*** empty log message ***
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
fad2f28d 4 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132 21
1b74d094
BW
22/*
23SECTION
252b5132
RH
24 ELF backends
25
26 BFD support for ELF formats is being worked on.
27 Currently, the best supported back ends are for sparc and i386
28 (running svr4 or Solaris 2).
29
30 Documentation of the internals of the support code still needs
31 to be written. The code is changing quickly enough that we
661a3fd4 32 haven't bothered yet. */
252b5132 33
7ee38065
MS
34/* For sparc64-cross-sparc32. */
35#define _SYSCALL32
252b5132
RH
36#include "bfd.h"
37#include "sysdep.h"
38#include "bfdlink.h"
39#include "libbfd.h"
40#define ARCH_SIZE 0
41#include "elf-bfd.h"
e0e8c97f 42#include "libiberty.h"
252b5132 43
217aa764 44static int elf_sort_sections (const void *, const void *);
c84fca4d 45static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
46static bfd_boolean prep_headers (bfd *);
47static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
48static bfd_boolean elfcore_read_notes (bfd *, file_ptr, bfd_size_type) ;
50b2bdb7 49
252b5132
RH
50/* Swap version information in and out. The version information is
51 currently size independent. If that ever changes, this code will
52 need to move into elfcode.h. */
53
54/* Swap in a Verdef structure. */
55
56void
217aa764
AM
57_bfd_elf_swap_verdef_in (bfd *abfd,
58 const Elf_External_Verdef *src,
59 Elf_Internal_Verdef *dst)
252b5132 60{
dc810e39
AM
61 dst->vd_version = H_GET_16 (abfd, src->vd_version);
62 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
63 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
64 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
65 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
66 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
67 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
68}
69
70/* Swap out a Verdef structure. */
71
72void
217aa764
AM
73_bfd_elf_swap_verdef_out (bfd *abfd,
74 const Elf_Internal_Verdef *src,
75 Elf_External_Verdef *dst)
252b5132 76{
dc810e39
AM
77 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
78 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
79 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
80 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
81 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
82 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
83 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
84}
85
86/* Swap in a Verdaux structure. */
87
88void
217aa764
AM
89_bfd_elf_swap_verdaux_in (bfd *abfd,
90 const Elf_External_Verdaux *src,
91 Elf_Internal_Verdaux *dst)
252b5132 92{
dc810e39
AM
93 dst->vda_name = H_GET_32 (abfd, src->vda_name);
94 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
95}
96
97/* Swap out a Verdaux structure. */
98
99void
217aa764
AM
100_bfd_elf_swap_verdaux_out (bfd *abfd,
101 const Elf_Internal_Verdaux *src,
102 Elf_External_Verdaux *dst)
252b5132 103{
dc810e39
AM
104 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
105 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
106}
107
108/* Swap in a Verneed structure. */
109
110void
217aa764
AM
111_bfd_elf_swap_verneed_in (bfd *abfd,
112 const Elf_External_Verneed *src,
113 Elf_Internal_Verneed *dst)
252b5132 114{
dc810e39
AM
115 dst->vn_version = H_GET_16 (abfd, src->vn_version);
116 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
117 dst->vn_file = H_GET_32 (abfd, src->vn_file);
118 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
119 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
120}
121
122/* Swap out a Verneed structure. */
123
124void
217aa764
AM
125_bfd_elf_swap_verneed_out (bfd *abfd,
126 const Elf_Internal_Verneed *src,
127 Elf_External_Verneed *dst)
252b5132 128{
dc810e39
AM
129 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
130 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
131 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
132 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
133 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
134}
135
136/* Swap in a Vernaux structure. */
137
138void
217aa764
AM
139_bfd_elf_swap_vernaux_in (bfd *abfd,
140 const Elf_External_Vernaux *src,
141 Elf_Internal_Vernaux *dst)
252b5132 142{
dc810e39
AM
143 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
144 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
145 dst->vna_other = H_GET_16 (abfd, src->vna_other);
146 dst->vna_name = H_GET_32 (abfd, src->vna_name);
147 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
148}
149
150/* Swap out a Vernaux structure. */
151
152void
217aa764
AM
153_bfd_elf_swap_vernaux_out (bfd *abfd,
154 const Elf_Internal_Vernaux *src,
155 Elf_External_Vernaux *dst)
252b5132 156{
dc810e39
AM
157 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
158 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
159 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
160 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
161 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
162}
163
164/* Swap in a Versym structure. */
165
166void
217aa764
AM
167_bfd_elf_swap_versym_in (bfd *abfd,
168 const Elf_External_Versym *src,
169 Elf_Internal_Versym *dst)
252b5132 170{
dc810e39 171 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
172}
173
174/* Swap out a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_out (bfd *abfd,
178 const Elf_Internal_Versym *src,
179 Elf_External_Versym *dst)
252b5132 180{
dc810e39 181 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
182}
183
184/* Standard ELF hash function. Do not change this function; you will
185 cause invalid hash tables to be generated. */
3a99b017 186
252b5132 187unsigned long
217aa764 188bfd_elf_hash (const char *namearg)
252b5132 189{
3a99b017 190 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
191 unsigned long h = 0;
192 unsigned long g;
193 int ch;
194
195 while ((ch = *name++) != '\0')
196 {
197 h = (h << 4) + ch;
198 if ((g = (h & 0xf0000000)) != 0)
199 {
200 h ^= g >> 24;
201 /* The ELF ABI says `h &= ~g', but this is equivalent in
202 this case and on some machines one insn instead of two. */
203 h ^= g;
204 }
205 }
32dfa85d 206 return h & 0xffffffff;
252b5132
RH
207}
208
fdc90cb4
JJ
209/* DT_GNU_HASH hash function. Do not change this function; you will
210 cause invalid hash tables to be generated. */
211
212unsigned long
213bfd_elf_gnu_hash (const char *namearg)
214{
215 const unsigned char *name = (const unsigned char *) namearg;
216 unsigned long h = 5381;
217 unsigned char ch;
218
219 while ((ch = *name++) != '\0')
220 h = (h << 5) + h + ch;
221 return h & 0xffffffff;
222}
223
b34976b6 224bfd_boolean
217aa764 225bfd_elf_mkobject (bfd *abfd)
252b5132 226{
62d7a5f6
AM
227 if (abfd->tdata.any == NULL)
228 {
229 abfd->tdata.any = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
230 if (abfd->tdata.any == NULL)
231 return FALSE;
232 }
233
234 elf_tdata (abfd)->program_header_size = (bfd_size_type) -1;
252b5132 235
b34976b6 236 return TRUE;
252b5132
RH
237}
238
b34976b6 239bfd_boolean
217aa764 240bfd_elf_mkcorefile (bfd *abfd)
252b5132 241{
c044fabd 242 /* I think this can be done just like an object file. */
252b5132
RH
243 return bfd_elf_mkobject (abfd);
244}
245
246char *
217aa764 247bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
248{
249 Elf_Internal_Shdr **i_shdrp;
f075ee0c 250 bfd_byte *shstrtab = NULL;
dc810e39
AM
251 file_ptr offset;
252 bfd_size_type shstrtabsize;
252b5132
RH
253
254 i_shdrp = elf_elfsections (abfd);
255 if (i_shdrp == 0 || i_shdrp[shindex] == 0)
f075ee0c 256 return NULL;
252b5132 257
f075ee0c 258 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
259 if (shstrtab == NULL)
260 {
c044fabd 261 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
262 offset = i_shdrp[shindex]->sh_offset;
263 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
264
265 /* Allocate and clear an extra byte at the end, to prevent crashes
266 in case the string table is not terminated. */
267 if (shstrtabsize + 1 == 0
268 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
269 || bfd_seek (abfd, offset, SEEK_SET) != 0)
270 shstrtab = NULL;
271 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
272 {
273 if (bfd_get_error () != bfd_error_system_call)
274 bfd_set_error (bfd_error_file_truncated);
275 shstrtab = NULL;
276 }
277 else
278 shstrtab[shstrtabsize] = '\0';
217aa764 279 i_shdrp[shindex]->contents = shstrtab;
252b5132 280 }
f075ee0c 281 return (char *) shstrtab;
252b5132
RH
282}
283
284char *
217aa764
AM
285bfd_elf_string_from_elf_section (bfd *abfd,
286 unsigned int shindex,
287 unsigned int strindex)
252b5132
RH
288{
289 Elf_Internal_Shdr *hdr;
290
291 if (strindex == 0)
292 return "";
293
294 hdr = elf_elfsections (abfd)[shindex];
295
296 if (hdr->contents == NULL
297 && bfd_elf_get_str_section (abfd, shindex) == NULL)
298 return NULL;
299
300 if (strindex >= hdr->sh_size)
301 {
1b3a8575 302 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 303 (*_bfd_error_handler)
d003868e
AM
304 (_("%B: invalid string offset %u >= %lu for section `%s'"),
305 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 306 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 307 ? ".shstrtab"
1b3a8575 308 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
309 return "";
310 }
311
312 return ((char *) hdr->contents) + strindex;
313}
314
6cdc0ccc
AM
315/* Read and convert symbols to internal format.
316 SYMCOUNT specifies the number of symbols to read, starting from
317 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
318 are non-NULL, they are used to store the internal symbols, external
319 symbols, and symbol section index extensions, respectively. */
320
321Elf_Internal_Sym *
217aa764
AM
322bfd_elf_get_elf_syms (bfd *ibfd,
323 Elf_Internal_Shdr *symtab_hdr,
324 size_t symcount,
325 size_t symoffset,
326 Elf_Internal_Sym *intsym_buf,
327 void *extsym_buf,
328 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
329{
330 Elf_Internal_Shdr *shndx_hdr;
217aa764 331 void *alloc_ext;
df622259 332 const bfd_byte *esym;
6cdc0ccc
AM
333 Elf_External_Sym_Shndx *alloc_extshndx;
334 Elf_External_Sym_Shndx *shndx;
335 Elf_Internal_Sym *isym;
336 Elf_Internal_Sym *isymend;
9c5bfbb7 337 const struct elf_backend_data *bed;
6cdc0ccc
AM
338 size_t extsym_size;
339 bfd_size_type amt;
340 file_ptr pos;
341
342 if (symcount == 0)
343 return intsym_buf;
344
345 /* Normal syms might have section extension entries. */
346 shndx_hdr = NULL;
347 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
348 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
349
350 /* Read the symbols. */
351 alloc_ext = NULL;
352 alloc_extshndx = NULL;
353 bed = get_elf_backend_data (ibfd);
354 extsym_size = bed->s->sizeof_sym;
355 amt = symcount * extsym_size;
356 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
357 if (extsym_buf == NULL)
358 {
d0fb9a8d 359 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
360 extsym_buf = alloc_ext;
361 }
362 if (extsym_buf == NULL
363 || bfd_seek (ibfd, pos, SEEK_SET) != 0
364 || bfd_bread (extsym_buf, amt, ibfd) != amt)
365 {
366 intsym_buf = NULL;
367 goto out;
368 }
369
370 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
371 extshndx_buf = NULL;
372 else
373 {
374 amt = symcount * sizeof (Elf_External_Sym_Shndx);
375 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
376 if (extshndx_buf == NULL)
377 {
d0fb9a8d
JJ
378 alloc_extshndx = bfd_malloc2 (symcount,
379 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
380 extshndx_buf = alloc_extshndx;
381 }
382 if (extshndx_buf == NULL
383 || bfd_seek (ibfd, pos, SEEK_SET) != 0
384 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
385 {
386 intsym_buf = NULL;
387 goto out;
388 }
389 }
390
391 if (intsym_buf == NULL)
392 {
d0fb9a8d 393 intsym_buf = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
6cdc0ccc
AM
394 if (intsym_buf == NULL)
395 goto out;
396 }
397
398 /* Convert the symbols to internal form. */
399 isymend = intsym_buf + symcount;
400 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
401 isym < isymend;
402 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
403 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
404 {
405 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
406 (*_bfd_error_handler) (_("%B symbol number %lu references "
407 "nonexistent SHT_SYMTAB_SHNDX section"),
408 ibfd, (unsigned long) symoffset);
409 intsym_buf = NULL;
410 goto out;
411 }
6cdc0ccc
AM
412
413 out:
414 if (alloc_ext != NULL)
415 free (alloc_ext);
416 if (alloc_extshndx != NULL)
417 free (alloc_extshndx);
418
419 return intsym_buf;
420}
421
5cab59f6
AM
422/* Look up a symbol name. */
423const char *
be8dd2ca
AM
424bfd_elf_sym_name (bfd *abfd,
425 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
426 Elf_Internal_Sym *isym,
427 asection *sym_sec)
5cab59f6 428{
26c61ae5 429 const char *name;
5cab59f6 430 unsigned int iname = isym->st_name;
be8dd2ca 431 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 432
138f35cc
JJ
433 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
434 /* Check for a bogus st_shndx to avoid crashing. */
435 && isym->st_shndx < elf_numsections (abfd)
436 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
437 {
438 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
439 shindex = elf_elfheader (abfd)->e_shstrndx;
440 }
441
26c61ae5
L
442 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
443 if (name == NULL)
444 name = "(null)";
445 else if (sym_sec && *name == '\0')
446 name = bfd_section_name (abfd, sym_sec);
447
448 return name;
5cab59f6
AM
449}
450
dbb410c3
AM
451/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
452 sections. The first element is the flags, the rest are section
453 pointers. */
454
455typedef union elf_internal_group {
456 Elf_Internal_Shdr *shdr;
457 unsigned int flags;
458} Elf_Internal_Group;
459
b885599b
AM
460/* Return the name of the group signature symbol. Why isn't the
461 signature just a string? */
462
463static const char *
217aa764 464group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 465{
9dce4196 466 Elf_Internal_Shdr *hdr;
9dce4196
AM
467 unsigned char esym[sizeof (Elf64_External_Sym)];
468 Elf_External_Sym_Shndx eshndx;
469 Elf_Internal_Sym isym;
b885599b 470
13792e9d
L
471 /* First we need to ensure the symbol table is available. Make sure
472 that it is a symbol table section. */
473 hdr = elf_elfsections (abfd) [ghdr->sh_link];
474 if (hdr->sh_type != SHT_SYMTAB
475 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
476 return NULL;
477
9dce4196
AM
478 /* Go read the symbol. */
479 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
480 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
481 &isym, esym, &eshndx) == NULL)
b885599b 482 return NULL;
9dce4196 483
26c61ae5 484 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
485}
486
dbb410c3
AM
487/* Set next_in_group list pointer, and group name for NEWSECT. */
488
b34976b6 489static bfd_boolean
217aa764 490setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
491{
492 unsigned int num_group = elf_tdata (abfd)->num_group;
493
494 /* If num_group is zero, read in all SHT_GROUP sections. The count
495 is set to -1 if there are no SHT_GROUP sections. */
496 if (num_group == 0)
497 {
498 unsigned int i, shnum;
499
500 /* First count the number of groups. If we have a SHT_GROUP
501 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 502 shnum = elf_numsections (abfd);
dbb410c3
AM
503 num_group = 0;
504 for (i = 0; i < shnum; i++)
505 {
506 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
507 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
508 num_group += 1;
509 }
510
511 if (num_group == 0)
20dbb49d
L
512 {
513 num_group = (unsigned) -1;
514 elf_tdata (abfd)->num_group = num_group;
515 }
516 else
dbb410c3
AM
517 {
518 /* We keep a list of elf section headers for group sections,
519 so we can find them quickly. */
20dbb49d 520 bfd_size_type amt;
d0fb9a8d 521
20dbb49d 522 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
523 elf_tdata (abfd)->group_sect_ptr
524 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 525 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 526 return FALSE;
dbb410c3
AM
527
528 num_group = 0;
529 for (i = 0; i < shnum; i++)
530 {
531 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
532 if (shdr->sh_type == SHT_GROUP && shdr->sh_size >= 8)
533 {
973ffd63 534 unsigned char *src;
dbb410c3
AM
535 Elf_Internal_Group *dest;
536
537 /* Add to list of sections. */
538 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
539 num_group += 1;
540
541 /* Read the raw contents. */
542 BFD_ASSERT (sizeof (*dest) >= 4);
543 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
544 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
545 sizeof (*dest) / 4);
dbb410c3
AM
546 if (shdr->contents == NULL
547 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
548 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
549 != shdr->sh_size))
b34976b6 550 return FALSE;
dbb410c3
AM
551
552 /* Translate raw contents, a flag word followed by an
553 array of elf section indices all in target byte order,
554 to the flag word followed by an array of elf section
555 pointers. */
556 src = shdr->contents + shdr->sh_size;
557 dest = (Elf_Internal_Group *) (shdr->contents + amt);
558 while (1)
559 {
560 unsigned int idx;
561
562 src -= 4;
563 --dest;
564 idx = H_GET_32 (abfd, src);
565 if (src == shdr->contents)
566 {
567 dest->flags = idx;
b885599b
AM
568 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
569 shdr->bfd_section->flags
570 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
571 break;
572 }
573 if (idx >= shnum)
574 {
575 ((*_bfd_error_handler)
d003868e 576 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
577 idx = 0;
578 }
579 dest->shdr = elf_elfsections (abfd)[idx];
580 }
581 }
582 }
583 }
584 }
585
586 if (num_group != (unsigned) -1)
587 {
588 unsigned int i;
589
590 for (i = 0; i < num_group; i++)
591 {
592 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
593 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
594 unsigned int n_elt = shdr->sh_size / 4;
595
596 /* Look through this group's sections to see if current
597 section is a member. */
598 while (--n_elt != 0)
599 if ((++idx)->shdr == hdr)
600 {
e0e8c97f 601 asection *s = NULL;
dbb410c3
AM
602
603 /* We are a member of this group. Go looking through
604 other members to see if any others are linked via
605 next_in_group. */
606 idx = (Elf_Internal_Group *) shdr->contents;
607 n_elt = shdr->sh_size / 4;
608 while (--n_elt != 0)
609 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 610 && elf_next_in_group (s) != NULL)
dbb410c3
AM
611 break;
612 if (n_elt != 0)
613 {
dbb410c3
AM
614 /* Snarf the group name from other member, and
615 insert current section in circular list. */
945906ff
AM
616 elf_group_name (newsect) = elf_group_name (s);
617 elf_next_in_group (newsect) = elf_next_in_group (s);
618 elf_next_in_group (s) = newsect;
dbb410c3
AM
619 }
620 else
621 {
dbb410c3
AM
622 const char *gname;
623
b885599b
AM
624 gname = group_signature (abfd, shdr);
625 if (gname == NULL)
b34976b6 626 return FALSE;
945906ff 627 elf_group_name (newsect) = gname;
dbb410c3
AM
628
629 /* Start a circular list with one element. */
945906ff 630 elf_next_in_group (newsect) = newsect;
dbb410c3 631 }
b885599b 632
9dce4196
AM
633 /* If the group section has been created, point to the
634 new member. */
dbb410c3 635 if (shdr->bfd_section != NULL)
945906ff 636 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 637
dbb410c3
AM
638 i = num_group - 1;
639 break;
640 }
641 }
642 }
643
945906ff 644 if (elf_group_name (newsect) == NULL)
dbb410c3 645 {
d003868e
AM
646 (*_bfd_error_handler) (_("%B: no group info for section %A"),
647 abfd, newsect);
dbb410c3 648 }
b34976b6 649 return TRUE;
dbb410c3
AM
650}
651
3d7f7666 652bfd_boolean
dd863624 653_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
654{
655 unsigned int i;
656 unsigned int num_group = elf_tdata (abfd)->num_group;
657 bfd_boolean result = TRUE;
dd863624
L
658 asection *s;
659
660 /* Process SHF_LINK_ORDER. */
661 for (s = abfd->sections; s != NULL; s = s->next)
662 {
663 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
664 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
665 {
666 unsigned int elfsec = this_hdr->sh_link;
667 /* FIXME: The old Intel compiler and old strip/objcopy may
668 not set the sh_link or sh_info fields. Hence we could
669 get the situation where elfsec is 0. */
670 if (elfsec == 0)
671 {
672 const struct elf_backend_data *bed
673 = get_elf_backend_data (abfd);
674 if (bed->link_order_error_handler)
675 bed->link_order_error_handler
676 (_("%B: warning: sh_link not set for section `%A'"),
677 abfd, s);
678 }
679 else
680 {
25bbc984
L
681 asection *link;
682
dd863624 683 this_hdr = elf_elfsections (abfd)[elfsec];
25bbc984
L
684
685 /* PR 1991, 2008:
686 Some strip/objcopy may leave an incorrect value in
687 sh_link. We don't want to proceed. */
688 link = this_hdr->bfd_section;
689 if (link == NULL)
690 {
691 (*_bfd_error_handler)
692 (_("%B: sh_link [%d] in section `%A' is incorrect"),
693 s->owner, s, elfsec);
694 result = FALSE;
695 }
696
697 elf_linked_to_section (s) = link;
dd863624
L
698 }
699 }
700 }
3d7f7666 701
dd863624 702 /* Process section groups. */
3d7f7666
L
703 if (num_group == (unsigned) -1)
704 return result;
705
706 for (i = 0; i < num_group; i++)
707 {
708 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
709 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
710 unsigned int n_elt = shdr->sh_size / 4;
711
712 while (--n_elt != 0)
713 if ((++idx)->shdr->bfd_section)
714 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
715 else if (idx->shdr->sh_type == SHT_RELA
716 || idx->shdr->sh_type == SHT_REL)
717 /* We won't include relocation sections in section groups in
718 output object files. We adjust the group section size here
719 so that relocatable link will work correctly when
720 relocation sections are in section group in input object
721 files. */
722 shdr->bfd_section->size -= 4;
723 else
724 {
725 /* There are some unknown sections in the group. */
726 (*_bfd_error_handler)
d003868e
AM
727 (_("%B: unknown [%d] section `%s' in group [%s]"),
728 abfd,
3d7f7666 729 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
730 bfd_elf_string_from_elf_section (abfd,
731 (elf_elfheader (abfd)
732 ->e_shstrndx),
733 idx->shdr->sh_name),
3d7f7666
L
734 shdr->bfd_section->name);
735 result = FALSE;
736 }
737 }
738 return result;
739}
740
72adc230
AM
741bfd_boolean
742bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
743{
744 return elf_next_in_group (sec) != NULL;
745}
746
252b5132
RH
747/* Make a BFD section from an ELF section. We store a pointer to the
748 BFD section in the bfd_section field of the header. */
749
b34976b6 750bfd_boolean
217aa764
AM
751_bfd_elf_make_section_from_shdr (bfd *abfd,
752 Elf_Internal_Shdr *hdr,
6dc132d9
L
753 const char *name,
754 int shindex)
252b5132
RH
755{
756 asection *newsect;
757 flagword flags;
9c5bfbb7 758 const struct elf_backend_data *bed;
252b5132
RH
759
760 if (hdr->bfd_section != NULL)
761 {
762 BFD_ASSERT (strcmp (name,
763 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 764 return TRUE;
252b5132
RH
765 }
766
767 newsect = bfd_make_section_anyway (abfd, name);
768 if (newsect == NULL)
b34976b6 769 return FALSE;
252b5132 770
1829f4b2
AM
771 hdr->bfd_section = newsect;
772 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 773 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 774
2f89ff8d
L
775 /* Always use the real type/flags. */
776 elf_section_type (newsect) = hdr->sh_type;
777 elf_section_flags (newsect) = hdr->sh_flags;
778
252b5132
RH
779 newsect->filepos = hdr->sh_offset;
780
781 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
782 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
783 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 784 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 785 return FALSE;
252b5132
RH
786
787 flags = SEC_NO_FLAGS;
788 if (hdr->sh_type != SHT_NOBITS)
789 flags |= SEC_HAS_CONTENTS;
dbb410c3 790 if (hdr->sh_type == SHT_GROUP)
b3096250 791 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
792 if ((hdr->sh_flags & SHF_ALLOC) != 0)
793 {
794 flags |= SEC_ALLOC;
795 if (hdr->sh_type != SHT_NOBITS)
796 flags |= SEC_LOAD;
797 }
798 if ((hdr->sh_flags & SHF_WRITE) == 0)
799 flags |= SEC_READONLY;
800 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
801 flags |= SEC_CODE;
802 else if ((flags & SEC_LOAD) != 0)
803 flags |= SEC_DATA;
f5fa8ca2
JJ
804 if ((hdr->sh_flags & SHF_MERGE) != 0)
805 {
806 flags |= SEC_MERGE;
807 newsect->entsize = hdr->sh_entsize;
808 if ((hdr->sh_flags & SHF_STRINGS) != 0)
809 flags |= SEC_STRINGS;
810 }
dbb410c3
AM
811 if (hdr->sh_flags & SHF_GROUP)
812 if (!setup_group (abfd, hdr, newsect))
b34976b6 813 return FALSE;
13ae64f3
JJ
814 if ((hdr->sh_flags & SHF_TLS) != 0)
815 flags |= SEC_THREAD_LOCAL;
252b5132 816
3d2b39cf 817 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 818 {
3d2b39cf
L
819 /* The debugging sections appear to be recognized only by name,
820 not any sort of flag. Their SEC_ALLOC bits are cleared. */
821 static const struct
822 {
823 const char *name;
824 int len;
825 } debug_sections [] =
826 {
0112cd26 827 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
828 { NULL, 0 }, /* 'e' */
829 { NULL, 0 }, /* 'f' */
0112cd26 830 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
831 { NULL, 0 }, /* 'h' */
832 { NULL, 0 }, /* 'i' */
833 { NULL, 0 }, /* 'j' */
834 { NULL, 0 }, /* 'k' */
0112cd26 835 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
836 { NULL, 0 }, /* 'm' */
837 { NULL, 0 }, /* 'n' */
838 { NULL, 0 }, /* 'o' */
839 { NULL, 0 }, /* 'p' */
840 { NULL, 0 }, /* 'q' */
841 { NULL, 0 }, /* 'r' */
0112cd26 842 { STRING_COMMA_LEN ("stab") } /* 's' */
3d2b39cf
L
843 };
844
845 if (name [0] == '.')
846 {
847 int i = name [1] - 'd';
848 if (i >= 0
849 && i < (int) ARRAY_SIZE (debug_sections)
850 && debug_sections [i].name != NULL
851 && strncmp (&name [1], debug_sections [i].name,
852 debug_sections [i].len) == 0)
853 flags |= SEC_DEBUGGING;
854 }
855 }
252b5132
RH
856
857 /* As a GNU extension, if the name begins with .gnu.linkonce, we
858 only link a single copy of the section. This is used to support
859 g++. g++ will emit each template expansion in its own section.
860 The symbols will be defined as weak, so that multiple definitions
861 are permitted. The GNU linker extension is to actually discard
862 all but one of the sections. */
0112cd26 863 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 864 && elf_next_in_group (newsect) == NULL)
252b5132
RH
865 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
866
fa152c49
JW
867 bed = get_elf_backend_data (abfd);
868 if (bed->elf_backend_section_flags)
869 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 870 return FALSE;
fa152c49 871
252b5132 872 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 873 return FALSE;
252b5132
RH
874
875 if ((flags & SEC_ALLOC) != 0)
876 {
877 Elf_Internal_Phdr *phdr;
878 unsigned int i;
879
880 /* Look through the phdrs to see if we need to adjust the lma.
881 If all the p_paddr fields are zero, we ignore them, since
882 some ELF linkers produce such output. */
883 phdr = elf_tdata (abfd)->phdr;
884 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
885 {
886 if (phdr->p_paddr != 0)
887 break;
888 }
889 if (i < elf_elfheader (abfd)->e_phnum)
890 {
891 phdr = elf_tdata (abfd)->phdr;
892 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
893 {
e0e8c97f
NC
894 /* This section is part of this segment if its file
895 offset plus size lies within the segment's memory
896 span and, if the section is loaded, the extent of the
47d9a591 897 loaded data lies within the extent of the segment.
bf36db18
NC
898
899 Note - we used to check the p_paddr field as well, and
900 refuse to set the LMA if it was 0. This is wrong
dba143ef 901 though, as a perfectly valid initialised segment can
bf36db18 902 have a p_paddr of zero. Some architectures, eg ARM,
dba143ef 903 place special significance on the address 0 and
bf36db18
NC
904 executables need to be able to have a segment which
905 covers this address. */
252b5132 906 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
907 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
908 && (hdr->sh_offset + hdr->sh_size
909 <= phdr->p_offset + phdr->p_memsz)
252b5132 910 && ((flags & SEC_LOAD) == 0
d7866f04
AM
911 || (hdr->sh_offset + hdr->sh_size
912 <= phdr->p_offset + phdr->p_filesz)))
252b5132 913 {
dba143ef 914 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
915 newsect->lma = (phdr->p_paddr
916 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
917 else
918 /* We used to use the same adjustment for SEC_LOAD
919 sections, but that doesn't work if the segment
920 is packed with code from multiple VMAs.
921 Instead we calculate the section LMA based on
922 the segment LMA. It is assumed that the
923 segment will contain sections with contiguous
924 LMAs, even if the VMAs are not. */
925 newsect->lma = (phdr->p_paddr
926 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
927
928 /* With contiguous segments, we can't tell from file
929 offsets whether a section with zero size should
930 be placed at the end of one segment or the
931 beginning of the next. Decide based on vaddr. */
932 if (hdr->sh_addr >= phdr->p_vaddr
933 && (hdr->sh_addr + hdr->sh_size
934 <= phdr->p_vaddr + phdr->p_memsz))
935 break;
252b5132
RH
936 }
937 }
938 }
939 }
940
b34976b6 941 return TRUE;
252b5132
RH
942}
943
944/*
945INTERNAL_FUNCTION
946 bfd_elf_find_section
947
948SYNOPSIS
949 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
950
951DESCRIPTION
952 Helper functions for GDB to locate the string tables.
953 Since BFD hides string tables from callers, GDB needs to use an
954 internal hook to find them. Sun's .stabstr, in particular,
955 isn't even pointed to by the .stab section, so ordinary
956 mechanisms wouldn't work to find it, even if we had some.
