* elf.c (bfd_section_from_shdr): Fail if sh_entsize is bogus for
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
8615f3f2 4 2002, 2003, 2004, 2005 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
661a3fd4 22/* SECTION
47d9a591 23
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
209/* Read a specified number of bytes at a specified offset in an ELF
210 file, into a newly allocated buffer, and return a pointer to the
c044fabd 211 buffer. */
252b5132 212
f075ee0c 213static bfd_byte *
217aa764 214elf_read (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 215{
f075ee0c 216 bfd_byte *buf;
252b5132
RH
217
218 if ((buf = bfd_alloc (abfd, size)) == NULL)
219 return NULL;
dc810e39 220 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
252b5132 221 return NULL;
217aa764 222 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
223 {
224 if (bfd_get_error () != bfd_error_system_call)
225 bfd_set_error (bfd_error_file_truncated);
226 return NULL;
227 }
228 return buf;
229}
230
b34976b6 231bfd_boolean
217aa764 232bfd_elf_mkobject (bfd *abfd)
252b5132 233{
c044fabd
KH
234 /* This just does initialization. */
235 /* coff_mkobject zalloc's space for tdata.coff_obj_data ... */
217aa764 236 elf_tdata (abfd) = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
252b5132 237 if (elf_tdata (abfd) == 0)
b34976b6 238 return FALSE;
c044fabd
KH
239 /* Since everything is done at close time, do we need any
240 initialization? */
252b5132 241
b34976b6 242 return TRUE;
252b5132
RH
243}
244
b34976b6 245bfd_boolean
217aa764 246bfd_elf_mkcorefile (bfd *abfd)
252b5132 247{
c044fabd 248 /* I think this can be done just like an object file. */
252b5132
RH
249 return bfd_elf_mkobject (abfd);
250}
251
252char *
217aa764 253bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
254{
255 Elf_Internal_Shdr **i_shdrp;
f075ee0c 256 bfd_byte *shstrtab = NULL;
dc810e39
AM
257 file_ptr offset;
258 bfd_size_type shstrtabsize;
252b5132
RH
259
260 i_shdrp = elf_elfsections (abfd);
261 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 262 return NULL;
252b5132 263
f075ee0c 264 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
265 if (shstrtab == NULL)
266 {
c044fabd 267 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
268 offset = i_shdrp[shindex]->sh_offset;
269 shstrtabsize = i_shdrp[shindex]->sh_size;
270 shstrtab = elf_read (abfd, offset, shstrtabsize);
217aa764 271 i_shdrp[shindex]->contents = shstrtab;
252b5132 272 }
f075ee0c 273 return (char *) shstrtab;
252b5132
RH
274}
275
276char *
217aa764
AM
277bfd_elf_string_from_elf_section (bfd *abfd,
278 unsigned int shindex,
279 unsigned int strindex)
252b5132
RH
280{
281 Elf_Internal_Shdr *hdr;
282
283 if (strindex == 0)
284 return "";
285
286 hdr = elf_elfsections (abfd)[shindex];
287
288 if (hdr->contents == NULL
289 && bfd_elf_get_str_section (abfd, shindex) == NULL)
290 return NULL;
291
292 if (strindex >= hdr->sh_size)
293 {
1b3a8575 294 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 295 (*_bfd_error_handler)
d003868e
AM
296 (_("%B: invalid string offset %u >= %lu for section `%s'"),
297 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 298 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 299 ? ".shstrtab"
1b3a8575 300 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
301 return "";
302 }
303
304 return ((char *) hdr->contents) + strindex;
305}
306
6cdc0ccc
AM
307/* Read and convert symbols to internal format.
308 SYMCOUNT specifies the number of symbols to read, starting from
309 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
310 are non-NULL, they are used to store the internal symbols, external
311 symbols, and symbol section index extensions, respectively. */
312
313Elf_Internal_Sym *
217aa764
AM
314bfd_elf_get_elf_syms (bfd *ibfd,
315 Elf_Internal_Shdr *symtab_hdr,
316 size_t symcount,
317 size_t symoffset,
318 Elf_Internal_Sym *intsym_buf,
319 void *extsym_buf,
320 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
321{
322 Elf_Internal_Shdr *shndx_hdr;
217aa764 323 void *alloc_ext;
df622259 324 const bfd_byte *esym;
6cdc0ccc
AM
325 Elf_External_Sym_Shndx *alloc_extshndx;
326 Elf_External_Sym_Shndx *shndx;
327 Elf_Internal_Sym *isym;
328 Elf_Internal_Sym *isymend;
9c5bfbb7 329 const struct elf_backend_data *bed;
6cdc0ccc
AM
330 size_t extsym_size;
331 bfd_size_type amt;
332 file_ptr pos;
333
334 if (symcount == 0)
335 return intsym_buf;
336
337 /* Normal syms might have section extension entries. */
338 shndx_hdr = NULL;
339 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
340 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
341
342 /* Read the symbols. */
343 alloc_ext = NULL;
344 alloc_extshndx = NULL;
345 bed = get_elf_backend_data (ibfd);
346 extsym_size = bed->s->sizeof_sym;
347 amt = symcount * extsym_size;
348 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
349 if (extsym_buf == NULL)
350 {
351 alloc_ext = bfd_malloc (amt);
352 extsym_buf = alloc_ext;
353 }
354 if (extsym_buf == NULL
355 || bfd_seek (ibfd, pos, SEEK_SET) != 0
356 || bfd_bread (extsym_buf, amt, ibfd) != amt)
357 {
358 intsym_buf = NULL;
359 goto out;
360 }
361
362 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
363 extshndx_buf = NULL;
364 else
365 {
366 amt = symcount * sizeof (Elf_External_Sym_Shndx);
367 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
368 if (extshndx_buf == NULL)
369 {
217aa764 370 alloc_extshndx = bfd_malloc (amt);
6cdc0ccc
AM
371 extshndx_buf = alloc_extshndx;
372 }
373 if (extshndx_buf == NULL
374 || bfd_seek (ibfd, pos, SEEK_SET) != 0
375 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
376 {
377 intsym_buf = NULL;
378 goto out;
379 }
380 }
381
382 if (intsym_buf == NULL)
383 {
384 bfd_size_type amt = symcount * sizeof (Elf_Internal_Sym);
217aa764 385 intsym_buf = bfd_malloc (amt);
6cdc0ccc
AM
386 if (intsym_buf == NULL)
387 goto out;
388 }
389
390 /* Convert the symbols to internal form. */
391 isymend = intsym_buf + symcount;
392 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
393 isym < isymend;
394 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
217aa764 395 (*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym);
6cdc0ccc
AM
396
397 out:
398 if (alloc_ext != NULL)
399 free (alloc_ext);
400 if (alloc_extshndx != NULL)
401 free (alloc_extshndx);
402
403 return intsym_buf;
404}
405
5cab59f6
AM
406/* Look up a symbol name. */
407const char *
be8dd2ca
AM
408bfd_elf_sym_name (bfd *abfd,
409 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
410 Elf_Internal_Sym *isym,
411 asection *sym_sec)
5cab59f6 412{
26c61ae5 413 const char *name;
5cab59f6 414 unsigned int iname = isym->st_name;
be8dd2ca 415 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 416
138f35cc
JJ
417 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
418 /* Check for a bogus st_shndx to avoid crashing. */
419 && isym->st_shndx < elf_numsections (abfd)
420 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
421 {
422 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
423 shindex = elf_elfheader (abfd)->e_shstrndx;
424 }
425
26c61ae5
L
426 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
427 if (name == NULL)
428 name = "(null)";
429 else if (sym_sec && *name == '\0')
430 name = bfd_section_name (abfd, sym_sec);
431
432 return name;
5cab59f6
AM
433}
434
dbb410c3
AM
435/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
436 sections. The first element is the flags, the rest are section
437 pointers. */
438
439typedef union elf_internal_group {
440 Elf_Internal_Shdr *shdr;
441 unsigned int flags;
442} Elf_Internal_Group;
443
b885599b
AM
444/* Return the name of the group signature symbol. Why isn't the
445 signature just a string? */
446
447static const char *
217aa764 448group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 449{
9dce4196 450 Elf_Internal_Shdr *hdr;
9dce4196
AM
451 unsigned char esym[sizeof (Elf64_External_Sym)];
452 Elf_External_Sym_Shndx eshndx;
453 Elf_Internal_Sym isym;
b885599b 454
13792e9d
L
455 /* First we need to ensure the symbol table is available. Make sure
456 that it is a symbol table section. */
457 hdr = elf_elfsections (abfd) [ghdr->sh_link];
458 if (hdr->sh_type != SHT_SYMTAB
459 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
460 return NULL;
461
9dce4196
AM
462 /* Go read the symbol. */
463 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
464 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
465 &isym, esym, &eshndx) == NULL)
b885599b 466 return NULL;
9dce4196 467
26c61ae5 468 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
469}
470
dbb410c3
AM
471/* Set next_in_group list pointer, and group name for NEWSECT. */
472
b34976b6 473static bfd_boolean
217aa764 474setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
475{
476 unsigned int num_group = elf_tdata (abfd)->num_group;
477
478 /* If num_group is zero, read in all SHT_GROUP sections. The count
479 is set to -1 if there are no SHT_GROUP sections. */
480 if (num_group == 0)
481 {
482 unsigned int i, shnum;
483
484 /* First count the number of groups. If we have a SHT_GROUP
485 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 486 shnum = elf_numsections (abfd);
dbb410c3
AM
487 num_group = 0;
488 for (i = 0; i < shnum; i++)
489 {
490 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
491 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
492 num_group += 1;
493 }
494
495 if (num_group == 0)
20dbb49d
L
496 {
497 num_group = (unsigned) -1;
498 elf_tdata (abfd)->num_group = num_group;
499 }
500 else
dbb410c3
AM
501 {
502 /* We keep a list of elf section headers for group sections,
503 so we can find them quickly. */
20dbb49d
L
504 bfd_size_type amt;
505
506 elf_tdata (abfd)->num_group = num_group;
507 amt = num_group * sizeof (Elf_Internal_Shdr *);
dbb410c3
AM
508 elf_tdata (abfd)->group_sect_ptr = bfd_alloc (abfd, amt);
509 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 510 return FALSE;
dbb410c3
AM
511
512 num_group = 0;
513 for (i = 0; i < shnum; i++)
514 {
515 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
516 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
517 {
973ffd63 518 unsigned char *src;
dbb410c3
AM
519 Elf_Internal_Group *dest;
520
521 /* Add to list of sections. */
522 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
523 num_group += 1;
524
525 /* Read the raw contents. */
526 BFD_ASSERT (sizeof (*dest) >= 4);
527 amt = shdr->sh_size * sizeof (*dest) / 4;
528 shdr->contents = bfd_alloc (abfd, amt);
529 if (shdr->contents == NULL
530 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
531 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
532 != shdr->sh_size))
b34976b6 533 return FALSE;
dbb410c3
AM
534
535 /* Translate raw contents, a flag word followed by an
536 array of elf section indices all in target byte order,
537 to the flag word followed by an array of elf section
538 pointers. */
539 src = shdr->contents + shdr->sh_size;
540 dest = (Elf_Internal_Group *) (shdr->contents + amt);
541 while (1)
542 {
543 unsigned int idx;
544
545 src -= 4;
546 --dest;
547 idx = H_GET_32 (abfd, src);
548 if (src == shdr->contents)
549 {
550 dest->flags = idx;
b885599b
AM
551 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
552 shdr->bfd_section->flags
553 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
554 break;
555 }
556 if (idx >= shnum)
557 {
558 ((*_bfd_error_handler)
d003868e 559 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
560 idx = 0;
561 }
562 dest->shdr = elf_elfsections (abfd)[idx];
563 }
564 }
565 }
566 }
567 }
568
569 if (num_group != (unsigned) -1)
570 {
571 unsigned int i;
572
573 for (i = 0; i < num_group; i++)
574 {
575 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
576 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
577 unsigned int n_elt = shdr->sh_size / 4;
578
579 /* Look through this group's sections to see if current
580 section is a member. */
581 while (--n_elt != 0)
582 if ((++idx)->shdr == hdr)
583 {
e0e8c97f 584 asection *s = NULL;
dbb410c3
AM
585
586 /* We are a member of this group. Go looking through
587 other members to see if any others are linked via
588 next_in_group. */
589 idx = (Elf_Internal_Group *) shdr->contents;
590 n_elt = shdr->sh_size / 4;
591 while (--n_elt != 0)
592 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 593 && elf_next_in_group (s) != NULL)
dbb410c3
AM
594 break;
595 if (n_elt != 0)
596 {
dbb410c3
AM
597 /* Snarf the group name from other member, and
598 insert current section in circular list. */
945906ff
AM
599 elf_group_name (newsect) = elf_group_name (s);
600 elf_next_in_group (newsect) = elf_next_in_group (s);
601 elf_next_in_group (s) = newsect;
dbb410c3
AM
602 }
603 else
604 {
dbb410c3
AM
605 const char *gname;
606
b885599b
AM
607 gname = group_signature (abfd, shdr);
608 if (gname == NULL)
b34976b6 609 return FALSE;
945906ff 610 elf_group_name (newsect) = gname;
dbb410c3
AM
611
612 /* Start a circular list with one element. */
945906ff 613 elf_next_in_group (newsect) = newsect;
dbb410c3 614 }
b885599b 615
9dce4196
AM
616 /* If the group section has been created, point to the
617 new member. */
dbb410c3 618 if (shdr->bfd_section != NULL)
945906ff 619 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 620
dbb410c3
AM
621 i = num_group - 1;
622 break;
623 }
624 }
625 }
626
945906ff 627 if (elf_group_name (newsect) == NULL)
dbb410c3 628 {
d003868e
AM
629 (*_bfd_error_handler) (_("%B: no group info for section %A"),
630 abfd, newsect);
dbb410c3 631 }
b34976b6 632 return TRUE;
dbb410c3
AM
633}
634
3d7f7666
L
635bfd_boolean
636_bfd_elf_setup_group_pointers (bfd *abfd)
637{
638 unsigned int i;
639 unsigned int num_group = elf_tdata (abfd)->num_group;
640 bfd_boolean result = TRUE;
641
642 if (num_group == (unsigned) -1)
643 return result;
644
645 for (i = 0; i < num_group; i++)
646 {
647 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
648 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
649 unsigned int n_elt = shdr->sh_size / 4;
650
651 while (--n_elt != 0)
652 if ((++idx)->shdr->bfd_section)
653 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
654 else if (idx->shdr->sh_type == SHT_RELA
655 || idx->shdr->sh_type == SHT_REL)
656 /* We won't include relocation sections in section groups in
657 output object files. We adjust the group section size here
658 so that relocatable link will work correctly when
659 relocation sections are in section group in input object
660 files. */
661 shdr->bfd_section->size -= 4;
662 else
663 {
664 /* There are some unknown sections in the group. */
665 (*_bfd_error_handler)
d003868e
AM
666 (_("%B: unknown [%d] section `%s' in group [%s]"),
667 abfd,
3d7f7666 668 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
669 bfd_elf_string_from_elf_section (abfd,
670 (elf_elfheader (abfd)
671 ->e_shstrndx),
672 idx->shdr->sh_name),
3d7f7666
L
673 shdr->bfd_section->name);
674 result = FALSE;
675 }
676 }
677 return result;
678}
679
72adc230
AM
680bfd_boolean
681bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
682{
683 return elf_next_in_group (sec) != NULL;
684}
685
252b5132
RH
686/* Make a BFD section from an ELF section. We store a pointer to the
687 BFD section in the bfd_section field of the header. */
688
b34976b6 689bfd_boolean
217aa764
AM
690_bfd_elf_make_section_from_shdr (bfd *abfd,
691 Elf_Internal_Shdr *hdr,
6dc132d9
L
692 const char *name,
693 int shindex)
252b5132
RH
694{
695 asection *newsect;
696 flagword flags;
9c5bfbb7 697 const struct elf_backend_data *bed;
252b5132
RH
698
699 if (hdr->bfd_section != NULL)
700 {
701 BFD_ASSERT (strcmp (name,
702 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 703 return TRUE;
252b5132
RH
704 }
705
706 newsect = bfd_make_section_anyway (abfd, name);
707 if (newsect == NULL)
b34976b6 708 return FALSE;
252b5132 709
1829f4b2
AM
710 hdr->bfd_section = newsect;
711 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 712 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 713
2f89ff8d
L
714 /* Always use the real type/flags. */
715 elf_section_type (newsect) = hdr->sh_type;
716 elf_section_flags (newsect) = hdr->sh_flags;
717
252b5132
RH
718 newsect->filepos = hdr->sh_offset;
719
720 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
721 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
722 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 723 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 724 return FALSE;
252b5132
RH
725
726 flags = SEC_NO_FLAGS;
727 if (hdr->sh_type != SHT_NOBITS)
728 flags |= SEC_HAS_CONTENTS;
dbb410c3 729 if (hdr->sh_type == SHT_GROUP)
b3096250 730 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
731 if ((hdr->sh_flags & SHF_ALLOC) != 0)
732 {
733 flags |= SEC_ALLOC;
734 if (hdr->sh_type != SHT_NOBITS)
735 flags |= SEC_LOAD;
736 }
737 if ((hdr->sh_flags & SHF_WRITE) == 0)
738 flags |= SEC_READONLY;
739 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
740 flags |= SEC_CODE;
741 else if ((flags & SEC_LOAD) != 0)
742 flags |= SEC_DATA;
f5fa8ca2
JJ
743 if ((hdr->sh_flags & SHF_MERGE) != 0)
744 {
745 flags |= SEC_MERGE;
746 newsect->entsize = hdr->sh_entsize;
747 if ((hdr->sh_flags & SHF_STRINGS) != 0)
748 flags |= SEC_STRINGS;
749 }
dbb410c3
AM
750 if (hdr->sh_flags & SHF_GROUP)
751 if (!setup_group (abfd, hdr, newsect))
b34976b6 752 return FALSE;
13ae64f3
JJ
753 if ((hdr->sh_flags & SHF_TLS) != 0)
754 flags |= SEC_THREAD_LOCAL;
252b5132 755
3d2b39cf 756 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 757 {
3d2b39cf
L
758 /* The debugging sections appear to be recognized only by name,
759 not any sort of flag. Their SEC_ALLOC bits are cleared. */
760 static const struct
761 {
762 const char *name;
763 int len;
764 } debug_sections [] =
765 {
766 { "debug", 5 }, /* 'd' */
767 { NULL, 0 }, /* 'e' */
768 { NULL, 0 }, /* 'f' */
769 { "gnu.linkonce.wi.", 17 }, /* 'g' */
770 { NULL, 0 }, /* 'h' */
771 { NULL, 0 }, /* 'i' */
772 { NULL, 0 }, /* 'j' */
773 { NULL, 0 }, /* 'k' */
774 { "line", 4 }, /* 'l' */
775 { NULL, 0 }, /* 'm' */
776 { NULL, 0 }, /* 'n' */
777 { NULL, 0 }, /* 'o' */
778 { NULL, 0 }, /* 'p' */
779 { NULL, 0 }, /* 'q' */
780 { NULL, 0 }, /* 'r' */
781 { "stab", 4 } /* 's' */
782 };
783
784 if (name [0] == '.')
785 {
786 int i = name [1] - 'd';
787 if (i >= 0
788 && i < (int) ARRAY_SIZE (debug_sections)
789 && debug_sections [i].name != NULL
790 && strncmp (&name [1], debug_sections [i].name,
791 debug_sections [i].len) == 0)
792 flags |= SEC_DEBUGGING;
793 }
794 }
252b5132
RH
795
796 /* As a GNU extension, if the name begins with .gnu.linkonce, we
797 only link a single copy of the section. This is used to support
798 g++. g++ will emit each template expansion in its own section.
799 The symbols will be defined as weak, so that multiple definitions
800 are permitted. The GNU linker extension is to actually discard
801 all but one of the sections. */
b885599b
AM
802 if (strncmp (name, ".gnu.linkonce", sizeof ".gnu.linkonce" - 1) == 0
803 && elf_next_in_group (newsect) == NULL)
252b5132
RH
804 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
805
fa152c49
JW
806 bed = get_elf_backend_data (abfd);
807 if (bed->elf_backend_section_flags)
808 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 809 return FALSE;
fa152c49 810
252b5132 811 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 812 return FALSE;
252b5132
RH
813
814 if ((flags & SEC_ALLOC) != 0)
815 {
816 Elf_Internal_Phdr *phdr;
817 unsigned int i;
818
819 /* Look through the phdrs to see if we need to adjust the lma.
820 If all the p_paddr fields are zero, we ignore them, since
821 some ELF linkers produce such output. */
822 phdr = elf_tdata (abfd)->phdr;
823 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
824 {
825 if (phdr->p_paddr != 0)
826 break;
827 }
828 if (i < elf_elfheader (abfd)->e_phnum)
829 {
830 phdr = elf_tdata (abfd)->phdr;
831 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
832 {
e0e8c97f
NC
833 /* This section is part of this segment if its file
834 offset plus size lies within the segment's memory
835 span and, if the section is loaded, the extent of the
47d9a591 836 loaded data lies within the extent of the segment.
bf36db18
NC
837
838 Note - we used to check the p_paddr field as well, and
839 refuse to set the LMA if it was 0. This is wrong
dba143ef 840 though, as a perfectly valid initialised segment can
bf36db18 841 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 842 place special significance on the address 0 and
bf36db18
NC
843 executables need to be able to have a segment which
844 covers this address. */
252b5132 845 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
846 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
847 && (hdr->sh_offset + hdr->sh_size
848 <= phdr->p_offset + phdr->p_memsz)
252b5132 849 && ((flags & SEC_LOAD) == 0
d7866f04
AM
850 || (hdr->sh_offset + hdr->sh_size
851 <= phdr->p_offset + phdr->p_filesz)))
252b5132 852 {
dba143ef 853 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
854 newsect->lma = (phdr->p_paddr
855 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
856 else
857 /* We used to use the same adjustment for SEC_LOAD
858 sections, but that doesn't work if the segment
859 is packed with code from multiple VMAs.
860 Instead we calculate the section LMA based on
861 the segment LMA. It is assumed that the
862 segment will contain sections with contiguous
863 LMAs, even if the VMAs are not. */
864 newsect->lma = (phdr->p_paddr
865 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
866
867 /* With contiguous segments, we can't tell from file
868 offsets whether a section with zero size should
869 be placed at the end of one segment or the
870 beginning of the next. Decide based on vaddr. */
871 if (hdr->sh_addr >= phdr->p_vaddr
872 && (hdr->sh_addr + hdr->sh_size
873 <= phdr->p_vaddr + phdr->p_memsz))
874 break;
252b5132
RH
875 }
876 }
877 }
878 }
879
b34976b6 880 return TRUE;
252b5132
RH
881}
882
883/*
884INTERNAL_FUNCTION
885 bfd_elf_find_section
886
887SYNOPSIS
888 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
889
890DESCRIPTION
891 Helper functions for GDB to locate the string tables.
892 Since BFD hides string tables from callers, GDB needs to use an
893 internal hook to find them. Sun's .stabstr, in particular,
894 isn't even pointed to by the .stab section, so ordinary
895 mechanisms wouldn't work to find it, even if we had some.
896*/
897
898struct elf_internal_shdr *
217aa764 899bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
900{
901 Elf_Internal_Shdr **i_shdrp;
902 char *shstrtab;
903 unsigned int max;
904 unsigned int i;
905
906 i_shdrp = elf_elfsections (abfd);
907 if (i_shdrp != NULL)
908 {
9ad5cbcf
AM
909 shstrtab = bfd_elf_get_str_section (abfd,
910 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
911 if (shstrtab != NULL)
912 {
9ad5cbcf 913 max = elf_numsections (abfd);
252b5132
RH
914 for (i = 1; i < max; i++)
915 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
916 return i_shdrp[i];
917 }
918 }
919 return 0;
920}
921
922const char *const bfd_elf_section_type_names[] = {
923 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
924 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
925 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
926};
927
1049f94e 928/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
929 output, and the reloc is against an external symbol, and nothing
930 has given us any additional addend, the resulting reloc will also
931 be against the same symbol. In such a case, we don't want to
932 change anything about the way the reloc is handled, since it will
933 all be done at final link time. Rather than put special case code
934 into bfd_perform_relocation, all the reloc types use this howto
935 function. It just short circuits the reloc if producing
1049f94e 936 relocatable output against an external symbol. */
252b5132 937
252b5132 938bfd_reloc_status_type
217aa764
AM
939bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
940 arelent *reloc_entry,
941 asymbol *symbol,
942 void *data ATTRIBUTE_UNUSED,
943 asection *input_section,
944 bfd *output_bfd,
945 char **error_message ATTRIBUTE_UNUSED)
946{
947 if (output_bfd != NULL
252b5132
RH
948 && (symbol->flags & BSF_SECTION_SYM) == 0
949 && (! reloc_entry->howto->partial_inplace
950 || reloc_entry->addend == 0))
951 {
952 reloc_entry->address += input_section->output_offset;
953 return bfd_reloc_ok;
954 }
955
956 return bfd_reloc_continue;
957}
958\f
d3c456e9
JJ
959/* Make sure sec_info_type is cleared if sec_info is cleared too. */
960
961static void
217aa764
AM
962merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
963 asection *sec)
d3c456e9 964{
68bfbfcc
AM
965 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
966 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
967}
968
8550eb6e
JJ
969/* Finish SHF_MERGE section merging. */
970
b34976b6 971bfd_boolean
217aa764 972_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 973{
57ceae94
AM
974 bfd *ibfd;
975 asection *sec;
976
0eddce27 977 if (!is_elf_hash_table (info->hash))
b34976b6 978 return FALSE;
57ceae94
AM
979
980 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
981 if ((ibfd->flags & DYNAMIC) == 0)
982 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
983 if ((sec->flags & SEC_MERGE) != 0
984 && !bfd_is_abs_section (sec->output_section))
985 {
986 struct bfd_elf_section_data *secdata;
987
988 secdata = elf_section_data (sec);
989 if (! _bfd_add_merge_section (abfd,
990 &elf_hash_table (info)->merge_info,
991 sec, &secdata->sec_info))
992 return FALSE;
993 else if (secdata->sec_info)
994 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
995 }
996
997 if (elf_hash_table (info)->merge_info != NULL)
998 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 999 merge_sections_remove_hook);
b34976b6 1000 return TRUE;
8550eb6e 1001}
2d653fc7
AM
1002
1003void
217aa764 1004_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1005{
1006 sec->output_section = bfd_abs_section_ptr;
1007 sec->output_offset = sec->vma;
0eddce27 1008 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1009 return;
1010
68bfbfcc 1011 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1012}
8550eb6e 1013\f
0ac4564e
L
1014/* Copy the program header and other data from one object module to
1015 another. */
252b5132 1016
b34976b6 1017bfd_boolean
217aa764 1018_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1019{
1020 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1021 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1022 return TRUE;
2d502050
L
1023
1024 BFD_ASSERT (!elf_flags_init (obfd)
1025 || (elf_elfheader (obfd)->e_flags
1026 == elf_elfheader (ibfd)->e_flags));
1027
0ac4564e 1028 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1029 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1030 elf_flags_init (obfd) = TRUE;
1031 return TRUE;
2d502050
L
1032}
1033
f0b79d91
L
1034/* Print out the program headers. */
1035
b34976b6 1036bfd_boolean
217aa764 1037_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1038{
217aa764 1039 FILE *f = farg;
252b5132
RH
1040 Elf_Internal_Phdr *p;
1041 asection *s;
1042 bfd_byte *dynbuf = NULL;
1043
1044 p = elf_tdata (abfd)->phdr;
1045 if (p != NULL)
1046 {
1047 unsigned int i, c;
1048
1049 fprintf (f, _("\nProgram Header:\n"));
1050 c = elf_elfheader (abfd)->e_phnum;
1051 for (i = 0; i < c; i++, p++)
1052 {
dc810e39 1053 const char *pt;
252b5132
RH
1054 char buf[20];
1055
1056 switch (p->p_type)
1057 {
dc810e39
AM
1058 case PT_NULL: pt = "NULL"; break;
1059 case PT_LOAD: pt = "LOAD"; break;
1060 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1061 case PT_INTERP: pt = "INTERP"; break;
1062 case PT_NOTE: pt = "NOTE"; break;
1063 case PT_SHLIB: pt = "SHLIB"; break;
1064 case PT_PHDR: pt = "PHDR"; break;
13ae64f3 1065 case PT_TLS: pt = "TLS"; break;
65765700 1066 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
9ee5e499 1067 case PT_GNU_STACK: pt = "STACK"; break;
8c37241b 1068 case PT_GNU_RELRO: pt = "RELRO"; break;
dc810e39 1069 default: sprintf (buf, "0x%lx", p->p_type); pt = buf; break;
252b5132 1070 }
dc810e39 1071 fprintf (f, "%8s off 0x", pt);
60b89a18 1072 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1073 fprintf (f, " vaddr 0x");
60b89a18 1074 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1075 fprintf (f, " paddr 0x");
60b89a18 1076 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1077 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1078 fprintf (f, " filesz 0x");
60b89a18 1079 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1080 fprintf (f, " memsz 0x");
60b89a18 1081 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1082 fprintf (f, " flags %c%c%c",
1083 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1084 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1085 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1086 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1087 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1088 fprintf (f, "\n");
1089 }
1090 }
1091
1092 s = bfd_get_section_by_name (abfd, ".dynamic");
1093 if (s != NULL)
1094 {
1095 int elfsec;
dc810e39 1096 unsigned long shlink;
252b5132
RH
1097 bfd_byte *extdyn, *extdynend;
1098 size_t extdynsize;
217aa764 1099 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1100
1101 fprintf (f, _("\nDynamic Section:\n"));
1102
eea6121a 1103 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1104 goto error_return;
1105
1106 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1107 if (elfsec == -1)
1108 goto error_return;
dc810e39 1109 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1110
1111 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1112 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1113
1114 extdyn = dynbuf;
eea6121a 1115 extdynend = extdyn + s->size;
252b5132
RH
1116 for (; extdyn < extdynend; extdyn += extdynsize)
1117 {
1118 Elf_Internal_Dyn dyn;
1119 const char *name;
1120 char ab[20];
b34976b6 1121 bfd_boolean stringp;
252b5132 1122
217aa764 1123 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1124
1125 if (dyn.d_tag == DT_NULL)
1126 break;
1127
b34976b6 1128 stringp = FALSE;
252b5132
RH
1129 switch (dyn.d_tag)
1130 {
1131 default:
1132 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1133 name = ab;
1134 break;
1135
b34976b6 1136 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1137 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1138 case DT_PLTGOT: name = "PLTGOT"; break;
1139 case DT_HASH: name = "HASH"; break;
1140 case DT_STRTAB: name = "STRTAB"; break;
1141 case DT_SYMTAB: name = "SYMTAB"; break;
1142 case DT_RELA: name = "RELA"; break;
1143 case DT_RELASZ: name = "RELASZ"; break;
1144 case DT_RELAENT: name = "RELAENT"; break;
1145 case DT_STRSZ: name = "STRSZ"; break;
1146 case DT_SYMENT: name = "SYMENT"; break;
1147 case DT_INIT: name = "INIT"; break;
1148 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1149 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1150 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1151 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1152 case DT_REL: name = "REL"; break;
1153 case DT_RELSZ: name = "RELSZ"; break;
1154 case DT_RELENT: name = "RELENT"; break;
1155 case DT_PLTREL: name = "PLTREL"; break;
1156 case DT_DEBUG: name = "DEBUG"; break;
1157 case DT_TEXTREL: name = "TEXTREL"; break;
1158 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1159 case DT_BIND_NOW: name = "BIND_NOW"; break;
1160 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1161 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1162 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1163 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1164 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1165 case DT_FLAGS: name = "FLAGS"; break;
1166 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1167 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1168 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1169 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1170 case DT_MOVEENT: name = "MOVEENT"; break;
1171 case DT_MOVESZ: name = "MOVESZ"; break;
1172 case DT_FEATURE: name = "FEATURE"; break;
1173 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1174 case DT_SYMINSZ: name = "SYMINSZ"; break;
1175 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1176 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1177 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1178 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1179 case DT_PLTPAD: name = "PLTPAD"; break;
1180 case DT_MOVETAB: name = "MOVETAB"; break;
1181 case DT_SYMINFO: name = "SYMINFO"; break;
1182 case DT_RELACOUNT: name = "RELACOUNT"; break;
1183 case DT_RELCOUNT: name = "RELCOUNT"; break;
1184 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1185 case DT_VERSYM: name = "VERSYM"; break;
1186 case DT_VERDEF: name = "VERDEF"; break;
1187 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1188 case DT_VERNEED: name = "VERNEED"; break;
1189 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1190 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1191 case DT_USED: name = "USED"; break;
b34976b6 1192 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
252b5132
RH
1193 }
1194
1195 fprintf (f, " %-11s ", name);
1196 if (! stringp)
1197 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1198 else
1199 {
1200 const char *string;
dc810e39 1201 unsigned int tagv = dyn.d_un.d_val;
252b5132 1202
dc810e39 1203 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1204 if (string == NULL)
1205 goto error_return;
1206 fprintf (f, "%s", string);
1207 }
1208 fprintf (f, "\n");
1209 }
1210
1211 free (dynbuf);
1212 dynbuf = NULL;
1213 }
1214
1215 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1216 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1217 {
fc0e6df6 1218 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1219 return FALSE;
252b5132
RH
1220 }
1221
1222 if (elf_dynverdef (abfd) != 0)
1223 {
1224 Elf_Internal_Verdef *t;
1225
1226 fprintf (f, _("\nVersion definitions:\n"));
1227 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1228 {
1229 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1230 t->vd_flags, t->vd_hash, t->vd_nodename);
1231 if (t->vd_auxptr->vda_nextptr != NULL)
1232 {
1233 Elf_Internal_Verdaux *a;
1234
1235 fprintf (f, "\t");
1236 for (a = t->vd_auxptr->vda_nextptr;
1237 a != NULL;
1238 a = a->vda_nextptr)
1239 fprintf (f, "%s ", a->vda_nodename);
1240 fprintf (f, "\n");
1241 }
1242 }
1243 }
1244
1245 if (elf_dynverref (abfd) != 0)
1246 {
1247 Elf_Internal_Verneed *t;
1248
1249 fprintf (f, _("\nVersion References:\n"));
1250 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1251 {
1252 Elf_Internal_Vernaux *a;
1253
1254 fprintf (f, _(" required from %s:\n"), t->vn_filename);
1255 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1256 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1257 a->vna_flags, a->vna_other, a->vna_nodename);
1258 }
1259 }
1260
b34976b6 1261 return TRUE;
252b5132
RH
1262
1263 error_return:
1264 if (dynbuf != NULL)
1265 free (dynbuf);
b34976b6 1266 return FALSE;
252b5132
RH
1267}
1268
1269/* Display ELF-specific fields of a symbol. */
1270
1271void
217aa764
AM
1272bfd_elf_print_symbol (bfd *abfd,
1273 void *filep,
1274 asymbol *symbol,
1275 bfd_print_symbol_type how)
252b5132 1276{
217aa764 1277 FILE *file = filep;
252b5132
RH
1278 switch (how)
1279 {
1280 case bfd_print_symbol_name:
1281 fprintf (file, "%s", symbol->name);
1282 break;
1283 case bfd_print_symbol_more:
1284 fprintf (file, "elf ");
60b89a18 1285 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1286 fprintf (file, " %lx", (long) symbol->flags);
1287 break;
1288 case bfd_print_symbol_all:
1289 {
4e8a9624
AM
1290 const char *section_name;
1291 const char *name = NULL;
9c5bfbb7 1292 const struct elf_backend_data *bed;
7a13edea 1293 unsigned char st_other;
dbb410c3 1294 bfd_vma val;
c044fabd 1295
252b5132 1296 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1297
1298 bed = get_elf_backend_data (abfd);
1299 if (bed->elf_backend_print_symbol_all)
c044fabd 1300 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1301
1302 if (name == NULL)
1303 {
7ee38065 1304 name = symbol->name;
217aa764 1305 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1306 }
1307
252b5132
RH
1308 fprintf (file, " %s\t", section_name);
1309 /* Print the "other" value for a symbol. For common symbols,
1310 we've already printed the size; now print the alignment.
