]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
Fix grammar.
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
fad2f28d 4 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
1b74d094
BW
22/*
23SECTION
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
fdc90cb4
JJ
209/* DT_GNU_HASH hash function. Do not change this function; you will
210 cause invalid hash tables to be generated. */
211
212unsigned long
213bfd_elf_gnu_hash (const char *namearg)
214{
215 const unsigned char *name = (const unsigned char *) namearg;
216 unsigned long h = 5381;
217 unsigned char ch;
218
219 while ((ch = *name++) != '\0')
220 h = (h << 5) + h + ch;
221 return h & 0xffffffff;
222}
223
b34976b6 224bfd_boolean
217aa764 225bfd_elf_mkobject (bfd *abfd)
252b5132 226{
62d7a5f6
AM
227 if (abfd->tdata.any == NULL)
228 {
229 abfd->tdata.any = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
230 if (abfd->tdata.any == NULL)
231 return FALSE;
232 }
233
234 elf_tdata (abfd)->program_header_size = (bfd_size_type) -1;
252b5132 235
b34976b6 236 return TRUE;
252b5132
RH
237}
238
b34976b6 239bfd_boolean
217aa764 240bfd_elf_mkcorefile (bfd *abfd)
252b5132 241{
c044fabd 242 /* I think this can be done just like an object file. */
252b5132
RH
243 return bfd_elf_mkobject (abfd);
244}
245
246char *
217aa764 247bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
248{
249 Elf_Internal_Shdr **i_shdrp;
f075ee0c 250 bfd_byte *shstrtab = NULL;
dc810e39
AM
251 file_ptr offset;
252 bfd_size_type shstrtabsize;
252b5132
RH
253
254 i_shdrp = elf_elfsections (abfd);
255 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 256 return NULL;
252b5132 257
f075ee0c 258 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
259 if (shstrtab == NULL)
260 {
c044fabd 261 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
262 offset = i_shdrp[shindex]->sh_offset;
263 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
264
265 /* Allocate and clear an extra byte at the end, to prevent crashes
266 in case the string table is not terminated. */
267 if (shstrtabsize + 1 == 0
268 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
269 || bfd_seek (abfd, offset, SEEK_SET) != 0)
270 shstrtab = NULL;
271 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
272 {
273 if (bfd_get_error () != bfd_error_system_call)
274 bfd_set_error (bfd_error_file_truncated);
275 shstrtab = NULL;
276 }
277 else
278 shstrtab[shstrtabsize] = '\0';
217aa764 279 i_shdrp[shindex]->contents = shstrtab;
252b5132 280 }
f075ee0c 281 return (char *) shstrtab;
252b5132
RH
282}
283
284char *
217aa764
AM
285bfd_elf_string_from_elf_section (bfd *abfd,
286 unsigned int shindex,
287 unsigned int strindex)
252b5132
RH
288{
289 Elf_Internal_Shdr *hdr;
290
291 if (strindex == 0)
292 return "";
293
294 hdr = elf_elfsections (abfd)[shindex];
295
296 if (hdr->contents == NULL
297 && bfd_elf_get_str_section (abfd, shindex) == NULL)
298 return NULL;
299
300 if (strindex >= hdr->sh_size)
301 {
1b3a8575 302 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 303 (*_bfd_error_handler)
d003868e
AM
304 (_("%B: invalid string offset %u >= %lu for section `%s'"),
305 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 306 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 307 ? ".shstrtab"
1b3a8575 308 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
309 return "";
310 }
311
312 return ((char *) hdr->contents) + strindex;
313}
314
6cdc0ccc
AM
315/* Read and convert symbols to internal format.
316 SYMCOUNT specifies the number of symbols to read, starting from
317 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
318 are non-NULL, they are used to store the internal symbols, external
319 symbols, and symbol section index extensions, respectively. */
320
321Elf_Internal_Sym *
217aa764
AM
322bfd_elf_get_elf_syms (bfd *ibfd,
323 Elf_Internal_Shdr *symtab_hdr,
324 size_t symcount,
325 size_t symoffset,
326 Elf_Internal_Sym *intsym_buf,
327 void *extsym_buf,
328 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
329{
330 Elf_Internal_Shdr *shndx_hdr;
217aa764 331 void *alloc_ext;
df622259 332 const bfd_byte *esym;
6cdc0ccc
AM
333 Elf_External_Sym_Shndx *alloc_extshndx;
334 Elf_External_Sym_Shndx *shndx;
335 Elf_Internal_Sym *isym;
336 Elf_Internal_Sym *isymend;
9c5bfbb7 337 const struct elf_backend_data *bed;
6cdc0ccc
AM
338 size_t extsym_size;
339 bfd_size_type amt;
340 file_ptr pos;
341
342 if (symcount == 0)
343 return intsym_buf;
344
345 /* Normal syms might have section extension entries. */
346 shndx_hdr = NULL;
347 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
348 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
349
350 /* Read the symbols. */
351 alloc_ext = NULL;
352 alloc_extshndx = NULL;
353 bed = get_elf_backend_data (ibfd);
354 extsym_size = bed->s->sizeof_sym;
355 amt = symcount * extsym_size;
356 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
357 if (extsym_buf == NULL)
358 {
d0fb9a8d 359 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
360 extsym_buf = alloc_ext;
361 }
362 if (extsym_buf == NULL
363 || bfd_seek (ibfd, pos, SEEK_SET) != 0
364 || bfd_bread (extsym_buf, amt, ibfd) != amt)
365 {
366 intsym_buf = NULL;
367 goto out;
368 }
369
370 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
371 extshndx_buf = NULL;
372 else
373 {
374 amt = symcount * sizeof (Elf_External_Sym_Shndx);
375 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
376 if (extshndx_buf == NULL)
377 {
d0fb9a8d
JJ
378 alloc_extshndx = bfd_malloc2 (symcount,
379 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
380 extshndx_buf = alloc_extshndx;
381 }
382 if (extshndx_buf == NULL
383 || bfd_seek (ibfd, pos, SEEK_SET) != 0
384 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
385 {
386 intsym_buf = NULL;
387 goto out;
388 }
389 }
390
391 if (intsym_buf == NULL)
392 {
d0fb9a8d 393 intsym_buf = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
6cdc0ccc
AM
394 if (intsym_buf == NULL)
395 goto out;
396 }
397
398 /* Convert the symbols to internal form. */
399 isymend = intsym_buf + symcount;
400 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
401 isym < isymend;
402 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 403 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
404
405 out:
406 if (alloc_ext != NULL)
407 free (alloc_ext);
408 if (alloc_extshndx != NULL)
409 free (alloc_extshndx);
410
411 return intsym_buf;
412}
413
5cab59f6
AM
414/* Look up a symbol name. */
415const char *
be8dd2ca
AM
416bfd_elf_sym_name (bfd *abfd,
417 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
418 Elf_Internal_Sym *isym,
419 asection *sym_sec)
5cab59f6 420{
26c61ae5 421 const char *name;
5cab59f6 422 unsigned int iname = isym->st_name;
be8dd2ca 423 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 424
138f35cc
JJ
425 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
426 /* Check for a bogus st_shndx to avoid crashing. */
427 && isym->st_shndx < elf_numsections (abfd)
428 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
429 {
430 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
431 shindex = elf_elfheader (abfd)->e_shstrndx;
432 }
433
26c61ae5
L
434 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
435 if (name == NULL)
436 name = "(null)";
437 else if (sym_sec && *name == '\0')
438 name = bfd_section_name (abfd, sym_sec);
439
440 return name;
5cab59f6
AM
441}
442
dbb410c3
AM
443/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
444 sections. The first element is the flags, the rest are section
445 pointers. */
446
447typedef union elf_internal_group {
448 Elf_Internal_Shdr *shdr;
449 unsigned int flags;
450} Elf_Internal_Group;
451
b885599b
AM
452/* Return the name of the group signature symbol. Why isn't the
453 signature just a string? */
454
455static const char *
217aa764 456group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 457{
9dce4196 458 Elf_Internal_Shdr *hdr;
9dce4196
AM
459 unsigned char esym[sizeof (Elf64_External_Sym)];
460 Elf_External_Sym_Shndx eshndx;
461 Elf_Internal_Sym isym;
b885599b 462
13792e9d
L
463 /* First we need to ensure the symbol table is available. Make sure
464 that it is a symbol table section. */
465 hdr = elf_elfsections (abfd) [ghdr->sh_link];
466 if (hdr->sh_type != SHT_SYMTAB
467 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
468 return NULL;
469
9dce4196
AM
470 /* Go read the symbol. */
471 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
472 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
473 &isym, esym, &eshndx) == NULL)
b885599b 474 return NULL;
9dce4196 475
26c61ae5 476 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
477}
478
dbb410c3
AM
479/* Set next_in_group list pointer, and group name for NEWSECT. */
480
b34976b6 481static bfd_boolean
217aa764 482setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
483{
484 unsigned int num_group = elf_tdata (abfd)->num_group;
485
486 /* If num_group is zero, read in all SHT_GROUP sections. The count
487 is set to -1 if there are no SHT_GROUP sections. */
488 if (num_group == 0)
489 {
490 unsigned int i, shnum;
491
492 /* First count the number of groups. If we have a SHT_GROUP
493 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 494 shnum = elf_numsections (abfd);
dbb410c3
AM
495 num_group = 0;
496 for (i = 0; i < shnum; i++)
497 {
498 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
499 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
500 num_group += 1;
501 }
502
503 if (num_group == 0)
20dbb49d
L
504 {
505 num_group = (unsigned) -1;
506 elf_tdata (abfd)->num_group = num_group;
507 }
508 else
dbb410c3
AM
509 {
510 /* We keep a list of elf section headers for group sections,
511 so we can find them quickly. */
20dbb49d 512 bfd_size_type amt;
d0fb9a8d 513
20dbb49d 514 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
515 elf_tdata (abfd)->group_sect_ptr
516 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 517 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 518 return FALSE;
dbb410c3
AM
519
520 num_group = 0;
521 for (i = 0; i < shnum; i++)
522 {
523 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
524 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
525 {
973ffd63 526 unsigned char *src;
dbb410c3
AM
527 Elf_Internal_Group *dest;
528
529 /* Add to list of sections. */
530 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
531 num_group += 1;
532
533 /* Read the raw contents. */
534 BFD_ASSERT (sizeof (*dest) >= 4);
535 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
536 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
537 sizeof (*dest) / 4);
dbb410c3
AM
538 if (shdr->contents == NULL
539 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
540 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
541 != shdr->sh_size))
b34976b6 542 return FALSE;
dbb410c3
AM
543
544 /* Translate raw contents, a flag word followed by an
545 array of elf section indices all in target byte order,
546 to the flag word followed by an array of elf section
547 pointers. */
548 src = shdr->contents + shdr->sh_size;
549 dest = (Elf_Internal_Group *) (shdr->contents + amt);
550 while (1)
551 {
552 unsigned int idx;
553
554 src -= 4;
555 --dest;
556 idx = H_GET_32 (abfd, src);
557 if (src == shdr->contents)
558 {
559 dest->flags = idx;
b885599b
AM
560 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
561 shdr->bfd_section->flags
562 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
563 break;
564 }
565 if (idx >= shnum)
566 {
567 ((*_bfd_error_handler)
d003868e 568 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
569 idx = 0;
570 }
571 dest->shdr = elf_elfsections (abfd)[idx];
572 }
573 }
574 }
575 }
576 }
577
578 if (num_group != (unsigned) -1)
579 {
580 unsigned int i;
581
582 for (i = 0; i < num_group; i++)
583 {
584 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
585 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
586 unsigned int n_elt = shdr->sh_size / 4;
587
588 /* Look through this group's sections to see if current
589 section is a member. */
590 while (--n_elt != 0)
591 if ((++idx)->shdr == hdr)
592 {
e0e8c97f 593 asection *s = NULL;
dbb410c3
AM
594
595 /* We are a member of this group. Go looking through
596 other members to see if any others are linked via
597 next_in_group. */
598 idx = (Elf_Internal_Group *) shdr->contents;
599 n_elt = shdr->sh_size / 4;
600 while (--n_elt != 0)
601 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 602 && elf_next_in_group (s) != NULL)
dbb410c3
AM
603 break;
604 if (n_elt != 0)
605 {
dbb410c3
AM
606 /* Snarf the group name from other member, and
607 insert current section in circular list. */
945906ff
AM
608 elf_group_name (newsect) = elf_group_name (s);
609 elf_next_in_group (newsect) = elf_next_in_group (s);
610 elf_next_in_group (s) = newsect;
dbb410c3
AM
611 }
612 else
613 {
dbb410c3
AM
614 const char *gname;
615
b885599b
AM
616 gname = group_signature (abfd, shdr);
617 if (gname == NULL)
b34976b6 618 return FALSE;
945906ff 619 elf_group_name (newsect) = gname;
dbb410c3
AM
620
621 /* Start a circular list with one element. */
945906ff 622 elf_next_in_group (newsect) = newsect;
dbb410c3 623 }
b885599b 624
9dce4196
AM
625 /* If the group section has been created, point to the
626 new member. */
dbb410c3 627 if (shdr->bfd_section != NULL)
945906ff 628 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 629
dbb410c3
AM
630 i = num_group - 1;
631 break;
632 }
633 }
634 }
635
945906ff 636 if (elf_group_name (newsect) == NULL)
dbb410c3 637 {
d003868e
AM
638 (*_bfd_error_handler) (_("%B: no group info for section %A"),
639 abfd, newsect);
dbb410c3 640 }
b34976b6 641 return TRUE;
dbb410c3
AM
642}
643
3d7f7666 644bfd_boolean
dd863624 645_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
646{
647 unsigned int i;
648 unsigned int num_group = elf_tdata (abfd)->num_group;
649 bfd_boolean result = TRUE;
dd863624
L
650 asection *s;
651
652 /* Process SHF_LINK_ORDER. */
653 for (s = abfd->sections; s != NULL; s = s->next)
654 {
655 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
656 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
657 {
658 unsigned int elfsec = this_hdr->sh_link;
659 /* FIXME: The old Intel compiler and old strip/objcopy may
660 not set the sh_link or sh_info fields. Hence we could
661 get the situation where elfsec is 0. */
662 if (elfsec == 0)
663 {
664 const struct elf_backend_data *bed
665 = get_elf_backend_data (abfd);
666 if (bed->link_order_error_handler)
667 bed->link_order_error_handler
668 (_("%B: warning: sh_link not set for section `%A'"),
669 abfd, s);
670 }
671 else
672 {
25bbc984
L
673 asection *link;
674
dd863624 675 this_hdr = elf_elfsections (abfd)[elfsec];
25bbc984
L
676
677 /* PR 1991, 2008:
678 Some strip/objcopy may leave an incorrect value in
679 sh_link. We don't want to proceed. */
680 link = this_hdr->bfd_section;
681 if (link == NULL)
682 {
683 (*_bfd_error_handler)
684 (_("%B: sh_link [%d] in section `%A' is incorrect"),
685 s->owner, s, elfsec);
686 result = FALSE;
687 }
688
689 elf_linked_to_section (s) = link;
dd863624
L
690 }
691 }
692 }
3d7f7666 693
dd863624 694 /* Process section groups. */
3d7f7666
L
695 if (num_group == (unsigned) -1)
696 return result;
697
698 for (i = 0; i < num_group; i++)
699 {
700 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
701 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
702 unsigned int n_elt = shdr->sh_size / 4;
703
704 while (--n_elt != 0)
705 if ((++idx)->shdr->bfd_section)
706 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
707 else if (idx->shdr->sh_type == SHT_RELA
708 || idx->shdr->sh_type == SHT_REL)
709 /* We won't include relocation sections in section groups in
710 output object files. We adjust the group section size here
711 so that relocatable link will work correctly when
712 relocation sections are in section group in input object
713 files. */
714 shdr->bfd_section->size -= 4;
715 else
716 {
717 /* There are some unknown sections in the group. */
718 (*_bfd_error_handler)
d003868e
AM
719 (_("%B: unknown [%d] section `%s' in group [%s]"),
720 abfd,
3d7f7666 721 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
722 bfd_elf_string_from_elf_section (abfd,
723 (elf_elfheader (abfd)
724 ->e_shstrndx),
725 idx->shdr->sh_name),
3d7f7666
L
726 shdr->bfd_section->name);
727 result = FALSE;
728 }
729 }
730 return result;
731}
732
72adc230
AM
733bfd_boolean
734bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
735{
736 return elf_next_in_group (sec) != NULL;
737}
738
252b5132
RH
739/* Make a BFD section from an ELF section. We store a pointer to the
740 BFD section in the bfd_section field of the header. */
741
b34976b6 742bfd_boolean
217aa764
AM
743_bfd_elf_make_section_from_shdr (bfd *abfd,
744 Elf_Internal_Shdr *hdr,
6dc132d9
L
745 const char *name,
746 int shindex)
252b5132
RH
747{
748 asection *newsect;
749 flagword flags;
9c5bfbb7 750 const struct elf_backend_data *bed;
252b5132
RH
751
752 if (hdr->bfd_section != NULL)
753 {
754 BFD_ASSERT (strcmp (name,
755 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 756 return TRUE;
252b5132
RH
757 }
758
759 newsect = bfd_make_section_anyway (abfd, name);
760 if (newsect == NULL)
b34976b6 761 return FALSE;
252b5132 762
1829f4b2
AM
763 hdr->bfd_section = newsect;
764 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 765 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 766
2f89ff8d
L
767 /* Always use the real type/flags. */
768 elf_section_type (newsect) = hdr->sh_type;
769 elf_section_flags (newsect) = hdr->sh_flags;
770
252b5132
RH
771 newsect->filepos = hdr->sh_offset;
772
773 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
774 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
775 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 776 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 777 return FALSE;
252b5132
RH
778
779 flags = SEC_NO_FLAGS;
780 if (hdr->sh_type != SHT_NOBITS)
781 flags |= SEC_HAS_CONTENTS;
dbb410c3 782 if (hdr->sh_type == SHT_GROUP)
b3096250 783 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
784 if ((hdr->sh_flags & SHF_ALLOC) != 0)
785 {
786 flags |= SEC_ALLOC;
787 if (hdr->sh_type != SHT_NOBITS)
788 flags |= SEC_LOAD;
789 }
790 if ((hdr->sh_flags & SHF_WRITE) == 0)
791 flags |= SEC_READONLY;
792 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
793 flags |= SEC_CODE;
794 else if ((flags & SEC_LOAD) != 0)
795 flags |= SEC_DATA;
f5fa8ca2
JJ
796 if ((hdr->sh_flags & SHF_MERGE) != 0)
797 {
798 flags |= SEC_MERGE;
799 newsect->entsize = hdr->sh_entsize;
800 if ((hdr->sh_flags & SHF_STRINGS) != 0)
801 flags |= SEC_STRINGS;
802 }
dbb410c3
AM
803 if (hdr->sh_flags & SHF_GROUP)
804 if (!setup_group (abfd, hdr, newsect))
b34976b6 805 return FALSE;
13ae64f3
JJ
806 if ((hdr->sh_flags & SHF_TLS) != 0)
807 flags |= SEC_THREAD_LOCAL;
252b5132 808
3d2b39cf 809 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 810 {
3d2b39cf
L
811 /* The debugging sections appear to be recognized only by name,
812 not any sort of flag. Their SEC_ALLOC bits are cleared. */
813 static const struct
814 {
815 const char *name;
816 int len;
817 } debug_sections [] =
818 {
0112cd26 819 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
820 { NULL, 0 }, /* 'e' */
821 { NULL, 0 }, /* 'f' */
0112cd26 822 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
823 { NULL, 0 }, /* 'h' */
824 { NULL, 0 }, /* 'i' */
825 { NULL, 0 }, /* 'j' */
826 { NULL, 0 }, /* 'k' */
0112cd26 827 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
828 { NULL, 0 }, /* 'm' */
829 { NULL, 0 }, /* 'n' */
830 { NULL, 0 }, /* 'o' */
831 { NULL, 0 }, /* 'p' */
832 { NULL, 0 }, /* 'q' */
833 { NULL, 0 }, /* 'r' */
0112cd26 834 { STRING_COMMA_LEN ("stab") } /* 's' */
3d2b39cf
L
835 };
836
837 if (name [0] == '.')
838 {
839 int i = name [1] - 'd';
840 if (i >= 0
841 && i < (int) ARRAY_SIZE (debug_sections)
842 && debug_sections [i].name != NULL
843 && strncmp (&name [1], debug_sections [i].name,
844 debug_sections [i].len) == 0)
845 flags |= SEC_DEBUGGING;
846 }
847 }
252b5132
RH
848
849 /* As a GNU extension, if the name begins with .gnu.linkonce, we
850 only link a single copy of the section. This is used to support
851 g++. g++ will emit each template expansion in its own section.
852 The symbols will be defined as weak, so that multiple definitions
853 are permitted. The GNU linker extension is to actually discard
854 all but one of the sections. */
0112cd26 855 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 856 && elf_next_in_group (newsect) == NULL)
252b5132
RH
857 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
858
fa152c49
JW
859 bed = get_elf_backend_data (abfd);
860 if (bed->elf_backend_section_flags)
861 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 862 return FALSE;
fa152c49 863
252b5132 864 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 865 return FALSE;
252b5132
RH
866
867 if ((flags & SEC_ALLOC) != 0)
868 {
869 Elf_Internal_Phdr *phdr;
870 unsigned int i;
871
872 /* Look through the phdrs to see if we need to adjust the lma.
873 If all the p_paddr fields are zero, we ignore them, since
874 some ELF linkers produce such output. */
875 phdr = elf_tdata (abfd)->phdr;
876 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
877 {
878 if (phdr->p_paddr != 0)
879 break;
880 }
881 if (i < elf_elfheader (abfd)->e_phnum)
882 {
883 phdr = elf_tdata (abfd)->phdr;
884 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
885 {
e0e8c97f
NC
886 /* This section is part of this segment if its file
887 offset plus size lies within the segment's memory
888 span and, if the section is loaded, the extent of the
47d9a591 889 loaded data lies within the extent of the segment.
bf36db18
NC
890
891 Note - we used to check the p_paddr field as well, and
892 refuse to set the LMA if it was 0. This is wrong
dba143ef 893 though, as a perfectly valid initialised segment can
bf36db18 894 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 895 place special significance on the address 0 and
bf36db18
NC
896 executables need to be able to have a segment which
897 covers this address. */
252b5132 898 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
899 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
900 && (hdr->sh_offset + hdr->sh_size
901 <= phdr->p_offset + phdr->p_memsz)
252b5132 902 && ((flags & SEC_LOAD) == 0
d7866f04
AM
903 || (hdr->sh_offset + hdr->sh_size
904 <= phdr->p_offset + phdr->p_filesz)))
252b5132 905 {
dba143ef 906 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
907 newsect->lma = (phdr->p_paddr
908 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
909 else
910 /* We used to use the same adjustment for SEC_LOAD
911 sections, but that doesn't work if the segment
912 is packed with code from multiple VMAs.
913 Instead we calculate the section LMA based on
914 the segment LMA. It is assumed that the
915 segment will contain sections with contiguous
916 LMAs, even if the VMAs are not. */
917 newsect->lma = (phdr->p_paddr
918 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
919
920 /* With contiguous segments, we can't tell from file
921 offsets whether a section with zero size should
922 be placed at the end of one segment or the
923 beginning of the next. Decide based on vaddr. */
924 if (hdr->sh_addr >= phdr->p_vaddr
925 && (hdr->sh_addr + hdr->sh_size
926 <= phdr->p_vaddr + phdr->p_memsz))
927 break;
252b5132
RH
928 }
929 }
930 }
931 }
932
b34976b6 933 return TRUE;
252b5132
RH
934}
935
936/*
937INTERNAL_FUNCTION
938 bfd_elf_find_section
939
940SYNOPSIS
941 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
942
943DESCRIPTION
944 Helper functions for GDB to locate the string tables.
945 Since BFD hides string tables from callers, GDB needs to use an
946 internal hook to find them. Sun's .stabstr, in particular,
947 isn't even pointed to by the .stab section, so ordinary
948 mechanisms wouldn't work to find it, even if we had some.
949*/
950
951struct elf_internal_shdr *
217aa764 952bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
953{
954 Elf_Internal_Shdr **i_shdrp;
955 char *shstrtab;
956 unsigned int max;
957 unsigned int i;
958
959 i_shdrp = elf_elfsections (abfd);
960 if (i_shdrp != NULL)
961 {
9ad5cbcf
AM
962 shstrtab = bfd_elf_get_str_section (abfd,
963 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
964 if (shstrtab != NULL)
965 {
9ad5cbcf 966 max = elf_numsections (abfd);
252b5132
RH
967 for (i = 1; i < max; i++)
968 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
969 return i_shdrp[i];
970 }
971 }
972 return 0;
973}
974
975const char *const bfd_elf_section_type_names[] = {
976 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
977 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
978 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
979};
980
1049f94e 981/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
982 output, and the reloc is against an external symbol, and nothing
983 has given us any additional addend, the resulting reloc will also
984 be against the same symbol. In such a case, we don't want to
985 change anything about the way the reloc is handled, since it will
986 all be done at final link time. Rather than put special case code
987 into bfd_perform_relocation, all the reloc types use this howto
988 function. It just short circuits the reloc if producing
1049f94e 989 relocatable output against an external symbol. */
252b5132 990
252b5132 991bfd_reloc_status_type
217aa764
AM
992bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
993 arelent *reloc_entry,
994 asymbol *symbol,
995 void *data ATTRIBUTE_UNUSED,
996 asection *input_section,
997 bfd *output_bfd,
998 char **error_message ATTRIBUTE_UNUSED)
999{
1000 if (output_bfd != NULL
252b5132
RH
1001 && (symbol->flags & BSF_SECTION_SYM) == 0
1002 && (! reloc_entry->howto->partial_inplace
1003 || reloc_entry->addend == 0))
1004 {
1005 reloc_entry->address += input_section->output_offset;
1006 return bfd_reloc_ok;
1007 }
1008
1009 return bfd_reloc_continue;
1010}
1011\f
d3c456e9
JJ
1012/* Make sure sec_info_type is cleared if sec_info is cleared too. */
1013
1014static void
217aa764
AM
1015merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
1016 asection *sec)
d3c456e9 1017{
68bfbfcc
AM
1018 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
1019 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
1020}
1021
8550eb6e
JJ
1022/* Finish SHF_MERGE section merging. */
1023
b34976b6 1024bfd_boolean
217aa764 1025_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 1026{
57ceae94
AM
1027 bfd *ibfd;
1028 asection *sec;
1029
0eddce27 1030 if (!is_elf_hash_table (info->hash))
b34976b6 1031 return FALSE;
57ceae94
AM
1032
1033 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1034 if ((ibfd->flags & DYNAMIC) == 0)
1035 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
1036 if ((sec->flags & SEC_MERGE) != 0
1037 && !bfd_is_abs_section (sec->output_section))
1038 {
1039 struct bfd_elf_section_data *secdata;
1040
1041 secdata = elf_section_data (sec);
1042 if (! _bfd_add_merge_section (abfd,
1043 &elf_hash_table (info)->merge_info,
1044 sec, &secdata->sec_info))
1045 return FALSE;
1046 else if (secdata->sec_info)
1047 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
1048 }
1049
1050 if (elf_hash_table (info)->merge_info != NULL)
1051 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 1052 merge_sections_remove_hook);
b34976b6 1053 return TRUE;
8550eb6e 1054}
2d653fc7
AM
1055
1056void
217aa764 1057_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1058{
1059 sec->output_section = bfd_abs_section_ptr;
1060 sec->output_offset = sec->vma;
0eddce27 1061 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1062 return;
1063
68bfbfcc 1064 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1065}
8550eb6e 1066\f
0ac4564e
L
1067/* Copy the program header and other data from one object module to
1068 another. */
252b5132 1069
b34976b6 1070bfd_boolean
217aa764 1071_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1072{
1073 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1074 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1075 return TRUE;
2d502050
L
1076
1077 BFD_ASSERT (!elf_flags_init (obfd)
1078 || (elf_elfheader (obfd)->e_flags
1079 == elf_elfheader (ibfd)->e_flags));
1080
0ac4564e 1081 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1082 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1083 elf_flags_init (obfd) = TRUE;
1084 return TRUE;
2d502050
L
1085}
1086
cedc298e
L
1087static const char *
1088get_segment_type (unsigned int p_type)
1089{
1090 const char *pt;
1091 switch (p_type)
1092 {
1093 case PT_NULL: pt = "NULL"; break;
1094 case PT_LOAD: pt = "LOAD"; break;
1095 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1096 case PT_INTERP: pt = "INTERP"; break;
1097 case PT_NOTE: pt = "NOTE"; break;
1098 case PT_SHLIB: pt = "SHLIB"; break;
1099 case PT_PHDR: pt = "PHDR"; break;
1100 case PT_TLS: pt = "TLS"; break;
1101 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1102 case PT_GNU_STACK: pt = "STACK"; break;
1103 case PT_GNU_RELRO: pt = "RELRO"; break;
1104 default: pt = NULL; break;
1105 }
1106 return pt;
1107}
1108
f0b79d91
L
1109/* Print out the program headers. */
1110
b34976b6 1111bfd_boolean
217aa764 1112_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1113{
217aa764 1114 FILE *f = farg;
252b5132
RH
1115 Elf_Internal_Phdr *p;
1116 asection *s;
1117 bfd_byte *dynbuf = NULL;
1118
1119 p = elf_tdata (abfd)->phdr;
1120 if (p != NULL)
1121 {
1122 unsigned int i, c;
1123
1124 fprintf (f, _("\nProgram Header:\n"));
1125 c = elf_elfheader (abfd)->e_phnum;
1126 for (i = 0; i < c; i++, p++)
1127 {
cedc298e 1128 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1129 char buf[20];
1130
cedc298e 1131 if (pt == NULL)
252b5132 1132 {
cedc298e
L
1133 sprintf (buf, "0x%lx", p->p_type);
1134 pt = buf;
252b5132 1135 }
dc810e39 1136 fprintf (f, "%8s off 0x", pt);
60b89a18 1137 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1138 fprintf (f, " vaddr 0x");
60b89a18 1139 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1140 fprintf (f, " paddr 0x");
60b89a18 1141 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1142 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1143 fprintf (f, " filesz 0x");
60b89a18 1144 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1145 fprintf (f, " memsz 0x");
60b89a18 1146 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1147 fprintf (f, " flags %c%c%c",
1148 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1149 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1150 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1151 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1152 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1153 fprintf (f, "\n");
1154 }
1155 }
1156
1157 s = bfd_get_section_by_name (abfd, ".dynamic");
1158 if (s != NULL)
1159 {
1160 int elfsec;
dc810e39 1161 unsigned long shlink;
252b5132
RH
1162 bfd_byte *extdyn, *extdynend;
1163 size_t extdynsize;
217aa764 1164 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1165
1166 fprintf (f, _("\nDynamic Section:\n"));
1167
eea6121a 1168 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1169 goto error_return;
1170
1171 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1172 if (elfsec == -1)
1173 goto error_return;
dc810e39 1174 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1175
1176 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1177 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1178
1179 extdyn = dynbuf;
eea6121a 1180 extdynend = extdyn + s->size;
252b5132
RH
1181 for (; extdyn < extdynend; extdyn += extdynsize)
1182 {
1183 Elf_Internal_Dyn dyn;
1184 const char *name;
1185 char ab[20];
b34976b6 1186 bfd_boolean stringp;
252b5132 1187
217aa764 1188 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1189
1190 if (dyn.d_tag == DT_NULL)
1191 break;
1192
b34976b6 1193 stringp = FALSE;
252b5132
RH
1194 switch (dyn.d_tag)
1195 {
1196 default:
1197 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1198 name = ab;
1199 break;
1200
b34976b6 1201 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1202 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1203 case DT_PLTGOT: name = "PLTGOT"; break;
1204 case DT_HASH: name = "HASH"; break;
1205 case DT_STRTAB: name = "STRTAB"; break;
1206 case DT_SYMTAB: name = "SYMTAB"; break;
1207 case DT_RELA: name = "RELA"; break;
1208 case DT_RELASZ: name = "RELASZ"; break;
1209 case DT_RELAENT: name = "RELAENT"; break;
1210 case DT_STRSZ: name = "STRSZ"; break;
1211 case DT_SYMENT: name = "SYMENT"; break;
1212 case DT_INIT: name = "INIT"; break;
1213 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1214 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1215 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1216 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1217 case DT_REL: name = "REL"; break;
1218 case DT_RELSZ: name = "RELSZ"; break;
1219 case DT_RELENT: name = "RELENT"; break;
1220 case DT_PLTREL: name = "PLTREL"; break;
1221 case DT_DEBUG: name = "DEBUG"; break;
1222 case DT_TEXTREL: name = "TEXTREL"; break;
1223 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1224 case DT_BIND_NOW: name = "BIND_NOW"; break;
1225 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1226 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1227 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1228 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1229 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1230 case DT_FLAGS: name = "FLAGS"; break;
1231 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1232 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1233 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1234 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1235 case DT_MOVEENT: name = "MOVEENT"; break;
1236 case DT_MOVESZ: name = "MOVESZ"; break;
1237 case DT_FEATURE: name = "FEATURE"; break;
1238 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1239 case DT_SYMINSZ: name = "SYMINSZ"; break;
1240 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1241 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1242 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1243 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1244 case DT_PLTPAD: name = "PLTPAD"; break;
1245 case DT_MOVETAB: name = "MOVETAB"; break;
1246 case DT_SYMINFO: name = "SYMINFO"; break;
1247 case DT_RELACOUNT: name = "RELACOUNT"; break;
1248 case DT_RELCOUNT: name = "RELCOUNT"; break;
1249 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1250 case DT_VERSYM: name = "VERSYM"; break;
1251 case DT_VERDEF: name = "VERDEF"; break;
1252 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1253 case DT_VERNEED: name = "VERNEED"; break;
1254 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1255 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1256 case DT_USED: name = "USED"; break;
b34976b6 1257 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1258 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1259 }
1260
1261 fprintf (f, " %-11s ", name);
1262 if (! stringp)
1263 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1264 else
1265 {
1266 const char *string;
dc810e39 1267 unsigned int tagv = dyn.d_un.d_val;
252b5132 1268
dc810e39 1269 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1270 if (string == NULL)
1271 goto error_return;
1272 fprintf (f, "%s", string);
1273 }
1274 fprintf (f, "\n");
1275 }
1276
1277 free (dynbuf);
1278 dynbuf = NULL;
1279 }
1280
1281 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1282 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1283 {
fc0e6df6 1284 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1285 return FALSE;
252b5132
RH
1286 }
1287
1288 if (elf_dynverdef (abfd) != 0)
1289 {
1290 Elf_Internal_Verdef *t;
1291
1292 fprintf (f, _("\nVersion definitions:\n"));
1293 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1294 {
1295 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1296 t->vd_flags, t->vd_hash,
1297 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1298 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1299 {
1300 Elf_Internal_Verdaux *a;
1301
1302 fprintf (f, "\t");
1303 for (a = t->vd_auxptr->vda_nextptr;
1304 a != NULL;
1305 a = a->vda_nextptr)
d0fb9a8d
JJ
1306 fprintf (f, "%s ",
1307 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1308 fprintf (f, "\n");
1309 }
1310 }
1311 }
1312
1313 if (elf_dynverref (abfd) != 0)
1314 {
1315 Elf_Internal_Verneed *t;
1316
1317 fprintf (f, _("\nVersion References:\n"));
1318 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1319 {
1320 Elf_Internal_Vernaux *a;
1321
d0fb9a8d
JJ
1322 fprintf (f, _(" required from %s:\n"),
1323 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1324 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1325 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1326 a->vna_flags, a->vna_other,
1327 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1328 }
1329 }
1330
b34976b6 1331 return TRUE;
252b5132
RH
1332
1333 error_return:
1334 if (dynbuf != NULL)
1335 free (dynbuf);
b34976b6 1336 return FALSE;
252b5132
RH
1337}
1338
1339/* Display ELF-specific fields of a symbol. */
1340
1341void
217aa764
AM
1342bfd_elf_print_symbol (bfd *abfd,
1343 void *filep,
1344 asymbol *symbol,
1345 bfd_print_symbol_type how)
252b5132 1346{
217aa764 1347 FILE *file = filep;
252b5132
RH
1348 switch (how)
1349 {
1350 case bfd_print_symbol_name:
1351 fprintf (file, "%s", symbol->name);
1352 break;
1353 case bfd_print_symbol_more:
1354 fprintf (file, "elf ");
60b89a18 1355 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1356 fprintf (file, " %lx", (long) symbol->flags);
1357 break;
1358 case bfd_print_symbol_all:
1359 {
4e8a9624
AM
1360 const char *section_name;
1361 const char *name = NULL;
9c5bfbb7 1362 const struct elf_backend_data *bed;
7a13edea 1363 unsigned char st_other;
dbb410c3 1364 bfd_vma val;
c044fabd 1365
252b5132 1366 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1367
1368 bed = get_elf_backend_data (abfd);
1369 if (bed->elf_backend_print_symbol_all)
c044fabd 1370 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1371
1372 if (name == NULL)
1373 {
7ee38065 1374 name = symbol->name;
217aa764 1375 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1376 }
1377
252b5132
RH
1378 fprintf (file, " %s\t", section_name);
1379 /* Print the "other" value for a symbol. For common symbols,
1380 we've already printed the size; now print the alignment.