957*/
958
959struct elf_internal_shdr *
217aa764 960bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
961{
962 Elf_Internal_Shdr **i_shdrp;
963 char *shstrtab;
964 unsigned int max;
965 unsigned int i;
966
967 i_shdrp = elf_elfsections (abfd);
968 if (i_shdrp != NULL)
969 {
9ad5cbcf
AM
970 shstrtab = bfd_elf_get_str_section (abfd,
971 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
972 if (shstrtab != NULL)
973 {
9ad5cbcf 974 max = elf_numsections (abfd);
252b5132
RH
975 for (i = 1; i < max; i++)
976 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
977 return i_shdrp[i];
978 }
979 }
980 return 0;
981}
982
983const char *const bfd_elf_section_type_names[] = {
984 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
985 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
986 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
987};
988
1049f94e 989/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
990 output, and the reloc is against an external symbol, and nothing
991 has given us any additional addend, the resulting reloc will also
992 be against the same symbol. In such a case, we don't want to
993 change anything about the way the reloc is handled, since it will
994 all be done at final link time. Rather than put special case code
995 into bfd_perform_relocation, all the reloc types use this howto
996 function. It just short circuits the reloc if producing
1049f94e 997 relocatable output against an external symbol. */
252b5132 998
252b5132 999bfd_reloc_status_type
217aa764
AM
1000bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1001 arelent *reloc_entry,
1002 asymbol *symbol,
1003 void *data ATTRIBUTE_UNUSED,
1004 asection *input_section,
1005 bfd *output_bfd,
1006 char **error_message ATTRIBUTE_UNUSED)
1007{
1008 if (output_bfd != NULL
252b5132
RH
1009 && (symbol->flags & BSF_SECTION_SYM) == 0
1010 && (! reloc_entry->howto->partial_inplace
1011 || reloc_entry->addend == 0))
1012 {
1013 reloc_entry->address += input_section->output_offset;
1014 return bfd_reloc_ok;
1015 }
1016
1017 return bfd_reloc_continue;
1018}
1019\f
d3c456e9
JJ
1020/* Make sure sec_info_type is cleared if sec_info is cleared too. */
1021
1022static void
217aa764
AM
1023merge_sections_remove_hook (bfd *abfd ATTRIBUTE_UNUSED,
1024 asection *sec)
d3c456e9 1025{
68bfbfcc
AM
1026 BFD_ASSERT (sec->sec_info_type == ELF_INFO_TYPE_MERGE);
1027 sec->sec_info_type = ELF_INFO_TYPE_NONE;
d3c456e9
JJ
1028}
1029
8550eb6e
JJ
1030/* Finish SHF_MERGE section merging. */
1031
b34976b6 1032bfd_boolean
217aa764 1033_bfd_elf_merge_sections (bfd *abfd, struct bfd_link_info *info)
8550eb6e 1034{
57ceae94
AM
1035 bfd *ibfd;
1036 asection *sec;
1037
0eddce27 1038 if (!is_elf_hash_table (info->hash))
b34976b6 1039 return FALSE;
57ceae94
AM
1040
1041 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1042 if ((ibfd->flags & DYNAMIC) == 0)
1043 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
1044 if ((sec->flags & SEC_MERGE) != 0
1045 && !bfd_is_abs_section (sec->output_section))
1046 {
1047 struct bfd_elf_section_data *secdata;
1048
1049 secdata = elf_section_data (sec);
1050 if (! _bfd_add_merge_section (abfd,
1051 &elf_hash_table (info)->merge_info,
1052 sec, &secdata->sec_info))
1053 return FALSE;
1054 else if (secdata->sec_info)
1055 sec->sec_info_type = ELF_INFO_TYPE_MERGE;
1056 }
1057
1058 if (elf_hash_table (info)->merge_info != NULL)
1059 _bfd_merge_sections (abfd, info, elf_hash_table (info)->merge_info,
d3c456e9 1060 merge_sections_remove_hook);
b34976b6 1061 return TRUE;
8550eb6e 1062}
2d653fc7
AM
1063
1064void
217aa764 1065_bfd_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
2d653fc7
AM
1066{
1067 sec->output_section = bfd_abs_section_ptr;
1068 sec->output_offset = sec->vma;
0eddce27 1069 if (!is_elf_hash_table (info->hash))
2d653fc7
AM
1070 return;
1071
68bfbfcc 1072 sec->sec_info_type = ELF_INFO_TYPE_JUST_SYMS;
2d653fc7 1073}
8550eb6e 1074\f
0ac4564e
L
1075/* Copy the program header and other data from one object module to
1076 another. */
252b5132 1077
b34976b6 1078bfd_boolean
217aa764 1079_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1080{
1081 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1082 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1083 return TRUE;
2d502050
L
1084
1085 BFD_ASSERT (!elf_flags_init (obfd)
1086 || (elf_elfheader (obfd)->e_flags
1087 == elf_elfheader (ibfd)->e_flags));
1088
0ac4564e 1089 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1090 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6
AM
1091 elf_flags_init (obfd) = TRUE;
1092 return TRUE;
2d502050
L
1093}
1094
cedc298e
L
1095static const char *
1096get_segment_type (unsigned int p_type)
1097{
1098 const char *pt;
1099 switch (p_type)
1100 {
1101 case PT_NULL: pt = "NULL"; break;
1102 case PT_LOAD: pt = "LOAD"; break;
1103 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1104 case PT_INTERP: pt = "INTERP"; break;
1105 case PT_NOTE: pt = "NOTE"; break;
1106 case PT_SHLIB: pt = "SHLIB"; break;
1107 case PT_PHDR: pt = "PHDR"; break;
1108 case PT_TLS: pt = "TLS"; break;
1109 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1110 case PT_GNU_STACK: pt = "STACK"; break;
1111 case PT_GNU_RELRO: pt = "RELRO"; break;
1112 default: pt = NULL; break;
1113 }
1114 return pt;
1115}
1116
f0b79d91
L
1117/* Print out the program headers. */
1118
b34976b6 1119bfd_boolean
217aa764 1120_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1121{
217aa764 1122 FILE *f = farg;
252b5132
RH
1123 Elf_Internal_Phdr *p;
1124 asection *s;
1125 bfd_byte *dynbuf = NULL;
1126
1127 p = elf_tdata (abfd)->phdr;
1128 if (p != NULL)
1129 {
1130 unsigned int i, c;
1131
1132 fprintf (f, _("\nProgram Header:\n"));
1133 c = elf_elfheader (abfd)->e_phnum;
1134 for (i = 0; i < c; i++, p++)
1135 {
cedc298e 1136 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1137 char buf[20];
1138
cedc298e 1139 if (pt == NULL)
252b5132 1140 {
cedc298e
L
1141 sprintf (buf, "0x%lx", p->p_type);
1142 pt = buf;
252b5132 1143 }
dc810e39 1144 fprintf (f, "%8s off 0x", pt);
60b89a18 1145 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1146 fprintf (f, " vaddr 0x");
60b89a18 1147 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1148 fprintf (f, " paddr 0x");
60b89a18 1149 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1150 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1151 fprintf (f, " filesz 0x");
60b89a18 1152 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1153 fprintf (f, " memsz 0x");
60b89a18 1154 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1155 fprintf (f, " flags %c%c%c",
1156 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1157 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1158 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1159 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1160 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1161 fprintf (f, "\n");
1162 }
1163 }
1164
1165 s = bfd_get_section_by_name (abfd, ".dynamic");
1166 if (s != NULL)
1167 {
1168 int elfsec;
dc810e39 1169 unsigned long shlink;
252b5132
RH
1170 bfd_byte *extdyn, *extdynend;
1171 size_t extdynsize;
217aa764 1172 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1173
1174 fprintf (f, _("\nDynamic Section:\n"));
1175
eea6121a 1176 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1177 goto error_return;
1178
1179 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1180 if (elfsec == -1)
1181 goto error_return;
dc810e39 1182 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1183
1184 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1185 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1186
1187 extdyn = dynbuf;
eea6121a 1188 extdynend = extdyn + s->size;
252b5132
RH
1189 for (; extdyn < extdynend; extdyn += extdynsize)
1190 {
1191 Elf_Internal_Dyn dyn;
1192 const char *name;
1193 char ab[20];
b34976b6 1194 bfd_boolean stringp;
252b5132 1195
217aa764 1196 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1197
1198 if (dyn.d_tag == DT_NULL)
1199 break;
1200
b34976b6 1201 stringp = FALSE;
252b5132
RH
1202 switch (dyn.d_tag)
1203 {
1204 default:
1205 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1206 name = ab;
1207 break;
1208
b34976b6 1209 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1210 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1211 case DT_PLTGOT: name = "PLTGOT"; break;
1212 case DT_HASH: name = "HASH"; break;
1213 case DT_STRTAB: name = "STRTAB"; break;
1214 case DT_SYMTAB: name = "SYMTAB"; break;
1215 case DT_RELA: name = "RELA"; break;
1216 case DT_RELASZ: name = "RELASZ"; break;
1217 case DT_RELAENT: name = "RELAENT"; break;
1218 case DT_STRSZ: name = "STRSZ"; break;
1219 case DT_SYMENT: name = "SYMENT"; break;
1220 case DT_INIT: name = "INIT"; break;
1221 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1222 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1223 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1224 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1225 case DT_REL: name = "REL"; break;
1226 case DT_RELSZ: name = "RELSZ"; break;
1227 case DT_RELENT: name = "RELENT"; break;
1228 case DT_PLTREL: name = "PLTREL"; break;
1229 case DT_DEBUG: name = "DEBUG"; break;
1230 case DT_TEXTREL: name = "TEXTREL"; break;
1231 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1232 case DT_BIND_NOW: name = "BIND_NOW"; break;
1233 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1234 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1235 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1236 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1237 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1238 case DT_FLAGS: name = "FLAGS"; break;
1239 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1240 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1241 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1242 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1243 case DT_MOVEENT: name = "MOVEENT"; break;
1244 case DT_MOVESZ: name = "MOVESZ"; break;
1245 case DT_FEATURE: name = "FEATURE"; break;
1246 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1247 case DT_SYMINSZ: name = "SYMINSZ"; break;
1248 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1249 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1250 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1251 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1252 case DT_PLTPAD: name = "PLTPAD"; break;
1253 case DT_MOVETAB: name = "MOVETAB"; break;
1254 case DT_SYMINFO: name = "SYMINFO"; break;
1255 case DT_RELACOUNT: name = "RELACOUNT"; break;
1256 case DT_RELCOUNT: name = "RELCOUNT"; break;
1257 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1258 case DT_VERSYM: name = "VERSYM"; break;
1259 case DT_VERDEF: name = "VERDEF"; break;
1260 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1261 case DT_VERNEED: name = "VERNEED"; break;
1262 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1263 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1264 case DT_USED: name = "USED"; break;
b34976b6 1265 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1266 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1267 }
1268
1269 fprintf (f, " %-11s ", name);
1270 if (! stringp)
1271 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1272 else
1273 {
1274 const char *string;
dc810e39 1275 unsigned int tagv = dyn.d_un.d_val;
252b5132 1276
dc810e39 1277 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1278 if (string == NULL)
1279 goto error_return;
1280 fprintf (f, "%s", string);
1281 }
1282 fprintf (f, "\n");
1283 }
1284
1285 free (dynbuf);
1286 dynbuf = NULL;
1287 }
1288
1289 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1290 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1291 {
fc0e6df6 1292 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1293 return FALSE;
252b5132
RH
1294 }
1295
1296 if (elf_dynverdef (abfd) != 0)
1297 {
1298 Elf_Internal_Verdef *t;
1299
1300 fprintf (f, _("\nVersion definitions:\n"));
1301 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1302 {
1303 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1304 t->vd_flags, t->vd_hash,
1305 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1306 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1307 {
1308 Elf_Internal_Verdaux *a;
1309
1310 fprintf (f, "\t");
1311 for (a = t->vd_auxptr->vda_nextptr;
1312 a != NULL;
1313 a = a->vda_nextptr)
d0fb9a8d
JJ
1314 fprintf (f, "%s ",
1315 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1316 fprintf (f, "\n");
1317 }
1318 }
1319 }
1320
1321 if (elf_dynverref (abfd) != 0)
1322 {
1323 Elf_Internal_Verneed *t;
1324
1325 fprintf (f, _("\nVersion References:\n"));
1326 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1327 {
1328 Elf_Internal_Vernaux *a;
1329
d0fb9a8d
JJ
1330 fprintf (f, _(" required from %s:\n"),
1331 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1332 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1333 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1334 a->vna_flags, a->vna_other,
1335 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1336 }
1337 }
1338
b34976b6 1339 return TRUE;
252b5132
RH
1340
1341 error_return:
1342 if (dynbuf != NULL)
1343 free (dynbuf);
b34976b6 1344 return FALSE;
252b5132
RH
1345}
1346
1347/* Display ELF-specific fields of a symbol. */
1348
1349void
217aa764
AM
1350bfd_elf_print_symbol (bfd *abfd,
1351 void *filep,
1352 asymbol *symbol,
1353 bfd_print_symbol_type how)
252b5132 1354{
217aa764 1355 FILE *file = filep;
252b5132
RH
1356 switch (how)
1357 {
1358 case bfd_print_symbol_name:
1359 fprintf (file, "%s", symbol->name);
1360 break;
1361 case bfd_print_symbol_more:
1362 fprintf (file, "elf ");
60b89a18 1363 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1364 fprintf (file, " %lx", (long) symbol->flags);
1365 break;
1366 case bfd_print_symbol_all:
1367 {
4e8a9624
AM
1368 const char *section_name;
1369 const char *name = NULL;
9c5bfbb7 1370 const struct elf_backend_data *bed;
7a13edea 1371 unsigned char st_other;
dbb410c3 1372 bfd_vma val;
c044fabd 1373
252b5132 1374 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1375
1376 bed = get_elf_backend_data (abfd);
1377 if (bed->elf_backend_print_symbol_all)
c044fabd 1378 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1379
1380 if (name == NULL)
1381 {
7ee38065 1382 name = symbol->name;
217aa764 1383 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1384 }
1385
252b5132
RH
1386 fprintf (file, " %s\t", section_name);
1387 /* Print the "other" value for a symbol. For common symbols,
1388 we've already printed the size; now print the alignment.
1389 For other symbols, we have no specified alignment, and
1390 we've printed the address; now print the size. */
dbb410c3
AM
1391 if (bfd_is_com_section (symbol->section))
1392 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1393 else
1394 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1395 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1396
1397 /* If we have version information, print it. */
1398 if (elf_tdata (abfd)->dynversym_section != 0
1399 && (elf_tdata (abfd)->dynverdef_section != 0
1400 || elf_tdata (abfd)->dynverref_section != 0))
1401 {
1402 unsigned int vernum;
1403 const char *version_string;
1404
1405 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1406
1407 if (vernum == 0)
1408 version_string = "";
1409 else if (vernum == 1)
1410 version_string = "Base";
1411 else if (vernum <= elf_tdata (abfd)->cverdefs)
1412 version_string =
1413 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1414 else
1415 {
1416 Elf_Internal_Verneed *t;
1417
1418 version_string = "";
1419 for (t = elf_tdata (abfd)->verref;
1420 t != NULL;
1421 t = t->vn_nextref)
1422 {
1423 Elf_Internal_Vernaux *a;
1424
1425 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1426 {
1427 if (a->vna_other == vernum)
1428 {
1429 version_string = a->vna_nodename;
1430 break;
1431 }
1432 }
1433 }
1434 }
1435
1436 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1437 fprintf (file, " %-11s", version_string);
1438 else
1439 {
1440 int i;
1441
1442 fprintf (file, " (%s)", version_string);
1443 for (i = 10 - strlen (version_string); i > 0; --i)
1444 putc (' ', file);
1445 }
1446 }
1447
1448 /* If the st_other field is not zero, print it. */
7a13edea 1449 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1450
7a13edea
NC
1451 switch (st_other)
1452 {
1453 case 0: break;
1454 case STV_INTERNAL: fprintf (file, " .internal"); break;
1455 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1456 case STV_PROTECTED: fprintf (file, " .protected"); break;
1457 default:
1458 /* Some other non-defined flags are also present, so print
1459 everything hex. */
1460 fprintf (file, " 0x%02x", (unsigned int) st_other);
1461 }
252b5132 1462
587ff49e 1463 fprintf (file, " %s", name);
252b5132
RH
1464 }
1465 break;
1466 }
1467}
1468\f
1469/* Create an entry in an ELF linker hash table. */
1470
1471struct bfd_hash_entry *
217aa764
AM
1472_bfd_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
1473 struct bfd_hash_table *table,
1474 const char *string)
252b5132 1475{
252b5132
RH
1476 /* Allocate the structure if it has not already been allocated by a
1477 subclass. */
51b64d56
AM
1478 if (entry == NULL)
1479 {
1480 entry = bfd_hash_allocate (table, sizeof (struct elf_link_hash_entry));
1481 if (entry == NULL)
1482 return entry;
1483 }
252b5132
RH
1484
1485 /* Call the allocation method of the superclass. */
51b64d56
AM
1486 entry = _bfd_link_hash_newfunc (entry, table, string);
1487 if (entry != NULL)
252b5132 1488 {
51b64d56
AM
1489 struct elf_link_hash_entry *ret = (struct elf_link_hash_entry *) entry;
1490 struct elf_link_hash_table *htab = (struct elf_link_hash_table *) table;
1491
252b5132
RH
1492 /* Set local fields. */
1493 ret->indx = -1;
252b5132 1494 ret->dynindx = -1;
a6aa5195
AM
1495 ret->got = htab->init_got_refcount;
1496 ret->plt = htab->init_plt_refcount;
f6e332e6
AM
1497 memset (&ret->size, 0, (sizeof (struct elf_link_hash_entry)
1498 - offsetof (struct elf_link_hash_entry, size)));
252b5132
RH
1499 /* Assume that we have been called by a non-ELF symbol reader.
1500 This flag is then reset by the code which reads an ELF input
1501 file. This ensures that a symbol created by a non-ELF symbol
1502 reader will have the flag set correctly. */
f5385ebf 1503 ret->non_elf = 1;
252b5132
RH
1504 }
1505
51b64d56 1506 return entry;
252b5132
RH
1507}
1508
2920b85c 1509/* Copy data from an indirect symbol to its direct symbol, hiding the
0a991dfe 1510 old indirect symbol. Also used for copying flags to a weakdef. */
2920b85c 1511
c61b8717 1512void
fcfa13d2 1513_bfd_elf_link_hash_copy_indirect (struct bfd_link_info *info,
217aa764
AM
1514 struct elf_link_hash_entry *dir,
1515 struct elf_link_hash_entry *ind)
2920b85c 1516{
fcfa13d2 1517 struct elf_link_hash_table *htab;
3c3e9281 1518
2920b85c
RH
1519 /* Copy down any references that we may have already seen to the
1520 symbol which just became indirect. */
1521
f5385ebf
AM
1522 dir->ref_dynamic |= ind->ref_dynamic;
1523 dir->ref_regular |= ind->ref_regular;
1524 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
1525 dir->non_got_ref |= ind->non_got_ref;
1526 dir->needs_plt |= ind->needs_plt;
1527 dir->pointer_equality_needed |= ind->pointer_equality_needed;
2920b85c 1528
1e370bd2 1529 if (ind->root.type != bfd_link_hash_indirect)
0a991dfe
AM
1530 return;
1531
51b64d56 1532 /* Copy over the global and procedure linkage table refcount entries.
2920b85c 1533 These may have been already set up by a check_relocs routine. */
fcfa13d2
AM
1534 htab = elf_hash_table (info);
1535 if (ind->got.refcount > htab->init_got_refcount.refcount)
2920b85c 1536 {
fcfa13d2
AM
1537 if (dir->got.refcount < 0)
1538 dir->got.refcount = 0;
1539 dir->got.refcount += ind->got.refcount;
1540 ind->got.refcount = htab->init_got_refcount.refcount;
2920b85c 1541 }
2920b85c 1542
fcfa13d2 1543 if (ind->plt.refcount > htab->init_plt_refcount.refcount)
2920b85c 1544 {
fcfa13d2
AM
1545 if (dir->plt.refcount < 0)
1546 dir->plt.refcount = 0;
1547 dir->plt.refcount += ind->plt.refcount;
1548 ind->plt.refcount = htab->init_plt_refcount.refcount;
2920b85c 1549 }
2920b85c 1550
fcfa13d2 1551 if (ind->dynindx != -1)
2920b85c 1552 {
fcfa13d2
AM
1553 if (dir->dynindx != -1)
1554 _bfd_elf_strtab_delref (htab->dynstr, dir->dynstr_index);
2920b85c
RH
1555 dir->dynindx = ind->dynindx;
1556 dir->dynstr_index = ind->dynstr_index;
1557 ind->dynindx = -1;
1558 ind->dynstr_index = 0;
1559 }
2920b85c
RH
1560}
1561
c61b8717 1562void
217aa764
AM
1563_bfd_elf_link_hash_hide_symbol (struct bfd_link_info *info,
1564 struct elf_link_hash_entry *h,
1565 bfd_boolean force_local)
2920b85c 1566{
a6aa5195 1567 h->plt = elf_hash_table (info)->init_plt_offset;
f5385ebf 1568 h->needs_plt = 0;
e5094212
AM
1569 if (force_local)
1570 {
f5385ebf 1571 h->forced_local = 1;
e5094212
AM
1572 if (h->dynindx != -1)
1573 {
1574 h->dynindx = -1;
1575 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1576 h->dynstr_index);
1577 }
1578 }
2920b85c
RH
1579}
1580
252b5132
RH
1581/* Initialize an ELF linker hash table. */
1582
b34976b6 1583bfd_boolean
217aa764
AM
1584_bfd_elf_link_hash_table_init
1585 (struct elf_link_hash_table *table,
1586 bfd *abfd,
1587 struct bfd_hash_entry *(*newfunc) (struct bfd_hash_entry *,
1588 struct bfd_hash_table *,
66eb6687
AM
1589 const char *),
1590 unsigned int entsize)
252b5132 1591{
b34976b6 1592 bfd_boolean ret;
a6aa5195 1593 int can_refcount = get_elf_backend_data (abfd)->can_refcount;
8ea2e4bd 1594
b34976b6 1595 table->dynamic_sections_created = FALSE;
252b5132 1596 table->dynobj = NULL;
a6aa5195
AM
1597 table->init_got_refcount.refcount = can_refcount - 1;
1598 table->init_plt_refcount.refcount = can_refcount - 1;
1599 table->init_got_offset.offset = -(bfd_vma) 1;
1600 table->init_plt_offset.offset = -(bfd_vma) 1;
252b5132
RH
1601 /* The first dynamic symbol is a dummy. */
1602 table->dynsymcount = 1;
1603 table->dynstr = NULL;
1604 table->bucketcount = 0;
1605 table->needed = NULL;
1606 table->hgot = NULL;
ed66ec07 1607 table->hplt = NULL;
f5fa8ca2 1608 table->merge_info = NULL;
3722b82f 1609 memset (&table->stab_info, 0, sizeof (table->stab_info));
73722af0 1610 memset (&table->eh_info, 0, sizeof (table->eh_info));
1ae00f9d 1611 table->dynlocal = NULL;
73722af0 1612 table->runpath = NULL;
e1918d23
AM
1613 table->tls_sec = NULL;
1614 table->tls_size = 0;
73722af0 1615 table->loaded = NULL;
67687978 1616 table->is_relocatable_executable = FALSE;
73722af0 1617
66eb6687 1618 ret = _bfd_link_hash_table_init (&table->root, abfd, newfunc, entsize);
8ea2e4bd
NC
1619 table->root.type = bfd_link_elf_hash_table;
1620
1621 return ret;
252b5132
RH
1622}
1623
1624/* Create an ELF linker hash table. */
1625
1626struct bfd_link_hash_table *
217aa764 1627_bfd_elf_link_hash_table_create (bfd *abfd)
252b5132
RH
1628{
1629 struct elf_link_hash_table *ret;
dc810e39 1630 bfd_size_type amt = sizeof (struct elf_link_hash_table);
252b5132 1631
217aa764
AM
1632 ret = bfd_malloc (amt);
1633 if (ret == NULL)
252b5132
RH
1634 return NULL;
1635
66eb6687
AM
1636 if (! _bfd_elf_link_hash_table_init (ret, abfd, _bfd_elf_link_hash_newfunc,
1637 sizeof (struct elf_link_hash_entry)))
252b5132 1638 {
e2d34d7d 1639 free (ret);
252b5132
RH
1640 return NULL;
1641 }
1642
1643 return &ret->root;
1644}
1645
1646/* This is a hook for the ELF emulation code in the generic linker to
1647 tell the backend linker what file name to use for the DT_NEEDED
4a43e768 1648 entry for a dynamic object. */
252b5132
RH
1649
1650void
217aa764 1651bfd_elf_set_dt_needed_name (bfd *abfd, const char *name)
252b5132
RH
1652{
1653 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1654 && bfd_get_format (abfd) == bfd_object)
1655 elf_dt_name (abfd) = name;
1656}
1657
e56f61be
L
1658int
1659bfd_elf_get_dyn_lib_class (bfd *abfd)
1660{
1661 int lib_class;
1662 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1663 && bfd_get_format (abfd) == bfd_object)
1664 lib_class = elf_dyn_lib_class (abfd);
1665 else
1666 lib_class = 0;
1667 return lib_class;
1668}
1669
74816898 1670void
4a43e768 1671bfd_elf_set_dyn_lib_class (bfd *abfd, int lib_class)
74816898
L
1672{
1673 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1674 && bfd_get_format (abfd) == bfd_object)
4a43e768 1675 elf_dyn_lib_class (abfd) = lib_class;
74816898
L
1676}
1677
252b5132
RH
1678/* Get the list of DT_NEEDED entries for a link. This is a hook for
1679 the linker ELF emulation code. */
1680
1681struct bfd_link_needed_list *
217aa764
AM
1682bfd_elf_get_needed_list (bfd *abfd ATTRIBUTE_UNUSED,
1683 struct bfd_link_info *info)
252b5132 1684{
0eddce27 1685 if (! is_elf_hash_table (info->hash))
252b5132
RH
1686 return NULL;
1687 return elf_hash_table (info)->needed;
1688}
1689
a963dc6a
L
1690/* Get the list of DT_RPATH/DT_RUNPATH entries for a link. This is a
1691 hook for the linker ELF emulation code. */
1692
1693struct bfd_link_needed_list *
217aa764
AM
1694bfd_elf_get_runpath_list (bfd *abfd ATTRIBUTE_UNUSED,
1695 struct bfd_link_info *info)
a963dc6a 1696{
0eddce27 1697 if (! is_elf_hash_table (info->hash))
a963dc6a
L
1698 return NULL;
1699 return elf_hash_table (info)->runpath;
1700}
1701
252b5132
RH
1702/* Get the name actually used for a dynamic object for a link. This
1703 is the SONAME entry if there is one. Otherwise, it is the string
1704 passed to bfd_elf_set_dt_needed_name, or it is the filename. */
1705
1706const char *
217aa764 1707bfd_elf_get_dt_soname (bfd *abfd)
252b5132
RH
1708{
1709 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour
1710 && bfd_get_format (abfd) == bfd_object)
1711 return elf_dt_name (abfd);
1712 return NULL;
1713}
1714
1715/* Get the list of DT_NEEDED entries from a BFD. This is a hook for
1716 the ELF linker emulation code. */
1717
b34976b6 1718bfd_boolean
217aa764
AM
1719bfd_elf_get_bfd_needed_list (bfd *abfd,
1720 struct bfd_link_needed_list **pneeded)
252b5132
RH
1721{
1722 asection *s;
1723 bfd_byte *dynbuf = NULL;
1724 int elfsec;
dc810e39 1725 unsigned long shlink;
252b5132
RH
1726 bfd_byte *extdyn, *extdynend;
1727 size_t extdynsize;
217aa764 1728 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1729
1730 *pneeded = NULL;
1731
1732 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour
1733 || bfd_get_format (abfd) != bfd_object)
b34976b6 1734 return TRUE;
252b5132
RH
1735
1736 s = bfd_get_section_by_name (abfd, ".dynamic");
eea6121a 1737 if (s == NULL || s->size == 0)
b34976b6 1738 return TRUE;
252b5132 1739
eea6121a 1740 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1741 goto error_return;
1742
1743 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1744 if (elfsec == -1)
1745 goto error_return;
1746
dc810e39 1747 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1748
1749 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1750 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1751
1752 extdyn = dynbuf;
eea6121a 1753 extdynend = extdyn + s->size;
252b5132
RH
1754 for (; extdyn < extdynend; extdyn += extdynsize)
1755 {
1756 Elf_Internal_Dyn dyn;
1757
217aa764 1758 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1759
1760 if (dyn.d_tag == DT_NULL)
1761 break;
1762
1763 if (dyn.d_tag == DT_NEEDED)
1764 {
1765 const char *string;
1766 struct bfd_link_needed_list *l;
dc810e39
AM
1767 unsigned int tagv = dyn.d_un.d_val;
1768 bfd_size_type amt;
252b5132 1769
dc810e39 1770 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1771 if (string == NULL)
1772 goto error_return;
1773
dc810e39 1774 amt = sizeof *l;
217aa764 1775 l = bfd_alloc (abfd, amt);
252b5132
RH
1776 if (l == NULL)
1777 goto error_return;
1778
1779 l->by = abfd;
1780 l->name = string;
1781 l->next = *pneeded;
1782 *pneeded = l;
1783 }
1784 }
1785
1786 free (dynbuf);
1787
b34976b6 1788 return TRUE;
252b5132
RH
1789
1790 error_return:
1791 if (dynbuf != NULL)
1792 free (dynbuf);
b34976b6 1793 return FALSE;
252b5132
RH
1794}
1795\f
1796/* Allocate an ELF string table--force the first byte to be zero. */
1797
1798struct bfd_strtab_hash *
217aa764 1799_bfd_elf_stringtab_init (void)
252b5132
RH
1800{
1801 struct bfd_strtab_hash *ret;
1802
1803 ret = _bfd_stringtab_init ();
1804 if (ret != NULL)
1805 {
1806 bfd_size_type loc;
1807
b34976b6 1808 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1809 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1810 if (loc == (bfd_size_type) -1)
1811 {
1812 _bfd_stringtab_free (ret);
1813 ret = NULL;
1814 }
1815 }
1816 return ret;
1817}
1818\f
1819/* ELF .o/exec file reading */
1820
c044fabd 1821/* Create a new bfd section from an ELF section header. */
252b5132 1822
b34976b6 1823bfd_boolean
217aa764 1824bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1825{
1826 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1827 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1828 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1829 const char *name;
252b5132 1830
1b3a8575
AM
1831 name = bfd_elf_string_from_elf_section (abfd,
1832 elf_elfheader (abfd)->e_shstrndx,
1833 hdr->sh_name);
933d961a
JJ
1834 if (name == NULL)
1835 return FALSE;
252b5132
RH
1836
1837 switch (hdr->sh_type)
1838 {
1839 case SHT_NULL:
1840 /* Inactive section. Throw it away. */
b34976b6 1841 return TRUE;
252b5132
RH
1842
1843 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1844 case SHT_NOBITS: /* .bss section. */
1845 case SHT_HASH: /* .hash section. */
1846 case SHT_NOTE: /* .note section. */
25e27870
L
1847 case SHT_INIT_ARRAY: /* .init_array section. */
1848 case SHT_FINI_ARRAY: /* .fini_array section. */
1849 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1850 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1851 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1852 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1853
797fc050 1854 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1855 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1856 return FALSE;
8e0ed13f
NC
1857 if (hdr->sh_link > elf_numsections (abfd)
1858 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1859 return FALSE;
797fc050
AM
1860 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1861 {
1862 Elf_Internal_Shdr *dynsymhdr;
1863
1864 /* The shared libraries distributed with hpux11 have a bogus
1865 sh_link field for the ".dynamic" section. Find the
1866 string table for the ".dynsym" section instead. */
1867 if (elf_dynsymtab (abfd) != 0)
1868 {
1869 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1870 hdr->sh_link = dynsymhdr->sh_link;
1871 }
1872 else
1873 {
1874 unsigned int i, num_sec;
1875
1876 num_sec = elf_numsections (abfd);
1877 for (i = 1; i < num_sec; i++)
1878 {
1879 dynsymhdr = elf_elfsections (abfd)[i];
1880 if (dynsymhdr->sh_type == SHT_DYNSYM)
1881 {
1882 hdr->sh_link = dynsymhdr->sh_link;
1883 break;
1884 }
1885 }
1886 }
1887 }
1888 break;
1889
252b5132
RH
1890 case SHT_SYMTAB: /* A symbol table */
1891 if (elf_onesymtab (abfd) == shindex)
b34976b6 1892 return TRUE;
252b5132 1893
a50b2160
JJ
1894 if (hdr->sh_entsize != bed->s->sizeof_sym)
1895 return FALSE;
252b5132
RH
1896 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1897 elf_onesymtab (abfd) = shindex;
1898 elf_tdata (abfd)->symtab_hdr = *hdr;
1899 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1900 abfd->flags |= HAS_SYMS;
1901
1902 /* Sometimes a shared object will map in the symbol table. If
1903 SHF_ALLOC is set, and this is a shared object, then we also
1904 treat this section as a BFD section. We can not base the
1905 decision purely on SHF_ALLOC, because that flag is sometimes
1049f94e 1906 set in a relocatable object file, which would confuse the
252b5132
RH
1907 linker. */
1908 if ((hdr->sh_flags & SHF_ALLOC) != 0
1909 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1910 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1911 shindex))
b34976b6 1912 return FALSE;
252b5132 1913
1b3a8575
AM
1914 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1915 can't read symbols without that section loaded as well. It
1916 is most likely specified by the next section header. */
1917 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1918 {
1919 unsigned int i, num_sec;
1920
1921 num_sec = elf_numsections (abfd);
1922 for (i = shindex + 1; i < num_sec; i++)
1923 {
1924 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1925 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1926 && hdr2->sh_link == shindex)
1927 break;
1928 }
1929 if (i == num_sec)
1930 for (i = 1; i < shindex; i++)
1931 {
1932 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1933 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1934 && hdr2->sh_link == shindex)
1935 break;
1936 }
1937 if (i != shindex)
1938 return bfd_section_from_shdr (abfd, i);
1939 }
b34976b6 1940 return TRUE;
252b5132
RH
1941
1942 case SHT_DYNSYM: /* A dynamic symbol table */
1943 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1944 return TRUE;
252b5132 1945
a50b2160
JJ
1946 if (hdr->sh_entsize != bed->s->sizeof_sym)
1947 return FALSE;
252b5132
RH
1948 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1949 elf_dynsymtab (abfd) = shindex;
1950 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1951 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1952 abfd->flags |= HAS_SYMS;
1953
1954 /* Besides being a symbol table, we also treat this as a regular
1955 section, so that objcopy can handle it. */
6dc132d9 1956 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1957
9ad5cbcf
AM
1958 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1959 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1960 return TRUE;
9ad5cbcf 1961
1b3a8575 1962 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1963 elf_symtab_shndx (abfd) = shindex;
1964 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1965 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1966 return TRUE;
9ad5cbcf 1967
252b5132
RH
1968 case SHT_STRTAB: /* A string table */
1969 if (hdr->bfd_section != NULL)
b34976b6 1970 return TRUE;
252b5132
RH
1971 if (ehdr->e_shstrndx == shindex)
1972 {
1973 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1974 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1975 return TRUE;
252b5132 1976 }
1b3a8575
AM
1977 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1978 {
1979 symtab_strtab:
1980 elf_tdata (abfd)->strtab_hdr = *hdr;
1981 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1982 return TRUE;
1983 }
1984 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1985 {
1986 dynsymtab_strtab:
1987 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1988 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1989 elf_elfsections (abfd)[shindex] = hdr;
1990 /* We also treat this as a regular section, so that objcopy
1991 can handle it. */
6dc132d9
L
1992 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1993 shindex);
1b3a8575 1994 }
252b5132 1995
1b3a8575
AM
1996 /* If the string table isn't one of the above, then treat it as a
1997 regular section. We need to scan all the headers to be sure,
1998 just in case this strtab section appeared before the above. */
1999 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2000 {
2001 unsigned int i, num_sec;
252b5132 2002
1b3a8575
AM
2003 num_sec = elf_numsections (abfd);
2004 for (i = 1; i < num_sec; i++)
2005 {
2006 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2007 if (hdr2->sh_link == shindex)
2008 {
933d961a
JJ
2009 /* Prevent endless recursion on broken objects. */
2010 if (i == shindex)
2011 return FALSE;
1b3a8575
AM
2012 if (! bfd_section_from_shdr (abfd, i))
2013 return FALSE;
2014 if (elf_onesymtab (abfd) == i)
2015 goto symtab_strtab;
2016 if (elf_dynsymtab (abfd) == i)
2017 goto dynsymtab_strtab;
2018 }
2019 }
2020 }
6dc132d9 2021 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2022
2023 case SHT_REL:
2024 case SHT_RELA:
2025 /* *These* do a lot of work -- but build no sections! */
2026 {
2027 asection *target_sect;
2028 Elf_Internal_Shdr *hdr2;
9ad5cbcf 2029 unsigned int num_sec = elf_numsections (abfd);
252b5132 2030
aa2ca951
JJ
2031 if (hdr->sh_entsize
2032 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
2033 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2034 return FALSE;
2035
03ae5f59 2036 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
2037 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
2038 || hdr->sh_link >= num_sec)
03ae5f59
ILT
2039 {
2040 ((*_bfd_error_handler)
d003868e
AM
2041 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2042 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
2043 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2044 shindex);
03ae5f59
ILT
2045 }
2046
252b5132
RH
2047 /* For some incomprehensible reason Oracle distributes
2048 libraries for Solaris in which some of the objects have
2049 bogus sh_link fields. It would be nice if we could just
2050 reject them, but, unfortunately, some people need to use
2051 them. We scan through the section headers; if we find only
2052 one suitable symbol table, we clobber the sh_link to point
2053 to it. I hope this doesn't break anything. */
2054 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2055 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2056 {
9ad5cbcf 2057 unsigned int scan;
252b5132
RH
2058 int found;
2059
2060 found = 0;
9ad5cbcf 2061 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2062 {
2063 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2064 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2065 {
2066 if (found != 0)
2067 {
2068 found = 0;
2069 break;
2070 }
2071 found = scan;
2072 }
2073 }
2074 if (found != 0)
2075 hdr->sh_link = found;
2076 }
2077
2078 /* Get the symbol table. */
1b3a8575
AM
2079 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2080 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2081 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 2082 return FALSE;
252b5132
RH
2083
2084 /* If this reloc section does not use the main symbol table we
2085 don't treat it as a reloc section. BFD can't adequately
2086 represent such a section, so at least for now, we don't
c044fabd 2087 try. We just present it as a normal section. We also
60bcf0fa 2088 can't use it as a reloc section if it points to the null
185ef66d
AM
2089 section, an invalid section, or another reloc section. */
2090 if (hdr->sh_link != elf_onesymtab (abfd)
2091 || hdr->sh_info == SHN_UNDEF
2092 || (hdr->sh_info >= SHN_LORESERVE && hdr->sh_info <= SHN_HIRESERVE)
2093 || hdr->sh_info >= num_sec
2094 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2095 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
2096 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2097 shindex);
252b5132
RH
2098
2099 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 2100 return FALSE;
252b5132
RH
2101 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2102 if (target_sect == NULL)
b34976b6 2103 return FALSE;
252b5132
RH
2104
2105 if ((target_sect->flags & SEC_RELOC) == 0
2106 || target_sect->reloc_count == 0)
2107 hdr2 = &elf_section_data (target_sect)->rel_hdr;
2108 else
2109 {
dc810e39 2110 bfd_size_type amt;
252b5132 2111 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 2112 amt = sizeof (*hdr2);
217aa764 2113 hdr2 = bfd_alloc (abfd, amt);
252b5132
RH
2114 elf_section_data (target_sect)->rel_hdr2 = hdr2;
2115 }
2116 *hdr2 = *hdr;
2117 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2118 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2119 target_sect->flags |= SEC_RELOC;
2120 target_sect->relocation = NULL;
2121 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2122 /* In the section to which the relocations apply, mark whether
2123 its relocations are of the REL or RELA variety. */
72730e0c 2124 if (hdr->sh_size != 0)
68bfbfcc 2125 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 2126 abfd->flags |= HAS_RELOC;
b34976b6 2127 return TRUE;
252b5132
RH
2128 }
2129 break;
2130
2131 case SHT_GNU_verdef:
2132 elf_dynverdef (abfd) = shindex;
2133 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 2134 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2135 break;
2136
2137 case SHT_GNU_versym:
a50b2160
JJ
2138 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2139 return FALSE;
252b5132
RH
2140 elf_dynversym (abfd) = shindex;
2141 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 2142 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2143
2144 case SHT_GNU_verneed:
2145 elf_dynverref (abfd) = shindex;
2146 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 2147 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
2148
2149 case SHT_SHLIB:
b34976b6 2150 return TRUE;
252b5132 2151
dbb410c3 2152 case SHT_GROUP:
b885599b
AM
2153 /* We need a BFD section for objcopy and relocatable linking,
2154 and it's handy to have the signature available as the section
2155 name. */
a50b2160
JJ
2156 if (hdr->sh_entsize != GRP_ENTRY_SIZE)
2157 return FALSE;
b885599b
AM
2158 name = group_signature (abfd, hdr);
2159 if (name == NULL)
b34976b6 2160 return FALSE;
6dc132d9 2161 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 2162 return FALSE;
dbb410c3
AM
2163 if (hdr->contents != NULL)
2164 {
2165 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
2166 unsigned int n_elt = hdr->sh_size / 4;
2167 asection *s;
2168
b885599b
AM
2169 if (idx->flags & GRP_COMDAT)
2170 hdr->bfd_section->flags
2171 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2172
45c5e9ed
L
2173 /* We try to keep the same section order as it comes in. */
2174 idx += n_elt;
dbb410c3 2175 while (--n_elt != 0)
45c5e9ed 2176 if ((s = (--idx)->shdr->bfd_section) != NULL
945906ff 2177 && elf_next_in_group (s) != NULL)
dbb410c3 2178 {
945906ff 2179 elf_next_in_group (hdr->bfd_section) = s;
dbb410c3
AM
2180 break;
2181 }
2182 }
2183 break;
2184
252b5132
RH
2185 default:
2186 /* Check for any processor-specific section types. */
3eb70a79
L
2187 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2188 return TRUE;
2189
2190 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2191 {
2192 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2193 /* FIXME: How to properly handle allocated section reserved
2194 for applications? */
2195 (*_bfd_error_handler)
2196 (_("%B: don't know how to handle allocated, application "
2197 "specific section `%s' [0x%8x]"),
2198 abfd, name, hdr->sh_type);
2199 else
2200 /* Allow sections reserved for applications. */
2201 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2202 shindex);
2203 }
2204 else if (hdr->sh_type >= SHT_LOPROC
2205 && hdr->sh_type <= SHT_HIPROC)
2206 /* FIXME: We should handle this section. */
2207 (*_bfd_error_handler)
2208 (_("%B: don't know how to handle processor specific section "
2209 "`%s' [0x%8x]"),
2210 abfd, name, hdr->sh_type);
2211 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2212 {
2213 /* Unrecognised OS-specific sections. */
2214 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2215 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2216 required to correctly process the section and the file should
2217 be rejected with an error message. */
2218 (*_bfd_error_handler)
2219 (_("%B: don't know how to handle OS specific section "
2220 "`%s' [0x%8x]"),
2221 abfd, name, hdr->sh_type);
2222 else
2223 /* Otherwise it should be processed. */
2224 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2225 }
3eb70a79
L
2226 else
2227 /* FIXME: We should handle this section. */
2228 (*_bfd_error_handler)
2229 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2230 abfd, name, hdr->sh_type);
2231
2232 return FALSE;
252b5132
RH
2233 }
2234
b34976b6 2235 return TRUE;
252b5132
RH
2236}
2237
ec338859
AM
2238/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
2239 Return SEC for sections that have no elf section, and NULL on error. */
2240
2241asection *
217aa764
AM
2242bfd_section_from_r_symndx (bfd *abfd,
2243 struct sym_sec_cache *cache,
2244 asection *sec,
2245 unsigned long r_symndx)
ec338859 2246{
ec338859 2247 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc
AM
2248 unsigned char esym[sizeof (Elf64_External_Sym)];
2249 Elf_External_Sym_Shndx eshndx;
2250 Elf_Internal_Sym isym;
ec338859
AM
2251 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2252
2253 if (cache->abfd == abfd && cache->indx[ent] == r_symndx)
2254 return cache->sec[ent];
2255
2256 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
2257 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2258 &isym, esym, &eshndx) == NULL)
ec338859 2259 return NULL;
9ad5cbcf 2260
ec338859
AM
2261 if (cache->abfd != abfd)
2262 {
2263 memset (cache->indx, -1, sizeof (cache->indx));
2264 cache->abfd = abfd;
2265 }
2266 cache->indx[ent] = r_symndx;
2267 cache->sec[ent] = sec;
50bc7936
AM
2268 if ((isym.st_shndx != SHN_UNDEF && isym.st_shndx < SHN_LORESERVE)
2269 || isym.st_shndx > SHN_HIRESERVE)
ec338859
AM
2270 {
2271 asection *s;
6cdc0ccc 2272 s = bfd_section_from_elf_index (abfd, isym.st_shndx);
ec338859
AM
2273 if (s != NULL)
2274 cache->sec[ent] = s;
2275 }
2276 return cache->sec[ent];
2277}
2278
252b5132
RH
2279/* Given an ELF section number, retrieve the corresponding BFD
2280 section. */
2281
2282asection *
217aa764 2283bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2284{
9ad5cbcf 2285 if (index >= elf_numsections (abfd))
252b5132
RH
2286 return NULL;
2287 return elf_elfsections (abfd)[index]->bfd_section;
2288}
2289
b35d266b 2290static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2291{
0112cd26
NC
2292 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2293 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2294};
2295
b35d266b 2296static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2297{
0112cd26
NC
2298 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2299 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2300};
2301
b35d266b 2302static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2303{
0112cd26
NC
2304 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2305 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2306 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2307 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2308 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2309 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2310 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2311 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2312 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2313 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2314 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2315};
2316
b35d266b 2317static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2318{
0112cd26
NC
2319 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2320 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2321 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2322};
2323
b35d266b 2324static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2325{
0112cd26
NC
2326 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2327 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2328 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2329 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2330 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2331 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2332 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2333 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2334 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2335};
2336
b35d266b 2337static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2338{
0112cd26
NC
2339 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2340 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2341};
2342
b35d266b 2343static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2344{
0112cd26
NC
2345 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2346 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2347 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2348 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2349};
2350
b35d266b 2351static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2352{
0112cd26
NC
2353 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2354 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2355};
2356
b35d266b 2357static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2358{
0112cd26
NC
2359 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2360 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2361 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2362};
2363
b35d266b 2364static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2365{
0112cd26
NC
2366 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2367 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2368 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2369};
2370
b35d266b 2371static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2372{
0112cd26
NC
2373 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2374 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2375 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2376 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2377 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2378};
2379
b35d266b 2380static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2381{
0112cd26
NC
2382 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2383 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2384 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2385 /* See struct bfd_elf_special_section declaration for the semantics of
2386 this special case where .prefix_length != strlen (.prefix). */
2387 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2388 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2389};
2390
b35d266b 2391static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2392{
0112cd26
NC
2393 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2394 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2395 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2396 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2397};
2398
b35d266b 2399static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2400{
7f4d3958
L
2401 special_sections_b, /* 'b' */
2402 special_sections_c, /* 'b' */
2403 special_sections_d, /* 'd' */
2404 NULL, /* 'e' */
2405 special_sections_f, /* 'f' */
2406 special_sections_g, /* 'g' */
2407 special_sections_h, /* 'h' */
2408 special_sections_i, /* 'i' */
2409 NULL, /* 'j' */
2410 NULL, /* 'k' */
2411 special_sections_l, /* 'l' */
2412 NULL, /* 'm' */
2413 special_sections_n, /* 'n' */
2414 NULL, /* 'o' */
2415 special_sections_p, /* 'p' */
2416 NULL, /* 'q' */
2417 special_sections_r, /* 'r' */
2418 special_sections_s, /* 's' */
2419 special_sections_t, /* 't' */
7f4d3958
L
2420};
2421
551b43fd
AM
2422const struct bfd_elf_special_section *
2423_bfd_elf_get_special_section (const char *name,
2424 const struct bfd_elf_special_section *spec,
2425 unsigned int rela)
2f89ff8d
L
2426{
2427 int i;
7f4d3958 2428 int len;
7f4d3958 2429
551b43fd 2430 len = strlen (name);
7f4d3958 2431
551b43fd 2432 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2433 {
2434 int suffix_len;
551b43fd 2435 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2436
2437 if (len < prefix_len)
2438 continue;
551b43fd 2439 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2440 continue;
2441
551b43fd 2442 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2443 if (suffix_len <= 0)
2444 {
2445 if (name[prefix_len] != 0)
2446 {
2447 if (suffix_len == 0)
2448 continue;
2449 if (name[prefix_len] != '.'
