]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
daily update
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
fad2f28d 4 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
1b74d094
BW
22/*
23SECTION
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
b34976b6 209bfd_boolean
217aa764 210bfd_elf_mkobject (bfd *abfd)
252b5132 211{
c044fabd
KH
212 /* This just does initialization. */
213 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 214 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 215 if (elf_tdata (abfd) == 0)
b34976b6 216 return FALSE;
c044fabd
KH
217 /* Since everything is done at close time, do we need any
218 initialization? */
252b5132 219
b34976b6 220 return TRUE;
252b5132
RH
221}
222
b34976b6 223bfd_boolean
217aa764 224bfd_elf_mkcorefile (bfd *abfd)
252b5132 225{
c044fabd 226 /* I think this can be done just like an object file. */
252b5132
RH
227 return bfd_elf_mkobject (abfd);
228}
229
230char *
217aa764 231bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
232{
233 Elf_Internal_Shdr **i_shdrp;
f075ee0c 234 bfd_byte *shstrtab = NULL;
dc810e39
AM
235 file_ptr offset;
236 bfd_size_type shstrtabsize;
252b5132
RH
237
238 i_shdrp = elf_elfsections (abfd);
239 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 240 return NULL;
252b5132 241
f075ee0c 242 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
243 if (shstrtab == NULL)
244 {
c044fabd 245 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
246 offset = i_shdrp[shindex]->sh_offset;
247 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
248
249 /* Allocate and clear an extra byte at the end, to prevent crashes
250 in case the string table is not terminated. */
251 if (shstrtabsize + 1 == 0
252 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
253 || bfd_seek (abfd, offset, SEEK_SET) != 0)
254 shstrtab = NULL;
255 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
256 {
257 if (bfd_get_error () != bfd_error_system_call)
258 bfd_set_error (bfd_error_file_truncated);
259 shstrtab = NULL;
260 }
261 else
262 shstrtab[shstrtabsize] = '\0';
217aa764 263 i_shdrp[shindex]->contents = shstrtab;
252b5132 264 }
f075ee0c 265 return (char *) shstrtab;
252b5132
RH
266}
267
268char *
217aa764
AM
269bfd_elf_string_from_elf_section (bfd *abfd,
270 unsigned int shindex,
271 unsigned int strindex)
252b5132
RH
272{
273 Elf_Internal_Shdr *hdr;
274
275 if (strindex == 0)
276 return "";
277
278 hdr = elf_elfsections (abfd)[shindex];
279
280 if (hdr->contents == NULL
281 && bfd_elf_get_str_section (abfd, shindex) == NULL)
282 return NULL;
283
284 if (strindex >= hdr->sh_size)
285 {
1b3a8575 286 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 287 (*_bfd_error_handler)
d003868e
AM
288 (_("%B: invalid string offset %u >= %lu for section `%s'"),
289 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 290 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 291 ? ".shstrtab"
1b3a8575 292 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
293 return "";
294 }
295
296 return ((char *) hdr->contents) + strindex;
297}
298
6cdc0ccc
AM
299/* Read and convert symbols to internal format.
300 SYMCOUNT specifies the number of symbols to read, starting from
301 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
302 are non-NULL, they are used to store the internal symbols, external
303 symbols, and symbol section index extensions, respectively. */
304
305Elf_Internal_Sym *
217aa764
AM
306bfd_elf_get_elf_syms (bfd *ibfd,
307 Elf_Internal_Shdr *symtab_hdr,
308 size_t symcount,
309 size_t symoffset,
310 Elf_Internal_Sym *intsym_buf,
311 void *extsym_buf,
312 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
313{
314 Elf_Internal_Shdr *shndx_hdr;
217aa764 315 void *alloc_ext;
df622259 316 const bfd_byte *esym;
6cdc0ccc
AM
317 Elf_External_Sym_Shndx *alloc_extshndx;
318 Elf_External_Sym_Shndx *shndx;
319 Elf_Internal_Sym *isym;
320 Elf_Internal_Sym *isymend;
9c5bfbb7 321 const struct elf_backend_data *bed;
6cdc0ccc
AM
322 size_t extsym_size;
323 bfd_size_type amt;
324 file_ptr pos;
325
326 if (symcount == 0)
327 return intsym_buf;
328
329 /* Normal syms might have section extension entries. */
330 shndx_hdr = NULL;
331 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
332 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
333
334 /* Read the symbols. */
335 alloc_ext = NULL;
336 alloc_extshndx = NULL;
337 bed = get_elf_backend_data (ibfd);
338 extsym_size = bed->s->sizeof_sym;
339 amt = symcount * extsym_size;
340 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
341 if (extsym_buf == NULL)
342 {
d0fb9a8d 343 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
344 extsym_buf = alloc_ext;
345 }
346 if (extsym_buf == NULL
347 || bfd_seek (ibfd, pos, SEEK_SET) != 0
348 || bfd_bread (extsym_buf, amt, ibfd) != amt)
349 {
350 intsym_buf = NULL;
351 goto out;
352 }
353
354 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
355 extshndx_buf = NULL;
356 else
357 {
358 amt = symcount * sizeof (Elf_External_Sym_Shndx);
359 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
360 if (extshndx_buf == NULL)
361 {
d0fb9a8d
JJ
362 alloc_extshndx = bfd_malloc2 (symcount,
363 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
364 extshndx_buf = alloc_extshndx;
365 }
366 if (extshndx_buf == NULL
367 || bfd_seek (ibfd, pos, SEEK_SET) != 0
368 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
369 {
370 intsym_buf = NULL;
371 goto out;
372 }
373 }
374
375 if (intsym_buf == NULL)
376 {
d0fb9a8d 377 intsym_buf = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
6cdc0ccc
AM
378 if (intsym_buf == NULL)
379 goto out;
380 }
381
382 /* Convert the symbols to internal form. */
383 isymend = intsym_buf + symcount;
384 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
385 isym < isymend;
386 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 387 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
388
389 out:
390 if (alloc_ext != NULL)
391 free (alloc_ext);
392 if (alloc_extshndx != NULL)
393 free (alloc_extshndx);
394
395 return intsym_buf;
396}
397
5cab59f6
AM
398/* Look up a symbol name. */
399const char *
be8dd2ca
AM
400bfd_elf_sym_name (bfd *abfd,
401 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
402 Elf_Internal_Sym *isym,
403 asection *sym_sec)
5cab59f6 404{
26c61ae5 405 const char *name;
5cab59f6 406 unsigned int iname = isym->st_name;
be8dd2ca 407 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 408
138f35cc
JJ
409 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
410 /* Check for a bogus st_shndx to avoid crashing. */
411 && isym->st_shndx < elf_numsections (abfd)
412 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
413 {
414 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
415 shindex = elf_elfheader (abfd)->e_shstrndx;
416 }
417
26c61ae5
L
418 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
419 if (name == NULL)
420 name = "(null)";
421 else if (sym_sec && *name == '\0')
422 name = bfd_section_name (abfd, sym_sec);
423
424 return name;
5cab59f6
AM
425}
426
dbb410c3
AM
427/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
428 sections. The first element is the flags, the rest are section
429 pointers. */
430
431typedef union elf_internal_group {
432 Elf_Internal_Shdr *shdr;
433 unsigned int flags;
434} Elf_Internal_Group;
435
b885599b
AM
436/* Return the name of the group signature symbol. Why isn't the
437 signature just a string? */
438
439static const char *
217aa764 440group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 441{
9dce4196 442 Elf_Internal_Shdr *hdr;
9dce4196
AM
443 unsigned char esym[sizeof (Elf64_External_Sym)];
444 Elf_External_Sym_Shndx eshndx;
445 Elf_Internal_Sym isym;
b885599b 446
13792e9d
L
447 /* First we need to ensure the symbol table is available. Make sure
448 that it is a symbol table section. */
449 hdr = elf_elfsections (abfd) [ghdr->sh_link];
450 if (hdr->sh_type != SHT_SYMTAB
451 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
452 return NULL;
453
9dce4196
AM
454 /* Go read the symbol. */
455 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
456 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
457 &isym, esym, &eshndx) == NULL)
b885599b 458 return NULL;
9dce4196 459
26c61ae5 460 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
461}
462
dbb410c3
AM
463/* Set next_in_group list pointer, and group name for NEWSECT. */
464
b34976b6 465static bfd_boolean
217aa764 466setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
467{
468 unsigned int num_group = elf_tdata (abfd)->num_group;
469
470 /* If num_group is zero, read in all SHT_GROUP sections. The count
471 is set to -1 if there are no SHT_GROUP sections. */
472 if (num_group == 0)
473 {
474 unsigned int i, shnum;
475
476 /* First count the number of groups. If we have a SHT_GROUP
477 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 478 shnum = elf_numsections (abfd);
dbb410c3
AM
479 num_group = 0;
480 for (i = 0; i < shnum; i++)
481 {
482 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
483 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
484 num_group += 1;
485 }
486
487 if (num_group == 0)
20dbb49d
L
488 {
489 num_group = (unsigned) -1;
490 elf_tdata (abfd)->num_group = num_group;
491 }
492 else
dbb410c3
AM
493 {
494 /* We keep a list of elf section headers for group sections,
495 so we can find them quickly. */
20dbb49d 496 bfd_size_type amt;
d0fb9a8d 497
20dbb49d 498 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
499 elf_tdata (abfd)->group_sect_ptr
500 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 501 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 502 return FALSE;
dbb410c3
AM
503
504 num_group = 0;
505 for (i = 0; i < shnum; i++)
506 {
507 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
508 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
509 {
973ffd63 510 unsigned char *src;
dbb410c3
AM
511 Elf_Internal_Group *dest;
512
513 /* Add to list of sections. */
514 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
515 num_group += 1;
516
517 /* Read the raw contents. */
518 BFD_ASSERT (sizeof (*dest) >= 4);
519 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
520 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
521 sizeof (*dest) / 4);
dbb410c3
AM
522 if (shdr->contents == NULL
523 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
524 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
525 != shdr->sh_size))
b34976b6 526 return FALSE;
dbb410c3
AM
527
528 /* Translate raw contents, a flag word followed by an
529 array of elf section indices all in target byte order,
530 to the flag word followed by an array of elf section
531 pointers. */
532 src = shdr->contents + shdr->sh_size;
533 dest = (Elf_Internal_Group *) (shdr->contents + amt);
534 while (1)
535 {
536 unsigned int idx;
537
538 src -= 4;
539 --dest;
540 idx = H_GET_32 (abfd, src);
541 if (src == shdr->contents)
542 {
543 dest->flags = idx;
b885599b
AM
544 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
545 shdr->bfd_section->flags
546 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
547 break;
548 }
549 if (idx >= shnum)
550 {
551 ((*_bfd_error_handler)
d003868e 552 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
553 idx = 0;
554 }
555 dest->shdr = elf_elfsections (abfd)[idx];
556 }
557 }
558 }
559 }
560 }
561
562 if (num_group != (unsigned) -1)
563 {
564 unsigned int i;
565
566 for (i = 0; i < num_group; i++)
567 {
568 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
569 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
570 unsigned int n_elt = shdr->sh_size / 4;
571
572 /* Look through this group's sections to see if current
573 section is a member. */
574 while (--n_elt != 0)
575 if ((++idx)->shdr == hdr)
576 {
e0e8c97f 577 asection *s = NULL;
dbb410c3
AM
578
579 /* We are a member of this group. Go looking through
580 other members to see if any others are linked via
581 next_in_group. */
582 idx = (Elf_Internal_Group *) shdr->contents;
583 n_elt = shdr->sh_size / 4;
584 while (--n_elt != 0)
585 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 586 && elf_next_in_group (s) != NULL)
dbb410c3
AM
587 break;
588 if (n_elt != 0)
589 {
dbb410c3
AM
590 /* Snarf the group name from other member, and
591 insert current section in circular list. */
945906ff
AM
592 elf_group_name (newsect) = elf_group_name (s);
593 elf_next_in_group (newsect) = elf_next_in_group (s);
594 elf_next_in_group (s) = newsect;
dbb410c3
AM
595 }
596 else
597 {
dbb410c3
AM
598 const char *gname;
599
b885599b
AM
600 gname = group_signature (abfd, shdr);
601 if (gname == NULL)
b34976b6 602 return FALSE;
945906ff 603 elf_group_name (newsect) = gname;
dbb410c3
AM
604
605 /* Start a circular list with one element. */
945906ff 606 elf_next_in_group (newsect) = newsect;
dbb410c3 607 }
b885599b 608
9dce4196
AM
609 /* If the group section has been created, point to the
610 new member. */
dbb410c3 611 if (shdr->bfd_section != NULL)
945906ff 612 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 613
dbb410c3
AM
614 i = num_group - 1;
615 break;
616 }
617 }
618 }
619
945906ff 620 if (elf_group_name (newsect) == NULL)
dbb410c3 621 {
d003868e
AM
622 (*_bfd_error_handler) (_("%B: no group info for section %A"),
623 abfd, newsect);
dbb410c3 624 }
b34976b6 625 return TRUE;
dbb410c3
AM
626}
627
3d7f7666 628bfd_boolean
dd863624 629_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
630{
631 unsigned int i;
632 unsigned int num_group = elf_tdata (abfd)->num_group;
633 bfd_boolean result = TRUE;
dd863624
L
634 asection *s;
635
636 /* Process SHF_LINK_ORDER. */
637 for (s = abfd->sections; s != NULL; s = s->next)
638 {
639 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
640 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
641 {
642 unsigned int elfsec = this_hdr->sh_link;
643 /* FIXME: The old Intel compiler and old strip/objcopy may
644 not set the sh_link or sh_info fields. Hence we could
645 get the situation where elfsec is 0. */
646 if (elfsec == 0)
647 {
648 const struct elf_backend_data *bed
649 = get_elf_backend_data (abfd);
650 if (bed->link_order_error_handler)
651 bed->link_order_error_handler
652 (_("%B: warning: sh_link not set for section `%A'"),
653 abfd, s);
654 }
655 else
656 {
25bbc984
L
657 asection *link;
658
dd863624 659 this_hdr = elf_elfsections (abfd)[elfsec];
25bbc984
L
660
661 /* PR 1991, 2008:
662 Some strip/objcopy may leave an incorrect value in
663 sh_link. We don't want to proceed. */
664 link = this_hdr->bfd_section;
665 if (link == NULL)
666 {
667 (*_bfd_error_handler)
668 (_("%B: sh_link [%d] in section `%A' is incorrect"),
669 s->owner, s, elfsec);
670 result = FALSE;
671 }
672
673 elf_linked_to_section (s) = link;
dd863624
L
674 }
675 }
676 }
3d7f7666 677
dd863624 678 /* Process section groups. */
3d7f7666
L
679 if (num_group == (unsigned) -1)
680 return result;
681
682 for (i = 0; i < num_group; i++)
683 {
684 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
685 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
686 unsigned int n_elt = shdr->sh_size / 4;
687
688 while (--n_elt != 0)
689 if ((++idx)->shdr->bfd_section)
690 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
691 else if (idx->shdr->sh_type == SHT_RELA
692 || idx->shdr->sh_type == SHT_REL)
693 /* We won't include relocation sections in section groups in
694 output object files. We adjust the group section size here
695 so that relocatable link will work correctly when
696 relocation sections are in section group in input object
697 files. */
698 shdr->bfd_section->size -= 4;
699 else
700 {
701 /* There are some unknown sections in the group. */
702 (*_bfd_error_handler)
d003868e
AM
703 (_("%B: unknown [%d] section `%s' in group [%s]"),
704 abfd,
3d7f7666 705 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
706 bfd_elf_string_from_elf_section (abfd,
707 (elf_elfheader (abfd)
708 ->e_shstrndx),
709 idx->shdr->sh_name),
3d7f7666
L
710 shdr->bfd_section->name);
711 result = FALSE;
712 }
713 }
714 return result;
715}
716
72adc230
AM
717bfd_boolean
718bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
719{
720 return elf_next_in_group (sec) != NULL;
721}
722
252b5132
RH
723/* Make a BFD section from an ELF section. We store a pointer to the
724 BFD section in the bfd_section field of the header. */
725
b34976b6 726bfd_boolean
217aa764
AM
727_bfd_elf_make_section_from_shdr (bfd *abfd,
728 Elf_Internal_Shdr *hdr,
6dc132d9
L
729 const char *name,
730 int shindex)
252b5132
RH
731{
732 asection *newsect;
733 flagword flags;
9c5bfbb7 734 const struct elf_backend_data *bed;
252b5132
RH
735
736 if (hdr->bfd_section != NULL)
737 {
738 BFD_ASSERT (strcmp (name,
739 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 740 return TRUE;
252b5132
RH
741 }
742
743 newsect = bfd_make_section_anyway (abfd, name);
744 if (newsect == NULL)
b34976b6 745 return FALSE;
252b5132 746
1829f4b2
AM
747 hdr->bfd_section = newsect;
748 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 749 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 750
2f89ff8d
L
751 /* Always use the real type/flags. */
752 elf_section_type (newsect) = hdr->sh_type;
753 elf_section_flags (newsect) = hdr->sh_flags;
754
252b5132
RH
755 newsect->filepos = hdr->sh_offset;
756
757 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
758 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
759 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 760 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 761 return FALSE;
252b5132
RH
762
763 flags = SEC_NO_FLAGS;
764 if (hdr->sh_type != SHT_NOBITS)
765 flags |= SEC_HAS_CONTENTS;
dbb410c3 766 if (hdr->sh_type == SHT_GROUP)
b3096250 767 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
768 if ((hdr->sh_flags & SHF_ALLOC) != 0)
769 {
770 flags |= SEC_ALLOC;
771 if (hdr->sh_type != SHT_NOBITS)
772 flags |= SEC_LOAD;
773 }
774 if ((hdr->sh_flags & SHF_WRITE) == 0)
775 flags |= SEC_READONLY;
776 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
777 flags |= SEC_CODE;
778 else if ((flags & SEC_LOAD) != 0)
779 flags |= SEC_DATA;
f5fa8ca2
JJ
780 if ((hdr->sh_flags & SHF_MERGE) != 0)
781 {
782 flags |= SEC_MERGE;
783 newsect->entsize = hdr->sh_entsize;
784 if ((hdr->sh_flags & SHF_STRINGS) != 0)
785 flags |= SEC_STRINGS;
786 }
dbb410c3
AM
787 if (hdr->sh_flags & SHF_GROUP)
788 if (!setup_group (abfd, hdr, newsect))
b34976b6 789 return FALSE;
13ae64f3
JJ
790 if ((hdr->sh_flags & SHF_TLS) != 0)
791 flags |= SEC_THREAD_LOCAL;
252b5132 792
3d2b39cf 793 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 794 {
3d2b39cf
L
795 /* The debugging sections appear to be recognized only by name,
796 not any sort of flag. Their SEC_ALLOC bits are cleared. */
797 static const struct
798 {
799 const char *name;
800 int len;
801 } debug_sections [] =
802 {
803 { "debug", 5 }, /* 'd' */
804 { NULL, 0 }, /* 'e' */
805 { NULL, 0 }, /* 'f' */
806 { "gnu.linkonce.wi.", 17 }, /* 'g' */
807 { NULL, 0 }, /* 'h' */
808 { NULL, 0 }, /* 'i' */
809 { NULL, 0 }, /* 'j' */
810 { NULL, 0 }, /* 'k' */
811 { "line", 4 }, /* 'l' */
812 { NULL, 0 }, /* 'm' */
813 { NULL, 0 }, /* 'n' */
814 { NULL, 0 }, /* 'o' */
815 { NULL, 0 }, /* 'p' */
816 { NULL, 0 }, /* 'q' */
817 { NULL, 0 }, /* 'r' */
818 { "stab", 4 } /* 's' */
819 };
820
821 if (name [0] == '.')
822 {
823 int i = name [1] - 'd';
824 if (i >= 0
825 && i < (int) ARRAY_SIZE (debug_sections)
826 && debug_sections [i].name != NULL
827 && strncmp (&name [1], debug_sections [i].name,
828 debug_sections [i].len) == 0)
829 flags |= SEC_DEBUGGING;
830 }
831 }
252b5132
RH
832
833 /* As a GNU extension, if the name begins with .gnu.linkonce, we
834 only link a single copy of the section. This is used to support
835 g++. g++ will emit each template expansion in its own section.
836 The symbols will be defined as weak, so that multiple definitions
837 are permitted. The GNU linker extension is to actually discard
838 all but one of the sections. */
b885599b
AM
839 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
840 && elf_next_in_group (newsect) == NULL)
252b5132
RH
841 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
842
fa152c49
JW
843 bed = get_elf_backend_data (abfd);
844 if (bed->elf_backend_section_flags)
845 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 846 return FALSE;
fa152c49 847
252b5132 848 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 849 return FALSE;
252b5132
RH
850
851 if ((flags & SEC_ALLOC) != 0)
852 {
853 Elf_Internal_Phdr *phdr;
854 unsigned int i;
855
856 /* Look through the phdrs to see if we need to adjust the lma.
857 If all the p_paddr fields are zero, we ignore them, since
858 some ELF linkers produce such output. */
859 phdr = elf_tdata (abfd)->phdr;
860 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
861 {
862 if (phdr->p_paddr != 0)
863 break;
864 }
865 if (i < elf_elfheader (abfd)->e_phnum)
866 {
867 phdr = elf_tdata (abfd)->phdr;
868 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
869 {
e0e8c97f
NC
870 /* This section is part of this segment if its file
871 offset plus size lies within the segment's memory
872 span and, if the section is loaded, the extent of the
47d9a591 873 loaded data lies within the extent of the segment.
bf36db18
NC
874
875 Note - we used to check the p_paddr field as well, and
876 refuse to set the LMA if it was 0. This is wrong
dba143ef 877 though, as a perfectly valid initialised segment can
bf36db18 878 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 879 place special significance on the address 0 and
bf36db18
NC
880 executables need to be able to have a segment which
881 covers this address. */
252b5132 882 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
883 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
884 && (hdr->sh_offset + hdr->sh_size
885 <= phdr->p_offset + phdr->p_memsz)
252b5132 886 && ((flags & SEC_LOAD) == 0
d7866f04
AM
887 || (hdr->sh_offset + hdr->sh_size
888 <= phdr->p_offset + phdr->p_filesz)))
252b5132 889 {
dba143ef 890 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
891 newsect->lma = (phdr->p_paddr
892 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
893 else
894 /* We used to use the same adjustment for SEC_LOAD
895 sections, but that doesn't work if the segment
896 is packed with code from multiple VMAs.
897 Instead we calculate the section LMA based on
898 the segment LMA. It is assumed that the
899 segment will contain sections with contiguous
900 LMAs, even if the VMAs are not. */
901 newsect->lma = (phdr->p_paddr
902 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
903
904 /* With contiguous segments, we can't tell from file
905 offsets whether a section with zero size should
906 be placed at the end of one segment or the
907 beginning of the next. Decide based on vaddr. */
908 if (hdr->sh_addr >= phdr->p_vaddr
909 && (hdr->sh_addr + hdr->sh_size
910 <= phdr->p_vaddr + phdr->p_memsz))
911 break;
252b5132
RH
912 }
913 }
914 }
915 }
916
b34976b6 917 return TRUE;
252b5132
RH
918}
919
920/*
921INTERNAL_FUNCTION
922 bfd_elf_find_section
923
924SYNOPSIS
925 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
926
927DESCRIPTION
928 Helper functions for GDB to locate the string tables.
929 Since BFD hides string tables from callers, GDB needs to use an
930 internal hook to find them. Sun's .stabstr, in particular,
931 isn't even pointed to by the .stab section, so ordinary
932 mechanisms wouldn't work to find it, even if we had some.
933*/
934
935struct elf_internal_shdr *
217aa764 936bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
937{
938 Elf_Internal_Shdr **i_shdrp;
939 char *shstrtab;
940 unsigned int max;
941 unsigned int i;
942
943 i_shdrp = elf_elfsections (abfd);
944 if (i_shdrp != NULL)
945 {
9ad5cbcf
AM
946 shstrtab = bfd_elf_get_str_section (abfd,
947 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
948 if (shstrtab != NULL)
949 {
9ad5cbcf 950 max = elf_numsections (abfd);
252b5132
RH
951 for (i = 1; i < max; i++)
952 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
953 return i_shdrp[i];
954 }
955 }
956 return 0;
957}
958
959const char *const bfd_elf_section_type_names[] = {
960 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
961 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
962 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
963};
964
1049f94e 965/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
966 output, and the reloc is against an external symbol, and nothing
967 has given us any additional addend, the resulting reloc will also
968 be against the same symbol. In such a case, we don't want to
969 change anything about the way the reloc is handled, since it will
970 all be done at final link time. Rather than put special case code
971 into bfd_perform_relocation, all the reloc types use this howto
972 function. It just short circuits the reloc if producing
1049f94e 973 relocatable output against an external symbol. */
252b5132 974
252b5132 975bfd_reloc_status_type
217aa764
AM
976bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
977 arelent *reloc_entry,
978 asymbol *symbol,
979 void *data ATTRIBUTE_UNUSED,
980 asection *input_section,
981 bfd *output_bfd,
982 char **error_message ATTRIBUTE_UNUSED)
983{
984 if (output_bfd != NULL
252b5132
RH
985 && (symbol->flags & BSF_SECTION_SYM) == 0
986 && (! reloc_entry->howto->partial_inplace
987 || reloc_entry->addend == 0))
988 {
989 reloc_entry->address += input_section->output_offset;
990 return bfd_reloc_ok;
991 }
992
993 return bfd_reloc_continue;
994}
995\f
d3c456e9
JJ
996/* Make sure sec_info_type is cleared if sec_info is cleared too. */
997
998static void
217aa764
AM
999merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
1000 asection *sec)
d3c456e9 1001{
68bfbfcc
AM
1002 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
1003 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
1004}
1005
8550eb6e
JJ
1006/* Finish SHF_MERGE section merging. */
1007
b34976b6 1008bfd_boolean
217aa764 1009_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 1010{
57ceae94
AM
1011 bfd *ibfd;
1012 asection *sec;
1013
0eddce27 1014 if (!is_elf_hash_table (info->hash))
b34976b6 1015 return FALSE;
57ceae94
AM
1016
1017 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1018 if ((ibfd->flags & DYNAMIC) == 0)
1019 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
1020 if ((sec->flags & SEC_MERGE) != 0
1021 && !bfd_is_abs_section (sec->output_section))
1022 {
1023 struct bfd_elf_section_data *secdata;
1024
1025 secdata = elf_section_data (sec);
1026 if (! _bfd_add_merge_section (abfd,
1027 &elf_hash_table (info)->merge_info,
1028 sec, &secdata->sec_info))
1029 return FALSE;
1030 else if (secdata->sec_info)
1031 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
1032 }
1033
1034 if (elf_hash_table (info)->merge_info != NULL)
1035 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 1036 merge_sections_remove_hook);
b34976b6 1037 return TRUE;
8550eb6e 1038}
2d653fc7
AM
1039
1040void
217aa764 1041_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1042{
1043 sec->output_section = bfd_abs_section_ptr;
1044 sec->output_offset = sec->vma;
0eddce27 1045 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1046 return;
1047
68bfbfcc 1048 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1049}
8550eb6e 1050\f
0ac4564e
L
1051/* Copy the program header and other data from one object module to
1052 another. */
252b5132 1053
b34976b6 1054bfd_boolean
217aa764 1055_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1056{
1057 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1058 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1059 return TRUE;
2d502050
L
1060
1061 BFD_ASSERT (!elf_flags_init (obfd)
1062 || (elf_elfheader (obfd)->e_flags
1063 == elf_elfheader (ibfd)->e_flags));
1064
0ac4564e 1065 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1066 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1067 elf_flags_init (obfd) = TRUE;
1068 return TRUE;
2d502050
L
1069}
1070
cedc298e
L
1071static const char *
1072get_segment_type (unsigned int p_type)
1073{
1074 const char *pt;
1075 switch (p_type)
1076 {
1077 case PT_NULL: pt = "NULL"; break;
1078 case PT_LOAD: pt = "LOAD"; break;
1079 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1080 case PT_INTERP: pt = "INTERP"; break;
1081 case PT_NOTE: pt = "NOTE"; break;
1082 case PT_SHLIB: pt = "SHLIB"; break;
1083 case PT_PHDR: pt = "PHDR"; break;
1084 case PT_TLS: pt = "TLS"; break;
1085 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1086 case PT_GNU_STACK: pt = "STACK"; break;
1087 case PT_GNU_RELRO: pt = "RELRO"; break;
1088 default: pt = NULL; break;
1089 }
1090 return pt;
1091}
1092
f0b79d91
L
1093/* Print out the program headers. */
1094
b34976b6 1095bfd_boolean
217aa764 1096_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1097{
217aa764 1098 FILE *f = farg;
252b5132
RH
1099 Elf_Internal_Phdr *p;
1100 asection *s;
1101 bfd_byte *dynbuf = NULL;
1102
1103 p = elf_tdata (abfd)->phdr;
1104 if (p != NULL)
1105 {
1106 unsigned int i, c;
1107
1108 fprintf (f, _("\nProgram Header:\n"));
1109 c = elf_elfheader (abfd)->e_phnum;
1110 for (i = 0; i < c; i++, p++)
1111 {
cedc298e 1112 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1113 char buf[20];
1114
cedc298e 1115 if (pt == NULL)
252b5132 1116 {
cedc298e
L
1117 sprintf (buf, "0x%lx", p->p_type);
1118 pt = buf;
252b5132 1119 }
dc810e39 1120 fprintf (f, "%8s off 0x", pt);
60b89a18 1121 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1122 fprintf (f, " vaddr 0x");
60b89a18 1123 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1124 fprintf (f, " paddr 0x");
60b89a18 1125 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1126 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1127 fprintf (f, " filesz 0x");
60b89a18 1128 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1129 fprintf (f, " memsz 0x");
60b89a18 1130 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1131 fprintf (f, " flags %c%c%c",
1132 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1133 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1134 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1135 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1136 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1137 fprintf (f, "\n");
1138 }
1139 }
1140
1141 s = bfd_get_section_by_name (abfd, ".dynamic");
1142 if (s != NULL)
1143 {
1144 int elfsec;
dc810e39 1145 unsigned long shlink;
252b5132
RH
1146 bfd_byte *extdyn, *extdynend;
1147 size_t extdynsize;
217aa764 1148 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1149
1150 fprintf (f, _("\nDynamic Section:\n"));
1151
eea6121a 1152 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1153 goto error_return;
1154
1155 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1156 if (elfsec == -1)
1157 goto error_return;
dc810e39 1158 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1159
1160 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1161 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1162
1163 extdyn = dynbuf;
eea6121a 1164 extdynend = extdyn + s->size;
252b5132
RH
1165 for (; extdyn < extdynend; extdyn += extdynsize)
1166 {
1167 Elf_Internal_Dyn dyn;
1168 const char *name;
1169 char ab[20];
b34976b6 1170 bfd_boolean stringp;
252b5132 1171
217aa764 1172 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1173
1174 if (dyn.d_tag == DT_NULL)
1175 break;
1176
b34976b6 1177 stringp = FALSE;
252b5132
RH
1178 switch (dyn.d_tag)
1179 {
1180 default:
1181 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1182 name = ab;
1183 break;
1184
b34976b6 1185 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1186 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1187 case DT_PLTGOT: name = "PLTGOT"; break;
1188 case DT_HASH: name = "HASH"; break;
1189 case DT_STRTAB: name = "STRTAB"; break;
1190 case DT_SYMTAB: name = "SYMTAB"; break;
1191 case DT_RELA: name = "RELA"; break;
1192 case DT_RELASZ: name = "RELASZ"; break;
1193 case DT_RELAENT: name = "RELAENT"; break;
1194 case DT_STRSZ: name = "STRSZ"; break;
1195 case DT_SYMENT: name = "SYMENT"; break;
1196 case DT_INIT: name = "INIT"; break;
1197 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1198 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1199 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1200 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1201 case DT_REL: name = "REL"; break;
1202 case DT_RELSZ: name = "RELSZ"; break;
1203 case DT_RELENT: name = "RELENT"; break;
1204 case DT_PLTREL: name = "PLTREL"; break;
1205 case DT_DEBUG: name = "DEBUG"; break;
1206 case DT_TEXTREL: name = "TEXTREL"; break;
1207 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1208 case DT_BIND_NOW: name = "BIND_NOW"; break;
1209 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1210 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1211 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1212 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1213 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1214 case DT_FLAGS: name = "FLAGS"; break;
1215 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1216 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1217 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1218 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1219 case DT_MOVEENT: name = "MOVEENT"; break;
1220 case DT_MOVESZ: name = "MOVESZ"; break;
1221 case DT_FEATURE: name = "FEATURE"; break;
1222 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1223 case DT_SYMINSZ: name = "SYMINSZ"; break;
1224 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1225 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1226 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1227 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1228 case DT_PLTPAD: name = "PLTPAD"; break;
1229 case DT_MOVETAB: name = "MOVETAB"; break;
1230 case DT_SYMINFO: name = "SYMINFO"; break;
1231 case DT_RELACOUNT: name = "RELACOUNT"; break;
1232 case DT_RELCOUNT: name = "RELCOUNT"; break;
1233 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1234 case DT_VERSYM: name = "VERSYM"; break;
1235 case DT_VERDEF: name = "VERDEF"; break;
1236 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1237 case DT_VERNEED: name = "VERNEED"; break;
1238 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1239 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1240 case DT_USED: name = "USED"; break;
b34976b6 1241 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1242 }
1243
1244 fprintf (f, " %-11s ", name);
1245 if (! stringp)
1246 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1247 else
1248 {
1249 const char *string;
dc810e39 1250 unsigned int tagv = dyn.d_un.d_val;
252b5132 1251
dc810e39 1252 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1253 if (string == NULL)
1254 goto error_return;
1255 fprintf (f, "%s", string);
1256 }
1257 fprintf (f, "\n");
1258 }
1259
1260 free (dynbuf);
1261 dynbuf = NULL;
1262 }
1263
1264 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1265 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1266 {
fc0e6df6 1267 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1268 return FALSE;
252b5132
RH
1269 }
1270
1271 if (elf_dynverdef (abfd) != 0)
1272 {
1273 Elf_Internal_Verdef *t;
1274
1275 fprintf (f, _("\nVersion definitions:\n"));
1276 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1277 {
1278 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1279 t->vd_flags, t->vd_hash,
1280 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1281 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1282 {
1283 Elf_Internal_Verdaux *a;
1284
1285 fprintf (f, "\t");
1286 for (a = t->vd_auxptr->vda_nextptr;
1287 a != NULL;
1288 a = a->vda_nextptr)
d0fb9a8d
JJ
1289 fprintf (f, "%s ",
1290 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1291 fprintf (f, "\n");
1292 }
1293 }
1294 }
1295
1296 if (elf_dynverref (abfd) != 0)
1297 {
1298 Elf_Internal_Verneed *t;
1299
1300 fprintf (f, _("\nVersion References:\n"));
1301 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1302 {
1303 Elf_Internal_Vernaux *a;
1304
d0fb9a8d
JJ
1305 fprintf (f, _(" required from %s:\n"),
1306 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1307 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1308 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1309 a->vna_flags, a->vna_other,
1310 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1311 }
1312 }
1313
b34976b6 1314 return TRUE;
252b5132
RH
1315
1316 error_return:
1317 if (dynbuf != NULL)
1318 free (dynbuf);
b34976b6 1319 return FALSE;
252b5132
RH
1320}
1321
1322/* Display ELF-specific fields of a symbol. */
1323
1324void
217aa764
AM
1325bfd_elf_print_symbol (bfd *abfd,
1326 void *filep,
1327 asymbol *symbol,
1328 bfd_print_symbol_type how)
252b5132 1329{
217aa764 1330 FILE *file = filep;
252b5132
RH
1331 switch (how)
1332 {
1333 case bfd_print_symbol_name:
1334 fprintf (file, "%s", symbol->name);
1335 break;
1336 case bfd_print_symbol_more:
1337 fprintf (file, "elf ");
60b89a18 1338 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1339 fprintf (file, " %lx", (long) symbol->flags);
1340 break;
1341 case bfd_print_symbol_all:
1342 {
4e8a9624
AM
1343 const char *section_name;
1344 const char *name = NULL;
9c5bfbb7 1345 const struct elf_backend_data *bed;
7a13edea 1346 unsigned char st_other;
dbb410c3 1347 bfd_vma val;
c044fabd 1348
252b5132 1349 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1350
1351 bed = get_elf_backend_data (abfd);
1352 if (bed->elf_backend_print_symbol_all)
c044fabd 1353 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1354
1355 if (name == NULL)
1356 {
7ee38065 1357 name = symbol->name;
217aa764 1358 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1359 }
1360
252b5132
RH
1361 fprintf (file, " %s\t", section_name);
1362 /* Print the "other" value for a symbol. For common symbols,
1363 we've already printed the size; now print the alignment.
