]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
* config.sub, config.guess: Update from upstream sources.
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
72a80a16
AM
4 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009
5 Free Software Foundation, Inc.
252b5132 6
5e8d7549 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
5e8d7549
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
5e8d7549 12 (at your option) any later version.
252b5132 13
5e8d7549
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
5e8d7549 19 You should have received a copy of the GNU General Public License
b34976b6 20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
23
252b5132 24
1b74d094
BW
25/*
26SECTION
252b5132
RH
27 ELF backends
28
29 BFD support for ELF formats is being worked on.
30 Currently, the best supported back ends are for sparc and i386
31 (running svr4 or Solaris 2).
32
33 Documentation of the internals of the support code still needs
34 to be written. The code is changing quickly enough that we
661a3fd4 35 haven't bothered yet. */
252b5132 36
7ee38065
MS
37/* For sparc64-cross-sparc32. */
38#define _SYSCALL32
252b5132 39#include "sysdep.h"
3db64b00 40#include "bfd.h"
252b5132
RH
41#include "bfdlink.h"
42#include "libbfd.h"
43#define ARCH_SIZE 0
44#include "elf-bfd.h"
e0e8c97f 45#include "libiberty.h"
ff59fc36 46#include "safe-ctype.h"
252b5132 47
217aa764 48static int elf_sort_sections (const void *, const void *);
c84fca4d 49static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
50static bfd_boolean prep_headers (bfd *);
51static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
52static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
53static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
54 file_ptr offset);
50b2bdb7 55
252b5132
RH
56/* Swap version information in and out. The version information is
57 currently size independent. If that ever changes, this code will
58 need to move into elfcode.h. */
59
60/* Swap in a Verdef structure. */
61
62void
217aa764
AM
63_bfd_elf_swap_verdef_in (bfd *abfd,
64 const Elf_External_Verdef *src,
65 Elf_Internal_Verdef *dst)
252b5132 66{
dc810e39
AM
67 dst->vd_version = H_GET_16 (abfd, src->vd_version);
68 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
69 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
70 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
71 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
72 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
73 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
74}
75
76/* Swap out a Verdef structure. */
77
78void
217aa764
AM
79_bfd_elf_swap_verdef_out (bfd *abfd,
80 const Elf_Internal_Verdef *src,
81 Elf_External_Verdef *dst)
252b5132 82{
dc810e39
AM
83 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
84 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
85 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
86 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
87 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
88 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
89 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
90}
91
92/* Swap in a Verdaux structure. */
93
94void
217aa764
AM
95_bfd_elf_swap_verdaux_in (bfd *abfd,
96 const Elf_External_Verdaux *src,
97 Elf_Internal_Verdaux *dst)
252b5132 98{
dc810e39
AM
99 dst->vda_name = H_GET_32 (abfd, src->vda_name);
100 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
101}
102
103/* Swap out a Verdaux structure. */
104
105void
217aa764
AM
106_bfd_elf_swap_verdaux_out (bfd *abfd,
107 const Elf_Internal_Verdaux *src,
108 Elf_External_Verdaux *dst)
252b5132 109{
dc810e39
AM
110 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
111 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
112}
113
114/* Swap in a Verneed structure. */
115
116void
217aa764
AM
117_bfd_elf_swap_verneed_in (bfd *abfd,
118 const Elf_External_Verneed *src,
119 Elf_Internal_Verneed *dst)
252b5132 120{
dc810e39
AM
121 dst->vn_version = H_GET_16 (abfd, src->vn_version);
122 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
123 dst->vn_file = H_GET_32 (abfd, src->vn_file);
124 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
125 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
126}
127
128/* Swap out a Verneed structure. */
129
130void
217aa764
AM
131_bfd_elf_swap_verneed_out (bfd *abfd,
132 const Elf_Internal_Verneed *src,
133 Elf_External_Verneed *dst)
252b5132 134{
dc810e39
AM
135 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
136 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
137 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
138 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
139 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
140}
141
142/* Swap in a Vernaux structure. */
143
144void
217aa764
AM
145_bfd_elf_swap_vernaux_in (bfd *abfd,
146 const Elf_External_Vernaux *src,
147 Elf_Internal_Vernaux *dst)
252b5132 148{
dc810e39
AM
149 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
150 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
151 dst->vna_other = H_GET_16 (abfd, src->vna_other);
152 dst->vna_name = H_GET_32 (abfd, src->vna_name);
153 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
154}
155
156/* Swap out a Vernaux structure. */
157
158void
217aa764
AM
159_bfd_elf_swap_vernaux_out (bfd *abfd,
160 const Elf_Internal_Vernaux *src,
161 Elf_External_Vernaux *dst)
252b5132 162{
dc810e39
AM
163 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
164 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
165 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
166 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
167 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
168}
169
170/* Swap in a Versym structure. */
171
172void
217aa764
AM
173_bfd_elf_swap_versym_in (bfd *abfd,
174 const Elf_External_Versym *src,
175 Elf_Internal_Versym *dst)
252b5132 176{
dc810e39 177 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
178}
179
180/* Swap out a Versym structure. */
181
182void
217aa764
AM
183_bfd_elf_swap_versym_out (bfd *abfd,
184 const Elf_Internal_Versym *src,
185 Elf_External_Versym *dst)
252b5132 186{
dc810e39 187 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
188}
189
190/* Standard ELF hash function. Do not change this function; you will
191 cause invalid hash tables to be generated. */
3a99b017 192
252b5132 193unsigned long
217aa764 194bfd_elf_hash (const char *namearg)
252b5132 195{
3a99b017 196 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
197 unsigned long h = 0;
198 unsigned long g;
199 int ch;
200
201 while ((ch = *name++) != '\0')
202 {
203 h = (h << 4) + ch;
204 if ((g = (h & 0xf0000000)) != 0)
205 {
206 h ^= g >> 24;
207 /* The ELF ABI says `h &= ~g', but this is equivalent in
208 this case and on some machines one insn instead of two. */
209 h ^= g;
210 }
211 }
32dfa85d 212 return h & 0xffffffff;
252b5132
RH
213}
214
fdc90cb4
JJ
215/* DT_GNU_HASH hash function. Do not change this function; you will
216 cause invalid hash tables to be generated. */
217
218unsigned long
219bfd_elf_gnu_hash (const char *namearg)
220{
221 const unsigned char *name = (const unsigned char *) namearg;
222 unsigned long h = 5381;
223 unsigned char ch;
224
225 while ((ch = *name++) != '\0')
226 h = (h << 5) + h + ch;
227 return h & 0xffffffff;
228}
229
0c8d6e5c
AM
230/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
231 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 232bfd_boolean
0c8d6e5c 233bfd_elf_allocate_object (bfd *abfd,
0ffa91dd
NC
234 size_t object_size,
235 enum elf_object_id object_id)
252b5132 236{
0ffa91dd
NC
237 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
238 abfd->tdata.any = bfd_zalloc (abfd, object_size);
239 if (abfd->tdata.any == NULL)
240 return FALSE;
252b5132 241
0ffa91dd
NC
242 elf_object_id (abfd) = object_id;
243 elf_program_header_size (abfd) = (bfd_size_type) -1;
b34976b6 244 return TRUE;
252b5132
RH
245}
246
0ffa91dd
NC
247
248bfd_boolean
249bfd_elf_make_generic_object (bfd *abfd)
250{
251 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
252 GENERIC_ELF_TDATA);
253}
254
b34976b6 255bfd_boolean
217aa764 256bfd_elf_mkcorefile (bfd *abfd)
252b5132 257{
c044fabd 258 /* I think this can be done just like an object file. */
0ffa91dd 259 return bfd_elf_make_generic_object (abfd);
252b5132
RH
260}
261
72a80a16 262static char *
217aa764 263bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
264{
265 Elf_Internal_Shdr **i_shdrp;
f075ee0c 266 bfd_byte *shstrtab = NULL;
dc810e39
AM
267 file_ptr offset;
268 bfd_size_type shstrtabsize;
252b5132
RH
269
270 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
271 if (i_shdrp == 0
272 || shindex >= elf_numsections (abfd)
273 || i_shdrp[shindex] == 0)
f075ee0c 274 return NULL;
252b5132 275
f075ee0c 276 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
277 if (shstrtab == NULL)
278 {
c044fabd 279 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
280 offset = i_shdrp[shindex]->sh_offset;
281 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
282
283 /* Allocate and clear an extra byte at the end, to prevent crashes
284 in case the string table is not terminated. */
3471d59d 285 if (shstrtabsize + 1 <= 1
a50b1753 286 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL
c6c60d09
JJ
287 || bfd_seek (abfd, offset, SEEK_SET) != 0)
288 shstrtab = NULL;
289 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
290 {
291 if (bfd_get_error () != bfd_error_system_call)
292 bfd_set_error (bfd_error_file_truncated);
293 shstrtab = NULL;
3471d59d
CC
294 /* Once we've failed to read it, make sure we don't keep
295 trying. Otherwise, we'll keep allocating space for
296 the string table over and over. */
297 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
298 }
299 else
300 shstrtab[shstrtabsize] = '\0';
217aa764 301 i_shdrp[shindex]->contents = shstrtab;
252b5132 302 }
f075ee0c 303 return (char *) shstrtab;
252b5132
RH
304}
305
306char *
217aa764
AM
307bfd_elf_string_from_elf_section (bfd *abfd,
308 unsigned int shindex,
309 unsigned int strindex)
252b5132
RH
310{
311 Elf_Internal_Shdr *hdr;
312
313 if (strindex == 0)
314 return "";
315
74f2e02b
AM
316 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
317 return NULL;
318
252b5132
RH
319 hdr = elf_elfsections (abfd)[shindex];
320
321 if (hdr->contents == NULL
322 && bfd_elf_get_str_section (abfd, shindex) == NULL)
323 return NULL;
324
325 if (strindex >= hdr->sh_size)
326 {
1b3a8575 327 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 328 (*_bfd_error_handler)
d003868e
AM
329 (_("%B: invalid string offset %u >= %lu for section `%s'"),
330 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 331 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 332 ? ".shstrtab"
1b3a8575 333 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 334 return NULL;
252b5132
RH
335 }
336
337 return ((char *) hdr->contents) + strindex;
338}
339
6cdc0ccc
AM
340/* Read and convert symbols to internal format.
341 SYMCOUNT specifies the number of symbols to read, starting from
342 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
343 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
344 symbols, and symbol section index extensions, respectively.
345 Returns a pointer to the internal symbol buffer (malloced if necessary)
346 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
347
348Elf_Internal_Sym *
217aa764
AM
349bfd_elf_get_elf_syms (bfd *ibfd,
350 Elf_Internal_Shdr *symtab_hdr,
351 size_t symcount,
352 size_t symoffset,
353 Elf_Internal_Sym *intsym_buf,
354 void *extsym_buf,
355 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
356{
357 Elf_Internal_Shdr *shndx_hdr;
217aa764 358 void *alloc_ext;
df622259 359 const bfd_byte *esym;
6cdc0ccc
AM
360 Elf_External_Sym_Shndx *alloc_extshndx;
361 Elf_External_Sym_Shndx *shndx;
4dd07732 362 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
363 Elf_Internal_Sym *isym;
364 Elf_Internal_Sym *isymend;
9c5bfbb7 365 const struct elf_backend_data *bed;
6cdc0ccc
AM
366 size_t extsym_size;
367 bfd_size_type amt;
368 file_ptr pos;
369
e44a2c9c
AM
370 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
371 abort ();
372
6cdc0ccc
AM
373 if (symcount == 0)
374 return intsym_buf;
375
376 /* Normal syms might have section extension entries. */
377 shndx_hdr = NULL;
378 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
379 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
380
381 /* Read the symbols. */
382 alloc_ext = NULL;
383 alloc_extshndx = NULL;
4dd07732 384 alloc_intsym = NULL;
6cdc0ccc
AM
385 bed = get_elf_backend_data (ibfd);
386 extsym_size = bed->s->sizeof_sym;
387 amt = symcount * extsym_size;
388 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
389 if (extsym_buf == NULL)
390 {
d0fb9a8d 391 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
392 extsym_buf = alloc_ext;
393 }
394 if (extsym_buf == NULL
395 || bfd_seek (ibfd, pos, SEEK_SET) != 0
396 || bfd_bread (extsym_buf, amt, ibfd) != amt)
397 {
398 intsym_buf = NULL;
399 goto out;
400 }
401
402 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
403 extshndx_buf = NULL;
404 else
405 {
406 amt = symcount * sizeof (Elf_External_Sym_Shndx);
407 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
408 if (extshndx_buf == NULL)
409 {
a50b1753
NC
410 alloc_extshndx = (Elf_External_Sym_Shndx *)
411 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
412 extshndx_buf = alloc_extshndx;
413 }
414 if (extshndx_buf == NULL
415 || bfd_seek (ibfd, pos, SEEK_SET) != 0
416 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
417 {
418 intsym_buf = NULL;
419 goto out;
420 }
421 }
422
423 if (intsym_buf == NULL)
424 {
a50b1753
NC
425 alloc_intsym = (Elf_Internal_Sym *)
426 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 427 intsym_buf = alloc_intsym;
6cdc0ccc
AM
428 if (intsym_buf == NULL)
429 goto out;
430 }
431
432 /* Convert the symbols to internal form. */
433 isymend = intsym_buf + symcount;
a50b1753
NC
434 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
435 shndx = extshndx_buf;
6cdc0ccc
AM
436 isym < isymend;
437 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
438 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
439 {
440 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
441 (*_bfd_error_handler) (_("%B symbol number %lu references "
442 "nonexistent SHT_SYMTAB_SHNDX section"),
443 ibfd, (unsigned long) symoffset);
4dd07732
AM
444 if (alloc_intsym != NULL)
445 free (alloc_intsym);
8384fb8f
AM
446 intsym_buf = NULL;
447 goto out;
448 }
6cdc0ccc
AM
449
450 out:
451 if (alloc_ext != NULL)
452 free (alloc_ext);
453 if (alloc_extshndx != NULL)
454 free (alloc_extshndx);
455
456 return intsym_buf;
457}
458
5cab59f6
AM
459/* Look up a symbol name. */
460const char *
be8dd2ca
AM
461bfd_elf_sym_name (bfd *abfd,
462 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
463 Elf_Internal_Sym *isym,
464 asection *sym_sec)
5cab59f6 465{
26c61ae5 466 const char *name;
5cab59f6 467 unsigned int iname = isym->st_name;
be8dd2ca 468 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 469
138f35cc
JJ
470 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
471 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 472 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
473 {
474 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
475 shindex = elf_elfheader (abfd)->e_shstrndx;
476 }
477
26c61ae5
L
478 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
479 if (name == NULL)
480 name = "(null)";
481 else if (sym_sec && *name == '\0')
482 name = bfd_section_name (abfd, sym_sec);
483
484 return name;
5cab59f6
AM
485}
486
dbb410c3
AM
487/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
488 sections. The first element is the flags, the rest are section
489 pointers. */
490
491typedef union elf_internal_group {
492 Elf_Internal_Shdr *shdr;
493 unsigned int flags;
494} Elf_Internal_Group;
