* elf/external.h (GRP_ENTRY_SIZE): Define.
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
8615f3f2 4 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
661a3fd4 22/* SECTION
47d9a591 23
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
209/* Read a specified number of bytes at a specified offset in an ELF
210 file, into a newly allocated buffer, and return a pointer to the
c044fabd 211 buffer. */
252b5132 212
f075ee0c 213static bfd_byte *
217aa764 214elf_read (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 215{
f075ee0c 216 bfd_byte *buf;
252b5132
RH
217
218 if ((buf = bfd_alloc (abfd, size)) == NULL)
219 return NULL;
dc810e39 220 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
252b5132 221 return NULL;
217aa764 222 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
223 {
224 if (bfd_get_error () != bfd_error_system_call)
225 bfd_set_error (bfd_error_file_truncated);
226 return NULL;
227 }
228 return buf;
229}
230
b34976b6 231bfd_boolean
217aa764 232bfd_elf_mkobject (bfd *abfd)
252b5132 233{
c044fabd
KH
234 /* This just does initialization. */
235 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 236 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 237 if (elf_tdata (abfd) == 0)
b34976b6 238 return FALSE;
c044fabd
KH
239 /* Since everything is done at close time, do we need any
240 initialization? */
252b5132 241
b34976b6 242 return TRUE;
252b5132
RH
243}
244
b34976b6 245bfd_boolean
217aa764 246bfd_elf_mkcorefile (bfd *abfd)
252b5132 247{
c044fabd 248 /* I think this can be done just like an object file. */
252b5132
RH
249 return bfd_elf_mkobject (abfd);
250}
251
252char *
217aa764 253bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
254{
255 Elf_Internal_Shdr **i_shdrp;
f075ee0c 256 bfd_byte *shstrtab = NULL;
dc810e39
AM
257 file_ptr offset;
258 bfd_size_type shstrtabsize;
252b5132
RH
259
260 i_shdrp = elf_elfsections (abfd);
261 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 262 return NULL;
252b5132 263
f075ee0c 264 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
265 if (shstrtab == NULL)
266 {
c044fabd 267 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
268 offset = i_shdrp[shindex]->sh_offset;
269 shstrtabsize = i_shdrp[shindex]->sh_size;
270 shstrtab = elf_read (abfd, offset, shstrtabsize);
217aa764 271 i_shdrp[shindex]->contents = shstrtab;
252b5132 272 }
f075ee0c 273 return (char *) shstrtab;
252b5132
RH
274}
275
276char *
217aa764
AM
277bfd_elf_string_from_elf_section (bfd *abfd,
278 unsigned int shindex,
279 unsigned int strindex)
252b5132
RH
280{
281 Elf_Internal_Shdr *hdr;
282
283 if (strindex == 0)
284 return "";
285
286 hdr = elf_elfsections (abfd)[shindex];
287
288 if (hdr->contents == NULL
289 && bfd_elf_get_str_section (abfd, shindex) == NULL)
290 return NULL;
291
292 if (strindex >= hdr->sh_size)
293 {
1b3a8575 294 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 295 (*_bfd_error_handler)
d003868e
AM
296 (_("%B: invalid string offset %u >= %lu for section `%s'"),
297 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 298 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 299 ? ".shstrtab"
1b3a8575 300 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
301 return "";
302 }
303
304 return ((char *) hdr->contents) + strindex;
305}
306
6cdc0ccc
AM
307/* Read and convert symbols to internal format.
308 SYMCOUNT specifies the number of symbols to read, starting from
309 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
310 are non-NULL, they are used to store the internal symbols, external
311 symbols, and symbol section index extensions, respectively. */
312
313Elf_Internal_Sym *
217aa764
AM
314bfd_elf_get_elf_syms (bfd *ibfd,
315 Elf_Internal_Shdr *symtab_hdr,
316 size_t symcount,
317 size_t symoffset,
318 Elf_Internal_Sym *intsym_buf,
319 void *extsym_buf,
320 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
321{
322 Elf_Internal_Shdr *shndx_hdr;
217aa764 323 void *alloc_ext;
df622259 324 const bfd_byte *esym;
6cdc0ccc
AM
325 Elf_External_Sym_Shndx *alloc_extshndx;
326 Elf_External_Sym_Shndx *shndx;
327 Elf_Internal_Sym *isym;
328 Elf_Internal_Sym *isymend;
9c5bfbb7 329 const struct elf_backend_data *bed;
6cdc0ccc
AM
330 size_t extsym_size;
331 bfd_size_type amt;
332 file_ptr pos;
333
334 if (symcount == 0)
335 return intsym_buf;
336
337 /* Normal syms might have section extension entries. */
338 shndx_hdr = NULL;
339 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
340 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
341
342 /* Read the symbols. */
343 alloc_ext = NULL;
344 alloc_extshndx = NULL;
345 bed = get_elf_backend_data (ibfd);
346 extsym_size = bed->s->sizeof_sym;
347 amt = symcount * extsym_size;
348 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
349 if (extsym_buf == NULL)
350 {
351 alloc_ext = bfd_malloc (amt);
352 extsym_buf = alloc_ext;
353 }
354 if (extsym_buf == NULL
355 || bfd_seek (ibfd, pos, SEEK_SET) != 0
356 || bfd_bread (extsym_buf, amt, ibfd) != amt)
357 {
358 intsym_buf = NULL;
359 goto out;
360 }
361
362 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
363 extshndx_buf = NULL;
364 else
365 {
366 amt = symcount * sizeof (Elf_External_Sym_Shndx);
367 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
368 if (extshndx_buf == NULL)
369 {
217aa764 370 alloc_extshndx = bfd_malloc (amt);
6cdc0ccc
AM
371 extshndx_buf = alloc_extshndx;
372 }
373 if (extshndx_buf == NULL
374 || bfd_seek (ibfd, pos, SEEK_SET) != 0
375 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
376 {
377 intsym_buf = NULL;
378 goto out;
379 }
380 }
381
382 if (intsym_buf == NULL)
383 {
384 bfd_size_type amt = symcount * sizeof (Elf_Internal_Sym);
217aa764 385 intsym_buf = bfd_malloc (amt);
6cdc0ccc
AM
386 if (intsym_buf == NULL)
387 goto out;
388 }
389
390 /* Convert the symbols to internal form. */
391 isymend = intsym_buf + symcount;
392 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
393 isym < isymend;
394 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 395 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
396
397 out:
398 if (alloc_ext != NULL)
399 free (alloc_ext);
400 if (alloc_extshndx != NULL)
401 free (alloc_extshndx);
402
403 return intsym_buf;
404}
405
5cab59f6
AM
406/* Look up a symbol name. */
407const char *
be8dd2ca
AM
408bfd_elf_sym_name (bfd *abfd,
409 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
410 Elf_Internal_Sym *isym,
411 asection *sym_sec)
5cab59f6 412{
26c61ae5 413 const char *name;
5cab59f6 414 unsigned int iname = isym->st_name;
be8dd2ca 415 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 416
138f35cc
JJ
417 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
418 /* Check for a bogus st_shndx to avoid crashing. */
419 && isym->st_shndx < elf_numsections (abfd)
420 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
421 {
422 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
423 shindex = elf_elfheader (abfd)->e_shstrndx;
424 }
425
26c61ae5
L
426 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
427 if (name == NULL)
428 name = "(null)";
429 else if (sym_sec && *name == '\0')
430 name = bfd_section_name (abfd, sym_sec);
431
432 return name;
5cab59f6
AM
433}
434
dbb410c3
AM
435/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
436 sections. The first element is the flags, the rest are section
437 pointers. */
438
439typedef union elf_internal_group {
440 Elf_Internal_Shdr *shdr;
441 unsigned int flags;
442} Elf_Internal_Group;
443
b885599b
AM
444/* Return the name of the group signature symbol. Why isn't the
445 signature just a string? */
446
447static const char *
217aa764 448group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 449{
9dce4196 450 Elf_Internal_Shdr *hdr;
9dce4196
AM
451 unsigned char esym[sizeof (Elf64_External_Sym)];
452 Elf_External_Sym_Shndx eshndx;
453 Elf_Internal_Sym isym;
b885599b 454
13792e9d
L
455 /* First we need to ensure the symbol table is available. Make sure
456 that it is a symbol table section. */
457 hdr = elf_elfsections (abfd) [ghdr->sh_link];
458 if (hdr->sh_type != SHT_SYMTAB
459 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
460 return NULL;
461
9dce4196
AM
462 /* Go read the symbol. */
463 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
464 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
465 &isym, esym, &eshndx) == NULL)
b885599b 466 return NULL;
9dce4196 467
26c61ae5 468 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
469}
470
dbb410c3
AM
471/* Set next_in_group list pointer, and group name for NEWSECT. */
472
b34976b6 473static bfd_boolean
217aa764 474setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
475{
476 unsigned int num_group = elf_tdata (abfd)->num_group;
477
478 /* If num_group is zero, read in all SHT_GROUP sections. The count
479 is set to -1 if there are no SHT_GROUP sections. */
480 if (num_group == 0)
481 {
482 unsigned int i, shnum;
483
484 /* First count the number of groups. If we have a SHT_GROUP
485 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 486 shnum = elf_numsections (abfd);
dbb410c3
AM
487 num_group = 0;
488 for (i = 0; i < shnum; i++)
489 {
490 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
491 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
492 num_group += 1;
493 }
494
495 if (num_group == 0)
20dbb49d
L
496 {
497 num_group = (unsigned) -1;
498 elf_tdata (abfd)->num_group = num_group;
499 }
500 else
dbb410c3
AM
501 {
502 /* We keep a list of elf section headers for group sections,
503 so we can find them quickly. */
20dbb49d
L
504 bfd_size_type amt;
505
506 elf_tdata (abfd)->num_group = num_group;
507 amt = num_group * sizeof (Elf_Internal_Shdr *);
dbb410c3
AM
508 elf_tdata (abfd)->group_sect_ptr = bfd_alloc (abfd, amt);
509 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 510 return FALSE;
dbb410c3
AM
511
512 num_group = 0;
513 for (i = 0; i < shnum; i++)
514 {
515 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
516 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
517 {
973ffd63 518 unsigned char *src;
dbb410c3
AM
519 Elf_Internal_Group *dest;
520
521 /* Add to list of sections. */
522 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
523 num_group += 1;
524
525 /* Read the raw contents. */
526 BFD_ASSERT (sizeof (*dest) >= 4);
527 amt = shdr->sh_size * sizeof (*dest) / 4;
528 shdr->contents = bfd_alloc (abfd, amt);
529 if (shdr->contents == NULL
530 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
531 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
532 != shdr->sh_size))
b34976b6 533 return FALSE;
dbb410c3
AM
534
535 /* Translate raw contents, a flag word followed by an
536 array of elf section indices all in target byte order,
537 to the flag word followed by an array of elf section
538 pointers. */
539 src = shdr->contents + shdr->sh_size;
540 dest = (Elf_Internal_Group *) (shdr->contents + amt);
541 while (1)
542 {
543 unsigned int idx;
544
545 src -= 4;
546 --dest;
547 idx = H_GET_32 (abfd, src);
548 if (src == shdr->contents)
549 {
550 dest->flags = idx;
b885599b
AM
551 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
552 shdr->bfd_section->flags
553 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
554 break;
555 }
556 if (idx >= shnum)
557 {
558 ((*_bfd_error_handler)
d003868e 559 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
560 idx = 0;
561 }
562 dest->shdr = elf_elfsections (abfd)[idx];
563 }
564 }
565 }
566 }
567 }
568
569 if (num_group != (unsigned) -1)
570 {
571 unsigned int i;
572
573 for (i = 0; i < num_group; i++)
574 {
575 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
576 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
577 unsigned int n_elt = shdr->sh_size / 4;
578
579 /* Look through this group's sections to see if current
580 section is a member. */
581 while (--n_elt != 0)
582 if ((++idx)->shdr == hdr)
583 {
e0e8c97f 584 asection *s = NULL;
dbb410c3
AM
585
586 /* We are a member of this group. Go looking through
587 other members to see if any others are linked via
588 next_in_group. */
589 idx = (Elf_Internal_Group *) shdr->contents;
590 n_elt = shdr->sh_size / 4;
591 while (--n_elt != 0)
592 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 593 && elf_next_in_group (s) != NULL)
dbb410c3
AM
594 break;
595 if (n_elt != 0)
596 {
dbb410c3
AM
597 /* Snarf the group name from other member, and
598 insert current section in circular list. */
945906ff
AM
599 elf_group_name (newsect) = elf_group_name (s);
600 elf_next_in_group (newsect) = elf_next_in_group (s);
601 elf_next_in_group (s) = newsect;
dbb410c3
AM
602 }
603 else
604 {
dbb410c3
AM
605 const char *gname;
606
b885599b
AM
607 gname = group_signature (abfd, shdr);
608 if (gname == NULL)
b34976b6 609 return FALSE;
945906ff 610 elf_group_name (newsect) = gname;
dbb410c3
AM
611
612 /* Start a circular list with one element. */
945906ff 613 elf_next_in_group (newsect) = newsect;
dbb410c3 614 }
b885599b 615
9dce4196
AM
616 /* If the group section has been created, point to the
617 new member. */
dbb410c3 618 if (shdr->bfd_section != NULL)
945906ff 619 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 620
dbb410c3
AM
621 i = num_group - 1;
622 break;
623 }
624 }
625 }
626
945906ff 627 if (elf_group_name (newsect) == NULL)
dbb410c3 628 {
d003868e
AM
629 (*_bfd_error_handler) (_("%B: no group info for section %A"),
630 abfd, newsect);
dbb410c3 631 }
b34976b6 632 return TRUE;
dbb410c3
AM
633}
634
3d7f7666
L
635bfd_boolean
636_bfd_elf_setup_group_pointers (bfd *abfd)
637{
638 unsigned int i;
639 unsigned int num_group = elf_tdata (abfd)->num_group;
640 bfd_boolean result = TRUE;
641
642 if (num_group == (unsigned) -1)
643 return result;
644
645 for (i = 0; i < num_group; i++)
646 {
647 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
648 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
649 unsigned int n_elt = shdr->sh_size / 4;
650
651 while (--n_elt != 0)
652 if ((++idx)->shdr->bfd_section)
653 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
654 else if (idx->shdr->sh_type == SHT_RELA
655 || idx->shdr->sh_type == SHT_REL)
656 /* We won't include relocation sections in section groups in
657 output object files. We adjust the group section size here
658 so that relocatable link will work correctly when
659 relocation sections are in section group in input object
660 files. */
661 shdr->bfd_section->size -= 4;
662 else
663 {
664 /* There are some unknown sections in the group. */
665 (*_bfd_error_handler)
d003868e
AM
666 (_("%B: unknown [%d] section `%s' in group [%s]"),
667 abfd,
3d7f7666 668 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
669 bfd_elf_string_from_elf_section (abfd,
670 (elf_elfheader (abfd)
671 ->e_shstrndx),
672 idx->shdr->sh_name),
3d7f7666
L
673 shdr->bfd_section->name);
674 result = FALSE;
675 }
676 }
677 return result;
678}
679
72adc230
AM
680bfd_boolean
681bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
682{
683 return elf_next_in_group (sec) != NULL;
684}
685
252b5132
RH
686/* Make a BFD section from an ELF section. We store a pointer to the
687 BFD section in the bfd_section field of the header. */
688
b34976b6 689bfd_boolean
217aa764
AM
690_bfd_elf_make_section_from_shdr (bfd *abfd,
691 Elf_Internal_Shdr *hdr,
6dc132d9
L
692 const char *name,
693 int shindex)
252b5132
RH
694{
695 asection *newsect;
696 flagword flags;
9c5bfbb7 697 const struct elf_backend_data *bed;
252b5132
RH
698
699 if (hdr->bfd_section != NULL)
700 {
701 BFD_ASSERT (strcmp (name,
702 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 703 return TRUE;
252b5132
RH
704 }
705
706 newsect = bfd_make_section_anyway (abfd, name);
707 if (newsect == NULL)
b34976b6 708 return FALSE;
252b5132 709
1829f4b2
AM
710 hdr->bfd_section = newsect;
711 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 712 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 713
2f89ff8d
L
714 /* Always use the real type/flags. */
715 elf_section_type (newsect) = hdr->sh_type;
716 elf_section_flags (newsect) = hdr->sh_flags;
717
252b5132
RH
718 newsect->filepos = hdr->sh_offset;
719
720 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
721 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
722 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 723 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 724 return FALSE;
252b5132
RH
725
726 flags = SEC_NO_FLAGS;
727 if (hdr->sh_type != SHT_NOBITS)
728 flags |= SEC_HAS_CONTENTS;
dbb410c3 729 if (hdr->sh_type == SHT_GROUP)
b3096250 730 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
731 if ((hdr->sh_flags & SHF_ALLOC) != 0)
732 {
733 flags |= SEC_ALLOC;
734 if (hdr->sh_type != SHT_NOBITS)
735 flags |= SEC_LOAD;
736 }
737 if ((hdr->sh_flags & SHF_WRITE) == 0)
738 flags |= SEC_READONLY;
739 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
740 flags |= SEC_CODE;
741 else if ((flags & SEC_LOAD) != 0)
742 flags |= SEC_DATA;
f5fa8ca2
JJ
743 if ((hdr->sh_flags & SHF_MERGE) != 0)
744 {
745 flags |= SEC_MERGE;
746 newsect->entsize = hdr->sh_entsize;
747 if ((hdr->sh_flags & SHF_STRINGS) != 0)
748 flags |= SEC_STRINGS;
749 }
dbb410c3
AM
750 if (hdr->sh_flags & SHF_GROUP)
751 if (!setup_group (abfd, hdr, newsect))
b34976b6 752 return FALSE;
13ae64f3
JJ
753 if ((hdr->sh_flags & SHF_TLS) != 0)
754 flags |= SEC_THREAD_LOCAL;
252b5132 755
3d2b39cf 756 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 757 {
3d2b39cf
L
758 /* The debugging sections appear to be recognized only by name,
759 not any sort of flag. Their SEC_ALLOC bits are cleared. */
760 static const struct
761 {
762 const char *name;
763 int len;
764 } debug_sections [] =
765 {
766 { "debug", 5 }, /* 'd' */
767 { NULL, 0 }, /* 'e' */
768 { NULL, 0 }, /* 'f' */
769 { "gnu.linkonce.wi.", 17 }, /* 'g' */
770 { NULL, 0 }, /* 'h' */
771 { NULL, 0 }, /* 'i' */
772 { NULL, 0 }, /* 'j' */
773 { NULL, 0 }, /* 'k' */
774 { "line", 4 }, /* 'l' */
775 { NULL, 0 }, /* 'm' */
776 { NULL, 0 }, /* 'n' */
777 { NULL, 0 }, /* 'o' */
778 { NULL, 0 }, /* 'p' */
779 { NULL, 0 }, /* 'q' */
780 { NULL, 0 }, /* 'r' */
781 { "stab", 4 } /* 's' */
782 };
783
784 if (name [0] == '.')
785 {
786 int i = name [1] - 'd';
787 if (i >= 0
788 && i < (int) ARRAY_SIZE (debug_sections)
789 && debug_sections [i].name != NULL
790 && strncmp (&name [1], debug_sections [i].name,
791 debug_sections [i].len) == 0)
792 flags |= SEC_DEBUGGING;
793 }
794 }
252b5132
RH
795
796 /* As a GNU extension, if the name begins with .gnu.linkonce, we
797 only link a single copy of the section. This is used to support
798 g++. g++ will emit each template expansion in its own section.
799 The symbols will be defined as weak, so that multiple definitions
800 are permitted. The GNU linker extension is to actually discard
801 all but one of the sections. */
b885599b
AM
802 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
803 && elf_next_in_group (newsect) == NULL)
252b5132
RH
804 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
805
fa152c49
JW
806 bed = get_elf_backend_data (abfd);
807 if (bed->elf_backend_section_flags)
808 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 809 return FALSE;
fa152c49 810
252b5132 811 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 812 return FALSE;
252b5132
RH
813
814 if ((flags & SEC_ALLOC) != 0)
815 {
816 Elf_Internal_Phdr *phdr;
817 unsigned int i;
818
819 /* Look through the phdrs to see if we need to adjust the lma.
820 If all the p_paddr fields are zero, we ignore them, since
821 some ELF linkers produce such output. */
822 phdr = elf_tdata (abfd)->phdr;
823 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
824 {
825 if (phdr->p_paddr != 0)
826 break;
827 }
828 if (i < elf_elfheader (abfd)->e_phnum)
829 {
830 phdr = elf_tdata (abfd)->phdr;
831 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
832 {
e0e8c97f
NC
833 /* This section is part of this segment if its file
834 offset plus size lies within the segment's memory
835 span and, if the section is loaded, the extent of the
47d9a591 836 loaded data lies within the extent of the segment.
bf36db18
NC
837
838 Note - we used to check the p_paddr field as well, and
839 refuse to set the LMA if it was 0. This is wrong
dba143ef 840 though, as a perfectly valid initialised segment can
bf36db18 841 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 842 place special significance on the address 0 and
bf36db18
NC
843 executables need to be able to have a segment which
844 covers this address. */
252b5132 845 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
846 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
847 && (hdr->sh_offset + hdr->sh_size
848 <= phdr->p_offset + phdr->p_memsz)
252b5132 849 && ((flags & SEC_LOAD) == 0
d7866f04
AM
850 || (hdr->sh_offset + hdr->sh_size
851 <= phdr->p_offset + phdr->p_filesz)))
252b5132 852 {
dba143ef 853 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
854 newsect->lma = (phdr->p_paddr
855 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
856 else
857 /* We used to use the same adjustment for SEC_LOAD
858 sections, but that doesn't work if the segment
859 is packed with code from multiple VMAs.
860 Instead we calculate the section LMA based on
861 the segment LMA. It is assumed that the
862 segment will contain sections with contiguous
863 LMAs, even if the VMAs are not. */
864 newsect->lma = (phdr->p_paddr
865 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
866
867 /* With contiguous segments, we can't tell from file
868 offsets whether a section with zero size should
869 be placed at the end of one segment or the
870 beginning of the next. Decide based on vaddr. */
871 if (hdr->sh_addr >= phdr->p_vaddr
872 && (hdr->sh_addr + hdr->sh_size
873 <= phdr->p_vaddr + phdr->p_memsz))
874 break;
252b5132
RH
875 }
876 }
877 }
878 }
879
b34976b6 880 return TRUE;
252b5132
RH
881}
882
883/*
884INTERNAL_FUNCTION
885 bfd_elf_find_section
886
887SYNOPSIS
888 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
889
890DESCRIPTION
891 Helper functions for GDB to locate the string tables.
892 Since BFD hides string tables from callers, GDB needs to use an
893 internal hook to find them. Sun's .stabstr, in particular,
894 isn't even pointed to by the .stab section, so ordinary
895 mechanisms wouldn't work to find it, even if we had some.
896*/
897
898struct elf_internal_shdr *
217aa764 899bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
900{
901 Elf_Internal_Shdr **i_shdrp;
902 char *shstrtab;
903 unsigned int max;
904 unsigned int i;
905
906 i_shdrp = elf_elfsections (abfd);
907 if (i_shdrp != NULL)
908 {
9ad5cbcf
AM
909 shstrtab = bfd_elf_get_str_section (abfd,
910 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
911 if (shstrtab != NULL)
912 {
9ad5cbcf 913 max = elf_numsections (abfd);
252b5132
RH
914 for (i = 1; i < max; i++)
915 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
916 return i_shdrp[i];
917 }
918 }
919 return 0;
920}
921
922const char *const bfd_elf_section_type_names[] = {
923 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
924 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
925 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
926};
927
1049f94e 928/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
929 output, and the reloc is against an external symbol, and nothing
930 has given us any additional addend, the resulting reloc will also
931 be against the same symbol. In such a case, we don't want to
932 change anything about the way the reloc is handled, since it will
933 all be done at final link time. Rather than put special case code
934 into bfd_perform_relocation, all the reloc types use this howto
935 function. It just short circuits the reloc if producing
1049f94e 936 relocatable output against an external symbol. */
252b5132 937
252b5132 938bfd_reloc_status_type
217aa764
AM
939bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
940 arelent *reloc_entry,
941 asymbol *symbol,
942 void *data ATTRIBUTE_UNUSED,
943 asection *input_section,
944 bfd *output_bfd,
945 char **error_message ATTRIBUTE_UNUSED)
946{
947 if (output_bfd != NULL
252b5132
RH
948 && (symbol->flags & BSF_SECTION_SYM) == 0
949 && (! reloc_entry->howto->partial_inplace
950 || reloc_entry->addend == 0))
951 {
952 reloc_entry->address += input_section->output_offset;
953 return bfd_reloc_ok;
954 }
955
956 return bfd_reloc_continue;
957}
958\f
d3c456e9
JJ
959/* Make sure sec_info_type is cleared if sec_info is cleared too. */
960
961static void
217aa764
AM
962merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
963 asection *sec)
d3c456e9 964{
68bfbfcc
AM
965 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
966 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
967}
968
8550eb6e
JJ
969/* Finish SHF_MERGE section merging. */
970
b34976b6 971bfd_boolean
217aa764 972_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 973{
57ceae94
AM
974 bfd *ibfd;
975 asection *sec;
976
0eddce27 977 if (!is_elf_hash_table (info->hash))
b34976b6 978 return FALSE;
57ceae94
AM
979
980 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
981 if ((ibfd->flags & DYNAMIC) == 0)
982 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
983 if ((sec->flags & SEC_MERGE) != 0
984 && !bfd_is_abs_section (sec->output_section))
985 {
986 struct bfd_elf_section_data *secdata;
987
988 secdata = elf_section_data (sec);
989 if (! _bfd_add_merge_section (abfd,
990 &elf_hash_table (info)->merge_info,
991 sec, &secdata->sec_info))
992 return FALSE;
993 else if (secdata->sec_info)
994 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
995 }
996
997 if (elf_hash_table (info)->merge_info != NULL)
998 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 999 merge_sections_remove_hook);
b34976b6 1000 return TRUE;
8550eb6e 1001}
2d653fc7
AM
1002
1003void
217aa764 1004_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1005{
1006 sec->output_section = bfd_abs_section_ptr;
1007 sec->output_offset = sec->vma;
0eddce27 1008 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1009 return;
1010
68bfbfcc 1011 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1012}
8550eb6e 1013\f
0ac4564e
L
1014/* Copy the program header and other data from one object module to
1015 another. */
252b5132 1016
b34976b6 1017bfd_boolean
217aa764 1018_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1019{
1020 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1021 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1022 return TRUE;
2d502050
L
1023
1024 BFD_ASSERT (!elf_flags_init (obfd)
1025 || (elf_elfheader (obfd)->e_flags
1026 == elf_elfheader (ibfd)->e_flags));
1027
0ac4564e 1028 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1029 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1030 elf_flags_init (obfd) = TRUE;
1031 return TRUE;
2d502050
L
1032}
1033
f0b79d91
L
1034/* Print out the program headers. */
1035
b34976b6 1036bfd_boolean
217aa764 1037_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1038{
217aa764 1039 FILE *f = farg;
252b5132
RH
1040 Elf_Internal_Phdr *p;
1041 asection *s;
1042 bfd_byte *dynbuf = NULL;
1043
1044 p = elf_tdata (abfd)->phdr;
1045 if (p != NULL)
1046 {
1047 unsigned int i, c;
1048
1049 fprintf (f, _("\nProgram Header:\n"));
1050 c = elf_elfheader (abfd)->e_phnum;
1051 for (i = 0; i < c; i++, p++)
1052 {
dc810e39 1053 const char *pt;
252b5132
RH
1054 char buf[20];
1055
1056 switch (p->p_type)
1057 {
dc810e39
AM
1058 case PT_NULL: pt = "NULL"; break;
1059 case PT_LOAD: pt = "LOAD"; break;
1060 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1061 case PT_INTERP: pt = "INTERP"; break;
1062 case PT_NOTE: pt = "NOTE"; break;
1063 case PT_SHLIB: pt = "SHLIB"; break;
1064 case PT_PHDR: pt = "PHDR"; break;
13ae64f3 1065 case PT_TLS: pt = "TLS"; break;
65765700 1066 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
9ee5e499 1067 case PT_GNU_STACK: pt = "STACK"; break;
8c37241b 1068 case PT_GNU_RELRO: pt = "RELRO"; break;
dc810e39 1069 default: sprintf (buf, "0x%lx", p->p_type); pt = buf; break;
252b5132 1070 }
dc810e39 1071 fprintf (f, "%8s off 0x", pt);
60b89a18 1072 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1073 fprintf (f, " vaddr 0x");
60b89a18 1074 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1075 fprintf (f, " paddr 0x");
60b89a18 1076 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1077 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1078 fprintf (f, " filesz 0x");
60b89a18 1079 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1080 fprintf (f, " memsz 0x");
60b89a18 1081 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1082 fprintf (f, " flags %c%c%c",
1083 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1084 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1085 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1086 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1087 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1088 fprintf (f, "\n");
1089 }
1090 }
1091
1092 s = bfd_get_section_by_name (abfd, ".dynamic");
1093 if (s != NULL)
1094 {
1095 int elfsec;
dc810e39 1096 unsigned long shlink;
252b5132
RH
1097 bfd_byte *extdyn, *extdynend;
1098 size_t extdynsize;
217aa764 1099 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1100
1101 fprintf (f, _("\nDynamic Section:\n"));
1102
eea6121a 1103 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1104 goto error_return;
1105
1106 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1107 if (elfsec == -1)
1108 goto error_return;
dc810e39 1109 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1110
1111 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1112 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1113
1114 extdyn = dynbuf;
eea6121a 1115 extdynend = extdyn + s->size;
252b5132
RH
1116 for (; extdyn < extdynend; extdyn += extdynsize)
1117 {
1118 Elf_Internal_Dyn dyn;
1119 const char *name;
1120 char ab[20];
b34976b6 1121 bfd_boolean stringp;
252b5132 1122
217aa764 1123 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1124
1125 if (dyn.d_tag == DT_NULL)
1126 break;
1127
b34976b6 1128 stringp = FALSE;
252b5132
RH
1129 switch (dyn.d_tag)
1130 {
1131 default:
1132 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1133 name = ab;
1134 break;
1135
b34976b6 1136 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1137 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1138 case DT_PLTGOT: name = "PLTGOT"; break;
1139 case DT_HASH: name = "HASH"; break;
1140 case DT_STRTAB: name = "STRTAB"; break;
1141 case DT_SYMTAB: name = "SYMTAB"; break;
1142 case DT_RELA: name = "RELA"; break;
1143 case DT_RELASZ: name = "RELASZ"; break;
1144 case DT_RELAENT: name = "RELAENT"; break;
1145 case DT_STRSZ: name = "STRSZ"; break;
1146 case DT_SYMENT: name = "SYMENT"; break;
1147 case DT_INIT: name = "INIT"; break;
1148 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1149 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1150 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1151 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1152 case DT_REL: name = "REL"; break;
1153 case DT_RELSZ: name = "RELSZ"; break;
1154 case DT_RELENT: name = "RELENT"; break;
1155 case DT_PLTREL: name = "PLTREL"; break;
1156 case DT_DEBUG: name = "DEBUG"; break;
1157 case DT_TEXTREL: name = "TEXTREL"; break;
1158 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1159 case DT_BIND_NOW: name = "BIND_NOW"; break;
1160 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1161 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1162 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1163 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1164 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1165 case DT_FLAGS: name = "FLAGS"; break;
1166 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1167 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1168 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1169 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1170 case DT_MOVEENT: name = "MOVEENT"; break;
1171 case DT_MOVESZ: name = "MOVESZ"; break;
1172 case DT_FEATURE: name = "FEATURE"; break;
1173 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1174 case DT_SYMINSZ: name = "SYMINSZ"; break;
1175 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1176 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1177 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1178 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1179 case DT_PLTPAD: name = "PLTPAD"; break;
1180 case DT_MOVETAB: name = "MOVETAB"; break;
1181 case DT_SYMINFO: name = "SYMINFO"; break;
1182 case DT_RELACOUNT: name = "RELACOUNT"; break;
1183 case DT_RELCOUNT: name = "RELCOUNT"; break;
1184 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1185 case DT_VERSYM: name = "VERSYM"; break;
1186 case DT_VERDEF: name = "VERDEF"; break;
1187 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1188 case DT_VERNEED: name = "VERNEED"; break;
1189 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1190 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1191 case DT_USED: name = "USED"; break;
b34976b6 1192 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1193 }
1194
1195 fprintf (f, " %-11s ", name);
1196 if (! stringp)
1197 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1198 else
1199 {
1200 const char *string;
dc810e39 1201 unsigned int tagv = dyn.d_un.d_val;
252b5132 1202
dc810e39 1203 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1204 if (string == NULL)
1205 goto error_return;
1206 fprintf (f, "%s", string);
1207 }
1208 fprintf (f, "\n");
1209 }
1210
1211 free (dynbuf);
1212 dynbuf = NULL;
1213 }
1214
1215 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1216 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1217 {
fc0e6df6 1218 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1219 return FALSE;
252b5132
RH
1220 }
1221
1222 if (elf_dynverdef (abfd) != 0)
1223 {
1224 Elf_Internal_Verdef *t;
1225
1226 fprintf (f, _("\nVersion definitions:\n"));
1227 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1228 {
1229 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1230 t->vd_flags, t->vd_hash, t->vd_nodename);
1231 if (t->vd_auxptr->vda_nextptr != NULL)
1232 {
1233 Elf_Internal_Verdaux *a;
1234
1235 fprintf (f, "\t");
1236 for (a = t->vd_auxptr->vda_nextptr;
1237 a != NULL;
1238 a = a->vda_nextptr)
1239 fprintf (f, "%s ", a->vda_nodename);
1240 fprintf (f, "\n");
1241 }
1242 }
1243 }
1244
1245 if (elf_dynverref (abfd) != 0)
1246 {
1247 Elf_Internal_Verneed *t;
1248
1249 fprintf (f, _("\nVersion References:\n"));
1250 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1251 {
1252 Elf_Internal_Vernaux *a;
1253
1254 fprintf (f, _(" required from %s:\n"), t->vn_filename);
1255 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1256 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1257 a->vna_flags, a->vna_other, a->vna_nodename);
1258 }
1259 }
1260
b34976b6 1261 return TRUE;
252b5132
RH
1262
1263 error_return:
1264 if (dynbuf != NULL)
1265 free (dynbuf);
b34976b6 1266 return FALSE;
252b5132
RH
1267}
1268
1269/* Display ELF-specific fields of a symbol. */
1270
1271void
217aa764
AM
1272bfd_elf_print_symbol (bfd *abfd,
1273 void *filep,
1274 asymbol *symbol,
1275 bfd_print_symbol_type how)
252b5132 1276{
217aa764 1277 FILE *file = filep;
252b5132
RH
1278 switch (how)
1279 {
1280 case bfd_print_symbol_name:
1281 fprintf (file, "%s", symbol->name);
1282 break;
1283 case bfd_print_symbol_more:
1284 fprintf (file, "elf ");
60b89a18 1285 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1286 fprintf (file, " %lx", (long) symbol->flags);
1287 break;
1288 case bfd_print_symbol_all:
1289 {
4e8a9624
AM
1290 const char *section_name;
1291 const char *name = NULL;
9c5bfbb7 1292 const struct elf_backend_data *bed;
7a13edea 1293 unsigned char st_other;
dbb410c3 1294 bfd_vma val;
c044fabd 1295
252b5132 1296 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1297
1298 bed = get_elf_backend_data (abfd);
1299 if (bed->elf_backend_print_symbol_all)
c044fabd 1300 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1301
1302 if (name == NULL)
1303 {
7ee38065 1304 name = symbol->name;
217aa764 1305 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1306 }
1307
252b5132
RH
1308 fprintf (file, " %s\t", section_name);
1309 /* Print the "other" value for a symbol. For common symbols,
1310 we've already printed the size; now print the alignment.