1364 For other symbols, we have no specified alignment, and
1365 we've printed the address; now print the size. */
dbb410c3
AM
1366 if (bfd_is_com_section (symbol->section))
1367 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1368 else
1369 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1370 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1371
1372 /* If we have version information, print it. */
1373 if (elf_tdata (abfd)->dynversym_section != 0
1374 && (elf_tdata (abfd)->dynverdef_section != 0
1375 || elf_tdata (abfd)->dynverref_section != 0))
1376 {
1377 unsigned int vernum;
1378 const char *version_string;
1379
1380 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1381
1382 if (vernum == 0)
1383 version_string = "";
1384 else if (vernum == 1)
1385 version_string = "Base";
1386 else if (vernum <= elf_tdata (abfd)->cverdefs)
1387 version_string =
1388 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1389 else
1390 {
1391 Elf_Internal_Verneed *t;
1392
1393 version_string = "";
1394 for (t = elf_tdata (abfd)->verref;
1395 t != NULL;
1396 t = t->vn_nextref)
1397 {
1398 Elf_Internal_Vernaux *a;
1399
1400 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1401 {
1402 if (a->vna_other == vernum)
1403 {
1404 version_string = a->vna_nodename;
1405 break;
1406 }
1407 }
1408 }
1409 }
1410
1411 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1412 fprintf (file, " %-11s", version_string);
1413 else
1414 {
1415 int i;
1416
1417 fprintf (file, " (%s)", version_string);
1418 for (i = 10 - strlen (version_string); i > 0; --i)
1419 putc (' ', file);
1420 }
1421 }
1422
1423 /* If the st_other field is not zero, print it. */
7a13edea 1424 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1425
7a13edea
NC
1426 switch (st_other)
1427 {
1428 case 0: break;
1429 case STV_INTERNAL: fprintf (file, " .internal"); break;
1430 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1431 case STV_PROTECTED: fprintf (file, " .protected"); break;
1432 default:
1433 /* Some other non-defined flags are also present, so print
1434 everything hex. */
1435 fprintf (file, " 0x%02x", (unsigned int) st_other);
1436 }
252b5132 1437
587ff49e 1438 fprintf (file, " %s", name);
252b5132
RH
1439 }
1440 break;
1441 }
1442}
1443\f
1444/* Create an entry in an ELF linker hash table. */
1445
1446struct bfd_hash_entry *
217aa764
AM
1447_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1448 struct bfd_hash_table *table,
1449 const char *string)
252b5132 1450{
252b5132
RH
1451 /* Allocate the structure if it has not already been allocated by a
1452 subclass. */
51b64d56
AM
1453 if (entry == NULL)
1454 {
1455 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1456 if (entry == NULL)
1457 return entry;
1458 }
252b5132
RH
1459
1460 /* Call the allocation method of the superclass. */
51b64d56
AM
1461 entry = _bfd_link_hash_newfunc (entry, table, string);
1462 if (entry != NULL)
252b5132 1463 {
51b64d56
AM
1464 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1465 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1466
252b5132
RH
1467 /* Set local fields. */
1468 ret->indx = -1;
252b5132 1469 ret->dynindx = -1;
a6aa5195
AM
1470 ret->got = htab->init_got_refcount;
1471 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1472 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1473 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1474 /* Assume that we have been called by a non-ELF symbol reader.
1475 This flag is then reset by the code which reads an ELF input
1476 file. This ensures that a symbol created by a non-ELF symbol
1477 reader will have the flag set correctly. */
f5385ebf 1478 ret->non_elf = 1;
252b5132
RH
1479 }
1480
51b64d56 1481 return entry;
252b5132
RH
1482}
1483
2920b85c 1484/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1485 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1486
c61b8717 1487void
fcfa13d2 1488_bfd_elf_link_hash_copy_indirect (struct bfd_link_info *info,
217aa764
AM
1489 struct elf_link_hash_entry *dir,
1490 struct elf_link_hash_entry *ind)
2920b85c 1491{
fcfa13d2 1492 struct elf_link_hash_table *htab;
3c3e9281 1493
2920b85c
RH
1494 /* Copy down any references that we may have already seen to the
1495 symbol which just became indirect. */
1496
f5385ebf
AM
1497 dir->ref_dynamic |= ind->ref_dynamic;
1498 dir->ref_regular |= ind->ref_regular;
1499 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1500 dir->non_got_ref |= ind->non_got_ref;
1501 dir->needs_plt |= ind->needs_plt;
1502 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1503
1e370bd2 1504 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1505 return;
1506
51b64d56 1507 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1508 These may have been already set up by a check_relocs routine. */
fcfa13d2
AM
1509 htab = elf_hash_table (info);
1510 if (ind->got.refcount > htab->init_got_refcount.refcount)
2920b85c 1511 {
fcfa13d2
AM
1512 if (dir->got.refcount < 0)
1513 dir->got.refcount = 0;
1514 dir->got.refcount += ind->got.refcount;
1515 ind->got.refcount = htab->init_got_refcount.refcount;
2920b85c 1516 }
2920b85c 1517
fcfa13d2 1518 if (ind->plt.refcount > htab->init_plt_refcount.refcount)
2920b85c 1519 {
fcfa13d2
AM
1520 if (dir->plt.refcount < 0)
1521 dir->plt.refcount = 0;
1522 dir->plt.refcount += ind->plt.refcount;
1523 ind->plt.refcount = htab->init_plt_refcount.refcount;
2920b85c 1524 }
2920b85c 1525
fcfa13d2 1526 if (ind->dynindx != -1)
2920b85c 1527 {
fcfa13d2
AM
1528 if (dir->dynindx != -1)
1529 _bfd_elf_strtab_delref (htab->dynstr, dir->dynstr_index);
2920b85c
RH
1530 dir->dynindx = ind->dynindx;
1531 dir->dynstr_index = ind->dynstr_index;
1532 ind->dynindx = -1;
1533 ind->dynstr_index = 0;
1534 }
2920b85c
RH
1535}
1536
c61b8717 1537void
217aa764
AM
1538_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1539 struct elf_link_hash_entry *h,
1540 bfd_boolean force_local)
2920b85c 1541{
a6aa5195 1542 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1543 h->needs_plt = 0;
e5094212
AM
1544 if (force_local)
1545 {
f5385ebf 1546 h->forced_local = 1;
e5094212
AM
1547 if (h->dynindx != -1)
1548 {
1549 h->dynindx = -1;
1550 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1551 h->dynstr_index);
1552 }
1553 }
2920b85c
RH
1554}
1555
252b5132
RH
1556/* Initialize an ELF linker hash table. */
1557
b34976b6 1558bfd_boolean
217aa764
AM
1559_bfd_elf_link_hash_table_init
1560 (struct elf_link_hash_table *table,
1561 bfd *abfd,
1562 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1563 struct bfd_hash_table *,
66eb6687
AM
1564 const char *),
1565 unsigned int entsize)
252b5132 1566{
b34976b6 1567 bfd_boolean ret;
a6aa5195 1568 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1569
b34976b6 1570 table->dynamic_sections_created = FALSE;
252b5132 1571 table->dynobj = NULL;
a6aa5195
AM
1572 table->init_got_refcount.refcount = can_refcount - 1;
1573 table->init_plt_refcount.refcount = can_refcount - 1;
1574 table->init_got_offset.offset = -(bfd_vma) 1;
1575 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1576 /* The first dynamic symbol is a dummy. */
1577 table->dynsymcount = 1;
1578 table->dynstr = NULL;
1579 table->bucketcount = 0;
1580 table->needed = NULL;
1581 table->hgot = NULL;
f5fa8ca2 1582 table->merge_info = NULL;
3722b82f 1583 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1584 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1585 table->dynlocal = NULL;
73722af0 1586 table->runpath = NULL;
e1918d23
AM
1587 table->tls_sec = NULL;
1588 table->tls_size = 0;
73722af0 1589 table->loaded = NULL;
67687978 1590 table->is_relocatable_executable = FALSE;
73722af0 1591
66eb6687 1592 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc, entsize);
8ea2e4bd
NC
1593 table->root.type = bfd_link_elf_hash_table;
1594
1595 return ret;
252b5132
RH
1596}
1597
1598/* Create an ELF linker hash table. */
1599
1600struct bfd_link_hash_table *
217aa764 1601_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1602{
1603 struct elf_link_hash_table *ret;
dc810e39 1604 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1605
217aa764
AM
1606 ret = bfd_malloc (amt);
1607 if (ret == NULL)
252b5132
RH
1608 return NULL;
1609
66eb6687
AM
1610 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc,
1611 sizeof (struct elf_link_hash_entry)))
252b5132 1612 {
e2d34d7d 1613 free (ret);
252b5132
RH
1614 return NULL;
1615 }
1616
1617 return &ret->root;
1618}
1619
1620/* This is a hook for the ELF emulation code in the generic linker to
1621 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1622 entry for a dynamic object. */
252b5132
RH
1623
1624void
217aa764 1625bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1626{
1627 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1628 && bfd_get_format (abfd) == bfd_object)
1629 elf_dt_name (abfd) = name;
1630}
1631
e56f61be
L
1632int
1633bfd_elf_get_dyn_lib_class (bfd *abfd)
1634{
1635 int lib_class;
1636 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1637 && bfd_get_format (abfd) == bfd_object)
1638 lib_class = elf_dyn_lib_class (abfd);
1639 else
1640 lib_class = 0;
1641 return lib_class;
1642}
1643
74816898 1644void
4a43e768 1645bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1646{
1647 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1648 && bfd_get_format (abfd) == bfd_object)
4a43e768 1649 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1650}
1651
252b5132
RH
1652/* Get the list of DT_NEEDED entries for a link. This is a hook for
1653 the linker ELF emulation code. */
1654
1655struct bfd_link_needed_list *
217aa764
AM
1656bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1657 struct bfd_link_info *info)
252b5132 1658{
0eddce27 1659 if (! is_elf_hash_table (info->hash))
252b5132
RH
1660 return NULL;
1661 return elf_hash_table (info)->needed;
1662}
1663
a963dc6a
L
1664/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1665 hook for the linker ELF emulation code. */
1666
1667struct bfd_link_needed_list *
217aa764
AM
1668bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1669 struct bfd_link_info *info)
a963dc6a 1670{
0eddce27 1671 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1672 return NULL;
1673 return elf_hash_table (info)->runpath;
1674}
1675
252b5132
RH
1676/* Get the name actually used for a dynamic object for a link. This
1677 is the SONAME entry if there is one. Otherwise, it is the string
1678 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1679
1680const char *
217aa764 1681bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1682{
1683 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1684 && bfd_get_format (abfd) == bfd_object)
1685 return elf_dt_name (abfd);
1686 return NULL;
1687}
1688
1689/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1690 the ELF linker emulation code. */
1691
b34976b6 1692bfd_boolean
217aa764
AM
1693bfd_elf_get_bfd_needed_list (bfd *abfd,
1694 struct bfd_link_needed_list **pneeded)
252b5132
RH
1695{
1696 asection *s;
1697 bfd_byte *dynbuf = NULL;
1698 int elfsec;
dc810e39 1699 unsigned long shlink;
252b5132
RH
1700 bfd_byte *extdyn, *extdynend;
1701 size_t extdynsize;
217aa764 1702 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1703
1704 *pneeded = NULL;
1705
1706 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1707 || bfd_get_format (abfd) != bfd_object)
b34976b6 1708 return TRUE;
252b5132
RH
1709
1710 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1711 if (s == NULL || s->size == 0)
b34976b6 1712 return TRUE;
252b5132 1713
eea6121a 1714 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1715 goto error_return;
1716
1717 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1718 if (elfsec == -1)
1719 goto error_return;
1720
dc810e39 1721 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1722
1723 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1724 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1725
1726 extdyn = dynbuf;
eea6121a 1727 extdynend = extdyn + s->size;
252b5132
RH
1728 for (; extdyn < extdynend; extdyn += extdynsize)
1729 {
1730 Elf_Internal_Dyn dyn;
1731
217aa764 1732 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1733
1734 if (dyn.d_tag == DT_NULL)
1735 break;
1736
1737 if (dyn.d_tag == DT_NEEDED)
1738 {
1739 const char *string;
1740 struct bfd_link_needed_list *l;
dc810e39
AM
1741 unsigned int tagv = dyn.d_un.d_val;
1742 bfd_size_type amt;
252b5132 1743
dc810e39 1744 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1745 if (string == NULL)
1746 goto error_return;
1747
dc810e39 1748 amt = sizeof *l;
217aa764 1749 l = bfd_alloc (abfd, amt);
252b5132
RH
1750 if (l == NULL)
1751 goto error_return;
1752
1753 l->by = abfd;
1754 l->name = string;
1755 l->next = *pneeded;
1756 *pneeded = l;
1757 }
1758 }
1759
1760 free (dynbuf);
1761
b34976b6 1762 return TRUE;
252b5132
RH
1763
1764 error_return:
1765 if (dynbuf != NULL)
1766 free (dynbuf);
b34976b6 1767 return FALSE;
252b5132
RH
1768}
1769\f
1770/* Allocate an ELF string table--force the first byte to be zero. */
1771
1772struct bfd_strtab_hash *
217aa764 1773_bfd_elf_stringtab_init (void)
252b5132
RH
1774{
1775 struct bfd_strtab_hash *ret;
1776
1777 ret = _bfd_stringtab_init ();
1778 if (ret != NULL)
1779 {
1780 bfd_size_type loc;
1781
b34976b6 1782 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1783 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1784 if (loc == (bfd_size_type) -1)
1785 {
1786 _bfd_stringtab_free (ret);
1787 ret = NULL;
1788 }
1789 }
1790 return ret;
1791}
1792\f
1793/* ELF .o/exec file reading */
1794
c044fabd 1795/* Create a new bfd section from an ELF section header. */
252b5132 1796
b34976b6 1797bfd_boolean
217aa764 1798bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1799{
1800 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1801 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1802 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1803 const char *name;
252b5132 1804
1b3a8575
AM
1805 name = bfd_elf_string_from_elf_section (abfd,
1806 elf_elfheader (abfd)->e_shstrndx,
1807 hdr->sh_name);
933d961a
JJ
1808 if (name == NULL)
1809 return FALSE;
252b5132
RH
1810
1811 switch (hdr->sh_type)
1812 {
1813 case SHT_NULL:
1814 /* Inactive section. Throw it away. */
b34976b6 1815 return TRUE;
252b5132
RH
1816
1817 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1818 case SHT_NOBITS: /* .bss section. */
1819 case SHT_HASH: /* .hash section. */
1820 case SHT_NOTE: /* .note section. */
25e27870
L
1821 case SHT_INIT_ARRAY: /* .init_array section. */
1822 case SHT_FINI_ARRAY: /* .fini_array section. */
1823 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1824 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1825 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1826
797fc050 1827 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1828 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1829 return FALSE;
8e0ed13f
NC
1830 if (hdr->sh_link > elf_numsections (abfd)
1831 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1832 return FALSE;
797fc050
AM
1833 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1834 {
1835 Elf_Internal_Shdr *dynsymhdr;
1836
1837 /* The shared libraries distributed with hpux11 have a bogus
1838 sh_link field for the ".dynamic" section. Find the
1839 string table for the ".dynsym" section instead. */
1840 if (elf_dynsymtab (abfd) != 0)
1841 {
1842 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1843 hdr->sh_link = dynsymhdr->sh_link;
1844 }
1845 else
1846 {
1847 unsigned int i, num_sec;
1848
1849 num_sec = elf_numsections (abfd);
1850 for (i = 1; i < num_sec; i++)
1851 {
1852 dynsymhdr = elf_elfsections (abfd)[i];
1853 if (dynsymhdr->sh_type == SHT_DYNSYM)
1854 {
1855 hdr->sh_link = dynsymhdr->sh_link;
1856 break;
1857 }
1858 }
1859 }
1860 }
1861 break;
1862
252b5132
RH
1863 case SHT_SYMTAB: /* A symbol table */
1864 if (elf_onesymtab (abfd) == shindex)
b34976b6 1865 return TRUE;
252b5132 1866
a50b2160
JJ
1867 if (hdr->sh_entsize != bed->s->sizeof_sym)
1868 return FALSE;
252b5132
RH
1869 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1870 elf_onesymtab (abfd) = shindex;
1871 elf_tdata (abfd)->symtab_hdr = *hdr;
1872 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1873 abfd->flags |= HAS_SYMS;
1874
1875 /* Sometimes a shared object will map in the symbol table. If
1876 SHF_ALLOC is set, and this is a shared object, then we also
1877 treat this section as a BFD section. We can not base the
1878 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1879 set in a relocatable object file, which would confuse the
252b5132
RH
1880 linker. */
1881 if ((hdr->sh_flags & SHF_ALLOC) != 0
1882 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1883 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1884 shindex))
b34976b6 1885 return FALSE;
252b5132 1886
1b3a8575
AM
1887 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1888 can't read symbols without that section loaded as well. It
1889 is most likely specified by the next section header. */
1890 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1891 {
1892 unsigned int i, num_sec;
1893
1894 num_sec = elf_numsections (abfd);
1895 for (i = shindex + 1; i < num_sec; i++)
1896 {
1897 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1898 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1899 && hdr2->sh_link == shindex)
1900 break;
1901 }
1902 if (i == num_sec)
1903 for (i = 1; i < shindex; i++)
1904 {
1905 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1906 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1907 && hdr2->sh_link == shindex)
1908 break;
1909 }
1910 if (i != shindex)
1911 return bfd_section_from_shdr (abfd, i);
1912 }
b34976b6 1913 return TRUE;
252b5132
RH
1914
1915 case SHT_DYNSYM: /* A dynamic symbol table */
1916 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1917 return TRUE;
252b5132 1918
a50b2160
JJ
1919 if (hdr->sh_entsize != bed->s->sizeof_sym)
1920 return FALSE;
252b5132
RH
1921 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1922 elf_dynsymtab (abfd) = shindex;
1923 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1924 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1925 abfd->flags |= HAS_SYMS;
1926
1927 /* Besides being a symbol table, we also treat this as a regular
1928 section, so that objcopy can handle it. */
6dc132d9 1929 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1930
9ad5cbcf
AM
1931 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1932 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1933 return TRUE;
9ad5cbcf 1934
1b3a8575 1935 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1936 elf_symtab_shndx (abfd) = shindex;
1937 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1938 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1939 return TRUE;
9ad5cbcf 1940
252b5132
RH
1941 case SHT_STRTAB: /* A string table */
1942 if (hdr->bfd_section != NULL)
b34976b6 1943 return TRUE;
252b5132
RH
1944 if (ehdr->e_shstrndx == shindex)
1945 {
1946 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1947 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1948 return TRUE;
252b5132 1949 }
1b3a8575
AM
1950 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1951 {
1952 symtab_strtab:
1953 elf_tdata (abfd)->strtab_hdr = *hdr;
1954 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1955 return TRUE;
1956 }
1957 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1958 {
1959 dynsymtab_strtab:
1960 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1961 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1962 elf_elfsections (abfd)[shindex] = hdr;
1963 /* We also treat this as a regular section, so that objcopy
1964 can handle it. */
6dc132d9
L
1965 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1966 shindex);
1b3a8575 1967 }
252b5132 1968
1b3a8575
AM
1969 /* If the string table isn't one of the above, then treat it as a
1970 regular section. We need to scan all the headers to be sure,
1971 just in case this strtab section appeared before the above. */
1972 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1973 {
1974 unsigned int i, num_sec;
252b5132 1975
1b3a8575
AM
1976 num_sec = elf_numsections (abfd);
1977 for (i = 1; i < num_sec; i++)
1978 {
1979 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1980 if (hdr2->sh_link == shindex)
1981 {
933d961a
JJ
1982 /* Prevent endless recursion on broken objects. */
1983 if (i == shindex)
1984 return FALSE;
1b3a8575
AM
1985 if (! bfd_section_from_shdr (abfd, i))
1986 return FALSE;
1987 if (elf_onesymtab (abfd) == i)
1988 goto symtab_strtab;
1989 if (elf_dynsymtab (abfd) == i)
1990 goto dynsymtab_strtab;
1991 }
1992 }
1993 }
6dc132d9 1994 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1995
1996 case SHT_REL:
1997 case SHT_RELA:
1998 /* *These* do a lot of work -- but build no sections! */
1999 {
2000 asection *target_sect;
2001 Elf_Internal_Shdr *hdr2;
9ad5cbcf 2002 unsigned int num_sec = elf_numsections (abfd);
252b5132 2003
aa2ca951
JJ
2004 if (hdr->sh_entsize
2005 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
2006 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2007 return FALSE;
2008
03ae5f59 2009 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
2010 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
2011 || hdr->sh_link >= num_sec)
03ae5f59
ILT
2012 {
2013 ((*_bfd_error_handler)
d003868e
AM
2014 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2015 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
2016 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2017 shindex);
03ae5f59
ILT
2018 }
2019
252b5132
RH
2020 /* For some incomprehensible reason Oracle distributes
2021 libraries for Solaris in which some of the objects have
2022 bogus sh_link fields. It would be nice if we could just
2023 reject them, but, unfortunately, some people need to use
2024 them. We scan through the section headers; if we find only
2025 one suitable symbol table, we clobber the sh_link to point
2026 to it. I hope this doesn't break anything. */
2027 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2028 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2029 {
9ad5cbcf 2030 unsigned int scan;
252b5132
RH
2031 int found;
2032
2033 found = 0;
9ad5cbcf 2034 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2035 {
2036 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2037 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2038 {
2039 if (found != 0)
2040 {
2041 found = 0;
2042 break;
2043 }
2044 found = scan;
2045 }
2046 }
2047 if (found != 0)
2048 hdr->sh_link = found;
2049 }
2050
2051 /* Get the symbol table. */
1b3a8575
AM
2052 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2053 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2054 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 2055 return FALSE;
252b5132
RH
2056
2057 /* If this reloc section does not use the main symbol table we
2058 don't treat it as a reloc section. BFD can't adequately
2059 represent such a section, so at least for now, we don't
c044fabd 2060 try. We just present it as a normal section. We also
60bcf0fa 2061 can't use it as a reloc section if it points to the null
185ef66d
AM
2062 section, an invalid section, or another reloc section. */
2063 if (hdr->sh_link != elf_onesymtab (abfd)
2064 || hdr->sh_info == SHN_UNDEF
2065 || (hdr->sh_info >= SHN_LORESERVE && hdr->sh_info <= SHN_HIRESERVE)
2066 || hdr->sh_info >= num_sec
2067 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2068 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
2069 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2070 shindex);
252b5132
RH
2071
2072 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2073 return FALSE;
252b5132
RH
2074 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2075 if (target_sect == NULL)
b34976b6 2076 return FALSE;
252b5132
RH
2077
2078 if ((target_sect->flags & SEC_RELOC) == 0
2079 || target_sect->reloc_count == 0)
2080 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2081 else
2082 {
dc810e39 2083 bfd_size_type amt;
252b5132 2084 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2085 amt = sizeof (*hdr2);
217aa764 2086 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2087 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2088 }
2089 *hdr2 = *hdr;
2090 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2091 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2092 target_sect->flags |= SEC_RELOC;
2093 target_sect->relocation = NULL;
2094 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2095 /* In the section to which the relocations apply, mark whether
2096 its relocations are of the REL or RELA variety. */
72730e0c 2097 if (hdr->sh_size != 0)
68bfbfcc 2098 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2099 abfd->flags |= HAS_RELOC;
b34976b6 2100 return TRUE;
252b5132
RH
2101 }
2102 break;
2103
2104 case SHT_GNU_verdef:
2105 elf_dynverdef (abfd) = shindex;
2106 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2107 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2108 break;
2109
2110 case SHT_GNU_versym:
a50b2160
JJ
2111 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2112 return FALSE;
252b5132
RH
2113 elf_dynversym (abfd) = shindex;
2114 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2115 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2116
2117 case SHT_GNU_verneed:
2118 elf_dynverref (abfd) = shindex;
2119 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2120 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2121
2122 case SHT_SHLIB:
b34976b6 2123 return TRUE;
252b5132 2124
dbb410c3 2125 case SHT_GROUP:
b885599b
AM
2126 /* We need a BFD section for objcopy and relocatable linking,
2127 and it's handy to have the signature available as the section
2128 name. */
a50b2160
JJ
2129 if (hdr->sh_entsize != GRP_ENTRY_SIZE)
2130 return FALSE;
b885599b
AM
2131 name = group_signature (abfd, hdr);
2132 if (name == NULL)
b34976b6 2133 return FALSE;
6dc132d9 2134 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2135 return FALSE;
dbb410c3
AM
2136 if (hdr->contents != NULL)
2137 {
2138 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2139 unsigned int n_elt = hdr->sh_size / 4;
2140 asection *s;
2141
b885599b
AM
2142 if (idx->flags & GRP_COMDAT)
2143 hdr->bfd_section->flags
2144 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2145
45c5e9ed
L
2146 /* We try to keep the same section order as it comes in. */
2147 idx += n_elt;
dbb410c3 2148 while (--n_elt != 0)
45c5e9ed 2149 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2150 && elf_next_in_group (s) != NULL)
dbb410c3 2151 {
945906ff 2152 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2153 break;
2154 }
2155 }
2156 break;
2157
252b5132
RH
2158 default:
2159 /* Check for any processor-specific section types. */
3eb70a79
L
2160 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2161 return TRUE;
2162
2163 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2164 {
2165 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2166 /* FIXME: How to properly handle allocated section reserved
2167 for applications? */
2168 (*_bfd_error_handler)
2169 (_("%B: don't know how to handle allocated, application "
2170 "specific section `%s' [0x%8x]"),
2171 abfd, name, hdr->sh_type);
2172 else
2173 /* Allow sections reserved for applications. */
2174 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2175 shindex);
2176 }
2177 else if (hdr->sh_type >= SHT_LOPROC
2178 && hdr->sh_type <= SHT_HIPROC)
2179 /* FIXME: We should handle this section. */
2180 (*_bfd_error_handler)
2181 (_("%B: don't know how to handle processor specific section "
2182 "`%s' [0x%8x]"),
2183 abfd, name, hdr->sh_type);
2184 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
2185 /* FIXME: We should handle this section. */
2186 (*_bfd_error_handler)
2187 (_("%B: don't know how to handle OS specific section "
2188 "`%s' [0x%8x]"),
2189 abfd, name, hdr->sh_type);
2190 else
2191 /* FIXME: We should handle this section. */
2192 (*_bfd_error_handler)
2193 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2194 abfd, name, hdr->sh_type);
2195
2196 return FALSE;
252b5132
RH
2197 }
2198
b34976b6 2199 return TRUE;
252b5132
RH
2200}
2201
ec338859
AM
2202/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2203 Return SEC for sections that have no elf section, and NULL on error. */
2204
2205asection *
217aa764
AM
2206bfd_section_from_r_symndx (bfd *abfd,
2207 struct sym_sec_cache *cache,
2208 asection *sec,
2209 unsigned long r_symndx)
ec338859 2210{
ec338859 2211 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2212 unsigned char esym[sizeof (Elf64_External_Sym)];
2213 Elf_External_Sym_Shndx eshndx;
2214 Elf_Internal_Sym isym;
ec338859
AM
2215 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2216
2217 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2218 return cache->sec[ent];
2219
2220 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2221 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2222 &isym, esym, &eshndx) == NULL)
ec338859 2223 return NULL;
9ad5cbcf 2224
ec338859
AM
2225 if (cache->abfd != abfd)
2226 {
2227 memset (cache->indx, -1, sizeof (cache->indx));
2228 cache->abfd = abfd;
2229 }
2230 cache->indx[ent] = r_symndx;
2231 cache->sec[ent] = sec;
50bc7936
AM
2232 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2233 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2234 {
2235 asection *s;
6cdc0ccc 2236 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2237 if (s != NULL)
2238 cache->sec[ent] = s;
2239 }
2240 return cache->sec[ent];
2241}
2242
252b5132
RH
2243/* Given an ELF section number, retrieve the corresponding BFD
2244 section. */
2245
2246asection *
217aa764 2247bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2248{
9ad5cbcf 2249 if (index >= elf_numsections (abfd))
252b5132
RH
2250 return NULL;
2251 return elf_elfsections (abfd)[index]->bfd_section;
2252}
2253
b35d266b 2254static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2255{
7dcb9820 2256 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7f4d3958
L
2257 { NULL, 0, 0, 0, 0 }
2258};
2259
b35d266b 2260static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2261{
7dcb9820 2262 { ".comment", 8, 0, SHT_PROGBITS, 0 },
7f4d3958
L
2263 { NULL, 0, 0, 0, 0 }
2264};
2265
b35d266b 2266static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2267{
7dcb9820
AM
2268 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2269 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2270 { ".debug", 6, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2271 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2272 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2273 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2274 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2275 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2276 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2277 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
7f4d3958
L
2278 { NULL, 0, 0, 0, 0 }
2279};
2280
b35d266b 2281static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958
L
2282{
2283 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2284 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2285 { NULL, 0, 0, 0, 0 }
2286};
2287
b35d266b 2288static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958
L
2289{
2290 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820 2291 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2292 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2293 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2294 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
7f4d3958
L
2295 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2296 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
2297 { NULL, 0, 0, 0, 0 }
2298};
2299
b35d266b 2300static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958
L
2301{
2302 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2303 { NULL, 0, 0, 0, 0 }
2304};
2305
b35d266b 2306static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958
L
2307{
2308 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2309 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2310 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2311 { NULL, 0, 0, 0, 0 }
2312};
2313
b35d266b 2314static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958
L
2315{
2316 { ".line", 5, 0, SHT_PROGBITS, 0 },
2317 { NULL, 0, 0, 0, 0 }
2318};
2319
b35d266b 2320static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2321{
45c5e9ed 2322 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820 2323 { ".note", 5, -1, SHT_NOTE, 0 },
7f4d3958
L
2324 { NULL, 0, 0, 0, 0 }
2325};
2326
b35d266b 2327static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958
L
2328{
2329 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2330 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2331 { NULL, 0, 0, 0, 0 }
2332};
2333
b35d266b 2334static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958
L
2335{
2336 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2337 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
7dcb9820
AM
2338 { ".rela", 5, -1, SHT_RELA, 0 },
2339 { ".rel", 4, -1, SHT_REL, 0 },
7f4d3958
L
2340 { NULL, 0, 0, 0, 0 }
2341};
2342
b35d266b 2343static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958
L
2344{
2345 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2346 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2347 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
7dcb9820
AM
2348 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2349 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2350};
2351
b35d266b 2352static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958
L
2353{
2354 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2355 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2356 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2357 { NULL, 0, 0, 0, 0 }
2358};
2359
b35d266b 2360static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2361{
7f4d3958
L
2362 special_sections_b, /* 'b' */
2363 special_sections_c, /* 'b' */
2364 special_sections_d, /* 'd' */
2365 NULL, /* 'e' */
2366 special_sections_f, /* 'f' */
2367 special_sections_g, /* 'g' */
2368 special_sections_h, /* 'h' */
2369 special_sections_i, /* 'i' */
2370 NULL, /* 'j' */
2371 NULL, /* 'k' */
2372 special_sections_l, /* 'l' */
2373 NULL, /* 'm' */
2374 special_sections_n, /* 'n' */
2375 NULL, /* 'o' */
2376 special_sections_p, /* 'p' */
2377 NULL, /* 'q' */
2378 special_sections_r, /* 'r' */
2379 special_sections_s, /* 's' */
2380 special_sections_t, /* 't' */
7f4d3958
L
2381};
2382
551b43fd
AM
2383const struct bfd_elf_special_section *
2384_bfd_elf_get_special_section (const char *name,
2385 const struct bfd_elf_special_section *spec,
2386 unsigned int rela)
2f89ff8d
L
2387{
2388 int i;
7f4d3958 2389 int len;
7f4d3958 2390
551b43fd 2391 len = strlen (name);
7f4d3958 2392
551b43fd 2393 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2394 {
2395 int suffix_len;
551b43fd 2396 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2397
2398 if (len < prefix_len)
2399 continue;
551b43fd 2400 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2401 continue;
2402
551b43fd 2403 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2404 if (suffix_len <= 0)
2405 {
2406 if (name[prefix_len] != 0)
2407 {
2408 if (suffix_len == 0)
2409 continue;
2410 if (name[prefix_len] != '.'
