]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
Check for alignment when emitting constants on the sh-elf target
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
f0abc2a1
AM
2 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002,
3 2003 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
5e8d7549 19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
252b5132 20
661a3fd4 21/* SECTION
47d9a591 22
252b5132
RH
23 ELF backends
24
25 BFD support for ELF formats is being worked on.
26 Currently, the best supported back ends are for sparc and i386
27 (running svr4 or Solaris 2).
28
29 Documentation of the internals of the support code still needs
30 to be written. The code is changing quickly enough that we
661a3fd4 31 haven't bothered yet. */
252b5132 32
7ee38065
MS
33/* For sparc64-cross-sparc32. */
34#define _SYSCALL32
252b5132
RH
35#include "bfd.h"
36#include "sysdep.h"
37#include "bfdlink.h"
38#include "libbfd.h"
39#define ARCH_SIZE 0
40#include "elf-bfd.h"
e0e8c97f 41#include "libiberty.h"
252b5132 42
217aa764
AM
43static int elf_sort_sections (const void *, const void *);
44static bfd_boolean assign_file_positions_except_relocs (bfd *);
45static bfd_boolean prep_headers (bfd *);
46static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
47static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 48
252b5132
RH
49/* Swap version information in and out. The version information is
50 currently size independent. If that ever changes, this code will
51 need to move into elfcode.h. */
52
53/* Swap in a Verdef structure. */
54
55void
217aa764
AM
56_bfd_elf_swap_verdef_in (bfd *abfd,
57 const Elf_External_Verdef *src,
58 Elf_Internal_Verdef *dst)
252b5132 59{
dc810e39
AM
60 dst->vd_version = H_GET_16 (abfd, src->vd_version);
61 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
62 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
63 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
64 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
65 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
66 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
67}
68
69/* Swap out a Verdef structure. */
70
71void
217aa764
AM
72_bfd_elf_swap_verdef_out (bfd *abfd,
73 const Elf_Internal_Verdef *src,
74 Elf_External_Verdef *dst)
252b5132 75{
dc810e39
AM
76 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
77 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
78 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
79 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
80 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
81 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
82 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
83}
84
85/* Swap in a Verdaux structure. */
86
87void
217aa764
AM
88_bfd_elf_swap_verdaux_in (bfd *abfd,
89 const Elf_External_Verdaux *src,
90 Elf_Internal_Verdaux *dst)
252b5132 91{
dc810e39
AM
92 dst->vda_name = H_GET_32 (abfd, src->vda_name);
93 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
94}
95
96/* Swap out a Verdaux structure. */
97
98void
217aa764
AM
99_bfd_elf_swap_verdaux_out (bfd *abfd,
100 const Elf_Internal_Verdaux *src,
101 Elf_External_Verdaux *dst)
252b5132 102{
dc810e39
AM
103 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
104 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
105}
106
107/* Swap in a Verneed structure. */
108
109void
217aa764
AM
110_bfd_elf_swap_verneed_in (bfd *abfd,
111 const Elf_External_Verneed *src,
112 Elf_Internal_Verneed *dst)
252b5132 113{
dc810e39
AM
114 dst->vn_version = H_GET_16 (abfd, src->vn_version);
115 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
116 dst->vn_file = H_GET_32 (abfd, src->vn_file);
117 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
118 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
119}
120
121/* Swap out a Verneed structure. */
122
123void
217aa764
AM
124_bfd_elf_swap_verneed_out (bfd *abfd,
125 const Elf_Internal_Verneed *src,
126 Elf_External_Verneed *dst)
252b5132 127{
dc810e39
AM
128 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
129 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
130 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
131 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
132 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
133}
134
135/* Swap in a Vernaux structure. */
136
137void
217aa764
AM
138_bfd_elf_swap_vernaux_in (bfd *abfd,
139 const Elf_External_Vernaux *src,
140 Elf_Internal_Vernaux *dst)
252b5132 141{
dc810e39
AM
142 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
143 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
144 dst->vna_other = H_GET_16 (abfd, src->vna_other);
145 dst->vna_name = H_GET_32 (abfd, src->vna_name);
146 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
147}
148
149/* Swap out a Vernaux structure. */
150
151void
217aa764
AM
152_bfd_elf_swap_vernaux_out (bfd *abfd,
153 const Elf_Internal_Vernaux *src,
154 Elf_External_Vernaux *dst)
252b5132 155{
dc810e39
AM
156 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
157 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
158 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
159 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
160 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
161}
162
163/* Swap in a Versym structure. */
164
165void
217aa764
AM
166_bfd_elf_swap_versym_in (bfd *abfd,
167 const Elf_External_Versym *src,
168 Elf_Internal_Versym *dst)
252b5132 169{
dc810e39 170 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
171}
172
173/* Swap out a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_out (bfd *abfd,
177 const Elf_Internal_Versym *src,
178 Elf_External_Versym *dst)
252b5132 179{
dc810e39 180 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
181}
182
183/* Standard ELF hash function. Do not change this function; you will
184 cause invalid hash tables to be generated. */
3a99b017 185
252b5132 186unsigned long
217aa764 187bfd_elf_hash (const char *namearg)
252b5132 188{
3a99b017 189 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
190 unsigned long h = 0;
191 unsigned long g;
192 int ch;
193
194 while ((ch = *name++) != '\0')
195 {
196 h = (h << 4) + ch;
197 if ((g = (h & 0xf0000000)) != 0)
198 {
199 h ^= g >> 24;
200 /* The ELF ABI says `h &= ~g', but this is equivalent in
201 this case and on some machines one insn instead of two. */
202 h ^= g;
203 }
204 }
32dfa85d 205 return h & 0xffffffff;
252b5132
RH
206}
207
208/* Read a specified number of bytes at a specified offset in an ELF
209 file, into a newly allocated buffer, and return a pointer to the
c044fabd 210 buffer. */
252b5132
RH
211
212static char *
217aa764 213elf_read (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132
RH
214{
215 char *buf;
216
217 if ((buf = bfd_alloc (abfd, size)) == NULL)
218 return NULL;
dc810e39 219 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
252b5132 220 return NULL;
217aa764 221 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
222 {
223 if (bfd_get_error () != bfd_error_system_call)
224 bfd_set_error (bfd_error_file_truncated);
225 return NULL;
226 }
227 return buf;
228}
229
b34976b6 230bfd_boolean
217aa764 231bfd_elf_mkobject (bfd *abfd)
252b5132 232{
c044fabd
KH
233 /* This just does initialization. */
234 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 235 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 236 if (elf_tdata (abfd) == 0)
b34976b6 237 return FALSE;
c044fabd
KH
238 /* Since everything is done at close time, do we need any
239 initialization? */
252b5132 240
b34976b6 241 return TRUE;
252b5132
RH
242}
243
b34976b6 244bfd_boolean
217aa764 245bfd_elf_mkcorefile (bfd *abfd)
252b5132 246{
c044fabd 247 /* I think this can be done just like an object file. */
252b5132
RH
248 return bfd_elf_mkobject (abfd);
249}
250
251char *
217aa764 252bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
253{
254 Elf_Internal_Shdr **i_shdrp;
255 char *shstrtab = NULL;
dc810e39
AM
256 file_ptr offset;
257 bfd_size_type shstrtabsize;
252b5132
RH
258
259 i_shdrp = elf_elfsections (abfd);
260 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
261 return 0;
262
263 shstrtab = (char *) i_shdrp[shindex]->contents;
264 if (shstrtab == NULL)
265 {
c044fabd 266 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
267 offset = i_shdrp[shindex]->sh_offset;
268 shstrtabsize = i_shdrp[shindex]->sh_size;
269 shstrtab = elf_read (abfd, offset, shstrtabsize);
217aa764 270 i_shdrp[shindex]->contents = shstrtab;
252b5132
RH
271 }
272 return shstrtab;
273}
274
275char *
217aa764
AM
276bfd_elf_string_from_elf_section (bfd *abfd,
277 unsigned int shindex,
278 unsigned int strindex)
252b5132
RH
279{
280 Elf_Internal_Shdr *hdr;
281
282 if (strindex == 0)
283 return "";
284
285 hdr = elf_elfsections (abfd)[shindex];
286
287 if (hdr->contents == NULL
288 && bfd_elf_get_str_section (abfd, shindex) == NULL)
289 return NULL;
290
291 if (strindex >= hdr->sh_size)
292 {
293 (*_bfd_error_handler)
294 (_("%s: invalid string offset %u >= %lu for section `%s'"),
8f615d07 295 bfd_archive_filename (abfd), strindex, (unsigned long) hdr->sh_size,
252b5132
RH
296 ((shindex == elf_elfheader(abfd)->e_shstrndx
297 && strindex == hdr->sh_name)
298 ? ".shstrtab"
299 : elf_string_from_elf_strtab (abfd, hdr->sh_name)));
300 return "";
301 }
302
303 return ((char *) hdr->contents) + strindex;
304}
305
6cdc0ccc
AM
306/* Read and convert symbols to internal format.
307 SYMCOUNT specifies the number of symbols to read, starting from
308 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
309 are non-NULL, they are used to store the internal symbols, external
310 symbols, and symbol section index extensions, respectively. */
311
312Elf_Internal_Sym *
217aa764
AM
313bfd_elf_get_elf_syms (bfd *ibfd,
314 Elf_Internal_Shdr *symtab_hdr,
315 size_t symcount,
316 size_t symoffset,
317 Elf_Internal_Sym *intsym_buf,
318 void *extsym_buf,
319 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
320{
321 Elf_Internal_Shdr *shndx_hdr;
217aa764 322 void *alloc_ext;
df622259 323 const bfd_byte *esym;
6cdc0ccc
AM
324 Elf_External_Sym_Shndx *alloc_extshndx;
325 Elf_External_Sym_Shndx *shndx;
326 Elf_Internal_Sym *isym;
327 Elf_Internal_Sym *isymend;
9c5bfbb7 328 const struct elf_backend_data *bed;
6cdc0ccc
AM
329 size_t extsym_size;
330 bfd_size_type amt;
331 file_ptr pos;
332
333 if (symcount == 0)
334 return intsym_buf;
335
336 /* Normal syms might have section extension entries. */
337 shndx_hdr = NULL;
338 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
339 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
340
341 /* Read the symbols. */
342 alloc_ext = NULL;
343 alloc_extshndx = NULL;
344 bed = get_elf_backend_data (ibfd);
345 extsym_size = bed->s->sizeof_sym;
346 amt = symcount * extsym_size;
347 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
348 if (extsym_buf == NULL)
349 {
350 alloc_ext = bfd_malloc (amt);
351 extsym_buf = alloc_ext;
352 }
353 if (extsym_buf == NULL
354 || bfd_seek (ibfd, pos, SEEK_SET) != 0
355 || bfd_bread (extsym_buf, amt, ibfd) != amt)
356 {
357 intsym_buf = NULL;
358 goto out;
359 }
360
361 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
362 extshndx_buf = NULL;
363 else
364 {
365 amt = symcount * sizeof (Elf_External_Sym_Shndx);
366 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
367 if (extshndx_buf == NULL)
368 {
217aa764 369 alloc_extshndx = bfd_malloc (amt);
6cdc0ccc
AM
370 extshndx_buf = alloc_extshndx;
371 }
372 if (extshndx_buf == NULL
373 || bfd_seek (ibfd, pos, SEEK_SET) != 0
374 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
375 {
376 intsym_buf = NULL;
377 goto out;
378 }
379 }
380
381 if (intsym_buf == NULL)
382 {
383 bfd_size_type amt = symcount * sizeof (Elf_Internal_Sym);
217aa764 384 intsym_buf = bfd_malloc (amt);
6cdc0ccc
AM
385 if (intsym_buf == NULL)
386 goto out;
387 }
388
389 /* Convert the symbols to internal form. */
390 isymend = intsym_buf + symcount;
391 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
392 isym < isymend;
393 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 394 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
395
396 out:
397 if (alloc_ext != NULL)
398 free (alloc_ext);
399 if (alloc_extshndx != NULL)
400 free (alloc_extshndx);
401
402 return intsym_buf;
403}
404
5cab59f6
AM
405/* Look up a symbol name. */
406const char *
217aa764 407bfd_elf_local_sym_name (bfd *abfd, Elf_Internal_Sym *isym)
5cab59f6
AM
408{
409 unsigned int iname = isym->st_name;
410 unsigned int shindex = elf_tdata (abfd)->symtab_hdr.sh_link;
411 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION)
412 {
413 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
414 shindex = elf_elfheader (abfd)->e_shstrndx;
415 }
416
417 return bfd_elf_string_from_elf_section (abfd, shindex, iname);
418}
419
dbb410c3
AM
420/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
421 sections. The first element is the flags, the rest are section
422 pointers. */
423
424typedef union elf_internal_group {
425 Elf_Internal_Shdr *shdr;
426 unsigned int flags;
427} Elf_Internal_Group;
428
b885599b
AM
429/* Return the name of the group signature symbol. Why isn't the
430 signature just a string? */
431
432static const char *
217aa764 433group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 434{
9dce4196 435 Elf_Internal_Shdr *hdr;
9dce4196
AM
436 unsigned char esym[sizeof (Elf64_External_Sym)];
437 Elf_External_Sym_Shndx eshndx;
438 Elf_Internal_Sym isym;
b885599b
AM
439
440 /* First we need to ensure the symbol table is available. */
441 if (! bfd_section_from_shdr (abfd, ghdr->sh_link))
442 return NULL;
443
9dce4196
AM
444 /* Go read the symbol. */
445 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
446 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
447 &isym, esym, &eshndx) == NULL)
b885599b 448 return NULL;
9dce4196 449
5cab59f6 450 return bfd_elf_local_sym_name (abfd, &isym);
b885599b
AM
451}
452
dbb410c3
AM
453/* Set next_in_group list pointer, and group name for NEWSECT. */
454
b34976b6 455static bfd_boolean
217aa764 456setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
457{
458 unsigned int num_group = elf_tdata (abfd)->num_group;
459
460 /* If num_group is zero, read in all SHT_GROUP sections. The count
461 is set to -1 if there are no SHT_GROUP sections. */
462 if (num_group == 0)
463 {
464 unsigned int i, shnum;
465
466 /* First count the number of groups. If we have a SHT_GROUP
467 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 468 shnum = elf_numsections (abfd);
dbb410c3
AM
469 num_group = 0;
470 for (i = 0; i < shnum; i++)
471 {
472 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
473 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
474 num_group += 1;
475 }
476
477 if (num_group == 0)
973ffd63 478 num_group = (unsigned) -1;
dbb410c3
AM
479 elf_tdata (abfd)->num_group = num_group;
480
481 if (num_group > 0)
482 {
483 /* We keep a list of elf section headers for group sections,
484 so we can find them quickly. */
485 bfd_size_type amt = num_group * sizeof (Elf_Internal_Shdr *);
486 elf_tdata (abfd)->group_sect_ptr = bfd_alloc (abfd, amt);
487 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 488 return FALSE;
dbb410c3
AM
489
490 num_group = 0;
491 for (i = 0; i < shnum; i++)
492 {
493 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
494 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
495 {
973ffd63 496 unsigned char *src;
dbb410c3
AM
497 Elf_Internal_Group *dest;
498
499 /* Add to list of sections. */
500 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
501 num_group += 1;
502
503 /* Read the raw contents. */
504 BFD_ASSERT (sizeof (*dest) >= 4);
505 amt = shdr->sh_size * sizeof (*dest) / 4;
506 shdr->contents = bfd_alloc (abfd, amt);
507 if (shdr->contents == NULL
508 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
509 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
510 != shdr->sh_size))
b34976b6 511 return FALSE;
dbb410c3
AM
512
513 /* Translate raw contents, a flag word followed by an
514 array of elf section indices all in target byte order,
515 to the flag word followed by an array of elf section
516 pointers. */
517 src = shdr->contents + shdr->sh_size;
518 dest = (Elf_Internal_Group *) (shdr->contents + amt);
519 while (1)
520 {
521 unsigned int idx;
522
523 src -= 4;
524 --dest;
525 idx = H_GET_32 (abfd, src);
526 if (src == shdr->contents)
527 {
528 dest->flags = idx;
b885599b
AM
529 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
530 shdr->bfd_section->flags
531 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
532 break;
533 }
534 if (idx >= shnum)
535 {
536 ((*_bfd_error_handler)
537 (_("%s: invalid SHT_GROUP entry"),
538 bfd_archive_filename (abfd)));
539 idx = 0;
540 }
541 dest->shdr = elf_elfsections (abfd)[idx];
542 }
543 }
544 }
545 }
546 }
547
548 if (num_group != (unsigned) -1)
549 {
550 unsigned int i;
551
552 for (i = 0; i < num_group; i++)
553 {
554 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
555 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
556 unsigned int n_elt = shdr->sh_size / 4;
557
558 /* Look through this group's sections to see if current
559 section is a member. */
560 while (--n_elt != 0)
561 if ((++idx)->shdr == hdr)
562 {
e0e8c97f 563 asection *s = NULL;
dbb410c3
AM
564
565 /* We are a member of this group. Go looking through
566 other members to see if any others are linked via
567 next_in_group. */
568 idx = (Elf_Internal_Group *) shdr->contents;
569 n_elt = shdr->sh_size / 4;
570 while (--n_elt != 0)
571 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 572 && elf_next_in_group (s) != NULL)
dbb410c3
AM
573 break;
574 if (n_elt != 0)
575 {
dbb410c3
AM
576 /* Snarf the group name from other member, and
577 insert current section in circular list. */
945906ff
AM
578 elf_group_name (newsect) = elf_group_name (s);
579 elf_next_in_group (newsect) = elf_next_in_group (s);
580 elf_next_in_group (s) = newsect;
dbb410c3
AM
581 }
582 else
583 {
dbb410c3
AM
584 const char *gname;
585
b885599b
AM
586 gname = group_signature (abfd, shdr);
587 if (gname == NULL)
b34976b6 588 return FALSE;
945906ff 589 elf_group_name (newsect) = gname;
dbb410c3
AM
590
591 /* Start a circular list with one element. */
945906ff 592 elf_next_in_group (newsect) = newsect;
dbb410c3 593 }
b885599b 594
9dce4196
AM
595 /* If the group section has been created, point to the
596 new member. */
dbb410c3 597 if (shdr->bfd_section != NULL)
945906ff 598 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 599
dbb410c3
AM
600 i = num_group - 1;
601 break;
602 }
603 }
604 }
605
945906ff 606 if (elf_group_name (newsect) == NULL)
dbb410c3
AM
607 {
608 (*_bfd_error_handler) (_("%s: no group info for section %s"),
609 bfd_archive_filename (abfd), newsect->name);
610 }
b34976b6 611 return TRUE;
dbb410c3
AM
612}
613
b34976b6 614bfd_boolean
217aa764 615bfd_elf_discard_group (bfd *abfd ATTRIBUTE_UNUSED, asection *group)
b885599b
AM
616{
617 asection *first = elf_next_in_group (group);
618 asection *s = first;
619
620 while (s != NULL)
621 {
622 s->output_section = bfd_abs_section_ptr;
623 s = elf_next_in_group (s);
624 /* These lists are circular. */
625 if (s == first)
626 break;
627 }
b34976b6 628 return TRUE;
b885599b
AM
629}
630
252b5132
RH
631/* Make a BFD section from an ELF section. We store a pointer to the
632 BFD section in the bfd_section field of the header. */
633
b34976b6 634bfd_boolean
217aa764
AM
635_bfd_elf_make_section_from_shdr (bfd *abfd,
636 Elf_Internal_Shdr *hdr,
637 const char *name)
252b5132
RH
638{
639 asection *newsect;
640 flagword flags;
9c5bfbb7 641 const struct elf_backend_data *bed;
252b5132
RH
642
643 if (hdr->bfd_section != NULL)
644 {
645 BFD_ASSERT (strcmp (name,
646 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 647 return TRUE;
252b5132
RH
648 }
649
650 newsect = bfd_make_section_anyway (abfd, name);
651 if (newsect == NULL)
b34976b6 652 return FALSE;
252b5132 653
2f89ff8d
L
654 /* Always use the real type/flags. */
655 elf_section_type (newsect) = hdr->sh_type;
656 elf_section_flags (newsect) = hdr->sh_flags;
657
252b5132
RH
658 newsect->filepos = hdr->sh_offset;
659
660 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
661 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
662 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 663 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 664 return FALSE;
252b5132
RH
665
666 flags = SEC_NO_FLAGS;
667 if (hdr->sh_type != SHT_NOBITS)
668 flags |= SEC_HAS_CONTENTS;
dbb410c3
AM
669 if (hdr->sh_type == SHT_GROUP)
670 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
671 if ((hdr->sh_flags & SHF_ALLOC) != 0)
672 {
673 flags |= SEC_ALLOC;
674 if (hdr->sh_type != SHT_NOBITS)
675 flags |= SEC_LOAD;
676 }
677 if ((hdr->sh_flags & SHF_WRITE) == 0)
678 flags |= SEC_READONLY;
679 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
680 flags |= SEC_CODE;
681 else if ((flags & SEC_LOAD) != 0)
682 flags |= SEC_DATA;
f5fa8ca2
JJ
683 if ((hdr->sh_flags & SHF_MERGE) != 0)
684 {
685 flags |= SEC_MERGE;
686 newsect->entsize = hdr->sh_entsize;
687 if ((hdr->sh_flags & SHF_STRINGS) != 0)
688 flags |= SEC_STRINGS;
689 }
dbb410c3
AM
690 if (hdr->sh_flags & SHF_GROUP)
691 if (!setup_group (abfd, hdr, newsect))
b34976b6 692 return FALSE;
13ae64f3
JJ
693 if ((hdr->sh_flags & SHF_TLS) != 0)
694 flags |= SEC_THREAD_LOCAL;
252b5132
RH
695
696 /* The debugging sections appear to be recognized only by name, not
697 any sort of flag. */
7a6cc5fb 698 {
dbf48117 699 static const char *debug_sec_names [] =
7a6cc5fb
NC
700 {
701 ".debug",
702 ".gnu.linkonce.wi.",
703 ".line",
704 ".stab"
705 };
706 int i;
707
e0e8c97f 708 for (i = ARRAY_SIZE (debug_sec_names); i--;)
7a6cc5fb
NC
709 if (strncmp (name, debug_sec_names[i], strlen (debug_sec_names[i])) == 0)
710 break;
711
712 if (i >= 0)
713 flags |= SEC_DEBUGGING;
714 }
252b5132
RH
715
716 /* As a GNU extension, if the name begins with .gnu.linkonce, we
717 only link a single copy of the section. This is used to support
718 g++. g++ will emit each template expansion in its own section.
719 The symbols will be defined as weak, so that multiple definitions
720 are permitted. The GNU linker extension is to actually discard
721 all but one of the sections. */
b885599b
AM
722 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
723 && elf_next_in_group (newsect) == NULL)
252b5132
RH
724 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
725
fa152c49
JW
726 bed = get_elf_backend_data (abfd);
727 if (bed->elf_backend_section_flags)
728 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 729 return FALSE;
fa152c49 730
252b5132 731 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 732 return FALSE;
252b5132
RH
733
734 if ((flags & SEC_ALLOC) != 0)
735 {
736 Elf_Internal_Phdr *phdr;
737 unsigned int i;
738
739 /* Look through the phdrs to see if we need to adjust the lma.
740 If all the p_paddr fields are zero, we ignore them, since
741 some ELF linkers produce such output. */
742 phdr = elf_tdata (abfd)->phdr;
743 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
744 {
745 if (phdr->p_paddr != 0)
746 break;
747 }
748 if (i < elf_elfheader (abfd)->e_phnum)
749 {
750 phdr = elf_tdata (abfd)->phdr;
751 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
752 {
e0e8c97f
NC
753 /* This section is part of this segment if its file
754 offset plus size lies within the segment's memory
755 span and, if the section is loaded, the extent of the
47d9a591 756 loaded data lies within the extent of the segment.
bf36db18
NC
757
758 Note - we used to check the p_paddr field as well, and
759 refuse to set the LMA if it was 0. This is wrong
dba143ef 760 though, as a perfectly valid initialised segment can
bf36db18 761 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 762 place special significance on the address 0 and
bf36db18
NC
763 executables need to be able to have a segment which
764 covers this address. */
252b5132 765 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
766 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
767 && (hdr->sh_offset + hdr->sh_size
768 <= phdr->p_offset + phdr->p_memsz)
252b5132 769 && ((flags & SEC_LOAD) == 0
d7866f04
AM
770 || (hdr->sh_offset + hdr->sh_size
771 <= phdr->p_offset + phdr->p_filesz)))
252b5132 772 {
dba143ef 773 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
774 newsect->lma = (phdr->p_paddr
775 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
776 else
777 /* We used to use the same adjustment for SEC_LOAD
778 sections, but that doesn't work if the segment
779 is packed with code from multiple VMAs.
780 Instead we calculate the section LMA based on
781 the segment LMA. It is assumed that the
782 segment will contain sections with contiguous
783 LMAs, even if the VMAs are not. */
784 newsect->lma = (phdr->p_paddr
785 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
786
787 /* With contiguous segments, we can't tell from file
788 offsets whether a section with zero size should
789 be placed at the end of one segment or the
790 beginning of the next. Decide based on vaddr. */
791 if (hdr->sh_addr >= phdr->p_vaddr
792 && (hdr->sh_addr + hdr->sh_size
793 <= phdr->p_vaddr + phdr->p_memsz))
794 break;
252b5132
RH
795 }
796 }
797 }
798 }
799
800 hdr->bfd_section = newsect;
801 elf_section_data (newsect)->this_hdr = *hdr;
802
b34976b6 803 return TRUE;
252b5132
RH
804}
805
806/*
807INTERNAL_FUNCTION
808 bfd_elf_find_section
809
810SYNOPSIS
811 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
812
813DESCRIPTION
814 Helper functions for GDB to locate the string tables.
815 Since BFD hides string tables from callers, GDB needs to use an
816 internal hook to find them. Sun's .stabstr, in particular,
817 isn't even pointed to by the .stab section, so ordinary
818 mechanisms wouldn't work to find it, even if we had some.