1381 For other symbols, we have no specified alignment, and
1382 we've printed the address; now print the size. */
dbb410c3
AM
1383 if (bfd_is_com_section (symbol->section))
1384 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1385 else
1386 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1387 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1388
1389 /* If we have version information, print it. */
1390 if (elf_tdata (abfd)->dynversym_section != 0
1391 && (elf_tdata (abfd)->dynverdef_section != 0
1392 || elf_tdata (abfd)->dynverref_section != 0))
1393 {
1394 unsigned int vernum;
1395 const char *version_string;
1396
1397 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1398
1399 if (vernum == 0)
1400 version_string = "";
1401 else if (vernum == 1)
1402 version_string = "Base";
1403 else if (vernum <= elf_tdata (abfd)->cverdefs)
1404 version_string =
1405 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1406 else
1407 {
1408 Elf_Internal_Verneed *t;
1409
1410 version_string = "";
1411 for (t = elf_tdata (abfd)->verref;
1412 t != NULL;
1413 t = t->vn_nextref)
1414 {
1415 Elf_Internal_Vernaux *a;
1416
1417 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1418 {
1419 if (a->vna_other == vernum)
1420 {
1421 version_string = a->vna_nodename;
1422 break;
1423 }
1424 }
1425 }
1426 }
1427
1428 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1429 fprintf (file, " %-11s", version_string);
1430 else
1431 {
1432 int i;
1433
1434 fprintf (file, " (%s)", version_string);
1435 for (i = 10 - strlen (version_string); i > 0; --i)
1436 putc (' ', file);
1437 }
1438 }
1439
1440 /* If the st_other field is not zero, print it. */
7a13edea 1441 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1442
7a13edea
NC
1443 switch (st_other)
1444 {
1445 case 0: break;
1446 case STV_INTERNAL: fprintf (file, " .internal"); break;
1447 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1448 case STV_PROTECTED: fprintf (file, " .protected"); break;
1449 default:
1450 /* Some other non-defined flags are also present, so print
1451 everything hex. */
1452 fprintf (file, " 0x%02x", (unsigned int) st_other);
1453 }
252b5132 1454
587ff49e 1455 fprintf (file, " %s", name);
252b5132
RH
1456 }
1457 break;
1458 }
1459}
1460\f
1461/* Create an entry in an ELF linker hash table. */
1462
1463struct bfd_hash_entry *
217aa764
AM
1464_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1465 struct bfd_hash_table *table,
1466 const char *string)
252b5132 1467{
252b5132
RH
1468 /* Allocate the structure if it has not already been allocated by a
1469 subclass. */
51b64d56
AM
1470 if (entry == NULL)
1471 {
1472 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1473 if (entry == NULL)
1474 return entry;
1475 }
252b5132
RH
1476
1477 /* Call the allocation method of the superclass. */
51b64d56
AM
1478 entry = _bfd_link_hash_newfunc (entry, table, string);
1479 if (entry != NULL)
252b5132 1480 {
51b64d56
AM
1481 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1482 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1483
252b5132
RH
1484 /* Set local fields. */
1485 ret->indx = -1;
252b5132 1486 ret->dynindx = -1;
a6aa5195
AM
1487 ret->got = htab->init_got_refcount;
1488 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1489 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1490 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1491 /* Assume that we have been called by a non-ELF symbol reader.
1492 This flag is then reset by the code which reads an ELF input
1493 file. This ensures that a symbol created by a non-ELF symbol
1494 reader will have the flag set correctly. */
f5385ebf 1495 ret->non_elf = 1;
252b5132
RH
1496 }
1497
51b64d56 1498 return entry;
252b5132
RH
1499}
1500
2920b85c 1501/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1502 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1503
c61b8717 1504void
fcfa13d2 1505_bfd_elf_link_hash_copy_indirect (struct bfd_link_info *info,
217aa764
AM
1506 struct elf_link_hash_entry *dir,
1507 struct elf_link_hash_entry *ind)
2920b85c 1508{
fcfa13d2 1509 struct elf_link_hash_table *htab;
3c3e9281 1510
2920b85c
RH
1511 /* Copy down any references that we may have already seen to the
1512 symbol which just became indirect. */
1513
f5385ebf
AM
1514 dir->ref_dynamic |= ind->ref_dynamic;
1515 dir->ref_regular |= ind->ref_regular;
1516 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1517 dir->non_got_ref |= ind->non_got_ref;
1518 dir->needs_plt |= ind->needs_plt;
1519 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1520
1e370bd2 1521 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1522 return;
1523
51b64d56 1524 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1525 These may have been already set up by a check_relocs routine. */
fcfa13d2
AM
1526 htab = elf_hash_table (info);
1527 if (ind->got.refcount > htab->init_got_refcount.refcount)
2920b85c 1528 {
fcfa13d2
AM
1529 if (dir->got.refcount < 0)
1530 dir->got.refcount = 0;
1531 dir->got.refcount += ind->got.refcount;
1532 ind->got.refcount = htab->init_got_refcount.refcount;
2920b85c 1533 }
2920b85c 1534
fcfa13d2 1535 if (ind->plt.refcount > htab->init_plt_refcount.refcount)
2920b85c 1536 {
fcfa13d2
AM
1537 if (dir->plt.refcount < 0)
1538 dir->plt.refcount = 0;
1539 dir->plt.refcount += ind->plt.refcount;
1540 ind->plt.refcount = htab->init_plt_refcount.refcount;
2920b85c 1541 }
2920b85c 1542
fcfa13d2 1543 if (ind->dynindx != -1)
2920b85c 1544 {
fcfa13d2
AM
1545 if (dir->dynindx != -1)
1546 _bfd_elf_strtab_delref (htab->dynstr, dir->dynstr_index);
2920b85c
RH
1547 dir->dynindx = ind->dynindx;
1548 dir->dynstr_index = ind->dynstr_index;
1549 ind->dynindx = -1;
1550 ind->dynstr_index = 0;
1551 }
2920b85c
RH
1552}
1553
c61b8717 1554void
217aa764
AM
1555_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1556 struct elf_link_hash_entry *h,
1557 bfd_boolean force_local)
2920b85c 1558{
a6aa5195 1559 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1560 h->needs_plt = 0;
e5094212
AM
1561 if (force_local)
1562 {
f5385ebf 1563 h->forced_local = 1;
e5094212
AM
1564 if (h->dynindx != -1)
1565 {
1566 h->dynindx = -1;
1567 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1568 h->dynstr_index);
1569 }
1570 }
2920b85c
RH
1571}
1572
252b5132
RH
1573/* Initialize an ELF linker hash table. */
1574
b34976b6 1575bfd_boolean
217aa764
AM
1576_bfd_elf_link_hash_table_init
1577 (struct elf_link_hash_table *table,
1578 bfd *abfd,
1579 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1580 struct bfd_hash_table *,
66eb6687
AM
1581 const char *),
1582 unsigned int entsize)
252b5132 1583{
b34976b6 1584 bfd_boolean ret;
a6aa5195 1585 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1586
b34976b6 1587 table->dynamic_sections_created = FALSE;
252b5132 1588 table->dynobj = NULL;
a6aa5195
AM
1589 table->init_got_refcount.refcount = can_refcount - 1;
1590 table->init_plt_refcount.refcount = can_refcount - 1;
1591 table->init_got_offset.offset = -(bfd_vma) 1;
1592 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1593 /* The first dynamic symbol is a dummy. */
1594 table->dynsymcount = 1;
1595 table->dynstr = NULL;
1596 table->bucketcount = 0;
1597 table->needed = NULL;
1598 table->hgot = NULL;
ed66ec07 1599 table->hplt = NULL;
f5fa8ca2 1600 table->merge_info = NULL;
3722b82f 1601 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1602 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1603 table->dynlocal = NULL;
73722af0 1604 table->runpath = NULL;
e1918d23
AM
1605 table->tls_sec = NULL;
1606 table->tls_size = 0;
73722af0 1607 table->loaded = NULL;
67687978 1608 table->is_relocatable_executable = FALSE;
73722af0 1609
66eb6687 1610 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc, entsize);
8ea2e4bd
NC
1611 table->root.type = bfd_link_elf_hash_table;
1612
1613 return ret;
252b5132
RH
1614}
1615
1616/* Create an ELF linker hash table. */
1617
1618struct bfd_link_hash_table *
217aa764 1619_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1620{
1621 struct elf_link_hash_table *ret;
dc810e39 1622 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1623
217aa764
AM
1624 ret = bfd_malloc (amt);
1625 if (ret == NULL)
252b5132
RH
1626 return NULL;
1627
66eb6687
AM
1628 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc,
1629 sizeof (struct elf_link_hash_entry)))
252b5132 1630 {
e2d34d7d 1631 free (ret);
252b5132
RH
1632 return NULL;
1633 }
1634
1635 return &ret->root;
1636}
1637
1638/* This is a hook for the ELF emulation code in the generic linker to
1639 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1640 entry for a dynamic object. */
252b5132
RH
1641
1642void
217aa764 1643bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1644{
1645 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1646 && bfd_get_format (abfd) == bfd_object)
1647 elf_dt_name (abfd) = name;
1648}
1649
e56f61be
L
1650int
1651bfd_elf_get_dyn_lib_class (bfd *abfd)
1652{
1653 int lib_class;
1654 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1655 && bfd_get_format (abfd) == bfd_object)
1656 lib_class = elf_dyn_lib_class (abfd);
1657 else
1658 lib_class = 0;
1659 return lib_class;
1660}
1661
74816898 1662void
4a43e768 1663bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1664{
1665 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1666 && bfd_get_format (abfd) == bfd_object)
4a43e768 1667 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1668}
1669
252b5132
RH
1670/* Get the list of DT_NEEDED entries for a link. This is a hook for
1671 the linker ELF emulation code. */
1672
1673struct bfd_link_needed_list *
217aa764
AM
1674bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1675 struct bfd_link_info *info)
252b5132 1676{
0eddce27 1677 if (! is_elf_hash_table (info->hash))
252b5132
RH
1678 return NULL;
1679 return elf_hash_table (info)->needed;
1680}
1681
a963dc6a
L
1682/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1683 hook for the linker ELF emulation code. */
1684
1685struct bfd_link_needed_list *
217aa764
AM
1686bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1687 struct bfd_link_info *info)
a963dc6a 1688{
0eddce27 1689 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1690 return NULL;
1691 return elf_hash_table (info)->runpath;
1692}
1693
252b5132
RH
1694/* Get the name actually used for a dynamic object for a link. This
1695 is the SONAME entry if there is one. Otherwise, it is the string
1696 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1697
1698const char *
217aa764 1699bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1700{
1701 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1702 && bfd_get_format (abfd) == bfd_object)
1703 return elf_dt_name (abfd);
1704 return NULL;
1705}
1706
1707/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1708 the ELF linker emulation code. */
1709
b34976b6 1710bfd_boolean
217aa764
AM
1711bfd_elf_get_bfd_needed_list (bfd *abfd,
1712 struct bfd_link_needed_list **pneeded)
252b5132
RH
1713{
1714 asection *s;
1715 bfd_byte *dynbuf = NULL;
1716 int elfsec;
dc810e39 1717 unsigned long shlink;
252b5132
RH
1718 bfd_byte *extdyn, *extdynend;
1719 size_t extdynsize;
217aa764 1720 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1721
1722 *pneeded = NULL;
1723
1724 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1725 || bfd_get_format (abfd) != bfd_object)
b34976b6 1726 return TRUE;
252b5132
RH
1727
1728 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1729 if (s == NULL || s->size == 0)
b34976b6 1730 return TRUE;
252b5132 1731
eea6121a 1732 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1733 goto error_return;
1734
1735 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1736 if (elfsec == -1)
1737 goto error_return;
1738
dc810e39 1739 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1740
1741 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1742 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1743
1744 extdyn = dynbuf;
eea6121a 1745 extdynend = extdyn + s->size;
252b5132
RH
1746 for (; extdyn < extdynend; extdyn += extdynsize)
1747 {
1748 Elf_Internal_Dyn dyn;
1749
217aa764 1750 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1751
1752 if (dyn.d_tag == DT_NULL)
1753 break;
1754
1755 if (dyn.d_tag == DT_NEEDED)
1756 {
1757 const char *string;
1758 struct bfd_link_needed_list *l;
dc810e39
AM
1759 unsigned int tagv = dyn.d_un.d_val;
1760 bfd_size_type amt;
252b5132 1761
dc810e39 1762 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1763 if (string == NULL)
1764 goto error_return;
1765
dc810e39 1766 amt = sizeof *l;
217aa764 1767 l = bfd_alloc (abfd, amt);
252b5132
RH
1768 if (l == NULL)
1769 goto error_return;
1770
1771 l->by = abfd;
1772 l->name = string;
1773 l->next = *pneeded;
1774 *pneeded = l;
1775 }
1776 }
1777
1778 free (dynbuf);
1779
b34976b6 1780 return TRUE;
252b5132
RH
1781
1782 error_return:
1783 if (dynbuf != NULL)
1784 free (dynbuf);
b34976b6 1785 return FALSE;
252b5132
RH
1786}
1787\f
1788/* Allocate an ELF string table--force the first byte to be zero. */
1789
1790struct bfd_strtab_hash *
217aa764 1791_bfd_elf_stringtab_init (void)
252b5132
RH
1792{
1793 struct bfd_strtab_hash *ret;
1794
1795 ret = _bfd_stringtab_init ();
1796 if (ret != NULL)
1797 {
1798 bfd_size_type loc;
1799
b34976b6 1800 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1801 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1802 if (loc == (bfd_size_type) -1)
1803 {
1804 _bfd_stringtab_free (ret);
1805 ret = NULL;
1806 }
1807 }
1808 return ret;
1809}
1810\f
1811/* ELF .o/exec file reading */
1812
c044fabd 1813/* Create a new bfd section from an ELF section header. */
252b5132 1814
b34976b6 1815bfd_boolean
217aa764 1816bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1817{
1818 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1819 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1820 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1821 const char *name;
252b5132 1822
1b3a8575
AM
1823 name = bfd_elf_string_from_elf_section (abfd,
1824 elf_elfheader (abfd)->e_shstrndx,
1825 hdr->sh_name);
933d961a
JJ
1826 if (name == NULL)
1827 return FALSE;
252b5132
RH
1828
1829 switch (hdr->sh_type)
1830 {
1831 case SHT_NULL:
1832 /* Inactive section. Throw it away. */
b34976b6 1833 return TRUE;
252b5132
RH
1834
1835 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1836 case SHT_NOBITS: /* .bss section. */
1837 case SHT_HASH: /* .hash section. */
1838 case SHT_NOTE: /* .note section. */
25e27870
L
1839 case SHT_INIT_ARRAY: /* .init_array section. */
1840 case SHT_FINI_ARRAY: /* .fini_array section. */
1841 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1842 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1843 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1844 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1845
797fc050 1846 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1847 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1848 return FALSE;
8e0ed13f
NC
1849 if (hdr->sh_link > elf_numsections (abfd)
1850 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1851 return FALSE;
797fc050
AM
1852 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1853 {
1854 Elf_Internal_Shdr *dynsymhdr;
1855
1856 /* The shared libraries distributed with hpux11 have a bogus
1857 sh_link field for the ".dynamic" section. Find the
1858 string table for the ".dynsym" section instead. */
1859 if (elf_dynsymtab (abfd) != 0)
1860 {
1861 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1862 hdr->sh_link = dynsymhdr->sh_link;
1863 }
1864 else
1865 {
1866 unsigned int i, num_sec;
1867
1868 num_sec = elf_numsections (abfd);
1869 for (i = 1; i < num_sec; i++)
1870 {
1871 dynsymhdr = elf_elfsections (abfd)[i];
1872 if (dynsymhdr->sh_type == SHT_DYNSYM)
1873 {
1874 hdr->sh_link = dynsymhdr->sh_link;
1875 break;
1876 }
1877 }
1878 }
1879 }
1880 break;
1881
252b5132
RH
1882 case SHT_SYMTAB: /* A symbol table */
1883 if (elf_onesymtab (abfd) == shindex)
b34976b6 1884 return TRUE;
252b5132 1885
a50b2160
JJ
1886 if (hdr->sh_entsize != bed->s->sizeof_sym)
1887 return FALSE;
252b5132
RH
1888 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1889 elf_onesymtab (abfd) = shindex;
1890 elf_tdata (abfd)->symtab_hdr = *hdr;
1891 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1892 abfd->flags |= HAS_SYMS;
1893
1894 /* Sometimes a shared object will map in the symbol table. If
1895 SHF_ALLOC is set, and this is a shared object, then we also
1896 treat this section as a BFD section. We can not base the
1897 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1898 set in a relocatable object file, which would confuse the
252b5132
RH
1899 linker. */
1900 if ((hdr->sh_flags & SHF_ALLOC) != 0
1901 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1902 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1903 shindex))
b34976b6 1904 return FALSE;
252b5132 1905
1b3a8575
AM
1906 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1907 can't read symbols without that section loaded as well. It
1908 is most likely specified by the next section header. */
1909 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1910 {
1911 unsigned int i, num_sec;
1912
1913 num_sec = elf_numsections (abfd);
1914 for (i = shindex + 1; i < num_sec; i++)
1915 {
1916 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1917 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1918 && hdr2->sh_link == shindex)
1919 break;
1920 }
1921 if (i == num_sec)
1922 for (i = 1; i < shindex; i++)
1923 {
1924 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1925 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1926 && hdr2->sh_link == shindex)
1927 break;
1928 }
1929 if (i != shindex)
1930 return bfd_section_from_shdr (abfd, i);
1931 }
b34976b6 1932 return TRUE;
252b5132
RH
1933
1934 case SHT_DYNSYM: /* A dynamic symbol table */
1935 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1936 return TRUE;
252b5132 1937
a50b2160
JJ
1938 if (hdr->sh_entsize != bed->s->sizeof_sym)
1939 return FALSE;
252b5132
RH
1940 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1941 elf_dynsymtab (abfd) = shindex;
1942 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1943 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1944 abfd->flags |= HAS_SYMS;
1945
1946 /* Besides being a symbol table, we also treat this as a regular
1947 section, so that objcopy can handle it. */
6dc132d9 1948 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1949
9ad5cbcf
AM
1950 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1951 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1952 return TRUE;
9ad5cbcf 1953
1b3a8575 1954 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1955 elf_symtab_shndx (abfd) = shindex;
1956 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1957 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1958 return TRUE;
9ad5cbcf 1959
252b5132
RH
1960 case SHT_STRTAB: /* A string table */
1961 if (hdr->bfd_section != NULL)
b34976b6 1962 return TRUE;
252b5132
RH
1963 if (ehdr->e_shstrndx == shindex)
1964 {
1965 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1966 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1967 return TRUE;
252b5132 1968 }
1b3a8575
AM
1969 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1970 {
1971 symtab_strtab:
1972 elf_tdata (abfd)->strtab_hdr = *hdr;
1973 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1974 return TRUE;
1975 }
1976 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1977 {
1978 dynsymtab_strtab:
1979 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1980 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1981 elf_elfsections (abfd)[shindex] = hdr;
1982 /* We also treat this as a regular section, so that objcopy
1983 can handle it. */
6dc132d9
L
1984 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1985 shindex);
1b3a8575 1986 }
252b5132 1987
1b3a8575
AM
1988 /* If the string table isn't one of the above, then treat it as a
1989 regular section. We need to scan all the headers to be sure,
1990 just in case this strtab section appeared before the above. */
1991 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1992 {
1993 unsigned int i, num_sec;
252b5132 1994
1b3a8575
AM
1995 num_sec = elf_numsections (abfd);
1996 for (i = 1; i < num_sec; i++)
1997 {
1998 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1999 if (hdr2->sh_link == shindex)
2000 {
933d961a
JJ
2001 /* Prevent endless recursion on broken objects. */
2002 if (i == shindex)
2003 return FALSE;
1b3a8575
AM
2004 if (! bfd_section_from_shdr (abfd, i))
2005 return FALSE;
2006 if (elf_onesymtab (abfd) == i)
2007 goto symtab_strtab;
2008 if (elf_dynsymtab (abfd) == i)
2009 goto dynsymtab_strtab;
2010 }
2011 }
2012 }
6dc132d9 2013 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2014
2015 case SHT_REL:
2016 case SHT_RELA:
2017 /* *These* do a lot of work -- but build no sections! */
2018 {
2019 asection *target_sect;
2020 Elf_Internal_Shdr *hdr2;
9ad5cbcf 2021 unsigned int num_sec = elf_numsections (abfd);
252b5132 2022
aa2ca951
JJ
2023 if (hdr->sh_entsize
2024 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
2025 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2026 return FALSE;
2027
03ae5f59 2028 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
2029 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
2030 || hdr->sh_link >= num_sec)
03ae5f59
ILT
2031 {
2032 ((*_bfd_error_handler)
d003868e
AM
2033 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2034 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
2035 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2036 shindex);
03ae5f59
ILT
2037 }
2038
252b5132
RH
2039 /* For some incomprehensible reason Oracle distributes
2040 libraries for Solaris in which some of the objects have
2041 bogus sh_link fields. It would be nice if we could just
2042 reject them, but, unfortunately, some people need to use
2043 them. We scan through the section headers; if we find only
2044 one suitable symbol table, we clobber the sh_link to point
2045 to it. I hope this doesn't break anything. */
2046 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2047 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2048 {
9ad5cbcf 2049 unsigned int scan;
252b5132
RH
2050 int found;
2051
2052 found = 0;
9ad5cbcf 2053 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2054 {
2055 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2056 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2057 {
2058 if (found != 0)
2059 {
2060 found = 0;
2061 break;
2062 }
2063 found = scan;
2064 }
2065 }
2066 if (found != 0)
2067 hdr->sh_link = found;
2068 }
2069
2070 /* Get the symbol table. */
1b3a8575
AM
2071 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2072 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2073 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 2074 return FALSE;
252b5132
RH
2075
2076 /* If this reloc section does not use the main symbol table we
2077 don't treat it as a reloc section. BFD can't adequately
2078 represent such a section, so at least for now, we don't
c044fabd 2079 try. We just present it as a normal section. We also
60bcf0fa 2080 can't use it as a reloc section if it points to the null
185ef66d
AM
2081 section, an invalid section, or another reloc section. */
2082 if (hdr->sh_link != elf_onesymtab (abfd)
2083 || hdr->sh_info == SHN_UNDEF
2084 || (hdr->sh_info >= SHN_LORESERVE && hdr->sh_info <= SHN_HIRESERVE)
2085 || hdr->sh_info >= num_sec
2086 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2087 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
2088 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2089 shindex);
252b5132
RH
2090
2091 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2092 return FALSE;
252b5132
RH
2093 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2094 if (target_sect == NULL)
b34976b6 2095 return FALSE;
252b5132
RH
2096
2097 if ((target_sect->flags & SEC_RELOC) == 0
2098 || target_sect->reloc_count == 0)
2099 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2100 else
2101 {
dc810e39 2102 bfd_size_type amt;
252b5132 2103 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2104 amt = sizeof (*hdr2);
217aa764 2105 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2106 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2107 }
2108 *hdr2 = *hdr;
2109 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2110 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2111 target_sect->flags |= SEC_RELOC;
2112 target_sect->relocation = NULL;
2113 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2114 /* In the section to which the relocations apply, mark whether
2115 its relocations are of the REL or RELA variety. */
72730e0c 2116 if (hdr->sh_size != 0)
68bfbfcc 2117 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2118 abfd->flags |= HAS_RELOC;
b34976b6 2119 return TRUE;
252b5132
RH
2120 }
2121 break;
2122
2123 case SHT_GNU_verdef:
2124 elf_dynverdef (abfd) = shindex;
2125 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2126 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2127 break;
2128
2129 case SHT_GNU_versym:
a50b2160
JJ
2130 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2131 return FALSE;
252b5132
RH
2132 elf_dynversym (abfd) = shindex;
2133 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2134 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2135
2136 case SHT_GNU_verneed:
2137 elf_dynverref (abfd) = shindex;
2138 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2139 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2140
2141 case SHT_SHLIB:
b34976b6 2142 return TRUE;
252b5132 2143
dbb410c3 2144 case SHT_GROUP:
b885599b
AM
2145 /* We need a BFD section for objcopy and relocatable linking,
2146 and it's handy to have the signature available as the section
2147 name. */
a50b2160
JJ
2148 if (hdr->sh_entsize != GRP_ENTRY_SIZE)
2149 return FALSE;
b885599b
AM
2150 name = group_signature (abfd, hdr);
2151 if (name == NULL)
b34976b6 2152 return FALSE;
6dc132d9 2153 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2154 return FALSE;
dbb410c3
AM
2155 if (hdr->contents != NULL)
2156 {
2157 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2158 unsigned int n_elt = hdr->sh_size / 4;
2159 asection *s;
2160
b885599b
AM
2161 if (idx->flags & GRP_COMDAT)
2162 hdr->bfd_section->flags
2163 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2164
45c5e9ed
L
2165 /* We try to keep the same section order as it comes in. */
2166 idx += n_elt;
dbb410c3 2167 while (--n_elt != 0)
45c5e9ed 2168 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2169 && elf_next_in_group (s) != NULL)
dbb410c3 2170 {
945906ff 2171 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2172 break;
2173 }
2174 }
2175 break;
2176
252b5132
RH
2177 default:
2178 /* Check for any processor-specific section types. */
3eb70a79
L
2179 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2180 return TRUE;
2181
2182 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2183 {
2184 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2185 /* FIXME: How to properly handle allocated section reserved
2186 for applications? */
2187 (*_bfd_error_handler)
2188 (_("%B: don't know how to handle allocated, application "
2189 "specific section `%s' [0x%8x]"),
2190 abfd, name, hdr->sh_type);
2191 else
2192 /* Allow sections reserved for applications. */
2193 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2194 shindex);
2195 }
2196 else if (hdr->sh_type >= SHT_LOPROC
2197 && hdr->sh_type <= SHT_HIPROC)
2198 /* FIXME: We should handle this section. */
2199 (*_bfd_error_handler)
2200 (_("%B: don't know how to handle processor specific section "
2201 "`%s' [0x%8x]"),
2202 abfd, name, hdr->sh_type);
2203 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2204 {
2205 /* Unrecognised OS-specific sections. */
2206 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2207 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2208 required to correctly process the section and the file should
2209 be rejected with an error message. */
2210 (*_bfd_error_handler)
2211 (_("%B: don't know how to handle OS specific section "
2212 "`%s' [0x%8x]"),
2213 abfd, name, hdr->sh_type);
2214 else
2215 /* Otherwise it should be processed. */
2216 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2217 }
3eb70a79
L
2218 else
2219 /* FIXME: We should handle this section. */
2220 (*_bfd_error_handler)
2221 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2222 abfd, name, hdr->sh_type);
2223
2224 return FALSE;
252b5132
RH
2225 }
2226
b34976b6 2227 return TRUE;
252b5132
RH
2228}
2229
ec338859
AM
2230/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2231 Return SEC for sections that have no elf section, and NULL on error. */
2232
2233asection *
217aa764
AM
2234bfd_section_from_r_symndx (bfd *abfd,
2235 struct sym_sec_cache *cache,
2236 asection *sec,
2237 unsigned long r_symndx)
ec338859 2238{
ec338859 2239 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2240 unsigned char esym[sizeof (Elf64_External_Sym)];
2241 Elf_External_Sym_Shndx eshndx;
2242 Elf_Internal_Sym isym;
ec338859
AM
2243 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2244
2245 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2246 return cache->sec[ent];
2247
2248 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2249 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2250 &isym, esym, &eshndx) == NULL)
ec338859 2251 return NULL;
9ad5cbcf 2252
ec338859
AM
2253 if (cache->abfd != abfd)
2254 {
2255 memset (cache->indx, -1, sizeof (cache->indx));
2256 cache->abfd = abfd;
2257 }
2258 cache->indx[ent] = r_symndx;
2259 cache->sec[ent] = sec;
50bc7936
AM
2260 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2261 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2262 {
2263 asection *s;
6cdc0ccc 2264 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2265 if (s != NULL)
2266 cache->sec[ent] = s;
2267 }
2268 return cache->sec[ent];
2269}
2270
252b5132
RH
2271/* Given an ELF section number, retrieve the corresponding BFD
2272 section. */
2273
2274asection *
217aa764 2275bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2276{
9ad5cbcf 2277 if (index >= elf_numsections (abfd))
252b5132
RH
2278 return NULL;
2279 return elf_elfsections (abfd)[index]->bfd_section;
2280}
2281
b35d266b 2282static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2283{
0112cd26
NC
2284 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2285 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2286};
2287
b35d266b 2288static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2289{
0112cd26
NC
2290 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2291 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2292};
2293
b35d266b 2294static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2295{
0112cd26
NC
2296 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2297 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2298 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2299 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2300 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2301 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2302 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2303 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2304 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2305 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2306 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2307};
2308
b35d266b 2309static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2310{
0112cd26
NC
2311 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2312 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2313 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2314};
2315
b35d266b 2316static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2317{
0112cd26
NC
2318 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2319 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2320 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2321 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2322 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2323 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2324 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2325 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2326 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2327};
2328
b35d266b 2329static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2330{
0112cd26
NC
2331 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2332 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2333};
2334
b35d266b 2335static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2336{
0112cd26
NC
2337 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2338 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2339 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2340 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2341};
2342
b35d266b 2343static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2344{
0112cd26
NC
2345 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2346 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2347};
2348
b35d266b 2349static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2350{
0112cd26
NC
2351 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2352 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2353 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2354};
2355
b35d266b 2356static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2357{
0112cd26
NC
2358 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2359 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2360 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2361};
2362
b35d266b 2363static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2364{
0112cd26
NC
2365 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2366 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2367 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2368 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2369 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2370};
2371
b35d266b 2372static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2373{
0112cd26
NC
2374 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2375 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2376 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
2377 { STRING_COMMA_LEN (".stabstr"), 3, SHT_STRTAB, 0 },
2378 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2379};
2380
b35d266b 2381static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2382{
0112cd26
NC
2383 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2384 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2385 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2386 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2387};
2388
b35d266b 2389static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2390{
7f4d3958
L
2391 special_sections_b, /* 'b' */
2392 special_sections_c, /* 'b' */
2393 special_sections_d, /* 'd' */
2394 NULL, /* 'e' */
2395 special_sections_f, /* 'f' */
2396 special_sections_g, /* 'g' */
2397 special_sections_h, /* 'h' */
2398 special_sections_i, /* 'i' */
2399 NULL, /* 'j' */
2400 NULL, /* 'k' */
2401 special_sections_l, /* 'l' */
2402 NULL, /* 'm' */
2403 special_sections_n, /* 'n' */
2404 NULL, /* 'o' */
2405 special_sections_p, /* 'p' */
2406 NULL, /* 'q' */
2407 special_sections_r, /* 'r' */
2408 special_sections_s, /* 's' */
2409 special_sections_t, /* 't' */
7f4d3958
L
2410};
2411
551b43fd
AM
2412const struct bfd_elf_special_section *
2413_bfd_elf_get_special_section (const char *name,
2414 const struct bfd_elf_special_section *spec,
2415 unsigned int rela)
2f89ff8d
L
2416{
2417 int i;
7f4d3958 2418 int len;
7f4d3958 2419
551b43fd 2420 len = strlen (name);
7f4d3958 2421
551b43fd 2422 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2423 {
2424 int suffix_len;
551b43fd 2425 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2426
2427 if (len < prefix_len)
2428 continue;
551b43fd 2429 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2430 continue;
2431
551b43fd 2432 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2433 if (suffix_len <= 0)
2434 {
2435 if (name[prefix_len] != 0)
2436 {
2437 if (suffix_len == 0)
2438 continue;
2439 if (name[prefix_len] != '.'