2450 && (suffix_len == -2
551b43fd 2451 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2452 continue;
2453 }
2454 }
2455 else
2456 {
2457 if (len < prefix_len + suffix_len)
2458 continue;
2459 if (memcmp (name + len - suffix_len,
551b43fd 2460 spec[i].prefix + prefix_len,
7dcb9820
AM
2461 suffix_len) != 0)
2462 continue;
2463 }
551b43fd 2464 return &spec[i];
7dcb9820 2465 }
2f89ff8d
L
2466
2467 return NULL;
2468}
2469
7dcb9820 2470const struct bfd_elf_special_section *
29ef7005 2471_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2472{
551b43fd
AM
2473 int i;
2474 const struct bfd_elf_special_section *spec;
29ef7005 2475 const struct elf_backend_data *bed;
2f89ff8d
L
2476
2477 /* See if this is one of the special sections. */
551b43fd
AM
2478 if (sec->name == NULL)
2479 return NULL;
2f89ff8d 2480
29ef7005
L
2481 bed = get_elf_backend_data (abfd);
2482 spec = bed->special_sections;
2483 if (spec)
2484 {
2485 spec = _bfd_elf_get_special_section (sec->name,
2486 bed->special_sections,
2487 sec->use_rela_p);
2488 if (spec != NULL)
2489 return spec;
2490 }
2491
551b43fd
AM
2492 if (sec->name[0] != '.')
2493 return NULL;
2f89ff8d 2494
551b43fd
AM
2495 i = sec->name[1] - 'b';
2496 if (i < 0 || i > 't' - 'b')
2497 return NULL;
2498
2499 spec = special_sections[i];
2f89ff8d 2500
551b43fd
AM
2501 if (spec == NULL)
2502 return NULL;
2503
2504 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2505}
2506
b34976b6 2507bfd_boolean
217aa764 2508_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2509{
2510 struct bfd_elf_section_data *sdata;
551b43fd 2511 const struct elf_backend_data *bed;
7dcb9820 2512 const struct bfd_elf_special_section *ssect;
252b5132 2513
f0abc2a1
AM
2514 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2515 if (sdata == NULL)
2516 {
217aa764 2517 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2518 if (sdata == NULL)
2519 return FALSE;
217aa764 2520 sec->used_by_bfd = sdata;
f0abc2a1 2521 }
bf572ba0 2522
551b43fd
AM
2523 /* Indicate whether or not this section should use RELA relocations. */
2524 bed = get_elf_backend_data (abfd);
2525 sec->use_rela_p = bed->default_use_rela_p;
2526
e843e0f8
L
2527 /* When we read a file, we don't need to set ELF section type and
2528 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2529 anyway. We will set ELF section type and flags for all linker
2530 created sections. If user specifies BFD section flags, we will
2531 set ELF section type and flags based on BFD section flags in
2532 elf_fake_sections. */
2533 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2534 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2535 {
551b43fd 2536 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2537 if (ssect != NULL)
2538 {
2539 elf_section_type (sec) = ssect->type;
2540 elf_section_flags (sec) = ssect->attr;
2541 }
2f89ff8d
L
2542 }
2543
f592407e 2544 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2545}
2546
2547/* Create a new bfd section from an ELF program header.
2548
2549 Since program segments have no names, we generate a synthetic name
2550 of the form segment<NUM>, where NUM is generally the index in the
2551 program header table. For segments that are split (see below) we
2552 generate the names segment<NUM>a and segment<NUM>b.
2553
2554 Note that some program segments may have a file size that is different than
2555 (less than) the memory size. All this means is that at execution the
2556 system must allocate the amount of memory specified by the memory size,
2557 but only initialize it with the first "file size" bytes read from the
2558 file. This would occur for example, with program segments consisting
2559 of combined data+bss.
2560
2561 To handle the above situation, this routine generates TWO bfd sections
2562 for the single program segment. The first has the length specified by
2563 the file size of the segment, and the second has the length specified
2564 by the difference between the two sizes. In effect, the segment is split
2565 into it's initialized and uninitialized parts.
2566
2567 */
2568
b34976b6 2569bfd_boolean
217aa764
AM
2570_bfd_elf_make_section_from_phdr (bfd *abfd,
2571 Elf_Internal_Phdr *hdr,
2572 int index,
2573 const char *typename)
252b5132
RH
2574{
2575 asection *newsect;
2576 char *name;
2577 char namebuf[64];
d4c88bbb 2578 size_t len;
252b5132
RH
2579 int split;
2580
2581 split = ((hdr->p_memsz > 0)
2582 && (hdr->p_filesz > 0)
2583 && (hdr->p_memsz > hdr->p_filesz));
27ac83bf 2584 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
d4c88bbb 2585 len = strlen (namebuf) + 1;
217aa764 2586 name = bfd_alloc (abfd, len);
252b5132 2587 if (!name)
b34976b6 2588 return FALSE;
d4c88bbb 2589 memcpy (name, namebuf, len);
252b5132
RH
2590 newsect = bfd_make_section (abfd, name);
2591 if (newsect == NULL)
b34976b6 2592 return FALSE;
252b5132
RH
2593 newsect->vma = hdr->p_vaddr;
2594 newsect->lma = hdr->p_paddr;
eea6121a 2595 newsect->size = hdr->p_filesz;
252b5132
RH
2596 newsect->filepos = hdr->p_offset;
2597 newsect->flags |= SEC_HAS_CONTENTS;
57e24cbf 2598 newsect->alignment_power = bfd_log2 (hdr->p_align);
252b5132
RH
2599 if (hdr->p_type == PT_LOAD)
2600 {
2601 newsect->flags |= SEC_ALLOC;
2602 newsect->flags |= SEC_LOAD;
2603 if (hdr->p_flags & PF_X)
2604 {
2605 /* FIXME: all we known is that it has execute PERMISSION,
c044fabd 2606 may be data. */
252b5132
RH
2607 newsect->flags |= SEC_CODE;
2608 }
2609 }
2610 if (!(hdr->p_flags & PF_W))
2611 {
2612 newsect->flags |= SEC_READONLY;
2613 }
2614
2615 if (split)
2616 {
27ac83bf 2617 sprintf (namebuf, "%s%db", typename, index);
d4c88bbb 2618 len = strlen (namebuf) + 1;
217aa764 2619 name = bfd_alloc (abfd, len);
252b5132 2620 if (!name)
b34976b6 2621 return FALSE;
d4c88bbb 2622 memcpy (name, namebuf, len);
252b5132
RH
2623 newsect = bfd_make_section (abfd, name);
2624 if (newsect == NULL)
b34976b6 2625 return FALSE;
252b5132
RH
2626 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2627 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2628 newsect->size = hdr->p_memsz - hdr->p_filesz;
252b5132
RH
2629 if (hdr->p_type == PT_LOAD)
2630 {
2631 newsect->flags |= SEC_ALLOC;
2632 if (hdr->p_flags & PF_X)
2633 newsect->flags |= SEC_CODE;
2634 }
2635 if (!(hdr->p_flags & PF_W))
2636 newsect->flags |= SEC_READONLY;
2637 }
2638
b34976b6 2639 return TRUE;
252b5132
RH
2640}
2641
b34976b6 2642bfd_boolean
217aa764 2643bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2644{
9c5bfbb7 2645 const struct elf_backend_data *bed;
20cfcaae
NC
2646
2647 switch (hdr->p_type)
2648 {
2649 case PT_NULL:
2650 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2651
2652 case PT_LOAD:
2653 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2654
2655 case PT_DYNAMIC:
2656 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2657
2658 case PT_INTERP:
2659 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2660
2661 case PT_NOTE:
2662 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2663 return FALSE;
217aa764 2664 if (! elfcore_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2665 return FALSE;
2666 return TRUE;
20cfcaae
NC
2667
2668 case PT_SHLIB:
2669 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2670
2671 case PT_PHDR:
2672 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2673
811072d8
RM
2674 case PT_GNU_EH_FRAME:
2675 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2676 "eh_frame_hdr");
2677
9ee5e499
JJ
2678 case PT_GNU_STACK:
2679 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
2680
8c37241b
JJ
2681 case PT_GNU_RELRO:
2682 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2683
20cfcaae 2684 default:
8c1acd09 2685 /* Check for any processor-specific program segment types. */
20cfcaae 2686 bed = get_elf_backend_data (abfd);
d27f5fa1 2687 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2688 }
2689}
2690
23bc299b 2691/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2692 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2693 relocations; otherwise, we use REL relocations. */
2694
b34976b6 2695bfd_boolean
217aa764
AM
2696_bfd_elf_init_reloc_shdr (bfd *abfd,
2697 Elf_Internal_Shdr *rel_hdr,
2698 asection *asect,
2699 bfd_boolean use_rela_p)
23bc299b
MM
2700{
2701 char *name;
9c5bfbb7 2702 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2703 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2704
dc810e39 2705 name = bfd_alloc (abfd, amt);
23bc299b 2706 if (name == NULL)
b34976b6 2707 return FALSE;
23bc299b
MM
2708 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2709 rel_hdr->sh_name =
2b0f7ef9 2710 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2711 FALSE);
23bc299b 2712 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2713 return FALSE;
23bc299b
MM
2714 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2715 rel_hdr->sh_entsize = (use_rela_p
2716 ? bed->s->sizeof_rela
2717 : bed->s->sizeof_rel);
45d6a902 2718 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2719 rel_hdr->sh_flags = 0;
2720 rel_hdr->sh_addr = 0;
2721 rel_hdr->sh_size = 0;
2722 rel_hdr->sh_offset = 0;
2723
b34976b6 2724 return TRUE;
23bc299b
MM
2725}
2726
252b5132
RH
2727/* Set up an ELF internal section header for a section. */
2728
252b5132 2729static void
217aa764 2730elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2731{
9c5bfbb7 2732 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2733 bfd_boolean *failedptr = failedptrarg;
252b5132
RH
2734 Elf_Internal_Shdr *this_hdr;
2735
2736 if (*failedptr)
2737 {
2738 /* We already failed; just get out of the bfd_map_over_sections
2739 loop. */
2740 return;
2741 }
2742
2743 this_hdr = &elf_section_data (asect)->this_hdr;
2744
e57b5356
AM
2745 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2746 asect->name, FALSE);
2747 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2748 {
b34976b6 2749 *failedptr = TRUE;
252b5132
RH
2750 return;
2751 }
2752
a4d8e49b 2753 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2754
2755 if ((asect->flags & SEC_ALLOC) != 0
2756 || asect->user_set_vma)
2757 this_hdr->sh_addr = asect->vma;
2758 else
2759 this_hdr->sh_addr = 0;
2760
2761 this_hdr->sh_offset = 0;
eea6121a 2762 this_hdr->sh_size = asect->size;
252b5132
RH
2763 this_hdr->sh_link = 0;
2764 this_hdr->sh_addralign = 1 << asect->alignment_power;
2765 /* The sh_entsize and sh_info fields may have been set already by
2766 copy_private_section_data. */
2767
2768 this_hdr->bfd_section = asect;
2769 this_hdr->contents = NULL;
2770
3cddba1e
L
2771 /* If the section type is unspecified, we set it based on
2772 asect->flags. */
2773 if (this_hdr->sh_type == SHT_NULL)
2774 {
45c5e9ed 2775 if ((asect->flags & SEC_GROUP) != 0)
ccd2ec6a 2776 this_hdr->sh_type = SHT_GROUP;
45c5e9ed 2777 else if ((asect->flags & SEC_ALLOC) != 0
1ea63fd2
AM
2778 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2779 || (asect->flags & SEC_NEVER_LOAD) != 0))
3cddba1e
L
2780 this_hdr->sh_type = SHT_NOBITS;
2781 else
2782 this_hdr->sh_type = SHT_PROGBITS;
2783 }
2784
2f89ff8d 2785 switch (this_hdr->sh_type)
252b5132 2786 {
2f89ff8d 2787 default:
2f89ff8d
L
2788 break;
2789
2790 case SHT_STRTAB:
2791 case SHT_INIT_ARRAY:
2792 case SHT_FINI_ARRAY:
2793 case SHT_PREINIT_ARRAY:
2794 case SHT_NOTE:
2795 case SHT_NOBITS:
2796 case SHT_PROGBITS:
2797 break;
2798
2799 case SHT_HASH:
c7ac6ff8 2800 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2801 break;
5de3bf90 2802
2f89ff8d 2803 case SHT_DYNSYM:
252b5132 2804 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2805 break;
2806
2807 case SHT_DYNAMIC:
252b5132 2808 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2809 break;
2810
2811 case SHT_RELA:
2812 if (get_elf_backend_data (abfd)->may_use_rela_p)
2813 this_hdr->sh_entsize = bed->s->sizeof_rela;
2814 break;
2815
2816 case SHT_REL:
2817 if (get_elf_backend_data (abfd)->may_use_rel_p)
2818 this_hdr->sh_entsize = bed->s->sizeof_rel;
2819 break;
2820
2821 case SHT_GNU_versym:
252b5132 2822 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2823 break;
2824
2825 case SHT_GNU_verdef:
252b5132
RH
2826 this_hdr->sh_entsize = 0;
2827 /* objcopy or strip will copy over sh_info, but may not set
2828 cverdefs. The linker will set cverdefs, but sh_info will be
2829 zero. */
2830 if (this_hdr->sh_info == 0)
2831 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2832 else
2833 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2834 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2835 break;
2836
2837 case SHT_GNU_verneed:
252b5132
RH
2838 this_hdr->sh_entsize = 0;
2839 /* objcopy or strip will copy over sh_info, but may not set
2840 cverrefs. The linker will set cverrefs, but sh_info will be
2841 zero. */
2842 if (this_hdr->sh_info == 0)
2843 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2844 else
2845 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2846 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2847 break;
2848
2849 case SHT_GROUP:
dbb410c3 2850 this_hdr->sh_entsize = 4;
2f89ff8d 2851 break;
fdc90cb4
JJ
2852
2853 case SHT_GNU_HASH:
2854 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2855 break;
dbb410c3 2856 }
252b5132
RH
2857
2858 if ((asect->flags & SEC_ALLOC) != 0)
2859 this_hdr->sh_flags |= SHF_ALLOC;
2860 if ((asect->flags & SEC_READONLY) == 0)
2861 this_hdr->sh_flags |= SHF_WRITE;
2862 if ((asect->flags & SEC_CODE) != 0)
2863 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2864 if ((asect->flags & SEC_MERGE) != 0)
2865 {
2866 this_hdr->sh_flags |= SHF_MERGE;
2867 this_hdr->sh_entsize = asect->entsize;
2868 if ((asect->flags & SEC_STRINGS) != 0)
2869 this_hdr->sh_flags |= SHF_STRINGS;
2870 }
1126897b 2871 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2872 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2873 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2874 {
2875 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2876 if (asect->size == 0
2877 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2878 {
3a800eb9 2879 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2880
704afa60 2881 this_hdr->sh_size = 0;
3a800eb9
AM
2882 if (o != NULL)
2883 {
704afa60 2884 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2885 if (this_hdr->sh_size != 0)
2886 this_hdr->sh_type = SHT_NOBITS;
2887 }
704afa60
JJ
2888 }
2889 }
252b5132
RH
2890
2891 /* Check for processor-specific section types. */
e1fddb6b
AO
2892 if (bed->elf_backend_fake_sections
2893 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2894 *failedptr = TRUE;
252b5132
RH
2895
2896 /* If the section has relocs, set up a section header for the
23bc299b
MM
2897 SHT_REL[A] section. If two relocation sections are required for
2898 this section, it is up to the processor-specific back-end to
c044fabd 2899 create the other. */
23bc299b 2900 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2901 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2902 &elf_section_data (asect)->rel_hdr,
c044fabd 2903 asect,
68bfbfcc 2904 asect->use_rela_p))
b34976b6 2905 *failedptr = TRUE;
252b5132
RH
2906}
2907
dbb410c3
AM
2908/* Fill in the contents of a SHT_GROUP section. */
2909
1126897b 2910void
217aa764 2911bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2912{
217aa764 2913 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2914 unsigned long symindx;
9dce4196 2915 asection *elt, *first;
dbb410c3 2916 unsigned char *loc;
b34976b6 2917 bfd_boolean gas;
dbb410c3 2918
7e4111ad
L
2919 /* Ignore linker created group section. See elfNN_ia64_object_p in
2920 elfxx-ia64.c. */
2921 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2922 || *failedptr)
2923 return;
2924
1126897b
AM
2925 symindx = 0;
2926 if (elf_group_id (sec) != NULL)
2927 symindx = elf_group_id (sec)->udata.i;
2928
2929 if (symindx == 0)
2930 {
2931 /* If called from the assembler, swap_out_syms will have set up
2932 elf_section_syms; If called for "ld -r", use target_index. */
2933 if (elf_section_syms (abfd) != NULL)
2934 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2935 else
2936 symindx = sec->target_index;
2937 }
dbb410c3
AM
2938 elf_section_data (sec)->this_hdr.sh_info = symindx;
2939
1126897b 2940 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2941 gas = TRUE;
dbb410c3
AM
2942 if (sec->contents == NULL)
2943 {
b34976b6 2944 gas = FALSE;
eea6121a 2945 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2946
2947 /* Arrange for the section to be written out. */
2948 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2949 if (sec->contents == NULL)
2950 {
b34976b6 2951 *failedptr = TRUE;
dbb410c3
AM
2952 return;
2953 }
2954 }
2955
eea6121a 2956 loc = sec->contents + sec->size;
dbb410c3 2957
9dce4196
AM
2958 /* Get the pointer to the first section in the group that gas
2959 squirreled away here. objcopy arranges for this to be set to the
2960 start of the input section group. */
2961 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2962
2963 /* First element is a flag word. Rest of section is elf section
2964 indices for all the sections of the group. Write them backwards
2965 just to keep the group in the same order as given in .section
2966 directives, not that it matters. */
2967 while (elt != NULL)
2968 {
9dce4196
AM
2969 asection *s;
2970 unsigned int idx;
2971
dbb410c3 2972 loc -= 4;
9dce4196
AM
2973 s = elt;
2974 if (!gas)
2975 s = s->output_section;
2976 idx = 0;
2977 if (s != NULL)
2978 idx = elf_section_data (s)->this_idx;
2979 H_PUT_32 (abfd, idx, loc);
945906ff 2980 elt = elf_next_in_group (elt);
9dce4196
AM
2981 if (elt == first)
2982 break;
dbb410c3
AM
2983 }
2984
3d7f7666 2985 if ((loc -= 4) != sec->contents)
9dce4196 2986 abort ();
dbb410c3 2987
9dce4196 2988 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2989}
2990
252b5132
RH
2991/* Assign all ELF section numbers. The dummy first section is handled here
2992 too. The link/info pointers for the standard section types are filled
2993 in here too, while we're at it. */
2994
b34976b6 2995static bfd_boolean
da9f89d4 2996assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2997{
2998 struct elf_obj_tdata *t = elf_tdata (abfd);
2999 asection *sec;
2b0f7ef9 3000 unsigned int section_number, secn;
252b5132 3001 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3002 struct bfd_elf_section_data *d;
252b5132
RH
3003
3004 section_number = 1;
3005
2b0f7ef9
JJ
3006 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3007
da9f89d4
L
3008 /* SHT_GROUP sections are in relocatable files only. */
3009 if (link_info == NULL || link_info->relocatable)
252b5132 3010 {
da9f89d4 3011 /* Put SHT_GROUP sections first. */
04dd1667 3012 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3013 {
5daa8fe7 3014 d = elf_section_data (sec);
da9f89d4
L
3015
3016 if (d->this_hdr.sh_type == SHT_GROUP)
3017 {
5daa8fe7 3018 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3019 {
3020 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3021 bfd_section_list_remove (abfd, sec);
da9f89d4 3022 abfd->section_count--;
da9f89d4
L
3023 }
3024 else
3025 {
3026 if (section_number == SHN_LORESERVE)
3027 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
3028 d->this_idx = section_number++;
3029 }
3030 }
47cc2cf5
PB
3031 }
3032 }
3033
3034 for (sec = abfd->sections; sec; sec = sec->next)
3035 {
3036 d = elf_section_data (sec);
3037
3038 if (d->this_hdr.sh_type != SHT_GROUP)
3039 {
3040 if (section_number == SHN_LORESERVE)
3041 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
3042 d->this_idx = section_number++;
3043 }
2b0f7ef9 3044 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
3045 if ((sec->flags & SEC_RELOC) == 0)
3046 d->rel_idx = 0;
3047 else
2b0f7ef9 3048 {
9ad5cbcf
AM
3049 if (section_number == SHN_LORESERVE)
3050 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
3051 d->rel_idx = section_number++;
3052 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
3053 }
23bc299b
MM
3054
3055 if (d->rel_hdr2)
2b0f7ef9 3056 {
9ad5cbcf
AM
3057 if (section_number == SHN_LORESERVE)
3058 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
3059 d->rel_idx2 = section_number++;
3060 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
3061 }
23bc299b
MM
3062 else
3063 d->rel_idx2 = 0;
252b5132
RH
3064 }
3065
9ad5cbcf
AM
3066 if (section_number == SHN_LORESERVE)
3067 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3068 t->shstrtab_section = section_number++;
2b0f7ef9 3069 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 3070 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
3071
3072 if (bfd_get_symcount (abfd) > 0)
3073 {
9ad5cbcf
AM
3074 if (section_number == SHN_LORESERVE)
3075 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3076 t->symtab_section = section_number++;
2b0f7ef9 3077 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
3078 if (section_number > SHN_LORESERVE - 2)
3079 {
3080 if (section_number == SHN_LORESERVE)
3081 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
3082 t->symtab_shndx_section = section_number++;
3083 t->symtab_shndx_hdr.sh_name
3084 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3085 ".symtab_shndx", FALSE);
9ad5cbcf 3086 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 3087 return FALSE;
9ad5cbcf
AM
3088 }
3089 if (section_number == SHN_LORESERVE)
3090 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 3091 t->strtab_section = section_number++;
2b0f7ef9 3092 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3093 }
3094
2b0f7ef9
JJ
3095 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3096 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3097
3098 elf_numsections (abfd) = section_number;
252b5132 3099 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
3100 if (section_number > SHN_LORESERVE)
3101 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
3102
3103 /* Set up the list of section header pointers, in agreement with the
3104 indices. */
d0fb9a8d 3105 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 3106 if (i_shdrp == NULL)
b34976b6 3107 return FALSE;
252b5132 3108
d0fb9a8d 3109 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
3110 if (i_shdrp[0] == NULL)
3111 {
3112 bfd_release (abfd, i_shdrp);
b34976b6 3113 return FALSE;
252b5132 3114 }
252b5132
RH
3115
3116 elf_elfsections (abfd) = i_shdrp;
3117
3118 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3119 if (bfd_get_symcount (abfd) > 0)
3120 {
3121 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
3122 if (elf_numsections (abfd) > SHN_LORESERVE)
3123 {
3124 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3125 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3126 }
252b5132
RH
3127 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3128 t->symtab_hdr.sh_link = t->strtab_section;
3129 }
38ce5b11 3130
252b5132
RH
3131 for (sec = abfd->sections; sec; sec = sec->next)
3132 {
3133 struct bfd_elf_section_data *d = elf_section_data (sec);
3134 asection *s;
3135 const char *name;
3136
3137 i_shdrp[d->this_idx] = &d->this_hdr;
3138 if (d->rel_idx != 0)
3139 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
3140 if (d->rel_idx2 != 0)
3141 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
3142
3143 /* Fill in the sh_link and sh_info fields while we're at it. */
3144
3145 /* sh_link of a reloc section is the section index of the symbol
3146 table. sh_info is the section index of the section to which
3147 the relocation entries apply. */
3148 if (d->rel_idx != 0)
3149 {
3150 d->rel_hdr.sh_link = t->symtab_section;
3151 d->rel_hdr.sh_info = d->this_idx;
3152 }
23bc299b
MM
3153 if (d->rel_idx2 != 0)
3154 {
3155 d->rel_hdr2->sh_link = t->symtab_section;
3156 d->rel_hdr2->sh_info = d->this_idx;
3157 }
252b5132 3158
38ce5b11
L
3159 /* We need to set up sh_link for SHF_LINK_ORDER. */
3160 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3161 {
3162 s = elf_linked_to_section (sec);
3163 if (s)
38ce5b11 3164 {
f2876037 3165 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3166 if (link_info != NULL)
38ce5b11 3167 {
f2876037 3168 /* Check discarded linkonce section. */
ccd2ec6a 3169 if (elf_discarded_section (s))
38ce5b11 3170 {
ccd2ec6a
L
3171 asection *kept;
3172 (*_bfd_error_handler)
3173 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3174 abfd, d->this_hdr.bfd_section,
3175 s, s->owner);
3176 /* Point to the kept section if it has the same
3177 size as the discarded one. */
3178 kept = _bfd_elf_check_kept_section (s);
3179 if (kept == NULL)
185d09ad 3180 {
ccd2ec6a
L
3181 bfd_set_error (bfd_error_bad_value);
3182 return FALSE;
185d09ad 3183 }
ccd2ec6a 3184 s = kept;
38ce5b11 3185 }
e424ecc8 3186
ccd2ec6a
L
3187 s = s->output_section;
3188 BFD_ASSERT (s != NULL);
38ce5b11 3189 }
f2876037
L
3190 else
3191 {
3192 /* Handle objcopy. */
3193 if (s->output_section == NULL)
3194 {
3195 (*_bfd_error_handler)
3196 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3197 abfd, d->this_hdr.bfd_section, s, s->owner);
3198 bfd_set_error (bfd_error_bad_value);
3199 return FALSE;
3200 }
3201 s = s->output_section;
3202 }
ccd2ec6a
L
3203 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3204 }
3205 else
3206 {
3207 /* PR 290:
3208 The Intel C compiler generates SHT_IA_64_UNWIND with
3209 SHF_LINK_ORDER. But it doesn't set the sh_link or
3210 sh_info fields. Hence we could get the situation
3211 where s is NULL. */
3212 const struct elf_backend_data *bed
3213 = get_elf_backend_data (abfd);
3214 if (bed->link_order_error_handler)
3215 bed->link_order_error_handler
3216 (_("%B: warning: sh_link not set for section `%A'"),
3217 abfd, sec);
38ce5b11
L
3218 }
3219 }
3220
252b5132
RH
3221 switch (d->this_hdr.sh_type)
3222 {
3223 case SHT_REL:
3224 case SHT_RELA:
3225 /* A reloc section which we are treating as a normal BFD
3226 section. sh_link is the section index of the symbol
3227 table. sh_info is the section index of the section to
3228 which the relocation entries apply. We assume that an
3229 allocated reloc section uses the dynamic symbol table.