1311 For other symbols, we have no specified alignment, and
1312 we've printed the address; now print the size. */
dbb410c3
AM
1313 if (bfd_is_com_section (symbol->section))
1314 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1315 else
1316 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1317 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1318
1319 /* If we have version information, print it. */
1320 if (elf_tdata (abfd)->dynversym_section != 0
1321 && (elf_tdata (abfd)->dynverdef_section != 0
1322 || elf_tdata (abfd)->dynverref_section != 0))
1323 {
1324 unsigned int vernum;
1325 const char *version_string;
1326
1327 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1328
1329 if (vernum == 0)
1330 version_string = "";
1331 else if (vernum == 1)
1332 version_string = "Base";
1333 else if (vernum <= elf_tdata (abfd)->cverdefs)
1334 version_string =
1335 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1336 else
1337 {
1338 Elf_Internal_Verneed *t;
1339
1340 version_string = "";
1341 for (t = elf_tdata (abfd)->verref;
1342 t != NULL;
1343 t = t->vn_nextref)
1344 {
1345 Elf_Internal_Vernaux *a;
1346
1347 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1348 {
1349 if (a->vna_other == vernum)
1350 {
1351 version_string = a->vna_nodename;
1352 break;
1353 }
1354 }
1355 }
1356 }
1357
1358 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1359 fprintf (file, " %-11s", version_string);
1360 else
1361 {
1362 int i;
1363
1364 fprintf (file, " (%s)", version_string);
1365 for (i = 10 - strlen (version_string); i > 0; --i)
1366 putc (' ', file);
1367 }
1368 }
1369
1370 /* If the st_other field is not zero, print it. */
7a13edea 1371 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1372
7a13edea
NC
1373 switch (st_other)
1374 {
1375 case 0: break;
1376 case STV_INTERNAL: fprintf (file, " .internal"); break;
1377 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1378 case STV_PROTECTED: fprintf (file, " .protected"); break;
1379 default:
1380 /* Some other non-defined flags are also present, so print
1381 everything hex. */
1382 fprintf (file, " 0x%02x", (unsigned int) st_other);
1383 }
252b5132 1384
587ff49e 1385 fprintf (file, " %s", name);
252b5132
RH
1386 }
1387 break;
1388 }
1389}
1390\f
1391/* Create an entry in an ELF linker hash table. */
1392
1393struct bfd_hash_entry *
217aa764
AM
1394_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1395 struct bfd_hash_table *table,
1396 const char *string)
252b5132 1397{
252b5132
RH
1398 /* Allocate the structure if it has not already been allocated by a
1399 subclass. */
51b64d56
AM
1400 if (entry == NULL)
1401 {
1402 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1403 if (entry == NULL)
1404 return entry;
1405 }
252b5132
RH
1406
1407 /* Call the allocation method of the superclass. */
51b64d56
AM
1408 entry = _bfd_link_hash_newfunc (entry, table, string);
1409 if (entry != NULL)
252b5132 1410 {
51b64d56
AM
1411 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1412 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1413
252b5132
RH
1414 /* Set local fields. */
1415 ret->indx = -1;
252b5132 1416 ret->dynindx = -1;
a6aa5195
AM
1417 ret->got = htab->init_got_refcount;
1418 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1419 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1420 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1421 /* Assume that we have been called by a non-ELF symbol reader.
1422 This flag is then reset by the code which reads an ELF input
1423 file. This ensures that a symbol created by a non-ELF symbol
1424 reader will have the flag set correctly. */
f5385ebf 1425 ret->non_elf = 1;
252b5132
RH
1426 }
1427
51b64d56 1428 return entry;
252b5132
RH
1429}
1430
2920b85c 1431/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1432 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1433
c61b8717 1434void
9c5bfbb7 1435_bfd_elf_link_hash_copy_indirect (const struct elf_backend_data *bed,
217aa764
AM
1436 struct elf_link_hash_entry *dir,
1437 struct elf_link_hash_entry *ind)
2920b85c 1438{
3c3e9281 1439 bfd_signed_vma tmp;
b48fa14c 1440 bfd_signed_vma lowest_valid = bed->can_refcount;
3c3e9281 1441
2920b85c
RH
1442 /* Copy down any references that we may have already seen to the
1443 symbol which just became indirect. */
1444
f5385ebf
AM
1445 dir->ref_dynamic |= ind->ref_dynamic;
1446 dir->ref_regular |= ind->ref_regular;
1447 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1448 dir->non_got_ref |= ind->non_got_ref;
1449 dir->needs_plt |= ind->needs_plt;
1450 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1451
1e370bd2 1452 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1453 return;
1454
51b64d56 1455 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1456 These may have been already set up by a check_relocs routine. */
3c3e9281 1457 tmp = dir->got.refcount;
b48fa14c 1458 if (tmp < lowest_valid)
2920b85c 1459 {
51b64d56 1460 dir->got.refcount = ind->got.refcount;
3c3e9281 1461 ind->got.refcount = tmp;
2920b85c 1462 }
3c3e9281 1463 else
b48fa14c 1464 BFD_ASSERT (ind->got.refcount < lowest_valid);
2920b85c 1465
3c3e9281 1466 tmp = dir->plt.refcount;
b48fa14c 1467 if (tmp < lowest_valid)
2920b85c 1468 {
51b64d56 1469 dir->plt.refcount = ind->plt.refcount;
3c3e9281 1470 ind->plt.refcount = tmp;
2920b85c 1471 }
3c3e9281 1472 else
b48fa14c 1473 BFD_ASSERT (ind->plt.refcount < lowest_valid);
2920b85c
RH
1474
1475 if (dir->dynindx == -1)
1476 {
1477 dir->dynindx = ind->dynindx;
1478 dir->dynstr_index = ind->dynstr_index;
1479 ind->dynindx = -1;
1480 ind->dynstr_index = 0;
1481 }
3c3e9281
AM
1482 else
1483 BFD_ASSERT (ind->dynindx == -1);
2920b85c
RH
1484}
1485
c61b8717 1486void
217aa764
AM
1487_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1488 struct elf_link_hash_entry *h,
1489 bfd_boolean force_local)
2920b85c 1490{
a6aa5195 1491 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1492 h->needs_plt = 0;
e5094212
AM
1493 if (force_local)
1494 {
f5385ebf 1495 h->forced_local = 1;
e5094212
AM
1496 if (h->dynindx != -1)
1497 {
1498 h->dynindx = -1;
1499 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1500 h->dynstr_index);
1501 }
1502 }
2920b85c
RH
1503}
1504
252b5132
RH
1505/* Initialize an ELF linker hash table. */
1506
b34976b6 1507bfd_boolean
217aa764
AM
1508_bfd_elf_link_hash_table_init
1509 (struct elf_link_hash_table *table,
1510 bfd *abfd,
1511 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1512 struct bfd_hash_table *,
1513 const char *))
252b5132 1514{
b34976b6 1515 bfd_boolean ret;
a6aa5195 1516 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1517
b34976b6 1518 table->dynamic_sections_created = FALSE;
252b5132 1519 table->dynobj = NULL;
a6aa5195
AM
1520 table->init_got_refcount.refcount = can_refcount - 1;
1521 table->init_plt_refcount.refcount = can_refcount - 1;
1522 table->init_got_offset.offset = -(bfd_vma) 1;
1523 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1524 /* The first dynamic symbol is a dummy. */
1525 table->dynsymcount = 1;
1526 table->dynstr = NULL;
1527 table->bucketcount = 0;
1528 table->needed = NULL;
1529 table->hgot = NULL;
f5fa8ca2 1530 table->merge_info = NULL;
3722b82f 1531 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1532 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1533 table->dynlocal = NULL;
73722af0 1534 table->runpath = NULL;
e1918d23
AM
1535 table->tls_sec = NULL;
1536 table->tls_size = 0;
73722af0 1537 table->loaded = NULL;
67687978 1538 table->is_relocatable_executable = FALSE;
73722af0
AM
1539
1540 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc);
8ea2e4bd
NC
1541 table->root.type = bfd_link_elf_hash_table;
1542
1543 return ret;
252b5132
RH
1544}
1545
1546/* Create an ELF linker hash table. */
1547
1548struct bfd_link_hash_table *
217aa764 1549_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1550{
1551 struct elf_link_hash_table *ret;
dc810e39 1552 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1553
217aa764
AM
1554 ret = bfd_malloc (amt);
1555 if (ret == NULL)
252b5132
RH
1556 return NULL;
1557
1558 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc))
1559 {
e2d34d7d 1560 free (ret);
252b5132
RH
1561 return NULL;
1562 }
1563
1564 return &ret->root;
1565}
1566
1567/* This is a hook for the ELF emulation code in the generic linker to
1568 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1569 entry for a dynamic object. */
252b5132
RH
1570
1571void
217aa764 1572bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1573{
1574 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1575 && bfd_get_format (abfd) == bfd_object)
1576 elf_dt_name (abfd) = name;
1577}
1578
e56f61be
L
1579int
1580bfd_elf_get_dyn_lib_class (bfd *abfd)
1581{
1582 int lib_class;
1583 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1584 && bfd_get_format (abfd) == bfd_object)
1585 lib_class = elf_dyn_lib_class (abfd);
1586 else
1587 lib_class = 0;
1588 return lib_class;
1589}
1590
74816898 1591void
4a43e768 1592bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1593{
1594 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1595 && bfd_get_format (abfd) == bfd_object)
4a43e768 1596 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1597}
1598
252b5132
RH
1599/* Get the list of DT_NEEDED entries for a link. This is a hook for
1600 the linker ELF emulation code. */
1601
1602struct bfd_link_needed_list *
217aa764
AM
1603bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1604 struct bfd_link_info *info)
252b5132 1605{
0eddce27 1606 if (! is_elf_hash_table (info->hash))
252b5132
RH
1607 return NULL;
1608 return elf_hash_table (info)->needed;
1609}
1610
a963dc6a
L
1611/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1612 hook for the linker ELF emulation code. */
1613
1614struct bfd_link_needed_list *
217aa764
AM
1615bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1616 struct bfd_link_info *info)
a963dc6a 1617{
0eddce27 1618 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1619 return NULL;
1620 return elf_hash_table (info)->runpath;
1621}
1622
252b5132
RH
1623/* Get the name actually used for a dynamic object for a link. This
1624 is the SONAME entry if there is one. Otherwise, it is the string
1625 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1626
1627const char *
217aa764 1628bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1629{
1630 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1631 && bfd_get_format (abfd) == bfd_object)
1632 return elf_dt_name (abfd);
1633 return NULL;
1634}
1635
1636/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1637 the ELF linker emulation code. */
1638
b34976b6 1639bfd_boolean
217aa764
AM
1640bfd_elf_get_bfd_needed_list (bfd *abfd,
1641 struct bfd_link_needed_list **pneeded)
252b5132
RH
1642{
1643 asection *s;
1644 bfd_byte *dynbuf = NULL;
1645 int elfsec;
dc810e39 1646 unsigned long shlink;
252b5132
RH
1647 bfd_byte *extdyn, *extdynend;
1648 size_t extdynsize;
217aa764 1649 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1650
1651 *pneeded = NULL;
1652
1653 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1654 || bfd_get_format (abfd) != bfd_object)
b34976b6 1655 return TRUE;
252b5132
RH
1656
1657 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1658 if (s == NULL || s->size == 0)
b34976b6 1659 return TRUE;
252b5132 1660
eea6121a 1661 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1662 goto error_return;
1663
1664 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1665 if (elfsec == -1)
1666 goto error_return;
1667
dc810e39 1668 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1669
1670 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1671 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1672
1673 extdyn = dynbuf;
eea6121a 1674 extdynend = extdyn + s->size;
252b5132
RH
1675 for (; extdyn < extdynend; extdyn += extdynsize)
1676 {
1677 Elf_Internal_Dyn dyn;
1678
217aa764 1679 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1680
1681 if (dyn.d_tag == DT_NULL)
1682 break;
1683
1684 if (dyn.d_tag == DT_NEEDED)
1685 {
1686 const char *string;
1687 struct bfd_link_needed_list *l;
dc810e39
AM
1688 unsigned int tagv = dyn.d_un.d_val;
1689 bfd_size_type amt;
252b5132 1690
dc810e39 1691 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1692 if (string == NULL)
1693 goto error_return;
1694
dc810e39 1695 amt = sizeof *l;
217aa764 1696 l = bfd_alloc (abfd, amt);
252b5132
RH
1697 if (l == NULL)
1698 goto error_return;
1699
1700 l->by = abfd;
1701 l->name = string;
1702 l->next = *pneeded;
1703 *pneeded = l;
1704 }
1705 }
1706
1707 free (dynbuf);
1708
b34976b6 1709 return TRUE;
252b5132
RH
1710
1711 error_return:
1712 if (dynbuf != NULL)
1713 free (dynbuf);
b34976b6 1714 return FALSE;
252b5132
RH
1715}
1716\f
1717/* Allocate an ELF string table--force the first byte to be zero. */
1718
1719struct bfd_strtab_hash *
217aa764 1720_bfd_elf_stringtab_init (void)
252b5132
RH
1721{
1722 struct bfd_strtab_hash *ret;
1723
1724 ret = _bfd_stringtab_init ();
1725 if (ret != NULL)
1726 {
1727 bfd_size_type loc;
1728
b34976b6 1729 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1730 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1731 if (loc == (bfd_size_type) -1)
1732 {
1733 _bfd_stringtab_free (ret);
1734 ret = NULL;
1735 }
1736 }
1737 return ret;
1738}
1739\f
1740/* ELF .o/exec file reading */
1741
c044fabd 1742/* Create a new bfd section from an ELF section header. */
252b5132 1743
b34976b6 1744bfd_boolean
217aa764 1745bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1746{
1747 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1748 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1749 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1750 const char *name;
252b5132 1751
1b3a8575
AM
1752 name = bfd_elf_string_from_elf_section (abfd,
1753 elf_elfheader (abfd)->e_shstrndx,
1754 hdr->sh_name);
933d961a
JJ
1755 if (name == NULL)
1756 return FALSE;
252b5132
RH
1757
1758 switch (hdr->sh_type)
1759 {
1760 case SHT_NULL:
1761 /* Inactive section. Throw it away. */
b34976b6 1762 return TRUE;
252b5132
RH
1763
1764 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1765 case SHT_NOBITS: /* .bss section. */
1766 case SHT_HASH: /* .hash section. */
1767 case SHT_NOTE: /* .note section. */
25e27870
L
1768 case SHT_INIT_ARRAY: /* .init_array section. */
1769 case SHT_FINI_ARRAY: /* .fini_array section. */
1770 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1771 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
6dc132d9 1772 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1773
797fc050 1774 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1775 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1776 return FALSE;
8e0ed13f
NC
1777 if (hdr->sh_link > elf_numsections (abfd)
1778 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1779 return FALSE;
797fc050
AM
1780 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1781 {
1782 Elf_Internal_Shdr *dynsymhdr;
1783
1784 /* The shared libraries distributed with hpux11 have a bogus
1785 sh_link field for the ".dynamic" section. Find the
1786 string table for the ".dynsym" section instead. */
1787 if (elf_dynsymtab (abfd) != 0)
1788 {
1789 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1790 hdr->sh_link = dynsymhdr->sh_link;
1791 }
1792 else
1793 {
1794 unsigned int i, num_sec;
1795
1796 num_sec = elf_numsections (abfd);
1797 for (i = 1; i < num_sec; i++)
1798 {
1799 dynsymhdr = elf_elfsections (abfd)[i];
1800 if (dynsymhdr->sh_type == SHT_DYNSYM)
1801 {
1802 hdr->sh_link = dynsymhdr->sh_link;
1803 break;
1804 }
1805 }
1806 }
1807 }
1808 break;
1809
252b5132
RH
1810 case SHT_SYMTAB: /* A symbol table */
1811 if (elf_onesymtab (abfd) == shindex)
b34976b6 1812 return TRUE;
252b5132 1813
a50b2160
JJ
1814 if (hdr->sh_entsize != bed->s->sizeof_sym)
1815 return FALSE;
252b5132
RH
1816 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1817 elf_onesymtab (abfd) = shindex;
1818 elf_tdata (abfd)->symtab_hdr = *hdr;
1819 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1820 abfd->flags |= HAS_SYMS;
1821
1822 /* Sometimes a shared object will map in the symbol table. If
1823 SHF_ALLOC is set, and this is a shared object, then we also
1824 treat this section as a BFD section. We can not base the
1825 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1826 set in a relocatable object file, which would confuse the
252b5132
RH
1827 linker. */
1828 if ((hdr->sh_flags & SHF_ALLOC) != 0
1829 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1830 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1831 shindex))
b34976b6 1832 return FALSE;
252b5132 1833
1b3a8575
AM
1834 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1835 can't read symbols without that section loaded as well. It
1836 is most likely specified by the next section header. */
1837 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1838 {
1839 unsigned int i, num_sec;
1840
1841 num_sec = elf_numsections (abfd);
1842 for (i = shindex + 1; i < num_sec; i++)
1843 {
1844 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1845 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1846 && hdr2->sh_link == shindex)
1847 break;
1848 }
1849 if (i == num_sec)
1850 for (i = 1; i < shindex; i++)
1851 {
1852 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1853 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1854 && hdr2->sh_link == shindex)
1855 break;
1856 }
1857 if (i != shindex)
1858 return bfd_section_from_shdr (abfd, i);
1859 }
b34976b6 1860 return TRUE;
252b5132
RH
1861
1862 case SHT_DYNSYM: /* A dynamic symbol table */
1863 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1864 return TRUE;
252b5132 1865
a50b2160
JJ
1866 if (hdr->sh_entsize != bed->s->sizeof_sym)
1867 return FALSE;
252b5132
RH
1868 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1869 elf_dynsymtab (abfd) = shindex;
1870 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1871 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1872 abfd->flags |= HAS_SYMS;
1873
1874 /* Besides being a symbol table, we also treat this as a regular
1875 section, so that objcopy can handle it. */
6dc132d9 1876 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1877
9ad5cbcf
AM
1878 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1879 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1880 return TRUE;
9ad5cbcf 1881
1b3a8575 1882 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1883 elf_symtab_shndx (abfd) = shindex;
1884 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1885 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1886 return TRUE;
9ad5cbcf 1887
252b5132
RH
1888 case SHT_STRTAB: /* A string table */
1889 if (hdr->bfd_section != NULL)
b34976b6 1890 return TRUE;
252b5132
RH
1891 if (ehdr->e_shstrndx == shindex)
1892 {
1893 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1894 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1895 return TRUE;
252b5132 1896 }
1b3a8575
AM
1897 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1898 {
1899 symtab_strtab:
1900 elf_tdata (abfd)->strtab_hdr = *hdr;
1901 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1902 return TRUE;
1903 }
1904 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1905 {
1906 dynsymtab_strtab:
1907 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1908 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1909 elf_elfsections (abfd)[shindex] = hdr;
1910 /* We also treat this as a regular section, so that objcopy
1911 can handle it. */
6dc132d9
L
1912 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1913 shindex);
1b3a8575 1914 }
252b5132 1915
1b3a8575
AM
1916 /* If the string table isn't one of the above, then treat it as a
1917 regular section. We need to scan all the headers to be sure,
1918 just in case this strtab section appeared before the above. */
1919 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1920 {
1921 unsigned int i, num_sec;
252b5132 1922
1b3a8575
AM
1923 num_sec = elf_numsections (abfd);
1924 for (i = 1; i < num_sec; i++)
1925 {
1926 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1927 if (hdr2->sh_link == shindex)
1928 {
933d961a
JJ
1929 /* Prevent endless recursion on broken objects. */
1930 if (i == shindex)
1931 return FALSE;
1b3a8575
AM
1932 if (! bfd_section_from_shdr (abfd, i))
1933 return FALSE;
1934 if (elf_onesymtab (abfd) == i)
1935 goto symtab_strtab;
1936 if (elf_dynsymtab (abfd) == i)
1937 goto dynsymtab_strtab;
1938 }
1939 }
1940 }
6dc132d9 1941 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1942
1943 case SHT_REL:
1944 case SHT_RELA:
1945 /* *These* do a lot of work -- but build no sections! */
1946 {
1947 asection *target_sect;
1948 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1949 unsigned int num_sec = elf_numsections (abfd);
252b5132 1950
a50b2160
JJ
1951 if (hdr->sh_entsize != (hdr->sh_type == SHT_REL
1952 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1953 return FALSE;
1954
03ae5f59 1955 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1956 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1957 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1958 {
1959 ((*_bfd_error_handler)
d003868e
AM
1960 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1961 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1962 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1963 shindex);
03ae5f59
ILT
1964 }
1965
252b5132
RH
1966 /* For some incomprehensible reason Oracle distributes
1967 libraries for Solaris in which some of the objects have
1968 bogus sh_link fields. It would be nice if we could just
1969 reject them, but, unfortunately, some people need to use
1970 them. We scan through the section headers; if we find only
1971 one suitable symbol table, we clobber the sh_link to point
1972 to it. I hope this doesn't break anything. */
1973 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1974 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1975 {
9ad5cbcf 1976 unsigned int scan;
252b5132
RH
1977 int found;
1978
1979 found = 0;
9ad5cbcf 1980 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1981 {
1982 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1983 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1984 {
1985 if (found != 0)
1986 {
1987 found = 0;
1988 break;
1989 }
1990 found = scan;
1991 }
1992 }
1993 if (found != 0)
1994 hdr->sh_link = found;
1995 }
1996
1997 /* Get the symbol table. */
1b3a8575
AM
1998 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1999 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2000 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 2001 return FALSE;
252b5132
RH
2002
2003 /* If this reloc section does not use the main symbol table we
2004 don't treat it as a reloc section. BFD can't adequately
2005 represent such a section, so at least for now, we don't
c044fabd 2006 try. We just present it as a normal section. We also
60bcf0fa 2007 can't use it as a reloc section if it points to the null
c044fabd 2008 section. */
60bcf0fa 2009 if (hdr->sh_link != elf_onesymtab (abfd) || hdr->sh_info == SHN_UNDEF)
6dc132d9
L
2010 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2011 shindex);
252b5132 2012
a50b2160
JJ
2013 /* Prevent endless recursion on broken objects. */
2014 if (elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2015 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2016 return FALSE;
252b5132 2017 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2018 return FALSE;
252b5132
RH
2019 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2020 if (target_sect == NULL)
b34976b6 2021 return FALSE;
252b5132
RH
2022
2023 if ((target_sect->flags & SEC_RELOC) == 0
2024 || target_sect->reloc_count == 0)
2025 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2026 else
2027 {
dc810e39 2028 bfd_size_type amt;
252b5132 2029 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2030 amt = sizeof (*hdr2);
217aa764 2031 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2032 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2033 }
2034 *hdr2 = *hdr;
2035 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2036 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2037 target_sect->flags |= SEC_RELOC;
2038 target_sect->relocation = NULL;
2039 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2040 /* In the section to which the relocations apply, mark whether
2041 its relocations are of the REL or RELA variety. */
72730e0c 2042 if (hdr->sh_size != 0)
68bfbfcc 2043 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2044 abfd->flags |= HAS_RELOC;
b34976b6 2045 return TRUE;
252b5132
RH
2046 }
2047 break;
2048
2049 case SHT_GNU_verdef:
2050 elf_dynverdef (abfd) = shindex;
2051 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2052 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2053 break;
2054
2055 case SHT_GNU_versym:
a50b2160
JJ
2056 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2057 return FALSE;
252b5132
RH
2058 elf_dynversym (abfd) = shindex;
2059 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2060 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2061 break;
2062
2063 case SHT_GNU_verneed:
2064 elf_dynverref (abfd) = shindex;
2065 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2066 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2067 break;
2068
2069 case SHT_SHLIB:
b34976b6 2070 return TRUE;
252b5132 2071
dbb410c3 2072 case SHT_GROUP:
b885599b
AM
2073 /* We need a BFD section for objcopy and relocatable linking,
2074 and it's handy to have the signature available as the section
2075 name. */
a50b2160
JJ
2076 if (hdr->sh_entsize != GRP_ENTRY_SIZE)
2077 return FALSE;
b885599b
AM
2078 name = group_signature (abfd, hdr);
2079 if (name == NULL)
b34976b6 2080 return FALSE;
6dc132d9 2081 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2082 return FALSE;
dbb410c3
AM
2083 if (hdr->contents != NULL)
2084 {
2085 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2086 unsigned int n_elt = hdr->sh_size / 4;
2087 asection *s;
2088
b885599b
AM
2089 if (idx->flags & GRP_COMDAT)
2090 hdr->bfd_section->flags
2091 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2092
45c5e9ed
L
2093 /* We try to keep the same section order as it comes in. */
2094 idx += n_elt;
dbb410c3 2095 while (--n_elt != 0)
45c5e9ed 2096 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2097 && elf_next_in_group (s) != NULL)
dbb410c3 2098 {
945906ff 2099 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2100 break;
2101 }
2102 }
2103 break;
2104
252b5132
RH
2105 default:
2106 /* Check for any processor-specific section types. */
6dc132d9
L
2107 return bed->elf_backend_section_from_shdr (abfd, hdr, name,
2108 shindex);
252b5132
RH
2109 }
2110
b34976b6 2111 return TRUE;
252b5132
RH
2112}
2113
ec338859
AM
2114/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2115 Return SEC for sections that have no elf section, and NULL on error. */
2116
2117asection *
217aa764
AM
2118bfd_section_from_r_symndx (bfd *abfd,
2119 struct sym_sec_cache *cache,
2120 asection *sec,
2121 unsigned long r_symndx)
ec338859 2122{
ec338859 2123 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2124 unsigned char esym[sizeof (Elf64_External_Sym)];
2125 Elf_External_Sym_Shndx eshndx;
2126 Elf_Internal_Sym isym;
ec338859
AM
2127 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2128
2129 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2130 return cache->sec[ent];
2131
2132 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2133 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2134 &isym, esym, &eshndx) == NULL)
ec338859 2135 return NULL;
9ad5cbcf 2136
ec338859
AM
2137 if (cache->abfd != abfd)
2138 {
2139 memset (cache->indx, -1, sizeof (cache->indx));
2140 cache->abfd = abfd;
2141 }
2142 cache->indx[ent] = r_symndx;
2143 cache->sec[ent] = sec;
50bc7936
AM
2144 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2145 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2146 {
2147 asection *s;
6cdc0ccc 2148 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2149 if (s != NULL)
2150 cache->sec[ent] = s;
2151 }
2152 return cache->sec[ent];
2153}
2154
252b5132
RH
2155/* Given an ELF section number, retrieve the corresponding BFD
2156 section. */
2157
2158asection *
217aa764 2159bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2160{
9ad5cbcf 2161 if (index >= elf_numsections (abfd))
252b5132
RH
2162 return NULL;
2163 return elf_elfsections (abfd)[index]->bfd_section;
2164}
2165
7f4d3958 2166static struct bfd_elf_special_section const special_sections_b[] =
2f89ff8d 2167{
7dcb9820 2168 { ".bss", 4, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7f4d3958
L
2169 { NULL, 0, 0, 0, 0 }
2170};
2171
2172static struct bfd_elf_special_section const special_sections_c[] =
2173{
7dcb9820 2174 { ".comment", 8, 0, SHT_PROGBITS, 0 },
7f4d3958
L
2175 { NULL, 0, 0, 0, 0 }
2176};
2177
2178static struct bfd_elf_special_section const special_sections_d[] =
2179{
7dcb9820
AM
2180 { ".data", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2181 { ".data1", 6, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2182 { ".debug", 6, 0, SHT_PROGBITS, 0 },
7dcb9820
AM
2183 { ".debug_line", 11, 0, SHT_PROGBITS, 0 },
2184 { ".debug_info", 11, 0, SHT_PROGBITS, 0 },
2185 { ".debug_abbrev", 13, 0, SHT_PROGBITS, 0 },
2186 { ".debug_aranges", 14, 0, SHT_PROGBITS, 0 },
2187 { ".dynamic", 8, 0, SHT_DYNAMIC, SHF_ALLOC },
2188 { ".dynstr", 7, 0, SHT_STRTAB, SHF_ALLOC },
2189 { ".dynsym", 7, 0, SHT_DYNSYM, SHF_ALLOC },
7f4d3958
L
2190 { NULL, 0, 0, 0, 0 }
2191};
2192
2193static struct bfd_elf_special_section const special_sections_f[] =
2194{
2195 { ".fini", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2196 { ".fini_array", 11, 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2197 { NULL, 0, 0, 0, 0 }
2198};
2199
2200static struct bfd_elf_special_section const special_sections_g[] =
2201{
2202 { ".gnu.linkonce.b",15, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820 2203 { ".got", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
7dcb9820
AM
2204 { ".gnu.version", 12, 0, SHT_GNU_versym, 0 },
2205 { ".gnu.version_d", 14, 0, SHT_GNU_verdef, 0 },
2206 { ".gnu.version_r", 14, 0, SHT_GNU_verneed, 0 },
7f4d3958
L
2207 { ".gnu.liblist", 12, 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2208 { ".gnu.conflict", 13, 0, SHT_RELA, SHF_ALLOC },
2209 { NULL, 0, 0, 0, 0 }
2210};
2211
2212static struct bfd_elf_special_section const special_sections_h[] =
2213{
2214 { ".hash", 5, 0, SHT_HASH, SHF_ALLOC },
2215 { NULL, 0, 0, 0, 0 }
2216};
2217
2218static struct bfd_elf_special_section const special_sections_i[] =
2219{
2220 { ".init", 5, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2221 { ".init_array", 11, 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2222 { ".interp", 7, 0, SHT_PROGBITS, 0 },
2223 { NULL, 0, 0, 0, 0 }
2224};
2225
2226static struct bfd_elf_special_section const special_sections_l[] =
2227{
2228 { ".line", 5, 0, SHT_PROGBITS, 0 },
2229 { NULL, 0, 0, 0, 0 }
2230};
2231
2232static struct bfd_elf_special_section const special_sections_n[] =
2233{
45c5e9ed 2234 { ".note.GNU-stack",15, 0, SHT_PROGBITS, 0 },
7dcb9820 2235 { ".note", 5, -1, SHT_NOTE, 0 },
7f4d3958
L
2236 { NULL, 0, 0, 0, 0 }
2237};
2238
2239static struct bfd_elf_special_section const special_sections_p[] =
2240{
2241 { ".preinit_array", 14, 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2242 { ".plt", 4, 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2243 { NULL, 0, 0, 0, 0 }
2244};
2245
2246static struct bfd_elf_special_section const special_sections_r[] =
2247{
2248 { ".rodata", 7, -2, SHT_PROGBITS, SHF_ALLOC },
2249 { ".rodata1", 8, 0, SHT_PROGBITS, SHF_ALLOC },
7dcb9820
AM
2250 { ".rela", 5, -1, SHT_RELA, 0 },
2251 { ".rel", 4, -1, SHT_REL, 0 },
7f4d3958
L
2252 { NULL, 0, 0, 0, 0 }
2253};
2254
2255static struct bfd_elf_special_section const special_sections_s[] =
2256{
2257 { ".shstrtab", 9, 0, SHT_STRTAB, 0 },
2258 { ".strtab", 7, 0, SHT_STRTAB, 0 },
2259 { ".symtab", 7, 0, SHT_SYMTAB, 0 },
7dcb9820
AM
2260 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2261 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2262};
2263
7f4d3958
L
2264static struct bfd_elf_special_section const special_sections_t[] =
2265{
2266 { ".text", 5, -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2267 { ".tbss", 5, -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2268 { ".tdata", 6, -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2269 { NULL, 0, 0, 0, 0 }
2270};
2271
2272static struct bfd_elf_special_section const *special_sections [27] =
2273{
2274 NULL, /* 'a' */
2275 special_sections_b, /* 'b' */
2276 special_sections_c, /* 'b' */
2277 special_sections_d, /* 'd' */
2278 NULL, /* 'e' */
2279 special_sections_f, /* 'f' */
2280 special_sections_g, /* 'g' */
2281 special_sections_h, /* 'h' */
2282 special_sections_i, /* 'i' */
2283 NULL, /* 'j' */
2284 NULL, /* 'k' */
2285 special_sections_l, /* 'l' */
2286 NULL, /* 'm' */
2287 special_sections_n, /* 'n' */
2288 NULL, /* 'o' */
2289 special_sections_p, /* 'p' */
2290 NULL, /* 'q' */
2291 special_sections_r, /* 'r' */
2292 special_sections_s, /* 's' */
2293 special_sections_t, /* 't' */
2294 NULL, /* 'u' */
2295 NULL, /* 'v' */
2296 NULL, /* 'w' */
2297 NULL, /* 'x' */
2298 NULL, /* 'y' */
2299 NULL, /* 'z' */
2300 NULL /* other */
2301};
2302
2f89ff8d
L
2303static const struct bfd_elf_special_section *
2304get_special_section (const char *name,
7f4d3958 2305 const struct bfd_elf_special_section **special_sections_p,
2f89ff8d
L
2306 unsigned int rela)
2307{
2308 int i;
7f4d3958
L
2309 int len;
2310 const struct bfd_elf_special_section *special_sections;
2311
2312 if (name [0] == '.')