1311 For other symbols, we have no specified alignment, and
1312 we've printed the address; now print the size. */
dbb410c3
AM
1313 if (bfd_is_com_section (symbol->section))
1314 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1315 else
1316 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1317 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1318
1319 /* If we have version information, print it. */
1320 if (elf_tdata (abfd)->dynversym_section != 0
1321 && (elf_tdata (abfd)->dynverdef_section != 0
1322 || elf_tdata (abfd)->dynverref_section != 0))
1323 {
1324 unsigned int vernum;
1325 const char *version_string;
1326
1327 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1328
1329 if (vernum == 0)
1330 version_string = "";
1331 else if (vernum == 1)
1332 version_string = "Base";
1333 else if (vernum <= elf_tdata (abfd)->cverdefs)
1334 version_string =
1335 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1336 else
1337 {
1338 Elf_Internal_Verneed *t;
1339
1340 version_string = "";
1341 for (t = elf_tdata (abfd)->verref;
1342 t != NULL;
1343 t = t->vn_nextref)
1344 {
1345 Elf_Internal_Vernaux *a;
1346
1347 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1348 {
1349 if (a->vna_other == vernum)
1350 {
1351 version_string = a->vna_nodename;
1352 break;
1353 }
1354 }
1355 }
1356 }
1357
1358 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1359 fprintf (file, " %-11s", version_string);
1360 else
1361 {
1362 int i;
1363
1364 fprintf (file, " (%s)", version_string);
1365 for (i = 10 - strlen (version_string); i > 0; --i)
1366 putc (' ', file);
1367 }
1368 }
1369
1370 /* If the st_other field is not zero, print it. */
7a13edea 1371 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1372
7a13edea
NC
1373 switch (st_other)
1374 {
1375 case 0: break;
1376 case STV_INTERNAL: fprintf (file, " .internal"); break;
1377 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1378 case STV_PROTECTED: fprintf (file, " .protected"); break;
1379 default:
1380 /* Some other non-defined flags are also present, so print
1381 everything hex. */
1382 fprintf (file, " 0x%02x", (unsigned int) st_other);
1383 }
252b5132 1384
587ff49e 1385 fprintf (file, " %s", name);
252b5132
RH
1386 }
1387 break;
1388 }
1389}
1390\f
1391/* Create an entry in an ELF linker hash table. */
1392
1393struct bfd_hash_entry *
217aa764
AM
1394_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1395 struct bfd_hash_table *table,
1396 const char *string)
252b5132 1397{
252b5132
RH
1398 /* Allocate the structure if it has not already been allocated by a
1399 subclass. */
51b64d56
AM
1400 if (entry == NULL)
1401 {
1402 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1403 if (entry == NULL)
1404 return entry;
1405 }
252b5132
RH
1406
1407 /* Call the allocation method of the superclass. */
51b64d56
AM
1408 entry = _bfd_link_hash_newfunc (entry, table, string);
1409 if (entry != NULL)
252b5132 1410 {
51b64d56
AM
1411 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1412 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1413
252b5132
RH
1414 /* Set local fields. */
1415 ret->indx = -1;
252b5132 1416 ret->dynindx = -1;
a6aa5195
AM
1417 ret->got = htab->init_got_refcount;
1418 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1419 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1420 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1421 /* Assume that we have been called by a non-ELF symbol reader.
1422 This flag is then reset by the code which reads an ELF input
1423 file. This ensures that a symbol created by a non-ELF symbol
1424 reader will have the flag set correctly. */
f5385ebf 1425 ret->non_elf = 1;
252b5132
RH
1426 }
1427
51b64d56 1428 return entry;
252b5132
RH
1429}
1430
2920b85c 1431/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1432 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1433
c61b8717 1434void
9c5bfbb7 1435_bfd_elf_link_hash_copy_indirect (const struct elf_backend_data *bed,
217aa764
AM
1436 struct elf_link_hash_entry *dir,
1437 struct elf_link_hash_entry *ind)
2920b85c 1438{
3c3e9281 1439 bfd_signed_vma tmp;
b48fa14c 1440 bfd_signed_vma lowest_valid = bed->can_refcount;
3c3e9281 1441
2920b85c
RH
1442 /* Copy down any references that we may have already seen to the
1443 symbol which just became indirect. */
1444
f5385ebf
AM
1445 dir->ref_dynamic |= ind->ref_dynamic;
1446 dir->ref_regular |= ind->ref_regular;
1447 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1448 dir->non_got_ref |= ind->non_got_ref;
1449 dir->needs_plt |= ind->needs_plt;
1450 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1451
1e370bd2 1452 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1453 return;
1454
51b64d56 1455 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1456 These may have been already set up by a check_relocs routine. */
3c3e9281 1457 tmp = dir->got.refcount;
b48fa14c 1458 if (tmp < lowest_valid)
2920b85c 1459 {
51b64d56 1460 dir->got.refcount = ind->got.refcount;
3c3e9281 1461 ind->got.refcount = tmp;
2920b85c 1462 }
3c3e9281 1463 else
b48fa14c 1464 BFD_ASSERT (ind->got.refcount < lowest_valid);
2920b85c 1465
3c3e9281 1466 tmp = dir->plt.refcount;
b48fa14c 1467 if (tmp < lowest_valid)
2920b85c 1468 {
51b64d56 1469 dir->plt.refcount = ind->plt.refcount;
3c3e9281 1470 ind->plt.refcount = tmp;
2920b85c 1471 }
3c3e9281 1472 else
b48fa14c 1473 BFD_ASSERT (ind->plt.refcount < lowest_valid);
2920b85c
RH
1474
1475 if (dir->dynindx == -1)
1476 {
1477 dir->dynindx = ind->dynindx;
1478 dir->dynstr_index = ind->dynstr_index;
1479 ind->dynindx = -1;
1480 ind->dynstr_index = 0;
1481 }
3c3e9281
AM
1482 else
1483 BFD_ASSERT (ind->dynindx == -1);
2920b85c
RH
1484}
1485
c61b8717 1486void
217aa764
AM
1487_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1488 struct elf_link_hash_entry *h,
1489 bfd_boolean force_local)
2920b85c 1490{
a6aa5195 1491 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1492 h->needs_plt = 0;
e5094212
AM
1493 if (force_local)
1494 {
f5385ebf 1495 h->forced_local = 1;
e5094212
AM
1496 if (h->dynindx != -1)
1497 {
1498 h->dynindx = -1;
1499 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1500 h->dynstr_index);
1501 }
1502 }
2920b85c
RH
1503}
1504
252b5132
RH
1505/* Initialize an ELF linker hash table. */
1506
b34976b6 1507bfd_boolean
217aa764
AM
1508_bfd_elf_link_hash_table_init
1509 (struct elf_link_hash_table *table,
1510 bfd *abfd,
1511 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1512 struct bfd_hash_table *,
1513 const char *))
252b5132 1514{
b34976b6 1515 bfd_boolean ret;
a6aa5195 1516 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1517
b34976b6 1518 table->dynamic_sections_created = FALSE;
252b5132 1519 table->dynobj = NULL;
a6aa5195
AM
1520 table->init_got_refcount.refcount = can_refcount - 1;
1521 table->init_plt_refcount.refcount = can_refcount - 1;
1522 table->init_got_offset.offset = -(bfd_vma) 1;
1523 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1524 /* The first dynamic symbol is a dummy. */
1525 table->dynsymcount = 1;
1526 table->dynstr = NULL;
1527 table->bucketcount = 0;
1528 table->needed = NULL;
1529 table->hgot = NULL;
f5fa8ca2 1530 table->merge_info = NULL;
3722b82f 1531 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1532 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1533 table->dynlocal = NULL;
73722af0 1534 table->runpath = NULL;
e1918d23
AM
1535 table->tls_sec = NULL;
1536 table->tls_size = 0;
73722af0 1537 table->loaded = NULL;
67687978 1538 table->is_relocatable_executable = FALSE;
73722af0
AM
1539
1540 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc);
8ea2e4bd
NC
1541 table->root.type = bfd_link_elf_hash_table;
1542
1543 return ret;
252b5132
RH
1544}
1545
1546/* Create an ELF linker hash table. */
1547
1548struct bfd_link_hash_table *
217aa764 1549_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1550{
1551 struct elf_link_hash_table *ret;
dc810e39 1552 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1553
217aa764
AM
1554 ret = bfd_malloc (amt);
1555 if (ret == NULL)
252b5132
RH
1556 return NULL;
1557
1558 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc))
1559 {
e2d34d7d 1560 free (ret);
252b5132
RH
1561 return NULL;
1562 }
1563
1564 return &ret->root;
1565}
1566
1567/* This is a hook for the ELF emulation code in the generic linker to
1568 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1569 entry for a dynamic object. */
252b5132
RH
1570
1571void
217aa764 1572bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1573{
1574 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1575 && bfd_get_format (abfd) == bfd_object)
1576 elf_dt_name (abfd) = name;
1577}
1578
e56f61be
L
1579int
1580bfd_elf_get_dyn_lib_class (bfd *abfd)
1581{
1582 int lib_class;
1583 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1584 && bfd_get_format (abfd) == bfd_object)
1585 lib_class = elf_dyn_lib_class (abfd);
1586 else
1587 lib_class = 0;
1588 return lib_class;
1589}
1590
74816898 1591void
4a43e768 1592bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1593{
1594 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1595 && bfd_get_format (abfd) == bfd_object)
4a43e768 1596 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1597}
1598
252b5132
RH
1599/* Get the list of DT_NEEDED entries for a link. This is a hook for
1600 the linker ELF emulation code. */
1601
1602struct bfd_link_needed_list *
217aa764
AM
1603bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1604 struct bfd_link_info *info)
252b5132 1605{
0eddce27 1606 if (! is_elf_hash_table (info->hash))
252b5132
RH
1607 return NULL;
1608 return elf_hash_table (info)->needed;
1609}
1610
a963dc6a
L
1611/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1612 hook for the linker ELF emulation code. */
1613
1614struct bfd_link_needed_list *
217aa764
AM
1615bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1616 struct bfd_link_info *info)
a963dc6a 1617{
0eddce27 1618 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1619 return NULL;
1620 return elf_hash_table (info)->runpath;
1621}
1622
252b5132
RH
1623/* Get the name actually used for a dynamic object for a link. This
1624 is the SONAME entry if there is one. Otherwise, it is the string
1625 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1626
1627const char *
217aa764 1628bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1629{
1630 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1631 && bfd_get_format (abfd) == bfd_object)
1632 return elf_dt_name (abfd);
1633 return NULL;
1634}
1635
1636/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1637 the ELF linker emulation code. */
1638
b34976b6 1639bfd_boolean
217aa764
AM
1640bfd_elf_get_bfd_needed_list (bfd *abfd,
1641 struct bfd_link_needed_list **pneeded)
252b5132
RH
1642{
1643 asection *s;
1644 bfd_byte *dynbuf = NULL;
1645 int elfsec;
dc810e39 1646 unsigned long shlink;
252b5132
RH
1647 bfd_byte *extdyn, *extdynend;
1648 size_t extdynsize;
217aa764 1649 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1650
1651 *pneeded = NULL;
1652
1653 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1654 || bfd_get_format (abfd) != bfd_object)
b34976b6 1655 return TRUE;
252b5132
RH
1656
1657 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1658 if (s == NULL || s->size == 0)
b34976b6 1659 return TRUE;
252b5132 1660
eea6121a 1661 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1662 goto error_return;
1663
1664 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1665 if (elfsec == -1)
1666 goto error_return;
1667
dc810e39 1668 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1669
1670 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1671 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1672
1673 extdyn = dynbuf;
eea6121a 1674 extdynend = extdyn + s->size;
252b5132
RH
1675 for (; extdyn < extdynend; extdyn += extdynsize)
1676 {
1677 Elf_Internal_Dyn dyn;
1678
217aa764 1679 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1680
1681 if (dyn.d_tag == DT_NULL)
1682 break;
1683
1684 if (dyn.d_tag == DT_NEEDED)
1685 {
1686 const char *string;
1687 struct bfd_link_needed_list *l;
dc810e39
AM
1688 unsigned int tagv = dyn.d_un.d_val;
1689 bfd_size_type amt;
252b5132 1690
dc810e39 1691 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1692 if (string == NULL)
1693 goto error_return;
1694
dc810e39 1695 amt = sizeof *l;
217aa764 1696 l = bfd_alloc (abfd, amt);
252b5132
RH
1697 if (l == NULL)
1698 goto error_return;
1699
1700 l->by = abfd;
1701 l->name = string;
1702 l->next = *pneeded;
1703 *pneeded = l;
1704 }
1705 }
1706
1707 free (dynbuf);
1708
b34976b6 1709 return TRUE;
252b5132
RH
1710
1711 error_return:
1712 if (dynbuf != NULL)
1713 free (dynbuf);
b34976b6 1714 return FALSE;
252b5132
RH
1715}
1716\f
1717/* Allocate an ELF string table--force the first byte to be zero. */
1718
1719struct bfd_strtab_hash *
217aa764 1720_bfd_elf_stringtab_init (void)
252b5132
RH
1721{
1722 struct bfd_strtab_hash *ret;
1723
1724 ret = _bfd_stringtab_init ();
1725 if (ret != NULL)
1726 {
1727 bfd_size_type loc;
1728
b34976b6 1729 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1730 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1731 if (loc == (bfd_size_type) -1)
1732 {
1733 _bfd_stringtab_free (ret);
1734 ret = NULL;
1735 }
1736 }
1737 return ret;
1738}
1739\f
1740/* ELF .o/exec file reading */
1741
c044fabd 1742/* Create a new bfd section from an ELF section header. */
252b5132 1743
b34976b6 1744bfd_boolean
217aa764 1745bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1746{
1747 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1748 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1749 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1750 const char *name;
252b5132 1751
1b3a8575
AM
1752 name = bfd_elf_string_from_elf_section (abfd,
1753 elf_elfheader (abfd)->e_shstrndx,
1754 hdr->sh_name);
933d961a
JJ
1755 if (name == NULL)
1756 return FALSE;
252b5132
RH
1757
1758 switch (hdr->sh_type)
1759 {
1760 case SHT_NULL:
1761 /* Inactive section. Throw it away. */
b34976b6 1762 return TRUE;
252b5132
RH
1763
1764 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1765 case SHT_NOBITS: /* .bss section. */
1766 case SHT_HASH: /* .hash section. */
1767 case SHT_NOTE: /* .note section. */
25e27870
L
1768 case SHT_INIT_ARRAY: /* .init_array section. */
1769 case SHT_FINI_ARRAY: /* .fini_array section. */
1770 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1771 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1772 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1773
797fc050 1774 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1775 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1776 return FALSE;
8e0ed13f
NC
1777 if (hdr->sh_link > elf_numsections (abfd)
1778 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1779 return FALSE;
797fc050
AM
1780 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1781 {
1782 Elf_Internal_Shdr *dynsymhdr;
1783
1784 /* The shared libraries distributed with hpux11 have a bogus
1785 sh_link field for the ".dynamic" section. Find the
1786 string table for the ".dynsym" section instead. */
1787 if (elf_dynsymtab (abfd) != 0)
1788 {
1789 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1790 hdr->sh_link = dynsymhdr->sh_link;
1791 }
1792 else
1793 {
1794 unsigned int i, num_sec;
1795
1796 num_sec = elf_numsections (abfd);
1797 for (i = 1; i < num_sec; i++)
1798 {
1799 dynsymhdr = elf_elfsections (abfd)[i];
1800 if (dynsymhdr->sh_type == SHT_DYNSYM)
1801 {
1802 hdr->sh_link = dynsymhdr->sh_link;
1803 break;
1804 }
1805 }
1806 }
1807 }
1808 break;
1809
252b5132
RH
1810 case SHT_SYMTAB: /* A symbol table */
1811 if (elf_onesymtab (abfd) == shindex)
b34976b6 1812 return TRUE;
252b5132
RH
1813
1814 BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym);
1815 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1816 elf_onesymtab (abfd) = shindex;
1817 elf_tdata (abfd)->symtab_hdr = *hdr;
1818 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1819 abfd->flags |= HAS_SYMS;
1820
1821 /* Sometimes a shared object will map in the symbol table. If
1822 SHF_ALLOC is set, and this is a shared object, then we also
1823 treat this section as a BFD section. We can not base the
1824 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1825 set in a relocatable object file, which would confuse the
252b5132
RH
1826 linker. */
1827 if ((hdr->sh_flags & SHF_ALLOC) != 0
1828 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1829 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1830 shindex))
b34976b6 1831 return FALSE;
252b5132 1832
1b3a8575
AM
1833 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1834 can't read symbols without that section loaded as well. It
1835 is most likely specified by the next section header. */
1836 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1837 {
1838 unsigned int i, num_sec;
1839
1840 num_sec = elf_numsections (abfd);
1841 for (i = shindex + 1; i < num_sec; i++)
1842 {
1843 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1844 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1845 && hdr2->sh_link == shindex)
1846 break;
1847 }
1848 if (i == num_sec)
1849 for (i = 1; i < shindex; i++)
1850 {
1851 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1852 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1853 && hdr2->sh_link == shindex)
1854 break;
1855 }
1856 if (i != shindex)
1857 return bfd_section_from_shdr (abfd, i);
1858 }
b34976b6 1859 return TRUE;
252b5132
RH
1860
1861 case SHT_DYNSYM: /* A dynamic symbol table */
1862 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1863 return TRUE;
252b5132
RH
1864
1865 BFD_ASSERT (hdr->sh_entsize == bed->s->sizeof_sym);
1866 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1867 elf_dynsymtab (abfd) = shindex;
1868 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1869 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1870 abfd->flags |= HAS_SYMS;
1871
1872 /* Besides being a symbol table, we also treat this as a regular
1873 section, so that objcopy can handle it. */
6dc132d9 1874 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1875
9ad5cbcf
AM
1876 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1877 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1878 return TRUE;
9ad5cbcf 1879
1b3a8575 1880 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1881 elf_symtab_shndx (abfd) = shindex;
1882 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1883 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1884 return TRUE;
9ad5cbcf 1885
252b5132
RH
1886 case SHT_STRTAB: /* A string table */
1887 if (hdr->bfd_section != NULL)
b34976b6 1888 return TRUE;
252b5132
RH
1889 if (ehdr->e_shstrndx == shindex)
1890 {
1891 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1892 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1893 return TRUE;
252b5132 1894 }
1b3a8575
AM
1895 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1896 {
1897 symtab_strtab:
1898 elf_tdata (abfd)->strtab_hdr = *hdr;
1899 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1900 return TRUE;
1901 }
1902 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1903 {
1904 dynsymtab_strtab:
1905 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1906 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1907 elf_elfsections (abfd)[shindex] = hdr;
1908 /* We also treat this as a regular section, so that objcopy
1909 can handle it. */
6dc132d9
L
1910 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1911 shindex);
1b3a8575 1912 }
252b5132 1913
1b3a8575
AM
1914 /* If the string table isn't one of the above, then treat it as a
1915 regular section. We need to scan all the headers to be sure,
1916 just in case this strtab section appeared before the above. */
1917 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1918 {
1919 unsigned int i, num_sec;
252b5132 1920
1b3a8575
AM
1921 num_sec = elf_numsections (abfd);
1922 for (i = 1; i < num_sec; i++)
1923 {
1924 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1925 if (hdr2->sh_link == shindex)
1926 {
933d961a
JJ
1927 /* Prevent endless recursion on broken objects. */
1928 if (i == shindex)
1929 return FALSE;
1b3a8575
AM
1930 if (! bfd_section_from_shdr (abfd, i))
1931 return FALSE;
1932 if (elf_onesymtab (abfd) == i)
1933 goto symtab_strtab;
1934 if (elf_dynsymtab (abfd) == i)
1935 goto dynsymtab_strtab;
1936 }
1937 }
1938 }
6dc132d9 1939 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1940
1941 case SHT_REL:
1942 case SHT_RELA:
1943 /* *These* do a lot of work -- but build no sections! */
1944 {
1945 asection *target_sect;
1946 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1947 unsigned int num_sec = elf_numsections (abfd);
252b5132 1948
03ae5f59 1949 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1950 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1951 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1952 {
1953 ((*_bfd_error_handler)
d003868e
AM
1954 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1955 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1956 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1957 shindex);
03ae5f59
ILT
1958 }
1959
252b5132
RH
1960 /* For some incomprehensible reason Oracle distributes
1961 libraries for Solaris in which some of the objects have
1962 bogus sh_link fields. It would be nice if we could just
1963 reject them, but, unfortunately, some people need to use
1964 them. We scan through the section headers; if we find only
1965 one suitable symbol table, we clobber the sh_link to point
1966 to it. I hope this doesn't break anything. */
1967 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1968 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1969 {
9ad5cbcf 1970 unsigned int scan;
252b5132
RH
1971 int found;
1972
1973 found = 0;
9ad5cbcf 1974 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1975 {
1976 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1977 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1978 {
1979 if (found != 0)
1980 {
1981 found = 0;
1982 break;
1983 }
1984 found = scan;
1985 }
1986 }
1987 if (found != 0)
1988 hdr->sh_link = found;
1989 }
1990
1991 /* Get the symbol table. */
1b3a8575
AM
1992 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1993 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1994 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1995 return FALSE;
252b5132
RH
1996
1997 /* If this reloc section does not use the main symbol table we
1998 don't treat it as a reloc section. BFD can't adequately
1999 represent such a section, so at least for now, we don't
c044fabd 2000 try. We just present it as a normal section. We also
60bcf0fa 2001 can't use it as a reloc section if it points to the null
c044fabd 2002 section. */
60bcf0fa 2003 if (hdr->sh_link != elf_onesymtab (abfd) || hdr->sh_info == SHN_UNDEF)
6dc132d9
L
2004 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2005 shindex);
252b5132 2006
933d961a
JJ
2007 /* Prevent endless recursion on broken objects. */
2008 if (elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2009 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2010 return FALSE;
252b5132 2011 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2012 return FALSE;
252b5132
RH
2013 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2014 if (target_sect == NULL)
b34976b6 2015 return FALSE;
252b5132
RH
2016
2017 if ((target_sect->flags & SEC_RELOC) == 0
2018 || target_sect->reloc_count == 0)
2019 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2020 else
2021 {
dc810e39 2022 bfd_size_type amt;
252b5132 2023 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2024 amt = sizeof (*hdr2);
217aa764 2025 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2026 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2027 }
2028 *hdr2 = *hdr;
2029 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2030 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2031 target_sect->flags |= SEC_RELOC;
2032 target_sect->relocation = NULL;
2033 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2034 /* In the section to which the relocations apply, mark whether
2035 its relocations are of the REL or RELA variety. */
72730e0c 2036 if (hdr->sh_size != 0)
68bfbfcc 2037 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2038 abfd->flags |= HAS_RELOC;
b34976b6 2039 return TRUE;
252b5132
RH
2040 }
2041 break;
2042
2043 case SHT_GNU_verdef:
2044 elf_dynverdef (abfd) = shindex;
2045 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2046 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2047 break;
2048
2049 case SHT_GNU_versym:
2050 elf_dynversym (abfd) = shindex;
2051 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2052 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2053 break;
2054
2055 case SHT_GNU_verneed:
2056 elf_dynverref (abfd) = shindex;
2057 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2058 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2059 break;
2060
2061 case SHT_SHLIB:
b34976b6 2062 return TRUE;
252b5132 2063
dbb410c3 2064 case SHT_GROUP:
b885599b
AM
2065 /* We need a BFD section for objcopy and relocatable linking,
2066 and it's handy to have the signature available as the section
2067 name. */
2068 name = group_signature (abfd, hdr);
2069 if (name == NULL)
b34976b6 2070 return FALSE;
6dc132d9 2071 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2072 return FALSE;
dbb410c3
AM
2073 if (hdr->contents != NULL)
2074 {
2075 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2076 unsigned int n_elt = hdr->sh_size / 4;
2077 asection *s;
2078
b885599b
AM
2079 if (idx->flags & GRP_COMDAT)
2080 hdr->bfd_section->flags
2081 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2082
45c5e9ed
L
2083 /* We try to keep the same section order as it comes in. */
2084 idx += n_elt;
dbb410c3 2085 while (--n_elt != 0)
45c5e9ed 2086 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2087 && elf_next_in_group (s) != NULL)
dbb410c3 2088 {
945906ff 2089 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2090 break;
2091 }
2092 }
2093 break;
2094
252b5132
RH
2095 default:
2096 /* Check for any processor-specific section types. */
6dc132d9
L
2097 return bed->elf_backend_section_from_shdr (abfd, hdr, name,
2098 shindex);
252b5132
RH
2099 }
2100
b34976b6 2101 return TRUE;
252b5132
RH
2102}
2103
ec338859
AM
2104/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2105 Return SEC for sections that have no elf section, and NULL on error. */
2106
2107asection *
217aa764
AM
2108bfd_section_from_r_symndx (bfd *abfd,
2109 struct sym_sec_cache *cache,
2110 asection *sec,
2111 unsigned long r_symndx)
ec338859 2112{
ec338859 2113 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2114 unsigned char esym[sizeof (Elf64_External_Sym)];
2115 Elf_External_Sym_Shndx eshndx;
2116 Elf_Internal_Sym isym;
ec338859
AM
2117 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2118
2119 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2120 return cache->sec[ent];
2121
2122 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2123 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2124 &isym, esym, &eshndx) == NULL)
ec338859 2125 return NULL;
9ad5cbcf 2126
ec338859
AM
2127 if (cache->abfd != abfd)
2128 {
2129 memset (cache->indx, -1, sizeof (cache->indx));
2130 cache->abfd = abfd;
2131 }
2132 cache->indx[ent] = r_symndx;
2133 cache->sec[ent] = sec;
50bc7936
AM
2134 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2135 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2136 {
2137 asection *s;
6cdc0ccc 2138 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2139 if (s != NULL)
2140 cache->sec[ent] = s;
2141 }
2142 return cache->sec[ent];
2143}
2144
252b5132
RH
2145/* Given an ELF section number, retrieve the corresponding BFD
2146 section. */
2147
2148asection *
217aa764 2149bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2150{
9ad5cbcf 2151 if (index >= elf_numsections (abfd))
252b5132
RH
2152 return NULL;
2153 return elf_elfsections (abfd)[index]->bfd_section;
2154}
2155
7f4d3958 2156static struct bfd_elf_special_section const special_sections_b[] =
2f89ff8d 2157{
7dcb9820 2158 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7f4d3958
L
2159 { NULL, 0, 0, 0, 0 }
2160};
2161
2162static struct bfd_elf_special_section const special_sections_c[] =
2163{
7dcb9820 2164 { ".comment", 8, 0, SHT_PROGBITS, 0 },
7f4d3958
L
2165 { NULL, 0, 0, 0, 0 }
2166};
2167
2168static struct bfd_elf_special_section const special_sections_d[] =
2169{
7dcb9820
AM
2170 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2171 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2172 { ".debug", 6, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2173 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2174 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2175 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2176 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2177 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2178 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2179 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
7f4d3958
L
2180 { NULL, 0, 0, 0, 0 }
2181};
2182
2183static struct bfd_elf_special_section const special_sections_f[] =
2184{
2185 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2186 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2187 { NULL, 0, 0, 0, 0 }
2188};
2189
2190static struct bfd_elf_special_section const special_sections_g[] =
2191{
2192 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820 2193 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2194 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2195 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2196 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
7f4d3958
L
2197 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2198 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
2199 { NULL, 0, 0, 0, 0 }
2200};
2201
2202static struct bfd_elf_special_section const special_sections_h[] =
2203{
2204 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2205 { NULL, 0, 0, 0, 0 }
2206};
2207
2208static struct bfd_elf_special_section const special_sections_i[] =
2209{
2210 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2211 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2212 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2213 { NULL, 0, 0, 0, 0 }
2214};
2215
2216static struct bfd_elf_special_section const special_sections_l[] =
2217{
2218 { ".line", 5, 0, SHT_PROGBITS, 0 },
2219 { NULL, 0, 0, 0, 0 }
2220};
2221
2222static struct bfd_elf_special_section const special_sections_n[] =
2223{
45c5e9ed 2224 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820 2225 { ".note", 5, -1, SHT_NOTE, 0 },
7f4d3958
L
2226 { NULL, 0, 0, 0, 0 }
2227};
2228
2229static struct bfd_elf_special_section const special_sections_p[] =
2230{
2231 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2232 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2233 { NULL, 0, 0, 0, 0 }
2234};
2235
2236static struct bfd_elf_special_section const special_sections_r[] =
2237{
2238 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2239 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
7dcb9820
AM
2240 { ".rela", 5, -1, SHT_RELA, 0 },
2241 { ".rel", 4, -1, SHT_REL, 0 },
7f4d3958
L
2242 { NULL, 0, 0, 0, 0 }
2243};
2244
2245static struct bfd_elf_special_section const special_sections_s[] =
2246{
2247 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2248 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2249 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
7dcb9820
AM
2250 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2251 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2252};
2253
7f4d3958
L
2254static struct bfd_elf_special_section const special_sections_t[] =
2255{
2256 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2257 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2258 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2259 { NULL, 0, 0, 0, 0 }
2260};
2261
2262static struct bfd_elf_special_section const *special_sections [27] =
2263{
2264 NULL, /* 'a' */
2265 special_sections_b, /* 'b' */
2266 special_sections_c, /* 'b' */
2267 special_sections_d, /* 'd' */
2268 NULL, /* 'e' */
2269 special_sections_f, /* 'f' */
2270 special_sections_g, /* 'g' */
2271 special_sections_h, /* 'h' */
2272 special_sections_i, /* 'i' */
2273 NULL, /* 'j' */
2274 NULL, /* 'k' */
2275 special_sections_l, /* 'l' */
2276 NULL, /* 'm' */
2277 special_sections_n, /* 'n' */
2278 NULL, /* 'o' */
2279 special_sections_p, /* 'p' */
2280 NULL, /* 'q' */
2281 special_sections_r, /* 'r' */
2282 special_sections_s, /* 's' */
2283 special_sections_t, /* 't' */
2284 NULL, /* 'u' */
2285 NULL, /* 'v' */
2286 NULL, /* 'w' */
2287 NULL, /* 'x' */
2288 NULL, /* 'y' */
2289 NULL, /* 'z' */
2290 NULL /* other */
2291};
2292
2f89ff8d
L
2293static const struct bfd_elf_special_section *
2294get_special_section (const char *name,
7f4d3958 2295 const struct bfd_elf_special_section **special_sections_p,
2f89ff8d
L
2296 unsigned int rela)
2297{
2298 int i;
7f4d3958
L
2299 int len;
2300 const struct bfd_elf_special_section *special_sections;
2301
2302 if (name [0] == '.')