3230 FIXME: How can we be sure? */
3231 s = bfd_get_section_by_name (abfd, ".dynsym");
3232 if (s != NULL)
3233 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3234
3235 /* We look up the section the relocs apply to by name. */
3236 name = sec->name;
3237 if (d->this_hdr.sh_type == SHT_REL)
3238 name += 4;
3239 else
3240 name += 5;
3241 s = bfd_get_section_by_name (abfd, name);
3242 if (s != NULL)
3243 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3244 break;
3245
3246 case SHT_STRTAB:
3247 /* We assume that a section named .stab*str is a stabs
3248 string section. We look for a section with the same name
3249 but without the trailing ``str'', and set its sh_link
3250 field to point to this section. */
0112cd26 3251 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3252 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3253 {
3254 size_t len;
3255 char *alc;
3256
3257 len = strlen (sec->name);
217aa764 3258 alc = bfd_malloc (len - 2);
252b5132 3259 if (alc == NULL)
b34976b6 3260 return FALSE;
d4c88bbb 3261 memcpy (alc, sec->name, len - 3);
252b5132
RH
3262 alc[len - 3] = '\0';
3263 s = bfd_get_section_by_name (abfd, alc);
3264 free (alc);
3265 if (s != NULL)
3266 {
3267 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3268
3269 /* This is a .stab section. */
0594c12d
AM
3270 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3271 elf_section_data (s)->this_hdr.sh_entsize
3272 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3273 }
3274 }
3275 break;
3276
3277 case SHT_DYNAMIC:
3278 case SHT_DYNSYM:
3279 case SHT_GNU_verneed:
3280 case SHT_GNU_verdef:
3281 /* sh_link is the section header index of the string table
3282 used for the dynamic entries, or the symbol table, or the
3283 version strings. */
3284 s = bfd_get_section_by_name (abfd, ".dynstr");
3285 if (s != NULL)
3286 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3287 break;
3288
7f1204bb
JJ
3289 case SHT_GNU_LIBLIST:
3290 /* sh_link is the section header index of the prelink library
3291 list
3292 used for the dynamic entries, or the symbol table, or the
3293 version strings. */
3294 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3295 ? ".dynstr" : ".gnu.libstr");
3296 if (s != NULL)
3297 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3298 break;
3299
252b5132 3300 case SHT_HASH:
fdc90cb4 3301 case SHT_GNU_HASH:
252b5132
RH
3302 case SHT_GNU_versym:
3303 /* sh_link is the section header index of the symbol table
3304 this hash table or version table is for. */
3305 s = bfd_get_section_by_name (abfd, ".dynsym");
3306 if (s != NULL)
3307 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3308 break;
dbb410c3
AM
3309
3310 case SHT_GROUP:
3311 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3312 }
3313 }
3314
2b0f7ef9 3315 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3316 if (i_shdrp[secn] == NULL)
3317 i_shdrp[secn] = i_shdrp[0];
3318 else
3319 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3320 i_shdrp[secn]->sh_name);
b34976b6 3321 return TRUE;
252b5132
RH
3322}
3323
3324/* Map symbol from it's internal number to the external number, moving
3325 all local symbols to be at the head of the list. */
3326
5372391b 3327static bfd_boolean
217aa764 3328sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3329{
3330 /* If the backend has a special mapping, use it. */
9c5bfbb7 3331 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3332 if (bed->elf_backend_sym_is_global)
3333 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3334
3335 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3336 || bfd_is_und_section (bfd_get_section (sym))
3337 || bfd_is_com_section (bfd_get_section (sym)));
3338}
3339
5372391b
AM
3340/* Don't output section symbols for sections that are not going to be
3341 output. Also, don't output section symbols for reloc and other
3342 special sections. */
3343
3344static bfd_boolean
3345ignore_section_sym (bfd *abfd, asymbol *sym)
3346{
3347 return ((sym->flags & BSF_SECTION_SYM) != 0
3348 && (sym->value != 0
3349 || (sym->section->owner != abfd
3350 && (sym->section->output_section->owner != abfd
3351 || sym->section->output_offset != 0))));
3352}
3353
b34976b6 3354static bfd_boolean
217aa764 3355elf_map_symbols (bfd *abfd)
252b5132 3356{
dc810e39 3357 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3358 asymbol **syms = bfd_get_outsymbols (abfd);
3359 asymbol **sect_syms;
dc810e39
AM
3360 unsigned int num_locals = 0;
3361 unsigned int num_globals = 0;
3362 unsigned int num_locals2 = 0;
3363 unsigned int num_globals2 = 0;
252b5132 3364 int max_index = 0;
dc810e39 3365 unsigned int idx;
252b5132
RH
3366 asection *asect;
3367 asymbol **new_syms;
252b5132
RH
3368
3369#ifdef DEBUG
3370 fprintf (stderr, "elf_map_symbols\n");
3371 fflush (stderr);
3372#endif
3373
252b5132
RH
3374 for (asect = abfd->sections; asect; asect = asect->next)
3375 {
3376 if (max_index < asect->index)
3377 max_index = asect->index;
3378 }
3379
3380 max_index++;
d0fb9a8d 3381 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3382 if (sect_syms == NULL)
b34976b6 3383 return FALSE;
252b5132 3384 elf_section_syms (abfd) = sect_syms;
4e89ac30 3385 elf_num_section_syms (abfd) = max_index;
252b5132 3386
079e9a2f
AM
3387 /* Init sect_syms entries for any section symbols we have already
3388 decided to output. */
252b5132
RH
3389 for (idx = 0; idx < symcount; idx++)
3390 {
dc810e39 3391 asymbol *sym = syms[idx];
c044fabd 3392
252b5132 3393 if ((sym->flags & BSF_SECTION_SYM) != 0
5372391b 3394 && !ignore_section_sym (abfd, sym))
252b5132 3395 {
5372391b 3396 asection *sec = sym->section;
252b5132 3397
5372391b
AM
3398 if (sec->owner != abfd)
3399 sec = sec->output_section;
252b5132 3400
5372391b 3401 sect_syms[sec->index] = syms[idx];
252b5132
RH
3402 }
3403 }
3404
252b5132
RH
3405 /* Classify all of the symbols. */
3406 for (idx = 0; idx < symcount; idx++)
3407 {
5372391b
AM
3408 if (ignore_section_sym (abfd, syms[idx]))
3409 continue;
252b5132
RH
3410 if (!sym_is_global (abfd, syms[idx]))
3411 num_locals++;
3412 else
3413 num_globals++;
3414 }
079e9a2f 3415
5372391b 3416 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3417 sections will already have a section symbol in outsymbols, but
3418 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3419 at least in that case. */
252b5132
RH
3420 for (asect = abfd->sections; asect; asect = asect->next)
3421 {
079e9a2f 3422 if (sect_syms[asect->index] == NULL)
252b5132 3423 {
079e9a2f 3424 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3425 num_locals++;
3426 else
3427 num_globals++;
252b5132
RH
3428 }
3429 }
3430
3431 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3432 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3433
252b5132 3434 if (new_syms == NULL)
b34976b6 3435 return FALSE;
252b5132
RH
3436
3437 for (idx = 0; idx < symcount; idx++)
3438 {
3439 asymbol *sym = syms[idx];
dc810e39 3440 unsigned int i;
252b5132 3441
5372391b
AM
3442 if (ignore_section_sym (abfd, sym))
3443 continue;
252b5132
RH
3444 if (!sym_is_global (abfd, sym))
3445 i = num_locals2++;
3446 else
3447 i = num_locals + num_globals2++;
3448 new_syms[i] = sym;
3449 sym->udata.i = i + 1;
3450 }
3451 for (asect = abfd->sections; asect; asect = asect->next)
3452 {
079e9a2f 3453 if (sect_syms[asect->index] == NULL)
252b5132 3454 {
079e9a2f 3455 asymbol *sym = asect->symbol;
dc810e39 3456 unsigned int i;
252b5132 3457
079e9a2f 3458 sect_syms[asect->index] = sym;
252b5132
RH
3459 if (!sym_is_global (abfd, sym))
3460 i = num_locals2++;
3461 else
3462 i = num_locals + num_globals2++;
3463 new_syms[i] = sym;
3464 sym->udata.i = i + 1;
3465 }
3466 }
3467
3468 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3469
3470 elf_num_locals (abfd) = num_locals;
3471 elf_num_globals (abfd) = num_globals;
b34976b6 3472 return TRUE;
252b5132
RH
3473}
3474
3475/* Align to the maximum file alignment that could be required for any
3476 ELF data structure. */
3477
268b6b39 3478static inline file_ptr
217aa764 3479align_file_position (file_ptr off, int align)
252b5132
RH
3480{
3481 return (off + align - 1) & ~(align - 1);
3482}
3483
3484/* Assign a file position to a section, optionally aligning to the
3485 required section alignment. */
3486
217aa764
AM
3487file_ptr
3488_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3489 file_ptr offset,
3490 bfd_boolean align)
252b5132
RH
3491{
3492 if (align)
3493 {
3494 unsigned int al;
3495
3496 al = i_shdrp->sh_addralign;
3497 if (al > 1)
3498 offset = BFD_ALIGN (offset, al);
3499 }
3500 i_shdrp->sh_offset = offset;
3501 if (i_shdrp->bfd_section != NULL)
3502 i_shdrp->bfd_section->filepos = offset;
3503 if (i_shdrp->sh_type != SHT_NOBITS)
3504 offset += i_shdrp->sh_size;
3505 return offset;
3506}
3507
3508/* Compute the file positions we are going to put the sections at, and
3509 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3510 is not NULL, this is being called by the ELF backend linker. */
3511
b34976b6 3512bfd_boolean
217aa764
AM
3513_bfd_elf_compute_section_file_positions (bfd *abfd,
3514 struct bfd_link_info *link_info)
252b5132 3515{
9c5bfbb7 3516 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3517 bfd_boolean failed;
4b6c0f2f 3518 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3519 Elf_Internal_Shdr *shstrtab_hdr;
3520
3521 if (abfd->output_has_begun)
b34976b6 3522 return TRUE;
252b5132
RH
3523
3524 /* Do any elf backend specific processing first. */
3525 if (bed->elf_backend_begin_write_processing)
3526 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3527
3528 if (! prep_headers (abfd))
b34976b6 3529 return FALSE;
252b5132 3530
e6c51ed4
NC
3531 /* Post process the headers if necessary. */
3532 if (bed->elf_backend_post_process_headers)
3533 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3534
b34976b6 3535 failed = FALSE;
252b5132
RH
3536 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3537 if (failed)
b34976b6 3538 return FALSE;
252b5132 3539
da9f89d4 3540 if (!assign_section_numbers (abfd, link_info))
b34976b6 3541 return FALSE;
252b5132
RH
3542
3543 /* The backend linker builds symbol table information itself. */
3544 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3545 {
3546 /* Non-zero if doing a relocatable link. */
3547 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3548
3549 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3550 return FALSE;
252b5132
RH
3551 }
3552
1126897b 3553 if (link_info == NULL)
dbb410c3 3554 {
1126897b 3555 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3556 if (failed)
b34976b6 3557 return FALSE;
dbb410c3
AM
3558 }
3559
252b5132
RH
3560 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3561 /* sh_name was set in prep_headers. */
3562 shstrtab_hdr->sh_type = SHT_STRTAB;
3563 shstrtab_hdr->sh_flags = 0;
3564 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3565 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3566 shstrtab_hdr->sh_entsize = 0;
3567 shstrtab_hdr->sh_link = 0;
3568 shstrtab_hdr->sh_info = 0;
3569 /* sh_offset is set in assign_file_positions_except_relocs. */
3570 shstrtab_hdr->sh_addralign = 1;
3571
c84fca4d 3572 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3573 return FALSE;
252b5132
RH
3574
3575 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3576 {
3577 file_ptr off;
3578 Elf_Internal_Shdr *hdr;
3579
3580 off = elf_tdata (abfd)->next_file_pos;
3581
3582 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3583 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3584
9ad5cbcf
AM
3585 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3586 if (hdr->sh_size != 0)
b34976b6 3587 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3588
252b5132 3589 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3590 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3591
3592 elf_tdata (abfd)->next_file_pos = off;
3593
3594 /* Now that we know where the .strtab section goes, write it
3595 out. */
3596 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3597 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3598 return FALSE;
252b5132
RH
3599 _bfd_stringtab_free (strtab);
3600 }
3601
b34976b6 3602 abfd->output_has_begun = TRUE;
252b5132 3603
b34976b6 3604 return TRUE;
252b5132
RH
3605}
3606
8ded5a0f
AM
3607/* Make an initial estimate of the size of the program header. If we
3608 get the number wrong here, we'll redo section placement. */
3609
3610static bfd_size_type
3611get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3612{
3613 size_t segs;
3614 asection *s;
3615 const struct elf_backend_data *bed;
3616
3617 /* Assume we will need exactly two PT_LOAD segments: one for text
3618 and one for data. */
3619 segs = 2;
3620
3621 s = bfd_get_section_by_name (abfd, ".interp");
3622 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3623 {
3624 /* If we have a loadable interpreter section, we need a
3625 PT_INTERP segment. In this case, assume we also need a
3626 PT_PHDR segment, although that may not be true for all
3627 targets. */
3628 segs += 2;
3629 }
3630
3631 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3632 {
3633 /* We need a PT_DYNAMIC segment. */
3634 ++segs;
c9df6640
L
3635
3636 if (elf_tdata (abfd)->relro)
3637 {
3638 /* We need a PT_GNU_RELRO segment only when there is a
3639 PT_DYNAMIC segment. */
3640 ++segs;
3641 }
8ded5a0f
AM
3642 }
3643
3644 if (elf_tdata (abfd)->eh_frame_hdr)
3645 {
3646 /* We need a PT_GNU_EH_FRAME segment. */
3647 ++segs;
3648 }
3649
3650 if (elf_tdata (abfd)->stack_flags)
3651 {
3652 /* We need a PT_GNU_STACK segment. */
3653 ++segs;
3654 }
3655
8ded5a0f
AM
3656 for (s = abfd->sections; s != NULL; s = s->next)
3657 {
3658 if ((s->flags & SEC_LOAD) != 0
0112cd26 3659 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3660 {
3661 /* We need a PT_NOTE segment. */
3662 ++segs;
3663 }
3664 }
3665
3666 for (s = abfd->sections; s != NULL; s = s->next)
3667 {
3668 if (s->flags & SEC_THREAD_LOCAL)
3669 {
3670 /* We need a PT_TLS segment. */
3671 ++segs;
3672 break;
3673 }
3674 }
3675
3676 /* Let the backend count up any program headers it might need. */
3677 bed = get_elf_backend_data (abfd);
3678 if (bed->elf_backend_additional_program_headers)
3679 {
3680 int a;
3681
3682 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3683 if (a == -1)
3684 abort ();
3685 segs += a;
3686 }
3687
3688 return segs * bed->s->sizeof_phdr;
3689}
3690
252b5132
RH
3691/* Create a mapping from a set of sections to a program segment. */
3692
217aa764
AM
3693static struct elf_segment_map *
3694make_mapping (bfd *abfd,
3695 asection **sections,
3696 unsigned int from,
3697 unsigned int to,
3698 bfd_boolean phdr)
252b5132
RH
3699{
3700 struct elf_segment_map *m;
3701 unsigned int i;
3702 asection **hdrpp;
dc810e39 3703 bfd_size_type amt;
252b5132 3704
dc810e39
AM
3705 amt = sizeof (struct elf_segment_map);
3706 amt += (to - from - 1) * sizeof (asection *);
217aa764 3707 m = bfd_zalloc (abfd, amt);
252b5132
RH
3708 if (m == NULL)
3709 return NULL;
3710 m->next = NULL;
3711 m->p_type = PT_LOAD;
3712 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3713 m->sections[i - from] = *hdrpp;
3714 m->count = to - from;
3715
3716 if (from == 0 && phdr)
3717 {
3718 /* Include the headers in the first PT_LOAD segment. */
3719 m->includes_filehdr = 1;
3720 m->includes_phdrs = 1;
3721 }
3722
3723 return m;
3724}
3725
229fcec5
MM
3726/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3727 on failure. */
3728
3729struct elf_segment_map *
3730_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3731{
3732 struct elf_segment_map *m;
3733
3734 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3735 if (m == NULL)
3736 return NULL;
3737 m->next = NULL;
3738 m->p_type = PT_DYNAMIC;
3739 m->count = 1;
3740 m->sections[0] = dynsec;
3741
3742 return m;
3743}
3744
8ded5a0f 3745/* Possibly add or remove segments from the segment map. */
252b5132 3746
b34976b6 3747static bfd_boolean
8ded5a0f 3748elf_modify_segment_map (bfd *abfd, struct bfd_link_info *info)
252b5132 3749{
252e386e 3750 struct elf_segment_map **m;
8ded5a0f 3751 const struct elf_backend_data *bed;
252b5132 3752
8ded5a0f
AM
3753 /* The placement algorithm assumes that non allocated sections are
3754 not in PT_LOAD segments. We ensure this here by removing such
3755 sections from the segment map. We also remove excluded
252e386e
AM
3756 sections. Finally, any PT_LOAD segment without sections is
3757 removed. */
3758 m = &elf_tdata (abfd)->segment_map;
3759 while (*m)
8ded5a0f
AM
3760 {
3761 unsigned int i, new_count;
252b5132 3762
252e386e 3763 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3764 {
252e386e
AM
3765 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3766 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3767 || (*m)->p_type != PT_LOAD))
8ded5a0f 3768 {
252e386e
AM
3769 (*m)->sections[new_count] = (*m)->sections[i];
3770 new_count++;
8ded5a0f
AM
3771 }
3772 }
252e386e 3773 (*m)->count = new_count;
252b5132 3774
252e386e
AM
3775 if ((*m)->p_type == PT_LOAD && (*m)->count == 0)
3776 *m = (*m)->next;
3777 else
3778 m = &(*m)->next;
8ded5a0f 3779 }
252b5132 3780
8ded5a0f
AM
3781 bed = get_elf_backend_data (abfd);
3782 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3783 {
252e386e 3784 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3785 return FALSE;
252b5132 3786 }
252b5132 3787
8ded5a0f
AM
3788 return TRUE;
3789}
252b5132 3790
8ded5a0f 3791/* Set up a mapping from BFD sections to program segments. */
252b5132 3792
8ded5a0f
AM
3793bfd_boolean
3794_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3795{
3796 unsigned int count;
3797 struct elf_segment_map *m;
3798 asection **sections = NULL;
3799 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 3800
8ded5a0f
AM
3801 if (elf_tdata (abfd)->segment_map == NULL
3802 && bfd_count_sections (abfd) != 0)
252b5132 3803 {
8ded5a0f
AM
3804 asection *s;
3805 unsigned int i;
3806 struct elf_segment_map *mfirst;
3807 struct elf_segment_map **pm;
3808 asection *last_hdr;
3809 bfd_vma last_size;
3810 unsigned int phdr_index;
3811 bfd_vma maxpagesize;
3812 asection **hdrpp;
3813 bfd_boolean phdr_in_segment = TRUE;
3814 bfd_boolean writable;
3815 int tls_count = 0;
3816 asection *first_tls = NULL;
3817 asection *dynsec, *eh_frame_hdr;
3818 bfd_size_type amt;
252b5132 3819
8ded5a0f 3820 /* Select the allocated sections, and sort them. */
252b5132 3821
8ded5a0f
AM
3822 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
3823 if (sections == NULL)
252b5132 3824 goto error_return;
252b5132 3825
8ded5a0f
AM
3826 i = 0;
3827 for (s = abfd->sections; s != NULL; s = s->next)
3828 {
3829 if ((s->flags & SEC_ALLOC) != 0)
3830 {
3831 sections[i] = s;
3832 ++i;
3833 }
3834 }
3835 BFD_ASSERT (i <= bfd_count_sections (abfd));
3836 count = i;
252b5132 3837
8ded5a0f 3838 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3839
8ded5a0f 3840 /* Build the mapping. */
252b5132 3841
8ded5a0f
AM
3842 mfirst = NULL;
3843 pm = &mfirst;
252b5132 3844
8ded5a0f
AM
3845 /* If we have a .interp section, then create a PT_PHDR segment for
3846 the program headers and a PT_INTERP segment for the .interp
3847 section. */
3848 s = bfd_get_section_by_name (abfd, ".interp");
3849 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3850 {
3851 amt = sizeof (struct elf_segment_map);
3852 m = bfd_zalloc (abfd, amt);
3853 if (m == NULL)
3854 goto error_return;
3855 m->next = NULL;
3856 m->p_type = PT_PHDR;
3857 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3858 m->p_flags = PF_R | PF_X;
3859 m->p_flags_valid = 1;
3860 m->includes_phdrs = 1;
252b5132 3861
8ded5a0f
AM
3862 *pm = m;
3863 pm = &m->next;
252b5132 3864
8ded5a0f
AM
3865 amt = sizeof (struct elf_segment_map);
3866 m = bfd_zalloc (abfd, amt);
3867 if (m == NULL)
3868 goto error_return;
3869 m->next = NULL;
3870 m->p_type = PT_INTERP;
3871 m->count = 1;
3872 m->sections[0] = s;
3873
3874 *pm = m;
3875 pm = &m->next;
252b5132 3876 }
8ded5a0f
AM
3877
3878 /* Look through the sections. We put sections in the same program
3879 segment when the start of the second section can be placed within
3880 a few bytes of the end of the first section. */
3881 last_hdr = NULL;
3882 last_size = 0;
3883 phdr_index = 0;
3884 maxpagesize = bed->maxpagesize;
3885 writable = FALSE;
3886 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3887 if (dynsec != NULL
3888 && (dynsec->flags & SEC_LOAD) == 0)
3889 dynsec = NULL;
3890
3891 /* Deal with -Ttext or something similar such that the first section
3892 is not adjacent to the program headers. This is an
3893 approximation, since at this point we don't know exactly how many
3894 program headers we will need. */
3895 if (count > 0)
252b5132 3896 {
8ded5a0f
AM
3897 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3898
62d7a5f6 3899 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3900 phdr_size = get_program_header_size (abfd, info);
3901 if ((abfd->flags & D_PAGED) == 0
3902 || sections[0]->lma < phdr_size
3903 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
3904 phdr_in_segment = FALSE;
252b5132
RH
3905 }
3906
8ded5a0f 3907 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3908 {
8ded5a0f
AM
3909 asection *hdr;
3910 bfd_boolean new_segment;
3911
3912 hdr = *hdrpp;
3913
3914 /* See if this section and the last one will fit in the same
3915 segment. */
3916
3917 if (last_hdr == NULL)
3918 {
3919 /* If we don't have a segment yet, then we don't need a new
3920 one (we build the last one after this loop). */
3921 new_segment = FALSE;
3922 }
3923 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3924 {
3925 /* If this section has a different relation between the
3926 virtual address and the load address, then we need a new
3927 segment. */
3928 new_segment = TRUE;
3929 }
3930 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
3931 < BFD_ALIGN (hdr->lma, maxpagesize))
3932 {
3933 /* If putting this section in this segment would force us to
3934 skip a page in the segment, then we need a new segment. */
3935 new_segment = TRUE;
3936 }
3937 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3938 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3939 {
3940 /* We don't want to put a loadable section after a
3941 nonloadable section in the same segment.
3942 Consider .tbss sections as loadable for this purpose. */
3943 new_segment = TRUE;
3944 }
3945 else if ((abfd->flags & D_PAGED) == 0)
3946 {
3947 /* If the file is not demand paged, which means that we
3948 don't require the sections to be correctly aligned in the
3949 file, then there is no other reason for a new segment. */
3950 new_segment = FALSE;
3951 }
3952 else if (! writable
3953 && (hdr->flags & SEC_READONLY) == 0
3954 && (((last_hdr->lma + last_size - 1)
3955 & ~(maxpagesize - 1))
3956 != (hdr->lma & ~(maxpagesize - 1))))
3957 {
3958 /* We don't want to put a writable section in a read only
3959 segment, unless they are on the same page in memory
3960 anyhow. We already know that the last section does not
3961 bring us past the current section on the page, so the
3962 only case in which the new section is not on the same
3963 page as the previous section is when the previous section
3964 ends precisely on a page boundary. */
3965 new_segment = TRUE;
3966 }
3967 else
3968 {
3969 /* Otherwise, we can use the same segment. */
3970 new_segment = FALSE;
3971 }
3972
3973 if (! new_segment)
3974 {
3975 if ((hdr->flags & SEC_READONLY) == 0)
3976 writable = TRUE;
3977 last_hdr = hdr;
3978 /* .tbss sections effectively have zero size. */
3979 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3980 != SEC_THREAD_LOCAL)
3981 last_size = hdr->size;
3982 else
3983 last_size = 0;
3984 continue;
3985 }
3986
3987 /* We need a new program segment. We must create a new program
3988 header holding all the sections from phdr_index until hdr. */
3989
3990 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3991 if (m == NULL)
3992 goto error_return;
3993
3994 *pm = m;
3995 pm = &m->next;
3996
252b5132 3997 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3998 writable = TRUE;
8ded5a0f
AM
3999 else
4000 writable = FALSE;
4001
baaff79e
JJ
4002 last_hdr = hdr;
4003 /* .tbss sections effectively have zero size. */
e5caec89 4004 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4005 last_size = hdr->size;
baaff79e
JJ
4006 else
4007 last_size = 0;
8ded5a0f
AM
4008 phdr_index = i;
4009 phdr_in_segment = FALSE;
252b5132
RH
4010 }
4011
8ded5a0f
AM
4012 /* Create a final PT_LOAD program segment. */
4013 if (last_hdr != NULL)
4014 {
4015 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4016 if (m == NULL)
4017 goto error_return;
252b5132 4018
8ded5a0f
AM
4019 *pm = m;
4020 pm = &m->next;
4021 }
252b5132 4022
8ded5a0f
AM
4023 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4024 if (dynsec != NULL)
4025 {
4026 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4027 if (m == NULL)
4028 goto error_return;
4029 *pm = m;
4030 pm = &m->next;
4031 }
252b5132 4032
8ded5a0f
AM
4033 /* For each loadable .note section, add a PT_NOTE segment. We don't
4034 use bfd_get_section_by_name, because if we link together
4035 nonloadable .note sections and loadable .note sections, we will
4036 generate two .note sections in the output file. FIXME: Using
4037 names for section types is bogus anyhow. */
4038 for (s = abfd->sections; s != NULL; s = s->next)
4039 {
4040 if ((s->flags & SEC_LOAD) != 0
0112cd26 4041 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
4042 {
4043 amt = sizeof (struct elf_segment_map);
4044 m = bfd_zalloc (abfd, amt);
4045 if (m == NULL)
4046 goto error_return;
4047 m->next = NULL;
4048 m->p_type = PT_NOTE;
4049 m->count = 1;
4050 m->sections[0] = s;
252b5132 4051
8ded5a0f
AM
4052 *pm = m;
4053 pm = &m->next;
4054 }
4055 if (s->flags & SEC_THREAD_LOCAL)
4056 {
4057 if (! tls_count)
4058 first_tls = s;
4059 tls_count++;
4060 }
4061 }
252b5132 4062
8ded5a0f
AM
4063 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4064 if (tls_count > 0)
4065 {
4066 int i;
252b5132 4067
8ded5a0f
AM
4068 amt = sizeof (struct elf_segment_map);
4069 amt += (tls_count - 1) * sizeof (asection *);
4070 m = bfd_zalloc (abfd, amt);
4071 if (m == NULL)
4072 goto error_return;
4073 m->next = NULL;
4074 m->p_type = PT_TLS;
4075 m->count = tls_count;
4076 /* Mandated PF_R. */
4077 m->p_flags = PF_R;
4078 m->p_flags_valid = 1;
4079 for (i = 0; i < tls_count; ++i)
4080 {
4081 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
4082 m->sections[i] = first_tls;
4083 first_tls = first_tls->next;
4084 }
252b5132 4085
8ded5a0f
AM
4086 *pm = m;
4087 pm = &m->next;
4088 }
252b5132 4089
8ded5a0f
AM
4090 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4091 segment. */
4092 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
4093 if (eh_frame_hdr != NULL
4094 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4095 {
dc810e39 4096 amt = sizeof (struct elf_segment_map);
217aa764 4097 m = bfd_zalloc (abfd, amt);
252b5132
RH
4098 if (m == NULL)
4099 goto error_return;
4100 m->next = NULL;
8ded5a0f 4101 m->p_type = PT_GNU_EH_FRAME;
252b5132 4102 m->count = 1;
8ded5a0f 4103 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4104
4105 *pm = m;
4106 pm = &m->next;
4107 }
13ae64f3 4108
8ded5a0f 4109 if (elf_tdata (abfd)->stack_flags)
13ae64f3 4110 {
8ded5a0f
AM
4111 amt = sizeof (struct elf_segment_map);
4112 m = bfd_zalloc (abfd, amt);
4113 if (m == NULL)
4114 goto error_return;
4115 m->next = NULL;
4116 m->p_type = PT_GNU_STACK;
4117 m->p_flags = elf_tdata (abfd)->stack_flags;
4118 m->p_flags_valid = 1;
252b5132 4119
8ded5a0f
AM
4120 *pm = m;
4121 pm = &m->next;
4122 }
65765700 4123
c9df6640 4124 if (dynsec != NULL && elf_tdata (abfd)->relro)
8ded5a0f 4125 {
c9df6640
L
4126 /* We make a PT_GNU_RELRO segment only when there is a
4127 PT_DYNAMIC segment. */
8ded5a0f
AM
4128 amt = sizeof (struct elf_segment_map);
4129 m = bfd_zalloc (abfd, amt);
4130 if (m == NULL)
4131 goto error_return;
4132 m->next = NULL;
4133 m->p_type = PT_GNU_RELRO;
4134 m->p_flags = PF_R;
4135 m->p_flags_valid = 1;
65765700 4136
8ded5a0f
AM
4137 *pm = m;
4138 pm = &m->next;
4139 }
9ee5e499 4140
8ded5a0f
AM
4141 free (sections);
4142 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
4143 }
4144
8ded5a0f
AM
4145 if (!elf_modify_segment_map (abfd, info))
4146 return FALSE;
8c37241b 4147
8ded5a0f
AM
4148 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4149 ++count;
4150 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 4151
b34976b6 4152 return TRUE;
252b5132
RH
4153
4154 error_return:
4155 if (sections != NULL)
4156 free (sections);
b34976b6 4157 return FALSE;
252b5132
RH
4158}
4159
4160/* Sort sections by address. */
4161
4162static int
217aa764 4163elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4164{
4165 const asection *sec1 = *(const asection **) arg1;
4166 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4167 bfd_size_type size1, size2;
252b5132
RH
4168
4169 /* Sort by LMA first, since this is the address used to
4170 place the section into a segment. */
4171 if (sec1->lma < sec2->lma)
4172 return -1;
4173 else if (sec1->lma > sec2->lma)
4174 return 1;
4175
4176 /* Then sort by VMA. Normally the LMA and the VMA will be
4177 the same, and this will do nothing. */
4178 if (sec1->vma < sec2->vma)
4179 return -1;
4180 else if (sec1->vma > sec2->vma)
4181 return 1;
4182
4183 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4184
07c6e936 4185#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4186
4187 if (TOEND (sec1))
4188 {
4189 if (TOEND (sec2))
00a7cdc5
NC
4190 {
4191 /* If the indicies are the same, do not return 0
4192 here, but continue to try the next comparison. */
4193 if (sec1->target_index - sec2->target_index != 0)
4194 return sec1->target_index - sec2->target_index;
4195 }
252b5132
RH
4196 else
4197 return 1;
4198 }
00a7cdc5 4199 else if (TOEND (sec2))
252b5132
RH
4200 return -1;
4201
4202#undef TOEND
4203
00a7cdc5
NC
4204 /* Sort by size, to put zero sized sections
4205 before others at the same address. */
252b5132 4206
eea6121a
AM
4207 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4208 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4209
4210 if (size1 < size2)
252b5132 4211 return -1;
eecdbe52 4212 if (size1 > size2)
252b5132
RH
4213 return 1;
4214
4215 return sec1->target_index - sec2->target_index;
4216}
4217
340b6d91
AC
4218/* Ian Lance Taylor writes:
4219
4220 We shouldn't be using % with a negative signed number. That's just
4221 not good. We have to make sure either that the number is not
4222 negative, or that the number has an unsigned type. When the types
4223 are all the same size they wind up as unsigned. When file_ptr is a
4224 larger signed type, the arithmetic winds up as signed long long,
4225 which is wrong.
4226
4227 What we're trying to say here is something like ``increase OFF by
4228 the least amount that will cause it to be equal to the VMA modulo
4229 the page size.'' */
4230/* In other words, something like:
4231
4232 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4233 off_offset = off % bed->maxpagesize;
4234 if (vma_offset < off_offset)
4235 adjustment = vma_offset + bed->maxpagesize - off_offset;
4236 else
4237 adjustment = vma_offset - off_offset;
4238
4239 which can can be collapsed into the expression below. */
4240
4241static file_ptr
4242vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4243{
4244 return ((vma - off) % maxpagesize);
4245}
4246
252b5132
RH
4247/* Assign file positions to the sections based on the mapping from
4248 sections to segments. This function also sets up some fields in
f3520d2f 4249 the file header. */
252b5132 4250
b34976b6 4251static bfd_boolean
f3520d2f
AM
4252assign_file_positions_for_load_sections (bfd *abfd,
4253 struct bfd_link_info *link_info)
252b5132
RH
4254{
4255 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4256 struct elf_segment_map *m;
252b5132 4257 Elf_Internal_Phdr *phdrs;
252b5132 4258 Elf_Internal_Phdr *p;
f3520d2f 4259 file_ptr off, voff;
3f570048 4260 bfd_size_type maxpagesize;
f3520d2f 4261 unsigned int alloc;
5c182d5f 4262 unsigned int i;
252b5132 4263
e36284ab
AM
4264 if (link_info == NULL
4265 && !elf_modify_segment_map (abfd, link_info))
8ded5a0f 4266 return FALSE;
252b5132 4267
8ded5a0f 4268 alloc = 0;
252b5132 4269 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
8ded5a0f 4270 ++alloc;
252b5132
RH
4271
4272 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4273 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4274 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4275
62d7a5f6 4276 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4277 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4278 else
4279 BFD_ASSERT (elf_tdata (abfd)->program_header_size
4280 == alloc * bed->s->sizeof_phdr);
252b5132
RH
4281
4282 if (alloc == 0)
f3520d2f 4283 {
8ded5a0f
AM
4284 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4285 return TRUE;
f3520d2f 4286 }
252b5132 4287
d0fb9a8d 4288 phdrs = bfd_alloc2 (abfd, alloc, sizeof (Elf_Internal_Phdr));
f3520d2f 4289 elf_tdata (abfd)->phdr = phdrs;
252b5132 4290 if (phdrs == NULL)
b34976b6 4291 return FALSE;
252b5132 4292
3f570048
AM
4293 maxpagesize = 1;
4294 if ((abfd->flags & D_PAGED) != 0)
4295 maxpagesize = bed->maxpagesize;
4296
252b5132
RH
4297 off = bed->s->sizeof_ehdr;
4298 off += alloc * bed->s->sizeof_phdr;
4299
252b5132
RH
4300 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4301 m != NULL;
4302 m = m->next, p++)
4303 {
252b5132
RH
4304 asection **secpp;
4305
4306 /* If elf_segment_map is not from map_sections_to_segments, the
47d9a591 4307 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4308 not be done to the PT_NOTE section of a corefile, which may
4309 contain several pseudo-sections artificially created by bfd.
4310 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4311 if (m->count > 1
4312 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4313 && m->p_type == PT_NOTE))
252b5132
RH
4314 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4315 elf_sort_sections);
4316
b301b248
AM
4317 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4318 number of sections with contents contributing to both p_filesz
4319 and p_memsz, followed by a number of sections with no contents
4320 that just contribute to p_memsz. In this loop, OFF tracks next
4321 available file offset for PT_LOAD and PT_NOTE segments. VOFF is
4322 an adjustment we use for segments that have no file contents
4323 but need zero filled memory allocation. */
4324 voff = 0;
252b5132 4325 p->p_type = m->p_type;
28a7f3e7 4326 p->p_flags = m->p_flags;
252b5132 4327
3f570048
AM
4328 if (m->count == 0)
4329 p->p_vaddr = 0;
4330 else
4331 p->p_vaddr = m->sections[0]->vma;
4332
4333 if (m->p_paddr_valid)
4334 p->p_paddr = m->p_paddr;
4335 else if (m->count == 0)
4336 p->p_paddr = 0;
4337 else
4338 p->p_paddr = m->sections[0]->lma;
4339
4340 if (p->p_type == PT_LOAD
4341 && (abfd->flags & D_PAGED) != 0)
4342 {
4343 /* p_align in demand paged PT_LOAD segments effectively stores
4344 the maximum page size. When copying an executable with
4345 objcopy, we set m->p_align from the input file. Use this
4346 value for maxpagesize rather than bed->maxpagesize, which
4347 may be different. Note that we use maxpagesize for PT_TLS
4348 segment alignment later in this function, so we are relying
4349 on at least one PT_LOAD segment appearing before a PT_TLS
4350 segment. */
4351 if (m->p_align_valid)
4352 maxpagesize = m->p_align;
4353
4354 p->p_align = maxpagesize;
4355 }
4356 else if (m->count == 0)
4357 p->p_align = 1 << bed->s->log_file_align;
4358 else
4359 p->p_align = 0;
4360
252b5132 4361 if (p->p_type == PT_LOAD
b301b248 4362 && m->count > 0)
252b5132 4363 {
b301b248
AM
4364 bfd_size_type align;
4365 bfd_vma adjust;
a49e53ed 4366 unsigned int align_power = 0;
b301b248 4367
a49e53ed 4368 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
252b5132 4369 {
a49e53ed 4370 unsigned int secalign;
252b5132 4371
a49e53ed
AM
4372 secalign = bfd_get_section_alignment (abfd, *secpp);
4373 if (secalign > align_power)
4374 align_power = secalign;
b301b248 4375 }
a49e53ed
AM
4376 align = (bfd_size_type) 1 << align_power;
4377
3f570048
AM
4378 if (align < maxpagesize)
4379 align = maxpagesize;
252b5132 4380
b301b248
AM
4381 adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4382 off += adjust;
4383 if (adjust != 0
4384 && !m->includes_filehdr
4385 && !m->includes_phdrs
4386 && (ufile_ptr) off >= align)
4387 {
4388 /* If the first section isn't loadable, the same holds for
4389 any other sections. Since the segment won't need file
4390 space, we can make p_offset overlap some prior segment.
4391 However, .tbss is special. If a segment starts with
4392 .tbss, we need to look at the next section to decide
4393 whether the segment has any loadable sections. */
4394 i = 0;
252e386e
AM
4395 while ((m->sections[i]->flags & SEC_LOAD) == 0
4396 && (m->sections[i]->flags & SEC_HAS_CONTENTS) == 0)
b301b248
AM
4397 {
4398 if ((m->sections[i]->flags & SEC_THREAD_LOCAL) == 0
4399 || ++i >= m->count)
4400 {
4401 off -= adjust;
4402 voff = adjust - align;
4403 break;
4404 }
4405 }
252b5132
RH
4406 }
4407 }
b1a6d0b1
NC
4408 /* Make sure the .dynamic section is the first section in the
4409 PT_DYNAMIC segment. */
4410 else if (p->p_type == PT_DYNAMIC
4411 && m->count > 1
4412 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4413 {
4414 _bfd_error_handler
b301b248
AM
4415 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4416 abfd);
b1a6d0b1
NC
4417 bfd_set_error (bfd_error_bad_value);
4418 return FALSE;
4419 }
252b5132 4420
252b5132
RH
4421 p->p_offset = 0;
4422 p->p_filesz = 0;
4423 p->p_memsz = 0;
4424
4425 if (m->includes_filehdr)
4426 {
4427 if (! m->p_flags_valid)
4428 p->p_flags |= PF_R;
4429 p->p_offset = 0;
4430 p->p_filesz = bed->s->sizeof_ehdr;
4431 p->p_memsz = bed->s->sizeof_ehdr;
4432 if (m->count > 0)
4433 {
4434 BFD_ASSERT (p->p_type == PT_LOAD);
4435
4436 if (p->p_vaddr < (bfd_vma) off)
4437 {
caf47ea6 4438 (*_bfd_error_handler)
b301b248
AM
4439 (_("%B: Not enough room for program headers, try linking with -N"),
4440 abfd);
252b5132 4441 bfd_set_error (bfd_error_bad_value);
b34976b6 4442 return FALSE;
252b5132
RH
4443 }
4444
4445 p->p_vaddr -= off;
4446 if (! m->p_paddr_valid)
4447 p->p_paddr -= off;
4448 }
252b5132
RH
4449 }
4450
4451 if (m->includes_phdrs)
4452 {
4453 if (! m->p_flags_valid)
4454 p->p_flags |= PF_R;
4455
f3520d2f 4456 if (!m->includes_filehdr)
252b5132
RH
4457 {
4458 p->p_offset = bed->s->sizeof_ehdr;
4459
4460 if (m->count > 0)
4461 {
4462 BFD_ASSERT (p->p_type == PT_LOAD);
4463 p->p_vaddr -= off - p->p_offset;
4464 if (! m->p_paddr_valid)
4465 p->p_paddr -= off - p->p_offset;
4466 }
252b5132
RH
4467 }
4468
4469 p->p_filesz += alloc * bed->s->sizeof_phdr;
4470 p->p_memsz += alloc * bed->s->sizeof_phdr;
4471 }
4472
4473 if (p->p_type == PT_LOAD
4474 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4475 {
4476 if (! m->includes_filehdr && ! m->includes_phdrs)
b301b248 4477 p->p_offset = off + voff;
252b5132
RH
4478 else
4479 {
4480 file_ptr adjust;
4481
4482 adjust = off - (p->p_offset + p->p_filesz);
4483 p->p_filesz += adjust;
4484 p->p_memsz += adjust;
4485 }
4486 }
4487
1ea63fd2
AM
4488 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4489 maps. Set filepos for sections in PT_LOAD segments, and in
4490 core files, for sections in PT_NOTE segments.