495
b885599b
AM
496/* Return the name of the group signature symbol. Why isn't the
497 signature just a string? */
498
499static const char *
217aa764 500group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 501{
9dce4196 502 Elf_Internal_Shdr *hdr;
9dce4196
AM
503 unsigned char esym[sizeof (Elf64_External_Sym)];
504 Elf_External_Sym_Shndx eshndx;
505 Elf_Internal_Sym isym;
b885599b 506
13792e9d
L
507 /* First we need to ensure the symbol table is available. Make sure
508 that it is a symbol table section. */
4fbb74a6
AM
509 if (ghdr->sh_link >= elf_numsections (abfd))
510 return NULL;
13792e9d
L
511 hdr = elf_elfsections (abfd) [ghdr->sh_link];
512 if (hdr->sh_type != SHT_SYMTAB
513 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
514 return NULL;
515
9dce4196
AM
516 /* Go read the symbol. */
517 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
518 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
519 &isym, esym, &eshndx) == NULL)
b885599b 520 return NULL;
9dce4196 521
26c61ae5 522 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
523}
524
dbb410c3
AM
525/* Set next_in_group list pointer, and group name for NEWSECT. */
526
b34976b6 527static bfd_boolean
217aa764 528setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
529{
530 unsigned int num_group = elf_tdata (abfd)->num_group;
531
532 /* If num_group is zero, read in all SHT_GROUP sections. The count
533 is set to -1 if there are no SHT_GROUP sections. */
534 if (num_group == 0)
535 {
536 unsigned int i, shnum;
537
538 /* First count the number of groups. If we have a SHT_GROUP
539 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 540 shnum = elf_numsections (abfd);
dbb410c3 541 num_group = 0;
08a40648 542
1783205a
NC
543#define IS_VALID_GROUP_SECTION_HEADER(shdr) \
544 ( (shdr)->sh_type == SHT_GROUP \
545 && (shdr)->sh_size >= (2 * GRP_ENTRY_SIZE) \
546 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
547 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 548
dbb410c3
AM
549 for (i = 0; i < shnum; i++)
550 {
551 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
552
553 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3
AM
554 num_group += 1;
555 }
556
557 if (num_group == 0)
20dbb49d
L
558 {
559 num_group = (unsigned) -1;
560 elf_tdata (abfd)->num_group = num_group;
561 }
562 else
dbb410c3
AM
563 {
564 /* We keep a list of elf section headers for group sections,
565 so we can find them quickly. */
20dbb49d 566 bfd_size_type amt;
d0fb9a8d 567
20dbb49d 568 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
569 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
570 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 571 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 572 return FALSE;
dbb410c3
AM
573
574 num_group = 0;
575 for (i = 0; i < shnum; i++)
576 {
577 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
578
579 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3 580 {
973ffd63 581 unsigned char *src;
dbb410c3
AM
582 Elf_Internal_Group *dest;
583
584 /* Add to list of sections. */
585 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
586 num_group += 1;
587
588 /* Read the raw contents. */
589 BFD_ASSERT (sizeof (*dest) >= 4);
590 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
591 shdr->contents = (unsigned char *)
592 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
593 /* PR binutils/4110: Handle corrupt group headers. */
594 if (shdr->contents == NULL)
595 {
596 _bfd_error_handler
597 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
598 bfd_set_error (bfd_error_bad_value);
599 return FALSE;
600 }
601
602 memset (shdr->contents, 0, amt);
603
604 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
605 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
606 != shdr->sh_size))
b34976b6 607 return FALSE;
dbb410c3
AM
608
609 /* Translate raw contents, a flag word followed by an
610 array of elf section indices all in target byte order,
611 to the flag word followed by an array of elf section
612 pointers. */
613 src = shdr->contents + shdr->sh_size;
614 dest = (Elf_Internal_Group *) (shdr->contents + amt);
615 while (1)
616 {
617 unsigned int idx;
618
619 src -= 4;
620 --dest;
621 idx = H_GET_32 (abfd, src);
622 if (src == shdr->contents)
623 {
624 dest->flags = idx;
b885599b
AM
625 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
626 shdr->bfd_section->flags
627 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
628 break;
629 }
630 if (idx >= shnum)
631 {
632 ((*_bfd_error_handler)
d003868e 633 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
634 idx = 0;
635 }
636 dest->shdr = elf_elfsections (abfd)[idx];
637 }
638 }
639 }
640 }
641 }
642
643 if (num_group != (unsigned) -1)
644 {
645 unsigned int i;
646
647 for (i = 0; i < num_group; i++)
648 {
649 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
650 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
651 unsigned int n_elt = shdr->sh_size / 4;
652
653 /* Look through this group's sections to see if current
654 section is a member. */
655 while (--n_elt != 0)
656 if ((++idx)->shdr == hdr)
657 {
e0e8c97f 658 asection *s = NULL;
dbb410c3
AM
659
660 /* We are a member of this group. Go looking through
661 other members to see if any others are linked via
662 next_in_group. */
663 idx = (Elf_Internal_Group *) shdr->contents;
664 n_elt = shdr->sh_size / 4;
665 while (--n_elt != 0)
666 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 667 && elf_next_in_group (s) != NULL)
dbb410c3
AM
668 break;
669 if (n_elt != 0)
670 {
dbb410c3
AM
671 /* Snarf the group name from other member, and
672 insert current section in circular list. */
945906ff
AM
673 elf_group_name (newsect) = elf_group_name (s);
674 elf_next_in_group (newsect) = elf_next_in_group (s);
675 elf_next_in_group (s) = newsect;
dbb410c3
AM
676 }
677 else
678 {
dbb410c3
AM
679 const char *gname;
680
b885599b
AM
681 gname = group_signature (abfd, shdr);
682 if (gname == NULL)
b34976b6 683 return FALSE;
945906ff 684 elf_group_name (newsect) = gname;
dbb410c3
AM
685
686 /* Start a circular list with one element. */
945906ff 687 elf_next_in_group (newsect) = newsect;
dbb410c3 688 }
b885599b 689
9dce4196
AM
690 /* If the group section has been created, point to the
691 new member. */
dbb410c3 692 if (shdr->bfd_section != NULL)
945906ff 693 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 694
dbb410c3
AM
695 i = num_group - 1;
696 break;
697 }
698 }
699 }
700
945906ff 701 if (elf_group_name (newsect) == NULL)
dbb410c3 702 {
d003868e
AM
703 (*_bfd_error_handler) (_("%B: no group info for section %A"),
704 abfd, newsect);
dbb410c3 705 }
b34976b6 706 return TRUE;
dbb410c3
AM
707}
708
3d7f7666 709bfd_boolean
dd863624 710_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
711{
712 unsigned int i;
713 unsigned int num_group = elf_tdata (abfd)->num_group;
714 bfd_boolean result = TRUE;
dd863624
L
715 asection *s;
716
717 /* Process SHF_LINK_ORDER. */
718 for (s = abfd->sections; s != NULL; s = s->next)
719 {
720 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
721 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
722 {
723 unsigned int elfsec = this_hdr->sh_link;
724 /* FIXME: The old Intel compiler and old strip/objcopy may
725 not set the sh_link or sh_info fields. Hence we could
726 get the situation where elfsec is 0. */
727 if (elfsec == 0)
728 {
4fbb74a6 729 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
730 if (bed->link_order_error_handler)
731 bed->link_order_error_handler
732 (_("%B: warning: sh_link not set for section `%A'"),
733 abfd, s);
734 }
735 else
736 {
91d6fa6a 737 asection *linksec = NULL;
25bbc984 738
4fbb74a6
AM
739 if (elfsec < elf_numsections (abfd))
740 {
741 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 742 linksec = this_hdr->bfd_section;
4fbb74a6 743 }
25bbc984
L
744
745 /* PR 1991, 2008:
746 Some strip/objcopy may leave an incorrect value in
747 sh_link. We don't want to proceed. */
91d6fa6a 748 if (linksec == NULL)
25bbc984
L
749 {
750 (*_bfd_error_handler)
751 (_("%B: sh_link [%d] in section `%A' is incorrect"),
752 s->owner, s, elfsec);
753 result = FALSE;
754 }
755
91d6fa6a 756 elf_linked_to_section (s) = linksec;
dd863624
L
757 }
758 }
759 }
3d7f7666 760
dd863624 761 /* Process section groups. */
3d7f7666
L
762 if (num_group == (unsigned) -1)
763 return result;
764
765 for (i = 0; i < num_group; i++)
766 {
767 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
768 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
769 unsigned int n_elt = shdr->sh_size / 4;
770
771 while (--n_elt != 0)
772 if ((++idx)->shdr->bfd_section)
773 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
774 else if (idx->shdr->sh_type == SHT_RELA
775 || idx->shdr->sh_type == SHT_REL)
776 /* We won't include relocation sections in section groups in
777 output object files. We adjust the group section size here
778 so that relocatable link will work correctly when
779 relocation sections are in section group in input object
780 files. */
781 shdr->bfd_section->size -= 4;
782 else
783 {
784 /* There are some unknown sections in the group. */
785 (*_bfd_error_handler)
d003868e
AM
786 (_("%B: unknown [%d] section `%s' in group [%s]"),
787 abfd,
3d7f7666 788 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
789 bfd_elf_string_from_elf_section (abfd,
790 (elf_elfheader (abfd)
791 ->e_shstrndx),
792 idx->shdr->sh_name),
3d7f7666
L
793 shdr->bfd_section->name);
794 result = FALSE;
795 }
796 }
797 return result;
798}
799
72adc230
AM
800bfd_boolean
801bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
802{
803 return elf_next_in_group (sec) != NULL;
804}
805
252b5132
RH
806/* Make a BFD section from an ELF section. We store a pointer to the
807 BFD section in the bfd_section field of the header. */
808
b34976b6 809bfd_boolean
217aa764
AM
810_bfd_elf_make_section_from_shdr (bfd *abfd,
811 Elf_Internal_Shdr *hdr,
6dc132d9
L
812 const char *name,
813 int shindex)
252b5132
RH
814{
815 asection *newsect;
816 flagword flags;
9c5bfbb7 817 const struct elf_backend_data *bed;
252b5132
RH
818
819 if (hdr->bfd_section != NULL)
820 {
821 BFD_ASSERT (strcmp (name,
822 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 823 return TRUE;
252b5132
RH
824 }
825
826 newsect = bfd_make_section_anyway (abfd, name);
827 if (newsect == NULL)
b34976b6 828 return FALSE;
252b5132 829
1829f4b2
AM
830 hdr->bfd_section = newsect;
831 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 832 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 833
2f89ff8d
L
834 /* Always use the real type/flags. */
835 elf_section_type (newsect) = hdr->sh_type;
836 elf_section_flags (newsect) = hdr->sh_flags;
837
252b5132
RH
838 newsect->filepos = hdr->sh_offset;
839
840 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
841 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
842 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 843 bfd_log2 (hdr->sh_addralign)))
b34976b6 844 return FALSE;
252b5132
RH
845
846 flags = SEC_NO_FLAGS;
847 if (hdr->sh_type != SHT_NOBITS)
848 flags |= SEC_HAS_CONTENTS;
dbb410c3 849 if (hdr->sh_type == SHT_GROUP)
b3096250 850 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
851 if ((hdr->sh_flags & SHF_ALLOC) != 0)
852 {
853 flags |= SEC_ALLOC;
854 if (hdr->sh_type != SHT_NOBITS)
855 flags |= SEC_LOAD;
856 }
857 if ((hdr->sh_flags & SHF_WRITE) == 0)
858 flags |= SEC_READONLY;
859 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
860 flags |= SEC_CODE;
861 else if ((flags & SEC_LOAD) != 0)
862 flags |= SEC_DATA;
f5fa8ca2
JJ
863 if ((hdr->sh_flags & SHF_MERGE) != 0)
864 {
865 flags |= SEC_MERGE;
866 newsect->entsize = hdr->sh_entsize;
867 if ((hdr->sh_flags & SHF_STRINGS) != 0)
868 flags |= SEC_STRINGS;
869 }
dbb410c3
AM
870 if (hdr->sh_flags & SHF_GROUP)
871 if (!setup_group (abfd, hdr, newsect))
b34976b6 872 return FALSE;
13ae64f3
JJ
873 if ((hdr->sh_flags & SHF_TLS) != 0)
874 flags |= SEC_THREAD_LOCAL;
252b5132 875
3d2b39cf 876 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 877 {
3d2b39cf
L
878 /* The debugging sections appear to be recognized only by name,
879 not any sort of flag. Their SEC_ALLOC bits are cleared. */
880 static const struct
881 {
882 const char *name;
883 int len;
884 } debug_sections [] =
885 {
0112cd26 886 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
887 { NULL, 0 }, /* 'e' */
888 { NULL, 0 }, /* 'f' */
0112cd26 889 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
890 { NULL, 0 }, /* 'h' */
891 { NULL, 0 }, /* 'i' */
892 { NULL, 0 }, /* 'j' */
893 { NULL, 0 }, /* 'k' */
0112cd26 894 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
895 { NULL, 0 }, /* 'm' */
896 { NULL, 0 }, /* 'n' */
897 { NULL, 0 }, /* 'o' */
898 { NULL, 0 }, /* 'p' */
899 { NULL, 0 }, /* 'q' */
900 { NULL, 0 }, /* 'r' */
1b315056
CS
901 { STRING_COMMA_LEN ("stab") }, /* 's' */
902 { NULL, 0 }, /* 't' */
903 { NULL, 0 }, /* 'u' */
904 { NULL, 0 }, /* 'v' */
905 { NULL, 0 }, /* 'w' */
906 { NULL, 0 }, /* 'x' */
907 { NULL, 0 }, /* 'y' */
908 { STRING_COMMA_LEN ("zdebug") } /* 'z' */
3d2b39cf 909 };
08a40648 910
3d2b39cf
L
911 if (name [0] == '.')
912 {
913 int i = name [1] - 'd';
914 if (i >= 0
915 && i < (int) ARRAY_SIZE (debug_sections)
916 && debug_sections [i].name != NULL
917 && strncmp (&name [1], debug_sections [i].name,
918 debug_sections [i].len) == 0)
919 flags |= SEC_DEBUGGING;
920 }
921 }
252b5132
RH
922
923 /* As a GNU extension, if the name begins with .gnu.linkonce, we
924 only link a single copy of the section. This is used to support
925 g++. g++ will emit each template expansion in its own section.
926 The symbols will be defined as weak, so that multiple definitions
927 are permitted. The GNU linker extension is to actually discard
928 all but one of the sections. */
0112cd26 929 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 930 && elf_next_in_group (newsect) == NULL)
252b5132
RH
931 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
932
fa152c49
JW
933 bed = get_elf_backend_data (abfd);
934 if (bed->elf_backend_section_flags)
935 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 936 return FALSE;
fa152c49 937
252b5132 938 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 939 return FALSE;
252b5132 940
718175fa
JK
941 /* We do not parse the PT_NOTE segments as we are interested even in the
942 separate debug info files which may have the segments offsets corrupted.
943 PT_NOTEs from the core files are currently not parsed using BFD. */
944 if (hdr->sh_type == SHT_NOTE)
945 {
baea7ef1 946 bfd_byte *contents;
718175fa 947
baea7ef1 948 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
949 return FALSE;
950
baea7ef1 951 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
952 free (contents);
953 }
954
252b5132
RH
955 if ((flags & SEC_ALLOC) != 0)
956 {
957 Elf_Internal_Phdr *phdr;
6ffd7900
AM
958 unsigned int i, nload;
959
960 /* Some ELF linkers produce binaries with all the program header
961 p_paddr fields zero. If we have such a binary with more than
962 one PT_LOAD header, then leave the section lma equal to vma
963 so that we don't create sections with overlapping lma. */
964 phdr = elf_tdata (abfd)->phdr;
965 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
966 if (phdr->p_paddr != 0)
967 break;
968 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
969 ++nload;
970 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
971 return TRUE;
252b5132 972
252b5132
RH
973 phdr = elf_tdata (abfd)->phdr;
974 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
975 {
88967714 976 if (phdr->p_type == PT_LOAD
e7e75368 977 && ELF_IS_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 978 {
88967714
AM
979 if ((flags & SEC_LOAD) == 0)
980 newsect->lma = (phdr->p_paddr
981 + hdr->sh_addr - phdr->p_vaddr);
982 else
983 /* We used to use the same adjustment for SEC_LOAD
984 sections, but that doesn't work if the segment
985 is packed with code from multiple VMAs.