2303 {
2304 i = name [1] - 'a';
2305 if (i < 0 || i > 25)
2306 i = 26;
2307 }
2308 else
2309 i = 26;
2310
2311 special_sections = special_sections_p [i];
2312
2313 if (!special_sections)
2314 return special_sections;
2315
2316 len= strlen (name);
2f89ff8d
L
2317
2318 for (i = 0; special_sections[i].prefix != NULL; i++)
7dcb9820
AM
2319 {
2320 int suffix_len;
2321 int prefix_len = special_sections[i].prefix_length;
2322
2323 if (len < prefix_len)
2324 continue;
2325 if (memcmp (name, special_sections[i].prefix, prefix_len) != 0)
2326 continue;
2327
2328 suffix_len = special_sections[i].suffix_length;
2329 if (suffix_len <= 0)
2330 {
2331 if (name[prefix_len] != 0)
2332 {
2333 if (suffix_len == 0)
2334 continue;
2335 if (name[prefix_len] != '.'
2336 && (suffix_len == -2
2337 || (rela && special_sections[i].type == SHT_REL)))
2338 continue;
2339 }
2340 }
2341 else
2342 {
2343 if (len < prefix_len + suffix_len)
2344 continue;
2345 if (memcmp (name + len - suffix_len,
2346 special_sections[i].prefix + prefix_len,
2347 suffix_len) != 0)
2348 continue;
2349 }
2f89ff8d 2350 return &special_sections[i];
7dcb9820 2351 }
2f89ff8d
L
2352
2353 return NULL;
2354}
2355
7dcb9820
AM
2356const struct bfd_elf_special_section *
2357_bfd_elf_get_sec_type_attr (bfd *abfd, const char *name)
2f89ff8d 2358{
9c5bfbb7 2359 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7dcb9820 2360 const struct bfd_elf_special_section *ssect = NULL;
2f89ff8d
L
2361
2362 /* See if this is one of the special sections. */
2363 if (name)
2364 {
9c5bfbb7 2365 unsigned int rela = bed->default_use_rela_p;
2f89ff8d
L
2366
2367 if (bed->special_sections)
2368 ssect = get_special_section (name, bed->special_sections, rela);
2369
2370 if (! ssect)
2371 ssect = get_special_section (name, special_sections, rela);
2f89ff8d
L
2372 }
2373
7dcb9820 2374 return ssect;
2f89ff8d
L
2375}
2376
b34976b6 2377bfd_boolean
217aa764 2378_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2379{
2380 struct bfd_elf_section_data *sdata;
7dcb9820 2381 const struct bfd_elf_special_section *ssect;
252b5132 2382
f0abc2a1
AM
2383 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2384 if (sdata == NULL)
2385 {
217aa764 2386 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2387 if (sdata == NULL)
2388 return FALSE;
217aa764 2389 sec->used_by_bfd = sdata;
f0abc2a1 2390 }
bf572ba0 2391
3496cb2a
L
2392 /* When we read a file, we don't need section type and flags unless
2393 it is a linker created section. They will be overridden in
2394 _bfd_elf_make_section_from_shdr anyway. */
2395 if (abfd->direction != read_direction
2396 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2397 {
a31501e9
L
2398 ssect = _bfd_elf_get_sec_type_attr (abfd, sec->name);
2399 if (ssect != NULL)
2400 {
2401 elf_section_type (sec) = ssect->type;
2402 elf_section_flags (sec) = ssect->attr;
2403 }
2f89ff8d
L
2404 }
2405
bf572ba0 2406 /* Indicate whether or not this section should use RELA relocations. */
68bfbfcc 2407 sec->use_rela_p = get_elf_backend_data (abfd)->default_use_rela_p;
bf572ba0 2408
b34976b6 2409 return TRUE;
252b5132
RH
2410}
2411
2412/* Create a new bfd section from an ELF program header.
2413
2414 Since program segments have no names, we generate a synthetic name
2415 of the form segment<NUM>, where NUM is generally the index in the
2416 program header table. For segments that are split (see below) we
2417 generate the names segment<NUM>a and segment<NUM>b.
2418
2419 Note that some program segments may have a file size that is different than
2420 (less than) the memory size. All this means is that at execution the
2421 system must allocate the amount of memory specified by the memory size,
2422 but only initialize it with the first "file size" bytes read from the
2423 file. This would occur for example, with program segments consisting
2424 of combined data+bss.
2425
2426 To handle the above situation, this routine generates TWO bfd sections
2427 for the single program segment. The first has the length specified by
2428 the file size of the segment, and the second has the length specified
2429 by the difference between the two sizes. In effect, the segment is split
2430 into it's initialized and uninitialized parts.
2431
2432 */
2433
b34976b6 2434bfd_boolean
217aa764
AM
2435_bfd_elf_make_section_from_phdr (bfd *abfd,
2436 Elf_Internal_Phdr *hdr,
2437 int index,
2438 const char *typename)
252b5132
RH
2439{
2440 asection *newsect;
2441 char *name;
2442 char namebuf[64];
d4c88bbb 2443 size_t len;
252b5132
RH
2444 int split;
2445
2446 split = ((hdr->p_memsz > 0)
2447 && (hdr->p_filesz > 0)
2448 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2449 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2450 len = strlen (namebuf) + 1;
217aa764 2451 name = bfd_alloc (abfd, len);
252b5132 2452 if (!name)
b34976b6 2453 return FALSE;
d4c88bbb 2454 memcpy (name, namebuf, len);
252b5132
RH
2455 newsect = bfd_make_section (abfd, name);
2456 if (newsect == NULL)
b34976b6 2457 return FALSE;
252b5132
RH
2458 newsect->vma = hdr->p_vaddr;
2459 newsect->lma = hdr->p_paddr;
eea6121a 2460 newsect->size = hdr->p_filesz;
252b5132
RH
2461 newsect->filepos = hdr->p_offset;
2462 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2463 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2464 if (hdr->p_type == PT_LOAD)
2465 {
2466 newsect->flags |= SEC_ALLOC;
2467 newsect->flags |= SEC_LOAD;
2468 if (hdr->p_flags & PF_X)
2469 {
2470 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2471 may be data. */
252b5132
RH
2472 newsect->flags |= SEC_CODE;
2473 }
2474 }
2475 if (!(hdr->p_flags & PF_W))
2476 {
2477 newsect->flags |= SEC_READONLY;
2478 }
2479
2480 if (split)
2481 {
27ac83bf 2482 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2483 len = strlen (namebuf) + 1;
217aa764 2484 name = bfd_alloc (abfd, len);
252b5132 2485 if (!name)
b34976b6 2486 return FALSE;
d4c88bbb 2487 memcpy (name, namebuf, len);
252b5132
RH
2488 newsect = bfd_make_section (abfd, name);
2489 if (newsect == NULL)
b34976b6 2490 return FALSE;
252b5132
RH
2491 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2492 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2493 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2494 if (hdr->p_type == PT_LOAD)
2495 {
2496 newsect->flags |= SEC_ALLOC;
2497 if (hdr->p_flags & PF_X)
2498 newsect->flags |= SEC_CODE;
2499 }
2500 if (!(hdr->p_flags & PF_W))
2501 newsect->flags |= SEC_READONLY;
2502 }
2503
b34976b6 2504 return TRUE;
252b5132
RH
2505}
2506
b34976b6 2507bfd_boolean
217aa764 2508bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2509{
9c5bfbb7 2510 const struct elf_backend_data *bed;
20cfcaae
NC
2511
2512 switch (hdr->p_type)
2513 {
2514 case PT_NULL:
2515 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2516
2517 case PT_LOAD:
2518 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2519
2520 case PT_DYNAMIC:
2521 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2522
2523 case PT_INTERP:
2524 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2525
2526 case PT_NOTE:
2527 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2528 return FALSE;
217aa764 2529 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2530 return FALSE;
2531 return TRUE;
20cfcaae
NC
2532
2533 case PT_SHLIB:
2534 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2535
2536 case PT_PHDR:
2537 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2538
811072d8
RM
2539 case PT_GNU_EH_FRAME:
2540 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2541 "eh_frame_hdr");
2542
9ee5e499
JJ
2543 case PT_GNU_STACK:
2544 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2545
8c37241b
JJ
2546 case PT_GNU_RELRO:
2547 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2548
20cfcaae 2549 default:
8c1acd09 2550 /* Check for any processor-specific program segment types. */
20cfcaae 2551 bed = get_elf_backend_data (abfd);
d27f5fa1 2552 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2553 }
2554}
2555
23bc299b 2556/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2557 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2558 relocations; otherwise, we use REL relocations. */
2559
b34976b6 2560bfd_boolean
217aa764
AM
2561_bfd_elf_init_reloc_shdr (bfd *abfd,
2562 Elf_Internal_Shdr *rel_hdr,
2563 asection *asect,
2564 bfd_boolean use_rela_p)
23bc299b
MM
2565{
2566 char *name;
9c5bfbb7 2567 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2568 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2569
dc810e39 2570 name = bfd_alloc (abfd, amt);
23bc299b 2571 if (name == NULL)
b34976b6 2572 return FALSE;
23bc299b
MM
2573 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2574 rel_hdr->sh_name =
2b0f7ef9 2575 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2576 FALSE);
23bc299b 2577 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2578 return FALSE;
23bc299b
MM
2579 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2580 rel_hdr->sh_entsize = (use_rela_p
2581 ? bed->s->sizeof_rela
2582 : bed->s->sizeof_rel);
45d6a902 2583 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2584 rel_hdr->sh_flags = 0;
2585 rel_hdr->sh_addr = 0;
2586 rel_hdr->sh_size = 0;
2587 rel_hdr->sh_offset = 0;
2588
b34976b6 2589 return TRUE;
23bc299b
MM
2590}
2591
252b5132
RH
2592/* Set up an ELF internal section header for a section. */
2593
252b5132 2594static void
217aa764 2595elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2596{
9c5bfbb7 2597 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2598 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2599 Elf_Internal_Shdr *this_hdr;
2600
2601 if (*failedptr)
2602 {
2603 /* We already failed; just get out of the bfd_map_over_sections
2604 loop. */
2605 return;
2606 }
2607
2608 this_hdr = &elf_section_data (asect)->this_hdr;
2609
e57b5356
AM
2610 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2611 asect->name, FALSE);
2612 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2613 {
b34976b6 2614 *failedptr = TRUE;
252b5132
RH
2615 return;
2616 }
2617
2618 this_hdr->sh_flags = 0;
2619
2620 if ((asect->flags & SEC_ALLOC) != 0
2621 || asect->user_set_vma)
2622 this_hdr->sh_addr = asect->vma;
2623 else
2624 this_hdr->sh_addr = 0;
2625
2626 this_hdr->sh_offset = 0;
eea6121a 2627 this_hdr->sh_size = asect->size;
252b5132
RH
2628 this_hdr->sh_link = 0;
2629 this_hdr->sh_addralign = 1 << asect->alignment_power;
2630 /* The sh_entsize and sh_info fields may have been set already by
2631 copy_private_section_data. */
2632
2633 this_hdr->bfd_section = asect;
2634 this_hdr->contents = NULL;
2635
3cddba1e
L
2636 /* If the section type is unspecified, we set it based on
2637 asect->flags. */
2638 if (this_hdr->sh_type == SHT_NULL)
2639 {
45c5e9ed
L
2640 if ((asect->flags & SEC_GROUP) != 0)
2641 {
2642 /* We also need to mark SHF_GROUP here for relocatable
2643 link. */
2644 struct bfd_link_order *l;
2645 asection *elt;
2646
8423293d 2647 for (l = asect->map_head.link_order; l != NULL; l = l->next)
45c5e9ed
L
2648 if (l->type == bfd_indirect_link_order
2649 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
2650 do
2651 {
2652 /* The name is not important. Anything will do. */
2653 elf_group_name (elt->output_section) = "G";
2654 elf_section_flags (elt->output_section) |= SHF_GROUP;
2655
2656 elt = elf_next_in_group (elt);
2657 /* During a relocatable link, the lists are
2658 circular. */
2659 }
2660 while (elt != elf_next_in_group (l->u.indirect.section));
2661
2662 this_hdr->sh_type = SHT_GROUP;
2663 }
2664 else if ((asect->flags & SEC_ALLOC) != 0
3cddba1e
L
2665 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2666 || (asect->flags & SEC_NEVER_LOAD) != 0))
2667 this_hdr->sh_type = SHT_NOBITS;
2668 else
2669 this_hdr->sh_type = SHT_PROGBITS;
2670 }
2671
2f89ff8d 2672 switch (this_hdr->sh_type)
252b5132 2673 {
2f89ff8d 2674 default:
2f89ff8d
L
2675 break;
2676
2677 case SHT_STRTAB:
2678 case SHT_INIT_ARRAY:
2679 case SHT_FINI_ARRAY:
2680 case SHT_PREINIT_ARRAY:
2681 case SHT_NOTE:
2682 case SHT_NOBITS:
2683 case SHT_PROGBITS:
2684 break;
2685
2686 case SHT_HASH:
c7ac6ff8 2687 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2688 break;
5de3bf90 2689
2f89ff8d 2690 case SHT_DYNSYM:
252b5132 2691 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2692 break;
2693
2694 case SHT_DYNAMIC:
252b5132 2695 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2696 break;
2697
2698 case SHT_RELA:
2699 if (get_elf_backend_data (abfd)->may_use_rela_p)
2700 this_hdr->sh_entsize = bed->s->sizeof_rela;
2701 break;
2702
2703 case SHT_REL:
2704 if (get_elf_backend_data (abfd)->may_use_rel_p)
2705 this_hdr->sh_entsize = bed->s->sizeof_rel;
2706 break;
2707
2708 case SHT_GNU_versym:
252b5132 2709 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2710 break;
2711
2712 case SHT_GNU_verdef:
252b5132
RH
2713 this_hdr->sh_entsize = 0;
2714 /* objcopy or strip will copy over sh_info, but may not set
2715 cverdefs. The linker will set cverdefs, but sh_info will be
2716 zero. */
2717 if (this_hdr->sh_info == 0)
2718 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2719 else
2720 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2721 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2722 break;
2723
2724 case SHT_GNU_verneed:
252b5132
RH
2725 this_hdr->sh_entsize = 0;
2726 /* objcopy or strip will copy over sh_info, but may not set
2727 cverrefs. The linker will set cverrefs, but sh_info will be
2728 zero. */
2729 if (this_hdr->sh_info == 0)
2730 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2731 else
2732 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2733 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2734 break;
2735
2736 case SHT_GROUP:
dbb410c3 2737 this_hdr->sh_entsize = 4;
2f89ff8d 2738 break;
dbb410c3 2739 }
252b5132
RH
2740
2741 if ((asect->flags & SEC_ALLOC) != 0)
2742 this_hdr->sh_flags |= SHF_ALLOC;
2743 if ((asect->flags & SEC_READONLY) == 0)
2744 this_hdr->sh_flags |= SHF_WRITE;
2745 if ((asect->flags & SEC_CODE) != 0)
2746 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2747 if ((asect->flags & SEC_MERGE) != 0)
2748 {
2749 this_hdr->sh_flags |= SHF_MERGE;
2750 this_hdr->sh_entsize = asect->entsize;
2751 if ((asect->flags & SEC_STRINGS) != 0)
2752 this_hdr->sh_flags |= SHF_STRINGS;
2753 }
1126897b 2754 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2755 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2756 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2757 {
2758 this_hdr->sh_flags |= SHF_TLS;
eea6121a 2759 if (asect->size == 0 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60
JJ
2760 {
2761 struct bfd_link_order *o;
b34976b6 2762
704afa60 2763 this_hdr->sh_size = 0;
8423293d 2764 for (o = asect->map_head.link_order; o != NULL; o = o->next)
704afa60
JJ
2765 if (this_hdr->sh_size < o->offset + o->size)
2766 this_hdr->sh_size = o->offset + o->size;
2767 if (this_hdr->sh_size)
2768 this_hdr->sh_type = SHT_NOBITS;
2769 }
2770 }
252b5132
RH
2771
2772 /* Check for processor-specific section types. */
e1fddb6b
AO
2773 if (bed->elf_backend_fake_sections
2774 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2775 *failedptr = TRUE;
252b5132
RH
2776
2777 /* If the section has relocs, set up a section header for the
23bc299b
MM
2778 SHT_REL[A] section. If two relocation sections are required for
2779 this section, it is up to the processor-specific back-end to
c044fabd 2780 create the other. */
23bc299b 2781 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2782 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2783 &elf_section_data (asect)->rel_hdr,
c044fabd 2784 asect,
68bfbfcc 2785 asect->use_rela_p))
b34976b6 2786 *failedptr = TRUE;
252b5132
RH
2787}
2788
dbb410c3
AM
2789/* Fill in the contents of a SHT_GROUP section. */
2790
1126897b 2791void
217aa764 2792bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2793{
217aa764 2794 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2795 unsigned long symindx;
9dce4196 2796 asection *elt, *first;
dbb410c3
AM
2797 unsigned char *loc;
2798 struct bfd_link_order *l;
b34976b6 2799 bfd_boolean gas;
dbb410c3 2800
7e4111ad
L
2801 /* Ignore linker created group section. See elfNN_ia64_object_p in
2802 elfxx-ia64.c. */
2803 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2804 || *failedptr)
2805 return;
2806
1126897b
AM
2807 symindx = 0;
2808 if (elf_group_id (sec) != NULL)
2809 symindx = elf_group_id (sec)->udata.i;
2810
2811 if (symindx == 0)
2812 {
2813 /* If called from the assembler, swap_out_syms will have set up
2814 elf_section_syms; If called for "ld -r", use target_index. */
2815 if (elf_section_syms (abfd) != NULL)
2816 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2817 else
2818 symindx = sec->target_index;
2819 }
dbb410c3
AM
2820 elf_section_data (sec)->this_hdr.sh_info = symindx;
2821
1126897b 2822 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2823 gas = TRUE;
dbb410c3
AM
2824 if (sec->contents == NULL)
2825 {
b34976b6 2826 gas = FALSE;
eea6121a 2827 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2828
2829 /* Arrange for the section to be written out. */
2830 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2831 if (sec->contents == NULL)
2832 {
b34976b6 2833 *failedptr = TRUE;
dbb410c3
AM
2834 return;
2835 }
2836 }
2837
eea6121a 2838 loc = sec->contents + sec->size;
dbb410c3 2839
9dce4196
AM
2840 /* Get the pointer to the first section in the group that gas
2841 squirreled away here. objcopy arranges for this to be set to the
2842 start of the input section group. */
2843 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2844
2845 /* First element is a flag word. Rest of section is elf section
2846 indices for all the sections of the group. Write them backwards
2847 just to keep the group in the same order as given in .section
2848 directives, not that it matters. */
2849 while (elt != NULL)
2850 {
9dce4196
AM
2851 asection *s;
2852 unsigned int idx;
2853
dbb410c3 2854 loc -= 4;
9dce4196
AM
2855 s = elt;
2856 if (!gas)
2857 s = s->output_section;
2858 idx = 0;
2859 if (s != NULL)
2860 idx = elf_section_data (s)->this_idx;
2861 H_PUT_32 (abfd, idx, loc);
945906ff 2862 elt = elf_next_in_group (elt);
9dce4196
AM
2863 if (elt == first)
2864 break;
dbb410c3
AM
2865 }
2866
2867 /* If this is a relocatable link, then the above did nothing because
2868 SEC is the output section. Look through the input sections
2869 instead. */
8423293d 2870 for (l = sec->map_head.link_order; l != NULL; l = l->next)
dbb410c3 2871 if (l->type == bfd_indirect_link_order
945906ff 2872 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
dbb410c3
AM
2873 do
2874 {
2875 loc -= 4;
2876 H_PUT_32 (abfd,
2877 elf_section_data (elt->output_section)->this_idx, loc);
945906ff 2878 elt = elf_next_in_group (elt);
dbb410c3
AM
2879 /* During a relocatable link, the lists are circular. */
2880 }
945906ff 2881 while (elt != elf_next_in_group (l->u.indirect.section));
dbb410c3 2882
3d7f7666 2883 if ((loc -= 4) != sec->contents)
9dce4196 2884 abort ();
dbb410c3 2885
9dce4196 2886 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2887}
2888
252b5132
RH
2889/* Assign all ELF section numbers. The dummy first section is handled here
2890 too. The link/info pointers for the standard section types are filled
2891 in here too, while we're at it. */
2892
b34976b6 2893static bfd_boolean
da9f89d4 2894assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2895{
2896 struct elf_obj_tdata *t = elf_tdata (abfd);
2897 asection *sec;
2b0f7ef9 2898 unsigned int section_number, secn;
252b5132 2899 Elf_Internal_Shdr **i_shdrp;
dc810e39 2900 bfd_size_type amt;
47cc2cf5 2901 struct bfd_elf_section_data *d;
252b5132
RH
2902
2903 section_number = 1;
2904
2b0f7ef9
JJ
2905 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2906
da9f89d4
L
2907 /* SHT_GROUP sections are in relocatable files only. */
2908 if (link_info == NULL || link_info->relocatable)
252b5132 2909 {
da9f89d4 2910 /* Put SHT_GROUP sections first. */
04dd1667 2911 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2912 {
5daa8fe7 2913 d = elf_section_data (sec);
da9f89d4
L
2914
2915 if (d->this_hdr.sh_type == SHT_GROUP)
2916 {
5daa8fe7 2917 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2918 {
2919 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2920 bfd_section_list_remove (abfd, sec);
da9f89d4 2921 abfd->section_count--;
da9f89d4
L
2922 }
2923 else
2924 {
2925 if (section_number == SHN_LORESERVE)
2926 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2927 d->this_idx = section_number++;
2928 }
2929 }
47cc2cf5
PB
2930 }
2931 }
2932
2933 for (sec = abfd->sections; sec; sec = sec->next)
2934 {
2935 d = elf_section_data (sec);
2936
2937 if (d->this_hdr.sh_type != SHT_GROUP)
2938 {
2939 if (section_number == SHN_LORESERVE)
2940 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2941 d->this_idx = section_number++;
2942 }
2b0f7ef9 2943 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2944 if ((sec->flags & SEC_RELOC) == 0)
2945 d->rel_idx = 0;
2946 else
2b0f7ef9 2947 {
9ad5cbcf
AM
2948 if (section_number == SHN_LORESERVE)
2949 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2950 d->rel_idx = section_number++;
2951 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2952 }
23bc299b
MM
2953
2954 if (d->rel_hdr2)
2b0f7ef9 2955 {
9ad5cbcf
AM
2956 if (section_number == SHN_LORESERVE)
2957 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2958 d->rel_idx2 = section_number++;
2959 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2960 }
23bc299b
MM
2961 else
2962 d->rel_idx2 = 0;
252b5132
RH
2963 }
2964
9ad5cbcf
AM
2965 if (section_number == SHN_LORESERVE)
2966 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2967 t->shstrtab_section = section_number++;
2b0f7ef9 2968 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2969 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2970
2971 if (bfd_get_symcount (abfd) > 0)
2972 {
9ad5cbcf
AM
2973 if (section_number == SHN_LORESERVE)
2974 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2975 t->symtab_section = section_number++;
2b0f7ef9 2976 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2977 if (section_number > SHN_LORESERVE - 2)
2978 {
2979 if (section_number == SHN_LORESERVE)
2980 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2981 t->symtab_shndx_section = section_number++;
2982 t->symtab_shndx_hdr.sh_name
2983 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2984 ".symtab_shndx", FALSE);
9ad5cbcf 2985 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2986 return FALSE;
9ad5cbcf
AM
2987 }
2988 if (section_number == SHN_LORESERVE)
2989 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2990 t->strtab_section = section_number++;
2b0f7ef9 2991 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2992 }
2993
2b0f7ef9
JJ
2994 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2995 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2996
2997 elf_numsections (abfd) = section_number;
252b5132 2998 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
2999 if (section_number > SHN_LORESERVE)
3000 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
3001
3002 /* Set up the list of section header pointers, in agreement with the
3003 indices. */
dc810e39 3004 amt = section_number * sizeof (Elf_Internal_Shdr *);
217aa764 3005 i_shdrp = bfd_zalloc (abfd, amt);
252b5132 3006 if (i_shdrp == NULL)
b34976b6 3007 return FALSE;
252b5132 3008
dc810e39 3009 amt = sizeof (Elf_Internal_Shdr);
217aa764 3010 i_shdrp[0] = bfd_zalloc (abfd, amt);
252b5132
RH
3011 if (i_shdrp[0] == NULL)
3012 {
3013 bfd_release (abfd, i_shdrp);
b34976b6 3014 return FALSE;
252b5132 3015 }
252b5132
RH
3016
3017 elf_elfsections (abfd) = i_shdrp;
3018
3019 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3020 if (bfd_get_symcount (abfd) > 0)
3021 {
3022 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3023 if (elf_numsections (abfd) > SHN_LORESERVE)
3024 {
3025 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3026 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3027 }
252b5132
RH
3028 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3029 t->symtab_hdr.sh_link = t->strtab_section;
3030 }
38ce5b11 3031
252b5132
RH
3032 for (sec = abfd->sections; sec; sec = sec->next)
3033 {
3034 struct bfd_elf_section_data *d = elf_section_data (sec);
3035 asection *s;
3036 const char *name;
3037
3038 i_shdrp[d->this_idx] = &d->this_hdr;
3039 if (d->rel_idx != 0)
3040 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3041 if (d->rel_idx2 != 0)
3042 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3043
3044 /* Fill in the sh_link and sh_info fields while we're at it. */
3045
3046 /* sh_link of a reloc section is the section index of the symbol
3047 table. sh_info is the section index of the section to which
3048 the relocation entries apply. */
3049 if (d->rel_idx != 0)
3050 {
3051 d->rel_hdr.sh_link = t->symtab_section;
3052 d->rel_hdr.sh_info = d->this_idx;
3053 }
23bc299b
MM
3054 if (d->rel_idx2 != 0)
3055 {
3056 d->rel_hdr2->sh_link = t->symtab_section;
3057 d->rel_hdr2->sh_info = d->this_idx;
3058 }
252b5132 3059
38ce5b11
L
3060 /* We need to set up sh_link for SHF_LINK_ORDER. */
3061 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3062 {
3063 s = elf_linked_to_section (sec);
3064 if (s)
3065 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3066 else
3067 {
3068 struct bfd_link_order *p;
3069
3070 /* Find out what the corresponding section in output
3071 is. */
8423293d 3072 for (p = sec->map_head.link_order; p != NULL; p = p->next)
38ce5b11
L
3073 {
3074 s = p->u.indirect.section;
3075 if (p->type == bfd_indirect_link_order
3076 && (bfd_get_flavour (s->owner)
3077 == bfd_target_elf_flavour))
3078 {
3079 Elf_Internal_Shdr ** const elf_shdrp
3080 = elf_elfsections (s->owner);
3081 int elfsec
3082 = _bfd_elf_section_from_bfd_section (s->owner, s);
3083 elfsec = elf_shdrp[elfsec]->sh_link;
185d09ad
L
3084 /* PR 290:
3085 The Intel C compiler generates SHT_IA_64_UNWIND with
ff01938b 3086 SHF_LINK_ORDER. But it doesn't set the sh_link or
185d09ad
L
3087 sh_info fields. Hence we could get the situation
3088 where elfsec is 0. */
3089 if (elfsec == 0)
3090 {
3091 const struct elf_backend_data *bed
3092 = get_elf_backend_data (abfd);
3093 if (bed->link_order_error_handler)
d003868e 3094 bed->link_order_error_handler
28b13744 3095 (_("%B: warning: sh_link not set for section `%A'"),
d003868e 3096 abfd, s);
185d09ad
L
3097 }
3098 else
3099 {
01b3c8ab
L
3100 s = elf_shdrp[elfsec]->bfd_section;
3101 if (elf_discarded_section (s))
3102 {
3103 asection *kept;
3104 (*_bfd_error_handler)
3105 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3106 abfd, d->this_hdr.bfd_section,
3107 s, s->owner);
3108 /* Point to the kept section if it has
3109 the same size as the discarded
3110 one. */
3111 kept = _bfd_elf_check_kept_section (s);
3112 if (kept == NULL)
3113 {
3114 bfd_set_error (bfd_error_bad_value);
3115 return FALSE;
3116 }
2796fd96 3117 s = kept;
01b3c8ab
L
3118 }
3119 s = s->output_section;
185d09ad
L
3120 BFD_ASSERT (s != NULL);
3121 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3122 }
38ce5b11
L
3123 break;
3124 }
3125 }
3126 }
3127 }
3128
252b5132
RH
3129 switch (d->this_hdr.sh_type)
3130 {
3131 case SHT_REL:
3132 case SHT_RELA:
3133 /* A reloc section which we are treating as a normal BFD
3134 section. sh_link is the section index of the symbol
3135 table. sh_info is the section index of the section to
3136 which the relocation entries apply. We assume that an
3137 allocated reloc section uses the dynamic symbol table.
3138 FIXME: How can we be sure? */
3139 s = bfd_get_section_by_name (abfd, ".dynsym");
3140 if (s != NULL)
3141 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3142
3143 /* We look up the section the relocs apply to by name. */
3144 name = sec->name;
3145 if (d->this_hdr.sh_type == SHT_REL)
3146 name += 4;
3147 else
3148 name += 5;
3149 s = bfd_get_section_by_name (abfd, name);
3150 if (s != NULL)
3151 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3152 break;
3153
3154 case SHT_STRTAB:
3155 /* We assume that a section named .stab*str is a stabs
3156 string section. We look for a section with the same name
3157 but without the trailing ``str'', and set its sh_link
3158 field to point to this section. */
3159 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
3160 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3161 {
3162 size_t len;
3163 char *alc;
3164
3165 len = strlen (sec->name);
217aa764 3166 alc = bfd_malloc (len - 2);
252b5132 3167 if (alc == NULL)
b34976b6 3168 return FALSE;
d4c88bbb 3169 memcpy (alc, sec->name, len - 3);
252b5132
RH
3170 alc[len - 3] = '\0';
3171 s = bfd_get_section_by_name (abfd, alc);
3172 free (alc);
3173 if (s != NULL)
3174 {
3175 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3176
3177 /* This is a .stab section. */
0594c12d
AM
3178 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3179 elf_section_data (s)->this_hdr.sh_entsize
3180 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3181 }
3182 }
3183 break;
3184
3185 case SHT_DYNAMIC:
3186 case SHT_DYNSYM:
3187 case SHT_GNU_verneed:
3188 case SHT_GNU_verdef:
3189 /* sh_link is the section header index of the string table
3190 used for the dynamic entries, or the symbol table, or the
3191 version strings. */
3192 s = bfd_get_section_by_name (abfd, ".dynstr");
3193 if (s != NULL)
3194 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3195 break;
3196
7f1204bb
JJ
3197 case SHT_GNU_LIBLIST:
3198 /* sh_link is the section header index of the prelink library
3199 list
3200 used for the dynamic entries, or the symbol table, or the
3201 version strings. */
3202 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3203 ? ".dynstr" : ".gnu.libstr");
3204 if (s != NULL)
3205 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3206 break;
3207
252b5132
RH
3208 case SHT_HASH:
3209 case SHT_GNU_versym:
3210 /* sh_link is the section header index of the symbol table
3211 this hash table or version table is for. */
3212 s = bfd_get_section_by_name (abfd, ".dynsym");
3213 if (s != NULL)
3214 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3215 break;
dbb410c3
AM
3216
3217 case SHT_GROUP:
3218 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3219 }
3220 }
3221
2b0f7ef9 3222 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3223 if (i_shdrp[secn] == NULL)
3224 i_shdrp[secn] = i_shdrp[0];
3225 else
3226 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3227 i_shdrp[secn]->sh_name);
b34976b6 3228 return TRUE;
252b5132
RH
3229}
3230
3231/* Map symbol from it's internal number to the external number, moving
3232 all local symbols to be at the head of the list. */
3233
268b6b39 3234static int
217aa764 3235sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3236{
3237 /* If the backend has a special mapping, use it. */
9c5bfbb7 3238 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3239 if (bed->elf_backend_sym_is_global)
3240 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3241
3242 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3243 || bfd_is_und_section (bfd_get_section (sym))
3244 || bfd_is_com_section (bfd_get_section (sym)));
3245}
3246
b34976b6 3247static bfd_boolean
217aa764 3248elf_map_symbols (bfd *abfd)
252b5132 3249{
dc810e39 3250 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3251 asymbol **syms = bfd_get_outsymbols (abfd);
3252 asymbol **sect_syms;
dc810e39
AM
3253 unsigned int num_locals = 0;
3254 unsigned int num_globals = 0;
3255 unsigned int num_locals2 = 0;
3256 unsigned int num_globals2 = 0;
252b5132 3257 int max_index = 0;
dc810e39 3258 unsigned int idx;
252b5132
RH
3259 asection *asect;
3260 asymbol **new_syms;
dc810e39 3261 bfd_size_type amt;
252b5132
RH
3262
3263#ifdef DEBUG
3264 fprintf (stderr, "elf_map_symbols\n");
3265 fflush (stderr);
3266#endif
3267
252b5132
RH
3268 for (asect = abfd->sections; asect; asect = asect->next)
3269 {
3270 if (max_index < asect->index)
3271 max_index = asect->index;
3272 }
3273
3274 max_index++;
dc810e39 3275 amt = max_index * sizeof (asymbol *);
217aa764 3276 sect_syms = bfd_zalloc (abfd, amt);
252b5132 3277 if (sect_syms == NULL)
b34976b6 3278 return FALSE;
252b5132 3279 elf_section_syms (abfd) = sect_syms;
4e89ac30 3280 elf_num_section_syms (abfd) = max_index;
252b5132 3281
079e9a2f
AM
3282 /* Init sect_syms entries for any section symbols we have already
3283 decided to output. */
252b5132
RH
3284 for (idx = 0; idx < symcount; idx++)
3285 {
dc810e39 3286 asymbol *sym = syms[idx];
c044fabd 3287
252b5132
RH
3288 if ((sym->flags & BSF_SECTION_SYM) != 0
3289 && sym->value == 0)
3290 {
3291 asection *sec;
3292
3293 sec = sym->section;
3294
3295 if (sec->owner != NULL)
3296 {
3297 if (sec->owner != abfd)
3298 {
3299 if (sec->output_offset != 0)
3300 continue;
c044fabd 3301
252b5132
RH
3302 sec = sec->output_section;
3303
079e9a2f
AM
3304 /* Empty sections in the input files may have had a
3305 section symbol created for them. (See the comment
3306 near the end of _bfd_generic_link_output_symbols in
3307 linker.c). If the linker script discards such
3308 sections then we will reach this point. Since we know
3309 that we cannot avoid this case, we detect it and skip
3310 the abort and the assignment to the sect_syms array.