4491 assign_file_positions_for_non_load_sections will set filepos
4492 for other sections and update p_filesz for other segments. */
252b5132
RH
4493 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4494 {
4495 asection *sec;
4496 flagword flags;
4497 bfd_size_type align;
4498
4499 sec = *secpp;
4500 flags = sec->flags;
3f570048 4501 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4502
b301b248
AM
4503 if (p->p_type == PT_LOAD
4504 || p->p_type == PT_TLS)
252b5132
RH
4505 {
4506 bfd_signed_vma adjust;
4507
5efb6261 4508 if ((flags & SEC_LOAD) != 0)
252b5132 4509 {
b301b248 4510 adjust = sec->lma - (p->p_paddr + p->p_filesz);
252b5132 4511 if (adjust < 0)
b301b248
AM
4512 {
4513 (*_bfd_error_handler)
4514 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4515 abfd, sec, (unsigned long) sec->lma);
4516 adjust = 0;
4517 }
4518 off += adjust;
4519 p->p_filesz += adjust;
4520 p->p_memsz += adjust;
252b5132 4521 }
b301b248
AM
4522 /* .tbss is special. It doesn't contribute to p_memsz of
4523 normal segments. */
1ea63fd2
AM
4524 else if ((flags & SEC_ALLOC) != 0
4525 && ((flags & SEC_THREAD_LOCAL) == 0
4526 || p->p_type == PT_TLS))
252b5132
RH
4527 {
4528 /* The section VMA must equal the file position
b301b248
AM
4529 modulo the page size. */
4530 bfd_size_type page = align;
3f570048
AM
4531 if (page < maxpagesize)
4532 page = maxpagesize;
b301b248
AM
4533 adjust = vma_page_aligned_bias (sec->vma,
4534 p->p_vaddr + p->p_memsz,
4535 page);
252b5132 4536 p->p_memsz += adjust;
252b5132 4537 }
252b5132
RH
4538 }
4539
4540 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4541 {
b301b248
AM
4542 /* The section at i == 0 is the one that actually contains
4543 everything. */
4a938328
MS
4544 if (i == 0)
4545 {
252b5132 4546 sec->filepos = off;
eea6121a 4547 off += sec->size;
b301b248
AM
4548 p->p_filesz = sec->size;
4549 p->p_memsz = 0;
4550 p->p_align = 1;
252b5132 4551 }
4a938328 4552 else
252b5132 4553 {
b301b248 4554 /* The rest are fake sections that shouldn't be written. */
252b5132 4555 sec->filepos = 0;
eea6121a 4556 sec->size = 0;
b301b248
AM
4557 sec->flags = 0;
4558 continue;
252b5132 4559 }
252b5132
RH
4560 }
4561 else
4562 {
b301b248
AM
4563 if (p->p_type == PT_LOAD)
4564 {
252e386e 4565 sec->filepos = off + voff;
5efb6261
AM
4566 /* FIXME: The SEC_HAS_CONTENTS test here dates back to
4567 1997, and the exact reason for it isn't clear. One
4568 plausible explanation is that it is to work around
4569 a problem we have with linker scripts using data
4570 statements in NOLOAD sections. I don't think it
4571 makes a great deal of sense to have such a section
4572 assigned to a PT_LOAD segment, but apparently
4573 people do this. The data statement results in a
4574 bfd_data_link_order being built, and these need
4575 section contents to write into. Eventually, we get
4576 to _bfd_elf_write_object_contents which writes any
4577 section with contents to the output. Make room
4578 here for the write, so that following segments are
4579 not trashed. */
4580 if ((flags & SEC_LOAD) != 0
4581 || (flags & SEC_HAS_CONTENTS) != 0)
b301b248
AM
4582 off += sec->size;
4583 }
252b5132 4584
5efb6261 4585 if ((flags & SEC_LOAD) != 0)
b301b248
AM
4586 {
4587 p->p_filesz += sec->size;
4588 p->p_memsz += sec->size;
4589 }
4b6c0f2f 4590
b301b248
AM
4591 /* .tbss is special. It doesn't contribute to p_memsz of
4592 normal segments. */
1ea63fd2
AM
4593 else if ((flags & SEC_ALLOC) != 0
4594 && ((flags & SEC_THREAD_LOCAL) == 0
4595 || p->p_type == PT_TLS))
b301b248 4596 p->p_memsz += sec->size;
252b5132 4597
13ae64f3 4598 if (p->p_type == PT_TLS
eea6121a 4599 && sec->size == 0
13ae64f3
JJ
4600 && (sec->flags & SEC_HAS_CONTENTS) == 0)
4601 {
3a800eb9
AM
4602 struct bfd_link_order *o = sec->map_tail.link_order;
4603 if (o != NULL)
4604 p->p_memsz += o->offset + o->size;
13ae64f3
JJ
4605 }
4606
c9df6640
L
4607 if (p->p_type == PT_GNU_RELRO)
4608 p->p_align = 1;
4609 else if (align > p->p_align
4610 && (p->p_type != PT_LOAD
4611 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4612 p->p_align = align;
4613 }
4614
4615 if (! m->p_flags_valid)
4616 {
4617 p->p_flags |= PF_R;
4618 if ((flags & SEC_CODE) != 0)
4619 p->p_flags |= PF_X;
4620 if ((flags & SEC_READONLY) == 0)
4621 p->p_flags |= PF_W;
4622 }
4623 }
4624 }
4625
f3520d2f
AM
4626 elf_tdata (abfd)->next_file_pos = off;
4627 return TRUE;
4628}
4629
4630/* Assign file positions for the other sections. */
4631
4632static bfd_boolean
4633assign_file_positions_for_non_load_sections (bfd *abfd,
4634 struct bfd_link_info *link_info)
4635{
4636 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4637 Elf_Internal_Shdr **i_shdrpp;
4638 Elf_Internal_Shdr **hdrpp;
4639 Elf_Internal_Phdr *phdrs;
4640 Elf_Internal_Phdr *p;
4641 struct elf_segment_map *m;
4642 bfd_vma filehdr_vaddr, filehdr_paddr;
4643 bfd_vma phdrs_vaddr, phdrs_paddr;
4644 file_ptr off;
4645 unsigned int num_sec;
4646 unsigned int i;
4647 unsigned int count;
4648
5c182d5f
AM
4649 i_shdrpp = elf_elfsections (abfd);
4650 num_sec = elf_numsections (abfd);
f3520d2f 4651 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4652 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4653 {
4654 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4655 Elf_Internal_Shdr *hdr;
4656
4657 hdr = *hdrpp;
4658 if (hdr->bfd_section != NULL
252e386e
AM
4659 && (hdr->bfd_section->filepos != 0
4660 || (hdr->sh_type == SHT_NOBITS
4661 && hdr->contents == NULL)))
5c182d5f
AM
4662 hdr->sh_offset = hdr->bfd_section->filepos;
4663 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4664 {
49c13adb
L
4665 if (hdr->sh_size != 0)
4666 ((*_bfd_error_handler)
4667 (_("%B: warning: allocated section `%s' not in segment"),
3ba71138
L
4668 abfd,
4669 (hdr->bfd_section == NULL
4670 ? "*unknown*"
4671 : hdr->bfd_section->name)));
4672 /* We don't need to page align empty sections. */
4673 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4674 off += vma_page_aligned_bias (hdr->sh_addr, off,
4675 bed->maxpagesize);
4676 else
4677 off += vma_page_aligned_bias (hdr->sh_addr, off,
4678 hdr->sh_addralign);
4679 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4680 FALSE);
4681 }
4682 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4683 && hdr->bfd_section == NULL)
4684 || hdr == i_shdrpp[tdata->symtab_section]
4685 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4686 || hdr == i_shdrpp[tdata->strtab_section])
4687 hdr->sh_offset = -1;
4688 else
4689 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4690
4691 if (i == SHN_LORESERVE - 1)
4692 {
4693 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4694 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4695 }
4696 }
4697
252b5132
RH
4698 /* Now that we have set the section file positions, we can set up
4699 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4700 count = 0;
4701 filehdr_vaddr = 0;
4702 filehdr_paddr = 0;
4703 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4704 phdrs_paddr = 0;
4705 phdrs = elf_tdata (abfd)->phdr;
4706 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4707 m != NULL;
4708 m = m->next, p++)
4709 {
4710 ++count;
4711 if (p->p_type != PT_LOAD)
4712 continue;
4713
4714 if (m->includes_filehdr)
4715 {
4716 filehdr_vaddr = p->p_vaddr;
4717 filehdr_paddr = p->p_paddr;
4718 }
4719 if (m->includes_phdrs)
4720 {
4721 phdrs_vaddr = p->p_vaddr;
4722 phdrs_paddr = p->p_paddr;
4723 if (m->includes_filehdr)
4724 {
4725 phdrs_vaddr += bed->s->sizeof_ehdr;
4726 phdrs_paddr += bed->s->sizeof_ehdr;
4727 }
4728 }
4729 }
4730
252b5132
RH
4731 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4732 m != NULL;
4733 m = m->next, p++)
4734 {
1ea63fd2 4735 if (m->count != 0)
252b5132 4736 {
1ea63fd2
AM
4737 if (p->p_type != PT_LOAD
4738 && (p->p_type != PT_NOTE || bfd_get_format (abfd) != bfd_core))
229fcec5 4739 {
1ea63fd2
AM
4740 Elf_Internal_Shdr *hdr;
4741 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4742
4743 hdr = &elf_section_data (m->sections[m->count - 1])->this_hdr;
4744 p->p_filesz = (m->sections[m->count - 1]->filepos
4745 - m->sections[0]->filepos);
4746 if (hdr->sh_type != SHT_NOBITS)
4747 p->p_filesz += hdr->sh_size;
4748
4749 p->p_offset = m->sections[0]->filepos;
229fcec5 4750 }
252b5132 4751 }
1ea63fd2 4752 else
252b5132
RH
4753 {
4754 if (m->includes_filehdr)
4755 {
4756 p->p_vaddr = filehdr_vaddr;
4757 if (! m->p_paddr_valid)
4758 p->p_paddr = filehdr_paddr;
4759 }
4760 else if (m->includes_phdrs)
4761 {
4762 p->p_vaddr = phdrs_vaddr;
4763 if (! m->p_paddr_valid)
4764 p->p_paddr = phdrs_paddr;
4765 }
8c37241b
JJ
4766 else if (p->p_type == PT_GNU_RELRO)
4767 {
4768 Elf_Internal_Phdr *lp;
4769
4770 for (lp = phdrs; lp < phdrs + count; ++lp)
4771 {
4772 if (lp->p_type == PT_LOAD
4773 && lp->p_vaddr <= link_info->relro_end
4774 && lp->p_vaddr >= link_info->relro_start
e36284ab
AM
4775 && (lp->p_vaddr + lp->p_filesz
4776 >= link_info->relro_end))
8c37241b
JJ
4777 break;
4778 }
4779
4780 if (lp < phdrs + count
4781 && link_info->relro_end > lp->p_vaddr)
4782 {
4783 p->p_vaddr = lp->p_vaddr;
4784 p->p_paddr = lp->p_paddr;
4785 p->p_offset = lp->p_offset;
4786 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4787 p->p_memsz = p->p_filesz;
4788 p->p_align = 1;
4789 p->p_flags = (lp->p_flags & ~PF_W);
4790 }
4791 else
4792 {
4793 memset (p, 0, sizeof *p);
4794 p->p_type = PT_NULL;
4795 }
4796 }
252b5132
RH
4797 }
4798 }
4799
252b5132
RH
4800 elf_tdata (abfd)->next_file_pos = off;
4801
b34976b6 4802 return TRUE;
252b5132
RH
4803}
4804
252b5132
RH
4805/* Work out the file positions of all the sections. This is called by
4806 _bfd_elf_compute_section_file_positions. All the section sizes and
4807 VMAs must be known before this is called.
4808
e0638f70
AM
4809 Reloc sections come in two flavours: Those processed specially as
4810 "side-channel" data attached to a section to which they apply, and
4811 those that bfd doesn't process as relocations. The latter sort are
4812 stored in a normal bfd section by bfd_section_from_shdr. We don't
4813 consider the former sort here, unless they form part of the loadable
4814 image. Reloc sections not assigned here will be handled later by
4815 assign_file_positions_for_relocs.
252b5132
RH
4816
4817 We also don't set the positions of the .symtab and .strtab here. */
4818
b34976b6 4819static bfd_boolean
c84fca4d
AO
4820assign_file_positions_except_relocs (bfd *abfd,
4821 struct bfd_link_info *link_info)
252b5132 4822{
5c182d5f
AM
4823 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4824 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4825 file_ptr off;
9c5bfbb7 4826 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4827
4828 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4829 && bfd_get_format (abfd) != bfd_core)
4830 {
5c182d5f
AM
4831 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4832 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4833 Elf_Internal_Shdr **hdrpp;
4834 unsigned int i;
4835
4836 /* Start after the ELF header. */
4837 off = i_ehdrp->e_ehsize;
4838
4839 /* We are not creating an executable, which means that we are
4840 not creating a program header, and that the actual order of
4841 the sections in the file is unimportant. */
9ad5cbcf 4842 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4843 {
4844 Elf_Internal_Shdr *hdr;
4845
4846 hdr = *hdrpp;
e0638f70
AM
4847 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4848 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4849 || i == tdata->symtab_section
4850 || i == tdata->symtab_shndx_section
252b5132
RH
4851 || i == tdata->strtab_section)
4852 {
4853 hdr->sh_offset = -1;
252b5132 4854 }
9ad5cbcf 4855 else
b34976b6 4856 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4857
9ad5cbcf
AM
4858 if (i == SHN_LORESERVE - 1)
4859 {
4860 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4861 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4862 }
252b5132
RH
4863 }
4864 }
4865 else
4866 {
f3520d2f
AM
4867 unsigned int alloc;
4868
252b5132
RH
4869 /* Assign file positions for the loaded sections based on the
4870 assignment of sections to segments. */
f3520d2f
AM
4871 if (!assign_file_positions_for_load_sections (abfd, link_info))
4872 return FALSE;
4873
4874 /* And for non-load sections. */
4875 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4876 return FALSE;
4877
e36284ab
AM
4878 if (bed->elf_backend_modify_program_headers != NULL)
4879 {
4880 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4881 return FALSE;
4882 }
4883
f3520d2f
AM
4884 /* Write out the program headers. */
4885 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4886 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4887 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4888 return FALSE;
252b5132 4889
5c182d5f 4890 off = tdata->next_file_pos;
252b5132
RH
4891 }
4892
4893 /* Place the section headers. */
45d6a902 4894 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4895 i_ehdrp->e_shoff = off;
4896 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4897
5c182d5f 4898 tdata->next_file_pos = off;
252b5132 4899
b34976b6 4900 return TRUE;
252b5132
RH
4901}
4902
b34976b6 4903static bfd_boolean
217aa764 4904prep_headers (bfd *abfd)
252b5132
RH
4905{
4906 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4907 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4908 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4909 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4910 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4911
4912 i_ehdrp = elf_elfheader (abfd);
4913 i_shdrp = elf_elfsections (abfd);
4914
2b0f7ef9 4915 shstrtab = _bfd_elf_strtab_init ();
252b5132 4916 if (shstrtab == NULL)
b34976b6 4917 return FALSE;
252b5132
RH
4918
4919 elf_shstrtab (abfd) = shstrtab;
4920
4921 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4922 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4923 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4924 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4925
4926 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4927 i_ehdrp->e_ident[EI_DATA] =
4928 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4929 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4930
252b5132
RH
4931 if ((abfd->flags & DYNAMIC) != 0)
4932 i_ehdrp->e_type = ET_DYN;
4933 else if ((abfd->flags & EXEC_P) != 0)
4934 i_ehdrp->e_type = ET_EXEC;
4935 else if (bfd_get_format (abfd) == bfd_core)
4936 i_ehdrp->e_type = ET_CORE;
4937 else
4938 i_ehdrp->e_type = ET_REL;
4939
4940 switch (bfd_get_arch (abfd))
4941 {
4942 case bfd_arch_unknown:
4943 i_ehdrp->e_machine = EM_NONE;
4944 break;
aa4f99bb
AO
4945
4946 /* There used to be a long list of cases here, each one setting
4947 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4948 in the corresponding bfd definition. To avoid duplication,
4949 the switch was removed. Machines that need special handling
4950 can generally do it in elf_backend_final_write_processing(),
4951 unless they need the information earlier than the final write.
4952 Such need can generally be supplied by replacing the tests for
4953 e_machine with the conditions used to determine it. */
252b5132 4954 default:
9c5bfbb7
AM
4955 i_ehdrp->e_machine = bed->elf_machine_code;
4956 }
aa4f99bb 4957
252b5132
RH
4958 i_ehdrp->e_version = bed->s->ev_current;
4959 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4960
c044fabd 4961 /* No program header, for now. */
252b5132
RH
4962 i_ehdrp->e_phoff = 0;
4963 i_ehdrp->e_phentsize = 0;
4964 i_ehdrp->e_phnum = 0;
4965
c044fabd 4966 /* Each bfd section is section header entry. */
252b5132
RH
4967 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4968 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4969
c044fabd 4970 /* If we're building an executable, we'll need a program header table. */
252b5132 4971 if (abfd->flags & EXEC_P)
0e71e495
BE
4972 /* It all happens later. */
4973 ;
252b5132
RH
4974 else
4975 {
4976 i_ehdrp->e_phentsize = 0;
4977 i_phdrp = 0;
4978 i_ehdrp->e_phoff = 0;
4979 }
4980
4981 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4982 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4983 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4984 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4985 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4986 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4987 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4988 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4989 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4990 return FALSE;
252b5132 4991
b34976b6 4992 return TRUE;
252b5132
RH
4993}
4994
4995/* Assign file positions for all the reloc sections which are not part
4996 of the loadable file image. */
4997
4998void
217aa764 4999_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
5000{
5001 file_ptr off;
9ad5cbcf 5002 unsigned int i, num_sec;
252b5132
RH
5003 Elf_Internal_Shdr **shdrpp;
5004
5005 off = elf_tdata (abfd)->next_file_pos;
5006
9ad5cbcf
AM
5007 num_sec = elf_numsections (abfd);
5008 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5009 {
5010 Elf_Internal_Shdr *shdrp;
5011
5012 shdrp = *shdrpp;
5013 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5014 && shdrp->sh_offset == -1)
b34976b6 5015 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5016 }
5017
5018 elf_tdata (abfd)->next_file_pos = off;
5019}
5020
b34976b6 5021bfd_boolean
217aa764 5022_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5023{
9c5bfbb7 5024 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5025 Elf_Internal_Ehdr *i_ehdrp;
5026 Elf_Internal_Shdr **i_shdrp;
b34976b6 5027 bfd_boolean failed;
9ad5cbcf 5028 unsigned int count, num_sec;
252b5132
RH
5029
5030 if (! abfd->output_has_begun
217aa764 5031 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5032 return FALSE;
252b5132
RH
5033
5034 i_shdrp = elf_elfsections (abfd);
5035 i_ehdrp = elf_elfheader (abfd);
5036
b34976b6 5037 failed = FALSE;
252b5132
RH
5038 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5039 if (failed)
b34976b6 5040 return FALSE;
252b5132
RH
5041
5042 _bfd_elf_assign_file_positions_for_relocs (abfd);
5043
c044fabd 5044 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5045 num_sec = elf_numsections (abfd);
5046 for (count = 1; count < num_sec; count++)
252b5132
RH
5047 {
5048 if (bed->elf_backend_section_processing)
5049 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5050 if (i_shdrp[count]->contents)
5051 {
dc810e39
AM
5052 bfd_size_type amt = i_shdrp[count]->sh_size;
5053
252b5132 5054 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5055 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5056 return FALSE;
252b5132 5057 }
9ad5cbcf
AM
5058 if (count == SHN_LORESERVE - 1)
5059 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
5060 }
5061
5062 /* Write out the section header names. */
26ae6d5e
DJ
5063 if (elf_shstrtab (abfd) != NULL
5064 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
5065 || ! _bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5066 return FALSE;
252b5132
RH
5067
5068 if (bed->elf_backend_final_write_processing)
5069 (*bed->elf_backend_final_write_processing) (abfd,
5070 elf_tdata (abfd)->linker);
5071
5072 return bed->s->write_shdrs_and_ehdr (abfd);
5073}
5074
b34976b6 5075bfd_boolean
217aa764 5076_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5077{
c044fabd 5078 /* Hopefully this can be done just like an object file. */
252b5132
RH
5079 return _bfd_elf_write_object_contents (abfd);
5080}
c044fabd
KH
5081
5082/* Given a section, search the header to find them. */
5083
252b5132 5084int
198beae2 5085_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5086{
9c5bfbb7 5087 const struct elf_backend_data *bed;
252b5132 5088 int index;
252b5132 5089
9ad5cbcf
AM
5090 if (elf_section_data (asect) != NULL
5091 && elf_section_data (asect)->this_idx != 0)
5092 return elf_section_data (asect)->this_idx;
5093
5094 if (bfd_is_abs_section (asect))
af746e92
AM
5095 index = SHN_ABS;
5096 else if (bfd_is_com_section (asect))
5097 index = SHN_COMMON;
5098 else if (bfd_is_und_section (asect))
5099 index = SHN_UNDEF;
5100 else
6dc132d9 5101 index = -1;
252b5132 5102
af746e92 5103 bed = get_elf_backend_data (abfd);
252b5132
RH
5104 if (bed->elf_backend_section_from_bfd_section)
5105 {
af746e92 5106 int retval = index;
9ad5cbcf 5107
af746e92
AM
5108 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5109 return retval;
252b5132
RH
5110 }
5111
af746e92
AM
5112 if (index == -1)
5113 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5114
af746e92 5115 return index;
252b5132
RH
5116}
5117
5118/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5119 on error. */
5120
5121int
217aa764 5122_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5123{
5124 asymbol *asym_ptr = *asym_ptr_ptr;
5125 int idx;
5126 flagword flags = asym_ptr->flags;
5127
5128 /* When gas creates relocations against local labels, it creates its
5129 own symbol for the section, but does put the symbol into the
5130 symbol chain, so udata is 0. When the linker is generating
5131 relocatable output, this section symbol may be for one of the
5132 input sections rather than the output section. */
5133 if (asym_ptr->udata.i == 0
5134 && (flags & BSF_SECTION_SYM)
5135 && asym_ptr->section)
5136 {
5372391b 5137 asection *sec;
252b5132
RH
5138 int indx;
5139
5372391b
AM
5140 sec = asym_ptr->section;
5141 if (sec->owner != abfd && sec->output_section != NULL)
5142 sec = sec->output_section;
5143 if (sec->owner == abfd
5144 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5145 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5146 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5147 }
5148
5149 idx = asym_ptr->udata.i;
5150
5151 if (idx == 0)
5152 {
5153 /* This case can occur when using --strip-symbol on a symbol
5154 which is used in a relocation entry. */
5155 (*_bfd_error_handler)
d003868e
AM
5156 (_("%B: symbol `%s' required but not present"),
5157 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5158 bfd_set_error (bfd_error_no_symbols);
5159 return -1;
5160 }
5161
5162#if DEBUG & 4
5163 {
5164 fprintf (stderr,
661a3fd4 5165 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5166 (long) asym_ptr, asym_ptr->name, idx, flags,
5167 elf_symbol_flags (flags));
5168 fflush (stderr);
5169 }
5170#endif
5171
5172 return idx;
5173}
5174
84d1d650 5175/* Rewrite program header information. */
252b5132 5176
b34976b6 5177static bfd_boolean
84d1d650 5178rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5179{
b34976b6
AM
5180 Elf_Internal_Ehdr *iehdr;
5181 struct elf_segment_map *map;
5182 struct elf_segment_map *map_first;
5183 struct elf_segment_map **pointer_to_map;
5184 Elf_Internal_Phdr *segment;
5185 asection *section;
5186 unsigned int i;
5187 unsigned int num_segments;
5188 bfd_boolean phdr_included = FALSE;
5189 bfd_vma maxpagesize;
5190 struct elf_segment_map *phdr_adjust_seg = NULL;
5191 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5192 const struct elf_backend_data *bed;
bc67d8a6 5193
caf47ea6 5194 bed = get_elf_backend_data (ibfd);
252b5132
RH
5195 iehdr = elf_elfheader (ibfd);
5196
bc67d8a6 5197 map_first = NULL;
c044fabd 5198 pointer_to_map = &map_first;
252b5132
RH
5199
5200 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5201 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5202
5203 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5204#define SEGMENT_END(segment, start) \
5205 (start + (segment->p_memsz > segment->p_filesz \
5206 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5207
eecdbe52
JJ
5208#define SECTION_SIZE(section, segment) \
5209 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5210 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5211 ? section->size : 0)
eecdbe52 5212
b34976b6 5213 /* Returns TRUE if the given section is contained within
bc67d8a6 5214 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5215#define IS_CONTAINED_BY_VMA(section, segment) \
5216 (section->vma >= segment->p_vaddr \
eecdbe52 5217 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5218 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5219
b34976b6 5220 /* Returns TRUE if the given section is contained within
bc67d8a6 5221 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5222#define IS_CONTAINED_BY_LMA(section, segment, base) \
5223 (section->lma >= base \
eecdbe52 5224 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5225 <= SEGMENT_END (segment, base)))
252b5132 5226
c044fabd 5227 /* Special case: corefile "NOTE" section containing regs, prpsinfo etc. */
aecc8f8a
AM
5228#define IS_COREFILE_NOTE(p, s) \
5229 (p->p_type == PT_NOTE \
5230 && bfd_get_format (ibfd) == bfd_core \
5231 && s->vma == 0 && s->lma == 0 \
5232 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5233 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5234 <= p->p_offset + p->p_filesz))
252b5132
RH
5235
5236 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5237 linker, which generates a PT_INTERP section with p_vaddr and
5238 p_memsz set to 0. */
aecc8f8a
AM
5239#define IS_SOLARIS_PT_INTERP(p, s) \
5240 (p->p_vaddr == 0 \
5241 && p->p_paddr == 0 \
5242 && p->p_memsz == 0 \
5243 && p->p_filesz > 0 \
5244 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5245 && s->size > 0 \
aecc8f8a 5246 && (bfd_vma) s->filepos >= p->p_offset \
eea6121a 5247 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5248 <= p->p_offset + p->p_filesz))
5c440b1e 5249
bc67d8a6
NC
5250 /* Decide if the given section should be included in the given segment.
5251 A section will be included if:
f5ffc919
NC
5252 1. It is within the address space of the segment -- we use the LMA
5253 if that is set for the segment and the VMA otherwise,
bc67d8a6
NC
5254 2. It is an allocated segment,
5255 3. There is an output section associated with it,
eecdbe52 5256 4. The section has not already been allocated to a previous segment.
03394ac9
NC
5257 5. PT_GNU_STACK segments do not include any sections.
5258 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5259 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5260 8. PT_DYNAMIC should not contain empty sections at the beginning
5261 (with the possible exception of .dynamic). */
caf47ea6 5262#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
aecc8f8a
AM
5263 ((((segment->p_paddr \
5264 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5265 : IS_CONTAINED_BY_VMA (section, segment)) \
f5ffc919 5266 && (section->flags & SEC_ALLOC) != 0) \
b6821651 5267 || IS_COREFILE_NOTE (segment, section)) \
f5ffc919 5268 && section->output_section != NULL \
03394ac9 5269 && segment->p_type != PT_GNU_STACK \
eecdbe52
JJ
5270 && (segment->p_type != PT_TLS \
5271 || (section->flags & SEC_THREAD_LOCAL)) \
5272 && (segment->p_type == PT_LOAD \
5273 || segment->p_type == PT_TLS \
5274 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6f79b219
JJ
5275 && (segment->p_type != PT_DYNAMIC \
5276 || SECTION_SIZE (section, segment) > 0 \
5277 || (segment->p_paddr \
5278 ? segment->p_paddr != section->lma \
5279 : segment->p_vaddr != section->vma) \
5280 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5281 == 0)) \
82e51918 5282 && ! section->segment_mark)
bc67d8a6 5283
b34976b6 5284 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5285#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5286 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5287
5288 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5289 their VMA address ranges and their LMA address ranges overlap.
5290 It is possible to have overlapping VMA ranges without overlapping LMA
5291 ranges. RedBoot images for example can have both .data and .bss mapped
5292 to the same VMA range, but with the .data section mapped to a different
5293 LMA. */
aecc8f8a 5294#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea
NC
5295 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
5296 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
5297 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
5298 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5299
5300 /* Initialise the segment mark field. */
5301 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5302 section->segment_mark = FALSE;
bc67d8a6 5303
252b5132 5304 /* Scan through the segments specified in the program header
bc67d8a6 5305 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5306 in the loadable segments. These can be created by weird
aecc8f8a 5307 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5308 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5309 i < num_segments;
c044fabd 5310 i++, segment++)
252b5132 5311 {
252b5132 5312 unsigned int j;
c044fabd 5313 Elf_Internal_Phdr *segment2;
252b5132 5314
aecc8f8a
AM
5315 if (segment->p_type == PT_INTERP)
5316 for (section = ibfd->sections; section; section = section->next)
5317 if (IS_SOLARIS_PT_INTERP (segment, section))
5318 {
5319 /* Mininal change so that the normal section to segment
4cc11e76 5320 assignment code will work. */
aecc8f8a
AM
5321 segment->p_vaddr = section->vma;
5322 break;
5323 }
5324
bc67d8a6
NC
5325 if (segment->p_type != PT_LOAD)
5326 continue;
c044fabd 5327
bc67d8a6 5328 /* Determine if this segment overlaps any previous segments. */
c044fabd 5329 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2 ++)
bc67d8a6
NC
5330 {
5331 bfd_signed_vma extra_length;
c044fabd 5332
bc67d8a6
NC
5333 if (segment2->p_type != PT_LOAD
5334 || ! SEGMENT_OVERLAPS (segment, segment2))
5335 continue;
c044fabd 5336
bc67d8a6
NC
5337 /* Merge the two segments together. */
5338 if (segment2->p_vaddr < segment->p_vaddr)
5339 {
c044fabd
KH
5340 /* Extend SEGMENT2 to include SEGMENT and then delete
5341 SEGMENT. */
bc67d8a6
NC
5342 extra_length =
5343 SEGMENT_END (segment, segment->p_vaddr)
5344 - SEGMENT_END (segment2, segment2->p_vaddr);
c044fabd 5345
bc67d8a6
NC
5346 if (extra_length > 0)
5347 {
5348 segment2->p_memsz += extra_length;
5349 segment2->p_filesz += extra_length;
5350 }
c044fabd 5351
bc67d8a6 5352 segment->p_type = PT_NULL;
c044fabd 5353
bc67d8a6
NC
5354 /* Since we have deleted P we must restart the outer loop. */
5355 i = 0;
5356 segment = elf_tdata (ibfd)->phdr;
5357 break;
5358 }
5359 else
5360 {
c044fabd
KH
5361 /* Extend SEGMENT to include SEGMENT2 and then delete
5362 SEGMENT2. */
bc67d8a6
NC
5363 extra_length =
5364 SEGMENT_END (segment2, segment2->p_vaddr)
5365 - SEGMENT_END (segment, segment->p_vaddr);
c044fabd 5366
bc67d8a6
NC
5367 if (extra_length > 0)
5368 {
5369 segment->p_memsz += extra_length;
5370 segment->p_filesz += extra_length;
5371 }
c044fabd 5372
bc67d8a6
NC
5373 segment2->p_type = PT_NULL;
5374 }
5375 }
5376 }
c044fabd 5377
bc67d8a6
NC
5378 /* The second scan attempts to assign sections to segments. */
5379 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5380 i < num_segments;
5381 i ++, segment ++)
5382 {
5383 unsigned int section_count;
5384 asection ** sections;
5385 asection * output_section;
5386 unsigned int isec;
5387 bfd_vma matching_lma;
5388 bfd_vma suggested_lma;
5389 unsigned int j;
dc810e39 5390 bfd_size_type amt;
bc67d8a6
NC
5391
5392 if (segment->p_type == PT_NULL)
5393 continue;
c044fabd 5394
bc67d8a6 5395 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5396 for (section = ibfd->sections, section_count = 0;
5397 section != NULL;
5398 section = section->next)
caf47ea6 5399 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c044fabd 5400 ++section_count;
811072d8 5401
b5f852ea
NC
5402 /* Allocate a segment map big enough to contain
5403 all of the sections we have selected. */
dc810e39
AM
5404 amt = sizeof (struct elf_segment_map);
5405 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
41f8ce69 5406 map = bfd_zalloc (obfd, amt);
bc67d8a6 5407 if (map == NULL)
b34976b6 5408 return FALSE;
252b5132
RH
5409
5410 /* Initialise the fields of the segment map. Default to
5411 using the physical address of the segment in the input BFD. */
bc67d8a6
NC
5412 map->next = NULL;
5413 map->p_type = segment->p_type;
5414 map->p_flags = segment->p_flags;
5415 map->p_flags_valid = 1;
5416 map->p_paddr = segment->p_paddr;
5417 map->p_paddr_valid = 1;
252b5132
RH
5418
5419 /* Determine if this segment contains the ELF file header
5420 and if it contains the program headers themselves. */
bc67d8a6
NC
5421 map->includes_filehdr = (segment->p_offset == 0
5422 && segment->p_filesz >= iehdr->e_ehsize);
252b5132 5423
bc67d8a6 5424 map->includes_phdrs = 0;
252b5132 5425
bc67d8a6 5426 if (! phdr_included || segment->p_type != PT_LOAD)
252b5132 5427 {
bc67d8a6
NC
5428 map->includes_phdrs =
5429 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5430 && (segment->p_offset + segment->p_filesz
252b5132
RH
5431 >= ((bfd_vma) iehdr->e_phoff
5432 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5433
bc67d8a6 5434 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5435 phdr_included = TRUE;
252b5132
RH
5436 }
5437
bc67d8a6 5438 if (section_count == 0)
252b5132
RH
5439 {
5440 /* Special segments, such as the PT_PHDR segment, may contain
5441 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5442 something. They are allowed by the ELF spec however, so only
5443 a warning is produced. */
bc67d8a6 5444 if (segment->p_type == PT_LOAD)
caf47ea6 5445 (*_bfd_error_handler)
d003868e
AM
5446 (_("%B: warning: Empty loadable segment detected, is this intentional ?\n"),
5447 ibfd);
252b5132 5448
bc67d8a6 5449 map->count = 0;
c044fabd
KH
5450 *pointer_to_map = map;
5451 pointer_to_map = &map->next;
252b5132
RH
5452
5453 continue;
5454 }
5455
5456 /* Now scan the sections in the input BFD again and attempt
5457 to add their corresponding output sections to the segment map.
5458 The problem here is how to handle an output section which has
5459 been moved (ie had its LMA changed). There are four possibilities:
5460
5461 1. None of the sections have been moved.
5462 In this case we can continue to use the segment LMA from the
5463 input BFD.
5464
5465 2. All of the sections have been moved by the same amount.
5466 In this case we can change the segment's LMA to match the LMA
5467 of the first section.
5468
5469 3. Some of the sections have been moved, others have not.
5470 In this case those sections which have not been moved can be
5471 placed in the current segment which will have to have its size,
5472 and possibly its LMA changed, and a new segment or segments will
5473 have to be created to contain the other sections.
5474
b5f852ea 5475 4. The sections have been moved, but not by the same amount.
252b5132
RH
5476 In this case we can change the segment's LMA to match the LMA
5477 of the first section and we will have to create a new segment
5478 or segments to contain the other sections.
5479
5480 In order to save time, we allocate an array to hold the section
5481 pointers that we are interested in. As these sections get assigned
5482 to a segment, they are removed from this array. */
5483
0b14c2aa
L
5484 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5485 to work around this long long bug. */
d0fb9a8d 5486 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5487 if (sections == NULL)
b34976b6 5488 return FALSE;
252b5132
RH
5489
5490 /* Step One: Scan for segment vs section LMA conflicts.