986 Instead we calculate the section LMA based on
987 the segment LMA. It is assumed that the
988 segment will contain sections with contiguous
989 LMAs, even if the VMAs are not. */
990 newsect->lma = (phdr->p_paddr
991 + hdr->sh_offset - phdr->p_offset);
992
993 /* With contiguous segments, we can't tell from file
994 offsets whether a section with zero size should
995 be placed at the end of one segment or the
996 beginning of the next. Decide based on vaddr. */
997 if (hdr->sh_addr >= phdr->p_vaddr
998 && (hdr->sh_addr + hdr->sh_size
999 <= phdr->p_vaddr + phdr->p_memsz))
1000 break;
252b5132
RH
1001 }
1002 }
1003 }
1004
b34976b6 1005 return TRUE;
252b5132
RH
1006}
1007
252b5132
RH
1008const char *const bfd_elf_section_type_names[] = {
1009 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1010 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1011 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1012};
1013
1049f94e 1014/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1015 output, and the reloc is against an external symbol, and nothing
1016 has given us any additional addend, the resulting reloc will also
1017 be against the same symbol. In such a case, we don't want to
1018 change anything about the way the reloc is handled, since it will
1019 all be done at final link time. Rather than put special case code
1020 into bfd_perform_relocation, all the reloc types use this howto
1021 function. It just short circuits the reloc if producing
1049f94e 1022 relocatable output against an external symbol. */
252b5132 1023
252b5132 1024bfd_reloc_status_type
217aa764
AM
1025bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1026 arelent *reloc_entry,
1027 asymbol *symbol,
1028 void *data ATTRIBUTE_UNUSED,
1029 asection *input_section,
1030 bfd *output_bfd,
1031 char **error_message ATTRIBUTE_UNUSED)
1032{
1033 if (output_bfd != NULL
252b5132
RH
1034 && (symbol->flags & BSF_SECTION_SYM) == 0
1035 && (! reloc_entry->howto->partial_inplace
1036 || reloc_entry->addend == 0))
1037 {
1038 reloc_entry->address += input_section->output_offset;
1039 return bfd_reloc_ok;
1040 }
1041
1042 return bfd_reloc_continue;
1043}
1044\f
0ac4564e
L
1045/* Copy the program header and other data from one object module to
1046 another. */
252b5132 1047
b34976b6 1048bfd_boolean
217aa764 1049_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1050{
1051 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1052 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1053 return TRUE;
2d502050
L
1054
1055 BFD_ASSERT (!elf_flags_init (obfd)
1056 || (elf_elfheader (obfd)->e_flags
1057 == elf_elfheader (ibfd)->e_flags));
1058
0ac4564e 1059 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1060 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1061 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1062
1063 /* Copy object attributes. */
1064 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1065
b34976b6 1066 return TRUE;
2d502050
L
1067}
1068
cedc298e
L
1069static const char *
1070get_segment_type (unsigned int p_type)
1071{
1072 const char *pt;
1073 switch (p_type)
1074 {
1075 case PT_NULL: pt = "NULL"; break;
1076 case PT_LOAD: pt = "LOAD"; break;
1077 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1078 case PT_INTERP: pt = "INTERP"; break;
1079 case PT_NOTE: pt = "NOTE"; break;
1080 case PT_SHLIB: pt = "SHLIB"; break;
1081 case PT_PHDR: pt = "PHDR"; break;
1082 case PT_TLS: pt = "TLS"; break;
1083 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1084 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1085 case PT_GNU_RELRO: pt = "RELRO"; break;
1086 default: pt = NULL; break;
1087 }
1088 return pt;
1089}
1090
f0b79d91
L
1091/* Print out the program headers. */
1092
b34976b6 1093bfd_boolean
217aa764 1094_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1095{
a50b1753 1096 FILE *f = (FILE *) farg;
252b5132
RH
1097 Elf_Internal_Phdr *p;
1098 asection *s;
1099 bfd_byte *dynbuf = NULL;
1100
1101 p = elf_tdata (abfd)->phdr;
1102 if (p != NULL)
1103 {
1104 unsigned int i, c;
1105
1106 fprintf (f, _("\nProgram Header:\n"));
1107 c = elf_elfheader (abfd)->e_phnum;
1108 for (i = 0; i < c; i++, p++)
1109 {
cedc298e 1110 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1111 char buf[20];
1112
cedc298e 1113 if (pt == NULL)
252b5132 1114 {
cedc298e
L
1115 sprintf (buf, "0x%lx", p->p_type);
1116 pt = buf;
252b5132 1117 }
dc810e39 1118 fprintf (f, "%8s off 0x", pt);
60b89a18 1119 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1120 fprintf (f, " vaddr 0x");
60b89a18 1121 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1122 fprintf (f, " paddr 0x");
60b89a18 1123 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1124 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1125 fprintf (f, " filesz 0x");
60b89a18 1126 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1127 fprintf (f, " memsz 0x");
60b89a18 1128 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1129 fprintf (f, " flags %c%c%c",
1130 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1131 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1132 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1133 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1134 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1135 fprintf (f, "\n");
1136 }
1137 }
1138
1139 s = bfd_get_section_by_name (abfd, ".dynamic");
1140 if (s != NULL)
1141 {
cb33740c 1142 unsigned int elfsec;
dc810e39 1143 unsigned long shlink;
252b5132
RH
1144 bfd_byte *extdyn, *extdynend;
1145 size_t extdynsize;
217aa764 1146 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1147
1148 fprintf (f, _("\nDynamic Section:\n"));
1149
eea6121a 1150 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1151 goto error_return;
1152
1153 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1154 if (elfsec == SHN_BAD)
252b5132 1155 goto error_return;
dc810e39 1156 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1157
1158 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1159 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1160
1161 extdyn = dynbuf;
eea6121a 1162 extdynend = extdyn + s->size;
252b5132
RH
1163 for (; extdyn < extdynend; extdyn += extdynsize)
1164 {
1165 Elf_Internal_Dyn dyn;
ad9563d6 1166 const char *name = "";
252b5132 1167 char ab[20];
b34976b6 1168 bfd_boolean stringp;
ad9563d6 1169 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1170
217aa764 1171 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1172
1173 if (dyn.d_tag == DT_NULL)
1174 break;
1175
b34976b6 1176 stringp = FALSE;
252b5132
RH
1177 switch (dyn.d_tag)
1178 {
1179 default:
ad9563d6
CM
1180 if (bed->elf_backend_get_target_dtag)
1181 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1182
1183 if (!strcmp (name, ""))
1184 {
1185 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1186 name = ab;
1187 }
252b5132
RH
1188 break;
1189
b34976b6 1190 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1191 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1192 case DT_PLTGOT: name = "PLTGOT"; break;
1193 case DT_HASH: name = "HASH"; break;
1194 case DT_STRTAB: name = "STRTAB"; break;
1195 case DT_SYMTAB: name = "SYMTAB"; break;
1196 case DT_RELA: name = "RELA"; break;
1197 case DT_RELASZ: name = "RELASZ"; break;
1198 case DT_RELAENT: name = "RELAENT"; break;
1199 case DT_STRSZ: name = "STRSZ"; break;
1200 case DT_SYMENT: name = "SYMENT"; break;
1201 case DT_INIT: name = "INIT"; break;
1202 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1203 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1204 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1205 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1206 case DT_REL: name = "REL"; break;
1207 case DT_RELSZ: name = "RELSZ"; break;
1208 case DT_RELENT: name = "RELENT"; break;
1209 case DT_PLTREL: name = "PLTREL"; break;
1210 case DT_DEBUG: name = "DEBUG"; break;
1211 case DT_TEXTREL: name = "TEXTREL"; break;
1212 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1213 case DT_BIND_NOW: name = "BIND_NOW"; break;
1214 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1215 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1216 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1217 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1218 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1219 case DT_FLAGS: name = "FLAGS"; break;
1220 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1221 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1222 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1223 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1224 case DT_MOVEENT: name = "MOVEENT"; break;
1225 case DT_MOVESZ: name = "MOVESZ"; break;
1226 case DT_FEATURE: name = "FEATURE"; break;
1227 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1228 case DT_SYMINSZ: name = "SYMINSZ"; break;
1229 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1230 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1231 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1232 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1233 case DT_PLTPAD: name = "PLTPAD"; break;
1234 case DT_MOVETAB: name = "MOVETAB"; break;
1235 case DT_SYMINFO: name = "SYMINFO"; break;
1236 case DT_RELACOUNT: name = "RELACOUNT"; break;
1237 case DT_RELCOUNT: name = "RELCOUNT"; break;
1238 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1239 case DT_VERSYM: name = "VERSYM"; break;
1240 case DT_VERDEF: name = "VERDEF"; break;
1241 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1242 case DT_VERNEED: name = "VERNEED"; break;
1243 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1244 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1245 case DT_USED: name = "USED"; break;
b34976b6 1246 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1247 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1248 }
1249
ad9563d6 1250 fprintf (f, " %-20s ", name);
252b5132 1251 if (! stringp)
a1f3c56e
AN
1252 {
1253 fprintf (f, "0x");
1254 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1255 }
252b5132
RH
1256 else
1257 {
1258 const char *string;
dc810e39 1259 unsigned int tagv = dyn.d_un.d_val;
252b5132 1260
dc810e39 1261 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1262 if (string == NULL)
1263 goto error_return;
1264 fprintf (f, "%s", string);
1265 }
1266 fprintf (f, "\n");
1267 }
1268
1269 free (dynbuf);
1270 dynbuf = NULL;
1271 }
1272
1273 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1274 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1275 {
fc0e6df6 1276 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1277 return FALSE;
252b5132
RH
1278 }
1279
1280 if (elf_dynverdef (abfd) != 0)
1281 {
1282 Elf_Internal_Verdef *t;
1283
1284 fprintf (f, _("\nVersion definitions:\n"));
1285 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1286 {
1287 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1288 t->vd_flags, t->vd_hash,
1289 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1290 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1291 {
1292 Elf_Internal_Verdaux *a;
1293
1294 fprintf (f, "\t");
1295 for (a = t->vd_auxptr->vda_nextptr;
1296 a != NULL;
1297 a = a->vda_nextptr)
d0fb9a8d
JJ
1298 fprintf (f, "%s ",
1299 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1300 fprintf (f, "\n");
1301 }
1302 }
1303 }
1304
1305 if (elf_dynverref (abfd) != 0)
1306 {
1307 Elf_Internal_Verneed *t;
1308
1309 fprintf (f, _("\nVersion References:\n"));
1310 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1311 {
1312 Elf_Internal_Vernaux *a;
1313
d0fb9a8d
JJ
1314 fprintf (f, _(" required from %s:\n"),
1315 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1316 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1317 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1318 a->vna_flags, a->vna_other,
1319 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1320 }
1321 }
1322
b34976b6 1323 return TRUE;
252b5132
RH
1324
1325 error_return:
1326 if (dynbuf != NULL)
1327 free (dynbuf);
b34976b6 1328 return FALSE;
252b5132
RH
1329}
1330
1331/* Display ELF-specific fields of a symbol. */
1332
1333void
217aa764
AM
1334bfd_elf_print_symbol (bfd *abfd,
1335 void *filep,
1336 asymbol *symbol,
1337 bfd_print_symbol_type how)
252b5132 1338{
a50b1753 1339 FILE *file = (FILE *) filep;
252b5132
RH
1340 switch (how)
1341 {
1342 case bfd_print_symbol_name:
1343 fprintf (file, "%s", symbol->name);
1344 break;
1345 case bfd_print_symbol_more:
1346 fprintf (file, "elf ");
60b89a18 1347 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1348 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1349 break;
1350 case bfd_print_symbol_all:
1351 {
4e8a9624
AM
1352 const char *section_name;
1353 const char *name = NULL;
9c5bfbb7 1354 const struct elf_backend_data *bed;
7a13edea 1355 unsigned char st_other;
dbb410c3 1356 bfd_vma val;
c044fabd 1357
252b5132 1358 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1359
1360 bed = get_elf_backend_data (abfd);
1361 if (bed->elf_backend_print_symbol_all)
c044fabd 1362 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1363
1364 if (name == NULL)
1365 {
7ee38065 1366 name = symbol->name;
217aa764 1367 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1368 }
1369
252b5132
RH
1370 fprintf (file, " %s\t", section_name);
1371 /* Print the "other" value for a symbol. For common symbols,
1372 we've already printed the size; now print the alignment.
