]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
* config/tc-ppc.c (parse_cpu): Handle "-mpower5".
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
8615f3f2 4 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
661a3fd4 22/* SECTION
47d9a591 23
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
209/* Read a specified number of bytes at a specified offset in an ELF
210 file, into a newly allocated buffer, and return a pointer to the
c044fabd 211 buffer. */
252b5132 212
f075ee0c 213static bfd_byte *
217aa764 214elf_read (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 215{
f075ee0c 216 bfd_byte *buf;
252b5132
RH
217
218 if ((buf = bfd_alloc (abfd, size)) == NULL)
219 return NULL;
dc810e39 220 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
252b5132 221 return NULL;
217aa764 222 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
223 {
224 if (bfd_get_error () != bfd_error_system_call)
225 bfd_set_error (bfd_error_file_truncated);
226 return NULL;
227 }
228 return buf;
229}
230
b34976b6 231bfd_boolean
217aa764 232bfd_elf_mkobject (bfd *abfd)
252b5132 233{
c044fabd
KH
234 /* This just does initialization. */
235 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 236 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 237 if (elf_tdata (abfd) == 0)
b34976b6 238 return FALSE;
c044fabd
KH
239 /* Since everything is done at close time, do we need any
240 initialization? */
252b5132 241
b34976b6 242 return TRUE;
252b5132
RH
243}
244
b34976b6 245bfd_boolean
217aa764 246bfd_elf_mkcorefile (bfd *abfd)
252b5132 247{
c044fabd 248 /* I think this can be done just like an object file. */
252b5132
RH
249 return bfd_elf_mkobject (abfd);
250}
251
252char *
217aa764 253bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
254{
255 Elf_Internal_Shdr **i_shdrp;
f075ee0c 256 bfd_byte *shstrtab = NULL;
dc810e39
AM
257 file_ptr offset;
258 bfd_size_type shstrtabsize;
252b5132
RH
259
260 i_shdrp = elf_elfsections (abfd);
261 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 262 return NULL;
252b5132 263
f075ee0c 264 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
265 if (shstrtab == NULL)
266 {
c044fabd 267 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
268 offset = i_shdrp[shindex]->sh_offset;
269 shstrtabsize = i_shdrp[shindex]->sh_size;
270 shstrtab = elf_read (abfd, offset, shstrtabsize);
217aa764 271 i_shdrp[shindex]->contents = shstrtab;
252b5132 272 }
f075ee0c 273 return (char *) shstrtab;
252b5132
RH
274}
275
276char *
217aa764
AM
277bfd_elf_string_from_elf_section (bfd *abfd,
278 unsigned int shindex,
279 unsigned int strindex)
252b5132
RH
280{
281 Elf_Internal_Shdr *hdr;
282
283 if (strindex == 0)
284 return "";
285
286 hdr = elf_elfsections (abfd)[shindex];
287
288 if (hdr->contents == NULL
289 && bfd_elf_get_str_section (abfd, shindex) == NULL)
290 return NULL;
291
292 if (strindex >= hdr->sh_size)
293 {
1b3a8575 294 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 295 (*_bfd_error_handler)
d003868e
AM
296 (_("%B: invalid string offset %u >= %lu for section `%s'"),
297 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 298 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 299 ? ".shstrtab"
1b3a8575 300 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
301 return "";
302 }
303
304 return ((char *) hdr->contents) + strindex;
305}
306
6cdc0ccc
AM
307/* Read and convert symbols to internal format.
308 SYMCOUNT specifies the number of symbols to read, starting from
309 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
310 are non-NULL, they are used to store the internal symbols, external
311 symbols, and symbol section index extensions, respectively. */
312
313Elf_Internal_Sym *
217aa764
AM
314bfd_elf_get_elf_syms (bfd *ibfd,
315 Elf_Internal_Shdr *symtab_hdr,
316 size_t symcount,
317 size_t symoffset,
318 Elf_Internal_Sym *intsym_buf,
319 void *extsym_buf,
320 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
321{
322 Elf_Internal_Shdr *shndx_hdr;
217aa764 323 void *alloc_ext;
df622259 324 const bfd_byte *esym;
6cdc0ccc
AM
325 Elf_External_Sym_Shndx *alloc_extshndx;
326 Elf_External_Sym_Shndx *shndx;
327 Elf_Internal_Sym *isym;
328 Elf_Internal_Sym *isymend;
9c5bfbb7 329 const struct elf_backend_data *bed;
6cdc0ccc
AM
330 size_t extsym_size;
331 bfd_size_type amt;
332 file_ptr pos;
333
334 if (symcount == 0)
335 return intsym_buf;
336
337 /* Normal syms might have section extension entries. */
338 shndx_hdr = NULL;
339 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
340 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
341
342 /* Read the symbols. */
343 alloc_ext = NULL;
344 alloc_extshndx = NULL;
345 bed = get_elf_backend_data (ibfd);
346 extsym_size = bed->s->sizeof_sym;
347 amt = symcount * extsym_size;
348 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
349 if (extsym_buf == NULL)
350 {
351 alloc_ext = bfd_malloc (amt);
352 extsym_buf = alloc_ext;
353 }
354 if (extsym_buf == NULL
355 || bfd_seek (ibfd, pos, SEEK_SET) != 0
356 || bfd_bread (extsym_buf, amt, ibfd) != amt)
357 {
358 intsym_buf = NULL;
359 goto out;
360 }
361
362 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
363 extshndx_buf = NULL;
364 else
365 {
366 amt = symcount * sizeof (Elf_External_Sym_Shndx);
367 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
368 if (extshndx_buf == NULL)
369 {
217aa764 370 alloc_extshndx = bfd_malloc (amt);
6cdc0ccc
AM
371 extshndx_buf = alloc_extshndx;
372 }
373 if (extshndx_buf == NULL
374 || bfd_seek (ibfd, pos, SEEK_SET) != 0
375 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
376 {
377 intsym_buf = NULL;
378 goto out;
379 }
380 }
381
382 if (intsym_buf == NULL)
383 {
384 bfd_size_type amt = symcount * sizeof (Elf_Internal_Sym);
217aa764 385 intsym_buf = bfd_malloc (amt);
6cdc0ccc
AM
386 if (intsym_buf == NULL)
387 goto out;
388 }
389
390 /* Convert the symbols to internal form. */
391 isymend = intsym_buf + symcount;
392 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
393 isym < isymend;
394 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 395 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
396
397 out:
398 if (alloc_ext != NULL)
399 free (alloc_ext);
400 if (alloc_extshndx != NULL)
401 free (alloc_extshndx);
402
403 return intsym_buf;
404}
405
5cab59f6
AM
406/* Look up a symbol name. */
407const char *
be8dd2ca
AM
408bfd_elf_sym_name (bfd *abfd,
409 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
410 Elf_Internal_Sym *isym,
411 asection *sym_sec)
5cab59f6 412{
26c61ae5 413 const char *name;
5cab59f6 414 unsigned int iname = isym->st_name;
be8dd2ca 415 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 416
138f35cc
JJ
417 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
418 /* Check for a bogus st_shndx to avoid crashing. */
419 && isym->st_shndx < elf_numsections (abfd)
420 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
421 {
422 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
423 shindex = elf_elfheader (abfd)->e_shstrndx;
424 }
425
26c61ae5
L
426 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
427 if (name == NULL)
428 name = "(null)";
429 else if (sym_sec && *name == '\0')
430 name = bfd_section_name (abfd, sym_sec);
431
432 return name;
5cab59f6
AM
433}
434
dbb410c3
AM
435/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
436 sections. The first element is the flags, the rest are section
437 pointers. */
438
439typedef union elf_internal_group {
440 Elf_Internal_Shdr *shdr;
441 unsigned int flags;
442} Elf_Internal_Group;
443
b885599b
AM
444/* Return the name of the group signature symbol. Why isn't the
445 signature just a string? */
446
447static const char *
217aa764 448group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 449{
9dce4196 450 Elf_Internal_Shdr *hdr;
9dce4196
AM
451 unsigned char esym[sizeof (Elf64_External_Sym)];
452 Elf_External_Sym_Shndx eshndx;
453 Elf_Internal_Sym isym;
b885599b 454
13792e9d
L
455 /* First we need to ensure the symbol table is available. Make sure
456 that it is a symbol table section. */
457 hdr = elf_elfsections (abfd) [ghdr->sh_link];
458 if (hdr->sh_type != SHT_SYMTAB
459 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
460 return NULL;
461
9dce4196
AM
462 /* Go read the symbol. */
463 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
464 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
465 &isym, esym, &eshndx) == NULL)
b885599b 466 return NULL;
9dce4196 467
26c61ae5 468 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
469}
470
dbb410c3
AM
471/* Set next_in_group list pointer, and group name for NEWSECT. */
472
b34976b6 473static bfd_boolean
217aa764 474setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
475{
476 unsigned int num_group = elf_tdata (abfd)->num_group;
477
478 /* If num_group is zero, read in all SHT_GROUP sections. The count
479 is set to -1 if there are no SHT_GROUP sections. */
480 if (num_group == 0)
481 {
482 unsigned int i, shnum;
483
484 /* First count the number of groups. If we have a SHT_GROUP
485 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 486 shnum = elf_numsections (abfd);
dbb410c3
AM
487 num_group = 0;
488 for (i = 0; i < shnum; i++)
489 {
490 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
491 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
492 num_group += 1;
493 }
494
495 if (num_group == 0)
20dbb49d
L
496 {
497 num_group = (unsigned) -1;
498 elf_tdata (abfd)->num_group = num_group;
499 }
500 else
dbb410c3
AM
501 {
502 /* We keep a list of elf section headers for group sections,
503 so we can find them quickly. */
20dbb49d
L
504 bfd_size_type amt;
505
506 elf_tdata (abfd)->num_group = num_group;
507 amt = num_group * sizeof (Elf_Internal_Shdr *);
dbb410c3
AM
508 elf_tdata (abfd)->group_sect_ptr = bfd_alloc (abfd, amt);
509 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 510 return FALSE;
dbb410c3
AM
511
512 num_group = 0;
513 for (i = 0; i < shnum; i++)
514 {
515 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
516 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
517 {
973ffd63 518 unsigned char *src;
dbb410c3
AM
519 Elf_Internal_Group *dest;
520
521 /* Add to list of sections. */
522 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
523 num_group += 1;
524
525 /* Read the raw contents. */
526 BFD_ASSERT (sizeof (*dest) >= 4);
527 amt = shdr->sh_size * sizeof (*dest) / 4;
528 shdr->contents = bfd_alloc (abfd, amt);
529 if (shdr->contents == NULL
530 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
531 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
532 != shdr->sh_size))
b34976b6 533 return FALSE;
dbb410c3
AM
534
535 /* Translate raw contents, a flag word followed by an
536 array of elf section indices all in target byte order,
537 to the flag word followed by an array of elf section
538 pointers. */
539 src = shdr->contents + shdr->sh_size;
540 dest = (Elf_Internal_Group *) (shdr->contents + amt);
541 while (1)
542 {
543 unsigned int idx;
544
545 src -= 4;
546 --dest;
547 idx = H_GET_32 (abfd, src);
548 if (src == shdr->contents)
549 {
550 dest->flags = idx;
b885599b
AM
551 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
552 shdr->bfd_section->flags
553 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
554 break;
555 }
556 if (idx >= shnum)
557 {
558 ((*_bfd_error_handler)
d003868e 559 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
560 idx = 0;
561 }
562 dest->shdr = elf_elfsections (abfd)[idx];
563 }
564 }
565 }
566 }
567 }
568
569 if (num_group != (unsigned) -1)
570 {
571 unsigned int i;
572
573 for (i = 0; i < num_group; i++)
574 {
575 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
576 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
577 unsigned int n_elt = shdr->sh_size / 4;
578
579 /* Look through this group's sections to see if current
580 section is a member. */
581 while (--n_elt != 0)
582 if ((++idx)->shdr == hdr)
583 {
e0e8c97f 584 asection *s = NULL;
dbb410c3
AM
585
586 /* We are a member of this group. Go looking through
587 other members to see if any others are linked via
588 next_in_group. */
589 idx = (Elf_Internal_Group *) shdr->contents;
590 n_elt = shdr->sh_size / 4;
591 while (--n_elt != 0)
592 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 593 && elf_next_in_group (s) != NULL)
dbb410c3
AM
594 break;
595 if (n_elt != 0)
596 {
dbb410c3
AM
597 /* Snarf the group name from other member, and
598 insert current section in circular list. */
945906ff
AM
599 elf_group_name (newsect) = elf_group_name (s);
600 elf_next_in_group (newsect) = elf_next_in_group (s);
601 elf_next_in_group (s) = newsect;
dbb410c3
AM
602 }
603 else
604 {
dbb410c3
AM
605 const char *gname;
606
b885599b
AM
607 gname = group_signature (abfd, shdr);
608 if (gname == NULL)
b34976b6 609 return FALSE;
945906ff 610 elf_group_name (newsect) = gname;
dbb410c3
AM
611
612 /* Start a circular list with one element. */
945906ff 613 elf_next_in_group (newsect) = newsect;
dbb410c3 614 }
b885599b 615
9dce4196
AM
616 /* If the group section has been created, point to the
617 new member. */
dbb410c3 618 if (shdr->bfd_section != NULL)
945906ff 619 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 620
dbb410c3
AM
621 i = num_group - 1;
622 break;
623 }
624 }
625 }
626
945906ff 627 if (elf_group_name (newsect) == NULL)
dbb410c3 628 {
d003868e
AM
629 (*_bfd_error_handler) (_("%B: no group info for section %A"),
630 abfd, newsect);
dbb410c3 631 }
b34976b6 632 return TRUE;
dbb410c3
AM
633}
634
3d7f7666
L
635bfd_boolean
636_bfd_elf_setup_group_pointers (bfd *abfd)
637{
638 unsigned int i;
639 unsigned int num_group = elf_tdata (abfd)->num_group;
640 bfd_boolean result = TRUE;
641
642 if (num_group == (unsigned) -1)
643 return result;
644
645 for (i = 0; i < num_group; i++)
646 {
647 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
648 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
649 unsigned int n_elt = shdr->sh_size / 4;
650
651 while (--n_elt != 0)
652 if ((++idx)->shdr->bfd_section)
653 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
654 else if (idx->shdr->sh_type == SHT_RELA
655 || idx->shdr->sh_type == SHT_REL)
656 /* We won't include relocation sections in section groups in
657 output object files. We adjust the group section size here
658 so that relocatable link will work correctly when
659 relocation sections are in section group in input object
660 files. */
661 shdr->bfd_section->size -= 4;
662 else
663 {
664 /* There are some unknown sections in the group. */
665 (*_bfd_error_handler)
d003868e
AM
666 (_("%B: unknown [%d] section `%s' in group [%s]"),
667 abfd,
3d7f7666 668 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
669 bfd_elf_string_from_elf_section (abfd,
670 (elf_elfheader (abfd)
671 ->e_shstrndx),
672 idx->shdr->sh_name),
3d7f7666
L
673 shdr->bfd_section->name);
674 result = FALSE;
675 }
676 }
677 return result;
678}
679
72adc230
AM
680bfd_boolean
681bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
682{
683 return elf_next_in_group (sec) != NULL;
684}
685
252b5132
RH
686/* Make a BFD section from an ELF section. We store a pointer to the
687 BFD section in the bfd_section field of the header. */
688
b34976b6 689bfd_boolean
217aa764
AM
690_bfd_elf_make_section_from_shdr (bfd *abfd,
691 Elf_Internal_Shdr *hdr,
6dc132d9
L
692 const char *name,
693 int shindex)
252b5132
RH
694{
695 asection *newsect;
696 flagword flags;
9c5bfbb7 697 const struct elf_backend_data *bed;
252b5132
RH
698
699 if (hdr->bfd_section != NULL)
700 {
701 BFD_ASSERT (strcmp (name,
702 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 703 return TRUE;
252b5132
RH
704 }
705
706 newsect = bfd_make_section_anyway (abfd, name);
707 if (newsect == NULL)
b34976b6 708 return FALSE;
252b5132 709
1829f4b2
AM
710 hdr->bfd_section = newsect;
711 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 712 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 713
2f89ff8d
L
714 /* Always use the real type/flags. */
715 elf_section_type (newsect) = hdr->sh_type;
716 elf_section_flags (newsect) = hdr->sh_flags;
717
252b5132
RH
718 newsect->filepos = hdr->sh_offset;
719
720 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
721 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
722 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 723 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 724 return FALSE;
252b5132
RH
725
726 flags = SEC_NO_FLAGS;
727 if (hdr->sh_type != SHT_NOBITS)
728 flags |= SEC_HAS_CONTENTS;
dbb410c3 729 if (hdr->sh_type == SHT_GROUP)
b3096250 730 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
731 if ((hdr->sh_flags & SHF_ALLOC) != 0)
732 {
733 flags |= SEC_ALLOC;
734 if (hdr->sh_type != SHT_NOBITS)
735 flags |= SEC_LOAD;
736 }
737 if ((hdr->sh_flags & SHF_WRITE) == 0)
738 flags |= SEC_READONLY;
739 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
740 flags |= SEC_CODE;
741 else if ((flags & SEC_LOAD) != 0)
742 flags |= SEC_DATA;
f5fa8ca2
JJ
743 if ((hdr->sh_flags & SHF_MERGE) != 0)
744 {
745 flags |= SEC_MERGE;
746 newsect->entsize = hdr->sh_entsize;
747 if ((hdr->sh_flags & SHF_STRINGS) != 0)
748 flags |= SEC_STRINGS;
749 }
dbb410c3
AM
750 if (hdr->sh_flags & SHF_GROUP)
751 if (!setup_group (abfd, hdr, newsect))
b34976b6 752 return FALSE;
13ae64f3
JJ
753 if ((hdr->sh_flags & SHF_TLS) != 0)
754 flags |= SEC_THREAD_LOCAL;
252b5132 755
3d2b39cf 756 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 757 {
3d2b39cf
L
758 /* The debugging sections appear to be recognized only by name,
759 not any sort of flag. Their SEC_ALLOC bits are cleared. */
760 static const struct
761 {
762 const char *name;
763 int len;
764 } debug_sections [] =
765 {
766 { "debug", 5 }, /* 'd' */
767 { NULL, 0 }, /* 'e' */
768 { NULL, 0 }, /* 'f' */
769 { "gnu.linkonce.wi.", 17 }, /* 'g' */
770 { NULL, 0 }, /* 'h' */
771 { NULL, 0 }, /* 'i' */
772 { NULL, 0 }, /* 'j' */
773 { NULL, 0 }, /* 'k' */
774 { "line", 4 }, /* 'l' */
775 { NULL, 0 }, /* 'm' */
776 { NULL, 0 }, /* 'n' */
777 { NULL, 0 }, /* 'o' */
778 { NULL, 0 }, /* 'p' */
779 { NULL, 0 }, /* 'q' */
780 { NULL, 0 }, /* 'r' */
781 { "stab", 4 } /* 's' */
782 };
783
784 if (name [0] == '.')
785 {
786 int i = name [1] - 'd';
787 if (i >= 0
788 && i < (int) ARRAY_SIZE (debug_sections)
789 && debug_sections [i].name != NULL
790 && strncmp (&name [1], debug_sections [i].name,
791 debug_sections [i].len) == 0)
792 flags |= SEC_DEBUGGING;
793 }
794 }
252b5132
RH
795
796 /* As a GNU extension, if the name begins with .gnu.linkonce, we
797 only link a single copy of the section. This is used to support
798 g++. g++ will emit each template expansion in its own section.
799 The symbols will be defined as weak, so that multiple definitions
800 are permitted. The GNU linker extension is to actually discard
801 all but one of the sections. */
b885599b
AM
802 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
803 && elf_next_in_group (newsect) == NULL)
252b5132
RH
804 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
805
fa152c49
JW
806 bed = get_elf_backend_data (abfd);
807 if (bed->elf_backend_section_flags)
808 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 809 return FALSE;
fa152c49 810
252b5132 811 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 812 return FALSE;
252b5132
RH
813
814 if ((flags & SEC_ALLOC) != 0)
815 {
816 Elf_Internal_Phdr *phdr;
817 unsigned int i;
818
819 /* Look through the phdrs to see if we need to adjust the lma.
820 If all the p_paddr fields are zero, we ignore them, since
821 some ELF linkers produce such output. */
822 phdr = elf_tdata (abfd)->phdr;
823 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
824 {
825 if (phdr->p_paddr != 0)
826 break;
827 }
828 if (i < elf_elfheader (abfd)->e_phnum)
829 {
830 phdr = elf_tdata (abfd)->phdr;
831 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
832 {
e0e8c97f
NC
833 /* This section is part of this segment if its file
834 offset plus size lies within the segment's memory
835 span and, if the section is loaded, the extent of the
47d9a591 836 loaded data lies within the extent of the segment.
bf36db18
NC
837
838 Note - we used to check the p_paddr field as well, and
839 refuse to set the LMA if it was 0. This is wrong
dba143ef 840 though, as a perfectly valid initialised segment can
bf36db18 841 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 842 place special significance on the address 0 and
bf36db18
NC
843 executables need to be able to have a segment which
844 covers this address. */
252b5132 845 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
846 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
847 && (hdr->sh_offset + hdr->sh_size
848 <= phdr->p_offset + phdr->p_memsz)
252b5132 849 && ((flags & SEC_LOAD) == 0
d7866f04
AM
850 || (hdr->sh_offset + hdr->sh_size
851 <= phdr->p_offset + phdr->p_filesz)))
252b5132 852 {
dba143ef 853 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
854 newsect->lma = (phdr->p_paddr
855 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
856 else
857 /* We used to use the same adjustment for SEC_LOAD
858 sections, but that doesn't work if the segment
859 is packed with code from multiple VMAs.
860 Instead we calculate the section LMA based on
861 the segment LMA. It is assumed that the
862 segment will contain sections with contiguous
863 LMAs, even if the VMAs are not. */
864 newsect->lma = (phdr->p_paddr
865 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
866
867 /* With contiguous segments, we can't tell from file
868 offsets whether a section with zero size should
869 be placed at the end of one segment or the
870 beginning of the next. Decide based on vaddr. */
871 if (hdr->sh_addr >= phdr->p_vaddr
872 && (hdr->sh_addr + hdr->sh_size
873 <= phdr->p_vaddr + phdr->p_memsz))
874 break;
252b5132
RH
875 }
876 }
877 }
878 }
879
b34976b6 880 return TRUE;
252b5132
RH
881}
882
883/*
884INTERNAL_FUNCTION
885 bfd_elf_find_section
886
887SYNOPSIS
888 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
889
890DESCRIPTION
891 Helper functions for GDB to locate the string tables.
892 Since BFD hides string tables from callers, GDB needs to use an
893 internal hook to find them. Sun's .stabstr, in particular,
894 isn't even pointed to by the .stab section, so ordinary
895 mechanisms wouldn't work to find it, even if we had some.
896*/
897
898struct elf_internal_shdr *
217aa764 899bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
900{
901 Elf_Internal_Shdr **i_shdrp;
902 char *shstrtab;
903 unsigned int max;
904 unsigned int i;
905
906 i_shdrp = elf_elfsections (abfd);
907 if (i_shdrp != NULL)
908 {
9ad5cbcf
AM
909 shstrtab = bfd_elf_get_str_section (abfd,
910 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
911 if (shstrtab != NULL)
912 {
9ad5cbcf 913 max = elf_numsections (abfd);
252b5132
RH
914 for (i = 1; i < max; i++)
915 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
916 return i_shdrp[i];
917 }
918 }
919 return 0;
920}
921
922const char *const bfd_elf_section_type_names[] = {
923 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
924 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
925 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
926};
927
1049f94e 928/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
929 output, and the reloc is against an external symbol, and nothing
930 has given us any additional addend, the resulting reloc will also
931 be against the same symbol. In such a case, we don't want to
932 change anything about the way the reloc is handled, since it will
933 all be done at final link time. Rather than put special case code
934 into bfd_perform_relocation, all the reloc types use this howto
935 function. It just short circuits the reloc if producing
1049f94e 936 relocatable output against an external symbol. */
252b5132 937
252b5132 938bfd_reloc_status_type
217aa764
AM
939bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
940 arelent *reloc_entry,
941 asymbol *symbol,
942 void *data ATTRIBUTE_UNUSED,
943 asection *input_section,
944 bfd *output_bfd,
945 char **error_message ATTRIBUTE_UNUSED)
946{
947 if (output_bfd != NULL
252b5132
RH
948 && (symbol->flags & BSF_SECTION_SYM) == 0
949 && (! reloc_entry->howto->partial_inplace
950 || reloc_entry->addend == 0))
951 {
952 reloc_entry->address += input_section->output_offset;
953 return bfd_reloc_ok;
954 }
955
956 return bfd_reloc_continue;
957}
958\f
d3c456e9
JJ
959/* Make sure sec_info_type is cleared if sec_info is cleared too. */
960
961static void
217aa764
AM
962merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
963 asection *sec)
d3c456e9 964{
68bfbfcc
AM
965 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
966 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
967}
968
8550eb6e
JJ
969/* Finish SHF_MERGE section merging. */
970
b34976b6 971bfd_boolean
217aa764 972_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 973{
57ceae94
AM
974 bfd *ibfd;
975 asection *sec;
976
0eddce27 977 if (!is_elf_hash_table (info->hash))
b34976b6 978 return FALSE;
57ceae94
AM
979
980 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
981 if ((ibfd->flags & DYNAMIC) == 0)
982 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
983 if ((sec->flags & SEC_MERGE) != 0
984 && !bfd_is_abs_section (sec->output_section))
985 {
986 struct bfd_elf_section_data *secdata;
987
988 secdata = elf_section_data (sec);
989 if (! _bfd_add_merge_section (abfd,
990 &elf_hash_table (info)->merge_info,
991 sec, &secdata->sec_info))
992 return FALSE;
993 else if (secdata->sec_info)
994 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
995 }
996
997 if (elf_hash_table (info)->merge_info != NULL)
998 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 999 merge_sections_remove_hook);
b34976b6 1000 return TRUE;
8550eb6e 1001}
2d653fc7
AM
1002
1003void
217aa764 1004_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1005{
1006 sec->output_section = bfd_abs_section_ptr;
1007 sec->output_offset = sec->vma;
0eddce27 1008 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1009 return;
1010
68bfbfcc 1011 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1012}
8550eb6e 1013\f
0ac4564e
L
1014/* Copy the program header and other data from one object module to
1015 another. */
252b5132 1016
b34976b6 1017bfd_boolean
217aa764 1018_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1019{
1020 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1021 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1022 return TRUE;
2d502050
L
1023
1024 BFD_ASSERT (!elf_flags_init (obfd)
1025 || (elf_elfheader (obfd)->e_flags
1026 == elf_elfheader (ibfd)->e_flags));
1027
0ac4564e 1028 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1029 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1030 elf_flags_init (obfd) = TRUE;
1031 return TRUE;
2d502050
L
1032}
1033
f0b79d91
L
1034/* Print out the program headers. */
1035
b34976b6 1036bfd_boolean
217aa764 1037_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1038{
217aa764 1039 FILE *f = farg;
252b5132
RH
1040 Elf_Internal_Phdr *p;
1041 asection *s;
1042 bfd_byte *dynbuf = NULL;
1043
1044 p = elf_tdata (abfd)->phdr;
1045 if (p != NULL)
1046 {
1047 unsigned int i, c;
1048
1049 fprintf (f, _("\nProgram Header:\n"));
1050 c = elf_elfheader (abfd)->e_phnum;
1051 for (i = 0; i < c; i++, p++)
1052 {
dc810e39 1053 const char *pt;
252b5132
RH
1054 char buf[20];
1055
1056 switch (p->p_type)
1057 {
dc810e39
AM
1058 case PT_NULL: pt = "NULL"; break;
1059 case PT_LOAD: pt = "LOAD"; break;
1060 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1061 case PT_INTERP: pt = "INTERP"; break;
1062 case PT_NOTE: pt = "NOTE"; break;
1063 case PT_SHLIB: pt = "SHLIB"; break;
1064 case PT_PHDR: pt = "PHDR"; break;
13ae64f3 1065 case PT_TLS: pt = "TLS"; break;
65765700 1066 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
9ee5e499 1067 case PT_GNU_STACK: pt = "STACK"; break;
8c37241b 1068 case PT_GNU_RELRO: pt = "RELRO"; break;
dc810e39 1069 default: sprintf (buf, "0x%lx", p->p_type); pt = buf; break;
252b5132 1070 }
dc810e39 1071 fprintf (f, "%8s off 0x", pt);
60b89a18 1072 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1073 fprintf (f, " vaddr 0x");
60b89a18 1074 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1075 fprintf (f, " paddr 0x");
60b89a18 1076 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1077 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1078 fprintf (f, " filesz 0x");
60b89a18 1079 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1080 fprintf (f, " memsz 0x");
60b89a18 1081 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1082 fprintf (f, " flags %c%c%c",
1083 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1084 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1085 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1086 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1087 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1088 fprintf (f, "\n");
1089 }
1090 }
1091
1092 s = bfd_get_section_by_name (abfd, ".dynamic");
1093 if (s != NULL)
1094 {
1095 int elfsec;
dc810e39 1096 unsigned long shlink;
252b5132
RH
1097 bfd_byte *extdyn, *extdynend;
1098 size_t extdynsize;
217aa764 1099 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1100
1101 fprintf (f, _("\nDynamic Section:\n"));
1102
eea6121a 1103 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1104 goto error_return;
1105
1106 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1107 if (elfsec == -1)
1108 goto error_return;
dc810e39 1109 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1110
1111 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1112 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1113
1114 extdyn = dynbuf;
eea6121a 1115 extdynend = extdyn + s->size;
252b5132
RH
1116 for (; extdyn < extdynend; extdyn += extdynsize)
1117 {
1118 Elf_Internal_Dyn dyn;
1119 const char *name;
1120 char ab[20];
b34976b6 1121 bfd_boolean stringp;
252b5132 1122
217aa764 1123 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1124
1125 if (dyn.d_tag == DT_NULL)
1126 break;
1127
b34976b6 1128 stringp = FALSE;
252b5132
RH
1129 switch (dyn.d_tag)
1130 {
1131 default:
1132 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1133 name = ab;
1134 break;
1135
b34976b6 1136 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1137 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1138 case DT_PLTGOT: name = "PLTGOT"; break;
1139 case DT_HASH: name = "HASH"; break;
1140 case DT_STRTAB: name = "STRTAB"; break;
1141 case DT_SYMTAB: name = "SYMTAB"; break;
1142 case DT_RELA: name = "RELA"; break;
1143 case DT_RELASZ: name = "RELASZ"; break;
1144 case DT_RELAENT: name = "RELAENT"; break;
1145 case DT_STRSZ: name = "STRSZ"; break;
1146 case DT_SYMENT: name = "SYMENT"; break;
1147 case DT_INIT: name = "INIT"; break;
1148 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1149 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1150 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1151 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1152 case DT_REL: name = "REL"; break;
1153 case DT_RELSZ: name = "RELSZ"; break;
1154 case DT_RELENT: name = "RELENT"; break;
1155 case DT_PLTREL: name = "PLTREL"; break;
1156 case DT_DEBUG: name = "DEBUG"; break;
1157 case DT_TEXTREL: name = "TEXTREL"; break;
1158 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1159 case DT_BIND_NOW: name = "BIND_NOW"; break;
1160 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1161 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1162 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1163 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1164 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1165 case DT_FLAGS: name = "FLAGS"; break;
1166 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1167 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1168 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1169 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1170 case DT_MOVEENT: name = "MOVEENT"; break;
1171 case DT_MOVESZ: name = "MOVESZ"; break;
1172 case DT_FEATURE: name = "FEATURE"; break;
1173 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1174 case DT_SYMINSZ: name = "SYMINSZ"; break;
1175 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1176 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1177 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1178 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1179 case DT_PLTPAD: name = "PLTPAD"; break;
1180 case DT_MOVETAB: name = "MOVETAB"; break;
1181 case DT_SYMINFO: name = "SYMINFO"; break;
1182 case DT_RELACOUNT: name = "RELACOUNT"; break;
1183 case DT_RELCOUNT: name = "RELCOUNT"; break;
1184 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1185 case DT_VERSYM: name = "VERSYM"; break;
1186 case DT_VERDEF: name = "VERDEF"; break;
1187 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1188 case DT_VERNEED: name = "VERNEED"; break;
1189 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1190 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1191 case DT_USED: name = "USED"; break;
b34976b6 1192 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1193 }
1194
1195 fprintf (f, " %-11s ", name);
1196 if (! stringp)
1197 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1198 else
1199 {
1200 const char *string;
dc810e39 1201 unsigned int tagv = dyn.d_un.d_val;
252b5132 1202
dc810e39 1203 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1204 if (string == NULL)
1205 goto error_return;
1206 fprintf (f, "%s", string);
1207 }
1208 fprintf (f, "\n");
1209 }
1210
1211 free (dynbuf);
1212 dynbuf = NULL;
1213 }
1214
1215 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1216 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1217 {
fc0e6df6 1218 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1219 return FALSE;
252b5132
RH
1220 }
1221
1222 if (elf_dynverdef (abfd) != 0)
1223 {
1224 Elf_Internal_Verdef *t;
1225
1226 fprintf (f, _("\nVersion definitions:\n"));
1227 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1228 {
1229 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1230 t->vd_flags, t->vd_hash, t->vd_nodename);
1231 if (t->vd_auxptr->vda_nextptr != NULL)
1232 {
1233 Elf_Internal_Verdaux *a;
1234
1235 fprintf (f, "\t");
1236 for (a = t->vd_auxptr->vda_nextptr;
1237 a != NULL;
1238 a = a->vda_nextptr)
1239 fprintf (f, "%s ", a->vda_nodename);
1240 fprintf (f, "\n");
1241 }
1242 }
1243 }
1244
1245 if (elf_dynverref (abfd) != 0)
1246 {
1247 Elf_Internal_Verneed *t;
1248
1249 fprintf (f, _("\nVersion References:\n"));
1250 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1251 {
1252 Elf_Internal_Vernaux *a;
1253
1254 fprintf (f, _(" required from %s:\n"), t->vn_filename);
1255 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1256 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1257 a->vna_flags, a->vna_other, a->vna_nodename);
1258 }
1259 }
1260
b34976b6 1261 return TRUE;
252b5132
RH
1262
1263 error_return:
1264 if (dynbuf != NULL)
1265 free (dynbuf);
b34976b6 1266 return FALSE;
252b5132
RH
1267}
1268
1269/* Display ELF-specific fields of a symbol. */
1270
1271void
217aa764
AM
1272bfd_elf_print_symbol (bfd *abfd,
1273 void *filep,
1274 asymbol *symbol,
1275 bfd_print_symbol_type how)
252b5132 1276{
217aa764 1277 FILE *file = filep;
252b5132
RH
1278 switch (how)
1279 {
1280 case bfd_print_symbol_name:
1281 fprintf (file, "%s", symbol->name);
1282 break;
1283 case bfd_print_symbol_more:
1284 fprintf (file, "elf ");
60b89a18 1285 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1286 fprintf (file, " %lx", (long) symbol->flags);
1287 break;
1288 case bfd_print_symbol_all:
1289 {
4e8a9624
AM
1290 const char *section_name;
1291 const char *name = NULL;
9c5bfbb7 1292 const struct elf_backend_data *bed;
7a13edea 1293 unsigned char st_other;
dbb410c3 1294 bfd_vma val;
c044fabd 1295
252b5132 1296 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1297
1298 bed = get_elf_backend_data (abfd);
1299 if (bed->elf_backend_print_symbol_all)
c044fabd 1300 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1301
1302 if (name == NULL)
1303 {
7ee38065 1304 name = symbol->name;
217aa764 1305 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1306 }
1307
252b5132
RH
1308 fprintf (file, " %s\t", section_name);
1309 /* Print the "other" value for a symbol. For common symbols,
1310 we've already printed the size; now print the alignment.
