]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
* hppa.h (FLAG_STRICT): Correct comment.
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
8615f3f2 4 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
661a3fd4 22/* SECTION
47d9a591 23
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
209/* Read a specified number of bytes at a specified offset in an ELF
210 file, into a newly allocated buffer, and return a pointer to the
c044fabd 211 buffer. */
252b5132 212
f075ee0c 213static bfd_byte *
217aa764 214elf_read (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 215{
f075ee0c 216 bfd_byte *buf;
252b5132
RH
217
218 if ((buf = bfd_alloc (abfd, size)) == NULL)
219 return NULL;
dc810e39 220 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
252b5132 221 return NULL;
217aa764 222 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
223 {
224 if (bfd_get_error () != bfd_error_system_call)
225 bfd_set_error (bfd_error_file_truncated);
226 return NULL;
227 }
228 return buf;
229}
230
b34976b6 231bfd_boolean
217aa764 232bfd_elf_mkobject (bfd *abfd)
252b5132 233{
c044fabd
KH
234 /* This just does initialization. */
235 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 236 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 237 if (elf_tdata (abfd) == 0)
b34976b6 238 return FALSE;
c044fabd
KH
239 /* Since everything is done at close time, do we need any
240 initialization? */
252b5132 241
b34976b6 242 return TRUE;
252b5132
RH
243}
244
b34976b6 245bfd_boolean
217aa764 246bfd_elf_mkcorefile (bfd *abfd)
252b5132 247{
c044fabd 248 /* I think this can be done just like an object file. */
252b5132
RH
249 return bfd_elf_mkobject (abfd);
250}
251
252char *
217aa764 253bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
254{
255 Elf_Internal_Shdr **i_shdrp;
f075ee0c 256 bfd_byte *shstrtab = NULL;
dc810e39
AM
257 file_ptr offset;
258 bfd_size_type shstrtabsize;
252b5132
RH
259
260 i_shdrp = elf_elfsections (abfd);
261 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 262 return NULL;
252b5132 263
f075ee0c 264 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
265 if (shstrtab == NULL)
266 {
c044fabd 267 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
268 offset = i_shdrp[shindex]->sh_offset;
269 shstrtabsize = i_shdrp[shindex]->sh_size;
270 shstrtab = elf_read (abfd, offset, shstrtabsize);
217aa764 271 i_shdrp[shindex]->contents = shstrtab;
252b5132 272 }
f075ee0c 273 return (char *) shstrtab;
252b5132
RH
274}
275
276char *
217aa764
AM
277bfd_elf_string_from_elf_section (bfd *abfd,
278 unsigned int shindex,
279 unsigned int strindex)
252b5132
RH
280{
281 Elf_Internal_Shdr *hdr;
282
283 if (strindex == 0)
284 return "";
285
286 hdr = elf_elfsections (abfd)[shindex];
287
288 if (hdr->contents == NULL
289 && bfd_elf_get_str_section (abfd, shindex) == NULL)
290 return NULL;
291
292 if (strindex >= hdr->sh_size)
293 {
1b3a8575 294 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 295 (*_bfd_error_handler)
d003868e
AM
296 (_("%B: invalid string offset %u >= %lu for section `%s'"),
297 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 298 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 299 ? ".shstrtab"
1b3a8575 300 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
301 return "";
302 }
303
304 return ((char *) hdr->contents) + strindex;
305}
306
6cdc0ccc
AM
307/* Read and convert symbols to internal format.
308 SYMCOUNT specifies the number of symbols to read, starting from
309 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
310 are non-NULL, they are used to store the internal symbols, external
311 symbols, and symbol section index extensions, respectively. */
312
313Elf_Internal_Sym *
217aa764
AM
314bfd_elf_get_elf_syms (bfd *ibfd,
315 Elf_Internal_Shdr *symtab_hdr,
316 size_t symcount,
317 size_t symoffset,
318 Elf_Internal_Sym *intsym_buf,
319 void *extsym_buf,
320 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
321{
322 Elf_Internal_Shdr *shndx_hdr;
217aa764 323 void *alloc_ext;
df622259 324 const bfd_byte *esym;
6cdc0ccc
AM
325 Elf_External_Sym_Shndx *alloc_extshndx;
326 Elf_External_Sym_Shndx *shndx;
327 Elf_Internal_Sym *isym;
328 Elf_Internal_Sym *isymend;
9c5bfbb7 329 const struct elf_backend_data *bed;
6cdc0ccc
AM
330 size_t extsym_size;
331 bfd_size_type amt;
332 file_ptr pos;
333
334 if (symcount == 0)
335 return intsym_buf;
336
337 /* Normal syms might have section extension entries. */
338 shndx_hdr = NULL;
339 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
340 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
341
342 /* Read the symbols. */
343 alloc_ext = NULL;
344 alloc_extshndx = NULL;
345 bed = get_elf_backend_data (ibfd);
346 extsym_size = bed->s->sizeof_sym;
347 amt = symcount * extsym_size;
348 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
349 if (extsym_buf == NULL)
350 {
351 alloc_ext = bfd_malloc (amt);
352 extsym_buf = alloc_ext;
353 }
354 if (extsym_buf == NULL
355 || bfd_seek (ibfd, pos, SEEK_SET) != 0
356 || bfd_bread (extsym_buf, amt, ibfd) != amt)
357 {
358 intsym_buf = NULL;
359 goto out;
360 }
361
362 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
363 extshndx_buf = NULL;
364 else
365 {
366 amt = symcount * sizeof (Elf_External_Sym_Shndx);
367 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
368 if (extshndx_buf == NULL)
369 {
217aa764 370 alloc_extshndx = bfd_malloc (amt);
6cdc0ccc
AM
371 extshndx_buf = alloc_extshndx;
372 }
373 if (extshndx_buf == NULL
374 || bfd_seek (ibfd, pos, SEEK_SET) != 0
375 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
376 {
377 intsym_buf = NULL;
378 goto out;
379 }
380 }
381
382 if (intsym_buf == NULL)
383 {
384 bfd_size_type amt = symcount * sizeof (Elf_Internal_Sym);
217aa764 385 intsym_buf = bfd_malloc (amt);
6cdc0ccc
AM
386 if (intsym_buf == NULL)
387 goto out;
388 }
389
390 /* Convert the symbols to internal form. */
391 isymend = intsym_buf + symcount;
392 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
393 isym < isymend;
394 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 395 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
396
397 out:
398 if (alloc_ext != NULL)
399 free (alloc_ext);
400 if (alloc_extshndx != NULL)
401 free (alloc_extshndx);
402
403 return intsym_buf;
404}
405
5cab59f6
AM
406/* Look up a symbol name. */
407const char *
be8dd2ca
AM
408bfd_elf_sym_name (bfd *abfd,
409 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
410 Elf_Internal_Sym *isym,
411 asection *sym_sec)
5cab59f6 412{
26c61ae5 413 const char *name;
5cab59f6 414 unsigned int iname = isym->st_name;
be8dd2ca 415 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 416
138f35cc
JJ
417 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
418 /* Check for a bogus st_shndx to avoid crashing. */
419 && isym->st_shndx < elf_numsections (abfd)
420 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
421 {
422 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
423 shindex = elf_elfheader (abfd)->e_shstrndx;
424 }
425
26c61ae5
L
426 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
427 if (name == NULL)
428 name = "(null)";
429 else if (sym_sec && *name == '\0')
430 name = bfd_section_name (abfd, sym_sec);
431
432 return name;
5cab59f6
AM
433}
434
dbb410c3
AM
435/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
436 sections. The first element is the flags, the rest are section
437 pointers. */
438
439typedef union elf_internal_group {
440 Elf_Internal_Shdr *shdr;
441 unsigned int flags;
442} Elf_Internal_Group;
443
b885599b
AM
444/* Return the name of the group signature symbol. Why isn't the
445 signature just a string? */
446
447static const char *
217aa764 448group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 449{
9dce4196 450 Elf_Internal_Shdr *hdr;
9dce4196
AM
451 unsigned char esym[sizeof (Elf64_External_Sym)];
452 Elf_External_Sym_Shndx eshndx;
453 Elf_Internal_Sym isym;
b885599b 454
13792e9d
L
455 /* First we need to ensure the symbol table is available. Make sure
456 that it is a symbol table section. */
457 hdr = elf_elfsections (abfd) [ghdr->sh_link];
458 if (hdr->sh_type != SHT_SYMTAB
459 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
460 return NULL;
461
9dce4196
AM
462 /* Go read the symbol. */
463 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
464 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
465 &isym, esym, &eshndx) == NULL)
b885599b 466 return NULL;
9dce4196 467
26c61ae5 468 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
469}
470
dbb410c3
AM
471/* Set next_in_group list pointer, and group name for NEWSECT. */
472
b34976b6 473static bfd_boolean
217aa764 474setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
475{
476 unsigned int num_group = elf_tdata (abfd)->num_group;
477
478 /* If num_group is zero, read in all SHT_GROUP sections. The count
479 is set to -1 if there are no SHT_GROUP sections. */
480 if (num_group == 0)
481 {
482 unsigned int i, shnum;
483
484 /* First count the number of groups. If we have a SHT_GROUP
485 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 486 shnum = elf_numsections (abfd);
dbb410c3
AM
487 num_group = 0;
488 for (i = 0; i < shnum; i++)
489 {
490 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
491 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
492 num_group += 1;
493 }
494
495 if (num_group == 0)
20dbb49d
L
496 {
497 num_group = (unsigned) -1;
498 elf_tdata (abfd)->num_group = num_group;
499 }
500 else
dbb410c3
AM
501 {
502 /* We keep a list of elf section headers for group sections,
503 so we can find them quickly. */
20dbb49d
L
504 bfd_size_type amt;
505
506 elf_tdata (abfd)->num_group = num_group;
507 amt = num_group * sizeof (Elf_Internal_Shdr *);
dbb410c3
AM
508 elf_tdata (abfd)->group_sect_ptr = bfd_alloc (abfd, amt);
509 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 510 return FALSE;
dbb410c3
AM
511
512 num_group = 0;
513 for (i = 0; i < shnum; i++)
514 {
515 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
516 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
517 {
973ffd63 518 unsigned char *src;
dbb410c3
AM
519 Elf_Internal_Group *dest;
520
521 /* Add to list of sections. */
522 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
523 num_group += 1;
524
525 /* Read the raw contents. */
526 BFD_ASSERT (sizeof (*dest) >= 4);
527 amt = shdr->sh_size * sizeof (*dest) / 4;
528 shdr->contents = bfd_alloc (abfd, amt);
529 if (shdr->contents == NULL
530 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
531 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
532 != shdr->sh_size))
b34976b6 533 return FALSE;
dbb410c3
AM
534
535 /* Translate raw contents, a flag word followed by an
536 array of elf section indices all in target byte order,
537 to the flag word followed by an array of elf section
538 pointers. */
539 src = shdr->contents + shdr->sh_size;
540 dest = (Elf_Internal_Group *) (shdr->contents + amt);
541 while (1)
542 {
543 unsigned int idx;
544
545 src -= 4;
546 --dest;
547 idx = H_GET_32 (abfd, src);
548 if (src == shdr->contents)
549 {
550 dest->flags = idx;
b885599b
AM
551 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
552 shdr->bfd_section->flags
553 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
554 break;
555 }
556 if (idx >= shnum)
557 {
558 ((*_bfd_error_handler)
d003868e 559 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
560 idx = 0;
561 }
562 dest->shdr = elf_elfsections (abfd)[idx];
563 }
564 }
565 }
566 }
567 }
568
569 if (num_group != (unsigned) -1)
570 {
571 unsigned int i;
572
573 for (i = 0; i < num_group; i++)
574 {
575 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
576 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
577 unsigned int n_elt = shdr->sh_size / 4;
578
579 /* Look through this group's sections to see if current
580 section is a member. */
581 while (--n_elt != 0)
582 if ((++idx)->shdr == hdr)
583 {
e0e8c97f 584 asection *s = NULL;
dbb410c3
AM
585
586 /* We are a member of this group. Go looking through
587 other members to see if any others are linked via
588 next_in_group. */
589 idx = (Elf_Internal_Group *) shdr->contents;
590 n_elt = shdr->sh_size / 4;
591 while (--n_elt != 0)
592 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 593 && elf_next_in_group (s) != NULL)
dbb410c3
AM
594 break;
595 if (n_elt != 0)
596 {
dbb410c3
AM
597 /* Snarf the group name from other member, and
598 insert current section in circular list. */
945906ff
AM
599 elf_group_name (newsect) = elf_group_name (s);
600 elf_next_in_group (newsect) = elf_next_in_group (s);
601 elf_next_in_group (s) = newsect;
dbb410c3
AM
602 }
603 else
604 {
dbb410c3
AM
605 const char *gname;
606
b885599b
AM
607 gname = group_signature (abfd, shdr);
608 if (gname == NULL)
b34976b6 609 return FALSE;
945906ff 610 elf_group_name (newsect) = gname;
dbb410c3
AM
611
612 /* Start a circular list with one element. */
945906ff 613 elf_next_in_group (newsect) = newsect;
dbb410c3 614 }
b885599b 615
9dce4196
AM
616 /* If the group section has been created, point to the
617 new member. */
dbb410c3 618 if (shdr->bfd_section != NULL)
945906ff 619 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 620
dbb410c3
AM
621 i = num_group - 1;
622 break;
623 }
624 }
625 }
626
945906ff 627 if (elf_group_name (newsect) == NULL)
dbb410c3 628 {
d003868e
AM
629 (*_bfd_error_handler) (_("%B: no group info for section %A"),
630 abfd, newsect);
dbb410c3 631 }
b34976b6 632 return TRUE;
dbb410c3
AM
633}
634
3d7f7666
L
635bfd_boolean
636_bfd_elf_setup_group_pointers (bfd *abfd)
637{
638 unsigned int i;
639 unsigned int num_group = elf_tdata (abfd)->num_group;
640 bfd_boolean result = TRUE;
641
642 if (num_group == (unsigned) -1)
643 return result;
644
645 for (i = 0; i < num_group; i++)
646 {
647 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
648 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
649 unsigned int n_elt = shdr->sh_size / 4;
650
651 while (--n_elt != 0)
652 if ((++idx)->shdr->bfd_section)
653 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
654 else if (idx->shdr->sh_type == SHT_RELA
655 || idx->shdr->sh_type == SHT_REL)
656 /* We won't include relocation sections in section groups in
657 output object files. We adjust the group section size here
658 so that relocatable link will work correctly when
659 relocation sections are in section group in input object
660 files. */
661 shdr->bfd_section->size -= 4;
662 else
663 {
664 /* There are some unknown sections in the group. */
665 (*_bfd_error_handler)
d003868e
AM
666 (_("%B: unknown [%d] section `%s' in group [%s]"),
667 abfd,
3d7f7666 668 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
669 bfd_elf_string_from_elf_section (abfd,
670 (elf_elfheader (abfd)
671 ->e_shstrndx),
672 idx->shdr->sh_name),
3d7f7666
L
673 shdr->bfd_section->name);
674 result = FALSE;
675 }
676 }
677 return result;
678}
679
72adc230
AM
680bfd_boolean
681bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
682{
683 return elf_next_in_group (sec) != NULL;
684}
685
252b5132
RH
686/* Make a BFD section from an ELF section. We store a pointer to the
687 BFD section in the bfd_section field of the header. */
688
b34976b6 689bfd_boolean
217aa764
AM
690_bfd_elf_make_section_from_shdr (bfd *abfd,
691 Elf_Internal_Shdr *hdr,
6dc132d9
L
692 const char *name,
693 int shindex)
252b5132
RH
694{
695 asection *newsect;
696 flagword flags;
9c5bfbb7 697 const struct elf_backend_data *bed;
252b5132
RH
698
699 if (hdr->bfd_section != NULL)
700 {
701 BFD_ASSERT (strcmp (name,
702 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 703 return TRUE;
252b5132
RH
704 }
705
706 newsect = bfd_make_section_anyway (abfd, name);
707 if (newsect == NULL)
b34976b6 708 return FALSE;
252b5132 709
1829f4b2
AM
710 hdr->bfd_section = newsect;
711 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 712 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 713
2f89ff8d
L
714 /* Always use the real type/flags. */
715 elf_section_type (newsect) = hdr->sh_type;
716 elf_section_flags (newsect) = hdr->sh_flags;
717
252b5132
RH
718 newsect->filepos = hdr->sh_offset;
719
720 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
721 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
722 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 723 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 724 return FALSE;
252b5132
RH
725
726 flags = SEC_NO_FLAGS;
727 if (hdr->sh_type != SHT_NOBITS)
728 flags |= SEC_HAS_CONTENTS;
dbb410c3 729 if (hdr->sh_type == SHT_GROUP)
b3096250 730 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
731 if ((hdr->sh_flags & SHF_ALLOC) != 0)
732 {
733 flags |= SEC_ALLOC;
734 if (hdr->sh_type != SHT_NOBITS)
735 flags |= SEC_LOAD;
736 }
737 if ((hdr->sh_flags & SHF_WRITE) == 0)
738 flags |= SEC_READONLY;
739 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
740 flags |= SEC_CODE;
741 else if ((flags & SEC_LOAD) != 0)
742 flags |= SEC_DATA;
f5fa8ca2
JJ
743 if ((hdr->sh_flags & SHF_MERGE) != 0)
744 {
745 flags |= SEC_MERGE;
746 newsect->entsize = hdr->sh_entsize;
747 if ((hdr->sh_flags & SHF_STRINGS) != 0)
748 flags |= SEC_STRINGS;
749 }
dbb410c3
AM
750 if (hdr->sh_flags & SHF_GROUP)
751 if (!setup_group (abfd, hdr, newsect))
b34976b6 752 return FALSE;
13ae64f3
JJ
753 if ((hdr->sh_flags & SHF_TLS) != 0)
754 flags |= SEC_THREAD_LOCAL;
252b5132 755
3d2b39cf 756 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 757 {
3d2b39cf
L
758 /* The debugging sections appear to be recognized only by name,
759 not any sort of flag. Their SEC_ALLOC bits are cleared. */
760 static const struct
761 {
762 const char *name;
763 int len;
764 } debug_sections [] =
765 {
766 { "debug", 5 }, /* 'd' */
767 { NULL, 0 }, /* 'e' */
768 { NULL, 0 }, /* 'f' */
769 { "gnu.linkonce.wi.", 17 }, /* 'g' */
770 { NULL, 0 }, /* 'h' */
771 { NULL, 0 }, /* 'i' */
772 { NULL, 0 }, /* 'j' */
773 { NULL, 0 }, /* 'k' */
774 { "line", 4 }, /* 'l' */
775 { NULL, 0 }, /* 'm' */
776 { NULL, 0 }, /* 'n' */
777 { NULL, 0 }, /* 'o' */
778 { NULL, 0 }, /* 'p' */
779 { NULL, 0 }, /* 'q' */
780 { NULL, 0 }, /* 'r' */
781 { "stab", 4 } /* 's' */
782 };
783
784 if (name [0] == '.')
785 {
786 int i = name [1] - 'd';
787 if (i >= 0
788 && i < (int) ARRAY_SIZE (debug_sections)
789 && debug_sections [i].name != NULL
790 && strncmp (&name [1], debug_sections [i].name,
791 debug_sections [i].len) == 0)
792 flags |= SEC_DEBUGGING;
793 }
794 }
252b5132
RH
795
796 /* As a GNU extension, if the name begins with .gnu.linkonce, we
797 only link a single copy of the section. This is used to support
798 g++. g++ will emit each template expansion in its own section.
799 The symbols will be defined as weak, so that multiple definitions
800 are permitted. The GNU linker extension is to actually discard
801 all but one of the sections. */
b885599b
AM
802 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
803 && elf_next_in_group (newsect) == NULL)
252b5132
RH
804 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
805
fa152c49
JW
806 bed = get_elf_backend_data (abfd);
807 if (bed->elf_backend_section_flags)
808 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 809 return FALSE;
fa152c49 810
252b5132 811 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 812 return FALSE;
252b5132
RH
813
814 if ((flags & SEC_ALLOC) != 0)
815 {
816 Elf_Internal_Phdr *phdr;
817 unsigned int i;
818
819 /* Look through the phdrs to see if we need to adjust the lma.
820 If all the p_paddr fields are zero, we ignore them, since
821 some ELF linkers produce such output. */
822 phdr = elf_tdata (abfd)->phdr;
823 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
824 {
825 if (phdr->p_paddr != 0)
826 break;
827 }
828 if (i < elf_elfheader (abfd)->e_phnum)
829 {
830 phdr = elf_tdata (abfd)->phdr;
831 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
832 {
e0e8c97f
NC
833 /* This section is part of this segment if its file
834 offset plus size lies within the segment's memory
835 span and, if the section is loaded, the extent of the
47d9a591 836 loaded data lies within the extent of the segment.
bf36db18
NC
837
838 Note - we used to check the p_paddr field as well, and
839 refuse to set the LMA if it was 0. This is wrong
dba143ef 840 though, as a perfectly valid initialised segment can
bf36db18 841 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 842 place special significance on the address 0 and
bf36db18
NC
843 executables need to be able to have a segment which
844 covers this address. */
252b5132 845 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
846 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
847 && (hdr->sh_offset + hdr->sh_size
848 <= phdr->p_offset + phdr->p_memsz)
252b5132 849 && ((flags & SEC_LOAD) == 0
d7866f04
AM
850 || (hdr->sh_offset + hdr->sh_size
851 <= phdr->p_offset + phdr->p_filesz)))
252b5132 852 {
dba143ef 853 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
854 newsect->lma = (phdr->p_paddr
855 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
856 else
857 /* We used to use the same adjustment for SEC_LOAD
858 sections, but that doesn't work if the segment
859 is packed with code from multiple VMAs.
860 Instead we calculate the section LMA based on
861 the segment LMA. It is assumed that the
862 segment will contain sections with contiguous
863 LMAs, even if the VMAs are not. */
864 newsect->lma = (phdr->p_paddr
865 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
866
867 /* With contiguous segments, we can't tell from file
868 offsets whether a section with zero size should
869 be placed at the end of one segment or the
870 beginning of the next. Decide based on vaddr. */
871 if (hdr->sh_addr >= phdr->p_vaddr
872 && (hdr->sh_addr + hdr->sh_size
873 <= phdr->p_vaddr + phdr->p_memsz))
874 break;
252b5132
RH
875 }
876 }
877 }
878 }
879
b34976b6 880 return TRUE;
252b5132
RH
881}
882
883/*
884INTERNAL_FUNCTION
885 bfd_elf_find_section
886
887SYNOPSIS
888 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
889
890DESCRIPTION
891 Helper functions for GDB to locate the string tables.
892 Since BFD hides string tables from callers, GDB needs to use an
893 internal hook to find them. Sun's .stabstr, in particular,
894 isn't even pointed to by the .stab section, so ordinary
895 mechanisms wouldn't work to find it, even if we had some.
896*/
897
898struct elf_internal_shdr *
217aa764 899bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
900{
901 Elf_Internal_Shdr **i_shdrp;
902 char *shstrtab;
903 unsigned int max;
904 unsigned int i;
905
906 i_shdrp = elf_elfsections (abfd);
907 if (i_shdrp != NULL)
908 {
9ad5cbcf
AM
909 shstrtab = bfd_elf_get_str_section (abfd,
910 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
911 if (shstrtab != NULL)
912 {
9ad5cbcf 913 max = elf_numsections (abfd);
252b5132
RH
914 for (i = 1; i < max; i++)
915 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
916 return i_shdrp[i];
917 }
918 }
919 return 0;
920}
921
922const char *const bfd_elf_section_type_names[] = {
923 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
924 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
925 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
926};
927
1049f94e 928/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
929 output, and the reloc is against an external symbol, and nothing
930 has given us any additional addend, the resulting reloc will also
931 be against the same symbol. In such a case, we don't want to
932 change anything about the way the reloc is handled, since it will
933 all be done at final link time. Rather than put special case code
934 into bfd_perform_relocation, all the reloc types use this howto
935 function. It just short circuits the reloc if producing
1049f94e 936 relocatable output against an external symbol. */
252b5132 937
252b5132 938bfd_reloc_status_type
217aa764
AM
939bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
940 arelent *reloc_entry,
941 asymbol *symbol,
942 void *data ATTRIBUTE_UNUSED,
943 asection *input_section,
944 bfd *output_bfd,
945 char **error_message ATTRIBUTE_UNUSED)
946{
947 if (output_bfd != NULL
252b5132
RH
948 && (symbol->flags & BSF_SECTION_SYM) == 0
949 && (! reloc_entry->howto->partial_inplace
950 || reloc_entry->addend == 0))
951 {
952 reloc_entry->address += input_section->output_offset;
953 return bfd_reloc_ok;
954 }
955
956 return bfd_reloc_continue;
957}
958\f
d3c456e9
JJ
959/* Make sure sec_info_type is cleared if sec_info is cleared too. */
960
961static void
217aa764
AM
962merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
963 asection *sec)
d3c456e9 964{
68bfbfcc
AM
965 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
966 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
967}
968
8550eb6e
JJ
969/* Finish SHF_MERGE section merging. */
970
b34976b6 971bfd_boolean
217aa764 972_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 973{
57ceae94
AM
974 bfd *ibfd;
975 asection *sec;
976
0eddce27 977 if (!is_elf_hash_table (info->hash))
b34976b6 978 return FALSE;
57ceae94
AM
979
980 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
981 if ((ibfd->flags & DYNAMIC) == 0)
982 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
983 if ((sec->flags & SEC_MERGE) != 0
984 && !bfd_is_abs_section (sec->output_section))
985 {
986 struct bfd_elf_section_data *secdata;
987
988 secdata = elf_section_data (sec);
989 if (! _bfd_add_merge_section (abfd,
990 &elf_hash_table (info)->merge_info,
991 sec, &secdata->sec_info))
992 return FALSE;
993 else if (secdata->sec_info)
994 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
995 }
996
997 if (elf_hash_table (info)->merge_info != NULL)
998 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 999 merge_sections_remove_hook);
b34976b6 1000 return TRUE;
8550eb6e 1001}
2d653fc7
AM
1002
1003void
217aa764 1004_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1005{
1006 sec->output_section = bfd_abs_section_ptr;
1007 sec->output_offset = sec->vma;
0eddce27 1008 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1009 return;
1010
68bfbfcc 1011 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1012}
8550eb6e 1013\f
0ac4564e
L
1014/* Copy the program header and other data from one object module to
1015 another. */
252b5132 1016
b34976b6 1017bfd_boolean
217aa764 1018_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1019{
1020 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1021 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1022 return TRUE;
2d502050
L
1023
1024 BFD_ASSERT (!elf_flags_init (obfd)
1025 || (elf_elfheader (obfd)->e_flags
1026 == elf_elfheader (ibfd)->e_flags));
1027
0ac4564e 1028 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1029 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1030 elf_flags_init (obfd) = TRUE;
1031 return TRUE;
2d502050
L
1032}
1033
f0b79d91
L
1034/* Print out the program headers. */
1035
b34976b6 1036bfd_boolean
217aa764 1037_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1038{
217aa764 1039 FILE *f = farg;
252b5132
RH
1040 Elf_Internal_Phdr *p;
1041 asection *s;
1042 bfd_byte *dynbuf = NULL;
1043
1044 p = elf_tdata (abfd)->phdr;
1045 if (p != NULL)
1046 {
1047 unsigned int i, c;
1048
1049 fprintf (f, _("\nProgram Header:\n"));
1050 c = elf_elfheader (abfd)->e_phnum;
1051 for (i = 0; i < c; i++, p++)
1052 {
dc810e39 1053 const char *pt;
252b5132
RH
1054 char buf[20];
1055
1056 switch (p->p_type)
1057 {
dc810e39
AM
1058 case PT_NULL: pt = "NULL"; break;
1059 case PT_LOAD: pt = "LOAD"; break;
1060 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1061 case PT_INTERP: pt = "INTERP"; break;
1062 case PT_NOTE: pt = "NOTE"; break;
1063 case PT_SHLIB: pt = "SHLIB"; break;
1064 case PT_PHDR: pt = "PHDR"; break;
13ae64f3 1065 case PT_TLS: pt = "TLS"; break;
65765700 1066 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
9ee5e499 1067 case PT_GNU_STACK: pt = "STACK"; break;
8c37241b 1068 case PT_GNU_RELRO: pt = "RELRO"; break;
dc810e39 1069 default: sprintf (buf, "0x%lx", p->p_type); pt = buf; break;
252b5132 1070 }
dc810e39 1071 fprintf (f, "%8s off 0x", pt);
60b89a18 1072 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1073 fprintf (f, " vaddr 0x");
60b89a18 1074 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1075 fprintf (f, " paddr 0x");
60b89a18 1076 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1077 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1078 fprintf (f, " filesz 0x");
60b89a18 1079 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1080 fprintf (f, " memsz 0x");
60b89a18 1081 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1082 fprintf (f, " flags %c%c%c",
1083 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1084 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1085 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1086 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1087 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1088 fprintf (f, "\n");
1089 }
1090 }
1091
1092 s = bfd_get_section_by_name (abfd, ".dynamic");
1093 if (s != NULL)
1094 {
1095 int elfsec;
dc810e39 1096 unsigned long shlink;
252b5132
RH
1097 bfd_byte *extdyn, *extdynend;
1098 size_t extdynsize;
217aa764 1099 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1100
1101 fprintf (f, _("\nDynamic Section:\n"));
1102
eea6121a 1103 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1104 goto error_return;
1105
1106 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1107 if (elfsec == -1)
1108 goto error_return;
dc810e39 1109 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1110
1111 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1112 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1113
1114 extdyn = dynbuf;
eea6121a 1115 extdynend = extdyn + s->size;
252b5132
RH
1116 for (; extdyn < extdynend; extdyn += extdynsize)
1117 {
1118 Elf_Internal_Dyn dyn;
1119 const char *name;
1120 char ab[20];
b34976b6 1121 bfd_boolean stringp;
252b5132 1122
217aa764 1123 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1124
1125 if (dyn.d_tag == DT_NULL)
1126 break;
1127
b34976b6 1128 stringp = FALSE;
252b5132
RH
1129 switch (dyn.d_tag)
1130 {
1131 default:
1132 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1133 name = ab;
1134 break;
1135
b34976b6 1136 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1137 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1138 case DT_PLTGOT: name = "PLTGOT"; break;
1139 case DT_HASH: name = "HASH"; break;
1140 case DT_STRTAB: name = "STRTAB"; break;
1141 case DT_SYMTAB: name = "SYMTAB"; break;
1142 case DT_RELA: name = "RELA"; break;
1143 case DT_RELASZ: name = "RELASZ"; break;
1144 case DT_RELAENT: name = "RELAENT"; break;
1145 case DT_STRSZ: name = "STRSZ"; break;
1146 case DT_SYMENT: name = "SYMENT"; break;
1147 case DT_INIT: name = "INIT"; break;
1148 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1149 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1150 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1151 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1152 case DT_REL: name = "REL"; break;
1153 case DT_RELSZ: name = "RELSZ"; break;
1154 case DT_RELENT: name = "RELENT"; break;
1155 case DT_PLTREL: name = "PLTREL"; break;
1156 case DT_DEBUG: name = "DEBUG"; break;
1157 case DT_TEXTREL: name = "TEXTREL"; break;
1158 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1159 case DT_BIND_NOW: name = "BIND_NOW"; break;
1160 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1161 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1162 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1163 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1164 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1165 case DT_FLAGS: name = "FLAGS"; break;
1166 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1167 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1168 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1169 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1170 case DT_MOVEENT: name = "MOVEENT"; break;
1171 case DT_MOVESZ: name = "MOVESZ"; break;
1172 case DT_FEATURE: name = "FEATURE"; break;
1173 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1174 case DT_SYMINSZ: name = "SYMINSZ"; break;
1175 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1176 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1177 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1178 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1179 case DT_PLTPAD: name = "PLTPAD"; break;
1180 case DT_MOVETAB: name = "MOVETAB"; break;
1181 case DT_SYMINFO: name = "SYMINFO"; break;
1182 case DT_RELACOUNT: name = "RELACOUNT"; break;
1183 case DT_RELCOUNT: name = "RELCOUNT"; break;
1184 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1185 case DT_VERSYM: name = "VERSYM"; break;
1186 case DT_VERDEF: name = "VERDEF"; break;
1187 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1188 case DT_VERNEED: name = "VERNEED"; break;
1189 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1190 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1191 case DT_USED: name = "USED"; break;
b34976b6 1192 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1193 }
1194
1195 fprintf (f, " %-11s ", name);
1196 if (! stringp)
1197 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1198 else
1199 {
1200 const char *string;
dc810e39 1201 unsigned int tagv = dyn.d_un.d_val;
252b5132 1202
dc810e39 1203 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1204 if (string == NULL)
1205 goto error_return;
1206 fprintf (f, "%s", string);
1207 }
1208 fprintf (f, "\n");
1209 }
1210
1211 free (dynbuf);
1212 dynbuf = NULL;
1213 }
1214
1215 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1216 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1217 {
fc0e6df6 1218 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1219 return FALSE;
252b5132
RH
1220 }
1221
1222 if (elf_dynverdef (abfd) != 0)
1223 {
1224 Elf_Internal_Verdef *t;
1225
1226 fprintf (f, _("\nVersion definitions:\n"));
1227 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1228 {
1229 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1230 t->vd_flags, t->vd_hash, t->vd_nodename);
1231 if (t->vd_auxptr->vda_nextptr != NULL)
1232 {
1233 Elf_Internal_Verdaux *a;
1234
1235 fprintf (f, "\t");
1236 for (a = t->vd_auxptr->vda_nextptr;
1237 a != NULL;
1238 a = a->vda_nextptr)
1239 fprintf (f, "%s ", a->vda_nodename);
1240 fprintf (f, "\n");
1241 }
1242 }
1243 }
1244
1245 if (elf_dynverref (abfd) != 0)
1246 {
1247 Elf_Internal_Verneed *t;
1248
1249 fprintf (f, _("\nVersion References:\n"));
1250 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1251 {
1252 Elf_Internal_Vernaux *a;
1253
1254 fprintf (f, _(" required from %s:\n"), t->vn_filename);
1255 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1256 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1257 a->vna_flags, a->vna_other, a->vna_nodename);
1258 }
1259 }
1260
b34976b6 1261 return TRUE;
252b5132
RH
1262
1263 error_return:
1264 if (dynbuf != NULL)
1265 free (dynbuf);
b34976b6 1266 return FALSE;
252b5132
RH
1267}
1268
1269/* Display ELF-specific fields of a symbol. */
1270
1271void
217aa764
AM
1272bfd_elf_print_symbol (bfd *abfd,
1273 void *filep,
1274 asymbol *symbol,
1275 bfd_print_symbol_type how)
252b5132 1276{
217aa764 1277 FILE *file = filep;
252b5132
RH
1278 switch (how)
1279 {
1280 case bfd_print_symbol_name:
1281 fprintf (file, "%s", symbol->name);
1282 break;
1283 case bfd_print_symbol_more:
1284 fprintf (file, "elf ");
60b89a18 1285 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1286 fprintf (file, " %lx", (long) symbol->flags);
1287 break;
1288 case bfd_print_symbol_all:
1289 {
4e8a9624
AM
1290 const char *section_name;
1291 const char *name = NULL;
9c5bfbb7 1292 const struct elf_backend_data *bed;
7a13edea 1293 unsigned char st_other;
dbb410c3 1294 bfd_vma val;
c044fabd 1295
252b5132 1296 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1297
1298 bed = get_elf_backend_data (abfd);
1299 if (bed->elf_backend_print_symbol_all)
c044fabd 1300 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1301
1302 if (name == NULL)
1303 {
7ee38065 1304 name = symbol->name;
217aa764 1305 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1306 }
1307
252b5132
RH
1308 fprintf (file, " %s\t", section_name);
1309 /* Print the "other" value for a symbol. For common symbols,
1310 we've already printed the size; now print the alignment.
