 decided to output. */
252b5132
RH
3251 for (idx = 0; idx < symcount; idx++)
3252 {
dc810e39 3253 asymbol *sym = syms[idx];
c044fabd 3254
252b5132
RH
3255 if ((sym->flags & BSF_SECTION_SYM) != 0
3256 && sym->value == 0)
3257 {
3258 asection *sec;
3259
3260 sec = sym->section;
3261
3262 if (sec->owner != NULL)
3263 {
3264 if (sec->owner != abfd)
3265 {
3266 if (sec->output_offset != 0)
3267 continue;
c044fabd 3268
252b5132
RH
3269 sec = sec->output_section;
3270
079e9a2f
AM
3271 /* Empty sections in the input files may have had a
3272 section symbol created for them. (See the comment
3273 near the end of _bfd_generic_link_output_symbols in
3274 linker.c). If the linker script discards such
3275 sections then we will reach this point. Since we know
3276 that we cannot avoid this case, we detect it and skip
3277 the abort and the assignment to the sect_syms array.
3278 To reproduce this particular case try running the
3279 linker testsuite test ld-scripts/weak.exp for an ELF
3280 port that uses the generic linker. */
252b5132
RH
3281 if (sec->owner == NULL)
3282 continue;
3283
3284 BFD_ASSERT (sec->owner == abfd);
3285 }
3286 sect_syms[sec->index] = syms[idx];
3287 }
3288 }
3289 }
3290
252b5132
RH
3291 /* Classify all of the symbols. */
3292 for (idx = 0; idx < symcount; idx++)
3293 {
3294 if (!sym_is_global (abfd, syms[idx]))
3295 num_locals++;
3296 else
3297 num_globals++;
3298 }
079e9a2f
AM
3299
3300 /* We will be adding a section symbol for each BFD section. Most normal
3301 sections will already have a section symbol in outsymbols, but
3302 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3303 at least in that case. */
252b5132
RH
3304 for (asect = abfd->sections; asect; asect = asect->next)
3305 {
079e9a2f 3306 if (sect_syms[asect->index] == NULL)
252b5132 3307 {
079e9a2f 3308 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3309 num_locals++;
3310 else
3311 num_globals++;
252b5132
RH
3312 }
3313 }
3314
3315 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3316 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3317
252b5132 3318 if (new_syms == NULL)
b34976b6 3319 return FALSE;
252b5132
RH
3320
3321 for (idx = 0; idx < symcount; idx++)
3322 {
3323 asymbol *sym = syms[idx];
dc810e39 3324 unsigned int i;
252b5132
RH
3325
3326 if (!sym_is_global (abfd, sym))
3327 i = num_locals2++;
3328 else
3329 i = num_locals + num_globals2++;
3330 new_syms[i] = sym;
3331 sym->udata.i = i + 1;
3332 }
3333 for (asect = abfd->sections; asect; asect = asect->next)
3334 {
079e9a2f 3335 if (sect_syms[asect->index] == NULL)
252b5132 3336 {
079e9a2f 3337 asymbol *sym = asect->symbol;
dc810e39 3338 unsigned int i;
252b5132 3339
079e9a2f 3340 sect_syms[asect->index] = sym;
252b5132
RH
3341 if (!sym_is_global (abfd, sym))
3342 i = num_locals2++;
3343 else
3344 i = num_locals + num_globals2++;
3345 new_syms[i] = sym;
3346 sym->udata.i = i + 1;
3347 }
3348 }
3349
3350 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3351
3352 elf_num_locals (abfd) = num_locals;
3353 elf_num_globals (abfd) = num_globals;
b34976b6 3354 return TRUE;
252b5132
RH
3355}
3356
3357/* Align to the maximum file alignment that could be required for any
3358 ELF data structure. */
3359
268b6b39 3360static inline file_ptr
217aa764 3361align_file_position (file_ptr off, int align)
252b5132
RH
3362{
3363 return (off + align - 1) & ~(align - 1);
3364}
3365
3366/* Assign a file position to a section, optionally aligning to the
3367 required section alignment. */
3368
217aa764
AM
3369file_ptr
3370_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3371 file_ptr offset,
3372 bfd_boolean align)
252b5132
RH
3373{
3374 if (align)
3375 {
3376 unsigned int al;
3377
3378 al = i_shdrp->sh_addralign;
3379 if (al > 1)
3380 offset = BFD_ALIGN (offset, al);
3381 }
3382 i_shdrp->sh_offset = offset;
3383 if (i_shdrp->bfd_section != NULL)
3384 i_shdrp->bfd_section->filepos = offset;
3385 if (i_shdrp->sh_type != SHT_NOBITS)
3386 offset += i_shdrp->sh_size;
3387 return offset;
3388}
3389
3390/* Compute the file positions we are going to put the sections at, and
3391 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3392 is not NULL, this is being called by the ELF backend linker. */
3393
b34976b6 3394bfd_boolean
217aa764
AM
3395_bfd_elf_compute_section_file_positions (bfd *abfd,
3396 struct bfd_link_info *link_info)
252b5132 3397{
9c5bfbb7 3398 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3399 bfd_boolean failed;
4b6c0f2f 3400 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3401 Elf_Internal_Shdr *shstrtab_hdr;
3402
3403 if (abfd->output_has_begun)
b34976b6 3404 return TRUE;
252b5132
RH
3405
3406 /* Do any elf backend specific processing first. */
3407 if (bed->elf_backend_begin_write_processing)
3408 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3409
3410 if (! prep_headers (abfd))
b34976b6 3411 return FALSE;
252b5132 3412
e6c51ed4
NC
3413 /* Post process the headers if necessary. */
3414 if (bed->elf_backend_post_process_headers)
3415 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3416
b34976b6 3417 failed = FALSE;
252b5132
RH
3418 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3419 if (failed)
b34976b6 3420 return FALSE;
252b5132 3421
da9f89d4 3422 if (!assign_section_numbers (abfd, link_info))
b34976b6 3423 return FALSE;
252b5132
RH
3424
3425 /* The backend linker builds symbol table information itself. */
3426 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3427 {
3428 /* Non-zero if doing a relocatable link. */
3429 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3430
3431 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3432 return FALSE;
252b5132
RH
3433 }
3434
1126897b 3435 if (link_info == NULL)
dbb410c3 3436 {
1126897b 3437 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3438 if (failed)
b34976b6 3439 return FALSE;
dbb410c3
AM
3440 }
3441
252b5132
RH
3442 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3443 /* sh_name was set in prep_headers. */
3444 shstrtab_hdr->sh_type = SHT_STRTAB;
3445 shstrtab_hdr->sh_flags = 0;
3446 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3447 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3448 shstrtab_hdr->sh_entsize = 0;
3449 shstrtab_hdr->sh_link = 0;
3450 shstrtab_hdr->sh_info = 0;
3451 /* sh_offset is set in assign_file_positions_except_relocs. */
3452 shstrtab_hdr->sh_addralign = 1;
3453
c84fca4d 3454 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3455 return FALSE;
252b5132
RH
3456
3457 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3458 {
3459 file_ptr off;
3460 Elf_Internal_Shdr *hdr;
3461
3462 off = elf_tdata (abfd)->next_file_pos;
3463
3464 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3465 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3466
9ad5cbcf
AM
3467 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3468 if (hdr->sh_size != 0)
b34976b6 3469 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3470
252b5132 3471 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3472 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3473
3474 elf_tdata (abfd)->next_file_pos = off;
3475
3476 /* Now that we know where the .strtab section goes, write it
3477 out. */
3478 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3479 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3480 return FALSE;
252b5132
RH
3481 _bfd_stringtab_free (strtab);
3482 }
3483
b34976b6 3484 abfd->output_has_begun = TRUE;
252b5132 3485
b34976b6 3486 return TRUE;
252b5132
RH
3487}
3488
3489/* Create a mapping from a set of sections to a program segment. */
3490
217aa764
AM
3491static struct elf_segment_map *
3492make_mapping (bfd *abfd,
3493 asection **sections,
3494 unsigned int from,
3495 unsigned int to,
3496 bfd_boolean phdr)
252b5132
RH
3497{
3498 struct elf_segment_map *m;
3499 unsigned int i;
3500 asection **hdrpp;
dc810e39 3501 bfd_size_type amt;
252b5132 3502
dc810e39
AM
3503 amt = sizeof (struct elf_segment_map);
3504 amt += (to - from - 1) * sizeof (asection *);
217aa764 3505 m = bfd_zalloc (abfd, amt);
252b5132
RH
3506 if (m == NULL)
3507 return NULL;
3508 m->next = NULL;
3509 m->p_type = PT_LOAD;
3510 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3511 m->sections[i - from] = *hdrpp;
3512 m->count = to - from;
3513
3514 if (from == 0 && phdr)
3515 {
3516 /* Include the headers in the first PT_LOAD segment. */
3517 m->includes_filehdr = 1;
3518 m->includes_phdrs = 1;
3519 }
3520
3521 return m;
3522}
3523
229fcec5
MM
3524/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3525 on failure. */
3526
3527struct elf_segment_map *
3528_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3529{
3530 struct elf_segment_map *m;
3531
3532 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3533 if (m == NULL)
3534 return NULL;
3535 m->next = NULL;
3536 m->p_type = PT_DYNAMIC;
3537 m->count = 1;
3538 m->sections[0] = dynsec;
3539
3540 return m;
3541}
3542
252b5132
RH
3543/* Set up a mapping from BFD sections to program segments. */
3544
b34976b6 3545static bfd_boolean
217aa764 3546map_sections_to_segments (bfd *abfd)
252b5132
RH
3547{
3548 asection **sections = NULL;
3549 asection *s;
3550 unsigned int i;
3551 unsigned int count;
3552 struct elf_segment_map *mfirst;
3553 struct elf_segment_map **pm;
3554 struct elf_segment_map *m;
3555 asection *last_hdr;
baaff79e 3556 bfd_vma last_size;
252b5132
RH
3557 unsigned int phdr_index;
3558 bfd_vma maxpagesize;
3559 asection **hdrpp;
b34976b6
AM
3560 bfd_boolean phdr_in_segment = TRUE;
3561 bfd_boolean writable;
13ae64f3
JJ
3562 int tls_count = 0;
3563 asection *first_tls = NULL;
65765700 3564 asection *dynsec, *eh_frame_hdr;
dc810e39 3565 bfd_size_type amt;
252b5132
RH
3566
3567 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3568 return TRUE;
252b5132
RH
3569
3570 if (bfd_count_sections (abfd) == 0)
b34976b6 3571 return TRUE;
252b5132
RH
3572
3573 /* Select the allocated sections, and sort them. */
3574
d0fb9a8d 3575 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
252b5132
RH
3576 if (sections == NULL)
3577 goto error_return;
3578
3579 i = 0;
3580 for (s = abfd->sections; s != NULL; s = s->next)
3581 {
3582 if ((s->flags & SEC_ALLOC) != 0)
3583 {
3584 sections[i] = s;
3585 ++i;
3586 }
3587 }
3588 BFD_ASSERT (i <= bfd_count_sections (abfd));
3589 count = i;
3590
3591 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3592
3593 /* Build the mapping. */
3594
3595 mfirst = NULL;
3596 pm = &mfirst;
3597
3598 /* If we have a .interp section, then create a PT_PHDR segment for
3599 the program headers and a PT_INTERP segment for the .interp
3600 section. */
3601 s = bfd_get_section_by_name (abfd, ".interp");
3602 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3603 {
dc810e39 3604 amt = sizeof (struct elf_segment_map);
217aa764 3605 m = bfd_zalloc (abfd, amt);
252b5132
RH
3606 if (m == NULL)
3607 goto error_return;
3608 m->next = NULL;
3609 m->p_type = PT_PHDR;
3610 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3611 m->p_flags = PF_R | PF_X;
3612 m->p_flags_valid = 1;
3613 m->includes_phdrs = 1;
3614
3615 *pm = m;
3616 pm = &m->next;
3617
dc810e39 3618 amt = sizeof (struct elf_segment_map);
217aa764 3619 m = bfd_zalloc (abfd, amt);
252b5132
RH
3620 if (m == NULL)
3621 goto error_return;
3622 m->next = NULL;
3623 m->p_type = PT_INTERP;
3624 m->count = 1;
3625 m->sections[0] = s;
3626
3627 *pm = m;
3628 pm = &m->next;
3629 }
3630
3631 /* Look through the sections. We put sections in the same program
3632 segment when the start of the second section can be placed within
3633 a few bytes of the end of the first section. */
3634 last_hdr = NULL;
baaff79e 3635 last_size = 0;
252b5132
RH
3636 phdr_index = 0;
3637 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3638 writable = FALSE;
252b5132
RH
3639 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3640 if (dynsec != NULL
3641 && (dynsec->flags & SEC_LOAD) == 0)
3642 dynsec = NULL;
3643
3644 /* Deal with -Ttext or something similar such that the first section
3645 is not adjacent to the program headers. This is an
3646 approximation, since at this point we don't know exactly how many
3647 program headers we will need. */
3648 if (count > 0)
3649 {
3650 bfd_size_type phdr_size;
3651
3652 phdr_size = elf_tdata (abfd)->program_header_size;
3653 if (phdr_size == 0)
3654 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3655 if ((abfd->flags & D_PAGED) == 0
3656 || sections[0]->lma < phdr_size
3657 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3658 phdr_in_segment = FALSE;
252b5132
RH
3659 }
3660
3661 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3662 {
3663 asection *hdr;
b34976b6 3664 bfd_boolean new_segment;
252b5132
RH
3665
3666 hdr = *hdrpp;
3667
3668 /* See if this section and the last one will fit in the same
3669 segment. */
3670
3671 if (last_hdr == NULL)
3672 {
3673 /* If we don't have a segment yet, then we don't need a new
3674 one (we build the last one after this loop). */
b34976b6 3675 new_segment = FALSE;
252b5132
RH
3676 }
3677 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3678 {
3679 /* If this section has a different relation between the
3680 virtual address and the load address, then we need a new
3681 segment. */
b34976b6 3682 new_segment = TRUE;
252b5132 3683 }
baaff79e 3684 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3685 < BFD_ALIGN (hdr->lma, maxpagesize))
3686 {
3687 /* If putting this section in this segment would force us to
3688 skip a page in the segment, then we need a new segment. */
b34976b6 3689 new_segment = TRUE;
252b5132 3690 }
baaff79e
JJ
3691 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3692 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3693 {
3694 /* We don't want to put a loadable section after a
baaff79e
JJ
3695 nonloadable section in the same segment.
3696 Consider .tbss sections as loadable for this purpose. */
b34976b6 3697 new_segment = TRUE;
252b5132
RH
3698 }
3699 else if ((abfd->flags & D_PAGED) == 0)
3700 {
3701 /* If the file is not demand paged, which means that we
3702 don't require the sections to be correctly aligned in the
3703 file, then there is no other reason for a new segment. */
b34976b6 3704 new_segment = FALSE;
252b5132
RH
3705 }
3706 else if (! writable
3707 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3708 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3709 & ~(maxpagesize - 1))
3710 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3711 {
3712 /* We don't want to put a writable section in a read only
3713 segment, unless they are on the same page in memory
3714 anyhow. We already know that the last section does not
3715 bring us past the current section on the page, so the
3716 only case in which the new section is not on the same
3717 page as the previous section is when the previous section
3718 ends precisely on a page boundary. */
b34976b6 3719 new_segment = TRUE;
252b5132
RH
3720 }
3721 else
3722 {
3723 /* Otherwise, we can use the same segment. */
b34976b6 3724 new_segment = FALSE;
252b5132
RH
3725 }
3726
3727 if (! new_segment)
3728 {
3729 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3730 writable = TRUE;
baaff79e
JJ
3731 last_hdr = hdr;
3732 /* .tbss sections effectively have zero size. */
e5caec89 3733 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3734 last_size = hdr->size;
baaff79e
JJ
3735 else
3736 last_size = 0;
252b5132
RH
3737 continue;
3738 }
3739
3740 /* We need a new program segment. We must create a new program
3741 header holding all the sections from phdr_index until hdr. */
3742
3743 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3744 if (m == NULL)
3745 goto error_return;
3746
3747 *pm = m;
3748 pm = &m->next;
3749
3750 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3751 writable = TRUE;
252b5132 3752 else
b34976b6 3753 writable = FALSE;
252b5132
RH
3754
3755 last_hdr = hdr;
baaff79e
JJ
3756 /* .tbss sections effectively have zero size. */
3757 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3758 last_size = hdr->size;
baaff79e
JJ
3759 else
3760 last_size = 0;
252b5132 3761 phdr_index = i;
b34976b6 3762 phdr_in_segment = FALSE;
252b5132
RH
3763 }
3764
3765 /* Create a final PT_LOAD program segment. */
3766 if (last_hdr != NULL)
3767 {
3768 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3769 if (m == NULL)
3770 goto error_return;
3771
3772 *pm = m;
3773 pm = &m->next;
3774 }
3775
3776 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3777 if (dynsec != NULL)
3778 {
229fcec5 3779 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3780 if (m == NULL)
3781 goto error_return;
252b5132
RH
3782 *pm = m;
3783 pm = &m->next;
3784 }
3785
3786 /* For each loadable .note section, add a PT_NOTE segment. We don't
3787 use bfd_get_section_by_name, because if we link together
3788 nonloadable .note sections and loadable .note sections, we will
3789 generate two .note sections in the output file. FIXME: Using
3790 names for section types is bogus anyhow. */
3791 for (s = abfd->sections; s != NULL; s = s->next)
3792 {
3793 if ((s->flags & SEC_LOAD) != 0
3794 && strncmp (s->name, ".note", 5) == 0)
3795 {
dc810e39 3796 amt = sizeof (struct elf_segment_map);
217aa764 3797 m = bfd_zalloc (abfd, amt);
252b5132
RH
3798 if (m == NULL)
3799 goto error_return;
3800 m->next = NULL;
3801 m->p_type = PT_NOTE;
3802 m->count = 1;
3803 m->sections[0] = s;
3804
3805 *pm = m;
3806 pm = &m->next;
3807 }
13ae64f3
JJ
3808 if (s->flags & SEC_THREAD_LOCAL)
3809 {
3810 if (! tls_count)
3811 first_tls = s;
3812 tls_count++;
3813 }
3814 }
3815
3816 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3817 if (tls_count > 0)
3818 {
3819 int i;
3820
3821 amt = sizeof (struct elf_segment_map);
3822 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3823 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3824 if (m == NULL)
3825 goto error_return;
3826 m->next = NULL;
3827 m->p_type = PT_TLS;
3828 m->count = tls_count;
3829 /* Mandated PF_R. */
3830 m->p_flags = PF_R;
3831 m->p_flags_valid = 1;
3832 for (i = 0; i < tls_count; ++i)
3833 {
3834 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3835 m->sections[i] = first_tls;
3836 first_tls = first_tls->next;
3837 }
3838
3839 *pm = m;
3840 pm = &m->next;
252b5132
RH
3841 }
3842
65765700
JJ
3843 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3844 segment. */
126495ed
AM
3845 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3846 if (eh_frame_hdr != NULL
3847 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3848 {
3849 amt = sizeof (struct elf_segment_map);
217aa764 3850 m = bfd_zalloc (abfd, amt);
65765700
JJ
3851 if (m == NULL)
3852 goto error_return;
3853 m->next = NULL;
3854 m->p_type = PT_GNU_EH_FRAME;
3855 m->count = 1;
126495ed 3856 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3857
3858 *pm = m;
3859 pm = &m->next;
3860 }
3861
9ee5e499
JJ
3862 if (elf_tdata (abfd)->stack_flags)
3863 {
3864 amt = sizeof (struct elf_segment_map);
217aa764 3865 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3866 if (m == NULL)
3867 goto error_return;
3868 m->next = NULL;
3869 m->p_type = PT_GNU_STACK;
3870 m->p_flags = elf_tdata (abfd)->stack_flags;
3871 m->p_flags_valid = 1;
3872
3873 *pm = m;
3874 pm = &m->next;
3875 }
3876
8c37241b
JJ
3877 if (elf_tdata (abfd)->relro)
3878 {
3879 amt = sizeof (struct elf_segment_map);
3880 m = bfd_zalloc (abfd, amt);
3881 if (m == NULL)
3882 goto error_return;
3883 m->next = NULL;
3884 m->p_type = PT_GNU_RELRO;
3885 m->p_flags = PF_R;
3886 m->p_flags_valid = 1;
3887
3888 *pm = m;
3889 pm = &m->next;
3890 }
3891
252b5132
RH
3892 free (sections);
3893 sections = NULL;
3894
3895 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3896 return TRUE;
252b5132
RH
3897
3898 error_return:
3899 if (sections != NULL)
3900 free (sections);
b34976b6 3901 return FALSE;
252b5132
RH
3902}
3903
3904/* Sort sections by address. */
3905
3906static int
217aa764 3907elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3908{
3909 const asection *sec1 = *(const asection **) arg1;
3910 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3911 bfd_size_type size1, size2;
252b5132
RH
3912
3913 /* Sort by LMA first, since this is the address used to
3914 place the section into a segment. */
3915 if (sec1->lma < sec2->lma)
3916 return -1;
3917 else if (sec1->lma > sec2->lma)
3918 return 1;
3919
3920 /* Then sort by VMA. Normally the LMA and the VMA will be
3921 the same, and this will do nothing. */
3922 if (sec1->vma < sec2->vma)
3923 return -1;
3924 else if (sec1->vma > sec2->vma)
3925 return 1;
3926
3927 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3928
07c6e936 3929#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3930
3931 if (TOEND (sec1))
3932 {
3933 if (TOEND (sec2))
00a7cdc5
NC
3934 {
3935 /* If the indicies are the same, do not return 0
3936 here, but continue to try the next comparison. */
3937 if (sec1->target_index - sec2->target_index != 0)
3938 return sec1->target_index - sec2->target_index;
3939 }
252b5132
RH
3940 else
3941 return 1;
3942 }
00a7cdc5 3943 else if (TOEND (sec2))
252b5132
RH
3944 return -1;
3945
3946#undef TOEND
3947
00a7cdc5
NC
3948 /* Sort by size, to put zero sized sections
3949 before others at the same address. */
252b5132 3950
eea6121a
AM
3951 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
3952 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
3953
3954 if (size1 < size2)
252b5132 3955 return -1;
eecdbe52 3956 if (size1 > size2)
252b5132
RH
3957 return 1;
3958
3959 return sec1->target_index - sec2->target_index;
3960}
3961
340b6d91
AC
3962/* Ian Lance Taylor writes:
3963
3964 We shouldn't be using % with a negative signed number. That's just
3965 not good. We have to make sure either that the number is not
3966 negative, or that the number has an unsigned type. When the types
3967 are all the same size they wind up as unsigned. When file_ptr is a
3968 larger signed type, the arithmetic winds up as signed long long,
3969 which is wrong.
