]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
* MAINTAINERS: Update my email address.
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
fad2f28d 4 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
1b74d094
BW
22/*
23SECTION
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
b34976b6 209bfd_boolean
217aa764 210bfd_elf_mkobject (bfd *abfd)
252b5132 211{
c044fabd
KH
212 /* This just does initialization. */
213 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 214 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 215 if (elf_tdata (abfd) == 0)
b34976b6 216 return FALSE;
c044fabd
KH
217 /* Since everything is done at close time, do we need any
218 initialization? */
252b5132 219
b34976b6 220 return TRUE;
252b5132
RH
221}
222
b34976b6 223bfd_boolean
217aa764 224bfd_elf_mkcorefile (bfd *abfd)
252b5132 225{
c044fabd 226 /* I think this can be done just like an object file. */
252b5132
RH
227 return bfd_elf_mkobject (abfd);
228}
229
230char *
217aa764 231bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
232{
233 Elf_Internal_Shdr **i_shdrp;
f075ee0c 234 bfd_byte *shstrtab = NULL;
dc810e39
AM
235 file_ptr offset;
236 bfd_size_type shstrtabsize;
252b5132
RH
237
238 i_shdrp = elf_elfsections (abfd);
239 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 240 return NULL;
252b5132 241
f075ee0c 242 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
243 if (shstrtab == NULL)
244 {
c044fabd 245 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
246 offset = i_shdrp[shindex]->sh_offset;
247 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
248
249 /* Allocate and clear an extra byte at the end, to prevent crashes
250 in case the string table is not terminated. */
251 if (shstrtabsize + 1 == 0
252 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
253 || bfd_seek (abfd, offset, SEEK_SET) != 0)
254 shstrtab = NULL;
255 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
256 {
257 if (bfd_get_error () != bfd_error_system_call)
258 bfd_set_error (bfd_error_file_truncated);
259 shstrtab = NULL;
260 }
261 else
262 shstrtab[shstrtabsize] = '\0';
217aa764 263 i_shdrp[shindex]->contents = shstrtab;
252b5132 264 }
f075ee0c 265 return (char *) shstrtab;
252b5132
RH
266}
267
268char *
217aa764
AM
269bfd_elf_string_from_elf_section (bfd *abfd,
270 unsigned int shindex,
271 unsigned int strindex)
252b5132
RH
272{
273 Elf_Internal_Shdr *hdr;
274
275 if (strindex == 0)
276 return "";
277
278 hdr = elf_elfsections (abfd)[shindex];
279
280 if (hdr->contents == NULL
281 && bfd_elf_get_str_section (abfd, shindex) == NULL)
282 return NULL;
283
284 if (strindex >= hdr->sh_size)
285 {
1b3a8575 286 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 287 (*_bfd_error_handler)
d003868e
AM
288 (_("%B: invalid string offset %u >= %lu for section `%s'"),
289 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 290 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 291 ? ".shstrtab"
1b3a8575 292 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
293 return "";
294 }
295
296 return ((char *) hdr->contents) + strindex;
297}
298
6cdc0ccc
AM
299/* Read and convert symbols to internal format.
300 SYMCOUNT specifies the number of symbols to read, starting from
301 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
302 are non-NULL, they are used to store the internal symbols, external
303 symbols, and symbol section index extensions, respectively. */
304
305Elf_Internal_Sym *
217aa764
AM
306bfd_elf_get_elf_syms (bfd *ibfd,
307 Elf_Internal_Shdr *symtab_hdr,
308 size_t symcount,
309 size_t symoffset,
310 Elf_Internal_Sym *intsym_buf,
311 void *extsym_buf,
312 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
313{
314 Elf_Internal_Shdr *shndx_hdr;
217aa764 315 void *alloc_ext;
df622259 316 const bfd_byte *esym;
6cdc0ccc
AM
317 Elf_External_Sym_Shndx *alloc_extshndx;
318 Elf_External_Sym_Shndx *shndx;
319 Elf_Internal_Sym *isym;
320 Elf_Internal_Sym *isymend;
9c5bfbb7 321 const struct elf_backend_data *bed;
6cdc0ccc
AM
322 size_t extsym_size;
323 bfd_size_type amt;
324 file_ptr pos;
325
326 if (symcount == 0)
327 return intsym_buf;
328
329 /* Normal syms might have section extension entries. */
330 shndx_hdr = NULL;
331 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
332 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
333
334 /* Read the symbols. */
335 alloc_ext = NULL;
336 alloc_extshndx = NULL;
337 bed = get_elf_backend_data (ibfd);
338 extsym_size = bed->s->sizeof_sym;
339 amt = symcount * extsym_size;
340 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
341 if (extsym_buf == NULL)
342 {
d0fb9a8d 343 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
344 extsym_buf = alloc_ext;
345 }
346 if (extsym_buf == NULL
347 || bfd_seek (ibfd, pos, SEEK_SET) != 0
348 || bfd_bread (extsym_buf, amt, ibfd) != amt)
349 {
350 intsym_buf = NULL;
351 goto out;
352 }
353
354 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
355 extshndx_buf = NULL;
356 else
357 {
358 amt = symcount * sizeof (Elf_External_Sym_Shndx);
359 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
360 if (extshndx_buf == NULL)
361 {
d0fb9a8d
JJ
362 alloc_extshndx = bfd_malloc2 (symcount,
363 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
364 extshndx_buf = alloc_extshndx;
365 }
366 if (extshndx_buf == NULL
367 || bfd_seek (ibfd, pos, SEEK_SET) != 0
368 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
369 {
370 intsym_buf = NULL;
371 goto out;
372 }
373 }
374
375 if (intsym_buf == NULL)
376 {
d0fb9a8d 377 intsym_buf = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
6cdc0ccc
AM
378 if (intsym_buf == NULL)
379 goto out;
380 }
381
382 /* Convert the symbols to internal form. */
383 isymend = intsym_buf + symcount;
384 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
385 isym < isymend;
386 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 387 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
388
389 out:
390 if (alloc_ext != NULL)
391 free (alloc_ext);
392 if (alloc_extshndx != NULL)
393 free (alloc_extshndx);
394
395 return intsym_buf;
396}
397
5cab59f6
AM
398/* Look up a symbol name. */
399const char *
be8dd2ca
AM
400bfd_elf_sym_name (bfd *abfd,
401 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
402 Elf_Internal_Sym *isym,
403 asection *sym_sec)
5cab59f6 404{
26c61ae5 405 const char *name;
5cab59f6 406 unsigned int iname = isym->st_name;
be8dd2ca 407 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 408
138f35cc
JJ
409 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
410 /* Check for a bogus st_shndx to avoid crashing. */
411 && isym->st_shndx < elf_numsections (abfd)
412 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
413 {
414 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
415 shindex = elf_elfheader (abfd)->e_shstrndx;
416 }
417
26c61ae5
L
418 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
419 if (name == NULL)
420 name = "(null)";
421 else if (sym_sec && *name == '\0')
422 name = bfd_section_name (abfd, sym_sec);
423
424 return name;
5cab59f6
AM
425}
426
dbb410c3
AM
427/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
428 sections. The first element is the flags, the rest are section
429 pointers. */
430
431typedef union elf_internal_group {
432 Elf_Internal_Shdr *shdr;
433 unsigned int flags;
434} Elf_Internal_Group;
435
b885599b
AM
436/* Return the name of the group signature symbol. Why isn't the
437 signature just a string? */
438
439static const char *
217aa764 440group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 441{
9dce4196 442 Elf_Internal_Shdr *hdr;
9dce4196
AM
443 unsigned char esym[sizeof (Elf64_External_Sym)];
444 Elf_External_Sym_Shndx eshndx;
445 Elf_Internal_Sym isym;
b885599b 446
13792e9d
L
447 /* First we need to ensure the symbol table is available. Make sure
448 that it is a symbol table section. */
449 hdr = elf_elfsections (abfd) [ghdr->sh_link];
450 if (hdr->sh_type != SHT_SYMTAB
451 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
452 return NULL;
453
9dce4196
AM
454 /* Go read the symbol. */
455 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
456 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
457 &isym, esym, &eshndx) == NULL)
b885599b 458 return NULL;
9dce4196 459
26c61ae5 460 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
461}
462
dbb410c3
AM
463/* Set next_in_group list pointer, and group name for NEWSECT. */
464
b34976b6 465static bfd_boolean
217aa764 466setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
467{
468 unsigned int num_group = elf_tdata (abfd)->num_group;
469
470 /* If num_group is zero, read in all SHT_GROUP sections. The count
471 is set to -1 if there are no SHT_GROUP sections. */
472 if (num_group == 0)
473 {
474 unsigned int i, shnum;
475
476 /* First count the number of groups. If we have a SHT_GROUP
477 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 478 shnum = elf_numsections (abfd);
dbb410c3
AM
479 num_group = 0;
480 for (i = 0; i < shnum; i++)
481 {
482 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
483 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
484 num_group += 1;
485 }
486
487 if (num_group == 0)
20dbb49d
L
488 {
489 num_group = (unsigned) -1;
490 elf_tdata (abfd)->num_group = num_group;
491 }
492 else
dbb410c3
AM
493 {
494 /* We keep a list of elf section headers for group sections,
495 so we can find them quickly. */
20dbb49d 496 bfd_size_type amt;
d0fb9a8d 497
20dbb49d 498 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
499 elf_tdata (abfd)->group_sect_ptr
500 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 501 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 502 return FALSE;
dbb410c3
AM
503
504 num_group = 0;
505 for (i = 0; i < shnum; i++)
506 {
507 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
508 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
509 {
973ffd63 510 unsigned char *src;
dbb410c3
AM
511 Elf_Internal_Group *dest;
512
513 /* Add to list of sections. */
514 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
515 num_group += 1;
516
517 /* Read the raw contents. */
518 BFD_ASSERT (sizeof (*dest) >= 4);
519 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
520 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
521 sizeof (*dest) / 4);
dbb410c3
AM
522 if (shdr->contents == NULL
523 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
524 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
525 != shdr->sh_size))
b34976b6 526 return FALSE;
dbb410c3
AM
527
528 /* Translate raw contents, a flag word followed by an
529 array of elf section indices all in target byte order,
530 to the flag word followed by an array of elf section
531 pointers. */
532 src = shdr->contents + shdr->sh_size;
533 dest = (Elf_Internal_Group *) (shdr->contents + amt);
534 while (1)
535 {
536 unsigned int idx;
537
538 src -= 4;
539 --dest;
540 idx = H_GET_32 (abfd, src);
541 if (src == shdr->contents)
542 {
543 dest->flags = idx;
b885599b
AM
544 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
545 shdr->bfd_section->flags
546 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
547 break;
548 }
549 if (idx >= shnum)
550 {
551 ((*_bfd_error_handler)
d003868e 552 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
553 idx = 0;
554 }
555 dest->shdr = elf_elfsections (abfd)[idx];
556 }
557 }
558 }
559 }
560 }
561
562 if (num_group != (unsigned) -1)
563 {
564 unsigned int i;
565
566 for (i = 0; i < num_group; i++)
567 {
568 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
569 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
570 unsigned int n_elt = shdr->sh_size / 4;
571
572 /* Look through this group's sections to see if current
573 section is a member. */
574 while (--n_elt != 0)
575 if ((++idx)->shdr == hdr)
576 {
e0e8c97f 577 asection *s = NULL;
dbb410c3
AM
578
579 /* We are a member of this group. Go looking through
580 other members to see if any others are linked via
581 next_in_group. */
582 idx = (Elf_Internal_Group *) shdr->contents;
583 n_elt = shdr->sh_size / 4;
584 while (--n_elt != 0)
585 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 586 && elf_next_in_group (s) != NULL)
dbb410c3
AM
587 break;
588 if (n_elt != 0)
589 {
dbb410c3
AM
590 /* Snarf the group name from other member, and
591 insert current section in circular list. */
945906ff
AM
592 elf_group_name (newsect) = elf_group_name (s);
593 elf_next_in_group (newsect) = elf_next_in_group (s);
594 elf_next_in_group (s) = newsect;
dbb410c3
AM
595 }
596 else
597 {
dbb410c3
AM
598 const char *gname;
599
b885599b
AM
600 gname = group_signature (abfd, shdr);
601 if (gname == NULL)
b34976b6 602 return FALSE;
945906ff 603 elf_group_name (newsect) = gname;
dbb410c3
AM
604
605 /* Start a circular list with one element. */
945906ff 606 elf_next_in_group (newsect) = newsect;
dbb410c3 607 }
b885599b 608
9dce4196
AM
609 /* If the group section has been created, point to the
610 new member. */
dbb410c3 611 if (shdr->bfd_section != NULL)
945906ff 612 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 613
dbb410c3
AM
614 i = num_group - 1;
615 break;
616 }
617 }
618 }
619
945906ff 620 if (elf_group_name (newsect) == NULL)
dbb410c3 621 {
d003868e
AM
622 (*_bfd_error_handler) (_("%B: no group info for section %A"),
623 abfd, newsect);
dbb410c3 624 }
b34976b6 625 return TRUE;
dbb410c3
AM
626}
627
3d7f7666 628bfd_boolean
dd863624 629_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
630{
631 unsigned int i;
632 unsigned int num_group = elf_tdata (abfd)->num_group;
633 bfd_boolean result = TRUE;
dd863624
L
634 asection *s;
635
636 /* Process SHF_LINK_ORDER. */
637 for (s = abfd->sections; s != NULL; s = s->next)
638 {
639 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
640 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
641 {
642 unsigned int elfsec = this_hdr->sh_link;
643 /* FIXME: The old Intel compiler and old strip/objcopy may
644 not set the sh_link or sh_info fields. Hence we could
645 get the situation where elfsec is 0. */
646 if (elfsec == 0)
647 {
648 const struct elf_backend_data *bed
649 = get_elf_backend_data (abfd);
650 if (bed->link_order_error_handler)
651 bed->link_order_error_handler
652 (_("%B: warning: sh_link not set for section `%A'"),
653 abfd, s);
654 }
655 else
656 {
25bbc984
L
657 asection *link;
658
dd863624 659 this_hdr = elf_elfsections (abfd)[elfsec];
25bbc984
L
660
661 /* PR 1991, 2008:
662 Some strip/objcopy may leave an incorrect value in
663 sh_link. We don't want to proceed. */
664 link = this_hdr->bfd_section;
665 if (link == NULL)
666 {
667 (*_bfd_error_handler)
668 (_("%B: sh_link [%d] in section `%A' is incorrect"),
669 s->owner, s, elfsec);
670 result = FALSE;
671 }
672
673 elf_linked_to_section (s) = link;
dd863624
L
674 }
675 }
676 }
3d7f7666 677
dd863624 678 /* Process section groups. */
3d7f7666
L
679 if (num_group == (unsigned) -1)
680 return result;
681
682 for (i = 0; i < num_group; i++)
683 {
684 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
685 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
686 unsigned int n_elt = shdr->sh_size / 4;
687
688 while (--n_elt != 0)
689 if ((++idx)->shdr->bfd_section)
690 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
691 else if (idx->shdr->sh_type == SHT_RELA
692 || idx->shdr->sh_type == SHT_REL)
693 /* We won't include relocation sections in section groups in
694 output object files. We adjust the group section size here
695 so that relocatable link will work correctly when
696 relocation sections are in section group in input object
697 files. */
698 shdr->bfd_section->size -= 4;
699 else
700 {
701 /* There are some unknown sections in the group. */
702 (*_bfd_error_handler)
d003868e
AM
703 (_("%B: unknown [%d] section `%s' in group [%s]"),
704 abfd,
3d7f7666 705 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
706 bfd_elf_string_from_elf_section (abfd,
707 (elf_elfheader (abfd)
708 ->e_shstrndx),
709 idx->shdr->sh_name),
3d7f7666
L
710 shdr->bfd_section->name);
711 result = FALSE;
712 }
713 }
714 return result;
715}
716
72adc230
AM
717bfd_boolean
718bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
719{
720 return elf_next_in_group (sec) != NULL;
721}
722
252b5132
RH
723/* Make a BFD section from an ELF section. We store a pointer to the
724 BFD section in the bfd_section field of the header. */
725
b34976b6 726bfd_boolean
217aa764
AM
727_bfd_elf_make_section_from_shdr (bfd *abfd,
728 Elf_Internal_Shdr *hdr,
6dc132d9
L
729 const char *name,
730 int shindex)
252b5132
RH
731{
732 asection *newsect;
733 flagword flags;
9c5bfbb7 734 const struct elf_backend_data *bed;
252b5132
RH
735
736 if (hdr->bfd_section != NULL)
737 {
738 BFD_ASSERT (strcmp (name,
739 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 740 return TRUE;
252b5132
RH
741 }
742
743 newsect = bfd_make_section_anyway (abfd, name);
744 if (newsect == NULL)
b34976b6 745 return FALSE;
252b5132 746
1829f4b2
AM
747 hdr->bfd_section = newsect;
748 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 749 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 750
2f89ff8d
L
751 /* Always use the real type/flags. */
752 elf_section_type (newsect) = hdr->sh_type;
753 elf_section_flags (newsect) = hdr->sh_flags;
754
252b5132
RH
755 newsect->filepos = hdr->sh_offset;
756
757 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
758 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
759 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 760 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 761 return FALSE;
252b5132
RH
762
763 flags = SEC_NO_FLAGS;
764 if (hdr->sh_type != SHT_NOBITS)
765 flags |= SEC_HAS_CONTENTS;
dbb410c3 766 if (hdr->sh_type == SHT_GROUP)
b3096250 767 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
768 if ((hdr->sh_flags & SHF_ALLOC) != 0)
769 {
770 flags |= SEC_ALLOC;
771 if (hdr->sh_type != SHT_NOBITS)
772 flags |= SEC_LOAD;
773 }
774 if ((hdr->sh_flags & SHF_WRITE) == 0)
775 flags |= SEC_READONLY;
776 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
777 flags |= SEC_CODE;
778 else if ((flags & SEC_LOAD) != 0)
779 flags |= SEC_DATA;
f5fa8ca2
JJ
780 if ((hdr->sh_flags & SHF_MERGE) != 0)
781 {
782 flags |= SEC_MERGE;
783 newsect->entsize = hdr->sh_entsize;
784 if ((hdr->sh_flags & SHF_STRINGS) != 0)
785 flags |= SEC_STRINGS;
786 }
dbb410c3
AM
787 if (hdr->sh_flags & SHF_GROUP)
788 if (!setup_group (abfd, hdr, newsect))
b34976b6 789 return FALSE;
13ae64f3
JJ
790 if ((hdr->sh_flags & SHF_TLS) != 0)
791 flags |= SEC_THREAD_LOCAL;
252b5132 792
3d2b39cf 793 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 794 {
3d2b39cf
L
795 /* The debugging sections appear to be recognized only by name,
796 not any sort of flag. Their SEC_ALLOC bits are cleared. */
797 static const struct
798 {
799 const char *name;
800 int len;
801 } debug_sections [] =
802 {
803 { "debug", 5 }, /* 'd' */
804 { NULL, 0 }, /* 'e' */
805 { NULL, 0 }, /* 'f' */
806 { "gnu.linkonce.wi.", 17 }, /* 'g' */
807 { NULL, 0 }, /* 'h' */
808 { NULL, 0 }, /* 'i' */
809 { NULL, 0 }, /* 'j' */
810 { NULL, 0 }, /* 'k' */
811 { "line", 4 }, /* 'l' */
812 { NULL, 0 }, /* 'm' */
813 { NULL, 0 }, /* 'n' */
814 { NULL, 0 }, /* 'o' */
815 { NULL, 0 }, /* 'p' */
816 { NULL, 0 }, /* 'q' */
817 { NULL, 0 }, /* 'r' */
818 { "stab", 4 } /* 's' */
819 };
820
821 if (name [0] == '.')
822 {
823 int i = name [1] - 'd';
824 if (i >= 0
825 && i < (int) ARRAY_SIZE (debug_sections)
826 && debug_sections [i].name != NULL
827 && strncmp (&name [1], debug_sections [i].name,
828 debug_sections [i].len) == 0)
829 flags |= SEC_DEBUGGING;
830 }
831 }
252b5132
RH
832
833 /* As a GNU extension, if the name begins with .gnu.linkonce, we
834 only link a single copy of the section. This is used to support
835 g++. g++ will emit each template expansion in its own section.
836 The symbols will be defined as weak, so that multiple definitions
837 are permitted. The GNU linker extension is to actually discard
838 all but one of the sections. */
b885599b
AM
839 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
840 && elf_next_in_group (newsect) == NULL)
252b5132
RH
841 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
842
fa152c49
JW
843 bed = get_elf_backend_data (abfd);
844 if (bed->elf_backend_section_flags)
845 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 846 return FALSE;
fa152c49 847
252b5132 848 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 849 return FALSE;
252b5132
RH
850
851 if ((flags & SEC_ALLOC) != 0)
852 {
853 Elf_Internal_Phdr *phdr;
854 unsigned int i;
855
856 /* Look through the phdrs to see if we need to adjust the lma.
857 If all the p_paddr fields are zero, we ignore them, since
858 some ELF linkers produce such output. */
859 phdr = elf_tdata (abfd)->phdr;
860 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
861 {
862 if (phdr->p_paddr != 0)
863 break;
864 }
865 if (i < elf_elfheader (abfd)->e_phnum)
866 {
867 phdr = elf_tdata (abfd)->phdr;
868 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
869 {
e0e8c97f
NC
870 /* This section is part of this segment if its file
871 offset plus size lies within the segment's memory
872 span and, if the section is loaded, the extent of the
47d9a591 873 loaded data lies within the extent of the segment.
bf36db18
NC
874
875 Note - we used to check the p_paddr field as well, and
876 refuse to set the LMA if it was 0. This is wrong
dba143ef 877 though, as a perfectly valid initialised segment can
bf36db18 878 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 879 place special significance on the address 0 and
bf36db18
NC
880 executables need to be able to have a segment which
881 covers this address. */
252b5132 882 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
883 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
884 && (hdr->sh_offset + hdr->sh_size
885 <= phdr->p_offset + phdr->p_memsz)
252b5132 886 && ((flags & SEC_LOAD) == 0
d7866f04
AM
887 || (hdr->sh_offset + hdr->sh_size
888 <= phdr->p_offset + phdr->p_filesz)))
252b5132 889 {
dba143ef 890 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
891 newsect->lma = (phdr->p_paddr
892 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
893 else
894 /* We used to use the same adjustment for SEC_LOAD
895 sections, but that doesn't work if the segment
896 is packed with code from multiple VMAs.
897 Instead we calculate the section LMA based on
898 the segment LMA. It is assumed that the
899 segment will contain sections with contiguous
900 LMAs, even if the VMAs are not. */
901 newsect->lma = (phdr->p_paddr
902 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
903
904 /* With contiguous segments, we can't tell from file
905 offsets whether a section with zero size should
906 be placed at the end of one segment or the
907 beginning of the next. Decide based on vaddr. */
908 if (hdr->sh_addr >= phdr->p_vaddr
909 && (hdr->sh_addr + hdr->sh_size
910 <= phdr->p_vaddr + phdr->p_memsz))
911 break;
252b5132
RH
912 }
913 }
914 }
915 }
916
b34976b6 917 return TRUE;
252b5132
RH
918}
919
920/*
921INTERNAL_FUNCTION
922 bfd_elf_find_section
923
924SYNOPSIS
925 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
926
927DESCRIPTION
928 Helper functions for GDB to locate the string tables.
929 Since BFD hides string tables from callers, GDB needs to use an
930 internal hook to find them. Sun's .stabstr, in particular,
931 isn't even pointed to by the .stab section, so ordinary
932 mechanisms wouldn't work to find it, even if we had some.
933*/
934
935struct elf_internal_shdr *
217aa764 936bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
937{
938 Elf_Internal_Shdr **i_shdrp;
939 char *shstrtab;
940 unsigned int max;
941 unsigned int i;
942
943 i_shdrp = elf_elfsections (abfd);
944 if (i_shdrp != NULL)
945 {
9ad5cbcf
AM
946 shstrtab = bfd_elf_get_str_section (abfd,
947 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
948 if (shstrtab != NULL)
949 {
9ad5cbcf 950 max = elf_numsections (abfd);
252b5132
RH
951 for (i = 1; i < max; i++)
952 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
953 return i_shdrp[i];
954 }
955 }
956 return 0;
957}
958
959const char *const bfd_elf_section_type_names[] = {
960 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
961 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
962 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
963};
964
1049f94e 965/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
966 output, and the reloc is against an external symbol, and nothing
967 has given us any additional addend, the resulting reloc will also
968 be against the same symbol. In such a case, we don't want to
969 change anything about the way the reloc is handled, since it will
970 all be done at final link time. Rather than put special case code
971 into bfd_perform_relocation, all the reloc types use this howto
972 function. It just short circuits the reloc if producing
1049f94e 973 relocatable output against an external symbol. */
252b5132 974
252b5132 975bfd_reloc_status_type
217aa764
AM
976bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
977 arelent *reloc_entry,
978 asymbol *symbol,
979 void *data ATTRIBUTE_UNUSED,
980 asection *input_section,
981 bfd *output_bfd,
982 char **error_message ATTRIBUTE_UNUSED)
983{
984 if (output_bfd != NULL
252b5132
RH
985 && (symbol->flags & BSF_SECTION_SYM) == 0
986 && (! reloc_entry->howto->partial_inplace
987 || reloc_entry->addend == 0))
988 {
989 reloc_entry->address += input_section->output_offset;
990 return bfd_reloc_ok;
991 }
992
993 return bfd_reloc_continue;
994}
995\f
d3c456e9
JJ
996/* Make sure sec_info_type is cleared if sec_info is cleared too. */
997
998static void
217aa764
AM
999merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
1000 asection *sec)
d3c456e9 1001{
68bfbfcc
AM
1002 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
1003 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
1004}
1005
8550eb6e
JJ
1006/* Finish SHF_MERGE section merging. */
1007
b34976b6 1008bfd_boolean
217aa764 1009_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 1010{
57ceae94
AM
1011 bfd *ibfd;
1012 asection *sec;
1013
0eddce27 1014 if (!is_elf_hash_table (info->hash))
b34976b6 1015 return FALSE;
57ceae94
AM
1016
1017 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1018 if ((ibfd->flags & DYNAMIC) == 0)
1019 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
1020 if ((sec->flags & SEC_MERGE) != 0
1021 && !bfd_is_abs_section (sec->output_section))
1022 {
1023 struct bfd_elf_section_data *secdata;
1024
1025 secdata = elf_section_data (sec);
1026 if (! _bfd_add_merge_section (abfd,
1027 &elf_hash_table (info)->merge_info,
1028 sec, &secdata->sec_info))
1029 return FALSE;
1030 else if (secdata->sec_info)
1031 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
1032 }
1033
1034 if (elf_hash_table (info)->merge_info != NULL)
1035 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 1036 merge_sections_remove_hook);
b34976b6 1037 return TRUE;
8550eb6e 1038}
2d653fc7
AM
1039
1040void
217aa764 1041_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1042{
1043 sec->output_section = bfd_abs_section_ptr;
1044 sec->output_offset = sec->vma;
0eddce27 1045 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1046 return;
1047
68bfbfcc 1048 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1049}
8550eb6e 1050\f
0ac4564e
L
1051/* Copy the program header and other data from one object module to
1052 another. */
252b5132 1053
b34976b6 1054bfd_boolean
217aa764 1055_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1056{
1057 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1058 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1059 return TRUE;
2d502050
L
1060
1061 BFD_ASSERT (!elf_flags_init (obfd)
1062 || (elf_elfheader (obfd)->e_flags
1063 == elf_elfheader (ibfd)->e_flags));
1064
0ac4564e 1065 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1066 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1067 elf_flags_init (obfd) = TRUE;
1068 return TRUE;
2d502050
L
1069}
1070
cedc298e
L
1071static const char *
1072get_segment_type (unsigned int p_type)
1073{
1074 const char *pt;
1075 switch (p_type)
1076 {
1077 case PT_NULL: pt = "NULL"; break;
1078 case PT_LOAD: pt = "LOAD"; break;
1079 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1080 case PT_INTERP: pt = "INTERP"; break;
1081 case PT_NOTE: pt = "NOTE"; break;
1082 case PT_SHLIB: pt = "SHLIB"; break;
1083 case PT_PHDR: pt = "PHDR"; break;
1084 case PT_TLS: pt = "TLS"; break;
1085 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1086 case PT_GNU_STACK: pt = "STACK"; break;
1087 case PT_GNU_RELRO: pt = "RELRO"; break;
1088 default: pt = NULL; break;
1089 }
1090 return pt;
1091}
1092
f0b79d91
L
1093/* Print out the program headers. */
1094
b34976b6 1095bfd_boolean
217aa764 1096_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1097{
217aa764 1098 FILE *f = farg;
252b5132
RH
1099 Elf_Internal_Phdr *p;
1100 asection *s;
1101 bfd_byte *dynbuf = NULL;
1102
1103 p = elf_tdata (abfd)->phdr;
1104 if (p != NULL)
1105 {
1106 unsigned int i, c;
1107
1108 fprintf (f, _("\nProgram Header:\n"));
1109 c = elf_elfheader (abfd)->e_phnum;
1110 for (i = 0; i < c; i++, p++)
1111 {
cedc298e 1112 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1113 char buf[20];
1114
cedc298e 1115 if (pt == NULL)
252b5132 1116 {
cedc298e
L
1117 sprintf (buf, "0x%lx", p->p_type);
1118 pt = buf;
252b5132 1119 }
dc810e39 1120 fprintf (f, "%8s off 0x", pt);
60b89a18 1121 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1122 fprintf (f, " vaddr 0x");
60b89a18 1123 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1124 fprintf (f, " paddr 0x");
60b89a18 1125 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1126 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1127 fprintf (f, " filesz 0x");
60b89a18 1128 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1129 fprintf (f, " memsz 0x");
60b89a18 1130 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1131 fprintf (f, " flags %c%c%c",
1132 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1133 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1134 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1135 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1136 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1137 fprintf (f, "\n");
1138 }
1139 }
1140
1141 s = bfd_get_section_by_name (abfd, ".dynamic");
1142 if (s != NULL)
1143 {
1144 int elfsec;
dc810e39 1145 unsigned long shlink;
252b5132
RH
1146 bfd_byte *extdyn, *extdynend;
1147 size_t extdynsize;
217aa764 1148 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1149
1150 fprintf (f, _("\nDynamic Section:\n"));
1151
eea6121a 1152 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1153 goto error_return;
1154
1155 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1156 if (elfsec == -1)
1157 goto error_return;
dc810e39 1158 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1159
1160 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1161 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1162
1163 extdyn = dynbuf;
eea6121a 1164 extdynend = extdyn + s->size;
252b5132
RH
1165 for (; extdyn < extdynend; extdyn += extdynsize)
1166 {
1167 Elf_Internal_Dyn dyn;
1168 const char *name;
1169 char ab[20];
b34976b6 1170 bfd_boolean stringp;
252b5132 1171
217aa764 1172 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1173
1174 if (dyn.d_tag == DT_NULL)
1175 break;
1176
b34976b6 1177 stringp = FALSE;
252b5132
RH
1178 switch (dyn.d_tag)
1179 {
1180 default:
1181 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1182 name = ab;
1183 break;
1184
b34976b6 1185 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1186 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1187 case DT_PLTGOT: name = "PLTGOT"; break;
1188 case DT_HASH: name = "HASH"; break;
1189 case DT_STRTAB: name = "STRTAB"; break;
1190 case DT_SYMTAB: name = "SYMTAB"; break;
1191 case DT_RELA: name = "RELA"; break;
1192 case DT_RELASZ: name = "RELASZ"; break;
1193 case DT_RELAENT: name = "RELAENT"; break;
1194 case DT_STRSZ: name = "STRSZ"; break;
1195 case DT_SYMENT: name = "SYMENT"; break;
1196 case DT_INIT: name = "INIT"; break;
1197 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1198 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1199 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1200 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1201 case DT_REL: name = "REL"; break;
1202 case DT_RELSZ: name = "RELSZ"; break;
1203 case DT_RELENT: name = "RELENT"; break;
1204 case DT_PLTREL: name = "PLTREL"; break;
1205 case DT_DEBUG: name = "DEBUG"; break;
1206 case DT_TEXTREL: name = "TEXTREL"; break;
1207 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1208 case DT_BIND_NOW: name = "BIND_NOW"; break;
1209 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1210 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1211 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1212 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1213 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1214 case DT_FLAGS: name = "FLAGS"; break;
1215 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1216 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1217 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1218 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1219 case DT_MOVEENT: name = "MOVEENT"; break;
1220 case DT_MOVESZ: name = "MOVESZ"; break;
1221 case DT_FEATURE: name = "FEATURE"; break;
1222 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1223 case DT_SYMINSZ: name = "SYMINSZ"; break;
1224 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1225 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1226 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1227 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1228 case DT_PLTPAD: name = "PLTPAD"; break;
1229 case DT_MOVETAB: name = "MOVETAB"; break;
1230 case DT_SYMINFO: name = "SYMINFO"; break;
1231 case DT_RELACOUNT: name = "RELACOUNT"; break;
1232 case DT_RELCOUNT: name = "RELCOUNT"; break;
1233 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1234 case DT_VERSYM: name = "VERSYM"; break;
1235 case DT_VERDEF: name = "VERDEF"; break;
1236 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1237 case DT_VERNEED: name = "VERNEED"; break;
1238 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1239 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1240 case DT_USED: name = "USED"; break;
b34976b6 1241 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1242 }
1243
1244 fprintf (f, " %-11s ", name);
1245 if (! stringp)
1246 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1247 else
1248 {
1249 const char *string;
dc810e39 1250 unsigned int tagv = dyn.d_un.d_val;
252b5132 1251
dc810e39 1252 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1253 if (string == NULL)
1254 goto error_return;
1255 fprintf (f, "%s", string);
1256 }
1257 fprintf (f, "\n");
1258 }
1259
1260 free (dynbuf);
1261 dynbuf = NULL;
1262 }
1263
1264 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1265 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1266 {
fc0e6df6 1267 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1268 return FALSE;
252b5132
RH
1269 }
1270
1271 if (elf_dynverdef (abfd) != 0)
1272 {
1273 Elf_Internal_Verdef *t;
1274
1275 fprintf (f, _("\nVersion definitions:\n"));
1276 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1277 {
1278 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1279 t->vd_flags, t->vd_hash,
1280 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1281 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1282 {
1283 Elf_Internal_Verdaux *a;
1284
1285 fprintf (f, "\t");
1286 for (a = t->vd_auxptr->vda_nextptr;
1287 a != NULL;
1288 a = a->vda_nextptr)
d0fb9a8d
JJ
1289 fprintf (f, "%s ",
1290 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1291 fprintf (f, "\n");
1292 }
1293 }
1294 }
1295
1296 if (elf_dynverref (abfd) != 0)
1297 {
1298 Elf_Internal_Verneed *t;
1299
1300 fprintf (f, _("\nVersion References:\n"));
1301 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1302 {
1303 Elf_Internal_Vernaux *a;
1304
d0fb9a8d
JJ
1305 fprintf (f, _(" required from %s:\n"),
1306 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1307 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1308 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1309 a->vna_flags, a->vna_other,
1310 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1311 }
1312 }
1313
b34976b6 1314 return TRUE;
252b5132
RH
1315
1316 error_return:
1317 if (dynbuf != NULL)
1318 free (dynbuf);
b34976b6 1319 return FALSE;
252b5132
RH
1320}
1321
1322/* Display ELF-specific fields of a symbol. */
1323
1324void
217aa764
AM
1325bfd_elf_print_symbol (bfd *abfd,
1326 void *filep,
1327 asymbol *symbol,
1328 bfd_print_symbol_type how)
252b5132 1329{
217aa764 1330 FILE *file = filep;
252b5132
RH
1331 switch (how)
1332 {
1333 case bfd_print_symbol_name:
1334 fprintf (file, "%s", symbol->name);
1335 break;
1336 case bfd_print_symbol_more:
1337 fprintf (file, "elf ");
60b89a18 1338 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1339 fprintf (file, " %lx", (long) symbol->flags);
1340 break;
1341 case bfd_print_symbol_all:
1342 {
4e8a9624
AM
1343 const char *section_name;
1344 const char *name = NULL;
9c5bfbb7 1345 const struct elf_backend_data *bed;
7a13edea 1346 unsigned char st_other;
dbb410c3 1347 bfd_vma val;
c044fabd 1348
252b5132 1349 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1350
1351 bed = get_elf_backend_data (abfd);
1352 if (bed->elf_backend_print_symbol_all)
c044fabd 1353 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1354
1355 if (name == NULL)
1356 {
7ee38065 1357 name = symbol->name;
217aa764 1358 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1359 }
1360
252b5132
RH
1361 fprintf (file, " %s\t", section_name);
1362 /* Print the "other" value for a symbol. For common symbols,
1363 we've already printed the size; now print the alignment.