3311 To reproduce this particular case try running the
3312 linker testsuite test ld-scripts/weak.exp for an ELF
3313 port that uses the generic linker. */
252b5132
RH
3314 if (sec->owner == NULL)
3315 continue;
3316
3317 BFD_ASSERT (sec->owner == abfd);
3318 }
3319 sect_syms[sec->index] = syms[idx];
3320 }
3321 }
3322 }
3323
252b5132
RH
3324 /* Classify all of the symbols. */
3325 for (idx = 0; idx < symcount; idx++)
3326 {
3327 if (!sym_is_global (abfd, syms[idx]))
3328 num_locals++;
3329 else
3330 num_globals++;
3331 }
079e9a2f
AM
3332
3333 /* We will be adding a section symbol for each BFD section. Most normal
3334 sections will already have a section symbol in outsymbols, but
3335 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3336 at least in that case. */
252b5132
RH
3337 for (asect = abfd->sections; asect; asect = asect->next)
3338 {
079e9a2f 3339 if (sect_syms[asect->index] == NULL)
252b5132 3340 {
079e9a2f 3341 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3342 num_locals++;
3343 else
3344 num_globals++;
252b5132
RH
3345 }
3346 }
3347
3348 /* Now sort the symbols so the local symbols are first. */
dc810e39 3349 amt = (num_locals + num_globals) * sizeof (asymbol *);
217aa764 3350 new_syms = bfd_alloc (abfd, amt);
dc810e39 3351
252b5132 3352 if (new_syms == NULL)
b34976b6 3353 return FALSE;
252b5132
RH
3354
3355 for (idx = 0; idx < symcount; idx++)
3356 {
3357 asymbol *sym = syms[idx];
dc810e39 3358 unsigned int i;
252b5132
RH
3359
3360 if (!sym_is_global (abfd, sym))
3361 i = num_locals2++;
3362 else
3363 i = num_locals + num_globals2++;
3364 new_syms[i] = sym;
3365 sym->udata.i = i + 1;
3366 }
3367 for (asect = abfd->sections; asect; asect = asect->next)
3368 {
079e9a2f 3369 if (sect_syms[asect->index] == NULL)
252b5132 3370 {
079e9a2f 3371 asymbol *sym = asect->symbol;
dc810e39 3372 unsigned int i;
252b5132 3373
079e9a2f 3374 sect_syms[asect->index] = sym;
252b5132
RH
3375 if (!sym_is_global (abfd, sym))
3376 i = num_locals2++;
3377 else
3378 i = num_locals + num_globals2++;
3379 new_syms[i] = sym;
3380 sym->udata.i = i + 1;
3381 }
3382 }
3383
3384 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3385
3386 elf_num_locals (abfd) = num_locals;
3387 elf_num_globals (abfd) = num_globals;
b34976b6 3388 return TRUE;
252b5132
RH
3389}
3390
3391/* Align to the maximum file alignment that could be required for any
3392 ELF data structure. */
3393
268b6b39 3394static inline file_ptr
217aa764 3395align_file_position (file_ptr off, int align)
252b5132
RH
3396{
3397 return (off + align - 1) & ~(align - 1);
3398}
3399
3400/* Assign a file position to a section, optionally aligning to the
3401 required section alignment. */
3402
217aa764
AM
3403file_ptr
3404_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3405 file_ptr offset,
3406 bfd_boolean align)
252b5132
RH
3407{
3408 if (align)
3409 {
3410 unsigned int al;
3411
3412 al = i_shdrp->sh_addralign;
3413 if (al > 1)
3414 offset = BFD_ALIGN (offset, al);
3415 }
3416 i_shdrp->sh_offset = offset;
3417 if (i_shdrp->bfd_section != NULL)
3418 i_shdrp->bfd_section->filepos = offset;
3419 if (i_shdrp->sh_type != SHT_NOBITS)
3420 offset += i_shdrp->sh_size;
3421 return offset;
3422}
3423
3424/* Compute the file positions we are going to put the sections at, and
3425 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3426 is not NULL, this is being called by the ELF backend linker. */
3427
b34976b6 3428bfd_boolean
217aa764
AM
3429_bfd_elf_compute_section_file_positions (bfd *abfd,
3430 struct bfd_link_info *link_info)
252b5132 3431{
9c5bfbb7 3432 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3433 bfd_boolean failed;
4b6c0f2f 3434 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3435 Elf_Internal_Shdr *shstrtab_hdr;
3436
3437 if (abfd->output_has_begun)
b34976b6 3438 return TRUE;
252b5132
RH
3439
3440 /* Do any elf backend specific processing first. */
3441 if (bed->elf_backend_begin_write_processing)
3442 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3443
3444 if (! prep_headers (abfd))
b34976b6 3445 return FALSE;
252b5132 3446
e6c51ed4
NC
3447 /* Post process the headers if necessary. */
3448 if (bed->elf_backend_post_process_headers)
3449 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3450
b34976b6 3451 failed = FALSE;
252b5132
RH
3452 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3453 if (failed)
b34976b6 3454 return FALSE;
252b5132 3455
da9f89d4 3456 if (!assign_section_numbers (abfd, link_info))
b34976b6 3457 return FALSE;
252b5132
RH
3458
3459 /* The backend linker builds symbol table information itself. */
3460 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3461 {
3462 /* Non-zero if doing a relocatable link. */
3463 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3464
3465 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3466 return FALSE;
252b5132
RH
3467 }
3468
1126897b 3469 if (link_info == NULL)
dbb410c3 3470 {
1126897b 3471 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3472 if (failed)
b34976b6 3473 return FALSE;
dbb410c3
AM
3474 }
3475
252b5132
RH
3476 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3477 /* sh_name was set in prep_headers. */
3478 shstrtab_hdr->sh_type = SHT_STRTAB;
3479 shstrtab_hdr->sh_flags = 0;
3480 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3481 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3482 shstrtab_hdr->sh_entsize = 0;
3483 shstrtab_hdr->sh_link = 0;
3484 shstrtab_hdr->sh_info = 0;
3485 /* sh_offset is set in assign_file_positions_except_relocs. */
3486 shstrtab_hdr->sh_addralign = 1;
3487
c84fca4d 3488 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3489 return FALSE;
252b5132
RH
3490
3491 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3492 {
3493 file_ptr off;
3494 Elf_Internal_Shdr *hdr;
3495
3496 off = elf_tdata (abfd)->next_file_pos;
3497
3498 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3499 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3500
9ad5cbcf
AM
3501 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3502 if (hdr->sh_size != 0)
b34976b6 3503 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3504
252b5132 3505 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3506 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3507
3508 elf_tdata (abfd)->next_file_pos = off;
3509
3510 /* Now that we know where the .strtab section goes, write it
3511 out. */
3512 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3513 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3514 return FALSE;
252b5132
RH
3515 _bfd_stringtab_free (strtab);
3516 }
3517
b34976b6 3518 abfd->output_has_begun = TRUE;
252b5132 3519
b34976b6 3520 return TRUE;
252b5132
RH
3521}
3522
3523/* Create a mapping from a set of sections to a program segment. */
3524
217aa764
AM
3525static struct elf_segment_map *
3526make_mapping (bfd *abfd,
3527 asection **sections,
3528 unsigned int from,
3529 unsigned int to,
3530 bfd_boolean phdr)
252b5132
RH
3531{
3532 struct elf_segment_map *m;
3533 unsigned int i;
3534 asection **hdrpp;
dc810e39 3535 bfd_size_type amt;
252b5132 3536
dc810e39
AM
3537 amt = sizeof (struct elf_segment_map);
3538 amt += (to - from - 1) * sizeof (asection *);
217aa764 3539 m = bfd_zalloc (abfd, amt);
252b5132
RH
3540 if (m == NULL)
3541 return NULL;
3542 m->next = NULL;
3543 m->p_type = PT_LOAD;
3544 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3545 m->sections[i - from] = *hdrpp;
3546 m->count = to - from;
3547
3548 if (from == 0 && phdr)
3549 {
3550 /* Include the headers in the first PT_LOAD segment. */
3551 m->includes_filehdr = 1;
3552 m->includes_phdrs = 1;
3553 }
3554
3555 return m;
3556}
3557
229fcec5
MM
3558/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3559 on failure. */
3560
3561struct elf_segment_map *
3562_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3563{
3564 struct elf_segment_map *m;
3565
3566 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3567 if (m == NULL)
3568 return NULL;
3569 m->next = NULL;
3570 m->p_type = PT_DYNAMIC;
3571 m->count = 1;
3572 m->sections[0] = dynsec;
3573
3574 return m;
3575}
3576
252b5132
RH
3577/* Set up a mapping from BFD sections to program segments. */
3578
b34976b6 3579static bfd_boolean
217aa764 3580map_sections_to_segments (bfd *abfd)
252b5132
RH
3581{
3582 asection **sections = NULL;
3583 asection *s;
3584 unsigned int i;
3585 unsigned int count;
3586 struct elf_segment_map *mfirst;
3587 struct elf_segment_map **pm;
3588 struct elf_segment_map *m;
3589 asection *last_hdr;
baaff79e 3590 bfd_vma last_size;
252b5132
RH
3591 unsigned int phdr_index;
3592 bfd_vma maxpagesize;
3593 asection **hdrpp;
b34976b6
AM
3594 bfd_boolean phdr_in_segment = TRUE;
3595 bfd_boolean writable;
13ae64f3
JJ
3596 int tls_count = 0;
3597 asection *first_tls = NULL;
65765700 3598 asection *dynsec, *eh_frame_hdr;
dc810e39 3599 bfd_size_type amt;
252b5132
RH
3600
3601 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3602 return TRUE;
252b5132
RH
3603
3604 if (bfd_count_sections (abfd) == 0)
b34976b6 3605 return TRUE;
252b5132
RH
3606
3607 /* Select the allocated sections, and sort them. */
3608
dc810e39 3609 amt = bfd_count_sections (abfd) * sizeof (asection *);
217aa764 3610 sections = bfd_malloc (amt);
252b5132
RH
3611 if (sections == NULL)
3612 goto error_return;
3613
3614 i = 0;
3615 for (s = abfd->sections; s != NULL; s = s->next)
3616 {
3617 if ((s->flags & SEC_ALLOC) != 0)
3618 {
3619 sections[i] = s;
3620 ++i;
3621 }
3622 }
3623 BFD_ASSERT (i <= bfd_count_sections (abfd));
3624 count = i;
3625
3626 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3627
3628 /* Build the mapping. */
3629
3630 mfirst = NULL;
3631 pm = &mfirst;
3632
3633 /* If we have a .interp section, then create a PT_PHDR segment for
3634 the program headers and a PT_INTERP segment for the .interp
3635 section. */
3636 s = bfd_get_section_by_name (abfd, ".interp");
3637 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3638 {
dc810e39 3639 amt = sizeof (struct elf_segment_map);
217aa764 3640 m = bfd_zalloc (abfd, amt);
252b5132
RH
3641 if (m == NULL)
3642 goto error_return;
3643 m->next = NULL;
3644 m->p_type = PT_PHDR;
3645 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3646 m->p_flags = PF_R | PF_X;
3647 m->p_flags_valid = 1;
3648 m->includes_phdrs = 1;
3649
3650 *pm = m;
3651 pm = &m->next;
3652
dc810e39 3653 amt = sizeof (struct elf_segment_map);
217aa764 3654 m = bfd_zalloc (abfd, amt);
252b5132
RH
3655 if (m == NULL)
3656 goto error_return;
3657 m->next = NULL;
3658 m->p_type = PT_INTERP;
3659 m->count = 1;
3660 m->sections[0] = s;
3661
3662 *pm = m;
3663 pm = &m->next;
3664 }
3665
3666 /* Look through the sections. We put sections in the same program
3667 segment when the start of the second section can be placed within
3668 a few bytes of the end of the first section. */
3669 last_hdr = NULL;
baaff79e 3670 last_size = 0;
252b5132
RH
3671 phdr_index = 0;
3672 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3673 writable = FALSE;
252b5132
RH
3674 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3675 if (dynsec != NULL
3676 && (dynsec->flags & SEC_LOAD) == 0)
3677 dynsec = NULL;
3678
3679 /* Deal with -Ttext or something similar such that the first section
3680 is not adjacent to the program headers. This is an
3681 approximation, since at this point we don't know exactly how many
3682 program headers we will need. */
3683 if (count > 0)
3684 {
3685 bfd_size_type phdr_size;
3686
3687 phdr_size = elf_tdata (abfd)->program_header_size;
3688 if (phdr_size == 0)
3689 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3690 if ((abfd->flags & D_PAGED) == 0
3691 || sections[0]->lma < phdr_size
3692 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3693 phdr_in_segment = FALSE;
252b5132
RH
3694 }
3695
3696 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3697 {
3698 asection *hdr;
b34976b6 3699 bfd_boolean new_segment;
252b5132
RH
3700
3701 hdr = *hdrpp;
3702
3703 /* See if this section and the last one will fit in the same
3704 segment. */
3705
3706 if (last_hdr == NULL)
3707 {
3708 /* If we don't have a segment yet, then we don't need a new
3709 one (we build the last one after this loop). */
b34976b6 3710 new_segment = FALSE;
252b5132
RH
3711 }
3712 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3713 {
3714 /* If this section has a different relation between the
3715 virtual address and the load address, then we need a new
3716 segment. */
b34976b6 3717 new_segment = TRUE;
252b5132 3718 }
baaff79e 3719 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3720 < BFD_ALIGN (hdr->lma, maxpagesize))
3721 {
3722 /* If putting this section in this segment would force us to
3723 skip a page in the segment, then we need a new segment. */
b34976b6 3724 new_segment = TRUE;
252b5132 3725 }
baaff79e
JJ
3726 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3727 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3728 {
3729 /* We don't want to put a loadable section after a
baaff79e
JJ
3730 nonloadable section in the same segment.
3731 Consider .tbss sections as loadable for this purpose. */
b34976b6 3732 new_segment = TRUE;
252b5132
RH
3733 }
3734 else if ((abfd->flags & D_PAGED) == 0)
3735 {
3736 /* If the file is not demand paged, which means that we
3737 don't require the sections to be correctly aligned in the
3738 file, then there is no other reason for a new segment. */
b34976b6 3739 new_segment = FALSE;
252b5132
RH
3740 }
3741 else if (! writable
3742 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3743 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3744 & ~(maxpagesize - 1))
3745 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3746 {
3747 /* We don't want to put a writable section in a read only
3748 segment, unless they are on the same page in memory
3749 anyhow. We already know that the last section does not
3750 bring us past the current section on the page, so the
3751 only case in which the new section is not on the same
3752 page as the previous section is when the previous section
3753 ends precisely on a page boundary. */
b34976b6 3754 new_segment = TRUE;
252b5132
RH
3755 }
3756 else
3757 {
3758 /* Otherwise, we can use the same segment. */
b34976b6 3759 new_segment = FALSE;
252b5132
RH
3760 }
3761
3762 if (! new_segment)
3763 {
3764 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3765 writable = TRUE;
baaff79e
JJ
3766 last_hdr = hdr;
3767 /* .tbss sections effectively have zero size. */
e5caec89 3768 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3769 last_size = hdr->size;
baaff79e
JJ
3770 else
3771 last_size = 0;
252b5132
RH
3772 continue;
3773 }
3774
3775 /* We need a new program segment. We must create a new program
3776 header holding all the sections from phdr_index until hdr. */
3777
3778 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3779 if (m == NULL)
3780 goto error_return;
3781
3782 *pm = m;
3783 pm = &m->next;
3784
3785 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3786 writable = TRUE;
252b5132 3787 else
b34976b6 3788 writable = FALSE;
252b5132
RH
3789
3790 last_hdr = hdr;
baaff79e
JJ
3791 /* .tbss sections effectively have zero size. */
3792 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3793 last_size = hdr->size;
baaff79e
JJ
3794 else
3795 last_size = 0;
252b5132 3796 phdr_index = i;
b34976b6 3797 phdr_in_segment = FALSE;
252b5132
RH
3798 }
3799
3800 /* Create a final PT_LOAD program segment. */
3801 if (last_hdr != NULL)
3802 {
3803 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3804 if (m == NULL)
3805 goto error_return;
3806
3807 *pm = m;
3808 pm = &m->next;
3809 }
3810
3811 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3812 if (dynsec != NULL)
3813 {
229fcec5 3814 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3815 if (m == NULL)
3816 goto error_return;
252b5132
RH
3817 *pm = m;
3818 pm = &m->next;
3819 }
3820
3821 /* For each loadable .note section, add a PT_NOTE segment. We don't
3822 use bfd_get_section_by_name, because if we link together
3823 nonloadable .note sections and loadable .note sections, we will
3824 generate two .note sections in the output file. FIXME: Using
3825 names for section types is bogus anyhow. */
3826 for (s = abfd->sections; s != NULL; s = s->next)
3827 {
3828 if ((s->flags & SEC_LOAD) != 0
3829 && strncmp (s->name, ".note", 5) == 0)
3830 {
dc810e39 3831 amt = sizeof (struct elf_segment_map);
217aa764 3832 m = bfd_zalloc (abfd, amt);
252b5132
RH
3833 if (m == NULL)
3834 goto error_return;
3835 m->next = NULL;
3836 m->p_type = PT_NOTE;
3837 m->count = 1;
3838 m->sections[0] = s;
3839
3840 *pm = m;
3841 pm = &m->next;
3842 }
13ae64f3
JJ
3843 if (s->flags & SEC_THREAD_LOCAL)
3844 {
3845 if (! tls_count)
3846 first_tls = s;
3847 tls_count++;
3848 }
3849 }
3850
3851 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3852 if (tls_count > 0)
3853 {
3854 int i;
3855
3856 amt = sizeof (struct elf_segment_map);
3857 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3858 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3859 if (m == NULL)
3860 goto error_return;
3861 m->next = NULL;
3862 m->p_type = PT_TLS;
3863 m->count = tls_count;
3864 /* Mandated PF_R. */
3865 m->p_flags = PF_R;
3866 m->p_flags_valid = 1;
3867 for (i = 0; i < tls_count; ++i)
3868 {
3869 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3870 m->sections[i] = first_tls;
3871 first_tls = first_tls->next;
3872 }
3873
3874 *pm = m;
3875 pm = &m->next;
252b5132
RH
3876 }
3877
65765700
JJ
3878 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3879 segment. */
126495ed
AM
3880 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3881 if (eh_frame_hdr != NULL
3882 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3883 {
3884 amt = sizeof (struct elf_segment_map);
217aa764 3885 m = bfd_zalloc (abfd, amt);
65765700
JJ
3886 if (m == NULL)
3887 goto error_return;
3888 m->next = NULL;
3889 m->p_type = PT_GNU_EH_FRAME;
3890 m->count = 1;
126495ed 3891 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3892
3893 *pm = m;
3894 pm = &m->next;
3895 }
3896
9ee5e499
JJ
3897 if (elf_tdata (abfd)->stack_flags)
3898 {
3899 amt = sizeof (struct elf_segment_map);
217aa764 3900 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3901 if (m == NULL)
3902 goto error_return;
3903 m->next = NULL;
3904 m->p_type = PT_GNU_STACK;
3905 m->p_flags = elf_tdata (abfd)->stack_flags;
3906 m->p_flags_valid = 1;
3907
3908 *pm = m;
3909 pm = &m->next;
3910 }
3911
8c37241b
JJ
3912 if (elf_tdata (abfd)->relro)
3913 {
3914 amt = sizeof (struct elf_segment_map);
3915 m = bfd_zalloc (abfd, amt);
3916 if (m == NULL)
3917 goto error_return;
3918 m->next = NULL;
3919 m->p_type = PT_GNU_RELRO;
3920 m->p_flags = PF_R;
3921 m->p_flags_valid = 1;
3922
3923 *pm = m;
3924 pm = &m->next;
3925 }
3926
252b5132
RH
3927 free (sections);
3928 sections = NULL;
3929
3930 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3931 return TRUE;
252b5132
RH
3932
3933 error_return:
3934 if (sections != NULL)
3935 free (sections);
b34976b6 3936 return FALSE;
252b5132
RH
3937}
3938
3939/* Sort sections by address. */
3940
3941static int
217aa764 3942elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3943{
3944 const asection *sec1 = *(const asection **) arg1;
3945 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3946 bfd_size_type size1, size2;
252b5132
RH
3947
3948 /* Sort by LMA first, since this is the address used to
3949 place the section into a segment. */
3950 if (sec1->lma < sec2->lma)
3951 return -1;
3952 else if (sec1->lma > sec2->lma)
3953 return 1;
3954
3955 /* Then sort by VMA. Normally the LMA and the VMA will be
3956 the same, and this will do nothing. */
3957 if (sec1->vma < sec2->vma)
3958 return -1;
3959 else if (sec1->vma > sec2->vma)
3960 return 1;
3961
3962 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3963
07c6e936 3964#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3965
3966 if (TOEND (sec1))
3967 {
3968 if (TOEND (sec2))
00a7cdc5
NC
3969 {
3970 /* If the indicies are the same, do not return 0
3971 here, but continue to try the next comparison. */
3972 if (sec1->target_index - sec2->target_index != 0)
3973 return sec1->target_index - sec2->target_index;
3974 }
252b5132
RH
3975 else
3976 return 1;
3977 }
00a7cdc5 3978 else if (TOEND (sec2))
252b5132
RH
3979 return -1;
3980
3981#undef TOEND
3982
00a7cdc5
NC
3983 /* Sort by size, to put zero sized sections
3984 before others at the same address. */
252b5132 3985
eea6121a
AM
3986 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
3987 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
3988
3989 if (size1 < size2)
252b5132 3990 return -1;
eecdbe52 3991 if (size1 > size2)
252b5132
RH
3992 return 1;
3993
3994 return sec1->target_index - sec2->target_index;
3995}
3996
340b6d91
AC
3997/* Ian Lance Taylor writes:
3998
3999 We shouldn't be using % with a negative signed number. That's just
4000 not good. We have to make sure either that the number is not
4001 negative, or that the number has an unsigned type. When the types
4002 are all the same size they wind up as unsigned. When file_ptr is a
4003 larger signed type, the arithmetic winds up as signed long long,
4004 which is wrong.
4005
4006 What we're trying to say here is something like ``increase OFF by
4007 the least amount that will cause it to be equal to the VMA modulo
4008 the page size.'' */
4009/* In other words, something like:
4010
4011 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4012 off_offset = off % bed->maxpagesize;
4013 if (vma_offset < off_offset)
4014 adjustment = vma_offset + bed->maxpagesize - off_offset;
4015 else
4016 adjustment = vma_offset - off_offset;
4017
4018 which can can be collapsed into the expression below. */
4019
4020static file_ptr
4021vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4022{
4023 return ((vma - off) % maxpagesize);
4024}
4025
252b5132
RH
4026/* Assign file positions to the sections based on the mapping from
4027 sections to segments. This function also sets up some fields in
4028 the file header, and writes out the program headers. */
4029
b34976b6 4030static bfd_boolean
c84fca4d 4031assign_file_positions_for_segments (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
4032{
4033 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4034 unsigned int count;
4035 struct elf_segment_map *m;
4036 unsigned int alloc;
4037 Elf_Internal_Phdr *phdrs;
4038 file_ptr off, voff;
4039 bfd_vma filehdr_vaddr, filehdr_paddr;
4040 bfd_vma phdrs_vaddr, phdrs_paddr;
4041 Elf_Internal_Phdr *p;
dc810e39 4042 bfd_size_type amt;
252b5132
RH
4043
4044 if (elf_tdata (abfd)->segment_map == NULL)
4045 {
4046 if (! map_sections_to_segments (abfd))
b34976b6 4047 return FALSE;
252b5132 4048 }
1ed89aa9
NC
4049 else
4050 {
4051 /* The placement algorithm assumes that non allocated sections are
4052 not in PT_LOAD segments. We ensure this here by removing such
4053 sections from the segment map. */
4054 for (m = elf_tdata (abfd)->segment_map;
4055 m != NULL;
4056 m = m->next)
4057 {
4058 unsigned int new_count;
4059 unsigned int i;
4060
4061 if (m->p_type != PT_LOAD)
4062 continue;
4063
4064 new_count = 0;
4065 for (i = 0; i < m->count; i ++)
4066 {
4067 if ((m->sections[i]->flags & SEC_ALLOC) != 0)
4068 {
47d9a591 4069 if (i != new_count)
1ed89aa9
NC
4070 m->sections[new_count] = m->sections[i];
4071
4072 new_count ++;
4073 }
4074 }
4075
4076 if (new_count != m->count)
4077 m->count = new_count;
4078 }
4079 }
252b5132
RH
4080
4081 if (bed->elf_backend_modify_segment_map)
4082 {
c84fca4d 4083 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 4084 return FALSE;
252b5132
RH
4085 }
4086
4087 count = 0;
4088 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4089 ++count;
4090
4091 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4092 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4093 elf_elfheader (abfd)->e_phnum = count;
4094
4095 if (count == 0)
0ebdbb83
BW
4096 {
4097 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4098 return TRUE;
4099 }
252b5132
RH
4100
4101 /* If we already counted the number of program segments, make sure
4102 that we allocated enough space. This happens when SIZEOF_HEADERS
4103 is used in a linker script. */
4104 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
4105 if (alloc != 0 && count > alloc)
4106 {
4107 ((*_bfd_error_handler)
b301b248
AM
4108 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
4109 abfd, alloc, count));
252b5132 4110 bfd_set_error (bfd_error_bad_value);
b34976b6 4111 return FALSE;
252b5132
RH
4112 }
4113
4114 if (alloc == 0)
4115 alloc = count;
4116
dc810e39 4117 amt = alloc * sizeof (Elf_Internal_Phdr);
217aa764 4118 phdrs = bfd_alloc (abfd, amt);
252b5132 4119 if (phdrs == NULL)
b34976b6 4120 return FALSE;
252b5132
RH
4121
4122 off = bed->s->sizeof_ehdr;
4123 off += alloc * bed->s->sizeof_phdr;
4124
4125 filehdr_vaddr = 0;
4126 filehdr_paddr = 0;
4127 phdrs_vaddr = 0;
4128 phdrs_paddr = 0;
4129
4130 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4131 m != NULL;
4132 m = m->next, p++)
4133 {
4134 unsigned int i;
4135 asection **secpp;
4136
4137 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4138 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4139 not be done to the PT_NOTE section of a corefile, which may
4140 contain several pseudo-sections artificially created by bfd.
4141 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4142 if (m->count > 1
4143 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4144 && m->p_type == PT_NOTE))
252b5132
RH
4145 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4146 elf_sort_sections);
4147
b301b248
AM
4148 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4149 number of sections with contents contributing to both p_filesz
4150 and p_memsz, followed by a number of sections with no contents
4151 that just contribute to p_memsz. In this loop, OFF tracks next
4152 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4153 an adjustment we use for segments that have no file contents
4154 but need zero filled memory allocation. */
4155 voff = 0;
252b5132 4156 p->p_type = m->p_type;
28a7f3e7 4157 p->p_flags = m->p_flags;
252b5132
RH
4158
4159 if (p->p_type == PT_LOAD
b301b248 4160 && m->count > 0)
252b5132 4161 {
b301b248
AM
4162 bfd_size_type align;
4163 bfd_vma adjust;
a49e53ed 4164 unsigned int align_power = 0;
b301b248 4165
a49e53ed 4166 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4167 {
a49e53ed 4168 unsigned int secalign;
252b5132 4169
a49e53ed
AM
4170 secalign = bfd_get_section_alignment (abfd, *secpp);
4171 if (secalign > align_power)
4172 align_power = secalign;
b301b248 4173 }
a49e53ed
AM
4174 align = (bfd_size_type) 1 << align_power;
4175
4176 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > align)
4177 align = bed->maxpagesize;
252b5132 4178
b301b248
AM
4179 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4180 off += adjust;
4181 if (adjust != 0
4182 && !m->includes_filehdr
4183 && !m->includes_phdrs
4184 && (ufile_ptr) off >= align)
4185 {
4186 /* If the first section isn't loadable, the same holds for
4187 any other sections. Since the segment won't need file
4188 space, we can make p_offset overlap some prior segment.