1311 For other symbols, we have no specified alignment, and
1312 we've printed the address; now print the size. */
dbb410c3
AM
1313 if (bfd_is_com_section (symbol->section))
1314 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1315 else
1316 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1317 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1318
1319 /* If we have version information, print it. */
1320 if (elf_tdata (abfd)->dynversym_section != 0
1321 && (elf_tdata (abfd)->dynverdef_section != 0
1322 || elf_tdata (abfd)->dynverref_section != 0))
1323 {
1324 unsigned int vernum;
1325 const char *version_string;
1326
1327 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1328
1329 if (vernum == 0)
1330 version_string = "";
1331 else if (vernum == 1)
1332 version_string = "Base";
1333 else if (vernum <= elf_tdata (abfd)->cverdefs)
1334 version_string =
1335 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1336 else
1337 {
1338 Elf_Internal_Verneed *t;
1339
1340 version_string = "";
1341 for (t = elf_tdata (abfd)->verref;
1342 t != NULL;
1343 t = t->vn_nextref)
1344 {
1345 Elf_Internal_Vernaux *a;
1346
1347 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1348 {
1349 if (a->vna_other == vernum)
1350 {
1351 version_string = a->vna_nodename;
1352 break;
1353 }
1354 }
1355 }
1356 }
1357
1358 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1359 fprintf (file, " %-11s", version_string);
1360 else
1361 {
1362 int i;
1363
1364 fprintf (file, " (%s)", version_string);
1365 for (i = 10 - strlen (version_string); i > 0; --i)
1366 putc (' ', file);
1367 }
1368 }
1369
1370 /* If the st_other field is not zero, print it. */
7a13edea 1371 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1372
7a13edea
NC
1373 switch (st_other)
1374 {
1375 case 0: break;
1376 case STV_INTERNAL: fprintf (file, " .internal"); break;
1377 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1378 case STV_PROTECTED: fprintf (file, " .protected"); break;
1379 default:
1380 /* Some other non-defined flags are also present, so print
1381 everything hex. */
1382 fprintf (file, " 0x%02x", (unsigned int) st_other);
1383 }
252b5132 1384
587ff49e 1385 fprintf (file, " %s", name);
252b5132
RH
1386 }
1387 break;
1388 }
1389}
1390\f
1391/* Create an entry in an ELF linker hash table. */
1392
1393struct bfd_hash_entry *
217aa764
AM
1394_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1395 struct bfd_hash_table *table,
1396 const char *string)
252b5132 1397{
252b5132
RH
1398 /* Allocate the structure if it has not already been allocated by a
1399 subclass. */
51b64d56
AM
1400 if (entry == NULL)
1401 {
1402 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1403 if (entry == NULL)
1404 return entry;
1405 }
252b5132
RH
1406
1407 /* Call the allocation method of the superclass. */
51b64d56
AM
1408 entry = _bfd_link_hash_newfunc (entry, table, string);
1409 if (entry != NULL)
252b5132 1410 {
51b64d56
AM
1411 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1412 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1413
252b5132
RH
1414 /* Set local fields. */
1415 ret->indx = -1;
252b5132 1416 ret->dynindx = -1;
a6aa5195
AM
1417 ret->got = htab->init_got_refcount;
1418 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1419 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1420 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1421 /* Assume that we have been called by a non-ELF symbol reader.
1422 This flag is then reset by the code which reads an ELF input
1423 file. This ensures that a symbol created by a non-ELF symbol
1424 reader will have the flag set correctly. */
f5385ebf 1425 ret->non_elf = 1;
252b5132
RH
1426 }
1427
51b64d56 1428 return entry;
252b5132
RH
1429}
1430
2920b85c 1431/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1432 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1433
c61b8717 1434void
9c5bfbb7 1435_bfd_elf_link_hash_copy_indirect (const struct elf_backend_data *bed,
217aa764
AM
1436 struct elf_link_hash_entry *dir,
1437 struct elf_link_hash_entry *ind)
2920b85c 1438{
3c3e9281 1439 bfd_signed_vma tmp;
b48fa14c 1440 bfd_signed_vma lowest_valid = bed->can_refcount;
3c3e9281 1441
2920b85c
RH
1442 /* Copy down any references that we may have already seen to the
1443 symbol which just became indirect. */
1444
f5385ebf
AM
1445 dir->ref_dynamic |= ind->ref_dynamic;
1446 dir->ref_regular |= ind->ref_regular;
1447 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1448 dir->non_got_ref |= ind->non_got_ref;
1449 dir->needs_plt |= ind->needs_plt;
1450 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1451
1e370bd2 1452 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1453 return;
1454
51b64d56 1455 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1456 These may have been already set up by a check_relocs routine. */
3c3e9281 1457 tmp = dir->got.refcount;
b48fa14c 1458 if (tmp < lowest_valid)
2920b85c 1459 {
51b64d56 1460 dir->got.refcount = ind->got.refcount;
3c3e9281 1461 ind->got.refcount = tmp;
2920b85c 1462 }
3c3e9281 1463 else
b48fa14c 1464 BFD_ASSERT (ind->got.refcount < lowest_valid);
2920b85c 1465
3c3e9281 1466 tmp = dir->plt.refcount;
b48fa14c 1467 if (tmp < lowest_valid)
2920b85c 1468 {
51b64d56 1469 dir->plt.refcount = ind->plt.refcount;
3c3e9281 1470 ind->plt.refcount = tmp;
2920b85c 1471 }
3c3e9281 1472 else
b48fa14c 1473 BFD_ASSERT (ind->plt.refcount < lowest_valid);
2920b85c
RH
1474
1475 if (dir->dynindx == -1)
1476 {
1477 dir->dynindx = ind->dynindx;
1478 dir->dynstr_index = ind->dynstr_index;
1479 ind->dynindx = -1;
1480 ind->dynstr_index = 0;
1481 }
3c3e9281
AM
1482 else
1483 BFD_ASSERT (ind->dynindx == -1);
2920b85c
RH
1484}
1485
c61b8717 1486void
217aa764
AM
1487_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1488 struct elf_link_hash_entry *h,
1489 bfd_boolean force_local)
2920b85c 1490{
a6aa5195 1491 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1492 h->needs_plt = 0;
e5094212
AM
1493 if (force_local)
1494 {
f5385ebf 1495 h->forced_local = 1;
e5094212
AM
1496 if (h->dynindx != -1)
1497 {
1498 h->dynindx = -1;
1499 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1500 h->dynstr_index);
1501 }
1502 }
2920b85c
RH
1503}
1504
252b5132
RH
1505/* Initialize an ELF linker hash table. */
1506
b34976b6 1507bfd_boolean
217aa764
AM
1508_bfd_elf_link_hash_table_init
1509 (struct elf_link_hash_table *table,
1510 bfd *abfd,
1511 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1512 struct bfd_hash_table *,
1513 const char *))
252b5132 1514{
b34976b6 1515 bfd_boolean ret;
a6aa5195 1516 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1517
b34976b6 1518 table->dynamic_sections_created = FALSE;
252b5132 1519 table->dynobj = NULL;
a6aa5195
AM
1520 table->init_got_refcount.refcount = can_refcount - 1;
1521 table->init_plt_refcount.refcount = can_refcount - 1;
1522 table->init_got_offset.offset = -(bfd_vma) 1;
1523 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1524 /* The first dynamic symbol is a dummy. */
1525 table->dynsymcount = 1;
1526 table->dynstr = NULL;
1527 table->bucketcount = 0;
1528 table->needed = NULL;
1529 table->hgot = NULL;
f5fa8ca2 1530 table->merge_info = NULL;
3722b82f 1531 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1532 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1533 table->dynlocal = NULL;
73722af0 1534 table->runpath = NULL;
e1918d23
AM
1535 table->tls_sec = NULL;
1536 table->tls_size = 0;
73722af0 1537 table->loaded = NULL;
67687978 1538 table->is_relocatable_executable = FALSE;
73722af0
AM
1539
1540 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc);
8ea2e4bd
NC
1541 table->root.type = bfd_link_elf_hash_table;
1542
1543 return ret;
252b5132
RH
1544}
1545
1546/* Create an ELF linker hash table. */
1547
1548struct bfd_link_hash_table *
217aa764 1549_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1550{
1551 struct elf_link_hash_table *ret;
dc810e39 1552 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1553
217aa764
AM
1554 ret = bfd_malloc (amt);
1555 if (ret == NULL)
252b5132
RH
1556 return NULL;
1557
1558 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc))
1559 {
e2d34d7d 1560 free (ret);
252b5132
RH
1561 return NULL;
1562 }
1563
1564 return &ret->root;
1565}
1566
1567/* This is a hook for the ELF emulation code in the generic linker to
1568 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1569 entry for a dynamic object. */
252b5132
RH
1570
1571void
217aa764 1572bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1573{
1574 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1575 && bfd_get_format (abfd) == bfd_object)
1576 elf_dt_name (abfd) = name;
1577}
1578
e56f61be
L
1579int
1580bfd_elf_get_dyn_lib_class (bfd *abfd)
1581{
1582 int lib_class;
1583 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1584 && bfd_get_format (abfd) == bfd_object)
1585 lib_class = elf_dyn_lib_class (abfd);
1586 else
1587 lib_class = 0;
1588 return lib_class;
1589}
1590
74816898 1591void
4a43e768 1592bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1593{
1594 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1595 && bfd_get_format (abfd) == bfd_object)
4a43e768 1596 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1597}
1598
252b5132
RH
1599/* Get the list of DT_NEEDED entries for a link. This is a hook for
1600 the linker ELF emulation code. */
1601
1602struct bfd_link_needed_list *
217aa764
AM
1603bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1604 struct bfd_link_info *info)
252b5132 1605{
0eddce27 1606 if (! is_elf_hash_table (info->hash))
252b5132
RH
1607 return NULL;
1608 return elf_hash_table (info)->needed;
1609}
1610
a963dc6a
L
1611/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1612 hook for the linker ELF emulation code. */
1613
1614struct bfd_link_needed_list *
217aa764
AM
1615bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1616 struct bfd_link_info *info)
a963dc6a 1617{
0eddce27 1618 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1619 return NULL;
1620 return elf_hash_table (info)->runpath;
1621}
1622
252b5132
RH
1623/* Get the name actually used for a dynamic object for a link. This
1624 is the SONAME entry if there is one. Otherwise, it is the string
1625 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1626
1627const char *
217aa764 1628bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1629{
1630 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1631 && bfd_get_format (abfd) == bfd_object)
1632 return elf_dt_name (abfd);
1633 return NULL;
1634}
1635
1636/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1637 the ELF linker emulation code. */
1638
b34976b6 1639bfd_boolean
217aa764
AM
1640bfd_elf_get_bfd_needed_list (bfd *abfd,
1641 struct bfd_link_needed_list **pneeded)
252b5132
RH
1642{
1643 asection *s;
1644 bfd_byte *dynbuf = NULL;
1645 int elfsec;
dc810e39 1646 unsigned long shlink;
252b5132
RH
1647 bfd_byte *extdyn, *extdynend;
1648 size_t extdynsize;
217aa764 1649 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1650
1651 *pneeded = NULL;
1652
1653 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1654 || bfd_get_format (abfd) != bfd_object)
b34976b6 1655 return TRUE;
252b5132
RH
1656
1657 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1658 if (s == NULL || s->size == 0)
b34976b6 1659 return TRUE;
252b5132 1660
eea6121a 1661 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1662 goto error_return;
1663
1664 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1665 if (elfsec == -1)
1666 goto error_return;
1667
dc810e39 1668 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1669
1670 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1671 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1672
1673 extdyn = dynbuf;
eea6121a 1674 extdynend = extdyn + s->size;
252b5132
RH
1675 for (; extdyn < extdynend; extdyn += extdynsize)
1676 {
1677 Elf_Internal_Dyn dyn;
1678
217aa764 1679 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1680
1681 if (dyn.d_tag == DT_NULL)
1682 break;
1683
1684 if (dyn.d_tag == DT_NEEDED)
1685 {
1686 const char *string;
1687 struct bfd_link_needed_list *l;
dc810e39
AM
1688 unsigned int tagv = dyn.d_un.d_val;
1689 bfd_size_type amt;
252b5132 1690
dc810e39 1691 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1692 if (string == NULL)
1693 goto error_return;
1694
dc810e39 1695 amt = sizeof *l;
217aa764 1696 l = bfd_alloc (abfd, amt);
252b5132
RH
1697 if (l == NULL)
1698 goto error_return;
1699
1700 l->by = abfd;
1701 l->name = string;
1702 l->next = *pneeded;
1703 *pneeded = l;
1704 }
1705 }
1706
1707 free (dynbuf);
1708
b34976b6 1709 return TRUE;
252b5132
RH
1710
1711 error_return:
1712 if (dynbuf != NULL)
1713 free (dynbuf);
b34976b6 1714 return FALSE;
252b5132
RH
1715}
1716\f
1717/* Allocate an ELF string table--force the first byte to be zero. */
1718
1719struct bfd_strtab_hash *
217aa764 1720_bfd_elf_stringtab_init (void)
252b5132
RH
1721{
1722 struct bfd_strtab_hash *ret;
1723
1724 ret = _bfd_stringtab_init ();
1725 if (ret != NULL)
1726 {
1727 bfd_size_type loc;
1728
b34976b6 1729 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1730 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1731 if (loc == (bfd_size_type) -1)
1732 {
1733 _bfd_stringtab_free (ret);
1734 ret = NULL;
1735 }
1736 }
1737 return ret;
1738}
1739\f
1740/* ELF .o/exec file reading */
1741
c044fabd 1742/* Create a new bfd section from an ELF section header. */
252b5132 1743
b34976b6 1744bfd_boolean
217aa764 1745bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1746{
1747 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1748 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1749 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1750 const char *name;
252b5132 1751
1b3a8575
AM
1752 name = bfd_elf_string_from_elf_section (abfd,
1753 elf_elfheader (abfd)->e_shstrndx,
1754 hdr->sh_name);
252b5132
RH
1755
1756 switch (hdr->sh_type)
1757 {
1758 case SHT_NULL:
1759 /* Inactive section. Throw it away. */
b34976b6 1760 return TRUE;
252b5132
RH
1761
1762 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1763 case SHT_NOBITS: /* .bss section. */
1764 case SHT_HASH: /* .hash section. */
1765 case SHT_NOTE: /* .note section. */
25e27870
L
1766 case SHT_INIT_ARRAY: /* .init_array section. */
1767 case SHT_FINI_ARRAY: /* .fini_array section. */
1768 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1769 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1770 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1771
797fc050 1772 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1773 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1774 return FALSE;
8e0ed13f
NC
1775 if (hdr->sh_link > elf_numsections (abfd)
1776 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1777 return FALSE;
797fc050
AM
1778 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1779 {
1780 Elf_Internal_Shdr *dynsymhdr;
1781
1782 /* The shared libraries distributed with hpux11 have a bogus
1783 sh_link field for the ".dynamic" section. Find the
1784 string table for the ".dynsym" section instead. */
1785 if (elf_dynsymtab (abfd) != 0)
1786 {
1787 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1788 hdr->sh_link = dynsymhdr->sh_link;
1789 }
1790 else
1791 {
1792 unsigned int i, num_sec;
1793
1794 num_sec = elf_numsections (abfd);
1795 for (i = 1; i < num_sec; i++)
1796 {
1797 dynsymhdr = elf_elfsections (abfd)[i];
1798 if (dynsymhdr->sh_type == SHT_DYNSYM)
1799 {
1800 hdr->sh_link = dynsymhdr->sh_link;
1801 break;
1802 }
1803 }
1804 }
1805 }
1806 break;
1807
252b5132
RH
1808 case SHT_SYMTAB: /* A symbol table */
1809 if (elf_onesymtab (abfd) == shindex)
b34976b6 1810 return TRUE;
252b5132
RH
1811
1812 BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym);
1813 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1814 elf_onesymtab (abfd) = shindex;
1815 elf_tdata (abfd)->symtab_hdr = *hdr;
1816 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1817 abfd->flags |= HAS_SYMS;
1818
1819 /* Sometimes a shared object will map in the symbol table. If
1820 SHF_ALLOC is set, and this is a shared object, then we also
1821 treat this section as a BFD section. We can not base the
1822 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1823 set in a relocatable object file, which would confuse the
252b5132
RH
1824 linker. */
1825 if ((hdr->sh_flags & SHF_ALLOC) != 0
1826 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1827 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1828 shindex))
b34976b6 1829 return FALSE;
252b5132 1830
1b3a8575
AM
1831 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1832 can't read symbols without that section loaded as well. It
1833 is most likely specified by the next section header. */
1834 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1835 {
1836 unsigned int i, num_sec;
1837
1838 num_sec = elf_numsections (abfd);
1839 for (i = shindex + 1; i < num_sec; i++)
1840 {
1841 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1842 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1843 && hdr2->sh_link == shindex)
1844 break;
1845 }
1846 if (i == num_sec)
1847 for (i = 1; i < shindex; i++)
1848 {
1849 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1850 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1851 && hdr2->sh_link == shindex)
1852 break;
1853 }
1854 if (i != shindex)
1855 return bfd_section_from_shdr (abfd, i);
1856 }
b34976b6 1857 return TRUE;
252b5132
RH
1858
1859 case SHT_DYNSYM: /* A dynamic symbol table */
1860 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1861 return TRUE;
252b5132
RH
1862
1863 BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym);
1864 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1865 elf_dynsymtab (abfd) = shindex;
1866 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1867 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1868 abfd->flags |= HAS_SYMS;
1869
1870 /* Besides being a symbol table, we also treat this as a regular
1871 section, so that objcopy can handle it. */
6dc132d9 1872 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1873
9ad5cbcf
AM
1874 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1875 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1876 return TRUE;
9ad5cbcf 1877
1b3a8575 1878 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1879 elf_symtab_shndx (abfd) = shindex;
1880 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1881 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1882 return TRUE;
9ad5cbcf 1883
252b5132
RH
1884 case SHT_STRTAB: /* A string table */
1885 if (hdr->bfd_section != NULL)
b34976b6 1886 return TRUE;
252b5132
RH
1887 if (ehdr->e_shstrndx == shindex)
1888 {
1889 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1890 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1891 return TRUE;
252b5132 1892 }
1b3a8575
AM
1893 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1894 {
1895 symtab_strtab:
1896 elf_tdata (abfd)->strtab_hdr = *hdr;
1897 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1898 return TRUE;
1899 }
1900 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1901 {
1902 dynsymtab_strtab:
1903 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1904 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1905 elf_elfsections (abfd)[shindex] = hdr;
1906 /* We also treat this as a regular section, so that objcopy
1907 can handle it. */
6dc132d9
L
1908 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1909 shindex);
1b3a8575 1910 }
252b5132 1911
1b3a8575
AM
1912 /* If the string table isn't one of the above, then treat it as a
1913 regular section. We need to scan all the headers to be sure,
1914 just in case this strtab section appeared before the above. */
1915 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1916 {
1917 unsigned int i, num_sec;
252b5132 1918
1b3a8575
AM
1919 num_sec = elf_numsections (abfd);
1920 for (i = 1; i < num_sec; i++)
1921 {
1922 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1923 if (hdr2->sh_link == shindex)
1924 {
1925 if (! bfd_section_from_shdr (abfd, i))
1926 return FALSE;
1927 if (elf_onesymtab (abfd) == i)
1928 goto symtab_strtab;
1929 if (elf_dynsymtab (abfd) == i)
1930 goto dynsymtab_strtab;
1931 }
1932 }
1933 }
6dc132d9 1934 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1935
1936 case SHT_REL:
1937 case SHT_RELA:
1938 /* *These* do a lot of work -- but build no sections! */
1939 {
1940 asection *target_sect;
1941 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1942 unsigned int num_sec = elf_numsections (abfd);
252b5132 1943
03ae5f59 1944 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1945 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1946 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1947 {
1948 ((*_bfd_error_handler)
d003868e
AM
1949 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1950 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1951 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1952 shindex);
03ae5f59
ILT
1953 }
1954
252b5132
RH
1955 /* For some incomprehensible reason Oracle distributes
1956 libraries for Solaris in which some of the objects have
1957 bogus sh_link fields. It would be nice if we could just
1958 reject them, but, unfortunately, some people need to use
1959 them. We scan through the section headers; if we find only
1960 one suitable symbol table, we clobber the sh_link to point
1961 to it. I hope this doesn't break anything. */
1962 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1963 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1964 {
9ad5cbcf 1965 unsigned int scan;
252b5132
RH
1966 int found;
1967
1968 found = 0;
9ad5cbcf 1969 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1970 {
1971 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1972 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1973 {
1974 if (found != 0)
1975 {
1976 found = 0;
1977 break;
1978 }
1979 found = scan;
1980 }
1981 }
1982 if (found != 0)
1983 hdr->sh_link = found;
1984 }
1985
1986 /* Get the symbol table. */
1b3a8575
AM
1987 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1988 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1989 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1990 return FALSE;
252b5132
RH
1991
1992 /* If this reloc section does not use the main symbol table we
1993 don't treat it as a reloc section. BFD can't adequately
1994 represent such a section, so at least for now, we don't
c044fabd 1995 try. We just present it as a normal section. We also
60bcf0fa 1996 can't use it as a reloc section if it points to the null
c044fabd 1997 section. */
60bcf0fa 1998 if (hdr->sh_link != elf_onesymtab (abfd) || hdr->sh_info == SHN_UNDEF)
6dc132d9
L
1999 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2000 shindex);
252b5132
RH
2001
2002 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2003 return FALSE;
252b5132
RH
2004 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2005 if (target_sect == NULL)
b34976b6 2006 return FALSE;
252b5132
RH
2007
2008 if ((target_sect->flags & SEC_RELOC) == 0
2009 || target_sect->reloc_count == 0)
2010 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2011 else
2012 {
dc810e39 2013 bfd_size_type amt;
252b5132 2014 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2015 amt = sizeof (*hdr2);
217aa764 2016 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2017 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2018 }
2019 *hdr2 = *hdr;
2020 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2021 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2022 target_sect->flags |= SEC_RELOC;
2023 target_sect->relocation = NULL;
2024 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2025 /* In the section to which the relocations apply, mark whether
2026 its relocations are of the REL or RELA variety. */
72730e0c 2027 if (hdr->sh_size != 0)
68bfbfcc 2028 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2029 abfd->flags |= HAS_RELOC;
b34976b6 2030 return TRUE;
252b5132
RH
2031 }
2032 break;
2033
2034 case SHT_GNU_verdef:
2035 elf_dynverdef (abfd) = shindex;
2036 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2037 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2038 break;
2039
2040 case SHT_GNU_versym:
2041 elf_dynversym (abfd) = shindex;
2042 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2043 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2044 break;
2045
2046 case SHT_GNU_verneed:
2047 elf_dynverref (abfd) = shindex;
2048 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2049 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2050 break;
2051
2052 case SHT_SHLIB:
b34976b6 2053 return TRUE;
252b5132 2054
dbb410c3 2055 case SHT_GROUP:
b885599b
AM
2056 /* We need a BFD section for objcopy and relocatable linking,
2057 and it's handy to have the signature available as the section
2058 name. */
2059 name = group_signature (abfd, hdr);
2060 if (name == NULL)
b34976b6 2061 return FALSE;
6dc132d9 2062 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2063 return FALSE;
dbb410c3
AM
2064 if (hdr->contents != NULL)
2065 {
2066 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2067 unsigned int n_elt = hdr->sh_size / 4;
2068 asection *s;
2069
b885599b
AM
2070 if (idx->flags & GRP_COMDAT)
2071 hdr->bfd_section->flags
2072 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2073
45c5e9ed
L
2074 /* We try to keep the same section order as it comes in. */
2075 idx += n_elt;
dbb410c3 2076 while (--n_elt != 0)
45c5e9ed 2077 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2078 && elf_next_in_group (s) != NULL)
dbb410c3 2079 {
945906ff 2080 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2081 break;
2082 }
2083 }
2084 break;
2085
252b5132
RH
2086 default:
2087 /* Check for any processor-specific section types. */
6dc132d9
L
2088 return bed->elf_backend_section_from_shdr (abfd, hdr, name,
2089 shindex);
252b5132
RH
2090 }
2091
b34976b6 2092 return TRUE;
252b5132
RH
2093}
2094
ec338859
AM
2095/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2096 Return SEC for sections that have no elf section, and NULL on error. */
2097
2098asection *
217aa764
AM
2099bfd_section_from_r_symndx (bfd *abfd,
2100 struct sym_sec_cache *cache,
2101 asection *sec,
2102 unsigned long r_symndx)
ec338859 2103{
ec338859 2104 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2105 unsigned char esym[sizeof (Elf64_External_Sym)];
2106 Elf_External_Sym_Shndx eshndx;
2107 Elf_Internal_Sym isym;
ec338859
AM
2108 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2109
2110 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2111 return cache->sec[ent];
2112
2113 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2114 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2115 &isym, esym, &eshndx) == NULL)
ec338859 2116 return NULL;
9ad5cbcf 2117
ec338859
AM
2118 if (cache->abfd != abfd)
2119 {
2120 memset (cache->indx, -1, sizeof (cache->indx));
2121 cache->abfd = abfd;
2122 }
2123 cache->indx[ent] = r_symndx;
2124 cache->sec[ent] = sec;
50bc7936
AM
2125 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2126 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2127 {
2128 asection *s;
6cdc0ccc 2129 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2130 if (s != NULL)
2131 cache->sec[ent] = s;
2132 }
2133 return cache->sec[ent];
2134}
2135
252b5132
RH
2136/* Given an ELF section number, retrieve the corresponding BFD
2137 section. */
2138
2139asection *
217aa764 2140bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2141{
9ad5cbcf 2142 if (index >= elf_numsections (abfd))
252b5132
RH
2143 return NULL;
2144 return elf_elfsections (abfd)[index]->bfd_section;
2145}
2146
7f4d3958 2147static struct bfd_elf_special_section const special_sections_b[] =
2f89ff8d 2148{
7dcb9820 2149 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7f4d3958
L
2150 { NULL, 0, 0, 0, 0 }
2151};
2152
2153static struct bfd_elf_special_section const special_sections_c[] =
2154{
7dcb9820 2155 { ".comment", 8, 0, SHT_PROGBITS, 0 },
7f4d3958
L
2156 { NULL, 0, 0, 0, 0 }
2157};
2158
2159static struct bfd_elf_special_section const special_sections_d[] =
2160{
7dcb9820
AM
2161 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2162 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2163 { ".debug", 6, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2164 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2165 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2166 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2167 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2168 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2169 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2170 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
7f4d3958
L
2171 { NULL, 0, 0, 0, 0 }
2172};
2173
2174static struct bfd_elf_special_section const special_sections_f[] =
2175{
2176 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2177 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2178 { NULL, 0, 0, 0, 0 }
2179};
2180
2181static struct bfd_elf_special_section const special_sections_g[] =
2182{
2183 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820 2184 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2185 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2186 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2187 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
7f4d3958
L
2188 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2189 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
2190 { NULL, 0, 0, 0, 0 }
2191};
2192
2193static struct bfd_elf_special_section const special_sections_h[] =
2194{
2195 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2196 { NULL, 0, 0, 0, 0 }
2197};
2198
2199static struct bfd_elf_special_section const special_sections_i[] =
2200{
2201 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2202 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2203 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2204 { NULL, 0, 0, 0, 0 }
2205};
2206
2207static struct bfd_elf_special_section const special_sections_l[] =
2208{
2209 { ".line", 5, 0, SHT_PROGBITS, 0 },
2210 { NULL, 0, 0, 0, 0 }
2211};
2212
2213static struct bfd_elf_special_section const special_sections_n[] =
2214{
45c5e9ed 2215 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820 2216 { ".note", 5, -1, SHT_NOTE, 0 },
7f4d3958
L
2217 { NULL, 0, 0, 0, 0 }
2218};
2219
2220static struct bfd_elf_special_section const special_sections_p[] =
2221{
2222 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2223 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2224 { NULL, 0, 0, 0, 0 }
2225};
2226
2227static struct bfd_elf_special_section const special_sections_r[] =
2228{
2229 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2230 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
7dcb9820
AM
2231 { ".rela", 5, -1, SHT_RELA, 0 },
2232 { ".rel", 4, -1, SHT_REL, 0 },
7f4d3958
L
2233 { NULL, 0, 0, 0, 0 }
2234};
2235
2236static struct bfd_elf_special_section const special_sections_s[] =
2237{
2238 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2239 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2240 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
7dcb9820
AM
2241 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2242 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2243};
2244
7f4d3958
L
2245static struct bfd_elf_special_section const special_sections_t[] =
2246{
2247 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2248 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2249 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2250 { NULL, 0, 0, 0, 0 }
2251};
2252
2253static struct bfd_elf_special_section const *special_sections [27] =
2254{
2255 NULL, /* 'a' */
2256 special_sections_b, /* 'b' */
2257 special_sections_c, /* 'b' */
2258 special_sections_d, /* 'd' */
2259 NULL, /* 'e' */
2260 special_sections_f, /* 'f' */
2261 special_sections_g, /* 'g' */
2262 special_sections_h, /* 'h' */
2263 special_sections_i, /* 'i' */
2264 NULL, /* 'j' */
2265 NULL, /* 'k' */
2266 special_sections_l, /* 'l' */
2267 NULL, /* 'm' */
2268 special_sections_n, /* 'n' */
2269 NULL, /* 'o' */
2270 special_sections_p, /* 'p' */
2271 NULL, /* 'q' */
2272 special_sections_r, /* 'r' */
2273 special_sections_s, /* 's' */
2274 special_sections_t, /* 't' */
2275 NULL, /* 'u' */
2276 NULL, /* 'v' */
2277 NULL, /* 'w' */
2278 NULL, /* 'x' */
2279 NULL, /* 'y' */
2280 NULL, /* 'z' */
2281 NULL /* other */
2282};
2283
2f89ff8d
L
2284static const struct bfd_elf_special_section *
2285get_special_section (const char *name,
7f4d3958 2286 const struct bfd_elf_special_section **special_sections_p,
2f89ff8d
L
2287 unsigned int rela)
2288{
2289 int i;
7f4d3958
L
2290 int len;
2291 const struct bfd_elf_special_section *special_sections;
2292
2293 if (name [0] == '.')