1373 For other symbols, we have no specified alignment, and
1374 we've printed the address; now print the size. */
dcf6c779 1375 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1376 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1377 else
1378 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1379 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1380
1381 /* If we have version information, print it. */
1382 if (elf_tdata (abfd)->dynversym_section != 0
1383 && (elf_tdata (abfd)->dynverdef_section != 0
1384 || elf_tdata (abfd)->dynverref_section != 0))
1385 {
1386 unsigned int vernum;
1387 const char *version_string;
1388
1389 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1390
1391 if (vernum == 0)
1392 version_string = "";
1393 else if (vernum == 1)
1394 version_string = "Base";
1395 else if (vernum <= elf_tdata (abfd)->cverdefs)
1396 version_string =
1397 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1398 else
1399 {
1400 Elf_Internal_Verneed *t;
1401
1402 version_string = "";
1403 for (t = elf_tdata (abfd)->verref;
1404 t != NULL;
1405 t = t->vn_nextref)
1406 {
1407 Elf_Internal_Vernaux *a;
1408
1409 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1410 {
1411 if (a->vna_other == vernum)
1412 {
1413 version_string = a->vna_nodename;
1414 break;
1415 }
1416 }
1417 }
1418 }
1419
1420 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1421 fprintf (file, " %-11s", version_string);
1422 else
1423 {
1424 int i;
1425
1426 fprintf (file, " (%s)", version_string);
1427 for (i = 10 - strlen (version_string); i > 0; --i)
1428 putc (' ', file);
1429 }
1430 }
1431
1432 /* If the st_other field is not zero, print it. */
7a13edea 1433 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1434
7a13edea
NC
1435 switch (st_other)
1436 {
1437 case 0: break;
1438 case STV_INTERNAL: fprintf (file, " .internal"); break;
1439 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1440 case STV_PROTECTED: fprintf (file, " .protected"); break;
1441 default:
1442 /* Some other non-defined flags are also present, so print
1443 everything hex. */
1444 fprintf (file, " 0x%02x", (unsigned int) st_other);
1445 }
252b5132 1446
587ff49e 1447 fprintf (file, " %s", name);
252b5132
RH
1448 }
1449 break;
1450 }
1451}
252b5132 1452
252b5132
RH
1453/* Allocate an ELF string table--force the first byte to be zero. */
1454
1455struct bfd_strtab_hash *
217aa764 1456_bfd_elf_stringtab_init (void)
252b5132
RH
1457{
1458 struct bfd_strtab_hash *ret;
1459
1460 ret = _bfd_stringtab_init ();
1461 if (ret != NULL)
1462 {
1463 bfd_size_type loc;
1464
b34976b6 1465 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1466 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1467 if (loc == (bfd_size_type) -1)
1468 {
1469 _bfd_stringtab_free (ret);
1470 ret = NULL;
1471 }
1472 }
1473 return ret;
1474}
1475\f
1476/* ELF .o/exec file reading */
1477
c044fabd 1478/* Create a new bfd section from an ELF section header. */
252b5132 1479
b34976b6 1480bfd_boolean
217aa764 1481bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1482{
4fbb74a6
AM
1483 Elf_Internal_Shdr *hdr;
1484 Elf_Internal_Ehdr *ehdr;
1485 const struct elf_backend_data *bed;
90937f86 1486 const char *name;
252b5132 1487
4fbb74a6
AM
1488 if (shindex >= elf_numsections (abfd))
1489 return FALSE;
1490
1491 hdr = elf_elfsections (abfd)[shindex];
1492 ehdr = elf_elfheader (abfd);
1493 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1494 hdr->sh_name);
933d961a
JJ
1495 if (name == NULL)
1496 return FALSE;
252b5132 1497
4fbb74a6 1498 bed = get_elf_backend_data (abfd);
252b5132
RH
1499 switch (hdr->sh_type)
1500 {
1501 case SHT_NULL:
1502 /* Inactive section. Throw it away. */
b34976b6 1503 return TRUE;
252b5132
RH
1504
1505 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1506 case SHT_NOBITS: /* .bss section. */
1507 case SHT_HASH: /* .hash section. */
1508 case SHT_NOTE: /* .note section. */
25e27870
L
1509 case SHT_INIT_ARRAY: /* .init_array section. */
1510 case SHT_FINI_ARRAY: /* .fini_array section. */
1511 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1512 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1513 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1514 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1515
797fc050 1516 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1517 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1518 return FALSE;
cfcac11d
NC
1519 if (hdr->sh_link > elf_numsections (abfd))
1520 {
caa83f8b 1521 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1522 field set to SHN_BEFORE or SHN_AFTER. */
1523 switch (bfd_get_arch (abfd))
1524 {
caa83f8b 1525 case bfd_arch_i386:
cfcac11d
NC
1526 case bfd_arch_sparc:
1527 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1528 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1529 break;
1530 /* Otherwise fall through. */
1531 default:
1532 return FALSE;
1533 }
1534 }
1535 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
8e0ed13f 1536 return FALSE;
cfcac11d 1537 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1538 {
1539 Elf_Internal_Shdr *dynsymhdr;
1540
1541 /* The shared libraries distributed with hpux11 have a bogus
1542 sh_link field for the ".dynamic" section. Find the
1543 string table for the ".dynsym" section instead. */
1544 if (elf_dynsymtab (abfd) != 0)
1545 {
1546 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1547 hdr->sh_link = dynsymhdr->sh_link;
1548 }
1549 else
1550 {
1551 unsigned int i, num_sec;
1552
1553 num_sec = elf_numsections (abfd);
1554 for (i = 1; i < num_sec; i++)
1555 {
1556 dynsymhdr = elf_elfsections (abfd)[i];
1557 if (dynsymhdr->sh_type == SHT_DYNSYM)
1558 {
1559 hdr->sh_link = dynsymhdr->sh_link;
1560 break;
1561 }
1562 }
1563 }
1564 }
1565 break;
1566
252b5132
RH
1567 case SHT_SYMTAB: /* A symbol table */
1568 if (elf_onesymtab (abfd) == shindex)
b34976b6 1569 return TRUE;
252b5132 1570
a50b2160
JJ
1571 if (hdr->sh_entsize != bed->s->sizeof_sym)
1572 return FALSE;
3337c1e5
AM
1573 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1574 return FALSE;
252b5132
RH
1575 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1576 elf_onesymtab (abfd) = shindex;
1577 elf_tdata (abfd)->symtab_hdr = *hdr;
1578 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1579 abfd->flags |= HAS_SYMS;
1580
1581 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1582 SHF_ALLOC is set, and this is a shared object, then we also
1583 treat this section as a BFD section. We can not base the
1584 decision purely on SHF_ALLOC, because that flag is sometimes
1585 set in a relocatable object file, which would confuse the
1586 linker. */
252b5132
RH
1587 if ((hdr->sh_flags & SHF_ALLOC) != 0
1588 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1589 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1590 shindex))
b34976b6 1591 return FALSE;
252b5132 1592
1b3a8575
AM
1593 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1594 can't read symbols without that section loaded as well. It
1595 is most likely specified by the next section header. */
1596 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1597 {
1598 unsigned int i, num_sec;
1599
1600 num_sec = elf_numsections (abfd);
1601 for (i = shindex + 1; i < num_sec; i++)
1602 {
1603 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1604 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1605 && hdr2->sh_link == shindex)
1606 break;
1607 }
1608 if (i == num_sec)
1609 for (i = 1; i < shindex; i++)
1610 {
1611 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1612 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1613 && hdr2->sh_link == shindex)
1614 break;
1615 }
1616 if (i != shindex)
1617 return bfd_section_from_shdr (abfd, i);
1618 }
b34976b6 1619 return TRUE;
252b5132
RH
1620
1621 case SHT_DYNSYM: /* A dynamic symbol table */
1622 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1623 return TRUE;
252b5132 1624
a50b2160
JJ
1625 if (hdr->sh_entsize != bed->s->sizeof_sym)
1626 return FALSE;
252b5132
RH
1627 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1628 elf_dynsymtab (abfd) = shindex;
1629 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1630 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1631 abfd->flags |= HAS_SYMS;
1632
1633 /* Besides being a symbol table, we also treat this as a regular
1634 section, so that objcopy can handle it. */
6dc132d9 1635 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1636
9ad5cbcf
AM
1637 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1638 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1639 return TRUE;
9ad5cbcf 1640
1b3a8575 1641 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1642 elf_symtab_shndx (abfd) = shindex;
1643 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1644 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1645 return TRUE;
9ad5cbcf 1646
252b5132
RH
1647 case SHT_STRTAB: /* A string table */
1648 if (hdr->bfd_section != NULL)
b34976b6 1649 return TRUE;
252b5132
RH
1650 if (ehdr->e_shstrndx == shindex)
1651 {
1652 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1653 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1654 return TRUE;
252b5132 1655 }
1b3a8575
AM
1656 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1657 {
1658 symtab_strtab:
1659 elf_tdata (abfd)->strtab_hdr = *hdr;
1660 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1661 return TRUE;
1662 }
1663 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1664 {
1665 dynsymtab_strtab:
1666 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1667 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1668 elf_elfsections (abfd)[shindex] = hdr;
1669 /* We also treat this as a regular section, so that objcopy
1670 can handle it. */
6dc132d9
L
1671 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1672 shindex);
1b3a8575 1673 }
252b5132 1674
1b3a8575
AM
1675 /* If the string table isn't one of the above, then treat it as a
1676 regular section. We need to scan all the headers to be sure,
1677 just in case this strtab section appeared before the above. */
1678 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1679 {
1680 unsigned int i, num_sec;
252b5132 1681
1b3a8575
AM
1682 num_sec = elf_numsections (abfd);
1683 for (i = 1; i < num_sec; i++)
1684 {
1685 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1686 if (hdr2->sh_link == shindex)
1687 {
933d961a
JJ
1688 /* Prevent endless recursion on broken objects. */
1689 if (i == shindex)
1690 return FALSE;
1b3a8575
AM
1691 if (! bfd_section_from_shdr (abfd, i))
1692 return FALSE;
1693 if (elf_onesymtab (abfd) == i)
1694 goto symtab_strtab;
1695 if (elf_dynsymtab (abfd) == i)
1696 goto dynsymtab_strtab;
1697 }
1698 }
1699 }
6dc132d9 1700 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1701
1702 case SHT_REL:
1703 case SHT_RELA:
1704 /* *These* do a lot of work -- but build no sections! */
1705 {
1706 asection *target_sect;
1707 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1708 unsigned int num_sec = elf_numsections (abfd);
252b5132 1709
aa2ca951
JJ
1710 if (hdr->sh_entsize
1711 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1712 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1713 return FALSE;
1714
03ae5f59 1715 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1716 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1717 {
1718 ((*_bfd_error_handler)
d003868e
AM
1719 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1720 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1721 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1722 shindex);
03ae5f59
ILT
1723 }
1724
252b5132
RH
1725 /* For some incomprehensible reason Oracle distributes
1726 libraries for Solaris in which some of the objects have
1727 bogus sh_link fields. It would be nice if we could just
1728 reject them, but, unfortunately, some people need to use
1729 them. We scan through the section headers; if we find only
1730 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1731 to it. I hope this doesn't break anything.
1732
1733 Don't do it on executable nor shared library. */
1734 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1735 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1736 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1737 {
9ad5cbcf 1738 unsigned int scan;
252b5132
RH
1739 int found;
1740
1741 found = 0;
9ad5cbcf 1742 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1743 {
1744 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1745 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1746 {
1747 if (found != 0)
1748 {
1749 found = 0;
1750 break;
1751 }
1752 found = scan;
1753 }
1754 }
1755 if (found != 0)
1756 hdr->sh_link = found;
1757 }
1758
1759 /* Get the symbol table. */
1b3a8575
AM
1760 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1761 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1762 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1763 return FALSE;
252b5132
RH
1764
1765 /* If this reloc section does not use the main symbol table we
1766 don't treat it as a reloc section. BFD can't adequately
1767 represent such a section, so at least for now, we don't
c044fabd 1768 try. We just present it as a normal section. We also
60bcf0fa 1769 can't use it as a reloc section if it points to the null
83b89087
L
1770 section, an invalid section, another reloc section, or its
1771 sh_link points to the null section. */
185ef66d 1772 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1773 || hdr->sh_link == SHN_UNDEF
185ef66d 1774 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1775 || hdr->sh_info >= num_sec
1776 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1777 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1778 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1779 shindex);
252b5132
RH
1780
1781 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1782 return FALSE;
252b5132
RH
1783 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1784 if (target_sect == NULL)
b34976b6 1785 return FALSE;
252b5132
RH
1786
1787 if ((target_sect->flags & SEC_RELOC) == 0
1788 || target_sect->reloc_count == 0)
1789 hdr2 = &elf_section_data (target_sect)->rel_hdr;
1790 else
1791 {
dc810e39 1792 bfd_size_type amt;
252b5132 1793 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 1794 amt = sizeof (*hdr2);
a50b1753 1795 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
14b1c01e
AM
1796 if (hdr2 == NULL)
1797 return FALSE;
252b5132
RH
1798 elf_section_data (target_sect)->rel_hdr2 = hdr2;
1799 }
1800 *hdr2 = *hdr;
1801 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1802 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1803 target_sect->flags |= SEC_RELOC;
1804 target_sect->relocation = NULL;
1805 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1806 /* In the section to which the relocations apply, mark whether
1807 its relocations are of the REL or RELA variety. */
72730e0c 1808 if (hdr->sh_size != 0)
68bfbfcc 1809 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 1810 abfd->flags |= HAS_RELOC;
b34976b6 1811 return TRUE;
252b5132 1812 }
252b5132
RH
1813
1814 case SHT_GNU_verdef:
1815 elf_dynverdef (abfd) = shindex;
1816 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1817 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1818
1819 case SHT_GNU_versym:
a50b2160
JJ
1820 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1821 return FALSE;
252b5132
RH
1822 elf_dynversym (abfd) = shindex;
1823 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1824 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1825
1826 case SHT_GNU_verneed:
1827 elf_dynverref (abfd) = shindex;
1828 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1829 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1830
1831 case SHT_SHLIB:
b34976b6 1832 return TRUE;
252b5132 1833
dbb410c3 1834 case SHT_GROUP:
1783205a 1835 if (! IS_VALID_GROUP_SECTION_HEADER (hdr))
a50b2160 1836 return FALSE;
6dc132d9 1837 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1838 return FALSE;
dbb410c3
AM
1839 if (hdr->contents != NULL)
1840 {
1841 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1842 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1843 asection *s;
1844
b885599b
AM
1845 if (idx->flags & GRP_COMDAT)
1846 hdr->bfd_section->flags
1847 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1848
45c5e9ed
L
1849 /* We try to keep the same section order as it comes in. */
1850 idx += n_elt;
dbb410c3 1851 while (--n_elt != 0)
1783205a
NC
1852 {
1853 --idx;
1854
1855 if (idx->shdr != NULL
1856 && (s = idx->shdr->bfd_section) != NULL
1857 && elf_next_in_group (s) != NULL)
1858 {
1859 elf_next_in_group (hdr->bfd_section) = s;
1860 break;
1861 }
1862 }
dbb410c3
AM
1863 }
1864 break;
1865
252b5132 1866 default:
104d59d1
JM
1867 /* Possibly an attributes section. */
1868 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1869 || hdr->sh_type == bed->obj_attrs_section_type)
1870 {
1871 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1872 return FALSE;
1873 _bfd_elf_parse_attributes (abfd, hdr);
1874 return TRUE;
1875 }
1876
252b5132 1877 /* Check for any processor-specific section types. */
3eb70a79
L
1878 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1879 return TRUE;
1880
1881 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1882 {
1883 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1884 /* FIXME: How to properly handle allocated section reserved
1885 for applications? */
1886 (*_bfd_error_handler)
1887 (_("%B: don't know how to handle allocated, application "
1888 "specific section `%s' [0x%8x]"),
1889 abfd, name, hdr->sh_type);
1890 else
1891 /* Allow sections reserved for applications. */
1892 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1893 shindex);
1894 }
1895 else if (hdr->sh_type >= SHT_LOPROC
1896 && hdr->sh_type <= SHT_HIPROC)
1897 /* FIXME: We should handle this section. */
1898 (*_bfd_error_handler)
1899 (_("%B: don't know how to handle processor specific section "
1900 "`%s' [0x%8x]"),
1901 abfd, name, hdr->sh_type);
1902 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1903 {
1904 /* Unrecognised OS-specific sections. */
1905 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1906 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1907 required to correctly process the section and the file should
ff15b240
NC
1908 be rejected with an error message. */
1909 (*_bfd_error_handler)
1910 (_("%B: don't know how to handle OS specific section "
1911 "`%s' [0x%8x]"),
1912 abfd, name, hdr->sh_type);
1913 else
1914 /* Otherwise it should be processed. */
1915 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1916 }
3eb70a79
L
1917 else
1918 /* FIXME: We should handle this section. */
1919 (*_bfd_error_handler)
1920 (_("%B: don't know how to handle section `%s' [0x%8x]"),
1921 abfd, name, hdr->sh_type);
1922
1923 return FALSE;
252b5132
RH
1924 }
1925
b34976b6 1926 return TRUE;
252b5132
RH
1927}
1928
87d72d41 1929/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 1930
87d72d41
AM
1931Elf_Internal_Sym *
1932bfd_sym_from_r_symndx (struct sym_cache *cache,
1933 bfd *abfd,
1934 unsigned long r_symndx)
ec338859 1935{
ec338859
AM
1936 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
1937
a5d1b3b5
AM
1938 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
1939 {
1940 Elf_Internal_Shdr *symtab_hdr;
1941 unsigned char esym[sizeof (Elf64_External_Sym)];
1942 Elf_External_Sym_Shndx eshndx;
ec338859 1943
a5d1b3b5
AM
1944 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1945 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 1946 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 1947 return NULL;
9ad5cbcf 1948
a5d1b3b5
AM
1949 if (cache->abfd != abfd)
1950 {
1951 memset (cache->indx, -1, sizeof (cache->indx));
1952 cache->abfd = abfd;
1953 }
1954 cache->indx[ent] = r_symndx;
ec338859 1955 }
a5d1b3b5 1956
87d72d41 1957 return &cache->sym[ent];
ec338859
AM
1958}
1959
252b5132
RH
1960/* Given an ELF section number, retrieve the corresponding BFD
1961 section. */
1962
1963asection *
91d6fa6a 1964bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 1965{
91d6fa6a 1966 if (sec_index >= elf_numsections (abfd))
252b5132 1967 return NULL;
91d6fa6a 1968 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
1969}
1970
b35d266b 1971static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 1972{
0112cd26
NC
1973 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1974 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1975};
1976
b35d266b 1977static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 1978{
0112cd26
NC
1979 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1980 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1981};
1982
b35d266b 1983static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 1984{
0112cd26
NC
1985 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1986 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1987 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
1988 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
1989 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
1990 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
1991 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
1992 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
1993 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
1994 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
1995 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1996};
1997
b35d266b 1998static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 1999{
0112cd26
NC
2000 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2001 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2002 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2003};
2004
b35d266b 2005static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2006{
0112cd26
NC
2007 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2008 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2009 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2010 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2011 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2012 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2013 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2014 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2015 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2016};
2017
b35d266b 2018static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2019{
0112cd26
NC
2020 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2021 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2022};
2023
b35d266b 2024static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2025{
0112cd26
NC
2026 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2027 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2028 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2029 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2030};
2031
b35d266b 2032static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2033{
0112cd26
NC
2034 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2035 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2036};
2037
b35d266b 2038static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2039{
0112cd26
NC
2040 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2041 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2042 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2043};
2044
b35d266b 2045static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2046{
0112cd26
NC
2047 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2048 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2049 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2050};
2051
b35d266b 2052static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2053{
0112cd26
NC
2054 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2055 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2056 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2057 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2058 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2059};
2060
b35d266b 2061static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2062{
0112cd26
NC
2063 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2064 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2065 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2066 /* See struct bfd_elf_special_section declaration for the semantics of
2067 this special case where .prefix_length != strlen (.prefix). */
2068 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2069 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2070};
2071
b35d266b 2072static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2073{
0112cd26
NC
2074 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2075 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2076 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2077 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2078};
2079
1b315056
CS
2080static const struct bfd_elf_special_section special_sections_z[] =
2081{
2082 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2083 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2084 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2085 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2086 { NULL, 0, 0, 0, 0 }
2087};
2088
b35d266b 2089static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2090{
7f4d3958 2091 special_sections_b, /* 'b' */
98ece1b3 2092 special_sections_c, /* 'c' */
7f4d3958
L
2093 special_sections_d, /* 'd' */
2094 NULL, /* 'e' */
2095 special_sections_f, /* 'f' */
2096 special_sections_g, /* 'g' */
2097 special_sections_h, /* 'h' */
2098 special_sections_i, /* 'i' */
2099 NULL, /* 'j' */
2100 NULL, /* 'k' */
2101 special_sections_l, /* 'l' */
2102 NULL, /* 'm' */
2103 special_sections_n, /* 'n' */
2104 NULL, /* 'o' */
2105 special_sections_p, /* 'p' */
2106 NULL, /* 'q' */
2107 special_sections_r, /* 'r' */
2108 special_sections_s, /* 's' */
2109 special_sections_t, /* 't' */
1b315056
CS
2110 NULL, /* 'u' */
2111 NULL, /* 'v' */
2112 NULL, /* 'w' */
2113 NULL, /* 'x' */
2114 NULL, /* 'y' */
2115 special_sections_z /* 'z' */
7f4d3958
L
2116};
2117
551b43fd
AM
2118const struct bfd_elf_special_section *
2119_bfd_elf_get_special_section (const char *name,
2120 const struct bfd_elf_special_section *spec,
2121 unsigned int rela)
2f89ff8d
L
2122{
2123 int i;
7f4d3958 2124 int len;
7f4d3958 2125
551b43fd 2126 len = strlen (name);
7f4d3958 2127
551b43fd 2128 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2129 {
2130 int suffix_len;
551b43fd 2131 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2132
2133 if (len < prefix_len)
2134 continue;
551b43fd 2135 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2136 continue;
2137
551b43fd 2138 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2139 if (suffix_len <= 0)
2140 {
2141 if (name[prefix_len] != 0)
2142 {
2143 if (suffix_len == 0)
2144 continue;
2145 if (name[prefix_len] != '.'
