* elf64-ppc.c (ppc64_elf_edit_toc): Account for dynamic relocs
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
8615f3f2 4 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
5e8d7549 20 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
252b5132 21
661a3fd4 22/* SECTION
47d9a591 23
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
209/* Read a specified number of bytes at a specified offset in an ELF
210 file, into a newly allocated buffer, and return a pointer to the
c044fabd 211 buffer. */
252b5132 212
f075ee0c 213static bfd_byte *
217aa764 214elf_read (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 215{
f075ee0c 216 bfd_byte *buf;
252b5132
RH
217
218 if ((buf = bfd_alloc (abfd, size)) == NULL)
219 return NULL;
dc810e39 220 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
252b5132 221 return NULL;
217aa764 222 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
223 {
224 if (bfd_get_error () != bfd_error_system_call)
225 bfd_set_error (bfd_error_file_truncated);
226 return NULL;
227 }
228 return buf;
229}
230
b34976b6 231bfd_boolean
217aa764 232bfd_elf_mkobject (bfd *abfd)
252b5132 233{
c044fabd
KH
234 /* This just does initialization. */
235 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 236 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 237 if (elf_tdata (abfd) == 0)
b34976b6 238 return FALSE;
c044fabd
KH
239 /* Since everything is done at close time, do we need any
240 initialization? */
252b5132 241
b34976b6 242 return TRUE;
252b5132
RH
243}
244
b34976b6 245bfd_boolean
217aa764 246bfd_elf_mkcorefile (bfd *abfd)
252b5132 247{
c044fabd 248 /* I think this can be done just like an object file. */
252b5132
RH
249 return bfd_elf_mkobject (abfd);
250}
251
252char *
217aa764 253bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
254{
255 Elf_Internal_Shdr **i_shdrp;
f075ee0c 256 bfd_byte *shstrtab = NULL;
dc810e39
AM
257 file_ptr offset;
258 bfd_size_type shstrtabsize;
252b5132
RH
259
260 i_shdrp = elf_elfsections (abfd);
261 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 262 return NULL;
252b5132 263
f075ee0c 264 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
265 if (shstrtab == NULL)
266 {
c044fabd 267 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
268 offset = i_shdrp[shindex]->sh_offset;
269 shstrtabsize = i_shdrp[shindex]->sh_size;
270 shstrtab = elf_read (abfd, offset, shstrtabsize);
217aa764 271 i_shdrp[shindex]->contents = shstrtab;
252b5132 272 }
f075ee0c 273 return (char *) shstrtab;
252b5132
RH
274}
275
276char *
217aa764
AM
277bfd_elf_string_from_elf_section (bfd *abfd,
278 unsigned int shindex,
279 unsigned int strindex)
252b5132
RH
280{
281 Elf_Internal_Shdr *hdr;
282
283 if (strindex == 0)
284 return "";
285
286 hdr = elf_elfsections (abfd)[shindex];
287
288 if (hdr->contents == NULL
289 && bfd_elf_get_str_section (abfd, shindex) == NULL)
290 return NULL;
291
292 if (strindex >= hdr->sh_size)
293 {
1b3a8575 294 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 295 (*_bfd_error_handler)
d003868e
AM
296 (_("%B: invalid string offset %u >= %lu for section `%s'"),
297 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 298 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 299 ? ".shstrtab"
1b3a8575 300 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
301 return "";
302 }
303
304 return ((char *) hdr->contents) + strindex;
305}
306
6cdc0ccc
AM
307/* Read and convert symbols to internal format.
308 SYMCOUNT specifies the number of symbols to read, starting from
309 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
310 are non-NULL, they are used to store the internal symbols, external
311 symbols, and symbol section index extensions, respectively. */
312
313Elf_Internal_Sym *
217aa764
AM
314bfd_elf_get_elf_syms (bfd *ibfd,
315 Elf_Internal_Shdr *symtab_hdr,
316 size_t symcount,
317 size_t symoffset,
318 Elf_Internal_Sym *intsym_buf,
319 void *extsym_buf,
320 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
321{
322 Elf_Internal_Shdr *shndx_hdr;
217aa764 323 void *alloc_ext;
df622259 324 const bfd_byte *esym;
6cdc0ccc
AM
325 Elf_External_Sym_Shndx *alloc_extshndx;
326 Elf_External_Sym_Shndx *shndx;
327 Elf_Internal_Sym *isym;
328 Elf_Internal_Sym *isymend;
9c5bfbb7 329 const struct elf_backend_data *bed;
6cdc0ccc
AM
330 size_t extsym_size;
331 bfd_size_type amt;
332 file_ptr pos;
333
334 if (symcount == 0)
335 return intsym_buf;
336
337 /* Normal syms might have section extension entries. */
338 shndx_hdr = NULL;
339 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
340 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
341
342 /* Read the symbols. */
343 alloc_ext = NULL;
344 alloc_extshndx = NULL;
345 bed = get_elf_backend_data (ibfd);
346 extsym_size = bed->s->sizeof_sym;
347 amt = symcount * extsym_size;
348 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
349 if (extsym_buf == NULL)
350 {
351 alloc_ext = bfd_malloc (amt);
352 extsym_buf = alloc_ext;
353 }
354 if (extsym_buf == NULL
355 || bfd_seek (ibfd, pos, SEEK_SET) != 0
356 || bfd_bread (extsym_buf, amt, ibfd) != amt)
357 {
358 intsym_buf = NULL;
359 goto out;
360 }
361
362 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
363 extshndx_buf = NULL;
364 else
365 {
366 amt = symcount * sizeof (Elf_External_Sym_Shndx);
367 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
368 if (extshndx_buf == NULL)
369 {
217aa764 370 alloc_extshndx = bfd_malloc (amt);
6cdc0ccc
AM
371 extshndx_buf = alloc_extshndx;
372 }
373 if (extshndx_buf == NULL
374 || bfd_seek (ibfd, pos, SEEK_SET) != 0
375 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
376 {
377 intsym_buf = NULL;
378 goto out;
379 }
380 }
381
382 if (intsym_buf == NULL)
383 {
384 bfd_size_type amt = symcount * sizeof (Elf_Internal_Sym);
217aa764 385 intsym_buf = bfd_malloc (amt);
6cdc0ccc
AM
386 if (intsym_buf == NULL)
387 goto out;
388 }
389
390 /* Convert the symbols to internal form. */
391 isymend = intsym_buf + symcount;
392 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
393 isym < isymend;
394 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 395 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
396
397 out:
398 if (alloc_ext != NULL)
399 free (alloc_ext);
400 if (alloc_extshndx != NULL)
401 free (alloc_extshndx);
402
403 return intsym_buf;
404}
405
5cab59f6
AM
406/* Look up a symbol name. */
407const char *
be8dd2ca
AM
408bfd_elf_sym_name (bfd *abfd,
409 Elf_Internal_Shdr *symtab_hdr,
410 Elf_Internal_Sym *isym)
5cab59f6
AM
411{
412 unsigned int iname = isym->st_name;
be8dd2ca 413 unsigned int shindex = symtab_hdr->sh_link;
138f35cc
JJ
414 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
415 /* Check for a bogus st_shndx to avoid crashing. */
416 && isym->st_shndx < elf_numsections (abfd)
417 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
418 {
419 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
420 shindex = elf_elfheader (abfd)->e_shstrndx;
421 }
422
423 return bfd_elf_string_from_elf_section (abfd, shindex, iname);
424}
425
dbb410c3
AM
426/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
427 sections. The first element is the flags, the rest are section
428 pointers. */
429
430typedef union elf_internal_group {
431 Elf_Internal_Shdr *shdr;
432 unsigned int flags;
433} Elf_Internal_Group;
434
b885599b
AM
435/* Return the name of the group signature symbol. Why isn't the
436 signature just a string? */
437
438static const char *
217aa764 439group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 440{
9dce4196 441 Elf_Internal_Shdr *hdr;
9dce4196
AM
442 unsigned char esym[sizeof (Elf64_External_Sym)];
443 Elf_External_Sym_Shndx eshndx;
444 Elf_Internal_Sym isym;
b885599b
AM
445
446 /* First we need to ensure the symbol table is available. */
447 if (! bfd_section_from_shdr (abfd, ghdr->sh_link))
448 return NULL;
449
9dce4196
AM
450 /* Go read the symbol. */
451 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
452 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
453 &isym, esym, &eshndx) == NULL)
b885599b 454 return NULL;
9dce4196 455
be8dd2ca 456 return bfd_elf_sym_name (abfd, hdr, &isym);
b885599b
AM
457}
458
dbb410c3
AM
459/* Set next_in_group list pointer, and group name for NEWSECT. */
460
b34976b6 461static bfd_boolean
217aa764 462setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
463{
464 unsigned int num_group = elf_tdata (abfd)->num_group;
465
466 /* If num_group is zero, read in all SHT_GROUP sections. The count
467 is set to -1 if there are no SHT_GROUP sections. */
468 if (num_group == 0)
469 {
470 unsigned int i, shnum;
471
472 /* First count the number of groups. If we have a SHT_GROUP
473 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 474 shnum = elf_numsections (abfd);
dbb410c3
AM
475 num_group = 0;
476 for (i = 0; i < shnum; i++)
477 {
478 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
479 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
480 num_group += 1;
481 }
482
483 if (num_group == 0)
973ffd63 484 num_group = (unsigned) -1;
dbb410c3
AM
485 elf_tdata (abfd)->num_group = num_group;
486
487 if (num_group > 0)
488 {
489 /* We keep a list of elf section headers for group sections,
490 so we can find them quickly. */
491 bfd_size_type amt = num_group * sizeof (Elf_Internal_Shdr *);
492 elf_tdata (abfd)->group_sect_ptr = bfd_alloc (abfd, amt);
493 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 494 return FALSE;
dbb410c3
AM
495
496 num_group = 0;
497 for (i = 0; i < shnum; i++)
498 {
499 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
500 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
501 {
973ffd63 502 unsigned char *src;
dbb410c3
AM
503 Elf_Internal_Group *dest;
504
505 /* Add to list of sections. */
506 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
507 num_group += 1;
508
509 /* Read the raw contents. */
510 BFD_ASSERT (sizeof (*dest) >= 4);
511 amt = shdr->sh_size * sizeof (*dest) / 4;
512 shdr->contents = bfd_alloc (abfd, amt);
513 if (shdr->contents == NULL
514 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
515 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
516 != shdr->sh_size))
b34976b6 517 return FALSE;
dbb410c3
AM
518
519 /* Translate raw contents, a flag word followed by an
520 array of elf section indices all in target byte order,
521 to the flag word followed by an array of elf section
522 pointers. */
523 src = shdr->contents + shdr->sh_size;
524 dest = (Elf_Internal_Group *) (shdr->contents + amt);
525 while (1)
526 {
527 unsigned int idx;
528
529 src -= 4;
530 --dest;
531 idx = H_GET_32 (abfd, src);
532 if (src == shdr->contents)
533 {
534 dest->flags = idx;
b885599b
AM
535 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
536 shdr->bfd_section->flags
537 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
538 break;
539 }
540 if (idx >= shnum)
541 {
542 ((*_bfd_error_handler)
d003868e 543 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
544 idx = 0;
545 }
546 dest->shdr = elf_elfsections (abfd)[idx];
547 }
548 }
549 }
550 }
551 }
552
553 if (num_group != (unsigned) -1)
554 {
555 unsigned int i;
556
557 for (i = 0; i < num_group; i++)
558 {
559 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
560 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
561 unsigned int n_elt = shdr->sh_size / 4;
562
563 /* Look through this group's sections to see if current
564 section is a member. */
565 while (--n_elt != 0)
566 if ((++idx)->shdr == hdr)
567 {
e0e8c97f 568 asection *s = NULL;
dbb410c3
AM
569
570 /* We are a member of this group. Go looking through
571 other members to see if any others are linked via
572 next_in_group. */
573 idx = (Elf_Internal_Group *) shdr->contents;
574 n_elt = shdr->sh_size / 4;
575 while (--n_elt != 0)
576 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 577 && elf_next_in_group (s) != NULL)
dbb410c3
AM
578 break;
579 if (n_elt != 0)
580 {
dbb410c3
AM
581 /* Snarf the group name from other member, and
582 insert current section in circular list. */
945906ff
AM
583 elf_group_name (newsect) = elf_group_name (s);
584 elf_next_in_group (newsect) = elf_next_in_group (s);
585 elf_next_in_group (s) = newsect;
dbb410c3
AM
586 }
587 else
588 {
dbb410c3
AM
589 const char *gname;
590
b885599b
AM
591 gname = group_signature (abfd, shdr);
592 if (gname == NULL)
b34976b6 593 return FALSE;
945906ff 594 elf_group_name (newsect) = gname;
dbb410c3
AM
595
596 /* Start a circular list with one element. */
945906ff 597 elf_next_in_group (newsect) = newsect;
dbb410c3 598 }
b885599b 599
9dce4196
AM
600 /* If the group section has been created, point to the
601 new member. */
dbb410c3 602 if (shdr->bfd_section != NULL)
945906ff 603 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 604
dbb410c3
AM
605 i = num_group - 1;
606 break;
607 }
608 }
609 }
610
945906ff 611 if (elf_group_name (newsect) == NULL)
dbb410c3 612 {
d003868e
AM
613 (*_bfd_error_handler) (_("%B: no group info for section %A"),
614 abfd, newsect);
dbb410c3 615 }
b34976b6 616 return TRUE;
dbb410c3
AM
617}
618
3d7f7666
L
619bfd_boolean
620_bfd_elf_setup_group_pointers (bfd *abfd)
621{
622 unsigned int i;
623 unsigned int num_group = elf_tdata (abfd)->num_group;
624 bfd_boolean result = TRUE;
625
626 if (num_group == (unsigned) -1)
627 return result;
628
629 for (i = 0; i < num_group; i++)
630 {
631 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
632 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
633 unsigned int n_elt = shdr->sh_size / 4;
634
635 while (--n_elt != 0)
636 if ((++idx)->shdr->bfd_section)
637 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
638 else if (idx->shdr->sh_type == SHT_RELA
639 || idx->shdr->sh_type == SHT_REL)
640 /* We won't include relocation sections in section groups in
641 output object files. We adjust the group section size here
642 so that relocatable link will work correctly when
643 relocation sections are in section group in input object
644 files. */
645 shdr->bfd_section->size -= 4;
646 else
647 {
648 /* There are some unknown sections in the group. */
649 (*_bfd_error_handler)
d003868e
AM
650 (_("%B: unknown [%d] section `%s' in group [%s]"),
651 abfd,
3d7f7666 652 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
653 bfd_elf_string_from_elf_section (abfd,
654 (elf_elfheader (abfd)
655 ->e_shstrndx),
656 idx->shdr->sh_name),
3d7f7666
L
657 shdr->bfd_section->name);
658 result = FALSE;
659 }
660 }
661 return result;
662}
663
72adc230
AM
664bfd_boolean
665bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
666{
667 return elf_next_in_group (sec) != NULL;
668}
669
252b5132
RH
670/* Make a BFD section from an ELF section. We store a pointer to the
671 BFD section in the bfd_section field of the header. */
672
b34976b6 673bfd_boolean
217aa764
AM
674_bfd_elf_make_section_from_shdr (bfd *abfd,
675 Elf_Internal_Shdr *hdr,
6dc132d9
L
676 const char *name,
677 int shindex)
252b5132
RH
678{
679 asection *newsect;
680 flagword flags;
9c5bfbb7 681 const struct elf_backend_data *bed;
252b5132
RH
682
683 if (hdr->bfd_section != NULL)
684 {
685 BFD_ASSERT (strcmp (name,
686 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 687 return TRUE;
252b5132
RH
688 }
689
690 newsect = bfd_make_section_anyway (abfd, name);
691 if (newsect == NULL)
b34976b6 692 return FALSE;
252b5132 693
1829f4b2
AM
694 hdr->bfd_section = newsect;
695 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 696 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 697
2f89ff8d
L
698 /* Always use the real type/flags. */
699 elf_section_type (newsect) = hdr->sh_type;
700 elf_section_flags (newsect) = hdr->sh_flags;
701
252b5132
RH
702 newsect->filepos = hdr->sh_offset;
703
704 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
705 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
706 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 707 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 708 return FALSE;
252b5132
RH
709
710 flags = SEC_NO_FLAGS;
711 if (hdr->sh_type != SHT_NOBITS)
712 flags |= SEC_HAS_CONTENTS;
dbb410c3 713 if (hdr->sh_type == SHT_GROUP)
b3096250 714 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
715 if ((hdr->sh_flags & SHF_ALLOC) != 0)
716 {
717 flags |= SEC_ALLOC;
718 if (hdr->sh_type != SHT_NOBITS)
719 flags |= SEC_LOAD;
720 }
721 if ((hdr->sh_flags & SHF_WRITE) == 0)
722 flags |= SEC_READONLY;
723 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
724 flags |= SEC_CODE;
725 else if ((flags & SEC_LOAD) != 0)
726 flags |= SEC_DATA;
f5fa8ca2
JJ
727 if ((hdr->sh_flags & SHF_MERGE) != 0)
728 {
729 flags |= SEC_MERGE;
730 newsect->entsize = hdr->sh_entsize;
731 if ((hdr->sh_flags & SHF_STRINGS) != 0)
732 flags |= SEC_STRINGS;
733 }
dbb410c3
AM
734 if (hdr->sh_flags & SHF_GROUP)
735 if (!setup_group (abfd, hdr, newsect))
b34976b6 736 return FALSE;
13ae64f3
JJ
737 if ((hdr->sh_flags & SHF_TLS) != 0)
738 flags |= SEC_THREAD_LOCAL;
252b5132
RH
739
740 /* The debugging sections appear to be recognized only by name, not
741 any sort of flag. */
7a6cc5fb 742 {
dbf48117 743 static const char *debug_sec_names [] =
7a6cc5fb
NC
744 {
745 ".debug",
746 ".gnu.linkonce.wi.",
747 ".line",
748 ".stab"
749 };
750 int i;
751
e0e8c97f 752 for (i = ARRAY_SIZE (debug_sec_names); i--;)
7a6cc5fb
NC
753 if (strncmp (name, debug_sec_names[i], strlen (debug_sec_names[i])) == 0)
754 break;
755
756 if (i >= 0)
757 flags |= SEC_DEBUGGING;
758 }
252b5132
RH
759
760 /* As a GNU extension, if the name begins with .gnu.linkonce, we
761 only link a single copy of the section. This is used to support
762 g++. g++ will emit each template expansion in its own section.
763 The symbols will be defined as weak, so that multiple definitions
764 are permitted. The GNU linker extension is to actually discard
765 all but one of the sections. */
b885599b
AM
766 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
767 && elf_next_in_group (newsect) == NULL)
252b5132
RH
768 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
769
fa152c49
JW
770 bed = get_elf_backend_data (abfd);
771 if (bed->elf_backend_section_flags)
772 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 773 return FALSE;
fa152c49 774
252b5132 775 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 776 return FALSE;
252b5132
RH
777
778 if ((flags & SEC_ALLOC) != 0)
779 {
780 Elf_Internal_Phdr *phdr;
781 unsigned int i;
782
783 /* Look through the phdrs to see if we need to adjust the lma.
784 If all the p_paddr fields are zero, we ignore them, since
785 some ELF linkers produce such output. */
786 phdr = elf_tdata (abfd)->phdr;
787 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
788 {
789 if (phdr->p_paddr != 0)
790 break;
791 }
792 if (i < elf_elfheader (abfd)->e_phnum)
793 {
794 phdr = elf_tdata (abfd)->phdr;
795 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
796 {
e0e8c97f
NC
797 /* This section is part of this segment if its file
798 offset plus size lies within the segment's memory
799 span and, if the section is loaded, the extent of the
47d9a591 800 loaded data lies within the extent of the segment.
bf36db18
NC
801
802 Note - we used to check the p_paddr field as well, and
803 refuse to set the LMA if it was 0. This is wrong
dba143ef 804 though, as a perfectly valid initialised segment can
bf36db18 805 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 806 place special significance on the address 0 and
bf36db18
NC
807 executables need to be able to have a segment which
808 covers this address. */
252b5132 809 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
810 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
811 && (hdr->sh_offset + hdr->sh_size
812 <= phdr->p_offset + phdr->p_memsz)
252b5132 813 && ((flags & SEC_LOAD) == 0
d7866f04
AM
814 || (hdr->sh_offset + hdr->sh_size
815 <= phdr->p_offset + phdr->p_filesz)))
252b5132 816 {
dba143ef 817 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
818 newsect->lma = (phdr->p_paddr
819 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
820 else
821 /* We used to use the same adjustment for SEC_LOAD
822 sections, but that doesn't work if the segment
823 is packed with code from multiple VMAs.
824 Instead we calculate the section LMA based on
825 the segment LMA. It is assumed that the
826 segment will contain sections with contiguous
827 LMAs, even if the VMAs are not. */
828 newsect->lma = (phdr->p_paddr
829 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
830
831 /* With contiguous segments, we can't tell from file
832 offsets whether a section with zero size should
833 be placed at the end of one segment or the
834 beginning of the next. Decide based on vaddr. */
835 if (hdr->sh_addr >= phdr->p_vaddr
836 && (hdr->sh_addr + hdr->sh_size
837 <= phdr->p_vaddr + phdr->p_memsz))
838 break;
252b5132
RH
839 }
840 }
841 }
842 }
843
b34976b6 844 return TRUE;
252b5132
RH
845}
846
847/*
848INTERNAL_FUNCTION
849 bfd_elf_find_section
850
851SYNOPSIS
852 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
853
854DESCRIPTION
855 Helper functions for GDB to locate the string tables.
856 Since BFD hides string tables from callers, GDB needs to use an
857 internal hook to find them. Sun's .stabstr, in particular,
858 isn't even pointed to by the .stab section, so ordinary
859 mechanisms wouldn't work to find it, even if we had some.
860*/
861
862struct elf_internal_shdr *
217aa764 863bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
864{
865 Elf_Internal_Shdr **i_shdrp;
866 char *shstrtab;
867 unsigned int max;
868 unsigned int i;
869
870 i_shdrp = elf_elfsections (abfd);
871 if (i_shdrp != NULL)
872 {
9ad5cbcf
AM
873 shstrtab = bfd_elf_get_str_section (abfd,
874 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
875 if (shstrtab != NULL)
876 {
9ad5cbcf 877 max = elf_numsections (abfd);
252b5132
RH
878 for (i = 1; i < max; i++)
879 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
880 return i_shdrp[i];
881 }
882 }
883 return 0;
884}
885
886const char *const bfd_elf_section_type_names[] = {
887 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
888 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
889 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
890};
891
1049f94e 892/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
893 output, and the reloc is against an external symbol, and nothing
894 has given us any additional addend, the resulting reloc will also
895 be against the same symbol. In such a case, we don't want to
896 change anything about the way the reloc is handled, since it will
897 all be done at final link time. Rather than put special case code
898 into bfd_perform_relocation, all the reloc types use this howto
899 function. It just short circuits the reloc if producing
1049f94e 900 relocatable output against an external symbol. */
252b5132 901
252b5132 902bfd_reloc_status_type
217aa764
AM
903bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
904 arelent *reloc_entry,
905 asymbol *symbol,
906 void *data ATTRIBUTE_UNUSED,
907 asection *input_section,
908 bfd *output_bfd,
909 char **error_message ATTRIBUTE_UNUSED)
910{
911 if (output_bfd != NULL
252b5132
RH
912 && (symbol->flags & BSF_SECTION_SYM) == 0
913 && (! reloc_entry->howto->partial_inplace
914 || reloc_entry->addend == 0))
915 {
916 reloc_entry->address += input_section->output_offset;
917 return bfd_reloc_ok;
918 }
919
920 return bfd_reloc_continue;
921}
922\f
d3c456e9
JJ
923/* Make sure sec_info_type is cleared if sec_info is cleared too. */
924
925static void
217aa764
AM
926merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
927 asection *sec)
d3c456e9 928{
68bfbfcc
AM
929 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
930 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
931}
932
8550eb6e
JJ
933/* Finish SHF_MERGE section merging. */
934
b34976b6 935bfd_boolean
217aa764 936_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 937{
57ceae94
AM
938 bfd *ibfd;
939 asection *sec;
940
0eddce27 941 if (!is_elf_hash_table (info->hash))
b34976b6 942 return FALSE;
57ceae94
AM
943
944 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
945 if ((ibfd->flags & DYNAMIC) == 0)
946 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
947 if ((sec->flags & SEC_MERGE) != 0
948 && !bfd_is_abs_section (sec->output_section))
949 {
950 struct bfd_elf_section_data *secdata;
951
952 secdata = elf_section_data (sec);
953 if (! _bfd_add_merge_section (abfd,
954 &elf_hash_table (info)->merge_info,
955 sec, &secdata->sec_info))
956 return FALSE;
957 else if (secdata->sec_info)
958 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
959 }
960
961 if (elf_hash_table (info)->merge_info != NULL)
962 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 963 merge_sections_remove_hook);
b34976b6 964 return TRUE;
8550eb6e 965}
2d653fc7
AM
966
967void
217aa764 968_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
969{
970 sec->output_section = bfd_abs_section_ptr;
971 sec->output_offset = sec->vma;
0eddce27 972 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
973 return;
974
68bfbfcc 975 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 976}
8550eb6e 977\f
0ac4564e
L
978/* Copy the program header and other data from one object module to
979 another. */
252b5132 980
b34976b6 981bfd_boolean
217aa764 982_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
983{
984 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
985 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 986 return TRUE;
2d502050
L
987
988 BFD_ASSERT (!elf_flags_init (obfd)
989 || (elf_elfheader (obfd)->e_flags
990 == elf_elfheader (ibfd)->e_flags));
991
0ac4564e 992 elf_gp (obfd) = elf_gp (ibfd);
2d502050 993 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
994 elf_flags_init (obfd) = TRUE;
995 return TRUE;
2d502050
L
996}
997
f0b79d91
L
998/* Print out the program headers. */
999
b34976b6 1000bfd_boolean
217aa764 1001_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1002{
217aa764 1003 FILE *f = farg;
252b5132
RH
1004 Elf_Internal_Phdr *p;
1005 asection *s;
1006 bfd_byte *dynbuf = NULL;
1007
1008 p = elf_tdata (abfd)->phdr;
1009 if (p != NULL)
1010 {
1011 unsigned int i, c;
1012
1013 fprintf (f, _("\nProgram Header:\n"));
1014 c = elf_elfheader (abfd)->e_phnum;
1015 for (i = 0; i < c; i++, p++)
1016 {
dc810e39 1017 const char *pt;
252b5132
RH
1018 char buf[20];
1019
1020 switch (p->p_type)
1021 {
dc810e39
AM
1022 case PT_NULL: pt = "NULL"; break;
1023 case PT_LOAD: pt = "LOAD"; break;
1024 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1025 case PT_INTERP: pt = "INTERP"; break;
1026 case PT_NOTE: pt = "NOTE"; break;
1027 case PT_SHLIB: pt = "SHLIB"; break;
1028 case PT_PHDR: pt = "PHDR"; break;
13ae64f3 1029 case PT_TLS: pt = "TLS"; break;
65765700 1030 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
9ee5e499 1031 case PT_GNU_STACK: pt = "STACK"; break;
8c37241b 1032 case PT_GNU_RELRO: pt = "RELRO"; break;
dc810e39 1033 default: sprintf (buf, "0x%lx", p->p_type); pt = buf; break;
252b5132 1034 }
dc810e39 1035 fprintf (f, "%8s off 0x", pt);
60b89a18 1036 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1037 fprintf (f, " vaddr 0x");
60b89a18 1038 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1039 fprintf (f, " paddr 0x");
60b89a18 1040 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1041 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1042 fprintf (f, " filesz 0x");
60b89a18 1043 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1044 fprintf (f, " memsz 0x");
60b89a18 1045 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1046 fprintf (f, " flags %c%c%c",
1047 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1048 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1049 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1050 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1051 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1052 fprintf (f, "\n");
1053 }
1054 }
1055
1056 s = bfd_get_section_by_name (abfd, ".dynamic");
1057 if (s != NULL)
1058 {
1059 int elfsec;
dc810e39 1060 unsigned long shlink;
252b5132
RH
1061 bfd_byte *extdyn, *extdynend;
1062 size_t extdynsize;
217aa764 1063 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1064
1065 fprintf (f, _("\nDynamic Section:\n"));
1066
eea6121a 1067 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1068 goto error_return;
1069
1070 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1071 if (elfsec == -1)
1072 goto error_return;
dc810e39 1073 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1074
1075 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1076 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1077
1078 extdyn = dynbuf;
eea6121a 1079 extdynend = extdyn + s->size;
252b5132
RH
1080 for (; extdyn < extdynend; extdyn += extdynsize)
1081 {
1082 Elf_Internal_Dyn dyn;
1083 const char *name;
1084 char ab[20];
b34976b6 1085 bfd_boolean stringp;
252b5132 1086
217aa764 1087 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1088
1089 if (dyn.d_tag == DT_NULL)
1090 break;
1091
b34976b6 1092 stringp = FALSE;
252b5132
RH
1093 switch (dyn.d_tag)
1094 {
1095 default:
1096 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1097 name = ab;
1098 break;
1099
b34976b6 1100 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1101 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1102 case DT_PLTGOT: name = "PLTGOT"; break;
1103 case DT_HASH: name = "HASH"; break;
1104 case DT_STRTAB: name = "STRTAB"; break;
1105 case DT_SYMTAB: name = "SYMTAB"; break;
1106 case DT_RELA: name = "RELA"; break;
1107 case DT_RELASZ: name = "RELASZ"; break;
1108 case DT_RELAENT: name = "RELAENT"; break;
1109 case DT_STRSZ: name = "STRSZ"; break;
1110 case DT_SYMENT: name = "SYMENT"; break;
1111 case DT_INIT: name = "INIT"; break;
1112 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1113 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1114 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1115 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1116 case DT_REL: name = "REL"; break;
1117 case DT_RELSZ: name = "RELSZ"; break;
1118 case DT_RELENT: name = "RELENT"; break;
1119 case DT_PLTREL: name = "PLTREL"; break;
1120 case DT_DEBUG: name = "DEBUG"; break;
1121 case DT_TEXTREL: name = "TEXTREL"; break;
1122 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1123 case DT_BIND_NOW: name = "BIND_NOW"; break;
1124 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1125 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1126 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1127 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1128 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1129 case DT_FLAGS: name = "FLAGS"; break;
1130 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1131 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1132 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1133 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1134 case DT_MOVEENT: name = "MOVEENT"; break;
1135 case DT_MOVESZ: name = "MOVESZ"; break;
1136 case DT_FEATURE: name = "FEATURE"; break;
1137 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1138 case DT_SYMINSZ: name = "SYMINSZ"; break;
1139 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1140 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1141 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1142 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1143 case DT_PLTPAD: name = "PLTPAD"; break;
1144 case DT_MOVETAB: name = "MOVETAB"; break;
1145 case DT_SYMINFO: name = "SYMINFO"; break;
1146 case DT_RELACOUNT: name = "RELACOUNT"; break;
1147 case DT_RELCOUNT: name = "RELCOUNT"; break;
1148 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1149 case DT_VERSYM: name = "VERSYM"; break;
1150 case DT_VERDEF: name = "VERDEF"; break;
1151 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1152 case DT_VERNEED: name = "VERNEED"; break;
1153 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1154 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1155 case DT_USED: name = "USED"; break;
b34976b6 1156 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1157 }
1158
1159 fprintf (f, " %-11s ", name);
1160 if (! stringp)
1161 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1162 else
1163 {
1164 const char *string;
dc810e39 1165 unsigned int tagv = dyn.d_un.d_val;
252b5132 1166
dc810e39 1167 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1168 if (string == NULL)
1169 goto error_return;
1170 fprintf (f, "%s", string);
1171 }
1172 fprintf (f, "\n");
1173 }
1174
1175 free (dynbuf);
1176 dynbuf = NULL;
1177 }
1178
1179 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1180 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1181 {
fc0e6df6 1182 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1183 return FALSE;
252b5132
RH
1184 }
1185
1186 if (elf_dynverdef (abfd) != 0)
1187 {
1188 Elf_Internal_Verdef *t;
1189
1190 fprintf (f, _("\nVersion definitions:\n"));
1191 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1192 {
1193 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1194 t->vd_flags, t->vd_hash, t->vd_nodename);
1195 if (t->vd_auxptr->vda_nextptr != NULL)
1196 {
1197 Elf_Internal_Verdaux *a;
1198
1199 fprintf (f, "\t");
1200 for (a = t->vd_auxptr->vda_nextptr;
1201 a != NULL;
1202 a = a->vda_nextptr)
1203 fprintf (f, "%s ", a->vda_nodename);
1204 fprintf (f, "\n");
1205 }
1206 }
1207 }
1208
1209 if (elf_dynverref (abfd) != 0)
1210 {
1211 Elf_Internal_Verneed *t;
1212
1213 fprintf (f, _("\nVersion References:\n"));
1214 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1215 {
1216 Elf_Internal_Vernaux *a;
1217
1218 fprintf (f, _(" required from %s:\n"), t->vn_filename);
1219 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1220 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1221 a->vna_flags, a->vna_other, a->vna_nodename);
1222 }
1223 }
1224
b34976b6 1225 return TRUE;
252b5132
RH
1226
1227 error_return:
1228 if (dynbuf != NULL)
1229 free (dynbuf);
b34976b6 1230 return FALSE;
252b5132
RH
1231}
1232
1233/* Display ELF-specific fields of a symbol. */
1234
1235void
217aa764
AM
1236bfd_elf_print_symbol (bfd *abfd,
1237 void *filep,
1238 asymbol *symbol,
1239 bfd_print_symbol_type how)
252b5132 1240{
217aa764 1241 FILE *file = filep;
252b5132
RH
1242 switch (how)
1243 {
1244 case bfd_print_symbol_name:
1245 fprintf (file, "%s", symbol->name);
1246 break;
1247 case bfd_print_symbol_more:
1248 fprintf (file, "elf ");
60b89a18 1249 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1250 fprintf (file, " %lx", (long) symbol->flags);
1251 break;
1252 case bfd_print_symbol_all:
1253 {
4e8a9624
AM
1254 const char *section_name;
1255 const char *name = NULL;
9c5bfbb7 1256 const struct elf_backend_data *bed;
7a13edea 1257 unsigned char st_other;
dbb410c3 1258 bfd_vma val;
c044fabd 1259
252b5132 1260 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1261
1262 bed = get_elf_backend_data (abfd);
1263 if (bed->elf_backend_print_symbol_all)
c044fabd 1264 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1265
1266 if (name == NULL)
1267 {
7ee38065 1268 name = symbol->name;
217aa764 1269 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1270 }
1271
252b5132
RH
1272 fprintf (file, " %s\t", section_name);
1273 /* Print the "other" value for a symbol. For common symbols,
1274 we've already printed the size; now print the alignment.