2294 {
2295 i = name [1] - 'a';
2296 if (i < 0 || i > 25)
2297 i = 26;
2298 }
2299 else
2300 i = 26;
2301
2302 special_sections = special_sections_p [i];
2303
2304 if (!special_sections)
2305 return special_sections;
2306
2307 len= strlen (name);
2f89ff8d
L
2308
2309 for (i = 0; special_sections[i].prefix != NULL; i++)
7dcb9820
AM
2310 {
2311 int suffix_len;
2312 int prefix_len = special_sections[i].prefix_length;
2313
2314 if (len < prefix_len)
2315 continue;
2316 if (memcmp (name, special_sections[i].prefix, prefix_len) != 0)
2317 continue;
2318
2319 suffix_len = special_sections[i].suffix_length;
2320 if (suffix_len <= 0)
2321 {
2322 if (name[prefix_len] != 0)
2323 {
2324 if (suffix_len == 0)
2325 continue;
2326 if (name[prefix_len] != '.'
2327 && (suffix_len == -2
2328 || (rela && special_sections[i].type == SHT_REL)))
2329 continue;
2330 }
2331 }
2332 else
2333 {
2334 if (len < prefix_len + suffix_len)
2335 continue;
2336 if (memcmp (name + len - suffix_len,
2337 special_sections[i].prefix + prefix_len,
2338 suffix_len) != 0)
2339 continue;
2340 }
2f89ff8d 2341 return &special_sections[i];
7dcb9820 2342 }
2f89ff8d
L
2343
2344 return NULL;
2345}
2346
7dcb9820
AM
2347const struct bfd_elf_special_section *
2348_bfd_elf_get_sec_type_attr (bfd *abfd, const char *name)
2f89ff8d 2349{
9c5bfbb7 2350 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7dcb9820 2351 const struct bfd_elf_special_section *ssect = NULL;
2f89ff8d
L
2352
2353 /* See if this is one of the special sections. */
2354 if (name)
2355 {
9c5bfbb7 2356 unsigned int rela = bed->default_use_rela_p;
2f89ff8d
L
2357
2358 if (bed->special_sections)
2359 ssect = get_special_section (name, bed->special_sections, rela);
2360
2361 if (! ssect)
2362 ssect = get_special_section (name, special_sections, rela);
2f89ff8d
L
2363 }
2364
7dcb9820 2365 return ssect;
2f89ff8d
L
2366}
2367
b34976b6 2368bfd_boolean
217aa764 2369_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2370{
2371 struct bfd_elf_section_data *sdata;
7dcb9820 2372 const struct bfd_elf_special_section *ssect;
252b5132 2373
f0abc2a1
AM
2374 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2375 if (sdata == NULL)
2376 {
217aa764 2377 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2378 if (sdata == NULL)
2379 return FALSE;
217aa764 2380 sec->used_by_bfd = sdata;
f0abc2a1 2381 }
bf572ba0 2382
3496cb2a
L
2383 /* When we read a file, we don't need section type and flags unless
2384 it is a linker created section. They will be overridden in
2385 _bfd_elf_make_section_from_shdr anyway. */
2386 if (abfd->direction != read_direction
2387 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2388 {
a31501e9
L
2389 ssect = _bfd_elf_get_sec_type_attr (abfd, sec->name);
2390 if (ssect != NULL)
2391 {
2392 elf_section_type (sec) = ssect->type;
2393 elf_section_flags (sec) = ssect->attr;
2394 }
2f89ff8d
L
2395 }
2396
bf572ba0 2397 /* Indicate whether or not this section should use RELA relocations. */
68bfbfcc 2398 sec->use_rela_p = get_elf_backend_data (abfd)->default_use_rela_p;
bf572ba0 2399
b34976b6 2400 return TRUE;
252b5132
RH
2401}
2402
2403/* Create a new bfd section from an ELF program header.
2404
2405 Since program segments have no names, we generate a synthetic name
2406 of the form segment<NUM>, where NUM is generally the index in the
2407 program header table. For segments that are split (see below) we
2408 generate the names segment<NUM>a and segment<NUM>b.
2409
2410 Note that some program segments may have a file size that is different than
2411 (less than) the memory size. All this means is that at execution the
2412 system must allocate the amount of memory specified by the memory size,
2413 but only initialize it with the first "file size" bytes read from the
2414 file. This would occur for example, with program segments consisting
2415 of combined data+bss.
2416
2417 To handle the above situation, this routine generates TWO bfd sections
2418 for the single program segment. The first has the length specified by
2419 the file size of the segment, and the second has the length specified
2420 by the difference between the two sizes. In effect, the segment is split
2421 into it's initialized and uninitialized parts.
2422
2423 */
2424
b34976b6 2425bfd_boolean
217aa764
AM
2426_bfd_elf_make_section_from_phdr (bfd *abfd,
2427 Elf_Internal_Phdr *hdr,
2428 int index,
2429 const char *typename)
252b5132
RH
2430{
2431 asection *newsect;
2432 char *name;
2433 char namebuf[64];
d4c88bbb 2434 size_t len;
252b5132
RH
2435 int split;
2436
2437 split = ((hdr->p_memsz > 0)
2438 && (hdr->p_filesz > 0)
2439 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2440 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2441 len = strlen (namebuf) + 1;
217aa764 2442 name = bfd_alloc (abfd, len);
252b5132 2443 if (!name)
b34976b6 2444 return FALSE;
d4c88bbb 2445 memcpy (name, namebuf, len);
252b5132
RH
2446 newsect = bfd_make_section (abfd, name);
2447 if (newsect == NULL)
b34976b6 2448 return FALSE;
252b5132
RH
2449 newsect->vma = hdr->p_vaddr;
2450 newsect->lma = hdr->p_paddr;
eea6121a 2451 newsect->size = hdr->p_filesz;
252b5132
RH
2452 newsect->filepos = hdr->p_offset;
2453 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2454 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2455 if (hdr->p_type == PT_LOAD)
2456 {
2457 newsect->flags |= SEC_ALLOC;
2458 newsect->flags |= SEC_LOAD;
2459 if (hdr->p_flags & PF_X)
2460 {
2461 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2462 may be data. */
252b5132
RH
2463 newsect->flags |= SEC_CODE;
2464 }
2465 }
2466 if (!(hdr->p_flags & PF_W))
2467 {
2468 newsect->flags |= SEC_READONLY;
2469 }
2470
2471 if (split)
2472 {
27ac83bf 2473 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2474 len = strlen (namebuf) + 1;
217aa764 2475 name = bfd_alloc (abfd, len);
252b5132 2476 if (!name)
b34976b6 2477 return FALSE;
d4c88bbb 2478 memcpy (name, namebuf, len);
252b5132
RH
2479 newsect = bfd_make_section (abfd, name);
2480 if (newsect == NULL)
b34976b6 2481 return FALSE;
252b5132
RH
2482 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2483 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2484 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2485 if (hdr->p_type == PT_LOAD)
2486 {
2487 newsect->flags |= SEC_ALLOC;
2488 if (hdr->p_flags & PF_X)
2489 newsect->flags |= SEC_CODE;
2490 }
2491 if (!(hdr->p_flags & PF_W))
2492 newsect->flags |= SEC_READONLY;
2493 }
2494
b34976b6 2495 return TRUE;
252b5132
RH
2496}
2497
b34976b6 2498bfd_boolean
217aa764 2499bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2500{
9c5bfbb7 2501 const struct elf_backend_data *bed;
20cfcaae
NC
2502
2503 switch (hdr->p_type)
2504 {
2505 case PT_NULL:
2506 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2507
2508 case PT_LOAD:
2509 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2510
2511 case PT_DYNAMIC:
2512 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2513
2514 case PT_INTERP:
2515 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2516
2517 case PT_NOTE:
2518 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2519 return FALSE;
217aa764 2520 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2521 return FALSE;
2522 return TRUE;
20cfcaae
NC
2523
2524 case PT_SHLIB:
2525 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2526
2527 case PT_PHDR:
2528 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2529
811072d8
RM
2530 case PT_GNU_EH_FRAME:
2531 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2532 "eh_frame_hdr");
2533
9ee5e499
JJ
2534 case PT_GNU_STACK:
2535 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2536
8c37241b
JJ
2537 case PT_GNU_RELRO:
2538 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2539
20cfcaae 2540 default:
8c1acd09 2541 /* Check for any processor-specific program segment types. */
20cfcaae 2542 bed = get_elf_backend_data (abfd);
d27f5fa1 2543 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2544 }
2545}
2546
23bc299b 2547/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2548 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2549 relocations; otherwise, we use REL relocations. */
2550
b34976b6 2551bfd_boolean
217aa764
AM
2552_bfd_elf_init_reloc_shdr (bfd *abfd,
2553 Elf_Internal_Shdr *rel_hdr,
2554 asection *asect,
2555 bfd_boolean use_rela_p)
23bc299b
MM
2556{
2557 char *name;
9c5bfbb7 2558 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2559 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2560
dc810e39 2561 name = bfd_alloc (abfd, amt);
23bc299b 2562 if (name == NULL)
b34976b6 2563 return FALSE;
23bc299b
MM
2564 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2565 rel_hdr->sh_name =
2b0f7ef9 2566 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2567 FALSE);
23bc299b 2568 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2569 return FALSE;
23bc299b
MM
2570 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2571 rel_hdr->sh_entsize = (use_rela_p
2572 ? bed->s->sizeof_rela
2573 : bed->s->sizeof_rel);
45d6a902 2574 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2575 rel_hdr->sh_flags = 0;
2576 rel_hdr->sh_addr = 0;
2577 rel_hdr->sh_size = 0;
2578 rel_hdr->sh_offset = 0;
2579
b34976b6 2580 return TRUE;
23bc299b
MM
2581}
2582
252b5132
RH
2583/* Set up an ELF internal section header for a section. */
2584
252b5132 2585static void
217aa764 2586elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2587{
9c5bfbb7 2588 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2589 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2590 Elf_Internal_Shdr *this_hdr;
2591
2592 if (*failedptr)
2593 {
2594 /* We already failed; just get out of the bfd_map_over_sections
2595 loop. */
2596 return;
2597 }
2598
2599 this_hdr = &elf_section_data (asect)->this_hdr;
2600
e57b5356
AM
2601 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2602 asect->name, FALSE);
2603 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2604 {
b34976b6 2605 *failedptr = TRUE;
252b5132
RH
2606 return;
2607 }
2608
2609 this_hdr->sh_flags = 0;
2610
2611 if ((asect->flags & SEC_ALLOC) != 0
2612 || asect->user_set_vma)
2613 this_hdr->sh_addr = asect->vma;
2614 else
2615 this_hdr->sh_addr = 0;
2616
2617 this_hdr->sh_offset = 0;
eea6121a 2618 this_hdr->sh_size = asect->size;
252b5132
RH
2619 this_hdr->sh_link = 0;
2620 this_hdr->sh_addralign = 1 << asect->alignment_power;
2621 /* The sh_entsize and sh_info fields may have been set already by
2622 copy_private_section_data. */
2623
2624 this_hdr->bfd_section = asect;
2625 this_hdr->contents = NULL;
2626
3cddba1e
L
2627 /* If the section type is unspecified, we set it based on
2628 asect->flags. */
2629 if (this_hdr->sh_type == SHT_NULL)
2630 {
45c5e9ed
L
2631 if ((asect->flags & SEC_GROUP) != 0)
2632 {
2633 /* We also need to mark SHF_GROUP here for relocatable
2634 link. */
2635 struct bfd_link_order *l;
2636 asection *elt;
2637
8423293d 2638 for (l = asect->map_head.link_order; l != NULL; l = l->next)
45c5e9ed
L
2639 if (l->type == bfd_indirect_link_order
2640 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
2641 do
2642 {
2643 /* The name is not important. Anything will do. */
2644 elf_group_name (elt->output_section) = "G";
2645 elf_section_flags (elt->output_section) |= SHF_GROUP;
2646
2647 elt = elf_next_in_group (elt);
2648 /* During a relocatable link, the lists are
2649 circular. */
2650 }
2651 while (elt != elf_next_in_group (l->u.indirect.section));
2652
2653 this_hdr->sh_type = SHT_GROUP;
2654 }
2655 else if ((asect->flags & SEC_ALLOC) != 0
3cddba1e
L
2656 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2657 || (asect->flags & SEC_NEVER_LOAD) != 0))
2658 this_hdr->sh_type = SHT_NOBITS;
2659 else
2660 this_hdr->sh_type = SHT_PROGBITS;
2661 }
2662
2f89ff8d 2663 switch (this_hdr->sh_type)
252b5132 2664 {
2f89ff8d 2665 default:
2f89ff8d
L
2666 break;
2667
2668 case SHT_STRTAB:
2669 case SHT_INIT_ARRAY:
2670 case SHT_FINI_ARRAY:
2671 case SHT_PREINIT_ARRAY:
2672 case SHT_NOTE:
2673 case SHT_NOBITS:
2674 case SHT_PROGBITS:
2675 break;
2676
2677 case SHT_HASH:
c7ac6ff8 2678 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2679 break;
5de3bf90 2680
2f89ff8d 2681 case SHT_DYNSYM:
252b5132 2682 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2683 break;
2684
2685 case SHT_DYNAMIC:
252b5132 2686 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2687 break;
2688
2689 case SHT_RELA:
2690 if (get_elf_backend_data (abfd)->may_use_rela_p)
2691 this_hdr->sh_entsize = bed->s->sizeof_rela;
2692 break;
2693
2694 case SHT_REL:
2695 if (get_elf_backend_data (abfd)->may_use_rel_p)
2696 this_hdr->sh_entsize = bed->s->sizeof_rel;
2697 break;
2698
2699 case SHT_GNU_versym:
252b5132 2700 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2701 break;
2702
2703 case SHT_GNU_verdef:
252b5132
RH
2704 this_hdr->sh_entsize = 0;
2705 /* objcopy or strip will copy over sh_info, but may not set
2706 cverdefs. The linker will set cverdefs, but sh_info will be
2707 zero. */
2708 if (this_hdr->sh_info == 0)
2709 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2710 else
2711 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2712 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2713 break;
2714
2715 case SHT_GNU_verneed:
252b5132
RH
2716 this_hdr->sh_entsize = 0;
2717 /* objcopy or strip will copy over sh_info, but may not set
2718 cverrefs. The linker will set cverrefs, but sh_info will be
2719 zero. */
2720 if (this_hdr->sh_info == 0)
2721 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2722 else
2723 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2724 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2725 break;
2726
2727 case SHT_GROUP:
dbb410c3 2728 this_hdr->sh_entsize = 4;
2f89ff8d 2729 break;
dbb410c3 2730 }
252b5132
RH
2731
2732 if ((asect->flags & SEC_ALLOC) != 0)
2733 this_hdr->sh_flags |= SHF_ALLOC;
2734 if ((asect->flags & SEC_READONLY) == 0)
2735 this_hdr->sh_flags |= SHF_WRITE;
2736 if ((asect->flags & SEC_CODE) != 0)
2737 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2738 if ((asect->flags & SEC_MERGE) != 0)
2739 {
2740 this_hdr->sh_flags |= SHF_MERGE;
2741 this_hdr->sh_entsize = asect->entsize;
2742 if ((asect->flags & SEC_STRINGS) != 0)
2743 this_hdr->sh_flags |= SHF_STRINGS;
2744 }
1126897b 2745 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2746 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2747 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2748 {
2749 this_hdr->sh_flags |= SHF_TLS;
eea6121a 2750 if (asect->size == 0 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60
JJ
2751 {
2752 struct bfd_link_order *o;
b34976b6 2753
704afa60 2754 this_hdr->sh_size = 0;
8423293d 2755 for (o = asect->map_head.link_order; o != NULL; o = o->next)
704afa60
JJ
2756 if (this_hdr->sh_size < o->offset + o->size)
2757 this_hdr->sh_size = o->offset + o->size;
2758 if (this_hdr->sh_size)
2759 this_hdr->sh_type = SHT_NOBITS;
2760 }
2761 }
252b5132
RH
2762
2763 /* Check for processor-specific section types. */
e1fddb6b
AO
2764 if (bed->elf_backend_fake_sections
2765 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2766 *failedptr = TRUE;
252b5132
RH
2767
2768 /* If the section has relocs, set up a section header for the
23bc299b
MM
2769 SHT_REL[A] section. If two relocation sections are required for
2770 this section, it is up to the processor-specific back-end to
c044fabd 2771 create the other. */
23bc299b 2772 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2773 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2774 &elf_section_data (asect)->rel_hdr,
c044fabd 2775 asect,
68bfbfcc 2776 asect->use_rela_p))
b34976b6 2777 *failedptr = TRUE;
252b5132
RH
2778}
2779
dbb410c3
AM
2780/* Fill in the contents of a SHT_GROUP section. */
2781
1126897b 2782void
217aa764 2783bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2784{
217aa764 2785 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2786 unsigned long symindx;
9dce4196 2787 asection *elt, *first;
dbb410c3
AM
2788 unsigned char *loc;
2789 struct bfd_link_order *l;
b34976b6 2790 bfd_boolean gas;
dbb410c3 2791
7e4111ad
L
2792 /* Ignore linker created group section. See elfNN_ia64_object_p in
2793 elfxx-ia64.c. */
2794 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2795 || *failedptr)
2796 return;
2797
1126897b
AM
2798 symindx = 0;
2799 if (elf_group_id (sec) != NULL)
2800 symindx = elf_group_id (sec)->udata.i;
2801
2802 if (symindx == 0)
2803 {
2804 /* If called from the assembler, swap_out_syms will have set up
2805 elf_section_syms; If called for "ld -r", use target_index. */
2806 if (elf_section_syms (abfd) != NULL)
2807 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2808 else
2809 symindx = sec->target_index;
2810 }
dbb410c3
AM
2811 elf_section_data (sec)->this_hdr.sh_info = symindx;
2812
1126897b 2813 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2814 gas = TRUE;
dbb410c3
AM
2815 if (sec->contents == NULL)
2816 {
b34976b6 2817 gas = FALSE;
eea6121a 2818 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2819
2820 /* Arrange for the section to be written out. */
2821 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2822 if (sec->contents == NULL)
2823 {
b34976b6 2824 *failedptr = TRUE;
dbb410c3
AM
2825 return;
2826 }
2827 }
2828
eea6121a 2829 loc = sec->contents + sec->size;
dbb410c3 2830
9dce4196
AM
2831 /* Get the pointer to the first section in the group that gas
2832 squirreled away here. objcopy arranges for this to be set to the
2833 start of the input section group. */
2834 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2835
2836 /* First element is a flag word. Rest of section is elf section
2837 indices for all the sections of the group. Write them backwards
2838 just to keep the group in the same order as given in .section
2839 directives, not that it matters. */
2840 while (elt != NULL)
2841 {
9dce4196
AM
2842 asection *s;
2843 unsigned int idx;
2844
dbb410c3 2845 loc -= 4;
9dce4196
AM
2846 s = elt;
2847 if (!gas)
2848 s = s->output_section;
2849 idx = 0;
2850 if (s != NULL)
2851 idx = elf_section_data (s)->this_idx;
2852 H_PUT_32 (abfd, idx, loc);
945906ff 2853 elt = elf_next_in_group (elt);
9dce4196
AM
2854 if (elt == first)
2855 break;
dbb410c3
AM
2856 }
2857
2858 /* If this is a relocatable link, then the above did nothing because
2859 SEC is the output section. Look through the input sections
2860 instead. */
8423293d 2861 for (l = sec->map_head.link_order; l != NULL; l = l->next)
dbb410c3 2862 if (l->type == bfd_indirect_link_order
945906ff 2863 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
dbb410c3
AM
2864 do
2865 {
2866 loc -= 4;
2867 H_PUT_32 (abfd,
2868 elf_section_data (elt->output_section)->this_idx, loc);
945906ff 2869 elt = elf_next_in_group (elt);
dbb410c3
AM
2870 /* During a relocatable link, the lists are circular. */
2871 }
945906ff 2872 while (elt != elf_next_in_group (l->u.indirect.section));
dbb410c3 2873
3d7f7666 2874 if ((loc -= 4) != sec->contents)
9dce4196 2875 abort ();
dbb410c3 2876
9dce4196 2877 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2878}
2879
252b5132
RH
2880/* Assign all ELF section numbers. The dummy first section is handled here
2881 too. The link/info pointers for the standard section types are filled
2882 in here too, while we're at it. */
2883
b34976b6 2884static bfd_boolean
da9f89d4 2885assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2886{
2887 struct elf_obj_tdata *t = elf_tdata (abfd);
2888 asection *sec;
2b0f7ef9 2889 unsigned int section_number, secn;
252b5132 2890 Elf_Internal_Shdr **i_shdrp;
dc810e39 2891 bfd_size_type amt;
47cc2cf5 2892 struct bfd_elf_section_data *d;
252b5132
RH
2893
2894 section_number = 1;
2895
2b0f7ef9
JJ
2896 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2897
da9f89d4
L
2898 /* SHT_GROUP sections are in relocatable files only. */
2899 if (link_info == NULL || link_info->relocatable)
252b5132 2900 {
da9f89d4 2901 /* Put SHT_GROUP sections first. */
04dd1667 2902 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2903 {
5daa8fe7 2904 d = elf_section_data (sec);
da9f89d4
L
2905
2906 if (d->this_hdr.sh_type == SHT_GROUP)
2907 {
5daa8fe7 2908 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2909 {
2910 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2911 bfd_section_list_remove (abfd, sec);
da9f89d4 2912 abfd->section_count--;
da9f89d4
L
2913 }
2914 else
2915 {
2916 if (section_number == SHN_LORESERVE)
2917 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2918 d->this_idx = section_number++;
2919 }
2920 }
47cc2cf5
PB
2921 }
2922 }
2923
2924 for (sec = abfd->sections; sec; sec = sec->next)
2925 {
2926 d = elf_section_data (sec);
2927
2928 if (d->this_hdr.sh_type != SHT_GROUP)
2929 {
2930 if (section_number == SHN_LORESERVE)
2931 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2932 d->this_idx = section_number++;
2933 }
2b0f7ef9 2934 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2935 if ((sec->flags & SEC_RELOC) == 0)
2936 d->rel_idx = 0;
2937 else
2b0f7ef9 2938 {
9ad5cbcf
AM
2939 if (section_number == SHN_LORESERVE)
2940 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2941 d->rel_idx = section_number++;
2942 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2943 }
23bc299b
MM
2944
2945 if (d->rel_hdr2)
2b0f7ef9 2946 {
9ad5cbcf
AM
2947 if (section_number == SHN_LORESERVE)
2948 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2949 d->rel_idx2 = section_number++;
2950 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2951 }
23bc299b
MM
2952 else
2953 d->rel_idx2 = 0;
252b5132
RH
2954 }
2955
9ad5cbcf
AM
2956 if (section_number == SHN_LORESERVE)
2957 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2958 t->shstrtab_section = section_number++;
2b0f7ef9 2959 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2960 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2961
2962 if (bfd_get_symcount (abfd) > 0)
2963 {
9ad5cbcf
AM
2964 if (section_number == SHN_LORESERVE)
2965 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2966 t->symtab_section = section_number++;
2b0f7ef9 2967 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2968 if (section_number > SHN_LORESERVE - 2)
2969 {
2970 if (section_number == SHN_LORESERVE)
2971 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2972 t->symtab_shndx_section = section_number++;
2973 t->symtab_shndx_hdr.sh_name
2974 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2975 ".symtab_shndx", FALSE);
9ad5cbcf 2976 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2977 return FALSE;
9ad5cbcf
AM
2978 }
2979 if (section_number == SHN_LORESERVE)
2980 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2981 t->strtab_section = section_number++;
2b0f7ef9 2982 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2983 }
2984
2b0f7ef9
JJ
2985 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2986 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2987
2988 elf_numsections (abfd) = section_number;
252b5132 2989 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
2990 if (section_number > SHN_LORESERVE)
2991 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
2992
2993 /* Set up the list of section header pointers, in agreement with the
2994 indices. */
dc810e39 2995 amt = section_number * sizeof (Elf_Internal_Shdr *);
217aa764 2996 i_shdrp = bfd_zalloc (abfd, amt);
252b5132 2997 if (i_shdrp == NULL)
b34976b6 2998 return FALSE;
252b5132 2999
dc810e39 3000 amt = sizeof (Elf_Internal_Shdr);
217aa764 3001 i_shdrp[0] = bfd_zalloc (abfd, amt);
252b5132
RH
3002 if (i_shdrp[0] == NULL)
3003 {
3004 bfd_release (abfd, i_shdrp);
b34976b6 3005 return FALSE;
252b5132 3006 }
252b5132
RH
3007
3008 elf_elfsections (abfd) = i_shdrp;
3009
3010 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3011 if (bfd_get_symcount (abfd) > 0)
3012 {
3013 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3014 if (elf_numsections (abfd) > SHN_LORESERVE)
3015 {
3016 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3017 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3018 }
252b5132
RH
3019 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3020 t->symtab_hdr.sh_link = t->strtab_section;
3021 }
38ce5b11 3022
252b5132
RH
3023 for (sec = abfd->sections; sec; sec = sec->next)
3024 {
3025 struct bfd_elf_section_data *d = elf_section_data (sec);
3026 asection *s;
3027 const char *name;
3028
3029 i_shdrp[d->this_idx] = &d->this_hdr;
3030 if (d->rel_idx != 0)
3031 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3032 if (d->rel_idx2 != 0)
3033 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3034
3035 /* Fill in the sh_link and sh_info fields while we're at it. */
3036
3037 /* sh_link of a reloc section is the section index of the symbol
3038 table. sh_info is the section index of the section to which
3039 the relocation entries apply. */
3040 if (d->rel_idx != 0)
3041 {
3042 d->rel_hdr.sh_link = t->symtab_section;
3043 d->rel_hdr.sh_info = d->this_idx;
3044 }
23bc299b
MM
3045 if (d->rel_idx2 != 0)
3046 {
3047 d->rel_hdr2->sh_link = t->symtab_section;
3048 d->rel_hdr2->sh_info = d->this_idx;
3049 }
252b5132 3050
38ce5b11
L
3051 /* We need to set up sh_link for SHF_LINK_ORDER. */
3052 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3053 {
3054 s = elf_linked_to_section (sec);
3055 if (s)
3056 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3057 else
3058 {
3059 struct bfd_link_order *p;
3060
3061 /* Find out what the corresponding section in output
3062 is. */
8423293d 3063 for (p = sec->map_head.link_order; p != NULL; p = p->next)
38ce5b11
L
3064 {
3065 s = p->u.indirect.section;
3066 if (p->type == bfd_indirect_link_order
3067 && (bfd_get_flavour (s->owner)
3068 == bfd_target_elf_flavour))
3069 {
3070 Elf_Internal_Shdr ** const elf_shdrp
3071 = elf_elfsections (s->owner);
3072 int elfsec
3073 = _bfd_elf_section_from_bfd_section (s->owner, s);
3074 elfsec = elf_shdrp[elfsec]->sh_link;
185d09ad
L
3075 /* PR 290:
3076 The Intel C compiler generates SHT_IA_64_UNWIND with
ff01938b 3077 SHF_LINK_ORDER. But it doesn't set the sh_link or
185d09ad
L
3078 sh_info fields. Hence we could get the situation
3079 where elfsec is 0. */
3080 if (elfsec == 0)
3081 {
3082 const struct elf_backend_data *bed
3083 = get_elf_backend_data (abfd);
3084 if (bed->link_order_error_handler)
d003868e 3085 bed->link_order_error_handler
28b13744 3086 (_("%B: warning: sh_link not set for section `%A'"),
d003868e 3087 abfd, s);
185d09ad
L
3088 }
3089 else
3090 {
01b3c8ab
L
3091 s = elf_shdrp[elfsec]->bfd_section;
3092 if (elf_discarded_section (s))
3093 {
3094 asection *kept;
3095 (*_bfd_error_handler)
3096 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3097 abfd, d->this_hdr.bfd_section,
3098 s, s->owner);
3099 /* Point to the kept section if it has
3100 the same size as the discarded
3101 one. */
3102 kept = _bfd_elf_check_kept_section (s);
3103 if (kept == NULL)
3104 {
3105 bfd_set_error (bfd_error_bad_value);
3106 return FALSE;
3107 }
2796fd96 3108 s = kept;
01b3c8ab
L
3109 }
3110 s = s->output_section;
185d09ad
L
3111 BFD_ASSERT (s != NULL);
3112 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3113 }
38ce5b11
L
3114 break;
3115 }
3116 }
3117 }
3118 }
3119
252b5132
RH
3120 switch (d->this_hdr.sh_type)
3121 {
3122 case SHT_REL:
3123 case SHT_RELA:
3124 /* A reloc section which we are treating as a normal BFD
3125 section. sh_link is the section index of the symbol
3126 table. sh_info is the section index of the section to
3127 which the relocation entries apply. We assume that an
3128 allocated reloc section uses the dynamic symbol table.
3129 FIXME: How can we be sure? */
3130 s = bfd_get_section_by_name (abfd, ".dynsym");
3131 if (s != NULL)
3132 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3133
3134 /* We look up the section the relocs apply to by name. */
3135 name = sec->name;
3136 if (d->this_hdr.sh_type == SHT_REL)
3137 name += 4;
3138 else
3139 name += 5;
3140 s = bfd_get_section_by_name (abfd, name);
3141 if (s != NULL)
3142 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3143 break;
3144
3145 case SHT_STRTAB:
3146 /* We assume that a section named .stab*str is a stabs
3147 string section. We look for a section with the same name
3148 but without the trailing ``str'', and set its sh_link
3149 field to point to this section. */
3150 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
3151 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3152 {
3153 size_t len;
3154 char *alc;
3155
3156 len = strlen (sec->name);
217aa764 3157 alc = bfd_malloc (len - 2);
252b5132 3158 if (alc == NULL)
b34976b6 3159 return FALSE;
d4c88bbb 3160 memcpy (alc, sec->name, len - 3);
252b5132
RH
3161 alc[len - 3] = '\0';
3162 s = bfd_get_section_by_name (abfd, alc);
3163 free (alc);
3164 if (s != NULL)
3165 {
3166 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3167
3168 /* This is a .stab section. */
0594c12d
AM
3169 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3170 elf_section_data (s)->this_hdr.sh_entsize
3171 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3172 }
3173 }
3174 break;
3175
3176 case SHT_DYNAMIC:
3177 case SHT_DYNSYM:
3178 case SHT_GNU_verneed:
3179 case SHT_GNU_verdef:
3180 /* sh_link is the section header index of the string table
3181 used for the dynamic entries, or the symbol table, or the
3182 version strings. */
3183 s = bfd_get_section_by_name (abfd, ".dynstr");
3184 if (s != NULL)
3185 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3186 break;
3187
7f1204bb
JJ
3188 case SHT_GNU_LIBLIST:
3189 /* sh_link is the section header index of the prelink library
3190 list
3191 used for the dynamic entries, or the symbol table, or the
3192 version strings. */
3193 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3194 ? ".dynstr" : ".gnu.libstr");
3195 if (s != NULL)
3196 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3197 break;
3198
252b5132
RH
3199 case SHT_HASH:
3200 case SHT_GNU_versym:
3201 /* sh_link is the section header index of the symbol table
3202 this hash table or version table is for. */
3203 s = bfd_get_section_by_name (abfd, ".dynsym");
3204 if (s != NULL)
3205 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3206 break;
dbb410c3
AM
3207
3208 case SHT_GROUP:
3209 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3210 }
3211 }
3212
2b0f7ef9 3213 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3214 if (i_shdrp[secn] == NULL)
3215 i_shdrp[secn] = i_shdrp[0];
3216 else
3217 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3218 i_shdrp[secn]->sh_name);
b34976b6 3219 return TRUE;
252b5132
RH
3220}
3221
3222/* Map symbol from it's internal number to the external number, moving
3223 all local symbols to be at the head of the list. */
3224
268b6b39 3225static int
217aa764 3226sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3227{
3228 /* If the backend has a special mapping, use it. */
9c5bfbb7 3229 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3230 if (bed->elf_backend_sym_is_global)
3231 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3232
3233 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3234 || bfd_is_und_section (bfd_get_section (sym))
3235 || bfd_is_com_section (bfd_get_section (sym)));
3236}
3237
b34976b6 3238static bfd_boolean
217aa764 3239elf_map_symbols (bfd *abfd)
252b5132 3240{
dc810e39 3241 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3242 asymbol **syms = bfd_get_outsymbols (abfd);
3243 asymbol **sect_syms;
dc810e39
AM
3244 unsigned int num_locals = 0;
3245 unsigned int num_globals = 0;
3246 unsigned int num_locals2 = 0;
3247 unsigned int num_globals2 = 0;
252b5132 3248 int max_index = 0;
dc810e39 3249 unsigned int idx;
252b5132
RH
3250 asection *asect;
3251 asymbol **new_syms;
dc810e39 3252 bfd_size_type amt;
252b5132
RH
3253
3254#ifdef DEBUG
3255 fprintf (stderr, "elf_map_symbols\n");
3256 fflush (stderr);
3257#endif
3258
252b5132
RH
3259 for (asect = abfd->sections; asect; asect = asect->next)
3260 {
3261 if (max_index < asect->index)
3262 max_index = asect->index;
3263 }
3264
3265 max_index++;
dc810e39 3266 amt = max_index * sizeof (asymbol *);
217aa764 3267 sect_syms = bfd_zalloc (abfd, amt);
252b5132 3268 if (sect_syms == NULL)
b34976b6 3269 return FALSE;
252b5132 3270 elf_section_syms (abfd) = sect_syms;
4e89ac30 3271 elf_num_section_syms (abfd) = max_index;
252b5132 3272
079e9a2f
AM
3273 /* Init sect_syms entries for any section symbols we have already
3274 decided to output. */
252b5132
RH
3275 for (idx = 0; idx < symcount; idx++)
3276 {
dc810e39 3277 asymbol *sym = syms[idx];
c044fabd 3278
252b5132
RH
3279 if ((sym->flags & BSF_SECTION_SYM) != 0
3280 && sym->value == 0)
3281 {
3282 asection *sec;
3283
3284 sec = sym->section;
3285
3286 if (sec->owner != NULL)
3287 {
3288 if (sec->owner != abfd)
3289 {
3290 if (sec->output_offset != 0)
3291 continue;
c044fabd 3292
252b5132
RH
3293 sec = sec->output_section;
3294
079e9a2f
AM
3295 /* Empty sections in the input files may have had a
3296 section symbol created for them. (See the comment
3297 near the end of _bfd_generic_link_output_symbols in
3298 linker.c). If the linker script discards such
3299 sections then we will reach this point. Since we know
3300 that we cannot avoid this case, we detect it and skip
3301 the abort and the assignment to the sect_syms array.