2146 && (suffix_len == -2
551b43fd 2147 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2148 continue;
2149 }
2150 }
2151 else
2152 {
2153 if (len < prefix_len + suffix_len)
2154 continue;
2155 if (memcmp (name + len - suffix_len,
551b43fd 2156 spec[i].prefix + prefix_len,
7dcb9820
AM
2157 suffix_len) != 0)
2158 continue;
2159 }
551b43fd 2160 return &spec[i];
7dcb9820 2161 }
2f89ff8d
L
2162
2163 return NULL;
2164}
2165
7dcb9820 2166const struct bfd_elf_special_section *
29ef7005 2167_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2168{
551b43fd
AM
2169 int i;
2170 const struct bfd_elf_special_section *spec;
29ef7005 2171 const struct elf_backend_data *bed;
2f89ff8d
L
2172
2173 /* See if this is one of the special sections. */
551b43fd
AM
2174 if (sec->name == NULL)
2175 return NULL;
2f89ff8d 2176
29ef7005
L
2177 bed = get_elf_backend_data (abfd);
2178 spec = bed->special_sections;
2179 if (spec)
2180 {
2181 spec = _bfd_elf_get_special_section (sec->name,
2182 bed->special_sections,
2183 sec->use_rela_p);
2184 if (spec != NULL)
2185 return spec;
2186 }
2187
551b43fd
AM
2188 if (sec->name[0] != '.')
2189 return NULL;
2f89ff8d 2190
551b43fd 2191 i = sec->name[1] - 'b';
1b315056 2192 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2193 return NULL;
2194
2195 spec = special_sections[i];
2f89ff8d 2196
551b43fd
AM
2197 if (spec == NULL)
2198 return NULL;
2199
2200 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2201}
2202
b34976b6 2203bfd_boolean
217aa764 2204_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2205{
2206 struct bfd_elf_section_data *sdata;
551b43fd 2207 const struct elf_backend_data *bed;
7dcb9820 2208 const struct bfd_elf_special_section *ssect;
252b5132 2209
f0abc2a1
AM
2210 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2211 if (sdata == NULL)
2212 {
a50b1753
NC
2213 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2214 sizeof (*sdata));
f0abc2a1
AM
2215 if (sdata == NULL)
2216 return FALSE;
217aa764 2217 sec->used_by_bfd = sdata;
f0abc2a1 2218 }
bf572ba0 2219
551b43fd
AM
2220 /* Indicate whether or not this section should use RELA relocations. */
2221 bed = get_elf_backend_data (abfd);
2222 sec->use_rela_p = bed->default_use_rela_p;
2223
e843e0f8
L
2224 /* When we read a file, we don't need to set ELF section type and
2225 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2226 anyway. We will set ELF section type and flags for all linker
2227 created sections. If user specifies BFD section flags, we will
2228 set ELF section type and flags based on BFD section flags in
2229 elf_fake_sections. */
2230 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2231 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2232 {
551b43fd 2233 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2234 if (ssect != NULL)
2235 {
2236 elf_section_type (sec) = ssect->type;
2237 elf_section_flags (sec) = ssect->attr;
2238 }
2f89ff8d
L
2239 }
2240
f592407e 2241 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2242}
2243
2244/* Create a new bfd section from an ELF program header.
2245
2246 Since program segments have no names, we generate a synthetic name
2247 of the form segment<NUM>, where NUM is generally the index in the
2248 program header table. For segments that are split (see below) we
2249 generate the names segment<NUM>a and segment<NUM>b.
2250
2251 Note that some program segments may have a file size that is different than
2252 (less than) the memory size. All this means is that at execution the
2253 system must allocate the amount of memory specified by the memory size,
2254 but only initialize it with the first "file size" bytes read from the
2255 file. This would occur for example, with program segments consisting
2256 of combined data+bss.
2257
2258 To handle the above situation, this routine generates TWO bfd sections
2259 for the single program segment. The first has the length specified by
2260 the file size of the segment, and the second has the length specified
2261 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2262 into its initialized and uninitialized parts.
252b5132
RH
2263
2264 */
2265
b34976b6 2266bfd_boolean
217aa764
AM
2267_bfd_elf_make_section_from_phdr (bfd *abfd,
2268 Elf_Internal_Phdr *hdr,
91d6fa6a 2269 int hdr_index,
a50b1753 2270 const char *type_name)
252b5132
RH
2271{
2272 asection *newsect;
2273 char *name;
2274 char namebuf[64];
d4c88bbb 2275 size_t len;
252b5132
RH
2276 int split;
2277
2278 split = ((hdr->p_memsz > 0)
2279 && (hdr->p_filesz > 0)
2280 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2281
2282 if (hdr->p_filesz > 0)
252b5132 2283 {
91d6fa6a 2284 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2285 len = strlen (namebuf) + 1;
a50b1753 2286 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2287 if (!name)
2288 return FALSE;
2289 memcpy (name, namebuf, len);
2290 newsect = bfd_make_section (abfd, name);
2291 if (newsect == NULL)
2292 return FALSE;
2293 newsect->vma = hdr->p_vaddr;
2294 newsect->lma = hdr->p_paddr;
2295 newsect->size = hdr->p_filesz;
2296 newsect->filepos = hdr->p_offset;
2297 newsect->flags |= SEC_HAS_CONTENTS;
2298 newsect->alignment_power = bfd_log2 (hdr->p_align);
2299 if (hdr->p_type == PT_LOAD)
252b5132 2300 {
d5191d0c
AM
2301 newsect->flags |= SEC_ALLOC;
2302 newsect->flags |= SEC_LOAD;
2303 if (hdr->p_flags & PF_X)
2304 {
2305 /* FIXME: all we known is that it has execute PERMISSION,
2306 may be data. */
2307 newsect->flags |= SEC_CODE;
2308 }
2309 }
2310 if (!(hdr->p_flags & PF_W))
2311 {
2312 newsect->flags |= SEC_READONLY;
252b5132 2313 }
252b5132
RH
2314 }
2315
d5191d0c 2316 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2317 {
d5191d0c
AM
2318 bfd_vma align;
2319
91d6fa6a 2320 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2321 len = strlen (namebuf) + 1;
a50b1753 2322 name = (char *) bfd_alloc (abfd, len);
252b5132 2323 if (!name)
b34976b6 2324 return FALSE;
d4c88bbb 2325 memcpy (name, namebuf, len);
252b5132
RH
2326 newsect = bfd_make_section (abfd, name);
2327 if (newsect == NULL)
b34976b6 2328 return FALSE;
252b5132
RH
2329 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2330 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2331 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2332 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2333 align = newsect->vma & -newsect->vma;
2334 if (align == 0 || align > hdr->p_align)
2335 align = hdr->p_align;
2336 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2337 if (hdr->p_type == PT_LOAD)
2338 {
d5191d0c
AM
2339 /* Hack for gdb. Segments that have not been modified do
2340 not have their contents written to a core file, on the
2341 assumption that a debugger can find the contents in the
2342 executable. We flag this case by setting the fake
2343 section size to zero. Note that "real" bss sections will
2344 always have their contents dumped to the core file. */
2345 if (bfd_get_format (abfd) == bfd_core)
2346 newsect->size = 0;
252b5132
RH
2347 newsect->flags |= SEC_ALLOC;
2348 if (hdr->p_flags & PF_X)
2349 newsect->flags |= SEC_CODE;
2350 }
2351 if (!(hdr->p_flags & PF_W))
2352 newsect->flags |= SEC_READONLY;
2353 }
2354
b34976b6 2355 return TRUE;
252b5132
RH
2356}
2357
b34976b6 2358bfd_boolean
91d6fa6a 2359bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2360{
9c5bfbb7 2361 const struct elf_backend_data *bed;
20cfcaae
NC
2362
2363 switch (hdr->p_type)
2364 {
2365 case PT_NULL:
91d6fa6a 2366 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2367
2368 case PT_LOAD:
91d6fa6a 2369 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2370
2371 case PT_DYNAMIC:
91d6fa6a 2372 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2373
2374 case PT_INTERP:
91d6fa6a 2375 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2376
2377 case PT_NOTE:
91d6fa6a 2378 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2379 return FALSE;
718175fa 2380 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2381 return FALSE;
2382 return TRUE;
20cfcaae
NC
2383
2384 case PT_SHLIB:
91d6fa6a 2385 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2386
2387 case PT_PHDR:
91d6fa6a 2388 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2389
811072d8 2390 case PT_GNU_EH_FRAME:
91d6fa6a 2391 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2392 "eh_frame_hdr");
2393
2b05f1b7 2394 case PT_GNU_STACK:
91d6fa6a 2395 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2396
8c37241b 2397 case PT_GNU_RELRO:
91d6fa6a 2398 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2399
20cfcaae 2400 default:
8c1acd09 2401 /* Check for any processor-specific program segment types. */
20cfcaae 2402 bed = get_elf_backend_data (abfd);
91d6fa6a 2403 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2404 }
2405}
2406
23bc299b 2407/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2408 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2409 relocations; otherwise, we use REL relocations. */
2410
b34976b6 2411bfd_boolean
217aa764
AM
2412_bfd_elf_init_reloc_shdr (bfd *abfd,
2413 Elf_Internal_Shdr *rel_hdr,
2414 asection *asect,
2415 bfd_boolean use_rela_p)
23bc299b
MM
2416{
2417 char *name;
9c5bfbb7 2418 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2419 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2420
a50b1753 2421 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2422 if (name == NULL)
b34976b6 2423 return FALSE;
23bc299b
MM
2424 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2425 rel_hdr->sh_name =
2b0f7ef9 2426 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2427 FALSE);
23bc299b 2428 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2429 return FALSE;
23bc299b
MM
2430 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2431 rel_hdr->sh_entsize = (use_rela_p
2432 ? bed->s->sizeof_rela
2433 : bed->s->sizeof_rel);
72de5009 2434 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2435 rel_hdr->sh_flags = 0;
2436 rel_hdr->sh_addr = 0;
2437 rel_hdr->sh_size = 0;
2438 rel_hdr->sh_offset = 0;
2439
b34976b6 2440 return TRUE;
23bc299b
MM
2441}
2442
94be91de
JB
2443/* Return the default section type based on the passed in section flags. */
2444
2445int
2446bfd_elf_get_default_section_type (flagword flags)
2447{
2448 if ((flags & SEC_ALLOC) != 0
2449 && ((flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0
2450 || (flags & SEC_NEVER_LOAD) != 0))
2451 return SHT_NOBITS;
2452 return SHT_PROGBITS;
2453}
2454
252b5132
RH
2455/* Set up an ELF internal section header for a section. */
2456
252b5132 2457static void
217aa764 2458elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2459{
9c5bfbb7 2460 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
a50b1753 2461 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
252b5132 2462 Elf_Internal_Shdr *this_hdr;
0414f35b 2463 unsigned int sh_type;
252b5132
RH
2464
2465 if (*failedptr)
2466 {
2467 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2468 loop. */
252b5132
RH
2469 return;
2470 }
2471
2472 this_hdr = &elf_section_data (asect)->this_hdr;
2473
e57b5356
AM
2474 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2475 asect->name, FALSE);
2476 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2477 {
b34976b6 2478 *failedptr = TRUE;
252b5132
RH
2479 return;
2480 }
2481
a4d8e49b 2482 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2483
2484 if ((asect->flags & SEC_ALLOC) != 0
2485 || asect->user_set_vma)
2486 this_hdr->sh_addr = asect->vma;
2487 else
2488 this_hdr->sh_addr = 0;
2489
2490 this_hdr->sh_offset = 0;
eea6121a 2491 this_hdr->sh_size = asect->size;
252b5132 2492 this_hdr->sh_link = 0;
72de5009 2493 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2494 /* The sh_entsize and sh_info fields may have been set already by
2495 copy_private_section_data. */
2496
2497 this_hdr->bfd_section = asect;
2498 this_hdr->contents = NULL;
2499
3cddba1e
L
2500 /* If the section type is unspecified, we set it based on
2501 asect->flags. */
98ece1b3
AM
2502 if ((asect->flags & SEC_GROUP) != 0)
2503 sh_type = SHT_GROUP;
98ece1b3 2504 else
94be91de 2505 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2506
3cddba1e 2507 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2508 this_hdr->sh_type = sh_type;
2509 else if (this_hdr->sh_type == SHT_NOBITS
2510 && sh_type == SHT_PROGBITS
2511 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2512 {
98ece1b3
AM
2513 /* Warn if we are changing a NOBITS section to PROGBITS, but
2514 allow the link to proceed. This can happen when users link
2515 non-bss input sections to bss output sections, or emit data
2516 to a bss output section via a linker script. */
2517 (*_bfd_error_handler)
58f0869b 2518 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2519 this_hdr->sh_type = sh_type;
3cddba1e
L
2520 }
2521
2f89ff8d 2522 switch (this_hdr->sh_type)
252b5132 2523 {
2f89ff8d 2524 default:
2f89ff8d
L
2525 break;
2526
2527 case SHT_STRTAB:
2528 case SHT_INIT_ARRAY:
2529 case SHT_FINI_ARRAY:
2530 case SHT_PREINIT_ARRAY:
2531 case SHT_NOTE:
2532 case SHT_NOBITS:
2533 case SHT_PROGBITS:
2534 break;
2535
2536 case SHT_HASH:
c7ac6ff8 2537 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2538 break;
5de3bf90 2539
2f89ff8d 2540 case SHT_DYNSYM:
252b5132 2541 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2542 break;
2543
2544 case SHT_DYNAMIC:
252b5132 2545 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2546 break;
2547
2548 case SHT_RELA:
2549 if (get_elf_backend_data (abfd)->may_use_rela_p)
2550 this_hdr->sh_entsize = bed->s->sizeof_rela;
2551 break;
2552
2553 case SHT_REL:
2554 if (get_elf_backend_data (abfd)->may_use_rel_p)
2555 this_hdr->sh_entsize = bed->s->sizeof_rel;
2556 break;
2557
2558 case SHT_GNU_versym:
252b5132 2559 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2560 break;
2561
2562 case SHT_GNU_verdef:
252b5132
RH
2563 this_hdr->sh_entsize = 0;
2564 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2565 cverdefs. The linker will set cverdefs, but sh_info will be
2566 zero. */
252b5132
RH
2567 if (this_hdr->sh_info == 0)
2568 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2569 else
2570 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2571 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2572 break;
2573
2574 case SHT_GNU_verneed:
252b5132
RH
2575 this_hdr->sh_entsize = 0;
2576 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2577 cverrefs. The linker will set cverrefs, but sh_info will be