1311 For other symbols, we have no specified alignment, and
1312 we've printed the address; now print the size. */
dbb410c3
AM
1313 if (bfd_is_com_section (symbol->section))
1314 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1315 else
1316 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1317 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1318
1319 /* If we have version information, print it. */
1320 if (elf_tdata (abfd)->dynversym_section != 0
1321 && (elf_tdata (abfd)->dynverdef_section != 0
1322 || elf_tdata (abfd)->dynverref_section != 0))
1323 {
1324 unsigned int vernum;
1325 const char *version_string;
1326
1327 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1328
1329 if (vernum == 0)
1330 version_string = "";
1331 else if (vernum == 1)
1332 version_string = "Base";
1333 else if (vernum <= elf_tdata (abfd)->cverdefs)
1334 version_string =
1335 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1336 else
1337 {
1338 Elf_Internal_Verneed *t;
1339
1340 version_string = "";
1341 for (t = elf_tdata (abfd)->verref;
1342 t != NULL;
1343 t = t->vn_nextref)
1344 {
1345 Elf_Internal_Vernaux *a;
1346
1347 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1348 {
1349 if (a->vna_other == vernum)
1350 {
1351 version_string = a->vna_nodename;
1352 break;
1353 }
1354 }
1355 }
1356 }
1357
1358 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1359 fprintf (file, " %-11s", version_string);
1360 else
1361 {
1362 int i;
1363
1364 fprintf (file, " (%s)", version_string);
1365 for (i = 10 - strlen (version_string); i > 0; --i)
1366 putc (' ', file);
1367 }
1368 }
1369
1370 /* If the st_other field is not zero, print it. */
7a13edea 1371 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1372
7a13edea
NC
1373 switch (st_other)
1374 {
1375 case 0: break;
1376 case STV_INTERNAL: fprintf (file, " .internal"); break;
1377 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1378 case STV_PROTECTED: fprintf (file, " .protected"); break;
1379 default:
1380 /* Some other non-defined flags are also present, so print
1381 everything hex. */
1382 fprintf (file, " 0x%02x", (unsigned int) st_other);
1383 }
252b5132 1384
587ff49e 1385 fprintf (file, " %s", name);
252b5132
RH
1386 }
1387 break;
1388 }
1389}
1390\f
1391/* Create an entry in an ELF linker hash table. */
1392
1393struct bfd_hash_entry *
217aa764
AM
1394_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1395 struct bfd_hash_table *table,
1396 const char *string)
252b5132 1397{
252b5132
RH
1398 /* Allocate the structure if it has not already been allocated by a
1399 subclass. */
51b64d56
AM
1400 if (entry == NULL)
1401 {
1402 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1403 if (entry == NULL)
1404 return entry;
1405 }
252b5132
RH
1406
1407 /* Call the allocation method of the superclass. */
51b64d56
AM
1408 entry = _bfd_link_hash_newfunc (entry, table, string);
1409 if (entry != NULL)
252b5132 1410 {
51b64d56
AM
1411 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1412 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1413
252b5132
RH
1414 /* Set local fields. */
1415 ret->indx = -1;
252b5132 1416 ret->dynindx = -1;
f6e332e6
AM
1417 ret->got = ret->plt = htab->init_refcount;
1418 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1419 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1420 /* Assume that we have been called by a non-ELF symbol reader.
1421 This flag is then reset by the code which reads an ELF input
1422 file. This ensures that a symbol created by a non-ELF symbol
1423 reader will have the flag set correctly. */
f5385ebf 1424 ret->non_elf = 1;
252b5132
RH
1425 }
1426
51b64d56 1427 return entry;
252b5132
RH
1428}
1429
2920b85c 1430/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1431 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1432
c61b8717 1433void
9c5bfbb7 1434_bfd_elf_link_hash_copy_indirect (const struct elf_backend_data *bed,
217aa764
AM
1435 struct elf_link_hash_entry *dir,
1436 struct elf_link_hash_entry *ind)
2920b85c 1437{
3c3e9281 1438 bfd_signed_vma tmp;
b48fa14c 1439 bfd_signed_vma lowest_valid = bed->can_refcount;
3c3e9281 1440
2920b85c
RH
1441 /* Copy down any references that we may have already seen to the
1442 symbol which just became indirect. */
1443
f5385ebf
AM
1444 dir->ref_dynamic |= ind->ref_dynamic;
1445 dir->ref_regular |= ind->ref_regular;
1446 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1447 dir->non_got_ref |= ind->non_got_ref;
1448 dir->needs_plt |= ind->needs_plt;
1449 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1450
1e370bd2 1451 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1452 return;
1453
51b64d56 1454 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1455 These may have been already set up by a check_relocs routine. */
3c3e9281 1456 tmp = dir->got.refcount;
b48fa14c 1457 if (tmp < lowest_valid)
2920b85c 1458 {
51b64d56 1459 dir->got.refcount = ind->got.refcount;
3c3e9281 1460 ind->got.refcount = tmp;
2920b85c 1461 }
3c3e9281 1462 else
b48fa14c 1463 BFD_ASSERT (ind->got.refcount < lowest_valid);
2920b85c 1464
3c3e9281 1465 tmp = dir->plt.refcount;
b48fa14c 1466 if (tmp < lowest_valid)
2920b85c 1467 {
51b64d56 1468 dir->plt.refcount = ind->plt.refcount;
3c3e9281 1469 ind->plt.refcount = tmp;
2920b85c 1470 }
3c3e9281 1471 else
b48fa14c 1472 BFD_ASSERT (ind->plt.refcount < lowest_valid);
2920b85c
RH
1473
1474 if (dir->dynindx == -1)
1475 {
1476 dir->dynindx = ind->dynindx;
1477 dir->dynstr_index = ind->dynstr_index;
1478 ind->dynindx = -1;
1479 ind->dynstr_index = 0;
1480 }
3c3e9281
AM
1481 else
1482 BFD_ASSERT (ind->dynindx == -1);
2920b85c
RH
1483}
1484
c61b8717 1485void
217aa764
AM
1486_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1487 struct elf_link_hash_entry *h,
1488 bfd_boolean force_local)
2920b85c 1489{
5cab59f6 1490 h->plt = elf_hash_table (info)->init_offset;
f5385ebf 1491 h->needs_plt = 0;
e5094212
AM
1492 if (force_local)
1493 {
f5385ebf 1494 h->forced_local = 1;
e5094212
AM
1495 if (h->dynindx != -1)
1496 {
1497 h->dynindx = -1;
1498 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1499 h->dynstr_index);
1500 }
1501 }
2920b85c
RH
1502}
1503
252b5132
RH
1504/* Initialize an ELF linker hash table. */
1505
b34976b6 1506bfd_boolean
217aa764
AM
1507_bfd_elf_link_hash_table_init
1508 (struct elf_link_hash_table *table,
1509 bfd *abfd,
1510 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1511 struct bfd_hash_table *,
1512 const char *))
252b5132 1513{
b34976b6 1514 bfd_boolean ret;
8ea2e4bd 1515
b34976b6 1516 table->dynamic_sections_created = FALSE;
252b5132 1517 table->dynobj = NULL;
963f13ec
AO
1518 /* Make sure can_refcount is extended to the width and signedness of
1519 init_refcount before we subtract one from it. */
5cab59f6
AM
1520 table->init_refcount.refcount = get_elf_backend_data (abfd)->can_refcount;
1521 table->init_refcount.refcount -= 1;
1522 table->init_offset.offset = -(bfd_vma) 1;
252b5132
RH
1523 /* The first dynamic symbol is a dummy. */
1524 table->dynsymcount = 1;
1525 table->dynstr = NULL;
1526 table->bucketcount = 0;
1527 table->needed = NULL;
1528 table->hgot = NULL;
f5fa8ca2 1529 table->merge_info = NULL;
3722b82f 1530 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1531 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1532 table->dynlocal = NULL;
73722af0 1533 table->runpath = NULL;
e1918d23
AM
1534 table->tls_sec = NULL;
1535 table->tls_size = 0;
73722af0 1536 table->loaded = NULL;
67687978 1537 table->is_relocatable_executable = FALSE;
73722af0
AM
1538
1539 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc);
8ea2e4bd
NC
1540 table->root.type = bfd_link_elf_hash_table;
1541
1542 return ret;
252b5132
RH
1543}
1544
1545/* Create an ELF linker hash table. */
1546
1547struct bfd_link_hash_table *
217aa764 1548_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1549{
1550 struct elf_link_hash_table *ret;
dc810e39 1551 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1552
217aa764
AM
1553 ret = bfd_malloc (amt);
1554 if (ret == NULL)
252b5132
RH
1555 return NULL;
1556
1557 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc))
1558 {
e2d34d7d 1559 free (ret);
252b5132
RH
1560 return NULL;
1561 }
1562
1563 return &ret->root;
1564}
1565
1566/* This is a hook for the ELF emulation code in the generic linker to
1567 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1568 entry for a dynamic object. */
252b5132
RH
1569
1570void
217aa764 1571bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1572{
1573 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1574 && bfd_get_format (abfd) == bfd_object)
1575 elf_dt_name (abfd) = name;
1576}
1577
e56f61be
L
1578int
1579bfd_elf_get_dyn_lib_class (bfd *abfd)
1580{
1581 int lib_class;
1582 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1583 && bfd_get_format (abfd) == bfd_object)
1584 lib_class = elf_dyn_lib_class (abfd);
1585 else
1586 lib_class = 0;
1587 return lib_class;
1588}
1589
74816898 1590void
4a43e768 1591bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1592{
1593 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1594 && bfd_get_format (abfd) == bfd_object)
4a43e768 1595 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1596}
1597
252b5132
RH
1598/* Get the list of DT_NEEDED entries for a link. This is a hook for
1599 the linker ELF emulation code. */
1600
1601struct bfd_link_needed_list *
217aa764
AM
1602bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1603 struct bfd_link_info *info)
252b5132 1604{
0eddce27 1605 if (! is_elf_hash_table (info->hash))
252b5132
RH
1606 return NULL;
1607 return elf_hash_table (info)->needed;
1608}
1609
a963dc6a
L
1610/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1611 hook for the linker ELF emulation code. */
1612
1613struct bfd_link_needed_list *
217aa764
AM
1614bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1615 struct bfd_link_info *info)
a963dc6a 1616{
0eddce27 1617 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1618 return NULL;
1619 return elf_hash_table (info)->runpath;
1620}
1621
252b5132
RH
1622/* Get the name actually used for a dynamic object for a link. This
1623 is the SONAME entry if there is one. Otherwise, it is the string
1624 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1625
1626const char *
217aa764 1627bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1628{
1629 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1630 && bfd_get_format (abfd) == bfd_object)
1631 return elf_dt_name (abfd);
1632 return NULL;
1633}
1634
1635/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1636 the ELF linker emulation code. */
1637
b34976b6 1638bfd_boolean
217aa764
AM
1639bfd_elf_get_bfd_needed_list (bfd *abfd,
1640 struct bfd_link_needed_list **pneeded)
252b5132
RH
1641{
1642 asection *s;
1643 bfd_byte *dynbuf = NULL;
1644 int elfsec;
dc810e39 1645 unsigned long shlink;
252b5132
RH
1646 bfd_byte *extdyn, *extdynend;
1647 size_t extdynsize;
217aa764 1648 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1649
1650 *pneeded = NULL;
1651
1652 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1653 || bfd_get_format (abfd) != bfd_object)
b34976b6 1654 return TRUE;
252b5132
RH
1655
1656 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1657 if (s == NULL || s->size == 0)
b34976b6 1658 return TRUE;
252b5132 1659
eea6121a 1660 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1661 goto error_return;
1662
1663 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1664 if (elfsec == -1)
1665 goto error_return;
1666
dc810e39 1667 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1668
1669 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1670 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1671
1672 extdyn = dynbuf;
eea6121a 1673 extdynend = extdyn + s->size;
252b5132
RH
1674 for (; extdyn < extdynend; extdyn += extdynsize)
1675 {
1676 Elf_Internal_Dyn dyn;
1677
217aa764 1678 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1679
1680 if (dyn.d_tag == DT_NULL)
1681 break;
1682
1683 if (dyn.d_tag == DT_NEEDED)
1684 {
1685 const char *string;
1686 struct bfd_link_needed_list *l;
dc810e39
AM
1687 unsigned int tagv = dyn.d_un.d_val;
1688 bfd_size_type amt;
252b5132 1689
dc810e39 1690 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1691 if (string == NULL)
1692 goto error_return;
1693
dc810e39 1694 amt = sizeof *l;
217aa764 1695 l = bfd_alloc (abfd, amt);
252b5132
RH
1696 if (l == NULL)
1697 goto error_return;
1698
1699 l->by = abfd;
1700 l->name = string;
1701 l->next = *pneeded;
1702 *pneeded = l;
1703 }
1704 }
1705
1706 free (dynbuf);
1707
b34976b6 1708 return TRUE;
252b5132
RH
1709
1710 error_return:
1711 if (dynbuf != NULL)
1712 free (dynbuf);
b34976b6 1713 return FALSE;
252b5132
RH
1714}
1715\f
1716/* Allocate an ELF string table--force the first byte to be zero. */
1717
1718struct bfd_strtab_hash *
217aa764 1719_bfd_elf_stringtab_init (void)
252b5132
RH
1720{
1721 struct bfd_strtab_hash *ret;
1722
1723 ret = _bfd_stringtab_init ();
1724 if (ret != NULL)
1725 {
1726 bfd_size_type loc;
1727
b34976b6 1728 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1729 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1730 if (loc == (bfd_size_type) -1)
1731 {
1732 _bfd_stringtab_free (ret);
1733 ret = NULL;
1734 }
1735 }
1736 return ret;
1737}
1738\f
1739/* ELF .o/exec file reading */
1740
c044fabd 1741/* Create a new bfd section from an ELF section header. */
252b5132 1742
b34976b6 1743bfd_boolean
217aa764 1744bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1745{
1746 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1747 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1748 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1749 const char *name;
252b5132 1750
1b3a8575
AM
1751 name = bfd_elf_string_from_elf_section (abfd,
1752 elf_elfheader (abfd)->e_shstrndx,
1753 hdr->sh_name);
252b5132
RH
1754
1755 switch (hdr->sh_type)
1756 {
1757 case SHT_NULL:
1758 /* Inactive section. Throw it away. */
b34976b6 1759 return TRUE;
252b5132
RH
1760
1761 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1762 case SHT_NOBITS: /* .bss section. */
1763 case SHT_HASH: /* .hash section. */
1764 case SHT_NOTE: /* .note section. */
25e27870
L
1765 case SHT_INIT_ARRAY: /* .init_array section. */
1766 case SHT_FINI_ARRAY: /* .fini_array section. */
1767 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1768 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1769 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1770
797fc050 1771 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1772 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1773 return FALSE;
8e0ed13f
NC
1774 if (hdr->sh_link > elf_numsections (abfd)
1775 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1776 return FALSE;
797fc050
AM
1777 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1778 {
1779 Elf_Internal_Shdr *dynsymhdr;
1780
1781 /* The shared libraries distributed with hpux11 have a bogus
1782 sh_link field for the ".dynamic" section. Find the
1783 string table for the ".dynsym" section instead. */
1784 if (elf_dynsymtab (abfd) != 0)
1785 {
1786 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1787 hdr->sh_link = dynsymhdr->sh_link;
1788 }
1789 else
1790 {
1791 unsigned int i, num_sec;
1792
1793 num_sec = elf_numsections (abfd);
1794 for (i = 1; i < num_sec; i++)
1795 {
1796 dynsymhdr = elf_elfsections (abfd)[i];
1797 if (dynsymhdr->sh_type == SHT_DYNSYM)
1798 {
1799 hdr->sh_link = dynsymhdr->sh_link;
1800 break;
1801 }
1802 }
1803 }
1804 }
1805 break;
1806
252b5132
RH
1807 case SHT_SYMTAB: /* A symbol table */
1808 if (elf_onesymtab (abfd) == shindex)
b34976b6 1809 return TRUE;
252b5132
RH
1810
1811 BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym);
1812 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1813 elf_onesymtab (abfd) = shindex;
1814 elf_tdata (abfd)->symtab_hdr = *hdr;
1815 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1816 abfd->flags |= HAS_SYMS;
1817
1818 /* Sometimes a shared object will map in the symbol table. If
1819 SHF_ALLOC is set, and this is a shared object, then we also
1820 treat this section as a BFD section. We can not base the
1821 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1822 set in a relocatable object file, which would confuse the
252b5132
RH
1823 linker. */
1824 if ((hdr->sh_flags & SHF_ALLOC) != 0
1825 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1826 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1827 shindex))
b34976b6 1828 return FALSE;
252b5132 1829
1b3a8575
AM
1830 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1831 can't read symbols without that section loaded as well. It
1832 is most likely specified by the next section header. */
1833 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1834 {
1835 unsigned int i, num_sec;
1836
1837 num_sec = elf_numsections (abfd);
1838 for (i = shindex + 1; i < num_sec; i++)
1839 {
1840 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1841 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1842 && hdr2->sh_link == shindex)
1843 break;
1844 }
1845 if (i == num_sec)
1846 for (i = 1; i < shindex; i++)
1847 {
1848 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1849 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1850 && hdr2->sh_link == shindex)
1851 break;
1852 }
1853 if (i != shindex)
1854 return bfd_section_from_shdr (abfd, i);
1855 }
b34976b6 1856 return TRUE;
252b5132
RH
1857
1858 case SHT_DYNSYM: /* A dynamic symbol table */
1859 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1860 return TRUE;
252b5132
RH
1861
1862 BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym);
1863 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1864 elf_dynsymtab (abfd) = shindex;
1865 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1866 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1867 abfd->flags |= HAS_SYMS;
1868
1869 /* Besides being a symbol table, we also treat this as a regular
1870 section, so that objcopy can handle it. */
6dc132d9 1871 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1872
9ad5cbcf
AM
1873 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1874 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1875 return TRUE;
9ad5cbcf 1876
1b3a8575 1877 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1878 elf_symtab_shndx (abfd) = shindex;
1879 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1880 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1881 return TRUE;
9ad5cbcf 1882
252b5132
RH
1883 case SHT_STRTAB: /* A string table */
1884 if (hdr->bfd_section != NULL)
b34976b6 1885 return TRUE;
252b5132
RH
1886 if (ehdr->e_shstrndx == shindex)
1887 {
1888 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1889 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1890 return TRUE;
252b5132 1891 }
1b3a8575
AM
1892 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1893 {
1894 symtab_strtab:
1895 elf_tdata (abfd)->strtab_hdr = *hdr;
1896 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1897 return TRUE;
1898 }
1899 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1900 {
1901 dynsymtab_strtab:
1902 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1903 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1904 elf_elfsections (abfd)[shindex] = hdr;
1905 /* We also treat this as a regular section, so that objcopy
1906 can handle it. */
6dc132d9
L
1907 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1908 shindex);
1b3a8575 1909 }
252b5132 1910
1b3a8575
AM
1911 /* If the string table isn't one of the above, then treat it as a
1912 regular section. We need to scan all the headers to be sure,
1913 just in case this strtab section appeared before the above. */
1914 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1915 {
1916 unsigned int i, num_sec;
252b5132 1917
1b3a8575
AM
1918 num_sec = elf_numsections (abfd);
1919 for (i = 1; i < num_sec; i++)
1920 {
1921 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1922 if (hdr2->sh_link == shindex)
1923 {
1924 if (! bfd_section_from_shdr (abfd, i))
1925 return FALSE;
1926 if (elf_onesymtab (abfd) == i)
1927 goto symtab_strtab;
1928 if (elf_dynsymtab (abfd) == i)
1929 goto dynsymtab_strtab;
1930 }
1931 }
1932 }
6dc132d9 1933 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1934
1935 case SHT_REL:
1936 case SHT_RELA:
1937 /* *These* do a lot of work -- but build no sections! */
1938 {
1939 asection *target_sect;
1940 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1941 unsigned int num_sec = elf_numsections (abfd);
252b5132 1942
03ae5f59 1943 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1944 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1945 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1946 {
1947 ((*_bfd_error_handler)
d003868e
AM
1948 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1949 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1950 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1951 shindex);
03ae5f59
ILT
1952 }
1953
252b5132
RH
1954 /* For some incomprehensible reason Oracle distributes
1955 libraries for Solaris in which some of the objects have
1956 bogus sh_link fields. It would be nice if we could just
1957 reject them, but, unfortunately, some people need to use
1958 them. We scan through the section headers; if we find only
1959 one suitable symbol table, we clobber the sh_link to point
1960 to it. I hope this doesn't break anything. */
1961 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1962 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1963 {
9ad5cbcf 1964 unsigned int scan;
252b5132
RH
1965 int found;
1966
1967 found = 0;
9ad5cbcf 1968 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1969 {
1970 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1971 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1972 {
1973 if (found != 0)
1974 {
1975 found = 0;
1976 break;
1977 }
1978 found = scan;
1979 }
1980 }
1981 if (found != 0)
1982 hdr->sh_link = found;
1983 }
1984
1985 /* Get the symbol table. */
1b3a8575
AM
1986 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1987 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1988 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1989 return FALSE;
252b5132
RH
1990
1991 /* If this reloc section does not use the main symbol table we
1992 don't treat it as a reloc section. BFD can't adequately
1993 represent such a section, so at least for now, we don't
c044fabd 1994 try. We just present it as a normal section. We also
60bcf0fa 1995 can't use it as a reloc section if it points to the null
c044fabd 1996 section. */
60bcf0fa 1997 if (hdr->sh_link != elf_onesymtab (abfd) || hdr->sh_info == SHN_UNDEF)
6dc132d9
L
1998 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1999 shindex);
252b5132
RH
2000
2001 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2002 return FALSE;
252b5132
RH
2003 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2004 if (target_sect == NULL)
b34976b6 2005 return FALSE;
252b5132
RH
2006
2007 if ((target_sect->flags & SEC_RELOC) == 0
2008 || target_sect->reloc_count == 0)
2009 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2010 else
2011 {
dc810e39 2012 bfd_size_type amt;
252b5132 2013 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2014 amt = sizeof (*hdr2);
217aa764 2015 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2016 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2017 }
2018 *hdr2 = *hdr;
2019 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2020 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2021 target_sect->flags |= SEC_RELOC;
2022 target_sect->relocation = NULL;
2023 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2024 /* In the section to which the relocations apply, mark whether
2025 its relocations are of the REL or RELA variety. */
72730e0c 2026 if (hdr->sh_size != 0)
68bfbfcc 2027 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2028 abfd->flags |= HAS_RELOC;
b34976b6 2029 return TRUE;
252b5132
RH
2030 }
2031 break;
2032
2033 case SHT_GNU_verdef:
2034 elf_dynverdef (abfd) = shindex;
2035 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2036 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2037 break;
2038
2039 case SHT_GNU_versym:
2040 elf_dynversym (abfd) = shindex;
2041 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2042 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2043 break;
2044
2045 case SHT_GNU_verneed:
2046 elf_dynverref (abfd) = shindex;
2047 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2048 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2049 break;
2050
2051 case SHT_SHLIB:
b34976b6 2052 return TRUE;
252b5132 2053
dbb410c3 2054 case SHT_GROUP:
b885599b
AM
2055 /* We need a BFD section for objcopy and relocatable linking,
2056 and it's handy to have the signature available as the section
2057 name. */
2058 name = group_signature (abfd, hdr);
2059 if (name == NULL)
b34976b6 2060 return FALSE;
6dc132d9 2061 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2062 return FALSE;
dbb410c3
AM
2063 if (hdr->contents != NULL)
2064 {
2065 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2066 unsigned int n_elt = hdr->sh_size / 4;
2067 asection *s;
2068
b885599b
AM
2069 if (idx->flags & GRP_COMDAT)
2070 hdr->bfd_section->flags
2071 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2072
45c5e9ed
L
2073 /* We try to keep the same section order as it comes in. */
2074 idx += n_elt;
dbb410c3 2075 while (--n_elt != 0)
45c5e9ed 2076 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2077 && elf_next_in_group (s) != NULL)
dbb410c3 2078 {
945906ff 2079 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2080 break;
2081 }
2082 }
2083 break;
2084
252b5132
RH
2085 default:
2086 /* Check for any processor-specific section types. */
6dc132d9
L
2087 return bed->elf_backend_section_from_shdr (abfd, hdr, name,
2088 shindex);
252b5132
RH
2089 }
2090
b34976b6 2091 return TRUE;
252b5132
RH
2092}
2093
ec338859
AM
2094/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2095 Return SEC for sections that have no elf section, and NULL on error. */
2096
2097asection *
217aa764
AM
2098bfd_section_from_r_symndx (bfd *abfd,
2099 struct sym_sec_cache *cache,
2100 asection *sec,
2101 unsigned long r_symndx)
ec338859 2102{
ec338859 2103 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2104 unsigned char esym[sizeof (Elf64_External_Sym)];
2105 Elf_External_Sym_Shndx eshndx;
2106 Elf_Internal_Sym isym;
ec338859
AM
2107 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2108
2109 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2110 return cache->sec[ent];
2111
2112 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2113 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2114 &isym, esym, &eshndx) == NULL)
ec338859 2115 return NULL;
9ad5cbcf 2116
ec338859
AM
2117 if (cache->abfd != abfd)
2118 {
2119 memset (cache->indx, -1, sizeof (cache->indx));
2120 cache->abfd = abfd;
2121 }
2122 cache->indx[ent] = r_symndx;
2123 cache->sec[ent] = sec;
50bc7936
AM
2124 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2125 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2126 {
2127 asection *s;
6cdc0ccc 2128 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2129 if (s != NULL)
2130 cache->sec[ent] = s;
2131 }
2132 return cache->sec[ent];
2133}
2134
252b5132
RH
2135/* Given an ELF section number, retrieve the corresponding BFD
2136 section. */
2137
2138asection *
217aa764 2139bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2140{
9ad5cbcf 2141 if (index >= elf_numsections (abfd))
252b5132
RH
2142 return NULL;
2143 return elf_elfsections (abfd)[index]->bfd_section;
2144}
2145
7f4d3958 2146static struct bfd_elf_special_section const special_sections_b[] =
2f89ff8d 2147{
7dcb9820 2148 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7f4d3958
L
2149 { NULL, 0, 0, 0, 0 }
2150};
2151
2152static struct bfd_elf_special_section const special_sections_c[] =
2153{
7dcb9820 2154 { ".comment", 8, 0, SHT_PROGBITS, 0 },
7f4d3958
L
2155 { NULL, 0, 0, 0, 0 }
2156};
2157
2158static struct bfd_elf_special_section const special_sections_d[] =
2159{
7dcb9820
AM
2160 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2161 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2162 { ".debug", 6, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2163 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2164 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2165 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2166 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2167 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2168 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2169 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
7f4d3958
L
2170 { NULL, 0, 0, 0, 0 }
2171};
2172
2173static struct bfd_elf_special_section const special_sections_f[] =
2174{
2175 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2176 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2177 { NULL, 0, 0, 0, 0 }
2178};
2179
2180static struct bfd_elf_special_section const special_sections_g[] =
2181{
2182 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820 2183 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2184 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2185 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2186 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
7f4d3958
L
2187 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2188 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
2189 { NULL, 0, 0, 0, 0 }
2190};
2191
2192static struct bfd_elf_special_section const special_sections_h[] =
2193{
2194 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2195 { NULL, 0, 0, 0, 0 }
2196};
2197
2198static struct bfd_elf_special_section const special_sections_i[] =
2199{
2200 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2201 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2202 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2203 { NULL, 0, 0, 0, 0 }
2204};
2205
2206static struct bfd_elf_special_section const special_sections_l[] =
2207{
2208 { ".line", 5, 0, SHT_PROGBITS, 0 },
2209 { NULL, 0, 0, 0, 0 }
2210};
2211
2212static struct bfd_elf_special_section const special_sections_n[] =
2213{
45c5e9ed 2214 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820 2215 { ".note", 5, -1, SHT_NOTE, 0 },
7f4d3958
L
2216 { NULL, 0, 0, 0, 0 }
2217};
2218
2219static struct bfd_elf_special_section const special_sections_p[] =
2220{
2221 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2222 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2223 { NULL, 0, 0, 0, 0 }
2224};
2225
2226static struct bfd_elf_special_section const special_sections_r[] =
2227{
2228 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2229 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
7dcb9820
AM
2230 { ".rela", 5, -1, SHT_RELA, 0 },
2231 { ".rel", 4, -1, SHT_REL, 0 },
7f4d3958
L
2232 { NULL, 0, 0, 0, 0 }
2233};
2234
2235static struct bfd_elf_special_section const special_sections_s[] =
2236{
2237 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2238 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2239 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
7dcb9820
AM
2240 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2241 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2242};
2243
7f4d3958
L
2244static struct bfd_elf_special_section const special_sections_t[] =
2245{
2246 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2247 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2248 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2249 { NULL, 0, 0, 0, 0 }
2250};
2251
2252static struct bfd_elf_special_section const *special_sections [27] =
2253{
2254 NULL, /* 'a' */
2255 special_sections_b, /* 'b' */
2256 special_sections_c, /* 'b' */
2257 special_sections_d, /* 'd' */
2258 NULL, /* 'e' */
2259 special_sections_f, /* 'f' */
2260 special_sections_g, /* 'g' */
2261 special_sections_h, /* 'h' */
2262 special_sections_i, /* 'i' */
2263 NULL, /* 'j' */
2264 NULL, /* 'k' */
2265 special_sections_l, /* 'l' */
2266 NULL, /* 'm' */
2267 special_sections_n, /* 'n' */
2268 NULL, /* 'o' */
2269 special_sections_p, /* 'p' */
2270 NULL, /* 'q' */
2271 special_sections_r, /* 'r' */
2272 special_sections_s, /* 's' */
2273 special_sections_t, /* 't' */
2274 NULL, /* 'u' */
2275 NULL, /* 'v' */
2276 NULL, /* 'w' */
2277 NULL, /* 'x' */
2278 NULL, /* 'y' */
2279 NULL, /* 'z' */
2280 NULL /* other */
2281};
2282
2f89ff8d
L
2283static const struct bfd_elf_special_section *
2284get_special_section (const char *name,
7f4d3958 2285 const struct bfd_elf_special_section **special_sections_p,
2f89ff8d
L
2286 unsigned int rela)
2287{
2288 int i;
7f4d3958
L
2289 int len;
2290 const struct bfd_elf_special_section *special_sections;
2291
2292 if (name [0] == '.')