819*/
820
821struct elf_internal_shdr *
217aa764 822bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
823{
824 Elf_Internal_Shdr **i_shdrp;
825 char *shstrtab;
826 unsigned int max;
827 unsigned int i;
828
829 i_shdrp = elf_elfsections (abfd);
830 if (i_shdrp != NULL)
831 {
9ad5cbcf
AM
832 shstrtab = bfd_elf_get_str_section (abfd,
833 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
834 if (shstrtab != NULL)
835 {
9ad5cbcf 836 max = elf_numsections (abfd);
252b5132
RH
837 for (i = 1; i < max; i++)
838 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
839 return i_shdrp[i];
840 }
841 }
842 return 0;
843}
844
845const char *const bfd_elf_section_type_names[] = {
846 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
847 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
848 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
849};
850
1049f94e 851/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
852 output, and the reloc is against an external symbol, and nothing
853 has given us any additional addend, the resulting reloc will also
854 be against the same symbol. In such a case, we don't want to
855 change anything about the way the reloc is handled, since it will
856 all be done at final link time. Rather than put special case code
857 into bfd_perform_relocation, all the reloc types use this howto
858 function. It just short circuits the reloc if producing
1049f94e 859 relocatable output against an external symbol. */
252b5132 860
252b5132 861bfd_reloc_status_type
217aa764
AM
862bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
863 arelent *reloc_entry,
864 asymbol *symbol,
865 void *data ATTRIBUTE_UNUSED,
866 asection *input_section,
867 bfd *output_bfd,
868 char **error_message ATTRIBUTE_UNUSED)
869{
870 if (output_bfd != NULL
252b5132
RH
871 && (symbol->flags & BSF_SECTION_SYM) == 0
872 && (! reloc_entry->howto->partial_inplace
873 || reloc_entry->addend == 0))
874 {
875 reloc_entry->address += input_section->output_offset;
876 return bfd_reloc_ok;
877 }
878
879 return bfd_reloc_continue;
880}
881\f
d3c456e9
JJ
882/* Make sure sec_info_type is cleared if sec_info is cleared too. */
883
884static void
217aa764
AM
885merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
886 asection *sec)
d3c456e9 887{
68bfbfcc
AM
888 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
889 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
890}
891
8550eb6e
JJ
892/* Finish SHF_MERGE section merging. */
893
b34976b6 894bfd_boolean
217aa764 895_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 896{
b0f35f36 897 if (!is_elf_hash_table (info))
b34976b6 898 return FALSE;
b0f35f36 899 if (elf_hash_table (info)->merge_info)
d3c456e9
JJ
900 _bfd_merge_sections (abfd, elf_hash_table (info)->merge_info,
901 merge_sections_remove_hook);
b34976b6 902 return TRUE;
8550eb6e 903}
2d653fc7
AM
904
905void
217aa764 906_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
907{
908 sec->output_section = bfd_abs_section_ptr;
909 sec->output_offset = sec->vma;
910 if (!is_elf_hash_table (info))
911 return;
912
68bfbfcc 913 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 914}
8550eb6e 915\f
0ac4564e
L
916/* Copy the program header and other data from one object module to
917 another. */
252b5132 918
b34976b6 919bfd_boolean
217aa764 920_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
921{
922 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
923 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 924 return TRUE;
2d502050
L
925
926 BFD_ASSERT (!elf_flags_init (obfd)
927 || (elf_elfheader (obfd)->e_flags
928 == elf_elfheader (ibfd)->e_flags));
929
0ac4564e 930 elf_gp (obfd) = elf_gp (ibfd);
2d502050 931 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
932 elf_flags_init (obfd) = TRUE;
933 return TRUE;
2d502050
L
934}
935
f0b79d91
L
936/* Print out the program headers. */
937
b34976b6 938bfd_boolean
217aa764 939_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 940{
217aa764 941 FILE *f = farg;
252b5132
RH
942 Elf_Internal_Phdr *p;
943 asection *s;
944 bfd_byte *dynbuf = NULL;
945
946 p = elf_tdata (abfd)->phdr;
947 if (p != NULL)
948 {
949 unsigned int i, c;
950
951 fprintf (f, _("\nProgram Header:\n"));
952 c = elf_elfheader (abfd)->e_phnum;
953 for (i = 0; i < c; i++, p++)
954 {
dc810e39 955 const char *pt;
252b5132
RH
956 char buf[20];
957
958 switch (p->p_type)
959 {
dc810e39
AM
960 case PT_NULL: pt = "NULL"; break;
961 case PT_LOAD: pt = "LOAD"; break;
962 case PT_DYNAMIC: pt = "DYNAMIC"; break;
963 case PT_INTERP: pt = "INTERP"; break;
964 case PT_NOTE: pt = "NOTE"; break;
965 case PT_SHLIB: pt = "SHLIB"; break;
966 case PT_PHDR: pt = "PHDR"; break;
13ae64f3 967 case PT_TLS: pt = "TLS"; break;
65765700 968 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
9ee5e499 969 case PT_GNU_STACK: pt = "STACK"; break;
dc810e39 970 default: sprintf (buf, "0x%lx", p->p_type); pt = buf; break;
252b5132 971 }
dc810e39 972 fprintf (f, "%8s off 0x", pt);
60b89a18 973 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 974 fprintf (f, " vaddr 0x");
60b89a18 975 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 976 fprintf (f, " paddr 0x");
60b89a18 977 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
978 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
979 fprintf (f, " filesz 0x");
60b89a18 980 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 981 fprintf (f, " memsz 0x");
60b89a18 982 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
983 fprintf (f, " flags %c%c%c",
984 (p->p_flags & PF_R) != 0 ? 'r' : '-',
985 (p->p_flags & PF_W) != 0 ? 'w' : '-',
986 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
987 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
988 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
989 fprintf (f, "\n");
990 }
991 }
992
993 s = bfd_get_section_by_name (abfd, ".dynamic");
994 if (s != NULL)
995 {
996 int elfsec;
dc810e39 997 unsigned long shlink;
252b5132
RH
998 bfd_byte *extdyn, *extdynend;
999 size_t extdynsize;
217aa764 1000 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1001
1002 fprintf (f, _("\nDynamic Section:\n"));
1003
217aa764 1004 dynbuf = bfd_malloc (s->_raw_size);
252b5132
RH
1005 if (dynbuf == NULL)
1006 goto error_return;
217aa764 1007 if (! bfd_get_section_contents (abfd, s, dynbuf, 0, s->_raw_size))
252b5132
RH
1008 goto error_return;
1009
1010 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1011 if (elfsec == -1)
1012 goto error_return;
dc810e39 1013 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1014
1015 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1016 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1017
1018 extdyn = dynbuf;
1019 extdynend = extdyn + s->_raw_size;
1020 for (; extdyn < extdynend; extdyn += extdynsize)
1021 {
1022 Elf_Internal_Dyn dyn;
1023 const char *name;
1024 char ab[20];
b34976b6 1025 bfd_boolean stringp;
252b5132 1026
217aa764 1027 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1028
1029 if (dyn.d_tag == DT_NULL)
1030 break;
1031
b34976b6 1032 stringp = FALSE;
252b5132
RH
1033 switch (dyn.d_tag)
1034 {
1035 default:
1036 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1037 name = ab;
1038 break;
1039
b34976b6 1040 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1041 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1042 case DT_PLTGOT: name = "PLTGOT"; break;
1043 case DT_HASH: name = "HASH"; break;
1044 case DT_STRTAB: name = "STRTAB"; break;
1045 case DT_SYMTAB: name = "SYMTAB"; break;
1046 case DT_RELA: name = "RELA"; break;
1047 case DT_RELASZ: name = "RELASZ"; break;
1048 case DT_RELAENT: name = "RELAENT"; break;
1049 case DT_STRSZ: name = "STRSZ"; break;
1050 case DT_SYMENT: name = "SYMENT"; break;
1051 case DT_INIT: name = "INIT"; break;
1052 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1053 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1054 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1055 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1056 case DT_REL: name = "REL"; break;
1057 case DT_RELSZ: name = "RELSZ"; break;
1058 case DT_RELENT: name = "RELENT"; break;
1059 case DT_PLTREL: name = "PLTREL"; break;
1060 case DT_DEBUG: name = "DEBUG"; break;
1061 case DT_TEXTREL: name = "TEXTREL"; break;
1062 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1063 case DT_BIND_NOW: name = "BIND_NOW"; break;
1064 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1065 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1066 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1067 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1068 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1069 case DT_FLAGS: name = "FLAGS"; break;
1070 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1071 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1072 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1073 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1074 case DT_MOVEENT: name = "MOVEENT"; break;
1075 case DT_MOVESZ: name = "MOVESZ"; break;
1076 case DT_FEATURE: name = "FEATURE"; break;
1077 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1078 case DT_SYMINSZ: name = "SYMINSZ"; break;
1079 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1080 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1081 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1082 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1083 case DT_PLTPAD: name = "PLTPAD"; break;
1084 case DT_MOVETAB: name = "MOVETAB"; break;
1085 case DT_SYMINFO: name = "SYMINFO"; break;
1086 case DT_RELACOUNT: name = "RELACOUNT"; break;
1087 case DT_RELCOUNT: name = "RELCOUNT"; break;
1088 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1089 case DT_VERSYM: name = "VERSYM"; break;
1090 case DT_VERDEF: name = "VERDEF"; break;
1091 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1092 case DT_VERNEED: name = "VERNEED"; break;
1093 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1094 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1095 case DT_USED: name = "USED"; break;
b34976b6 1096 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1097 }
1098
1099 fprintf (f, " %-11s ", name);
1100 if (! stringp)
1101 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1102 else
1103 {
1104 const char *string;
dc810e39 1105 unsigned int tagv = dyn.d_un.d_val;
252b5132 1106
dc810e39 1107 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1108 if (string == NULL)
1109 goto error_return;
1110 fprintf (f, "%s", string);
1111 }
1112 fprintf (f, "\n");
1113 }
1114
1115 free (dynbuf);
1116 dynbuf = NULL;
1117 }
1118
1119 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1120 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1121 {
1122 if (! _bfd_elf_slurp_version_tables (abfd))
b34976b6 1123 return FALSE;
252b5132
RH
1124 }
1125
1126 if (elf_dynverdef (abfd) != 0)
1127 {
1128 Elf_Internal_Verdef *t;
1129
1130 fprintf (f, _("\nVersion definitions:\n"));
1131 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1132 {
1133 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1134 t->vd_flags, t->vd_hash, t->vd_nodename);
1135 if (t->vd_auxptr->vda_nextptr != NULL)
1136 {
1137 Elf_Internal_Verdaux *a;
1138
1139 fprintf (f, "\t");
1140 for (a = t->vd_auxptr->vda_nextptr;
1141 a != NULL;
1142 a = a->vda_nextptr)
1143 fprintf (f, "%s ", a->vda_nodename);
1144 fprintf (f, "\n");
1145 }
1146 }
1147 }
1148
1149 if (elf_dynverref (abfd) != 0)
1150 {
1151 Elf_Internal_Verneed *t;
1152
1153 fprintf (f, _("\nVersion References:\n"));
1154 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1155 {
1156 Elf_Internal_Vernaux *a;
1157
1158 fprintf (f, _(" required from %s:\n"), t->vn_filename);
1159 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1160 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1161 a->vna_flags, a->vna_other, a->vna_nodename);
1162 }
1163 }
1164
b34976b6 1165 return TRUE;
252b5132
RH
1166
1167 error_return:
1168 if (dynbuf != NULL)
1169 free (dynbuf);
b34976b6 1170 return FALSE;
252b5132
RH
1171}
1172
1173/* Display ELF-specific fields of a symbol. */
1174
1175void
217aa764
AM
1176bfd_elf_print_symbol (bfd *abfd,
1177 void *filep,
1178 asymbol *symbol,
1179 bfd_print_symbol_type how)
252b5132 1180{
217aa764 1181 FILE *file = filep;
252b5132
RH
1182 switch (how)
1183 {
1184 case bfd_print_symbol_name:
1185 fprintf (file, "%s", symbol->name);
1186 break;
1187 case bfd_print_symbol_more:
1188 fprintf (file, "elf ");
60b89a18 1189 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1190 fprintf (file, " %lx", (long) symbol->flags);
1191 break;
1192 case bfd_print_symbol_all:
1193 {
4e8a9624
AM
1194 const char *section_name;
1195 const char *name = NULL;
9c5bfbb7 1196 const struct elf_backend_data *bed;
7a13edea 1197 unsigned char st_other;
dbb410c3 1198 bfd_vma val;
c044fabd 1199
252b5132 1200 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1201
1202 bed = get_elf_backend_data (abfd);
1203 if (bed->elf_backend_print_symbol_all)
c044fabd 1204 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1205
1206 if (name == NULL)
1207 {
7ee38065 1208 name = symbol->name;
217aa764 1209 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1210 }
1211
252b5132
RH
1212 fprintf (file, " %s\t", section_name);
1213 /* Print the "other" value for a symbol. For common symbols,
1214 we've already printed the size; now print the alignment.
1215 For other symbols, we have no specified alignment, and
1216 we've printed the address; now print the size. */
dbb410c3
AM
1217 if (bfd_is_com_section (symbol->section))
1218 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1219 else
1220 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1221 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1222
1223 /* If we have version information, print it. */
1224 if (elf_tdata (abfd)->dynversym_section != 0
1225 && (elf_tdata (abfd)->dynverdef_section != 0
1226 || elf_tdata (abfd)->dynverref_section != 0))
1227 {
1228 unsigned int vernum;
1229 const char *version_string;
1230
1231 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1232
1233 if (vernum == 0)
1234 version_string = "";
1235 else if (vernum == 1)
1236 version_string = "Base";
1237 else if (vernum <= elf_tdata (abfd)->cverdefs)
1238 version_string =
1239 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1240 else
1241 {
1242 Elf_Internal_Verneed *t;
1243
1244 version_string = "";
1245 for (t = elf_tdata (abfd)->verref;
1246 t != NULL;
1247 t = t->vn_nextref)
1248 {
1249 Elf_Internal_Vernaux *a;
1250
1251 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1252 {
1253 if (a->vna_other == vernum)
1254 {
1255 version_string = a->vna_nodename;
1256 break;
1257 }
1258 }
1259 }
1260 }
1261
1262 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1263 fprintf (file, " %-11s", version_string);
1264 else
1265 {
1266 int i;
1267
1268 fprintf (file, " (%s)", version_string);
1269 for (i = 10 - strlen (version_string); i > 0; --i)
1270 putc (' ', file);
1271 }
1272 }
1273
1274 /* If the st_other field is not zero, print it. */
7a13edea 1275 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1276
7a13edea
NC
1277 switch (st_other)
1278 {
1279 case 0: break;
1280 case STV_INTERNAL: fprintf (file, " .internal"); break;
1281 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1282 case STV_PROTECTED: fprintf (file, " .protected"); break;
1283 default:
1284 /* Some other non-defined flags are also present, so print
1285 everything hex. */
1286 fprintf (file, " 0x%02x", (unsigned int) st_other);
1287 }
252b5132 1288
587ff49e 1289 fprintf (file, " %s", name);
252b5132
RH
1290 }
1291 break;
1292 }
1293}
1294\f
1295/* Create an entry in an ELF linker hash table. */
1296
1297struct bfd_hash_entry *
217aa764
AM
1298_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1299 struct bfd_hash_table *table,
1300 const char *string)
252b5132 1301{
252b5132
RH
1302 /* Allocate the structure if it has not already been allocated by a
1303 subclass. */
51b64d56
AM
1304 if (entry == NULL)
1305 {
1306 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1307 if (entry == NULL)
1308 return entry;
1309 }
252b5132
RH
1310
1311 /* Call the allocation method of the superclass. */
51b64d56
AM
1312 entry = _bfd_link_hash_newfunc (entry, table, string);
1313 if (entry != NULL)
252b5132 1314 {
51b64d56
AM
1315 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1316 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1317
252b5132
RH
1318 /* Set local fields. */
1319 ret->indx = -1;
252b5132
RH
1320 ret->dynindx = -1;
1321 ret->dynstr_index = 0;
73722af0 1322 ret->elf_hash_value = 0;
252b5132 1323 ret->weakdef = NULL;
252b5132 1324 ret->verinfo.verdef = NULL;
252b5132 1325 ret->vtable_entries_size = 0;
73722af0 1326 ret->vtable_entries_used = NULL;
252b5132 1327 ret->vtable_parent = NULL;
5cab59f6
AM
1328 ret->got = htab->init_refcount;
1329 ret->plt = htab->init_refcount;
73722af0 1330 ret->size = 0;
252b5132
RH
1331 ret->type = STT_NOTYPE;
1332 ret->other = 0;
1333 /* Assume that we have been called by a non-ELF symbol reader.
1334 This flag is then reset by the code which reads an ELF input
1335 file. This ensures that a symbol created by a non-ELF symbol
1336 reader will have the flag set correctly. */
1337 ret->elf_link_hash_flags = ELF_LINK_NON_ELF;
1338 }
1339
51b64d56 1340 return entry;
252b5132
RH
1341}
1342
2920b85c 1343/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1344 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1345
c61b8717 1346void
9c5bfbb7 1347_bfd_elf_link_hash_copy_indirect (const struct elf_backend_data *bed,
217aa764
AM
1348 struct elf_link_hash_entry *dir,
1349 struct elf_link_hash_entry *ind)
2920b85c 1350{
3c3e9281 1351 bfd_signed_vma tmp;
b48fa14c 1352 bfd_signed_vma lowest_valid = bed->can_refcount;
3c3e9281 1353
2920b85c
RH
1354 /* Copy down any references that we may have already seen to the
1355 symbol which just became indirect. */
1356
3addb0a9
DJ
1357 dir->elf_link_hash_flags
1358 |= (ind->elf_link_hash_flags & (ELF_LINK_HASH_REF_DYNAMIC
1359 | ELF_LINK_HASH_REF_REGULAR
1360 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
1361 | ELF_LINK_NON_GOT_REF
c6585bbb
JJ
1362 | ELF_LINK_HASH_NEEDS_PLT
1363 | ELF_LINK_POINTER_EQUALITY_NEEDED));
2920b85c 1364
1e370bd2 1365 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1366 return;
1367
51b64d56 1368 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1369 These may have been already set up by a check_relocs routine. */
3c3e9281 1370 tmp = dir->got.refcount;
b48fa14c 1371 if (tmp < lowest_valid)
2920b85c 1372 {
51b64d56 1373 dir->got.refcount = ind->got.refcount;
3c3e9281 1374 ind->got.refcount = tmp;
2920b85c 1375 }
3c3e9281 1376 else
b48fa14c 1377 BFD_ASSERT (ind->got.refcount < lowest_valid);
2920b85c 1378
3c3e9281 1379 tmp = dir->plt.refcount;
b48fa14c 1380 if (tmp < lowest_valid)
2920b85c 1381 {
51b64d56 1382 dir->plt.refcount = ind->plt.refcount;
3c3e9281 1383 ind->plt.refcount = tmp;
2920b85c 1384 }
3c3e9281 1385 else
b48fa14c 1386 BFD_ASSERT (ind->plt.refcount < lowest_valid);
2920b85c
RH
1387
1388 if (dir->dynindx == -1)
1389 {
1390 dir->dynindx = ind->dynindx;
1391 dir->dynstr_index = ind->dynstr_index;
1392 ind->dynindx = -1;
1393 ind->dynstr_index = 0;
1394 }
3c3e9281
AM
1395 else
1396 BFD_ASSERT (ind->dynindx == -1);
2920b85c
RH
1397}
1398
c61b8717 1399void
217aa764
AM
1400_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1401 struct elf_link_hash_entry *h,
1402 bfd_boolean force_local)
2920b85c 1403{
5cab59f6 1404 h->plt = elf_hash_table (info)->init_offset;
e5094212
AM
1405 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1406 if (force_local)
1407 {
1408 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
1409 if (h->dynindx != -1)
1410 {
1411 h->dynindx = -1;
1412 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1413 h->dynstr_index);
1414 }
1415 }
2920b85c
RH
1416}
1417
252b5132
RH
1418/* Initialize an ELF linker hash table. */
1419
b34976b6 1420bfd_boolean
217aa764
AM
1421_bfd_elf_link_hash_table_init
1422 (struct elf_link_hash_table *table,
1423 bfd *abfd,
1424 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1425 struct bfd_hash_table *,
1426 const char *))
252b5132 1427{
b34976b6 1428 bfd_boolean ret;
8ea2e4bd 1429
b34976b6 1430 table->dynamic_sections_created = FALSE;
252b5132 1431 table->dynobj = NULL;
963f13ec
AO
1432 /* Make sure can_refcount is extended to the width and signedness of
1433 init_refcount before we subtract one from it. */
5cab59f6
AM
1434 table->init_refcount.refcount = get_elf_backend_data (abfd)->can_refcount;
1435 table->init_refcount.refcount -= 1;
1436 table->init_offset.offset = -(bfd_vma) 1;
252b5132
RH
1437 /* The first dynamic symbol is a dummy. */
1438 table->dynsymcount = 1;
1439 table->dynstr = NULL;
1440 table->bucketcount = 0;
1441 table->needed = NULL;
1442 table->hgot = NULL;
1443 table->stab_info = NULL;
f5fa8ca2 1444 table->merge_info = NULL;
73722af0 1445 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1446 table->dynlocal = NULL;
73722af0 1447 table->runpath = NULL;
e1918d23
AM
1448 table->tls_sec = NULL;
1449 table->tls_size = 0;
73722af0
AM
1450 table->loaded = NULL;
1451
1452 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc);
8ea2e4bd
NC
1453 table->root.type = bfd_link_elf_hash_table;
1454
1455 return ret;
252b5132
RH
1456}
1457
1458/* Create an ELF linker hash table. */
1459
1460struct bfd_link_hash_table *
217aa764 1461_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1462{
1463 struct elf_link_hash_table *ret;
dc810e39 1464 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1465
217aa764
AM
1466 ret = bfd_malloc (amt);
1467 if (ret == NULL)
252b5132
RH
1468 return NULL;
1469
1470 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc))
1471 {
e2d34d7d 1472 free (ret);
252b5132
RH
1473 return NULL;
1474 }
1475
1476 return &ret->root;
1477}
1478
1479/* This is a hook for the ELF emulation code in the generic linker to
1480 tell the backend linker what file name to use for the DT_NEEDED
1481 entry for a dynamic object. The generic linker passes name as an
1482 empty string to indicate that no DT_NEEDED entry should be made. */
1483
1484void
217aa764 1485bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1486{
1487 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1488 && bfd_get_format (abfd) == bfd_object)
1489 elf_dt_name (abfd) = name;
1490}
1491
74816898 1492void
217aa764 1493bfd_elf_set_dt_needed_soname (bfd *abfd, const char *name)
74816898
L
1494{
1495 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1496 && bfd_get_format (abfd) == bfd_object)
1497 elf_dt_soname (abfd) = name;
1498}
1499
252b5132
RH
1500/* Get the list of DT_NEEDED entries for a link. This is a hook for
1501 the linker ELF emulation code. */
1502
1503struct bfd_link_needed_list *
217aa764
AM
1504bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1505 struct bfd_link_info *info)
252b5132 1506{
385a4c14 1507 if (! is_elf_hash_table (info))
252b5132
RH
1508 return NULL;
1509 return elf_hash_table (info)->needed;
1510}
1511
a963dc6a
L
1512/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1513 hook for the linker ELF emulation code. */
1514
1515struct bfd_link_needed_list *
217aa764
AM
1516bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1517 struct bfd_link_info *info)
a963dc6a 1518{
385a4c14 1519 if (! is_elf_hash_table (info))
a963dc6a
L
1520 return NULL;
1521 return elf_hash_table (info)->runpath;
1522}
1523
252b5132
RH
1524/* Get the name actually used for a dynamic object for a link. This
1525 is the SONAME entry if there is one. Otherwise, it is the string
1526 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1527
1528const char *
217aa764 1529bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1530{
1531 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1532 && bfd_get_format (abfd) == bfd_object)
1533 return elf_dt_name (abfd);
1534 return NULL;
1535}
1536
1537/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1538 the ELF linker emulation code. */
1539
b34976b6 1540bfd_boolean
217aa764
AM
1541bfd_elf_get_bfd_needed_list (bfd *abfd,
1542 struct bfd_link_needed_list **pneeded)
252b5132
RH
1543{
1544 asection *s;
1545 bfd_byte *dynbuf = NULL;
1546 int elfsec;
dc810e39 1547 unsigned long shlink;
252b5132
RH
1548 bfd_byte *extdyn, *extdynend;
1549 size_t extdynsize;
217aa764 1550 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1551
1552 *pneeded = NULL;
1553
1554 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1555 || bfd_get_format (abfd) != bfd_object)
b34976b6 1556 return TRUE;
252b5132
RH
1557
1558 s = bfd_get_section_by_name (abfd, ".dynamic");
1559 if (s == NULL || s->_raw_size == 0)
b34976b6 1560 return TRUE;
252b5132 1561
217aa764 1562 dynbuf = bfd_malloc (s->_raw_size);
252b5132
RH
1563 if (dynbuf == NULL)
1564 goto error_return;
1565
217aa764 1566 if (! bfd_get_section_contents (abfd, s, dynbuf, 0, s->_raw_size))
252b5132
RH
1567 goto error_return;
1568
1569 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1570 if (elfsec == -1)
1571 goto error_return;
1572
dc810e39 1573 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1574
1575 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1576 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1577
1578 extdyn = dynbuf;
1579 extdynend = extdyn + s->_raw_size;
1580 for (; extdyn < extdynend; extdyn += extdynsize)
1581 {
1582 Elf_Internal_Dyn dyn;
1583
217aa764 1584 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1585
1586 if (dyn.d_tag == DT_NULL)
1587 break;
1588
1589 if (dyn.d_tag == DT_NEEDED)
1590 {
1591 const char *string;
1592 struct bfd_link_needed_list *l;
dc810e39
AM
1593 unsigned int tagv = dyn.d_un.d_val;
1594 bfd_size_type amt;
252b5132 1595
dc810e39 1596 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1597 if (string == NULL)
1598 goto error_return;
1599
dc810e39 1600 amt = sizeof *l;
217aa764 1601 l = bfd_alloc (abfd, amt);
252b5132
RH
1602 if (l == NULL)
1603 goto error_return;
1604
1605 l->by = abfd;
1606 l->name = string;
1607 l->next = *pneeded;
1608 *pneeded = l;
1609 }
1610 }
1611
1612 free (dynbuf);
1613
b34976b6 1614 return TRUE;
252b5132
RH
1615
1616 error_return:
1617 if (dynbuf != NULL)
1618 free (dynbuf);
b34976b6 1619 return FALSE;
252b5132
RH
1620}
1621\f
1622/* Allocate an ELF string table--force the first byte to be zero. */
1623
1624struct bfd_strtab_hash *
217aa764 1625_bfd_elf_stringtab_init (void)
252b5132
RH
1626{
1627 struct bfd_strtab_hash *ret;
1628
1629 ret = _bfd_stringtab_init ();
1630 if (ret != NULL)
1631 {
1632 bfd_size_type loc;
1633
b34976b6 1634 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1635 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1636 if (loc == (bfd_size_type) -1)
1637 {
1638 _bfd_stringtab_free (ret);
1639 ret = NULL;
1640 }
1641 }
1642 return ret;
1643}
1644\f
1645/* ELF .o/exec file reading */
1646
c044fabd 1647/* Create a new bfd section from an ELF section header. */
252b5132 1648
b34976b6 1649bfd_boolean
217aa764 1650bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1651{
1652 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1653 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1654 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1655 const char *name;
252b5132
RH
1656
1657 name = elf_string_from_elf_strtab (abfd, hdr->sh_name);
1658
1659 switch (hdr->sh_type)
1660 {
1661 case SHT_NULL:
1662 /* Inactive section. Throw it away. */
b34976b6 1663 return TRUE;
252b5132
RH
1664
1665 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1666 case SHT_NOBITS: /* .bss section. */
1667 case SHT_HASH: /* .hash section. */
1668 case SHT_NOTE: /* .note section. */
25e27870
L
1669 case SHT_INIT_ARRAY: /* .init_array section. */
1670 case SHT_FINI_ARRAY: /* .fini_array section. */
1671 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
252b5132
RH
1672 return _bfd_elf_make_section_from_shdr (abfd, hdr, name);
1673
797fc050
AM
1674 case SHT_DYNAMIC: /* Dynamic linking information. */
1675 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name))
b34976b6 1676 return FALSE;
797fc050
AM
1677 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1678 {
1679 Elf_Internal_Shdr *dynsymhdr;
1680
1681 /* The shared libraries distributed with hpux11 have a bogus
1682 sh_link field for the ".dynamic" section. Find the
1683 string table for the ".dynsym" section instead. */
1684 if (elf_dynsymtab (abfd) != 0)
1685 {
1686 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1687 hdr->sh_link = dynsymhdr->sh_link;
1688 }
1689 else
1690 {
1691 unsigned int i, num_sec;
1692
1693 num_sec = elf_numsections (abfd);
1694 for (i = 1; i < num_sec; i++)
1695 {
1696 dynsymhdr = elf_elfsections (abfd)[i];
1697 if (dynsymhdr->sh_type == SHT_DYNSYM)
1698 {
1699 hdr->sh_link = dynsymhdr->sh_link;
1700 break;
1701 }
1702 }
1703 }
1704 }
1705 break;
1706
252b5132
RH
1707 case SHT_SYMTAB: /* A symbol table */
1708 if (elf_onesymtab (abfd) == shindex)
b34976b6 1709 return TRUE;
252b5132
RH
1710
1711 BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym);
1712 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1713 elf_onesymtab (abfd) = shindex;
1714 elf_tdata (abfd)->symtab_hdr = *hdr;
1715 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1716 abfd->flags |= HAS_SYMS;
1717
1718 /* Sometimes a shared object will map in the symbol table. If
1719 SHF_ALLOC is set, and this is a shared object, then we also
1720 treat this section as a BFD section. We can not base the
1721 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1722 set in a relocatable object file, which would confuse the
252b5132
RH
1723 linker. */
1724 if ((hdr->sh_flags & SHF_ALLOC) != 0
1725 && (abfd->flags & DYNAMIC) != 0
1726 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name))
b34976b6 1727 return FALSE;
252b5132 1728
b34976b6 1729 return TRUE;
252b5132
RH
1730
1731 case SHT_DYNSYM: /* A dynamic symbol table */
1732 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1733 return TRUE;
252b5132
RH
1734
1735 BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym);
1736 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1737 elf_dynsymtab (abfd) = shindex;
1738 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1739 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1740 abfd->flags |= HAS_SYMS;
1741
1742 /* Besides being a symbol table, we also treat this as a regular
1743 section, so that objcopy can handle it. */
1744 return _bfd_elf_make_section_from_shdr (abfd, hdr, name);
1745
9ad5cbcf
AM
1746 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1747 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1748 return TRUE;
9ad5cbcf
AM
1749
1750 /* Get the associated symbol table. */
1751 if (! bfd_section_from_shdr (abfd, hdr->sh_link)
1752 || hdr->sh_link != elf_onesymtab (abfd))
b34976b6 1753 return FALSE;
9ad5cbcf
AM
1754
1755 elf_symtab_shndx (abfd) = shindex;
1756 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1757 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1758 return TRUE;
9ad5cbcf 1759
252b5132
RH
1760 case SHT_STRTAB: /* A string table */
1761 if (hdr->bfd_section != NULL)
b34976b6 1762 return TRUE;
252b5132
RH
1763 if (ehdr->e_shstrndx == shindex)
1764 {
1765 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1766 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1767 return TRUE;
252b5132
RH
1768 }
1769 {
9ad5cbcf 1770 unsigned int i, num_sec;
252b5132 1771
9ad5cbcf
AM
1772 num_sec = elf_numsections (abfd);
1773 for (i = 1; i < num_sec; i++)
252b5132
RH
1774 {
1775 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1776 if (hdr2->sh_link == shindex)
1777 {
1778 if (! bfd_section_from_shdr (abfd, i))
b34976b6 1779 return FALSE;
252b5132
RH
1780 if (elf_onesymtab (abfd) == i)
1781 {
1782 elf_tdata (abfd)->strtab_hdr = *hdr;
1783 elf_elfsections (abfd)[shindex] =
1784 &elf_tdata (abfd)->strtab_hdr;
b34976b6 1785 return TRUE;
252b5132
RH
1786 }
1787 if (elf_dynsymtab (abfd) == i)
1788 {
1789 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1790 elf_elfsections (abfd)[shindex] = hdr =
1791 &elf_tdata (abfd)->dynstrtab_hdr;
1792 /* We also treat this as a regular section, so
1793 that objcopy can handle it. */
1794 break;
1795 }
1796#if 0 /* Not handling other string tables specially right now. */
1797 hdr2 = elf_elfsections (abfd)[i]; /* in case it moved */
1798 /* We have a strtab for some random other section. */
1799 newsect = (asection *) hdr2->bfd_section;
1800 if (!newsect)
1801 break;
1802 hdr->bfd_section = newsect;
1803 hdr2 = &elf_section_data (newsect)->str_hdr;
1804 *hdr2 = *hdr;
1805 elf_elfsections (abfd)[shindex] = hdr2;
1806#endif
1807 }
1808 }
1809 }
1810
1811 return _bfd_elf_make_section_from_shdr (abfd, hdr, name);
1812
1813 case SHT_REL:
1814 case SHT_RELA:
1815 /* *These* do a lot of work -- but build no sections! */
1816 {
1817 asection *target_sect;
1818 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1819 unsigned int num_sec = elf_numsections (abfd);
252b5132 1820
03ae5f59 1821 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1822 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1823 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1824 {
1825 ((*_bfd_error_handler)
1826 (_("%s: invalid link %lu for reloc section %s (index %u)"),
8f615d07 1827 bfd_archive_filename (abfd), hdr->sh_link, name, shindex));
03ae5f59
ILT
1828 return _bfd_elf_make_section_from_shdr (abfd, hdr, name);
1829 }
1830
252b5132
RH
1831 /* For some incomprehensible reason Oracle distributes
1832 libraries for Solaris in which some of the objects have
1833 bogus sh_link fields. It would be nice if we could just
1834 reject them, but, unfortunately, some people need to use
1835 them. We scan through the section headers; if we find only
1836 one suitable symbol table, we clobber the sh_link to point
1837 to it. I hope this doesn't break anything. */
1838 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1839 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1840 {
9ad5cbcf 1841 unsigned int scan;
252b5132
RH
1842 int found;
1843
1844 found = 0;
9ad5cbcf 1845 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1846 {
1847 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1848 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1849 {
1850 if (found != 0)
1851 {
1852 found = 0;
1853 break;
1854 }
1855 found = scan;
1856 }
1857 }
1858 if (found != 0)
1859 hdr->sh_link = found;
1860 }
1861
1862 /* Get the symbol table. */
1863 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1864 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1865 return FALSE;
252b5132
RH
1866
1867 /* If this reloc section does not use the main symbol table we
1868 don't treat it as a reloc section. BFD can't adequately
1869 represent such a section, so at least for now, we don't
c044fabd 1870 try. We just present it as a normal section. We also
60bcf0fa 1871 can't use it as a reloc section if it points to the null
c044fabd 1872 section. */
60bcf0fa 1873 if (hdr->sh_link != elf_onesymtab (abfd) || hdr->sh_info == SHN_UNDEF)
252b5132
RH
1874 return _bfd_elf_make_section_from_shdr (abfd, hdr, name);
1875
1876 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1877 return FALSE;
252b5132
RH
1878 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1879 if (target_sect == NULL)
b34976b6 1880 return FALSE;
252b5132
RH
1881
1882 if ((target_sect->flags & SEC_RELOC) == 0
1883 || target_sect->reloc_count == 0)
1884 hdr2 = &elf_section_data (target_sect)->rel_hdr;
1885 else
1886 {
dc810e39 1887 bfd_size_type amt;
252b5132 1888 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 1889 amt = sizeof (*hdr2);
217aa764 1890 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
1891 elf_section_data (target_sect)->rel_hdr2 = hdr2;
1892 }
1893 *hdr2 = *hdr;
1894 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1895 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1896 target_sect->flags |= SEC_RELOC;
1897 target_sect->relocation = NULL;
1898 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1899 /* In the section to which the relocations apply, mark whether
1900 its relocations are of the REL or RELA variety. */
72730e0c 1901 if (hdr->sh_size != 0)
68bfbfcc 1902 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 1903 abfd->flags |= HAS_RELOC;
b34976b6 1904 return TRUE;
252b5132
RH
1905 }
1906 break;
1907
1908 case SHT_GNU_verdef:
1909 elf_dynverdef (abfd) = shindex;
1910 elf_tdata (abfd)->dynverdef_hdr = *hdr;
1911 return _bfd_elf_make_section_from_shdr (abfd, hdr, name);
1912 break;
1913
1914 case SHT_GNU_versym:
1915 elf_dynversym (abfd) = shindex;
1916 elf_tdata (abfd)->dynversym_hdr = *hdr;
1917 return _bfd_elf_make_section_from_shdr (abfd, hdr, name);
1918 break;
1919
1920 case SHT_GNU_verneed:
1921 elf_dynverref (abfd) = shindex;
1922 elf_tdata (abfd)->dynverref_hdr = *hdr;
1923 return _bfd_elf_make_section_from_shdr (abfd, hdr, name);
1924 break;
1925
1926 case SHT_SHLIB:
b34976b6 1927 return TRUE;
252b5132 1928
dbb410c3 1929 case SHT_GROUP:
b885599b
AM
1930 /* We need a BFD section for objcopy and relocatable linking,
1931 and it's handy to have the signature available as the section
1932 name. */
1933 name = group_signature (abfd, hdr);
1934 if (name == NULL)
b34976b6 1935 return FALSE;
dbb410c3 1936 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name))
b34976b6 1937 return FALSE;
dbb410c3
AM
1938 if (hdr->contents != NULL)
1939 {
1940 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1941 unsigned int n_elt = hdr->sh_size / 4;
1942 asection *s;
1943
b885599b
AM
1944 if (idx->flags & GRP_COMDAT)
1945 hdr->bfd_section->flags
1946 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1947
dbb410c3
AM
1948 while (--n_elt != 0)
1949 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 1950 && elf_next_in_group (s) != NULL)
dbb410c3 1951 {
945906ff 1952 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
1953 break;
1954 }
1955 }
1956 break;
1957
252b5132
RH
1958 default:
1959 /* Check for any processor-specific section types. */
1960 {
1961 if (bed->elf_backend_section_from_shdr)
1962 (*bed->elf_backend_section_from_shdr) (abfd, hdr, name);
1963 }
1964 break;
1965 }
1966
b34976b6 1967 return TRUE;
252b5132
RH
1968}
1969
ec338859
AM
1970/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
1971 Return SEC for sections that have no elf section, and NULL on error. */
1972
1973asection *
217aa764
AM
1974bfd_section_from_r_symndx (bfd *abfd,
1975 struct sym_sec_cache *cache,
1976 asection *sec,
1977 unsigned long r_symndx)
ec338859 1978{
ec338859 1979 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
1980 unsigned char esym[sizeof (Elf64_External_Sym)];
1981 Elf_External_Sym_Shndx eshndx;
1982 Elf_Internal_Sym isym;
ec338859
AM
1983 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
1984
1985 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
1986 return cache->sec[ent];
1987
1988 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
1989 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
1990 &isym, esym, &eshndx) == NULL)
ec338859 1991 return NULL;
9ad5cbcf 1992
ec338859
AM
1993 if (cache->abfd != abfd)
1994 {
1995 memset (cache->indx, -1, sizeof (cache->indx));
1996 cache->abfd = abfd;
1997 }
1998 cache->indx[ent] = r_symndx;
1999 cache->sec[ent] = sec;
50bc7936
AM
2000 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2001 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2002 {
2003 asection *s;
6cdc0ccc 2004 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2005 if (s != NULL)
2006 cache->sec[ent] = s;
2007 }
2008 return cache->sec[ent];
2009}
2010
252b5132
RH
2011/* Given an ELF section number, retrieve the corresponding BFD
2012 section. */
2013
2014asection *
217aa764 2015bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2016{
9ad5cbcf 2017 if (index >= elf_numsections (abfd))
252b5132
RH
2018 return NULL;
2019 return elf_elfsections (abfd)[index]->bfd_section;
2020}
2021
2f89ff8d
L
2022static struct bfd_elf_special_section const special_sections[] =
2023{
7dcb9820
AM
2024 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2025 { ".comment", 8, 0, SHT_PROGBITS, 0 },
2026 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2027 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2028 { ".debug", 6, 0, SHT_PROGBITS, 0 },
2029 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2030 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2031 { ".line", 5, 0, SHT_PROGBITS, 0 },
2032 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2033 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
2034 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2035 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2036 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2037 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2038 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2039 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2040 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2041 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2042 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2043 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2044 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2045 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2046 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
2047 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2048 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2049 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2050 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2051 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2052 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2053 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
2054 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2055 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2056 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
2057 { ".note", 5, -1, SHT_NOTE, 0 },
2058 { ".rela", 5, -1, SHT_RELA, 0 },
2059 { ".rel", 4, -1, SHT_REL, 0 },
2060 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2061 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2062};
2063
2064static const struct bfd_elf_special_section *
2065get_special_section (const char *name,
2066 const struct bfd_elf_special_section *special_sections,
2067 unsigned int rela)
2068{
2069 int i;
7dcb9820 2070 int len = strlen (name);
2f89ff8d
L
2071
2072 for (i = 0; special_sections[i].prefix != NULL; i++)
7dcb9820
AM
2073 {
2074 int suffix_len;
2075 int prefix_len = special_sections[i].prefix_length;
2076
2077 if (len < prefix_len)
2078 continue;
2079 if (memcmp (name, special_sections[i].prefix, prefix_len) != 0)
2080 continue;
2081
2082 suffix_len = special_sections[i].suffix_length;
2083 if (suffix_len <= 0)
2084 {
2085 if (name[prefix_len] != 0)
2086 {
2087 if (suffix_len == 0)
2088 continue;
2089 if (name[prefix_len] != '.'