3970
3971 What we're trying to say here is something like ``increase OFF by
3972 the least amount that will cause it to be equal to the VMA modulo
3973 the page size.'' */
3974/* In other words, something like:
3975
3976 vma_offset = m->sections[0]->vma % bed->maxpagesize;
3977 off_offset = off % bed->maxpagesize;
3978 if (vma_offset < off_offset)
3979 adjustment = vma_offset + bed->maxpagesize - off_offset;
3980 else
3981 adjustment = vma_offset - off_offset;
3982
3983 which can can be collapsed into the expression below. */
3984
3985static file_ptr
3986vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
3987{
3988 return ((vma - off) % maxpagesize);
3989}
3990
252b5132
RH
3991/* Assign file positions to the sections based on the mapping from
3992 sections to segments. This function also sets up some fields in
3993 the file header, and writes out the program headers. */
3994
b34976b6 3995static bfd_boolean
c84fca4d 3996assign_file_positions_for_segments (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3997{
3998 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3999 unsigned int count;
4000 struct elf_segment_map *m;
4001 unsigned int alloc;
4002 Elf_Internal_Phdr *phdrs;
4003 file_ptr off, voff;
4004 bfd_vma filehdr_vaddr, filehdr_paddr;
4005 bfd_vma phdrs_vaddr, phdrs_paddr;
4006 Elf_Internal_Phdr *p;
4007
4008 if (elf_tdata (abfd)->segment_map == NULL)
4009 {
4010 if (! map_sections_to_segments (abfd))
b34976b6 4011 return FALSE;
252b5132 4012 }
1ed89aa9
NC
4013 else
4014 {
4015 /* The placement algorithm assumes that non allocated sections are
4016 not in PT_LOAD segments. We ensure this here by removing such
540b09cb
AM
4017 sections from the segment map. We also remove excluded
4018 sections. */
1ed89aa9
NC
4019 for (m = elf_tdata (abfd)->segment_map;
4020 m != NULL;
4021 m = m->next)
4022 {
4023 unsigned int new_count;
4024 unsigned int i;
4025
1ed89aa9
NC
4026 new_count = 0;
4027 for (i = 0; i < m->count; i ++)
4028 {
540b09cb
AM
4029 if ((m->sections[i]->flags & SEC_EXCLUDE) == 0
4030 && ((m->sections[i]->flags & SEC_ALLOC) != 0
4031 || m->p_type != PT_LOAD))
1ed89aa9 4032 {
47d9a591 4033 if (i != new_count)
1ed89aa9
NC
4034 m->sections[new_count] = m->sections[i];
4035
4036 new_count ++;
4037 }
4038 }
4039
4040 if (new_count != m->count)
4041 m->count = new_count;
4042 }
4043 }
252b5132
RH
4044
4045 if (bed->elf_backend_modify_segment_map)
4046 {
c84fca4d 4047 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 4048 return FALSE;
252b5132
RH
4049 }
4050
4051 count = 0;
4052 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4053 ++count;
4054
4055 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4056 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4057 elf_elfheader (abfd)->e_phnum = count;
4058
4059 if (count == 0)
0ebdbb83
BW
4060 {
4061 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4062 return TRUE;
4063 }
252b5132
RH
4064
4065 /* If we already counted the number of program segments, make sure
4066 that we allocated enough space. This happens when SIZEOF_HEADERS
4067 is used in a linker script. */
4068 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
4069 if (alloc != 0 && count > alloc)
4070 {
4071 ((*_bfd_error_handler)
b301b248
AM
4072 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
4073 abfd, alloc, count));
252b5132 4074 bfd_set_error (bfd_error_bad_value);
b34976b6 4075 return FALSE;
252b5132
RH
4076 }
4077
4078 if (alloc == 0)
4079 alloc = count;
4080
d0fb9a8d 4081 phdrs = bfd_alloc2 (abfd, alloc, sizeof (Elf_Internal_Phdr));
252b5132 4082 if (phdrs == NULL)
b34976b6 4083 return FALSE;
252b5132
RH
4084
4085 off = bed->s->sizeof_ehdr;
4086 off += alloc * bed->s->sizeof_phdr;
4087
4088 filehdr_vaddr = 0;
4089 filehdr_paddr = 0;
4090 phdrs_vaddr = 0;
4091 phdrs_paddr = 0;
4092
4093 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4094 m != NULL;
4095 m = m->next, p++)
4096 {
4097 unsigned int i;
4098 asection **secpp;
4099
4100 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4101 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4102 not be done to the PT_NOTE section of a corefile, which may
4103 contain several pseudo-sections artificially created by bfd.
4104 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4105 if (m->count > 1
4106 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4107 && m->p_type == PT_NOTE))
252b5132
RH
4108 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4109 elf_sort_sections);
4110
b301b248
AM
4111 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4112 number of sections with contents contributing to both p_filesz
4113 and p_memsz, followed by a number of sections with no contents
4114 that just contribute to p_memsz. In this loop, OFF tracks next
4115 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4116 an adjustment we use for segments that have no file contents
4117 but need zero filled memory allocation. */
4118 voff = 0;
252b5132 4119 p->p_type = m->p_type;
28a7f3e7 4120 p->p_flags = m->p_flags;
252b5132
RH
4121
4122 if (p->p_type == PT_LOAD
b301b248 4123 && m->count > 0)
252b5132 4124 {
b301b248
AM
4125 bfd_size_type align;
4126 bfd_vma adjust;
a49e53ed 4127 unsigned int align_power = 0;
b301b248 4128
a49e53ed 4129 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4130 {
a49e53ed 4131 unsigned int secalign;
252b5132 4132
a49e53ed
AM
4133 secalign = bfd_get_section_alignment (abfd, *secpp);
4134 if (secalign > align_power)
4135 align_power = secalign;
b301b248 4136 }
a49e53ed
AM
4137 align = (bfd_size_type) 1 << align_power;
4138
4139 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > align)
4140 align = bed->maxpagesize;
252b5132 4141
b301b248
AM
4142 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4143 off += adjust;
4144 if (adjust != 0
4145 && !m->includes_filehdr
4146 && !m->includes_phdrs
4147 && (ufile_ptr) off >= align)
4148 {
4149 /* If the first section isn't loadable, the same holds for
4150 any other sections. Since the segment won't need file
4151 space, we can make p_offset overlap some prior segment.
4152 However, .tbss is special. If a segment starts with
4153 .tbss, we need to look at the next section to decide
4154 whether the segment has any loadable sections. */
4155 i = 0;
5efb6261 4156 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
4157 {
4158 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4159 || ++i >= m->count)
4160 {
4161 off -= adjust;
4162 voff = adjust - align;
4163 break;
4164 }
4165 }
252b5132
RH
4166 }
4167 }
b1a6d0b1
NC
4168 /* Make sure the .dynamic section is the first section in the
4169 PT_DYNAMIC segment. */
4170 else if (p->p_type == PT_DYNAMIC
4171 && m->count > 1
4172 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4173 {
4174 _bfd_error_handler
b301b248
AM
4175 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4176 abfd);
b1a6d0b1
NC
4177 bfd_set_error (bfd_error_bad_value);
4178 return FALSE;
4179 }
252b5132
RH
4180
4181 if (m->count == 0)
4182 p->p_vaddr = 0;
4183 else
4184 p->p_vaddr = m->sections[0]->vma;
4185
4186 if (m->p_paddr_valid)
4187 p->p_paddr = m->p_paddr;
4188 else if (m->count == 0)
4189 p->p_paddr = 0;
4190 else
4191 p->p_paddr = m->sections[0]->lma;
4192
4193 if (p->p_type == PT_LOAD
4194 && (abfd->flags & D_PAGED) != 0)
4195 p->p_align = bed->maxpagesize;
4196 else if (m->count == 0)
45d6a902 4197 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
4198 else
4199 p->p_align = 0;
4200
4201 p->p_offset = 0;
4202 p->p_filesz = 0;
4203 p->p_memsz = 0;
4204
4205 if (m->includes_filehdr)
4206 {
4207 if (! m->p_flags_valid)
4208 p->p_flags |= PF_R;
4209 p->p_offset = 0;
4210 p->p_filesz = bed->s->sizeof_ehdr;
4211 p->p_memsz = bed->s->sizeof_ehdr;
4212 if (m->count > 0)
4213 {
4214 BFD_ASSERT (p->p_type == PT_LOAD);
4215
4216 if (p->p_vaddr < (bfd_vma) off)
4217 {
caf47ea6 4218 (*_bfd_error_handler)
b301b248
AM
4219 (_("%B: Not enough room for program headers, try linking with -N"),
4220 abfd);
252b5132 4221 bfd_set_error (bfd_error_bad_value);
b34976b6 4222 return FALSE;
252b5132
RH
4223 }
4224
4225 p->p_vaddr -= off;
4226 if (! m->p_paddr_valid)
4227 p->p_paddr -= off;
4228 }
4229 if (p->p_type == PT_LOAD)
4230 {
4231 filehdr_vaddr = p->p_vaddr;
4232 filehdr_paddr = p->p_paddr;
4233 }
4234 }
4235
4236 if (m->includes_phdrs)
4237 {
4238 if (! m->p_flags_valid)
4239 p->p_flags |= PF_R;
4240
4241 if (m->includes_filehdr)
4242 {
4243 if (p->p_type == PT_LOAD)
4244 {
4245 phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr;
4246 phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr;
4247 }
4248 }
4249 else
4250 {
4251 p->p_offset = bed->s->sizeof_ehdr;
4252
4253 if (m->count > 0)
4254 {
4255 BFD_ASSERT (p->p_type == PT_LOAD);
4256 p->p_vaddr -= off - p->p_offset;
4257 if (! m->p_paddr_valid)
4258 p->p_paddr -= off - p->p_offset;
4259 }
4260
4261 if (p->p_type == PT_LOAD)
4262 {
4263 phdrs_vaddr = p->p_vaddr;
4264 phdrs_paddr = p->p_paddr;
4265 }
4266 else
4267 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4268 }
4269
4270 p->p_filesz += alloc * bed->s->sizeof_phdr;
4271 p->p_memsz += alloc * bed->s->sizeof_phdr;
4272 }
4273
4274 if (p->p_type == PT_LOAD
4275 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4276 {
4277 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4278 p->p_offset = off + voff;
252b5132
RH
4279 else
4280 {
4281 file_ptr adjust;
4282
4283 adjust = off - (p->p_offset + p->p_filesz);
4284 p->p_filesz += adjust;
4285 p->p_memsz += adjust;
4286 }
4287 }
4288
252b5132
RH
4289 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4290 {
4291 asection *sec;
4292 flagword flags;
4293 bfd_size_type align;
4294
4295 sec = *secpp;
4296 flags = sec->flags;
4297 align = 1 << bfd_get_section_alignment (abfd, sec);
4298
b301b248
AM
4299 if (p->p_type == PT_LOAD
4300 || p->p_type == PT_TLS)
252b5132
RH
4301 {
4302 bfd_signed_vma adjust;
4303
5efb6261 4304 if ((flags & SEC_LOAD) != 0)
252b5132 4305 {
b301b248 4306 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4307 if (adjust < 0)
b301b248
AM
4308 {
4309 (*_bfd_error_handler)
4310 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4311 abfd, sec, (unsigned long) sec->lma);
4312 adjust = 0;
4313 }
4314 off += adjust;
4315 p->p_filesz += adjust;
4316 p->p_memsz += adjust;
252b5132 4317 }
b301b248
AM
4318 /* .tbss is special. It doesn't contribute to p_memsz of
4319 normal segments. */
4320 else if ((flags & SEC_THREAD_LOCAL) == 0
4321 || p->p_type == PT_TLS)
252b5132
RH
4322 {
4323 /* The section VMA must equal the file position
b301b248
AM
4324 modulo the page size. */
4325 bfd_size_type page = align;
a49e53ed 4326 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > page)
b301b248
AM
4327 page = bed->maxpagesize;
4328 adjust = vma_page_aligned_bias (sec->vma,
4329 p->p_vaddr + p->p_memsz,
4330 page);
252b5132 4331 p->p_memsz += adjust;
252b5132 4332 }
252b5132
RH
4333 }
4334
4335 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4336 {
b301b248
AM
4337 /* The section at i == 0 is the one that actually contains
4338 everything. */
4a938328
MS
4339 if (i == 0)
4340 {
252b5132 4341 sec->filepos = off;
eea6121a 4342 off += sec->size;
b301b248
AM
4343 p->p_filesz = sec->size;
4344 p->p_memsz = 0;
4345 p->p_align = 1;
252b5132 4346 }
4a938328 4347 else
252b5132 4348 {
b301b248 4349 /* The rest are fake sections that shouldn't be written. */
252b5132 4350 sec->filepos = 0;
eea6121a 4351 sec->size = 0;
b301b248
AM
4352 sec->flags = 0;
4353 continue;
252b5132 4354 }
252b5132
RH
4355 }
4356 else
4357 {
b301b248
AM
4358 if (p->p_type == PT_LOAD)
4359 {
4360 sec->filepos = off;
5efb6261
AM
4361 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4362 1997, and the exact reason for it isn't clear. One
4363 plausible explanation is that it is to work around
4364 a problem we have with linker scripts using data
4365 statements in NOLOAD sections. I don't think it
4366 makes a great deal of sense to have such a section
4367 assigned to a PT_LOAD segment, but apparently
4368 people do this. The data statement results in a
4369 bfd_data_link_order being built, and these need
4370 section contents to write into. Eventually, we get
4371 to _bfd_elf_write_object_contents which writes any
4372 section with contents to the output. Make room
4373 here for the write, so that following segments are
4374 not trashed. */
4375 if ((flags & SEC_LOAD) != 0
4376 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4377 off += sec->size;
4378 }
252b5132 4379
5efb6261 4380 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4381 {
4382 p->p_filesz += sec->size;
4383 p->p_memsz += sec->size;
4384 }
4b6c0f2f
NC
4385 /* PR ld/594: Sections in note segments which are not loaded
4386 contribute to the file size but not the in-memory size. */
4387 else if (p->p_type == PT_NOTE
4388 && (flags & SEC_HAS_CONTENTS) != 0)
4389 p->p_filesz += sec->size;
4390
b301b248
AM
4391 /* .tbss is special. It doesn't contribute to p_memsz of
4392 normal segments. */
4393 else if ((flags & SEC_THREAD_LOCAL) == 0
4394 || p->p_type == PT_TLS)
4395 p->p_memsz += sec->size;
252b5132 4396
13ae64f3 4397 if (p->p_type == PT_TLS
eea6121a 4398 && sec->size == 0
13ae64f3
JJ
4399 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4400 {
4401 struct bfd_link_order *o;
4402 bfd_vma tbss_size = 0;
4403
8423293d 4404 for (o = sec->map_head.link_order; o != NULL; o = o->next)
13ae64f3
JJ
4405 if (tbss_size < o->offset + o->size)
4406 tbss_size = o->offset + o->size;
4407
4408 p->p_memsz += tbss_size;
4409 }
4410
252b5132
RH
4411 if (align > p->p_align
4412 && (p->p_type != PT_LOAD || (abfd->flags & D_PAGED) == 0))
4413 p->p_align = align;
4414 }
4415
4416 if (! m->p_flags_valid)
4417 {
4418 p->p_flags |= PF_R;
4419 if ((flags & SEC_CODE) != 0)
4420 p->p_flags |= PF_X;
4421 if ((flags & SEC_READONLY) == 0)
4422 p->p_flags |= PF_W;
4423 }
4424 }
4425 }
4426
4427 /* Now that we have set the section file positions, we can set up
4428 the file positions for the non PT_LOAD segments. */
4429 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4430 m != NULL;
4431 m = m->next, p++)
4432 {
4433 if (p->p_type != PT_LOAD && m->count > 0)
4434 {
4435 BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs);
229fcec5
MM
4436 /* If the section has not yet been assigned a file position,
4437 do so now. The ARM BPABI requires that .dynamic section
4438 not be marked SEC_ALLOC because it is not part of any
4439 PT_LOAD segment, so it will not be processed above. */
4440 if (p->p_type == PT_DYNAMIC && m->sections[0]->filepos == 0)
4441 {
4442 unsigned int i;
4443 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4444
4445 i = 1;
4446 while (i_shdrpp[i]->bfd_section != m->sections[0])
4447 ++i;
4448 off = (_bfd_elf_assign_file_position_for_section
4449 (i_shdrpp[i], off, TRUE));
4450 p->p_filesz = m->sections[0]->size;
4451 }
252b5132
RH
4452 p->p_offset = m->sections[0]->filepos;
4453 }
4454 if (m->count == 0)
4455 {
4456 if (m->includes_filehdr)
4457 {
4458 p->p_vaddr = filehdr_vaddr;
4459 if (! m->p_paddr_valid)
4460 p->p_paddr = filehdr_paddr;
4461 }
4462 else if (m->includes_phdrs)
4463 {
4464 p->p_vaddr = phdrs_vaddr;
4465 if (! m->p_paddr_valid)
4466 p->p_paddr = phdrs_paddr;
4467 }
8c37241b
JJ
4468 else if (p->p_type == PT_GNU_RELRO)
4469 {
4470 Elf_Internal_Phdr *lp;
4471
4472 for (lp = phdrs; lp < phdrs + count; ++lp)
4473 {
4474 if (lp->p_type == PT_LOAD
4475 && lp->p_vaddr <= link_info->relro_end
4476 && lp->p_vaddr >= link_info->relro_start
4477 && lp->p_vaddr + lp->p_filesz
4478 >= link_info->relro_end)
4479 break;
4480 }
4481
4482 if (lp < phdrs + count
4483 && link_info->relro_end > lp->p_vaddr)
4484 {
4485 p->p_vaddr = lp->p_vaddr;
4486 p->p_paddr = lp->p_paddr;
4487 p->p_offset = lp->p_offset;
4488 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4489 p->p_memsz = p->p_filesz;
4490 p->p_align = 1;
4491 p->p_flags = (lp->p_flags & ~PF_W);
4492 }
4493 else
4494 {
4495 memset (p, 0, sizeof *p);
4496 p->p_type = PT_NULL;
4497 }
4498 }
252b5132
RH
4499 }
4500 }
4501
4502 /* Clear out any program headers we allocated but did not use. */
4503 for (; count < alloc; count++, p++)
4504 {
4505 memset (p, 0, sizeof *p);
4506 p->p_type = PT_NULL;
4507 }
4508
4509 elf_tdata (abfd)->phdr = phdrs;
4510
4511 elf_tdata (abfd)->next_file_pos = off;
4512
4513 /* Write out the program headers. */
dc810e39 4514 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
252b5132 4515 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0)
b34976b6 4516 return FALSE;
252b5132 4517
b34976b6 4518 return TRUE;
252b5132
RH
4519}
4520
4521/* Get the size of the program header.
4522
4523 If this is called by the linker before any of the section VMA's are set, it
4524 can't calculate the correct value for a strange memory layout. This only
4525 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4526 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4527 data segment (exclusive of .interp and .dynamic).