2411 && (suffix_len == -2
551b43fd 2412 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2413 continue;
2414 }
2415 }
2416 else
2417 {
2418 if (len < prefix_len + suffix_len)
2419 continue;
2420 if (memcmp (name + len - suffix_len,
551b43fd 2421 spec[i].prefix + prefix_len,
7dcb9820
AM
2422 suffix_len) != 0)
2423 continue;
2424 }
551b43fd 2425 return &spec[i];
7dcb9820 2426 }
2f89ff8d
L
2427
2428 return NULL;
2429}
2430
7dcb9820 2431const struct bfd_elf_special_section *
29ef7005 2432_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2433{
551b43fd
AM
2434 int i;
2435 const struct bfd_elf_special_section *spec;
29ef7005 2436 const struct elf_backend_data *bed;
2f89ff8d
L
2437
2438 /* See if this is one of the special sections. */
551b43fd
AM
2439 if (sec->name == NULL)
2440 return NULL;
2f89ff8d 2441
29ef7005
L
2442 bed = get_elf_backend_data (abfd);
2443 spec = bed->special_sections;
2444 if (spec)
2445 {
2446 spec = _bfd_elf_get_special_section (sec->name,
2447 bed->special_sections,
2448 sec->use_rela_p);
2449 if (spec != NULL)
2450 return spec;
2451 }
2452
551b43fd
AM
2453 if (sec->name[0] != '.')
2454 return NULL;
2f89ff8d 2455
551b43fd
AM
2456 i = sec->name[1] - 'b';
2457 if (i < 0 || i > 't' - 'b')
2458 return NULL;
2459
2460 spec = special_sections[i];
2f89ff8d 2461
551b43fd
AM
2462 if (spec == NULL)
2463 return NULL;
2464
2465 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2466}
2467
b34976b6 2468bfd_boolean
217aa764 2469_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2470{
2471 struct bfd_elf_section_data *sdata;
551b43fd 2472 const struct elf_backend_data *bed;
7dcb9820 2473 const struct bfd_elf_special_section *ssect;
252b5132 2474
f0abc2a1
AM
2475 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2476 if (sdata == NULL)
2477 {
217aa764 2478 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2479 if (sdata == NULL)
2480 return FALSE;
217aa764 2481 sec->used_by_bfd = sdata;
f0abc2a1 2482 }
bf572ba0 2483
551b43fd
AM
2484 /* Indicate whether or not this section should use RELA relocations. */
2485 bed = get_elf_backend_data (abfd);
2486 sec->use_rela_p = bed->default_use_rela_p;
2487
e843e0f8
L
2488 /* When we read a file, we don't need to set ELF section type and
2489 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2490 anyway. We will set ELF section type and flags for all linker
2491 created sections. If user specifies BFD section flags, we will
2492 set ELF section type and flags based on BFD section flags in
2493 elf_fake_sections. */
2494 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2495 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2496 {
551b43fd 2497 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2498 if (ssect != NULL)
2499 {
2500 elf_section_type (sec) = ssect->type;
2501 elf_section_flags (sec) = ssect->attr;
2502 }
2f89ff8d
L
2503 }
2504
f592407e 2505 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2506}
2507
2508/* Create a new bfd section from an ELF program header.
2509
2510 Since program segments have no names, we generate a synthetic name
2511 of the form segment<NUM>, where NUM is generally the index in the
2512 program header table. For segments that are split (see below) we
2513 generate the names segment<NUM>a and segment<NUM>b.
2514
2515 Note that some program segments may have a file size that is different than
2516 (less than) the memory size. All this means is that at execution the
2517 system must allocate the amount of memory specified by the memory size,
2518 but only initialize it with the first "file size" bytes read from the
2519 file. This would occur for example, with program segments consisting
2520 of combined data+bss.
2521
2522 To handle the above situation, this routine generates TWO bfd sections
2523 for the single program segment. The first has the length specified by
2524 the file size of the segment, and the second has the length specified
2525 by the difference between the two sizes. In effect, the segment is split
2526 into it's initialized and uninitialized parts.
2527
2528 */
2529
b34976b6 2530bfd_boolean
217aa764
AM
2531_bfd_elf_make_section_from_phdr (bfd *abfd,
2532 Elf_Internal_Phdr *hdr,
2533 int index,
2534 const char *typename)
252b5132
RH
2535{
2536 asection *newsect;
2537 char *name;
2538 char namebuf[64];
d4c88bbb 2539 size_t len;
252b5132
RH
2540 int split;
2541
2542 split = ((hdr->p_memsz > 0)
2543 && (hdr->p_filesz > 0)
2544 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2545 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2546 len = strlen (namebuf) + 1;
217aa764 2547 name = bfd_alloc (abfd, len);
252b5132 2548 if (!name)
b34976b6 2549 return FALSE;
d4c88bbb 2550 memcpy (name, namebuf, len);
252b5132
RH
2551 newsect = bfd_make_section (abfd, name);
2552 if (newsect == NULL)
b34976b6 2553 return FALSE;
252b5132
RH
2554 newsect->vma = hdr->p_vaddr;
2555 newsect->lma = hdr->p_paddr;
eea6121a 2556 newsect->size = hdr->p_filesz;
252b5132
RH
2557 newsect->filepos = hdr->p_offset;
2558 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2559 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2560 if (hdr->p_type == PT_LOAD)
2561 {
2562 newsect->flags |= SEC_ALLOC;
2563 newsect->flags |= SEC_LOAD;
2564 if (hdr->p_flags & PF_X)
2565 {
2566 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2567 may be data. */
252b5132
RH
2568 newsect->flags |= SEC_CODE;
2569 }
2570 }
2571 if (!(hdr->p_flags & PF_W))
2572 {
2573 newsect->flags |= SEC_READONLY;
2574 }
2575
2576 if (split)
2577 {
27ac83bf 2578 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2579 len = strlen (namebuf) + 1;
217aa764 2580 name = bfd_alloc (abfd, len);
252b5132 2581 if (!name)
b34976b6 2582 return FALSE;
d4c88bbb 2583 memcpy (name, namebuf, len);
252b5132
RH
2584 newsect = bfd_make_section (abfd, name);
2585 if (newsect == NULL)
b34976b6 2586 return FALSE;
252b5132
RH
2587 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2588 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2589 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2590 if (hdr->p_type == PT_LOAD)
2591 {
2592 newsect->flags |= SEC_ALLOC;
2593 if (hdr->p_flags & PF_X)
2594 newsect->flags |= SEC_CODE;
2595 }
2596 if (!(hdr->p_flags & PF_W))
2597 newsect->flags |= SEC_READONLY;
2598 }
2599
b34976b6 2600 return TRUE;
252b5132
RH
2601}
2602
b34976b6 2603bfd_boolean
217aa764 2604bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2605{
9c5bfbb7 2606 const struct elf_backend_data *bed;
20cfcaae
NC
2607
2608 switch (hdr->p_type)
2609 {
2610 case PT_NULL:
2611 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2612
2613 case PT_LOAD:
2614 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2615
2616 case PT_DYNAMIC:
2617 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2618
2619 case PT_INTERP:
2620 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2621
2622 case PT_NOTE:
2623 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2624 return FALSE;
217aa764 2625 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2626 return FALSE;
2627 return TRUE;
20cfcaae
NC
2628
2629 case PT_SHLIB:
2630 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2631
2632 case PT_PHDR:
2633 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2634
811072d8
RM
2635 case PT_GNU_EH_FRAME:
2636 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2637 "eh_frame_hdr");
2638
9ee5e499
JJ
2639 case PT_GNU_STACK:
2640 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2641
8c37241b
JJ
2642 case PT_GNU_RELRO:
2643 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2644
20cfcaae 2645 default:
8c1acd09 2646 /* Check for any processor-specific program segment types. */
20cfcaae 2647 bed = get_elf_backend_data (abfd);
d27f5fa1 2648 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2649 }
2650}
2651
23bc299b 2652/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2653 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2654 relocations; otherwise, we use REL relocations. */
2655
b34976b6 2656bfd_boolean
217aa764
AM
2657_bfd_elf_init_reloc_shdr (bfd *abfd,
2658 Elf_Internal_Shdr *rel_hdr,
2659 asection *asect,
2660 bfd_boolean use_rela_p)
23bc299b
MM
2661{
2662 char *name;
9c5bfbb7 2663 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2664 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2665
dc810e39 2666 name = bfd_alloc (abfd, amt);
23bc299b 2667 if (name == NULL)
b34976b6 2668 return FALSE;
23bc299b
MM
2669 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2670 rel_hdr->sh_name =
2b0f7ef9 2671 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2672 FALSE);
23bc299b 2673 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2674 return FALSE;
23bc299b
MM
2675 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2676 rel_hdr->sh_entsize = (use_rela_p
2677 ? bed->s->sizeof_rela
2678 : bed->s->sizeof_rel);
45d6a902 2679 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2680 rel_hdr->sh_flags = 0;
2681 rel_hdr->sh_addr = 0;
2682 rel_hdr->sh_size = 0;
2683 rel_hdr->sh_offset = 0;
2684
b34976b6 2685 return TRUE;
23bc299b
MM
2686}
2687
252b5132
RH
2688/* Set up an ELF internal section header for a section. */
2689
252b5132 2690static void
217aa764 2691elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2692{
9c5bfbb7 2693 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2694 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2695 Elf_Internal_Shdr *this_hdr;
2696
2697 if (*failedptr)
2698 {
2699 /* We already failed; just get out of the bfd_map_over_sections
2700 loop. */
2701 return;
2702 }
2703
2704 this_hdr = &elf_section_data (asect)->this_hdr;
2705
e57b5356
AM
2706 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2707 asect->name, FALSE);
2708 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2709 {
b34976b6 2710 *failedptr = TRUE;
252b5132
RH
2711 return;
2712 }
2713
a4d8e49b 2714 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2715
2716 if ((asect->flags & SEC_ALLOC) != 0
2717 || asect->user_set_vma)
2718 this_hdr->sh_addr = asect->vma;
2719 else
2720 this_hdr->sh_addr = 0;
2721
2722 this_hdr->sh_offset = 0;
eea6121a 2723 this_hdr->sh_size = asect->size;
252b5132
RH
2724 this_hdr->sh_link = 0;
2725 this_hdr->sh_addralign = 1 << asect->alignment_power;
2726 /* The sh_entsize and sh_info fields may have been set already by
2727 copy_private_section_data. */
2728
2729 this_hdr->bfd_section = asect;
2730 this_hdr->contents = NULL;
2731
3cddba1e
L
2732 /* If the section type is unspecified, we set it based on
2733 asect->flags. */
2734 if (this_hdr->sh_type == SHT_NULL)
2735 {
45c5e9ed 2736 if ((asect->flags & SEC_GROUP) != 0)
ccd2ec6a 2737 this_hdr->sh_type = SHT_GROUP;
45c5e9ed 2738 else if ((asect->flags & SEC_ALLOC) != 0
1ea63fd2
AM
2739 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2740 || (asect->flags & SEC_NEVER_LOAD) != 0))
3cddba1e
L
2741 this_hdr->sh_type = SHT_NOBITS;
2742 else
2743 this_hdr->sh_type = SHT_PROGBITS;
2744 }
2745
2f89ff8d 2746 switch (this_hdr->sh_type)
252b5132 2747 {
2f89ff8d 2748 default:
2f89ff8d
L
2749 break;
2750
2751 case SHT_STRTAB:
2752 case SHT_INIT_ARRAY:
2753 case SHT_FINI_ARRAY:
2754 case SHT_PREINIT_ARRAY:
2755 case SHT_NOTE:
2756 case SHT_NOBITS:
2757 case SHT_PROGBITS:
2758 break;
2759
2760 case SHT_HASH:
c7ac6ff8 2761 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2762 break;
5de3bf90 2763
2f89ff8d 2764 case SHT_DYNSYM:
252b5132 2765 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2766 break;
2767
2768 case SHT_DYNAMIC:
252b5132 2769 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2770 break;
2771
2772 case SHT_RELA:
2773 if (get_elf_backend_data (abfd)->may_use_rela_p)
2774 this_hdr->sh_entsize = bed->s->sizeof_rela;
2775 break;
2776
2777 case SHT_REL:
2778 if (get_elf_backend_data (abfd)->may_use_rel_p)
2779 this_hdr->sh_entsize = bed->s->sizeof_rel;
2780 break;
2781
2782 case SHT_GNU_versym:
252b5132 2783 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2784 break;
2785
2786 case SHT_GNU_verdef:
252b5132
RH
2787 this_hdr->sh_entsize = 0;
2788 /* objcopy or strip will copy over sh_info, but may not set
2789 cverdefs. The linker will set cverdefs, but sh_info will be
2790 zero. */
2791 if (this_hdr->sh_info == 0)
2792 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2793 else
2794 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2795 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2796 break;
2797
2798 case SHT_GNU_verneed:
252b5132
RH
2799 this_hdr->sh_entsize = 0;
2800 /* objcopy or strip will copy over sh_info, but may not set
2801 cverrefs. The linker will set cverrefs, but sh_info will be
2802 zero. */
2803 if (this_hdr->sh_info == 0)
2804 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2805 else
2806 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2807 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2808 break;
2809
2810 case SHT_GROUP:
dbb410c3 2811 this_hdr->sh_entsize = 4;
2f89ff8d 2812 break;
dbb410c3 2813 }
252b5132
RH
2814
2815 if ((asect->flags & SEC_ALLOC) != 0)
2816 this_hdr->sh_flags |= SHF_ALLOC;
2817 if ((asect->flags & SEC_READONLY) == 0)
2818 this_hdr->sh_flags |= SHF_WRITE;
2819 if ((asect->flags & SEC_CODE) != 0)
2820 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2821 if ((asect->flags & SEC_MERGE) != 0)
2822 {
2823 this_hdr->sh_flags |= SHF_MERGE;
2824 this_hdr->sh_entsize = asect->entsize;
2825 if ((asect->flags & SEC_STRINGS) != 0)
2826 this_hdr->sh_flags |= SHF_STRINGS;
2827 }
1126897b 2828 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2829 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2830 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2831 {
2832 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2833 if (asect->size == 0
2834 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2835 {
3a800eb9 2836 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2837
704afa60 2838 this_hdr->sh_size = 0;
3a800eb9
AM
2839 if (o != NULL)
2840 {
704afa60 2841 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2842 if (this_hdr->sh_size != 0)
2843 this_hdr->sh_type = SHT_NOBITS;
2844 }
704afa60
JJ
2845 }
2846 }
252b5132
RH
2847
2848 /* Check for processor-specific section types. */
e1fddb6b
AO
2849 if (bed->elf_backend_fake_sections
2850 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2851 *failedptr = TRUE;
252b5132
RH
2852
2853 /* If the section has relocs, set up a section header for the
23bc299b
MM
2854 SHT_REL[A] section. If two relocation sections are required for
2855 this section, it is up to the processor-specific back-end to
c044fabd 2856 create the other. */
23bc299b 2857 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2858 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2859 &elf_section_data (asect)->rel_hdr,
c044fabd 2860 asect,
68bfbfcc 2861 asect->use_rela_p))
b34976b6 2862 *failedptr = TRUE;
252b5132
RH
2863}
2864
dbb410c3
AM
2865/* Fill in the contents of a SHT_GROUP section. */
2866
1126897b 2867void
217aa764 2868bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2869{
217aa764 2870 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2871 unsigned long symindx;
9dce4196 2872 asection *elt, *first;
dbb410c3 2873 unsigned char *loc;
b34976b6 2874 bfd_boolean gas;
dbb410c3 2875
7e4111ad
L
2876 /* Ignore linker created group section. See elfNN_ia64_object_p in
2877 elfxx-ia64.c. */
2878 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2879 || *failedptr)
2880 return;
2881
1126897b
AM
2882 symindx = 0;
2883 if (elf_group_id (sec) != NULL)
2884 symindx = elf_group_id (sec)->udata.i;
2885
2886 if (symindx == 0)
2887 {
2888 /* If called from the assembler, swap_out_syms will have set up
2889 elf_section_syms; If called for "ld -r", use target_index. */
2890 if (elf_section_syms (abfd) != NULL)
2891 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2892 else
2893 symindx = sec->target_index;
2894 }
dbb410c3
AM
2895 elf_section_data (sec)->this_hdr.sh_info = symindx;
2896
1126897b 2897 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2898 gas = TRUE;
dbb410c3
AM
2899 if (sec->contents == NULL)
2900 {
b34976b6 2901 gas = FALSE;
eea6121a 2902 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2903
2904 /* Arrange for the section to be written out. */
2905 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2906 if (sec->contents == NULL)
2907 {
b34976b6 2908 *failedptr = TRUE;
dbb410c3
AM
2909 return;
2910 }
2911 }
2912
eea6121a 2913 loc = sec->contents + sec->size;
dbb410c3 2914
9dce4196
AM
2915 /* Get the pointer to the first section in the group that gas
2916 squirreled away here. objcopy arranges for this to be set to the
2917 start of the input section group. */
2918 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2919
2920 /* First element is a flag word. Rest of section is elf section
2921 indices for all the sections of the group. Write them backwards
2922 just to keep the group in the same order as given in .section
2923 directives, not that it matters. */
2924 while (elt != NULL)
2925 {
9dce4196
AM
2926 asection *s;
2927 unsigned int idx;
2928
dbb410c3 2929 loc -= 4;
9dce4196
AM
2930 s = elt;
2931 if (!gas)
2932 s = s->output_section;
2933 idx = 0;
2934 if (s != NULL)
2935 idx = elf_section_data (s)->this_idx;
2936 H_PUT_32 (abfd, idx, loc);
945906ff 2937 elt = elf_next_in_group (elt);
9dce4196
AM
2938 if (elt == first)
2939 break;
dbb410c3
AM
2940 }
2941
3d7f7666 2942 if ((loc -= 4) != sec->contents)
9dce4196 2943 abort ();
dbb410c3 2944
9dce4196 2945 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2946}
2947
252b5132
RH
2948/* Assign all ELF section numbers. The dummy first section is handled here
2949 too. The link/info pointers for the standard section types are filled
2950 in here too, while we're at it. */
2951
b34976b6 2952static bfd_boolean
da9f89d4 2953assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2954{
2955 struct elf_obj_tdata *t = elf_tdata (abfd);
2956 asection *sec;
2b0f7ef9 2957 unsigned int section_number, secn;
252b5132 2958 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2959 struct bfd_elf_section_data *d;
252b5132
RH
2960
2961 section_number = 1;
2962
2b0f7ef9
JJ
2963 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2964
da9f89d4
L
2965 /* SHT_GROUP sections are in relocatable files only. */
2966 if (link_info == NULL || link_info->relocatable)
252b5132 2967 {
da9f89d4 2968 /* Put SHT_GROUP sections first. */
04dd1667 2969 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2970 {
5daa8fe7 2971 d = elf_section_data (sec);
da9f89d4
L
2972
2973 if (d->this_hdr.sh_type == SHT_GROUP)
2974 {
5daa8fe7 2975 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2976 {
2977 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2978 bfd_section_list_remove (abfd, sec);
da9f89d4 2979 abfd->section_count--;
da9f89d4
L
2980 }
2981 else
2982 {
2983 if (section_number == SHN_LORESERVE)
2984 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2985 d->this_idx = section_number++;
2986 }
2987 }
47cc2cf5
PB
2988 }
2989 }
2990
2991 for (sec = abfd->sections; sec; sec = sec->next)
2992 {
2993 d = elf_section_data (sec);
2994
2995 if (d->this_hdr.sh_type != SHT_GROUP)
2996 {
2997 if (section_number == SHN_LORESERVE)
2998 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2999 d->this_idx = section_number++;
3000 }
2b0f7ef9 3001 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
3002 if ((sec->flags & SEC_RELOC) == 0)
3003 d->rel_idx = 0;
3004 else
2b0f7ef9 3005 {
9ad5cbcf
AM
3006 if (section_number == SHN_LORESERVE)
3007 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
3008 d->rel_idx = section_number++;
3009 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
3010 }
23bc299b
MM
3011
3012 if (d->rel_hdr2)
2b0f7ef9 3013 {
9ad5cbcf
AM
3014 if (section_number == SHN_LORESERVE)
3015 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
3016 d->rel_idx2 = section_number++;
3017 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
3018 }
23bc299b
MM
3019 else
3020 d->rel_idx2 = 0;
252b5132
RH
3021 }
3022
9ad5cbcf
AM
3023 if (section_number == SHN_LORESERVE)
3024 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3025 t->shstrtab_section = section_number++;
2b0f7ef9 3026 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 3027 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
3028
3029 if (bfd_get_symcount (abfd) > 0)
3030 {
9ad5cbcf
AM
3031 if (section_number == SHN_LORESERVE)
3032 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3033 t->symtab_section = section_number++;
2b0f7ef9 3034 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
3035 if (section_number > SHN_LORESERVE - 2)
3036 {
3037 if (section_number == SHN_LORESERVE)
3038 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
3039 t->symtab_shndx_section = section_number++;
3040 t->symtab_shndx_hdr.sh_name
3041 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3042 ".symtab_shndx", FALSE);
9ad5cbcf 3043 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 3044 return FALSE;
9ad5cbcf
AM
3045 }
3046 if (section_number == SHN_LORESERVE)
3047 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3048 t->strtab_section = section_number++;
2b0f7ef9 3049 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3050 }
3051
2b0f7ef9
JJ
3052 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3053 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3054
3055 elf_numsections (abfd) = section_number;
252b5132 3056 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
3057 if (section_number > SHN_LORESERVE)
3058 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
3059
3060 /* Set up the list of section header pointers, in agreement with the
3061 indices. */
d0fb9a8d 3062 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 3063 if (i_shdrp == NULL)
b34976b6 3064 return FALSE;
252b5132 3065
d0fb9a8d 3066 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
3067 if (i_shdrp[0] == NULL)
3068 {
3069 bfd_release (abfd, i_shdrp);
b34976b6 3070 return FALSE;
252b5132 3071 }
252b5132
RH
3072
3073 elf_elfsections (abfd) = i_shdrp;
3074
3075 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3076 if (bfd_get_symcount (abfd) > 0)
3077 {
3078 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3079 if (elf_numsections (abfd) > SHN_LORESERVE)
3080 {
3081 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3082 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3083 }
252b5132
RH
3084 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3085 t->symtab_hdr.sh_link = t->strtab_section;
3086 }
38ce5b11 3087
252b5132
RH
3088 for (sec = abfd->sections; sec; sec = sec->next)
3089 {
3090 struct bfd_elf_section_data *d = elf_section_data (sec);
3091 asection *s;
3092 const char *name;
3093
3094 i_shdrp[d->this_idx] = &d->this_hdr;
3095 if (d->rel_idx != 0)
3096 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3097 if (d->rel_idx2 != 0)
3098 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3099
3100 /* Fill in the sh_link and sh_info fields while we're at it. */
3101
3102 /* sh_link of a reloc section is the section index of the symbol
3103 table. sh_info is the section index of the section to which
3104 the relocation entries apply. */
3105 if (d->rel_idx != 0)
3106 {
3107 d->rel_hdr.sh_link = t->symtab_section;
3108 d->rel_hdr.sh_info = d->this_idx;
3109 }
23bc299b
MM
3110 if (d->rel_idx2 != 0)
3111 {
3112 d->rel_hdr2->sh_link = t->symtab_section;
3113 d->rel_hdr2->sh_info = d->this_idx;
3114 }
252b5132 3115
38ce5b11
L
3116 /* We need to set up sh_link for SHF_LINK_ORDER. */
3117 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3118 {
3119 s = elf_linked_to_section (sec);
3120 if (s)
38ce5b11 3121 {
f2876037 3122 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3123 if (link_info != NULL)
38ce5b11 3124 {
f2876037 3125 /* Check discarded linkonce section. */
ccd2ec6a 3126 if (elf_discarded_section (s))
38ce5b11 3127 {
ccd2ec6a
L
3128 asection *kept;
3129 (*_bfd_error_handler)
3130 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3131 abfd, d->this_hdr.bfd_section,
3132 s, s->owner);
3133 /* Point to the kept section if it has the same
3134 size as the discarded one. */
3135 kept = _bfd_elf_check_kept_section (s);
3136 if (kept == NULL)
185d09ad 3137 {
ccd2ec6a
L
3138 bfd_set_error (bfd_error_bad_value);
3139 return FALSE;
185d09ad 3140 }
ccd2ec6a 3141 s = kept;
38ce5b11 3142 }
e424ecc8 3143
ccd2ec6a
L
3144 s = s->output_section;
3145 BFD_ASSERT (s != NULL);
38ce5b11 3146 }
f2876037
L
3147 else
3148 {
3149 /* Handle objcopy. */
3150 if (s->output_section == NULL)
3151 {
3152 (*_bfd_error_handler)
3153 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3154 abfd, d->this_hdr.bfd_section, s, s->owner);
3155 bfd_set_error (bfd_error_bad_value);
3156 return FALSE;
3157 }
3158 s = s->output_section;
3159 }
ccd2ec6a
L
3160 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3161 }
3162 else
3163 {
3164 /* PR 290:
3165 The Intel C compiler generates SHT_IA_64_UNWIND with
3166 SHF_LINK_ORDER. But it doesn't set the sh_link or
3167 sh_info fields. Hence we could get the situation
3168 where s is NULL. */
3169 const struct elf_backend_data *bed
3170 = get_elf_backend_data (abfd);
3171 if (bed->link_order_error_handler)
3172 bed->link_order_error_handler
3173 (_("%B: warning: sh_link not set for section `%A'"),
3174 abfd, sec);
38ce5b11
L
3175 }
3176 }
3177
252b5132
RH
3178 switch (d->this_hdr.sh_type)
3179 {
3180 case SHT_REL:
3181 case SHT_RELA:
3182 /* A reloc section which we are treating as a normal BFD
3183 section. sh_link is the section index of the symbol
3184 table. sh_info is the section index of the section to
3185 which the relocation entries apply. We assume that an
3186 allocated reloc section uses the dynamic symbol table.