1364 For other symbols, we have no specified alignment, and
1365 we've printed the address; now print the size. */
dbb410c3
AM
1366 if (bfd_is_com_section (symbol->section))
1367 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1368 else
1369 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1370 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1371
1372 /* If we have version information, print it. */
1373 if (elf_tdata (abfd)->dynversym_section != 0
1374 && (elf_tdata (abfd)->dynverdef_section != 0
1375 || elf_tdata (abfd)->dynverref_section != 0))
1376 {
1377 unsigned int vernum;
1378 const char *version_string;
1379
1380 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1381
1382 if (vernum == 0)
1383 version_string = "";
1384 else if (vernum == 1)
1385 version_string = "Base";
1386 else if (vernum <= elf_tdata (abfd)->cverdefs)
1387 version_string =
1388 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1389 else
1390 {
1391 Elf_Internal_Verneed *t;
1392
1393 version_string = "";
1394 for (t = elf_tdata (abfd)->verref;
1395 t != NULL;
1396 t = t->vn_nextref)
1397 {
1398 Elf_Internal_Vernaux *a;
1399
1400 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1401 {
1402 if (a->vna_other == vernum)
1403 {
1404 version_string = a->vna_nodename;
1405 break;
1406 }
1407 }
1408 }
1409 }
1410
1411 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1412 fprintf (file, " %-11s", version_string);
1413 else
1414 {
1415 int i;
1416
1417 fprintf (file, " (%s)", version_string);
1418 for (i = 10 - strlen (version_string); i > 0; --i)
1419 putc (' ', file);
1420 }
1421 }
1422
1423 /* If the st_other field is not zero, print it. */
7a13edea 1424 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1425
7a13edea
NC
1426 switch (st_other)
1427 {
1428 case 0: break;
1429 case STV_INTERNAL: fprintf (file, " .internal"); break;
1430 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1431 case STV_PROTECTED: fprintf (file, " .protected"); break;
1432 default:
1433 /* Some other non-defined flags are also present, so print
1434 everything hex. */
1435 fprintf (file, " 0x%02x", (unsigned int) st_other);
1436 }
252b5132 1437
587ff49e 1438 fprintf (file, " %s", name);
252b5132
RH
1439 }
1440 break;
1441 }
1442}
1443\f
1444/* Create an entry in an ELF linker hash table. */
1445
1446struct bfd_hash_entry *
217aa764
AM
1447_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1448 struct bfd_hash_table *table,
1449 const char *string)
252b5132 1450{
252b5132
RH
1451 /* Allocate the structure if it has not already been allocated by a
1452 subclass. */
51b64d56
AM
1453 if (entry == NULL)
1454 {
1455 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1456 if (entry == NULL)
1457 return entry;
1458 }
252b5132
RH
1459
1460 /* Call the allocation method of the superclass. */
51b64d56
AM
1461 entry = _bfd_link_hash_newfunc (entry, table, string);
1462 if (entry != NULL)
252b5132 1463 {
51b64d56
AM
1464 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1465 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1466
252b5132
RH
1467 /* Set local fields. */
1468 ret->indx = -1;
252b5132 1469 ret->dynindx = -1;
a6aa5195
AM
1470 ret->got = htab->init_got_refcount;
1471 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1472 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1473 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1474 /* Assume that we have been called by a non-ELF symbol reader.
1475 This flag is then reset by the code which reads an ELF input
1476 file. This ensures that a symbol created by a non-ELF symbol
1477 reader will have the flag set correctly. */
f5385ebf 1478 ret->non_elf = 1;
252b5132
RH
1479 }
1480
51b64d56 1481 return entry;
252b5132
RH
1482}
1483
2920b85c 1484/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1485 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1486
c61b8717 1487void
fcfa13d2 1488_bfd_elf_link_hash_copy_indirect (struct bfd_link_info *info,
217aa764
AM
1489 struct elf_link_hash_entry *dir,
1490 struct elf_link_hash_entry *ind)
2920b85c 1491{
fcfa13d2 1492 struct elf_link_hash_table *htab;
3c3e9281 1493
2920b85c
RH
1494 /* Copy down any references that we may have already seen to the
1495 symbol which just became indirect. */
1496
f5385ebf
AM
1497 dir->ref_dynamic |= ind->ref_dynamic;
1498 dir->ref_regular |= ind->ref_regular;
1499 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1500 dir->non_got_ref |= ind->non_got_ref;
1501 dir->needs_plt |= ind->needs_plt;
1502 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1503
1e370bd2 1504 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1505 return;
1506
51b64d56 1507 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1508 These may have been already set up by a check_relocs routine. */
fcfa13d2
AM
1509 htab = elf_hash_table (info);
1510 if (ind->got.refcount > htab->init_got_refcount.refcount)
2920b85c 1511 {
fcfa13d2
AM
1512 if (dir->got.refcount < 0)
1513 dir->got.refcount = 0;
1514 dir->got.refcount += ind->got.refcount;
1515 ind->got.refcount = htab->init_got_refcount.refcount;
2920b85c 1516 }
2920b85c 1517
fcfa13d2 1518 if (ind->plt.refcount > htab->init_plt_refcount.refcount)
2920b85c 1519 {
fcfa13d2
AM
1520 if (dir->plt.refcount < 0)
1521 dir->plt.refcount = 0;
1522 dir->plt.refcount += ind->plt.refcount;
1523 ind->plt.refcount = htab->init_plt_refcount.refcount;
2920b85c 1524 }
2920b85c 1525
fcfa13d2 1526 if (ind->dynindx != -1)
2920b85c 1527 {
fcfa13d2
AM
1528 if (dir->dynindx != -1)
1529 _bfd_elf_strtab_delref (htab->dynstr, dir->dynstr_index);
2920b85c
RH
1530 dir->dynindx = ind->dynindx;
1531 dir->dynstr_index = ind->dynstr_index;
1532 ind->dynindx = -1;
1533 ind->dynstr_index = 0;
1534 }
2920b85c
RH
1535}
1536
c61b8717 1537void
217aa764
AM
1538_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1539 struct elf_link_hash_entry *h,
1540 bfd_boolean force_local)
2920b85c 1541{
a6aa5195 1542 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1543 h->needs_plt = 0;
e5094212
AM
1544 if (force_local)
1545 {
f5385ebf 1546 h->forced_local = 1;
e5094212
AM
1547 if (h->dynindx != -1)
1548 {
1549 h->dynindx = -1;
1550 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1551 h->dynstr_index);
1552 }
1553 }
2920b85c
RH
1554}
1555
252b5132
RH
1556/* Initialize an ELF linker hash table. */
1557
b34976b6 1558bfd_boolean
217aa764
AM
1559_bfd_elf_link_hash_table_init
1560 (struct elf_link_hash_table *table,
1561 bfd *abfd,
1562 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1563 struct bfd_hash_table *,
66eb6687
AM
1564 const char *),
1565 unsigned int entsize)
252b5132 1566{
b34976b6 1567 bfd_boolean ret;
a6aa5195 1568 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1569
b34976b6 1570 table->dynamic_sections_created = FALSE;
252b5132 1571 table->dynobj = NULL;
a6aa5195
AM
1572 table->init_got_refcount.refcount = can_refcount - 1;
1573 table->init_plt_refcount.refcount = can_refcount - 1;
1574 table->init_got_offset.offset = -(bfd_vma) 1;
1575 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1576 /* The first dynamic symbol is a dummy. */
1577 table->dynsymcount = 1;
1578 table->dynstr = NULL;
1579 table->bucketcount = 0;
1580 table->needed = NULL;
1581 table->hgot = NULL;
f5fa8ca2 1582 table->merge_info = NULL;
3722b82f 1583 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1584 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1585 table->dynlocal = NULL;
73722af0 1586 table->runpath = NULL;
e1918d23
AM
1587 table->tls_sec = NULL;
1588 table->tls_size = 0;
73722af0 1589 table->loaded = NULL;
67687978 1590 table->is_relocatable_executable = FALSE;
73722af0 1591
66eb6687 1592 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc, entsize);
8ea2e4bd
NC
1593 table->root.type = bfd_link_elf_hash_table;
1594
1595 return ret;
252b5132
RH
1596}
1597
1598/* Create an ELF linker hash table. */
1599
1600struct bfd_link_hash_table *
217aa764 1601_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1602{
1603 struct elf_link_hash_table *ret;
dc810e39 1604 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1605
217aa764
AM
1606 ret = bfd_malloc (amt);
1607 if (ret == NULL)
252b5132
RH
1608 return NULL;
1609
66eb6687
AM
1610 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc,
1611 sizeof (struct elf_link_hash_entry)))
252b5132 1612 {
e2d34d7d 1613 free (ret);
252b5132
RH
1614 return NULL;
1615 }
1616
1617 return &ret->root;
1618}
1619
1620/* This is a hook for the ELF emulation code in the generic linker to
1621 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1622 entry for a dynamic object. */
252b5132
RH
1623
1624void
217aa764 1625bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1626{
1627 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1628 && bfd_get_format (abfd) == bfd_object)
1629 elf_dt_name (abfd) = name;
1630}
1631
e56f61be
L
1632int
1633bfd_elf_get_dyn_lib_class (bfd *abfd)
1634{
1635 int lib_class;
1636 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1637 && bfd_get_format (abfd) == bfd_object)
1638 lib_class = elf_dyn_lib_class (abfd);
1639 else
1640 lib_class = 0;
1641 return lib_class;
1642}
1643
74816898 1644void
4a43e768 1645bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1646{
1647 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1648 && bfd_get_format (abfd) == bfd_object)
4a43e768 1649 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1650}
1651
252b5132
RH
1652/* Get the list of DT_NEEDED entries for a link. This is a hook for
1653 the linker ELF emulation code. */
1654
1655struct bfd_link_needed_list *
217aa764
AM
1656bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1657 struct bfd_link_info *info)
252b5132 1658{
0eddce27 1659 if (! is_elf_hash_table (info->hash))
252b5132
RH
1660 return NULL;
1661 return elf_hash_table (info)->needed;
1662}
1663
a963dc6a
L
1664/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1665 hook for the linker ELF emulation code. */
1666
1667struct bfd_link_needed_list *
217aa764
AM
1668bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1669 struct bfd_link_info *info)
a963dc6a 1670{
0eddce27 1671 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1672 return NULL;
1673 return elf_hash_table (info)->runpath;
1674}
1675
252b5132
RH
1676/* Get the name actually used for a dynamic object for a link. This
1677 is the SONAME entry if there is one. Otherwise, it is the string
1678 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1679
1680const char *
217aa764 1681bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1682{
1683 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1684 && bfd_get_format (abfd) == bfd_object)
1685 return elf_dt_name (abfd);
1686 return NULL;
1687}
1688
1689/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1690 the ELF linker emulation code. */
1691
b34976b6 1692bfd_boolean
217aa764
AM
1693bfd_elf_get_bfd_needed_list (bfd *abfd,
1694 struct bfd_link_needed_list **pneeded)
252b5132
RH
1695{
1696 asection *s;
1697 bfd_byte *dynbuf = NULL;
1698 int elfsec;
dc810e39 1699 unsigned long shlink;
252b5132
RH
1700 bfd_byte *extdyn, *extdynend;
1701 size_t extdynsize;
217aa764 1702 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1703
1704 *pneeded = NULL;
1705
1706 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1707 || bfd_get_format (abfd) != bfd_object)
b34976b6 1708 return TRUE;
252b5132
RH
1709
1710 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1711 if (s == NULL || s->size == 0)
b34976b6 1712 return TRUE;
252b5132 1713
eea6121a 1714 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1715 goto error_return;
1716
1717 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1718 if (elfsec == -1)
1719 goto error_return;
1720
dc810e39 1721 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1722
1723 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1724 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1725
1726 extdyn = dynbuf;
eea6121a 1727 extdynend = extdyn + s->size;
252b5132
RH
1728 for (; extdyn < extdynend; extdyn += extdynsize)
1729 {
1730 Elf_Internal_Dyn dyn;
1731
217aa764 1732 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1733
1734 if (dyn.d_tag == DT_NULL)
1735 break;
1736
1737 if (dyn.d_tag == DT_NEEDED)
1738 {
1739 const char *string;
1740 struct bfd_link_needed_list *l;
dc810e39
AM
1741 unsigned int tagv = dyn.d_un.d_val;
1742 bfd_size_type amt;
252b5132 1743
dc810e39 1744 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1745 if (string == NULL)
1746 goto error_return;
1747
dc810e39 1748 amt = sizeof *l;
217aa764 1749 l = bfd_alloc (abfd, amt);
252b5132
RH
1750 if (l == NULL)
1751 goto error_return;
1752
1753 l->by = abfd;
1754 l->name = string;
1755 l->next = *pneeded;
1756 *pneeded = l;
1757 }
1758 }
1759
1760 free (dynbuf);
1761
b34976b6 1762 return TRUE;
252b5132
RH
1763
1764 error_return:
1765 if (dynbuf != NULL)
1766 free (dynbuf);
b34976b6 1767 return FALSE;
252b5132
RH
1768}
1769\f
1770/* Allocate an ELF string table--force the first byte to be zero. */
1771
1772struct bfd_strtab_hash *
217aa764 1773_bfd_elf_stringtab_init (void)
252b5132
RH
1774{
1775 struct bfd_strtab_hash *ret;
1776
1777 ret = _bfd_stringtab_init ();
1778 if (ret != NULL)
1779 {
1780 bfd_size_type loc;
1781
b34976b6 1782 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1783 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1784 if (loc == (bfd_size_type) -1)
1785 {
1786 _bfd_stringtab_free (ret);
1787 ret = NULL;
1788 }
1789 }
1790 return ret;
1791}
1792\f
1793/* ELF .o/exec file reading */
1794
c044fabd 1795/* Create a new bfd section from an ELF section header. */
252b5132 1796
b34976b6 1797bfd_boolean
217aa764 1798bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1799{
1800 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1801 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1802 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1803 const char *name;
252b5132 1804
1b3a8575
AM
1805 name = bfd_elf_string_from_elf_section (abfd,
1806 elf_elfheader (abfd)->e_shstrndx,
1807 hdr->sh_name);
933d961a
JJ
1808 if (name == NULL)
1809 return FALSE;
252b5132
RH
1810
1811 switch (hdr->sh_type)
1812 {
1813 case SHT_NULL:
1814 /* Inactive section. Throw it away. */
b34976b6 1815 return TRUE;
252b5132
RH
1816
1817 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1818 case SHT_NOBITS: /* .bss section. */
1819 case SHT_HASH: /* .hash section. */
1820 case SHT_NOTE: /* .note section. */
25e27870
L
1821 case SHT_INIT_ARRAY: /* .init_array section. */
1822 case SHT_FINI_ARRAY: /* .fini_array section. */
1823 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1824 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1825 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1826
797fc050 1827 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1828 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1829 return FALSE;
8e0ed13f
NC
1830 if (hdr->sh_link > elf_numsections (abfd)
1831 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1832 return FALSE;
797fc050
AM
1833 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1834 {
1835 Elf_Internal_Shdr *dynsymhdr;
1836
1837 /* The shared libraries distributed with hpux11 have a bogus
1838 sh_link field for the ".dynamic" section. Find the
1839 string table for the ".dynsym" section instead. */
1840 if (elf_dynsymtab (abfd) != 0)
1841 {
1842 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1843 hdr->sh_link = dynsymhdr->sh_link;
1844 }
1845 else
1846 {
1847 unsigned int i, num_sec;
1848
1849 num_sec = elf_numsections (abfd);
1850 for (i = 1; i < num_sec; i++)
1851 {
1852 dynsymhdr = elf_elfsections (abfd)[i];
1853 if (dynsymhdr->sh_type == SHT_DYNSYM)
1854 {
1855 hdr->sh_link = dynsymhdr->sh_link;
1856 break;
1857 }
1858 }
1859 }
1860 }
1861 break;
1862
252b5132
RH
1863 case SHT_SYMTAB: /* A symbol table */
1864 if (elf_onesymtab (abfd) == shindex)
b34976b6 1865 return TRUE;
252b5132 1866
a50b2160
JJ
1867 if (hdr->sh_entsize != bed->s->sizeof_sym)
1868 return FALSE;
252b5132
RH
1869 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1870 elf_onesymtab (abfd) = shindex;
1871 elf_tdata (abfd)->symtab_hdr = *hdr;
1872 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1873 abfd->flags |= HAS_SYMS;
1874
1875 /* Sometimes a shared object will map in the symbol table. If
1876 SHF_ALLOC is set, and this is a shared object, then we also
1877 treat this section as a BFD section. We can not base the
1878 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1879 set in a relocatable object file, which would confuse the
252b5132
RH
1880 linker. */
1881 if ((hdr->sh_flags & SHF_ALLOC) != 0
1882 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1883 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1884 shindex))
b34976b6 1885 return FALSE;
252b5132 1886
1b3a8575
AM
1887 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1888 can't read symbols without that section loaded as well. It
1889 is most likely specified by the next section header. */
1890 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1891 {
1892 unsigned int i, num_sec;
1893
1894 num_sec = elf_numsections (abfd);
1895 for (i = shindex + 1; i < num_sec; i++)
1896 {
1897 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1898 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1899 && hdr2->sh_link == shindex)
1900 break;
1901 }
1902 if (i == num_sec)
1903 for (i = 1; i < shindex; i++)
1904 {
1905 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1906 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1907 && hdr2->sh_link == shindex)
1908 break;
1909 }
1910 if (i != shindex)
1911 return bfd_section_from_shdr (abfd, i);
1912 }
b34976b6 1913 return TRUE;
252b5132
RH
1914
1915 case SHT_DYNSYM: /* A dynamic symbol table */
1916 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1917 return TRUE;
252b5132 1918
a50b2160
JJ
1919 if (hdr->sh_entsize != bed->s->sizeof_sym)
1920 return FALSE;
252b5132
RH
1921 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1922 elf_dynsymtab (abfd) = shindex;
1923 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1924 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1925 abfd->flags |= HAS_SYMS;
1926
1927 /* Besides being a symbol table, we also treat this as a regular
1928 section, so that objcopy can handle it. */
6dc132d9 1929 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1930
9ad5cbcf
AM
1931 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1932 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1933 return TRUE;
9ad5cbcf 1934
1b3a8575 1935 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1936 elf_symtab_shndx (abfd) = shindex;
1937 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1938 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1939 return TRUE;
9ad5cbcf 1940
252b5132
RH
1941 case SHT_STRTAB: /* A string table */
1942 if (hdr->bfd_section != NULL)
b34976b6 1943 return TRUE;
252b5132
RH
1944 if (ehdr->e_shstrndx == shindex)
1945 {
1946 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1947 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1948 return TRUE;
252b5132 1949 }
1b3a8575
AM
1950 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1951 {
1952 symtab_strtab:
1953 elf_tdata (abfd)->strtab_hdr = *hdr;
1954 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1955 return TRUE;
1956 }
1957 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1958 {
1959 dynsymtab_strtab:
1960 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1961 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1962 elf_elfsections (abfd)[shindex] = hdr;
1963 /* We also treat this as a regular section, so that objcopy
1964 can handle it. */
6dc132d9
L
1965 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1966 shindex);
1b3a8575 1967 }
252b5132 1968
1b3a8575
AM
1969 /* If the string table isn't one of the above, then treat it as a
1970 regular section. We need to scan all the headers to be sure,
1971 just in case this strtab section appeared before the above. */
1972 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1973 {
1974 unsigned int i, num_sec;
252b5132 1975
1b3a8575
AM
1976 num_sec = elf_numsections (abfd);
1977 for (i = 1; i < num_sec; i++)
1978 {
1979 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1980 if (hdr2->sh_link == shindex)
1981 {
933d961a
JJ
1982 /* Prevent endless recursion on broken objects. */
1983 if (i == shindex)
1984 return FALSE;
1b3a8575
AM
1985 if (! bfd_section_from_shdr (abfd, i))
1986 return FALSE;
1987 if (elf_onesymtab (abfd) == i)
1988 goto symtab_strtab;
1989 if (elf_dynsymtab (abfd) == i)
1990 goto dynsymtab_strtab;
1991 }
1992 }
1993 }
6dc132d9 1994 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1995
1996 case SHT_REL:
1997 case SHT_RELA:
1998 /* *These* do a lot of work -- but build no sections! */
1999 {
2000 asection *target_sect;
2001 Elf_Internal_Shdr *hdr2;
9ad5cbcf 2002 unsigned int num_sec = elf_numsections (abfd);
252b5132 2003
aa2ca951
JJ
2004 if (hdr->sh_entsize
2005 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
2006 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2007 return FALSE;
2008
03ae5f59 2009 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
2010 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
2011 || hdr->sh_link >= num_sec)
03ae5f59
ILT
2012 {
2013 ((*_bfd_error_handler)
d003868e
AM
2014 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2015 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
2016 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2017 shindex);
03ae5f59
ILT
2018 }
2019
252b5132
RH
2020 /* For some incomprehensible reason Oracle distributes
2021 libraries for Solaris in which some of the objects have
2022 bogus sh_link fields. It would be nice if we could just
2023 reject them, but, unfortunately, some people need to use
2024 them. We scan through the section headers; if we find only
2025 one suitable symbol table, we clobber the sh_link to point
2026 to it. I hope this doesn't break anything. */
2027 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2028 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2029 {
9ad5cbcf 2030 unsigned int scan;
252b5132
RH
2031 int found;
2032
2033 found = 0;
9ad5cbcf 2034 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2035 {
2036 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2037 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2038 {
2039 if (found != 0)
2040 {
2041 found = 0;
2042 break;
2043 }
2044 found = scan;
2045 }
2046 }
2047 if (found != 0)
2048 hdr->sh_link = found;
2049 }
2050
2051 /* Get the symbol table. */
1b3a8575
AM
2052 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2053 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2054 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 2055 return FALSE;
252b5132
RH
2056
2057 /* If this reloc section does not use the main symbol table we
2058 don't treat it as a reloc section. BFD can't adequately
2059 represent such a section, so at least for now, we don't
c044fabd 2060 try. We just present it as a normal section. We also
60bcf0fa 2061 can't use it as a reloc section if it points to the null
185ef66d
AM
2062 section, an invalid section, or another reloc section. */
2063 if (hdr->sh_link != elf_onesymtab (abfd)
2064 || hdr->sh_info == SHN_UNDEF
2065 || (hdr->sh_info >= SHN_LORESERVE && hdr->sh_info <= SHN_HIRESERVE)
2066 || hdr->sh_info >= num_sec
2067 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2068 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
2069 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2070 shindex);
252b5132
RH
2071
2072 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2073 return FALSE;
252b5132
RH
2074 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2075 if (target_sect == NULL)
b34976b6 2076 return FALSE;
252b5132
RH
2077
2078 if ((target_sect->flags & SEC_RELOC) == 0
2079 || target_sect->reloc_count == 0)
2080 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2081 else
2082 {
dc810e39 2083 bfd_size_type amt;
252b5132 2084 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2085 amt = sizeof (*hdr2);
217aa764 2086 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2087 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2088 }
2089 *hdr2 = *hdr;
2090 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2091 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2092 target_sect->flags |= SEC_RELOC;
2093 target_sect->relocation = NULL;
2094 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2095 /* In the section to which the relocations apply, mark whether
2096 its relocations are of the REL or RELA variety. */
72730e0c 2097 if (hdr->sh_size != 0)
68bfbfcc 2098 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2099 abfd->flags |= HAS_RELOC;
b34976b6 2100 return TRUE;
252b5132
RH
2101 }
2102 break;
2103
2104 case SHT_GNU_verdef:
2105 elf_dynverdef (abfd) = shindex;
2106 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2107 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2108 break;
2109
2110 case SHT_GNU_versym:
a50b2160
JJ
2111 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2112 return FALSE;
252b5132
RH
2113 elf_dynversym (abfd) = shindex;
2114 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2115 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2116
2117 case SHT_GNU_verneed:
2118 elf_dynverref (abfd) = shindex;
2119 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2120 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2121
2122 case SHT_SHLIB:
b34976b6 2123 return TRUE;
252b5132 2124
dbb410c3 2125 case SHT_GROUP:
b885599b
AM
2126 /* We need a BFD section for objcopy and relocatable linking,
2127 and it's handy to have the signature available as the section
2128 name. */
a50b2160
JJ
2129 if (hdr->sh_entsize != GRP_ENTRY_SIZE)
2130 return FALSE;
b885599b
AM
2131 name = group_signature (abfd, hdr);
2132 if (name == NULL)
b34976b6 2133 return FALSE;
6dc132d9 2134 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2135 return FALSE;
dbb410c3
AM
2136 if (hdr->contents != NULL)
2137 {
2138 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2139 unsigned int n_elt = hdr->sh_size / 4;
2140 asection *s;
2141
b885599b
AM
2142 if (idx->flags & GRP_COMDAT)
2143 hdr->bfd_section->flags
2144 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2145
45c5e9ed
L
2146 /* We try to keep the same section order as it comes in. */
2147 idx += n_elt;
dbb410c3 2148 while (--n_elt != 0)
45c5e9ed 2149 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2150 && elf_next_in_group (s) != NULL)
dbb410c3 2151 {
945906ff 2152 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2153 break;
2154 }
2155 }
2156 break;
2157
252b5132
RH
2158 default:
2159 /* Check for any processor-specific section types. */
3eb70a79
L
2160 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2161 return TRUE;
2162
2163 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2164 {
2165 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2166 /* FIXME: How to properly handle allocated section reserved
2167 for applications? */
2168 (*_bfd_error_handler)
2169 (_("%B: don't know how to handle allocated, application "
2170 "specific section `%s' [0x%8x]"),
2171 abfd, name, hdr->sh_type);
2172 else
2173 /* Allow sections reserved for applications. */
2174 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2175 shindex);
2176 }
2177 else if (hdr->sh_type >= SHT_LOPROC
2178 && hdr->sh_type <= SHT_HIPROC)
2179 /* FIXME: We should handle this section. */
2180 (*_bfd_error_handler)
2181 (_("%B: don't know how to handle processor specific section "
2182 "`%s' [0x%8x]"),
2183 abfd, name, hdr->sh_type);
2184 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
2185 /* FIXME: We should handle this section. */
2186 (*_bfd_error_handler)
2187 (_("%B: don't know how to handle OS specific section "
2188 "`%s' [0x%8x]"),
2189 abfd, name, hdr->sh_type);
2190 else
2191 /* FIXME: We should handle this section. */
2192 (*_bfd_error_handler)
2193 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2194 abfd, name, hdr->sh_type);
2195
2196 return FALSE;
252b5132
RH
2197 }
2198
b34976b6 2199 return TRUE;
252b5132
RH
2200}
2201
ec338859
AM
2202/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2203 Return SEC for sections that have no elf section, and NULL on error. */
2204
2205asection *
217aa764
AM
2206bfd_section_from_r_symndx (bfd *abfd,
2207 struct sym_sec_cache *cache,
2208 asection *sec,
2209 unsigned long r_symndx)
ec338859 2210{
ec338859 2211 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2212 unsigned char esym[sizeof (Elf64_External_Sym)];
2213 Elf_External_Sym_Shndx eshndx;
2214 Elf_Internal_Sym isym;
ec338859
AM
2215 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2216
2217 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2218 return cache->sec[ent];
2219
2220 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2221 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2222 &isym, esym, &eshndx) == NULL)
ec338859 2223 return NULL;
9ad5cbcf 2224
ec338859
AM
2225 if (cache->abfd != abfd)
2226 {
2227 memset (cache->indx, -1, sizeof (cache->indx));
2228 cache->abfd = abfd;
2229 }
2230 cache->indx[ent] = r_symndx;
2231 cache->sec[ent] = sec;
50bc7936
AM
2232 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2233 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2234 {
2235 asection *s;
6cdc0ccc 2236 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2237 if (s != NULL)
2238 cache->sec[ent] = s;
2239 }
2240 return cache->sec[ent];
2241}
2242
252b5132
RH
2243/* Given an ELF section number, retrieve the corresponding BFD
2244 section. */
2245
2246asection *
217aa764 2247bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2248{
9ad5cbcf 2249 if (index >= elf_numsections (abfd))
252b5132
RH
2250 return NULL;
2251 return elf_elfsections (abfd)[index]->bfd_section;
2252}
2253
b35d266b 2254static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2255{
7dcb9820 2256 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7f4d3958
L
2257 { NULL, 0, 0, 0, 0 }
2258};
2259
b35d266b 2260static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2261{
7dcb9820 2262 { ".comment", 8, 0, SHT_PROGBITS, 0 },
7f4d3958
L
2263 { NULL, 0, 0, 0, 0 }
2264};
2265
b35d266b 2266static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2267{
7dcb9820
AM
2268 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2269 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2270 { ".debug", 6, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2271 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2272 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2273 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2274 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2275 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2276 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2277 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
7f4d3958
L
2278 { NULL, 0, 0, 0, 0 }
2279};
2280
b35d266b 2281static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958
L
2282{
2283 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2284 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2285 { NULL, 0, 0, 0, 0 }
2286};
2287
b35d266b 2288static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958
L
2289{
2290 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820 2291 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2292 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2293 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2294 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
7f4d3958
L
2295 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2296 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
2297 { NULL, 0, 0, 0, 0 }
2298};
2299
b35d266b 2300static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958
L
2301{
2302 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2303 { NULL, 0, 0, 0, 0 }
2304};
2305
b35d266b 2306static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958
L
2307{
2308 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2309 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2310 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2311 { NULL, 0, 0, 0, 0 }
2312};
2313
b35d266b 2314static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958
L
2315{
2316 { ".line", 5, 0, SHT_PROGBITS, 0 },
2317 { NULL, 0, 0, 0, 0 }
2318};
2319
b35d266b 2320static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2321{
45c5e9ed 2322 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820 2323 { ".note", 5, -1, SHT_NOTE, 0 },
7f4d3958
L
2324 { NULL, 0, 0, 0, 0 }
2325};
2326
b35d266b 2327static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958
L
2328{
2329 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2330 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2331 { NULL, 0, 0, 0, 0 }
2332};
2333
b35d266b 2334static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958
L
2335{
2336 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2337 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
7dcb9820
AM
2338 { ".rela", 5, -1, SHT_RELA, 0 },
2339 { ".rel", 4, -1, SHT_REL, 0 },
7f4d3958
L
2340 { NULL, 0, 0, 0, 0 }
2341};
2342
b35d266b 2343static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958
L
2344{
2345 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2346 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2347 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
7dcb9820
AM
2348 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2349 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2350};
2351
b35d266b 2352static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958
L
2353{
2354 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2355 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2356 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2357 { NULL, 0, 0, 0, 0 }
2358};
2359
b35d266b 2360static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2361{
7f4d3958
L
2362 special_sections_b, /* 'b' */
2363 special_sections_c, /* 'b' */
2364 special_sections_d, /* 'd' */
2365 NULL, /* 'e' */
2366 special_sections_f, /* 'f' */
2367 special_sections_g, /* 'g' */
2368 special_sections_h, /* 'h' */
2369 special_sections_i, /* 'i' */
2370 NULL, /* 'j' */
2371 NULL, /* 'k' */
2372 special_sections_l, /* 'l' */
2373 NULL, /* 'm' */
2374 special_sections_n, /* 'n' */
2375 NULL, /* 'o' */
2376 special_sections_p, /* 'p' */
2377 NULL, /* 'q' */
2378 special_sections_r, /* 'r' */
2379 special_sections_s, /* 's' */
2380 special_sections_t, /* 't' */
7f4d3958
L
2381};
2382
551b43fd
AM
2383const struct bfd_elf_special_section *
2384_bfd_elf_get_special_section (const char *name,
2385 const struct bfd_elf_special_section *spec,
2386 unsigned int rela)
2f89ff8d
L
2387{
2388 int i;
7f4d3958 2389 int len;
7f4d3958 2390
551b43fd 2391 len = strlen (name);
7f4d3958 2392
551b43fd 2393 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2394 {
2395 int suffix_len;
551b43fd 2396 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2397
2398 if (len < prefix_len)
2399 continue;
551b43fd 2400 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2401 continue;
2402
551b43fd 2403 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2404 if (suffix_len <= 0)
2405 {
2406 if (name[prefix_len] != 0)
2407 {
2408 if (suffix_len == 0)
2409 continue;
2410 if (name[prefix_len] != '.'