3302 To reproduce this particular case try running the
3303 linker testsuite test ld-scripts/weak.exp for an ELF
3304 port that uses the generic linker. */
252b5132
RH
3305 if (sec->owner == NULL)
3306 continue;
3307
3308 BFD_ASSERT (sec->owner == abfd);
3309 }
3310 sect_syms[sec->index] = syms[idx];
3311 }
3312 }
3313 }
3314
252b5132
RH
3315 /* Classify all of the symbols. */
3316 for (idx = 0; idx < symcount; idx++)
3317 {
3318 if (!sym_is_global (abfd, syms[idx]))
3319 num_locals++;
3320 else
3321 num_globals++;
3322 }
079e9a2f
AM
3323
3324 /* We will be adding a section symbol for each BFD section. Most normal
3325 sections will already have a section symbol in outsymbols, but
3326 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3327 at least in that case. */
252b5132
RH
3328 for (asect = abfd->sections; asect; asect = asect->next)
3329 {
079e9a2f 3330 if (sect_syms[asect->index] == NULL)
252b5132 3331 {
079e9a2f 3332 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3333 num_locals++;
3334 else
3335 num_globals++;
252b5132
RH
3336 }
3337 }
3338
3339 /* Now sort the symbols so the local symbols are first. */
dc810e39 3340 amt = (num_locals + num_globals) * sizeof (asymbol *);
217aa764 3341 new_syms = bfd_alloc (abfd, amt);
dc810e39 3342
252b5132 3343 if (new_syms == NULL)
b34976b6 3344 return FALSE;
252b5132
RH
3345
3346 for (idx = 0; idx < symcount; idx++)
3347 {
3348 asymbol *sym = syms[idx];
dc810e39 3349 unsigned int i;
252b5132
RH
3350
3351 if (!sym_is_global (abfd, sym))
3352 i = num_locals2++;
3353 else
3354 i = num_locals + num_globals2++;
3355 new_syms[i] = sym;
3356 sym->udata.i = i + 1;
3357 }
3358 for (asect = abfd->sections; asect; asect = asect->next)
3359 {
079e9a2f 3360 if (sect_syms[asect->index] == NULL)
252b5132 3361 {
079e9a2f 3362 asymbol *sym = asect->symbol;
dc810e39 3363 unsigned int i;
252b5132 3364
079e9a2f 3365 sect_syms[asect->index] = sym;
252b5132
RH
3366 if (!sym_is_global (abfd, sym))
3367 i = num_locals2++;
3368 else
3369 i = num_locals + num_globals2++;
3370 new_syms[i] = sym;
3371 sym->udata.i = i + 1;
3372 }
3373 }
3374
3375 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3376
3377 elf_num_locals (abfd) = num_locals;
3378 elf_num_globals (abfd) = num_globals;
b34976b6 3379 return TRUE;
252b5132
RH
3380}
3381
3382/* Align to the maximum file alignment that could be required for any
3383 ELF data structure. */
3384
268b6b39 3385static inline file_ptr
217aa764 3386align_file_position (file_ptr off, int align)
252b5132
RH
3387{
3388 return (off + align - 1) & ~(align - 1);
3389}
3390
3391/* Assign a file position to a section, optionally aligning to the
3392 required section alignment. */
3393
217aa764
AM
3394file_ptr
3395_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3396 file_ptr offset,
3397 bfd_boolean align)
252b5132
RH
3398{
3399 if (align)
3400 {
3401 unsigned int al;
3402
3403 al = i_shdrp->sh_addralign;
3404 if (al > 1)
3405 offset = BFD_ALIGN (offset, al);
3406 }
3407 i_shdrp->sh_offset = offset;
3408 if (i_shdrp->bfd_section != NULL)
3409 i_shdrp->bfd_section->filepos = offset;
3410 if (i_shdrp->sh_type != SHT_NOBITS)
3411 offset += i_shdrp->sh_size;
3412 return offset;
3413}
3414
3415/* Compute the file positions we are going to put the sections at, and
3416 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3417 is not NULL, this is being called by the ELF backend linker. */
3418
b34976b6 3419bfd_boolean
217aa764
AM
3420_bfd_elf_compute_section_file_positions (bfd *abfd,
3421 struct bfd_link_info *link_info)
252b5132 3422{
9c5bfbb7 3423 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3424 bfd_boolean failed;
4b6c0f2f 3425 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3426 Elf_Internal_Shdr *shstrtab_hdr;
3427
3428 if (abfd->output_has_begun)
b34976b6 3429 return TRUE;
252b5132
RH
3430
3431 /* Do any elf backend specific processing first. */
3432 if (bed->elf_backend_begin_write_processing)
3433 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3434
3435 if (! prep_headers (abfd))
b34976b6 3436 return FALSE;
252b5132 3437
e6c51ed4
NC
3438 /* Post process the headers if necessary. */
3439 if (bed->elf_backend_post_process_headers)
3440 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3441
b34976b6 3442 failed = FALSE;
252b5132
RH
3443 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3444 if (failed)
b34976b6 3445 return FALSE;
252b5132 3446
da9f89d4 3447 if (!assign_section_numbers (abfd, link_info))
b34976b6 3448 return FALSE;
252b5132
RH
3449
3450 /* The backend linker builds symbol table information itself. */
3451 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3452 {
3453 /* Non-zero if doing a relocatable link. */
3454 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3455
3456 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3457 return FALSE;
252b5132
RH
3458 }
3459
1126897b 3460 if (link_info == NULL)
dbb410c3 3461 {
1126897b 3462 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3463 if (failed)
b34976b6 3464 return FALSE;
dbb410c3
AM
3465 }
3466
252b5132
RH
3467 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3468 /* sh_name was set in prep_headers. */
3469 shstrtab_hdr->sh_type = SHT_STRTAB;
3470 shstrtab_hdr->sh_flags = 0;
3471 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3472 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3473 shstrtab_hdr->sh_entsize = 0;
3474 shstrtab_hdr->sh_link = 0;
3475 shstrtab_hdr->sh_info = 0;
3476 /* sh_offset is set in assign_file_positions_except_relocs. */
3477 shstrtab_hdr->sh_addralign = 1;
3478
c84fca4d 3479 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3480 return FALSE;
252b5132
RH
3481
3482 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3483 {
3484 file_ptr off;
3485 Elf_Internal_Shdr *hdr;
3486
3487 off = elf_tdata (abfd)->next_file_pos;
3488
3489 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3490 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3491
9ad5cbcf
AM
3492 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3493 if (hdr->sh_size != 0)
b34976b6 3494 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3495
252b5132 3496 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3497 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3498
3499 elf_tdata (abfd)->next_file_pos = off;
3500
3501 /* Now that we know where the .strtab section goes, write it
3502 out. */
3503 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3504 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3505 return FALSE;
252b5132
RH
3506 _bfd_stringtab_free (strtab);
3507 }
3508
b34976b6 3509 abfd->output_has_begun = TRUE;
252b5132 3510
b34976b6 3511 return TRUE;
252b5132
RH
3512}
3513
3514/* Create a mapping from a set of sections to a program segment. */
3515
217aa764
AM
3516static struct elf_segment_map *
3517make_mapping (bfd *abfd,
3518 asection **sections,
3519 unsigned int from,
3520 unsigned int to,
3521 bfd_boolean phdr)
252b5132
RH
3522{
3523 struct elf_segment_map *m;
3524 unsigned int i;
3525 asection **hdrpp;
dc810e39 3526 bfd_size_type amt;
252b5132 3527
dc810e39
AM
3528 amt = sizeof (struct elf_segment_map);
3529 amt += (to - from - 1) * sizeof (asection *);
217aa764 3530 m = bfd_zalloc (abfd, amt);
252b5132
RH
3531 if (m == NULL)
3532 return NULL;
3533 m->next = NULL;
3534 m->p_type = PT_LOAD;
3535 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3536 m->sections[i - from] = *hdrpp;
3537 m->count = to - from;
3538
3539 if (from == 0 && phdr)
3540 {
3541 /* Include the headers in the first PT_LOAD segment. */
3542 m->includes_filehdr = 1;
3543 m->includes_phdrs = 1;
3544 }
3545
3546 return m;
3547}
3548
229fcec5
MM
3549/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3550 on failure. */
3551
3552struct elf_segment_map *
3553_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3554{
3555 struct elf_segment_map *m;
3556
3557 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3558 if (m == NULL)
3559 return NULL;
3560 m->next = NULL;
3561 m->p_type = PT_DYNAMIC;
3562 m->count = 1;
3563 m->sections[0] = dynsec;
3564
3565 return m;
3566}
3567
252b5132
RH
3568/* Set up a mapping from BFD sections to program segments. */
3569
b34976b6 3570static bfd_boolean
217aa764 3571map_sections_to_segments (bfd *abfd)
252b5132
RH
3572{
3573 asection **sections = NULL;
3574 asection *s;
3575 unsigned int i;
3576 unsigned int count;
3577 struct elf_segment_map *mfirst;
3578 struct elf_segment_map **pm;
3579 struct elf_segment_map *m;
3580 asection *last_hdr;
baaff79e 3581 bfd_vma last_size;
252b5132
RH
3582 unsigned int phdr_index;
3583 bfd_vma maxpagesize;
3584 asection **hdrpp;
b34976b6
AM
3585 bfd_boolean phdr_in_segment = TRUE;
3586 bfd_boolean writable;
13ae64f3
JJ
3587 int tls_count = 0;
3588 asection *first_tls = NULL;
65765700 3589 asection *dynsec, *eh_frame_hdr;
dc810e39 3590 bfd_size_type amt;
252b5132
RH
3591
3592 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3593 return TRUE;
252b5132
RH
3594
3595 if (bfd_count_sections (abfd) == 0)
b34976b6 3596 return TRUE;
252b5132
RH
3597
3598 /* Select the allocated sections, and sort them. */
3599
dc810e39 3600 amt = bfd_count_sections (abfd) * sizeof (asection *);
217aa764 3601 sections = bfd_malloc (amt);
252b5132
RH
3602 if (sections == NULL)
3603 goto error_return;
3604
3605 i = 0;
3606 for (s = abfd->sections; s != NULL; s = s->next)
3607 {
3608 if ((s->flags & SEC_ALLOC) != 0)
3609 {
3610 sections[i] = s;
3611 ++i;
3612 }
3613 }
3614 BFD_ASSERT (i <= bfd_count_sections (abfd));
3615 count = i;
3616
3617 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3618
3619 /* Build the mapping. */
3620
3621 mfirst = NULL;
3622 pm = &mfirst;
3623
3624 /* If we have a .interp section, then create a PT_PHDR segment for
3625 the program headers and a PT_INTERP segment for the .interp
3626 section. */
3627 s = bfd_get_section_by_name (abfd, ".interp");
3628 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3629 {
dc810e39 3630 amt = sizeof (struct elf_segment_map);
217aa764 3631 m = bfd_zalloc (abfd, amt);
252b5132
RH
3632 if (m == NULL)
3633 goto error_return;
3634 m->next = NULL;
3635 m->p_type = PT_PHDR;
3636 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3637 m->p_flags = PF_R | PF_X;
3638 m->p_flags_valid = 1;
3639 m->includes_phdrs = 1;
3640
3641 *pm = m;
3642 pm = &m->next;
3643
dc810e39 3644 amt = sizeof (struct elf_segment_map);
217aa764 3645 m = bfd_zalloc (abfd, amt);
252b5132
RH
3646 if (m == NULL)
3647 goto error_return;
3648 m->next = NULL;
3649 m->p_type = PT_INTERP;
3650 m->count = 1;
3651 m->sections[0] = s;
3652
3653 *pm = m;
3654 pm = &m->next;
3655 }
3656
3657 /* Look through the sections. We put sections in the same program
3658 segment when the start of the second section can be placed within
3659 a few bytes of the end of the first section. */
3660 last_hdr = NULL;
baaff79e 3661 last_size = 0;
252b5132
RH
3662 phdr_index = 0;
3663 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3664 writable = FALSE;
252b5132
RH
3665 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3666 if (dynsec != NULL
3667 && (dynsec->flags & SEC_LOAD) == 0)
3668 dynsec = NULL;
3669
3670 /* Deal with -Ttext or something similar such that the first section
3671 is not adjacent to the program headers. This is an
3672 approximation, since at this point we don't know exactly how many
3673 program headers we will need. */
3674 if (count > 0)
3675 {
3676 bfd_size_type phdr_size;
3677
3678 phdr_size = elf_tdata (abfd)->program_header_size;
3679 if (phdr_size == 0)
3680 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3681 if ((abfd->flags & D_PAGED) == 0
3682 || sections[0]->lma < phdr_size
3683 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3684 phdr_in_segment = FALSE;
252b5132
RH
3685 }
3686
3687 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3688 {
3689 asection *hdr;
b34976b6 3690 bfd_boolean new_segment;
252b5132
RH
3691
3692 hdr = *hdrpp;
3693
3694 /* See if this section and the last one will fit in the same
3695 segment. */
3696
3697 if (last_hdr == NULL)
3698 {
3699 /* If we don't have a segment yet, then we don't need a new
3700 one (we build the last one after this loop). */
b34976b6 3701 new_segment = FALSE;
252b5132
RH
3702 }
3703 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3704 {
3705 /* If this section has a different relation between the
3706 virtual address and the load address, then we need a new
3707 segment. */
b34976b6 3708 new_segment = TRUE;
252b5132 3709 }
baaff79e 3710 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3711 < BFD_ALIGN (hdr->lma, maxpagesize))
3712 {
3713 /* If putting this section in this segment would force us to
3714 skip a page in the segment, then we need a new segment. */
b34976b6 3715 new_segment = TRUE;
252b5132 3716 }
baaff79e
JJ
3717 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3718 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3719 {
3720 /* We don't want to put a loadable section after a
baaff79e
JJ
3721 nonloadable section in the same segment.
3722 Consider .tbss sections as loadable for this purpose. */
b34976b6 3723 new_segment = TRUE;
252b5132
RH
3724 }
3725 else if ((abfd->flags & D_PAGED) == 0)
3726 {
3727 /* If the file is not demand paged, which means that we
3728 don't require the sections to be correctly aligned in the
3729 file, then there is no other reason for a new segment. */
b34976b6 3730 new_segment = FALSE;
252b5132
RH
3731 }
3732 else if (! writable
3733 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3734 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3735 & ~(maxpagesize - 1))
3736 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3737 {
3738 /* We don't want to put a writable section in a read only
3739 segment, unless they are on the same page in memory
3740 anyhow. We already know that the last section does not
3741 bring us past the current section on the page, so the
3742 only case in which the new section is not on the same
3743 page as the previous section is when the previous section
3744 ends precisely on a page boundary. */
b34976b6 3745 new_segment = TRUE;
252b5132
RH
3746 }
3747 else
3748 {
3749 /* Otherwise, we can use the same segment. */
b34976b6 3750 new_segment = FALSE;
252b5132
RH
3751 }
3752
3753 if (! new_segment)
3754 {
3755 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3756 writable = TRUE;
baaff79e
JJ
3757 last_hdr = hdr;
3758 /* .tbss sections effectively have zero size. */
e5caec89 3759 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3760 last_size = hdr->size;
baaff79e
JJ
3761 else
3762 last_size = 0;
252b5132
RH
3763 continue;
3764 }
3765
3766 /* We need a new program segment. We must create a new program
3767 header holding all the sections from phdr_index until hdr. */
3768
3769 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3770 if (m == NULL)
3771 goto error_return;
3772
3773 *pm = m;
3774 pm = &m->next;
3775
3776 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3777 writable = TRUE;
252b5132 3778 else
b34976b6 3779 writable = FALSE;
252b5132
RH
3780
3781 last_hdr = hdr;
baaff79e
JJ
3782 /* .tbss sections effectively have zero size. */
3783 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3784 last_size = hdr->size;
baaff79e
JJ
3785 else
3786 last_size = 0;
252b5132 3787 phdr_index = i;
b34976b6 3788 phdr_in_segment = FALSE;
252b5132
RH
3789 }
3790
3791 /* Create a final PT_LOAD program segment. */
3792 if (last_hdr != NULL)
3793 {
3794 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3795 if (m == NULL)
3796 goto error_return;
3797
3798 *pm = m;
3799 pm = &m->next;
3800 }
3801
3802 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3803 if (dynsec != NULL)
3804 {
229fcec5 3805 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3806 if (m == NULL)
3807 goto error_return;
252b5132
RH
3808 *pm = m;
3809 pm = &m->next;
3810 }
3811
3812 /* For each loadable .note section, add a PT_NOTE segment. We don't
3813 use bfd_get_section_by_name, because if we link together
3814 nonloadable .note sections and loadable .note sections, we will
3815 generate two .note sections in the output file. FIXME: Using
3816 names for section types is bogus anyhow. */
3817 for (s = abfd->sections; s != NULL; s = s->next)
3818 {
3819 if ((s->flags & SEC_LOAD) != 0
3820 && strncmp (s->name, ".note", 5) == 0)
3821 {
dc810e39 3822 amt = sizeof (struct elf_segment_map);
217aa764 3823 m = bfd_zalloc (abfd, amt);
252b5132
RH
3824 if (m == NULL)
3825 goto error_return;
3826 m->next = NULL;
3827 m->p_type = PT_NOTE;
3828 m->count = 1;
3829 m->sections[0] = s;
3830
3831 *pm = m;
3832 pm = &m->next;
3833 }
13ae64f3
JJ
3834 if (s->flags & SEC_THREAD_LOCAL)
3835 {
3836 if (! tls_count)
3837 first_tls = s;
3838 tls_count++;
3839 }
3840 }
3841
3842 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3843 if (tls_count > 0)
3844 {
3845 int i;
3846
3847 amt = sizeof (struct elf_segment_map);
3848 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3849 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3850 if (m == NULL)
3851 goto error_return;
3852 m->next = NULL;
3853 m->p_type = PT_TLS;
3854 m->count = tls_count;
3855 /* Mandated PF_R. */
3856 m->p_flags = PF_R;
3857 m->p_flags_valid = 1;
3858 for (i = 0; i < tls_count; ++i)
3859 {
3860 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3861 m->sections[i] = first_tls;
3862 first_tls = first_tls->next;
3863 }
3864
3865 *pm = m;
3866 pm = &m->next;
252b5132
RH
3867 }
3868
65765700
JJ
3869 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3870 segment. */
126495ed
AM
3871 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3872 if (eh_frame_hdr != NULL
3873 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3874 {
3875 amt = sizeof (struct elf_segment_map);
217aa764 3876 m = bfd_zalloc (abfd, amt);
65765700
JJ
3877 if (m == NULL)
3878 goto error_return;
3879 m->next = NULL;
3880 m->p_type = PT_GNU_EH_FRAME;
3881 m->count = 1;
126495ed 3882 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3883
3884 *pm = m;
3885 pm = &m->next;
3886 }
3887
9ee5e499
JJ
3888 if (elf_tdata (abfd)->stack_flags)
3889 {
3890 amt = sizeof (struct elf_segment_map);
217aa764 3891 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3892 if (m == NULL)
3893 goto error_return;
3894 m->next = NULL;
3895 m->p_type = PT_GNU_STACK;
3896 m->p_flags = elf_tdata (abfd)->stack_flags;
3897 m->p_flags_valid = 1;
3898
3899 *pm = m;
3900 pm = &m->next;
3901 }
3902
8c37241b
JJ
3903 if (elf_tdata (abfd)->relro)
3904 {
3905 amt = sizeof (struct elf_segment_map);
3906 m = bfd_zalloc (abfd, amt);
3907 if (m == NULL)
3908 goto error_return;
3909 m->next = NULL;
3910 m->p_type = PT_GNU_RELRO;
3911 m->p_flags = PF_R;
3912 m->p_flags_valid = 1;
3913
3914 *pm = m;
3915 pm = &m->next;
3916 }
3917
252b5132
RH
3918 free (sections);
3919 sections = NULL;
3920
3921 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3922 return TRUE;
252b5132
RH
3923
3924 error_return:
3925 if (sections != NULL)
3926 free (sections);
b34976b6 3927 return FALSE;
252b5132
RH
3928}
3929
3930/* Sort sections by address. */
3931
3932static int
217aa764 3933elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3934{
3935 const asection *sec1 = *(const asection **) arg1;
3936 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3937 bfd_size_type size1, size2;
252b5132
RH
3938
3939 /* Sort by LMA first, since this is the address used to
3940 place the section into a segment. */
3941 if (sec1->lma < sec2->lma)
3942 return -1;
3943 else if (sec1->lma > sec2->lma)
3944 return 1;
3945
3946 /* Then sort by VMA. Normally the LMA and the VMA will be
3947 the same, and this will do nothing. */
3948 if (sec1->vma < sec2->vma)
3949 return -1;
3950 else if (sec1->vma > sec2->vma)
3951 return 1;
3952
3953 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3954
07c6e936 3955#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3956
3957 if (TOEND (sec1))
3958 {
3959 if (TOEND (sec2))
00a7cdc5
NC
3960 {
3961 /* If the indicies are the same, do not return 0
3962 here, but continue to try the next comparison. */
3963 if (sec1->target_index - sec2->target_index != 0)
3964 return sec1->target_index - sec2->target_index;
3965 }
252b5132
RH
3966 else
3967 return 1;
3968 }
00a7cdc5 3969 else if (TOEND (sec2))
252b5132
RH
3970 return -1;
3971
3972#undef TOEND
3973
00a7cdc5
NC
3974 /* Sort by size, to put zero sized sections
3975 before others at the same address. */
252b5132 3976
eea6121a
AM
3977 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
3978 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
3979
3980 if (size1 < size2)
252b5132 3981 return -1;
eecdbe52 3982 if (size1 > size2)
252b5132
RH
3983 return 1;
3984
3985 return sec1->target_index - sec2->target_index;
3986}
3987
340b6d91
AC
3988/* Ian Lance Taylor writes:
3989
3990 We shouldn't be using % with a negative signed number. That's just
3991 not good. We have to make sure either that the number is not
3992 negative, or that the number has an unsigned type. When the types
3993 are all the same size they wind up as unsigned. When file_ptr is a
3994 larger signed type, the arithmetic winds up as signed long long,
3995 which is wrong.
3996
3997 What we're trying to say here is something like ``increase OFF by
3998 the least amount that will cause it to be equal to the VMA modulo
3999 the page size.'' */
4000/* In other words, something like:
4001
4002 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4003 off_offset = off % bed->maxpagesize;
4004 if (vma_offset < off_offset)
4005 adjustment = vma_offset + bed->maxpagesize - off_offset;
4006 else
4007 adjustment = vma_offset - off_offset;
4008
4009 which can can be collapsed into the expression below. */
4010
4011static file_ptr
4012vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4013{
4014 return ((vma - off) % maxpagesize);
4015}
4016
252b5132
RH
4017/* Assign file positions to the sections based on the mapping from
4018 sections to segments. This function also sets up some fields in
4019 the file header, and writes out the program headers. */
4020
b34976b6 4021static bfd_boolean
c84fca4d 4022assign_file_positions_for_segments (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
4023{
4024 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4025 unsigned int count;
4026 struct elf_segment_map *m;
4027 unsigned int alloc;
4028 Elf_Internal_Phdr *phdrs;
4029 file_ptr off, voff;
4030 bfd_vma filehdr_vaddr, filehdr_paddr;
4031 bfd_vma phdrs_vaddr, phdrs_paddr;
4032 Elf_Internal_Phdr *p;
dc810e39 4033 bfd_size_type amt;
252b5132
RH
4034
4035 if (elf_tdata (abfd)->segment_map == NULL)
4036 {
4037 if (! map_sections_to_segments (abfd))
b34976b6 4038 return FALSE;
252b5132 4039 }
1ed89aa9
NC
4040 else
4041 {
4042 /* The placement algorithm assumes that non allocated sections are
4043 not in PT_LOAD segments. We ensure this here by removing such
4044 sections from the segment map. */
4045 for (m = elf_tdata (abfd)->segment_map;
4046 m != NULL;
4047 m = m->next)
4048 {
4049 unsigned int new_count;
4050 unsigned int i;
4051
4052 if (m->p_type != PT_LOAD)
4053 continue;
4054
4055 new_count = 0;
4056 for (i = 0; i < m->count; i ++)
4057 {
4058 if ((m->sections[i]->flags & SEC_ALLOC) != 0)
4059 {
47d9a591 4060 if (i != new_count)
1ed89aa9
NC
4061 m->sections[new_count] = m->sections[i];
4062
4063 new_count ++;
4064 }
4065 }
4066
4067 if (new_count != m->count)
4068 m->count = new_count;
4069 }
4070 }
252b5132
RH
4071
4072 if (bed->elf_backend_modify_segment_map)
4073 {
c84fca4d 4074 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 4075 return FALSE;
252b5132
RH
4076 }
4077
4078 count = 0;
4079 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4080 ++count;
4081
4082 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4083 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4084 elf_elfheader (abfd)->e_phnum = count;
4085
4086 if (count == 0)
0ebdbb83
BW
4087 {
4088 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4089 return TRUE;
4090 }
252b5132
RH
4091
4092 /* If we already counted the number of program segments, make sure
4093 that we allocated enough space. This happens when SIZEOF_HEADERS
4094 is used in a linker script. */
4095 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
4096 if (alloc != 0 && count > alloc)
4097 {
4098 ((*_bfd_error_handler)
b301b248
AM
4099 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
4100 abfd, alloc, count));
252b5132 4101 bfd_set_error (bfd_error_bad_value);
b34976b6 4102 return FALSE;
252b5132
RH
4103 }
4104
4105 if (alloc == 0)
4106 alloc = count;
4107
dc810e39 4108 amt = alloc * sizeof (Elf_Internal_Phdr);
217aa764 4109 phdrs = bfd_alloc (abfd, amt);
252b5132 4110 if (phdrs == NULL)
b34976b6 4111 return FALSE;
252b5132
RH
4112
4113 off = bed->s->sizeof_ehdr;
4114 off += alloc * bed->s->sizeof_phdr;
4115
4116 filehdr_vaddr = 0;
4117 filehdr_paddr = 0;
4118 phdrs_vaddr = 0;
4119 phdrs_paddr = 0;
4120
4121 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4122 m != NULL;
4123 m = m->next, p++)
4124 {
4125 unsigned int i;
4126 asection **secpp;
4127
4128 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4129 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4130 not be done to the PT_NOTE section of a corefile, which may
4131 contain several pseudo-sections artificially created by bfd.
4132 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4133 if (m->count > 1
4134 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4135 && m->p_type == PT_NOTE))
252b5132
RH
4136 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4137 elf_sort_sections);
4138
b301b248
AM
4139 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4140 number of sections with contents contributing to both p_filesz
4141 and p_memsz, followed by a number of sections with no contents
4142 that just contribute to p_memsz. In this loop, OFF tracks next
4143 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4144 an adjustment we use for segments that have no file contents
4145 but need zero filled memory allocation. */
4146 voff = 0;
252b5132 4147 p->p_type = m->p_type;
28a7f3e7 4148 p->p_flags = m->p_flags;
252b5132
RH
4149
4150 if (p->p_type == PT_LOAD
b301b248 4151 && m->count > 0)
252b5132 4152 {
b301b248
AM
4153 bfd_size_type align;
4154 bfd_vma adjust;
a49e53ed 4155 unsigned int align_power = 0;
b301b248 4156
a49e53ed 4157 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4158 {
a49e53ed 4159 unsigned int secalign;
252b5132 4160
a49e53ed
AM
4161 secalign = bfd_get_section_alignment (abfd, *secpp);
4162 if (secalign > align_power)
4163 align_power = secalign;
b301b248 4164 }
a49e53ed
AM
4165 align = (bfd_size_type) 1 << align_power;
4166
4167 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > align)
4168 align = bed->maxpagesize;
252b5132 4169
b301b248
AM
4170 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4171 off += adjust;
4172 if (adjust != 0
4173 && !m->includes_filehdr
4174 && !m->includes_phdrs
4175 && (ufile_ptr) off >= align)
4176 {
4177 /* If the first section isn't loadable, the same holds for
4178 any other sections. Since the segment won't need file
4179 space, we can make p_offset overlap some prior segment.