2293 {
2294 i = name [1] - 'a';
2295 if (i < 0 || i > 25)
2296 i = 26;
2297 }
2298 else
2299 i = 26;
2300
2301 special_sections = special_sections_p [i];
2302
2303 if (!special_sections)
2304 return special_sections;
2305
2306 len= strlen (name);
2f89ff8d
L
2307
2308 for (i = 0; special_sections[i].prefix != NULL; i++)
7dcb9820
AM
2309 {
2310 int suffix_len;
2311 int prefix_len = special_sections[i].prefix_length;
2312
2313 if (len < prefix_len)
2314 continue;
2315 if (memcmp (name, special_sections[i].prefix, prefix_len) != 0)
2316 continue;
2317
2318 suffix_len = special_sections[i].suffix_length;
2319 if (suffix_len <= 0)
2320 {
2321 if (name[prefix_len] != 0)
2322 {
2323 if (suffix_len == 0)
2324 continue;
2325 if (name[prefix_len] != '.'
2326 && (suffix_len == -2
2327 || (rela && special_sections[i].type == SHT_REL)))
2328 continue;
2329 }
2330 }
2331 else
2332 {
2333 if (len < prefix_len + suffix_len)
2334 continue;
2335 if (memcmp (name + len - suffix_len,
2336 special_sections[i].prefix + prefix_len,
2337 suffix_len) != 0)
2338 continue;
2339 }
2f89ff8d 2340 return &special_sections[i];
7dcb9820 2341 }
2f89ff8d
L
2342
2343 return NULL;
2344}
2345
7dcb9820
AM
2346const struct bfd_elf_special_section *
2347_bfd_elf_get_sec_type_attr (bfd *abfd, const char *name)
2f89ff8d 2348{
9c5bfbb7 2349 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7dcb9820 2350 const struct bfd_elf_special_section *ssect = NULL;
2f89ff8d
L
2351
2352 /* See if this is one of the special sections. */
2353 if (name)
2354 {
9c5bfbb7 2355 unsigned int rela = bed->default_use_rela_p;
2f89ff8d
L
2356
2357 if (bed->special_sections)
2358 ssect = get_special_section (name, bed->special_sections, rela);
2359
2360 if (! ssect)
2361 ssect = get_special_section (name, special_sections, rela);
2f89ff8d
L
2362 }
2363
7dcb9820 2364 return ssect;
2f89ff8d
L
2365}
2366
b34976b6 2367bfd_boolean
217aa764 2368_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2369{
2370 struct bfd_elf_section_data *sdata;
7dcb9820 2371 const struct bfd_elf_special_section *ssect;
252b5132 2372
f0abc2a1
AM
2373 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2374 if (sdata == NULL)
2375 {
217aa764 2376 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2377 if (sdata == NULL)
2378 return FALSE;
217aa764 2379 sec->used_by_bfd = sdata;
f0abc2a1 2380 }
bf572ba0 2381
3496cb2a
L
2382 /* When we read a file, we don't need section type and flags unless
2383 it is a linker created section. They will be overridden in
2384 _bfd_elf_make_section_from_shdr anyway. */
2385 if (abfd->direction != read_direction
2386 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2387 {
a31501e9
L
2388 ssect = _bfd_elf_get_sec_type_attr (abfd, sec->name);
2389 if (ssect != NULL)
2390 {
2391 elf_section_type (sec) = ssect->type;
2392 elf_section_flags (sec) = ssect->attr;
2393 }
2f89ff8d
L
2394 }
2395
bf572ba0 2396 /* Indicate whether or not this section should use RELA relocations. */
68bfbfcc 2397 sec->use_rela_p = get_elf_backend_data (abfd)->default_use_rela_p;
bf572ba0 2398
b34976b6 2399 return TRUE;
252b5132
RH
2400}
2401
2402/* Create a new bfd section from an ELF program header.
2403
2404 Since program segments have no names, we generate a synthetic name
2405 of the form segment<NUM>, where NUM is generally the index in the
2406 program header table. For segments that are split (see below) we
2407 generate the names segment<NUM>a and segment<NUM>b.
2408
2409 Note that some program segments may have a file size that is different than
2410 (less than) the memory size. All this means is that at execution the
2411 system must allocate the amount of memory specified by the memory size,
2412 but only initialize it with the first "file size" bytes read from the
2413 file. This would occur for example, with program segments consisting
2414 of combined data+bss.
2415
2416 To handle the above situation, this routine generates TWO bfd sections
2417 for the single program segment. The first has the length specified by
2418 the file size of the segment, and the second has the length specified
2419 by the difference between the two sizes. In effect, the segment is split
2420 into it's initialized and uninitialized parts.
2421
2422 */
2423
b34976b6 2424bfd_boolean
217aa764
AM
2425_bfd_elf_make_section_from_phdr (bfd *abfd,
2426 Elf_Internal_Phdr *hdr,
2427 int index,
2428 const char *typename)
252b5132
RH
2429{
2430 asection *newsect;
2431 char *name;
2432 char namebuf[64];
d4c88bbb 2433 size_t len;
252b5132
RH
2434 int split;
2435
2436 split = ((hdr->p_memsz > 0)
2437 && (hdr->p_filesz > 0)
2438 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2439 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2440 len = strlen (namebuf) + 1;
217aa764 2441 name = bfd_alloc (abfd, len);
252b5132 2442 if (!name)
b34976b6 2443 return FALSE;
d4c88bbb 2444 memcpy (name, namebuf, len);
252b5132
RH
2445 newsect = bfd_make_section (abfd, name);
2446 if (newsect == NULL)
b34976b6 2447 return FALSE;
252b5132
RH
2448 newsect->vma = hdr->p_vaddr;
2449 newsect->lma = hdr->p_paddr;
eea6121a 2450 newsect->size = hdr->p_filesz;
252b5132
RH
2451 newsect->filepos = hdr->p_offset;
2452 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2453 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2454 if (hdr->p_type == PT_LOAD)
2455 {
2456 newsect->flags |= SEC_ALLOC;
2457 newsect->flags |= SEC_LOAD;
2458 if (hdr->p_flags & PF_X)
2459 {
2460 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2461 may be data. */
252b5132
RH
2462 newsect->flags |= SEC_CODE;
2463 }
2464 }
2465 if (!(hdr->p_flags & PF_W))
2466 {
2467 newsect->flags |= SEC_READONLY;
2468 }
2469
2470 if (split)
2471 {
27ac83bf 2472 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2473 len = strlen (namebuf) + 1;
217aa764 2474 name = bfd_alloc (abfd, len);
252b5132 2475 if (!name)
b34976b6 2476 return FALSE;
d4c88bbb 2477 memcpy (name, namebuf, len);
252b5132
RH
2478 newsect = bfd_make_section (abfd, name);
2479 if (newsect == NULL)
b34976b6 2480 return FALSE;
252b5132
RH
2481 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2482 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2483 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2484 if (hdr->p_type == PT_LOAD)
2485 {
2486 newsect->flags |= SEC_ALLOC;
2487 if (hdr->p_flags & PF_X)
2488 newsect->flags |= SEC_CODE;
2489 }
2490 if (!(hdr->p_flags & PF_W))
2491 newsect->flags |= SEC_READONLY;
2492 }
2493
b34976b6 2494 return TRUE;
252b5132
RH
2495}
2496
b34976b6 2497bfd_boolean
217aa764 2498bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2499{
9c5bfbb7 2500 const struct elf_backend_data *bed;
20cfcaae
NC
2501
2502 switch (hdr->p_type)
2503 {
2504 case PT_NULL:
2505 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2506
2507 case PT_LOAD:
2508 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2509
2510 case PT_DYNAMIC:
2511 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2512
2513 case PT_INTERP:
2514 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2515
2516 case PT_NOTE:
2517 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2518 return FALSE;
217aa764 2519 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2520 return FALSE;
2521 return TRUE;
20cfcaae
NC
2522
2523 case PT_SHLIB:
2524 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2525
2526 case PT_PHDR:
2527 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2528
811072d8
RM
2529 case PT_GNU_EH_FRAME:
2530 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2531 "eh_frame_hdr");
2532
9ee5e499
JJ
2533 case PT_GNU_STACK:
2534 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2535
8c37241b
JJ
2536 case PT_GNU_RELRO:
2537 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2538
20cfcaae 2539 default:
8c1acd09 2540 /* Check for any processor-specific program segment types. */
20cfcaae 2541 bed = get_elf_backend_data (abfd);
d27f5fa1 2542 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2543 }
2544}
2545
23bc299b 2546/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2547 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2548 relocations; otherwise, we use REL relocations. */
2549
b34976b6 2550bfd_boolean
217aa764
AM
2551_bfd_elf_init_reloc_shdr (bfd *abfd,
2552 Elf_Internal_Shdr *rel_hdr,
2553 asection *asect,
2554 bfd_boolean use_rela_p)
23bc299b
MM
2555{
2556 char *name;
9c5bfbb7 2557 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2558 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2559
dc810e39 2560 name = bfd_alloc (abfd, amt);
23bc299b 2561 if (name == NULL)
b34976b6 2562 return FALSE;
23bc299b
MM
2563 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2564 rel_hdr->sh_name =
2b0f7ef9 2565 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2566 FALSE);
23bc299b 2567 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2568 return FALSE;
23bc299b
MM
2569 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2570 rel_hdr->sh_entsize = (use_rela_p
2571 ? bed->s->sizeof_rela
2572 : bed->s->sizeof_rel);
45d6a902 2573 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2574 rel_hdr->sh_flags = 0;
2575 rel_hdr->sh_addr = 0;
2576 rel_hdr->sh_size = 0;
2577 rel_hdr->sh_offset = 0;
2578
b34976b6 2579 return TRUE;
23bc299b
MM
2580}
2581
252b5132
RH
2582/* Set up an ELF internal section header for a section. */
2583
252b5132 2584static void
217aa764 2585elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2586{
9c5bfbb7 2587 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2588 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2589 Elf_Internal_Shdr *this_hdr;
2590
2591 if (*failedptr)
2592 {
2593 /* We already failed; just get out of the bfd_map_over_sections
2594 loop. */
2595 return;
2596 }
2597
2598 this_hdr = &elf_section_data (asect)->this_hdr;
2599
e57b5356
AM
2600 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2601 asect->name, FALSE);
2602 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2603 {
b34976b6 2604 *failedptr = TRUE;
252b5132
RH
2605 return;
2606 }
2607
2608 this_hdr->sh_flags = 0;
2609
2610 if ((asect->flags & SEC_ALLOC) != 0
2611 || asect->user_set_vma)
2612 this_hdr->sh_addr = asect->vma;
2613 else
2614 this_hdr->sh_addr = 0;
2615
2616 this_hdr->sh_offset = 0;
eea6121a 2617 this_hdr->sh_size = asect->size;
252b5132
RH
2618 this_hdr->sh_link = 0;
2619 this_hdr->sh_addralign = 1 << asect->alignment_power;
2620 /* The sh_entsize and sh_info fields may have been set already by
2621 copy_private_section_data. */
2622
2623 this_hdr->bfd_section = asect;
2624 this_hdr->contents = NULL;
2625
3cddba1e
L
2626 /* If the section type is unspecified, we set it based on
2627 asect->flags. */
2628 if (this_hdr->sh_type == SHT_NULL)
2629 {
45c5e9ed
L
2630 if ((asect->flags & SEC_GROUP) != 0)
2631 {
2632 /* We also need to mark SHF_GROUP here for relocatable
2633 link. */
2634 struct bfd_link_order *l;
2635 asection *elt;
2636
8423293d 2637 for (l = asect->map_head.link_order; l != NULL; l = l->next)
45c5e9ed
L
2638 if (l->type == bfd_indirect_link_order
2639 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
2640 do
2641 {
2642 /* The name is not important. Anything will do. */
2643 elf_group_name (elt->output_section) = "G";
2644 elf_section_flags (elt->output_section) |= SHF_GROUP;
2645
2646 elt = elf_next_in_group (elt);
2647 /* During a relocatable link, the lists are
2648 circular. */
2649 }
2650 while (elt != elf_next_in_group (l->u.indirect.section));
2651
2652 this_hdr->sh_type = SHT_GROUP;
2653 }
2654 else if ((asect->flags & SEC_ALLOC) != 0
3cddba1e
L
2655 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2656 || (asect->flags & SEC_NEVER_LOAD) != 0))
2657 this_hdr->sh_type = SHT_NOBITS;
2658 else
2659 this_hdr->sh_type = SHT_PROGBITS;
2660 }
2661
2f89ff8d 2662 switch (this_hdr->sh_type)
252b5132 2663 {
2f89ff8d 2664 default:
2f89ff8d
L
2665 break;
2666
2667 case SHT_STRTAB:
2668 case SHT_INIT_ARRAY:
2669 case SHT_FINI_ARRAY:
2670 case SHT_PREINIT_ARRAY:
2671 case SHT_NOTE:
2672 case SHT_NOBITS:
2673 case SHT_PROGBITS:
2674 break;
2675
2676 case SHT_HASH:
c7ac6ff8 2677 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2678 break;
5de3bf90 2679
2f89ff8d 2680 case SHT_DYNSYM:
252b5132 2681 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2682 break;
2683
2684 case SHT_DYNAMIC:
252b5132 2685 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2686 break;
2687
2688 case SHT_RELA:
2689 if (get_elf_backend_data (abfd)->may_use_rela_p)
2690 this_hdr->sh_entsize = bed->s->sizeof_rela;
2691 break;
2692
2693 case SHT_REL:
2694 if (get_elf_backend_data (abfd)->may_use_rel_p)
2695 this_hdr->sh_entsize = bed->s->sizeof_rel;
2696 break;
2697
2698 case SHT_GNU_versym:
252b5132 2699 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2700 break;
2701
2702 case SHT_GNU_verdef:
252b5132
RH
2703 this_hdr->sh_entsize = 0;
2704 /* objcopy or strip will copy over sh_info, but may not set
2705 cverdefs. The linker will set cverdefs, but sh_info will be
2706 zero. */
2707 if (this_hdr->sh_info == 0)
2708 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2709 else
2710 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2711 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2712 break;
2713
2714 case SHT_GNU_verneed:
252b5132
RH
2715 this_hdr->sh_entsize = 0;
2716 /* objcopy or strip will copy over sh_info, but may not set
2717 cverrefs. The linker will set cverrefs, but sh_info will be
2718 zero. */
2719 if (this_hdr->sh_info == 0)
2720 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2721 else
2722 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2723 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2724 break;
2725
2726 case SHT_GROUP:
dbb410c3 2727 this_hdr->sh_entsize = 4;
2f89ff8d 2728 break;
dbb410c3 2729 }
252b5132
RH
2730
2731 if ((asect->flags & SEC_ALLOC) != 0)
2732 this_hdr->sh_flags |= SHF_ALLOC;
2733 if ((asect->flags & SEC_READONLY) == 0)
2734 this_hdr->sh_flags |= SHF_WRITE;
2735 if ((asect->flags & SEC_CODE) != 0)
2736 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2737 if ((asect->flags & SEC_MERGE) != 0)
2738 {
2739 this_hdr->sh_flags |= SHF_MERGE;
2740 this_hdr->sh_entsize = asect->entsize;
2741 if ((asect->flags & SEC_STRINGS) != 0)
2742 this_hdr->sh_flags |= SHF_STRINGS;
2743 }
1126897b 2744 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2745 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2746 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2747 {
2748 this_hdr->sh_flags |= SHF_TLS;
eea6121a 2749 if (asect->size == 0 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60
JJ
2750 {
2751 struct bfd_link_order *o;
b34976b6 2752
704afa60 2753 this_hdr->sh_size = 0;
8423293d 2754 for (o = asect->map_head.link_order; o != NULL; o = o->next)
704afa60
JJ
2755 if (this_hdr->sh_size < o->offset + o->size)
2756 this_hdr->sh_size = o->offset + o->size;
2757 if (this_hdr->sh_size)
2758 this_hdr->sh_type = SHT_NOBITS;
2759 }
2760 }
252b5132
RH
2761
2762 /* Check for processor-specific section types. */
e1fddb6b
AO
2763 if (bed->elf_backend_fake_sections
2764 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2765 *failedptr = TRUE;
252b5132
RH
2766
2767 /* If the section has relocs, set up a section header for the
23bc299b
MM
2768 SHT_REL[A] section. If two relocation sections are required for
2769 this section, it is up to the processor-specific back-end to
c044fabd 2770 create the other. */
23bc299b 2771 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2772 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2773 &elf_section_data (asect)->rel_hdr,
c044fabd 2774 asect,
68bfbfcc 2775 asect->use_rela_p))
b34976b6 2776 *failedptr = TRUE;
252b5132
RH
2777}
2778
dbb410c3
AM
2779/* Fill in the contents of a SHT_GROUP section. */
2780
1126897b 2781void
217aa764 2782bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2783{
217aa764 2784 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2785 unsigned long symindx;
9dce4196 2786 asection *elt, *first;
dbb410c3
AM
2787 unsigned char *loc;
2788 struct bfd_link_order *l;
b34976b6 2789 bfd_boolean gas;
dbb410c3 2790
7e4111ad
L
2791 /* Ignore linker created group section. See elfNN_ia64_object_p in
2792 elfxx-ia64.c. */
2793 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2794 || *failedptr)
2795 return;
2796
1126897b
AM
2797 symindx = 0;
2798 if (elf_group_id (sec) != NULL)
2799 symindx = elf_group_id (sec)->udata.i;
2800
2801 if (symindx == 0)
2802 {
2803 /* If called from the assembler, swap_out_syms will have set up
2804 elf_section_syms; If called for "ld -r", use target_index. */
2805 if (elf_section_syms (abfd) != NULL)
2806 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2807 else
2808 symindx = sec->target_index;
2809 }
dbb410c3
AM
2810 elf_section_data (sec)->this_hdr.sh_info = symindx;
2811
1126897b 2812 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2813 gas = TRUE;
dbb410c3
AM
2814 if (sec->contents == NULL)
2815 {
b34976b6 2816 gas = FALSE;
eea6121a 2817 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2818
2819 /* Arrange for the section to be written out. */
2820 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2821 if (sec->contents == NULL)
2822 {
b34976b6 2823 *failedptr = TRUE;
dbb410c3
AM
2824 return;
2825 }
2826 }
2827
eea6121a 2828 loc = sec->contents + sec->size;
dbb410c3 2829
9dce4196
AM
2830 /* Get the pointer to the first section in the group that gas
2831 squirreled away here. objcopy arranges for this to be set to the
2832 start of the input section group. */
2833 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2834
2835 /* First element is a flag word. Rest of section is elf section
2836 indices for all the sections of the group. Write them backwards
2837 just to keep the group in the same order as given in .section
2838 directives, not that it matters. */
2839 while (elt != NULL)
2840 {
9dce4196
AM
2841 asection *s;
2842 unsigned int idx;
2843
dbb410c3 2844 loc -= 4;
9dce4196
AM
2845 s = elt;
2846 if (!gas)
2847 s = s->output_section;
2848 idx = 0;
2849 if (s != NULL)
2850 idx = elf_section_data (s)->this_idx;
2851 H_PUT_32 (abfd, idx, loc);
945906ff 2852 elt = elf_next_in_group (elt);
9dce4196
AM
2853 if (elt == first)
2854 break;
dbb410c3
AM
2855 }
2856
2857 /* If this is a relocatable link, then the above did nothing because
2858 SEC is the output section. Look through the input sections
2859 instead. */
8423293d 2860 for (l = sec->map_head.link_order; l != NULL; l = l->next)
dbb410c3 2861 if (l->type == bfd_indirect_link_order
945906ff 2862 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
dbb410c3
AM
2863 do
2864 {
2865 loc -= 4;
2866 H_PUT_32 (abfd,
2867 elf_section_data (elt->output_section)->this_idx, loc);
945906ff 2868 elt = elf_next_in_group (elt);
dbb410c3
AM
2869 /* During a relocatable link, the lists are circular. */
2870 }
945906ff 2871 while (elt != elf_next_in_group (l->u.indirect.section));
dbb410c3 2872
3d7f7666 2873 if ((loc -= 4) != sec->contents)
9dce4196 2874 abort ();
dbb410c3 2875
9dce4196 2876 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2877}
2878
252b5132
RH
2879/* Assign all ELF section numbers. The dummy first section is handled here
2880 too. The link/info pointers for the standard section types are filled
2881 in here too, while we're at it. */
2882
b34976b6 2883static bfd_boolean
da9f89d4 2884assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2885{
2886 struct elf_obj_tdata *t = elf_tdata (abfd);
2887 asection *sec;
2b0f7ef9 2888 unsigned int section_number, secn;
252b5132 2889 Elf_Internal_Shdr **i_shdrp;
dc810e39 2890 bfd_size_type amt;
47cc2cf5 2891 struct bfd_elf_section_data *d;
252b5132
RH
2892
2893 section_number = 1;
2894
2b0f7ef9
JJ
2895 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2896
da9f89d4
L
2897 /* SHT_GROUP sections are in relocatable files only. */
2898 if (link_info == NULL || link_info->relocatable)
252b5132 2899 {
da9f89d4 2900 /* Put SHT_GROUP sections first. */
04dd1667 2901 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2902 {
5daa8fe7 2903 d = elf_section_data (sec);
da9f89d4
L
2904
2905 if (d->this_hdr.sh_type == SHT_GROUP)
2906 {
5daa8fe7 2907 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2908 {
2909 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2910 bfd_section_list_remove (abfd, sec);
da9f89d4 2911 abfd->section_count--;
da9f89d4
L
2912 }
2913 else
2914 {
2915 if (section_number == SHN_LORESERVE)
2916 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2917 d->this_idx = section_number++;
2918 }
2919 }
47cc2cf5
PB
2920 }
2921 }
2922
2923 for (sec = abfd->sections; sec; sec = sec->next)
2924 {
2925 d = elf_section_data (sec);
2926
2927 if (d->this_hdr.sh_type != SHT_GROUP)
2928 {
2929 if (section_number == SHN_LORESERVE)
2930 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2931 d->this_idx = section_number++;
2932 }
2b0f7ef9 2933 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2934 if ((sec->flags & SEC_RELOC) == 0)
2935 d->rel_idx = 0;
2936 else
2b0f7ef9 2937 {
9ad5cbcf
AM
2938 if (section_number == SHN_LORESERVE)
2939 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2940 d->rel_idx = section_number++;
2941 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2942 }
23bc299b
MM
2943
2944 if (d->rel_hdr2)
2b0f7ef9 2945 {
9ad5cbcf
AM
2946 if (section_number == SHN_LORESERVE)
2947 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2948 d->rel_idx2 = section_number++;
2949 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2950 }
23bc299b
MM
2951 else
2952 d->rel_idx2 = 0;
252b5132
RH
2953 }
2954
9ad5cbcf
AM
2955 if (section_number == SHN_LORESERVE)
2956 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2957 t->shstrtab_section = section_number++;
2b0f7ef9 2958 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2959 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2960
2961 if (bfd_get_symcount (abfd) > 0)
2962 {
9ad5cbcf
AM
2963 if (section_number == SHN_LORESERVE)
2964 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2965 t->symtab_section = section_number++;
2b0f7ef9 2966 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2967 if (section_number > SHN_LORESERVE - 2)
2968 {
2969 if (section_number == SHN_LORESERVE)
2970 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2971 t->symtab_shndx_section = section_number++;
2972 t->symtab_shndx_hdr.sh_name
2973 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2974 ".symtab_shndx", FALSE);
9ad5cbcf 2975 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2976 return FALSE;
9ad5cbcf
AM
2977 }
2978 if (section_number == SHN_LORESERVE)
2979 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2980 t->strtab_section = section_number++;
2b0f7ef9 2981 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2982 }
2983
2b0f7ef9
JJ
2984 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2985 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2986
2987 elf_numsections (abfd) = section_number;
252b5132 2988 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
2989 if (section_number > SHN_LORESERVE)
2990 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
2991
2992 /* Set up the list of section header pointers, in agreement with the
2993 indices. */
dc810e39 2994 amt = section_number * sizeof (Elf_Internal_Shdr *);
217aa764 2995 i_shdrp = bfd_zalloc (abfd, amt);
252b5132 2996 if (i_shdrp == NULL)
b34976b6 2997 return FALSE;
252b5132 2998
dc810e39 2999 amt = sizeof (Elf_Internal_Shdr);
217aa764 3000 i_shdrp[0] = bfd_zalloc (abfd, amt);
252b5132
RH
3001 if (i_shdrp[0] == NULL)
3002 {
3003 bfd_release (abfd, i_shdrp);
b34976b6 3004 return FALSE;
252b5132 3005 }
252b5132
RH
3006
3007 elf_elfsections (abfd) = i_shdrp;
3008
3009 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3010 if (bfd_get_symcount (abfd) > 0)
3011 {
3012 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3013 if (elf_numsections (abfd) > SHN_LORESERVE)
3014 {
3015 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3016 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3017 }
252b5132
RH
3018 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3019 t->symtab_hdr.sh_link = t->strtab_section;
3020 }
38ce5b11 3021
252b5132
RH
3022 for (sec = abfd->sections; sec; sec = sec->next)
3023 {
3024 struct bfd_elf_section_data *d = elf_section_data (sec);
3025 asection *s;
3026 const char *name;
3027
3028 i_shdrp[d->this_idx] = &d->this_hdr;
3029 if (d->rel_idx != 0)
3030 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3031 if (d->rel_idx2 != 0)
3032 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3033
3034 /* Fill in the sh_link and sh_info fields while we're at it. */
3035
3036 /* sh_link of a reloc section is the section index of the symbol
3037 table. sh_info is the section index of the section to which
3038 the relocation entries apply. */
3039 if (d->rel_idx != 0)
3040 {
3041 d->rel_hdr.sh_link = t->symtab_section;
3042 d->rel_hdr.sh_info = d->this_idx;
3043 }
23bc299b
MM
3044 if (d->rel_idx2 != 0)
3045 {
3046 d->rel_hdr2->sh_link = t->symtab_section;
3047 d->rel_hdr2->sh_info = d->this_idx;
3048 }
252b5132 3049
38ce5b11
L
3050 /* We need to set up sh_link for SHF_LINK_ORDER. */
3051 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3052 {
3053 s = elf_linked_to_section (sec);
3054 if (s)
3055 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3056 else
3057 {
3058 struct bfd_link_order *p;
3059
3060 /* Find out what the corresponding section in output
3061 is. */
8423293d 3062 for (p = sec->map_head.link_order; p != NULL; p = p->next)
38ce5b11
L
3063 {
3064 s = p->u.indirect.section;
3065 if (p->type == bfd_indirect_link_order
3066 && (bfd_get_flavour (s->owner)
3067 == bfd_target_elf_flavour))
3068 {
3069 Elf_Internal_Shdr ** const elf_shdrp
3070 = elf_elfsections (s->owner);
3071 int elfsec
3072 = _bfd_elf_section_from_bfd_section (s->owner, s);
3073 elfsec = elf_shdrp[elfsec]->sh_link;
185d09ad
L
3074 /* PR 290:
3075 The Intel C compiler generates SHT_IA_64_UNWIND with
ff01938b 3076 SHF_LINK_ORDER. But it doesn't set the sh_link or
185d09ad
L
3077 sh_info fields. Hence we could get the situation
3078 where elfsec is 0. */
3079 if (elfsec == 0)
3080 {
3081 const struct elf_backend_data *bed
3082 = get_elf_backend_data (abfd);
3083 if (bed->link_order_error_handler)
d003868e 3084 bed->link_order_error_handler
28b13744 3085 (_("%B: warning: sh_link not set for section `%A'"),
d003868e 3086 abfd, s);
185d09ad
L
3087 }
3088 else
3089 {
01b3c8ab
L
3090 s = elf_shdrp[elfsec]->bfd_section;
3091 if (elf_discarded_section (s))
3092 {
3093 asection *kept;
3094 (*_bfd_error_handler)
3095 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3096 abfd, d->this_hdr.bfd_section,
3097 s, s->owner);
3098 /* Point to the kept section if it has
3099 the same size as the discarded
3100 one. */
3101 kept = _bfd_elf_check_kept_section (s);
3102 if (kept == NULL)
3103 {
3104 bfd_set_error (bfd_error_bad_value);
3105 return FALSE;
3106 }
2796fd96 3107 s = kept;
01b3c8ab
L
3108 }
3109 s = s->output_section;
185d09ad
L
3110 BFD_ASSERT (s != NULL);
3111 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3112 }
38ce5b11
L
3113 break;
3114 }
3115 }
3116 }
3117 }
3118
252b5132
RH
3119 switch (d->this_hdr.sh_type)
3120 {
3121 case SHT_REL:
3122 case SHT_RELA:
3123 /* A reloc section which we are treating as a normal BFD
3124 section. sh_link is the section index of the symbol
3125 table. sh_info is the section index of the section to
3126 which the relocation entries apply. We assume that an
3127 allocated reloc section uses the dynamic symbol table.
3128 FIXME: How can we be sure? */
3129 s = bfd_get_section_by_name (abfd, ".dynsym");
3130 if (s != NULL)
3131 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3132
3133 /* We look up the section the relocs apply to by name. */
3134 name = sec->name;
3135 if (d->this_hdr.sh_type == SHT_REL)
3136 name += 4;
3137 else
3138 name += 5;
3139 s = bfd_get_section_by_name (abfd, name);
3140 if (s != NULL)
3141 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3142 break;
3143
3144 case SHT_STRTAB:
3145 /* We assume that a section named .stab*str is a stabs
3146 string section. We look for a section with the same name
3147 but without the trailing ``str'', and set its sh_link
3148 field to point to this section. */
3149 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
3150 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3151 {
3152 size_t len;
3153 char *alc;
3154
3155 len = strlen (sec->name);
217aa764 3156 alc = bfd_malloc (len - 2);
252b5132 3157 if (alc == NULL)
b34976b6 3158 return FALSE;
d4c88bbb 3159 memcpy (alc, sec->name, len - 3);
252b5132
RH
3160 alc[len - 3] = '\0';
3161 s = bfd_get_section_by_name (abfd, alc);
3162 free (alc);
3163 if (s != NULL)
3164 {
3165 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3166
3167 /* This is a .stab section. */
0594c12d
AM
3168 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3169 elf_section_data (s)->this_hdr.sh_entsize
3170 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3171 }
3172 }
3173 break;
3174
3175 case SHT_DYNAMIC:
3176 case SHT_DYNSYM:
3177 case SHT_GNU_verneed:
3178 case SHT_GNU_verdef:
3179 /* sh_link is the section header index of the string table
3180 used for the dynamic entries, or the symbol table, or the
3181 version strings. */
3182 s = bfd_get_section_by_name (abfd, ".dynstr");
3183 if (s != NULL)
3184 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3185 break;
3186
7f1204bb
JJ
3187 case SHT_GNU_LIBLIST:
3188 /* sh_link is the section header index of the prelink library
3189 list
3190 used for the dynamic entries, or the symbol table, or the
3191 version strings. */
3192 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3193 ? ".dynstr" : ".gnu.libstr");
3194 if (s != NULL)
3195 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3196 break;
3197
252b5132
RH
3198 case SHT_HASH:
3199 case SHT_GNU_versym:
3200 /* sh_link is the section header index of the symbol table
3201 this hash table or version table is for. */
3202 s = bfd_get_section_by_name (abfd, ".dynsym");
3203 if (s != NULL)
3204 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3205 break;
dbb410c3
AM
3206
3207 case SHT_GROUP:
3208 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3209 }
3210 }
3211
2b0f7ef9 3212 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3213 if (i_shdrp[secn] == NULL)
3214 i_shdrp[secn] = i_shdrp[0];
3215 else
3216 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3217 i_shdrp[secn]->sh_name);
b34976b6 3218 return TRUE;
252b5132
RH
3219}
3220
3221/* Map symbol from it's internal number to the external number, moving
3222 all local symbols to be at the head of the list. */
3223
268b6b39 3224static int
217aa764 3225sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3226{
3227 /* If the backend has a special mapping, use it. */
9c5bfbb7 3228 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3229 if (bed->elf_backend_sym_is_global)
3230 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3231
3232 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3233 || bfd_is_und_section (bfd_get_section (sym))
3234 || bfd_is_com_section (bfd_get_section (sym)));
3235}
3236
b34976b6 3237static bfd_boolean
217aa764 3238elf_map_symbols (bfd *abfd)
252b5132 3239{
dc810e39 3240 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3241 asymbol **syms = bfd_get_outsymbols (abfd);
3242 asymbol **sect_syms;
dc810e39
AM
3243 unsigned int num_locals = 0;
3244 unsigned int num_globals = 0;
3245 unsigned int num_locals2 = 0;
3246 unsigned int num_globals2 = 0;
252b5132 3247 int max_index = 0;
dc810e39 3248 unsigned int idx;
252b5132
RH
3249 asection *asect;
3250 asymbol **new_syms;
dc810e39 3251 bfd_size_type amt;
252b5132
RH
3252
3253#ifdef DEBUG
3254 fprintf (stderr, "elf_map_symbols\n");
3255 fflush (stderr);
3256#endif
3257
252b5132
RH
3258 for (asect = abfd->sections; asect; asect = asect->next)
3259 {
3260 if (max_index < asect->index)
3261 max_index = asect->index;
3262 }
3263
3264 max_index++;
dc810e39 3265 amt = max_index * sizeof (asymbol *);
217aa764 3266 sect_syms = bfd_zalloc (abfd, amt);
252b5132 3267 if (sect_syms == NULL)
b34976b6 3268 return FALSE;
252b5132 3269 elf_section_syms (abfd) = sect_syms;
4e89ac30 3270 elf_num_section_syms (abfd) = max_index;
252b5132 3271
079e9a2f
AM
3272 /* Init sect_syms entries for any section symbols we have already
3273 decided to output. */
252b5132
RH
3274 for (idx = 0; idx < symcount; idx++)
3275 {
dc810e39 3276 asymbol *sym = syms[idx];
c044fabd 3277
252b5132
RH
3278 if ((sym->flags & BSF_SECTION_SYM) != 0
3279 && sym->value == 0)
3280 {
3281 asection *sec;
3282
3283 sec = sym->section;
3284
3285 if (sec->owner != NULL)
3286 {
3287 if (sec->owner != abfd)
3288 {
3289 if (sec->output_offset != 0)
3290 continue;
c044fabd 3291
252b5132
RH
3292 sec = sec->output_section;
3293
079e9a2f
AM
3294 /* Empty sections in the input files may have had a
3295 section symbol created for them. (See the comment
3296 near the end of _bfd_generic_link_output_symbols in
3297 linker.c). If the linker script discards such
3298 sections then we will reach this point. Since we know
3299 that we cannot avoid this case, we detect it and skip
3300 the abort and the assignment to the sect_syms array.