2411 && (suffix_len == -2
551b43fd 2412 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2413 continue;
2414 }
2415 }
2416 else
2417 {
2418 if (len < prefix_len + suffix_len)
2419 continue;
2420 if (memcmp (name + len - suffix_len,
551b43fd 2421 spec[i].prefix + prefix_len,
7dcb9820
AM
2422 suffix_len) != 0)
2423 continue;
2424 }
551b43fd 2425 return &spec[i];
7dcb9820 2426 }
2f89ff8d
L
2427
2428 return NULL;
2429}
2430
7dcb9820 2431const struct bfd_elf_special_section *
29ef7005 2432_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2433{
551b43fd
AM
2434 int i;
2435 const struct bfd_elf_special_section *spec;
29ef7005 2436 const struct elf_backend_data *bed;
2f89ff8d
L
2437
2438 /* See if this is one of the special sections. */
551b43fd
AM
2439 if (sec->name == NULL)
2440 return NULL;
2f89ff8d 2441
29ef7005
L
2442 bed = get_elf_backend_data (abfd);
2443 spec = bed->special_sections;
2444 if (spec)
2445 {
2446 spec = _bfd_elf_get_special_section (sec->name,
2447 bed->special_sections,
2448 sec->use_rela_p);
2449 if (spec != NULL)
2450 return spec;
2451 }
2452
551b43fd
AM
2453 if (sec->name[0] != '.')
2454 return NULL;
2f89ff8d 2455
551b43fd
AM
2456 i = sec->name[1] - 'b';
2457 if (i < 0 || i > 't' - 'b')
2458 return NULL;
2459
2460 spec = special_sections[i];
2f89ff8d 2461
551b43fd
AM
2462 if (spec == NULL)
2463 return NULL;
2464
2465 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2466}
2467
b34976b6 2468bfd_boolean
217aa764 2469_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2470{
2471 struct bfd_elf_section_data *sdata;
551b43fd 2472 const struct elf_backend_data *bed;
7dcb9820 2473 const struct bfd_elf_special_section *ssect;
252b5132 2474
f0abc2a1
AM
2475 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2476 if (sdata == NULL)
2477 {
217aa764 2478 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2479 if (sdata == NULL)
2480 return FALSE;
217aa764 2481 sec->used_by_bfd = sdata;
f0abc2a1 2482 }
bf572ba0 2483
551b43fd
AM
2484 /* Indicate whether or not this section should use RELA relocations. */
2485 bed = get_elf_backend_data (abfd);
2486 sec->use_rela_p = bed->default_use_rela_p;
2487
e843e0f8
L
2488 /* When we read a file, we don't need to set ELF section type and
2489 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2490 anyway. We will set ELF section type and flags for all linker
2491 created sections. If user specifies BFD section flags, we will
2492 set ELF section type and flags based on BFD section flags in
2493 elf_fake_sections. */
2494 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2495 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2496 {
551b43fd 2497 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2498 if (ssect != NULL)
2499 {
2500 elf_section_type (sec) = ssect->type;
2501 elf_section_flags (sec) = ssect->attr;
2502 }
2f89ff8d
L
2503 }
2504
f592407e 2505 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2506}
2507
2508/* Create a new bfd section from an ELF program header.
2509
2510 Since program segments have no names, we generate a synthetic name
2511 of the form segment<NUM>, where NUM is generally the index in the
2512 program header table. For segments that are split (see below) we
2513 generate the names segment<NUM>a and segment<NUM>b.
2514
2515 Note that some program segments may have a file size that is different than
2516 (less than) the memory size. All this means is that at execution the
2517 system must allocate the amount of memory specified by the memory size,
2518 but only initialize it with the first "file size" bytes read from the
2519 file. This would occur for example, with program segments consisting
2520 of combined data+bss.
2521
2522 To handle the above situation, this routine generates TWO bfd sections
2523 for the single program segment. The first has the length specified by
2524 the file size of the segment, and the second has the length specified
2525 by the difference between the two sizes. In effect, the segment is split
2526 into it's initialized and uninitialized parts.
2527
2528 */
2529
b34976b6 2530bfd_boolean
217aa764
AM
2531_bfd_elf_make_section_from_phdr (bfd *abfd,
2532 Elf_Internal_Phdr *hdr,
2533 int index,
2534 const char *typename)
252b5132
RH
2535{
2536 asection *newsect;
2537 char *name;
2538 char namebuf[64];
d4c88bbb 2539 size_t len;
252b5132
RH
2540 int split;
2541
2542 split = ((hdr->p_memsz > 0)
2543 && (hdr->p_filesz > 0)
2544 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2545 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2546 len = strlen (namebuf) + 1;
217aa764 2547 name = bfd_alloc (abfd, len);
252b5132 2548 if (!name)
b34976b6 2549 return FALSE;
d4c88bbb 2550 memcpy (name, namebuf, len);
252b5132
RH
2551 newsect = bfd_make_section (abfd, name);
2552 if (newsect == NULL)
b34976b6 2553 return FALSE;
252b5132
RH
2554 newsect->vma = hdr->p_vaddr;
2555 newsect->lma = hdr->p_paddr;
eea6121a 2556 newsect->size = hdr->p_filesz;
252b5132
RH
2557 newsect->filepos = hdr->p_offset;
2558 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2559 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2560 if (hdr->p_type == PT_LOAD)
2561 {
2562 newsect->flags |= SEC_ALLOC;
2563 newsect->flags |= SEC_LOAD;
2564 if (hdr->p_flags & PF_X)
2565 {
2566 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2567 may be data. */
252b5132
RH
2568 newsect->flags |= SEC_CODE;
2569 }
2570 }
2571 if (!(hdr->p_flags & PF_W))
2572 {
2573 newsect->flags |= SEC_READONLY;
2574 }
2575
2576 if (split)
2577 {
27ac83bf 2578 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2579 len = strlen (namebuf) + 1;
217aa764 2580 name = bfd_alloc (abfd, len);
252b5132 2581 if (!name)
b34976b6 2582 return FALSE;
d4c88bbb 2583 memcpy (name, namebuf, len);
252b5132
RH
2584 newsect = bfd_make_section (abfd, name);
2585 if (newsect == NULL)
b34976b6 2586 return FALSE;
252b5132
RH
2587 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2588 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2589 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2590 if (hdr->p_type == PT_LOAD)
2591 {
2592 newsect->flags |= SEC_ALLOC;
2593 if (hdr->p_flags & PF_X)
2594 newsect->flags |= SEC_CODE;
2595 }
2596 if (!(hdr->p_flags & PF_W))
2597 newsect->flags |= SEC_READONLY;
2598 }
2599
b34976b6 2600 return TRUE;
252b5132
RH
2601}
2602
b34976b6 2603bfd_boolean
217aa764 2604bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2605{
9c5bfbb7 2606 const struct elf_backend_data *bed;
20cfcaae
NC
2607
2608 switch (hdr->p_type)
2609 {
2610 case PT_NULL:
2611 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2612
2613 case PT_LOAD:
2614 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2615
2616 case PT_DYNAMIC:
2617 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2618
2619 case PT_INTERP:
2620 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2621
2622 case PT_NOTE:
2623 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2624 return FALSE;
217aa764 2625 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2626 return FALSE;
2627 return TRUE;
20cfcaae
NC
2628
2629 case PT_SHLIB:
2630 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2631
2632 case PT_PHDR:
2633 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2634
811072d8
RM
2635 case PT_GNU_EH_FRAME:
2636 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2637 "eh_frame_hdr");
2638
9ee5e499
JJ
2639 case PT_GNU_STACK:
2640 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2641
8c37241b
JJ
2642 case PT_GNU_RELRO:
2643 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2644
20cfcaae 2645 default:
8c1acd09 2646 /* Check for any processor-specific program segment types. */
20cfcaae 2647 bed = get_elf_backend_data (abfd);
d27f5fa1 2648 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2649 }
2650}
2651
23bc299b 2652/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2653 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2654 relocations; otherwise, we use REL relocations. */
2655
b34976b6 2656bfd_boolean
217aa764
AM
2657_bfd_elf_init_reloc_shdr (bfd *abfd,
2658 Elf_Internal_Shdr *rel_hdr,
2659 asection *asect,
2660 bfd_boolean use_rela_p)
23bc299b
MM
2661{
2662 char *name;
9c5bfbb7 2663 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2664 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2665
dc810e39 2666 name = bfd_alloc (abfd, amt);
23bc299b 2667 if (name == NULL)
b34976b6 2668 return FALSE;
23bc299b
MM
2669 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2670 rel_hdr->sh_name =
2b0f7ef9 2671 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2672 FALSE);
23bc299b 2673 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2674 return FALSE;
23bc299b
MM
2675 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2676 rel_hdr->sh_entsize = (use_rela_p
2677 ? bed->s->sizeof_rela
2678 : bed->s->sizeof_rel);
45d6a902 2679 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2680 rel_hdr->sh_flags = 0;
2681 rel_hdr->sh_addr = 0;
2682 rel_hdr->sh_size = 0;
2683 rel_hdr->sh_offset = 0;
2684
b34976b6 2685 return TRUE;
23bc299b
MM
2686}
2687
252b5132
RH
2688/* Set up an ELF internal section header for a section. */
2689
252b5132 2690static void
217aa764 2691elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2692{
9c5bfbb7 2693 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2694 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2695 Elf_Internal_Shdr *this_hdr;
2696
2697 if (*failedptr)
2698 {
2699 /* We already failed; just get out of the bfd_map_over_sections
2700 loop. */
2701 return;
2702 }
2703
2704 this_hdr = &elf_section_data (asect)->this_hdr;
2705
e57b5356
AM
2706 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2707 asect->name, FALSE);
2708 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2709 {
b34976b6 2710 *failedptr = TRUE;
252b5132
RH
2711 return;
2712 }
2713
a4d8e49b 2714 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2715
2716 if ((asect->flags & SEC_ALLOC) != 0
2717 || asect->user_set_vma)
2718 this_hdr->sh_addr = asect->vma;
2719 else
2720 this_hdr->sh_addr = 0;
2721
2722 this_hdr->sh_offset = 0;
eea6121a 2723 this_hdr->sh_size = asect->size;
252b5132
RH
2724 this_hdr->sh_link = 0;
2725 this_hdr->sh_addralign = 1 << asect->alignment_power;
2726 /* The sh_entsize and sh_info fields may have been set already by
2727 copy_private_section_data. */
2728
2729 this_hdr->bfd_section = asect;
2730 this_hdr->contents = NULL;
2731
3cddba1e
L
2732 /* If the section type is unspecified, we set it based on
2733 asect->flags. */
2734 if (this_hdr->sh_type == SHT_NULL)
2735 {
45c5e9ed 2736 if ((asect->flags & SEC_GROUP) != 0)
ccd2ec6a 2737 this_hdr->sh_type = SHT_GROUP;
45c5e9ed 2738 else if ((asect->flags & SEC_ALLOC) != 0
1ea63fd2
AM
2739 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2740 || (asect->flags & SEC_NEVER_LOAD) != 0))
3cddba1e
L
2741 this_hdr->sh_type = SHT_NOBITS;
2742 else
2743 this_hdr->sh_type = SHT_PROGBITS;
2744 }
2745
2f89ff8d 2746 switch (this_hdr->sh_type)
252b5132 2747 {
2f89ff8d 2748 default:
2f89ff8d
L
2749 break;
2750
2751 case SHT_STRTAB:
2752 case SHT_INIT_ARRAY:
2753 case SHT_FINI_ARRAY:
2754 case SHT_PREINIT_ARRAY:
2755 case SHT_NOTE:
2756 case SHT_NOBITS:
2757 case SHT_PROGBITS:
2758 break;
2759
2760 case SHT_HASH:
c7ac6ff8 2761 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2762 break;
5de3bf90 2763
2f89ff8d 2764 case SHT_DYNSYM:
252b5132 2765 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2766 break;
2767
2768 case SHT_DYNAMIC:
252b5132 2769 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2770 break;
2771
2772 case SHT_RELA:
2773 if (get_elf_backend_data (abfd)->may_use_rela_p)
2774 this_hdr->sh_entsize = bed->s->sizeof_rela;
2775 break;
2776
2777 case SHT_REL:
2778 if (get_elf_backend_data (abfd)->may_use_rel_p)
2779 this_hdr->sh_entsize = bed->s->sizeof_rel;
2780 break;
2781
2782 case SHT_GNU_versym:
252b5132 2783 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2784 break;
2785
2786 case SHT_GNU_verdef:
252b5132
RH
2787 this_hdr->sh_entsize = 0;
2788 /* objcopy or strip will copy over sh_info, but may not set
2789 cverdefs. The linker will set cverdefs, but sh_info will be
2790 zero. */
2791 if (this_hdr->sh_info == 0)
2792 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2793 else
2794 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2795 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2796 break;
2797
2798 case SHT_GNU_verneed:
252b5132
RH
2799 this_hdr->sh_entsize = 0;
2800 /* objcopy or strip will copy over sh_info, but may not set
2801 cverrefs. The linker will set cverrefs, but sh_info will be
2802 zero. */
2803 if (this_hdr->sh_info == 0)
2804 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2805 else
2806 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2807 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2808 break;
2809
2810 case SHT_GROUP:
dbb410c3 2811 this_hdr->sh_entsize = 4;
2f89ff8d 2812 break;
dbb410c3 2813 }
252b5132
RH
2814
2815 if ((asect->flags & SEC_ALLOC) != 0)
2816 this_hdr->sh_flags |= SHF_ALLOC;
2817 if ((asect->flags & SEC_READONLY) == 0)
2818 this_hdr->sh_flags |= SHF_WRITE;
2819 if ((asect->flags & SEC_CODE) != 0)
2820 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2821 if ((asect->flags & SEC_MERGE) != 0)
2822 {
2823 this_hdr->sh_flags |= SHF_MERGE;
2824 this_hdr->sh_entsize = asect->entsize;
2825 if ((asect->flags & SEC_STRINGS) != 0)
2826 this_hdr->sh_flags |= SHF_STRINGS;
2827 }
1126897b 2828 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2829 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2830 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2831 {
2832 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2833 if (asect->size == 0
2834 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2835 {
3a800eb9 2836 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2837
704afa60 2838 this_hdr->sh_size = 0;
3a800eb9
AM
2839 if (o != NULL)
2840 {
704afa60 2841 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2842 if (this_hdr->sh_size != 0)
2843 this_hdr->sh_type = SHT_NOBITS;
2844 }
704afa60
JJ
2845 }
2846 }
252b5132
RH
2847
2848 /* Check for processor-specific section types. */
e1fddb6b
AO
2849 if (bed->elf_backend_fake_sections
2850 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2851 *failedptr = TRUE;
252b5132
RH
2852
2853 /* If the section has relocs, set up a section header for the
23bc299b
MM
2854 SHT_REL[A] section. If two relocation sections are required for
2855 this section, it is up to the processor-specific back-end to
c044fabd 2856 create the other. */
23bc299b 2857 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2858 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2859 &elf_section_data (asect)->rel_hdr,
c044fabd 2860 asect,
68bfbfcc 2861 asect->use_rela_p))
b34976b6 2862 *failedptr = TRUE;
252b5132
RH
2863}
2864
dbb410c3
AM
2865/* Fill in the contents of a SHT_GROUP section. */
2866
1126897b 2867void
217aa764 2868bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2869{
217aa764 2870 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2871 unsigned long symindx;
9dce4196 2872 asection *elt, *first;
dbb410c3 2873 unsigned char *loc;
b34976b6 2874 bfd_boolean gas;
dbb410c3 2875
7e4111ad
L
2876 /* Ignore linker created group section. See elfNN_ia64_object_p in
2877 elfxx-ia64.c. */
2878 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2879 || *failedptr)
2880 return;
2881
1126897b
AM
2882 symindx = 0;
2883 if (elf_group_id (sec) != NULL)
2884 symindx = elf_group_id (sec)->udata.i;
2885
2886 if (symindx == 0)
2887 {
2888 /* If called from the assembler, swap_out_syms will have set up
2889 elf_section_syms; If called for "ld -r", use target_index. */
2890 if (elf_section_syms (abfd) != NULL)
2891 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2892 else
2893 symindx = sec->target_index;
2894 }
dbb410c3
AM
2895 elf_section_data (sec)->this_hdr.sh_info = symindx;
2896
1126897b 2897 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2898 gas = TRUE;
dbb410c3
AM
2899 if (sec->contents == NULL)
2900 {
b34976b6 2901 gas = FALSE;
eea6121a 2902 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2903
2904 /* Arrange for the section to be written out. */
2905 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2906 if (sec->contents == NULL)
2907 {
b34976b6 2908 *failedptr = TRUE;
dbb410c3
AM
2909 return;
2910 }
2911 }
2912
eea6121a 2913 loc = sec->contents + sec->size;
dbb410c3 2914
9dce4196
AM
2915 /* Get the pointer to the first section in the group that gas
2916 squirreled away here. objcopy arranges for this to be set to the
2917 start of the input section group. */
2918 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2919
2920 /* First element is a flag word. Rest of section is elf section
2921 indices for all the sections of the group. Write them backwards
2922 just to keep the group in the same order as given in .section
2923 directives, not that it matters. */
2924 while (elt != NULL)
2925 {
9dce4196
AM
2926 asection *s;
2927 unsigned int idx;
2928
dbb410c3 2929 loc -= 4;
9dce4196
AM
2930 s = elt;
2931 if (!gas)
2932 s = s->output_section;
2933 idx = 0;
2934 if (s != NULL)
2935 idx = elf_section_data (s)->this_idx;
2936 H_PUT_32 (abfd, idx, loc);
945906ff 2937 elt = elf_next_in_group (elt);
9dce4196
AM
2938 if (elt == first)
2939 break;
dbb410c3
AM
2940 }
2941
3d7f7666 2942 if ((loc -= 4) != sec->contents)
9dce4196 2943 abort ();
dbb410c3 2944
9dce4196 2945 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2946}
2947
252b5132
RH
2948/* Assign all ELF section numbers. The dummy first section is handled here
2949 too. The link/info pointers for the standard section types are filled
2950 in here too, while we're at it. */
2951
b34976b6 2952static bfd_boolean
da9f89d4 2953assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2954{
2955 struct elf_obj_tdata *t = elf_tdata (abfd);
2956 asection *sec;
2b0f7ef9 2957 unsigned int section_number, secn;
252b5132 2958 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2959 struct bfd_elf_section_data *d;
252b5132
RH
2960
2961 section_number = 1;
2962
2b0f7ef9
JJ
2963 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2964
da9f89d4
L
2965 /* SHT_GROUP sections are in relocatable files only. */
2966 if (link_info == NULL || link_info->relocatable)
252b5132 2967 {
da9f89d4 2968 /* Put SHT_GROUP sections first. */
04dd1667 2969 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2970 {
5daa8fe7 2971 d = elf_section_data (sec);
da9f89d4
L
2972
2973 if (d->this_hdr.sh_type == SHT_GROUP)
2974 {
5daa8fe7 2975 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2976 {
2977 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2978 bfd_section_list_remove (abfd, sec);
da9f89d4 2979 abfd->section_count--;
da9f89d4
L
2980 }
2981 else
2982 {
2983 if (section_number == SHN_LORESERVE)
2984 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2985 d->this_idx = section_number++;
2986 }
2987 }
47cc2cf5
PB
2988 }
2989 }
2990
2991 for (sec = abfd->sections; sec; sec = sec->next)
2992 {
2993 d = elf_section_data (sec);
2994
2995 if (d->this_hdr.sh_type != SHT_GROUP)
2996 {
2997 if (section_number == SHN_LORESERVE)
2998 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2999 d->this_idx = section_number++;
3000 }
2b0f7ef9 3001 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
3002 if ((sec->flags & SEC_RELOC) == 0)
3003 d->rel_idx = 0;
3004 else
2b0f7ef9 3005 {
9ad5cbcf
AM
3006 if (section_number == SHN_LORESERVE)
3007 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
3008 d->rel_idx = section_number++;
3009 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
3010 }
23bc299b
MM
3011
3012 if (d->rel_hdr2)
2b0f7ef9 3013 {
9ad5cbcf
AM
3014 if (section_number == SHN_LORESERVE)
3015 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
3016 d->rel_idx2 = section_number++;
3017 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
3018 }
23bc299b
MM
3019 else
3020 d->rel_idx2 = 0;
252b5132
RH
3021 }
3022
9ad5cbcf
AM
3023 if (section_number == SHN_LORESERVE)
3024 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3025 t->shstrtab_section = section_number++;
2b0f7ef9 3026 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 3027 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
3028
3029 if (bfd_get_symcount (abfd) > 0)
3030 {
9ad5cbcf
AM
3031 if (section_number == SHN_LORESERVE)
3032 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3033 t->symtab_section = section_number++;
2b0f7ef9 3034 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
3035 if (section_number > SHN_LORESERVE - 2)
3036 {
3037 if (section_number == SHN_LORESERVE)
3038 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
3039 t->symtab_shndx_section = section_number++;
3040 t->symtab_shndx_hdr.sh_name
3041 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3042 ".symtab_shndx", FALSE);
9ad5cbcf 3043 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 3044 return FALSE;
9ad5cbcf
AM
3045 }
3046 if (section_number == SHN_LORESERVE)
3047 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3048 t->strtab_section = section_number++;
2b0f7ef9 3049 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3050 }
3051
2b0f7ef9
JJ
3052 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3053 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3054
3055 elf_numsections (abfd) = section_number;
252b5132 3056 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
3057 if (section_number > SHN_LORESERVE)
3058 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
3059
3060 /* Set up the list of section header pointers, in agreement with the
3061 indices. */
d0fb9a8d 3062 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 3063 if (i_shdrp == NULL)
b34976b6 3064 return FALSE;
252b5132 3065
d0fb9a8d 3066 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
3067 if (i_shdrp[0] == NULL)
3068 {
3069 bfd_release (abfd, i_shdrp);
b34976b6 3070 return FALSE;
252b5132 3071 }
252b5132
RH
3072
3073 elf_elfsections (abfd) = i_shdrp;
3074
3075 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3076 if (bfd_get_symcount (abfd) > 0)
3077 {
3078 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3079 if (elf_numsections (abfd) > SHN_LORESERVE)
3080 {
3081 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3082 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3083 }
252b5132
RH
3084 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3085 t->symtab_hdr.sh_link = t->strtab_section;
3086 }
38ce5b11 3087
252b5132
RH
3088 for (sec = abfd->sections; sec; sec = sec->next)
3089 {
3090 struct bfd_elf_section_data *d = elf_section_data (sec);
3091 asection *s;
3092 const char *name;
3093
3094 i_shdrp[d->this_idx] = &d->this_hdr;
3095 if (d->rel_idx != 0)
3096 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3097 if (d->rel_idx2 != 0)
3098 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3099
3100 /* Fill in the sh_link and sh_info fields while we're at it. */
3101
3102 /* sh_link of a reloc section is the section index of the symbol
3103 table. sh_info is the section index of the section to which
3104 the relocation entries apply. */
3105 if (d->rel_idx != 0)
3106 {
3107 d->rel_hdr.sh_link = t->symtab_section;
3108 d->rel_hdr.sh_info = d->this_idx;
3109 }
23bc299b
MM
3110 if (d->rel_idx2 != 0)
3111 {
3112 d->rel_hdr2->sh_link = t->symtab_section;
3113 d->rel_hdr2->sh_info = d->this_idx;
3114 }
252b5132 3115
38ce5b11
L
3116 /* We need to set up sh_link for SHF_LINK_ORDER. */
3117 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3118 {
3119 s = elf_linked_to_section (sec);
3120 if (s)
38ce5b11 3121 {
f2876037 3122 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3123 if (link_info != NULL)
38ce5b11 3124 {
f2876037 3125 /* Check discarded linkonce section. */
ccd2ec6a 3126 if (elf_discarded_section (s))
38ce5b11 3127 {
ccd2ec6a
L
3128 asection *kept;
3129 (*_bfd_error_handler)
3130 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3131 abfd, d->this_hdr.bfd_section,
3132 s, s->owner);
3133 /* Point to the kept section if it has the same
3134 size as the discarded one. */
3135 kept = _bfd_elf_check_kept_section (s);
3136 if (kept == NULL)
185d09ad 3137 {
ccd2ec6a
L
3138 bfd_set_error (bfd_error_bad_value);
3139 return FALSE;
185d09ad 3140 }
ccd2ec6a 3141 s = kept;
38ce5b11 3142 }
e424ecc8 3143
ccd2ec6a
L
3144 s = s->output_section;
3145 BFD_ASSERT (s != NULL);
38ce5b11 3146 }
f2876037
L
3147 else
3148 {
3149 /* Handle objcopy. */
3150 if (s->output_section == NULL)
3151 {
3152 (*_bfd_error_handler)
3153 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3154 abfd, d->this_hdr.bfd_section, s, s->owner);
3155 bfd_set_error (bfd_error_bad_value);
3156 return FALSE;
3157 }
3158 s = s->output_section;
3159 }
ccd2ec6a
L
3160 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3161 }
3162 else
3163 {
3164 /* PR 290:
3165 The Intel C compiler generates SHT_IA_64_UNWIND with
3166 SHF_LINK_ORDER. But it doesn't set the sh_link or
3167 sh_info fields. Hence we could get the situation
3168 where s is NULL. */
3169 const struct elf_backend_data *bed
3170 = get_elf_backend_data (abfd);
3171 if (bed->link_order_error_handler)
3172 bed->link_order_error_handler
3173 (_("%B: warning: sh_link not set for section `%A'"),
3174 abfd, sec);
38ce5b11
L
3175 }
3176 }
3177
252b5132
RH
3178 switch (d->this_hdr.sh_type)
3179 {
3180 case SHT_REL:
3181 case SHT_RELA:
3182 /* A reloc section which we are treating as a normal BFD
3183 section. sh_link is the section index of the symbol
3184 table. sh_info is the section index of the section to
3185 which the relocation entries apply. We assume that an
3186 allocated reloc section uses the dynamic symbol table.
3187 FIXME: How can we be sure? */
3188 s = bfd_get_section_by_name (abfd, ".dynsym");
3189 if (s != NULL)
3190 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3191
3192 /* We look up the section the relocs apply to by name. */
3193 name = sec->name;
3194 if (d->this_hdr.sh_type == SHT_REL)
3195 name += 4;
3196 else
3197 name += 5;
3198 s = bfd_get_section_by_name (abfd, name);
3199 if (s != NULL)
3200 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3201 break;
3202
3203 case SHT_STRTAB:
3204 /* We assume that a section named .stab*str is a stabs
3205 string section. We look for a section with the same name
3206 but without the trailing ``str'', and set its sh_link
3207 field to point to this section. */
3208 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
3209 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3210 {
3211 size_t len;
3212 char *alc;
3213
3214 len = strlen (sec->name);
217aa764 3215 alc = bfd_malloc (len - 2);
252b5132 3216 if (alc == NULL)
b34976b6 3217 return FALSE;
d4c88bbb 3218 memcpy (alc, sec->name, len - 3);
252b5132
RH
3219 alc[len - 3] = '\0';
3220 s = bfd_get_section_by_name (abfd, alc);
3221 free (alc);
3222 if (s != NULL)
3223 {
3224 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3225
3226 /* This is a .stab section. */
0594c12d
AM
3227 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3228 elf_section_data (s)->this_hdr.sh_entsize
3229 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3230 }
3231 }
3232 break;
3233
3234 case SHT_DYNAMIC:
3235 case SHT_DYNSYM:
3236 case SHT_GNU_verneed:
3237 case SHT_GNU_verdef:
3238 /* sh_link is the section header index of the string table
3239 used for the dynamic entries, or the symbol table, or the
3240 version strings. */
3241 s = bfd_get_section_by_name (abfd, ".dynstr");
3242 if (s != NULL)
3243 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3244 break;
3245
7f1204bb
JJ
3246 case SHT_GNU_LIBLIST:
3247 /* sh_link is the section header index of the prelink library
3248 list
3249 used for the dynamic entries, or the symbol table, or the
3250 version strings. */
3251 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3252 ? ".dynstr" : ".gnu.libstr");
3253 if (s != NULL)
3254 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3255 break;
3256
252b5132
RH
3257 case SHT_HASH:
3258 case SHT_GNU_versym:
3259 /* sh_link is the section header index of the symbol table
3260 this hash table or version table is for. */
3261 s = bfd_get_section_by_name (abfd, ".dynsym");
3262 if (s != NULL)
3263 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3264 break;
dbb410c3
AM
3265
3266 case SHT_GROUP:
3267 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3268 }
3269 }
3270
2b0f7ef9 3271 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3272 if (i_shdrp[secn] == NULL)
3273 i_shdrp[secn] = i_shdrp[0];
3274 else
3275 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3276 i_shdrp[secn]->sh_name);
b34976b6 3277 return TRUE;
252b5132
RH
3278}
3279
3280/* Map symbol from it's internal number to the external number, moving
3281 all local symbols to be at the head of the list. */
3282
268b6b39 3283static int
217aa764 3284sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3285{
3286 /* If the backend has a special mapping, use it. */
9c5bfbb7 3287 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3288 if (bed->elf_backend_sym_is_global)
3289 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3290
3291 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3292 || bfd_is_und_section (bfd_get_section (sym))
3293 || bfd_is_com_section (bfd_get_section (sym)));
3294}
3295
b34976b6 3296static bfd_boolean
217aa764 3297elf_map_symbols (bfd *abfd)
252b5132 3298{
dc810e39 3299 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3300 asymbol **syms = bfd_get_outsymbols (abfd);
3301 asymbol **sect_syms;
dc810e39
AM
3302 unsigned int num_locals = 0;
3303 unsigned int num_globals = 0;
3304 unsigned int num_locals2 = 0;
3305 unsigned int num_globals2 = 0;
252b5132 3306 int max_index = 0;
dc810e39 3307 unsigned int idx;
252b5132
RH
3308 asection *asect;
3309 asymbol **new_syms;
252b5132
RH
3310
3311#ifdef DEBUG
3312 fprintf (stderr, "elf_map_symbols\n");
3313 fflush (stderr);
3314#endif
3315
252b5132
RH
3316 for (asect = abfd->sections; asect; asect = asect->next)
3317 {
3318 if (max_index < asect->index)
3319 max_index = asect->index;
3320 }
3321
3322 max_index++;
d0fb9a8d 3323 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3324 if (sect_syms == NULL)
b34976b6 3325 return FALSE;
252b5132 3326 elf_section_syms (abfd) = sect_syms;
4e89ac30 3327 elf_num_section_syms (abfd) = max_index;
252b5132 3328
079e9a2f
AM
3329 /* Init sect_syms entries for any section symbols we have already
3330 decided to output. */
252b5132
RH
3331 for (idx = 0; idx < symcount; idx++)
3332 {
dc810e39 3333 asymbol *sym = syms[idx];
c044fabd 3334
252b5132
RH
3335 if ((sym->flags & BSF_SECTION_SYM) != 0
3336 && sym->value == 0)
3337 {
3338 asection *sec;
3339
3340 sec = sym->section;
3341
3342 if (sec->owner != NULL)
3343 {
3344 if (sec->owner != abfd)
3345 {
3346 if (sec->output_offset != 0)
3347 continue;
c044fabd 3348
252b5132
RH
3349 sec = sec->output_section;
3350
079e9a2f
AM
3351 /* Empty sections in the input files may have had a
3352 section symbol created for them. (See the comment
3353 near the end of _bfd_generic_link_output_symbols in
3354 linker.c). If the linker script discards such
3355 sections then we will reach this point. Since we know
3356 that we cannot avoid this case, we detect it and skip
3357 the abort and the assignment to the sect_syms array.