2313 {
2314 i = name [1] - 'a';
2315 if (i < 0 || i > 25)
2316 i = 26;
2317 }
2318 else
2319 i = 26;
2320
2321 special_sections = special_sections_p [i];
2322
2323 if (!special_sections)
2324 return special_sections;
2325
2326 len= strlen (name);
2f89ff8d
L
2327
2328 for (i = 0; special_sections[i].prefix != NULL; i++)
7dcb9820
AM
2329 {
2330 int suffix_len;
2331 int prefix_len = special_sections[i].prefix_length;
2332
2333 if (len < prefix_len)
2334 continue;
2335 if (memcmp (name, special_sections[i].prefix, prefix_len) != 0)
2336 continue;
2337
2338 suffix_len = special_sections[i].suffix_length;
2339 if (suffix_len <= 0)
2340 {
2341 if (name[prefix_len] != 0)
2342 {
2343 if (suffix_len == 0)
2344 continue;
2345 if (name[prefix_len] != '.'
2346 && (suffix_len == -2
2347 || (rela && special_sections[i].type == SHT_REL)))
2348 continue;
2349 }
2350 }
2351 else
2352 {
2353 if (len < prefix_len + suffix_len)
2354 continue;
2355 if (memcmp (name + len - suffix_len,
2356 special_sections[i].prefix + prefix_len,
2357 suffix_len) != 0)
2358 continue;
2359 }
2f89ff8d 2360 return &special_sections[i];
7dcb9820 2361 }
2f89ff8d
L
2362
2363 return NULL;
2364}
2365
7dcb9820
AM
2366const struct bfd_elf_special_section *
2367_bfd_elf_get_sec_type_attr (bfd *abfd, const char *name)
2f89ff8d 2368{
9c5bfbb7 2369 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7dcb9820 2370 const struct bfd_elf_special_section *ssect = NULL;
2f89ff8d
L
2371
2372 /* See if this is one of the special sections. */
2373 if (name)
2374 {
9c5bfbb7 2375 unsigned int rela = bed->default_use_rela_p;
2f89ff8d
L
2376
2377 if (bed->special_sections)
2378 ssect = get_special_section (name, bed->special_sections, rela);
2379
2380 if (! ssect)
2381 ssect = get_special_section (name, special_sections, rela);
2f89ff8d
L
2382 }
2383
7dcb9820 2384 return ssect;
2f89ff8d
L
2385}
2386
b34976b6 2387bfd_boolean
217aa764 2388_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2389{
2390 struct bfd_elf_section_data *sdata;
7dcb9820 2391 const struct bfd_elf_special_section *ssect;
252b5132 2392
f0abc2a1
AM
2393 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2394 if (sdata == NULL)
2395 {
217aa764 2396 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2397 if (sdata == NULL)
2398 return FALSE;
217aa764 2399 sec->used_by_bfd = sdata;
f0abc2a1 2400 }
bf572ba0 2401
3496cb2a
L
2402 /* When we read a file, we don't need section type and flags unless
2403 it is a linker created section. They will be overridden in
2404 _bfd_elf_make_section_from_shdr anyway. */
2405 if (abfd->direction != read_direction
2406 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2407 {
a31501e9
L
2408 ssect = _bfd_elf_get_sec_type_attr (abfd, sec->name);
2409 if (ssect != NULL)
2410 {
2411 elf_section_type (sec) = ssect->type;
2412 elf_section_flags (sec) = ssect->attr;
2413 }
2f89ff8d
L
2414 }
2415
bf572ba0 2416 /* Indicate whether or not this section should use RELA relocations. */
68bfbfcc 2417 sec->use_rela_p = get_elf_backend_data (abfd)->default_use_rela_p;
bf572ba0 2418
b34976b6 2419 return TRUE;
252b5132
RH
2420}
2421
2422/* Create a new bfd section from an ELF program header.
2423
2424 Since program segments have no names, we generate a synthetic name
2425 of the form segment<NUM>, where NUM is generally the index in the
2426 program header table. For segments that are split (see below) we
2427 generate the names segment<NUM>a and segment<NUM>b.
2428
2429 Note that some program segments may have a file size that is different than
2430 (less than) the memory size. All this means is that at execution the
2431 system must allocate the amount of memory specified by the memory size,
2432 but only initialize it with the first "file size" bytes read from the
2433 file. This would occur for example, with program segments consisting
2434 of combined data+bss.
2435
2436 To handle the above situation, this routine generates TWO bfd sections
2437 for the single program segment. The first has the length specified by
2438 the file size of the segment, and the second has the length specified
2439 by the difference between the two sizes. In effect, the segment is split
2440 into it's initialized and uninitialized parts.
2441
2442 */
2443
b34976b6 2444bfd_boolean
217aa764
AM
2445_bfd_elf_make_section_from_phdr (bfd *abfd,
2446 Elf_Internal_Phdr *hdr,
2447 int index,
2448 const char *typename)
252b5132
RH
2449{
2450 asection *newsect;
2451 char *name;
2452 char namebuf[64];
d4c88bbb 2453 size_t len;
252b5132
RH
2454 int split;
2455
2456 split = ((hdr->p_memsz > 0)
2457 && (hdr->p_filesz > 0)
2458 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2459 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2460 len = strlen (namebuf) + 1;
217aa764 2461 name = bfd_alloc (abfd, len);
252b5132 2462 if (!name)
b34976b6 2463 return FALSE;
d4c88bbb 2464 memcpy (name, namebuf, len);
252b5132
RH
2465 newsect = bfd_make_section (abfd, name);
2466 if (newsect == NULL)
b34976b6 2467 return FALSE;
252b5132
RH
2468 newsect->vma = hdr->p_vaddr;
2469 newsect->lma = hdr->p_paddr;
eea6121a 2470 newsect->size = hdr->p_filesz;
252b5132
RH
2471 newsect->filepos = hdr->p_offset;
2472 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2473 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2474 if (hdr->p_type == PT_LOAD)
2475 {
2476 newsect->flags |= SEC_ALLOC;
2477 newsect->flags |= SEC_LOAD;
2478 if (hdr->p_flags & PF_X)
2479 {
2480 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2481 may be data. */
252b5132
RH
2482 newsect->flags |= SEC_CODE;
2483 }
2484 }
2485 if (!(hdr->p_flags & PF_W))
2486 {
2487 newsect->flags |= SEC_READONLY;
2488 }
2489
2490 if (split)
2491 {
27ac83bf 2492 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2493 len = strlen (namebuf) + 1;
217aa764 2494 name = bfd_alloc (abfd, len);
252b5132 2495 if (!name)
b34976b6 2496 return FALSE;
d4c88bbb 2497 memcpy (name, namebuf, len);
252b5132
RH
2498 newsect = bfd_make_section (abfd, name);
2499 if (newsect == NULL)
b34976b6 2500 return FALSE;
252b5132
RH
2501 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2502 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2503 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2504 if (hdr->p_type == PT_LOAD)
2505 {
2506 newsect->flags |= SEC_ALLOC;
2507 if (hdr->p_flags & PF_X)
2508 newsect->flags |= SEC_CODE;
2509 }
2510 if (!(hdr->p_flags & PF_W))
2511 newsect->flags |= SEC_READONLY;
2512 }
2513
b34976b6 2514 return TRUE;
252b5132
RH
2515}
2516
b34976b6 2517bfd_boolean
217aa764 2518bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2519{
9c5bfbb7 2520 const struct elf_backend_data *bed;
20cfcaae
NC
2521
2522 switch (hdr->p_type)
2523 {
2524 case PT_NULL:
2525 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2526
2527 case PT_LOAD:
2528 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2529
2530 case PT_DYNAMIC:
2531 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2532
2533 case PT_INTERP:
2534 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2535
2536 case PT_NOTE:
2537 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2538 return FALSE;
217aa764 2539 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2540 return FALSE;
2541 return TRUE;
20cfcaae
NC
2542
2543 case PT_SHLIB:
2544 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2545
2546 case PT_PHDR:
2547 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2548
811072d8
RM
2549 case PT_GNU_EH_FRAME:
2550 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2551 "eh_frame_hdr");
2552
9ee5e499
JJ
2553 case PT_GNU_STACK:
2554 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2555
8c37241b
JJ
2556 case PT_GNU_RELRO:
2557 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2558
20cfcaae 2559 default:
8c1acd09 2560 /* Check for any processor-specific program segment types. */
20cfcaae 2561 bed = get_elf_backend_data (abfd);
d27f5fa1 2562 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2563 }
2564}
2565
23bc299b 2566/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2567 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2568 relocations; otherwise, we use REL relocations. */
2569
b34976b6 2570bfd_boolean
217aa764
AM
2571_bfd_elf_init_reloc_shdr (bfd *abfd,
2572 Elf_Internal_Shdr *rel_hdr,
2573 asection *asect,
2574 bfd_boolean use_rela_p)
23bc299b
MM
2575{
2576 char *name;
9c5bfbb7 2577 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2578 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2579
dc810e39 2580 name = bfd_alloc (abfd, amt);
23bc299b 2581 if (name == NULL)
b34976b6 2582 return FALSE;
23bc299b
MM
2583 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2584 rel_hdr->sh_name =
2b0f7ef9 2585 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2586 FALSE);
23bc299b 2587 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2588 return FALSE;
23bc299b
MM
2589 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2590 rel_hdr->sh_entsize = (use_rela_p
2591 ? bed->s->sizeof_rela
2592 : bed->s->sizeof_rel);
45d6a902 2593 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2594 rel_hdr->sh_flags = 0;
2595 rel_hdr->sh_addr = 0;
2596 rel_hdr->sh_size = 0;
2597 rel_hdr->sh_offset = 0;
2598
b34976b6 2599 return TRUE;
23bc299b
MM
2600}
2601
252b5132
RH
2602/* Set up an ELF internal section header for a section. */
2603
252b5132 2604static void
217aa764 2605elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2606{
9c5bfbb7 2607 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2608 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2609 Elf_Internal_Shdr *this_hdr;
2610
2611 if (*failedptr)
2612 {
2613 /* We already failed; just get out of the bfd_map_over_sections
2614 loop. */
2615 return;
2616 }
2617
2618 this_hdr = &elf_section_data (asect)->this_hdr;
2619
e57b5356
AM
2620 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2621 asect->name, FALSE);
2622 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2623 {
b34976b6 2624 *failedptr = TRUE;
252b5132
RH
2625 return;
2626 }
2627
2628 this_hdr->sh_flags = 0;
2629
2630 if ((asect->flags & SEC_ALLOC) != 0
2631 || asect->user_set_vma)
2632 this_hdr->sh_addr = asect->vma;
2633 else
2634 this_hdr->sh_addr = 0;
2635
2636 this_hdr->sh_offset = 0;
eea6121a 2637 this_hdr->sh_size = asect->size;
252b5132
RH
2638 this_hdr->sh_link = 0;
2639 this_hdr->sh_addralign = 1 << asect->alignment_power;
2640 /* The sh_entsize and sh_info fields may have been set already by
2641 copy_private_section_data. */
2642
2643 this_hdr->bfd_section = asect;
2644 this_hdr->contents = NULL;
2645
3cddba1e
L
2646 /* If the section type is unspecified, we set it based on
2647 asect->flags. */
2648 if (this_hdr->sh_type == SHT_NULL)
2649 {
45c5e9ed
L
2650 if ((asect->flags & SEC_GROUP) != 0)
2651 {
2652 /* We also need to mark SHF_GROUP here for relocatable
2653 link. */
2654 struct bfd_link_order *l;
2655 asection *elt;
2656
8423293d 2657 for (l = asect->map_head.link_order; l != NULL; l = l->next)
45c5e9ed
L
2658 if (l->type == bfd_indirect_link_order
2659 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
2660 do
2661 {
2662 /* The name is not important. Anything will do. */
2663 elf_group_name (elt->output_section) = "G";
2664 elf_section_flags (elt->output_section) |= SHF_GROUP;
2665
2666 elt = elf_next_in_group (elt);
2667 /* During a relocatable link, the lists are
2668 circular. */
2669 }
2670 while (elt != elf_next_in_group (l->u.indirect.section));
2671
2672 this_hdr->sh_type = SHT_GROUP;
2673 }
2674 else if ((asect->flags & SEC_ALLOC) != 0
3cddba1e
L
2675 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2676 || (asect->flags & SEC_NEVER_LOAD) != 0))
2677 this_hdr->sh_type = SHT_NOBITS;
2678 else
2679 this_hdr->sh_type = SHT_PROGBITS;
2680 }
2681
2f89ff8d 2682 switch (this_hdr->sh_type)
252b5132 2683 {
2f89ff8d 2684 default:
2f89ff8d
L
2685 break;
2686
2687 case SHT_STRTAB:
2688 case SHT_INIT_ARRAY:
2689 case SHT_FINI_ARRAY:
2690 case SHT_PREINIT_ARRAY:
2691 case SHT_NOTE:
2692 case SHT_NOBITS:
2693 case SHT_PROGBITS:
2694 break;
2695
2696 case SHT_HASH:
c7ac6ff8 2697 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2698 break;
5de3bf90 2699
2f89ff8d 2700 case SHT_DYNSYM:
252b5132 2701 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2702 break;
2703
2704 case SHT_DYNAMIC:
252b5132 2705 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2706 break;
2707
2708 case SHT_RELA:
2709 if (get_elf_backend_data (abfd)->may_use_rela_p)
2710 this_hdr->sh_entsize = bed->s->sizeof_rela;
2711 break;
2712
2713 case SHT_REL:
2714 if (get_elf_backend_data (abfd)->may_use_rel_p)
2715 this_hdr->sh_entsize = bed->s->sizeof_rel;
2716 break;
2717
2718 case SHT_GNU_versym:
252b5132 2719 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2720 break;
2721
2722 case SHT_GNU_verdef:
252b5132
RH
2723 this_hdr->sh_entsize = 0;
2724 /* objcopy or strip will copy over sh_info, but may not set
2725 cverdefs. The linker will set cverdefs, but sh_info will be
2726 zero. */
2727 if (this_hdr->sh_info == 0)
2728 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2729 else
2730 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2731 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2732 break;
2733
2734 case SHT_GNU_verneed:
252b5132
RH
2735 this_hdr->sh_entsize = 0;
2736 /* objcopy or strip will copy over sh_info, but may not set
2737 cverrefs. The linker will set cverrefs, but sh_info will be
2738 zero. */
2739 if (this_hdr->sh_info == 0)
2740 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2741 else
2742 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2743 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2744 break;
2745
2746 case SHT_GROUP:
dbb410c3 2747 this_hdr->sh_entsize = 4;
2f89ff8d 2748 break;
dbb410c3 2749 }
252b5132
RH
2750
2751 if ((asect->flags & SEC_ALLOC) != 0)
2752 this_hdr->sh_flags |= SHF_ALLOC;
2753 if ((asect->flags & SEC_READONLY) == 0)
2754 this_hdr->sh_flags |= SHF_WRITE;
2755 if ((asect->flags & SEC_CODE) != 0)
2756 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2757 if ((asect->flags & SEC_MERGE) != 0)
2758 {
2759 this_hdr->sh_flags |= SHF_MERGE;
2760 this_hdr->sh_entsize = asect->entsize;
2761 if ((asect->flags & SEC_STRINGS) != 0)
2762 this_hdr->sh_flags |= SHF_STRINGS;
2763 }
1126897b 2764 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2765 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2766 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2767 {
2768 this_hdr->sh_flags |= SHF_TLS;
eea6121a 2769 if (asect->size == 0 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60
JJ
2770 {
2771 struct bfd_link_order *o;
b34976b6 2772
704afa60 2773 this_hdr->sh_size = 0;
8423293d 2774 for (o = asect->map_head.link_order; o != NULL; o = o->next)
704afa60
JJ
2775 if (this_hdr->sh_size < o->offset + o->size)
2776 this_hdr->sh_size = o->offset + o->size;
2777 if (this_hdr->sh_size)
2778 this_hdr->sh_type = SHT_NOBITS;
2779 }
2780 }
252b5132
RH
2781
2782 /* Check for processor-specific section types. */
e1fddb6b
AO
2783 if (bed->elf_backend_fake_sections
2784 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2785 *failedptr = TRUE;
252b5132
RH
2786
2787 /* If the section has relocs, set up a section header for the
23bc299b
MM
2788 SHT_REL[A] section. If two relocation sections are required for
2789 this section, it is up to the processor-specific back-end to
c044fabd 2790 create the other. */
23bc299b 2791 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2792 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2793 &elf_section_data (asect)->rel_hdr,
c044fabd 2794 asect,
68bfbfcc 2795 asect->use_rela_p))
b34976b6 2796 *failedptr = TRUE;
252b5132
RH
2797}
2798
dbb410c3
AM
2799/* Fill in the contents of a SHT_GROUP section. */
2800
1126897b 2801void
217aa764 2802bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2803{
217aa764 2804 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2805 unsigned long symindx;
9dce4196 2806 asection *elt, *first;
dbb410c3
AM
2807 unsigned char *loc;
2808 struct bfd_link_order *l;
b34976b6 2809 bfd_boolean gas;
dbb410c3 2810
7e4111ad
L
2811 /* Ignore linker created group section. See elfNN_ia64_object_p in
2812 elfxx-ia64.c. */
2813 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2814 || *failedptr)
2815 return;
2816
1126897b
AM
2817 symindx = 0;
2818 if (elf_group_id (sec) != NULL)
2819 symindx = elf_group_id (sec)->udata.i;
2820
2821 if (symindx == 0)
2822 {
2823 /* If called from the assembler, swap_out_syms will have set up
2824 elf_section_syms; If called for "ld -r", use target_index. */
2825 if (elf_section_syms (abfd) != NULL)
2826 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2827 else
2828 symindx = sec->target_index;
2829 }
dbb410c3
AM
2830 elf_section_data (sec)->this_hdr.sh_info = symindx;
2831
1126897b 2832 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2833 gas = TRUE;
dbb410c3
AM
2834 if (sec->contents == NULL)
2835 {
b34976b6 2836 gas = FALSE;
eea6121a 2837 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2838
2839 /* Arrange for the section to be written out. */
2840 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2841 if (sec->contents == NULL)
2842 {
b34976b6 2843 *failedptr = TRUE;
dbb410c3
AM
2844 return;
2845 }
2846 }
2847
eea6121a 2848 loc = sec->contents + sec->size;
dbb410c3 2849
9dce4196
AM
2850 /* Get the pointer to the first section in the group that gas
2851 squirreled away here. objcopy arranges for this to be set to the
2852 start of the input section group. */
2853 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2854
2855 /* First element is a flag word. Rest of section is elf section
2856 indices for all the sections of the group. Write them backwards
2857 just to keep the group in the same order as given in .section
2858 directives, not that it matters. */
2859 while (elt != NULL)
2860 {
9dce4196
AM
2861 asection *s;
2862 unsigned int idx;
2863
dbb410c3 2864 loc -= 4;
9dce4196
AM
2865 s = elt;
2866 if (!gas)
2867 s = s->output_section;
2868 idx = 0;
2869 if (s != NULL)
2870 idx = elf_section_data (s)->this_idx;
2871 H_PUT_32 (abfd, idx, loc);
945906ff 2872 elt = elf_next_in_group (elt);
9dce4196
AM
2873 if (elt == first)
2874 break;
dbb410c3
AM
2875 }
2876
2877 /* If this is a relocatable link, then the above did nothing because
2878 SEC is the output section. Look through the input sections
2879 instead. */
8423293d 2880 for (l = sec->map_head.link_order; l != NULL; l = l->next)
dbb410c3 2881 if (l->type == bfd_indirect_link_order
945906ff 2882 && (elt = elf_next_in_group (l->u.indirect.section)) != NULL)
dbb410c3
AM
2883 do
2884 {
2885 loc -= 4;
2886 H_PUT_32 (abfd,
2887 elf_section_data (elt->output_section)->this_idx, loc);
945906ff 2888 elt = elf_next_in_group (elt);
dbb410c3
AM
2889 /* During a relocatable link, the lists are circular. */
2890 }
945906ff 2891 while (elt != elf_next_in_group (l->u.indirect.section));
dbb410c3 2892
3d7f7666 2893 if ((loc -= 4) != sec->contents)
9dce4196 2894 abort ();
dbb410c3 2895
9dce4196 2896 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2897}
2898
252b5132
RH
2899/* Assign all ELF section numbers. The dummy first section is handled here
2900 too. The link/info pointers for the standard section types are filled
2901 in here too, while we're at it. */
2902
b34976b6 2903static bfd_boolean
da9f89d4 2904assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2905{
2906 struct elf_obj_tdata *t = elf_tdata (abfd);
2907 asection *sec;
2b0f7ef9 2908 unsigned int section_number, secn;
252b5132 2909 Elf_Internal_Shdr **i_shdrp;
dc810e39 2910 bfd_size_type amt;
47cc2cf5 2911 struct bfd_elf_section_data *d;
252b5132
RH
2912
2913 section_number = 1;
2914
2b0f7ef9
JJ
2915 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2916
da9f89d4
L
2917 /* SHT_GROUP sections are in relocatable files only. */
2918 if (link_info == NULL || link_info->relocatable)
252b5132 2919 {
da9f89d4 2920 /* Put SHT_GROUP sections first. */
04dd1667 2921 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2922 {
5daa8fe7 2923 d = elf_section_data (sec);
da9f89d4
L
2924
2925 if (d->this_hdr.sh_type == SHT_GROUP)
2926 {
5daa8fe7 2927 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2928 {
2929 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2930 bfd_section_list_remove (abfd, sec);
da9f89d4 2931 abfd->section_count--;
da9f89d4
L
2932 }
2933 else
2934 {
2935 if (section_number == SHN_LORESERVE)
2936 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2937 d->this_idx = section_number++;
2938 }
2939 }
47cc2cf5
PB
2940 }
2941 }
2942
2943 for (sec = abfd->sections; sec; sec = sec->next)
2944 {
2945 d = elf_section_data (sec);
2946
2947 if (d->this_hdr.sh_type != SHT_GROUP)
2948 {
2949 if (section_number == SHN_LORESERVE)
2950 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2951 d->this_idx = section_number++;
2952 }
2b0f7ef9 2953 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2954 if ((sec->flags & SEC_RELOC) == 0)
2955 d->rel_idx = 0;
2956 else
2b0f7ef9 2957 {
9ad5cbcf
AM
2958 if (section_number == SHN_LORESERVE)
2959 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2960 d->rel_idx = section_number++;
2961 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2962 }
23bc299b
MM
2963
2964 if (d->rel_hdr2)
2b0f7ef9 2965 {
9ad5cbcf
AM
2966 if (section_number == SHN_LORESERVE)
2967 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2968 d->rel_idx2 = section_number++;
2969 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2970 }
23bc299b
MM
2971 else
2972 d->rel_idx2 = 0;
252b5132
RH
2973 }
2974
9ad5cbcf
AM
2975 if (section_number == SHN_LORESERVE)
2976 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2977 t->shstrtab_section = section_number++;
2b0f7ef9 2978 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2979 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2980
2981 if (bfd_get_symcount (abfd) > 0)
2982 {
9ad5cbcf
AM
2983 if (section_number == SHN_LORESERVE)
2984 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2985 t->symtab_section = section_number++;
2b0f7ef9 2986 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2987 if (section_number > SHN_LORESERVE - 2)
2988 {
2989 if (section_number == SHN_LORESERVE)
2990 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2991 t->symtab_shndx_section = section_number++;
2992 t->symtab_shndx_hdr.sh_name
2993 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2994 ".symtab_shndx", FALSE);
9ad5cbcf 2995 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2996 return FALSE;
9ad5cbcf
AM
2997 }
2998 if (section_number == SHN_LORESERVE)
2999 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3000 t->strtab_section = section_number++;
2b0f7ef9 3001 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3002 }
3003
2b0f7ef9
JJ
3004 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3005 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3006
3007 elf_numsections (abfd) = section_number;
252b5132 3008 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
3009 if (section_number > SHN_LORESERVE)
3010 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
3011
3012 /* Set up the list of section header pointers, in agreement with the
3013 indices. */
dc810e39 3014 amt = section_number * sizeof (Elf_Internal_Shdr *);
217aa764 3015 i_shdrp = bfd_zalloc (abfd, amt);
252b5132 3016 if (i_shdrp == NULL)
b34976b6 3017 return FALSE;
252b5132 3018
dc810e39 3019 amt = sizeof (Elf_Internal_Shdr);
217aa764 3020 i_shdrp[0] = bfd_zalloc (abfd, amt);
252b5132
RH
3021 if (i_shdrp[0] == NULL)
3022 {
3023 bfd_release (abfd, i_shdrp);
b34976b6 3024 return FALSE;
252b5132 3025 }
252b5132
RH
3026
3027 elf_elfsections (abfd) = i_shdrp;
3028
3029 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3030 if (bfd_get_symcount (abfd) > 0)
3031 {
3032 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3033 if (elf_numsections (abfd) > SHN_LORESERVE)
3034 {
3035 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3036 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3037 }
252b5132
RH
3038 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3039 t->symtab_hdr.sh_link = t->strtab_section;
3040 }
38ce5b11 3041
252b5132
RH
3042 for (sec = abfd->sections; sec; sec = sec->next)
3043 {
3044 struct bfd_elf_section_data *d = elf_section_data (sec);
3045 asection *s;
3046 const char *name;
3047
3048 i_shdrp[d->this_idx] = &d->this_hdr;
3049 if (d->rel_idx != 0)
3050 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3051 if (d->rel_idx2 != 0)
3052 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3053
3054 /* Fill in the sh_link and sh_info fields while we're at it. */
3055
3056 /* sh_link of a reloc section is the section index of the symbol
3057 table. sh_info is the section index of the section to which
3058 the relocation entries apply. */
3059 if (d->rel_idx != 0)
3060 {
3061 d->rel_hdr.sh_link = t->symtab_section;
3062 d->rel_hdr.sh_info = d->this_idx;
3063 }
23bc299b
MM
3064 if (d->rel_idx2 != 0)
3065 {
3066 d->rel_hdr2->sh_link = t->symtab_section;
3067 d->rel_hdr2->sh_info = d->this_idx;
3068 }
252b5132 3069
38ce5b11
L
3070 /* We need to set up sh_link for SHF_LINK_ORDER. */
3071 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3072 {
3073 s = elf_linked_to_section (sec);
3074 if (s)
3075 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3076 else
3077 {
3078 struct bfd_link_order *p;
3079
3080 /* Find out what the corresponding section in output
3081 is. */
8423293d 3082 for (p = sec->map_head.link_order; p != NULL; p = p->next)
38ce5b11
L
3083 {
3084 s = p->u.indirect.section;
3085 if (p->type == bfd_indirect_link_order
3086 && (bfd_get_flavour (s->owner)
3087 == bfd_target_elf_flavour))
3088 {
3089 Elf_Internal_Shdr ** const elf_shdrp
3090 = elf_elfsections (s->owner);
3091 int elfsec
3092 = _bfd_elf_section_from_bfd_section (s->owner, s);
3093 elfsec = elf_shdrp[elfsec]->sh_link;
185d09ad
L
3094 /* PR 290:
3095 The Intel C compiler generates SHT_IA_64_UNWIND with
ff01938b 3096 SHF_LINK_ORDER. But it doesn't set the sh_link or
185d09ad
L
3097 sh_info fields. Hence we could get the situation
3098 where elfsec is 0. */
3099 if (elfsec == 0)
3100 {
3101 const struct elf_backend_data *bed
3102 = get_elf_backend_data (abfd);
3103 if (bed->link_order_error_handler)
d003868e 3104 bed->link_order_error_handler
28b13744 3105 (_("%B: warning: sh_link not set for section `%A'"),
d003868e 3106 abfd, s);
185d09ad
L
3107 }
3108 else
3109 {
01b3c8ab
L
3110 s = elf_shdrp[elfsec]->bfd_section;
3111 if (elf_discarded_section (s))
3112 {
3113 asection *kept;
3114 (*_bfd_error_handler)
3115 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3116 abfd, d->this_hdr.bfd_section,
3117 s, s->owner);
3118 /* Point to the kept section if it has
3119 the same size as the discarded
3120 one. */
3121 kept = _bfd_elf_check_kept_section (s);
3122 if (kept == NULL)
3123 {
3124 bfd_set_error (bfd_error_bad_value);
3125 return FALSE;
3126 }
2796fd96 3127 s = kept;
01b3c8ab
L
3128 }
3129 s = s->output_section;
185d09ad
L
3130 BFD_ASSERT (s != NULL);
3131 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3132 }
38ce5b11
L
3133 break;
3134 }
3135 }
3136 }
3137 }
3138
252b5132
RH
3139 switch (d->this_hdr.sh_type)
3140 {
3141 case SHT_REL:
3142 case SHT_RELA:
3143 /* A reloc section which we are treating as a normal BFD
3144 section. sh_link is the section index of the symbol
3145 table. sh_info is the section index of the section to
3146 which the relocation entries apply. We assume that an
3147 allocated reloc section uses the dynamic symbol table.
3148 FIXME: How can we be sure? */
3149 s = bfd_get_section_by_name (abfd, ".dynsym");
3150 if (s != NULL)
3151 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3152
3153 /* We look up the section the relocs apply to by name. */
3154 name = sec->name;
3155 if (d->this_hdr.sh_type == SHT_REL)
3156 name += 4;
3157 else
3158 name += 5;
3159 s = bfd_get_section_by_name (abfd, name);
3160 if (s != NULL)
3161 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3162 break;
3163
3164 case SHT_STRTAB:
3165 /* We assume that a section named .stab*str is a stabs
3166 string section. We look for a section with the same name
3167 but without the trailing ``str'', and set its sh_link
3168 field to point to this section. */
3169 if (strncmp (sec->name, ".stab", sizeof ".stab" - 1) == 0
3170 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3171 {
3172 size_t len;
3173 char *alc;
3174
3175 len = strlen (sec->name);
217aa764 3176 alc = bfd_malloc (len - 2);
252b5132 3177 if (alc == NULL)
b34976b6 3178 return FALSE;
d4c88bbb 3179 memcpy (alc, sec->name, len - 3);
252b5132
RH
3180 alc[len - 3] = '\0';
3181 s = bfd_get_section_by_name (abfd, alc);
3182 free (alc);
3183 if (s != NULL)
3184 {
3185 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3186
3187 /* This is a .stab section. */
0594c12d
AM
3188 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3189 elf_section_data (s)->this_hdr.sh_entsize
3190 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3191 }
3192 }
3193 break;
3194
3195 case SHT_DYNAMIC:
3196 case SHT_DYNSYM:
3197 case SHT_GNU_verneed:
3198 case SHT_GNU_verdef:
3199 /* sh_link is the section header index of the string table
3200 used for the dynamic entries, or the symbol table, or the
3201 version strings. */
3202 s = bfd_get_section_by_name (abfd, ".dynstr");
3203 if (s != NULL)
3204 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3205 break;
3206
7f1204bb
JJ
3207 case SHT_GNU_LIBLIST:
3208 /* sh_link is the section header index of the prelink library
3209 list
3210 used for the dynamic entries, or the symbol table, or the
3211 version strings. */
3212 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3213 ? ".dynstr" : ".gnu.libstr");
3214 if (s != NULL)
3215 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3216 break;
3217
252b5132
RH
3218 case SHT_HASH:
3219 case SHT_GNU_versym:
3220 /* sh_link is the section header index of the symbol table
3221 this hash table or version table is for. */
3222 s = bfd_get_section_by_name (abfd, ".dynsym");
3223 if (s != NULL)
3224 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3225 break;
dbb410c3
AM
3226
3227 case SHT_GROUP:
3228 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3229 }
3230 }
3231
2b0f7ef9 3232 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3233 if (i_shdrp[secn] == NULL)
3234 i_shdrp[secn] = i_shdrp[0];
3235 else
3236 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3237 i_shdrp[secn]->sh_name);
b34976b6 3238 return TRUE;
252b5132
RH
3239}
3240
3241/* Map symbol from it's internal number to the external number, moving
3242 all local symbols to be at the head of the list. */
3243
268b6b39 3244static int
217aa764 3245sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3246{
3247 /* If the backend has a special mapping, use it. */
9c5bfbb7 3248 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3249 if (bed->elf_backend_sym_is_global)
3250 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3251
3252 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3253 || bfd_is_und_section (bfd_get_section (sym))
3254 || bfd_is_com_section (bfd_get_section (sym)));
3255}
3256
b34976b6 3257static bfd_boolean
217aa764 3258elf_map_symbols (bfd *abfd)
252b5132 3259{
dc810e39 3260 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3261 asymbol **syms = bfd_get_outsymbols (abfd);
3262 asymbol **sect_syms;
dc810e39
AM
3263 unsigned int num_locals = 0;
3264 unsigned int num_globals = 0;
3265 unsigned int num_locals2 = 0;
3266 unsigned int num_globals2 = 0;
252b5132 3267 int max_index = 0;
dc810e39 3268 unsigned int idx;
252b5132
RH
3269 asection *asect;
3270 asymbol **new_syms;
dc810e39 3271 bfd_size_type amt;
252b5132
RH
3272
3273#ifdef DEBUG
3274 fprintf (stderr, "elf_map_symbols\n");
3275 fflush (stderr);
3276#endif
3277
252b5132
RH
3278 for (asect = abfd->sections; asect; asect = asect->next)
3279 {
3280 if (max_index < asect->index)
3281 max_index = asect->index;
3282 }
3283
3284 max_index++;
dc810e39 3285 amt = max_index * sizeof (asymbol *);
217aa764 3286 sect_syms = bfd_zalloc (abfd, amt);
252b5132 3287 if (sect_syms == NULL)
b34976b6 3288 return FALSE;
252b5132 3289 elf_section_syms (abfd) = sect_syms;
4e89ac30 3290 elf_num_section_syms (abfd) = max_index;
252b5132 3291
079e9a2f
AM
3292 /* Init sect_syms entries for any section symbols we have already
3293 decided to output. */
252b5132
RH
3294 for (idx = 0; idx < symcount; idx++)
3295 {
dc810e39 3296 asymbol *sym = syms[idx];
c044fabd 3297
252b5132
RH
3298 if ((sym->flags & BSF_SECTION_SYM) != 0
3299 && sym->value == 0)
3300 {
3301 asection *sec;
3302
3303 sec = sym->section;
3304
3305 if (sec->owner != NULL)
3306 {
3307 if (sec->owner != abfd)
3308 {
3309 if (sec->output_offset != 0)
3310 continue;
c044fabd 3311
252b5132
RH
3312 sec = sec->output_section;
3313
079e9a2f
AM
3314 /* Empty sections in the input files may have had a
3315 section symbol created for them. (See the comment
3316 near the end of _bfd_generic_link_output_symbols in
3317 linker.c). If the linker script discards such
3318 sections then we will reach this point. Since we know
3319 that we cannot avoid this case, we detect it and skip
3320 the abort and the assignment to the sect_syms array.