3187 FIXME: How can we be sure? */
3188 s = bfd_get_section_by_name (abfd, ".dynsym");
3189 if (s != NULL)
3190 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3191
3192 /* We look up the section the relocs apply to by name. */
3193 name = sec->name;
3194 if (d->this_hdr.sh_type == SHT_REL)
3195 name += 4;
3196 else
3197 name += 5;
3198 s = bfd_get_section_by_name (abfd, name);
3199 if (s != NULL)
3200 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3201 break;
3202
3203 case SHT_STRTAB:
3204 /* We assume that a section named .stab*str is a stabs
3205 string section. We look for a section with the same name
3206 but without the trailing ``str'', and set its sh_link
3207 field to point to this section. */
3208 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
3209 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3210 {
3211 size_t len;
3212 char *alc;
3213
3214 len = strlen (sec->name);
217aa764 3215 alc = bfd_malloc (len - 2);
252b5132 3216 if (alc == NULL)
b34976b6 3217 return FALSE;
d4c88bbb 3218 memcpy (alc, sec->name, len - 3);
252b5132
RH
3219 alc[len - 3] = '\0';
3220 s = bfd_get_section_by_name (abfd, alc);
3221 free (alc);
3222 if (s != NULL)
3223 {
3224 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3225
3226 /* This is a .stab section. */
0594c12d
AM
3227 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3228 elf_section_data (s)->this_hdr.sh_entsize
3229 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3230 }
3231 }
3232 break;
3233
3234 case SHT_DYNAMIC:
3235 case SHT_DYNSYM:
3236 case SHT_GNU_verneed:
3237 case SHT_GNU_verdef:
3238 /* sh_link is the section header index of the string table
3239 used for the dynamic entries, or the symbol table, or the
3240 version strings. */
3241 s = bfd_get_section_by_name (abfd, ".dynstr");
3242 if (s != NULL)
3243 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3244 break;
3245
7f1204bb
JJ
3246 case SHT_GNU_LIBLIST:
3247 /* sh_link is the section header index of the prelink library
3248 list
3249 used for the dynamic entries, or the symbol table, or the
3250 version strings. */
3251 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3252 ? ".dynstr" : ".gnu.libstr");
3253 if (s != NULL)
3254 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3255 break;
3256
252b5132
RH
3257 case SHT_HASH:
3258 case SHT_GNU_versym:
3259 /* sh_link is the section header index of the symbol table
3260 this hash table or version table is for. */
3261 s = bfd_get_section_by_name (abfd, ".dynsym");
3262 if (s != NULL)
3263 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3264 break;
dbb410c3
AM
3265
3266 case SHT_GROUP:
3267 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3268 }
3269 }
3270
2b0f7ef9 3271 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3272 if (i_shdrp[secn] == NULL)
3273 i_shdrp[secn] = i_shdrp[0];
3274 else
3275 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3276 i_shdrp[secn]->sh_name);
b34976b6 3277 return TRUE;
252b5132
RH
3278}
3279
3280/* Map symbol from it's internal number to the external number, moving
3281 all local symbols to be at the head of the list. */
3282
5372391b 3283static bfd_boolean
217aa764 3284sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3285{
3286 /* If the backend has a special mapping, use it. */
9c5bfbb7 3287 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3288 if (bed->elf_backend_sym_is_global)
3289 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3290
3291 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3292 || bfd_is_und_section (bfd_get_section (sym))
3293 || bfd_is_com_section (bfd_get_section (sym)));
3294}
3295
5372391b
AM
3296/* Don't output section symbols for sections that are not going to be
3297 output. Also, don't output section symbols for reloc and other
3298 special sections. */
3299
3300static bfd_boolean
3301ignore_section_sym (bfd *abfd, asymbol *sym)
3302{
3303 return ((sym->flags & BSF_SECTION_SYM) != 0
3304 && (sym->value != 0
3305 || (sym->section->owner != abfd
3306 && (sym->section->output_section->owner != abfd
3307 || sym->section->output_offset != 0))));
3308}
3309
b34976b6 3310static bfd_boolean
217aa764 3311elf_map_symbols (bfd *abfd)
252b5132 3312{
dc810e39 3313 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3314 asymbol **syms = bfd_get_outsymbols (abfd);
3315 asymbol **sect_syms;
dc810e39
AM
3316 unsigned int num_locals = 0;
3317 unsigned int num_globals = 0;
3318 unsigned int num_locals2 = 0;
3319 unsigned int num_globals2 = 0;
252b5132 3320 int max_index = 0;
dc810e39 3321 unsigned int idx;
252b5132
RH
3322 asection *asect;
3323 asymbol **new_syms;
252b5132
RH
3324
3325#ifdef DEBUG
3326 fprintf (stderr, "elf_map_symbols\n");
3327 fflush (stderr);
3328#endif
3329
252b5132
RH
3330 for (asect = abfd->sections; asect; asect = asect->next)
3331 {
3332 if (max_index < asect->index)
3333 max_index = asect->index;
3334 }
3335
3336 max_index++;
d0fb9a8d 3337 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3338 if (sect_syms == NULL)
b34976b6 3339 return FALSE;
252b5132 3340 elf_section_syms (abfd) = sect_syms;
4e89ac30 3341 elf_num_section_syms (abfd) = max_index;
252b5132 3342
079e9a2f
AM
3343 /* Init sect_syms entries for any section symbols we have already
3344 decided to output. */
252b5132
RH
3345 for (idx = 0; idx < symcount; idx++)
3346 {
dc810e39 3347 asymbol *sym = syms[idx];
c044fabd 3348
252b5132 3349 if ((sym->flags & BSF_SECTION_SYM) != 0
5372391b 3350 && !ignore_section_sym (abfd, sym))
252b5132 3351 {
5372391b 3352 asection *sec = sym->section;
252b5132 3353
5372391b
AM
3354 if (sec->owner != abfd)
3355 sec = sec->output_section;
252b5132 3356
5372391b 3357 sect_syms[sec->index] = syms[idx];
252b5132
RH
3358 }
3359 }
3360
252b5132
RH
3361 /* Classify all of the symbols. */
3362 for (idx = 0; idx < symcount; idx++)
3363 {
5372391b
AM
3364 if (ignore_section_sym (abfd, syms[idx]))
3365 continue;
252b5132
RH
3366 if (!sym_is_global (abfd, syms[idx]))
3367 num_locals++;
3368 else
3369 num_globals++;
3370 }
079e9a2f 3371
5372391b 3372 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3373 sections will already have a section symbol in outsymbols, but
3374 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3375 at least in that case. */
252b5132
RH
3376 for (asect = abfd->sections; asect; asect = asect->next)
3377 {
079e9a2f 3378 if (sect_syms[asect->index] == NULL)
252b5132 3379 {
079e9a2f 3380 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3381 num_locals++;
3382 else
3383 num_globals++;
252b5132
RH
3384 }
3385 }
3386
3387 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3388 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3389
252b5132 3390 if (new_syms == NULL)
b34976b6 3391 return FALSE;
252b5132
RH
3392
3393 for (idx = 0; idx < symcount; idx++)
3394 {
3395 asymbol *sym = syms[idx];
dc810e39 3396 unsigned int i;
252b5132 3397
5372391b
AM
3398 if (ignore_section_sym (abfd, sym))
3399 continue;
252b5132
RH
3400 if (!sym_is_global (abfd, sym))
3401 i = num_locals2++;
3402 else
3403 i = num_locals + num_globals2++;
3404 new_syms[i] = sym;
3405 sym->udata.i = i + 1;
3406 }
3407 for (asect = abfd->sections; asect; asect = asect->next)
3408 {
079e9a2f 3409 if (sect_syms[asect->index] == NULL)
252b5132 3410 {
079e9a2f 3411 asymbol *sym = asect->symbol;
dc810e39 3412 unsigned int i;
252b5132 3413
079e9a2f 3414 sect_syms[asect->index] = sym;
252b5132
RH
3415 if (!sym_is_global (abfd, sym))
3416 i = num_locals2++;
3417 else
3418 i = num_locals + num_globals2++;
3419 new_syms[i] = sym;
3420 sym->udata.i = i + 1;
3421 }
3422 }
3423
3424 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3425
3426 elf_num_locals (abfd) = num_locals;
3427 elf_num_globals (abfd) = num_globals;
b34976b6 3428 return TRUE;
252b5132
RH
3429}
3430
3431/* Align to the maximum file alignment that could be required for any
3432 ELF data structure. */
3433
268b6b39 3434static inline file_ptr
217aa764 3435align_file_position (file_ptr off, int align)
252b5132
RH
3436{
3437 return (off + align - 1) & ~(align - 1);
3438}
3439
3440/* Assign a file position to a section, optionally aligning to the
3441 required section alignment. */
3442
217aa764
AM
3443file_ptr
3444_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3445 file_ptr offset,
3446 bfd_boolean align)
252b5132
RH
3447{
3448 if (align)
3449 {
3450 unsigned int al;
3451
3452 al = i_shdrp->sh_addralign;
3453 if (al > 1)
3454 offset = BFD_ALIGN (offset, al);
3455 }
3456 i_shdrp->sh_offset = offset;
3457 if (i_shdrp->bfd_section != NULL)
3458 i_shdrp->bfd_section->filepos = offset;
3459 if (i_shdrp->sh_type != SHT_NOBITS)
3460 offset += i_shdrp->sh_size;
3461 return offset;
3462}
3463
3464/* Compute the file positions we are going to put the sections at, and
3465 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3466 is not NULL, this is being called by the ELF backend linker. */
3467
b34976b6 3468bfd_boolean
217aa764
AM
3469_bfd_elf_compute_section_file_positions (bfd *abfd,
3470 struct bfd_link_info *link_info)
252b5132 3471{
9c5bfbb7 3472 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3473 bfd_boolean failed;
4b6c0f2f 3474 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3475 Elf_Internal_Shdr *shstrtab_hdr;
3476
3477 if (abfd->output_has_begun)
b34976b6 3478 return TRUE;
252b5132
RH
3479
3480 /* Do any elf backend specific processing first. */
3481 if (bed->elf_backend_begin_write_processing)
3482 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3483
3484 if (! prep_headers (abfd))
b34976b6 3485 return FALSE;
252b5132 3486
e6c51ed4
NC
3487 /* Post process the headers if necessary. */
3488 if (bed->elf_backend_post_process_headers)
3489 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3490
b34976b6 3491 failed = FALSE;
252b5132
RH
3492 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3493 if (failed)
b34976b6 3494 return FALSE;
252b5132 3495
da9f89d4 3496 if (!assign_section_numbers (abfd, link_info))
b34976b6 3497 return FALSE;
252b5132
RH
3498
3499 /* The backend linker builds symbol table information itself. */
3500 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3501 {
3502 /* Non-zero if doing a relocatable link. */
3503 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3504
3505 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3506 return FALSE;
252b5132
RH
3507 }
3508
1126897b 3509 if (link_info == NULL)
dbb410c3 3510 {
1126897b 3511 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3512 if (failed)
b34976b6 3513 return FALSE;
dbb410c3
AM
3514 }
3515
252b5132
RH
3516 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3517 /* sh_name was set in prep_headers. */
3518 shstrtab_hdr->sh_type = SHT_STRTAB;
3519 shstrtab_hdr->sh_flags = 0;
3520 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3521 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3522 shstrtab_hdr->sh_entsize = 0;
3523 shstrtab_hdr->sh_link = 0;
3524 shstrtab_hdr->sh_info = 0;
3525 /* sh_offset is set in assign_file_positions_except_relocs. */
3526 shstrtab_hdr->sh_addralign = 1;
3527
c84fca4d 3528 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3529 return FALSE;
252b5132
RH
3530
3531 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3532 {
3533 file_ptr off;
3534 Elf_Internal_Shdr *hdr;
3535
3536 off = elf_tdata (abfd)->next_file_pos;
3537
3538 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3539 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3540
9ad5cbcf
AM
3541 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3542 if (hdr->sh_size != 0)
b34976b6 3543 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3544
252b5132 3545 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3546 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3547
3548 elf_tdata (abfd)->next_file_pos = off;
3549
3550 /* Now that we know where the .strtab section goes, write it
3551 out. */
3552 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3553 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3554 return FALSE;
252b5132
RH
3555 _bfd_stringtab_free (strtab);
3556 }
3557
b34976b6 3558 abfd->output_has_begun = TRUE;
252b5132 3559
b34976b6 3560 return TRUE;
252b5132
RH
3561}
3562
3563/* Create a mapping from a set of sections to a program segment. */
3564
217aa764
AM
3565static struct elf_segment_map *
3566make_mapping (bfd *abfd,
3567 asection **sections,
3568 unsigned int from,
3569 unsigned int to,
3570 bfd_boolean phdr)
252b5132
RH
3571{
3572 struct elf_segment_map *m;
3573 unsigned int i;
3574 asection **hdrpp;
dc810e39 3575 bfd_size_type amt;
252b5132 3576
dc810e39
AM
3577 amt = sizeof (struct elf_segment_map);
3578 amt += (to - from - 1) * sizeof (asection *);
217aa764 3579 m = bfd_zalloc (abfd, amt);
252b5132
RH
3580 if (m == NULL)
3581 return NULL;
3582 m->next = NULL;
3583 m->p_type = PT_LOAD;
3584 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3585 m->sections[i - from] = *hdrpp;
3586 m->count = to - from;
3587
3588 if (from == 0 && phdr)
3589 {
3590 /* Include the headers in the first PT_LOAD segment. */
3591 m->includes_filehdr = 1;
3592 m->includes_phdrs = 1;
3593 }
3594
3595 return m;
3596}
3597
229fcec5
MM
3598/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3599 on failure. */
3600
3601struct elf_segment_map *
3602_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3603{
3604 struct elf_segment_map *m;
3605
3606 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3607 if (m == NULL)
3608 return NULL;
3609 m->next = NULL;
3610 m->p_type = PT_DYNAMIC;
3611 m->count = 1;
3612 m->sections[0] = dynsec;
3613
3614 return m;
3615}
3616
252b5132
RH
3617/* Set up a mapping from BFD sections to program segments. */
3618
b34976b6 3619static bfd_boolean
217aa764 3620map_sections_to_segments (bfd *abfd)
252b5132
RH
3621{
3622 asection **sections = NULL;
3623 asection *s;
3624 unsigned int i;
3625 unsigned int count;
3626 struct elf_segment_map *mfirst;
3627 struct elf_segment_map **pm;
3628 struct elf_segment_map *m;
3629 asection *last_hdr;
baaff79e 3630 bfd_vma last_size;
252b5132
RH
3631 unsigned int phdr_index;
3632 bfd_vma maxpagesize;
3633 asection **hdrpp;
b34976b6
AM
3634 bfd_boolean phdr_in_segment = TRUE;
3635 bfd_boolean writable;
13ae64f3
JJ
3636 int tls_count = 0;
3637 asection *first_tls = NULL;
65765700 3638 asection *dynsec, *eh_frame_hdr;
dc810e39 3639 bfd_size_type amt;
252b5132
RH
3640
3641 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3642 return TRUE;
252b5132
RH
3643
3644 if (bfd_count_sections (abfd) == 0)
b34976b6 3645 return TRUE;
252b5132
RH
3646
3647 /* Select the allocated sections, and sort them. */
3648
d0fb9a8d 3649 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
252b5132
RH
3650 if (sections == NULL)
3651 goto error_return;
3652
3653 i = 0;
3654 for (s = abfd->sections; s != NULL; s = s->next)
3655 {
3656 if ((s->flags & SEC_ALLOC) != 0)
3657 {
3658 sections[i] = s;
3659 ++i;
3660 }
3661 }
3662 BFD_ASSERT (i <= bfd_count_sections (abfd));
3663 count = i;
3664
3665 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3666
3667 /* Build the mapping. */
3668
3669 mfirst = NULL;
3670 pm = &mfirst;
3671
3672 /* If we have a .interp section, then create a PT_PHDR segment for
3673 the program headers and a PT_INTERP segment for the .interp
3674 section. */
3675 s = bfd_get_section_by_name (abfd, ".interp");
3676 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3677 {
dc810e39 3678 amt = sizeof (struct elf_segment_map);
217aa764 3679 m = bfd_zalloc (abfd, amt);
252b5132
RH
3680 if (m == NULL)
3681 goto error_return;
3682 m->next = NULL;
3683 m->p_type = PT_PHDR;
3684 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3685 m->p_flags = PF_R | PF_X;
3686 m->p_flags_valid = 1;
3687 m->includes_phdrs = 1;
3688
3689 *pm = m;
3690 pm = &m->next;
3691
dc810e39 3692 amt = sizeof (struct elf_segment_map);
217aa764 3693 m = bfd_zalloc (abfd, amt);
252b5132
RH
3694 if (m == NULL)
3695 goto error_return;
3696 m->next = NULL;
3697 m->p_type = PT_INTERP;
3698 m->count = 1;
3699 m->sections[0] = s;
3700
3701 *pm = m;
3702 pm = &m->next;
3703 }
3704
3705 /* Look through the sections. We put sections in the same program
3706 segment when the start of the second section can be placed within
3707 a few bytes of the end of the first section. */
3708 last_hdr = NULL;
baaff79e 3709 last_size = 0;
252b5132
RH
3710 phdr_index = 0;
3711 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3712 writable = FALSE;
252b5132
RH
3713 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3714 if (dynsec != NULL
3715 && (dynsec->flags & SEC_LOAD) == 0)
3716 dynsec = NULL;
3717
3718 /* Deal with -Ttext or something similar such that the first section
3719 is not adjacent to the program headers. This is an
3720 approximation, since at this point we don't know exactly how many
3721 program headers we will need. */
3722 if (count > 0)
3723 {
3724 bfd_size_type phdr_size;
3725
3726 phdr_size = elf_tdata (abfd)->program_header_size;
3727 if (phdr_size == 0)
3728 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3729 if ((abfd->flags & D_PAGED) == 0
3730 || sections[0]->lma < phdr_size
3731 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3732 phdr_in_segment = FALSE;
252b5132
RH
3733 }
3734
3735 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3736 {
3737 asection *hdr;
b34976b6 3738 bfd_boolean new_segment;
252b5132
RH
3739
3740 hdr = *hdrpp;
3741
3742 /* See if this section and the last one will fit in the same
3743 segment. */
3744
3745 if (last_hdr == NULL)
3746 {
3747 /* If we don't have a segment yet, then we don't need a new
3748 one (we build the last one after this loop). */
b34976b6 3749 new_segment = FALSE;
252b5132
RH
3750 }
3751 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3752 {
3753 /* If this section has a different relation between the
3754 virtual address and the load address, then we need a new
3755 segment. */
b34976b6 3756 new_segment = TRUE;
252b5132 3757 }
baaff79e 3758 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3759 < BFD_ALIGN (hdr->lma, maxpagesize))
3760 {
3761 /* If putting this section in this segment would force us to
3762 skip a page in the segment, then we need a new segment. */
b34976b6 3763 new_segment = TRUE;
252b5132 3764 }
baaff79e
JJ
3765 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3766 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3767 {
3768 /* We don't want to put a loadable section after a
baaff79e
JJ
3769 nonloadable section in the same segment.
3770 Consider .tbss sections as loadable for this purpose. */
b34976b6 3771 new_segment = TRUE;
252b5132
RH
3772 }
3773 else if ((abfd->flags & D_PAGED) == 0)
3774 {
3775 /* If the file is not demand paged, which means that we
3776 don't require the sections to be correctly aligned in the
3777 file, then there is no other reason for a new segment. */
b34976b6 3778 new_segment = FALSE;
252b5132
RH
3779 }
3780 else if (! writable
3781 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3782 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3783 & ~(maxpagesize - 1))
3784 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3785 {
3786 /* We don't want to put a writable section in a read only
3787 segment, unless they are on the same page in memory
3788 anyhow. We already know that the last section does not
3789 bring us past the current section on the page, so the
3790 only case in which the new section is not on the same
3791 page as the previous section is when the previous section
3792 ends precisely on a page boundary. */
b34976b6 3793 new_segment = TRUE;
252b5132
RH
3794 }
3795 else
3796 {
3797 /* Otherwise, we can use the same segment. */
b34976b6 3798 new_segment = FALSE;
252b5132
RH
3799 }
3800
3801 if (! new_segment)
3802 {
3803 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3804 writable = TRUE;
baaff79e
JJ
3805 last_hdr = hdr;
3806 /* .tbss sections effectively have zero size. */
e5caec89 3807 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3808 last_size = hdr->size;
baaff79e
JJ
3809 else
3810 last_size = 0;
252b5132
RH
3811 continue;
3812 }
3813
3814 /* We need a new program segment. We must create a new program
3815 header holding all the sections from phdr_index until hdr. */
3816
3817 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3818 if (m == NULL)
3819 goto error_return;
3820
3821 *pm = m;
3822 pm = &m->next;
3823
3824 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3825 writable = TRUE;
252b5132 3826 else
b34976b6 3827 writable = FALSE;
252b5132
RH
3828
3829 last_hdr = hdr;
baaff79e
JJ
3830 /* .tbss sections effectively have zero size. */
3831 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3832 last_size = hdr->size;
baaff79e
JJ
3833 else
3834 last_size = 0;
252b5132 3835 phdr_index = i;
b34976b6 3836 phdr_in_segment = FALSE;
252b5132
RH
3837 }
3838
3839 /* Create a final PT_LOAD program segment. */
3840 if (last_hdr != NULL)
3841 {
3842 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3843 if (m == NULL)
3844 goto error_return;
3845
3846 *pm = m;
3847 pm = &m->next;
3848 }
3849
3850 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3851 if (dynsec != NULL)
3852 {
229fcec5 3853 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3854 if (m == NULL)
3855 goto error_return;
252b5132
RH
3856 *pm = m;
3857 pm = &m->next;
3858 }
3859
3860 /* For each loadable .note section, add a PT_NOTE segment. We don't
3861 use bfd_get_section_by_name, because if we link together
3862 nonloadable .note sections and loadable .note sections, we will
3863 generate two .note sections in the output file. FIXME: Using
3864 names for section types is bogus anyhow. */
3865 for (s = abfd->sections; s != NULL; s = s->next)
3866 {
3867 if ((s->flags & SEC_LOAD) != 0
3868 && strncmp (s->name, ".note", 5) == 0)
3869 {
dc810e39 3870 amt = sizeof (struct elf_segment_map);
217aa764 3871 m = bfd_zalloc (abfd, amt);
252b5132
RH
3872 if (m == NULL)
3873 goto error_return;
3874 m->next = NULL;
3875 m->p_type = PT_NOTE;
3876 m->count = 1;
3877 m->sections[0] = s;
3878
3879 *pm = m;
3880 pm = &m->next;
3881 }
13ae64f3
JJ
3882 if (s->flags & SEC_THREAD_LOCAL)
3883 {
3884 if (! tls_count)
3885 first_tls = s;
3886 tls_count++;
3887 }
3888 }
3889
3890 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3891 if (tls_count > 0)
3892 {
3893 int i;
3894
3895 amt = sizeof (struct elf_segment_map);
3896 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3897 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3898 if (m == NULL)
3899 goto error_return;
3900 m->next = NULL;
3901 m->p_type = PT_TLS;
3902 m->count = tls_count;
3903 /* Mandated PF_R. */
3904 m->p_flags = PF_R;
3905 m->p_flags_valid = 1;
3906 for (i = 0; i < tls_count; ++i)
3907 {
3908 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3909 m->sections[i] = first_tls;
3910 first_tls = first_tls->next;
3911 }
3912
3913 *pm = m;
3914 pm = &m->next;
252b5132
RH
3915 }
3916
65765700
JJ
3917 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3918 segment. */
126495ed
AM
3919 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3920 if (eh_frame_hdr != NULL
3921 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3922 {
3923 amt = sizeof (struct elf_segment_map);
217aa764 3924 m = bfd_zalloc (abfd, amt);
65765700
JJ
3925 if (m == NULL)
3926 goto error_return;
3927 m->next = NULL;
3928 m->p_type = PT_GNU_EH_FRAME;
3929 m->count = 1;
126495ed 3930 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3931
3932 *pm = m;
3933 pm = &m->next;
3934 }
3935
9ee5e499
JJ
3936 if (elf_tdata (abfd)->stack_flags)
3937 {
3938 amt = sizeof (struct elf_segment_map);
217aa764 3939 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3940 if (m == NULL)
3941 goto error_return;
3942 m->next = NULL;
3943 m->p_type = PT_GNU_STACK;
3944 m->p_flags = elf_tdata (abfd)->stack_flags;
3945 m->p_flags_valid = 1;
3946
3947 *pm = m;
3948 pm = &m->next;
3949 }
3950
8c37241b
JJ
3951 if (elf_tdata (abfd)->relro)
3952 {
3953 amt = sizeof (struct elf_segment_map);
3954 m = bfd_zalloc (abfd, amt);
3955 if (m == NULL)
3956 goto error_return;
3957 m->next = NULL;
3958 m->p_type = PT_GNU_RELRO;
3959 m->p_flags = PF_R;
3960 m->p_flags_valid = 1;
3961
3962 *pm = m;
3963 pm = &m->next;
3964 }
3965
252b5132
RH
3966 free (sections);
3967 sections = NULL;
3968
3969 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3970 return TRUE;
252b5132
RH
3971
3972 error_return:
3973 if (sections != NULL)
3974 free (sections);
b34976b6 3975 return FALSE;
252b5132
RH
3976}
3977
3978/* Sort sections by address. */
3979
3980static int
217aa764 3981elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3982{
3983 const asection *sec1 = *(const asection **) arg1;
3984 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3985 bfd_size_type size1, size2;
252b5132
RH
3986
3987 /* Sort by LMA first, since this is the address used to
3988 place the section into a segment. */
3989 if (sec1->lma < sec2->lma)
3990 return -1;
3991 else if (sec1->lma > sec2->lma)
3992 return 1;
3993
3994 /* Then sort by VMA. Normally the LMA and the VMA will be
3995 the same, and this will do nothing. */
3996 if (sec1->vma < sec2->vma)
3997 return -1;
3998 else if (sec1->vma > sec2->vma)
3999 return 1;
4000
4001 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4002
07c6e936 4003#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4004
4005 if (TOEND (sec1))
4006 {
4007 if (TOEND (sec2))
00a7cdc5
NC
4008 {
4009 /* If the indicies are the same, do not return 0
4010 here, but continue to try the next comparison. */
4011 if (sec1->target_index - sec2->target_index != 0)
4012 return sec1->target_index - sec2->target_index;
4013 }
252b5132
RH
4014 else
4015 return 1;
4016 }
00a7cdc5 4017 else if (TOEND (sec2))
252b5132
RH
4018 return -1;
4019
4020#undef TOEND
4021
00a7cdc5
NC
4022 /* Sort by size, to put zero sized sections
4023 before others at the same address. */
252b5132 4024
eea6121a
AM
4025 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4026 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4027
4028 if (size1 < size2)
252b5132 4029 return -1;
eecdbe52 4030 if (size1 > size2)
252b5132
RH
4031 return 1;
4032
4033 return sec1->target_index - sec2->target_index;
4034}
4035
340b6d91
AC
4036/* Ian Lance Taylor writes:
4037
4038 We shouldn't be using % with a negative signed number. That's just
4039 not good. We have to make sure either that the number is not
4040 negative, or that the number has an unsigned type. When the types
4041 are all the same size they wind up as unsigned. When file_ptr is a
4042 larger signed type, the arithmetic winds up as signed long long,
4043 which is wrong.
4044
4045 What we're trying to say here is something like ``increase OFF by
4046 the least amount that will cause it to be equal to the VMA modulo
4047 the page size.'' */
4048/* In other words, something like:
4049
4050 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4051 off_offset = off % bed->maxpagesize;
4052 if (vma_offset < off_offset)
4053 adjustment = vma_offset + bed->maxpagesize - off_offset;
4054 else
4055 adjustment = vma_offset - off_offset;
4056
4057 which can can be collapsed into the expression below. */
4058
4059static file_ptr
4060vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4061{
4062 return ((vma - off) % maxpagesize);
4063}
4064
cedc298e
L
4065static void
4066print_segment_map (bfd *abfd)
4067{
4068 struct elf_segment_map *m;
4069 unsigned int i, j;
4070
4071 fprintf (stderr, _(" Section to Segment mapping:\n"));
4072 fprintf (stderr, _(" Segment Sections...\n"));
4073
4074 for (i= 0, m = elf_tdata (abfd)->segment_map;
4075 m != NULL;
4076 i++, m = m->next)
4077 {
4078 const char *pt = get_segment_type (m->p_type);
4079 char buf[32];
4080
4081 if (pt == NULL)
4082 {
4083 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4084 sprintf (buf, "LOPROC+%7.7x",
4085 (unsigned int) (m->p_type - PT_LOPROC));
4086 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4087 sprintf (buf, "LOOS+%7.7x",
4088 (unsigned int) (m->p_type - PT_LOOS));
4089 else
4090 snprintf (buf, sizeof (buf), "%8.8x",
4091 (unsigned int) m->p_type);
4092 pt = buf;
4093 }
4094 fprintf (stderr, " %2.2d: %14.14s: ", i, pt);
4095 for (j = 0; j < m->count; j++)
4096 fprintf (stderr, "%s ", m->sections [j]->name);
4097 putc ('\n',stderr);
4098 }
4099}
4100
252b5132
RH
4101/* Assign file positions to the sections based on the mapping from
4102 sections to segments. This function also sets up some fields in
f3520d2f 4103 the file header. */
252b5132 4104
b34976b6 4105static bfd_boolean
f3520d2f
AM
4106assign_file_positions_for_load_sections (bfd *abfd,
4107 struct bfd_link_info *link_info)
252b5132
RH
4108{
4109 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4110 struct elf_segment_map *m;
252b5132 4111 Elf_Internal_Phdr *phdrs;
252b5132 4112 Elf_Internal_Phdr *p;
f3520d2f 4113 file_ptr off, voff;
3f570048 4114 bfd_size_type maxpagesize;
f3520d2f
AM
4115 unsigned int count;
4116 unsigned int alloc;
5c182d5f 4117 unsigned int i;
252b5132
RH
4118
4119 if (elf_tdata (abfd)->segment_map == NULL)
4120 {
4121 if (! map_sections_to_segments (abfd))
b34976b6 4122 return FALSE;
252b5132 4123 }
1ed89aa9
NC
4124 else
4125 {
4126 /* The placement algorithm assumes that non allocated sections are
4127 not in PT_LOAD segments. We ensure this here by removing such
540b09cb
AM
4128 sections from the segment map. We also remove excluded
4129 sections. */
1ed89aa9
NC
4130 for (m = elf_tdata (abfd)->segment_map;
4131 m != NULL;
4132 m = m->next)
4133 {
4134 unsigned int new_count;
1ed89aa9 4135
1ed89aa9
NC
4136 new_count = 0;
4137 for (i = 0; i < m->count; i ++)
4138 {
540b09cb
AM
4139 if ((m->sections[i]->flags & SEC_EXCLUDE) == 0
4140 && ((m->sections[i]->flags & SEC_ALLOC) != 0
4141 || m->p_type != PT_LOAD))
1ed89aa9 4142 {
47d9a591 4143 if (i != new_count)
1ed89aa9
NC
4144 m->sections[new_count] = m->sections[i];
4145
4146 new_count ++;
4147 }
4148 }
4149
4150 if (new_count != m->count)
4151 m->count = new_count;
4152 }
4153 }
252b5132
RH
4154
4155 if (bed->elf_backend_modify_segment_map)
4156 {
c84fca4d 4157 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 4158 return FALSE;
252b5132
RH
4159 }
4160
4161 count = 0;
4162 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4163 ++count;
4164
4165 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4166 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4167 elf_elfheader (abfd)->e_phnum = count;
4168
4169 if (count == 0)
0ebdbb83
BW
4170 {
4171 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4172 return TRUE;
4173 }
252b5132
RH
4174
4175 /* If we already counted the number of program segments, make sure
4176 that we allocated enough space. This happens when SIZEOF_HEADERS
4177 is used in a linker script. */
4178 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
4179 if (alloc != 0 && count > alloc)
4180 {
4181 ((*_bfd_error_handler)
b301b248
AM
4182 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
4183 abfd, alloc, count));
cedc298e 4184 print_segment_map (abfd);
252b5132 4185 bfd_set_error (bfd_error_bad_value);
b34976b6 4186 return FALSE;
252b5132
RH
4187 }
4188
4189 if (alloc == 0)
f3520d2f
AM
4190 {
4191 alloc = count;
4192 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4193 }
252b5132 4194
d0fb9a8d 4195 phdrs = bfd_alloc2 (abfd, alloc, sizeof (Elf_Internal_Phdr));
f3520d2f 4196 elf_tdata (abfd)->phdr = phdrs;
252b5132 4197 if (phdrs == NULL)
b34976b6 4198 return FALSE;
252b5132 4199
3f570048
AM
4200 maxpagesize = 1;
4201 if ((abfd->flags & D_PAGED) != 0)
4202 maxpagesize = bed->maxpagesize;
4203
252b5132
RH
4204 off = bed->s->sizeof_ehdr;
4205 off += alloc * bed->s->sizeof_phdr;
4206
252b5132
RH
4207 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4208 m != NULL;
4209 m = m->next, p++)
4210 {
252b5132
RH
4211 asection **secpp;
4212
4213 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4214 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4215 not be done to the PT_NOTE section of a corefile, which may
4216 contain several pseudo-sections artificially created by bfd.
4217 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4218 if (m->count > 1
4219 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4220 && m->p_type == PT_NOTE))
252b5132
RH
4221 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4222 elf_sort_sections);
4223
b301b248
AM
4224 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4225 number of sections with contents contributing to both p_filesz
4226 and p_memsz, followed by a number of sections with no contents
4227 that just contribute to p_memsz. In this loop, OFF tracks next
4228 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4229 an adjustment we use for segments that have no file contents
4230 but need zero filled memory allocation. */
4231 voff = 0;
252b5132 4232 p->p_type = m->p_type;
28a7f3e7 4233 p->p_flags = m->p_flags;
252b5132 4234
3f570048
AM
4235 if (m->count == 0)
4236 p->p_vaddr = 0;
4237 else
4238 p->p_vaddr = m->sections[0]->vma;
4239
4240 if (m->p_paddr_valid)
4241 p->p_paddr = m->p_paddr;
4242 else if (m->count == 0)
4243 p->p_paddr = 0;
4244 else
4245 p->p_paddr = m->sections[0]->lma;
4246
4247 if (p->p_type == PT_LOAD
4248 && (abfd->flags & D_PAGED) != 0)
4249 {
4250 /* p_align in demand paged PT_LOAD segments effectively stores
4251 the maximum page size. When copying an executable with
4252 objcopy, we set m->p_align from the input file. Use this
4253 value for maxpagesize rather than bed->maxpagesize, which
4254 may be different. Note that we use maxpagesize for PT_TLS
4255 segment alignment later in this function, so we are relying
4256 on at least one PT_LOAD segment appearing before a PT_TLS
4257 segment. */
4258 if (m->p_align_valid)
4259 maxpagesize = m->p_align;
4260
4261 p->p_align = maxpagesize;
4262 }
4263 else if (m->count == 0)
4264 p->p_align = 1 << bed->s->log_file_align;
4265 else
4266 p->p_align = 0;
4267
252b5132 4268 if (p->p_type == PT_LOAD
b301b248 4269 && m->count > 0)
252b5132 4270 {
b301b248
AM
4271 bfd_size_type align;
4272 bfd_vma adjust;
a49e53ed 4273 unsigned int align_power = 0;
b301b248 4274
a49e53ed 4275 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4276 {
a49e53ed 4277 unsigned int secalign;
252b5132 4278
a49e53ed
AM
4279 secalign = bfd_get_section_alignment (abfd, *secpp);
4280 if (secalign > align_power)
4281 align_power = secalign;
b301b248 4282 }
a49e53ed
AM
4283 align = (bfd_size_type) 1 << align_power;
4284
3f570048
AM
4285 if (align < maxpagesize)
4286 align = maxpagesize;
252b5132 4287
b301b248
AM
4288 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4289 off += adjust;
4290 if (adjust != 0
4291 && !m->includes_filehdr
4292 && !m->includes_phdrs
4293 && (ufile_ptr) off >= align)
4294 {
4295 /* If the first section isn't loadable, the same holds for
4296 any other sections. Since the segment won't need file
4297 space, we can make p_offset overlap some prior segment.
4298 However, .tbss is special. If a segment starts with
4299 .tbss, we need to look at the next section to decide
4300 whether the segment has any loadable sections. */
4301 i = 0;
5efb6261 4302 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
4303 {
4304 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4305 || ++i >= m->count)
4306 {
4307 off -= adjust;
4308 voff = adjust - align;
4309 break;
4310 }
4311 }
252b5132
RH
4312 }
4313 }
b1a6d0b1
NC
4314 /* Make sure the .dynamic section is the first section in the
4315 PT_DYNAMIC segment. */
4316 else if (p->p_type == PT_DYNAMIC
4317 && m->count > 1
4318 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4319 {
4320 _bfd_error_handler
b301b248
AM
4321 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4322 abfd);
b1a6d0b1
NC
4323 bfd_set_error (bfd_error_bad_value);
4324 return FALSE;
4325 }
252b5132 4326
252b5132
RH
4327 p->p_offset = 0;
4328 p->p_filesz = 0;
4329 p->p_memsz = 0;
4330
4331 if (m->includes_filehdr)
4332 {
4333 if (! m->p_flags_valid)
4334 p->p_flags |= PF_R;
4335 p->p_offset = 0;
4336 p->p_filesz = bed->s->sizeof_ehdr;
4337 p->p_memsz = bed->s->sizeof_ehdr;
4338 if (m->count > 0)
4339 {
4340 BFD_ASSERT (p->p_type == PT_LOAD);
4341
4342 if (p->p_vaddr < (bfd_vma) off)
4343 {
caf47ea6 4344 (*_bfd_error_handler)
b301b248
AM
4345 (_("%B: Not enough room for program headers, try linking with -N"),
4346 abfd);
252b5132 4347 bfd_set_error (bfd_error_bad_value);
b34976b6 4348 return FALSE;
252b5132
RH
4349 }
4350
4351 p->p_vaddr -= off;
4352 if (! m->p_paddr_valid)
4353 p->p_paddr -= off;
4354 }
252b5132
RH
4355 }
4356
4357 if (m->includes_phdrs)
4358 {
4359 if (! m->p_flags_valid)
4360 p->p_flags |= PF_R;
4361
f3520d2f 4362 if (!m->includes_filehdr)
252b5132
RH
4363 {
4364 p->p_offset = bed->s->sizeof_ehdr;
4365
4366 if (m->count > 0)
4367 {
4368 BFD_ASSERT (p->p_type == PT_LOAD);
4369 p->p_vaddr -= off - p->p_offset;
4370 if (! m->p_paddr_valid)
4371 p->p_paddr -= off - p->p_offset;
4372 }
252b5132
RH
4373 }
4374
4375 p->p_filesz += alloc * bed->s->sizeof_phdr;
4376 p->p_memsz += alloc * bed->s->sizeof_phdr;
4377 }
4378
4379 if (p->p_type == PT_LOAD
4380 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4381 {
4382 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4383 p->p_offset = off + voff;
252b5132
RH
4384 else
4385 {
4386 file_ptr adjust;
4387
4388 adjust = off - (p->p_offset + p->p_filesz);
4389 p->p_filesz += adjust;
4390 p->p_memsz += adjust;
4391 }
4392 }
4393
1ea63fd2
AM
4394 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4395 maps. Set filepos for sections in PT_LOAD segments, and in
4396 core files, for sections in PT_NOTE segments.