2090 && (suffix_len == -2
2091 || (rela && special_sections[i].type == SHT_REL)))
2092 continue;
2093 }
2094 }
2095 else
2096 {
2097 if (len < prefix_len + suffix_len)
2098 continue;
2099 if (memcmp (name + len - suffix_len,
2100 special_sections[i].prefix + prefix_len,
2101 suffix_len) != 0)
2102 continue;
2103 }
2f89ff8d 2104 return &special_sections[i];
7dcb9820 2105 }
2f89ff8d
L
2106
2107 return NULL;
2108}
2109
7dcb9820
AM
2110const struct bfd_elf_special_section *
2111_bfd_elf_get_sec_type_attr (bfd *abfd, const char *name)
2f89ff8d 2112{
9c5bfbb7 2113 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7dcb9820 2114 const struct bfd_elf_special_section *ssect = NULL;
2f89ff8d
L
2115
2116 /* See if this is one of the special sections. */
2117 if (name)
2118 {
9c5bfbb7 2119 unsigned int rela = bed->default_use_rela_p;
2f89ff8d
L
2120
2121 if (bed->special_sections)
2122 ssect = get_special_section (name, bed->special_sections, rela);
2123
2124 if (! ssect)
2125 ssect = get_special_section (name, special_sections, rela);
2f89ff8d
L
2126 }
2127
7dcb9820 2128 return ssect;
2f89ff8d
L
2129}
2130
b34976b6 2131bfd_boolean
217aa764 2132_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2133{
2134 struct bfd_elf_section_data *sdata;
7dcb9820 2135 const struct bfd_elf_special_section *ssect;
252b5132 2136
f0abc2a1
AM
2137 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2138 if (sdata == NULL)
2139 {
217aa764 2140 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2141 if (sdata == NULL)
2142 return FALSE;
217aa764 2143 sec->used_by_bfd = sdata;
f0abc2a1 2144 }
bf572ba0 2145
3cddba1e 2146 elf_section_type (sec) = SHT_NULL;
7dcb9820
AM
2147 ssect = _bfd_elf_get_sec_type_attr (abfd, sec->name);
2148 if (ssect != NULL)
2f89ff8d 2149 {
7dcb9820
AM
2150 elf_section_type (sec) = ssect->type;
2151 elf_section_flags (sec) = ssect->attr;
2f89ff8d
L
2152 }
2153
bf572ba0 2154 /* Indicate whether or not this section should use RELA relocations. */
68bfbfcc 2155 sec->use_rela_p = get_elf_backend_data (abfd)->default_use_rela_p;
bf572ba0 2156
b34976b6 2157 return TRUE;
252b5132
RH
2158}
2159
2160/* Create a new bfd section from an ELF program header.
2161
2162 Since program segments have no names, we generate a synthetic name
2163 of the form segment<NUM>, where NUM is generally the index in the
2164 program header table. For segments that are split (see below) we
2165 generate the names segment<NUM>a and segment<NUM>b.
2166
2167 Note that some program segments may have a file size that is different than
2168 (less than) the memory size. All this means is that at execution the
2169 system must allocate the amount of memory specified by the memory size,
2170 but only initialize it with the first "file size" bytes read from the
2171 file. This would occur for example, with program segments consisting
2172 of combined data+bss.
2173
2174 To handle the above situation, this routine generates TWO bfd sections
2175 for the single program segment. The first has the length specified by
2176 the file size of the segment, and the second has the length specified
2177 by the difference between the two sizes. In effect, the segment is split
2178 into it's initialized and uninitialized parts.
2179
2180 */
2181
b34976b6 2182bfd_boolean
217aa764
AM
2183_bfd_elf_make_section_from_phdr (bfd *abfd,
2184 Elf_Internal_Phdr *hdr,
2185 int index,
2186 const char *typename)
252b5132
RH
2187{
2188 asection *newsect;
2189 char *name;
2190 char namebuf[64];
d4c88bbb 2191 size_t len;
252b5132
RH
2192 int split;
2193
2194 split = ((hdr->p_memsz > 0)
2195 && (hdr->p_filesz > 0)
2196 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2197 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2198 len = strlen (namebuf) + 1;
217aa764 2199 name = bfd_alloc (abfd, len);
252b5132 2200 if (!name)
b34976b6 2201 return FALSE;
d4c88bbb 2202 memcpy (name, namebuf, len);
252b5132
RH
2203 newsect = bfd_make_section (abfd, name);
2204 if (newsect == NULL)
b34976b6 2205 return FALSE;
252b5132
RH
2206 newsect->vma = hdr->p_vaddr;
2207 newsect->lma = hdr->p_paddr;
2208 newsect->_raw_size = hdr->p_filesz;
2209 newsect->filepos = hdr->p_offset;
2210 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2211 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2212 if (hdr->p_type == PT_LOAD)
2213 {
2214 newsect->flags |= SEC_ALLOC;
2215 newsect->flags |= SEC_LOAD;
2216 if (hdr->p_flags & PF_X)
2217 {
2218 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2219 may be data. */
252b5132
RH
2220 newsect->flags |= SEC_CODE;
2221 }
2222 }
2223 if (!(hdr->p_flags & PF_W))
2224 {
2225 newsect->flags |= SEC_READONLY;
2226 }
2227
2228 if (split)
2229 {
27ac83bf 2230 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2231 len = strlen (namebuf) + 1;
217aa764 2232 name = bfd_alloc (abfd, len);
252b5132 2233 if (!name)
b34976b6 2234 return FALSE;
d4c88bbb 2235 memcpy (name, namebuf, len);
252b5132
RH
2236 newsect = bfd_make_section (abfd, name);
2237 if (newsect == NULL)
b34976b6 2238 return FALSE;
252b5132
RH
2239 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2240 newsect->lma = hdr->p_paddr + hdr->p_filesz;
2241 newsect->_raw_size = hdr->p_memsz - hdr->p_filesz;
2242 if (hdr->p_type == PT_LOAD)
2243 {
2244 newsect->flags |= SEC_ALLOC;
2245 if (hdr->p_flags & PF_X)
2246 newsect->flags |= SEC_CODE;
2247 }
2248 if (!(hdr->p_flags & PF_W))
2249 newsect->flags |= SEC_READONLY;
2250 }
2251
b34976b6 2252 return TRUE;
252b5132
RH
2253}
2254
b34976b6 2255bfd_boolean
217aa764 2256bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2257{
9c5bfbb7 2258 const struct elf_backend_data *bed;
20cfcaae
NC
2259
2260 switch (hdr->p_type)
2261 {
2262 case PT_NULL:
2263 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2264
2265 case PT_LOAD:
2266 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2267
2268 case PT_DYNAMIC:
2269 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2270
2271 case PT_INTERP:
2272 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2273
2274 case PT_NOTE:
2275 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2276 return FALSE;
217aa764 2277 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2278 return FALSE;
2279 return TRUE;
20cfcaae
NC
2280
2281 case PT_SHLIB:
2282 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2283
2284 case PT_PHDR:
2285 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2286
811072d8
RM
2287 case PT_GNU_EH_FRAME:
2288 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2289 "eh_frame_hdr");
2290
9ee5e499
JJ
2291 case PT_GNU_STACK:
2292 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2293
20cfcaae
NC
2294 default:
2295 /* Check for any processor-specific program segment types.
c044fabd 2296 If no handler for them, default to making "segment" sections. */
20cfcaae
NC
2297 bed = get_elf_backend_data (abfd);
2298 if (bed->elf_backend_section_from_phdr)
2299 return (*bed->elf_backend_section_from_phdr) (abfd, hdr, index);
2300 else
2301 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "segment");
2302 }
2303}
2304
23bc299b 2305/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2306 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2307 relocations; otherwise, we use REL relocations. */
2308
b34976b6 2309bfd_boolean
217aa764
AM
2310_bfd_elf_init_reloc_shdr (bfd *abfd,
2311 Elf_Internal_Shdr *rel_hdr,
2312 asection *asect,
2313 bfd_boolean use_rela_p)
23bc299b
MM
2314{
2315 char *name;
9c5bfbb7 2316 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2317 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2318
dc810e39 2319 name = bfd_alloc (abfd, amt);
23bc299b 2320 if (name == NULL)
b34976b6 2321 return FALSE;
23bc299b
MM
2322 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2323 rel_hdr->sh_name =
2b0f7ef9 2324 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2325 FALSE);
23bc299b 2326 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2327 return FALSE;
23bc299b
MM
2328 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2329 rel_hdr->sh_entsize = (use_rela_p
2330 ? bed->s->sizeof_rela
2331 : bed->s->sizeof_rel);
45d6a902 2332 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2333 rel_hdr->sh_flags = 0;
2334 rel_hdr->sh_addr = 0;
2335 rel_hdr->sh_size = 0;
2336 rel_hdr->sh_offset = 0;
2337
b34976b6 2338 return TRUE;
23bc299b
MM
2339}
2340
252b5132
RH
2341/* Set up an ELF internal section header for a section. */
2342
252b5132 2343static void
217aa764 2344elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2345{
9c5bfbb7 2346 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2347 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2348 Elf_Internal_Shdr *this_hdr;
2349
2350 if (*failedptr)
2351 {
2352 /* We already failed; just get out of the bfd_map_over_sections
2353 loop. */
2354 return;
2355 }
2356
2357 this_hdr = &elf_section_data (asect)->this_hdr;
2358
e57b5356
AM
2359 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2360 asect->name, FALSE);
2361 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2362 {
b34976b6 2363 *failedptr = TRUE;
252b5132
RH
2364 return;
2365 }
2366
2367 this_hdr->sh_flags = 0;
2368
2369 if ((asect->flags & SEC_ALLOC) != 0
2370 || asect->user_set_vma)
2371 this_hdr->sh_addr = asect->vma;
2372 else
2373 this_hdr->sh_addr = 0;
2374
2375 this_hdr->sh_offset = 0;
2376 this_hdr->sh_size = asect->_raw_size;
2377 this_hdr->sh_link = 0;
2378 this_hdr->sh_addralign = 1 << asect->alignment_power;
2379 /* The sh_entsize and sh_info fields may have been set already by
2380 copy_private_section_data. */
2381
2382 this_hdr->bfd_section = asect;
2383 this_hdr->contents = NULL;
2384
3cddba1e
L
2385 /* If the section type is unspecified, we set it based on
2386 asect->flags. */
2387 if (this_hdr->sh_type == SHT_NULL)
2388 {
2389 if ((asect->flags & SEC_ALLOC) != 0
2390 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2391 || (asect->flags & SEC_NEVER_LOAD) != 0))
2392 this_hdr->sh_type = SHT_NOBITS;
2393 else
2394 this_hdr->sh_type = SHT_PROGBITS;
2395 }
2396
2f89ff8d 2397 switch (this_hdr->sh_type)
252b5132 2398 {
2f89ff8d 2399 default:
2f89ff8d
L
2400 break;
2401
2402 case SHT_STRTAB:
2403 case SHT_INIT_ARRAY:
2404 case SHT_FINI_ARRAY:
2405 case SHT_PREINIT_ARRAY:
2406 case SHT_NOTE:
2407 case SHT_NOBITS:
2408 case SHT_PROGBITS:
2409 break;
2410
2411 case SHT_HASH:
c7ac6ff8 2412 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2413 break;
5de3bf90 2414
2f89ff8d 2415 case SHT_DYNSYM:
252b5132 2416 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2417 break;
2418
2419 case SHT_DYNAMIC:
252b5132 2420 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2421 break;
2422
2423 case SHT_RELA:
2424 if (get_elf_backend_data (abfd)->may_use_rela_p)
2425 this_hdr->sh_entsize = bed->s->sizeof_rela;
2426 break;
2427
2428 case SHT_REL:
2429 if (get_elf_backend_data (abfd)->may_use_rel_p)
2430 this_hdr->sh_entsize = bed->s->sizeof_rel;
2431 break;
2432
2433 case SHT_GNU_versym:
252b5132 2434 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2435 break;
2436
2437 case SHT_GNU_verdef:
252b5132
RH
2438 this_hdr->sh_entsize = 0;
2439 /* objcopy or strip will copy over sh_info, but may not set
2440 cverdefs. The linker will set cverdefs, but sh_info will be
2441 zero. */
2442 if (this_hdr->sh_info == 0)
2443 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2444 else
2445 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2446 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2447 break;
2448
2449 case SHT_GNU_verneed:
252b5132
RH
2450 this_hdr->sh_entsize = 0;
2451 /* objcopy or strip will copy over sh_info, but may not set
2452 cverrefs. The linker will set cverrefs, but sh_info will be
2453 zero. */
2454 if (this_hdr->sh_info == 0)
2455 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2456 else
2457 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2458 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2459 break;
2460
2461 case SHT_GROUP:
dbb410c3 2462 this_hdr->sh_entsize = 4;
2f89ff8d 2463 break;
dbb410c3 2464 }
252b5132
RH
2465
2466 if ((asect->flags & SEC_ALLOC) != 0)
2467 this_hdr->sh_flags |= SHF_ALLOC;
2468 if ((asect->flags & SEC_READONLY) == 0)
2469 this_hdr->sh_flags |= SHF_WRITE;
2470 if ((asect->flags & SEC_CODE) != 0)
2471 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2472 if ((asect->flags & SEC_MERGE) != 0)
2473 {
2474 this_hdr->sh_flags |= SHF_MERGE;
2475 this_hdr->sh_entsize = asect->entsize;
2476 if ((asect->flags & SEC_STRINGS) != 0)
2477 this_hdr->sh_flags |= SHF_STRINGS;
2478 }
1126897b 2479 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2480 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2481 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2482 {
2483 this_hdr->sh_flags |= SHF_TLS;
2484 if (asect->_raw_size == 0 && (asect->flags & SEC_HAS_CONTENTS) == 0)
2485 {
2486 struct bfd_link_order *o;
b34976b6 2487
704afa60
JJ
2488 this_hdr->sh_size = 0;
2489 for (o = asect->link_order_head; o != NULL; o = o->next)
2490 if (this_hdr->sh_size < o->offset + o->size)
2491 this_hdr->sh_size = o->offset + o->size;
2492 if (this_hdr->sh_size)
2493 this_hdr->sh_type = SHT_NOBITS;
2494 }
2495 }
252b5132
RH
2496
2497 /* Check for processor-specific section types. */
e1fddb6b
AO
2498 if (bed->elf_backend_fake_sections
2499 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2500 *failedptr = TRUE;
252b5132
RH
2501
2502 /* If the section has relocs, set up a section header for the
23bc299b
MM
2503 SHT_REL[A] section. If two relocation sections are required for
2504 this section, it is up to the processor-specific back-end to
c044fabd 2505 create the other. */
23bc299b 2506 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2507 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2508 &elf_section_data (asect)->rel_hdr,
c044fabd 2509 asect,
68bfbfcc 2510 asect->use_rela_p))
b34976b6 2511 *failedptr = TRUE;
252b5132
RH
2512}
2513
dbb410c3
AM
2514/* Fill in the contents of a SHT_GROUP section. */
2515
1126897b 2516void
217aa764 2517bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2518{
217aa764 2519 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2520 unsigned long symindx;
9dce4196 2521 asection *elt, *first;
dbb410c3
AM
2522 unsigned char *loc;
2523 struct bfd_link_order *l;
b34976b6 2524 bfd_boolean gas;
dbb410c3
AM
2525
2526 if (elf_section_data (sec)->this_hdr.sh_type != SHT_GROUP
2527 || *failedptr)
2528 return;
2529
1126897b
AM
2530 symindx = 0;
2531 if (elf_group_id (sec) != NULL)
2532 symindx = elf_group_id (sec)->udata.i;
2533
2534 if (symindx == 0)
2535 {
2536 /* If called from the assembler, swap_out_syms will have set up
2537 elf_section_syms; If called for "ld -r", use target_index. */
2538 if (elf_section_syms (abfd) != NULL)
2539 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2540 else
2541 symindx = sec->target_index;
2542 }
dbb410c3
AM
2543 elf_section_data (sec)->this_hdr.sh_info = symindx;
2544
1126897b 2545 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2546 gas = TRUE;
dbb410c3
AM
2547 if (sec->contents == NULL)
2548 {
b34976b6 2549 gas = FALSE;
dbb410c3 2550 sec->contents = bfd_alloc (abfd, sec->_raw_size);
9dce4196
AM
2551
2552 /* Arrange for the section to be written out. */
2553 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2554 if (sec->contents == NULL)
2555 {
b34976b6 2556 *failedptr = TRUE;
dbb410c3
AM
2557 return;
2558 }
2559 }
2560
2561 loc = sec->contents + sec->_raw_size;
2562
9dce4196
AM
2563 /* Get the pointer to the first section in the group that gas
2564 squirreled away here. objcopy arranges for this to be set to the
2565 start of the input section group. */
2566 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2567
2568 /* First element is a flag word. Rest of section is elf section
2569 indices for all the sections of the group. Write them backwards
2570 just to keep the group in the same order as given in .section
2571 directives, not that it matters. */
2572 while (elt != NULL)
2573 {
9dce4196
AM
2574 asection *s;
2575 unsigned int idx;
2576
dbb410c3 2577 loc -= 4;
9dce4196
AM
2578 s = elt;
2579 if (!gas)
2580 s = s->output_section;
2581 idx = 0;
2582 if (s != NULL)
2583 idx = elf_section_data (s)->this_idx;
2584 H_PUT_32 (abfd, idx, loc);
945906ff 2585 elt = elf_next_in_group (elt);
9dce4196
AM
2586 if (elt == first)
2587 break;
dbb410c3
AM
2588 }
2589
2590 /* If this is a relocatable link, then the above did nothing because
2591 SEC is the output section. Look through the input sections
2592 instead. */
2593 for (l = sec->link_order_head; l != NULL; l = l->next)
2594 if (l->type == bfd_indirect_link_order
945906ff 2595 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
dbb410c3
AM
2596 do
2597 {
2598 loc -= 4;
2599 H_PUT_32 (abfd,
2600 elf_section_data (elt->output_section)->this_idx, loc);
945906ff 2601 elt = elf_next_in_group (elt);
dbb410c3
AM
2602 /* During a relocatable link, the lists are circular. */
2603 }
945906ff 2604 while (elt != elf_next_in_group (l->u.indirect.section));
dbb410c3 2605
9dce4196
AM
2606 /* With ld -r, merging SHT_GROUP sections results in wasted space
2607 due to allowing for the flag word on each input. We may well
2608 duplicate entries too. */
2609 while ((loc -= 4) > sec->contents)
2610 H_PUT_32 (abfd, 0, loc);
2611
2612 if (loc != sec->contents)
2613 abort ();
dbb410c3 2614
9dce4196 2615 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2616}
2617
252b5132
RH
2618/* Assign all ELF section numbers. The dummy first section is handled here
2619 too. The link/info pointers for the standard section types are filled
2620 in here too, while we're at it. */
2621
b34976b6 2622static bfd_boolean
217aa764 2623assign_section_numbers (bfd *abfd)
252b5132
RH
2624{
2625 struct elf_obj_tdata *t = elf_tdata (abfd);
2626 asection *sec;
2b0f7ef9 2627 unsigned int section_number, secn;
252b5132 2628 Elf_Internal_Shdr **i_shdrp;
dc810e39 2629 bfd_size_type amt;
252b5132
RH
2630
2631 section_number = 1;
2632
2b0f7ef9
JJ
2633 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2634
252b5132
RH
2635 for (sec = abfd->sections; sec; sec = sec->next)
2636 {
2637 struct bfd_elf_section_data *d = elf_section_data (sec);
2638
9ad5cbcf
AM
2639 if (section_number == SHN_LORESERVE)
2640 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2641 d->this_idx = section_number++;
2b0f7ef9 2642 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2643 if ((sec->flags & SEC_RELOC) == 0)
2644 d->rel_idx = 0;
2645 else
2b0f7ef9 2646 {
9ad5cbcf
AM
2647 if (section_number == SHN_LORESERVE)
2648 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2649 d->rel_idx = section_number++;
2650 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2651 }
23bc299b
MM
2652
2653 if (d->rel_hdr2)
2b0f7ef9 2654 {
9ad5cbcf
AM
2655 if (section_number == SHN_LORESERVE)
2656 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2657 d->rel_idx2 = section_number++;
2658 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2659 }
23bc299b
MM
2660 else
2661 d->rel_idx2 = 0;
252b5132
RH
2662 }
2663
9ad5cbcf
AM
2664 if (section_number == SHN_LORESERVE)
2665 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2666 t->shstrtab_section = section_number++;
2b0f7ef9 2667 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2668 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2669
2670 if (bfd_get_symcount (abfd) > 0)
2671 {
9ad5cbcf
AM
2672 if (section_number == SHN_LORESERVE)
2673 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2674 t->symtab_section = section_number++;
2b0f7ef9 2675 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2676 if (section_number > SHN_LORESERVE - 2)
2677 {
2678 if (section_number == SHN_LORESERVE)
2679 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2680 t->symtab_shndx_section = section_number++;
2681 t->symtab_shndx_hdr.sh_name
2682 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2683 ".symtab_shndx", FALSE);
9ad5cbcf 2684 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2685 return FALSE;
9ad5cbcf
AM
2686 }
2687 if (section_number == SHN_LORESERVE)
2688 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2689 t->strtab_section = section_number++;
2b0f7ef9 2690 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2691 }
2692
2b0f7ef9
JJ
2693 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2694 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2695
2696 elf_numsections (abfd) = section_number;
252b5132 2697 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
2698 if (section_number > SHN_LORESERVE)
2699 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
2700
2701 /* Set up the list of section header pointers, in agreement with the
2702 indices. */
dc810e39 2703 amt = section_number * sizeof (Elf_Internal_Shdr *);
217aa764 2704 i_shdrp = bfd_zalloc (abfd, amt);
252b5132 2705 if (i_shdrp == NULL)
b34976b6 2706 return FALSE;
252b5132 2707
dc810e39 2708 amt = sizeof (Elf_Internal_Shdr);
217aa764 2709 i_shdrp[0] = bfd_zalloc (abfd, amt);
252b5132
RH
2710 if (i_shdrp[0] == NULL)
2711 {
2712 bfd_release (abfd, i_shdrp);
b34976b6 2713 return FALSE;
252b5132 2714 }
252b5132
RH
2715
2716 elf_elfsections (abfd) = i_shdrp;
2717
2718 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
2719 if (bfd_get_symcount (abfd) > 0)
2720 {
2721 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
2722 if (elf_numsections (abfd) > SHN_LORESERVE)
2723 {
2724 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2725 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2726 }
252b5132
RH
2727 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2728 t->symtab_hdr.sh_link = t->strtab_section;
2729 }
2730 for (sec = abfd->sections; sec; sec = sec->next)
2731 {
2732 struct bfd_elf_section_data *d = elf_section_data (sec);
2733 asection *s;
2734 const char *name;
2735
2736 i_shdrp[d->this_idx] = &d->this_hdr;
2737 if (d->rel_idx != 0)
2738 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
2739 if (d->rel_idx2 != 0)
2740 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
2741
2742 /* Fill in the sh_link and sh_info fields while we're at it. */
2743
2744 /* sh_link of a reloc section is the section index of the symbol
2745 table. sh_info is the section index of the section to which
2746 the relocation entries apply. */
2747 if (d->rel_idx != 0)
2748 {
2749 d->rel_hdr.sh_link = t->symtab_section;
2750 d->rel_hdr.sh_info = d->this_idx;
2751 }
23bc299b
MM
2752 if (d->rel_idx2 != 0)
2753 {
2754 d->rel_hdr2->sh_link = t->symtab_section;
2755 d->rel_hdr2->sh_info = d->this_idx;
2756 }
252b5132
RH
2757
2758 switch (d->this_hdr.sh_type)
2759 {
2760 case SHT_REL:
2761 case SHT_RELA:
2762 /* A reloc section which we are treating as a normal BFD
2763 section. sh_link is the section index of the symbol
2764 table. sh_info is the section index of the section to
2765 which the relocation entries apply. We assume that an
2766 allocated reloc section uses the dynamic symbol table.