3301 To reproduce this particular case try running the
3302 linker testsuite test ld-scripts/weak.exp for an ELF
3303 port that uses the generic linker. */
252b5132
RH
3304 if (sec->owner == NULL)
3305 continue;
3306
3307 BFD_ASSERT (sec->owner == abfd);
3308 }
3309 sect_syms[sec->index] = syms[idx];
3310 }
3311 }
3312 }
3313
252b5132
RH
3314 /* Classify all of the symbols. */
3315 for (idx = 0; idx < symcount; idx++)
3316 {
3317 if (!sym_is_global (abfd, syms[idx]))
3318 num_locals++;
3319 else
3320 num_globals++;
3321 }
079e9a2f
AM
3322
3323 /* We will be adding a section symbol for each BFD section. Most normal
3324 sections will already have a section symbol in outsymbols, but
3325 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3326 at least in that case. */
252b5132
RH
3327 for (asect = abfd->sections; asect; asect = asect->next)
3328 {
079e9a2f 3329 if (sect_syms[asect->index] == NULL)
252b5132 3330 {
079e9a2f 3331 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3332 num_locals++;
3333 else
3334 num_globals++;
252b5132
RH
3335 }
3336 }
3337
3338 /* Now sort the symbols so the local symbols are first. */
dc810e39 3339 amt = (num_locals + num_globals) * sizeof (asymbol *);
217aa764 3340 new_syms = bfd_alloc (abfd, amt);
dc810e39 3341
252b5132 3342 if (new_syms == NULL)
b34976b6 3343 return FALSE;
252b5132
RH
3344
3345 for (idx = 0; idx < symcount; idx++)
3346 {
3347 asymbol *sym = syms[idx];
dc810e39 3348 unsigned int i;
252b5132
RH
3349
3350 if (!sym_is_global (abfd, sym))
3351 i = num_locals2++;
3352 else
3353 i = num_locals + num_globals2++;
3354 new_syms[i] = sym;
3355 sym->udata.i = i + 1;
3356 }
3357 for (asect = abfd->sections; asect; asect = asect->next)
3358 {
079e9a2f 3359 if (sect_syms[asect->index] == NULL)
252b5132 3360 {
079e9a2f 3361 asymbol *sym = asect->symbol;
dc810e39 3362 unsigned int i;
252b5132 3363
079e9a2f 3364 sect_syms[asect->index] = sym;
252b5132
RH
3365 if (!sym_is_global (abfd, sym))
3366 i = num_locals2++;
3367 else
3368 i = num_locals + num_globals2++;
3369 new_syms[i] = sym;
3370 sym->udata.i = i + 1;
3371 }
3372 }
3373
3374 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3375
3376 elf_num_locals (abfd) = num_locals;
3377 elf_num_globals (abfd) = num_globals;
b34976b6 3378 return TRUE;
252b5132
RH
3379}
3380
3381/* Align to the maximum file alignment that could be required for any
3382 ELF data structure. */
3383
268b6b39 3384static inline file_ptr
217aa764 3385align_file_position (file_ptr off, int align)
252b5132
RH
3386{
3387 return (off + align - 1) & ~(align - 1);
3388}
3389
3390/* Assign a file position to a section, optionally aligning to the
3391 required section alignment. */
3392
217aa764
AM
3393file_ptr
3394_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3395 file_ptr offset,
3396 bfd_boolean align)
252b5132
RH
3397{
3398 if (align)
3399 {
3400 unsigned int al;
3401
3402 al = i_shdrp->sh_addralign;
3403 if (al > 1)
3404 offset = BFD_ALIGN (offset, al);
3405 }
3406 i_shdrp->sh_offset = offset;
3407 if (i_shdrp->bfd_section != NULL)
3408 i_shdrp->bfd_section->filepos = offset;
3409 if (i_shdrp->sh_type != SHT_NOBITS)
3410 offset += i_shdrp->sh_size;
3411 return offset;
3412}
3413
3414/* Compute the file positions we are going to put the sections at, and
3415 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3416 is not NULL, this is being called by the ELF backend linker. */
3417
b34976b6 3418bfd_boolean
217aa764
AM
3419_bfd_elf_compute_section_file_positions (bfd *abfd,
3420 struct bfd_link_info *link_info)
252b5132 3421{
9c5bfbb7 3422 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3423 bfd_boolean failed;
4b6c0f2f 3424 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3425 Elf_Internal_Shdr *shstrtab_hdr;
3426
3427 if (abfd->output_has_begun)
b34976b6 3428 return TRUE;
252b5132
RH
3429
3430 /* Do any elf backend specific processing first. */
3431 if (bed->elf_backend_begin_write_processing)
3432 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3433
3434 if (! prep_headers (abfd))
b34976b6 3435 return FALSE;
252b5132 3436
e6c51ed4
NC
3437 /* Post process the headers if necessary. */
3438 if (bed->elf_backend_post_process_headers)
3439 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3440
b34976b6 3441 failed = FALSE;
252b5132
RH
3442 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3443 if (failed)
b34976b6 3444 return FALSE;
252b5132 3445
da9f89d4 3446 if (!assign_section_numbers (abfd, link_info))
b34976b6 3447 return FALSE;
252b5132
RH
3448
3449 /* The backend linker builds symbol table information itself. */
3450 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3451 {
3452 /* Non-zero if doing a relocatable link. */
3453 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3454
3455 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3456 return FALSE;
252b5132
RH
3457 }
3458
1126897b 3459 if (link_info == NULL)
dbb410c3 3460 {
1126897b 3461 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3462 if (failed)
b34976b6 3463 return FALSE;
dbb410c3
AM
3464 }
3465
252b5132
RH
3466 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3467 /* sh_name was set in prep_headers. */
3468 shstrtab_hdr->sh_type = SHT_STRTAB;
3469 shstrtab_hdr->sh_flags = 0;
3470 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3471 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3472 shstrtab_hdr->sh_entsize = 0;
3473 shstrtab_hdr->sh_link = 0;
3474 shstrtab_hdr->sh_info = 0;
3475 /* sh_offset is set in assign_file_positions_except_relocs. */
3476 shstrtab_hdr->sh_addralign = 1;
3477
c84fca4d 3478 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3479 return FALSE;
252b5132
RH
3480
3481 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3482 {
3483 file_ptr off;
3484 Elf_Internal_Shdr *hdr;
3485
3486 off = elf_tdata (abfd)->next_file_pos;
3487
3488 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3489 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3490
9ad5cbcf
AM
3491 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3492 if (hdr->sh_size != 0)
b34976b6 3493 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3494
252b5132 3495 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3496 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3497
3498 elf_tdata (abfd)->next_file_pos = off;
3499
3500 /* Now that we know where the .strtab section goes, write it
3501 out. */
3502 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3503 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3504 return FALSE;
252b5132
RH
3505 _bfd_stringtab_free (strtab);
3506 }
3507
b34976b6 3508 abfd->output_has_begun = TRUE;
252b5132 3509
b34976b6 3510 return TRUE;
252b5132
RH
3511}
3512
3513/* Create a mapping from a set of sections to a program segment. */
3514
217aa764
AM
3515static struct elf_segment_map *
3516make_mapping (bfd *abfd,
3517 asection **sections,
3518 unsigned int from,
3519 unsigned int to,
3520 bfd_boolean phdr)
252b5132
RH
3521{
3522 struct elf_segment_map *m;
3523 unsigned int i;
3524 asection **hdrpp;
dc810e39 3525 bfd_size_type amt;
252b5132 3526
dc810e39
AM
3527 amt = sizeof (struct elf_segment_map);
3528 amt += (to - from - 1) * sizeof (asection *);
217aa764 3529 m = bfd_zalloc (abfd, amt);
252b5132
RH
3530 if (m == NULL)
3531 return NULL;
3532 m->next = NULL;
3533 m->p_type = PT_LOAD;
3534 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3535 m->sections[i - from] = *hdrpp;
3536 m->count = to - from;
3537
3538 if (from == 0 && phdr)
3539 {
3540 /* Include the headers in the first PT_LOAD segment. */
3541 m->includes_filehdr = 1;
3542 m->includes_phdrs = 1;
3543 }
3544
3545 return m;
3546}
3547
229fcec5
MM
3548/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3549 on failure. */
3550
3551struct elf_segment_map *
3552_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3553{
3554 struct elf_segment_map *m;
3555
3556 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3557 if (m == NULL)
3558 return NULL;
3559 m->next = NULL;
3560 m->p_type = PT_DYNAMIC;
3561 m->count = 1;
3562 m->sections[0] = dynsec;
3563
3564 return m;
3565}
3566
252b5132
RH
3567/* Set up a mapping from BFD sections to program segments. */
3568
b34976b6 3569static bfd_boolean
217aa764 3570map_sections_to_segments (bfd *abfd)
252b5132
RH
3571{
3572 asection **sections = NULL;
3573 asection *s;
3574 unsigned int i;
3575 unsigned int count;
3576 struct elf_segment_map *mfirst;
3577 struct elf_segment_map **pm;
3578 struct elf_segment_map *m;
3579 asection *last_hdr;
baaff79e 3580 bfd_vma last_size;
252b5132
RH
3581 unsigned int phdr_index;
3582 bfd_vma maxpagesize;
3583 asection **hdrpp;
b34976b6
AM
3584 bfd_boolean phdr_in_segment = TRUE;
3585 bfd_boolean writable;
13ae64f3
JJ
3586 int tls_count = 0;
3587 asection *first_tls = NULL;
65765700 3588 asection *dynsec, *eh_frame_hdr;
dc810e39 3589 bfd_size_type amt;
252b5132
RH
3590
3591 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3592 return TRUE;
252b5132
RH
3593
3594 if (bfd_count_sections (abfd) == 0)
b34976b6 3595 return TRUE;
252b5132
RH
3596
3597 /* Select the allocated sections, and sort them. */
3598
dc810e39 3599 amt = bfd_count_sections (abfd) * sizeof (asection *);
217aa764 3600 sections = bfd_malloc (amt);
252b5132
RH
3601 if (sections == NULL)
3602 goto error_return;
3603
3604 i = 0;
3605 for (s = abfd->sections; s != NULL; s = s->next)
3606 {
3607 if ((s->flags & SEC_ALLOC) != 0)
3608 {
3609 sections[i] = s;
3610 ++i;
3611 }
3612 }
3613 BFD_ASSERT (i <= bfd_count_sections (abfd));
3614 count = i;
3615
3616 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3617
3618 /* Build the mapping. */
3619
3620 mfirst = NULL;
3621 pm = &mfirst;
3622
3623 /* If we have a .interp section, then create a PT_PHDR segment for
3624 the program headers and a PT_INTERP segment for the .interp
3625 section. */
3626 s = bfd_get_section_by_name (abfd, ".interp");
3627 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3628 {
dc810e39 3629 amt = sizeof (struct elf_segment_map);
217aa764 3630 m = bfd_zalloc (abfd, amt);
252b5132
RH
3631 if (m == NULL)
3632 goto error_return;
3633 m->next = NULL;
3634 m->p_type = PT_PHDR;
3635 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3636 m->p_flags = PF_R | PF_X;
3637 m->p_flags_valid = 1;
3638 m->includes_phdrs = 1;
3639
3640 *pm = m;
3641 pm = &m->next;
3642
dc810e39 3643 amt = sizeof (struct elf_segment_map);
217aa764 3644 m = bfd_zalloc (abfd, amt);
252b5132
RH
3645 if (m == NULL)
3646 goto error_return;
3647 m->next = NULL;
3648 m->p_type = PT_INTERP;
3649 m->count = 1;
3650 m->sections[0] = s;
3651
3652 *pm = m;
3653 pm = &m->next;
3654 }
3655
3656 /* Look through the sections. We put sections in the same program
3657 segment when the start of the second section can be placed within
3658 a few bytes of the end of the first section. */
3659 last_hdr = NULL;
baaff79e 3660 last_size = 0;
252b5132
RH
3661 phdr_index = 0;
3662 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3663 writable = FALSE;
252b5132
RH
3664 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3665 if (dynsec != NULL
3666 && (dynsec->flags & SEC_LOAD) == 0)
3667 dynsec = NULL;
3668
3669 /* Deal with -Ttext or something similar such that the first section
3670 is not adjacent to the program headers. This is an
3671 approximation, since at this point we don't know exactly how many
3672 program headers we will need. */
3673 if (count > 0)
3674 {
3675 bfd_size_type phdr_size;
3676
3677 phdr_size = elf_tdata (abfd)->program_header_size;
3678 if (phdr_size == 0)
3679 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3680 if ((abfd->flags & D_PAGED) == 0
3681 || sections[0]->lma < phdr_size
3682 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3683 phdr_in_segment = FALSE;
252b5132
RH
3684 }
3685
3686 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3687 {
3688 asection *hdr;
b34976b6 3689 bfd_boolean new_segment;
252b5132
RH
3690
3691 hdr = *hdrpp;
3692
3693 /* See if this section and the last one will fit in the same
3694 segment. */
3695
3696 if (last_hdr == NULL)
3697 {
3698 /* If we don't have a segment yet, then we don't need a new
3699 one (we build the last one after this loop). */
b34976b6 3700 new_segment = FALSE;
252b5132
RH
3701 }
3702 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3703 {
3704 /* If this section has a different relation between the
3705 virtual address and the load address, then we need a new
3706 segment. */
b34976b6 3707 new_segment = TRUE;
252b5132 3708 }
baaff79e 3709 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3710 < BFD_ALIGN (hdr->lma, maxpagesize))
3711 {
3712 /* If putting this section in this segment would force us to
3713 skip a page in the segment, then we need a new segment. */
b34976b6 3714 new_segment = TRUE;
252b5132 3715 }
baaff79e
JJ
3716 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3717 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3718 {
3719 /* We don't want to put a loadable section after a
baaff79e
JJ
3720 nonloadable section in the same segment.
3721 Consider .tbss sections as loadable for this purpose. */
b34976b6 3722 new_segment = TRUE;
252b5132
RH
3723 }
3724 else if ((abfd->flags & D_PAGED) == 0)
3725 {
3726 /* If the file is not demand paged, which means that we
3727 don't require the sections to be correctly aligned in the
3728 file, then there is no other reason for a new segment. */
b34976b6 3729 new_segment = FALSE;
252b5132
RH
3730 }
3731 else if (! writable
3732 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3733 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3734 & ~(maxpagesize - 1))
3735 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3736 {
3737 /* We don't want to put a writable section in a read only
3738 segment, unless they are on the same page in memory
3739 anyhow. We already know that the last section does not
3740 bring us past the current section on the page, so the
3741 only case in which the new section is not on the same
3742 page as the previous section is when the previous section
3743 ends precisely on a page boundary. */
b34976b6 3744 new_segment = TRUE;
252b5132
RH
3745 }
3746 else
3747 {
3748 /* Otherwise, we can use the same segment. */
b34976b6 3749 new_segment = FALSE;
252b5132
RH
3750 }
3751
3752 if (! new_segment)
3753 {
3754 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3755 writable = TRUE;
baaff79e
JJ
3756 last_hdr = hdr;
3757 /* .tbss sections effectively have zero size. */
e5caec89 3758 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3759 last_size = hdr->size;
baaff79e
JJ
3760 else
3761 last_size = 0;
252b5132
RH
3762 continue;
3763 }
3764
3765 /* We need a new program segment. We must create a new program
3766 header holding all the sections from phdr_index until hdr. */
3767
3768 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3769 if (m == NULL)
3770 goto error_return;
3771
3772 *pm = m;
3773 pm = &m->next;
3774
3775 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3776 writable = TRUE;
252b5132 3777 else
b34976b6 3778 writable = FALSE;
252b5132
RH
3779
3780 last_hdr = hdr;
baaff79e
JJ
3781 /* .tbss sections effectively have zero size. */
3782 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3783 last_size = hdr->size;
baaff79e
JJ
3784 else
3785 last_size = 0;
252b5132 3786 phdr_index = i;
b34976b6 3787 phdr_in_segment = FALSE;
252b5132
RH
3788 }
3789
3790 /* Create a final PT_LOAD program segment. */
3791 if (last_hdr != NULL)
3792 {
3793 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3794 if (m == NULL)
3795 goto error_return;
3796
3797 *pm = m;
3798 pm = &m->next;
3799 }
3800
3801 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3802 if (dynsec != NULL)
3803 {
229fcec5 3804 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3805 if (m == NULL)
3806 goto error_return;
252b5132
RH
3807 *pm = m;
3808 pm = &m->next;
3809 }
3810
3811 /* For each loadable .note section, add a PT_NOTE segment. We don't
3812 use bfd_get_section_by_name, because if we link together
3813 nonloadable .note sections and loadable .note sections, we will
3814 generate two .note sections in the output file. FIXME: Using
3815 names for section types is bogus anyhow. */
3816 for (s = abfd->sections; s != NULL; s = s->next)
3817 {
3818 if ((s->flags & SEC_LOAD) != 0
3819 && strncmp (s->name, ".note", 5) == 0)
3820 {
dc810e39 3821 amt = sizeof (struct elf_segment_map);
217aa764 3822 m = bfd_zalloc (abfd, amt);
252b5132
RH
3823 if (m == NULL)
3824 goto error_return;
3825 m->next = NULL;
3826 m->p_type = PT_NOTE;
3827 m->count = 1;
3828 m->sections[0] = s;
3829
3830 *pm = m;
3831 pm = &m->next;
3832 }
13ae64f3
JJ
3833 if (s->flags & SEC_THREAD_LOCAL)
3834 {
3835 if (! tls_count)
3836 first_tls = s;
3837 tls_count++;
3838 }
3839 }
3840
3841 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3842 if (tls_count > 0)
3843 {
3844 int i;
3845
3846 amt = sizeof (struct elf_segment_map);
3847 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3848 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3849 if (m == NULL)
3850 goto error_return;
3851 m->next = NULL;
3852 m->p_type = PT_TLS;
3853 m->count = tls_count;
3854 /* Mandated PF_R. */
3855 m->p_flags = PF_R;
3856 m->p_flags_valid = 1;
3857 for (i = 0; i < tls_count; ++i)
3858 {
3859 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3860 m->sections[i] = first_tls;
3861 first_tls = first_tls->next;
3862 }
3863
3864 *pm = m;
3865 pm = &m->next;
252b5132
RH
3866 }
3867
65765700
JJ
3868 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3869 segment. */
126495ed
AM
3870 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3871 if (eh_frame_hdr != NULL
3872 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3873 {
3874 amt = sizeof (struct elf_segment_map);
217aa764 3875 m = bfd_zalloc (abfd, amt);
65765700
JJ
3876 if (m == NULL)
3877 goto error_return;
3878 m->next = NULL;
3879 m->p_type = PT_GNU_EH_FRAME;
3880 m->count = 1;
126495ed 3881 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3882
3883 *pm = m;
3884 pm = &m->next;
3885 }
3886
9ee5e499
JJ
3887 if (elf_tdata (abfd)->stack_flags)
3888 {
3889 amt = sizeof (struct elf_segment_map);
217aa764 3890 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3891 if (m == NULL)
3892 goto error_return;
3893 m->next = NULL;
3894 m->p_type = PT_GNU_STACK;
3895 m->p_flags = elf_tdata (abfd)->stack_flags;
3896 m->p_flags_valid = 1;
3897
3898 *pm = m;
3899 pm = &m->next;
3900 }
3901
8c37241b
JJ
3902 if (elf_tdata (abfd)->relro)
3903 {
3904 amt = sizeof (struct elf_segment_map);
3905 m = bfd_zalloc (abfd, amt);
3906 if (m == NULL)
3907 goto error_return;
3908 m->next = NULL;
3909 m->p_type = PT_GNU_RELRO;
3910 m->p_flags = PF_R;
3911 m->p_flags_valid = 1;
3912
3913 *pm = m;
3914 pm = &m->next;
3915 }
3916
252b5132
RH
3917 free (sections);
3918 sections = NULL;
3919
3920 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3921 return TRUE;
252b5132
RH
3922
3923 error_return:
3924 if (sections != NULL)
3925 free (sections);
b34976b6 3926 return FALSE;
252b5132
RH
3927}
3928
3929/* Sort sections by address. */
3930
3931static int
217aa764 3932elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3933{
3934 const asection *sec1 = *(const asection **) arg1;
3935 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3936 bfd_size_type size1, size2;
252b5132
RH
3937
3938 /* Sort by LMA first, since this is the address used to
3939 place the section into a segment. */
3940 if (sec1->lma < sec2->lma)
3941 return -1;
3942 else if (sec1->lma > sec2->lma)
3943 return 1;
3944
3945 /* Then sort by VMA. Normally the LMA and the VMA will be
3946 the same, and this will do nothing. */
3947 if (sec1->vma < sec2->vma)
3948 return -1;
3949 else if (sec1->vma > sec2->vma)
3950 return 1;
3951
3952 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3953
07c6e936 3954#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3955
3956 if (TOEND (sec1))
3957 {
3958 if (TOEND (sec2))
00a7cdc5
NC
3959 {
3960 /* If the indicies are the same, do not return 0
3961 here, but continue to try the next comparison. */
3962 if (sec1->target_index - sec2->target_index != 0)
3963 return sec1->target_index - sec2->target_index;
3964 }
252b5132
RH
3965 else
3966 return 1;
3967 }
00a7cdc5 3968 else if (TOEND (sec2))
252b5132
RH
3969 return -1;
3970
3971#undef TOEND
3972
00a7cdc5
NC
3973 /* Sort by size, to put zero sized sections
3974 before others at the same address. */
252b5132 3975
eea6121a
AM
3976 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
3977 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
3978
3979 if (size1 < size2)
252b5132 3980 return -1;
eecdbe52 3981 if (size1 > size2)
252b5132
RH
3982 return 1;
3983
3984 return sec1->target_index - sec2->target_index;
3985}
3986
340b6d91
AC
3987/* Ian Lance Taylor writes:
3988
3989 We shouldn't be using % with a negative signed number. That's just
3990 not good. We have to make sure either that the number is not
3991 negative, or that the number has an unsigned type. When the types
3992 are all the same size they wind up as unsigned. When file_ptr is a
3993 larger signed type, the arithmetic winds up as signed long long,
3994 which is wrong.
3995
3996 What we're trying to say here is something like ``increase OFF by
3997 the least amount that will cause it to be equal to the VMA modulo
3998 the page size.'' */
3999/* In other words, something like:
4000
4001 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4002 off_offset = off % bed->maxpagesize;
4003 if (vma_offset < off_offset)
4004 adjustment = vma_offset + bed->maxpagesize - off_offset;
4005 else
4006 adjustment = vma_offset - off_offset;
4007
4008 which can can be collapsed into the expression below. */
4009
4010static file_ptr
4011vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4012{
4013 return ((vma - off) % maxpagesize);
4014}
4015
252b5132
RH
4016/* Assign file positions to the sections based on the mapping from
4017 sections to segments. This function also sets up some fields in
4018 the file header, and writes out the program headers. */
4019
b34976b6 4020static bfd_boolean
c84fca4d 4021assign_file_positions_for_segments (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
4022{
4023 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4024 unsigned int count;
4025 struct elf_segment_map *m;
4026 unsigned int alloc;
4027 Elf_Internal_Phdr *phdrs;
4028 file_ptr off, voff;
4029 bfd_vma filehdr_vaddr, filehdr_paddr;
4030 bfd_vma phdrs_vaddr, phdrs_paddr;
4031 Elf_Internal_Phdr *p;
dc810e39 4032 bfd_size_type amt;
252b5132
RH
4033
4034 if (elf_tdata (abfd)->segment_map == NULL)
4035 {
4036 if (! map_sections_to_segments (abfd))
b34976b6 4037 return FALSE;
252b5132 4038 }
1ed89aa9
NC
4039 else
4040 {
4041 /* The placement algorithm assumes that non allocated sections are
4042 not in PT_LOAD segments. We ensure this here by removing such
4043 sections from the segment map. */
4044 for (m = elf_tdata (abfd)->segment_map;
4045 m != NULL;
4046 m = m->next)
4047 {
4048 unsigned int new_count;
4049 unsigned int i;
4050
4051 if (m->p_type != PT_LOAD)
4052 continue;
4053
4054 new_count = 0;
4055 for (i = 0; i < m->count; i ++)
4056 {
4057 if ((m->sections[i]->flags & SEC_ALLOC) != 0)
4058 {
47d9a591 4059 if (i != new_count)
1ed89aa9
NC
4060 m->sections[new_count] = m->sections[i];
4061
4062 new_count ++;
4063 }
4064 }
4065
4066 if (new_count != m->count)
4067 m->count = new_count;
4068 }
4069 }
252b5132
RH
4070
4071 if (bed->elf_backend_modify_segment_map)
4072 {
c84fca4d 4073 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 4074 return FALSE;
252b5132
RH
4075 }
4076
4077 count = 0;
4078 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4079 ++count;
4080
4081 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4082 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4083 elf_elfheader (abfd)->e_phnum = count;
4084
4085 if (count == 0)
0ebdbb83
BW
4086 {
4087 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4088 return TRUE;
4089 }
252b5132
RH
4090
4091 /* If we already counted the number of program segments, make sure
4092 that we allocated enough space. This happens when SIZEOF_HEADERS
4093 is used in a linker script. */
4094 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
4095 if (alloc != 0 && count > alloc)
4096 {
4097 ((*_bfd_error_handler)
b301b248
AM
4098 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
4099 abfd, alloc, count));
252b5132 4100 bfd_set_error (bfd_error_bad_value);
b34976b6 4101 return FALSE;
252b5132
RH
4102 }
4103
4104 if (alloc == 0)
4105 alloc = count;
4106
dc810e39 4107 amt = alloc * sizeof (Elf_Internal_Phdr);
217aa764 4108 phdrs = bfd_alloc (abfd, amt);
252b5132 4109 if (phdrs == NULL)
b34976b6 4110 return FALSE;
252b5132
RH
4111
4112 off = bed->s->sizeof_ehdr;
4113 off += alloc * bed->s->sizeof_phdr;
4114
4115 filehdr_vaddr = 0;
4116 filehdr_paddr = 0;
4117 phdrs_vaddr = 0;
4118 phdrs_paddr = 0;
4119
4120 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4121 m != NULL;
4122 m = m->next, p++)
4123 {
4124 unsigned int i;
4125 asection **secpp;
4126
4127 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4128 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4129 not be done to the PT_NOTE section of a corefile, which may
4130 contain several pseudo-sections artificially created by bfd.
4131 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4132 if (m->count > 1
4133 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4134 && m->p_type == PT_NOTE))
252b5132
RH
4135 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4136 elf_sort_sections);
4137
b301b248
AM
4138 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4139 number of sections with contents contributing to both p_filesz
4140 and p_memsz, followed by a number of sections with no contents
4141 that just contribute to p_memsz. In this loop, OFF tracks next
4142 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4143 an adjustment we use for segments that have no file contents
4144 but need zero filled memory allocation. */
4145 voff = 0;
252b5132 4146 p->p_type = m->p_type;
28a7f3e7 4147 p->p_flags = m->p_flags;
252b5132
RH
4148
4149 if (p->p_type == PT_LOAD
b301b248 4150 && m->count > 0)
252b5132 4151 {
b301b248
AM
4152 bfd_size_type align;
4153 bfd_vma adjust;
a49e53ed 4154 unsigned int align_power = 0;
b301b248 4155
a49e53ed 4156 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4157 {
a49e53ed 4158 unsigned int secalign;
252b5132 4159
a49e53ed
AM
4160 secalign = bfd_get_section_alignment (abfd, *secpp);
4161 if (secalign > align_power)
4162 align_power = secalign;
b301b248 4163 }
a49e53ed
AM
4164 align = (bfd_size_type) 1 << align_power;
4165
4166 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > align)
4167 align = bed->maxpagesize;
252b5132 4168
b301b248
AM
4169 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4170 off += adjust;
4171 if (adjust != 0
4172 && !m->includes_filehdr
4173 && !m->includes_phdrs
4174 && (ufile_ptr) off >= align)
4175 {
4176 /* If the first section isn't loadable, the same holds for
4177 any other sections. Since the segment won't need file
4178 space, we can make p_offset overlap some prior segment.