3321 To reproduce this particular case try running the
3322 linker testsuite test ld-scripts/weak.exp for an ELF
3323 port that uses the generic linker. */
252b5132
RH
3324 if (sec->owner == NULL)
3325 continue;
3326
3327 BFD_ASSERT (sec->owner == abfd);
3328 }
3329 sect_syms[sec->index] = syms[idx];
3330 }
3331 }
3332 }
3333
252b5132
RH
3334 /* Classify all of the symbols. */
3335 for (idx = 0; idx < symcount; idx++)
3336 {
3337 if (!sym_is_global (abfd, syms[idx]))
3338 num_locals++;
3339 else
3340 num_globals++;
3341 }
079e9a2f
AM
3342
3343 /* We will be adding a section symbol for each BFD section. Most normal
3344 sections will already have a section symbol in outsymbols, but
3345 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3346 at least in that case. */
252b5132
RH
3347 for (asect = abfd->sections; asect; asect = asect->next)
3348 {
079e9a2f 3349 if (sect_syms[asect->index] == NULL)
252b5132 3350 {
079e9a2f 3351 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3352 num_locals++;
3353 else
3354 num_globals++;
252b5132
RH
3355 }
3356 }
3357
3358 /* Now sort the symbols so the local symbols are first. */
dc810e39 3359 amt = (num_locals + num_globals) * sizeof (asymbol *);
217aa764 3360 new_syms = bfd_alloc (abfd, amt);
dc810e39 3361
252b5132 3362 if (new_syms == NULL)
b34976b6 3363 return FALSE;
252b5132
RH
3364
3365 for (idx = 0; idx < symcount; idx++)
3366 {
3367 asymbol *sym = syms[idx];
dc810e39 3368 unsigned int i;
252b5132
RH
3369
3370 if (!sym_is_global (abfd, sym))
3371 i = num_locals2++;
3372 else
3373 i = num_locals + num_globals2++;
3374 new_syms[i] = sym;
3375 sym->udata.i = i + 1;
3376 }
3377 for (asect = abfd->sections; asect; asect = asect->next)
3378 {
079e9a2f 3379 if (sect_syms[asect->index] == NULL)
252b5132 3380 {
079e9a2f 3381 asymbol *sym = asect->symbol;
dc810e39 3382 unsigned int i;
252b5132 3383
079e9a2f 3384 sect_syms[asect->index] = sym;
252b5132
RH
3385 if (!sym_is_global (abfd, sym))
3386 i = num_locals2++;
3387 else
3388 i = num_locals + num_globals2++;
3389 new_syms[i] = sym;
3390 sym->udata.i = i + 1;
3391 }
3392 }
3393
3394 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3395
3396 elf_num_locals (abfd) = num_locals;
3397 elf_num_globals (abfd) = num_globals;
b34976b6 3398 return TRUE;
252b5132
RH
3399}
3400
3401/* Align to the maximum file alignment that could be required for any
3402 ELF data structure. */
3403
268b6b39 3404static inline file_ptr
217aa764 3405align_file_position (file_ptr off, int align)
252b5132
RH
3406{
3407 return (off + align - 1) & ~(align - 1);
3408}
3409
3410/* Assign a file position to a section, optionally aligning to the
3411 required section alignment. */
3412
217aa764
AM
3413file_ptr
3414_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3415 file_ptr offset,
3416 bfd_boolean align)
252b5132
RH
3417{
3418 if (align)
3419 {
3420 unsigned int al;
3421
3422 al = i_shdrp->sh_addralign;
3423 if (al > 1)
3424 offset = BFD_ALIGN (offset, al);
3425 }
3426 i_shdrp->sh_offset = offset;
3427 if (i_shdrp->bfd_section != NULL)
3428 i_shdrp->bfd_section->filepos = offset;
3429 if (i_shdrp->sh_type != SHT_NOBITS)
3430 offset += i_shdrp->sh_size;
3431 return offset;
3432}
3433
3434/* Compute the file positions we are going to put the sections at, and
3435 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3436 is not NULL, this is being called by the ELF backend linker. */
3437
b34976b6 3438bfd_boolean
217aa764
AM
3439_bfd_elf_compute_section_file_positions (bfd *abfd,
3440 struct bfd_link_info *link_info)
252b5132 3441{
9c5bfbb7 3442 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3443 bfd_boolean failed;
4b6c0f2f 3444 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3445 Elf_Internal_Shdr *shstrtab_hdr;
3446
3447 if (abfd->output_has_begun)
b34976b6 3448 return TRUE;
252b5132
RH
3449
3450 /* Do any elf backend specific processing first. */
3451 if (bed->elf_backend_begin_write_processing)
3452 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3453
3454 if (! prep_headers (abfd))
b34976b6 3455 return FALSE;
252b5132 3456
e6c51ed4
NC
3457 /* Post process the headers if necessary. */
3458 if (bed->elf_backend_post_process_headers)
3459 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3460
b34976b6 3461 failed = FALSE;
252b5132
RH
3462 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3463 if (failed)
b34976b6 3464 return FALSE;
252b5132 3465
da9f89d4 3466 if (!assign_section_numbers (abfd, link_info))
b34976b6 3467 return FALSE;
252b5132
RH
3468
3469 /* The backend linker builds symbol table information itself. */
3470 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3471 {
3472 /* Non-zero if doing a relocatable link. */
3473 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3474
3475 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3476 return FALSE;
252b5132
RH
3477 }
3478
1126897b 3479 if (link_info == NULL)
dbb410c3 3480 {
1126897b 3481 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3482 if (failed)
b34976b6 3483 return FALSE;
dbb410c3
AM
3484 }
3485
252b5132
RH
3486 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3487 /* sh_name was set in prep_headers. */
3488 shstrtab_hdr->sh_type = SHT_STRTAB;
3489 shstrtab_hdr->sh_flags = 0;
3490 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3491 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3492 shstrtab_hdr->sh_entsize = 0;
3493 shstrtab_hdr->sh_link = 0;
3494 shstrtab_hdr->sh_info = 0;
3495 /* sh_offset is set in assign_file_positions_except_relocs. */
3496 shstrtab_hdr->sh_addralign = 1;
3497
c84fca4d 3498 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3499 return FALSE;
252b5132
RH
3500
3501 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3502 {
3503 file_ptr off;
3504 Elf_Internal_Shdr *hdr;
3505
3506 off = elf_tdata (abfd)->next_file_pos;
3507
3508 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3509 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3510
9ad5cbcf
AM
3511 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3512 if (hdr->sh_size != 0)
b34976b6 3513 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3514
252b5132 3515 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3516 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3517
3518 elf_tdata (abfd)->next_file_pos = off;
3519
3520 /* Now that we know where the .strtab section goes, write it
3521 out. */
3522 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3523 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3524 return FALSE;
252b5132
RH
3525 _bfd_stringtab_free (strtab);
3526 }
3527
b34976b6 3528 abfd->output_has_begun = TRUE;
252b5132 3529
b34976b6 3530 return TRUE;
252b5132
RH
3531}
3532
3533/* Create a mapping from a set of sections to a program segment. */
3534
217aa764
AM
3535static struct elf_segment_map *
3536make_mapping (bfd *abfd,
3537 asection **sections,
3538 unsigned int from,
3539 unsigned int to,
3540 bfd_boolean phdr)
252b5132
RH
3541{
3542 struct elf_segment_map *m;
3543 unsigned int i;
3544 asection **hdrpp;
dc810e39 3545 bfd_size_type amt;
252b5132 3546
dc810e39
AM
3547 amt = sizeof (struct elf_segment_map);
3548 amt += (to - from - 1) * sizeof (asection *);
217aa764 3549 m = bfd_zalloc (abfd, amt);
252b5132
RH
3550 if (m == NULL)
3551 return NULL;
3552 m->next = NULL;
3553 m->p_type = PT_LOAD;
3554 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3555 m->sections[i - from] = *hdrpp;
3556 m->count = to - from;
3557
3558 if (from == 0 && phdr)
3559 {
3560 /* Include the headers in the first PT_LOAD segment. */
3561 m->includes_filehdr = 1;
3562 m->includes_phdrs = 1;
3563 }
3564
3565 return m;
3566}
3567
229fcec5
MM
3568/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3569 on failure. */
3570
3571struct elf_segment_map *
3572_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3573{
3574 struct elf_segment_map *m;
3575
3576 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3577 if (m == NULL)
3578 return NULL;
3579 m->next = NULL;
3580 m->p_type = PT_DYNAMIC;
3581 m->count = 1;
3582 m->sections[0] = dynsec;
3583
3584 return m;
3585}
3586
252b5132
RH
3587/* Set up a mapping from BFD sections to program segments. */
3588
b34976b6 3589static bfd_boolean
217aa764 3590map_sections_to_segments (bfd *abfd)
252b5132
RH
3591{
3592 asection **sections = NULL;
3593 asection *s;
3594 unsigned int i;
3595 unsigned int count;
3596 struct elf_segment_map *mfirst;
3597 struct elf_segment_map **pm;
3598 struct elf_segment_map *m;
3599 asection *last_hdr;
baaff79e 3600 bfd_vma last_size;
252b5132
RH
3601 unsigned int phdr_index;
3602 bfd_vma maxpagesize;
3603 asection **hdrpp;
b34976b6
AM
3604 bfd_boolean phdr_in_segment = TRUE;
3605 bfd_boolean writable;
13ae64f3
JJ
3606 int tls_count = 0;
3607 asection *first_tls = NULL;
65765700 3608 asection *dynsec, *eh_frame_hdr;
dc810e39 3609 bfd_size_type amt;
252b5132
RH
3610
3611 if (elf_tdata (abfd)->segment_map != NULL)
b34976b6 3612 return TRUE;
252b5132
RH
3613
3614 if (bfd_count_sections (abfd) == 0)
b34976b6 3615 return TRUE;
252b5132
RH
3616
3617 /* Select the allocated sections, and sort them. */
3618
dc810e39 3619 amt = bfd_count_sections (abfd) * sizeof (asection *);
217aa764 3620 sections = bfd_malloc (amt);
252b5132
RH
3621 if (sections == NULL)
3622 goto error_return;
3623
3624 i = 0;
3625 for (s = abfd->sections; s != NULL; s = s->next)
3626 {
3627 if ((s->flags & SEC_ALLOC) != 0)
3628 {
3629 sections[i] = s;
3630 ++i;
3631 }
3632 }
3633 BFD_ASSERT (i <= bfd_count_sections (abfd));
3634 count = i;
3635
3636 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
3637
3638 /* Build the mapping. */
3639
3640 mfirst = NULL;
3641 pm = &mfirst;
3642
3643 /* If we have a .interp section, then create a PT_PHDR segment for
3644 the program headers and a PT_INTERP segment for the .interp
3645 section. */
3646 s = bfd_get_section_by_name (abfd, ".interp");
3647 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3648 {
dc810e39 3649 amt = sizeof (struct elf_segment_map);
217aa764 3650 m = bfd_zalloc (abfd, amt);
252b5132
RH
3651 if (m == NULL)
3652 goto error_return;
3653 m->next = NULL;
3654 m->p_type = PT_PHDR;
3655 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3656 m->p_flags = PF_R | PF_X;
3657 m->p_flags_valid = 1;
3658 m->includes_phdrs = 1;
3659
3660 *pm = m;
3661 pm = &m->next;
3662
dc810e39 3663 amt = sizeof (struct elf_segment_map);
217aa764 3664 m = bfd_zalloc (abfd, amt);
252b5132
RH
3665 if (m == NULL)
3666 goto error_return;
3667 m->next = NULL;
3668 m->p_type = PT_INTERP;
3669 m->count = 1;
3670 m->sections[0] = s;
3671
3672 *pm = m;
3673 pm = &m->next;
3674 }
3675
3676 /* Look through the sections. We put sections in the same program
3677 segment when the start of the second section can be placed within
3678 a few bytes of the end of the first section. */
3679 last_hdr = NULL;
baaff79e 3680 last_size = 0;
252b5132
RH
3681 phdr_index = 0;
3682 maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
b34976b6 3683 writable = FALSE;
252b5132
RH
3684 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3685 if (dynsec != NULL
3686 && (dynsec->flags & SEC_LOAD) == 0)
3687 dynsec = NULL;
3688
3689 /* Deal with -Ttext or something similar such that the first section
3690 is not adjacent to the program headers. This is an
3691 approximation, since at this point we don't know exactly how many
3692 program headers we will need. */
3693 if (count > 0)
3694 {
3695 bfd_size_type phdr_size;
3696
3697 phdr_size = elf_tdata (abfd)->program_header_size;
3698 if (phdr_size == 0)
3699 phdr_size = get_elf_backend_data (abfd)->s->sizeof_phdr;
3700 if ((abfd->flags & D_PAGED) == 0
3701 || sections[0]->lma < phdr_size
3702 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
b34976b6 3703 phdr_in_segment = FALSE;
252b5132
RH
3704 }
3705
3706 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
3707 {
3708 asection *hdr;
b34976b6 3709 bfd_boolean new_segment;
252b5132
RH
3710
3711 hdr = *hdrpp;
3712
3713 /* See if this section and the last one will fit in the same
3714 segment. */
3715
3716 if (last_hdr == NULL)
3717 {
3718 /* If we don't have a segment yet, then we don't need a new
3719 one (we build the last one after this loop). */
b34976b6 3720 new_segment = FALSE;
252b5132
RH
3721 }
3722 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3723 {
3724 /* If this section has a different relation between the
3725 virtual address and the load address, then we need a new
3726 segment. */
b34976b6 3727 new_segment = TRUE;
252b5132 3728 }
baaff79e 3729 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
252b5132
RH
3730 < BFD_ALIGN (hdr->lma, maxpagesize))
3731 {
3732 /* If putting this section in this segment would force us to
3733 skip a page in the segment, then we need a new segment. */
b34976b6 3734 new_segment = TRUE;
252b5132 3735 }
baaff79e
JJ
3736 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3737 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
252b5132
RH
3738 {
3739 /* We don't want to put a loadable section after a
baaff79e
JJ
3740 nonloadable section in the same segment.
3741 Consider .tbss sections as loadable for this purpose. */
b34976b6 3742 new_segment = TRUE;
252b5132
RH
3743 }
3744 else if ((abfd->flags & D_PAGED) == 0)
3745 {
3746 /* If the file is not demand paged, which means that we
3747 don't require the sections to be correctly aligned in the
3748 file, then there is no other reason for a new segment. */
b34976b6 3749 new_segment = FALSE;
252b5132
RH
3750 }
3751 else if (! writable
3752 && (hdr->flags & SEC_READONLY) == 0
baaff79e 3753 && (((last_hdr->lma + last_size - 1)
b89fe0ee
AM
3754 & ~(maxpagesize - 1))
3755 != (hdr->lma & ~(maxpagesize - 1))))
252b5132
RH
3756 {
3757 /* We don't want to put a writable section in a read only
3758 segment, unless they are on the same page in memory
3759 anyhow. We already know that the last section does not
3760 bring us past the current section on the page, so the
3761 only case in which the new section is not on the same
3762 page as the previous section is when the previous section
3763 ends precisely on a page boundary. */
b34976b6 3764 new_segment = TRUE;
252b5132
RH
3765 }
3766 else
3767 {
3768 /* Otherwise, we can use the same segment. */
b34976b6 3769 new_segment = FALSE;
252b5132
RH
3770 }
3771
3772 if (! new_segment)
3773 {
3774 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3775 writable = TRUE;
baaff79e
JJ
3776 last_hdr = hdr;
3777 /* .tbss sections effectively have zero size. */
e5caec89 3778 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3779 last_size = hdr->size;
baaff79e
JJ
3780 else
3781 last_size = 0;
252b5132
RH
3782 continue;
3783 }
3784
3785 /* We need a new program segment. We must create a new program
3786 header holding all the sections from phdr_index until hdr. */
3787
3788 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3789 if (m == NULL)
3790 goto error_return;
3791
3792 *pm = m;
3793 pm = &m->next;
3794
3795 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3796 writable = TRUE;
252b5132 3797 else
b34976b6 3798 writable = FALSE;
252b5132
RH
3799
3800 last_hdr = hdr;
baaff79e
JJ
3801 /* .tbss sections effectively have zero size. */
3802 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3803 last_size = hdr->size;
baaff79e
JJ
3804 else
3805 last_size = 0;
252b5132 3806 phdr_index = i;
b34976b6 3807 phdr_in_segment = FALSE;
252b5132
RH
3808 }
3809
3810 /* Create a final PT_LOAD program segment. */
3811 if (last_hdr != NULL)
3812 {
3813 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3814 if (m == NULL)
3815 goto error_return;
3816
3817 *pm = m;
3818 pm = &m->next;
3819 }
3820
3821 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3822 if (dynsec != NULL)
3823 {
229fcec5 3824 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
252b5132
RH
3825 if (m == NULL)
3826 goto error_return;
252b5132
RH
3827 *pm = m;
3828 pm = &m->next;
3829 }
3830
3831 /* For each loadable .note section, add a PT_NOTE segment. We don't
3832 use bfd_get_section_by_name, because if we link together
3833 nonloadable .note sections and loadable .note sections, we will
3834 generate two .note sections in the output file. FIXME: Using
3835 names for section types is bogus anyhow. */
3836 for (s = abfd->sections; s != NULL; s = s->next)
3837 {
3838 if ((s->flags & SEC_LOAD) != 0
3839 && strncmp (s->name, ".note", 5) == 0)
3840 {
dc810e39 3841 amt = sizeof (struct elf_segment_map);
217aa764 3842 m = bfd_zalloc (abfd, amt);
252b5132
RH
3843 if (m == NULL)
3844 goto error_return;
3845 m->next = NULL;
3846 m->p_type = PT_NOTE;
3847 m->count = 1;
3848 m->sections[0] = s;
3849
3850 *pm = m;
3851 pm = &m->next;
3852 }
13ae64f3
JJ
3853 if (s->flags & SEC_THREAD_LOCAL)
3854 {
3855 if (! tls_count)
3856 first_tls = s;
3857 tls_count++;
3858 }
3859 }
3860
3861 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3862 if (tls_count > 0)
3863 {
3864 int i;
3865
3866 amt = sizeof (struct elf_segment_map);
3867 amt += (tls_count - 1) * sizeof (asection *);
217aa764 3868 m = bfd_zalloc (abfd, amt);
13ae64f3
JJ
3869 if (m == NULL)
3870 goto error_return;
3871 m->next = NULL;
3872 m->p_type = PT_TLS;
3873 m->count = tls_count;
3874 /* Mandated PF_R. */
3875 m->p_flags = PF_R;
3876 m->p_flags_valid = 1;
3877 for (i = 0; i < tls_count; ++i)
3878 {
3879 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3880 m->sections[i] = first_tls;
3881 first_tls = first_tls->next;
3882 }
3883
3884 *pm = m;
3885 pm = &m->next;
252b5132
RH
3886 }
3887
65765700
JJ
3888 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3889 segment. */
126495ed
AM
3890 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3891 if (eh_frame_hdr != NULL
3892 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
65765700
JJ
3893 {
3894 amt = sizeof (struct elf_segment_map);
217aa764 3895 m = bfd_zalloc (abfd, amt);
65765700
JJ
3896 if (m == NULL)
3897 goto error_return;
3898 m->next = NULL;
3899 m->p_type = PT_GNU_EH_FRAME;
3900 m->count = 1;
126495ed 3901 m->sections[0] = eh_frame_hdr->output_section;
65765700
JJ
3902
3903 *pm = m;
3904 pm = &m->next;
3905 }
3906
9ee5e499
JJ
3907 if (elf_tdata (abfd)->stack_flags)
3908 {
3909 amt = sizeof (struct elf_segment_map);
217aa764 3910 m = bfd_zalloc (abfd, amt);
9ee5e499
JJ
3911 if (m == NULL)
3912 goto error_return;
3913 m->next = NULL;
3914 m->p_type = PT_GNU_STACK;
3915 m->p_flags = elf_tdata (abfd)->stack_flags;
3916 m->p_flags_valid = 1;
3917
3918 *pm = m;
3919 pm = &m->next;
3920 }
3921
8c37241b
JJ
3922 if (elf_tdata (abfd)->relro)
3923 {
3924 amt = sizeof (struct elf_segment_map);
3925 m = bfd_zalloc (abfd, amt);
3926 if (m == NULL)
3927 goto error_return;
3928 m->next = NULL;
3929 m->p_type = PT_GNU_RELRO;
3930 m->p_flags = PF_R;
3931 m->p_flags_valid = 1;
3932
3933 *pm = m;
3934 pm = &m->next;
3935 }
3936
252b5132
RH
3937 free (sections);
3938 sections = NULL;
3939
3940 elf_tdata (abfd)->segment_map = mfirst;
b34976b6 3941 return TRUE;
252b5132
RH
3942
3943 error_return:
3944 if (sections != NULL)
3945 free (sections);
b34976b6 3946 return FALSE;
252b5132
RH
3947}
3948
3949/* Sort sections by address. */
3950
3951static int
217aa764 3952elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3953{
3954 const asection *sec1 = *(const asection **) arg1;
3955 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3956 bfd_size_type size1, size2;
252b5132
RH
3957
3958 /* Sort by LMA first, since this is the address used to
3959 place the section into a segment. */
3960 if (sec1->lma < sec2->lma)
3961 return -1;
3962 else if (sec1->lma > sec2->lma)
3963 return 1;
3964
3965 /* Then sort by VMA. Normally the LMA and the VMA will be
3966 the same, and this will do nothing. */
3967 if (sec1->vma < sec2->vma)
3968 return -1;
3969 else if (sec1->vma > sec2->vma)
3970 return 1;
3971
3972 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3973
07c6e936 3974#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3975
3976 if (TOEND (sec1))
3977 {
3978 if (TOEND (sec2))
00a7cdc5
NC
3979 {
3980 /* If the indicies are the same, do not return 0
3981 here, but continue to try the next comparison. */
3982 if (sec1->target_index - sec2->target_index != 0)
3983 return sec1->target_index - sec2->target_index;
3984 }
252b5132
RH
3985 else
3986 return 1;
3987 }
00a7cdc5 3988 else if (TOEND (sec2))
252b5132
RH
3989 return -1;
3990
3991#undef TOEND
3992
00a7cdc5
NC
3993 /* Sort by size, to put zero sized sections
3994 before others at the same address. */
252b5132 3995
eea6121a
AM
3996 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
3997 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
3998
3999 if (size1 < size2)
252b5132 4000 return -1;
eecdbe52 4001 if (size1 > size2)
252b5132
RH
4002 return 1;
4003
4004 return sec1->target_index - sec2->target_index;
4005}
4006
340b6d91
AC
4007/* Ian Lance Taylor writes:
4008
4009 We shouldn't be using % with a negative signed number. That's just
4010 not good. We have to make sure either that the number is not
4011 negative, or that the number has an unsigned type. When the types
4012 are all the same size they wind up as unsigned. When file_ptr is a
4013 larger signed type, the arithmetic winds up as signed long long,
4014 which is wrong.
4015
4016 What we're trying to say here is something like ``increase OFF by
4017 the least amount that will cause it to be equal to the VMA modulo
4018 the page size.'' */
4019/* In other words, something like:
4020
4021 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4022 off_offset = off % bed->maxpagesize;
4023 if (vma_offset < off_offset)
4024 adjustment = vma_offset + bed->maxpagesize - off_offset;
4025 else
4026 adjustment = vma_offset - off_offset;
4027
4028 which can can be collapsed into the expression below. */
4029
4030static file_ptr
4031vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4032{
4033 return ((vma - off) % maxpagesize);
4034}
4035
252b5132
RH
4036/* Assign file positions to the sections based on the mapping from
4037 sections to segments. This function also sets up some fields in
4038 the file header, and writes out the program headers. */
4039
b34976b6 4040static bfd_boolean
c84fca4d 4041assign_file_positions_for_segments (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
4042{
4043 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4044 unsigned int count;
4045 struct elf_segment_map *m;
4046 unsigned int alloc;
4047 Elf_Internal_Phdr *phdrs;
4048 file_ptr off, voff;
4049 bfd_vma filehdr_vaddr, filehdr_paddr;
4050 bfd_vma phdrs_vaddr, phdrs_paddr;
4051 Elf_Internal_Phdr *p;
dc810e39 4052 bfd_size_type amt;
252b5132
RH
4053
4054 if (elf_tdata (abfd)->segment_map == NULL)
4055 {
4056 if (! map_sections_to_segments (abfd))
b34976b6 4057 return FALSE;
252b5132 4058 }
1ed89aa9
NC
4059 else
4060 {
4061 /* The placement algorithm assumes that non allocated sections are
4062 not in PT_LOAD segments. We ensure this here by removing such
4063 sections from the segment map. */
4064 for (m = elf_tdata (abfd)->segment_map;
4065 m != NULL;
4066 m = m->next)
4067 {
4068 unsigned int new_count;
4069 unsigned int i;
4070
4071 if (m->p_type != PT_LOAD)
4072 continue;
4073
4074 new_count = 0;
4075 for (i = 0; i < m->count; i ++)
4076 {
4077 if ((m->sections[i]->flags & SEC_ALLOC) != 0)
4078 {
47d9a591 4079 if (i != new_count)
1ed89aa9
NC
4080 m->sections[new_count] = m->sections[i];
4081
4082 new_count ++;
4083 }
4084 }
4085
4086 if (new_count != m->count)
4087 m->count = new_count;
4088 }
4089 }
252b5132
RH
4090
4091 if (bed->elf_backend_modify_segment_map)
4092 {
c84fca4d 4093 if (! (*bed->elf_backend_modify_segment_map) (abfd, link_info))
b34976b6 4094 return FALSE;
252b5132
RH
4095 }
4096
4097 count = 0;
4098 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4099 ++count;
4100
4101 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4102 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4103 elf_elfheader (abfd)->e_phnum = count;
4104
4105 if (count == 0)
0ebdbb83
BW
4106 {
4107 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4108 return TRUE;
4109 }
252b5132
RH
4110
4111 /* If we already counted the number of program segments, make sure
4112 that we allocated enough space. This happens when SIZEOF_HEADERS
4113 is used in a linker script. */
4114 alloc = elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr;
4115 if (alloc != 0 && count > alloc)
4116 {
4117 ((*_bfd_error_handler)
b301b248
AM
4118 (_("%B: Not enough room for program headers (allocated %u, need %u)"),
4119 abfd, alloc, count));
252b5132 4120 bfd_set_error (bfd_error_bad_value);
b34976b6 4121 return FALSE;
252b5132
RH
4122 }
4123
4124 if (alloc == 0)
4125 alloc = count;
4126
dc810e39 4127 amt = alloc * sizeof (Elf_Internal_Phdr);
217aa764 4128 phdrs = bfd_alloc (abfd, amt);
252b5132 4129 if (phdrs == NULL)
b34976b6 4130 return FALSE;
252b5132
RH
4131
4132 off = bed->s->sizeof_ehdr;
4133 off += alloc * bed->s->sizeof_phdr;
4134
4135 filehdr_vaddr = 0;
4136 filehdr_paddr = 0;
4137 phdrs_vaddr = 0;
4138 phdrs_paddr = 0;
4139
4140 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4141 m != NULL;
4142 m = m->next, p++)
4143 {
4144 unsigned int i;
4145 asection **secpp;
4146
4147 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4148 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4149 not be done to the PT_NOTE section of a corefile, which may
4150 contain several pseudo-sections artificially created by bfd.
4151 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4152 if (m->count > 1
4153 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4154 && m->p_type == PT_NOTE))
252b5132
RH
4155 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4156 elf_sort_sections);
4157
b301b248
AM
4158 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4159 number of sections with contents contributing to both p_filesz
4160 and p_memsz, followed by a number of sections with no contents
4161 that just contribute to p_memsz. In this loop, OFF tracks next
4162 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4163 an adjustment we use for segments that have no file contents
4164 but need zero filled memory allocation. */
4165 voff = 0;
252b5132 4166 p->p_type = m->p_type;
28a7f3e7 4167 p->p_flags = m->p_flags;
252b5132
RH
4168
4169 if (p->p_type == PT_LOAD
b301b248 4170 && m->count > 0)
252b5132 4171 {
b301b248
AM
4172 bfd_size_type align;
4173 bfd_vma adjust;
a49e53ed 4174 unsigned int align_power = 0;
b301b248 4175
a49e53ed 4176 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4177 {
a49e53ed 4178 unsigned int secalign;
252b5132 4179
a49e53ed
AM
4180 secalign = bfd_get_section_alignment (abfd, *secpp);
4181 if (secalign > align_power)
4182 align_power = secalign;
b301b248 4183 }
a49e53ed
AM
4184 align = (bfd_size_type) 1 << align_power;
4185
4186 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > align)
4187 align = bed->maxpagesize;
252b5132 4188
b301b248
AM
4189 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4190 off += adjust;
4191 if (adjust != 0
4192 && !m->includes_filehdr
4193 && !m->includes_phdrs
4194 && (ufile_ptr) off >= align)
4195 {
4196 /* If the first section isn't loadable, the same holds for
4197 any other sections. Since the segment won't need file
4198 space, we can make p_offset overlap some prior segment.