4528
4529 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4530 will be two segments. */
4531
4532static bfd_size_type
217aa764 4533get_program_header_size (bfd *abfd)
252b5132
RH
4534{
4535 size_t segs;
4536 asection *s;
9c5bfbb7 4537 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4538
4539 /* We can't return a different result each time we're called. */
4540 if (elf_tdata (abfd)->program_header_size != 0)
4541 return elf_tdata (abfd)->program_header_size;
4542
4543 if (elf_tdata (abfd)->segment_map != NULL)
4544 {
4545 struct elf_segment_map *m;
4546
4547 segs = 0;
4548 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4549 ++segs;
4550 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4551 return elf_tdata (abfd)->program_header_size;
4552 }
4553
4554 /* Assume we will need exactly two PT_LOAD segments: one for text
4555 and one for data. */
4556 segs = 2;
4557
4558 s = bfd_get_section_by_name (abfd, ".interp");
4559 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4560 {
4561 /* If we have a loadable interpreter section, we need a
4562 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4563 PT_PHDR segment, although that may not be true for all
252b5132
RH
4564 targets. */
4565 segs += 2;
4566 }
4567
4568 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4569 {
4570 /* We need a PT_DYNAMIC segment. */
4571 ++segs;
4572 }
4573
126495ed 4574 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4575 {
4576 /* We need a PT_GNU_EH_FRAME segment. */
4577 ++segs;
4578 }
4579
9ee5e499
JJ
4580 if (elf_tdata (abfd)->stack_flags)
4581 {
4582 /* We need a PT_GNU_STACK segment. */
4583 ++segs;
4584 }
4585
8c37241b
JJ
4586 if (elf_tdata (abfd)->relro)
4587 {
4588 /* We need a PT_GNU_RELRO segment. */
4589 ++segs;
4590 }
4591
252b5132
RH
4592 for (s = abfd->sections; s != NULL; s = s->next)
4593 {
4594 if ((s->flags & SEC_LOAD) != 0
4595 && strncmp (s->name, ".note", 5) == 0)
4596 {
4597 /* We need a PT_NOTE segment. */
4598 ++segs;
4599 }
4600 }
4601
13ae64f3
JJ
4602 for (s = abfd->sections; s != NULL; s = s->next)
4603 {
4604 if (s->flags & SEC_THREAD_LOCAL)
4605 {
4606 /* We need a PT_TLS segment. */
4607 ++segs;
4608 break;
4609 }
4610 }
4611
252b5132
RH
4612 /* Let the backend count up any program headers it might need. */
4613 if (bed->elf_backend_additional_program_headers)
4614 {
4615 int a;
4616
4617 a = (*bed->elf_backend_additional_program_headers) (abfd);
4618 if (a == -1)
4619 abort ();
4620 segs += a;
4621 }
4622
4623 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4624 return elf_tdata (abfd)->program_header_size;
4625}
4626
4627/* Work out the file positions of all the sections. This is called by
4628 _bfd_elf_compute_section_file_positions. All the section sizes and
4629 VMAs must be known before this is called.
4630
e0638f70
AM
4631 Reloc sections come in two flavours: Those processed specially as
4632 "side-channel" data attached to a section to which they apply, and
4633 those that bfd doesn't process as relocations. The latter sort are
4634 stored in a normal bfd section by bfd_section_from_shdr. We don't
4635 consider the former sort here, unless they form part of the loadable
4636 image. Reloc sections not assigned here will be handled later by
4637 assign_file_positions_for_relocs.
252b5132
RH
4638
4639 We also don't set the positions of the .symtab and .strtab here. */
4640
b34976b6 4641static bfd_boolean
c84fca4d
AO
4642assign_file_positions_except_relocs (bfd *abfd,
4643 struct bfd_link_info *link_info)
252b5132
RH
4644{
4645 struct elf_obj_tdata * const tdata = elf_tdata (abfd);
4646 Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd);
4647 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
9ad5cbcf 4648 unsigned int num_sec = elf_numsections (abfd);
252b5132 4649 file_ptr off;
9c5bfbb7 4650 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4651
4652 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4653 && bfd_get_format (abfd) != bfd_core)
4654 {
4655 Elf_Internal_Shdr **hdrpp;
4656 unsigned int i;
4657
4658 /* Start after the ELF header. */
4659 off = i_ehdrp->e_ehsize;
4660
4661 /* We are not creating an executable, which means that we are
4662 not creating a program header, and that the actual order of
4663 the sections in the file is unimportant. */
9ad5cbcf 4664 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4665 {
4666 Elf_Internal_Shdr *hdr;
4667
4668 hdr = *hdrpp;
e0638f70
AM
4669 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4670 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4671 || i == tdata->symtab_section
4672 || i == tdata->symtab_shndx_section
252b5132
RH
4673 || i == tdata->strtab_section)
4674 {
4675 hdr->sh_offset = -1;
252b5132 4676 }
9ad5cbcf 4677 else
b34976b6 4678 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4679
9ad5cbcf
AM
4680 if (i == SHN_LORESERVE - 1)
4681 {
4682 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4683 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4684 }
252b5132
RH
4685 }
4686 }
4687 else
4688 {
4689 unsigned int i;
4690 Elf_Internal_Shdr **hdrpp;
4691
4692 /* Assign file positions for the loaded sections based on the
4693 assignment of sections to segments. */
c84fca4d 4694 if (! assign_file_positions_for_segments (abfd, link_info))
b34976b6 4695 return FALSE;
252b5132
RH
4696
4697 /* Assign file positions for the other sections. */
4698
4699 off = elf_tdata (abfd)->next_file_pos;
9ad5cbcf 4700 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4701 {
4702 Elf_Internal_Shdr *hdr;
4703
4704 hdr = *hdrpp;
4705 if (hdr->bfd_section != NULL
4706 && hdr->bfd_section->filepos != 0)
4707 hdr->sh_offset = hdr->bfd_section->filepos;
4708 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4709 {
4710 ((*_bfd_error_handler)
b301b248
AM
4711 (_("%B: warning: allocated section `%s' not in segment"),
4712 abfd,
252b5132
RH
4713 (hdr->bfd_section == NULL
4714 ? "*unknown*"
4715 : hdr->bfd_section->name)));
4716 if ((abfd->flags & D_PAGED) != 0)
340b6d91
AC
4717 off += vma_page_aligned_bias (hdr->sh_addr, off,
4718 bed->maxpagesize);
252b5132 4719 else
340b6d91
AC
4720 off += vma_page_aligned_bias (hdr->sh_addr, off,
4721 hdr->sh_addralign);
252b5132 4722 off = _bfd_elf_assign_file_position_for_section (hdr, off,
b34976b6 4723 FALSE);
252b5132 4724 }
e0638f70
AM
4725 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4726 && hdr->bfd_section == NULL)
252b5132 4727 || hdr == i_shdrpp[tdata->symtab_section]
9ad5cbcf 4728 || hdr == i_shdrpp[tdata->symtab_shndx_section]
252b5132
RH
4729 || hdr == i_shdrpp[tdata->strtab_section])
4730 hdr->sh_offset = -1;
4731 else
b34976b6 4732 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf
AM
4733
4734 if (i == SHN_LORESERVE - 1)
4735 {
4736 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4737 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4738 }
252b5132
RH
4739 }
4740 }
4741
4742 /* Place the section headers. */
45d6a902 4743 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4744 i_ehdrp->e_shoff = off;
4745 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4746
4747 elf_tdata (abfd)->next_file_pos = off;
4748
b34976b6 4749 return TRUE;
252b5132
RH
4750}
4751
b34976b6 4752static bfd_boolean
217aa764 4753prep_headers (bfd *abfd)
252b5132
RH
4754{
4755 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4756 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4757 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4758 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4759 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4760
4761 i_ehdrp = elf_elfheader (abfd);
4762 i_shdrp = elf_elfsections (abfd);
4763
2b0f7ef9 4764 shstrtab = _bfd_elf_strtab_init ();
252b5132 4765 if (shstrtab == NULL)
b34976b6 4766 return FALSE;
252b5132
RH
4767
4768 elf_shstrtab (abfd) = shstrtab;
4769
4770 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4771 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4772 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4773 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4774
4775 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4776 i_ehdrp->e_ident[EI_DATA] =
4777 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4778 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4779
252b5132
RH
4780 if ((abfd->flags & DYNAMIC) != 0)
4781 i_ehdrp->e_type = ET_DYN;
4782 else if ((abfd->flags & EXEC_P) != 0)
4783 i_ehdrp->e_type = ET_EXEC;
4784 else if (bfd_get_format (abfd) == bfd_core)
4785 i_ehdrp->e_type = ET_CORE;
4786 else
4787 i_ehdrp->e_type = ET_REL;
4788
4789 switch (bfd_get_arch (abfd))
4790 {
4791 case bfd_arch_unknown:
4792 i_ehdrp->e_machine = EM_NONE;
4793 break;
aa4f99bb
AO
4794
4795 /* There used to be a long list of cases here, each one setting
4796 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4797 in the corresponding bfd definition. To avoid duplication,
4798 the switch was removed. Machines that need special handling
4799 can generally do it in elf_backend_final_write_processing(),
4800 unless they need the information earlier than the final write.
4801 Such need can generally be supplied by replacing the tests for
4802 e_machine with the conditions used to determine it. */
252b5132 4803 default:
9c5bfbb7
AM
4804 i_ehdrp->e_machine = bed->elf_machine_code;
4805 }
aa4f99bb 4806
252b5132
RH
4807 i_ehdrp->e_version = bed->s->ev_current;
4808 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4809
c044fabd 4810 /* No program header, for now. */
252b5132
RH
4811 i_ehdrp->e_phoff = 0;
4812 i_ehdrp->e_phentsize = 0;
4813 i_ehdrp->e_phnum = 0;
4814
c044fabd 4815 /* Each bfd section is section header entry. */
252b5132
RH
4816 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4817 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4818
c044fabd 4819 /* If we're building an executable, we'll need a program header table. */
252b5132 4820 if (abfd->flags & EXEC_P)
0e71e495
BE
4821 /* It all happens later. */
4822 ;
252b5132
RH
4823 else
4824 {
4825 i_ehdrp->e_phentsize = 0;
4826 i_phdrp = 0;
4827 i_ehdrp->e_phoff = 0;
4828 }
4829
4830 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4831 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4832 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4833 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4834 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4835 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4836 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4837 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4838 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4839 return FALSE;
252b5132 4840
b34976b6 4841 return TRUE;
252b5132
RH
4842}
4843
4844/* Assign file positions for all the reloc sections which are not part
4845 of the loadable file image. */
4846
4847void
217aa764 4848_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4849{
4850 file_ptr off;
9ad5cbcf 4851 unsigned int i, num_sec;
252b5132
RH
4852 Elf_Internal_Shdr **shdrpp;
4853
4854 off = elf_tdata (abfd)->next_file_pos;
4855
9ad5cbcf
AM
4856 num_sec = elf_numsections (abfd);
4857 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4858 {
4859 Elf_Internal_Shdr *shdrp;
4860
4861 shdrp = *shdrpp;
4862 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4863 && shdrp->sh_offset == -1)
b34976b6 4864 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4865 }
4866
4867 elf_tdata (abfd)->next_file_pos = off;
4868}
4869
b34976b6 4870bfd_boolean
217aa764 4871_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4872{
9c5bfbb7 4873 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4874 Elf_Internal_Ehdr *i_ehdrp;
4875 Elf_Internal_Shdr **i_shdrp;
b34976b6 4876 bfd_boolean failed;
9ad5cbcf 4877 unsigned int count, num_sec;
252b5132
RH
4878
4879 if (! abfd->output_has_begun
217aa764 4880 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4881 return FALSE;
252b5132
RH
4882
4883 i_shdrp = elf_elfsections (abfd);
4884 i_ehdrp = elf_elfheader (abfd);
4885
b34976b6 4886 failed = FALSE;
252b5132
RH
4887 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4888 if (failed)
b34976b6 4889 return FALSE;
252b5132
RH
4890
4891 _bfd_elf_assign_file_positions_for_relocs (abfd);
4892
c044fabd 4893 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4894 num_sec = elf_numsections (abfd);
4895 for (count = 1; count < num_sec; count++)
252b5132
RH
4896 {
4897 if (bed->elf_backend_section_processing)
4898 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4899 if (i_shdrp[count]->contents)
4900 {
dc810e39
AM
4901 bfd_size_type amt = i_shdrp[count]->sh_size;
4902
252b5132 4903 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4904 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4905 return FALSE;
252b5132 4906 }
9ad5cbcf
AM
4907 if (count == SHN_LORESERVE - 1)
4908 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4909 }
4910
4911 /* Write out the section header names. */
26ae6d5e
DJ
4912 if (elf_shstrtab (abfd) != NULL
4913 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
4914 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4915 return FALSE;
252b5132
RH
4916
4917 if (bed->elf_backend_final_write_processing)
4918 (*bed->elf_backend_final_write_processing) (abfd,
4919 elf_tdata (abfd)->linker);
4920
4921 return bed->s->write_shdrs_and_ehdr (abfd);
4922}
4923
b34976b6 4924bfd_boolean
217aa764 4925_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4926{
c044fabd 4927 /* Hopefully this can be done just like an object file. */
252b5132
RH
4928 return _bfd_elf_write_object_contents (abfd);
4929}
c044fabd
KH
4930
4931/* Given a section, search the header to find them. */
4932
252b5132 4933int
198beae2 4934_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4935{
9c5bfbb7 4936 const struct elf_backend_data *bed;
252b5132 4937 int index;
252b5132 4938
9ad5cbcf
AM
4939 if (elf_section_data (asect) != NULL
4940 && elf_section_data (asect)->this_idx != 0)
4941 return elf_section_data (asect)->this_idx;
4942
4943 if (bfd_is_abs_section (asect))
af746e92
AM
4944 index = SHN_ABS;
4945 else if (bfd_is_com_section (asect))
4946 index = SHN_COMMON;
4947 else if (bfd_is_und_section (asect))
4948 index = SHN_UNDEF;
4949 else
6dc132d9 4950 index = -1;
252b5132 4951
af746e92 4952 bed = get_elf_backend_data (abfd);
252b5132
RH
4953 if (bed->elf_backend_section_from_bfd_section)
4954 {
af746e92 4955 int retval = index;
9ad5cbcf 4956
af746e92
AM
4957 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
4958 return retval;
252b5132
RH
4959 }
4960
af746e92
AM
4961 if (index == -1)
4962 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 4963
af746e92 4964 return index;
252b5132
RH
4965}
4966
4967/* Given a BFD symbol, return the index in the ELF symbol table, or -1
4968 on error. */
4969
4970int
217aa764 4971_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
4972{
4973 asymbol *asym_ptr = *asym_ptr_ptr;
4974 int idx;
4975 flagword flags = asym_ptr->flags;
4976
4977 /* When gas creates relocations against local labels, it creates its
4978 own symbol for the section, but does put the symbol into the
4979 symbol chain, so udata is 0. When the linker is generating
4980 relocatable output, this section symbol may be for one of the
4981 input sections rather than the output section. */
4982 if (asym_ptr->udata.i == 0
4983 && (flags & BSF_SECTION_SYM)
4984 && asym_ptr->section)
4985 {
4986 int indx;
4987
4988 if (asym_ptr->section->output_section != NULL)
4989 indx = asym_ptr->section->output_section->index;
4990 else
4991 indx = asym_ptr->section->index;
4e89ac30
L
4992 if (indx < elf_num_section_syms (abfd)
4993 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
4994 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
4995 }
4996
4997 idx = asym_ptr->udata.i;
4998
4999 if (idx == 0)
5000 {
5001 /* This case can occur when using --strip-symbol on a symbol
5002 which is used in a relocation entry. */
5003 (*_bfd_error_handler)
d003868e
AM
5004 (_("%B: symbol `%s' required but not present"),
5005 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5006 bfd_set_error (bfd_error_no_symbols);
5007 return -1;
5008 }
5009
5010#if DEBUG & 4
5011 {
5012 fprintf (stderr,
661a3fd4 5013 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5014 (long) asym_ptr, asym_ptr->name, idx, flags,
5015 elf_symbol_flags (flags));
5016 fflush (stderr);
5017 }
5018#endif
5019
5020 return idx;
5021}
5022
5023/* Copy private BFD data. This copies any program header information. */
5024
b34976b6 5025static bfd_boolean
217aa764 5026copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132 5027{
b34976b6
AM
5028 Elf_Internal_Ehdr *iehdr;
5029 struct elf_segment_map *map;
5030 struct elf_segment_map *map_first;
5031 struct elf_segment_map **pointer_to_map;
5032 Elf_Internal_Phdr *segment;
5033 asection *section;
5034 unsigned int i;
5035 unsigned int num_segments;
5036 bfd_boolean phdr_included = FALSE;
5037 bfd_vma maxpagesize;
5038 struct elf_segment_map *phdr_adjust_seg = NULL;
5039 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5040 const struct elf_backend_data *bed;
bc67d8a6 5041
c044fabd 5042 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 5043 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5044 return TRUE;
252b5132
RH
5045
5046 if (elf_tdata (ibfd)->phdr == NULL)
b34976b6 5047 return TRUE;
252b5132 5048
caf47ea6 5049 bed = get_elf_backend_data (ibfd);
252b5132
RH
5050 iehdr = elf_elfheader (ibfd);
5051
bc67d8a6 5052 map_first = NULL;
c044fabd 5053 pointer_to_map = &map_first;
252b5132
RH
5054
5055 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5056 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5057
5058 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5059#define SEGMENT_END(segment, start) \
5060 (start + (segment->p_memsz > segment->p_filesz \
5061 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5062
eecdbe52
JJ
5063#define SECTION_SIZE(section, segment) \
5064 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5065 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5066 ? section->size : 0)
eecdbe52 5067
b34976b6 5068 /* Returns TRUE if the given section is contained within
bc67d8a6 5069 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5070#define IS_CONTAINED_BY_VMA(section, segment) \
5071 (section->vma >= segment->p_vaddr \
eecdbe52 5072 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5073 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5074
b34976b6 5075 /* Returns TRUE if the given section is contained within
bc67d8a6 5076 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5077#define IS_CONTAINED_BY_LMA(section, segment, base) \
5078 (section->lma >= base \
eecdbe52 5079 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5080 <= SEGMENT_END (segment, base)))
252b5132 5081
c044fabd 5082 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5083#define IS_COREFILE_NOTE(p, s) \
5084 (p->p_type == PT_NOTE \
5085 && bfd_get_format (ibfd) == bfd_core \
5086 && s->vma == 0 && s->lma == 0 \
5087 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5088 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5089 <= p->p_offset + p->p_filesz))
252b5132
RH
5090
5091 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5092 linker, which generates a PT_INTERP section with p_vaddr and
5093 p_memsz set to 0. */
aecc8f8a
AM
5094#define IS_SOLARIS_PT_INTERP(p, s) \
5095 (p->p_vaddr == 0 \
5096 && p->p_paddr == 0 \
5097 && p->p_memsz == 0 \
5098 && p->p_filesz > 0 \
5099 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5100 && s->size > 0 \
aecc8f8a 5101 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5102 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5103 <= p->p_offset + p->p_filesz))
5c440b1e 5104
bc67d8a6
NC
5105 /* Decide if the given section should be included in the given segment.
5106 A section will be included if:
f5ffc919
NC
5107 1. It is within the address space of the segment -- we use the LMA
5108 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5109 2. It is an allocated segment,
5110 3. There is an output section associated with it,
eecdbe52 5111 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5112 5. PT_GNU_STACK segments do not include any sections.
5113 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5114 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5115 8. PT_DYNAMIC should not contain empty sections at the beginning
5116 (with the possible exception of .dynamic). */
caf47ea6 5117#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5118 ((((segment->p_paddr \
5119 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5120 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5121 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5122 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5123 && section->output_section != NULL \
03394ac9 5124 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5125 && (segment->p_type != PT_TLS \
5126 || (section->flags & SEC_THREAD_LOCAL)) \
5127 && (segment->p_type == PT_LOAD \
5128 || segment->p_type == PT_TLS \
5129 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5130 && (segment->p_type != PT_DYNAMIC \
5131 || SECTION_SIZE (section, segment) > 0 \
5132 || (segment->p_paddr \
5133 ? segment->p_paddr != section->lma \
5134 : segment->p_vaddr != section->vma) \
5135 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5136 == 0)) \
82e51918 5137 && ! section->segment_mark)
bc67d8a6 5138
b34976b6 5139 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5140#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5141 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5142
5143 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5144 their VMA address ranges and their LMA address ranges overlap.