1275 For other symbols, we have no specified alignment, and
1276 we've printed the address; now print the size. */
dbb410c3
AM
1277 if (bfd_is_com_section (symbol->section))
1278 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1279 else
1280 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1281 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1282
1283 /* If we have version information, print it. */
1284 if (elf_tdata (abfd)->dynversym_section != 0
1285 && (elf_tdata (abfd)->dynverdef_section != 0
1286 || elf_tdata (abfd)->dynverref_section != 0))
1287 {
1288 unsigned int vernum;
1289 const char *version_string;
1290
1291 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1292
1293 if (vernum == 0)
1294 version_string = "";
1295 else if (vernum == 1)
1296 version_string = "Base";
1297 else if (vernum <= elf_tdata (abfd)->cverdefs)
1298 version_string =
1299 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1300 else
1301 {
1302 Elf_Internal_Verneed *t;
1303
1304 version_string = "";
1305 for (t = elf_tdata (abfd)->verref;
1306 t != NULL;
1307 t = t->vn_nextref)
1308 {
1309 Elf_Internal_Vernaux *a;
1310
1311 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1312 {
1313 if (a->vna_other == vernum)
1314 {
1315 version_string = a->vna_nodename;
1316 break;
1317 }
1318 }
1319 }
1320 }
1321
1322 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1323 fprintf (file, " %-11s", version_string);
1324 else
1325 {
1326 int i;
1327
1328 fprintf (file, " (%s)", version_string);
1329 for (i = 10 - strlen (version_string); i > 0; --i)
1330 putc (' ', file);
1331 }
1332 }
1333
1334 /* If the st_other field is not zero, print it. */
7a13edea 1335 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1336
7a13edea
NC
1337 switch (st_other)
1338 {
1339 case 0: break;
1340 case STV_INTERNAL: fprintf (file, " .internal"); break;
1341 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1342 case STV_PROTECTED: fprintf (file, " .protected"); break;
1343 default:
1344 /* Some other non-defined flags are also present, so print
1345 everything hex. */
1346 fprintf (file, " 0x%02x", (unsigned int) st_other);
1347 }
252b5132 1348
587ff49e 1349 fprintf (file, " %s", name);
252b5132
RH
1350 }
1351 break;
1352 }
1353}
1354\f
1355/* Create an entry in an ELF linker hash table. */
1356
1357struct bfd_hash_entry *
217aa764
AM
1358_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1359 struct bfd_hash_table *table,
1360 const char *string)
252b5132 1361{
252b5132
RH
1362 /* Allocate the structure if it has not already been allocated by a
1363 subclass. */
51b64d56
AM
1364 if (entry == NULL)
1365 {
1366 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1367 if (entry == NULL)
1368 return entry;
1369 }
252b5132
RH
1370
1371 /* Call the allocation method of the superclass. */
51b64d56
AM
1372 entry = _bfd_link_hash_newfunc (entry, table, string);
1373 if (entry != NULL)
252b5132 1374 {
51b64d56
AM
1375 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1376 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1377
252b5132
RH
1378 /* Set local fields. */
1379 ret->indx = -1;
252b5132 1380 ret->dynindx = -1;
f6e332e6
AM
1381 ret->got = ret->plt = htab->init_refcount;
1382 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1383 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1384 /* Assume that we have been called by a non-ELF symbol reader.
1385 This flag is then reset by the code which reads an ELF input
1386 file. This ensures that a symbol created by a non-ELF symbol
1387 reader will have the flag set correctly. */
f5385ebf 1388 ret->non_elf = 1;
252b5132
RH
1389 }
1390
51b64d56 1391 return entry;
252b5132
RH
1392}
1393
2920b85c 1394/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1395 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1396
c61b8717 1397void
9c5bfbb7 1398_bfd_elf_link_hash_copy_indirect (const struct elf_backend_data *bed,
217aa764
AM
1399 struct elf_link_hash_entry *dir,
1400 struct elf_link_hash_entry *ind)
2920b85c 1401{
3c3e9281 1402 bfd_signed_vma tmp;
b48fa14c 1403 bfd_signed_vma lowest_valid = bed->can_refcount;
3c3e9281 1404
2920b85c
RH
1405 /* Copy down any references that we may have already seen to the
1406 symbol which just became indirect. */
1407
f5385ebf
AM
1408 dir->ref_dynamic |= ind->ref_dynamic;
1409 dir->ref_regular |= ind->ref_regular;
1410 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1411 dir->non_got_ref |= ind->non_got_ref;
1412 dir->needs_plt |= ind->needs_plt;
1413 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1414
1e370bd2 1415 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1416 return;
1417
51b64d56 1418 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1419 These may have been already set up by a check_relocs routine. */
3c3e9281 1420 tmp = dir->got.refcount;
b48fa14c 1421 if (tmp < lowest_valid)
2920b85c 1422 {
51b64d56 1423 dir->got.refcount = ind->got.refcount;
3c3e9281 1424 ind->got.refcount = tmp;
2920b85c 1425 }
3c3e9281 1426 else
b48fa14c 1427 BFD_ASSERT (ind->got.refcount < lowest_valid);
2920b85c 1428
3c3e9281 1429 tmp = dir->plt.refcount;
b48fa14c 1430 if (tmp < lowest_valid)
2920b85c 1431 {
51b64d56 1432 dir->plt.refcount = ind->plt.refcount;
3c3e9281 1433 ind->plt.refcount = tmp;
2920b85c 1434 }
3c3e9281 1435 else
b48fa14c 1436 BFD_ASSERT (ind->plt.refcount < lowest_valid);
2920b85c
RH
1437
1438 if (dir->dynindx == -1)
1439 {
1440 dir->dynindx = ind->dynindx;
1441 dir->dynstr_index = ind->dynstr_index;
1442 ind->dynindx = -1;
1443 ind->dynstr_index = 0;
1444 }
3c3e9281
AM
1445 else
1446 BFD_ASSERT (ind->dynindx == -1);
2920b85c
RH
1447}
1448
c61b8717 1449void
217aa764
AM
1450_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1451 struct elf_link_hash_entry *h,
1452 bfd_boolean force_local)
2920b85c 1453{
5cab59f6 1454 h->plt = elf_hash_table (info)->init_offset;
f5385ebf 1455 h->needs_plt = 0;
e5094212
AM
1456 if (force_local)
1457 {
f5385ebf 1458 h->forced_local = 1;
e5094212
AM
1459 if (h->dynindx != -1)
1460 {
1461 h->dynindx = -1;
1462 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1463 h->dynstr_index);
1464 }
1465 }
2920b85c
RH
1466}
1467
252b5132
RH
1468/* Initialize an ELF linker hash table. */
1469
b34976b6 1470bfd_boolean
217aa764
AM
1471_bfd_elf_link_hash_table_init
1472 (struct elf_link_hash_table *table,
1473 bfd *abfd,
1474 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1475 struct bfd_hash_table *,
1476 const char *))
252b5132 1477{
b34976b6 1478 bfd_boolean ret;
8ea2e4bd 1479
b34976b6 1480 table->dynamic_sections_created = FALSE;
252b5132 1481 table->dynobj = NULL;
963f13ec
AO
1482 /* Make sure can_refcount is extended to the width and signedness of
1483 init_refcount before we subtract one from it. */
5cab59f6
AM
1484 table->init_refcount.refcount = get_elf_backend_data (abfd)->can_refcount;
1485 table->init_refcount.refcount -= 1;
1486 table->init_offset.offset = -(bfd_vma) 1;
252b5132
RH
1487 /* The first dynamic symbol is a dummy. */
1488 table->dynsymcount = 1;
1489 table->dynstr = NULL;
1490 table->bucketcount = 0;
1491 table->needed = NULL;
1492 table->hgot = NULL;
f5fa8ca2 1493 table->merge_info = NULL;
3722b82f 1494 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1495 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1496 table->dynlocal = NULL;
73722af0 1497 table->runpath = NULL;
e1918d23
AM
1498 table->tls_sec = NULL;
1499 table->tls_size = 0;
73722af0 1500 table->loaded = NULL;
67687978 1501 table->is_relocatable_executable = FALSE;
73722af0
AM
1502
1503 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc);
8ea2e4bd
NC
1504 table->root.type = bfd_link_elf_hash_table;
1505
1506 return ret;
252b5132
RH
1507}
1508
1509/* Create an ELF linker hash table. */
1510
1511struct bfd_link_hash_table *
217aa764 1512_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1513{
1514 struct elf_link_hash_table *ret;
dc810e39 1515 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1516
217aa764
AM
1517 ret = bfd_malloc (amt);
1518 if (ret == NULL)
252b5132
RH
1519 return NULL;
1520
1521 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc))
1522 {
e2d34d7d 1523 free (ret);
252b5132
RH
1524 return NULL;
1525 }
1526
1527 return &ret->root;
1528}
1529
1530/* This is a hook for the ELF emulation code in the generic linker to
1531 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1532 entry for a dynamic object. */
252b5132
RH
1533
1534void
217aa764 1535bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1536{
1537 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1538 && bfd_get_format (abfd) == bfd_object)
1539 elf_dt_name (abfd) = name;
1540}
1541
e56f61be
L
1542int
1543bfd_elf_get_dyn_lib_class (bfd *abfd)
1544{
1545 int lib_class;
1546 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1547 && bfd_get_format (abfd) == bfd_object)
1548 lib_class = elf_dyn_lib_class (abfd);
1549 else
1550 lib_class = 0;
1551 return lib_class;
1552}
1553
74816898 1554void
4a43e768 1555bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1556{
1557 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1558 && bfd_get_format (abfd) == bfd_object)
4a43e768 1559 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1560}
1561
252b5132
RH
1562/* Get the list of DT_NEEDED entries for a link. This is a hook for
1563 the linker ELF emulation code. */
1564
1565struct bfd_link_needed_list *
217aa764
AM
1566bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1567 struct bfd_link_info *info)
252b5132 1568{
0eddce27 1569 if (! is_elf_hash_table (info->hash))
252b5132
RH
1570 return NULL;
1571 return elf_hash_table (info)->needed;
1572}
1573
a963dc6a
L
1574/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1575 hook for the linker ELF emulation code. */
1576
1577struct bfd_link_needed_list *
217aa764
AM
1578bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1579 struct bfd_link_info *info)
a963dc6a 1580{
0eddce27 1581 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1582 return NULL;
1583 return elf_hash_table (info)->runpath;
1584}
1585
252b5132
RH
1586/* Get the name actually used for a dynamic object for a link. This
1587 is the SONAME entry if there is one. Otherwise, it is the string
1588 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1589
1590const char *
217aa764 1591bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1592{
1593 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1594 && bfd_get_format (abfd) == bfd_object)
1595 return elf_dt_name (abfd);
1596 return NULL;
1597}
1598
1599/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1600 the ELF linker emulation code. */
1601
b34976b6 1602bfd_boolean
217aa764
AM
1603bfd_elf_get_bfd_needed_list (bfd *abfd,
1604 struct bfd_link_needed_list **pneeded)
252b5132
RH
1605{
1606 asection *s;
1607 bfd_byte *dynbuf = NULL;
1608 int elfsec;
dc810e39 1609 unsigned long shlink;
252b5132
RH
1610 bfd_byte *extdyn, *extdynend;
1611 size_t extdynsize;
217aa764 1612 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1613
1614 *pneeded = NULL;
1615
1616 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1617 || bfd_get_format (abfd) != bfd_object)
b34976b6 1618 return TRUE;
252b5132
RH
1619
1620 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1621 if (s == NULL || s->size == 0)
b34976b6 1622 return TRUE;
252b5132 1623
eea6121a 1624 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1625 goto error_return;
1626
1627 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1628 if (elfsec == -1)
1629 goto error_return;
1630
dc810e39 1631 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1632
1633 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1634 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1635
1636 extdyn = dynbuf;
eea6121a 1637 extdynend = extdyn + s->size;
252b5132
RH
1638 for (; extdyn < extdynend; extdyn += extdynsize)
1639 {
1640 Elf_Internal_Dyn dyn;
1641
217aa764 1642 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1643
1644 if (dyn.d_tag == DT_NULL)
1645 break;
1646
1647 if (dyn.d_tag == DT_NEEDED)
1648 {
1649 const char *string;
1650 struct bfd_link_needed_list *l;
dc810e39
AM
1651 unsigned int tagv = dyn.d_un.d_val;
1652 bfd_size_type amt;
252b5132 1653
dc810e39 1654 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1655 if (string == NULL)
1656 goto error_return;
1657
dc810e39 1658 amt = sizeof *l;
217aa764 1659 l = bfd_alloc (abfd, amt);
252b5132
RH
1660 if (l == NULL)
1661 goto error_return;
1662
1663 l->by = abfd;
1664 l->name = string;
1665 l->next = *pneeded;
1666 *pneeded = l;
1667 }
1668 }
1669
1670 free (dynbuf);
1671
b34976b6 1672 return TRUE;
252b5132
RH
1673
1674 error_return:
1675 if (dynbuf != NULL)
1676 free (dynbuf);
b34976b6 1677 return FALSE;
252b5132
RH
1678}
1679\f
1680/* Allocate an ELF string table--force the first byte to be zero. */
1681
1682struct bfd_strtab_hash *
217aa764 1683_bfd_elf_stringtab_init (void)
252b5132
RH
1684{
1685 struct bfd_strtab_hash *ret;
1686
1687 ret = _bfd_stringtab_init ();
1688 if (ret != NULL)
1689 {
1690 bfd_size_type loc;
1691
b34976b6 1692 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1693 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1694 if (loc == (bfd_size_type) -1)
1695 {
1696 _bfd_stringtab_free (ret);
1697 ret = NULL;
1698 }
1699 }
1700 return ret;
1701}
1702\f
1703/* ELF .o/exec file reading */
1704
c044fabd 1705/* Create a new bfd section from an ELF section header. */
252b5132 1706
b34976b6 1707bfd_boolean
217aa764 1708bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1709{
1710 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1711 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1712 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1713 const char *name;
252b5132 1714
1b3a8575
AM
1715 name = bfd_elf_string_from_elf_section (abfd,
1716 elf_elfheader (abfd)->e_shstrndx,
1717 hdr->sh_name);
252b5132
RH
1718
1719 switch (hdr->sh_type)
1720 {
1721 case SHT_NULL:
1722 /* Inactive section. Throw it away. */
b34976b6 1723 return TRUE;
252b5132
RH
1724
1725 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1726 case SHT_NOBITS: /* .bss section. */
1727 case SHT_HASH: /* .hash section. */
1728 case SHT_NOTE: /* .note section. */
25e27870
L
1729 case SHT_INIT_ARRAY: /* .init_array section. */
1730 case SHT_FINI_ARRAY: /* .fini_array section. */
1731 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1732 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1733 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1734
797fc050 1735 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1736 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1737 return FALSE;
797fc050
AM
1738 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1739 {
1740 Elf_Internal_Shdr *dynsymhdr;
1741
1742 /* The shared libraries distributed with hpux11 have a bogus
1743 sh_link field for the ".dynamic" section. Find the
1744 string table for the ".dynsym" section instead. */
1745 if (elf_dynsymtab (abfd) != 0)
1746 {
1747 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1748 hdr->sh_link = dynsymhdr->sh_link;
1749 }
1750 else
1751 {
1752 unsigned int i, num_sec;
1753
1754 num_sec = elf_numsections (abfd);
1755 for (i = 1; i < num_sec; i++)
1756 {
1757 dynsymhdr = elf_elfsections (abfd)[i];
1758 if (dynsymhdr->sh_type == SHT_DYNSYM)
1759 {
1760 hdr->sh_link = dynsymhdr->sh_link;
1761 break;
1762 }
1763 }
1764 }
1765 }
1766 break;
1767
252b5132
RH
1768 case SHT_SYMTAB: /* A symbol table */
1769 if (elf_onesymtab (abfd) == shindex)
b34976b6 1770 return TRUE;
252b5132
RH
1771
1772 BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym);
1773 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1774 elf_onesymtab (abfd) = shindex;
1775 elf_tdata (abfd)->symtab_hdr = *hdr;
1776 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1777 abfd->flags |= HAS_SYMS;
1778
1779 /* Sometimes a shared object will map in the symbol table. If
1780 SHF_ALLOC is set, and this is a shared object, then we also
1781 treat this section as a BFD section. We can not base the
1782 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1783 set in a relocatable object file, which would confuse the
252b5132
RH
1784 linker. */
1785 if ((hdr->sh_flags & SHF_ALLOC) != 0
1786 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1787 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1788 shindex))
b34976b6 1789 return FALSE;
252b5132 1790
1b3a8575
AM
1791 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1792 can't read symbols without that section loaded as well. It
1793 is most likely specified by the next section header. */
1794 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1795 {
1796 unsigned int i, num_sec;
1797
1798 num_sec = elf_numsections (abfd);
1799 for (i = shindex + 1; i < num_sec; i++)
1800 {
1801 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1802 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1803 && hdr2->sh_link == shindex)
1804 break;
1805 }
1806 if (i == num_sec)
1807 for (i = 1; i < shindex; i++)
1808 {
1809 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1810 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1811 && hdr2->sh_link == shindex)
1812 break;
1813 }
1814 if (i != shindex)
1815 return bfd_section_from_shdr (abfd, i);
1816 }
b34976b6 1817 return TRUE;
252b5132
RH
1818
1819 case SHT_DYNSYM: /* A dynamic symbol table */
1820 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1821 return TRUE;
252b5132
RH
1822
1823 BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym);
1824 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1825 elf_dynsymtab (abfd) = shindex;
1826 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1827 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1828 abfd->flags |= HAS_SYMS;
1829
1830 /* Besides being a symbol table, we also treat this as a regular
1831 section, so that objcopy can handle it. */
6dc132d9 1832 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1833
9ad5cbcf
AM
1834 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1835 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1836 return TRUE;
9ad5cbcf 1837
1b3a8575 1838 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1839 elf_symtab_shndx (abfd) = shindex;
1840 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1841 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1842 return TRUE;
9ad5cbcf 1843
252b5132
RH
1844 case SHT_STRTAB: /* A string table */
1845 if (hdr->bfd_section != NULL)
b34976b6 1846 return TRUE;
252b5132
RH
1847 if (ehdr->e_shstrndx == shindex)
1848 {
1849 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1850 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1851 return TRUE;
252b5132 1852 }
1b3a8575
AM
1853 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1854 {
1855 symtab_strtab:
1856 elf_tdata (abfd)->strtab_hdr = *hdr;
1857 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1858 return TRUE;
1859 }
1860 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1861 {
1862 dynsymtab_strtab:
1863 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1864 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1865 elf_elfsections (abfd)[shindex] = hdr;
1866 /* We also treat this as a regular section, so that objcopy
1867 can handle it. */
6dc132d9
L
1868 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1869 shindex);
1b3a8575 1870 }
252b5132 1871
1b3a8575
AM
1872 /* If the string table isn't one of the above, then treat it as a
1873 regular section. We need to scan all the headers to be sure,
1874 just in case this strtab section appeared before the above. */
1875 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1876 {
1877 unsigned int i, num_sec;
252b5132 1878
1b3a8575
AM
1879 num_sec = elf_numsections (abfd);
1880 for (i = 1; i < num_sec; i++)
1881 {
1882 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1883 if (hdr2->sh_link == shindex)
1884 {
1885 if (! bfd_section_from_shdr (abfd, i))
1886 return FALSE;
1887 if (elf_onesymtab (abfd) == i)
1888 goto symtab_strtab;
1889 if (elf_dynsymtab (abfd) == i)
1890 goto dynsymtab_strtab;
1891 }
1892 }
1893 }
6dc132d9 1894 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1895
1896 case SHT_REL:
1897 case SHT_RELA:
1898 /* *These* do a lot of work -- but build no sections! */
1899 {
1900 asection *target_sect;
1901 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1902 unsigned int num_sec = elf_numsections (abfd);
252b5132 1903
03ae5f59 1904 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1905 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1906 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1907 {
1908 ((*_bfd_error_handler)
d003868e
AM
1909 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1910 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1911 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1912 shindex);
03ae5f59
ILT
1913 }
1914
252b5132
RH
1915 /* For some incomprehensible reason Oracle distributes
1916 libraries for Solaris in which some of the objects have
1917 bogus sh_link fields. It would be nice if we could just
1918 reject them, but, unfortunately, some people need to use
1919 them. We scan through the section headers; if we find only
1920 one suitable symbol table, we clobber the sh_link to point
1921 to it. I hope this doesn't break anything. */
1922 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1923 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1924 {
9ad5cbcf 1925 unsigned int scan;
252b5132
RH
1926 int found;
1927
1928 found = 0;
9ad5cbcf 1929 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1930 {
1931 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1932 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1933 {
1934 if (found != 0)
1935 {
1936 found = 0;
1937 break;
1938 }
1939 found = scan;
1940 }
1941 }
1942 if (found != 0)
1943 hdr->sh_link = found;
1944 }
1945
1946 /* Get the symbol table. */
1b3a8575
AM
1947 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1948 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1949 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1950 return FALSE;
252b5132
RH
1951
1952 /* If this reloc section does not use the main symbol table we
1953 don't treat it as a reloc section. BFD can't adequately
1954 represent such a section, so at least for now, we don't
c044fabd 1955 try. We just present it as a normal section. We also
60bcf0fa 1956 can't use it as a reloc section if it points to the null
c044fabd 1957 section. */
60bcf0fa 1958 if (hdr->sh_link != elf_onesymtab (abfd) || hdr->sh_info == SHN_UNDEF)
6dc132d9
L
1959 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1960 shindex);
252b5132
RH
1961
1962 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1963 return FALSE;
252b5132
RH
1964 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1965 if (target_sect == NULL)
b34976b6 1966 return FALSE;
252b5132
RH
1967
1968 if ((target_sect->flags & SEC_RELOC) == 0
1969 || target_sect->reloc_count == 0)
1970 hdr2 = &elf_section_data (target_sect)->rel_hdr;
1971 else
1972 {
dc810e39 1973 bfd_size_type amt;
252b5132 1974 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 1975 amt = sizeof (*hdr2);
217aa764 1976 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
1977 elf_section_data (target_sect)->rel_hdr2 = hdr2;
1978 }
1979 *hdr2 = *hdr;
1980 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1981 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1982 target_sect->flags |= SEC_RELOC;
1983 target_sect->relocation = NULL;
1984 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1985 /* In the section to which the relocations apply, mark whether
1986 its relocations are of the REL or RELA variety. */
72730e0c 1987 if (hdr->sh_size != 0)
68bfbfcc 1988 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 1989 abfd->flags |= HAS_RELOC;
b34976b6 1990 return TRUE;
252b5132
RH
1991 }
1992 break;
1993
1994 case SHT_GNU_verdef:
1995 elf_dynverdef (abfd) = shindex;
1996 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1997 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1998 break;
1999
2000 case SHT_GNU_versym:
2001 elf_dynversym (abfd) = shindex;
2002 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2003 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2004 break;
2005
2006 case SHT_GNU_verneed:
2007 elf_dynverref (abfd) = shindex;
2008 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2009 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2010 break;
2011
2012 case SHT_SHLIB:
b34976b6 2013 return TRUE;
252b5132 2014
dbb410c3 2015 case SHT_GROUP:
b885599b
AM
2016 /* We need a BFD section for objcopy and relocatable linking,
2017 and it's handy to have the signature available as the section
2018 name. */
2019 name = group_signature (abfd, hdr);
2020 if (name == NULL)
b34976b6 2021 return FALSE;
6dc132d9 2022 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2023 return FALSE;
dbb410c3
AM
2024 if (hdr->contents != NULL)
2025 {
2026 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2027 unsigned int n_elt = hdr->sh_size / 4;
2028 asection *s;
2029
b885599b
AM
2030 if (idx->flags & GRP_COMDAT)
2031 hdr->bfd_section->flags
2032 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2033
45c5e9ed
L
2034 /* We try to keep the same section order as it comes in. */
2035 idx += n_elt;
dbb410c3 2036 while (--n_elt != 0)
45c5e9ed 2037 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2038 && elf_next_in_group (s) != NULL)
dbb410c3 2039 {
945906ff 2040 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2041 break;
2042 }
2043 }
2044 break;
2045
252b5132
RH
2046 default:
2047 /* Check for any processor-specific section types. */
6dc132d9
L
2048 return bed->elf_backend_section_from_shdr (abfd, hdr, name,
2049 shindex);
252b5132
RH
2050 }
2051
b34976b6 2052 return TRUE;
252b5132
RH
2053}
2054
ec338859
AM
2055/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2056 Return SEC for sections that have no elf section, and NULL on error. */
2057
2058asection *
217aa764
AM
2059bfd_section_from_r_symndx (bfd *abfd,
2060 struct sym_sec_cache *cache,
2061 asection *sec,
2062 unsigned long r_symndx)
ec338859 2063{
ec338859 2064 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2065 unsigned char esym[sizeof (Elf64_External_Sym)];
2066 Elf_External_Sym_Shndx eshndx;
2067 Elf_Internal_Sym isym;
ec338859
AM
2068 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2069
2070 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2071 return cache->sec[ent];
2072
2073 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2074 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2075 &isym, esym, &eshndx) == NULL)
ec338859 2076 return NULL;
9ad5cbcf 2077
ec338859
AM
2078 if (cache->abfd != abfd)
2079 {
2080 memset (cache->indx, -1, sizeof (cache->indx));
2081 cache->abfd = abfd;
2082 }
2083 cache->indx[ent] = r_symndx;
2084 cache->sec[ent] = sec;
50bc7936
AM
2085 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2086 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2087 {
2088 asection *s;
6cdc0ccc 2089 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2090 if (s != NULL)
2091 cache->sec[ent] = s;
2092 }
2093 return cache->sec[ent];
2094}
2095
252b5132
RH
2096/* Given an ELF section number, retrieve the corresponding BFD
2097 section. */
2098
2099asection *
217aa764 2100bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2101{
9ad5cbcf 2102 if (index >= elf_numsections (abfd))
252b5132
RH
2103 return NULL;
2104 return elf_elfsections (abfd)[index]->bfd_section;
2105}
2106
2f89ff8d
L
2107static struct bfd_elf_special_section const special_sections[] =
2108{
7dcb9820 2109 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
6723a9f4 2110 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2111 { ".comment", 8, 0, SHT_PROGBITS, 0 },
2112 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2113 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2114 { ".debug", 6, 0, SHT_PROGBITS, 0 },
2115 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2116 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2117 { ".line", 5, 0, SHT_PROGBITS, 0 },
2118 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2119 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
2120 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2121 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2122 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2123 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2124 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2125 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2126 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2127 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2128 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2129 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2130 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2131 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2132 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
2133 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2134 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2135 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2136 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2137 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2138 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2139 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
2140 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2141 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2142 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
45c5e9ed 2143 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2144 { ".note", 5, -1, SHT_NOTE, 0 },
2145 { ".rela", 5, -1, SHT_RELA, 0 },
2146 { ".rel", 4, -1, SHT_REL, 0 },
2147 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
7f1204bb
JJ
2148 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2149 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
7dcb9820 2150 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2151};
2152
2153static const struct bfd_elf_special_section *
2154get_special_section (const char *name,
2155 const struct bfd_elf_special_section *special_sections,
2156 unsigned int rela)
2157{
2158 int i;
7dcb9820 2159 int len = strlen (name);
2f89ff8d
L
2160
2161 for (i = 0; special_sections[i].prefix != NULL; i++)
7dcb9820
AM
2162 {
2163 int suffix_len;
2164 int prefix_len = special_sections[i].prefix_length;
2165
2166 if (len < prefix_len)
2167 continue;
2168 if (memcmp (name, special_sections[i].prefix, prefix_len) != 0)
2169 continue;
2170
2171 suffix_len = special_sections[i].suffix_length;
2172 if (suffix_len <= 0)
2173 {
2174 if (name[prefix_len] != 0)
2175 {
2176 if (suffix_len == 0)
2177 continue;
2178 if (name[prefix_len] != '.'
2179 && (suffix_len == -2
2180 || (rela && special_sections[i].type == SHT_REL)))
2181 continue;
2182 }
2183 }
2184 else
2185 {
2186 if (len < prefix_len + suffix_len)
2187 continue;
2188 if (memcmp (name + len - suffix_len,
2189 special_sections[i].prefix + prefix_len,
2190 suffix_len) != 0)
2191 continue;
2192 }
2f89ff8d 2193 return &special_sections[i];
7dcb9820 2194 }
2f89ff8d
L
2195
2196 return NULL;
2197}
2198
7dcb9820
AM
2199const struct bfd_elf_special_section *
2200_bfd_elf_get_sec_type_attr (bfd *abfd, const char *name)
2f89ff8d 2201{
9c5bfbb7 2202 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7dcb9820 2203 const struct bfd_elf_special_section *ssect = NULL;
2f89ff8d
L
2204
2205 /* See if this is one of the special sections. */
2206 if (name)
2207 {
9c5bfbb7 2208 unsigned int rela = bed->default_use_rela_p;
2f89ff8d
L
2209
2210 if (bed->special_sections)
2211 ssect = get_special_section (name, bed->special_sections, rela);
2212
2213 if (! ssect)
2214 ssect = get_special_section (name, special_sections, rela);
2f89ff8d
L
2215 }
2216
7dcb9820 2217 return ssect;
2f89ff8d
L
2218}
2219
b34976b6 2220bfd_boolean
217aa764 2221_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2222{
2223 struct bfd_elf_section_data *sdata;
7dcb9820 2224 const struct bfd_elf_special_section *ssect;
252b5132 2225
f0abc2a1
AM
2226 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2227 if (sdata == NULL)
2228 {
217aa764 2229 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2230 if (sdata == NULL)
2231 return FALSE;
217aa764 2232 sec->used_by_bfd = sdata;
f0abc2a1 2233 }
bf572ba0 2234
3cddba1e 2235 elf_section_type (sec) = SHT_NULL;
7dcb9820
AM
2236 ssect = _bfd_elf_get_sec_type_attr (abfd, sec->name);
2237 if (ssect != NULL)
2f89ff8d 2238 {
7dcb9820
AM
2239 elf_section_type (sec) = ssect->type;
2240 elf_section_flags (sec) = ssect->attr;
2f89ff8d
L
2241 }
2242
bf572ba0 2243 /* Indicate whether or not this section should use RELA relocations. */
68bfbfcc 2244 sec->use_rela_p = get_elf_backend_data (abfd)->default_use_rela_p;
bf572ba0 2245
b34976b6 2246 return TRUE;
252b5132
RH
2247}
2248
2249/* Create a new bfd section from an ELF program header.