3358 To reproduce this particular case try running the
3359 linker testsuite test ld-scripts/weak.exp for an ELF
3360 port that uses the generic linker. */
252b5132
RH
3361 if (sec->owner == NULL)
3362 continue;
3363
3364 BFD_ASSERT (sec->owner == abfd);
3365 }
3366 sect_syms[sec->index] = syms[idx];
3367 }
3368 }
3369 }
3370
252b5132
RH
3371 /* Classify all of the symbols. */
3372 for (idx = 0; idx < symcount; idx++)
3373 {
3374 if (!sym_is_global (abfd, syms[idx]))
3375 num_locals++;
3376 else
3377 num_globals++;
3378 }
079e9a2f
AM
3379
3380 /* We will be adding a section symbol for each BFD section. Most normal
3381 sections will already have a section symbol in outsymbols, but
3382 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3383 at least in that case. */
252b5132
RH
3384 for (asect = abfd->sections; asect; asect = asect->next)
3385 {
079e9a2f 3386 if (sect_syms[asect->index] == NULL)
252b5132 3387 {
079e9a2f 3388 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3389 num_locals++;
3390 else
3391 num_globals++;
252b5132
RH
3392 }
3393 }
3394
3395 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3396 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3397
252b5132 3398 if (new_syms == NULL)
b34976b6 3399 return FALSE;
252b5132
RH
3400
3401 for (idx = 0; idx < symcount; idx++)
3402 {
3403 asymbol *sym = syms[idx];
dc810e39 3404 unsigned int i;
252b5132
RH
3405
3406 if (!sym_is_global (abfd, sym))
3407 i = num_locals2++;
3408 else
3409 i = num_locals + num_globals2++;
3410 new_syms[i] = sym;
3411 sym->udata.i = i + 1;
3412 }
3413 for (asect = abfd->sections; asect; asect = asect->next)
3414 {
079e9a2f 3415 if (sect_syms[asect->index] == NULL)
252b5132 3416 {
079e9a2f 3417 asymbol *sym = asect->symbol;
dc810e39 3418 unsigned int i;
252b5132 3419
079e9a2f 3420 sect_syms[asect->index] = sym;
252b5132
RH
3421 if (!sym_is_global (abfd, sym))
3422 i = num_locals2++;
3423 else
3424 i = num_locals + num_globals2++;
3425 new_syms[i] = sym;
3426 sym->udata.i = i + 1;
3427 }
3428 }
3429
3430 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3431
3432 elf_num_locals (abfd) = num_locals;
3433 elf_num_globals (abfd) = num_globals;
b34976b6 3434 return TRUE;
252b5132
RH
3435}
3436
3437/* Align to the maximum file alignment that could be required for any
3438 ELF data structure. */
3439
268b6b39 3440static inline file_ptr
217aa764 3441align_file_position (file_ptr off, int align)
252b5132
RH
3442{
3443 return (off + align - 1) & ~(align - 1);
3444}
3445
3446/* Assign a file position to a section, optionally aligning to the
3447 required section alignment. */
3448
217aa764
AM
3449file_ptr
3450_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3451 file_ptr offset,
3452 bfd_boolean align)
252b5132
RH
3453{
3454 if (align)
3455 {
3456 unsigned int al;
3457
3458 al = i_shdrp->sh_addralign;
3459 if (al > 1)
3460 offset = BFD_ALIGN (offset, al);
3461 }
3462 i_shdrp->sh_offset = offset;
3463 if (i_shdrp->bfd_section != NULL)
3464 i_shdrp->bfd_section->filepos = offset;
3465 if (i_shdrp->sh_type != SHT_NOBITS)
3466 offset += i_shdrp->sh_size;
3467 return offset;
3468}
3469
3470/* Compute the file positions we are going to put the sections at, and
3471 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3472 is not NULL, this is being called by the ELF backend linker. */
3473
b34976b6 3474bfd_boolean
217aa764
AM
3475_bfd_elf_compute_section_file_positions (bfd *abfd,
3476 struct bfd_link_info *link_info)
252b5132 3477{
9c5bfbb7 3478 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3479 bfd_boolean failed;
4b6c0f2f 3480 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3481 Elf_Internal_Shdr *shstrtab_hdr;
3482
3483 if (abfd->output_has_begun)
b34976b6 3484 return TRUE;
252b5132
RH
3485
3486 /* Do any elf backend specific processing first. */
3487 if (bed->elf_backend_begin_write_processing)
3488 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3489
3490 if (! prep_headers (abfd))
b34976b6 3491 return FALSE;
252b5132 3492
e6c51ed4
NC
3493 /* Post process the headers if necessary. */
3494 if (bed->elf_backend_post_process_headers)
3495 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3496
b34976b6 3497 failed = FALSE;
252b5132
RH
3498 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3499 if (failed)
b34976b6 3500 return FALSE;
252b5132 3501
da9f89d4 3502 if (!assign_section_numbers (abfd, link_info))
b34976b6 3503 return FALSE;
252b5132
RH
3504
3505 /* The backend linker builds symbol table information itself. */
3506 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3507 {
3508 /* Non-zero if doing a relocatable link. */
3509 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3510
3511 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3512 return FALSE;
252b5132
RH
3513 }
3514
1126897b 3515 if (link_info == NULL)
dbb410c3 3516 {
1126897b 3517 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3518 if (failed)
b34976b6 3519 return FALSE;
dbb410c3
AM
3520 }
3521
252b5132
RH
3522 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3523 /* sh_name was set in prep_headers. */
3524 shstrtab_hdr->sh_type = SHT_STRTAB;
3525 shstrtab_hdr->sh_flags = 0;
3526 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3527 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3528 shstrtab_hdr->sh_entsize = 0;
3529 shstrtab_hdr->sh_link = 0;
3530 shstrtab_hdr->sh_info = 0;
3531 /* sh_offset is set in assign_file_positions_except_relocs. */
3532 shstrtab_hdr->sh_addralign = 1;
3533
c84fca4d 3534 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3535 return FALSE;
252b5132
RH
3536
3537 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3538 {
3539 file_ptr off;
3540 Elf_Internal_Shdr *hdr;
3541
3542 off = elf_tdata (abfd)->next_file_pos;
3543
3544 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3545 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3546
9ad5cbcf
AM
3547 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3548 if (hdr->sh_size != 0)
b34976b6 3549 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3550
252b5132 3551 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3552 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3553
3554 elf_tdata (abfd)->next_file_pos = off;
3555
3556 /* Now that we know where the .strtab section goes, write it
3557 out. */
3558 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3559 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3560 return FALSE;
252b5132
RH
3561 _bfd_stringtab_free (strtab);
3562 }
3563
b34976b6 3564 abfd->output_has_begun = TRUE;
252b5132 3565
b34976b6 3566 return TRUE;
252b5132
RH
3567}
3568
3569/* Create a mapping from a set of sections to a program segment. */
3570
217aa764
AM
3571static struct elf_segment_map *
3572make_mapping (bfd *abfd,
3573 asection **sections,
3574 unsigned int from,
3575 unsigned int to,
3576 bfd_boolean phdr)
252b5132
RH
3577{
3578 struct elf_segment_map *m;
3579 unsigned int i;
3580 asection **hdrpp;
dc810e39 3581 bfd_size_type amt;
252b5132 3582
dc810e39
AM
3583 amt = sizeof (struct elf_segment_map);
3584 amt += (to - from - 1) * sizeof (asection *);
217aa764 3585 m = bfd_zalloc (abfd, amt);
252b5132
RH
3586 if (m == NULL)
3587 return NULL;
3588 m->next = NULL;
3589 m->p_type = PT_LOAD;
3590 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3591 m->sections[i - from] = *hdrpp;
3592 m->count = to - from;
3593
3594 if (from == 0 && phdr)
3595 {
3596 /* Include the headers in the first PT_LOAD segment. */
3597 m->includes_filehdr = 1;
3598 m->includes_phdrs = 1;
3599 }
3600
3601 return m;
3602}
3603
229fcec5
MM
3604/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3605 on failure. */
3606
3607struct elf_segment_map *
3608_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3609{
3610 struct elf_segment_map *m;
3611
3612 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3613 if (m == NULL)
3614 return NULL;
3615 m->next = NULL;
3616 m->p_type = PT_DYNAMIC;
3617 m->count = 1;
3618 m->sections[0] = dynsec;
3619
3620 return m;
3621}
3622
252b5132
RH
3623/* Set up a mapping from BFD sections to program segments. */
3624
b34976b6 3625static bfd_boolean
217aa764 3626map_sections_to_segments (bfd *abfd)
252b5132
RH
3627{
3628 asection **sections = NULL;
3629 asection *s;
3630 unsigned int i;
3631 unsigned int count;
3632 struct elf_segment_map *mfirst;
3633 struct elf_segment_map **pm;
3634 struct elf_segment_map *m;
3635 asection *last_hdr;
baaff79e 3636 bfd_vma last_size;
252b5132
RH
3637 unsigned int phdr_index;
3638 bfd_vma maxpagesize;
3639 asection **hdrpp;
b34976b6
AM
3640 bfd_boolean phdr_in_segment = TRUE;
3641 bfd_boolean writable;
13ae64f3
JJ
3642 int tls_count = 0;
3643 asection *first_tls = NULL;
65765700 3644 asection *dynsec, *eh_frame_hdr;
dc810e39 3645 bfd_size_type amt;
252b5132
RH
3646
3647 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3648 return TRUE;
252b5132
RH
3649
3650 if (bfd_count_sections (abfd) == 0)
b34976b6 3651 return TRUE;
252b5132
RH
3652
3653 /* Select the allocated sections, and sort them. */
3654
d0fb9a8d 3655 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
252b5132
RH
3656 if (sections == NULL)
3657 goto error_return;
3658
3659 i = 0;
3660 for (s = abfd->sections; s != NULL; s = s->next)
3661 {
3662 if ((s->flags & SEC_ALLOC) != 0)
3663 {
3664 sections[i] = s;
3665 ++i;
3666 }
3667 }
3668 BFD_ASSERT (i <= bfd_count_sections (abfd));
3669 count = i;
3670
3671 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3672
3673 /* Build the mapping. */
3674
3675 mfirst = NULL;
3676 pm = &mfirst;
3677
3678 /* If we have a .interp section, then create a PT_PHDR segment for
3679 the program headers and a PT_INTERP segment for the .interp
3680 section. */
3681 s = bfd_get_section_by_name (abfd, ".interp");
3682 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3683 {
dc810e39 3684 amt = sizeof (struct elf_segment_map);
217aa764 3685 m = bfd_zalloc (abfd, amt);
252b5132
RH
3686 if (m == NULL)
3687 goto error_return;
3688 m->next = NULL;
3689 m->p_type = PT_PHDR;
3690 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3691 m->p_flags = PF_R | PF_X;
3692 m->p_flags_valid = 1;
3693 m->includes_phdrs = 1;
3694
3695 *pm = m;
3696 pm = &m->next;
3697
dc810e39 3698 amt = sizeof (struct elf_segment_map);
217aa764 3699 m = bfd_zalloc (abfd, amt);
252b5132
RH
3700 if (m == NULL)
3701 goto error_return;
3702 m->next = NULL;
3703 m->p_type = PT_INTERP;
3704 m->count = 1;
3705 m->sections[0] = s;
3706
3707 *pm = m;
3708 pm = &m->next;
3709 }
3710
3711 /* Look through the sections. We put sections in the same program
3712 segment when the start of the second section can be placed within
3713 a few bytes of the end of the first section. */
3714 last_hdr = NULL;
baaff79e 3715 last_size = 0;
252b5132
RH
3716 phdr_index = 0;
3717 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3718 writable = FALSE;
252b5132
RH
3719 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3720 if (dynsec != NULL
3721 && (dynsec->flags & SEC_LOAD) == 0)
3722 dynsec = NULL;
3723
3724 /* Deal with -Ttext or something similar such that the first section
3725 is not adjacent to the program headers. This is an
3726 approximation, since at this point we don't know exactly how many
3727 program headers we will need. */
3728 if (count > 0)
3729 {
3730 bfd_size_type phdr_size;
3731
3732 phdr_size = elf_tdata (abfd)->program_header_size;
3733 if (phdr_size == 0)
3734 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3735 if ((abfd->flags & D_PAGED) == 0
3736 || sections[0]->lma < phdr_size
3737 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3738 phdr_in_segment = FALSE;
252b5132
RH
3739 }
3740
3741 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3742 {
3743 asection *hdr;
b34976b6 3744 bfd_boolean new_segment;
252b5132
RH
3745
3746 hdr = *hdrpp;
3747
3748 /* See if this section and the last one will fit in the same
3749 segment. */
3750
3751 if (last_hdr == NULL)
3752 {
3753 /* If we don't have a segment yet, then we don't need a new
3754 one (we build the last one after this loop). */
b34976b6 3755 new_segment = FALSE;
252b5132
RH
3756 }
3757 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3758 {
3759 /* If this section has a different relation between the
3760 virtual address and the load address, then we need a new
3761 segment. */
b34976b6 3762 new_segment = TRUE;
252b5132 3763 }
baaff79e 3764 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3765 < BFD_ALIGN (hdr->lma, maxpagesize))
3766 {
3767 /* If putting this section in this segment would force us to
3768 skip a page in the segment, then we need a new segment. */
b34976b6 3769 new_segment = TRUE;
252b5132 3770 }
baaff79e
JJ
3771 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3772 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3773 {
3774 /* We don't want to put a loadable section after a
baaff79e
JJ
3775 nonloadable section in the same segment.
3776 Consider .tbss sections as loadable for this purpose. */
b34976b6 3777 new_segment = TRUE;
252b5132
RH
3778 }
3779 else if ((abfd->flags & D_PAGED) == 0)
3780 {
3781 /* If the file is not demand paged, which means that we
3782 don't require the sections to be correctly aligned in the
3783 file, then there is no other reason for a new segment. */
b34976b6 3784 new_segment = FALSE;
252b5132
RH
3785 }
3786 else if (! writable
3787 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3788 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3789 & ~(maxpagesize - 1))
3790 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3791 {
3792 /* We don't want to put a writable section in a read only
3793 segment, unless they are on the same page in memory
3794 anyhow. We already know that the last section does not
3795 bring us past the current section on the page, so the
3796 only case in which the new section is not on the same
3797 page as the previous section is when the previous section
3798 ends precisely on a page boundary. */
b34976b6 3799 new_segment = TRUE;
252b5132
RH
3800 }
3801 else
3802 {
3803 /* Otherwise, we can use the same segment. */
b34976b6 3804 new_segment = FALSE;
252b5132
RH
3805 }
3806
3807 if (! new_segment)
3808 {
3809 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3810 writable = TRUE;
baaff79e
JJ
3811 last_hdr = hdr;
3812 /* .tbss sections effectively have zero size. */
e5caec89 3813 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3814 last_size = hdr->size;
baaff79e
JJ
3815 else
3816 last_size = 0;
252b5132
RH
3817 continue;
3818 }
3819
3820 /* We need a new program segment. We must create a new program
3821 header holding all the sections from phdr_index until hdr. */
3822
3823 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3824 if (m == NULL)
3825 goto error_return;
3826
3827 *pm = m;
3828 pm = &m->next;
3829
3830 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3831 writable = TRUE;
252b5132 3832 else
b34976b6 3833 writable = FALSE;
252b5132
RH
3834
3835 last_hdr = hdr;
baaff79e
JJ
3836 /* .tbss sections effectively have zero size. */
3837 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3838 last_size = hdr->size;
baaff79e
JJ
3839 else
3840 last_size = 0;
252b5132 3841 phdr_index = i;
b34976b6 3842 phdr_in_segment = FALSE;
252b5132
RH
3843 }
3844
3845 /* Create a final PT_LOAD program segment. */
3846 if (last_hdr != NULL)
3847 {
3848 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3849 if (m == NULL)
3850 goto error_return;
3851
3852 *pm = m;
3853 pm = &m->next;
3854 }
3855
3856 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3857 if (dynsec != NULL)
3858 {
229fcec5 3859 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3860 if (m == NULL)
3861 goto error_return;
252b5132
RH
3862 *pm = m;
3863 pm = &m->next;
3864 }
3865
3866 /* For each loadable .note section, add a PT_NOTE segment. We don't
3867 use bfd_get_section_by_name, because if we link together
3868 nonloadable .note sections and loadable .note sections, we will
3869 generate two .note sections in the output file. FIXME: Using
3870 names for section types is bogus anyhow. */
3871 for (s = abfd->sections; s != NULL; s = s->next)
3872 {
3873 if ((s->flags & SEC_LOAD) != 0
3874 && strncmp (s->name, ".note", 5) == 0)
3875 {
dc810e39 3876 amt = sizeof (struct elf_segment_map);
217aa764 3877 m = bfd_zalloc (abfd, amt);
252b5132
RH
3878 if (m == NULL)
3879 goto error_return;
3880 m->next = NULL;
3881 m->p_type = PT_NOTE;
3882 m->count = 1;
3883 m->sections[0] = s;
3884
3885 *pm = m;
3886 pm = &m->next;
3887 }
13ae64f3
JJ
3888 if (s->flags & SEC_THREAD_LOCAL)
3889 {
3890 if (! tls_count)
3891 first_tls = s;
3892 tls_count++;
3893 }
3894 }
3895
3896 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3897 if (tls_count > 0)
3898 {
3899 int i;
3900
3901 amt = sizeof (struct elf_segment_map);
3902 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3903 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3904 if (m == NULL)
3905 goto error_return;
3906 m->next = NULL;
3907 m->p_type = PT_TLS;
3908 m->count = tls_count;
3909 /* Mandated PF_R. */
3910 m->p_flags = PF_R;
3911 m->p_flags_valid = 1;
3912 for (i = 0; i < tls_count; ++i)
3913 {
3914 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3915 m->sections[i] = first_tls;
3916 first_tls = first_tls->next;
3917 }
3918
3919 *pm = m;
3920 pm = &m->next;
252b5132
RH
3921 }
3922
65765700
JJ
3923 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3924 segment. */
126495ed
AM
3925 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3926 if (eh_frame_hdr != NULL
3927 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3928 {
3929 amt = sizeof (struct elf_segment_map);
217aa764 3930 m = bfd_zalloc (abfd, amt);
65765700
JJ
3931 if (m == NULL)
3932 goto error_return;
3933 m->next = NULL;
3934 m->p_type = PT_GNU_EH_FRAME;
3935 m->count = 1;
126495ed 3936 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3937
3938 *pm = m;
3939 pm = &m->next;
3940 }
3941
9ee5e499
JJ
3942 if (elf_tdata (abfd)->stack_flags)
3943 {
3944 amt = sizeof (struct elf_segment_map);
217aa764 3945 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3946 if (m == NULL)
3947 goto error_return;
3948 m->next = NULL;
3949 m->p_type = PT_GNU_STACK;
3950 m->p_flags = elf_tdata (abfd)->stack_flags;
3951 m->p_flags_valid = 1;
3952
3953 *pm = m;
3954 pm = &m->next;
3955 }
3956
8c37241b
JJ
3957 if (elf_tdata (abfd)->relro)
3958 {
3959 amt = sizeof (struct elf_segment_map);
3960 m = bfd_zalloc (abfd, amt);
3961 if (m == NULL)
3962 goto error_return;
3963 m->next = NULL;
3964 m->p_type = PT_GNU_RELRO;
3965 m->p_flags = PF_R;
3966 m->p_flags_valid = 1;
3967
3968 *pm = m;
3969 pm = &m->next;
3970 }
3971
252b5132
RH
3972 free (sections);
3973 sections = NULL;
3974
3975 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3976 return TRUE;
252b5132
RH
3977
3978 error_return:
3979 if (sections != NULL)
3980 free (sections);
b34976b6 3981 return FALSE;
252b5132
RH
3982}
3983
3984/* Sort sections by address. */
3985
3986static int
217aa764 3987elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3988{
3989 const asection *sec1 = *(const asection **) arg1;
3990 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3991 bfd_size_type size1, size2;
252b5132
RH
3992
3993 /* Sort by LMA first, since this is the address used to
3994 place the section into a segment. */
3995 if (sec1->lma < sec2->lma)
3996 return -1;
3997 else if (sec1->lma > sec2->lma)
3998 return 1;
3999
4000 /* Then sort by VMA. Normally the LMA and the VMA will be
4001 the same, and this will do nothing. */
4002 if (sec1->vma < sec2->vma)
4003 return -1;
4004 else if (sec1->vma > sec2->vma)
4005 return 1;
4006
4007 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4008
07c6e936 4009#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4010
4011 if (TOEND (sec1))
4012 {
4013 if (TOEND (sec2))
00a7cdc5
NC
4014 {
4015 /* If the indicies are the same, do not return 0
4016 here, but continue to try the next comparison. */
4017 if (sec1->target_index - sec2->target_index != 0)
4018 return sec1->target_index - sec2->target_index;
4019 }
252b5132
RH
4020 else
4021 return 1;
4022 }
00a7cdc5 4023 else if (TOEND (sec2))
252b5132
RH
4024 return -1;
4025
4026#undef TOEND
4027
00a7cdc5
NC
4028 /* Sort by size, to put zero sized sections
4029 before others at the same address. */
252b5132 4030
eea6121a
AM
4031 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4032 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4033
4034 if (size1 < size2)
252b5132 4035 return -1;
eecdbe52 4036 if (size1 > size2)
252b5132
RH
4037 return 1;
4038
4039 return sec1->target_index - sec2->target_index;
4040}
4041
340b6d91
AC
4042/* Ian Lance Taylor writes:
4043
4044 We shouldn't be using % with a negative signed number. That's just
4045 not good. We have to make sure either that the number is not
4046 negative, or that the number has an unsigned type. When the types
4047 are all the same size they wind up as unsigned. When file_ptr is a
4048 larger signed type, the arithmetic winds up as signed long long,
4049 which is wrong.
4050
4051 What we're trying to say here is something like ``increase OFF by
4052 the least amount that will cause it to be equal to the VMA modulo
4053 the page size.'' */
4054/* In other words, something like:
4055
4056 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4057 off_offset = off % bed->maxpagesize;
4058 if (vma_offset < off_offset)
4059 adjustment = vma_offset + bed->maxpagesize - off_offset;
4060 else
4061 adjustment = vma_offset - off_offset;
4062
4063 which can can be collapsed into the expression below. */
4064
4065static file_ptr
4066vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4067{
4068 return ((vma - off) % maxpagesize);
4069}
4070
cedc298e
L
4071static void
4072print_segment_map (bfd *abfd)
4073{
4074 struct elf_segment_map *m;
4075 unsigned int i, j;
4076
4077 fprintf (stderr, _(" Section to Segment mapping:\n"));
4078 fprintf (stderr, _(" Segment Sections...\n"));
4079
4080 for (i= 0, m = elf_tdata (abfd)->segment_map;
4081 m != NULL;
4082 i++, m = m->next)
4083 {
4084 const char *pt = get_segment_type (m->p_type);
4085 char buf[32];
4086
4087 if (pt == NULL)
4088 {
4089 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4090 sprintf (buf, "LOPROC+%7.7x",
4091 (unsigned int) (m->p_type - PT_LOPROC));
4092 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4093 sprintf (buf, "LOOS+%7.7x",
4094 (unsigned int) (m->p_type - PT_LOOS));
4095 else
4096 snprintf (buf, sizeof (buf), "%8.8x",
4097 (unsigned int) m->p_type);
4098 pt = buf;
4099 }
4100 fprintf (stderr, " %2.2d: %14.14s: ", i, pt);
4101 for (j = 0; j < m->count; j++)
4102 fprintf (stderr, "%s ", m->sections [j]->name);
4103 putc ('\n',stderr);
4104 }
4105}
4106
252b5132
RH
4107/* Assign file positions to the sections based on the mapping from
4108 sections to segments. This function also sets up some fields in
f3520d2f 4109 the file header. */
252b5132 4110
b34976b6 4111static bfd_boolean
f3520d2f
AM
4112assign_file_positions_for_load_sections (bfd *abfd,
4113 struct bfd_link_info *link_info)
252b5132
RH
4114{
4115 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4116 struct elf_segment_map *m;
252b5132 4117 Elf_Internal_Phdr *phdrs;
252b5132 4118 Elf_Internal_Phdr *p;
f3520d2f
AM
4119 file_ptr off, voff;
4120 unsigned int count;
4121 unsigned int alloc;
5c182d5f 4122 unsigned int i;
252b5132
RH
4123
4124 if (elf_tdata (abfd)->segment_map == NULL)
4125 {
4126 if (! map_sections_to_segments (abfd))
b34976b6 4127 return FALSE;
252b5132 4128 }
1ed89aa9
NC
4129 else
4130 {
4131 /* The placement algorithm assumes that non allocated sections are
4132 not in PT_LOAD segments. We ensure this here by removing such
540b09cb
AM
4133 sections from the segment map. We also remove excluded
4134 sections. */
1ed89aa9
NC
4135 for (m = elf_tdata (abfd)->segment_map;
4136 m != NULL;
4137 m = m->next)
4138 {
4139 unsigned int new_count;
1ed89aa9 4140
1ed89aa9
NC
4141 new_count = 0;
4142 for (i = 0; i < m->count; i ++)
4143 {
540b09cb
AM
4144 if ((m->sections[i]->flags & SEC_EXCLUDE) == 0
4145 && ((m->sections[i]->flags & SEC_ALLOC) != 0
4146 || m->p_type != PT_LOAD))
1ed89aa9 4147 {
47d9a591 4148 if (i != new_count)
1ed89aa9
NC
4149 m->sections[new_count] = m->sections[i];
4150
4151 new_count ++;
4152 }
4153 }
4154
4155 if (new_count != m->count)
4156 m->count = new_count;
4157 }
4158 }
252b5132
RH
4159
4160 if (bed->elf_backend_modify_segment_map)
4161 {
c84fca4d 4162 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 4163 return FALSE;
252b5132
RH
4164 }
4165
4166 count = 0;
4167 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4168 ++count;
4169
4170 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4171 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4172 elf_elfheader (abfd)->e_phnum = count;
4173
4174 if (count == 0)
0ebdbb83
BW
4175 {
4176 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4177 return TRUE;
4178 }
252b5132
RH
4179
4180 /* If we already counted the number of program segments, make sure
4181 that we allocated enough space. This happens when SIZEOF_HEADERS
4182 is used in a linker script. */
4183 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
4184 if (alloc != 0 && count > alloc)
4185 {
4186 ((*_bfd_error_handler)
b301b248
AM
4187 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
4188 abfd, alloc, count));
cedc298e 4189 print_segment_map (abfd);
252b5132 4190 bfd_set_error (bfd_error_bad_value);
b34976b6 4191 return FALSE;
252b5132
RH
4192 }
4193
4194 if (alloc == 0)
f3520d2f
AM
4195 {
4196 alloc = count;
4197 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4198 }
252b5132 4199
d0fb9a8d 4200 phdrs = bfd_alloc2 (abfd, alloc, sizeof (Elf_Internal_Phdr));
f3520d2f 4201 elf_tdata (abfd)->phdr = phdrs;
252b5132 4202 if (phdrs == NULL)
b34976b6 4203 return FALSE;
252b5132
RH
4204
4205 off = bed->s->sizeof_ehdr;
4206 off += alloc * bed->s->sizeof_phdr;
4207
252b5132
RH
4208 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4209 m != NULL;
4210 m = m->next, p++)
4211 {
252b5132
RH
4212 asection **secpp;
4213
4214 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4215 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4216 not be done to the PT_NOTE section of a corefile, which may
4217 contain several pseudo-sections artificially created by bfd.
4218 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4219 if (m->count > 1
4220 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4221 && m->p_type == PT_NOTE))
252b5132
RH
4222 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4223 elf_sort_sections);
4224
b301b248
AM
4225 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4226 number of sections with contents contributing to both p_filesz
4227 and p_memsz, followed by a number of sections with no contents
4228 that just contribute to p_memsz. In this loop, OFF tracks next
4229 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4230 an adjustment we use for segments that have no file contents
4231 but need zero filled memory allocation. */
4232 voff = 0;
252b5132 4233 p->p_type = m->p_type;
28a7f3e7 4234 p->p_flags = m->p_flags;
252b5132
RH
4235
4236 if (p->p_type == PT_LOAD
b301b248 4237 && m->count > 0)
252b5132 4238 {
b301b248
AM
4239 bfd_size_type align;
4240 bfd_vma adjust;
a49e53ed 4241 unsigned int align_power = 0;
b301b248 4242
a49e53ed 4243 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4244 {
a49e53ed 4245 unsigned int secalign;
252b5132 4246
a49e53ed
AM
4247 secalign = bfd_get_section_alignment (abfd, *secpp);
4248 if (secalign > align_power)
4249 align_power = secalign;
b301b248 4250 }
a49e53ed
AM
4251 align = (bfd_size_type) 1 << align_power;
4252
4253 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > align)
4254 align = bed->maxpagesize;
252b5132 4255
b301b248
AM
4256 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4257 off += adjust;
4258 if (adjust != 0
4259 && !m->includes_filehdr
4260 && !m->includes_phdrs
4261 && (ufile_ptr) off >= align)
4262 {
4263 /* If the first section isn't loadable, the same holds for
4264 any other sections. Since the segment won't need file
4265 space, we can make p_offset overlap some prior segment.
4266 However, .tbss is special. If a segment starts with
4267 .tbss, we need to look at the next section to decide
4268 whether the segment has any loadable sections. */
4269 i = 0;
5efb6261 4270 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
4271 {
4272 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4273 || ++i >= m->count)
4274 {
4275 off -= adjust;
4276 voff = adjust - align;
4277 break;
4278 }
4279 }
252b5132
RH
4280 }
4281 }
b1a6d0b1
NC
4282 /* Make sure the .dynamic section is the first section in the
4283 PT_DYNAMIC segment. */
4284 else if (p->p_type == PT_DYNAMIC
4285 && m->count > 1
4286 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4287 {
4288 _bfd_error_handler
b301b248
AM
4289 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4290 abfd);
b1a6d0b1
NC
4291 bfd_set_error (bfd_error_bad_value);
4292 return FALSE;
4293 }
252b5132
RH
4294
4295 if (m->count == 0)
4296 p->p_vaddr = 0;
4297 else
4298 p->p_vaddr = m->sections[0]->vma;
4299
4300 if (m->p_paddr_valid)
4301 p->p_paddr = m->p_paddr;
4302 else if (m->count == 0)
4303 p->p_paddr = 0;
4304 else
4305 p->p_paddr = m->sections[0]->lma;
4306
4307 if (p->p_type == PT_LOAD
4308 && (abfd->flags & D_PAGED) != 0)
4309 p->p_align = bed->maxpagesize;
4310 else if (m->count == 0)
45d6a902 4311 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
4312 else
4313 p->p_align = 0;
4314
4315 p->p_offset = 0;
4316 p->p_filesz = 0;
4317 p->p_memsz = 0;
4318
4319 if (m->includes_filehdr)
4320 {
4321 if (! m->p_flags_valid)
4322 p->p_flags |= PF_R;
4323 p->p_offset = 0;
4324 p->p_filesz = bed->s->sizeof_ehdr;
4325 p->p_memsz = bed->s->sizeof_ehdr;
4326 if (m->count > 0)
4327 {
4328 BFD_ASSERT (p->p_type == PT_LOAD);
4329
4330 if (p->p_vaddr < (bfd_vma) off)
4331 {
caf47ea6 4332 (*_bfd_error_handler)
b301b248
AM
4333 (_("%B: Not enough room for program headers, try linking with -N"),
4334 abfd);
252b5132 4335 bfd_set_error (bfd_error_bad_value);
b34976b6 4336 return FALSE;
252b5132
RH
4337 }
4338
4339 p->p_vaddr -= off;
4340 if (! m->p_paddr_valid)
4341 p->p_paddr -= off;
4342 }
252b5132
RH
4343 }
4344
4345 if (m->includes_phdrs)
4346 {
4347 if (! m->p_flags_valid)
4348 p->p_flags |= PF_R;
4349
f3520d2f 4350 if (!m->includes_filehdr)
252b5132
RH
4351 {
4352 p->p_offset = bed->s->sizeof_ehdr;
4353
4354 if (m->count > 0)
4355 {
4356 BFD_ASSERT (p->p_type == PT_LOAD);
4357 p->p_vaddr -= off - p->p_offset;
4358 if (! m->p_paddr_valid)
4359 p->p_paddr -= off - p->p_offset;
4360 }
252b5132
RH
4361 }
4362
4363 p->p_filesz += alloc * bed->s->sizeof_phdr;
4364 p->p_memsz += alloc * bed->s->sizeof_phdr;
4365 }
4366
4367 if (p->p_type == PT_LOAD
4368 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4369 {
4370 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4371 p->p_offset = off + voff;
252b5132
RH
4372 else
4373 {
4374 file_ptr adjust;
4375
4376 adjust = off - (p->p_offset + p->p_filesz);
4377 p->p_filesz += adjust;
4378 p->p_memsz += adjust;
4379 }
4380 }
4381
1ea63fd2
AM
4382 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4383 maps. Set filepos for sections in PT_LOAD segments, and in
4384 core files, for sections in PT_NOTE segments.