4189 However, .tbss is special. If a segment starts with
4190 .tbss, we need to look at the next section to decide
4191 whether the segment has any loadable sections. */
4192 i = 0;
5efb6261 4193 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
4194 {
4195 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4196 || ++i >= m->count)
4197 {
4198 off -= adjust;
4199 voff = adjust - align;
4200 break;
4201 }
4202 }
252b5132
RH
4203 }
4204 }
b1a6d0b1
NC
4205 /* Make sure the .dynamic section is the first section in the
4206 PT_DYNAMIC segment. */
4207 else if (p->p_type == PT_DYNAMIC
4208 && m->count > 1
4209 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4210 {
4211 _bfd_error_handler
b301b248
AM
4212 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4213 abfd);
b1a6d0b1
NC
4214 bfd_set_error (bfd_error_bad_value);
4215 return FALSE;
4216 }
252b5132
RH
4217
4218 if (m->count == 0)
4219 p->p_vaddr = 0;
4220 else
4221 p->p_vaddr = m->sections[0]->vma;
4222
4223 if (m->p_paddr_valid)
4224 p->p_paddr = m->p_paddr;
4225 else if (m->count == 0)
4226 p->p_paddr = 0;
4227 else
4228 p->p_paddr = m->sections[0]->lma;
4229
4230 if (p->p_type == PT_LOAD
4231 && (abfd->flags & D_PAGED) != 0)
4232 p->p_align = bed->maxpagesize;
4233 else if (m->count == 0)
45d6a902 4234 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
4235 else
4236 p->p_align = 0;
4237
4238 p->p_offset = 0;
4239 p->p_filesz = 0;
4240 p->p_memsz = 0;
4241
4242 if (m->includes_filehdr)
4243 {
4244 if (! m->p_flags_valid)
4245 p->p_flags |= PF_R;
4246 p->p_offset = 0;
4247 p->p_filesz = bed->s->sizeof_ehdr;
4248 p->p_memsz = bed->s->sizeof_ehdr;
4249 if (m->count > 0)
4250 {
4251 BFD_ASSERT (p->p_type == PT_LOAD);
4252
4253 if (p->p_vaddr < (bfd_vma) off)
4254 {
caf47ea6 4255 (*_bfd_error_handler)
b301b248
AM
4256 (_("%B: Not enough room for program headers, try linking with -N"),
4257 abfd);
252b5132 4258 bfd_set_error (bfd_error_bad_value);
b34976b6 4259 return FALSE;
252b5132
RH
4260 }
4261
4262 p->p_vaddr -= off;
4263 if (! m->p_paddr_valid)
4264 p->p_paddr -= off;
4265 }
4266 if (p->p_type == PT_LOAD)
4267 {
4268 filehdr_vaddr = p->p_vaddr;
4269 filehdr_paddr = p->p_paddr;
4270 }
4271 }
4272
4273 if (m->includes_phdrs)
4274 {
4275 if (! m->p_flags_valid)
4276 p->p_flags |= PF_R;
4277
4278 if (m->includes_filehdr)
4279 {
4280 if (p->p_type == PT_LOAD)
4281 {
4282 phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr;
4283 phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr;
4284 }
4285 }
4286 else
4287 {
4288 p->p_offset = bed->s->sizeof_ehdr;
4289
4290 if (m->count > 0)
4291 {
4292 BFD_ASSERT (p->p_type == PT_LOAD);
4293 p->p_vaddr -= off - p->p_offset;
4294 if (! m->p_paddr_valid)
4295 p->p_paddr -= off - p->p_offset;
4296 }
4297
4298 if (p->p_type == PT_LOAD)
4299 {
4300 phdrs_vaddr = p->p_vaddr;
4301 phdrs_paddr = p->p_paddr;
4302 }
4303 else
4304 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4305 }
4306
4307 p->p_filesz += alloc * bed->s->sizeof_phdr;
4308 p->p_memsz += alloc * bed->s->sizeof_phdr;
4309 }
4310
4311 if (p->p_type == PT_LOAD
4312 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4313 {
4314 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4315 p->p_offset = off + voff;
252b5132
RH
4316 else
4317 {
4318 file_ptr adjust;
4319
4320 adjust = off - (p->p_offset + p->p_filesz);
4321 p->p_filesz += adjust;
4322 p->p_memsz += adjust;
4323 }
4324 }
4325
252b5132
RH
4326 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4327 {
4328 asection *sec;
4329 flagword flags;
4330 bfd_size_type align;
4331
4332 sec = *secpp;
4333 flags = sec->flags;
4334 align = 1 << bfd_get_section_alignment (abfd, sec);
4335
b301b248
AM
4336 if (p->p_type == PT_LOAD
4337 || p->p_type == PT_TLS)
252b5132
RH
4338 {
4339 bfd_signed_vma adjust;
4340
5efb6261 4341 if ((flags & SEC_LOAD) != 0)
252b5132 4342 {
b301b248 4343 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4344 if (adjust < 0)
b301b248
AM
4345 {
4346 (*_bfd_error_handler)
4347 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4348 abfd, sec, (unsigned long) sec->lma);
4349 adjust = 0;
4350 }
4351 off += adjust;
4352 p->p_filesz += adjust;
4353 p->p_memsz += adjust;
252b5132 4354 }
b301b248
AM
4355 /* .tbss is special. It doesn't contribute to p_memsz of
4356 normal segments. */
4357 else if ((flags & SEC_THREAD_LOCAL) == 0
4358 || p->p_type == PT_TLS)
252b5132
RH
4359 {
4360 /* The section VMA must equal the file position
b301b248
AM
4361 modulo the page size. */
4362 bfd_size_type page = align;
a49e53ed 4363 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > page)
b301b248
AM
4364 page = bed->maxpagesize;
4365 adjust = vma_page_aligned_bias (sec->vma,
4366 p->p_vaddr + p->p_memsz,
4367 page);
252b5132 4368 p->p_memsz += adjust;
252b5132 4369 }
252b5132
RH
4370 }
4371
4372 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4373 {
b301b248
AM
4374 /* The section at i == 0 is the one that actually contains
4375 everything. */
4a938328
MS
4376 if (i == 0)
4377 {
252b5132 4378 sec->filepos = off;
eea6121a 4379 off += sec->size;
b301b248
AM
4380 p->p_filesz = sec->size;
4381 p->p_memsz = 0;
4382 p->p_align = 1;
252b5132 4383 }
4a938328 4384 else
252b5132 4385 {
b301b248 4386 /* The rest are fake sections that shouldn't be written. */
252b5132 4387 sec->filepos = 0;
eea6121a 4388 sec->size = 0;
b301b248
AM
4389 sec->flags = 0;
4390 continue;
252b5132 4391 }
252b5132
RH
4392 }
4393 else
4394 {
b301b248
AM
4395 if (p->p_type == PT_LOAD)
4396 {
4397 sec->filepos = off;
5efb6261
AM
4398 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4399 1997, and the exact reason for it isn't clear. One
4400 plausible explanation is that it is to work around
4401 a problem we have with linker scripts using data
4402 statements in NOLOAD sections. I don't think it
4403 makes a great deal of sense to have such a section
4404 assigned to a PT_LOAD segment, but apparently
4405 people do this. The data statement results in a
4406 bfd_data_link_order being built, and these need
4407 section contents to write into. Eventually, we get
4408 to _bfd_elf_write_object_contents which writes any
4409 section with contents to the output. Make room
4410 here for the write, so that following segments are
4411 not trashed. */
4412 if ((flags & SEC_LOAD) != 0
4413 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4414 off += sec->size;
4415 }
252b5132 4416
5efb6261 4417 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4418 {
4419 p->p_filesz += sec->size;
4420 p->p_memsz += sec->size;
4421 }
4b6c0f2f
NC
4422 /* PR ld/594: Sections in note segments which are not loaded
4423 contribute to the file size but not the in-memory size. */
4424 else if (p->p_type == PT_NOTE
4425 && (flags & SEC_HAS_CONTENTS) != 0)
4426 p->p_filesz += sec->size;
4427
b301b248
AM
4428 /* .tbss is special. It doesn't contribute to p_memsz of
4429 normal segments. */
4430 else if ((flags & SEC_THREAD_LOCAL) == 0
4431 || p->p_type == PT_TLS)
4432 p->p_memsz += sec->size;
252b5132 4433
13ae64f3 4434 if (p->p_type == PT_TLS
eea6121a 4435 && sec->size == 0
13ae64f3
JJ
4436 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4437 {
4438 struct bfd_link_order *o;
4439 bfd_vma tbss_size = 0;
4440
8423293d 4441 for (o = sec->map_head.link_order; o != NULL; o = o->next)
13ae64f3
JJ
4442 if (tbss_size < o->offset + o->size)
4443 tbss_size = o->offset + o->size;
4444
4445 p->p_memsz += tbss_size;
4446 }
4447
252b5132
RH
4448 if (align > p->p_align
4449 && (p->p_type != PT_LOAD || (abfd->flags & D_PAGED) == 0))
4450 p->p_align = align;
4451 }
4452
4453 if (! m->p_flags_valid)
4454 {
4455 p->p_flags |= PF_R;
4456 if ((flags & SEC_CODE) != 0)
4457 p->p_flags |= PF_X;
4458 if ((flags & SEC_READONLY) == 0)
4459 p->p_flags |= PF_W;
4460 }
4461 }
4462 }
4463
4464 /* Now that we have set the section file positions, we can set up
4465 the file positions for the non PT_LOAD segments. */
4466 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4467 m != NULL;
4468 m = m->next, p++)
4469 {
4470 if (p->p_type != PT_LOAD && m->count > 0)
4471 {
4472 BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs);
229fcec5
MM
4473 /* If the section has not yet been assigned a file position,
4474 do so now. The ARM BPABI requires that .dynamic section
4475 not be marked SEC_ALLOC because it is not part of any
4476 PT_LOAD segment, so it will not be processed above. */
4477 if (p->p_type == PT_DYNAMIC && m->sections[0]->filepos == 0)
4478 {
4479 unsigned int i;
4480 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4481
4482 i = 1;
4483 while (i_shdrpp[i]->bfd_section != m->sections[0])
4484 ++i;
4485 off = (_bfd_elf_assign_file_position_for_section
4486 (i_shdrpp[i], off, TRUE));
4487 p->p_filesz = m->sections[0]->size;
4488 }
252b5132
RH
4489 p->p_offset = m->sections[0]->filepos;
4490 }
4491 if (m->count == 0)
4492 {
4493 if (m->includes_filehdr)
4494 {
4495 p->p_vaddr = filehdr_vaddr;
4496 if (! m->p_paddr_valid)
4497 p->p_paddr = filehdr_paddr;
4498 }
4499 else if (m->includes_phdrs)
4500 {
4501 p->p_vaddr = phdrs_vaddr;
4502 if (! m->p_paddr_valid)
4503 p->p_paddr = phdrs_paddr;
4504 }
8c37241b
JJ
4505 else if (p->p_type == PT_GNU_RELRO)
4506 {
4507 Elf_Internal_Phdr *lp;
4508
4509 for (lp = phdrs; lp < phdrs + count; ++lp)
4510 {
4511 if (lp->p_type == PT_LOAD
4512 && lp->p_vaddr <= link_info->relro_end
4513 && lp->p_vaddr >= link_info->relro_start
4514 && lp->p_vaddr + lp->p_filesz
4515 >= link_info->relro_end)
4516 break;
4517 }
4518
4519 if (lp < phdrs + count
4520 && link_info->relro_end > lp->p_vaddr)
4521 {
4522 p->p_vaddr = lp->p_vaddr;
4523 p->p_paddr = lp->p_paddr;
4524 p->p_offset = lp->p_offset;
4525 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4526 p->p_memsz = p->p_filesz;
4527 p->p_align = 1;
4528 p->p_flags = (lp->p_flags & ~PF_W);
4529 }
4530 else
4531 {
4532 memset (p, 0, sizeof *p);
4533 p->p_type = PT_NULL;
4534 }
4535 }
252b5132
RH
4536 }
4537 }
4538
4539 /* Clear out any program headers we allocated but did not use. */
4540 for (; count < alloc; count++, p++)
4541 {
4542 memset (p, 0, sizeof *p);
4543 p->p_type = PT_NULL;
4544 }
4545
4546 elf_tdata (abfd)->phdr = phdrs;
4547
4548 elf_tdata (abfd)->next_file_pos = off;
4549
4550 /* Write out the program headers. */
dc810e39 4551 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
252b5132 4552 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0)
b34976b6 4553 return FALSE;
252b5132 4554
b34976b6 4555 return TRUE;
252b5132
RH
4556}
4557
4558/* Get the size of the program header.
4559
4560 If this is called by the linker before any of the section VMA's are set, it
4561 can't calculate the correct value for a strange memory layout. This only
4562 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4563 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4564 data segment (exclusive of .interp and .dynamic).
4565
4566 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4567 will be two segments. */
4568
4569static bfd_size_type
217aa764 4570get_program_header_size (bfd *abfd)
252b5132
RH
4571{
4572 size_t segs;
4573 asection *s;
9c5bfbb7 4574 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4575
4576 /* We can't return a different result each time we're called. */
4577 if (elf_tdata (abfd)->program_header_size != 0)
4578 return elf_tdata (abfd)->program_header_size;
4579
4580 if (elf_tdata (abfd)->segment_map != NULL)
4581 {
4582 struct elf_segment_map *m;
4583
4584 segs = 0;
4585 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4586 ++segs;
4587 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4588 return elf_tdata (abfd)->program_header_size;
4589 }
4590
4591 /* Assume we will need exactly two PT_LOAD segments: one for text
4592 and one for data. */
4593 segs = 2;
4594
4595 s = bfd_get_section_by_name (abfd, ".interp");
4596 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4597 {
4598 /* If we have a loadable interpreter section, we need a
4599 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4600 PT_PHDR segment, although that may not be true for all
252b5132
RH
4601 targets. */
4602 segs += 2;
4603 }
4604
4605 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4606 {
4607 /* We need a PT_DYNAMIC segment. */
4608 ++segs;
4609 }
4610
126495ed 4611 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4612 {
4613 /* We need a PT_GNU_EH_FRAME segment. */
4614 ++segs;
4615 }
4616
9ee5e499
JJ
4617 if (elf_tdata (abfd)->stack_flags)
4618 {
4619 /* We need a PT_GNU_STACK segment. */
4620 ++segs;
4621 }
4622
8c37241b
JJ
4623 if (elf_tdata (abfd)->relro)
4624 {
4625 /* We need a PT_GNU_RELRO segment. */
4626 ++segs;
4627 }
4628
252b5132
RH
4629 for (s = abfd->sections; s != NULL; s = s->next)
4630 {
4631 if ((s->flags & SEC_LOAD) != 0
4632 && strncmp (s->name, ".note", 5) == 0)
4633 {
4634 /* We need a PT_NOTE segment. */
4635 ++segs;
4636 }
4637 }
4638
13ae64f3
JJ
4639 for (s = abfd->sections; s != NULL; s = s->next)
4640 {
4641 if (s->flags & SEC_THREAD_LOCAL)
4642 {
4643 /* We need a PT_TLS segment. */
4644 ++segs;
4645 break;
4646 }
4647 }
4648
252b5132
RH
4649 /* Let the backend count up any program headers it might need. */
4650 if (bed->elf_backend_additional_program_headers)
4651 {
4652 int a;
4653
4654 a = (*bed->elf_backend_additional_program_headers) (abfd);
4655 if (a == -1)
4656 abort ();
4657 segs += a;
4658 }
4659
4660 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4661 return elf_tdata (abfd)->program_header_size;
4662}
4663
4664/* Work out the file positions of all the sections. This is called by
4665 _bfd_elf_compute_section_file_positions. All the section sizes and
4666 VMAs must be known before this is called.
4667
e0638f70
AM
4668 Reloc sections come in two flavours: Those processed specially as
4669 "side-channel" data attached to a section to which they apply, and
4670 those that bfd doesn't process as relocations. The latter sort are
4671 stored in a normal bfd section by bfd_section_from_shdr. We don't
4672 consider the former sort here, unless they form part of the loadable
4673 image. Reloc sections not assigned here will be handled later by
4674 assign_file_positions_for_relocs.
252b5132
RH
4675
4676 We also don't set the positions of the .symtab and .strtab here. */
4677
b34976b6 4678static bfd_boolean
c84fca4d
AO
4679assign_file_positions_except_relocs (bfd *abfd,
4680 struct bfd_link_info *link_info)
252b5132
RH
4681{
4682 struct elf_obj_tdata * const tdata = elf_tdata (abfd);
4683 Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd);
4684 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
9ad5cbcf 4685 unsigned int num_sec = elf_numsections (abfd);
252b5132 4686 file_ptr off;
9c5bfbb7 4687 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4688
4689 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4690 && bfd_get_format (abfd) != bfd_core)
4691 {
4692 Elf_Internal_Shdr **hdrpp;
4693 unsigned int i;
4694
4695 /* Start after the ELF header. */
4696 off = i_ehdrp->e_ehsize;
4697
4698 /* We are not creating an executable, which means that we are
4699 not creating a program header, and that the actual order of
4700 the sections in the file is unimportant. */
9ad5cbcf 4701 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4702 {
4703 Elf_Internal_Shdr *hdr;
4704
4705 hdr = *hdrpp;
e0638f70
AM
4706 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4707 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4708 || i == tdata->symtab_section
4709 || i == tdata->symtab_shndx_section
252b5132
RH
4710 || i == tdata->strtab_section)
4711 {
4712 hdr->sh_offset = -1;
252b5132 4713 }
9ad5cbcf 4714 else
b34976b6 4715 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4716
9ad5cbcf
AM
4717 if (i == SHN_LORESERVE - 1)
4718 {
4719 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4720 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4721 }
252b5132
RH
4722 }
4723 }
4724 else
4725 {
4726 unsigned int i;
4727 Elf_Internal_Shdr **hdrpp;
4728
4729 /* Assign file positions for the loaded sections based on the
4730 assignment of sections to segments. */
c84fca4d 4731 if (! assign_file_positions_for_segments (abfd, link_info))
b34976b6 4732 return FALSE;
252b5132
RH
4733
4734 /* Assign file positions for the other sections. */
4735
4736 off = elf_tdata (abfd)->next_file_pos;
9ad5cbcf 4737 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4738 {
4739 Elf_Internal_Shdr *hdr;
4740
4741 hdr = *hdrpp;
4742 if (hdr->bfd_section != NULL
4743 && hdr->bfd_section->filepos != 0)
4744 hdr->sh_offset = hdr->bfd_section->filepos;
4745 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4746 {
4747 ((*_bfd_error_handler)
b301b248
AM
4748 (_("%B: warning: allocated section `%s' not in segment"),
4749 abfd,
252b5132
RH
4750 (hdr->bfd_section == NULL
4751 ? "*unknown*"
4752 : hdr->bfd_section->name)));
4753 if ((abfd->flags & D_PAGED) != 0)
340b6d91
AC
4754 off += vma_page_aligned_bias (hdr->sh_addr, off,
4755 bed->maxpagesize);
252b5132 4756 else
340b6d91
AC
4757 off += vma_page_aligned_bias (hdr->sh_addr, off,
4758 hdr->sh_addralign);
252b5132 4759 off = _bfd_elf_assign_file_position_for_section (hdr, off,
b34976b6 4760 FALSE);
252b5132 4761 }
e0638f70
AM
4762 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4763 && hdr->bfd_section == NULL)
252b5132 4764 || hdr == i_shdrpp[tdata->symtab_section]
9ad5cbcf 4765 || hdr == i_shdrpp[tdata->symtab_shndx_section]
252b5132
RH
4766 || hdr == i_shdrpp[tdata->strtab_section])
4767 hdr->sh_offset = -1;
4768 else
b34976b6 4769 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf
AM
4770
4771 if (i == SHN_LORESERVE - 1)
4772 {
4773 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4774 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4775 }
252b5132
RH
4776 }
4777 }
4778
4779 /* Place the section headers. */
45d6a902 4780 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4781 i_ehdrp->e_shoff = off;
4782 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4783
4784 elf_tdata (abfd)->next_file_pos = off;
4785
b34976b6 4786 return TRUE;
252b5132
RH
4787}
4788
b34976b6 4789static bfd_boolean
217aa764 4790prep_headers (bfd *abfd)
252b5132
RH
4791{
4792 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4793 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4794 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4795 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4796 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4797
4798 i_ehdrp = elf_elfheader (abfd);
4799 i_shdrp = elf_elfsections (abfd);
4800
2b0f7ef9 4801 shstrtab = _bfd_elf_strtab_init ();
252b5132 4802 if (shstrtab == NULL)
b34976b6 4803 return FALSE;
252b5132
RH
4804
4805 elf_shstrtab (abfd) = shstrtab;
4806
4807 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4808 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4809 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4810 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4811
4812 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4813 i_ehdrp->e_ident[EI_DATA] =
4814 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4815 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4816
252b5132
RH
4817 if ((abfd->flags & DYNAMIC) != 0)
4818 i_ehdrp->e_type = ET_DYN;
4819 else if ((abfd->flags & EXEC_P) != 0)
4820 i_ehdrp->e_type = ET_EXEC;
4821 else if (bfd_get_format (abfd) == bfd_core)
4822 i_ehdrp->e_type = ET_CORE;
4823 else
4824 i_ehdrp->e_type = ET_REL;
4825
4826 switch (bfd_get_arch (abfd))
4827 {
4828 case bfd_arch_unknown:
4829 i_ehdrp->e_machine = EM_NONE;
4830 break;
aa4f99bb
AO
4831
4832 /* There used to be a long list of cases here, each one setting
4833 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4834 in the corresponding bfd definition. To avoid duplication,
4835 the switch was removed. Machines that need special handling
4836 can generally do it in elf_backend_final_write_processing(),
4837 unless they need the information earlier than the final write.
4838 Such need can generally be supplied by replacing the tests for
4839 e_machine with the conditions used to determine it. */
252b5132 4840 default:
9c5bfbb7
AM
4841 i_ehdrp->e_machine = bed->elf_machine_code;
4842 }
aa4f99bb 4843
252b5132
RH
4844 i_ehdrp->e_version = bed->s->ev_current;
4845 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4846
c044fabd 4847 /* No program header, for now. */
252b5132
RH
4848 i_ehdrp->e_phoff = 0;
4849 i_ehdrp->e_phentsize = 0;
4850 i_ehdrp->e_phnum = 0;
4851
c044fabd 4852 /* Each bfd section is section header entry. */
252b5132
RH
4853 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4854 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4855
c044fabd 4856 /* If we're building an executable, we'll need a program header table. */
252b5132 4857 if (abfd->flags & EXEC_P)
0e71e495
BE
4858 /* It all happens later. */
4859 ;
252b5132
RH
4860 else
4861 {
4862 i_ehdrp->e_phentsize = 0;
4863 i_phdrp = 0;
4864 i_ehdrp->e_phoff = 0;
4865 }
4866
4867 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4868 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4869 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4870 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4871 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4872 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4873 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4874 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4875 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4876 return FALSE;
252b5132 4877
b34976b6 4878 return TRUE;
252b5132
RH
4879}
4880
4881/* Assign file positions for all the reloc sections which are not part
4882 of the loadable file image. */
4883
4884void
217aa764 4885_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4886{
4887 file_ptr off;
9ad5cbcf 4888 unsigned int i, num_sec;
252b5132
RH
4889 Elf_Internal_Shdr **shdrpp;
4890
4891 off = elf_tdata (abfd)->next_file_pos;
4892
9ad5cbcf
AM
4893 num_sec = elf_numsections (abfd);
4894 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4895 {
4896 Elf_Internal_Shdr *shdrp;
4897
4898 shdrp = *shdrpp;
4899 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4900 && shdrp->sh_offset == -1)
b34976b6 4901 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4902 }
4903
4904 elf_tdata (abfd)->next_file_pos = off;
4905}
4906
b34976b6 4907bfd_boolean
217aa764 4908_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4909{
9c5bfbb7 4910 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4911 Elf_Internal_Ehdr *i_ehdrp;
4912 Elf_Internal_Shdr **i_shdrp;
b34976b6 4913 bfd_boolean failed;
9ad5cbcf 4914 unsigned int count, num_sec;
252b5132
RH
4915
4916 if (! abfd->output_has_begun
217aa764 4917 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4918 return FALSE;
252b5132
RH
4919
4920 i_shdrp = elf_elfsections (abfd);
4921 i_ehdrp = elf_elfheader (abfd);
4922
b34976b6 4923 failed = FALSE;
252b5132
RH
4924 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4925 if (failed)
b34976b6 4926 return FALSE;
252b5132
RH
4927
4928 _bfd_elf_assign_file_positions_for_relocs (abfd);
4929
c044fabd 4930 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4931 num_sec = elf_numsections (abfd);
4932 for (count = 1; count < num_sec; count++)
252b5132
RH
4933 {
4934 if (bed->elf_backend_section_processing)
4935 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4936 if (i_shdrp[count]->contents)
4937 {
dc810e39
AM
4938 bfd_size_type amt = i_shdrp[count]->sh_size;
4939
252b5132 4940 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4941 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4942 return FALSE;
252b5132 4943 }
9ad5cbcf
AM
4944 if (count == SHN_LORESERVE - 1)
4945 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4946 }
4947
4948 /* Write out the section header names. */
26ae6d5e
DJ
4949 if (elf_shstrtab (abfd) != NULL
4950 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
4951 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4952 return FALSE;
252b5132
RH
4953
4954 if (bed->elf_backend_final_write_processing)
4955 (*bed->elf_backend_final_write_processing) (abfd,
4956 elf_tdata (abfd)->linker);
4957
4958 return bed->s->write_shdrs_and_ehdr (abfd);
4959}
4960
b34976b6 4961bfd_boolean
217aa764 4962_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4963{
c044fabd 4964 /* Hopefully this can be done just like an object file. */
252b5132
RH
4965 return _bfd_elf_write_object_contents (abfd);
4966}
c044fabd
KH
4967
4968/* Given a section, search the header to find them. */
4969
252b5132 4970int
198beae2 4971_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4972{
9c5bfbb7 4973 const struct elf_backend_data *bed;
252b5132 4974 int index;
252b5132 4975
9ad5cbcf
AM
4976 if (elf_section_data (asect) != NULL
4977 && elf_section_data (asect)->this_idx != 0)
4978 return elf_section_data (asect)->this_idx;
4979
4980 if (bfd_is_abs_section (asect))
af746e92
AM
4981 index = SHN_ABS;
4982 else if (bfd_is_com_section (asect))
4983 index = SHN_COMMON;
4984 else if (bfd_is_und_section (asect))
4985 index = SHN_UNDEF;
4986 else
6dc132d9 4987 index = -1;
252b5132 4988
af746e92 4989 bed = get_elf_backend_data (abfd);
252b5132
RH
4990 if (bed->elf_backend_section_from_bfd_section)
4991 {
af746e92 4992 int retval = index;
9ad5cbcf 4993
af746e92
AM
4994 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
4995 return retval;
252b5132
RH
4996 }
4997
af746e92
AM
4998 if (index == -1)
4999 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5000
af746e92 5001 return index;
252b5132
RH
5002}
5003
5004/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5005 on error. */
5006
5007int
217aa764 5008_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5009{
5010 asymbol *asym_ptr = *asym_ptr_ptr;
5011 int idx;
5012 flagword flags = asym_ptr->flags;
5013
5014 /* When gas creates relocations against local labels, it creates its
5015 own symbol for the section, but does put the symbol into the
5016 symbol chain, so udata is 0. When the linker is generating
5017 relocatable output, this section symbol may be for one of the
5018 input sections rather than the output section. */
5019 if (asym_ptr->udata.i == 0
5020 && (flags & BSF_SECTION_SYM)
5021 && asym_ptr->section)
5022 {
5023 int indx;
5024
5025 if (asym_ptr->section->output_section != NULL)
5026 indx = asym_ptr->section->output_section->index;
5027 else
5028 indx = asym_ptr->section->index;
4e89ac30
L
5029 if (indx < elf_num_section_syms (abfd)
5030 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5031 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5032 }
5033
5034 idx = asym_ptr->udata.i;
5035
5036 if (idx == 0)
5037 {
5038 /* This case can occur when using --strip-symbol on a symbol
5039 which is used in a relocation entry. */
5040 (*_bfd_error_handler)
d003868e
AM
5041 (_("%B: symbol `%s' required but not present"),
5042 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5043 bfd_set_error (bfd_error_no_symbols);
5044 return -1;
5045 }
5046
5047#if DEBUG & 4
5048 {
5049 fprintf (stderr,
661a3fd4 5050 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5051 (long) asym_ptr, asym_ptr->name, idx, flags,
5052 elf_symbol_flags (flags));
5053 fflush (stderr);
5054 }
5055#endif
5056
5057 return idx;
5058}
5059
5060/* Copy private BFD data. This copies any program header information. */
5061
b34976b6 5062static bfd_boolean
217aa764 5063copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132 5064{
b34976b6
AM
5065 Elf_Internal_Ehdr *iehdr;
5066 struct elf_segment_map *map;
5067 struct elf_segment_map *map_first;
5068 struct elf_segment_map **pointer_to_map;
5069 Elf_Internal_Phdr *segment;
5070 asection *section;
5071 unsigned int i;
5072 unsigned int num_segments;
5073 bfd_boolean phdr_included = FALSE;
5074 bfd_vma maxpagesize;
5075 struct elf_segment_map *phdr_adjust_seg = NULL;
5076 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5077 const struct elf_backend_data *bed;
bc67d8a6 5078
c044fabd 5079 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 5080 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5081 return TRUE;
252b5132
RH
5082
5083 if (elf_tdata (ibfd)->phdr == NULL)
b34976b6 5084 return TRUE;
252b5132 5085
caf47ea6 5086 bed = get_elf_backend_data (ibfd);
252b5132
RH
5087 iehdr = elf_elfheader (ibfd);
5088
bc67d8a6 5089 map_first = NULL;
c044fabd 5090 pointer_to_map = &map_first;
252b5132
RH
5091
5092 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5093 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5094
5095 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5096#define SEGMENT_END(segment, start) \
5097 (start + (segment->p_memsz > segment->p_filesz \
5098 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5099
eecdbe52
JJ
5100#define SECTION_SIZE(section, segment) \
5101 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5102 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5103 ? section->size : 0)
eecdbe52 5104
b34976b6 5105 /* Returns TRUE if the given section is contained within
bc67d8a6 5106 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5107#define IS_CONTAINED_BY_VMA(section, segment) \
5108 (section->vma >= segment->p_vaddr \
eecdbe52 5109 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5110 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5111
b34976b6 5112 /* Returns TRUE if the given section is contained within
bc67d8a6 5113 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5114#define IS_CONTAINED_BY_LMA(section, segment, base) \
5115 (section->lma >= base \
eecdbe52 5116 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5117 <= SEGMENT_END (segment, base)))
252b5132 5118
c044fabd 5119 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5120#define IS_COREFILE_NOTE(p, s) \
5121 (p->p_type == PT_NOTE \
5122 && bfd_get_format (ibfd) == bfd_core \
5123 && s->vma == 0 && s->lma == 0 \
5124 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5125 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5126 <= p->p_offset + p->p_filesz))
252b5132
RH
5127
5128 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5129 linker, which generates a PT_INTERP section with p_vaddr and
5130 p_memsz set to 0. */
aecc8f8a
AM
5131#define IS_SOLARIS_PT_INTERP(p, s) \
5132 (p->p_vaddr == 0 \
5133 && p->p_paddr == 0 \
5134 && p->p_memsz == 0 \
5135 && p->p_filesz > 0 \
5136 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5137 && s->size > 0 \
aecc8f8a 5138 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5139 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5140 <= p->p_offset + p->p_filesz))
5c440b1e 5141
bc67d8a6
NC
5142 /* Decide if the given section should be included in the given segment.
5143 A section will be included if:
f5ffc919
NC
5144 1. It is within the address space of the segment -- we use the LMA
5145 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5146 2. It is an allocated segment,
5147 3. There is an output section associated with it,
eecdbe52 5148 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5149 5. PT_GNU_STACK segments do not include any sections.
5150 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5151 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5152 8. PT_DYNAMIC should not contain empty sections at the beginning
5153 (with the possible exception of .dynamic). */
caf47ea6 5154#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5155 ((((segment->p_paddr \
5156 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5157 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5158 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5159 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5160 && section->output_section != NULL \
03394ac9 5161 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5162 && (segment->p_type != PT_TLS \
5163 || (section->flags & SEC_THREAD_LOCAL)) \
5164 && (segment->p_type == PT_LOAD \
5165 || segment->p_type == PT_TLS \
5166 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5167 && (segment->p_type != PT_DYNAMIC \
5168 || SECTION_SIZE (section, segment) > 0 \
5169 || (segment->p_paddr \
5170 ? segment->p_paddr != section->lma \
5171 : segment->p_vaddr != section->vma) \
5172 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5173 == 0)) \
82e51918 5174 && ! section->segment_mark)
bc67d8a6 5175
b34976b6 5176 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5177#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5178 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5179
5180 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5181 their VMA address ranges and their LMA address ranges overlap.
5182 It is possible to have overlapping VMA ranges without overlapping LMA
5183 ranges. RedBoot images for example can have both .data and .bss mapped
5184 to the same VMA range, but with the .data section mapped to a different
5185 LMA. */
aecc8f8a 5186#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5187 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5188 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5189 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5190 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5191
5192 /* Initialise the segment mark field. */
5193 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5194 section->segment_mark = FALSE;
bc67d8a6 5195
252b5132 5196 /* Scan through the segments specified in the program header
bc67d8a6 5197 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5198 in the loadable segments. These can be created by weird
aecc8f8a 5199 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5200 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5201 i < num_segments;
c044fabd 5202 i++, segment++)
252b5132 5203 {
252b5132 5204 unsigned int j;
c044fabd 5205 Elf_Internal_Phdr *segment2;
252b5132 5206
aecc8f8a
AM
5207 if (segment->p_type == PT_INTERP)
5208 for (section = ibfd->sections; section; section = section->next)
5209 if (IS_SOLARIS_PT_INTERP (segment, section))
5210 {
5211 /* Mininal change so that the normal section to segment
4cc11e76 5212 assignment code will work. */
aecc8f8a
AM
5213 segment->p_vaddr = section->vma;
5214 break;
5215 }
5216
bc67d8a6
NC
5217 if (segment->p_type != PT_LOAD)
5218 continue;
c044fabd 5219
bc67d8a6 5220 /* Determine if this segment overlaps any previous segments. */
c044fabd 5221 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5222 {
5223 bfd_signed_vma extra_length;
c044fabd 5224
bc67d8a6
NC
5225 if (segment2->p_type != PT_LOAD
5226 || ! SEGMENT_OVERLAPS (segment, segment2))
5227 continue;
c044fabd 5228
bc67d8a6
NC
5229 /* Merge the two segments together. */
5230 if (segment2->p_vaddr < segment->p_vaddr)
5231 {
c044fabd
KH
5232 /* Extend SEGMENT2 to include SEGMENT and then delete
5233 SEGMENT. */
bc67d8a6
NC
5234 extra_length =
5235 SEGMENT_END (segment, segment->p_vaddr)
5236 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5237
bc67d8a6
NC
5238 if (extra_length > 0)
5239 {
5240 segment2->p_memsz += extra_length;
5241 segment2->p_filesz += extra_length;
5242 }
c044fabd 5243
bc67d8a6 5244 segment->p_type = PT_NULL;
c044fabd 5245
bc67d8a6
NC
5246 /* Since we have deleted P we must restart the outer loop. */
5247 i = 0;
5248 segment = elf_tdata (ibfd)->phdr;
5249 break;
5250 }
5251 else
5252 {
c044fabd
KH
5253 /* Extend SEGMENT to include SEGMENT2 and then delete
5254 SEGMENT2. */
bc67d8a6
NC
5255 extra_length =
5256 SEGMENT_END (segment2, segment2->p_vaddr)
5257 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5258
bc67d8a6
NC
5259 if (extra_length > 0)
5260 {
5261 segment->p_memsz += extra_length;
5262 segment->p_filesz += extra_length;
5263 }
c044fabd 5264
bc67d8a6
NC
5265 segment2->p_type = PT_NULL;
5266 }
5267 }
5268 }
c044fabd 5269
bc67d8a6
NC
5270 /* The second scan attempts to assign sections to segments. */
5271 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5272 i < num_segments;
5273 i ++, segment ++)
5274 {
5275 unsigned int section_count;
5276 asection ** sections;
5277 asection * output_section;
5278 unsigned int isec;
5279 bfd_vma matching_lma;
5280 bfd_vma suggested_lma;
5281 unsigned int j;
dc810e39 5282 bfd_size_type amt;
bc67d8a6
NC
5283
5284 if (segment->p_type == PT_NULL)
5285 continue;
c044fabd 5286
bc67d8a6 5287 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5288 for (section = ibfd->sections, section_count = 0;
5289 section != NULL;
5290 section = section->next)
caf47ea6 5291 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5292 ++section_count;
811072d8 5293
b5f852ea
NC
5294 /* Allocate a segment map big enough to contain
5295 all of the sections we have selected. */
dc810e39
AM
5296 amt = sizeof (struct elf_segment_map);
5297 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5298 map = bfd_alloc (obfd, amt);
bc67d8a6 5299 if (map == NULL)
b34976b6 5300 return FALSE;
252b5132
RH
5301
5302 /* Initialise the fields of the segment map. Default to
5303 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5304 map->next = NULL;
5305 map->p_type = segment->p_type;
5306 map->p_flags = segment->p_flags;
5307 map->p_flags_valid = 1;
5308 map->p_paddr = segment->p_paddr;
5309 map->p_paddr_valid = 1;
252b5132
RH
5310
5311 /* Determine if this segment contains the ELF file header
5312 and if it contains the program headers themselves. */
bc67d8a6
NC
5313 map->includes_filehdr = (segment->p_offset == 0
5314 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5315
bc67d8a6 5316 map->includes_phdrs = 0;
252b5132 5317
bc67d8a6 5318 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5319 {
bc67d8a6
NC
5320 map->includes_phdrs =
5321 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5322 && (segment->p_offset + segment->p_filesz
252b5132
RH
5323 >= ((bfd_vma) iehdr->e_phoff
5324 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5325
bc67d8a6 5326 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5327 phdr_included = TRUE;
252b5132
RH
5328 }
5329
bc67d8a6 5330 if (section_count == 0)
252b5132
RH
5331 {
5332 /* Special segments, such as the PT_PHDR segment, may contain
5333 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5334 something. They are allowed by the ELF spec however, so only
5335 a warning is produced. */
bc67d8a6 5336 if (segment->p_type == PT_LOAD)
caf47ea6 5337 (*_bfd_error_handler)
d003868e
AM
5338 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5339 ibfd);
252b5132 5340
bc67d8a6 5341 map->count = 0;
c044fabd
KH
5342 *pointer_to_map = map;
5343 pointer_to_map = &map->next;
252b5132
RH
5344
5345 continue;
5346 }
5347
5348 /* Now scan the sections in the input BFD again and attempt
5349 to add their corresponding output sections to the segment map.