2440 && (suffix_len == -2
551b43fd 2441 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2442 continue;
2443 }
2444 }
2445 else
2446 {
2447 if (len < prefix_len + suffix_len)
2448 continue;
2449 if (memcmp (name + len - suffix_len,
551b43fd 2450 spec[i].prefix + prefix_len,
7dcb9820
AM
2451 suffix_len) != 0)
2452 continue;
2453 }
551b43fd 2454 return &spec[i];
7dcb9820 2455 }
2f89ff8d
L
2456
2457 return NULL;
2458}
2459
7dcb9820 2460const struct bfd_elf_special_section *
29ef7005 2461_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2462{
551b43fd
AM
2463 int i;
2464 const struct bfd_elf_special_section *spec;
29ef7005 2465 const struct elf_backend_data *bed;
2f89ff8d
L
2466
2467 /* See if this is one of the special sections. */
551b43fd
AM
2468 if (sec->name == NULL)
2469 return NULL;
2f89ff8d 2470
29ef7005
L
2471 bed = get_elf_backend_data (abfd);
2472 spec = bed->special_sections;
2473 if (spec)
2474 {
2475 spec = _bfd_elf_get_special_section (sec->name,
2476 bed->special_sections,
2477 sec->use_rela_p);
2478 if (spec != NULL)
2479 return spec;
2480 }
2481
551b43fd
AM
2482 if (sec->name[0] != '.')
2483 return NULL;
2f89ff8d 2484
551b43fd
AM
2485 i = sec->name[1] - 'b';
2486 if (i < 0 || i > 't' - 'b')
2487 return NULL;
2488
2489 spec = special_sections[i];
2f89ff8d 2490
551b43fd
AM
2491 if (spec == NULL)
2492 return NULL;
2493
2494 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2495}
2496
b34976b6 2497bfd_boolean
217aa764 2498_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2499{
2500 struct bfd_elf_section_data *sdata;
551b43fd 2501 const struct elf_backend_data *bed;
7dcb9820 2502 const struct bfd_elf_special_section *ssect;
252b5132 2503
f0abc2a1
AM
2504 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2505 if (sdata == NULL)
2506 {
217aa764 2507 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2508 if (sdata == NULL)
2509 return FALSE;
217aa764 2510 sec->used_by_bfd = sdata;
f0abc2a1 2511 }
bf572ba0 2512
551b43fd
AM
2513 /* Indicate whether or not this section should use RELA relocations. */
2514 bed = get_elf_backend_data (abfd);
2515 sec->use_rela_p = bed->default_use_rela_p;
2516
e843e0f8
L
2517 /* When we read a file, we don't need to set ELF section type and
2518 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2519 anyway. We will set ELF section type and flags for all linker
2520 created sections. If user specifies BFD section flags, we will
2521 set ELF section type and flags based on BFD section flags in
2522 elf_fake_sections. */
2523 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2524 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2525 {
551b43fd 2526 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2527 if (ssect != NULL)
2528 {
2529 elf_section_type (sec) = ssect->type;
2530 elf_section_flags (sec) = ssect->attr;
2531 }
2f89ff8d
L
2532 }
2533
f592407e 2534 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2535}
2536
2537/* Create a new bfd section from an ELF program header.
2538
2539 Since program segments have no names, we generate a synthetic name
2540 of the form segment<NUM>, where NUM is generally the index in the
2541 program header table. For segments that are split (see below) we
2542 generate the names segment<NUM>a and segment<NUM>b.
2543
2544 Note that some program segments may have a file size that is different than
2545 (less than) the memory size. All this means is that at execution the
2546 system must allocate the amount of memory specified by the memory size,
2547 but only initialize it with the first "file size" bytes read from the
2548 file. This would occur for example, with program segments consisting
2549 of combined data+bss.
2550
2551 To handle the above situation, this routine generates TWO bfd sections
2552 for the single program segment. The first has the length specified by
2553 the file size of the segment, and the second has the length specified
2554 by the difference between the two sizes. In effect, the segment is split
2555 into it's initialized and uninitialized parts.
2556
2557 */
2558
b34976b6 2559bfd_boolean
217aa764
AM
2560_bfd_elf_make_section_from_phdr (bfd *abfd,
2561 Elf_Internal_Phdr *hdr,
2562 int index,
2563 const char *typename)
252b5132
RH
2564{
2565 asection *newsect;
2566 char *name;
2567 char namebuf[64];
d4c88bbb 2568 size_t len;
252b5132
RH
2569 int split;
2570
2571 split = ((hdr->p_memsz > 0)
2572 && (hdr->p_filesz > 0)
2573 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2574 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2575 len = strlen (namebuf) + 1;
217aa764 2576 name = bfd_alloc (abfd, len);
252b5132 2577 if (!name)
b34976b6 2578 return FALSE;
d4c88bbb 2579 memcpy (name, namebuf, len);
252b5132
RH
2580 newsect = bfd_make_section (abfd, name);
2581 if (newsect == NULL)
b34976b6 2582 return FALSE;
252b5132
RH
2583 newsect->vma = hdr->p_vaddr;
2584 newsect->lma = hdr->p_paddr;
eea6121a 2585 newsect->size = hdr->p_filesz;
252b5132
RH
2586 newsect->filepos = hdr->p_offset;
2587 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2588 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2589 if (hdr->p_type == PT_LOAD)
2590 {
2591 newsect->flags |= SEC_ALLOC;
2592 newsect->flags |= SEC_LOAD;
2593 if (hdr->p_flags & PF_X)
2594 {
2595 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2596 may be data. */
252b5132
RH
2597 newsect->flags |= SEC_CODE;
2598 }
2599 }
2600 if (!(hdr->p_flags & PF_W))
2601 {
2602 newsect->flags |= SEC_READONLY;
2603 }
2604
2605 if (split)
2606 {
27ac83bf 2607 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2608 len = strlen (namebuf) + 1;
217aa764 2609 name = bfd_alloc (abfd, len);
252b5132 2610 if (!name)
b34976b6 2611 return FALSE;
d4c88bbb 2612 memcpy (name, namebuf, len);
252b5132
RH
2613 newsect = bfd_make_section (abfd, name);
2614 if (newsect == NULL)
b34976b6 2615 return FALSE;
252b5132
RH
2616 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2617 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2618 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2619 if (hdr->p_type == PT_LOAD)
2620 {
2621 newsect->flags |= SEC_ALLOC;
2622 if (hdr->p_flags & PF_X)
2623 newsect->flags |= SEC_CODE;
2624 }
2625 if (!(hdr->p_flags & PF_W))
2626 newsect->flags |= SEC_READONLY;
2627 }
2628
b34976b6 2629 return TRUE;
252b5132
RH
2630}
2631
b34976b6 2632bfd_boolean
217aa764 2633bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2634{
9c5bfbb7 2635 const struct elf_backend_data *bed;
20cfcaae
NC
2636
2637 switch (hdr->p_type)
2638 {
2639 case PT_NULL:
2640 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2641
2642 case PT_LOAD:
2643 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2644
2645 case PT_DYNAMIC:
2646 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2647
2648 case PT_INTERP:
2649 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2650
2651 case PT_NOTE:
2652 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2653 return FALSE;
217aa764 2654 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2655 return FALSE;
2656 return TRUE;
20cfcaae
NC
2657
2658 case PT_SHLIB:
2659 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2660
2661 case PT_PHDR:
2662 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2663
811072d8
RM
2664 case PT_GNU_EH_FRAME:
2665 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2666 "eh_frame_hdr");
2667
9ee5e499
JJ
2668 case PT_GNU_STACK:
2669 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2670
8c37241b
JJ
2671 case PT_GNU_RELRO:
2672 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2673
20cfcaae 2674 default:
8c1acd09 2675 /* Check for any processor-specific program segment types. */
20cfcaae 2676 bed = get_elf_backend_data (abfd);
d27f5fa1 2677 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2678 }
2679}
2680
23bc299b 2681/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2682 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2683 relocations; otherwise, we use REL relocations. */
2684
b34976b6 2685bfd_boolean
217aa764
AM
2686_bfd_elf_init_reloc_shdr (bfd *abfd,
2687 Elf_Internal_Shdr *rel_hdr,
2688 asection *asect,
2689 bfd_boolean use_rela_p)
23bc299b
MM
2690{
2691 char *name;
9c5bfbb7 2692 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2693 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2694
dc810e39 2695 name = bfd_alloc (abfd, amt);
23bc299b 2696 if (name == NULL)
b34976b6 2697 return FALSE;
23bc299b
MM
2698 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2699 rel_hdr->sh_name =
2b0f7ef9 2700 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2701 FALSE);
23bc299b 2702 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2703 return FALSE;
23bc299b
MM
2704 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2705 rel_hdr->sh_entsize = (use_rela_p
2706 ? bed->s->sizeof_rela
2707 : bed->s->sizeof_rel);
45d6a902 2708 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2709 rel_hdr->sh_flags = 0;
2710 rel_hdr->sh_addr = 0;
2711 rel_hdr->sh_size = 0;
2712 rel_hdr->sh_offset = 0;
2713
b34976b6 2714 return TRUE;
23bc299b
MM
2715}
2716
252b5132
RH
2717/* Set up an ELF internal section header for a section. */
2718
252b5132 2719static void
217aa764 2720elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2721{
9c5bfbb7 2722 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2723 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2724 Elf_Internal_Shdr *this_hdr;
2725
2726 if (*failedptr)
2727 {
2728 /* We already failed; just get out of the bfd_map_over_sections
2729 loop. */
2730 return;
2731 }
2732
2733 this_hdr = &elf_section_data (asect)->this_hdr;
2734
e57b5356
AM
2735 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2736 asect->name, FALSE);
2737 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2738 {
b34976b6 2739 *failedptr = TRUE;
252b5132
RH
2740 return;
2741 }
2742
a4d8e49b 2743 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2744
2745 if ((asect->flags & SEC_ALLOC) != 0
2746 || asect->user_set_vma)
2747 this_hdr->sh_addr = asect->vma;
2748 else
2749 this_hdr->sh_addr = 0;
2750
2751 this_hdr->sh_offset = 0;
eea6121a 2752 this_hdr->sh_size = asect->size;
252b5132
RH
2753 this_hdr->sh_link = 0;
2754 this_hdr->sh_addralign = 1 << asect->alignment_power;
2755 /* The sh_entsize and sh_info fields may have been set already by
2756 copy_private_section_data. */
2757
2758 this_hdr->bfd_section = asect;
2759 this_hdr->contents = NULL;
2760
3cddba1e
L
2761 /* If the section type is unspecified, we set it based on
2762 asect->flags. */
2763 if (this_hdr->sh_type == SHT_NULL)
2764 {
45c5e9ed 2765 if ((asect->flags & SEC_GROUP) != 0)
ccd2ec6a 2766 this_hdr->sh_type = SHT_GROUP;
45c5e9ed 2767 else if ((asect->flags & SEC_ALLOC) != 0
1ea63fd2
AM
2768 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2769 || (asect->flags & SEC_NEVER_LOAD) != 0))
3cddba1e
L
2770 this_hdr->sh_type = SHT_NOBITS;
2771 else
2772 this_hdr->sh_type = SHT_PROGBITS;
2773 }
2774
2f89ff8d 2775 switch (this_hdr->sh_type)
252b5132 2776 {
2f89ff8d 2777 default:
2f89ff8d
L
2778 break;
2779
2780 case SHT_STRTAB:
2781 case SHT_INIT_ARRAY:
2782 case SHT_FINI_ARRAY:
2783 case SHT_PREINIT_ARRAY:
2784 case SHT_NOTE:
2785 case SHT_NOBITS:
2786 case SHT_PROGBITS:
2787 break;
2788
2789 case SHT_HASH:
c7ac6ff8 2790 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2791 break;
5de3bf90 2792
2f89ff8d 2793 case SHT_DYNSYM:
252b5132 2794 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2795 break;
2796
2797 case SHT_DYNAMIC:
252b5132 2798 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2799 break;
2800
2801 case SHT_RELA:
2802 if (get_elf_backend_data (abfd)->may_use_rela_p)
2803 this_hdr->sh_entsize = bed->s->sizeof_rela;
2804 break;
2805
2806 case SHT_REL:
2807 if (get_elf_backend_data (abfd)->may_use_rel_p)
2808 this_hdr->sh_entsize = bed->s->sizeof_rel;
2809 break;
2810
2811 case SHT_GNU_versym:
252b5132 2812 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2813 break;
2814
2815 case SHT_GNU_verdef:
252b5132
RH
2816 this_hdr->sh_entsize = 0;
2817 /* objcopy or strip will copy over sh_info, but may not set
2818 cverdefs. The linker will set cverdefs, but sh_info will be
2819 zero. */
2820 if (this_hdr->sh_info == 0)
2821 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2822 else
2823 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2824 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2825 break;
2826
2827 case SHT_GNU_verneed:
252b5132
RH
2828 this_hdr->sh_entsize = 0;
2829 /* objcopy or strip will copy over sh_info, but may not set
2830 cverrefs. The linker will set cverrefs, but sh_info will be
2831 zero. */
2832 if (this_hdr->sh_info == 0)
2833 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2834 else
2835 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2836 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2837 break;
2838
2839 case SHT_GROUP:
dbb410c3 2840 this_hdr->sh_entsize = 4;
2f89ff8d 2841 break;
fdc90cb4
JJ
2842
2843 case SHT_GNU_HASH:
2844 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2845 break;
dbb410c3 2846 }
252b5132
RH
2847
2848 if ((asect->flags & SEC_ALLOC) != 0)
2849 this_hdr->sh_flags |= SHF_ALLOC;
2850 if ((asect->flags & SEC_READONLY) == 0)
2851 this_hdr->sh_flags |= SHF_WRITE;
2852 if ((asect->flags & SEC_CODE) != 0)
2853 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2854 if ((asect->flags & SEC_MERGE) != 0)
2855 {
2856 this_hdr->sh_flags |= SHF_MERGE;
2857 this_hdr->sh_entsize = asect->entsize;
2858 if ((asect->flags & SEC_STRINGS) != 0)
2859 this_hdr->sh_flags |= SHF_STRINGS;
2860 }
1126897b 2861 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2862 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2863 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2864 {
2865 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2866 if (asect->size == 0
2867 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2868 {
3a800eb9 2869 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2870
704afa60 2871 this_hdr->sh_size = 0;
3a800eb9
AM
2872 if (o != NULL)
2873 {
704afa60 2874 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2875 if (this_hdr->sh_size != 0)
2876 this_hdr->sh_type = SHT_NOBITS;
2877 }
704afa60
JJ
2878 }
2879 }
252b5132
RH
2880
2881 /* Check for processor-specific section types. */
e1fddb6b
AO
2882 if (bed->elf_backend_fake_sections
2883 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2884 *failedptr = TRUE;
252b5132
RH
2885
2886 /* If the section has relocs, set up a section header for the
23bc299b
MM
2887 SHT_REL[A] section. If two relocation sections are required for
2888 this section, it is up to the processor-specific back-end to
c044fabd 2889 create the other. */
23bc299b 2890 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2891 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2892 &elf_section_data (asect)->rel_hdr,
c044fabd 2893 asect,
68bfbfcc 2894 asect->use_rela_p))
b34976b6 2895 *failedptr = TRUE;
252b5132
RH
2896}
2897
dbb410c3
AM
2898/* Fill in the contents of a SHT_GROUP section. */
2899
1126897b 2900void
217aa764 2901bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2902{
217aa764 2903 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2904 unsigned long symindx;
9dce4196 2905 asection *elt, *first;
dbb410c3 2906 unsigned char *loc;
b34976b6 2907 bfd_boolean gas;
dbb410c3 2908
7e4111ad
L
2909 /* Ignore linker created group section. See elfNN_ia64_object_p in
2910 elfxx-ia64.c. */
2911 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2912 || *failedptr)
2913 return;
2914
1126897b
AM
2915 symindx = 0;
2916 if (elf_group_id (sec) != NULL)
2917 symindx = elf_group_id (sec)->udata.i;
2918
2919 if (symindx == 0)
2920 {
2921 /* If called from the assembler, swap_out_syms will have set up
2922 elf_section_syms; If called for "ld -r", use target_index. */
2923 if (elf_section_syms (abfd) != NULL)
2924 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2925 else
2926 symindx = sec->target_index;
2927 }
dbb410c3
AM
2928 elf_section_data (sec)->this_hdr.sh_info = symindx;
2929
1126897b 2930 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2931 gas = TRUE;
dbb410c3
AM
2932 if (sec->contents == NULL)
2933 {
b34976b6 2934 gas = FALSE;
eea6121a 2935 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2936
2937 /* Arrange for the section to be written out. */
2938 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2939 if (sec->contents == NULL)
2940 {
b34976b6 2941 *failedptr = TRUE;
dbb410c3
AM
2942 return;
2943 }
2944 }
2945
eea6121a 2946 loc = sec->contents + sec->size;
dbb410c3 2947
9dce4196
AM
2948 /* Get the pointer to the first section in the group that gas
2949 squirreled away here. objcopy arranges for this to be set to the
2950 start of the input section group. */
2951 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2952
2953 /* First element is a flag word. Rest of section is elf section
2954 indices for all the sections of the group. Write them backwards
2955 just to keep the group in the same order as given in .section
2956 directives, not that it matters. */
2957 while (elt != NULL)
2958 {
9dce4196
AM
2959 asection *s;
2960 unsigned int idx;
2961
dbb410c3 2962 loc -= 4;
9dce4196
AM
2963 s = elt;
2964 if (!gas)
2965 s = s->output_section;
2966 idx = 0;
2967 if (s != NULL)
2968 idx = elf_section_data (s)->this_idx;
2969 H_PUT_32 (abfd, idx, loc);
945906ff 2970 elt = elf_next_in_group (elt);
9dce4196
AM
2971 if (elt == first)
2972 break;
dbb410c3
AM
2973 }
2974
3d7f7666 2975 if ((loc -= 4) != sec->contents)
9dce4196 2976 abort ();
dbb410c3 2977
9dce4196 2978 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2979}
2980
252b5132
RH
2981/* Assign all ELF section numbers. The dummy first section is handled here
2982 too. The link/info pointers for the standard section types are filled
2983 in here too, while we're at it. */
2984
b34976b6 2985static bfd_boolean
da9f89d4 2986assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2987{
2988 struct elf_obj_tdata *t = elf_tdata (abfd);
2989 asection *sec;
2b0f7ef9 2990 unsigned int section_number, secn;
252b5132 2991 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2992 struct bfd_elf_section_data *d;
252b5132
RH
2993
2994 section_number = 1;
2995
2b0f7ef9
JJ
2996 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2997
da9f89d4
L
2998 /* SHT_GROUP sections are in relocatable files only. */
2999 if (link_info == NULL || link_info->relocatable)
252b5132 3000 {
da9f89d4 3001 /* Put SHT_GROUP sections first. */
04dd1667 3002 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3003 {
5daa8fe7 3004 d = elf_section_data (sec);
da9f89d4
L
3005
3006 if (d->this_hdr.sh_type == SHT_GROUP)
3007 {
5daa8fe7 3008 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3009 {
3010 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3011 bfd_section_list_remove (abfd, sec);
da9f89d4 3012 abfd->section_count--;
da9f89d4
L
3013 }
3014 else
3015 {
3016 if (section_number == SHN_LORESERVE)
3017 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
3018 d->this_idx = section_number++;
3019 }
3020 }
47cc2cf5
PB
3021 }
3022 }
3023
3024 for (sec = abfd->sections; sec; sec = sec->next)
3025 {
3026 d = elf_section_data (sec);
3027
3028 if (d->this_hdr.sh_type != SHT_GROUP)
3029 {
3030 if (section_number == SHN_LORESERVE)
3031 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
3032 d->this_idx = section_number++;
3033 }
2b0f7ef9 3034 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
3035 if ((sec->flags & SEC_RELOC) == 0)
3036 d->rel_idx = 0;
3037 else
2b0f7ef9 3038 {
9ad5cbcf
AM
3039 if (section_number == SHN_LORESERVE)
3040 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
3041 d->rel_idx = section_number++;
3042 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
3043 }
23bc299b
MM
3044
3045 if (d->rel_hdr2)
2b0f7ef9 3046 {
9ad5cbcf
AM
3047 if (section_number == SHN_LORESERVE)
3048 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
3049 d->rel_idx2 = section_number++;
3050 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
3051 }
23bc299b
MM
3052 else
3053 d->rel_idx2 = 0;
252b5132
RH
3054 }
3055
9ad5cbcf
AM
3056 if (section_number == SHN_LORESERVE)
3057 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3058 t->shstrtab_section = section_number++;
2b0f7ef9 3059 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 3060 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
3061
3062 if (bfd_get_symcount (abfd) > 0)
3063 {
9ad5cbcf
AM
3064 if (section_number == SHN_LORESERVE)
3065 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3066 t->symtab_section = section_number++;
2b0f7ef9 3067 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
3068 if (section_number > SHN_LORESERVE - 2)
3069 {
3070 if (section_number == SHN_LORESERVE)
3071 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
3072 t->symtab_shndx_section = section_number++;
3073 t->symtab_shndx_hdr.sh_name
3074 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3075 ".symtab_shndx", FALSE);
9ad5cbcf 3076 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 3077 return FALSE;
9ad5cbcf
AM
3078 }
3079 if (section_number == SHN_LORESERVE)
3080 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3081 t->strtab_section = section_number++;
2b0f7ef9 3082 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3083 }
3084
2b0f7ef9
JJ
3085 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3086 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3087
3088 elf_numsections (abfd) = section_number;
252b5132 3089 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
3090 if (section_number > SHN_LORESERVE)
3091 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
3092
3093 /* Set up the list of section header pointers, in agreement with the
3094 indices. */
d0fb9a8d 3095 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 3096 if (i_shdrp == NULL)
b34976b6 3097 return FALSE;
252b5132 3098
d0fb9a8d 3099 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
3100 if (i_shdrp[0] == NULL)
3101 {
3102 bfd_release (abfd, i_shdrp);
b34976b6 3103 return FALSE;
252b5132 3104 }
252b5132
RH
3105
3106 elf_elfsections (abfd) = i_shdrp;
3107
3108 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3109 if (bfd_get_symcount (abfd) > 0)
3110 {
3111 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3112 if (elf_numsections (abfd) > SHN_LORESERVE)
3113 {
3114 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3115 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3116 }
252b5132
RH
3117 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3118 t->symtab_hdr.sh_link = t->strtab_section;
3119 }
38ce5b11 3120
252b5132
RH
3121 for (sec = abfd->sections; sec; sec = sec->next)
3122 {
3123 struct bfd_elf_section_data *d = elf_section_data (sec);
3124 asection *s;
3125 const char *name;
3126
3127 i_shdrp[d->this_idx] = &d->this_hdr;
3128 if (d->rel_idx != 0)
3129 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3130 if (d->rel_idx2 != 0)
3131 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3132
3133 /* Fill in the sh_link and sh_info fields while we're at it. */
3134
3135 /* sh_link of a reloc section is the section index of the symbol
3136 table. sh_info is the section index of the section to which
3137 the relocation entries apply. */
3138 if (d->rel_idx != 0)
3139 {
3140 d->rel_hdr.sh_link = t->symtab_section;
3141 d->rel_hdr.sh_info = d->this_idx;
3142 }
23bc299b
MM
3143 if (d->rel_idx2 != 0)
3144 {
3145 d->rel_hdr2->sh_link = t->symtab_section;
3146 d->rel_hdr2->sh_info = d->this_idx;
3147 }
252b5132 3148
38ce5b11
L
3149 /* We need to set up sh_link for SHF_LINK_ORDER. */
3150 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3151 {
3152 s = elf_linked_to_section (sec);
3153 if (s)
38ce5b11 3154 {
f2876037 3155 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3156 if (link_info != NULL)
38ce5b11 3157 {
f2876037 3158 /* Check discarded linkonce section. */
ccd2ec6a 3159 if (elf_discarded_section (s))
38ce5b11 3160 {
ccd2ec6a
L
3161 asection *kept;
3162 (*_bfd_error_handler)
3163 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3164 abfd, d->this_hdr.bfd_section,
3165 s, s->owner);
3166 /* Point to the kept section if it has the same
3167 size as the discarded one. */
3168 kept = _bfd_elf_check_kept_section (s);
3169 if (kept == NULL)
185d09ad 3170 {
ccd2ec6a
L
3171 bfd_set_error (bfd_error_bad_value);
3172 return FALSE;
185d09ad 3173 }
ccd2ec6a 3174 s = kept;
38ce5b11 3175 }
e424ecc8 3176
ccd2ec6a
L
3177 s = s->output_section;
3178 BFD_ASSERT (s != NULL);
38ce5b11 3179 }
f2876037
L
3180 else
3181 {
3182 /* Handle objcopy. */
3183 if (s->output_section == NULL)
3184 {
3185 (*_bfd_error_handler)
3186 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3187 abfd, d->this_hdr.bfd_section, s, s->owner);
3188 bfd_set_error (bfd_error_bad_value);
3189 return FALSE;
3190 }
3191 s = s->output_section;
3192 }
ccd2ec6a
L
3193 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3194 }
3195 else
3196 {
3197 /* PR 290:
3198 The Intel C compiler generates SHT_IA_64_UNWIND with
3199 SHF_LINK_ORDER. But it doesn't set the sh_link or
3200 sh_info fields. Hence we could get the situation
3201 where s is NULL. */
3202 const struct elf_backend_data *bed
3203 = get_elf_backend_data (abfd);
3204 if (bed->link_order_error_handler)
3205 bed->link_order_error_handler
3206 (_("%B: warning: sh_link not set for section `%A'"),
3207 abfd, sec);
38ce5b11
L
3208 }
3209 }
3210
252b5132
RH
3211 switch (d->this_hdr.sh_type)
3212 {
3213 case SHT_REL:
3214 case SHT_RELA:
3215 /* A reloc section which we are treating as a normal BFD
3216 section. sh_link is the section index of the symbol
3217 table. sh_info is the section index of the section to
3218 which the relocation entries apply. We assume that an
3219 allocated reloc section uses the dynamic symbol table.