2250
2251 Since program segments have no names, we generate a synthetic name
2252 of the form segment<NUM>, where NUM is generally the index in the
2253 program header table. For segments that are split (see below) we
2254 generate the names segment<NUM>a and segment<NUM>b.
2255
2256 Note that some program segments may have a file size that is different than
2257 (less than) the memory size. All this means is that at execution the
2258 system must allocate the amount of memory specified by the memory size,
2259 but only initialize it with the first "file size" bytes read from the
2260 file. This would occur for example, with program segments consisting
2261 of combined data+bss.
2262
2263 To handle the above situation, this routine generates TWO bfd sections
2264 for the single program segment. The first has the length specified by
2265 the file size of the segment, and the second has the length specified
2266 by the difference between the two sizes. In effect, the segment is split
2267 into it's initialized and uninitialized parts.
2268
2269 */
2270
b34976b6 2271bfd_boolean
217aa764
AM
2272_bfd_elf_make_section_from_phdr (bfd *abfd,
2273 Elf_Internal_Phdr *hdr,
2274 int index,
2275 const char *typename)
252b5132
RH
2276{
2277 asection *newsect;
2278 char *name;
2279 char namebuf[64];
d4c88bbb 2280 size_t len;
252b5132
RH
2281 int split;
2282
2283 split = ((hdr->p_memsz > 0)
2284 && (hdr->p_filesz > 0)
2285 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2286 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2287 len = strlen (namebuf) + 1;
217aa764 2288 name = bfd_alloc (abfd, len);
252b5132 2289 if (!name)
b34976b6 2290 return FALSE;
d4c88bbb 2291 memcpy (name, namebuf, len);
252b5132
RH
2292 newsect = bfd_make_section (abfd, name);
2293 if (newsect == NULL)
b34976b6 2294 return FALSE;
252b5132
RH
2295 newsect->vma = hdr->p_vaddr;
2296 newsect->lma = hdr->p_paddr;
eea6121a 2297 newsect->size = hdr->p_filesz;
252b5132
RH
2298 newsect->filepos = hdr->p_offset;
2299 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2300 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2301 if (hdr->p_type == PT_LOAD)
2302 {
2303 newsect->flags |= SEC_ALLOC;
2304 newsect->flags |= SEC_LOAD;
2305 if (hdr->p_flags & PF_X)
2306 {
2307 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2308 may be data. */
252b5132
RH
2309 newsect->flags |= SEC_CODE;
2310 }
2311 }
2312 if (!(hdr->p_flags & PF_W))
2313 {
2314 newsect->flags |= SEC_READONLY;
2315 }
2316
2317 if (split)
2318 {
27ac83bf 2319 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2320 len = strlen (namebuf) + 1;
217aa764 2321 name = bfd_alloc (abfd, len);
252b5132 2322 if (!name)
b34976b6 2323 return FALSE;
d4c88bbb 2324 memcpy (name, namebuf, len);
252b5132
RH
2325 newsect = bfd_make_section (abfd, name);
2326 if (newsect == NULL)
b34976b6 2327 return FALSE;
252b5132
RH
2328 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2329 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2330 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2331 if (hdr->p_type == PT_LOAD)
2332 {
2333 newsect->flags |= SEC_ALLOC;
2334 if (hdr->p_flags & PF_X)
2335 newsect->flags |= SEC_CODE;
2336 }
2337 if (!(hdr->p_flags & PF_W))
2338 newsect->flags |= SEC_READONLY;
2339 }
2340
b34976b6 2341 return TRUE;
252b5132
RH
2342}
2343
b34976b6 2344bfd_boolean
217aa764 2345bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2346{
9c5bfbb7 2347 const struct elf_backend_data *bed;
20cfcaae
NC
2348
2349 switch (hdr->p_type)
2350 {
2351 case PT_NULL:
2352 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2353
2354 case PT_LOAD:
2355 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2356
2357 case PT_DYNAMIC:
2358 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2359
2360 case PT_INTERP:
2361 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2362
2363 case PT_NOTE:
2364 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2365 return FALSE;
217aa764 2366 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2367 return FALSE;
2368 return TRUE;
20cfcaae
NC
2369
2370 case PT_SHLIB:
2371 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2372
2373 case PT_PHDR:
2374 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2375
811072d8
RM
2376 case PT_GNU_EH_FRAME:
2377 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2378 "eh_frame_hdr");
2379
9ee5e499
JJ
2380 case PT_GNU_STACK:
2381 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2382
8c37241b
JJ
2383 case PT_GNU_RELRO:
2384 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2385
20cfcaae 2386 default:
8c1acd09 2387 /* Check for any processor-specific program segment types. */
20cfcaae 2388 bed = get_elf_backend_data (abfd);
d27f5fa1 2389 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2390 }
2391}
2392
23bc299b 2393/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2394 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2395 relocations; otherwise, we use REL relocations. */
2396
b34976b6 2397bfd_boolean
217aa764
AM
2398_bfd_elf_init_reloc_shdr (bfd *abfd,
2399 Elf_Internal_Shdr *rel_hdr,
2400 asection *asect,
2401 bfd_boolean use_rela_p)
23bc299b
MM
2402{
2403 char *name;
9c5bfbb7 2404 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2405 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2406
dc810e39 2407 name = bfd_alloc (abfd, amt);
23bc299b 2408 if (name == NULL)
b34976b6 2409 return FALSE;
23bc299b
MM
2410 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2411 rel_hdr->sh_name =
2b0f7ef9 2412 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2413 FALSE);
23bc299b 2414 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2415 return FALSE;
23bc299b
MM
2416 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2417 rel_hdr->sh_entsize = (use_rela_p
2418 ? bed->s->sizeof_rela
2419 : bed->s->sizeof_rel);
45d6a902 2420 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2421 rel_hdr->sh_flags = 0;
2422 rel_hdr->sh_addr = 0;
2423 rel_hdr->sh_size = 0;
2424 rel_hdr->sh_offset = 0;
2425
b34976b6 2426 return TRUE;
23bc299b
MM
2427}
2428
252b5132
RH
2429/* Set up an ELF internal section header for a section. */
2430
252b5132 2431static void
217aa764 2432elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2433{
9c5bfbb7 2434 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2435 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2436 Elf_Internal_Shdr *this_hdr;
2437
2438 if (*failedptr)
2439 {
2440 /* We already failed; just get out of the bfd_map_over_sections
2441 loop. */
2442 return;
2443 }
2444
2445 this_hdr = &elf_section_data (asect)->this_hdr;
2446
e57b5356
AM
2447 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2448 asect->name, FALSE);
2449 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2450 {
b34976b6 2451 *failedptr = TRUE;
252b5132
RH
2452 return;
2453 }
2454
2455 this_hdr->sh_flags = 0;
2456
2457 if ((asect->flags & SEC_ALLOC) != 0
2458 || asect->user_set_vma)
2459 this_hdr->sh_addr = asect->vma;
2460 else
2461 this_hdr->sh_addr = 0;
2462
2463 this_hdr->sh_offset = 0;
eea6121a 2464 this_hdr->sh_size = asect->size;
252b5132
RH
2465 this_hdr->sh_link = 0;
2466 this_hdr->sh_addralign = 1 << asect->alignment_power;
2467 /* The sh_entsize and sh_info fields may have been set already by
2468 copy_private_section_data. */
2469
2470 this_hdr->bfd_section = asect;
2471 this_hdr->contents = NULL;
2472
3cddba1e
L
2473 /* If the section type is unspecified, we set it based on
2474 asect->flags. */
2475 if (this_hdr->sh_type == SHT_NULL)
2476 {
45c5e9ed
L
2477 if ((asect->flags & SEC_GROUP) != 0)
2478 {
2479 /* We also need to mark SHF_GROUP here for relocatable
2480 link. */
2481 struct bfd_link_order *l;
2482 asection *elt;
2483
2484 for (l = asect->link_order_head; l != NULL; l = l->next)
2485 if (l->type == bfd_indirect_link_order
2486 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
2487 do
2488 {
2489 /* The name is not important. Anything will do. */
2490 elf_group_name (elt->output_section) = "G";
2491 elf_section_flags (elt->output_section) |= SHF_GROUP;
2492
2493 elt = elf_next_in_group (elt);
2494 /* During a relocatable link, the lists are
2495 circular. */
2496 }
2497 while (elt != elf_next_in_group (l->u.indirect.section));
2498
2499 this_hdr->sh_type = SHT_GROUP;
2500 }
2501 else if ((asect->flags & SEC_ALLOC) != 0
3cddba1e
L
2502 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2503 || (asect->flags & SEC_NEVER_LOAD) != 0))
2504 this_hdr->sh_type = SHT_NOBITS;
2505 else
2506 this_hdr->sh_type = SHT_PROGBITS;
2507 }
2508
2f89ff8d 2509 switch (this_hdr->sh_type)
252b5132 2510 {
2f89ff8d 2511 default:
2f89ff8d
L
2512 break;
2513
2514 case SHT_STRTAB:
2515 case SHT_INIT_ARRAY:
2516 case SHT_FINI_ARRAY:
2517 case SHT_PREINIT_ARRAY:
2518 case SHT_NOTE:
2519 case SHT_NOBITS:
2520 case SHT_PROGBITS:
2521 break;
2522
2523 case SHT_HASH:
c7ac6ff8 2524 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2525 break;
5de3bf90 2526
2f89ff8d 2527 case SHT_DYNSYM:
252b5132 2528 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2529 break;
2530
2531 case SHT_DYNAMIC:
252b5132 2532 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2533 break;
2534
2535 case SHT_RELA:
2536 if (get_elf_backend_data (abfd)->may_use_rela_p)
2537 this_hdr->sh_entsize = bed->s->sizeof_rela;
2538 break;
2539
2540 case SHT_REL:
2541 if (get_elf_backend_data (abfd)->may_use_rel_p)
2542 this_hdr->sh_entsize = bed->s->sizeof_rel;
2543 break;
2544
2545 case SHT_GNU_versym:
252b5132 2546 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2547 break;
2548
2549 case SHT_GNU_verdef:
252b5132
RH
2550 this_hdr->sh_entsize = 0;
2551 /* objcopy or strip will copy over sh_info, but may not set
2552 cverdefs. The linker will set cverdefs, but sh_info will be
2553 zero. */
2554 if (this_hdr->sh_info == 0)
2555 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2556 else
2557 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2558 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2559 break;
2560
2561 case SHT_GNU_verneed:
252b5132
RH
2562 this_hdr->sh_entsize = 0;
2563 /* objcopy or strip will copy over sh_info, but may not set
2564 cverrefs. The linker will set cverrefs, but sh_info will be
2565 zero. */
2566 if (this_hdr->sh_info == 0)
2567 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2568 else
2569 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2570 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2571 break;
2572
2573 case SHT_GROUP:
dbb410c3 2574 this_hdr->sh_entsize = 4;
2f89ff8d 2575 break;
dbb410c3 2576 }
252b5132
RH
2577
2578 if ((asect->flags & SEC_ALLOC) != 0)
2579 this_hdr->sh_flags |= SHF_ALLOC;
2580 if ((asect->flags & SEC_READONLY) == 0)
2581 this_hdr->sh_flags |= SHF_WRITE;
2582 if ((asect->flags & SEC_CODE) != 0)
2583 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2584 if ((asect->flags & SEC_MERGE) != 0)
2585 {
2586 this_hdr->sh_flags |= SHF_MERGE;
2587 this_hdr->sh_entsize = asect->entsize;
2588 if ((asect->flags & SEC_STRINGS) != 0)
2589 this_hdr->sh_flags |= SHF_STRINGS;
2590 }
1126897b 2591 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2592 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2593 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2594 {
2595 this_hdr->sh_flags |= SHF_TLS;
eea6121a 2596 if (asect->size == 0 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60
JJ
2597 {
2598 struct bfd_link_order *o;
b34976b6 2599
704afa60
JJ
2600 this_hdr->sh_size = 0;
2601 for (o = asect->link_order_head; o != NULL; o = o->next)
2602 if (this_hdr->sh_size < o->offset + o->size)
2603 this_hdr->sh_size = o->offset + o->size;
2604 if (this_hdr->sh_size)
2605 this_hdr->sh_type = SHT_NOBITS;
2606 }
2607 }
252b5132
RH
2608
2609 /* Check for processor-specific section types. */
e1fddb6b
AO
2610 if (bed->elf_backend_fake_sections
2611 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2612 *failedptr = TRUE;
252b5132
RH
2613
2614 /* If the section has relocs, set up a section header for the
23bc299b
MM
2615 SHT_REL[A] section. If two relocation sections are required for
2616 this section, it is up to the processor-specific back-end to
c044fabd 2617 create the other. */
23bc299b 2618 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2619 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2620 &elf_section_data (asect)->rel_hdr,
c044fabd 2621 asect,
68bfbfcc 2622 asect->use_rela_p))
b34976b6 2623 *failedptr = TRUE;
252b5132
RH
2624}
2625
dbb410c3
AM
2626/* Fill in the contents of a SHT_GROUP section. */
2627
1126897b 2628void
217aa764 2629bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2630{
217aa764 2631 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2632 unsigned long symindx;
9dce4196 2633 asection *elt, *first;
dbb410c3
AM
2634 unsigned char *loc;
2635 struct bfd_link_order *l;
b34976b6 2636 bfd_boolean gas;
dbb410c3
AM
2637
2638 if (elf_section_data (sec)->this_hdr.sh_type != SHT_GROUP
2639 || *failedptr)
2640 return;
2641
1126897b
AM
2642 symindx = 0;
2643 if (elf_group_id (sec) != NULL)
2644 symindx = elf_group_id (sec)->udata.i;
2645
2646 if (symindx == 0)
2647 {
2648 /* If called from the assembler, swap_out_syms will have set up
2649 elf_section_syms; If called for "ld -r", use target_index. */
2650 if (elf_section_syms (abfd) != NULL)
2651 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2652 else
2653 symindx = sec->target_index;
2654 }
dbb410c3
AM
2655 elf_section_data (sec)->this_hdr.sh_info = symindx;
2656
1126897b 2657 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2658 gas = TRUE;
dbb410c3
AM
2659 if (sec->contents == NULL)
2660 {
b34976b6 2661 gas = FALSE;
eea6121a 2662 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2663
2664 /* Arrange for the section to be written out. */
2665 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2666 if (sec->contents == NULL)
2667 {
b34976b6 2668 *failedptr = TRUE;
dbb410c3
AM
2669 return;
2670 }
2671 }
2672
eea6121a 2673 loc = sec->contents + sec->size;
dbb410c3 2674
9dce4196
AM
2675 /* Get the pointer to the first section in the group that gas
2676 squirreled away here. objcopy arranges for this to be set to the
2677 start of the input section group. */
2678 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2679
2680 /* First element is a flag word. Rest of section is elf section
2681 indices for all the sections of the group. Write them backwards
2682 just to keep the group in the same order as given in .section
2683 directives, not that it matters. */
2684 while (elt != NULL)
2685 {
9dce4196
AM
2686 asection *s;
2687 unsigned int idx;
2688
dbb410c3 2689 loc -= 4;
9dce4196
AM
2690 s = elt;
2691 if (!gas)
2692 s = s->output_section;
2693 idx = 0;
2694 if (s != NULL)
2695 idx = elf_section_data (s)->this_idx;
2696 H_PUT_32 (abfd, idx, loc);
945906ff 2697 elt = elf_next_in_group (elt);
9dce4196
AM
2698 if (elt == first)
2699 break;
dbb410c3
AM
2700 }
2701
2702 /* If this is a relocatable link, then the above did nothing because
2703 SEC is the output section. Look through the input sections
2704 instead. */
2705 for (l = sec->link_order_head; l != NULL; l = l->next)
2706 if (l->type == bfd_indirect_link_order
945906ff 2707 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
dbb410c3
AM
2708 do
2709 {
2710 loc -= 4;
2711 H_PUT_32 (abfd,
2712 elf_section_data (elt->output_section)->this_idx, loc);
945906ff 2713 elt = elf_next_in_group (elt);
dbb410c3
AM
2714 /* During a relocatable link, the lists are circular. */
2715 }
945906ff 2716 while (elt != elf_next_in_group (l->u.indirect.section));
dbb410c3 2717
3d7f7666 2718 if ((loc -= 4) != sec->contents)
9dce4196 2719 abort ();
dbb410c3 2720
9dce4196 2721 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2722}
2723
252b5132
RH
2724/* Assign all ELF section numbers. The dummy first section is handled here
2725 too. The link/info pointers for the standard section types are filled
2726 in here too, while we're at it. */
2727
b34976b6 2728static bfd_boolean
217aa764 2729assign_section_numbers (bfd *abfd)
252b5132
RH
2730{
2731 struct elf_obj_tdata *t = elf_tdata (abfd);
2732 asection *sec;
2b0f7ef9 2733 unsigned int section_number, secn;
252b5132 2734 Elf_Internal_Shdr **i_shdrp;
dc810e39 2735 bfd_size_type amt;
47cc2cf5 2736 struct bfd_elf_section_data *d;
252b5132
RH
2737
2738 section_number = 1;
2739
2b0f7ef9
JJ
2740 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2741
47cc2cf5 2742 /* Put SHT_GROUP sections first. */
252b5132
RH
2743 for (sec = abfd->sections; sec; sec = sec->next)
2744 {
47cc2cf5 2745 d = elf_section_data (sec);
252b5132 2746
47cc2cf5
PB
2747 if (d->this_hdr.sh_type == SHT_GROUP)
2748 {
2749 if (section_number == SHN_LORESERVE)
2750 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2751 d->this_idx = section_number++;
2752 }
2753 }
2754
2755 for (sec = abfd->sections; sec; sec = sec->next)
2756 {
2757 d = elf_section_data (sec);
2758
2759 if (d->this_hdr.sh_type != SHT_GROUP)
2760 {
2761 if (section_number == SHN_LORESERVE)
2762 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2763 d->this_idx = section_number++;
2764 }
2b0f7ef9 2765 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2766 if ((sec->flags & SEC_RELOC) == 0)
2767 d->rel_idx = 0;
2768 else
2b0f7ef9 2769 {
9ad5cbcf
AM
2770 if (section_number == SHN_LORESERVE)
2771 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2772 d->rel_idx = section_number++;
2773 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2774 }
23bc299b
MM
2775
2776 if (d->rel_hdr2)
2b0f7ef9 2777 {
9ad5cbcf
AM
2778 if (section_number == SHN_LORESERVE)
2779 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2780 d->rel_idx2 = section_number++;
2781 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2782 }
23bc299b
MM
2783 else
2784 d->rel_idx2 = 0;
252b5132
RH
2785 }
2786
9ad5cbcf
AM
2787 if (section_number == SHN_LORESERVE)
2788 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2789 t->shstrtab_section = section_number++;
2b0f7ef9 2790 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2791 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2792
2793 if (bfd_get_symcount (abfd) > 0)
2794 {
9ad5cbcf
AM
2795 if (section_number == SHN_LORESERVE)
2796 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2797 t->symtab_section = section_number++;
2b0f7ef9 2798 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2799 if (section_number > SHN_LORESERVE - 2)
2800 {
2801 if (section_number == SHN_LORESERVE)
2802 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2803 t->symtab_shndx_section = section_number++;
2804 t->symtab_shndx_hdr.sh_name
2805 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2806 ".symtab_shndx", FALSE);
9ad5cbcf 2807 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2808 return FALSE;
9ad5cbcf
AM
2809 }
2810 if (section_number == SHN_LORESERVE)
2811 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2812 t->strtab_section = section_number++;
2b0f7ef9 2813 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2814 }
2815
2b0f7ef9
JJ
2816 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2817 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2818
2819 elf_numsections (abfd) = section_number;
252b5132 2820 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
2821 if (section_number > SHN_LORESERVE)
2822 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
2823
2824 /* Set up the list of section header pointers, in agreement with the
2825 indices. */
dc810e39 2826 amt = section_number * sizeof (Elf_Internal_Shdr *);
217aa764 2827 i_shdrp = bfd_zalloc (abfd, amt);
252b5132 2828 if (i_shdrp == NULL)
b34976b6 2829 return FALSE;
252b5132 2830
dc810e39 2831 amt = sizeof (Elf_Internal_Shdr);
217aa764 2832 i_shdrp[0] = bfd_zalloc (abfd, amt);
252b5132
RH
2833 if (i_shdrp[0] == NULL)
2834 {
2835 bfd_release (abfd, i_shdrp);
b34976b6 2836 return FALSE;
252b5132 2837 }
252b5132
RH
2838
2839 elf_elfsections (abfd) = i_shdrp;
2840
2841 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
2842 if (bfd_get_symcount (abfd) > 0)
2843 {
2844 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
2845 if (elf_numsections (abfd) > SHN_LORESERVE)
2846 {
2847 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2848 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2849 }
252b5132
RH
2850 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2851 t->symtab_hdr.sh_link = t->strtab_section;
2852 }
38ce5b11 2853
252b5132
RH
2854 for (sec = abfd->sections; sec; sec = sec->next)
2855 {
2856 struct bfd_elf_section_data *d = elf_section_data (sec);
2857 asection *s;
2858 const char *name;
2859
2860 i_shdrp[d->this_idx] = &d->this_hdr;
2861 if (d->rel_idx != 0)
2862 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
2863 if (d->rel_idx2 != 0)
2864 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
2865
2866 /* Fill in the sh_link and sh_info fields while we're at it. */
2867
2868 /* sh_link of a reloc section is the section index of the symbol
2869 table. sh_info is the section index of the section to which
2870 the relocation entries apply. */
2871 if (d->rel_idx != 0)
2872 {
2873 d->rel_hdr.sh_link = t->symtab_section;
2874 d->rel_hdr.sh_info = d->this_idx;
2875 }
23bc299b
MM
2876 if (d->rel_idx2 != 0)
2877 {
2878 d->rel_hdr2->sh_link = t->symtab_section;
2879 d->rel_hdr2->sh_info = d->this_idx;
2880 }
252b5132 2881
38ce5b11
L
2882 /* We need to set up sh_link for SHF_LINK_ORDER. */
2883 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
2884 {
2885 s = elf_linked_to_section (sec);
2886 if (s)
2887 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2888 else
2889 {
2890 struct bfd_link_order *p;
2891
2892 /* Find out what the corresponding section in output
2893 is. */
2894 for (p = sec->link_order_head; p != NULL; p = p->next)
2895 {
2896 s = p->u.indirect.section;
2897 if (p->type == bfd_indirect_link_order
2898 && (bfd_get_flavour (s->owner)
2899 == bfd_target_elf_flavour))
2900 {
2901 Elf_Internal_Shdr ** const elf_shdrp
2902 = elf_elfsections (s->owner);
2903 int elfsec
2904 = _bfd_elf_section_from_bfd_section (s->owner, s);
2905 elfsec = elf_shdrp[elfsec]->sh_link;
185d09ad
L
2906 /* PR 290:
2907 The Intel C compiler generates SHT_IA_64_UNWIND with
2908 SHF_LINK_ORDER. But it doesn't set theh sh_link or
2909 sh_info fields. Hence we could get the situation
2910 where elfsec is 0. */
2911 if (elfsec == 0)
2912 {
2913 const struct elf_backend_data *bed
2914 = get_elf_backend_data (abfd);
2915 if (bed->link_order_error_handler)
d003868e 2916 bed->link_order_error_handler
28b13744 2917 (_("%B: warning: sh_link not set for section `%A'"),
d003868e 2918 abfd, s);
185d09ad
L
2919 }
2920 else
2921 {
2922 s = elf_shdrp[elfsec]->bfd_section->output_section;
2923 BFD_ASSERT (s != NULL);
2924 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2925 }
38ce5b11
L
2926 break;
2927 }
2928 }
2929 }
2930 }
2931
252b5132
RH
2932 switch (d->this_hdr.sh_type)
2933 {
2934 case SHT_REL:
2935 case SHT_RELA:
2936 /* A reloc section which we are treating as a normal BFD
2937 section. sh_link is the section index of the symbol
2938 table. sh_info is the section index of the section to
2939 which the relocation entries apply. We assume that an
2940 allocated reloc section uses the dynamic symbol table.
2941 FIXME: How can we be sure? */
2942 s = bfd_get_section_by_name (abfd, ".dynsym");
2943 if (s != NULL)
2944 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2945
2946 /* We look up the section the relocs apply to by name. */
2947 name = sec->name;
2948 if (d->this_hdr.sh_type == SHT_REL)
2949 name += 4;
2950 else
2951 name += 5;
2952 s = bfd_get_section_by_name (abfd, name);
2953 if (s != NULL)
2954 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
2955 break;
2956
2957 case SHT_STRTAB:
2958 /* We assume that a section named .stab*str is a stabs
2959 string section. We look for a section with the same name
2960 but without the trailing ``str'', and set its sh_link
2961 field to point to this section. */
2962 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
2963 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
2964 {
2965 size_t len;
2966 char *alc;
2967
2968 len = strlen (sec->name);
217aa764 2969 alc = bfd_malloc (len - 2);
252b5132 2970 if (alc == NULL)
b34976b6 2971 return FALSE;
d4c88bbb 2972 memcpy (alc, sec->name, len - 3);
252b5132
RH
2973 alc[len - 3] = '\0';
2974 s = bfd_get_section_by_name (abfd, alc);
2975 free (alc);
2976 if (s != NULL)
2977 {
2978 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
2979
2980 /* This is a .stab section. */
0594c12d
AM
2981 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
2982 elf_section_data (s)->this_hdr.sh_entsize
2983 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
2984 }
2985 }
2986 break;
2987
2988 case SHT_DYNAMIC:
2989 case SHT_DYNSYM:
2990 case SHT_GNU_verneed:
2991 case SHT_GNU_verdef:
2992 /* sh_link is the section header index of the string table
2993 used for the dynamic entries, or the symbol table, or the
2994 version strings. */
2995 s = bfd_get_section_by_name (abfd, ".dynstr");
2996 if (s != NULL)
2997 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2998 break;
2999
7f1204bb
JJ
3000 case SHT_GNU_LIBLIST:
3001 /* sh_link is the section header index of the prelink library
3002 list
3003 used for the dynamic entries, or the symbol table, or the
3004 version strings. */
3005 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3006 ? ".dynstr" : ".gnu.libstr");
3007 if (s != NULL)
3008 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3009 break;
3010
252b5132
RH
3011 case SHT_HASH:
3012 case SHT_GNU_versym:
3013 /* sh_link is the section header index of the symbol table
3014 this hash table or version table is for. */
3015 s = bfd_get_section_by_name (abfd, ".dynsym");
3016 if (s != NULL)
3017 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3018 break;
dbb410c3
AM
3019
3020 case SHT_GROUP:
3021 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3022 }
3023 }
3024
2b0f7ef9 3025 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3026 if (i_shdrp[secn] == NULL)
3027 i_shdrp[secn] = i_shdrp[0];
3028 else
3029 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3030 i_shdrp[secn]->sh_name);
b34976b6 3031 return TRUE;
252b5132
RH
3032}
3033
3034/* Map symbol from it's internal number to the external number, moving
3035 all local symbols to be at the head of the list. */
3036
268b6b39 3037static int
217aa764 3038sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3039{
3040 /* If the backend has a special mapping, use it. */
9c5bfbb7 3041 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3042 if (bed->elf_backend_sym_is_global)
3043 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3044
3045 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3046 || bfd_is_und_section (bfd_get_section (sym))
3047 || bfd_is_com_section (bfd_get_section (sym)));
3048}
3049
b34976b6 3050static bfd_boolean
217aa764 3051elf_map_symbols (bfd *abfd)
252b5132 3052{
dc810e39 3053 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3054 asymbol **syms = bfd_get_outsymbols (abfd);
3055 asymbol **sect_syms;
dc810e39
AM
3056 unsigned int num_locals = 0;
3057 unsigned int num_globals = 0;
3058 unsigned int num_locals2 = 0;
3059 unsigned int num_globals2 = 0;
252b5132 3060 int max_index = 0;
dc810e39 3061 unsigned int idx;
252b5132
RH
3062 asection *asect;
3063 asymbol **new_syms;
dc810e39 3064 bfd_size_type amt;
252b5132
RH
3065
3066#ifdef DEBUG
3067 fprintf (stderr, "elf_map_symbols\n");
3068 fflush (stderr);
3069#endif
3070
252b5132
RH
3071 for (asect = abfd->sections; asect; asect = asect->next)
3072 {
3073 if (max_index < asect->index)
3074 max_index = asect->index;
3075 }
3076
3077 max_index++;
dc810e39 3078 amt = max_index * sizeof (asymbol *);
217aa764 3079 sect_syms = bfd_zalloc (abfd, amt);
252b5132 3080 if (sect_syms == NULL)
b34976b6 3081 return FALSE;
252b5132 3082 elf_section_syms (abfd) = sect_syms;
4e89ac30 3083 elf_num_section_syms (abfd) = max_index;
252b5132 3084
079e9a2f
AM
3085 /* Init sect_syms entries for any section symbols we have already
3086 decided to output. */
252b5132
RH
3087 for (idx = 0; idx < symcount; idx++)
3088 {
dc810e39 3089 asymbol *sym = syms[idx];
c044fabd 3090
252b5132
RH
3091 if ((sym->flags & BSF_SECTION_SYM) != 0
3092 && sym->value == 0)
3093 {
3094 asection *sec;
3095
3096 sec = sym->section;
3097
3098 if (sec->owner != NULL)
3099 {
3100 if (sec->owner != abfd)
3101 {
3102 if (sec->output_offset != 0)
3103 continue;
c044fabd 3104
252b5132
RH
3105 sec = sec->output_section;
3106
079e9a2f
AM
3107 /* Empty sections in the input files may have had a
3108 section symbol created for them. (See the comment
3109 near the end of _bfd_generic_link_output_symbols in
3110 linker.c). If the linker script discards such
3111 sections then we will reach this point. Since we know
3112 that we cannot avoid this case, we detect it and skip
3113 the abort and the assignment to the sect_syms array.