5350 The problem here is how to handle an output section which has
5351 been moved (ie had its LMA changed). There are four possibilities:
5352
5353 1. None of the sections have been moved.
5354 In this case we can continue to use the segment LMA from the
5355 input BFD.
5356
5357 2. All of the sections have been moved by the same amount.
5358 In this case we can change the segment's LMA to match the LMA
5359 of the first section.
5360
5361 3. Some of the sections have been moved, others have not.
5362 In this case those sections which have not been moved can be
5363 placed in the current segment which will have to have its size,
5364 and possibly its LMA changed, and a new segment or segments will
5365 have to be created to contain the other sections.
5366
b5f852ea 5367 4. The sections have been moved, but not by the same amount.
252b5132
RH
5368 In this case we can change the segment's LMA to match the LMA
5369 of the first section and we will have to create a new segment
5370 or segments to contain the other sections.
5371
5372 In order to save time, we allocate an array to hold the section
5373 pointers that we are interested in. As these sections get assigned
5374 to a segment, they are removed from this array. */
5375
0b14c2aa
L
5376 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5377 to work around this long long bug. */
5378 amt = section_count * sizeof (asection *);
217aa764 5379 sections = bfd_malloc (amt);
252b5132 5380 if (sections == NULL)
b34976b6 5381 return FALSE;
252b5132
RH
5382
5383 /* Step One: Scan for segment vs section LMA conflicts.
5384 Also add the sections to the section array allocated above.
5385 Also add the sections to the current segment. In the common
5386 case, where the sections have not been moved, this means that
5387 we have completely filled the segment, and there is nothing
5388 more to do. */
252b5132 5389 isec = 0;
72730e0c 5390 matching_lma = 0;
252b5132
RH
5391 suggested_lma = 0;
5392
bc67d8a6
NC
5393 for (j = 0, section = ibfd->sections;
5394 section != NULL;
5395 section = section->next)
252b5132 5396 {
caf47ea6 5397 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5398 {
bc67d8a6
NC
5399 output_section = section->output_section;
5400
5401 sections[j ++] = section;
252b5132
RH
5402
5403 /* The Solaris native linker always sets p_paddr to 0.
5404 We try to catch that case here, and set it to the
5e8d7549
NC
5405 correct value. Note - some backends require that
5406 p_paddr be left as zero. */
bc67d8a6 5407 if (segment->p_paddr == 0
4455705d 5408 && segment->p_vaddr != 0
5e8d7549 5409 && (! bed->want_p_paddr_set_to_zero)
252b5132 5410 && isec == 0
bc67d8a6
NC
5411 && output_section->lma != 0
5412 && (output_section->vma == (segment->p_vaddr
5413 + (map->includes_filehdr
5414 ? iehdr->e_ehsize
5415 : 0)
5416 + (map->includes_phdrs
079e9a2f
AM
5417 ? (iehdr->e_phnum
5418 * iehdr->e_phentsize)
bc67d8a6
NC
5419 : 0))))
5420 map->p_paddr = segment->p_vaddr;
252b5132
RH
5421
5422 /* Match up the physical address of the segment with the
5423 LMA address of the output section. */
bc67d8a6 5424 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5425 || IS_COREFILE_NOTE (segment, section)
5426 || (bed->want_p_paddr_set_to_zero &&
5427 IS_CONTAINED_BY_VMA (output_section, segment))
5428 )
252b5132
RH
5429 {
5430 if (matching_lma == 0)
bc67d8a6 5431 matching_lma = output_section->lma;
252b5132
RH
5432
5433 /* We assume that if the section fits within the segment
bc67d8a6 5434 then it does not overlap any other section within that
252b5132 5435 segment. */
bc67d8a6 5436 map->sections[isec ++] = output_section;
252b5132
RH
5437 }
5438 else if (suggested_lma == 0)
bc67d8a6 5439 suggested_lma = output_section->lma;
252b5132
RH
5440 }
5441 }
5442
bc67d8a6 5443 BFD_ASSERT (j == section_count);
252b5132
RH
5444
5445 /* Step Two: Adjust the physical address of the current segment,
5446 if necessary. */
bc67d8a6 5447 if (isec == section_count)
252b5132
RH
5448 {
5449 /* All of the sections fitted within the segment as currently
5450 specified. This is the default case. Add the segment to
5451 the list of built segments and carry on to process the next
5452 program header in the input BFD. */
bc67d8a6 5453 map->count = section_count;
c044fabd
KH
5454 *pointer_to_map = map;
5455 pointer_to_map = &map->next;
252b5132
RH
5456
5457 free (sections);
5458 continue;
5459 }
252b5132
RH
5460 else
5461 {
72730e0c
AM
5462 if (matching_lma != 0)
5463 {
5464 /* At least one section fits inside the current segment.
5465 Keep it, but modify its physical address to match the
5466 LMA of the first section that fitted. */
bc67d8a6 5467 map->p_paddr = matching_lma;
72730e0c
AM
5468 }
5469 else
5470 {
5471 /* None of the sections fitted inside the current segment.
5472 Change the current segment's physical address to match
5473 the LMA of the first section. */
bc67d8a6 5474 map->p_paddr = suggested_lma;
72730e0c
AM
5475 }
5476
bc67d8a6
NC
5477 /* Offset the segment physical address from the lma
5478 to allow for space taken up by elf headers. */
5479 if (map->includes_filehdr)
5480 map->p_paddr -= iehdr->e_ehsize;
252b5132 5481
bc67d8a6
NC
5482 if (map->includes_phdrs)
5483 {
5484 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5485
5486 /* iehdr->e_phnum is just an estimate of the number
5487 of program headers that we will need. Make a note
5488 here of the number we used and the segment we chose
5489 to hold these headers, so that we can adjust the
5490 offset when we know the correct value. */
5491 phdr_adjust_num = iehdr->e_phnum;
5492 phdr_adjust_seg = map;
5493 }
252b5132
RH
5494 }
5495
5496 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5497 those that fit to the current segment and removing them from the
252b5132
RH
5498 sections array; but making sure not to leave large gaps. Once all
5499 possible sections have been assigned to the current segment it is
5500 added to the list of built segments and if sections still remain
5501 to be assigned, a new segment is constructed before repeating
5502 the loop. */
5503 isec = 0;
5504 do
5505 {
bc67d8a6 5506 map->count = 0;
252b5132
RH
5507 suggested_lma = 0;
5508
5509 /* Fill the current segment with sections that fit. */
bc67d8a6 5510 for (j = 0; j < section_count; j++)
252b5132 5511 {
bc67d8a6 5512 section = sections[j];
252b5132 5513
bc67d8a6 5514 if (section == NULL)
252b5132
RH
5515 continue;
5516
bc67d8a6 5517 output_section = section->output_section;
252b5132 5518
bc67d8a6 5519 BFD_ASSERT (output_section != NULL);
c044fabd 5520
bc67d8a6
NC
5521 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5522 || IS_COREFILE_NOTE (segment, section))
252b5132 5523 {
bc67d8a6 5524 if (map->count == 0)
252b5132
RH
5525 {
5526 /* If the first section in a segment does not start at
bc67d8a6
NC
5527 the beginning of the segment, then something is
5528 wrong. */
5529 if (output_section->lma !=
5530 (map->p_paddr
5531 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5532 + (map->includes_phdrs
5533 ? iehdr->e_phnum * iehdr->e_phentsize
5534 : 0)))
252b5132
RH
5535 abort ();
5536 }
5537 else
5538 {
5539 asection * prev_sec;
252b5132 5540
bc67d8a6 5541 prev_sec = map->sections[map->count - 1];
252b5132
RH
5542
5543 /* If the gap between the end of the previous section
bc67d8a6
NC
5544 and the start of this section is more than
5545 maxpagesize then we need to start a new segment. */
eea6121a 5546 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5547 maxpagesize)
caf47ea6 5548 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5549 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5550 > output_section->lma))
252b5132
RH
5551 {
5552 if (suggested_lma == 0)
bc67d8a6 5553 suggested_lma = output_section->lma;
252b5132
RH
5554
5555 continue;
5556 }
5557 }
5558
bc67d8a6 5559 map->sections[map->count++] = output_section;
252b5132
RH
5560 ++isec;
5561 sections[j] = NULL;
b34976b6 5562 section->segment_mark = TRUE;
252b5132
RH
5563 }
5564 else if (suggested_lma == 0)
bc67d8a6 5565 suggested_lma = output_section->lma;
252b5132
RH
5566 }
5567
bc67d8a6 5568 BFD_ASSERT (map->count > 0);
252b5132
RH
5569
5570 /* Add the current segment to the list of built segments. */
c044fabd
KH
5571 *pointer_to_map = map;
5572 pointer_to_map = &map->next;
252b5132 5573
bc67d8a6 5574 if (isec < section_count)
252b5132
RH
5575 {
5576 /* We still have not allocated all of the sections to
5577 segments. Create a new segment here, initialise it
5578 and carry on looping. */
dc810e39
AM
5579 amt = sizeof (struct elf_segment_map);
5580 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5581 map = bfd_alloc (obfd, amt);
bc67d8a6 5582 if (map == NULL)
5ed6aba4
NC
5583 {
5584 free (sections);
5585 return FALSE;
5586 }
252b5132
RH
5587
5588 /* Initialise the fields of the segment map. Set the physical
5589 physical address to the LMA of the first section that has
5590 not yet been assigned. */
bc67d8a6
NC
5591 map->next = NULL;
5592 map->p_type = segment->p_type;
5593 map->p_flags = segment->p_flags;
5594 map->p_flags_valid = 1;
5595 map->p_paddr = suggested_lma;
5596 map->p_paddr_valid = 1;
5597 map->includes_filehdr = 0;
5598 map->includes_phdrs = 0;
252b5132
RH
5599 }
5600 }
bc67d8a6 5601 while (isec < section_count);
252b5132
RH
5602
5603 free (sections);
5604 }
5605
5606 /* The Solaris linker creates program headers in which all the
5607 p_paddr fields are zero. When we try to objcopy or strip such a
5608 file, we get confused. Check for this case, and if we find it
5609 reset the p_paddr_valid fields. */
bc67d8a6
NC
5610 for (map = map_first; map != NULL; map = map->next)
5611 if (map->p_paddr != 0)
252b5132 5612 break;
bc67d8a6 5613 if (map == NULL)
b5f852ea
NC
5614 for (map = map_first; map != NULL; map = map->next)
5615 map->p_paddr_valid = 0;
252b5132 5616
bc67d8a6
NC
5617 elf_tdata (obfd)->segment_map = map_first;
5618
5619 /* If we had to estimate the number of program headers that were
9ad5cbcf 5620 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5621 the offset if necessary. */
5622 if (phdr_adjust_seg != NULL)
5623 {
5624 unsigned int count;
c044fabd 5625
bc67d8a6 5626 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5627 count++;
252b5132 5628
bc67d8a6
NC
5629 if (count > phdr_adjust_num)
5630 phdr_adjust_seg->p_paddr
5631 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5632 }
c044fabd 5633
bc67d8a6 5634#undef SEGMENT_END
eecdbe52 5635#undef SECTION_SIZE
bc67d8a6
NC
5636#undef IS_CONTAINED_BY_VMA
5637#undef IS_CONTAINED_BY_LMA
252b5132 5638#undef IS_COREFILE_NOTE
bc67d8a6
NC
5639#undef IS_SOLARIS_PT_INTERP
5640#undef INCLUDE_SECTION_IN_SEGMENT
5641#undef SEGMENT_AFTER_SEGMENT
5642#undef SEGMENT_OVERLAPS
b34976b6 5643 return TRUE;
252b5132
RH
5644}
5645
5646/* Copy private section information. This copies over the entsize
5647 field, and sometimes the info field. */
5648
b34976b6 5649bfd_boolean
217aa764
AM
5650_bfd_elf_copy_private_section_data (bfd *ibfd,
5651 asection *isec,
5652 bfd *obfd,
5653 asection *osec)
252b5132
RH
5654{
5655 Elf_Internal_Shdr *ihdr, *ohdr;
5656
5657 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5658 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5659 return TRUE;
252b5132 5660
252b5132
RH
5661 ihdr = &elf_section_data (isec)->this_hdr;
5662 ohdr = &elf_section_data (osec)->this_hdr;
5663
5664 ohdr->sh_entsize = ihdr->sh_entsize;
5665
5666 if (ihdr->sh_type == SHT_SYMTAB
5667 || ihdr->sh_type == SHT_DYNSYM
5668 || ihdr->sh_type == SHT_GNU_verneed
5669 || ihdr->sh_type == SHT_GNU_verdef)
5670 ohdr->sh_info = ihdr->sh_info;
5671
9dce4196
AM
5672 /* Set things up for objcopy. The output SHT_GROUP section will
5673 have its elf_next_in_group pointing back to the input group
278d8f37
L
5674 members. Ignore linker created group section. See
5675 elfNN_ia64_object_p in elfxx-ia64.c. */
5676 if (elf_sec_group (isec) == NULL
5677 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5678 {
5679 elf_next_in_group (osec) = elf_next_in_group (isec);
5680 elf_group_name (osec) = elf_group_name (isec);
5681 }
9dce4196 5682
68bfbfcc 5683 osec->use_rela_p = isec->use_rela_p;
bf572ba0 5684
b34976b6 5685 return TRUE;
252b5132
RH
5686}
5687
80fccad2
BW
5688/* Copy private header information. */
5689
5690bfd_boolean
5691_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
5692{
5693 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5694 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5695 return TRUE;
5696
5697 /* Copy over private BFD data if it has not already been copied.
5698 This must be done here, rather than in the copy_private_bfd_data
5699 entry point, because the latter is called after the section
5700 contents have been set, which means that the program headers have
5701 already been worked out. */
5702 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
5703 {
5704 if (! copy_private_bfd_data (ibfd, obfd))
5705 return FALSE;
5706 }
5707
5708 return TRUE;
5709}
5710
252b5132
RH
5711/* Copy private symbol information. If this symbol is in a section
5712 which we did not map into a BFD section, try to map the section
5713 index correctly. We use special macro definitions for the mapped
5714 section indices; these definitions are interpreted by the
5715 swap_out_syms function. */
5716
9ad5cbcf
AM
5717#define MAP_ONESYMTAB (SHN_HIOS + 1)
5718#define MAP_DYNSYMTAB (SHN_HIOS + 2)
5719#define MAP_STRTAB (SHN_HIOS + 3)
5720#define MAP_SHSTRTAB (SHN_HIOS + 4)
5721#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 5722
b34976b6 5723bfd_boolean
217aa764
AM
5724_bfd_elf_copy_private_symbol_data (bfd *ibfd,
5725 asymbol *isymarg,
5726 bfd *obfd,
5727 asymbol *osymarg)
252b5132
RH
5728{
5729 elf_symbol_type *isym, *osym;
5730
5731 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5732 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5733 return TRUE;
252b5132
RH
5734
5735 isym = elf_symbol_from (ibfd, isymarg);
5736 osym = elf_symbol_from (obfd, osymarg);
5737
5738 if (isym != NULL
5739 && osym != NULL
5740 && bfd_is_abs_section (isym->symbol.section))
5741 {
5742 unsigned int shndx;
5743
5744 shndx = isym->internal_elf_sym.st_shndx;
5745 if (shndx == elf_onesymtab (ibfd))
5746 shndx = MAP_ONESYMTAB;
5747 else if (shndx == elf_dynsymtab (ibfd))
5748 shndx = MAP_DYNSYMTAB;
5749 else if (shndx == elf_tdata (ibfd)->strtab_section)
5750 shndx = MAP_STRTAB;
5751 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
5752 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
5753 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
5754 shndx = MAP_SYM_SHNDX;
252b5132
RH
5755 osym->internal_elf_sym.st_shndx = shndx;
5756 }
5757
b34976b6 5758 return TRUE;
252b5132
RH
5759}
5760
5761/* Swap out the symbols. */
5762
b34976b6 5763static bfd_boolean
217aa764
AM
5764swap_out_syms (bfd *abfd,
5765 struct bfd_strtab_hash **sttp,
5766 int relocatable_p)
252b5132 5767{
9c5bfbb7 5768 const struct elf_backend_data *bed;
079e9a2f
AM
5769 int symcount;
5770 asymbol **syms;
5771 struct bfd_strtab_hash *stt;
5772 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 5773 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 5774 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
5775 bfd_byte *outbound_syms;
5776 bfd_byte *outbound_shndx;
079e9a2f
AM
5777 int idx;
5778 bfd_size_type amt;
174fd7f9 5779 bfd_boolean name_local_sections;
252b5132
RH
5780
5781 if (!elf_map_symbols (abfd))
b34976b6 5782 return FALSE;
252b5132 5783
c044fabd 5784 /* Dump out the symtabs. */
079e9a2f
AM
5785 stt = _bfd_elf_stringtab_init ();
5786 if (stt == NULL)
b34976b6 5787 return FALSE;
252b5132 5788
079e9a2f
AM
5789 bed = get_elf_backend_data (abfd);
5790 symcount = bfd_get_symcount (abfd);
5791 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5792 symtab_hdr->sh_type = SHT_SYMTAB;
5793 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
5794 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
5795 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 5796 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
5797
5798 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5799 symstrtab_hdr->sh_type = SHT_STRTAB;
5800
5801 amt = (bfd_size_type) (1 + symcount) * bed->s->sizeof_sym;
5802 outbound_syms = bfd_alloc (abfd, amt);
5803 if (outbound_syms == NULL)
5ed6aba4
NC
5804 {
5805 _bfd_stringtab_free (stt);
5806 return FALSE;
5807 }
217aa764 5808 symtab_hdr->contents = outbound_syms;
252b5132 5809
9ad5cbcf
AM
5810 outbound_shndx = NULL;
5811 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5812 if (symtab_shndx_hdr->sh_name != 0)
5813 {
5814 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
1126897b 5815 outbound_shndx = bfd_zalloc (abfd, amt);
9ad5cbcf 5816 if (outbound_shndx == NULL)
5ed6aba4
NC
5817 {
5818 _bfd_stringtab_free (stt);
5819 return FALSE;
5820 }
5821
9ad5cbcf
AM
5822 symtab_shndx_hdr->contents = outbound_shndx;
5823 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5824 symtab_shndx_hdr->sh_size = amt;
5825 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5826 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5827 }
5828
589e6347 5829 /* Now generate the data (for "contents"). */
079e9a2f
AM
5830 {
5831 /* Fill in zeroth symbol and swap it out. */
5832 Elf_Internal_Sym sym;
5833 sym.st_name = 0;
5834 sym.st_value = 0;
5835 sym.st_size = 0;
5836 sym.st_info = 0;
5837 sym.st_other = 0;
5838 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 5839 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5840 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5841 if (outbound_shndx != NULL)
5842 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5843 }
252b5132 5844
174fd7f9
RS
5845 name_local_sections
5846 = (bed->elf_backend_name_local_section_symbols
5847 && bed->elf_backend_name_local_section_symbols (abfd));
5848
079e9a2f
AM
5849 syms = bfd_get_outsymbols (abfd);
5850 for (idx = 0; idx < symcount; idx++)
252b5132 5851 {
252b5132 5852 Elf_Internal_Sym sym;
079e9a2f
AM
5853 bfd_vma value = syms[idx]->value;
5854 elf_symbol_type *type_ptr;
5855 flagword flags = syms[idx]->flags;
5856 int type;
252b5132 5857
174fd7f9
RS
5858 if (!name_local_sections
5859 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
5860 {
5861 /* Local section symbols have no name. */
5862 sym.st_name = 0;
5863 }
5864 else
5865 {
5866 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
5867 syms[idx]->name,
b34976b6 5868 TRUE, FALSE);
079e9a2f 5869 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
5870 {
5871 _bfd_stringtab_free (stt);
5872 return FALSE;
5873 }
079e9a2f 5874 }
252b5132 5875
079e9a2f 5876 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 5877
079e9a2f
AM
5878 if ((flags & BSF_SECTION_SYM) == 0
5879 && bfd_is_com_section (syms[idx]->section))
5880 {
5881 /* ELF common symbols put the alignment into the `value' field,
5882 and the size into the `size' field. This is backwards from
5883 how BFD handles it, so reverse it here. */
5884 sym.st_size = value;
5885 if (type_ptr == NULL
5886 || type_ptr->internal_elf_sym.st_value == 0)
5887 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
5888 else
5889 sym.st_value = type_ptr->internal_elf_sym.st_value;
5890 sym.st_shndx = _bfd_elf_section_from_bfd_section
5891 (abfd, syms[idx]->section);
5892 }
5893 else
5894 {
5895 asection *sec = syms[idx]->section;
5896 int shndx;
252b5132 5897
079e9a2f
AM
5898 if (sec->output_section)
5899 {
5900 value += sec->output_offset;
5901 sec = sec->output_section;
5902 }
589e6347 5903
079e9a2f
AM
5904 /* Don't add in the section vma for relocatable output. */
5905 if (! relocatable_p)
5906 value += sec->vma;
5907 sym.st_value = value;
5908 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
5909
5910 if (bfd_is_abs_section (sec)
5911 && type_ptr != NULL
5912 && type_ptr->internal_elf_sym.st_shndx != 0)
5913 {
5914 /* This symbol is in a real ELF section which we did
5915 not create as a BFD section. Undo the mapping done
5916 by copy_private_symbol_data. */
5917 shndx = type_ptr->internal_elf_sym.st_shndx;
5918 switch (shndx)
5919 {
5920 case MAP_ONESYMTAB:
5921 shndx = elf_onesymtab (abfd);
5922 break;
5923 case MAP_DYNSYMTAB:
5924 shndx = elf_dynsymtab (abfd);
5925 break;
5926 case MAP_STRTAB:
5927 shndx = elf_tdata (abfd)->strtab_section;
5928 break;
5929 case MAP_SHSTRTAB:
5930 shndx = elf_tdata (abfd)->shstrtab_section;
5931 break;
9ad5cbcf
AM
5932 case MAP_SYM_SHNDX:
5933 shndx = elf_tdata (abfd)->symtab_shndx_section;
5934 break;
079e9a2f
AM
5935 default:
5936 break;
5937 }
5938 }
5939 else
5940 {
5941 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 5942
079e9a2f
AM
5943 if (shndx == -1)
5944 {
5945 asection *sec2;
5946
5947 /* Writing this would be a hell of a lot easier if
5948 we had some decent documentation on bfd, and
5949 knew what to expect of the library, and what to
5950 demand of applications. For example, it
5951 appears that `objcopy' might not set the
5952 section of a symbol to be a section that is
5953 actually in the output file. */
5954 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
5955 if (sec2 == NULL)
5956 {
5957 _bfd_error_handler (_("\
5958Unable to find equivalent output section for symbol '%s' from section '%s'"),
5959 syms[idx]->name ? syms[idx]->name : "<Local sym>",
5960 sec->name);
811072d8 5961 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 5962 _bfd_stringtab_free (stt);
589e6347
NC
5963 return FALSE;
5964 }
811072d8 5965
079e9a2f
AM
5966 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
5967 BFD_ASSERT (shndx != -1);
5968 }
5969 }
252b5132 5970
079e9a2f
AM
5971 sym.st_shndx = shndx;
5972 }
252b5132 5973
13ae64f3
JJ
5974 if ((flags & BSF_THREAD_LOCAL) != 0)
5975 type = STT_TLS;
5976 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
5977 type = STT_FUNC;
5978 else if ((flags & BSF_OBJECT) != 0)
5979 type = STT_OBJECT;
5980 else
5981 type = STT_NOTYPE;
252b5132 5982
13ae64f3
JJ
5983 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
5984 type = STT_TLS;
5985
589e6347 5986 /* Processor-specific types. */
079e9a2f
AM
5987 if (type_ptr != NULL
5988 && bed->elf_backend_get_symbol_type)
5989 type = ((*bed->elf_backend_get_symbol_type)
5990 (&type_ptr->internal_elf_sym, type));
252b5132 5991
079e9a2f
AM
5992 if (flags & BSF_SECTION_SYM)
5993 {
5994 if (flags & BSF_GLOBAL)
5995 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
5996 else
5997 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5998 }
5999 else if (bfd_is_com_section (syms[idx]->section))
6000 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
6001 else if (bfd_is_und_section (syms[idx]->section))
6002 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6003 ? STB_WEAK
6004 : STB_GLOBAL),
6005 type);
6006 else if (flags & BSF_FILE)
6007 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6008 else
6009 {
6010 int bind = STB_LOCAL;
252b5132 6011
079e9a2f
AM
6012 if (flags & BSF_LOCAL)
6013 bind = STB_LOCAL;
6014 else if (flags & BSF_WEAK)
6015 bind = STB_WEAK;
6016 else if (flags & BSF_GLOBAL)
6017 bind = STB_GLOBAL;
252b5132 6018
079e9a2f
AM
6019 sym.st_info = ELF_ST_INFO (bind, type);
6020 }
252b5132 6021
079e9a2f
AM
6022 if (type_ptr != NULL)
6023 sym.st_other = type_ptr->internal_elf_sym.st_other;
6024 else
6025 sym.st_other = 0;
252b5132 6026
9ad5cbcf 6027 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6028 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6029 if (outbound_shndx != NULL)
6030 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6031 }
252b5132 6032
079e9a2f
AM
6033 *sttp = stt;
6034 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6035 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6036
079e9a2f
AM
6037 symstrtab_hdr->sh_flags = 0;
6038 symstrtab_hdr->sh_addr = 0;
6039 symstrtab_hdr->sh_entsize = 0;
6040 symstrtab_hdr->sh_link = 0;
6041 symstrtab_hdr->sh_info = 0;
6042 symstrtab_hdr->sh_addralign = 1;
252b5132 6043
b34976b6 6044 return TRUE;
252b5132
RH
6045}
6046
6047/* Return the number of bytes required to hold the symtab vector.