5145 It is possible to have overlapping VMA ranges without overlapping LMA
5146 ranges. RedBoot images for example can have both .data and .bss mapped
5147 to the same VMA range, but with the .data section mapped to a different
5148 LMA. */
aecc8f8a 5149#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5150 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5151 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5152 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5153 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5154
5155 /* Initialise the segment mark field. */
5156 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5157 section->segment_mark = FALSE;
bc67d8a6 5158
252b5132 5159 /* Scan through the segments specified in the program header
bc67d8a6 5160 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5161 in the loadable segments. These can be created by weird
aecc8f8a 5162 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5163 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5164 i < num_segments;
c044fabd 5165 i++, segment++)
252b5132 5166 {
252b5132 5167 unsigned int j;
c044fabd 5168 Elf_Internal_Phdr *segment2;
252b5132 5169
aecc8f8a
AM
5170 if (segment->p_type == PT_INTERP)
5171 for (section = ibfd->sections; section; section = section->next)
5172 if (IS_SOLARIS_PT_INTERP (segment, section))
5173 {
5174 /* Mininal change so that the normal section to segment
4cc11e76 5175 assignment code will work. */
aecc8f8a
AM
5176 segment->p_vaddr = section->vma;
5177 break;
5178 }
5179
bc67d8a6
NC
5180 if (segment->p_type != PT_LOAD)
5181 continue;
c044fabd 5182
bc67d8a6 5183 /* Determine if this segment overlaps any previous segments. */
c044fabd 5184 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5185 {
5186 bfd_signed_vma extra_length;
c044fabd 5187
bc67d8a6
NC
5188 if (segment2->p_type != PT_LOAD
5189 || ! SEGMENT_OVERLAPS (segment, segment2))
5190 continue;
c044fabd 5191
bc67d8a6
NC
5192 /* Merge the two segments together. */
5193 if (segment2->p_vaddr < segment->p_vaddr)
5194 {
c044fabd
KH
5195 /* Extend SEGMENT2 to include SEGMENT and then delete
5196 SEGMENT. */
bc67d8a6
NC
5197 extra_length =
5198 SEGMENT_END (segment, segment->p_vaddr)
5199 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5200
bc67d8a6
NC
5201 if (extra_length > 0)
5202 {
5203 segment2->p_memsz += extra_length;
5204 segment2->p_filesz += extra_length;
5205 }
c044fabd 5206
bc67d8a6 5207 segment->p_type = PT_NULL;
c044fabd 5208
bc67d8a6
NC
5209 /* Since we have deleted P we must restart the outer loop. */
5210 i = 0;
5211 segment = elf_tdata (ibfd)->phdr;
5212 break;
5213 }
5214 else
5215 {
c044fabd
KH
5216 /* Extend SEGMENT to include SEGMENT2 and then delete
5217 SEGMENT2. */
bc67d8a6
NC
5218 extra_length =
5219 SEGMENT_END (segment2, segment2->p_vaddr)
5220 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5221
bc67d8a6
NC
5222 if (extra_length > 0)
5223 {
5224 segment->p_memsz += extra_length;
5225 segment->p_filesz += extra_length;
5226 }
c044fabd 5227
bc67d8a6
NC
5228 segment2->p_type = PT_NULL;
5229 }
5230 }
5231 }
c044fabd 5232
bc67d8a6
NC
5233 /* The second scan attempts to assign sections to segments. */
5234 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5235 i < num_segments;
5236 i ++, segment ++)
5237 {
5238 unsigned int section_count;
5239 asection ** sections;
5240 asection * output_section;
5241 unsigned int isec;
5242 bfd_vma matching_lma;
5243 bfd_vma suggested_lma;
5244 unsigned int j;
dc810e39 5245 bfd_size_type amt;
bc67d8a6
NC
5246
5247 if (segment->p_type == PT_NULL)
5248 continue;
c044fabd 5249
bc67d8a6 5250 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5251 for (section = ibfd->sections, section_count = 0;
5252 section != NULL;
5253 section = section->next)
caf47ea6 5254 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5255 ++section_count;
811072d8 5256
b5f852ea
NC
5257 /* Allocate a segment map big enough to contain
5258 all of the sections we have selected. */
dc810e39
AM
5259 amt = sizeof (struct elf_segment_map);
5260 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5261 map = bfd_alloc (obfd, amt);
bc67d8a6 5262 if (map == NULL)
b34976b6 5263 return FALSE;
252b5132
RH
5264
5265 /* Initialise the fields of the segment map. Default to
5266 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5267 map->next = NULL;
5268 map->p_type = segment->p_type;
5269 map->p_flags = segment->p_flags;
5270 map->p_flags_valid = 1;
5271 map->p_paddr = segment->p_paddr;
5272 map->p_paddr_valid = 1;
252b5132
RH
5273
5274 /* Determine if this segment contains the ELF file header
5275 and if it contains the program headers themselves. */
bc67d8a6
NC
5276 map->includes_filehdr = (segment->p_offset == 0
5277 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5278
bc67d8a6 5279 map->includes_phdrs = 0;
252b5132 5280
bc67d8a6 5281 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5282 {
bc67d8a6
NC
5283 map->includes_phdrs =
5284 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5285 && (segment->p_offset + segment->p_filesz
252b5132
RH
5286 >= ((bfd_vma) iehdr->e_phoff
5287 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5288
bc67d8a6 5289 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5290 phdr_included = TRUE;
252b5132
RH
5291 }
5292
bc67d8a6 5293 if (section_count == 0)
252b5132
RH
5294 {
5295 /* Special segments, such as the PT_PHDR segment, may contain
5296 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5297 something. They are allowed by the ELF spec however, so only
5298 a warning is produced. */
bc67d8a6 5299 if (segment->p_type == PT_LOAD)
caf47ea6 5300 (*_bfd_error_handler)
d003868e
AM
5301 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5302 ibfd);
252b5132 5303
bc67d8a6 5304 map->count = 0;
c044fabd
KH
5305 *pointer_to_map = map;
5306 pointer_to_map = &map->next;
252b5132
RH
5307
5308 continue;
5309 }
5310
5311 /* Now scan the sections in the input BFD again and attempt
5312 to add their corresponding output sections to the segment map.
5313 The problem here is how to handle an output section which has
5314 been moved (ie had its LMA changed). There are four possibilities:
5315
5316 1. None of the sections have been moved.
5317 In this case we can continue to use the segment LMA from the
5318 input BFD.
5319
5320 2. All of the sections have been moved by the same amount.
5321 In this case we can change the segment's LMA to match the LMA
5322 of the first section.
5323
5324 3. Some of the sections have been moved, others have not.
5325 In this case those sections which have not been moved can be
5326 placed in the current segment which will have to have its size,
5327 and possibly its LMA changed, and a new segment or segments will
5328 have to be created to contain the other sections.
5329
b5f852ea 5330 4. The sections have been moved, but not by the same amount.
252b5132
RH
5331 In this case we can change the segment's LMA to match the LMA
5332 of the first section and we will have to create a new segment
5333 or segments to contain the other sections.
5334
5335 In order to save time, we allocate an array to hold the section
5336 pointers that we are interested in. As these sections get assigned
5337 to a segment, they are removed from this array. */
5338
0b14c2aa
L
5339 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5340 to work around this long long bug. */
d0fb9a8d 5341 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5342 if (sections == NULL)
b34976b6 5343 return FALSE;
252b5132
RH
5344
5345 /* Step One: Scan for segment vs section LMA conflicts.
5346 Also add the sections to the section array allocated above.
5347 Also add the sections to the current segment. In the common
5348 case, where the sections have not been moved, this means that
5349 we have completely filled the segment, and there is nothing
5350 more to do. */
252b5132 5351 isec = 0;
72730e0c 5352 matching_lma = 0;
252b5132
RH
5353 suggested_lma = 0;
5354
bc67d8a6
NC
5355 for (j = 0, section = ibfd->sections;
5356 section != NULL;
5357 section = section->next)
252b5132 5358 {
caf47ea6 5359 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5360 {
bc67d8a6
NC
5361 output_section = section->output_section;
5362
5363 sections[j ++] = section;
252b5132
RH
5364
5365 /* The Solaris native linker always sets p_paddr to 0.
5366 We try to catch that case here, and set it to the
5e8d7549
NC
5367 correct value. Note - some backends require that
5368 p_paddr be left as zero. */
bc67d8a6 5369 if (segment->p_paddr == 0
4455705d 5370 && segment->p_vaddr != 0
5e8d7549 5371 && (! bed->want_p_paddr_set_to_zero)
252b5132 5372 && isec == 0
bc67d8a6
NC
5373 && output_section->lma != 0
5374 && (output_section->vma == (segment->p_vaddr
5375 + (map->includes_filehdr
5376 ? iehdr->e_ehsize
5377 : 0)
5378 + (map->includes_phdrs
079e9a2f
AM
5379 ? (iehdr->e_phnum
5380 * iehdr->e_phentsize)
bc67d8a6
NC
5381 : 0))))
5382 map->p_paddr = segment->p_vaddr;
252b5132
RH
5383
5384 /* Match up the physical address of the segment with the
5385 LMA address of the output section. */
bc67d8a6 5386 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5387 || IS_COREFILE_NOTE (segment, section)
5388 || (bed->want_p_paddr_set_to_zero &&
5389 IS_CONTAINED_BY_VMA (output_section, segment))
5390 )
252b5132
RH
5391 {
5392 if (matching_lma == 0)
bc67d8a6 5393 matching_lma = output_section->lma;
252b5132
RH
5394
5395 /* We assume that if the section fits within the segment
bc67d8a6 5396 then it does not overlap any other section within that
252b5132 5397 segment. */
bc67d8a6 5398 map->sections[isec ++] = output_section;
252b5132
RH
5399 }
5400 else if (suggested_lma == 0)
bc67d8a6 5401 suggested_lma = output_section->lma;
252b5132
RH
5402 }
5403 }
5404
bc67d8a6 5405 BFD_ASSERT (j == section_count);
252b5132
RH
5406
5407 /* Step Two: Adjust the physical address of the current segment,
5408 if necessary. */
bc67d8a6 5409 if (isec == section_count)
252b5132
RH
5410 {
5411 /* All of the sections fitted within the segment as currently
5412 specified. This is the default case. Add the segment to
5413 the list of built segments and carry on to process the next
5414 program header in the input BFD. */
bc67d8a6 5415 map->count = section_count;
c044fabd
KH
5416 *pointer_to_map = map;
5417 pointer_to_map = &map->next;
252b5132
RH
5418
5419 free (sections);
5420 continue;
5421 }
252b5132
RH
5422 else
5423 {
72730e0c
AM
5424 if (matching_lma != 0)
5425 {
5426 /* At least one section fits inside the current segment.
5427 Keep it, but modify its physical address to match the
5428 LMA of the first section that fitted. */
bc67d8a6 5429 map->p_paddr = matching_lma;
72730e0c
AM
5430 }
5431 else
5432 {
5433 /* None of the sections fitted inside the current segment.
5434 Change the current segment's physical address to match
5435 the LMA of the first section. */
bc67d8a6 5436 map->p_paddr = suggested_lma;
72730e0c
AM
5437 }
5438
bc67d8a6
NC
5439 /* Offset the segment physical address from the lma
5440 to allow for space taken up by elf headers. */
5441 if (map->includes_filehdr)
5442 map->p_paddr -= iehdr->e_ehsize;
252b5132 5443
bc67d8a6
NC
5444 if (map->includes_phdrs)
5445 {
5446 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5447
5448 /* iehdr->e_phnum is just an estimate of the number
5449 of program headers that we will need. Make a note
5450 here of the number we used and the segment we chose
5451 to hold these headers, so that we can adjust the
5452 offset when we know the correct value. */
5453 phdr_adjust_num = iehdr->e_phnum;
5454 phdr_adjust_seg = map;
5455 }
252b5132
RH
5456 }
5457
5458 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5459 those that fit to the current segment and removing them from the
252b5132
RH
5460 sections array; but making sure not to leave large gaps. Once all
5461 possible sections have been assigned to the current segment it is
5462 added to the list of built segments and if sections still remain
5463 to be assigned, a new segment is constructed before repeating
5464 the loop. */
5465 isec = 0;
5466 do
5467 {
bc67d8a6 5468 map->count = 0;
252b5132
RH
5469 suggested_lma = 0;
5470
5471 /* Fill the current segment with sections that fit. */
bc67d8a6 5472 for (j = 0; j < section_count; j++)
252b5132 5473 {
bc67d8a6 5474 section = sections[j];
252b5132 5475
bc67d8a6 5476 if (section == NULL)
252b5132
RH
5477 continue;
5478
bc67d8a6 5479 output_section = section->output_section;
252b5132 5480
bc67d8a6 5481 BFD_ASSERT (output_section != NULL);
c044fabd 5482
bc67d8a6
NC
5483 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5484 || IS_COREFILE_NOTE (segment, section))
252b5132 5485 {
bc67d8a6 5486 if (map->count == 0)
252b5132
RH
5487 {
5488 /* If the first section in a segment does not start at
bc67d8a6
NC
5489 the beginning of the segment, then something is
5490 wrong. */
5491 if (output_section->lma !=
5492 (map->p_paddr
5493 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5494 + (map->includes_phdrs
5495 ? iehdr->e_phnum * iehdr->e_phentsize
5496 : 0)))
252b5132
RH
5497 abort ();
5498 }
5499 else
5500 {
5501 asection * prev_sec;
252b5132 5502
bc67d8a6 5503 prev_sec = map->sections[map->count - 1];
252b5132
RH
5504
5505 /* If the gap between the end of the previous section
bc67d8a6
NC
5506 and the start of this section is more than
5507 maxpagesize then we need to start a new segment. */
eea6121a 5508 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5509 maxpagesize)
caf47ea6 5510 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5511 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5512 > output_section->lma))
252b5132
RH
5513 {
5514 if (suggested_lma == 0)
bc67d8a6 5515 suggested_lma = output_section->lma;
252b5132
RH
5516
5517 continue;
5518 }
5519 }
5520
bc67d8a6 5521 map->sections[map->count++] = output_section;
252b5132
RH
5522 ++isec;
5523 sections[j] = NULL;
b34976b6 5524 section->segment_mark = TRUE;
252b5132
RH
5525 }
5526 else if (suggested_lma == 0)
bc67d8a6 5527 suggested_lma = output_section->lma;
252b5132
RH
5528 }
5529
bc67d8a6 5530 BFD_ASSERT (map->count > 0);
252b5132
RH
5531
5532 /* Add the current segment to the list of built segments. */
c044fabd
KH
5533 *pointer_to_map = map;
5534 pointer_to_map = &map->next;
252b5132 5535
bc67d8a6 5536 if (isec < section_count)
252b5132
RH
5537 {
5538 /* We still have not allocated all of the sections to
5539 segments. Create a new segment here, initialise it
5540 and carry on looping. */
dc810e39
AM
5541 amt = sizeof (struct elf_segment_map);
5542 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5543 map = bfd_alloc (obfd, amt);
bc67d8a6 5544 if (map == NULL)
5ed6aba4
NC
5545 {
5546 free (sections);
5547 return FALSE;
5548 }
252b5132
RH
5549
5550 /* Initialise the fields of the segment map. Set the physical
5551 physical address to the LMA of the first section that has
5552 not yet been assigned. */
bc67d8a6
NC
5553 map->next = NULL;
5554 map->p_type = segment->p_type;
5555 map->p_flags = segment->p_flags;
5556 map->p_flags_valid = 1;
5557 map->p_paddr = suggested_lma;
5558 map->p_paddr_valid = 1;
5559 map->includes_filehdr = 0;
5560 map->includes_phdrs = 0;
252b5132
RH
5561 }
5562 }
bc67d8a6 5563 while (isec < section_count);
252b5132
RH
5564
5565 free (sections);
5566 }
5567
5568 /* The Solaris linker creates program headers in which all the
5569 p_paddr fields are zero. When we try to objcopy or strip such a
5570 file, we get confused. Check for this case, and if we find it
5571 reset the p_paddr_valid fields. */
bc67d8a6
NC
5572 for (map = map_first; map != NULL; map = map->next)
5573 if (map->p_paddr != 0)
252b5132 5574 break;
bc67d8a6 5575 if (map == NULL)
b5f852ea
NC
5576 for (map = map_first; map != NULL; map = map->next)
5577 map->p_paddr_valid = 0;
252b5132 5578
bc67d8a6
NC
5579 elf_tdata (obfd)->segment_map = map_first;
5580
5581 /* If we had to estimate the number of program headers that were
9ad5cbcf 5582 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5583 the offset if necessary. */
5584 if (phdr_adjust_seg != NULL)
5585 {
5586 unsigned int count;
c044fabd 5587
bc67d8a6 5588 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5589 count++;
252b5132 5590
bc67d8a6
NC
5591 if (count > phdr_adjust_num)
5592 phdr_adjust_seg->p_paddr
5593 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5594 }
c044fabd 5595
bc67d8a6 5596#undef SEGMENT_END
eecdbe52 5597#undef SECTION_SIZE
bc67d8a6
NC
5598#undef IS_CONTAINED_BY_VMA
5599#undef IS_CONTAINED_BY_LMA
252b5132 5600#undef IS_COREFILE_NOTE
bc67d8a6
NC
5601#undef IS_SOLARIS_PT_INTERP
5602#undef INCLUDE_SECTION_IN_SEGMENT
5603#undef SEGMENT_AFTER_SEGMENT
5604#undef SEGMENT_OVERLAPS
b34976b6 5605 return TRUE;
252b5132
RH
5606}
5607
ccd2ec6a
L
5608/* Initialize private output section information from input section. */
5609
5610bfd_boolean
5611_bfd_elf_init_private_section_data (bfd *ibfd,
5612 asection *isec,
5613 bfd *obfd,
5614 asection *osec,
5615 struct bfd_link_info *link_info)
5616
5617{
5618 Elf_Internal_Shdr *ihdr, *ohdr;
5619 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
5620
5621 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5622 || obfd->xvec->flavour != bfd_target_elf_flavour)
5623 return TRUE;
5624
5625 /* FIXME: What if the output ELF section type has been set to
5626 something different? */
5627 if (elf_section_type (osec) == SHT_NULL)
5628 elf_section_type (osec) = elf_section_type (isec);
5629
5630 /* Set things up for objcopy and relocatable link. The output
5631 SHT_GROUP section will have its elf_next_in_group pointing back
5632 to the input group members. Ignore linker created group section.
5633 See elfNN_ia64_object_p in elfxx-ia64.c. */
5634
5635 if (need_group)
5636 {
5637 if (elf_sec_group (isec) == NULL
5638 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5639 {
5640 if (elf_section_flags (isec) & SHF_GROUP)
5641 elf_section_flags (osec) |= SHF_GROUP;
5642 elf_next_in_group (osec) = elf_next_in_group (isec);
5643 elf_group_name (osec) = elf_group_name (isec);
5644 }
5645 }
5646
5647 ihdr = &elf_section_data (isec)->this_hdr;
5648
5649 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
5650 don't use the output section of the linked-to section since it
5651 may be NULL at this point. */
5652 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
5653 {
5654 ohdr = &elf_section_data (osec)->this_hdr;
5655 ohdr->sh_flags |= SHF_LINK_ORDER;
5656 elf_linked_to_section (osec) = elf_linked_to_section (isec);
5657 }
5658
5659 osec->use_rela_p = isec->use_rela_p;
5660
5661 return TRUE;
5662}
5663
252b5132
RH
5664/* Copy private section information. This copies over the entsize
5665 field, and sometimes the info field. */
5666
b34976b6 5667bfd_boolean
217aa764
AM
5668_bfd_elf_copy_private_section_data (bfd *ibfd,
5669 asection *isec,
5670 bfd *obfd,
5671 asection *osec)
252b5132
RH
5672{
5673 Elf_Internal_Shdr *ihdr, *ohdr;
5674
5675 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5676 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5677 return TRUE;
252b5132 5678
252b5132
RH
5679 ihdr = &elf_section_data (isec)->this_hdr;
5680 ohdr = &elf_section_data (osec)->this_hdr;
5681
5682 ohdr->sh_entsize = ihdr->sh_entsize;
5683
5684 if (ihdr->sh_type == SHT_SYMTAB
5685 || ihdr->sh_type == SHT_DYNSYM
5686 || ihdr->sh_type == SHT_GNU_verneed
5687 || ihdr->sh_type == SHT_GNU_verdef)
5688 ohdr->sh_info = ihdr->sh_info;
5689
ccd2ec6a
L
5690 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
5691 NULL);
252b5132
RH
5692}
5693
80fccad2
BW
5694/* Copy private header information. */
5695
5696bfd_boolean
5697_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
5698{
5699 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5700 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5701 return TRUE;
5702
5703 /* Copy over private BFD data if it has not already been copied.