5491 Also add the sections to the section array allocated above.
5492 Also add the sections to the current segment. In the common
5493 case, where the sections have not been moved, this means that
5494 we have completely filled the segment, and there is nothing
5495 more to do. */
252b5132 5496 isec = 0;
72730e0c 5497 matching_lma = 0;
252b5132
RH
5498 suggested_lma = 0;
5499
bc67d8a6
NC
5500 for (j = 0, section = ibfd->sections;
5501 section != NULL;
5502 section = section->next)
252b5132 5503 {
caf47ea6 5504 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5505 {
bc67d8a6
NC
5506 output_section = section->output_section;
5507
5508 sections[j ++] = section;
252b5132
RH
5509
5510 /* The Solaris native linker always sets p_paddr to 0.
5511 We try to catch that case here, and set it to the
5e8d7549
NC
5512 correct value. Note - some backends require that
5513 p_paddr be left as zero. */
bc67d8a6 5514 if (segment->p_paddr == 0
4455705d 5515 && segment->p_vaddr != 0
5e8d7549 5516 && (! bed->want_p_paddr_set_to_zero)
252b5132 5517 && isec == 0
bc67d8a6
NC
5518 && output_section->lma != 0
5519 && (output_section->vma == (segment->p_vaddr
5520 + (map->includes_filehdr
5521 ? iehdr->e_ehsize
5522 : 0)
5523 + (map->includes_phdrs
079e9a2f
AM
5524 ? (iehdr->e_phnum
5525 * iehdr->e_phentsize)
bc67d8a6
NC
5526 : 0))))
5527 map->p_paddr = segment->p_vaddr;
252b5132
RH
5528
5529 /* Match up the physical address of the segment with the
5530 LMA address of the output section. */
bc67d8a6 5531 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549
NC
5532 || IS_COREFILE_NOTE (segment, section)
5533 || (bed->want_p_paddr_set_to_zero &&
5534 IS_CONTAINED_BY_VMA (output_section, segment))
5535 )
252b5132
RH
5536 {
5537 if (matching_lma == 0)
bc67d8a6 5538 matching_lma = output_section->lma;
252b5132
RH
5539
5540 /* We assume that if the section fits within the segment
bc67d8a6 5541 then it does not overlap any other section within that
252b5132 5542 segment. */
bc67d8a6 5543 map->sections[isec ++] = output_section;
252b5132
RH
5544 }
5545 else if (suggested_lma == 0)
bc67d8a6 5546 suggested_lma = output_section->lma;
252b5132
RH
5547 }
5548 }
5549
bc67d8a6 5550 BFD_ASSERT (j == section_count);
252b5132
RH
5551
5552 /* Step Two: Adjust the physical address of the current segment,
5553 if necessary. */
bc67d8a6 5554 if (isec == section_count)
252b5132
RH
5555 {
5556 /* All of the sections fitted within the segment as currently
5557 specified. This is the default case. Add the segment to
5558 the list of built segments and carry on to process the next
5559 program header in the input BFD. */
bc67d8a6 5560 map->count = section_count;
c044fabd
KH
5561 *pointer_to_map = map;
5562 pointer_to_map = &map->next;
252b5132
RH
5563
5564 free (sections);
5565 continue;
5566 }
252b5132
RH
5567 else
5568 {
72730e0c
AM
5569 if (matching_lma != 0)
5570 {
5571 /* At least one section fits inside the current segment.
5572 Keep it, but modify its physical address to match the
5573 LMA of the first section that fitted. */
bc67d8a6 5574 map->p_paddr = matching_lma;
72730e0c
AM
5575 }
5576 else
5577 {
5578 /* None of the sections fitted inside the current segment.
5579 Change the current segment's physical address to match
5580 the LMA of the first section. */
bc67d8a6 5581 map->p_paddr = suggested_lma;
72730e0c
AM
5582 }
5583
bc67d8a6
NC
5584 /* Offset the segment physical address from the lma
5585 to allow for space taken up by elf headers. */
5586 if (map->includes_filehdr)
5587 map->p_paddr -= iehdr->e_ehsize;
252b5132 5588
bc67d8a6
NC
5589 if (map->includes_phdrs)
5590 {
5591 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5592
5593 /* iehdr->e_phnum is just an estimate of the number
5594 of program headers that we will need. Make a note
5595 here of the number we used and the segment we chose
5596 to hold these headers, so that we can adjust the
5597 offset when we know the correct value. */
5598 phdr_adjust_num = iehdr->e_phnum;
5599 phdr_adjust_seg = map;
5600 }
252b5132
RH
5601 }
5602
5603 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5604 those that fit to the current segment and removing them from the
252b5132
RH
5605 sections array; but making sure not to leave large gaps. Once all
5606 possible sections have been assigned to the current segment it is
5607 added to the list of built segments and if sections still remain
5608 to be assigned, a new segment is constructed before repeating
5609 the loop. */
5610 isec = 0;
5611 do
5612 {
bc67d8a6 5613 map->count = 0;
252b5132
RH
5614 suggested_lma = 0;
5615
5616 /* Fill the current segment with sections that fit. */
bc67d8a6 5617 for (j = 0; j < section_count; j++)
252b5132 5618 {
bc67d8a6 5619 section = sections[j];
252b5132 5620
bc67d8a6 5621 if (section == NULL)
252b5132
RH
5622 continue;
5623
bc67d8a6 5624 output_section = section->output_section;
252b5132 5625
bc67d8a6 5626 BFD_ASSERT (output_section != NULL);
c044fabd 5627
bc67d8a6
NC
5628 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5629 || IS_COREFILE_NOTE (segment, section))
252b5132 5630 {
bc67d8a6 5631 if (map->count == 0)
252b5132
RH
5632 {
5633 /* If the first section in a segment does not start at
bc67d8a6
NC
5634 the beginning of the segment, then something is
5635 wrong. */
5636 if (output_section->lma !=
5637 (map->p_paddr
5638 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5639 + (map->includes_phdrs
5640 ? iehdr->e_phnum * iehdr->e_phentsize
5641 : 0)))
252b5132
RH
5642 abort ();
5643 }
5644 else
5645 {
5646 asection * prev_sec;
252b5132 5647
bc67d8a6 5648 prev_sec = map->sections[map->count - 1];
252b5132
RH
5649
5650 /* If the gap between the end of the previous section
bc67d8a6
NC
5651 and the start of this section is more than
5652 maxpagesize then we need to start a new segment. */
eea6121a 5653 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5654 maxpagesize)
caf47ea6 5655 < BFD_ALIGN (output_section->lma, maxpagesize))
eea6121a 5656 || ((prev_sec->lma + prev_sec->size)
079e9a2f 5657 > output_section->lma))
252b5132
RH
5658 {
5659 if (suggested_lma == 0)
bc67d8a6 5660 suggested_lma = output_section->lma;
252b5132
RH
5661
5662 continue;
5663 }
5664 }
5665
bc67d8a6 5666 map->sections[map->count++] = output_section;
252b5132
RH
5667 ++isec;
5668 sections[j] = NULL;
b34976b6 5669 section->segment_mark = TRUE;
252b5132
RH
5670 }
5671 else if (suggested_lma == 0)
bc67d8a6 5672 suggested_lma = output_section->lma;
252b5132
RH
5673 }
5674
bc67d8a6 5675 BFD_ASSERT (map->count > 0);
252b5132
RH
5676
5677 /* Add the current segment to the list of built segments. */
c044fabd
KH
5678 *pointer_to_map = map;
5679 pointer_to_map = &map->next;
252b5132 5680
bc67d8a6 5681 if (isec < section_count)
252b5132
RH
5682 {
5683 /* We still have not allocated all of the sections to
5684 segments. Create a new segment here, initialise it
5685 and carry on looping. */
dc810e39
AM
5686 amt = sizeof (struct elf_segment_map);
5687 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5688 map = bfd_alloc (obfd, amt);
bc67d8a6 5689 if (map == NULL)
5ed6aba4
NC
5690 {
5691 free (sections);
5692 return FALSE;
5693 }
252b5132
RH
5694
5695 /* Initialise the fields of the segment map. Set the physical
5696 physical address to the LMA of the first section that has
5697 not yet been assigned. */
bc67d8a6
NC
5698 map->next = NULL;
5699 map->p_type = segment->p_type;
5700 map->p_flags = segment->p_flags;
5701 map->p_flags_valid = 1;
5702 map->p_paddr = suggested_lma;
5703 map->p_paddr_valid = 1;
5704 map->includes_filehdr = 0;
5705 map->includes_phdrs = 0;
252b5132
RH
5706 }
5707 }
bc67d8a6 5708 while (isec < section_count);
252b5132
RH
5709
5710 free (sections);
5711 }
5712
5713 /* The Solaris linker creates program headers in which all the
5714 p_paddr fields are zero. When we try to objcopy or strip such a
5715 file, we get confused. Check for this case, and if we find it
5716 reset the p_paddr_valid fields. */
bc67d8a6
NC
5717 for (map = map_first; map != NULL; map = map->next)
5718 if (map->p_paddr != 0)
252b5132 5719 break;
bc67d8a6 5720 if (map == NULL)
b5f852ea
NC
5721 for (map = map_first; map != NULL; map = map->next)
5722 map->p_paddr_valid = 0;
252b5132 5723
bc67d8a6
NC
5724 elf_tdata (obfd)->segment_map = map_first;
5725
5726 /* If we had to estimate the number of program headers that were
9ad5cbcf 5727 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5728 the offset if necessary. */
5729 if (phdr_adjust_seg != NULL)
5730 {
5731 unsigned int count;
c044fabd 5732
bc67d8a6 5733 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5734 count++;
252b5132 5735
bc67d8a6
NC
5736 if (count > phdr_adjust_num)
5737 phdr_adjust_seg->p_paddr
5738 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5739 }
c044fabd 5740
bc67d8a6 5741#undef SEGMENT_END
eecdbe52 5742#undef SECTION_SIZE
bc67d8a6
NC
5743#undef IS_CONTAINED_BY_VMA
5744#undef IS_CONTAINED_BY_LMA
252b5132 5745#undef IS_COREFILE_NOTE
bc67d8a6
NC
5746#undef IS_SOLARIS_PT_INTERP
5747#undef INCLUDE_SECTION_IN_SEGMENT
5748#undef SEGMENT_AFTER_SEGMENT
5749#undef SEGMENT_OVERLAPS
b34976b6 5750 return TRUE;
252b5132
RH
5751}
5752
84d1d650
L
5753/* Copy ELF program header information. */
5754
5755static bfd_boolean
5756copy_elf_program_header (bfd *ibfd, bfd *obfd)
5757{
5758 Elf_Internal_Ehdr *iehdr;
5759 struct elf_segment_map *map;
5760 struct elf_segment_map *map_first;
5761 struct elf_segment_map **pointer_to_map;
5762 Elf_Internal_Phdr *segment;
5763 unsigned int i;
5764 unsigned int num_segments;
5765 bfd_boolean phdr_included = FALSE;
5766
5767 iehdr = elf_elfheader (ibfd);
5768
5769 map_first = NULL;
5770 pointer_to_map = &map_first;
5771
5772 num_segments = elf_elfheader (ibfd)->e_phnum;
5773 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5774 i < num_segments;
5775 i++, segment++)
5776 {
5777 asection *section;
5778 unsigned int section_count;
5779 bfd_size_type amt;
5780 Elf_Internal_Shdr *this_hdr;
5781
5782 /* FIXME: Do we need to copy PT_NULL segment? */
5783 if (segment->p_type == PT_NULL)
5784 continue;
5785
5786 /* Compute how many sections are in this segment. */
5787 for (section = ibfd->sections, section_count = 0;
5788 section != NULL;
5789 section = section->next)
5790 {
5791 this_hdr = &(elf_section_data(section)->this_hdr);
5792 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5793 section_count++;
5794 }
5795
5796 /* Allocate a segment map big enough to contain
5797 all of the sections we have selected. */
5798 amt = sizeof (struct elf_segment_map);
5799 if (section_count != 0)
5800 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
41f8ce69 5801 map = bfd_zalloc (obfd, amt);
84d1d650
L
5802 if (map == NULL)
5803 return FALSE;
5804
5805 /* Initialize the fields of the output segment map with the
5806 input segment. */
5807 map->next = NULL;
5808 map->p_type = segment->p_type;
5809 map->p_flags = segment->p_flags;
5810 map->p_flags_valid = 1;
5811 map->p_paddr = segment->p_paddr;
5812 map->p_paddr_valid = 1;
3f570048
AM
5813 map->p_align = segment->p_align;
5814 map->p_align_valid = 1;
84d1d650
L
5815
5816 /* Determine if this segment contains the ELF file header
5817 and if it contains the program headers themselves. */
5818 map->includes_filehdr = (segment->p_offset == 0
5819 && segment->p_filesz >= iehdr->e_ehsize);
5820
5821 map->includes_phdrs = 0;
5822 if (! phdr_included || segment->p_type != PT_LOAD)
5823 {
5824 map->includes_phdrs =
5825 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5826 && (segment->p_offset + segment->p_filesz
5827 >= ((bfd_vma) iehdr->e_phoff
5828 + iehdr->e_phnum * iehdr->e_phentsize)));
5829
5830 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5831 phdr_included = TRUE;
5832 }
5833
5834 if (section_count != 0)
5835 {
5836 unsigned int isec = 0;
5837
5838 for (section = ibfd->sections;
5839 section != NULL;
5840 section = section->next)
5841 {
5842 this_hdr = &(elf_section_data(section)->this_hdr);
5843 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5844 map->sections[isec++] = section->output_section;
5845 }
5846 }
5847
5848 map->count = section_count;
5849 *pointer_to_map = map;
5850 pointer_to_map = &map->next;
5851 }
5852
5853 elf_tdata (obfd)->segment_map = map_first;
5854 return TRUE;
5855}
5856
5857/* Copy private BFD data. This copies or rewrites ELF program header
5858 information. */
5859
5860static bfd_boolean
5861copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5862{
84d1d650
L
5863 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5864 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5865 return TRUE;
5866
5867 if (elf_tdata (ibfd)->phdr == NULL)
5868 return TRUE;
5869
5870 if (ibfd->xvec == obfd->xvec)
5871 {
5872 /* Check if any sections in the input BFD covered by ELF program
5873 header are changed. */
d55ce4e2 5874 Elf_Internal_Phdr *segment;
84d1d650
L
5875 asection *section, *osec;
5876 unsigned int i, num_segments;
5877 Elf_Internal_Shdr *this_hdr;
5878
5879 /* Initialize the segment mark field. */
5880 for (section = obfd->sections; section != NULL;
5881 section = section->next)
5882 section->segment_mark = FALSE;
5883
5884 num_segments = elf_elfheader (ibfd)->e_phnum;
5885 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5886 i < num_segments;
5887 i++, segment++)
5888 {
5889 for (section = ibfd->sections;
5890 section != NULL; section = section->next)
5891 {
5892 /* We mark the output section so that we know it comes
5893 from the input BFD. */
5894 osec = section->output_section;
5895 if (osec)
5896 osec->segment_mark = TRUE;
5897
5898 /* Check if this section is covered by the segment. */
5899 this_hdr = &(elf_section_data(section)->this_hdr);
5900 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5901 {
5902 /* FIXME: Check if its output section is changed or
5903 removed. What else do we need to check? */
5904 if (osec == NULL
5905 || section->flags != osec->flags
5906 || section->lma != osec->lma
5907 || section->vma != osec->vma
5908 || section->size != osec->size
5909 || section->rawsize != osec->rawsize
5910 || section->alignment_power != osec->alignment_power)
5911 goto rewrite;
5912 }
5913 }
5914 }
5915
5916 /* Check to see if any output section doesn't come from the
5917 input BFD. */
5918 for (section = obfd->sections; section != NULL;
5919 section = section->next)
5920 {
5921 if (section->segment_mark == FALSE)
5922 goto rewrite;
5923 else
5924 section->segment_mark = FALSE;
5925 }
5926
5927 return copy_elf_program_header (ibfd, obfd);
5928 }
5929
5930rewrite:
5931 return rewrite_elf_program_header (ibfd, obfd);
5932}
5933
ccd2ec6a
L
5934/* Initialize private output section information from input section. */
5935
5936bfd_boolean
5937_bfd_elf_init_private_section_data (bfd *ibfd,
5938 asection *isec,
5939 bfd *obfd,
5940 asection *osec,
5941 struct bfd_link_info *link_info)
5942
5943{
5944 Elf_Internal_Shdr *ihdr, *ohdr;
5945 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
5946
5947 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5948 || obfd->xvec->flavour != bfd_target_elf_flavour)
5949 return TRUE;
5950
e843e0f8 5951 /* Don't copy the output ELF section type from input if the
d3fd4074 5952 output BFD section flags have been set to something different.
e843e0f8
L
5953 elf_fake_sections will set ELF section type based on BFD
5954 section flags. */
8b95791f
AM
5955 if (osec->flags == isec->flags
5956 || (osec->flags == 0 && elf_section_type (osec) == SHT_NULL))
ccd2ec6a
L
5957 elf_section_type (osec) = elf_section_type (isec);
5958
5959 /* Set things up for objcopy and relocatable link. The output
5960 SHT_GROUP section will have its elf_next_in_group pointing back
5961 to the input group members. Ignore linker created group section.
5962 See elfNN_ia64_object_p in elfxx-ia64.c. */
ccd2ec6a
L
5963 if (need_group)
5964 {
5965 if (elf_sec_group (isec) == NULL
5966 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5967 {
5968 if (elf_section_flags (isec) & SHF_GROUP)
5969 elf_section_flags (osec) |= SHF_GROUP;
5970 elf_next_in_group (osec) = elf_next_in_group (isec);
5971 elf_group_name (osec) = elf_group_name (isec);
5972 }
5973 }
5974
5975 ihdr = &elf_section_data (isec)->this_hdr;
5976
5977 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
5978 don't use the output section of the linked-to section since it
5979 may be NULL at this point. */
5980 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
5981 {
5982 ohdr = &elf_section_data (osec)->this_hdr;
5983 ohdr->sh_flags |= SHF_LINK_ORDER;
5984 elf_linked_to_section (osec) = elf_linked_to_section (isec);
5985 }
5986
5987 osec->use_rela_p = isec->use_rela_p;
5988
5989 return TRUE;
5990}
5991
252b5132
RH
5992/* Copy private section information. This copies over the entsize
5993 field, and sometimes the info field. */
5994
b34976b6 5995bfd_boolean
217aa764
AM
5996_bfd_elf_copy_private_section_data (bfd *ibfd,
5997 asection *isec,
5998 bfd *obfd,
5999 asection *osec)
252b5132
RH
6000{
6001 Elf_Internal_Shdr *ihdr, *ohdr;
6002
6003 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6004 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6005 return TRUE;
252b5132 6006
252b5132
RH
6007 ihdr = &elf_section_data (isec)->this_hdr;
6008 ohdr = &elf_section_data (osec)->this_hdr;
6009
6010 ohdr->sh_entsize = ihdr->sh_entsize;
6011
6012 if (ihdr->sh_type == SHT_SYMTAB
6013 || ihdr->sh_type == SHT_DYNSYM
6014 || ihdr->sh_type == SHT_GNU_verneed
6015 || ihdr->sh_type == SHT_GNU_verdef)
6016 ohdr->sh_info = ihdr->sh_info;
6017
ccd2ec6a
L
6018 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6019 NULL);
252b5132
RH
6020}
6021
80fccad2
BW
6022/* Copy private header information. */
6023
6024bfd_boolean
6025_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6026{
30288845
AM
6027 asection *isec;
6028
80fccad2
BW
6029 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6030 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6031 return TRUE;
6032
6033 /* Copy over private BFD data if it has not already been copied.
6034 This must be done here, rather than in the copy_private_bfd_data
6035 entry point, because the latter is called after the section
6036 contents have been set, which means that the program headers have
6037 already been worked out. */
6038 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6039 {
6040 if (! copy_private_bfd_data (ibfd, obfd))
6041 return FALSE;
6042 }
6043
30288845
AM
6044 /* _bfd_elf_copy_private_section_data copied over the SHF_GROUP flag
6045 but this might be wrong if we deleted the group section. */
6046 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
6047 if (elf_section_type (isec) == SHT_GROUP
6048 && isec->output_section == NULL)
6049 {
6050 asection *first = elf_next_in_group (isec);
6051 asection *s = first;
6052 while (s != NULL)
6053 {
6054 if (s->output_section != NULL)
6055 {
6056 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6057 elf_group_name (s->output_section) = NULL;
6058 }
6059 s = elf_next_in_group (s);
6060 if (s == first)
6061 break;
6062 }
6063 }
6064
80fccad2
BW
6065 return TRUE;
6066}
6067
252b5132
RH
6068/* Copy private symbol information. If this symbol is in a section
6069 which we did not map into a BFD section, try to map the section
6070 index correctly. We use special macro definitions for the mapped
6071 section indices; these definitions are interpreted by the
6072 swap_out_syms function. */
6073
9ad5cbcf
AM
6074#define MAP_ONESYMTAB (SHN_HIOS + 1)
6075#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6076#define MAP_STRTAB (SHN_HIOS + 3)
6077#define MAP_SHSTRTAB (SHN_HIOS + 4)
6078#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6079
b34976b6 6080bfd_boolean
217aa764
AM
6081_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6082 asymbol *isymarg,
6083 bfd *obfd,
6084 asymbol *osymarg)
252b5132
RH
6085{
6086 elf_symbol_type *isym, *osym;
6087
6088 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6089 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6090 return TRUE;
252b5132
RH
6091
6092 isym = elf_symbol_from (ibfd, isymarg);
6093 osym = elf_symbol_from (obfd, osymarg);
6094
6095 if (isym != NULL
6096 && osym != NULL
6097 && bfd_is_abs_section (isym->symbol.section))
6098 {
6099 unsigned int shndx;
6100
6101 shndx = isym->internal_elf_sym.st_shndx;
6102 if (shndx == elf_onesymtab (ibfd))
6103 shndx = MAP_ONESYMTAB;
6104 else if (shndx == elf_dynsymtab (ibfd))
6105 shndx = MAP_DYNSYMTAB;
6106 else if (shndx == elf_tdata (ibfd)->strtab_section)
6107 shndx = MAP_STRTAB;
6108 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6109 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6110 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6111 shndx = MAP_SYM_SHNDX;
252b5132
RH
6112 osym->internal_elf_sym.st_shndx = shndx;
6113 }
6114
b34976b6 6115 return TRUE;
252b5132
RH
6116}
6117
6118/* Swap out the symbols. */
6119
b34976b6 6120static bfd_boolean
217aa764
AM
6121swap_out_syms (bfd *abfd,
6122 struct bfd_strtab_hash **sttp,
6123 int relocatable_p)
252b5132 6124{
9c5bfbb7 6125 const struct elf_backend_data *bed;
079e9a2f
AM
6126 int symcount;
6127 asymbol **syms;
6128 struct bfd_strtab_hash *stt;
6129 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6130 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6131 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6132 bfd_byte *outbound_syms;
6133 bfd_byte *outbound_shndx;
079e9a2f
AM
6134 int idx;
6135 bfd_size_type amt;
174fd7f9 6136 bfd_boolean name_local_sections;
252b5132
RH
6137
6138 if (!elf_map_symbols (abfd))
b34976b6 6139 return FALSE;
252b5132 6140
c044fabd 6141 /* Dump out the symtabs. */
079e9a2f
AM
6142 stt = _bfd_elf_stringtab_init ();
6143 if (stt == NULL)
b34976b6 6144 return FALSE;
252b5132 6145
079e9a2f
AM
6146 bed = get_elf_backend_data (abfd);
6147 symcount = bfd_get_symcount (abfd);
6148 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6149 symtab_hdr->sh_type = SHT_SYMTAB;
6150 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6151 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6152 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 6153 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
6154
6155 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6156 symstrtab_hdr->sh_type = SHT_STRTAB;
6157
d0fb9a8d 6158 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 6159 if (outbound_syms == NULL)
5ed6aba4
NC
6160 {
6161 _bfd_stringtab_free (stt);
6162 return FALSE;
6163 }
217aa764 6164 symtab_hdr->contents = outbound_syms;
252b5132 6165
9ad5cbcf
AM
6166 outbound_shndx = NULL;
6167 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6168 if (symtab_shndx_hdr->sh_name != 0)
6169 {
6170 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
6171 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
6172 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6173 if (outbound_shndx == NULL)
5ed6aba4
NC
6174 {
6175 _bfd_stringtab_free (stt);
6176 return FALSE;
6177 }
6178
9ad5cbcf
AM
6179 symtab_shndx_hdr->contents = outbound_shndx;
6180 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6181 symtab_shndx_hdr->sh_size = amt;
6182 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6183 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6184 }
6185
589e6347 6186 /* Now generate the data (for "contents"). */
079e9a2f
AM
6187 {
6188 /* Fill in zeroth symbol and swap it out. */
6189 Elf_Internal_Sym sym;
6190 sym.st_name = 0;
6191 sym.st_value = 0;
6192 sym.st_size = 0;
6193 sym.st_info = 0;
6194 sym.st_other = 0;
6195 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6196 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6197 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6198 if (outbound_shndx != NULL)
6199 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6200 }
252b5132 6201
174fd7f9
RS
6202 name_local_sections
6203 = (bed->elf_backend_name_local_section_symbols
6204 && bed->elf_backend_name_local_section_symbols (abfd));
6205
079e9a2f
AM
6206 syms = bfd_get_outsymbols (abfd);
6207 for (idx = 0; idx < symcount; idx++)
252b5132 6208 {
252b5132 6209 Elf_Internal_Sym sym;
079e9a2f
AM
6210 bfd_vma value = syms[idx]->value;
6211 elf_symbol_type *type_ptr;
6212 flagword flags = syms[idx]->flags;
6213 int type;
252b5132 6214
174fd7f9
RS
6215 if (!name_local_sections
6216 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6217 {
6218 /* Local section symbols have no name. */
6219 sym.st_name = 0;
6220 }
6221 else
6222 {
6223 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6224 syms[idx]->name,
b34976b6 6225 TRUE, FALSE);
079e9a2f 6226 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6227 {
6228 _bfd_stringtab_free (stt);
6229 return FALSE;
6230 }
079e9a2f 6231 }
252b5132 6232
079e9a2f 6233 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6234
079e9a2f
AM
6235 if ((flags & BSF_SECTION_SYM) == 0
6236 && bfd_is_com_section (syms[idx]->section))
6237 {
6238 /* ELF common symbols put the alignment into the `value' field,
6239 and the size into the `size' field. This is backwards from
6240 how BFD handles it, so reverse it here. */
6241 sym.st_size = value;
6242 if (type_ptr == NULL
6243 || type_ptr->internal_elf_sym.st_value == 0)
6244 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6245 else
6246 sym.st_value = type_ptr->internal_elf_sym.st_value;
6247 sym.st_shndx = _bfd_elf_section_from_bfd_section
6248 (abfd, syms[idx]->section);
6249 }
6250 else
6251 {
6252 asection *sec = syms[idx]->section;
6253 int shndx;
252b5132 6254
079e9a2f
AM
6255 if (sec->output_section)
6256 {
6257 value += sec->output_offset;
6258 sec = sec->output_section;
6259 }
589e6347 6260
079e9a2f
AM
6261 /* Don't add in the section vma for relocatable output. */
6262 if (! relocatable_p)
6263 value += sec->vma;
6264 sym.st_value = value;
6265 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6266
6267 if (bfd_is_abs_section (sec)
6268 && type_ptr != NULL
6269 && type_ptr->internal_elf_sym.st_shndx != 0)
6270 {
6271 /* This symbol is in a real ELF section which we did
6272 not create as a BFD section. Undo the mapping done
6273 by copy_private_symbol_data. */
6274 shndx = type_ptr->internal_elf_sym.st_shndx;
6275 switch (shndx)
6276 {
6277 case MAP_ONESYMTAB:
6278 shndx = elf_onesymtab (abfd);
6279 break;
6280 case MAP_DYNSYMTAB:
6281 shndx = elf_dynsymtab (abfd);
6282 break;
6283 case MAP_STRTAB:
6284 shndx = elf_tdata (abfd)->strtab_section;
6285 break;
6286 case MAP_SHSTRTAB:
6287 shndx = elf_tdata (abfd)->shstrtab_section;
6288 break;
9ad5cbcf
AM
6289 case MAP_SYM_SHNDX:
6290 shndx = elf_tdata (abfd)->symtab_shndx_section;
6291 break;
079e9a2f
AM
6292 default:
6293 break;
6294 }
6295 }
6296 else
6297 {
6298 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6299
079e9a2f
AM
6300 if (shndx == -1)
6301 {
6302 asection *sec2;
6303
6304 /* Writing this would be a hell of a lot easier if
6305 we had some decent documentation on bfd, and
6306 knew what to expect of the library, and what to
6307 demand of applications. For example, it
6308 appears that `objcopy' might not set the
6309 section of a symbol to be a section that is
6310 actually in the output file. */
6311 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6312 if (sec2 == NULL)
6313 {
6314 _bfd_error_handler (_("\
6315Unable to find equivalent output section for symbol '%s' from section '%s'"),
6316 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6317 sec->name);
811072d8 6318 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6319 _bfd_stringtab_free (stt);
589e6347
NC
6320 return FALSE;
6321 }
811072d8 6322
079e9a2f
AM
6323 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
6324 BFD_ASSERT (shndx != -1);
6325 }
6326 }
252b5132 6327
079e9a2f
AM
6328 sym.st_shndx = shndx;
6329 }
252b5132 6330
13ae64f3
JJ
6331 if ((flags & BSF_THREAD_LOCAL) != 0)
6332 type = STT_TLS;
6333 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6334 type = STT_FUNC;
6335 else if ((flags & BSF_OBJECT) != 0)
6336 type = STT_OBJECT;
6337 else
6338 type = STT_NOTYPE;
252b5132 6339
13ae64f3
JJ
6340 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6341 type = STT_TLS;
6342
589e6347 6343 /* Processor-specific types. */
079e9a2f
AM
6344 if (type_ptr != NULL
6345 && bed->elf_backend_get_symbol_type)
6346 type = ((*bed->elf_backend_get_symbol_type)
6347 (&type_ptr->internal_elf_sym, type));
252b5132 6348
079e9a2f
AM
6349 if (flags & BSF_SECTION_SYM)
6350 {
6351 if (flags & BSF_GLOBAL)
6352 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6353 else
6354 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6355 }
6356 else if (bfd_is_com_section (syms[idx]->section))
6357 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
6358 else if (bfd_is_und_section (syms[idx]->section))
6359 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6360 ? STB_WEAK
6361 : STB_GLOBAL),
6362 type);
6363 else if (flags & BSF_FILE)
6364 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6365 else
6366 {
6367 int bind = STB_LOCAL;
252b5132 6368
079e9a2f
AM
6369 if (flags & BSF_LOCAL)
6370 bind = STB_LOCAL;
6371 else if (flags & BSF_WEAK)
6372 bind = STB_WEAK;
6373 else if (flags & BSF_GLOBAL)
6374 bind = STB_GLOBAL;
252b5132 6375
079e9a2f
AM
6376 sym.st_info = ELF_ST_INFO (bind, type);
6377 }
252b5132 6378
079e9a2f
AM
6379 if (type_ptr != NULL)
6380 sym.st_other = type_ptr->internal_elf_sym.st_other;
6381 else
6382 sym.st_other = 0;
252b5132 6383
9ad5cbcf 6384 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6385 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6386 if (outbound_shndx != NULL)
6387 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6388 }
252b5132 6389
079e9a2f
AM
6390 *sttp = stt;
6391 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6392 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6393
079e9a2f
AM
6394 symstrtab_hdr->sh_flags = 0;
6395 symstrtab_hdr->sh_addr = 0;
6396 symstrtab_hdr->sh_entsize = 0;
6397 symstrtab_hdr->sh_link = 0;
6398 symstrtab_hdr->sh_info = 0;
6399 symstrtab_hdr->sh_addralign = 1;
252b5132 6400
b34976b6 6401 return TRUE;
252b5132
RH
6402}
6403
6404/* Return the number of bytes required to hold the symtab vector.