6048
6049 Note that we base it on the count plus 1, since we will null terminate
6050 the vector allocated based on this size. However, the ELF symbol table
6051 always has a dummy entry as symbol #0, so it ends up even. */
6052
6053long
217aa764 6054_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6055{
6056 long symcount;
6057 long symtab_size;
6058 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6059
6060 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6061 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6062 if (symcount > 0)
6063 symtab_size -= sizeof (asymbol *);
252b5132
RH
6064
6065 return symtab_size;
6066}
6067
6068long
217aa764 6069_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6070{
6071 long symcount;
6072 long symtab_size;
6073 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6074
6075 if (elf_dynsymtab (abfd) == 0)
6076 {
6077 bfd_set_error (bfd_error_invalid_operation);
6078 return -1;
6079 }
6080
6081 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6082 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6083 if (symcount > 0)
6084 symtab_size -= sizeof (asymbol *);
252b5132
RH
6085
6086 return symtab_size;
6087}
6088
6089long
217aa764
AM
6090_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6091 sec_ptr asect)
252b5132
RH
6092{
6093 return (asect->reloc_count + 1) * sizeof (arelent *);
6094}
6095
6096/* Canonicalize the relocs. */
6097
6098long
217aa764
AM
6099_bfd_elf_canonicalize_reloc (bfd *abfd,
6100 sec_ptr section,
6101 arelent **relptr,
6102 asymbol **symbols)
252b5132
RH
6103{
6104 arelent *tblptr;
6105 unsigned int i;
9c5bfbb7 6106 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6107
b34976b6 6108 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6109 return -1;
6110
6111 tblptr = section->relocation;
6112 for (i = 0; i < section->reloc_count; i++)
6113 *relptr++ = tblptr++;
6114
6115 *relptr = NULL;
6116
6117 return section->reloc_count;
6118}
6119
6120long
6cee3f79 6121_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6122{
9c5bfbb7 6123 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6124 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6125
6126 if (symcount >= 0)
6127 bfd_get_symcount (abfd) = symcount;
6128 return symcount;
6129}
6130
6131long
217aa764
AM
6132_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6133 asymbol **allocation)
252b5132 6134{
9c5bfbb7 6135 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6136 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6137
6138 if (symcount >= 0)
6139 bfd_get_dynamic_symcount (abfd) = symcount;
6140 return symcount;
252b5132
RH
6141}
6142
8615f3f2
AM
6143/* Return the size required for the dynamic reloc entries. Any loadable
6144 section that was actually installed in the BFD, and has type SHT_REL
6145 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6146 dynamic reloc section. */
252b5132
RH
6147
6148long
217aa764 6149_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6150{
6151 long ret;
6152 asection *s;
6153
6154 if (elf_dynsymtab (abfd) == 0)
6155 {
6156 bfd_set_error (bfd_error_invalid_operation);
6157 return -1;
6158 }
6159
6160 ret = sizeof (arelent *);
6161 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6162 if ((s->flags & SEC_LOAD) != 0
6163 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6164 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6165 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6166 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6167 * sizeof (arelent *));
6168
6169 return ret;
6170}
6171
8615f3f2
AM
6172/* Canonicalize the dynamic relocation entries. Note that we return the
6173 dynamic relocations as a single block, although they are actually
6174 associated with particular sections; the interface, which was
6175 designed for SunOS style shared libraries, expects that there is only
6176 one set of dynamic relocs. Any loadable section that was actually
6177 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6178 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6179
6180long
217aa764
AM
6181_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6182 arelent **storage,
6183 asymbol **syms)
252b5132 6184{
217aa764 6185 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6186 asection *s;
6187 long ret;
6188
6189 if (elf_dynsymtab (abfd) == 0)
6190 {
6191 bfd_set_error (bfd_error_invalid_operation);
6192 return -1;
6193 }
6194
6195 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6196 ret = 0;
6197 for (s = abfd->sections; s != NULL; s = s->next)
6198 {
8615f3f2
AM
6199 if ((s->flags & SEC_LOAD) != 0
6200 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6201 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6202 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6203 {
6204 arelent *p;
6205 long count, i;
6206
b34976b6 6207 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6208 return -1;
eea6121a 6209 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6210 p = s->relocation;
6211 for (i = 0; i < count; i++)
6212 *storage++ = p++;
6213 ret += count;
6214 }
6215 }
6216
6217 *storage = NULL;
6218
6219 return ret;
6220}
6221\f
6222/* Read in the version information. */
6223
b34976b6 6224bfd_boolean
fc0e6df6 6225_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6226{
6227 bfd_byte *contents = NULL;
dc810e39 6228 bfd_size_type amt;
fc0e6df6
PB
6229 unsigned int freeidx = 0;
6230
6231 if (elf_dynverref (abfd) != 0)
6232 {
6233 Elf_Internal_Shdr *hdr;
6234 Elf_External_Verneed *everneed;
6235 Elf_Internal_Verneed *iverneed;
6236 unsigned int i;
6237
6238 hdr = &elf_tdata (abfd)->dynverref_hdr;
6239
6240 amt = (bfd_size_type) hdr->sh_info * sizeof (Elf_Internal_Verneed);
6241 elf_tdata (abfd)->verref = bfd_zalloc (abfd, amt);
6242 if (elf_tdata (abfd)->verref == NULL)
6243 goto error_return;
6244
6245 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6246
6247 contents = bfd_malloc (hdr->sh_size);
6248 if (contents == NULL)
6249 goto error_return;
6250 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6251 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
6252 goto error_return;
6253
6254 everneed = (Elf_External_Verneed *) contents;
6255 iverneed = elf_tdata (abfd)->verref;
6256 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6257 {
6258 Elf_External_Vernaux *evernaux;
6259 Elf_Internal_Vernaux *ivernaux;
6260 unsigned int j;
6261
6262 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6263
6264 iverneed->vn_bfd = abfd;
6265
6266 iverneed->vn_filename =
6267 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6268 iverneed->vn_file);
6269 if (iverneed->vn_filename == NULL)
6270 goto error_return;
6271
6272 amt = iverneed->vn_cnt;
6273 amt *= sizeof (Elf_Internal_Vernaux);
6274 iverneed->vn_auxptr = bfd_alloc (abfd, amt);
6275
6276 evernaux = ((Elf_External_Vernaux *)
6277 ((bfd_byte *) everneed + iverneed->vn_aux));
6278 ivernaux = iverneed->vn_auxptr;
6279 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6280 {
6281 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6282
6283 ivernaux->vna_nodename =
6284 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6285 ivernaux->vna_name);
6286 if (ivernaux->vna_nodename == NULL)
6287 goto error_return;
6288
6289 if (j + 1 < iverneed->vn_cnt)
6290 ivernaux->vna_nextptr = ivernaux + 1;
6291 else
6292 ivernaux->vna_nextptr = NULL;
6293
6294 evernaux = ((Elf_External_Vernaux *)
6295 ((bfd_byte *) evernaux + ivernaux->vna_next));
6296
6297 if (ivernaux->vna_other > freeidx)
6298 freeidx = ivernaux->vna_other;
6299 }
6300
6301 if (i + 1 < hdr->sh_info)
6302 iverneed->vn_nextref = iverneed + 1;
6303 else
6304 iverneed->vn_nextref = NULL;
6305
6306 everneed = ((Elf_External_Verneed *)
6307 ((bfd_byte *) everneed + iverneed->vn_next));
6308 }
6309
6310 free (contents);
6311 contents = NULL;
6312 }
252b5132
RH
6313
6314 if (elf_dynverdef (abfd) != 0)
6315 {
6316 Elf_Internal_Shdr *hdr;
6317 Elf_External_Verdef *everdef;
6318 Elf_Internal_Verdef *iverdef;
f631889e
UD
6319 Elf_Internal_Verdef *iverdefarr;
6320 Elf_Internal_Verdef iverdefmem;
252b5132 6321 unsigned int i;
062e2358 6322 unsigned int maxidx;
252b5132
RH
6323
6324 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6325
217aa764 6326 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6327 if (contents == NULL)
6328 goto error_return;
6329 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6330 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6331 goto error_return;
6332
f631889e
UD
6333 /* We know the number of entries in the section but not the maximum
6334 index. Therefore we have to run through all entries and find
6335 the maximum. */
252b5132 6336 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6337 maxidx = 0;
6338 for (i = 0; i < hdr->sh_info; ++i)
6339 {
6340 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6341
062e2358
AM
6342 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6343 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e
UD
6344
6345 everdef = ((Elf_External_Verdef *)
6346 ((bfd_byte *) everdef + iverdefmem.vd_next));
6347 }
6348
fc0e6df6
PB
6349 if (default_imported_symver)
6350 {
6351 if (freeidx > maxidx)
6352 maxidx = ++freeidx;
6353 else
6354 freeidx = ++maxidx;
6355 }
dc810e39 6356 amt = (bfd_size_type) maxidx * sizeof (Elf_Internal_Verdef);
217aa764 6357 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
f631889e
UD
6358 if (elf_tdata (abfd)->verdef == NULL)
6359 goto error_return;
6360
6361 elf_tdata (abfd)->cverdefs = maxidx;
6362
6363 everdef = (Elf_External_Verdef *) contents;
6364 iverdefarr = elf_tdata (abfd)->verdef;
6365 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6366 {
6367 Elf_External_Verdaux *everdaux;
6368 Elf_Internal_Verdaux *iverdaux;
6369 unsigned int j;
6370
f631889e
UD
6371 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6372
6373 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6374 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6375
6376 iverdef->vd_bfd = abfd;
6377
dc810e39 6378 amt = (bfd_size_type) iverdef->vd_cnt * sizeof (Elf_Internal_Verdaux);
217aa764 6379 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132
RH
6380 if (iverdef->vd_auxptr == NULL)
6381 goto error_return;
6382
6383 everdaux = ((Elf_External_Verdaux *)
6384 ((bfd_byte *) everdef + iverdef->vd_aux));
6385 iverdaux = iverdef->vd_auxptr;
6386 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6387 {
6388 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6389
6390 iverdaux->vda_nodename =
6391 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6392 iverdaux->vda_name);
6393 if (iverdaux->vda_nodename == NULL)
6394 goto error_return;
6395
6396 if (j + 1 < iverdef->vd_cnt)
6397 iverdaux->vda_nextptr = iverdaux + 1;
6398 else
6399 iverdaux->vda_nextptr = NULL;
6400
6401 everdaux = ((Elf_External_Verdaux *)
6402 ((bfd_byte *) everdaux + iverdaux->vda_next));
6403 }
6404
6405 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
6406
6407 if (i + 1 < hdr->sh_info)
6408 iverdef->vd_nextdef = iverdef + 1;
6409 else
6410 iverdef->vd_nextdef = NULL;
6411
6412 everdef = ((Elf_External_Verdef *)
6413 ((bfd_byte *) everdef + iverdef->vd_next));
6414 }
6415
6416 free (contents);
6417 contents = NULL;
6418 }
fc0e6df6 6419 else if (default_imported_symver)
252b5132 6420 {
fc0e6df6
PB
6421 if (freeidx < 3)
6422 freeidx = 3;
6423 else
6424 freeidx++;
252b5132 6425
fc0e6df6
PB
6426 amt = (bfd_size_type) freeidx * sizeof (Elf_Internal_Verdef);
6427 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
6428 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6429 goto error_return;
6430
fc0e6df6
PB
6431 elf_tdata (abfd)->cverdefs = freeidx;
6432 }
252b5132 6433
fc0e6df6
PB
6434 /* Create a default version based on the soname. */
6435 if (default_imported_symver)
6436 {
6437 Elf_Internal_Verdef *iverdef;
6438 Elf_Internal_Verdaux *iverdaux;
252b5132 6439
fc0e6df6 6440 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6441
fc0e6df6
PB
6442 iverdef->vd_version = VER_DEF_CURRENT;
6443 iverdef->vd_flags = 0;
6444 iverdef->vd_ndx = freeidx;
6445 iverdef->vd_cnt = 1;
252b5132 6446
fc0e6df6 6447 iverdef->vd_bfd = abfd;
252b5132 6448
fc0e6df6
PB
6449 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6450 if (iverdef->vd_nodename == NULL)
6451 goto error_return;
6452 iverdef->vd_nextdef = NULL;
6453 amt = (bfd_size_type) sizeof (Elf_Internal_Verdaux);
6454 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132 6455
fc0e6df6
PB
6456 iverdaux = iverdef->vd_auxptr;
6457 iverdaux->vda_nodename = iverdef->vd_nodename;
6458 iverdaux->vda_nextptr = NULL;
252b5132
RH
6459 }
6460
b34976b6 6461 return TRUE;
252b5132
RH
6462
6463 error_return:
5ed6aba4 6464 if (contents != NULL)
252b5132 6465 free (contents);
b34976b6 6466 return FALSE;
252b5132
RH
6467}
6468\f
6469asymbol *
217aa764 6470_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6471{
6472 elf_symbol_type *newsym;
dc810e39 6473 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6474
217aa764 6475 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6476 if (!newsym)
6477 return NULL;
6478 else
6479 {
6480 newsym->symbol.the_bfd = abfd;
6481 return &newsym->symbol;
6482 }
6483}
6484
6485void
217aa764
AM
6486_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6487 asymbol *symbol,
6488 symbol_info *ret)
252b5132
RH
6489{
6490 bfd_symbol_info (symbol, ret);
6491}
6492
6493/* Return whether a symbol name implies a local symbol. Most targets
6494 use this function for the is_local_label_name entry point, but some
6495 override it. */
6496
b34976b6 6497bfd_boolean
217aa764
AM
6498_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6499 const char *name)
252b5132
RH
6500{
6501 /* Normal local symbols start with ``.L''. */
6502 if (name[0] == '.' && name[1] == 'L')
b34976b6 6503 return TRUE;
252b5132
RH
6504
6505 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6506 DWARF debugging symbols starting with ``..''. */
6507 if (name[0] == '.' && name[1] == '.')
b34976b6 6508 return TRUE;
252b5132
RH
6509
6510 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6511 emitting DWARF debugging output. I suspect this is actually a
6512 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6513 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6514 underscore to be emitted on some ELF targets). For ease of use,
6515 we treat such symbols as local. */
6516 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6517 return TRUE;
252b5132 6518
b34976b6 6519 return FALSE;
252b5132
RH
6520}
6521
6522alent *
217aa764
AM
6523_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6524 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6525{
6526 abort ();
6527 return NULL;
6528}
6529
b34976b6 6530bfd_boolean
217aa764
AM
6531_bfd_elf_set_arch_mach (bfd *abfd,
6532 enum bfd_architecture arch,
6533 unsigned long machine)
252b5132
RH
6534{
6535 /* If this isn't the right architecture for this backend, and this
6536 isn't the generic backend, fail. */
6537 if (arch != get_elf_backend_data (abfd)->arch
6538 && arch != bfd_arch_unknown
6539 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6540 return FALSE;
252b5132
RH
6541
6542 return bfd_default_set_arch_mach (abfd, arch, machine);
6543}
6544
d1fad7c6
NC
6545/* Find the function to a particular section and offset,
6546 for error reporting. */
252b5132 6547
b34976b6 6548static bfd_boolean
217aa764
AM
6549elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6550 asection *section,
6551 asymbol **symbols,
6552 bfd_vma offset,
6553 const char **filename_ptr,
6554 const char **functionname_ptr)
252b5132 6555{
252b5132 6556 const char *filename;
57426232 6557 asymbol *func, *file;
252b5132
RH
6558 bfd_vma low_func;
6559 asymbol **p;
57426232
JB
6560 /* ??? Given multiple file symbols, it is impossible to reliably
6561 choose the right file name for global symbols. File symbols are
6562 local symbols, and thus all file symbols must sort before any
6563 global symbols. The ELF spec may be interpreted to say that a
6564 file symbol must sort before other local symbols, but currently
6565 ld -r doesn't do this. So, for ld -r output, it is possible to
6566 make a better choice of file name for local symbols by ignoring
6567 file symbols appearing after a given local symbol. */
6568 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6569
252b5132
RH
6570 filename = NULL;
6571 func = NULL;
57426232 6572 file = NULL;
252b5132 6573 low_func = 0;
57426232 6574 state = nothing_seen;
252b5132
RH
6575
6576 for (p = symbols; *p != NULL; p++)
6577 {
6578 elf_symbol_type *q;
6579
6580 q = (elf_symbol_type *) *p;
6581
252b5132
RH
6582 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6583 {
6584 default:
6585 break;
6586 case STT_FILE:
57426232
JB
6587 file = &q->symbol;
6588 if (state == symbol_seen)
6589 state = file_after_symbol_seen;
6590 continue;
6591 case STT_SECTION:
6592 continue;
252b5132
RH
6593 case STT_NOTYPE:
6594 case STT_FUNC:
6b40fcba 6595 if (bfd_get_section (&q->symbol) == section
252b5132
RH
6596 && q->symbol.value >= low_func
6597 && q->symbol.value <= offset)
6598 {
6599 func = (asymbol *) q;
6600 low_func = q->symbol.value;
57426232
JB
6601 if (file == NULL)
6602 filename = NULL;
6603 else if (ELF_ST_BIND (q->internal_elf_sym.st_info) != STB_LOCAL
6604 && state == file_after_symbol_seen)
6605 filename = NULL;
6606 else
6607 filename = bfd_asymbol_name (file);
252b5132
RH
6608 }
6609 break;
6610 }
57426232
JB
6611 if (state == nothing_seen)
6612 state = symbol_seen;
252b5132
RH
6613 }
6614
6615 if (func == NULL)
b34976b6 6616 return FALSE;
252b5132 6617
d1fad7c6
NC
6618 if (filename_ptr)
6619 *filename_ptr = filename;
6620 if (functionname_ptr)
6621 *functionname_ptr = bfd_asymbol_name (func);
6622
b34976b6 6623 return TRUE;
d1fad7c6
NC
6624}
6625
6626/* Find the nearest line to a particular section and offset,
6627 for error reporting. */
6628
b34976b6 6629bfd_boolean
217aa764
AM
6630_bfd_elf_find_nearest_line (bfd *abfd,
6631 asection *section,
6632 asymbol **symbols,
6633 bfd_vma offset,
6634 const char **filename_ptr,
6635 const char **functionname_ptr,
6636 unsigned int *line_ptr)
d1fad7c6 6637{
b34976b6 6638 bfd_boolean found;
d1fad7c6
NC
6639
6640 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6641 filename_ptr, functionname_ptr,
6642 line_ptr))
d1fad7c6
NC
6643 {
6644 if (!*functionname_ptr)
4e8a9624
AM
6645 elf_find_function (abfd, section, symbols, offset,
6646 *filename_ptr ? NULL : filename_ptr,
6647 functionname_ptr);
6648
b34976b6 6649 return TRUE;
d1fad7c6
NC
6650 }
6651
6652 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6653 filename_ptr, functionname_ptr,
6654 line_ptr, 0,
6655 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
6656 {
6657 if (!*functionname_ptr)
4e8a9624
AM
6658 elf_find_function (abfd, section, symbols, offset,
6659 *filename_ptr ? NULL : filename_ptr,
6660 functionname_ptr);
6661
b34976b6 6662 return TRUE;
d1fad7c6
NC
6663 }
6664
6665 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
6666 &found, filename_ptr,
6667 functionname_ptr, line_ptr,
6668 &elf_tdata (abfd)->line_info))
b34976b6 6669 return FALSE;
dc43ada5 6670 if (found && (*functionname_ptr || *line_ptr))
b34976b6 6671 return TRUE;
d1fad7c6
NC
6672
6673 if (symbols == NULL)
b34976b6 6674 return FALSE;
d1fad7c6
NC
6675
6676 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 6677 filename_ptr, functionname_ptr))
b34976b6 6678 return FALSE;
d1fad7c6 6679
252b5132 6680 *line_ptr = 0;
b34976b6 6681 return TRUE;
252b5132
RH
6682}
6683
5420f73d
L
6684/* Find the line for a symbol. */
6685
6686bfd_boolean
6687_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
6688 const char **filename_ptr, unsigned int *line_ptr)
6689{
6690 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
6691 filename_ptr, line_ptr, 0,
6692 &elf_tdata (abfd)->dwarf2_find_line_info);
6693}
6694
4ab527b0
FF
6695/* After a call to bfd_find_nearest_line, successive calls to
6696 bfd_find_inliner_info can be used to get source information about
6697 each level of function inlining that terminated at the address
6698 passed to bfd_find_nearest_line. Currently this is only supported
6699 for DWARF2 with appropriate DWARF3 extensions. */
6700
6701bfd_boolean
6702_bfd_elf_find_inliner_info (bfd *abfd,
6703 const char **filename_ptr,
6704 const char **functionname_ptr,
6705 unsigned int *line_ptr)
6706{
6707 bfd_boolean found;
6708 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
6709 functionname_ptr, line_ptr,
6710 & elf_tdata (abfd)->dwarf2_find_line_info);
6711 return found;
6712}
6713
252b5132 6714int
217aa764 6715_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
6716{
6717 int ret;
6718
6719 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
6720 if (! reloc)
6721 ret += get_program_header_size (abfd);
6722 return ret;
6723}
6724
b34976b6 6725bfd_boolean
217aa764
AM
6726_bfd_elf_set_section_contents (bfd *abfd,
6727 sec_ptr section,
0f867abe 6728 const void *location,
217aa764
AM
6729 file_ptr offset,
6730 bfd_size_type count)
252b5132
RH
6731{
6732 Elf_Internal_Shdr *hdr;
dc810e39 6733 bfd_signed_vma pos;
252b5132
RH
6734
6735 if (! abfd->output_has_begun
217aa764 6736 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6737 return FALSE;
252b5132
RH
6738
6739 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
6740 pos = hdr->sh_offset + offset;
6741 if (bfd_seek (abfd, pos, SEEK_SET) != 0
6742 || bfd_bwrite (location, count, abfd) != count)
b34976b6 6743 return FALSE;
252b5132 6744
b34976b6 6745 return TRUE;
252b5132
RH
6746}
6747
6748void
217aa764
AM
6749_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
6750 arelent *cache_ptr ATTRIBUTE_UNUSED,
6751 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
6752{
6753 abort ();
6754}
6755
252b5132
RH
6756/* Try to convert a non-ELF reloc into an ELF one. */
6757
b34976b6 6758bfd_boolean
217aa764 6759_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 6760{
c044fabd 6761 /* Check whether we really have an ELF howto. */
252b5132
RH
6762
6763 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
6764 {
6765 bfd_reloc_code_real_type code;
6766 reloc_howto_type *howto;
6767
6768 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 6769 equivalent ELF reloc. */
252b5132
RH
6770
6771 if (areloc->howto->pc_relative)
6772 {
6773 switch (areloc->howto->bitsize)
6774 {
6775 case 8:
6776 code = BFD_RELOC_8_PCREL;
6777 break;
6778 case 12:
6779 code = BFD_RELOC_12_PCREL;
6780 break;
6781 case 16:
6782 code = BFD_RELOC_16_PCREL;
6783 break;
6784 case 24:
6785 code = BFD_RELOC_24_PCREL;
6786 break;
6787 case 32:
6788 code = BFD_RELOC_32_PCREL;
6789 break;
6790 case 64:
6791 code = BFD_RELOC_64_PCREL;
6792 break;
6793 default:
6794 goto fail;
6795 }
6796
6797 howto = bfd_reloc_type_lookup (abfd, code);
6798
6799 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
6800 {
6801 if (howto->pcrel_offset)
6802 areloc->addend += areloc->address;
6803 else
6804 areloc->addend -= areloc->address; /* addend is unsigned!! */
6805 }
6806 }
6807 else
6808 {
6809 switch (areloc->howto->bitsize)
6810 {
6811 case 8:
6812 code = BFD_RELOC_8;
6813 break;
6814 case 14:
6815 code = BFD_RELOC_14;
6816 break;
6817 case 16:
6818 code = BFD_RELOC_16;
6819 break;
6820 case 26:
6821 code = BFD_RELOC_26;
6822 break;
6823 case 32:
6824 code = BFD_RELOC_32;
6825 break;
6826 case 64:
6827 code = BFD_RELOC_64;
6828 break;
6829 default:
6830 goto fail;
6831 }
6832
6833 howto = bfd_reloc_type_lookup (abfd, code);
6834 }
6835
6836 if (howto)
6837 areloc->howto = howto;
6838 else
6839 goto fail;
6840 }
6841
b34976b6 6842 return TRUE;
252b5132
RH
6843
6844 fail:
6845 (*_bfd_error_handler)
d003868e
AM
6846 (_("%B: unsupported relocation type %s"),
6847 abfd, areloc->howto->name);
252b5132 6848 bfd_set_error (bfd_error_bad_value);
b34976b6 6849 return FALSE;
252b5132
RH
6850}
6851
b34976b6 6852bfd_boolean
217aa764 6853_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
6854{
6855 if (bfd_get_format (abfd) == bfd_object)
6856 {
6857 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 6858 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 6859 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
6860 }
6861
6862 return _bfd_generic_close_and_cleanup (abfd);
6863}
6864
6865/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
6866 in the relocation's offset. Thus we cannot allow any sort of sanity
6867 range-checking to interfere. There is nothing else to do in processing
6868 this reloc. */
6869
6870bfd_reloc_status_type
217aa764
AM
6871_bfd_elf_rel_vtable_reloc_fn
6872 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 6873 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
6874 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
6875 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
6876{
6877 return bfd_reloc_ok;
6878}
252b5132
RH
6879\f
6880/* Elf core file support. Much of this only works on native
6881 toolchains, since we rely on knowing the
6882 machine-dependent procfs structure in order to pick
c044fabd 6883 out details about the corefile. */
252b5132
RH
6884
6885#ifdef HAVE_SYS_PROCFS_H
6886# include <sys/procfs.h>
6887#endif
6888
c044fabd 6889/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
6890
6891static int
217aa764 6892elfcore_make_pid (bfd *abfd)
252b5132
RH
6893{
6894 return ((elf_tdata (abfd)->core_lwpid << 16)
6895 + (elf_tdata (abfd)->core_pid));
6896}
6897
252b5132
RH
6898/* If there isn't a section called NAME, make one, using
6899 data from SECT. Note, this function will generate a
6900 reference to NAME, so you shouldn't deallocate or
c044fabd 6901 overwrite it. */
252b5132 6902
b34976b6 6903static bfd_boolean
217aa764 6904elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 6905{
c044fabd 6906 asection *sect2;
252b5132
RH
6907
6908 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 6909 return TRUE;
252b5132
RH
6910
6911 sect2 = bfd_make_section (abfd, name);
6912 if (sect2 == NULL)
b34976b6 6913 return FALSE;
252b5132 6914
eea6121a 6915 sect2->size = sect->size;
252b5132
RH
6916 sect2->filepos = sect->filepos;
6917 sect2->flags = sect->flags;
6918 sect2->alignment_power = sect->alignment_power;
b34976b6 6919 return TRUE;
252b5132
RH
6920}
6921
bb0082d6
AM
6922/* Create a pseudosection containing SIZE bytes at FILEPOS. This
6923 actually creates up to two pseudosections:
6924 - For the single-threaded case, a section named NAME, unless
6925 such a section already exists.
6926 - For the multi-threaded case, a section named "NAME/PID", where
6927 PID is elfcore_make_pid (abfd).
6928 Both pseudosections have identical contents. */
b34976b6 6929bfd_boolean
217aa764
AM
6930_bfd_elfcore_make_pseudosection (bfd *abfd,
6931 char *name,
6932 size_t size,
6933 ufile_ptr filepos)
bb0082d6
AM
6934{
6935 char buf[100];
6936 char *threaded_name;
d4c88bbb 6937 size_t len;
bb0082d6
AM
6938 asection *sect;
6939
6940 /* Build the section name. */
6941
6942 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 6943 len = strlen (buf) + 1;
217aa764 6944 threaded_name = bfd_alloc (abfd, len);
bb0082d6 6945 if (threaded_name == NULL)
b34976b6 6946 return FALSE;
d4c88bbb 6947 memcpy (threaded_name, buf, len);
bb0082d6 6948
62f3bb11 6949 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 6950 if (sect == NULL)
b34976b6 6951 return FALSE;
eea6121a 6952 sect->size = size;
bb0082d6
AM
6953 sect->filepos = filepos;
6954 sect->flags = SEC_HAS_CONTENTS;
6955 sect->alignment_power = 2;
6956
936e320b 6957 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
6958}
6959
252b5132 6960/* prstatus_t exists on:
4a938328 6961 solaris 2.5+
252b5132
RH
6962 linux 2.[01] + glibc
6963 unixware 4.2
6964*/
6965
6966#if defined (HAVE_PRSTATUS_T)
a7b97311 6967
b34976b6 6968static bfd_boolean
217aa764 6969elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 6970{
eea6121a 6971 size_t size;
7ee38065 6972 int offset;
252b5132 6973
4a938328
MS
6974 if (note->descsz == sizeof (prstatus_t))
6975 {
6976 prstatus_t prstat;
252b5132 6977
eea6121a 6978 size = sizeof (prstat.pr_reg);
7ee38065 6979 offset = offsetof (prstatus_t, pr_reg);
4a938328 6980 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 6981
fa49d224
NC
6982 /* Do not overwrite the core signal if it
6983 has already been set by another thread. */
6984 if (elf_tdata (abfd)->core_signal == 0)
6985 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 6986 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 6987
4a938328
MS
6988 /* pr_who exists on:
6989 solaris 2.5+
6990 unixware 4.2
6991 pr_who doesn't exist on:
6992 linux 2.[01]
6993 */
252b5132 6994#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 6995 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 6996#endif
4a938328 6997 }
7ee38065 6998#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
6999 else if (note->descsz == sizeof (prstatus32_t))
7000 {
7001 /* 64-bit host, 32-bit corefile */
7002 prstatus32_t prstat;
7003
eea6121a 7004 size = sizeof (prstat.pr_reg);
7ee38065 7005 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7006 memcpy (&prstat, note->descdata, sizeof (prstat));
7007
fa49d224
NC
7008 /* Do not overwrite the core signal if it
7009 has already been set by another thread. */
7010 if (elf_tdata (abfd)->core_signal == 0)
7011 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7012 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7013
7014 /* pr_who exists on:
7015 solaris 2.5+
7016 unixware 4.2
7017 pr_who doesn't exist on:
7018 linux 2.[01]
7019 */
7ee38065 7020#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7021 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7022#endif
7023 }
7ee38065 7024#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7025 else
7026 {
7027 /* Fail - we don't know how to handle any other
7028 note size (ie. data object type). */
b34976b6 7029 return TRUE;
4a938328 7030 }
252b5132 7031
bb0082d6 7032 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7033 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7034 size, note->descpos + offset);
252b5132
RH
7035}
7036#endif /* defined (HAVE_PRSTATUS_T) */
7037
bb0082d6 7038/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7039static bfd_boolean
217aa764
AM
7040elfcore_make_note_pseudosection (bfd *abfd,
7041 char *name,
7042 Elf_Internal_Note *note)
252b5132 7043{
936e320b
AM
7044 return _bfd_elfcore_make_pseudosection (abfd, name,
7045 note->descsz, note->descpos);
252b5132
RH
7046}
7047
ff08c6bb
JB
7048/* There isn't a consistent prfpregset_t across platforms,
7049 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7050 data structure apart. */
7051
b34976b6 7052static bfd_boolean
217aa764 7053elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7054{
7055 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7056}
7057
ff08c6bb
JB
7058/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7059 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7060 literally. */
c044fabd 7061
b34976b6 7062static bfd_boolean
217aa764 7063elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7064{
7065 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7066}
7067
252b5132 7068#if defined (HAVE_PRPSINFO_T)
4a938328 7069typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7070#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7071typedef prpsinfo32_t elfcore_psinfo32_t;
7072#endif
252b5132
RH
7073#endif
7074
7075#if defined (HAVE_PSINFO_T)
4a938328 7076typedef psinfo_t elfcore_psinfo_t;
7ee38065 7077#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7078typedef psinfo32_t elfcore_psinfo32_t;
7079#endif
252b5132
RH
7080#endif
7081
252b5132
RH
7082/* return a malloc'ed copy of a string at START which is at
7083 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7084 the copy will always have a terminating '\0'. */
252b5132 7085
936e320b 7086char *
217aa764 7087_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7088{
dc810e39 7089 char *dups;
c044fabd 7090 char *end = memchr (start, '\0', max);
dc810e39 7091 size_t len;
252b5132
RH
7092
7093 if (end == NULL)
7094 len = max;
7095 else
7096 len = end - start;
7097
217aa764 7098 dups = bfd_alloc (abfd, len + 1);
dc810e39 7099 if (dups == NULL)
252b5132
RH
7100 return NULL;
7101
dc810e39
AM
7102 memcpy (dups, start, len);
7103 dups[len] = '\0';
252b5132 7104
dc810e39 7105 return dups;
252b5132
RH
7106}
7107
bb0082d6 7108#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7109static bfd_boolean
217aa764 7110elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7111{
4a938328
MS
7112 if (note->descsz == sizeof (elfcore_psinfo_t))
7113 {
7114 elfcore_psinfo_t psinfo;
252b5132 7115
7ee38065 7116 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7117
4a938328 7118 elf_tdata (abfd)->core_program
936e320b
AM
7119 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7120 sizeof (psinfo.pr_fname));
252b5132 7121
4a938328 7122 elf_tdata (abfd)->core_command
936e320b
AM
7123 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7124 sizeof (psinfo.pr_psargs));
4a938328 7125 }
7ee38065 7126#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7127 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7128 {
7129 /* 64-bit host, 32-bit corefile */
7130 elfcore_psinfo32_t psinfo;
7131
7ee38065 7132 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7133
4a938328 7134 elf_tdata (abfd)->core_program
936e320b
AM
7135 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7136 sizeof (psinfo.pr_fname));
4a938328
MS
7137
7138 elf_tdata (abfd)->core_command
936e320b
AM
7139 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7140 sizeof (psinfo.pr_psargs));
4a938328
MS
7141 }
7142#endif
7143
7144 else
7145 {
7146 /* Fail - we don't know how to handle any other
7147 note size (ie. data object type). */
b34976b6 7148 return TRUE;
4a938328 7149 }
252b5132
RH
7150
7151 /* Note that for some reason, a spurious space is tacked
7152 onto the end of the args in some (at least one anyway)
c044fabd 7153 implementations, so strip it off if it exists. */
252b5132
RH
7154
7155 {
c044fabd 7156 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7157 int n = strlen (command);
7158
7159 if (0 < n && command[n - 1] == ' ')
7160 command[n - 1] = '\0';
7161 }
7162
b34976b6 7163 return TRUE;
252b5132
RH
7164}
7165#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7166
252b5132 7167#if defined (HAVE_PSTATUS_T)
b34976b6 7168static bfd_boolean
217aa764 7169elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7170{
f572a39d
AM
7171 if (note->descsz == sizeof (pstatus_t)
7172#if defined (HAVE_PXSTATUS_T)
7173 || note->descsz == sizeof (pxstatus_t)
7174#endif
7175 )
4a938328
MS
7176 {
7177 pstatus_t pstat;
252b5132 7178
4a938328 7179 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7180
4a938328
MS
7181 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7182 }
7ee38065 7183#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7184 else if (note->descsz == sizeof (pstatus32_t))
7185 {
7186 /* 64-bit host, 32-bit corefile */
7187 pstatus32_t pstat;
252b5132 7188
4a938328 7189 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7190
4a938328
MS
7191 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7192 }
7193#endif
252b5132
RH
7194 /* Could grab some more details from the "representative"
7195 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7196 NT_LWPSTATUS note, presumably. */
252b5132 7197
b34976b6 7198 return TRUE;
252b5132
RH
7199}
7200#endif /* defined (HAVE_PSTATUS_T) */
7201
252b5132 7202#if defined (HAVE_LWPSTATUS_T)
b34976b6 7203static bfd_boolean
217aa764 7204elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7205{
7206 lwpstatus_t lwpstat;
7207 char buf[100];
c044fabd 7208 char *name;
d4c88bbb 7209 size_t len;