5704 This must be done here, rather than in the copy_private_bfd_data
5705 entry point, because the latter is called after the section
5706 contents have been set, which means that the program headers have
5707 already been worked out. */
5708 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
5709 {
5710 if (! copy_private_bfd_data (ibfd, obfd))
5711 return FALSE;
5712 }
5713
5714 return TRUE;
5715}
5716
252b5132
RH
5717/* Copy private symbol information. If this symbol is in a section
5718 which we did not map into a BFD section, try to map the section
5719 index correctly. We use special macro definitions for the mapped
5720 section indices; these definitions are interpreted by the
5721 swap_out_syms function. */
5722
9ad5cbcf
AM
5723#define MAP_ONESYMTAB (SHN_HIOS + 1)
5724#define MAP_DYNSYMTAB (SHN_HIOS + 2)
5725#define MAP_STRTAB (SHN_HIOS + 3)
5726#define MAP_SHSTRTAB (SHN_HIOS + 4)
5727#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 5728
b34976b6 5729bfd_boolean
217aa764
AM
5730_bfd_elf_copy_private_symbol_data (bfd *ibfd,
5731 asymbol *isymarg,
5732 bfd *obfd,
5733 asymbol *osymarg)
252b5132
RH
5734{
5735 elf_symbol_type *isym, *osym;
5736
5737 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5738 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5739 return TRUE;
252b5132
RH
5740
5741 isym = elf_symbol_from (ibfd, isymarg);
5742 osym = elf_symbol_from (obfd, osymarg);
5743
5744 if (isym != NULL
5745 && osym != NULL
5746 && bfd_is_abs_section (isym->symbol.section))
5747 {
5748 unsigned int shndx;
5749
5750 shndx = isym->internal_elf_sym.st_shndx;
5751 if (shndx == elf_onesymtab (ibfd))
5752 shndx = MAP_ONESYMTAB;
5753 else if (shndx == elf_dynsymtab (ibfd))
5754 shndx = MAP_DYNSYMTAB;
5755 else if (shndx == elf_tdata (ibfd)->strtab_section)
5756 shndx = MAP_STRTAB;
5757 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
5758 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
5759 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
5760 shndx = MAP_SYM_SHNDX;
252b5132
RH
5761 osym->internal_elf_sym.st_shndx = shndx;
5762 }
5763
b34976b6 5764 return TRUE;
252b5132
RH
5765}
5766
5767/* Swap out the symbols. */
5768
b34976b6 5769static bfd_boolean
217aa764
AM
5770swap_out_syms (bfd *abfd,
5771 struct bfd_strtab_hash **sttp,
5772 int relocatable_p)
252b5132 5773{
9c5bfbb7 5774 const struct elf_backend_data *bed;
079e9a2f
AM
5775 int symcount;
5776 asymbol **syms;
5777 struct bfd_strtab_hash *stt;
5778 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 5779 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 5780 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
5781 bfd_byte *outbound_syms;
5782 bfd_byte *outbound_shndx;
079e9a2f
AM
5783 int idx;
5784 bfd_size_type amt;
174fd7f9 5785 bfd_boolean name_local_sections;
252b5132
RH
5786
5787 if (!elf_map_symbols (abfd))
b34976b6 5788 return FALSE;
252b5132 5789
c044fabd 5790 /* Dump out the symtabs. */
079e9a2f
AM
5791 stt = _bfd_elf_stringtab_init ();
5792 if (stt == NULL)
b34976b6 5793 return FALSE;
252b5132 5794
079e9a2f
AM
5795 bed = get_elf_backend_data (abfd);
5796 symcount = bfd_get_symcount (abfd);
5797 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5798 symtab_hdr->sh_type = SHT_SYMTAB;
5799 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
5800 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
5801 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 5802 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
5803
5804 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5805 symstrtab_hdr->sh_type = SHT_STRTAB;
5806
d0fb9a8d 5807 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 5808 if (outbound_syms == NULL)
5ed6aba4
NC
5809 {
5810 _bfd_stringtab_free (stt);
5811 return FALSE;
5812 }
217aa764 5813 symtab_hdr->contents = outbound_syms;
252b5132 5814
9ad5cbcf
AM
5815 outbound_shndx = NULL;
5816 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5817 if (symtab_shndx_hdr->sh_name != 0)
5818 {
5819 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
5820 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
5821 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 5822 if (outbound_shndx == NULL)
5ed6aba4
NC
5823 {
5824 _bfd_stringtab_free (stt);
5825 return FALSE;
5826 }
5827
9ad5cbcf
AM
5828 symtab_shndx_hdr->contents = outbound_shndx;
5829 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5830 symtab_shndx_hdr->sh_size = amt;
5831 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5832 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5833 }
5834
589e6347 5835 /* Now generate the data (for "contents"). */
079e9a2f
AM
5836 {
5837 /* Fill in zeroth symbol and swap it out. */
5838 Elf_Internal_Sym sym;
5839 sym.st_name = 0;
5840 sym.st_value = 0;
5841 sym.st_size = 0;
5842 sym.st_info = 0;
5843 sym.st_other = 0;
5844 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 5845 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5846 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5847 if (outbound_shndx != NULL)
5848 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5849 }
252b5132 5850
174fd7f9
RS
5851 name_local_sections
5852 = (bed->elf_backend_name_local_section_symbols
5853 && bed->elf_backend_name_local_section_symbols (abfd));
5854
079e9a2f
AM
5855 syms = bfd_get_outsymbols (abfd);
5856 for (idx = 0; idx < symcount; idx++)
252b5132 5857 {
252b5132 5858 Elf_Internal_Sym sym;
079e9a2f
AM
5859 bfd_vma value = syms[idx]->value;
5860 elf_symbol_type *type_ptr;
5861 flagword flags = syms[idx]->flags;
5862 int type;
252b5132 5863
174fd7f9
RS
5864 if (!name_local_sections
5865 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
5866 {
5867 /* Local section symbols have no name. */
5868 sym.st_name = 0;
5869 }
5870 else
5871 {
5872 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
5873 syms[idx]->name,
b34976b6 5874 TRUE, FALSE);
079e9a2f 5875 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
5876 {
5877 _bfd_stringtab_free (stt);
5878 return FALSE;
5879 }
079e9a2f 5880 }
252b5132 5881
079e9a2f 5882 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 5883
079e9a2f
AM
5884 if ((flags & BSF_SECTION_SYM) == 0
5885 && bfd_is_com_section (syms[idx]->section))
5886 {
5887 /* ELF common symbols put the alignment into the `value' field,
5888 and the size into the `size' field. This is backwards from
5889 how BFD handles it, so reverse it here. */
5890 sym.st_size = value;
5891 if (type_ptr == NULL
5892 || type_ptr->internal_elf_sym.st_value == 0)
5893 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
5894 else
5895 sym.st_value = type_ptr->internal_elf_sym.st_value;
5896 sym.st_shndx = _bfd_elf_section_from_bfd_section
5897 (abfd, syms[idx]->section);
5898 }
5899 else
5900 {
5901 asection *sec = syms[idx]->section;
5902 int shndx;
252b5132 5903
079e9a2f
AM
5904 if (sec->output_section)
5905 {
5906 value += sec->output_offset;
5907 sec = sec->output_section;
5908 }
589e6347 5909
079e9a2f
AM
5910 /* Don't add in the section vma for relocatable output. */
5911 if (! relocatable_p)
5912 value += sec->vma;
5913 sym.st_value = value;
5914 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
5915
5916 if (bfd_is_abs_section (sec)
5917 && type_ptr != NULL
5918 && type_ptr->internal_elf_sym.st_shndx != 0)
5919 {
5920 /* This symbol is in a real ELF section which we did
5921 not create as a BFD section. Undo the mapping done
5922 by copy_private_symbol_data. */
5923 shndx = type_ptr->internal_elf_sym.st_shndx;
5924 switch (shndx)
5925 {
5926 case MAP_ONESYMTAB:
5927 shndx = elf_onesymtab (abfd);
5928 break;
5929 case MAP_DYNSYMTAB:
5930 shndx = elf_dynsymtab (abfd);
5931 break;
5932 case MAP_STRTAB:
5933 shndx = elf_tdata (abfd)->strtab_section;
5934 break;
5935 case MAP_SHSTRTAB:
5936 shndx = elf_tdata (abfd)->shstrtab_section;
5937 break;
9ad5cbcf
AM
5938 case MAP_SYM_SHNDX:
5939 shndx = elf_tdata (abfd)->symtab_shndx_section;
5940 break;
079e9a2f
AM
5941 default:
5942 break;
5943 }
5944 }
5945 else
5946 {
5947 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 5948
079e9a2f
AM
5949 if (shndx == -1)
5950 {
5951 asection *sec2;
5952
5953 /* Writing this would be a hell of a lot easier if
5954 we had some decent documentation on bfd, and
5955 knew what to expect of the library, and what to
5956 demand of applications. For example, it
5957 appears that `objcopy' might not set the
5958 section of a symbol to be a section that is
5959 actually in the output file. */
5960 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
5961 if (sec2 == NULL)
5962 {
5963 _bfd_error_handler (_("\
5964Unable to find equivalent output section for symbol '%s' from section '%s'"),
5965 syms[idx]->name ? syms[idx]->name : "<Local sym>",
5966 sec->name);
811072d8 5967 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 5968 _bfd_stringtab_free (stt);
589e6347
NC
5969 return FALSE;
5970 }
811072d8 5971
079e9a2f
AM
5972 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
5973 BFD_ASSERT (shndx != -1);
5974 }
5975 }
252b5132 5976
079e9a2f
AM
5977 sym.st_shndx = shndx;
5978 }
252b5132 5979
13ae64f3
JJ
5980 if ((flags & BSF_THREAD_LOCAL) != 0)
5981 type = STT_TLS;
5982 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
5983 type = STT_FUNC;
5984 else if ((flags & BSF_OBJECT) != 0)
5985 type = STT_OBJECT;
5986 else
5987 type = STT_NOTYPE;
252b5132 5988
13ae64f3
JJ
5989 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
5990 type = STT_TLS;
5991
589e6347 5992 /* Processor-specific types. */
079e9a2f
AM
5993 if (type_ptr != NULL
5994 && bed->elf_backend_get_symbol_type)
5995 type = ((*bed->elf_backend_get_symbol_type)
5996 (&type_ptr->internal_elf_sym, type));
252b5132 5997
079e9a2f
AM
5998 if (flags & BSF_SECTION_SYM)
5999 {
6000 if (flags & BSF_GLOBAL)
6001 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6002 else
6003 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6004 }
6005 else if (bfd_is_com_section (syms[idx]->section))
6006 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
6007 else if (bfd_is_und_section (syms[idx]->section))
6008 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6009 ? STB_WEAK
6010 : STB_GLOBAL),
6011 type);
6012 else if (flags & BSF_FILE)
6013 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6014 else
6015 {
6016 int bind = STB_LOCAL;
252b5132 6017
079e9a2f
AM
6018 if (flags & BSF_LOCAL)
6019 bind = STB_LOCAL;
6020 else if (flags & BSF_WEAK)
6021 bind = STB_WEAK;
6022 else if (flags & BSF_GLOBAL)
6023 bind = STB_GLOBAL;
252b5132 6024
079e9a2f
AM
6025 sym.st_info = ELF_ST_INFO (bind, type);
6026 }
252b5132 6027
079e9a2f
AM
6028 if (type_ptr != NULL)
6029 sym.st_other = type_ptr->internal_elf_sym.st_other;
6030 else
6031 sym.st_other = 0;
252b5132 6032
9ad5cbcf 6033 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6034 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6035 if (outbound_shndx != NULL)
6036 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6037 }
252b5132 6038
079e9a2f
AM
6039 *sttp = stt;
6040 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6041 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6042
079e9a2f
AM
6043 symstrtab_hdr->sh_flags = 0;
6044 symstrtab_hdr->sh_addr = 0;
6045 symstrtab_hdr->sh_entsize = 0;
6046 symstrtab_hdr->sh_link = 0;
6047 symstrtab_hdr->sh_info = 0;
6048 symstrtab_hdr->sh_addralign = 1;
252b5132 6049
b34976b6 6050 return TRUE;
252b5132
RH
6051}
6052
6053/* Return the number of bytes required to hold the symtab vector.
6054
6055 Note that we base it on the count plus 1, since we will null terminate
6056 the vector allocated based on this size. However, the ELF symbol table
6057 always has a dummy entry as symbol #0, so it ends up even. */
6058
6059long
217aa764 6060_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6061{
6062 long symcount;
6063 long symtab_size;
6064 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6065
6066 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6067 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6068 if (symcount > 0)
6069 symtab_size -= sizeof (asymbol *);
252b5132
RH
6070
6071 return symtab_size;
6072}
6073
6074long
217aa764 6075_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6076{
6077 long symcount;
6078 long symtab_size;
6079 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6080
6081 if (elf_dynsymtab (abfd) == 0)
6082 {
6083 bfd_set_error (bfd_error_invalid_operation);
6084 return -1;
6085 }
6086
6087 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6088 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6089 if (symcount > 0)
6090 symtab_size -= sizeof (asymbol *);
252b5132
RH
6091
6092 return symtab_size;
6093}
6094
6095long
217aa764
AM
6096_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6097 sec_ptr asect)
252b5132
RH
6098{
6099 return (asect->reloc_count + 1) * sizeof (arelent *);
6100}
6101
6102/* Canonicalize the relocs. */
6103
6104long
217aa764
AM
6105_bfd_elf_canonicalize_reloc (bfd *abfd,
6106 sec_ptr section,
6107 arelent **relptr,
6108 asymbol **symbols)
252b5132
RH
6109{
6110 arelent *tblptr;
6111 unsigned int i;
9c5bfbb7 6112 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6113
b34976b6 6114 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6115 return -1;
6116
6117 tblptr = section->relocation;
6118 for (i = 0; i < section->reloc_count; i++)
6119 *relptr++ = tblptr++;
6120
6121 *relptr = NULL;
6122
6123 return section->reloc_count;
6124}
6125
6126long
6cee3f79 6127_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6128{
9c5bfbb7 6129 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6130 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6131
6132 if (symcount >= 0)
6133 bfd_get_symcount (abfd) = symcount;
6134 return symcount;
6135}
6136
6137long
217aa764
AM
6138_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6139 asymbol **allocation)
252b5132 6140{
9c5bfbb7 6141 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6142 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6143
6144 if (symcount >= 0)
6145 bfd_get_dynamic_symcount (abfd) = symcount;
6146 return symcount;
252b5132
RH
6147}
6148
8615f3f2
AM
6149/* Return the size required for the dynamic reloc entries. Any loadable
6150 section that was actually installed in the BFD, and has type SHT_REL
6151 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6152 dynamic reloc section. */
252b5132
RH
6153
6154long
217aa764 6155_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6156{
6157 long ret;
6158 asection *s;
6159
6160 if (elf_dynsymtab (abfd) == 0)
6161 {
6162 bfd_set_error (bfd_error_invalid_operation);
6163 return -1;
6164 }
6165
6166 ret = sizeof (arelent *);
6167 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6168 if ((s->flags & SEC_LOAD) != 0
6169 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6170 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6171 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6172 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6173 * sizeof (arelent *));
6174
6175 return ret;
6176}
6177
8615f3f2
AM
6178/* Canonicalize the dynamic relocation entries. Note that we return the
6179 dynamic relocations as a single block, although they are actually
6180 associated with particular sections; the interface, which was
6181 designed for SunOS style shared libraries, expects that there is only
6182 one set of dynamic relocs. Any loadable section that was actually
6183 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6184 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6185
6186long
217aa764
AM
6187_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6188 arelent **storage,
6189 asymbol **syms)
252b5132 6190{
217aa764 6191 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6192 asection *s;
6193 long ret;
6194
6195 if (elf_dynsymtab (abfd) == 0)
6196 {
6197 bfd_set_error (bfd_error_invalid_operation);
6198 return -1;
6199 }
6200
6201 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6202 ret = 0;
6203 for (s = abfd->sections; s != NULL; s = s->next)
6204 {
8615f3f2
AM
6205 if ((s->flags & SEC_LOAD) != 0
6206 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6207 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6208 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6209 {
6210 arelent *p;
6211 long count, i;
6212
b34976b6 6213 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6214 return -1;
eea6121a 6215 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6216 p = s->relocation;
6217 for (i = 0; i < count; i++)
6218 *storage++ = p++;
6219 ret += count;
6220 }
6221 }
6222
6223 *storage = NULL;
6224
6225 return ret;
6226}
6227\f
6228/* Read in the version information. */
6229
b34976b6 6230bfd_boolean
fc0e6df6 6231_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6232{
6233 bfd_byte *contents = NULL;
fc0e6df6
PB
6234 unsigned int freeidx = 0;
6235
6236 if (elf_dynverref (abfd) != 0)
6237 {
6238 Elf_Internal_Shdr *hdr;
6239 Elf_External_Verneed *everneed;
6240 Elf_Internal_Verneed *iverneed;
6241 unsigned int i;
d0fb9a8d 6242 bfd_byte *contents_end;
fc0e6df6
PB
6243
6244 hdr = &elf_tdata (abfd)->dynverref_hdr;
6245
d0fb9a8d
JJ
6246 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6247 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6248 if (elf_tdata (abfd)->verref == NULL)
6249 goto error_return;
6250
6251 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6252
6253 contents = bfd_malloc (hdr->sh_size);
6254 if (contents == NULL)
d0fb9a8d
JJ
6255 {
6256error_return_verref:
6257 elf_tdata (abfd)->verref = NULL;
6258 elf_tdata (abfd)->cverrefs = 0;
6259 goto error_return;
6260 }
fc0e6df6
PB
6261 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6262 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6263 goto error_return_verref;
fc0e6df6 6264
d0fb9a8d
JJ
6265 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6266 goto error_return_verref;
6267
6268 BFD_ASSERT (sizeof (Elf_External_Verneed)
6269 == sizeof (Elf_External_Vernaux));
6270 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6271 everneed = (Elf_External_Verneed *) contents;
6272 iverneed = elf_tdata (abfd)->verref;
6273 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6274 {
6275 Elf_External_Vernaux *evernaux;
6276 Elf_Internal_Vernaux *ivernaux;
6277 unsigned int j;
6278
6279 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6280
6281 iverneed->vn_bfd = abfd;
6282
6283 iverneed->vn_filename =
6284 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6285 iverneed->vn_file);
6286 if (iverneed->vn_filename == NULL)
d0fb9a8d 6287 goto error_return_verref;
fc0e6df6 6288
d0fb9a8d
JJ
6289 if (iverneed->vn_cnt == 0)
6290 iverneed->vn_auxptr = NULL;
6291 else
6292 {
6293 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6294 sizeof (Elf_Internal_Vernaux));
6295 if (iverneed->vn_auxptr == NULL)
6296 goto error_return_verref;
6297 }
6298
6299 if (iverneed->vn_aux
6300 > (size_t) (contents_end - (bfd_byte *) everneed))
6301 goto error_return_verref;
fc0e6df6
PB
6302
6303 evernaux = ((Elf_External_Vernaux *)
6304 ((bfd_byte *) everneed + iverneed->vn_aux));
6305 ivernaux = iverneed->vn_auxptr;
6306 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6307 {
6308 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6309
6310 ivernaux->vna_nodename =
6311 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6312 ivernaux->vna_name);
6313 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6314 goto error_return_verref;
fc0e6df6
PB
6315
6316 if (j + 1 < iverneed->vn_cnt)
6317 ivernaux->vna_nextptr = ivernaux + 1;
6318 else
6319 ivernaux->vna_nextptr = NULL;
6320
d0fb9a8d
JJ
6321 if (ivernaux->vna_next
6322 > (size_t) (contents_end - (bfd_byte *) evernaux))
6323 goto error_return_verref;
6324
fc0e6df6
PB
6325 evernaux = ((Elf_External_Vernaux *)
6326 ((bfd_byte *) evernaux + ivernaux->vna_next));
6327
6328 if (ivernaux->vna_other > freeidx)
6329 freeidx = ivernaux->vna_other;
6330 }
6331
6332 if (i + 1 < hdr->sh_info)
6333 iverneed->vn_nextref = iverneed + 1;
6334 else
6335 iverneed->vn_nextref = NULL;
6336
d0fb9a8d
JJ
6337 if (iverneed->vn_next
6338 > (size_t) (contents_end - (bfd_byte *) everneed))
6339 goto error_return_verref;
6340
fc0e6df6
PB
6341 everneed = ((Elf_External_Verneed *)
6342 ((bfd_byte *) everneed + iverneed->vn_next));
6343 }
6344
6345 free (contents);
6346 contents = NULL;
6347 }
252b5132
RH
6348
6349 if (elf_dynverdef (abfd) != 0)
6350 {
6351 Elf_Internal_Shdr *hdr;
6352 Elf_External_Verdef *everdef;
6353 Elf_Internal_Verdef *iverdef;
f631889e
UD
6354 Elf_Internal_Verdef *iverdefarr;
6355 Elf_Internal_Verdef iverdefmem;
252b5132 6356 unsigned int i;
062e2358 6357 unsigned int maxidx;
d0fb9a8d 6358 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6359
6360 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6361
217aa764 6362 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6363 if (contents == NULL)
6364 goto error_return;
6365 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6366 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6367 goto error_return;
6368
d0fb9a8d
JJ
6369 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6370 goto error_return;
6371
6372 BFD_ASSERT (sizeof (Elf_External_Verdef)
6373 >= sizeof (Elf_External_Verdaux));
6374 contents_end_def = contents + hdr->sh_size
6375 - sizeof (Elf_External_Verdef);
6376 contents_end_aux = contents + hdr->sh_size
6377 - sizeof (Elf_External_Verdaux);
6378
f631889e
UD
6379 /* We know the number of entries in the section but not the maximum
6380 index. Therefore we have to run through all entries and find
6381 the maximum. */
252b5132 6382 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6383 maxidx = 0;
6384 for (i = 0; i < hdr->sh_info; ++i)
6385 {
6386 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6387
062e2358
AM
6388 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6389 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6390
d0fb9a8d
JJ
6391 if (iverdefmem.vd_next
6392 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6393 goto error_return;
6394
f631889e
UD
6395 everdef = ((Elf_External_Verdef *)
6396 ((bfd_byte *) everdef + iverdefmem.vd_next));
6397 }
6398
fc0e6df6
PB
6399 if (default_imported_symver)
6400 {
6401 if (freeidx > maxidx)
6402 maxidx = ++freeidx;
6403 else
6404 freeidx = ++maxidx;
6405 }
d0fb9a8d
JJ
6406 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6407 sizeof (Elf_Internal_Verdef));
f631889e
UD
6408 if (elf_tdata (abfd)->verdef == NULL)
6409 goto error_return;
6410
6411 elf_tdata (abfd)->cverdefs = maxidx;
6412
6413 everdef = (Elf_External_Verdef *) contents;
6414 iverdefarr = elf_tdata (abfd)->verdef;
6415 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6416 {
6417 Elf_External_Verdaux *everdaux;
6418 Elf_Internal_Verdaux *iverdaux;
6419 unsigned int j;
6420
f631889e
UD
6421 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6422
d0fb9a8d
JJ
6423 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6424 {
6425error_return_verdef:
6426 elf_tdata (abfd)->verdef = NULL;
6427 elf_tdata (abfd)->cverdefs = 0;
6428 goto error_return;
6429 }
6430
f631889e
UD
6431 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6432 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6433
6434 iverdef->vd_bfd = abfd;
6435
d0fb9a8d
JJ
6436 if (iverdef->vd_cnt == 0)
6437 iverdef->vd_auxptr = NULL;
6438 else
6439 {
6440 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6441 sizeof (Elf_Internal_Verdaux));
6442 if (iverdef->vd_auxptr == NULL)
6443 goto error_return_verdef;
6444 }
6445
6446 if (iverdef->vd_aux
6447 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6448 goto error_return_verdef;
252b5132
RH
6449
6450 everdaux = ((Elf_External_Verdaux *)
6451 ((bfd_byte *) everdef + iverdef->vd_aux));
6452 iverdaux = iverdef->vd_auxptr;
6453 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6454 {
6455 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6456
6457 iverdaux->vda_nodename =
6458 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6459 iverdaux->vda_name);
6460 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6461 goto error_return_verdef;
252b5132
RH
6462
6463 if (j + 1 < iverdef->vd_cnt)
6464 iverdaux->vda_nextptr = iverdaux + 1;
6465 else
6466 iverdaux->vda_nextptr = NULL;
6467
d0fb9a8d
JJ
6468 if (iverdaux->vda_next
6469 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6470 goto error_return_verdef;
6471
252b5132
RH
6472 everdaux = ((Elf_External_Verdaux *)
6473 ((bfd_byte *) everdaux + iverdaux->vda_next));
6474 }
6475
d0fb9a8d
JJ
6476 if (iverdef->vd_cnt)
6477 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6478
d0fb9a8d 6479 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6480 iverdef->vd_nextdef = iverdef + 1;
6481 else
6482 iverdef->vd_nextdef = NULL;
6483
6484 everdef = ((Elf_External_Verdef *)
6485 ((bfd_byte *) everdef + iverdef->vd_next));
6486 }
6487
6488 free (contents);
6489 contents = NULL;
6490 }
fc0e6df6 6491 else if (default_imported_symver)
252b5132 6492 {
fc0e6df6
PB
6493 if (freeidx < 3)
6494 freeidx = 3;
6495 else
6496 freeidx++;
252b5132 6497
d0fb9a8d
JJ
6498 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6499 sizeof (Elf_Internal_Verdef));
fc0e6df6 6500 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6501 goto error_return;
6502
fc0e6df6
PB
6503 elf_tdata (abfd)->cverdefs = freeidx;
6504 }
252b5132 6505
fc0e6df6
PB
6506 /* Create a default version based on the soname. */
6507 if (default_imported_symver)
6508 {
6509 Elf_Internal_Verdef *iverdef;
6510 Elf_Internal_Verdaux *iverdaux;
252b5132 6511
fc0e6df6 6512 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6513
fc0e6df6
PB
6514 iverdef->vd_version = VER_DEF_CURRENT;
6515 iverdef->vd_flags = 0;
6516 iverdef->vd_ndx = freeidx;
6517 iverdef->vd_cnt = 1;
252b5132 6518
fc0e6df6 6519 iverdef->vd_bfd = abfd;
252b5132 6520
fc0e6df6
PB
6521 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6522 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6523 goto error_return_verdef;
fc0e6df6 6524 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6525 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6526 if (iverdef->vd_auxptr == NULL)
6527 goto error_return_verdef;
252b5132 6528
fc0e6df6
PB
6529 iverdaux = iverdef->vd_auxptr;
6530 iverdaux->vda_nodename = iverdef->vd_nodename;
6531 iverdaux->vda_nextptr = NULL;
252b5132
RH
6532 }
6533
b34976b6 6534 return TRUE;
252b5132
RH
6535
6536 error_return:
5ed6aba4 6537 if (contents != NULL)
252b5132 6538 free (contents);
b34976b6 6539 return FALSE;
252b5132
RH
6540}
6541\f
6542asymbol *
217aa764 6543_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6544{
6545 elf_symbol_type *newsym;
dc810e39 6546 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6547
217aa764 6548 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6549 if (!newsym)
6550 return NULL;
6551 else
6552 {
6553 newsym->symbol.the_bfd = abfd;
6554 return &newsym->symbol;
6555 }
6556}
6557
6558void
217aa764
AM
6559_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6560 asymbol *symbol,
6561 symbol_info *ret)
252b5132
RH
6562{
6563 bfd_symbol_info (symbol, ret);
6564}
6565
6566/* Return whether a symbol name implies a local symbol. Most targets
6567 use this function for the is_local_label_name entry point, but some
6568 override it. */
6569
b34976b6 6570bfd_boolean
217aa764
AM
6571_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6572 const char *name)
252b5132
RH
6573{
6574 /* Normal local symbols start with ``.L''. */
6575 if (name[0] == '.' && name[1] == 'L')
b34976b6 6576 return TRUE;
252b5132
RH
6577
6578 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6579 DWARF debugging symbols starting with ``..''. */
6580 if (name[0] == '.' && name[1] == '.')