2578 zero. */
252b5132
RH
2579 if (this_hdr->sh_info == 0)
2580 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2581 else
2582 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2583 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2584 break;
2585
2586 case SHT_GROUP:
1783205a 2587 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2588 break;
fdc90cb4
JJ
2589
2590 case SHT_GNU_HASH:
2591 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2592 break;
dbb410c3 2593 }
252b5132
RH
2594
2595 if ((asect->flags & SEC_ALLOC) != 0)
2596 this_hdr->sh_flags |= SHF_ALLOC;
2597 if ((asect->flags & SEC_READONLY) == 0)
2598 this_hdr->sh_flags |= SHF_WRITE;
2599 if ((asect->flags & SEC_CODE) != 0)
2600 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2601 if ((asect->flags & SEC_MERGE) != 0)
2602 {
2603 this_hdr->sh_flags |= SHF_MERGE;
2604 this_hdr->sh_entsize = asect->entsize;
2605 if ((asect->flags & SEC_STRINGS) != 0)
2606 this_hdr->sh_flags |= SHF_STRINGS;
2607 }
1126897b 2608 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2609 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2610 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2611 {
2612 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2613 if (asect->size == 0
2614 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2615 {
3a800eb9 2616 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2617
704afa60 2618 this_hdr->sh_size = 0;
3a800eb9
AM
2619 if (o != NULL)
2620 {
704afa60 2621 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2622 if (this_hdr->sh_size != 0)
2623 this_hdr->sh_type = SHT_NOBITS;
2624 }
704afa60
JJ
2625 }
2626 }
252b5132
RH
2627
2628 /* Check for processor-specific section types. */
0414f35b 2629 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2630 if (bed->elf_backend_fake_sections
2631 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2632 *failedptr = TRUE;
252b5132 2633
42bb2e33 2634 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2635 {
2636 /* Don't change the header type from NOBITS if we are being
42bb2e33 2637 called for objcopy --only-keep-debug. */
0414f35b
AM
2638 this_hdr->sh_type = sh_type;
2639 }
2640
252b5132 2641 /* If the section has relocs, set up a section header for the
23bc299b
MM
2642 SHT_REL[A] section. If two relocation sections are required for
2643 this section, it is up to the processor-specific back-end to
c044fabd 2644 create the other. */
23bc299b 2645 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2646 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2647 &elf_section_data (asect)->rel_hdr,
c044fabd 2648 asect,
68bfbfcc 2649 asect->use_rela_p))
b34976b6 2650 *failedptr = TRUE;
252b5132
RH
2651}
2652
bcacc0f5
AM
2653/* Fill in the contents of a SHT_GROUP section. Called from
2654 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2655 when ELF targets use the generic linker, ld. Called for ld -r
2656 from bfd_elf_final_link. */
dbb410c3 2657
1126897b 2658void
217aa764 2659bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2660{
a50b1753 2661 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2662 asection *elt, *first;
dbb410c3 2663 unsigned char *loc;
b34976b6 2664 bfd_boolean gas;
dbb410c3 2665
7e4111ad
L
2666 /* Ignore linker created group section. See elfNN_ia64_object_p in
2667 elfxx-ia64.c. */
2668 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2669 || *failedptr)
2670 return;
2671
bcacc0f5
AM
2672 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2673 {
2674 unsigned long symindx = 0;
2675
2676 /* elf_group_id will have been set up by objcopy and the
2677 generic linker. */
2678 if (elf_group_id (sec) != NULL)
2679 symindx = elf_group_id (sec)->udata.i;
1126897b 2680
bcacc0f5
AM
2681 if (symindx == 0)
2682 {
2683 /* If called from the assembler, swap_out_syms will have set up
2684 elf_section_syms. */
2685 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2686 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2687 }
2688 elf_section_data (sec)->this_hdr.sh_info = symindx;
2689 }
2690 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2691 {
bcacc0f5
AM
2692 /* The ELF backend linker sets sh_info to -2 when the group
2693 signature symbol is global, and thus the index can't be
2694 set until all local symbols are output. */
2695 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2696 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2697 unsigned long symndx = sec_data->this_hdr.sh_info;
2698 unsigned long extsymoff = 0;
2699 struct elf_link_hash_entry *h;
2700
2701 if (!elf_bad_symtab (igroup->owner))
2702 {
2703 Elf_Internal_Shdr *symtab_hdr;
2704
2705 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2706 extsymoff = symtab_hdr->sh_info;
2707 }
2708 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2709 while (h->root.type == bfd_link_hash_indirect
2710 || h->root.type == bfd_link_hash_warning)
2711 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2712
2713 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2714 }
dbb410c3 2715
1126897b 2716 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2717 gas = TRUE;
dbb410c3
AM
2718 if (sec->contents == NULL)
2719 {
b34976b6 2720 gas = FALSE;
a50b1753 2721 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
2722
2723 /* Arrange for the section to be written out. */
2724 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2725 if (sec->contents == NULL)
2726 {
b34976b6 2727 *failedptr = TRUE;
dbb410c3
AM
2728 return;
2729 }
2730 }
2731
eea6121a 2732 loc = sec->contents + sec->size;
dbb410c3 2733
9dce4196
AM
2734 /* Get the pointer to the first section in the group that gas
2735 squirreled away here. objcopy arranges for this to be set to the
2736 start of the input section group. */
2737 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2738
2739 /* First element is a flag word. Rest of section is elf section
2740 indices for all the sections of the group. Write them backwards
2741 just to keep the group in the same order as given in .section
2742 directives, not that it matters. */
2743 while (elt != NULL)
2744 {
9dce4196
AM
2745 asection *s;
2746 unsigned int idx;
2747
9dce4196 2748 s = elt;
01e1a5bc
NC
2749 if (! elf_discarded_section (s))
2750 {
2751 loc -= 4;
2752 if (!gas)
2753 s = s->output_section;
2754 idx = 0;
2755 if (s != NULL)
2756 idx = elf_section_data (s)->this_idx;
2757 H_PUT_32 (abfd, idx, loc);
2758 }
945906ff 2759 elt = elf_next_in_group (elt);
9dce4196
AM
2760 if (elt == first)
2761 break;
dbb410c3
AM
2762 }
2763
3d7f7666 2764 if ((loc -= 4) != sec->contents)
9dce4196 2765 abort ();
dbb410c3 2766
9dce4196 2767 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2768}
2769
252b5132
RH
2770/* Assign all ELF section numbers. The dummy first section is handled here
2771 too. The link/info pointers for the standard section types are filled
2772 in here too, while we're at it. */
2773
b34976b6 2774static bfd_boolean
da9f89d4 2775assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2776{
2777 struct elf_obj_tdata *t = elf_tdata (abfd);
2778 asection *sec;
2b0f7ef9 2779 unsigned int section_number, secn;
252b5132 2780 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2781 struct bfd_elf_section_data *d;
3516e984 2782 bfd_boolean need_symtab;
252b5132
RH
2783
2784 section_number = 1;
2785
2b0f7ef9
JJ
2786 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2787
da9f89d4
L
2788 /* SHT_GROUP sections are in relocatable files only. */
2789 if (link_info == NULL || link_info->relocatable)
252b5132 2790 {
da9f89d4 2791 /* Put SHT_GROUP sections first. */
04dd1667 2792 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2793 {
5daa8fe7 2794 d = elf_section_data (sec);
da9f89d4
L
2795
2796 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2797 {
5daa8fe7 2798 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2799 {
2800 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2801 bfd_section_list_remove (abfd, sec);
da9f89d4 2802 abfd->section_count--;
da9f89d4 2803 }
08a40648 2804 else
4fbb74a6 2805 d->this_idx = section_number++;
da9f89d4 2806 }
47cc2cf5
PB
2807 }
2808 }
2809
2810 for (sec = abfd->sections; sec; sec = sec->next)
2811 {
2812 d = elf_section_data (sec);
2813
2814 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2815 d->this_idx = section_number++;
2b0f7ef9 2816 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2817 if ((sec->flags & SEC_RELOC) == 0)
2818 d->rel_idx = 0;
2819 else
2b0f7ef9
JJ
2820 {
2821 d->rel_idx = section_number++;
2822 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2823 }
23bc299b
MM
2824
2825 if (d->rel_hdr2)
2b0f7ef9
JJ
2826 {
2827 d->rel_idx2 = section_number++;
2828 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2829 }
23bc299b
MM
2830 else
2831 d->rel_idx2 = 0;
252b5132
RH
2832 }
2833
2834 t->shstrtab_section = section_number++;
2b0f7ef9 2835 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2836 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132 2837
3516e984
L
2838 need_symtab = (bfd_get_symcount (abfd) > 0
2839 || (link_info == NULL
2840 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2841 == HAS_RELOC)));
2842 if (need_symtab)
252b5132
RH
2843 {
2844 t->symtab_section = section_number++;
2b0f7ef9 2845 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 2846 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 2847 {
9ad5cbcf
AM
2848 t->symtab_shndx_section = section_number++;
2849 t->symtab_shndx_hdr.sh_name
2850 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2851 ".symtab_shndx", FALSE);
9ad5cbcf 2852 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2853 return FALSE;
9ad5cbcf 2854 }
252b5132 2855 t->strtab_section = section_number++;
2b0f7ef9 2856 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2857 }
2858
2b0f7ef9
JJ
2859 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2860 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2861
2862 elf_numsections (abfd) = section_number;
252b5132
RH
2863 elf_elfheader (abfd)->e_shnum = section_number;
2864
2865 /* Set up the list of section header pointers, in agreement with the
2866 indices. */
a50b1753
NC
2867 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
2868 sizeof (Elf_Internal_Shdr *));
252b5132 2869 if (i_shdrp == NULL)
b34976b6 2870 return FALSE;
252b5132 2871
a50b1753
NC
2872 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
2873 sizeof (Elf_Internal_Shdr));
252b5132
RH
2874 if (i_shdrp[0] == NULL)
2875 {
2876 bfd_release (abfd, i_shdrp);
b34976b6 2877 return FALSE;
252b5132 2878 }
252b5132
RH
2879
2880 elf_elfsections (abfd) = i_shdrp;
2881
2882 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3516e984 2883 if (need_symtab)
252b5132
RH
2884 {
2885 i_shdrp[t->symtab_section] = &t->symtab_hdr;
4fbb74a6 2886 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf
AM
2887 {
2888 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2889 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2890 }
252b5132
RH
2891 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2892 t->symtab_hdr.sh_link = t->strtab_section;
2893 }
38ce5b11 2894
252b5132
RH
2895 for (sec = abfd->sections; sec; sec = sec->next)
2896 {
252b5132
RH
2897 asection *s;
2898 const char *name;
2899
91d6fa6a
NC
2900 d = elf_section_data (sec);
2901
252b5132
RH
2902 i_shdrp[d->this_idx] = &d->this_hdr;
2903 if (d->rel_idx != 0)
2904 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
2905 if (d->rel_idx2 != 0)
2906 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
2907
2908 /* Fill in the sh_link and sh_info fields while we're at it. */
2909
2910 /* sh_link of a reloc section is the section index of the symbol
2911 table. sh_info is the section index of the section to which
2912 the relocation entries apply. */
2913 if (d->rel_idx != 0)
2914 {
2915 d->rel_hdr.sh_link = t->symtab_section;
2916 d->rel_hdr.sh_info = d->this_idx;
2917 }
23bc299b
MM
2918 if (d->rel_idx2 != 0)
2919 {
2920 d->rel_hdr2->sh_link = t->symtab_section;
2921 d->rel_hdr2->sh_info = d->this_idx;
2922 }
252b5132 2923
38ce5b11
L
2924 /* We need to set up sh_link for SHF_LINK_ORDER. */
2925 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
2926 {
2927 s = elf_linked_to_section (sec);
2928 if (s)
38ce5b11 2929 {
f2876037 2930 /* elf_linked_to_section points to the input section. */
ccd2ec6a 2931 if (link_info != NULL)
38ce5b11 2932 {
f2876037 2933 /* Check discarded linkonce section. */
ccd2ec6a 2934 if (elf_discarded_section (s))
38ce5b11 2935 {
ccd2ec6a
L
2936 asection *kept;
2937 (*_bfd_error_handler)
2938 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
2939 abfd, d->this_hdr.bfd_section,
2940 s, s->owner);
2941 /* Point to the kept section if it has the same
2942 size as the discarded one. */
c0f00686 2943 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 2944 if (kept == NULL)
185d09ad 2945 {
ccd2ec6a
L
2946 bfd_set_error (bfd_error_bad_value);
2947 return FALSE;
185d09ad 2948 }
ccd2ec6a 2949 s = kept;
38ce5b11 2950 }
e424ecc8 2951
ccd2ec6a
L
2952 s = s->output_section;
2953 BFD_ASSERT (s != NULL);
38ce5b11 2954 }
f2876037
L
2955 else
2956 {
2957 /* Handle objcopy. */
2958 if (s->output_section == NULL)
2959 {
2960 (*_bfd_error_handler)
2961 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
2962 abfd, d->this_hdr.bfd_section, s, s->owner);
2963 bfd_set_error (bfd_error_bad_value);
2964 return FALSE;
2965 }
2966 s = s->output_section;
2967 }
ccd2ec6a
L
2968 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2969 }
2970 else
2971 {
2972 /* PR 290:
2973 The Intel C compiler generates SHT_IA_64_UNWIND with
2974 SHF_LINK_ORDER. But it doesn't set the sh_link or
2975 sh_info fields. Hence we could get the situation
08a40648 2976 where s is NULL. */
ccd2ec6a
L
2977 const struct elf_backend_data *bed
2978 = get_elf_backend_data (abfd);
2979 if (bed->link_order_error_handler)
2980 bed->link_order_error_handler
2981 (_("%B: warning: sh_link not set for section `%A'"),
2982 abfd, sec);
38ce5b11
L
2983 }
2984 }
2985
252b5132
RH
2986 switch (d->this_hdr.sh_type)
2987 {
2988 case SHT_REL:
2989 case SHT_RELA:
2990 /* A reloc section which we are treating as a normal BFD
2991 section. sh_link is the section index of the symbol
2992 table. sh_info is the section index of the section to
2993 which the relocation entries apply. We assume that an
2994 allocated reloc section uses the dynamic symbol table.