4179 However, .tbss is special. If a segment starts with
4180 .tbss, we need to look at the next section to decide
4181 whether the segment has any loadable sections. */
4182 i = 0;
5efb6261 4183 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
4184 {
4185 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4186 || ++i >= m->count)
4187 {
4188 off -= adjust;
4189 voff = adjust - align;
4190 break;
4191 }
4192 }
252b5132
RH
4193 }
4194 }
b1a6d0b1
NC
4195 /* Make sure the .dynamic section is the first section in the
4196 PT_DYNAMIC segment. */
4197 else if (p->p_type == PT_DYNAMIC
4198 && m->count > 1
4199 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4200 {
4201 _bfd_error_handler
b301b248
AM
4202 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4203 abfd);
b1a6d0b1
NC
4204 bfd_set_error (bfd_error_bad_value);
4205 return FALSE;
4206 }
252b5132
RH
4207
4208 if (m->count == 0)
4209 p->p_vaddr = 0;
4210 else
4211 p->p_vaddr = m->sections[0]->vma;
4212
4213 if (m->p_paddr_valid)
4214 p->p_paddr = m->p_paddr;
4215 else if (m->count == 0)
4216 p->p_paddr = 0;
4217 else
4218 p->p_paddr = m->sections[0]->lma;
4219
4220 if (p->p_type == PT_LOAD
4221 && (abfd->flags & D_PAGED) != 0)
4222 p->p_align = bed->maxpagesize;
4223 else if (m->count == 0)
45d6a902 4224 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
4225 else
4226 p->p_align = 0;
4227
4228 p->p_offset = 0;
4229 p->p_filesz = 0;
4230 p->p_memsz = 0;
4231
4232 if (m->includes_filehdr)
4233 {
4234 if (! m->p_flags_valid)
4235 p->p_flags |= PF_R;
4236 p->p_offset = 0;
4237 p->p_filesz = bed->s->sizeof_ehdr;
4238 p->p_memsz = bed->s->sizeof_ehdr;
4239 if (m->count > 0)
4240 {
4241 BFD_ASSERT (p->p_type == PT_LOAD);
4242
4243 if (p->p_vaddr < (bfd_vma) off)
4244 {
caf47ea6 4245 (*_bfd_error_handler)
b301b248
AM
4246 (_("%B: Not enough room for program headers, try linking with -N"),
4247 abfd);
252b5132 4248 bfd_set_error (bfd_error_bad_value);
b34976b6 4249 return FALSE;
252b5132
RH
4250 }
4251
4252 p->p_vaddr -= off;
4253 if (! m->p_paddr_valid)
4254 p->p_paddr -= off;
4255 }
4256 if (p->p_type == PT_LOAD)
4257 {
4258 filehdr_vaddr = p->p_vaddr;
4259 filehdr_paddr = p->p_paddr;
4260 }
4261 }
4262
4263 if (m->includes_phdrs)
4264 {
4265 if (! m->p_flags_valid)
4266 p->p_flags |= PF_R;
4267
4268 if (m->includes_filehdr)
4269 {
4270 if (p->p_type == PT_LOAD)
4271 {
4272 phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr;
4273 phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr;
4274 }
4275 }
4276 else
4277 {
4278 p->p_offset = bed->s->sizeof_ehdr;
4279
4280 if (m->count > 0)
4281 {
4282 BFD_ASSERT (p->p_type == PT_LOAD);
4283 p->p_vaddr -= off - p->p_offset;
4284 if (! m->p_paddr_valid)
4285 p->p_paddr -= off - p->p_offset;
4286 }
4287
4288 if (p->p_type == PT_LOAD)
4289 {
4290 phdrs_vaddr = p->p_vaddr;
4291 phdrs_paddr = p->p_paddr;
4292 }
4293 else
4294 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4295 }
4296
4297 p->p_filesz += alloc * bed->s->sizeof_phdr;
4298 p->p_memsz += alloc * bed->s->sizeof_phdr;
4299 }
4300
4301 if (p->p_type == PT_LOAD
4302 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4303 {
4304 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4305 p->p_offset = off + voff;
252b5132
RH
4306 else
4307 {
4308 file_ptr adjust;
4309
4310 adjust = off - (p->p_offset + p->p_filesz);
4311 p->p_filesz += adjust;
4312 p->p_memsz += adjust;
4313 }
4314 }
4315
252b5132
RH
4316 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4317 {
4318 asection *sec;
4319 flagword flags;
4320 bfd_size_type align;
4321
4322 sec = *secpp;
4323 flags = sec->flags;
4324 align = 1 << bfd_get_section_alignment (abfd, sec);
4325
b301b248
AM
4326 if (p->p_type == PT_LOAD
4327 || p->p_type == PT_TLS)
252b5132
RH
4328 {
4329 bfd_signed_vma adjust;
4330
5efb6261 4331 if ((flags & SEC_LOAD) != 0)
252b5132 4332 {
b301b248 4333 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4334 if (adjust < 0)
b301b248
AM
4335 {
4336 (*_bfd_error_handler)
4337 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4338 abfd, sec, (unsigned long) sec->lma);
4339 adjust = 0;
4340 }
4341 off += adjust;
4342 p->p_filesz += adjust;
4343 p->p_memsz += adjust;
252b5132 4344 }
b301b248
AM
4345 /* .tbss is special. It doesn't contribute to p_memsz of
4346 normal segments. */
4347 else if ((flags & SEC_THREAD_LOCAL) == 0
4348 || p->p_type == PT_TLS)
252b5132
RH
4349 {
4350 /* The section VMA must equal the file position
b301b248
AM
4351 modulo the page size. */
4352 bfd_size_type page = align;
a49e53ed 4353 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > page)
b301b248
AM
4354 page = bed->maxpagesize;
4355 adjust = vma_page_aligned_bias (sec->vma,
4356 p->p_vaddr + p->p_memsz,
4357 page);
252b5132 4358 p->p_memsz += adjust;
252b5132 4359 }
252b5132
RH
4360 }
4361
4362 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4363 {
b301b248
AM
4364 /* The section at i == 0 is the one that actually contains
4365 everything. */
4a938328
MS
4366 if (i == 0)
4367 {
252b5132 4368 sec->filepos = off;
eea6121a 4369 off += sec->size;
b301b248
AM
4370 p->p_filesz = sec->size;
4371 p->p_memsz = 0;
4372 p->p_align = 1;
252b5132 4373 }
4a938328 4374 else
252b5132 4375 {
b301b248 4376 /* The rest are fake sections that shouldn't be written. */
252b5132 4377 sec->filepos = 0;
eea6121a 4378 sec->size = 0;
b301b248
AM
4379 sec->flags = 0;
4380 continue;
252b5132 4381 }
252b5132
RH
4382 }
4383 else
4384 {
b301b248
AM
4385 if (p->p_type == PT_LOAD)
4386 {
4387 sec->filepos = off;
5efb6261
AM
4388 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4389 1997, and the exact reason for it isn't clear. One
4390 plausible explanation is that it is to work around
4391 a problem we have with linker scripts using data
4392 statements in NOLOAD sections. I don't think it
4393 makes a great deal of sense to have such a section
4394 assigned to a PT_LOAD segment, but apparently
4395 people do this. The data statement results in a
4396 bfd_data_link_order being built, and these need
4397 section contents to write into. Eventually, we get
4398 to _bfd_elf_write_object_contents which writes any
4399 section with contents to the output. Make room
4400 here for the write, so that following segments are
4401 not trashed. */
4402 if ((flags & SEC_LOAD) != 0
4403 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4404 off += sec->size;
4405 }
252b5132 4406
5efb6261 4407 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4408 {
4409 p->p_filesz += sec->size;
4410 p->p_memsz += sec->size;
4411 }
4b6c0f2f
NC
4412 /* PR ld/594: Sections in note segments which are not loaded
4413 contribute to the file size but not the in-memory size. */
4414 else if (p->p_type == PT_NOTE
4415 && (flags & SEC_HAS_CONTENTS) != 0)
4416 p->p_filesz += sec->size;
4417
b301b248
AM
4418 /* .tbss is special. It doesn't contribute to p_memsz of
4419 normal segments. */
4420 else if ((flags & SEC_THREAD_LOCAL) == 0
4421 || p->p_type == PT_TLS)
4422 p->p_memsz += sec->size;
252b5132 4423
13ae64f3 4424 if (p->p_type == PT_TLS
eea6121a 4425 && sec->size == 0
13ae64f3
JJ
4426 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4427 {
4428 struct bfd_link_order *o;
4429 bfd_vma tbss_size = 0;
4430
8423293d 4431 for (o = sec->map_head.link_order; o != NULL; o = o->next)
13ae64f3
JJ
4432 if (tbss_size < o->offset + o->size)
4433 tbss_size = o->offset + o->size;
4434
4435 p->p_memsz += tbss_size;
4436 }
4437
252b5132
RH
4438 if (align > p->p_align
4439 && (p->p_type != PT_LOAD || (abfd->flags & D_PAGED) == 0))
4440 p->p_align = align;
4441 }
4442
4443 if (! m->p_flags_valid)
4444 {
4445 p->p_flags |= PF_R;
4446 if ((flags & SEC_CODE) != 0)
4447 p->p_flags |= PF_X;
4448 if ((flags & SEC_READONLY) == 0)
4449 p->p_flags |= PF_W;
4450 }
4451 }
4452 }
4453
4454 /* Now that we have set the section file positions, we can set up
4455 the file positions for the non PT_LOAD segments. */
4456 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4457 m != NULL;
4458 m = m->next, p++)
4459 {
4460 if (p->p_type != PT_LOAD && m->count > 0)
4461 {
4462 BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs);
229fcec5
MM
4463 /* If the section has not yet been assigned a file position,
4464 do so now. The ARM BPABI requires that .dynamic section
4465 not be marked SEC_ALLOC because it is not part of any
4466 PT_LOAD segment, so it will not be processed above. */
4467 if (p->p_type == PT_DYNAMIC && m->sections[0]->filepos == 0)
4468 {
4469 unsigned int i;
4470 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4471
4472 i = 1;
4473 while (i_shdrpp[i]->bfd_section != m->sections[0])
4474 ++i;
4475 off = (_bfd_elf_assign_file_position_for_section
4476 (i_shdrpp[i], off, TRUE));
4477 p->p_filesz = m->sections[0]->size;
4478 }
252b5132
RH
4479 p->p_offset = m->sections[0]->filepos;
4480 }
4481 if (m->count == 0)
4482 {
4483 if (m->includes_filehdr)
4484 {
4485 p->p_vaddr = filehdr_vaddr;
4486 if (! m->p_paddr_valid)
4487 p->p_paddr = filehdr_paddr;
4488 }
4489 else if (m->includes_phdrs)
4490 {
4491 p->p_vaddr = phdrs_vaddr;
4492 if (! m->p_paddr_valid)
4493 p->p_paddr = phdrs_paddr;
4494 }
8c37241b
JJ
4495 else if (p->p_type == PT_GNU_RELRO)
4496 {
4497 Elf_Internal_Phdr *lp;
4498
4499 for (lp = phdrs; lp < phdrs + count; ++lp)
4500 {
4501 if (lp->p_type == PT_LOAD
4502 && lp->p_vaddr <= link_info->relro_end
4503 && lp->p_vaddr >= link_info->relro_start
4504 && lp->p_vaddr + lp->p_filesz
4505 >= link_info->relro_end)
4506 break;
4507 }
4508
4509 if (lp < phdrs + count
4510 && link_info->relro_end > lp->p_vaddr)
4511 {
4512 p->p_vaddr = lp->p_vaddr;
4513 p->p_paddr = lp->p_paddr;
4514 p->p_offset = lp->p_offset;
4515 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4516 p->p_memsz = p->p_filesz;
4517 p->p_align = 1;
4518 p->p_flags = (lp->p_flags & ~PF_W);
4519 }
4520 else
4521 {
4522 memset (p, 0, sizeof *p);
4523 p->p_type = PT_NULL;
4524 }
4525 }
252b5132
RH
4526 }
4527 }
4528
4529 /* Clear out any program headers we allocated but did not use. */
4530 for (; count < alloc; count++, p++)
4531 {
4532 memset (p, 0, sizeof *p);
4533 p->p_type = PT_NULL;
4534 }
4535
4536 elf_tdata (abfd)->phdr = phdrs;
4537
4538 elf_tdata (abfd)->next_file_pos = off;
4539
4540 /* Write out the program headers. */
dc810e39 4541 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
252b5132 4542 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0)
b34976b6 4543 return FALSE;
252b5132 4544
b34976b6 4545 return TRUE;
252b5132
RH
4546}
4547
4548/* Get the size of the program header.
4549
4550 If this is called by the linker before any of the section VMA's are set, it
4551 can't calculate the correct value for a strange memory layout. This only
4552 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4553 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4554 data segment (exclusive of .interp and .dynamic).
4555
4556 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4557 will be two segments. */
4558
4559static bfd_size_type
217aa764 4560get_program_header_size (bfd *abfd)
252b5132
RH
4561{
4562 size_t segs;
4563 asection *s;
9c5bfbb7 4564 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4565
4566 /* We can't return a different result each time we're called. */
4567 if (elf_tdata (abfd)->program_header_size != 0)
4568 return elf_tdata (abfd)->program_header_size;
4569
4570 if (elf_tdata (abfd)->segment_map != NULL)
4571 {
4572 struct elf_segment_map *m;
4573
4574 segs = 0;
4575 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4576 ++segs;
4577 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4578 return elf_tdata (abfd)->program_header_size;
4579 }
4580
4581 /* Assume we will need exactly two PT_LOAD segments: one for text
4582 and one for data. */
4583 segs = 2;
4584
4585 s = bfd_get_section_by_name (abfd, ".interp");
4586 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4587 {
4588 /* If we have a loadable interpreter section, we need a
4589 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4590 PT_PHDR segment, although that may not be true for all
252b5132
RH
4591 targets. */
4592 segs += 2;
4593 }
4594
4595 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4596 {
4597 /* We need a PT_DYNAMIC segment. */
4598 ++segs;
4599 }
4600
126495ed 4601 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4602 {
4603 /* We need a PT_GNU_EH_FRAME segment. */
4604 ++segs;
4605 }
4606
9ee5e499
JJ
4607 if (elf_tdata (abfd)->stack_flags)
4608 {
4609 /* We need a PT_GNU_STACK segment. */
4610 ++segs;
4611 }
4612
8c37241b
JJ
4613 if (elf_tdata (abfd)->relro)
4614 {
4615 /* We need a PT_GNU_RELRO segment. */
4616 ++segs;
4617 }
4618
252b5132
RH
4619 for (s = abfd->sections; s != NULL; s = s->next)
4620 {
4621 if ((s->flags & SEC_LOAD) != 0
4622 && strncmp (s->name, ".note", 5) == 0)
4623 {
4624 /* We need a PT_NOTE segment. */
4625 ++segs;
4626 }
4627 }
4628
13ae64f3
JJ
4629 for (s = abfd->sections; s != NULL; s = s->next)
4630 {
4631 if (s->flags & SEC_THREAD_LOCAL)
4632 {
4633 /* We need a PT_TLS segment. */
4634 ++segs;
4635 break;
4636 }
4637 }
4638
252b5132
RH
4639 /* Let the backend count up any program headers it might need. */
4640 if (bed->elf_backend_additional_program_headers)
4641 {
4642 int a;
4643
4644 a = (*bed->elf_backend_additional_program_headers) (abfd);
4645 if (a == -1)
4646 abort ();
4647 segs += a;
4648 }
4649
4650 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4651 return elf_tdata (abfd)->program_header_size;
4652}
4653
4654/* Work out the file positions of all the sections. This is called by
4655 _bfd_elf_compute_section_file_positions. All the section sizes and
4656 VMAs must be known before this is called.
4657
e0638f70
AM
4658 Reloc sections come in two flavours: Those processed specially as
4659 "side-channel" data attached to a section to which they apply, and
4660 those that bfd doesn't process as relocations. The latter sort are
4661 stored in a normal bfd section by bfd_section_from_shdr. We don't
4662 consider the former sort here, unless they form part of the loadable
4663 image. Reloc sections not assigned here will be handled later by
4664 assign_file_positions_for_relocs.
252b5132
RH
4665
4666 We also don't set the positions of the .symtab and .strtab here. */
4667
b34976b6 4668static bfd_boolean
c84fca4d
AO
4669assign_file_positions_except_relocs (bfd *abfd,
4670 struct bfd_link_info *link_info)
252b5132
RH
4671{
4672 struct elf_obj_tdata * const tdata = elf_tdata (abfd);
4673 Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd);
4674 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
9ad5cbcf 4675 unsigned int num_sec = elf_numsections (abfd);
252b5132 4676 file_ptr off;
9c5bfbb7 4677 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4678
4679 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4680 && bfd_get_format (abfd) != bfd_core)
4681 {
4682 Elf_Internal_Shdr **hdrpp;
4683 unsigned int i;
4684
4685 /* Start after the ELF header. */
4686 off = i_ehdrp->e_ehsize;
4687
4688 /* We are not creating an executable, which means that we are
4689 not creating a program header, and that the actual order of
4690 the sections in the file is unimportant. */
9ad5cbcf 4691 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4692 {
4693 Elf_Internal_Shdr *hdr;
4694
4695 hdr = *hdrpp;
e0638f70
AM
4696 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4697 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4698 || i == tdata->symtab_section
4699 || i == tdata->symtab_shndx_section
252b5132
RH
4700 || i == tdata->strtab_section)
4701 {
4702 hdr->sh_offset = -1;
252b5132 4703 }
9ad5cbcf 4704 else
b34976b6 4705 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4706
9ad5cbcf
AM
4707 if (i == SHN_LORESERVE - 1)
4708 {
4709 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4710 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4711 }
252b5132
RH
4712 }
4713 }
4714 else
4715 {
4716 unsigned int i;
4717 Elf_Internal_Shdr **hdrpp;
4718
4719 /* Assign file positions for the loaded sections based on the
4720 assignment of sections to segments. */
c84fca4d 4721 if (! assign_file_positions_for_segments (abfd, link_info))
b34976b6 4722 return FALSE;
252b5132
RH
4723
4724 /* Assign file positions for the other sections. */
4725
4726 off = elf_tdata (abfd)->next_file_pos;
9ad5cbcf 4727 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4728 {
4729 Elf_Internal_Shdr *hdr;
4730
4731 hdr = *hdrpp;
4732 if (hdr->bfd_section != NULL
4733 && hdr->bfd_section->filepos != 0)
4734 hdr->sh_offset = hdr->bfd_section->filepos;
4735 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4736 {
4737 ((*_bfd_error_handler)
b301b248
AM
4738 (_("%B: warning: allocated section `%s' not in segment"),
4739 abfd,
252b5132
RH
4740 (hdr->bfd_section == NULL
4741 ? "*unknown*"
4742 : hdr->bfd_section->name)));
4743 if ((abfd->flags & D_PAGED) != 0)
340b6d91
AC
4744 off += vma_page_aligned_bias (hdr->sh_addr, off,
4745 bed->maxpagesize);
252b5132 4746 else
340b6d91
AC
4747 off += vma_page_aligned_bias (hdr->sh_addr, off,
4748 hdr->sh_addralign);
252b5132 4749 off = _bfd_elf_assign_file_position_for_section (hdr, off,
b34976b6 4750 FALSE);
252b5132 4751 }
e0638f70
AM
4752 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4753 && hdr->bfd_section == NULL)
252b5132 4754 || hdr == i_shdrpp[tdata->symtab_section]
9ad5cbcf 4755 || hdr == i_shdrpp[tdata->symtab_shndx_section]
252b5132
RH
4756 || hdr == i_shdrpp[tdata->strtab_section])
4757 hdr->sh_offset = -1;
4758 else
b34976b6 4759 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf
AM
4760
4761 if (i == SHN_LORESERVE - 1)
4762 {
4763 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4764 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4765 }
252b5132
RH
4766 }
4767 }
4768
4769 /* Place the section headers. */
45d6a902 4770 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4771 i_ehdrp->e_shoff = off;
4772 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4773
4774 elf_tdata (abfd)->next_file_pos = off;
4775
b34976b6 4776 return TRUE;
252b5132
RH
4777}
4778
b34976b6 4779static bfd_boolean
217aa764 4780prep_headers (bfd *abfd)
252b5132
RH
4781{
4782 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4783 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4784 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4785 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4786 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4787
4788 i_ehdrp = elf_elfheader (abfd);
4789 i_shdrp = elf_elfsections (abfd);
4790
2b0f7ef9 4791 shstrtab = _bfd_elf_strtab_init ();
252b5132 4792 if (shstrtab == NULL)
b34976b6 4793 return FALSE;
252b5132
RH
4794
4795 elf_shstrtab (abfd) = shstrtab;
4796
4797 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4798 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4799 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4800 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4801
4802 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4803 i_ehdrp->e_ident[EI_DATA] =
4804 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4805 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4806
252b5132
RH
4807 if ((abfd->flags & DYNAMIC) != 0)
4808 i_ehdrp->e_type = ET_DYN;
4809 else if ((abfd->flags & EXEC_P) != 0)
4810 i_ehdrp->e_type = ET_EXEC;
4811 else if (bfd_get_format (abfd) == bfd_core)
4812 i_ehdrp->e_type = ET_CORE;
4813 else
4814 i_ehdrp->e_type = ET_REL;
4815
4816 switch (bfd_get_arch (abfd))
4817 {
4818 case bfd_arch_unknown:
4819 i_ehdrp->e_machine = EM_NONE;
4820 break;
aa4f99bb
AO
4821
4822 /* There used to be a long list of cases here, each one setting
4823 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4824 in the corresponding bfd definition. To avoid duplication,
4825 the switch was removed. Machines that need special handling
4826 can generally do it in elf_backend_final_write_processing(),
4827 unless they need the information earlier than the final write.
4828 Such need can generally be supplied by replacing the tests for
4829 e_machine with the conditions used to determine it. */
252b5132 4830 default:
9c5bfbb7
AM
4831 i_ehdrp->e_machine = bed->elf_machine_code;
4832 }
aa4f99bb 4833
252b5132
RH
4834 i_ehdrp->e_version = bed->s->ev_current;
4835 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4836
c044fabd 4837 /* No program header, for now. */
252b5132
RH
4838 i_ehdrp->e_phoff = 0;
4839 i_ehdrp->e_phentsize = 0;
4840 i_ehdrp->e_phnum = 0;
4841
c044fabd 4842 /* Each bfd section is section header entry. */
252b5132
RH
4843 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4844 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4845
c044fabd 4846 /* If we're building an executable, we'll need a program header table. */
252b5132 4847 if (abfd->flags & EXEC_P)
0e71e495
BE
4848 /* It all happens later. */
4849 ;
252b5132
RH
4850 else
4851 {
4852 i_ehdrp->e_phentsize = 0;
4853 i_phdrp = 0;
4854 i_ehdrp->e_phoff = 0;
4855 }
4856
4857 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4858 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4859 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4860 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4861 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4862 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4863 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4864 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4865 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4866 return FALSE;
252b5132 4867
b34976b6 4868 return TRUE;
252b5132
RH
4869}
4870
4871/* Assign file positions for all the reloc sections which are not part
4872 of the loadable file image. */
4873
4874void
217aa764 4875_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4876{
4877 file_ptr off;
9ad5cbcf 4878 unsigned int i, num_sec;
252b5132
RH
4879 Elf_Internal_Shdr **shdrpp;
4880
4881 off = elf_tdata (abfd)->next_file_pos;
4882
9ad5cbcf
AM
4883 num_sec = elf_numsections (abfd);
4884 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4885 {
4886 Elf_Internal_Shdr *shdrp;
4887
4888 shdrp = *shdrpp;
4889 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4890 && shdrp->sh_offset == -1)
b34976b6 4891 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4892 }
4893
4894 elf_tdata (abfd)->next_file_pos = off;
4895}
4896
b34976b6 4897bfd_boolean
217aa764 4898_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4899{
9c5bfbb7 4900 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4901 Elf_Internal_Ehdr *i_ehdrp;
4902 Elf_Internal_Shdr **i_shdrp;
b34976b6 4903 bfd_boolean failed;
9ad5cbcf 4904 unsigned int count, num_sec;
252b5132
RH
4905
4906 if (! abfd->output_has_begun
217aa764 4907 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4908 return FALSE;
252b5132
RH
4909
4910 i_shdrp = elf_elfsections (abfd);
4911 i_ehdrp = elf_elfheader (abfd);
4912
b34976b6 4913 failed = FALSE;
252b5132
RH
4914 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4915 if (failed)
b34976b6 4916 return FALSE;
252b5132
RH
4917
4918 _bfd_elf_assign_file_positions_for_relocs (abfd);
4919
c044fabd 4920 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4921 num_sec = elf_numsections (abfd);
4922 for (count = 1; count < num_sec; count++)
252b5132
RH
4923 {
4924 if (bed->elf_backend_section_processing)
4925 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4926 if (i_shdrp[count]->contents)
4927 {
dc810e39
AM
4928 bfd_size_type amt = i_shdrp[count]->sh_size;
4929
252b5132 4930 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4931 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4932 return FALSE;
252b5132 4933 }
9ad5cbcf
AM
4934 if (count == SHN_LORESERVE - 1)
4935 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4936 }
4937
4938 /* Write out the section header names. */
26ae6d5e
DJ
4939 if (elf_shstrtab (abfd) != NULL
4940 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
4941 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4942 return FALSE;
252b5132
RH
4943
4944 if (bed->elf_backend_final_write_processing)
4945 (*bed->elf_backend_final_write_processing) (abfd,
4946 elf_tdata (abfd)->linker);
4947
4948 return bed->s->write_shdrs_and_ehdr (abfd);
4949}
4950
b34976b6 4951bfd_boolean
217aa764 4952_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4953{
c044fabd 4954 /* Hopefully this can be done just like an object file. */
252b5132
RH
4955 return _bfd_elf_write_object_contents (abfd);
4956}
c044fabd
KH
4957
4958/* Given a section, search the header to find them. */
4959
252b5132 4960int
198beae2 4961_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4962{
9c5bfbb7 4963 const struct elf_backend_data *bed;
252b5132 4964 int index;
252b5132 4965
9ad5cbcf
AM
4966 if (elf_section_data (asect) != NULL
4967 && elf_section_data (asect)->this_idx != 0)
4968 return elf_section_data (asect)->this_idx;
4969
4970 if (bfd_is_abs_section (asect))
af746e92
AM
4971 index = SHN_ABS;
4972 else if (bfd_is_com_section (asect))
4973 index = SHN_COMMON;
4974 else if (bfd_is_und_section (asect))
4975 index = SHN_UNDEF;
4976 else
6dc132d9 4977 index = -1;
252b5132 4978
af746e92 4979 bed = get_elf_backend_data (abfd);
252b5132
RH
4980 if (bed->elf_backend_section_from_bfd_section)
4981 {
af746e92 4982 int retval = index;
9ad5cbcf 4983
af746e92
AM
4984 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
4985 return retval;
252b5132
RH
4986 }
4987
af746e92
AM
4988 if (index == -1)
4989 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 4990
af746e92 4991 return index;
252b5132
RH
4992}
4993
4994/* Given a BFD symbol, return the index in the ELF symbol table, or -1
4995 on error. */
4996
4997int
217aa764 4998_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
4999{
5000 asymbol *asym_ptr = *asym_ptr_ptr;
5001 int idx;
5002 flagword flags = asym_ptr->flags;
5003
5004 /* When gas creates relocations against local labels, it creates its
5005 own symbol for the section, but does put the symbol into the
5006 symbol chain, so udata is 0. When the linker is generating
5007 relocatable output, this section symbol may be for one of the
5008 input sections rather than the output section. */
5009 if (asym_ptr->udata.i == 0
5010 && (flags & BSF_SECTION_SYM)
5011 && asym_ptr->section)
5012 {
5013 int indx;
5014
5015 if (asym_ptr->section->output_section != NULL)
5016 indx = asym_ptr->section->output_section->index;
5017 else
5018 indx = asym_ptr->section->index;
4e89ac30
L
5019 if (indx < elf_num_section_syms (abfd)
5020 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5021 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5022 }
5023
5024 idx = asym_ptr->udata.i;
5025
5026 if (idx == 0)
5027 {
5028 /* This case can occur when using --strip-symbol on a symbol
5029 which is used in a relocation entry. */
5030 (*_bfd_error_handler)
d003868e
AM
5031 (_("%B: symbol `%s' required but not present"),
5032 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5033 bfd_set_error (bfd_error_no_symbols);
5034 return -1;
5035 }
5036
5037#if DEBUG & 4
5038 {
5039 fprintf (stderr,
661a3fd4 5040 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5041 (long) asym_ptr, asym_ptr->name, idx, flags,
5042 elf_symbol_flags (flags));
5043 fflush (stderr);
5044 }
5045#endif
5046
5047 return idx;
5048}
5049
5050/* Copy private BFD data. This copies any program header information. */
5051
b34976b6 5052static bfd_boolean
217aa764 5053copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132 5054{
b34976b6
AM
5055 Elf_Internal_Ehdr *iehdr;
5056 struct elf_segment_map *map;
5057 struct elf_segment_map *map_first;
5058 struct elf_segment_map **pointer_to_map;
5059 Elf_Internal_Phdr *segment;
5060 asection *section;
5061 unsigned int i;
5062 unsigned int num_segments;
5063 bfd_boolean phdr_included = FALSE;
5064 bfd_vma maxpagesize;
5065 struct elf_segment_map *phdr_adjust_seg = NULL;
5066 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5067 const struct elf_backend_data *bed;
bc67d8a6 5068
c044fabd 5069 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 5070 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5071 return TRUE;
252b5132
RH
5072
5073 if (elf_tdata (ibfd)->phdr == NULL)
b34976b6 5074 return TRUE;
252b5132 5075
caf47ea6 5076 bed = get_elf_backend_data (ibfd);
252b5132
RH
5077 iehdr = elf_elfheader (ibfd);
5078
bc67d8a6 5079 map_first = NULL;
c044fabd 5080 pointer_to_map = &map_first;
252b5132
RH
5081
5082 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5083 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5084
5085 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5086#define SEGMENT_END(segment, start) \
5087 (start + (segment->p_memsz > segment->p_filesz \
5088 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5089
eecdbe52
JJ
5090#define SECTION_SIZE(section, segment) \
5091 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5092 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5093 ? section->size : 0)
eecdbe52 5094
b34976b6 5095 /* Returns TRUE if the given section is contained within
bc67d8a6 5096 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5097#define IS_CONTAINED_BY_VMA(section, segment) \
5098 (section->vma >= segment->p_vaddr \
eecdbe52 5099 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5100 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5101
b34976b6 5102 /* Returns TRUE if the given section is contained within
bc67d8a6 5103 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5104#define IS_CONTAINED_BY_LMA(section, segment, base) \
5105 (section->lma >= base \
eecdbe52 5106 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5107 <= SEGMENT_END (segment, base)))
252b5132 5108
c044fabd 5109 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5110#define IS_COREFILE_NOTE(p, s) \
5111 (p->p_type == PT_NOTE \
5112 && bfd_get_format (ibfd) == bfd_core \
5113 && s->vma == 0 && s->lma == 0 \
5114 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5115 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5116 <= p->p_offset + p->p_filesz))
252b5132
RH
5117
5118 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5119 linker, which generates a PT_INTERP section with p_vaddr and
5120 p_memsz set to 0. */
aecc8f8a
AM
5121#define IS_SOLARIS_PT_INTERP(p, s) \
5122 (p->p_vaddr == 0 \
5123 && p->p_paddr == 0 \
5124 && p->p_memsz == 0 \
5125 && p->p_filesz > 0 \
5126 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5127 && s->size > 0 \
aecc8f8a 5128 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5129 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5130 <= p->p_offset + p->p_filesz))
5c440b1e 5131
bc67d8a6
NC
5132 /* Decide if the given section should be included in the given segment.
5133 A section will be included if:
f5ffc919
NC
5134 1. It is within the address space of the segment -- we use the LMA
5135 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5136 2. It is an allocated segment,
5137 3. There is an output section associated with it,
eecdbe52 5138 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5139 5. PT_GNU_STACK segments do not include any sections.
5140 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5141 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5142 8. PT_DYNAMIC should not contain empty sections at the beginning
5143 (with the possible exception of .dynamic). */
caf47ea6 5144#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5145 ((((segment->p_paddr \
5146 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5147 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5148 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5149 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5150 && section->output_section != NULL \
03394ac9 5151 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5152 && (segment->p_type != PT_TLS \
5153 || (section->flags & SEC_THREAD_LOCAL)) \
5154 && (segment->p_type == PT_LOAD \
5155 || segment->p_type == PT_TLS \
5156 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5157 && (segment->p_type != PT_DYNAMIC \
5158 || SECTION_SIZE (section, segment) > 0 \
5159 || (segment->p_paddr \
5160 ? segment->p_paddr != section->lma \
5161 : segment->p_vaddr != section->vma) \
5162 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5163 == 0)) \
82e51918 5164 && ! section->segment_mark)
bc67d8a6 5165
b34976b6 5166 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5167#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5168 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5169
5170 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5171 their VMA address ranges and their LMA address ranges overlap.