4385 assign_file_positions_for_non_load_sections will set filepos
4386 for other sections and update p_filesz for other segments. */
252b5132
RH
4387 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4388 {
4389 asection *sec;
4390 flagword flags;
4391 bfd_size_type align;
4392
4393 sec = *secpp;
4394 flags = sec->flags;
4395 align = 1 << bfd_get_section_alignment (abfd, sec);
4396
b301b248
AM
4397 if (p->p_type == PT_LOAD
4398 || p->p_type == PT_TLS)
252b5132
RH
4399 {
4400 bfd_signed_vma adjust;
4401
5efb6261 4402 if ((flags & SEC_LOAD) != 0)
252b5132 4403 {
b301b248 4404 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4405 if (adjust < 0)
b301b248
AM
4406 {
4407 (*_bfd_error_handler)
4408 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4409 abfd, sec, (unsigned long) sec->lma);
4410 adjust = 0;
4411 }
4412 off += adjust;
4413 p->p_filesz += adjust;
4414 p->p_memsz += adjust;
252b5132 4415 }
b301b248
AM
4416 /* .tbss is special. It doesn't contribute to p_memsz of
4417 normal segments. */
1ea63fd2
AM
4418 else if ((flags & SEC_ALLOC) != 0
4419 && ((flags & SEC_THREAD_LOCAL) == 0
4420 || p->p_type == PT_TLS))
252b5132
RH
4421 {
4422 /* The section VMA must equal the file position
b301b248
AM
4423 modulo the page size. */
4424 bfd_size_type page = align;
a49e53ed 4425 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > page)
b301b248
AM
4426 page = bed->maxpagesize;
4427 adjust = vma_page_aligned_bias (sec->vma,
4428 p->p_vaddr + p->p_memsz,
4429 page);
252b5132 4430 p->p_memsz += adjust;
252b5132 4431 }
252b5132
RH
4432 }
4433
4434 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4435 {
b301b248
AM
4436 /* The section at i == 0 is the one that actually contains
4437 everything. */
4a938328
MS
4438 if (i == 0)
4439 {
252b5132 4440 sec->filepos = off;
eea6121a 4441 off += sec->size;
b301b248
AM
4442 p->p_filesz = sec->size;
4443 p->p_memsz = 0;
4444 p->p_align = 1;
252b5132 4445 }
4a938328 4446 else
252b5132 4447 {
b301b248 4448 /* The rest are fake sections that shouldn't be written. */
252b5132 4449 sec->filepos = 0;
eea6121a 4450 sec->size = 0;
b301b248
AM
4451 sec->flags = 0;
4452 continue;
252b5132 4453 }
252b5132
RH
4454 }
4455 else
4456 {
b301b248
AM
4457 if (p->p_type == PT_LOAD)
4458 {
4459 sec->filepos = off;
5efb6261
AM
4460 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4461 1997, and the exact reason for it isn't clear. One
4462 plausible explanation is that it is to work around
4463 a problem we have with linker scripts using data
4464 statements in NOLOAD sections. I don't think it
4465 makes a great deal of sense to have such a section
4466 assigned to a PT_LOAD segment, but apparently
4467 people do this. The data statement results in a
4468 bfd_data_link_order being built, and these need
4469 section contents to write into. Eventually, we get
4470 to _bfd_elf_write_object_contents which writes any
4471 section with contents to the output. Make room
4472 here for the write, so that following segments are
4473 not trashed. */
4474 if ((flags & SEC_LOAD) != 0
4475 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4476 off += sec->size;
4477 }
252b5132 4478
5efb6261 4479 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4480 {
4481 p->p_filesz += sec->size;
4482 p->p_memsz += sec->size;
4483 }
4b6c0f2f 4484
b301b248
AM
4485 /* .tbss is special. It doesn't contribute to p_memsz of
4486 normal segments. */
1ea63fd2
AM
4487 else if ((flags & SEC_ALLOC) != 0
4488 && ((flags & SEC_THREAD_LOCAL) == 0
4489 || p->p_type == PT_TLS))
b301b248 4490 p->p_memsz += sec->size;
252b5132 4491
13ae64f3 4492 if (p->p_type == PT_TLS
eea6121a 4493 && sec->size == 0
13ae64f3
JJ
4494 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4495 {
3a800eb9
AM
4496 struct bfd_link_order *o = sec->map_tail.link_order;
4497 if (o != NULL)
4498 p->p_memsz += o->offset + o->size;
13ae64f3
JJ
4499 }
4500
252b5132 4501 if (align > p->p_align
1ea63fd2
AM
4502 && (p->p_type != PT_LOAD
4503 || (abfd->flags & D_PAGED) == 0
4504 || ((p->p_vaddr - p->p_offset) & (align - 1)) == 0))
252b5132
RH
4505 p->p_align = align;
4506 }
4507
4508 if (! m->p_flags_valid)
4509 {
4510 p->p_flags |= PF_R;
4511 if ((flags & SEC_CODE) != 0)
4512 p->p_flags |= PF_X;
4513 if ((flags & SEC_READONLY) == 0)
4514 p->p_flags |= PF_W;
4515 }
4516 }
4517 }
4518
f3520d2f
AM
4519 /* Clear out any program headers we allocated but did not use. */
4520 for (; count < alloc; count++, p++)
4521 {
4522 memset (p, 0, sizeof *p);
4523 p->p_type = PT_NULL;
4524 }
4525
4526 elf_tdata (abfd)->next_file_pos = off;
4527 return TRUE;
4528}
4529
4530/* Assign file positions for the other sections. */
4531
4532static bfd_boolean
4533assign_file_positions_for_non_load_sections (bfd *abfd,
4534 struct bfd_link_info *link_info)
4535{
4536 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4537 Elf_Internal_Shdr **i_shdrpp;
4538 Elf_Internal_Shdr **hdrpp;
4539 Elf_Internal_Phdr *phdrs;
4540 Elf_Internal_Phdr *p;
4541 struct elf_segment_map *m;
4542 bfd_vma filehdr_vaddr, filehdr_paddr;
4543 bfd_vma phdrs_vaddr, phdrs_paddr;
4544 file_ptr off;
4545 unsigned int num_sec;
4546 unsigned int i;
4547 unsigned int count;
4548
5c182d5f
AM
4549 i_shdrpp = elf_elfsections (abfd);
4550 num_sec = elf_numsections (abfd);
f3520d2f 4551 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4552 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4553 {
4554 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4555 Elf_Internal_Shdr *hdr;
4556
4557 hdr = *hdrpp;
4558 if (hdr->bfd_section != NULL
4559 && hdr->bfd_section->filepos != 0)
4560 hdr->sh_offset = hdr->bfd_section->filepos;
4561 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4562 {
4563 ((*_bfd_error_handler)
4564 (_("%B: warning: allocated section `%s' not in segment"),
4565 abfd,
4566 (hdr->bfd_section == NULL
4567 ? "*unknown*"
4568 : hdr->bfd_section->name)));
4569 if ((abfd->flags & D_PAGED) != 0)
4570 off += vma_page_aligned_bias (hdr->sh_addr, off,
4571 bed->maxpagesize);
4572 else
4573 off += vma_page_aligned_bias (hdr->sh_addr, off,
4574 hdr->sh_addralign);
4575 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4576 FALSE);
4577 }
4578 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4579 && hdr->bfd_section == NULL)
4580 || hdr == i_shdrpp[tdata->symtab_section]
4581 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4582 || hdr == i_shdrpp[tdata->strtab_section])
4583 hdr->sh_offset = -1;
4584 else
4585 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4586
4587 if (i == SHN_LORESERVE - 1)
4588 {
4589 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4590 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4591 }
4592 }
4593
252b5132
RH
4594 /* Now that we have set the section file positions, we can set up
4595 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4596 count = 0;
4597 filehdr_vaddr = 0;
4598 filehdr_paddr = 0;
4599 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4600 phdrs_paddr = 0;
4601 phdrs = elf_tdata (abfd)->phdr;
4602 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4603 m != NULL;
4604 m = m->next, p++)
4605 {
4606 ++count;
4607 if (p->p_type != PT_LOAD)
4608 continue;
4609
4610 if (m->includes_filehdr)
4611 {
4612 filehdr_vaddr = p->p_vaddr;
4613 filehdr_paddr = p->p_paddr;
4614 }
4615 if (m->includes_phdrs)
4616 {
4617 phdrs_vaddr = p->p_vaddr;
4618 phdrs_paddr = p->p_paddr;
4619 if (m->includes_filehdr)
4620 {
4621 phdrs_vaddr += bed->s->sizeof_ehdr;
4622 phdrs_paddr += bed->s->sizeof_ehdr;
4623 }
4624 }
4625 }
4626
252b5132
RH
4627 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4628 m != NULL;
4629 m = m->next, p++)
4630 {
1ea63fd2 4631 if (m->count != 0)
252b5132 4632 {
1ea63fd2
AM
4633 if (p->p_type != PT_LOAD
4634 && (p->p_type != PT_NOTE || bfd_get_format (abfd) != bfd_core))
229fcec5 4635 {
1ea63fd2
AM
4636 Elf_Internal_Shdr *hdr;
4637 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4638
4639 hdr = &elf_section_data (m->sections[m->count - 1])->this_hdr;
4640 p->p_filesz = (m->sections[m->count - 1]->filepos
4641 - m->sections[0]->filepos);
4642 if (hdr->sh_type != SHT_NOBITS)
4643 p->p_filesz += hdr->sh_size;
4644
4645 p->p_offset = m->sections[0]->filepos;
229fcec5 4646 }
252b5132 4647 }
1ea63fd2 4648 else
252b5132
RH
4649 {
4650 if (m->includes_filehdr)
4651 {
4652 p->p_vaddr = filehdr_vaddr;
4653 if (! m->p_paddr_valid)
4654 p->p_paddr = filehdr_paddr;
4655 }
4656 else if (m->includes_phdrs)
4657 {
4658 p->p_vaddr = phdrs_vaddr;
4659 if (! m->p_paddr_valid)
4660 p->p_paddr = phdrs_paddr;
4661 }
8c37241b
JJ
4662 else if (p->p_type == PT_GNU_RELRO)
4663 {
4664 Elf_Internal_Phdr *lp;
4665
4666 for (lp = phdrs; lp < phdrs + count; ++lp)
4667 {
4668 if (lp->p_type == PT_LOAD
4669 && lp->p_vaddr <= link_info->relro_end
4670 && lp->p_vaddr >= link_info->relro_start
4671 && lp->p_vaddr + lp->p_filesz
4672 >= link_info->relro_end)
4673 break;
4674 }
4675
4676 if (lp < phdrs + count
4677 && link_info->relro_end > lp->p_vaddr)
4678 {
4679 p->p_vaddr = lp->p_vaddr;
4680 p->p_paddr = lp->p_paddr;
4681 p->p_offset = lp->p_offset;
4682 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4683 p->p_memsz = p->p_filesz;
4684 p->p_align = 1;
4685 p->p_flags = (lp->p_flags & ~PF_W);
4686 }
4687 else
4688 {
4689 memset (p, 0, sizeof *p);
4690 p->p_type = PT_NULL;
4691 }
4692 }
252b5132
RH
4693 }
4694 }
4695
252b5132
RH
4696 elf_tdata (abfd)->next_file_pos = off;
4697
b34976b6 4698 return TRUE;
252b5132
RH
4699}
4700
4701/* Get the size of the program header.
4702
4703 If this is called by the linker before any of the section VMA's are set, it
4704 can't calculate the correct value for a strange memory layout. This only
4705 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4706 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4707 data segment (exclusive of .interp and .dynamic).
4708
4709 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4710 will be two segments. */
4711
4712static bfd_size_type
217aa764 4713get_program_header_size (bfd *abfd)
252b5132
RH
4714{
4715 size_t segs;
4716 asection *s;
9c5bfbb7 4717 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4718
4719 /* We can't return a different result each time we're called. */
4720 if (elf_tdata (abfd)->program_header_size != 0)
4721 return elf_tdata (abfd)->program_header_size;
4722
4723 if (elf_tdata (abfd)->segment_map != NULL)
4724 {
4725 struct elf_segment_map *m;
4726
4727 segs = 0;
4728 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4729 ++segs;
4730 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4731 return elf_tdata (abfd)->program_header_size;
4732 }
4733
4734 /* Assume we will need exactly two PT_LOAD segments: one for text
4735 and one for data. */
4736 segs = 2;
4737
4738 s = bfd_get_section_by_name (abfd, ".interp");
4739 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4740 {
4741 /* If we have a loadable interpreter section, we need a
4742 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4743 PT_PHDR segment, although that may not be true for all
252b5132
RH
4744 targets. */
4745 segs += 2;
4746 }
4747
4748 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4749 {
4750 /* We need a PT_DYNAMIC segment. */
4751 ++segs;
4752 }
4753
126495ed 4754 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4755 {
4756 /* We need a PT_GNU_EH_FRAME segment. */
4757 ++segs;
4758 }
4759
9ee5e499
JJ
4760 if (elf_tdata (abfd)->stack_flags)
4761 {
4762 /* We need a PT_GNU_STACK segment. */
4763 ++segs;
4764 }
4765
8c37241b
JJ
4766 if (elf_tdata (abfd)->relro)
4767 {
4768 /* We need a PT_GNU_RELRO segment. */
4769 ++segs;
4770 }
4771
252b5132
RH
4772 for (s = abfd->sections; s != NULL; s = s->next)
4773 {
4774 if ((s->flags & SEC_LOAD) != 0
4775 && strncmp (s->name, ".note", 5) == 0)
4776 {
4777 /* We need a PT_NOTE segment. */
4778 ++segs;
4779 }
4780 }
4781
13ae64f3
JJ
4782 for (s = abfd->sections; s != NULL; s = s->next)
4783 {
4784 if (s->flags & SEC_THREAD_LOCAL)
4785 {
4786 /* We need a PT_TLS segment. */
4787 ++segs;
4788 break;
4789 }
4790 }
4791
252b5132
RH
4792 /* Let the backend count up any program headers it might need. */
4793 if (bed->elf_backend_additional_program_headers)
4794 {
4795 int a;
4796
4797 a = (*bed->elf_backend_additional_program_headers) (abfd);
4798 if (a == -1)
4799 abort ();
4800 segs += a;
4801 }
4802
4803 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4804 return elf_tdata (abfd)->program_header_size;
4805}
4806
4807/* Work out the file positions of all the sections. This is called by
4808 _bfd_elf_compute_section_file_positions. All the section sizes and
4809 VMAs must be known before this is called.
4810
e0638f70
AM
4811 Reloc sections come in two flavours: Those processed specially as
4812 "side-channel" data attached to a section to which they apply, and
4813 those that bfd doesn't process as relocations. The latter sort are
4814 stored in a normal bfd section by bfd_section_from_shdr. We don't
4815 consider the former sort here, unless they form part of the loadable
4816 image. Reloc sections not assigned here will be handled later by
4817 assign_file_positions_for_relocs.
252b5132
RH
4818
4819 We also don't set the positions of the .symtab and .strtab here. */
4820
b34976b6 4821static bfd_boolean
c84fca4d
AO
4822assign_file_positions_except_relocs (bfd *abfd,
4823 struct bfd_link_info *link_info)
252b5132 4824{
5c182d5f
AM
4825 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4826 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4827 file_ptr off;
9c5bfbb7 4828 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4829
4830 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4831 && bfd_get_format (abfd) != bfd_core)
4832 {
5c182d5f
AM
4833 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4834 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4835 Elf_Internal_Shdr **hdrpp;
4836 unsigned int i;
4837
4838 /* Start after the ELF header. */
4839 off = i_ehdrp->e_ehsize;
4840
4841 /* We are not creating an executable, which means that we are
4842 not creating a program header, and that the actual order of
4843 the sections in the file is unimportant. */
9ad5cbcf 4844 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4845 {
4846 Elf_Internal_Shdr *hdr;
4847
4848 hdr = *hdrpp;
e0638f70
AM
4849 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4850 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4851 || i == tdata->symtab_section
4852 || i == tdata->symtab_shndx_section
252b5132
RH
4853 || i == tdata->strtab_section)
4854 {
4855 hdr->sh_offset = -1;
252b5132 4856 }
9ad5cbcf 4857 else
b34976b6 4858 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4859
9ad5cbcf
AM
4860 if (i == SHN_LORESERVE - 1)
4861 {
4862 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4863 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4864 }
252b5132
RH
4865 }
4866 }
4867 else
4868 {
f3520d2f
AM
4869 unsigned int alloc;
4870
252b5132
RH
4871 /* Assign file positions for the loaded sections based on the
4872 assignment of sections to segments. */
f3520d2f
AM
4873 if (!assign_file_positions_for_load_sections (abfd, link_info))
4874 return FALSE;
4875
4876 /* And for non-load sections. */
4877 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4878 return FALSE;
4879
4880 /* Write out the program headers. */
4881 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4882 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4883 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4884 return FALSE;
252b5132 4885
5c182d5f 4886 off = tdata->next_file_pos;
252b5132
RH
4887 }
4888
4889 /* Place the section headers. */
45d6a902 4890 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4891 i_ehdrp->e_shoff = off;
4892 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4893
5c182d5f 4894 tdata->next_file_pos = off;
252b5132 4895
b34976b6 4896 return TRUE;
252b5132
RH
4897}
4898
b34976b6 4899static bfd_boolean
217aa764 4900prep_headers (bfd *abfd)
252b5132
RH
4901{
4902 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4903 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4904 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4905 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4906 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4907
4908 i_ehdrp = elf_elfheader (abfd);
4909 i_shdrp = elf_elfsections (abfd);
4910
2b0f7ef9 4911 shstrtab = _bfd_elf_strtab_init ();
252b5132 4912 if (shstrtab == NULL)
b34976b6 4913 return FALSE;
252b5132
RH
4914
4915 elf_shstrtab (abfd) = shstrtab;
4916
4917 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4918 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4919 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4920 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4921
4922 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4923 i_ehdrp->e_ident[EI_DATA] =
4924 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4925 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4926
252b5132
RH
4927 if ((abfd->flags & DYNAMIC) != 0)
4928 i_ehdrp->e_type = ET_DYN;
4929 else if ((abfd->flags & EXEC_P) != 0)
4930 i_ehdrp->e_type = ET_EXEC;
4931 else if (bfd_get_format (abfd) == bfd_core)
4932 i_ehdrp->e_type = ET_CORE;
4933 else
4934 i_ehdrp->e_type = ET_REL;
4935
4936 switch (bfd_get_arch (abfd))
4937 {
4938 case bfd_arch_unknown:
4939 i_ehdrp->e_machine = EM_NONE;
4940 break;
aa4f99bb
AO
4941
4942 /* There used to be a long list of cases here, each one setting
4943 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4944 in the corresponding bfd definition. To avoid duplication,
4945 the switch was removed. Machines that need special handling
4946 can generally do it in elf_backend_final_write_processing(),
4947 unless they need the information earlier than the final write.
4948 Such need can generally be supplied by replacing the tests for
4949 e_machine with the conditions used to determine it. */
252b5132 4950 default:
9c5bfbb7
AM
4951 i_ehdrp->e_machine = bed->elf_machine_code;
4952 }
aa4f99bb 4953
252b5132
RH
4954 i_ehdrp->e_version = bed->s->ev_current;
4955 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4956
c044fabd 4957 /* No program header, for now. */
252b5132
RH
4958 i_ehdrp->e_phoff = 0;
4959 i_ehdrp->e_phentsize = 0;
4960 i_ehdrp->e_phnum = 0;
4961
c044fabd 4962 /* Each bfd section is section header entry. */
252b5132
RH
4963 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4964 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4965
c044fabd 4966 /* If we're building an executable, we'll need a program header table. */
252b5132 4967 if (abfd->flags & EXEC_P)
0e71e495
BE
4968 /* It all happens later. */
4969 ;
252b5132
RH
4970 else
4971 {
4972 i_ehdrp->e_phentsize = 0;
4973 i_phdrp = 0;
4974 i_ehdrp->e_phoff = 0;
4975 }
4976
4977 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4978 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4979 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4980 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4981 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4982 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4983 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4984 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4985 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4986 return FALSE;
252b5132 4987
b34976b6 4988 return TRUE;
252b5132
RH
4989}
4990
4991/* Assign file positions for all the reloc sections which are not part
4992 of the loadable file image. */
4993
4994void
217aa764 4995_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4996{
4997 file_ptr off;
9ad5cbcf 4998 unsigned int i, num_sec;
252b5132
RH
4999 Elf_Internal_Shdr **shdrpp;
5000
5001 off = elf_tdata (abfd)->next_file_pos;
5002
9ad5cbcf
AM
5003 num_sec = elf_numsections (abfd);
5004 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5005 {
5006 Elf_Internal_Shdr *shdrp;
5007
5008 shdrp = *shdrpp;
5009 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5010 && shdrp->sh_offset == -1)
b34976b6 5011 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5012 }
5013
5014 elf_tdata (abfd)->next_file_pos = off;
5015}
5016
b34976b6 5017bfd_boolean
217aa764 5018_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5019{
9c5bfbb7 5020 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5021 Elf_Internal_Ehdr *i_ehdrp;
5022 Elf_Internal_Shdr **i_shdrp;
b34976b6 5023 bfd_boolean failed;
9ad5cbcf 5024 unsigned int count, num_sec;
252b5132
RH
5025
5026 if (! abfd->output_has_begun
217aa764 5027 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5028 return FALSE;
252b5132
RH
5029
5030 i_shdrp = elf_elfsections (abfd);
5031 i_ehdrp = elf_elfheader (abfd);
5032
b34976b6 5033 failed = FALSE;
252b5132
RH
5034 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5035 if (failed)
b34976b6 5036 return FALSE;
252b5132
RH
5037
5038 _bfd_elf_assign_file_positions_for_relocs (abfd);
5039
c044fabd 5040 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5041 num_sec = elf_numsections (abfd);
5042 for (count = 1; count < num_sec; count++)
252b5132
RH
5043 {
5044 if (bed->elf_backend_section_processing)
5045 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5046 if (i_shdrp[count]->contents)
5047 {
dc810e39
AM
5048 bfd_size_type amt = i_shdrp[count]->sh_size;
5049
252b5132 5050 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5051 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5052 return FALSE;
252b5132 5053 }
9ad5cbcf
AM
5054 if (count == SHN_LORESERVE - 1)
5055 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
5056 }
5057
5058 /* Write out the section header names. */
26ae6d5e
DJ
5059 if (elf_shstrtab (abfd) != NULL
5060 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
5061 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5062 return FALSE;
252b5132
RH
5063
5064 if (bed->elf_backend_final_write_processing)
5065 (*bed->elf_backend_final_write_processing) (abfd,
5066 elf_tdata (abfd)->linker);
5067
5068 return bed->s->write_shdrs_and_ehdr (abfd);
5069}
5070
b34976b6 5071bfd_boolean
217aa764 5072_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5073{
c044fabd 5074 /* Hopefully this can be done just like an object file. */
252b5132
RH
5075 return _bfd_elf_write_object_contents (abfd);
5076}
c044fabd
KH
5077
5078/* Given a section, search the header to find them. */
5079
252b5132 5080int
198beae2 5081_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5082{
9c5bfbb7 5083 const struct elf_backend_data *bed;
252b5132 5084 int index;
252b5132 5085
9ad5cbcf
AM
5086 if (elf_section_data (asect) != NULL
5087 && elf_section_data (asect)->this_idx != 0)
5088 return elf_section_data (asect)->this_idx;
5089
5090 if (bfd_is_abs_section (asect))
af746e92
AM
5091 index = SHN_ABS;
5092 else if (bfd_is_com_section (asect))
5093 index = SHN_COMMON;
5094 else if (bfd_is_und_section (asect))
5095 index = SHN_UNDEF;
5096 else
6dc132d9 5097 index = -1;
252b5132 5098
af746e92 5099 bed = get_elf_backend_data (abfd);
252b5132
RH
5100 if (bed->elf_backend_section_from_bfd_section)
5101 {
af746e92 5102 int retval = index;
9ad5cbcf 5103
af746e92
AM
5104 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5105 return retval;
252b5132
RH
5106 }
5107
af746e92
AM
5108 if (index == -1)
5109 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5110
af746e92 5111 return index;
252b5132
RH
5112}
5113
5114/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5115 on error. */
5116
5117int
217aa764 5118_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5119{
5120 asymbol *asym_ptr = *asym_ptr_ptr;
5121 int idx;
5122 flagword flags = asym_ptr->flags;
5123
5124 /* When gas creates relocations against local labels, it creates its
5125 own symbol for the section, but does put the symbol into the
5126 symbol chain, so udata is 0. When the linker is generating
5127 relocatable output, this section symbol may be for one of the
5128 input sections rather than the output section. */
5129 if (asym_ptr->udata.i == 0
5130 && (flags & BSF_SECTION_SYM)
5131 && asym_ptr->section)
5132 {
5133 int indx;
5134
5135 if (asym_ptr->section->output_section != NULL)
5136 indx = asym_ptr->section->output_section->index;
5137 else
5138 indx = asym_ptr->section->index;
4e89ac30
L
5139 if (indx < elf_num_section_syms (abfd)
5140 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5141 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5142 }
5143
5144 idx = asym_ptr->udata.i;
5145
5146 if (idx == 0)
5147 {
5148 /* This case can occur when using --strip-symbol on a symbol
5149 which is used in a relocation entry. */
5150 (*_bfd_error_handler)
d003868e
AM
5151 (_("%B: symbol `%s' required but not present"),
5152 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5153 bfd_set_error (bfd_error_no_symbols);
5154 return -1;
5155 }
5156
5157#if DEBUG & 4
5158 {
5159 fprintf (stderr,
661a3fd4 5160 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5161 (long) asym_ptr, asym_ptr->name, idx, flags,
5162 elf_symbol_flags (flags));
5163 fflush (stderr);
5164 }
5165#endif
5166
5167 return idx;
5168}
5169
84d1d650 5170/* Rewrite program header information. */
252b5132 5171
b34976b6 5172static bfd_boolean
84d1d650 5173rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5174{
b34976b6
AM
5175 Elf_Internal_Ehdr *iehdr;
5176 struct elf_segment_map *map;
5177 struct elf_segment_map *map_first;
5178 struct elf_segment_map **pointer_to_map;
5179 Elf_Internal_Phdr *segment;
5180 asection *section;
5181 unsigned int i;
5182 unsigned int num_segments;
5183 bfd_boolean phdr_included = FALSE;
5184 bfd_vma maxpagesize;
5185 struct elf_segment_map *phdr_adjust_seg = NULL;
5186 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5187 const struct elf_backend_data *bed;
bc67d8a6 5188
caf47ea6 5189 bed = get_elf_backend_data (ibfd);
252b5132
RH
5190 iehdr = elf_elfheader (ibfd);
5191
bc67d8a6 5192 map_first = NULL;
c044fabd 5193 pointer_to_map = &map_first;
252b5132
RH
5194
5195 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5196 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5197
5198 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5199#define SEGMENT_END(segment, start) \
5200 (start + (segment->p_memsz > segment->p_filesz \
5201 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5202
eecdbe52
JJ
5203#define SECTION_SIZE(section, segment) \
5204 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5205 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5206 ? section->size : 0)
eecdbe52 5207
b34976b6 5208 /* Returns TRUE if the given section is contained within
bc67d8a6 5209 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5210#define IS_CONTAINED_BY_VMA(section, segment) \
5211 (section->vma >= segment->p_vaddr \
eecdbe52 5212 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5213 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5214
b34976b6 5215 /* Returns TRUE if the given section is contained within
bc67d8a6 5216 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5217#define IS_CONTAINED_BY_LMA(section, segment, base) \
5218 (section->lma >= base \
eecdbe52 5219 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5220 <= SEGMENT_END (segment, base)))
252b5132 5221
c044fabd 5222 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5223#define IS_COREFILE_NOTE(p, s) \
5224 (p->p_type == PT_NOTE \
5225 && bfd_get_format (ibfd) == bfd_core \
5226 && s->vma == 0 && s->lma == 0 \
5227 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5228 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5229 <= p->p_offset + p->p_filesz))
252b5132
RH
5230
5231 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5232 linker, which generates a PT_INTERP section with p_vaddr and
5233 p_memsz set to 0. */
aecc8f8a
AM
5234#define IS_SOLARIS_PT_INTERP(p, s) \
5235 (p->p_vaddr == 0 \
5236 && p->p_paddr == 0 \
5237 && p->p_memsz == 0 \
5238 && p->p_filesz > 0 \
5239 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5240 && s->size > 0 \
aecc8f8a 5241 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5242 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5243 <= p->p_offset + p->p_filesz))
5c440b1e 5244
bc67d8a6
NC
5245 /* Decide if the given section should be included in the given segment.
5246 A section will be included if:
f5ffc919
NC
5247 1. It is within the address space of the segment -- we use the LMA
5248 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5249 2. It is an allocated segment,
5250 3. There is an output section associated with it,
eecdbe52 5251 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5252 5. PT_GNU_STACK segments do not include any sections.
5253 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5254 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5255 8. PT_DYNAMIC should not contain empty sections at the beginning
5256 (with the possible exception of .dynamic). */
caf47ea6 5257#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5258 ((((segment->p_paddr \
5259 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5260 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5261 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5262 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5263 && section->output_section != NULL \
03394ac9 5264 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5265 && (segment->p_type != PT_TLS \
5266 || (section->flags & SEC_THREAD_LOCAL)) \
5267 && (segment->p_type == PT_LOAD \
5268 || segment->p_type == PT_TLS \
5269 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5270 && (segment->p_type != PT_DYNAMIC \
5271 || SECTION_SIZE (section, segment) > 0 \
5272 || (segment->p_paddr \
5273 ? segment->p_paddr != section->lma \
5274 : segment->p_vaddr != section->vma) \
5275 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5276 == 0)) \
82e51918 5277 && ! section->segment_mark)
bc67d8a6 5278
b34976b6 5279 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5280#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5281 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5282
5283 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5284 their VMA address ranges and their LMA address ranges overlap.
5285 It is possible to have overlapping VMA ranges without overlapping LMA
5286 ranges. RedBoot images for example can have both .data and .bss mapped
5287 to the same VMA range, but with the .data section mapped to a different
5288 LMA. */
aecc8f8a 5289#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5290 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5291 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5292 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5293 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5294
5295 /* Initialise the segment mark field. */
5296 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5297 section->segment_mark = FALSE;
bc67d8a6 5298
252b5132 5299 /* Scan through the segments specified in the program header
bc67d8a6 5300 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5301 in the loadable segments. These can be created by weird
aecc8f8a 5302 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5303 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5304 i < num_segments;
c044fabd 5305 i++, segment++)
252b5132 5306 {
252b5132 5307 unsigned int j;
c044fabd 5308 Elf_Internal_Phdr *segment2;
252b5132 5309
aecc8f8a
AM
5310 if (segment->p_type == PT_INTERP)
5311 for (section = ibfd->sections; section; section = section->next)
5312 if (IS_SOLARIS_PT_INTERP (segment, section))
5313 {
5314 /* Mininal change so that the normal section to segment
4cc11e76 5315 assignment code will work. */
aecc8f8a
AM
5316 segment->p_vaddr = section->vma;
5317 break;
5318 }
5319
bc67d8a6
NC
5320 if (segment->p_type != PT_LOAD)
5321 continue;
c044fabd 5322
bc67d8a6 5323 /* Determine if this segment overlaps any previous segments. */
c044fabd 5324 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5325 {
5326 bfd_signed_vma extra_length;
c044fabd 5327
bc67d8a6
NC
5328 if (segment2->p_type != PT_LOAD
5329 || ! SEGMENT_OVERLAPS (segment, segment2))
5330 continue;
c044fabd 5331
bc67d8a6
NC
5332 /* Merge the two segments together. */
5333 if (segment2->p_vaddr < segment->p_vaddr)
5334 {
c044fabd
KH
5335 /* Extend SEGMENT2 to include SEGMENT and then delete
5336 SEGMENT. */
bc67d8a6
NC
5337 extra_length =
5338 SEGMENT_END (segment, segment->p_vaddr)
5339 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5340
bc67d8a6
NC
5341 if (extra_length > 0)
5342 {
5343 segment2->p_memsz += extra_length;
5344 segment2->p_filesz += extra_length;
5345 }
c044fabd 5346
bc67d8a6 5347 segment->p_type = PT_NULL;
c044fabd 5348
bc67d8a6
NC
5349 /* Since we have deleted P we must restart the outer loop. */
5350 i = 0;
5351 segment = elf_tdata (ibfd)->phdr;
5352 break;
5353 }
5354 else
5355 {
c044fabd
KH
5356 /* Extend SEGMENT to include SEGMENT2 and then delete
5357 SEGMENT2. */
bc67d8a6
NC
5358 extra_length =
5359 SEGMENT_END (segment2, segment2->p_vaddr)
5360 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5361
bc67d8a6
NC
5362 if (extra_length > 0)
5363 {
5364 segment->p_memsz += extra_length;
5365 segment->p_filesz += extra_length;
5366 }
c044fabd 5367
bc67d8a6
NC
5368 segment2->p_type = PT_NULL;
5369 }
5370 }
5371 }
c044fabd 5372
bc67d8a6
NC
5373 /* The second scan attempts to assign sections to segments. */
5374 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5375 i < num_segments;
5376 i ++, segment ++)
5377 {
5378 unsigned int section_count;
5379 asection ** sections;
5380 asection * output_section;
5381 unsigned int isec;
5382 bfd_vma matching_lma;
5383 bfd_vma suggested_lma;
5384 unsigned int j;
dc810e39 5385 bfd_size_type amt;
bc67d8a6
NC
5386
5387 if (segment->p_type == PT_NULL)
5388 continue;
c044fabd 5389
bc67d8a6 5390 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5391 for (section = ibfd->sections, section_count = 0;
5392 section != NULL;
5393 section = section->next)
caf47ea6 5394 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5395 ++section_count;
811072d8 5396
b5f852ea
NC
5397 /* Allocate a segment map big enough to contain
5398 all of the sections we have selected. */
dc810e39
AM
5399 amt = sizeof (struct elf_segment_map);
5400 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5401 map = bfd_alloc (obfd, amt);
bc67d8a6 5402 if (map == NULL)
b34976b6 5403 return FALSE;
252b5132
RH
5404
5405 /* Initialise the fields of the segment map. Default to
5406 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5407 map->next = NULL;
5408 map->p_type = segment->p_type;
5409 map->p_flags = segment->p_flags;
5410 map->p_flags_valid = 1;
5411 map->p_paddr = segment->p_paddr;
5412 map->p_paddr_valid = 1;
252b5132
RH
5413
5414 /* Determine if this segment contains the ELF file header
5415 and if it contains the program headers themselves. */
bc67d8a6
NC
5416 map->includes_filehdr = (segment->p_offset == 0
5417 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5418
bc67d8a6 5419 map->includes_phdrs = 0;
252b5132 5420
bc67d8a6 5421 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5422 {
bc67d8a6
NC
5423 map->includes_phdrs =
5424 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5425 && (segment->p_offset + segment->p_filesz
252b5132
RH
5426 >= ((bfd_vma) iehdr->e_phoff
5427 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5428
bc67d8a6 5429 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5430 phdr_included = TRUE;
252b5132
RH
5431 }
5432
bc67d8a6 5433 if (section_count == 0)
252b5132
RH
5434 {
5435 /* Special segments, such as the PT_PHDR segment, may contain
5436 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5437 something. They are allowed by the ELF spec however, so only
5438 a warning is produced. */
bc67d8a6 5439 if (segment->p_type == PT_LOAD)
caf47ea6 5440 (*_bfd_error_handler)
d003868e
AM
5441 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5442 ibfd);
252b5132 5443
bc67d8a6 5444 map->count = 0;
c044fabd
KH
5445 *pointer_to_map = map;
5446 pointer_to_map = &map->next;
252b5132
RH
5447
5448 continue;
5449 }
5450
5451 /* Now scan the sections in the input BFD again and attempt
5452 to add their corresponding output sections to the segment map.
5453 The problem here is how to handle an output section which has
5454 been moved (ie had its LMA changed). There are four possibilities:
5455
5456 1. None of the sections have been moved.
5457 In this case we can continue to use the segment LMA from the
5458 input BFD.
5459
5460 2. All of the sections have been moved by the same amount.
5461 In this case we can change the segment's LMA to match the LMA
5462 of the first section.
5463
5464 3. Some of the sections have been moved, others have not.
5465 In this case those sections which have not been moved can be
5466 placed in the current segment which will have to have its size,
5467 and possibly its LMA changed, and a new segment or segments will
5468 have to be created to contain the other sections.
5469
b5f852ea 5470 4. The sections have been moved, but not by the same amount.
252b5132
RH
5471 In this case we can change the segment's LMA to match the LMA
5472 of the first section and we will have to create a new segment
5473 or segments to contain the other sections.
5474
5475 In order to save time, we allocate an array to hold the section
5476 pointers that we are interested in. As these sections get assigned
5477 to a segment, they are removed from this array. */
5478
0b14c2aa
L
5479 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5480 to work around this long long bug. */
d0fb9a8d 5481 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5482 if (sections == NULL)
b34976b6 5483 return FALSE;
252b5132
RH
5484
5485 /* Step One: Scan for segment vs section LMA conflicts.
5486 Also add the sections to the section array allocated above.
5487 Also add the sections to the current segment. In the common
5488 case, where the sections have not been moved, this means that
5489 we have completely filled the segment, and there is nothing
5490 more to do. */
252b5132 5491 isec = 0;
72730e0c 5492 matching_lma = 0;
252b5132
RH
5493 suggested_lma = 0;
5494
bc67d8a6
NC
5495 for (j = 0, section = ibfd->sections;
5496 section != NULL;
5497 section = section->next)
252b5132 5498 {
caf47ea6 5499 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5500 {
bc67d8a6
NC
5501 output_section = section->output_section;
5502
5503 sections[j ++] = section;
252b5132
RH
5504
5505 /* The Solaris native linker always sets p_paddr to 0.