2767 FIXME: How can we be sure? */
2768 s = bfd_get_section_by_name (abfd, ".dynsym");
2769 if (s != NULL)
2770 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2771
2772 /* We look up the section the relocs apply to by name. */
2773 name = sec->name;
2774 if (d->this_hdr.sh_type == SHT_REL)
2775 name += 4;
2776 else
2777 name += 5;
2778 s = bfd_get_section_by_name (abfd, name);
2779 if (s != NULL)
2780 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
2781 break;
2782
2783 case SHT_STRTAB:
2784 /* We assume that a section named .stab*str is a stabs
2785 string section. We look for a section with the same name
2786 but without the trailing ``str'', and set its sh_link
2787 field to point to this section. */
2788 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
2789 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
2790 {
2791 size_t len;
2792 char *alc;
2793
2794 len = strlen (sec->name);
217aa764 2795 alc = bfd_malloc (len - 2);
252b5132 2796 if (alc == NULL)
b34976b6 2797 return FALSE;
d4c88bbb 2798 memcpy (alc, sec->name, len - 3);
252b5132
RH
2799 alc[len - 3] = '\0';
2800 s = bfd_get_section_by_name (abfd, alc);
2801 free (alc);
2802 if (s != NULL)
2803 {
2804 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
2805
2806 /* This is a .stab section. */
0594c12d
AM
2807 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
2808 elf_section_data (s)->this_hdr.sh_entsize
2809 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
2810 }
2811 }
2812 break;
2813
2814 case SHT_DYNAMIC:
2815 case SHT_DYNSYM:
2816 case SHT_GNU_verneed:
2817 case SHT_GNU_verdef:
2818 /* sh_link is the section header index of the string table
2819 used for the dynamic entries, or the symbol table, or the
2820 version strings. */
2821 s = bfd_get_section_by_name (abfd, ".dynstr");
2822 if (s != NULL)
2823 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2824 break;
2825
2826 case SHT_HASH:
2827 case SHT_GNU_versym:
2828 /* sh_link is the section header index of the symbol table
2829 this hash table or version table is for. */
2830 s = bfd_get_section_by_name (abfd, ".dynsym");
2831 if (s != NULL)
2832 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2833 break;
dbb410c3
AM
2834
2835 case SHT_GROUP:
2836 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
2837 }
2838 }
2839
2b0f7ef9 2840 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
2841 if (i_shdrp[secn] == NULL)
2842 i_shdrp[secn] = i_shdrp[0];
2843 else
2844 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
2845 i_shdrp[secn]->sh_name);
b34976b6 2846 return TRUE;
252b5132
RH
2847}
2848
2849/* Map symbol from it's internal number to the external number, moving
2850 all local symbols to be at the head of the list. */
2851
268b6b39 2852static int
217aa764 2853sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
2854{
2855 /* If the backend has a special mapping, use it. */
9c5bfbb7 2856 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
2857 if (bed->elf_backend_sym_is_global)
2858 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
2859
2860 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
2861 || bfd_is_und_section (bfd_get_section (sym))
2862 || bfd_is_com_section (bfd_get_section (sym)));
2863}
2864
b34976b6 2865static bfd_boolean
217aa764 2866elf_map_symbols (bfd *abfd)
252b5132 2867{
dc810e39 2868 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
2869 asymbol **syms = bfd_get_outsymbols (abfd);
2870 asymbol **sect_syms;
dc810e39
AM
2871 unsigned int num_locals = 0;
2872 unsigned int num_globals = 0;
2873 unsigned int num_locals2 = 0;
2874 unsigned int num_globals2 = 0;
252b5132 2875 int max_index = 0;
dc810e39 2876 unsigned int idx;
252b5132
RH
2877 asection *asect;
2878 asymbol **new_syms;
dc810e39 2879 bfd_size_type amt;
252b5132
RH
2880
2881#ifdef DEBUG
2882 fprintf (stderr, "elf_map_symbols\n");
2883 fflush (stderr);
2884#endif
2885
252b5132
RH
2886 for (asect = abfd->sections; asect; asect = asect->next)
2887 {
2888 if (max_index < asect->index)
2889 max_index = asect->index;
2890 }
2891
2892 max_index++;
dc810e39 2893 amt = max_index * sizeof (asymbol *);
217aa764 2894 sect_syms = bfd_zalloc (abfd, amt);
252b5132 2895 if (sect_syms == NULL)
b34976b6 2896 return FALSE;
252b5132 2897 elf_section_syms (abfd) = sect_syms;
4e89ac30 2898 elf_num_section_syms (abfd) = max_index;
252b5132 2899
079e9a2f
AM
2900 /* Init sect_syms entries for any section symbols we have already
2901 decided to output. */
252b5132
RH
2902 for (idx = 0; idx < symcount; idx++)
2903 {
dc810e39 2904 asymbol *sym = syms[idx];
c044fabd 2905
252b5132
RH
2906 if ((sym->flags & BSF_SECTION_SYM) != 0
2907 && sym->value == 0)
2908 {
2909 asection *sec;
2910
2911 sec = sym->section;
2912
2913 if (sec->owner != NULL)
2914 {
2915 if (sec->owner != abfd)
2916 {
2917 if (sec->output_offset != 0)
2918 continue;
c044fabd 2919
252b5132
RH
2920 sec = sec->output_section;
2921
079e9a2f
AM
2922 /* Empty sections in the input files may have had a
2923 section symbol created for them. (See the comment
2924 near the end of _bfd_generic_link_output_symbols in
2925 linker.c). If the linker script discards such
2926 sections then we will reach this point. Since we know
2927 that we cannot avoid this case, we detect it and skip
2928 the abort and the assignment to the sect_syms array.
2929 To reproduce this particular case try running the
2930 linker testsuite test ld-scripts/weak.exp for an ELF
2931 port that uses the generic linker. */
252b5132
RH
2932 if (sec->owner == NULL)
2933 continue;
2934
2935 BFD_ASSERT (sec->owner == abfd);
2936 }
2937 sect_syms[sec->index] = syms[idx];
2938 }
2939 }
2940 }
2941
252b5132
RH
2942 /* Classify all of the symbols. */
2943 for (idx = 0; idx < symcount; idx++)
2944 {
2945 if (!sym_is_global (abfd, syms[idx]))
2946 num_locals++;
2947 else
2948 num_globals++;
2949 }
079e9a2f
AM
2950
2951 /* We will be adding a section symbol for each BFD section. Most normal
2952 sections will already have a section symbol in outsymbols, but
2953 eg. SHT_GROUP sections will not, and we need the section symbol mapped
2954 at least in that case. */
252b5132
RH
2955 for (asect = abfd->sections; asect; asect = asect->next)
2956 {
079e9a2f 2957 if (sect_syms[asect->index] == NULL)
252b5132 2958 {
079e9a2f 2959 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
2960 num_locals++;
2961 else
2962 num_globals++;
252b5132
RH
2963 }
2964 }
2965
2966 /* Now sort the symbols so the local symbols are first. */
dc810e39 2967 amt = (num_locals + num_globals) * sizeof (asymbol *);
217aa764 2968 new_syms = bfd_alloc (abfd, amt);
dc810e39 2969
252b5132 2970 if (new_syms == NULL)
b34976b6 2971 return FALSE;
252b5132
RH
2972
2973 for (idx = 0; idx < symcount; idx++)
2974 {
2975 asymbol *sym = syms[idx];
dc810e39 2976 unsigned int i;
252b5132
RH
2977
2978 if (!sym_is_global (abfd, sym))
2979 i = num_locals2++;
2980 else
2981 i = num_locals + num_globals2++;
2982 new_syms[i] = sym;
2983 sym->udata.i = i + 1;
2984 }
2985 for (asect = abfd->sections; asect; asect = asect->next)
2986 {
079e9a2f 2987 if (sect_syms[asect->index] == NULL)
252b5132 2988 {
079e9a2f 2989 asymbol *sym = asect->symbol;
dc810e39 2990 unsigned int i;
252b5132 2991
079e9a2f 2992 sect_syms[asect->index] = sym;
252b5132
RH
2993 if (!sym_is_global (abfd, sym))
2994 i = num_locals2++;
2995 else
2996 i = num_locals + num_globals2++;
2997 new_syms[i] = sym;
2998 sym->udata.i = i + 1;
2999 }
3000 }
3001
3002 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3003
3004 elf_num_locals (abfd) = num_locals;
3005 elf_num_globals (abfd) = num_globals;
b34976b6 3006 return TRUE;
252b5132
RH
3007}
3008
3009/* Align to the maximum file alignment that could be required for any
3010 ELF data structure. */
3011
268b6b39 3012static inline file_ptr
217aa764 3013align_file_position (file_ptr off, int align)
252b5132
RH
3014{
3015 return (off + align - 1) & ~(align - 1);
3016}
3017
3018/* Assign a file position to a section, optionally aligning to the
3019 required section alignment. */
3020
217aa764
AM
3021file_ptr
3022_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3023 file_ptr offset,
3024 bfd_boolean align)
252b5132
RH
3025{
3026 if (align)
3027 {
3028 unsigned int al;
3029
3030 al = i_shdrp->sh_addralign;
3031 if (al > 1)
3032 offset = BFD_ALIGN (offset, al);
3033 }
3034 i_shdrp->sh_offset = offset;
3035 if (i_shdrp->bfd_section != NULL)
3036 i_shdrp->bfd_section->filepos = offset;
3037 if (i_shdrp->sh_type != SHT_NOBITS)
3038 offset += i_shdrp->sh_size;
3039 return offset;
3040}
3041
3042/* Compute the file positions we are going to put the sections at, and
3043 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3044 is not NULL, this is being called by the ELF backend linker. */
3045
b34976b6 3046bfd_boolean
217aa764
AM
3047_bfd_elf_compute_section_file_positions (bfd *abfd,
3048 struct bfd_link_info *link_info)
252b5132 3049{
9c5bfbb7 3050 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3051 bfd_boolean failed;
252b5132
RH
3052 struct bfd_strtab_hash *strtab;
3053 Elf_Internal_Shdr *shstrtab_hdr;
3054
3055 if (abfd->output_has_begun)
b34976b6 3056 return TRUE;
252b5132
RH
3057
3058 /* Do any elf backend specific processing first. */
3059 if (bed->elf_backend_begin_write_processing)
3060 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3061
3062 if (! prep_headers (abfd))
b34976b6 3063 return FALSE;
252b5132 3064
e6c51ed4
NC
3065 /* Post process the headers if necessary. */
3066 if (bed->elf_backend_post_process_headers)
3067 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3068
b34976b6 3069 failed = FALSE;
252b5132
RH
3070 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3071 if (failed)
b34976b6 3072 return FALSE;
252b5132
RH
3073
3074 if (!assign_section_numbers (abfd))
b34976b6 3075 return FALSE;
252b5132
RH
3076
3077 /* The backend linker builds symbol table information itself. */
3078 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3079 {
3080 /* Non-zero if doing a relocatable link. */
3081 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3082
3083 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3084 return FALSE;
252b5132
RH
3085 }
3086
1126897b 3087 if (link_info == NULL)
dbb410c3 3088 {
1126897b 3089 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3090 if (failed)
b34976b6 3091 return FALSE;
dbb410c3
AM
3092 }
3093
252b5132
RH
3094 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3095 /* sh_name was set in prep_headers. */
3096 shstrtab_hdr->sh_type = SHT_STRTAB;
3097 shstrtab_hdr->sh_flags = 0;
3098 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3099 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3100 shstrtab_hdr->sh_entsize = 0;
3101 shstrtab_hdr->sh_link = 0;
3102 shstrtab_hdr->sh_info = 0;
3103 /* sh_offset is set in assign_file_positions_except_relocs. */
3104 shstrtab_hdr->sh_addralign = 1;
3105
3106 if (!assign_file_positions_except_relocs (abfd))
b34976b6 3107 return FALSE;
252b5132
RH
3108
3109 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3110 {
3111 file_ptr off;
3112 Elf_Internal_Shdr *hdr;
3113
3114 off = elf_tdata (abfd)->next_file_pos;
3115
3116 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3117 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3118
9ad5cbcf
AM
3119 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3120 if (hdr->sh_size != 0)
b34976b6 3121 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3122
252b5132 3123 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3124 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3125
3126 elf_tdata (abfd)->next_file_pos = off;
3127
3128 /* Now that we know where the .strtab section goes, write it
3129 out. */
3130 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3131 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3132 return FALSE;
252b5132
RH
3133 _bfd_stringtab_free (strtab);
3134 }
3135
b34976b6 3136 abfd->output_has_begun = TRUE;
252b5132 3137
b34976b6 3138 return TRUE;
252b5132
RH
3139}
3140
3141/* Create a mapping from a set of sections to a program segment. */
3142
217aa764
AM
3143static struct elf_segment_map *
3144make_mapping (bfd *abfd,
3145 asection **sections,
3146 unsigned int from,
3147 unsigned int to,
3148 bfd_boolean phdr)
252b5132
RH
3149{
3150 struct elf_segment_map *m;
3151 unsigned int i;
3152 asection **hdrpp;
dc810e39 3153 bfd_size_type amt;
252b5132 3154
dc810e39
AM
3155 amt = sizeof (struct elf_segment_map);
3156 amt += (to - from - 1) * sizeof (asection *);
217aa764 3157 m = bfd_zalloc (abfd, amt);
252b5132
RH
3158 if (m == NULL)
3159 return NULL;
3160 m->next = NULL;
3161 m->p_type = PT_LOAD;
3162 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3163 m->sections[i - from] = *hdrpp;
3164 m->count = to - from;
3165
3166 if (from == 0 && phdr)
3167 {
3168 /* Include the headers in the first PT_LOAD segment. */
3169 m->includes_filehdr = 1;
3170 m->includes_phdrs = 1;
3171 }
3172
3173 return m;
3174}
3175
3176/* Set up a mapping from BFD sections to program segments. */
3177
b34976b6 3178static bfd_boolean
217aa764 3179map_sections_to_segments (bfd *abfd)
252b5132
RH
3180{
3181 asection **sections = NULL;
3182 asection *s;
3183 unsigned int i;
3184 unsigned int count;
3185 struct elf_segment_map *mfirst;
3186 struct elf_segment_map **pm;
3187 struct elf_segment_map *m;
3188 asection *last_hdr;
3189 unsigned int phdr_index;
3190 bfd_vma maxpagesize;
3191 asection **hdrpp;
b34976b6
AM
3192 bfd_boolean phdr_in_segment = TRUE;
3193 bfd_boolean writable;
13ae64f3
JJ
3194 int tls_count = 0;
3195 asection *first_tls = NULL;
65765700 3196 asection *dynsec, *eh_frame_hdr;
dc810e39 3197 bfd_size_type amt;
252b5132
RH
3198
3199 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3200 return TRUE;
252b5132
RH
3201
3202 if (bfd_count_sections (abfd) == 0)
b34976b6 3203 return TRUE;
252b5132
RH
3204
3205 /* Select the allocated sections, and sort them. */
3206
dc810e39 3207 amt = bfd_count_sections (abfd) * sizeof (asection *);
217aa764 3208 sections = bfd_malloc (amt);
252b5132
RH
3209 if (sections == NULL)
3210 goto error_return;
3211
3212 i = 0;
3213 for (s = abfd->sections; s != NULL; s = s->next)
3214 {
3215 if ((s->flags & SEC_ALLOC) != 0)
3216 {
3217 sections[i] = s;
3218 ++i;
3219 }
3220 }
3221 BFD_ASSERT (i <= bfd_count_sections (abfd));
3222 count = i;
3223
3224 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3225
3226 /* Build the mapping. */
3227
3228 mfirst = NULL;
3229 pm = &mfirst;
3230
3231 /* If we have a .interp section, then create a PT_PHDR segment for
3232 the program headers and a PT_INTERP segment for the .interp
3233 section. */
3234 s = bfd_get_section_by_name (abfd, ".interp");
3235 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3236 {
dc810e39 3237 amt = sizeof (struct elf_segment_map);
217aa764 3238 m = bfd_zalloc (abfd, amt);
252b5132
RH
3239 if (m == NULL)
3240 goto error_return;
3241 m->next = NULL;
3242 m->p_type = PT_PHDR;
3243 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3244 m->p_flags = PF_R | PF_X;
3245 m->p_flags_valid = 1;
3246 m->includes_phdrs = 1;
3247
3248 *pm = m;
3249 pm = &m->next;
3250
dc810e39 3251 amt = sizeof (struct elf_segment_map);
217aa764 3252 m = bfd_zalloc (abfd, amt);
252b5132
RH
3253 if (m == NULL)
3254 goto error_return;
3255 m->next = NULL;
3256 m->p_type = PT_INTERP;
3257 m->count = 1;
3258 m->sections[0] = s;
3259
3260 *pm = m;
3261 pm = &m->next;
3262 }
3263
3264 /* Look through the sections. We put sections in the same program
3265 segment when the start of the second section can be placed within
3266 a few bytes of the end of the first section. */
3267 last_hdr = NULL;
3268 phdr_index = 0;
3269 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3270 writable = FALSE;
252b5132
RH
3271 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3272 if (dynsec != NULL
3273 && (dynsec->flags & SEC_LOAD) == 0)
3274 dynsec = NULL;
3275
3276 /* Deal with -Ttext or something similar such that the first section
3277 is not adjacent to the program headers. This is an
3278 approximation, since at this point we don't know exactly how many
3279 program headers we will need. */
3280 if (count > 0)
3281 {
3282 bfd_size_type phdr_size;
3283
3284 phdr_size = elf_tdata (abfd)->program_header_size;
3285 if (phdr_size == 0)
3286 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3287 if ((abfd->flags & D_PAGED) == 0
3288 || sections[0]->lma < phdr_size
3289 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3290 phdr_in_segment = FALSE;
252b5132
RH
3291 }
3292
3293 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3294 {
3295 asection *hdr;
b34976b6 3296 bfd_boolean new_segment;
252b5132
RH
3297
3298 hdr = *hdrpp;
3299
3300 /* See if this section and the last one will fit in the same
3301 segment. */
3302
3303 if (last_hdr == NULL)
3304 {
3305 /* If we don't have a segment yet, then we don't need a new
3306 one (we build the last one after this loop). */
b34976b6 3307 new_segment = FALSE;
252b5132
RH
3308 }
3309 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3310 {
3311 /* If this section has a different relation between the
3312 virtual address and the load address, then we need a new
3313 segment. */
b34976b6 3314 new_segment = TRUE;
252b5132
RH
3315 }
3316 else if (BFD_ALIGN (last_hdr->lma + last_hdr->_raw_size, maxpagesize)
3317 < BFD_ALIGN (hdr->lma, maxpagesize))
3318 {
3319 /* If putting this section in this segment would force us to
3320 skip a page in the segment, then we need a new segment. */
b34976b6 3321 new_segment = TRUE;
252b5132
RH
3322 }
3323 else if ((last_hdr->flags & SEC_LOAD) == 0
3324 && (hdr->flags & SEC_LOAD) != 0)
3325 {
3326 /* We don't want to put a loadable section after a
3327 nonloadable section in the same segment. */
b34976b6 3328 new_segment = TRUE;
252b5132
RH
3329 }
3330 else if ((abfd->flags & D_PAGED) == 0)
3331 {
3332 /* If the file is not demand paged, which means that we
3333 don't require the sections to be correctly aligned in the
3334 file, then there is no other reason for a new segment. */
b34976b6 3335 new_segment = FALSE;
252b5132
RH
3336 }
3337 else if (! writable
3338 && (hdr->flags & SEC_READONLY) == 0
b89fe0ee
AM
3339 && (((last_hdr->lma + last_hdr->_raw_size - 1)
3340 & ~(maxpagesize - 1))
3341 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3342 {
3343 /* We don't want to put a writable section in a read only
3344 segment, unless they are on the same page in memory
3345 anyhow. We already know that the last section does not
3346 bring us past the current section on the page, so the
3347 only case in which the new section is not on the same
3348 page as the previous section is when the previous section
3349 ends precisely on a page boundary. */
b34976b6 3350 new_segment = TRUE;
252b5132
RH
3351 }
3352 else
3353 {
3354 /* Otherwise, we can use the same segment. */
b34976b6 3355 new_segment = FALSE;
252b5132
RH
3356 }
3357
3358 if (! new_segment)
3359 {
3360 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3361 writable = TRUE;
252b5132
RH
3362 last_hdr = hdr;
3363 continue;
3364 }
3365
3366 /* We need a new program segment. We must create a new program
3367 header holding all the sections from phdr_index until hdr. */
3368
3369 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3370 if (m == NULL)
3371 goto error_return;
3372
3373 *pm = m;
3374 pm = &m->next;
3375
3376 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3377 writable = TRUE;
252b5132 3378 else
b34976b6 3379 writable = FALSE;
252b5132
RH
3380
3381 last_hdr = hdr;
3382 phdr_index = i;
b34976b6 3383 phdr_in_segment = FALSE;
252b5132
RH
3384 }
3385
3386 /* Create a final PT_LOAD program segment. */
3387 if (last_hdr != NULL)
3388 {
3389 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3390 if (m == NULL)
3391 goto error_return;
3392
3393 *pm = m;
3394 pm = &m->next;
3395 }
3396
3397 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3398 if (dynsec != NULL)
3399 {
dc810e39 3400 amt = sizeof (struct elf_segment_map);
217aa764 3401 m = bfd_zalloc (abfd, amt);
252b5132
RH
3402 if (m == NULL)
3403 goto error_return;
3404 m->next = NULL;
3405 m->p_type = PT_DYNAMIC;
3406 m->count = 1;
3407 m->sections[0] = dynsec;
3408
3409 *pm = m;
3410 pm = &m->next;
3411 }
3412
3413 /* For each loadable .note section, add a PT_NOTE segment. We don't
3414 use bfd_get_section_by_name, because if we link together
3415 nonloadable .note sections and loadable .note sections, we will
3416 generate two .note sections in the output file. FIXME: Using
3417 names for section types is bogus anyhow. */
3418 for (s = abfd->sections; s != NULL; s = s->next)
3419 {
3420 if ((s->flags & SEC_LOAD) != 0
3421 && strncmp (s->name, ".note", 5) == 0)
3422 {
dc810e39 3423 amt = sizeof (struct elf_segment_map);
217aa764 3424 m = bfd_zalloc (abfd, amt);
252b5132
RH
3425 if (m == NULL)
3426 goto error_return;
3427 m->next = NULL;
3428 m->p_type = PT_NOTE;
3429 m->count = 1;
3430 m->sections[0] = s;
3431
3432 *pm = m;
3433 pm = &m->next;
3434 }
13ae64f3
JJ
3435 if (s->flags & SEC_THREAD_LOCAL)
3436 {
3437 if (! tls_count)
3438 first_tls = s;
3439 tls_count++;
3440 }
3441 }
3442
3443 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3444 if (tls_count > 0)
3445 {
3446 int i;
3447
3448 amt = sizeof (struct elf_segment_map);
3449 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3450 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3451 if (m == NULL)
3452 goto error_return;
3453 m->next = NULL;
3454 m->p_type = PT_TLS;
3455 m->count = tls_count;
3456 /* Mandated PF_R. */
3457 m->p_flags = PF_R;
3458 m->p_flags_valid = 1;
3459 for (i = 0; i < tls_count; ++i)
3460 {
3461 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3462 m->sections[i] = first_tls;
3463 first_tls = first_tls->next;
3464 }
3465
3466 *pm = m;
3467 pm = &m->next;
252b5132
RH
3468 }
3469
65765700
JJ
3470 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3471 segment. */
126495ed
AM
3472 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3473 if (eh_frame_hdr != NULL
3474 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3475 {
3476 amt = sizeof (struct elf_segment_map);
217aa764 3477 m = bfd_zalloc (abfd, amt);
65765700
JJ
3478 if (m == NULL)
3479 goto error_return;
3480 m->next = NULL;
3481 m->p_type = PT_GNU_EH_FRAME;
3482 m->count = 1;
126495ed 3483 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3484
3485 *pm = m;
3486 pm = &m->next;
3487 }
3488
9ee5e499
JJ
3489 if (elf_tdata (abfd)->stack_flags)
3490 {
3491 amt = sizeof (struct elf_segment_map);
217aa764 3492 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3493 if (m == NULL)
3494 goto error_return;
3495 m->next = NULL;
3496 m->p_type = PT_GNU_STACK;
3497 m->p_flags = elf_tdata (abfd)->stack_flags;
3498 m->p_flags_valid = 1;
3499
3500 *pm = m;
3501 pm = &m->next;
3502 }
3503
252b5132
RH
3504 free (sections);
3505 sections = NULL;
3506
3507 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3508 return TRUE;
252b5132
RH
3509
3510 error_return:
3511 if (sections != NULL)
3512 free (sections);
b34976b6 3513 return FALSE;
252b5132
RH
3514}
3515
3516/* Sort sections by address. */
3517
3518static int
217aa764 3519elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3520{
3521 const asection *sec1 = *(const asection **) arg1;
3522 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3523 bfd_size_type size1, size2;
252b5132
RH
3524
3525 /* Sort by LMA first, since this is the address used to
3526 place the section into a segment. */
3527 if (sec1->lma < sec2->lma)
3528 return -1;
3529 else if (sec1->lma > sec2->lma)
3530 return 1;
3531
3532 /* Then sort by VMA. Normally the LMA and the VMA will be
3533 the same, and this will do nothing. */
3534 if (sec1->vma < sec2->vma)
3535 return -1;
3536 else if (sec1->vma > sec2->vma)
3537 return 1;
3538
3539 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3540
07c6e936 3541#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3542
3543 if (TOEND (sec1))
3544 {
3545 if (TOEND (sec2))
00a7cdc5
NC
3546 {
3547 /* If the indicies are the same, do not return 0
3548 here, but continue to try the next comparison. */
3549 if (sec1->target_index - sec2->target_index != 0)
3550 return sec1->target_index - sec2->target_index;
3551 }
252b5132
RH
3552 else
3553 return 1;
3554 }
00a7cdc5 3555 else if (TOEND (sec2))
252b5132
RH
3556 return -1;
3557
3558#undef TOEND
3559
00a7cdc5
NC
3560 /* Sort by size, to put zero sized sections
3561 before others at the same address. */
252b5132 3562
eecdbe52
JJ
3563 size1 = (sec1->flags & SEC_LOAD) ? sec1->_raw_size : 0;
3564 size2 = (sec2->flags & SEC_LOAD) ? sec2->_raw_size : 0;
3565
3566 if (size1 < size2)
252b5132 3567 return -1;
eecdbe52 3568 if (size1 > size2)
252b5132
RH
3569 return 1;
3570
3571 return sec1->target_index - sec2->target_index;
3572}
3573
3574/* Assign file positions to the sections based on the mapping from
3575 sections to segments. This function also sets up some fields in
3576 the file header, and writes out the program headers. */
3577
b34976b6 3578static bfd_boolean
217aa764 3579assign_file_positions_for_segments (bfd *abfd)
252b5132
RH
3580{
3581 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3582 unsigned int count;
3583 struct elf_segment_map *m;
3584 unsigned int alloc;
3585 Elf_Internal_Phdr *phdrs;
3586 file_ptr off, voff;
3587 bfd_vma filehdr_vaddr, filehdr_paddr;
3588 bfd_vma phdrs_vaddr, phdrs_paddr;
3589 Elf_Internal_Phdr *p;
dc810e39 3590 bfd_size_type amt;
252b5132
RH
3591
3592 if (elf_tdata (abfd)->segment_map == NULL)
3593 {
3594 if (! map_sections_to_segments (abfd))
b34976b6 3595 return FALSE;
252b5132 3596 }
1ed89aa9
NC
3597 else
3598 {
3599 /* The placement algorithm assumes that non allocated sections are
3600 not in PT_LOAD segments. We ensure this here by removing such
3601 sections from the segment map. */
3602 for (m = elf_tdata (abfd)->segment_map;
3603 m != NULL;
3604 m = m->next)
3605 {
3606 unsigned int new_count;
3607 unsigned int i;
3608
3609 if (m->p_type != PT_LOAD)
3610 continue;
3611
3612 new_count = 0;
3613 for (i = 0; i < m->count; i ++)
3614 {
3615 if ((m->sections[i]->flags & SEC_ALLOC) != 0)
3616 {
47d9a591 3617 if (i != new_count)
1ed89aa9
NC
3618 m->sections[new_count] = m->sections[i];
3619
3620 new_count ++;
3621 }
3622 }
3623
3624 if (new_count != m->count)
3625 m->count = new_count;
3626 }
3627 }
252b5132
RH
3628
3629 if (bed->elf_backend_modify_segment_map)
3630 {
3631 if (! (*bed->elf_backend_modify_segment_map) (abfd))
b34976b6 3632 return FALSE;
252b5132
RH
3633 }
3634
3635 count = 0;
3636 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
3637 ++count;
3638
3639 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
3640 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
3641 elf_elfheader (abfd)->e_phnum = count;
3642
3643 if (count == 0)
b34976b6 3644 return TRUE;
252b5132
RH
3645
3646 /* If we already counted the number of program segments, make sure
3647 that we allocated enough space. This happens when SIZEOF_HEADERS
3648 is used in a linker script. */
3649 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
3650 if (alloc != 0 && count > alloc)
3651 {
3652 ((*_bfd_error_handler)
3653 (_("%s: Not enough room for program headers (allocated %u, need %u)"),
3654 bfd_get_filename (abfd), alloc, count));
3655 bfd_set_error (bfd_error_bad_value);
b34976b6 3656 return FALSE;
252b5132
RH
3657 }
3658
3659 if (alloc == 0)
3660 alloc = count;
3661
dc810e39 3662 amt = alloc * sizeof (Elf_Internal_Phdr);
217aa764 3663 phdrs = bfd_alloc (abfd, amt);
252b5132 3664 if (phdrs == NULL)
b34976b6 3665 return FALSE;
252b5132
RH
3666
3667 off = bed->s->sizeof_ehdr;
3668 off += alloc * bed->s->sizeof_phdr;
3669
3670 filehdr_vaddr = 0;
3671 filehdr_paddr = 0;
3672 phdrs_vaddr = 0;
3673 phdrs_paddr = 0;
3674
3675 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
3676 m != NULL;
3677 m = m->next, p++)
3678 {
3679 unsigned int i;
3680 asection **secpp;
3681
3682 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 3683 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
3684 not be done to the PT_NOTE section of a corefile, which may
3685 contain several pseudo-sections artificially created by bfd.