3114 To reproduce this particular case try running the
3115 linker testsuite test ld-scripts/weak.exp for an ELF
3116 port that uses the generic linker. */
252b5132
RH
3117 if (sec->owner == NULL)
3118 continue;
3119
3120 BFD_ASSERT (sec->owner == abfd);
3121 }
3122 sect_syms[sec->index] = syms[idx];
3123 }
3124 }
3125 }
3126
252b5132
RH
3127 /* Classify all of the symbols. */
3128 for (idx = 0; idx < symcount; idx++)
3129 {
3130 if (!sym_is_global (abfd, syms[idx]))
3131 num_locals++;
3132 else
3133 num_globals++;
3134 }
079e9a2f
AM
3135
3136 /* We will be adding a section symbol for each BFD section. Most normal
3137 sections will already have a section symbol in outsymbols, but
3138 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3139 at least in that case. */
252b5132
RH
3140 for (asect = abfd->sections; asect; asect = asect->next)
3141 {
079e9a2f 3142 if (sect_syms[asect->index] == NULL)
252b5132 3143 {
079e9a2f 3144 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3145 num_locals++;
3146 else
3147 num_globals++;
252b5132
RH
3148 }
3149 }
3150
3151 /* Now sort the symbols so the local symbols are first. */
dc810e39 3152 amt = (num_locals + num_globals) * sizeof (asymbol *);
217aa764 3153 new_syms = bfd_alloc (abfd, amt);
dc810e39 3154
252b5132 3155 if (new_syms == NULL)
b34976b6 3156 return FALSE;
252b5132
RH
3157
3158 for (idx = 0; idx < symcount; idx++)
3159 {
3160 asymbol *sym = syms[idx];
dc810e39 3161 unsigned int i;
252b5132
RH
3162
3163 if (!sym_is_global (abfd, sym))
3164 i = num_locals2++;
3165 else
3166 i = num_locals + num_globals2++;
3167 new_syms[i] = sym;
3168 sym->udata.i = i + 1;
3169 }
3170 for (asect = abfd->sections; asect; asect = asect->next)
3171 {
079e9a2f 3172 if (sect_syms[asect->index] == NULL)
252b5132 3173 {
079e9a2f 3174 asymbol *sym = asect->symbol;
dc810e39 3175 unsigned int i;
252b5132 3176
079e9a2f 3177 sect_syms[asect->index] = sym;
252b5132
RH
3178 if (!sym_is_global (abfd, sym))
3179 i = num_locals2++;
3180 else
3181 i = num_locals + num_globals2++;
3182 new_syms[i] = sym;
3183 sym->udata.i = i + 1;
3184 }
3185 }
3186
3187 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3188
3189 elf_num_locals (abfd) = num_locals;
3190 elf_num_globals (abfd) = num_globals;
b34976b6 3191 return TRUE;
252b5132
RH
3192}
3193
3194/* Align to the maximum file alignment that could be required for any
3195 ELF data structure. */
3196
268b6b39 3197static inline file_ptr
217aa764 3198align_file_position (file_ptr off, int align)
252b5132
RH
3199{
3200 return (off + align - 1) & ~(align - 1);
3201}
3202
3203/* Assign a file position to a section, optionally aligning to the
3204 required section alignment. */
3205
217aa764
AM
3206file_ptr
3207_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3208 file_ptr offset,
3209 bfd_boolean align)
252b5132
RH
3210{
3211 if (align)
3212 {
3213 unsigned int al;
3214
3215 al = i_shdrp->sh_addralign;
3216 if (al > 1)
3217 offset = BFD_ALIGN (offset, al);
3218 }
3219 i_shdrp->sh_offset = offset;
3220 if (i_shdrp->bfd_section != NULL)
3221 i_shdrp->bfd_section->filepos = offset;
3222 if (i_shdrp->sh_type != SHT_NOBITS)
3223 offset += i_shdrp->sh_size;
3224 return offset;
3225}
3226
3227/* Compute the file positions we are going to put the sections at, and
3228 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3229 is not NULL, this is being called by the ELF backend linker. */
3230
b34976b6 3231bfd_boolean
217aa764
AM
3232_bfd_elf_compute_section_file_positions (bfd *abfd,
3233 struct bfd_link_info *link_info)
252b5132 3234{
9c5bfbb7 3235 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3236 bfd_boolean failed;
4b6c0f2f 3237 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3238 Elf_Internal_Shdr *shstrtab_hdr;
3239
3240 if (abfd->output_has_begun)
b34976b6 3241 return TRUE;
252b5132
RH
3242
3243 /* Do any elf backend specific processing first. */
3244 if (bed->elf_backend_begin_write_processing)
3245 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3246
3247 if (! prep_headers (abfd))
b34976b6 3248 return FALSE;
252b5132 3249
e6c51ed4
NC
3250 /* Post process the headers if necessary. */
3251 if (bed->elf_backend_post_process_headers)
3252 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3253
b34976b6 3254 failed = FALSE;
252b5132
RH
3255 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3256 if (failed)
b34976b6 3257 return FALSE;
252b5132
RH
3258
3259 if (!assign_section_numbers (abfd))
b34976b6 3260 return FALSE;
252b5132
RH
3261
3262 /* The backend linker builds symbol table information itself. */
3263 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3264 {
3265 /* Non-zero if doing a relocatable link. */
3266 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3267
3268 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3269 return FALSE;
252b5132
RH
3270 }
3271
1126897b 3272 if (link_info == NULL)
dbb410c3 3273 {
1126897b 3274 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3275 if (failed)
b34976b6 3276 return FALSE;
dbb410c3
AM
3277 }
3278
252b5132
RH
3279 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3280 /* sh_name was set in prep_headers. */
3281 shstrtab_hdr->sh_type = SHT_STRTAB;
3282 shstrtab_hdr->sh_flags = 0;
3283 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3284 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3285 shstrtab_hdr->sh_entsize = 0;
3286 shstrtab_hdr->sh_link = 0;
3287 shstrtab_hdr->sh_info = 0;
3288 /* sh_offset is set in assign_file_positions_except_relocs. */
3289 shstrtab_hdr->sh_addralign = 1;
3290
c84fca4d 3291 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3292 return FALSE;
252b5132
RH
3293
3294 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3295 {
3296 file_ptr off;
3297 Elf_Internal_Shdr *hdr;
3298
3299 off = elf_tdata (abfd)->next_file_pos;
3300
3301 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3302 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3303
9ad5cbcf
AM
3304 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3305 if (hdr->sh_size != 0)
b34976b6 3306 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3307
252b5132 3308 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3309 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3310
3311 elf_tdata (abfd)->next_file_pos = off;
3312
3313 /* Now that we know where the .strtab section goes, write it
3314 out. */
3315 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3316 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3317 return FALSE;
252b5132
RH
3318 _bfd_stringtab_free (strtab);
3319 }
3320
b34976b6 3321 abfd->output_has_begun = TRUE;
252b5132 3322
b34976b6 3323 return TRUE;
252b5132
RH
3324}
3325
3326/* Create a mapping from a set of sections to a program segment. */
3327
217aa764
AM
3328static struct elf_segment_map *
3329make_mapping (bfd *abfd,
3330 asection **sections,
3331 unsigned int from,
3332 unsigned int to,
3333 bfd_boolean phdr)
252b5132
RH
3334{
3335 struct elf_segment_map *m;
3336 unsigned int i;
3337 asection **hdrpp;
dc810e39 3338 bfd_size_type amt;
252b5132 3339
dc810e39
AM
3340 amt = sizeof (struct elf_segment_map);
3341 amt += (to - from - 1) * sizeof (asection *);
217aa764 3342 m = bfd_zalloc (abfd, amt);
252b5132
RH
3343 if (m == NULL)
3344 return NULL;
3345 m->next = NULL;
3346 m->p_type = PT_LOAD;
3347 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3348 m->sections[i - from] = *hdrpp;
3349 m->count = to - from;
3350
3351 if (from == 0 && phdr)
3352 {
3353 /* Include the headers in the first PT_LOAD segment. */
3354 m->includes_filehdr = 1;
3355 m->includes_phdrs = 1;
3356 }
3357
3358 return m;
3359}
3360
229fcec5
MM
3361/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3362 on failure. */
3363
3364struct elf_segment_map *
3365_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3366{
3367 struct elf_segment_map *m;
3368
3369 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3370 if (m == NULL)
3371 return NULL;
3372 m->next = NULL;
3373 m->p_type = PT_DYNAMIC;
3374 m->count = 1;
3375 m->sections[0] = dynsec;
3376
3377 return m;
3378}
3379
252b5132
RH
3380/* Set up a mapping from BFD sections to program segments. */
3381
b34976b6 3382static bfd_boolean
217aa764 3383map_sections_to_segments (bfd *abfd)
252b5132
RH
3384{
3385 asection **sections = NULL;
3386 asection *s;
3387 unsigned int i;
3388 unsigned int count;
3389 struct elf_segment_map *mfirst;
3390 struct elf_segment_map **pm;
3391 struct elf_segment_map *m;
3392 asection *last_hdr;
baaff79e 3393 bfd_vma last_size;
252b5132
RH
3394 unsigned int phdr_index;
3395 bfd_vma maxpagesize;
3396 asection **hdrpp;
b34976b6
AM
3397 bfd_boolean phdr_in_segment = TRUE;
3398 bfd_boolean writable;
13ae64f3
JJ
3399 int tls_count = 0;
3400 asection *first_tls = NULL;
65765700 3401 asection *dynsec, *eh_frame_hdr;
dc810e39 3402 bfd_size_type amt;
252b5132
RH
3403
3404 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3405 return TRUE;
252b5132
RH
3406
3407 if (bfd_count_sections (abfd) == 0)
b34976b6 3408 return TRUE;
252b5132
RH
3409
3410 /* Select the allocated sections, and sort them. */
3411
dc810e39 3412 amt = bfd_count_sections (abfd) * sizeof (asection *);
217aa764 3413 sections = bfd_malloc (amt);
252b5132
RH
3414 if (sections == NULL)
3415 goto error_return;
3416
3417 i = 0;
3418 for (s = abfd->sections; s != NULL; s = s->next)
3419 {
3420 if ((s->flags & SEC_ALLOC) != 0)
3421 {
3422 sections[i] = s;
3423 ++i;
3424 }
3425 }
3426 BFD_ASSERT (i <= bfd_count_sections (abfd));
3427 count = i;
3428
3429 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3430
3431 /* Build the mapping. */
3432
3433 mfirst = NULL;
3434 pm = &mfirst;
3435
3436 /* If we have a .interp section, then create a PT_PHDR segment for
3437 the program headers and a PT_INTERP segment for the .interp
3438 section. */
3439 s = bfd_get_section_by_name (abfd, ".interp");
3440 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3441 {
dc810e39 3442 amt = sizeof (struct elf_segment_map);
217aa764 3443 m = bfd_zalloc (abfd, amt);
252b5132
RH
3444 if (m == NULL)
3445 goto error_return;
3446 m->next = NULL;
3447 m->p_type = PT_PHDR;
3448 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3449 m->p_flags = PF_R | PF_X;
3450 m->p_flags_valid = 1;
3451 m->includes_phdrs = 1;
3452
3453 *pm = m;
3454 pm = &m->next;
3455
dc810e39 3456 amt = sizeof (struct elf_segment_map);
217aa764 3457 m = bfd_zalloc (abfd, amt);
252b5132
RH
3458 if (m == NULL)
3459 goto error_return;
3460 m->next = NULL;
3461 m->p_type = PT_INTERP;
3462 m->count = 1;
3463 m->sections[0] = s;
3464
3465 *pm = m;
3466 pm = &m->next;
3467 }
3468
3469 /* Look through the sections. We put sections in the same program
3470 segment when the start of the second section can be placed within
3471 a few bytes of the end of the first section. */
3472 last_hdr = NULL;
baaff79e 3473 last_size = 0;
252b5132
RH
3474 phdr_index = 0;
3475 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3476 writable = FALSE;
252b5132
RH
3477 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3478 if (dynsec != NULL
3479 && (dynsec->flags & SEC_LOAD) == 0)
3480 dynsec = NULL;
3481
3482 /* Deal with -Ttext or something similar such that the first section
3483 is not adjacent to the program headers. This is an
3484 approximation, since at this point we don't know exactly how many
3485 program headers we will need. */
3486 if (count > 0)
3487 {
3488 bfd_size_type phdr_size;
3489
3490 phdr_size = elf_tdata (abfd)->program_header_size;
3491 if (phdr_size == 0)
3492 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3493 if ((abfd->flags & D_PAGED) == 0
3494 || sections[0]->lma < phdr_size
3495 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3496 phdr_in_segment = FALSE;
252b5132
RH
3497 }
3498
3499 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3500 {
3501 asection *hdr;
b34976b6 3502 bfd_boolean new_segment;
252b5132
RH
3503
3504 hdr = *hdrpp;
3505
3506 /* See if this section and the last one will fit in the same
3507 segment. */
3508
3509 if (last_hdr == NULL)
3510 {
3511 /* If we don't have a segment yet, then we don't need a new
3512 one (we build the last one after this loop). */
b34976b6 3513 new_segment = FALSE;
252b5132
RH
3514 }
3515 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3516 {
3517 /* If this section has a different relation between the
3518 virtual address and the load address, then we need a new
3519 segment. */
b34976b6 3520 new_segment = TRUE;
252b5132 3521 }
baaff79e 3522 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3523 < BFD_ALIGN (hdr->lma, maxpagesize))
3524 {
3525 /* If putting this section in this segment would force us to
3526 skip a page in the segment, then we need a new segment. */
b34976b6 3527 new_segment = TRUE;
252b5132 3528 }
baaff79e
JJ
3529 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3530 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3531 {
3532 /* We don't want to put a loadable section after a
baaff79e
JJ
3533 nonloadable section in the same segment.
3534 Consider .tbss sections as loadable for this purpose. */
b34976b6 3535 new_segment = TRUE;
252b5132
RH
3536 }
3537 else if ((abfd->flags & D_PAGED) == 0)
3538 {
3539 /* If the file is not demand paged, which means that we
3540 don't require the sections to be correctly aligned in the
3541 file, then there is no other reason for a new segment. */
b34976b6 3542 new_segment = FALSE;
252b5132
RH
3543 }
3544 else if (! writable
3545 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3546 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3547 & ~(maxpagesize - 1))
3548 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3549 {
3550 /* We don't want to put a writable section in a read only
3551 segment, unless they are on the same page in memory
3552 anyhow. We already know that the last section does not
3553 bring us past the current section on the page, so the
3554 only case in which the new section is not on the same
3555 page as the previous section is when the previous section
3556 ends precisely on a page boundary. */
b34976b6 3557 new_segment = TRUE;
252b5132
RH
3558 }
3559 else
3560 {
3561 /* Otherwise, we can use the same segment. */
b34976b6 3562 new_segment = FALSE;
252b5132
RH
3563 }
3564
3565 if (! new_segment)
3566 {
3567 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3568 writable = TRUE;
baaff79e
JJ
3569 last_hdr = hdr;
3570 /* .tbss sections effectively have zero size. */
e5caec89 3571 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3572 last_size = hdr->size;
baaff79e
JJ
3573 else
3574 last_size = 0;
252b5132
RH
3575 continue;
3576 }
3577
3578 /* We need a new program segment. We must create a new program
3579 header holding all the sections from phdr_index until hdr. */
3580
3581 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3582 if (m == NULL)
3583 goto error_return;
3584
3585 *pm = m;
3586 pm = &m->next;
3587
3588 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3589 writable = TRUE;
252b5132 3590 else
b34976b6 3591 writable = FALSE;
252b5132
RH
3592
3593 last_hdr = hdr;
baaff79e
JJ
3594 /* .tbss sections effectively have zero size. */
3595 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3596 last_size = hdr->size;
baaff79e
JJ
3597 else
3598 last_size = 0;
252b5132 3599 phdr_index = i;
b34976b6 3600 phdr_in_segment = FALSE;
252b5132
RH
3601 }
3602
3603 /* Create a final PT_LOAD program segment. */
3604 if (last_hdr != NULL)
3605 {
3606 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3607 if (m == NULL)
3608 goto error_return;
3609
3610 *pm = m;
3611 pm = &m->next;
3612 }
3613
3614 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3615 if (dynsec != NULL)
3616 {
229fcec5 3617 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3618 if (m == NULL)
3619 goto error_return;
252b5132
RH
3620 *pm = m;
3621 pm = &m->next;
3622 }
3623
3624 /* For each loadable .note section, add a PT_NOTE segment. We don't
3625 use bfd_get_section_by_name, because if we link together
3626 nonloadable .note sections and loadable .note sections, we will
3627 generate two .note sections in the output file. FIXME: Using
3628 names for section types is bogus anyhow. */
3629 for (s = abfd->sections; s != NULL; s = s->next)
3630 {
3631 if ((s->flags & SEC_LOAD) != 0
3632 && strncmp (s->name, ".note", 5) == 0)
3633 {
dc810e39 3634 amt = sizeof (struct elf_segment_map);
217aa764 3635 m = bfd_zalloc (abfd, amt);
252b5132
RH
3636 if (m == NULL)
3637 goto error_return;
3638 m->next = NULL;
3639 m->p_type = PT_NOTE;
3640 m->count = 1;
3641 m->sections[0] = s;
3642
3643 *pm = m;
3644 pm = &m->next;
3645 }
13ae64f3
JJ
3646 if (s->flags & SEC_THREAD_LOCAL)
3647 {
3648 if (! tls_count)
3649 first_tls = s;
3650 tls_count++;
3651 }
3652 }
3653
3654 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3655 if (tls_count > 0)
3656 {
3657 int i;
3658
3659 amt = sizeof (struct elf_segment_map);
3660 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3661 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3662 if (m == NULL)
3663 goto error_return;
3664 m->next = NULL;
3665 m->p_type = PT_TLS;
3666 m->count = tls_count;
3667 /* Mandated PF_R. */
3668 m->p_flags = PF_R;
3669 m->p_flags_valid = 1;
3670 for (i = 0; i < tls_count; ++i)
3671 {
3672 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3673 m->sections[i] = first_tls;
3674 first_tls = first_tls->next;
3675 }
3676
3677 *pm = m;
3678 pm = &m->next;
252b5132
RH
3679 }
3680
65765700
JJ
3681 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3682 segment. */
126495ed
AM
3683 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3684 if (eh_frame_hdr != NULL
3685 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3686 {
3687 amt = sizeof (struct elf_segment_map);
217aa764 3688 m = bfd_zalloc (abfd, amt);
65765700
JJ
3689 if (m == NULL)
3690 goto error_return;
3691 m->next = NULL;
3692 m->p_type = PT_GNU_EH_FRAME;
3693 m->count = 1;
126495ed 3694 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3695
3696 *pm = m;
3697 pm = &m->next;
3698 }
3699
9ee5e499
JJ
3700 if (elf_tdata (abfd)->stack_flags)
3701 {
3702 amt = sizeof (struct elf_segment_map);
217aa764 3703 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3704 if (m == NULL)
3705 goto error_return;
3706 m->next = NULL;
3707 m->p_type = PT_GNU_STACK;
3708 m->p_flags = elf_tdata (abfd)->stack_flags;
3709 m->p_flags_valid = 1;
3710
3711 *pm = m;
3712 pm = &m->next;
3713 }
3714
8c37241b
JJ
3715 if (elf_tdata (abfd)->relro)
3716 {
3717 amt = sizeof (struct elf_segment_map);
3718 m = bfd_zalloc (abfd, amt);
3719 if (m == NULL)
3720 goto error_return;
3721 m->next = NULL;
3722 m->p_type = PT_GNU_RELRO;
3723 m->p_flags = PF_R;
3724 m->p_flags_valid = 1;
3725
3726 *pm = m;
3727 pm = &m->next;
3728 }
3729
252b5132
RH
3730 free (sections);
3731 sections = NULL;
3732
3733 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3734 return TRUE;
252b5132
RH
3735
3736 error_return:
3737 if (sections != NULL)
3738 free (sections);
b34976b6 3739 return FALSE;
252b5132
RH
3740}
3741
3742/* Sort sections by address. */
3743
3744static int
217aa764 3745elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3746{
3747 const asection *sec1 = *(const asection **) arg1;
3748 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3749 bfd_size_type size1, size2;
252b5132
RH
3750
3751 /* Sort by LMA first, since this is the address used to
3752 place the section into a segment. */
3753 if (sec1->lma < sec2->lma)
3754 return -1;
3755 else if (sec1->lma > sec2->lma)
3756 return 1;
3757
3758 /* Then sort by VMA. Normally the LMA and the VMA will be
3759 the same, and this will do nothing. */
3760 if (sec1->vma < sec2->vma)
3761 return -1;
3762 else if (sec1->vma > sec2->vma)
3763 return 1;
3764
3765 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3766
07c6e936 3767#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3768
3769 if (TOEND (sec1))
3770 {
3771 if (TOEND (sec2))
00a7cdc5
NC
3772 {
3773 /* If the indicies are the same, do not return 0
3774 here, but continue to try the next comparison. */
3775 if (sec1->target_index - sec2->target_index != 0)
3776 return sec1->target_index - sec2->target_index;
3777 }
252b5132
RH
3778 else
3779 return 1;
3780 }
00a7cdc5 3781 else if (TOEND (sec2))
252b5132
RH
3782 return -1;
3783
3784#undef TOEND
3785
00a7cdc5
NC
3786 /* Sort by size, to put zero sized sections
3787 before others at the same address. */
252b5132 3788
eea6121a
AM
3789 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
3790 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
3791
3792 if (size1 < size2)
252b5132 3793 return -1;
eecdbe52 3794 if (size1 > size2)
252b5132
RH
3795 return 1;
3796
3797 return sec1->target_index - sec2->target_index;
3798}
3799
340b6d91
AC
3800/* Ian Lance Taylor writes:
3801
3802 We shouldn't be using % with a negative signed number. That's just
3803 not good. We have to make sure either that the number is not
3804 negative, or that the number has an unsigned type. When the types
3805 are all the same size they wind up as unsigned. When file_ptr is a
3806 larger signed type, the arithmetic winds up as signed long long,
3807 which is wrong.
3808
3809 What we're trying to say here is something like ``increase OFF by
3810 the least amount that will cause it to be equal to the VMA modulo
3811 the page size.'' */
3812/* In other words, something like:
3813
3814 vma_offset = m->sections[0]->vma % bed->maxpagesize;
3815 off_offset = off % bed->maxpagesize;
3816 if (vma_offset < off_offset)
3817 adjustment = vma_offset + bed->maxpagesize - off_offset;
3818 else
3819 adjustment = vma_offset - off_offset;
3820
3821 which can can be collapsed into the expression below. */
3822
3823static file_ptr
3824vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
3825{
3826 return ((vma - off) % maxpagesize);
3827}
3828
252b5132
RH
3829/* Assign file positions to the sections based on the mapping from
3830 sections to segments. This function also sets up some fields in
3831 the file header, and writes out the program headers. */
3832
b34976b6 3833static bfd_boolean
c84fca4d 3834assign_file_positions_for_segments (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3835{
3836 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3837 unsigned int count;
3838 struct elf_segment_map *m;
3839 unsigned int alloc;
3840 Elf_Internal_Phdr *phdrs;
3841 file_ptr off, voff;
3842 bfd_vma filehdr_vaddr, filehdr_paddr;
3843 bfd_vma phdrs_vaddr, phdrs_paddr;
3844 Elf_Internal_Phdr *p;
dc810e39 3845 bfd_size_type amt;
252b5132
RH
3846
3847 if (elf_tdata (abfd)->segment_map == NULL)
3848 {
3849 if (! map_sections_to_segments (abfd))
b34976b6 3850 return FALSE;
252b5132 3851 }
1ed89aa9
NC
3852 else
3853 {
3854 /* The placement algorithm assumes that non allocated sections are
3855 not in PT_LOAD segments. We ensure this here by removing such
3856 sections from the segment map. */
3857 for (m = elf_tdata (abfd)->segment_map;
3858 m != NULL;
3859 m = m->next)
3860 {
3861 unsigned int new_count;
3862 unsigned int i;
3863
3864 if (m->p_type != PT_LOAD)
3865 continue;
3866
3867 new_count = 0;
3868 for (i = 0; i < m->count; i ++)
3869 {
3870 if ((m->sections[i]->flags & SEC_ALLOC) != 0)
3871 {
47d9a591 3872 if (i != new_count)
1ed89aa9
NC
3873 m->sections[new_count] = m->sections[i];
3874
3875 new_count ++;
3876 }
3877 }
3878
3879 if (new_count != m->count)
3880 m->count = new_count;
3881 }
3882 }
252b5132
RH
3883
3884 if (bed->elf_backend_modify_segment_map)
3885 {
c84fca4d 3886 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 3887 return FALSE;
252b5132
RH
3888 }
3889
3890 count = 0;
3891 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
3892 ++count;
3893
3894 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
3895 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
3896 elf_elfheader (abfd)->e_phnum = count;
3897
3898 if (count == 0)
0ebdbb83
BW
3899 {
3900 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
3901 return TRUE;
3902 }
252b5132
RH
3903
3904 /* If we already counted the number of program segments, make sure
3905 that we allocated enough space. This happens when SIZEOF_HEADERS
3906 is used in a linker script. */
3907 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
3908 if (alloc != 0 && count > alloc)
3909 {
3910 ((*_bfd_error_handler)
b301b248
AM
3911 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
3912 abfd, alloc, count));
252b5132 3913 bfd_set_error (bfd_error_bad_value);
b34976b6 3914 return FALSE;
252b5132
RH
3915 }
3916
3917 if (alloc == 0)
3918 alloc = count;
3919
dc810e39 3920 amt = alloc * sizeof (Elf_Internal_Phdr);
217aa764 3921 phdrs = bfd_alloc (abfd, amt);
252b5132 3922 if (phdrs == NULL)
b34976b6 3923 return FALSE;
252b5132
RH
3924
3925 off = bed->s->sizeof_ehdr;
3926 off += alloc * bed->s->sizeof_phdr;
3927
3928 filehdr_vaddr = 0;
3929 filehdr_paddr = 0;
3930 phdrs_vaddr = 0;
3931 phdrs_paddr = 0;
3932
3933 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
3934 m != NULL;
3935 m = m->next, p++)
3936 {
3937 unsigned int i;
3938 asection **secpp;
3939
3940 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 3941 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
3942 not be done to the PT_NOTE section of a corefile, which may
3943 contain several pseudo-sections artificially created by bfd.
3944 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
3945 if (m->count > 1
3946 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 3947 && m->p_type == PT_NOTE))
252b5132
RH
3948 qsort (m->sections, (size_t) m->count, sizeof (asection *),
3949 elf_sort_sections);
3950
b301b248
AM
3951 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
3952 number of sections with contents contributing to both p_filesz
3953 and p_memsz, followed by a number of sections with no contents
3954 that just contribute to p_memsz. In this loop, OFF tracks next
3955 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
3956 an adjustment we use for segments that have no file contents
3957 but need zero filled memory allocation. */
3958 voff = 0;
252b5132 3959 p->p_type = m->p_type;
28a7f3e7 3960 p->p_flags = m->p_flags;
252b5132
RH
3961
3962 if (p->p_type == PT_LOAD
b301b248 3963 && m->count > 0)
252b5132 3964 {
b301b248
AM
3965 bfd_size_type align;
3966 bfd_vma adjust;
3967
252b5132 3968 if ((abfd->flags & D_PAGED) != 0)
b301b248 3969 align = bed->maxpagesize;
252b5132
RH
3970 else
3971 {
b301b248 3972 unsigned int align_power = 0;
252b5132
RH
3973 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
3974 {
b301b248 3975 unsigned int secalign;
252b5132
RH
3976
3977 secalign = bfd_get_section_alignment (abfd, *secpp);
b301b248
AM
3978 if (secalign > align_power)
3979 align_power = secalign;
252b5132 3980 }
b301b248
AM
3981 align = (bfd_size_type) 1 << align_power;
3982 }
252b5132 3983
b301b248
AM
3984 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
3985 off += adjust;
3986 if (adjust != 0
3987 && !m->includes_filehdr
3988 && !m->includes_phdrs
3989 && (ufile_ptr) off >= align)
3990 {
3991 /* If the first section isn't loadable, the same holds for
3992 any other sections. Since the segment won't need file
3993 space, we can make p_offset overlap some prior segment.
3994 However, .tbss is special. If a segment starts with
3995 .tbss, we need to look at the next section to decide
3996 whether the segment has any loadable sections. */
3997 i = 0;
5efb6261 3998 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
3999 {
4000 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4001 || ++i >= m->count)
4002 {
4003 off -= adjust;
4004 voff = adjust - align;
4005 break;
4006 }
4007 }
252b5132
RH
4008 }
4009 }
b1a6d0b1
NC
4010 /* Make sure the .dynamic section is the first section in the
4011 PT_DYNAMIC segment. */
4012 else if (p->p_type == PT_DYNAMIC
4013 && m->count > 1
4014 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4015 {
4016 _bfd_error_handler
b301b248
AM
4017 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4018 abfd);
b1a6d0b1
NC
4019 bfd_set_error (bfd_error_bad_value);
4020 return FALSE;
4021 }
252b5132
RH
4022
4023 if (m->count == 0)
4024 p->p_vaddr = 0;
4025 else
4026 p->p_vaddr = m->sections[0]->vma;
4027
4028 if (m->p_paddr_valid)
4029 p->p_paddr = m->p_paddr;
4030 else if (m->count == 0)
4031 p->p_paddr = 0;
4032 else
4033 p->p_paddr = m->sections[0]->lma;
4034
4035 if (p->p_type == PT_LOAD
4036 && (abfd->flags & D_PAGED) != 0)
4037 p->p_align = bed->maxpagesize;
4038 else if (m->count == 0)
45d6a902 4039 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
4040 else
4041 p->p_align = 0;
4042
4043 p->p_offset = 0;
4044 p->p_filesz = 0;
4045 p->p_memsz = 0;
4046
4047 if (m->includes_filehdr)
4048 {
4049 if (! m->p_flags_valid)
4050 p->p_flags |= PF_R;
4051 p->p_offset = 0;
4052 p->p_filesz = bed->s->sizeof_ehdr;
4053 p->p_memsz = bed->s->sizeof_ehdr;
4054 if (m->count > 0)
4055 {
4056 BFD_ASSERT (p->p_type == PT_LOAD);
4057
4058 if (p->p_vaddr < (bfd_vma) off)
4059 {
caf47ea6 4060 (*_bfd_error_handler)
b301b248
AM
4061 (_("%B: Not enough room for program headers, try linking with -N"),
4062 abfd);
252b5132 4063 bfd_set_error (bfd_error_bad_value);
b34976b6 4064 return FALSE;
252b5132
RH
4065 }
4066
4067 p->p_vaddr -= off;
4068 if (! m->p_paddr_valid)
4069 p->p_paddr -= off;
4070 }
4071 if (p->p_type == PT_LOAD)
4072 {
4073 filehdr_vaddr = p->p_vaddr;
4074 filehdr_paddr = p->p_paddr;
4075 }
4076 }
4077
4078 if (m->includes_phdrs)
4079 {
4080 if (! m->p_flags_valid)
4081 p->p_flags |= PF_R;
4082
4083 if (m->includes_filehdr)
4084 {
4085 if (p->p_type == PT_LOAD)
4086 {
4087 phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr;
4088 phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr;
4089 }
4090 }
4091 else
4092 {
4093 p->p_offset = bed->s->sizeof_ehdr;
4094
4095 if (m->count > 0)
4096 {
4097 BFD_ASSERT (p->p_type == PT_LOAD);
4098 p->p_vaddr -= off - p->p_offset;
4099 if (! m->p_paddr_valid)
4100 p->p_paddr -= off - p->p_offset;
4101 }
4102
4103 if (p->p_type == PT_LOAD)
4104 {
4105 phdrs_vaddr = p->p_vaddr;
4106 phdrs_paddr = p->p_paddr;
4107 }
4108 else
4109 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4110 }
4111
4112 p->p_filesz += alloc * bed->s->sizeof_phdr;
4113 p->p_memsz += alloc * bed->s->sizeof_phdr;
4114 }
4115
4116 if (p->p_type == PT_LOAD
4117 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4118 {
4119 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4120 p->p_offset = off + voff;
252b5132
RH
4121 else
4122 {
4123 file_ptr adjust;
4124
4125 adjust = off - (p->p_offset + p->p_filesz);
4126 p->p_filesz += adjust;
4127 p->p_memsz += adjust;
4128 }
4129 }
4130
252b5132
RH
4131 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4132 {
4133 asection *sec;
4134 flagword flags;
4135 bfd_size_type align;
4136
4137 sec = *secpp;
4138 flags = sec->flags;
4139 align = 1 << bfd_get_section_alignment (abfd, sec);
4140
b301b248
AM
4141 if (p->p_type == PT_LOAD
4142 || p->p_type == PT_TLS)
252b5132
RH
4143 {
4144 bfd_signed_vma adjust;
4145
5efb6261 4146 if ((flags & SEC_LOAD) != 0)
252b5132 4147 {
b301b248 4148 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4149 if (adjust < 0)
b301b248
AM
4150 {
4151 (*_bfd_error_handler)
4152 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4153 abfd, sec, (unsigned long) sec->lma);
4154 adjust = 0;
4155 }
4156 off += adjust;
4157 p->p_filesz += adjust;
4158 p->p_memsz += adjust;
252b5132 4159 }
b301b248
AM
4160 /* .tbss is special. It doesn't contribute to p_memsz of
4161 normal segments. */
4162 else if ((flags & SEC_THREAD_LOCAL) == 0
4163 || p->p_type == PT_TLS)
252b5132
RH
4164 {
4165 /* The section VMA must equal the file position
b301b248
AM
4166 modulo the page size. */
4167 bfd_size_type page = align;
252b5132 4168 if ((abfd->flags & D_PAGED) != 0)
b301b248
AM
4169 page = bed->maxpagesize;
4170 adjust = vma_page_aligned_bias (sec->vma,
4171 p->p_vaddr + p->p_memsz,
4172 page);
252b5132 4173 p->p_memsz += adjust;
252b5132 4174 }
252b5132
RH
4175 }
4176
4177 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4178 {
b301b248
AM
4179 /* The section at i == 0 is the one that actually contains
4180 everything. */
4a938328
MS
4181 if (i == 0)
4182 {
252b5132 4183 sec->filepos = off;
eea6121a 4184 off += sec->size;
b301b248
AM
4185 p->p_filesz = sec->size;
4186 p->p_memsz = 0;
4187 p->p_align = 1;
252b5132 4188 }
4a938328 4189 else
252b5132 4190 {
b301b248 4191 /* The rest are fake sections that shouldn't be written. */
252b5132 4192 sec->filepos = 0;
eea6121a 4193 sec->size = 0;
b301b248
AM
4194 sec->flags = 0;
4195 continue;
252b5132 4196 }
252b5132
RH
4197 }
4198 else
4199 {
b301b248
AM
4200 if (p->p_type == PT_LOAD)
4201 {
4202 sec->filepos = off;
5efb6261
AM
4203 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4204 1997, and the exact reason for it isn't clear. One
4205 plausible explanation is that it is to work around
4206 a problem we have with linker scripts using data
4207 statements in NOLOAD sections. I don't think it
4208 makes a great deal of sense to have such a section
4209 assigned to a PT_LOAD segment, but apparently
4210 people do this. The data statement results in a
4211 bfd_data_link_order being built, and these need
4212 section contents to write into. Eventually, we get
4213 to _bfd_elf_write_object_contents which writes any
4214 section with contents to the output. Make room
4215 here for the write, so that following segments are
4216 not trashed. */
4217 if ((flags & SEC_LOAD) != 0
4218 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4219 off += sec->size;
4220 }
252b5132 4221
5efb6261 4222 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4223 {
4224 p->p_filesz += sec->size;
4225 p->p_memsz += sec->size;
4226 }
4b6c0f2f
NC
4227 /* PR ld/594: Sections in note segments which are not loaded
4228 contribute to the file size but not the in-memory size. */
4229 else if (p->p_type == PT_NOTE
4230 && (flags & SEC_HAS_CONTENTS) != 0)
4231 p->p_filesz += sec->size;
4232
b301b248
AM
4233 /* .tbss is special. It doesn't contribute to p_memsz of
4234 normal segments. */
4235 else if ((flags & SEC_THREAD_LOCAL) == 0
4236 || p->p_type == PT_TLS)
4237 p->p_memsz += sec->size;
252b5132 4238
13ae64f3 4239 if (p->p_type == PT_TLS
eea6121a 4240 && sec->size == 0
13ae64f3
JJ
4241 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4242 {
4243 struct bfd_link_order *o;
4244 bfd_vma tbss_size = 0;
4245
4246 for (o = sec->link_order_head; o != NULL; o = o->next)
4247 if (tbss_size < o->offset + o->size)
4248 tbss_size = o->offset + o->size;
4249
4250 p->p_memsz += tbss_size;
4251 }
4252
252b5132
RH
4253 if (align > p->p_align
4254 && (p->p_type != PT_LOAD || (abfd->flags & D_PAGED) == 0))
4255 p->p_align = align;
4256 }
4257
4258 if (! m->p_flags_valid)
4259 {
4260 p->p_flags |= PF_R;
4261 if ((flags & SEC_CODE) != 0)
4262 p->p_flags |= PF_X;
4263 if ((flags & SEC_READONLY) == 0)
4264 p->p_flags |= PF_W;
4265 }
4266 }
4267 }
4268
4269 /* Now that we have set the section file positions, we can set up
4270 the file positions for the non PT_LOAD segments. */
4271 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4272 m != NULL;
4273 m = m->next, p++)
4274 {
4275 if (p->p_type != PT_LOAD && m->count > 0)
4276 {
4277 BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs);
229fcec5
MM
4278 /* If the section has not yet been assigned a file position,
4279 do so now. The ARM BPABI requires that .dynamic section
4280 not be marked SEC_ALLOC because it is not part of any
4281 PT_LOAD segment, so it will not be processed above. */
4282 if (p->p_type == PT_DYNAMIC && m->sections[0]->filepos == 0)
4283 {
4284 unsigned int i;
4285 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4286
4287 i = 1;
4288 while (i_shdrpp[i]->bfd_section != m->sections[0])
4289 ++i;
4290 off = (_bfd_elf_assign_file_position_for_section
4291 (i_shdrpp[i], off, TRUE));
4292 p->p_filesz = m->sections[0]->size;
4293 }
252b5132
RH
4294 p->p_offset = m->sections[0]->filepos;
4295 }
4296 if (m->count == 0)
4297 {
4298 if (m->includes_filehdr)
4299 {
4300 p->p_vaddr = filehdr_vaddr;
4301 if (! m->p_paddr_valid)
4302 p->p_paddr = filehdr_paddr;
4303 }
4304 else if (m->includes_phdrs)
4305 {
4306 p->p_vaddr = phdrs_vaddr;
4307 if (! m->p_paddr_valid)
4308 p->p_paddr = phdrs_paddr;
4309 }
8c37241b
JJ
4310 else if (p->p_type == PT_GNU_RELRO)
4311 {
4312 Elf_Internal_Phdr *lp;
4313
4314 for (lp = phdrs; lp < phdrs + count; ++lp)
4315 {
4316 if (lp->p_type == PT_LOAD
4317 && lp->p_vaddr <= link_info->relro_end
4318 && lp->p_vaddr >= link_info->relro_start
4319 && lp->p_vaddr + lp->p_filesz
4320 >= link_info->relro_end)
4321 break;
4322 }
4323
4324 if (lp < phdrs + count
4325 && link_info->relro_end > lp->p_vaddr)
4326 {
4327 p->p_vaddr = lp->p_vaddr;
4328 p->p_paddr = lp->p_paddr;
4329 p->p_offset = lp->p_offset;
4330 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4331 p->p_memsz = p->p_filesz;
4332 p->p_align = 1;
4333 p->p_flags = (lp->p_flags & ~PF_W);
4334 }
4335 else
4336 {
4337 memset (p, 0, sizeof *p);
4338 p->p_type = PT_NULL;
4339 }
4340 }
252b5132
RH
4341 }
4342 }
4343
4344 /* Clear out any program headers we allocated but did not use. */
4345 for (; count < alloc; count++, p++)
4346 {
4347 memset (p, 0, sizeof *p);
4348 p->p_type = PT_NULL;
4349 }
4350
4351 elf_tdata (abfd)->phdr = phdrs;
4352
4353 elf_tdata (abfd)->next_file_pos = off;
4354
4355 /* Write out the program headers. */
dc810e39 4356 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
252b5132 4357 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0)
b34976b6 4358 return FALSE;
252b5132 4359
b34976b6 4360 return TRUE;
252b5132
RH
4361}
4362
4363/* Get the size of the program header.