4397 assign_file_positions_for_non_load_sections will set filepos
4398 for other sections and update p_filesz for other segments. */
252b5132
RH
4399 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4400 {
4401 asection *sec;
4402 flagword flags;
4403 bfd_size_type align;
4404
4405 sec = *secpp;
4406 flags = sec->flags;
3f570048 4407 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4408
b301b248
AM
4409 if (p->p_type == PT_LOAD
4410 || p->p_type == PT_TLS)
252b5132
RH
4411 {
4412 bfd_signed_vma adjust;
4413
5efb6261 4414 if ((flags & SEC_LOAD) != 0)
252b5132 4415 {
b301b248 4416 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4417 if (adjust < 0)
b301b248
AM
4418 {
4419 (*_bfd_error_handler)
4420 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4421 abfd, sec, (unsigned long) sec->lma);
4422 adjust = 0;
4423 }
4424 off += adjust;
4425 p->p_filesz += adjust;
4426 p->p_memsz += adjust;
252b5132 4427 }
b301b248
AM
4428 /* .tbss is special. It doesn't contribute to p_memsz of
4429 normal segments. */
1ea63fd2
AM
4430 else if ((flags & SEC_ALLOC) != 0
4431 && ((flags & SEC_THREAD_LOCAL) == 0
4432 || p->p_type == PT_TLS))
252b5132
RH
4433 {
4434 /* The section VMA must equal the file position
b301b248
AM
4435 modulo the page size. */
4436 bfd_size_type page = align;
3f570048
AM
4437 if (page < maxpagesize)
4438 page = maxpagesize;
b301b248
AM
4439 adjust = vma_page_aligned_bias (sec->vma,
4440 p->p_vaddr + p->p_memsz,
4441 page);
252b5132 4442 p->p_memsz += adjust;
252b5132 4443 }
252b5132
RH
4444 }
4445
4446 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4447 {
b301b248
AM
4448 /* The section at i == 0 is the one that actually contains
4449 everything. */
4a938328
MS
4450 if (i == 0)
4451 {
252b5132 4452 sec->filepos = off;
eea6121a 4453 off += sec->size;
b301b248
AM
4454 p->p_filesz = sec->size;
4455 p->p_memsz = 0;
4456 p->p_align = 1;
252b5132 4457 }
4a938328 4458 else
252b5132 4459 {
b301b248 4460 /* The rest are fake sections that shouldn't be written. */
252b5132 4461 sec->filepos = 0;
eea6121a 4462 sec->size = 0;
b301b248
AM
4463 sec->flags = 0;
4464 continue;
252b5132 4465 }
252b5132
RH
4466 }
4467 else
4468 {
b301b248
AM
4469 if (p->p_type == PT_LOAD)
4470 {
4471 sec->filepos = off;
5efb6261
AM
4472 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4473 1997, and the exact reason for it isn't clear. One
4474 plausible explanation is that it is to work around
4475 a problem we have with linker scripts using data
4476 statements in NOLOAD sections. I don't think it
4477 makes a great deal of sense to have such a section
4478 assigned to a PT_LOAD segment, but apparently
4479 people do this. The data statement results in a
4480 bfd_data_link_order being built, and these need
4481 section contents to write into. Eventually, we get
4482 to _bfd_elf_write_object_contents which writes any
4483 section with contents to the output. Make room
4484 here for the write, so that following segments are
4485 not trashed. */
4486 if ((flags & SEC_LOAD) != 0
4487 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4488 off += sec->size;
4489 }
252b5132 4490
5efb6261 4491 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4492 {
4493 p->p_filesz += sec->size;
4494 p->p_memsz += sec->size;
4495 }
4b6c0f2f 4496
b301b248
AM
4497 /* .tbss is special. It doesn't contribute to p_memsz of
4498 normal segments. */
1ea63fd2
AM
4499 else if ((flags & SEC_ALLOC) != 0
4500 && ((flags & SEC_THREAD_LOCAL) == 0
4501 || p->p_type == PT_TLS))
b301b248 4502 p->p_memsz += sec->size;
252b5132 4503
13ae64f3 4504 if (p->p_type == PT_TLS
eea6121a 4505 && sec->size == 0
13ae64f3
JJ
4506 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4507 {
3a800eb9
AM
4508 struct bfd_link_order *o = sec->map_tail.link_order;
4509 if (o != NULL)
4510 p->p_memsz += o->offset + o->size;
13ae64f3
JJ
4511 }
4512
252b5132 4513 if (align > p->p_align
1ea63fd2 4514 && (p->p_type != PT_LOAD
3f570048 4515 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4516 p->p_align = align;
4517 }
4518
4519 if (! m->p_flags_valid)
4520 {
4521 p->p_flags |= PF_R;
4522 if ((flags & SEC_CODE) != 0)
4523 p->p_flags |= PF_X;
4524 if ((flags & SEC_READONLY) == 0)
4525 p->p_flags |= PF_W;
4526 }
4527 }
4528 }
4529
f3520d2f
AM
4530 /* Clear out any program headers we allocated but did not use. */
4531 for (; count < alloc; count++, p++)
4532 {
4533 memset (p, 0, sizeof *p);
4534 p->p_type = PT_NULL;
4535 }
4536
4537 elf_tdata (abfd)->next_file_pos = off;
4538 return TRUE;
4539}
4540
4541/* Assign file positions for the other sections. */
4542
4543static bfd_boolean
4544assign_file_positions_for_non_load_sections (bfd *abfd,
4545 struct bfd_link_info *link_info)
4546{
4547 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4548 Elf_Internal_Shdr **i_shdrpp;
4549 Elf_Internal_Shdr **hdrpp;
4550 Elf_Internal_Phdr *phdrs;
4551 Elf_Internal_Phdr *p;
4552 struct elf_segment_map *m;
4553 bfd_vma filehdr_vaddr, filehdr_paddr;
4554 bfd_vma phdrs_vaddr, phdrs_paddr;
4555 file_ptr off;
4556 unsigned int num_sec;
4557 unsigned int i;
4558 unsigned int count;
4559
5c182d5f
AM
4560 i_shdrpp = elf_elfsections (abfd);
4561 num_sec = elf_numsections (abfd);
f3520d2f 4562 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4563 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4564 {
4565 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4566 Elf_Internal_Shdr *hdr;
4567
4568 hdr = *hdrpp;
4569 if (hdr->bfd_section != NULL
4570 && hdr->bfd_section->filepos != 0)
4571 hdr->sh_offset = hdr->bfd_section->filepos;
4572 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4573 {
4574 ((*_bfd_error_handler)
4575 (_("%B: warning: allocated section `%s' not in segment"),
4576 abfd,
4577 (hdr->bfd_section == NULL
4578 ? "*unknown*"
4579 : hdr->bfd_section->name)));
4580 if ((abfd->flags & D_PAGED) != 0)
4581 off += vma_page_aligned_bias (hdr->sh_addr, off,
4582 bed->maxpagesize);
4583 else
4584 off += vma_page_aligned_bias (hdr->sh_addr, off,
4585 hdr->sh_addralign);
4586 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4587 FALSE);
4588 }
4589 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4590 && hdr->bfd_section == NULL)
4591 || hdr == i_shdrpp[tdata->symtab_section]
4592 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4593 || hdr == i_shdrpp[tdata->strtab_section])
4594 hdr->sh_offset = -1;
4595 else
4596 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4597
4598 if (i == SHN_LORESERVE - 1)
4599 {
4600 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4601 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4602 }
4603 }
4604
252b5132
RH
4605 /* Now that we have set the section file positions, we can set up
4606 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4607 count = 0;
4608 filehdr_vaddr = 0;
4609 filehdr_paddr = 0;
4610 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4611 phdrs_paddr = 0;
4612 phdrs = elf_tdata (abfd)->phdr;
4613 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4614 m != NULL;
4615 m = m->next, p++)
4616 {
4617 ++count;
4618 if (p->p_type != PT_LOAD)
4619 continue;
4620
4621 if (m->includes_filehdr)
4622 {
4623 filehdr_vaddr = p->p_vaddr;
4624 filehdr_paddr = p->p_paddr;
4625 }
4626 if (m->includes_phdrs)
4627 {
4628 phdrs_vaddr = p->p_vaddr;
4629 phdrs_paddr = p->p_paddr;
4630 if (m->includes_filehdr)
4631 {
4632 phdrs_vaddr += bed->s->sizeof_ehdr;
4633 phdrs_paddr += bed->s->sizeof_ehdr;
4634 }
4635 }
4636 }
4637
252b5132
RH
4638 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4639 m != NULL;
4640 m = m->next, p++)
4641 {
1ea63fd2 4642 if (m->count != 0)
252b5132 4643 {
1ea63fd2
AM
4644 if (p->p_type != PT_LOAD
4645 && (p->p_type != PT_NOTE || bfd_get_format (abfd) != bfd_core))
229fcec5 4646 {
1ea63fd2
AM
4647 Elf_Internal_Shdr *hdr;
4648 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4649
4650 hdr = &elf_section_data (m->sections[m->count - 1])->this_hdr;
4651 p->p_filesz = (m->sections[m->count - 1]->filepos
4652 - m->sections[0]->filepos);
4653 if (hdr->sh_type != SHT_NOBITS)
4654 p->p_filesz += hdr->sh_size;
4655
4656 p->p_offset = m->sections[0]->filepos;
229fcec5 4657 }
252b5132 4658 }
1ea63fd2 4659 else
252b5132
RH
4660 {
4661 if (m->includes_filehdr)
4662 {
4663 p->p_vaddr = filehdr_vaddr;
4664 if (! m->p_paddr_valid)
4665 p->p_paddr = filehdr_paddr;
4666 }
4667 else if (m->includes_phdrs)
4668 {
4669 p->p_vaddr = phdrs_vaddr;
4670 if (! m->p_paddr_valid)
4671 p->p_paddr = phdrs_paddr;
4672 }
8c37241b
JJ
4673 else if (p->p_type == PT_GNU_RELRO)
4674 {
4675 Elf_Internal_Phdr *lp;
4676
4677 for (lp = phdrs; lp < phdrs + count; ++lp)
4678 {
4679 if (lp->p_type == PT_LOAD
4680 && lp->p_vaddr <= link_info->relro_end
4681 && lp->p_vaddr >= link_info->relro_start
4682 && lp->p_vaddr + lp->p_filesz
4683 >= link_info->relro_end)
4684 break;
4685 }
4686
4687 if (lp < phdrs + count
4688 && link_info->relro_end > lp->p_vaddr)
4689 {
4690 p->p_vaddr = lp->p_vaddr;
4691 p->p_paddr = lp->p_paddr;
4692 p->p_offset = lp->p_offset;
4693 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4694 p->p_memsz = p->p_filesz;
4695 p->p_align = 1;
4696 p->p_flags = (lp->p_flags & ~PF_W);
4697 }
4698 else
4699 {
4700 memset (p, 0, sizeof *p);
4701 p->p_type = PT_NULL;
4702 }
4703 }
252b5132
RH
4704 }
4705 }
4706
252b5132
RH
4707 elf_tdata (abfd)->next_file_pos = off;
4708
b34976b6 4709 return TRUE;
252b5132
RH
4710}
4711
4712/* Get the size of the program header.
4713
4714 If this is called by the linker before any of the section VMA's are set, it
4715 can't calculate the correct value for a strange memory layout. This only
4716 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4717 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4718 data segment (exclusive of .interp and .dynamic).
4719
4720 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4721 will be two segments. */
4722
4723static bfd_size_type
217aa764 4724get_program_header_size (bfd *abfd)
252b5132
RH
4725{
4726 size_t segs;
4727 asection *s;
9c5bfbb7 4728 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4729
4730 /* We can't return a different result each time we're called. */
4731 if (elf_tdata (abfd)->program_header_size != 0)
4732 return elf_tdata (abfd)->program_header_size;
4733
4734 if (elf_tdata (abfd)->segment_map != NULL)
4735 {
4736 struct elf_segment_map *m;
4737
4738 segs = 0;
4739 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4740 ++segs;
4741 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4742 return elf_tdata (abfd)->program_header_size;
4743 }
4744
4745 /* Assume we will need exactly two PT_LOAD segments: one for text
4746 and one for data. */
4747 segs = 2;
4748
4749 s = bfd_get_section_by_name (abfd, ".interp");
4750 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4751 {
4752 /* If we have a loadable interpreter section, we need a
4753 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4754 PT_PHDR segment, although that may not be true for all
252b5132
RH
4755 targets. */
4756 segs += 2;
4757 }
4758
4759 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4760 {
4761 /* We need a PT_DYNAMIC segment. */
4762 ++segs;
4763 }
4764
126495ed 4765 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4766 {
4767 /* We need a PT_GNU_EH_FRAME segment. */
4768 ++segs;
4769 }
4770
9ee5e499
JJ
4771 if (elf_tdata (abfd)->stack_flags)
4772 {
4773 /* We need a PT_GNU_STACK segment. */
4774 ++segs;
4775 }
4776
8c37241b
JJ
4777 if (elf_tdata (abfd)->relro)
4778 {
4779 /* We need a PT_GNU_RELRO segment. */
4780 ++segs;
4781 }
4782
252b5132
RH
4783 for (s = abfd->sections; s != NULL; s = s->next)
4784 {
4785 if ((s->flags & SEC_LOAD) != 0
4786 && strncmp (s->name, ".note", 5) == 0)
4787 {
4788 /* We need a PT_NOTE segment. */
4789 ++segs;
4790 }
4791 }
4792
13ae64f3
JJ
4793 for (s = abfd->sections; s != NULL; s = s->next)
4794 {
4795 if (s->flags & SEC_THREAD_LOCAL)
4796 {
4797 /* We need a PT_TLS segment. */
4798 ++segs;
4799 break;
4800 }
4801 }
4802
252b5132
RH
4803 /* Let the backend count up any program headers it might need. */
4804 if (bed->elf_backend_additional_program_headers)
4805 {
4806 int a;
4807
4808 a = (*bed->elf_backend_additional_program_headers) (abfd);
4809 if (a == -1)
4810 abort ();
4811 segs += a;
4812 }
4813
4814 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4815 return elf_tdata (abfd)->program_header_size;
4816}
4817
4818/* Work out the file positions of all the sections. This is called by
4819 _bfd_elf_compute_section_file_positions. All the section sizes and
4820 VMAs must be known before this is called.
4821
e0638f70
AM
4822 Reloc sections come in two flavours: Those processed specially as
4823 "side-channel" data attached to a section to which they apply, and
4824 those that bfd doesn't process as relocations. The latter sort are
4825 stored in a normal bfd section by bfd_section_from_shdr. We don't
4826 consider the former sort here, unless they form part of the loadable
4827 image. Reloc sections not assigned here will be handled later by
4828 assign_file_positions_for_relocs.
252b5132
RH
4829
4830 We also don't set the positions of the .symtab and .strtab here. */
4831
b34976b6 4832static bfd_boolean
c84fca4d
AO
4833assign_file_positions_except_relocs (bfd *abfd,
4834 struct bfd_link_info *link_info)
252b5132 4835{
5c182d5f
AM
4836 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4837 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4838 file_ptr off;
9c5bfbb7 4839 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4840
4841 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4842 && bfd_get_format (abfd) != bfd_core)
4843 {
5c182d5f
AM
4844 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4845 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4846 Elf_Internal_Shdr **hdrpp;
4847 unsigned int i;
4848
4849 /* Start after the ELF header. */
4850 off = i_ehdrp->e_ehsize;
4851
4852 /* We are not creating an executable, which means that we are
4853 not creating a program header, and that the actual order of
4854 the sections in the file is unimportant. */
9ad5cbcf 4855 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4856 {
4857 Elf_Internal_Shdr *hdr;
4858
4859 hdr = *hdrpp;
e0638f70
AM
4860 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4861 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4862 || i == tdata->symtab_section
4863 || i == tdata->symtab_shndx_section
252b5132
RH
4864 || i == tdata->strtab_section)
4865 {
4866 hdr->sh_offset = -1;
252b5132 4867 }
9ad5cbcf 4868 else
b34976b6 4869 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4870
9ad5cbcf
AM
4871 if (i == SHN_LORESERVE - 1)
4872 {
4873 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4874 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4875 }
252b5132
RH
4876 }
4877 }
4878 else
4879 {
f3520d2f
AM
4880 unsigned int alloc;
4881
252b5132
RH
4882 /* Assign file positions for the loaded sections based on the
4883 assignment of sections to segments. */
f3520d2f
AM
4884 if (!assign_file_positions_for_load_sections (abfd, link_info))
4885 return FALSE;
4886
4887 /* And for non-load sections. */
4888 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4889 return FALSE;
4890
4891 /* Write out the program headers. */
4892 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4893 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4894 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4895 return FALSE;
252b5132 4896
5c182d5f 4897 off = tdata->next_file_pos;
252b5132
RH
4898 }
4899
4900 /* Place the section headers. */
45d6a902 4901 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4902 i_ehdrp->e_shoff = off;
4903 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4904
5c182d5f 4905 tdata->next_file_pos = off;
252b5132 4906
b34976b6 4907 return TRUE;
252b5132
RH
4908}
4909
b34976b6 4910static bfd_boolean
217aa764 4911prep_headers (bfd *abfd)
252b5132
RH
4912{
4913 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4914 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4915 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4916 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4917 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4918
4919 i_ehdrp = elf_elfheader (abfd);
4920 i_shdrp = elf_elfsections (abfd);
4921
2b0f7ef9 4922 shstrtab = _bfd_elf_strtab_init ();
252b5132 4923 if (shstrtab == NULL)
b34976b6 4924 return FALSE;
252b5132
RH
4925
4926 elf_shstrtab (abfd) = shstrtab;
4927
4928 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4929 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4930 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4931 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4932
4933 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4934 i_ehdrp->e_ident[EI_DATA] =
4935 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4936 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4937
252b5132
RH
4938 if ((abfd->flags & DYNAMIC) != 0)
4939 i_ehdrp->e_type = ET_DYN;
4940 else if ((abfd->flags & EXEC_P) != 0)
4941 i_ehdrp->e_type = ET_EXEC;
4942 else if (bfd_get_format (abfd) == bfd_core)
4943 i_ehdrp->e_type = ET_CORE;
4944 else
4945 i_ehdrp->e_type = ET_REL;
4946
4947 switch (bfd_get_arch (abfd))
4948 {
4949 case bfd_arch_unknown:
4950 i_ehdrp->e_machine = EM_NONE;
4951 break;
aa4f99bb
AO
4952
4953 /* There used to be a long list of cases here, each one setting
4954 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4955 in the corresponding bfd definition. To avoid duplication,
4956 the switch was removed. Machines that need special handling
4957 can generally do it in elf_backend_final_write_processing(),
4958 unless they need the information earlier than the final write.
4959 Such need can generally be supplied by replacing the tests for
4960 e_machine with the conditions used to determine it. */
252b5132 4961 default:
9c5bfbb7
AM
4962 i_ehdrp->e_machine = bed->elf_machine_code;
4963 }
aa4f99bb 4964
252b5132
RH
4965 i_ehdrp->e_version = bed->s->ev_current;
4966 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4967
c044fabd 4968 /* No program header, for now. */
252b5132
RH
4969 i_ehdrp->e_phoff = 0;
4970 i_ehdrp->e_phentsize = 0;
4971 i_ehdrp->e_phnum = 0;
4972
c044fabd 4973 /* Each bfd section is section header entry. */
252b5132
RH
4974 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4975 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4976
c044fabd 4977 /* If we're building an executable, we'll need a program header table. */
252b5132 4978 if (abfd->flags & EXEC_P)
0e71e495
BE
4979 /* It all happens later. */
4980 ;
252b5132
RH
4981 else
4982 {
4983 i_ehdrp->e_phentsize = 0;
4984 i_phdrp = 0;
4985 i_ehdrp->e_phoff = 0;
4986 }
4987
4988 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4989 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4990 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4991 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4992 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4993 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4994 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4995 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4996 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4997 return FALSE;
252b5132 4998
b34976b6 4999 return TRUE;
252b5132
RH
5000}
5001
5002/* Assign file positions for all the reloc sections which are not part
5003 of the loadable file image. */
5004
5005void
217aa764 5006_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
5007{
5008 file_ptr off;
9ad5cbcf 5009 unsigned int i, num_sec;
252b5132
RH
5010 Elf_Internal_Shdr **shdrpp;
5011
5012 off = elf_tdata (abfd)->next_file_pos;
5013
9ad5cbcf
AM
5014 num_sec = elf_numsections (abfd);
5015 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5016 {
5017 Elf_Internal_Shdr *shdrp;
5018
5019 shdrp = *shdrpp;
5020 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5021 && shdrp->sh_offset == -1)
b34976b6 5022 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5023 }
5024
5025 elf_tdata (abfd)->next_file_pos = off;
5026}
5027
b34976b6 5028bfd_boolean
217aa764 5029_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5030{
9c5bfbb7 5031 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5032 Elf_Internal_Ehdr *i_ehdrp;
5033 Elf_Internal_Shdr **i_shdrp;
b34976b6 5034 bfd_boolean failed;
9ad5cbcf 5035 unsigned int count, num_sec;
252b5132
RH
5036
5037 if (! abfd->output_has_begun
217aa764 5038 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5039 return FALSE;
252b5132
RH
5040
5041 i_shdrp = elf_elfsections (abfd);
5042 i_ehdrp = elf_elfheader (abfd);
5043
b34976b6 5044 failed = FALSE;
252b5132
RH
5045 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5046 if (failed)
b34976b6 5047 return FALSE;
252b5132
RH
5048
5049 _bfd_elf_assign_file_positions_for_relocs (abfd);
5050
c044fabd 5051 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5052 num_sec = elf_numsections (abfd);
5053 for (count = 1; count < num_sec; count++)
252b5132
RH
5054 {
5055 if (bed->elf_backend_section_processing)
5056 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5057 if (i_shdrp[count]->contents)
5058 {
dc810e39
AM
5059 bfd_size_type amt = i_shdrp[count]->sh_size;
5060
252b5132 5061 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5062 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5063 return FALSE;
252b5132 5064 }
9ad5cbcf
AM
5065 if (count == SHN_LORESERVE - 1)
5066 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
5067 }
5068
5069 /* Write out the section header names. */
26ae6d5e
DJ
5070 if (elf_shstrtab (abfd) != NULL
5071 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
5072 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5073 return FALSE;
252b5132
RH
5074
5075 if (bed->elf_backend_final_write_processing)
5076 (*bed->elf_backend_final_write_processing) (abfd,
5077 elf_tdata (abfd)->linker);
5078
5079 return bed->s->write_shdrs_and_ehdr (abfd);
5080}
5081
b34976b6 5082bfd_boolean
217aa764 5083_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5084{
c044fabd 5085 /* Hopefully this can be done just like an object file. */
252b5132
RH
5086 return _bfd_elf_write_object_contents (abfd);
5087}
c044fabd
KH
5088
5089/* Given a section, search the header to find them. */
5090
252b5132 5091int
198beae2 5092_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5093{
9c5bfbb7 5094 const struct elf_backend_data *bed;
252b5132 5095 int index;
252b5132 5096
9ad5cbcf
AM
5097 if (elf_section_data (asect) != NULL
5098 && elf_section_data (asect)->this_idx != 0)
5099 return elf_section_data (asect)->this_idx;
5100
5101 if (bfd_is_abs_section (asect))
af746e92
AM
5102 index = SHN_ABS;
5103 else if (bfd_is_com_section (asect))
5104 index = SHN_COMMON;
5105 else if (bfd_is_und_section (asect))
5106 index = SHN_UNDEF;
5107 else
6dc132d9 5108 index = -1;
252b5132 5109
af746e92 5110 bed = get_elf_backend_data (abfd);
252b5132
RH
5111 if (bed->elf_backend_section_from_bfd_section)
5112 {
af746e92 5113 int retval = index;
9ad5cbcf 5114
af746e92
AM
5115 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5116 return retval;
252b5132
RH
5117 }
5118
af746e92
AM
5119 if (index == -1)
5120 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5121
af746e92 5122 return index;
252b5132
RH
5123}
5124
5125/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5126 on error. */
5127
5128int
217aa764 5129_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5130{
5131 asymbol *asym_ptr = *asym_ptr_ptr;
5132 int idx;
5133 flagword flags = asym_ptr->flags;
5134
5135 /* When gas creates relocations against local labels, it creates its
5136 own symbol for the section, but does put the symbol into the
5137 symbol chain, so udata is 0. When the linker is generating
5138 relocatable output, this section symbol may be for one of the
5139 input sections rather than the output section. */
5140 if (asym_ptr->udata.i == 0
5141 && (flags & BSF_SECTION_SYM)
5142 && asym_ptr->section)
5143 {
5372391b 5144 asection *sec;
252b5132
RH
5145 int indx;
5146
5372391b
AM
5147 sec = asym_ptr->section;
5148 if (sec->owner != abfd && sec->output_section != NULL)
5149 sec = sec->output_section;
5150 if (sec->owner == abfd
5151 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5152 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5153 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5154 }
5155
5156 idx = asym_ptr->udata.i;
5157
5158 if (idx == 0)
5159 {
5160 /* This case can occur when using --strip-symbol on a symbol
5161 which is used in a relocation entry. */
5162 (*_bfd_error_handler)
d003868e
AM
5163 (_("%B: symbol `%s' required but not present"),
5164 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5165 bfd_set_error (bfd_error_no_symbols);
5166 return -1;
5167 }
5168
5169#if DEBUG & 4
5170 {
5171 fprintf (stderr,
661a3fd4 5172 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5173 (long) asym_ptr, asym_ptr->name, idx, flags,
5174 elf_symbol_flags (flags));
5175 fflush (stderr);
5176 }
5177#endif
5178
5179 return idx;
5180}
5181
84d1d650 5182/* Rewrite program header information. */
252b5132 5183
b34976b6 5184static bfd_boolean
84d1d650 5185rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5186{
b34976b6
AM
5187 Elf_Internal_Ehdr *iehdr;
5188 struct elf_segment_map *map;
5189 struct elf_segment_map *map_first;
5190 struct elf_segment_map **pointer_to_map;
5191 Elf_Internal_Phdr *segment;
5192 asection *section;
5193 unsigned int i;
5194 unsigned int num_segments;
5195 bfd_boolean phdr_included = FALSE;
5196 bfd_vma maxpagesize;
5197 struct elf_segment_map *phdr_adjust_seg = NULL;
5198 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5199 const struct elf_backend_data *bed;
bc67d8a6 5200
caf47ea6 5201 bed = get_elf_backend_data (ibfd);
252b5132
RH
5202 iehdr = elf_elfheader (ibfd);
5203
bc67d8a6 5204 map_first = NULL;
c044fabd 5205 pointer_to_map = &map_first;
252b5132
RH
5206
5207 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5208 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5209
5210 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5211#define SEGMENT_END(segment, start) \
5212 (start + (segment->p_memsz > segment->p_filesz \
5213 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5214
eecdbe52
JJ
5215#define SECTION_SIZE(section, segment) \
5216 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5217 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5218 ? section->size : 0)
eecdbe52 5219
b34976b6 5220 /* Returns TRUE if the given section is contained within
bc67d8a6 5221 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5222#define IS_CONTAINED_BY_VMA(section, segment) \
5223 (section->vma >= segment->p_vaddr \
eecdbe52 5224 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5225 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5226
b34976b6 5227 /* Returns TRUE if the given section is contained within
bc67d8a6 5228 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5229#define IS_CONTAINED_BY_LMA(section, segment, base) \
5230 (section->lma >= base \
eecdbe52 5231 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5232 <= SEGMENT_END (segment, base)))
252b5132 5233
c044fabd 5234 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5235#define IS_COREFILE_NOTE(p, s) \
5236 (p->p_type == PT_NOTE \
5237 && bfd_get_format (ibfd) == bfd_core \
5238 && s->vma == 0 && s->lma == 0 \
5239 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5240 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5241 <= p->p_offset + p->p_filesz))
252b5132
RH
5242
5243 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5244 linker, which generates a PT_INTERP section with p_vaddr and
5245 p_memsz set to 0. */
aecc8f8a
AM
5246#define IS_SOLARIS_PT_INTERP(p, s) \
5247 (p->p_vaddr == 0 \
5248 && p->p_paddr == 0 \
5249 && p->p_memsz == 0 \
5250 && p->p_filesz > 0 \
5251 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5252 && s->size > 0 \
aecc8f8a 5253 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5254 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5255 <= p->p_offset + p->p_filesz))
5c440b1e 5256
bc67d8a6
NC
5257 /* Decide if the given section should be included in the given segment.
5258 A section will be included if:
f5ffc919
NC
5259 1. It is within the address space of the segment -- we use the LMA
5260 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5261 2. It is an allocated segment,
5262 3. There is an output section associated with it,
eecdbe52 5263 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5264 5. PT_GNU_STACK segments do not include any sections.
5265 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5266 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5267 8. PT_DYNAMIC should not contain empty sections at the beginning
5268 (with the possible exception of .dynamic). */
caf47ea6 5269#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5270 ((((segment->p_paddr \
5271 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5272 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5273 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5274 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5275 && section->output_section != NULL \
03394ac9 5276 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5277 && (segment->p_type != PT_TLS \
5278 || (section->flags & SEC_THREAD_LOCAL)) \
5279 && (segment->p_type == PT_LOAD \
5280 || segment->p_type == PT_TLS \
5281 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5282 && (segment->p_type != PT_DYNAMIC \
5283 || SECTION_SIZE (section, segment) > 0 \
5284 || (segment->p_paddr \
5285 ? segment->p_paddr != section->lma \
5286 : segment->p_vaddr != section->vma) \
5287 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5288 == 0)) \
82e51918 5289 && ! section->segment_mark)
bc67d8a6 5290
b34976b6 5291 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5292#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5293 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5294
5295 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5296 their VMA address ranges and their LMA address ranges overlap.
5297 It is possible to have overlapping VMA ranges without overlapping LMA
5298 ranges. RedBoot images for example can have both .data and .bss mapped
5299 to the same VMA range, but with the .data section mapped to a different
5300 LMA. */
aecc8f8a 5301#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5302 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5303 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5304 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5305 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5306
5307 /* Initialise the segment mark field. */
5308 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5309 section->segment_mark = FALSE;
bc67d8a6 5310
252b5132 5311 /* Scan through the segments specified in the program header
bc67d8a6 5312 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5313 in the loadable segments. These can be created by weird
aecc8f8a 5314 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5315 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5316 i < num_segments;
c044fabd 5317 i++, segment++)
252b5132 5318 {
252b5132 5319 unsigned int j;
c044fabd 5320 Elf_Internal_Phdr *segment2;
252b5132 5321
aecc8f8a
AM
5322 if (segment->p_type == PT_INTERP)
5323 for (section = ibfd->sections; section; section = section->next)
5324 if (IS_SOLARIS_PT_INTERP (segment, section))
5325 {
5326 /* Mininal change so that the normal section to segment
4cc11e76 5327 assignment code will work. */
aecc8f8a
AM
5328 segment->p_vaddr = section->vma;
5329 break;
5330 }
5331
bc67d8a6
NC
5332 if (segment->p_type != PT_LOAD)
5333 continue;
c044fabd 5334
bc67d8a6 5335 /* Determine if this segment overlaps any previous segments. */
c044fabd 5336 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5337 {
5338 bfd_signed_vma extra_length;
c044fabd 5339
bc67d8a6
NC
5340 if (segment2->p_type != PT_LOAD
5341 || ! SEGMENT_OVERLAPS (segment, segment2))
5342 continue;
c044fabd 5343
bc67d8a6
NC
5344 /* Merge the two segments together. */
5345 if (segment2->p_vaddr < segment->p_vaddr)
5346 {
c044fabd
KH
5347 /* Extend SEGMENT2 to include SEGMENT and then delete
5348 SEGMENT. */
bc67d8a6
NC
5349 extra_length =
5350 SEGMENT_END (segment, segment->p_vaddr)
5351 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5352
bc67d8a6
NC
5353 if (extra_length > 0)
5354 {
5355 segment2->p_memsz += extra_length;
5356 segment2->p_filesz += extra_length;
5357 }
c044fabd 5358
bc67d8a6 5359 segment->p_type = PT_NULL;
c044fabd 5360
bc67d8a6
NC
5361 /* Since we have deleted P we must restart the outer loop. */
5362 i = 0;
5363 segment = elf_tdata (ibfd)->phdr;
5364 break;
5365 }
5366 else
5367 {
c044fabd
KH
5368 /* Extend SEGMENT to include SEGMENT2 and then delete
5369 SEGMENT2. */
bc67d8a6
NC
5370 extra_length =
5371 SEGMENT_END (segment2, segment2->p_vaddr)
5372 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5373
bc67d8a6
NC
5374 if (extra_length > 0)
5375 {
5376 segment->p_memsz += extra_length;
5377 segment->p_filesz += extra_length;
5378 }
c044fabd 5379
bc67d8a6
NC
5380 segment2->p_type = PT_NULL;
5381 }
5382 }
5383 }
c044fabd 5384
bc67d8a6
NC
5385 /* The second scan attempts to assign sections to segments. */
5386 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5387 i < num_segments;
5388 i ++, segment ++)
5389 {
5390 unsigned int section_count;
5391 asection ** sections;
5392 asection * output_section;
5393 unsigned int isec;
5394 bfd_vma matching_lma;
5395 bfd_vma suggested_lma;
5396 unsigned int j;
dc810e39 5397 bfd_size_type amt;
bc67d8a6
NC
5398
5399 if (segment->p_type == PT_NULL)
5400 continue;
c044fabd 5401
bc67d8a6 5402 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5403 for (section = ibfd->sections, section_count = 0;
5404 section != NULL;
5405 section = section->next)
caf47ea6 5406 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5407 ++section_count;
811072d8 5408
b5f852ea
NC
5409 /* Allocate a segment map big enough to contain
5410 all of the sections we have selected. */
dc810e39
AM
5411 amt = sizeof (struct elf_segment_map);
5412 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5413 map = bfd_alloc (obfd, amt);
bc67d8a6 5414 if (map == NULL)
b34976b6 5415 return FALSE;
252b5132
RH
5416
5417 /* Initialise the fields of the segment map. Default to
5418 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5419 map->next = NULL;
5420 map->p_type = segment->p_type;
5421 map->p_flags = segment->p_flags;
5422 map->p_flags_valid = 1;
5423 map->p_paddr = segment->p_paddr;
5424 map->p_paddr_valid = 1;
252b5132
RH
5425
5426 /* Determine if this segment contains the ELF file header
5427 and if it contains the program headers themselves. */
bc67d8a6
NC
5428 map->includes_filehdr = (segment->p_offset == 0
5429 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5430
bc67d8a6 5431 map->includes_phdrs = 0;
252b5132 5432
bc67d8a6 5433 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5434 {
bc67d8a6
NC
5435 map->includes_phdrs =
5436 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5437 && (segment->p_offset + segment->p_filesz
252b5132
RH
5438 >= ((bfd_vma) iehdr->e_phoff
5439 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5440
bc67d8a6 5441 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5442 phdr_included = TRUE;
252b5132
RH
5443 }
5444
bc67d8a6 5445 if (section_count == 0)
252b5132
RH
5446 {
5447 /* Special segments, such as the PT_PHDR segment, may contain
5448 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5449 something. They are allowed by the ELF spec however, so only
5450 a warning is produced. */
bc67d8a6 5451 if (segment->p_type == PT_LOAD)
caf47ea6 5452 (*_bfd_error_handler)
d003868e
AM
5453 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5454 ibfd);
252b5132 5455
bc67d8a6 5456 map->count = 0;
c044fabd
KH
5457 *pointer_to_map = map;
5458 pointer_to_map = &map->next;
252b5132
RH
5459
5460 continue;
5461 }
5462
5463 /* Now scan the sections in the input BFD again and attempt
5464 to add their corresponding output sections to the segment map.
5465 The problem here is how to handle an output section which has
5466 been moved (ie had its LMA changed). There are four possibilities:
5467
5468 1. None of the sections have been moved.
5469 In this case we can continue to use the segment LMA from the
5470 input BFD.
5471
5472 2. All of the sections have been moved by the same amount.
5473 In this case we can change the segment's LMA to match the LMA
5474 of the first section.
5475
5476 3. Some of the sections have been moved, others have not.
5477 In this case those sections which have not been moved can be
5478 placed in the current segment which will have to have its size,
5479 and possibly its LMA changed, and a new segment or segments will
5480 have to be created to contain the other sections.
5481
b5f852ea 5482 4. The sections have been moved, but not by the same amount.
252b5132
RH
5483 In this case we can change the segment's LMA to match the LMA
5484 of the first section and we will have to create a new segment
5485 or segments to contain the other sections.
5486
5487 In order to save time, we allocate an array to hold the section
5488 pointers that we are interested in. As these sections get assigned
5489 to a segment, they are removed from this array. */
5490
0b14c2aa
L
5491 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5492 to work around this long long bug. */
d0fb9a8d 5493 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5494 if (sections == NULL)
b34976b6 5495 return FALSE;
252b5132
RH
5496
5497 /* Step One: Scan for segment vs section LMA conflicts.
5498 Also add the sections to the section array allocated above.
5499 Also add the sections to the current segment. In the common
5500 case, where the sections have not been moved, this means that
5501 we have completely filled the segment, and there is nothing
5502 more to do. */
252b5132 5503 isec = 0;
72730e0c 5504 matching_lma = 0;
252b5132
RH
5505 suggested_lma = 0;
5506
bc67d8a6
NC
5507 for (j = 0, section = ibfd->sections;
5508 section != NULL;
5509 section = section->next)
252b5132 5510 {
caf47ea6 5511 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5512 {
bc67d8a6
NC
5513 output_section = section->output_section;
5514
5515 sections[j ++] = section;
252b5132
RH
5516
5517 /* The Solaris native linker always sets p_paddr to 0.