2995 FIXME: How can we be sure? */
2996 s = bfd_get_section_by_name (abfd, ".dynsym");
2997 if (s != NULL)
2998 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2999
3000 /* We look up the section the relocs apply to by name. */
3001 name = sec->name;
3002 if (d->this_hdr.sh_type == SHT_REL)
3003 name += 4;
3004 else
3005 name += 5;
3006 s = bfd_get_section_by_name (abfd, name);
3007 if (s != NULL)
3008 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3009 break;
3010
3011 case SHT_STRTAB:
3012 /* We assume that a section named .stab*str is a stabs
3013 string section. We look for a section with the same name
3014 but without the trailing ``str'', and set its sh_link
3015 field to point to this section. */
0112cd26 3016 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3017 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3018 {
3019 size_t len;
3020 char *alc;
3021
3022 len = strlen (sec->name);
a50b1753 3023 alc = (char *) bfd_malloc (len - 2);
252b5132 3024 if (alc == NULL)
b34976b6 3025 return FALSE;
d4c88bbb 3026 memcpy (alc, sec->name, len - 3);
252b5132
RH
3027 alc[len - 3] = '\0';
3028 s = bfd_get_section_by_name (abfd, alc);
3029 free (alc);
3030 if (s != NULL)
3031 {
3032 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3033
3034 /* This is a .stab section. */
0594c12d
AM
3035 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3036 elf_section_data (s)->this_hdr.sh_entsize
3037 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3038 }
3039 }
3040 break;
3041
3042 case SHT_DYNAMIC:
3043 case SHT_DYNSYM:
3044 case SHT_GNU_verneed:
3045 case SHT_GNU_verdef:
3046 /* sh_link is the section header index of the string table
3047 used for the dynamic entries, or the symbol table, or the
3048 version strings. */
3049 s = bfd_get_section_by_name (abfd, ".dynstr");
3050 if (s != NULL)
3051 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3052 break;
3053
7f1204bb
JJ
3054 case SHT_GNU_LIBLIST:
3055 /* sh_link is the section header index of the prelink library
08a40648
AM
3056 list used for the dynamic entries, or the symbol table, or
3057 the version strings. */
7f1204bb
JJ
3058 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3059 ? ".dynstr" : ".gnu.libstr");
3060 if (s != NULL)
3061 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3062 break;
3063
252b5132 3064 case SHT_HASH:
fdc90cb4 3065 case SHT_GNU_HASH:
252b5132
RH
3066 case SHT_GNU_versym:
3067 /* sh_link is the section header index of the symbol table
3068 this hash table or version table is for. */
3069 s = bfd_get_section_by_name (abfd, ".dynsym");
3070 if (s != NULL)
3071 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3072 break;
dbb410c3
AM
3073
3074 case SHT_GROUP:
3075 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3076 }
3077 }
3078
2b0f7ef9 3079 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3080 if (i_shdrp[secn] == NULL)
3081 i_shdrp[secn] = i_shdrp[0];
3082 else
3083 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3084 i_shdrp[secn]->sh_name);
b34976b6 3085 return TRUE;
252b5132
RH
3086}
3087
3088/* Map symbol from it's internal number to the external number, moving
3089 all local symbols to be at the head of the list. */
3090
5372391b 3091static bfd_boolean
217aa764 3092sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3093{
3094 /* If the backend has a special mapping, use it. */
9c5bfbb7 3095 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3096 if (bed->elf_backend_sym_is_global)
3097 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3098
e47bf690 3099 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3100 || bfd_is_und_section (bfd_get_section (sym))
3101 || bfd_is_com_section (bfd_get_section (sym)));
3102}
3103
5372391b 3104/* Don't output section symbols for sections that are not going to be
0f0a5e58 3105 output. */
5372391b
AM
3106
3107static bfd_boolean
3108ignore_section_sym (bfd *abfd, asymbol *sym)
3109{
3110 return ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58
AM
3111 && !(sym->section->owner == abfd
3112 || (sym->section->output_section->owner == abfd
3113 && sym->section->output_offset == 0)));
5372391b
AM
3114}
3115
b34976b6 3116static bfd_boolean
217aa764 3117elf_map_symbols (bfd *abfd)
252b5132 3118{
dc810e39 3119 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3120 asymbol **syms = bfd_get_outsymbols (abfd);
3121 asymbol **sect_syms;
dc810e39
AM
3122 unsigned int num_locals = 0;
3123 unsigned int num_globals = 0;
3124 unsigned int num_locals2 = 0;
3125 unsigned int num_globals2 = 0;
252b5132 3126 int max_index = 0;
dc810e39 3127 unsigned int idx;
252b5132
RH
3128 asection *asect;
3129 asymbol **new_syms;
252b5132
RH
3130
3131#ifdef DEBUG
3132 fprintf (stderr, "elf_map_symbols\n");
3133 fflush (stderr);
3134#endif
3135
252b5132
RH
3136 for (asect = abfd->sections; asect; asect = asect->next)
3137 {
3138 if (max_index < asect->index)
3139 max_index = asect->index;
3140 }
3141
3142 max_index++;
a50b1753 3143 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3144 if (sect_syms == NULL)
b34976b6 3145 return FALSE;
252b5132 3146 elf_section_syms (abfd) = sect_syms;
4e89ac30 3147 elf_num_section_syms (abfd) = max_index;
252b5132 3148
079e9a2f
AM
3149 /* Init sect_syms entries for any section symbols we have already
3150 decided to output. */
252b5132
RH
3151 for (idx = 0; idx < symcount; idx++)
3152 {
dc810e39 3153 asymbol *sym = syms[idx];
c044fabd 3154
252b5132 3155 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3156 && sym->value == 0
5372391b 3157 && !ignore_section_sym (abfd, sym))
252b5132 3158 {
5372391b 3159 asection *sec = sym->section;
252b5132 3160
5372391b
AM
3161 if (sec->owner != abfd)
3162 sec = sec->output_section;
252b5132 3163
5372391b 3164 sect_syms[sec->index] = syms[idx];
252b5132
RH
3165 }
3166 }
3167
252b5132
RH
3168 /* Classify all of the symbols. */
3169 for (idx = 0; idx < symcount; idx++)
3170 {
5372391b
AM
3171 if (ignore_section_sym (abfd, syms[idx]))
3172 continue;
252b5132
RH
3173 if (!sym_is_global (abfd, syms[idx]))
3174 num_locals++;
3175 else
3176 num_globals++;
3177 }
079e9a2f 3178
5372391b 3179 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3180 sections will already have a section symbol in outsymbols, but
3181 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3182 at least in that case. */
252b5132
RH
3183 for (asect = abfd->sections; asect; asect = asect->next)
3184 {
079e9a2f 3185 if (sect_syms[asect->index] == NULL)
252b5132 3186 {
079e9a2f 3187 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3188 num_locals++;
3189 else
3190 num_globals++;
252b5132
RH
3191 }
3192 }
3193
3194 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3195 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3196 sizeof (asymbol *));
dc810e39 3197
252b5132 3198 if (new_syms == NULL)
b34976b6 3199 return FALSE;
252b5132
RH
3200
3201 for (idx = 0; idx < symcount; idx++)
3202 {
3203 asymbol *sym = syms[idx];
dc810e39 3204 unsigned int i;
252b5132 3205
5372391b
AM
3206 if (ignore_section_sym (abfd, sym))
3207 continue;
252b5132
RH
3208 if (!sym_is_global (abfd, sym))
3209 i = num_locals2++;
3210 else
3211 i = num_locals + num_globals2++;
3212 new_syms[i] = sym;
3213 sym->udata.i = i + 1;
3214 }
3215 for (asect = abfd->sections; asect; asect = asect->next)
3216 {
079e9a2f 3217 if (sect_syms[asect->index] == NULL)
252b5132 3218 {
079e9a2f 3219 asymbol *sym = asect->symbol;
dc810e39 3220 unsigned int i;
252b5132 3221
079e9a2f 3222 sect_syms[asect->index] = sym;
252b5132
RH
3223 if (!sym_is_global (abfd, sym))
3224 i = num_locals2++;
3225 else
3226 i = num_locals + num_globals2++;
3227 new_syms[i] = sym;
3228 sym->udata.i = i + 1;
3229 }
3230 }
3231
3232 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3233
3234 elf_num_locals (abfd) = num_locals;
3235 elf_num_globals (abfd) = num_globals;
b34976b6 3236 return TRUE;
252b5132
RH
3237}
3238
3239/* Align to the maximum file alignment that could be required for any
3240 ELF data structure. */
3241
268b6b39 3242static inline file_ptr
217aa764 3243align_file_position (file_ptr off, int align)
252b5132
RH
3244{
3245 return (off + align - 1) & ~(align - 1);
3246}
3247
3248/* Assign a file position to a section, optionally aligning to the
3249 required section alignment. */
3250
217aa764
AM
3251file_ptr
3252_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3253 file_ptr offset,
3254 bfd_boolean align)
252b5132 3255{
72de5009
AM
3256 if (align && i_shdrp->sh_addralign > 1)
3257 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3258 i_shdrp->sh_offset = offset;
3259 if (i_shdrp->bfd_section != NULL)
3260 i_shdrp->bfd_section->filepos = offset;
3261 if (i_shdrp->sh_type != SHT_NOBITS)
3262 offset += i_shdrp->sh_size;
3263 return offset;
3264}
3265
3266/* Compute the file positions we are going to put the sections at, and
3267 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3268 is not NULL, this is being called by the ELF backend linker. */
3269
b34976b6 3270bfd_boolean
217aa764
AM
3271_bfd_elf_compute_section_file_positions (bfd *abfd,
3272 struct bfd_link_info *link_info)
252b5132 3273{
9c5bfbb7 3274 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3275 bfd_boolean failed;
4b6c0f2f 3276 struct bfd_strtab_hash *strtab = NULL;
252b5132 3277 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3278 bfd_boolean need_symtab;
252b5132
RH
3279
3280 if (abfd->output_has_begun)
b34976b6 3281 return TRUE;
252b5132
RH
3282
3283 /* Do any elf backend specific processing first. */
3284 if (bed->elf_backend_begin_write_processing)
3285 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3286
3287 if (! prep_headers (abfd))
b34976b6 3288 return FALSE;
252b5132 3289
e6c51ed4
NC
3290 /* Post process the headers if necessary. */
3291 if (bed->elf_backend_post_process_headers)
3292 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3293
b34976b6 3294 failed = FALSE;
252b5132
RH
3295 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3296 if (failed)
b34976b6 3297 return FALSE;
252b5132 3298
da9f89d4 3299 if (!assign_section_numbers (abfd, link_info))
b34976b6 3300 return FALSE;
252b5132
RH
3301
3302 /* The backend linker builds symbol table information itself. */
3516e984
L
3303 need_symtab = (link_info == NULL
3304 && (bfd_get_symcount (abfd) > 0
3305 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3306 == HAS_RELOC)));
3307 if (need_symtab)
252b5132
RH
3308 {
3309 /* Non-zero if doing a relocatable link. */
3310 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3311
3312 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3313 return FALSE;
252b5132
RH
3314 }
3315
1126897b 3316 if (link_info == NULL)
dbb410c3 3317 {
1126897b 3318 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3319 if (failed)
b34976b6 3320 return FALSE;
dbb410c3
AM
3321 }
3322
252b5132
RH
3323 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3324 /* sh_name was set in prep_headers. */
3325 shstrtab_hdr->sh_type = SHT_STRTAB;
3326 shstrtab_hdr->sh_flags = 0;
3327 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3328 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3329 shstrtab_hdr->sh_entsize = 0;
3330 shstrtab_hdr->sh_link = 0;
3331 shstrtab_hdr->sh_info = 0;
3332 /* sh_offset is set in assign_file_positions_except_relocs. */
3333 shstrtab_hdr->sh_addralign = 1;
3334
c84fca4d 3335 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3336 return FALSE;
252b5132 3337
3516e984 3338 if (need_symtab)
252b5132
RH
3339 {
3340 file_ptr off;
3341 Elf_Internal_Shdr *hdr;
3342
3343 off = elf_tdata (abfd)->next_file_pos;
3344
3345 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3346 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3347
9ad5cbcf
AM
3348 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3349 if (hdr->sh_size != 0)
b34976b6 3350 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3351
252b5132 3352 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3353 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3354
3355 elf_tdata (abfd)->next_file_pos = off;
3356
3357 /* Now that we know where the .strtab section goes, write it
08a40648 3358 out. */
252b5132
RH
3359 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3360 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3361 return FALSE;
252b5132
RH
3362 _bfd_stringtab_free (strtab);
3363 }
3364
b34976b6 3365 abfd->output_has_begun = TRUE;
252b5132 3366
b34976b6 3367 return TRUE;
252b5132
RH
3368}
3369
8ded5a0f
AM
3370/* Make an initial estimate of the size of the program header. If we
3371 get the number wrong here, we'll redo section placement. */
3372
3373static bfd_size_type
3374get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3375{
3376 size_t segs;
3377 asection *s;
2b05f1b7 3378 const struct elf_backend_data *bed;
8ded5a0f
AM
3379
3380 /* Assume we will need exactly two PT_LOAD segments: one for text
3381 and one for data. */
3382 segs = 2;
3383
3384 s = bfd_get_section_by_name (abfd, ".interp");
3385 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3386 {
3387 /* If we have a loadable interpreter section, we need a
3388 PT_INTERP segment. In this case, assume we also need a
3389 PT_PHDR segment, although that may not be true for all
3390 targets. */
3391 segs += 2;
3392 }
3393
3394 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3395 {
3396 /* We need a PT_DYNAMIC segment. */
3397 ++segs;
f210dcff 3398 }
08a40648 3399
ceae84aa 3400 if (info != NULL && info->relro)
f210dcff
L
3401 {
3402 /* We need a PT_GNU_RELRO segment. */
3403 ++segs;
8ded5a0f
AM
3404 }
3405
3406 if (elf_tdata (abfd)->eh_frame_hdr)
3407 {
3408 /* We need a PT_GNU_EH_FRAME segment. */
3409 ++segs;
3410 }
3411
2b05f1b7 3412 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3413 {
2b05f1b7
L
3414 /* We need a PT_GNU_STACK segment. */
3415 ++segs;
3416 }
94b11780 3417
2b05f1b7
L
3418 for (s = abfd->sections; s != NULL; s = s->next)
3419 {
8ded5a0f 3420 if ((s->flags & SEC_LOAD) != 0
0112cd26 3421 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3422 {
3423 /* We need a PT_NOTE segment. */
3424 ++segs;
1c5265b5
JJ
3425 /* Try to create just one PT_NOTE segment
3426 for all adjacent loadable .note* sections.