4199 However, .tbss is special. If a segment starts with
4200 .tbss, we need to look at the next section to decide
4201 whether the segment has any loadable sections. */
4202 i = 0;
5efb6261 4203 while ((m->sections[i]->flags & SEC_LOAD) == 0)
b301b248
AM
4204 {
4205 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4206 || ++i >= m->count)
4207 {
4208 off -= adjust;
4209 voff = adjust - align;
4210 break;
4211 }
4212 }
252b5132
RH
4213 }
4214 }
b1a6d0b1
NC
4215 /* Make sure the .dynamic section is the first section in the
4216 PT_DYNAMIC segment. */
4217 else if (p->p_type == PT_DYNAMIC
4218 && m->count > 1
4219 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4220 {
4221 _bfd_error_handler
b301b248
AM
4222 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4223 abfd);
b1a6d0b1
NC
4224 bfd_set_error (bfd_error_bad_value);
4225 return FALSE;
4226 }
252b5132
RH
4227
4228 if (m->count == 0)
4229 p->p_vaddr = 0;
4230 else
4231 p->p_vaddr = m->sections[0]->vma;
4232
4233 if (m->p_paddr_valid)
4234 p->p_paddr = m->p_paddr;
4235 else if (m->count == 0)
4236 p->p_paddr = 0;
4237 else
4238 p->p_paddr = m->sections[0]->lma;
4239
4240 if (p->p_type == PT_LOAD
4241 && (abfd->flags & D_PAGED) != 0)
4242 p->p_align = bed->maxpagesize;
4243 else if (m->count == 0)
45d6a902 4244 p->p_align = 1 << bed->s->log_file_align;
252b5132
RH
4245 else
4246 p->p_align = 0;
4247
4248 p->p_offset = 0;
4249 p->p_filesz = 0;
4250 p->p_memsz = 0;
4251
4252 if (m->includes_filehdr)
4253 {
4254 if (! m->p_flags_valid)
4255 p->p_flags |= PF_R;
4256 p->p_offset = 0;
4257 p->p_filesz = bed->s->sizeof_ehdr;
4258 p->p_memsz = bed->s->sizeof_ehdr;
4259 if (m->count > 0)
4260 {
4261 BFD_ASSERT (p->p_type == PT_LOAD);
4262
4263 if (p->p_vaddr < (bfd_vma) off)
4264 {
caf47ea6 4265 (*_bfd_error_handler)
b301b248
AM
4266 (_("%B: Not enough room for program headers, try linking with -N"),
4267 abfd);
252b5132 4268 bfd_set_error (bfd_error_bad_value);
b34976b6 4269 return FALSE;
252b5132
RH
4270 }
4271
4272 p->p_vaddr -= off;
4273 if (! m->p_paddr_valid)
4274 p->p_paddr -= off;
4275 }
4276 if (p->p_type == PT_LOAD)
4277 {
4278 filehdr_vaddr = p->p_vaddr;
4279 filehdr_paddr = p->p_paddr;
4280 }
4281 }
4282
4283 if (m->includes_phdrs)
4284 {
4285 if (! m->p_flags_valid)
4286 p->p_flags |= PF_R;
4287
4288 if (m->includes_filehdr)
4289 {
4290 if (p->p_type == PT_LOAD)
4291 {
4292 phdrs_vaddr = p->p_vaddr + bed->s->sizeof_ehdr;
4293 phdrs_paddr = p->p_paddr + bed->s->sizeof_ehdr;
4294 }
4295 }
4296 else
4297 {
4298 p->p_offset = bed->s->sizeof_ehdr;
4299
4300 if (m->count > 0)
4301 {
4302 BFD_ASSERT (p->p_type == PT_LOAD);
4303 p->p_vaddr -= off - p->p_offset;
4304 if (! m->p_paddr_valid)
4305 p->p_paddr -= off - p->p_offset;
4306 }
4307
4308 if (p->p_type == PT_LOAD)
4309 {
4310 phdrs_vaddr = p->p_vaddr;
4311 phdrs_paddr = p->p_paddr;
4312 }
4313 else
4314 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4315 }
4316
4317 p->p_filesz += alloc * bed->s->sizeof_phdr;
4318 p->p_memsz += alloc * bed->s->sizeof_phdr;
4319 }
4320
4321 if (p->p_type == PT_LOAD
4322 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4323 {
4324 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4325 p->p_offset = off + voff;
252b5132
RH
4326 else
4327 {
4328 file_ptr adjust;
4329
4330 adjust = off - (p->p_offset + p->p_filesz);
4331 p->p_filesz += adjust;
4332 p->p_memsz += adjust;
4333 }
4334 }
4335
252b5132
RH
4336 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4337 {
4338 asection *sec;
4339 flagword flags;
4340 bfd_size_type align;
4341
4342 sec = *secpp;
4343 flags = sec->flags;
4344 align = 1 << bfd_get_section_alignment (abfd, sec);
4345
b301b248
AM
4346 if (p->p_type == PT_LOAD
4347 || p->p_type == PT_TLS)
252b5132
RH
4348 {
4349 bfd_signed_vma adjust;
4350
5efb6261 4351 if ((flags & SEC_LOAD) != 0)
252b5132 4352 {
b301b248 4353 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4354 if (adjust < 0)
b301b248
AM
4355 {
4356 (*_bfd_error_handler)
4357 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4358 abfd, sec, (unsigned long) sec->lma);
4359 adjust = 0;
4360 }
4361 off += adjust;
4362 p->p_filesz += adjust;
4363 p->p_memsz += adjust;
252b5132 4364 }
b301b248
AM
4365 /* .tbss is special. It doesn't contribute to p_memsz of
4366 normal segments. */
4367 else if ((flags & SEC_THREAD_LOCAL) == 0
4368 || p->p_type == PT_TLS)
252b5132
RH
4369 {
4370 /* The section VMA must equal the file position
b301b248
AM
4371 modulo the page size. */
4372 bfd_size_type page = align;
a49e53ed 4373 if ((abfd->flags & D_PAGED) != 0 && bed->maxpagesize > page)
b301b248
AM
4374 page = bed->maxpagesize;
4375 adjust = vma_page_aligned_bias (sec->vma,
4376 p->p_vaddr + p->p_memsz,
4377 page);
252b5132 4378 p->p_memsz += adjust;
252b5132 4379 }
252b5132
RH
4380 }
4381
4382 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4383 {
b301b248
AM
4384 /* The section at i == 0 is the one that actually contains
4385 everything. */
4a938328
MS
4386 if (i == 0)
4387 {
252b5132 4388 sec->filepos = off;
eea6121a 4389 off += sec->size;
b301b248
AM
4390 p->p_filesz = sec->size;
4391 p->p_memsz = 0;
4392 p->p_align = 1;
252b5132 4393 }
4a938328 4394 else
252b5132 4395 {
b301b248 4396 /* The rest are fake sections that shouldn't be written. */
252b5132 4397 sec->filepos = 0;
eea6121a 4398 sec->size = 0;
b301b248
AM
4399 sec->flags = 0;
4400 continue;
252b5132 4401 }
252b5132
RH
4402 }
4403 else
4404 {
b301b248
AM
4405 if (p->p_type == PT_LOAD)
4406 {
4407 sec->filepos = off;
5efb6261
AM
4408 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4409 1997, and the exact reason for it isn't clear. One
4410 plausible explanation is that it is to work around
4411 a problem we have with linker scripts using data
4412 statements in NOLOAD sections. I don't think it
4413 makes a great deal of sense to have such a section
4414 assigned to a PT_LOAD segment, but apparently
4415 people do this. The data statement results in a
4416 bfd_data_link_order being built, and these need
4417 section contents to write into. Eventually, we get
4418 to _bfd_elf_write_object_contents which writes any
4419 section with contents to the output. Make room
4420 here for the write, so that following segments are
4421 not trashed. */
4422 if ((flags & SEC_LOAD) != 0
4423 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4424 off += sec->size;
4425 }
252b5132 4426
5efb6261 4427 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4428 {
4429 p->p_filesz += sec->size;
4430 p->p_memsz += sec->size;
4431 }
4b6c0f2f
NC
4432 /* PR ld/594: Sections in note segments which are not loaded
4433 contribute to the file size but not the in-memory size. */
4434 else if (p->p_type == PT_NOTE
4435 && (flags & SEC_HAS_CONTENTS) != 0)
4436 p->p_filesz += sec->size;
4437
b301b248
AM
4438 /* .tbss is special. It doesn't contribute to p_memsz of
4439 normal segments. */
4440 else if ((flags & SEC_THREAD_LOCAL) == 0
4441 || p->p_type == PT_TLS)
4442 p->p_memsz += sec->size;
252b5132 4443
13ae64f3 4444 if (p->p_type == PT_TLS
eea6121a 4445 && sec->size == 0
13ae64f3
JJ
4446 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4447 {
4448 struct bfd_link_order *o;
4449 bfd_vma tbss_size = 0;
4450
8423293d 4451 for (o = sec->map_head.link_order; o != NULL; o = o->next)
13ae64f3
JJ
4452 if (tbss_size < o->offset + o->size)
4453 tbss_size = o->offset + o->size;
4454
4455 p->p_memsz += tbss_size;
4456 }
4457
252b5132
RH
4458 if (align > p->p_align
4459 && (p->p_type != PT_LOAD || (abfd->flags & D_PAGED) == 0))
4460 p->p_align = align;
4461 }
4462
4463 if (! m->p_flags_valid)
4464 {
4465 p->p_flags |= PF_R;
4466 if ((flags & SEC_CODE) != 0)
4467 p->p_flags |= PF_X;
4468 if ((flags & SEC_READONLY) == 0)
4469 p->p_flags |= PF_W;
4470 }
4471 }
4472 }
4473
4474 /* Now that we have set the section file positions, we can set up
4475 the file positions for the non PT_LOAD segments. */
4476 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4477 m != NULL;
4478 m = m->next, p++)
4479 {
4480 if (p->p_type != PT_LOAD && m->count > 0)
4481 {
4482 BFD_ASSERT (! m->includes_filehdr && ! m->includes_phdrs);
229fcec5
MM
4483 /* If the section has not yet been assigned a file position,
4484 do so now. The ARM BPABI requires that .dynamic section
4485 not be marked SEC_ALLOC because it is not part of any
4486 PT_LOAD segment, so it will not be processed above. */
4487 if (p->p_type == PT_DYNAMIC && m->sections[0]->filepos == 0)
4488 {
4489 unsigned int i;
4490 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4491
4492 i = 1;
4493 while (i_shdrpp[i]->bfd_section != m->sections[0])
4494 ++i;
4495 off = (_bfd_elf_assign_file_position_for_section
4496 (i_shdrpp[i], off, TRUE));
4497 p->p_filesz = m->sections[0]->size;
4498 }
252b5132
RH
4499 p->p_offset = m->sections[0]->filepos;
4500 }
4501 if (m->count == 0)
4502 {
4503 if (m->includes_filehdr)
4504 {
4505 p->p_vaddr = filehdr_vaddr;
4506 if (! m->p_paddr_valid)
4507 p->p_paddr = filehdr_paddr;
4508 }
4509 else if (m->includes_phdrs)
4510 {
4511 p->p_vaddr = phdrs_vaddr;
4512 if (! m->p_paddr_valid)
4513 p->p_paddr = phdrs_paddr;
4514 }
8c37241b
JJ
4515 else if (p->p_type == PT_GNU_RELRO)
4516 {
4517 Elf_Internal_Phdr *lp;
4518
4519 for (lp = phdrs; lp < phdrs + count; ++lp)
4520 {
4521 if (lp->p_type == PT_LOAD
4522 && lp->p_vaddr <= link_info->relro_end
4523 && lp->p_vaddr >= link_info->relro_start
4524 && lp->p_vaddr + lp->p_filesz
4525 >= link_info->relro_end)
4526 break;
4527 }
4528
4529 if (lp < phdrs + count
4530 && link_info->relro_end > lp->p_vaddr)
4531 {
4532 p->p_vaddr = lp->p_vaddr;
4533 p->p_paddr = lp->p_paddr;
4534 p->p_offset = lp->p_offset;
4535 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4536 p->p_memsz = p->p_filesz;
4537 p->p_align = 1;
4538 p->p_flags = (lp->p_flags & ~PF_W);
4539 }
4540 else
4541 {
4542 memset (p, 0, sizeof *p);
4543 p->p_type = PT_NULL;
4544 }
4545 }
252b5132
RH
4546 }
4547 }
4548
4549 /* Clear out any program headers we allocated but did not use. */
4550 for (; count < alloc; count++, p++)
4551 {
4552 memset (p, 0, sizeof *p);
4553 p->p_type = PT_NULL;
4554 }
4555
4556 elf_tdata (abfd)->phdr = phdrs;
4557
4558 elf_tdata (abfd)->next_file_pos = off;
4559
4560 /* Write out the program headers. */
dc810e39 4561 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
252b5132 4562 || bed->s->write_out_phdrs (abfd, phdrs, alloc) != 0)
b34976b6 4563 return FALSE;
252b5132 4564
b34976b6 4565 return TRUE;
252b5132
RH
4566}
4567
4568/* Get the size of the program header.
4569
4570 If this is called by the linker before any of the section VMA's are set, it
4571 can't calculate the correct value for a strange memory layout. This only
4572 happens when SIZEOF_HEADERS is used in a linker script. In this case,
4573 SORTED_HDRS is NULL and we assume the normal scenario of one text and one
4574 data segment (exclusive of .interp and .dynamic).
4575
4576 ??? User written scripts must either not use SIZEOF_HEADERS, or assume there
4577 will be two segments. */
4578
4579static bfd_size_type
217aa764 4580get_program_header_size (bfd *abfd)
252b5132
RH
4581{
4582 size_t segs;
4583 asection *s;
9c5bfbb7 4584 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4585
4586 /* We can't return a different result each time we're called. */
4587 if (elf_tdata (abfd)->program_header_size != 0)
4588 return elf_tdata (abfd)->program_header_size;
4589
4590 if (elf_tdata (abfd)->segment_map != NULL)
4591 {
4592 struct elf_segment_map *m;
4593
4594 segs = 0;
4595 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4596 ++segs;
4597 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4598 return elf_tdata (abfd)->program_header_size;
4599 }
4600
4601 /* Assume we will need exactly two PT_LOAD segments: one for text
4602 and one for data. */
4603 segs = 2;
4604
4605 s = bfd_get_section_by_name (abfd, ".interp");
4606 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4607 {
4608 /* If we have a loadable interpreter section, we need a
4609 PT_INTERP segment. In this case, assume we also need a
ab3acfbe 4610 PT_PHDR segment, although that may not be true for all
252b5132
RH
4611 targets. */
4612 segs += 2;
4613 }
4614
4615 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4616 {
4617 /* We need a PT_DYNAMIC segment. */
4618 ++segs;
4619 }
4620
126495ed 4621 if (elf_tdata (abfd)->eh_frame_hdr)
65765700
JJ
4622 {
4623 /* We need a PT_GNU_EH_FRAME segment. */
4624 ++segs;
4625 }
4626
9ee5e499
JJ
4627 if (elf_tdata (abfd)->stack_flags)
4628 {
4629 /* We need a PT_GNU_STACK segment. */
4630 ++segs;
4631 }
4632
8c37241b
JJ
4633 if (elf_tdata (abfd)->relro)
4634 {
4635 /* We need a PT_GNU_RELRO segment. */
4636 ++segs;
4637 }
4638
252b5132
RH
4639 for (s = abfd->sections; s != NULL; s = s->next)
4640 {
4641 if ((s->flags & SEC_LOAD) != 0
4642 && strncmp (s->name, ".note", 5) == 0)
4643 {
4644 /* We need a PT_NOTE segment. */
4645 ++segs;
4646 }
4647 }
4648
13ae64f3
JJ
4649 for (s = abfd->sections; s != NULL; s = s->next)
4650 {
4651 if (s->flags & SEC_THREAD_LOCAL)
4652 {
4653 /* We need a PT_TLS segment. */
4654 ++segs;
4655 break;
4656 }
4657 }
4658
252b5132
RH
4659 /* Let the backend count up any program headers it might need. */
4660 if (bed->elf_backend_additional_program_headers)
4661 {
4662 int a;
4663
4664 a = (*bed->elf_backend_additional_program_headers) (abfd);
4665 if (a == -1)
4666 abort ();
4667 segs += a;
4668 }
4669
4670 elf_tdata (abfd)->program_header_size = segs * bed->s->sizeof_phdr;
4671 return elf_tdata (abfd)->program_header_size;
4672}
4673
4674/* Work out the file positions of all the sections. This is called by
4675 _bfd_elf_compute_section_file_positions. All the section sizes and
4676 VMAs must be known before this is called.
4677
e0638f70
AM
4678 Reloc sections come in two flavours: Those processed specially as
4679 "side-channel" data attached to a section to which they apply, and
4680 those that bfd doesn't process as relocations. The latter sort are
4681 stored in a normal bfd section by bfd_section_from_shdr. We don't
4682 consider the former sort here, unless they form part of the loadable
4683 image. Reloc sections not assigned here will be handled later by
4684 assign_file_positions_for_relocs.
252b5132
RH
4685
4686 We also don't set the positions of the .symtab and .strtab here. */
4687
b34976b6 4688static bfd_boolean
c84fca4d
AO
4689assign_file_positions_except_relocs (bfd *abfd,
4690 struct bfd_link_info *link_info)
252b5132
RH
4691{
4692 struct elf_obj_tdata * const tdata = elf_tdata (abfd);
4693 Elf_Internal_Ehdr * const i_ehdrp = elf_elfheader (abfd);
4694 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
9ad5cbcf 4695 unsigned int num_sec = elf_numsections (abfd);
252b5132 4696 file_ptr off;
9c5bfbb7 4697 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4698
4699 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4700 && bfd_get_format (abfd) != bfd_core)
4701 {
4702 Elf_Internal_Shdr **hdrpp;
4703 unsigned int i;
4704
4705 /* Start after the ELF header. */
4706 off = i_ehdrp->e_ehsize;
4707
4708 /* We are not creating an executable, which means that we are
4709 not creating a program header, and that the actual order of
4710 the sections in the file is unimportant. */
9ad5cbcf 4711 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4712 {
4713 Elf_Internal_Shdr *hdr;
4714
4715 hdr = *hdrpp;
e0638f70
AM
4716 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4717 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4718 || i == tdata->symtab_section
4719 || i == tdata->symtab_shndx_section
252b5132
RH
4720 || i == tdata->strtab_section)
4721 {
4722 hdr->sh_offset = -1;
252b5132 4723 }
9ad5cbcf 4724 else
b34976b6 4725 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4726
9ad5cbcf
AM
4727 if (i == SHN_LORESERVE - 1)
4728 {
4729 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4730 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4731 }
252b5132
RH
4732 }
4733 }
4734 else
4735 {
4736 unsigned int i;
4737 Elf_Internal_Shdr **hdrpp;
4738
4739 /* Assign file positions for the loaded sections based on the
4740 assignment of sections to segments. */
c84fca4d 4741 if (! assign_file_positions_for_segments (abfd, link_info))
b34976b6 4742 return FALSE;
252b5132
RH
4743
4744 /* Assign file positions for the other sections. */
4745
4746 off = elf_tdata (abfd)->next_file_pos;
9ad5cbcf 4747 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4748 {
4749 Elf_Internal_Shdr *hdr;
4750
4751 hdr = *hdrpp;
4752 if (hdr->bfd_section != NULL
4753 && hdr->bfd_section->filepos != 0)
4754 hdr->sh_offset = hdr->bfd_section->filepos;
4755 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4756 {
4757 ((*_bfd_error_handler)
b301b248
AM
4758 (_("%B: warning: allocated section `%s' not in segment"),
4759 abfd,
252b5132
RH
4760 (hdr->bfd_section == NULL
4761 ? "*unknown*"
4762 : hdr->bfd_section->name)));
4763 if ((abfd->flags & D_PAGED) != 0)
340b6d91
AC
4764 off += vma_page_aligned_bias (hdr->sh_addr, off,
4765 bed->maxpagesize);
252b5132 4766 else
340b6d91
AC
4767 off += vma_page_aligned_bias (hdr->sh_addr, off,
4768 hdr->sh_addralign);
252b5132 4769 off = _bfd_elf_assign_file_position_for_section (hdr, off,
b34976b6 4770 FALSE);
252b5132 4771 }
e0638f70
AM
4772 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4773 && hdr->bfd_section == NULL)
252b5132 4774 || hdr == i_shdrpp[tdata->symtab_section]
9ad5cbcf 4775 || hdr == i_shdrpp[tdata->symtab_shndx_section]
252b5132
RH
4776 || hdr == i_shdrpp[tdata->strtab_section])
4777 hdr->sh_offset = -1;
4778 else
b34976b6 4779 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf
AM
4780
4781 if (i == SHN_LORESERVE - 1)
4782 {
4783 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4784 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4785 }
252b5132
RH
4786 }
4787 }
4788
4789 /* Place the section headers. */
45d6a902 4790 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4791 i_ehdrp->e_shoff = off;
4792 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4793
4794 elf_tdata (abfd)->next_file_pos = off;
4795
b34976b6 4796 return TRUE;
252b5132
RH
4797}
4798
b34976b6 4799static bfd_boolean
217aa764 4800prep_headers (bfd *abfd)
252b5132
RH
4801{
4802 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4803 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4804 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4805 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4806 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4807
4808 i_ehdrp = elf_elfheader (abfd);
4809 i_shdrp = elf_elfsections (abfd);
4810
2b0f7ef9 4811 shstrtab = _bfd_elf_strtab_init ();
252b5132 4812 if (shstrtab == NULL)
b34976b6 4813 return FALSE;
252b5132
RH
4814
4815 elf_shstrtab (abfd) = shstrtab;
4816
4817 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4818 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4819 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4820 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4821
4822 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4823 i_ehdrp->e_ident[EI_DATA] =
4824 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4825 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4826
252b5132
RH
4827 if ((abfd->flags & DYNAMIC) != 0)
4828 i_ehdrp->e_type = ET_DYN;
4829 else if ((abfd->flags & EXEC_P) != 0)
4830 i_ehdrp->e_type = ET_EXEC;
4831 else if (bfd_get_format (abfd) == bfd_core)
4832 i_ehdrp->e_type = ET_CORE;
4833 else
4834 i_ehdrp->e_type = ET_REL;
4835
4836 switch (bfd_get_arch (abfd))
4837 {
4838 case bfd_arch_unknown:
4839 i_ehdrp->e_machine = EM_NONE;
4840 break;
aa4f99bb
AO
4841
4842 /* There used to be a long list of cases here, each one setting
4843 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4844 in the corresponding bfd definition. To avoid duplication,
4845 the switch was removed. Machines that need special handling
4846 can generally do it in elf_backend_final_write_processing(),
4847 unless they need the information earlier than the final write.
4848 Such need can generally be supplied by replacing the tests for
4849 e_machine with the conditions used to determine it. */
252b5132 4850 default:
9c5bfbb7
AM
4851 i_ehdrp->e_machine = bed->elf_machine_code;
4852 }
aa4f99bb 4853
252b5132
RH
4854 i_ehdrp->e_version = bed->s->ev_current;
4855 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4856
c044fabd 4857 /* No program header, for now. */
252b5132
RH
4858 i_ehdrp->e_phoff = 0;
4859 i_ehdrp->e_phentsize = 0;
4860 i_ehdrp->e_phnum = 0;
4861
c044fabd 4862 /* Each bfd section is section header entry. */
252b5132
RH
4863 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4864 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4865
c044fabd 4866 /* If we're building an executable, we'll need a program header table. */
252b5132 4867 if (abfd->flags & EXEC_P)
0e71e495
BE
4868 /* It all happens later. */
4869 ;
252b5132
RH
4870 else
4871 {
4872 i_ehdrp->e_phentsize = 0;
4873 i_phdrp = 0;
4874 i_ehdrp->e_phoff = 0;
4875 }
4876
4877 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4878 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4879 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4880 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4881 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4882 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4883 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4884 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4885 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4886 return FALSE;
252b5132 4887
b34976b6 4888 return TRUE;
252b5132
RH
4889}
4890
4891/* Assign file positions for all the reloc sections which are not part
4892 of the loadable file image. */
4893
4894void
217aa764 4895_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4896{
4897 file_ptr off;
9ad5cbcf 4898 unsigned int i, num_sec;
252b5132
RH
4899 Elf_Internal_Shdr **shdrpp;
4900
4901 off = elf_tdata (abfd)->next_file_pos;
4902
9ad5cbcf
AM
4903 num_sec = elf_numsections (abfd);
4904 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4905 {
4906 Elf_Internal_Shdr *shdrp;
4907
4908 shdrp = *shdrpp;
4909 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4910 && shdrp->sh_offset == -1)
b34976b6 4911 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4912 }
4913
4914 elf_tdata (abfd)->next_file_pos = off;
4915}
4916
b34976b6 4917bfd_boolean
217aa764 4918_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4919{
9c5bfbb7 4920 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4921 Elf_Internal_Ehdr *i_ehdrp;
4922 Elf_Internal_Shdr **i_shdrp;
b34976b6 4923 bfd_boolean failed;
9ad5cbcf 4924 unsigned int count, num_sec;
252b5132
RH
4925
4926 if (! abfd->output_has_begun
217aa764 4927 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4928 return FALSE;
252b5132
RH
4929
4930 i_shdrp = elf_elfsections (abfd);
4931 i_ehdrp = elf_elfheader (abfd);
4932
b34976b6 4933 failed = FALSE;
252b5132
RH
4934 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4935 if (failed)
b34976b6 4936 return FALSE;
252b5132
RH
4937
4938 _bfd_elf_assign_file_positions_for_relocs (abfd);
4939
c044fabd 4940 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4941 num_sec = elf_numsections (abfd);
4942 for (count = 1; count < num_sec; count++)
252b5132
RH
4943 {
4944 if (bed->elf_backend_section_processing)
4945 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4946 if (i_shdrp[count]->contents)
4947 {
dc810e39
AM
4948 bfd_size_type amt = i_shdrp[count]->sh_size;
4949
252b5132 4950 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4951 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4952 return FALSE;
252b5132 4953 }
9ad5cbcf
AM
4954 if (count == SHN_LORESERVE - 1)
4955 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4956 }
4957
4958 /* Write out the section header names. */
26ae6d5e
DJ
4959 if (elf_shstrtab (abfd) != NULL
4960 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
4961 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4962 return FALSE;
252b5132
RH
4963
4964 if (bed->elf_backend_final_write_processing)
4965 (*bed->elf_backend_final_write_processing) (abfd,
4966 elf_tdata (abfd)->linker);
4967
4968 return bed->s->write_shdrs_and_ehdr (abfd);
4969}
4970
b34976b6 4971bfd_boolean
217aa764 4972_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4973{
c044fabd 4974 /* Hopefully this can be done just like an object file. */
252b5132
RH
4975 return _bfd_elf_write_object_contents (abfd);
4976}
c044fabd
KH
4977
4978/* Given a section, search the header to find them. */
4979
252b5132 4980int
198beae2 4981_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4982{
9c5bfbb7 4983 const struct elf_backend_data *bed;
252b5132 4984 int index;
252b5132 4985
9ad5cbcf
AM
4986 if (elf_section_data (asect) != NULL
4987 && elf_section_data (asect)->this_idx != 0)
4988 return elf_section_data (asect)->this_idx;
4989
4990 if (bfd_is_abs_section (asect))
af746e92
AM
4991 index = SHN_ABS;
4992 else if (bfd_is_com_section (asect))
4993 index = SHN_COMMON;
4994 else if (bfd_is_und_section (asect))
4995 index = SHN_UNDEF;
4996 else
6dc132d9 4997 index = -1;
252b5132 4998
af746e92 4999 bed = get_elf_backend_data (abfd);
252b5132
RH
5000 if (bed->elf_backend_section_from_bfd_section)
5001 {
af746e92 5002 int retval = index;
9ad5cbcf 5003
af746e92
AM
5004 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5005 return retval;
252b5132
RH
5006 }
5007
af746e92
AM
5008 if (index == -1)
5009 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5010
af746e92 5011 return index;
252b5132
RH
5012}
5013
5014/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5015 on error. */
5016
5017int
217aa764 5018_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5019{
5020 asymbol *asym_ptr = *asym_ptr_ptr;
5021 int idx;
5022 flagword flags = asym_ptr->flags;
5023
5024 /* When gas creates relocations against local labels, it creates its
5025 own symbol for the section, but does put the symbol into the
5026 symbol chain, so udata is 0. When the linker is generating
5027 relocatable output, this section symbol may be for one of the
5028 input sections rather than the output section. */
5029 if (asym_ptr->udata.i == 0
5030 && (flags & BSF_SECTION_SYM)
5031 && asym_ptr->section)
5032 {
5033 int indx;
5034
5035 if (asym_ptr->section->output_section != NULL)
5036 indx = asym_ptr->section->output_section->index;
5037 else
5038 indx = asym_ptr->section->index;
4e89ac30
L
5039 if (indx < elf_num_section_syms (abfd)
5040 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5041 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5042 }
5043
5044 idx = asym_ptr->udata.i;
5045
5046 if (idx == 0)
5047 {
5048 /* This case can occur when using --strip-symbol on a symbol
5049 which is used in a relocation entry. */
5050 (*_bfd_error_handler)
d003868e
AM
5051 (_("%B: symbol `%s' required but not present"),
5052 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5053 bfd_set_error (bfd_error_no_symbols);
5054 return -1;
5055 }
5056
5057#if DEBUG & 4
5058 {
5059 fprintf (stderr,
661a3fd4 5060 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5061 (long) asym_ptr, asym_ptr->name, idx, flags,
5062 elf_symbol_flags (flags));
5063 fflush (stderr);
5064 }
5065#endif
5066
5067 return idx;
5068}
5069
5070/* Copy private BFD data. This copies any program header information. */
5071
b34976b6 5072static bfd_boolean
217aa764 5073copy_private_bfd_data (bfd *ibfd, bfd *obfd)
252b5132 5074{
b34976b6
AM
5075 Elf_Internal_Ehdr *iehdr;
5076 struct elf_segment_map *map;
5077 struct elf_segment_map *map_first;
5078 struct elf_segment_map **pointer_to_map;
5079 Elf_Internal_Phdr *segment;
5080 asection *section;
5081 unsigned int i;
5082 unsigned int num_segments;
5083 bfd_boolean phdr_included = FALSE;
5084 bfd_vma maxpagesize;
5085 struct elf_segment_map *phdr_adjust_seg = NULL;
5086 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5087 const struct elf_backend_data *bed;
bc67d8a6 5088
c044fabd 5089 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
252b5132 5090 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5091 return TRUE;
252b5132
RH
5092
5093 if (elf_tdata (ibfd)->phdr == NULL)
b34976b6 5094 return TRUE;
252b5132 5095
caf47ea6 5096 bed = get_elf_backend_data (ibfd);
252b5132
RH
5097 iehdr = elf_elfheader (ibfd);
5098
bc67d8a6 5099 map_first = NULL;
c044fabd 5100 pointer_to_map = &map_first;
252b5132
RH
5101
5102 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5103 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5104
5105 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5106#define SEGMENT_END(segment, start) \
5107 (start + (segment->p_memsz > segment->p_filesz \
5108 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5109
eecdbe52
JJ
5110#define SECTION_SIZE(section, segment) \
5111 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5112 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5113 ? section->size : 0)
eecdbe52 5114
b34976b6 5115 /* Returns TRUE if the given section is contained within
bc67d8a6 5116 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5117#define IS_CONTAINED_BY_VMA(section, segment) \
5118 (section->vma >= segment->p_vaddr \
eecdbe52 5119 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5120 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5121
b34976b6 5122 /* Returns TRUE if the given section is contained within
bc67d8a6 5123 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5124#define IS_CONTAINED_BY_LMA(section, segment, base) \
5125 (section->lma >= base \
eecdbe52 5126 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5127 <= SEGMENT_END (segment, base)))
252b5132 5128
c044fabd 5129 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5130#define IS_COREFILE_NOTE(p, s) \
5131 (p->p_type == PT_NOTE \
5132 && bfd_get_format (ibfd) == bfd_core \
5133 && s->vma == 0 && s->lma == 0 \
5134 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5135 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5136 <= p->p_offset + p->p_filesz))
252b5132
RH
5137
5138 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5139 linker, which generates a PT_INTERP section with p_vaddr and
5140 p_memsz set to 0. */
aecc8f8a
AM
5141#define IS_SOLARIS_PT_INTERP(p, s) \
5142 (p->p_vaddr == 0 \
5143 && p->p_paddr == 0 \
5144 && p->p_memsz == 0 \
5145 && p->p_filesz > 0 \
5146 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5147 && s->size > 0 \
aecc8f8a 5148 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5149 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5150 <= p->p_offset + p->p_filesz))
5c440b1e 5151
bc67d8a6
NC
5152 /* Decide if the given section should be included in the given segment.
5153 A section will be included if:
f5ffc919
NC
5154 1. It is within the address space of the segment -- we use the LMA
5155 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5156 2. It is an allocated segment,
5157 3. There is an output section associated with it,
eecdbe52 5158 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5159 5. PT_GNU_STACK segments do not include any sections.
5160 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5161 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5162 8. PT_DYNAMIC should not contain empty sections at the beginning
5163 (with the possible exception of .dynamic). */
caf47ea6 5164#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5165 ((((segment->p_paddr \
5166 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5167 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5168 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5169 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5170 && section->output_section != NULL \
03394ac9 5171 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5172 && (segment->p_type != PT_TLS \
5173 || (section->flags & SEC_THREAD_LOCAL)) \
5174 && (segment->p_type == PT_LOAD \
5175 || segment->p_type == PT_TLS \
5176 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5177 && (segment->p_type != PT_DYNAMIC \
5178 || SECTION_SIZE (section, segment) > 0 \
5179 || (segment->p_paddr \
5180 ? segment->p_paddr != section->lma \
5181 : segment->p_vaddr != section->vma) \
5182 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5183 == 0)) \
82e51918 5184 && ! section->segment_mark)
bc67d8a6 5185
b34976b6 5186 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5187#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5188 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5189
5190 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5191 their VMA address ranges and their LMA address ranges overlap.