4364
4365 If this is called by the linker before any of the section VMA's are set, it
4366 can't calculate the correct value for a strange memory layout. This only
4367 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4368 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4369 data segment (exclusive of .interp and .dynamic).
4370
4371 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4372 will be two segments. */
4373
4374static bfd_size_type
217aa764 4375get_program_header_size (bfd *abfd)
252b5132
RH
4376{
4377 size_t segs;
4378 asection *s;
9c5bfbb7 4379 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4380
4381 /* We can't return a different result each time we're called. */
4382 if (elf_tdata (abfd)->program_header_size != 0)
4383 return elf_tdata (abfd)->program_header_size;
4384
4385 if (elf_tdata (abfd)->segment_map != NULL)
4386 {
4387 struct elf_segment_map *m;
4388
4389 segs = 0;
4390 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4391 ++segs;
4392 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4393 return elf_tdata (abfd)->program_header_size;
4394 }
4395
4396 /* Assume we will need exactly two PT_LOAD segments: one for text
4397 and one for data. */
4398 segs = 2;
4399
4400 s = bfd_get_section_by_name (abfd, ".interp");
4401 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4402 {
4403 /* If we have a loadable interpreter section, we need a
4404 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4405 PT_PHDR segment, although that may not be true for all
252b5132
RH
4406 targets. */
4407 segs += 2;
4408 }
4409
4410 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4411 {
4412 /* We need a PT_DYNAMIC segment. */
4413 ++segs;
4414 }
4415
126495ed 4416 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4417 {
4418 /* We need a PT_GNU_EH_FRAME segment. */
4419 ++segs;
4420 }
4421
9ee5e499
JJ
4422 if (elf_tdata (abfd)->stack_flags)
4423 {
4424 /* We need a PT_GNU_STACK segment. */
4425 ++segs;
4426 }
4427
8c37241b
JJ
4428 if (elf_tdata (abfd)->relro)
4429 {
4430 /* We need a PT_GNU_RELRO segment. */
4431 ++segs;
4432 }
4433
252b5132
RH
4434 for (s = abfd->sections; s != NULL; s = s->next)
4435 {
4436 if ((s->flags & SEC_LOAD) != 0
4437 && strncmp (s->name, ".note", 5) == 0)
4438 {
4439 /* We need a PT_NOTE segment. */
4440 ++segs;
4441 }
4442 }
4443
13ae64f3
JJ
4444 for (s = abfd->sections; s != NULL; s = s->next)
4445 {
4446 if (s->flags & SEC_THREAD_LOCAL)
4447 {
4448 /* We need a PT_TLS segment. */
4449 ++segs;
4450 break;
4451 }
4452 }
4453
252b5132
RH
4454 /* Let the backend count up any program headers it might need. */
4455 if (bed->elf_backend_additional_program_headers)
4456 {
4457 int a;
4458
4459 a = (*bed->elf_backend_additional_program_headers) (abfd);
4460 if (a == -1)
4461 abort ();
4462 segs += a;
4463 }
4464
4465 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4466 return elf_tdata (abfd)->program_header_size;
4467}
4468
4469/* Work out the file positions of all the sections. This is called by
4470 _bfd_elf_compute_section_file_positions. All the section sizes and
4471 VMAs must be known before this is called.
4472
e0638f70
AM
4473 Reloc sections come in two flavours: Those processed specially as
4474 "side-channel" data attached to a section to which they apply, and
4475 those that bfd doesn't process as relocations. The latter sort are
4476 stored in a normal bfd section by bfd_section_from_shdr. We don't
4477 consider the former sort here, unless they form part of the loadable
4478 image. Reloc sections not assigned here will be handled later by
4479 assign_file_positions_for_relocs.
252b5132
RH
4480
4481 We also don't set the positions of the .symtab and .strtab here. */
4482
b34976b6 4483static bfd_boolean
c84fca4d
AO
4484assign_file_positions_except_relocs (bfd *abfd,
4485 struct bfd_link_info *link_info)
252b5132
RH
4486{
4487 struct elf_obj_tdata * const tdata = elf_tdata (abfd);
4488 Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd);
4489 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
9ad5cbcf 4490 unsigned int num_sec = elf_numsections (abfd);
252b5132 4491 file_ptr off;
9c5bfbb7 4492 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4493
4494 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4495 && bfd_get_format (abfd) != bfd_core)
4496 {
4497 Elf_Internal_Shdr **hdrpp;
4498 unsigned int i;
4499
4500 /* Start after the ELF header. */
4501 off = i_ehdrp->e_ehsize;
4502
4503 /* We are not creating an executable, which means that we are
4504 not creating a program header, and that the actual order of
4505 the sections in the file is unimportant. */
9ad5cbcf 4506 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4507 {
4508 Elf_Internal_Shdr *hdr;
4509
4510 hdr = *hdrpp;
e0638f70
AM
4511 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4512 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4513 || i == tdata->symtab_section
4514 || i == tdata->symtab_shndx_section
252b5132
RH
4515 || i == tdata->strtab_section)
4516 {
4517 hdr->sh_offset = -1;
252b5132 4518 }
9ad5cbcf 4519 else
b34976b6 4520 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4521
9ad5cbcf
AM
4522 if (i == SHN_LORESERVE - 1)
4523 {
4524 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4525 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4526 }
252b5132
RH
4527 }
4528 }
4529 else
4530 {
4531 unsigned int i;
4532 Elf_Internal_Shdr **hdrpp;
4533
4534 /* Assign file positions for the loaded sections based on the
4535 assignment of sections to segments. */
c84fca4d 4536 if (! assign_file_positions_for_segments (abfd, link_info))
b34976b6 4537 return FALSE;
252b5132
RH
4538
4539 /* Assign file positions for the other sections. */
4540
4541 off = elf_tdata (abfd)->next_file_pos;
9ad5cbcf 4542 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4543 {
4544 Elf_Internal_Shdr *hdr;
4545
4546 hdr = *hdrpp;
4547 if (hdr->bfd_section != NULL
4548 && hdr->bfd_section->filepos != 0)
4549 hdr->sh_offset = hdr->bfd_section->filepos;
4550 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4551 {
4552 ((*_bfd_error_handler)
b301b248
AM
4553 (_("%B: warning: allocated section `%s' not in segment"),
4554 abfd,
252b5132
RH
4555 (hdr->bfd_section == NULL
4556 ? "*unknown*"
4557 : hdr->bfd_section->name)));
4558 if ((abfd->flags & D_PAGED) != 0)
340b6d91
AC
4559 off += vma_page_aligned_bias (hdr->sh_addr, off,
4560 bed->maxpagesize);
252b5132 4561 else
340b6d91
AC
4562 off += vma_page_aligned_bias (hdr->sh_addr, off,
4563 hdr->sh_addralign);
252b5132 4564 off = _bfd_elf_assign_file_position_for_section (hdr, off,
b34976b6 4565 FALSE);
252b5132 4566 }
e0638f70
AM
4567 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4568 && hdr->bfd_section == NULL)
252b5132 4569 || hdr == i_shdrpp[tdata->symtab_section]
9ad5cbcf 4570 || hdr == i_shdrpp[tdata->symtab_shndx_section]
252b5132
RH
4571 || hdr == i_shdrpp[tdata->strtab_section])
4572 hdr->sh_offset = -1;
4573 else
b34976b6 4574 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf
AM
4575
4576 if (i == SHN_LORESERVE - 1)
4577 {
4578 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4579 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4580 }
252b5132
RH
4581 }
4582 }
4583
4584 /* Place the section headers. */
45d6a902 4585 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4586 i_ehdrp->e_shoff = off;
4587 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4588
4589 elf_tdata (abfd)->next_file_pos = off;
4590
b34976b6 4591 return TRUE;
252b5132
RH
4592}
4593
b34976b6 4594static bfd_boolean
217aa764 4595prep_headers (bfd *abfd)
252b5132
RH
4596{
4597 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4598 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4599 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4600 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4601 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4602
4603 i_ehdrp = elf_elfheader (abfd);
4604 i_shdrp = elf_elfsections (abfd);
4605
2b0f7ef9 4606 shstrtab = _bfd_elf_strtab_init ();
252b5132 4607 if (shstrtab == NULL)
b34976b6 4608 return FALSE;
252b5132
RH
4609
4610 elf_shstrtab (abfd) = shstrtab;
4611
4612 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4613 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4614 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4615 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4616
4617 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4618 i_ehdrp->e_ident[EI_DATA] =
4619 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4620 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4621
252b5132
RH
4622 if ((abfd->flags & DYNAMIC) != 0)
4623 i_ehdrp->e_type = ET_DYN;
4624 else if ((abfd->flags & EXEC_P) != 0)
4625 i_ehdrp->e_type = ET_EXEC;
4626 else if (bfd_get_format (abfd) == bfd_core)
4627 i_ehdrp->e_type = ET_CORE;
4628 else
4629 i_ehdrp->e_type = ET_REL;
4630
4631 switch (bfd_get_arch (abfd))
4632 {
4633 case bfd_arch_unknown:
4634 i_ehdrp->e_machine = EM_NONE;
4635 break;
aa4f99bb
AO
4636
4637 /* There used to be a long list of cases here, each one setting
4638 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4639 in the corresponding bfd definition. To avoid duplication,
4640 the switch was removed. Machines that need special handling
4641 can generally do it in elf_backend_final_write_processing(),
4642 unless they need the information earlier than the final write.
4643 Such need can generally be supplied by replacing the tests for
4644 e_machine with the conditions used to determine it. */
252b5132 4645 default:
9c5bfbb7
AM
4646 i_ehdrp->e_machine = bed->elf_machine_code;
4647 }
aa4f99bb 4648
252b5132
RH
4649 i_ehdrp->e_version = bed->s->ev_current;
4650 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4651
c044fabd 4652 /* No program header, for now. */
252b5132
RH
4653 i_ehdrp->e_phoff = 0;
4654 i_ehdrp->e_phentsize = 0;
4655 i_ehdrp->e_phnum = 0;
4656
c044fabd 4657 /* Each bfd section is section header entry. */
252b5132
RH
4658 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4659 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4660
c044fabd 4661 /* If we're building an executable, we'll need a program header table. */
252b5132 4662 if (abfd->flags & EXEC_P)
0e71e495
BE
4663 /* It all happens later. */
4664 ;
252b5132
RH
4665 else
4666 {
4667 i_ehdrp->e_phentsize = 0;
4668 i_phdrp = 0;
4669 i_ehdrp->e_phoff = 0;
4670 }
4671
4672 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4673 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4674 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4675 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4676 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4677 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4678 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4679 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4680 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4681 return FALSE;
252b5132 4682
b34976b6 4683 return TRUE;
252b5132
RH
4684}
4685
4686/* Assign file positions for all the reloc sections which are not part
4687 of the loadable file image. */
4688
4689void
217aa764 4690_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4691{
4692 file_ptr off;
9ad5cbcf 4693 unsigned int i, num_sec;
252b5132
RH
4694 Elf_Internal_Shdr **shdrpp;
4695
4696 off = elf_tdata (abfd)->next_file_pos;
4697
9ad5cbcf
AM
4698 num_sec = elf_numsections (abfd);
4699 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4700 {
4701 Elf_Internal_Shdr *shdrp;
4702
4703 shdrp = *shdrpp;
4704 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4705 && shdrp->sh_offset == -1)
b34976b6 4706 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4707 }
4708
4709 elf_tdata (abfd)->next_file_pos = off;
4710}
4711
b34976b6 4712bfd_boolean
217aa764 4713_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4714{
9c5bfbb7 4715 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4716 Elf_Internal_Ehdr *i_ehdrp;
4717 Elf_Internal_Shdr **i_shdrp;
b34976b6 4718 bfd_boolean failed;
9ad5cbcf 4719 unsigned int count, num_sec;
252b5132
RH
4720
4721 if (! abfd->output_has_begun
217aa764 4722 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4723 return FALSE;
252b5132
RH
4724
4725 i_shdrp = elf_elfsections (abfd);
4726 i_ehdrp = elf_elfheader (abfd);
4727
b34976b6 4728 failed = FALSE;
252b5132
RH
4729 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4730 if (failed)
b34976b6 4731 return FALSE;
252b5132
RH
4732
4733 _bfd_elf_assign_file_positions_for_relocs (abfd);
4734
c044fabd 4735 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4736 num_sec = elf_numsections (abfd);
4737 for (count = 1; count < num_sec; count++)
252b5132
RH
4738 {
4739 if (bed->elf_backend_section_processing)
4740 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4741 if (i_shdrp[count]->contents)
4742 {
dc810e39
AM
4743 bfd_size_type amt = i_shdrp[count]->sh_size;
4744
252b5132 4745 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4746 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4747 return FALSE;
252b5132 4748 }
9ad5cbcf
AM
4749 if (count == SHN_LORESERVE - 1)
4750 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4751 }
4752
4753 /* Write out the section header names. */
4754 if (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
2b0f7ef9 4755 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd)))
b34976b6 4756 return FALSE;
252b5132
RH
4757
4758 if (bed->elf_backend_final_write_processing)
4759 (*bed->elf_backend_final_write_processing) (abfd,
4760 elf_tdata (abfd)->linker);
4761
4762 return bed->s->write_shdrs_and_ehdr (abfd);
4763}
4764
b34976b6 4765bfd_boolean
217aa764 4766_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4767{
c044fabd 4768 /* Hopefully this can be done just like an object file. */
252b5132
RH
4769 return _bfd_elf_write_object_contents (abfd);
4770}
c044fabd
KH
4771
4772/* Given a section, search the header to find them. */
4773
252b5132 4774int
198beae2 4775_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4776{
9c5bfbb7 4777 const struct elf_backend_data *bed;
252b5132 4778 int index;
252b5132 4779
9ad5cbcf
AM
4780 if (elf_section_data (asect) != NULL
4781 && elf_section_data (asect)->this_idx != 0)
4782 return elf_section_data (asect)->this_idx;
4783
4784 if (bfd_is_abs_section (asect))
af746e92
AM
4785 index = SHN_ABS;
4786 else if (bfd_is_com_section (asect))
4787 index = SHN_COMMON;
4788 else if (bfd_is_und_section (asect))
4789 index = SHN_UNDEF;
4790 else
6dc132d9 4791 index = -1;
252b5132 4792
af746e92 4793 bed = get_elf_backend_data (abfd);
252b5132
RH
4794 if (bed->elf_backend_section_from_bfd_section)
4795 {
af746e92 4796 int retval = index;
9ad5cbcf 4797
af746e92
AM
4798 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
4799 return retval;
252b5132
RH
4800 }
4801
af746e92
AM
4802 if (index == -1)
4803 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 4804
af746e92 4805 return index;
252b5132
RH
4806}
4807
4808/* Given a BFD symbol, return the index in the ELF symbol table, or -1
4809 on error. */
4810
4811int
217aa764 4812_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
4813{
4814 asymbol *asym_ptr = *asym_ptr_ptr;
4815 int idx;
4816 flagword flags = asym_ptr->flags;
4817
4818 /* When gas creates relocations against local labels, it creates its
4819 own symbol for the section, but does put the symbol into the
4820 symbol chain, so udata is 0. When the linker is generating
4821 relocatable output, this section symbol may be for one of the
4822 input sections rather than the output section. */
4823 if (asym_ptr->udata.i == 0
4824 && (flags & BSF_SECTION_SYM)
4825 && asym_ptr->section)
4826 {
4827 int indx;
4828
4829 if (asym_ptr->section->output_section != NULL)
4830 indx = asym_ptr->section->output_section->index;
4831 else
4832 indx = asym_ptr->section->index;
4e89ac30
L
4833 if (indx < elf_num_section_syms (abfd)
4834 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
4835 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
4836 }
4837
4838 idx = asym_ptr->udata.i;
4839
4840 if (idx == 0)
4841 {
4842 /* This case can occur when using --strip-symbol on a symbol
4843 which is used in a relocation entry. */
4844 (*_bfd_error_handler)
d003868e
AM
4845 (_("%B: symbol `%s' required but not present"),
4846 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
4847 bfd_set_error (bfd_error_no_symbols);
4848 return -1;
4849 }
4850
4851#if DEBUG & 4
4852 {
4853 fprintf (stderr,
661a3fd4 4854 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
4855 (long) asym_ptr, asym_ptr->name, idx, flags,
4856 elf_symbol_flags (flags));
4857 fflush (stderr);
4858 }
4859#endif
4860
4861 return idx;
4862}
4863
4864/* Copy private BFD data. This copies any program header information. */
4865
b34976b6 4866static bfd_boolean
217aa764 4867copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132 4868{
b34976b6
AM
4869 Elf_Internal_Ehdr *iehdr;
4870 struct elf_segment_map *map;
4871 struct elf_segment_map *map_first;
4872 struct elf_segment_map **pointer_to_map;
4873 Elf_Internal_Phdr *segment;
4874 asection *section;
4875 unsigned int i;
4876 unsigned int num_segments;
4877 bfd_boolean phdr_included = FALSE;
4878 bfd_vma maxpagesize;
4879 struct elf_segment_map *phdr_adjust_seg = NULL;
4880 unsigned int phdr_adjust_num = 0;
9c5bfbb7 4881 const struct elf_backend_data *bed;
bc67d8a6 4882
c044fabd 4883 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 4884 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 4885 return TRUE;
252b5132
RH
4886
4887 if (elf_tdata (ibfd)->phdr == NULL)
b34976b6 4888 return TRUE;
252b5132 4889
caf47ea6 4890 bed = get_elf_backend_data (ibfd);
252b5132
RH
4891 iehdr = elf_elfheader (ibfd);
4892
bc67d8a6 4893 map_first = NULL;
c044fabd 4894 pointer_to_map = &map_first;
252b5132
RH
4895
4896 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
4897 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
4898
4899 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
4900#define SEGMENT_END(segment, start) \
4901 (start + (segment->p_memsz > segment->p_filesz \
4902 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 4903
eecdbe52
JJ
4904#define SECTION_SIZE(section, segment) \
4905 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
4906 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 4907 ? section->size : 0)
eecdbe52 4908
b34976b6 4909 /* Returns TRUE if the given section is contained within
bc67d8a6 4910 the given segment. VMA addresses are compared. */
aecc8f8a
AM
4911#define IS_CONTAINED_BY_VMA(section, segment) \
4912 (section->vma >= segment->p_vaddr \
eecdbe52 4913 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 4914 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 4915
b34976b6 4916 /* Returns TRUE if the given section is contained within
bc67d8a6 4917 the given segment. LMA addresses are compared. */
aecc8f8a
AM
4918#define IS_CONTAINED_BY_LMA(section, segment, base) \
4919 (section->lma >= base \
eecdbe52 4920 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 4921 <= SEGMENT_END (segment, base)))
252b5132 4922
c044fabd 4923 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
4924#define IS_COREFILE_NOTE(p, s) \
4925 (p->p_type == PT_NOTE \
4926 && bfd_get_format (ibfd) == bfd_core \
4927 && s->vma == 0 && s->lma == 0 \
4928 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 4929 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 4930 <= p->p_offset + p->p_filesz))
252b5132
RH
4931
4932 /* The complicated case when p_vaddr is 0 is to handle the Solaris
4933 linker, which generates a PT_INTERP section with p_vaddr and
4934 p_memsz set to 0. */
aecc8f8a
AM
4935#define IS_SOLARIS_PT_INTERP(p, s) \
4936 (p->p_vaddr == 0 \
4937 && p->p_paddr == 0 \
4938 && p->p_memsz == 0 \
4939 && p->p_filesz > 0 \
4940 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 4941 && s->size > 0 \
aecc8f8a 4942 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 4943 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 4944 <= p->p_offset + p->p_filesz))
5c440b1e 4945
bc67d8a6
NC
4946 /* Decide if the given section should be included in the given segment.
4947 A section will be included if:
f5ffc919
NC
4948 1. It is within the address space of the segment -- we use the LMA
4949 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
4950 2. It is an allocated segment,
4951 3. There is an output section associated with it,
eecdbe52 4952 4. The section has not already been allocated to a previous segment.
03394ac9
NC
4953 5. PT_GNU_STACK segments do not include any sections.
4954 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
4955 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
4956 8. PT_DYNAMIC should not contain empty sections at the beginning
4957 (with the possible exception of .dynamic). */
caf47ea6 4958#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
4959 ((((segment->p_paddr \
4960 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
4961 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 4962 && (section->flags & SEC_ALLOC) != 0) \
b6821651 4963 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 4964 && section->output_section != NULL \
03394ac9 4965 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
4966 && (segment->p_type != PT_TLS \
4967 || (section->flags & SEC_THREAD_LOCAL)) \
4968 && (segment->p_type == PT_LOAD \
4969 || segment->p_type == PT_TLS \
4970 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
4971 && (segment->p_type != PT_DYNAMIC \
4972 || SECTION_SIZE (section, segment) > 0 \
4973 || (segment->p_paddr \
4974 ? segment->p_paddr != section->lma \
4975 : segment->p_vaddr != section->vma) \
4976 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
4977 == 0)) \
82e51918 4978 && ! section->segment_mark)
bc67d8a6 4979
b34976b6 4980 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
4981#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
4982 (seg1->field >= SEGMENT_END (seg2, seg2->field))
4983
4984 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
4985 their VMA address ranges and their LMA address ranges overlap.
4986 It is possible to have overlapping VMA ranges without overlapping LMA
4987 ranges. RedBoot images for example can have both .data and .bss mapped
4988 to the same VMA range, but with the .data section mapped to a different
4989 LMA. */
aecc8f8a 4990#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
4991 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
4992 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
4993 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
4994 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
4995
4996 /* Initialise the segment mark field. */
4997 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 4998 section->segment_mark = FALSE;
bc67d8a6 4999
252b5132 5000 /* Scan through the segments specified in the program header
bc67d8a6 5001 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5002 in the loadable segments. These can be created by weird
aecc8f8a 5003 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5004 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5005 i < num_segments;
c044fabd 5006 i++, segment++)
252b5132 5007 {
252b5132 5008 unsigned int j;
c044fabd 5009 Elf_Internal_Phdr *segment2;
252b5132 5010
aecc8f8a
AM
5011 if (segment->p_type == PT_INTERP)
5012 for (section = ibfd->sections; section; section = section->next)
5013 if (IS_SOLARIS_PT_INTERP (segment, section))
5014 {
5015 /* Mininal change so that the normal section to segment
4cc11e76 5016 assignment code will work. */
aecc8f8a
AM
5017 segment->p_vaddr = section->vma;
5018 break;
5019 }
5020
bc67d8a6
NC
5021 if (segment->p_type != PT_LOAD)
5022 continue;
c044fabd 5023
bc67d8a6 5024 /* Determine if this segment overlaps any previous segments. */
c044fabd 5025 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5026 {
5027 bfd_signed_vma extra_length;
c044fabd 5028
bc67d8a6
NC
5029 if (segment2->p_type != PT_LOAD
5030 || ! SEGMENT_OVERLAPS (segment, segment2))
5031 continue;
c044fabd 5032
bc67d8a6
NC
5033 /* Merge the two segments together. */
5034 if (segment2->p_vaddr < segment->p_vaddr)
5035 {
c044fabd
KH
5036 /* Extend SEGMENT2 to include SEGMENT and then delete
5037 SEGMENT. */
bc67d8a6
NC
5038 extra_length =
5039 SEGMENT_END (segment, segment->p_vaddr)
5040 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5041
bc67d8a6
NC
5042 if (extra_length > 0)
5043 {
5044 segment2->p_memsz += extra_length;
5045 segment2->p_filesz += extra_length;
5046 }
c044fabd 5047
bc67d8a6 5048 segment->p_type = PT_NULL;
c044fabd 5049
bc67d8a6
NC
5050 /* Since we have deleted P we must restart the outer loop. */
5051 i = 0;
5052 segment = elf_tdata (ibfd)->phdr;
5053 break;
5054 }
5055 else
5056 {
c044fabd
KH
5057 /* Extend SEGMENT to include SEGMENT2 and then delete
5058 SEGMENT2. */
bc67d8a6
NC
5059 extra_length =
5060 SEGMENT_END (segment2, segment2->p_vaddr)
5061 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5062
bc67d8a6
NC
5063 if (extra_length > 0)
5064 {
5065 segment->p_memsz += extra_length;
5066 segment->p_filesz += extra_length;
5067 }
c044fabd 5068
bc67d8a6
NC
5069 segment2->p_type = PT_NULL;
5070 }
5071 }
5072 }
c044fabd 5073
bc67d8a6
NC
5074 /* The second scan attempts to assign sections to segments. */
5075 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5076 i < num_segments;
5077 i ++, segment ++)
5078 {
5079 unsigned int section_count;
5080 asection ** sections;
5081 asection * output_section;
5082 unsigned int isec;
5083 bfd_vma matching_lma;
5084 bfd_vma suggested_lma;
5085 unsigned int j;
dc810e39 5086 bfd_size_type amt;
bc67d8a6
NC
5087
5088 if (segment->p_type == PT_NULL)
5089 continue;
c044fabd 5090
bc67d8a6 5091 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5092 for (section = ibfd->sections, section_count = 0;
5093 section != NULL;
5094 section = section->next)
caf47ea6 5095 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5096 ++section_count;
811072d8 5097
b5f852ea
NC
5098 /* Allocate a segment map big enough to contain
5099 all of the sections we have selected. */
dc810e39
AM
5100 amt = sizeof (struct elf_segment_map);
5101 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5102 map = bfd_alloc (obfd, amt);
bc67d8a6 5103 if (map == NULL)
b34976b6 5104 return FALSE;
252b5132
RH
5105
5106 /* Initialise the fields of the segment map. Default to
5107 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5108 map->next = NULL;
5109 map->p_type = segment->p_type;
5110 map->p_flags = segment->p_flags;
5111 map->p_flags_valid = 1;
5112 map->p_paddr = segment->p_paddr;
5113 map->p_paddr_valid = 1;
252b5132
RH
5114
5115 /* Determine if this segment contains the ELF file header
5116 and if it contains the program headers themselves. */
bc67d8a6
NC
5117 map->includes_filehdr = (segment->p_offset == 0
5118 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5119
bc67d8a6 5120 map->includes_phdrs = 0;
252b5132 5121
bc67d8a6 5122 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5123 {
bc67d8a6
NC
5124 map->includes_phdrs =
5125 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5126 && (segment->p_offset + segment->p_filesz
252b5132
RH
5127 >= ((bfd_vma) iehdr->e_phoff
5128 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5129
bc67d8a6 5130 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5131 phdr_included = TRUE;
252b5132
RH
5132 }
5133
bc67d8a6 5134 if (section_count == 0)
252b5132
RH
5135 {
5136 /* Special segments, such as the PT_PHDR segment, may contain
5137 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5138 something. They are allowed by the ELF spec however, so only
5139 a warning is produced. */
bc67d8a6 5140 if (segment->p_type == PT_LOAD)
caf47ea6 5141 (*_bfd_error_handler)
d003868e
AM
5142 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5143 ibfd);
252b5132 5144
bc67d8a6 5145 map->count = 0;
c044fabd
KH
5146 *pointer_to_map = map;
5147 pointer_to_map = &map->next;
252b5132
RH
5148
5149 continue;
5150 }
5151
5152 /* Now scan the sections in the input BFD again and attempt
5153 to add their corresponding output sections to the segment map.