6405
6406 Note that we base it on the count plus 1, since we will null terminate
6407 the vector allocated based on this size. However, the ELF symbol table
6408 always has a dummy entry as symbol #0, so it ends up even. */
6409
6410long
217aa764 6411_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6412{
6413 long symcount;
6414 long symtab_size;
6415 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6416
6417 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6418 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6419 if (symcount > 0)
6420 symtab_size -= sizeof (asymbol *);
252b5132
RH
6421
6422 return symtab_size;
6423}
6424
6425long
217aa764 6426_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6427{
6428 long symcount;
6429 long symtab_size;
6430 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6431
6432 if (elf_dynsymtab (abfd) == 0)
6433 {
6434 bfd_set_error (bfd_error_invalid_operation);
6435 return -1;
6436 }
6437
6438 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6439 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6440 if (symcount > 0)
6441 symtab_size -= sizeof (asymbol *);
252b5132
RH
6442
6443 return symtab_size;
6444}
6445
6446long
217aa764
AM
6447_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6448 sec_ptr asect)
252b5132
RH
6449{
6450 return (asect->reloc_count + 1) * sizeof (arelent *);
6451}
6452
6453/* Canonicalize the relocs. */
6454
6455long
217aa764
AM
6456_bfd_elf_canonicalize_reloc (bfd *abfd,
6457 sec_ptr section,
6458 arelent **relptr,
6459 asymbol **symbols)
252b5132
RH
6460{
6461 arelent *tblptr;
6462 unsigned int i;
9c5bfbb7 6463 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6464
b34976b6 6465 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6466 return -1;
6467
6468 tblptr = section->relocation;
6469 for (i = 0; i < section->reloc_count; i++)
6470 *relptr++ = tblptr++;
6471
6472 *relptr = NULL;
6473
6474 return section->reloc_count;
6475}
6476
6477long
6cee3f79 6478_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6479{
9c5bfbb7 6480 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6481 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6482
6483 if (symcount >= 0)
6484 bfd_get_symcount (abfd) = symcount;
6485 return symcount;
6486}
6487
6488long
217aa764
AM
6489_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6490 asymbol **allocation)
252b5132 6491{
9c5bfbb7 6492 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6493 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6494
6495 if (symcount >= 0)
6496 bfd_get_dynamic_symcount (abfd) = symcount;
6497 return symcount;
252b5132
RH
6498}
6499
8615f3f2
AM
6500/* Return the size required for the dynamic reloc entries. Any loadable
6501 section that was actually installed in the BFD, and has type SHT_REL
6502 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6503 dynamic reloc section. */
252b5132
RH
6504
6505long
217aa764 6506_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6507{
6508 long ret;
6509 asection *s;
6510
6511 if (elf_dynsymtab (abfd) == 0)
6512 {
6513 bfd_set_error (bfd_error_invalid_operation);
6514 return -1;
6515 }
6516
6517 ret = sizeof (arelent *);
6518 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6519 if ((s->flags & SEC_LOAD) != 0
6520 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6521 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6522 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6523 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6524 * sizeof (arelent *));
6525
6526 return ret;
6527}
6528
8615f3f2
AM
6529/* Canonicalize the dynamic relocation entries. Note that we return the
6530 dynamic relocations as a single block, although they are actually
6531 associated with particular sections; the interface, which was
6532 designed for SunOS style shared libraries, expects that there is only
6533 one set of dynamic relocs. Any loadable section that was actually
6534 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6535 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6536
6537long
217aa764
AM
6538_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6539 arelent **storage,
6540 asymbol **syms)
252b5132 6541{
217aa764 6542 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6543 asection *s;
6544 long ret;
6545
6546 if (elf_dynsymtab (abfd) == 0)
6547 {
6548 bfd_set_error (bfd_error_invalid_operation);
6549 return -1;
6550 }
6551
6552 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6553 ret = 0;
6554 for (s = abfd->sections; s != NULL; s = s->next)
6555 {
8615f3f2
AM
6556 if ((s->flags & SEC_LOAD) != 0
6557 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6558 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6559 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6560 {
6561 arelent *p;
6562 long count, i;
6563
b34976b6 6564 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6565 return -1;
eea6121a 6566 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6567 p = s->relocation;
6568 for (i = 0; i < count; i++)
6569 *storage++ = p++;
6570 ret += count;
6571 }
6572 }
6573
6574 *storage = NULL;
6575
6576 return ret;
6577}
6578\f
6579/* Read in the version information. */
6580
b34976b6 6581bfd_boolean
fc0e6df6 6582_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6583{
6584 bfd_byte *contents = NULL;
fc0e6df6
PB
6585 unsigned int freeidx = 0;
6586
6587 if (elf_dynverref (abfd) != 0)
6588 {
6589 Elf_Internal_Shdr *hdr;
6590 Elf_External_Verneed *everneed;
6591 Elf_Internal_Verneed *iverneed;
6592 unsigned int i;
d0fb9a8d 6593 bfd_byte *contents_end;
fc0e6df6
PB
6594
6595 hdr = &elf_tdata (abfd)->dynverref_hdr;
6596
d0fb9a8d
JJ
6597 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6598 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6599 if (elf_tdata (abfd)->verref == NULL)
6600 goto error_return;
6601
6602 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6603
6604 contents = bfd_malloc (hdr->sh_size);
6605 if (contents == NULL)
d0fb9a8d
JJ
6606 {
6607error_return_verref:
6608 elf_tdata (abfd)->verref = NULL;
6609 elf_tdata (abfd)->cverrefs = 0;
6610 goto error_return;
6611 }
fc0e6df6
PB
6612 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6613 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6614 goto error_return_verref;
fc0e6df6 6615
d0fb9a8d
JJ
6616 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6617 goto error_return_verref;
6618
6619 BFD_ASSERT (sizeof (Elf_External_Verneed)
6620 == sizeof (Elf_External_Vernaux));
6621 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6622 everneed = (Elf_External_Verneed *) contents;
6623 iverneed = elf_tdata (abfd)->verref;
6624 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6625 {
6626 Elf_External_Vernaux *evernaux;
6627 Elf_Internal_Vernaux *ivernaux;
6628 unsigned int j;
6629
6630 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6631
6632 iverneed->vn_bfd = abfd;
6633
6634 iverneed->vn_filename =
6635 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6636 iverneed->vn_file);
6637 if (iverneed->vn_filename == NULL)
d0fb9a8d 6638 goto error_return_verref;
fc0e6df6 6639
d0fb9a8d
JJ
6640 if (iverneed->vn_cnt == 0)
6641 iverneed->vn_auxptr = NULL;
6642 else
6643 {
6644 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6645 sizeof (Elf_Internal_Vernaux));
6646 if (iverneed->vn_auxptr == NULL)
6647 goto error_return_verref;
6648 }
6649
6650 if (iverneed->vn_aux
6651 > (size_t) (contents_end - (bfd_byte *) everneed))
6652 goto error_return_verref;
fc0e6df6
PB
6653
6654 evernaux = ((Elf_External_Vernaux *)
6655 ((bfd_byte *) everneed + iverneed->vn_aux));
6656 ivernaux = iverneed->vn_auxptr;
6657 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6658 {
6659 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6660
6661 ivernaux->vna_nodename =
6662 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6663 ivernaux->vna_name);
6664 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6665 goto error_return_verref;
fc0e6df6
PB
6666
6667 if (j + 1 < iverneed->vn_cnt)
6668 ivernaux->vna_nextptr = ivernaux + 1;
6669 else
6670 ivernaux->vna_nextptr = NULL;
6671
d0fb9a8d
JJ
6672 if (ivernaux->vna_next
6673 > (size_t) (contents_end - (bfd_byte *) evernaux))
6674 goto error_return_verref;
6675
fc0e6df6
PB
6676 evernaux = ((Elf_External_Vernaux *)
6677 ((bfd_byte *) evernaux + ivernaux->vna_next));
6678
6679 if (ivernaux->vna_other > freeidx)
6680 freeidx = ivernaux->vna_other;
6681 }
6682
6683 if (i + 1 < hdr->sh_info)
6684 iverneed->vn_nextref = iverneed + 1;
6685 else
6686 iverneed->vn_nextref = NULL;
6687
d0fb9a8d
JJ
6688 if (iverneed->vn_next
6689 > (size_t) (contents_end - (bfd_byte *) everneed))
6690 goto error_return_verref;
6691
fc0e6df6
PB
6692 everneed = ((Elf_External_Verneed *)
6693 ((bfd_byte *) everneed + iverneed->vn_next));
6694 }
6695
6696 free (contents);
6697 contents = NULL;
6698 }
252b5132
RH
6699
6700 if (elf_dynverdef (abfd) != 0)
6701 {
6702 Elf_Internal_Shdr *hdr;
6703 Elf_External_Verdef *everdef;
6704 Elf_Internal_Verdef *iverdef;
f631889e
UD
6705 Elf_Internal_Verdef *iverdefarr;
6706 Elf_Internal_Verdef iverdefmem;
252b5132 6707 unsigned int i;
062e2358 6708 unsigned int maxidx;
d0fb9a8d 6709 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6710
6711 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6712
217aa764 6713 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6714 if (contents == NULL)
6715 goto error_return;
6716 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6717 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6718 goto error_return;
6719
d0fb9a8d
JJ
6720 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6721 goto error_return;
6722
6723 BFD_ASSERT (sizeof (Elf_External_Verdef)
6724 >= sizeof (Elf_External_Verdaux));
6725 contents_end_def = contents + hdr->sh_size
6726 - sizeof (Elf_External_Verdef);
6727 contents_end_aux = contents + hdr->sh_size
6728 - sizeof (Elf_External_Verdaux);
6729
f631889e
UD
6730 /* We know the number of entries in the section but not the maximum
6731 index. Therefore we have to run through all entries and find
6732 the maximum. */
252b5132 6733 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6734 maxidx = 0;
6735 for (i = 0; i < hdr->sh_info; ++i)
6736 {
6737 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6738
062e2358
AM
6739 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6740 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6741
d0fb9a8d
JJ
6742 if (iverdefmem.vd_next
6743 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6744 goto error_return;
6745
f631889e
UD
6746 everdef = ((Elf_External_Verdef *)
6747 ((bfd_byte *) everdef + iverdefmem.vd_next));
6748 }
6749
fc0e6df6
PB
6750 if (default_imported_symver)
6751 {
6752 if (freeidx > maxidx)
6753 maxidx = ++freeidx;
6754 else
6755 freeidx = ++maxidx;
6756 }
d0fb9a8d
JJ
6757 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6758 sizeof (Elf_Internal_Verdef));
f631889e
UD
6759 if (elf_tdata (abfd)->verdef == NULL)
6760 goto error_return;
6761
6762 elf_tdata (abfd)->cverdefs = maxidx;
6763
6764 everdef = (Elf_External_Verdef *) contents;
6765 iverdefarr = elf_tdata (abfd)->verdef;
6766 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6767 {
6768 Elf_External_Verdaux *everdaux;
6769 Elf_Internal_Verdaux *iverdaux;
6770 unsigned int j;
6771
f631889e
UD
6772 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6773
d0fb9a8d
JJ
6774 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6775 {
6776error_return_verdef:
6777 elf_tdata (abfd)->verdef = NULL;
6778 elf_tdata (abfd)->cverdefs = 0;
6779 goto error_return;
6780 }
6781
f631889e
UD
6782 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6783 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6784
6785 iverdef->vd_bfd = abfd;
6786
d0fb9a8d
JJ
6787 if (iverdef->vd_cnt == 0)
6788 iverdef->vd_auxptr = NULL;
6789 else
6790 {
6791 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6792 sizeof (Elf_Internal_Verdaux));
6793 if (iverdef->vd_auxptr == NULL)
6794 goto error_return_verdef;
6795 }
6796
6797 if (iverdef->vd_aux
6798 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6799 goto error_return_verdef;
252b5132
RH
6800
6801 everdaux = ((Elf_External_Verdaux *)
6802 ((bfd_byte *) everdef + iverdef->vd_aux));
6803 iverdaux = iverdef->vd_auxptr;
6804 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6805 {
6806 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6807
6808 iverdaux->vda_nodename =
6809 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6810 iverdaux->vda_name);
6811 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6812 goto error_return_verdef;
252b5132
RH
6813
6814 if (j + 1 < iverdef->vd_cnt)
6815 iverdaux->vda_nextptr = iverdaux + 1;
6816 else
6817 iverdaux->vda_nextptr = NULL;
6818
d0fb9a8d
JJ
6819 if (iverdaux->vda_next
6820 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6821 goto error_return_verdef;
6822
252b5132
RH
6823 everdaux = ((Elf_External_Verdaux *)
6824 ((bfd_byte *) everdaux + iverdaux->vda_next));
6825 }
6826
d0fb9a8d
JJ
6827 if (iverdef->vd_cnt)
6828 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6829
d0fb9a8d 6830 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6831 iverdef->vd_nextdef = iverdef + 1;
6832 else
6833 iverdef->vd_nextdef = NULL;
6834
6835 everdef = ((Elf_External_Verdef *)
6836 ((bfd_byte *) everdef + iverdef->vd_next));
6837 }
6838
6839 free (contents);
6840 contents = NULL;
6841 }
fc0e6df6 6842 else if (default_imported_symver)
252b5132 6843 {
fc0e6df6
PB
6844 if (freeidx < 3)
6845 freeidx = 3;
6846 else
6847 freeidx++;
252b5132 6848
d0fb9a8d
JJ
6849 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6850 sizeof (Elf_Internal_Verdef));
fc0e6df6 6851 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6852 goto error_return;
6853
fc0e6df6
PB
6854 elf_tdata (abfd)->cverdefs = freeidx;
6855 }
252b5132 6856
fc0e6df6
PB
6857 /* Create a default version based on the soname. */
6858 if (default_imported_symver)
6859 {
6860 Elf_Internal_Verdef *iverdef;
6861 Elf_Internal_Verdaux *iverdaux;
252b5132 6862
fc0e6df6 6863 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6864
fc0e6df6
PB
6865 iverdef->vd_version = VER_DEF_CURRENT;
6866 iverdef->vd_flags = 0;
6867 iverdef->vd_ndx = freeidx;
6868 iverdef->vd_cnt = 1;
252b5132 6869
fc0e6df6 6870 iverdef->vd_bfd = abfd;
252b5132 6871
fc0e6df6
PB
6872 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6873 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6874 goto error_return_verdef;
fc0e6df6 6875 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6876 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6877 if (iverdef->vd_auxptr == NULL)
6878 goto error_return_verdef;
252b5132 6879
fc0e6df6
PB
6880 iverdaux = iverdef->vd_auxptr;
6881 iverdaux->vda_nodename = iverdef->vd_nodename;
6882 iverdaux->vda_nextptr = NULL;
252b5132
RH
6883 }
6884
b34976b6 6885 return TRUE;
252b5132
RH
6886
6887 error_return:
5ed6aba4 6888 if (contents != NULL)
252b5132 6889 free (contents);
b34976b6 6890 return FALSE;
252b5132
RH
6891}
6892\f
6893asymbol *
217aa764 6894_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6895{
6896 elf_symbol_type *newsym;
dc810e39 6897 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6898
217aa764 6899 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6900 if (!newsym)
6901 return NULL;
6902 else
6903 {
6904 newsym->symbol.the_bfd = abfd;
6905 return &newsym->symbol;
6906 }
6907}
6908
6909void
217aa764
AM
6910_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6911 asymbol *symbol,
6912 symbol_info *ret)
252b5132
RH
6913{
6914 bfd_symbol_info (symbol, ret);
6915}
6916
6917/* Return whether a symbol name implies a local symbol. Most targets
6918 use this function for the is_local_label_name entry point, but some
6919 override it. */
6920
b34976b6 6921bfd_boolean
217aa764
AM
6922_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6923 const char *name)
252b5132
RH
6924{
6925 /* Normal local symbols start with ``.L''. */
6926 if (name[0] == '.' && name[1] == 'L')
b34976b6 6927 return TRUE;
252b5132
RH
6928
6929 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6930 DWARF debugging symbols starting with ``..''. */
6931 if (name[0] == '.' && name[1] == '.')
b34976b6 6932 return TRUE;
252b5132
RH
6933
6934 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6935 emitting DWARF debugging output. I suspect this is actually a
6936 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6937 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6938 underscore to be emitted on some ELF targets). For ease of use,
6939 we treat such symbols as local. */
6940 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6941 return TRUE;
252b5132 6942
b34976b6 6943 return FALSE;
252b5132
RH
6944}
6945
6946alent *
217aa764
AM
6947_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6948 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6949{
6950 abort ();
6951 return NULL;
6952}
6953
b34976b6 6954bfd_boolean
217aa764
AM
6955_bfd_elf_set_arch_mach (bfd *abfd,
6956 enum bfd_architecture arch,
6957 unsigned long machine)
252b5132
RH
6958{
6959 /* If this isn't the right architecture for this backend, and this
6960 isn't the generic backend, fail. */
6961 if (arch != get_elf_backend_data (abfd)->arch
6962 && arch != bfd_arch_unknown
6963 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6964 return FALSE;
252b5132
RH
6965
6966 return bfd_default_set_arch_mach (abfd, arch, machine);
6967}
6968
d1fad7c6
NC
6969/* Find the function to a particular section and offset,
6970 for error reporting. */
252b5132 6971
b34976b6 6972static bfd_boolean
217aa764
AM
6973elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6974 asection *section,
6975 asymbol **symbols,
6976 bfd_vma offset,
6977 const char **filename_ptr,
6978 const char **functionname_ptr)
252b5132 6979{
252b5132 6980 const char *filename;
57426232 6981 asymbol *func, *file;
252b5132
RH
6982 bfd_vma low_func;
6983 asymbol **p;
57426232
JB
6984 /* ??? Given multiple file symbols, it is impossible to reliably
6985 choose the right file name for global symbols. File symbols are
6986 local symbols, and thus all file symbols must sort before any
6987 global symbols. The ELF spec may be interpreted to say that a
6988 file symbol must sort before other local symbols, but currently
6989 ld -r doesn't do this. So, for ld -r output, it is possible to
6990 make a better choice of file name for local symbols by ignoring
6991 file symbols appearing after a given local symbol. */
6992 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 6993
252b5132
RH
6994 filename = NULL;
6995 func = NULL;
57426232 6996 file = NULL;
252b5132 6997 low_func = 0;
57426232 6998 state = nothing_seen;
252b5132
RH
6999
7000 for (p = symbols; *p != NULL; p++)
7001 {
7002 elf_symbol_type *q;
7003
7004 q = (elf_symbol_type *) *p;
7005
252b5132
RH
7006 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
7007 {
7008 default:
7009 break;
7010 case STT_FILE:
57426232
JB
7011 file = &q->symbol;
7012 if (state == symbol_seen)
7013 state = file_after_symbol_seen;
7014 continue;
252b5132
RH
7015 case STT_NOTYPE:
7016 case STT_FUNC:
6b40fcba 7017 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7018 && q->symbol.value >= low_func
7019 && q->symbol.value <= offset)
7020 {
7021 func = (asymbol *) q;
7022 low_func = q->symbol.value;
a1923858
AM
7023 filename = NULL;
7024 if (file != NULL
7025 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7026 || state != file_after_symbol_seen))
57426232 7027 filename = bfd_asymbol_name (file);
252b5132
RH
7028 }
7029 break;
7030 }
57426232
JB
7031 if (state == nothing_seen)
7032 state = symbol_seen;
252b5132
RH
7033 }
7034
7035 if (func == NULL)
b34976b6 7036 return FALSE;
252b5132 7037
d1fad7c6
NC
7038 if (filename_ptr)
7039 *filename_ptr = filename;
7040 if (functionname_ptr)
7041 *functionname_ptr = bfd_asymbol_name (func);
7042
b34976b6 7043 return TRUE;
d1fad7c6
NC
7044}
7045
7046/* Find the nearest line to a particular section and offset,
7047 for error reporting. */
7048
b34976b6 7049bfd_boolean
217aa764
AM
7050_bfd_elf_find_nearest_line (bfd *abfd,
7051 asection *section,
7052 asymbol **symbols,
7053 bfd_vma offset,
7054 const char **filename_ptr,
7055 const char **functionname_ptr,
7056 unsigned int *line_ptr)
d1fad7c6 7057{
b34976b6 7058 bfd_boolean found;
d1fad7c6
NC
7059
7060 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7061 filename_ptr, functionname_ptr,
7062 line_ptr))
d1fad7c6
NC
7063 {
7064 if (!*functionname_ptr)
4e8a9624
AM
7065 elf_find_function (abfd, section, symbols, offset,
7066 *filename_ptr ? NULL : filename_ptr,
7067 functionname_ptr);
7068
b34976b6 7069 return TRUE;
d1fad7c6
NC
7070 }
7071
7072 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7073 filename_ptr, functionname_ptr,
7074 line_ptr, 0,
7075 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7076 {
7077 if (!*functionname_ptr)
4e8a9624
AM
7078 elf_find_function (abfd, section, symbols, offset,
7079 *filename_ptr ? NULL : filename_ptr,
7080 functionname_ptr);
7081
b34976b6 7082 return TRUE;
d1fad7c6
NC
7083 }
7084
7085 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7086 &found, filename_ptr,
7087 functionname_ptr, line_ptr,
7088 &elf_tdata (abfd)->line_info))
b34976b6 7089 return FALSE;
dc43ada5 7090 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7091 return TRUE;
d1fad7c6
NC
7092
7093 if (symbols == NULL)
b34976b6 7094 return FALSE;
d1fad7c6
NC
7095
7096 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7097 filename_ptr, functionname_ptr))
b34976b6 7098 return FALSE;
d1fad7c6 7099
252b5132 7100 *line_ptr = 0;
b34976b6 7101 return TRUE;
252b5132
RH
7102}
7103
5420f73d
L
7104/* Find the line for a symbol. */
7105
7106bfd_boolean
7107_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7108 const char **filename_ptr, unsigned int *line_ptr)
7109{
7110 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7111 filename_ptr, line_ptr, 0,
7112 &elf_tdata (abfd)->dwarf2_find_line_info);
7113}
7114
4ab527b0
FF
7115/* After a call to bfd_find_nearest_line, successive calls to
7116 bfd_find_inliner_info can be used to get source information about
7117 each level of function inlining that terminated at the address
7118 passed to bfd_find_nearest_line. Currently this is only supported
7119 for DWARF2 with appropriate DWARF3 extensions. */
7120
7121bfd_boolean
7122_bfd_elf_find_inliner_info (bfd *abfd,
7123 const char **filename_ptr,
7124 const char **functionname_ptr,
7125 unsigned int *line_ptr)
7126{
7127 bfd_boolean found;
7128 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7129 functionname_ptr, line_ptr,
7130 & elf_tdata (abfd)->dwarf2_find_line_info);
7131 return found;
7132}
7133
252b5132 7134int
a6b96beb 7135_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7136{
8ded5a0f
AM
7137 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7138 int ret = bed->s->sizeof_ehdr;
252b5132 7139
a6b96beb 7140 if (!info->relocatable)
8ded5a0f 7141 {
62d7a5f6 7142 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7143
62d7a5f6
AM
7144 if (phdr_size == (bfd_size_type) -1)
7145 {
7146 struct elf_segment_map *m;
7147
7148 phdr_size = 0;
7149 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7150 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7151
62d7a5f6
AM
7152 if (phdr_size == 0)
7153 phdr_size = get_program_header_size (abfd, info);
7154 }
8ded5a0f
AM
7155
7156 elf_tdata (abfd)->program_header_size = phdr_size;
7157 ret += phdr_size;
7158 }
7159
252b5132
RH
7160 return ret;
7161}
7162
b34976b6 7163bfd_boolean
217aa764
AM
7164_bfd_elf_set_section_contents (bfd *abfd,
7165 sec_ptr section,
0f867abe 7166 const void *location,
217aa764
AM
7167 file_ptr offset,
7168 bfd_size_type count)
252b5132
RH
7169{
7170 Elf_Internal_Shdr *hdr;
dc810e39 7171 bfd_signed_vma pos;
252b5132
RH
7172
7173 if (! abfd->output_has_begun
217aa764 7174 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7175 return FALSE;
252b5132
RH
7176
7177 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7178 pos = hdr->sh_offset + offset;
7179 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7180 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7181 return FALSE;
252b5132 7182
b34976b6 7183 return TRUE;
252b5132
RH
7184}
7185
7186void
217aa764
AM
7187_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7188 arelent *cache_ptr ATTRIBUTE_UNUSED,
7189 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7190{
7191 abort ();
7192}
7193
252b5132
RH
7194/* Try to convert a non-ELF reloc into an ELF one. */
7195
b34976b6 7196bfd_boolean
217aa764 7197_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7198{
c044fabd 7199 /* Check whether we really have an ELF howto. */
252b5132
RH
7200
7201 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7202 {
7203 bfd_reloc_code_real_type code;
7204 reloc_howto_type *howto;
7205
7206 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7207 equivalent ELF reloc. */
252b5132
RH
7208
7209 if (areloc->howto->pc_relative)
7210 {
7211 switch (areloc->howto->bitsize)
7212 {
7213 case 8:
7214 code = BFD_RELOC_8_PCREL;
7215 break;
7216 case 12:
7217 code = BFD_RELOC_12_PCREL;
7218 break;
7219 case 16:
7220 code = BFD_RELOC_16_PCREL;
7221 break;
7222 case 24:
7223 code = BFD_RELOC_24_PCREL;
7224 break;
7225 case 32:
7226 code = BFD_RELOC_32_PCREL;
7227 break;
7228 case 64:
7229 code = BFD_RELOC_64_PCREL;
7230 break;
7231 default:
7232 goto fail;
7233 }
7234
7235 howto = bfd_reloc_type_lookup (abfd, code);
7236
7237 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7238 {
7239 if (howto->pcrel_offset)
7240 areloc->addend += areloc->address;
7241 else
7242 areloc->addend -= areloc->address; /* addend is unsigned!! */
7243 }
7244 }
7245 else
7246 {
7247 switch (areloc->howto->bitsize)
7248 {
7249 case 8:
7250 code = BFD_RELOC_8;
7251 break;
7252 case 14:
7253 code = BFD_RELOC_14;
7254 break;
7255 case 16:
7256 code = BFD_RELOC_16;
7257 break;
7258 case 26:
7259 code = BFD_RELOC_26;
7260 break;
7261 case 32:
7262 code = BFD_RELOC_32;
7263 break;
7264 case 64:
7265 code = BFD_RELOC_64;
7266 break;
7267 default:
7268 goto fail;
7269 }
7270
7271 howto = bfd_reloc_type_lookup (abfd, code);
7272 }
7273
7274 if (howto)
7275 areloc->howto = howto;
7276 else
7277 goto fail;
7278 }
7279
b34976b6 7280 return TRUE;
252b5132
RH
7281
7282 fail:
7283 (*_bfd_error_handler)
d003868e
AM
7284 (_("%B: unsupported relocation type %s"),
7285 abfd, areloc->howto->name);
252b5132 7286 bfd_set_error (bfd_error_bad_value);
b34976b6 7287 return FALSE;
252b5132
RH
7288}
7289
b34976b6 7290bfd_boolean
217aa764 7291_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7292{
7293 if (bfd_get_format (abfd) == bfd_object)
7294 {
b25e3d87 7295 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7296 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7297 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7298 }
7299
7300 return _bfd_generic_close_and_cleanup (abfd);
7301}
7302
7303/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7304 in the relocation's offset. Thus we cannot allow any sort of sanity
7305 range-checking to interfere. There is nothing else to do in processing
7306 this reloc. */
7307
7308bfd_reloc_status_type
217aa764
AM
7309_bfd_elf_rel_vtable_reloc_fn
7310 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7311 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7312 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7313 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7314{
7315 return bfd_reloc_ok;
7316}
252b5132
RH
7317\f
7318/* Elf core file support. Much of this only works on native
7319 toolchains, since we rely on knowing the
7320 machine-dependent procfs structure in order to pick
c044fabd 7321 out details about the corefile. */
252b5132
RH
7322
7323#ifdef HAVE_SYS_PROCFS_H
7324# include <sys/procfs.h>
7325#endif
7326
c044fabd 7327/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7328
7329static int
217aa764 7330elfcore_make_pid (bfd *abfd)
252b5132
RH
7331{
7332 return ((elf_tdata (abfd)->core_lwpid << 16)
7333 + (elf_tdata (abfd)->core_pid));
7334}
7335
252b5132
RH
7336/* If there isn't a section called NAME, make one, using
7337 data from SECT. Note, this function will generate a
7338 reference to NAME, so you shouldn't deallocate or
c044fabd 7339 overwrite it. */
252b5132 7340
b34976b6 7341static bfd_boolean
217aa764 7342elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7343{
c044fabd 7344 asection *sect2;
252b5132
RH
7345
7346 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7347 return TRUE;
252b5132 7348
117ed4f8 7349 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7350 if (sect2 == NULL)
b34976b6 7351 return FALSE;
252b5132 7352
eea6121a 7353 sect2->size = sect->size;
252b5132 7354 sect2->filepos = sect->filepos;
252b5132 7355 sect2->alignment_power = sect->alignment_power;
b34976b6 7356 return TRUE;
252b5132
RH
7357}
7358
bb0082d6
AM
7359/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7360 actually creates up to two pseudosections:
7361 - For the single-threaded case, a section named NAME, unless
7362 such a section already exists.
7363 - For the multi-threaded case, a section named "NAME/PID", where
7364 PID is elfcore_make_pid (abfd).
7365 Both pseudosections have identical contents. */
b34976b6 7366bfd_boolean
217aa764
AM
7367_bfd_elfcore_make_pseudosection (bfd *abfd,
7368 char *name,
7369 size_t size,
7370 ufile_ptr filepos)
bb0082d6
AM
7371{
7372 char buf[100];
7373 char *threaded_name;
d4c88bbb 7374 size_t len;
bb0082d6
AM
7375 asection *sect;
7376
7377 /* Build the section name. */
7378
7379 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7380 len = strlen (buf) + 1;
217aa764 7381 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7382 if (threaded_name == NULL)
b34976b6 7383 return FALSE;
d4c88bbb 7384 memcpy (threaded_name, buf, len);
bb0082d6 7385
117ed4f8
AM
7386 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7387 SEC_HAS_CONTENTS);
bb0082d6 7388 if (sect == NULL)
b34976b6 7389 return FALSE;
eea6121a 7390 sect->size = size;
bb0082d6 7391 sect->filepos = filepos;
bb0082d6
AM
7392 sect->alignment_power = 2;
7393
936e320b 7394 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7395}
7396
252b5132 7397/* prstatus_t exists on:
4a938328 7398 solaris 2.5+
252b5132
RH
7399 linux 2.[01] + glibc
7400 unixware 4.2
7401*/
7402
7403#if defined (HAVE_PRSTATUS_T)
a7b97311 7404
b34976b6 7405static bfd_boolean
217aa764 7406elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7407{
eea6121a 7408 size_t size;
7ee38065 7409 int offset;
252b5132 7410
4a938328
MS
7411 if (note->descsz == sizeof (prstatus_t))
7412 {
7413 prstatus_t prstat;
252b5132 7414
eea6121a 7415 size = sizeof (prstat.pr_reg);
7ee38065 7416 offset = offsetof (prstatus_t, pr_reg);
4a938328 7417 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7418
fa49d224
NC
7419 /* Do not overwrite the core signal if it
7420 has already been set by another thread. */
7421 if (elf_tdata (abfd)->core_signal == 0)
7422 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7423 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7424
4a938328
MS
7425 /* pr_who exists on:
7426 solaris 2.5+
7427 unixware 4.2
7428 pr_who doesn't exist on:
7429 linux 2.[01]
7430 */
252b5132 7431#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7432 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7433#endif
4a938328 7434 }
7ee38065 7435#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7436 else if (note->descsz == sizeof (prstatus32_t))
7437 {
7438 /* 64-bit host, 32-bit corefile */
7439 prstatus32_t prstat;
7440
eea6121a 7441 size = sizeof (prstat.pr_reg);
7ee38065 7442 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7443 memcpy (&prstat, note->descdata, sizeof (prstat));
7444
fa49d224
NC
7445 /* Do not overwrite the core signal if it
7446 has already been set by another thread. */
7447 if (elf_tdata (abfd)->core_signal == 0)
7448 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7449 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7450
7451 /* pr_who exists on:
7452 solaris 2.5+
7453 unixware 4.2
7454 pr_who doesn't exist on:
7455 linux 2.[01]
7456 */
7ee38065 7457#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7458 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7459#endif
7460 }
7ee38065 7461#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7462 else
7463 {
7464 /* Fail - we don't know how to handle any other
7465 note size (ie. data object type). */
b34976b6 7466 return TRUE;
4a938328 7467 }
252b5132 7468
bb0082d6 7469 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7470 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7471 size, note->descpos + offset);
252b5132
RH
7472}
7473#endif /* defined (HAVE_PRSTATUS_T) */
7474
bb0082d6 7475/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7476static bfd_boolean
217aa764
AM
7477elfcore_make_note_pseudosection (bfd *abfd,
7478 char *name,
7479 Elf_Internal_Note *note)
252b5132 7480{
936e320b
AM
7481 return _bfd_elfcore_make_pseudosection (abfd, name,
7482 note->descsz, note->descpos);
252b5132
RH
7483}
7484
ff08c6bb
JB
7485/* There isn't a consistent prfpregset_t across platforms,
7486 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7487 data structure apart. */
7488
b34976b6 7489static bfd_boolean
217aa764 7490elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7491{
7492 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7493}
7494
ff08c6bb
JB
7495/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
7496 type of 5 (NT_PRXFPREG). Just include the whole note's contents
7497 literally. */
c044fabd 7498
b34976b6 7499static bfd_boolean
217aa764 7500elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7501{
7502 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7503}
7504
252b5132 7505#if defined (HAVE_PRPSINFO_T)
4a938328 7506typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7507#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7508typedef prpsinfo32_t elfcore_psinfo32_t;
7509#endif
252b5132
RH
7510#endif
7511
7512#if defined (HAVE_PSINFO_T)
4a938328 7513typedef psinfo_t elfcore_psinfo_t;
7ee38065 7514#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7515typedef psinfo32_t elfcore_psinfo32_t;
7516#endif
252b5132
RH
7517#endif
7518
252b5132
RH
7519/* return a malloc'ed copy of a string at START which is at
7520 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7521 the copy will always have a terminating '\0'. */
252b5132 7522
936e320b 7523char *
217aa764 7524_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7525{
dc810e39 7526 char *dups;
c044fabd 7527 char *end = memchr (start, '\0', max);
dc810e39 7528 size_t len;
252b5132
RH
7529
7530 if (end == NULL)
7531 len = max;
7532 else
7533 len = end - start;
7534
217aa764 7535 dups = bfd_alloc (abfd, len + 1);
dc810e39 7536 if (dups == NULL)
252b5132
RH
7537 return NULL;
7538
dc810e39
AM
7539 memcpy (dups, start, len);
7540 dups[len] = '\0';
252b5132 7541
dc810e39 7542 return dups;
252b5132
RH
7543}
7544
bb0082d6 7545#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7546static bfd_boolean
217aa764 7547elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7548{
4a938328
MS
7549 if (note->descsz == sizeof (elfcore_psinfo_t))
7550 {
7551 elfcore_psinfo_t psinfo;
252b5132 7552
7ee38065 7553 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7554
4a938328 7555 elf_tdata (abfd)->core_program
936e320b
AM
7556 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7557 sizeof (psinfo.pr_fname));
252b5132 7558
4a938328 7559 elf_tdata (abfd)->core_command
936e320b
AM
7560 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7561 sizeof (psinfo.pr_psargs));
4a938328 7562 }
7ee38065 7563#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7564 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7565 {
7566 /* 64-bit host, 32-bit corefile */
7567 elfcore_psinfo32_t psinfo;
7568
7ee38065 7569 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7570
4a938328 7571 elf_tdata (abfd)->core_program
936e320b
AM
7572 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7573 sizeof (psinfo.pr_fname));
4a938328
MS
7574
7575 elf_tdata (abfd)->core_command
936e320b
AM
7576 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7577 sizeof (psinfo.pr_psargs));
4a938328
MS
7578 }
7579#endif
7580
7581 else
7582 {
7583 /* Fail - we don't know how to handle any other
7584 note size (ie. data object type). */
b34976b6 7585 return TRUE;
4a938328 7586 }
252b5132
RH
7587
7588 /* Note that for some reason, a spurious space is tacked
7589 onto the end of the args in some (at least one anyway)
c044fabd 7590 implementations, so strip it off if it exists. */
252b5132
RH
7591
7592 {
c044fabd 7593 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7594 int n = strlen (command);
7595
7596 if (0 < n && command[n - 1] == ' ')
7597 command[n - 1] = '\0';
7598 }
7599
b34976b6 7600 return TRUE;
252b5132
RH
7601}
7602#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7603
252b5132 7604#if defined (HAVE_PSTATUS_T)
b34976b6 7605static bfd_boolean
217aa764 7606elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7607{
f572a39d
AM
7608 if (note->descsz == sizeof (pstatus_t)
7609#if defined (HAVE_PXSTATUS_T)
7610 || note->descsz == sizeof (pxstatus_t)
7611#endif
7612 )
4a938328
MS
7613 {
7614 pstatus_t pstat;
252b5132 7615
4a938328 7616 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7617
4a938328
MS
7618 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7619 }