b34976b6 6581 return TRUE;
252b5132
RH
6582
6583 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6584 emitting DWARF debugging output. I suspect this is actually a
6585 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6586 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6587 underscore to be emitted on some ELF targets). For ease of use,
6588 we treat such symbols as local. */
6589 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6590 return TRUE;
252b5132 6591
b34976b6 6592 return FALSE;
252b5132
RH
6593}
6594
6595alent *
217aa764
AM
6596_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6597 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6598{
6599 abort ();
6600 return NULL;
6601}
6602
b34976b6 6603bfd_boolean
217aa764
AM
6604_bfd_elf_set_arch_mach (bfd *abfd,
6605 enum bfd_architecture arch,
6606 unsigned long machine)
252b5132
RH
6607{
6608 /* If this isn't the right architecture for this backend, and this
6609 isn't the generic backend, fail. */
6610 if (arch != get_elf_backend_data (abfd)->arch
6611 && arch != bfd_arch_unknown
6612 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6613 return FALSE;
252b5132
RH
6614
6615 return bfd_default_set_arch_mach (abfd, arch, machine);
6616}
6617
d1fad7c6
NC
6618/* Find the function to a particular section and offset,
6619 for error reporting. */
252b5132 6620
b34976b6 6621static bfd_boolean
217aa764
AM
6622elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6623 asection *section,
6624 asymbol **symbols,
6625 bfd_vma offset,
6626 const char **filename_ptr,
6627 const char **functionname_ptr)
252b5132 6628{
252b5132 6629 const char *filename;
57426232 6630 asymbol *func, *file;
252b5132
RH
6631 bfd_vma low_func;
6632 asymbol **p;
57426232
JB
6633 /* ??? Given multiple file symbols, it is impossible to reliably
6634 choose the right file name for global symbols. File symbols are
6635 local symbols, and thus all file symbols must sort before any
6636 global symbols. The ELF spec may be interpreted to say that a
6637 file symbol must sort before other local symbols, but currently
6638 ld -r doesn't do this. So, for ld -r output, it is possible to
6639 make a better choice of file name for local symbols by ignoring
6640 file symbols appearing after a given local symbol. */
6641 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6642
252b5132
RH
6643 filename = NULL;
6644 func = NULL;
57426232 6645 file = NULL;
252b5132 6646 low_func = 0;
57426232 6647 state = nothing_seen;
252b5132
RH
6648
6649 for (p = symbols; *p != NULL; p++)
6650 {
6651 elf_symbol_type *q;
6652
6653 q = (elf_symbol_type *) *p;
6654
252b5132
RH
6655 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6656 {
6657 default:
6658 break;
6659 case STT_FILE:
57426232
JB
6660 file = &q->symbol;
6661 if (state == symbol_seen)
6662 state = file_after_symbol_seen;
6663 continue;
6664 case STT_SECTION:
6665 continue;
252b5132
RH
6666 case STT_NOTYPE:
6667 case STT_FUNC:
6b40fcba 6668 if (bfd_get_section (&q->symbol) == section
252b5132
RH
6669 && q->symbol.value >= low_func
6670 && q->symbol.value <= offset)
6671 {
6672 func = (asymbol *) q;
6673 low_func = q->symbol.value;
57426232
JB
6674 if (file == NULL)
6675 filename = NULL;
6676 else if (ELF_ST_BIND (q->internal_elf_sym.st_info) != STB_LOCAL
6677 && state == file_after_symbol_seen)
6678 filename = NULL;
6679 else
6680 filename = bfd_asymbol_name (file);
252b5132
RH
6681 }
6682 break;
6683 }
57426232
JB
6684 if (state == nothing_seen)
6685 state = symbol_seen;
252b5132
RH
6686 }
6687
6688 if (func == NULL)
b34976b6 6689 return FALSE;
252b5132 6690
d1fad7c6
NC
6691 if (filename_ptr)
6692 *filename_ptr = filename;
6693 if (functionname_ptr)
6694 *functionname_ptr = bfd_asymbol_name (func);
6695
b34976b6 6696 return TRUE;
d1fad7c6
NC
6697}
6698
6699/* Find the nearest line to a particular section and offset,
6700 for error reporting. */
6701
b34976b6 6702bfd_boolean
217aa764
AM
6703_bfd_elf_find_nearest_line (bfd *abfd,
6704 asection *section,
6705 asymbol **symbols,
6706 bfd_vma offset,
6707 const char **filename_ptr,
6708 const char **functionname_ptr,
6709 unsigned int *line_ptr)
d1fad7c6 6710{
b34976b6 6711 bfd_boolean found;
d1fad7c6
NC
6712
6713 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6714 filename_ptr, functionname_ptr,
6715 line_ptr))
d1fad7c6
NC
6716 {
6717 if (!*functionname_ptr)
4e8a9624
AM
6718 elf_find_function (abfd, section, symbols, offset,
6719 *filename_ptr ? NULL : filename_ptr,
6720 functionname_ptr);
6721
b34976b6 6722 return TRUE;
d1fad7c6
NC
6723 }
6724
6725 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6726 filename_ptr, functionname_ptr,
6727 line_ptr, 0,
6728 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
6729 {
6730 if (!*functionname_ptr)
4e8a9624
AM
6731 elf_find_function (abfd, section, symbols, offset,
6732 *filename_ptr ? NULL : filename_ptr,
6733 functionname_ptr);
6734
b34976b6 6735 return TRUE;
d1fad7c6
NC
6736 }
6737
6738 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
6739 &found, filename_ptr,
6740 functionname_ptr, line_ptr,
6741 &elf_tdata (abfd)->line_info))
b34976b6 6742 return FALSE;
dc43ada5 6743 if (found && (*functionname_ptr || *line_ptr))
b34976b6 6744 return TRUE;
d1fad7c6
NC
6745
6746 if (symbols == NULL)
b34976b6 6747 return FALSE;
d1fad7c6
NC
6748
6749 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 6750 filename_ptr, functionname_ptr))
b34976b6 6751 return FALSE;
d1fad7c6 6752
252b5132 6753 *line_ptr = 0;
b34976b6 6754 return TRUE;
252b5132
RH
6755}
6756
5420f73d
L
6757/* Find the line for a symbol. */
6758
6759bfd_boolean
6760_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
6761 const char **filename_ptr, unsigned int *line_ptr)
6762{
6763 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
6764 filename_ptr, line_ptr, 0,
6765 &elf_tdata (abfd)->dwarf2_find_line_info);
6766}
6767
4ab527b0
FF
6768/* After a call to bfd_find_nearest_line, successive calls to
6769 bfd_find_inliner_info can be used to get source information about
6770 each level of function inlining that terminated at the address
6771 passed to bfd_find_nearest_line. Currently this is only supported
6772 for DWARF2 with appropriate DWARF3 extensions. */
6773
6774bfd_boolean
6775_bfd_elf_find_inliner_info (bfd *abfd,
6776 const char **filename_ptr,
6777 const char **functionname_ptr,
6778 unsigned int *line_ptr)
6779{
6780 bfd_boolean found;
6781 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
6782 functionname_ptr, line_ptr,
6783 & elf_tdata (abfd)->dwarf2_find_line_info);
6784 return found;
6785}
6786
252b5132 6787int
217aa764 6788_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
6789{
6790 int ret;
6791
6792 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
6793 if (! reloc)
6794 ret += get_program_header_size (abfd);
6795 return ret;
6796}
6797
b34976b6 6798bfd_boolean
217aa764
AM
6799_bfd_elf_set_section_contents (bfd *abfd,
6800 sec_ptr section,
0f867abe 6801 const void *location,
217aa764
AM
6802 file_ptr offset,
6803 bfd_size_type count)
252b5132
RH
6804{
6805 Elf_Internal_Shdr *hdr;
dc810e39 6806 bfd_signed_vma pos;
252b5132
RH
6807
6808 if (! abfd->output_has_begun
217aa764 6809 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6810 return FALSE;
252b5132
RH
6811
6812 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
6813 pos = hdr->sh_offset + offset;
6814 if (bfd_seek (abfd, pos, SEEK_SET) != 0
6815 || bfd_bwrite (location, count, abfd) != count)
b34976b6 6816 return FALSE;
252b5132 6817
b34976b6 6818 return TRUE;
252b5132
RH
6819}
6820
6821void
217aa764
AM
6822_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
6823 arelent *cache_ptr ATTRIBUTE_UNUSED,
6824 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
6825{
6826 abort ();
6827}
6828
252b5132
RH
6829/* Try to convert a non-ELF reloc into an ELF one. */
6830
b34976b6 6831bfd_boolean
217aa764 6832_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 6833{
c044fabd 6834 /* Check whether we really have an ELF howto. */
252b5132
RH
6835
6836 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
6837 {
6838 bfd_reloc_code_real_type code;
6839 reloc_howto_type *howto;
6840
6841 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 6842 equivalent ELF reloc. */
252b5132
RH
6843
6844 if (areloc->howto->pc_relative)
6845 {
6846 switch (areloc->howto->bitsize)
6847 {
6848 case 8:
6849 code = BFD_RELOC_8_PCREL;
6850 break;
6851 case 12:
6852 code = BFD_RELOC_12_PCREL;
6853 break;
6854 case 16:
6855 code = BFD_RELOC_16_PCREL;
6856 break;
6857 case 24:
6858 code = BFD_RELOC_24_PCREL;
6859 break;
6860 case 32:
6861 code = BFD_RELOC_32_PCREL;
6862 break;
6863 case 64:
6864 code = BFD_RELOC_64_PCREL;
6865 break;
6866 default:
6867 goto fail;
6868 }
6869
6870 howto = bfd_reloc_type_lookup (abfd, code);
6871
6872 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
6873 {
6874 if (howto->pcrel_offset)
6875 areloc->addend += areloc->address;
6876 else
6877 areloc->addend -= areloc->address; /* addend is unsigned!! */
6878 }
6879 }
6880 else
6881 {
6882 switch (areloc->howto->bitsize)
6883 {
6884 case 8:
6885 code = BFD_RELOC_8;
6886 break;
6887 case 14:
6888 code = BFD_RELOC_14;
6889 break;
6890 case 16:
6891 code = BFD_RELOC_16;
6892 break;
6893 case 26:
6894 code = BFD_RELOC_26;
6895 break;
6896 case 32:
6897 code = BFD_RELOC_32;
6898 break;
6899 case 64:
6900 code = BFD_RELOC_64;
6901 break;
6902 default:
6903 goto fail;
6904 }
6905
6906 howto = bfd_reloc_type_lookup (abfd, code);
6907 }
6908
6909 if (howto)
6910 areloc->howto = howto;
6911 else
6912 goto fail;
6913 }
6914
b34976b6 6915 return TRUE;
252b5132
RH
6916
6917 fail:
6918 (*_bfd_error_handler)
d003868e
AM
6919 (_("%B: unsupported relocation type %s"),
6920 abfd, areloc->howto->name);
252b5132 6921 bfd_set_error (bfd_error_bad_value);
b34976b6 6922 return FALSE;
252b5132
RH
6923}
6924
b34976b6 6925bfd_boolean
217aa764 6926_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
6927{
6928 if (bfd_get_format (abfd) == bfd_object)
6929 {
6930 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 6931 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 6932 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
6933 }
6934
6935 return _bfd_generic_close_and_cleanup (abfd);
6936}
6937
6938/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
6939 in the relocation's offset. Thus we cannot allow any sort of sanity
6940 range-checking to interfere. There is nothing else to do in processing
6941 this reloc. */
6942
6943bfd_reloc_status_type
217aa764
AM
6944_bfd_elf_rel_vtable_reloc_fn
6945 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 6946 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
6947 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
6948 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
6949{
6950 return bfd_reloc_ok;
6951}
252b5132
RH
6952\f
6953/* Elf core file support. Much of this only works on native
6954 toolchains, since we rely on knowing the
6955 machine-dependent procfs structure in order to pick
c044fabd 6956 out details about the corefile. */
252b5132
RH
6957
6958#ifdef HAVE_SYS_PROCFS_H
6959# include <sys/procfs.h>
6960#endif
6961
c044fabd 6962/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
6963
6964static int
217aa764 6965elfcore_make_pid (bfd *abfd)
252b5132
RH
6966{
6967 return ((elf_tdata (abfd)->core_lwpid << 16)
6968 + (elf_tdata (abfd)->core_pid));
6969}
6970
252b5132
RH
6971/* If there isn't a section called NAME, make one, using
6972 data from SECT. Note, this function will generate a
6973 reference to NAME, so you shouldn't deallocate or
c044fabd 6974 overwrite it. */
252b5132 6975
b34976b6 6976static bfd_boolean
217aa764 6977elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 6978{
c044fabd 6979 asection *sect2;
252b5132
RH
6980
6981 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 6982 return TRUE;
252b5132
RH
6983
6984 sect2 = bfd_make_section (abfd, name);
6985 if (sect2 == NULL)
b34976b6 6986 return FALSE;
252b5132 6987
eea6121a 6988 sect2->size = sect->size;
252b5132
RH
6989 sect2->filepos = sect->filepos;
6990 sect2->flags = sect->flags;
6991 sect2->alignment_power = sect->alignment_power;
b34976b6 6992 return TRUE;
252b5132
RH
6993}
6994
bb0082d6
AM
6995/* Create a pseudosection containing SIZE bytes at FILEPOS. This
6996 actually creates up to two pseudosections:
6997 - For the single-threaded case, a section named NAME, unless
6998 such a section already exists.