5506 We try to catch that case here, and set it to the
5e8d7549
NC
5507 correct value. Note - some backends require that
5508 p_paddr be left as zero. */
bc67d8a6 5509 if (segment->p_paddr == 0
4455705d 5510 && segment->p_vaddr != 0
5e8d7549 5511 && (! bed->want_p_paddr_set_to_zero)
252b5132 5512 && isec == 0
bc67d8a6
NC
5513 && output_section->lma != 0
5514 && (output_section->vma == (segment->p_vaddr
5515 + (map->includes_filehdr
5516 ? iehdr->e_ehsize
5517 : 0)
5518 + (map->includes_phdrs
079e9a2f
AM
5519 ? (iehdr->e_phnum
5520 * iehdr->e_phentsize)
bc67d8a6
NC
5521 : 0))))
5522 map->p_paddr = segment->p_vaddr;
252b5132
RH
5523
5524 /* Match up the physical address of the segment with the
5525 LMA address of the output section. */
bc67d8a6 5526 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5527 || IS_COREFILE_NOTE (segment, section)
5528 || (bed->want_p_paddr_set_to_zero &&
5529 IS_CONTAINED_BY_VMA (output_section, segment))
5530 )
252b5132
RH
5531 {
5532 if (matching_lma == 0)
bc67d8a6 5533 matching_lma = output_section->lma;
252b5132
RH
5534
5535 /* We assume that if the section fits within the segment
bc67d8a6 5536 then it does not overlap any other section within that
252b5132 5537 segment. */
bc67d8a6 5538 map->sections[isec ++] = output_section;
252b5132
RH
5539 }
5540 else if (suggested_lma == 0)
bc67d8a6 5541 suggested_lma = output_section->lma;
252b5132
RH
5542 }
5543 }
5544
bc67d8a6 5545 BFD_ASSERT (j == section_count);
252b5132
RH
5546
5547 /* Step Two: Adjust the physical address of the current segment,
5548 if necessary. */
bc67d8a6 5549 if (isec == section_count)
252b5132
RH
5550 {
5551 /* All of the sections fitted within the segment as currently
5552 specified. This is the default case. Add the segment to
5553 the list of built segments and carry on to process the next
5554 program header in the input BFD. */
bc67d8a6 5555 map->count = section_count;
c044fabd
KH
5556 *pointer_to_map = map;
5557 pointer_to_map = &map->next;
252b5132
RH
5558
5559 free (sections);
5560 continue;
5561 }
252b5132
RH
5562 else
5563 {
72730e0c
AM
5564 if (matching_lma != 0)
5565 {
5566 /* At least one section fits inside the current segment.
5567 Keep it, but modify its physical address to match the
5568 LMA of the first section that fitted. */
bc67d8a6 5569 map->p_paddr = matching_lma;
72730e0c
AM
5570 }
5571 else
5572 {
5573 /* None of the sections fitted inside the current segment.
5574 Change the current segment's physical address to match
5575 the LMA of the first section. */
bc67d8a6 5576 map->p_paddr = suggested_lma;
72730e0c
AM
5577 }
5578
bc67d8a6
NC
5579 /* Offset the segment physical address from the lma
5580 to allow for space taken up by elf headers. */
5581 if (map->includes_filehdr)
5582 map->p_paddr -= iehdr->e_ehsize;
252b5132 5583
bc67d8a6
NC
5584 if (map->includes_phdrs)
5585 {
5586 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5587
5588 /* iehdr->e_phnum is just an estimate of the number
5589 of program headers that we will need. Make a note
5590 here of the number we used and the segment we chose
5591 to hold these headers, so that we can adjust the
5592 offset when we know the correct value. */
5593 phdr_adjust_num = iehdr->e_phnum;
5594 phdr_adjust_seg = map;
5595 }
252b5132
RH
5596 }
5597
5598 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5599 those that fit to the current segment and removing them from the
252b5132
RH
5600 sections array; but making sure not to leave large gaps. Once all
5601 possible sections have been assigned to the current segment it is
5602 added to the list of built segments and if sections still remain
5603 to be assigned, a new segment is constructed before repeating
5604 the loop. */
5605 isec = 0;
5606 do
5607 {
bc67d8a6 5608 map->count = 0;
252b5132
RH
5609 suggested_lma = 0;
5610
5611 /* Fill the current segment with sections that fit. */
bc67d8a6 5612 for (j = 0; j < section_count; j++)
252b5132 5613 {
bc67d8a6 5614 section = sections[j];
252b5132 5615
bc67d8a6 5616 if (section == NULL)
252b5132
RH
5617 continue;
5618
bc67d8a6 5619 output_section = section->output_section;
252b5132 5620
bc67d8a6 5621 BFD_ASSERT (output_section != NULL);
c044fabd 5622
bc67d8a6
NC
5623 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5624 || IS_COREFILE_NOTE (segment, section))
252b5132 5625 {
bc67d8a6 5626 if (map->count == 0)
252b5132
RH
5627 {
5628 /* If the first section in a segment does not start at
bc67d8a6
NC
5629 the beginning of the segment, then something is
5630 wrong. */
5631 if (output_section->lma !=
5632 (map->p_paddr
5633 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5634 + (map->includes_phdrs
5635 ? iehdr->e_phnum * iehdr->e_phentsize
5636 : 0)))
252b5132
RH
5637 abort ();
5638 }
5639 else
5640 {
5641 asection * prev_sec;
252b5132 5642
bc67d8a6 5643 prev_sec = map->sections[map->count - 1];
252b5132
RH
5644
5645 /* If the gap between the end of the previous section
bc67d8a6
NC
5646 and the start of this section is more than
5647 maxpagesize then we need to start a new segment. */
eea6121a 5648 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5649 maxpagesize)
caf47ea6 5650 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5651 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5652 > output_section->lma))
252b5132
RH
5653 {
5654 if (suggested_lma == 0)
bc67d8a6 5655 suggested_lma = output_section->lma;
252b5132
RH
5656
5657 continue;
5658 }
5659 }
5660
bc67d8a6 5661 map->sections[map->count++] = output_section;
252b5132
RH
5662 ++isec;
5663 sections[j] = NULL;
b34976b6 5664 section->segment_mark = TRUE;
252b5132
RH
5665 }
5666 else if (suggested_lma == 0)
bc67d8a6 5667 suggested_lma = output_section->lma;
252b5132
RH
5668 }
5669
bc67d8a6 5670 BFD_ASSERT (map->count > 0);
252b5132
RH
5671
5672 /* Add the current segment to the list of built segments. */
c044fabd
KH
5673 *pointer_to_map = map;
5674 pointer_to_map = &map->next;
252b5132 5675
bc67d8a6 5676 if (isec < section_count)
252b5132
RH
5677 {
5678 /* We still have not allocated all of the sections to
5679 segments. Create a new segment here, initialise it
5680 and carry on looping. */
dc810e39
AM
5681 amt = sizeof (struct elf_segment_map);
5682 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5683 map = bfd_alloc (obfd, amt);
bc67d8a6 5684 if (map == NULL)
5ed6aba4
NC
5685 {
5686 free (sections);
5687 return FALSE;
5688 }
252b5132
RH
5689
5690 /* Initialise the fields of the segment map. Set the physical
5691 physical address to the LMA of the first section that has
5692 not yet been assigned. */
bc67d8a6
NC
5693 map->next = NULL;
5694 map->p_type = segment->p_type;
5695 map->p_flags = segment->p_flags;
5696 map->p_flags_valid = 1;
5697 map->p_paddr = suggested_lma;
5698 map->p_paddr_valid = 1;
5699 map->includes_filehdr = 0;
5700 map->includes_phdrs = 0;
252b5132
RH
5701 }
5702 }
bc67d8a6 5703 while (isec < section_count);
252b5132
RH
5704
5705 free (sections);
5706 }
5707
5708 /* The Solaris linker creates program headers in which all the
5709 p_paddr fields are zero. When we try to objcopy or strip such a
5710 file, we get confused. Check for this case, and if we find it
5711 reset the p_paddr_valid fields. */
bc67d8a6
NC
5712 for (map = map_first; map != NULL; map = map->next)
5713 if (map->p_paddr != 0)
252b5132 5714 break;
bc67d8a6 5715 if (map == NULL)
b5f852ea
NC
5716 for (map = map_first; map != NULL; map = map->next)
5717 map->p_paddr_valid = 0;
252b5132 5718
bc67d8a6
NC
5719 elf_tdata (obfd)->segment_map = map_first;
5720
5721 /* If we had to estimate the number of program headers that were
9ad5cbcf 5722 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5723 the offset if necessary. */
5724 if (phdr_adjust_seg != NULL)
5725 {
5726 unsigned int count;
c044fabd 5727
bc67d8a6 5728 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5729 count++;
252b5132 5730
bc67d8a6
NC
5731 if (count > phdr_adjust_num)
5732 phdr_adjust_seg->p_paddr
5733 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5734 }
c044fabd 5735
bc67d8a6 5736#undef SEGMENT_END
eecdbe52 5737#undef SECTION_SIZE
bc67d8a6
NC
5738#undef IS_CONTAINED_BY_VMA
5739#undef IS_CONTAINED_BY_LMA
252b5132 5740#undef IS_COREFILE_NOTE
bc67d8a6
NC
5741#undef IS_SOLARIS_PT_INTERP
5742#undef INCLUDE_SECTION_IN_SEGMENT
5743#undef SEGMENT_AFTER_SEGMENT
5744#undef SEGMENT_OVERLAPS
b34976b6 5745 return TRUE;
252b5132
RH
5746}
5747
84d1d650
L
5748/* Copy ELF program header information. */
5749
5750static bfd_boolean
5751copy_elf_program_header (bfd *ibfd, bfd *obfd)
5752{
5753 Elf_Internal_Ehdr *iehdr;
5754 struct elf_segment_map *map;
5755 struct elf_segment_map *map_first;
5756 struct elf_segment_map **pointer_to_map;
5757 Elf_Internal_Phdr *segment;
5758 unsigned int i;
5759 unsigned int num_segments;
5760 bfd_boolean phdr_included = FALSE;
5761
5762 iehdr = elf_elfheader (ibfd);
5763
5764 map_first = NULL;
5765 pointer_to_map = &map_first;
5766
5767 num_segments = elf_elfheader (ibfd)->e_phnum;
5768 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5769 i < num_segments;
5770 i++, segment++)
5771 {
5772 asection *section;
5773 unsigned int section_count;
5774 bfd_size_type amt;
5775 Elf_Internal_Shdr *this_hdr;
5776
5777 /* FIXME: Do we need to copy PT_NULL segment? */
5778 if (segment->p_type == PT_NULL)
5779 continue;
5780
5781 /* Compute how many sections are in this segment. */
5782 for (section = ibfd->sections, section_count = 0;
5783 section != NULL;
5784 section = section->next)
5785 {
5786 this_hdr = &(elf_section_data(section)->this_hdr);
5787 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5788 section_count++;
5789 }
5790
5791 /* Allocate a segment map big enough to contain
5792 all of the sections we have selected. */
5793 amt = sizeof (struct elf_segment_map);
5794 if (section_count != 0)
5795 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5796 map = bfd_alloc (obfd, amt);
5797 if (map == NULL)
5798 return FALSE;
5799
5800 /* Initialize the fields of the output segment map with the
5801 input segment. */
5802 map->next = NULL;
5803 map->p_type = segment->p_type;
5804 map->p_flags = segment->p_flags;
5805 map->p_flags_valid = 1;
5806 map->p_paddr = segment->p_paddr;
5807 map->p_paddr_valid = 1;
5808
5809 /* Determine if this segment contains the ELF file header
5810 and if it contains the program headers themselves. */
5811 map->includes_filehdr = (segment->p_offset == 0
5812 && segment->p_filesz >= iehdr->e_ehsize);
5813
5814 map->includes_phdrs = 0;
5815 if (! phdr_included || segment->p_type != PT_LOAD)
5816 {
5817 map->includes_phdrs =
5818 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5819 && (segment->p_offset + segment->p_filesz
5820 >= ((bfd_vma) iehdr->e_phoff
5821 + iehdr->e_phnum * iehdr->e_phentsize)));
5822
5823 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5824 phdr_included = TRUE;
5825 }
5826
5827 if (section_count != 0)
5828 {
5829 unsigned int isec = 0;
5830
5831 for (section = ibfd->sections;
5832 section != NULL;
5833 section = section->next)
5834 {
5835 this_hdr = &(elf_section_data(section)->this_hdr);
5836 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5837 map->sections[isec++] = section->output_section;
5838 }
5839 }
5840
5841 map->count = section_count;
5842 *pointer_to_map = map;
5843 pointer_to_map = &map->next;
5844 }
5845
5846 elf_tdata (obfd)->segment_map = map_first;
5847 return TRUE;
5848}
5849
5850/* Copy private BFD data. This copies or rewrites ELF program header
5851 information. */
5852
5853static bfd_boolean
5854copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5855{
84d1d650
L
5856 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5857 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5858 return TRUE;
5859
5860 if (elf_tdata (ibfd)->phdr == NULL)
5861 return TRUE;
5862
5863 if (ibfd->xvec == obfd->xvec)
5864 {
5865 /* Check if any sections in the input BFD covered by ELF program
5866 header are changed. */
d55ce4e2 5867 Elf_Internal_Phdr *segment;
84d1d650
L
5868 asection *section, *osec;
5869 unsigned int i, num_segments;
5870 Elf_Internal_Shdr *this_hdr;
5871
5872 /* Initialize the segment mark field. */
5873 for (section = obfd->sections; section != NULL;
5874 section = section->next)
5875 section->segment_mark = FALSE;
5876
5877 num_segments = elf_elfheader (ibfd)->e_phnum;
5878 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5879 i < num_segments;
5880 i++, segment++)
5881 {
5882 for (section = ibfd->sections;
5883 section != NULL; section = section->next)
5884 {
5885 /* We mark the output section so that we know it comes
5886 from the input BFD. */
5887 osec = section->output_section;
5888 if (osec)
5889 osec->segment_mark = TRUE;
5890
5891 /* Check if this section is covered by the segment. */
5892 this_hdr = &(elf_section_data(section)->this_hdr);
5893 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5894 {
5895 /* FIXME: Check if its output section is changed or
5896 removed. What else do we need to check? */
5897 if (osec == NULL
5898 || section->flags != osec->flags
5899 || section->lma != osec->lma
5900 || section->vma != osec->vma
5901 || section->size != osec->size
5902 || section->rawsize != osec->rawsize
5903 || section->alignment_power != osec->alignment_power)
5904 goto rewrite;
5905 }
5906 }
5907 }
5908
5909 /* Check to see if any output section doesn't come from the
5910 input BFD. */
5911 for (section = obfd->sections; section != NULL;
5912 section = section->next)
5913 {
5914 if (section->segment_mark == FALSE)
5915 goto rewrite;
5916 else
5917 section->segment_mark = FALSE;
5918 }
5919
5920 return copy_elf_program_header (ibfd, obfd);
5921 }
5922
5923rewrite:
5924 return rewrite_elf_program_header (ibfd, obfd);
5925}
5926
ccd2ec6a
L
5927/* Initialize private output section information from input section. */
5928
5929bfd_boolean
5930_bfd_elf_init_private_section_data (bfd *ibfd,
5931 asection *isec,
5932 bfd *obfd,
5933 asection *osec,
5934 struct bfd_link_info *link_info)
5935
5936{
5937 Elf_Internal_Shdr *ihdr, *ohdr;
5938 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
5939
5940 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5941 || obfd->xvec->flavour != bfd_target_elf_flavour)
5942 return TRUE;
5943
e843e0f8
L
5944 /* Don't copy the output ELF section type from input if the
5945 output BFD section flags has been set to something different.
5946 elf_fake_sections will set ELF section type based on BFD
5947 section flags. */
8b95791f
AM
5948 if (osec->flags == isec->flags
5949 || (osec->flags == 0 && elf_section_type (osec) == SHT_NULL))
ccd2ec6a
L
5950 elf_section_type (osec) = elf_section_type (isec);
5951
5952 /* Set things up for objcopy and relocatable link. The output
5953 SHT_GROUP section will have its elf_next_in_group pointing back
5954 to the input group members. Ignore linker created group section.
5955 See elfNN_ia64_object_p in elfxx-ia64.c. */
5956
5957 if (need_group)
5958 {
5959 if (elf_sec_group (isec) == NULL
5960 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5961 {
5962 if (elf_section_flags (isec) & SHF_GROUP)
5963 elf_section_flags (osec) |= SHF_GROUP;
5964 elf_next_in_group (osec) = elf_next_in_group (isec);
5965 elf_group_name (osec) = elf_group_name (isec);
5966 }
5967 }
5968
5969 ihdr = &elf_section_data (isec)->this_hdr;
5970
5971 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
5972 don't use the output section of the linked-to section since it
5973 may be NULL at this point. */
5974 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
5975 {
5976 ohdr = &elf_section_data (osec)->this_hdr;
5977 ohdr->sh_flags |= SHF_LINK_ORDER;
5978 elf_linked_to_section (osec) = elf_linked_to_section (isec);
5979 }
5980
5981 osec->use_rela_p = isec->use_rela_p;
5982
5983 return TRUE;
5984}
5985
252b5132
RH
5986/* Copy private section information. This copies over the entsize
5987 field, and sometimes the info field. */
5988
b34976b6 5989bfd_boolean
217aa764
AM
5990_bfd_elf_copy_private_section_data (bfd *ibfd,
5991 asection *isec,
5992 bfd *obfd,
5993 asection *osec)
252b5132
RH
5994{
5995 Elf_Internal_Shdr *ihdr, *ohdr;
5996
5997 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5998 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5999 return TRUE;
252b5132 6000
252b5132
RH
6001 ihdr = &elf_section_data (isec)->this_hdr;
6002 ohdr = &elf_section_data (osec)->this_hdr;
6003
6004 ohdr->sh_entsize = ihdr->sh_entsize;
6005
6006 if (ihdr->sh_type == SHT_SYMTAB
6007 || ihdr->sh_type == SHT_DYNSYM
6008 || ihdr->sh_type == SHT_GNU_verneed
6009 || ihdr->sh_type == SHT_GNU_verdef)
6010 ohdr->sh_info = ihdr->sh_info;
6011
ccd2ec6a
L
6012 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6013 NULL);
252b5132
RH
6014}
6015
80fccad2
BW
6016/* Copy private header information. */
6017
6018bfd_boolean
6019_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6020{
6021 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6022 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6023 return TRUE;
6024
6025 /* Copy over private BFD data if it has not already been copied.
6026 This must be done here, rather than in the copy_private_bfd_data
6027 entry point, because the latter is called after the section
6028 contents have been set, which means that the program headers have
6029 already been worked out. */
6030 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6031 {
6032 if (! copy_private_bfd_data (ibfd, obfd))
6033 return FALSE;
6034 }
6035
6036 return TRUE;
6037}
6038
252b5132
RH
6039/* Copy private symbol information. If this symbol is in a section
6040 which we did not map into a BFD section, try to map the section
6041 index correctly. We use special macro definitions for the mapped
6042 section indices; these definitions are interpreted by the
6043 swap_out_syms function. */
6044
9ad5cbcf
AM
6045#define MAP_ONESYMTAB (SHN_HIOS + 1)
6046#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6047#define MAP_STRTAB (SHN_HIOS + 3)
6048#define MAP_SHSTRTAB (SHN_HIOS + 4)
6049#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6050
b34976b6 6051bfd_boolean
217aa764
AM
6052_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6053 asymbol *isymarg,
6054 bfd *obfd,
6055 asymbol *osymarg)
252b5132
RH
6056{
6057 elf_symbol_type *isym, *osym;
6058
6059 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6060 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6061 return TRUE;
252b5132
RH
6062
6063 isym = elf_symbol_from (ibfd, isymarg);
6064 osym = elf_symbol_from (obfd, osymarg);
6065
6066 if (isym != NULL
6067 && osym != NULL
6068 && bfd_is_abs_section (isym->symbol.section))
6069 {
6070 unsigned int shndx;
6071
6072 shndx = isym->internal_elf_sym.st_shndx;
6073 if (shndx == elf_onesymtab (ibfd))
6074 shndx = MAP_ONESYMTAB;
6075 else if (shndx == elf_dynsymtab (ibfd))
6076 shndx = MAP_DYNSYMTAB;
6077 else if (shndx == elf_tdata (ibfd)->strtab_section)
6078 shndx = MAP_STRTAB;
6079 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6080 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6081 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6082 shndx = MAP_SYM_SHNDX;
252b5132
RH
6083 osym->internal_elf_sym.st_shndx = shndx;
6084 }
6085
b34976b6 6086 return TRUE;
252b5132
RH
6087}
6088
6089/* Swap out the symbols. */
6090
b34976b6 6091static bfd_boolean
217aa764
AM
6092swap_out_syms (bfd *abfd,
6093 struct bfd_strtab_hash **sttp,
6094 int relocatable_p)
252b5132 6095{
9c5bfbb7 6096 const struct elf_backend_data *bed;
079e9a2f
AM
6097 int symcount;
6098 asymbol **syms;
6099 struct bfd_strtab_hash *stt;
6100 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6101 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6102 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6103 bfd_byte *outbound_syms;
6104 bfd_byte *outbound_shndx;
079e9a2f
AM
6105 int idx;
6106 bfd_size_type amt;
174fd7f9 6107 bfd_boolean name_local_sections;
252b5132
RH
6108
6109 if (!elf_map_symbols (abfd))
b34976b6 6110 return FALSE;
252b5132 6111
c044fabd 6112 /* Dump out the symtabs. */
079e9a2f
AM
6113 stt = _bfd_elf_stringtab_init ();
6114 if (stt == NULL)
b34976b6 6115 return FALSE;
252b5132 6116
079e9a2f
AM
6117 bed = get_elf_backend_data (abfd);
6118 symcount = bfd_get_symcount (abfd);
6119 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6120 symtab_hdr->sh_type = SHT_SYMTAB;
6121 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6122 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6123 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 6124 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
6125
6126 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6127 symstrtab_hdr->sh_type = SHT_STRTAB;
6128
d0fb9a8d 6129 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 6130 if (outbound_syms == NULL)
5ed6aba4
NC
6131 {
6132 _bfd_stringtab_free (stt);
6133 return FALSE;
6134 }
217aa764 6135 symtab_hdr->contents = outbound_syms;
252b5132 6136
9ad5cbcf
AM
6137 outbound_shndx = NULL;
6138 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6139 if (symtab_shndx_hdr->sh_name != 0)
6140 {
6141 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
6142 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
6143 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6144 if (outbound_shndx == NULL)
5ed6aba4
NC
6145 {
6146 _bfd_stringtab_free (stt);
6147 return FALSE;
6148 }
6149
9ad5cbcf
AM
6150 symtab_shndx_hdr->contents = outbound_shndx;
6151 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6152 symtab_shndx_hdr->sh_size = amt;
6153 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6154 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6155 }
6156
589e6347 6157 /* Now generate the data (for "contents"). */
079e9a2f
AM
6158 {
6159 /* Fill in zeroth symbol and swap it out. */
6160 Elf_Internal_Sym sym;
6161 sym.st_name = 0;
6162 sym.st_value = 0;
6163 sym.st_size = 0;
6164 sym.st_info = 0;
6165 sym.st_other = 0;
6166 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6167 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6168 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6169 if (outbound_shndx != NULL)
6170 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6171 }
252b5132 6172
174fd7f9
RS
6173 name_local_sections
6174 = (bed->elf_backend_name_local_section_symbols
6175 && bed->elf_backend_name_local_section_symbols (abfd));
6176
079e9a2f
AM
6177 syms = bfd_get_outsymbols (abfd);
6178 for (idx = 0; idx < symcount; idx++)
252b5132 6179 {
252b5132 6180 Elf_Internal_Sym sym;
079e9a2f
AM
6181 bfd_vma value = syms[idx]->value;
6182 elf_symbol_type *type_ptr;
6183 flagword flags = syms[idx]->flags;
6184 int type;
252b5132 6185
174fd7f9
RS
6186 if (!name_local_sections
6187 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6188 {
6189 /* Local section symbols have no name. */
6190 sym.st_name = 0;
6191 }
6192 else
6193 {
6194 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6195 syms[idx]->name,
b34976b6 6196 TRUE, FALSE);
079e9a2f 6197 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6198 {
6199 _bfd_stringtab_free (stt);
6200 return FALSE;
6201 }
079e9a2f 6202 }
252b5132 6203
079e9a2f 6204 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6205
079e9a2f
AM
6206 if ((flags & BSF_SECTION_SYM) == 0
6207 && bfd_is_com_section (syms[idx]->section))
6208 {
6209 /* ELF common symbols put the alignment into the `value' field,
6210 and the size into the `size' field. This is backwards from
6211 how BFD handles it, so reverse it here. */
6212 sym.st_size = value;
6213 if (type_ptr == NULL
6214 || type_ptr->internal_elf_sym.st_value == 0)
6215 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6216 else
6217 sym.st_value = type_ptr->internal_elf_sym.st_value;
6218 sym.st_shndx = _bfd_elf_section_from_bfd_section
6219 (abfd, syms[idx]->section);
6220 }
6221 else
6222 {
6223 asection *sec = syms[idx]->section;
6224 int shndx;
252b5132 6225
079e9a2f
AM
6226 if (sec->output_section)
6227 {
6228 value += sec->output_offset;
6229 sec = sec->output_section;
6230 }
589e6347 6231
079e9a2f
AM
6232 /* Don't add in the section vma for relocatable output. */
6233 if (! relocatable_p)
6234 value += sec->vma;
6235 sym.st_value = value;
6236 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6237
6238 if (bfd_is_abs_section (sec)
6239 && type_ptr != NULL
6240 && type_ptr->internal_elf_sym.st_shndx != 0)
6241 {
6242 /* This symbol is in a real ELF section which we did
6243 not create as a BFD section. Undo the mapping done
6244 by copy_private_symbol_data. */
6245 shndx = type_ptr->internal_elf_sym.st_shndx;
6246 switch (shndx)
6247 {
6248 case MAP_ONESYMTAB:
6249 shndx = elf_onesymtab (abfd);
6250 break;
6251 case MAP_DYNSYMTAB:
6252 shndx = elf_dynsymtab (abfd);
6253 break;
6254 case MAP_STRTAB:
6255 shndx = elf_tdata (abfd)->strtab_section;
6256 break;
6257 case MAP_SHSTRTAB:
6258 shndx = elf_tdata (abfd)->shstrtab_section;
6259 break;
9ad5cbcf
AM
6260 case MAP_SYM_SHNDX:
6261 shndx = elf_tdata (abfd)->symtab_shndx_section;
6262 break;
079e9a2f
AM
6263 default:
6264 break;
6265 }
6266 }
6267 else
6268 {
6269 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6270
079e9a2f
AM
6271 if (shndx == -1)
6272 {
6273 asection *sec2;
6274
6275 /* Writing this would be a hell of a lot easier if
6276 we had some decent documentation on bfd, and
6277 knew what to expect of the library, and what to
6278 demand of applications. For example, it
6279 appears that `objcopy' might not set the
6280 section of a symbol to be a section that is
6281 actually in the output file. */
6282 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6283 if (sec2 == NULL)
6284 {
6285 _bfd_error_handler (_("\
6286Unable to find equivalent output section for symbol '%s' from section '%s'"),
6287 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6288 sec->name);
811072d8 6289 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6290 _bfd_stringtab_free (stt);
589e6347
NC
6291 return FALSE;
6292 }
811072d8 6293
079e9a2f
AM
6294 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
6295 BFD_ASSERT (shndx != -1);
6296 }
6297 }
252b5132 6298
079e9a2f
AM
6299 sym.st_shndx = shndx;
6300 }
252b5132 6301
13ae64f3
JJ
6302 if ((flags & BSF_THREAD_LOCAL) != 0)
6303 type = STT_TLS;
6304 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6305 type = STT_FUNC;
6306 else if ((flags & BSF_OBJECT) != 0)
6307 type = STT_OBJECT;
6308 else
6309 type = STT_NOTYPE;
252b5132 6310
13ae64f3
JJ
6311 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6312 type = STT_TLS;
6313
589e6347 6314 /* Processor-specific types. */
079e9a2f
AM
6315 if (type_ptr != NULL
6316 && bed->elf_backend_get_symbol_type)
6317 type = ((*bed->elf_backend_get_symbol_type)
6318 (&type_ptr->internal_elf_sym, type));
252b5132 6319
079e9a2f
AM
6320 if (flags & BSF_SECTION_SYM)
6321 {
6322 if (flags & BSF_GLOBAL)
6323 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6324 else
6325 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6326 }
6327 else if (bfd_is_com_section (syms[idx]->section))
6328 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
6329 else if (bfd_is_und_section (syms[idx]->section))
6330 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6331 ? STB_WEAK
6332 : STB_GLOBAL),
6333 type);
6334 else if (flags & BSF_FILE)
6335 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6336 else
6337 {
6338 int bind = STB_LOCAL;
252b5132 6339
079e9a2f
AM
6340 if (flags & BSF_LOCAL)
6341 bind = STB_LOCAL;
6342 else if (flags & BSF_WEAK)
6343 bind = STB_WEAK;
6344 else if (flags & BSF_GLOBAL)
6345 bind = STB_GLOBAL;
252b5132 6346
079e9a2f
AM
6347 sym.st_info = ELF_ST_INFO (bind, type);
6348 }
252b5132 6349
079e9a2f
AM
6350 if (type_ptr != NULL)
6351 sym.st_other = type_ptr->internal_elf_sym.st_other;
6352 else
6353 sym.st_other = 0;
252b5132 6354
9ad5cbcf 6355 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6356 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6357 if (outbound_shndx != NULL)
6358 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6359 }
252b5132 6360
079e9a2f
AM
6361 *sttp = stt;
6362 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6363 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6364
079e9a2f
AM
6365 symstrtab_hdr->sh_flags = 0;
6366 symstrtab_hdr->sh_addr = 0;
6367 symstrtab_hdr->sh_entsize = 0;
6368 symstrtab_hdr->sh_link = 0;
6369 symstrtab_hdr->sh_info = 0;
6370 symstrtab_hdr->sh_addralign = 1;
252b5132 6371
b34976b6 6372 return TRUE;
252b5132
RH
6373}
6374
6375/* Return the number of bytes required to hold the symtab vector.