4180 However, .tbss is special. If a segment starts with
4181 .tbss, we need to look at the next section to decide
4182 whether the segment has any loadable sections. */
4183 i = 0;
5efb6261 4184 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
4185 {
4186 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4187 || ++i >= m->count)
4188 {
4189 off -= adjust;
4190 voff = adjust - align;
4191 break;
4192 }
4193 }
252b5132
RH
4194 }
4195 }
b1a6d0b1
NC
4196 /* Make sure the .dynamic section is the first section in the
4197 PT_DYNAMIC segment. */
4198 else if (p->p_type == PT_DYNAMIC
4199 && m->count > 1
4200 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4201 {
4202 _bfd_error_handler
b301b248
AM
4203 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4204 abfd);
b1a6d0b1
NC
4205 bfd_set_error (bfd_error_bad_value);
4206 return FALSE;
4207 }
252b5132
RH
4208
4209 if (m->count == 0)
4210 p->p_vaddr = 0;
4211 else
4212 p->p_vaddr = m->sections[0]->vma;
4213
4214 if (m->p_paddr_valid)
4215 p->p_paddr = m->p_paddr;
4216 else if (m->count == 0)
4217 p->p_paddr = 0;
4218 else
4219 p->p_paddr = m->sections[0]->lma;
4220
4221 if (p->p_type == PT_LOAD
4222 && (abfd->flags & D_PAGED) != 0)
4223 p->p_align = bed->maxpagesize;
4224 else if (m->count == 0)
45d6a902 4225 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
4226 else
4227 p->p_align = 0;
4228
4229 p->p_offset = 0;
4230 p->p_filesz = 0;
4231 p->p_memsz = 0;
4232
4233 if (m->includes_filehdr)
4234 {
4235 if (! m->p_flags_valid)
4236 p->p_flags |= PF_R;
4237 p->p_offset = 0;
4238 p->p_filesz = bed->s->sizeof_ehdr;
4239 p->p_memsz = bed->s->sizeof_ehdr;
4240 if (m->count > 0)
4241 {
4242 BFD_ASSERT (p->p_type == PT_LOAD);
4243
4244 if (p->p_vaddr < (bfd_vma) off)
4245 {
caf47ea6 4246 (*_bfd_error_handler)
b301b248
AM
4247 (_("%B: Not enough room for program headers, try linking with -N"),
4248 abfd);
252b5132 4249 bfd_set_error (bfd_error_bad_value);
b34976b6 4250 return FALSE;
252b5132
RH
4251 }
4252
4253 p->p_vaddr -= off;
4254 if (! m->p_paddr_valid)
4255 p->p_paddr -= off;
4256 }
4257 if (p->p_type == PT_LOAD)
4258 {
4259 filehdr_vaddr = p->p_vaddr;
4260 filehdr_paddr = p->p_paddr;
4261 }
4262 }
4263
4264 if (m->includes_phdrs)
4265 {
4266 if (! m->p_flags_valid)
4267 p->p_flags |= PF_R;
4268
4269 if (m->includes_filehdr)
4270 {
4271 if (p->p_type == PT_LOAD)
4272 {
4273 phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr;
4274 phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr;
4275 }
4276 }
4277 else
4278 {
4279 p->p_offset = bed->s->sizeof_ehdr;
4280
4281 if (m->count > 0)
4282 {
4283 BFD_ASSERT (p->p_type == PT_LOAD);
4284 p->p_vaddr -= off - p->p_offset;
4285 if (! m->p_paddr_valid)
4286 p->p_paddr -= off - p->p_offset;
4287 }
4288
4289 if (p->p_type == PT_LOAD)
4290 {
4291 phdrs_vaddr = p->p_vaddr;
4292 phdrs_paddr = p->p_paddr;
4293 }
4294 else
4295 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4296 }
4297
4298 p->p_filesz += alloc * bed->s->sizeof_phdr;
4299 p->p_memsz += alloc * bed->s->sizeof_phdr;
4300 }
4301
4302 if (p->p_type == PT_LOAD
4303 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4304 {
4305 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4306 p->p_offset = off + voff;
252b5132
RH
4307 else
4308 {
4309 file_ptr adjust;
4310
4311 adjust = off - (p->p_offset + p->p_filesz);
4312 p->p_filesz += adjust;
4313 p->p_memsz += adjust;
4314 }
4315 }
4316
252b5132
RH
4317 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4318 {
4319 asection *sec;
4320 flagword flags;
4321 bfd_size_type align;
4322
4323 sec = *secpp;
4324 flags = sec->flags;
4325 align = 1 << bfd_get_section_alignment (abfd, sec);
4326
b301b248
AM
4327 if (p->p_type == PT_LOAD
4328 || p->p_type == PT_TLS)
252b5132
RH
4329 {
4330 bfd_signed_vma adjust;
4331
5efb6261 4332 if ((flags & SEC_LOAD) != 0)
252b5132 4333 {
b301b248 4334 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4335 if (adjust < 0)
b301b248
AM
4336 {
4337 (*_bfd_error_handler)
4338 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4339 abfd, sec, (unsigned long) sec->lma);
4340 adjust = 0;
4341 }
4342 off += adjust;
4343 p->p_filesz += adjust;
4344 p->p_memsz += adjust;
252b5132 4345 }
b301b248
AM
4346 /* .tbss is special. It doesn't contribute to p_memsz of
4347 normal segments. */
4348 else if ((flags & SEC_THREAD_LOCAL) == 0
4349 || p->p_type == PT_TLS)
252b5132
RH
4350 {
4351 /* The section VMA must equal the file position
b301b248
AM
4352 modulo the page size. */
4353 bfd_size_type page = align;
a49e53ed 4354 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > page)
b301b248
AM
4355 page = bed->maxpagesize;
4356 adjust = vma_page_aligned_bias (sec->vma,
4357 p->p_vaddr + p->p_memsz,
4358 page);
252b5132 4359 p->p_memsz += adjust;
252b5132 4360 }
252b5132
RH
4361 }
4362
4363 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4364 {
b301b248
AM
4365 /* The section at i == 0 is the one that actually contains
4366 everything. */
4a938328
MS
4367 if (i == 0)
4368 {
252b5132 4369 sec->filepos = off;
eea6121a 4370 off += sec->size;
b301b248
AM
4371 p->p_filesz = sec->size;
4372 p->p_memsz = 0;
4373 p->p_align = 1;
252b5132 4374 }
4a938328 4375 else
252b5132 4376 {
b301b248 4377 /* The rest are fake sections that shouldn't be written. */
252b5132 4378 sec->filepos = 0;
eea6121a 4379 sec->size = 0;
b301b248
AM
4380 sec->flags = 0;
4381 continue;
252b5132 4382 }
252b5132
RH
4383 }
4384 else
4385 {
b301b248
AM
4386 if (p->p_type == PT_LOAD)
4387 {
4388 sec->filepos = off;
5efb6261
AM
4389 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4390 1997, and the exact reason for it isn't clear. One
4391 plausible explanation is that it is to work around
4392 a problem we have with linker scripts using data
4393 statements in NOLOAD sections. I don't think it
4394 makes a great deal of sense to have such a section
4395 assigned to a PT_LOAD segment, but apparently
4396 people do this. The data statement results in a
4397 bfd_data_link_order being built, and these need
4398 section contents to write into. Eventually, we get
4399 to _bfd_elf_write_object_contents which writes any
4400 section with contents to the output. Make room
4401 here for the write, so that following segments are
4402 not trashed. */
4403 if ((flags & SEC_LOAD) != 0
4404 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4405 off += sec->size;
4406 }
252b5132 4407
5efb6261 4408 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4409 {
4410 p->p_filesz += sec->size;
4411 p->p_memsz += sec->size;
4412 }
4b6c0f2f
NC
4413 /* PR ld/594: Sections in note segments which are not loaded
4414 contribute to the file size but not the in-memory size. */
4415 else if (p->p_type == PT_NOTE
4416 && (flags & SEC_HAS_CONTENTS) != 0)
4417 p->p_filesz += sec->size;
4418
b301b248
AM
4419 /* .tbss is special. It doesn't contribute to p_memsz of
4420 normal segments. */
4421 else if ((flags & SEC_THREAD_LOCAL) == 0
4422 || p->p_type == PT_TLS)
4423 p->p_memsz += sec->size;
252b5132 4424
13ae64f3 4425 if (p->p_type == PT_TLS
eea6121a 4426 && sec->size == 0
13ae64f3
JJ
4427 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4428 {
4429 struct bfd_link_order *o;
4430 bfd_vma tbss_size = 0;
4431
8423293d 4432 for (o = sec->map_head.link_order; o != NULL; o = o->next)
13ae64f3
JJ
4433 if (tbss_size < o->offset + o->size)
4434 tbss_size = o->offset + o->size;
4435
4436 p->p_memsz += tbss_size;
4437 }
4438
252b5132
RH
4439 if (align > p->p_align
4440 && (p->p_type != PT_LOAD || (abfd->flags & D_PAGED) == 0))
4441 p->p_align = align;
4442 }
4443
4444 if (! m->p_flags_valid)
4445 {
4446 p->p_flags |= PF_R;
4447 if ((flags & SEC_CODE) != 0)
4448 p->p_flags |= PF_X;
4449 if ((flags & SEC_READONLY) == 0)
4450 p->p_flags |= PF_W;
4451 }
4452 }
4453 }
4454
4455 /* Now that we have set the section file positions, we can set up
4456 the file positions for the non PT_LOAD segments. */
4457 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4458 m != NULL;
4459 m = m->next, p++)
4460 {
4461 if (p->p_type != PT_LOAD && m->count > 0)
4462 {
4463 BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs);
229fcec5
MM
4464 /* If the section has not yet been assigned a file position,
4465 do so now. The ARM BPABI requires that .dynamic section
4466 not be marked SEC_ALLOC because it is not part of any
4467 PT_LOAD segment, so it will not be processed above. */
4468 if (p->p_type == PT_DYNAMIC && m->sections[0]->filepos == 0)
4469 {
4470 unsigned int i;
4471 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4472
4473 i = 1;
4474 while (i_shdrpp[i]->bfd_section != m->sections[0])
4475 ++i;
4476 off = (_bfd_elf_assign_file_position_for_section
4477 (i_shdrpp[i], off, TRUE));
4478 p->p_filesz = m->sections[0]->size;
4479 }
252b5132
RH
4480 p->p_offset = m->sections[0]->filepos;
4481 }
4482 if (m->count == 0)
4483 {
4484 if (m->includes_filehdr)
4485 {
4486 p->p_vaddr = filehdr_vaddr;
4487 if (! m->p_paddr_valid)
4488 p->p_paddr = filehdr_paddr;
4489 }
4490 else if (m->includes_phdrs)
4491 {
4492 p->p_vaddr = phdrs_vaddr;
4493 if (! m->p_paddr_valid)
4494 p->p_paddr = phdrs_paddr;
4495 }
8c37241b
JJ
4496 else if (p->p_type == PT_GNU_RELRO)
4497 {
4498 Elf_Internal_Phdr *lp;
4499
4500 for (lp = phdrs; lp < phdrs + count; ++lp)
4501 {
4502 if (lp->p_type == PT_LOAD
4503 && lp->p_vaddr <= link_info->relro_end
4504 && lp->p_vaddr >= link_info->relro_start
4505 && lp->p_vaddr + lp->p_filesz
4506 >= link_info->relro_end)
4507 break;
4508 }
4509
4510 if (lp < phdrs + count
4511 && link_info->relro_end > lp->p_vaddr)
4512 {
4513 p->p_vaddr = lp->p_vaddr;
4514 p->p_paddr = lp->p_paddr;
4515 p->p_offset = lp->p_offset;
4516 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4517 p->p_memsz = p->p_filesz;
4518 p->p_align = 1;
4519 p->p_flags = (lp->p_flags & ~PF_W);
4520 }
4521 else
4522 {
4523 memset (p, 0, sizeof *p);
4524 p->p_type = PT_NULL;
4525 }
4526 }
252b5132
RH
4527 }
4528 }
4529
4530 /* Clear out any program headers we allocated but did not use. */
4531 for (; count < alloc; count++, p++)
4532 {
4533 memset (p, 0, sizeof *p);
4534 p->p_type = PT_NULL;
4535 }
4536
4537 elf_tdata (abfd)->phdr = phdrs;
4538
4539 elf_tdata (abfd)->next_file_pos = off;
4540
4541 /* Write out the program headers. */
dc810e39 4542 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
252b5132 4543 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0)
b34976b6 4544 return FALSE;
252b5132 4545
b34976b6 4546 return TRUE;
252b5132
RH
4547}
4548
4549/* Get the size of the program header.
4550
4551 If this is called by the linker before any of the section VMA's are set, it
4552 can't calculate the correct value for a strange memory layout. This only
4553 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4554 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4555 data segment (exclusive of .interp and .dynamic).
4556
4557 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4558 will be two segments. */
4559
4560static bfd_size_type
217aa764 4561get_program_header_size (bfd *abfd)
252b5132
RH
4562{
4563 size_t segs;
4564 asection *s;
9c5bfbb7 4565 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4566
4567 /* We can't return a different result each time we're called. */
4568 if (elf_tdata (abfd)->program_header_size != 0)
4569 return elf_tdata (abfd)->program_header_size;
4570
4571 if (elf_tdata (abfd)->segment_map != NULL)
4572 {
4573 struct elf_segment_map *m;
4574
4575 segs = 0;
4576 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4577 ++segs;
4578 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4579 return elf_tdata (abfd)->program_header_size;
4580 }
4581
4582 /* Assume we will need exactly two PT_LOAD segments: one for text
4583 and one for data. */
4584 segs = 2;
4585
4586 s = bfd_get_section_by_name (abfd, ".interp");
4587 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4588 {
4589 /* If we have a loadable interpreter section, we need a
4590 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4591 PT_PHDR segment, although that may not be true for all
252b5132
RH
4592 targets. */
4593 segs += 2;
4594 }
4595
4596 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4597 {
4598 /* We need a PT_DYNAMIC segment. */
4599 ++segs;
4600 }
4601
126495ed 4602 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4603 {
4604 /* We need a PT_GNU_EH_FRAME segment. */
4605 ++segs;
4606 }
4607
9ee5e499
JJ
4608 if (elf_tdata (abfd)->stack_flags)
4609 {
4610 /* We need a PT_GNU_STACK segment. */
4611 ++segs;
4612 }
4613
8c37241b
JJ
4614 if (elf_tdata (abfd)->relro)
4615 {
4616 /* We need a PT_GNU_RELRO segment. */
4617 ++segs;
4618 }
4619
252b5132
RH
4620 for (s = abfd->sections; s != NULL; s = s->next)
4621 {
4622 if ((s->flags & SEC_LOAD) != 0
4623 && strncmp (s->name, ".note", 5) == 0)
4624 {
4625 /* We need a PT_NOTE segment. */
4626 ++segs;
4627 }
4628 }
4629
13ae64f3
JJ
4630 for (s = abfd->sections; s != NULL; s = s->next)
4631 {
4632 if (s->flags & SEC_THREAD_LOCAL)
4633 {
4634 /* We need a PT_TLS segment. */
4635 ++segs;
4636 break;
4637 }
4638 }
4639
252b5132
RH
4640 /* Let the backend count up any program headers it might need. */
4641 if (bed->elf_backend_additional_program_headers)
4642 {
4643 int a;
4644
4645 a = (*bed->elf_backend_additional_program_headers) (abfd);
4646 if (a == -1)
4647 abort ();
4648 segs += a;
4649 }
4650
4651 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4652 return elf_tdata (abfd)->program_header_size;
4653}
4654
4655/* Work out the file positions of all the sections. This is called by
4656 _bfd_elf_compute_section_file_positions. All the section sizes and
4657 VMAs must be known before this is called.
4658
e0638f70
AM
4659 Reloc sections come in two flavours: Those processed specially as
4660 "side-channel" data attached to a section to which they apply, and
4661 those that bfd doesn't process as relocations. The latter sort are
4662 stored in a normal bfd section by bfd_section_from_shdr. We don't
4663 consider the former sort here, unless they form part of the loadable
4664 image. Reloc sections not assigned here will be handled later by
4665 assign_file_positions_for_relocs.
252b5132
RH
4666
4667 We also don't set the positions of the .symtab and .strtab here. */
4668
b34976b6 4669static bfd_boolean
c84fca4d
AO
4670assign_file_positions_except_relocs (bfd *abfd,
4671 struct bfd_link_info *link_info)
252b5132
RH
4672{
4673 struct elf_obj_tdata * const tdata = elf_tdata (abfd);
4674 Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd);
4675 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
9ad5cbcf 4676 unsigned int num_sec = elf_numsections (abfd);
252b5132 4677 file_ptr off;
9c5bfbb7 4678 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4679
4680 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4681 && bfd_get_format (abfd) != bfd_core)
4682 {
4683 Elf_Internal_Shdr **hdrpp;
4684 unsigned int i;
4685
4686 /* Start after the ELF header. */
4687 off = i_ehdrp->e_ehsize;
4688
4689 /* We are not creating an executable, which means that we are
4690 not creating a program header, and that the actual order of
4691 the sections in the file is unimportant. */
9ad5cbcf 4692 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4693 {
4694 Elf_Internal_Shdr *hdr;
4695
4696 hdr = *hdrpp;
e0638f70
AM
4697 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4698 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4699 || i == tdata->symtab_section
4700 || i == tdata->symtab_shndx_section
252b5132
RH
4701 || i == tdata->strtab_section)
4702 {
4703 hdr->sh_offset = -1;
252b5132 4704 }
9ad5cbcf 4705 else
b34976b6 4706 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4707
9ad5cbcf
AM
4708 if (i == SHN_LORESERVE - 1)
4709 {
4710 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4711 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4712 }
252b5132
RH
4713 }
4714 }
4715 else
4716 {
4717 unsigned int i;
4718 Elf_Internal_Shdr **hdrpp;
4719
4720 /* Assign file positions for the loaded sections based on the
4721 assignment of sections to segments. */
c84fca4d 4722 if (! assign_file_positions_for_segments (abfd, link_info))
b34976b6 4723 return FALSE;
252b5132
RH
4724
4725 /* Assign file positions for the other sections. */
4726
4727 off = elf_tdata (abfd)->next_file_pos;
9ad5cbcf 4728 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4729 {
4730 Elf_Internal_Shdr *hdr;
4731
4732 hdr = *hdrpp;
4733 if (hdr->bfd_section != NULL
4734 && hdr->bfd_section->filepos != 0)
4735 hdr->sh_offset = hdr->bfd_section->filepos;
4736 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4737 {
4738 ((*_bfd_error_handler)
b301b248
AM
4739 (_("%B: warning: allocated section `%s' not in segment"),
4740 abfd,
252b5132
RH
4741 (hdr->bfd_section == NULL
4742 ? "*unknown*"
4743 : hdr->bfd_section->name)));
4744 if ((abfd->flags & D_PAGED) != 0)
340b6d91
AC
4745 off += vma_page_aligned_bias (hdr->sh_addr, off,
4746 bed->maxpagesize);
252b5132 4747 else
340b6d91
AC
4748 off += vma_page_aligned_bias (hdr->sh_addr, off,
4749 hdr->sh_addralign);
252b5132 4750 off = _bfd_elf_assign_file_position_for_section (hdr, off,
b34976b6 4751 FALSE);
252b5132 4752 }
e0638f70
AM
4753 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4754 && hdr->bfd_section == NULL)
252b5132 4755 || hdr == i_shdrpp[tdata->symtab_section]
9ad5cbcf 4756 || hdr == i_shdrpp[tdata->symtab_shndx_section]
252b5132
RH
4757 || hdr == i_shdrpp[tdata->strtab_section])
4758 hdr->sh_offset = -1;
4759 else
b34976b6 4760 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf
AM
4761
4762 if (i == SHN_LORESERVE - 1)
4763 {
4764 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4765 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4766 }
252b5132
RH
4767 }
4768 }
4769
4770 /* Place the section headers. */
45d6a902 4771 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4772 i_ehdrp->e_shoff = off;
4773 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4774
4775 elf_tdata (abfd)->next_file_pos = off;
4776
b34976b6 4777 return TRUE;
252b5132
RH
4778}
4779
b34976b6 4780static bfd_boolean
217aa764 4781prep_headers (bfd *abfd)
252b5132
RH
4782{
4783 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4784 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4785 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4786 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4787 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4788
4789 i_ehdrp = elf_elfheader (abfd);
4790 i_shdrp = elf_elfsections (abfd);
4791
2b0f7ef9 4792 shstrtab = _bfd_elf_strtab_init ();
252b5132 4793 if (shstrtab == NULL)
b34976b6 4794 return FALSE;
252b5132
RH
4795
4796 elf_shstrtab (abfd) = shstrtab;
4797
4798 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4799 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4800 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4801 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4802
4803 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4804 i_ehdrp->e_ident[EI_DATA] =
4805 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4806 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4807
252b5132
RH
4808 if ((abfd->flags & DYNAMIC) != 0)
4809 i_ehdrp->e_type = ET_DYN;
4810 else if ((abfd->flags & EXEC_P) != 0)
4811 i_ehdrp->e_type = ET_EXEC;
4812 else if (bfd_get_format (abfd) == bfd_core)
4813 i_ehdrp->e_type = ET_CORE;
4814 else
4815 i_ehdrp->e_type = ET_REL;
4816
4817 switch (bfd_get_arch (abfd))
4818 {
4819 case bfd_arch_unknown:
4820 i_ehdrp->e_machine = EM_NONE;
4821 break;
aa4f99bb
AO
4822
4823 /* There used to be a long list of cases here, each one setting
4824 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4825 in the corresponding bfd definition. To avoid duplication,
4826 the switch was removed. Machines that need special handling
4827 can generally do it in elf_backend_final_write_processing(),
4828 unless they need the information earlier than the final write.
4829 Such need can generally be supplied by replacing the tests for
4830 e_machine with the conditions used to determine it. */
252b5132 4831 default:
9c5bfbb7
AM
4832 i_ehdrp->e_machine = bed->elf_machine_code;
4833 }
aa4f99bb 4834
252b5132
RH
4835 i_ehdrp->e_version = bed->s->ev_current;
4836 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4837
c044fabd 4838 /* No program header, for now. */
252b5132
RH
4839 i_ehdrp->e_phoff = 0;
4840 i_ehdrp->e_phentsize = 0;
4841 i_ehdrp->e_phnum = 0;
4842
c044fabd 4843 /* Each bfd section is section header entry. */
252b5132
RH
4844 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4845 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4846
c044fabd 4847 /* If we're building an executable, we'll need a program header table. */
252b5132 4848 if (abfd->flags & EXEC_P)
0e71e495
BE
4849 /* It all happens later. */
4850 ;
252b5132
RH
4851 else
4852 {
4853 i_ehdrp->e_phentsize = 0;
4854 i_phdrp = 0;
4855 i_ehdrp->e_phoff = 0;
4856 }
4857
4858 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4859 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4860 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4861 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4862 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4863 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4864 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4865 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4866 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4867 return FALSE;
252b5132 4868
b34976b6 4869 return TRUE;
252b5132
RH
4870}
4871
4872/* Assign file positions for all the reloc sections which are not part
4873 of the loadable file image. */
4874
4875void
217aa764 4876_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4877{
4878 file_ptr off;
9ad5cbcf 4879 unsigned int i, num_sec;
252b5132
RH
4880 Elf_Internal_Shdr **shdrpp;
4881
4882 off = elf_tdata (abfd)->next_file_pos;
4883
9ad5cbcf
AM
4884 num_sec = elf_numsections (abfd);
4885 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4886 {
4887 Elf_Internal_Shdr *shdrp;
4888
4889 shdrp = *shdrpp;
4890 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4891 && shdrp->sh_offset == -1)
b34976b6 4892 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4893 }
4894
4895 elf_tdata (abfd)->next_file_pos = off;
4896}
4897
b34976b6 4898bfd_boolean
217aa764 4899_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4900{
9c5bfbb7 4901 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4902 Elf_Internal_Ehdr *i_ehdrp;
4903 Elf_Internal_Shdr **i_shdrp;
b34976b6 4904 bfd_boolean failed;
9ad5cbcf 4905 unsigned int count, num_sec;
252b5132
RH
4906
4907 if (! abfd->output_has_begun
217aa764 4908 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4909 return FALSE;
252b5132
RH
4910
4911 i_shdrp = elf_elfsections (abfd);
4912 i_ehdrp = elf_elfheader (abfd);
4913
b34976b6 4914 failed = FALSE;
252b5132
RH
4915 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4916 if (failed)
b34976b6 4917 return FALSE;
252b5132
RH
4918
4919 _bfd_elf_assign_file_positions_for_relocs (abfd);
4920
c044fabd 4921 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4922 num_sec = elf_numsections (abfd);
4923 for (count = 1; count < num_sec; count++)
252b5132
RH
4924 {
4925 if (bed->elf_backend_section_processing)
4926 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4927 if (i_shdrp[count]->contents)
4928 {
dc810e39
AM
4929 bfd_size_type amt = i_shdrp[count]->sh_size;
4930
252b5132 4931 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4932 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4933 return FALSE;
252b5132 4934 }
9ad5cbcf
AM
4935 if (count == SHN_LORESERVE - 1)
4936 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4937 }
4938
4939 /* Write out the section header names. */
26ae6d5e
DJ
4940 if (elf_shstrtab (abfd) != NULL
4941 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
4942 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4943 return FALSE;
252b5132
RH
4944
4945 if (bed->elf_backend_final_write_processing)
4946 (*bed->elf_backend_final_write_processing) (abfd,
4947 elf_tdata (abfd)->linker);
4948
4949 return bed->s->write_shdrs_and_ehdr (abfd);
4950}
4951
b34976b6 4952bfd_boolean
217aa764 4953_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4954{
c044fabd 4955 /* Hopefully this can be done just like an object file. */
252b5132
RH
4956 return _bfd_elf_write_object_contents (abfd);
4957}
c044fabd
KH
4958
4959/* Given a section, search the header to find them. */
4960
252b5132 4961int
198beae2 4962_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4963{
9c5bfbb7 4964 const struct elf_backend_data *bed;
252b5132 4965 int index;
252b5132 4966
9ad5cbcf
AM
4967 if (elf_section_data (asect) != NULL
4968 && elf_section_data (asect)->this_idx != 0)
4969 return elf_section_data (asect)->this_idx;
4970
4971 if (bfd_is_abs_section (asect))
af746e92
AM
4972 index = SHN_ABS;
4973 else if (bfd_is_com_section (asect))
4974 index = SHN_COMMON;
4975 else if (bfd_is_und_section (asect))
4976 index = SHN_UNDEF;
4977 else
6dc132d9 4978 index = -1;
252b5132 4979
af746e92 4980 bed = get_elf_backend_data (abfd);
252b5132
RH
4981 if (bed->elf_backend_section_from_bfd_section)
4982 {
af746e92 4983 int retval = index;
9ad5cbcf 4984
af746e92
AM
4985 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
4986 return retval;
252b5132
RH
4987 }
4988
af746e92
AM
4989 if (index == -1)
4990 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 4991
af746e92 4992 return index;
252b5132
RH
4993}
4994
4995/* Given a BFD symbol, return the index in the ELF symbol table, or -1
4996 on error. */
4997
4998int
217aa764 4999_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5000{
5001 asymbol *asym_ptr = *asym_ptr_ptr;
5002 int idx;
5003 flagword flags = asym_ptr->flags;
5004
5005 /* When gas creates relocations against local labels, it creates its
5006 own symbol for the section, but does put the symbol into the
5007 symbol chain, so udata is 0. When the linker is generating
5008 relocatable output, this section symbol may be for one of the
5009 input sections rather than the output section. */
5010 if (asym_ptr->udata.i == 0
5011 && (flags & BSF_SECTION_SYM)
5012 && asym_ptr->section)
5013 {
5014 int indx;
5015
5016 if (asym_ptr->section->output_section != NULL)
5017 indx = asym_ptr->section->output_section->index;
5018 else
5019 indx = asym_ptr->section->index;
4e89ac30
L
5020 if (indx < elf_num_section_syms (abfd)
5021 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5022 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5023 }
5024
5025 idx = asym_ptr->udata.i;
5026
5027 if (idx == 0)
5028 {
5029 /* This case can occur when using --strip-symbol on a symbol
5030 which is used in a relocation entry. */
5031 (*_bfd_error_handler)
d003868e
AM
5032 (_("%B: symbol `%s' required but not present"),
5033 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5034 bfd_set_error (bfd_error_no_symbols);
5035 return -1;
5036 }
5037
5038#if DEBUG & 4
5039 {
5040 fprintf (stderr,
661a3fd4 5041 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5042 (long) asym_ptr, asym_ptr->name, idx, flags,
5043 elf_symbol_flags (flags));
5044 fflush (stderr);
5045 }
5046#endif
5047
5048 return idx;
5049}
5050
5051/* Copy private BFD data. This copies any program header information. */
5052
b34976b6 5053static bfd_boolean
217aa764 5054copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132 5055{
b34976b6
AM
5056 Elf_Internal_Ehdr *iehdr;
5057 struct elf_segment_map *map;
5058 struct elf_segment_map *map_first;
5059 struct elf_segment_map **pointer_to_map;
5060 Elf_Internal_Phdr *segment;
5061 asection *section;
5062 unsigned int i;
5063 unsigned int num_segments;
5064 bfd_boolean phdr_included = FALSE;
5065 bfd_vma maxpagesize;
5066 struct elf_segment_map *phdr_adjust_seg = NULL;
5067 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5068 const struct elf_backend_data *bed;
bc67d8a6 5069
c044fabd 5070 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 5071 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5072 return TRUE;
252b5132
RH
5073
5074 if (elf_tdata (ibfd)->phdr == NULL)
b34976b6 5075 return TRUE;
252b5132 5076
caf47ea6 5077 bed = get_elf_backend_data (ibfd);
252b5132
RH
5078 iehdr = elf_elfheader (ibfd);
5079
bc67d8a6 5080 map_first = NULL;
c044fabd 5081 pointer_to_map = &map_first;
252b5132
RH
5082
5083 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5084 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5085
5086 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5087#define SEGMENT_END(segment, start) \
5088 (start + (segment->p_memsz > segment->p_filesz \
5089 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5090
eecdbe52
JJ
5091#define SECTION_SIZE(section, segment) \
5092 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5093 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5094 ? section->size : 0)
eecdbe52 5095
b34976b6 5096 /* Returns TRUE if the given section is contained within
bc67d8a6 5097 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5098#define IS_CONTAINED_BY_VMA(section, segment) \
5099 (section->vma >= segment->p_vaddr \
eecdbe52 5100 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5101 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5102
b34976b6 5103 /* Returns TRUE if the given section is contained within
bc67d8a6 5104 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5105#define IS_CONTAINED_BY_LMA(section, segment, base) \
5106 (section->lma >= base \
eecdbe52 5107 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5108 <= SEGMENT_END (segment, base)))
252b5132 5109
c044fabd 5110 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5111#define IS_COREFILE_NOTE(p, s) \
5112 (p->p_type == PT_NOTE \
5113 && bfd_get_format (ibfd) == bfd_core \
5114 && s->vma == 0 && s->lma == 0 \
5115 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5116 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5117 <= p->p_offset + p->p_filesz))
252b5132
RH
5118
5119 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5120 linker, which generates a PT_INTERP section with p_vaddr and
5121 p_memsz set to 0. */
aecc8f8a
AM
5122#define IS_SOLARIS_PT_INTERP(p, s) \
5123 (p->p_vaddr == 0 \
5124 && p->p_paddr == 0 \
5125 && p->p_memsz == 0 \
5126 && p->p_filesz > 0 \
5127 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5128 && s->size > 0 \
aecc8f8a 5129 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5130 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5131 <= p->p_offset + p->p_filesz))
5c440b1e 5132
bc67d8a6
NC
5133 /* Decide if the given section should be included in the given segment.
5134 A section will be included if:
f5ffc919
NC
5135 1. It is within the address space of the segment -- we use the LMA
5136 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5137 2. It is an allocated segment,
5138 3. There is an output section associated with it,
eecdbe52 5139 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5140 5. PT_GNU_STACK segments do not include any sections.
5141 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5142 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5143 8. PT_DYNAMIC should not contain empty sections at the beginning
5144 (with the possible exception of .dynamic). */
caf47ea6 5145#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5146 ((((segment->p_paddr \
5147 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5148 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5149 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5150 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5151 && section->output_section != NULL \
03394ac9 5152 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5153 && (segment->p_type != PT_TLS \
5154 || (section->flags & SEC_THREAD_LOCAL)) \
5155 && (segment->p_type == PT_LOAD \
5156 || segment->p_type == PT_TLS \
5157 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5158 && (segment->p_type != PT_DYNAMIC \
5159 || SECTION_SIZE (section, segment) > 0 \
5160 || (segment->p_paddr \
5161 ? segment->p_paddr != section->lma \
5162 : segment->p_vaddr != section->vma) \
5163 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5164 == 0)) \
82e51918 5165 && ! section->segment_mark)
bc67d8a6 5166
b34976b6 5167 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5168#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5169 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5170
5171 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5172 their VMA address ranges and their LMA address ranges overlap.
5173 It is possible to have overlapping VMA ranges without overlapping LMA
5174 ranges. RedBoot images for example can have both .data and .bss mapped
5175 to the same VMA range, but with the .data section mapped to a different
5176 LMA. */
aecc8f8a 5177#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5178 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5179 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5180 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5181 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5182
5183 /* Initialise the segment mark field. */
5184 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5185 section->segment_mark = FALSE;
bc67d8a6 5186
252b5132 5187 /* Scan through the segments specified in the program header
bc67d8a6 5188 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5189 in the loadable segments. These can be created by weird
aecc8f8a 5190 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5191 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5192 i < num_segments;
c044fabd 5193 i++, segment++)
252b5132 5194 {
252b5132 5195 unsigned int j;
c044fabd 5196 Elf_Internal_Phdr *segment2;
252b5132 5197
aecc8f8a
AM
5198 if (segment->p_type == PT_INTERP)
5199 for (section = ibfd->sections; section; section = section->next)
5200 if (IS_SOLARIS_PT_INTERP (segment, section))
5201 {
5202 /* Mininal change so that the normal section to segment
4cc11e76 5203 assignment code will work. */
aecc8f8a
AM
5204 segment->p_vaddr = section->vma;
5205 break;
5206 }
5207
bc67d8a6
NC
5208 if (segment->p_type != PT_LOAD)
5209 continue;
c044fabd 5210
bc67d8a6 5211 /* Determine if this segment overlaps any previous segments. */
c044fabd 5212 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5213 {
5214 bfd_signed_vma extra_length;
c044fabd 5215
bc67d8a6
NC
5216 if (segment2->p_type != PT_LOAD
5217 || ! SEGMENT_OVERLAPS (segment, segment2))
5218 continue;
c044fabd 5219
bc67d8a6
NC
5220 /* Merge the two segments together. */
5221 if (segment2->p_vaddr < segment->p_vaddr)
5222 {
c044fabd
KH
5223 /* Extend SEGMENT2 to include SEGMENT and then delete
5224 SEGMENT. */
bc67d8a6
NC
5225 extra_length =
5226 SEGMENT_END (segment, segment->p_vaddr)
5227 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5228
bc67d8a6
NC
5229 if (extra_length > 0)
5230 {
5231 segment2->p_memsz += extra_length;
5232 segment2->p_filesz += extra_length;
5233 }
c044fabd 5234
bc67d8a6 5235 segment->p_type = PT_NULL;
c044fabd 5236
bc67d8a6
NC
5237 /* Since we have deleted P we must restart the outer loop. */
5238 i = 0;
5239 segment = elf_tdata (ibfd)->phdr;
5240 break;
5241 }
5242 else
5243 {
c044fabd
KH
5244 /* Extend SEGMENT to include SEGMENT2 and then delete
5245 SEGMENT2. */
bc67d8a6
NC
5246 extra_length =
5247 SEGMENT_END (segment2, segment2->p_vaddr)
5248 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5249
bc67d8a6
NC
5250 if (extra_length > 0)
5251 {
5252 segment->p_memsz += extra_length;
5253 segment->p_filesz += extra_length;
5254 }
c044fabd 5255
bc67d8a6
NC
5256 segment2->p_type = PT_NULL;
5257 }
5258 }
5259 }
c044fabd 5260
bc67d8a6
NC
5261 /* The second scan attempts to assign sections to segments. */
5262 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5263 i < num_segments;
5264 i ++, segment ++)
5265 {
5266 unsigned int section_count;
5267 asection ** sections;
5268 asection * output_section;
5269 unsigned int isec;
5270 bfd_vma matching_lma;
5271 bfd_vma suggested_lma;
5272 unsigned int j;
dc810e39 5273 bfd_size_type amt;
bc67d8a6
NC
5274
5275 if (segment->p_type == PT_NULL)
5276 continue;
c044fabd 5277
bc67d8a6 5278 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5279 for (section = ibfd->sections, section_count = 0;
5280 section != NULL;
5281 section = section->next)
caf47ea6 5282 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5283 ++section_count;
811072d8 5284
b5f852ea
NC
5285 /* Allocate a segment map big enough to contain
5286 all of the sections we have selected. */
dc810e39
AM
5287 amt = sizeof (struct elf_segment_map);
5288 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5289 map = bfd_alloc (obfd, amt);
bc67d8a6 5290 if (map == NULL)
b34976b6 5291 return FALSE;
252b5132
RH
5292
5293 /* Initialise the fields of the segment map. Default to
5294 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5295 map->next = NULL;
5296 map->p_type = segment->p_type;
5297 map->p_flags = segment->p_flags;
5298 map->p_flags_valid = 1;
5299 map->p_paddr = segment->p_paddr;
5300 map->p_paddr_valid = 1;
252b5132
RH
5301
5302 /* Determine if this segment contains the ELF file header
5303 and if it contains the program headers themselves. */
bc67d8a6
NC
5304 map->includes_filehdr = (segment->p_offset == 0
5305 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5306
bc67d8a6 5307 map->includes_phdrs = 0;
252b5132 5308
bc67d8a6 5309 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5310 {
bc67d8a6
NC
5311 map->includes_phdrs =
5312 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5313 && (segment->p_offset + segment->p_filesz
252b5132
RH
5314 >= ((bfd_vma) iehdr->e_phoff
5315 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5316
bc67d8a6 5317 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5318 phdr_included = TRUE;
252b5132
RH
5319 }
5320
bc67d8a6 5321 if (section_count == 0)
252b5132
RH
5322 {
5323 /* Special segments, such as the PT_PHDR segment, may contain
5324 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5325 something. They are allowed by the ELF spec however, so only
5326 a warning is produced. */
bc67d8a6 5327 if (segment->p_type == PT_LOAD)
caf47ea6 5328 (*_bfd_error_handler)
d003868e
AM
5329 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5330 ibfd);
252b5132 5331
bc67d8a6 5332 map->count = 0;
c044fabd
KH
5333 *pointer_to_map = map;
5334 pointer_to_map = &map->next;
252b5132
RH
5335
5336 continue;
5337 }
5338
5339 /* Now scan the sections in the input BFD again and attempt
5340 to add their corresponding output sections to the segment map.