5518 We try to catch that case here, and set it to the
5e8d7549
NC
5519 correct value. Note - some backends require that
5520 p_paddr be left as zero. */
bc67d8a6 5521 if (segment->p_paddr == 0
4455705d 5522 && segment->p_vaddr != 0
5e8d7549 5523 && (! bed->want_p_paddr_set_to_zero)
252b5132 5524 && isec == 0
bc67d8a6
NC
5525 && output_section->lma != 0
5526 && (output_section->vma == (segment->p_vaddr
5527 + (map->includes_filehdr
5528 ? iehdr->e_ehsize
5529 : 0)
5530 + (map->includes_phdrs
079e9a2f
AM
5531 ? (iehdr->e_phnum
5532 * iehdr->e_phentsize)
bc67d8a6
NC
5533 : 0))))
5534 map->p_paddr = segment->p_vaddr;
252b5132
RH
5535
5536 /* Match up the physical address of the segment with the
5537 LMA address of the output section. */
bc67d8a6 5538 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5539 || IS_COREFILE_NOTE (segment, section)
5540 || (bed->want_p_paddr_set_to_zero &&
5541 IS_CONTAINED_BY_VMA (output_section, segment))
5542 )
252b5132
RH
5543 {
5544 if (matching_lma == 0)
bc67d8a6 5545 matching_lma = output_section->lma;
252b5132
RH
5546
5547 /* We assume that if the section fits within the segment
bc67d8a6 5548 then it does not overlap any other section within that
252b5132 5549 segment. */
bc67d8a6 5550 map->sections[isec ++] = output_section;
252b5132
RH
5551 }
5552 else if (suggested_lma == 0)
bc67d8a6 5553 suggested_lma = output_section->lma;
252b5132
RH
5554 }
5555 }
5556
bc67d8a6 5557 BFD_ASSERT (j == section_count);
252b5132
RH
5558
5559 /* Step Two: Adjust the physical address of the current segment,
5560 if necessary. */
bc67d8a6 5561 if (isec == section_count)
252b5132
RH
5562 {
5563 /* All of the sections fitted within the segment as currently
5564 specified. This is the default case. Add the segment to
5565 the list of built segments and carry on to process the next
5566 program header in the input BFD. */
bc67d8a6 5567 map->count = section_count;
c044fabd
KH
5568 *pointer_to_map = map;
5569 pointer_to_map = &map->next;
252b5132
RH
5570
5571 free (sections);
5572 continue;
5573 }
252b5132
RH
5574 else
5575 {
72730e0c
AM
5576 if (matching_lma != 0)
5577 {
5578 /* At least one section fits inside the current segment.
5579 Keep it, but modify its physical address to match the
5580 LMA of the first section that fitted. */
bc67d8a6 5581 map->p_paddr = matching_lma;
72730e0c
AM
5582 }
5583 else
5584 {
5585 /* None of the sections fitted inside the current segment.
5586 Change the current segment's physical address to match
5587 the LMA of the first section. */
bc67d8a6 5588 map->p_paddr = suggested_lma;
72730e0c
AM
5589 }
5590
bc67d8a6
NC
5591 /* Offset the segment physical address from the lma
5592 to allow for space taken up by elf headers. */
5593 if (map->includes_filehdr)
5594 map->p_paddr -= iehdr->e_ehsize;
252b5132 5595
bc67d8a6
NC
5596 if (map->includes_phdrs)
5597 {
5598 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5599
5600 /* iehdr->e_phnum is just an estimate of the number
5601 of program headers that we will need. Make a note
5602 here of the number we used and the segment we chose
5603 to hold these headers, so that we can adjust the
5604 offset when we know the correct value. */
5605 phdr_adjust_num = iehdr->e_phnum;
5606 phdr_adjust_seg = map;
5607 }
252b5132
RH
5608 }
5609
5610 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5611 those that fit to the current segment and removing them from the
252b5132
RH
5612 sections array; but making sure not to leave large gaps. Once all
5613 possible sections have been assigned to the current segment it is
5614 added to the list of built segments and if sections still remain
5615 to be assigned, a new segment is constructed before repeating
5616 the loop. */
5617 isec = 0;
5618 do
5619 {
bc67d8a6 5620 map->count = 0;
252b5132
RH
5621 suggested_lma = 0;
5622
5623 /* Fill the current segment with sections that fit. */
bc67d8a6 5624 for (j = 0; j < section_count; j++)
252b5132 5625 {
bc67d8a6 5626 section = sections[j];
252b5132 5627
bc67d8a6 5628 if (section == NULL)
252b5132
RH
5629 continue;
5630
bc67d8a6 5631 output_section = section->output_section;
252b5132 5632
bc67d8a6 5633 BFD_ASSERT (output_section != NULL);
c044fabd 5634
bc67d8a6
NC
5635 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5636 || IS_COREFILE_NOTE (segment, section))
252b5132 5637 {
bc67d8a6 5638 if (map->count == 0)
252b5132
RH
5639 {
5640 /* If the first section in a segment does not start at
bc67d8a6
NC
5641 the beginning of the segment, then something is
5642 wrong. */
5643 if (output_section->lma !=
5644 (map->p_paddr
5645 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5646 + (map->includes_phdrs
5647 ? iehdr->e_phnum * iehdr->e_phentsize
5648 : 0)))
252b5132
RH
5649 abort ();
5650 }
5651 else
5652 {
5653 asection * prev_sec;
252b5132 5654
bc67d8a6 5655 prev_sec = map->sections[map->count - 1];
252b5132
RH
5656
5657 /* If the gap between the end of the previous section
bc67d8a6
NC
5658 and the start of this section is more than
5659 maxpagesize then we need to start a new segment. */
eea6121a 5660 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5661 maxpagesize)
caf47ea6 5662 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5663 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5664 > output_section->lma))
252b5132
RH
5665 {
5666 if (suggested_lma == 0)
bc67d8a6 5667 suggested_lma = output_section->lma;
252b5132
RH
5668
5669 continue;
5670 }
5671 }
5672
bc67d8a6 5673 map->sections[map->count++] = output_section;
252b5132
RH
5674 ++isec;
5675 sections[j] = NULL;
b34976b6 5676 section->segment_mark = TRUE;
252b5132
RH
5677 }
5678 else if (suggested_lma == 0)
bc67d8a6 5679 suggested_lma = output_section->lma;
252b5132
RH
5680 }
5681
bc67d8a6 5682 BFD_ASSERT (map->count > 0);
252b5132
RH
5683
5684 /* Add the current segment to the list of built segments. */
c044fabd
KH
5685 *pointer_to_map = map;
5686 pointer_to_map = &map->next;
252b5132 5687
bc67d8a6 5688 if (isec < section_count)
252b5132
RH
5689 {
5690 /* We still have not allocated all of the sections to
5691 segments. Create a new segment here, initialise it
5692 and carry on looping. */
dc810e39
AM
5693 amt = sizeof (struct elf_segment_map);
5694 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5695 map = bfd_alloc (obfd, amt);
bc67d8a6 5696 if (map == NULL)
5ed6aba4
NC
5697 {
5698 free (sections);
5699 return FALSE;
5700 }
252b5132
RH
5701
5702 /* Initialise the fields of the segment map. Set the physical
5703 physical address to the LMA of the first section that has
5704 not yet been assigned. */
bc67d8a6
NC
5705 map->next = NULL;
5706 map->p_type = segment->p_type;
5707 map->p_flags = segment->p_flags;
5708 map->p_flags_valid = 1;
5709 map->p_paddr = suggested_lma;
5710 map->p_paddr_valid = 1;
5711 map->includes_filehdr = 0;
5712 map->includes_phdrs = 0;
252b5132
RH
5713 }
5714 }
bc67d8a6 5715 while (isec < section_count);
252b5132
RH
5716
5717 free (sections);
5718 }
5719
5720 /* The Solaris linker creates program headers in which all the
5721 p_paddr fields are zero. When we try to objcopy or strip such a
5722 file, we get confused. Check for this case, and if we find it
5723 reset the p_paddr_valid fields. */
bc67d8a6
NC
5724 for (map = map_first; map != NULL; map = map->next)
5725 if (map->p_paddr != 0)
252b5132 5726 break;
bc67d8a6 5727 if (map == NULL)
b5f852ea
NC
5728 for (map = map_first; map != NULL; map = map->next)
5729 map->p_paddr_valid = 0;
252b5132 5730
bc67d8a6
NC
5731 elf_tdata (obfd)->segment_map = map_first;
5732
5733 /* If we had to estimate the number of program headers that were
9ad5cbcf 5734 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5735 the offset if necessary. */
5736 if (phdr_adjust_seg != NULL)
5737 {
5738 unsigned int count;
c044fabd 5739
bc67d8a6 5740 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5741 count++;
252b5132 5742
bc67d8a6
NC
5743 if (count > phdr_adjust_num)
5744 phdr_adjust_seg->p_paddr
5745 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5746 }
c044fabd 5747
bc67d8a6 5748#undef SEGMENT_END
eecdbe52 5749#undef SECTION_SIZE
bc67d8a6
NC
5750#undef IS_CONTAINED_BY_VMA
5751#undef IS_CONTAINED_BY_LMA
252b5132 5752#undef IS_COREFILE_NOTE
bc67d8a6
NC
5753#undef IS_SOLARIS_PT_INTERP
5754#undef INCLUDE_SECTION_IN_SEGMENT
5755#undef SEGMENT_AFTER_SEGMENT
5756#undef SEGMENT_OVERLAPS
b34976b6 5757 return TRUE;
252b5132
RH
5758}
5759
84d1d650
L
5760/* Copy ELF program header information. */
5761
5762static bfd_boolean
5763copy_elf_program_header (bfd *ibfd, bfd *obfd)
5764{
5765 Elf_Internal_Ehdr *iehdr;
5766 struct elf_segment_map *map;
5767 struct elf_segment_map *map_first;
5768 struct elf_segment_map **pointer_to_map;
5769 Elf_Internal_Phdr *segment;
5770 unsigned int i;
5771 unsigned int num_segments;
5772 bfd_boolean phdr_included = FALSE;
5773
5774 iehdr = elf_elfheader (ibfd);
5775
5776 map_first = NULL;
5777 pointer_to_map = &map_first;
5778
5779 num_segments = elf_elfheader (ibfd)->e_phnum;
5780 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5781 i < num_segments;
5782 i++, segment++)
5783 {
5784 asection *section;
5785 unsigned int section_count;
5786 bfd_size_type amt;
5787 Elf_Internal_Shdr *this_hdr;
5788
5789 /* FIXME: Do we need to copy PT_NULL segment? */
5790 if (segment->p_type == PT_NULL)
5791 continue;
5792
5793 /* Compute how many sections are in this segment. */
5794 for (section = ibfd->sections, section_count = 0;
5795 section != NULL;
5796 section = section->next)
5797 {
5798 this_hdr = &(elf_section_data(section)->this_hdr);
5799 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5800 section_count++;
5801 }
5802
5803 /* Allocate a segment map big enough to contain
5804 all of the sections we have selected. */
5805 amt = sizeof (struct elf_segment_map);
5806 if (section_count != 0)
5807 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5808 map = bfd_alloc (obfd, amt);
5809 if (map == NULL)
5810 return FALSE;
5811
5812 /* Initialize the fields of the output segment map with the
5813 input segment. */
5814 map->next = NULL;
5815 map->p_type = segment->p_type;
5816 map->p_flags = segment->p_flags;
5817 map->p_flags_valid = 1;
5818 map->p_paddr = segment->p_paddr;
5819 map->p_paddr_valid = 1;
3f570048
AM
5820 map->p_align = segment->p_align;
5821 map->p_align_valid = 1;
84d1d650
L
5822
5823 /* Determine if this segment contains the ELF file header
5824 and if it contains the program headers themselves. */
5825 map->includes_filehdr = (segment->p_offset == 0
5826 && segment->p_filesz >= iehdr->e_ehsize);
5827
5828 map->includes_phdrs = 0;
5829 if (! phdr_included || segment->p_type != PT_LOAD)
5830 {
5831 map->includes_phdrs =
5832 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5833 && (segment->p_offset + segment->p_filesz
5834 >= ((bfd_vma) iehdr->e_phoff
5835 + iehdr->e_phnum * iehdr->e_phentsize)));
5836
5837 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5838 phdr_included = TRUE;
5839 }
5840
5841 if (section_count != 0)
5842 {
5843 unsigned int isec = 0;
5844
5845 for (section = ibfd->sections;
5846 section != NULL;
5847 section = section->next)
5848 {
5849 this_hdr = &(elf_section_data(section)->this_hdr);
5850 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5851 map->sections[isec++] = section->output_section;
5852 }
5853 }
5854
5855 map->count = section_count;
5856 *pointer_to_map = map;
5857 pointer_to_map = &map->next;
5858 }
5859
5860 elf_tdata (obfd)->segment_map = map_first;
5861 return TRUE;
5862}
5863
5864/* Copy private BFD data. This copies or rewrites ELF program header
5865 information. */
5866
5867static bfd_boolean
5868copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5869{
84d1d650
L
5870 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5871 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5872 return TRUE;
5873
5874 if (elf_tdata (ibfd)->phdr == NULL)
5875 return TRUE;
5876
5877 if (ibfd->xvec == obfd->xvec)
5878 {
5879 /* Check if any sections in the input BFD covered by ELF program
5880 header are changed. */
d55ce4e2 5881 Elf_Internal_Phdr *segment;
84d1d650
L
5882 asection *section, *osec;
5883 unsigned int i, num_segments;
5884 Elf_Internal_Shdr *this_hdr;
5885
5886 /* Initialize the segment mark field. */
5887 for (section = obfd->sections; section != NULL;
5888 section = section->next)
5889 section->segment_mark = FALSE;
5890
5891 num_segments = elf_elfheader (ibfd)->e_phnum;
5892 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5893 i < num_segments;
5894 i++, segment++)
5895 {
5896 for (section = ibfd->sections;
5897 section != NULL; section = section->next)
5898 {
5899 /* We mark the output section so that we know it comes
5900 from the input BFD. */
5901 osec = section->output_section;
5902 if (osec)
5903 osec->segment_mark = TRUE;
5904
5905 /* Check if this section is covered by the segment. */
5906 this_hdr = &(elf_section_data(section)->this_hdr);
5907 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5908 {
5909 /* FIXME: Check if its output section is changed or
5910 removed. What else do we need to check? */
5911 if (osec == NULL
5912 || section->flags != osec->flags
5913 || section->lma != osec->lma
5914 || section->vma != osec->vma
5915 || section->size != osec->size
5916 || section->rawsize != osec->rawsize
5917 || section->alignment_power != osec->alignment_power)
5918 goto rewrite;
5919 }
5920 }
5921 }
5922
5923 /* Check to see if any output section doesn't come from the
5924 input BFD. */
5925 for (section = obfd->sections; section != NULL;
5926 section = section->next)
5927 {
5928 if (section->segment_mark == FALSE)
5929 goto rewrite;
5930 else
5931 section->segment_mark = FALSE;
5932 }
5933
5934 return copy_elf_program_header (ibfd, obfd);
5935 }
5936
5937rewrite:
5938 return rewrite_elf_program_header (ibfd, obfd);
5939}
5940
ccd2ec6a
L
5941/* Initialize private output section information from input section. */
5942
5943bfd_boolean
5944_bfd_elf_init_private_section_data (bfd *ibfd,
5945 asection *isec,
5946 bfd *obfd,
5947 asection *osec,
5948 struct bfd_link_info *link_info)
5949
5950{
5951 Elf_Internal_Shdr *ihdr, *ohdr;
5952 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
5953
5954 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5955 || obfd->xvec->flavour != bfd_target_elf_flavour)
5956 return TRUE;
5957
e843e0f8
L
5958 /* Don't copy the output ELF section type from input if the
5959 output BFD section flags has been set to something different.
5960 elf_fake_sections will set ELF section type based on BFD
5961 section flags. */
8b95791f
AM
5962 if (osec->flags == isec->flags
5963 || (osec->flags == 0 && elf_section_type (osec) == SHT_NULL))
ccd2ec6a
L
5964 elf_section_type (osec) = elf_section_type (isec);
5965
5966 /* Set things up for objcopy and relocatable link. The output
5967 SHT_GROUP section will have its elf_next_in_group pointing back
5968 to the input group members. Ignore linker created group section.
5969 See elfNN_ia64_object_p in elfxx-ia64.c. */
5970
5971 if (need_group)
5972 {
5973 if (elf_sec_group (isec) == NULL
5974 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5975 {
5976 if (elf_section_flags (isec) & SHF_GROUP)
5977 elf_section_flags (osec) |= SHF_GROUP;
5978 elf_next_in_group (osec) = elf_next_in_group (isec);
5979 elf_group_name (osec) = elf_group_name (isec);
5980 }
5981 }
5982
5983 ihdr = &elf_section_data (isec)->this_hdr;
5984
5985 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
5986 don't use the output section of the linked-to section since it
5987 may be NULL at this point. */
5988 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
5989 {
5990 ohdr = &elf_section_data (osec)->this_hdr;
5991 ohdr->sh_flags |= SHF_LINK_ORDER;
5992 elf_linked_to_section (osec) = elf_linked_to_section (isec);
5993 }
5994
5995 osec->use_rela_p = isec->use_rela_p;
5996
5997 return TRUE;
5998}
5999
252b5132
RH
6000/* Copy private section information. This copies over the entsize
6001 field, and sometimes the info field. */
6002
b34976b6 6003bfd_boolean
217aa764
AM
6004_bfd_elf_copy_private_section_data (bfd *ibfd,
6005 asection *isec,
6006 bfd *obfd,
6007 asection *osec)
252b5132
RH
6008{
6009 Elf_Internal_Shdr *ihdr, *ohdr;
6010
6011 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6012 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6013 return TRUE;
252b5132 6014
252b5132
RH
6015 ihdr = &elf_section_data (isec)->this_hdr;
6016 ohdr = &elf_section_data (osec)->this_hdr;
6017
6018 ohdr->sh_entsize = ihdr->sh_entsize;
6019
6020 if (ihdr->sh_type == SHT_SYMTAB
6021 || ihdr->sh_type == SHT_DYNSYM
6022 || ihdr->sh_type == SHT_GNU_verneed
6023 || ihdr->sh_type == SHT_GNU_verdef)
6024 ohdr->sh_info = ihdr->sh_info;
6025
ccd2ec6a
L
6026 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6027 NULL);
252b5132
RH
6028}
6029
80fccad2
BW
6030/* Copy private header information. */
6031
6032bfd_boolean
6033_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6034{
6035 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6036 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6037 return TRUE;
6038
6039 /* Copy over private BFD data if it has not already been copied.
6040 This must be done here, rather than in the copy_private_bfd_data
6041 entry point, because the latter is called after the section
6042 contents have been set, which means that the program headers have
6043 already been worked out. */
6044 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6045 {
6046 if (! copy_private_bfd_data (ibfd, obfd))
6047 return FALSE;
6048 }
6049
6050 return TRUE;
6051}
6052
252b5132
RH
6053/* Copy private symbol information. If this symbol is in a section
6054 which we did not map into a BFD section, try to map the section
6055 index correctly. We use special macro definitions for the mapped
6056 section indices; these definitions are interpreted by the
6057 swap_out_syms function. */
6058
9ad5cbcf
AM
6059#define MAP_ONESYMTAB (SHN_HIOS + 1)
6060#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6061#define MAP_STRTAB (SHN_HIOS + 3)
6062#define MAP_SHSTRTAB (SHN_HIOS + 4)
6063#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6064
b34976b6 6065bfd_boolean
217aa764
AM
6066_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6067 asymbol *isymarg,
6068 bfd *obfd,
6069 asymbol *osymarg)
252b5132
RH
6070{
6071 elf_symbol_type *isym, *osym;
6072
6073 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6074 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6075 return TRUE;
252b5132
RH
6076
6077 isym = elf_symbol_from (ibfd, isymarg);
6078 osym = elf_symbol_from (obfd, osymarg);
6079
6080 if (isym != NULL
6081 && osym != NULL
6082 && bfd_is_abs_section (isym->symbol.section))
6083 {
6084 unsigned int shndx;
6085
6086 shndx = isym->internal_elf_sym.st_shndx;
6087 if (shndx == elf_onesymtab (ibfd))
6088 shndx = MAP_ONESYMTAB;
6089 else if (shndx == elf_dynsymtab (ibfd))
6090 shndx = MAP_DYNSYMTAB;
6091 else if (shndx == elf_tdata (ibfd)->strtab_section)
6092 shndx = MAP_STRTAB;
6093 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6094 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6095 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6096 shndx = MAP_SYM_SHNDX;
252b5132
RH
6097 osym->internal_elf_sym.st_shndx = shndx;
6098 }
6099
b34976b6 6100 return TRUE;
252b5132
RH
6101}
6102
6103/* Swap out the symbols. */
6104
b34976b6 6105static bfd_boolean
217aa764
AM
6106swap_out_syms (bfd *abfd,
6107 struct bfd_strtab_hash **sttp,
6108 int relocatable_p)
252b5132 6109{
9c5bfbb7 6110 const struct elf_backend_data *bed;
079e9a2f
AM
6111 int symcount;
6112 asymbol **syms;
6113 struct bfd_strtab_hash *stt;
6114 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6115 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6116 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6117 bfd_byte *outbound_syms;
6118 bfd_byte *outbound_shndx;
079e9a2f
AM
6119 int idx;
6120 bfd_size_type amt;
174fd7f9 6121 bfd_boolean name_local_sections;
252b5132
RH
6122
6123 if (!elf_map_symbols (abfd))
b34976b6 6124 return FALSE;
252b5132 6125
c044fabd 6126 /* Dump out the symtabs. */
079e9a2f
AM
6127 stt = _bfd_elf_stringtab_init ();
6128 if (stt == NULL)
b34976b6 6129 return FALSE;
252b5132 6130
079e9a2f
AM
6131 bed = get_elf_backend_data (abfd);
6132 symcount = bfd_get_symcount (abfd);
6133 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6134 symtab_hdr->sh_type = SHT_SYMTAB;
6135 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6136 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6137 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 6138 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
6139
6140 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6141 symstrtab_hdr->sh_type = SHT_STRTAB;
6142
d0fb9a8d 6143 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 6144 if (outbound_syms == NULL)
5ed6aba4
NC
6145 {
6146 _bfd_stringtab_free (stt);
6147 return FALSE;
6148 }
217aa764 6149 symtab_hdr->contents = outbound_syms;
252b5132 6150
9ad5cbcf
AM
6151 outbound_shndx = NULL;
6152 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6153 if (symtab_shndx_hdr->sh_name != 0)
6154 {
6155 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
6156 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
6157 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6158 if (outbound_shndx == NULL)
5ed6aba4
NC
6159 {
6160 _bfd_stringtab_free (stt);
6161 return FALSE;
6162 }
6163
9ad5cbcf
AM
6164 symtab_shndx_hdr->contents = outbound_shndx;
6165 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6166 symtab_shndx_hdr->sh_size = amt;
6167 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6168 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6169 }
6170
589e6347 6171 /* Now generate the data (for "contents"). */
079e9a2f
AM
6172 {
6173 /* Fill in zeroth symbol and swap it out. */
6174 Elf_Internal_Sym sym;
6175 sym.st_name = 0;
6176 sym.st_value = 0;
6177 sym.st_size = 0;
6178 sym.st_info = 0;
6179 sym.st_other = 0;
6180 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6181 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6182 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6183 if (outbound_shndx != NULL)
6184 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6185 }
252b5132 6186
174fd7f9
RS
6187 name_local_sections
6188 = (bed->elf_backend_name_local_section_symbols
6189 && bed->elf_backend_name_local_section_symbols (abfd));
6190
079e9a2f
AM
6191 syms = bfd_get_outsymbols (abfd);
6192 for (idx = 0; idx < symcount; idx++)
252b5132 6193 {
252b5132 6194 Elf_Internal_Sym sym;
079e9a2f
AM
6195 bfd_vma value = syms[idx]->value;
6196 elf_symbol_type *type_ptr;
6197 flagword flags = syms[idx]->flags;
6198 int type;
252b5132 6199
174fd7f9
RS
6200 if (!name_local_sections
6201 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6202 {
6203 /* Local section symbols have no name. */
6204 sym.st_name = 0;
6205 }
6206 else
6207 {
6208 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6209 syms[idx]->name,
b34976b6 6210 TRUE, FALSE);
079e9a2f 6211 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6212 {
6213 _bfd_stringtab_free (stt);
6214 return FALSE;
6215 }
079e9a2f 6216 }
252b5132 6217
079e9a2f 6218 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6219
079e9a2f
AM
6220 if ((flags & BSF_SECTION_SYM) == 0
6221 && bfd_is_com_section (syms[idx]->section))
6222 {
6223 /* ELF common symbols put the alignment into the `value' field,
6224 and the size into the `size' field. This is backwards from
6225 how BFD handles it, so reverse it here. */
6226 sym.st_size = value;
6227 if (type_ptr == NULL
6228 || type_ptr->internal_elf_sym.st_value == 0)
6229 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6230 else
6231 sym.st_value = type_ptr->internal_elf_sym.st_value;
6232 sym.st_shndx = _bfd_elf_section_from_bfd_section
6233 (abfd, syms[idx]->section);
6234 }
6235 else
6236 {
6237 asection *sec = syms[idx]->section;
6238 int shndx;
252b5132 6239
079e9a2f
AM
6240 if (sec->output_section)
6241 {
6242 value += sec->output_offset;
6243 sec = sec->output_section;
6244 }
589e6347 6245
079e9a2f
AM
6246 /* Don't add in the section vma for relocatable output. */
6247 if (! relocatable_p)
6248 value += sec->vma;
6249 sym.st_value = value;
6250 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6251
6252 if (bfd_is_abs_section (sec)
6253 && type_ptr != NULL
6254 && type_ptr->internal_elf_sym.st_shndx != 0)
6255 {
6256 /* This symbol is in a real ELF section which we did
6257 not create as a BFD section. Undo the mapping done
6258 by copy_private_symbol_data. */
6259 shndx = type_ptr->internal_elf_sym.st_shndx;
6260 switch (shndx)
6261 {
6262 case MAP_ONESYMTAB:
6263 shndx = elf_onesymtab (abfd);
6264 break;
6265 case MAP_DYNSYMTAB:
6266 shndx = elf_dynsymtab (abfd);
6267 break;
6268 case MAP_STRTAB:
6269 shndx = elf_tdata (abfd)->strtab_section;
6270 break;
6271 case MAP_SHSTRTAB:
6272 shndx = elf_tdata (abfd)->shstrtab_section;
6273 break;
9ad5cbcf
AM
6274 case MAP_SYM_SHNDX:
6275 shndx = elf_tdata (abfd)->symtab_shndx_section;
6276 break;
079e9a2f
AM
6277 default:
6278 break;
6279 }
6280 }
6281 else
6282 {
6283 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6284
079e9a2f
AM
6285 if (shndx == -1)
6286 {
6287 asection *sec2;
6288
6289 /* Writing this would be a hell of a lot easier if
6290 we had some decent documentation on bfd, and
6291 knew what to expect of the library, and what to
6292 demand of applications. For example, it
6293 appears that `objcopy' might not set the
6294 section of a symbol to be a section that is
6295 actually in the output file. */
6296 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6297 if (sec2 == NULL)
6298 {
6299 _bfd_error_handler (_("\
6300Unable to find equivalent output section for symbol '%s' from section '%s'"),
6301 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6302 sec->name);
811072d8 6303 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6304 _bfd_stringtab_free (stt);
589e6347
NC
6305 return FALSE;
6306 }
811072d8 6307
079e9a2f
AM
6308 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
6309 BFD_ASSERT (shndx != -1);
6310 }
6311 }
252b5132 6312
079e9a2f
AM
6313 sym.st_shndx = shndx;
6314 }
252b5132 6315
13ae64f3
JJ
6316 if ((flags & BSF_THREAD_LOCAL) != 0)
6317 type = STT_TLS;
6318 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6319 type = STT_FUNC;
6320 else if ((flags & BSF_OBJECT) != 0)
6321 type = STT_OBJECT;
6322 else
6323 type = STT_NOTYPE;
252b5132 6324
13ae64f3
JJ
6325 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6326 type = STT_TLS;
6327
589e6347 6328 /* Processor-specific types. */
079e9a2f
AM
6329 if (type_ptr != NULL
6330 && bed->elf_backend_get_symbol_type)
6331 type = ((*bed->elf_backend_get_symbol_type)
6332 (&type_ptr->internal_elf_sym, type));
252b5132 6333
079e9a2f
AM
6334 if (flags & BSF_SECTION_SYM)
6335 {
6336 if (flags & BSF_GLOBAL)
6337 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6338 else
6339 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6340 }
6341 else if (bfd_is_com_section (syms[idx]->section))
6342 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
6343 else if (bfd_is_und_section (syms[idx]->section))
6344 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6345 ? STB_WEAK
6346 : STB_GLOBAL),
6347 type);
6348 else if (flags & BSF_FILE)
6349 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6350 else
6351 {
6352 int bind = STB_LOCAL;
252b5132 6353
079e9a2f
AM
6354 if (flags & BSF_LOCAL)
6355 bind = STB_LOCAL;
6356 else if (flags & BSF_WEAK)
6357 bind = STB_WEAK;
6358 else if (flags & BSF_GLOBAL)
6359 bind = STB_GLOBAL;
252b5132 6360
079e9a2f
AM
6361 sym.st_info = ELF_ST_INFO (bind, type);
6362 }
252b5132 6363
079e9a2f
AM
6364 if (type_ptr != NULL)
6365 sym.st_other = type_ptr->internal_elf_sym.st_other;
6366 else
6367 sym.st_other = 0;
252b5132 6368
9ad5cbcf 6369 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6370 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6371 if (outbound_shndx != NULL)
6372 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6373 }
252b5132 6374
079e9a2f
AM
6375 *sttp = stt;
6376 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6377 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6378
079e9a2f
AM
6379 symstrtab_hdr->sh_flags = 0;
6380 symstrtab_hdr->sh_addr = 0;
6381 symstrtab_hdr->sh_entsize = 0;
6382 symstrtab_hdr->sh_link = 0;
6383 symstrtab_hdr->sh_info = 0;
6384 symstrtab_hdr->sh_addralign = 1;
252b5132 6385
b34976b6 6386 return TRUE;
252b5132
RH
6387}
6388
6389/* Return the number of bytes required to hold the symtab vector.