3220 FIXME: How can we be sure? */
3221 s = bfd_get_section_by_name (abfd, ".dynsym");
3222 if (s != NULL)
3223 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3224
3225 /* We look up the section the relocs apply to by name. */
3226 name = sec->name;
3227 if (d->this_hdr.sh_type == SHT_REL)
3228 name += 4;
3229 else
3230 name += 5;
3231 s = bfd_get_section_by_name (abfd, name);
3232 if (s != NULL)
3233 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3234 break;
3235
3236 case SHT_STRTAB:
3237 /* We assume that a section named .stab*str is a stabs
3238 string section. We look for a section with the same name
3239 but without the trailing ``str'', and set its sh_link
3240 field to point to this section. */
0112cd26 3241 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3242 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3243 {
3244 size_t len;
3245 char *alc;
3246
3247 len = strlen (sec->name);
217aa764 3248 alc = bfd_malloc (len - 2);
252b5132 3249 if (alc == NULL)
b34976b6 3250 return FALSE;
d4c88bbb 3251 memcpy (alc, sec->name, len - 3);
252b5132
RH
3252 alc[len - 3] = '\0';
3253 s = bfd_get_section_by_name (abfd, alc);
3254 free (alc);
3255 if (s != NULL)
3256 {
3257 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3258
3259 /* This is a .stab section. */
0594c12d
AM
3260 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3261 elf_section_data (s)->this_hdr.sh_entsize
3262 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3263 }
3264 }
3265 break;
3266
3267 case SHT_DYNAMIC:
3268 case SHT_DYNSYM:
3269 case SHT_GNU_verneed:
3270 case SHT_GNU_verdef:
3271 /* sh_link is the section header index of the string table
3272 used for the dynamic entries, or the symbol table, or the
3273 version strings. */
3274 s = bfd_get_section_by_name (abfd, ".dynstr");
3275 if (s != NULL)
3276 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3277 break;
3278
7f1204bb
JJ
3279 case SHT_GNU_LIBLIST:
3280 /* sh_link is the section header index of the prelink library
3281 list
3282 used for the dynamic entries, or the symbol table, or the
3283 version strings. */
3284 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3285 ? ".dynstr" : ".gnu.libstr");
3286 if (s != NULL)
3287 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3288 break;
3289
252b5132 3290 case SHT_HASH:
fdc90cb4 3291 case SHT_GNU_HASH:
252b5132
RH
3292 case SHT_GNU_versym:
3293 /* sh_link is the section header index of the symbol table
3294 this hash table or version table is for. */
3295 s = bfd_get_section_by_name (abfd, ".dynsym");
3296 if (s != NULL)
3297 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3298 break;
dbb410c3
AM
3299
3300 case SHT_GROUP:
3301 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3302 }
3303 }
3304
2b0f7ef9 3305 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3306 if (i_shdrp[secn] == NULL)
3307 i_shdrp[secn] = i_shdrp[0];
3308 else
3309 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3310 i_shdrp[secn]->sh_name);
b34976b6 3311 return TRUE;
252b5132
RH
3312}
3313
3314/* Map symbol from it's internal number to the external number, moving
3315 all local symbols to be at the head of the list. */
3316
5372391b 3317static bfd_boolean
217aa764 3318sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3319{
3320 /* If the backend has a special mapping, use it. */
9c5bfbb7 3321 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3322 if (bed->elf_backend_sym_is_global)
3323 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3324
3325 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3326 || bfd_is_und_section (bfd_get_section (sym))
3327 || bfd_is_com_section (bfd_get_section (sym)));
3328}
3329
5372391b
AM
3330/* Don't output section symbols for sections that are not going to be
3331 output. Also, don't output section symbols for reloc and other
3332 special sections. */
3333
3334static bfd_boolean
3335ignore_section_sym (bfd *abfd, asymbol *sym)
3336{
3337 return ((sym->flags & BSF_SECTION_SYM) != 0
3338 && (sym->value != 0
3339 || (sym->section->owner != abfd
3340 && (sym->section->output_section->owner != abfd
3341 || sym->section->output_offset != 0))));
3342}
3343
b34976b6 3344static bfd_boolean
217aa764 3345elf_map_symbols (bfd *abfd)
252b5132 3346{
dc810e39 3347 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3348 asymbol **syms = bfd_get_outsymbols (abfd);
3349 asymbol **sect_syms;
dc810e39
AM
3350 unsigned int num_locals = 0;
3351 unsigned int num_globals = 0;
3352 unsigned int num_locals2 = 0;
3353 unsigned int num_globals2 = 0;
252b5132 3354 int max_index = 0;
dc810e39 3355 unsigned int idx;
252b5132
RH
3356 asection *asect;
3357 asymbol **new_syms;
252b5132
RH
3358
3359#ifdef DEBUG
3360 fprintf (stderr, "elf_map_symbols\n");
3361 fflush (stderr);
3362#endif
3363
252b5132
RH
3364 for (asect = abfd->sections; asect; asect = asect->next)
3365 {
3366 if (max_index < asect->index)
3367 max_index = asect->index;
3368 }
3369
3370 max_index++;
d0fb9a8d 3371 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3372 if (sect_syms == NULL)
b34976b6 3373 return FALSE;
252b5132 3374 elf_section_syms (abfd) = sect_syms;
4e89ac30 3375 elf_num_section_syms (abfd) = max_index;
252b5132 3376
079e9a2f
AM
3377 /* Init sect_syms entries for any section symbols we have already
3378 decided to output. */
252b5132
RH
3379 for (idx = 0; idx < symcount; idx++)
3380 {
dc810e39 3381 asymbol *sym = syms[idx];
c044fabd 3382
252b5132 3383 if ((sym->flags & BSF_SECTION_SYM) != 0
5372391b 3384 && !ignore_section_sym (abfd, sym))
252b5132 3385 {
5372391b 3386 asection *sec = sym->section;
252b5132 3387
5372391b
AM
3388 if (sec->owner != abfd)
3389 sec = sec->output_section;
252b5132 3390
5372391b 3391 sect_syms[sec->index] = syms[idx];
252b5132
RH
3392 }
3393 }
3394
252b5132
RH
3395 /* Classify all of the symbols. */
3396 for (idx = 0; idx < symcount; idx++)
3397 {
5372391b
AM
3398 if (ignore_section_sym (abfd, syms[idx]))
3399 continue;
252b5132
RH
3400 if (!sym_is_global (abfd, syms[idx]))
3401 num_locals++;
3402 else
3403 num_globals++;
3404 }
079e9a2f 3405
5372391b 3406 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3407 sections will already have a section symbol in outsymbols, but
3408 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3409 at least in that case. */
252b5132
RH
3410 for (asect = abfd->sections; asect; asect = asect->next)
3411 {
079e9a2f 3412 if (sect_syms[asect->index] == NULL)
252b5132 3413 {
079e9a2f 3414 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3415 num_locals++;
3416 else
3417 num_globals++;
252b5132
RH
3418 }
3419 }
3420
3421 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3422 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3423
252b5132 3424 if (new_syms == NULL)
b34976b6 3425 return FALSE;
252b5132
RH
3426
3427 for (idx = 0; idx < symcount; idx++)
3428 {
3429 asymbol *sym = syms[idx];
dc810e39 3430 unsigned int i;
252b5132 3431
5372391b
AM
3432 if (ignore_section_sym (abfd, sym))
3433 continue;
252b5132
RH
3434 if (!sym_is_global (abfd, sym))
3435 i = num_locals2++;
3436 else
3437 i = num_locals + num_globals2++;
3438 new_syms[i] = sym;
3439 sym->udata.i = i + 1;
3440 }
3441 for (asect = abfd->sections; asect; asect = asect->next)
3442 {
079e9a2f 3443 if (sect_syms[asect->index] == NULL)
252b5132 3444 {
079e9a2f 3445 asymbol *sym = asect->symbol;
dc810e39 3446 unsigned int i;
252b5132 3447
079e9a2f 3448 sect_syms[asect->index] = sym;
252b5132
RH
3449 if (!sym_is_global (abfd, sym))
3450 i = num_locals2++;
3451 else
3452 i = num_locals + num_globals2++;
3453 new_syms[i] = sym;
3454 sym->udata.i = i + 1;
3455 }
3456 }
3457
3458 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3459
3460 elf_num_locals (abfd) = num_locals;
3461 elf_num_globals (abfd) = num_globals;
b34976b6 3462 return TRUE;
252b5132
RH
3463}
3464
3465/* Align to the maximum file alignment that could be required for any
3466 ELF data structure. */
3467
268b6b39 3468static inline file_ptr
217aa764 3469align_file_position (file_ptr off, int align)
252b5132
RH
3470{
3471 return (off + align - 1) & ~(align - 1);
3472}
3473
3474/* Assign a file position to a section, optionally aligning to the
3475 required section alignment. */
3476
217aa764
AM
3477file_ptr
3478_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3479 file_ptr offset,
3480 bfd_boolean align)
252b5132
RH
3481{
3482 if (align)
3483 {
3484 unsigned int al;
3485
3486 al = i_shdrp->sh_addralign;
3487 if (al > 1)
3488 offset = BFD_ALIGN (offset, al);
3489 }
3490 i_shdrp->sh_offset = offset;
3491 if (i_shdrp->bfd_section != NULL)
3492 i_shdrp->bfd_section->filepos = offset;
3493 if (i_shdrp->sh_type != SHT_NOBITS)
3494 offset += i_shdrp->sh_size;
3495 return offset;
3496}
3497
3498/* Compute the file positions we are going to put the sections at, and
3499 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3500 is not NULL, this is being called by the ELF backend linker. */
3501
b34976b6 3502bfd_boolean
217aa764
AM
3503_bfd_elf_compute_section_file_positions (bfd *abfd,
3504 struct bfd_link_info *link_info)
252b5132 3505{
9c5bfbb7 3506 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3507 bfd_boolean failed;
4b6c0f2f 3508 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3509 Elf_Internal_Shdr *shstrtab_hdr;
3510
3511 if (abfd->output_has_begun)
b34976b6 3512 return TRUE;
252b5132
RH
3513
3514 /* Do any elf backend specific processing first. */
3515 if (bed->elf_backend_begin_write_processing)
3516 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3517
3518 if (! prep_headers (abfd))
b34976b6 3519 return FALSE;
252b5132 3520
e6c51ed4
NC
3521 /* Post process the headers if necessary. */
3522 if (bed->elf_backend_post_process_headers)
3523 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3524
b34976b6 3525 failed = FALSE;
252b5132
RH
3526 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3527 if (failed)
b34976b6 3528 return FALSE;
252b5132 3529
da9f89d4 3530 if (!assign_section_numbers (abfd, link_info))
b34976b6 3531 return FALSE;
252b5132
RH
3532
3533 /* The backend linker builds symbol table information itself. */
3534 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3535 {
3536 /* Non-zero if doing a relocatable link. */
3537 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3538
3539 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3540 return FALSE;
252b5132
RH
3541 }
3542
1126897b 3543 if (link_info == NULL)
dbb410c3 3544 {
1126897b 3545 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3546 if (failed)
b34976b6 3547 return FALSE;
dbb410c3
AM
3548 }
3549
252b5132
RH
3550 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3551 /* sh_name was set in prep_headers. */
3552 shstrtab_hdr->sh_type = SHT_STRTAB;
3553 shstrtab_hdr->sh_flags = 0;
3554 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3555 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3556 shstrtab_hdr->sh_entsize = 0;
3557 shstrtab_hdr->sh_link = 0;
3558 shstrtab_hdr->sh_info = 0;
3559 /* sh_offset is set in assign_file_positions_except_relocs. */
3560 shstrtab_hdr->sh_addralign = 1;
3561
c84fca4d 3562 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3563 return FALSE;
252b5132
RH
3564
3565 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3566 {
3567 file_ptr off;
3568 Elf_Internal_Shdr *hdr;
3569
3570 off = elf_tdata (abfd)->next_file_pos;
3571
3572 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3573 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3574
9ad5cbcf
AM
3575 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3576 if (hdr->sh_size != 0)
b34976b6 3577 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3578
252b5132 3579 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3580 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3581
3582 elf_tdata (abfd)->next_file_pos = off;
3583
3584 /* Now that we know where the .strtab section goes, write it
3585 out. */
3586 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3587 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3588 return FALSE;
252b5132
RH
3589 _bfd_stringtab_free (strtab);
3590 }
3591
b34976b6 3592 abfd->output_has_begun = TRUE;
252b5132 3593
b34976b6 3594 return TRUE;
252b5132
RH
3595}
3596
8ded5a0f
AM
3597/* Make an initial estimate of the size of the program header. If we
3598 get the number wrong here, we'll redo section placement. */
3599
3600static bfd_size_type
3601get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3602{
3603 size_t segs;
3604 asection *s;
3605 const struct elf_backend_data *bed;
3606
3607 /* Assume we will need exactly two PT_LOAD segments: one for text
3608 and one for data. */
3609 segs = 2;
3610
3611 s = bfd_get_section_by_name (abfd, ".interp");
3612 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3613 {
3614 /* If we have a loadable interpreter section, we need a
3615 PT_INTERP segment. In this case, assume we also need a
3616 PT_PHDR segment, although that may not be true for all
3617 targets. */
3618 segs += 2;
3619 }
3620
3621 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3622 {
3623 /* We need a PT_DYNAMIC segment. */
3624 ++segs;
c9df6640
L
3625
3626 if (elf_tdata (abfd)->relro)
3627 {
3628 /* We need a PT_GNU_RELRO segment only when there is a
3629 PT_DYNAMIC segment. */
3630 ++segs;
3631 }
8ded5a0f
AM
3632 }
3633
3634 if (elf_tdata (abfd)->eh_frame_hdr)
3635 {
3636 /* We need a PT_GNU_EH_FRAME segment. */
3637 ++segs;
3638 }
3639
3640 if (elf_tdata (abfd)->stack_flags)
3641 {
3642 /* We need a PT_GNU_STACK segment. */
3643 ++segs;
3644 }
3645
8ded5a0f
AM
3646 for (s = abfd->sections; s != NULL; s = s->next)
3647 {
3648 if ((s->flags & SEC_LOAD) != 0
0112cd26 3649 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3650 {
3651 /* We need a PT_NOTE segment. */
3652 ++segs;
3653 }
3654 }
3655
3656 for (s = abfd->sections; s != NULL; s = s->next)
3657 {
3658 if (s->flags & SEC_THREAD_LOCAL)
3659 {
3660 /* We need a PT_TLS segment. */
3661 ++segs;
3662 break;
3663 }
3664 }
3665
3666 /* Let the backend count up any program headers it might need. */
3667 bed = get_elf_backend_data (abfd);
3668 if (bed->elf_backend_additional_program_headers)
3669 {
3670 int a;
3671
3672 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3673 if (a == -1)
3674 abort ();
3675 segs += a;
3676 }
3677
3678 return segs * bed->s->sizeof_phdr;
3679}
3680
252b5132
RH
3681/* Create a mapping from a set of sections to a program segment. */
3682
217aa764
AM
3683static struct elf_segment_map *
3684make_mapping (bfd *abfd,
3685 asection **sections,
3686 unsigned int from,
3687 unsigned int to,
3688 bfd_boolean phdr)
252b5132
RH
3689{
3690 struct elf_segment_map *m;
3691 unsigned int i;
3692 asection **hdrpp;
dc810e39 3693 bfd_size_type amt;
252b5132 3694
dc810e39
AM
3695 amt = sizeof (struct elf_segment_map);
3696 amt += (to - from - 1) * sizeof (asection *);
217aa764 3697 m = bfd_zalloc (abfd, amt);
252b5132
RH
3698 if (m == NULL)
3699 return NULL;
3700 m->next = NULL;
3701 m->p_type = PT_LOAD;
3702 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3703 m->sections[i - from] = *hdrpp;
3704 m->count = to - from;
3705
3706 if (from == 0 && phdr)
3707 {
3708 /* Include the headers in the first PT_LOAD segment. */
3709 m->includes_filehdr = 1;
3710 m->includes_phdrs = 1;
3711 }
3712
3713 return m;
3714}
3715
229fcec5
MM
3716/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3717 on failure. */
3718
3719struct elf_segment_map *
3720_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3721{
3722 struct elf_segment_map *m;
3723
3724 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3725 if (m == NULL)
3726 return NULL;
3727 m->next = NULL;
3728 m->p_type = PT_DYNAMIC;
3729 m->count = 1;
3730 m->sections[0] = dynsec;
3731
3732 return m;
3733}
3734
8ded5a0f 3735/* Possibly add or remove segments from the segment map. */
252b5132 3736
b34976b6 3737static bfd_boolean
8ded5a0f 3738elf_modify_segment_map (bfd *abfd, struct bfd_link_info *info)
252b5132 3739{
252e386e 3740 struct elf_segment_map **m;
8ded5a0f 3741 const struct elf_backend_data *bed;
252b5132 3742
8ded5a0f
AM
3743 /* The placement algorithm assumes that non allocated sections are
3744 not in PT_LOAD segments. We ensure this here by removing such
3745 sections from the segment map. We also remove excluded
252e386e
AM
3746 sections. Finally, any PT_LOAD segment without sections is
3747 removed. */
3748 m = &elf_tdata (abfd)->segment_map;
3749 while (*m)
8ded5a0f
AM
3750 {
3751 unsigned int i, new_count;
252b5132 3752
252e386e 3753 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3754 {
252e386e
AM
3755 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3756 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3757 || (*m)->p_type != PT_LOAD))
8ded5a0f 3758 {
252e386e
AM
3759 (*m)->sections[new_count] = (*m)->sections[i];
3760 new_count++;
8ded5a0f
AM
3761 }
3762 }
252e386e 3763 (*m)->count = new_count;
252b5132 3764
252e386e
AM
3765 if ((*m)->p_type == PT_LOAD && (*m)->count == 0)
3766 *m = (*m)->next;
3767 else
3768 m = &(*m)->next;
8ded5a0f 3769 }
252b5132 3770
8ded5a0f
AM
3771 bed = get_elf_backend_data (abfd);
3772 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3773 {
252e386e 3774 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3775 return FALSE;
252b5132 3776 }
252b5132 3777
8ded5a0f
AM
3778 return TRUE;
3779}
252b5132 3780
8ded5a0f 3781/* Set up a mapping from BFD sections to program segments. */
252b5132 3782
8ded5a0f
AM
3783bfd_boolean
3784_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3785{
3786 unsigned int count;
3787 struct elf_segment_map *m;
3788 asection **sections = NULL;
3789 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 3790
8ded5a0f
AM
3791 if (elf_tdata (abfd)->segment_map == NULL
3792 && bfd_count_sections (abfd) != 0)
252b5132 3793 {
8ded5a0f
AM
3794 asection *s;
3795 unsigned int i;
3796 struct elf_segment_map *mfirst;
3797 struct elf_segment_map **pm;
3798 asection *last_hdr;
3799 bfd_vma last_size;
3800 unsigned int phdr_index;
3801 bfd_vma maxpagesize;
3802 asection **hdrpp;
3803 bfd_boolean phdr_in_segment = TRUE;
3804 bfd_boolean writable;
3805 int tls_count = 0;
3806 asection *first_tls = NULL;
3807 asection *dynsec, *eh_frame_hdr;
3808 bfd_size_type amt;
252b5132 3809
8ded5a0f 3810 /* Select the allocated sections, and sort them. */
252b5132 3811
8ded5a0f
AM
3812 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
3813 if (sections == NULL)
252b5132 3814 goto error_return;
252b5132 3815
8ded5a0f
AM
3816 i = 0;
3817 for (s = abfd->sections; s != NULL; s = s->next)
3818 {
3819 if ((s->flags & SEC_ALLOC) != 0)
3820 {
3821 sections[i] = s;
3822 ++i;
3823 }
3824 }
3825 BFD_ASSERT (i <= bfd_count_sections (abfd));
3826 count = i;
252b5132 3827
8ded5a0f 3828 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3829
8ded5a0f 3830 /* Build the mapping. */
252b5132 3831
8ded5a0f
AM
3832 mfirst = NULL;
3833 pm = &mfirst;
252b5132 3834
8ded5a0f
AM
3835 /* If we have a .interp section, then create a PT_PHDR segment for
3836 the program headers and a PT_INTERP segment for the .interp
3837 section. */
3838 s = bfd_get_section_by_name (abfd, ".interp");
3839 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3840 {
3841 amt = sizeof (struct elf_segment_map);
3842 m = bfd_zalloc (abfd, amt);
3843 if (m == NULL)
3844 goto error_return;
3845 m->next = NULL;
3846 m->p_type = PT_PHDR;
3847 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3848 m->p_flags = PF_R | PF_X;
3849 m->p_flags_valid = 1;
3850 m->includes_phdrs = 1;
252b5132 3851
8ded5a0f
AM
3852 *pm = m;
3853 pm = &m->next;
252b5132 3854
8ded5a0f
AM
3855 amt = sizeof (struct elf_segment_map);
3856 m = bfd_zalloc (abfd, amt);
3857 if (m == NULL)
3858 goto error_return;
3859 m->next = NULL;
3860 m->p_type = PT_INTERP;
3861 m->count = 1;
3862 m->sections[0] = s;
3863
3864 *pm = m;
3865 pm = &m->next;
252b5132 3866 }
8ded5a0f
AM
3867
3868 /* Look through the sections. We put sections in the same program
3869 segment when the start of the second section can be placed within
3870 a few bytes of the end of the first section. */
3871 last_hdr = NULL;
3872 last_size = 0;
3873 phdr_index = 0;
3874 maxpagesize = bed->maxpagesize;
3875 writable = FALSE;
3876 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3877 if (dynsec != NULL
3878 && (dynsec->flags & SEC_LOAD) == 0)
3879 dynsec = NULL;
3880
3881 /* Deal with -Ttext or something similar such that the first section
3882 is not adjacent to the program headers. This is an
3883 approximation, since at this point we don't know exactly how many
3884 program headers we will need. */
3885 if (count > 0)
252b5132 3886 {
8ded5a0f
AM
3887 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3888
62d7a5f6 3889 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3890 phdr_size = get_program_header_size (abfd, info);
3891 if ((abfd->flags & D_PAGED) == 0
3892 || sections[0]->lma < phdr_size
3893 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
3894 phdr_in_segment = FALSE;
252b5132
RH
3895 }
3896
8ded5a0f 3897 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3898 {
8ded5a0f
AM
3899 asection *hdr;
3900 bfd_boolean new_segment;
3901
3902 hdr = *hdrpp;
3903
3904 /* See if this section and the last one will fit in the same
3905 segment. */
3906
3907 if (last_hdr == NULL)
3908 {
3909 /* If we don't have a segment yet, then we don't need a new
3910 one (we build the last one after this loop). */
3911 new_segment = FALSE;
3912 }
3913 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3914 {
3915 /* If this section has a different relation between the
3916 virtual address and the load address, then we need a new
3917 segment. */
3918 new_segment = TRUE;
3919 }
3920 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
3921 < BFD_ALIGN (hdr->lma, maxpagesize))
3922 {
3923 /* If putting this section in this segment would force us to
3924 skip a page in the segment, then we need a new segment. */
3925 new_segment = TRUE;
3926 }
3927 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3928 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3929 {
3930 /* We don't want to put a loadable section after a
3931 nonloadable section in the same segment.
3932 Consider .tbss sections as loadable for this purpose. */
3933 new_segment = TRUE;
3934 }
3935 else if ((abfd->flags & D_PAGED) == 0)
3936 {
3937 /* If the file is not demand paged, which means that we
3938 don't require the sections to be correctly aligned in the
3939 file, then there is no other reason for a new segment. */
3940 new_segment = FALSE;
3941 }
3942 else if (! writable
3943 && (hdr->flags & SEC_READONLY) == 0
3944 && (((last_hdr->lma + last_size - 1)
3945 & ~(maxpagesize - 1))
3946 != (hdr->lma & ~(maxpagesize - 1))))
3947 {
3948 /* We don't want to put a writable section in a read only
3949 segment, unless they are on the same page in memory
3950 anyhow. We already know that the last section does not
3951 bring us past the current section on the page, so the
3952 only case in which the new section is not on the same
3953 page as the previous section is when the previous section
3954 ends precisely on a page boundary. */
3955 new_segment = TRUE;
3956 }
3957 else
3958 {
3959 /* Otherwise, we can use the same segment. */
3960 new_segment = FALSE;
3961 }
3962
3963 if (! new_segment)
3964 {
3965 if ((hdr->flags & SEC_READONLY) == 0)
3966 writable = TRUE;
3967 last_hdr = hdr;
3968 /* .tbss sections effectively have zero size. */
3969 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3970 != SEC_THREAD_LOCAL)
3971 last_size = hdr->size;
3972 else
3973 last_size = 0;
3974 continue;
3975 }
3976
3977 /* We need a new program segment. We must create a new program
3978 header holding all the sections from phdr_index until hdr. */
3979
3980 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3981 if (m == NULL)
3982 goto error_return;
3983
3984 *pm = m;
3985 pm = &m->next;
3986
252b5132 3987 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3988 writable = TRUE;
8ded5a0f
AM
3989 else
3990 writable = FALSE;
3991
baaff79e
JJ
3992 last_hdr = hdr;
3993 /* .tbss sections effectively have zero size. */
e5caec89 3994 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3995 last_size = hdr->size;
baaff79e
JJ
3996 else
3997 last_size = 0;
8ded5a0f
AM
3998 phdr_index = i;
3999 phdr_in_segment = FALSE;
252b5132
RH
4000 }
4001
8ded5a0f
AM
4002 /* Create a final PT_LOAD program segment. */
4003 if (last_hdr != NULL)
4004 {
4005 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4006 if (m == NULL)
4007 goto error_return;
252b5132 4008
8ded5a0f
AM
4009 *pm = m;
4010 pm = &m->next;
4011 }
252b5132 4012
8ded5a0f
AM
4013 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4014 if (dynsec != NULL)
4015 {
4016 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4017 if (m == NULL)
4018 goto error_return;
4019 *pm = m;
4020 pm = &m->next;
4021 }
252b5132 4022
8ded5a0f
AM
4023 /* For each loadable .note section, add a PT_NOTE segment. We don't
4024 use bfd_get_section_by_name, because if we link together
4025 nonloadable .note sections and loadable .note sections, we will
4026 generate two .note sections in the output file. FIXME: Using
4027 names for section types is bogus anyhow. */
4028 for (s = abfd->sections; s != NULL; s = s->next)
4029 {
4030 if ((s->flags & SEC_LOAD) != 0
0112cd26 4031 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
4032 {
4033 amt = sizeof (struct elf_segment_map);
4034 m = bfd_zalloc (abfd, amt);
4035 if (m == NULL)
4036 goto error_return;
4037 m->next = NULL;
4038 m->p_type = PT_NOTE;
4039 m->count = 1;
4040 m->sections[0] = s;
252b5132 4041
8ded5a0f
AM
4042 *pm = m;
4043 pm = &m->next;
4044 }
4045 if (s->flags & SEC_THREAD_LOCAL)
4046 {
4047 if (! tls_count)
4048 first_tls = s;
4049 tls_count++;
4050 }
4051 }
252b5132 4052
8ded5a0f
AM
4053 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4054 if (tls_count > 0)
4055 {
4056 int i;
252b5132 4057
8ded5a0f
AM
4058 amt = sizeof (struct elf_segment_map);
4059 amt += (tls_count - 1) * sizeof (asection *);
4060 m = bfd_zalloc (abfd, amt);
4061 if (m == NULL)
4062 goto error_return;
4063 m->next = NULL;
4064 m->p_type = PT_TLS;
4065 m->count = tls_count;
4066 /* Mandated PF_R. */
4067 m->p_flags = PF_R;
4068 m->p_flags_valid = 1;
4069 for (i = 0; i < tls_count; ++i)
4070 {
4071 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
4072 m->sections[i] = first_tls;
4073 first_tls = first_tls->next;
4074 }
252b5132 4075
8ded5a0f
AM
4076 *pm = m;
4077 pm = &m->next;
4078 }
252b5132 4079
8ded5a0f
AM
4080 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4081 segment. */
4082 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
4083 if (eh_frame_hdr != NULL
4084 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4085 {
dc810e39 4086 amt = sizeof (struct elf_segment_map);
217aa764 4087 m = bfd_zalloc (abfd, amt);
252b5132
RH
4088 if (m == NULL)
4089 goto error_return;
4090 m->next = NULL;
8ded5a0f 4091 m->p_type = PT_GNU_EH_FRAME;
252b5132 4092 m->count = 1;
8ded5a0f 4093 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4094
4095 *pm = m;
4096 pm = &m->next;
4097 }
13ae64f3 4098
8ded5a0f 4099 if (elf_tdata (abfd)->stack_flags)
13ae64f3 4100 {
8ded5a0f
AM
4101 amt = sizeof (struct elf_segment_map);
4102 m = bfd_zalloc (abfd, amt);
4103 if (m == NULL)
4104 goto error_return;
4105 m->next = NULL;
4106 m->p_type = PT_GNU_STACK;
4107 m->p_flags = elf_tdata (abfd)->stack_flags;
4108 m->p_flags_valid = 1;
252b5132 4109
8ded5a0f
AM
4110 *pm = m;
4111 pm = &m->next;
4112 }
65765700 4113
c9df6640 4114 if (dynsec != NULL && elf_tdata (abfd)->relro)
8ded5a0f 4115 {
c9df6640
L
4116 /* We make a PT_GNU_RELRO segment only when there is a
4117 PT_DYNAMIC segment. */
8ded5a0f
AM
4118 amt = sizeof (struct elf_segment_map);
4119 m = bfd_zalloc (abfd, amt);
4120 if (m == NULL)
4121 goto error_return;
4122 m->next = NULL;
4123 m->p_type = PT_GNU_RELRO;
4124 m->p_flags = PF_R;
4125 m->p_flags_valid = 1;
65765700 4126
8ded5a0f
AM
4127 *pm = m;
4128 pm = &m->next;
4129 }
9ee5e499 4130
8ded5a0f
AM
4131 free (sections);
4132 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
4133 }
4134
8ded5a0f
AM
4135 if (!elf_modify_segment_map (abfd, info))
4136 return FALSE;
8c37241b 4137
8ded5a0f
AM
4138 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4139 ++count;
4140 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 4141
b34976b6 4142 return TRUE;
252b5132
RH
4143
4144 error_return:
4145 if (sections != NULL)
4146 free (sections);
b34976b6 4147 return FALSE;
252b5132
RH
4148}
4149
4150/* Sort sections by address. */
4151
4152static int
217aa764 4153elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4154{
4155 const asection *sec1 = *(const asection **) arg1;
4156 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4157 bfd_size_type size1, size2;
252b5132
RH
4158
4159 /* Sort by LMA first, since this is the address used to
4160 place the section into a segment. */
4161 if (sec1->lma < sec2->lma)
4162 return -1;
4163 else if (sec1->lma > sec2->lma)
4164 return 1;
4165
4166 /* Then sort by VMA. Normally the LMA and the VMA will be
4167 the same, and this will do nothing. */
4168 if (sec1->vma < sec2->vma)
4169 return -1;
4170 else if (sec1->vma > sec2->vma)
4171 return 1;
4172
4173 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4174
07c6e936 4175#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4176
4177 if (TOEND (sec1))
4178 {
4179 if (TOEND (sec2))
00a7cdc5
NC
4180 {
4181 /* If the indicies are the same, do not return 0
4182 here, but continue to try the next comparison. */
4183 if (sec1->target_index - sec2->target_index != 0)
4184 return sec1->target_index - sec2->target_index;
4185 }
252b5132
RH
4186 else
4187 return 1;
4188 }
00a7cdc5 4189 else if (TOEND (sec2))
252b5132
RH
4190 return -1;
4191
4192#undef TOEND
4193
00a7cdc5
NC
4194 /* Sort by size, to put zero sized sections
4195 before others at the same address. */
252b5132 4196
eea6121a
AM
4197 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4198 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4199
4200 if (size1 < size2)
252b5132 4201 return -1;
eecdbe52 4202 if (size1 > size2)
252b5132
RH
4203 return 1;
4204
4205 return sec1->target_index - sec2->target_index;
4206}
4207
340b6d91
AC
4208/* Ian Lance Taylor writes:
4209
4210 We shouldn't be using % with a negative signed number. That's just
4211 not good. We have to make sure either that the number is not
4212 negative, or that the number has an unsigned type. When the types
4213 are all the same size they wind up as unsigned. When file_ptr is a
4214 larger signed type, the arithmetic winds up as signed long long,
4215 which is wrong.
4216
4217 What we're trying to say here is something like ``increase OFF by
4218 the least amount that will cause it to be equal to the VMA modulo
4219 the page size.'' */
4220/* In other words, something like:
4221
4222 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4223 off_offset = off % bed->maxpagesize;
4224 if (vma_offset < off_offset)
4225 adjustment = vma_offset + bed->maxpagesize - off_offset;
4226 else
4227 adjustment = vma_offset - off_offset;
4228
4229 which can can be collapsed into the expression below. */
4230
4231static file_ptr
4232vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4233{
4234 return ((vma - off) % maxpagesize);
4235}
4236
252b5132
RH
4237/* Assign file positions to the sections based on the mapping from
4238 sections to segments. This function also sets up some fields in
f3520d2f 4239 the file header. */
252b5132 4240
b34976b6 4241static bfd_boolean
f3520d2f
AM
4242assign_file_positions_for_load_sections (bfd *abfd,
4243 struct bfd_link_info *link_info)
252b5132
RH
4244{
4245 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4246 struct elf_segment_map *m;
252b5132 4247 Elf_Internal_Phdr *phdrs;
252b5132 4248 Elf_Internal_Phdr *p;
f3520d2f 4249 file_ptr off, voff;
3f570048 4250 bfd_size_type maxpagesize;
f3520d2f 4251 unsigned int alloc;
5c182d5f 4252 unsigned int i;
252b5132 4253
e36284ab
AM
4254 if (link_info == NULL
4255 && !elf_modify_segment_map (abfd, link_info))
8ded5a0f 4256 return FALSE;
252b5132 4257
8ded5a0f 4258 alloc = 0;
252b5132 4259 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
8ded5a0f 4260 ++alloc;
252b5132
RH
4261
4262 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4263 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4264 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4265
62d7a5f6 4266 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4267 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4268 else
4269 BFD_ASSERT (elf_tdata (abfd)->program_header_size
4270 == alloc * bed->s->sizeof_phdr);
252b5132
RH
4271
4272 if (alloc == 0)
f3520d2f 4273 {
8ded5a0f
AM
4274 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4275 return TRUE;
f3520d2f 4276 }
252b5132 4277
d0fb9a8d 4278 phdrs = bfd_alloc2 (abfd, alloc, sizeof (Elf_Internal_Phdr));
f3520d2f 4279 elf_tdata (abfd)->phdr = phdrs;
252b5132 4280 if (phdrs == NULL)
b34976b6 4281 return FALSE;
252b5132 4282
3f570048
AM
4283 maxpagesize = 1;
4284 if ((abfd->flags & D_PAGED) != 0)
4285 maxpagesize = bed->maxpagesize;
4286
252b5132
RH
4287 off = bed->s->sizeof_ehdr;
4288 off += alloc * bed->s->sizeof_phdr;
4289
252b5132
RH
4290 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4291 m != NULL;
4292 m = m->next, p++)
4293 {
252b5132
RH
4294 asection **secpp;
4295
4296 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4297 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4298 not be done to the PT_NOTE section of a corefile, which may
4299 contain several pseudo-sections artificially created by bfd.
4300 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4301 if (m->count > 1
4302 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4303 && m->p_type == PT_NOTE))
252b5132
RH
4304 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4305 elf_sort_sections);
4306
b301b248
AM
4307 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4308 number of sections with contents contributing to both p_filesz
4309 and p_memsz, followed by a number of sections with no contents
4310 that just contribute to p_memsz. In this loop, OFF tracks next
4311 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4312 an adjustment we use for segments that have no file contents
4313 but need zero filled memory allocation. */
4314 voff = 0;
252b5132 4315 p->p_type = m->p_type;
28a7f3e7 4316 p->p_flags = m->p_flags;
252b5132 4317
3f570048
AM
4318 if (m->count == 0)
4319 p->p_vaddr = 0;
4320 else
4321 p->p_vaddr = m->sections[0]->vma;
4322
4323 if (m->p_paddr_valid)
4324 p->p_paddr = m->p_paddr;
4325 else if (m->count == 0)
4326 p->p_paddr = 0;
4327 else
4328 p->p_paddr = m->sections[0]->lma;
4329
4330 if (p->p_type == PT_LOAD
4331 && (abfd->flags & D_PAGED) != 0)
4332 {
4333 /* p_align in demand paged PT_LOAD segments effectively stores
4334 the maximum page size. When copying an executable with
4335 objcopy, we set m->p_align from the input file. Use this
4336 value for maxpagesize rather than bed->maxpagesize, which
4337 may be different. Note that we use maxpagesize for PT_TLS
4338 segment alignment later in this function, so we are relying
4339 on at least one PT_LOAD segment appearing before a PT_TLS
4340 segment. */
4341 if (m->p_align_valid)
4342 maxpagesize = m->p_align;
4343
4344 p->p_align = maxpagesize;
4345 }
4346 else if (m->count == 0)
4347 p->p_align = 1 << bed->s->log_file_align;
4348 else
4349 p->p_align = 0;
4350
252b5132 4351 if (p->p_type == PT_LOAD
b301b248 4352 && m->count > 0)
252b5132 4353 {
b301b248
AM
4354 bfd_size_type align;
4355 bfd_vma adjust;
a49e53ed 4356 unsigned int align_power = 0;
b301b248 4357
a49e53ed 4358 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4359 {
a49e53ed 4360 unsigned int secalign;
252b5132 4361
a49e53ed
AM
4362 secalign = bfd_get_section_alignment (abfd, *secpp);
4363 if (secalign > align_power)
4364 align_power = secalign;
b301b248 4365 }
a49e53ed
AM
4366 align = (bfd_size_type) 1 << align_power;
4367
3f570048
AM
4368 if (align < maxpagesize)
4369 align = maxpagesize;
252b5132 4370
b301b248
AM
4371 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4372 off += adjust;
4373 if (adjust != 0
4374 && !m->includes_filehdr
4375 && !m->includes_phdrs
4376 && (ufile_ptr) off >= align)
4377 {
4378 /* If the first section isn't loadable, the same holds for
4379 any other sections. Since the segment won't need file
4380 space, we can make p_offset overlap some prior segment.
4381 However, .tbss is special. If a segment starts with
4382 .tbss, we need to look at the next section to decide
4383 whether the segment has any loadable sections. */
4384 i = 0;
252e386e
AM
4385 while ((m->sections[i]->flags & SEC_LOAD) == 0
4386 && (m->sections[i]->flags & SEC_HAS_CONTENTS) == 0)
b301b248
AM
4387 {
4388 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4389 || ++i >= m->count)
4390 {
4391 off -= adjust;
4392 voff = adjust - align;
4393 break;
4394 }
4395 }
252b5132
RH
4396 }
4397 }
b1a6d0b1
NC
4398 /* Make sure the .dynamic section is the first section in the
4399 PT_DYNAMIC segment. */
4400 else if (p->p_type == PT_DYNAMIC
4401 && m->count > 1
4402 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4403 {
4404 _bfd_error_handler
b301b248
AM
4405 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4406 abfd);
b1a6d0b1
NC
4407 bfd_set_error (bfd_error_bad_value);
4408 return FALSE;
4409 }
252b5132 4410
252b5132
RH
4411 p->p_offset = 0;
4412 p->p_filesz = 0;
4413 p->p_memsz = 0;
4414
4415 if (m->includes_filehdr)
4416 {
4417 if (! m->p_flags_valid)
4418 p->p_flags |= PF_R;
4419 p->p_offset = 0;
4420 p->p_filesz = bed->s->sizeof_ehdr;
4421 p->p_memsz = bed->s->sizeof_ehdr;
4422 if (m->count > 0)
4423 {
4424 BFD_ASSERT (p->p_type == PT_LOAD);
4425
4426 if (p->p_vaddr < (bfd_vma) off)
4427 {
caf47ea6 4428 (*_bfd_error_handler)
b301b248
AM
4429 (_("%B: Not enough room for program headers, try linking with -N"),
4430 abfd);
252b5132 4431 bfd_set_error (bfd_error_bad_value);
b34976b6 4432 return FALSE;
252b5132
RH
4433 }
4434
4435 p->p_vaddr -= off;
4436 if (! m->p_paddr_valid)
4437 p->p_paddr -= off;
4438 }
252b5132
RH
4439 }
4440
4441 if (m->includes_phdrs)
4442 {
4443 if (! m->p_flags_valid)
4444 p->p_flags |= PF_R;
4445
f3520d2f 4446 if (!m->includes_filehdr)
252b5132
RH
4447 {
4448 p->p_offset = bed->s->sizeof_ehdr;
4449
4450 if (m->count > 0)
4451 {
4452 BFD_ASSERT (p->p_type == PT_LOAD);
4453 p->p_vaddr -= off - p->p_offset;
4454 if (! m->p_paddr_valid)
4455 p->p_paddr -= off - p->p_offset;
4456 }
252b5132
RH
4457 }
4458
4459 p->p_filesz += alloc * bed->s->sizeof_phdr;
4460 p->p_memsz += alloc * bed->s->sizeof_phdr;
4461 }
4462
4463 if (p->p_type == PT_LOAD
4464 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4465 {
4466 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4467 p->p_offset = off + voff;
252b5132
RH
4468 else
4469 {
4470 file_ptr adjust;
4471
4472 adjust = off - (p->p_offset + p->p_filesz);
4473 p->p_filesz += adjust;
4474 p->p_memsz += adjust;
4475 }
4476 }
4477
1ea63fd2
AM
4478 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4479 maps. Set filepos for sections in PT_LOAD segments, and in
4480 core files, for sections in PT_NOTE segments.