5154 The problem here is how to handle an output section which has
5155 been moved (ie had its LMA changed). There are four possibilities:
5156
5157 1. None of the sections have been moved.
5158 In this case we can continue to use the segment LMA from the
5159 input BFD.
5160
5161 2. All of the sections have been moved by the same amount.
5162 In this case we can change the segment's LMA to match the LMA
5163 of the first section.
5164
5165 3. Some of the sections have been moved, others have not.
5166 In this case those sections which have not been moved can be
5167 placed in the current segment which will have to have its size,
5168 and possibly its LMA changed, and a new segment or segments will
5169 have to be created to contain the other sections.
5170
b5f852ea 5171 4. The sections have been moved, but not by the same amount.
252b5132
RH
5172 In this case we can change the segment's LMA to match the LMA
5173 of the first section and we will have to create a new segment
5174 or segments to contain the other sections.
5175
5176 In order to save time, we allocate an array to hold the section
5177 pointers that we are interested in. As these sections get assigned
5178 to a segment, they are removed from this array. */
5179
0b14c2aa
L
5180 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5181 to work around this long long bug. */
5182 amt = section_count * sizeof (asection *);
217aa764 5183 sections = bfd_malloc (amt);
252b5132 5184 if (sections == NULL)
b34976b6 5185 return FALSE;
252b5132
RH
5186
5187 /* Step One: Scan for segment vs section LMA conflicts.
5188 Also add the sections to the section array allocated above.
5189 Also add the sections to the current segment. In the common
5190 case, where the sections have not been moved, this means that
5191 we have completely filled the segment, and there is nothing
5192 more to do. */
252b5132 5193 isec = 0;
72730e0c 5194 matching_lma = 0;
252b5132
RH
5195 suggested_lma = 0;
5196
bc67d8a6
NC
5197 for (j = 0, section = ibfd->sections;
5198 section != NULL;
5199 section = section->next)
252b5132 5200 {
caf47ea6 5201 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5202 {
bc67d8a6
NC
5203 output_section = section->output_section;
5204
5205 sections[j ++] = section;
252b5132
RH
5206
5207 /* The Solaris native linker always sets p_paddr to 0.
5208 We try to catch that case here, and set it to the
5e8d7549
NC
5209 correct value. Note - some backends require that
5210 p_paddr be left as zero. */
bc67d8a6 5211 if (segment->p_paddr == 0
4455705d 5212 && segment->p_vaddr != 0
5e8d7549 5213 && (! bed->want_p_paddr_set_to_zero)
252b5132 5214 && isec == 0
bc67d8a6
NC
5215 && output_section->lma != 0
5216 && (output_section->vma == (segment->p_vaddr
5217 + (map->includes_filehdr
5218 ? iehdr->e_ehsize
5219 : 0)
5220 + (map->includes_phdrs
079e9a2f
AM
5221 ? (iehdr->e_phnum
5222 * iehdr->e_phentsize)
bc67d8a6
NC
5223 : 0))))
5224 map->p_paddr = segment->p_vaddr;
252b5132
RH
5225
5226 /* Match up the physical address of the segment with the
5227 LMA address of the output section. */
bc67d8a6 5228 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5229 || IS_COREFILE_NOTE (segment, section)
5230 || (bed->want_p_paddr_set_to_zero &&
5231 IS_CONTAINED_BY_VMA (output_section, segment))
5232 )
252b5132
RH
5233 {
5234 if (matching_lma == 0)
bc67d8a6 5235 matching_lma = output_section->lma;
252b5132
RH
5236
5237 /* We assume that if the section fits within the segment
bc67d8a6 5238 then it does not overlap any other section within that
252b5132 5239 segment. */
bc67d8a6 5240 map->sections[isec ++] = output_section;
252b5132
RH
5241 }
5242 else if (suggested_lma == 0)
bc67d8a6 5243 suggested_lma = output_section->lma;
252b5132
RH
5244 }
5245 }
5246
bc67d8a6 5247 BFD_ASSERT (j == section_count);
252b5132
RH
5248
5249 /* Step Two: Adjust the physical address of the current segment,
5250 if necessary. */
bc67d8a6 5251 if (isec == section_count)
252b5132
RH
5252 {
5253 /* All of the sections fitted within the segment as currently
5254 specified. This is the default case. Add the segment to
5255 the list of built segments and carry on to process the next
5256 program header in the input BFD. */
bc67d8a6 5257 map->count = section_count;
c044fabd
KH
5258 *pointer_to_map = map;
5259 pointer_to_map = &map->next;
252b5132
RH
5260
5261 free (sections);
5262 continue;
5263 }
252b5132
RH
5264 else
5265 {
72730e0c
AM
5266 if (matching_lma != 0)
5267 {
5268 /* At least one section fits inside the current segment.
5269 Keep it, but modify its physical address to match the
5270 LMA of the first section that fitted. */
bc67d8a6 5271 map->p_paddr = matching_lma;
72730e0c
AM
5272 }
5273 else
5274 {
5275 /* None of the sections fitted inside the current segment.
5276 Change the current segment's physical address to match
5277 the LMA of the first section. */
bc67d8a6 5278 map->p_paddr = suggested_lma;
72730e0c
AM
5279 }
5280
bc67d8a6
NC
5281 /* Offset the segment physical address from the lma
5282 to allow for space taken up by elf headers. */
5283 if (map->includes_filehdr)
5284 map->p_paddr -= iehdr->e_ehsize;
252b5132 5285
bc67d8a6
NC
5286 if (map->includes_phdrs)
5287 {
5288 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5289
5290 /* iehdr->e_phnum is just an estimate of the number
5291 of program headers that we will need. Make a note
5292 here of the number we used and the segment we chose
5293 to hold these headers, so that we can adjust the
5294 offset when we know the correct value. */
5295 phdr_adjust_num = iehdr->e_phnum;
5296 phdr_adjust_seg = map;
5297 }
252b5132
RH
5298 }
5299
5300 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5301 those that fit to the current segment and removing them from the
252b5132
RH
5302 sections array; but making sure not to leave large gaps. Once all
5303 possible sections have been assigned to the current segment it is
5304 added to the list of built segments and if sections still remain
5305 to be assigned, a new segment is constructed before repeating
5306 the loop. */
5307 isec = 0;
5308 do
5309 {
bc67d8a6 5310 map->count = 0;
252b5132
RH
5311 suggested_lma = 0;
5312
5313 /* Fill the current segment with sections that fit. */
bc67d8a6 5314 for (j = 0; j < section_count; j++)
252b5132 5315 {
bc67d8a6 5316 section = sections[j];
252b5132 5317
bc67d8a6 5318 if (section == NULL)
252b5132
RH
5319 continue;
5320
bc67d8a6 5321 output_section = section->output_section;
252b5132 5322
bc67d8a6 5323 BFD_ASSERT (output_section != NULL);
c044fabd 5324
bc67d8a6
NC
5325 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5326 || IS_COREFILE_NOTE (segment, section))
252b5132 5327 {
bc67d8a6 5328 if (map->count == 0)
252b5132
RH
5329 {
5330 /* If the first section in a segment does not start at
bc67d8a6
NC
5331 the beginning of the segment, then something is
5332 wrong. */
5333 if (output_section->lma !=
5334 (map->p_paddr
5335 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5336 + (map->includes_phdrs
5337 ? iehdr->e_phnum * iehdr->e_phentsize
5338 : 0)))
252b5132
RH
5339 abort ();
5340 }
5341 else
5342 {
5343 asection * prev_sec;
252b5132 5344
bc67d8a6 5345 prev_sec = map->sections[map->count - 1];
252b5132
RH
5346
5347 /* If the gap between the end of the previous section
bc67d8a6
NC
5348 and the start of this section is more than
5349 maxpagesize then we need to start a new segment. */
eea6121a 5350 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5351 maxpagesize)
caf47ea6 5352 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5353 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5354 > output_section->lma))
252b5132
RH
5355 {
5356 if (suggested_lma == 0)
bc67d8a6 5357 suggested_lma = output_section->lma;
252b5132
RH
5358
5359 continue;
5360 }
5361 }
5362
bc67d8a6 5363 map->sections[map->count++] = output_section;
252b5132
RH
5364 ++isec;
5365 sections[j] = NULL;
b34976b6 5366 section->segment_mark = TRUE;
252b5132
RH
5367 }
5368 else if (suggested_lma == 0)
bc67d8a6 5369 suggested_lma = output_section->lma;
252b5132
RH
5370 }
5371
bc67d8a6 5372 BFD_ASSERT (map->count > 0);
252b5132
RH
5373
5374 /* Add the current segment to the list of built segments. */
c044fabd
KH
5375 *pointer_to_map = map;
5376 pointer_to_map = &map->next;
252b5132 5377
bc67d8a6 5378 if (isec < section_count)
252b5132
RH
5379 {
5380 /* We still have not allocated all of the sections to
5381 segments. Create a new segment here, initialise it
5382 and carry on looping. */
dc810e39
AM
5383 amt = sizeof (struct elf_segment_map);
5384 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5385 map = bfd_alloc (obfd, amt);
bc67d8a6 5386 if (map == NULL)
5ed6aba4
NC
5387 {
5388 free (sections);
5389 return FALSE;
5390 }
252b5132
RH
5391
5392 /* Initialise the fields of the segment map. Set the physical
5393 physical address to the LMA of the first section that has
5394 not yet been assigned. */
bc67d8a6
NC
5395 map->next = NULL;
5396 map->p_type = segment->p_type;
5397 map->p_flags = segment->p_flags;
5398 map->p_flags_valid = 1;
5399 map->p_paddr = suggested_lma;
5400 map->p_paddr_valid = 1;
5401 map->includes_filehdr = 0;
5402 map->includes_phdrs = 0;
252b5132
RH
5403 }
5404 }
bc67d8a6 5405 while (isec < section_count);
252b5132
RH
5406
5407 free (sections);
5408 }
5409
5410 /* The Solaris linker creates program headers in which all the
5411 p_paddr fields are zero. When we try to objcopy or strip such a
5412 file, we get confused. Check for this case, and if we find it
5413 reset the p_paddr_valid fields. */
bc67d8a6
NC
5414 for (map = map_first; map != NULL; map = map->next)
5415 if (map->p_paddr != 0)
252b5132 5416 break;
bc67d8a6 5417 if (map == NULL)
b5f852ea
NC
5418 for (map = map_first; map != NULL; map = map->next)
5419 map->p_paddr_valid = 0;
252b5132 5420
bc67d8a6
NC
5421 elf_tdata (obfd)->segment_map = map_first;
5422
5423 /* If we had to estimate the number of program headers that were
9ad5cbcf 5424 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5425 the offset if necessary. */
5426 if (phdr_adjust_seg != NULL)
5427 {
5428 unsigned int count;
c044fabd 5429
bc67d8a6 5430 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5431 count++;
252b5132 5432
bc67d8a6
NC
5433 if (count > phdr_adjust_num)
5434 phdr_adjust_seg->p_paddr
5435 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5436 }
c044fabd 5437
bc67d8a6 5438#undef SEGMENT_END
eecdbe52 5439#undef SECTION_SIZE
bc67d8a6
NC
5440#undef IS_CONTAINED_BY_VMA
5441#undef IS_CONTAINED_BY_LMA
252b5132 5442#undef IS_COREFILE_NOTE
bc67d8a6
NC
5443#undef IS_SOLARIS_PT_INTERP
5444#undef INCLUDE_SECTION_IN_SEGMENT
5445#undef SEGMENT_AFTER_SEGMENT
5446#undef SEGMENT_OVERLAPS
b34976b6 5447 return TRUE;
252b5132
RH
5448}
5449
5450/* Copy private section information. This copies over the entsize
5451 field, and sometimes the info field. */
5452
b34976b6 5453bfd_boolean
217aa764
AM
5454_bfd_elf_copy_private_section_data (bfd *ibfd,
5455 asection *isec,
5456 bfd *obfd,
5457 asection *osec)
252b5132
RH
5458{
5459 Elf_Internal_Shdr *ihdr, *ohdr;
5460
5461 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5462 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5463 return TRUE;
252b5132 5464
252b5132
RH
5465 ihdr = &elf_section_data (isec)->this_hdr;
5466 ohdr = &elf_section_data (osec)->this_hdr;
5467
5468 ohdr->sh_entsize = ihdr->sh_entsize;
5469
5470 if (ihdr->sh_type == SHT_SYMTAB
5471 || ihdr->sh_type == SHT_DYNSYM
5472 || ihdr->sh_type == SHT_GNU_verneed
5473 || ihdr->sh_type == SHT_GNU_verdef)
5474 ohdr->sh_info = ihdr->sh_info;
5475
9dce4196
AM
5476 /* Set things up for objcopy. The output SHT_GROUP section will
5477 have its elf_next_in_group pointing back to the input group
5478 members. */
5479 elf_next_in_group (osec) = elf_next_in_group (isec);
5480 elf_group_name (osec) = elf_group_name (isec);
5481
68bfbfcc 5482 osec->use_rela_p = isec->use_rela_p;
bf572ba0 5483
b34976b6 5484 return TRUE;
252b5132
RH
5485}
5486
80fccad2
BW
5487/* Copy private header information. */
5488
5489bfd_boolean
5490_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
5491{
5492 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5493 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5494 return TRUE;
5495
5496 /* Copy over private BFD data if it has not already been copied.
5497 This must be done here, rather than in the copy_private_bfd_data
5498 entry point, because the latter is called after the section
5499 contents have been set, which means that the program headers have
5500 already been worked out. */
5501 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
5502 {
5503 if (! copy_private_bfd_data (ibfd, obfd))
5504 return FALSE;
5505 }
5506
5507 return TRUE;
5508}
5509
252b5132
RH
5510/* Copy private symbol information. If this symbol is in a section
5511 which we did not map into a BFD section, try to map the section
5512 index correctly. We use special macro definitions for the mapped
5513 section indices; these definitions are interpreted by the
5514 swap_out_syms function. */
5515
9ad5cbcf
AM
5516#define MAP_ONESYMTAB (SHN_HIOS + 1)
5517#define MAP_DYNSYMTAB (SHN_HIOS + 2)
5518#define MAP_STRTAB (SHN_HIOS + 3)
5519#define MAP_SHSTRTAB (SHN_HIOS + 4)
5520#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 5521
b34976b6 5522bfd_boolean
217aa764
AM
5523_bfd_elf_copy_private_symbol_data (bfd *ibfd,
5524 asymbol *isymarg,
5525 bfd *obfd,
5526 asymbol *osymarg)
252b5132
RH
5527{
5528 elf_symbol_type *isym, *osym;
5529
5530 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5531 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5532 return TRUE;
252b5132
RH
5533
5534 isym = elf_symbol_from (ibfd, isymarg);
5535 osym = elf_symbol_from (obfd, osymarg);
5536
5537 if (isym != NULL
5538 && osym != NULL
5539 && bfd_is_abs_section (isym->symbol.section))
5540 {
5541 unsigned int shndx;
5542
5543 shndx = isym->internal_elf_sym.st_shndx;
5544 if (shndx == elf_onesymtab (ibfd))
5545 shndx = MAP_ONESYMTAB;
5546 else if (shndx == elf_dynsymtab (ibfd))
5547 shndx = MAP_DYNSYMTAB;
5548 else if (shndx == elf_tdata (ibfd)->strtab_section)
5549 shndx = MAP_STRTAB;
5550 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
5551 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
5552 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
5553 shndx = MAP_SYM_SHNDX;
252b5132
RH
5554 osym->internal_elf_sym.st_shndx = shndx;
5555 }
5556
b34976b6 5557 return TRUE;
252b5132
RH
5558}
5559
5560/* Swap out the symbols. */
5561
b34976b6 5562static bfd_boolean
217aa764
AM
5563swap_out_syms (bfd *abfd,
5564 struct bfd_strtab_hash **sttp,
5565 int relocatable_p)
252b5132 5566{
9c5bfbb7 5567 const struct elf_backend_data *bed;
079e9a2f
AM
5568 int symcount;
5569 asymbol **syms;
5570 struct bfd_strtab_hash *stt;
5571 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 5572 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 5573 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
5574 bfd_byte *outbound_syms;
5575 bfd_byte *outbound_shndx;
079e9a2f
AM
5576 int idx;
5577 bfd_size_type amt;
174fd7f9 5578 bfd_boolean name_local_sections;
252b5132
RH
5579
5580 if (!elf_map_symbols (abfd))
b34976b6 5581 return FALSE;
252b5132 5582
c044fabd 5583 /* Dump out the symtabs. */
079e9a2f
AM
5584 stt = _bfd_elf_stringtab_init ();
5585 if (stt == NULL)
b34976b6 5586 return FALSE;
252b5132 5587
079e9a2f
AM
5588 bed = get_elf_backend_data (abfd);
5589 symcount = bfd_get_symcount (abfd);
5590 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5591 symtab_hdr->sh_type = SHT_SYMTAB;
5592 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
5593 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
5594 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 5595 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
5596
5597 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5598 symstrtab_hdr->sh_type = SHT_STRTAB;
5599
5600 amt = (bfd_size_type) (1 + symcount) * bed->s->sizeof_sym;
5601 outbound_syms = bfd_alloc (abfd, amt);
5602 if (outbound_syms == NULL)
5ed6aba4
NC
5603 {
5604 _bfd_stringtab_free (stt);
5605 return FALSE;
5606 }
217aa764 5607 symtab_hdr->contents = outbound_syms;
252b5132 5608
9ad5cbcf
AM
5609 outbound_shndx = NULL;
5610 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5611 if (symtab_shndx_hdr->sh_name != 0)
5612 {
5613 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
1126897b 5614 outbound_shndx = bfd_zalloc (abfd, amt);
9ad5cbcf 5615 if (outbound_shndx == NULL)
5ed6aba4
NC
5616 {
5617 _bfd_stringtab_free (stt);
5618 return FALSE;
5619 }
5620
9ad5cbcf
AM
5621 symtab_shndx_hdr->contents = outbound_shndx;
5622 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5623 symtab_shndx_hdr->sh_size = amt;
5624 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5625 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5626 }
5627
589e6347 5628 /* Now generate the data (for "contents"). */
079e9a2f
AM
5629 {
5630 /* Fill in zeroth symbol and swap it out. */
5631 Elf_Internal_Sym sym;
5632 sym.st_name = 0;
5633 sym.st_value = 0;
5634 sym.st_size = 0;
5635 sym.st_info = 0;
5636 sym.st_other = 0;
5637 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 5638 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5639 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5640 if (outbound_shndx != NULL)
5641 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5642 }
252b5132 5643
174fd7f9
RS
5644 name_local_sections
5645 = (bed->elf_backend_name_local_section_symbols
5646 && bed->elf_backend_name_local_section_symbols (abfd));
5647
079e9a2f
AM
5648 syms = bfd_get_outsymbols (abfd);
5649 for (idx = 0; idx < symcount; idx++)
252b5132 5650 {
252b5132 5651 Elf_Internal_Sym sym;
079e9a2f
AM
5652 bfd_vma value = syms[idx]->value;
5653 elf_symbol_type *type_ptr;
5654 flagword flags = syms[idx]->flags;
5655 int type;
252b5132 5656
174fd7f9
RS
5657 if (!name_local_sections
5658 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
5659 {
5660 /* Local section symbols have no name. */
5661 sym.st_name = 0;
5662 }
5663 else
5664 {
5665 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
5666 syms[idx]->name,
b34976b6 5667 TRUE, FALSE);
079e9a2f 5668 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
5669 {
5670 _bfd_stringtab_free (stt);
5671 return FALSE;
5672 }
079e9a2f 5673 }
252b5132 5674
079e9a2f 5675 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 5676
079e9a2f
AM
5677 if ((flags & BSF_SECTION_SYM) == 0
5678 && bfd_is_com_section (syms[idx]->section))
5679 {
5680 /* ELF common symbols put the alignment into the `value' field,
5681 and the size into the `size' field. This is backwards from
5682 how BFD handles it, so reverse it here. */
5683 sym.st_size = value;
5684 if (type_ptr == NULL
5685 || type_ptr->internal_elf_sym.st_value == 0)
5686 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
5687 else
5688 sym.st_value = type_ptr->internal_elf_sym.st_value;
5689 sym.st_shndx = _bfd_elf_section_from_bfd_section
5690 (abfd, syms[idx]->section);
5691 }
5692 else
5693 {
5694 asection *sec = syms[idx]->section;
5695 int shndx;
252b5132 5696
079e9a2f
AM
5697 if (sec->output_section)
5698 {
5699 value += sec->output_offset;
5700 sec = sec->output_section;
5701 }
589e6347 5702
079e9a2f
AM
5703 /* Don't add in the section vma for relocatable output. */
5704 if (! relocatable_p)
5705 value += sec->vma;
5706 sym.st_value = value;
5707 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
5708
5709 if (bfd_is_abs_section (sec)
5710 && type_ptr != NULL
5711 && type_ptr->internal_elf_sym.st_shndx != 0)
5712 {
5713 /* This symbol is in a real ELF section which we did
5714 not create as a BFD section. Undo the mapping done
5715 by copy_private_symbol_data. */
5716 shndx = type_ptr->internal_elf_sym.st_shndx;
5717 switch (shndx)
5718 {
5719 case MAP_ONESYMTAB:
5720 shndx = elf_onesymtab (abfd);
5721 break;
5722 case MAP_DYNSYMTAB:
5723 shndx = elf_dynsymtab (abfd);
5724 break;
5725 case MAP_STRTAB:
5726 shndx = elf_tdata (abfd)->strtab_section;
5727 break;
5728 case MAP_SHSTRTAB:
5729 shndx = elf_tdata (abfd)->shstrtab_section;
5730 break;
9ad5cbcf
AM
5731 case MAP_SYM_SHNDX:
5732 shndx = elf_tdata (abfd)->symtab_shndx_section;
5733 break;
079e9a2f
AM
5734 default:
5735 break;
5736 }
5737 }
5738 else
5739 {
5740 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 5741
079e9a2f
AM
5742 if (shndx == -1)
5743 {
5744 asection *sec2;
5745
5746 /* Writing this would be a hell of a lot easier if
5747 we had some decent documentation on bfd, and
5748 knew what to expect of the library, and what to
5749 demand of applications. For example, it
5750 appears that `objcopy' might not set the
5751 section of a symbol to be a section that is
5752 actually in the output file. */
5753 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
5754 if (sec2 == NULL)
5755 {
5756 _bfd_error_handler (_("\
5757Unable to find equivalent output section for symbol '%s' from section '%s'"),
5758 syms[idx]->name ? syms[idx]->name : "<Local sym>",
5759 sec->name);
811072d8 5760 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 5761 _bfd_stringtab_free (stt);
589e6347
NC
5762 return FALSE;
5763 }
811072d8 5764
079e9a2f
AM
5765 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
5766 BFD_ASSERT (shndx != -1);
5767 }
5768 }
252b5132 5769
079e9a2f
AM
5770 sym.st_shndx = shndx;
5771 }
252b5132 5772
13ae64f3
JJ
5773 if ((flags & BSF_THREAD_LOCAL) != 0)
5774 type = STT_TLS;
5775 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
5776 type = STT_FUNC;
5777 else if ((flags & BSF_OBJECT) != 0)
5778 type = STT_OBJECT;
5779 else
5780 type = STT_NOTYPE;
252b5132 5781
13ae64f3
JJ
5782 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
5783 type = STT_TLS;
5784
589e6347 5785 /* Processor-specific types. */
079e9a2f
AM
5786 if (type_ptr != NULL
5787 && bed->elf_backend_get_symbol_type)
5788 type = ((*bed->elf_backend_get_symbol_type)
5789 (&type_ptr->internal_elf_sym, type));
252b5132 5790
079e9a2f
AM
5791 if (flags & BSF_SECTION_SYM)
5792 {
5793 if (flags & BSF_GLOBAL)
5794 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
5795 else
5796 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5797 }
5798 else if (bfd_is_com_section (syms[idx]->section))
5799 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
5800 else if (bfd_is_und_section (syms[idx]->section))
5801 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
5802 ? STB_WEAK
5803 : STB_GLOBAL),
5804 type);
5805 else if (flags & BSF_FILE)
5806 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
5807 else
5808 {
5809 int bind = STB_LOCAL;
252b5132 5810
079e9a2f
AM
5811 if (flags & BSF_LOCAL)
5812 bind = STB_LOCAL;
5813 else if (flags & BSF_WEAK)
5814 bind = STB_WEAK;
5815 else if (flags & BSF_GLOBAL)
5816 bind = STB_GLOBAL;
252b5132 5817
079e9a2f
AM
5818 sym.st_info = ELF_ST_INFO (bind, type);
5819 }
252b5132 5820
079e9a2f
AM
5821 if (type_ptr != NULL)
5822 sym.st_other = type_ptr->internal_elf_sym.st_other;
5823 else
5824 sym.st_other = 0;
252b5132 5825
9ad5cbcf 5826 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5827 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5828 if (outbound_shndx != NULL)
5829 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5830 }
252b5132 5831
079e9a2f
AM
5832 *sttp = stt;
5833 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
5834 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 5835
079e9a2f
AM
5836 symstrtab_hdr->sh_flags = 0;
5837 symstrtab_hdr->sh_addr = 0;
5838 symstrtab_hdr->sh_entsize = 0;
5839 symstrtab_hdr->sh_link = 0;
5840 symstrtab_hdr->sh_info = 0;
5841 symstrtab_hdr->sh_addralign = 1;
252b5132 5842
b34976b6 5843 return TRUE;
252b5132
RH
5844}
5845
5846/* Return the number of bytes required to hold the symtab vector.