6376
6377 Note that we base it on the count plus 1, since we will null terminate
6378 the vector allocated based on this size. However, the ELF symbol table
6379 always has a dummy entry as symbol #0, so it ends up even. */
6380
6381long
217aa764 6382_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6383{
6384 long symcount;
6385 long symtab_size;
6386 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6387
6388 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6389 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6390 if (symcount > 0)
6391 symtab_size -= sizeof (asymbol *);
252b5132
RH
6392
6393 return symtab_size;
6394}
6395
6396long
217aa764 6397_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6398{
6399 long symcount;
6400 long symtab_size;
6401 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6402
6403 if (elf_dynsymtab (abfd) == 0)
6404 {
6405 bfd_set_error (bfd_error_invalid_operation);
6406 return -1;
6407 }
6408
6409 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6410 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6411 if (symcount > 0)
6412 symtab_size -= sizeof (asymbol *);
252b5132
RH
6413
6414 return symtab_size;
6415}
6416
6417long
217aa764
AM
6418_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6419 sec_ptr asect)
252b5132
RH
6420{
6421 return (asect->reloc_count + 1) * sizeof (arelent *);
6422}
6423
6424/* Canonicalize the relocs. */
6425
6426long
217aa764
AM
6427_bfd_elf_canonicalize_reloc (bfd *abfd,
6428 sec_ptr section,
6429 arelent **relptr,
6430 asymbol **symbols)
252b5132
RH
6431{
6432 arelent *tblptr;
6433 unsigned int i;
9c5bfbb7 6434 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6435
b34976b6 6436 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6437 return -1;
6438
6439 tblptr = section->relocation;
6440 for (i = 0; i < section->reloc_count; i++)
6441 *relptr++ = tblptr++;
6442
6443 *relptr = NULL;
6444
6445 return section->reloc_count;
6446}
6447
6448long
6cee3f79 6449_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6450{
9c5bfbb7 6451 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6452 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6453
6454 if (symcount >= 0)
6455 bfd_get_symcount (abfd) = symcount;
6456 return symcount;
6457}
6458
6459long
217aa764
AM
6460_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6461 asymbol **allocation)
252b5132 6462{
9c5bfbb7 6463 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6464 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6465
6466 if (symcount >= 0)
6467 bfd_get_dynamic_symcount (abfd) = symcount;
6468 return symcount;
252b5132
RH
6469}
6470
8615f3f2
AM
6471/* Return the size required for the dynamic reloc entries. Any loadable
6472 section that was actually installed in the BFD, and has type SHT_REL
6473 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6474 dynamic reloc section. */
252b5132
RH
6475
6476long
217aa764 6477_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6478{
6479 long ret;
6480 asection *s;
6481
6482 if (elf_dynsymtab (abfd) == 0)
6483 {
6484 bfd_set_error (bfd_error_invalid_operation);
6485 return -1;
6486 }
6487
6488 ret = sizeof (arelent *);
6489 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6490 if ((s->flags & SEC_LOAD) != 0
6491 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6492 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6493 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6494 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6495 * sizeof (arelent *));
6496
6497 return ret;
6498}
6499
8615f3f2
AM
6500/* Canonicalize the dynamic relocation entries. Note that we return the
6501 dynamic relocations as a single block, although they are actually
6502 associated with particular sections; the interface, which was
6503 designed for SunOS style shared libraries, expects that there is only
6504 one set of dynamic relocs. Any loadable section that was actually
6505 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6506 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6507
6508long
217aa764
AM
6509_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6510 arelent **storage,
6511 asymbol **syms)
252b5132 6512{
217aa764 6513 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6514 asection *s;
6515 long ret;
6516
6517 if (elf_dynsymtab (abfd) == 0)
6518 {
6519 bfd_set_error (bfd_error_invalid_operation);
6520 return -1;
6521 }
6522
6523 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6524 ret = 0;
6525 for (s = abfd->sections; s != NULL; s = s->next)
6526 {
8615f3f2
AM
6527 if ((s->flags & SEC_LOAD) != 0
6528 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6529 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6530 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6531 {
6532 arelent *p;
6533 long count, i;
6534
b34976b6 6535 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6536 return -1;
eea6121a 6537 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6538 p = s->relocation;
6539 for (i = 0; i < count; i++)
6540 *storage++ = p++;
6541 ret += count;
6542 }
6543 }
6544
6545 *storage = NULL;
6546
6547 return ret;
6548}
6549\f
6550/* Read in the version information. */
6551
b34976b6 6552bfd_boolean
fc0e6df6 6553_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6554{
6555 bfd_byte *contents = NULL;
fc0e6df6
PB
6556 unsigned int freeidx = 0;
6557
6558 if (elf_dynverref (abfd) != 0)
6559 {
6560 Elf_Internal_Shdr *hdr;
6561 Elf_External_Verneed *everneed;
6562 Elf_Internal_Verneed *iverneed;
6563 unsigned int i;
d0fb9a8d 6564 bfd_byte *contents_end;
fc0e6df6
PB
6565
6566 hdr = &elf_tdata (abfd)->dynverref_hdr;
6567
d0fb9a8d
JJ
6568 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6569 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6570 if (elf_tdata (abfd)->verref == NULL)
6571 goto error_return;
6572
6573 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6574
6575 contents = bfd_malloc (hdr->sh_size);
6576 if (contents == NULL)
d0fb9a8d
JJ
6577 {
6578error_return_verref:
6579 elf_tdata (abfd)->verref = NULL;
6580 elf_tdata (abfd)->cverrefs = 0;
6581 goto error_return;
6582 }
fc0e6df6
PB
6583 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6584 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6585 goto error_return_verref;
fc0e6df6 6586
d0fb9a8d
JJ
6587 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6588 goto error_return_verref;
6589
6590 BFD_ASSERT (sizeof (Elf_External_Verneed)
6591 == sizeof (Elf_External_Vernaux));
6592 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6593 everneed = (Elf_External_Verneed *) contents;
6594 iverneed = elf_tdata (abfd)->verref;
6595 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6596 {
6597 Elf_External_Vernaux *evernaux;
6598 Elf_Internal_Vernaux *ivernaux;
6599 unsigned int j;
6600
6601 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6602
6603 iverneed->vn_bfd = abfd;
6604
6605 iverneed->vn_filename =
6606 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6607 iverneed->vn_file);
6608 if (iverneed->vn_filename == NULL)
d0fb9a8d 6609 goto error_return_verref;
fc0e6df6 6610
d0fb9a8d
JJ
6611 if (iverneed->vn_cnt == 0)
6612 iverneed->vn_auxptr = NULL;
6613 else
6614 {
6615 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6616 sizeof (Elf_Internal_Vernaux));
6617 if (iverneed->vn_auxptr == NULL)
6618 goto error_return_verref;
6619 }
6620
6621 if (iverneed->vn_aux
6622 > (size_t) (contents_end - (bfd_byte *) everneed))
6623 goto error_return_verref;
fc0e6df6
PB
6624
6625 evernaux = ((Elf_External_Vernaux *)
6626 ((bfd_byte *) everneed + iverneed->vn_aux));
6627 ivernaux = iverneed->vn_auxptr;
6628 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6629 {
6630 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6631
6632 ivernaux->vna_nodename =
6633 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6634 ivernaux->vna_name);
6635 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6636 goto error_return_verref;
fc0e6df6
PB
6637
6638 if (j + 1 < iverneed->vn_cnt)
6639 ivernaux->vna_nextptr = ivernaux + 1;
6640 else
6641 ivernaux->vna_nextptr = NULL;
6642
d0fb9a8d
JJ
6643 if (ivernaux->vna_next
6644 > (size_t) (contents_end - (bfd_byte *) evernaux))
6645 goto error_return_verref;
6646
fc0e6df6
PB
6647 evernaux = ((Elf_External_Vernaux *)
6648 ((bfd_byte *) evernaux + ivernaux->vna_next));
6649
6650 if (ivernaux->vna_other > freeidx)
6651 freeidx = ivernaux->vna_other;
6652 }
6653
6654 if (i + 1 < hdr->sh_info)
6655 iverneed->vn_nextref = iverneed + 1;
6656 else
6657 iverneed->vn_nextref = NULL;
6658
d0fb9a8d
JJ
6659 if (iverneed->vn_next
6660 > (size_t) (contents_end - (bfd_byte *) everneed))
6661 goto error_return_verref;
6662
fc0e6df6
PB
6663 everneed = ((Elf_External_Verneed *)
6664 ((bfd_byte *) everneed + iverneed->vn_next));
6665 }
6666
6667 free (contents);
6668 contents = NULL;
6669 }
252b5132
RH
6670
6671 if (elf_dynverdef (abfd) != 0)
6672 {
6673 Elf_Internal_Shdr *hdr;
6674 Elf_External_Verdef *everdef;
6675 Elf_Internal_Verdef *iverdef;
f631889e
UD
6676 Elf_Internal_Verdef *iverdefarr;
6677 Elf_Internal_Verdef iverdefmem;
252b5132 6678 unsigned int i;
062e2358 6679 unsigned int maxidx;
d0fb9a8d 6680 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6681
6682 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6683
217aa764 6684 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6685 if (contents == NULL)
6686 goto error_return;
6687 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6688 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6689 goto error_return;
6690
d0fb9a8d
JJ
6691 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6692 goto error_return;
6693
6694 BFD_ASSERT (sizeof (Elf_External_Verdef)
6695 >= sizeof (Elf_External_Verdaux));
6696 contents_end_def = contents + hdr->sh_size
6697 - sizeof (Elf_External_Verdef);
6698 contents_end_aux = contents + hdr->sh_size
6699 - sizeof (Elf_External_Verdaux);
6700
f631889e
UD
6701 /* We know the number of entries in the section but not the maximum
6702 index. Therefore we have to run through all entries and find
6703 the maximum. */
252b5132 6704 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6705 maxidx = 0;
6706 for (i = 0; i < hdr->sh_info; ++i)
6707 {
6708 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6709
062e2358
AM
6710 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6711 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6712
d0fb9a8d
JJ
6713 if (iverdefmem.vd_next
6714 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6715 goto error_return;
6716
f631889e
UD
6717 everdef = ((Elf_External_Verdef *)
6718 ((bfd_byte *) everdef + iverdefmem.vd_next));
6719 }
6720
fc0e6df6
PB
6721 if (default_imported_symver)
6722 {
6723 if (freeidx > maxidx)
6724 maxidx = ++freeidx;
6725 else
6726 freeidx = ++maxidx;
6727 }
d0fb9a8d
JJ
6728 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6729 sizeof (Elf_Internal_Verdef));
f631889e
UD
6730 if (elf_tdata (abfd)->verdef == NULL)
6731 goto error_return;
6732
6733 elf_tdata (abfd)->cverdefs = maxidx;
6734
6735 everdef = (Elf_External_Verdef *) contents;
6736 iverdefarr = elf_tdata (abfd)->verdef;
6737 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6738 {
6739 Elf_External_Verdaux *everdaux;
6740 Elf_Internal_Verdaux *iverdaux;
6741 unsigned int j;
6742
f631889e
UD
6743 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6744
d0fb9a8d
JJ
6745 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6746 {
6747error_return_verdef:
6748 elf_tdata (abfd)->verdef = NULL;
6749 elf_tdata (abfd)->cverdefs = 0;
6750 goto error_return;
6751 }
6752
f631889e
UD
6753 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6754 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6755
6756 iverdef->vd_bfd = abfd;
6757
d0fb9a8d
JJ
6758 if (iverdef->vd_cnt == 0)
6759 iverdef->vd_auxptr = NULL;
6760 else
6761 {
6762 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6763 sizeof (Elf_Internal_Verdaux));
6764 if (iverdef->vd_auxptr == NULL)
6765 goto error_return_verdef;
6766 }
6767
6768 if (iverdef->vd_aux
6769 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6770 goto error_return_verdef;
252b5132
RH
6771
6772 everdaux = ((Elf_External_Verdaux *)
6773 ((bfd_byte *) everdef + iverdef->vd_aux));
6774 iverdaux = iverdef->vd_auxptr;
6775 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6776 {
6777 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6778
6779 iverdaux->vda_nodename =
6780 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6781 iverdaux->vda_name);
6782 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6783 goto error_return_verdef;
252b5132
RH
6784
6785 if (j + 1 < iverdef->vd_cnt)
6786 iverdaux->vda_nextptr = iverdaux + 1;
6787 else
6788 iverdaux->vda_nextptr = NULL;
6789
d0fb9a8d
JJ
6790 if (iverdaux->vda_next
6791 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6792 goto error_return_verdef;
6793
252b5132
RH
6794 everdaux = ((Elf_External_Verdaux *)
6795 ((bfd_byte *) everdaux + iverdaux->vda_next));
6796 }
6797
d0fb9a8d
JJ
6798 if (iverdef->vd_cnt)
6799 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6800
d0fb9a8d 6801 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6802 iverdef->vd_nextdef = iverdef + 1;
6803 else
6804 iverdef->vd_nextdef = NULL;
6805
6806 everdef = ((Elf_External_Verdef *)
6807 ((bfd_byte *) everdef + iverdef->vd_next));
6808 }
6809
6810 free (contents);
6811 contents = NULL;
6812 }
fc0e6df6 6813 else if (default_imported_symver)
252b5132 6814 {
fc0e6df6
PB
6815 if (freeidx < 3)
6816 freeidx = 3;
6817 else
6818 freeidx++;
252b5132 6819
d0fb9a8d
JJ
6820 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6821 sizeof (Elf_Internal_Verdef));
fc0e6df6 6822 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6823 goto error_return;
6824
fc0e6df6
PB
6825 elf_tdata (abfd)->cverdefs = freeidx;
6826 }
252b5132 6827
fc0e6df6
PB
6828 /* Create a default version based on the soname. */
6829 if (default_imported_symver)
6830 {
6831 Elf_Internal_Verdef *iverdef;
6832 Elf_Internal_Verdaux *iverdaux;
252b5132 6833
fc0e6df6 6834 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6835
fc0e6df6
PB
6836 iverdef->vd_version = VER_DEF_CURRENT;
6837 iverdef->vd_flags = 0;
6838 iverdef->vd_ndx = freeidx;
6839 iverdef->vd_cnt = 1;
252b5132 6840
fc0e6df6 6841 iverdef->vd_bfd = abfd;
252b5132 6842
fc0e6df6
PB
6843 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6844 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6845 goto error_return_verdef;
fc0e6df6 6846 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6847 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6848 if (iverdef->vd_auxptr == NULL)
6849 goto error_return_verdef;
252b5132 6850
fc0e6df6
PB
6851 iverdaux = iverdef->vd_auxptr;
6852 iverdaux->vda_nodename = iverdef->vd_nodename;
6853 iverdaux->vda_nextptr = NULL;
252b5132
RH
6854 }
6855
b34976b6 6856 return TRUE;
252b5132
RH
6857
6858 error_return:
5ed6aba4 6859 if (contents != NULL)
252b5132 6860 free (contents);
b34976b6 6861 return FALSE;
252b5132
RH
6862}
6863\f
6864asymbol *
217aa764 6865_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6866{
6867 elf_symbol_type *newsym;
dc810e39 6868 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6869
217aa764 6870 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6871 if (!newsym)
6872 return NULL;
6873 else
6874 {
6875 newsym->symbol.the_bfd = abfd;
6876 return &newsym->symbol;
6877 }
6878}
6879
6880void
217aa764
AM
6881_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6882 asymbol *symbol,
6883 symbol_info *ret)
252b5132
RH
6884{
6885 bfd_symbol_info (symbol, ret);
6886}
6887
6888/* Return whether a symbol name implies a local symbol. Most targets
6889 use this function for the is_local_label_name entry point, but some
6890 override it. */
6891
b34976b6 6892bfd_boolean
217aa764
AM
6893_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6894 const char *name)
252b5132
RH
6895{
6896 /* Normal local symbols start with ``.L''. */
6897 if (name[0] == '.' && name[1] == 'L')
b34976b6 6898 return TRUE;
252b5132
RH
6899
6900 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6901 DWARF debugging symbols starting with ``..''. */
6902 if (name[0] == '.' && name[1] == '.')
b34976b6 6903 return TRUE;
252b5132
RH
6904
6905 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6906 emitting DWARF debugging output. I suspect this is actually a
6907 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6908 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6909 underscore to be emitted on some ELF targets). For ease of use,
6910 we treat such symbols as local. */
6911 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6912 return TRUE;
252b5132 6913
b34976b6 6914 return FALSE;
252b5132
RH
6915}
6916
6917alent *
217aa764
AM
6918_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6919 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6920{
6921 abort ();
6922 return NULL;
6923}
6924
b34976b6 6925bfd_boolean
217aa764
AM
6926_bfd_elf_set_arch_mach (bfd *abfd,
6927 enum bfd_architecture arch,
6928 unsigned long machine)
252b5132
RH
6929{
6930 /* If this isn't the right architecture for this backend, and this
6931 isn't the generic backend, fail. */
6932 if (arch != get_elf_backend_data (abfd)->arch
6933 && arch != bfd_arch_unknown
6934 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6935 return FALSE;
252b5132
RH
6936
6937 return bfd_default_set_arch_mach (abfd, arch, machine);
6938}
6939
d1fad7c6
NC
6940/* Find the function to a particular section and offset,
6941 for error reporting. */
252b5132 6942
b34976b6 6943static bfd_boolean
217aa764
AM
6944elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6945 asection *section,
6946 asymbol **symbols,
6947 bfd_vma offset,
6948 const char **filename_ptr,
6949 const char **functionname_ptr)
252b5132 6950{
252b5132 6951 const char *filename;
57426232 6952 asymbol *func, *file;
252b5132
RH
6953 bfd_vma low_func;
6954 asymbol **p;
57426232
JB
6955 /* ??? Given multiple file symbols, it is impossible to reliably
6956 choose the right file name for global symbols. File symbols are
6957 local symbols, and thus all file symbols must sort before any
6958 global symbols. The ELF spec may be interpreted to say that a
6959 file symbol must sort before other local symbols, but currently
6960 ld -r doesn't do this. So, for ld -r output, it is possible to
6961 make a better choice of file name for local symbols by ignoring
6962 file symbols appearing after a given local symbol. */
6963 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6964
252b5132
RH
6965 filename = NULL;
6966 func = NULL;
57426232 6967 file = NULL;
252b5132 6968 low_func = 0;
57426232 6969 state = nothing_seen;
252b5132
RH
6970
6971 for (p = symbols; *p != NULL; p++)
6972 {
6973 elf_symbol_type *q;
6974
6975 q = (elf_symbol_type *) *p;
6976
252b5132
RH
6977 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6978 {
6979 default:
6980 break;
6981 case STT_FILE:
57426232
JB
6982 file = &q->symbol;
6983 if (state == symbol_seen)
6984 state = file_after_symbol_seen;
6985 continue;
252b5132
RH
6986 case STT_NOTYPE:
6987 case STT_FUNC:
6b40fcba 6988 if (bfd_get_section (&q->symbol) == section
252b5132
RH
6989 && q->symbol.value >= low_func
6990 && q->symbol.value <= offset)
6991 {
6992 func = (asymbol *) q;
6993 low_func = q->symbol.value;
a1923858
AM
6994 filename = NULL;
6995 if (file != NULL
6996 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
6997 || state != file_after_symbol_seen))
57426232 6998 filename = bfd_asymbol_name (file);
252b5132
RH
6999 }
7000 break;
7001 }
57426232
JB
7002 if (state == nothing_seen)
7003 state = symbol_seen;
252b5132
RH
7004 }
7005
7006 if (func == NULL)
b34976b6 7007 return FALSE;
252b5132 7008
d1fad7c6
NC
7009 if (filename_ptr)
7010 *filename_ptr = filename;
7011 if (functionname_ptr)
7012 *functionname_ptr = bfd_asymbol_name (func);
7013
b34976b6 7014 return TRUE;
d1fad7c6
NC
7015}
7016
7017/* Find the nearest line to a particular section and offset,
7018 for error reporting. */
7019
b34976b6 7020bfd_boolean
217aa764
AM
7021_bfd_elf_find_nearest_line (bfd *abfd,
7022 asection *section,
7023 asymbol **symbols,
7024 bfd_vma offset,
7025 const char **filename_ptr,
7026 const char **functionname_ptr,
7027 unsigned int *line_ptr)
d1fad7c6 7028{
b34976b6 7029 bfd_boolean found;
d1fad7c6
NC
7030
7031 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7032 filename_ptr, functionname_ptr,
7033 line_ptr))
d1fad7c6
NC
7034 {
7035 if (!*functionname_ptr)
4e8a9624
AM
7036 elf_find_function (abfd, section, symbols, offset,
7037 *filename_ptr ? NULL : filename_ptr,
7038 functionname_ptr);
7039
b34976b6 7040 return TRUE;
d1fad7c6
NC
7041 }
7042
7043 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7044 filename_ptr, functionname_ptr,
7045 line_ptr, 0,
7046 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7047 {
7048 if (!*functionname_ptr)
4e8a9624
AM
7049 elf_find_function (abfd, section, symbols, offset,
7050 *filename_ptr ? NULL : filename_ptr,
7051 functionname_ptr);
7052
b34976b6 7053 return TRUE;
d1fad7c6
NC
7054 }
7055
7056 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7057 &found, filename_ptr,
7058 functionname_ptr, line_ptr,
7059 &elf_tdata (abfd)->line_info))
b34976b6 7060 return FALSE;
dc43ada5 7061 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7062 return TRUE;
d1fad7c6
NC
7063
7064 if (symbols == NULL)
b34976b6 7065 return FALSE;
d1fad7c6
NC
7066
7067 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7068 filename_ptr, functionname_ptr))
b34976b6 7069 return FALSE;
d1fad7c6 7070
252b5132 7071 *line_ptr = 0;
b34976b6 7072 return TRUE;
252b5132
RH
7073}
7074
5420f73d
L
7075/* Find the line for a symbol. */
7076
7077bfd_boolean
7078_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7079 const char **filename_ptr, unsigned int *line_ptr)
7080{
7081 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7082 filename_ptr, line_ptr, 0,
7083 &elf_tdata (abfd)->dwarf2_find_line_info);
7084}
7085
4ab527b0
FF
7086/* After a call to bfd_find_nearest_line, successive calls to
7087 bfd_find_inliner_info can be used to get source information about
7088 each level of function inlining that terminated at the address
7089 passed to bfd_find_nearest_line. Currently this is only supported
7090 for DWARF2 with appropriate DWARF3 extensions. */
7091
7092bfd_boolean
7093_bfd_elf_find_inliner_info (bfd *abfd,
7094 const char **filename_ptr,
7095 const char **functionname_ptr,
7096 unsigned int *line_ptr)
7097{
7098 bfd_boolean found;
7099 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7100 functionname_ptr, line_ptr,
7101 & elf_tdata (abfd)->dwarf2_find_line_info);
7102 return found;
7103}
7104
252b5132 7105int
217aa764 7106_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
7107{
7108 int ret;
7109
7110 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
7111 if (! reloc)
7112 ret += get_program_header_size (abfd);
7113 return ret;
7114}
7115
b34976b6 7116bfd_boolean
217aa764
AM
7117_bfd_elf_set_section_contents (bfd *abfd,
7118 sec_ptr section,
0f867abe 7119 const void *location,
217aa764
AM
7120 file_ptr offset,
7121 bfd_size_type count)
252b5132
RH
7122{
7123 Elf_Internal_Shdr *hdr;
dc810e39 7124 bfd_signed_vma pos;
252b5132
RH
7125
7126 if (! abfd->output_has_begun
217aa764 7127 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7128 return FALSE;
252b5132
RH
7129
7130 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7131 pos = hdr->sh_offset + offset;
7132 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7133 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7134 return FALSE;
252b5132 7135
b34976b6 7136 return TRUE;
252b5132
RH
7137}
7138
7139void
217aa764
AM
7140_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7141 arelent *cache_ptr ATTRIBUTE_UNUSED,
7142 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7143{
7144 abort ();
7145}
7146
252b5132
RH
7147/* Try to convert a non-ELF reloc into an ELF one. */
7148
b34976b6 7149bfd_boolean
217aa764 7150_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7151{
c044fabd 7152 /* Check whether we really have an ELF howto. */
252b5132
RH
7153
7154 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7155 {
7156 bfd_reloc_code_real_type code;
7157 reloc_howto_type *howto;
7158
7159 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7160 equivalent ELF reloc. */
252b5132
RH
7161
7162 if (areloc->howto->pc_relative)
7163 {
7164 switch (areloc->howto->bitsize)
7165 {
7166 case 8:
7167 code = BFD_RELOC_8_PCREL;
7168 break;
7169 case 12:
7170 code = BFD_RELOC_12_PCREL;
7171 break;
7172 case 16:
7173 code = BFD_RELOC_16_PCREL;
7174 break;
7175 case 24:
7176 code = BFD_RELOC_24_PCREL;
7177 break;
7178 case 32:
7179 code = BFD_RELOC_32_PCREL;
7180 break;
7181 case 64:
7182 code = BFD_RELOC_64_PCREL;
7183 break;
7184 default:
7185 goto fail;
7186 }
7187
7188 howto = bfd_reloc_type_lookup (abfd, code);
7189
7190 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7191 {
7192 if (howto->pcrel_offset)
7193 areloc->addend += areloc->address;
7194 else
7195 areloc->addend -= areloc->address; /* addend is unsigned!! */
7196 }
7197 }
7198 else
7199 {
7200 switch (areloc->howto->bitsize)
7201 {
7202 case 8:
7203 code = BFD_RELOC_8;
7204 break;
7205 case 14:
7206 code = BFD_RELOC_14;
7207 break;
7208 case 16:
7209 code = BFD_RELOC_16;
7210 break;
7211 case 26:
7212 code = BFD_RELOC_26;
7213 break;
7214 case 32:
7215 code = BFD_RELOC_32;
7216 break;
7217 case 64:
7218 code = BFD_RELOC_64;
7219 break;
7220 default:
7221 goto fail;
7222 }
7223
7224 howto = bfd_reloc_type_lookup (abfd, code);
7225 }
7226
7227 if (howto)
7228 areloc->howto = howto;
7229 else
7230 goto fail;
7231 }
7232
b34976b6 7233 return TRUE;
252b5132
RH
7234
7235 fail:
7236 (*_bfd_error_handler)
d003868e
AM
7237 (_("%B: unsupported relocation type %s"),
7238 abfd, areloc->howto->name);
252b5132 7239 bfd_set_error (bfd_error_bad_value);
b34976b6 7240 return FALSE;
252b5132
RH
7241}
7242
b34976b6 7243bfd_boolean
217aa764 7244_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7245{
7246 if (bfd_get_format (abfd) == bfd_object)
7247 {
b25e3d87 7248 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7249 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7250 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7251 }
7252
7253 return _bfd_generic_close_and_cleanup (abfd);
7254}
7255
7256/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7257 in the relocation's offset. Thus we cannot allow any sort of sanity
7258 range-checking to interfere. There is nothing else to do in processing
7259 this reloc. */
7260
7261bfd_reloc_status_type
217aa764
AM
7262_bfd_elf_rel_vtable_reloc_fn
7263 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7264 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7265 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7266 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7267{
7268 return bfd_reloc_ok;
7269}
252b5132
RH
7270\f
7271/* Elf core file support. Much of this only works on native
7272 toolchains, since we rely on knowing the
7273 machine-dependent procfs structure in order to pick
c044fabd 7274 out details about the corefile. */
252b5132
RH
7275
7276#ifdef HAVE_SYS_PROCFS_H
7277# include <sys/procfs.h>
7278#endif
7279
c044fabd 7280/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7281
7282static int
217aa764 7283elfcore_make_pid (bfd *abfd)
252b5132
RH
7284{
7285 return ((elf_tdata (abfd)->core_lwpid << 16)
7286 + (elf_tdata (abfd)->core_pid));
7287}
7288
252b5132
RH
7289/* If there isn't a section called NAME, make one, using
7290 data from SECT. Note, this function will generate a
7291 reference to NAME, so you shouldn't deallocate or
c044fabd 7292 overwrite it. */
252b5132 7293
b34976b6 7294static bfd_boolean
217aa764 7295elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7296{
c044fabd 7297 asection *sect2;
252b5132
RH
7298
7299 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7300 return TRUE;
252b5132
RH
7301
7302 sect2 = bfd_make_section (abfd, name);
7303 if (sect2 == NULL)
b34976b6 7304 return FALSE;
252b5132 7305
eea6121a 7306 sect2->size = sect->size;
252b5132
RH
7307 sect2->filepos = sect->filepos;
7308 sect2->flags = sect->flags;
7309 sect2->alignment_power = sect->alignment_power;
b34976b6 7310 return TRUE;
252b5132
RH
7311}
7312
bb0082d6
AM
7313/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7314 actually creates up to two pseudosections:
7315 - For the single-threaded case, a section named NAME, unless
7316 such a section already exists.