4481 assign_file_positions_for_non_load_sections will set filepos
4482 for other sections and update p_filesz for other segments. */
252b5132
RH
4483 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4484 {
4485 asection *sec;
4486 flagword flags;
4487 bfd_size_type align;
4488
4489 sec = *secpp;
4490 flags = sec->flags;
3f570048 4491 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4492
b301b248
AM
4493 if (p->p_type == PT_LOAD
4494 || p->p_type == PT_TLS)
252b5132
RH
4495 {
4496 bfd_signed_vma adjust;
4497
5efb6261 4498 if ((flags & SEC_LOAD) != 0)
252b5132 4499 {
b301b248 4500 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4501 if (adjust < 0)
b301b248
AM
4502 {
4503 (*_bfd_error_handler)
4504 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4505 abfd, sec, (unsigned long) sec->lma);
4506 adjust = 0;
4507 }
4508 off += adjust;
4509 p->p_filesz += adjust;
4510 p->p_memsz += adjust;
252b5132 4511 }
b301b248
AM
4512 /* .tbss is special. It doesn't contribute to p_memsz of
4513 normal segments. */
1ea63fd2
AM
4514 else if ((flags & SEC_ALLOC) != 0
4515 && ((flags & SEC_THREAD_LOCAL) == 0
4516 || p->p_type == PT_TLS))
252b5132
RH
4517 {
4518 /* The section VMA must equal the file position
b301b248
AM
4519 modulo the page size. */
4520 bfd_size_type page = align;
3f570048
AM
4521 if (page < maxpagesize)
4522 page = maxpagesize;
b301b248
AM
4523 adjust = vma_page_aligned_bias (sec->vma,
4524 p->p_vaddr + p->p_memsz,
4525 page);
252b5132 4526 p->p_memsz += adjust;
252b5132 4527 }
252b5132
RH
4528 }
4529
4530 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4531 {
b301b248
AM
4532 /* The section at i == 0 is the one that actually contains
4533 everything. */
4a938328
MS
4534 if (i == 0)
4535 {
252b5132 4536 sec->filepos = off;
eea6121a 4537 off += sec->size;
b301b248
AM
4538 p->p_filesz = sec->size;
4539 p->p_memsz = 0;
4540 p->p_align = 1;
252b5132 4541 }
4a938328 4542 else
252b5132 4543 {
b301b248 4544 /* The rest are fake sections that shouldn't be written. */
252b5132 4545 sec->filepos = 0;
eea6121a 4546 sec->size = 0;
b301b248
AM
4547 sec->flags = 0;
4548 continue;
252b5132 4549 }
252b5132
RH
4550 }
4551 else
4552 {
b301b248
AM
4553 if (p->p_type == PT_LOAD)
4554 {
252e386e 4555 sec->filepos = off + voff;
5efb6261
AM
4556 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4557 1997, and the exact reason for it isn't clear. One
4558 plausible explanation is that it is to work around
4559 a problem we have with linker scripts using data
4560 statements in NOLOAD sections. I don't think it
4561 makes a great deal of sense to have such a section
4562 assigned to a PT_LOAD segment, but apparently
4563 people do this. The data statement results in a
4564 bfd_data_link_order being built, and these need
4565 section contents to write into. Eventually, we get
4566 to _bfd_elf_write_object_contents which writes any
4567 section with contents to the output. Make room
4568 here for the write, so that following segments are
4569 not trashed. */
4570 if ((flags & SEC_LOAD) != 0
4571 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4572 off += sec->size;
4573 }
252b5132 4574
5efb6261 4575 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4576 {
4577 p->p_filesz += sec->size;
4578 p->p_memsz += sec->size;
4579 }
4b6c0f2f 4580
b301b248
AM
4581 /* .tbss is special. It doesn't contribute to p_memsz of
4582 normal segments. */
1ea63fd2
AM
4583 else if ((flags & SEC_ALLOC) != 0
4584 && ((flags & SEC_THREAD_LOCAL) == 0
4585 || p->p_type == PT_TLS))
b301b248 4586 p->p_memsz += sec->size;
252b5132 4587
13ae64f3 4588 if (p->p_type == PT_TLS
eea6121a 4589 && sec->size == 0
13ae64f3
JJ
4590 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4591 {
3a800eb9
AM
4592 struct bfd_link_order *o = sec->map_tail.link_order;
4593 if (o != NULL)
4594 p->p_memsz += o->offset + o->size;
13ae64f3
JJ
4595 }
4596
c9df6640
L
4597 if (p->p_type == PT_GNU_RELRO)
4598 p->p_align = 1;
4599 else if (align > p->p_align
4600 && (p->p_type != PT_LOAD
4601 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4602 p->p_align = align;
4603 }
4604
4605 if (! m->p_flags_valid)
4606 {
4607 p->p_flags |= PF_R;
4608 if ((flags & SEC_CODE) != 0)
4609 p->p_flags |= PF_X;
4610 if ((flags & SEC_READONLY) == 0)
4611 p->p_flags |= PF_W;
4612 }
4613 }
4614 }
4615
f3520d2f
AM
4616 elf_tdata (abfd)->next_file_pos = off;
4617 return TRUE;
4618}
4619
4620/* Assign file positions for the other sections. */
4621
4622static bfd_boolean
4623assign_file_positions_for_non_load_sections (bfd *abfd,
4624 struct bfd_link_info *link_info)
4625{
4626 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4627 Elf_Internal_Shdr **i_shdrpp;
4628 Elf_Internal_Shdr **hdrpp;
4629 Elf_Internal_Phdr *phdrs;
4630 Elf_Internal_Phdr *p;
4631 struct elf_segment_map *m;
4632 bfd_vma filehdr_vaddr, filehdr_paddr;
4633 bfd_vma phdrs_vaddr, phdrs_paddr;
4634 file_ptr off;
4635 unsigned int num_sec;
4636 unsigned int i;
4637 unsigned int count;
4638
5c182d5f
AM
4639 i_shdrpp = elf_elfsections (abfd);
4640 num_sec = elf_numsections (abfd);
f3520d2f 4641 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4642 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4643 {
4644 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4645 Elf_Internal_Shdr *hdr;
4646
4647 hdr = *hdrpp;
4648 if (hdr->bfd_section != NULL
252e386e
AM
4649 && (hdr->bfd_section->filepos != 0
4650 || (hdr->sh_type == SHT_NOBITS
4651 && hdr->contents == NULL)))
5c182d5f
AM
4652 hdr->sh_offset = hdr->bfd_section->filepos;
4653 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4654 {
4655 ((*_bfd_error_handler)
4656 (_("%B: warning: allocated section `%s' not in segment"),
4657 abfd,
4658 (hdr->bfd_section == NULL
4659 ? "*unknown*"
4660 : hdr->bfd_section->name)));
4661 if ((abfd->flags & D_PAGED) != 0)
4662 off += vma_page_aligned_bias (hdr->sh_addr, off,
4663 bed->maxpagesize);
4664 else
4665 off += vma_page_aligned_bias (hdr->sh_addr, off,
4666 hdr->sh_addralign);
4667 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4668 FALSE);
4669 }
4670 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4671 && hdr->bfd_section == NULL)
4672 || hdr == i_shdrpp[tdata->symtab_section]
4673 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4674 || hdr == i_shdrpp[tdata->strtab_section])
4675 hdr->sh_offset = -1;
4676 else
4677 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4678
4679 if (i == SHN_LORESERVE - 1)
4680 {
4681 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4682 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4683 }
4684 }
4685
252b5132
RH
4686 /* Now that we have set the section file positions, we can set up
4687 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4688 count = 0;
4689 filehdr_vaddr = 0;
4690 filehdr_paddr = 0;
4691 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4692 phdrs_paddr = 0;
4693 phdrs = elf_tdata (abfd)->phdr;
4694 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4695 m != NULL;
4696 m = m->next, p++)
4697 {
4698 ++count;
4699 if (p->p_type != PT_LOAD)
4700 continue;
4701
4702 if (m->includes_filehdr)
4703 {
4704 filehdr_vaddr = p->p_vaddr;
4705 filehdr_paddr = p->p_paddr;
4706 }
4707 if (m->includes_phdrs)
4708 {
4709 phdrs_vaddr = p->p_vaddr;
4710 phdrs_paddr = p->p_paddr;
4711 if (m->includes_filehdr)
4712 {
4713 phdrs_vaddr += bed->s->sizeof_ehdr;
4714 phdrs_paddr += bed->s->sizeof_ehdr;
4715 }
4716 }
4717 }
4718
252b5132
RH
4719 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4720 m != NULL;
4721 m = m->next, p++)
4722 {
1ea63fd2 4723 if (m->count != 0)
252b5132 4724 {
1ea63fd2
AM
4725 if (p->p_type != PT_LOAD
4726 && (p->p_type != PT_NOTE || bfd_get_format (abfd) != bfd_core))
229fcec5 4727 {
1ea63fd2
AM
4728 Elf_Internal_Shdr *hdr;
4729 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4730
4731 hdr = &elf_section_data (m->sections[m->count - 1])->this_hdr;
4732 p->p_filesz = (m->sections[m->count - 1]->filepos
4733 - m->sections[0]->filepos);
4734 if (hdr->sh_type != SHT_NOBITS)
4735 p->p_filesz += hdr->sh_size;
4736
4737 p->p_offset = m->sections[0]->filepos;
229fcec5 4738 }
252b5132 4739 }
1ea63fd2 4740 else
252b5132
RH
4741 {
4742 if (m->includes_filehdr)
4743 {
4744 p->p_vaddr = filehdr_vaddr;
4745 if (! m->p_paddr_valid)
4746 p->p_paddr = filehdr_paddr;
4747 }
4748 else if (m->includes_phdrs)
4749 {
4750 p->p_vaddr = phdrs_vaddr;
4751 if (! m->p_paddr_valid)
4752 p->p_paddr = phdrs_paddr;
4753 }
8c37241b
JJ
4754 else if (p->p_type == PT_GNU_RELRO)
4755 {
4756 Elf_Internal_Phdr *lp;
4757
4758 for (lp = phdrs; lp < phdrs + count; ++lp)
4759 {
4760 if (lp->p_type == PT_LOAD
4761 && lp->p_vaddr <= link_info->relro_end
4762 && lp->p_vaddr >= link_info->relro_start
e36284ab
AM
4763 && (lp->p_vaddr + lp->p_filesz
4764 >= link_info->relro_end))
8c37241b
JJ
4765 break;
4766 }
4767
4768 if (lp < phdrs + count
4769 && link_info->relro_end > lp->p_vaddr)
4770 {
4771 p->p_vaddr = lp->p_vaddr;
4772 p->p_paddr = lp->p_paddr;
4773 p->p_offset = lp->p_offset;
4774 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4775 p->p_memsz = p->p_filesz;
4776 p->p_align = 1;
4777 p->p_flags = (lp->p_flags & ~PF_W);
4778 }
4779 else
4780 {
4781 memset (p, 0, sizeof *p);
4782 p->p_type = PT_NULL;
4783 }
4784 }
252b5132
RH
4785 }
4786 }
4787
252b5132
RH
4788 elf_tdata (abfd)->next_file_pos = off;
4789
b34976b6 4790 return TRUE;
252b5132
RH
4791}
4792
252b5132
RH
4793/* Work out the file positions of all the sections. This is called by
4794 _bfd_elf_compute_section_file_positions. All the section sizes and
4795 VMAs must be known before this is called.
4796
e0638f70
AM
4797 Reloc sections come in two flavours: Those processed specially as
4798 "side-channel" data attached to a section to which they apply, and
4799 those that bfd doesn't process as relocations. The latter sort are
4800 stored in a normal bfd section by bfd_section_from_shdr. We don't
4801 consider the former sort here, unless they form part of the loadable
4802 image. Reloc sections not assigned here will be handled later by
4803 assign_file_positions_for_relocs.
252b5132
RH
4804
4805 We also don't set the positions of the .symtab and .strtab here. */
4806
b34976b6 4807static bfd_boolean
c84fca4d
AO
4808assign_file_positions_except_relocs (bfd *abfd,
4809 struct bfd_link_info *link_info)
252b5132 4810{
5c182d5f
AM
4811 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4812 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4813 file_ptr off;
9c5bfbb7 4814 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4815
4816 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4817 && bfd_get_format (abfd) != bfd_core)
4818 {
5c182d5f
AM
4819 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4820 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4821 Elf_Internal_Shdr **hdrpp;
4822 unsigned int i;
4823
4824 /* Start after the ELF header. */
4825 off = i_ehdrp->e_ehsize;
4826
4827 /* We are not creating an executable, which means that we are
4828 not creating a program header, and that the actual order of
4829 the sections in the file is unimportant. */
9ad5cbcf 4830 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4831 {
4832 Elf_Internal_Shdr *hdr;
4833
4834 hdr = *hdrpp;
e0638f70
AM
4835 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4836 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4837 || i == tdata->symtab_section
4838 || i == tdata->symtab_shndx_section
252b5132
RH
4839 || i == tdata->strtab_section)
4840 {
4841 hdr->sh_offset = -1;
252b5132 4842 }
9ad5cbcf 4843 else
b34976b6 4844 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4845
9ad5cbcf
AM
4846 if (i == SHN_LORESERVE - 1)
4847 {
4848 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4849 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4850 }
252b5132
RH
4851 }
4852 }
4853 else
4854 {
f3520d2f
AM
4855 unsigned int alloc;
4856
252b5132
RH
4857 /* Assign file positions for the loaded sections based on the
4858 assignment of sections to segments. */
f3520d2f
AM
4859 if (!assign_file_positions_for_load_sections (abfd, link_info))
4860 return FALSE;
4861
4862 /* And for non-load sections. */
4863 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4864 return FALSE;
4865
e36284ab
AM
4866 if (bed->elf_backend_modify_program_headers != NULL)
4867 {
4868 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4869 return FALSE;
4870 }
4871
f3520d2f
AM
4872 /* Write out the program headers. */
4873 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4874 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4875 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4876 return FALSE;
252b5132 4877
5c182d5f 4878 off = tdata->next_file_pos;
252b5132
RH
4879 }
4880
4881 /* Place the section headers. */
45d6a902 4882 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4883 i_ehdrp->e_shoff = off;
4884 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4885
5c182d5f 4886 tdata->next_file_pos = off;
252b5132 4887
b34976b6 4888 return TRUE;
252b5132
RH
4889}
4890
b34976b6 4891static bfd_boolean
217aa764 4892prep_headers (bfd *abfd)
252b5132
RH
4893{
4894 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4895 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4896 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4897 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4898 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4899
4900 i_ehdrp = elf_elfheader (abfd);
4901 i_shdrp = elf_elfsections (abfd);
4902
2b0f7ef9 4903 shstrtab = _bfd_elf_strtab_init ();
252b5132 4904 if (shstrtab == NULL)
b34976b6 4905 return FALSE;
252b5132
RH
4906
4907 elf_shstrtab (abfd) = shstrtab;
4908
4909 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4910 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4911 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4912 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4913
4914 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4915 i_ehdrp->e_ident[EI_DATA] =
4916 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4917 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4918
252b5132
RH
4919 if ((abfd->flags & DYNAMIC) != 0)
4920 i_ehdrp->e_type = ET_DYN;
4921 else if ((abfd->flags & EXEC_P) != 0)
4922 i_ehdrp->e_type = ET_EXEC;
4923 else if (bfd_get_format (abfd) == bfd_core)
4924 i_ehdrp->e_type = ET_CORE;
4925 else
4926 i_ehdrp->e_type = ET_REL;
4927
4928 switch (bfd_get_arch (abfd))
4929 {
4930 case bfd_arch_unknown:
4931 i_ehdrp->e_machine = EM_NONE;
4932 break;
aa4f99bb
AO
4933
4934 /* There used to be a long list of cases here, each one setting
4935 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4936 in the corresponding bfd definition. To avoid duplication,
4937 the switch was removed. Machines that need special handling
4938 can generally do it in elf_backend_final_write_processing(),
4939 unless they need the information earlier than the final write.
4940 Such need can generally be supplied by replacing the tests for
4941 e_machine with the conditions used to determine it. */
252b5132 4942 default:
9c5bfbb7
AM
4943 i_ehdrp->e_machine = bed->elf_machine_code;
4944 }
aa4f99bb 4945
252b5132
RH
4946 i_ehdrp->e_version = bed->s->ev_current;
4947 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4948
c044fabd 4949 /* No program header, for now. */
252b5132
RH
4950 i_ehdrp->e_phoff = 0;
4951 i_ehdrp->e_phentsize = 0;
4952 i_ehdrp->e_phnum = 0;
4953
c044fabd 4954 /* Each bfd section is section header entry. */
252b5132
RH
4955 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4956 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4957
c044fabd 4958 /* If we're building an executable, we'll need a program header table. */
252b5132 4959 if (abfd->flags & EXEC_P)
0e71e495
BE
4960 /* It all happens later. */
4961 ;
252b5132
RH
4962 else
4963 {
4964 i_ehdrp->e_phentsize = 0;
4965 i_phdrp = 0;
4966 i_ehdrp->e_phoff = 0;
4967 }
4968
4969 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4970 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4971 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4972 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4973 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4974 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4975 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4976 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4977 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4978 return FALSE;
252b5132 4979
b34976b6 4980 return TRUE;
252b5132
RH
4981}
4982
4983/* Assign file positions for all the reloc sections which are not part
4984 of the loadable file image. */
4985
4986void
217aa764 4987_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4988{
4989 file_ptr off;
9ad5cbcf 4990 unsigned int i, num_sec;
252b5132
RH
4991 Elf_Internal_Shdr **shdrpp;
4992
4993 off = elf_tdata (abfd)->next_file_pos;
4994
9ad5cbcf
AM
4995 num_sec = elf_numsections (abfd);
4996 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4997 {
4998 Elf_Internal_Shdr *shdrp;
4999
5000 shdrp = *shdrpp;
5001 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5002 && shdrp->sh_offset == -1)
b34976b6 5003 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5004 }
5005
5006 elf_tdata (abfd)->next_file_pos = off;
5007}
5008
b34976b6 5009bfd_boolean
217aa764 5010_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5011{
9c5bfbb7 5012 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5013 Elf_Internal_Ehdr *i_ehdrp;
5014 Elf_Internal_Shdr **i_shdrp;
b34976b6 5015 bfd_boolean failed;
9ad5cbcf 5016 unsigned int count, num_sec;
252b5132
RH
5017
5018 if (! abfd->output_has_begun
217aa764 5019 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5020 return FALSE;
252b5132
RH
5021
5022 i_shdrp = elf_elfsections (abfd);
5023 i_ehdrp = elf_elfheader (abfd);
5024
b34976b6 5025 failed = FALSE;
252b5132
RH
5026 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5027 if (failed)
b34976b6 5028 return FALSE;
252b5132
RH
5029
5030 _bfd_elf_assign_file_positions_for_relocs (abfd);
5031
c044fabd 5032 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5033 num_sec = elf_numsections (abfd);
5034 for (count = 1; count < num_sec; count++)
252b5132
RH
5035 {
5036 if (bed->elf_backend_section_processing)
5037 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5038 if (i_shdrp[count]->contents)
5039 {
dc810e39
AM
5040 bfd_size_type amt = i_shdrp[count]->sh_size;
5041
252b5132 5042 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5043 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5044 return FALSE;
252b5132 5045 }
9ad5cbcf
AM
5046 if (count == SHN_LORESERVE - 1)
5047 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
5048 }
5049
5050 /* Write out the section header names. */
26ae6d5e
DJ
5051 if (elf_shstrtab (abfd) != NULL
5052 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
5053 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5054 return FALSE;
252b5132
RH
5055
5056 if (bed->elf_backend_final_write_processing)
5057 (*bed->elf_backend_final_write_processing) (abfd,
5058 elf_tdata (abfd)->linker);
5059
5060 return bed->s->write_shdrs_and_ehdr (abfd);
5061}
5062
b34976b6 5063bfd_boolean
217aa764 5064_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5065{
c044fabd 5066 /* Hopefully this can be done just like an object file. */
252b5132
RH
5067 return _bfd_elf_write_object_contents (abfd);
5068}
c044fabd
KH
5069
5070/* Given a section, search the header to find them. */
5071
252b5132 5072int
198beae2 5073_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5074{
9c5bfbb7 5075 const struct elf_backend_data *bed;
252b5132 5076 int index;
252b5132 5077
9ad5cbcf
AM
5078 if (elf_section_data (asect) != NULL
5079 && elf_section_data (asect)->this_idx != 0)
5080 return elf_section_data (asect)->this_idx;
5081
5082 if (bfd_is_abs_section (asect))
af746e92
AM
5083 index = SHN_ABS;
5084 else if (bfd_is_com_section (asect))
5085 index = SHN_COMMON;
5086 else if (bfd_is_und_section (asect))
5087 index = SHN_UNDEF;
5088 else
6dc132d9 5089 index = -1;
252b5132 5090
af746e92 5091 bed = get_elf_backend_data (abfd);
252b5132
RH
5092 if (bed->elf_backend_section_from_bfd_section)
5093 {
af746e92 5094 int retval = index;
9ad5cbcf 5095
af746e92
AM
5096 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5097 return retval;
252b5132
RH
5098 }
5099
af746e92
AM
5100 if (index == -1)
5101 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5102
af746e92 5103 return index;
252b5132
RH
5104}
5105
5106/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5107 on error. */
5108
5109int
217aa764 5110_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5111{
5112 asymbol *asym_ptr = *asym_ptr_ptr;
5113 int idx;
5114 flagword flags = asym_ptr->flags;
5115
5116 /* When gas creates relocations against local labels, it creates its
5117 own symbol for the section, but does put the symbol into the
5118 symbol chain, so udata is 0. When the linker is generating
5119 relocatable output, this section symbol may be for one of the
5120 input sections rather than the output section. */
5121 if (asym_ptr->udata.i == 0
5122 && (flags & BSF_SECTION_SYM)
5123 && asym_ptr->section)
5124 {
5372391b 5125 asection *sec;
252b5132
RH
5126 int indx;
5127
5372391b
AM
5128 sec = asym_ptr->section;
5129 if (sec->owner != abfd && sec->output_section != NULL)
5130 sec = sec->output_section;
5131 if (sec->owner == abfd
5132 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5133 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5134 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5135 }
5136
5137 idx = asym_ptr->udata.i;
5138
5139 if (idx == 0)
5140 {
5141 /* This case can occur when using --strip-symbol on a symbol
5142 which is used in a relocation entry. */
5143 (*_bfd_error_handler)
d003868e
AM
5144 (_("%B: symbol `%s' required but not present"),
5145 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5146 bfd_set_error (bfd_error_no_symbols);
5147 return -1;
5148 }
5149
5150#if DEBUG & 4
5151 {
5152 fprintf (stderr,
661a3fd4 5153 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5154 (long) asym_ptr, asym_ptr->name, idx, flags,
5155 elf_symbol_flags (flags));
5156 fflush (stderr);
5157 }
5158#endif
5159
5160 return idx;
5161}
5162
84d1d650 5163/* Rewrite program header information. */
252b5132 5164
b34976b6 5165static bfd_boolean
84d1d650 5166rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5167{
b34976b6
AM
5168 Elf_Internal_Ehdr *iehdr;
5169 struct elf_segment_map *map;
5170 struct elf_segment_map *map_first;
5171 struct elf_segment_map **pointer_to_map;
5172 Elf_Internal_Phdr *segment;
5173 asection *section;
5174 unsigned int i;
5175 unsigned int num_segments;
5176 bfd_boolean phdr_included = FALSE;
5177 bfd_vma maxpagesize;
5178 struct elf_segment_map *phdr_adjust_seg = NULL;
5179 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5180 const struct elf_backend_data *bed;
bc67d8a6 5181
caf47ea6 5182 bed = get_elf_backend_data (ibfd);
252b5132
RH
5183 iehdr = elf_elfheader (ibfd);
5184
bc67d8a6 5185 map_first = NULL;
c044fabd 5186 pointer_to_map = &map_first;
252b5132
RH
5187
5188 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5189 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5190
5191 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5192#define SEGMENT_END(segment, start) \
5193 (start + (segment->p_memsz > segment->p_filesz \
5194 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5195
eecdbe52
JJ
5196#define SECTION_SIZE(section, segment) \
5197 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5198 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5199 ? section->size : 0)
eecdbe52 5200
b34976b6 5201 /* Returns TRUE if the given section is contained within
bc67d8a6 5202 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5203#define IS_CONTAINED_BY_VMA(section, segment) \
5204 (section->vma >= segment->p_vaddr \
eecdbe52 5205 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5206 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5207
b34976b6 5208 /* Returns TRUE if the given section is contained within
bc67d8a6 5209 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5210#define IS_CONTAINED_BY_LMA(section, segment, base) \
5211 (section->lma >= base \
eecdbe52 5212 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5213 <= SEGMENT_END (segment, base)))
252b5132 5214
c044fabd 5215 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5216#define IS_COREFILE_NOTE(p, s) \
5217 (p->p_type == PT_NOTE \
5218 && bfd_get_format (ibfd) == bfd_core \
5219 && s->vma == 0 && s->lma == 0 \
5220 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5221 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5222 <= p->p_offset + p->p_filesz))
252b5132
RH
5223
5224 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5225 linker, which generates a PT_INTERP section with p_vaddr and
5226 p_memsz set to 0. */
aecc8f8a
AM
5227#define IS_SOLARIS_PT_INTERP(p, s) \
5228 (p->p_vaddr == 0 \
5229 && p->p_paddr == 0 \
5230 && p->p_memsz == 0 \
5231 && p->p_filesz > 0 \
5232 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5233 && s->size > 0 \
aecc8f8a 5234 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5235 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5236 <= p->p_offset + p->p_filesz))
5c440b1e 5237
bc67d8a6
NC
5238 /* Decide if the given section should be included in the given segment.
5239 A section will be included if:
f5ffc919
NC
5240 1. It is within the address space of the segment -- we use the LMA
5241 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5242 2. It is an allocated segment,
5243 3. There is an output section associated with it,
eecdbe52 5244 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5245 5. PT_GNU_STACK segments do not include any sections.
5246 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5247 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5248 8. PT_DYNAMIC should not contain empty sections at the beginning
5249 (with the possible exception of .dynamic). */
caf47ea6 5250#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5251 ((((segment->p_paddr \
5252 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5253 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5254 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5255 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5256 && section->output_section != NULL \
03394ac9 5257 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5258 && (segment->p_type != PT_TLS \
5259 || (section->flags & SEC_THREAD_LOCAL)) \
5260 && (segment->p_type == PT_LOAD \
5261 || segment->p_type == PT_TLS \
5262 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5263 && (segment->p_type != PT_DYNAMIC \
5264 || SECTION_SIZE (section, segment) > 0 \
5265 || (segment->p_paddr \
5266 ? segment->p_paddr != section->lma \
5267 : segment->p_vaddr != section->vma) \
5268 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5269 == 0)) \
82e51918 5270 && ! section->segment_mark)
bc67d8a6 5271
b34976b6 5272 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5273#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5274 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5275
5276 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5277 their VMA address ranges and their LMA address ranges overlap.
5278 It is possible to have overlapping VMA ranges without overlapping LMA
5279 ranges. RedBoot images for example can have both .data and .bss mapped
5280 to the same VMA range, but with the .data section mapped to a different
5281 LMA. */
aecc8f8a 5282#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5283 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5284 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5285 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5286 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5287
5288 /* Initialise the segment mark field. */
5289 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5290 section->segment_mark = FALSE;
bc67d8a6 5291
252b5132 5292 /* Scan through the segments specified in the program header
bc67d8a6 5293 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5294 in the loadable segments. These can be created by weird
aecc8f8a 5295 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5296 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5297 i < num_segments;
c044fabd 5298 i++, segment++)
252b5132 5299 {
252b5132 5300 unsigned int j;
c044fabd 5301 Elf_Internal_Phdr *segment2;
252b5132 5302
aecc8f8a
AM
5303 if (segment->p_type == PT_INTERP)
5304 for (section = ibfd->sections; section; section = section->next)
5305 if (IS_SOLARIS_PT_INTERP (segment, section))
5306 {
5307 /* Mininal change so that the normal section to segment
4cc11e76 5308 assignment code will work. */
aecc8f8a
AM
5309 segment->p_vaddr = section->vma;
5310 break;
5311 }
5312
bc67d8a6
NC
5313 if (segment->p_type != PT_LOAD)
5314 continue;
c044fabd 5315
bc67d8a6 5316 /* Determine if this segment overlaps any previous segments. */
c044fabd 5317 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5318 {
5319 bfd_signed_vma extra_length;
c044fabd 5320
bc67d8a6
NC
5321 if (segment2->p_type != PT_LOAD
5322 || ! SEGMENT_OVERLAPS (segment, segment2))
5323 continue;
c044fabd 5324
bc67d8a6
NC
5325 /* Merge the two segments together. */
5326 if (segment2->p_vaddr < segment->p_vaddr)
5327 {
c044fabd
KH
5328 /* Extend SEGMENT2 to include SEGMENT and then delete
5329 SEGMENT. */
bc67d8a6
NC
5330 extra_length =
5331 SEGMENT_END (segment, segment->p_vaddr)
5332 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5333
bc67d8a6
NC
5334 if (extra_length > 0)
5335 {
5336 segment2->p_memsz += extra_length;
5337 segment2->p_filesz += extra_length;
5338 }
c044fabd 5339
bc67d8a6 5340 segment->p_type = PT_NULL;
c044fabd 5341
bc67d8a6
NC
5342 /* Since we have deleted P we must restart the outer loop. */
5343 i = 0;
5344 segment = elf_tdata (ibfd)->phdr;
5345 break;
5346 }
5347 else
5348 {
c044fabd
KH
5349 /* Extend SEGMENT to include SEGMENT2 and then delete
5350 SEGMENT2. */
bc67d8a6
NC
5351 extra_length =
5352 SEGMENT_END (segment2, segment2->p_vaddr)
5353 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5354
bc67d8a6
NC
5355 if (extra_length > 0)
5356 {
5357 segment->p_memsz += extra_length;
5358 segment->p_filesz += extra_length;
5359 }
c044fabd 5360
bc67d8a6
NC
5361 segment2->p_type = PT_NULL;
5362 }
5363 }
5364 }
c044fabd 5365
bc67d8a6
NC
5366 /* The second scan attempts to assign sections to segments. */
5367 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5368 i < num_segments;
5369 i ++, segment ++)
5370 {
5371 unsigned int section_count;
5372 asection ** sections;
5373 asection * output_section;
5374 unsigned int isec;
5375 bfd_vma matching_lma;
5376 bfd_vma suggested_lma;
5377 unsigned int j;
dc810e39 5378 bfd_size_type amt;
bc67d8a6
NC
5379
5380 if (segment->p_type == PT_NULL)
5381 continue;
c044fabd 5382
bc67d8a6 5383 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5384 for (section = ibfd->sections, section_count = 0;
5385 section != NULL;
5386 section = section->next)
caf47ea6 5387 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5388 ++section_count;
811072d8 5389
b5f852ea
NC
5390 /* Allocate a segment map big enough to contain
5391 all of the sections we have selected. */
dc810e39
AM
5392 amt = sizeof (struct elf_segment_map);
5393 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5394 map = bfd_alloc (obfd, amt);
bc67d8a6 5395 if (map == NULL)
b34976b6 5396 return FALSE;
252b5132
RH
5397
5398 /* Initialise the fields of the segment map. Default to
5399 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5400 map->next = NULL;
5401 map->p_type = segment->p_type;
5402 map->p_flags = segment->p_flags;
5403 map->p_flags_valid = 1;
5404 map->p_paddr = segment->p_paddr;
5405 map->p_paddr_valid = 1;
252b5132
RH
5406
5407 /* Determine if this segment contains the ELF file header
5408 and if it contains the program headers themselves. */
bc67d8a6
NC
5409 map->includes_filehdr = (segment->p_offset == 0
5410 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5411
bc67d8a6 5412 map->includes_phdrs = 0;
252b5132 5413
bc67d8a6 5414 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5415 {
bc67d8a6
NC
5416 map->includes_phdrs =
5417 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5418 && (segment->p_offset + segment->p_filesz
252b5132
RH
5419 >= ((bfd_vma) iehdr->e_phoff
5420 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5421
bc67d8a6 5422 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5423 phdr_included = TRUE;
252b5132
RH
5424 }
5425
bc67d8a6 5426 if (section_count == 0)
252b5132
RH
5427 {
5428 /* Special segments, such as the PT_PHDR segment, may contain
5429 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5430 something. They are allowed by the ELF spec however, so only
5431 a warning is produced. */
bc67d8a6 5432 if (segment->p_type == PT_LOAD)
caf47ea6 5433 (*_bfd_error_handler)
d003868e
AM
5434 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5435 ibfd);
252b5132 5436
bc67d8a6 5437 map->count = 0;
c044fabd
KH
5438 *pointer_to_map = map;
5439 pointer_to_map = &map->next;
252b5132
RH
5440
5441 continue;
5442 }
5443
5444 /* Now scan the sections in the input BFD again and attempt
5445 to add their corresponding output sections to the segment map.
5446 The problem here is how to handle an output section which has
5447 been moved (ie had its LMA changed). There are four possibilities:
5448
5449 1. None of the sections have been moved.
5450 In this case we can continue to use the segment LMA from the
5451 input BFD.
5452
5453 2. All of the sections have been moved by the same amount.
5454 In this case we can change the segment's LMA to match the LMA
5455 of the first section.
5456
5457 3. Some of the sections have been moved, others have not.
5458 In this case those sections which have not been moved can be
5459 placed in the current segment which will have to have its size,
5460 and possibly its LMA changed, and a new segment or segments will
5461 have to be created to contain the other sections.
5462
b5f852ea 5463 4. The sections have been moved, but not by the same amount.
252b5132
RH
5464 In this case we can change the segment's LMA to match the LMA
5465 of the first section and we will have to create a new segment
5466 or segments to contain the other sections.
5467
5468 In order to save time, we allocate an array to hold the section
5469 pointers that we are interested in. As these sections get assigned
5470 to a segment, they are removed from this array. */
5471
0b14c2aa
L
5472 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5473 to work around this long long bug. */
d0fb9a8d 5474 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5475 if (sections == NULL)
b34976b6 5476 return FALSE;
252b5132
RH
5477
5478 /* Step One: Scan for segment vs section LMA conflicts.
5479 Also add the sections to the section array allocated above.
5480 Also add the sections to the current segment. In the common
5481 case, where the sections have not been moved, this means that
5482 we have completely filled the segment, and there is nothing
5483 more to do. */
252b5132 5484 isec = 0;
72730e0c 5485 matching_lma = 0;
252b5132
RH
5486 suggested_lma = 0;
5487
bc67d8a6
NC
5488 for (j = 0, section = ibfd->sections;
5489 section != NULL;
5490 section = section->next)
252b5132 5491 {
caf47ea6 5492 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5493 {
bc67d8a6
NC
5494 output_section = section->output_section;
5495
5496 sections[j ++] = section;
252b5132
RH
5497
5498 /* The Solaris native linker always sets p_paddr to 0.