5341 The problem here is how to handle an output section which has
5342 been moved (ie had its LMA changed). There are four possibilities:
5343
5344 1. None of the sections have been moved.
5345 In this case we can continue to use the segment LMA from the
5346 input BFD.
5347
5348 2. All of the sections have been moved by the same amount.
5349 In this case we can change the segment's LMA to match the LMA
5350 of the first section.
5351
5352 3. Some of the sections have been moved, others have not.
5353 In this case those sections which have not been moved can be
5354 placed in the current segment which will have to have its size,
5355 and possibly its LMA changed, and a new segment or segments will
5356 have to be created to contain the other sections.
5357
b5f852ea 5358 4. The sections have been moved, but not by the same amount.
252b5132
RH
5359 In this case we can change the segment's LMA to match the LMA
5360 of the first section and we will have to create a new segment
5361 or segments to contain the other sections.
5362
5363 In order to save time, we allocate an array to hold the section
5364 pointers that we are interested in. As these sections get assigned
5365 to a segment, they are removed from this array. */
5366
0b14c2aa
L
5367 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5368 to work around this long long bug. */
5369 amt = section_count * sizeof (asection *);
217aa764 5370 sections = bfd_malloc (amt);
252b5132 5371 if (sections == NULL)
b34976b6 5372 return FALSE;
252b5132
RH
5373
5374 /* Step One: Scan for segment vs section LMA conflicts.
5375 Also add the sections to the section array allocated above.
5376 Also add the sections to the current segment. In the common
5377 case, where the sections have not been moved, this means that
5378 we have completely filled the segment, and there is nothing
5379 more to do. */
252b5132 5380 isec = 0;
72730e0c 5381 matching_lma = 0;
252b5132
RH
5382 suggested_lma = 0;
5383
bc67d8a6
NC
5384 for (j = 0, section = ibfd->sections;
5385 section != NULL;
5386 section = section->next)
252b5132 5387 {
caf47ea6 5388 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5389 {
bc67d8a6
NC
5390 output_section = section->output_section;
5391
5392 sections[j ++] = section;
252b5132
RH
5393
5394 /* The Solaris native linker always sets p_paddr to 0.
5395 We try to catch that case here, and set it to the
5e8d7549
NC
5396 correct value. Note - some backends require that
5397 p_paddr be left as zero. */
bc67d8a6 5398 if (segment->p_paddr == 0
4455705d 5399 && segment->p_vaddr != 0
5e8d7549 5400 && (! bed->want_p_paddr_set_to_zero)
252b5132 5401 && isec == 0
bc67d8a6
NC
5402 && output_section->lma != 0
5403 && (output_section->vma == (segment->p_vaddr
5404 + (map->includes_filehdr
5405 ? iehdr->e_ehsize
5406 : 0)
5407 + (map->includes_phdrs
079e9a2f
AM
5408 ? (iehdr->e_phnum
5409 * iehdr->e_phentsize)
bc67d8a6
NC
5410 : 0))))
5411 map->p_paddr = segment->p_vaddr;
252b5132
RH
5412
5413 /* Match up the physical address of the segment with the
5414 LMA address of the output section. */
bc67d8a6 5415 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5416 || IS_COREFILE_NOTE (segment, section)
5417 || (bed->want_p_paddr_set_to_zero &&
5418 IS_CONTAINED_BY_VMA (output_section, segment))
5419 )
252b5132
RH
5420 {
5421 if (matching_lma == 0)
bc67d8a6 5422 matching_lma = output_section->lma;
252b5132
RH
5423
5424 /* We assume that if the section fits within the segment
bc67d8a6 5425 then it does not overlap any other section within that
252b5132 5426 segment. */
bc67d8a6 5427 map->sections[isec ++] = output_section;
252b5132
RH
5428 }
5429 else if (suggested_lma == 0)
bc67d8a6 5430 suggested_lma = output_section->lma;
252b5132
RH
5431 }
5432 }
5433
bc67d8a6 5434 BFD_ASSERT (j == section_count);
252b5132
RH
5435
5436 /* Step Two: Adjust the physical address of the current segment,
5437 if necessary. */
bc67d8a6 5438 if (isec == section_count)
252b5132
RH
5439 {
5440 /* All of the sections fitted within the segment as currently
5441 specified. This is the default case. Add the segment to
5442 the list of built segments and carry on to process the next
5443 program header in the input BFD. */
bc67d8a6 5444 map->count = section_count;
c044fabd
KH
5445 *pointer_to_map = map;
5446 pointer_to_map = &map->next;
252b5132
RH
5447
5448 free (sections);
5449 continue;
5450 }
252b5132
RH
5451 else
5452 {
72730e0c
AM
5453 if (matching_lma != 0)
5454 {
5455 /* At least one section fits inside the current segment.
5456 Keep it, but modify its physical address to match the
5457 LMA of the first section that fitted. */
bc67d8a6 5458 map->p_paddr = matching_lma;
72730e0c
AM
5459 }
5460 else
5461 {
5462 /* None of the sections fitted inside the current segment.
5463 Change the current segment's physical address to match
5464 the LMA of the first section. */
bc67d8a6 5465 map->p_paddr = suggested_lma;
72730e0c
AM
5466 }
5467
bc67d8a6
NC
5468 /* Offset the segment physical address from the lma
5469 to allow for space taken up by elf headers. */
5470 if (map->includes_filehdr)
5471 map->p_paddr -= iehdr->e_ehsize;
252b5132 5472
bc67d8a6
NC
5473 if (map->includes_phdrs)
5474 {
5475 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5476
5477 /* iehdr->e_phnum is just an estimate of the number
5478 of program headers that we will need. Make a note
5479 here of the number we used and the segment we chose
5480 to hold these headers, so that we can adjust the
5481 offset when we know the correct value. */
5482 phdr_adjust_num = iehdr->e_phnum;
5483 phdr_adjust_seg = map;
5484 }
252b5132
RH
5485 }
5486
5487 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5488 those that fit to the current segment and removing them from the
252b5132
RH
5489 sections array; but making sure not to leave large gaps. Once all
5490 possible sections have been assigned to the current segment it is
5491 added to the list of built segments and if sections still remain
5492 to be assigned, a new segment is constructed before repeating
5493 the loop. */
5494 isec = 0;
5495 do
5496 {
bc67d8a6 5497 map->count = 0;
252b5132
RH
5498 suggested_lma = 0;
5499
5500 /* Fill the current segment with sections that fit. */
bc67d8a6 5501 for (j = 0; j < section_count; j++)
252b5132 5502 {
bc67d8a6 5503 section = sections[j];
252b5132 5504
bc67d8a6 5505 if (section == NULL)
252b5132
RH
5506 continue;
5507
bc67d8a6 5508 output_section = section->output_section;
252b5132 5509
bc67d8a6 5510 BFD_ASSERT (output_section != NULL);
c044fabd 5511
bc67d8a6
NC
5512 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5513 || IS_COREFILE_NOTE (segment, section))
252b5132 5514 {
bc67d8a6 5515 if (map->count == 0)
252b5132
RH
5516 {
5517 /* If the first section in a segment does not start at
bc67d8a6
NC
5518 the beginning of the segment, then something is
5519 wrong. */
5520 if (output_section->lma !=
5521 (map->p_paddr
5522 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5523 + (map->includes_phdrs
5524 ? iehdr->e_phnum * iehdr->e_phentsize
5525 : 0)))
252b5132
RH
5526 abort ();
5527 }
5528 else
5529 {
5530 asection * prev_sec;
252b5132 5531
bc67d8a6 5532 prev_sec = map->sections[map->count - 1];
252b5132
RH
5533
5534 /* If the gap between the end of the previous section
bc67d8a6
NC
5535 and the start of this section is more than
5536 maxpagesize then we need to start a new segment. */
eea6121a 5537 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5538 maxpagesize)
caf47ea6 5539 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5540 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5541 > output_section->lma))
252b5132
RH
5542 {
5543 if (suggested_lma == 0)
bc67d8a6 5544 suggested_lma = output_section->lma;
252b5132
RH
5545
5546 continue;
5547 }
5548 }
5549
bc67d8a6 5550 map->sections[map->count++] = output_section;
252b5132
RH
5551 ++isec;
5552 sections[j] = NULL;
b34976b6 5553 section->segment_mark = TRUE;
252b5132
RH
5554 }
5555 else if (suggested_lma == 0)
bc67d8a6 5556 suggested_lma = output_section->lma;
252b5132
RH
5557 }
5558
bc67d8a6 5559 BFD_ASSERT (map->count > 0);
252b5132
RH
5560
5561 /* Add the current segment to the list of built segments. */
c044fabd
KH
5562 *pointer_to_map = map;
5563 pointer_to_map = &map->next;
252b5132 5564
bc67d8a6 5565 if (isec < section_count)
252b5132
RH
5566 {
5567 /* We still have not allocated all of the sections to
5568 segments. Create a new segment here, initialise it
5569 and carry on looping. */
dc810e39
AM
5570 amt = sizeof (struct elf_segment_map);
5571 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5572 map = bfd_alloc (obfd, amt);
bc67d8a6 5573 if (map == NULL)
5ed6aba4
NC
5574 {
5575 free (sections);
5576 return FALSE;
5577 }
252b5132
RH
5578
5579 /* Initialise the fields of the segment map. Set the physical
5580 physical address to the LMA of the first section that has
5581 not yet been assigned. */
bc67d8a6
NC
5582 map->next = NULL;
5583 map->p_type = segment->p_type;
5584 map->p_flags = segment->p_flags;
5585 map->p_flags_valid = 1;
5586 map->p_paddr = suggested_lma;
5587 map->p_paddr_valid = 1;
5588 map->includes_filehdr = 0;
5589 map->includes_phdrs = 0;
252b5132
RH
5590 }
5591 }
bc67d8a6 5592 while (isec < section_count);
252b5132
RH
5593
5594 free (sections);
5595 }
5596
5597 /* The Solaris linker creates program headers in which all the
5598 p_paddr fields are zero. When we try to objcopy or strip such a
5599 file, we get confused. Check for this case, and if we find it
5600 reset the p_paddr_valid fields. */
bc67d8a6
NC
5601 for (map = map_first; map != NULL; map = map->next)
5602 if (map->p_paddr != 0)
252b5132 5603 break;
bc67d8a6 5604 if (map == NULL)
b5f852ea
NC
5605 for (map = map_first; map != NULL; map = map->next)
5606 map->p_paddr_valid = 0;
252b5132 5607
bc67d8a6
NC
5608 elf_tdata (obfd)->segment_map = map_first;
5609
5610 /* If we had to estimate the number of program headers that were
9ad5cbcf 5611 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5612 the offset if necessary. */
5613 if (phdr_adjust_seg != NULL)
5614 {
5615 unsigned int count;
c044fabd 5616
bc67d8a6 5617 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5618 count++;
252b5132 5619
bc67d8a6
NC
5620 if (count > phdr_adjust_num)
5621 phdr_adjust_seg->p_paddr
5622 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5623 }
c044fabd 5624
bc67d8a6 5625#undef SEGMENT_END
eecdbe52 5626#undef SECTION_SIZE
bc67d8a6
NC
5627#undef IS_CONTAINED_BY_VMA
5628#undef IS_CONTAINED_BY_LMA
252b5132 5629#undef IS_COREFILE_NOTE
bc67d8a6
NC
5630#undef IS_SOLARIS_PT_INTERP
5631#undef INCLUDE_SECTION_IN_SEGMENT
5632#undef SEGMENT_AFTER_SEGMENT
5633#undef SEGMENT_OVERLAPS
b34976b6 5634 return TRUE;
252b5132
RH
5635}
5636
5637/* Copy private section information. This copies over the entsize
5638 field, and sometimes the info field. */
5639
b34976b6 5640bfd_boolean
217aa764
AM
5641_bfd_elf_copy_private_section_data (bfd *ibfd,
5642 asection *isec,
5643 bfd *obfd,
5644 asection *osec)
252b5132
RH
5645{
5646 Elf_Internal_Shdr *ihdr, *ohdr;
5647
5648 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5649 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5650 return TRUE;
252b5132 5651
252b5132
RH
5652 ihdr = &elf_section_data (isec)->this_hdr;
5653 ohdr = &elf_section_data (osec)->this_hdr;
5654
5655 ohdr->sh_entsize = ihdr->sh_entsize;
5656
5657 if (ihdr->sh_type == SHT_SYMTAB
5658 || ihdr->sh_type == SHT_DYNSYM
5659 || ihdr->sh_type == SHT_GNU_verneed
5660 || ihdr->sh_type == SHT_GNU_verdef)
5661 ohdr->sh_info = ihdr->sh_info;
5662
9dce4196
AM
5663 /* Set things up for objcopy. The output SHT_GROUP section will
5664 have its elf_next_in_group pointing back to the input group
278d8f37
L
5665 members. Ignore linker created group section. See
5666 elfNN_ia64_object_p in elfxx-ia64.c. */
5667 if (elf_sec_group (isec) == NULL
5668 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5669 {
5670 elf_next_in_group (osec) = elf_next_in_group (isec);
5671 elf_group_name (osec) = elf_group_name (isec);
5672 }
9dce4196 5673
68bfbfcc 5674 osec->use_rela_p = isec->use_rela_p;
bf572ba0 5675
b34976b6 5676 return TRUE;
252b5132
RH
5677}
5678
80fccad2
BW
5679/* Copy private header information. */
5680
5681bfd_boolean
5682_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
5683{
5684 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5685 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5686 return TRUE;
5687
5688 /* Copy over private BFD data if it has not already been copied.
5689 This must be done here, rather than in the copy_private_bfd_data
5690 entry point, because the latter is called after the section
5691 contents have been set, which means that the program headers have
5692 already been worked out. */
5693 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
5694 {
5695 if (! copy_private_bfd_data (ibfd, obfd))
5696 return FALSE;
5697 }
5698
5699 return TRUE;
5700}
5701
252b5132
RH
5702/* Copy private symbol information. If this symbol is in a section
5703 which we did not map into a BFD section, try to map the section
5704 index correctly. We use special macro definitions for the mapped
5705 section indices; these definitions are interpreted by the
5706 swap_out_syms function. */
5707
9ad5cbcf
AM
5708#define MAP_ONESYMTAB (SHN_HIOS + 1)
5709#define MAP_DYNSYMTAB (SHN_HIOS + 2)
5710#define MAP_STRTAB (SHN_HIOS + 3)
5711#define MAP_SHSTRTAB (SHN_HIOS + 4)
5712#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 5713
b34976b6 5714bfd_boolean
217aa764
AM
5715_bfd_elf_copy_private_symbol_data (bfd *ibfd,
5716 asymbol *isymarg,
5717 bfd *obfd,
5718 asymbol *osymarg)
252b5132
RH
5719{
5720 elf_symbol_type *isym, *osym;
5721
5722 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5723 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5724 return TRUE;
252b5132
RH
5725
5726 isym = elf_symbol_from (ibfd, isymarg);
5727 osym = elf_symbol_from (obfd, osymarg);
5728
5729 if (isym != NULL
5730 && osym != NULL
5731 && bfd_is_abs_section (isym->symbol.section))
5732 {
5733 unsigned int shndx;
5734
5735 shndx = isym->internal_elf_sym.st_shndx;
5736 if (shndx == elf_onesymtab (ibfd))
5737 shndx = MAP_ONESYMTAB;
5738 else if (shndx == elf_dynsymtab (ibfd))
5739 shndx = MAP_DYNSYMTAB;
5740 else if (shndx == elf_tdata (ibfd)->strtab_section)
5741 shndx = MAP_STRTAB;
5742 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
5743 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
5744 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
5745 shndx = MAP_SYM_SHNDX;
252b5132
RH
5746 osym->internal_elf_sym.st_shndx = shndx;
5747 }
5748
b34976b6 5749 return TRUE;
252b5132
RH
5750}
5751
5752/* Swap out the symbols. */
5753
b34976b6 5754static bfd_boolean
217aa764
AM
5755swap_out_syms (bfd *abfd,
5756 struct bfd_strtab_hash **sttp,
5757 int relocatable_p)
252b5132 5758{
9c5bfbb7 5759 const struct elf_backend_data *bed;
079e9a2f
AM
5760 int symcount;
5761 asymbol **syms;
5762 struct bfd_strtab_hash *stt;
5763 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 5764 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 5765 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
5766 bfd_byte *outbound_syms;
5767 bfd_byte *outbound_shndx;
079e9a2f
AM
5768 int idx;
5769 bfd_size_type amt;
174fd7f9 5770 bfd_boolean name_local_sections;
252b5132
RH
5771
5772 if (!elf_map_symbols (abfd))
b34976b6 5773 return FALSE;
252b5132 5774
c044fabd 5775 /* Dump out the symtabs. */
079e9a2f
AM
5776 stt = _bfd_elf_stringtab_init ();
5777 if (stt == NULL)
b34976b6 5778 return FALSE;
252b5132 5779
079e9a2f
AM
5780 bed = get_elf_backend_data (abfd);
5781 symcount = bfd_get_symcount (abfd);
5782 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5783 symtab_hdr->sh_type = SHT_SYMTAB;
5784 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
5785 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
5786 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 5787 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
5788
5789 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5790 symstrtab_hdr->sh_type = SHT_STRTAB;
5791
5792 amt = (bfd_size_type) (1 + symcount) * bed->s->sizeof_sym;
5793 outbound_syms = bfd_alloc (abfd, amt);
5794 if (outbound_syms == NULL)
5ed6aba4
NC
5795 {
5796 _bfd_stringtab_free (stt);
5797 return FALSE;
5798 }
217aa764 5799 symtab_hdr->contents = outbound_syms;
252b5132 5800
9ad5cbcf
AM
5801 outbound_shndx = NULL;
5802 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5803 if (symtab_shndx_hdr->sh_name != 0)
5804 {
5805 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
1126897b 5806 outbound_shndx = bfd_zalloc (abfd, amt);
9ad5cbcf 5807 if (outbound_shndx == NULL)
5ed6aba4
NC
5808 {
5809 _bfd_stringtab_free (stt);
5810 return FALSE;
5811 }
5812
9ad5cbcf
AM
5813 symtab_shndx_hdr->contents = outbound_shndx;
5814 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5815 symtab_shndx_hdr->sh_size = amt;
5816 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5817 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5818 }
5819
589e6347 5820 /* Now generate the data (for "contents"). */
079e9a2f
AM
5821 {
5822 /* Fill in zeroth symbol and swap it out. */
5823 Elf_Internal_Sym sym;
5824 sym.st_name = 0;
5825 sym.st_value = 0;
5826 sym.st_size = 0;
5827 sym.st_info = 0;
5828 sym.st_other = 0;
5829 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 5830 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5831 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5832 if (outbound_shndx != NULL)
5833 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5834 }
252b5132 5835
174fd7f9
RS
5836 name_local_sections
5837 = (bed->elf_backend_name_local_section_symbols
5838 && bed->elf_backend_name_local_section_symbols (abfd));
5839
079e9a2f
AM
5840 syms = bfd_get_outsymbols (abfd);
5841 for (idx = 0; idx < symcount; idx++)
252b5132 5842 {
252b5132 5843 Elf_Internal_Sym sym;
079e9a2f
AM
5844 bfd_vma value = syms[idx]->value;
5845 elf_symbol_type *type_ptr;
5846 flagword flags = syms[idx]->flags;
5847 int type;
252b5132 5848
174fd7f9
RS
5849 if (!name_local_sections
5850 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
5851 {
5852 /* Local section symbols have no name. */
5853 sym.st_name = 0;
5854 }
5855 else
5856 {
5857 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
5858 syms[idx]->name,
b34976b6 5859 TRUE, FALSE);
079e9a2f 5860 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
5861 {
5862 _bfd_stringtab_free (stt);
5863 return FALSE;
5864 }
079e9a2f 5865 }
252b5132 5866
079e9a2f 5867 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 5868
079e9a2f
AM
5869 if ((flags & BSF_SECTION_SYM) == 0
5870 && bfd_is_com_section (syms[idx]->section))
5871 {
5872 /* ELF common symbols put the alignment into the `value' field,
5873 and the size into the `size' field. This is backwards from
5874 how BFD handles it, so reverse it here. */
5875 sym.st_size = value;
5876 if (type_ptr == NULL
5877 || type_ptr->internal_elf_sym.st_value == 0)
5878 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
5879 else
5880 sym.st_value = type_ptr->internal_elf_sym.st_value;
5881 sym.st_shndx = _bfd_elf_section_from_bfd_section
5882 (abfd, syms[idx]->section);
5883 }
5884 else
5885 {
5886 asection *sec = syms[idx]->section;
5887 int shndx;
252b5132 5888
079e9a2f
AM
5889 if (sec->output_section)
5890 {
5891 value += sec->output_offset;
5892 sec = sec->output_section;
5893 }
589e6347 5894
079e9a2f
AM
5895 /* Don't add in the section vma for relocatable output. */
5896 if (! relocatable_p)
5897 value += sec->vma;
5898 sym.st_value = value;
5899 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
5900
5901 if (bfd_is_abs_section (sec)
5902 && type_ptr != NULL
5903 && type_ptr->internal_elf_sym.st_shndx != 0)
5904 {
5905 /* This symbol is in a real ELF section which we did
5906 not create as a BFD section. Undo the mapping done
5907 by copy_private_symbol_data. */
5908 shndx = type_ptr->internal_elf_sym.st_shndx;
5909 switch (shndx)
5910 {
5911 case MAP_ONESYMTAB:
5912 shndx = elf_onesymtab (abfd);
5913 break;
5914 case MAP_DYNSYMTAB:
5915 shndx = elf_dynsymtab (abfd);
5916 break;
5917 case MAP_STRTAB:
5918 shndx = elf_tdata (abfd)->strtab_section;
5919 break;
5920 case MAP_SHSTRTAB:
5921 shndx = elf_tdata (abfd)->shstrtab_section;
5922 break;
9ad5cbcf
AM
5923 case MAP_SYM_SHNDX:
5924 shndx = elf_tdata (abfd)->symtab_shndx_section;
5925 break;
079e9a2f
AM
5926 default:
5927 break;
5928 }
5929 }
5930 else
5931 {
5932 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 5933
079e9a2f
AM
5934 if (shndx == -1)
5935 {
5936 asection *sec2;
5937
5938 /* Writing this would be a hell of a lot easier if
5939 we had some decent documentation on bfd, and
5940 knew what to expect of the library, and what to
5941 demand of applications. For example, it
5942 appears that `objcopy' might not set the
5943 section of a symbol to be a section that is
5944 actually in the output file. */
5945 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
5946 if (sec2 == NULL)
5947 {
5948 _bfd_error_handler (_("\
5949Unable to find equivalent output section for symbol '%s' from section '%s'"),
5950 syms[idx]->name ? syms[idx]->name : "<Local sym>",
5951 sec->name);
811072d8 5952 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 5953 _bfd_stringtab_free (stt);
589e6347
NC
5954 return FALSE;
5955 }
811072d8 5956
079e9a2f
AM
5957 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
5958 BFD_ASSERT (shndx != -1);
5959 }
5960 }
252b5132 5961
079e9a2f
AM
5962 sym.st_shndx = shndx;
5963 }
252b5132 5964
13ae64f3
JJ
5965 if ((flags & BSF_THREAD_LOCAL) != 0)
5966 type = STT_TLS;
5967 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
5968 type = STT_FUNC;
5969 else if ((flags & BSF_OBJECT) != 0)
5970 type = STT_OBJECT;
5971 else
5972 type = STT_NOTYPE;
252b5132 5973
13ae64f3
JJ
5974 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
5975 type = STT_TLS;
5976
589e6347 5977 /* Processor-specific types. */
079e9a2f
AM
5978 if (type_ptr != NULL
5979 && bed->elf_backend_get_symbol_type)
5980 type = ((*bed->elf_backend_get_symbol_type)
5981 (&type_ptr->internal_elf_sym, type));
252b5132 5982
079e9a2f
AM
5983 if (flags & BSF_SECTION_SYM)
5984 {
5985 if (flags & BSF_GLOBAL)
5986 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
5987 else
5988 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5989 }
5990 else if (bfd_is_com_section (syms[idx]->section))
5991 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
5992 else if (bfd_is_und_section (syms[idx]->section))
5993 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
5994 ? STB_WEAK
5995 : STB_GLOBAL),
5996 type);
5997 else if (flags & BSF_FILE)
5998 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
5999 else
6000 {
6001 int bind = STB_LOCAL;
252b5132 6002
079e9a2f
AM
6003 if (flags & BSF_LOCAL)
6004 bind = STB_LOCAL;
6005 else if (flags & BSF_WEAK)
6006 bind = STB_WEAK;
6007 else if (flags & BSF_GLOBAL)
6008 bind = STB_GLOBAL;
252b5132 6009
079e9a2f
AM
6010 sym.st_info = ELF_ST_INFO (bind, type);
6011 }
252b5132 6012
079e9a2f
AM
6013 if (type_ptr != NULL)
6014 sym.st_other = type_ptr->internal_elf_sym.st_other;
6015 else
6016 sym.st_other = 0;
252b5132 6017
9ad5cbcf 6018 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6019 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6020 if (outbound_shndx != NULL)
6021 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6022 }
252b5132 6023
079e9a2f
AM
6024 *sttp = stt;
6025 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6026 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6027
079e9a2f
AM
6028 symstrtab_hdr->sh_flags = 0;
6029 symstrtab_hdr->sh_addr = 0;
6030 symstrtab_hdr->sh_entsize = 0;
6031 symstrtab_hdr->sh_link = 0;
6032 symstrtab_hdr->sh_info = 0;
6033 symstrtab_hdr->sh_addralign = 1;
252b5132 6034
b34976b6 6035 return TRUE;
252b5132
RH
6036}
6037
6038/* Return the number of bytes required to hold the symtab vector.