7317 - For the multi-threaded case, a section named "NAME/PID", where
7318 PID is elfcore_make_pid (abfd).
7319 Both pseudosections have identical contents. */
b34976b6 7320bfd_boolean
217aa764
AM
7321_bfd_elfcore_make_pseudosection (bfd *abfd,
7322 char *name,
7323 size_t size,
7324 ufile_ptr filepos)
bb0082d6
AM
7325{
7326 char buf[100];
7327 char *threaded_name;
d4c88bbb 7328 size_t len;
bb0082d6
AM
7329 asection *sect;
7330
7331 /* Build the section name. */
7332
7333 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7334 len = strlen (buf) + 1;
217aa764 7335 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7336 if (threaded_name == NULL)
b34976b6 7337 return FALSE;
d4c88bbb 7338 memcpy (threaded_name, buf, len);
bb0082d6 7339
62f3bb11 7340 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 7341 if (sect == NULL)
b34976b6 7342 return FALSE;
eea6121a 7343 sect->size = size;
bb0082d6
AM
7344 sect->filepos = filepos;
7345 sect->flags = SEC_HAS_CONTENTS;
7346 sect->alignment_power = 2;
7347
936e320b 7348 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7349}
7350
252b5132 7351/* prstatus_t exists on:
4a938328 7352 solaris 2.5+
252b5132
RH
7353 linux 2.[01] + glibc
7354 unixware 4.2
7355*/
7356
7357#if defined (HAVE_PRSTATUS_T)
a7b97311 7358
b34976b6 7359static bfd_boolean
217aa764 7360elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7361{
eea6121a 7362 size_t size;
7ee38065 7363 int offset;
252b5132 7364
4a938328
MS
7365 if (note->descsz == sizeof (prstatus_t))
7366 {
7367 prstatus_t prstat;
252b5132 7368
eea6121a 7369 size = sizeof (prstat.pr_reg);
7ee38065 7370 offset = offsetof (prstatus_t, pr_reg);
4a938328 7371 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7372
fa49d224
NC
7373 /* Do not overwrite the core signal if it
7374 has already been set by another thread. */
7375 if (elf_tdata (abfd)->core_signal == 0)
7376 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7377 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7378
4a938328
MS
7379 /* pr_who exists on:
7380 solaris 2.5+
7381 unixware 4.2
7382 pr_who doesn't exist on:
7383 linux 2.[01]
7384 */
252b5132 7385#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7386 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7387#endif
4a938328 7388 }
7ee38065 7389#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7390 else if (note->descsz == sizeof (prstatus32_t))
7391 {
7392 /* 64-bit host, 32-bit corefile */
7393 prstatus32_t prstat;
7394
eea6121a 7395 size = sizeof (prstat.pr_reg);
7ee38065 7396 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7397 memcpy (&prstat, note->descdata, sizeof (prstat));
7398
fa49d224
NC
7399 /* Do not overwrite the core signal if it
7400 has already been set by another thread. */
7401 if (elf_tdata (abfd)->core_signal == 0)
7402 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7403 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7404
7405 /* pr_who exists on:
7406 solaris 2.5+
7407 unixware 4.2
7408 pr_who doesn't exist on:
7409 linux 2.[01]
7410 */
7ee38065 7411#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7412 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7413#endif
7414 }
7ee38065 7415#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7416 else
7417 {
7418 /* Fail - we don't know how to handle any other
7419 note size (ie. data object type). */
b34976b6 7420 return TRUE;
4a938328 7421 }
252b5132 7422
bb0082d6 7423 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7424 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7425 size, note->descpos + offset);
252b5132
RH
7426}
7427#endif /* defined (HAVE_PRSTATUS_T) */
7428
bb0082d6 7429/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7430static bfd_boolean
217aa764
AM
7431elfcore_make_note_pseudosection (bfd *abfd,
7432 char *name,
7433 Elf_Internal_Note *note)
252b5132 7434{
936e320b
AM
7435 return _bfd_elfcore_make_pseudosection (abfd, name,
7436 note->descsz, note->descpos);
252b5132
RH
7437}
7438
ff08c6bb
JB
7439/* There isn't a consistent prfpregset_t across platforms,
7440 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7441 data structure apart. */
7442
b34976b6 7443static bfd_boolean
217aa764 7444elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7445{
7446 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7447}
7448
ff08c6bb
JB
7449/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7450 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7451 literally. */
c044fabd 7452
b34976b6 7453static bfd_boolean
217aa764 7454elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7455{
7456 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7457}
7458
252b5132 7459#if defined (HAVE_PRPSINFO_T)
4a938328 7460typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7461#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7462typedef prpsinfo32_t elfcore_psinfo32_t;
7463#endif
252b5132
RH
7464#endif
7465
7466#if defined (HAVE_PSINFO_T)
4a938328 7467typedef psinfo_t elfcore_psinfo_t;
7ee38065 7468#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7469typedef psinfo32_t elfcore_psinfo32_t;
7470#endif
252b5132
RH
7471#endif
7472
252b5132
RH
7473/* return a malloc'ed copy of a string at START which is at
7474 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7475 the copy will always have a terminating '\0'. */
252b5132 7476
936e320b 7477char *
217aa764 7478_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7479{
dc810e39 7480 char *dups;
c044fabd 7481 char *end = memchr (start, '\0', max);
dc810e39 7482 size_t len;
252b5132
RH
7483
7484 if (end == NULL)
7485 len = max;
7486 else
7487 len = end - start;
7488
217aa764 7489 dups = bfd_alloc (abfd, len + 1);
dc810e39 7490 if (dups == NULL)
252b5132
RH
7491 return NULL;
7492
dc810e39
AM
7493 memcpy (dups, start, len);
7494 dups[len] = '\0';
252b5132 7495
dc810e39 7496 return dups;
252b5132
RH
7497}
7498
bb0082d6 7499#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7500static bfd_boolean
217aa764 7501elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7502{
4a938328
MS
7503 if (note->descsz == sizeof (elfcore_psinfo_t))
7504 {
7505 elfcore_psinfo_t psinfo;
252b5132 7506
7ee38065 7507 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7508
4a938328 7509 elf_tdata (abfd)->core_program
936e320b
AM
7510 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7511 sizeof (psinfo.pr_fname));
252b5132 7512
4a938328 7513 elf_tdata (abfd)->core_command
936e320b
AM
7514 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7515 sizeof (psinfo.pr_psargs));
4a938328 7516 }
7ee38065 7517#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7518 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7519 {
7520 /* 64-bit host, 32-bit corefile */
7521 elfcore_psinfo32_t psinfo;
7522
7ee38065 7523 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7524
4a938328 7525 elf_tdata (abfd)->core_program
936e320b
AM
7526 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7527 sizeof (psinfo.pr_fname));
4a938328
MS
7528
7529 elf_tdata (abfd)->core_command
936e320b
AM
7530 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7531 sizeof (psinfo.pr_psargs));
4a938328
MS
7532 }
7533#endif
7534
7535 else
7536 {
7537 /* Fail - we don't know how to handle any other
7538 note size (ie. data object type). */
b34976b6 7539 return TRUE;
4a938328 7540 }
252b5132
RH
7541
7542 /* Note that for some reason, a spurious space is tacked
7543 onto the end of the args in some (at least one anyway)
c044fabd 7544 implementations, so strip it off if it exists. */
252b5132
RH
7545
7546 {
c044fabd 7547 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7548 int n = strlen (command);
7549
7550 if (0 < n && command[n - 1] == ' ')
7551 command[n - 1] = '\0';
7552 }
7553
b34976b6 7554 return TRUE;
252b5132
RH
7555}
7556#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7557
252b5132 7558#if defined (HAVE_PSTATUS_T)
b34976b6 7559static bfd_boolean
217aa764 7560elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7561{
f572a39d
AM
7562 if (note->descsz == sizeof (pstatus_t)
7563#if defined (HAVE_PXSTATUS_T)
7564 || note->descsz == sizeof (pxstatus_t)
7565#endif
7566 )
4a938328
MS
7567 {
7568 pstatus_t pstat;
252b5132 7569
4a938328 7570 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7571
4a938328
MS
7572 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7573 }
7ee38065 7574#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7575 else if (note->descsz == sizeof (pstatus32_t))
7576 {
7577 /* 64-bit host, 32-bit corefile */
7578 pstatus32_t pstat;
252b5132 7579
4a938328 7580 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7581
4a938328
MS
7582 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7583 }
7584#endif
252b5132
RH
7585 /* Could grab some more details from the "representative"
7586 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7587 NT_LWPSTATUS note, presumably. */
252b5132 7588
b34976b6 7589 return TRUE;
252b5132
RH
7590}
7591#endif /* defined (HAVE_PSTATUS_T) */
7592
252b5132 7593#if defined (HAVE_LWPSTATUS_T)
b34976b6 7594static bfd_boolean
217aa764 7595elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7596{
7597 lwpstatus_t lwpstat;
7598 char buf[100];
c044fabd 7599 char *name;
d4c88bbb 7600 size_t len;
c044fabd 7601 asection *sect;
252b5132 7602
f572a39d
AM
7603 if (note->descsz != sizeof (lwpstat)
7604#if defined (HAVE_LWPXSTATUS_T)
7605 && note->descsz != sizeof (lwpxstatus_t)
7606#endif
7607 )
b34976b6 7608 return TRUE;
252b5132
RH
7609
7610 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7611
7612 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7613 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7614
c044fabd 7615 /* Make a ".reg/999" section. */
252b5132
RH
7616
7617 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7618 len = strlen (buf) + 1;
217aa764 7619 name = bfd_alloc (abfd, len);
252b5132 7620 if (name == NULL)
b34976b6 7621 return FALSE;
d4c88bbb 7622 memcpy (name, buf, len);
252b5132 7623
62f3bb11 7624 sect = bfd_make_section_anyway (abfd, name);
252b5132 7625 if (sect == NULL)
b34976b6 7626 return FALSE;
252b5132
RH
7627
7628#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7629 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7630 sect->filepos = note->descpos
7631 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7632#endif
7633
7634#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7635 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7636 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7637#endif
7638
7639 sect->flags = SEC_HAS_CONTENTS;
7640 sect->alignment_power = 2;
7641
7642 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7643 return FALSE;
252b5132
RH
7644
7645 /* Make a ".reg2/999" section */
7646
7647 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7648 len = strlen (buf) + 1;
217aa764 7649 name = bfd_alloc (abfd, len);
252b5132 7650 if (name == NULL)
b34976b6 7651 return FALSE;
d4c88bbb 7652 memcpy (name, buf, len);
252b5132 7653
62f3bb11 7654 sect = bfd_make_section_anyway (abfd, name);
252b5132 7655 if (sect == NULL)
b34976b6 7656 return FALSE;
252b5132
RH
7657
7658#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7659 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7660 sect->filepos = note->descpos
7661 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7662#endif
7663
7664#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7665 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7666 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7667#endif
7668
7669 sect->flags = SEC_HAS_CONTENTS;
7670 sect->alignment_power = 2;
7671
936e320b 7672 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7673}
7674#endif /* defined (HAVE_LWPSTATUS_T) */
7675
16e9c715 7676#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7677static bfd_boolean
217aa764 7678elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7679{
7680 char buf[30];
c044fabd 7681 char *name;
d4c88bbb 7682 size_t len;
c044fabd 7683 asection *sect;
16e9c715
NC
7684 win32_pstatus_t pstatus;
7685
7686 if (note->descsz < sizeof (pstatus))
b34976b6 7687 return TRUE;
16e9c715 7688
e8eab623 7689 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7690
7691 switch (pstatus.data_type)
16e9c715
NC
7692 {
7693 case NOTE_INFO_PROCESS:
7694 /* FIXME: need to add ->core_command. */
7695 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7696 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7697 break;
16e9c715
NC
7698
7699 case NOTE_INFO_THREAD:
7700 /* Make a ".reg/999" section. */
1f170678 7701 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7702
d4c88bbb 7703 len = strlen (buf) + 1;
217aa764 7704 name = bfd_alloc (abfd, len);
16e9c715 7705 if (name == NULL)
b34976b6 7706 return FALSE;
c044fabd 7707
d4c88bbb 7708 memcpy (name, buf, len);
16e9c715 7709
62f3bb11 7710 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7711 if (sect == NULL)
b34976b6 7712 return FALSE;
c044fabd 7713
eea6121a 7714 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7715 sect->filepos = (note->descpos
7716 + offsetof (struct win32_pstatus,
7717 data.thread_info.thread_context));
16e9c715
NC
7718 sect->flags = SEC_HAS_CONTENTS;
7719 sect->alignment_power = 2;
7720
7721 if (pstatus.data.thread_info.is_active_thread)
7722 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7723 return FALSE;
16e9c715
NC
7724 break;
7725
7726 case NOTE_INFO_MODULE:
7727 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7728 sprintf (buf, ".module/%08lx",
7729 (long) pstatus.data.module_info.base_address);
c044fabd 7730
d4c88bbb 7731 len = strlen (buf) + 1;
217aa764 7732 name = bfd_alloc (abfd, len);
16e9c715 7733 if (name == NULL)
b34976b6 7734 return FALSE;
c044fabd 7735
d4c88bbb 7736 memcpy (name, buf, len);
252b5132 7737
62f3bb11 7738 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7739
16e9c715 7740 if (sect == NULL)
b34976b6 7741 return FALSE;
c044fabd 7742
eea6121a 7743 sect->size = note->descsz;
16e9c715
NC
7744 sect->filepos = note->descpos;
7745 sect->flags = SEC_HAS_CONTENTS;
7746 sect->alignment_power = 2;
7747 break;
7748
7749 default:
b34976b6 7750 return TRUE;
16e9c715
NC
7751 }
7752
b34976b6 7753 return TRUE;
16e9c715
NC
7754}
7755#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7756
b34976b6 7757static bfd_boolean
217aa764 7758elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7759{
9c5bfbb7 7760 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7761
252b5132
RH
7762 switch (note->type)
7763 {
7764 default:
b34976b6 7765 return TRUE;
252b5132 7766
252b5132 7767 case NT_PRSTATUS:
bb0082d6
AM
7768 if (bed->elf_backend_grok_prstatus)
7769 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7770 return TRUE;
bb0082d6 7771#if defined (HAVE_PRSTATUS_T)
252b5132 7772 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7773#else
b34976b6 7774 return TRUE;
252b5132
RH
7775#endif
7776
7777#if defined (HAVE_PSTATUS_T)
7778 case NT_PSTATUS:
7779 return elfcore_grok_pstatus (abfd, note);
7780#endif
7781
7782#if defined (HAVE_LWPSTATUS_T)
7783 case NT_LWPSTATUS:
7784 return elfcore_grok_lwpstatus (abfd, note);
7785#endif
7786
7787 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7788 return elfcore_grok_prfpreg (abfd, note);
7789
16e9c715 7790#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7791 case NT_WIN32PSTATUS:
16e9c715
NC
7792 return elfcore_grok_win32pstatus (abfd, note);
7793#endif
7794
c044fabd 7795 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7796 if (note->namesz == 6
7797 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7798 return elfcore_grok_prxfpreg (abfd, note);
7799 else
b34976b6 7800 return TRUE;
ff08c6bb 7801
252b5132
RH
7802 case NT_PRPSINFO:
7803 case NT_PSINFO:
bb0082d6
AM
7804 if (bed->elf_backend_grok_psinfo)
7805 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7806 return TRUE;
bb0082d6 7807#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7808 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7809#else
b34976b6 7810 return TRUE;
252b5132 7811#endif
3333a7c3
RM
7812
7813 case NT_AUXV:
7814 {
62f3bb11 7815 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7816
7817 if (sect == NULL)
7818 return FALSE;
eea6121a 7819 sect->size = note->descsz;
3333a7c3
RM
7820 sect->filepos = note->descpos;
7821 sect->flags = SEC_HAS_CONTENTS;
7822 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7823
7824 return TRUE;
7825 }
252b5132
RH
7826 }
7827}
7828
b34976b6 7829static bfd_boolean
217aa764 7830elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7831{
7832 char *cp;
7833
7834 cp = strchr (note->namedata, '@');
7835 if (cp != NULL)
7836 {
d2b64500 7837 *lwpidp = atoi(cp + 1);
b34976b6 7838 return TRUE;
50b2bdb7 7839 }
b34976b6 7840 return FALSE;
50b2bdb7
AM
7841}
7842
b34976b6 7843static bfd_boolean
217aa764 7844elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7845{
7846
7847 /* Signal number at offset 0x08. */
7848 elf_tdata (abfd)->core_signal
7849 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7850
7851 /* Process ID at offset 0x50. */
7852 elf_tdata (abfd)->core_pid
7853 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7854
7855 /* Command name at 0x7c (max 32 bytes, including nul). */
7856 elf_tdata (abfd)->core_command
7857 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7858
7720ba9f
MK
7859 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7860 note);
50b2bdb7
AM
7861}
7862
b34976b6 7863static bfd_boolean
217aa764 7864elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7865{
7866 int lwp;
7867
7868 if (elfcore_netbsd_get_lwpid (note, &lwp))
7869 elf_tdata (abfd)->core_lwpid = lwp;
7870
b4db1224 7871 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7872 {
7873 /* NetBSD-specific core "procinfo". Note that we expect to
7874 find this note before any of the others, which is fine,
7875 since the kernel writes this note out first when it
7876 creates a core file. */
47d9a591 7877
50b2bdb7
AM
7878 return elfcore_grok_netbsd_procinfo (abfd, note);
7879 }
7880
b4db1224
JT
7881 /* As of Jan 2002 there are no other machine-independent notes
7882 defined for NetBSD core files. If the note type is less
7883 than the start of the machine-dependent note types, we don't
7884 understand it. */
47d9a591 7885
b4db1224 7886 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7887 return TRUE;
50b2bdb7
AM
7888
7889
7890 switch (bfd_get_arch (abfd))
7891 {
7892 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7893 PT_GETFPREGS == mach+2. */
7894
7895 case bfd_arch_alpha:
7896 case bfd_arch_sparc:
7897 switch (note->type)
7898 {
b4db1224 7899 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7900 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7901
b4db1224 7902 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7903 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7904
7905 default:
b34976b6 7906 return TRUE;
50b2bdb7
AM
7907 }
7908
7909 /* On all other arch's, PT_GETREGS == mach+1 and
7910 PT_GETFPREGS == mach+3. */
7911
7912 default:
7913 switch (note->type)
7914 {
b4db1224 7915 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7916 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7917
b4db1224 7918 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7919 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7920
7921 default:
b34976b6 7922 return TRUE;
50b2bdb7
AM
7923 }
7924 }
7925 /* NOTREACHED */
7926}
7927
07c6e936 7928static bfd_boolean
217aa764 7929elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7930{
7931 void *ddata = note->descdata;
7932 char buf[100];
7933 char *name;
7934 asection *sect;
f8843e87
AM
7935 short sig;
7936 unsigned flags;
07c6e936
NC
7937
7938 /* nto_procfs_status 'pid' field is at offset 0. */
7939 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7940
f8843e87
AM
7941 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7942 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7943
7944 /* nto_procfs_status 'flags' field is at offset 8. */
7945 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7946
7947 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7948 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7949 {
7950 elf_tdata (abfd)->core_signal = sig;
7951 elf_tdata (abfd)->core_lwpid = *tid;
7952 }
07c6e936 7953
f8843e87
AM
7954 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7955 do not come from signals so we make sure we set the current
7956 thread just in case. */
7957 if (flags & 0x00000080)
7958 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7959
7960 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7961 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7962
217aa764 7963 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7964 if (name == NULL)
7965 return FALSE;
7966 strcpy (name, buf);
7967
62f3bb11 7968 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7969 if (sect == NULL)
7970 return FALSE;
7971
eea6121a 7972 sect->size = note->descsz;
07c6e936
NC
7973 sect->filepos = note->descpos;
7974 sect->flags = SEC_HAS_CONTENTS;
7975 sect->alignment_power = 2;
7976
7977 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7978}
7979
7980static bfd_boolean
d69f560c
KW
7981elfcore_grok_nto_regs (bfd *abfd,
7982 Elf_Internal_Note *note,
7983 pid_t tid,
7984 char *base)
07c6e936
NC
7985{
7986 char buf[100];
7987 char *name;
7988 asection *sect;
7989
d69f560c 7990 /* Make a "(base)/%d" section. */
7e7353ed 7991 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 7992
217aa764 7993 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7994 if (name == NULL)
7995 return FALSE;
7996 strcpy (name, buf);
7997
62f3bb11 7998 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7999 if (sect == NULL)
8000 return FALSE;
8001
eea6121a 8002 sect->size = note->descsz;
07c6e936
NC
8003 sect->filepos = note->descpos;
8004 sect->flags = SEC_HAS_CONTENTS;
8005 sect->alignment_power = 2;
8006
f8843e87
AM
8007 /* This is the current thread. */
8008 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8009 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8010
8011 return TRUE;
07c6e936
NC
8012}
8013
8014#define BFD_QNT_CORE_INFO 7
8015#define BFD_QNT_CORE_STATUS 8
8016#define BFD_QNT_CORE_GREG 9
8017#define BFD_QNT_CORE_FPREG 10
8018
8019static bfd_boolean
217aa764 8020elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8021{
8022 /* Every GREG section has a STATUS section before it. Store the
811072d8 8023 tid from the previous call to pass down to the next gregs
07c6e936
NC
8024 function. */
8025 static pid_t tid = 1;
8026
8027 switch (note->type)
8028 {
d69f560c
KW
8029 case BFD_QNT_CORE_INFO:
8030 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8031 case BFD_QNT_CORE_STATUS:
8032 return elfcore_grok_nto_status (abfd, note, &tid);
8033 case BFD_QNT_CORE_GREG:
8034 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8035 case BFD_QNT_CORE_FPREG:
8036 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8037 default:
8038 return TRUE;
07c6e936
NC
8039 }
8040}
8041
7c76fa91
MS
8042/* Function: elfcore_write_note
8043
47d9a591 8044 Inputs:
7c76fa91
MS
8045 buffer to hold note
8046 name of note
8047 type of note
8048 data for note
8049 size of data for note
8050
8051 Return:
8052 End of buffer containing note. */
8053
8054char *
217aa764
AM
8055elfcore_write_note (bfd *abfd,
8056 char *buf,
8057 int *bufsiz,
8058 const char *name,
8059 int type,
8060 const void *input,
8061 int size)
7c76fa91
MS
8062{
8063 Elf_External_Note *xnp;
d4c88bbb
AM
8064 size_t namesz;
8065 size_t pad;
8066 size_t newspace;
7c76fa91
MS
8067 char *p, *dest;
8068
d4c88bbb
AM
8069 namesz = 0;
8070 pad = 0;
8071 if (name != NULL)
8072 {
9c5bfbb7 8073 const struct elf_backend_data *bed;
d4c88bbb
AM
8074
8075 namesz = strlen (name) + 1;
8076 bed = get_elf_backend_data (abfd);
45d6a902 8077 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
8078 }
8079
5de3bf90 8080 newspace = 12 + namesz + pad + size;
d4c88bbb 8081
7c76fa91
MS
8082 p = realloc (buf, *bufsiz + newspace);
8083 dest = p + *bufsiz;
8084 *bufsiz += newspace;
8085 xnp = (Elf_External_Note *) dest;
8086 H_PUT_32 (abfd, namesz, xnp->namesz);
8087 H_PUT_32 (abfd, size, xnp->descsz);
8088 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8089 dest = xnp->name;
8090 if (name != NULL)
8091 {
8092 memcpy (dest, name, namesz);
8093 dest += namesz;
8094 while (pad != 0)
8095 {
8096 *dest++ = '\0';
8097 --pad;
8098 }
8099 }
8100 memcpy (dest, input, size);
7c76fa91
MS
8101 return p;
8102}
8103
8104#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8105char *
217aa764
AM
8106elfcore_write_prpsinfo (bfd *abfd,
8107 char *buf,
8108 int *bufsiz,
8109 const char *fname,
8110 const char *psargs)
7c76fa91
MS
8111{
8112 int note_type;
8113 char *note_name = "CORE";
8114
8115#if defined (HAVE_PSINFO_T)
8116 psinfo_t data;
8117 note_type = NT_PSINFO;
8118#else
8119 prpsinfo_t data;
8120 note_type = NT_PRPSINFO;
8121#endif
8122
8123 memset (&data, 0, sizeof (data));
8124 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8125 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 8126 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8127 note_name, note_type, &data, sizeof (data));
8128}
8129#endif /* PSINFO_T or PRPSINFO_T */
8130
8131#if defined (HAVE_PRSTATUS_T)
8132char *
217aa764
AM
8133elfcore_write_prstatus (bfd *abfd,
8134 char *buf,
8135 int *bufsiz,
8136 long pid,
8137 int cursig,
8138 const void *gregs)
7c76fa91
MS
8139{
8140 prstatus_t prstat;
8141 char *note_name = "CORE";
8142
8143 memset (&prstat, 0, sizeof (prstat));
8144 prstat.pr_pid = pid;
8145 prstat.pr_cursig = cursig;
c106e334 8146 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 8147 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8148 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
8149}
8150#endif /* HAVE_PRSTATUS_T */
8151
51316059
MS
8152#if defined (HAVE_LWPSTATUS_T)
8153char *
217aa764
AM
8154elfcore_write_lwpstatus (bfd *abfd,
8155 char *buf,
8156 int *bufsiz,
8157 long pid,
8158 int cursig,
8159 const void *gregs)
51316059
MS
8160{
8161 lwpstatus_t lwpstat;
8162 char *note_name = "CORE";
8163
8164 memset (&lwpstat, 0, sizeof (lwpstat));
8165 lwpstat.pr_lwpid = pid >> 16;
8166 lwpstat.pr_cursig = cursig;
8167#if defined (HAVE_LWPSTATUS_T_PR_REG)
8168 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8169#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8170#if !defined(gregs)
8171 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8172 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8173#else
8174 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8175 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8176#endif
8177#endif
47d9a591 8178 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8179 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8180}
8181#endif /* HAVE_LWPSTATUS_T */
8182
7c76fa91
MS
8183#if defined (HAVE_PSTATUS_T)
8184char *
217aa764
AM
8185elfcore_write_pstatus (bfd *abfd,
8186 char *buf,
8187 int *bufsiz,
8188 long pid,
6c10990d
NC
8189 int cursig ATTRIBUTE_UNUSED,
8190 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91
MS
8191{
8192 pstatus_t pstat;
8193 char *note_name = "CORE";
8194
51316059
MS
8195 memset (&pstat, 0, sizeof (pstat));
8196 pstat.pr_pid = pid & 0xffff;
47d9a591 8197 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8198 NT_PSTATUS, &pstat, sizeof (pstat));
8199 return buf;
7c76fa91
MS
8200}
8201#endif /* HAVE_PSTATUS_T */
8202
8203char *
217aa764
AM
8204elfcore_write_prfpreg (bfd *abfd,
8205 char *buf,
8206 int *bufsiz,
8207 const void *fpregs,
8208 int size)
7c76fa91
MS
8209{
8210 char *note_name = "CORE";
47d9a591 8211 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8212 note_name, NT_FPREGSET, fpregs, size);
8213}
8214
8215char *
217aa764
AM
8216elfcore_write_prxfpreg (bfd *abfd,
8217 char *buf,
8218 int *bufsiz,
8219 const void *xfpregs,
8220 int size)
7c76fa91
MS
8221{
8222 char *note_name = "LINUX";
47d9a591 8223 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8224 note_name, NT_PRXFPREG, xfpregs, size);
8225}
8226
b34976b6 8227static bfd_boolean
217aa764 8228elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 8229{
c044fabd
KH
8230 char *buf;
8231 char *p;
252b5132
RH
8232
8233 if (size <= 0)
b34976b6 8234 return TRUE;
252b5132 8235
dc810e39 8236 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 8237 return FALSE;
252b5132 8238
dc810e39 8239 buf = bfd_malloc (size);
252b5132 8240 if (buf == NULL)
b34976b6 8241 return FALSE;
252b5132 8242
dc810e39 8243 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
8244 {
8245 error:
8246 free (buf);
b34976b6 8247 return FALSE;
252b5132
RH
8248 }
8249
8250 p = buf;
8251 while (p < buf + size)
8252 {
c044fabd
KH
8253 /* FIXME: bad alignment assumption. */
8254 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8255 Elf_Internal_Note in;
8256
dc810e39 8257 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8258
dc810e39 8259 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
8260 in.namedata = xnp->name;
8261
dc810e39 8262 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8263 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8264 in.descpos = offset + (in.descdata - buf);
8265
50b2bdb7
AM
8266 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
8267 {
8268 if (! elfcore_grok_netbsd_note (abfd, &in))
8269 goto error;
8270 }
07c6e936
NC
8271 else if (strncmp (in.namedata, "QNX", 3) == 0)
8272 {
8273 if (! elfcore_grok_nto_note (abfd, &in))
8274 goto error;
8275 }
50b2bdb7
AM
8276 else
8277 {
8278 if (! elfcore_grok_note (abfd, &in))
8279 goto error;
8280 }
252b5132
RH
8281
8282 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8283 }
8284
8285 free (buf);
b34976b6 8286 return TRUE;
252b5132 8287}
98d8431c
JB
8288\f
8289/* Providing external access to the ELF program header table. */
8290
8291/* Return an upper bound on the number of bytes required to store a
8292 copy of ABFD's program header table entries. Return -1 if an error
8293 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8294
98d8431c 8295long
217aa764 8296bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8297{
8298 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8299 {
8300 bfd_set_error (bfd_error_wrong_format);
8301 return -1;
8302 }
8303
936e320b 8304 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8305}
8306
98d8431c
JB
8307/* Copy ABFD's program header table entries to *PHDRS. The entries
8308 will be stored as an array of Elf_Internal_Phdr structures, as
8309 defined in include/elf/internal.h. To find out how large the
8310 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
8311
8312 Return the number of program header table entries read, or -1 if an
8313 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 8314
98d8431c 8315int
217aa764 8316bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
8317{
8318 int num_phdrs;
8319
8320 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8321 {
8322 bfd_set_error (bfd_error_wrong_format);
8323 return -1;
8324 }
8325
8326 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8327 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8328 num_phdrs * sizeof (Elf_Internal_Phdr));
8329
8330 return num_phdrs;
8331}
ae4221d7
L
8332
8333void
217aa764 8334_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 8335{
d3b05f8d 8336#ifdef BFD64
ae4221d7
L
8337 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8338
8339 i_ehdrp = elf_elfheader (abfd);
8340 if (i_ehdrp == NULL)
8341 sprintf_vma (buf, value);
8342 else
8343 {
8344 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8345 {
ae4221d7 8346#if BFD_HOST_64BIT_LONG
cc55aec9 8347 sprintf (buf, "%016lx", value);
ae4221d7 8348#else
cc55aec9
AM
8349 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
8350 _bfd_int64_low (value));
ae4221d7 8351#endif
cc55aec9 8352 }
ae4221d7
L
8353 else
8354 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
8355 }
d3b05f8d
L
8356#else
8357 sprintf_vma (buf, value);
8358#endif
ae4221d7
L
8359}
8360
8361void
217aa764 8362_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 8363{
d3b05f8d 8364#ifdef BFD64
ae4221d7
L
8365 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8366
8367 i_ehdrp = elf_elfheader (abfd);
8368 if (i_ehdrp == NULL)
8369 fprintf_vma ((FILE *) stream, value);
8370 else
8371 {
8372 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8373 {
ae4221d7 8374#if BFD_HOST_64BIT_LONG
cc55aec9 8375 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 8376#else
cc55aec9
AM
8377 fprintf ((FILE *) stream, "%08lx%08lx",
8378 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 8379#endif
cc55aec9 8380 }
ae4221d7
L
8381 else
8382 fprintf ((FILE *) stream, "%08lx",
8383 (unsigned long) (value & 0xffffffff));
8384 }
d3b05f8d
L
8385#else
8386 fprintf_vma ((FILE *) stream, value);
8387#endif
ae4221d7 8388}
db6751f2
JJ
8389
8390enum elf_reloc_type_class
217aa764 8391_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8392{
8393 return reloc_class_normal;
8394}
f8df10f4 8395
47d9a591 8396/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8397 relocation against a local symbol. */
8398
8399bfd_vma
217aa764
AM
8400_bfd_elf_rela_local_sym (bfd *abfd,
8401 Elf_Internal_Sym *sym,
8517fae7 8402 asection **psec,
217aa764 8403 Elf_Internal_Rela *rel)
f8df10f4 8404{
8517fae7 8405 asection *sec = *psec;
f8df10f4
JJ
8406 bfd_vma relocation;
8407
8408 relocation = (sec->output_section->vma
8409 + sec->output_offset
8410 + sym->st_value);
8411 if ((sec->flags & SEC_MERGE)
c629eae0 8412 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8413 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8414 {
f8df10f4 8415 rel->r_addend =
8517fae7 8416 _bfd_merged_section_offset (abfd, psec,
65765700 8417 elf_section_data (sec)->sec_info,
753731ee
AM
8418 sym->st_value + rel->r_addend);
8419 if (sec != *psec)
8420 {
8421 /* If we have changed the section, and our original section is
8422 marked with SEC_EXCLUDE, it means that the original
8423 SEC_MERGE section has been completely subsumed in some
8424 other SEC_MERGE section. In this case, we need to leave
8425 some info around for --emit-relocs. */
8426 if ((sec->flags & SEC_EXCLUDE) != 0)
8427 sec->kept_section = *psec;
8428 sec = *psec;
8429 }
8517fae7
AM
8430 rel->r_addend -= relocation;
8431 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8432 }
8433 return relocation;
8434}
c629eae0
JJ
8435
8436bfd_vma
217aa764
AM
8437_bfd_elf_rel_local_sym (bfd *abfd,
8438 Elf_Internal_Sym *sym,
8439 asection **psec,
8440 bfd_vma addend)
47d9a591 8441{
c629eae0
JJ
8442 asection *sec = *psec;
8443
68bfbfcc 8444 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8445 return sym->st_value + addend;
8446
8447 return _bfd_merged_section_offset (abfd, psec,
65765700 8448 elf_section_data (sec)->sec_info,
753731ee 8449 sym->st_value + addend);
c629eae0
JJ
8450}
8451
8452bfd_vma
217aa764 8453_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8454 struct bfd_link_info *info,
217aa764
AM
8455 asection *sec,
8456 bfd_vma offset)
c629eae0 8457{
68bfbfcc 8458 switch (sec->sec_info_type)
65765700
JJ
8459 {
8460 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8461 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8462 offset);
65765700 8463 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8464 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8465 default:
8466 return offset;
8467 }
c629eae0 8468}
3333a7c3
RM
8469\f
8470/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8471 reconstruct an ELF file by reading the segments out of remote memory
8472 based on the ELF file header at EHDR_VMA and the ELF program headers it
8473 points to. If not null, *LOADBASEP is filled in with the difference
8474 between the VMAs from which the segments were read, and the VMAs the
8475 file headers (and hence BFD's idea of each section's VMA) put them at.
8476
8477 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8478 remote memory at target address VMA into the local buffer at MYADDR; it
8479 should return zero on success or an `errno' code on failure. TEMPL must
8480 be a BFD for an ELF target with the word size and byte order found in
8481 the remote memory. */
8482
8483bfd *
217aa764
AM
8484bfd_elf_bfd_from_remote_memory
8485 (bfd *templ,
8486 bfd_vma ehdr_vma,
8487 bfd_vma *loadbasep,
f075ee0c 8488 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8489{
8490 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8491 (templ, ehdr_vma, loadbasep, target_read_memory);
8492}
4c45e5c9
JJ
8493\f
8494long
c9727e01
AM
8495_bfd_elf_get_synthetic_symtab (bfd *abfd,
8496 long symcount ATTRIBUTE_UNUSED,
8497 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8498 long dynsymcount,
c9727e01
AM
8499 asymbol **dynsyms,
8500 asymbol **ret)
4c45e5c9
JJ
8501{
8502 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8503 asection *relplt;
8504 asymbol *s;
8505 const char *relplt_name;
8506 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8507 arelent *p;
8508 long count, i, n;
8509 size_t size;
8510 Elf_Internal_Shdr *hdr;
8511 char *names;
8512 asection *plt;
8513
8615f3f2
AM
8514 *ret = NULL;
8515
90e3cdf2
JJ
8516 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8517 return 0;
8518
8615f3f2
AM
8519 if (dynsymcount <= 0)
8520 return 0;
8521
4c45e5c9
JJ
8522 if (!bed->plt_sym_val)
8523 return 0;
8524
8525 relplt_name = bed->relplt_name;
8526 if (relplt_name == NULL)
8527 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8528 relplt = bfd_get_section_by_name (abfd, relplt_name);
8529 if (relplt == NULL)
8530 return 0;
8531
8532 hdr = &elf_section_data (relplt)->this_hdr;
8533 if (hdr->sh_link != elf_dynsymtab (abfd)
8534 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8535 return 0;
8536
8537 plt = bfd_get_section_by_name (abfd, ".plt");
8538 if (plt == NULL)
8539 return 0;
8540
8541 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8542 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8543 return -1;
8544
eea6121a 8545 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8546 size = count * sizeof (asymbol);
8547 p = relplt->relocation;
8548 for (i = 0; i < count; i++, s++, p++)
8549 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8550
8551 s = *ret = bfd_malloc (size);
8552 if (s == NULL)
8553 return -1;
8554
8555 names = (char *) (s + count);
8556 p = relplt->relocation;
8557 n = 0;
8558 for (i = 0; i < count; i++, s++, p++)
8559 {
8560 size_t len;
8561 bfd_vma addr;
8562
8563 addr = bed->plt_sym_val (i, plt, p);
8564 if (addr == (bfd_vma) -1)
8565 continue;
8566
8567 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8568 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8569 we are defining a symbol, ensure one of them is set. */
8570 if ((s->flags & BSF_LOCAL) == 0)
8571 s->flags |= BSF_GLOBAL;
4c45e5c9
JJ
8572 s->section = plt;
8573 s->value = addr - plt->vma;
8574 s->name = names;
8575 len = strlen ((*p->sym_ptr_ptr)->name);
8576 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8577 names += len;
8578 memcpy (names, "@plt", sizeof ("@plt"));
8579 names += sizeof ("@plt");
8580 ++n;
8581 }
8582
8583 return n;
8584}
3d7f7666
L
8585
8586/* Sort symbol by binding and section. We want to put definitions
8587 sorted by section at the beginning. */
8588
8589static int
8590elf_sort_elf_symbol (const void *arg1, const void *arg2)
8591{
8592 const Elf_Internal_Sym *s1;
8593 const Elf_Internal_Sym *s2;
8594 int shndx;
8595
8596 /* Make sure that undefined symbols are at the end. */
8597 s1 = (const Elf_Internal_Sym *) arg1;
8598 if (s1->st_shndx == SHN_UNDEF)
8599 return 1;
8600 s2 = (const Elf_Internal_Sym *) arg2;
8601 if (s2->st_shndx == SHN_UNDEF)
8602 return -1;
8603
8604 /* Sorted by section index. */
8605 shndx = s1->st_shndx - s2->st_shndx;
8606 if (shndx != 0)
8607 return shndx;
8608
8609 /* Sorted by binding. */
8610 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8611}
8612
8613struct elf_symbol
8614{
8615 Elf_Internal_Sym *sym;
8616 const char *name;
8617};
8618
8619static int
8620elf_sym_name_compare (const void *arg1, const void *arg2)
8621{
8622 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8623 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8624 return strcmp (s1->name, s2->name);
8625}
8626
8627/* Check if 2 sections define the same set of local and global
8628 symbols. */
8629
8630bfd_boolean
8631bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8632{
8633 bfd *bfd1, *bfd2;
8634 const struct elf_backend_data *bed1, *bed2;
8635 Elf_Internal_Shdr *hdr1, *hdr2;
8636 bfd_size_type symcount1, symcount2;
8637 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8638 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8639 Elf_Internal_Sym *isymend;
8640 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8641 bfd_size_type count1, count2, i;
8642 int shndx1, shndx2;
8643 bfd_boolean result;
8644
8645 bfd1 = sec1->owner;
8646 bfd2 = sec2->owner;
8647
8648 /* If both are .gnu.linkonce sections, they have to have the same
8649 section name. */
8650 if (strncmp (sec1->name, ".gnu.linkonce",
8651 sizeof ".gnu.linkonce" - 1) == 0
8652 && strncmp (sec2->name, ".gnu.linkonce",
8653 sizeof ".gnu.linkonce" - 1) == 0)
8654 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8655 sec2->name + sizeof ".gnu.linkonce") == 0;
8656
8657 /* Both sections have to be in ELF. */
8658 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8659 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8660 return FALSE;
8661
8662 if (elf_section_type (sec1) != elf_section_type (sec2))
8663 return FALSE;
8664
8665 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8666 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8667 {
8668 /* If both are members of section groups, they have to have the
8669 same group name. */
8670 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8671 return FALSE;
8672 }
8673
8674 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8675 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8676 if (shndx1 == -1 || shndx2 == -1)
8677 return FALSE;
8678
8679 bed1 = get_elf_backend_data (bfd1);
8680 bed2 = get_elf_backend_data (bfd2);
8681 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8682 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8683 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8684 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8685
8686 if (symcount1 == 0 || symcount2 == 0)
8687 return FALSE;
8688
8689 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8690 NULL, NULL, NULL);
8691 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8692 NULL, NULL, NULL);
8693
8694 result = FALSE;
8695 if (isymbuf1 == NULL || isymbuf2 == NULL)
8696 goto done;
8697
8698 /* Sort symbols by binding and section. Global definitions are at
8699 the beginning. */
8700 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8701 elf_sort_elf_symbol);
8702 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8703 elf_sort_elf_symbol);
8704
8705 /* Count definitions in the section. */
8706 count1 = 0;
8707 for (isym = isymbuf1, isymend = isym + symcount1;
8708 isym < isymend; isym++)
8709 {
8710 if (isym->st_shndx == (unsigned int) shndx1)
8711 {
8712 if (count1 == 0)
8713 isymstart1 = isym;
8714 count1++;
8715 }
8716
8717 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8718 break;
8719 }
8720
8721 count2 = 0;
8722 for (isym = isymbuf2, isymend = isym + symcount2;
8723 isym < isymend; isym++)
8724 {
8725 if (isym->st_shndx == (unsigned int) shndx2)
8726 {
8727 if (count2 == 0)
8728 isymstart2 = isym;
8729 count2++;
8730 }
8731
8732 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8733 break;
8734 }
8735
8736 if (count1 == 0 || count2 == 0 || count1 != count2)
8737 goto done;
8738
8739 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8740 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8741
8742 if (symtable1 == NULL || symtable2 == NULL)
8743 goto done;
8744
8745 symp = symtable1;
8746 for (isym = isymstart1, isymend = isym + count1;
8747 isym < isymend; isym++)
8748 {
8749 symp->sym = isym;
8750 symp->name = bfd_elf_string_from_elf_section (bfd1,
8751 hdr1->sh_link,
8752 isym->st_name);
8753 symp++;
8754 }
8755
8756 symp = symtable2;
8757 for (isym = isymstart2, isymend = isym + count1;
8758 isym < isymend; isym++)
8759 {
8760 symp->sym = isym;
8761 symp->name = bfd_elf_string_from_elf_section (bfd2,
8762 hdr2->sh_link,
8763 isym->st_name);
8764 symp++;
8765 }
8766
8767 /* Sort symbol by name. */
8768 qsort (symtable1, count1, sizeof (struct elf_symbol),
8769 elf_sym_name_compare);
8770 qsort (symtable2, count1, sizeof (struct elf_symbol),
8771 elf_sym_name_compare);
8772
8773 for (i = 0; i < count1; i++)
8774 /* Two symbols must have the same binding, type and name. */
8775 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8776 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8777 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8778 goto done;
8779
8780 result = TRUE;
8781
8782done:
8783 if (symtable1)
8784 free (symtable1);
8785 if (symtable2)
8786 free (symtable2);
8787 if (isymbuf1)
8788 free (isymbuf1);
8789 if (isymbuf2)
8790 free (isymbuf2);
8791
8792 return result;
8793}
3b22753a
L
8794
8795/* It is only used by x86-64 so far. */
8796asection _bfd_elf_large_com_section
8797 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 8798 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871
L
8799
8800/* Return TRUE if 2 section types are compatible. */
8801
8802bfd_boolean
8803_bfd_elf_match_sections_by_type (bfd *abfd, const asection *asec,
8804 bfd *bbfd, const asection *bsec)
8805{
8806 if (asec == NULL
8807 || bsec == NULL
8808 || abfd->xvec->flavour != bfd_target_elf_flavour
8809 || bbfd->xvec->flavour != bfd_target_elf_flavour)
8810 return TRUE;
8811
8812 return elf_section_type (asec) == elf_section_type (bsec);
8813}