5499 We try to catch that case here, and set it to the
5e8d7549
NC
5500 correct value. Note - some backends require that
5501 p_paddr be left as zero. */
bc67d8a6 5502 if (segment->p_paddr == 0
4455705d 5503 && segment->p_vaddr != 0
5e8d7549 5504 && (! bed->want_p_paddr_set_to_zero)
252b5132 5505 && isec == 0
bc67d8a6
NC
5506 && output_section->lma != 0
5507 && (output_section->vma == (segment->p_vaddr
5508 + (map->includes_filehdr
5509 ? iehdr->e_ehsize
5510 : 0)
5511 + (map->includes_phdrs
079e9a2f
AM
5512 ? (iehdr->e_phnum
5513 * iehdr->e_phentsize)
bc67d8a6
NC
5514 : 0))))
5515 map->p_paddr = segment->p_vaddr;
252b5132
RH
5516
5517 /* Match up the physical address of the segment with the
5518 LMA address of the output section. */
bc67d8a6 5519 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5520 || IS_COREFILE_NOTE (segment, section)
5521 || (bed->want_p_paddr_set_to_zero &&
5522 IS_CONTAINED_BY_VMA (output_section, segment))
5523 )
252b5132
RH
5524 {
5525 if (matching_lma == 0)
bc67d8a6 5526 matching_lma = output_section->lma;
252b5132
RH
5527
5528 /* We assume that if the section fits within the segment
bc67d8a6 5529 then it does not overlap any other section within that
252b5132 5530 segment. */
bc67d8a6 5531 map->sections[isec ++] = output_section;
252b5132
RH
5532 }
5533 else if (suggested_lma == 0)
bc67d8a6 5534 suggested_lma = output_section->lma;
252b5132
RH
5535 }
5536 }
5537
bc67d8a6 5538 BFD_ASSERT (j == section_count);
252b5132
RH
5539
5540 /* Step Two: Adjust the physical address of the current segment,
5541 if necessary. */
bc67d8a6 5542 if (isec == section_count)
252b5132
RH
5543 {
5544 /* All of the sections fitted within the segment as currently
5545 specified. This is the default case. Add the segment to
5546 the list of built segments and carry on to process the next
5547 program header in the input BFD. */
bc67d8a6 5548 map->count = section_count;
c044fabd
KH
5549 *pointer_to_map = map;
5550 pointer_to_map = &map->next;
252b5132
RH
5551
5552 free (sections);
5553 continue;
5554 }
252b5132
RH
5555 else
5556 {
72730e0c
AM
5557 if (matching_lma != 0)
5558 {
5559 /* At least one section fits inside the current segment.
5560 Keep it, but modify its physical address to match the
5561 LMA of the first section that fitted. */
bc67d8a6 5562 map->p_paddr = matching_lma;
72730e0c
AM
5563 }
5564 else
5565 {
5566 /* None of the sections fitted inside the current segment.
5567 Change the current segment's physical address to match
5568 the LMA of the first section. */
bc67d8a6 5569 map->p_paddr = suggested_lma;
72730e0c
AM
5570 }
5571
bc67d8a6
NC
5572 /* Offset the segment physical address from the lma
5573 to allow for space taken up by elf headers. */
5574 if (map->includes_filehdr)
5575 map->p_paddr -= iehdr->e_ehsize;
252b5132 5576
bc67d8a6
NC
5577 if (map->includes_phdrs)
5578 {
5579 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5580
5581 /* iehdr->e_phnum is just an estimate of the number
5582 of program headers that we will need. Make a note
5583 here of the number we used and the segment we chose
5584 to hold these headers, so that we can adjust the
5585 offset when we know the correct value. */
5586 phdr_adjust_num = iehdr->e_phnum;
5587 phdr_adjust_seg = map;
5588 }
252b5132
RH
5589 }
5590
5591 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5592 those that fit to the current segment and removing them from the
252b5132
RH
5593 sections array; but making sure not to leave large gaps. Once all
5594 possible sections have been assigned to the current segment it is
5595 added to the list of built segments and if sections still remain
5596 to be assigned, a new segment is constructed before repeating
5597 the loop. */
5598 isec = 0;
5599 do
5600 {
bc67d8a6 5601 map->count = 0;
252b5132
RH
5602 suggested_lma = 0;
5603
5604 /* Fill the current segment with sections that fit. */
bc67d8a6 5605 for (j = 0; j < section_count; j++)
252b5132 5606 {
bc67d8a6 5607 section = sections[j];
252b5132 5608
bc67d8a6 5609 if (section == NULL)
252b5132
RH
5610 continue;
5611
bc67d8a6 5612 output_section = section->output_section;
252b5132 5613
bc67d8a6 5614 BFD_ASSERT (output_section != NULL);
c044fabd 5615
bc67d8a6
NC
5616 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5617 || IS_COREFILE_NOTE (segment, section))
252b5132 5618 {
bc67d8a6 5619 if (map->count == 0)
252b5132
RH
5620 {
5621 /* If the first section in a segment does not start at
bc67d8a6
NC
5622 the beginning of the segment, then something is
5623 wrong. */
5624 if (output_section->lma !=
5625 (map->p_paddr
5626 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5627 + (map->includes_phdrs
5628 ? iehdr->e_phnum * iehdr->e_phentsize
5629 : 0)))
252b5132
RH
5630 abort ();
5631 }
5632 else
5633 {
5634 asection * prev_sec;
252b5132 5635
bc67d8a6 5636 prev_sec = map->sections[map->count - 1];
252b5132
RH
5637
5638 /* If the gap between the end of the previous section
bc67d8a6
NC
5639 and the start of this section is more than
5640 maxpagesize then we need to start a new segment. */
eea6121a 5641 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5642 maxpagesize)
caf47ea6 5643 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5644 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5645 > output_section->lma))
252b5132
RH
5646 {
5647 if (suggested_lma == 0)
bc67d8a6 5648 suggested_lma = output_section->lma;
252b5132
RH
5649
5650 continue;
5651 }
5652 }
5653
bc67d8a6 5654 map->sections[map->count++] = output_section;
252b5132
RH
5655 ++isec;
5656 sections[j] = NULL;
b34976b6 5657 section->segment_mark = TRUE;
252b5132
RH
5658 }
5659 else if (suggested_lma == 0)
bc67d8a6 5660 suggested_lma = output_section->lma;
252b5132
RH
5661 }
5662
bc67d8a6 5663 BFD_ASSERT (map->count > 0);
252b5132
RH
5664
5665 /* Add the current segment to the list of built segments. */
c044fabd
KH
5666 *pointer_to_map = map;
5667 pointer_to_map = &map->next;
252b5132 5668
bc67d8a6 5669 if (isec < section_count)
252b5132
RH
5670 {
5671 /* We still have not allocated all of the sections to
5672 segments. Create a new segment here, initialise it
5673 and carry on looping. */
dc810e39
AM
5674 amt = sizeof (struct elf_segment_map);
5675 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5676 map = bfd_alloc (obfd, amt);
bc67d8a6 5677 if (map == NULL)
5ed6aba4
NC
5678 {
5679 free (sections);
5680 return FALSE;
5681 }
252b5132
RH
5682
5683 /* Initialise the fields of the segment map. Set the physical
5684 physical address to the LMA of the first section that has
5685 not yet been assigned. */
bc67d8a6
NC
5686 map->next = NULL;
5687 map->p_type = segment->p_type;
5688 map->p_flags = segment->p_flags;
5689 map->p_flags_valid = 1;
5690 map->p_paddr = suggested_lma;
5691 map->p_paddr_valid = 1;
5692 map->includes_filehdr = 0;
5693 map->includes_phdrs = 0;
252b5132
RH
5694 }
5695 }
bc67d8a6 5696 while (isec < section_count);
252b5132
RH
5697
5698 free (sections);
5699 }
5700
5701 /* The Solaris linker creates program headers in which all the
5702 p_paddr fields are zero. When we try to objcopy or strip such a
5703 file, we get confused. Check for this case, and if we find it
5704 reset the p_paddr_valid fields. */
bc67d8a6
NC
5705 for (map = map_first; map != NULL; map = map->next)
5706 if (map->p_paddr != 0)
252b5132 5707 break;
bc67d8a6 5708 if (map == NULL)
b5f852ea
NC
5709 for (map = map_first; map != NULL; map = map->next)
5710 map->p_paddr_valid = 0;
252b5132 5711
bc67d8a6
NC
5712 elf_tdata (obfd)->segment_map = map_first;
5713
5714 /* If we had to estimate the number of program headers that were
9ad5cbcf 5715 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5716 the offset if necessary. */
5717 if (phdr_adjust_seg != NULL)
5718 {
5719 unsigned int count;
c044fabd 5720
bc67d8a6 5721 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5722 count++;
252b5132 5723
bc67d8a6
NC
5724 if (count > phdr_adjust_num)
5725 phdr_adjust_seg->p_paddr
5726 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5727 }
c044fabd 5728
bc67d8a6 5729#undef SEGMENT_END
eecdbe52 5730#undef SECTION_SIZE
bc67d8a6
NC
5731#undef IS_CONTAINED_BY_VMA
5732#undef IS_CONTAINED_BY_LMA
252b5132 5733#undef IS_COREFILE_NOTE
bc67d8a6
NC
5734#undef IS_SOLARIS_PT_INTERP
5735#undef INCLUDE_SECTION_IN_SEGMENT
5736#undef SEGMENT_AFTER_SEGMENT
5737#undef SEGMENT_OVERLAPS
b34976b6 5738 return TRUE;
252b5132
RH
5739}
5740
84d1d650
L
5741/* Copy ELF program header information. */
5742
5743static bfd_boolean
5744copy_elf_program_header (bfd *ibfd, bfd *obfd)
5745{
5746 Elf_Internal_Ehdr *iehdr;
5747 struct elf_segment_map *map;
5748 struct elf_segment_map *map_first;
5749 struct elf_segment_map **pointer_to_map;
5750 Elf_Internal_Phdr *segment;
5751 unsigned int i;
5752 unsigned int num_segments;
5753 bfd_boolean phdr_included = FALSE;
5754
5755 iehdr = elf_elfheader (ibfd);
5756
5757 map_first = NULL;
5758 pointer_to_map = &map_first;
5759
5760 num_segments = elf_elfheader (ibfd)->e_phnum;
5761 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5762 i < num_segments;
5763 i++, segment++)
5764 {
5765 asection *section;
5766 unsigned int section_count;
5767 bfd_size_type amt;
5768 Elf_Internal_Shdr *this_hdr;
5769
5770 /* FIXME: Do we need to copy PT_NULL segment? */
5771 if (segment->p_type == PT_NULL)
5772 continue;
5773
5774 /* Compute how many sections are in this segment. */
5775 for (section = ibfd->sections, section_count = 0;
5776 section != NULL;
5777 section = section->next)
5778 {
5779 this_hdr = &(elf_section_data(section)->this_hdr);
5780 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5781 section_count++;
5782 }
5783
5784 /* Allocate a segment map big enough to contain
5785 all of the sections we have selected. */
5786 amt = sizeof (struct elf_segment_map);
5787 if (section_count != 0)
5788 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5789 map = bfd_alloc (obfd, amt);
5790 if (map == NULL)
5791 return FALSE;
5792
5793 /* Initialize the fields of the output segment map with the
5794 input segment. */
5795 map->next = NULL;
5796 map->p_type = segment->p_type;
5797 map->p_flags = segment->p_flags;
5798 map->p_flags_valid = 1;
5799 map->p_paddr = segment->p_paddr;
5800 map->p_paddr_valid = 1;
3f570048
AM
5801 map->p_align = segment->p_align;
5802 map->p_align_valid = 1;
84d1d650
L
5803
5804 /* Determine if this segment contains the ELF file header
5805 and if it contains the program headers themselves. */
5806 map->includes_filehdr = (segment->p_offset == 0
5807 && segment->p_filesz >= iehdr->e_ehsize);
5808
5809 map->includes_phdrs = 0;
5810 if (! phdr_included || segment->p_type != PT_LOAD)
5811 {
5812 map->includes_phdrs =
5813 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5814 && (segment->p_offset + segment->p_filesz
5815 >= ((bfd_vma) iehdr->e_phoff
5816 + iehdr->e_phnum * iehdr->e_phentsize)));
5817
5818 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5819 phdr_included = TRUE;
5820 }
5821
5822 if (section_count != 0)
5823 {
5824 unsigned int isec = 0;
5825
5826 for (section = ibfd->sections;
5827 section != NULL;
5828 section = section->next)
5829 {
5830 this_hdr = &(elf_section_data(section)->this_hdr);
5831 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5832 map->sections[isec++] = section->output_section;
5833 }
5834 }
5835
5836 map->count = section_count;
5837 *pointer_to_map = map;
5838 pointer_to_map = &map->next;
5839 }
5840
5841 elf_tdata (obfd)->segment_map = map_first;
5842 return TRUE;
5843}
5844
5845/* Copy private BFD data. This copies or rewrites ELF program header
5846 information. */
5847
5848static bfd_boolean
5849copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5850{
84d1d650
L
5851 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5852 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5853 return TRUE;
5854
5855 if (elf_tdata (ibfd)->phdr == NULL)
5856 return TRUE;
5857
5858 if (ibfd->xvec == obfd->xvec)
5859 {
5860 /* Check if any sections in the input BFD covered by ELF program
5861 header are changed. */
d55ce4e2 5862 Elf_Internal_Phdr *segment;
84d1d650
L
5863 asection *section, *osec;
5864 unsigned int i, num_segments;
5865 Elf_Internal_Shdr *this_hdr;
5866
5867 /* Initialize the segment mark field. */
5868 for (section = obfd->sections; section != NULL;
5869 section = section->next)
5870 section->segment_mark = FALSE;
5871
5872 num_segments = elf_elfheader (ibfd)->e_phnum;
5873 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5874 i < num_segments;
5875 i++, segment++)
5876 {
5877 for (section = ibfd->sections;
5878 section != NULL; section = section->next)
5879 {
5880 /* We mark the output section so that we know it comes
5881 from the input BFD. */
5882 osec = section->output_section;
5883 if (osec)
5884 osec->segment_mark = TRUE;
5885
5886 /* Check if this section is covered by the segment. */
5887 this_hdr = &(elf_section_data(section)->this_hdr);
5888 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5889 {
5890 /* FIXME: Check if its output section is changed or
5891 removed. What else do we need to check? */
5892 if (osec == NULL
5893 || section->flags != osec->flags
5894 || section->lma != osec->lma
5895 || section->vma != osec->vma
5896 || section->size != osec->size
5897 || section->rawsize != osec->rawsize
5898 || section->alignment_power != osec->alignment_power)
5899 goto rewrite;
5900 }
5901 }
5902 }
5903
5904 /* Check to see if any output section doesn't come from the
5905 input BFD. */
5906 for (section = obfd->sections; section != NULL;
5907 section = section->next)
5908 {
5909 if (section->segment_mark == FALSE)
5910 goto rewrite;
5911 else
5912 section->segment_mark = FALSE;
5913 }
5914
5915 return copy_elf_program_header (ibfd, obfd);
5916 }
5917
5918rewrite:
5919 return rewrite_elf_program_header (ibfd, obfd);
5920}
5921
ccd2ec6a
L
5922/* Initialize private output section information from input section. */
5923
5924bfd_boolean
5925_bfd_elf_init_private_section_data (bfd *ibfd,
5926 asection *isec,
5927 bfd *obfd,
5928 asection *osec,
5929 struct bfd_link_info *link_info)
5930
5931{
5932 Elf_Internal_Shdr *ihdr, *ohdr;
5933 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
5934
5935 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5936 || obfd->xvec->flavour != bfd_target_elf_flavour)
5937 return TRUE;
5938
e843e0f8 5939 /* Don't copy the output ELF section type from input if the
d3fd4074 5940 output BFD section flags have been set to something different.
e843e0f8
L
5941 elf_fake_sections will set ELF section type based on BFD
5942 section flags. */
8b95791f
AM
5943 if (osec->flags == isec->flags
5944 || (osec->flags == 0 && elf_section_type (osec) == SHT_NULL))
ccd2ec6a
L
5945 elf_section_type (osec) = elf_section_type (isec);
5946
5947 /* Set things up for objcopy and relocatable link. The output
5948 SHT_GROUP section will have its elf_next_in_group pointing back
5949 to the input group members. Ignore linker created group section.
5950 See elfNN_ia64_object_p in elfxx-ia64.c. */
ccd2ec6a
L
5951 if (need_group)
5952 {
5953 if (elf_sec_group (isec) == NULL
5954 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5955 {
5956 if (elf_section_flags (isec) & SHF_GROUP)
5957 elf_section_flags (osec) |= SHF_GROUP;
5958 elf_next_in_group (osec) = elf_next_in_group (isec);
5959 elf_group_name (osec) = elf_group_name (isec);
5960 }
5961 }
5962
5963 ihdr = &elf_section_data (isec)->this_hdr;
5964
5965 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
5966 don't use the output section of the linked-to section since it
5967 may be NULL at this point. */
5968 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
5969 {
5970 ohdr = &elf_section_data (osec)->this_hdr;
5971 ohdr->sh_flags |= SHF_LINK_ORDER;
5972 elf_linked_to_section (osec) = elf_linked_to_section (isec);
5973 }
5974
5975 osec->use_rela_p = isec->use_rela_p;
5976
5977 return TRUE;
5978}
5979
252b5132
RH
5980/* Copy private section information. This copies over the entsize
5981 field, and sometimes the info field. */
5982
b34976b6 5983bfd_boolean
217aa764
AM
5984_bfd_elf_copy_private_section_data (bfd *ibfd,
5985 asection *isec,
5986 bfd *obfd,
5987 asection *osec)
252b5132
RH
5988{
5989 Elf_Internal_Shdr *ihdr, *ohdr;
5990
5991 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5992 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5993 return TRUE;
252b5132 5994
252b5132
RH
5995 ihdr = &elf_section_data (isec)->this_hdr;
5996 ohdr = &elf_section_data (osec)->this_hdr;
5997
5998 ohdr->sh_entsize = ihdr->sh_entsize;
5999
6000 if (ihdr->sh_type == SHT_SYMTAB
6001 || ihdr->sh_type == SHT_DYNSYM
6002 || ihdr->sh_type == SHT_GNU_verneed
6003 || ihdr->sh_type == SHT_GNU_verdef)
6004 ohdr->sh_info = ihdr->sh_info;
6005
ccd2ec6a
L
6006 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6007 NULL);
252b5132
RH
6008}
6009
80fccad2
BW
6010/* Copy private header information. */
6011
6012bfd_boolean
6013_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6014{
30288845
AM
6015 asection *isec;
6016
80fccad2
BW
6017 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6018 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6019 return TRUE;
6020
6021 /* Copy over private BFD data if it has not already been copied.
6022 This must be done here, rather than in the copy_private_bfd_data
6023 entry point, because the latter is called after the section
6024 contents have been set, which means that the program headers have
6025 already been worked out. */
6026 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6027 {
6028 if (! copy_private_bfd_data (ibfd, obfd))
6029 return FALSE;
6030 }
6031
30288845
AM
6032 /* _bfd_elf_copy_private_section_data copied over the SHF_GROUP flag
6033 but this might be wrong if we deleted the group section. */
6034 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
6035 if (elf_section_type (isec) == SHT_GROUP
6036 && isec->output_section == NULL)
6037 {
6038 asection *first = elf_next_in_group (isec);
6039 asection *s = first;
6040 while (s != NULL)
6041 {
6042 if (s->output_section != NULL)
6043 {
6044 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6045 elf_group_name (s->output_section) = NULL;
6046 }
6047 s = elf_next_in_group (s);
6048 if (s == first)
6049 break;
6050 }
6051 }
6052
80fccad2
BW
6053 return TRUE;
6054}
6055
252b5132
RH
6056/* Copy private symbol information. If this symbol is in a section
6057 which we did not map into a BFD section, try to map the section
6058 index correctly. We use special macro definitions for the mapped
6059 section indices; these definitions are interpreted by the
6060 swap_out_syms function. */
6061
9ad5cbcf
AM
6062#define MAP_ONESYMTAB (SHN_HIOS + 1)
6063#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6064#define MAP_STRTAB (SHN_HIOS + 3)
6065#define MAP_SHSTRTAB (SHN_HIOS + 4)
6066#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6067
b34976b6 6068bfd_boolean
217aa764
AM
6069_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6070 asymbol *isymarg,
6071 bfd *obfd,
6072 asymbol *osymarg)
252b5132
RH
6073{
6074 elf_symbol_type *isym, *osym;
6075
6076 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6077 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6078 return TRUE;
252b5132
RH
6079
6080 isym = elf_symbol_from (ibfd, isymarg);
6081 osym = elf_symbol_from (obfd, osymarg);
6082
6083 if (isym != NULL
6084 && osym != NULL
6085 && bfd_is_abs_section (isym->symbol.section))
6086 {
6087 unsigned int shndx;
6088
6089 shndx = isym->internal_elf_sym.st_shndx;
6090 if (shndx == elf_onesymtab (ibfd))
6091 shndx = MAP_ONESYMTAB;
6092 else if (shndx == elf_dynsymtab (ibfd))
6093 shndx = MAP_DYNSYMTAB;
6094 else if (shndx == elf_tdata (ibfd)->strtab_section)
6095 shndx = MAP_STRTAB;
6096 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6097 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6098 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6099 shndx = MAP_SYM_SHNDX;
252b5132
RH
6100 osym->internal_elf_sym.st_shndx = shndx;
6101 }
6102
b34976b6 6103 return TRUE;
252b5132
RH
6104}
6105
6106/* Swap out the symbols. */
6107
b34976b6 6108static bfd_boolean
217aa764
AM
6109swap_out_syms (bfd *abfd,
6110 struct bfd_strtab_hash **sttp,
6111 int relocatable_p)
252b5132 6112{
9c5bfbb7 6113 const struct elf_backend_data *bed;
079e9a2f
AM
6114 int symcount;
6115 asymbol **syms;
6116 struct bfd_strtab_hash *stt;
6117 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6118 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6119 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6120 bfd_byte *outbound_syms;
6121 bfd_byte *outbound_shndx;
079e9a2f
AM
6122 int idx;
6123 bfd_size_type amt;
174fd7f9 6124 bfd_boolean name_local_sections;
252b5132
RH
6125
6126 if (!elf_map_symbols (abfd))
b34976b6 6127 return FALSE;
252b5132 6128
c044fabd 6129 /* Dump out the symtabs. */
079e9a2f
AM
6130 stt = _bfd_elf_stringtab_init ();
6131 if (stt == NULL)
b34976b6 6132 return FALSE;
252b5132 6133
079e9a2f
AM
6134 bed = get_elf_backend_data (abfd);
6135 symcount = bfd_get_symcount (abfd);
6136 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6137 symtab_hdr->sh_type = SHT_SYMTAB;
6138 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6139 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6140 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 6141 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
6142
6143 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6144 symstrtab_hdr->sh_type = SHT_STRTAB;
6145
d0fb9a8d 6146 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 6147 if (outbound_syms == NULL)
5ed6aba4
NC
6148 {
6149 _bfd_stringtab_free (stt);
6150 return FALSE;
6151 }
217aa764 6152 symtab_hdr->contents = outbound_syms;
252b5132 6153
9ad5cbcf
AM
6154 outbound_shndx = NULL;
6155 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6156 if (symtab_shndx_hdr->sh_name != 0)
6157 {
6158 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
6159 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
6160 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6161 if (outbound_shndx == NULL)
5ed6aba4
NC
6162 {
6163 _bfd_stringtab_free (stt);
6164 return FALSE;
6165 }
6166
9ad5cbcf
AM
6167 symtab_shndx_hdr->contents = outbound_shndx;
6168 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6169 symtab_shndx_hdr->sh_size = amt;
6170 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6171 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6172 }
6173
589e6347 6174 /* Now generate the data (for "contents"). */
079e9a2f
AM
6175 {
6176 /* Fill in zeroth symbol and swap it out. */
6177 Elf_Internal_Sym sym;
6178 sym.st_name = 0;
6179 sym.st_value = 0;
6180 sym.st_size = 0;
6181 sym.st_info = 0;
6182 sym.st_other = 0;
6183 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6184 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6185 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6186 if (outbound_shndx != NULL)
6187 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6188 }
252b5132 6189
174fd7f9
RS
6190 name_local_sections
6191 = (bed->elf_backend_name_local_section_symbols
6192 && bed->elf_backend_name_local_section_symbols (abfd));
6193
079e9a2f
AM
6194 syms = bfd_get_outsymbols (abfd);
6195 for (idx = 0; idx < symcount; idx++)
252b5132 6196 {
252b5132 6197 Elf_Internal_Sym sym;
079e9a2f
AM
6198 bfd_vma value = syms[idx]->value;
6199 elf_symbol_type *type_ptr;
6200 flagword flags = syms[idx]->flags;
6201 int type;
252b5132 6202
174fd7f9
RS
6203 if (!name_local_sections
6204 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6205 {
6206 /* Local section symbols have no name. */
6207 sym.st_name = 0;
6208 }
6209 else
6210 {
6211 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6212 syms[idx]->name,
b34976b6 6213 TRUE, FALSE);
079e9a2f 6214 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6215 {
6216 _bfd_stringtab_free (stt);
6217 return FALSE;
6218 }
079e9a2f 6219 }
252b5132 6220
079e9a2f 6221 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6222
079e9a2f
AM
6223 if ((flags & BSF_SECTION_SYM) == 0
6224 && bfd_is_com_section (syms[idx]->section))
6225 {
6226 /* ELF common symbols put the alignment into the `value' field,
6227 and the size into the `size' field. This is backwards from
6228 how BFD handles it, so reverse it here. */
6229 sym.st_size = value;
6230 if (type_ptr == NULL
6231 || type_ptr->internal_elf_sym.st_value == 0)
6232 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6233 else
6234 sym.st_value = type_ptr->internal_elf_sym.st_value;
6235 sym.st_shndx = _bfd_elf_section_from_bfd_section
6236 (abfd, syms[idx]->section);
6237 }
6238 else
6239 {
6240 asection *sec = syms[idx]->section;
6241 int shndx;
252b5132 6242
079e9a2f
AM
6243 if (sec->output_section)
6244 {
6245 value += sec->output_offset;
6246 sec = sec->output_section;
6247 }
589e6347 6248
079e9a2f
AM
6249 /* Don't add in the section vma for relocatable output. */
6250 if (! relocatable_p)
6251 value += sec->vma;
6252 sym.st_value = value;
6253 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6254
6255 if (bfd_is_abs_section (sec)
6256 && type_ptr != NULL
6257 && type_ptr->internal_elf_sym.st_shndx != 0)
6258 {
6259 /* This symbol is in a real ELF section which we did
6260 not create as a BFD section. Undo the mapping done
6261 by copy_private_symbol_data. */
6262 shndx = type_ptr->internal_elf_sym.st_shndx;
6263 switch (shndx)
6264 {
6265 case MAP_ONESYMTAB:
6266 shndx = elf_onesymtab (abfd);
6267 break;
6268 case MAP_DYNSYMTAB:
6269 shndx = elf_dynsymtab (abfd);
6270 break;
6271 case MAP_STRTAB:
6272 shndx = elf_tdata (abfd)->strtab_section;
6273 break;
6274 case MAP_SHSTRTAB:
6275 shndx = elf_tdata (abfd)->shstrtab_section;
6276 break;
9ad5cbcf
AM
6277 case MAP_SYM_SHNDX:
6278 shndx = elf_tdata (abfd)->symtab_shndx_section;
6279 break;
079e9a2f
AM
6280 default:
6281 break;
6282 }
6283 }
6284 else
6285 {
6286 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6287
079e9a2f
AM
6288 if (shndx == -1)
6289 {
6290 asection *sec2;
6291
6292 /* Writing this would be a hell of a lot easier if
6293 we had some decent documentation on bfd, and
6294 knew what to expect of the library, and what to
6295 demand of applications. For example, it
6296 appears that `objcopy' might not set the
6297 section of a symbol to be a section that is
6298 actually in the output file. */
6299 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6300 if (sec2 == NULL)
6301 {
6302 _bfd_error_handler (_("\
6303Unable to find equivalent output section for symbol '%s' from section '%s'"),
6304 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6305 sec->name);
811072d8 6306 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6307 _bfd_stringtab_free (stt);
589e6347
NC
6308 return FALSE;
6309 }
811072d8 6310
079e9a2f
AM
6311 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
6312 BFD_ASSERT (shndx != -1);
6313 }
6314 }
252b5132 6315
079e9a2f
AM
6316 sym.st_shndx = shndx;
6317 }
252b5132 6318
13ae64f3
JJ
6319 if ((flags & BSF_THREAD_LOCAL) != 0)
6320 type = STT_TLS;
6321 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6322 type = STT_FUNC;
6323 else if ((flags & BSF_OBJECT) != 0)
6324 type = STT_OBJECT;
6325 else
6326 type = STT_NOTYPE;
252b5132 6327
13ae64f3
JJ
6328 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6329 type = STT_TLS;
6330
589e6347 6331 /* Processor-specific types. */
079e9a2f
AM
6332 if (type_ptr != NULL
6333 && bed->elf_backend_get_symbol_type)
6334 type = ((*bed->elf_backend_get_symbol_type)
6335 (&type_ptr->internal_elf_sym, type));
252b5132 6336
079e9a2f
AM
6337 if (flags & BSF_SECTION_SYM)
6338 {
6339 if (flags & BSF_GLOBAL)
6340 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6341 else
6342 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6343 }
6344 else if (bfd_is_com_section (syms[idx]->section))
6345 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
6346 else if (bfd_is_und_section (syms[idx]->section))
6347 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6348 ? STB_WEAK
6349 : STB_GLOBAL),
6350 type);
6351 else if (flags & BSF_FILE)
6352 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6353 else
6354 {
6355 int bind = STB_LOCAL;
252b5132 6356
079e9a2f
AM
6357 if (flags & BSF_LOCAL)
6358 bind = STB_LOCAL;
6359 else if (flags & BSF_WEAK)
6360 bind = STB_WEAK;
6361 else if (flags & BSF_GLOBAL)
6362 bind = STB_GLOBAL;
252b5132 6363
079e9a2f
AM
6364 sym.st_info = ELF_ST_INFO (bind, type);
6365 }
252b5132 6366
079e9a2f
AM
6367 if (type_ptr != NULL)
6368 sym.st_other = type_ptr->internal_elf_sym.st_other;
6369 else
6370 sym.st_other = 0;
252b5132 6371
9ad5cbcf 6372 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6373 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6374 if (outbound_shndx != NULL)
6375 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6376 }
252b5132 6377
079e9a2f
AM
6378 *sttp = stt;
6379 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6380 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6381
079e9a2f
AM
6382 symstrtab_hdr->sh_flags = 0;
6383 symstrtab_hdr->sh_addr = 0;
6384 symstrtab_hdr->sh_entsize = 0;
6385 symstrtab_hdr->sh_link = 0;
6386 symstrtab_hdr->sh_info = 0;
6387 symstrtab_hdr->sh_addralign = 1;
252b5132 6388
b34976b6 6389 return TRUE;
252b5132
RH
6390}
6391
6392/* Return the number of bytes required to hold the symtab vector.