3686 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
3687 if (m->count > 1
3688 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 3689 && m->p_type == PT_NOTE))
252b5132
RH
3690 qsort (m->sections, (size_t) m->count, sizeof (asection *),
3691 elf_sort_sections);
3692
3693 p->p_type = m->p_type;
28a7f3e7 3694 p->p_flags = m->p_flags;
252b5132
RH
3695
3696 if (p->p_type == PT_LOAD
3697 && m->count > 0
3698 && (m->sections[0]->flags & SEC_ALLOC) != 0)
3699 {
3700 if ((abfd->flags & D_PAGED) != 0)
3701 off += (m->sections[0]->vma - off) % bed->maxpagesize;
3702 else
3703 {
3704 bfd_size_type align;
3705
3706 align = 0;
3707 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
3708 {
3709 bfd_size_type secalign;
3710
3711 secalign = bfd_get_section_alignment (abfd, *secpp);
3712 if (secalign > align)
3713 align = secalign;
3714 }
3715
3716 off += (m->sections[0]->vma - off) % (1 << align);
3717 }
3718 }
3719
3720 if (m->count == 0)
3721 p->p_vaddr = 0;
3722 else
3723 p->p_vaddr = m->sections[0]->vma;
3724
3725 if (m->p_paddr_valid)
3726 p->p_paddr = m->p_paddr;
3727 else if (m->count == 0)
3728 p->p_paddr = 0;
3729 else
3730 p->p_paddr = m->sections[0]->lma;
3731
3732 if (p->p_type == PT_LOAD
3733 && (abfd->flags & D_PAGED) != 0)
3734 p->p_align = bed->maxpagesize;
3735 else if (m->count == 0)
45d6a902 3736 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
3737 else
3738 p->p_align = 0;
3739
3740 p->p_offset = 0;
3741 p->p_filesz = 0;
3742 p->p_memsz = 0;
3743
3744 if (m->includes_filehdr)
3745 {
3746 if (! m->p_flags_valid)
3747 p->p_flags |= PF_R;
3748 p->p_offset = 0;
3749 p->p_filesz = bed->s->sizeof_ehdr;
3750 p->p_memsz = bed->s->sizeof_ehdr;
3751 if (m->count > 0)
3752 {
3753 BFD_ASSERT (p->p_type == PT_LOAD);
3754
3755 if (p->p_vaddr < (bfd_vma) off)
3756 {
caf47ea6
AM
3757 (*_bfd_error_handler)
3758 (_("%s: Not enough room for program headers, try linking with -N"),
3759 bfd_get_filename (abfd));
252b5132 3760 bfd_set_error (bfd_error_bad_value);
b34976b6 3761 return FALSE;
252b5132
RH
3762 }
3763
3764 p->p_vaddr -= off;
3765 if (! m->p_paddr_valid)
3766 p->p_paddr -= off;
3767 }
3768 if (p->p_type == PT_LOAD)
3769 {
3770 filehdr_vaddr = p->p_vaddr;
3771 filehdr_paddr = p->p_paddr;
3772 }
3773 }
3774
3775 if (m->includes_phdrs)
3776 {
3777 if (! m->p_flags_valid)
3778 p->p_flags |= PF_R;
3779
3780 if (m->includes_filehdr)
3781 {
3782 if (p->p_type == PT_LOAD)
3783 {
3784 phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr;
3785 phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr;
3786 }
3787 }
3788 else
3789 {
3790 p->p_offset = bed->s->sizeof_ehdr;
3791
3792 if (m->count > 0)
3793 {
3794 BFD_ASSERT (p->p_type == PT_LOAD);
3795 p->p_vaddr -= off - p->p_offset;
3796 if (! m->p_paddr_valid)
3797 p->p_paddr -= off - p->p_offset;
3798 }
3799
3800 if (p->p_type == PT_LOAD)
3801 {
3802 phdrs_vaddr = p->p_vaddr;
3803 phdrs_paddr = p->p_paddr;
3804 }
3805 else
3806 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
3807 }
3808
3809 p->p_filesz += alloc * bed->s->sizeof_phdr;
3810 p->p_memsz += alloc * bed->s->sizeof_phdr;
3811 }
3812
3813 if (p->p_type == PT_LOAD
3814 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
3815 {
3816 if (! m->includes_filehdr && ! m->includes_phdrs)
3817 p->p_offset = off;
3818 else
3819 {
3820 file_ptr adjust;
3821
3822 adjust = off - (p->p_offset + p->p_filesz);
3823 p->p_filesz += adjust;
3824 p->p_memsz += adjust;
3825 }
3826 }
3827
3828 voff = off;
3829
3830 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
3831 {
3832 asection *sec;
3833 flagword flags;
3834 bfd_size_type align;
3835
3836 sec = *secpp;
3837 flags = sec->flags;
3838 align = 1 << bfd_get_section_alignment (abfd, sec);
3839
3840 /* The section may have artificial alignment forced by a
3841 link script. Notice this case by the gap between the
f5ffc919
NC
3842 cumulative phdr lma and the section's lma. */
3843 if (p->p_paddr + p->p_memsz < sec->lma)
252b5132 3844 {
f5ffc919 3845 bfd_vma adjust = sec->lma - (p->p_paddr + p->p_memsz);
252b5132
RH
3846
3847 p->p_memsz += adjust;
eecdbe52
JJ
3848 if (p->p_type == PT_LOAD
3849 || (p->p_type == PT_NOTE
3850 && bfd_get_format (abfd) == bfd_core))
3851 {
3852 off += adjust;
3853 voff += adjust;
3854 }
3855 if ((flags & SEC_LOAD) != 0
3856 || (flags & SEC_THREAD_LOCAL) != 0)
252b5132
RH
3857 p->p_filesz += adjust;
3858 }
3859
3860 if (p->p_type == PT_LOAD)
3861 {
3862 bfd_signed_vma adjust;
3863
3864 if ((flags & SEC_LOAD) != 0)
3865 {
3866 adjust = sec->lma - (p->p_paddr + p->p_memsz);
3867 if (adjust < 0)
3868 adjust = 0;
3869 }
3870 else if ((flags & SEC_ALLOC) != 0)
3871 {
3872 /* The section VMA must equal the file position
3873 modulo the page size. FIXME: I'm not sure if
3874 this adjustment is really necessary. We used to
3875 not have the SEC_LOAD case just above, and then
3876 this was necessary, but now I'm not sure. */
3877 if ((abfd->flags & D_PAGED) != 0)
3878 adjust = (sec->vma - voff) % bed->maxpagesize;
3879 else
3880 adjust = (sec->vma - voff) % align;
3881 }
3882 else
3883 adjust = 0;
3884
3885 if (adjust != 0)
3886 {
3887 if (i == 0)
3888 {
cdc7c09f
NC
3889 (* _bfd_error_handler) (_("\
3890Error: First section in segment (%s) starts at 0x%x whereas the segment starts at 0x%x"),
3891 bfd_section_name (abfd, sec),
3892 sec->lma,
3893 p->p_paddr);
b34976b6 3894 return FALSE;
252b5132
RH
3895 }
3896 p->p_memsz += adjust;
3897 off += adjust;
3898 voff += adjust;
3899 if ((flags & SEC_LOAD) != 0)
3900 p->p_filesz += adjust;
3901 }
3902
3903 sec->filepos = off;
3904
3905 /* We check SEC_HAS_CONTENTS here because if NOLOAD is
3906 used in a linker script we may have a section with
3907 SEC_LOAD clear but which is supposed to have
3908 contents. */
3909 if ((flags & SEC_LOAD) != 0
3910 || (flags & SEC_HAS_CONTENTS) != 0)
3911 off += sec->_raw_size;
3912
eecdbe52
JJ
3913 if ((flags & SEC_ALLOC) != 0
3914 && ((flags & SEC_LOAD) != 0
3915 || (flags & SEC_THREAD_LOCAL) == 0))
252b5132
RH
3916 voff += sec->_raw_size;
3917 }
3918
3919 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
3920 {
4a938328
MS
3921 /* The actual "note" segment has i == 0.
3922 This is the one that actually contains everything. */
3923 if (i == 0)
3924 {
252b5132
RH
3925 sec->filepos = off;
3926 p->p_filesz = sec->_raw_size;
3927 off += sec->_raw_size;
3928 voff = off;
3929 }
4a938328 3930 else
252b5132 3931 {
4a938328 3932 /* Fake sections -- don't need to be written. */
252b5132
RH
3933 sec->filepos = 0;
3934 sec->_raw_size = 0;
4a938328 3935 flags = sec->flags = 0;
252b5132
RH
3936 }
3937 p->p_memsz = 0;
3938 p->p_align = 1;
3939 }
3940 else
3941 {
eecdbe52
JJ
3942 if ((sec->flags & SEC_LOAD) != 0
3943 || (sec->flags & SEC_THREAD_LOCAL) == 0
3944 || p->p_type == PT_TLS)
252b5132
RH
3945 p->p_memsz += sec->_raw_size;
3946
3947 if ((flags & SEC_LOAD) != 0)
3948 p->p_filesz += sec->_raw_size;
3949
13ae64f3
JJ
3950 if (p->p_type == PT_TLS
3951 && sec->_raw_size == 0
3952 && (sec->flags & SEC_HAS_CONTENTS) == 0)
3953 {
3954 struct bfd_link_order *o;
3955 bfd_vma tbss_size = 0;
3956
3957 for (o = sec->link_order_head; o != NULL; o = o->next)
3958 if (tbss_size < o->offset + o->size)
3959 tbss_size = o->offset + o->size;
3960
3961 p->p_memsz += tbss_size;
3962 }
3963
252b5132
RH
3964 if (align > p->p_align
3965 && (p->p_type != PT_LOAD || (abfd->flags & D_PAGED) == 0))
3966 p->p_align = align;
3967 }
3968
3969 if (! m->p_flags_valid)
3970 {
3971 p->p_flags |= PF_R;
3972 if ((flags & SEC_CODE) != 0)
3973 p->p_flags |= PF_X;
3974 if ((flags & SEC_READONLY) == 0)
3975 p->p_flags |= PF_W;
3976 }
3977 }
3978 }
3979
3980 /* Now that we have set the section file positions, we can set up
3981 the file positions for the non PT_LOAD segments. */
3982 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
3983 m != NULL;
3984 m = m->next, p++)
3985 {
3986 if (p->p_type != PT_LOAD && m->count > 0)
3987 {
3988 BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs);
3989 p->p_offset = m->sections[0]->filepos;
3990 }
3991 if (m->count == 0)
3992 {
3993 if (m->includes_filehdr)
3994 {
3995 p->p_vaddr = filehdr_vaddr;
3996 if (! m->p_paddr_valid)
3997 p->p_paddr = filehdr_paddr;
3998 }
3999 else if (m->includes_phdrs)
4000 {
4001 p->p_vaddr = phdrs_vaddr;
4002 if (! m->p_paddr_valid)
4003 p->p_paddr = phdrs_paddr;
4004 }
4005 }
4006 }
4007
4008 /* Clear out any program headers we allocated but did not use. */
4009 for (; count < alloc; count++, p++)
4010 {
4011 memset (p, 0, sizeof *p);
4012 p->p_type = PT_NULL;
4013 }
4014
4015 elf_tdata (abfd)->phdr = phdrs;
4016
4017 elf_tdata (abfd)->next_file_pos = off;
4018
4019 /* Write out the program headers. */
dc810e39 4020 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
252b5132 4021 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0)
b34976b6 4022 return FALSE;
252b5132 4023
b34976b6 4024 return TRUE;
252b5132
RH
4025}
4026
4027/* Get the size of the program header.
4028
4029 If this is called by the linker before any of the section VMA's are set, it
4030 can't calculate the correct value for a strange memory layout. This only
4031 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4032 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4033 data segment (exclusive of .interp and .dynamic).
4034
4035 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4036 will be two segments. */
4037
4038static bfd_size_type
217aa764 4039get_program_header_size (bfd *abfd)
252b5132
RH
4040{
4041 size_t segs;
4042 asection *s;
9c5bfbb7 4043 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4044
4045 /* We can't return a different result each time we're called. */
4046 if (elf_tdata (abfd)->program_header_size != 0)
4047 return elf_tdata (abfd)->program_header_size;
4048
4049 if (elf_tdata (abfd)->segment_map != NULL)
4050 {
4051 struct elf_segment_map *m;
4052
4053 segs = 0;
4054 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4055 ++segs;
4056 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4057 return elf_tdata (abfd)->program_header_size;
4058 }
4059
4060 /* Assume we will need exactly two PT_LOAD segments: one for text
4061 and one for data. */
4062 segs = 2;
4063
4064 s = bfd_get_section_by_name (abfd, ".interp");
4065 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4066 {
4067 /* If we have a loadable interpreter section, we need a
4068 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4069 PT_PHDR segment, although that may not be true for all
252b5132
RH
4070 targets. */
4071 segs += 2;
4072 }
4073
4074 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4075 {
4076 /* We need a PT_DYNAMIC segment. */
4077 ++segs;
4078 }
4079
126495ed 4080 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4081 {
4082 /* We need a PT_GNU_EH_FRAME segment. */
4083 ++segs;
4084 }
4085
9ee5e499
JJ
4086 if (elf_tdata (abfd)->stack_flags)
4087 {
4088 /* We need a PT_GNU_STACK segment. */
4089 ++segs;
4090 }
4091
252b5132
RH
4092 for (s = abfd->sections; s != NULL; s = s->next)
4093 {
4094 if ((s->flags & SEC_LOAD) != 0
4095 && strncmp (s->name, ".note", 5) == 0)
4096 {
4097 /* We need a PT_NOTE segment. */
4098 ++segs;
4099 }
4100 }
4101
13ae64f3
JJ
4102 for (s = abfd->sections; s != NULL; s = s->next)
4103 {
4104 if (s->flags & SEC_THREAD_LOCAL)
4105 {
4106 /* We need a PT_TLS segment. */
4107 ++segs;
4108 break;
4109 }
4110 }
4111
252b5132
RH
4112 /* Let the backend count up any program headers it might need. */
4113 if (bed->elf_backend_additional_program_headers)
4114 {
4115 int a;
4116
4117 a = (*bed->elf_backend_additional_program_headers) (abfd);
4118 if (a == -1)
4119 abort ();
4120 segs += a;
4121 }
4122
4123 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4124 return elf_tdata (abfd)->program_header_size;
4125}
4126
4127/* Work out the file positions of all the sections. This is called by
4128 _bfd_elf_compute_section_file_positions. All the section sizes and
4129 VMAs must be known before this is called.
4130
4131 We do not consider reloc sections at this point, unless they form
4132 part of the loadable image. Reloc sections are assigned file
4133 positions in assign_file_positions_for_relocs, which is called by
4134 write_object_contents and final_link.
4135
4136 We also don't set the positions of the .symtab and .strtab here. */
4137
b34976b6 4138static bfd_boolean
217aa764 4139assign_file_positions_except_relocs (bfd *abfd)
252b5132
RH
4140{
4141 struct elf_obj_tdata * const tdata = elf_tdata (abfd);
4142 Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd);
4143 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
9ad5cbcf 4144 unsigned int num_sec = elf_numsections (abfd);
252b5132 4145 file_ptr off;
9c5bfbb7 4146 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4147
4148 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4149 && bfd_get_format (abfd) != bfd_core)
4150 {
4151 Elf_Internal_Shdr **hdrpp;
4152 unsigned int i;
4153
4154 /* Start after the ELF header. */
4155 off = i_ehdrp->e_ehsize;
4156
4157 /* We are not creating an executable, which means that we are
4158 not creating a program header, and that the actual order of
4159 the sections in the file is unimportant. */
9ad5cbcf 4160 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4161 {
4162 Elf_Internal_Shdr *hdr;
4163
4164 hdr = *hdrpp;
9ad5cbcf
AM
4165 if (hdr->sh_type == SHT_REL
4166 || hdr->sh_type == SHT_RELA
4167 || i == tdata->symtab_section
4168 || i == tdata->symtab_shndx_section
252b5132
RH
4169 || i == tdata->strtab_section)
4170 {
4171 hdr->sh_offset = -1;
252b5132 4172 }
9ad5cbcf 4173 else
b34976b6 4174 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4175
9ad5cbcf
AM
4176 if (i == SHN_LORESERVE - 1)
4177 {
4178 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4179 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4180 }
252b5132
RH
4181 }
4182 }
4183 else
4184 {
4185 unsigned int i;
4186 Elf_Internal_Shdr **hdrpp;
4187
4188 /* Assign file positions for the loaded sections based on the
4189 assignment of sections to segments. */
4190 if (! assign_file_positions_for_segments (abfd))
b34976b6 4191 return FALSE;
252b5132
RH
4192
4193 /* Assign file positions for the other sections. */
4194
4195 off = elf_tdata (abfd)->next_file_pos;
9ad5cbcf 4196 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4197 {
4198 Elf_Internal_Shdr *hdr;
4199
4200 hdr = *hdrpp;
4201 if (hdr->bfd_section != NULL
4202 && hdr->bfd_section->filepos != 0)
4203 hdr->sh_offset = hdr->bfd_section->filepos;
4204 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4205 {
4206 ((*_bfd_error_handler)
4207 (_("%s: warning: allocated section `%s' not in segment"),
4208 bfd_get_filename (abfd),
4209 (hdr->bfd_section == NULL
4210 ? "*unknown*"
4211 : hdr->bfd_section->name)));
4212 if ((abfd->flags & D_PAGED) != 0)
4213 off += (hdr->sh_addr - off) % bed->maxpagesize;
4214 else
4215 off += (hdr->sh_addr - off) % hdr->sh_addralign;
4216 off = _bfd_elf_assign_file_position_for_section (hdr, off,
b34976b6 4217 FALSE);
252b5132
RH
4218 }
4219 else if (hdr->sh_type == SHT_REL
4220 || hdr->sh_type == SHT_RELA
4221 || hdr == i_shdrpp[tdata->symtab_section]
9ad5cbcf 4222 || hdr == i_shdrpp[tdata->symtab_shndx_section]
252b5132
RH
4223 || hdr == i_shdrpp[tdata->strtab_section])
4224 hdr->sh_offset = -1;
4225 else
b34976b6 4226 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf
AM
4227
4228 if (i == SHN_LORESERVE - 1)
4229 {
4230 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4231 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4232 }
252b5132
RH
4233 }
4234 }
4235
4236 /* Place the section headers. */
45d6a902 4237 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4238 i_ehdrp->e_shoff = off;
4239 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4240
4241 elf_tdata (abfd)->next_file_pos = off;
4242
b34976b6 4243 return TRUE;
252b5132
RH
4244}
4245
b34976b6 4246static bfd_boolean
217aa764 4247prep_headers (bfd *abfd)
252b5132
RH
4248{
4249 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4250 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4251 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4252 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4253 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4254
4255 i_ehdrp = elf_elfheader (abfd);
4256 i_shdrp = elf_elfsections (abfd);
4257
2b0f7ef9 4258 shstrtab = _bfd_elf_strtab_init ();
252b5132 4259 if (shstrtab == NULL)
b34976b6 4260 return FALSE;
252b5132
RH
4261
4262 elf_shstrtab (abfd) = shstrtab;
4263
4264 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4265 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4266 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4267 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4268
4269 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4270 i_ehdrp->e_ident[EI_DATA] =
4271 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4272 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4273
252b5132
RH
4274 if ((abfd->flags & DYNAMIC) != 0)
4275 i_ehdrp->e_type = ET_DYN;
4276 else if ((abfd->flags & EXEC_P) != 0)
4277 i_ehdrp->e_type = ET_EXEC;
4278 else if (bfd_get_format (abfd) == bfd_core)
4279 i_ehdrp->e_type = ET_CORE;
4280 else
4281 i_ehdrp->e_type = ET_REL;
4282
4283 switch (bfd_get_arch (abfd))
4284 {
4285 case bfd_arch_unknown:
4286 i_ehdrp->e_machine = EM_NONE;
4287 break;
aa4f99bb
AO
4288
4289 /* There used to be a long list of cases here, each one setting
4290 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4291 in the corresponding bfd definition. To avoid duplication,
4292 the switch was removed. Machines that need special handling
4293 can generally do it in elf_backend_final_write_processing(),
4294 unless they need the information earlier than the final write.
4295 Such need can generally be supplied by replacing the tests for
4296 e_machine with the conditions used to determine it. */
252b5132 4297 default:
9c5bfbb7
AM
4298 i_ehdrp->e_machine = bed->elf_machine_code;
4299 }
aa4f99bb 4300
252b5132
RH
4301 i_ehdrp->e_version = bed->s->ev_current;
4302 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4303
c044fabd 4304 /* No program header, for now. */
252b5132
RH
4305 i_ehdrp->e_phoff = 0;
4306 i_ehdrp->e_phentsize = 0;
4307 i_ehdrp->e_phnum = 0;
4308
c044fabd 4309 /* Each bfd section is section header entry. */
252b5132
RH
4310 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4311 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4312
c044fabd 4313 /* If we're building an executable, we'll need a program header table. */
252b5132
RH
4314 if (abfd->flags & EXEC_P)
4315 {
c044fabd 4316 /* It all happens later. */
252b5132
RH
4317#if 0
4318 i_ehdrp->e_phentsize = sizeof (Elf_External_Phdr);
4319
4320 /* elf_build_phdrs() returns a (NULL-terminated) array of
c044fabd 4321 Elf_Internal_Phdrs. */
252b5132
RH
4322 i_phdrp = elf_build_phdrs (abfd, i_ehdrp, i_shdrp, &i_ehdrp->e_phnum);
4323 i_ehdrp->e_phoff = outbase;
4324 outbase += i_ehdrp->e_phentsize * i_ehdrp->e_phnum;
4325#endif
4326 }
4327 else
4328 {
4329 i_ehdrp->e_phentsize = 0;
4330 i_phdrp = 0;
4331 i_ehdrp->e_phoff = 0;
4332 }
4333
4334 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4335 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4336 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4337 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4338 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4339 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4340 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4341 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4342 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4343 return FALSE;
252b5132 4344
b34976b6 4345 return TRUE;
252b5132
RH
4346}
4347
4348/* Assign file positions for all the reloc sections which are not part
4349 of the loadable file image. */
4350
4351void
217aa764 4352_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4353{
4354 file_ptr off;
9ad5cbcf 4355 unsigned int i, num_sec;
252b5132
RH
4356 Elf_Internal_Shdr **shdrpp;
4357
4358 off = elf_tdata (abfd)->next_file_pos;
4359
9ad5cbcf
AM
4360 num_sec = elf_numsections (abfd);
4361 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4362 {
4363 Elf_Internal_Shdr *shdrp;
4364
4365 shdrp = *shdrpp;
4366 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4367 && shdrp->sh_offset == -1)
b34976b6 4368 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4369 }
4370
4371 elf_tdata (abfd)->next_file_pos = off;
4372}
4373
b34976b6 4374bfd_boolean
217aa764 4375_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4376{
9c5bfbb7 4377 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4378 Elf_Internal_Ehdr *i_ehdrp;
4379 Elf_Internal_Shdr **i_shdrp;
b34976b6 4380 bfd_boolean failed;
9ad5cbcf 4381 unsigned int count, num_sec;
252b5132
RH
4382
4383 if (! abfd->output_has_begun
217aa764 4384 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4385 return FALSE;
252b5132
RH
4386
4387 i_shdrp = elf_elfsections (abfd);
4388 i_ehdrp = elf_elfheader (abfd);
4389
b34976b6 4390 failed = FALSE;
252b5132
RH
4391 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4392 if (failed)
b34976b6 4393 return FALSE;
252b5132
RH
4394
4395 _bfd_elf_assign_file_positions_for_relocs (abfd);
4396
c044fabd 4397 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4398 num_sec = elf_numsections (abfd);
4399 for (count = 1; count < num_sec; count++)
252b5132
RH
4400 {
4401 if (bed->elf_backend_section_processing)
4402 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4403 if (i_shdrp[count]->contents)
4404 {
dc810e39
AM
4405 bfd_size_type amt = i_shdrp[count]->sh_size;
4406
252b5132 4407 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4408 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4409 return FALSE;
252b5132 4410 }
9ad5cbcf
AM
4411 if (count == SHN_LORESERVE - 1)
4412 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4413 }
4414
4415 /* Write out the section header names. */
4416 if (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
2b0f7ef9 4417 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd)))
b34976b6 4418 return FALSE;
252b5132
RH
4419
4420 if (bed->elf_backend_final_write_processing)
4421 (*bed->elf_backend_final_write_processing) (abfd,
4422 elf_tdata (abfd)->linker);
4423
4424 return bed->s->write_shdrs_and_ehdr (abfd);
4425}
4426
b34976b6 4427bfd_boolean
217aa764 4428_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4429{
c044fabd 4430 /* Hopefully this can be done just like an object file. */
252b5132
RH
4431 return _bfd_elf_write_object_contents (abfd);
4432}
c044fabd
KH
4433
4434/* Given a section, search the header to find them. */
4435
252b5132 4436int
198beae2 4437_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4438{
9c5bfbb7 4439 const struct elf_backend_data *bed;
252b5132 4440 int index;
252b5132 4441
9ad5cbcf
AM
4442 if (elf_section_data (asect) != NULL
4443 && elf_section_data (asect)->this_idx != 0)
4444 return elf_section_data (asect)->this_idx;
4445
4446 if (bfd_is_abs_section (asect))
af746e92
AM
4447 index = SHN_ABS;
4448 else if (bfd_is_com_section (asect))
4449 index = SHN_COMMON;
4450 else if (bfd_is_und_section (asect))
4451 index = SHN_UNDEF;
4452 else
252b5132 4453 {
af746e92
AM
4454 Elf_Internal_Shdr **i_shdrp = elf_elfsections (abfd);
4455 int maxindex = elf_numsections (abfd);
4456
4457 for (index = 1; index < maxindex; index++)
4458 {
4459 Elf_Internal_Shdr *hdr = i_shdrp[index];
4460
4461 if (hdr != NULL && hdr->bfd_section == asect)
4462 return index;
4463 }
4464 index = -1;
252b5132
RH
4465 }
4466
af746e92 4467 bed = get_elf_backend_data (abfd);
252b5132
RH
4468 if (bed->elf_backend_section_from_bfd_section)
4469 {
af746e92 4470 int retval = index;
9ad5cbcf 4471
af746e92
AM
4472 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
4473 return retval;
252b5132
RH
4474 }
4475
af746e92
AM
4476 if (index == -1)
4477 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 4478
af746e92 4479 return index;
252b5132
RH
4480}
4481
4482/* Given a BFD symbol, return the index in the ELF symbol table, or -1
4483 on error. */
4484
4485int
217aa764 4486_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
4487{
4488 asymbol *asym_ptr = *asym_ptr_ptr;
4489 int idx;
4490 flagword flags = asym_ptr->flags;
4491
4492 /* When gas creates relocations against local labels, it creates its
4493 own symbol for the section, but does put the symbol into the
4494 symbol chain, so udata is 0. When the linker is generating
4495 relocatable output, this section symbol may be for one of the
4496 input sections rather than the output section. */
4497 if (asym_ptr->udata.i == 0
4498 && (flags & BSF_SECTION_SYM)
4499 && asym_ptr->section)
4500 {
4501 int indx;
4502
4503 if (asym_ptr->section->output_section != NULL)
4504 indx = asym_ptr->section->output_section->index;
4505 else
4506 indx = asym_ptr->section->index;
4e89ac30
L
4507 if (indx < elf_num_section_syms (abfd)
4508 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
4509 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
4510 }
4511
4512 idx = asym_ptr->udata.i;
4513
4514 if (idx == 0)
4515 {
4516 /* This case can occur when using --strip-symbol on a symbol
4517 which is used in a relocation entry. */
4518 (*_bfd_error_handler)
4519 (_("%s: symbol `%s' required but not present"),
8f615d07 4520 bfd_archive_filename (abfd), bfd_asymbol_name (asym_ptr));
252b5132
RH
4521 bfd_set_error (bfd_error_no_symbols);
4522 return -1;
4523 }
4524
4525#if DEBUG & 4
4526 {
4527 fprintf (stderr,
661a3fd4 4528 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
4529 (long) asym_ptr, asym_ptr->name, idx, flags,
4530 elf_symbol_flags (flags));
4531 fflush (stderr);
4532 }
4533#endif
4534
4535 return idx;
4536}
4537
4538/* Copy private BFD data. This copies any program header information. */
4539
b34976b6 4540static bfd_boolean
217aa764 4541copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132 4542{
b34976b6
AM
4543 Elf_Internal_Ehdr *iehdr;
4544 struct elf_segment_map *map;
4545 struct elf_segment_map *map_first;
4546 struct elf_segment_map **pointer_to_map;
4547 Elf_Internal_Phdr *segment;
4548 asection *section;
4549 unsigned int i;
4550 unsigned int num_segments;
4551 bfd_boolean phdr_included = FALSE;
4552 bfd_vma maxpagesize;
4553 struct elf_segment_map *phdr_adjust_seg = NULL;
4554 unsigned int phdr_adjust_num = 0;
9c5bfbb7 4555 const struct elf_backend_data *bed;
bc67d8a6 4556
c044fabd 4557 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 4558 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 4559 return TRUE;
252b5132
RH
4560
4561 if (elf_tdata (ibfd)->phdr == NULL)
b34976b6 4562 return TRUE;
252b5132 4563
caf47ea6 4564 bed = get_elf_backend_data (ibfd);
252b5132
RH
4565 iehdr = elf_elfheader (ibfd);
4566
bc67d8a6 4567 map_first = NULL;
c044fabd 4568 pointer_to_map = &map_first;
252b5132
RH
4569
4570 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
4571 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
4572
4573 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
4574#define SEGMENT_END(segment, start) \
4575 (start + (segment->p_memsz > segment->p_filesz \
4576 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 4577
eecdbe52
JJ
4578#define SECTION_SIZE(section, segment) \
4579 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
4580 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
4581 ? section->_raw_size : 0)
4582
b34976b6 4583 /* Returns TRUE if the given section is contained within
bc67d8a6 4584 the given segment. VMA addresses are compared. */
aecc8f8a
AM
4585#define IS_CONTAINED_BY_VMA(section, segment) \
4586 (section->vma >= segment->p_vaddr \
eecdbe52 4587 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 4588 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 4589
b34976b6 4590 /* Returns TRUE if the given section is contained within
bc67d8a6 4591 the given segment. LMA addresses are compared. */
aecc8f8a
AM
4592#define IS_CONTAINED_BY_LMA(section, segment, base) \
4593 (section->lma >= base \
eecdbe52 4594 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 4595 <= SEGMENT_END (segment, base)))
252b5132 4596
c044fabd 4597 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
4598#define IS_COREFILE_NOTE(p, s) \
4599 (p->p_type == PT_NOTE \
4600 && bfd_get_format (ibfd) == bfd_core \
4601 && s->vma == 0 && s->lma == 0 \
4602 && (bfd_vma) s->filepos >= p->p_offset \
4603 && ((bfd_vma) s->filepos + s->_raw_size \
4604 <= p->p_offset + p->p_filesz))
252b5132
RH
4605
4606 /* The complicated case when p_vaddr is 0 is to handle the Solaris
4607 linker, which generates a PT_INTERP section with p_vaddr and
4608 p_memsz set to 0. */
aecc8f8a
AM
4609#define IS_SOLARIS_PT_INTERP(p, s) \
4610 (p->p_vaddr == 0 \
4611 && p->p_paddr == 0 \
4612 && p->p_memsz == 0 \
4613 && p->p_filesz > 0 \
4614 && (s->flags & SEC_HAS_CONTENTS) != 0 \
4615 && s->_raw_size > 0 \
4616 && (bfd_vma) s->filepos >= p->p_offset \
4617 && ((bfd_vma) s->filepos + s->_raw_size \
4618 <= p->p_offset + p->p_filesz))
5c440b1e 4619
bc67d8a6
NC
4620 /* Decide if the given section should be included in the given segment.
4621 A section will be included if:
f5ffc919
NC
4622 1. It is within the address space of the segment -- we use the LMA
4623 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
4624 2. It is an allocated segment,
4625 3. There is an output section associated with it,
eecdbe52
JJ
4626 4. The section has not already been allocated to a previous segment.
4627 5. PT_TLS segment includes only SHF_TLS sections.
4628 6. SHF_TLS sections are only in PT_TLS or PT_LOAD segments. */
caf47ea6 4629#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
4630 ((((segment->p_paddr \
4631 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
4632 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 4633 && (section->flags & SEC_ALLOC) != 0) \
b6821651 4634 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 4635 && section->output_section != NULL \
eecdbe52
JJ
4636 && (segment->p_type != PT_TLS \
4637 || (section->flags & SEC_THREAD_LOCAL)) \
4638 && (segment->p_type == PT_LOAD \
4639 || segment->p_type == PT_TLS \
4640 || (section->flags & SEC_THREAD_LOCAL) == 0) \
82e51918 4641 && ! section->segment_mark)
bc67d8a6 4642
b34976b6 4643 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
4644#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
4645 (seg1->field >= SEGMENT_END (seg2, seg2->field))
4646
4647 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
4648 their VMA address ranges and their LMA address ranges overlap.