5172 It is possible to have overlapping VMA ranges without overlapping LMA
5173 ranges. RedBoot images for example can have both .data and .bss mapped
5174 to the same VMA range, but with the .data section mapped to a different
5175 LMA. */
aecc8f8a 5176#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5177 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5178 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5179 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5180 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5181
5182 /* Initialise the segment mark field. */
5183 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5184 section->segment_mark = FALSE;
bc67d8a6 5185
252b5132 5186 /* Scan through the segments specified in the program header
bc67d8a6 5187 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5188 in the loadable segments. These can be created by weird
aecc8f8a 5189 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5190 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5191 i < num_segments;
c044fabd 5192 i++, segment++)
252b5132 5193 {
252b5132 5194 unsigned int j;
c044fabd 5195 Elf_Internal_Phdr *segment2;
252b5132 5196
aecc8f8a
AM
5197 if (segment->p_type == PT_INTERP)
5198 for (section = ibfd->sections; section; section = section->next)
5199 if (IS_SOLARIS_PT_INTERP (segment, section))
5200 {
5201 /* Mininal change so that the normal section to segment
4cc11e76 5202 assignment code will work. */
aecc8f8a
AM
5203 segment->p_vaddr = section->vma;
5204 break;
5205 }
5206
bc67d8a6
NC
5207 if (segment->p_type != PT_LOAD)
5208 continue;
c044fabd 5209
bc67d8a6 5210 /* Determine if this segment overlaps any previous segments. */
c044fabd 5211 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5212 {
5213 bfd_signed_vma extra_length;
c044fabd 5214
bc67d8a6
NC
5215 if (segment2->p_type != PT_LOAD
5216 || ! SEGMENT_OVERLAPS (segment, segment2))
5217 continue;
c044fabd 5218
bc67d8a6
NC
5219 /* Merge the two segments together. */
5220 if (segment2->p_vaddr < segment->p_vaddr)
5221 {
c044fabd
KH
5222 /* Extend SEGMENT2 to include SEGMENT and then delete
5223 SEGMENT. */
bc67d8a6
NC
5224 extra_length =
5225 SEGMENT_END (segment, segment->p_vaddr)
5226 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5227
bc67d8a6
NC
5228 if (extra_length > 0)
5229 {
5230 segment2->p_memsz += extra_length;
5231 segment2->p_filesz += extra_length;
5232 }
c044fabd 5233
bc67d8a6 5234 segment->p_type = PT_NULL;
c044fabd 5235
bc67d8a6
NC
5236 /* Since we have deleted P we must restart the outer loop. */
5237 i = 0;
5238 segment = elf_tdata (ibfd)->phdr;
5239 break;
5240 }
5241 else
5242 {
c044fabd
KH
5243 /* Extend SEGMENT to include SEGMENT2 and then delete
5244 SEGMENT2. */
bc67d8a6
NC
5245 extra_length =
5246 SEGMENT_END (segment2, segment2->p_vaddr)
5247 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5248
bc67d8a6
NC
5249 if (extra_length > 0)
5250 {
5251 segment->p_memsz += extra_length;
5252 segment->p_filesz += extra_length;
5253 }
c044fabd 5254
bc67d8a6
NC
5255 segment2->p_type = PT_NULL;
5256 }
5257 }
5258 }
c044fabd 5259
bc67d8a6
NC
5260 /* The second scan attempts to assign sections to segments. */
5261 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5262 i < num_segments;
5263 i ++, segment ++)
5264 {
5265 unsigned int section_count;
5266 asection ** sections;
5267 asection * output_section;
5268 unsigned int isec;
5269 bfd_vma matching_lma;
5270 bfd_vma suggested_lma;
5271 unsigned int j;
dc810e39 5272 bfd_size_type amt;
bc67d8a6
NC
5273
5274 if (segment->p_type == PT_NULL)
5275 continue;
c044fabd 5276
bc67d8a6 5277 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5278 for (section = ibfd->sections, section_count = 0;
5279 section != NULL;
5280 section = section->next)
caf47ea6 5281 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5282 ++section_count;
811072d8 5283
b5f852ea
NC
5284 /* Allocate a segment map big enough to contain
5285 all of the sections we have selected. */
dc810e39
AM
5286 amt = sizeof (struct elf_segment_map);
5287 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5288 map = bfd_alloc (obfd, amt);
bc67d8a6 5289 if (map == NULL)
b34976b6 5290 return FALSE;
252b5132
RH
5291
5292 /* Initialise the fields of the segment map. Default to
5293 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5294 map->next = NULL;
5295 map->p_type = segment->p_type;
5296 map->p_flags = segment->p_flags;
5297 map->p_flags_valid = 1;
5298 map->p_paddr = segment->p_paddr;
5299 map->p_paddr_valid = 1;
252b5132
RH
5300
5301 /* Determine if this segment contains the ELF file header
5302 and if it contains the program headers themselves. */
bc67d8a6
NC
5303 map->includes_filehdr = (segment->p_offset == 0
5304 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5305
bc67d8a6 5306 map->includes_phdrs = 0;
252b5132 5307
bc67d8a6 5308 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5309 {
bc67d8a6
NC
5310 map->includes_phdrs =
5311 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5312 && (segment->p_offset + segment->p_filesz
252b5132
RH
5313 >= ((bfd_vma) iehdr->e_phoff
5314 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5315
bc67d8a6 5316 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5317 phdr_included = TRUE;
252b5132
RH
5318 }
5319
bc67d8a6 5320 if (section_count == 0)
252b5132
RH
5321 {
5322 /* Special segments, such as the PT_PHDR segment, may contain
5323 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5324 something. They are allowed by the ELF spec however, so only
5325 a warning is produced. */
bc67d8a6 5326 if (segment->p_type == PT_LOAD)
caf47ea6 5327 (*_bfd_error_handler)
d003868e
AM
5328 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5329 ibfd);
252b5132 5330
bc67d8a6 5331 map->count = 0;
c044fabd
KH
5332 *pointer_to_map = map;
5333 pointer_to_map = &map->next;
252b5132
RH
5334
5335 continue;
5336 }
5337
5338 /* Now scan the sections in the input BFD again and attempt
5339 to add their corresponding output sections to the segment map.
5340 The problem here is how to handle an output section which has
5341 been moved (ie had its LMA changed). There are four possibilities:
5342
5343 1. None of the sections have been moved.
5344 In this case we can continue to use the segment LMA from the
5345 input BFD.
5346
5347 2. All of the sections have been moved by the same amount.
5348 In this case we can change the segment's LMA to match the LMA
5349 of the first section.
5350
5351 3. Some of the sections have been moved, others have not.
5352 In this case those sections which have not been moved can be
5353 placed in the current segment which will have to have its size,
5354 and possibly its LMA changed, and a new segment or segments will
5355 have to be created to contain the other sections.
5356
b5f852ea 5357 4. The sections have been moved, but not by the same amount.
252b5132
RH
5358 In this case we can change the segment's LMA to match the LMA
5359 of the first section and we will have to create a new segment
5360 or segments to contain the other sections.
5361
5362 In order to save time, we allocate an array to hold the section
5363 pointers that we are interested in. As these sections get assigned
5364 to a segment, they are removed from this array. */
5365
0b14c2aa
L
5366 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5367 to work around this long long bug. */
5368 amt = section_count * sizeof (asection *);
217aa764 5369 sections = bfd_malloc (amt);
252b5132 5370 if (sections == NULL)
b34976b6 5371 return FALSE;
252b5132
RH
5372
5373 /* Step One: Scan for segment vs section LMA conflicts.
5374 Also add the sections to the section array allocated above.
5375 Also add the sections to the current segment. In the common
5376 case, where the sections have not been moved, this means that
5377 we have completely filled the segment, and there is nothing
5378 more to do. */
252b5132 5379 isec = 0;
72730e0c 5380 matching_lma = 0;
252b5132
RH
5381 suggested_lma = 0;
5382
bc67d8a6
NC
5383 for (j = 0, section = ibfd->sections;
5384 section != NULL;
5385 section = section->next)
252b5132 5386 {
caf47ea6 5387 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5388 {
bc67d8a6
NC
5389 output_section = section->output_section;
5390
5391 sections[j ++] = section;
252b5132
RH
5392
5393 /* The Solaris native linker always sets p_paddr to 0.
5394 We try to catch that case here, and set it to the
5e8d7549
NC
5395 correct value. Note - some backends require that
5396 p_paddr be left as zero. */
bc67d8a6 5397 if (segment->p_paddr == 0
4455705d 5398 && segment->p_vaddr != 0
5e8d7549 5399 && (! bed->want_p_paddr_set_to_zero)
252b5132 5400 && isec == 0
bc67d8a6
NC
5401 && output_section->lma != 0
5402 && (output_section->vma == (segment->p_vaddr
5403 + (map->includes_filehdr
5404 ? iehdr->e_ehsize
5405 : 0)
5406 + (map->includes_phdrs
079e9a2f
AM
5407 ? (iehdr->e_phnum
5408 * iehdr->e_phentsize)
bc67d8a6
NC
5409 : 0))))
5410 map->p_paddr = segment->p_vaddr;
252b5132
RH
5411
5412 /* Match up the physical address of the segment with the
5413 LMA address of the output section. */
bc67d8a6 5414 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5415 || IS_COREFILE_NOTE (segment, section)
5416 || (bed->want_p_paddr_set_to_zero &&
5417 IS_CONTAINED_BY_VMA (output_section, segment))
5418 )
252b5132
RH
5419 {
5420 if (matching_lma == 0)
bc67d8a6 5421 matching_lma = output_section->lma;
252b5132
RH
5422
5423 /* We assume that if the section fits within the segment
bc67d8a6 5424 then it does not overlap any other section within that
252b5132 5425 segment. */
bc67d8a6 5426 map->sections[isec ++] = output_section;
252b5132
RH
5427 }
5428 else if (suggested_lma == 0)
bc67d8a6 5429 suggested_lma = output_section->lma;
252b5132
RH
5430 }
5431 }
5432
bc67d8a6 5433 BFD_ASSERT (j == section_count);
252b5132
RH
5434
5435 /* Step Two: Adjust the physical address of the current segment,
5436 if necessary. */
bc67d8a6 5437 if (isec == section_count)
252b5132
RH
5438 {
5439 /* All of the sections fitted within the segment as currently
5440 specified. This is the default case. Add the segment to
5441 the list of built segments and carry on to process the next
5442 program header in the input BFD. */
bc67d8a6 5443 map->count = section_count;
c044fabd
KH
5444 *pointer_to_map = map;
5445 pointer_to_map = &map->next;
252b5132
RH
5446
5447 free (sections);
5448 continue;
5449 }
252b5132
RH
5450 else
5451 {
72730e0c
AM
5452 if (matching_lma != 0)
5453 {
5454 /* At least one section fits inside the current segment.
5455 Keep it, but modify its physical address to match the
5456 LMA of the first section that fitted. */
bc67d8a6 5457 map->p_paddr = matching_lma;
72730e0c
AM
5458 }
5459 else
5460 {
5461 /* None of the sections fitted inside the current segment.
5462 Change the current segment's physical address to match
5463 the LMA of the first section. */
bc67d8a6 5464 map->p_paddr = suggested_lma;
72730e0c
AM
5465 }
5466
bc67d8a6
NC
5467 /* Offset the segment physical address from the lma
5468 to allow for space taken up by elf headers. */
5469 if (map->includes_filehdr)
5470 map->p_paddr -= iehdr->e_ehsize;
252b5132 5471
bc67d8a6
NC
5472 if (map->includes_phdrs)
5473 {
5474 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5475
5476 /* iehdr->e_phnum is just an estimate of the number
5477 of program headers that we will need. Make a note
5478 here of the number we used and the segment we chose
5479 to hold these headers, so that we can adjust the
5480 offset when we know the correct value. */
5481 phdr_adjust_num = iehdr->e_phnum;
5482 phdr_adjust_seg = map;
5483 }
252b5132
RH
5484 }
5485
5486 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5487 those that fit to the current segment and removing them from the
252b5132
RH
5488 sections array; but making sure not to leave large gaps. Once all
5489 possible sections have been assigned to the current segment it is
5490 added to the list of built segments and if sections still remain
5491 to be assigned, a new segment is constructed before repeating
5492 the loop. */
5493 isec = 0;
5494 do
5495 {
bc67d8a6 5496 map->count = 0;
252b5132
RH
5497 suggested_lma = 0;
5498
5499 /* Fill the current segment with sections that fit. */
bc67d8a6 5500 for (j = 0; j < section_count; j++)
252b5132 5501 {
bc67d8a6 5502 section = sections[j];
252b5132 5503
bc67d8a6 5504 if (section == NULL)
252b5132
RH
5505 continue;
5506
bc67d8a6 5507 output_section = section->output_section;
252b5132 5508
bc67d8a6 5509 BFD_ASSERT (output_section != NULL);
c044fabd 5510
bc67d8a6
NC
5511 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5512 || IS_COREFILE_NOTE (segment, section))
252b5132 5513 {
bc67d8a6 5514 if (map->count == 0)
252b5132
RH
5515 {
5516 /* If the first section in a segment does not start at
bc67d8a6
NC
5517 the beginning of the segment, then something is
5518 wrong. */
5519 if (output_section->lma !=
5520 (map->p_paddr
5521 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5522 + (map->includes_phdrs
5523 ? iehdr->e_phnum * iehdr->e_phentsize
5524 : 0)))
252b5132
RH
5525 abort ();
5526 }
5527 else
5528 {
5529 asection * prev_sec;
252b5132 5530
bc67d8a6 5531 prev_sec = map->sections[map->count - 1];
252b5132
RH
5532
5533 /* If the gap between the end of the previous section
bc67d8a6
NC
5534 and the start of this section is more than
5535 maxpagesize then we need to start a new segment. */
eea6121a 5536 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5537 maxpagesize)
caf47ea6 5538 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5539 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5540 > output_section->lma))
252b5132
RH
5541 {
5542 if (suggested_lma == 0)
bc67d8a6 5543 suggested_lma = output_section->lma;
252b5132
RH
5544
5545 continue;
5546 }
5547 }
5548
bc67d8a6 5549 map->sections[map->count++] = output_section;
252b5132
RH
5550 ++isec;
5551 sections[j] = NULL;
b34976b6 5552 section->segment_mark = TRUE;
252b5132
RH
5553 }
5554 else if (suggested_lma == 0)
bc67d8a6 5555 suggested_lma = output_section->lma;
252b5132
RH
5556 }
5557
bc67d8a6 5558 BFD_ASSERT (map->count > 0);
252b5132
RH
5559
5560 /* Add the current segment to the list of built segments. */
c044fabd
KH
5561 *pointer_to_map = map;
5562 pointer_to_map = &map->next;
252b5132 5563
bc67d8a6 5564 if (isec < section_count)
252b5132
RH
5565 {
5566 /* We still have not allocated all of the sections to
5567 segments. Create a new segment here, initialise it
5568 and carry on looping. */
dc810e39
AM
5569 amt = sizeof (struct elf_segment_map);
5570 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5571 map = bfd_alloc (obfd, amt);
bc67d8a6 5572 if (map == NULL)
5ed6aba4
NC
5573 {
5574 free (sections);
5575 return FALSE;
5576 }
252b5132
RH
5577
5578 /* Initialise the fields of the segment map. Set the physical
5579 physical address to the LMA of the first section that has
5580 not yet been assigned. */
bc67d8a6
NC
5581 map->next = NULL;
5582 map->p_type = segment->p_type;
5583 map->p_flags = segment->p_flags;
5584 map->p_flags_valid = 1;
5585 map->p_paddr = suggested_lma;
5586 map->p_paddr_valid = 1;
5587 map->includes_filehdr = 0;
5588 map->includes_phdrs = 0;
252b5132
RH
5589 }
5590 }
bc67d8a6 5591 while (isec < section_count);
252b5132
RH
5592
5593 free (sections);
5594 }
5595
5596 /* The Solaris linker creates program headers in which all the
5597 p_paddr fields are zero. When we try to objcopy or strip such a
5598 file, we get confused. Check for this case, and if we find it
5599 reset the p_paddr_valid fields. */
bc67d8a6
NC
5600 for (map = map_first; map != NULL; map = map->next)
5601 if (map->p_paddr != 0)
252b5132 5602 break;
bc67d8a6 5603 if (map == NULL)
b5f852ea
NC
5604 for (map = map_first; map != NULL; map = map->next)
5605 map->p_paddr_valid = 0;
252b5132 5606
bc67d8a6
NC
5607 elf_tdata (obfd)->segment_map = map_first;
5608
5609 /* If we had to estimate the number of program headers that were
9ad5cbcf 5610 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5611 the offset if necessary. */
5612 if (phdr_adjust_seg != NULL)
5613 {
5614 unsigned int count;
c044fabd 5615
bc67d8a6 5616 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5617 count++;
252b5132 5618
bc67d8a6
NC
5619 if (count > phdr_adjust_num)
5620 phdr_adjust_seg->p_paddr
5621 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5622 }
c044fabd 5623
bc67d8a6 5624#undef SEGMENT_END
eecdbe52 5625#undef SECTION_SIZE
bc67d8a6
NC
5626#undef IS_CONTAINED_BY_VMA
5627#undef IS_CONTAINED_BY_LMA
252b5132 5628#undef IS_COREFILE_NOTE
bc67d8a6
NC
5629#undef IS_SOLARIS_PT_INTERP
5630#undef INCLUDE_SECTION_IN_SEGMENT
5631#undef SEGMENT_AFTER_SEGMENT
5632#undef SEGMENT_OVERLAPS
b34976b6 5633 return TRUE;
252b5132
RH
5634}
5635
5636/* Copy private section information. This copies over the entsize
5637 field, and sometimes the info field. */
5638
b34976b6 5639bfd_boolean
217aa764
AM
5640_bfd_elf_copy_private_section_data (bfd *ibfd,
5641 asection *isec,
5642 bfd *obfd,
5643 asection *osec)
252b5132
RH
5644{
5645 Elf_Internal_Shdr *ihdr, *ohdr;
5646
5647 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5648 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5649 return TRUE;
252b5132 5650
252b5132
RH
5651 ihdr = &elf_section_data (isec)->this_hdr;
5652 ohdr = &elf_section_data (osec)->this_hdr;
5653
5654 ohdr->sh_entsize = ihdr->sh_entsize;
5655
5656 if (ihdr->sh_type == SHT_SYMTAB
5657 || ihdr->sh_type == SHT_DYNSYM
5658 || ihdr->sh_type == SHT_GNU_verneed
5659 || ihdr->sh_type == SHT_GNU_verdef)
5660 ohdr->sh_info = ihdr->sh_info;
5661
9dce4196
AM
5662 /* Set things up for objcopy. The output SHT_GROUP section will
5663 have its elf_next_in_group pointing back to the input group
278d8f37
L
5664 members. Ignore linker created group section. See
5665 elfNN_ia64_object_p in elfxx-ia64.c. */
5666 if (elf_sec_group (isec) == NULL
5667 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5668 {
5669 elf_next_in_group (osec) = elf_next_in_group (isec);
5670 elf_group_name (osec) = elf_group_name (isec);
5671 }
9dce4196 5672
68bfbfcc 5673 osec->use_rela_p = isec->use_rela_p;
bf572ba0 5674
b34976b6 5675 return TRUE;
252b5132
RH
5676}
5677
80fccad2
BW
5678/* Copy private header information. */
5679
5680bfd_boolean
5681_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
5682{
5683 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5684 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5685 return TRUE;
5686
5687 /* Copy over private BFD data if it has not already been copied.
5688 This must be done here, rather than in the copy_private_bfd_data
5689 entry point, because the latter is called after the section
5690 contents have been set, which means that the program headers have
5691 already been worked out. */
5692 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
5693 {
5694 if (! copy_private_bfd_data (ibfd, obfd))
5695 return FALSE;
5696 }
5697
5698 return TRUE;
5699}
5700
252b5132
RH
5701/* Copy private symbol information. If this symbol is in a section
5702 which we did not map into a BFD section, try to map the section
5703 index correctly. We use special macro definitions for the mapped
5704 section indices; these definitions are interpreted by the
5705 swap_out_syms function. */
5706
9ad5cbcf
AM
5707#define MAP_ONESYMTAB (SHN_HIOS + 1)
5708#define MAP_DYNSYMTAB (SHN_HIOS + 2)
5709#define MAP_STRTAB (SHN_HIOS + 3)
5710#define MAP_SHSTRTAB (SHN_HIOS + 4)
5711#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 5712
b34976b6 5713bfd_boolean
217aa764
AM
5714_bfd_elf_copy_private_symbol_data (bfd *ibfd,
5715 asymbol *isymarg,
5716 bfd *obfd,
5717 asymbol *osymarg)
252b5132
RH
5718{
5719 elf_symbol_type *isym, *osym;
5720
5721 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5722 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5723 return TRUE;
252b5132
RH
5724
5725 isym = elf_symbol_from (ibfd, isymarg);
5726 osym = elf_symbol_from (obfd, osymarg);
5727
5728 if (isym != NULL
5729 && osym != NULL
5730 && bfd_is_abs_section (isym->symbol.section))
5731 {
5732 unsigned int shndx;
5733
5734 shndx = isym->internal_elf_sym.st_shndx;
5735 if (shndx == elf_onesymtab (ibfd))
5736 shndx = MAP_ONESYMTAB;
5737 else if (shndx == elf_dynsymtab (ibfd))
5738 shndx = MAP_DYNSYMTAB;
5739 else if (shndx == elf_tdata (ibfd)->strtab_section)
5740 shndx = MAP_STRTAB;
5741 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
5742 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
5743 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
5744 shndx = MAP_SYM_SHNDX;
252b5132
RH
5745 osym->internal_elf_sym.st_shndx = shndx;
5746 }
5747
b34976b6 5748 return TRUE;
252b5132
RH
5749}
5750
5751/* Swap out the symbols. */
5752
b34976b6 5753static bfd_boolean
217aa764
AM
5754swap_out_syms (bfd *abfd,
5755 struct bfd_strtab_hash **sttp,
5756 int relocatable_p)
252b5132 5757{
9c5bfbb7 5758 const struct elf_backend_data *bed;
079e9a2f
AM
5759 int symcount;
5760 asymbol **syms;
5761 struct bfd_strtab_hash *stt;
5762 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 5763 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 5764 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
5765 bfd_byte *outbound_syms;
5766 bfd_byte *outbound_shndx;
079e9a2f
AM
5767 int idx;
5768 bfd_size_type amt;
174fd7f9 5769 bfd_boolean name_local_sections;
252b5132
RH
5770
5771 if (!elf_map_symbols (abfd))
b34976b6 5772 return FALSE;
252b5132 5773
c044fabd 5774 /* Dump out the symtabs. */
079e9a2f
AM
5775 stt = _bfd_elf_stringtab_init ();
5776 if (stt == NULL)
b34976b6 5777 return FALSE;
252b5132 5778
079e9a2f
AM
5779 bed = get_elf_backend_data (abfd);
5780 symcount = bfd_get_symcount (abfd);
5781 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5782 symtab_hdr->sh_type = SHT_SYMTAB;
5783 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
5784 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
5785 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 5786 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
5787
5788 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5789 symstrtab_hdr->sh_type = SHT_STRTAB;
5790
5791 amt = (bfd_size_type) (1 + symcount) * bed->s->sizeof_sym;
5792 outbound_syms = bfd_alloc (abfd, amt);
5793 if (outbound_syms == NULL)
5ed6aba4
NC
5794 {
5795 _bfd_stringtab_free (stt);
5796 return FALSE;
5797 }
217aa764 5798 symtab_hdr->contents = outbound_syms;
252b5132 5799
9ad5cbcf
AM
5800 outbound_shndx = NULL;
5801 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5802 if (symtab_shndx_hdr->sh_name != 0)
5803 {
5804 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
1126897b 5805 outbound_shndx = bfd_zalloc (abfd, amt);
9ad5cbcf 5806 if (outbound_shndx == NULL)
5ed6aba4
NC
5807 {
5808 _bfd_stringtab_free (stt);
5809 return FALSE;
5810 }
5811
9ad5cbcf
AM
5812 symtab_shndx_hdr->contents = outbound_shndx;
5813 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5814 symtab_shndx_hdr->sh_size = amt;
5815 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5816 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5817 }
5818
589e6347 5819 /* Now generate the data (for "contents"). */
079e9a2f
AM
5820 {
5821 /* Fill in zeroth symbol and swap it out. */
5822 Elf_Internal_Sym sym;
5823 sym.st_name = 0;
5824 sym.st_value = 0;
5825 sym.st_size = 0;
5826 sym.st_info = 0;
5827 sym.st_other = 0;
5828 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 5829 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5830 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5831 if (outbound_shndx != NULL)
5832 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5833 }
252b5132 5834
174fd7f9
RS
5835 name_local_sections
5836 = (bed->elf_backend_name_local_section_symbols
5837 && bed->elf_backend_name_local_section_symbols (abfd));
5838
079e9a2f
AM
5839 syms = bfd_get_outsymbols (abfd);
5840 for (idx = 0; idx < symcount; idx++)
252b5132 5841 {
252b5132 5842 Elf_Internal_Sym sym;
079e9a2f
AM
5843 bfd_vma value = syms[idx]->value;
5844 elf_symbol_type *type_ptr;
5845 flagword flags = syms[idx]->flags;
5846 int type;
252b5132 5847
174fd7f9
RS
5848 if (!name_local_sections
5849 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
5850 {
5851 /* Local section symbols have no name. */
5852 sym.st_name = 0;
5853 }
5854 else
5855 {
5856 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
5857 syms[idx]->name,
b34976b6 5858 TRUE, FALSE);
079e9a2f 5859 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
5860 {
5861 _bfd_stringtab_free (stt);
5862 return FALSE;
5863 }
079e9a2f 5864 }
252b5132 5865
079e9a2f 5866 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 5867
079e9a2f
AM
5868 if ((flags & BSF_SECTION_SYM) == 0
5869 && bfd_is_com_section (syms[idx]->section))
5870 {
5871 /* ELF common symbols put the alignment into the `value' field,
5872 and the size into the `size' field. This is backwards from
5873 how BFD handles it, so reverse it here. */
5874 sym.st_size = value;
5875 if (type_ptr == NULL
5876 || type_ptr->internal_elf_sym.st_value == 0)
5877 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
5878 else
5879 sym.st_value = type_ptr->internal_elf_sym.st_value;
5880 sym.st_shndx = _bfd_elf_section_from_bfd_section
5881 (abfd, syms[idx]->section);
5882 }
5883 else
5884 {
5885 asection *sec = syms[idx]->section;
5886 int shndx;
252b5132 5887
079e9a2f
AM
5888 if (sec->output_section)
5889 {
5890 value += sec->output_offset;
5891 sec = sec->output_section;
5892 }
589e6347 5893
079e9a2f
AM
5894 /* Don't add in the section vma for relocatable output. */
5895 if (! relocatable_p)
5896 value += sec->vma;
5897 sym.st_value = value;
5898 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
5899
5900 if (bfd_is_abs_section (sec)
5901 && type_ptr != NULL
5902 && type_ptr->internal_elf_sym.st_shndx != 0)
5903 {
5904 /* This symbol is in a real ELF section which we did
5905 not create as a BFD section. Undo the mapping done
5906 by copy_private_symbol_data. */
5907 shndx = type_ptr->internal_elf_sym.st_shndx;
5908 switch (shndx)
5909 {
5910 case MAP_ONESYMTAB:
5911 shndx = elf_onesymtab (abfd);
5912 break;
5913 case MAP_DYNSYMTAB:
5914 shndx = elf_dynsymtab (abfd);
5915 break;
5916 case MAP_STRTAB:
5917 shndx = elf_tdata (abfd)->strtab_section;
5918 break;
5919 case MAP_SHSTRTAB:
5920 shndx = elf_tdata (abfd)->shstrtab_section;
5921 break;
9ad5cbcf
AM
5922 case MAP_SYM_SHNDX:
5923 shndx = elf_tdata (abfd)->symtab_shndx_section;
5924 break;
079e9a2f
AM
5925 default:
5926 break;
5927 }
5928 }
5929 else
5930 {
5931 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 5932
079e9a2f
AM
5933 if (shndx == -1)
5934 {
5935 asection *sec2;
5936
5937 /* Writing this would be a hell of a lot easier if
5938 we had some decent documentation on bfd, and
5939 knew what to expect of the library, and what to
5940 demand of applications. For example, it
5941 appears that `objcopy' might not set the
5942 section of a symbol to be a section that is
5943 actually in the output file. */
5944 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
5945 if (sec2 == NULL)
5946 {
5947 _bfd_error_handler (_("\
5948Unable to find equivalent output section for symbol '%s' from section '%s'"),
5949 syms[idx]->name ? syms[idx]->name : "<Local sym>",
5950 sec->name);
811072d8 5951 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 5952 _bfd_stringtab_free (stt);
589e6347
NC
5953 return FALSE;
5954 }
811072d8 5955
079e9a2f
AM
5956 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
5957 BFD_ASSERT (shndx != -1);
5958 }
5959 }
252b5132 5960
079e9a2f
AM
5961 sym.st_shndx = shndx;
5962 }
252b5132 5963
13ae64f3
JJ
5964 if ((flags & BSF_THREAD_LOCAL) != 0)
5965 type = STT_TLS;
5966 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
5967 type = STT_FUNC;
5968 else if ((flags & BSF_OBJECT) != 0)
5969 type = STT_OBJECT;
5970 else
5971 type = STT_NOTYPE;
252b5132 5972
13ae64f3
JJ
5973 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
5974 type = STT_TLS;
5975
589e6347 5976 /* Processor-specific types. */
079e9a2f
AM
5977 if (type_ptr != NULL
5978 && bed->elf_backend_get_symbol_type)
5979 type = ((*bed->elf_backend_get_symbol_type)
5980 (&type_ptr->internal_elf_sym, type));
252b5132 5981
079e9a2f
AM
5982 if (flags & BSF_SECTION_SYM)
5983 {
5984 if (flags & BSF_GLOBAL)
5985 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
5986 else
5987 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5988 }
5989 else if (bfd_is_com_section (syms[idx]->section))
5990 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
5991 else if (bfd_is_und_section (syms[idx]->section))
5992 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
5993 ? STB_WEAK
5994 : STB_GLOBAL),
5995 type);
5996 else if (flags & BSF_FILE)
5997 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
5998 else
5999 {
6000 int bind = STB_LOCAL;
252b5132 6001
079e9a2f
AM
6002 if (flags & BSF_LOCAL)
6003 bind = STB_LOCAL;
6004 else if (flags & BSF_WEAK)
6005 bind = STB_WEAK;
6006 else if (flags & BSF_GLOBAL)
6007 bind = STB_GLOBAL;
252b5132 6008
079e9a2f
AM
6009 sym.st_info = ELF_ST_INFO (bind, type);
6010 }
252b5132 6011
079e9a2f
AM
6012 if (type_ptr != NULL)
6013 sym.st_other = type_ptr->internal_elf_sym.st_other;
6014 else
6015 sym.st_other = 0;
252b5132 6016
9ad5cbcf 6017 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6018 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6019 if (outbound_shndx != NULL)
6020 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6021 }
252b5132 6022
079e9a2f
AM
6023 *sttp = stt;
6024 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6025 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6026
079e9a2f
AM
6027 symstrtab_hdr->sh_flags = 0;
6028 symstrtab_hdr->sh_addr = 0;
6029 symstrtab_hdr->sh_entsize = 0;
6030 symstrtab_hdr->sh_link = 0;
6031 symstrtab_hdr->sh_info = 0;
6032 symstrtab_hdr->sh_addralign = 1;
252b5132 6033
b34976b6 6034 return TRUE;
252b5132
RH
6035}
6036
6037/* Return the number of bytes required to hold the symtab vector.