6393
6394 Note that we base it on the count plus 1, since we will null terminate
6395 the vector allocated based on this size. However, the ELF symbol table
6396 always has a dummy entry as symbol #0, so it ends up even. */
6397
6398long
217aa764 6399_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6400{
6401 long symcount;
6402 long symtab_size;
6403 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6404
6405 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6406 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6407 if (symcount > 0)
6408 symtab_size -= sizeof (asymbol *);
252b5132
RH
6409
6410 return symtab_size;
6411}
6412
6413long
217aa764 6414_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6415{
6416 long symcount;
6417 long symtab_size;
6418 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6419
6420 if (elf_dynsymtab (abfd) == 0)
6421 {
6422 bfd_set_error (bfd_error_invalid_operation);
6423 return -1;
6424 }
6425
6426 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6427 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6428 if (symcount > 0)
6429 symtab_size -= sizeof (asymbol *);
252b5132
RH
6430
6431 return symtab_size;
6432}
6433
6434long
217aa764
AM
6435_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6436 sec_ptr asect)
252b5132
RH
6437{
6438 return (asect->reloc_count + 1) * sizeof (arelent *);
6439}
6440
6441/* Canonicalize the relocs. */
6442
6443long
217aa764
AM
6444_bfd_elf_canonicalize_reloc (bfd *abfd,
6445 sec_ptr section,
6446 arelent **relptr,
6447 asymbol **symbols)
252b5132
RH
6448{
6449 arelent *tblptr;
6450 unsigned int i;
9c5bfbb7 6451 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6452
b34976b6 6453 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6454 return -1;
6455
6456 tblptr = section->relocation;
6457 for (i = 0; i < section->reloc_count; i++)
6458 *relptr++ = tblptr++;
6459
6460 *relptr = NULL;
6461
6462 return section->reloc_count;
6463}
6464
6465long
6cee3f79 6466_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6467{
9c5bfbb7 6468 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6469 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6470
6471 if (symcount >= 0)
6472 bfd_get_symcount (abfd) = symcount;
6473 return symcount;
6474}
6475
6476long
217aa764
AM
6477_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6478 asymbol **allocation)
252b5132 6479{
9c5bfbb7 6480 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6481 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6482
6483 if (symcount >= 0)
6484 bfd_get_dynamic_symcount (abfd) = symcount;
6485 return symcount;
252b5132
RH
6486}
6487
8615f3f2
AM
6488/* Return the size required for the dynamic reloc entries. Any loadable
6489 section that was actually installed in the BFD, and has type SHT_REL
6490 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6491 dynamic reloc section. */
252b5132
RH
6492
6493long
217aa764 6494_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6495{
6496 long ret;
6497 asection *s;
6498
6499 if (elf_dynsymtab (abfd) == 0)
6500 {
6501 bfd_set_error (bfd_error_invalid_operation);
6502 return -1;
6503 }
6504
6505 ret = sizeof (arelent *);
6506 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6507 if ((s->flags & SEC_LOAD) != 0
6508 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6509 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6510 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6511 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6512 * sizeof (arelent *));
6513
6514 return ret;
6515}
6516
8615f3f2
AM
6517/* Canonicalize the dynamic relocation entries. Note that we return the
6518 dynamic relocations as a single block, although they are actually
6519 associated with particular sections; the interface, which was
6520 designed for SunOS style shared libraries, expects that there is only
6521 one set of dynamic relocs. Any loadable section that was actually
6522 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6523 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6524
6525long
217aa764
AM
6526_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6527 arelent **storage,
6528 asymbol **syms)
252b5132 6529{
217aa764 6530 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6531 asection *s;
6532 long ret;
6533
6534 if (elf_dynsymtab (abfd) == 0)
6535 {
6536 bfd_set_error (bfd_error_invalid_operation);
6537 return -1;
6538 }
6539
6540 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6541 ret = 0;
6542 for (s = abfd->sections; s != NULL; s = s->next)
6543 {
8615f3f2
AM
6544 if ((s->flags & SEC_LOAD) != 0
6545 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6546 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6547 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6548 {
6549 arelent *p;
6550 long count, i;
6551
b34976b6 6552 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6553 return -1;
eea6121a 6554 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6555 p = s->relocation;
6556 for (i = 0; i < count; i++)
6557 *storage++ = p++;
6558 ret += count;
6559 }
6560 }
6561
6562 *storage = NULL;
6563
6564 return ret;
6565}
6566\f
6567/* Read in the version information. */
6568
b34976b6 6569bfd_boolean
fc0e6df6 6570_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6571{
6572 bfd_byte *contents = NULL;
fc0e6df6
PB
6573 unsigned int freeidx = 0;
6574
6575 if (elf_dynverref (abfd) != 0)
6576 {
6577 Elf_Internal_Shdr *hdr;
6578 Elf_External_Verneed *everneed;
6579 Elf_Internal_Verneed *iverneed;
6580 unsigned int i;
d0fb9a8d 6581 bfd_byte *contents_end;
fc0e6df6
PB
6582
6583 hdr = &elf_tdata (abfd)->dynverref_hdr;
6584
d0fb9a8d
JJ
6585 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6586 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6587 if (elf_tdata (abfd)->verref == NULL)
6588 goto error_return;
6589
6590 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6591
6592 contents = bfd_malloc (hdr->sh_size);
6593 if (contents == NULL)
d0fb9a8d
JJ
6594 {
6595error_return_verref:
6596 elf_tdata (abfd)->verref = NULL;
6597 elf_tdata (abfd)->cverrefs = 0;
6598 goto error_return;
6599 }
fc0e6df6
PB
6600 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6601 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6602 goto error_return_verref;
fc0e6df6 6603
d0fb9a8d
JJ
6604 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6605 goto error_return_verref;
6606
6607 BFD_ASSERT (sizeof (Elf_External_Verneed)
6608 == sizeof (Elf_External_Vernaux));
6609 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6610 everneed = (Elf_External_Verneed *) contents;
6611 iverneed = elf_tdata (abfd)->verref;
6612 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6613 {
6614 Elf_External_Vernaux *evernaux;
6615 Elf_Internal_Vernaux *ivernaux;
6616 unsigned int j;
6617
6618 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6619
6620 iverneed->vn_bfd = abfd;
6621
6622 iverneed->vn_filename =
6623 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6624 iverneed->vn_file);
6625 if (iverneed->vn_filename == NULL)
d0fb9a8d 6626 goto error_return_verref;
fc0e6df6 6627
d0fb9a8d
JJ
6628 if (iverneed->vn_cnt == 0)
6629 iverneed->vn_auxptr = NULL;
6630 else
6631 {
6632 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6633 sizeof (Elf_Internal_Vernaux));
6634 if (iverneed->vn_auxptr == NULL)
6635 goto error_return_verref;
6636 }
6637
6638 if (iverneed->vn_aux
6639 > (size_t) (contents_end - (bfd_byte *) everneed))
6640 goto error_return_verref;
fc0e6df6
PB
6641
6642 evernaux = ((Elf_External_Vernaux *)
6643 ((bfd_byte *) everneed + iverneed->vn_aux));
6644 ivernaux = iverneed->vn_auxptr;
6645 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6646 {
6647 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6648
6649 ivernaux->vna_nodename =
6650 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6651 ivernaux->vna_name);
6652 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6653 goto error_return_verref;
fc0e6df6
PB
6654
6655 if (j + 1 < iverneed->vn_cnt)
6656 ivernaux->vna_nextptr = ivernaux + 1;
6657 else
6658 ivernaux->vna_nextptr = NULL;
6659
d0fb9a8d
JJ
6660 if (ivernaux->vna_next
6661 > (size_t) (contents_end - (bfd_byte *) evernaux))
6662 goto error_return_verref;
6663
fc0e6df6
PB
6664 evernaux = ((Elf_External_Vernaux *)
6665 ((bfd_byte *) evernaux + ivernaux->vna_next));
6666
6667 if (ivernaux->vna_other > freeidx)
6668 freeidx = ivernaux->vna_other;
6669 }
6670
6671 if (i + 1 < hdr->sh_info)
6672 iverneed->vn_nextref = iverneed + 1;
6673 else
6674 iverneed->vn_nextref = NULL;
6675
d0fb9a8d
JJ
6676 if (iverneed->vn_next
6677 > (size_t) (contents_end - (bfd_byte *) everneed))
6678 goto error_return_verref;
6679
fc0e6df6
PB
6680 everneed = ((Elf_External_Verneed *)
6681 ((bfd_byte *) everneed + iverneed->vn_next));
6682 }
6683
6684 free (contents);
6685 contents = NULL;
6686 }
252b5132
RH
6687
6688 if (elf_dynverdef (abfd) != 0)
6689 {
6690 Elf_Internal_Shdr *hdr;
6691 Elf_External_Verdef *everdef;
6692 Elf_Internal_Verdef *iverdef;
f631889e
UD
6693 Elf_Internal_Verdef *iverdefarr;
6694 Elf_Internal_Verdef iverdefmem;
252b5132 6695 unsigned int i;
062e2358 6696 unsigned int maxidx;
d0fb9a8d 6697 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6698
6699 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6700
217aa764 6701 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6702 if (contents == NULL)
6703 goto error_return;
6704 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6705 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6706 goto error_return;
6707
d0fb9a8d
JJ
6708 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6709 goto error_return;
6710
6711 BFD_ASSERT (sizeof (Elf_External_Verdef)
6712 >= sizeof (Elf_External_Verdaux));
6713 contents_end_def = contents + hdr->sh_size
6714 - sizeof (Elf_External_Verdef);
6715 contents_end_aux = contents + hdr->sh_size
6716 - sizeof (Elf_External_Verdaux);
6717
f631889e
UD
6718 /* We know the number of entries in the section but not the maximum
6719 index. Therefore we have to run through all entries and find
6720 the maximum. */
252b5132 6721 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6722 maxidx = 0;
6723 for (i = 0; i < hdr->sh_info; ++i)
6724 {
6725 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6726
062e2358
AM
6727 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6728 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6729
d0fb9a8d
JJ
6730 if (iverdefmem.vd_next
6731 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6732 goto error_return;
6733
f631889e
UD
6734 everdef = ((Elf_External_Verdef *)
6735 ((bfd_byte *) everdef + iverdefmem.vd_next));
6736 }
6737
fc0e6df6
PB
6738 if (default_imported_symver)
6739 {
6740 if (freeidx > maxidx)
6741 maxidx = ++freeidx;
6742 else
6743 freeidx = ++maxidx;
6744 }
d0fb9a8d
JJ
6745 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6746 sizeof (Elf_Internal_Verdef));
f631889e
UD
6747 if (elf_tdata (abfd)->verdef == NULL)
6748 goto error_return;
6749
6750 elf_tdata (abfd)->cverdefs = maxidx;
6751
6752 everdef = (Elf_External_Verdef *) contents;
6753 iverdefarr = elf_tdata (abfd)->verdef;
6754 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6755 {
6756 Elf_External_Verdaux *everdaux;
6757 Elf_Internal_Verdaux *iverdaux;
6758 unsigned int j;
6759
f631889e
UD
6760 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6761
d0fb9a8d
JJ
6762 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6763 {
6764error_return_verdef:
6765 elf_tdata (abfd)->verdef = NULL;
6766 elf_tdata (abfd)->cverdefs = 0;
6767 goto error_return;
6768 }
6769
f631889e
UD
6770 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6771 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6772
6773 iverdef->vd_bfd = abfd;
6774
d0fb9a8d
JJ
6775 if (iverdef->vd_cnt == 0)
6776 iverdef->vd_auxptr = NULL;
6777 else
6778 {
6779 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6780 sizeof (Elf_Internal_Verdaux));
6781 if (iverdef->vd_auxptr == NULL)
6782 goto error_return_verdef;
6783 }
6784
6785 if (iverdef->vd_aux
6786 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6787 goto error_return_verdef;
252b5132
RH
6788
6789 everdaux = ((Elf_External_Verdaux *)
6790 ((bfd_byte *) everdef + iverdef->vd_aux));
6791 iverdaux = iverdef->vd_auxptr;
6792 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6793 {
6794 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6795
6796 iverdaux->vda_nodename =
6797 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6798 iverdaux->vda_name);
6799 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6800 goto error_return_verdef;
252b5132
RH
6801
6802 if (j + 1 < iverdef->vd_cnt)
6803 iverdaux->vda_nextptr = iverdaux + 1;
6804 else
6805 iverdaux->vda_nextptr = NULL;
6806
d0fb9a8d
JJ
6807 if (iverdaux->vda_next
6808 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6809 goto error_return_verdef;
6810
252b5132
RH
6811 everdaux = ((Elf_External_Verdaux *)
6812 ((bfd_byte *) everdaux + iverdaux->vda_next));
6813 }
6814
d0fb9a8d
JJ
6815 if (iverdef->vd_cnt)
6816 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6817
d0fb9a8d 6818 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6819 iverdef->vd_nextdef = iverdef + 1;
6820 else
6821 iverdef->vd_nextdef = NULL;
6822
6823 everdef = ((Elf_External_Verdef *)
6824 ((bfd_byte *) everdef + iverdef->vd_next));
6825 }
6826
6827 free (contents);
6828 contents = NULL;
6829 }
fc0e6df6 6830 else if (default_imported_symver)
252b5132 6831 {
fc0e6df6
PB
6832 if (freeidx < 3)
6833 freeidx = 3;
6834 else
6835 freeidx++;
252b5132 6836
d0fb9a8d
JJ
6837 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6838 sizeof (Elf_Internal_Verdef));
fc0e6df6 6839 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6840 goto error_return;
6841
fc0e6df6
PB
6842 elf_tdata (abfd)->cverdefs = freeidx;
6843 }
252b5132 6844
fc0e6df6
PB
6845 /* Create a default version based on the soname. */
6846 if (default_imported_symver)
6847 {
6848 Elf_Internal_Verdef *iverdef;
6849 Elf_Internal_Verdaux *iverdaux;
252b5132 6850
fc0e6df6 6851 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6852
fc0e6df6
PB
6853 iverdef->vd_version = VER_DEF_CURRENT;
6854 iverdef->vd_flags = 0;
6855 iverdef->vd_ndx = freeidx;
6856 iverdef->vd_cnt = 1;
252b5132 6857
fc0e6df6 6858 iverdef->vd_bfd = abfd;
252b5132 6859
fc0e6df6
PB
6860 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6861 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6862 goto error_return_verdef;
fc0e6df6 6863 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6864 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6865 if (iverdef->vd_auxptr == NULL)
6866 goto error_return_verdef;
252b5132 6867
fc0e6df6
PB
6868 iverdaux = iverdef->vd_auxptr;
6869 iverdaux->vda_nodename = iverdef->vd_nodename;
6870 iverdaux->vda_nextptr = NULL;
252b5132
RH
6871 }
6872
b34976b6 6873 return TRUE;
252b5132
RH
6874
6875 error_return:
5ed6aba4 6876 if (contents != NULL)
252b5132 6877 free (contents);
b34976b6 6878 return FALSE;
252b5132
RH
6879}
6880\f
6881asymbol *
217aa764 6882_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6883{
6884 elf_symbol_type *newsym;
dc810e39 6885 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6886
217aa764 6887 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6888 if (!newsym)
6889 return NULL;
6890 else
6891 {
6892 newsym->symbol.the_bfd = abfd;
6893 return &newsym->symbol;
6894 }
6895}
6896
6897void
217aa764
AM
6898_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6899 asymbol *symbol,
6900 symbol_info *ret)
252b5132
RH
6901{
6902 bfd_symbol_info (symbol, ret);
6903}
6904
6905/* Return whether a symbol name implies a local symbol. Most targets
6906 use this function for the is_local_label_name entry point, but some
6907 override it. */
6908
b34976b6 6909bfd_boolean
217aa764
AM
6910_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6911 const char *name)
252b5132
RH
6912{
6913 /* Normal local symbols start with ``.L''. */
6914 if (name[0] == '.' && name[1] == 'L')
b34976b6 6915 return TRUE;
252b5132
RH
6916
6917 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6918 DWARF debugging symbols starting with ``..''. */
6919 if (name[0] == '.' && name[1] == '.')
b34976b6 6920 return TRUE;
252b5132
RH
6921
6922 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6923 emitting DWARF debugging output. I suspect this is actually a
6924 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6925 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6926 underscore to be emitted on some ELF targets). For ease of use,
6927 we treat such symbols as local. */
6928 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6929 return TRUE;
252b5132 6930
b34976b6 6931 return FALSE;
252b5132
RH
6932}
6933
6934alent *
217aa764
AM
6935_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6936 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6937{
6938 abort ();
6939 return NULL;
6940}
6941
b34976b6 6942bfd_boolean
217aa764
AM
6943_bfd_elf_set_arch_mach (bfd *abfd,
6944 enum bfd_architecture arch,
6945 unsigned long machine)
252b5132
RH
6946{
6947 /* If this isn't the right architecture for this backend, and this
6948 isn't the generic backend, fail. */
6949 if (arch != get_elf_backend_data (abfd)->arch
6950 && arch != bfd_arch_unknown
6951 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6952 return FALSE;
252b5132
RH
6953
6954 return bfd_default_set_arch_mach (abfd, arch, machine);
6955}
6956
d1fad7c6
NC
6957/* Find the function to a particular section and offset,
6958 for error reporting. */
252b5132 6959
b34976b6 6960static bfd_boolean
217aa764
AM
6961elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6962 asection *section,
6963 asymbol **symbols,
6964 bfd_vma offset,
6965 const char **filename_ptr,
6966 const char **functionname_ptr)
252b5132 6967{
252b5132 6968 const char *filename;
57426232 6969 asymbol *func, *file;
252b5132
RH
6970 bfd_vma low_func;
6971 asymbol **p;
57426232
JB
6972 /* ??? Given multiple file symbols, it is impossible to reliably
6973 choose the right file name for global symbols. File symbols are
6974 local symbols, and thus all file symbols must sort before any
6975 global symbols. The ELF spec may be interpreted to say that a
6976 file symbol must sort before other local symbols, but currently
6977 ld -r doesn't do this. So, for ld -r output, it is possible to
6978 make a better choice of file name for local symbols by ignoring
6979 file symbols appearing after a given local symbol. */
6980 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6981
252b5132
RH
6982 filename = NULL;
6983 func = NULL;
57426232 6984 file = NULL;
252b5132 6985 low_func = 0;
57426232 6986 state = nothing_seen;
252b5132
RH
6987
6988 for (p = symbols; *p != NULL; p++)
6989 {
6990 elf_symbol_type *q;
6991
6992 q = (elf_symbol_type *) *p;
6993
252b5132
RH
6994 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6995 {
6996 default:
6997 break;
6998 case STT_FILE:
57426232
JB
6999 file = &q->symbol;
7000 if (state == symbol_seen)
7001 state = file_after_symbol_seen;
7002 continue;
252b5132
RH
7003 case STT_NOTYPE:
7004 case STT_FUNC:
6b40fcba 7005 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7006 && q->symbol.value >= low_func
7007 && q->symbol.value <= offset)
7008 {
7009 func = (asymbol *) q;
7010 low_func = q->symbol.value;
a1923858
AM
7011 filename = NULL;
7012 if (file != NULL
7013 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7014 || state != file_after_symbol_seen))
57426232 7015 filename = bfd_asymbol_name (file);
252b5132
RH
7016 }
7017 break;
7018 }
57426232
JB
7019 if (state == nothing_seen)
7020 state = symbol_seen;
252b5132
RH
7021 }
7022
7023 if (func == NULL)
b34976b6 7024 return FALSE;
252b5132 7025
d1fad7c6
NC
7026 if (filename_ptr)
7027 *filename_ptr = filename;
7028 if (functionname_ptr)
7029 *functionname_ptr = bfd_asymbol_name (func);
7030
b34976b6 7031 return TRUE;
d1fad7c6
NC
7032}
7033
7034/* Find the nearest line to a particular section and offset,
7035 for error reporting. */
7036
b34976b6 7037bfd_boolean
217aa764
AM
7038_bfd_elf_find_nearest_line (bfd *abfd,
7039 asection *section,
7040 asymbol **symbols,
7041 bfd_vma offset,
7042 const char **filename_ptr,
7043 const char **functionname_ptr,
7044 unsigned int *line_ptr)
d1fad7c6 7045{
b34976b6 7046 bfd_boolean found;
d1fad7c6
NC
7047
7048 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7049 filename_ptr, functionname_ptr,
7050 line_ptr))
d1fad7c6
NC
7051 {
7052 if (!*functionname_ptr)
4e8a9624
AM
7053 elf_find_function (abfd, section, symbols, offset,
7054 *filename_ptr ? NULL : filename_ptr,
7055 functionname_ptr);
7056
b34976b6 7057 return TRUE;
d1fad7c6
NC
7058 }
7059
7060 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7061 filename_ptr, functionname_ptr,
7062 line_ptr, 0,
7063 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7064 {
7065 if (!*functionname_ptr)
4e8a9624
AM
7066 elf_find_function (abfd, section, symbols, offset,
7067 *filename_ptr ? NULL : filename_ptr,
7068 functionname_ptr);
7069
b34976b6 7070 return TRUE;
d1fad7c6
NC
7071 }
7072
7073 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7074 &found, filename_ptr,
7075 functionname_ptr, line_ptr,
7076 &elf_tdata (abfd)->line_info))
b34976b6 7077 return FALSE;
dc43ada5 7078 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7079 return TRUE;
d1fad7c6
NC
7080
7081 if (symbols == NULL)
b34976b6 7082 return FALSE;
d1fad7c6
NC
7083
7084 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7085 filename_ptr, functionname_ptr))
b34976b6 7086 return FALSE;
d1fad7c6 7087
252b5132 7088 *line_ptr = 0;
b34976b6 7089 return TRUE;
252b5132
RH
7090}
7091
5420f73d
L
7092/* Find the line for a symbol. */
7093
7094bfd_boolean
7095_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7096 const char **filename_ptr, unsigned int *line_ptr)
7097{
7098 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7099 filename_ptr, line_ptr, 0,
7100 &elf_tdata (abfd)->dwarf2_find_line_info);
7101}
7102
4ab527b0
FF
7103/* After a call to bfd_find_nearest_line, successive calls to
7104 bfd_find_inliner_info can be used to get source information about
7105 each level of function inlining that terminated at the address
7106 passed to bfd_find_nearest_line. Currently this is only supported
7107 for DWARF2 with appropriate DWARF3 extensions. */
7108
7109bfd_boolean
7110_bfd_elf_find_inliner_info (bfd *abfd,
7111 const char **filename_ptr,
7112 const char **functionname_ptr,
7113 unsigned int *line_ptr)
7114{
7115 bfd_boolean found;
7116 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7117 functionname_ptr, line_ptr,
7118 & elf_tdata (abfd)->dwarf2_find_line_info);
7119 return found;
7120}
7121
252b5132 7122int
a6b96beb 7123_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7124{
8ded5a0f
AM
7125 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7126 int ret = bed->s->sizeof_ehdr;
252b5132 7127
a6b96beb 7128 if (!info->relocatable)
8ded5a0f 7129 {
62d7a5f6 7130 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7131
62d7a5f6
AM
7132 if (phdr_size == (bfd_size_type) -1)
7133 {
7134 struct elf_segment_map *m;
7135
7136 phdr_size = 0;
7137 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7138 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7139
62d7a5f6
AM
7140 if (phdr_size == 0)
7141 phdr_size = get_program_header_size (abfd, info);
7142 }
8ded5a0f
AM
7143
7144 elf_tdata (abfd)->program_header_size = phdr_size;
7145 ret += phdr_size;
7146 }
7147
252b5132
RH
7148 return ret;
7149}
7150
b34976b6 7151bfd_boolean
217aa764
AM
7152_bfd_elf_set_section_contents (bfd *abfd,
7153 sec_ptr section,
0f867abe 7154 const void *location,
217aa764
AM
7155 file_ptr offset,
7156 bfd_size_type count)
252b5132
RH
7157{
7158 Elf_Internal_Shdr *hdr;
dc810e39 7159 bfd_signed_vma pos;
252b5132
RH
7160
7161 if (! abfd->output_has_begun
217aa764 7162 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7163 return FALSE;
252b5132
RH
7164
7165 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7166 pos = hdr->sh_offset + offset;
7167 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7168 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7169 return FALSE;
252b5132 7170
b34976b6 7171 return TRUE;
252b5132
RH
7172}
7173
7174void
217aa764
AM
7175_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7176 arelent *cache_ptr ATTRIBUTE_UNUSED,
7177 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7178{
7179 abort ();
7180}
7181
252b5132
RH
7182/* Try to convert a non-ELF reloc into an ELF one. */
7183
b34976b6 7184bfd_boolean
217aa764 7185_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7186{
c044fabd 7187 /* Check whether we really have an ELF howto. */
252b5132
RH
7188
7189 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7190 {
7191 bfd_reloc_code_real_type code;
7192 reloc_howto_type *howto;
7193
7194 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7195 equivalent ELF reloc. */
252b5132
RH
7196
7197 if (areloc->howto->pc_relative)
7198 {
7199 switch (areloc->howto->bitsize)
7200 {
7201 case 8:
7202 code = BFD_RELOC_8_PCREL;
7203 break;
7204 case 12:
7205 code = BFD_RELOC_12_PCREL;
7206 break;
7207 case 16:
7208 code = BFD_RELOC_16_PCREL;
7209 break;
7210 case 24:
7211 code = BFD_RELOC_24_PCREL;
7212 break;
7213 case 32:
7214 code = BFD_RELOC_32_PCREL;
7215 break;
7216 case 64:
7217 code = BFD_RELOC_64_PCREL;
7218 break;
7219 default:
7220 goto fail;
7221 }
7222
7223 howto = bfd_reloc_type_lookup (abfd, code);
7224
7225 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7226 {
7227 if (howto->pcrel_offset)
7228 areloc->addend += areloc->address;
7229 else
7230 areloc->addend -= areloc->address; /* addend is unsigned!! */
7231 }
7232 }
7233 else
7234 {
7235 switch (areloc->howto->bitsize)
7236 {
7237 case 8:
7238 code = BFD_RELOC_8;
7239 break;
7240 case 14:
7241 code = BFD_RELOC_14;
7242 break;
7243 case 16:
7244 code = BFD_RELOC_16;
7245 break;
7246 case 26:
7247 code = BFD_RELOC_26;
7248 break;
7249 case 32:
7250 code = BFD_RELOC_32;
7251 break;
7252 case 64:
7253 code = BFD_RELOC_64;
7254 break;
7255 default:
7256 goto fail;
7257 }
7258
7259 howto = bfd_reloc_type_lookup (abfd, code);
7260 }
7261
7262 if (howto)
7263 areloc->howto = howto;
7264 else
7265 goto fail;
7266 }
7267
b34976b6 7268 return TRUE;
252b5132
RH
7269
7270 fail:
7271 (*_bfd_error_handler)
d003868e
AM
7272 (_("%B: unsupported relocation type %s"),
7273 abfd, areloc->howto->name);
252b5132 7274 bfd_set_error (bfd_error_bad_value);
b34976b6 7275 return FALSE;
252b5132
RH
7276}
7277
b34976b6 7278bfd_boolean
217aa764 7279_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7280{
7281 if (bfd_get_format (abfd) == bfd_object)
7282 {
b25e3d87 7283 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7284 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7285 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7286 }
7287
7288 return _bfd_generic_close_and_cleanup (abfd);
7289}
7290
7291/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7292 in the relocation's offset. Thus we cannot allow any sort of sanity
7293 range-checking to interfere. There is nothing else to do in processing
7294 this reloc. */
7295
7296bfd_reloc_status_type
217aa764
AM
7297_bfd_elf_rel_vtable_reloc_fn
7298 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7299 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7300 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7301 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7302{
7303 return bfd_reloc_ok;
7304}
252b5132
RH
7305\f
7306/* Elf core file support. Much of this only works on native
7307 toolchains, since we rely on knowing the
7308 machine-dependent procfs structure in order to pick
c044fabd 7309 out details about the corefile. */
252b5132
RH
7310
7311#ifdef HAVE_SYS_PROCFS_H
7312# include <sys/procfs.h>
7313#endif
7314
c044fabd 7315/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7316
7317static int
217aa764 7318elfcore_make_pid (bfd *abfd)
252b5132
RH
7319{
7320 return ((elf_tdata (abfd)->core_lwpid << 16)
7321 + (elf_tdata (abfd)->core_pid));
7322}
7323
252b5132
RH
7324/* If there isn't a section called NAME, make one, using
7325 data from SECT. Note, this function will generate a
7326 reference to NAME, so you shouldn't deallocate or
c044fabd 7327 overwrite it. */
252b5132 7328
b34976b6 7329static bfd_boolean
217aa764 7330elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7331{
c044fabd 7332 asection *sect2;
252b5132
RH
7333
7334 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7335 return TRUE;
252b5132 7336
117ed4f8 7337 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7338 if (sect2 == NULL)
b34976b6 7339 return FALSE;
252b5132 7340
eea6121a 7341 sect2->size = sect->size;
252b5132 7342 sect2->filepos = sect->filepos;
252b5132 7343 sect2->alignment_power = sect->alignment_power;
b34976b6 7344 return TRUE;
252b5132
RH
7345}
7346
bb0082d6
AM
7347/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7348 actually creates up to two pseudosections:
7349 - For the single-threaded case, a section named NAME, unless
7350 such a section already exists.