5847
5848 Note that we base it on the count plus 1, since we will null terminate
5849 the vector allocated based on this size. However, the ELF symbol table
5850 always has a dummy entry as symbol #0, so it ends up even. */
5851
5852long
217aa764 5853_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
5854{
5855 long symcount;
5856 long symtab_size;
5857 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
5858
5859 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
5860 symtab_size = (symcount + 1) * (sizeof (asymbol *));
5861 if (symcount > 0)
5862 symtab_size -= sizeof (asymbol *);
252b5132
RH
5863
5864 return symtab_size;
5865}
5866
5867long
217aa764 5868_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
5869{
5870 long symcount;
5871 long symtab_size;
5872 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
5873
5874 if (elf_dynsymtab (abfd) == 0)
5875 {
5876 bfd_set_error (bfd_error_invalid_operation);
5877 return -1;
5878 }
5879
5880 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
5881 symtab_size = (symcount + 1) * (sizeof (asymbol *));
5882 if (symcount > 0)
5883 symtab_size -= sizeof (asymbol *);
252b5132
RH
5884
5885 return symtab_size;
5886}
5887
5888long
217aa764
AM
5889_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
5890 sec_ptr asect)
252b5132
RH
5891{
5892 return (asect->reloc_count + 1) * sizeof (arelent *);
5893}
5894
5895/* Canonicalize the relocs. */
5896
5897long
217aa764
AM
5898_bfd_elf_canonicalize_reloc (bfd *abfd,
5899 sec_ptr section,
5900 arelent **relptr,
5901 asymbol **symbols)
252b5132
RH
5902{
5903 arelent *tblptr;
5904 unsigned int i;
9c5bfbb7 5905 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5906
b34976b6 5907 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
5908 return -1;
5909
5910 tblptr = section->relocation;
5911 for (i = 0; i < section->reloc_count; i++)
5912 *relptr++ = tblptr++;
5913
5914 *relptr = NULL;
5915
5916 return section->reloc_count;
5917}
5918
5919long
6cee3f79 5920_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 5921{
9c5bfbb7 5922 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 5923 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
5924
5925 if (symcount >= 0)
5926 bfd_get_symcount (abfd) = symcount;
5927 return symcount;
5928}
5929
5930long
217aa764
AM
5931_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
5932 asymbol **allocation)
252b5132 5933{
9c5bfbb7 5934 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 5935 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
5936
5937 if (symcount >= 0)
5938 bfd_get_dynamic_symcount (abfd) = symcount;
5939 return symcount;
252b5132
RH
5940}
5941
8615f3f2
AM
5942/* Return the size required for the dynamic reloc entries. Any loadable
5943 section that was actually installed in the BFD, and has type SHT_REL
5944 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
5945 dynamic reloc section. */
252b5132
RH
5946
5947long
217aa764 5948_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
5949{
5950 long ret;
5951 asection *s;
5952
5953 if (elf_dynsymtab (abfd) == 0)
5954 {
5955 bfd_set_error (bfd_error_invalid_operation);
5956 return -1;
5957 }
5958
5959 ret = sizeof (arelent *);
5960 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
5961 if ((s->flags & SEC_LOAD) != 0
5962 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
5963 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
5964 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 5965 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
5966 * sizeof (arelent *));
5967
5968 return ret;
5969}
5970
8615f3f2
AM
5971/* Canonicalize the dynamic relocation entries. Note that we return the
5972 dynamic relocations as a single block, although they are actually
5973 associated with particular sections; the interface, which was
5974 designed for SunOS style shared libraries, expects that there is only
5975 one set of dynamic relocs. Any loadable section that was actually
5976 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
5977 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
5978
5979long
217aa764
AM
5980_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
5981 arelent **storage,
5982 asymbol **syms)
252b5132 5983{
217aa764 5984 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
5985 asection *s;
5986 long ret;
5987
5988 if (elf_dynsymtab (abfd) == 0)
5989 {
5990 bfd_set_error (bfd_error_invalid_operation);
5991 return -1;
5992 }
5993
5994 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
5995 ret = 0;
5996 for (s = abfd->sections; s != NULL; s = s->next)
5997 {
8615f3f2
AM
5998 if ((s->flags & SEC_LOAD) != 0
5999 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6000 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6001 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6002 {
6003 arelent *p;
6004 long count, i;
6005
b34976b6 6006 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6007 return -1;
eea6121a 6008 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6009 p = s->relocation;
6010 for (i = 0; i < count; i++)
6011 *storage++ = p++;
6012 ret += count;
6013 }
6014 }
6015
6016 *storage = NULL;
6017
6018 return ret;
6019}
6020\f
6021/* Read in the version information. */
6022
b34976b6 6023bfd_boolean
fc0e6df6 6024_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6025{
6026 bfd_byte *contents = NULL;
dc810e39 6027 bfd_size_type amt;
fc0e6df6
PB
6028 unsigned int freeidx = 0;
6029
6030 if (elf_dynverref (abfd) != 0)
6031 {
6032 Elf_Internal_Shdr *hdr;
6033 Elf_External_Verneed *everneed;
6034 Elf_Internal_Verneed *iverneed;
6035 unsigned int i;
6036
6037 hdr = &elf_tdata (abfd)->dynverref_hdr;
6038
6039 amt = (bfd_size_type) hdr->sh_info * sizeof (Elf_Internal_Verneed);
6040 elf_tdata (abfd)->verref = bfd_zalloc (abfd, amt);
6041 if (elf_tdata (abfd)->verref == NULL)
6042 goto error_return;
6043
6044 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6045
6046 contents = bfd_malloc (hdr->sh_size);
6047 if (contents == NULL)
6048 goto error_return;
6049 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6050 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
6051 goto error_return;
6052
6053 everneed = (Elf_External_Verneed *) contents;
6054 iverneed = elf_tdata (abfd)->verref;
6055 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6056 {
6057 Elf_External_Vernaux *evernaux;
6058 Elf_Internal_Vernaux *ivernaux;
6059 unsigned int j;
6060
6061 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6062
6063 iverneed->vn_bfd = abfd;
6064
6065 iverneed->vn_filename =
6066 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6067 iverneed->vn_file);
6068 if (iverneed->vn_filename == NULL)
6069 goto error_return;
6070
6071 amt = iverneed->vn_cnt;
6072 amt *= sizeof (Elf_Internal_Vernaux);
6073 iverneed->vn_auxptr = bfd_alloc (abfd, amt);
6074
6075 evernaux = ((Elf_External_Vernaux *)
6076 ((bfd_byte *) everneed + iverneed->vn_aux));
6077 ivernaux = iverneed->vn_auxptr;
6078 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6079 {
6080 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6081
6082 ivernaux->vna_nodename =
6083 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6084 ivernaux->vna_name);
6085 if (ivernaux->vna_nodename == NULL)
6086 goto error_return;
6087
6088 if (j + 1 < iverneed->vn_cnt)
6089 ivernaux->vna_nextptr = ivernaux + 1;
6090 else
6091 ivernaux->vna_nextptr = NULL;
6092
6093 evernaux = ((Elf_External_Vernaux *)
6094 ((bfd_byte *) evernaux + ivernaux->vna_next));
6095
6096 if (ivernaux->vna_other > freeidx)
6097 freeidx = ivernaux->vna_other;
6098 }
6099
6100 if (i + 1 < hdr->sh_info)
6101 iverneed->vn_nextref = iverneed + 1;
6102 else
6103 iverneed->vn_nextref = NULL;
6104
6105 everneed = ((Elf_External_Verneed *)
6106 ((bfd_byte *) everneed + iverneed->vn_next));
6107 }
6108
6109 free (contents);
6110 contents = NULL;
6111 }
252b5132
RH
6112
6113 if (elf_dynverdef (abfd) != 0)
6114 {
6115 Elf_Internal_Shdr *hdr;
6116 Elf_External_Verdef *everdef;
6117 Elf_Internal_Verdef *iverdef;
f631889e
UD
6118 Elf_Internal_Verdef *iverdefarr;
6119 Elf_Internal_Verdef iverdefmem;
252b5132 6120 unsigned int i;
062e2358 6121 unsigned int maxidx;
252b5132
RH
6122
6123 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6124
217aa764 6125 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6126 if (contents == NULL)
6127 goto error_return;
6128 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6129 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6130 goto error_return;
6131
f631889e
UD
6132 /* We know the number of entries in the section but not the maximum
6133 index. Therefore we have to run through all entries and find
6134 the maximum. */
252b5132 6135 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6136 maxidx = 0;
6137 for (i = 0; i < hdr->sh_info; ++i)
6138 {
6139 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6140
062e2358
AM
6141 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6142 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e
UD
6143
6144 everdef = ((Elf_External_Verdef *)
6145 ((bfd_byte *) everdef + iverdefmem.vd_next));
6146 }
6147
fc0e6df6
PB
6148 if (default_imported_symver)
6149 {
6150 if (freeidx > maxidx)
6151 maxidx = ++freeidx;
6152 else
6153 freeidx = ++maxidx;
6154 }
dc810e39 6155 amt = (bfd_size_type) maxidx * sizeof (Elf_Internal_Verdef);
217aa764 6156 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
f631889e
UD
6157 if (elf_tdata (abfd)->verdef == NULL)
6158 goto error_return;
6159
6160 elf_tdata (abfd)->cverdefs = maxidx;
6161
6162 everdef = (Elf_External_Verdef *) contents;
6163 iverdefarr = elf_tdata (abfd)->verdef;
6164 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6165 {
6166 Elf_External_Verdaux *everdaux;
6167 Elf_Internal_Verdaux *iverdaux;
6168 unsigned int j;
6169
f631889e
UD
6170 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6171
6172 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6173 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6174
6175 iverdef->vd_bfd = abfd;
6176
dc810e39 6177 amt = (bfd_size_type) iverdef->vd_cnt * sizeof (Elf_Internal_Verdaux);
217aa764 6178 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132
RH
6179 if (iverdef->vd_auxptr == NULL)
6180 goto error_return;
6181
6182 everdaux = ((Elf_External_Verdaux *)
6183 ((bfd_byte *) everdef + iverdef->vd_aux));
6184 iverdaux = iverdef->vd_auxptr;
6185 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6186 {
6187 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6188
6189 iverdaux->vda_nodename =
6190 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6191 iverdaux->vda_name);
6192 if (iverdaux->vda_nodename == NULL)
6193 goto error_return;
6194
6195 if (j + 1 < iverdef->vd_cnt)
6196 iverdaux->vda_nextptr = iverdaux + 1;
6197 else
6198 iverdaux->vda_nextptr = NULL;
6199
6200 everdaux = ((Elf_External_Verdaux *)
6201 ((bfd_byte *) everdaux + iverdaux->vda_next));
6202 }
6203
6204 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
6205
6206 if (i + 1 < hdr->sh_info)
6207 iverdef->vd_nextdef = iverdef + 1;
6208 else
6209 iverdef->vd_nextdef = NULL;
6210
6211 everdef = ((Elf_External_Verdef *)
6212 ((bfd_byte *) everdef + iverdef->vd_next));
6213 }
6214
6215 free (contents);
6216 contents = NULL;
6217 }
fc0e6df6 6218 else if (default_imported_symver)
252b5132 6219 {
fc0e6df6
PB
6220 if (freeidx < 3)
6221 freeidx = 3;
6222 else
6223 freeidx++;
252b5132 6224
fc0e6df6
PB
6225 amt = (bfd_size_type) freeidx * sizeof (Elf_Internal_Verdef);
6226 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
6227 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6228 goto error_return;
6229
fc0e6df6
PB
6230 elf_tdata (abfd)->cverdefs = freeidx;
6231 }
252b5132 6232
fc0e6df6
PB
6233 /* Create a default version based on the soname. */
6234 if (default_imported_symver)
6235 {
6236 Elf_Internal_Verdef *iverdef;
6237 Elf_Internal_Verdaux *iverdaux;
252b5132 6238
fc0e6df6 6239 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6240
fc0e6df6
PB
6241 iverdef->vd_version = VER_DEF_CURRENT;
6242 iverdef->vd_flags = 0;
6243 iverdef->vd_ndx = freeidx;
6244 iverdef->vd_cnt = 1;
252b5132 6245
fc0e6df6 6246 iverdef->vd_bfd = abfd;
252b5132 6247
fc0e6df6
PB
6248 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6249 if (iverdef->vd_nodename == NULL)
6250 goto error_return;
6251 iverdef->vd_nextdef = NULL;
6252 amt = (bfd_size_type) sizeof (Elf_Internal_Verdaux);
6253 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132 6254
fc0e6df6
PB
6255 iverdaux = iverdef->vd_auxptr;
6256 iverdaux->vda_nodename = iverdef->vd_nodename;
6257 iverdaux->vda_nextptr = NULL;
252b5132
RH
6258 }
6259
b34976b6 6260 return TRUE;
252b5132
RH
6261
6262 error_return:
5ed6aba4 6263 if (contents != NULL)
252b5132 6264 free (contents);
b34976b6 6265 return FALSE;
252b5132
RH
6266}
6267\f
6268asymbol *
217aa764 6269_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6270{
6271 elf_symbol_type *newsym;
dc810e39 6272 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6273
217aa764 6274 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6275 if (!newsym)
6276 return NULL;
6277 else
6278 {
6279 newsym->symbol.the_bfd = abfd;
6280 return &newsym->symbol;
6281 }
6282}
6283
6284void
217aa764
AM
6285_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6286 asymbol *symbol,
6287 symbol_info *ret)
252b5132
RH
6288{
6289 bfd_symbol_info (symbol, ret);
6290}
6291
6292/* Return whether a symbol name implies a local symbol. Most targets
6293 use this function for the is_local_label_name entry point, but some
6294 override it. */
6295
b34976b6 6296bfd_boolean
217aa764
AM
6297_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6298 const char *name)
252b5132
RH
6299{
6300 /* Normal local symbols start with ``.L''. */
6301 if (name[0] == '.' && name[1] == 'L')
b34976b6 6302 return TRUE;
252b5132
RH
6303
6304 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6305 DWARF debugging symbols starting with ``..''. */
6306 if (name[0] == '.' && name[1] == '.')
b34976b6 6307 return TRUE;
252b5132
RH
6308
6309 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6310 emitting DWARF debugging output. I suspect this is actually a
6311 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6312 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6313 underscore to be emitted on some ELF targets). For ease of use,
6314 we treat such symbols as local. */
6315 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6316 return TRUE;
252b5132 6317
b34976b6 6318 return FALSE;
252b5132
RH
6319}
6320
6321alent *
217aa764
AM
6322_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6323 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6324{
6325 abort ();
6326 return NULL;
6327}
6328
b34976b6 6329bfd_boolean
217aa764
AM
6330_bfd_elf_set_arch_mach (bfd *abfd,
6331 enum bfd_architecture arch,
6332 unsigned long machine)
252b5132
RH
6333{
6334 /* If this isn't the right architecture for this backend, and this
6335 isn't the generic backend, fail. */
6336 if (arch != get_elf_backend_data (abfd)->arch
6337 && arch != bfd_arch_unknown
6338 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6339 return FALSE;
252b5132
RH
6340
6341 return bfd_default_set_arch_mach (abfd, arch, machine);
6342}
6343
d1fad7c6
NC
6344/* Find the function to a particular section and offset,
6345 for error reporting. */
252b5132 6346
b34976b6 6347static bfd_boolean
217aa764
AM
6348elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6349 asection *section,
6350 asymbol **symbols,
6351 bfd_vma offset,
6352 const char **filename_ptr,
6353 const char **functionname_ptr)
252b5132 6354{
252b5132 6355 const char *filename;
57426232 6356 asymbol *func, *file;
252b5132
RH
6357 bfd_vma low_func;
6358 asymbol **p;
57426232
JB
6359 /* ??? Given multiple file symbols, it is impossible to reliably
6360 choose the right file name for global symbols. File symbols are
6361 local symbols, and thus all file symbols must sort before any
6362 global symbols. The ELF spec may be interpreted to say that a
6363 file symbol must sort before other local symbols, but currently
6364 ld -r doesn't do this. So, for ld -r output, it is possible to
6365 make a better choice of file name for local symbols by ignoring
6366 file symbols appearing after a given local symbol. */
6367 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6368
252b5132
RH
6369 filename = NULL;
6370 func = NULL;
57426232 6371 file = NULL;
252b5132 6372 low_func = 0;
57426232 6373 state = nothing_seen;
252b5132
RH
6374
6375 for (p = symbols; *p != NULL; p++)
6376 {
6377 elf_symbol_type *q;
6378
6379 q = (elf_symbol_type *) *p;
6380
252b5132
RH
6381 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6382 {
6383 default:
6384 break;
6385 case STT_FILE:
57426232
JB
6386 file = &q->symbol;
6387 if (state == symbol_seen)
6388 state = file_after_symbol_seen;
6389 continue;
6390 case STT_SECTION:
6391 continue;
252b5132
RH
6392 case STT_NOTYPE:
6393 case STT_FUNC:
6b40fcba 6394 if (bfd_get_section (&q->symbol) == section
252b5132
RH
6395 && q->symbol.value >= low_func
6396 && q->symbol.value <= offset)
6397 {
6398 func = (asymbol *) q;
6399 low_func = q->symbol.value;
57426232
JB
6400 if (file == NULL)
6401 filename = NULL;
6402 else if (ELF_ST_BIND (q->internal_elf_sym.st_info) != STB_LOCAL
6403 && state == file_after_symbol_seen)
6404 filename = NULL;
6405 else
6406 filename = bfd_asymbol_name (file);
252b5132
RH
6407 }
6408 break;
6409 }
57426232
JB
6410 if (state == nothing_seen)
6411 state = symbol_seen;
252b5132
RH
6412 }
6413
6414 if (func == NULL)
b34976b6 6415 return FALSE;
252b5132 6416
d1fad7c6
NC
6417 if (filename_ptr)
6418 *filename_ptr = filename;
6419 if (functionname_ptr)
6420 *functionname_ptr = bfd_asymbol_name (func);
6421
b34976b6 6422 return TRUE;
d1fad7c6
NC
6423}
6424
6425/* Find the nearest line to a particular section and offset,
6426 for error reporting. */
6427
b34976b6 6428bfd_boolean
217aa764
AM
6429_bfd_elf_find_nearest_line (bfd *abfd,
6430 asection *section,
6431 asymbol **symbols,
6432 bfd_vma offset,
6433 const char **filename_ptr,
6434 const char **functionname_ptr,
6435 unsigned int *line_ptr)
d1fad7c6 6436{
b34976b6 6437 bfd_boolean found;
d1fad7c6
NC
6438
6439 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6440 filename_ptr, functionname_ptr,
6441 line_ptr))
d1fad7c6
NC
6442 {
6443 if (!*functionname_ptr)
4e8a9624
AM
6444 elf_find_function (abfd, section, symbols, offset,
6445 *filename_ptr ? NULL : filename_ptr,
6446 functionname_ptr);
6447
b34976b6 6448 return TRUE;
d1fad7c6
NC
6449 }
6450
6451 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6452 filename_ptr, functionname_ptr,
6453 line_ptr, 0,
6454 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
6455 {
6456 if (!*functionname_ptr)
4e8a9624
AM
6457 elf_find_function (abfd, section, symbols, offset,
6458 *filename_ptr ? NULL : filename_ptr,
6459 functionname_ptr);
6460
b34976b6 6461 return TRUE;
d1fad7c6
NC
6462 }
6463
6464 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
6465 &found, filename_ptr,
6466 functionname_ptr, line_ptr,
6467 &elf_tdata (abfd)->line_info))
b34976b6 6468 return FALSE;
dc43ada5 6469 if (found && (*functionname_ptr || *line_ptr))
b34976b6 6470 return TRUE;
d1fad7c6
NC
6471
6472 if (symbols == NULL)
b34976b6 6473 return FALSE;
d1fad7c6
NC
6474
6475 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 6476 filename_ptr, functionname_ptr))
b34976b6 6477 return FALSE;
d1fad7c6 6478
252b5132 6479 *line_ptr = 0;
b34976b6 6480 return TRUE;
252b5132
RH
6481}
6482
6483int
217aa764 6484_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
6485{
6486 int ret;
6487
6488 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
6489 if (! reloc)
6490 ret += get_program_header_size (abfd);
6491 return ret;
6492}
6493
b34976b6 6494bfd_boolean
217aa764
AM
6495_bfd_elf_set_section_contents (bfd *abfd,
6496 sec_ptr section,
0f867abe 6497 const void *location,
217aa764
AM
6498 file_ptr offset,
6499 bfd_size_type count)
252b5132
RH
6500{
6501 Elf_Internal_Shdr *hdr;
dc810e39 6502 bfd_signed_vma pos;
252b5132
RH
6503
6504 if (! abfd->output_has_begun
217aa764 6505 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6506 return FALSE;
252b5132
RH
6507
6508 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
6509 pos = hdr->sh_offset + offset;
6510 if (bfd_seek (abfd, pos, SEEK_SET) != 0
6511 || bfd_bwrite (location, count, abfd) != count)
b34976b6 6512 return FALSE;
252b5132 6513
b34976b6 6514 return TRUE;
252b5132
RH
6515}
6516
6517void
217aa764
AM
6518_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
6519 arelent *cache_ptr ATTRIBUTE_UNUSED,
6520 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
6521{
6522 abort ();
6523}
6524
252b5132
RH
6525/* Try to convert a non-ELF reloc into an ELF one. */
6526
b34976b6 6527bfd_boolean
217aa764 6528_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 6529{
c044fabd 6530 /* Check whether we really have an ELF howto. */
252b5132
RH
6531
6532 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
6533 {
6534 bfd_reloc_code_real_type code;
6535 reloc_howto_type *howto;
6536
6537 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 6538 equivalent ELF reloc. */
252b5132
RH
6539
6540 if (areloc->howto->pc_relative)
6541 {
6542 switch (areloc->howto->bitsize)
6543 {
6544 case 8:
6545 code = BFD_RELOC_8_PCREL;
6546 break;
6547 case 12:
6548 code = BFD_RELOC_12_PCREL;
6549 break;
6550 case 16:
6551 code = BFD_RELOC_16_PCREL;
6552 break;
6553 case 24:
6554 code = BFD_RELOC_24_PCREL;
6555 break;
6556 case 32:
6557 code = BFD_RELOC_32_PCREL;
6558 break;
6559 case 64:
6560 code = BFD_RELOC_64_PCREL;
6561 break;
6562 default:
6563 goto fail;
6564 }
6565
6566 howto = bfd_reloc_type_lookup (abfd, code);
6567
6568 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
6569 {
6570 if (howto->pcrel_offset)
6571 areloc->addend += areloc->address;
6572 else
6573 areloc->addend -= areloc->address; /* addend is unsigned!! */
6574 }
6575 }
6576 else
6577 {
6578 switch (areloc->howto->bitsize)
6579 {
6580 case 8:
6581 code = BFD_RELOC_8;
6582 break;
6583 case 14:
6584 code = BFD_RELOC_14;
6585 break;
6586 case 16:
6587 code = BFD_RELOC_16;
6588 break;
6589 case 26:
6590 code = BFD_RELOC_26;
6591 break;
6592 case 32:
6593 code = BFD_RELOC_32;
6594 break;
6595 case 64:
6596 code = BFD_RELOC_64;
6597 break;
6598 default:
6599 goto fail;
6600 }
6601
6602 howto = bfd_reloc_type_lookup (abfd, code);
6603 }
6604
6605 if (howto)
6606 areloc->howto = howto;
6607 else
6608 goto fail;
6609 }
6610
b34976b6 6611 return TRUE;
252b5132
RH
6612
6613 fail:
6614 (*_bfd_error_handler)
d003868e
AM
6615 (_("%B: unsupported relocation type %s"),
6616 abfd, areloc->howto->name);
252b5132 6617 bfd_set_error (bfd_error_bad_value);
b34976b6 6618 return FALSE;
252b5132
RH
6619}
6620
b34976b6 6621bfd_boolean
217aa764 6622_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
6623{
6624 if (bfd_get_format (abfd) == bfd_object)
6625 {
6626 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 6627 _bfd_elf_strtab_free (elf_shstrtab (abfd));
252b5132
RH
6628 }
6629
6630 return _bfd_generic_close_and_cleanup (abfd);
6631}
6632
6633/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
6634 in the relocation's offset. Thus we cannot allow any sort of sanity
6635 range-checking to interfere. There is nothing else to do in processing
6636 this reloc. */
6637
6638bfd_reloc_status_type
217aa764
AM
6639_bfd_elf_rel_vtable_reloc_fn
6640 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 6641 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
6642 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
6643 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
6644{
6645 return bfd_reloc_ok;
6646}
252b5132
RH
6647\f
6648/* Elf core file support. Much of this only works on native
6649 toolchains, since we rely on knowing the
6650 machine-dependent procfs structure in order to pick
c044fabd 6651 out details about the corefile. */
252b5132
RH
6652
6653#ifdef HAVE_SYS_PROCFS_H
6654# include <sys/procfs.h>
6655#endif
6656
c044fabd 6657/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
6658
6659static int
217aa764 6660elfcore_make_pid (bfd *abfd)
252b5132
RH
6661{
6662 return ((elf_tdata (abfd)->core_lwpid << 16)
6663 + (elf_tdata (abfd)->core_pid));
6664}
6665
252b5132
RH
6666/* If there isn't a section called NAME, make one, using
6667 data from SECT. Note, this function will generate a
6668 reference to NAME, so you shouldn't deallocate or
c044fabd 6669 overwrite it. */
252b5132 6670
b34976b6 6671static bfd_boolean
217aa764 6672elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 6673{
c044fabd 6674 asection *sect2;
252b5132
RH
6675
6676 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 6677 return TRUE;
252b5132
RH
6678
6679 sect2 = bfd_make_section (abfd, name);
6680 if (sect2 == NULL)
b34976b6 6681 return FALSE;
252b5132 6682
eea6121a 6683 sect2->size = sect->size;
252b5132
RH
6684 sect2->filepos = sect->filepos;
6685 sect2->flags = sect->flags;
6686 sect2->alignment_power = sect->alignment_power;
b34976b6 6687 return TRUE;
252b5132
RH
6688}
6689
bb0082d6
AM
6690/* Create a pseudosection containing SIZE bytes at FILEPOS. This
6691 actually creates up to two pseudosections:
6692 - For the single-threaded case, a section named NAME, unless
6693 such a section already exists.
6694 - For the multi-threaded case, a section named "NAME/PID", where
6695 PID is elfcore_make_pid (abfd).
6696 Both pseudosections have identical contents. */
b34976b6 6697bfd_boolean
217aa764
AM
6698_bfd_elfcore_make_pseudosection (bfd *abfd,
6699 char *name,
6700 size_t size,
6701 ufile_ptr filepos)
bb0082d6
AM
6702{
6703 char buf[100];
6704 char *threaded_name;
d4c88bbb 6705 size_t len;
bb0082d6
AM
6706 asection *sect;
6707
6708 /* Build the section name. */
6709
6710 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 6711 len = strlen (buf) + 1;
217aa764 6712 threaded_name = bfd_alloc (abfd, len);
bb0082d6 6713 if (threaded_name == NULL)
b34976b6 6714 return FALSE;
d4c88bbb 6715 memcpy (threaded_name, buf, len);
bb0082d6 6716
62f3bb11 6717 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 6718 if (sect == NULL)
b34976b6 6719 return FALSE;
eea6121a 6720 sect->size = size;
bb0082d6
AM
6721 sect->filepos = filepos;
6722 sect->flags = SEC_HAS_CONTENTS;
6723 sect->alignment_power = 2;
6724
936e320b 6725 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
6726}
6727
252b5132 6728/* prstatus_t exists on:
4a938328 6729 solaris 2.5+
252b5132
RH
6730 linux 2.[01] + glibc
6731 unixware 4.2
6732*/
6733
6734#if defined (HAVE_PRSTATUS_T)
a7b97311 6735
b34976b6 6736static bfd_boolean
217aa764 6737elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 6738{
eea6121a 6739 size_t size;
7ee38065 6740 int offset;
252b5132 6741
4a938328
MS
6742 if (note->descsz == sizeof (prstatus_t))
6743 {
6744 prstatus_t prstat;
252b5132 6745
eea6121a 6746 size = sizeof (prstat.pr_reg);
7ee38065 6747 offset = offsetof (prstatus_t, pr_reg);
4a938328 6748 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 6749
fa49d224
NC
6750 /* Do not overwrite the core signal if it
6751 has already been set by another thread. */
6752 if (elf_tdata (abfd)->core_signal == 0)
6753 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 6754 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 6755
4a938328
MS
6756 /* pr_who exists on:
6757 solaris 2.5+
6758 unixware 4.2
6759 pr_who doesn't exist on:
6760 linux 2.[01]
6761 */
252b5132 6762#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 6763 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 6764#endif
4a938328 6765 }
7ee38065 6766#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
6767 else if (note->descsz == sizeof (prstatus32_t))
6768 {
6769 /* 64-bit host, 32-bit corefile */
6770 prstatus32_t prstat;
6771
eea6121a 6772 size = sizeof (prstat.pr_reg);
7ee38065 6773 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
6774 memcpy (&prstat, note->descdata, sizeof (prstat));
6775
fa49d224
NC
6776 /* Do not overwrite the core signal if it
6777 has already been set by another thread. */
6778 if (elf_tdata (abfd)->core_signal == 0)
6779 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
6780 elf_tdata (abfd)->core_pid = prstat.pr_pid;
6781
6782 /* pr_who exists on:
6783 solaris 2.5+
6784 unixware 4.2
6785 pr_who doesn't exist on:
6786 linux 2.[01]
6787 */
7ee38065 6788#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
6789 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
6790#endif
6791 }
7ee38065 6792#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
6793 else
6794 {
6795 /* Fail - we don't know how to handle any other
6796 note size (ie. data object type). */
b34976b6 6797 return TRUE;
4a938328 6798 }
252b5132 6799
bb0082d6 6800 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 6801 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 6802 size, note->descpos + offset);
252b5132
RH
6803}
6804#endif /* defined (HAVE_PRSTATUS_T) */
6805
bb0082d6 6806/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 6807static bfd_boolean
217aa764
AM
6808elfcore_make_note_pseudosection (bfd *abfd,
6809 char *name,
6810 Elf_Internal_Note *note)
252b5132 6811{
936e320b
AM
6812 return _bfd_elfcore_make_pseudosection (abfd, name,
6813 note->descsz, note->descpos);
252b5132
RH
6814}
6815
ff08c6bb
JB
6816/* There isn't a consistent prfpregset_t across platforms,
6817 but it doesn't matter, because we don't have to pick this
c044fabd
KH
6818 data structure apart. */
6819
b34976b6 6820static bfd_boolean
217aa764 6821elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
6822{
6823 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
6824}
6825
ff08c6bb
JB
6826/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
6827 type of 5 (NT_PRXFPREG). Just include the whole note's contents
6828 literally. */
c044fabd 6829
b34976b6 6830static bfd_boolean
217aa764 6831elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
6832{
6833 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
6834}
6835
252b5132 6836#if defined (HAVE_PRPSINFO_T)
4a938328 6837typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 6838#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
6839typedef prpsinfo32_t elfcore_psinfo32_t;
6840#endif
252b5132
RH
6841#endif
6842
6843#if defined (HAVE_PSINFO_T)
4a938328 6844typedef psinfo_t elfcore_psinfo_t;
7ee38065 6845#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
6846typedef psinfo32_t elfcore_psinfo32_t;
6847#endif
252b5132
RH
6848#endif
6849
252b5132
RH
6850/* return a malloc'ed copy of a string at START which is at
6851 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 6852 the copy will always have a terminating '\0'. */
252b5132 6853
936e320b 6854char *
217aa764 6855_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 6856{
dc810e39 6857 char *dups;
c044fabd 6858 char *end = memchr (start, '\0', max);
dc810e39 6859 size_t len;
252b5132
RH
6860
6861 if (end == NULL)
6862 len = max;
6863 else
6864 len = end - start;
6865
217aa764 6866 dups = bfd_alloc (abfd, len + 1);
dc810e39 6867 if (dups == NULL)
252b5132
RH
6868 return NULL;
6869
dc810e39
AM
6870 memcpy (dups, start, len);
6871 dups[len] = '\0';
252b5132 6872
dc810e39 6873 return dups;
252b5132
RH
6874}
6875
bb0082d6 6876#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 6877static bfd_boolean
217aa764 6878elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 6879{
4a938328
MS
6880 if (note->descsz == sizeof (elfcore_psinfo_t))
6881 {
6882 elfcore_psinfo_t psinfo;
252b5132 6883
7ee38065 6884 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 6885
4a938328 6886 elf_tdata (abfd)->core_program
936e320b
AM
6887 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
6888 sizeof (psinfo.pr_fname));
252b5132 6889
4a938328 6890 elf_tdata (abfd)->core_command
936e320b
AM
6891 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
6892 sizeof (psinfo.pr_psargs));
4a938328 6893 }
7ee38065 6894#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
6895 else if (note->descsz == sizeof (elfcore_psinfo32_t))
6896 {
6897 /* 64-bit host, 32-bit corefile */
6898 elfcore_psinfo32_t psinfo;
6899
7ee38065 6900 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 6901
4a938328 6902 elf_tdata (abfd)->core_program
936e320b
AM
6903 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
6904 sizeof (psinfo.pr_fname));
4a938328
MS
6905
6906 elf_tdata (abfd)->core_command
936e320b
AM
6907 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
6908 sizeof (psinfo.pr_psargs));
4a938328
MS
6909 }
6910#endif
6911
6912 else
6913 {
6914 /* Fail - we don't know how to handle any other
6915 note size (ie. data object type). */
b34976b6 6916 return TRUE;
4a938328 6917 }
252b5132
RH
6918
6919 /* Note that for some reason, a spurious space is tacked
6920 onto the end of the args in some (at least one anyway)
c044fabd 6921 implementations, so strip it off if it exists. */
252b5132
RH
6922
6923 {
c044fabd 6924 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
6925 int n = strlen (command);
6926
6927 if (0 < n && command[n - 1] == ' ')
6928 command[n - 1] = '\0';
6929 }
6930
b34976b6 6931 return TRUE;
252b5132
RH
6932}
6933#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
6934
252b5132 6935#if defined (HAVE_PSTATUS_T)
b34976b6 6936static bfd_boolean
217aa764 6937elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 6938{
f572a39d
AM
6939 if (note->descsz == sizeof (pstatus_t)
6940#if defined (HAVE_PXSTATUS_T)
6941 || note->descsz == sizeof (pxstatus_t)
6942#endif
6943 )
4a938328
MS
6944 {
6945 pstatus_t pstat;
252b5132 6946
4a938328 6947 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 6948
4a938328
MS
6949 elf_tdata (abfd)->core_pid = pstat.pr_pid;
6950 }
7ee38065 6951#if defined (HAVE_PSTATUS32_T)
4a938328
MS
6952 else if (note->descsz == sizeof (pstatus32_t))
6953 {
6954 /* 64-bit host, 32-bit corefile */
6955 pstatus32_t pstat;
252b5132 6956
4a938328 6957 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 6958
4a938328
MS
6959 elf_tdata (abfd)->core_pid = pstat.pr_pid;
6960 }
6961#endif
252b5132
RH
6962 /* Could grab some more details from the "representative"
6963 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 6964 NT_LWPSTATUS note, presumably. */
252b5132 6965
b34976b6 6966 return TRUE;
252b5132
RH
6967}
6968#endif /* defined (HAVE_PSTATUS_T) */
6969
252b5132 6970#if defined (HAVE_LWPSTATUS_T)
b34976b6 6971static bfd_boolean
217aa764 6972elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
6973{
6974 lwpstatus_t lwpstat;
6975 char buf[100];
c044fabd 6976 char *name;
d4c88bbb 6977 size_t len;
c044fabd 6978 asection *sect;
252b5132 6979
f572a39d
AM
6980 if (note->descsz != sizeof (lwpstat)
6981#if defined (HAVE_LWPXSTATUS_T)
6982 && note->descsz != sizeof (lwpxstatus_t)
6983#endif
6984 )
b34976b6 6985 return TRUE;
252b5132
RH
6986
6987 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
6988
6989 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
6990 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
6991
c044fabd 6992 /* Make a ".reg/999" section. */
252b5132
RH
6993