6038
6039 Note that we base it on the count plus 1, since we will null terminate
6040 the vector allocated based on this size. However, the ELF symbol table
6041 always has a dummy entry as symbol #0, so it ends up even. */
6042
6043long
217aa764 6044_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6045{
6046 long symcount;
6047 long symtab_size;
6048 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6049
6050 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6051 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6052 if (symcount > 0)
6053 symtab_size -= sizeof (asymbol *);
252b5132
RH
6054
6055 return symtab_size;
6056}
6057
6058long
217aa764 6059_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6060{
6061 long symcount;
6062 long symtab_size;
6063 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6064
6065 if (elf_dynsymtab (abfd) == 0)
6066 {
6067 bfd_set_error (bfd_error_invalid_operation);
6068 return -1;
6069 }
6070
6071 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6072 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6073 if (symcount > 0)
6074 symtab_size -= sizeof (asymbol *);
252b5132
RH
6075
6076 return symtab_size;
6077}
6078
6079long
217aa764
AM
6080_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6081 sec_ptr asect)
252b5132
RH
6082{
6083 return (asect->reloc_count + 1) * sizeof (arelent *);
6084}
6085
6086/* Canonicalize the relocs. */
6087
6088long
217aa764
AM
6089_bfd_elf_canonicalize_reloc (bfd *abfd,
6090 sec_ptr section,
6091 arelent **relptr,
6092 asymbol **symbols)
252b5132
RH
6093{
6094 arelent *tblptr;
6095 unsigned int i;
9c5bfbb7 6096 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6097
b34976b6 6098 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6099 return -1;
6100
6101 tblptr = section->relocation;
6102 for (i = 0; i < section->reloc_count; i++)
6103 *relptr++ = tblptr++;
6104
6105 *relptr = NULL;
6106
6107 return section->reloc_count;
6108}
6109
6110long
6cee3f79 6111_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6112{
9c5bfbb7 6113 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6114 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6115
6116 if (symcount >= 0)
6117 bfd_get_symcount (abfd) = symcount;
6118 return symcount;
6119}
6120
6121long
217aa764
AM
6122_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6123 asymbol **allocation)
252b5132 6124{
9c5bfbb7 6125 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6126 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6127
6128 if (symcount >= 0)
6129 bfd_get_dynamic_symcount (abfd) = symcount;
6130 return symcount;
252b5132
RH
6131}
6132
8615f3f2
AM
6133/* Return the size required for the dynamic reloc entries. Any loadable
6134 section that was actually installed in the BFD, and has type SHT_REL
6135 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6136 dynamic reloc section. */
252b5132
RH
6137
6138long
217aa764 6139_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6140{
6141 long ret;
6142 asection *s;
6143
6144 if (elf_dynsymtab (abfd) == 0)
6145 {
6146 bfd_set_error (bfd_error_invalid_operation);
6147 return -1;
6148 }
6149
6150 ret = sizeof (arelent *);
6151 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6152 if ((s->flags & SEC_LOAD) != 0
6153 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6154 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6155 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6156 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6157 * sizeof (arelent *));
6158
6159 return ret;
6160}
6161
8615f3f2
AM
6162/* Canonicalize the dynamic relocation entries. Note that we return the
6163 dynamic relocations as a single block, although they are actually
6164 associated with particular sections; the interface, which was
6165 designed for SunOS style shared libraries, expects that there is only
6166 one set of dynamic relocs. Any loadable section that was actually
6167 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6168 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6169
6170long
217aa764
AM
6171_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6172 arelent **storage,
6173 asymbol **syms)
252b5132 6174{
217aa764 6175 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6176 asection *s;
6177 long ret;
6178
6179 if (elf_dynsymtab (abfd) == 0)
6180 {
6181 bfd_set_error (bfd_error_invalid_operation);
6182 return -1;
6183 }
6184
6185 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6186 ret = 0;
6187 for (s = abfd->sections; s != NULL; s = s->next)
6188 {
8615f3f2
AM
6189 if ((s->flags & SEC_LOAD) != 0
6190 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6191 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6192 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6193 {
6194 arelent *p;
6195 long count, i;
6196
b34976b6 6197 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6198 return -1;
eea6121a 6199 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6200 p = s->relocation;
6201 for (i = 0; i < count; i++)
6202 *storage++ = p++;
6203 ret += count;
6204 }
6205 }
6206
6207 *storage = NULL;
6208
6209 return ret;
6210}
6211\f
6212/* Read in the version information. */
6213
b34976b6 6214bfd_boolean
fc0e6df6 6215_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6216{
6217 bfd_byte *contents = NULL;
dc810e39 6218 bfd_size_type amt;
fc0e6df6
PB
6219 unsigned int freeidx = 0;
6220
6221 if (elf_dynverref (abfd) != 0)
6222 {
6223 Elf_Internal_Shdr *hdr;
6224 Elf_External_Verneed *everneed;
6225 Elf_Internal_Verneed *iverneed;
6226 unsigned int i;
6227
6228 hdr = &elf_tdata (abfd)->dynverref_hdr;
6229
6230 amt = (bfd_size_type) hdr->sh_info * sizeof (Elf_Internal_Verneed);
6231 elf_tdata (abfd)->verref = bfd_zalloc (abfd, amt);
6232 if (elf_tdata (abfd)->verref == NULL)
6233 goto error_return;
6234
6235 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6236
6237 contents = bfd_malloc (hdr->sh_size);
6238 if (contents == NULL)
6239 goto error_return;
6240 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6241 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
6242 goto error_return;
6243
6244 everneed = (Elf_External_Verneed *) contents;
6245 iverneed = elf_tdata (abfd)->verref;
6246 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6247 {
6248 Elf_External_Vernaux *evernaux;
6249 Elf_Internal_Vernaux *ivernaux;
6250 unsigned int j;
6251
6252 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6253
6254 iverneed->vn_bfd = abfd;
6255
6256 iverneed->vn_filename =
6257 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6258 iverneed->vn_file);
6259 if (iverneed->vn_filename == NULL)
6260 goto error_return;
6261
6262 amt = iverneed->vn_cnt;
6263 amt *= sizeof (Elf_Internal_Vernaux);
6264 iverneed->vn_auxptr = bfd_alloc (abfd, amt);
6265
6266 evernaux = ((Elf_External_Vernaux *)
6267 ((bfd_byte *) everneed + iverneed->vn_aux));
6268 ivernaux = iverneed->vn_auxptr;
6269 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6270 {
6271 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6272
6273 ivernaux->vna_nodename =
6274 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6275 ivernaux->vna_name);
6276 if (ivernaux->vna_nodename == NULL)
6277 goto error_return;
6278
6279 if (j + 1 < iverneed->vn_cnt)
6280 ivernaux->vna_nextptr = ivernaux + 1;
6281 else
6282 ivernaux->vna_nextptr = NULL;
6283
6284 evernaux = ((Elf_External_Vernaux *)
6285 ((bfd_byte *) evernaux + ivernaux->vna_next));
6286
6287 if (ivernaux->vna_other > freeidx)
6288 freeidx = ivernaux->vna_other;
6289 }
6290
6291 if (i + 1 < hdr->sh_info)
6292 iverneed->vn_nextref = iverneed + 1;
6293 else
6294 iverneed->vn_nextref = NULL;
6295
6296 everneed = ((Elf_External_Verneed *)
6297 ((bfd_byte *) everneed + iverneed->vn_next));
6298 }
6299
6300 free (contents);
6301 contents = NULL;
6302 }
252b5132
RH
6303
6304 if (elf_dynverdef (abfd) != 0)
6305 {
6306 Elf_Internal_Shdr *hdr;
6307 Elf_External_Verdef *everdef;
6308 Elf_Internal_Verdef *iverdef;
f631889e
UD
6309 Elf_Internal_Verdef *iverdefarr;
6310 Elf_Internal_Verdef iverdefmem;
252b5132 6311 unsigned int i;
062e2358 6312 unsigned int maxidx;
252b5132
RH
6313
6314 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6315
217aa764 6316 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6317 if (contents == NULL)
6318 goto error_return;
6319 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6320 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6321 goto error_return;
6322
f631889e
UD
6323 /* We know the number of entries in the section but not the maximum
6324 index. Therefore we have to run through all entries and find
6325 the maximum. */
252b5132 6326 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6327 maxidx = 0;
6328 for (i = 0; i < hdr->sh_info; ++i)
6329 {
6330 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6331
062e2358
AM
6332 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6333 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e
UD
6334
6335 everdef = ((Elf_External_Verdef *)
6336 ((bfd_byte *) everdef + iverdefmem.vd_next));
6337 }
6338
fc0e6df6
PB
6339 if (default_imported_symver)
6340 {
6341 if (freeidx > maxidx)
6342 maxidx = ++freeidx;
6343 else
6344 freeidx = ++maxidx;
6345 }
dc810e39 6346 amt = (bfd_size_type) maxidx * sizeof (Elf_Internal_Verdef);
217aa764 6347 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
f631889e
UD
6348 if (elf_tdata (abfd)->verdef == NULL)
6349 goto error_return;
6350
6351 elf_tdata (abfd)->cverdefs = maxidx;
6352
6353 everdef = (Elf_External_Verdef *) contents;
6354 iverdefarr = elf_tdata (abfd)->verdef;
6355 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6356 {
6357 Elf_External_Verdaux *everdaux;
6358 Elf_Internal_Verdaux *iverdaux;
6359 unsigned int j;
6360
f631889e
UD
6361 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6362
6363 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6364 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6365
6366 iverdef->vd_bfd = abfd;
6367
dc810e39 6368 amt = (bfd_size_type) iverdef->vd_cnt * sizeof (Elf_Internal_Verdaux);
217aa764 6369 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132
RH
6370 if (iverdef->vd_auxptr == NULL)
6371 goto error_return;
6372
6373 everdaux = ((Elf_External_Verdaux *)
6374 ((bfd_byte *) everdef + iverdef->vd_aux));
6375 iverdaux = iverdef->vd_auxptr;
6376 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6377 {
6378 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6379
6380 iverdaux->vda_nodename =
6381 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6382 iverdaux->vda_name);
6383 if (iverdaux->vda_nodename == NULL)
6384 goto error_return;
6385
6386 if (j + 1 < iverdef->vd_cnt)
6387 iverdaux->vda_nextptr = iverdaux + 1;
6388 else
6389 iverdaux->vda_nextptr = NULL;
6390
6391 everdaux = ((Elf_External_Verdaux *)
6392 ((bfd_byte *) everdaux + iverdaux->vda_next));
6393 }
6394
6395 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
6396
6397 if (i + 1 < hdr->sh_info)
6398 iverdef->vd_nextdef = iverdef + 1;
6399 else
6400 iverdef->vd_nextdef = NULL;
6401
6402 everdef = ((Elf_External_Verdef *)
6403 ((bfd_byte *) everdef + iverdef->vd_next));
6404 }
6405
6406 free (contents);
6407 contents = NULL;
6408 }
fc0e6df6 6409 else if (default_imported_symver)
252b5132 6410 {
fc0e6df6
PB
6411 if (freeidx < 3)
6412 freeidx = 3;
6413 else
6414 freeidx++;
252b5132 6415
fc0e6df6
PB
6416 amt = (bfd_size_type) freeidx * sizeof (Elf_Internal_Verdef);
6417 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
6418 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6419 goto error_return;
6420
fc0e6df6
PB
6421 elf_tdata (abfd)->cverdefs = freeidx;
6422 }
252b5132 6423
fc0e6df6
PB
6424 /* Create a default version based on the soname. */
6425 if (default_imported_symver)
6426 {
6427 Elf_Internal_Verdef *iverdef;
6428 Elf_Internal_Verdaux *iverdaux;
252b5132 6429
fc0e6df6 6430 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6431
fc0e6df6
PB
6432 iverdef->vd_version = VER_DEF_CURRENT;
6433 iverdef->vd_flags = 0;
6434 iverdef->vd_ndx = freeidx;
6435 iverdef->vd_cnt = 1;
252b5132 6436
fc0e6df6 6437 iverdef->vd_bfd = abfd;
252b5132 6438
fc0e6df6
PB
6439 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6440 if (iverdef->vd_nodename == NULL)
6441 goto error_return;
6442 iverdef->vd_nextdef = NULL;
6443 amt = (bfd_size_type) sizeof (Elf_Internal_Verdaux);
6444 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132 6445
fc0e6df6
PB
6446 iverdaux = iverdef->vd_auxptr;
6447 iverdaux->vda_nodename = iverdef->vd_nodename;
6448 iverdaux->vda_nextptr = NULL;
252b5132
RH
6449 }
6450
b34976b6 6451 return TRUE;
252b5132
RH
6452
6453 error_return:
5ed6aba4 6454 if (contents != NULL)
252b5132 6455 free (contents);
b34976b6 6456 return FALSE;
252b5132
RH
6457}
6458\f
6459asymbol *
217aa764 6460_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6461{
6462 elf_symbol_type *newsym;
dc810e39 6463 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6464
217aa764 6465 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6466 if (!newsym)
6467 return NULL;
6468 else
6469 {
6470 newsym->symbol.the_bfd = abfd;
6471 return &newsym->symbol;
6472 }
6473}
6474
6475void
217aa764
AM
6476_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6477 asymbol *symbol,
6478 symbol_info *ret)
252b5132
RH
6479{
6480 bfd_symbol_info (symbol, ret);
6481}
6482
6483/* Return whether a symbol name implies a local symbol. Most targets
6484 use this function for the is_local_label_name entry point, but some
6485 override it. */
6486
b34976b6 6487bfd_boolean
217aa764
AM
6488_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6489 const char *name)
252b5132
RH
6490{
6491 /* Normal local symbols start with ``.L''. */
6492 if (name[0] == '.' && name[1] == 'L')
b34976b6 6493 return TRUE;
252b5132
RH
6494
6495 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6496 DWARF debugging symbols starting with ``..''. */
6497 if (name[0] == '.' && name[1] == '.')
b34976b6 6498 return TRUE;
252b5132
RH
6499
6500 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6501 emitting DWARF debugging output. I suspect this is actually a
6502 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6503 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6504 underscore to be emitted on some ELF targets). For ease of use,
6505 we treat such symbols as local. */
6506 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6507 return TRUE;
252b5132 6508
b34976b6 6509 return FALSE;
252b5132
RH
6510}
6511
6512alent *
217aa764
AM
6513_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6514 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6515{
6516 abort ();
6517 return NULL;
6518}
6519
b34976b6 6520bfd_boolean
217aa764
AM
6521_bfd_elf_set_arch_mach (bfd *abfd,
6522 enum bfd_architecture arch,
6523 unsigned long machine)
252b5132
RH
6524{
6525 /* If this isn't the right architecture for this backend, and this
6526 isn't the generic backend, fail. */
6527 if (arch != get_elf_backend_data (abfd)->arch
6528 && arch != bfd_arch_unknown
6529 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6530 return FALSE;
252b5132
RH
6531
6532 return bfd_default_set_arch_mach (abfd, arch, machine);
6533}
6534
d1fad7c6
NC
6535/* Find the function to a particular section and offset,
6536 for error reporting. */
252b5132 6537
b34976b6 6538static bfd_boolean
217aa764
AM
6539elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6540 asection *section,
6541 asymbol **symbols,
6542 bfd_vma offset,
6543 const char **filename_ptr,
6544 const char **functionname_ptr)
252b5132 6545{
252b5132 6546 const char *filename;
57426232 6547 asymbol *func, *file;
252b5132
RH
6548 bfd_vma low_func;
6549 asymbol **p;
57426232
JB
6550 /* ??? Given multiple file symbols, it is impossible to reliably
6551 choose the right file name for global symbols. File symbols are
6552 local symbols, and thus all file symbols must sort before any
6553 global symbols. The ELF spec may be interpreted to say that a
6554 file symbol must sort before other local symbols, but currently
6555 ld -r doesn't do this. So, for ld -r output, it is possible to
6556 make a better choice of file name for local symbols by ignoring
6557 file symbols appearing after a given local symbol. */
6558 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6559
252b5132
RH
6560 filename = NULL;
6561 func = NULL;
57426232 6562 file = NULL;
252b5132 6563 low_func = 0;
57426232 6564 state = nothing_seen;
252b5132
RH
6565
6566 for (p = symbols; *p != NULL; p++)
6567 {
6568 elf_symbol_type *q;
6569
6570 q = (elf_symbol_type *) *p;
6571
252b5132
RH
6572 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6573 {
6574 default:
6575 break;
6576 case STT_FILE:
57426232
JB
6577 file = &q->symbol;
6578 if (state == symbol_seen)
6579 state = file_after_symbol_seen;
6580 continue;
6581 case STT_SECTION:
6582 continue;
252b5132
RH
6583 case STT_NOTYPE:
6584 case STT_FUNC:
6b40fcba 6585 if (bfd_get_section (&q->symbol) == section
252b5132
RH
6586 && q->symbol.value >= low_func
6587 && q->symbol.value <= offset)
6588 {
6589 func = (asymbol *) q;
6590 low_func = q->symbol.value;
57426232
JB
6591 if (file == NULL)
6592 filename = NULL;
6593 else if (ELF_ST_BIND (q->internal_elf_sym.st_info) != STB_LOCAL
6594 && state == file_after_symbol_seen)
6595 filename = NULL;
6596 else
6597 filename = bfd_asymbol_name (file);
252b5132
RH
6598 }
6599 break;
6600 }
57426232
JB
6601 if (state == nothing_seen)
6602 state = symbol_seen;
252b5132
RH
6603 }
6604
6605 if (func == NULL)
b34976b6 6606 return FALSE;
252b5132 6607
d1fad7c6
NC
6608 if (filename_ptr)
6609 *filename_ptr = filename;
6610 if (functionname_ptr)
6611 *functionname_ptr = bfd_asymbol_name (func);
6612
b34976b6 6613 return TRUE;
d1fad7c6
NC
6614}
6615
6616/* Find the nearest line to a particular section and offset,
6617 for error reporting. */
6618
b34976b6 6619bfd_boolean
217aa764
AM
6620_bfd_elf_find_nearest_line (bfd *abfd,
6621 asection *section,
6622 asymbol **symbols,
6623 bfd_vma offset,
6624 const char **filename_ptr,
6625 const char **functionname_ptr,
6626 unsigned int *line_ptr)
d1fad7c6 6627{
b34976b6 6628 bfd_boolean found;
d1fad7c6
NC
6629
6630 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6631 filename_ptr, functionname_ptr,
6632 line_ptr))
d1fad7c6
NC
6633 {
6634 if (!*functionname_ptr)
4e8a9624
AM
6635 elf_find_function (abfd, section, symbols, offset,
6636 *filename_ptr ? NULL : filename_ptr,
6637 functionname_ptr);
6638
b34976b6 6639 return TRUE;
d1fad7c6
NC
6640 }
6641
6642 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6643 filename_ptr, functionname_ptr,
6644 line_ptr, 0,
6645 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
6646 {
6647 if (!*functionname_ptr)
4e8a9624
AM
6648 elf_find_function (abfd, section, symbols, offset,
6649 *filename_ptr ? NULL : filename_ptr,
6650 functionname_ptr);
6651
b34976b6 6652 return TRUE;
d1fad7c6
NC
6653 }
6654
6655 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
6656 &found, filename_ptr,
6657 functionname_ptr, line_ptr,
6658 &elf_tdata (abfd)->line_info))
b34976b6 6659 return FALSE;
dc43ada5 6660 if (found && (*functionname_ptr || *line_ptr))
b34976b6 6661 return TRUE;
d1fad7c6
NC
6662
6663 if (symbols == NULL)
b34976b6 6664 return FALSE;
d1fad7c6
NC
6665
6666 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 6667 filename_ptr, functionname_ptr))
b34976b6 6668 return FALSE;
d1fad7c6 6669
252b5132 6670 *line_ptr = 0;
b34976b6 6671 return TRUE;
252b5132
RH
6672}
6673
6674int
217aa764 6675_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
6676{
6677 int ret;
6678
6679 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
6680 if (! reloc)
6681 ret += get_program_header_size (abfd);
6682 return ret;
6683}
6684
b34976b6 6685bfd_boolean
217aa764
AM
6686_bfd_elf_set_section_contents (bfd *abfd,
6687 sec_ptr section,
0f867abe 6688 const void *location,
217aa764
AM
6689 file_ptr offset,
6690 bfd_size_type count)
252b5132
RH
6691{
6692 Elf_Internal_Shdr *hdr;
dc810e39 6693 bfd_signed_vma pos;
252b5132
RH
6694
6695 if (! abfd->output_has_begun
217aa764 6696 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6697 return FALSE;
252b5132
RH
6698
6699 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
6700 pos = hdr->sh_offset + offset;
6701 if (bfd_seek (abfd, pos, SEEK_SET) != 0
6702 || bfd_bwrite (location, count, abfd) != count)
b34976b6 6703 return FALSE;
252b5132 6704
b34976b6 6705 return TRUE;
252b5132
RH
6706}
6707
6708void
217aa764
AM
6709_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
6710 arelent *cache_ptr ATTRIBUTE_UNUSED,
6711 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
6712{
6713 abort ();
6714}
6715
252b5132
RH
6716/* Try to convert a non-ELF reloc into an ELF one. */
6717
b34976b6 6718bfd_boolean
217aa764 6719_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 6720{
c044fabd 6721 /* Check whether we really have an ELF howto. */
252b5132
RH
6722
6723 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
6724 {
6725 bfd_reloc_code_real_type code;
6726 reloc_howto_type *howto;
6727
6728 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 6729 equivalent ELF reloc. */
252b5132
RH
6730
6731 if (areloc->howto->pc_relative)
6732 {
6733 switch (areloc->howto->bitsize)
6734 {
6735 case 8:
6736 code = BFD_RELOC_8_PCREL;
6737 break;
6738 case 12:
6739 code = BFD_RELOC_12_PCREL;
6740 break;
6741 case 16:
6742 code = BFD_RELOC_16_PCREL;
6743 break;
6744 case 24:
6745 code = BFD_RELOC_24_PCREL;
6746 break;
6747 case 32:
6748 code = BFD_RELOC_32_PCREL;
6749 break;
6750 case 64:
6751 code = BFD_RELOC_64_PCREL;
6752 break;
6753 default:
6754 goto fail;
6755 }
6756
6757 howto = bfd_reloc_type_lookup (abfd, code);
6758
6759 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
6760 {
6761 if (howto->pcrel_offset)
6762 areloc->addend += areloc->address;
6763 else
6764 areloc->addend -= areloc->address; /* addend is unsigned!! */
6765 }
6766 }
6767 else
6768 {
6769 switch (areloc->howto->bitsize)
6770 {
6771 case 8:
6772 code = BFD_RELOC_8;
6773 break;
6774 case 14:
6775 code = BFD_RELOC_14;
6776 break;
6777 case 16:
6778 code = BFD_RELOC_16;
6779 break;
6780 case 26:
6781 code = BFD_RELOC_26;
6782 break;
6783 case 32:
6784 code = BFD_RELOC_32;
6785 break;
6786 case 64:
6787 code = BFD_RELOC_64;
6788 break;
6789 default:
6790 goto fail;
6791 }
6792
6793 howto = bfd_reloc_type_lookup (abfd, code);
6794 }
6795
6796 if (howto)
6797 areloc->howto = howto;
6798 else
6799 goto fail;
6800 }
6801
b34976b6 6802 return TRUE;
252b5132
RH
6803
6804 fail:
6805 (*_bfd_error_handler)
d003868e
AM
6806 (_("%B: unsupported relocation type %s"),
6807 abfd, areloc->howto->name);
252b5132 6808 bfd_set_error (bfd_error_bad_value);
b34976b6 6809 return FALSE;
252b5132
RH
6810}
6811
b34976b6 6812bfd_boolean
217aa764 6813_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
6814{
6815 if (bfd_get_format (abfd) == bfd_object)
6816 {
6817 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 6818 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 6819 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
6820 }
6821
6822 return _bfd_generic_close_and_cleanup (abfd);
6823}
6824
6825/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
6826 in the relocation's offset. Thus we cannot allow any sort of sanity
6827 range-checking to interfere. There is nothing else to do in processing
6828 this reloc. */
6829
6830bfd_reloc_status_type
217aa764
AM
6831_bfd_elf_rel_vtable_reloc_fn
6832 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 6833 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
6834 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
6835 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
6836{
6837 return bfd_reloc_ok;
6838}
252b5132
RH
6839\f
6840/* Elf core file support. Much of this only works on native
6841 toolchains, since we rely on knowing the
6842 machine-dependent procfs structure in order to pick
c044fabd 6843 out details about the corefile. */
252b5132
RH
6844
6845#ifdef HAVE_SYS_PROCFS_H
6846# include <sys/procfs.h>
6847#endif
6848
c044fabd 6849/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
6850
6851static int
217aa764 6852elfcore_make_pid (bfd *abfd)
252b5132
RH
6853{
6854 return ((elf_tdata (abfd)->core_lwpid << 16)
6855 + (elf_tdata (abfd)->core_pid));
6856}
6857
252b5132
RH
6858/* If there isn't a section called NAME, make one, using
6859 data from SECT. Note, this function will generate a
6860 reference to NAME, so you shouldn't deallocate or
c044fabd 6861 overwrite it. */
252b5132 6862
b34976b6 6863static bfd_boolean
217aa764 6864elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 6865{
c044fabd 6866 asection *sect2;
252b5132
RH
6867
6868 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 6869 return TRUE;
252b5132
RH
6870
6871 sect2 = bfd_make_section (abfd, name);
6872 if (sect2 == NULL)
b34976b6 6873 return FALSE;
252b5132 6874
eea6121a 6875 sect2->size = sect->size;
252b5132
RH
6876 sect2->filepos = sect->filepos;
6877 sect2->flags = sect->flags;
6878 sect2->alignment_power = sect->alignment_power;
b34976b6 6879 return TRUE;
252b5132
RH
6880}
6881
bb0082d6
AM
6882/* Create a pseudosection containing SIZE bytes at FILEPOS. This
6883 actually creates up to two pseudosections:
6884 - For the single-threaded case, a section named NAME, unless
6885 such a section already exists.
6886 - For the multi-threaded case, a section named "NAME/PID", where
6887 PID is elfcore_make_pid (abfd).
6888 Both pseudosections have identical contents. */
b34976b6 6889bfd_boolean
217aa764
AM
6890_bfd_elfcore_make_pseudosection (bfd *abfd,
6891 char *name,
6892 size_t size,
6893 ufile_ptr filepos)
bb0082d6
AM
6894{
6895 char buf[100];
6896 char *threaded_name;
d4c88bbb 6897 size_t len;
bb0082d6
AM
6898 asection *sect;
6899
6900 /* Build the section name. */
6901
6902 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 6903 len = strlen (buf) + 1;
217aa764 6904 threaded_name = bfd_alloc (abfd, len);
bb0082d6 6905 if (threaded_name == NULL)
b34976b6 6906 return FALSE;
d4c88bbb 6907 memcpy (threaded_name, buf, len);
bb0082d6 6908
62f3bb11 6909 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 6910 if (sect == NULL)
b34976b6 6911 return FALSE;
eea6121a 6912 sect->size = size;
bb0082d6
AM
6913 sect->filepos = filepos;
6914 sect->flags = SEC_HAS_CONTENTS;
6915 sect->alignment_power = 2;
6916
936e320b 6917 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
6918}
6919
252b5132 6920/* prstatus_t exists on:
4a938328 6921 solaris 2.5+
252b5132
RH
6922 linux 2.[01] + glibc
6923 unixware 4.2
6924*/
6925
6926#if defined (HAVE_PRSTATUS_T)
a7b97311 6927
b34976b6 6928static bfd_boolean
217aa764 6929elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 6930{
eea6121a 6931 size_t size;
7ee38065 6932 int offset;
252b5132 6933
4a938328
MS
6934 if (note->descsz == sizeof (prstatus_t))
6935 {
6936 prstatus_t prstat;
252b5132 6937
eea6121a 6938 size = sizeof (prstat.pr_reg);
7ee38065 6939 offset = offsetof (prstatus_t, pr_reg);
4a938328 6940 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 6941
fa49d224
NC
6942 /* Do not overwrite the core signal if it
6943 has already been set by another thread. */
6944 if (elf_tdata (abfd)->core_signal == 0)
6945 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 6946 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 6947
4a938328
MS
6948 /* pr_who exists on:
6949 solaris 2.5+
6950 unixware 4.2
6951 pr_who doesn't exist on:
6952 linux 2.[01]
6953 */
252b5132 6954#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 6955 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 6956#endif
4a938328 6957 }
7ee38065 6958#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
6959 else if (note->descsz == sizeof (prstatus32_t))
6960 {
6961 /* 64-bit host, 32-bit corefile */
6962 prstatus32_t prstat;
6963
eea6121a 6964 size = sizeof (prstat.pr_reg);
7ee38065 6965 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
6966 memcpy (&prstat, note->descdata, sizeof (prstat));
6967
fa49d224
NC
6968 /* Do not overwrite the core signal if it
6969 has already been set by another thread. */
6970 if (elf_tdata (abfd)->core_signal == 0)
6971 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
6972 elf_tdata (abfd)->core_pid = prstat.pr_pid;
6973
6974 /* pr_who exists on:
6975 solaris 2.5+
6976 unixware 4.2
6977 pr_who doesn't exist on:
6978 linux 2.[01]
6979 */
7ee38065 6980#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
6981 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
6982#endif
6983 }
7ee38065 6984#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
6985 else
6986 {
6987 /* Fail - we don't know how to handle any other
6988 note size (ie. data object type). */
b34976b6 6989 return TRUE;
4a938328 6990 }
252b5132 6991
bb0082d6 6992 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 6993 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 6994 size, note->descpos + offset);
252b5132
RH
6995}
6996#endif /* defined (HAVE_PRSTATUS_T) */
6997
bb0082d6 6998/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 6999static bfd_boolean
217aa764
AM
7000elfcore_make_note_pseudosection (bfd *abfd,
7001 char *name,
7002 Elf_Internal_Note *note)
252b5132 7003{
936e320b
AM
7004 return _bfd_elfcore_make_pseudosection (abfd, name,
7005 note->descsz, note->descpos);
252b5132
RH
7006}
7007
ff08c6bb
JB
7008/* There isn't a consistent prfpregset_t across platforms,
7009 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7010 data structure apart. */
7011
b34976b6 7012static bfd_boolean
217aa764 7013elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7014{
7015 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7016}
7017
ff08c6bb
JB
7018/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7019 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7020 literally. */
c044fabd 7021
b34976b6 7022static bfd_boolean
217aa764 7023elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7024{
7025 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7026}
7027
252b5132 7028#if defined (HAVE_PRPSINFO_T)
4a938328 7029typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7030#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7031typedef prpsinfo32_t elfcore_psinfo32_t;
7032#endif
252b5132
RH
7033#endif
7034
7035#if defined (HAVE_PSINFO_T)
4a938328 7036typedef psinfo_t elfcore_psinfo_t;
7ee38065 7037#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7038typedef psinfo32_t elfcore_psinfo32_t;
7039#endif
252b5132
RH
7040#endif
7041
252b5132
RH
7042/* return a malloc'ed copy of a string at START which is at
7043 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7044 the copy will always have a terminating '\0'. */
252b5132 7045
936e320b 7046char *
217aa764 7047_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7048{
dc810e39 7049 char *dups;
c044fabd 7050 char *end = memchr (start, '\0', max);
dc810e39 7051 size_t len;
252b5132
RH
7052
7053 if (end == NULL)
7054 len = max;
7055 else
7056 len = end - start;
7057
217aa764 7058 dups = bfd_alloc (abfd, len + 1);
dc810e39 7059 if (dups == NULL)
252b5132
RH
7060 return NULL;
7061
dc810e39
AM
7062 memcpy (dups, start, len);
7063 dups[len] = '\0';
252b5132 7064
dc810e39 7065 return dups;
252b5132
RH
7066}
7067
bb0082d6 7068#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7069static bfd_boolean
217aa764 7070elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7071{
4a938328
MS
7072 if (note->descsz == sizeof (elfcore_psinfo_t))
7073 {
7074 elfcore_psinfo_t psinfo;
252b5132 7075
7ee38065 7076 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7077
4a938328 7078 elf_tdata (abfd)->core_program
936e320b
AM
7079 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7080 sizeof (psinfo.pr_fname));
252b5132 7081
4a938328 7082 elf_tdata (abfd)->core_command
936e320b
AM
7083 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7084 sizeof (psinfo.pr_psargs));
4a938328 7085 }
7ee38065 7086#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7087 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7088 {
7089 /* 64-bit host, 32-bit corefile */
7090 elfcore_psinfo32_t psinfo;
7091
7ee38065 7092 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7093
4a938328 7094 elf_tdata (abfd)->core_program
936e320b
AM
7095 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7096 sizeof (psinfo.pr_fname));
4a938328
MS
7097
7098 elf_tdata (abfd)->core_command
936e320b
AM
7099 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7100 sizeof (psinfo.pr_psargs));
4a938328
MS
7101 }
7102#endif
7103
7104 else
7105 {
7106 /* Fail - we don't know how to handle any other
7107 note size (ie. data object type). */
b34976b6 7108 return TRUE;
4a938328 7109 }
252b5132
RH
7110
7111 /* Note that for some reason, a spurious space is tacked
7112 onto the end of the args in some (at least one anyway)
c044fabd 7113 implementations, so strip it off if it exists. */
252b5132
RH
7114
7115 {
c044fabd 7116 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7117 int n = strlen (command);
7118
7119 if (0 < n && command[n - 1] == ' ')
7120 command[n - 1] = '\0';
7121 }
7122
b34976b6 7123 return TRUE;
252b5132
RH
7124}
7125#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7126
252b5132 7127#if defined (HAVE_PSTATUS_T)
b34976b6 7128static bfd_boolean
217aa764 7129elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7130{
f572a39d
AM
7131 if (note->descsz == sizeof (pstatus_t)
7132#if defined (HAVE_PXSTATUS_T)
7133 || note->descsz == sizeof (pxstatus_t)
7134#endif
7135 )
4a938328
MS
7136 {
7137 pstatus_t pstat;
252b5132 7138
4a938328 7139 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7140
4a938328
MS
7141 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7142 }
7ee38065 7143#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7144 else if (note->descsz == sizeof (pstatus32_t))
7145 {
7146 /* 64-bit host, 32-bit corefile */
7147 pstatus32_t pstat;
252b5132 7148
4a938328 7149 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7150
4a938328
MS
7151 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7152 }
7153#endif
252b5132
RH
7154 /* Could grab some more details from the "representative"
7155 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7156 NT_LWPSTATUS note, presumably. */
252b5132 7157
b34976b6 7158 return TRUE;
252b5132
RH
7159}
7160#endif /* defined (HAVE_PSTATUS_T) */
7161
252b5132 7162#if defined (HAVE_LWPSTATUS_T)
b34976b6 7163static bfd_boolean
217aa764 7164elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7165{
7166 lwpstatus_t lwpstat;
7167 char buf[100];
c044fabd 7168 char *name;
d4c88bbb 7169 size_t len;
c044fabd 7170 asection *sect;
252b5132 7171
f572a39d
AM
7172 if (note->descsz != sizeof (lwpstat)
7173#if defined (HAVE_LWPXSTATUS_T)
7174 && note->descsz != sizeof (lwpxstatus_t)
7175#endif
7176 )
b34976b6 7177 return TRUE;
252b5132
RH
7178
7179 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7180
7181 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7182 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7183
c044fabd 7184 /* Make a ".reg/999" section. */
252b5132
RH
7185