4649 It is possible to have overlapping VMA ranges without overlapping LMA
4650 ranges. RedBoot images for example can have both .data and .bss mapped
4651 to the same VMA range, but with the .data section mapped to a different
4652 LMA. */
aecc8f8a 4653#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
4654 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
4655 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
4656 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
4657 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
4658
4659 /* Initialise the segment mark field. */
4660 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 4661 section->segment_mark = FALSE;
bc67d8a6 4662
252b5132 4663 /* Scan through the segments specified in the program header
bc67d8a6 4664 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 4665 in the loadable segments. These can be created by weird
aecc8f8a 4666 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
4667 for (i = 0, segment = elf_tdata (ibfd)->phdr;
4668 i < num_segments;
c044fabd 4669 i++, segment++)
252b5132 4670 {
252b5132 4671 unsigned int j;
c044fabd 4672 Elf_Internal_Phdr *segment2;
252b5132 4673
aecc8f8a
AM
4674 if (segment->p_type == PT_INTERP)
4675 for (section = ibfd->sections; section; section = section->next)
4676 if (IS_SOLARIS_PT_INTERP (segment, section))
4677 {
4678 /* Mininal change so that the normal section to segment
4679 assigment code will work. */
4680 segment->p_vaddr = section->vma;
4681 break;
4682 }
4683
bc67d8a6
NC
4684 if (segment->p_type != PT_LOAD)
4685 continue;
c044fabd 4686
bc67d8a6 4687 /* Determine if this segment overlaps any previous segments. */
c044fabd 4688 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
4689 {
4690 bfd_signed_vma extra_length;
c044fabd 4691
bc67d8a6
NC
4692 if (segment2->p_type != PT_LOAD
4693 || ! SEGMENT_OVERLAPS (segment, segment2))
4694 continue;
c044fabd 4695
bc67d8a6
NC
4696 /* Merge the two segments together. */
4697 if (segment2->p_vaddr < segment->p_vaddr)
4698 {
c044fabd
KH
4699 /* Extend SEGMENT2 to include SEGMENT and then delete
4700 SEGMENT. */
bc67d8a6
NC
4701 extra_length =
4702 SEGMENT_END (segment, segment->p_vaddr)
4703 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 4704
bc67d8a6
NC
4705 if (extra_length > 0)
4706 {
4707 segment2->p_memsz += extra_length;
4708 segment2->p_filesz += extra_length;
4709 }
c044fabd 4710
bc67d8a6 4711 segment->p_type = PT_NULL;
c044fabd 4712
bc67d8a6
NC
4713 /* Since we have deleted P we must restart the outer loop. */
4714 i = 0;
4715 segment = elf_tdata (ibfd)->phdr;
4716 break;
4717 }
4718 else
4719 {
c044fabd
KH
4720 /* Extend SEGMENT to include SEGMENT2 and then delete
4721 SEGMENT2. */
bc67d8a6
NC
4722 extra_length =
4723 SEGMENT_END (segment2, segment2->p_vaddr)
4724 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 4725
bc67d8a6
NC
4726 if (extra_length > 0)
4727 {
4728 segment->p_memsz += extra_length;
4729 segment->p_filesz += extra_length;
4730 }
c044fabd 4731
bc67d8a6
NC
4732 segment2->p_type = PT_NULL;
4733 }
4734 }
4735 }
c044fabd 4736
bc67d8a6
NC
4737 /* The second scan attempts to assign sections to segments. */
4738 for (i = 0, segment = elf_tdata (ibfd)->phdr;
4739 i < num_segments;
4740 i ++, segment ++)
4741 {
4742 unsigned int section_count;
4743 asection ** sections;
4744 asection * output_section;
4745 unsigned int isec;
4746 bfd_vma matching_lma;
4747 bfd_vma suggested_lma;
4748 unsigned int j;
dc810e39 4749 bfd_size_type amt;
bc67d8a6
NC
4750
4751 if (segment->p_type == PT_NULL)
4752 continue;
c044fabd 4753
bc67d8a6 4754 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
4755 for (section = ibfd->sections, section_count = 0;
4756 section != NULL;
4757 section = section->next)
caf47ea6 4758 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 4759 ++section_count;
811072d8 4760
b5f852ea
NC
4761 /* Allocate a segment map big enough to contain
4762 all of the sections we have selected. */
dc810e39
AM
4763 amt = sizeof (struct elf_segment_map);
4764 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 4765 map = bfd_alloc (obfd, amt);
bc67d8a6 4766 if (map == NULL)
b34976b6 4767 return FALSE;
252b5132
RH
4768
4769 /* Initialise the fields of the segment map. Default to
4770 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
4771 map->next = NULL;
4772 map->p_type = segment->p_type;
4773 map->p_flags = segment->p_flags;
4774 map->p_flags_valid = 1;
4775 map->p_paddr = segment->p_paddr;
4776 map->p_paddr_valid = 1;
252b5132
RH
4777
4778 /* Determine if this segment contains the ELF file header
4779 and if it contains the program headers themselves. */
bc67d8a6
NC
4780 map->includes_filehdr = (segment->p_offset == 0
4781 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 4782
bc67d8a6 4783 map->includes_phdrs = 0;
252b5132 4784
bc67d8a6 4785 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 4786 {
bc67d8a6
NC
4787 map->includes_phdrs =
4788 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
4789 && (segment->p_offset + segment->p_filesz
252b5132
RH
4790 >= ((bfd_vma) iehdr->e_phoff
4791 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 4792
bc67d8a6 4793 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 4794 phdr_included = TRUE;
252b5132
RH
4795 }
4796
bc67d8a6 4797 if (section_count == 0)
252b5132
RH
4798 {
4799 /* Special segments, such as the PT_PHDR segment, may contain
4800 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
4801 something. They are allowed by the ELF spec however, so only
4802 a warning is produced. */
bc67d8a6 4803 if (segment->p_type == PT_LOAD)
caf47ea6 4804 (*_bfd_error_handler)
1ed89aa9 4805 (_("%s: warning: Empty loadable segment detected, is this intentional ?\n"),
caf47ea6 4806 bfd_archive_filename (ibfd));
252b5132 4807
bc67d8a6 4808 map->count = 0;
c044fabd
KH
4809 *pointer_to_map = map;
4810 pointer_to_map = &map->next;
252b5132
RH
4811
4812 continue;
4813 }
4814
4815 /* Now scan the sections in the input BFD again and attempt
4816 to add their corresponding output sections to the segment map.
4817 The problem here is how to handle an output section which has
4818 been moved (ie had its LMA changed). There are four possibilities:
4819
4820 1. None of the sections have been moved.
4821 In this case we can continue to use the segment LMA from the
4822 input BFD.
4823
4824 2. All of the sections have been moved by the same amount.
4825 In this case we can change the segment's LMA to match the LMA
4826 of the first section.
4827
4828 3. Some of the sections have been moved, others have not.
4829 In this case those sections which have not been moved can be
4830 placed in the current segment which will have to have its size,
4831 and possibly its LMA changed, and a new segment or segments will
4832 have to be created to contain the other sections.
4833
b5f852ea 4834 4. The sections have been moved, but not by the same amount.
252b5132
RH
4835 In this case we can change the segment's LMA to match the LMA
4836 of the first section and we will have to create a new segment
4837 or segments to contain the other sections.
4838
4839 In order to save time, we allocate an array to hold the section
4840 pointers that we are interested in. As these sections get assigned
4841 to a segment, they are removed from this array. */
4842
0b14c2aa
L
4843 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
4844 to work around this long long bug. */
4845 amt = section_count * sizeof (asection *);
217aa764 4846 sections = bfd_malloc (amt);
252b5132 4847 if (sections == NULL)
b34976b6 4848 return FALSE;
252b5132
RH
4849
4850 /* Step One: Scan for segment vs section LMA conflicts.
4851 Also add the sections to the section array allocated above.
4852 Also add the sections to the current segment. In the common
4853 case, where the sections have not been moved, this means that
4854 we have completely filled the segment, and there is nothing
4855 more to do. */
252b5132 4856 isec = 0;
72730e0c 4857 matching_lma = 0;
252b5132
RH
4858 suggested_lma = 0;
4859
bc67d8a6
NC
4860 for (j = 0, section = ibfd->sections;
4861 section != NULL;
4862 section = section->next)
252b5132 4863 {
caf47ea6 4864 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 4865 {
bc67d8a6
NC
4866 output_section = section->output_section;
4867
4868 sections[j ++] = section;
252b5132
RH
4869
4870 /* The Solaris native linker always sets p_paddr to 0.
4871 We try to catch that case here, and set it to the
5e8d7549
NC
4872 correct value. Note - some backends require that
4873 p_paddr be left as zero. */
bc67d8a6 4874 if (segment->p_paddr == 0
4455705d 4875 && segment->p_vaddr != 0
5e8d7549 4876 && (! bed->want_p_paddr_set_to_zero)
252b5132 4877 && isec == 0
bc67d8a6
NC
4878 && output_section->lma != 0
4879 && (output_section->vma == (segment->p_vaddr
4880 + (map->includes_filehdr
4881 ? iehdr->e_ehsize
4882 : 0)
4883 + (map->includes_phdrs
079e9a2f
AM
4884 ? (iehdr->e_phnum
4885 * iehdr->e_phentsize)
bc67d8a6
NC
4886 : 0))))
4887 map->p_paddr = segment->p_vaddr;
252b5132
RH
4888
4889 /* Match up the physical address of the segment with the
4890 LMA address of the output section. */
bc67d8a6 4891 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
4892 || IS_COREFILE_NOTE (segment, section)
4893 || (bed->want_p_paddr_set_to_zero &&
4894 IS_CONTAINED_BY_VMA (output_section, segment))
4895 )
252b5132
RH
4896 {
4897 if (matching_lma == 0)
bc67d8a6 4898 matching_lma = output_section->lma;
252b5132
RH
4899
4900 /* We assume that if the section fits within the segment
bc67d8a6 4901 then it does not overlap any other section within that
252b5132 4902 segment. */
bc67d8a6 4903 map->sections[isec ++] = output_section;
252b5132
RH
4904 }
4905 else if (suggested_lma == 0)
bc67d8a6 4906 suggested_lma = output_section->lma;
252b5132
RH
4907 }
4908 }
4909
bc67d8a6 4910 BFD_ASSERT (j == section_count);
252b5132
RH
4911
4912 /* Step Two: Adjust the physical address of the current segment,
4913 if necessary. */
bc67d8a6 4914 if (isec == section_count)
252b5132
RH
4915 {
4916 /* All of the sections fitted within the segment as currently
4917 specified. This is the default case. Add the segment to
4918 the list of built segments and carry on to process the next
4919 program header in the input BFD. */
bc67d8a6 4920 map->count = section_count;
c044fabd
KH
4921 *pointer_to_map = map;
4922 pointer_to_map = &map->next;
252b5132
RH
4923
4924 free (sections);
4925 continue;
4926 }
252b5132
RH
4927 else
4928 {
72730e0c
AM
4929 if (matching_lma != 0)
4930 {
4931 /* At least one section fits inside the current segment.
4932 Keep it, but modify its physical address to match the
4933 LMA of the first section that fitted. */
bc67d8a6 4934 map->p_paddr = matching_lma;
72730e0c
AM
4935 }
4936 else
4937 {
4938 /* None of the sections fitted inside the current segment.
4939 Change the current segment's physical address to match
4940 the LMA of the first section. */
bc67d8a6 4941 map->p_paddr = suggested_lma;
72730e0c
AM
4942 }
4943
bc67d8a6
NC
4944 /* Offset the segment physical address from the lma
4945 to allow for space taken up by elf headers. */
4946 if (map->includes_filehdr)
4947 map->p_paddr -= iehdr->e_ehsize;
252b5132 4948
bc67d8a6
NC
4949 if (map->includes_phdrs)
4950 {
4951 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
4952
4953 /* iehdr->e_phnum is just an estimate of the number
4954 of program headers that we will need. Make a note
4955 here of the number we used and the segment we chose
4956 to hold these headers, so that we can adjust the
4957 offset when we know the correct value. */
4958 phdr_adjust_num = iehdr->e_phnum;
4959 phdr_adjust_seg = map;
4960 }
252b5132
RH
4961 }
4962
4963 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 4964 those that fit to the current segment and removing them from the
252b5132
RH
4965 sections array; but making sure not to leave large gaps. Once all
4966 possible sections have been assigned to the current segment it is
4967 added to the list of built segments and if sections still remain
4968 to be assigned, a new segment is constructed before repeating
4969 the loop. */
4970 isec = 0;
4971 do
4972 {
bc67d8a6 4973 map->count = 0;
252b5132
RH
4974 suggested_lma = 0;
4975
4976 /* Fill the current segment with sections that fit. */
bc67d8a6 4977 for (j = 0; j < section_count; j++)
252b5132 4978 {
bc67d8a6 4979 section = sections[j];
252b5132 4980
bc67d8a6 4981 if (section == NULL)
252b5132
RH
4982 continue;
4983
bc67d8a6 4984 output_section = section->output_section;
252b5132 4985
bc67d8a6 4986 BFD_ASSERT (output_section != NULL);
c044fabd 4987
bc67d8a6
NC
4988 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
4989 || IS_COREFILE_NOTE (segment, section))
252b5132 4990 {
bc67d8a6 4991 if (map->count == 0)
252b5132
RH
4992 {
4993 /* If the first section in a segment does not start at
bc67d8a6
NC
4994 the beginning of the segment, then something is
4995 wrong. */
4996 if (output_section->lma !=
4997 (map->p_paddr
4998 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
4999 + (map->includes_phdrs
5000 ? iehdr->e_phnum * iehdr->e_phentsize
5001 : 0)))
252b5132
RH
5002 abort ();
5003 }
5004 else
5005 {
5006 asection * prev_sec;
252b5132 5007
bc67d8a6 5008 prev_sec = map->sections[map->count - 1];
252b5132
RH
5009
5010 /* If the gap between the end of the previous section
bc67d8a6
NC
5011 and the start of this section is more than
5012 maxpagesize then we need to start a new segment. */
079e9a2f
AM
5013 if ((BFD_ALIGN (prev_sec->lma + prev_sec->_raw_size,
5014 maxpagesize)
caf47ea6 5015 < BFD_ALIGN (output_section->lma, maxpagesize))
079e9a2f
AM
5016 || ((prev_sec->lma + prev_sec->_raw_size)
5017 > output_section->lma))
252b5132
RH
5018 {
5019 if (suggested_lma == 0)
bc67d8a6 5020 suggested_lma = output_section->lma;
252b5132
RH
5021
5022 continue;
5023 }
5024 }
5025
bc67d8a6 5026 map->sections[map->count++] = output_section;
252b5132
RH
5027 ++isec;
5028 sections[j] = NULL;
b34976b6 5029 section->segment_mark = TRUE;
252b5132
RH
5030 }
5031 else if (suggested_lma == 0)
bc67d8a6 5032 suggested_lma = output_section->lma;
252b5132
RH
5033 }
5034
bc67d8a6 5035 BFD_ASSERT (map->count > 0);
252b5132
RH
5036
5037 /* Add the current segment to the list of built segments. */
c044fabd
KH
5038 *pointer_to_map = map;
5039 pointer_to_map = &map->next;
252b5132 5040
bc67d8a6 5041 if (isec < section_count)
252b5132
RH
5042 {
5043 /* We still have not allocated all of the sections to
5044 segments. Create a new segment here, initialise it
5045 and carry on looping. */
dc810e39
AM
5046 amt = sizeof (struct elf_segment_map);
5047 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5048 map = bfd_alloc (obfd, amt);
bc67d8a6 5049 if (map == NULL)
5ed6aba4
NC
5050 {
5051 free (sections);
5052 return FALSE;
5053 }
252b5132
RH
5054
5055 /* Initialise the fields of the segment map. Set the physical
5056 physical address to the LMA of the first section that has
5057 not yet been assigned. */
bc67d8a6
NC
5058 map->next = NULL;
5059 map->p_type = segment->p_type;
5060 map->p_flags = segment->p_flags;
5061 map->p_flags_valid = 1;
5062 map->p_paddr = suggested_lma;
5063 map->p_paddr_valid = 1;
5064 map->includes_filehdr = 0;
5065 map->includes_phdrs = 0;
252b5132
RH
5066 }
5067 }
bc67d8a6 5068 while (isec < section_count);
252b5132
RH
5069
5070 free (sections);
5071 }
5072
5073 /* The Solaris linker creates program headers in which all the
5074 p_paddr fields are zero. When we try to objcopy or strip such a
5075 file, we get confused. Check for this case, and if we find it
5076 reset the p_paddr_valid fields. */
bc67d8a6
NC
5077 for (map = map_first; map != NULL; map = map->next)
5078 if (map->p_paddr != 0)
252b5132 5079 break;
bc67d8a6 5080 if (map == NULL)
b5f852ea
NC
5081 for (map = map_first; map != NULL; map = map->next)
5082 map->p_paddr_valid = 0;
252b5132 5083
bc67d8a6
NC
5084 elf_tdata (obfd)->segment_map = map_first;
5085
5086 /* If we had to estimate the number of program headers that were
9ad5cbcf 5087 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5088 the offset if necessary. */
5089 if (phdr_adjust_seg != NULL)
5090 {
5091 unsigned int count;
c044fabd 5092
bc67d8a6 5093 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5094 count++;
252b5132 5095
bc67d8a6
NC
5096 if (count > phdr_adjust_num)
5097 phdr_adjust_seg->p_paddr
5098 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5099 }
c044fabd 5100
252b5132 5101#if 0
c044fabd
KH
5102 /* Final Step: Sort the segments into ascending order of physical
5103 address. */
bc67d8a6 5104 if (map_first != NULL)
252b5132 5105 {
c044fabd 5106 struct elf_segment_map *prev;
252b5132 5107
bc67d8a6
NC
5108 prev = map_first;
5109 for (map = map_first->next; map != NULL; prev = map, map = map->next)
252b5132 5110 {
bc67d8a6
NC
5111 /* Yes I know - its a bubble sort.... */
5112 if (map->next != NULL && (map->next->p_paddr < map->p_paddr))
252b5132 5113 {
bc67d8a6
NC
5114 /* Swap map and map->next. */
5115 prev->next = map->next;
5116 map->next = map->next->next;
5117 prev->next->next = map;
252b5132 5118
bc67d8a6
NC
5119 /* Restart loop. */
5120 map = map_first;
252b5132
RH
5121 }
5122 }
5123 }
5124#endif
5125
bc67d8a6 5126#undef SEGMENT_END
eecdbe52 5127#undef SECTION_SIZE
bc67d8a6
NC
5128#undef IS_CONTAINED_BY_VMA
5129#undef IS_CONTAINED_BY_LMA
252b5132 5130#undef IS_COREFILE_NOTE
bc67d8a6
NC
5131#undef IS_SOLARIS_PT_INTERP
5132#undef INCLUDE_SECTION_IN_SEGMENT
5133#undef SEGMENT_AFTER_SEGMENT
5134#undef SEGMENT_OVERLAPS
b34976b6 5135 return TRUE;
252b5132
RH
5136}
5137
5138/* Copy private section information. This copies over the entsize
5139 field, and sometimes the info field. */
5140
b34976b6 5141bfd_boolean
217aa764
AM
5142_bfd_elf_copy_private_section_data (bfd *ibfd,
5143 asection *isec,
5144 bfd *obfd,
5145 asection *osec)
252b5132
RH
5146{
5147 Elf_Internal_Shdr *ihdr, *ohdr;
5148
5149 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5150 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5151 return TRUE;
252b5132 5152
ad12c1c5 5153 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
caf47ea6
AM
5154 {
5155 asection *s;
5156
5157 /* Only set up the segments if there are no more SEC_ALLOC
5158 sections. FIXME: This won't do the right thing if objcopy is
5159 used to remove the last SEC_ALLOC section, since objcopy
5160 won't call this routine in that case. */
5161 for (s = isec->next; s != NULL; s = s->next)
5162 if ((s->flags & SEC_ALLOC) != 0)
5163 break;
5164 if (s == NULL)
5165 {
5166 if (! copy_private_bfd_data (ibfd, obfd))
b34976b6 5167 return FALSE;
caf47ea6 5168 }
252b5132
RH
5169 }
5170
5171 ihdr = &elf_section_data (isec)->this_hdr;
5172 ohdr = &elf_section_data (osec)->this_hdr;
5173
5174 ohdr->sh_entsize = ihdr->sh_entsize;
5175
5176 if (ihdr->sh_type == SHT_SYMTAB
5177 || ihdr->sh_type == SHT_DYNSYM
5178 || ihdr->sh_type == SHT_GNU_verneed
5179 || ihdr->sh_type == SHT_GNU_verdef)
5180 ohdr->sh_info = ihdr->sh_info;
5181
9dce4196
AM
5182 /* Set things up for objcopy. The output SHT_GROUP section will
5183 have its elf_next_in_group pointing back to the input group
5184 members. */
5185 elf_next_in_group (osec) = elf_next_in_group (isec);
5186 elf_group_name (osec) = elf_group_name (isec);
5187
68bfbfcc 5188 osec->use_rela_p = isec->use_rela_p;
bf572ba0 5189
b34976b6 5190 return TRUE;
252b5132
RH
5191}
5192
5193/* Copy private symbol information. If this symbol is in a section
5194 which we did not map into a BFD section, try to map the section
5195 index correctly. We use special macro definitions for the mapped
5196 section indices; these definitions are interpreted by the
5197 swap_out_syms function. */
5198
9ad5cbcf
AM
5199#define MAP_ONESYMTAB (SHN_HIOS + 1)
5200#define MAP_DYNSYMTAB (SHN_HIOS + 2)
5201#define MAP_STRTAB (SHN_HIOS + 3)
5202#define MAP_SHSTRTAB (SHN_HIOS + 4)
5203#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 5204
b34976b6 5205bfd_boolean
217aa764
AM
5206_bfd_elf_copy_private_symbol_data (bfd *ibfd,
5207 asymbol *isymarg,
5208 bfd *obfd,
5209 asymbol *osymarg)
252b5132
RH
5210{
5211 elf_symbol_type *isym, *osym;
5212
5213 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5214 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5215 return TRUE;
252b5132
RH
5216
5217 isym = elf_symbol_from (ibfd, isymarg);
5218 osym = elf_symbol_from (obfd, osymarg);
5219
5220 if (isym != NULL
5221 && osym != NULL
5222 && bfd_is_abs_section (isym->symbol.section))
5223 {
5224 unsigned int shndx;
5225
5226 shndx = isym->internal_elf_sym.st_shndx;
5227 if (shndx == elf_onesymtab (ibfd))
5228 shndx = MAP_ONESYMTAB;
5229 else if (shndx == elf_dynsymtab (ibfd))
5230 shndx = MAP_DYNSYMTAB;
5231 else if (shndx == elf_tdata (ibfd)->strtab_section)
5232 shndx = MAP_STRTAB;
5233 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
5234 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
5235 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
5236 shndx = MAP_SYM_SHNDX;
252b5132
RH
5237 osym->internal_elf_sym.st_shndx = shndx;
5238 }
5239
b34976b6 5240 return TRUE;
252b5132
RH
5241}
5242
5243/* Swap out the symbols. */
5244
b34976b6 5245static bfd_boolean
217aa764
AM
5246swap_out_syms (bfd *abfd,
5247 struct bfd_strtab_hash **sttp,
5248 int relocatable_p)
252b5132 5249{
9c5bfbb7 5250 const struct elf_backend_data *bed;
079e9a2f
AM
5251 int symcount;
5252 asymbol **syms;
5253 struct bfd_strtab_hash *stt;
5254 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 5255 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f
AM
5256 Elf_Internal_Shdr *symstrtab_hdr;
5257 char *outbound_syms;
9ad5cbcf 5258 char *outbound_shndx;
079e9a2f
AM
5259 int idx;
5260 bfd_size_type amt;
252b5132
RH
5261
5262 if (!elf_map_symbols (abfd))
b34976b6 5263 return FALSE;
252b5132 5264
c044fabd 5265 /* Dump out the symtabs. */
079e9a2f
AM
5266 stt = _bfd_elf_stringtab_init ();
5267 if (stt == NULL)
b34976b6 5268 return FALSE;
252b5132 5269
079e9a2f
AM
5270 bed = get_elf_backend_data (abfd);
5271 symcount = bfd_get_symcount (abfd);
5272 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5273 symtab_hdr->sh_type = SHT_SYMTAB;
5274 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
5275 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
5276 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 5277 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
5278
5279 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5280 symstrtab_hdr->sh_type = SHT_STRTAB;
5281
5282 amt = (bfd_size_type) (1 + symcount) * bed->s->sizeof_sym;
5283 outbound_syms = bfd_alloc (abfd, amt);
5284 if (outbound_syms == NULL)
5ed6aba4
NC
5285 {
5286 _bfd_stringtab_free (stt);
5287 return FALSE;
5288 }
217aa764 5289 symtab_hdr->contents = outbound_syms;
252b5132 5290
9ad5cbcf
AM
5291 outbound_shndx = NULL;
5292 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5293 if (symtab_shndx_hdr->sh_name != 0)
5294 {
5295 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
1126897b 5296 outbound_shndx = bfd_zalloc (abfd, amt);
9ad5cbcf 5297 if (outbound_shndx == NULL)
5ed6aba4
NC
5298 {
5299 _bfd_stringtab_free (stt);
5300 return FALSE;
5301 }
5302
9ad5cbcf
AM
5303 symtab_shndx_hdr->contents = outbound_shndx;
5304 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5305 symtab_shndx_hdr->sh_size = amt;
5306 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5307 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5308 }
5309
589e6347 5310 /* Now generate the data (for "contents"). */
079e9a2f
AM
5311 {
5312 /* Fill in zeroth symbol and swap it out. */
5313 Elf_Internal_Sym sym;
5314 sym.st_name = 0;
5315 sym.st_value = 0;
5316 sym.st_size = 0;
5317 sym.st_info = 0;
5318 sym.st_other = 0;
5319 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 5320 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5321 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5322 if (outbound_shndx != NULL)
5323 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5324 }
252b5132 5325
079e9a2f
AM
5326 syms = bfd_get_outsymbols (abfd);
5327 for (idx = 0; idx < symcount; idx++)
252b5132 5328 {
252b5132 5329 Elf_Internal_Sym sym;
079e9a2f
AM
5330 bfd_vma value = syms[idx]->value;
5331 elf_symbol_type *type_ptr;
5332 flagword flags = syms[idx]->flags;
5333 int type;
252b5132 5334
079e9a2f
AM
5335 if ((flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
5336 {
5337 /* Local section symbols have no name. */
5338 sym.st_name = 0;
5339 }
5340 else
5341 {
5342 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
5343 syms[idx]->name,
b34976b6 5344 TRUE, FALSE);
079e9a2f 5345 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
5346 {
5347 _bfd_stringtab_free (stt);
5348 return FALSE;
5349 }
079e9a2f 5350 }
252b5132 5351
079e9a2f 5352 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 5353
079e9a2f
AM
5354 if ((flags & BSF_SECTION_SYM) == 0
5355 && bfd_is_com_section (syms[idx]->section))
5356 {
5357 /* ELF common symbols put the alignment into the `value' field,
5358 and the size into the `size' field. This is backwards from
5359 how BFD handles it, so reverse it here. */
5360 sym.st_size = value;
5361 if (type_ptr == NULL
5362 || type_ptr->internal_elf_sym.st_value == 0)
5363 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
5364 else
5365 sym.st_value = type_ptr->internal_elf_sym.st_value;
5366 sym.st_shndx = _bfd_elf_section_from_bfd_section
5367 (abfd, syms[idx]->section);
5368 }
5369 else
5370 {
5371 asection *sec = syms[idx]->section;
5372 int shndx;
252b5132 5373
079e9a2f
AM
5374 if (sec->output_section)
5375 {
5376 value += sec->output_offset;
5377 sec = sec->output_section;
5378 }
589e6347 5379
079e9a2f
AM
5380 /* Don't add in the section vma for relocatable output. */
5381 if (! relocatable_p)
5382 value += sec->vma;
5383 sym.st_value = value;
5384 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
5385
5386 if (bfd_is_abs_section (sec)
5387 && type_ptr != NULL
5388 && type_ptr->internal_elf_sym.st_shndx != 0)
5389 {
5390 /* This symbol is in a real ELF section which we did
5391 not create as a BFD section. Undo the mapping done
5392 by copy_private_symbol_data. */
5393 shndx = type_ptr->internal_elf_sym.st_shndx;
5394 switch (shndx)
5395 {
5396 case MAP_ONESYMTAB:
5397 shndx = elf_onesymtab (abfd);
5398 break;
5399 case MAP_DYNSYMTAB:
5400 shndx = elf_dynsymtab (abfd);
5401 break;
5402 case MAP_STRTAB:
5403 shndx = elf_tdata (abfd)->strtab_section;
5404 break;
5405 case MAP_SHSTRTAB:
5406 shndx = elf_tdata (abfd)->shstrtab_section;
5407 break;
9ad5cbcf
AM
5408 case MAP_SYM_SHNDX:
5409 shndx = elf_tdata (abfd)->symtab_shndx_section;
5410 break;
079e9a2f
AM
5411 default:
5412 break;
5413 }
5414 }
5415 else
5416 {
5417 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 5418
079e9a2f
AM
5419 if (shndx == -1)
5420 {
5421 asection *sec2;
5422
5423 /* Writing this would be a hell of a lot easier if
5424 we had some decent documentation on bfd, and
5425 knew what to expect of the library, and what to
5426 demand of applications. For example, it
5427 appears that `objcopy' might not set the
5428 section of a symbol to be a section that is
5429 actually in the output file. */
5430 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
5431 if (sec2 == NULL)
5432 {
5433 _bfd_error_handler (_("\
5434Unable to find equivalent output section for symbol '%s' from section '%s'"),
5435 syms[idx]->name ? syms[idx]->name : "<Local sym>",
5436 sec->name);
811072d8 5437 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 5438 _bfd_stringtab_free (stt);
589e6347
NC
5439 return FALSE;
5440 }
811072d8 5441
079e9a2f
AM
5442 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
5443 BFD_ASSERT (shndx != -1);
5444 }
5445 }
252b5132 5446
079e9a2f
AM
5447 sym.st_shndx = shndx;
5448 }
252b5132 5449
13ae64f3
JJ
5450 if ((flags & BSF_THREAD_LOCAL) != 0)
5451 type = STT_TLS;
5452 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
5453 type = STT_FUNC;
5454 else if ((flags & BSF_OBJECT) != 0)
5455 type = STT_OBJECT;
5456 else
5457 type = STT_NOTYPE;
252b5132 5458
13ae64f3
JJ
5459 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
5460 type = STT_TLS;
5461
589e6347 5462 /* Processor-specific types. */
079e9a2f
AM
5463 if (type_ptr != NULL
5464 && bed->elf_backend_get_symbol_type)
5465 type = ((*bed->elf_backend_get_symbol_type)
5466 (&type_ptr->internal_elf_sym, type));
252b5132 5467
079e9a2f
AM
5468 if (flags & BSF_SECTION_SYM)
5469 {
5470 if (flags & BSF_GLOBAL)
5471 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
5472 else
5473 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5474 }
5475 else if (bfd_is_com_section (syms[idx]->section))
5476 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
5477 else if (bfd_is_und_section (syms[idx]->section))
5478 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
5479 ? STB_WEAK
5480 : STB_GLOBAL),
5481 type);
5482 else if (flags & BSF_FILE)
5483 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
5484 else
5485 {
5486 int bind = STB_LOCAL;
252b5132 5487
079e9a2f
AM
5488 if (flags & BSF_LOCAL)
5489 bind = STB_LOCAL;
5490 else if (flags & BSF_WEAK)
5491 bind = STB_WEAK;
5492 else if (flags & BSF_GLOBAL)
5493 bind = STB_GLOBAL;
252b5132 5494
079e9a2f
AM
5495 sym.st_info = ELF_ST_INFO (bind, type);
5496 }
252b5132 5497
079e9a2f
AM
5498 if (type_ptr != NULL)
5499 sym.st_other = type_ptr->internal_elf_sym.st_other;
5500 else
5501 sym.st_other = 0;
252b5132 5502
9ad5cbcf 5503 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5504 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5505 if (outbound_shndx != NULL)
5506 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5507 }
252b5132 5508
079e9a2f
AM
5509 *sttp = stt;
5510 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
5511 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 5512
079e9a2f
AM
5513 symstrtab_hdr->sh_flags = 0;
5514 symstrtab_hdr->sh_addr = 0;
5515 symstrtab_hdr->sh_entsize = 0;
5516 symstrtab_hdr->sh_link = 0;
5517 symstrtab_hdr->sh_info = 0;
5518 symstrtab_hdr->sh_addralign = 1;
252b5132 5519
b34976b6 5520 return TRUE;
252b5132
RH
5521}
5522
5523/* Return the number of bytes required to hold the symtab vector.