6390
6391 Note that we base it on the count plus 1, since we will null terminate
6392 the vector allocated based on this size. However, the ELF symbol table
6393 always has a dummy entry as symbol #0, so it ends up even. */
6394
6395long
217aa764 6396_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6397{
6398 long symcount;
6399 long symtab_size;
6400 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6401
6402 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6403 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6404 if (symcount > 0)
6405 symtab_size -= sizeof (asymbol *);
252b5132
RH
6406
6407 return symtab_size;
6408}
6409
6410long
217aa764 6411_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6412{
6413 long symcount;
6414 long symtab_size;
6415 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6416
6417 if (elf_dynsymtab (abfd) == 0)
6418 {
6419 bfd_set_error (bfd_error_invalid_operation);
6420 return -1;
6421 }
6422
6423 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6424 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6425 if (symcount > 0)
6426 symtab_size -= sizeof (asymbol *);
252b5132
RH
6427
6428 return symtab_size;
6429}
6430
6431long
217aa764
AM
6432_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6433 sec_ptr asect)
252b5132
RH
6434{
6435 return (asect->reloc_count + 1) * sizeof (arelent *);
6436}
6437
6438/* Canonicalize the relocs. */
6439
6440long
217aa764
AM
6441_bfd_elf_canonicalize_reloc (bfd *abfd,
6442 sec_ptr section,
6443 arelent **relptr,
6444 asymbol **symbols)
252b5132
RH
6445{
6446 arelent *tblptr;
6447 unsigned int i;
9c5bfbb7 6448 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6449
b34976b6 6450 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6451 return -1;
6452
6453 tblptr = section->relocation;
6454 for (i = 0; i < section->reloc_count; i++)
6455 *relptr++ = tblptr++;
6456
6457 *relptr = NULL;
6458
6459 return section->reloc_count;
6460}
6461
6462long
6cee3f79 6463_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6464{
9c5bfbb7 6465 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6466 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6467
6468 if (symcount >= 0)
6469 bfd_get_symcount (abfd) = symcount;
6470 return symcount;
6471}
6472
6473long
217aa764
AM
6474_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6475 asymbol **allocation)
252b5132 6476{
9c5bfbb7 6477 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6478 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6479
6480 if (symcount >= 0)
6481 bfd_get_dynamic_symcount (abfd) = symcount;
6482 return symcount;
252b5132
RH
6483}
6484
8615f3f2
AM
6485/* Return the size required for the dynamic reloc entries. Any loadable
6486 section that was actually installed in the BFD, and has type SHT_REL
6487 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6488 dynamic reloc section. */
252b5132
RH
6489
6490long
217aa764 6491_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6492{
6493 long ret;
6494 asection *s;
6495
6496 if (elf_dynsymtab (abfd) == 0)
6497 {
6498 bfd_set_error (bfd_error_invalid_operation);
6499 return -1;
6500 }
6501
6502 ret = sizeof (arelent *);
6503 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6504 if ((s->flags & SEC_LOAD) != 0
6505 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6506 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6507 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6508 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6509 * sizeof (arelent *));
6510
6511 return ret;
6512}
6513
8615f3f2
AM
6514/* Canonicalize the dynamic relocation entries. Note that we return the
6515 dynamic relocations as a single block, although they are actually
6516 associated with particular sections; the interface, which was
6517 designed for SunOS style shared libraries, expects that there is only
6518 one set of dynamic relocs. Any loadable section that was actually
6519 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6520 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6521
6522long
217aa764
AM
6523_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6524 arelent **storage,
6525 asymbol **syms)
252b5132 6526{
217aa764 6527 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6528 asection *s;
6529 long ret;
6530
6531 if (elf_dynsymtab (abfd) == 0)
6532 {
6533 bfd_set_error (bfd_error_invalid_operation);
6534 return -1;
6535 }
6536
6537 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6538 ret = 0;
6539 for (s = abfd->sections; s != NULL; s = s->next)
6540 {
8615f3f2
AM
6541 if ((s->flags & SEC_LOAD) != 0
6542 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6543 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6544 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6545 {
6546 arelent *p;
6547 long count, i;
6548
b34976b6 6549 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6550 return -1;
eea6121a 6551 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6552 p = s->relocation;
6553 for (i = 0; i < count; i++)
6554 *storage++ = p++;
6555 ret += count;
6556 }
6557 }
6558
6559 *storage = NULL;
6560
6561 return ret;
6562}
6563\f
6564/* Read in the version information. */
6565
b34976b6 6566bfd_boolean
fc0e6df6 6567_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6568{
6569 bfd_byte *contents = NULL;
fc0e6df6
PB
6570 unsigned int freeidx = 0;
6571
6572 if (elf_dynverref (abfd) != 0)
6573 {
6574 Elf_Internal_Shdr *hdr;
6575 Elf_External_Verneed *everneed;
6576 Elf_Internal_Verneed *iverneed;
6577 unsigned int i;
d0fb9a8d 6578 bfd_byte *contents_end;
fc0e6df6
PB
6579
6580 hdr = &elf_tdata (abfd)->dynverref_hdr;
6581
d0fb9a8d
JJ
6582 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6583 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6584 if (elf_tdata (abfd)->verref == NULL)
6585 goto error_return;
6586
6587 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6588
6589 contents = bfd_malloc (hdr->sh_size);
6590 if (contents == NULL)
d0fb9a8d
JJ
6591 {
6592error_return_verref:
6593 elf_tdata (abfd)->verref = NULL;
6594 elf_tdata (abfd)->cverrefs = 0;
6595 goto error_return;
6596 }
fc0e6df6
PB
6597 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6598 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6599 goto error_return_verref;
fc0e6df6 6600
d0fb9a8d
JJ
6601 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6602 goto error_return_verref;
6603
6604 BFD_ASSERT (sizeof (Elf_External_Verneed)
6605 == sizeof (Elf_External_Vernaux));
6606 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6607 everneed = (Elf_External_Verneed *) contents;
6608 iverneed = elf_tdata (abfd)->verref;
6609 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6610 {
6611 Elf_External_Vernaux *evernaux;
6612 Elf_Internal_Vernaux *ivernaux;
6613 unsigned int j;
6614
6615 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6616
6617 iverneed->vn_bfd = abfd;
6618
6619 iverneed->vn_filename =
6620 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6621 iverneed->vn_file);
6622 if (iverneed->vn_filename == NULL)
d0fb9a8d 6623 goto error_return_verref;
fc0e6df6 6624
d0fb9a8d
JJ
6625 if (iverneed->vn_cnt == 0)
6626 iverneed->vn_auxptr = NULL;
6627 else
6628 {
6629 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6630 sizeof (Elf_Internal_Vernaux));
6631 if (iverneed->vn_auxptr == NULL)
6632 goto error_return_verref;
6633 }
6634
6635 if (iverneed->vn_aux
6636 > (size_t) (contents_end - (bfd_byte *) everneed))
6637 goto error_return_verref;
fc0e6df6
PB
6638
6639 evernaux = ((Elf_External_Vernaux *)
6640 ((bfd_byte *) everneed + iverneed->vn_aux));
6641 ivernaux = iverneed->vn_auxptr;
6642 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6643 {
6644 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6645
6646 ivernaux->vna_nodename =
6647 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6648 ivernaux->vna_name);
6649 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6650 goto error_return_verref;
fc0e6df6
PB
6651
6652 if (j + 1 < iverneed->vn_cnt)
6653 ivernaux->vna_nextptr = ivernaux + 1;
6654 else
6655 ivernaux->vna_nextptr = NULL;
6656
d0fb9a8d
JJ
6657 if (ivernaux->vna_next
6658 > (size_t) (contents_end - (bfd_byte *) evernaux))
6659 goto error_return_verref;
6660
fc0e6df6
PB
6661 evernaux = ((Elf_External_Vernaux *)
6662 ((bfd_byte *) evernaux + ivernaux->vna_next));
6663
6664 if (ivernaux->vna_other > freeidx)
6665 freeidx = ivernaux->vna_other;
6666 }
6667
6668 if (i + 1 < hdr->sh_info)
6669 iverneed->vn_nextref = iverneed + 1;
6670 else
6671 iverneed->vn_nextref = NULL;
6672
d0fb9a8d
JJ
6673 if (iverneed->vn_next
6674 > (size_t) (contents_end - (bfd_byte *) everneed))
6675 goto error_return_verref;
6676
fc0e6df6
PB
6677 everneed = ((Elf_External_Verneed *)
6678 ((bfd_byte *) everneed + iverneed->vn_next));
6679 }
6680
6681 free (contents);
6682 contents = NULL;
6683 }
252b5132
RH
6684
6685 if (elf_dynverdef (abfd) != 0)
6686 {
6687 Elf_Internal_Shdr *hdr;
6688 Elf_External_Verdef *everdef;
6689 Elf_Internal_Verdef *iverdef;
f631889e
UD
6690 Elf_Internal_Verdef *iverdefarr;
6691 Elf_Internal_Verdef iverdefmem;
252b5132 6692 unsigned int i;
062e2358 6693 unsigned int maxidx;
d0fb9a8d 6694 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6695
6696 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6697
217aa764 6698 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6699 if (contents == NULL)
6700 goto error_return;
6701 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6702 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6703 goto error_return;
6704
d0fb9a8d
JJ
6705 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6706 goto error_return;
6707
6708 BFD_ASSERT (sizeof (Elf_External_Verdef)
6709 >= sizeof (Elf_External_Verdaux));
6710 contents_end_def = contents + hdr->sh_size
6711 - sizeof (Elf_External_Verdef);
6712 contents_end_aux = contents + hdr->sh_size
6713 - sizeof (Elf_External_Verdaux);
6714
f631889e
UD
6715 /* We know the number of entries in the section but not the maximum
6716 index. Therefore we have to run through all entries and find
6717 the maximum. */
252b5132 6718 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6719 maxidx = 0;
6720 for (i = 0; i < hdr->sh_info; ++i)
6721 {
6722 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6723
062e2358
AM
6724 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6725 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6726
d0fb9a8d
JJ
6727 if (iverdefmem.vd_next
6728 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6729 goto error_return;
6730
f631889e
UD
6731 everdef = ((Elf_External_Verdef *)
6732 ((bfd_byte *) everdef + iverdefmem.vd_next));
6733 }
6734
fc0e6df6
PB
6735 if (default_imported_symver)
6736 {
6737 if (freeidx > maxidx)
6738 maxidx = ++freeidx;
6739 else
6740 freeidx = ++maxidx;
6741 }
d0fb9a8d
JJ
6742 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6743 sizeof (Elf_Internal_Verdef));
f631889e
UD
6744 if (elf_tdata (abfd)->verdef == NULL)
6745 goto error_return;
6746
6747 elf_tdata (abfd)->cverdefs = maxidx;
6748
6749 everdef = (Elf_External_Verdef *) contents;
6750 iverdefarr = elf_tdata (abfd)->verdef;
6751 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6752 {
6753 Elf_External_Verdaux *everdaux;
6754 Elf_Internal_Verdaux *iverdaux;
6755 unsigned int j;
6756
f631889e
UD
6757 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6758
d0fb9a8d
JJ
6759 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6760 {
6761error_return_verdef:
6762 elf_tdata (abfd)->verdef = NULL;
6763 elf_tdata (abfd)->cverdefs = 0;
6764 goto error_return;
6765 }
6766
f631889e
UD
6767 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6768 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6769
6770 iverdef->vd_bfd = abfd;
6771
d0fb9a8d
JJ
6772 if (iverdef->vd_cnt == 0)
6773 iverdef->vd_auxptr = NULL;
6774 else
6775 {
6776 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6777 sizeof (Elf_Internal_Verdaux));
6778 if (iverdef->vd_auxptr == NULL)
6779 goto error_return_verdef;
6780 }
6781
6782 if (iverdef->vd_aux
6783 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6784 goto error_return_verdef;
252b5132
RH
6785
6786 everdaux = ((Elf_External_Verdaux *)
6787 ((bfd_byte *) everdef + iverdef->vd_aux));
6788 iverdaux = iverdef->vd_auxptr;
6789 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6790 {
6791 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6792
6793 iverdaux->vda_nodename =
6794 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6795 iverdaux->vda_name);
6796 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6797 goto error_return_verdef;
252b5132
RH
6798
6799 if (j + 1 < iverdef->vd_cnt)
6800 iverdaux->vda_nextptr = iverdaux + 1;
6801 else
6802 iverdaux->vda_nextptr = NULL;
6803
d0fb9a8d
JJ
6804 if (iverdaux->vda_next
6805 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6806 goto error_return_verdef;
6807
252b5132
RH
6808 everdaux = ((Elf_External_Verdaux *)
6809 ((bfd_byte *) everdaux + iverdaux->vda_next));
6810 }
6811
d0fb9a8d
JJ
6812 if (iverdef->vd_cnt)
6813 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6814
d0fb9a8d 6815 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6816 iverdef->vd_nextdef = iverdef + 1;
6817 else
6818 iverdef->vd_nextdef = NULL;
6819
6820 everdef = ((Elf_External_Verdef *)
6821 ((bfd_byte *) everdef + iverdef->vd_next));
6822 }
6823
6824 free (contents);
6825 contents = NULL;
6826 }
fc0e6df6 6827 else if (default_imported_symver)
252b5132 6828 {
fc0e6df6
PB
6829 if (freeidx < 3)
6830 freeidx = 3;
6831 else
6832 freeidx++;
252b5132 6833
d0fb9a8d
JJ
6834 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6835 sizeof (Elf_Internal_Verdef));
fc0e6df6 6836 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6837 goto error_return;
6838
fc0e6df6
PB
6839 elf_tdata (abfd)->cverdefs = freeidx;
6840 }
252b5132 6841
fc0e6df6
PB
6842 /* Create a default version based on the soname. */
6843 if (default_imported_symver)
6844 {
6845 Elf_Internal_Verdef *iverdef;
6846 Elf_Internal_Verdaux *iverdaux;
252b5132 6847
fc0e6df6 6848 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6849
fc0e6df6
PB
6850 iverdef->vd_version = VER_DEF_CURRENT;
6851 iverdef->vd_flags = 0;
6852 iverdef->vd_ndx = freeidx;
6853 iverdef->vd_cnt = 1;
252b5132 6854
fc0e6df6 6855 iverdef->vd_bfd = abfd;
252b5132 6856
fc0e6df6
PB
6857 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6858 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6859 goto error_return_verdef;
fc0e6df6 6860 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6861 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6862 if (iverdef->vd_auxptr == NULL)
6863 goto error_return_verdef;
252b5132 6864
fc0e6df6
PB
6865 iverdaux = iverdef->vd_auxptr;
6866 iverdaux->vda_nodename = iverdef->vd_nodename;
6867 iverdaux->vda_nextptr = NULL;
252b5132
RH
6868 }
6869
b34976b6 6870 return TRUE;
252b5132
RH
6871
6872 error_return:
5ed6aba4 6873 if (contents != NULL)
252b5132 6874 free (contents);
b34976b6 6875 return FALSE;
252b5132
RH
6876}
6877\f
6878asymbol *
217aa764 6879_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6880{
6881 elf_symbol_type *newsym;
dc810e39 6882 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6883
217aa764 6884 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6885 if (!newsym)
6886 return NULL;
6887 else
6888 {
6889 newsym->symbol.the_bfd = abfd;
6890 return &newsym->symbol;
6891 }
6892}
6893
6894void
217aa764
AM
6895_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6896 asymbol *symbol,
6897 symbol_info *ret)
252b5132
RH
6898{
6899 bfd_symbol_info (symbol, ret);
6900}
6901
6902/* Return whether a symbol name implies a local symbol. Most targets
6903 use this function for the is_local_label_name entry point, but some
6904 override it. */
6905
b34976b6 6906bfd_boolean
217aa764
AM
6907_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6908 const char *name)
252b5132
RH
6909{
6910 /* Normal local symbols start with ``.L''. */
6911 if (name[0] == '.' && name[1] == 'L')
b34976b6 6912 return TRUE;
252b5132
RH
6913
6914 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6915 DWARF debugging symbols starting with ``..''. */
6916 if (name[0] == '.' && name[1] == '.')
b34976b6 6917 return TRUE;
252b5132
RH
6918
6919 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6920 emitting DWARF debugging output. I suspect this is actually a
6921 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6922 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6923 underscore to be emitted on some ELF targets). For ease of use,
6924 we treat such symbols as local. */
6925 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6926 return TRUE;
252b5132 6927
b34976b6 6928 return FALSE;
252b5132
RH
6929}
6930
6931alent *
217aa764
AM
6932_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6933 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6934{
6935 abort ();
6936 return NULL;
6937}
6938
b34976b6 6939bfd_boolean
217aa764
AM
6940_bfd_elf_set_arch_mach (bfd *abfd,
6941 enum bfd_architecture arch,
6942 unsigned long machine)
252b5132
RH
6943{
6944 /* If this isn't the right architecture for this backend, and this
6945 isn't the generic backend, fail. */
6946 if (arch != get_elf_backend_data (abfd)->arch
6947 && arch != bfd_arch_unknown
6948 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6949 return FALSE;
252b5132
RH
6950
6951 return bfd_default_set_arch_mach (abfd, arch, machine);
6952}
6953
d1fad7c6
NC
6954/* Find the function to a particular section and offset,
6955 for error reporting. */
252b5132 6956
b34976b6 6957static bfd_boolean
217aa764
AM
6958elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6959 asection *section,
6960 asymbol **symbols,
6961 bfd_vma offset,
6962 const char **filename_ptr,
6963 const char **functionname_ptr)
252b5132 6964{
252b5132 6965 const char *filename;
57426232 6966 asymbol *func, *file;
252b5132
RH
6967 bfd_vma low_func;
6968 asymbol **p;
57426232
JB
6969 /* ??? Given multiple file symbols, it is impossible to reliably
6970 choose the right file name for global symbols. File symbols are
6971 local symbols, and thus all file symbols must sort before any
6972 global symbols. The ELF spec may be interpreted to say that a
6973 file symbol must sort before other local symbols, but currently
6974 ld -r doesn't do this. So, for ld -r output, it is possible to
6975 make a better choice of file name for local symbols by ignoring
6976 file symbols appearing after a given local symbol. */
6977 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6978
252b5132
RH
6979 filename = NULL;
6980 func = NULL;
57426232 6981 file = NULL;
252b5132 6982 low_func = 0;
57426232 6983 state = nothing_seen;
252b5132
RH
6984
6985 for (p = symbols; *p != NULL; p++)
6986 {
6987 elf_symbol_type *q;
6988
6989 q = (elf_symbol_type *) *p;
6990
252b5132
RH
6991 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6992 {
6993 default:
6994 break;
6995 case STT_FILE:
57426232
JB
6996 file = &q->symbol;
6997 if (state == symbol_seen)
6998 state = file_after_symbol_seen;
6999 continue;
252b5132
RH
7000 case STT_NOTYPE:
7001 case STT_FUNC:
6b40fcba 7002 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7003 && q->symbol.value >= low_func
7004 && q->symbol.value <= offset)
7005 {
7006 func = (asymbol *) q;
7007 low_func = q->symbol.value;
a1923858
AM
7008 filename = NULL;
7009 if (file != NULL
7010 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7011 || state != file_after_symbol_seen))
57426232 7012 filename = bfd_asymbol_name (file);
252b5132
RH
7013 }
7014 break;
7015 }
57426232
JB
7016 if (state == nothing_seen)
7017 state = symbol_seen;
252b5132
RH
7018 }
7019
7020 if (func == NULL)
b34976b6 7021 return FALSE;
252b5132 7022
d1fad7c6
NC
7023 if (filename_ptr)
7024 *filename_ptr = filename;
7025 if (functionname_ptr)
7026 *functionname_ptr = bfd_asymbol_name (func);
7027
b34976b6 7028 return TRUE;
d1fad7c6
NC
7029}
7030
7031/* Find the nearest line to a particular section and offset,
7032 for error reporting. */
7033
b34976b6 7034bfd_boolean
217aa764
AM
7035_bfd_elf_find_nearest_line (bfd *abfd,
7036 asection *section,
7037 asymbol **symbols,
7038 bfd_vma offset,
7039 const char **filename_ptr,
7040 const char **functionname_ptr,
7041 unsigned int *line_ptr)
d1fad7c6 7042{
b34976b6 7043 bfd_boolean found;
d1fad7c6
NC
7044
7045 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7046 filename_ptr, functionname_ptr,
7047 line_ptr))
d1fad7c6
NC
7048 {
7049 if (!*functionname_ptr)
4e8a9624
AM
7050 elf_find_function (abfd, section, symbols, offset,
7051 *filename_ptr ? NULL : filename_ptr,
7052 functionname_ptr);
7053
b34976b6 7054 return TRUE;
d1fad7c6
NC
7055 }
7056
7057 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7058 filename_ptr, functionname_ptr,
7059 line_ptr, 0,
7060 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7061 {
7062 if (!*functionname_ptr)
4e8a9624
AM
7063 elf_find_function (abfd, section, symbols, offset,
7064 *filename_ptr ? NULL : filename_ptr,
7065 functionname_ptr);
7066
b34976b6 7067 return TRUE;
d1fad7c6
NC
7068 }
7069
7070 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7071 &found, filename_ptr,
7072 functionname_ptr, line_ptr,
7073 &elf_tdata (abfd)->line_info))
b34976b6 7074 return FALSE;
dc43ada5 7075 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7076 return TRUE;
d1fad7c6
NC
7077
7078 if (symbols == NULL)
b34976b6 7079 return FALSE;
d1fad7c6
NC
7080
7081 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7082 filename_ptr, functionname_ptr))
b34976b6 7083 return FALSE;
d1fad7c6 7084
252b5132 7085 *line_ptr = 0;
b34976b6 7086 return TRUE;
252b5132
RH
7087}
7088
5420f73d
L
7089/* Find the line for a symbol. */
7090
7091bfd_boolean
7092_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7093 const char **filename_ptr, unsigned int *line_ptr)
7094{
7095 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7096 filename_ptr, line_ptr, 0,
7097 &elf_tdata (abfd)->dwarf2_find_line_info);
7098}
7099
4ab527b0
FF
7100/* After a call to bfd_find_nearest_line, successive calls to
7101 bfd_find_inliner_info can be used to get source information about
7102 each level of function inlining that terminated at the address
7103 passed to bfd_find_nearest_line. Currently this is only supported
7104 for DWARF2 with appropriate DWARF3 extensions. */
7105
7106bfd_boolean
7107_bfd_elf_find_inliner_info (bfd *abfd,
7108 const char **filename_ptr,
7109 const char **functionname_ptr,
7110 unsigned int *line_ptr)
7111{
7112 bfd_boolean found;
7113 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7114 functionname_ptr, line_ptr,
7115 & elf_tdata (abfd)->dwarf2_find_line_info);
7116 return found;
7117}
7118
252b5132 7119int
217aa764 7120_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
7121{
7122 int ret;
7123
7124 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
7125 if (! reloc)
7126 ret += get_program_header_size (abfd);
7127 return ret;
7128}
7129
b34976b6 7130bfd_boolean
217aa764
AM
7131_bfd_elf_set_section_contents (bfd *abfd,
7132 sec_ptr section,
0f867abe 7133 const void *location,
217aa764
AM
7134 file_ptr offset,
7135 bfd_size_type count)
252b5132
RH
7136{
7137 Elf_Internal_Shdr *hdr;
dc810e39 7138 bfd_signed_vma pos;
252b5132
RH
7139
7140 if (! abfd->output_has_begun
217aa764 7141 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7142 return FALSE;
252b5132
RH
7143
7144 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7145 pos = hdr->sh_offset + offset;
7146 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7147 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7148 return FALSE;
252b5132 7149
b34976b6 7150 return TRUE;
252b5132
RH
7151}
7152
7153void
217aa764
AM
7154_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7155 arelent *cache_ptr ATTRIBUTE_UNUSED,
7156 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7157{
7158 abort ();
7159}
7160
252b5132
RH
7161/* Try to convert a non-ELF reloc into an ELF one. */
7162
b34976b6 7163bfd_boolean
217aa764 7164_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7165{
c044fabd 7166 /* Check whether we really have an ELF howto. */
252b5132
RH
7167
7168 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7169 {
7170 bfd_reloc_code_real_type code;
7171 reloc_howto_type *howto;
7172
7173 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7174 equivalent ELF reloc. */
252b5132
RH
7175
7176 if (areloc->howto->pc_relative)
7177 {
7178 switch (areloc->howto->bitsize)
7179 {
7180 case 8:
7181 code = BFD_RELOC_8_PCREL;
7182 break;
7183 case 12:
7184 code = BFD_RELOC_12_PCREL;
7185 break;
7186 case 16:
7187 code = BFD_RELOC_16_PCREL;
7188 break;
7189 case 24:
7190 code = BFD_RELOC_24_PCREL;
7191 break;
7192 case 32:
7193 code = BFD_RELOC_32_PCREL;
7194 break;
7195 case 64:
7196 code = BFD_RELOC_64_PCREL;
7197 break;
7198 default:
7199 goto fail;
7200 }
7201
7202 howto = bfd_reloc_type_lookup (abfd, code);
7203
7204 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7205 {
7206 if (howto->pcrel_offset)
7207 areloc->addend += areloc->address;
7208 else
7209 areloc->addend -= areloc->address; /* addend is unsigned!! */
7210 }
7211 }
7212 else
7213 {
7214 switch (areloc->howto->bitsize)
7215 {
7216 case 8:
7217 code = BFD_RELOC_8;
7218 break;
7219 case 14:
7220 code = BFD_RELOC_14;
7221 break;
7222 case 16:
7223 code = BFD_RELOC_16;
7224 break;
7225 case 26:
7226 code = BFD_RELOC_26;
7227 break;
7228 case 32:
7229 code = BFD_RELOC_32;
7230 break;
7231 case 64:
7232 code = BFD_RELOC_64;
7233 break;
7234 default:
7235 goto fail;
7236 }
7237
7238 howto = bfd_reloc_type_lookup (abfd, code);
7239 }
7240
7241 if (howto)
7242 areloc->howto = howto;
7243 else
7244 goto fail;
7245 }
7246
b34976b6 7247 return TRUE;
252b5132
RH
7248
7249 fail:
7250 (*_bfd_error_handler)
d003868e
AM
7251 (_("%B: unsupported relocation type %s"),
7252 abfd, areloc->howto->name);
252b5132 7253 bfd_set_error (bfd_error_bad_value);
b34976b6 7254 return FALSE;
252b5132
RH
7255}
7256
b34976b6 7257bfd_boolean
217aa764 7258_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7259{
7260 if (bfd_get_format (abfd) == bfd_object)
7261 {
b25e3d87 7262 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7263 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7264 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7265 }
7266
7267 return _bfd_generic_close_and_cleanup (abfd);
7268}
7269
7270/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7271 in the relocation's offset. Thus we cannot allow any sort of sanity
7272 range-checking to interfere. There is nothing else to do in processing
7273 this reloc. */
7274
7275bfd_reloc_status_type
217aa764
AM
7276_bfd_elf_rel_vtable_reloc_fn
7277 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7278 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7279 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7280 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7281{
7282 return bfd_reloc_ok;
7283}
252b5132
RH
7284\f
7285/* Elf core file support. Much of this only works on native
7286 toolchains, since we rely on knowing the
7287 machine-dependent procfs structure in order to pick
c044fabd 7288 out details about the corefile. */
252b5132
RH
7289
7290#ifdef HAVE_SYS_PROCFS_H
7291# include <sys/procfs.h>
7292#endif
7293
c044fabd 7294/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7295
7296static int
217aa764 7297elfcore_make_pid (bfd *abfd)
252b5132
RH
7298{
7299 return ((elf_tdata (abfd)->core_lwpid << 16)
7300 + (elf_tdata (abfd)->core_pid));
7301}
7302
252b5132
RH
7303/* If there isn't a section called NAME, make one, using
7304 data from SECT. Note, this function will generate a
7305 reference to NAME, so you shouldn't deallocate or
c044fabd 7306 overwrite it. */
252b5132 7307
b34976b6 7308static bfd_boolean
217aa764 7309elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7310{
c044fabd 7311 asection *sect2;
252b5132
RH
7312
7313 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7314 return TRUE;
252b5132
RH
7315
7316 sect2 = bfd_make_section (abfd, name);
7317 if (sect2 == NULL)
b34976b6 7318 return FALSE;
252b5132 7319
eea6121a 7320 sect2->size = sect->size;
252b5132
RH
7321 sect2->filepos = sect->filepos;
7322 sect2->flags = sect->flags;
7323 sect2->alignment_power = sect->alignment_power;
b34976b6 7324 return TRUE;
252b5132
RH
7325}
7326
bb0082d6
AM
7327/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7328 actually creates up to two pseudosections:
7329 - For the single-threaded case, a section named NAME, unless
7330 such a section already exists.