5192 It is possible to have overlapping VMA ranges without overlapping LMA
5193 ranges. RedBoot images for example can have both .data and .bss mapped
5194 to the same VMA range, but with the .data section mapped to a different
5195 LMA. */
aecc8f8a 5196#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5197 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5198 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5199 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5200 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5201
5202 /* Initialise the segment mark field. */
5203 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5204 section->segment_mark = FALSE;
bc67d8a6 5205
252b5132 5206 /* Scan through the segments specified in the program header
bc67d8a6 5207 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5208 in the loadable segments. These can be created by weird
aecc8f8a 5209 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5210 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5211 i < num_segments;
c044fabd 5212 i++, segment++)
252b5132 5213 {
252b5132 5214 unsigned int j;
c044fabd 5215 Elf_Internal_Phdr *segment2;
252b5132 5216
aecc8f8a
AM
5217 if (segment->p_type == PT_INTERP)
5218 for (section = ibfd->sections; section; section = section->next)
5219 if (IS_SOLARIS_PT_INTERP (segment, section))
5220 {
5221 /* Mininal change so that the normal section to segment
4cc11e76 5222 assignment code will work. */
aecc8f8a
AM
5223 segment->p_vaddr = section->vma;
5224 break;
5225 }
5226
bc67d8a6
NC
5227 if (segment->p_type != PT_LOAD)
5228 continue;
c044fabd 5229
bc67d8a6 5230 /* Determine if this segment overlaps any previous segments. */
c044fabd 5231 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5232 {
5233 bfd_signed_vma extra_length;
c044fabd 5234
bc67d8a6
NC
5235 if (segment2->p_type != PT_LOAD
5236 || ! SEGMENT_OVERLAPS (segment, segment2))
5237 continue;
c044fabd 5238
bc67d8a6
NC
5239 /* Merge the two segments together. */
5240 if (segment2->p_vaddr < segment->p_vaddr)
5241 {
c044fabd
KH
5242 /* Extend SEGMENT2 to include SEGMENT and then delete
5243 SEGMENT. */
bc67d8a6
NC
5244 extra_length =
5245 SEGMENT_END (segment, segment->p_vaddr)
5246 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5247
bc67d8a6
NC
5248 if (extra_length > 0)
5249 {
5250 segment2->p_memsz += extra_length;
5251 segment2->p_filesz += extra_length;
5252 }
c044fabd 5253
bc67d8a6 5254 segment->p_type = PT_NULL;
c044fabd 5255
bc67d8a6
NC
5256 /* Since we have deleted P we must restart the outer loop. */
5257 i = 0;
5258 segment = elf_tdata (ibfd)->phdr;
5259 break;
5260 }
5261 else
5262 {
c044fabd
KH
5263 /* Extend SEGMENT to include SEGMENT2 and then delete
5264 SEGMENT2. */
bc67d8a6
NC
5265 extra_length =
5266 SEGMENT_END (segment2, segment2->p_vaddr)
5267 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5268
bc67d8a6
NC
5269 if (extra_length > 0)
5270 {
5271 segment->p_memsz += extra_length;
5272 segment->p_filesz += extra_length;
5273 }
c044fabd 5274
bc67d8a6
NC
5275 segment2->p_type = PT_NULL;
5276 }
5277 }
5278 }
c044fabd 5279
bc67d8a6
NC
5280 /* The second scan attempts to assign sections to segments. */
5281 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5282 i < num_segments;
5283 i ++, segment ++)
5284 {
5285 unsigned int section_count;
5286 asection ** sections;
5287 asection * output_section;
5288 unsigned int isec;
5289 bfd_vma matching_lma;
5290 bfd_vma suggested_lma;
5291 unsigned int j;
dc810e39 5292 bfd_size_type amt;
bc67d8a6
NC
5293
5294 if (segment->p_type == PT_NULL)
5295 continue;
c044fabd 5296
bc67d8a6 5297 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5298 for (section = ibfd->sections, section_count = 0;
5299 section != NULL;
5300 section = section->next)
caf47ea6 5301 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5302 ++section_count;
811072d8 5303
b5f852ea
NC
5304 /* Allocate a segment map big enough to contain
5305 all of the sections we have selected. */
dc810e39
AM
5306 amt = sizeof (struct elf_segment_map);
5307 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5308 map = bfd_alloc (obfd, amt);
bc67d8a6 5309 if (map == NULL)
b34976b6 5310 return FALSE;
252b5132
RH
5311
5312 /* Initialise the fields of the segment map. Default to
5313 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5314 map->next = NULL;
5315 map->p_type = segment->p_type;
5316 map->p_flags = segment->p_flags;
5317 map->p_flags_valid = 1;
5318 map->p_paddr = segment->p_paddr;
5319 map->p_paddr_valid = 1;
252b5132
RH
5320
5321 /* Determine if this segment contains the ELF file header
5322 and if it contains the program headers themselves. */
bc67d8a6
NC
5323 map->includes_filehdr = (segment->p_offset == 0
5324 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5325
bc67d8a6 5326 map->includes_phdrs = 0;
252b5132 5327
bc67d8a6 5328 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5329 {
bc67d8a6
NC
5330 map->includes_phdrs =
5331 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5332 && (segment->p_offset + segment->p_filesz
252b5132
RH
5333 >= ((bfd_vma) iehdr->e_phoff
5334 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5335
bc67d8a6 5336 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5337 phdr_included = TRUE;
252b5132
RH
5338 }
5339
bc67d8a6 5340 if (section_count == 0)
252b5132
RH
5341 {
5342 /* Special segments, such as the PT_PHDR segment, may contain
5343 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5344 something. They are allowed by the ELF spec however, so only
5345 a warning is produced. */
bc67d8a6 5346 if (segment->p_type == PT_LOAD)
caf47ea6 5347 (*_bfd_error_handler)
d003868e
AM
5348 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5349 ibfd);
252b5132 5350
bc67d8a6 5351 map->count = 0;
c044fabd
KH
5352 *pointer_to_map = map;
5353 pointer_to_map = &map->next;
252b5132
RH
5354
5355 continue;
5356 }
5357
5358 /* Now scan the sections in the input BFD again and attempt
5359 to add their corresponding output sections to the segment map.
5360 The problem here is how to handle an output section which has
5361 been moved (ie had its LMA changed). There are four possibilities:
5362
5363 1. None of the sections have been moved.
5364 In this case we can continue to use the segment LMA from the
5365 input BFD.
5366
5367 2. All of the sections have been moved by the same amount.
5368 In this case we can change the segment's LMA to match the LMA
5369 of the first section.
5370
5371 3. Some of the sections have been moved, others have not.
5372 In this case those sections which have not been moved can be
5373 placed in the current segment which will have to have its size,
5374 and possibly its LMA changed, and a new segment or segments will
5375 have to be created to contain the other sections.
5376
b5f852ea 5377 4. The sections have been moved, but not by the same amount.
252b5132
RH
5378 In this case we can change the segment's LMA to match the LMA
5379 of the first section and we will have to create a new segment
5380 or segments to contain the other sections.
5381
5382 In order to save time, we allocate an array to hold the section
5383 pointers that we are interested in. As these sections get assigned
5384 to a segment, they are removed from this array. */
5385
0b14c2aa
L
5386 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5387 to work around this long long bug. */
5388 amt = section_count * sizeof (asection *);
217aa764 5389 sections = bfd_malloc (amt);
252b5132 5390 if (sections == NULL)
b34976b6 5391 return FALSE;
252b5132
RH
5392
5393 /* Step One: Scan for segment vs section LMA conflicts.
5394 Also add the sections to the section array allocated above.
5395 Also add the sections to the current segment. In the common
5396 case, where the sections have not been moved, this means that
5397 we have completely filled the segment, and there is nothing
5398 more to do. */
252b5132 5399 isec = 0;
72730e0c 5400 matching_lma = 0;
252b5132
RH
5401 suggested_lma = 0;
5402
bc67d8a6
NC
5403 for (j = 0, section = ibfd->sections;
5404 section != NULL;
5405 section = section->next)
252b5132 5406 {
caf47ea6 5407 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5408 {
bc67d8a6
NC
5409 output_section = section->output_section;
5410
5411 sections[j ++] = section;
252b5132
RH
5412
5413 /* The Solaris native linker always sets p_paddr to 0.
5414 We try to catch that case here, and set it to the
5e8d7549
NC
5415 correct value. Note - some backends require that
5416 p_paddr be left as zero. */
bc67d8a6 5417 if (segment->p_paddr == 0
4455705d 5418 && segment->p_vaddr != 0
5e8d7549 5419 && (! bed->want_p_paddr_set_to_zero)
252b5132 5420 && isec == 0
bc67d8a6
NC
5421 && output_section->lma != 0
5422 && (output_section->vma == (segment->p_vaddr
5423 + (map->includes_filehdr
5424 ? iehdr->e_ehsize
5425 : 0)
5426 + (map->includes_phdrs
079e9a2f
AM
5427 ? (iehdr->e_phnum
5428 * iehdr->e_phentsize)
bc67d8a6
NC
5429 : 0))))
5430 map->p_paddr = segment->p_vaddr;
252b5132
RH
5431
5432 /* Match up the physical address of the segment with the
5433 LMA address of the output section. */
bc67d8a6 5434 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5435 || IS_COREFILE_NOTE (segment, section)
5436 || (bed->want_p_paddr_set_to_zero &&
5437 IS_CONTAINED_BY_VMA (output_section, segment))
5438 )
252b5132
RH
5439 {
5440 if (matching_lma == 0)
bc67d8a6 5441 matching_lma = output_section->lma;
252b5132
RH
5442
5443 /* We assume that if the section fits within the segment
bc67d8a6 5444 then it does not overlap any other section within that
252b5132 5445 segment. */
bc67d8a6 5446 map->sections[isec ++] = output_section;
252b5132
RH
5447 }
5448 else if (suggested_lma == 0)
bc67d8a6 5449 suggested_lma = output_section->lma;
252b5132
RH
5450 }
5451 }
5452
bc67d8a6 5453 BFD_ASSERT (j == section_count);
252b5132
RH
5454
5455 /* Step Two: Adjust the physical address of the current segment,
5456 if necessary. */
bc67d8a6 5457 if (isec == section_count)
252b5132
RH
5458 {
5459 /* All of the sections fitted within the segment as currently
5460 specified. This is the default case. Add the segment to
5461 the list of built segments and carry on to process the next
5462 program header in the input BFD. */
bc67d8a6 5463 map->count = section_count;
c044fabd
KH
5464 *pointer_to_map = map;
5465 pointer_to_map = &map->next;
252b5132
RH
5466
5467 free (sections);
5468 continue;
5469 }
252b5132
RH
5470 else
5471 {
72730e0c
AM
5472 if (matching_lma != 0)
5473 {
5474 /* At least one section fits inside the current segment.
5475 Keep it, but modify its physical address to match the
5476 LMA of the first section that fitted. */
bc67d8a6 5477 map->p_paddr = matching_lma;
72730e0c
AM
5478 }
5479 else
5480 {
5481 /* None of the sections fitted inside the current segment.
5482 Change the current segment's physical address to match
5483 the LMA of the first section. */
bc67d8a6 5484 map->p_paddr = suggested_lma;
72730e0c
AM
5485 }
5486
bc67d8a6
NC
5487 /* Offset the segment physical address from the lma
5488 to allow for space taken up by elf headers. */
5489 if (map->includes_filehdr)
5490 map->p_paddr -= iehdr->e_ehsize;
252b5132 5491
bc67d8a6
NC
5492 if (map->includes_phdrs)
5493 {
5494 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5495
5496 /* iehdr->e_phnum is just an estimate of the number
5497 of program headers that we will need. Make a note
5498 here of the number we used and the segment we chose
5499 to hold these headers, so that we can adjust the
5500 offset when we know the correct value. */
5501 phdr_adjust_num = iehdr->e_phnum;
5502 phdr_adjust_seg = map;
5503 }
252b5132
RH
5504 }
5505
5506 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5507 those that fit to the current segment and removing them from the
252b5132
RH
5508 sections array; but making sure not to leave large gaps. Once all
5509 possible sections have been assigned to the current segment it is
5510 added to the list of built segments and if sections still remain
5511 to be assigned, a new segment is constructed before repeating
5512 the loop. */
5513 isec = 0;
5514 do
5515 {
bc67d8a6 5516 map->count = 0;
252b5132
RH
5517 suggested_lma = 0;
5518
5519 /* Fill the current segment with sections that fit. */
bc67d8a6 5520 for (j = 0; j < section_count; j++)
252b5132 5521 {
bc67d8a6 5522 section = sections[j];
252b5132 5523
bc67d8a6 5524 if (section == NULL)
252b5132
RH
5525 continue;
5526
bc67d8a6 5527 output_section = section->output_section;
252b5132 5528
bc67d8a6 5529 BFD_ASSERT (output_section != NULL);
c044fabd 5530
bc67d8a6
NC
5531 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5532 || IS_COREFILE_NOTE (segment, section))
252b5132 5533 {
bc67d8a6 5534 if (map->count == 0)
252b5132
RH
5535 {
5536 /* If the first section in a segment does not start at
bc67d8a6
NC
5537 the beginning of the segment, then something is
5538 wrong. */
5539 if (output_section->lma !=
5540 (map->p_paddr
5541 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5542 + (map->includes_phdrs
5543 ? iehdr->e_phnum * iehdr->e_phentsize
5544 : 0)))
252b5132
RH
5545 abort ();
5546 }
5547 else
5548 {
5549 asection * prev_sec;
252b5132 5550
bc67d8a6 5551 prev_sec = map->sections[map->count - 1];
252b5132
RH
5552
5553 /* If the gap between the end of the previous section
bc67d8a6
NC
5554 and the start of this section is more than
5555 maxpagesize then we need to start a new segment. */
eea6121a 5556 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5557 maxpagesize)
caf47ea6 5558 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5559 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5560 > output_section->lma))
252b5132
RH
5561 {
5562 if (suggested_lma == 0)
bc67d8a6 5563 suggested_lma = output_section->lma;
252b5132
RH
5564
5565 continue;
5566 }
5567 }
5568
bc67d8a6 5569 map->sections[map->count++] = output_section;
252b5132
RH
5570 ++isec;
5571 sections[j] = NULL;
b34976b6 5572 section->segment_mark = TRUE;
252b5132
RH
5573 }
5574 else if (suggested_lma == 0)
bc67d8a6 5575 suggested_lma = output_section->lma;
252b5132
RH
5576 }
5577
bc67d8a6 5578 BFD_ASSERT (map->count > 0);
252b5132
RH
5579
5580 /* Add the current segment to the list of built segments. */
c044fabd
KH
5581 *pointer_to_map = map;
5582 pointer_to_map = &map->next;
252b5132 5583
bc67d8a6 5584 if (isec < section_count)
252b5132
RH
5585 {
5586 /* We still have not allocated all of the sections to
5587 segments. Create a new segment here, initialise it
5588 and carry on looping. */
dc810e39
AM
5589 amt = sizeof (struct elf_segment_map);
5590 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5591 map = bfd_alloc (obfd, amt);
bc67d8a6 5592 if (map == NULL)
5ed6aba4
NC
5593 {
5594 free (sections);
5595 return FALSE;
5596 }
252b5132
RH
5597
5598 /* Initialise the fields of the segment map. Set the physical
5599 physical address to the LMA of the first section that has
5600 not yet been assigned. */
bc67d8a6
NC
5601 map->next = NULL;
5602 map->p_type = segment->p_type;
5603 map->p_flags = segment->p_flags;
5604 map->p_flags_valid = 1;
5605 map->p_paddr = suggested_lma;
5606 map->p_paddr_valid = 1;
5607 map->includes_filehdr = 0;
5608 map->includes_phdrs = 0;
252b5132
RH
5609 }
5610 }
bc67d8a6 5611 while (isec < section_count);
252b5132
RH
5612
5613 free (sections);
5614 }
5615
5616 /* The Solaris linker creates program headers in which all the
5617 p_paddr fields are zero. When we try to objcopy or strip such a
5618 file, we get confused. Check for this case, and if we find it
5619 reset the p_paddr_valid fields. */
bc67d8a6
NC
5620 for (map = map_first; map != NULL; map = map->next)
5621 if (map->p_paddr != 0)
252b5132 5622 break;
bc67d8a6 5623 if (map == NULL)
b5f852ea
NC
5624 for (map = map_first; map != NULL; map = map->next)
5625 map->p_paddr_valid = 0;
252b5132 5626
bc67d8a6
NC
5627 elf_tdata (obfd)->segment_map = map_first;
5628
5629 /* If we had to estimate the number of program headers that were
9ad5cbcf 5630 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5631 the offset if necessary. */
5632 if (phdr_adjust_seg != NULL)
5633 {
5634 unsigned int count;
c044fabd 5635
bc67d8a6 5636 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5637 count++;
252b5132 5638
bc67d8a6
NC
5639 if (count > phdr_adjust_num)
5640 phdr_adjust_seg->p_paddr
5641 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5642 }
c044fabd 5643
bc67d8a6 5644#undef SEGMENT_END
eecdbe52 5645#undef SECTION_SIZE
bc67d8a6
NC
5646#undef IS_CONTAINED_BY_VMA
5647#undef IS_CONTAINED_BY_LMA
252b5132 5648#undef IS_COREFILE_NOTE
bc67d8a6
NC
5649#undef IS_SOLARIS_PT_INTERP
5650#undef INCLUDE_SECTION_IN_SEGMENT
5651#undef SEGMENT_AFTER_SEGMENT
5652#undef SEGMENT_OVERLAPS
b34976b6 5653 return TRUE;
252b5132
RH
5654}
5655
5656/* Copy private section information. This copies over the entsize
5657 field, and sometimes the info field. */
5658
b34976b6 5659bfd_boolean
217aa764
AM
5660_bfd_elf_copy_private_section_data (bfd *ibfd,
5661 asection *isec,
5662 bfd *obfd,
5663 asection *osec)
252b5132
RH
5664{
5665 Elf_Internal_Shdr *ihdr, *ohdr;
5666
5667 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5668 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 5669 return TRUE;
252b5132 5670
252b5132
RH
5671 ihdr = &elf_section_data (isec)->this_hdr;
5672 ohdr = &elf_section_data (osec)->this_hdr;
5673
5674 ohdr->sh_entsize = ihdr->sh_entsize;
5675
5676 if (ihdr->sh_type == SHT_SYMTAB
5677 || ihdr->sh_type == SHT_DYNSYM
5678 || ihdr->sh_type == SHT_GNU_verneed
5679 || ihdr->sh_type == SHT_GNU_verdef)
5680 ohdr->sh_info = ihdr->sh_info;
5681
9dce4196
AM
5682 /* Set things up for objcopy. The output SHT_GROUP section will
5683 have its elf_next_in_group pointing back to the input group
278d8f37
L
5684 members. Ignore linker created group section. See
5685 elfNN_ia64_object_p in elfxx-ia64.c. */
5686 if (elf_sec_group (isec) == NULL
5687 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5688 {
5689 elf_next_in_group (osec) = elf_next_in_group (isec);
5690 elf_group_name (osec) = elf_group_name (isec);
5691 }
9dce4196 5692
68bfbfcc 5693 osec->use_rela_p = isec->use_rela_p;
bf572ba0 5694
b34976b6 5695 return TRUE;
252b5132
RH
5696}
5697
80fccad2
BW
5698/* Copy private header information. */
5699
5700bfd_boolean
5701_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
5702{
5703 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5704 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5705 return TRUE;
5706
5707 /* Copy over private BFD data if it has not already been copied.
5708 This must be done here, rather than in the copy_private_bfd_data
5709 entry point, because the latter is called after the section
5710 contents have been set, which means that the program headers have
5711 already been worked out. */
5712 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
5713 {
5714 if (! copy_private_bfd_data (ibfd, obfd))
5715 return FALSE;
5716 }
5717
5718 return TRUE;
5719}
5720
252b5132
RH
5721/* Copy private symbol information. If this symbol is in a section
5722 which we did not map into a BFD section, try to map the section
5723 index correctly. We use special macro definitions for the mapped
5724 section indices; these definitions are interpreted by the
5725 swap_out_syms function. */
5726
9ad5cbcf
AM
5727#define MAP_ONESYMTAB (SHN_HIOS + 1)
5728#define MAP_DYNSYMTAB (SHN_HIOS + 2)
5729#define MAP_STRTAB (SHN_HIOS + 3)
5730#define MAP_SHSTRTAB (SHN_HIOS + 4)
5731#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 5732
b34976b6 5733bfd_boolean
217aa764
AM
5734_bfd_elf_copy_private_symbol_data (bfd *ibfd,
5735 asymbol *isymarg,
5736 bfd *obfd,
5737 asymbol *osymarg)
252b5132
RH
5738{
5739 elf_symbol_type *isym, *osym;
5740
5741 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5742 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 5743 return TRUE;
252b5132
RH
5744
5745 isym = elf_symbol_from (ibfd, isymarg);
5746 osym = elf_symbol_from (obfd, osymarg);
5747
5748 if (isym != NULL
5749 && osym != NULL
5750 && bfd_is_abs_section (isym->symbol.section))
5751 {
5752 unsigned int shndx;
5753
5754 shndx = isym->internal_elf_sym.st_shndx;
5755 if (shndx == elf_onesymtab (ibfd))
5756 shndx = MAP_ONESYMTAB;
5757 else if (shndx == elf_dynsymtab (ibfd))
5758 shndx = MAP_DYNSYMTAB;
5759 else if (shndx == elf_tdata (ibfd)->strtab_section)
5760 shndx = MAP_STRTAB;
5761 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
5762 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
5763 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
5764 shndx = MAP_SYM_SHNDX;
252b5132
RH
5765 osym->internal_elf_sym.st_shndx = shndx;
5766 }
5767
b34976b6 5768 return TRUE;
252b5132
RH
5769}
5770
5771/* Swap out the symbols. */
5772
b34976b6 5773static bfd_boolean
217aa764
AM
5774swap_out_syms (bfd *abfd,
5775 struct bfd_strtab_hash **sttp,
5776 int relocatable_p)
252b5132 5777{
9c5bfbb7 5778 const struct elf_backend_data *bed;
079e9a2f
AM
5779 int symcount;
5780 asymbol **syms;
5781 struct bfd_strtab_hash *stt;
5782 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 5783 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 5784 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
5785 bfd_byte *outbound_syms;
5786 bfd_byte *outbound_shndx;
079e9a2f
AM
5787 int idx;
5788 bfd_size_type amt;
174fd7f9 5789 bfd_boolean name_local_sections;
252b5132
RH
5790
5791 if (!elf_map_symbols (abfd))
b34976b6 5792 return FALSE;
252b5132 5793
c044fabd 5794 /* Dump out the symtabs. */
079e9a2f
AM
5795 stt = _bfd_elf_stringtab_init ();
5796 if (stt == NULL)
b34976b6 5797 return FALSE;
252b5132 5798
079e9a2f
AM
5799 bed = get_elf_backend_data (abfd);
5800 symcount = bfd_get_symcount (abfd);
5801 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5802 symtab_hdr->sh_type = SHT_SYMTAB;
5803 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
5804 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
5805 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 5806 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
5807
5808 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5809 symstrtab_hdr->sh_type = SHT_STRTAB;
5810
5811 amt = (bfd_size_type) (1 + symcount) * bed->s->sizeof_sym;
5812 outbound_syms = bfd_alloc (abfd, amt);
5813 if (outbound_syms == NULL)
5ed6aba4
NC
5814 {
5815 _bfd_stringtab_free (stt);
5816 return FALSE;
5817 }
217aa764 5818 symtab_hdr->contents = outbound_syms;
252b5132 5819
9ad5cbcf
AM
5820 outbound_shndx = NULL;
5821 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5822 if (symtab_shndx_hdr->sh_name != 0)
5823 {
5824 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
1126897b 5825 outbound_shndx = bfd_zalloc (abfd, amt);
9ad5cbcf 5826 if (outbound_shndx == NULL)
5ed6aba4
NC
5827 {
5828 _bfd_stringtab_free (stt);
5829 return FALSE;
5830 }
5831
9ad5cbcf
AM
5832 symtab_shndx_hdr->contents = outbound_shndx;
5833 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5834 symtab_shndx_hdr->sh_size = amt;
5835 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5836 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5837 }
5838
589e6347 5839 /* Now generate the data (for "contents"). */
079e9a2f
AM
5840 {
5841 /* Fill in zeroth symbol and swap it out. */
5842 Elf_Internal_Sym sym;
5843 sym.st_name = 0;
5844 sym.st_value = 0;
5845 sym.st_size = 0;
5846 sym.st_info = 0;
5847 sym.st_other = 0;
5848 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 5849 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 5850 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
5851 if (outbound_shndx != NULL)
5852 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 5853 }
252b5132 5854
174fd7f9
RS
5855 name_local_sections
5856 = (bed->elf_backend_name_local_section_symbols
5857 && bed->elf_backend_name_local_section_symbols (abfd));
5858
079e9a2f
AM
5859 syms = bfd_get_outsymbols (abfd);
5860 for (idx = 0; idx < symcount; idx++)
252b5132 5861 {
252b5132 5862 Elf_Internal_Sym sym;
079e9a2f
AM
5863 bfd_vma value = syms[idx]->value;
5864 elf_symbol_type *type_ptr;
5865 flagword flags = syms[idx]->flags;
5866 int type;
252b5132 5867
174fd7f9
RS
5868 if (!name_local_sections
5869 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
5870 {
5871 /* Local section symbols have no name. */
5872 sym.st_name = 0;
5873 }
5874 else
5875 {
5876 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
5877 syms[idx]->name,
b34976b6 5878 TRUE, FALSE);
079e9a2f 5879 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
5880 {
5881 _bfd_stringtab_free (stt);
5882 return FALSE;
5883 }
079e9a2f 5884 }
252b5132 5885
079e9a2f 5886 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 5887
079e9a2f
AM
5888 if ((flags & BSF_SECTION_SYM) == 0
5889 && bfd_is_com_section (syms[idx]->section))
5890 {
5891 /* ELF common symbols put the alignment into the `value' field,
5892 and the size into the `size' field. This is backwards from
5893 how BFD handles it, so reverse it here. */
5894 sym.st_size = value;
5895 if (type_ptr == NULL
5896 || type_ptr->internal_elf_sym.st_value == 0)
5897 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
5898 else
5899 sym.st_value = type_ptr->internal_elf_sym.st_value;
5900 sym.st_shndx = _bfd_elf_section_from_bfd_section
5901 (abfd, syms[idx]->section);
5902 }
5903 else
5904 {
5905 asection *sec = syms[idx]->section;
5906 int shndx;
252b5132 5907
079e9a2f
AM
5908 if (sec->output_section)
5909 {
5910 value += sec->output_offset;
5911 sec = sec->output_section;
5912 }
589e6347 5913
079e9a2f
AM
5914 /* Don't add in the section vma for relocatable output. */
5915 if (! relocatable_p)
5916 value += sec->vma;
5917 sym.st_value = value;
5918 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
5919
5920 if (bfd_is_abs_section (sec)
5921 && type_ptr != NULL
5922 && type_ptr->internal_elf_sym.st_shndx != 0)
5923 {
5924 /* This symbol is in a real ELF section which we did
5925 not create as a BFD section. Undo the mapping done
5926 by copy_private_symbol_data. */
5927 shndx = type_ptr->internal_elf_sym.st_shndx;
5928 switch (shndx)
5929 {
5930 case MAP_ONESYMTAB:
5931 shndx = elf_onesymtab (abfd);
5932 break;
5933 case MAP_DYNSYMTAB:
5934 shndx = elf_dynsymtab (abfd);
5935 break;
5936 case MAP_STRTAB:
5937 shndx = elf_tdata (abfd)->strtab_section;
5938 break;
5939 case MAP_SHSTRTAB:
5940 shndx = elf_tdata (abfd)->shstrtab_section;
5941 break;
9ad5cbcf
AM
5942 case MAP_SYM_SHNDX:
5943 shndx = elf_tdata (abfd)->symtab_shndx_section;
5944 break;
079e9a2f
AM
5945 default:
5946 break;
5947 }
5948 }
5949 else
5950 {
5951 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 5952
079e9a2f
AM
5953 if (shndx == -1)
5954 {
5955 asection *sec2;
5956
5957 /* Writing this would be a hell of a lot easier if
5958 we had some decent documentation on bfd, and
5959 knew what to expect of the library, and what to
5960 demand of applications. For example, it
5961 appears that `objcopy' might not set the
5962 section of a symbol to be a section that is
5963 actually in the output file. */
5964 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
5965 if (sec2 == NULL)
5966 {
5967 _bfd_error_handler (_("\
5968Unable to find equivalent output section for symbol '%s' from section '%s'"),
5969 syms[idx]->name ? syms[idx]->name : "<Local sym>",
5970 sec->name);
811072d8 5971 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 5972 _bfd_stringtab_free (stt);
589e6347
NC
5973 return FALSE;
5974 }
811072d8 5975
079e9a2f
AM
5976 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
5977 BFD_ASSERT (shndx != -1);
5978 }
5979 }
252b5132 5980
079e9a2f
AM
5981 sym.st_shndx = shndx;
5982 }
252b5132 5983
13ae64f3
JJ
5984 if ((flags & BSF_THREAD_LOCAL) != 0)
5985 type = STT_TLS;
5986 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
5987 type = STT_FUNC;
5988 else if ((flags & BSF_OBJECT) != 0)
5989 type = STT_OBJECT;
5990 else
5991 type = STT_NOTYPE;
252b5132 5992
13ae64f3
JJ
5993 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
5994 type = STT_TLS;
5995
589e6347 5996 /* Processor-specific types. */
079e9a2f
AM
5997 if (type_ptr != NULL
5998 && bed->elf_backend_get_symbol_type)
5999 type = ((*bed->elf_backend_get_symbol_type)
6000 (&type_ptr->internal_elf_sym, type));
252b5132 6001
079e9a2f
AM
6002 if (flags & BSF_SECTION_SYM)
6003 {
6004 if (flags & BSF_GLOBAL)
6005 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6006 else
6007 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6008 }
6009 else if (bfd_is_com_section (syms[idx]->section))
6010 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
6011 else if (bfd_is_und_section (syms[idx]->section))
6012 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6013 ? STB_WEAK
6014 : STB_GLOBAL),
6015 type);
6016 else if (flags & BSF_FILE)
6017 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6018 else
6019 {
6020 int bind = STB_LOCAL;
252b5132 6021
079e9a2f
AM
6022 if (flags & BSF_LOCAL)
6023 bind = STB_LOCAL;
6024 else if (flags & BSF_WEAK)
6025 bind = STB_WEAK;
6026 else if (flags & BSF_GLOBAL)
6027 bind = STB_GLOBAL;
252b5132 6028
079e9a2f
AM
6029 sym.st_info = ELF_ST_INFO (bind, type);
6030 }
252b5132 6031
079e9a2f
AM
6032 if (type_ptr != NULL)
6033 sym.st_other = type_ptr->internal_elf_sym.st_other;
6034 else
6035 sym.st_other = 0;
252b5132 6036
9ad5cbcf 6037 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6038 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6039 if (outbound_shndx != NULL)
6040 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6041 }
252b5132 6042
079e9a2f
AM
6043 *sttp = stt;
6044 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6045 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6046
079e9a2f
AM
6047 symstrtab_hdr->sh_flags = 0;
6048 symstrtab_hdr->sh_addr = 0;
6049 symstrtab_hdr->sh_entsize = 0;
6050 symstrtab_hdr->sh_link = 0;
6051 symstrtab_hdr->sh_info = 0;
6052 symstrtab_hdr->sh_addralign = 1;
252b5132 6053
b34976b6 6054 return TRUE;
252b5132
RH
6055}
6056
6057/* Return the number of bytes required to hold the symtab vector.