5524
5525 Note that we base it on the count plus 1, since we will null terminate
5526 the vector allocated based on this size. However, the ELF symbol table
5527 always has a dummy entry as symbol #0, so it ends up even. */
5528
5529long
217aa764 5530_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
5531{
5532 long symcount;
5533 long symtab_size;
5534 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
5535
5536 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
5537 symtab_size = (symcount + 1) * (sizeof (asymbol *));
5538 if (symcount > 0)
5539 symtab_size -= sizeof (asymbol *);
252b5132
RH
5540
5541 return symtab_size;
5542}
5543
5544long
217aa764 5545_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
5546{
5547 long symcount;
5548 long symtab_size;
5549 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
5550
5551 if (elf_dynsymtab (abfd) == 0)
5552 {
5553 bfd_set_error (bfd_error_invalid_operation);
5554 return -1;
5555 }
5556
5557 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
5558 symtab_size = (symcount + 1) * (sizeof (asymbol *));
5559 if (symcount > 0)
5560 symtab_size -= sizeof (asymbol *);
252b5132
RH
5561
5562 return symtab_size;
5563}
5564
5565long
217aa764
AM
5566_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
5567 sec_ptr asect)
252b5132
RH
5568{
5569 return (asect->reloc_count + 1) * sizeof (arelent *);
5570}
5571
5572/* Canonicalize the relocs. */
5573
5574long
217aa764
AM
5575_bfd_elf_canonicalize_reloc (bfd *abfd,
5576 sec_ptr section,
5577 arelent **relptr,
5578 asymbol **symbols)
252b5132
RH
5579{
5580 arelent *tblptr;
5581 unsigned int i;
9c5bfbb7 5582 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5583
b34976b6 5584 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
5585 return -1;
5586
5587 tblptr = section->relocation;
5588 for (i = 0; i < section->reloc_count; i++)
5589 *relptr++ = tblptr++;
5590
5591 *relptr = NULL;
5592
5593 return section->reloc_count;
5594}
5595
5596long
6cee3f79 5597_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 5598{
9c5bfbb7 5599 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 5600 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
5601
5602 if (symcount >= 0)
5603 bfd_get_symcount (abfd) = symcount;
5604 return symcount;
5605}
5606
5607long
217aa764
AM
5608_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
5609 asymbol **allocation)
252b5132 5610{
9c5bfbb7 5611 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 5612 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
5613
5614 if (symcount >= 0)
5615 bfd_get_dynamic_symcount (abfd) = symcount;
5616 return symcount;
252b5132
RH
5617}
5618
5619/* Return the size required for the dynamic reloc entries. Any
5620 section that was actually installed in the BFD, and has type
5621 SHT_REL or SHT_RELA, and uses the dynamic symbol table, is
5622 considered to be a dynamic reloc section. */
5623
5624long
217aa764 5625_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
5626{
5627 long ret;
5628 asection *s;
5629
5630 if (elf_dynsymtab (abfd) == 0)
5631 {
5632 bfd_set_error (bfd_error_invalid_operation);
5633 return -1;
5634 }
5635
5636 ret = sizeof (arelent *);
5637 for (s = abfd->sections; s != NULL; s = s->next)
5638 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
5639 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
5640 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
5641 ret += ((s->_raw_size / elf_section_data (s)->this_hdr.sh_entsize)
5642 * sizeof (arelent *));
5643
5644 return ret;
5645}
5646
5647/* Canonicalize the dynamic relocation entries. Note that we return
5648 the dynamic relocations as a single block, although they are
5649 actually associated with particular sections; the interface, which
5650 was designed for SunOS style shared libraries, expects that there
5651 is only one set of dynamic relocs. Any section that was actually
5652 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses
5653 the dynamic symbol table, is considered to be a dynamic reloc
5654 section. */
5655
5656long
217aa764
AM
5657_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
5658 arelent **storage,
5659 asymbol **syms)
252b5132 5660{
217aa764 5661 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
5662 asection *s;
5663 long ret;
5664
5665 if (elf_dynsymtab (abfd) == 0)
5666 {
5667 bfd_set_error (bfd_error_invalid_operation);
5668 return -1;
5669 }
5670
5671 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
5672 ret = 0;
5673 for (s = abfd->sections; s != NULL; s = s->next)
5674 {
5675 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
5676 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
5677 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
5678 {
5679 arelent *p;
5680 long count, i;
5681
b34976b6 5682 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132
RH
5683 return -1;
5684 count = s->_raw_size / elf_section_data (s)->this_hdr.sh_entsize;
5685 p = s->relocation;
5686 for (i = 0; i < count; i++)
5687 *storage++ = p++;
5688 ret += count;
5689 }
5690 }
5691
5692 *storage = NULL;
5693
5694 return ret;
5695}
5696\f
5697/* Read in the version information. */
5698
b34976b6 5699bfd_boolean
217aa764 5700_bfd_elf_slurp_version_tables (bfd *abfd)
252b5132
RH
5701{
5702 bfd_byte *contents = NULL;
dc810e39 5703 bfd_size_type amt;
252b5132
RH
5704
5705 if (elf_dynverdef (abfd) != 0)
5706 {
5707 Elf_Internal_Shdr *hdr;
5708 Elf_External_Verdef *everdef;
5709 Elf_Internal_Verdef *iverdef;
f631889e
UD
5710 Elf_Internal_Verdef *iverdefarr;
5711 Elf_Internal_Verdef iverdefmem;
252b5132 5712 unsigned int i;
062e2358 5713 unsigned int maxidx;
252b5132
RH
5714
5715 hdr = &elf_tdata (abfd)->dynverdef_hdr;
5716
217aa764 5717 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
5718 if (contents == NULL)
5719 goto error_return;
5720 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 5721 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
5722 goto error_return;
5723
f631889e
UD
5724 /* We know the number of entries in the section but not the maximum
5725 index. Therefore we have to run through all entries and find
5726 the maximum. */
252b5132 5727 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
5728 maxidx = 0;
5729 for (i = 0; i < hdr->sh_info; ++i)
5730 {
5731 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
5732
062e2358
AM
5733 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
5734 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e
UD
5735
5736 everdef = ((Elf_External_Verdef *)
5737 ((bfd_byte *) everdef + iverdefmem.vd_next));
5738 }
5739
dc810e39 5740 amt = (bfd_size_type) maxidx * sizeof (Elf_Internal_Verdef);
217aa764 5741 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
f631889e
UD
5742 if (elf_tdata (abfd)->verdef == NULL)
5743 goto error_return;
5744
5745 elf_tdata (abfd)->cverdefs = maxidx;
5746
5747 everdef = (Elf_External_Verdef *) contents;
5748 iverdefarr = elf_tdata (abfd)->verdef;
5749 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
5750 {
5751 Elf_External_Verdaux *everdaux;
5752 Elf_Internal_Verdaux *iverdaux;
5753 unsigned int j;
5754
f631889e
UD
5755 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
5756
5757 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
5758 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
5759
5760 iverdef->vd_bfd = abfd;
5761
dc810e39 5762 amt = (bfd_size_type) iverdef->vd_cnt * sizeof (Elf_Internal_Verdaux);
217aa764 5763 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132
RH
5764 if (iverdef->vd_auxptr == NULL)
5765 goto error_return;
5766
5767 everdaux = ((Elf_External_Verdaux *)
5768 ((bfd_byte *) everdef + iverdef->vd_aux));
5769 iverdaux = iverdef->vd_auxptr;
5770 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
5771 {
5772 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
5773
5774 iverdaux->vda_nodename =
5775 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
5776 iverdaux->vda_name);
5777 if (iverdaux->vda_nodename == NULL)
5778 goto error_return;
5779
5780 if (j + 1 < iverdef->vd_cnt)
5781 iverdaux->vda_nextptr = iverdaux + 1;
5782 else
5783 iverdaux->vda_nextptr = NULL;
5784
5785 everdaux = ((Elf_External_Verdaux *)
5786 ((bfd_byte *) everdaux + iverdaux->vda_next));
5787 }
5788
5789 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
5790
5791 if (i + 1 < hdr->sh_info)
5792 iverdef->vd_nextdef = iverdef + 1;
5793 else
5794 iverdef->vd_nextdef = NULL;
5795
5796 everdef = ((Elf_External_Verdef *)
5797 ((bfd_byte *) everdef + iverdef->vd_next));
5798 }
5799
5800 free (contents);
5801 contents = NULL;
5802 }
5803
5804 if (elf_dynverref (abfd) != 0)
5805 {
5806 Elf_Internal_Shdr *hdr;
5807 Elf_External_Verneed *everneed;
5808 Elf_Internal_Verneed *iverneed;
5809 unsigned int i;
5810
5811 hdr = &elf_tdata (abfd)->dynverref_hdr;
5812
dc810e39 5813 amt = (bfd_size_type) hdr->sh_info * sizeof (Elf_Internal_Verneed);
217aa764 5814 elf_tdata (abfd)->verref = bfd_zalloc (abfd, amt);
252b5132
RH
5815 if (elf_tdata (abfd)->verref == NULL)
5816 goto error_return;
5817
5818 elf_tdata (abfd)->cverrefs = hdr->sh_info;
5819
217aa764 5820 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
5821 if (contents == NULL)
5822 goto error_return;
5823 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 5824 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
5825 goto error_return;
5826
5827 everneed = (Elf_External_Verneed *) contents;
5828 iverneed = elf_tdata (abfd)->verref;
5829 for (i = 0; i < hdr->sh_info; i++, iverneed++)
5830 {
5831 Elf_External_Vernaux *evernaux;
5832 Elf_Internal_Vernaux *ivernaux;
5833 unsigned int j;
5834
5835 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
5836
5837 iverneed->vn_bfd = abfd;
5838
5839 iverneed->vn_filename =
5840 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
5841 iverneed->vn_file);
5842 if (iverneed->vn_filename == NULL)
5843 goto error_return;
5844
dc810e39
AM
5845 amt = iverneed->vn_cnt;
5846 amt *= sizeof (Elf_Internal_Vernaux);
217aa764 5847 iverneed->vn_auxptr = bfd_alloc (abfd, amt);
252b5132
RH
5848
5849 evernaux = ((Elf_External_Vernaux *)
5850 ((bfd_byte *) everneed + iverneed->vn_aux));
5851 ivernaux = iverneed->vn_auxptr;
5852 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
5853 {
5854 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
5855
5856 ivernaux->vna_nodename =
5857 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
5858 ivernaux->vna_name);
5859 if (ivernaux->vna_nodename == NULL)
5860 goto error_return;
5861
5862 if (j + 1 < iverneed->vn_cnt)
5863 ivernaux->vna_nextptr = ivernaux + 1;
5864 else
5865 ivernaux->vna_nextptr = NULL;
5866
5867 evernaux = ((Elf_External_Vernaux *)
5868 ((bfd_byte *) evernaux + ivernaux->vna_next));
5869 }
5870
5871 if (i + 1 < hdr->sh_info)
5872 iverneed->vn_nextref = iverneed + 1;
5873 else
5874 iverneed->vn_nextref = NULL;
5875
5876 everneed = ((Elf_External_Verneed *)
5877 ((bfd_byte *) everneed + iverneed->vn_next));
5878 }
5879
5880 free (contents);
5881 contents = NULL;
5882 }
5883
b34976b6 5884 return TRUE;
252b5132
RH
5885
5886 error_return:
5ed6aba4 5887 if (contents != NULL)
252b5132 5888 free (contents);
b34976b6 5889 return FALSE;
252b5132
RH
5890}
5891\f
5892asymbol *
217aa764 5893_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
5894{
5895 elf_symbol_type *newsym;
dc810e39 5896 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 5897
217aa764 5898 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
5899 if (!newsym)
5900 return NULL;
5901 else
5902 {
5903 newsym->symbol.the_bfd = abfd;
5904 return &newsym->symbol;
5905 }
5906}
5907
5908void
217aa764
AM
5909_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
5910 asymbol *symbol,
5911 symbol_info *ret)
252b5132
RH
5912{
5913 bfd_symbol_info (symbol, ret);
5914}
5915
5916/* Return whether a symbol name implies a local symbol. Most targets
5917 use this function for the is_local_label_name entry point, but some
5918 override it. */
5919
b34976b6 5920bfd_boolean
217aa764
AM
5921_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
5922 const char *name)
252b5132
RH
5923{
5924 /* Normal local symbols start with ``.L''. */
5925 if (name[0] == '.' && name[1] == 'L')
b34976b6 5926 return TRUE;
252b5132
RH
5927
5928 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
5929 DWARF debugging symbols starting with ``..''. */
5930 if (name[0] == '.' && name[1] == '.')
b34976b6 5931 return TRUE;
252b5132
RH
5932
5933 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
5934 emitting DWARF debugging output. I suspect this is actually a
5935 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
5936 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
5937 underscore to be emitted on some ELF targets). For ease of use,
5938 we treat such symbols as local. */
5939 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 5940 return TRUE;
252b5132 5941
b34976b6 5942 return FALSE;
252b5132
RH
5943}
5944
5945alent *
217aa764
AM
5946_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
5947 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
5948{
5949 abort ();
5950 return NULL;
5951}
5952
b34976b6 5953bfd_boolean
217aa764
AM
5954_bfd_elf_set_arch_mach (bfd *abfd,
5955 enum bfd_architecture arch,
5956 unsigned long machine)
252b5132
RH
5957{
5958 /* If this isn't the right architecture for this backend, and this
5959 isn't the generic backend, fail. */
5960 if (arch != get_elf_backend_data (abfd)->arch
5961 && arch != bfd_arch_unknown
5962 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 5963 return FALSE;
252b5132
RH
5964
5965 return bfd_default_set_arch_mach (abfd, arch, machine);
5966}
5967
d1fad7c6
NC
5968/* Find the function to a particular section and offset,
5969 for error reporting. */
252b5132 5970
b34976b6 5971static bfd_boolean
217aa764
AM
5972elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
5973 asection *section,
5974 asymbol **symbols,
5975 bfd_vma offset,
5976 const char **filename_ptr,
5977 const char **functionname_ptr)
252b5132 5978{
252b5132
RH
5979 const char *filename;
5980 asymbol *func;
5981 bfd_vma low_func;
5982 asymbol **p;
5983
252b5132
RH
5984 filename = NULL;
5985 func = NULL;
5986 low_func = 0;
5987
5988 for (p = symbols; *p != NULL; p++)
5989 {
5990 elf_symbol_type *q;
5991
5992 q = (elf_symbol_type *) *p;
5993
5994 if (bfd_get_section (&q->symbol) != section)
5995 continue;
5996
5997 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
5998 {
5999 default:
6000 break;
6001 case STT_FILE:
6002 filename = bfd_asymbol_name (&q->symbol);
6003 break;
6004 case STT_NOTYPE:
6005 case STT_FUNC:
6006 if (q->symbol.section == section
6007 && q->symbol.value >= low_func
6008 && q->symbol.value <= offset)
6009 {
6010 func = (asymbol *) q;
6011 low_func = q->symbol.value;
6012 }
6013 break;
6014 }
6015 }
6016
6017 if (func == NULL)
b34976b6 6018 return FALSE;
252b5132 6019
d1fad7c6
NC
6020 if (filename_ptr)
6021 *filename_ptr = filename;
6022 if (functionname_ptr)
6023 *functionname_ptr = bfd_asymbol_name (func);
6024
b34976b6 6025 return TRUE;
d1fad7c6
NC
6026}
6027
6028/* Find the nearest line to a particular section and offset,
6029 for error reporting. */
6030
b34976b6 6031bfd_boolean
217aa764
AM
6032_bfd_elf_find_nearest_line (bfd *abfd,
6033 asection *section,
6034 asymbol **symbols,
6035 bfd_vma offset,
6036 const char **filename_ptr,
6037 const char **functionname_ptr,
6038 unsigned int *line_ptr)
d1fad7c6 6039{
b34976b6 6040 bfd_boolean found;
d1fad7c6
NC
6041
6042 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6043 filename_ptr, functionname_ptr,
6044 line_ptr))
d1fad7c6
NC
6045 {
6046 if (!*functionname_ptr)
4e8a9624
AM
6047 elf_find_function (abfd, section, symbols, offset,
6048 *filename_ptr ? NULL : filename_ptr,
6049 functionname_ptr);
6050
b34976b6 6051 return TRUE;
d1fad7c6
NC
6052 }
6053
6054 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6055 filename_ptr, functionname_ptr,
6056 line_ptr, 0,
6057 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
6058 {
6059 if (!*functionname_ptr)
4e8a9624
AM
6060 elf_find_function (abfd, section, symbols, offset,
6061 *filename_ptr ? NULL : filename_ptr,
6062 functionname_ptr);
6063
b34976b6 6064 return TRUE;
d1fad7c6
NC
6065 }
6066
6067 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
6068 &found, filename_ptr,
6069 functionname_ptr, line_ptr,
6070 &elf_tdata (abfd)->line_info))
b34976b6 6071 return FALSE;
dc43ada5 6072 if (found && (*functionname_ptr || *line_ptr))
b34976b6 6073 return TRUE;
d1fad7c6
NC
6074
6075 if (symbols == NULL)
b34976b6 6076 return FALSE;
d1fad7c6
NC
6077
6078 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 6079 filename_ptr, functionname_ptr))
b34976b6 6080 return FALSE;
d1fad7c6 6081
252b5132 6082 *line_ptr = 0;
b34976b6 6083 return TRUE;
252b5132
RH
6084}
6085
6086int
217aa764 6087_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
6088{
6089 int ret;
6090
6091 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
6092 if (! reloc)
6093 ret += get_program_header_size (abfd);
6094 return ret;
6095}
6096
b34976b6 6097bfd_boolean
217aa764
AM
6098_bfd_elf_set_section_contents (bfd *abfd,
6099 sec_ptr section,
0f867abe 6100 const void *location,
217aa764
AM
6101 file_ptr offset,
6102 bfd_size_type count)
252b5132
RH
6103{
6104 Elf_Internal_Shdr *hdr;
dc810e39 6105 bfd_signed_vma pos;
252b5132
RH
6106
6107 if (! abfd->output_has_begun
217aa764 6108 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6109 return FALSE;
252b5132
RH
6110
6111 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
6112 pos = hdr->sh_offset + offset;
6113 if (bfd_seek (abfd, pos, SEEK_SET) != 0
6114 || bfd_bwrite (location, count, abfd) != count)
b34976b6 6115 return FALSE;
252b5132 6116
b34976b6 6117 return TRUE;
252b5132
RH
6118}
6119
6120void
217aa764
AM
6121_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
6122 arelent *cache_ptr ATTRIBUTE_UNUSED,
6123 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
6124{
6125 abort ();
6126}
6127
252b5132
RH
6128/* Try to convert a non-ELF reloc into an ELF one. */
6129
b34976b6 6130bfd_boolean
217aa764 6131_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 6132{
c044fabd 6133 /* Check whether we really have an ELF howto. */
252b5132
RH
6134
6135 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
6136 {
6137 bfd_reloc_code_real_type code;
6138 reloc_howto_type *howto;
6139
6140 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 6141 equivalent ELF reloc. */
252b5132
RH
6142
6143 if (areloc->howto->pc_relative)
6144 {
6145 switch (areloc->howto->bitsize)
6146 {
6147 case 8:
6148 code = BFD_RELOC_8_PCREL;
6149 break;
6150 case 12:
6151 code = BFD_RELOC_12_PCREL;
6152 break;
6153 case 16:
6154 code = BFD_RELOC_16_PCREL;
6155 break;
6156 case 24:
6157 code = BFD_RELOC_24_PCREL;
6158 break;
6159 case 32:
6160 code = BFD_RELOC_32_PCREL;
6161 break;
6162 case 64:
6163 code = BFD_RELOC_64_PCREL;
6164 break;
6165 default:
6166 goto fail;
6167 }
6168
6169 howto = bfd_reloc_type_lookup (abfd, code);
6170
6171 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
6172 {
6173 if (howto->pcrel_offset)
6174 areloc->addend += areloc->address;
6175 else
6176 areloc->addend -= areloc->address; /* addend is unsigned!! */
6177 }
6178 }
6179 else
6180 {
6181 switch (areloc->howto->bitsize)
6182 {
6183 case 8:
6184 code = BFD_RELOC_8;
6185 break;
6186 case 14:
6187 code = BFD_RELOC_14;
6188 break;
6189 case 16:
6190 code = BFD_RELOC_16;
6191 break;
6192 case 26:
6193 code = BFD_RELOC_26;
6194 break;
6195 case 32:
6196 code = BFD_RELOC_32;
6197 break;
6198 case 64:
6199 code = BFD_RELOC_64;
6200 break;
6201 default:
6202 goto fail;
6203 }
6204
6205 howto = bfd_reloc_type_lookup (abfd, code);
6206 }
6207
6208 if (howto)
6209 areloc->howto = howto;
6210 else
6211 goto fail;
6212 }
6213
b34976b6 6214 return TRUE;
252b5132
RH
6215
6216 fail:
6217 (*_bfd_error_handler)
6218 (_("%s: unsupported relocation type %s"),
8f615d07 6219 bfd_archive_filename (abfd), areloc->howto->name);
252b5132 6220 bfd_set_error (bfd_error_bad_value);
b34976b6 6221 return FALSE;
252b5132
RH
6222}
6223
b34976b6 6224bfd_boolean
217aa764 6225_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
6226{
6227 if (bfd_get_format (abfd) == bfd_object)
6228 {
6229 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 6230 _bfd_elf_strtab_free (elf_shstrtab (abfd));
252b5132
RH
6231 }
6232
6233 return _bfd_generic_close_and_cleanup (abfd);
6234}
6235
6236/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
6237 in the relocation's offset. Thus we cannot allow any sort of sanity
6238 range-checking to interfere. There is nothing else to do in processing
6239 this reloc. */
6240
6241bfd_reloc_status_type
217aa764
AM
6242_bfd_elf_rel_vtable_reloc_fn
6243 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 6244 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
6245 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
6246 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
6247{
6248 return bfd_reloc_ok;
6249}
252b5132
RH
6250\f
6251/* Elf core file support. Much of this only works on native
6252 toolchains, since we rely on knowing the
6253 machine-dependent procfs structure in order to pick
c044fabd 6254 out details about the corefile. */
252b5132
RH
6255
6256#ifdef HAVE_SYS_PROCFS_H
6257# include <sys/procfs.h>
6258#endif
6259
c044fabd 6260/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
6261
6262static int
217aa764 6263elfcore_make_pid (bfd *abfd)
252b5132
RH
6264{
6265 return ((elf_tdata (abfd)->core_lwpid << 16)
6266 + (elf_tdata (abfd)->core_pid));
6267}
6268
252b5132
RH
6269/* If there isn't a section called NAME, make one, using
6270 data from SECT. Note, this function will generate a
6271 reference to NAME, so you shouldn't deallocate or
c044fabd 6272 overwrite it. */
252b5132 6273
b34976b6 6274static bfd_boolean
217aa764 6275elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 6276{
c044fabd 6277 asection *sect2;
252b5132
RH
6278
6279 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 6280 return TRUE;
252b5132
RH
6281
6282 sect2 = bfd_make_section (abfd, name);
6283 if (sect2 == NULL)
b34976b6 6284 return FALSE;
252b5132
RH
6285
6286 sect2->_raw_size = sect->_raw_size;
6287 sect2->filepos = sect->filepos;
6288 sect2->flags = sect->flags;
6289 sect2->alignment_power = sect->alignment_power;
b34976b6 6290 return TRUE;
252b5132
RH
6291}
6292
bb0082d6
AM
6293/* Create a pseudosection containing SIZE bytes at FILEPOS. This
6294 actually creates up to two pseudosections:
6295 - For the single-threaded case, a section named NAME, unless
6296 such a section already exists.