7351 - For the multi-threaded case, a section named "NAME/PID", where
7352 PID is elfcore_make_pid (abfd).
7353 Both pseudosections have identical contents. */
b34976b6 7354bfd_boolean
217aa764
AM
7355_bfd_elfcore_make_pseudosection (bfd *abfd,
7356 char *name,
7357 size_t size,
7358 ufile_ptr filepos)
bb0082d6
AM
7359{
7360 char buf[100];
7361 char *threaded_name;
d4c88bbb 7362 size_t len;
bb0082d6
AM
7363 asection *sect;
7364
7365 /* Build the section name. */
7366
7367 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7368 len = strlen (buf) + 1;
217aa764 7369 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7370 if (threaded_name == NULL)
b34976b6 7371 return FALSE;
d4c88bbb 7372 memcpy (threaded_name, buf, len);
bb0082d6 7373
117ed4f8
AM
7374 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7375 SEC_HAS_CONTENTS);
bb0082d6 7376 if (sect == NULL)
b34976b6 7377 return FALSE;
eea6121a 7378 sect->size = size;
bb0082d6 7379 sect->filepos = filepos;
bb0082d6
AM
7380 sect->alignment_power = 2;
7381
936e320b 7382 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7383}
7384
252b5132 7385/* prstatus_t exists on:
4a938328 7386 solaris 2.5+
252b5132
RH
7387 linux 2.[01] + glibc
7388 unixware 4.2
7389*/
7390
7391#if defined (HAVE_PRSTATUS_T)
a7b97311 7392
b34976b6 7393static bfd_boolean
217aa764 7394elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7395{
eea6121a 7396 size_t size;
7ee38065 7397 int offset;
252b5132 7398
4a938328
MS
7399 if (note->descsz == sizeof (prstatus_t))
7400 {
7401 prstatus_t prstat;
252b5132 7402
eea6121a 7403 size = sizeof (prstat.pr_reg);
7ee38065 7404 offset = offsetof (prstatus_t, pr_reg);
4a938328 7405 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7406
fa49d224
NC
7407 /* Do not overwrite the core signal if it
7408 has already been set by another thread. */
7409 if (elf_tdata (abfd)->core_signal == 0)
7410 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7411 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7412
4a938328
MS
7413 /* pr_who exists on:
7414 solaris 2.5+
7415 unixware 4.2
7416 pr_who doesn't exist on:
7417 linux 2.[01]
7418 */
252b5132 7419#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7420 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7421#endif
4a938328 7422 }
7ee38065 7423#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7424 else if (note->descsz == sizeof (prstatus32_t))
7425 {
7426 /* 64-bit host, 32-bit corefile */
7427 prstatus32_t prstat;
7428
eea6121a 7429 size = sizeof (prstat.pr_reg);
7ee38065 7430 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7431 memcpy (&prstat, note->descdata, sizeof (prstat));
7432
fa49d224
NC
7433 /* Do not overwrite the core signal if it
7434 has already been set by another thread. */
7435 if (elf_tdata (abfd)->core_signal == 0)
7436 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7437 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7438
7439 /* pr_who exists on:
7440 solaris 2.5+
7441 unixware 4.2
7442 pr_who doesn't exist on:
7443 linux 2.[01]
7444 */
7ee38065 7445#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7446 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7447#endif
7448 }
7ee38065 7449#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7450 else
7451 {
7452 /* Fail - we don't know how to handle any other
7453 note size (ie. data object type). */
b34976b6 7454 return TRUE;
4a938328 7455 }
252b5132 7456
bb0082d6 7457 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7458 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7459 size, note->descpos + offset);
252b5132
RH
7460}
7461#endif /* defined (HAVE_PRSTATUS_T) */
7462
bb0082d6 7463/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7464static bfd_boolean
217aa764
AM
7465elfcore_make_note_pseudosection (bfd *abfd,
7466 char *name,
7467 Elf_Internal_Note *note)
252b5132 7468{
936e320b
AM
7469 return _bfd_elfcore_make_pseudosection (abfd, name,
7470 note->descsz, note->descpos);
252b5132
RH
7471}
7472
ff08c6bb
JB
7473/* There isn't a consistent prfpregset_t across platforms,
7474 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7475 data structure apart. */
7476
b34976b6 7477static bfd_boolean
217aa764 7478elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7479{
7480 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7481}
7482
ff08c6bb
JB
7483/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7484 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7485 literally. */
c044fabd 7486
b34976b6 7487static bfd_boolean
217aa764 7488elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7489{
7490 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7491}
7492
252b5132 7493#if defined (HAVE_PRPSINFO_T)
4a938328 7494typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7495#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7496typedef prpsinfo32_t elfcore_psinfo32_t;
7497#endif
252b5132
RH
7498#endif
7499
7500#if defined (HAVE_PSINFO_T)
4a938328 7501typedef psinfo_t elfcore_psinfo_t;
7ee38065 7502#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7503typedef psinfo32_t elfcore_psinfo32_t;
7504#endif
252b5132
RH
7505#endif
7506
252b5132
RH
7507/* return a malloc'ed copy of a string at START which is at
7508 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7509 the copy will always have a terminating '\0'. */
252b5132 7510
936e320b 7511char *
217aa764 7512_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7513{
dc810e39 7514 char *dups;
c044fabd 7515 char *end = memchr (start, '\0', max);
dc810e39 7516 size_t len;
252b5132
RH
7517
7518 if (end == NULL)
7519 len = max;
7520 else
7521 len = end - start;
7522
217aa764 7523 dups = bfd_alloc (abfd, len + 1);
dc810e39 7524 if (dups == NULL)
252b5132
RH
7525 return NULL;
7526
dc810e39
AM
7527 memcpy (dups, start, len);
7528 dups[len] = '\0';
252b5132 7529
dc810e39 7530 return dups;
252b5132
RH
7531}
7532
bb0082d6 7533#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7534static bfd_boolean
217aa764 7535elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7536{
4a938328
MS
7537 if (note->descsz == sizeof (elfcore_psinfo_t))
7538 {
7539 elfcore_psinfo_t psinfo;
252b5132 7540
7ee38065 7541 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7542
4a938328 7543 elf_tdata (abfd)->core_program
936e320b
AM
7544 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7545 sizeof (psinfo.pr_fname));
252b5132 7546
4a938328 7547 elf_tdata (abfd)->core_command
936e320b
AM
7548 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7549 sizeof (psinfo.pr_psargs));
4a938328 7550 }
7ee38065 7551#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7552 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7553 {
7554 /* 64-bit host, 32-bit corefile */
7555 elfcore_psinfo32_t psinfo;
7556
7ee38065 7557 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7558
4a938328 7559 elf_tdata (abfd)->core_program
936e320b
AM
7560 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7561 sizeof (psinfo.pr_fname));
4a938328
MS
7562
7563 elf_tdata (abfd)->core_command
936e320b
AM
7564 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7565 sizeof (psinfo.pr_psargs));
4a938328
MS
7566 }
7567#endif
7568
7569 else
7570 {
7571 /* Fail - we don't know how to handle any other
7572 note size (ie. data object type). */
b34976b6 7573 return TRUE;
4a938328 7574 }
252b5132
RH
7575
7576 /* Note that for some reason, a spurious space is tacked
7577 onto the end of the args in some (at least one anyway)
c044fabd 7578 implementations, so strip it off if it exists. */
252b5132
RH
7579
7580 {
c044fabd 7581 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7582 int n = strlen (command);
7583
7584 if (0 < n && command[n - 1] == ' ')
7585 command[n - 1] = '\0';
7586 }
7587
b34976b6 7588 return TRUE;
252b5132
RH
7589}
7590#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7591
252b5132 7592#if defined (HAVE_PSTATUS_T)
b34976b6 7593static bfd_boolean
217aa764 7594elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7595{
f572a39d
AM
7596 if (note->descsz == sizeof (pstatus_t)
7597#if defined (HAVE_PXSTATUS_T)
7598 || note->descsz == sizeof (pxstatus_t)
7599#endif
7600 )
4a938328
MS
7601 {
7602 pstatus_t pstat;
252b5132 7603
4a938328 7604 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7605
4a938328
MS
7606 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7607 }
7ee38065 7608#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7609 else if (note->descsz == sizeof (pstatus32_t))
7610 {
7611 /* 64-bit host, 32-bit corefile */
7612 pstatus32_t pstat;
252b5132 7613
4a938328 7614 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7615
4a938328
MS
7616 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7617 }
7618#endif
252b5132
RH
7619 /* Could grab some more details from the "representative"
7620 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7621 NT_LWPSTATUS note, presumably. */
252b5132 7622
b34976b6 7623 return TRUE;
252b5132
RH
7624}
7625#endif /* defined (HAVE_PSTATUS_T) */
7626
252b5132 7627#if defined (HAVE_LWPSTATUS_T)
b34976b6 7628static bfd_boolean
217aa764 7629elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7630{
7631 lwpstatus_t lwpstat;
7632 char buf[100];
c044fabd 7633 char *name;
d4c88bbb 7634 size_t len;
c044fabd 7635 asection *sect;
252b5132 7636
f572a39d
AM
7637 if (note->descsz != sizeof (lwpstat)
7638#if defined (HAVE_LWPXSTATUS_T)
7639 && note->descsz != sizeof (lwpxstatus_t)
7640#endif
7641 )
b34976b6 7642 return TRUE;
252b5132
RH
7643
7644 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7645
7646 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7647 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7648
c044fabd 7649 /* Make a ".reg/999" section. */
252b5132
RH
7650
7651 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7652 len = strlen (buf) + 1;
217aa764 7653 name = bfd_alloc (abfd, len);
252b5132 7654 if (name == NULL)
b34976b6 7655 return FALSE;
d4c88bbb 7656 memcpy (name, buf, len);
252b5132 7657
117ed4f8 7658 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7659 if (sect == NULL)
b34976b6 7660 return FALSE;
252b5132
RH
7661
7662#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7663 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7664 sect->filepos = note->descpos
7665 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7666#endif
7667
7668#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7669 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7670 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7671#endif
7672
252b5132
RH
7673 sect->alignment_power = 2;
7674
7675 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7676 return FALSE;
252b5132
RH
7677
7678 /* Make a ".reg2/999" section */
7679
7680 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7681 len = strlen (buf) + 1;
217aa764 7682 name = bfd_alloc (abfd, len);
252b5132 7683 if (name == NULL)
b34976b6 7684 return FALSE;
d4c88bbb 7685 memcpy (name, buf, len);
252b5132 7686
117ed4f8 7687 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7688 if (sect == NULL)
b34976b6 7689 return FALSE;
252b5132
RH
7690
7691#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7692 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7693 sect->filepos = note->descpos
7694 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7695#endif
7696
7697#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7698 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7699 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7700#endif
7701
252b5132
RH
7702 sect->alignment_power = 2;
7703
936e320b 7704 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7705}
7706#endif /* defined (HAVE_LWPSTATUS_T) */
7707
16e9c715 7708#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7709static bfd_boolean
217aa764 7710elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7711{
7712 char buf[30];
c044fabd 7713 char *name;
d4c88bbb 7714 size_t len;
c044fabd 7715 asection *sect;
16e9c715
NC
7716 win32_pstatus_t pstatus;
7717
7718 if (note->descsz < sizeof (pstatus))
b34976b6 7719 return TRUE;
16e9c715 7720
e8eab623 7721 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7722
7723 switch (pstatus.data_type)
16e9c715
NC
7724 {
7725 case NOTE_INFO_PROCESS:
7726 /* FIXME: need to add ->core_command. */
7727 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7728 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7729 break;
16e9c715
NC
7730
7731 case NOTE_INFO_THREAD:
7732 /* Make a ".reg/999" section. */
1f170678 7733 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7734
d4c88bbb 7735 len = strlen (buf) + 1;
217aa764 7736 name = bfd_alloc (abfd, len);
16e9c715 7737 if (name == NULL)
b34976b6 7738 return FALSE;
c044fabd 7739
d4c88bbb 7740 memcpy (name, buf, len);
16e9c715 7741
117ed4f8 7742 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 7743 if (sect == NULL)
b34976b6 7744 return FALSE;
c044fabd 7745
eea6121a 7746 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7747 sect->filepos = (note->descpos
7748 + offsetof (struct win32_pstatus,
7749 data.thread_info.thread_context));
16e9c715
NC
7750 sect->alignment_power = 2;
7751
7752 if (pstatus.data.thread_info.is_active_thread)
7753 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7754 return FALSE;
16e9c715
NC
7755 break;
7756
7757 case NOTE_INFO_MODULE:
7758 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7759 sprintf (buf, ".module/%08lx",
7760 (long) pstatus.data.module_info.base_address);
c044fabd 7761
d4c88bbb 7762 len = strlen (buf) + 1;
217aa764 7763 name = bfd_alloc (abfd, len);
16e9c715 7764 if (name == NULL)
b34976b6 7765 return FALSE;
c044fabd 7766
d4c88bbb 7767 memcpy (name, buf, len);
252b5132 7768
117ed4f8 7769 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 7770
16e9c715 7771 if (sect == NULL)
b34976b6 7772 return FALSE;
c044fabd 7773
eea6121a 7774 sect->size = note->descsz;
16e9c715 7775 sect->filepos = note->descpos;
16e9c715
NC
7776 sect->alignment_power = 2;
7777 break;
7778
7779 default:
b34976b6 7780 return TRUE;
16e9c715
NC
7781 }
7782
b34976b6 7783 return TRUE;
16e9c715
NC
7784}
7785#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7786
b34976b6 7787static bfd_boolean
217aa764 7788elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7789{
9c5bfbb7 7790 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7791
252b5132
RH
7792 switch (note->type)
7793 {
7794 default:
b34976b6 7795 return TRUE;
252b5132 7796
252b5132 7797 case NT_PRSTATUS:
bb0082d6
AM
7798 if (bed->elf_backend_grok_prstatus)
7799 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7800 return TRUE;
bb0082d6 7801#if defined (HAVE_PRSTATUS_T)
252b5132 7802 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7803#else
b34976b6 7804 return TRUE;
252b5132
RH
7805#endif
7806
7807#if defined (HAVE_PSTATUS_T)
7808 case NT_PSTATUS:
7809 return elfcore_grok_pstatus (abfd, note);
7810#endif
7811
7812#if defined (HAVE_LWPSTATUS_T)
7813 case NT_LWPSTATUS:
7814 return elfcore_grok_lwpstatus (abfd, note);
7815#endif
7816
7817 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7818 return elfcore_grok_prfpreg (abfd, note);
7819
16e9c715 7820#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7821 case NT_WIN32PSTATUS:
16e9c715
NC
7822 return elfcore_grok_win32pstatus (abfd, note);
7823#endif
7824
c044fabd 7825 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7826 if (note->namesz == 6
7827 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7828 return elfcore_grok_prxfpreg (abfd, note);
7829 else
b34976b6 7830 return TRUE;
ff08c6bb 7831
252b5132
RH
7832 case NT_PRPSINFO:
7833 case NT_PSINFO:
bb0082d6
AM
7834 if (bed->elf_backend_grok_psinfo)
7835 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7836 return TRUE;
bb0082d6 7837#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7838 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7839#else
b34976b6 7840 return TRUE;
252b5132 7841#endif
3333a7c3
RM
7842
7843 case NT_AUXV:
7844 {
117ed4f8
AM
7845 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
7846 SEC_HAS_CONTENTS);
3333a7c3
RM
7847
7848 if (sect == NULL)
7849 return FALSE;
eea6121a 7850 sect->size = note->descsz;
3333a7c3 7851 sect->filepos = note->descpos;
3333a7c3
RM
7852 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7853
7854 return TRUE;
7855 }
252b5132
RH
7856 }
7857}
7858
b34976b6 7859static bfd_boolean
217aa764 7860elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7861{
7862 char *cp;
7863
7864 cp = strchr (note->namedata, '@');
7865 if (cp != NULL)
7866 {
d2b64500 7867 *lwpidp = atoi(cp + 1);
b34976b6 7868 return TRUE;
50b2bdb7 7869 }
b34976b6 7870 return FALSE;
50b2bdb7
AM
7871}
7872
b34976b6 7873static bfd_boolean
217aa764 7874elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7875{
7876
7877 /* Signal number at offset 0x08. */
7878 elf_tdata (abfd)->core_signal
7879 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7880
7881 /* Process ID at offset 0x50. */
7882 elf_tdata (abfd)->core_pid
7883 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7884
7885 /* Command name at 0x7c (max 32 bytes, including nul). */
7886 elf_tdata (abfd)->core_command
7887 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7888
7720ba9f
MK
7889 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7890 note);
50b2bdb7
AM
7891}
7892
b34976b6 7893static bfd_boolean
217aa764 7894elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7895{
7896 int lwp;
7897
7898 if (elfcore_netbsd_get_lwpid (note, &lwp))
7899 elf_tdata (abfd)->core_lwpid = lwp;
7900
b4db1224 7901 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7902 {
7903 /* NetBSD-specific core "procinfo". Note that we expect to
7904 find this note before any of the others, which is fine,
7905 since the kernel writes this note out first when it
7906 creates a core file. */
47d9a591 7907
50b2bdb7
AM
7908 return elfcore_grok_netbsd_procinfo (abfd, note);
7909 }
7910
b4db1224
JT
7911 /* As of Jan 2002 there are no other machine-independent notes
7912 defined for NetBSD core files. If the note type is less
7913 than the start of the machine-dependent note types, we don't
7914 understand it. */
47d9a591 7915
b4db1224 7916 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7917 return TRUE;
50b2bdb7
AM
7918
7919
7920 switch (bfd_get_arch (abfd))
7921 {
7922 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7923 PT_GETFPREGS == mach+2. */
7924
7925 case bfd_arch_alpha:
7926 case bfd_arch_sparc:
7927 switch (note->type)
7928 {
b4db1224 7929 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7930 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7931
b4db1224 7932 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7933 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7934
7935 default:
b34976b6 7936 return TRUE;
50b2bdb7
AM
7937 }
7938
7939 /* On all other arch's, PT_GETREGS == mach+1 and
7940 PT_GETFPREGS == mach+3. */
7941
7942 default:
7943 switch (note->type)
7944 {
b4db1224 7945 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7946 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7947
b4db1224 7948 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7949 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7950
7951 default:
b34976b6 7952 return TRUE;
50b2bdb7
AM
7953 }
7954 }
7955 /* NOTREACHED */
7956}
7957
07c6e936 7958static bfd_boolean
d3fd4074 7959elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
7960{
7961 void *ddata = note->descdata;
7962 char buf[100];
7963 char *name;
7964 asection *sect;
f8843e87
AM
7965 short sig;
7966 unsigned flags;
07c6e936
NC
7967
7968 /* nto_procfs_status 'pid' field is at offset 0. */
7969 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7970
f8843e87
AM
7971 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7972 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7973
7974 /* nto_procfs_status 'flags' field is at offset 8. */
7975 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7976
7977 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7978 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7979 {
7980 elf_tdata (abfd)->core_signal = sig;
7981 elf_tdata (abfd)->core_lwpid = *tid;
7982 }
07c6e936 7983
f8843e87
AM
7984 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7985 do not come from signals so we make sure we set the current
7986 thread just in case. */
7987 if (flags & 0x00000080)
7988 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7989
7990 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 7991 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 7992
217aa764 7993 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7994 if (name == NULL)
7995 return FALSE;
7996 strcpy (name, buf);
7997
117ed4f8 7998 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
7999 if (sect == NULL)
8000 return FALSE;
8001
eea6121a 8002 sect->size = note->descsz;
07c6e936 8003 sect->filepos = note->descpos;
07c6e936
NC
8004 sect->alignment_power = 2;
8005
8006 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8007}
8008
8009static bfd_boolean
d69f560c
KW
8010elfcore_grok_nto_regs (bfd *abfd,
8011 Elf_Internal_Note *note,
d3fd4074 8012 long tid,
d69f560c 8013 char *base)
07c6e936
NC
8014{
8015 char buf[100];
8016 char *name;
8017 asection *sect;
8018
d69f560c 8019 /* Make a "(base)/%d" section. */
d3fd4074 8020 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8021
217aa764 8022 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8023 if (name == NULL)
8024 return FALSE;
8025 strcpy (name, buf);
8026
117ed4f8 8027 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8028 if (sect == NULL)
8029 return FALSE;
8030
eea6121a 8031 sect->size = note->descsz;
07c6e936 8032 sect->filepos = note->descpos;
07c6e936
NC
8033 sect->alignment_power = 2;
8034
f8843e87
AM
8035 /* This is the current thread. */
8036 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8037 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8038
8039 return TRUE;
07c6e936
NC
8040}
8041
8042#define BFD_QNT_CORE_INFO 7
8043#define BFD_QNT_CORE_STATUS 8
8044#define BFD_QNT_CORE_GREG 9
8045#define BFD_QNT_CORE_FPREG 10
8046
8047static bfd_boolean
217aa764 8048elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8049{
8050 /* Every GREG section has a STATUS section before it. Store the
811072d8 8051 tid from the previous call to pass down to the next gregs
07c6e936 8052 function. */
d3fd4074 8053 static long tid = 1;
07c6e936
NC
8054
8055 switch (note->type)
8056 {
d69f560c
KW
8057 case BFD_QNT_CORE_INFO:
8058 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8059 case BFD_QNT_CORE_STATUS:
8060 return elfcore_grok_nto_status (abfd, note, &tid);
8061 case BFD_QNT_CORE_GREG:
8062 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8063 case BFD_QNT_CORE_FPREG:
8064 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8065 default:
8066 return TRUE;
07c6e936
NC
8067 }
8068}
8069
7c76fa91
MS
8070/* Function: elfcore_write_note
8071
47d9a591 8072 Inputs:
7c76fa91
MS
8073 buffer to hold note
8074 name of note
8075 type of note
8076 data for note
8077 size of data for note
8078
8079 Return:
8080 End of buffer containing note. */
8081
8082char *
217aa764
AM
8083elfcore_write_note (bfd *abfd,
8084 char *buf,
8085 int *bufsiz,
8086 const char *name,
8087 int type,
8088 const void *input,
8089 int size)
7c76fa91
MS
8090{
8091 Elf_External_Note *xnp;
d4c88bbb
AM
8092 size_t namesz;
8093 size_t pad;
8094 size_t newspace;
7c76fa91
MS
8095 char *p, *dest;
8096
d4c88bbb
AM
8097 namesz = 0;
8098 pad = 0;
8099 if (name != NULL)
8100 {
9c5bfbb7 8101 const struct elf_backend_data *bed;
d4c88bbb
AM
8102
8103 namesz = strlen (name) + 1;
8104 bed = get_elf_backend_data (abfd);
45d6a902 8105 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
8106 }
8107
5de3bf90 8108 newspace = 12 + namesz + pad + size;
d4c88bbb 8109
7c76fa91
MS
8110 p = realloc (buf, *bufsiz + newspace);
8111 dest = p + *bufsiz;
8112 *bufsiz += newspace;
8113 xnp = (Elf_External_Note *) dest;
8114 H_PUT_32 (abfd, namesz, xnp->namesz);
8115 H_PUT_32 (abfd, size, xnp->descsz);
8116 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8117 dest = xnp->name;
8118 if (name != NULL)
8119 {
8120 memcpy (dest, name, namesz);
8121 dest += namesz;
8122 while (pad != 0)
8123 {
8124 *dest++ = '\0';
8125 --pad;
8126 }
8127 }
8128 memcpy (dest, input, size);
7c76fa91
MS
8129 return p;
8130}
8131
8132#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8133char *
217aa764
AM
8134elfcore_write_prpsinfo (bfd *abfd,
8135 char *buf,
8136 int *bufsiz,
8137 const char *fname,
8138 const char *psargs)
7c76fa91
MS
8139{
8140 int note_type;
8141 char *note_name = "CORE";
8142
8143#if defined (HAVE_PSINFO_T)
8144 psinfo_t data;
8145 note_type = NT_PSINFO;
8146#else
8147 prpsinfo_t data;
8148 note_type = NT_PRPSINFO;
8149#endif
8150
8151 memset (&data, 0, sizeof (data));
8152 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8153 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 8154 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8155 note_name, note_type, &data, sizeof (data));
8156}
8157#endif /* PSINFO_T or PRPSINFO_T */
8158
8159#if defined (HAVE_PRSTATUS_T)
8160char *
217aa764
AM
8161elfcore_write_prstatus (bfd *abfd,
8162 char *buf,
8163 int *bufsiz,
8164 long pid,
8165 int cursig,
8166 const void *gregs)
7c76fa91
MS
8167{
8168 prstatus_t prstat;
8169 char *note_name = "CORE";
8170
8171 memset (&prstat, 0, sizeof (prstat));
8172 prstat.pr_pid = pid;
8173 prstat.pr_cursig = cursig;
c106e334 8174 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 8175 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8176 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
8177}
8178#endif /* HAVE_PRSTATUS_T */
8179
51316059
MS
8180#if defined (HAVE_LWPSTATUS_T)
8181char *
217aa764
AM
8182elfcore_write_lwpstatus (bfd *abfd,
8183 char *buf,
8184 int *bufsiz,
8185 long pid,
8186 int cursig,
8187 const void *gregs)
51316059
MS
8188{
8189 lwpstatus_t lwpstat;
8190 char *note_name = "CORE";
8191
8192 memset (&lwpstat, 0, sizeof (lwpstat));
8193 lwpstat.pr_lwpid = pid >> 16;
8194 lwpstat.pr_cursig = cursig;
8195#if defined (HAVE_LWPSTATUS_T_PR_REG)
8196 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8197#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8198#if !defined(gregs)
8199 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8200 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8201#else
8202 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8203 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8204#endif
8205#endif
47d9a591 8206 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8207 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8208}
8209#endif /* HAVE_LWPSTATUS_T */
8210
7c76fa91
MS
8211#if defined (HAVE_PSTATUS_T)
8212char *
217aa764
AM
8213elfcore_write_pstatus (bfd *abfd,
8214 char *buf,
8215 int *bufsiz,
8216 long pid,
6c10990d
NC
8217 int cursig ATTRIBUTE_UNUSED,
8218 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91
MS
8219{
8220 pstatus_t pstat;
8221 char *note_name = "CORE";
8222
51316059
MS
8223 memset (&pstat, 0, sizeof (pstat));
8224 pstat.pr_pid = pid & 0xffff;
47d9a591 8225 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8226 NT_PSTATUS, &pstat, sizeof (pstat));
8227 return buf;
7c76fa91
MS
8228}
8229#endif /* HAVE_PSTATUS_T */
8230
8231char *
217aa764
AM
8232elfcore_write_prfpreg (bfd *abfd,
8233 char *buf,
8234 int *bufsiz,
8235 const void *fpregs,
8236 int size)
7c76fa91
MS
8237{
8238 char *note_name = "CORE";
47d9a591 8239 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8240 note_name, NT_FPREGSET, fpregs, size);
8241}
8242
8243char *
217aa764
AM
8244elfcore_write_prxfpreg (bfd *abfd,
8245 char *buf,
8246 int *bufsiz,
8247 const void *xfpregs,
8248 int size)
7c76fa91
MS
8249{
8250 char *note_name = "LINUX";
47d9a591 8251 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8252 note_name, NT_PRXFPREG, xfpregs, size);
8253}
8254
b34976b6 8255static bfd_boolean
217aa764 8256elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 8257{
c044fabd
KH
8258 char *buf;
8259 char *p;
252b5132
RH
8260
8261 if (size <= 0)
b34976b6 8262 return TRUE;
252b5132 8263
dc810e39 8264 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 8265 return FALSE;
252b5132 8266
dc810e39 8267 buf = bfd_malloc (size);
252b5132 8268 if (buf == NULL)
b34976b6 8269 return FALSE;
252b5132 8270
dc810e39 8271 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
8272 {
8273 error:
8274 free (buf);
b34976b6 8275 return FALSE;
252b5132
RH
8276 }
8277
8278 p = buf;
8279 while (p < buf + size)
8280 {
c044fabd
KH
8281 /* FIXME: bad alignment assumption. */
8282 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8283 Elf_Internal_Note in;
8284
dc810e39 8285 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8286
dc810e39 8287 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
8288 in.namedata = xnp->name;
8289
dc810e39 8290 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8291 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8292 in.descpos = offset + (in.descdata - buf);
8293
0112cd26 8294 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
50b2bdb7
AM
8295 {
8296 if (! elfcore_grok_netbsd_note (abfd, &in))
8297 goto error;
8298 }
0112cd26 8299 else if (CONST_STRNEQ (in.namedata, "QNX"))
07c6e936
NC
8300 {
8301 if (! elfcore_grok_nto_note (abfd, &in))
8302 goto error;
8303 }
50b2bdb7
AM
8304 else
8305 {
8306 if (! elfcore_grok_note (abfd, &in))
8307 goto error;
8308 }
252b5132
RH
8309
8310 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8311 }
8312
8313 free (buf);
b34976b6 8314 return TRUE;
252b5132 8315}
98d8431c
JB
8316\f
8317/* Providing external access to the ELF program header table. */
8318
8319/* Return an upper bound on the number of bytes required to store a
8320 copy of ABFD's program header table entries. Return -1 if an error
8321 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8322
98d8431c 8323long
217aa764 8324bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8325{
8326 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8327 {
8328 bfd_set_error (bfd_error_wrong_format);
8329 return -1;
8330 }
8331
936e320b 8332 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8333}
8334
98d8431c
JB
8335/* Copy ABFD's program header table entries to *PHDRS. The entries
8336 will be stored as an array of Elf_Internal_Phdr structures, as
8337 defined in include/elf/internal.h. To find out how large the
8338 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
8339
8340 Return the number of program header table entries read, or -1 if an
8341 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 8342
98d8431c 8343int
217aa764 8344bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
8345{
8346 int num_phdrs;
8347
8348 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8349 {
8350 bfd_set_error (bfd_error_wrong_format);
8351 return -1;
8352 }
8353
8354 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8355 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8356 num_phdrs * sizeof (Elf_Internal_Phdr));
8357
8358 return num_phdrs;
8359}
ae4221d7
L
8360
8361void
217aa764 8362_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 8363{
d3b05f8d 8364#ifdef BFD64
ae4221d7
L
8365 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8366
8367 i_ehdrp = elf_elfheader (abfd);
8368 if (i_ehdrp == NULL)
8369 sprintf_vma (buf, value);
8370 else
8371 {
8372 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8373 {
ae4221d7 8374#if BFD_HOST_64BIT_LONG
cc55aec9 8375 sprintf (buf, "%016lx", value);
ae4221d7 8376#else
cc55aec9
AM
8377 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
8378 _bfd_int64_low (value));
ae4221d7 8379#endif
cc55aec9 8380 }
ae4221d7
L
8381 else
8382 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
8383 }
d3b05f8d
L
8384#else
8385 sprintf_vma (buf, value);
8386#endif
ae4221d7
L
8387}
8388
8389void
217aa764 8390_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 8391{
d3b05f8d 8392#ifdef BFD64
ae4221d7
L
8393 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8394
8395 i_ehdrp = elf_elfheader (abfd);
8396 if (i_ehdrp == NULL)
8397 fprintf_vma ((FILE *) stream, value);
8398 else
8399 {
8400 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8401 {
ae4221d7 8402#if BFD_HOST_64BIT_LONG
cc55aec9 8403 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 8404#else
cc55aec9
AM
8405 fprintf ((FILE *) stream, "%08lx%08lx",
8406 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 8407#endif
cc55aec9 8408 }
ae4221d7
L
8409 else
8410 fprintf ((FILE *) stream, "%08lx",
8411 (unsigned long) (value & 0xffffffff));
8412 }
d3b05f8d
L
8413#else
8414 fprintf_vma ((FILE *) stream, value);
8415#endif
ae4221d7 8416}
db6751f2
JJ
8417
8418enum elf_reloc_type_class
217aa764 8419_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8420{
8421 return reloc_class_normal;
8422}
f8df10f4 8423
47d9a591 8424/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8425 relocation against a local symbol. */
8426
8427bfd_vma
217aa764
AM
8428_bfd_elf_rela_local_sym (bfd *abfd,
8429 Elf_Internal_Sym *sym,
8517fae7 8430 asection **psec,
217aa764 8431 Elf_Internal_Rela *rel)
f8df10f4 8432{
8517fae7 8433 asection *sec = *psec;
f8df10f4
JJ
8434 bfd_vma relocation;
8435
8436 relocation = (sec->output_section->vma
8437 + sec->output_offset
8438 + sym->st_value);
8439 if ((sec->flags & SEC_MERGE)
c629eae0 8440 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8441 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8442 {
f8df10f4 8443 rel->r_addend =
8517fae7 8444 _bfd_merged_section_offset (abfd, psec,
65765700 8445 elf_section_data (sec)->sec_info,
753731ee
AM
8446 sym->st_value + rel->r_addend);
8447 if (sec != *psec)
8448 {
8449 /* If we have changed the section, and our original section is
8450 marked with SEC_EXCLUDE, it means that the original
8451 SEC_MERGE section has been completely subsumed in some
8452 other SEC_MERGE section. In this case, we need to leave
8453 some info around for --emit-relocs. */
8454 if ((sec->flags & SEC_EXCLUDE) != 0)
8455 sec->kept_section = *psec;
8456 sec = *psec;
8457 }
8517fae7
AM
8458 rel->r_addend -= relocation;
8459 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8460 }
8461 return relocation;
8462}
c629eae0
JJ
8463
8464bfd_vma
217aa764
AM
8465_bfd_elf_rel_local_sym (bfd *abfd,
8466 Elf_Internal_Sym *sym,
8467 asection **psec,
8468 bfd_vma addend)
47d9a591 8469{
c629eae0
JJ
8470 asection *sec = *psec;
8471
68bfbfcc 8472 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8473 return sym->st_value + addend;
8474
8475 return _bfd_merged_section_offset (abfd, psec,
65765700 8476 elf_section_data (sec)->sec_info,
753731ee 8477 sym->st_value + addend);
c629eae0
JJ
8478}
8479
8480bfd_vma
217aa764 8481_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8482 struct bfd_link_info *info,
217aa764
AM
8483 asection *sec,
8484 bfd_vma offset)
c629eae0 8485{
68bfbfcc 8486 switch (sec->sec_info_type)
65765700
JJ
8487 {
8488 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8489 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8490 offset);
65765700 8491 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8492 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8493 default:
8494 return offset;
8495 }
c629eae0 8496}
3333a7c3
RM
8497\f
8498/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8499 reconstruct an ELF file by reading the segments out of remote memory
8500 based on the ELF file header at EHDR_VMA and the ELF program headers it
8501 points to. If not null, *LOADBASEP is filled in with the difference
8502 between the VMAs from which the segments were read, and the VMAs the
8503 file headers (and hence BFD's idea of each section's VMA) put them at.
8504
8505 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8506 remote memory at target address VMA into the local buffer at MYADDR; it
8507 should return zero on success or an `errno' code on failure. TEMPL must
8508 be a BFD for an ELF target with the word size and byte order found in
8509 the remote memory. */
8510
8511bfd *
217aa764
AM
8512bfd_elf_bfd_from_remote_memory
8513 (bfd *templ,
8514 bfd_vma ehdr_vma,
8515 bfd_vma *loadbasep,
f075ee0c 8516 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8517{
8518 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8519 (templ, ehdr_vma, loadbasep, target_read_memory);
8520}
4c45e5c9
JJ
8521\f
8522long
c9727e01
AM
8523_bfd_elf_get_synthetic_symtab (bfd *abfd,
8524 long symcount ATTRIBUTE_UNUSED,
8525 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8526 long dynsymcount,
c9727e01
AM
8527 asymbol **dynsyms,
8528 asymbol **ret)
4c45e5c9
JJ
8529{
8530 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8531 asection *relplt;
8532 asymbol *s;
8533 const char *relplt_name;
8534 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8535 arelent *p;
8536 long count, i, n;
8537 size_t size;
8538 Elf_Internal_Shdr *hdr;
8539 char *names;
8540 asection *plt;
8541
8615f3f2
AM
8542 *ret = NULL;
8543
90e3cdf2
JJ
8544 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8545 return 0;
8546
8615f3f2
AM
8547 if (dynsymcount <= 0)
8548 return 0;
8549
4c45e5c9
JJ
8550 if (!bed->plt_sym_val)
8551 return 0;
8552
8553 relplt_name = bed->relplt_name;
8554 if (relplt_name == NULL)
8555 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8556 relplt = bfd_get_section_by_name (abfd, relplt_name);
8557 if (relplt == NULL)
8558 return 0;
8559
8560 hdr = &elf_section_data (relplt)->this_hdr;
8561 if (hdr->sh_link != elf_dynsymtab (abfd)
8562 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8563 return 0;
8564
8565 plt = bfd_get_section_by_name (abfd, ".plt");
8566 if (plt == NULL)
8567 return 0;
8568
8569 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8570 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8571 return -1;
8572
eea6121a 8573 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8574 size = count * sizeof (asymbol);
8575 p = relplt->relocation;
8576 for (i = 0; i < count; i++, s++, p++)
8577 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8578
8579 s = *ret = bfd_malloc (size);
8580 if (s == NULL)
8581 return -1;
8582
8583 names = (char *) (s + count);
8584 p = relplt->relocation;
8585 n = 0;
8586 for (i = 0; i < count; i++, s++, p++)
8587 {
8588 size_t len;
8589 bfd_vma addr;
8590
8591 addr = bed->plt_sym_val (i, plt, p);
8592 if (addr == (bfd_vma) -1)
8593 continue;
8594
8595 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8596 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8597 we are defining a symbol, ensure one of them is set. */
8598 if ((s->flags & BSF_LOCAL) == 0)
8599 s->flags |= BSF_GLOBAL;
4c45e5c9
JJ
8600 s->section = plt;
8601 s->value = addr - plt->vma;
8602 s->name = names;
8603 len = strlen ((*p->sym_ptr_ptr)->name);
8604 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8605 names += len;
8606 memcpy (names, "@plt", sizeof ("@plt"));
8607 names += sizeof ("@plt");
8608 ++n;
8609 }
8610
8611 return n;
8612}
3d7f7666
L
8613
8614/* Sort symbol by binding and section. We want to put definitions
8615 sorted by section at the beginning. */
8616
8617static int
8618elf_sort_elf_symbol (const void *arg1, const void *arg2)
8619{
8620 const Elf_Internal_Sym *s1;
8621 const Elf_Internal_Sym *s2;
8622 int shndx;
8623
8624 /* Make sure that undefined symbols are at the end. */
8625 s1 = (const Elf_Internal_Sym *) arg1;
8626 if (s1->st_shndx == SHN_UNDEF)
8627 return 1;
8628 s2 = (const Elf_Internal_Sym *) arg2;
8629 if (s2->st_shndx == SHN_UNDEF)
8630 return -1;
8631
8632 /* Sorted by section index. */
8633 shndx = s1->st_shndx - s2->st_shndx;
8634 if (shndx != 0)
8635 return shndx;
8636
8637 /* Sorted by binding. */
8638 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8639}
8640
8641struct elf_symbol
8642{
8643 Elf_Internal_Sym *sym;
8644 const char *name;
8645};
8646
8647static int
8648elf_sym_name_compare (const void *arg1, const void *arg2)
8649{
8650 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8651 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8652 return strcmp (s1->name, s2->name);
8653}
8654
8655/* Check if 2 sections define the same set of local and global
8656 symbols. */
8657
8658bfd_boolean
8659bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8660{
8661 bfd *bfd1, *bfd2;
8662 const struct elf_backend_data *bed1, *bed2;
8663 Elf_Internal_Shdr *hdr1, *hdr2;
8664 bfd_size_type symcount1, symcount2;
8665 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8666 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8667 Elf_Internal_Sym *isymend;
8668 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8669 bfd_size_type count1, count2, i;
8670 int shndx1, shndx2;
8671 bfd_boolean result;
8672
8673 bfd1 = sec1->owner;
8674 bfd2 = sec2->owner;
8675
8676 /* If both are .gnu.linkonce sections, they have to have the same
8677 section name. */
0112cd26
NC
8678 if (CONST_STRNEQ (sec1->name, ".gnu.linkonce")
8679 && CONST_STRNEQ (sec2->name, ".gnu.linkonce"))
3d7f7666
L
8680 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8681 sec2->name + sizeof ".gnu.linkonce") == 0;
8682
8683 /* Both sections have to be in ELF. */
8684 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8685 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8686 return FALSE;
8687
8688 if (elf_section_type (sec1) != elf_section_type (sec2))
8689 return FALSE;
8690
8691 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8692 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8693 {
8694 /* If both are members of section groups, they have to have the
8695 same group name. */
8696 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8697 return FALSE;
8698 }
8699
8700 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8701 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8702 if (shndx1 == -1 || shndx2 == -1)
8703 return FALSE;
8704
8705 bed1 = get_elf_backend_data (bfd1);
8706 bed2 = get_elf_backend_data (bfd2);
8707 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8708 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8709 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8710 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8711
8712 if (symcount1 == 0 || symcount2 == 0)
8713 return FALSE;
8714
8715 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8716 NULL, NULL, NULL);
8717 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8718 NULL, NULL, NULL);
8719
8720 result = FALSE;
8721 if (isymbuf1 == NULL || isymbuf2 == NULL)
8722 goto done;
8723
8724 /* Sort symbols by binding and section. Global definitions are at
8725 the beginning. */
8726 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8727 elf_sort_elf_symbol);
8728 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8729 elf_sort_elf_symbol);
8730
8731 /* Count definitions in the section. */
8732 count1 = 0;
8733 for (isym = isymbuf1, isymend = isym + symcount1;
8734 isym < isymend; isym++)
8735 {
8736 if (isym->st_shndx == (unsigned int) shndx1)
8737 {
8738 if (count1 == 0)
8739 isymstart1 = isym;
8740 count1++;
8741 }
8742
8743 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8744 break;
8745 }
8746
8747 count2 = 0;
8748 for (isym = isymbuf2, isymend = isym + symcount2;
8749 isym < isymend; isym++)
8750 {
8751 if (isym->st_shndx == (unsigned int) shndx2)
8752 {
8753 if (count2 == 0)
8754 isymstart2 = isym;
8755 count2++;
8756 }
8757
8758 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8759 break;
8760 }
8761
8762 if (count1 == 0 || count2 == 0 || count1 != count2)
8763 goto done;
8764
8765 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8766 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8767
8768 if (symtable1 == NULL || symtable2 == NULL)
8769 goto done;
8770
8771 symp = symtable1;
8772 for (isym = isymstart1, isymend = isym + count1;
8773 isym < isymend; isym++)
8774 {
8775 symp->sym = isym;
8776 symp->name = bfd_elf_string_from_elf_section (bfd1,
8777 hdr1->sh_link,
8778 isym->st_name);
8779 symp++;
8780 }
8781
8782 symp = symtable2;
8783 for (isym = isymstart2, isymend = isym + count1;
8784 isym < isymend; isym++)
8785 {
8786 symp->sym = isym;
8787 symp->name = bfd_elf_string_from_elf_section (bfd2,
8788 hdr2->sh_link,
8789 isym->st_name);
8790 symp++;
8791 }
8792
8793 /* Sort symbol by name. */
8794 qsort (symtable1, count1, sizeof (struct elf_symbol),
8795 elf_sym_name_compare);
8796 qsort (symtable2, count1, sizeof (struct elf_symbol),
8797 elf_sym_name_compare);
8798
8799 for (i = 0; i < count1; i++)
8800 /* Two symbols must have the same binding, type and name. */
8801 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8802 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8803 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8804 goto done;
8805
8806 result = TRUE;
8807
8808done:
8809 if (symtable1)
8810 free (symtable1);
8811 if (symtable2)
8812 free (symtable2);
8813 if (isymbuf1)
8814 free (isymbuf1);
8815 if (isymbuf2)
8816 free (isymbuf2);
8817
8818 return result;
8819}
3b22753a
L
8820
8821/* It is only used by x86-64 so far. */
8822asection _bfd_elf_large_com_section
8823 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 8824 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871
L
8825
8826/* Return TRUE if 2 section types are compatible. */
8827
8828bfd_boolean
8829_bfd_elf_match_sections_by_type (bfd *abfd, const asection *asec,
8830 bfd *bbfd, const asection *bsec)
8831{
8832 if (asec == NULL
8833 || bsec == NULL
8834 || abfd->xvec->flavour != bfd_target_elf_flavour
8835 || bbfd->xvec->flavour != bfd_target_elf_flavour)
8836 return TRUE;
8837
8838 return elf_section_type (asec) == elf_section_type (bsec);
8839}