7186 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7187 len = strlen (buf) + 1;
217aa764 7188 name = bfd_alloc (abfd, len);
252b5132 7189 if (name == NULL)
b34976b6 7190 return FALSE;
d4c88bbb 7191 memcpy (name, buf, len);
252b5132 7192
62f3bb11 7193 sect = bfd_make_section_anyway (abfd, name);
252b5132 7194 if (sect == NULL)
b34976b6 7195 return FALSE;
252b5132
RH
7196
7197#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7198 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7199 sect->filepos = note->descpos
7200 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7201#endif
7202
7203#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7204 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7205 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7206#endif
7207
7208 sect->flags = SEC_HAS_CONTENTS;
7209 sect->alignment_power = 2;
7210
7211 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7212 return FALSE;
252b5132
RH
7213
7214 /* Make a ".reg2/999" section */
7215
7216 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7217 len = strlen (buf) + 1;
217aa764 7218 name = bfd_alloc (abfd, len);
252b5132 7219 if (name == NULL)
b34976b6 7220 return FALSE;
d4c88bbb 7221 memcpy (name, buf, len);
252b5132 7222
62f3bb11 7223 sect = bfd_make_section_anyway (abfd, name);
252b5132 7224 if (sect == NULL)
b34976b6 7225 return FALSE;
252b5132
RH
7226
7227#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7228 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7229 sect->filepos = note->descpos
7230 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7231#endif
7232
7233#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7234 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7235 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7236#endif
7237
7238 sect->flags = SEC_HAS_CONTENTS;
7239 sect->alignment_power = 2;
7240
936e320b 7241 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7242}
7243#endif /* defined (HAVE_LWPSTATUS_T) */
7244
16e9c715 7245#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7246static bfd_boolean
217aa764 7247elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7248{
7249 char buf[30];
c044fabd 7250 char *name;
d4c88bbb 7251 size_t len;
c044fabd 7252 asection *sect;
16e9c715
NC
7253 win32_pstatus_t pstatus;
7254
7255 if (note->descsz < sizeof (pstatus))
b34976b6 7256 return TRUE;
16e9c715 7257
e8eab623 7258 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7259
7260 switch (pstatus.data_type)
16e9c715
NC
7261 {
7262 case NOTE_INFO_PROCESS:
7263 /* FIXME: need to add ->core_command. */
7264 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7265 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7266 break;
16e9c715
NC
7267
7268 case NOTE_INFO_THREAD:
7269 /* Make a ".reg/999" section. */
1f170678 7270 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7271
d4c88bbb 7272 len = strlen (buf) + 1;
217aa764 7273 name = bfd_alloc (abfd, len);
16e9c715 7274 if (name == NULL)
b34976b6 7275 return FALSE;
c044fabd 7276
d4c88bbb 7277 memcpy (name, buf, len);
16e9c715 7278
62f3bb11 7279 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7280 if (sect == NULL)
b34976b6 7281 return FALSE;
c044fabd 7282
eea6121a 7283 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7284 sect->filepos = (note->descpos
7285 + offsetof (struct win32_pstatus,
7286 data.thread_info.thread_context));
16e9c715
NC
7287 sect->flags = SEC_HAS_CONTENTS;
7288 sect->alignment_power = 2;
7289
7290 if (pstatus.data.thread_info.is_active_thread)
7291 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7292 return FALSE;
16e9c715
NC
7293 break;
7294
7295 case NOTE_INFO_MODULE:
7296 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7297 sprintf (buf, ".module/%08lx",
7298 (long) pstatus.data.module_info.base_address);
c044fabd 7299
d4c88bbb 7300 len = strlen (buf) + 1;
217aa764 7301 name = bfd_alloc (abfd, len);
16e9c715 7302 if (name == NULL)
b34976b6 7303 return FALSE;
c044fabd 7304
d4c88bbb 7305 memcpy (name, buf, len);
252b5132 7306
62f3bb11 7307 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7308
16e9c715 7309 if (sect == NULL)
b34976b6 7310 return FALSE;
c044fabd 7311
eea6121a 7312 sect->size = note->descsz;
16e9c715
NC
7313 sect->filepos = note->descpos;
7314 sect->flags = SEC_HAS_CONTENTS;
7315 sect->alignment_power = 2;
7316 break;
7317
7318 default:
b34976b6 7319 return TRUE;
16e9c715
NC
7320 }
7321
b34976b6 7322 return TRUE;
16e9c715
NC
7323}
7324#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7325
b34976b6 7326static bfd_boolean
217aa764 7327elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7328{
9c5bfbb7 7329 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7330
252b5132
RH
7331 switch (note->type)
7332 {
7333 default:
b34976b6 7334 return TRUE;
252b5132 7335
252b5132 7336 case NT_PRSTATUS:
bb0082d6
AM
7337 if (bed->elf_backend_grok_prstatus)
7338 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7339 return TRUE;
bb0082d6 7340#if defined (HAVE_PRSTATUS_T)
252b5132 7341 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7342#else
b34976b6 7343 return TRUE;
252b5132
RH
7344#endif
7345
7346#if defined (HAVE_PSTATUS_T)
7347 case NT_PSTATUS:
7348 return elfcore_grok_pstatus (abfd, note);
7349#endif
7350
7351#if defined (HAVE_LWPSTATUS_T)
7352 case NT_LWPSTATUS:
7353 return elfcore_grok_lwpstatus (abfd, note);
7354#endif
7355
7356 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7357 return elfcore_grok_prfpreg (abfd, note);
7358
16e9c715 7359#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7360 case NT_WIN32PSTATUS:
16e9c715
NC
7361 return elfcore_grok_win32pstatus (abfd, note);
7362#endif
7363
c044fabd 7364 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7365 if (note->namesz == 6
7366 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7367 return elfcore_grok_prxfpreg (abfd, note);
7368 else
b34976b6 7369 return TRUE;
ff08c6bb 7370
252b5132
RH
7371 case NT_PRPSINFO:
7372 case NT_PSINFO:
bb0082d6
AM
7373 if (bed->elf_backend_grok_psinfo)
7374 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7375 return TRUE;
bb0082d6 7376#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7377 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7378#else
b34976b6 7379 return TRUE;
252b5132 7380#endif
3333a7c3
RM
7381
7382 case NT_AUXV:
7383 {
62f3bb11 7384 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7385
7386 if (sect == NULL)
7387 return FALSE;
eea6121a 7388 sect->size = note->descsz;
3333a7c3
RM
7389 sect->filepos = note->descpos;
7390 sect->flags = SEC_HAS_CONTENTS;
7391 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7392
7393 return TRUE;
7394 }
252b5132
RH
7395 }
7396}
7397
b34976b6 7398static bfd_boolean
217aa764 7399elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7400{
7401 char *cp;
7402
7403 cp = strchr (note->namedata, '@');
7404 if (cp != NULL)
7405 {
d2b64500 7406 *lwpidp = atoi(cp + 1);
b34976b6 7407 return TRUE;
50b2bdb7 7408 }
b34976b6 7409 return FALSE;
50b2bdb7
AM
7410}
7411
b34976b6 7412static bfd_boolean
217aa764 7413elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7414{
7415
7416 /* Signal number at offset 0x08. */
7417 elf_tdata (abfd)->core_signal
7418 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7419
7420 /* Process ID at offset 0x50. */
7421 elf_tdata (abfd)->core_pid
7422 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7423
7424 /* Command name at 0x7c (max 32 bytes, including nul). */
7425 elf_tdata (abfd)->core_command
7426 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7427
7720ba9f
MK
7428 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7429 note);
50b2bdb7
AM
7430}
7431
b34976b6 7432static bfd_boolean
217aa764 7433elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7434{
7435 int lwp;
7436
7437 if (elfcore_netbsd_get_lwpid (note, &lwp))
7438 elf_tdata (abfd)->core_lwpid = lwp;
7439
b4db1224 7440 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7441 {
7442 /* NetBSD-specific core "procinfo". Note that we expect to
7443 find this note before any of the others, which is fine,
7444 since the kernel writes this note out first when it
7445 creates a core file. */
47d9a591 7446
50b2bdb7
AM
7447 return elfcore_grok_netbsd_procinfo (abfd, note);
7448 }
7449
b4db1224
JT
7450 /* As of Jan 2002 there are no other machine-independent notes
7451 defined for NetBSD core files. If the note type is less
7452 than the start of the machine-dependent note types, we don't
7453 understand it. */
47d9a591 7454
b4db1224 7455 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7456 return TRUE;
50b2bdb7
AM
7457
7458
7459 switch (bfd_get_arch (abfd))
7460 {
7461 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7462 PT_GETFPREGS == mach+2. */
7463
7464 case bfd_arch_alpha:
7465 case bfd_arch_sparc:
7466 switch (note->type)
7467 {
b4db1224 7468 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7469 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7470
b4db1224 7471 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7472 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7473
7474 default:
b34976b6 7475 return TRUE;
50b2bdb7
AM
7476 }
7477
7478 /* On all other arch's, PT_GETREGS == mach+1 and
7479 PT_GETFPREGS == mach+3. */
7480
7481 default:
7482 switch (note->type)
7483 {
b4db1224 7484 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7485 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7486
b4db1224 7487 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7488 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7489
7490 default:
b34976b6 7491 return TRUE;
50b2bdb7
AM
7492 }
7493 }
7494 /* NOTREACHED */
7495}
7496
07c6e936 7497static bfd_boolean
217aa764 7498elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7499{
7500 void *ddata = note->descdata;
7501 char buf[100];
7502 char *name;
7503 asection *sect;
f8843e87
AM
7504 short sig;
7505 unsigned flags;
07c6e936
NC
7506
7507 /* nto_procfs_status 'pid' field is at offset 0. */
7508 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7509
f8843e87
AM
7510 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7511 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7512
7513 /* nto_procfs_status 'flags' field is at offset 8. */
7514 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7515
7516 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7517 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7518 {
7519 elf_tdata (abfd)->core_signal = sig;
7520 elf_tdata (abfd)->core_lwpid = *tid;
7521 }
07c6e936 7522
f8843e87
AM
7523 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7524 do not come from signals so we make sure we set the current
7525 thread just in case. */
7526 if (flags & 0x00000080)
7527 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7528
7529 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7530 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7531
217aa764 7532 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7533 if (name == NULL)
7534 return FALSE;
7535 strcpy (name, buf);
7536
62f3bb11 7537 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7538 if (sect == NULL)
7539 return FALSE;
7540
eea6121a 7541 sect->size = note->descsz;
07c6e936
NC
7542 sect->filepos = note->descpos;
7543 sect->flags = SEC_HAS_CONTENTS;
7544 sect->alignment_power = 2;
7545
7546 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7547}
7548
7549static bfd_boolean
d69f560c
KW
7550elfcore_grok_nto_regs (bfd *abfd,
7551 Elf_Internal_Note *note,
7552 pid_t tid,
7553 char *base)
07c6e936
NC
7554{
7555 char buf[100];
7556 char *name;
7557 asection *sect;
7558
d69f560c 7559 /* Make a "(base)/%d" section. */
7e7353ed 7560 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 7561
217aa764 7562 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7563 if (name == NULL)
7564 return FALSE;
7565 strcpy (name, buf);
7566
62f3bb11 7567 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7568 if (sect == NULL)
7569 return FALSE;
7570
eea6121a 7571 sect->size = note->descsz;
07c6e936
NC
7572 sect->filepos = note->descpos;
7573 sect->flags = SEC_HAS_CONTENTS;
7574 sect->alignment_power = 2;
7575
f8843e87
AM
7576 /* This is the current thread. */
7577 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 7578 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
7579
7580 return TRUE;
07c6e936
NC
7581}
7582
7583#define BFD_QNT_CORE_INFO 7
7584#define BFD_QNT_CORE_STATUS 8
7585#define BFD_QNT_CORE_GREG 9
7586#define BFD_QNT_CORE_FPREG 10
7587
7588static bfd_boolean
217aa764 7589elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
7590{
7591 /* Every GREG section has a STATUS section before it. Store the
811072d8 7592 tid from the previous call to pass down to the next gregs
07c6e936
NC
7593 function. */
7594 static pid_t tid = 1;
7595
7596 switch (note->type)
7597 {
d69f560c
KW
7598 case BFD_QNT_CORE_INFO:
7599 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
7600 case BFD_QNT_CORE_STATUS:
7601 return elfcore_grok_nto_status (abfd, note, &tid);
7602 case BFD_QNT_CORE_GREG:
7603 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
7604 case BFD_QNT_CORE_FPREG:
7605 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
7606 default:
7607 return TRUE;
07c6e936
NC
7608 }
7609}
7610
7c76fa91
MS
7611/* Function: elfcore_write_note
7612
47d9a591 7613 Inputs:
7c76fa91
MS
7614 buffer to hold note
7615 name of note
7616 type of note
7617 data for note
7618 size of data for note
7619
7620 Return:
7621 End of buffer containing note. */
7622
7623char *
217aa764
AM
7624elfcore_write_note (bfd *abfd,
7625 char *buf,
7626 int *bufsiz,
7627 const char *name,
7628 int type,
7629 const void *input,
7630 int size)
7c76fa91
MS
7631{
7632 Elf_External_Note *xnp;
d4c88bbb
AM
7633 size_t namesz;
7634 size_t pad;
7635 size_t newspace;
7c76fa91
MS
7636 char *p, *dest;
7637
d4c88bbb
AM
7638 namesz = 0;
7639 pad = 0;
7640 if (name != NULL)
7641 {
9c5bfbb7 7642 const struct elf_backend_data *bed;
d4c88bbb
AM
7643
7644 namesz = strlen (name) + 1;
7645 bed = get_elf_backend_data (abfd);
45d6a902 7646 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
7647 }
7648
5de3bf90 7649 newspace = 12 + namesz + pad + size;
d4c88bbb 7650
7c76fa91
MS
7651 p = realloc (buf, *bufsiz + newspace);
7652 dest = p + *bufsiz;
7653 *bufsiz += newspace;
7654 xnp = (Elf_External_Note *) dest;
7655 H_PUT_32 (abfd, namesz, xnp->namesz);
7656 H_PUT_32 (abfd, size, xnp->descsz);
7657 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
7658 dest = xnp->name;
7659 if (name != NULL)
7660 {
7661 memcpy (dest, name, namesz);
7662 dest += namesz;
7663 while (pad != 0)
7664 {
7665 *dest++ = '\0';
7666 --pad;
7667 }
7668 }
7669 memcpy (dest, input, size);
7c76fa91
MS
7670 return p;
7671}
7672
7673#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
7674char *
217aa764
AM
7675elfcore_write_prpsinfo (bfd *abfd,
7676 char *buf,
7677 int *bufsiz,
7678 const char *fname,
7679 const char *psargs)
7c76fa91
MS
7680{
7681 int note_type;
7682 char *note_name = "CORE";
7683
7684#if defined (HAVE_PSINFO_T)
7685 psinfo_t data;
7686 note_type = NT_PSINFO;
7687#else
7688 prpsinfo_t data;
7689 note_type = NT_PRPSINFO;
7690#endif
7691
7692 memset (&data, 0, sizeof (data));
7693 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
7694 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 7695 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7696 note_name, note_type, &data, sizeof (data));
7697}
7698#endif /* PSINFO_T or PRPSINFO_T */
7699
7700#if defined (HAVE_PRSTATUS_T)
7701char *
217aa764
AM
7702elfcore_write_prstatus (bfd *abfd,
7703 char *buf,
7704 int *bufsiz,
7705 long pid,
7706 int cursig,
7707 const void *gregs)
7c76fa91
MS
7708{
7709 prstatus_t prstat;
7710 char *note_name = "CORE";
7711
7712 memset (&prstat, 0, sizeof (prstat));
7713 prstat.pr_pid = pid;
7714 prstat.pr_cursig = cursig;
c106e334 7715 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 7716 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7717 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
7718}
7719#endif /* HAVE_PRSTATUS_T */
7720
51316059
MS
7721#if defined (HAVE_LWPSTATUS_T)
7722char *
217aa764
AM
7723elfcore_write_lwpstatus (bfd *abfd,
7724 char *buf,
7725 int *bufsiz,
7726 long pid,
7727 int cursig,
7728 const void *gregs)
51316059
MS
7729{
7730 lwpstatus_t lwpstat;
7731 char *note_name = "CORE";
7732
7733 memset (&lwpstat, 0, sizeof (lwpstat));
7734 lwpstat.pr_lwpid = pid >> 16;
7735 lwpstat.pr_cursig = cursig;
7736#if defined (HAVE_LWPSTATUS_T_PR_REG)
7737 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
7738#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
7739#if !defined(gregs)
7740 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
7741 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
7742#else
7743 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
7744 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
7745#endif
7746#endif
47d9a591 7747 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7748 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
7749}
7750#endif /* HAVE_LWPSTATUS_T */
7751
7c76fa91
MS
7752#if defined (HAVE_PSTATUS_T)
7753char *
217aa764
AM
7754elfcore_write_pstatus (bfd *abfd,
7755 char *buf,
7756 int *bufsiz,
7757 long pid,
7758 int cursig,
7759 const void *gregs)
7c76fa91
MS
7760{
7761 pstatus_t pstat;
7762 char *note_name = "CORE";
7763
51316059
MS
7764 memset (&pstat, 0, sizeof (pstat));
7765 pstat.pr_pid = pid & 0xffff;
47d9a591 7766 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7767 NT_PSTATUS, &pstat, sizeof (pstat));
7768 return buf;
7c76fa91
MS
7769}
7770#endif /* HAVE_PSTATUS_T */
7771
7772char *
217aa764
AM
7773elfcore_write_prfpreg (bfd *abfd,
7774 char *buf,
7775 int *bufsiz,
7776 const void *fpregs,
7777 int size)
7c76fa91
MS
7778{
7779 char *note_name = "CORE";
47d9a591 7780 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7781 note_name, NT_FPREGSET, fpregs, size);
7782}
7783
7784char *
217aa764
AM
7785elfcore_write_prxfpreg (bfd *abfd,
7786 char *buf,
7787 int *bufsiz,
7788 const void *xfpregs,
7789 int size)
7c76fa91
MS
7790{
7791 char *note_name = "LINUX";
47d9a591 7792 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7793 note_name, NT_PRXFPREG, xfpregs, size);
7794}
7795
b34976b6 7796static bfd_boolean
217aa764 7797elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 7798{
c044fabd
KH
7799 char *buf;
7800 char *p;
252b5132
RH
7801
7802 if (size <= 0)
b34976b6 7803 return TRUE;
252b5132 7804
dc810e39 7805 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 7806 return FALSE;
252b5132 7807
dc810e39 7808 buf = bfd_malloc (size);
252b5132 7809 if (buf == NULL)
b34976b6 7810 return FALSE;
252b5132 7811
dc810e39 7812 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
7813 {
7814 error:
7815 free (buf);
b34976b6 7816 return FALSE;
252b5132
RH
7817 }
7818
7819 p = buf;
7820 while (p < buf + size)
7821 {
c044fabd
KH
7822 /* FIXME: bad alignment assumption. */
7823 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
7824 Elf_Internal_Note in;
7825
dc810e39 7826 in.type = H_GET_32 (abfd, xnp->type);
252b5132 7827
dc810e39 7828 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
7829 in.namedata = xnp->name;
7830
dc810e39 7831 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
7832 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
7833 in.descpos = offset + (in.descdata - buf);
7834
50b2bdb7
AM
7835 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
7836 {
7837 if (! elfcore_grok_netbsd_note (abfd, &in))
7838 goto error;
7839 }
07c6e936
NC
7840 else if (strncmp (in.namedata, "QNX", 3) == 0)
7841 {
7842 if (! elfcore_grok_nto_note (abfd, &in))
7843 goto error;
7844 }
50b2bdb7
AM
7845 else
7846 {
7847 if (! elfcore_grok_note (abfd, &in))
7848 goto error;
7849 }
252b5132
RH
7850
7851 p = in.descdata + BFD_ALIGN (in.descsz, 4);
7852 }
7853
7854 free (buf);
b34976b6 7855 return TRUE;
252b5132 7856}
98d8431c
JB
7857\f
7858/* Providing external access to the ELF program header table. */
7859
7860/* Return an upper bound on the number of bytes required to store a
7861 copy of ABFD's program header table entries. Return -1 if an error
7862 occurs; bfd_get_error will return an appropriate code. */
c044fabd 7863
98d8431c 7864long
217aa764 7865bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
7866{
7867 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7868 {
7869 bfd_set_error (bfd_error_wrong_format);
7870 return -1;
7871 }
7872
936e320b 7873 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
7874}
7875
98d8431c
JB
7876/* Copy ABFD's program header table entries to *PHDRS. The entries
7877 will be stored as an array of Elf_Internal_Phdr structures, as
7878 defined in include/elf/internal.h. To find out how large the
7879 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
7880
7881 Return the number of program header table entries read, or -1 if an
7882 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 7883
98d8431c 7884int
217aa764 7885bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
7886{
7887 int num_phdrs;
7888
7889 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7890 {
7891 bfd_set_error (bfd_error_wrong_format);
7892 return -1;
7893 }
7894
7895 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 7896 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
7897 num_phdrs * sizeof (Elf_Internal_Phdr));
7898
7899 return num_phdrs;
7900}
ae4221d7
L
7901
7902void
217aa764 7903_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 7904{
d3b05f8d 7905#ifdef BFD64
ae4221d7
L
7906 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7907
7908 i_ehdrp = elf_elfheader (abfd);
7909 if (i_ehdrp == NULL)
7910 sprintf_vma (buf, value);
7911 else
7912 {
7913 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7914 {
ae4221d7 7915#if BFD_HOST_64BIT_LONG
cc55aec9 7916 sprintf (buf, "%016lx", value);
ae4221d7 7917#else
cc55aec9
AM
7918 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
7919 _bfd_int64_low (value));
ae4221d7 7920#endif
cc55aec9 7921 }
ae4221d7
L
7922 else
7923 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
7924 }
d3b05f8d
L
7925#else
7926 sprintf_vma (buf, value);
7927#endif
ae4221d7
L
7928}
7929
7930void
217aa764 7931_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 7932{
d3b05f8d 7933#ifdef BFD64
ae4221d7
L
7934 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7935
7936 i_ehdrp = elf_elfheader (abfd);
7937 if (i_ehdrp == NULL)
7938 fprintf_vma ((FILE *) stream, value);
7939 else
7940 {
7941 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7942 {
ae4221d7 7943#if BFD_HOST_64BIT_LONG
cc55aec9 7944 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 7945#else
cc55aec9
AM
7946 fprintf ((FILE *) stream, "%08lx%08lx",
7947 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 7948#endif
cc55aec9 7949 }
ae4221d7
L
7950 else
7951 fprintf ((FILE *) stream, "%08lx",
7952 (unsigned long) (value & 0xffffffff));
7953 }
d3b05f8d
L
7954#else
7955 fprintf_vma ((FILE *) stream, value);
7956#endif
ae4221d7 7957}
db6751f2
JJ
7958
7959enum elf_reloc_type_class
217aa764 7960_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
7961{
7962 return reloc_class_normal;
7963}
f8df10f4 7964
47d9a591 7965/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
7966 relocation against a local symbol. */
7967
7968bfd_vma
217aa764
AM
7969_bfd_elf_rela_local_sym (bfd *abfd,
7970 Elf_Internal_Sym *sym,
8517fae7 7971 asection **psec,
217aa764 7972 Elf_Internal_Rela *rel)
f8df10f4 7973{
8517fae7 7974 asection *sec = *psec;
f8df10f4
JJ
7975 bfd_vma relocation;
7976
7977 relocation = (sec->output_section->vma
7978 + sec->output_offset
7979 + sym->st_value);
7980 if ((sec->flags & SEC_MERGE)
c629eae0 7981 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 7982 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 7983 {
f8df10f4 7984 rel->r_addend =
8517fae7 7985 _bfd_merged_section_offset (abfd, psec,
65765700 7986 elf_section_data (sec)->sec_info,
753731ee
AM
7987 sym->st_value + rel->r_addend);
7988 if (sec != *psec)
7989 {
7990 /* If we have changed the section, and our original section is
7991 marked with SEC_EXCLUDE, it means that the original
7992 SEC_MERGE section has been completely subsumed in some
7993 other SEC_MERGE section. In this case, we need to leave
7994 some info around for --emit-relocs. */
7995 if ((sec->flags & SEC_EXCLUDE) != 0)
7996 sec->kept_section = *psec;
7997 sec = *psec;
7998 }
8517fae7
AM
7999 rel->r_addend -= relocation;
8000 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8001 }
8002 return relocation;
8003}
c629eae0
JJ
8004
8005bfd_vma
217aa764
AM
8006_bfd_elf_rel_local_sym (bfd *abfd,
8007 Elf_Internal_Sym *sym,
8008 asection **psec,
8009 bfd_vma addend)
47d9a591 8010{
c629eae0
JJ
8011 asection *sec = *psec;
8012
68bfbfcc 8013 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8014 return sym->st_value + addend;
8015
8016 return _bfd_merged_section_offset (abfd, psec,
65765700 8017 elf_section_data (sec)->sec_info,
753731ee 8018 sym->st_value + addend);
c629eae0
JJ
8019}
8020
8021bfd_vma
217aa764 8022_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8023 struct bfd_link_info *info,
217aa764
AM
8024 asection *sec,
8025 bfd_vma offset)
c629eae0 8026{
68bfbfcc 8027 switch (sec->sec_info_type)
65765700
JJ
8028 {
8029 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8030 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8031 offset);
65765700 8032 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8033 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8034 default:
8035 return offset;
8036 }
c629eae0 8037}
3333a7c3
RM
8038\f
8039/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8040 reconstruct an ELF file by reading the segments out of remote memory
8041 based on the ELF file header at EHDR_VMA and the ELF program headers it
8042 points to. If not null, *LOADBASEP is filled in with the difference
8043 between the VMAs from which the segments were read, and the VMAs the
8044 file headers (and hence BFD's idea of each section's VMA) put them at.
8045
8046 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8047 remote memory at target address VMA into the local buffer at MYADDR; it
8048 should return zero on success or an `errno' code on failure. TEMPL must
8049 be a BFD for an ELF target with the word size and byte order found in
8050 the remote memory. */
8051
8052bfd *
217aa764
AM
8053bfd_elf_bfd_from_remote_memory
8054 (bfd *templ,
8055 bfd_vma ehdr_vma,
8056 bfd_vma *loadbasep,
f075ee0c 8057 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8058{
8059 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8060 (templ, ehdr_vma, loadbasep, target_read_memory);
8061}
4c45e5c9
JJ
8062\f
8063long
c9727e01
AM
8064_bfd_elf_get_synthetic_symtab (bfd *abfd,
8065 long symcount ATTRIBUTE_UNUSED,
8066 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8067 long dynsymcount,
c9727e01
AM
8068 asymbol **dynsyms,
8069 asymbol **ret)
4c45e5c9
JJ
8070{
8071 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8072 asection *relplt;
8073 asymbol *s;
8074 const char *relplt_name;
8075 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8076 arelent *p;
8077 long count, i, n;
8078 size_t size;
8079 Elf_Internal_Shdr *hdr;
8080 char *names;
8081 asection *plt;
8082
8615f3f2
AM
8083 *ret = NULL;
8084
90e3cdf2
JJ
8085 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8086 return 0;
8087
8615f3f2
AM
8088 if (dynsymcount <= 0)
8089 return 0;
8090
4c45e5c9
JJ
8091 if (!bed->plt_sym_val)
8092 return 0;
8093
8094 relplt_name = bed->relplt_name;
8095 if (relplt_name == NULL)
8096 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8097 relplt = bfd_get_section_by_name (abfd, relplt_name);
8098 if (relplt == NULL)
8099 return 0;
8100
8101 hdr = &elf_section_data (relplt)->this_hdr;
8102 if (hdr->sh_link != elf_dynsymtab (abfd)
8103 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8104 return 0;
8105
8106 plt = bfd_get_section_by_name (abfd, ".plt");
8107 if (plt == NULL)
8108 return 0;
8109
8110 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8111 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8112 return -1;
8113
eea6121a 8114 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8115 size = count * sizeof (asymbol);
8116 p = relplt->relocation;
8117 for (i = 0; i < count; i++, s++, p++)
8118 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8119
8120 s = *ret = bfd_malloc (size);
8121 if (s == NULL)
8122 return -1;
8123
8124 names = (char *) (s + count);
8125 p = relplt->relocation;
8126 n = 0;
8127 for (i = 0; i < count; i++, s++, p++)
8128 {
8129 size_t len;
8130 bfd_vma addr;
8131
8132 addr = bed->plt_sym_val (i, plt, p);
8133 if (addr == (bfd_vma) -1)
8134 continue;
8135
8136 *s = **p->sym_ptr_ptr;
8137 s->section = plt;
8138 s->value = addr - plt->vma;
8139 s->name = names;
8140 len = strlen ((*p->sym_ptr_ptr)->name);
8141 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8142 names += len;
8143 memcpy (names, "@plt", sizeof ("@plt"));
8144 names += sizeof ("@plt");
8145 ++n;
8146 }
8147
8148 return n;
8149}
3d7f7666
L
8150
8151/* Sort symbol by binding and section. We want to put definitions
8152 sorted by section at the beginning. */
8153
8154static int
8155elf_sort_elf_symbol (const void *arg1, const void *arg2)
8156{
8157 const Elf_Internal_Sym *s1;
8158 const Elf_Internal_Sym *s2;
8159 int shndx;
8160
8161 /* Make sure that undefined symbols are at the end. */
8162 s1 = (const Elf_Internal_Sym *) arg1;
8163 if (s1->st_shndx == SHN_UNDEF)
8164 return 1;
8165 s2 = (const Elf_Internal_Sym *) arg2;
8166 if (s2->st_shndx == SHN_UNDEF)
8167 return -1;
8168
8169 /* Sorted by section index. */
8170 shndx = s1->st_shndx - s2->st_shndx;
8171 if (shndx != 0)
8172 return shndx;
8173
8174 /* Sorted by binding. */
8175 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8176}
8177
8178struct elf_symbol
8179{
8180 Elf_Internal_Sym *sym;
8181 const char *name;
8182};
8183
8184static int
8185elf_sym_name_compare (const void *arg1, const void *arg2)
8186{
8187 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8188 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8189 return strcmp (s1->name, s2->name);
8190}
8191
8192/* Check if 2 sections define the same set of local and global
8193 symbols. */
8194
8195bfd_boolean
8196bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8197{
8198 bfd *bfd1, *bfd2;
8199 const struct elf_backend_data *bed1, *bed2;
8200 Elf_Internal_Shdr *hdr1, *hdr2;
8201 bfd_size_type symcount1, symcount2;
8202 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8203 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8204 Elf_Internal_Sym *isymend;
8205 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8206 bfd_size_type count1, count2, i;
8207 int shndx1, shndx2;
8208 bfd_boolean result;
8209
8210 bfd1 = sec1->owner;
8211 bfd2 = sec2->owner;
8212
8213 /* If both are .gnu.linkonce sections, they have to have the same
8214 section name. */
8215 if (strncmp (sec1->name, ".gnu.linkonce",
8216 sizeof ".gnu.linkonce" - 1) == 0
8217 && strncmp (sec2->name, ".gnu.linkonce",
8218 sizeof ".gnu.linkonce" - 1) == 0)
8219 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8220 sec2->name + sizeof ".gnu.linkonce") == 0;
8221
8222 /* Both sections have to be in ELF. */
8223 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8224 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8225 return FALSE;
8226
8227 if (elf_section_type (sec1) != elf_section_type (sec2))
8228 return FALSE;
8229
8230 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8231 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8232 {
8233 /* If both are members of section groups, they have to have the
8234 same group name. */
8235 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8236 return FALSE;
8237 }
8238
8239 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8240 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8241 if (shndx1 == -1 || shndx2 == -1)
8242 return FALSE;
8243
8244 bed1 = get_elf_backend_data (bfd1);
8245 bed2 = get_elf_backend_data (bfd2);
8246 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8247 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8248 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8249 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8250
8251 if (symcount1 == 0 || symcount2 == 0)
8252 return FALSE;
8253
8254 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8255 NULL, NULL, NULL);
8256 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8257 NULL, NULL, NULL);
8258
8259 result = FALSE;
8260 if (isymbuf1 == NULL || isymbuf2 == NULL)
8261 goto done;
8262
8263 /* Sort symbols by binding and section. Global definitions are at
8264 the beginning. */
8265 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8266 elf_sort_elf_symbol);
8267 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8268 elf_sort_elf_symbol);
8269
8270 /* Count definitions in the section. */
8271 count1 = 0;
8272 for (isym = isymbuf1, isymend = isym + symcount1;
8273 isym < isymend; isym++)
8274 {
8275 if (isym->st_shndx == (unsigned int) shndx1)
8276 {
8277 if (count1 == 0)
8278 isymstart1 = isym;
8279 count1++;
8280 }
8281
8282 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8283 break;
8284 }
8285
8286 count2 = 0;
8287 for (isym = isymbuf2, isymend = isym + symcount2;
8288 isym < isymend; isym++)
8289 {
8290 if (isym->st_shndx == (unsigned int) shndx2)
8291 {
8292 if (count2 == 0)
8293 isymstart2 = isym;
8294 count2++;
8295 }
8296
8297 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8298 break;
8299 }
8300
8301 if (count1 == 0 || count2 == 0 || count1 != count2)
8302 goto done;
8303
8304 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8305 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8306
8307 if (symtable1 == NULL || symtable2 == NULL)
8308 goto done;
8309
8310 symp = symtable1;
8311 for (isym = isymstart1, isymend = isym + count1;
8312 isym < isymend; isym++)
8313 {
8314 symp->sym = isym;
8315 symp->name = bfd_elf_string_from_elf_section (bfd1,
8316 hdr1->sh_link,
8317 isym->st_name);
8318 symp++;
8319 }
8320
8321 symp = symtable2;
8322 for (isym = isymstart2, isymend = isym + count1;
8323 isym < isymend; isym++)
8324 {
8325 symp->sym = isym;
8326 symp->name = bfd_elf_string_from_elf_section (bfd2,
8327 hdr2->sh_link,
8328 isym->st_name);
8329 symp++;
8330 }
8331
8332 /* Sort symbol by name. */
8333 qsort (symtable1, count1, sizeof (struct elf_symbol),
8334 elf_sym_name_compare);
8335 qsort (symtable2, count1, sizeof (struct elf_symbol),
8336 elf_sym_name_compare);
8337
8338 for (i = 0; i < count1; i++)
8339 /* Two symbols must have the same binding, type and name. */
8340 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8341 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8342 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8343 goto done;
8344
8345 result = TRUE;
8346
8347done:
8348 if (symtable1)
8349 free (symtable1);
8350 if (symtable2)
8351 free (symtable2);
8352 if (isymbuf1)
8353 free (isymbuf1);
8354 if (isymbuf2)
8355 free (isymbuf2);
8356
8357 return result;
8358}