6999 - For the multi-threaded case, a section named "NAME/PID", where
7000 PID is elfcore_make_pid (abfd).
7001 Both pseudosections have identical contents. */
b34976b6 7002bfd_boolean
217aa764
AM
7003_bfd_elfcore_make_pseudosection (bfd *abfd,
7004 char *name,
7005 size_t size,
7006 ufile_ptr filepos)
bb0082d6
AM
7007{
7008 char buf[100];
7009 char *threaded_name;
d4c88bbb 7010 size_t len;
bb0082d6
AM
7011 asection *sect;
7012
7013 /* Build the section name. */
7014
7015 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7016 len = strlen (buf) + 1;
217aa764 7017 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7018 if (threaded_name == NULL)
b34976b6 7019 return FALSE;
d4c88bbb 7020 memcpy (threaded_name, buf, len);
bb0082d6 7021
62f3bb11 7022 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 7023 if (sect == NULL)
b34976b6 7024 return FALSE;
eea6121a 7025 sect->size = size;
bb0082d6
AM
7026 sect->filepos = filepos;
7027 sect->flags = SEC_HAS_CONTENTS;
7028 sect->alignment_power = 2;
7029
936e320b 7030 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7031}
7032
252b5132 7033/* prstatus_t exists on:
4a938328 7034 solaris 2.5+
252b5132
RH
7035 linux 2.[01] + glibc
7036 unixware 4.2
7037*/
7038
7039#if defined (HAVE_PRSTATUS_T)
a7b97311 7040
b34976b6 7041static bfd_boolean
217aa764 7042elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7043{
eea6121a 7044 size_t size;
7ee38065 7045 int offset;
252b5132 7046
4a938328
MS
7047 if (note->descsz == sizeof (prstatus_t))
7048 {
7049 prstatus_t prstat;
252b5132 7050
eea6121a 7051 size = sizeof (prstat.pr_reg);
7ee38065 7052 offset = offsetof (prstatus_t, pr_reg);
4a938328 7053 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7054
fa49d224
NC
7055 /* Do not overwrite the core signal if it
7056 has already been set by another thread. */
7057 if (elf_tdata (abfd)->core_signal == 0)
7058 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7059 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7060
4a938328
MS
7061 /* pr_who exists on:
7062 solaris 2.5+
7063 unixware 4.2
7064 pr_who doesn't exist on:
7065 linux 2.[01]
7066 */
252b5132 7067#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7068 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7069#endif
4a938328 7070 }
7ee38065 7071#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7072 else if (note->descsz == sizeof (prstatus32_t))
7073 {
7074 /* 64-bit host, 32-bit corefile */
7075 prstatus32_t prstat;
7076
eea6121a 7077 size = sizeof (prstat.pr_reg);
7ee38065 7078 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7079 memcpy (&prstat, note->descdata, sizeof (prstat));
7080
fa49d224
NC
7081 /* Do not overwrite the core signal if it
7082 has already been set by another thread. */
7083 if (elf_tdata (abfd)->core_signal == 0)
7084 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7085 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7086
7087 /* pr_who exists on:
7088 solaris 2.5+
7089 unixware 4.2
7090 pr_who doesn't exist on:
7091 linux 2.[01]
7092 */
7ee38065 7093#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7094 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7095#endif
7096 }
7ee38065 7097#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7098 else
7099 {
7100 /* Fail - we don't know how to handle any other
7101 note size (ie. data object type). */
b34976b6 7102 return TRUE;
4a938328 7103 }
252b5132 7104
bb0082d6 7105 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7106 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7107 size, note->descpos + offset);
252b5132
RH
7108}
7109#endif /* defined (HAVE_PRSTATUS_T) */
7110
bb0082d6 7111/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7112static bfd_boolean
217aa764
AM
7113elfcore_make_note_pseudosection (bfd *abfd,
7114 char *name,
7115 Elf_Internal_Note *note)
252b5132 7116{
936e320b
AM
7117 return _bfd_elfcore_make_pseudosection (abfd, name,
7118 note->descsz, note->descpos);
252b5132
RH
7119}
7120
ff08c6bb
JB
7121/* There isn't a consistent prfpregset_t across platforms,
7122 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7123 data structure apart. */
7124
b34976b6 7125static bfd_boolean
217aa764 7126elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7127{
7128 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7129}
7130
ff08c6bb
JB
7131/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7132 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7133 literally. */
c044fabd 7134
b34976b6 7135static bfd_boolean
217aa764 7136elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7137{
7138 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7139}
7140
252b5132 7141#if defined (HAVE_PRPSINFO_T)
4a938328 7142typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7143#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7144typedef prpsinfo32_t elfcore_psinfo32_t;
7145#endif
252b5132
RH
7146#endif
7147
7148#if defined (HAVE_PSINFO_T)
4a938328 7149typedef psinfo_t elfcore_psinfo_t;
7ee38065 7150#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7151typedef psinfo32_t elfcore_psinfo32_t;
7152#endif
252b5132
RH
7153#endif
7154
252b5132
RH
7155/* return a malloc'ed copy of a string at START which is at
7156 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7157 the copy will always have a terminating '\0'. */
252b5132 7158
936e320b 7159char *
217aa764 7160_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7161{
dc810e39 7162 char *dups;
c044fabd 7163 char *end = memchr (start, '\0', max);
dc810e39 7164 size_t len;
252b5132
RH
7165
7166 if (end == NULL)
7167 len = max;
7168 else
7169 len = end - start;
7170
217aa764 7171 dups = bfd_alloc (abfd, len + 1);
dc810e39 7172 if (dups == NULL)
252b5132
RH
7173 return NULL;
7174
dc810e39
AM
7175 memcpy (dups, start, len);
7176 dups[len] = '\0';
252b5132 7177
dc810e39 7178 return dups;
252b5132
RH
7179}
7180
bb0082d6 7181#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7182static bfd_boolean
217aa764 7183elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7184{
4a938328
MS
7185 if (note->descsz == sizeof (elfcore_psinfo_t))
7186 {
7187 elfcore_psinfo_t psinfo;
252b5132 7188
7ee38065 7189 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7190
4a938328 7191 elf_tdata (abfd)->core_program
936e320b
AM
7192 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7193 sizeof (psinfo.pr_fname));
252b5132 7194
4a938328 7195 elf_tdata (abfd)->core_command
936e320b
AM
7196 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7197 sizeof (psinfo.pr_psargs));
4a938328 7198 }
7ee38065 7199#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7200 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7201 {
7202 /* 64-bit host, 32-bit corefile */
7203 elfcore_psinfo32_t psinfo;
7204
7ee38065 7205 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7206
4a938328 7207 elf_tdata (abfd)->core_program
936e320b
AM
7208 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7209 sizeof (psinfo.pr_fname));
4a938328
MS
7210
7211 elf_tdata (abfd)->core_command
936e320b
AM
7212 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7213 sizeof (psinfo.pr_psargs));
4a938328
MS
7214 }
7215#endif
7216
7217 else
7218 {
7219 /* Fail - we don't know how to handle any other
7220 note size (ie. data object type). */
b34976b6 7221 return TRUE;
4a938328 7222 }
252b5132
RH
7223
7224 /* Note that for some reason, a spurious space is tacked
7225 onto the end of the args in some (at least one anyway)
c044fabd 7226 implementations, so strip it off if it exists. */
252b5132
RH
7227
7228 {
c044fabd 7229 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7230 int n = strlen (command);
7231
7232 if (0 < n && command[n - 1] == ' ')
7233 command[n - 1] = '\0';
7234 }
7235
b34976b6 7236 return TRUE;
252b5132
RH
7237}
7238#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7239
252b5132 7240#if defined (HAVE_PSTATUS_T)
b34976b6 7241static bfd_boolean
217aa764 7242elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7243{
f572a39d
AM
7244 if (note->descsz == sizeof (pstatus_t)
7245#if defined (HAVE_PXSTATUS_T)
7246 || note->descsz == sizeof (pxstatus_t)
7247#endif
7248 )
4a938328
MS
7249 {
7250 pstatus_t pstat;
252b5132 7251
4a938328 7252 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7253
4a938328
MS
7254 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7255 }
7ee38065 7256#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7257 else if (note->descsz == sizeof (pstatus32_t))
7258 {
7259 /* 64-bit host, 32-bit corefile */
7260 pstatus32_t pstat;
252b5132 7261
4a938328 7262 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7263
4a938328
MS
7264 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7265 }
7266#endif
252b5132
RH
7267 /* Could grab some more details from the "representative"
7268 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7269 NT_LWPSTATUS note, presumably. */
252b5132 7270
b34976b6 7271 return TRUE;
252b5132
RH
7272}
7273#endif /* defined (HAVE_PSTATUS_T) */
7274
252b5132 7275#if defined (HAVE_LWPSTATUS_T)
b34976b6 7276static bfd_boolean
217aa764 7277elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7278{
7279 lwpstatus_t lwpstat;
7280 char buf[100];
c044fabd 7281 char *name;
d4c88bbb 7282 size_t len;
c044fabd 7283 asection *sect;
252b5132 7284
f572a39d
AM
7285 if (note->descsz != sizeof (lwpstat)
7286#if defined (HAVE_LWPXSTATUS_T)
7287 && note->descsz != sizeof (lwpxstatus_t)
7288#endif
7289 )
b34976b6 7290 return TRUE;
252b5132
RH
7291
7292 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7293
7294 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7295 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7296
c044fabd 7297 /* Make a ".reg/999" section. */
252b5132
RH
7298
7299 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7300 len = strlen (buf) + 1;
217aa764 7301 name = bfd_alloc (abfd, len);
252b5132 7302 if (name == NULL)
b34976b6 7303 return FALSE;
d4c88bbb 7304 memcpy (name, buf, len);
252b5132 7305
62f3bb11 7306 sect = bfd_make_section_anyway (abfd, name);
252b5132 7307 if (sect == NULL)
b34976b6 7308 return FALSE;
252b5132
RH
7309
7310#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7311 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7312 sect->filepos = note->descpos
7313 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7314#endif
7315
7316#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7317 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7318 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7319#endif
7320
7321 sect->flags = SEC_HAS_CONTENTS;
7322 sect->alignment_power = 2;
7323
7324 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7325 return FALSE;
252b5132
RH
7326
7327 /* Make a ".reg2/999" section */
7328
7329 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7330 len = strlen (buf) + 1;
217aa764 7331 name = bfd_alloc (abfd, len);
252b5132 7332 if (name == NULL)
b34976b6 7333 return FALSE;
d4c88bbb 7334 memcpy (name, buf, len);
252b5132 7335
62f3bb11 7336 sect = bfd_make_section_anyway (abfd, name);
252b5132 7337 if (sect == NULL)
b34976b6 7338 return FALSE;
252b5132
RH
7339
7340#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7341 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7342 sect->filepos = note->descpos
7343 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7344#endif
7345
7346#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7347 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7348 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7349#endif
7350
7351 sect->flags = SEC_HAS_CONTENTS;
7352 sect->alignment_power = 2;
7353
936e320b 7354 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7355}
7356#endif /* defined (HAVE_LWPSTATUS_T) */
7357
16e9c715 7358#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7359static bfd_boolean
217aa764 7360elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7361{
7362 char buf[30];
c044fabd 7363 char *name;
d4c88bbb 7364 size_t len;
c044fabd 7365 asection *sect;
16e9c715
NC
7366 win32_pstatus_t pstatus;
7367
7368 if (note->descsz < sizeof (pstatus))
b34976b6 7369 return TRUE;
16e9c715 7370
e8eab623 7371 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7372
7373 switch (pstatus.data_type)
16e9c715
NC
7374 {
7375 case NOTE_INFO_PROCESS:
7376 /* FIXME: need to add ->core_command. */
7377 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7378 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7379 break;
16e9c715
NC
7380
7381 case NOTE_INFO_THREAD:
7382 /* Make a ".reg/999" section. */
1f170678 7383 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7384
d4c88bbb 7385 len = strlen (buf) + 1;
217aa764 7386 name = bfd_alloc (abfd, len);
16e9c715 7387 if (name == NULL)
b34976b6 7388 return FALSE;
c044fabd 7389
d4c88bbb 7390 memcpy (name, buf, len);
16e9c715 7391
62f3bb11 7392 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7393 if (sect == NULL)
b34976b6 7394 return FALSE;
c044fabd 7395
eea6121a 7396 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7397 sect->filepos = (note->descpos
7398 + offsetof (struct win32_pstatus,
7399 data.thread_info.thread_context));
16e9c715
NC
7400 sect->flags = SEC_HAS_CONTENTS;
7401 sect->alignment_power = 2;
7402
7403 if (pstatus.data.thread_info.is_active_thread)
7404 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7405 return FALSE;
16e9c715
NC
7406 break;
7407
7408 case NOTE_INFO_MODULE:
7409 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7410 sprintf (buf, ".module/%08lx",
7411 (long) pstatus.data.module_info.base_address);
c044fabd 7412
d4c88bbb 7413 len = strlen (buf) + 1;
217aa764 7414 name = bfd_alloc (abfd, len);
16e9c715 7415 if (name == NULL)
b34976b6 7416 return FALSE;
c044fabd 7417
d4c88bbb 7418 memcpy (name, buf, len);
252b5132 7419
62f3bb11 7420 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7421
16e9c715 7422 if (sect == NULL)
b34976b6 7423 return FALSE;
c044fabd 7424
eea6121a 7425 sect->size = note->descsz;
16e9c715
NC
7426 sect->filepos = note->descpos;
7427 sect->flags = SEC_HAS_CONTENTS;
7428 sect->alignment_power = 2;
7429 break;
7430
7431 default:
b34976b6 7432 return TRUE;
16e9c715
NC
7433 }
7434
b34976b6 7435 return TRUE;
16e9c715
NC
7436}
7437#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7438
b34976b6 7439static bfd_boolean
217aa764 7440elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7441{
9c5bfbb7 7442 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7443
252b5132
RH
7444 switch (note->type)
7445 {
7446 default:
b34976b6 7447 return TRUE;
252b5132 7448
252b5132 7449 case NT_PRSTATUS:
bb0082d6
AM
7450 if (bed->elf_backend_grok_prstatus)
7451 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7452 return TRUE;
bb0082d6 7453#if defined (HAVE_PRSTATUS_T)
252b5132 7454 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7455#else
b34976b6 7456 return TRUE;
252b5132
RH
7457#endif
7458
7459#if defined (HAVE_PSTATUS_T)
7460 case NT_PSTATUS:
7461 return elfcore_grok_pstatus (abfd, note);
7462#endif
7463
7464#if defined (HAVE_LWPSTATUS_T)
7465 case NT_LWPSTATUS:
7466 return elfcore_grok_lwpstatus (abfd, note);
7467#endif
7468
7469 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7470 return elfcore_grok_prfpreg (abfd, note);
7471
16e9c715 7472#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7473 case NT_WIN32PSTATUS:
16e9c715
NC
7474 return elfcore_grok_win32pstatus (abfd, note);
7475#endif
7476
c044fabd 7477 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7478 if (note->namesz == 6
7479 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7480 return elfcore_grok_prxfpreg (abfd, note);
7481 else
b34976b6 7482 return TRUE;
ff08c6bb 7483
252b5132
RH
7484 case NT_PRPSINFO:
7485 case NT_PSINFO:
bb0082d6
AM
7486 if (bed->elf_backend_grok_psinfo)
7487 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7488 return TRUE;
bb0082d6 7489#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7490 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7491#else
b34976b6 7492 return TRUE;
252b5132 7493#endif
3333a7c3
RM
7494
7495 case NT_AUXV:
7496 {
62f3bb11 7497 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7498
7499 if (sect == NULL)
7500 return FALSE;
eea6121a 7501 sect->size = note->descsz;
3333a7c3
RM
7502 sect->filepos = note->descpos;
7503 sect->flags = SEC_HAS_CONTENTS;
7504 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7505
7506 return TRUE;
7507 }
252b5132
RH
7508 }
7509}
7510
b34976b6 7511static bfd_boolean
217aa764 7512elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7513{
7514 char *cp;
7515
7516 cp = strchr (note->namedata, '@');
7517 if (cp != NULL)
7518 {
d2b64500 7519 *lwpidp = atoi(cp + 1);
b34976b6 7520 return TRUE;
50b2bdb7 7521 }
b34976b6 7522 return FALSE;
50b2bdb7
AM
7523}
7524
b34976b6 7525static bfd_boolean
217aa764 7526elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7527{
7528
7529 /* Signal number at offset 0x08. */
7530 elf_tdata (abfd)->core_signal
7531 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7532
7533 /* Process ID at offset 0x50. */
7534 elf_tdata (abfd)->core_pid
7535 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7536
7537 /* Command name at 0x7c (max 32 bytes, including nul). */
7538 elf_tdata (abfd)->core_command
7539 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7540
7720ba9f
MK
7541 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7542 note);
50b2bdb7
AM
7543}
7544
b34976b6 7545static bfd_boolean
217aa764 7546elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7547{
7548 int lwp;
7549
7550 if (elfcore_netbsd_get_lwpid (note, &lwp))
7551 elf_tdata (abfd)->core_lwpid = lwp;
7552
b4db1224 7553 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7554 {
7555 /* NetBSD-specific core "procinfo". Note that we expect to
7556 find this note before any of the others, which is fine,
7557 since the kernel writes this note out first when it
7558 creates a core file. */
47d9a591 7559
50b2bdb7
AM
7560 return elfcore_grok_netbsd_procinfo (abfd, note);
7561 }
7562
b4db1224
JT
7563 /* As of Jan 2002 there are no other machine-independent notes
7564 defined for NetBSD core files. If the note type is less
7565 than the start of the machine-dependent note types, we don't
7566 understand it. */
47d9a591 7567
b4db1224 7568 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7569 return TRUE;
50b2bdb7
AM
7570
7571
7572 switch (bfd_get_arch (abfd))
7573 {
7574 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7575 PT_GETFPREGS == mach+2. */
7576
7577 case bfd_arch_alpha:
7578 case bfd_arch_sparc:
7579 switch (note->type)
7580 {
b4db1224 7581 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7582 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7583
b4db1224 7584 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7585 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7586
7587 default:
b34976b6 7588 return TRUE;
50b2bdb7
AM
7589 }
7590
7591 /* On all other arch's, PT_GETREGS == mach+1 and
7592 PT_GETFPREGS == mach+3. */
7593
7594 default:
7595 switch (note->type)
7596 {
b4db1224 7597 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7598 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7599
b4db1224 7600 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7601 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7602
7603 default:
b34976b6 7604 return TRUE;
50b2bdb7
AM
7605 }
7606 }
7607 /* NOTREACHED */
7608}
7609
07c6e936 7610static bfd_boolean
217aa764 7611elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7612{
7613 void *ddata = note->descdata;
7614 char buf[100];
7615 char *name;
7616 asection *sect;
f8843e87
AM
7617 short sig;
7618 unsigned flags;
07c6e936
NC
7619
7620 /* nto_procfs_status 'pid' field is at offset 0. */
7621 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7622
f8843e87
AM
7623 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7624 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7625
7626 /* nto_procfs_status 'flags' field is at offset 8. */
7627 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7628
7629 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7630 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7631 {
7632 elf_tdata (abfd)->core_signal = sig;
7633 elf_tdata (abfd)->core_lwpid = *tid;
7634 }
07c6e936 7635
f8843e87
AM
7636 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7637 do not come from signals so we make sure we set the current
7638 thread just in case. */
7639 if (flags & 0x00000080)
7640 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7641
7642 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7643 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7644
217aa764 7645 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7646 if (name == NULL)
7647 return FALSE;
7648 strcpy (name, buf);
7649
62f3bb11 7650 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7651 if (sect == NULL)
7652 return FALSE;
7653
eea6121a 7654 sect->size = note->descsz;
07c6e936
NC
7655 sect->filepos = note->descpos;
7656 sect->flags = SEC_HAS_CONTENTS;
7657 sect->alignment_power = 2;
7658
7659 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7660}
7661
7662static bfd_boolean
d69f560c
KW
7663elfcore_grok_nto_regs (bfd *abfd,
7664 Elf_Internal_Note *note,
7665 pid_t tid,
7666 char *base)
07c6e936
NC
7667{
7668 char buf[100];
7669 char *name;
7670 asection *sect;
7671
d69f560c 7672 /* Make a "(base)/%d" section. */
7e7353ed 7673 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 7674
217aa764 7675 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7676 if (name == NULL)
7677 return FALSE;
7678 strcpy (name, buf);
7679
62f3bb11 7680 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7681 if (sect == NULL)
7682 return FALSE;
7683
eea6121a 7684 sect->size = note->descsz;
07c6e936
NC
7685 sect->filepos = note->descpos;
7686 sect->flags = SEC_HAS_CONTENTS;
7687 sect->alignment_power = 2;
7688
f8843e87
AM
7689 /* This is the current thread. */
7690 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 7691 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
7692
7693 return TRUE;
07c6e936
NC
7694}
7695
7696#define BFD_QNT_CORE_INFO 7
7697#define BFD_QNT_CORE_STATUS 8
7698#define BFD_QNT_CORE_GREG 9
7699#define BFD_QNT_CORE_FPREG 10
7700
7701static bfd_boolean
217aa764 7702elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
7703{
7704 /* Every GREG section has a STATUS section before it. Store the
811072d8 7705 tid from the previous call to pass down to the next gregs
07c6e936
NC
7706 function. */
7707 static pid_t tid = 1;
7708
7709 switch (note->type)
7710 {
d69f560c
KW
7711 case BFD_QNT_CORE_INFO:
7712 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
7713 case BFD_QNT_CORE_STATUS:
7714 return elfcore_grok_nto_status (abfd, note, &tid);
7715 case BFD_QNT_CORE_GREG:
7716 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
7717 case BFD_QNT_CORE_FPREG:
7718 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