6994 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 6995 len = strlen (buf) + 1;
217aa764 6996 name = bfd_alloc (abfd, len);
252b5132 6997 if (name == NULL)
b34976b6 6998 return FALSE;
d4c88bbb 6999 memcpy (name, buf, len);
252b5132 7000
62f3bb11 7001 sect = bfd_make_section_anyway (abfd, name);
252b5132 7002 if (sect == NULL)
b34976b6 7003 return FALSE;
252b5132
RH
7004
7005#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7006 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7007 sect->filepos = note->descpos
7008 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7009#endif
7010
7011#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7012 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7013 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7014#endif
7015
7016 sect->flags = SEC_HAS_CONTENTS;
7017 sect->alignment_power = 2;
7018
7019 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7020 return FALSE;
252b5132
RH
7021
7022 /* Make a ".reg2/999" section */
7023
7024 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7025 len = strlen (buf) + 1;
217aa764 7026 name = bfd_alloc (abfd, len);
252b5132 7027 if (name == NULL)
b34976b6 7028 return FALSE;
d4c88bbb 7029 memcpy (name, buf, len);
252b5132 7030
62f3bb11 7031 sect = bfd_make_section_anyway (abfd, name);
252b5132 7032 if (sect == NULL)
b34976b6 7033 return FALSE;
252b5132
RH
7034
7035#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7036 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7037 sect->filepos = note->descpos
7038 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7039#endif
7040
7041#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7042 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7043 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7044#endif
7045
7046 sect->flags = SEC_HAS_CONTENTS;
7047 sect->alignment_power = 2;
7048
936e320b 7049 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7050}
7051#endif /* defined (HAVE_LWPSTATUS_T) */
7052
16e9c715 7053#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7054static bfd_boolean
217aa764 7055elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7056{
7057 char buf[30];
c044fabd 7058 char *name;
d4c88bbb 7059 size_t len;
c044fabd 7060 asection *sect;
16e9c715
NC
7061 win32_pstatus_t pstatus;
7062
7063 if (note->descsz < sizeof (pstatus))
b34976b6 7064 return TRUE;
16e9c715 7065
e8eab623 7066 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7067
7068 switch (pstatus.data_type)
16e9c715
NC
7069 {
7070 case NOTE_INFO_PROCESS:
7071 /* FIXME: need to add ->core_command. */
7072 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7073 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7074 break;
16e9c715
NC
7075
7076 case NOTE_INFO_THREAD:
7077 /* Make a ".reg/999" section. */
1f170678 7078 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7079
d4c88bbb 7080 len = strlen (buf) + 1;
217aa764 7081 name = bfd_alloc (abfd, len);
16e9c715 7082 if (name == NULL)
b34976b6 7083 return FALSE;
c044fabd 7084
d4c88bbb 7085 memcpy (name, buf, len);
16e9c715 7086
62f3bb11 7087 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7088 if (sect == NULL)
b34976b6 7089 return FALSE;
c044fabd 7090
eea6121a 7091 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7092 sect->filepos = (note->descpos
7093 + offsetof (struct win32_pstatus,
7094 data.thread_info.thread_context));
16e9c715
NC
7095 sect->flags = SEC_HAS_CONTENTS;
7096 sect->alignment_power = 2;
7097
7098 if (pstatus.data.thread_info.is_active_thread)
7099 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7100 return FALSE;
16e9c715
NC
7101 break;
7102
7103 case NOTE_INFO_MODULE:
7104 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7105 sprintf (buf, ".module/%08lx",
7106 (long) pstatus.data.module_info.base_address);
c044fabd 7107
d4c88bbb 7108 len = strlen (buf) + 1;
217aa764 7109 name = bfd_alloc (abfd, len);
16e9c715 7110 if (name == NULL)
b34976b6 7111 return FALSE;
c044fabd 7112
d4c88bbb 7113 memcpy (name, buf, len);
252b5132 7114
62f3bb11 7115 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7116
16e9c715 7117 if (sect == NULL)
b34976b6 7118 return FALSE;
c044fabd 7119
eea6121a 7120 sect->size = note->descsz;
16e9c715
NC
7121 sect->filepos = note->descpos;
7122 sect->flags = SEC_HAS_CONTENTS;
7123 sect->alignment_power = 2;
7124 break;
7125
7126 default:
b34976b6 7127 return TRUE;
16e9c715
NC
7128 }
7129
b34976b6 7130 return TRUE;
16e9c715
NC
7131}
7132#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7133
b34976b6 7134static bfd_boolean
217aa764 7135elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7136{
9c5bfbb7 7137 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7138
252b5132
RH
7139 switch (note->type)
7140 {
7141 default:
b34976b6 7142 return TRUE;
252b5132 7143
252b5132 7144 case NT_PRSTATUS:
bb0082d6
AM
7145 if (bed->elf_backend_grok_prstatus)
7146 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7147 return TRUE;
bb0082d6 7148#if defined (HAVE_PRSTATUS_T)
252b5132 7149 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7150#else
b34976b6 7151 return TRUE;
252b5132
RH
7152#endif
7153
7154#if defined (HAVE_PSTATUS_T)
7155 case NT_PSTATUS:
7156 return elfcore_grok_pstatus (abfd, note);
7157#endif
7158
7159#if defined (HAVE_LWPSTATUS_T)
7160 case NT_LWPSTATUS:
7161 return elfcore_grok_lwpstatus (abfd, note);
7162#endif
7163
7164 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7165 return elfcore_grok_prfpreg (abfd, note);
7166
16e9c715 7167#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7168 case NT_WIN32PSTATUS:
16e9c715
NC
7169 return elfcore_grok_win32pstatus (abfd, note);
7170#endif
7171
c044fabd 7172 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7173 if (note->namesz == 6
7174 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7175 return elfcore_grok_prxfpreg (abfd, note);
7176 else
b34976b6 7177 return TRUE;
ff08c6bb 7178
252b5132
RH
7179 case NT_PRPSINFO:
7180 case NT_PSINFO:
bb0082d6
AM
7181 if (bed->elf_backend_grok_psinfo)
7182 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7183 return TRUE;
bb0082d6 7184#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7185 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7186#else
b34976b6 7187 return TRUE;
252b5132 7188#endif
3333a7c3
RM
7189
7190 case NT_AUXV:
7191 {
62f3bb11 7192 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7193
7194 if (sect == NULL)
7195 return FALSE;
eea6121a 7196 sect->size = note->descsz;
3333a7c3
RM
7197 sect->filepos = note->descpos;
7198 sect->flags = SEC_HAS_CONTENTS;
7199 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7200
7201 return TRUE;
7202 }
252b5132
RH
7203 }
7204}
7205
b34976b6 7206static bfd_boolean
217aa764 7207elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7208{
7209 char *cp;
7210
7211 cp = strchr (note->namedata, '@');
7212 if (cp != NULL)
7213 {
d2b64500 7214 *lwpidp = atoi(cp + 1);
b34976b6 7215 return TRUE;
50b2bdb7 7216 }
b34976b6 7217 return FALSE;
50b2bdb7
AM
7218}
7219
b34976b6 7220static bfd_boolean
217aa764 7221elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7222{
7223
7224 /* Signal number at offset 0x08. */
7225 elf_tdata (abfd)->core_signal
7226 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7227
7228 /* Process ID at offset 0x50. */
7229 elf_tdata (abfd)->core_pid
7230 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7231
7232 /* Command name at 0x7c (max 32 bytes, including nul). */
7233 elf_tdata (abfd)->core_command
7234 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7235
7720ba9f
MK
7236 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7237 note);
50b2bdb7
AM
7238}
7239
b34976b6 7240static bfd_boolean
217aa764 7241elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7242{
7243 int lwp;
7244
7245 if (elfcore_netbsd_get_lwpid (note, &lwp))
7246 elf_tdata (abfd)->core_lwpid = lwp;
7247
b4db1224 7248 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7249 {
7250 /* NetBSD-specific core "procinfo". Note that we expect to
7251 find this note before any of the others, which is fine,
7252 since the kernel writes this note out first when it
7253 creates a core file. */
47d9a591 7254
50b2bdb7
AM
7255 return elfcore_grok_netbsd_procinfo (abfd, note);
7256 }
7257
b4db1224
JT
7258 /* As of Jan 2002 there are no other machine-independent notes
7259 defined for NetBSD core files. If the note type is less
7260 than the start of the machine-dependent note types, we don't
7261 understand it. */
47d9a591 7262
b4db1224 7263 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7264 return TRUE;
50b2bdb7
AM
7265
7266
7267 switch (bfd_get_arch (abfd))
7268 {
7269 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7270 PT_GETFPREGS == mach+2. */
7271
7272 case bfd_arch_alpha:
7273 case bfd_arch_sparc:
7274 switch (note->type)
7275 {
b4db1224 7276 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7277 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7278
b4db1224 7279 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7280 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7281
7282 default:
b34976b6 7283 return TRUE;
50b2bdb7
AM
7284 }
7285
7286 /* On all other arch's, PT_GETREGS == mach+1 and
7287 PT_GETFPREGS == mach+3. */
7288
7289 default:
7290 switch (note->type)
7291 {
b4db1224 7292 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7293 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7294
b4db1224 7295 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7296 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7297
7298 default:
b34976b6 7299 return TRUE;
50b2bdb7
AM
7300 }
7301 }
7302 /* NOTREACHED */
7303}
7304
07c6e936 7305static bfd_boolean
217aa764 7306elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7307{
7308 void *ddata = note->descdata;
7309 char buf[100];
7310 char *name;
7311 asection *sect;
f8843e87
AM
7312 short sig;
7313 unsigned flags;
07c6e936
NC
7314
7315 /* nto_procfs_status 'pid' field is at offset 0. */
7316 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7317
f8843e87
AM
7318 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7319 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7320
7321 /* nto_procfs_status 'flags' field is at offset 8. */
7322 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7323
7324 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7325 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7326 {
7327 elf_tdata (abfd)->core_signal = sig;
7328 elf_tdata (abfd)->core_lwpid = *tid;
7329 }
07c6e936 7330
f8843e87
AM
7331 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7332 do not come from signals so we make sure we set the current
7333 thread just in case. */
7334 if (flags & 0x00000080)
7335 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7336
7337 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7338 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7339
217aa764 7340 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7341 if (name == NULL)
7342 return FALSE;
7343 strcpy (name, buf);
7344
62f3bb11 7345 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7346 if (sect == NULL)
7347 return FALSE;
7348
eea6121a 7349 sect->size = note->descsz;
07c6e936
NC
7350 sect->filepos = note->descpos;
7351 sect->flags = SEC_HAS_CONTENTS;
7352 sect->alignment_power = 2;
7353
7354 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7355}
7356
7357static bfd_boolean
d69f560c
KW
7358elfcore_grok_nto_regs (bfd *abfd,
7359 Elf_Internal_Note *note,
7360 pid_t tid,
7361 char *base)
07c6e936
NC
7362{
7363 char buf[100];
7364 char *name;
7365 asection *sect;
7366
d69f560c 7367 /* Make a "(base)/%d" section. */
7e7353ed 7368 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 7369
217aa764 7370 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7371 if (name == NULL)
7372 return FALSE;
7373 strcpy (name, buf);
7374
62f3bb11 7375 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7376 if (sect == NULL)
7377 return FALSE;
7378
eea6121a 7379 sect->size = note->descsz;
07c6e936
NC
7380 sect->filepos = note->descpos;
7381 sect->flags = SEC_HAS_CONTENTS;
7382 sect->alignment_power = 2;
7383
f8843e87
AM
7384 /* This is the current thread. */
7385 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 7386 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
7387
7388 return TRUE;
07c6e936
NC
7389}
7390
7391#define BFD_QNT_CORE_INFO 7
7392#define BFD_QNT_CORE_STATUS 8
7393#define BFD_QNT_CORE_GREG 9
7394#define BFD_QNT_CORE_FPREG 10
7395
7396static bfd_boolean
217aa764 7397elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
7398{
7399 /* Every GREG section has a STATUS section before it. Store the
811072d8 7400 tid from the previous call to pass down to the next gregs
07c6e936
NC
7401 function. */
7402 static pid_t tid = 1;
7403
7404 switch (note->type)
7405 {
d69f560c
KW
7406 case BFD_QNT_CORE_INFO:
7407 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
7408 case BFD_QNT_CORE_STATUS:
7409 return elfcore_grok_nto_status (abfd, note, &tid);
7410 case BFD_QNT_CORE_GREG:
7411 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
7412 case BFD_QNT_CORE_FPREG:
7413 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
7414 default:
7415 return TRUE;
07c6e936
NC
7416 }
7417}
7418
7c76fa91
MS
7419/* Function: elfcore_write_note
7420
47d9a591 7421 Inputs:
7c76fa91
MS
7422 buffer to hold note
7423 name of note
7424 type of note
7425 data for note
7426 size of data for note
7427
7428 Return:
7429 End of buffer containing note. */
7430
7431char *
217aa764
AM
7432elfcore_write_note (bfd *abfd,
7433 char *buf,
7434 int *bufsiz,
7435 const char *name,
7436 int type,
7437 const void *input,
7438 int size)
7c76fa91
MS
7439{
7440 Elf_External_Note *xnp;
d4c88bbb
AM
7441 size_t namesz;
7442 size_t pad;
7443 size_t newspace;
7c76fa91
MS
7444 char *p, *dest;
7445
d4c88bbb
AM
7446 namesz = 0;
7447 pad = 0;
7448 if (name != NULL)
7449 {
9c5bfbb7 7450 const struct elf_backend_data *bed;
d4c88bbb
AM
7451
7452 namesz = strlen (name) + 1;
7453 bed = get_elf_backend_data (abfd);
45d6a902 7454 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
7455 }
7456
5de3bf90 7457 newspace = 12 + namesz + pad + size;
d4c88bbb 7458
7c76fa91
MS
7459 p = realloc (buf, *bufsiz + newspace);
7460 dest = p + *bufsiz;
7461 *bufsiz += newspace;
7462 xnp = (Elf_External_Note *) dest;
7463 H_PUT_32 (abfd, namesz, xnp->namesz);
7464 H_PUT_32 (abfd, size, xnp->descsz);
7465 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
7466 dest = xnp->name;
7467 if (name != NULL)
7468 {
7469 memcpy (dest, name, namesz);
7470 dest += namesz;
7471 while (pad != 0)
7472 {
7473 *dest++ = '\0';
7474 --pad;
7475 }
7476 }
7477 memcpy (dest, input, size);
7c76fa91
MS
7478 return p;
7479}
7480
7481#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
7482char *
217aa764
AM
7483elfcore_write_prpsinfo (bfd *abfd,
7484 char *buf,
7485 int *bufsiz,
7486 const char *fname,
7487 const char *psargs)
7c76fa91
MS
7488{
7489 int note_type;
7490 char *note_name = "CORE";
7491
7492#if defined (HAVE_PSINFO_T)
7493 psinfo_t data;
7494 note_type = NT_PSINFO;
7495#else
7496 prpsinfo_t data;
7497 note_type = NT_PRPSINFO;
7498#endif
7499
7500 memset (&data, 0, sizeof (data));
7501 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
7502 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 7503 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7504 note_name, note_type, &data, sizeof (data));
7505}
7506#endif /* PSINFO_T or PRPSINFO_T */
7507
7508#if defined (HAVE_PRSTATUS_T)
7509char *
217aa764
AM
7510elfcore_write_prstatus (bfd *abfd,
7511 char *buf,
7512 int *bufsiz,
7513 long pid,
7514 int cursig,
7515 const void *gregs)
7c76fa91
MS
7516{
7517 prstatus_t prstat;
7518 char *note_name = "CORE";
7519
7520 memset (&prstat, 0, sizeof (prstat));
7521 prstat.pr_pid = pid;
7522 prstat.pr_cursig = cursig;
c106e334 7523 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 7524 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7525 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
7526}
7527#endif /* HAVE_PRSTATUS_T */
7528
51316059
MS
7529#if defined (HAVE_LWPSTATUS_T)
7530char *
217aa764
AM
7531elfcore_write_lwpstatus (bfd *abfd,
7532 char *buf,
7533 int *bufsiz,
7534 long pid,
7535 int cursig,
7536 const void *gregs)
51316059
MS
7537{
7538 lwpstatus_t lwpstat;
7539 char *note_name = "CORE";
7540
7541 memset (&lwpstat, 0, sizeof (lwpstat));
7542 lwpstat.pr_lwpid = pid >> 16;
7543 lwpstat.pr_cursig = cursig;
7544#if defined (HAVE_LWPSTATUS_T_PR_REG)
7545 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
7546#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
7547#if !defined(gregs)
7548 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
7549 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
7550#else
7551 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
7552 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
7553#endif
7554#endif
47d9a591 7555 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7556 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
7557}
7558#endif /* HAVE_LWPSTATUS_T */
7559
7c76fa91
MS
7560#if defined (HAVE_PSTATUS_T)
7561char *
217aa764
AM
7562elfcore_write_pstatus (bfd *abfd,
7563 char *buf,
7564 int *bufsiz,
7565 long pid,
7566 int cursig,
7567 const void *gregs)
7c76fa91
MS
7568{
7569 pstatus_t pstat;
7570 char *note_name = "CORE";
7571
51316059
MS
7572 memset (&pstat, 0, sizeof (pstat));
7573 pstat.pr_pid = pid & 0xffff;
47d9a591 7574 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7575 NT_PSTATUS, &pstat, sizeof (pstat));
7576 return buf;
7c76fa91
MS
7577}
7578#endif /* HAVE_PSTATUS_T */
7579
7580char *
217aa764
AM
7581elfcore_write_prfpreg (bfd *abfd,
7582 char *buf,
7583 int *bufsiz,
7584 const void *fpregs,
7585 int size)
7c76fa91
MS
7586{
7587 char *note_name = "CORE";
47d9a591 7588 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7589 note_name, NT_FPREGSET, fpregs, size);
7590}
7591
7592char *
217aa764
AM
7593elfcore_write_prxfpreg (bfd *abfd,
7594 char *buf,
7595 int *bufsiz,
7596 const void *xfpregs,
7597 int size)
7c76fa91
MS
7598{
7599 char *note_name = "LINUX";
47d9a591 7600 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7601 note_name, NT_PRXFPREG, xfpregs, size);
7602}
7603
b34976b6 7604static bfd_boolean
217aa764 7605elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 7606{
c044fabd
KH
7607 char *buf;
7608 char *p;
252b5132
RH
7609
7610 if (size <= 0)
b34976b6 7611 return TRUE;
252b5132 7612
dc810e39 7613 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 7614 return FALSE;
252b5132 7615
dc810e39 7616 buf = bfd_malloc (size);
252b5132 7617 if (buf == NULL)
b34976b6 7618 return FALSE;
252b5132 7619
dc810e39 7620 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
7621 {
7622 error:
7623 free (buf);
b34976b6 7624 return FALSE;
252b5132
RH
7625 }
7626
7627 p = buf;
7628 while (p < buf + size)
7629 {
c044fabd
KH
7630 /* FIXME: bad alignment assumption. */
7631 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
7632 Elf_Internal_Note in;
7633
dc810e39 7634 in.type = H_GET_32 (abfd, xnp->type);
252b5132 7635
dc810e39 7636 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
7637 in.namedata = xnp->name;
7638
dc810e39 7639 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
7640 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
7641 in.descpos = offset + (in.descdata - buf);
7642
50b2bdb7
AM
7643 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
7644 {
7645 if (! elfcore_grok_netbsd_note (abfd, &in))
7646 goto error;
7647 }
07c6e936
NC
7648 else if (strncmp (in.namedata, "QNX", 3) == 0)
7649 {
7650 if (! elfcore_grok_nto_note (abfd, &in))
7651 goto error;
7652 }
50b2bdb7
AM
7653 else
7654 {
7655 if (! elfcore_grok_note (abfd, &in))
7656 goto error;
7657 }
252b5132
RH
7658
7659 p = in.descdata + BFD_ALIGN (in.descsz, 4);
7660 }
7661
7662 free (buf);
b34976b6 7663 return TRUE;
252b5132 7664}
98d8431c
JB
7665\f
7666/* Providing external access to the ELF program header table. */
7667
7668/* Return an upper bound on the number of bytes required to store a
7669 copy of ABFD's program header table entries. Return -1 if an error
7670 occurs; bfd_get_error will return an appropriate code. */
c044fabd 7671
98d8431c 7672long
217aa764 7673bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
7674{
7675 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7676 {
7677 bfd_set_error (bfd_error_wrong_format);
7678 return -1;
7679 }
7680
936e320b 7681 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
7682}
7683
98d8431c
JB
7684/* Copy ABFD's program header table entries to *PHDRS. The entries
7685 will be stored as an array of Elf_Internal_Phdr structures, as
7686 defined in include/elf/internal.h. To find out how large the
7687 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
7688
7689 Return the number of program header table entries read, or -1 if an
7690 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 7691
98d8431c 7692int
217aa764 7693bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
7694{
7695 int num_phdrs;
7696
7697 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7698 {
7699 bfd_set_error (bfd_error_wrong_format);
7700 return -1;
7701 }
7702
7703 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 7704 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
7705 num_phdrs * sizeof (Elf_Internal_Phdr));
7706
7707 return num_phdrs;
7708}
ae4221d7
L
7709
7710void
217aa764 7711_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 7712{
d3b05f8d 7713#ifdef BFD64
ae4221d7
L
7714 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7715
7716 i_ehdrp = elf_elfheader (abfd);
7717 if (i_ehdrp == NULL)
7718 sprintf_vma (buf, value);
7719 else
7720 {
7721 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7722 {
ae4221d7 7723#if BFD_HOST_64BIT_LONG
cc55aec9 7724 sprintf (buf, "%016lx", value);
ae4221d7 7725#else
cc55aec9
AM
7726 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
7727 _bfd_int64_low (value));
ae4221d7 7728#endif
cc55aec9 7729 }
ae4221d7
L
7730 else
7731 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
7732 }
d3b05f8d
L
7733#else
7734 sprintf_vma (buf, value);
7735#endif
ae4221d7
L
7736}
7737
7738void
217aa764 7739_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 7740{
d3b05f8d 7741#ifdef BFD64
ae4221d7
L
7742 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7743
7744 i_ehdrp = elf_elfheader (abfd);
7745 if (i_ehdrp == NULL)
7746 fprintf_vma ((FILE *) stream, value);
7747 else
7748 {
7749 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7750 {
ae4221d7 7751#if BFD_HOST_64BIT_LONG
cc55aec9 7752 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 7753#else
cc55aec9
AM
7754 fprintf ((FILE *) stream, "%08lx%08lx",
7755 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 7756#endif
cc55aec9 7757 }
ae4221d7
L
7758 else
7759 fprintf ((FILE *) stream, "%08lx",
7760 (unsigned long) (value & 0xffffffff));
7761 }
d3b05f8d
L
7762#else
7763 fprintf_vma ((FILE *) stream, value);
7764#endif
ae4221d7 7765}
db6751f2
JJ
7766
7767enum elf_reloc_type_class
217aa764 7768_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
7769{
7770 return reloc_class_normal;
7771}
f8df10f4 7772
47d9a591 7773/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
7774 relocation against a local symbol. */
7775
7776bfd_vma
217aa764
AM
7777_bfd_elf_rela_local_sym (bfd *abfd,
7778 Elf_Internal_Sym *sym,
8517fae7 7779 asection **psec,
217aa764 7780 Elf_Internal_Rela *rel)
f8df10f4 7781{
8517fae7 7782 asection *sec = *psec;
f8df10f4
JJ
7783 bfd_vma relocation;
7784
7785 relocation = (sec->output_section->vma
7786 + sec->output_offset
7787 + sym->st_value);
7788 if ((sec->flags & SEC_MERGE)
c629eae0 7789 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 7790 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 7791 {
f8df10f4 7792 rel->r_addend =
8517fae7 7793 _bfd_merged_section_offset (abfd, psec,
65765700 7794 elf_section_data (sec)->sec_info,
753731ee
AM
7795 sym->st_value + rel->r_addend);
7796 if (sec != *psec)
7797 {
7798 /* If we have changed the section, and our original section is
7799 marked with SEC_EXCLUDE, it means that the original
7800 SEC_MERGE section has been completely subsumed in some
7801 other SEC_MERGE section. In this case, we need to leave
7802 some info around for --emit-relocs. */
7803 if ((sec->flags & SEC_EXCLUDE) != 0)
7804 sec->kept_section = *psec;
7805 sec = *psec;
7806 }
8517fae7
AM
7807 rel->r_addend -= relocation;
7808 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
7809 }
7810 return relocation;
7811}
c629eae0
JJ
7812
7813bfd_vma
217aa764
AM
7814_bfd_elf_rel_local_sym (bfd *abfd,
7815 Elf_Internal_Sym *sym,
7816 asection **psec,
7817 bfd_vma addend)
47d9a591 7818{
c629eae0
JJ
7819 asection *sec = *psec;
7820
68bfbfcc 7821 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
7822 return sym->st_value + addend;
7823
7824 return _bfd_merged_section_offset (abfd, psec,
65765700 7825 elf_section_data (sec)->sec_info,
753731ee 7826 sym->st_value + addend);
c629eae0
JJ
7827}
7828
7829bfd_vma
217aa764 7830_bfd_elf_section_offset (bfd *abfd,
92e4ec35 7831 struct bfd_link_info *info,
217aa764
AM
7832 asection *sec,
7833 bfd_vma offset)
c629eae0 7834{
68bfbfcc 7835 switch (sec->sec_info_type)
65765700
JJ
7836 {
7837 case ELF_INFO_TYPE_STABS:
eea6121a
AM
7838 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
7839 offset);
65765700 7840 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 7841 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
7842 default:
7843 return offset;
7844 }
c629eae0 7845}
3333a7c3
RM
7846\f
7847/* Create a new BFD as if by bfd_openr. Rather than opening a file,
7848 reconstruct an ELF file by reading the segments out of remote memory
7849 based on the ELF file header at EHDR_VMA and the ELF program headers it
7850 points to. If not null, *LOADBASEP is filled in with the difference
7851 between the VMAs from which the segments were read, and the VMAs the
7852 file headers (and hence BFD's idea of each section's VMA) put them at.
7853
7854 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
7855 remote memory at target address VMA into the local buffer at MYADDR; it
7856 should return zero on success or an `errno' code on failure. TEMPL must
7857 be a BFD for an ELF target with the word size and byte order found in
7858 the remote memory. */
7859
7860bfd *
217aa764
AM
7861bfd_elf_bfd_from_remote_memory
7862 (bfd *templ,
7863 bfd_vma ehdr_vma,
7864 bfd_vma *loadbasep,
f075ee0c 7865 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
7866{
7867 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
7868 (templ, ehdr_vma, loadbasep, target_read_memory);
7869}
4c45e5c9
JJ
7870\f
7871long
c9727e01
AM
7872_bfd_elf_get_synthetic_symtab (bfd *abfd,
7873 long symcount ATTRIBUTE_UNUSED,
7874 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 7875 long dynsymcount,
c9727e01
AM
7876 asymbol **dynsyms,
7877 asymbol **ret)
4c45e5c9
JJ
7878{
7879 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7880 asection *relplt;
7881 asymbol *s;
7882 const char *relplt_name;
7883 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
7884 arelent *p;
7885 long count, i, n;
7886 size_t size;
7887 Elf_Internal_Shdr *hdr;
7888 char *names;
7889 asection *plt;
7890
8615f3f2
AM
7891 *ret = NULL;
7892
90e3cdf2
JJ
7893 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
7894 return 0;
7895
8615f3f2
AM
7896 if (dynsymcount <= 0)
7897 return 0;
7898
4c45e5c9
JJ
7899 if (!bed->plt_sym_val)
7900 return 0;
7901
7902 relplt_name = bed->relplt_name;
7903 if (relplt_name == NULL)
7904 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
7905 relplt = bfd_get_section_by_name (abfd, relplt_name);
7906 if (relplt == NULL)
7907 return 0;
7908
7909 hdr = &elf_section_data (relplt)->this_hdr;
7910 if (hdr->sh_link != elf_dynsymtab (abfd)
7911 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
7912 return 0;
7913
7914 plt = bfd_get_section_by_name (abfd, ".plt");
7915 if (plt == NULL)
7916 return 0;
7917
7918 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 7919 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
7920 return -1;
7921
eea6121a 7922 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
7923 size = count * sizeof (asymbol);
7924 p = relplt->relocation;
7925 for (i = 0; i < count; i++, s++, p++)
7926 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
7927
7928 s = *ret = bfd_malloc (size);
7929 if (s == NULL)
7930 return -1;
7931
7932 names = (char *) (s + count);
7933 p = relplt->relocation;
7934 n = 0;
7935 for (i = 0; i < count; i++, s++, p++)
7936 {
7937 size_t len;
7938 bfd_vma addr;
7939
7940 addr = bed->plt_sym_val (i, plt, p);
7941 if (addr == (bfd_vma) -1)
7942 continue;
7943
7944 *s = **p->sym_ptr_ptr;
7945 s->section = plt;
7946 s->value = addr - plt->vma;
7947 s->name = names;
7948 len = strlen ((*p->sym_ptr_ptr)->name);
7949 memcpy (names, (*p->sym_ptr_ptr)->name, len);
7950 names += len;
7951 memcpy (names, "@plt", sizeof ("@plt"));
7952 names += sizeof ("@plt");
7953 ++n;
7954 }
7955
7956 return n;
7957}
3d7f7666
L
7958
7959/* Sort symbol by binding and section. We want to put definitions
7960 sorted by section at the beginning. */
7961
7962static int
7963elf_sort_elf_symbol (const void *arg1, const void *arg2)
7964{
7965 const Elf_Internal_Sym *s1;
7966 const Elf_Internal_Sym *s2;
7967 int shndx;
7968
7969 /* Make sure that undefined symbols are at the end. */
7970 s1 = (const Elf_Internal_Sym *) arg1;
7971 if (s1->st_shndx == SHN_UNDEF)
7972 return 1;
7973 s2 = (const Elf_Internal_Sym *) arg2;
7974 if (s2->st_shndx == SHN_UNDEF)
7975 return -1;
7976
7977 /* Sorted by section index. */
7978 shndx = s1->st_shndx - s2->st_shndx;
7979 if (shndx != 0)
7980 return shndx;
7981
7982 /* Sorted by binding. */
7983 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
7984}
7985
7986struct elf_symbol
7987{
7988 Elf_Internal_Sym *sym;
7989 const char *name;
7990};
7991
7992static int
7993elf_sym_name_compare (const void *arg1, const void *arg2)
7994{
7995 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
7996 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
7997 return strcmp (s1->name, s2->name);
7998}
7999
8000/* Check if 2 sections define the same set of local and global
8001 symbols. */
8002
8003bfd_boolean
8004bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8005{
8006 bfd *bfd1, *bfd2;
8007 const struct elf_backend_data *bed1, *bed2;
8008 Elf_Internal_Shdr *hdr1, *hdr2;
8009 bfd_size_type symcount1, symcount2;
8010 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8011 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8012 Elf_Internal_Sym *isymend;
8013 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8014 bfd_size_type count1, count2, i;
8015 int shndx1, shndx2;
8016 bfd_boolean result;
8017
8018 bfd1 = sec1->owner;
8019 bfd2 = sec2->owner;
8020
8021 /* If both are .gnu.linkonce sections, they have to have the same
8022 section name. */
8023 if (strncmp (sec1->name, ".gnu.linkonce",
8024 sizeof ".gnu.linkonce" - 1) == 0
8025 && strncmp (sec2->name, ".gnu.linkonce",
8026 sizeof ".gnu.linkonce" - 1) == 0)
8027 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8028 sec2->name + sizeof ".gnu.linkonce") == 0;
8029
8030 /* Both sections have to be in ELF. */
8031 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8032 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8033 return FALSE;
8034
8035 if (elf_section_type (sec1) != elf_section_type (sec2))
8036 return FALSE;
8037
8038 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8039 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8040 {
8041 /* If both are members of section groups, they have to have the
8042 same group name. */
8043 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8044 return FALSE;
8045 }
8046
8047 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8048 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8049 if (shndx1 == -1 || shndx2 == -1)
8050 return FALSE;
8051
8052 bed1 = get_elf_backend_data (bfd1);
8053 bed2 = get_elf_backend_data (bfd2);
8054 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8055 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8056 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8057 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8058
8059 if (symcount1 == 0 || symcount2 == 0)
8060 return FALSE;
8061
8062 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8063 NULL, NULL, NULL);
8064 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8065 NULL, NULL, NULL);
8066
8067 result = FALSE;
8068 if (isymbuf1 == NULL || isymbuf2 == NULL)
8069 goto done;
8070
8071 /* Sort symbols by binding and section. Global definitions are at
8072 the beginning. */
8073 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8074 elf_sort_elf_symbol);
8075 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8076 elf_sort_elf_symbol);
8077
8078 /* Count definitions in the section. */
8079 count1 = 0;
8080 for (isym = isymbuf1, isymend = isym + symcount1;
8081 isym < isymend; isym++)
8082 {
8083 if (isym->st_shndx == (unsigned int) shndx1)
8084 {
8085 if (count1 == 0)
8086 isymstart1 = isym;
8087 count1++;
8088 }
8089
8090 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8091 break;
8092 }
8093
8094 count2 = 0;
8095 for (isym = isymbuf2, isymend = isym + symcount2;
8096 isym < isymend; isym++)
8097 {
8098 if (isym->st_shndx == (unsigned int) shndx2)
8099 {
8100 if (count2 == 0)
8101 isymstart2 = isym;
8102 count2++;
8103 }
8104
8105 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8106 break;
8107 }
8108
8109 if (count1 == 0 || count2 == 0 || count1 != count2)
8110 goto done;
8111
8112 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8113 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8114
8115 if (symtable1 == NULL || symtable2 == NULL)
8116 goto done;
8117
8118 symp = symtable1;
8119 for (isym = isymstart1, isymend = isym + count1;
8120 isym < isymend; isym++)
8121 {
8122 symp->sym = isym;
8123 symp->name = bfd_elf_string_from_elf_section (bfd1,
8124 hdr1->sh_link,
8125 isym->st_name);
8126 symp++;
8127 }
8128
8129 symp = symtable2;
8130 for (isym = isymstart2, isymend = isym + count1;
8131 isym < isymend; isym++)
8132 {
8133 symp->sym = isym;
8134 symp->name = bfd_elf_string_from_elf_section (bfd2,
8135 hdr2->sh_link,
8136 isym->st_name);
8137 symp++;
8138 }
8139
8140 /* Sort symbol by name. */
8141 qsort (symtable1, count1, sizeof (struct elf_symbol),
8142 elf_sym_name_compare);
8143 qsort (symtable2, count1, sizeof (struct elf_symbol),
8144 elf_sym_name_compare);
8145
8146 for (i = 0; i < count1; i++)
8147 /* Two symbols must have the same binding, type and name. */
8148 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8149 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8150 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8151 goto done;
8152
8153 result = TRUE;
8154
8155done:
8156 if (symtable1)
8157 free (symtable1);
8158 if (symtable2)
8159 free (symtable2);
8160 if (isymbuf1)
8161 free (isymbuf1);
8162 if (isymbuf2)
8163 free (isymbuf2);
8164
8165 return result;
8166}
This page took 1.091612 seconds and 4 git commands to generate.