7331 - For the multi-threaded case, a section named "NAME/PID", where
7332 PID is elfcore_make_pid (abfd).
7333 Both pseudosections have identical contents. */
b34976b6 7334bfd_boolean
217aa764
AM
7335_bfd_elfcore_make_pseudosection (bfd *abfd,
7336 char *name,
7337 size_t size,
7338 ufile_ptr filepos)
bb0082d6
AM
7339{
7340 char buf[100];
7341 char *threaded_name;
d4c88bbb 7342 size_t len;
bb0082d6
AM
7343 asection *sect;
7344
7345 /* Build the section name. */
7346
7347 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7348 len = strlen (buf) + 1;
217aa764 7349 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7350 if (threaded_name == NULL)
b34976b6 7351 return FALSE;
d4c88bbb 7352 memcpy (threaded_name, buf, len);
bb0082d6 7353
62f3bb11 7354 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 7355 if (sect == NULL)
b34976b6 7356 return FALSE;
eea6121a 7357 sect->size = size;
bb0082d6
AM
7358 sect->filepos = filepos;
7359 sect->flags = SEC_HAS_CONTENTS;
7360 sect->alignment_power = 2;
7361
936e320b 7362 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7363}
7364
252b5132 7365/* prstatus_t exists on:
4a938328 7366 solaris 2.5+
252b5132
RH
7367 linux 2.[01] + glibc
7368 unixware 4.2
7369*/
7370
7371#if defined (HAVE_PRSTATUS_T)
a7b97311 7372
b34976b6 7373static bfd_boolean
217aa764 7374elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7375{
eea6121a 7376 size_t size;
7ee38065 7377 int offset;
252b5132 7378
4a938328
MS
7379 if (note->descsz == sizeof (prstatus_t))
7380 {
7381 prstatus_t prstat;
252b5132 7382
eea6121a 7383 size = sizeof (prstat.pr_reg);
7ee38065 7384 offset = offsetof (prstatus_t, pr_reg);
4a938328 7385 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7386
fa49d224
NC
7387 /* Do not overwrite the core signal if it
7388 has already been set by another thread. */
7389 if (elf_tdata (abfd)->core_signal == 0)
7390 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7391 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7392
4a938328
MS
7393 /* pr_who exists on:
7394 solaris 2.5+
7395 unixware 4.2
7396 pr_who doesn't exist on:
7397 linux 2.[01]
7398 */
252b5132 7399#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7400 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7401#endif
4a938328 7402 }
7ee38065 7403#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7404 else if (note->descsz == sizeof (prstatus32_t))
7405 {
7406 /* 64-bit host, 32-bit corefile */
7407 prstatus32_t prstat;
7408
eea6121a 7409 size = sizeof (prstat.pr_reg);
7ee38065 7410 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7411 memcpy (&prstat, note->descdata, sizeof (prstat));
7412
fa49d224
NC
7413 /* Do not overwrite the core signal if it
7414 has already been set by another thread. */
7415 if (elf_tdata (abfd)->core_signal == 0)
7416 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7417 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7418
7419 /* pr_who exists on:
7420 solaris 2.5+
7421 unixware 4.2
7422 pr_who doesn't exist on:
7423 linux 2.[01]
7424 */
7ee38065 7425#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7426 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7427#endif
7428 }
7ee38065 7429#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7430 else
7431 {
7432 /* Fail - we don't know how to handle any other
7433 note size (ie. data object type). */
b34976b6 7434 return TRUE;
4a938328 7435 }
252b5132 7436
bb0082d6 7437 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7438 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7439 size, note->descpos + offset);
252b5132
RH
7440}
7441#endif /* defined (HAVE_PRSTATUS_T) */
7442
bb0082d6 7443/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7444static bfd_boolean
217aa764
AM
7445elfcore_make_note_pseudosection (bfd *abfd,
7446 char *name,
7447 Elf_Internal_Note *note)
252b5132 7448{
936e320b
AM
7449 return _bfd_elfcore_make_pseudosection (abfd, name,
7450 note->descsz, note->descpos);
252b5132
RH
7451}
7452
ff08c6bb
JB
7453/* There isn't a consistent prfpregset_t across platforms,
7454 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7455 data structure apart. */
7456
b34976b6 7457static bfd_boolean
217aa764 7458elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7459{
7460 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7461}
7462
ff08c6bb
JB
7463/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7464 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7465 literally. */
c044fabd 7466
b34976b6 7467static bfd_boolean
217aa764 7468elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7469{
7470 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7471}
7472
252b5132 7473#if defined (HAVE_PRPSINFO_T)
4a938328 7474typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7475#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7476typedef prpsinfo32_t elfcore_psinfo32_t;
7477#endif
252b5132
RH
7478#endif
7479
7480#if defined (HAVE_PSINFO_T)
4a938328 7481typedef psinfo_t elfcore_psinfo_t;
7ee38065 7482#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7483typedef psinfo32_t elfcore_psinfo32_t;
7484#endif
252b5132
RH
7485#endif
7486
252b5132
RH
7487/* return a malloc'ed copy of a string at START which is at
7488 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7489 the copy will always have a terminating '\0'. */
252b5132 7490
936e320b 7491char *
217aa764 7492_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7493{
dc810e39 7494 char *dups;
c044fabd 7495 char *end = memchr (start, '\0', max);
dc810e39 7496 size_t len;
252b5132
RH
7497
7498 if (end == NULL)
7499 len = max;
7500 else
7501 len = end - start;
7502
217aa764 7503 dups = bfd_alloc (abfd, len + 1);
dc810e39 7504 if (dups == NULL)
252b5132
RH
7505 return NULL;
7506
dc810e39
AM
7507 memcpy (dups, start, len);
7508 dups[len] = '\0';
252b5132 7509
dc810e39 7510 return dups;
252b5132
RH
7511}
7512
bb0082d6 7513#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7514static bfd_boolean
217aa764 7515elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7516{
4a938328
MS
7517 if (note->descsz == sizeof (elfcore_psinfo_t))
7518 {
7519 elfcore_psinfo_t psinfo;
252b5132 7520
7ee38065 7521 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7522
4a938328 7523 elf_tdata (abfd)->core_program
936e320b
AM
7524 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7525 sizeof (psinfo.pr_fname));
252b5132 7526
4a938328 7527 elf_tdata (abfd)->core_command
936e320b
AM
7528 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7529 sizeof (psinfo.pr_psargs));
4a938328 7530 }
7ee38065 7531#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7532 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7533 {
7534 /* 64-bit host, 32-bit corefile */
7535 elfcore_psinfo32_t psinfo;
7536
7ee38065 7537 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7538
4a938328 7539 elf_tdata (abfd)->core_program
936e320b
AM
7540 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7541 sizeof (psinfo.pr_fname));
4a938328
MS
7542
7543 elf_tdata (abfd)->core_command
936e320b
AM
7544 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7545 sizeof (psinfo.pr_psargs));
4a938328
MS
7546 }
7547#endif
7548
7549 else
7550 {
7551 /* Fail - we don't know how to handle any other
7552 note size (ie. data object type). */
b34976b6 7553 return TRUE;
4a938328 7554 }
252b5132
RH
7555
7556 /* Note that for some reason, a spurious space is tacked
7557 onto the end of the args in some (at least one anyway)
c044fabd 7558 implementations, so strip it off if it exists. */
252b5132
RH
7559
7560 {
c044fabd 7561 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7562 int n = strlen (command);
7563
7564 if (0 < n && command[n - 1] == ' ')
7565 command[n - 1] = '\0';
7566 }
7567
b34976b6 7568 return TRUE;
252b5132
RH
7569}
7570#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7571
252b5132 7572#if defined (HAVE_PSTATUS_T)
b34976b6 7573static bfd_boolean
217aa764 7574elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7575{
f572a39d
AM
7576 if (note->descsz == sizeof (pstatus_t)
7577#if defined (HAVE_PXSTATUS_T)
7578 || note->descsz == sizeof (pxstatus_t)
7579#endif
7580 )
4a938328
MS
7581 {
7582 pstatus_t pstat;
252b5132 7583
4a938328 7584 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7585
4a938328
MS
7586 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7587 }
7ee38065 7588#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7589 else if (note->descsz == sizeof (pstatus32_t))
7590 {
7591 /* 64-bit host, 32-bit corefile */
7592 pstatus32_t pstat;
252b5132 7593
4a938328 7594 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7595
4a938328
MS
7596 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7597 }
7598#endif
252b5132
RH
7599 /* Could grab some more details from the "representative"
7600 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7601 NT_LWPSTATUS note, presumably. */
252b5132 7602
b34976b6 7603 return TRUE;
252b5132
RH
7604}
7605#endif /* defined (HAVE_PSTATUS_T) */
7606
252b5132 7607#if defined (HAVE_LWPSTATUS_T)
b34976b6 7608static bfd_boolean
217aa764 7609elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7610{
7611 lwpstatus_t lwpstat;
7612 char buf[100];
c044fabd 7613 char *name;
d4c88bbb 7614 size_t len;
c044fabd 7615 asection *sect;
252b5132 7616
f572a39d
AM
7617 if (note->descsz != sizeof (lwpstat)
7618#if defined (HAVE_LWPXSTATUS_T)
7619 && note->descsz != sizeof (lwpxstatus_t)
7620#endif
7621 )
b34976b6 7622 return TRUE;
252b5132
RH
7623
7624 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7625
7626 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7627 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7628
c044fabd 7629 /* Make a ".reg/999" section. */
252b5132
RH
7630
7631 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7632 len = strlen (buf) + 1;
217aa764 7633 name = bfd_alloc (abfd, len);
252b5132 7634 if (name == NULL)
b34976b6 7635 return FALSE;
d4c88bbb 7636 memcpy (name, buf, len);
252b5132 7637
62f3bb11 7638 sect = bfd_make_section_anyway (abfd, name);
252b5132 7639 if (sect == NULL)
b34976b6 7640 return FALSE;
252b5132
RH
7641
7642#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7643 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7644 sect->filepos = note->descpos
7645 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7646#endif
7647
7648#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7649 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7650 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7651#endif
7652
7653 sect->flags = SEC_HAS_CONTENTS;
7654 sect->alignment_power = 2;
7655
7656 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7657 return FALSE;
252b5132
RH
7658
7659 /* Make a ".reg2/999" section */
7660
7661 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7662 len = strlen (buf) + 1;
217aa764 7663 name = bfd_alloc (abfd, len);
252b5132 7664 if (name == NULL)
b34976b6 7665 return FALSE;
d4c88bbb 7666 memcpy (name, buf, len);
252b5132 7667
62f3bb11 7668 sect = bfd_make_section_anyway (abfd, name);
252b5132 7669 if (sect == NULL)
b34976b6 7670 return FALSE;
252b5132
RH
7671
7672#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7673 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7674 sect->filepos = note->descpos
7675 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7676#endif
7677
7678#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7679 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7680 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7681#endif
7682
7683 sect->flags = SEC_HAS_CONTENTS;
7684 sect->alignment_power = 2;
7685
936e320b 7686 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7687}
7688#endif /* defined (HAVE_LWPSTATUS_T) */
7689
16e9c715 7690#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7691static bfd_boolean
217aa764 7692elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7693{
7694 char buf[30];
c044fabd 7695 char *name;
d4c88bbb 7696 size_t len;
c044fabd 7697 asection *sect;
16e9c715
NC
7698 win32_pstatus_t pstatus;
7699
7700 if (note->descsz < sizeof (pstatus))
b34976b6 7701 return TRUE;
16e9c715 7702
e8eab623 7703 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7704
7705 switch (pstatus.data_type)
16e9c715
NC
7706 {
7707 case NOTE_INFO_PROCESS:
7708 /* FIXME: need to add ->core_command. */
7709 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7710 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7711 break;
16e9c715
NC
7712
7713 case NOTE_INFO_THREAD:
7714 /* Make a ".reg/999" section. */
1f170678 7715 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7716
d4c88bbb 7717 len = strlen (buf) + 1;
217aa764 7718 name = bfd_alloc (abfd, len);
16e9c715 7719 if (name == NULL)
b34976b6 7720 return FALSE;
c044fabd 7721
d4c88bbb 7722 memcpy (name, buf, len);
16e9c715 7723
62f3bb11 7724 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7725 if (sect == NULL)
b34976b6 7726 return FALSE;
c044fabd 7727
eea6121a 7728 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7729 sect->filepos = (note->descpos
7730 + offsetof (struct win32_pstatus,
7731 data.thread_info.thread_context));
16e9c715
NC
7732 sect->flags = SEC_HAS_CONTENTS;
7733 sect->alignment_power = 2;
7734
7735 if (pstatus.data.thread_info.is_active_thread)
7736 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7737 return FALSE;
16e9c715
NC
7738 break;
7739
7740 case NOTE_INFO_MODULE:
7741 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7742 sprintf (buf, ".module/%08lx",
7743 (long) pstatus.data.module_info.base_address);
c044fabd 7744
d4c88bbb 7745 len = strlen (buf) + 1;
217aa764 7746 name = bfd_alloc (abfd, len);
16e9c715 7747 if (name == NULL)
b34976b6 7748 return FALSE;
c044fabd 7749
d4c88bbb 7750 memcpy (name, buf, len);
252b5132 7751
62f3bb11 7752 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7753
16e9c715 7754 if (sect == NULL)
b34976b6 7755 return FALSE;
c044fabd 7756
eea6121a 7757 sect->size = note->descsz;
16e9c715
NC
7758 sect->filepos = note->descpos;
7759 sect->flags = SEC_HAS_CONTENTS;
7760 sect->alignment_power = 2;
7761 break;
7762
7763 default:
b34976b6 7764 return TRUE;
16e9c715
NC
7765 }
7766
b34976b6 7767 return TRUE;
16e9c715
NC
7768}
7769#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7770
b34976b6 7771static bfd_boolean
217aa764 7772elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7773{
9c5bfbb7 7774 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7775
252b5132
RH
7776 switch (note->type)
7777 {
7778 default:
b34976b6 7779 return TRUE;
252b5132 7780
252b5132 7781 case NT_PRSTATUS:
bb0082d6
AM
7782 if (bed->elf_backend_grok_prstatus)
7783 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7784 return TRUE;
bb0082d6 7785#if defined (HAVE_PRSTATUS_T)
252b5132 7786 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7787#else
b34976b6 7788 return TRUE;
252b5132
RH
7789#endif
7790
7791#if defined (HAVE_PSTATUS_T)
7792 case NT_PSTATUS:
7793 return elfcore_grok_pstatus (abfd, note);
7794#endif
7795
7796#if defined (HAVE_LWPSTATUS_T)
7797 case NT_LWPSTATUS:
7798 return elfcore_grok_lwpstatus (abfd, note);
7799#endif
7800
7801 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7802 return elfcore_grok_prfpreg (abfd, note);
7803
16e9c715 7804#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7805 case NT_WIN32PSTATUS:
16e9c715
NC
7806 return elfcore_grok_win32pstatus (abfd, note);
7807#endif
7808
c044fabd 7809 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7810 if (note->namesz == 6
7811 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7812 return elfcore_grok_prxfpreg (abfd, note);
7813 else
b34976b6 7814 return TRUE;
ff08c6bb 7815
252b5132
RH
7816 case NT_PRPSINFO:
7817 case NT_PSINFO:
bb0082d6
AM
7818 if (bed->elf_backend_grok_psinfo)
7819 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7820 return TRUE;
bb0082d6 7821#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7822 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7823#else
b34976b6 7824 return TRUE;
252b5132 7825#endif
3333a7c3
RM
7826
7827 case NT_AUXV:
7828 {
62f3bb11 7829 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7830
7831 if (sect == NULL)
7832 return FALSE;
eea6121a 7833 sect->size = note->descsz;
3333a7c3
RM
7834 sect->filepos = note->descpos;
7835 sect->flags = SEC_HAS_CONTENTS;
7836 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7837
7838 return TRUE;
7839 }
252b5132
RH
7840 }
7841}
7842
b34976b6 7843static bfd_boolean
217aa764 7844elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7845{
7846 char *cp;
7847
7848 cp = strchr (note->namedata, '@');
7849 if (cp != NULL)
7850 {
d2b64500 7851 *lwpidp = atoi(cp + 1);
b34976b6 7852 return TRUE;
50b2bdb7 7853 }
b34976b6 7854 return FALSE;
50b2bdb7
AM
7855}
7856
b34976b6 7857static bfd_boolean
217aa764 7858elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7859{
7860
7861 /* Signal number at offset 0x08. */
7862 elf_tdata (abfd)->core_signal
7863 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7864
7865 /* Process ID at offset 0x50. */
7866 elf_tdata (abfd)->core_pid
7867 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7868
7869 /* Command name at 0x7c (max 32 bytes, including nul). */
7870 elf_tdata (abfd)->core_command
7871 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7872
7720ba9f
MK
7873 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7874 note);
50b2bdb7
AM
7875}
7876
b34976b6 7877static bfd_boolean
217aa764 7878elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7879{
7880 int lwp;
7881
7882 if (elfcore_netbsd_get_lwpid (note, &lwp))
7883 elf_tdata (abfd)->core_lwpid = lwp;
7884
b4db1224 7885 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7886 {
7887 /* NetBSD-specific core "procinfo". Note that we expect to
7888 find this note before any of the others, which is fine,
7889 since the kernel writes this note out first when it
7890 creates a core file. */
47d9a591 7891
50b2bdb7
AM
7892 return elfcore_grok_netbsd_procinfo (abfd, note);
7893 }
7894
b4db1224
JT
7895 /* As of Jan 2002 there are no other machine-independent notes
7896 defined for NetBSD core files. If the note type is less
7897 than the start of the machine-dependent note types, we don't
7898 understand it. */
47d9a591 7899
b4db1224 7900 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7901 return TRUE;
50b2bdb7
AM
7902
7903
7904 switch (bfd_get_arch (abfd))
7905 {
7906 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7907 PT_GETFPREGS == mach+2. */
7908
7909 case bfd_arch_alpha:
7910 case bfd_arch_sparc:
7911 switch (note->type)
7912 {
b4db1224 7913 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7914 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7915
b4db1224 7916 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7917 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7918
7919 default:
b34976b6 7920 return TRUE;
50b2bdb7
AM
7921 }
7922
7923 /* On all other arch's, PT_GETREGS == mach+1 and
7924 PT_GETFPREGS == mach+3. */
7925
7926 default:
7927 switch (note->type)
7928 {
b4db1224 7929 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7930 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7931
b4db1224 7932 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7933 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7934
7935 default:
b34976b6 7936 return TRUE;
50b2bdb7
AM
7937 }
7938 }
7939 /* NOTREACHED */
7940}
7941
07c6e936 7942static bfd_boolean
217aa764 7943elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7944{
7945 void *ddata = note->descdata;
7946 char buf[100];
7947 char *name;
7948 asection *sect;
f8843e87
AM
7949 short sig;
7950 unsigned flags;
07c6e936
NC
7951
7952 /* nto_procfs_status 'pid' field is at offset 0. */
7953 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7954
f8843e87
AM
7955 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7956 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7957
7958 /* nto_procfs_status 'flags' field is at offset 8. */
7959 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7960
7961 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7962 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7963 {
7964 elf_tdata (abfd)->core_signal = sig;
7965 elf_tdata (abfd)->core_lwpid = *tid;
7966 }
07c6e936 7967
f8843e87
AM
7968 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7969 do not come from signals so we make sure we set the current
7970 thread just in case. */
7971 if (flags & 0x00000080)
7972 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7973
7974 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7975 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7976
217aa764 7977 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7978 if (name == NULL)
7979 return FALSE;
7980 strcpy (name, buf);
7981
62f3bb11 7982 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7983 if (sect == NULL)
7984 return FALSE;
7985
eea6121a 7986 sect->size = note->descsz;
07c6e936
NC
7987 sect->filepos = note->descpos;
7988 sect->flags = SEC_HAS_CONTENTS;
7989 sect->alignment_power = 2;
7990
7991 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7992}
7993
7994static bfd_boolean
d69f560c
KW
7995elfcore_grok_nto_regs (bfd *abfd,
7996 Elf_Internal_Note *note,
7997 pid_t tid,
7998 char *base)
07c6e936
NC
7999{
8000 char buf[100];
8001 char *name;
8002 asection *sect;
8003
d69f560c 8004 /* Make a "(base)/%d" section. */
7e7353ed 8005 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 8006
217aa764 8007 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8008 if (name == NULL)
8009 return FALSE;
8010 strcpy (name, buf);
8011
62f3bb11 8012 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
8013 if (sect == NULL)
8014 return FALSE;
8015
eea6121a 8016 sect->size = note->descsz;
07c6e936
NC
8017 sect->filepos = note->descpos;
8018 sect->flags = SEC_HAS_CONTENTS;
8019 sect->alignment_power = 2;
8020
f8843e87
AM
8021 /* This is the current thread. */
8022 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8023 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8024
8025 return TRUE;
07c6e936
NC
8026}
8027
8028#define BFD_QNT_CORE_INFO 7
8029#define BFD_QNT_CORE_STATUS 8
8030#define BFD_QNT_CORE_GREG 9
8031#define BFD_QNT_CORE_FPREG 10
8032
8033static bfd_boolean
217aa764 8034elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8035{
8036 /* Every GREG section has a STATUS section before it. Store the
811072d8 8037 tid from the previous call to pass down to the next gregs
07c6e936
NC
8038 function. */
8039 static pid_t tid = 1;
8040
8041 switch (note->type)
8042 {
d69f560c
KW
8043 case BFD_QNT_CORE_INFO:
8044 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8045 case BFD_QNT_CORE_STATUS:
8046 return elfcore_grok_nto_status (abfd, note, &tid);
8047 case BFD_QNT_CORE_GREG:
8048 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8049 case BFD_QNT_CORE_FPREG:
8050 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8051 default:
8052 return TRUE;
07c6e936
NC
8053 }
8054}
8055
7c76fa91
MS
8056/* Function: elfcore_write_note
8057
47d9a591 8058 Inputs:
7c76fa91
MS
8059 buffer to hold note
8060 name of note
8061 type of note
8062 data for note
8063 size of data for note
8064
8065 Return:
8066 End of buffer containing note. */
8067
8068char *
217aa764
AM
8069elfcore_write_note (bfd *abfd,
8070 char *buf,
8071 int *bufsiz,
8072 const char *name,
8073 int type,
8074 const void *input,
8075 int size)
7c76fa91
MS
8076{
8077 Elf_External_Note *xnp;
d4c88bbb
AM
8078 size_t namesz;
8079 size_t pad;
8080 size_t newspace;
7c76fa91
MS
8081 char *p, *dest;
8082
d4c88bbb
AM
8083 namesz = 0;
8084 pad = 0;
8085 if (name != NULL)
8086 {
9c5bfbb7 8087 const struct elf_backend_data *bed;
d4c88bbb
AM
8088
8089 namesz = strlen (name) + 1;
8090 bed = get_elf_backend_data (abfd);
45d6a902 8091 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
8092 }
8093
5de3bf90 8094 newspace = 12 + namesz + pad + size;
d4c88bbb 8095
7c76fa91
MS
8096 p = realloc (buf, *bufsiz + newspace);
8097 dest = p + *bufsiz;
8098 *bufsiz += newspace;
8099 xnp = (Elf_External_Note *) dest;
8100 H_PUT_32 (abfd, namesz, xnp->namesz);
8101 H_PUT_32 (abfd, size, xnp->descsz);
8102 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8103 dest = xnp->name;
8104 if (name != NULL)
8105 {
8106 memcpy (dest, name, namesz);
8107 dest += namesz;
8108 while (pad != 0)
8109 {
8110 *dest++ = '\0';
8111 --pad;
8112 }
8113 }
8114 memcpy (dest, input, size);
7c76fa91
MS
8115 return p;
8116}
8117
8118#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8119char *
217aa764
AM
8120elfcore_write_prpsinfo (bfd *abfd,
8121 char *buf,
8122 int *bufsiz,
8123 const char *fname,
8124 const char *psargs)
7c76fa91
MS
8125{
8126 int note_type;
8127 char *note_name = "CORE";
8128
8129#if defined (HAVE_PSINFO_T)
8130 psinfo_t data;
8131 note_type = NT_PSINFO;
8132#else
8133 prpsinfo_t data;
8134 note_type = NT_PRPSINFO;
8135#endif
8136
8137 memset (&data, 0, sizeof (data));
8138 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8139 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 8140 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8141 note_name, note_type, &data, sizeof (data));
8142}
8143#endif /* PSINFO_T or PRPSINFO_T */
8144
8145#if defined (HAVE_PRSTATUS_T)
8146char *
217aa764
AM
8147elfcore_write_prstatus (bfd *abfd,
8148 char *buf,
8149 int *bufsiz,
8150 long pid,
8151 int cursig,
8152 const void *gregs)
7c76fa91
MS
8153{
8154 prstatus_t prstat;
8155 char *note_name = "CORE";
8156
8157 memset (&prstat, 0, sizeof (prstat));
8158 prstat.pr_pid = pid;
8159 prstat.pr_cursig = cursig;
c106e334 8160 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 8161 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8162 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
8163}
8164#endif /* HAVE_PRSTATUS_T */
8165
51316059
MS
8166#if defined (HAVE_LWPSTATUS_T)
8167char *
217aa764
AM
8168elfcore_write_lwpstatus (bfd *abfd,
8169 char *buf,
8170 int *bufsiz,
8171 long pid,
8172 int cursig,
8173 const void *gregs)
51316059
MS
8174{
8175 lwpstatus_t lwpstat;
8176 char *note_name = "CORE";
8177
8178 memset (&lwpstat, 0, sizeof (lwpstat));
8179 lwpstat.pr_lwpid = pid >> 16;
8180 lwpstat.pr_cursig = cursig;
8181#if defined (HAVE_LWPSTATUS_T_PR_REG)
8182 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8183#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8184#if !defined(gregs)
8185 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8186 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8187#else
8188 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8189 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8190#endif
8191#endif
47d9a591 8192 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8193 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8194}
8195#endif /* HAVE_LWPSTATUS_T */
8196
7c76fa91
MS
8197#if defined (HAVE_PSTATUS_T)
8198char *
217aa764
AM
8199elfcore_write_pstatus (bfd *abfd,
8200 char *buf,
8201 int *bufsiz,
8202 long pid,
6c10990d
NC
8203 int cursig ATTRIBUTE_UNUSED,
8204 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91
MS
8205{
8206 pstatus_t pstat;
8207 char *note_name = "CORE";
8208
51316059
MS
8209 memset (&pstat, 0, sizeof (pstat));
8210 pstat.pr_pid = pid & 0xffff;
47d9a591 8211 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8212 NT_PSTATUS, &pstat, sizeof (pstat));
8213 return buf;
7c76fa91
MS
8214}
8215#endif /* HAVE_PSTATUS_T */
8216
8217char *
217aa764
AM
8218elfcore_write_prfpreg (bfd *abfd,
8219 char *buf,
8220 int *bufsiz,
8221 const void *fpregs,
8222 int size)
7c76fa91
MS
8223{
8224 char *note_name = "CORE";
47d9a591 8225 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8226 note_name, NT_FPREGSET, fpregs, size);
8227}
8228
8229char *
217aa764
AM
8230elfcore_write_prxfpreg (bfd *abfd,
8231 char *buf,
8232 int *bufsiz,
8233 const void *xfpregs,
8234 int size)
7c76fa91
MS
8235{
8236 char *note_name = "LINUX";
47d9a591 8237 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8238 note_name, NT_PRXFPREG, xfpregs, size);
8239}
8240
b34976b6 8241static bfd_boolean
217aa764 8242elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 8243{
c044fabd
KH
8244 char *buf;
8245 char *p;
252b5132
RH
8246
8247 if (size <= 0)
b34976b6 8248 return TRUE;
252b5132 8249
dc810e39 8250 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 8251 return FALSE;
252b5132 8252
dc810e39 8253 buf = bfd_malloc (size);
252b5132 8254 if (buf == NULL)
b34976b6 8255 return FALSE;
252b5132 8256
dc810e39 8257 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
8258 {
8259 error:
8260 free (buf);
b34976b6 8261 return FALSE;
252b5132
RH
8262 }
8263
8264 p = buf;
8265 while (p < buf + size)
8266 {
c044fabd
KH
8267 /* FIXME: bad alignment assumption. */
8268 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8269 Elf_Internal_Note in;
8270
dc810e39 8271 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8272
dc810e39 8273 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
8274 in.namedata = xnp->name;
8275
dc810e39 8276 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8277 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8278 in.descpos = offset + (in.descdata - buf);
8279
50b2bdb7
AM
8280 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
8281 {
8282 if (! elfcore_grok_netbsd_note (abfd, &in))
8283 goto error;
8284 }
07c6e936
NC
8285 else if (strncmp (in.namedata, "QNX", 3) == 0)
8286 {
8287 if (! elfcore_grok_nto_note (abfd, &in))
8288 goto error;
8289 }
50b2bdb7
AM
8290 else
8291 {
8292 if (! elfcore_grok_note (abfd, &in))
8293 goto error;
8294 }
252b5132
RH
8295
8296 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8297 }
8298
8299 free (buf);
b34976b6 8300 return TRUE;
252b5132 8301}
98d8431c
JB
8302\f
8303/* Providing external access to the ELF program header table. */
8304
8305/* Return an upper bound on the number of bytes required to store a
8306 copy of ABFD's program header table entries. Return -1 if an error
8307 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8308
98d8431c 8309long
217aa764 8310bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8311{
8312 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8313 {
8314 bfd_set_error (bfd_error_wrong_format);
8315 return -1;
8316 }
8317
936e320b 8318 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8319}
8320
98d8431c
JB
8321/* Copy ABFD's program header table entries to *PHDRS. The entries
8322 will be stored as an array of Elf_Internal_Phdr structures, as
8323 defined in include/elf/internal.h. To find out how large the
8324 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
8325
8326 Return the number of program header table entries read, or -1 if an
8327 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 8328
98d8431c 8329int
217aa764 8330bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
8331{
8332 int num_phdrs;
8333
8334 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8335 {
8336 bfd_set_error (bfd_error_wrong_format);
8337 return -1;
8338 }
8339
8340 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8341 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8342 num_phdrs * sizeof (Elf_Internal_Phdr));
8343
8344 return num_phdrs;
8345}
ae4221d7
L
8346
8347void
217aa764 8348_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 8349{
d3b05f8d 8350#ifdef BFD64
ae4221d7
L
8351 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8352
8353 i_ehdrp = elf_elfheader (abfd);
8354 if (i_ehdrp == NULL)
8355 sprintf_vma (buf, value);
8356 else
8357 {
8358 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8359 {
ae4221d7 8360#if BFD_HOST_64BIT_LONG
cc55aec9 8361 sprintf (buf, "%016lx", value);
ae4221d7 8362#else
cc55aec9
AM
8363 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
8364 _bfd_int64_low (value));
ae4221d7 8365#endif
cc55aec9 8366 }
ae4221d7
L
8367 else
8368 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
8369 }
d3b05f8d
L
8370#else
8371 sprintf_vma (buf, value);
8372#endif
ae4221d7
L
8373}
8374
8375void
217aa764 8376_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 8377{
d3b05f8d 8378#ifdef BFD64
ae4221d7
L
8379 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8380
8381 i_ehdrp = elf_elfheader (abfd);
8382 if (i_ehdrp == NULL)
8383 fprintf_vma ((FILE *) stream, value);
8384 else
8385 {
8386 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8387 {
ae4221d7 8388#if BFD_HOST_64BIT_LONG
cc55aec9 8389 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 8390#else
cc55aec9
AM
8391 fprintf ((FILE *) stream, "%08lx%08lx",
8392 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 8393#endif
cc55aec9 8394 }
ae4221d7
L
8395 else
8396 fprintf ((FILE *) stream, "%08lx",
8397 (unsigned long) (value & 0xffffffff));
8398 }
d3b05f8d
L
8399#else
8400 fprintf_vma ((FILE *) stream, value);
8401#endif
ae4221d7 8402}
db6751f2
JJ
8403
8404enum elf_reloc_type_class
217aa764 8405_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8406{
8407 return reloc_class_normal;
8408}
f8df10f4 8409
47d9a591 8410/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8411 relocation against a local symbol. */
8412
8413bfd_vma
217aa764
AM
8414_bfd_elf_rela_local_sym (bfd *abfd,
8415 Elf_Internal_Sym *sym,
8517fae7 8416 asection **psec,
217aa764 8417 Elf_Internal_Rela *rel)
f8df10f4 8418{
8517fae7 8419 asection *sec = *psec;
f8df10f4
JJ
8420 bfd_vma relocation;
8421
8422 relocation = (sec->output_section->vma
8423 + sec->output_offset
8424 + sym->st_value);
8425 if ((sec->flags & SEC_MERGE)
c629eae0 8426 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8427 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8428 {
f8df10f4 8429 rel->r_addend =
8517fae7 8430 _bfd_merged_section_offset (abfd, psec,
65765700 8431 elf_section_data (sec)->sec_info,
753731ee
AM
8432 sym->st_value + rel->r_addend);
8433 if (sec != *psec)
8434 {
8435 /* If we have changed the section, and our original section is
8436 marked with SEC_EXCLUDE, it means that the original
8437 SEC_MERGE section has been completely subsumed in some
8438 other SEC_MERGE section. In this case, we need to leave
8439 some info around for --emit-relocs. */
8440 if ((sec->flags & SEC_EXCLUDE) != 0)
8441 sec->kept_section = *psec;
8442 sec = *psec;
8443 }
8517fae7
AM
8444 rel->r_addend -= relocation;
8445 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8446 }
8447 return relocation;
8448}
c629eae0
JJ
8449
8450bfd_vma
217aa764
AM
8451_bfd_elf_rel_local_sym (bfd *abfd,
8452 Elf_Internal_Sym *sym,
8453 asection **psec,
8454 bfd_vma addend)
47d9a591 8455{
c629eae0
JJ
8456 asection *sec = *psec;
8457
68bfbfcc 8458 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8459 return sym->st_value + addend;
8460
8461 return _bfd_merged_section_offset (abfd, psec,
65765700 8462 elf_section_data (sec)->sec_info,
753731ee 8463 sym->st_value + addend);
c629eae0
JJ
8464}
8465
8466bfd_vma
217aa764 8467_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8468 struct bfd_link_info *info,
217aa764
AM
8469 asection *sec,
8470 bfd_vma offset)
c629eae0 8471{
68bfbfcc 8472 switch (sec->sec_info_type)
65765700
JJ
8473 {
8474 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8475 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8476 offset);
65765700 8477 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8478 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8479 default:
8480 return offset;
8481 }
c629eae0 8482}
3333a7c3
RM
8483\f
8484/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8485 reconstruct an ELF file by reading the segments out of remote memory
8486 based on the ELF file header at EHDR_VMA and the ELF program headers it
8487 points to. If not null, *LOADBASEP is filled in with the difference
8488 between the VMAs from which the segments were read, and the VMAs the
8489 file headers (and hence BFD's idea of each section's VMA) put them at.
8490
8491 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8492 remote memory at target address VMA into the local buffer at MYADDR; it
8493 should return zero on success or an `errno' code on failure. TEMPL must
8494 be a BFD for an ELF target with the word size and byte order found in
8495 the remote memory. */
8496
8497bfd *
217aa764
AM
8498bfd_elf_bfd_from_remote_memory
8499 (bfd *templ,
8500 bfd_vma ehdr_vma,
8501 bfd_vma *loadbasep,
f075ee0c 8502 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8503{
8504 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8505 (templ, ehdr_vma, loadbasep, target_read_memory);
8506}
4c45e5c9
JJ
8507\f
8508long
c9727e01
AM
8509_bfd_elf_get_synthetic_symtab (bfd *abfd,
8510 long symcount ATTRIBUTE_UNUSED,
8511 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8512 long dynsymcount,
c9727e01
AM
8513 asymbol **dynsyms,
8514 asymbol **ret)
4c45e5c9
JJ
8515{
8516 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8517 asection *relplt;
8518 asymbol *s;
8519 const char *relplt_name;
8520 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8521 arelent *p;
8522 long count, i, n;
8523 size_t size;
8524 Elf_Internal_Shdr *hdr;
8525 char *names;
8526 asection *plt;
8527
8615f3f2
AM
8528 *ret = NULL;
8529
90e3cdf2
JJ
8530 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8531 return 0;
8532
8615f3f2
AM
8533 if (dynsymcount <= 0)
8534 return 0;
8535
4c45e5c9
JJ
8536 if (!bed->plt_sym_val)
8537 return 0;
8538
8539 relplt_name = bed->relplt_name;
8540 if (relplt_name == NULL)
8541 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8542 relplt = bfd_get_section_by_name (abfd, relplt_name);
8543 if (relplt == NULL)
8544 return 0;
8545
8546 hdr = &elf_section_data (relplt)->this_hdr;
8547 if (hdr->sh_link != elf_dynsymtab (abfd)
8548 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8549 return 0;
8550
8551 plt = bfd_get_section_by_name (abfd, ".plt");
8552 if (plt == NULL)
8553 return 0;
8554
8555 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8556 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8557 return -1;
8558
eea6121a 8559 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8560 size = count * sizeof (asymbol);
8561 p = relplt->relocation;
8562 for (i = 0; i < count; i++, s++, p++)
8563 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8564
8565 s = *ret = bfd_malloc (size);
8566 if (s == NULL)
8567 return -1;
8568
8569 names = (char *) (s + count);
8570 p = relplt->relocation;
8571 n = 0;
8572 for (i = 0; i < count; i++, s++, p++)
8573 {
8574 size_t len;
8575 bfd_vma addr;
8576
8577 addr = bed->plt_sym_val (i, plt, p);
8578 if (addr == (bfd_vma) -1)
8579 continue;
8580
8581 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8582 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8583 we are defining a symbol, ensure one of them is set. */
8584 if ((s->flags & BSF_LOCAL) == 0)
8585 s->flags |= BSF_GLOBAL;
4c45e5c9
JJ
8586 s->section = plt;
8587 s->value = addr - plt->vma;
8588 s->name = names;
8589 len = strlen ((*p->sym_ptr_ptr)->name);
8590 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8591 names += len;
8592 memcpy (names, "@plt", sizeof ("@plt"));
8593 names += sizeof ("@plt");
8594 ++n;
8595 }
8596
8597 return n;
8598}
3d7f7666
L
8599
8600/* Sort symbol by binding and section. We want to put definitions
8601 sorted by section at the beginning. */
8602
8603static int
8604elf_sort_elf_symbol (const void *arg1, const void *arg2)
8605{
8606 const Elf_Internal_Sym *s1;
8607 const Elf_Internal_Sym *s2;
8608 int shndx;
8609
8610 /* Make sure that undefined symbols are at the end. */
8611 s1 = (const Elf_Internal_Sym *) arg1;
8612 if (s1->st_shndx == SHN_UNDEF)
8613 return 1;
8614 s2 = (const Elf_Internal_Sym *) arg2;
8615 if (s2->st_shndx == SHN_UNDEF)
8616 return -1;
8617
8618 /* Sorted by section index. */
8619 shndx = s1->st_shndx - s2->st_shndx;
8620 if (shndx != 0)
8621 return shndx;
8622
8623 /* Sorted by binding. */
8624 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8625}
8626
8627struct elf_symbol
8628{
8629 Elf_Internal_Sym *sym;
8630 const char *name;
8631};
8632
8633static int
8634elf_sym_name_compare (const void *arg1, const void *arg2)
8635{
8636 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8637 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8638 return strcmp (s1->name, s2->name);
8639}
8640
8641/* Check if 2 sections define the same set of local and global
8642 symbols. */
8643
8644bfd_boolean
8645bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8646{
8647 bfd *bfd1, *bfd2;
8648 const struct elf_backend_data *bed1, *bed2;
8649 Elf_Internal_Shdr *hdr1, *hdr2;
8650 bfd_size_type symcount1, symcount2;
8651 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8652 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8653 Elf_Internal_Sym *isymend;
8654 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8655 bfd_size_type count1, count2, i;
8656 int shndx1, shndx2;
8657 bfd_boolean result;
8658
8659 bfd1 = sec1->owner;
8660 bfd2 = sec2->owner;
8661
8662 /* If both are .gnu.linkonce sections, they have to have the same
8663 section name. */
8664 if (strncmp (sec1->name, ".gnu.linkonce",
8665 sizeof ".gnu.linkonce" - 1) == 0
8666 && strncmp (sec2->name, ".gnu.linkonce",
8667 sizeof ".gnu.linkonce" - 1) == 0)
8668 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8669 sec2->name + sizeof ".gnu.linkonce") == 0;
8670
8671 /* Both sections have to be in ELF. */
8672 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8673 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8674 return FALSE;
8675
8676 if (elf_section_type (sec1) != elf_section_type (sec2))
8677 return FALSE;
8678
8679 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8680 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8681 {
8682 /* If both are members of section groups, they have to have the
8683 same group name. */
8684 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8685 return FALSE;
8686 }
8687
8688 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8689 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8690 if (shndx1 == -1 || shndx2 == -1)
8691 return FALSE;
8692
8693 bed1 = get_elf_backend_data (bfd1);
8694 bed2 = get_elf_backend_data (bfd2);
8695 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8696 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8697 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8698 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8699
8700 if (symcount1 == 0 || symcount2 == 0)
8701 return FALSE;
8702
8703 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8704 NULL, NULL, NULL);
8705 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8706 NULL, NULL, NULL);
8707
8708 result = FALSE;
8709 if (isymbuf1 == NULL || isymbuf2 == NULL)
8710 goto done;
8711
8712 /* Sort symbols by binding and section. Global definitions are at
8713 the beginning. */
8714 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8715 elf_sort_elf_symbol);
8716 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8717 elf_sort_elf_symbol);
8718
8719 /* Count definitions in the section. */
8720 count1 = 0;
8721 for (isym = isymbuf1, isymend = isym + symcount1;
8722 isym < isymend; isym++)
8723 {
8724 if (isym->st_shndx == (unsigned int) shndx1)
8725 {
8726 if (count1 == 0)
8727 isymstart1 = isym;
8728 count1++;
8729 }
8730
8731 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8732 break;
8733 }
8734
8735 count2 = 0;
8736 for (isym = isymbuf2, isymend = isym + symcount2;
8737 isym < isymend; isym++)
8738 {
8739 if (isym->st_shndx == (unsigned int) shndx2)
8740 {
8741 if (count2 == 0)
8742 isymstart2 = isym;
8743 count2++;
8744 }
8745
8746 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8747 break;
8748 }
8749
8750 if (count1 == 0 || count2 == 0 || count1 != count2)
8751 goto done;
8752
8753 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8754 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8755
8756 if (symtable1 == NULL || symtable2 == NULL)
8757 goto done;
8758
8759 symp = symtable1;
8760 for (isym = isymstart1, isymend = isym + count1;
8761 isym < isymend; isym++)
8762 {
8763 symp->sym = isym;
8764 symp->name = bfd_elf_string_from_elf_section (bfd1,
8765 hdr1->sh_link,
8766 isym->st_name);
8767 symp++;
8768 }
8769
8770 symp = symtable2;
8771 for (isym = isymstart2, isymend = isym + count1;
8772 isym < isymend; isym++)
8773 {
8774 symp->sym = isym;
8775 symp->name = bfd_elf_string_from_elf_section (bfd2,
8776 hdr2->sh_link,
8777 isym->st_name);
8778 symp++;
8779 }
8780
8781 /* Sort symbol by name. */
8782 qsort (symtable1, count1, sizeof (struct elf_symbol),
8783 elf_sym_name_compare);
8784 qsort (symtable2, count1, sizeof (struct elf_symbol),
8785 elf_sym_name_compare);
8786
8787 for (i = 0; i < count1; i++)
8788 /* Two symbols must have the same binding, type and name. */
8789 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8790 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8791 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8792 goto done;
8793
8794 result = TRUE;
8795
8796done:
8797 if (symtable1)
8798 free (symtable1);
8799 if (symtable2)
8800 free (symtable2);
8801 if (isymbuf1)
8802 free (isymbuf1);
8803 if (isymbuf2)
8804 free (isymbuf2);
8805
8806 return result;
8807}
3b22753a
L
8808
8809/* It is only used by x86-64 so far. */
8810asection _bfd_elf_large_com_section
8811 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 8812 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871
L
8813
8814/* Return TRUE if 2 section types are compatible. */
8815
8816bfd_boolean
8817_bfd_elf_match_sections_by_type (bfd *abfd, const asection *asec,
8818 bfd *bbfd, const asection *bsec)
8819{
8820 if (asec == NULL
8821 || bsec == NULL
8822 || abfd->xvec->flavour != bfd_target_elf_flavour
8823 || bbfd->xvec->flavour != bfd_target_elf_flavour)
8824 return TRUE;
8825
8826 return elf_section_type (asec) == elf_section_type (bsec);
8827}