6058
6059 Note that we base it on the count plus 1, since we will null terminate
6060 the vector allocated based on this size. However, the ELF symbol table
6061 always has a dummy entry as symbol #0, so it ends up even. */
6062
6063long
217aa764 6064_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6065{
6066 long symcount;
6067 long symtab_size;
6068 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6069
6070 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6071 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6072 if (symcount > 0)
6073 symtab_size -= sizeof (asymbol *);
252b5132
RH
6074
6075 return symtab_size;
6076}
6077
6078long
217aa764 6079_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6080{
6081 long symcount;
6082 long symtab_size;
6083 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6084
6085 if (elf_dynsymtab (abfd) == 0)
6086 {
6087 bfd_set_error (bfd_error_invalid_operation);
6088 return -1;
6089 }
6090
6091 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6092 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6093 if (symcount > 0)
6094 symtab_size -= sizeof (asymbol *);
252b5132
RH
6095
6096 return symtab_size;
6097}
6098
6099long
217aa764
AM
6100_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6101 sec_ptr asect)
252b5132
RH
6102{
6103 return (asect->reloc_count + 1) * sizeof (arelent *);
6104}
6105
6106/* Canonicalize the relocs. */
6107
6108long
217aa764
AM
6109_bfd_elf_canonicalize_reloc (bfd *abfd,
6110 sec_ptr section,
6111 arelent **relptr,
6112 asymbol **symbols)
252b5132
RH
6113{
6114 arelent *tblptr;
6115 unsigned int i;
9c5bfbb7 6116 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6117
b34976b6 6118 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6119 return -1;
6120
6121 tblptr = section->relocation;
6122 for (i = 0; i < section->reloc_count; i++)
6123 *relptr++ = tblptr++;
6124
6125 *relptr = NULL;
6126
6127 return section->reloc_count;
6128}
6129
6130long
6cee3f79 6131_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6132{
9c5bfbb7 6133 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6134 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6135
6136 if (symcount >= 0)
6137 bfd_get_symcount (abfd) = symcount;
6138 return symcount;
6139}
6140
6141long
217aa764
AM
6142_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6143 asymbol **allocation)
252b5132 6144{
9c5bfbb7 6145 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6146 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6147
6148 if (symcount >= 0)
6149 bfd_get_dynamic_symcount (abfd) = symcount;
6150 return symcount;
252b5132
RH
6151}
6152
8615f3f2
AM
6153/* Return the size required for the dynamic reloc entries. Any loadable
6154 section that was actually installed in the BFD, and has type SHT_REL
6155 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6156 dynamic reloc section. */
252b5132
RH
6157
6158long
217aa764 6159_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6160{
6161 long ret;
6162 asection *s;
6163
6164 if (elf_dynsymtab (abfd) == 0)
6165 {
6166 bfd_set_error (bfd_error_invalid_operation);
6167 return -1;
6168 }
6169
6170 ret = sizeof (arelent *);
6171 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6172 if ((s->flags & SEC_LOAD) != 0
6173 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6174 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6175 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6176 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6177 * sizeof (arelent *));
6178
6179 return ret;
6180}
6181
8615f3f2
AM
6182/* Canonicalize the dynamic relocation entries. Note that we return the
6183 dynamic relocations as a single block, although they are actually
6184 associated with particular sections; the interface, which was
6185 designed for SunOS style shared libraries, expects that there is only
6186 one set of dynamic relocs. Any loadable section that was actually
6187 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6188 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6189
6190long
217aa764
AM
6191_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6192 arelent **storage,
6193 asymbol **syms)
252b5132 6194{
217aa764 6195 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6196 asection *s;
6197 long ret;
6198
6199 if (elf_dynsymtab (abfd) == 0)
6200 {
6201 bfd_set_error (bfd_error_invalid_operation);
6202 return -1;
6203 }
6204
6205 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6206 ret = 0;
6207 for (s = abfd->sections; s != NULL; s = s->next)
6208 {
8615f3f2
AM
6209 if ((s->flags & SEC_LOAD) != 0
6210 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6211 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6212 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6213 {
6214 arelent *p;
6215 long count, i;
6216
b34976b6 6217 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6218 return -1;
eea6121a 6219 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6220 p = s->relocation;
6221 for (i = 0; i < count; i++)
6222 *storage++ = p++;
6223 ret += count;
6224 }
6225 }
6226
6227 *storage = NULL;
6228
6229 return ret;
6230}
6231\f
6232/* Read in the version information. */
6233
b34976b6 6234bfd_boolean
fc0e6df6 6235_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6236{
6237 bfd_byte *contents = NULL;
dc810e39 6238 bfd_size_type amt;
fc0e6df6
PB
6239 unsigned int freeidx = 0;
6240
6241 if (elf_dynverref (abfd) != 0)
6242 {
6243 Elf_Internal_Shdr *hdr;
6244 Elf_External_Verneed *everneed;
6245 Elf_Internal_Verneed *iverneed;
6246 unsigned int i;
6247
6248 hdr = &elf_tdata (abfd)->dynverref_hdr;
6249
6250 amt = (bfd_size_type) hdr->sh_info * sizeof (Elf_Internal_Verneed);
6251 elf_tdata (abfd)->verref = bfd_zalloc (abfd, amt);
6252 if (elf_tdata (abfd)->verref == NULL)
6253 goto error_return;
6254
6255 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6256
6257 contents = bfd_malloc (hdr->sh_size);
6258 if (contents == NULL)
6259 goto error_return;
6260 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6261 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
6262 goto error_return;
6263
6264 everneed = (Elf_External_Verneed *) contents;
6265 iverneed = elf_tdata (abfd)->verref;
6266 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6267 {
6268 Elf_External_Vernaux *evernaux;
6269 Elf_Internal_Vernaux *ivernaux;
6270 unsigned int j;
6271
6272 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6273
6274 iverneed->vn_bfd = abfd;
6275
6276 iverneed->vn_filename =
6277 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6278 iverneed->vn_file);
6279 if (iverneed->vn_filename == NULL)
6280 goto error_return;
6281
6282 amt = iverneed->vn_cnt;
6283 amt *= sizeof (Elf_Internal_Vernaux);
6284 iverneed->vn_auxptr = bfd_alloc (abfd, amt);
6285
6286 evernaux = ((Elf_External_Vernaux *)
6287 ((bfd_byte *) everneed + iverneed->vn_aux));
6288 ivernaux = iverneed->vn_auxptr;
6289 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6290 {
6291 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6292
6293 ivernaux->vna_nodename =
6294 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6295 ivernaux->vna_name);
6296 if (ivernaux->vna_nodename == NULL)
6297 goto error_return;
6298
6299 if (j + 1 < iverneed->vn_cnt)
6300 ivernaux->vna_nextptr = ivernaux + 1;
6301 else
6302 ivernaux->vna_nextptr = NULL;
6303
6304 evernaux = ((Elf_External_Vernaux *)
6305 ((bfd_byte *) evernaux + ivernaux->vna_next));
6306
6307 if (ivernaux->vna_other > freeidx)
6308 freeidx = ivernaux->vna_other;
6309 }
6310
6311 if (i + 1 < hdr->sh_info)
6312 iverneed->vn_nextref = iverneed + 1;
6313 else
6314 iverneed->vn_nextref = NULL;
6315
6316 everneed = ((Elf_External_Verneed *)
6317 ((bfd_byte *) everneed + iverneed->vn_next));
6318 }
6319
6320 free (contents);
6321 contents = NULL;
6322 }
252b5132
RH
6323
6324 if (elf_dynverdef (abfd) != 0)
6325 {
6326 Elf_Internal_Shdr *hdr;
6327 Elf_External_Verdef *everdef;
6328 Elf_Internal_Verdef *iverdef;
f631889e
UD
6329 Elf_Internal_Verdef *iverdefarr;
6330 Elf_Internal_Verdef iverdefmem;
252b5132 6331 unsigned int i;
062e2358 6332 unsigned int maxidx;
252b5132
RH
6333
6334 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6335
217aa764 6336 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6337 if (contents == NULL)
6338 goto error_return;
6339 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6340 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6341 goto error_return;
6342
f631889e
UD
6343 /* We know the number of entries in the section but not the maximum
6344 index. Therefore we have to run through all entries and find
6345 the maximum. */
252b5132 6346 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6347 maxidx = 0;
6348 for (i = 0; i < hdr->sh_info; ++i)
6349 {
6350 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6351
062e2358
AM
6352 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6353 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e
UD
6354
6355 everdef = ((Elf_External_Verdef *)
6356 ((bfd_byte *) everdef + iverdefmem.vd_next));
6357 }
6358
fc0e6df6
PB
6359 if (default_imported_symver)
6360 {
6361 if (freeidx > maxidx)
6362 maxidx = ++freeidx;
6363 else
6364 freeidx = ++maxidx;
6365 }
dc810e39 6366 amt = (bfd_size_type) maxidx * sizeof (Elf_Internal_Verdef);
217aa764 6367 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
f631889e
UD
6368 if (elf_tdata (abfd)->verdef == NULL)
6369 goto error_return;
6370
6371 elf_tdata (abfd)->cverdefs = maxidx;
6372
6373 everdef = (Elf_External_Verdef *) contents;
6374 iverdefarr = elf_tdata (abfd)->verdef;
6375 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6376 {
6377 Elf_External_Verdaux *everdaux;
6378 Elf_Internal_Verdaux *iverdaux;
6379 unsigned int j;
6380
f631889e
UD
6381 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6382
6383 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6384 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6385
6386 iverdef->vd_bfd = abfd;
6387
dc810e39 6388 amt = (bfd_size_type) iverdef->vd_cnt * sizeof (Elf_Internal_Verdaux);
217aa764 6389 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132
RH
6390 if (iverdef->vd_auxptr == NULL)
6391 goto error_return;
6392
6393 everdaux = ((Elf_External_Verdaux *)
6394 ((bfd_byte *) everdef + iverdef->vd_aux));
6395 iverdaux = iverdef->vd_auxptr;
6396 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6397 {
6398 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6399
6400 iverdaux->vda_nodename =
6401 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6402 iverdaux->vda_name);
6403 if (iverdaux->vda_nodename == NULL)
6404 goto error_return;
6405
6406 if (j + 1 < iverdef->vd_cnt)
6407 iverdaux->vda_nextptr = iverdaux + 1;
6408 else
6409 iverdaux->vda_nextptr = NULL;
6410
6411 everdaux = ((Elf_External_Verdaux *)
6412 ((bfd_byte *) everdaux + iverdaux->vda_next));
6413 }
6414
6415 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
6416
6417 if (i + 1 < hdr->sh_info)
6418 iverdef->vd_nextdef = iverdef + 1;
6419 else
6420 iverdef->vd_nextdef = NULL;
6421
6422 everdef = ((Elf_External_Verdef *)
6423 ((bfd_byte *) everdef + iverdef->vd_next));
6424 }
6425
6426 free (contents);
6427 contents = NULL;
6428 }
fc0e6df6 6429 else if (default_imported_symver)
252b5132 6430 {
fc0e6df6
PB
6431 if (freeidx < 3)
6432 freeidx = 3;
6433 else
6434 freeidx++;
252b5132 6435
fc0e6df6
PB
6436 amt = (bfd_size_type) freeidx * sizeof (Elf_Internal_Verdef);
6437 elf_tdata (abfd)->verdef = bfd_zalloc (abfd, amt);
6438 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6439 goto error_return;
6440
fc0e6df6
PB
6441 elf_tdata (abfd)->cverdefs = freeidx;
6442 }
252b5132 6443
fc0e6df6
PB
6444 /* Create a default version based on the soname. */
6445 if (default_imported_symver)
6446 {
6447 Elf_Internal_Verdef *iverdef;
6448 Elf_Internal_Verdaux *iverdaux;
252b5132 6449
fc0e6df6 6450 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6451
fc0e6df6
PB
6452 iverdef->vd_version = VER_DEF_CURRENT;
6453 iverdef->vd_flags = 0;
6454 iverdef->vd_ndx = freeidx;
6455 iverdef->vd_cnt = 1;
252b5132 6456
fc0e6df6 6457 iverdef->vd_bfd = abfd;
252b5132 6458
fc0e6df6
PB
6459 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6460 if (iverdef->vd_nodename == NULL)
6461 goto error_return;
6462 iverdef->vd_nextdef = NULL;
6463 amt = (bfd_size_type) sizeof (Elf_Internal_Verdaux);
6464 iverdef->vd_auxptr = bfd_alloc (abfd, amt);
252b5132 6465
fc0e6df6
PB
6466 iverdaux = iverdef->vd_auxptr;
6467 iverdaux->vda_nodename = iverdef->vd_nodename;
6468 iverdaux->vda_nextptr = NULL;
252b5132
RH
6469 }
6470
b34976b6 6471 return TRUE;
252b5132
RH
6472
6473 error_return:
5ed6aba4 6474 if (contents != NULL)
252b5132 6475 free (contents);
b34976b6 6476 return FALSE;
252b5132
RH
6477}
6478\f
6479asymbol *
217aa764 6480_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6481{
6482 elf_symbol_type *newsym;
dc810e39 6483 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6484
217aa764 6485 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6486 if (!newsym)
6487 return NULL;
6488 else
6489 {
6490 newsym->symbol.the_bfd = abfd;
6491 return &newsym->symbol;
6492 }
6493}
6494
6495void
217aa764
AM
6496_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6497 asymbol *symbol,
6498 symbol_info *ret)
252b5132
RH
6499{
6500 bfd_symbol_info (symbol, ret);
6501}
6502
6503/* Return whether a symbol name implies a local symbol. Most targets
6504 use this function for the is_local_label_name entry point, but some
6505 override it. */
6506
b34976b6 6507bfd_boolean
217aa764
AM
6508_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6509 const char *name)
252b5132
RH
6510{
6511 /* Normal local symbols start with ``.L''. */
6512 if (name[0] == '.' && name[1] == 'L')
b34976b6 6513 return TRUE;
252b5132
RH
6514
6515 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6516 DWARF debugging symbols starting with ``..''. */
6517 if (name[0] == '.' && name[1] == '.')
b34976b6 6518 return TRUE;
252b5132
RH
6519
6520 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6521 emitting DWARF debugging output. I suspect this is actually a
6522 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6523 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6524 underscore to be emitted on some ELF targets). For ease of use,
6525 we treat such symbols as local. */
6526 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6527 return TRUE;
252b5132 6528
b34976b6 6529 return FALSE;
252b5132
RH
6530}
6531
6532alent *
217aa764
AM
6533_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6534 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6535{
6536 abort ();
6537 return NULL;
6538}
6539
b34976b6 6540bfd_boolean
217aa764
AM
6541_bfd_elf_set_arch_mach (bfd *abfd,
6542 enum bfd_architecture arch,
6543 unsigned long machine)
252b5132
RH
6544{
6545 /* If this isn't the right architecture for this backend, and this
6546 isn't the generic backend, fail. */
6547 if (arch != get_elf_backend_data (abfd)->arch
6548 && arch != bfd_arch_unknown
6549 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6550 return FALSE;
252b5132
RH
6551
6552 return bfd_default_set_arch_mach (abfd, arch, machine);
6553}
6554
d1fad7c6
NC
6555/* Find the function to a particular section and offset,
6556 for error reporting. */
252b5132 6557
b34976b6 6558static bfd_boolean
217aa764
AM
6559elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6560 asection *section,
6561 asymbol **symbols,
6562 bfd_vma offset,
6563 const char **filename_ptr,
6564 const char **functionname_ptr)
252b5132 6565{
252b5132 6566 const char *filename;
57426232 6567 asymbol *func, *file;
252b5132
RH
6568 bfd_vma low_func;
6569 asymbol **p;
57426232
JB
6570 /* ??? Given multiple file symbols, it is impossible to reliably
6571 choose the right file name for global symbols. File symbols are
6572 local symbols, and thus all file symbols must sort before any
6573 global symbols. The ELF spec may be interpreted to say that a
6574 file symbol must sort before other local symbols, but currently
6575 ld -r doesn't do this. So, for ld -r output, it is possible to
6576 make a better choice of file name for local symbols by ignoring
6577 file symbols appearing after a given local symbol. */
6578 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6579
252b5132
RH
6580 filename = NULL;
6581 func = NULL;
57426232 6582 file = NULL;
252b5132 6583 low_func = 0;
57426232 6584 state = nothing_seen;
252b5132
RH
6585
6586 for (p = symbols; *p != NULL; p++)
6587 {
6588 elf_symbol_type *q;
6589
6590 q = (elf_symbol_type *) *p;
6591
252b5132
RH
6592 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
6593 {
6594 default:
6595 break;
6596 case STT_FILE:
57426232
JB
6597 file = &q->symbol;
6598 if (state == symbol_seen)
6599 state = file_after_symbol_seen;
6600 continue;
6601 case STT_SECTION:
6602 continue;
252b5132
RH
6603 case STT_NOTYPE:
6604 case STT_FUNC:
6b40fcba 6605 if (bfd_get_section (&q->symbol) == section
252b5132
RH
6606 && q->symbol.value >= low_func
6607 && q->symbol.value <= offset)
6608 {
6609 func = (asymbol *) q;
6610 low_func = q->symbol.value;
57426232
JB
6611 if (file == NULL)
6612 filename = NULL;
6613 else if (ELF_ST_BIND (q->internal_elf_sym.st_info) != STB_LOCAL
6614 && state == file_after_symbol_seen)
6615 filename = NULL;
6616 else
6617 filename = bfd_asymbol_name (file);
252b5132
RH
6618 }
6619 break;
6620 }
57426232
JB
6621 if (state == nothing_seen)
6622 state = symbol_seen;
252b5132
RH
6623 }
6624
6625 if (func == NULL)
b34976b6 6626 return FALSE;
252b5132 6627
d1fad7c6
NC
6628 if (filename_ptr)
6629 *filename_ptr = filename;
6630 if (functionname_ptr)
6631 *functionname_ptr = bfd_asymbol_name (func);
6632
b34976b6 6633 return TRUE;
d1fad7c6
NC
6634}
6635
6636/* Find the nearest line to a particular section and offset,
6637 for error reporting. */
6638
b34976b6 6639bfd_boolean
217aa764
AM
6640_bfd_elf_find_nearest_line (bfd *abfd,
6641 asection *section,
6642 asymbol **symbols,
6643 bfd_vma offset,
6644 const char **filename_ptr,
6645 const char **functionname_ptr,
6646 unsigned int *line_ptr)
d1fad7c6 6647{
b34976b6 6648 bfd_boolean found;
d1fad7c6
NC
6649
6650 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6651 filename_ptr, functionname_ptr,
6652 line_ptr))
d1fad7c6
NC
6653 {
6654 if (!*functionname_ptr)
4e8a9624
AM
6655 elf_find_function (abfd, section, symbols, offset,
6656 *filename_ptr ? NULL : filename_ptr,
6657 functionname_ptr);
6658
b34976b6 6659 return TRUE;
d1fad7c6
NC
6660 }
6661
6662 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
6663 filename_ptr, functionname_ptr,
6664 line_ptr, 0,
6665 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
6666 {
6667 if (!*functionname_ptr)
4e8a9624
AM
6668 elf_find_function (abfd, section, symbols, offset,
6669 *filename_ptr ? NULL : filename_ptr,
6670 functionname_ptr);
6671
b34976b6 6672 return TRUE;
d1fad7c6
NC
6673 }
6674
6675 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
6676 &found, filename_ptr,
6677 functionname_ptr, line_ptr,
6678 &elf_tdata (abfd)->line_info))
b34976b6 6679 return FALSE;
dc43ada5 6680 if (found && (*functionname_ptr || *line_ptr))
b34976b6 6681 return TRUE;
d1fad7c6
NC
6682
6683 if (symbols == NULL)
b34976b6 6684 return FALSE;
d1fad7c6
NC
6685
6686 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 6687 filename_ptr, functionname_ptr))
b34976b6 6688 return FALSE;
d1fad7c6 6689
252b5132 6690 *line_ptr = 0;
b34976b6 6691 return TRUE;
252b5132
RH
6692}
6693
5420f73d
L
6694/* Find the line for a symbol. */
6695
6696bfd_boolean
6697_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
6698 const char **filename_ptr, unsigned int *line_ptr)
6699{
6700 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
6701 filename_ptr, line_ptr, 0,
6702 &elf_tdata (abfd)->dwarf2_find_line_info);
6703}
6704
4ab527b0
FF
6705/* After a call to bfd_find_nearest_line, successive calls to
6706 bfd_find_inliner_info can be used to get source information about
6707 each level of function inlining that terminated at the address
6708 passed to bfd_find_nearest_line. Currently this is only supported
6709 for DWARF2 with appropriate DWARF3 extensions. */
6710
6711bfd_boolean
6712_bfd_elf_find_inliner_info (bfd *abfd,
6713 const char **filename_ptr,
6714 const char **functionname_ptr,
6715 unsigned int *line_ptr)
6716{
6717 bfd_boolean found;
6718 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
6719 functionname_ptr, line_ptr,
6720 & elf_tdata (abfd)->dwarf2_find_line_info);
6721 return found;
6722}
6723
252b5132 6724int
217aa764 6725_bfd_elf_sizeof_headers (bfd *abfd, bfd_boolean reloc)
252b5132
RH
6726{
6727 int ret;
6728
6729 ret = get_elf_backend_data (abfd)->s->sizeof_ehdr;
6730 if (! reloc)
6731 ret += get_program_header_size (abfd);
6732 return ret;
6733}
6734
b34976b6 6735bfd_boolean
217aa764
AM
6736_bfd_elf_set_section_contents (bfd *abfd,
6737 sec_ptr section,
0f867abe 6738 const void *location,
217aa764
AM
6739 file_ptr offset,
6740 bfd_size_type count)
252b5132
RH
6741{
6742 Elf_Internal_Shdr *hdr;
dc810e39 6743 bfd_signed_vma pos;
252b5132
RH
6744
6745 if (! abfd->output_has_begun
217aa764 6746 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6747 return FALSE;
252b5132
RH
6748
6749 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
6750 pos = hdr->sh_offset + offset;
6751 if (bfd_seek (abfd, pos, SEEK_SET) != 0
6752 || bfd_bwrite (location, count, abfd) != count)
b34976b6 6753 return FALSE;
252b5132 6754
b34976b6 6755 return TRUE;
252b5132
RH
6756}
6757
6758void
217aa764
AM
6759_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
6760 arelent *cache_ptr ATTRIBUTE_UNUSED,
6761 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
6762{
6763 abort ();
6764}
6765
252b5132
RH
6766/* Try to convert a non-ELF reloc into an ELF one. */
6767
b34976b6 6768bfd_boolean
217aa764 6769_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 6770{
c044fabd 6771 /* Check whether we really have an ELF howto. */
252b5132
RH
6772
6773 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
6774 {
6775 bfd_reloc_code_real_type code;
6776 reloc_howto_type *howto;
6777
6778 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 6779 equivalent ELF reloc. */
252b5132
RH
6780
6781 if (areloc->howto->pc_relative)
6782 {
6783 switch (areloc->howto->bitsize)
6784 {
6785 case 8:
6786 code = BFD_RELOC_8_PCREL;
6787 break;
6788 case 12:
6789 code = BFD_RELOC_12_PCREL;
6790 break;
6791 case 16:
6792 code = BFD_RELOC_16_PCREL;
6793 break;
6794 case 24:
6795 code = BFD_RELOC_24_PCREL;
6796 break;
6797 case 32:
6798 code = BFD_RELOC_32_PCREL;
6799 break;
6800 case 64:
6801 code = BFD_RELOC_64_PCREL;
6802 break;
6803 default:
6804 goto fail;
6805 }
6806
6807 howto = bfd_reloc_type_lookup (abfd, code);
6808
6809 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
6810 {
6811 if (howto->pcrel_offset)
6812 areloc->addend += areloc->address;
6813 else
6814 areloc->addend -= areloc->address; /* addend is unsigned!! */
6815 }
6816 }
6817 else
6818 {
6819 switch (areloc->howto->bitsize)
6820 {
6821 case 8:
6822 code = BFD_RELOC_8;
6823 break;
6824 case 14:
6825 code = BFD_RELOC_14;
6826 break;
6827 case 16:
6828 code = BFD_RELOC_16;
6829 break;
6830 case 26:
6831 code = BFD_RELOC_26;
6832 break;
6833 case 32:
6834 code = BFD_RELOC_32;
6835 break;
6836 case 64:
6837 code = BFD_RELOC_64;
6838 break;
6839 default:
6840 goto fail;
6841 }
6842
6843 howto = bfd_reloc_type_lookup (abfd, code);
6844 }
6845
6846 if (howto)
6847 areloc->howto = howto;
6848 else
6849 goto fail;
6850 }
6851
b34976b6 6852 return TRUE;
252b5132
RH
6853
6854 fail:
6855 (*_bfd_error_handler)
d003868e
AM
6856 (_("%B: unsupported relocation type %s"),
6857 abfd, areloc->howto->name);
252b5132 6858 bfd_set_error (bfd_error_bad_value);
b34976b6 6859 return FALSE;
252b5132
RH
6860}
6861
b34976b6 6862bfd_boolean
217aa764 6863_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
6864{
6865 if (bfd_get_format (abfd) == bfd_object)
6866 {
6867 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 6868 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 6869 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
6870 }
6871
6872 return _bfd_generic_close_and_cleanup (abfd);
6873}
6874
6875/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
6876 in the relocation's offset. Thus we cannot allow any sort of sanity
6877 range-checking to interfere. There is nothing else to do in processing
6878 this reloc. */
6879
6880bfd_reloc_status_type
217aa764
AM
6881_bfd_elf_rel_vtable_reloc_fn
6882 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 6883 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
6884 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
6885 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
6886{
6887 return bfd_reloc_ok;
6888}
252b5132
RH
6889\f
6890/* Elf core file support. Much of this only works on native
6891 toolchains, since we rely on knowing the
6892 machine-dependent procfs structure in order to pick
c044fabd 6893 out details about the corefile. */
252b5132
RH
6894
6895#ifdef HAVE_SYS_PROCFS_H
6896# include <sys/procfs.h>
6897#endif
6898
c044fabd 6899/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
6900
6901static int
217aa764 6902elfcore_make_pid (bfd *abfd)
252b5132
RH
6903{
6904 return ((elf_tdata (abfd)->core_lwpid << 16)
6905 + (elf_tdata (abfd)->core_pid));
6906}
6907
252b5132
RH
6908/* If there isn't a section called NAME, make one, using
6909 data from SECT. Note, this function will generate a
6910 reference to NAME, so you shouldn't deallocate or
c044fabd 6911 overwrite it. */
252b5132 6912
b34976b6 6913static bfd_boolean
217aa764 6914elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 6915{
c044fabd 6916 asection *sect2;
252b5132
RH
6917
6918 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 6919 return TRUE;
252b5132
RH
6920
6921 sect2 = bfd_make_section (abfd, name);
6922 if (sect2 == NULL)
b34976b6 6923 return FALSE;
252b5132 6924
eea6121a 6925 sect2->size = sect->size;
252b5132
RH
6926 sect2->filepos = sect->filepos;
6927 sect2->flags = sect->flags;
6928 sect2->alignment_power = sect->alignment_power;
b34976b6 6929 return TRUE;
252b5132
RH
6930}
6931
bb0082d6
AM
6932/* Create a pseudosection containing SIZE bytes at FILEPOS. This
6933 actually creates up to two pseudosections:
6934 - For the single-threaded case, a section named NAME, unless
6935 such a section already exists.
6936 - For the multi-threaded case, a section named "NAME/PID", where
6937 PID is elfcore_make_pid (abfd).
6938 Both pseudosections have identical contents. */
b34976b6 6939bfd_boolean
217aa764
AM
6940_bfd_elfcore_make_pseudosection (bfd *abfd,
6941 char *name,
6942 size_t size,
6943 ufile_ptr filepos)
bb0082d6
AM
6944{
6945 char buf[100];
6946 char *threaded_name;
d4c88bbb 6947 size_t len;
bb0082d6
AM
6948 asection *sect;
6949
6950 /* Build the section name. */
6951
6952 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 6953 len = strlen (buf) + 1;
217aa764 6954 threaded_name = bfd_alloc (abfd, len);
bb0082d6 6955 if (threaded_name == NULL)
b34976b6 6956 return FALSE;
d4c88bbb 6957 memcpy (threaded_name, buf, len);
bb0082d6 6958
62f3bb11 6959 sect = bfd_make_section_anyway (abfd, threaded_name);
bb0082d6 6960 if (sect == NULL)
b34976b6 6961 return FALSE;
eea6121a 6962 sect->size = size;
bb0082d6
AM
6963 sect->filepos = filepos;
6964 sect->flags = SEC_HAS_CONTENTS;
6965 sect->alignment_power = 2;
6966
936e320b 6967 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
6968}
6969
252b5132 6970/* prstatus_t exists on:
4a938328 6971 solaris 2.5+
252b5132
RH
6972 linux 2.[01] + glibc
6973 unixware 4.2
6974*/
6975
6976#if defined (HAVE_PRSTATUS_T)
a7b97311 6977
b34976b6 6978static bfd_boolean
217aa764 6979elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 6980{
eea6121a 6981 size_t size;
7ee38065 6982 int offset;
252b5132 6983
4a938328
MS
6984 if (note->descsz == sizeof (prstatus_t))
6985 {
6986 prstatus_t prstat;
252b5132 6987
eea6121a 6988 size = sizeof (prstat.pr_reg);
7ee38065 6989 offset = offsetof (prstatus_t, pr_reg);
4a938328 6990 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 6991
fa49d224
NC
6992 /* Do not overwrite the core signal if it
6993 has already been set by another thread. */
6994 if (elf_tdata (abfd)->core_signal == 0)
6995 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 6996 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 6997
4a938328
MS
6998 /* pr_who exists on:
6999 solaris 2.5+
7000 unixware 4.2
7001 pr_who doesn't exist on:
7002 linux 2.[01]
7003 */
252b5132 7004#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7005 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7006#endif
4a938328 7007 }
7ee38065 7008#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7009 else if (note->descsz == sizeof (prstatus32_t))
7010 {
7011 /* 64-bit host, 32-bit corefile */
7012 prstatus32_t prstat;
7013
eea6121a 7014 size = sizeof (prstat.pr_reg);
7ee38065 7015 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7016 memcpy (&prstat, note->descdata, sizeof (prstat));
7017
fa49d224
NC
7018 /* Do not overwrite the core signal if it
7019 has already been set by another thread. */
7020 if (elf_tdata (abfd)->core_signal == 0)
7021 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7022 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7023
7024 /* pr_who exists on:
7025 solaris 2.5+
7026 unixware 4.2
7027 pr_who doesn't exist on:
7028 linux 2.[01]
7029 */
7ee38065 7030#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7031 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7032#endif
7033 }
7ee38065 7034#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7035 else
7036 {
7037 /* Fail - we don't know how to handle any other
7038 note size (ie. data object type). */
b34976b6 7039 return TRUE;
4a938328 7040 }
252b5132 7041
bb0082d6 7042 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7043 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7044 size, note->descpos + offset);
252b5132
RH
7045}
7046#endif /* defined (HAVE_PRSTATUS_T) */
7047
bb0082d6 7048/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7049static bfd_boolean
217aa764
AM
7050elfcore_make_note_pseudosection (bfd *abfd,
7051 char *name,
7052 Elf_Internal_Note *note)
252b5132 7053{
936e320b
AM
7054 return _bfd_elfcore_make_pseudosection (abfd, name,
7055 note->descsz, note->descpos);
252b5132
RH
7056}
7057
ff08c6bb
JB
7058/* There isn't a consistent prfpregset_t across platforms,
7059 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7060 data structure apart. */
7061
b34976b6 7062static bfd_boolean
217aa764 7063elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7064{
7065 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7066}
7067
ff08c6bb
JB
7068/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7069 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7070 literally. */
c044fabd 7071
b34976b6 7072static bfd_boolean
217aa764 7073elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7074{
7075 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7076}
7077
252b5132 7078#if defined (HAVE_PRPSINFO_T)
4a938328 7079typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7080#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7081typedef prpsinfo32_t elfcore_psinfo32_t;
7082#endif
252b5132
RH
7083#endif
7084
7085#if defined (HAVE_PSINFO_T)
4a938328 7086typedef psinfo_t elfcore_psinfo_t;
7ee38065 7087#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7088typedef psinfo32_t elfcore_psinfo32_t;
7089#endif
252b5132
RH
7090#endif
7091
252b5132
RH
7092/* return a malloc'ed copy of a string at START which is at
7093 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7094 the copy will always have a terminating '\0'. */
252b5132 7095
936e320b 7096char *
217aa764 7097_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7098{
dc810e39 7099 char *dups;
c044fabd 7100 char *end = memchr (start, '\0', max);
dc810e39 7101 size_t len;
252b5132
RH
7102
7103 if (end == NULL)
7104 len = max;
7105 else
7106 len = end - start;
7107
217aa764 7108 dups = bfd_alloc (abfd, len + 1);
dc810e39 7109 if (dups == NULL)
252b5132
RH
7110 return NULL;
7111
dc810e39
AM
7112 memcpy (dups, start, len);
7113 dups[len] = '\0';
252b5132 7114
dc810e39 7115 return dups;
252b5132
RH
7116}
7117
bb0082d6 7118#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7119static bfd_boolean
217aa764 7120elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7121{
4a938328
MS
7122 if (note->descsz == sizeof (elfcore_psinfo_t))
7123 {
7124 elfcore_psinfo_t psinfo;
252b5132 7125
7ee38065 7126 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7127
4a938328 7128 elf_tdata (abfd)->core_program
936e320b
AM
7129 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7130 sizeof (psinfo.pr_fname));
252b5132 7131
4a938328 7132 elf_tdata (abfd)->core_command
936e320b
AM
7133 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7134 sizeof (psinfo.pr_psargs));
4a938328 7135 }
7ee38065 7136#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7137 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7138 {
7139 /* 64-bit host, 32-bit corefile */
7140 elfcore_psinfo32_t psinfo;
7141
7ee38065 7142 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7143
4a938328 7144 elf_tdata (abfd)->core_program
936e320b
AM
7145 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7146 sizeof (psinfo.pr_fname));
4a938328
MS
7147
7148 elf_tdata (abfd)->core_command
936e320b
AM
7149 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7150 sizeof (psinfo.pr_psargs));
4a938328
MS
7151 }
7152#endif
7153
7154 else
7155 {
7156 /* Fail - we don't know how to handle any other
7157 note size (ie. data object type). */
b34976b6 7158 return TRUE;
4a938328 7159 }
252b5132
RH
7160
7161 /* Note that for some reason, a spurious space is tacked
7162 onto the end of the args in some (at least one anyway)
c044fabd 7163 implementations, so strip it off if it exists. */
252b5132
RH
7164
7165 {
c044fabd 7166 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7167 int n = strlen (command);
7168
7169 if (0 < n && command[n - 1] == ' ')
7170 command[n - 1] = '\0';
7171 }
7172
b34976b6 7173 return TRUE;
252b5132
RH
7174}
7175#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7176
252b5132 7177#if defined (HAVE_PSTATUS_T)
b34976b6 7178static bfd_boolean
217aa764 7179elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7180{
f572a39d
AM
7181 if (note->descsz == sizeof (pstatus_t)
7182#if defined (HAVE_PXSTATUS_T)
7183 || note->descsz == sizeof (pxstatus_t)
7184#endif
7185 )
4a938328
MS
7186 {
7187 pstatus_t pstat;
252b5132 7188
4a938328 7189 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7190
4a938328
MS
7191 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7192 }
7ee38065 7193#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7194 else if (note->descsz == sizeof (pstatus32_t))
7195 {
7196 /* 64-bit host, 32-bit corefile */
7197 pstatus32_t pstat;
252b5132 7198
4a938328 7199 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7200
4a938328
MS
7201 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7202 }
7203#endif
252b5132
RH
7204 /* Could grab some more details from the "representative"
7205 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7206 NT_LWPSTATUS note, presumably. */
252b5132 7207
b34976b6 7208 return TRUE;
252b5132
RH
7209}
7210#endif /* defined (HAVE_PSTATUS_T) */
7211
252b5132 7212#if defined (HAVE_LWPSTATUS_T)
b34976b6 7213static bfd_boolean
217aa764 7214elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7215{
7216 lwpstatus_t lwpstat;
7217 char buf[100];
c044fabd 7218 char *name;
d4c88bbb 7219 size_t len;
c044fabd 7220 asection *sect;