6039
6040 Note that we base it on the count plus 1, since we will null terminate
6041 the vector allocated based on this size. However, the ELF symbol table
6042 always has a dummy entry as symbol #0, so it ends up even. */
6043
6044long
217aa764 6045_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6046{
6047 long symcount;
6048 long symtab_size;
6049 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6050
6051 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6052 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6053 if (symcount > 0)
6054 symtab_size -= sizeof (asymbol *);
252b5132
RH
6055
6056 return symtab_size;
6057}
6058
6059long
217aa764 6060_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6061{
6062 long symcount;
6063 long symtab_size;
6064 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6065
6066 if (elf_dynsymtab (abfd) == 0)
6067 {
6068 bfd_set_error (bfd_error_invalid_operation);
6069 return -1;
6070 }
6071
6072 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6073 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6074 if (symcount > 0)
6075 symtab_size -= sizeof (asymbol *);
252b5132
RH
6076
6077 return symtab_size;
6078}
6079
6080long
217aa764
AM
6081_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6082 sec_ptr asect)
252b5132
RH
6083{
6084 return (asect->reloc_count + 1) * sizeof (arelent *);
6085}
6086
6087/* Canonicalize the relocs. */
6088
6089long
217aa764
AM
6090_bfd_elf_canonicalize_reloc (bfd *abfd,
6091 sec_ptr section,
6092 arelent **relptr,
6093 asymbol **symbols)
252b5132
RH
6094{
6095 arelent *tblptr;
6096 unsigned int i;
9c5bfbb7 6097 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6098
b34976b6 6099 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6100 return -1;
6101
6102 tblptr = section->relocation;
6103 for (i = 0; i < section->reloc_count; i++)
6104 *relptr++ = tblptr++;
6105
6106 *relptr = NULL;
6107
6108 return section->reloc_count;
6109}
6110
6111long
6cee3f79 6112_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6113{
9c5bfbb7 6114 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6115 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6116
6117 if (symcount >= 0)
6118 bfd_get_symcount (abfd) = symcount;
6119 return symcount;
6120}
6121
6122long
217aa764
AM
6123_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6124 asymbol **allocation)
252b5132 6125{
9c5bfbb7 6126 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6127 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6128
6129 if (symcount >= 0)
6130 bfd_get_dynamic_symcount (abfd) = symcount;
6131 return symcount;
252b5132
RH
6132}
6133
8615f3f2
AM
6134/* Return the size required for the dynamic reloc entries. Any loadable
6135 section that was actually installed in the BFD, and has type SHT_REL
6136 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6137 dynamic reloc section. */
252b5132
RH
6138
6139long
217aa764 6140_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6141{
6142 long ret;
6143 asection *s;
6144
6145 if (elf_dynsymtab (abfd) == 0)
6146 {
6147 bfd_set_error (bfd_error_invalid_operation);
6148 return -1;
6149 }
6150
6151 ret = sizeof (arelent *);
6152 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6153 if ((s->flags & SEC_LOAD) != 0
6154 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6155 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6156 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6157 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6158 * sizeof (arelent *));
6159
6160 return ret;
6161}
6162
8615f3f2
AM
6163/* Canonicalize the dynamic relocation entries. Note that we return the
6164 dynamic relocations as a single block, although they are actually
6165 associated with particular sections; the interface, which was
6166 designed for SunOS style shared libraries, expects that there is only
6167 one set of dynamic relocs. Any loadable section that was actually
6168 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6169 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6170
6171long
217aa764
AM
6172_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6173 arelent **storage,
6174 asymbol **syms)
252b5132 6175{
217aa764 6176 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6177 asection *s;
6178 long ret;
6179
6180 if (elf_dynsymtab (abfd) == 0)
6181 {
6182 bfd_set_error (bfd_error_invalid_operation);
6183 return -1;
6184 }
6185
6186 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6187 ret = 0;
6188 for (s = abfd->sections; s != NULL; s = s->next)
6189 {
8615f3f2
AM
6190 if ((s->flags & SEC_LOAD) != 0
6191 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6192 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6193 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6194 {
6195 arelent *p;
6196 long count, i;
6197
b34976b6 6198 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6199 return -1;
eea6121a 6200 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6201 p = s->relocation;
6202 for (i = 0; i < count; i++)
6203 *storage++ = p++;
6204 ret += count;
6205 }
6206 }
6207
6208 *storage = NULL;
6209
6210 return ret;
6211}
6212\f
6213/* Read in the version information. */
6214
b34976b6 6215bfd_boolean
fc0e6df6 6216_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6217{
6218 bfd_byte *contents = NULL;
dc810e39 6219 bfd_size_type amt;
fc0e6df6
PB
6220 unsigned int freeidx = 0;
6221
6222 if (elf_dynverref (abfd) != 0)
6223 {
6224 Elf_Internal_Shdr *hdr;
6225 Elf_External_Verneed *everneed;
6226 Elf_Internal_Verneed *iverneed;
6227 unsigned int i;
6228
6229 hdr = &elf_tdata (abfd)->dynverref_hdr;
6230
6231 amt = (bfd_size_type) hdr->sh_info * sizeof (Elf_Internal_Verneed);
6232 elf_tdata (abfd)->verref = bfd_zalloc (abfd, amt);
6233 if (elf_tdata (abfd)->verref == NULL)
6234 goto error_return;
6235
6236 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6237
6238 contents = bfd_malloc (hdr->sh_size);
6239 if (contents == NULL)
6240 goto error_return;
6241 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6242 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
6243 goto error_return;
6244
6245 everneed = (Elf_External_Verneed *) contents;
6246 iverneed = elf_tdata (abfd)->verref;
6247 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6248 {
6249 Elf_External_Vernaux *evernaux;
6250 Elf_Internal_Vernaux *ivernaux;
6251 unsigned int j;
6252
6253 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6254
6255 iverneed->vn_bfd = abfd;
6256
6257 iverneed->vn_filename =
6258 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6259 iverneed->vn_file);
6260 if (iverneed->vn_filename == NULL)
6261 goto error_return;
6262
6263 amt = iverneed->vn_cnt;
6264 amt *= sizeof (Elf_Internal_Vernaux);
6265 iverneed->vn_auxptr = bfd_alloc (abfd, amt);
6266
6267 evernaux = ((Elf_External_Vernaux *)
6268 ((bfd_byte *) everneed + iverneed->vn_aux));
6269 ivernaux = iverneed->vn_auxptr;
6270 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6271 {
6272 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6273
6274 ivernaux->vna_nodename =
6275 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6276 ivernaux->vna_name);
6277 if (ivernaux->vna_nodename == NULL)
6278 goto error_return;
6279
6280 if (j + 1 < iverneed->vn_cnt)
6281 ivernaux->vna_nextptr = ivernaux + 1;
6282 else
6283 ivernaux->vna_nextptr = NULL;
6284
6285 evernaux = ((Elf_External_Vernaux *)
6286 ((bfd_byte *) evernaux + ivernaux->vna_next));
6287
6288 if (ivernaux->vna_other > freeidx)
6289 freeidx = ivernaux->vna_other;
6290 }
6291
6292 if (i + 1 < hdr->sh_info)
6293 iverneed->vn_nextref = iverneed + 1;
6294 else
6295 iverneed->vn_nextref = NULL;
6296
6297 everneed = ((Elf_External_Verneed *)
6298 ((bfd_byte *) everneed + iverneed->vn_next));
6299 }
6300
6301 free (contents);
6302 contents = NULL;
6303 }
252b5132
RH
6304
6305 if (elf_dynverdef (abfd) != 0)
6306 {
6307 Elf_Internal_Shdr *hdr;
6308 Elf_External_Verdef *everdef;
6309 Elf_Internal_Verdef *iverdef;
f631889e
UD
6310 Elf_Internal_Verdef *iverdefarr;
6311 Elf_Internal_Verdef iverdefmem;
252b5132 6312 unsigned int i;
062e2358 6313 unsigned int maxidx;
252b5132
RH
6314
6315 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6316
217aa764 6317 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6318 if (contents == NULL)
6319 goto error_return;
6320 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6321 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6322 goto error_return;
6323
f631889e
UD
6324 /* We know the number of entries in the section but not the maximum
6325 index. Therefore we have to run through all entries and find
6326 the maximum. */
252b5132 6327 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6328 maxidx = 0;
6329 for (i = 0; i < hdr->sh_info; ++i)
6330 {
6331 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6332
062e2358
AM
6333 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6334 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e
UD
6335
6336 everdef = ((Elf_External_Verdef *)
6337 ((bfd_byte *) everdef + iverdefmem.vd_next));
6338 }
6339
fc0e6df6
PB
6340 if (default_imported_symver)
6341 {
6342 if (freeidx > maxidx)
6343 maxidx = ++freeidx;
6344 else
6345 freeidx = ++maxidx;
6346 }
dc810e39 6347 amt = (bfd_size_type) maxidx * sizeof (Elf_Internal_Verdef);
217aa764 6348 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
f631889e
UD
6349 if (elf_tdata (abfd)->verdef == NULL)
6350 goto error_return;
6351
6352 elf_tdata (abfd)->cverdefs = maxidx;
6353
6354 everdef = (Elf_External_Verdef *) contents;
6355 iverdefarr = elf_tdata (abfd)->verdef;
6356 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6357 {
6358 Elf_External_Verdaux *everdaux;
6359 Elf_Internal_Verdaux *iverdaux;
6360 unsigned int j;
6361
f631889e
UD
6362 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6363
6364 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6365 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6366
6367 iverdef->vd_bfd = abfd;
6368
dc810e39 6369 amt = (bfd_size_type) iverdef->vd_cnt * sizeof (Elf_Internal_Verdaux);
217aa764 6370 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132
RH
6371 if (iverdef->vd_auxptr == NULL)
6372 goto error_return;
6373
6374 everdaux = ((Elf_External_Verdaux *)
6375 ((bfd_byte *) everdef + iverdef->vd_aux));
6376 iverdaux = iverdef->vd_auxptr;
6377 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6378 {
6379 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6380
6381 iverdaux->vda_nodename =
6382 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6383 iverdaux->vda_name);
6384 if (iverdaux->vda_nodename == NULL)
6385 goto error_return;
6386
6387 if (j + 1 < iverdef->vd_cnt)
6388 iverdaux->vda_nextptr = iverdaux + 1;
6389 else
6390 iverdaux->vda_nextptr = NULL;
6391
6392 everdaux = ((Elf_External_Verdaux *)
6393 ((bfd_byte *) everdaux + iverdaux->vda_next));
6394 }
6395
6396 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
6397
6398 if (i + 1 < hdr->sh_info)
6399 iverdef->vd_nextdef = iverdef + 1;
6400 else
6401 iverdef->vd_nextdef = NULL;
6402
6403 everdef = ((Elf_External_Verdef *)
6404 ((bfd_byte *) everdef + iverdef->vd_next));
6405 }
6406
6407 free (contents);
6408 contents = NULL;
6409 }
fc0e6df6 6410 else if (default_imported_symver)
252b5132 6411 {
fc0e6df6
PB
6412 if (freeidx < 3)
6413 freeidx = 3;
6414 else
6415 freeidx++;
252b5132 6416
fc0e6df6
PB
6417 amt = (bfd_size_type) freeidx * sizeof (Elf_Internal_Verdef);
6418 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
6419 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6420 goto error_return;
6421
fc0e6df6
PB
6422 elf_tdata (abfd)->cverdefs = freeidx;
6423 }
252b5132 6424
fc0e6df6
PB
6425 /* Create a default version based on the soname. */
6426 if (default_imported_symver)
6427 {
6428 Elf_Internal_Verdef *iverdef;
6429 Elf_Internal_Verdaux *iverdaux;
252b5132 6430
fc0e6df6 6431 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6432
fc0e6df6
PB
6433 iverdef->vd_version = VER_DEF_CURRENT;
6434 iverdef->vd_flags = 0;
6435 iverdef->vd_ndx = freeidx;
6436 iverdef->vd_cnt = 1;
252b5132 6437
fc0e6df6 6438 iverdef->vd_bfd = abfd;
252b5132 6439
fc0e6df6
PB
6440 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6441 if (iverdef->vd_nodename == NULL)
6442 goto error_return;
6443 iverdef->vd_nextdef = NULL;
6444 amt = (bfd_size_type) sizeof (Elf_Internal_Verdaux);
6445 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132 6446
fc0e6df6
PB
6447 iverdaux = iverdef->vd_auxptr;
6448 iverdaux->vda_nodename = iverdef->vd_nodename;
6449 iverdaux->vda_nextptr = NULL;
252b5132
RH
6450 }
6451
b34976b6 6452 return TRUE;
252b5132
RH
6453
6454 error_return:
5ed6aba4 6455 if (contents != NULL)
252b5132 6456 free (contents);
b34976b6 6457 return FALSE;
252b5132
RH
6458}
6459\f
6460asymbol *
217aa764 6461_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6462{
6463 elf_symbol_type *newsym;
dc810e39 6464 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6465
217aa764 6466 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6467 if (!newsym)
6468 return NULL;
6469 else
6470 {
6471 newsym->symbol.the_bfd = abfd;
6472 return &newsym->symbol;
6473 }
6474}
6475
6476void
217aa764
AM
6477_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6478 asymbol *symbol,
6479 symbol_info *ret)
252b5132
RH
6480{
6481 bfd_symbol_info (symbol, ret);
6482}
6483
6484/* Return whether a symbol name implies a local symbol. Most targets
6485 use this function for the is_local_label_name entry point, but some
6486 override it. */
6487
b34976b6 6488bfd_boolean
217aa764
AM
6489_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6490 const char *name)
252b5132
RH
6491{
6492 /* Normal local symbols start with ``.L''. */
6493 if (name[0] == '.' && name[1] == 'L')
b34976b6 6494 return TRUE;
252b5132
RH
6495
6496 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6497 DWARF debugging symbols starting with ``..''. */
6498 if (name[0] == '.' && name[1] == '.')
b34976b6 6499 return TRUE;
252b5132
RH
6500
6501 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6502 emitting DWARF debugging output. I suspect this is actually a
6503 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6504 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6505 underscore to be emitted on some ELF targets). For ease of use,
6506 we treat such symbols as local. */
6507 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6508 return TRUE;
252b5132 6509
b34976b6 6510 return FALSE;
252b5132
RH
6511}
6512
6513alent *
217aa764
AM
6514_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6515 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6516{
6517 abort ();
6518 return NULL;
6519}
6520
b34976b6 6521bfd_boolean
217aa764
AM
6522_bfd_elf_set_arch_mach (bfd *abfd,
6523 enum bfd_architecture arch,
6524 unsigned long machine)
252b5132
RH
6525{
6526 /* If this isn't the right architecture for this backend, and this
6527 isn't the generic backend, fail. */
6528 if (arch != get_elf_backend_data (abfd)->arch
6529 && arch != bfd_arch_unknown
6530 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6531 return FALSE;
252b5132
RH
6532
6533 return bfd_default_set_arch_mach (abfd, arch, machine);
6534}
6535
d1fad7c6
NC
6536/* Find the function to a particular section and offset,
6537 for error reporting. */
252b5132 6538
b34976b6 6539static bfd_boolean
217aa764
AM
6540elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6541 asection *section,
6542 asymbol **symbols,
6543 bfd_vma offset,
6544 const char **filename_ptr,
6545 const char **functionname_ptr)
252b5132 6546{
252b5132 6547 const char *filename;
57426232 6548 asymbol *func, *file;
252b5132
RH
6549 bfd_vma low_func;
6550 asymbol **p;
57426232
JB
6551 /* ??? Given multiple file symbols, it is impossible to reliably
6552 choose the right file name for global symbols. File symbols are
6553 local symbols, and thus all file symbols must sort before any
6554 global symbols. The ELF spec may be interpreted to say that a
6555 file symbol must sort before other local symbols, but currently
6556 ld -r doesn't do this. So, for ld -r output, it is possible to
6557 make a better choice of file name for local symbols by ignoring
6558 file symbols appearing after a given local symbol. */
6559 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6560
252b5132
RH
6561 filename = NULL;
6562 func = NULL;
57426232 6563 file = NULL;
252b5132 6564 low_func = 0;
57426232 6565 state = nothing_seen;
252b5132
RH
6566
6567 for (p = symbols; *p != NULL; p++)
6568 {
6569 elf_symbol_type *q;
6570
6571 q = (elf_symbol_type *) *p;
6572
252b5132
RH
6573 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6574 {
6575 default:
6576 break;
6577 case STT_FILE:
57426232
JB
6578 file = &q->symbol;
6579 if (state == symbol_seen)
6580 state = file_after_symbol_seen;
6581 continue;
6582 case STT_SECTION:
6583 continue;
252b5132
RH
6584 case STT_NOTYPE:
6585 case STT_FUNC:
6b40fcba 6586 if (bfd_get_section (&q->symbol) == section
252b5132
RH
6587 && q->symbol.value >= low_func
6588 && q->symbol.value <= offset)
6589 {
6590 func = (asymbol *) q;
6591 low_func = q->symbol.value;
57426232
JB
6592 if (file == NULL)
6593 filename = NULL;
6594 else if (ELF_ST_BIND (q->internal_elf_sym.st_info) != STB_LOCAL
6595 && state == file_after_symbol_seen)
6596 filename = NULL;
6597 else
6598 filename = bfd_asymbol_name (file);
252b5132
RH
6599 }
6600 break;
6601 }
57426232
JB
6602 if (state == nothing_seen)
6603 state = symbol_seen;
252b5132
RH
6604 }
6605
6606 if (func == NULL)
b34976b6 6607 return FALSE;
252b5132 6608
d1fad7c6
NC
6609 if (filename_ptr)
6610 *filename_ptr = filename;
6611 if (functionname_ptr)
6612 *functionname_ptr = bfd_asymbol_name (func);
6613
b34976b6 6614 return TRUE;
d1fad7c6
NC
6615}
6616
6617/* Find the nearest line to a particular section and offset,
6618 for error reporting. */
6619
b34976b6 6620bfd_boolean
217aa764
AM
6621_bfd_elf_find_nearest_line (bfd *abfd,
6622 asection *section,
6623 asymbol **symbols,
6624 bfd_vma offset,
6625 const char **filename_ptr,
6626 const char **functionname_ptr,
6627 unsigned int *line_ptr)
d1fad7c6 6628{
b34976b6 6629 bfd_boolean found;
d1fad7c6
NC
6630
6631 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6632 filename_ptr, functionname_ptr,
6633 line_ptr))
d1fad7c6
NC
6634 {
6635 if (!*functionname_ptr)
4e8a9624
AM
6636 elf_find_function (abfd, section, symbols, offset,
6637 *filename_ptr ? NULL : filename_ptr,
6638 functionname_ptr);
6639
b34976b6 6640 return TRUE;
d1fad7c6
NC
6641 }
6642
6643 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6644 filename_ptr, functionname_ptr,
6645 line_ptr, 0,
6646 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
6647 {
6648 if (!*functionname_ptr)
4e8a9624
AM
6649 elf_find_function (abfd, section, symbols, offset,
6650 *filename_ptr ? NULL : filename_ptr,
6651 functionname_ptr);
6652
b34976b6 6653 return TRUE;
d1fad7c6
NC
6654 }
6655
6656 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
6657 &found, filename_ptr,
6658 functionname_ptr, line_ptr,
6659 &elf_tdata (abfd)->line_info))
b34976b6 6660 return FALSE;
dc43ada5 6661 if (found && (*functionname_ptr || *line_ptr))
b34976b6 6662 return TRUE;
d1fad7c6
NC
6663
6664 if (symbols == NULL)
b34976b6 6665 return FALSE;
d1fad7c6
NC
6666
6667 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 6668 filename_ptr, functionname_ptr))
b34976b6 6669 return FALSE;
d1fad7c6 6670
252b5132 6671 *line_ptr = 0;
b34976b6 6672 return TRUE;
252b5132
RH
6673}
6674
6675int
217aa764 6676_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
6677{
6678 int ret;
6679
6680 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
6681 if (! reloc)
6682 ret += get_program_header_size (abfd);
6683 return ret;
6684}
6685
b34976b6 6686bfd_boolean
217aa764
AM
6687_bfd_elf_set_section_contents (bfd *abfd,
6688 sec_ptr section,
0f867abe 6689 const void *location,
217aa764
AM
6690 file_ptr offset,
6691 bfd_size_type count)
252b5132
RH
6692{
6693 Elf_Internal_Shdr *hdr;
dc810e39 6694 bfd_signed_vma pos;
252b5132
RH
6695
6696 if (! abfd->output_has_begun
217aa764 6697 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6698 return FALSE;
252b5132
RH
6699
6700 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
6701 pos = hdr->sh_offset + offset;
6702 if (bfd_seek (abfd, pos, SEEK_SET) != 0
6703 || bfd_bwrite (location, count, abfd) != count)
b34976b6 6704 return FALSE;
252b5132 6705
b34976b6 6706 return TRUE;
252b5132
RH
6707}
6708
6709void
217aa764
AM
6710_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
6711 arelent *cache_ptr ATTRIBUTE_UNUSED,
6712 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
6713{
6714 abort ();
6715}
6716
252b5132
RH
6717/* Try to convert a non-ELF reloc into an ELF one. */
6718
b34976b6 6719bfd_boolean
217aa764 6720_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 6721{
c044fabd 6722 /* Check whether we really have an ELF howto. */
252b5132
RH
6723
6724 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
6725 {
6726 bfd_reloc_code_real_type code;
6727 reloc_howto_type *howto;
6728
6729 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 6730 equivalent ELF reloc. */
252b5132
RH
6731
6732 if (areloc->howto->pc_relative)
6733 {
6734 switch (areloc->howto->bitsize)
6735 {
6736 case 8:
6737 code = BFD_RELOC_8_PCREL;
6738 break;
6739 case 12:
6740 code = BFD_RELOC_12_PCREL;
6741 break;
6742 case 16:
6743 code = BFD_RELOC_16_PCREL;
6744 break;
6745 case 24:
6746 code = BFD_RELOC_24_PCREL;
6747 break;
6748 case 32:
6749 code = BFD_RELOC_32_PCREL;
6750 break;
6751 case 64:
6752 code = BFD_RELOC_64_PCREL;
6753 break;
6754 default:
6755 goto fail;
6756 }
6757
6758 howto = bfd_reloc_type_lookup (abfd, code);
6759
6760 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
6761 {
6762 if (howto->pcrel_offset)
6763 areloc->addend += areloc->address;
6764 else
6765 areloc->addend -= areloc->address; /* addend is unsigned!! */
6766 }
6767 }
6768 else
6769 {
6770 switch (areloc->howto->bitsize)
6771 {
6772 case 8:
6773 code = BFD_RELOC_8;
6774 break;
6775 case 14:
6776 code = BFD_RELOC_14;
6777 break;
6778 case 16:
6779 code = BFD_RELOC_16;
6780 break;
6781 case 26:
6782 code = BFD_RELOC_26;
6783 break;
6784 case 32:
6785 code = BFD_RELOC_32;
6786 break;
6787 case 64:
6788 code = BFD_RELOC_64;
6789 break;
6790 default:
6791 goto fail;
6792 }
6793
6794 howto = bfd_reloc_type_lookup (abfd, code);
6795 }
6796
6797 if (howto)
6798 areloc->howto = howto;
6799 else
6800 goto fail;
6801 }
6802
b34976b6 6803 return TRUE;
252b5132
RH
6804
6805 fail:
6806 (*_bfd_error_handler)
d003868e
AM
6807 (_("%B: unsupported relocation type %s"),
6808 abfd, areloc->howto->name);
252b5132 6809 bfd_set_error (bfd_error_bad_value);
b34976b6 6810 return FALSE;
252b5132
RH
6811}
6812
b34976b6 6813bfd_boolean
217aa764 6814_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
6815{
6816 if (bfd_get_format (abfd) == bfd_object)
6817 {
6818 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 6819 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 6820 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
6821 }
6822
6823 return _bfd_generic_close_and_cleanup (abfd);
6824}
6825
6826/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
6827 in the relocation's offset. Thus we cannot allow any sort of sanity
6828 range-checking to interfere. There is nothing else to do in processing
6829 this reloc. */
6830
6831bfd_reloc_status_type
217aa764
AM
6832_bfd_elf_rel_vtable_reloc_fn
6833 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 6834 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
6835 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
6836 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
6837{
6838 return bfd_reloc_ok;
6839}
252b5132
RH
6840\f
6841/* Elf core file support. Much of this only works on native
6842 toolchains, since we rely on knowing the
6843 machine-dependent procfs structure in order to pick
c044fabd 6844 out details about the corefile. */
252b5132
RH
6845
6846#ifdef HAVE_SYS_PROCFS_H
6847# include <sys/procfs.h>
6848#endif
6849
c044fabd 6850/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
6851
6852static int
217aa764 6853elfcore_make_pid (bfd *abfd)
252b5132
RH
6854{
6855 return ((elf_tdata (abfd)->core_lwpid << 16)
6856 + (elf_tdata (abfd)->core_pid));
6857}
6858
252b5132
RH
6859/* If there isn't a section called NAME, make one, using
6860 data from SECT. Note, this function will generate a
6861 reference to NAME, so you shouldn't deallocate or
c044fabd 6862 overwrite it. */
252b5132 6863
b34976b6 6864static bfd_boolean
217aa764 6865elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 6866{
c044fabd 6867 asection *sect2;
252b5132
RH
6868
6869 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 6870 return TRUE;
252b5132
RH
6871
6872 sect2 = bfd_make_section (abfd, name);
6873 if (sect2 == NULL)
b34976b6 6874 return FALSE;
252b5132 6875
eea6121a 6876 sect2->size = sect->size;
252b5132
RH
6877 sect2->filepos = sect->filepos;
6878 sect2->flags = sect->flags;
6879 sect2->alignment_power = sect->alignment_power;
b34976b6 6880 return TRUE;
252b5132
RH
6881}
6882
bb0082d6
AM
6883/* Create a pseudosection containing SIZE bytes at FILEPOS. This
6884 actually creates up to two pseudosections:
6885 - For the single-threaded case, a section named NAME, unless
6886 such a section already exists.
6887 - For the multi-threaded case, a section named "NAME/PID", where
6888 PID is elfcore_make_pid (abfd).
6889 Both pseudosections have identical contents. */
b34976b6 6890bfd_boolean
217aa764
AM
6891_bfd_elfcore_make_pseudosection (bfd *abfd,
6892 char *name,
6893 size_t size,
6894 ufile_ptr filepos)
bb0082d6
AM
6895{
6896 char buf[100];
6897 char *threaded_name;
d4c88bbb 6898 size_t len;
bb0082d6
AM
6899 asection *sect;
6900
6901 /* Build the section name. */
6902
6903 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 6904 len = strlen (buf) + 1;
217aa764 6905 threaded_name = bfd_alloc (abfd, len);
bb0082d6 6906 if (threaded_name == NULL)
b34976b6 6907 return FALSE;
d4c88bbb 6908 memcpy (threaded_name, buf, len);
bb0082d6 6909
62f3bb11 6910 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 6911 if (sect == NULL)
b34976b6 6912 return FALSE;
eea6121a 6913 sect->size = size;
bb0082d6
AM
6914 sect->filepos = filepos;
6915 sect->flags = SEC_HAS_CONTENTS;
6916 sect->alignment_power = 2;
6917
936e320b 6918 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
6919}
6920
252b5132 6921/* prstatus_t exists on:
4a938328 6922 solaris 2.5+
252b5132
RH
6923 linux 2.[01] + glibc
6924 unixware 4.2
6925*/
6926
6927#if defined (HAVE_PRSTATUS_T)
a7b97311 6928
b34976b6 6929static bfd_boolean
217aa764 6930elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 6931{
eea6121a 6932 size_t size;
7ee38065 6933 int offset;
252b5132 6934
4a938328
MS
6935 if (note->descsz == sizeof (prstatus_t))
6936 {
6937 prstatus_t prstat;
252b5132 6938
eea6121a 6939 size = sizeof (prstat.pr_reg);
7ee38065 6940 offset = offsetof (prstatus_t, pr_reg);
4a938328 6941 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 6942
fa49d224
NC
6943 /* Do not overwrite the core signal if it
6944 has already been set by another thread. */
6945 if (elf_tdata (abfd)->core_signal == 0)
6946 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 6947 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 6948
4a938328
MS
6949 /* pr_who exists on:
6950 solaris 2.5+
6951 unixware 4.2
6952 pr_who doesn't exist on:
6953 linux 2.[01]
6954 */
252b5132 6955#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 6956 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 6957#endif
4a938328 6958 }
7ee38065 6959#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
6960 else if (note->descsz == sizeof (prstatus32_t))
6961 {
6962 /* 64-bit host, 32-bit corefile */
6963 prstatus32_t prstat;
6964
eea6121a 6965 size = sizeof (prstat.pr_reg);
7ee38065 6966 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
6967 memcpy (&prstat, note->descdata, sizeof (prstat));
6968
fa49d224
NC
6969 /* Do not overwrite the core signal if it
6970 has already been set by another thread. */
6971 if (elf_tdata (abfd)->core_signal == 0)
6972 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
6973 elf_tdata (abfd)->core_pid = prstat.pr_pid;
6974
6975 /* pr_who exists on:
6976 solaris 2.5+
6977 unixware 4.2
6978 pr_who doesn't exist on:
6979 linux 2.[01]
6980 */
7ee38065 6981#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
6982 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
6983#endif
6984 }
7ee38065 6985#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
6986 else
6987 {
6988 /* Fail - we don't know how to handle any other
6989 note size (ie. data object type). */
b34976b6 6990 return TRUE;
4a938328 6991 }
252b5132 6992
bb0082d6 6993 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 6994 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 6995 size, note->descpos + offset);
252b5132
RH
6996}
6997#endif /* defined (HAVE_PRSTATUS_T) */
6998
bb0082d6 6999/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7000static bfd_boolean
217aa764
AM
7001elfcore_make_note_pseudosection (bfd *abfd,
7002 char *name,
7003 Elf_Internal_Note *note)
252b5132 7004{
936e320b
AM
7005 return _bfd_elfcore_make_pseudosection (abfd, name,
7006 note->descsz, note->descpos);
252b5132
RH
7007}
7008
ff08c6bb
JB
7009/* There isn't a consistent prfpregset_t across platforms,
7010 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7011 data structure apart. */
7012
b34976b6 7013static bfd_boolean
217aa764 7014elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7015{
7016 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7017}
7018
ff08c6bb
JB
7019/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7020 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7021 literally. */
c044fabd 7022
b34976b6 7023static bfd_boolean
217aa764 7024elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7025{
7026 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7027}
7028
252b5132 7029#if defined (HAVE_PRPSINFO_T)
4a938328 7030typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7031#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7032typedef prpsinfo32_t elfcore_psinfo32_t;
7033#endif
252b5132
RH
7034#endif
7035
7036#if defined (HAVE_PSINFO_T)
4a938328 7037typedef psinfo_t elfcore_psinfo_t;
7ee38065 7038#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7039typedef psinfo32_t elfcore_psinfo32_t;
7040#endif
252b5132
RH
7041#endif
7042
252b5132
RH
7043/* return a malloc'ed copy of a string at START which is at
7044 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7045 the copy will always have a terminating '\0'. */
252b5132 7046
936e320b 7047char *
217aa764 7048_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7049{
dc810e39 7050 char *dups;
c044fabd 7051 char *end = memchr (start, '\0', max);
dc810e39 7052 size_t len;
252b5132
RH
7053
7054 if (end == NULL)
7055 len = max;
7056 else
7057 len = end - start;
7058
217aa764 7059 dups = bfd_alloc (abfd, len + 1);
dc810e39 7060 if (dups == NULL)
252b5132
RH
7061 return NULL;
7062
dc810e39
AM
7063 memcpy (dups, start, len);
7064 dups[len] = '\0';
252b5132 7065
dc810e39 7066 return dups;
252b5132
RH
7067}
7068
bb0082d6 7069#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7070static bfd_boolean
217aa764 7071elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7072{
4a938328
MS
7073 if (note->descsz == sizeof (elfcore_psinfo_t))
7074 {
7075 elfcore_psinfo_t psinfo;
252b5132 7076
7ee38065 7077 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7078
4a938328 7079 elf_tdata (abfd)->core_program
936e320b
AM
7080 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7081 sizeof (psinfo.pr_fname));
252b5132 7082
4a938328 7083 elf_tdata (abfd)->core_command
936e320b
AM
7084 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7085 sizeof (psinfo.pr_psargs));
4a938328 7086 }
7ee38065 7087#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7088 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7089 {
7090 /* 64-bit host, 32-bit corefile */
7091 elfcore_psinfo32_t psinfo;
7092
7ee38065 7093 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7094
4a938328 7095 elf_tdata (abfd)->core_program
936e320b
AM
7096 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7097 sizeof (psinfo.pr_fname));
4a938328
MS
7098
7099 elf_tdata (abfd)->core_command
936e320b
AM
7100 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7101 sizeof (psinfo.pr_psargs));
4a938328
MS
7102 }
7103#endif
7104
7105 else
7106 {
7107 /* Fail - we don't know how to handle any other
7108 note size (ie. data object type). */
b34976b6 7109 return TRUE;
4a938328 7110 }
252b5132
RH
7111
7112 /* Note that for some reason, a spurious space is tacked
7113 onto the end of the args in some (at least one anyway)
c044fabd 7114 implementations, so strip it off if it exists. */
252b5132
RH
7115
7116 {
c044fabd 7117 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7118 int n = strlen (command);
7119
7120 if (0 < n && command[n - 1] == ' ')
7121 command[n - 1] = '\0';
7122 }
7123
b34976b6 7124 return TRUE;
252b5132
RH
7125}
7126#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7127
252b5132 7128#if defined (HAVE_PSTATUS_T)
b34976b6 7129static bfd_boolean
217aa764 7130elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7131{
f572a39d
AM
7132 if (note->descsz == sizeof (pstatus_t)
7133#if defined (HAVE_PXSTATUS_T)
7134 || note->descsz == sizeof (pxstatus_t)
7135#endif
7136 )
4a938328
MS
7137 {
7138 pstatus_t pstat;
252b5132 7139
4a938328 7140 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7141
4a938328
MS
7142 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7143 }
7ee38065 7144#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7145 else if (note->descsz == sizeof (pstatus32_t))
7146 {
7147 /* 64-bit host, 32-bit corefile */
7148 pstatus32_t pstat;
252b5132 7149
4a938328 7150 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7151
4a938328
MS
7152 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7153 }
7154#endif
252b5132
RH
7155 /* Could grab some more details from the "representative"
7156 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7157 NT_LWPSTATUS note, presumably. */
252b5132 7158
b34976b6 7159 return TRUE;
252b5132
RH
7160}
7161#endif /* defined (HAVE_PSTATUS_T) */
7162
252b5132 7163#if defined (HAVE_LWPSTATUS_T)
b34976b6 7164static bfd_boolean
217aa764 7165elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7166{
7167 lwpstatus_t lwpstat;
7168 char buf[100];
c044fabd 7169 char *name;
d4c88bbb 7170 size_t len;
c044fabd 7171 asection *sect;
252b5132 7172
f572a39d
AM
7173 if (note->descsz != sizeof (lwpstat)
7174#if defined (HAVE_LWPXSTATUS_T)
7175 && note->descsz != sizeof (lwpxstatus_t)
7176#endif
7177 )
b34976b6 7178 return TRUE;
252b5132
RH
7179
7180 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7181
7182 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7183 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7184
c044fabd 7185 /* Make a ".reg/999" section. */
252b5132
RH
7186