7719 default:
7720 return TRUE;
07c6e936
NC
7721 }
7722}
7723
7c76fa91
MS
7724/* Function: elfcore_write_note
7725
47d9a591 7726 Inputs:
7c76fa91
MS
7727 buffer to hold note
7728 name of note
7729 type of note
7730 data for note
7731 size of data for note
7732
7733 Return:
7734 End of buffer containing note. */
7735
7736char *
217aa764
AM
7737elfcore_write_note (bfd *abfd,
7738 char *buf,
7739 int *bufsiz,
7740 const char *name,
7741 int type,
7742 const void *input,
7743 int size)
7c76fa91
MS
7744{
7745 Elf_External_Note *xnp;
d4c88bbb
AM
7746 size_t namesz;
7747 size_t pad;
7748 size_t newspace;
7c76fa91
MS
7749 char *p, *dest;
7750
d4c88bbb
AM
7751 namesz = 0;
7752 pad = 0;
7753 if (name != NULL)
7754 {
9c5bfbb7 7755 const struct elf_backend_data *bed;
d4c88bbb
AM
7756
7757 namesz = strlen (name) + 1;
7758 bed = get_elf_backend_data (abfd);
45d6a902 7759 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
7760 }
7761
5de3bf90 7762 newspace = 12 + namesz + pad + size;
d4c88bbb 7763
7c76fa91
MS
7764 p = realloc (buf, *bufsiz + newspace);
7765 dest = p + *bufsiz;
7766 *bufsiz += newspace;
7767 xnp = (Elf_External_Note *) dest;
7768 H_PUT_32 (abfd, namesz, xnp->namesz);
7769 H_PUT_32 (abfd, size, xnp->descsz);
7770 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
7771 dest = xnp->name;
7772 if (name != NULL)
7773 {
7774 memcpy (dest, name, namesz);
7775 dest += namesz;
7776 while (pad != 0)
7777 {
7778 *dest++ = '\0';
7779 --pad;
7780 }
7781 }
7782 memcpy (dest, input, size);
7c76fa91
MS
7783 return p;
7784}
7785
7786#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
7787char *
217aa764
AM
7788elfcore_write_prpsinfo (bfd *abfd,
7789 char *buf,
7790 int *bufsiz,
7791 const char *fname,
7792 const char *psargs)
7c76fa91
MS
7793{
7794 int note_type;
7795 char *note_name = "CORE";
7796
7797#if defined (HAVE_PSINFO_T)
7798 psinfo_t data;
7799 note_type = NT_PSINFO;
7800#else
7801 prpsinfo_t data;
7802 note_type = NT_PRPSINFO;
7803#endif
7804
7805 memset (&data, 0, sizeof (data));
7806 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
7807 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 7808 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7809 note_name, note_type, &data, sizeof (data));
7810}
7811#endif /* PSINFO_T or PRPSINFO_T */
7812
7813#if defined (HAVE_PRSTATUS_T)
7814char *
217aa764
AM
7815elfcore_write_prstatus (bfd *abfd,
7816 char *buf,
7817 int *bufsiz,
7818 long pid,
7819 int cursig,
7820 const void *gregs)
7c76fa91
MS
7821{
7822 prstatus_t prstat;
7823 char *note_name = "CORE";
7824
7825 memset (&prstat, 0, sizeof (prstat));
7826 prstat.pr_pid = pid;
7827 prstat.pr_cursig = cursig;
c106e334 7828 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 7829 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7830 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
7831}
7832#endif /* HAVE_PRSTATUS_T */
7833
51316059
MS
7834#if defined (HAVE_LWPSTATUS_T)
7835char *
217aa764
AM
7836elfcore_write_lwpstatus (bfd *abfd,
7837 char *buf,
7838 int *bufsiz,
7839 long pid,
7840 int cursig,
7841 const void *gregs)
51316059
MS
7842{
7843 lwpstatus_t lwpstat;
7844 char *note_name = "CORE";
7845
7846 memset (&lwpstat, 0, sizeof (lwpstat));
7847 lwpstat.pr_lwpid = pid >> 16;
7848 lwpstat.pr_cursig = cursig;
7849#if defined (HAVE_LWPSTATUS_T_PR_REG)
7850 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
7851#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
7852#if !defined(gregs)
7853 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
7854 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
7855#else
7856 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
7857 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
7858#endif
7859#endif
47d9a591 7860 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7861 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
7862}
7863#endif /* HAVE_LWPSTATUS_T */
7864
7c76fa91
MS
7865#if defined (HAVE_PSTATUS_T)
7866char *
217aa764
AM
7867elfcore_write_pstatus (bfd *abfd,
7868 char *buf,
7869 int *bufsiz,
7870 long pid,
7871 int cursig,
7872 const void *gregs)
7c76fa91
MS
7873{
7874 pstatus_t pstat;
7875 char *note_name = "CORE";
7876
51316059
MS
7877 memset (&pstat, 0, sizeof (pstat));
7878 pstat.pr_pid = pid & 0xffff;
47d9a591 7879 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7880 NT_PSTATUS, &pstat, sizeof (pstat));
7881 return buf;
7c76fa91
MS
7882}
7883#endif /* HAVE_PSTATUS_T */
7884
7885char *
217aa764
AM
7886elfcore_write_prfpreg (bfd *abfd,
7887 char *buf,
7888 int *bufsiz,
7889 const void *fpregs,
7890 int size)
7c76fa91
MS
7891{
7892 char *note_name = "CORE";
47d9a591 7893 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7894 note_name, NT_FPREGSET, fpregs, size);
7895}
7896
7897char *
217aa764
AM
7898elfcore_write_prxfpreg (bfd *abfd,
7899 char *buf,
7900 int *bufsiz,
7901 const void *xfpregs,
7902 int size)
7c76fa91
MS
7903{
7904 char *note_name = "LINUX";
47d9a591 7905 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7906 note_name, NT_PRXFPREG, xfpregs, size);
7907}
7908
b34976b6 7909static bfd_boolean
217aa764 7910elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 7911{
c044fabd
KH
7912 char *buf;
7913 char *p;
252b5132
RH
7914
7915 if (size <= 0)
b34976b6 7916 return TRUE;
252b5132 7917
dc810e39 7918 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 7919 return FALSE;
252b5132 7920
dc810e39 7921 buf = bfd_malloc (size);
252b5132 7922 if (buf == NULL)
b34976b6 7923 return FALSE;
252b5132 7924
dc810e39 7925 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
7926 {
7927 error:
7928 free (buf);
b34976b6 7929 return FALSE;
252b5132
RH
7930 }
7931
7932 p = buf;
7933 while (p < buf + size)
7934 {
c044fabd
KH
7935 /* FIXME: bad alignment assumption. */
7936 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
7937 Elf_Internal_Note in;
7938
dc810e39 7939 in.type = H_GET_32 (abfd, xnp->type);
252b5132 7940
dc810e39 7941 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
7942 in.namedata = xnp->name;
7943
dc810e39 7944 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
7945 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
7946 in.descpos = offset + (in.descdata - buf);
7947
50b2bdb7
AM
7948 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
7949 {
7950 if (! elfcore_grok_netbsd_note (abfd, &in))
7951 goto error;
7952 }
07c6e936
NC
7953 else if (strncmp (in.namedata, "QNX", 3) == 0)
7954 {
7955 if (! elfcore_grok_nto_note (abfd, &in))
7956 goto error;
7957 }
50b2bdb7
AM
7958 else
7959 {
7960 if (! elfcore_grok_note (abfd, &in))
7961 goto error;
7962 }
252b5132
RH
7963
7964 p = in.descdata + BFD_ALIGN (in.descsz, 4);
7965 }
7966
7967 free (buf);
b34976b6 7968 return TRUE;
252b5132 7969}
98d8431c
JB
7970\f
7971/* Providing external access to the ELF program header table. */
7972
7973/* Return an upper bound on the number of bytes required to store a
7974 copy of ABFD's program header table entries. Return -1 if an error
7975 occurs; bfd_get_error will return an appropriate code. */
c044fabd 7976
98d8431c 7977long
217aa764 7978bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
7979{
7980 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7981 {
7982 bfd_set_error (bfd_error_wrong_format);
7983 return -1;
7984 }
7985
936e320b 7986 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
7987}
7988
98d8431c
JB
7989/* Copy ABFD's program header table entries to *PHDRS. The entries
7990 will be stored as an array of Elf_Internal_Phdr structures, as
7991 defined in include/elf/internal.h. To find out how large the
7992 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
7993
7994 Return the number of program header table entries read, or -1 if an
7995 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 7996
98d8431c 7997int
217aa764 7998bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
7999{
8000 int num_phdrs;
8001
8002 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8003 {
8004 bfd_set_error (bfd_error_wrong_format);
8005 return -1;
8006 }
8007
8008 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8009 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8010 num_phdrs * sizeof (Elf_Internal_Phdr));
8011
8012 return num_phdrs;
8013}
ae4221d7
L
8014
8015void
217aa764 8016_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 8017{
d3b05f8d 8018#ifdef BFD64
ae4221d7
L
8019 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8020
8021 i_ehdrp = elf_elfheader (abfd);
8022 if (i_ehdrp == NULL)
8023 sprintf_vma (buf, value);
8024 else
8025 {
8026 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8027 {
ae4221d7 8028#if BFD_HOST_64BIT_LONG
cc55aec9 8029 sprintf (buf, "%016lx", value);
ae4221d7 8030#else
cc55aec9
AM
8031 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
8032 _bfd_int64_low (value));
ae4221d7 8033#endif
cc55aec9 8034 }
ae4221d7
L
8035 else
8036 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
8037 }
d3b05f8d
L
8038#else
8039 sprintf_vma (buf, value);
8040#endif
ae4221d7
L
8041}
8042
8043void
217aa764 8044_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 8045{
d3b05f8d 8046#ifdef BFD64
ae4221d7
L
8047 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8048
8049 i_ehdrp = elf_elfheader (abfd);
8050 if (i_ehdrp == NULL)
8051 fprintf_vma ((FILE *) stream, value);
8052 else
8053 {
8054 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8055 {
ae4221d7 8056#if BFD_HOST_64BIT_LONG
cc55aec9 8057 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 8058#else
cc55aec9
AM
8059 fprintf ((FILE *) stream, "%08lx%08lx",
8060 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 8061#endif
cc55aec9 8062 }
ae4221d7
L
8063 else
8064 fprintf ((FILE *) stream, "%08lx",
8065 (unsigned long) (value & 0xffffffff));
8066 }
d3b05f8d
L
8067#else
8068 fprintf_vma ((FILE *) stream, value);
8069#endif
ae4221d7 8070}
db6751f2
JJ
8071
8072enum elf_reloc_type_class
217aa764 8073_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8074{
8075 return reloc_class_normal;
8076}
f8df10f4 8077
47d9a591 8078/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8079 relocation against a local symbol. */
8080
8081bfd_vma
217aa764
AM
8082_bfd_elf_rela_local_sym (bfd *abfd,
8083 Elf_Internal_Sym *sym,
8517fae7 8084 asection **psec,
217aa764 8085 Elf_Internal_Rela *rel)
f8df10f4 8086{
8517fae7 8087 asection *sec = *psec;
f8df10f4
JJ
8088 bfd_vma relocation;
8089
8090 relocation = (sec->output_section->vma
8091 + sec->output_offset
8092 + sym->st_value);
8093 if ((sec->flags & SEC_MERGE)
c629eae0 8094 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8095 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8096 {
f8df10f4 8097 rel->r_addend =
8517fae7 8098 _bfd_merged_section_offset (abfd, psec,
65765700 8099 elf_section_data (sec)->sec_info,
753731ee
AM
8100 sym->st_value + rel->r_addend);
8101 if (sec != *psec)
8102 {
8103 /* If we have changed the section, and our original section is
8104 marked with SEC_EXCLUDE, it means that the original
8105 SEC_MERGE section has been completely subsumed in some
8106 other SEC_MERGE section. In this case, we need to leave
8107 some info around for --emit-relocs. */
8108 if ((sec->flags & SEC_EXCLUDE) != 0)
8109 sec->kept_section = *psec;
8110 sec = *psec;
8111 }
8517fae7
AM
8112 rel->r_addend -= relocation;
8113 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8114 }
8115 return relocation;
8116}
c629eae0
JJ
8117
8118bfd_vma
217aa764
AM
8119_bfd_elf_rel_local_sym (bfd *abfd,
8120 Elf_Internal_Sym *sym,
8121 asection **psec,
8122 bfd_vma addend)
47d9a591 8123{
c629eae0
JJ
8124 asection *sec = *psec;
8125
68bfbfcc 8126 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8127 return sym->st_value + addend;
8128
8129 return _bfd_merged_section_offset (abfd, psec,
65765700 8130 elf_section_data (sec)->sec_info,
753731ee 8131 sym->st_value + addend);
c629eae0
JJ
8132}
8133
8134bfd_vma
217aa764 8135_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8136 struct bfd_link_info *info,
217aa764
AM
8137 asection *sec,
8138 bfd_vma offset)
c629eae0 8139{
68bfbfcc 8140 switch (sec->sec_info_type)
65765700
JJ
8141 {
8142 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8143 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8144 offset);
65765700 8145 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8146 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8147 default:
8148 return offset;
8149 }
c629eae0 8150}
3333a7c3
RM
8151\f
8152/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8153 reconstruct an ELF file by reading the segments out of remote memory
8154 based on the ELF file header at EHDR_VMA and the ELF program headers it
8155 points to. If not null, *LOADBASEP is filled in with the difference
8156 between the VMAs from which the segments were read, and the VMAs the
8157 file headers (and hence BFD's idea of each section's VMA) put them at.
8158
8159 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8160 remote memory at target address VMA into the local buffer at MYADDR; it
8161 should return zero on success or an `errno' code on failure. TEMPL must
8162 be a BFD for an ELF target with the word size and byte order found in
8163 the remote memory. */
8164
8165bfd *
217aa764
AM
8166bfd_elf_bfd_from_remote_memory
8167 (bfd *templ,
8168 bfd_vma ehdr_vma,
8169 bfd_vma *loadbasep,
f075ee0c 8170 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8171{
8172 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8173 (templ, ehdr_vma, loadbasep, target_read_memory);
8174}
4c45e5c9
JJ
8175\f
8176long
c9727e01
AM
8177_bfd_elf_get_synthetic_symtab (bfd *abfd,
8178 long symcount ATTRIBUTE_UNUSED,
8179 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8180 long dynsymcount,
c9727e01
AM
8181 asymbol **dynsyms,
8182 asymbol **ret)
4c45e5c9
JJ
8183{
8184 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8185 asection *relplt;
8186 asymbol *s;
8187 const char *relplt_name;
8188 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8189 arelent *p;
8190 long count, i, n;
8191 size_t size;
8192 Elf_Internal_Shdr *hdr;
8193 char *names;
8194 asection *plt;
8195
8615f3f2
AM
8196 *ret = NULL;
8197
90e3cdf2
JJ
8198 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8199 return 0;
8200
8615f3f2
AM
8201 if (dynsymcount <= 0)
8202 return 0;
8203
4c45e5c9
JJ
8204 if (!bed->plt_sym_val)
8205 return 0;
8206
8207 relplt_name = bed->relplt_name;
8208 if (relplt_name == NULL)
8209 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8210 relplt = bfd_get_section_by_name (abfd, relplt_name);
8211 if (relplt == NULL)
8212 return 0;
8213
8214 hdr = &elf_section_data (relplt)->this_hdr;
8215 if (hdr->sh_link != elf_dynsymtab (abfd)
8216 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8217 return 0;
8218
8219 plt = bfd_get_section_by_name (abfd, ".plt");
8220 if (plt == NULL)
8221 return 0;
8222
8223 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8224 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8225 return -1;
8226
eea6121a 8227 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8228 size = count * sizeof (asymbol);
8229 p = relplt->relocation;
8230 for (i = 0; i < count; i++, s++, p++)
8231 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8232
8233 s = *ret = bfd_malloc (size);
8234 if (s == NULL)
8235 return -1;
8236
8237 names = (char *) (s + count);
8238 p = relplt->relocation;
8239 n = 0;
8240 for (i = 0; i < count; i++, s++, p++)
8241 {
8242 size_t len;
8243 bfd_vma addr;
8244
8245 addr = bed->plt_sym_val (i, plt, p);
8246 if (addr == (bfd_vma) -1)
8247 continue;
8248
8249 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8250 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8251 we are defining a symbol, ensure one of them is set. */
8252 if ((s->flags & BSF_LOCAL) == 0)
8253 s->flags |= BSF_GLOBAL;
4c45e5c9
JJ
8254 s->section = plt;
8255 s->value = addr - plt->vma;
8256 s->name = names;
8257 len = strlen ((*p->sym_ptr_ptr)->name);
8258 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8259 names += len;
8260 memcpy (names, "@plt", sizeof ("@plt"));
8261 names += sizeof ("@plt");
8262 ++n;
8263 }
8264
8265 return n;
8266}
3d7f7666
L
8267
8268/* Sort symbol by binding and section. We want to put definitions
8269 sorted by section at the beginning. */
8270
8271static int
8272elf_sort_elf_symbol (const void *arg1, const void *arg2)
8273{
8274 const Elf_Internal_Sym *s1;
8275 const Elf_Internal_Sym *s2;
8276 int shndx;
8277
8278 /* Make sure that undefined symbols are at the end. */
8279 s1 = (const Elf_Internal_Sym *) arg1;
8280 if (s1->st_shndx == SHN_UNDEF)
8281 return 1;
8282 s2 = (const Elf_Internal_Sym *) arg2;
8283 if (s2->st_shndx == SHN_UNDEF)
8284 return -1;
8285
8286 /* Sorted by section index. */
8287 shndx = s1->st_shndx - s2->st_shndx;
8288 if (shndx != 0)
8289 return shndx;
8290
8291 /* Sorted by binding. */
8292 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8293}
8294
8295struct elf_symbol
8296{
8297 Elf_Internal_Sym *sym;
8298 const char *name;
8299};
8300
8301static int
8302elf_sym_name_compare (const void *arg1, const void *arg2)
8303{
8304 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8305 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8306 return strcmp (s1->name, s2->name);
8307}
8308
8309/* Check if 2 sections define the same set of local and global
8310 symbols. */
8311
8312bfd_boolean
8313bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8314{
8315 bfd *bfd1, *bfd2;
8316 const struct elf_backend_data *bed1, *bed2;
8317 Elf_Internal_Shdr *hdr1, *hdr2;
8318 bfd_size_type symcount1, symcount2;
8319 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8320 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8321 Elf_Internal_Sym *isymend;
8322 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8323 bfd_size_type count1, count2, i;
8324 int shndx1, shndx2;
8325 bfd_boolean result;
8326
8327 bfd1 = sec1->owner;
8328 bfd2 = sec2->owner;
8329
8330 /* If both are .gnu.linkonce sections, they have to have the same
8331 section name. */
8332 if (strncmp (sec1->name, ".gnu.linkonce",
8333 sizeof ".gnu.linkonce" - 1) == 0
8334 && strncmp (sec2->name, ".gnu.linkonce",
8335 sizeof ".gnu.linkonce" - 1) == 0)
8336 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8337 sec2->name + sizeof ".gnu.linkonce") == 0;
8338
8339 /* Both sections have to be in ELF. */
8340 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8341 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8342 return FALSE;
8343
8344 if (elf_section_type (sec1) != elf_section_type (sec2))
8345 return FALSE;
8346
8347 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8348 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8349 {
8350 /* If both are members of section groups, they have to have the
8351 same group name. */
8352 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8353 return FALSE;
8354 }
8355
8356 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8357 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8358 if (shndx1 == -1 || shndx2 == -1)
8359 return FALSE;
8360
8361 bed1 = get_elf_backend_data (bfd1);
8362 bed2 = get_elf_backend_data (bfd2);
8363 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8364 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8365 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8366 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8367
8368 if (symcount1 == 0 || symcount2 == 0)
8369 return FALSE;
8370
8371 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8372 NULL, NULL, NULL);
8373 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8374 NULL, NULL, NULL);
8375
8376 result = FALSE;
8377 if (isymbuf1 == NULL || isymbuf2 == NULL)
8378 goto done;
8379
8380 /* Sort symbols by binding and section. Global definitions are at
8381 the beginning. */
8382 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8383 elf_sort_elf_symbol);
8384 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8385 elf_sort_elf_symbol);
8386
8387 /* Count definitions in the section. */
8388 count1 = 0;
8389 for (isym = isymbuf1, isymend = isym + symcount1;
8390 isym < isymend; isym++)
8391 {
8392 if (isym->st_shndx == (unsigned int) shndx1)
8393 {
8394 if (count1 == 0)
8395 isymstart1 = isym;
8396 count1++;
8397 }
8398
8399 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8400 break;
8401 }
8402
8403 count2 = 0;
8404 for (isym = isymbuf2, isymend = isym + symcount2;
8405 isym < isymend; isym++)
8406 {
8407 if (isym->st_shndx == (unsigned int) shndx2)
8408 {
8409 if (count2 == 0)
8410 isymstart2 = isym;
8411 count2++;
8412 }
8413
8414 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8415 break;
8416 }
8417
8418 if (count1 == 0 || count2 == 0 || count1 != count2)
8419 goto done;
8420
8421 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8422 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8423
8424 if (symtable1 == NULL || symtable2 == NULL)
8425 goto done;
8426
8427 symp = symtable1;
8428 for (isym = isymstart1, isymend = isym + count1;
8429 isym < isymend; isym++)
8430 {
8431 symp->sym = isym;
8432 symp->name = bfd_elf_string_from_elf_section (bfd1,
8433 hdr1->sh_link,
8434 isym->st_name);
8435 symp++;
8436 }
8437
8438 symp = symtable2;
8439 for (isym = isymstart2, isymend = isym + count1;
8440 isym < isymend; isym++)
8441 {
8442 symp->sym = isym;
8443 symp->name = bfd_elf_string_from_elf_section (bfd2,
8444 hdr2->sh_link,
8445 isym->st_name);
8446 symp++;
8447 }
8448
8449 /* Sort symbol by name. */
8450 qsort (symtable1, count1, sizeof (struct elf_symbol),
8451 elf_sym_name_compare);
8452 qsort (symtable2, count1, sizeof (struct elf_symbol),
8453 elf_sym_name_compare);
8454
8455 for (i = 0; i < count1; i++)
8456 /* Two symbols must have the same binding, type and name. */
8457 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8458 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8459 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8460 goto done;
8461
8462 result = TRUE;
8463
8464done:
8465 if (symtable1)
8466 free (symtable1);
8467 if (symtable2)
8468 free (symtable2);
8469 if (isymbuf1)
8470 free (isymbuf1);
8471 if (isymbuf2)
8472 free (isymbuf2);
8473
8474 return result;
8475}
3b22753a
L
8476
8477/* It is only used by x86-64 so far. */
8478asection _bfd_elf_large_com_section
8479 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
8480 SEC_IS_COMMON, NULL, NULL, "LARGE_COMMON",
8481 0);
ecca9871
L
8482
8483/* Return TRUE if 2 section types are compatible. */
8484
8485bfd_boolean
8486_bfd_elf_match_sections_by_type (bfd *abfd, const asection *asec,
8487 bfd *bbfd, const asection *bsec)
8488{
8489 if (asec == NULL
8490 || bsec == NULL
8491 || abfd->xvec->flavour != bfd_target_elf_flavour
8492 || bbfd->xvec->flavour != bfd_target_elf_flavour)
8493 return TRUE;
8494
8495 return elf_section_type (asec) == elf_section_type (bsec);
8496}
This page took 1.066368 seconds and 4 git commands to generate.