252b5132 7221
f572a39d
AM
7222 if (note->descsz != sizeof (lwpstat)
7223#if defined (HAVE_LWPXSTATUS_T)
7224 && note->descsz != sizeof (lwpxstatus_t)
7225#endif
7226 )
b34976b6 7227 return TRUE;
252b5132
RH
7228
7229 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7230
7231 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7232 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7233
c044fabd 7234 /* Make a ".reg/999" section. */
252b5132
RH
7235
7236 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7237 len = strlen (buf) + 1;
217aa764 7238 name = bfd_alloc (abfd, len);
252b5132 7239 if (name == NULL)
b34976b6 7240 return FALSE;
d4c88bbb 7241 memcpy (name, buf, len);
252b5132 7242
62f3bb11 7243 sect = bfd_make_section_anyway (abfd, name);
252b5132 7244 if (sect == NULL)
b34976b6 7245 return FALSE;
252b5132
RH
7246
7247#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7248 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7249 sect->filepos = note->descpos
7250 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7251#endif
7252
7253#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7254 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7255 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7256#endif
7257
7258 sect->flags = SEC_HAS_CONTENTS;
7259 sect->alignment_power = 2;
7260
7261 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7262 return FALSE;
252b5132
RH
7263
7264 /* Make a ".reg2/999" section */
7265
7266 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7267 len = strlen (buf) + 1;
217aa764 7268 name = bfd_alloc (abfd, len);
252b5132 7269 if (name == NULL)
b34976b6 7270 return FALSE;
d4c88bbb 7271 memcpy (name, buf, len);
252b5132 7272
62f3bb11 7273 sect = bfd_make_section_anyway (abfd, name);
252b5132 7274 if (sect == NULL)
b34976b6 7275 return FALSE;
252b5132
RH
7276
7277#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7278 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7279 sect->filepos = note->descpos
7280 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7281#endif
7282
7283#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7284 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7285 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7286#endif
7287
7288 sect->flags = SEC_HAS_CONTENTS;
7289 sect->alignment_power = 2;
7290
936e320b 7291 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7292}
7293#endif /* defined (HAVE_LWPSTATUS_T) */
7294
16e9c715 7295#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7296static bfd_boolean
217aa764 7297elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7298{
7299 char buf[30];
c044fabd 7300 char *name;
d4c88bbb 7301 size_t len;
c044fabd 7302 asection *sect;
16e9c715
NC
7303 win32_pstatus_t pstatus;
7304
7305 if (note->descsz < sizeof (pstatus))
b34976b6 7306 return TRUE;
16e9c715 7307
e8eab623 7308 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7309
7310 switch (pstatus.data_type)
16e9c715
NC
7311 {
7312 case NOTE_INFO_PROCESS:
7313 /* FIXME: need to add ->core_command. */
7314 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7315 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7316 break;
16e9c715
NC
7317
7318 case NOTE_INFO_THREAD:
7319 /* Make a ".reg/999" section. */
1f170678 7320 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7321
d4c88bbb 7322 len = strlen (buf) + 1;
217aa764 7323 name = bfd_alloc (abfd, len);
16e9c715 7324 if (name == NULL)
b34976b6 7325 return FALSE;
c044fabd 7326
d4c88bbb 7327 memcpy (name, buf, len);
16e9c715 7328
62f3bb11 7329 sect = bfd_make_section_anyway (abfd, name);
16e9c715 7330 if (sect == NULL)
b34976b6 7331 return FALSE;
c044fabd 7332
eea6121a 7333 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7334 sect->filepos = (note->descpos
7335 + offsetof (struct win32_pstatus,
7336 data.thread_info.thread_context));
16e9c715
NC
7337 sect->flags = SEC_HAS_CONTENTS;
7338 sect->alignment_power = 2;
7339
7340 if (pstatus.data.thread_info.is_active_thread)
7341 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7342 return FALSE;
16e9c715
NC
7343 break;
7344
7345 case NOTE_INFO_MODULE:
7346 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7347 sprintf (buf, ".module/%08lx",
7348 (long) pstatus.data.module_info.base_address);
c044fabd 7349
d4c88bbb 7350 len = strlen (buf) + 1;
217aa764 7351 name = bfd_alloc (abfd, len);
16e9c715 7352 if (name == NULL)
b34976b6 7353 return FALSE;
c044fabd 7354
d4c88bbb 7355 memcpy (name, buf, len);
252b5132 7356
62f3bb11 7357 sect = bfd_make_section_anyway (abfd, name);
c044fabd 7358
16e9c715 7359 if (sect == NULL)
b34976b6 7360 return FALSE;
c044fabd 7361
eea6121a 7362 sect->size = note->descsz;
16e9c715
NC
7363 sect->filepos = note->descpos;
7364 sect->flags = SEC_HAS_CONTENTS;
7365 sect->alignment_power = 2;
7366 break;
7367
7368 default:
b34976b6 7369 return TRUE;
16e9c715
NC
7370 }
7371
b34976b6 7372 return TRUE;
16e9c715
NC
7373}
7374#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7375
b34976b6 7376static bfd_boolean
217aa764 7377elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7378{
9c5bfbb7 7379 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7380
252b5132
RH
7381 switch (note->type)
7382 {
7383 default:
b34976b6 7384 return TRUE;
252b5132 7385
252b5132 7386 case NT_PRSTATUS:
bb0082d6
AM
7387 if (bed->elf_backend_grok_prstatus)
7388 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7389 return TRUE;
bb0082d6 7390#if defined (HAVE_PRSTATUS_T)
252b5132 7391 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7392#else
b34976b6 7393 return TRUE;
252b5132
RH
7394#endif
7395
7396#if defined (HAVE_PSTATUS_T)
7397 case NT_PSTATUS:
7398 return elfcore_grok_pstatus (abfd, note);
7399#endif
7400
7401#if defined (HAVE_LWPSTATUS_T)
7402 case NT_LWPSTATUS:
7403 return elfcore_grok_lwpstatus (abfd, note);
7404#endif
7405
7406 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7407 return elfcore_grok_prfpreg (abfd, note);
7408
16e9c715 7409#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7410 case NT_WIN32PSTATUS:
16e9c715
NC
7411 return elfcore_grok_win32pstatus (abfd, note);
7412#endif
7413
c044fabd 7414 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7415 if (note->namesz == 6
7416 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7417 return elfcore_grok_prxfpreg (abfd, note);
7418 else
b34976b6 7419 return TRUE;
ff08c6bb 7420
252b5132
RH
7421 case NT_PRPSINFO:
7422 case NT_PSINFO:
bb0082d6
AM
7423 if (bed->elf_backend_grok_psinfo)
7424 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7425 return TRUE;
bb0082d6 7426#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7427 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7428#else
b34976b6 7429 return TRUE;
252b5132 7430#endif
3333a7c3
RM
7431
7432 case NT_AUXV:
7433 {
62f3bb11 7434 asection *sect = bfd_make_section_anyway (abfd, ".auxv");
3333a7c3
RM
7435
7436 if (sect == NULL)
7437 return FALSE;
eea6121a 7438 sect->size = note->descsz;
3333a7c3
RM
7439 sect->filepos = note->descpos;
7440 sect->flags = SEC_HAS_CONTENTS;
7441 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7442
7443 return TRUE;
7444 }
252b5132
RH
7445 }
7446}
7447
b34976b6 7448static bfd_boolean
217aa764 7449elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7450{
7451 char *cp;
7452
7453 cp = strchr (note->namedata, '@');
7454 if (cp != NULL)
7455 {
d2b64500 7456 *lwpidp = atoi(cp + 1);
b34976b6 7457 return TRUE;
50b2bdb7 7458 }
b34976b6 7459 return FALSE;
50b2bdb7
AM
7460}
7461
b34976b6 7462static bfd_boolean
217aa764 7463elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7464{
7465
7466 /* Signal number at offset 0x08. */
7467 elf_tdata (abfd)->core_signal
7468 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7469
7470 /* Process ID at offset 0x50. */
7471 elf_tdata (abfd)->core_pid
7472 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7473
7474 /* Command name at 0x7c (max 32 bytes, including nul). */
7475 elf_tdata (abfd)->core_command
7476 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7477
7720ba9f
MK
7478 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7479 note);
50b2bdb7
AM
7480}
7481
b34976b6 7482static bfd_boolean
217aa764 7483elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7484{
7485 int lwp;
7486
7487 if (elfcore_netbsd_get_lwpid (note, &lwp))
7488 elf_tdata (abfd)->core_lwpid = lwp;
7489
b4db1224 7490 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7491 {
7492 /* NetBSD-specific core "procinfo". Note that we expect to
7493 find this note before any of the others, which is fine,
7494 since the kernel writes this note out first when it
7495 creates a core file. */
47d9a591 7496
50b2bdb7
AM
7497 return elfcore_grok_netbsd_procinfo (abfd, note);
7498 }
7499
b4db1224
JT
7500 /* As of Jan 2002 there are no other machine-independent notes
7501 defined for NetBSD core files. If the note type is less
7502 than the start of the machine-dependent note types, we don't
7503 understand it. */
47d9a591 7504
b4db1224 7505 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7506 return TRUE;
50b2bdb7
AM
7507
7508
7509 switch (bfd_get_arch (abfd))
7510 {
7511 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7512 PT_GETFPREGS == mach+2. */
7513
7514 case bfd_arch_alpha:
7515 case bfd_arch_sparc:
7516 switch (note->type)
7517 {
b4db1224 7518 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7519 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7520
b4db1224 7521 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7522 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7523
7524 default:
b34976b6 7525 return TRUE;
50b2bdb7
AM
7526 }
7527
7528 /* On all other arch's, PT_GETREGS == mach+1 and
7529 PT_GETFPREGS == mach+3. */
7530
7531 default:
7532 switch (note->type)
7533 {
b4db1224 7534 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7535 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7536
b4db1224 7537 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7538 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7539
7540 default:
b34976b6 7541 return TRUE;
50b2bdb7
AM
7542 }
7543 }
7544 /* NOTREACHED */
7545}
7546
07c6e936 7547static bfd_boolean
217aa764 7548elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, pid_t *tid)
07c6e936
NC
7549{
7550 void *ddata = note->descdata;
7551 char buf[100];
7552 char *name;
7553 asection *sect;
f8843e87
AM
7554 short sig;
7555 unsigned flags;
07c6e936
NC
7556
7557 /* nto_procfs_status 'pid' field is at offset 0. */
7558 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7559
f8843e87
AM
7560 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7561 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7562
7563 /* nto_procfs_status 'flags' field is at offset 8. */
7564 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7565
7566 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7567 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7568 {
7569 elf_tdata (abfd)->core_signal = sig;
7570 elf_tdata (abfd)->core_lwpid = *tid;
7571 }
07c6e936 7572
f8843e87
AM
7573 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7574 do not come from signals so we make sure we set the current
7575 thread just in case. */
7576 if (flags & 0x00000080)
7577 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
7578
7579 /* Make a ".qnx_core_status/%d" section. */
7e7353ed 7580 sprintf (buf, ".qnx_core_status/%ld", (long) *tid);
07c6e936 7581
217aa764 7582 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7583 if (name == NULL)
7584 return FALSE;
7585 strcpy (name, buf);
7586
62f3bb11 7587 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7588 if (sect == NULL)
7589 return FALSE;
7590
eea6121a 7591 sect->size = note->descsz;
07c6e936
NC
7592 sect->filepos = note->descpos;
7593 sect->flags = SEC_HAS_CONTENTS;
7594 sect->alignment_power = 2;
7595
7596 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
7597}
7598
7599static bfd_boolean
d69f560c
KW
7600elfcore_grok_nto_regs (bfd *abfd,
7601 Elf_Internal_Note *note,
7602 pid_t tid,
7603 char *base)
07c6e936
NC
7604{
7605 char buf[100];
7606 char *name;
7607 asection *sect;
7608
d69f560c 7609 /* Make a "(base)/%d" section. */
7e7353ed 7610 sprintf (buf, "%s/%ld", base, (long) tid);
07c6e936 7611
217aa764 7612 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
7613 if (name == NULL)
7614 return FALSE;
7615 strcpy (name, buf);
7616
62f3bb11 7617 sect = bfd_make_section_anyway (abfd, name);
07c6e936
NC
7618 if (sect == NULL)
7619 return FALSE;
7620
eea6121a 7621 sect->size = note->descsz;
07c6e936
NC
7622 sect->filepos = note->descpos;
7623 sect->flags = SEC_HAS_CONTENTS;
7624 sect->alignment_power = 2;
7625
f8843e87
AM
7626 /* This is the current thread. */
7627 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 7628 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
7629
7630 return TRUE;
07c6e936
NC
7631}
7632
7633#define BFD_QNT_CORE_INFO 7
7634#define BFD_QNT_CORE_STATUS 8
7635#define BFD_QNT_CORE_GREG 9
7636#define BFD_QNT_CORE_FPREG 10
7637
7638static bfd_boolean
217aa764 7639elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
7640{
7641 /* Every GREG section has a STATUS section before it. Store the
811072d8 7642 tid from the previous call to pass down to the next gregs
07c6e936
NC
7643 function. */
7644 static pid_t tid = 1;
7645
7646 switch (note->type)
7647 {
d69f560c
KW
7648 case BFD_QNT_CORE_INFO:
7649 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
7650 case BFD_QNT_CORE_STATUS:
7651 return elfcore_grok_nto_status (abfd, note, &tid);
7652 case BFD_QNT_CORE_GREG:
7653 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
7654 case BFD_QNT_CORE_FPREG:
7655 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
7656 default:
7657 return TRUE;
07c6e936
NC
7658 }
7659}
7660
7c76fa91
MS
7661/* Function: elfcore_write_note
7662
47d9a591 7663 Inputs:
7c76fa91
MS
7664 buffer to hold note
7665 name of note
7666 type of note
7667 data for note
7668 size of data for note
7669
7670 Return:
7671 End of buffer containing note. */
7672
7673char *
217aa764
AM
7674elfcore_write_note (bfd *abfd,
7675 char *buf,
7676 int *bufsiz,
7677 const char *name,
7678 int type,
7679 const void *input,
7680 int size)
7c76fa91
MS
7681{
7682 Elf_External_Note *xnp;
d4c88bbb
AM
7683 size_t namesz;
7684 size_t pad;
7685 size_t newspace;
7c76fa91
MS
7686 char *p, *dest;
7687
d4c88bbb
AM
7688 namesz = 0;
7689 pad = 0;
7690 if (name != NULL)
7691 {
9c5bfbb7 7692 const struct elf_backend_data *bed;
d4c88bbb
AM
7693
7694 namesz = strlen (name) + 1;
7695 bed = get_elf_backend_data (abfd);
45d6a902 7696 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
7697 }
7698
5de3bf90 7699 newspace = 12 + namesz + pad + size;
d4c88bbb 7700
7c76fa91
MS
7701 p = realloc (buf, *bufsiz + newspace);
7702 dest = p + *bufsiz;
7703 *bufsiz += newspace;
7704 xnp = (Elf_External_Note *) dest;
7705 H_PUT_32 (abfd, namesz, xnp->namesz);
7706 H_PUT_32 (abfd, size, xnp->descsz);
7707 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
7708 dest = xnp->name;
7709 if (name != NULL)
7710 {
7711 memcpy (dest, name, namesz);
7712 dest += namesz;
7713 while (pad != 0)
7714 {
7715 *dest++ = '\0';
7716 --pad;
7717 }
7718 }
7719 memcpy (dest, input, size);
7c76fa91
MS
7720 return p;
7721}
7722
7723#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
7724char *
217aa764
AM
7725elfcore_write_prpsinfo (bfd *abfd,
7726 char *buf,
7727 int *bufsiz,
7728 const char *fname,
7729 const char *psargs)
7c76fa91
MS
7730{
7731 int note_type;
7732 char *note_name = "CORE";
7733
7734#if defined (HAVE_PSINFO_T)
7735 psinfo_t data;
7736 note_type = NT_PSINFO;
7737#else
7738 prpsinfo_t data;
7739 note_type = NT_PRPSINFO;
7740#endif
7741
7742 memset (&data, 0, sizeof (data));
7743 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
7744 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 7745 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7746 note_name, note_type, &data, sizeof (data));
7747}
7748#endif /* PSINFO_T or PRPSINFO_T */
7749
7750#if defined (HAVE_PRSTATUS_T)
7751char *
217aa764
AM
7752elfcore_write_prstatus (bfd *abfd,
7753 char *buf,
7754 int *bufsiz,
7755 long pid,
7756 int cursig,
7757 const void *gregs)
7c76fa91
MS
7758{
7759 prstatus_t prstat;
7760 char *note_name = "CORE";
7761
7762 memset (&prstat, 0, sizeof (prstat));
7763 prstat.pr_pid = pid;
7764 prstat.pr_cursig = cursig;
c106e334 7765 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 7766 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7767 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
7768}
7769#endif /* HAVE_PRSTATUS_T */
7770
51316059
MS
7771#if defined (HAVE_LWPSTATUS_T)
7772char *
217aa764
AM
7773elfcore_write_lwpstatus (bfd *abfd,
7774 char *buf,
7775 int *bufsiz,
7776 long pid,
7777 int cursig,
7778 const void *gregs)
51316059
MS
7779{
7780 lwpstatus_t lwpstat;
7781 char *note_name = "CORE";
7782
7783 memset (&lwpstat, 0, sizeof (lwpstat));
7784 lwpstat.pr_lwpid = pid >> 16;
7785 lwpstat.pr_cursig = cursig;
7786#if defined (HAVE_LWPSTATUS_T_PR_REG)
7787 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
7788#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
7789#if !defined(gregs)
7790 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
7791 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
7792#else
7793 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
7794 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
7795#endif
7796#endif
47d9a591 7797 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7798 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
7799}
7800#endif /* HAVE_LWPSTATUS_T */
7801
7c76fa91
MS
7802#if defined (HAVE_PSTATUS_T)
7803char *
217aa764
AM
7804elfcore_write_pstatus (bfd *abfd,
7805 char *buf,
7806 int *bufsiz,
7807 long pid,
7808 int cursig,
7809 const void *gregs)
7c76fa91
MS
7810{
7811 pstatus_t pstat;
7812 char *note_name = "CORE";
7813
51316059
MS
7814 memset (&pstat, 0, sizeof (pstat));
7815 pstat.pr_pid = pid & 0xffff;
47d9a591 7816 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
7817 NT_PSTATUS, &pstat, sizeof (pstat));
7818 return buf;
7c76fa91
MS
7819}
7820#endif /* HAVE_PSTATUS_T */
7821
7822char *
217aa764
AM
7823elfcore_write_prfpreg (bfd *abfd,
7824 char *buf,
7825 int *bufsiz,
7826 const void *fpregs,
7827 int size)
7c76fa91
MS
7828{
7829 char *note_name = "CORE";
47d9a591 7830 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7831 note_name, NT_FPREGSET, fpregs, size);
7832}
7833
7834char *
217aa764
AM
7835elfcore_write_prxfpreg (bfd *abfd,
7836 char *buf,
7837 int *bufsiz,
7838 const void *xfpregs,
7839 int size)
7c76fa91
MS
7840{
7841 char *note_name = "LINUX";
47d9a591 7842 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
7843 note_name, NT_PRXFPREG, xfpregs, size);
7844}
7845
b34976b6 7846static bfd_boolean
217aa764 7847elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 7848{
c044fabd
KH
7849 char *buf;
7850 char *p;
252b5132
RH
7851
7852 if (size <= 0)
b34976b6 7853 return TRUE;
252b5132 7854
dc810e39 7855 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 7856 return FALSE;
252b5132 7857
dc810e39 7858 buf = bfd_malloc (size);
252b5132 7859 if (buf == NULL)
b34976b6 7860 return FALSE;
252b5132 7861
dc810e39 7862 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
7863 {
7864 error:
7865 free (buf);
b34976b6 7866 return FALSE;
252b5132
RH
7867 }
7868
7869 p = buf;
7870 while (p < buf + size)
7871 {
c044fabd
KH
7872 /* FIXME: bad alignment assumption. */
7873 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
7874 Elf_Internal_Note in;
7875
dc810e39 7876 in.type = H_GET_32 (abfd, xnp->type);
252b5132 7877
dc810e39 7878 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
7879 in.namedata = xnp->name;
7880
dc810e39 7881 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
7882 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
7883 in.descpos = offset + (in.descdata - buf);
7884
50b2bdb7
AM
7885 if (strncmp (in.namedata, "NetBSD-CORE", 11) == 0)
7886 {
7887 if (! elfcore_grok_netbsd_note (abfd, &in))
7888 goto error;
7889 }
07c6e936
NC
7890 else if (strncmp (in.namedata, "QNX", 3) == 0)
7891 {
7892 if (! elfcore_grok_nto_note (abfd, &in))
7893 goto error;
7894 }
50b2bdb7
AM
7895 else
7896 {
7897 if (! elfcore_grok_note (abfd, &in))
7898 goto error;
7899 }
252b5132
RH
7900
7901 p = in.descdata + BFD_ALIGN (in.descsz, 4);
7902 }
7903
7904 free (buf);
b34976b6 7905 return TRUE;
252b5132 7906}
98d8431c
JB
7907\f
7908/* Providing external access to the ELF program header table. */
7909
7910/* Return an upper bound on the number of bytes required to store a
7911 copy of ABFD's program header table entries. Return -1 if an error
7912 occurs; bfd_get_error will return an appropriate code. */
c044fabd 7913
98d8431c 7914long
217aa764 7915bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
7916{
7917 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7918 {
7919 bfd_set_error (bfd_error_wrong_format);
7920 return -1;
7921 }
7922
936e320b 7923 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
7924}
7925
98d8431c
JB
7926/* Copy ABFD's program header table entries to *PHDRS. The entries
7927 will be stored as an array of Elf_Internal_Phdr structures, as
7928 defined in include/elf/internal.h. To find out how large the
7929 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
7930
7931 Return the number of program header table entries read, or -1 if an
7932 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 7933
98d8431c 7934int
217aa764 7935bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
7936{
7937 int num_phdrs;
7938
7939 if (abfd->xvec->flavour != bfd_target_elf_flavour)
7940 {
7941 bfd_set_error (bfd_error_wrong_format);
7942 return -1;
7943 }
7944
7945 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 7946 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
7947 num_phdrs * sizeof (Elf_Internal_Phdr));
7948
7949 return num_phdrs;
7950}
ae4221d7
L
7951
7952void
217aa764 7953_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 7954{
d3b05f8d 7955#ifdef BFD64
ae4221d7
L
7956 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7957
7958 i_ehdrp = elf_elfheader (abfd);
7959 if (i_ehdrp == NULL)
7960 sprintf_vma (buf, value);
7961 else
7962 {
7963 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7964 {
ae4221d7 7965#if BFD_HOST_64BIT_LONG
cc55aec9 7966 sprintf (buf, "%016lx", value);
ae4221d7 7967#else
cc55aec9
AM
7968 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
7969 _bfd_int64_low (value));
ae4221d7 7970#endif
cc55aec9 7971 }
ae4221d7
L
7972 else
7973 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
7974 }
d3b05f8d
L
7975#else
7976 sprintf_vma (buf, value);
7977#endif
ae4221d7
L
7978}
7979
7980void
217aa764 7981_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 7982{
d3b05f8d 7983#ifdef BFD64
ae4221d7
L
7984 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
7985
7986 i_ehdrp = elf_elfheader (abfd);
7987 if (i_ehdrp == NULL)
7988 fprintf_vma ((FILE *) stream, value);
7989 else
7990 {
7991 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 7992 {
ae4221d7 7993#if BFD_HOST_64BIT_LONG
cc55aec9 7994 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 7995#else
cc55aec9
AM
7996 fprintf ((FILE *) stream, "%08lx%08lx",
7997 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 7998#endif
cc55aec9 7999 }
ae4221d7
L
8000 else
8001 fprintf ((FILE *) stream, "%08lx",
8002 (unsigned long) (value & 0xffffffff));
8003 }
d3b05f8d
L
8004#else
8005 fprintf_vma ((FILE *) stream, value);
8006#endif
ae4221d7 8007}
db6751f2
JJ
8008
8009enum elf_reloc_type_class
217aa764 8010_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8011{
8012 return reloc_class_normal;
8013}
f8df10f4 8014
47d9a591 8015/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8016 relocation against a local symbol. */
8017
8018bfd_vma
217aa764
AM
8019_bfd_elf_rela_local_sym (bfd *abfd,
8020 Elf_Internal_Sym *sym,
8517fae7 8021 asection **psec,
217aa764 8022 Elf_Internal_Rela *rel)
f8df10f4 8023{
8517fae7 8024 asection *sec = *psec;
f8df10f4
JJ
8025 bfd_vma relocation;
8026
8027 relocation = (sec->output_section->vma
8028 + sec->output_offset
8029 + sym->st_value);
8030 if ((sec->flags & SEC_MERGE)
c629eae0 8031 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8032 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8033 {
f8df10f4 8034 rel->r_addend =
8517fae7 8035 _bfd_merged_section_offset (abfd, psec,
65765700 8036 elf_section_data (sec)->sec_info,
753731ee
AM
8037 sym->st_value + rel->r_addend);
8038 if (sec != *psec)
8039 {
8040 /* If we have changed the section, and our original section is
8041 marked with SEC_EXCLUDE, it means that the original
8042 SEC_MERGE section has been completely subsumed in some
8043 other SEC_MERGE section. In this case, we need to leave
8044 some info around for --emit-relocs. */
8045 if ((sec->flags & SEC_EXCLUDE) != 0)
8046 sec->kept_section = *psec;
8047 sec = *psec;
8048 }
8517fae7
AM
8049 rel->r_addend -= relocation;
8050 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8051 }
8052 return relocation;
8053}
c629eae0
JJ
8054
8055bfd_vma
217aa764
AM
8056_bfd_elf_rel_local_sym (bfd *abfd,
8057 Elf_Internal_Sym *sym,
8058 asection **psec,
8059 bfd_vma addend)
47d9a591 8060{
c629eae0
JJ
8061 asection *sec = *psec;
8062
68bfbfcc 8063 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8064 return sym->st_value + addend;
8065
8066 return _bfd_merged_section_offset (abfd, psec,
65765700 8067 elf_section_data (sec)->sec_info,
753731ee 8068 sym->st_value + addend);
c629eae0
JJ
8069}
8070
8071bfd_vma
217aa764 8072_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8073 struct bfd_link_info *info,
217aa764
AM
8074 asection *sec,
8075 bfd_vma offset)
c629eae0 8076{
68bfbfcc 8077 switch (sec->sec_info_type)
65765700
JJ
8078 {
8079 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8080 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8081 offset);
65765700 8082 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8083 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8084 default:
8085 return offset;
8086 }
c629eae0 8087}
3333a7c3
RM
8088\f
8089/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8090 reconstruct an ELF file by reading the segments out of remote memory
8091 based on the ELF file header at EHDR_VMA and the ELF program headers it
8092 points to. If not null, *LOADBASEP is filled in with the difference
8093 between the VMAs from which the segments were read, and the VMAs the
8094 file headers (and hence BFD's idea of each section's VMA) put them at.
8095
8096 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8097 remote memory at target address VMA into the local buffer at MYADDR; it
8098 should return zero on success or an `errno' code on failure. TEMPL must
8099 be a BFD for an ELF target with the word size and byte order found in
8100 the remote memory. */
8101
8102bfd *
217aa764
AM
8103bfd_elf_bfd_from_remote_memory
8104 (bfd *templ,
8105 bfd_vma ehdr_vma,
8106 bfd_vma *loadbasep,
f075ee0c 8107 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8108{
8109 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8110 (templ, ehdr_vma, loadbasep, target_read_memory);
8111}
4c45e5c9
JJ
8112\f
8113long
c9727e01
AM
8114_bfd_elf_get_synthetic_symtab (bfd *abfd,
8115 long symcount ATTRIBUTE_UNUSED,
8116 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8117 long dynsymcount,
c9727e01
AM
8118 asymbol **dynsyms,
8119 asymbol **ret)
4c45e5c9
JJ
8120{
8121 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8122 asection *relplt;
8123 asymbol *s;
8124 const char *relplt_name;
8125 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8126 arelent *p;
8127 long count, i, n;
8128 size_t size;
8129 Elf_Internal_Shdr *hdr;
8130 char *names;
8131 asection *plt;
8132
8615f3f2
AM
8133 *ret = NULL;
8134
90e3cdf2
JJ
8135 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8136 return 0;
8137
8615f3f2
AM
8138 if (dynsymcount <= 0)
8139 return 0;
8140
4c45e5c9
JJ
8141 if (!bed->plt_sym_val)
8142 return 0;
8143
8144 relplt_name = bed->relplt_name;
8145 if (relplt_name == NULL)
8146 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8147 relplt = bfd_get_section_by_name (abfd, relplt_name);
8148 if (relplt == NULL)
8149 return 0;
8150
8151 hdr = &elf_section_data (relplt)->this_hdr;
8152 if (hdr->sh_link != elf_dynsymtab (abfd)
8153 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8154 return 0;
8155
8156 plt = bfd_get_section_by_name (abfd, ".plt");
8157 if (plt == NULL)
8158 return 0;
8159
8160 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8161 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8162 return -1;
8163
eea6121a 8164 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8165 size = count * sizeof (asymbol);
8166 p = relplt->relocation;
8167 for (i = 0; i < count; i++, s++, p++)
8168 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8169
8170 s = *ret = bfd_malloc (size);
8171 if (s == NULL)
8172 return -1;
8173
8174 names = (char *) (s + count);
8175 p = relplt->relocation;
8176 n = 0;
8177 for (i = 0; i < count; i++, s++, p++)
8178 {
8179 size_t len;
8180 bfd_vma addr;
8181
8182 addr = bed->plt_sym_val (i, plt, p);
8183 if (addr == (bfd_vma) -1)
8184 continue;
8185
8186 *s = **p->sym_ptr_ptr;
8187 s->section = plt;
8188 s->value = addr - plt->vma;
8189 s->name = names;
8190 len = strlen ((*p->sym_ptr_ptr)->name);
8191 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8192 names += len;
8193 memcpy (names, "@plt", sizeof ("@plt"));
8194 names += sizeof ("@plt");
8195 ++n;
8196 }
8197
8198 return n;
8199}
3d7f7666
L
8200
8201/* Sort symbol by binding and section. We want to put definitions
8202 sorted by section at the beginning. */
8203
8204static int
8205elf_sort_elf_symbol (const void *arg1, const void *arg2)
8206{
8207 const Elf_Internal_Sym *s1;
8208 const Elf_Internal_Sym *s2;
8209 int shndx;
8210
8211 /* Make sure that undefined symbols are at the end. */
8212 s1 = (const Elf_Internal_Sym *) arg1;
8213 if (s1->st_shndx == SHN_UNDEF)
8214 return 1;
8215 s2 = (const Elf_Internal_Sym *) arg2;
8216 if (s2->st_shndx == SHN_UNDEF)
8217 return -1;
8218
8219 /* Sorted by section index. */
8220 shndx = s1->st_shndx - s2->st_shndx;
8221 if (shndx != 0)
8222 return shndx;
8223
8224 /* Sorted by binding. */
8225 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8226}
8227
8228struct elf_symbol
8229{
8230 Elf_Internal_Sym *sym;
8231 const char *name;
8232};
8233
8234static int
8235elf_sym_name_compare (const void *arg1, const void *arg2)
8236{
8237 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8238 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8239 return strcmp (s1->name, s2->name);
8240}
8241
8242/* Check if 2 sections define the same set of local and global
8243 symbols. */
8244
8245bfd_boolean
8246bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8247{
8248 bfd *bfd1, *bfd2;
8249 const struct elf_backend_data *bed1, *bed2;
8250 Elf_Internal_Shdr *hdr1, *hdr2;
8251 bfd_size_type symcount1, symcount2;
8252 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8253 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8254 Elf_Internal_Sym *isymend;
8255 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8256 bfd_size_type count1, count2, i;
8257 int shndx1, shndx2;
8258 bfd_boolean result;
8259
8260 bfd1 = sec1->owner;
8261 bfd2 = sec2->owner;
8262
8263 /* If both are .gnu.linkonce sections, they have to have the same
8264 section name. */
8265 if (strncmp (sec1->name, ".gnu.linkonce",
8266 sizeof ".gnu.linkonce" - 1) == 0
8267 && strncmp (sec2->name, ".gnu.linkonce",
8268 sizeof ".gnu.linkonce" - 1) == 0)
8269 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8270 sec2->name + sizeof ".gnu.linkonce") == 0;
8271
8272 /* Both sections have to be in ELF. */
8273 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8274 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8275 return FALSE;
8276
8277 if (elf_section_type (sec1) != elf_section_type (sec2))
8278 return FALSE;
8279
8280 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8281 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8282 {
8283 /* If both are members of section groups, they have to have the
8284 same group name. */
8285 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8286 return FALSE;
8287 }
8288
8289 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8290 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8291 if (shndx1 == -1 || shndx2 == -1)
8292 return FALSE;
8293
8294 bed1 = get_elf_backend_data (bfd1);
8295 bed2 = get_elf_backend_data (bfd2);
8296 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8297 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8298 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8299 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8300
8301 if (symcount1 == 0 || symcount2 == 0)
8302 return FALSE;
8303
8304 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8305 NULL, NULL, NULL);
8306 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8307 NULL, NULL, NULL);
8308
8309 result = FALSE;
8310 if (isymbuf1 == NULL || isymbuf2 == NULL)
8311 goto done;
8312
8313 /* Sort symbols by binding and section. Global definitions are at
8314 the beginning. */
8315 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8316 elf_sort_elf_symbol);
8317 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8318 elf_sort_elf_symbol);
8319
8320 /* Count definitions in the section. */
8321 count1 = 0;
8322 for (isym = isymbuf1, isymend = isym + symcount1;
8323 isym < isymend; isym++)
8324 {
8325 if (isym->st_shndx == (unsigned int) shndx1)
8326 {
8327 if (count1 == 0)
8328 isymstart1 = isym;
8329 count1++;
8330 }
8331
8332 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8333 break;
8334 }
8335
8336 count2 = 0;
8337 for (isym = isymbuf2, isymend = isym + symcount2;
8338 isym < isymend; isym++)
8339 {
8340 if (isym->st_shndx == (unsigned int) shndx2)
8341 {
8342 if (count2 == 0)
8343 isymstart2 = isym;
8344 count2++;
8345 }
8346
8347 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8348 break;
8349 }
8350
8351 if (count1 == 0 || count2 == 0 || count1 != count2)
8352 goto done;
8353
8354 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8355 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8356
8357 if (symtable1 == NULL || symtable2 == NULL)
8358 goto done;
8359
8360 symp = symtable1;
8361 for (isym = isymstart1, isymend = isym + count1;
8362 isym < isymend; isym++)
8363 {
8364 symp->sym = isym;
8365 symp->name = bfd_elf_string_from_elf_section (bfd1,
8366 hdr1->sh_link,
8367 isym->st_name);
8368 symp++;
8369 }
8370
8371 symp = symtable2;
8372 for (isym = isymstart2, isymend = isym + count1;
8373 isym < isymend; isym++)
8374 {
8375 symp->sym = isym;
8376 symp->name = bfd_elf_string_from_elf_section (bfd2,
8377 hdr2->sh_link,
8378 isym->st_name);
8379 symp++;
8380 }
8381
8382 /* Sort symbol by name. */
8383 qsort (symtable1, count1, sizeof (struct elf_symbol),
8384 elf_sym_name_compare);
8385 qsort (symtable2, count1, sizeof (struct elf_symbol),
8386 elf_sym_name_compare);
8387
8388 for (i = 0; i < count1; i++)
8389 /* Two symbols must have the same binding, type and name. */
8390 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8391 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8392 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8393 goto done;
8394
8395 result = TRUE;
8396
8397done:
8398 if (symtable1)
8399 free (symtable1);
8400 if (symtable2)
8401 free (symtable2);
8402 if (isymbuf1)
8403 free (isymbuf1);
8404 if (isymbuf2)
8405 free (isymbuf2);
8406
8407 return result;
8408}
This page took 0.90711 seconds and 4 git commands to generate.