6297 - For the multi-threaded case, a section named "NAME/PID", where
6298 PID is elfcore_make_pid (abfd).
6299 Both pseudosections have identical contents. */
b34976b6 6300bfd_boolean
217aa764
AM
6301_bfd_elfcore_make_pseudosection (bfd *abfd,
6302 char *name,
6303 size_t size,
6304 ufile_ptr filepos)
bb0082d6
AM
6305{
6306 char buf[100];
6307 char *threaded_name;
d4c88bbb 6308 size_t len;
bb0082d6
AM
6309 asection *sect;
6310
6311 /* Build the section name. */
6312
6313 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 6314 len = strlen (buf) + 1;
217aa764 6315 threaded_name = bfd_alloc (abfd, len);
bb0082d6 6316 if (threaded_name == NULL)
b34976b6 6317 return FALSE;
d4c88bbb 6318 memcpy (threaded_name, buf, len);
bb0082d6 6319
62f3bb11 6320 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 6321 if (sect == NULL)
b34976b6 6322 return FALSE;
bb0082d6
AM
6323 sect->_raw_size = size;
6324 sect->filepos = filepos;
6325 sect->flags = SEC_HAS_CONTENTS;
6326 sect->alignment_power = 2;
6327
936e320b 6328 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
6329}
6330
252b5132 6331/* prstatus_t exists on:
4a938328 6332 solaris 2.5+
252b5132
RH
6333 linux 2.[01] + glibc
6334 unixware 4.2
6335*/
6336
6337#if defined (HAVE_PRSTATUS_T)
a7b97311 6338
b34976b6 6339static bfd_boolean
217aa764 6340elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 6341{
dc810e39 6342 size_t raw_size;
7ee38065 6343 int offset;
252b5132 6344
4a938328
MS
6345 if (note->descsz == sizeof (prstatus_t))
6346 {
6347 prstatus_t prstat;
252b5132 6348
e0ebfc61 6349 raw_size = sizeof (prstat.pr_reg);
7ee38065 6350 offset = offsetof (prstatus_t, pr_reg);
4a938328 6351 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 6352
fa49d224
NC
6353 /* Do not overwrite the core signal if it
6354 has already been set by another thread. */
6355 if (elf_tdata (abfd)->core_signal == 0)
6356 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 6357 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 6358
4a938328
MS
6359 /* pr_who exists on:
6360 solaris 2.5+
6361 unixware 4.2
6362 pr_who doesn't exist on:
6363 linux 2.[01]
6364 */
252b5132 6365#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 6366 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 6367#endif
4a938328 6368 }
7ee38065 6369#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
6370 else if (note->descsz == sizeof (prstatus32_t))
6371 {
6372 /* 64-bit host, 32-bit corefile */
6373 prstatus32_t prstat;
6374
e0ebfc61 6375 raw_size = sizeof (prstat.pr_reg);
7ee38065 6376 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
6377 memcpy (&prstat, note->descdata, sizeof (prstat));
6378
fa49d224
NC
6379 /* Do not overwrite the core signal if it
6380 has already been set by another thread. */
6381 if (elf_tdata (abfd)->core_signal == 0)
6382 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
6383 elf_tdata (abfd)->core_pid = prstat.pr_pid;
6384
6385 /* pr_who exists on:
6386 solaris 2.5+
6387 unixware 4.2
6388 pr_who doesn't exist on:
6389 linux 2.[01]
6390 */
7ee38065 6391#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
6392 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
6393#endif
6394 }
7ee38065 6395#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
6396 else
6397 {
6398 /* Fail - we don't know how to handle any other
6399 note size (ie. data object type). */
b34976b6 6400 return TRUE;
4a938328 6401 }
252b5132 6402
bb0082d6 6403 /* Make a ".reg/999" section and a ".reg" section. */
936e320b
AM
6404 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
6405 raw_size, note->descpos + offset);
252b5132
RH
6406}
6407#endif /* defined (HAVE_PRSTATUS_T) */
6408
bb0082d6 6409/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 6410static bfd_boolean
217aa764
AM
6411elfcore_make_note_pseudosection (bfd *abfd,
6412 char *name,
6413 Elf_Internal_Note *note)
252b5132 6414{
936e320b
AM
6415 return _bfd_elfcore_make_pseudosection (abfd, name,
6416 note->descsz, note->descpos);
252b5132
RH
6417}
6418
ff08c6bb
JB
6419/* There isn't a consistent prfpregset_t across platforms,
6420 but it doesn't matter, because we don't have to pick this
c044fabd
KH
6421 data structure apart. */
6422
b34976b6 6423static bfd_boolean
217aa764 6424elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
6425{
6426 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
6427}
6428
ff08c6bb
JB
6429/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
6430 type of 5 (NT_PRXFPREG). Just include the whole note's contents
6431 literally. */
c044fabd 6432
b34976b6 6433static bfd_boolean
217aa764 6434elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
6435{
6436 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
6437}
6438
252b5132 6439#if defined (HAVE_PRPSINFO_T)
4a938328 6440typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 6441#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
6442typedef prpsinfo32_t elfcore_psinfo32_t;
6443#endif
252b5132
RH
6444#endif
6445
6446#if defined (HAVE_PSINFO_T)
4a938328 6447typedef psinfo_t elfcore_psinfo_t;
7ee38065 6448#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
6449typedef psinfo32_t elfcore_psinfo32_t;
6450#endif
252b5132
RH
6451#endif
6452
252b5132
RH
6453/* return a malloc'ed copy of a string at START which is at
6454 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 6455 the copy will always have a terminating '\0'. */
252b5132 6456
936e320b 6457char *
217aa764 6458_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 6459{
dc810e39 6460 char *dups;
c044fabd 6461 char *end = memchr (start, '\0', max);
dc810e39 6462 size_t len;
252b5132
RH
6463
6464 if (end == NULL)
6465 len = max;
6466 else
6467 len = end - start;
6468
217aa764 6469 dups = bfd_alloc (abfd, len + 1);
dc810e39 6470 if (dups == NULL)
252b5132
RH
6471 return NULL;
6472
dc810e39
AM
6473 memcpy (dups, start, len);
6474 dups[len] = '\0';
252b5132 6475
dc810e39 6476 return dups;
252b5132
RH
6477}
6478
bb0082d6 6479#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 6480static bfd_boolean
217aa764 6481elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 6482{
4a938328
MS
6483 if (note->descsz == sizeof (elfcore_psinfo_t))
6484 {
6485 elfcore_psinfo_t psinfo;
252b5132 6486
7ee38065 6487 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 6488
4a938328 6489 elf_tdata (abfd)->core_program
936e320b
AM
6490 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
6491 sizeof (psinfo.pr_fname));
252b5132 6492
4a938328 6493 elf_tdata (abfd)->core_command
936e320b
AM
6494 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
6495 sizeof (psinfo.pr_psargs));
4a938328 6496 }
7ee38065 6497#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
6498 else if (note->descsz == sizeof (elfcore_psinfo32_t))
6499 {
6500 /* 64-bit host, 32-bit corefile */
6501 elfcore_psinfo32_t psinfo;
6502
7ee38065 6503 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 6504
4a938328 6505 elf_tdata (abfd)->core_program
936e320b
AM
6506 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
6507 sizeof (psinfo.pr_fname));
4a938328
MS
6508
6509 elf_tdata (abfd)->core_command
936e320b
AM
6510 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
6511 sizeof (psinfo.pr_psargs));
4a938328
MS
6512 }
6513#endif
6514
6515 else
6516 {
6517 /* Fail - we don't know how to handle any other
6518 note size (ie. data object type). */
b34976b6 6519 return TRUE;
4a938328 6520 }
252b5132
RH
6521
6522 /* Note that for some reason, a spurious space is tacked
6523 onto the end of the args in some (at least one anyway)
c044fabd 6524 implementations, so strip it off if it exists. */
252b5132
RH
6525
6526 {
c044fabd 6527 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
6528 int n = strlen (command);
6529
6530 if (0 < n && command[n - 1] == ' ')
6531 command[n - 1] = '\0';
6532 }
6533
b34976b6 6534 return TRUE;
252b5132
RH
6535}
6536#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
6537
252b5132 6538#if defined (HAVE_PSTATUS_T)
b34976b6 6539static bfd_boolean
217aa764 6540elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 6541{
f572a39d
AM
6542 if (note->descsz == sizeof (pstatus_t)
6543#if defined (HAVE_PXSTATUS_T)
6544 || note->descsz == sizeof (pxstatus_t)
6545#endif
6546 )
4a938328
MS
6547 {
6548 pstatus_t pstat;
252b5132 6549
4a938328 6550 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 6551
4a938328
MS
6552 elf_tdata (abfd)->core_pid = pstat.pr_pid;
6553 }
7ee38065 6554#if defined (HAVE_PSTATUS32_T)
4a938328
MS
6555 else if (note->descsz == sizeof (pstatus32_t))
6556 {
6557 /* 64-bit host, 32-bit corefile */
6558 pstatus32_t pstat;
252b5132 6559
4a938328 6560 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 6561
4a938328
MS
6562 elf_tdata (abfd)->core_pid = pstat.pr_pid;
6563 }
6564#endif
252b5132
RH
6565 /* Could grab some more details from the "representative"
6566 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 6567 NT_LWPSTATUS note, presumably. */
252b5132 6568
b34976b6 6569 return TRUE;
252b5132
RH
6570}
6571#endif /* defined (HAVE_PSTATUS_T) */
6572
252b5132 6573#if defined (HAVE_LWPSTATUS_T)
b34976b6 6574static bfd_boolean
217aa764 6575elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
6576{
6577 lwpstatus_t lwpstat;
6578 char buf[100];
c044fabd 6579 char *name;
d4c88bbb 6580 size_t len;
c044fabd 6581 asection *sect;
252b5132 6582
f572a39d
AM
6583 if (note->descsz != sizeof (lwpstat)
6584#if defined (HAVE_LWPXSTATUS_T)
6585 && note->descsz != sizeof (lwpxstatus_t)
6586#endif
6587 )
b34976b6 6588 return TRUE;
252b5132
RH
6589
6590 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
6591
6592 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
6593 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
6594
c044fabd 6595 /* Make a ".reg/999" section. */
252b5132
RH
6596
6597 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 6598 len = strlen (buf) + 1;
217aa764 6599 name = bfd_alloc (abfd, len);
252b5132 6600 if (name == NULL)
b34976b6 6601 return FALSE;
d4c88bbb 6602 memcpy (name, buf, len);
252b5132 6603
62f3bb11 6604 sect = bfd_make_section_anyway (abfd, name);
252b5132 6605 if (sect == NULL)
b34976b6 6606 return FALSE;
252b5132
RH
6607
6608#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
6609 sect->_raw_size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
6610 sect->filepos = note->descpos
6611 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
6612#endif
6613
6614#if defined (HAVE_LWPSTATUS_T_PR_REG)
6615 sect->_raw_size = sizeof (lwpstat.pr_reg);
6616 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
6617#endif
6618
6619 sect->flags = SEC_HAS_CONTENTS;
6620 sect->alignment_power = 2;
6621
6622 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 6623 return FALSE;
252b5132
RH
6624
6625 /* Make a ".reg2/999" section */
6626
6627 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 6628 len = strlen (buf) + 1;
217aa764 6629 name = bfd_alloc (abfd, len);
252b5132 6630 if (name == NULL)
b34976b6 6631 return FALSE;
d4c88bbb 6632 memcpy (name, buf, len);
252b5132 6633
62f3bb11 6634 sect = bfd_make_section_anyway (abfd, name);
252b5132 6635 if (sect == NULL)
b34976b6 6636 return FALSE;
252b5132
RH
6637
6638#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
6639 sect->_raw_size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
6640 sect->filepos = note->descpos
6641 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
6642#endif
6643
6644#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
6645 sect->_raw_size = sizeof (lwpstat.pr_fpreg);
6646 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
6647#endif
6648
6649 sect->flags = SEC_HAS_CONTENTS;
6650 sect->alignment_power = 2;
6651
936e320b 6652 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
6653}
6654#endif /* defined (HAVE_LWPSTATUS_T) */
6655
16e9c715 6656#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 6657static bfd_boolean
217aa764 6658elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
6659{
6660 char buf[30];
c044fabd 6661 char *name;
d4c88bbb 6662 size_t len;
c044fabd 6663 asection *sect;
16e9c715
NC
6664 win32_pstatus_t pstatus;
6665
6666 if (note->descsz < sizeof (pstatus))
b34976b6 6667 return TRUE;
16e9c715 6668
e8eab623 6669 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
6670
6671 switch (pstatus.data_type)
16e9c715
NC
6672 {
6673 case NOTE_INFO_PROCESS:
6674 /* FIXME: need to add ->core_command. */
6675 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
6676 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 6677 break;
16e9c715
NC
6678
6679 case NOTE_INFO_THREAD:
6680 /* Make a ".reg/999" section. */
6681 sprintf (buf, ".reg/%d", pstatus.data.thread_info.tid);
c044fabd 6682
d4c88bbb 6683 len = strlen (buf) + 1;
217aa764 6684 name = bfd_alloc (abfd, len);
16e9c715 6685 if (name == NULL)
b34976b6 6686 return FALSE;
c044fabd 6687
d4c88bbb 6688 memcpy (name, buf, len);
16e9c715 6689
62f3bb11 6690 sect = bfd_make_section_anyway (abfd, name);
16e9c715 6691 if (sect == NULL)
b34976b6 6692 return FALSE;
c044fabd 6693
16e9c715 6694 sect->_raw_size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
6695 sect->filepos = (note->descpos
6696 + offsetof (struct win32_pstatus,
6697 data.thread_info.thread_context));
16e9c715
NC
6698 sect->flags = SEC_HAS_CONTENTS;
6699 sect->alignment_power = 2;
6700
6701 if (pstatus.data.thread_info.is_active_thread)
6702 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 6703 return FALSE;
16e9c715
NC
6704 break;
6705
6706 case NOTE_INFO_MODULE:
6707 /* Make a ".module/xxxxxxxx" section. */
c044fabd
KH
6708 sprintf (buf, ".module/%08x", pstatus.data.module_info.base_address);
6709
d4c88bbb 6710 len = strlen (buf) + 1;
217aa764 6711 name = bfd_alloc (abfd, len);
16e9c715 6712 if (name == NULL)
b34976b6 6713 return FALSE;
c044fabd 6714
d4c88bbb 6715 memcpy (name, buf, len);
252b5132 6716
62f3bb11 6717 sect = bfd_make_section_anyway (abfd, name);
c044fabd 6718
16e9c715 6719 if (sect == NULL)
b34976b6 6720 return FALSE;
c044fabd 6721
16e9c715
NC
6722 sect->_raw_size = note->descsz;
6723 sect->filepos = note->descpos;
6724 sect->flags = SEC_HAS_CONTENTS;
6725 sect->alignment_power = 2;
6726 break;
6727
6728 default:
b34976b6 6729 return TRUE;
16e9c715
NC
6730 }
6731
b34976b6 6732 return TRUE;
16e9c715
NC
6733}
6734#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 6735
b34976b6 6736static bfd_boolean
217aa764 6737elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 6738{
9c5bfbb7 6739 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 6740
252b5132
RH
6741 switch (note->type)
6742 {
6743 default:
b34976b6 6744 return TRUE;
252b5132 6745
252b5132 6746 case NT_PRSTATUS:
bb0082d6
AM
6747 if (bed->elf_backend_grok_prstatus)
6748 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 6749 return TRUE;
bb0082d6 6750#if defined (HAVE_PRSTATUS_T)
252b5132 6751 return elfcore_grok_prstatus (abfd, note);
bb0082d6 6752#else
b34976b6 6753 return TRUE;
252b5132
RH
6754#endif
6755
6756#if defined (HAVE_PSTATUS_T)
6757 case NT_PSTATUS:
6758 return elfcore_grok_pstatus (abfd, note);
6759#endif
6760
6761#if defined (HAVE_LWPSTATUS_T)
6762 case NT_LWPSTATUS:
6763 return elfcore_grok_lwpstatus (abfd, note);
6764#endif
6765
6766 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
6767 return elfcore_grok_prfpreg (abfd, note);
6768
16e9c715 6769#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 6770 case NT_WIN32PSTATUS:
16e9c715
NC
6771 return elfcore_grok_win32pstatus (abfd, note);
6772#endif
6773
c044fabd 6774 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
6775 if (note->namesz == 6
6776 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
6777 return elfcore_grok_prxfpreg (abfd, note);
6778 else
b34976b6 6779 return TRUE;
ff08c6bb 6780
252b5132
RH
6781 case NT_PRPSINFO:
6782 case NT_PSINFO:
bb0082d6
AM
6783 if (bed->elf_backend_grok_psinfo)
6784 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 6785 return TRUE;
bb0082d6 6786#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 6787 return elfcore_grok_psinfo (abfd, note);
bb0082d6 6788#else
b34976b6 6789 return TRUE;
252b5132 6790#endif
3333a7c3
RM
6791
6792 case NT_AUXV:
6793 {
62f3bb11 6794 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
6795
6796 if (sect == NULL)
6797 return FALSE;
6798 sect->_raw_size = note->descsz;
6799 sect->filepos = note->descpos;
6800 sect->flags = SEC_HAS_CONTENTS;
6801 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
6802
6803 return TRUE;
6804 }
252b5132
RH
6805 }
6806}
6807
b34976b6 6808static bfd_boolean
217aa764 6809elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
6810{
6811 char *cp;
6812
6813 cp = strchr (note->namedata, '@');
6814 if (cp != NULL)
6815 {
d2b64500 6816 *lwpidp = atoi(cp + 1);
b34976b6 6817 return TRUE;
50b2bdb7 6818 }
b34976b6 6819 return FALSE;
50b2bdb7
AM
6820}
6821
b34976b6 6822static bfd_boolean
217aa764 6823elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
6824{
6825
6826 /* Signal number at offset 0x08. */
6827 elf_tdata (abfd)->core_signal
6828 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
6829
6830 /* Process ID at offset 0x50. */
6831 elf_tdata (abfd)->core_pid
6832 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
6833
6834 /* Command name at 0x7c (max 32 bytes, including nul). */
6835 elf_tdata (abfd)->core_command
6836 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
6837
b34976b6 6838 return TRUE;
50b2bdb7
AM
6839}
6840
b34976b6 6841static bfd_boolean
217aa764 6842elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
6843{
6844 int lwp;
6845
6846 if (elfcore_netbsd_get_lwpid (note, &lwp))
6847 elf_tdata (abfd)->core_lwpid = lwp;
6848
b4db1224 6849 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
6850 {
6851 /* NetBSD-specific core "procinfo". Note that we expect to
6852 find this note before any of the others, which is fine,
6853 since the kernel writes this note out first when it
6854 creates a core file. */
47d9a591 6855
50b2bdb7
AM
6856 return elfcore_grok_netbsd_procinfo (abfd, note);
6857 }
6858
b4db1224
JT
6859 /* As of Jan 2002 there are no other machine-independent notes
6860 defined for NetBSD core files. If the note type is less
6861 than the start of the machine-dependent note types, we don't
6862 understand it. */
47d9a591 6863
b4db1224 6864 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 6865 return TRUE;
50b2bdb7
AM
6866
6867
6868 switch (bfd_get_arch (abfd))
6869 {
6870 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
6871 PT_GETFPREGS == mach+2. */
6872
6873 case bfd_arch_alpha:
6874 case bfd_arch_sparc:
6875 switch (note->type)
6876 {
b4db1224 6877 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
6878 return elfcore_make_note_pseudosection (abfd, ".reg", note);
6879
b4db1224 6880 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
6881 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
6882
6883 default:
b34976b6 6884 return TRUE;
50b2bdb7
AM
6885 }
6886
6887 /* On all other arch's, PT_GETREGS == mach+1 and
6888 PT_GETFPREGS == mach+3. */
6889
6890 default:
6891 switch (note->type)
6892 {
b4db1224 6893 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
6894 return elfcore_make_note_pseudosection (abfd, ".reg", note);
6895
b4db1224 6896 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
6897 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
6898
6899 default:
b34976b6 6900 return TRUE;
50b2bdb7
AM
6901 }
6902 }
6903 /* NOTREACHED */
6904}
6905
07c6e936 6906static bfd_boolean
217aa764 6907elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
6908{
6909 void *ddata = note->descdata;
6910 char buf[100];
6911 char *name;
6912 asection *sect;
f8843e87
AM
6913 short sig;
6914 unsigned flags;
07c6e936
NC
6915
6916 /* nto_procfs_status 'pid' field is at offset 0. */
6917 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
6918
f8843e87
AM
6919 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
6920 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
6921
6922 /* nto_procfs_status 'flags' field is at offset 8. */
6923 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
6924
6925 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
6926 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
6927 {
6928 elf_tdata (abfd)->core_signal = sig;
6929 elf_tdata (abfd)->core_lwpid = *tid;
6930 }
07c6e936 6931
f8843e87
AM
6932 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
6933 do not come from signals so we make sure we set the current
6934 thread just in case. */
6935 if (flags & 0x00000080)
6936 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
6937
6938 /* Make a ".qnx_core_status/%d" section. */
6939 sprintf (buf, ".qnx_core_status/%d", *tid);
6940
217aa764 6941 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
6942 if (name == NULL)
6943 return FALSE;
6944 strcpy (name, buf);
6945
62f3bb11 6946 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
6947 if (sect == NULL)
6948 return FALSE;
6949
6950 sect->_raw_size = note->descsz;
6951 sect->filepos = note->descpos;
6952 sect->flags = SEC_HAS_CONTENTS;
6953 sect->alignment_power = 2;
6954
6955 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
6956}
6957
6958static bfd_boolean
217aa764 6959elfcore_grok_nto_gregs (bfd *abfd, Elf_Internal_Note *note, pid_t tid)
07c6e936
NC
6960{
6961 char buf[100];
6962 char *name;
6963 asection *sect;
6964
6965 /* Make a ".reg/%d" section. */
6966 sprintf (buf, ".reg/%d", tid);
6967
217aa764 6968 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
6969 if (name == NULL)
6970 return FALSE;
6971 strcpy (name, buf);
6972
62f3bb11 6973 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
6974 if (sect == NULL)
6975 return FALSE;
6976
6977 sect->_raw_size = note->descsz;
6978 sect->filepos = note->descpos;
6979 sect->flags = SEC_HAS_CONTENTS;
6980 sect->alignment_power = 2;
6981
f8843e87
AM
6982 /* This is the current thread. */
6983 if (elf_tdata (abfd)->core_lwpid == tid)
6984 return elfcore_maybe_make_sect (abfd, ".reg", sect);
6985
6986 return TRUE;
07c6e936
NC
6987}
6988
6989#define BFD_QNT_CORE_INFO 7
6990#define BFD_QNT_CORE_STATUS 8
6991#define BFD_QNT_CORE_GREG 9
6992#define BFD_QNT_CORE_FPREG 10
6993
6994static bfd_boolean
217aa764 6995elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
6996{
6997 /* Every GREG section has a STATUS section before it. Store the
811072d8 6998 tid from the previous call to pass down to the next gregs
07c6e936
NC
6999 function. */
7000 static pid_t tid = 1;
7001
7002 switch (note->type)
7003 {
7004 case BFD_QNT_CORE_INFO: return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
7005 case BFD_QNT_CORE_STATUS: return elfcore_grok_nto_status (abfd, note, &tid);
7006 case BFD_QNT_CORE_GREG: return elfcore_grok_nto_gregs (abfd, note, tid);
7007 case BFD_QNT_CORE_FPREG: return elfcore_grok_prfpreg (abfd, note);
7008 default: return TRUE;
7009 }
7010}
7011
7c76fa91
MS
7012/* Function: elfcore_write_note
7013
47d9a591 7014 Inputs:
7c76fa91
MS
7015 buffer to hold note
7016 name of note
7017 type of note
7018 data for note
7019 size of data for note
7020
7021 Return:
7022 End of buffer containing note. */
7023
7024char *
217aa764
AM
7025elfcore_write_note (bfd *abfd,
7026 char *buf,
7027 int *bufsiz,
7028 const char *name,
7029 int type,
7030 const void *input,
7031 int size)
7c76fa91
MS
7032{
7033 Elf_External_Note *xnp;
d4c88bbb
AM
7034 size_t namesz;
7035 size_t pad;
7036 size_t newspace;
7c76fa91
MS
7037 char *p, *dest;
7038
d4c88bbb
AM
7039 namesz = 0;
7040 pad = 0;
7041 if (name != NULL)
7042 {
9c5bfbb7 7043 const struct elf_backend_data *bed;
d4c88bbb
AM
7044
7045 namesz = strlen (name) + 1;
7046 bed = get_elf_backend_data (abfd);
45d6a902 7047 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
7048 }
7049
5de3bf90 7050 newspace = 12 + namesz + pad + size;
d4c88bbb 7051
7c76fa91
MS
7052 p = realloc (buf, *bufsiz + newspace);
7053 dest = p + *bufsiz;
7054 *bufsiz += newspace;
7055 xnp = (Elf_External_Note *) dest;
7056 H_PUT_32 (abfd, namesz, xnp->namesz);
7057 H_PUT_32 (abfd, size, xnp->descsz);
7058 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
7059 dest = xnp->name;
7060 if (name != NULL)
7061 {
7062 memcpy (dest, name, namesz);
7063 dest += namesz;
7064 while (pad != 0)
7065 {
7066 *dest++ = '\0';
7067 --pad;
7068 }
7069 }
7070 memcpy (dest, input, size);
7c76fa91
MS
7071 return p;
7072}
7073
7074#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
7075char *
217aa764
AM
7076elfcore_write_prpsinfo (bfd *abfd,
7077 char *buf,
7078 int *bufsiz,
7079 const char *fname,
7080 const char *psargs)
7c76fa91
MS
7081{
7082 int note_type;
7083 char *note_name = "CORE";
7084
7085#if defined (HAVE_PSINFO_T)
7086 psinfo_t data;
7087 note_type = NT_PSINFO;
7088#else
7089 prpsinfo_t data;
7090 note_type = NT_PRPSINFO;
7091#endif
7092
7093 memset (&data, 0, sizeof (data));
7094 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
7095 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 7096 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7097 note_name, note_type, &data, sizeof (data));
7098}
7099#endif /* PSINFO_T or PRPSINFO_T */
7100
7101#if defined (HAVE_PRSTATUS_T)
7102char *
217aa764
AM
7103elfcore_write_prstatus (bfd *abfd,
7104 char *buf,
7105 int *bufsiz,
7106 long pid,
7107 int cursig,
7108 const void *gregs)
7c76fa91
MS
7109{
7110 prstatus_t prstat;
7111 char *note_name = "CORE";
7112
7113 memset (&prstat, 0, sizeof (prstat));
7114 prstat.pr_pid = pid;
7115 prstat.pr_cursig = cursig;
c106e334 7116 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 7117 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7118 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
7119}
7120#endif /* HAVE_PRSTATUS_T */
7121
51316059
MS
7122#if defined (HAVE_LWPSTATUS_T)
7123char *
217aa764
AM
7124elfcore_write_lwpstatus (bfd *abfd,
7125 char *buf,
7126 int *bufsiz,
7127 long pid,
7128 int cursig,
7129 const void *gregs)
51316059
MS
7130{
7131 lwpstatus_t lwpstat;
7132 char *note_name = "CORE";
7133
7134 memset (&lwpstat, 0, sizeof (lwpstat));
7135 lwpstat.pr_lwpid = pid >> 16;
7136 lwpstat.pr_cursig = cursig;
7137#if defined (HAVE_LWPSTATUS_T_PR_REG)
7138 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
7139#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
7140#if !defined(gregs)
7141 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
7142 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
7143#else
7144 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
7145 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
7146#endif
7147#endif
47d9a591 7148 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7149 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
7150}
7151#endif /* HAVE_LWPSTATUS_T */
7152
7c76fa91
MS
7153#if defined (HAVE_PSTATUS_T)
7154char *
217aa764
AM
7155elfcore_write_pstatus (bfd *abfd,
7156 char *buf,
7157 int *bufsiz,
7158 long pid,
7159 int cursig,
7160 const void *gregs)
7c76fa91
MS
7161{
7162 pstatus_t pstat;
7163 char *note_name = "CORE";
7164
51316059
MS
7165 memset (&pstat, 0, sizeof (pstat));
7166 pstat.pr_pid = pid & 0xffff;
47d9a591 7167 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7168 NT_PSTATUS, &pstat, sizeof (pstat));
7169 return buf;
7c76fa91
MS
7170}
7171#endif /* HAVE_PSTATUS_T */
7172
7173char *
217aa764
AM
7174elfcore_write_prfpreg (bfd *abfd,
7175 char *buf,
7176 int *bufsiz,
7177 const void *fpregs,
7178 int size)
7c76fa91
MS
7179{
7180 char *note_name = "CORE";
47d9a591 7181 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7182 note_name, NT_FPREGSET, fpregs, size);
7183}
7184
7185char *
217aa764
AM
7186elfcore_write_prxfpreg (bfd *abfd,
7187 char *buf,
7188 int *bufsiz,
7189 const void *xfpregs,
7190 int size)
7c76fa91
MS
7191{
7192 char *note_name = "LINUX";
47d9a591 7193 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7194 note_name, NT_PRXFPREG, xfpregs, size);
7195}
7196
b34976b6 7197static bfd_boolean
217aa764 7198elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 7199{
c044fabd
KH
7200 char *buf;
7201 char *p;
252b5132
RH
7202
7203 if (size <= 0)
b34976b6 7204 return TRUE;
252b5132 7205
dc810e39 7206 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 7207 return FALSE;
252b5132 7208
dc810e39 7209 buf = bfd_malloc (size);
252b5132 7210 if (buf == NULL)
b34976b6 7211 return FALSE;
252b5132 7212
dc810e39 7213 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
7214 {
7215 error:
7216 free (buf);
b34976b6 7217 return FALSE;
252b5132
RH
7218 }
7219
7220 p = buf;
7221 while (p < buf + size)
7222 {
c044fabd
KH
7223 /* FIXME: bad alignment assumption. */
7224 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
7225 Elf_Internal_Note in;
7226
dc810e39 7227 in.type = H_GET_32 (abfd, xnp->type);
252b5132 7228
dc810e39 7229 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
7230 in.namedata = xnp->name;
7231
dc810e39 7232 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
7233 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
7234 in.descpos = offset + (in.descdata - buf);
7235
50b2bdb7
AM
7236 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
7237 {
7238 if (! elfcore_grok_netbsd_note (abfd, &in))
7239 goto error;
7240 }
07c6e936
NC
7241 else if (strncmp (in.namedata, "QNX", 3) == 0)
7242 {
7243 if (! elfcore_grok_nto_note (abfd, &in))
7244 goto error;
7245 }
50b2bdb7
AM
7246 else
7247 {
7248 if (! elfcore_grok_note (abfd, &in))
7249 goto error;
7250 }
252b5132
RH
7251
7252 p = in.descdata + BFD_ALIGN (in.descsz, 4);
7253 }
7254
7255 free (buf);
b34976b6 7256 return TRUE;
252b5132 7257}
98d8431c
JB
7258\f
7259/* Providing external access to the ELF program header table. */
7260
7261/* Return an upper bound on the number of bytes required to store a
7262 copy of ABFD's program header table entries. Return -1 if an error
7263 occurs; bfd_get_error will return an appropriate code. */
c044fabd 7264
98d8431c 7265long
217aa764 7266bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
7267{
7268 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7269 {
7270 bfd_set_error (bfd_error_wrong_format);
7271 return -1;
7272 }
7273
936e320b 7274 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
7275}
7276
98d8431c
JB
7277/* Copy ABFD's program header table entries to *PHDRS. The entries
7278 will be stored as an array of Elf_Internal_Phdr structures, as
7279 defined in include/elf/internal.h. To find out how large the
7280 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
7281
7282 Return the number of program header table entries read, or -1 if an
7283 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 7284
98d8431c 7285int
217aa764 7286bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
7287{
7288 int num_phdrs;
7289
7290 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7291 {
7292 bfd_set_error (bfd_error_wrong_format);
7293 return -1;
7294 }
7295
7296 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 7297 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
7298 num_phdrs * sizeof (Elf_Internal_Phdr));
7299
7300 return num_phdrs;
7301}
ae4221d7
L
7302
7303void
217aa764 7304_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 7305{
d3b05f8d 7306#ifdef BFD64
ae4221d7
L
7307 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7308
7309 i_ehdrp = elf_elfheader (abfd);
7310 if (i_ehdrp == NULL)
7311 sprintf_vma (buf, value);
7312 else
7313 {
7314 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7315 {
ae4221d7 7316#if BFD_HOST_64BIT_LONG
cc55aec9 7317 sprintf (buf, "%016lx", value);
ae4221d7 7318#else
cc55aec9
AM
7319 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
7320 _bfd_int64_low (value));
ae4221d7 7321#endif
cc55aec9 7322 }
ae4221d7
L
7323 else
7324 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
7325 }
d3b05f8d
L
7326#else
7327 sprintf_vma (buf, value);
7328#endif
ae4221d7
L
7329}
7330
7331void
217aa764 7332_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 7333{
d3b05f8d 7334#ifdef BFD64
ae4221d7
L
7335 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7336
7337 i_ehdrp = elf_elfheader (abfd);
7338 if (i_ehdrp == NULL)
7339 fprintf_vma ((FILE *) stream, value);
7340 else
7341 {
7342 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7343 {
ae4221d7 7344#if BFD_HOST_64BIT_LONG
cc55aec9 7345 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 7346#else
cc55aec9
AM
7347 fprintf ((FILE *) stream, "%08lx%08lx",
7348 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 7349#endif
cc55aec9 7350 }
ae4221d7
L
7351 else
7352 fprintf ((FILE *) stream, "%08lx",
7353 (unsigned long) (value & 0xffffffff));
7354 }
d3b05f8d
L
7355#else
7356 fprintf_vma ((FILE *) stream, value);
7357#endif
ae4221d7 7358}
db6751f2
JJ
7359
7360enum elf_reloc_type_class
217aa764 7361_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
7362{
7363 return reloc_class_normal;
7364}
f8df10f4 7365
47d9a591 7366/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
7367 relocation against a local symbol. */
7368
7369bfd_vma
217aa764
AM
7370_bfd_elf_rela_local_sym (bfd *abfd,
7371 Elf_Internal_Sym *sym,
8517fae7 7372 asection **psec,
217aa764 7373 Elf_Internal_Rela *rel)
f8df10f4 7374{
8517fae7 7375 asection *sec = *psec;
f8df10f4
JJ
7376 bfd_vma relocation;
7377
7378 relocation = (sec->output_section->vma
7379 + sec->output_offset
7380 + sym->st_value);
7381 if ((sec->flags & SEC_MERGE)
c629eae0 7382 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 7383 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 7384 {
f8df10f4 7385 rel->r_addend =
8517fae7 7386 _bfd_merged_section_offset (abfd, psec,
65765700 7387 elf_section_data (sec)->sec_info,
f8df10f4 7388 sym->st_value + rel->r_addend,
8517fae7
AM
7389 0);
7390 sec = *psec;
7391 rel->r_addend -= relocation;
7392 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
7393 }
7394 return relocation;
7395}
c629eae0
JJ
7396
7397bfd_vma
217aa764
AM
7398_bfd_elf_rel_local_sym (bfd *abfd,
7399 Elf_Internal_Sym *sym,
7400 asection **psec,
7401 bfd_vma addend)
47d9a591 7402{
c629eae0
JJ
7403 asection *sec = *psec;
7404
68bfbfcc 7405 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
7406 return sym->st_value + addend;
7407
7408 return _bfd_merged_section_offset (abfd, psec,
65765700 7409 elf_section_data (sec)->sec_info,
217aa764 7410 sym->st_value + addend, 0);
c629eae0
JJ
7411}
7412
7413bfd_vma
217aa764
AM
7414_bfd_elf_section_offset (bfd *abfd,
7415 struct bfd_link_info *info,
7416 asection *sec,
7417 bfd_vma offset)
c629eae0
JJ
7418{
7419 struct bfd_elf_section_data *sec_data;
7420
7421 sec_data = elf_section_data (sec);
68bfbfcc 7422 switch (sec->sec_info_type)
65765700
JJ
7423 {
7424 case ELF_INFO_TYPE_STABS:
126495ed
AM
7425 return _bfd_stab_section_offset (abfd,
7426 &elf_hash_table (info)->merge_info,
7427 sec, &sec_data->sec_info, offset);
65765700
JJ
7428 case ELF_INFO_TYPE_EH_FRAME:
7429 return _bfd_elf_eh_frame_section_offset (abfd, sec, offset);
7430 default:
7431 return offset;
7432 }
c629eae0 7433}
3333a7c3
RM
7434\f
7435/* Create a new BFD as if by bfd_openr. Rather than opening a file,
7436 reconstruct an ELF file by reading the segments out of remote memory
7437 based on the ELF file header at EHDR_VMA and the ELF program headers it
7438 points to. If not null, *LOADBASEP is filled in with the difference
7439 between the VMAs from which the segments were read, and the VMAs the
7440 file headers (and hence BFD's idea of each section's VMA) put them at.
7441
7442 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
7443 remote memory at target address VMA into the local buffer at MYADDR; it
7444 should return zero on success or an `errno' code on failure. TEMPL must
7445 be a BFD for an ELF target with the word size and byte order found in
7446 the remote memory. */
7447
7448bfd *
217aa764
AM
7449bfd_elf_bfd_from_remote_memory
7450 (bfd *templ,
7451 bfd_vma ehdr_vma,
7452 bfd_vma *loadbasep,
7453 int (*target_read_memory) (bfd_vma, char *, int))
3333a7c3
RM
7454{
7455 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
7456 (templ, ehdr_vma, loadbasep, target_read_memory);
7457}