7187 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7188 len = strlen (buf) + 1;
217aa764 7189 name = bfd_alloc (abfd, len);
252b5132 7190 if (name == NULL)
b34976b6 7191 return FALSE;
d4c88bbb 7192 memcpy (name, buf, len);
252b5132 7193
62f3bb11 7194 sect = bfd_make_section_anyway (abfd, name);
252b5132 7195 if (sect == NULL)
b34976b6 7196 return FALSE;
252b5132
RH
7197
7198#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7199 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7200 sect->filepos = note->descpos
7201 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7202#endif
7203
7204#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7205 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7206 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7207#endif
7208
7209 sect->flags = SEC_HAS_CONTENTS;
7210 sect->alignment_power = 2;
7211
7212 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7213 return FALSE;
252b5132
RH
7214
7215 /* Make a ".reg2/999" section */
7216
7217 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7218 len = strlen (buf) + 1;
217aa764 7219 name = bfd_alloc (abfd, len);
252b5132 7220 if (name == NULL)
b34976b6 7221 return FALSE;
d4c88bbb 7222 memcpy (name, buf, len);
252b5132 7223
62f3bb11 7224 sect = bfd_make_section_anyway (abfd, name);
252b5132 7225 if (sect == NULL)
b34976b6 7226 return FALSE;
252b5132
RH
7227
7228#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7229 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7230 sect->filepos = note->descpos
7231 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7232#endif
7233
7234#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7235 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7236 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7237#endif
7238
7239 sect->flags = SEC_HAS_CONTENTS;
7240 sect->alignment_power = 2;
7241
936e320b 7242 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7243}
7244#endif /* defined (HAVE_LWPSTATUS_T) */
7245
16e9c715 7246#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7247static bfd_boolean
217aa764 7248elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7249{
7250 char buf[30];
c044fabd 7251 char *name;
d4c88bbb 7252 size_t len;
c044fabd 7253 asection *sect;
16e9c715
NC
7254 win32_pstatus_t pstatus;
7255
7256 if (note->descsz < sizeof (pstatus))
b34976b6 7257 return TRUE;
16e9c715 7258
e8eab623 7259 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7260
7261 switch (pstatus.data_type)
16e9c715
NC
7262 {
7263 case NOTE_INFO_PROCESS:
7264 /* FIXME: need to add ->core_command. */
7265 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7266 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7267 break;
16e9c715
NC
7268
7269 case NOTE_INFO_THREAD:
7270 /* Make a ".reg/999" section. */
1f170678 7271 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7272
d4c88bbb 7273 len = strlen (buf) + 1;
217aa764 7274 name = bfd_alloc (abfd, len);
16e9c715 7275 if (name == NULL)
b34976b6 7276 return FALSE;
c044fabd 7277
d4c88bbb 7278 memcpy (name, buf, len);
16e9c715 7279
62f3bb11 7280 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7281 if (sect == NULL)
b34976b6 7282 return FALSE;
c044fabd 7283
eea6121a 7284 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7285 sect->filepos = (note->descpos
7286 + offsetof (struct win32_pstatus,
7287 data.thread_info.thread_context));
16e9c715
NC
7288 sect->flags = SEC_HAS_CONTENTS;
7289 sect->alignment_power = 2;
7290
7291 if (pstatus.data.thread_info.is_active_thread)
7292 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7293 return FALSE;
16e9c715
NC
7294 break;
7295
7296 case NOTE_INFO_MODULE:
7297 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7298 sprintf (buf, ".module/%08lx",
7299 (long) pstatus.data.module_info.base_address);
c044fabd 7300
d4c88bbb 7301 len = strlen (buf) + 1;
217aa764 7302 name = bfd_alloc (abfd, len);
16e9c715 7303 if (name == NULL)
b34976b6 7304 return FALSE;
c044fabd 7305
d4c88bbb 7306 memcpy (name, buf, len);
252b5132 7307
62f3bb11 7308 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7309
16e9c715 7310 if (sect == NULL)
b34976b6 7311 return FALSE;
c044fabd 7312
eea6121a 7313 sect->size = note->descsz;
16e9c715
NC
7314 sect->filepos = note->descpos;
7315 sect->flags = SEC_HAS_CONTENTS;
7316 sect->alignment_power = 2;
7317 break;
7318
7319 default:
b34976b6 7320 return TRUE;
16e9c715
NC
7321 }
7322
b34976b6 7323 return TRUE;
16e9c715
NC
7324}
7325#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7326
b34976b6 7327static bfd_boolean
217aa764 7328elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7329{
9c5bfbb7 7330 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7331
252b5132
RH
7332 switch (note->type)
7333 {
7334 default:
b34976b6 7335 return TRUE;
252b5132 7336
252b5132 7337 case NT_PRSTATUS:
bb0082d6
AM
7338 if (bed->elf_backend_grok_prstatus)
7339 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7340 return TRUE;
bb0082d6 7341#if defined (HAVE_PRSTATUS_T)
252b5132 7342 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7343#else
b34976b6 7344 return TRUE;
252b5132
RH
7345#endif
7346
7347#if defined (HAVE_PSTATUS_T)
7348 case NT_PSTATUS:
7349 return elfcore_grok_pstatus (abfd, note);
7350#endif
7351
7352#if defined (HAVE_LWPSTATUS_T)
7353 case NT_LWPSTATUS:
7354 return elfcore_grok_lwpstatus (abfd, note);
7355#endif
7356
7357 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7358 return elfcore_grok_prfpreg (abfd, note);
7359
16e9c715 7360#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7361 case NT_WIN32PSTATUS:
16e9c715
NC
7362 return elfcore_grok_win32pstatus (abfd, note);
7363#endif
7364
c044fabd 7365 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7366 if (note->namesz == 6
7367 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7368 return elfcore_grok_prxfpreg (abfd, note);
7369 else
b34976b6 7370 return TRUE;
ff08c6bb 7371
252b5132
RH
7372 case NT_PRPSINFO:
7373 case NT_PSINFO:
bb0082d6
AM
7374 if (bed->elf_backend_grok_psinfo)
7375 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7376 return TRUE;
bb0082d6 7377#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7378 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7379#else
b34976b6 7380 return TRUE;
252b5132 7381#endif
3333a7c3
RM
7382
7383 case NT_AUXV:
7384 {
62f3bb11 7385 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7386
7387 if (sect == NULL)
7388 return FALSE;
eea6121a 7389 sect->size = note->descsz;
3333a7c3
RM
7390 sect->filepos = note->descpos;
7391 sect->flags = SEC_HAS_CONTENTS;
7392 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7393
7394 return TRUE;
7395 }
252b5132
RH
7396 }
7397}
7398
b34976b6 7399static bfd_boolean
217aa764 7400elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7401{
7402 char *cp;
7403
7404 cp = strchr (note->namedata, '@');
7405 if (cp != NULL)
7406 {
d2b64500 7407 *lwpidp = atoi(cp + 1);
b34976b6 7408 return TRUE;
50b2bdb7 7409 }
b34976b6 7410 return FALSE;
50b2bdb7
AM
7411}
7412
b34976b6 7413static bfd_boolean
217aa764 7414elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7415{
7416
7417 /* Signal number at offset 0x08. */
7418 elf_tdata (abfd)->core_signal
7419 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7420
7421 /* Process ID at offset 0x50. */
7422 elf_tdata (abfd)->core_pid
7423 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7424
7425 /* Command name at 0x7c (max 32 bytes, including nul). */
7426 elf_tdata (abfd)->core_command
7427 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7428
7720ba9f
MK
7429 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7430 note);
50b2bdb7
AM
7431}
7432
b34976b6 7433static bfd_boolean
217aa764 7434elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7435{
7436 int lwp;
7437
7438 if (elfcore_netbsd_get_lwpid (note, &lwp))
7439 elf_tdata (abfd)->core_lwpid = lwp;
7440
b4db1224 7441 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7442 {
7443 /* NetBSD-specific core "procinfo". Note that we expect to
7444 find this note before any of the others, which is fine,
7445 since the kernel writes this note out first when it
7446 creates a core file. */
47d9a591 7447
50b2bdb7
AM
7448 return elfcore_grok_netbsd_procinfo (abfd, note);
7449 }
7450
b4db1224
JT
7451 /* As of Jan 2002 there are no other machine-independent notes
7452 defined for NetBSD core files. If the note type is less
7453 than the start of the machine-dependent note types, we don't
7454 understand it. */
47d9a591 7455
b4db1224 7456 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7457 return TRUE;
50b2bdb7
AM
7458
7459
7460 switch (bfd_get_arch (abfd))
7461 {
7462 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7463 PT_GETFPREGS == mach+2. */
7464
7465 case bfd_arch_alpha:
7466 case bfd_arch_sparc:
7467 switch (note->type)
7468 {
b4db1224 7469 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7470 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7471
b4db1224 7472 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7473 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7474
7475 default:
b34976b6 7476 return TRUE;
50b2bdb7
AM
7477 }
7478
7479 /* On all other arch's, PT_GETREGS == mach+1 and
7480 PT_GETFPREGS == mach+3. */
7481
7482 default:
7483 switch (note->type)
7484 {
b4db1224 7485 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7486 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7487
b4db1224 7488 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7489 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7490
7491 default:
b34976b6 7492 return TRUE;
50b2bdb7
AM
7493 }
7494 }
7495 /* NOTREACHED */
7496}
7497
07c6e936 7498static bfd_boolean
217aa764 7499elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7500{
7501 void *ddata = note->descdata;
7502 char buf[100];
7503 char *name;
7504 asection *sect;
f8843e87
AM
7505 short sig;
7506 unsigned flags;
07c6e936
NC
7507
7508 /* nto_procfs_status 'pid' field is at offset 0. */
7509 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7510
f8843e87
AM
7511 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7512 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7513
7514 /* nto_procfs_status 'flags' field is at offset 8. */
7515 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7516
7517 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7518 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7519 {
7520 elf_tdata (abfd)->core_signal = sig;
7521 elf_tdata (abfd)->core_lwpid = *tid;
7522 }
07c6e936 7523
f8843e87
AM
7524 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7525 do not come from signals so we make sure we set the current
7526 thread just in case. */
7527 if (flags & 0x00000080)
7528 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7529
7530 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7531 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7532
217aa764 7533 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7534 if (name == NULL)
7535 return FALSE;
7536 strcpy (name, buf);
7537
62f3bb11 7538 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7539 if (sect == NULL)
7540 return FALSE;
7541
eea6121a 7542 sect->size = note->descsz;
07c6e936
NC
7543 sect->filepos = note->descpos;
7544 sect->flags = SEC_HAS_CONTENTS;
7545 sect->alignment_power = 2;
7546
7547 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7548}
7549
7550static bfd_boolean
d69f560c
KW
7551elfcore_grok_nto_regs (bfd *abfd,
7552 Elf_Internal_Note *note,
7553 pid_t tid,
7554 char *base)
07c6e936
NC
7555{
7556 char buf[100];
7557 char *name;
7558 asection *sect;
7559
d69f560c 7560 /* Make a "(base)/%d" section. */
7e7353ed 7561 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 7562
217aa764 7563 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7564 if (name == NULL)
7565 return FALSE;
7566 strcpy (name, buf);
7567
62f3bb11 7568 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7569 if (sect == NULL)
7570 return FALSE;
7571
eea6121a 7572 sect->size = note->descsz;
07c6e936
NC
7573 sect->filepos = note->descpos;
7574 sect->flags = SEC_HAS_CONTENTS;
7575 sect->alignment_power = 2;
7576
f8843e87
AM
7577 /* This is the current thread. */
7578 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 7579 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
7580
7581 return TRUE;
07c6e936
NC
7582}
7583
7584#define BFD_QNT_CORE_INFO 7
7585#define BFD_QNT_CORE_STATUS 8
7586#define BFD_QNT_CORE_GREG 9
7587#define BFD_QNT_CORE_FPREG 10
7588
7589static bfd_boolean
217aa764 7590elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
7591{
7592 /* Every GREG section has a STATUS section before it. Store the
811072d8 7593 tid from the previous call to pass down to the next gregs
07c6e936
NC
7594 function. */
7595 static pid_t tid = 1;
7596
7597 switch (note->type)
7598 {
d69f560c
KW
7599 case BFD_QNT_CORE_INFO:
7600 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
7601 case BFD_QNT_CORE_STATUS:
7602 return elfcore_grok_nto_status (abfd, note, &tid);
7603 case BFD_QNT_CORE_GREG:
7604 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
7605 case BFD_QNT_CORE_FPREG:
7606 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
7607 default:
7608 return TRUE;
07c6e936
NC
7609 }
7610}
7611
7c76fa91
MS
7612/* Function: elfcore_write_note
7613
47d9a591 7614 Inputs:
7c76fa91
MS
7615 buffer to hold note
7616 name of note
7617 type of note
7618 data for note
7619 size of data for note
7620
7621 Return:
7622 End of buffer containing note. */
7623
7624char *
217aa764
AM
7625elfcore_write_note (bfd *abfd,
7626 char *buf,
7627 int *bufsiz,
7628 const char *name,
7629 int type,
7630 const void *input,
7631 int size)
7c76fa91
MS
7632{
7633 Elf_External_Note *xnp;
d4c88bbb
AM
7634 size_t namesz;
7635 size_t pad;
7636 size_t newspace;
7c76fa91
MS
7637 char *p, *dest;
7638
d4c88bbb
AM
7639 namesz = 0;
7640 pad = 0;
7641 if (name != NULL)
7642 {
9c5bfbb7 7643 const struct elf_backend_data *bed;
d4c88bbb
AM
7644
7645 namesz = strlen (name) + 1;
7646 bed = get_elf_backend_data (abfd);
45d6a902 7647 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
7648 }
7649
5de3bf90 7650 newspace = 12 + namesz + pad + size;
d4c88bbb 7651
7c76fa91
MS
7652 p = realloc (buf, *bufsiz + newspace);
7653 dest = p + *bufsiz;
7654 *bufsiz += newspace;
7655 xnp = (Elf_External_Note *) dest;
7656 H_PUT_32 (abfd, namesz, xnp->namesz);
7657 H_PUT_32 (abfd, size, xnp->descsz);
7658 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
7659 dest = xnp->name;
7660 if (name != NULL)
7661 {
7662 memcpy (dest, name, namesz);
7663 dest += namesz;
7664 while (pad != 0)
7665 {
7666 *dest++ = '\0';
7667 --pad;
7668 }
7669 }
7670 memcpy (dest, input, size);
7c76fa91
MS
7671 return p;
7672}
7673
7674#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
7675char *
217aa764
AM
7676elfcore_write_prpsinfo (bfd *abfd,
7677 char *buf,
7678 int *bufsiz,
7679 const char *fname,
7680 const char *psargs)
7c76fa91
MS
7681{
7682 int note_type;
7683 char *note_name = "CORE";
7684
7685#if defined (HAVE_PSINFO_T)
7686 psinfo_t data;
7687 note_type = NT_PSINFO;
7688#else
7689 prpsinfo_t data;
7690 note_type = NT_PRPSINFO;
7691#endif
7692
7693 memset (&data, 0, sizeof (data));
7694 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
7695 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 7696 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7697 note_name, note_type, &data, sizeof (data));
7698}
7699#endif /* PSINFO_T or PRPSINFO_T */
7700
7701#if defined (HAVE_PRSTATUS_T)
7702char *
217aa764
AM
7703elfcore_write_prstatus (bfd *abfd,
7704 char *buf,
7705 int *bufsiz,
7706 long pid,
7707 int cursig,
7708 const void *gregs)
7c76fa91
MS
7709{
7710 prstatus_t prstat;
7711 char *note_name = "CORE";
7712
7713 memset (&prstat, 0, sizeof (prstat));
7714 prstat.pr_pid = pid;
7715 prstat.pr_cursig = cursig;
c106e334 7716 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 7717 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7718 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
7719}
7720#endif /* HAVE_PRSTATUS_T */
7721
51316059
MS
7722#if defined (HAVE_LWPSTATUS_T)
7723char *
217aa764
AM
7724elfcore_write_lwpstatus (bfd *abfd,
7725 char *buf,
7726 int *bufsiz,
7727 long pid,
7728 int cursig,
7729 const void *gregs)
51316059
MS
7730{
7731 lwpstatus_t lwpstat;
7732 char *note_name = "CORE";
7733
7734 memset (&lwpstat, 0, sizeof (lwpstat));
7735 lwpstat.pr_lwpid = pid >> 16;
7736 lwpstat.pr_cursig = cursig;
7737#if defined (HAVE_LWPSTATUS_T_PR_REG)
7738 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
7739#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
7740#if !defined(gregs)
7741 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
7742 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
7743#else
7744 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
7745 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
7746#endif
7747#endif
47d9a591 7748 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7749 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
7750}
7751#endif /* HAVE_LWPSTATUS_T */
7752
7c76fa91
MS
7753#if defined (HAVE_PSTATUS_T)
7754char *
217aa764
AM
7755elfcore_write_pstatus (bfd *abfd,
7756 char *buf,
7757 int *bufsiz,
7758 long pid,
7759 int cursig,
7760 const void *gregs)
7c76fa91
MS
7761{
7762 pstatus_t pstat;
7763 char *note_name = "CORE";
7764
51316059
MS
7765 memset (&pstat, 0, sizeof (pstat));
7766 pstat.pr_pid = pid & 0xffff;
47d9a591 7767 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7768 NT_PSTATUS, &pstat, sizeof (pstat));
7769 return buf;
7c76fa91
MS
7770}
7771#endif /* HAVE_PSTATUS_T */
7772
7773char *
217aa764
AM
7774elfcore_write_prfpreg (bfd *abfd,
7775 char *buf,
7776 int *bufsiz,
7777 const void *fpregs,
7778 int size)
7c76fa91
MS
7779{
7780 char *note_name = "CORE";
47d9a591 7781 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7782 note_name, NT_FPREGSET, fpregs, size);
7783}
7784
7785char *
217aa764
AM
7786elfcore_write_prxfpreg (bfd *abfd,
7787 char *buf,
7788 int *bufsiz,
7789 const void *xfpregs,
7790 int size)
7c76fa91
MS
7791{
7792 char *note_name = "LINUX";
47d9a591 7793 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7794 note_name, NT_PRXFPREG, xfpregs, size);
7795}
7796
b34976b6 7797static bfd_boolean
217aa764 7798elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 7799{
c044fabd
KH
7800 char *buf;
7801 char *p;
252b5132
RH
7802
7803 if (size <= 0)
b34976b6 7804 return TRUE;
252b5132 7805
dc810e39 7806 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 7807 return FALSE;
252b5132 7808
dc810e39 7809 buf = bfd_malloc (size);
252b5132 7810 if (buf == NULL)
b34976b6 7811 return FALSE;
252b5132 7812
dc810e39 7813 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
7814 {
7815 error:
7816 free (buf);
b34976b6 7817 return FALSE;
252b5132
RH
7818 }
7819
7820 p = buf;
7821 while (p < buf + size)
7822 {
c044fabd
KH
7823 /* FIXME: bad alignment assumption. */
7824 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
7825 Elf_Internal_Note in;
7826
dc810e39 7827 in.type = H_GET_32 (abfd, xnp->type);
252b5132 7828
dc810e39 7829 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
7830 in.namedata = xnp->name;
7831
dc810e39 7832 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
7833 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
7834 in.descpos = offset + (in.descdata - buf);
7835
50b2bdb7
AM
7836 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
7837 {
7838 if (! elfcore_grok_netbsd_note (abfd, &in))
7839 goto error;
7840 }
07c6e936
NC
7841 else if (strncmp (in.namedata, "QNX", 3) == 0)
7842 {
7843 if (! elfcore_grok_nto_note (abfd, &in))
7844 goto error;
7845 }
50b2bdb7
AM
7846 else
7847 {
7848 if (! elfcore_grok_note (abfd, &in))
7849 goto error;
7850 }
252b5132
RH
7851
7852 p = in.descdata + BFD_ALIGN (in.descsz, 4);
7853 }
7854
7855 free (buf);
b34976b6 7856 return TRUE;
252b5132 7857}
98d8431c
JB
7858\f
7859/* Providing external access to the ELF program header table. */
7860
7861/* Return an upper bound on the number of bytes required to store a
7862 copy of ABFD's program header table entries. Return -1 if an error
7863 occurs; bfd_get_error will return an appropriate code. */
c044fabd 7864
98d8431c 7865long
217aa764 7866bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
7867{
7868 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7869 {
7870 bfd_set_error (bfd_error_wrong_format);
7871 return -1;
7872 }
7873
936e320b 7874 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
7875}
7876
98d8431c
JB
7877/* Copy ABFD's program header table entries to *PHDRS. The entries
7878 will be stored as an array of Elf_Internal_Phdr structures, as
7879 defined in include/elf/internal.h. To find out how large the
7880 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
7881
7882 Return the number of program header table entries read, or -1 if an
7883 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 7884
98d8431c 7885int
217aa764 7886bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
7887{
7888 int num_phdrs;
7889
7890 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7891 {
7892 bfd_set_error (bfd_error_wrong_format);
7893 return -1;
7894 }
7895
7896 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 7897 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
7898 num_phdrs * sizeof (Elf_Internal_Phdr));
7899
7900 return num_phdrs;
7901}
ae4221d7
L
7902
7903void
217aa764 7904_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 7905{
d3b05f8d 7906#ifdef BFD64
ae4221d7
L
7907 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7908
7909 i_ehdrp = elf_elfheader (abfd);
7910 if (i_ehdrp == NULL)
7911 sprintf_vma (buf, value);
7912 else
7913 {
7914 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7915 {
ae4221d7 7916#if BFD_HOST_64BIT_LONG
cc55aec9 7917 sprintf (buf, "%016lx", value);
ae4221d7 7918#else
cc55aec9
AM
7919 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
7920 _bfd_int64_low (value));
ae4221d7 7921#endif
cc55aec9 7922 }
ae4221d7
L
7923 else
7924 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
7925 }
d3b05f8d
L
7926#else
7927 sprintf_vma (buf, value);
7928#endif
ae4221d7
L
7929}
7930
7931void
217aa764 7932_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 7933{
d3b05f8d 7934#ifdef BFD64
ae4221d7
L
7935 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7936
7937 i_ehdrp = elf_elfheader (abfd);
7938 if (i_ehdrp == NULL)
7939 fprintf_vma ((FILE *) stream, value);
7940 else
7941 {
7942 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7943 {
ae4221d7 7944#if BFD_HOST_64BIT_LONG
cc55aec9 7945 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 7946#else
cc55aec9
AM
7947 fprintf ((FILE *) stream, "%08lx%08lx",
7948 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 7949#endif
cc55aec9 7950 }
ae4221d7
L
7951 else
7952 fprintf ((FILE *) stream, "%08lx",
7953 (unsigned long) (value & 0xffffffff));
7954 }
d3b05f8d
L
7955#else
7956 fprintf_vma ((FILE *) stream, value);
7957#endif
ae4221d7 7958}
db6751f2
JJ
7959
7960enum elf_reloc_type_class
217aa764 7961_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
7962{
7963 return reloc_class_normal;
7964}
f8df10f4 7965
47d9a591 7966/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
7967 relocation against a local symbol. */
7968
7969bfd_vma
217aa764
AM
7970_bfd_elf_rela_local_sym (bfd *abfd,
7971 Elf_Internal_Sym *sym,
8517fae7 7972 asection **psec,
217aa764 7973 Elf_Internal_Rela *rel)
f8df10f4 7974{
8517fae7 7975 asection *sec = *psec;
f8df10f4
JJ
7976 bfd_vma relocation;
7977
7978 relocation = (sec->output_section->vma
7979 + sec->output_offset
7980 + sym->st_value);
7981 if ((sec->flags & SEC_MERGE)
c629eae0 7982 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 7983 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 7984 {
f8df10f4 7985 rel->r_addend =
8517fae7 7986 _bfd_merged_section_offset (abfd, psec,
65765700 7987 elf_section_data (sec)->sec_info,
753731ee
AM
7988 sym->st_value + rel->r_addend);
7989 if (sec != *psec)
7990 {
7991 /* If we have changed the section, and our original section is
7992 marked with SEC_EXCLUDE, it means that the original
7993 SEC_MERGE section has been completely subsumed in some
7994 other SEC_MERGE section. In this case, we need to leave
7995 some info around for --emit-relocs. */
7996 if ((sec->flags & SEC_EXCLUDE) != 0)
7997 sec->kept_section = *psec;
7998 sec = *psec;
7999 }
8517fae7
AM
8000 rel->r_addend -= relocation;
8001 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8002 }
8003 return relocation;
8004}
c629eae0
JJ
8005
8006bfd_vma
217aa764
AM
8007_bfd_elf_rel_local_sym (bfd *abfd,
8008 Elf_Internal_Sym *sym,
8009 asection **psec,
8010 bfd_vma addend)
47d9a591 8011{
c629eae0
JJ
8012 asection *sec = *psec;
8013
68bfbfcc 8014 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8015 return sym->st_value + addend;
8016
8017 return _bfd_merged_section_offset (abfd, psec,
65765700 8018 elf_section_data (sec)->sec_info,
753731ee 8019 sym->st_value + addend);
c629eae0
JJ
8020}
8021
8022bfd_vma
217aa764 8023_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8024 struct bfd_link_info *info,
217aa764
AM
8025 asection *sec,
8026 bfd_vma offset)
c629eae0 8027{
68bfbfcc 8028 switch (sec->sec_info_type)
65765700
JJ
8029 {
8030 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8031 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8032 offset);
65765700 8033 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8034 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8035 default:
8036 return offset;
8037 }
c629eae0 8038}
3333a7c3
RM
8039\f
8040/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8041 reconstruct an ELF file by reading the segments out of remote memory
8042 based on the ELF file header at EHDR_VMA and the ELF program headers it
8043 points to. If not null, *LOADBASEP is filled in with the difference
8044 between the VMAs from which the segments were read, and the VMAs the
8045 file headers (and hence BFD's idea of each section's VMA) put them at.
8046
8047 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8048 remote memory at target address VMA into the local buffer at MYADDR; it
8049 should return zero on success or an `errno' code on failure. TEMPL must
8050 be a BFD for an ELF target with the word size and byte order found in
8051 the remote memory. */
8052
8053bfd *
217aa764
AM
8054bfd_elf_bfd_from_remote_memory
8055 (bfd *templ,
8056 bfd_vma ehdr_vma,
8057 bfd_vma *loadbasep,
f075ee0c 8058 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8059{
8060 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8061 (templ, ehdr_vma, loadbasep, target_read_memory);
8062}
4c45e5c9
JJ
8063\f
8064long
c9727e01
AM
8065_bfd_elf_get_synthetic_symtab (bfd *abfd,
8066 long symcount ATTRIBUTE_UNUSED,
8067 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8068 long dynsymcount,
c9727e01
AM
8069 asymbol **dynsyms,
8070 asymbol **ret)
4c45e5c9
JJ
8071{
8072 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8073 asection *relplt;
8074 asymbol *s;
8075 const char *relplt_name;
8076 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8077 arelent *p;
8078 long count, i, n;
8079 size_t size;
8080 Elf_Internal_Shdr *hdr;
8081 char *names;
8082 asection *plt;
8083
8615f3f2
AM
8084 *ret = NULL;
8085
90e3cdf2
JJ
8086 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8087 return 0;
8088
8615f3f2
AM
8089 if (dynsymcount <= 0)
8090 return 0;
8091
4c45e5c9
JJ
8092 if (!bed->plt_sym_val)
8093 return 0;
8094
8095 relplt_name = bed->relplt_name;
8096 if (relplt_name == NULL)
8097 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8098 relplt = bfd_get_section_by_name (abfd, relplt_name);
8099 if (relplt == NULL)
8100 return 0;
8101
8102 hdr = &elf_section_data (relplt)->this_hdr;
8103 if (hdr->sh_link != elf_dynsymtab (abfd)
8104 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8105 return 0;
8106
8107 plt = bfd_get_section_by_name (abfd, ".plt");
8108 if (plt == NULL)
8109 return 0;
8110
8111 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8112 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8113 return -1;
8114
eea6121a 8115 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8116 size = count * sizeof (asymbol);
8117 p = relplt->relocation;
8118 for (i = 0; i < count; i++, s++, p++)
8119 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8120
8121 s = *ret = bfd_malloc (size);
8122 if (s == NULL)
8123 return -1;
8124
8125 names = (char *) (s + count);
8126 p = relplt->relocation;
8127 n = 0;
8128 for (i = 0; i < count; i++, s++, p++)
8129 {
8130 size_t len;
8131 bfd_vma addr;
8132
8133 addr = bed->plt_sym_val (i, plt, p);
8134 if (addr == (bfd_vma) -1)
8135 continue;
8136
8137 *s = **p->sym_ptr_ptr;
8138 s->section = plt;
8139 s->value = addr - plt->vma;
8140 s->name = names;
8141 len = strlen ((*p->sym_ptr_ptr)->name);
8142 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8143 names += len;
8144 memcpy (names, "@plt", sizeof ("@plt"));
8145 names += sizeof ("@plt");
8146 ++n;
8147 }
8148
8149 return n;
8150}
3d7f7666
L
8151
8152/* Sort symbol by binding and section. We want to put definitions
8153 sorted by section at the beginning. */
8154
8155static int
8156elf_sort_elf_symbol (const void *arg1, const void *arg2)
8157{
8158 const Elf_Internal_Sym *s1;
8159 const Elf_Internal_Sym *s2;
8160 int shndx;
8161
8162 /* Make sure that undefined symbols are at the end. */
8163 s1 = (const Elf_Internal_Sym *) arg1;
8164 if (s1->st_shndx == SHN_UNDEF)
8165 return 1;
8166 s2 = (const Elf_Internal_Sym *) arg2;
8167 if (s2->st_shndx == SHN_UNDEF)
8168 return -1;
8169
8170 /* Sorted by section index. */
8171 shndx = s1->st_shndx - s2->st_shndx;
8172 if (shndx != 0)
8173 return shndx;
8174
8175 /* Sorted by binding. */
8176 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8177}
8178
8179struct elf_symbol
8180{
8181 Elf_Internal_Sym *sym;
8182 const char *name;
8183};
8184
8185static int
8186elf_sym_name_compare (const void *arg1, const void *arg2)
8187{
8188 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8189 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8190 return strcmp (s1->name, s2->name);
8191}
8192
8193/* Check if 2 sections define the same set of local and global
8194 symbols. */
8195
8196bfd_boolean
8197bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8198{
8199 bfd *bfd1, *bfd2;
8200 const struct elf_backend_data *bed1, *bed2;
8201 Elf_Internal_Shdr *hdr1, *hdr2;
8202 bfd_size_type symcount1, symcount2;
8203 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8204 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8205 Elf_Internal_Sym *isymend;
8206 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8207 bfd_size_type count1, count2, i;
8208 int shndx1, shndx2;
8209 bfd_boolean result;
8210
8211 bfd1 = sec1->owner;
8212 bfd2 = sec2->owner;
8213
8214 /* If both are .gnu.linkonce sections, they have to have the same
8215 section name. */
8216 if (strncmp (sec1->name, ".gnu.linkonce",
8217 sizeof ".gnu.linkonce" - 1) == 0
8218 && strncmp (sec2->name, ".gnu.linkonce",
8219 sizeof ".gnu.linkonce" - 1) == 0)
8220 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8221 sec2->name + sizeof ".gnu.linkonce") == 0;
8222
8223 /* Both sections have to be in ELF. */
8224 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8225 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8226 return FALSE;
8227
8228 if (elf_section_type (sec1) != elf_section_type (sec2))
8229 return FALSE;
8230
8231 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8232 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8233 {
8234 /* If both are members of section groups, they have to have the
8235 same group name. */
8236 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8237 return FALSE;
8238 }
8239
8240 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8241 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8242 if (shndx1 == -1 || shndx2 == -1)
8243 return FALSE;
8244
8245 bed1 = get_elf_backend_data (bfd1);
8246 bed2 = get_elf_backend_data (bfd2);
8247 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8248 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8249 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8250 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8251
8252 if (symcount1 == 0 || symcount2 == 0)
8253 return FALSE;
8254
8255 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8256 NULL, NULL, NULL);
8257 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8258 NULL, NULL, NULL);
8259
8260 result = FALSE;
8261 if (isymbuf1 == NULL || isymbuf2 == NULL)
8262 goto done;
8263
8264 /* Sort symbols by binding and section. Global definitions are at
8265 the beginning. */
8266 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8267 elf_sort_elf_symbol);
8268 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8269 elf_sort_elf_symbol);
8270
8271 /* Count definitions in the section. */
8272 count1 = 0;
8273 for (isym = isymbuf1, isymend = isym + symcount1;
8274 isym < isymend; isym++)
8275 {
8276 if (isym->st_shndx == (unsigned int) shndx1)
8277 {
8278 if (count1 == 0)
8279 isymstart1 = isym;
8280 count1++;
8281 }
8282
8283 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8284 break;
8285 }
8286
8287 count2 = 0;
8288 for (isym = isymbuf2, isymend = isym + symcount2;
8289 isym < isymend; isym++)
8290 {
8291 if (isym->st_shndx == (unsigned int) shndx2)
8292 {
8293 if (count2 == 0)
8294 isymstart2 = isym;
8295 count2++;
8296 }
8297
8298 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8299 break;
8300 }
8301
8302 if (count1 == 0 || count2 == 0 || count1 != count2)
8303 goto done;
8304
8305 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8306 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8307
8308 if (symtable1 == NULL || symtable2 == NULL)
8309 goto done;
8310
8311 symp = symtable1;
8312 for (isym = isymstart1, isymend = isym + count1;
8313 isym < isymend; isym++)
8314 {
8315 symp->sym = isym;
8316 symp->name = bfd_elf_string_from_elf_section (bfd1,
8317 hdr1->sh_link,
8318 isym->st_name);
8319 symp++;
8320 }
8321
8322 symp = symtable2;
8323 for (isym = isymstart2, isymend = isym + count1;
8324 isym < isymend; isym++)
8325 {
8326 symp->sym = isym;
8327 symp->name = bfd_elf_string_from_elf_section (bfd2,
8328 hdr2->sh_link,
8329 isym->st_name);
8330 symp++;
8331 }
8332
8333 /* Sort symbol by name. */
8334 qsort (symtable1, count1, sizeof (struct elf_symbol),
8335 elf_sym_name_compare);
8336 qsort (symtable2, count1, sizeof (struct elf_symbol),
8337 elf_sym_name_compare);
8338
8339 for (i = 0; i < count1; i++)
8340 /* Two symbols must have the same binding, type and name. */
8341 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8342 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8343 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8344 goto done;
8345
8346 result = TRUE;
8347
8348done:
8349 if (symtable1)
8350 free (symtable1);
8351 if (symtable2)
8352 free (symtable2);
8353 if (isymbuf1)
8354 free (isymbuf1);
8355 if (isymbuf2)
8356 free (isymbuf2);
8357
8358 return result;
8359}