c044fabd 7210 asection *sect;
252b5132 7211
f572a39d
AM
7212 if (note->descsz != sizeof (lwpstat)
7213#if defined (HAVE_LWPXSTATUS_T)
7214 && note->descsz != sizeof (lwpxstatus_t)
7215#endif
7216 )
b34976b6 7217 return TRUE;
252b5132
RH
7218
7219 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7220
7221 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7222 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7223
c044fabd 7224 /* Make a ".reg/999" section. */
252b5132
RH
7225
7226 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7227 len = strlen (buf) + 1;
217aa764 7228 name = bfd_alloc (abfd, len);
252b5132 7229 if (name == NULL)
b34976b6 7230 return FALSE;
d4c88bbb 7231 memcpy (name, buf, len);
252b5132 7232
62f3bb11 7233 sect = bfd_make_section_anyway (abfd, name);
252b5132 7234 if (sect == NULL)
b34976b6 7235 return FALSE;
252b5132
RH
7236
7237#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7238 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7239 sect->filepos = note->descpos
7240 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7241#endif
7242
7243#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7244 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7245 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7246#endif
7247
7248 sect->flags = SEC_HAS_CONTENTS;
7249 sect->alignment_power = 2;
7250
7251 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7252 return FALSE;
252b5132
RH
7253
7254 /* Make a ".reg2/999" section */
7255
7256 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7257 len = strlen (buf) + 1;
217aa764 7258 name = bfd_alloc (abfd, len);
252b5132 7259 if (name == NULL)
b34976b6 7260 return FALSE;
d4c88bbb 7261 memcpy (name, buf, len);
252b5132 7262
62f3bb11 7263 sect = bfd_make_section_anyway (abfd, name);
252b5132 7264 if (sect == NULL)
b34976b6 7265 return FALSE;
252b5132
RH
7266
7267#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7268 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7269 sect->filepos = note->descpos
7270 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7271#endif
7272
7273#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7274 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7275 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7276#endif
7277
7278 sect->flags = SEC_HAS_CONTENTS;
7279 sect->alignment_power = 2;
7280
936e320b 7281 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7282}
7283#endif /* defined (HAVE_LWPSTATUS_T) */
7284
16e9c715 7285#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7286static bfd_boolean
217aa764 7287elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7288{
7289 char buf[30];
c044fabd 7290 char *name;
d4c88bbb 7291 size_t len;
c044fabd 7292 asection *sect;
16e9c715
NC
7293 win32_pstatus_t pstatus;
7294
7295 if (note->descsz < sizeof (pstatus))
b34976b6 7296 return TRUE;
16e9c715 7297
e8eab623 7298 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7299
7300 switch (pstatus.data_type)
16e9c715
NC
7301 {
7302 case NOTE_INFO_PROCESS:
7303 /* FIXME: need to add ->core_command. */
7304 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7305 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7306 break;
16e9c715
NC
7307
7308 case NOTE_INFO_THREAD:
7309 /* Make a ".reg/999" section. */
1f170678 7310 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7311
d4c88bbb 7312 len = strlen (buf) + 1;
217aa764 7313 name = bfd_alloc (abfd, len);
16e9c715 7314 if (name == NULL)
b34976b6 7315 return FALSE;
c044fabd 7316
d4c88bbb 7317 memcpy (name, buf, len);
16e9c715 7318
62f3bb11 7319 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7320 if (sect == NULL)
b34976b6 7321 return FALSE;
c044fabd 7322
eea6121a 7323 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7324 sect->filepos = (note->descpos
7325 + offsetof (struct win32_pstatus,
7326 data.thread_info.thread_context));
16e9c715
NC
7327 sect->flags = SEC_HAS_CONTENTS;
7328 sect->alignment_power = 2;
7329
7330 if (pstatus.data.thread_info.is_active_thread)
7331 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7332 return FALSE;
16e9c715
NC
7333 break;
7334
7335 case NOTE_INFO_MODULE:
7336 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7337 sprintf (buf, ".module/%08lx",
7338 (long) pstatus.data.module_info.base_address);
c044fabd 7339
d4c88bbb 7340 len = strlen (buf) + 1;
217aa764 7341 name = bfd_alloc (abfd, len);
16e9c715 7342 if (name == NULL)
b34976b6 7343 return FALSE;
c044fabd 7344
d4c88bbb 7345 memcpy (name, buf, len);
252b5132 7346
62f3bb11 7347 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7348
16e9c715 7349 if (sect == NULL)
b34976b6 7350 return FALSE;
c044fabd 7351
eea6121a 7352 sect->size = note->descsz;
16e9c715
NC
7353 sect->filepos = note->descpos;
7354 sect->flags = SEC_HAS_CONTENTS;
7355 sect->alignment_power = 2;
7356 break;
7357
7358 default:
b34976b6 7359 return TRUE;
16e9c715
NC
7360 }
7361
b34976b6 7362 return TRUE;
16e9c715
NC
7363}
7364#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7365
b34976b6 7366static bfd_boolean
217aa764 7367elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7368{
9c5bfbb7 7369 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7370
252b5132
RH
7371 switch (note->type)
7372 {
7373 default:
b34976b6 7374 return TRUE;
252b5132 7375
252b5132 7376 case NT_PRSTATUS:
bb0082d6
AM
7377 if (bed->elf_backend_grok_prstatus)
7378 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7379 return TRUE;
bb0082d6 7380#if defined (HAVE_PRSTATUS_T)
252b5132 7381 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7382#else
b34976b6 7383 return TRUE;
252b5132
RH
7384#endif
7385
7386#if defined (HAVE_PSTATUS_T)
7387 case NT_PSTATUS:
7388 return elfcore_grok_pstatus (abfd, note);
7389#endif
7390
7391#if defined (HAVE_LWPSTATUS_T)
7392 case NT_LWPSTATUS:
7393 return elfcore_grok_lwpstatus (abfd, note);
7394#endif
7395
7396 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7397 return elfcore_grok_prfpreg (abfd, note);
7398
16e9c715 7399#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7400 case NT_WIN32PSTATUS:
16e9c715
NC
7401 return elfcore_grok_win32pstatus (abfd, note);
7402#endif
7403
c044fabd 7404 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7405 if (note->namesz == 6
7406 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7407 return elfcore_grok_prxfpreg (abfd, note);
7408 else
b34976b6 7409 return TRUE;
ff08c6bb 7410
252b5132
RH
7411 case NT_PRPSINFO:
7412 case NT_PSINFO:
bb0082d6
AM
7413 if (bed->elf_backend_grok_psinfo)
7414 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7415 return TRUE;
bb0082d6 7416#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7417 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7418#else
b34976b6 7419 return TRUE;
252b5132 7420#endif
3333a7c3
RM
7421
7422 case NT_AUXV:
7423 {
62f3bb11 7424 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7425
7426 if (sect == NULL)
7427 return FALSE;
eea6121a 7428 sect->size = note->descsz;
3333a7c3
RM
7429 sect->filepos = note->descpos;
7430 sect->flags = SEC_HAS_CONTENTS;
7431 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7432
7433 return TRUE;
7434 }
252b5132
RH
7435 }
7436}
7437
b34976b6 7438static bfd_boolean
217aa764 7439elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7440{
7441 char *cp;
7442
7443 cp = strchr (note->namedata, '@');
7444 if (cp != NULL)
7445 {
d2b64500 7446 *lwpidp = atoi(cp + 1);
b34976b6 7447 return TRUE;
50b2bdb7 7448 }
b34976b6 7449 return FALSE;
50b2bdb7
AM
7450}
7451
b34976b6 7452static bfd_boolean
217aa764 7453elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7454{
7455
7456 /* Signal number at offset 0x08. */
7457 elf_tdata (abfd)->core_signal
7458 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7459
7460 /* Process ID at offset 0x50. */
7461 elf_tdata (abfd)->core_pid
7462 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7463
7464 /* Command name at 0x7c (max 32 bytes, including nul). */
7465 elf_tdata (abfd)->core_command
7466 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7467
7720ba9f
MK
7468 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7469 note);
50b2bdb7
AM
7470}
7471
b34976b6 7472static bfd_boolean
217aa764 7473elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7474{
7475 int lwp;
7476
7477 if (elfcore_netbsd_get_lwpid (note, &lwp))
7478 elf_tdata (abfd)->core_lwpid = lwp;
7479
b4db1224 7480 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7481 {
7482 /* NetBSD-specific core "procinfo". Note that we expect to
7483 find this note before any of the others, which is fine,
7484 since the kernel writes this note out first when it
7485 creates a core file. */
47d9a591 7486
50b2bdb7
AM
7487 return elfcore_grok_netbsd_procinfo (abfd, note);
7488 }
7489
b4db1224
JT
7490 /* As of Jan 2002 there are no other machine-independent notes
7491 defined for NetBSD core files. If the note type is less
7492 than the start of the machine-dependent note types, we don't
7493 understand it. */
47d9a591 7494
b4db1224 7495 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7496 return TRUE;
50b2bdb7
AM
7497
7498
7499 switch (bfd_get_arch (abfd))
7500 {
7501 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7502 PT_GETFPREGS == mach+2. */
7503
7504 case bfd_arch_alpha:
7505 case bfd_arch_sparc:
7506 switch (note->type)
7507 {
b4db1224 7508 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7509 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7510
b4db1224 7511 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7512 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7513
7514 default:
b34976b6 7515 return TRUE;
50b2bdb7
AM
7516 }
7517
7518 /* On all other arch's, PT_GETREGS == mach+1 and
7519 PT_GETFPREGS == mach+3. */
7520
7521 default:
7522 switch (note->type)
7523 {
b4db1224 7524 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7525 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7526
b4db1224 7527 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7528 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7529
7530 default:
b34976b6 7531 return TRUE;
50b2bdb7
AM
7532 }
7533 }
7534 /* NOTREACHED */
7535}
7536
07c6e936 7537static bfd_boolean
217aa764 7538elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7539{
7540 void *ddata = note->descdata;
7541 char buf[100];
7542 char *name;
7543 asection *sect;
f8843e87
AM
7544 short sig;
7545 unsigned flags;
07c6e936
NC
7546
7547 /* nto_procfs_status 'pid' field is at offset 0. */
7548 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7549
f8843e87
AM
7550 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7551 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7552
7553 /* nto_procfs_status 'flags' field is at offset 8. */
7554 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7555
7556 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7557 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7558 {
7559 elf_tdata (abfd)->core_signal = sig;
7560 elf_tdata (abfd)->core_lwpid = *tid;
7561 }
07c6e936 7562
f8843e87
AM
7563 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7564 do not come from signals so we make sure we set the current
7565 thread just in case. */
7566 if (flags & 0x00000080)
7567 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7568
7569 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7570 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7571
217aa764 7572 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7573 if (name == NULL)
7574 return FALSE;
7575 strcpy (name, buf);
7576
62f3bb11 7577 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7578 if (sect == NULL)
7579 return FALSE;
7580
eea6121a 7581 sect->size = note->descsz;
07c6e936
NC
7582 sect->filepos = note->descpos;
7583 sect->flags = SEC_HAS_CONTENTS;
7584 sect->alignment_power = 2;
7585
7586 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7587}
7588
7589static bfd_boolean
d69f560c
KW
7590elfcore_grok_nto_regs (bfd *abfd,
7591 Elf_Internal_Note *note,
7592 pid_t tid,
7593 char *base)
07c6e936
NC
7594{
7595 char buf[100];
7596 char *name;
7597 asection *sect;
7598
d69f560c 7599 /* Make a "(base)/%d" section. */
7e7353ed 7600 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 7601
217aa764 7602 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7603 if (name == NULL)
7604 return FALSE;
7605 strcpy (name, buf);
7606
62f3bb11 7607 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7608 if (sect == NULL)
7609 return FALSE;
7610
eea6121a 7611 sect->size = note->descsz;
07c6e936
NC
7612 sect->filepos = note->descpos;
7613 sect->flags = SEC_HAS_CONTENTS;
7614 sect->alignment_power = 2;
7615
f8843e87
AM
7616 /* This is the current thread. */
7617 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 7618 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
7619
7620 return TRUE;
07c6e936
NC
7621}
7622
7623#define BFD_QNT_CORE_INFO 7
7624#define BFD_QNT_CORE_STATUS 8
7625#define BFD_QNT_CORE_GREG 9
7626#define BFD_QNT_CORE_FPREG 10
7627
7628static bfd_boolean
217aa764 7629elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
7630{
7631 /* Every GREG section has a STATUS section before it. Store the
811072d8 7632 tid from the previous call to pass down to the next gregs
07c6e936
NC
7633 function. */
7634 static pid_t tid = 1;
7635
7636 switch (note->type)
7637 {
d69f560c
KW
7638 case BFD_QNT_CORE_INFO:
7639 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
7640 case BFD_QNT_CORE_STATUS:
7641 return elfcore_grok_nto_status (abfd, note, &tid);
7642 case BFD_QNT_CORE_GREG:
7643 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
7644 case BFD_QNT_CORE_FPREG:
7645 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
7646 default:
7647 return TRUE;
07c6e936
NC
7648 }
7649}
7650
7c76fa91
MS
7651/* Function: elfcore_write_note
7652
47d9a591 7653 Inputs:
7c76fa91
MS
7654 buffer to hold note
7655 name of note
7656 type of note
7657 data for note
7658 size of data for note
7659
7660 Return:
7661 End of buffer containing note. */
7662
7663char *
217aa764
AM
7664elfcore_write_note (bfd *abfd,
7665 char *buf,
7666 int *bufsiz,
7667 const char *name,
7668 int type,
7669 const void *input,
7670 int size)
7c76fa91
MS
7671{
7672 Elf_External_Note *xnp;
d4c88bbb
AM
7673 size_t namesz;
7674 size_t pad;
7675 size_t newspace;
7c76fa91
MS
7676 char *p, *dest;
7677
d4c88bbb
AM
7678 namesz = 0;
7679 pad = 0;
7680 if (name != NULL)
7681 {
9c5bfbb7 7682 const struct elf_backend_data *bed;
d4c88bbb
AM
7683
7684 namesz = strlen (name) + 1;
7685 bed = get_elf_backend_data (abfd);
45d6a902 7686 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
7687 }
7688
5de3bf90 7689 newspace = 12 + namesz + pad + size;
d4c88bbb 7690
7c76fa91
MS
7691 p = realloc (buf, *bufsiz + newspace);
7692 dest = p + *bufsiz;
7693 *bufsiz += newspace;
7694 xnp = (Elf_External_Note *) dest;
7695 H_PUT_32 (abfd, namesz, xnp->namesz);
7696 H_PUT_32 (abfd, size, xnp->descsz);
7697 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
7698 dest = xnp->name;
7699 if (name != NULL)
7700 {
7701 memcpy (dest, name, namesz);
7702 dest += namesz;
7703 while (pad != 0)
7704 {
7705 *dest++ = '\0';
7706 --pad;
7707 }
7708 }
7709 memcpy (dest, input, size);
7c76fa91
MS
7710 return p;
7711}
7712
7713#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
7714char *
217aa764
AM
7715elfcore_write_prpsinfo (bfd *abfd,
7716 char *buf,
7717 int *bufsiz,
7718 const char *fname,
7719 const char *psargs)
7c76fa91
MS
7720{
7721 int note_type;
7722 char *note_name = "CORE";
7723
7724#if defined (HAVE_PSINFO_T)
7725 psinfo_t data;
7726 note_type = NT_PSINFO;
7727#else
7728 prpsinfo_t data;
7729 note_type = NT_PRPSINFO;
7730#endif
7731
7732 memset (&data, 0, sizeof (data));
7733 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
7734 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 7735 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7736 note_name, note_type, &data, sizeof (data));
7737}
7738#endif /* PSINFO_T or PRPSINFO_T */
7739
7740#if defined (HAVE_PRSTATUS_T)
7741char *
217aa764
AM
7742elfcore_write_prstatus (bfd *abfd,
7743 char *buf,
7744 int *bufsiz,
7745 long pid,
7746 int cursig,
7747 const void *gregs)
7c76fa91
MS
7748{
7749 prstatus_t prstat;
7750 char *note_name = "CORE";
7751
7752 memset (&prstat, 0, sizeof (prstat));
7753 prstat.pr_pid = pid;
7754 prstat.pr_cursig = cursig;
c106e334 7755 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 7756 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7757 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
7758}
7759#endif /* HAVE_PRSTATUS_T */
7760
51316059
MS
7761#if defined (HAVE_LWPSTATUS_T)
7762char *
217aa764
AM
7763elfcore_write_lwpstatus (bfd *abfd,
7764 char *buf,
7765 int *bufsiz,
7766 long pid,
7767 int cursig,
7768 const void *gregs)
51316059
MS
7769{
7770 lwpstatus_t lwpstat;
7771 char *note_name = "CORE";
7772
7773 memset (&lwpstat, 0, sizeof (lwpstat));
7774 lwpstat.pr_lwpid = pid >> 16;
7775 lwpstat.pr_cursig = cursig;
7776#if defined (HAVE_LWPSTATUS_T_PR_REG)
7777 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
7778#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
7779#if !defined(gregs)
7780 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
7781 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
7782#else
7783 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
7784 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
7785#endif
7786#endif
47d9a591 7787 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7788 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
7789}
7790#endif /* HAVE_LWPSTATUS_T */
7791
7c76fa91
MS
7792#if defined (HAVE_PSTATUS_T)
7793char *
217aa764
AM
7794elfcore_write_pstatus (bfd *abfd,
7795 char *buf,
7796 int *bufsiz,
7797 long pid,
7798 int cursig,
7799 const void *gregs)
7c76fa91
MS
7800{
7801 pstatus_t pstat;
7802 char *note_name = "CORE";
7803
51316059
MS
7804 memset (&pstat, 0, sizeof (pstat));
7805 pstat.pr_pid = pid & 0xffff;
47d9a591 7806 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7807 NT_PSTATUS, &pstat, sizeof (pstat));
7808 return buf;
7c76fa91
MS
7809}
7810#endif /* HAVE_PSTATUS_T */
7811
7812char *
217aa764
AM
7813elfcore_write_prfpreg (bfd *abfd,
7814 char *buf,
7815 int *bufsiz,
7816 const void *fpregs,
7817 int size)
7c76fa91
MS
7818{
7819 char *note_name = "CORE";
47d9a591 7820 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7821 note_name, NT_FPREGSET, fpregs, size);
7822}
7823
7824char *
217aa764
AM
7825elfcore_write_prxfpreg (bfd *abfd,
7826 char *buf,
7827 int *bufsiz,
7828 const void *xfpregs,
7829 int size)
7c76fa91
MS
7830{
7831 char *note_name = "LINUX";
47d9a591 7832 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7833 note_name, NT_PRXFPREG, xfpregs, size);
7834}
7835
b34976b6 7836static bfd_boolean
217aa764 7837elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 7838{
c044fabd
KH
7839 char *buf;
7840 char *p;
252b5132
RH
7841
7842 if (size <= 0)
b34976b6 7843 return TRUE;
252b5132 7844
dc810e39 7845 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 7846 return FALSE;
252b5132 7847
dc810e39 7848 buf = bfd_malloc (size);
252b5132 7849 if (buf == NULL)
b34976b6 7850 return FALSE;
252b5132 7851
dc810e39 7852 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
7853 {
7854 error:
7855 free (buf);
b34976b6 7856 return FALSE;
252b5132
RH
7857 }
7858
7859 p = buf;
7860 while (p < buf + size)
7861 {
c044fabd
KH
7862 /* FIXME: bad alignment assumption. */
7863 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
7864 Elf_Internal_Note in;
7865
dc810e39 7866 in.type = H_GET_32 (abfd, xnp->type);
252b5132 7867
dc810e39 7868 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
7869 in.namedata = xnp->name;
7870
dc810e39 7871 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
7872 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
7873 in.descpos = offset + (in.descdata - buf);
7874
50b2bdb7
AM
7875 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
7876 {
7877 if (! elfcore_grok_netbsd_note (abfd, &in))
7878 goto error;
7879 }
07c6e936
NC
7880 else if (strncmp (in.namedata, "QNX", 3) == 0)
7881 {
7882 if (! elfcore_grok_nto_note (abfd, &in))
7883 goto error;
7884 }
50b2bdb7
AM
7885 else
7886 {
7887 if (! elfcore_grok_note (abfd, &in))
7888 goto error;
7889 }
252b5132
RH
7890
7891 p = in.descdata + BFD_ALIGN (in.descsz, 4);
7892 }
7893
7894 free (buf);
b34976b6 7895 return TRUE;
252b5132 7896}
98d8431c
JB
7897\f
7898/* Providing external access to the ELF program header table. */
7899
7900/* Return an upper bound on the number of bytes required to store a
7901 copy of ABFD's program header table entries. Return -1 if an error
7902 occurs; bfd_get_error will return an appropriate code. */
c044fabd 7903
98d8431c 7904long
217aa764 7905bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
7906{
7907 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7908 {
7909 bfd_set_error (bfd_error_wrong_format);
7910 return -1;
7911 }
7912
936e320b 7913 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
7914}
7915
98d8431c
JB
7916/* Copy ABFD's program header table entries to *PHDRS. The entries
7917 will be stored as an array of Elf_Internal_Phdr structures, as
7918 defined in include/elf/internal.h. To find out how large the
7919 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
7920
7921 Return the number of program header table entries read, or -1 if an
7922 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 7923
98d8431c 7924int
217aa764 7925bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
7926{
7927 int num_phdrs;
7928
7929 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7930 {
7931 bfd_set_error (bfd_error_wrong_format);
7932 return -1;
7933 }
7934
7935 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 7936 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
7937 num_phdrs * sizeof (Elf_Internal_Phdr));
7938
7939 return num_phdrs;
7940}
ae4221d7
L
7941
7942void
217aa764 7943_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 7944{
d3b05f8d 7945#ifdef BFD64
ae4221d7
L
7946 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7947
7948 i_ehdrp = elf_elfheader (abfd);
7949 if (i_ehdrp == NULL)
7950 sprintf_vma (buf, value);
7951 else
7952 {
7953 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7954 {
ae4221d7 7955#if BFD_HOST_64BIT_LONG
cc55aec9 7956 sprintf (buf, "%016lx", value);
ae4221d7 7957#else
cc55aec9
AM
7958 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
7959 _bfd_int64_low (value));
ae4221d7 7960#endif
cc55aec9 7961 }
ae4221d7
L
7962 else
7963 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
7964 }
d3b05f8d
L
7965#else
7966 sprintf_vma (buf, value);
7967#endif
ae4221d7
L
7968}
7969
7970void
217aa764 7971_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 7972{
d3b05f8d 7973#ifdef BFD64
ae4221d7
L
7974 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7975
7976 i_ehdrp = elf_elfheader (abfd);
7977 if (i_ehdrp == NULL)
7978 fprintf_vma ((FILE *) stream, value);
7979 else
7980 {
7981 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7982 {
ae4221d7 7983#if BFD_HOST_64BIT_LONG
cc55aec9 7984 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 7985#else
cc55aec9
AM
7986 fprintf ((FILE *) stream, "%08lx%08lx",
7987 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 7988#endif
cc55aec9 7989 }
ae4221d7
L
7990 else
7991 fprintf ((FILE *) stream, "%08lx",
7992 (unsigned long) (value & 0xffffffff));
7993 }
d3b05f8d
L
7994#else
7995 fprintf_vma ((FILE *) stream, value);
7996#endif
ae4221d7 7997}
db6751f2
JJ
7998
7999enum elf_reloc_type_class
217aa764 8000_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8001{
8002 return reloc_class_normal;
8003}
f8df10f4 8004
47d9a591 8005/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8006 relocation against a local symbol. */
8007
8008bfd_vma
217aa764
AM
8009_bfd_elf_rela_local_sym (bfd *abfd,
8010 Elf_Internal_Sym *sym,
8517fae7 8011 asection **psec,
217aa764 8012 Elf_Internal_Rela *rel)
f8df10f4 8013{
8517fae7 8014 asection *sec = *psec;
f8df10f4
JJ
8015 bfd_vma relocation;
8016
8017 relocation = (sec->output_section->vma
8018 + sec->output_offset
8019 + sym->st_value);
8020 if ((sec->flags & SEC_MERGE)
c629eae0 8021 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8022 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8023 {
f8df10f4 8024 rel->r_addend =
8517fae7 8025 _bfd_merged_section_offset (abfd, psec,
65765700 8026 elf_section_data (sec)->sec_info,
753731ee
AM
8027 sym->st_value + rel->r_addend);
8028 if (sec != *psec)
8029 {
8030 /* If we have changed the section, and our original section is
8031 marked with SEC_EXCLUDE, it means that the original
8032 SEC_MERGE section has been completely subsumed in some
8033 other SEC_MERGE section. In this case, we need to leave
8034 some info around for --emit-relocs. */
8035 if ((sec->flags & SEC_EXCLUDE) != 0)
8036 sec->kept_section = *psec;
8037 sec = *psec;
8038 }
8517fae7
AM
8039 rel->r_addend -= relocation;
8040 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8041 }
8042 return relocation;
8043}
c629eae0
JJ
8044
8045bfd_vma
217aa764
AM
8046_bfd_elf_rel_local_sym (bfd *abfd,
8047 Elf_Internal_Sym *sym,
8048 asection **psec,
8049 bfd_vma addend)
47d9a591 8050{
c629eae0
JJ
8051 asection *sec = *psec;
8052
68bfbfcc 8053 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8054 return sym->st_value + addend;
8055
8056 return _bfd_merged_section_offset (abfd, psec,
65765700 8057 elf_section_data (sec)->sec_info,
753731ee 8058 sym->st_value + addend);
c629eae0
JJ
8059}
8060
8061bfd_vma
217aa764 8062_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8063 struct bfd_link_info *info,
217aa764
AM
8064 asection *sec,
8065 bfd_vma offset)
c629eae0 8066{
68bfbfcc 8067 switch (sec->sec_info_type)
65765700
JJ
8068 {
8069 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8070 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8071 offset);
65765700 8072 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8073 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8074 default:
8075 return offset;
8076 }
c629eae0 8077}
3333a7c3
RM
8078\f
8079/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8080 reconstruct an ELF file by reading the segments out of remote memory
8081 based on the ELF file header at EHDR_VMA and the ELF program headers it
8082 points to. If not null, *LOADBASEP is filled in with the difference
8083 between the VMAs from which the segments were read, and the VMAs the
8084 file headers (and hence BFD's idea of each section's VMA) put them at.
8085
8086 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8087 remote memory at target address VMA into the local buffer at MYADDR; it
8088 should return zero on success or an `errno' code on failure. TEMPL must
8089 be a BFD for an ELF target with the word size and byte order found in
8090 the remote memory. */
8091
8092bfd *
217aa764
AM
8093bfd_elf_bfd_from_remote_memory
8094 (bfd *templ,
8095 bfd_vma ehdr_vma,
8096 bfd_vma *loadbasep,
f075ee0c 8097 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8098{
8099 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8100 (templ, ehdr_vma, loadbasep, target_read_memory);
8101}
4c45e5c9
JJ
8102\f
8103long
c9727e01
AM
8104_bfd_elf_get_synthetic_symtab (bfd *abfd,
8105 long symcount ATTRIBUTE_UNUSED,
8106 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8107 long dynsymcount,
c9727e01
AM
8108 asymbol **dynsyms,
8109 asymbol **ret)
4c45e5c9
JJ
8110{
8111 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8112 asection *relplt;
8113 asymbol *s;
8114 const char *relplt_name;
8115 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8116 arelent *p;
8117 long count, i, n;
8118 size_t size;
8119 Elf_Internal_Shdr *hdr;
8120 char *names;
8121 asection *plt;
8122
8615f3f2
AM
8123 *ret = NULL;
8124
90e3cdf2
JJ
8125 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8126 return 0;
8127
8615f3f2
AM
8128 if (dynsymcount <= 0)
8129 return 0;
8130
4c45e5c9
JJ
8131 if (!bed->plt_sym_val)
8132 return 0;
8133
8134 relplt_name = bed->relplt_name;
8135 if (relplt_name == NULL)
8136 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8137 relplt = bfd_get_section_by_name (abfd, relplt_name);
8138 if (relplt == NULL)
8139 return 0;
8140
8141 hdr = &elf_section_data (relplt)->this_hdr;
8142 if (hdr->sh_link != elf_dynsymtab (abfd)
8143 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8144 return 0;
8145
8146 plt = bfd_get_section_by_name (abfd, ".plt");
8147 if (plt == NULL)
8148 return 0;
8149
8150 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8151 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8152 return -1;
8153
eea6121a 8154 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8155 size = count * sizeof (asymbol);
8156 p = relplt->relocation;
8157 for (i = 0; i < count; i++, s++, p++)
8158 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8159
8160 s = *ret = bfd_malloc (size);
8161 if (s == NULL)
8162 return -1;
8163
8164 names = (char *) (s + count);
8165 p = relplt->relocation;
8166 n = 0;
8167 for (i = 0; i < count; i++, s++, p++)
8168 {
8169 size_t len;
8170 bfd_vma addr;
8171
8172 addr = bed->plt_sym_val (i, plt, p);
8173 if (addr == (bfd_vma) -1)
8174 continue;
8175
8176 *s = **p->sym_ptr_ptr;
8177 s->section = plt;
8178 s->value = addr - plt->vma;
8179 s->name = names;
8180 len = strlen ((*p->sym_ptr_ptr)->name);
8181 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8182 names += len;
8183 memcpy (names, "@plt", sizeof ("@plt"));
8184 names += sizeof ("@plt");
8185 ++n;
8186 }
8187
8188 return n;
8189}
3d7f7666
L
8190
8191/* Sort symbol by binding and section. We want to put definitions
8192 sorted by section at the beginning. */
8193
8194static int
8195elf_sort_elf_symbol (const void *arg1, const void *arg2)
8196{
8197 const Elf_Internal_Sym *s1;
8198 const Elf_Internal_Sym *s2;
8199 int shndx;
8200
8201 /* Make sure that undefined symbols are at the end. */
8202 s1 = (const Elf_Internal_Sym *) arg1;
8203 if (s1->st_shndx == SHN_UNDEF)
8204 return 1;
8205 s2 = (const Elf_Internal_Sym *) arg2;
8206 if (s2->st_shndx == SHN_UNDEF)
8207 return -1;
8208
8209 /* Sorted by section index. */
8210 shndx = s1->st_shndx - s2->st_shndx;
8211 if (shndx != 0)
8212 return shndx;
8213
8214 /* Sorted by binding. */
8215 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8216}
8217
8218struct elf_symbol
8219{
8220 Elf_Internal_Sym *sym;
8221 const char *name;
8222};
8223
8224static int
8225elf_sym_name_compare (const void *arg1, const void *arg2)
8226{
8227 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8228 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8229 return strcmp (s1->name, s2->name);
8230}
8231
8232/* Check if 2 sections define the same set of local and global
8233 symbols. */
8234
8235bfd_boolean
8236bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8237{
8238 bfd *bfd1, *bfd2;
8239 const struct elf_backend_data *bed1, *bed2;
8240 Elf_Internal_Shdr *hdr1, *hdr2;
8241 bfd_size_type symcount1, symcount2;
8242 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8243 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8244 Elf_Internal_Sym *isymend;
8245 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8246 bfd_size_type count1, count2, i;
8247 int shndx1, shndx2;
8248 bfd_boolean result;
8249
8250 bfd1 = sec1->owner;
8251 bfd2 = sec2->owner;
8252
8253 /* If both are .gnu.linkonce sections, they have to have the same
8254 section name. */
8255 if (strncmp (sec1->name, ".gnu.linkonce",
8256 sizeof ".gnu.linkonce" - 1) == 0
8257 && strncmp (sec2->name, ".gnu.linkonce",
8258 sizeof ".gnu.linkonce" - 1) == 0)
8259 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8260 sec2->name + sizeof ".gnu.linkonce") == 0;
8261
8262 /* Both sections have to be in ELF. */
8263 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8264 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8265 return FALSE;
8266
8267 if (elf_section_type (sec1) != elf_section_type (sec2))
8268 return FALSE;
8269
8270 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8271 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8272 {
8273 /* If both are members of section groups, they have to have the
8274 same group name. */
8275 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8276 return FALSE;
8277 }
8278
8279 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8280 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8281 if (shndx1 == -1 || shndx2 == -1)
8282 return FALSE;
8283
8284 bed1 = get_elf_backend_data (bfd1);
8285 bed2 = get_elf_backend_data (bfd2);
8286 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8287 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8288 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8289 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8290
8291 if (symcount1 == 0 || symcount2 == 0)
8292 return FALSE;
8293
8294 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8295 NULL, NULL, NULL);
8296 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8297 NULL, NULL, NULL);
8298
8299 result = FALSE;
8300 if (isymbuf1 == NULL || isymbuf2 == NULL)
8301 goto done;
8302
8303 /* Sort symbols by binding and section. Global definitions are at
8304 the beginning. */
8305 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8306 elf_sort_elf_symbol);
8307 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8308 elf_sort_elf_symbol);
8309
8310 /* Count definitions in the section. */
8311 count1 = 0;
8312 for (isym = isymbuf1, isymend = isym + symcount1;
8313 isym < isymend; isym++)
8314 {
8315 if (isym->st_shndx == (unsigned int) shndx1)
8316 {
8317 if (count1 == 0)
8318 isymstart1 = isym;
8319 count1++;
8320 }
8321
8322 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8323 break;
8324 }
8325
8326 count2 = 0;
8327 for (isym = isymbuf2, isymend = isym + symcount2;
8328 isym < isymend; isym++)
8329 {
8330 if (isym->st_shndx == (unsigned int) shndx2)
8331 {
8332 if (count2 == 0)
8333 isymstart2 = isym;
8334 count2++;
8335 }
8336
8337 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8338 break;
8339 }
8340
8341 if (count1 == 0 || count2 == 0 || count1 != count2)
8342 goto done;
8343
8344 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8345 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8346
8347 if (symtable1 == NULL || symtable2 == NULL)
8348 goto done;
8349
8350 symp = symtable1;
8351 for (isym = isymstart1, isymend = isym + count1;
8352 isym < isymend; isym++)
8353 {
8354 symp->sym = isym;
8355 symp->name = bfd_elf_string_from_elf_section (bfd1,
8356 hdr1->sh_link,
8357 isym->st_name);
8358 symp++;
8359 }
8360
8361 symp = symtable2;
8362 for (isym = isymstart2, isymend = isym + count1;
8363 isym < isymend; isym++)
8364 {
8365 symp->sym = isym;
8366 symp->name = bfd_elf_string_from_elf_section (bfd2,
8367 hdr2->sh_link,
8368 isym->st_name);
8369 symp++;
8370 }
8371
8372 /* Sort symbol by name. */
8373 qsort (symtable1, count1, sizeof (struct elf_symbol),
8374 elf_sym_name_compare);
8375 qsort (symtable2, count1, sizeof (struct elf_symbol),
8376 elf_sym_name_compare);
8377
8378 for (i = 0; i < count1; i++)
8379 /* Two symbols must have the same binding, type and name. */
8380 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8381 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8382 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8383 goto done;
8384
8385 result = TRUE;
8386
8387done:
8388 if (symtable1)
8389 free (symtable1);
8390 if (symtable2)
8391 free (symtable2);
8392 if (isymbuf1)
8393 free (isymbuf1);
8394 if (isymbuf2)
8395 free (isymbuf2);
8396
8397 return result;
8398}
This page took 0.941248 seconds and 4 git commands to generate.