7ee38065 7620#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7621 else if (note->descsz == sizeof (pstatus32_t))
7622 {
7623 /* 64-bit host, 32-bit corefile */
7624 pstatus32_t pstat;
252b5132 7625
4a938328 7626 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7627
4a938328
MS
7628 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7629 }
7630#endif
252b5132
RH
7631 /* Could grab some more details from the "representative"
7632 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7633 NT_LWPSTATUS note, presumably. */
252b5132 7634
b34976b6 7635 return TRUE;
252b5132
RH
7636}
7637#endif /* defined (HAVE_PSTATUS_T) */
7638
252b5132 7639#if defined (HAVE_LWPSTATUS_T)
b34976b6 7640static bfd_boolean
217aa764 7641elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7642{
7643 lwpstatus_t lwpstat;
7644 char buf[100];
c044fabd 7645 char *name;
d4c88bbb 7646 size_t len;
c044fabd 7647 asection *sect;
252b5132 7648
f572a39d
AM
7649 if (note->descsz != sizeof (lwpstat)
7650#if defined (HAVE_LWPXSTATUS_T)
7651 && note->descsz != sizeof (lwpxstatus_t)
7652#endif
7653 )
b34976b6 7654 return TRUE;
252b5132
RH
7655
7656 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7657
7658 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7659 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7660
c044fabd 7661 /* Make a ".reg/999" section. */
252b5132
RH
7662
7663 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7664 len = strlen (buf) + 1;
217aa764 7665 name = bfd_alloc (abfd, len);
252b5132 7666 if (name == NULL)
b34976b6 7667 return FALSE;
d4c88bbb 7668 memcpy (name, buf, len);
252b5132 7669
117ed4f8 7670 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7671 if (sect == NULL)
b34976b6 7672 return FALSE;
252b5132
RH
7673
7674#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7675 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7676 sect->filepos = note->descpos
7677 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7678#endif
7679
7680#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7681 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7682 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7683#endif
7684
252b5132
RH
7685 sect->alignment_power = 2;
7686
7687 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7688 return FALSE;
252b5132
RH
7689
7690 /* Make a ".reg2/999" section */
7691
7692 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7693 len = strlen (buf) + 1;
217aa764 7694 name = bfd_alloc (abfd, len);
252b5132 7695 if (name == NULL)
b34976b6 7696 return FALSE;
d4c88bbb 7697 memcpy (name, buf, len);
252b5132 7698
117ed4f8 7699 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7700 if (sect == NULL)
b34976b6 7701 return FALSE;
252b5132
RH
7702
7703#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7704 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7705 sect->filepos = note->descpos
7706 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7707#endif
7708
7709#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7710 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7711 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7712#endif
7713
252b5132
RH
7714 sect->alignment_power = 2;
7715
936e320b 7716 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7717}
7718#endif /* defined (HAVE_LWPSTATUS_T) */
7719
16e9c715 7720#if defined (HAVE_WIN32_PSTATUS_T)
b34976b6 7721static bfd_boolean
217aa764 7722elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7723{
7724 char buf[30];
c044fabd 7725 char *name;
d4c88bbb 7726 size_t len;
c044fabd 7727 asection *sect;
16e9c715
NC
7728 win32_pstatus_t pstatus;
7729
7730 if (note->descsz < sizeof (pstatus))
b34976b6 7731 return TRUE;
16e9c715 7732
e8eab623 7733 memcpy (&pstatus, note->descdata, sizeof (pstatus));
c044fabd
KH
7734
7735 switch (pstatus.data_type)
16e9c715
NC
7736 {
7737 case NOTE_INFO_PROCESS:
7738 /* FIXME: need to add ->core_command. */
7739 elf_tdata (abfd)->core_signal = pstatus.data.process_info.signal;
7740 elf_tdata (abfd)->core_pid = pstatus.data.process_info.pid;
c044fabd 7741 break;
16e9c715
NC
7742
7743 case NOTE_INFO_THREAD:
7744 /* Make a ".reg/999" section. */
1f170678 7745 sprintf (buf, ".reg/%ld", (long) pstatus.data.thread_info.tid);
c044fabd 7746
d4c88bbb 7747 len = strlen (buf) + 1;
217aa764 7748 name = bfd_alloc (abfd, len);
16e9c715 7749 if (name == NULL)
b34976b6 7750 return FALSE;
c044fabd 7751
d4c88bbb 7752 memcpy (name, buf, len);
16e9c715 7753
117ed4f8 7754 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 7755 if (sect == NULL)
b34976b6 7756 return FALSE;
c044fabd 7757
eea6121a 7758 sect->size = sizeof (pstatus.data.thread_info.thread_context);
079e9a2f
AM
7759 sect->filepos = (note->descpos
7760 + offsetof (struct win32_pstatus,
7761 data.thread_info.thread_context));
16e9c715
NC
7762 sect->alignment_power = 2;
7763
7764 if (pstatus.data.thread_info.is_active_thread)
7765 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7766 return FALSE;
16e9c715
NC
7767 break;
7768
7769 case NOTE_INFO_MODULE:
7770 /* Make a ".module/xxxxxxxx" section. */
1f170678
AM
7771 sprintf (buf, ".module/%08lx",
7772 (long) pstatus.data.module_info.base_address);
c044fabd 7773
d4c88bbb 7774 len = strlen (buf) + 1;
217aa764 7775 name = bfd_alloc (abfd, len);
16e9c715 7776 if (name == NULL)
b34976b6 7777 return FALSE;
c044fabd 7778
d4c88bbb 7779 memcpy (name, buf, len);
252b5132 7780
117ed4f8 7781 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 7782
16e9c715 7783 if (sect == NULL)
b34976b6 7784 return FALSE;
c044fabd 7785
eea6121a 7786 sect->size = note->descsz;
16e9c715 7787 sect->filepos = note->descpos;
16e9c715
NC
7788 sect->alignment_power = 2;
7789 break;
7790
7791 default:
b34976b6 7792 return TRUE;
16e9c715
NC
7793 }
7794
b34976b6 7795 return TRUE;
16e9c715
NC
7796}
7797#endif /* HAVE_WIN32_PSTATUS_T */
252b5132 7798
b34976b6 7799static bfd_boolean
217aa764 7800elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7801{
9c5bfbb7 7802 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7803
252b5132
RH
7804 switch (note->type)
7805 {
7806 default:
b34976b6 7807 return TRUE;
252b5132 7808
252b5132 7809 case NT_PRSTATUS:
bb0082d6
AM
7810 if (bed->elf_backend_grok_prstatus)
7811 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7812 return TRUE;
bb0082d6 7813#if defined (HAVE_PRSTATUS_T)
252b5132 7814 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7815#else
b34976b6 7816 return TRUE;
252b5132
RH
7817#endif
7818
7819#if defined (HAVE_PSTATUS_T)
7820 case NT_PSTATUS:
7821 return elfcore_grok_pstatus (abfd, note);
7822#endif
7823
7824#if defined (HAVE_LWPSTATUS_T)
7825 case NT_LWPSTATUS:
7826 return elfcore_grok_lwpstatus (abfd, note);
7827#endif
7828
7829 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7830 return elfcore_grok_prfpreg (abfd, note);
7831
16e9c715 7832#if defined (HAVE_WIN32_PSTATUS_T)
c044fabd 7833 case NT_WIN32PSTATUS:
16e9c715
NC
7834 return elfcore_grok_win32pstatus (abfd, note);
7835#endif
7836
c044fabd 7837 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7838 if (note->namesz == 6
7839 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7840 return elfcore_grok_prxfpreg (abfd, note);
7841 else
b34976b6 7842 return TRUE;
ff08c6bb 7843
252b5132
RH
7844 case NT_PRPSINFO:
7845 case NT_PSINFO:
bb0082d6
AM
7846 if (bed->elf_backend_grok_psinfo)
7847 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7848 return TRUE;
bb0082d6 7849#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7850 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7851#else
b34976b6 7852 return TRUE;
252b5132 7853#endif
3333a7c3
RM
7854
7855 case NT_AUXV:
7856 {
117ed4f8
AM
7857 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
7858 SEC_HAS_CONTENTS);
3333a7c3
RM
7859
7860 if (sect == NULL)
7861 return FALSE;
eea6121a 7862 sect->size = note->descsz;
3333a7c3 7863 sect->filepos = note->descpos;
3333a7c3
RM
7864 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7865
7866 return TRUE;
7867 }
252b5132
RH
7868 }
7869}
7870
b34976b6 7871static bfd_boolean
217aa764 7872elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7873{
7874 char *cp;
7875
7876 cp = strchr (note->namedata, '@');
7877 if (cp != NULL)
7878 {
d2b64500 7879 *lwpidp = atoi(cp + 1);
b34976b6 7880 return TRUE;
50b2bdb7 7881 }
b34976b6 7882 return FALSE;
50b2bdb7
AM
7883}
7884
b34976b6 7885static bfd_boolean
217aa764 7886elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7887{
7888
7889 /* Signal number at offset 0x08. */
7890 elf_tdata (abfd)->core_signal
7891 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7892
7893 /* Process ID at offset 0x50. */
7894 elf_tdata (abfd)->core_pid
7895 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7896
7897 /* Command name at 0x7c (max 32 bytes, including nul). */
7898 elf_tdata (abfd)->core_command
7899 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7900
7720ba9f
MK
7901 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7902 note);
50b2bdb7
AM
7903}
7904
b34976b6 7905static bfd_boolean
217aa764 7906elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7907{
7908 int lwp;
7909
7910 if (elfcore_netbsd_get_lwpid (note, &lwp))
7911 elf_tdata (abfd)->core_lwpid = lwp;
7912
b4db1224 7913 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7914 {
7915 /* NetBSD-specific core "procinfo". Note that we expect to
7916 find this note before any of the others, which is fine,
7917 since the kernel writes this note out first when it
7918 creates a core file. */
47d9a591 7919
50b2bdb7
AM
7920 return elfcore_grok_netbsd_procinfo (abfd, note);
7921 }
7922
b4db1224
JT
7923 /* As of Jan 2002 there are no other machine-independent notes
7924 defined for NetBSD core files. If the note type is less
7925 than the start of the machine-dependent note types, we don't
7926 understand it. */
47d9a591 7927
b4db1224 7928 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7929 return TRUE;
50b2bdb7
AM
7930
7931
7932 switch (bfd_get_arch (abfd))
7933 {
7934 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7935 PT_GETFPREGS == mach+2. */
7936
7937 case bfd_arch_alpha:
7938 case bfd_arch_sparc:
7939 switch (note->type)
7940 {
b4db1224 7941 case NT_NETBSDCORE_FIRSTMACH+0:
50b2bdb7
AM
7942 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7943
b4db1224 7944 case NT_NETBSDCORE_FIRSTMACH+2:
50b2bdb7
AM
7945 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7946
7947 default:
b34976b6 7948 return TRUE;
50b2bdb7
AM
7949 }
7950
7951 /* On all other arch's, PT_GETREGS == mach+1 and
7952 PT_GETFPREGS == mach+3. */
7953
7954 default:
7955 switch (note->type)
7956 {
b4db1224 7957 case NT_NETBSDCORE_FIRSTMACH+1:
50b2bdb7
AM
7958 return elfcore_make_note_pseudosection (abfd, ".reg", note);
7959
b4db1224 7960 case NT_NETBSDCORE_FIRSTMACH+3:
50b2bdb7
AM
7961 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7962
7963 default:
b34976b6 7964 return TRUE;
50b2bdb7
AM
7965 }
7966 }
7967 /* NOTREACHED */
7968}
7969
07c6e936 7970static bfd_boolean
d3fd4074 7971elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
7972{
7973 void *ddata = note->descdata;
7974 char buf[100];
7975 char *name;
7976 asection *sect;
f8843e87
AM
7977 short sig;
7978 unsigned flags;
07c6e936
NC
7979
7980 /* nto_procfs_status 'pid' field is at offset 0. */
7981 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
7982
f8843e87
AM
7983 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
7984 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
7985
7986 /* nto_procfs_status 'flags' field is at offset 8. */
7987 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
7988
7989 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
7990 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
7991 {
7992 elf_tdata (abfd)->core_signal = sig;
7993 elf_tdata (abfd)->core_lwpid = *tid;
7994 }
07c6e936 7995
f8843e87
AM
7996 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
7997 do not come from signals so we make sure we set the current
7998 thread just in case. */
7999 if (flags & 0x00000080)
8000 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8001
8002 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8003 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8004
217aa764 8005 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8006 if (name == NULL)
8007 return FALSE;
8008 strcpy (name, buf);
8009
117ed4f8 8010 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8011 if (sect == NULL)
8012 return FALSE;
8013
eea6121a 8014 sect->size = note->descsz;
07c6e936 8015 sect->filepos = note->descpos;
07c6e936
NC
8016 sect->alignment_power = 2;
8017
8018 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8019}
8020
8021static bfd_boolean
d69f560c
KW
8022elfcore_grok_nto_regs (bfd *abfd,
8023 Elf_Internal_Note *note,
d3fd4074 8024 long tid,
d69f560c 8025 char *base)
07c6e936
NC
8026{
8027 char buf[100];
8028 char *name;
8029 asection *sect;
8030
d69f560c 8031 /* Make a "(base)/%d" section. */
d3fd4074 8032 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8033
217aa764 8034 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8035 if (name == NULL)
8036 return FALSE;
8037 strcpy (name, buf);
8038
117ed4f8 8039 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8040 if (sect == NULL)
8041 return FALSE;
8042
eea6121a 8043 sect->size = note->descsz;
07c6e936 8044 sect->filepos = note->descpos;
07c6e936
NC
8045 sect->alignment_power = 2;
8046
f8843e87
AM
8047 /* This is the current thread. */
8048 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8049 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8050
8051 return TRUE;
07c6e936
NC
8052}
8053
8054#define BFD_QNT_CORE_INFO 7
8055#define BFD_QNT_CORE_STATUS 8
8056#define BFD_QNT_CORE_GREG 9
8057#define BFD_QNT_CORE_FPREG 10
8058
8059static bfd_boolean
217aa764 8060elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8061{
8062 /* Every GREG section has a STATUS section before it. Store the
811072d8 8063 tid from the previous call to pass down to the next gregs
07c6e936 8064 function. */
d3fd4074 8065 static long tid = 1;
07c6e936
NC
8066
8067 switch (note->type)
8068 {
d69f560c
KW
8069 case BFD_QNT_CORE_INFO:
8070 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8071 case BFD_QNT_CORE_STATUS:
8072 return elfcore_grok_nto_status (abfd, note, &tid);
8073 case BFD_QNT_CORE_GREG:
8074 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8075 case BFD_QNT_CORE_FPREG:
8076 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8077 default:
8078 return TRUE;
07c6e936
NC
8079 }
8080}
8081
7c76fa91
MS
8082/* Function: elfcore_write_note
8083
47d9a591 8084 Inputs:
7c76fa91
MS
8085 buffer to hold note
8086 name of note
8087 type of note
8088 data for note
8089 size of data for note
8090
8091 Return:
8092 End of buffer containing note. */
8093
8094char *
217aa764
AM
8095elfcore_write_note (bfd *abfd,
8096 char *buf,
8097 int *bufsiz,
8098 const char *name,
8099 int type,
8100 const void *input,
8101 int size)
7c76fa91
MS
8102{
8103 Elf_External_Note *xnp;
d4c88bbb
AM
8104 size_t namesz;
8105 size_t pad;
8106 size_t newspace;
7c76fa91
MS
8107 char *p, *dest;
8108
d4c88bbb
AM
8109 namesz = 0;
8110 pad = 0;
8111 if (name != NULL)
8112 {
9c5bfbb7 8113 const struct elf_backend_data *bed;
d4c88bbb
AM
8114
8115 namesz = strlen (name) + 1;
8116 bed = get_elf_backend_data (abfd);
45d6a902 8117 pad = -namesz & ((1 << bed->s->log_file_align) - 1);
d4c88bbb
AM
8118 }
8119
5de3bf90 8120 newspace = 12 + namesz + pad + size;
d4c88bbb 8121
7c76fa91
MS
8122 p = realloc (buf, *bufsiz + newspace);
8123 dest = p + *bufsiz;
8124 *bufsiz += newspace;
8125 xnp = (Elf_External_Note *) dest;
8126 H_PUT_32 (abfd, namesz, xnp->namesz);
8127 H_PUT_32 (abfd, size, xnp->descsz);
8128 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8129 dest = xnp->name;
8130 if (name != NULL)
8131 {
8132 memcpy (dest, name, namesz);
8133 dest += namesz;
8134 while (pad != 0)
8135 {
8136 *dest++ = '\0';
8137 --pad;
8138 }
8139 }
8140 memcpy (dest, input, size);
7c76fa91
MS
8141 return p;
8142}
8143
8144#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8145char *
217aa764
AM
8146elfcore_write_prpsinfo (bfd *abfd,
8147 char *buf,
8148 int *bufsiz,
8149 const char *fname,
8150 const char *psargs)
7c76fa91
MS
8151{
8152 int note_type;
8153 char *note_name = "CORE";
8154
8155#if defined (HAVE_PSINFO_T)
8156 psinfo_t data;
8157 note_type = NT_PSINFO;
8158#else
8159 prpsinfo_t data;
8160 note_type = NT_PRPSINFO;
8161#endif
8162
8163 memset (&data, 0, sizeof (data));
8164 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8165 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
47d9a591 8166 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8167 note_name, note_type, &data, sizeof (data));
8168}
8169#endif /* PSINFO_T or PRPSINFO_T */
8170
8171#if defined (HAVE_PRSTATUS_T)
8172char *
217aa764
AM
8173elfcore_write_prstatus (bfd *abfd,
8174 char *buf,
8175 int *bufsiz,
8176 long pid,
8177 int cursig,
8178 const void *gregs)
7c76fa91
MS
8179{
8180 prstatus_t prstat;
8181 char *note_name = "CORE";
8182
8183 memset (&prstat, 0, sizeof (prstat));
8184 prstat.pr_pid = pid;
8185 prstat.pr_cursig = cursig;
c106e334 8186 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
47d9a591 8187 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8188 note_name, NT_PRSTATUS, &prstat, sizeof (prstat));
8189}
8190#endif /* HAVE_PRSTATUS_T */
8191
51316059
MS
8192#if defined (HAVE_LWPSTATUS_T)
8193char *
217aa764
AM
8194elfcore_write_lwpstatus (bfd *abfd,
8195 char *buf,
8196 int *bufsiz,
8197 long pid,
8198 int cursig,
8199 const void *gregs)
51316059
MS
8200{
8201 lwpstatus_t lwpstat;
8202 char *note_name = "CORE";
8203
8204 memset (&lwpstat, 0, sizeof (lwpstat));
8205 lwpstat.pr_lwpid = pid >> 16;
8206 lwpstat.pr_cursig = cursig;
8207#if defined (HAVE_LWPSTATUS_T_PR_REG)
8208 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8209#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8210#if !defined(gregs)
8211 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8212 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8213#else
8214 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8215 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8216#endif
8217#endif
47d9a591 8218 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8219 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8220}
8221#endif /* HAVE_LWPSTATUS_T */
8222
7c76fa91
MS
8223#if defined (HAVE_PSTATUS_T)
8224char *
217aa764
AM
8225elfcore_write_pstatus (bfd *abfd,
8226 char *buf,
8227 int *bufsiz,
8228 long pid,
6c10990d
NC
8229 int cursig ATTRIBUTE_UNUSED,
8230 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91
MS
8231{
8232 pstatus_t pstat;
8233 char *note_name = "CORE";
8234
51316059
MS
8235 memset (&pstat, 0, sizeof (pstat));
8236 pstat.pr_pid = pid & 0xffff;
47d9a591 8237 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8238 NT_PSTATUS, &pstat, sizeof (pstat));
8239 return buf;
7c76fa91
MS
8240}
8241#endif /* HAVE_PSTATUS_T */
8242
8243char *
217aa764
AM
8244elfcore_write_prfpreg (bfd *abfd,
8245 char *buf,
8246 int *bufsiz,
8247 const void *fpregs,
8248 int size)
7c76fa91
MS
8249{
8250 char *note_name = "CORE";
47d9a591 8251 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8252 note_name, NT_FPREGSET, fpregs, size);
8253}
8254
8255char *
217aa764
AM
8256elfcore_write_prxfpreg (bfd *abfd,
8257 char *buf,
8258 int *bufsiz,
8259 const void *xfpregs,
8260 int size)
7c76fa91
MS
8261{
8262 char *note_name = "LINUX";
47d9a591 8263 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8264 note_name, NT_PRXFPREG, xfpregs, size);
8265}
8266
b34976b6 8267static bfd_boolean
217aa764 8268elfcore_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
252b5132 8269{
c044fabd
KH
8270 char *buf;
8271 char *p;
252b5132
RH
8272
8273 if (size <= 0)
b34976b6 8274 return TRUE;
252b5132 8275
dc810e39 8276 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
b34976b6 8277 return FALSE;
252b5132 8278
dc810e39 8279 buf = bfd_malloc (size);
252b5132 8280 if (buf == NULL)
b34976b6 8281 return FALSE;
252b5132 8282
dc810e39 8283 if (bfd_bread (buf, size, abfd) != size)
252b5132
RH
8284 {
8285 error:
8286 free (buf);
b34976b6 8287 return FALSE;
252b5132
RH
8288 }
8289
8290 p = buf;
8291 while (p < buf + size)
8292 {
c044fabd
KH
8293 /* FIXME: bad alignment assumption. */
8294 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8295 Elf_Internal_Note in;
8296
dc810e39 8297 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8298
dc810e39 8299 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
8300 in.namedata = xnp->name;
8301
dc810e39 8302 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8303 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8304 in.descpos = offset + (in.descdata - buf);
8305
0112cd26 8306 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
50b2bdb7
AM
8307 {
8308 if (! elfcore_grok_netbsd_note (abfd, &in))
8309 goto error;
8310 }
0112cd26 8311 else if (CONST_STRNEQ (in.namedata, "QNX"))
07c6e936
NC
8312 {
8313 if (! elfcore_grok_nto_note (abfd, &in))
8314 goto error;
8315 }
50b2bdb7
AM
8316 else
8317 {
8318 if (! elfcore_grok_note (abfd, &in))
8319 goto error;
8320 }
252b5132
RH
8321
8322 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8323 }
8324
8325 free (buf);
b34976b6 8326 return TRUE;
252b5132 8327}
98d8431c
JB
8328\f
8329/* Providing external access to the ELF program header table. */
8330
8331/* Return an upper bound on the number of bytes required to store a
8332 copy of ABFD's program header table entries. Return -1 if an error
8333 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8334
98d8431c 8335long
217aa764 8336bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8337{
8338 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8339 {
8340 bfd_set_error (bfd_error_wrong_format);
8341 return -1;
8342 }
8343
936e320b 8344 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8345}
8346
98d8431c
JB
8347/* Copy ABFD's program header table entries to *PHDRS. The entries
8348 will be stored as an array of Elf_Internal_Phdr structures, as
8349 defined in include/elf/internal.h. To find out how large the
8350 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
8351
8352 Return the number of program header table entries read, or -1 if an
8353 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 8354
98d8431c 8355int
217aa764 8356bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
8357{
8358 int num_phdrs;
8359
8360 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8361 {
8362 bfd_set_error (bfd_error_wrong_format);
8363 return -1;
8364 }
8365
8366 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8367 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8368 num_phdrs * sizeof (Elf_Internal_Phdr));
8369
8370 return num_phdrs;
8371}
ae4221d7
L
8372
8373void
217aa764 8374_bfd_elf_sprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, char *buf, bfd_vma value)
ae4221d7 8375{
d3b05f8d 8376#ifdef BFD64
ae4221d7
L
8377 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8378
8379 i_ehdrp = elf_elfheader (abfd);
8380 if (i_ehdrp == NULL)
8381 sprintf_vma (buf, value);
8382 else
8383 {
8384 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8385 {
ae4221d7 8386#if BFD_HOST_64BIT_LONG
cc55aec9 8387 sprintf (buf, "%016lx", value);
ae4221d7 8388#else
cc55aec9
AM
8389 sprintf (buf, "%08lx%08lx", _bfd_int64_high (value),
8390 _bfd_int64_low (value));
ae4221d7 8391#endif
cc55aec9 8392 }
ae4221d7
L
8393 else
8394 sprintf (buf, "%08lx", (unsigned long) (value & 0xffffffff));
8395 }
d3b05f8d
L
8396#else
8397 sprintf_vma (buf, value);
8398#endif
ae4221d7
L
8399}
8400
8401void
217aa764 8402_bfd_elf_fprintf_vma (bfd *abfd ATTRIBUTE_UNUSED, void *stream, bfd_vma value)
ae4221d7 8403{
d3b05f8d 8404#ifdef BFD64
ae4221d7
L
8405 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
8406
8407 i_ehdrp = elf_elfheader (abfd);
8408 if (i_ehdrp == NULL)
8409 fprintf_vma ((FILE *) stream, value);
8410 else
8411 {
8412 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
cc55aec9 8413 {
ae4221d7 8414#if BFD_HOST_64BIT_LONG
cc55aec9 8415 fprintf ((FILE *) stream, "%016lx", value);
ae4221d7 8416#else
cc55aec9
AM
8417 fprintf ((FILE *) stream, "%08lx%08lx",
8418 _bfd_int64_high (value), _bfd_int64_low (value));
ae4221d7 8419#endif
cc55aec9 8420 }
ae4221d7
L
8421 else
8422 fprintf ((FILE *) stream, "%08lx",
8423 (unsigned long) (value & 0xffffffff));
8424 }
d3b05f8d
L
8425#else
8426 fprintf_vma ((FILE *) stream, value);
8427#endif
ae4221d7 8428}
db6751f2
JJ
8429
8430enum elf_reloc_type_class
217aa764 8431_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8432{
8433 return reloc_class_normal;
8434}
f8df10f4 8435
47d9a591 8436/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8437 relocation against a local symbol. */
8438
8439bfd_vma
217aa764
AM
8440_bfd_elf_rela_local_sym (bfd *abfd,
8441 Elf_Internal_Sym *sym,
8517fae7 8442 asection **psec,
217aa764 8443 Elf_Internal_Rela *rel)
f8df10f4 8444{
8517fae7 8445 asection *sec = *psec;
f8df10f4
JJ
8446 bfd_vma relocation;
8447
8448 relocation = (sec->output_section->vma
8449 + sec->output_offset
8450 + sym->st_value);
8451 if ((sec->flags & SEC_MERGE)
c629eae0 8452 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8453 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8454 {
f8df10f4 8455 rel->r_addend =
8517fae7 8456 _bfd_merged_section_offset (abfd, psec,
65765700 8457 elf_section_data (sec)->sec_info,
753731ee
AM
8458 sym->st_value + rel->r_addend);
8459 if (sec != *psec)
8460 {
8461 /* If we have changed the section, and our original section is
8462 marked with SEC_EXCLUDE, it means that the original
8463 SEC_MERGE section has been completely subsumed in some
8464 other SEC_MERGE section. In this case, we need to leave
8465 some info around for --emit-relocs. */
8466 if ((sec->flags & SEC_EXCLUDE) != 0)
8467 sec->kept_section = *psec;
8468 sec = *psec;
8469 }
8517fae7
AM
8470 rel->r_addend -= relocation;
8471 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8472 }
8473 return relocation;
8474}
c629eae0
JJ
8475
8476bfd_vma
217aa764
AM
8477_bfd_elf_rel_local_sym (bfd *abfd,
8478 Elf_Internal_Sym *sym,
8479 asection **psec,
8480 bfd_vma addend)
47d9a591 8481{
c629eae0
JJ
8482 asection *sec = *psec;
8483
68bfbfcc 8484 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8485 return sym->st_value + addend;
8486
8487 return _bfd_merged_section_offset (abfd, psec,
65765700 8488 elf_section_data (sec)->sec_info,
753731ee 8489 sym->st_value + addend);
c629eae0
JJ
8490}
8491
8492bfd_vma
217aa764 8493_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8494 struct bfd_link_info *info,
217aa764
AM
8495 asection *sec,
8496 bfd_vma offset)
c629eae0 8497{
68bfbfcc 8498 switch (sec->sec_info_type)
65765700
JJ
8499 {
8500 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8501 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8502 offset);
65765700 8503 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8504 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8505 default:
8506 return offset;
8507 }
c629eae0 8508}
3333a7c3
RM
8509\f
8510/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8511 reconstruct an ELF file by reading the segments out of remote memory
8512 based on the ELF file header at EHDR_VMA and the ELF program headers it
8513 points to. If not null, *LOADBASEP is filled in with the difference
8514 between the VMAs from which the segments were read, and the VMAs the
8515 file headers (and hence BFD's idea of each section's VMA) put them at.
8516
8517 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8518 remote memory at target address VMA into the local buffer at MYADDR; it
8519 should return zero on success or an `errno' code on failure. TEMPL must
8520 be a BFD for an ELF target with the word size and byte order found in
8521 the remote memory. */
8522
8523bfd *
217aa764
AM
8524bfd_elf_bfd_from_remote_memory
8525 (bfd *templ,
8526 bfd_vma ehdr_vma,
8527 bfd_vma *loadbasep,
f075ee0c 8528 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8529{
8530 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8531 (templ, ehdr_vma, loadbasep, target_read_memory);
8532}
4c45e5c9
JJ
8533\f
8534long
c9727e01
AM
8535_bfd_elf_get_synthetic_symtab (bfd *abfd,
8536 long symcount ATTRIBUTE_UNUSED,
8537 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8538 long dynsymcount,
c9727e01
AM
8539 asymbol **dynsyms,
8540 asymbol **ret)
4c45e5c9
JJ
8541{
8542 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8543 asection *relplt;
8544 asymbol *s;
8545 const char *relplt_name;
8546 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8547 arelent *p;
8548 long count, i, n;
8549 size_t size;
8550 Elf_Internal_Shdr *hdr;
8551 char *names;
8552 asection *plt;
8553
8615f3f2
AM
8554 *ret = NULL;
8555
90e3cdf2
JJ
8556 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8557 return 0;
8558
8615f3f2
AM
8559 if (dynsymcount <= 0)
8560 return 0;
8561
4c45e5c9
JJ
8562 if (!bed->plt_sym_val)
8563 return 0;
8564
8565 relplt_name = bed->relplt_name;
8566 if (relplt_name == NULL)
8567 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8568 relplt = bfd_get_section_by_name (abfd, relplt_name);
8569 if (relplt == NULL)
8570 return 0;
8571
8572 hdr = &elf_section_data (relplt)->this_hdr;
8573 if (hdr->sh_link != elf_dynsymtab (abfd)
8574 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8575 return 0;
8576
8577 plt = bfd_get_section_by_name (abfd, ".plt");
8578 if (plt == NULL)
8579 return 0;
8580
8581 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8582 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8583 return -1;
8584
eea6121a 8585 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8586 size = count * sizeof (asymbol);
8587 p = relplt->relocation;
8588 for (i = 0; i < count; i++, s++, p++)
8589 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8590
8591 s = *ret = bfd_malloc (size);
8592 if (s == NULL)
8593 return -1;
8594
8595 names = (char *) (s + count);
8596 p = relplt->relocation;
8597 n = 0;
8598 for (i = 0; i < count; i++, s++, p++)
8599 {
8600 size_t len;
8601 bfd_vma addr;
8602
8603 addr = bed->plt_sym_val (i, plt, p);
8604 if (addr == (bfd_vma) -1)
8605 continue;
8606
8607 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8608 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8609 we are defining a symbol, ensure one of them is set. */
8610 if ((s->flags & BSF_LOCAL) == 0)
8611 s->flags |= BSF_GLOBAL;
4c45e5c9
JJ
8612 s->section = plt;
8613 s->value = addr - plt->vma;
8614 s->name = names;
8615 len = strlen ((*p->sym_ptr_ptr)->name);
8616 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8617 names += len;
8618 memcpy (names, "@plt", sizeof ("@plt"));
8619 names += sizeof ("@plt");
8620 ++n;
8621 }
8622
8623 return n;
8624}
3d7f7666
L
8625
8626/* Sort symbol by binding and section. We want to put definitions
8627 sorted by section at the beginning. */
8628
8629static int
8630elf_sort_elf_symbol (const void *arg1, const void *arg2)
8631{
8632 const Elf_Internal_Sym *s1;
8633 const Elf_Internal_Sym *s2;
8634 int shndx;
8635
8636 /* Make sure that undefined symbols are at the end. */
8637 s1 = (const Elf_Internal_Sym *) arg1;
8638 if (s1->st_shndx == SHN_UNDEF)
8639 return 1;
8640 s2 = (const Elf_Internal_Sym *) arg2;
8641 if (s2->st_shndx == SHN_UNDEF)
8642 return -1;
8643
8644 /* Sorted by section index. */
8645 shndx = s1->st_shndx - s2->st_shndx;
8646 if (shndx != 0)
8647 return shndx;
8648
8649 /* Sorted by binding. */
8650 return ELF_ST_BIND (s1->st_info) - ELF_ST_BIND (s2->st_info);
8651}
8652
8653struct elf_symbol
8654{
8655 Elf_Internal_Sym *sym;
8656 const char *name;
8657};
8658
8659static int
8660elf_sym_name_compare (const void *arg1, const void *arg2)
8661{
8662 const struct elf_symbol *s1 = (const struct elf_symbol *) arg1;
8663 const struct elf_symbol *s2 = (const struct elf_symbol *) arg2;
8664 return strcmp (s1->name, s2->name);
8665}
8666
8667/* Check if 2 sections define the same set of local and global
8668 symbols. */
8669
8670bfd_boolean
8671bfd_elf_match_symbols_in_sections (asection *sec1, asection *sec2)
8672{
8673 bfd *bfd1, *bfd2;
8674 const struct elf_backend_data *bed1, *bed2;
8675 Elf_Internal_Shdr *hdr1, *hdr2;
8676 bfd_size_type symcount1, symcount2;
8677 Elf_Internal_Sym *isymbuf1, *isymbuf2;
8678 Elf_Internal_Sym *isymstart1 = NULL, *isymstart2 = NULL, *isym;
8679 Elf_Internal_Sym *isymend;
8680 struct elf_symbol *symp, *symtable1 = NULL, *symtable2 = NULL;
8681 bfd_size_type count1, count2, i;
8682 int shndx1, shndx2;
8683 bfd_boolean result;
8684
8685 bfd1 = sec1->owner;
8686 bfd2 = sec2->owner;
8687
8688 /* If both are .gnu.linkonce sections, they have to have the same
8689 section name. */
0112cd26
NC
8690 if (CONST_STRNEQ (sec1->name, ".gnu.linkonce")
8691 && CONST_STRNEQ (sec2->name, ".gnu.linkonce"))
3d7f7666
L
8692 return strcmp (sec1->name + sizeof ".gnu.linkonce",
8693 sec2->name + sizeof ".gnu.linkonce") == 0;
8694
8695 /* Both sections have to be in ELF. */
8696 if (bfd_get_flavour (bfd1) != bfd_target_elf_flavour
8697 || bfd_get_flavour (bfd2) != bfd_target_elf_flavour)
8698 return FALSE;
8699
8700 if (elf_section_type (sec1) != elf_section_type (sec2))
8701 return FALSE;
8702
8703 if ((elf_section_flags (sec1) & SHF_GROUP) != 0
8704 && (elf_section_flags (sec2) & SHF_GROUP) != 0)
8705 {
8706 /* If both are members of section groups, they have to have the
8707 same group name. */
8708 if (strcmp (elf_group_name (sec1), elf_group_name (sec2)) != 0)
8709 return FALSE;
8710 }
8711
8712 shndx1 = _bfd_elf_section_from_bfd_section (bfd1, sec1);
8713 shndx2 = _bfd_elf_section_from_bfd_section (bfd2, sec2);
8714 if (shndx1 == -1 || shndx2 == -1)
8715 return FALSE;
8716
8717 bed1 = get_elf_backend_data (bfd1);
8718 bed2 = get_elf_backend_data (bfd2);
8719 hdr1 = &elf_tdata (bfd1)->symtab_hdr;
8720 symcount1 = hdr1->sh_size / bed1->s->sizeof_sym;
8721 hdr2 = &elf_tdata (bfd2)->symtab_hdr;
8722 symcount2 = hdr2->sh_size / bed2->s->sizeof_sym;
8723
8724 if (symcount1 == 0 || symcount2 == 0)
8725 return FALSE;
8726
8727 isymbuf1 = bfd_elf_get_elf_syms (bfd1, hdr1, symcount1, 0,
8728 NULL, NULL, NULL);
8729 isymbuf2 = bfd_elf_get_elf_syms (bfd2, hdr2, symcount2, 0,
8730 NULL, NULL, NULL);
8731
8732 result = FALSE;
8733 if (isymbuf1 == NULL || isymbuf2 == NULL)
8734 goto done;
8735
8736 /* Sort symbols by binding and section. Global definitions are at
8737 the beginning. */
8738 qsort (isymbuf1, symcount1, sizeof (Elf_Internal_Sym),
8739 elf_sort_elf_symbol);
8740 qsort (isymbuf2, symcount2, sizeof (Elf_Internal_Sym),
8741 elf_sort_elf_symbol);
8742
8743 /* Count definitions in the section. */
8744 count1 = 0;
8745 for (isym = isymbuf1, isymend = isym + symcount1;
8746 isym < isymend; isym++)
8747 {
8748 if (isym->st_shndx == (unsigned int) shndx1)
8749 {
8750 if (count1 == 0)
8751 isymstart1 = isym;
8752 count1++;
8753 }
8754
8755 if (count1 && isym->st_shndx != (unsigned int) shndx1)
8756 break;
8757 }
8758
8759 count2 = 0;
8760 for (isym = isymbuf2, isymend = isym + symcount2;
8761 isym < isymend; isym++)
8762 {
8763 if (isym->st_shndx == (unsigned int) shndx2)
8764 {
8765 if (count2 == 0)
8766 isymstart2 = isym;
8767 count2++;
8768 }
8769
8770 if (count2 && isym->st_shndx != (unsigned int) shndx2)
8771 break;
8772 }
8773
8774 if (count1 == 0 || count2 == 0 || count1 != count2)
8775 goto done;
8776
8777 symtable1 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8778 symtable2 = bfd_malloc (count1 * sizeof (struct elf_symbol));
8779
8780 if (symtable1 == NULL || symtable2 == NULL)
8781 goto done;
8782
8783 symp = symtable1;
8784 for (isym = isymstart1, isymend = isym + count1;
8785 isym < isymend; isym++)
8786 {
8787 symp->sym = isym;
8788 symp->name = bfd_elf_string_from_elf_section (bfd1,
8789 hdr1->sh_link,
8790 isym->st_name);
8791 symp++;
8792 }
8793
8794 symp = symtable2;
8795 for (isym = isymstart2, isymend = isym + count1;
8796 isym < isymend; isym++)
8797 {
8798 symp->sym = isym;
8799 symp->name = bfd_elf_string_from_elf_section (bfd2,
8800 hdr2->sh_link,
8801 isym->st_name);
8802 symp++;
8803 }
8804
8805 /* Sort symbol by name. */
8806 qsort (symtable1, count1, sizeof (struct elf_symbol),
8807 elf_sym_name_compare);
8808 qsort (symtable2, count1, sizeof (struct elf_symbol),
8809 elf_sym_name_compare);
8810
8811 for (i = 0; i < count1; i++)
8812 /* Two symbols must have the same binding, type and name. */
8813 if (symtable1 [i].sym->st_info != symtable2 [i].sym->st_info
8814 || symtable1 [i].sym->st_other != symtable2 [i].sym->st_other
8815 || strcmp (symtable1 [i].name, symtable2 [i].name) != 0)
8816 goto done;
8817
8818 result = TRUE;
8819
8820done:
8821 if (symtable1)
8822 free (symtable1);
8823 if (symtable2)
8824 free (symtable2);
8825 if (isymbuf1)
8826 free (isymbuf1);
8827 if (isymbuf2)
8828 free (isymbuf2);
8829
8830 return result;
8831}
3b22753a
L
8832
8833/* It is only used by x86-64 so far. */
8834asection _bfd_elf_large_com_section
8835 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 8836 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871
L
8837
8838/* Return TRUE if 2 section types are compatible. */
8839
8840bfd_boolean
8841_bfd_elf_match_sections_by_type (bfd *abfd, const asection *asec,
8842 bfd *bbfd, const asection *bsec)
8843{
8844 if (asec == NULL
8845 || bsec == NULL
8846 || abfd->xvec->flavour != bfd_target_elf_flavour
8847 || bbfd->xvec->flavour != bfd_target_elf_flavour)
8848 return TRUE;
8849
8850 return elf_section_type (asec) == elf_section_type (bsec);
8851}
This page took 1.094418 seconds and 4 git commands to generate.