3427 gABI requires that within a PT_NOTE segment
3428 (and also inside of each SHT_NOTE section)
3429 each note is padded to a multiple of 4 size,
3430 so we check whether the sections are correctly
3431 aligned. */
3432 if (s->alignment_power == 2)
3433 while (s->next != NULL
3434 && s->next->alignment_power == 2
3435 && (s->next->flags & SEC_LOAD) != 0
3436 && CONST_STRNEQ (s->next->name, ".note"))
3437 s = s->next;
8ded5a0f
AM
3438 }
3439 }
3440
3441 for (s = abfd->sections; s != NULL; s = s->next)
3442 {
3443 if (s->flags & SEC_THREAD_LOCAL)
3444 {
3445 /* We need a PT_TLS segment. */
3446 ++segs;
3447 break;
3448 }
3449 }
3450
3451 /* Let the backend count up any program headers it might need. */
2b05f1b7 3452 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3453 if (bed->elf_backend_additional_program_headers)
3454 {
3455 int a;
3456
3457 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3458 if (a == -1)
3459 abort ();
3460 segs += a;
3461 }
3462
3463 return segs * bed->s->sizeof_phdr;
3464}
3465
2ea37f1c
NC
3466/* Find the segment that contains the output_section of section. */
3467
3468Elf_Internal_Phdr *
3469_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3470{
3471 struct elf_segment_map *m;
3472 Elf_Internal_Phdr *p;
3473
3474 for (m = elf_tdata (abfd)->segment_map,
3475 p = elf_tdata (abfd)->phdr;
3476 m != NULL;
3477 m = m->next, p++)
3478 {
3479 int i;
3480
3481 for (i = m->count - 1; i >= 0; i--)
3482 if (m->sections[i] == section)
3483 return p;
3484 }
3485
3486 return NULL;
3487}
3488
252b5132
RH
3489/* Create a mapping from a set of sections to a program segment. */
3490
217aa764
AM
3491static struct elf_segment_map *
3492make_mapping (bfd *abfd,
3493 asection **sections,
3494 unsigned int from,
3495 unsigned int to,
3496 bfd_boolean phdr)
252b5132
RH
3497{
3498 struct elf_segment_map *m;
3499 unsigned int i;
3500 asection **hdrpp;
dc810e39 3501 bfd_size_type amt;
252b5132 3502
dc810e39
AM
3503 amt = sizeof (struct elf_segment_map);
3504 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3505 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3506 if (m == NULL)
3507 return NULL;
3508 m->next = NULL;
3509 m->p_type = PT_LOAD;
3510 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3511 m->sections[i - from] = *hdrpp;
3512 m->count = to - from;
3513
3514 if (from == 0 && phdr)
3515 {
3516 /* Include the headers in the first PT_LOAD segment. */
3517 m->includes_filehdr = 1;
3518 m->includes_phdrs = 1;
3519 }
3520
3521 return m;
3522}
3523
229fcec5
MM
3524/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3525 on failure. */
3526
3527struct elf_segment_map *
3528_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3529{
3530 struct elf_segment_map *m;
3531
a50b1753
NC
3532 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3533 sizeof (struct elf_segment_map));
229fcec5
MM
3534 if (m == NULL)
3535 return NULL;
3536 m->next = NULL;
3537 m->p_type = PT_DYNAMIC;
3538 m->count = 1;
3539 m->sections[0] = dynsec;
08a40648 3540
229fcec5
MM
3541 return m;
3542}
3543
8ded5a0f 3544/* Possibly add or remove segments from the segment map. */
252b5132 3545
b34976b6 3546static bfd_boolean
3dea8fca
AM
3547elf_modify_segment_map (bfd *abfd,
3548 struct bfd_link_info *info,
3549 bfd_boolean remove_empty_load)
252b5132 3550{
252e386e 3551 struct elf_segment_map **m;
8ded5a0f 3552 const struct elf_backend_data *bed;
252b5132 3553
8ded5a0f
AM
3554 /* The placement algorithm assumes that non allocated sections are
3555 not in PT_LOAD segments. We ensure this here by removing such
3556 sections from the segment map. We also remove excluded
252e386e
AM
3557 sections. Finally, any PT_LOAD segment without sections is
3558 removed. */
3559 m = &elf_tdata (abfd)->segment_map;
3560 while (*m)
8ded5a0f
AM
3561 {
3562 unsigned int i, new_count;
252b5132 3563
252e386e 3564 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3565 {
252e386e
AM
3566 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3567 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3568 || (*m)->p_type != PT_LOAD))
8ded5a0f 3569 {
252e386e
AM
3570 (*m)->sections[new_count] = (*m)->sections[i];
3571 new_count++;
8ded5a0f
AM
3572 }
3573 }
252e386e 3574 (*m)->count = new_count;
252b5132 3575
3dea8fca 3576 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3577 *m = (*m)->next;
3578 else
3579 m = &(*m)->next;
8ded5a0f 3580 }
252b5132 3581
8ded5a0f
AM
3582 bed = get_elf_backend_data (abfd);
3583 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3584 {
252e386e 3585 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3586 return FALSE;
252b5132 3587 }
252b5132 3588
8ded5a0f
AM
3589 return TRUE;
3590}
252b5132 3591
8ded5a0f 3592/* Set up a mapping from BFD sections to program segments. */
252b5132 3593
8ded5a0f
AM
3594bfd_boolean
3595_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3596{
3597 unsigned int count;
3598 struct elf_segment_map *m;
3599 asection **sections = NULL;
3600 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3601 bfd_boolean no_user_phdrs;
252b5132 3602
3dea8fca
AM
3603 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
3604 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3605 {
8ded5a0f
AM
3606 asection *s;
3607 unsigned int i;
3608 struct elf_segment_map *mfirst;
3609 struct elf_segment_map **pm;
3610 asection *last_hdr;
3611 bfd_vma last_size;
3612 unsigned int phdr_index;
3613 bfd_vma maxpagesize;
3614 asection **hdrpp;
3615 bfd_boolean phdr_in_segment = TRUE;
3616 bfd_boolean writable;
3617 int tls_count = 0;
3618 asection *first_tls = NULL;
3619 asection *dynsec, *eh_frame_hdr;
3620 bfd_size_type amt;
252b5132 3621
8ded5a0f 3622 /* Select the allocated sections, and sort them. */
252b5132 3623
a50b1753
NC
3624 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
3625 sizeof (asection *));
8ded5a0f 3626 if (sections == NULL)
252b5132 3627 goto error_return;
252b5132 3628
8ded5a0f
AM
3629 i = 0;
3630 for (s = abfd->sections; s != NULL; s = s->next)
3631 {
3632 if ((s->flags & SEC_ALLOC) != 0)
3633 {
3634 sections[i] = s;
3635 ++i;
3636 }
3637 }
3638 BFD_ASSERT (i <= bfd_count_sections (abfd));
3639 count = i;
252b5132 3640
8ded5a0f 3641 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3642
8ded5a0f 3643 /* Build the mapping. */
252b5132 3644
8ded5a0f
AM
3645 mfirst = NULL;
3646 pm = &mfirst;
252b5132 3647
8ded5a0f
AM
3648 /* If we have a .interp section, then create a PT_PHDR segment for
3649 the program headers and a PT_INTERP segment for the .interp
3650 section. */
3651 s = bfd_get_section_by_name (abfd, ".interp");
3652 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3653 {
3654 amt = sizeof (struct elf_segment_map);
a50b1753 3655 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3656 if (m == NULL)
3657 goto error_return;
3658 m->next = NULL;
3659 m->p_type = PT_PHDR;
3660 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3661 m->p_flags = PF_R | PF_X;
3662 m->p_flags_valid = 1;
3663 m->includes_phdrs = 1;
252b5132 3664
8ded5a0f
AM
3665 *pm = m;
3666 pm = &m->next;
252b5132 3667
8ded5a0f 3668 amt = sizeof (struct elf_segment_map);
a50b1753 3669 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3670 if (m == NULL)
3671 goto error_return;
3672 m->next = NULL;
3673 m->p_type = PT_INTERP;
3674 m->count = 1;
3675 m->sections[0] = s;
3676
3677 *pm = m;
3678 pm = &m->next;
252b5132 3679 }
8ded5a0f
AM
3680
3681 /* Look through the sections. We put sections in the same program
3682 segment when the start of the second section can be placed within
3683 a few bytes of the end of the first section. */
3684 last_hdr = NULL;
3685 last_size = 0;
3686 phdr_index = 0;
3687 maxpagesize = bed->maxpagesize;
3688 writable = FALSE;
3689 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3690 if (dynsec != NULL
3691 && (dynsec->flags & SEC_LOAD) == 0)
3692 dynsec = NULL;
3693
3694 /* Deal with -Ttext or something similar such that the first section
3695 is not adjacent to the program headers. This is an
3696 approximation, since at this point we don't know exactly how many
3697 program headers we will need. */
3698 if (count > 0)
252b5132 3699 {
8ded5a0f
AM
3700 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3701
62d7a5f6 3702 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3703 phdr_size = get_program_header_size (abfd, info);
3704 if ((abfd->flags & D_PAGED) == 0
3705 || sections[0]->lma < phdr_size
3706 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
3707 phdr_in_segment = FALSE;
252b5132
RH
3708 }
3709
8ded5a0f 3710 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3711 {
8ded5a0f
AM
3712 asection *hdr;
3713 bfd_boolean new_segment;
3714
3715 hdr = *hdrpp;
3716
3717 /* See if this section and the last one will fit in the same
3718 segment. */
3719
3720 if (last_hdr == NULL)
3721 {
3722 /* If we don't have a segment yet, then we don't need a new
3723 one (we build the last one after this loop). */
3724 new_segment = FALSE;
3725 }
3726 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3727 {
3728 /* If this section has a different relation between the
3729 virtual address and the load address, then we need a new
3730 segment. */
3731 new_segment = TRUE;
3732 }
39948a60
NC
3733 /* In the next test we have to be careful when last_hdr->lma is close
3734 to the end of the address space. If the aligned address wraps
3735 around to the start of the address space, then there are no more
3736 pages left in memory and it is OK to assume that the current
3737 section can be included in the current segment. */
3738 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3739 > last_hdr->lma)
3740 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3741 <= hdr->lma))
8ded5a0f
AM
3742 {
3743 /* If putting this section in this segment would force us to
3744 skip a page in the segment, then we need a new segment. */
3745 new_segment = TRUE;
3746 }
3747 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3748 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3749 {
3750 /* We don't want to put a loadable section after a
3751 nonloadable section in the same segment.
3752 Consider .tbss sections as loadable for this purpose. */
3753 new_segment = TRUE;
3754 }
3755 else if ((abfd->flags & D_PAGED) == 0)
3756 {
3757 /* If the file is not demand paged, which means that we
3758 don't require the sections to be correctly aligned in the
3759 file, then there is no other reason for a new segment. */
3760 new_segment = FALSE;
3761 }
3762 else if (! writable
3763 && (hdr->flags & SEC_READONLY) == 0
3764 && (((last_hdr->lma + last_size - 1)
3765 & ~(maxpagesize - 1))
3766 != (hdr->lma & ~(maxpagesize - 1))))
3767 {
3768 /* We don't want to put a writable section in a read only
3769 segment, unless they are on the same page in memory
3770 anyhow. We already know that the last section does not
3771 bring us past the current section on the page, so the
3772 only case in which the new section is not on the same
3773 page as the previous section is when the previous section
3774 ends precisely on a page boundary. */
3775 new_segment = TRUE;
3776 }
3777 else
3778 {
3779 /* Otherwise, we can use the same segment. */
3780 new_segment = FALSE;
3781 }
3782
2889e75b 3783 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3784 if (last_hdr != NULL
3785 && info != NULL
3786 && info->callbacks->override_segment_assignment != NULL)
3787 new_segment
3788 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3789 last_hdr,
3790 new_segment);
2889e75b 3791
8ded5a0f
AM
3792 if (! new_segment)
3793 {
3794 if ((hdr->flags & SEC_READONLY) == 0)
3795 writable = TRUE;
3796 last_hdr = hdr;
3797 /* .tbss sections effectively have zero size. */
3798 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3799 != SEC_THREAD_LOCAL)
3800 last_size = hdr->size;
3801 else
3802 last_size = 0;
3803 continue;
3804 }
3805
3806 /* We need a new program segment. We must create a new program
3807 header holding all the sections from phdr_index until hdr. */
3808
3809 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3810 if (m == NULL)
3811 goto error_return;
3812
3813 *pm = m;
3814 pm = &m->next;
3815
252b5132 3816 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3817 writable = TRUE;
8ded5a0f
AM
3818 else
3819 writable = FALSE;
3820
baaff79e
JJ
3821 last_hdr = hdr;
3822 /* .tbss sections effectively have zero size. */
e5caec89 3823 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3824 last_size = hdr->size;
baaff79e
JJ
3825 else
3826 last_size = 0;
8ded5a0f
AM
3827 phdr_index = i;
3828 phdr_in_segment = FALSE;
252b5132
RH
3829 }
3830
8ded5a0f
AM
3831 /* Create a final PT_LOAD program segment. */
3832 if (last_hdr != NULL)
3833 {
3834 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3835 if (m == NULL)
3836 goto error_return;
252b5132 3837
8ded5a0f
AM
3838 *pm = m;
3839 pm = &m->next;
3840 }
252b5132 3841
8ded5a0f
AM
3842 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3843 if (dynsec != NULL)
3844 {
3845 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
3846 if (m == NULL)
3847 goto error_return;
3848 *pm = m;
3849 pm = &m->next;
3850 }
252b5132 3851
1c5265b5
JJ
3852 /* For each batch of consecutive loadable .note sections,
3853 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
3854 because if we link together nonloadable .note sections and
3855 loadable .note sections, we will generate two .note sections
3856 in the output file. FIXME: Using names for section types is
3857 bogus anyhow. */
8ded5a0f
AM
3858 for (s = abfd->sections; s != NULL; s = s->next)
3859 {
3860 if ((s->flags & SEC_LOAD) != 0
0112cd26 3861 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 3862 {
1c5265b5 3863 asection *s2;
91d6fa6a
NC
3864
3865 count = 1;
8ded5a0f 3866 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
3867 if (s->alignment_power == 2)
3868 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
3869 {
3870 if (s2->next->alignment_power == 2
3871 && (s2->next->flags & SEC_LOAD) != 0
3872 && CONST_STRNEQ (s2->next->name, ".note")
3873 && align_power (s2->vma + s2->size, 2)
3874 == s2->next->vma)
3875 count++;
3876 else
3877 break;
3878 }
1c5265b5 3879 amt += (count - 1) * sizeof (asection *);
a50b1753 3880 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3881 if (m == NULL)
3882 goto error_return;
3883 m->next = NULL;
3884 m->p_type = PT_NOTE;
1c5265b5
JJ
3885 m->count = count;
3886 while (count > 1)
3887 {
3888 m->sections[m->count - count--] = s;
3889 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
3890 s = s->next;
3891 }
3892 m->sections[m->count - 1] = s;
3893 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
3894 *pm = m;
3895 pm = &m->next;
3896 }
3897 if (s->flags & SEC_THREAD_LOCAL)
3898 {
3899 if (! tls_count)
3900 first_tls = s;
3901 tls_count++;
3902 }
3903 }
252b5132 3904
8ded5a0f
AM
3905 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3906 if (tls_count > 0)
3907 {
8ded5a0f
AM
3908 amt = sizeof (struct elf_segment_map);
3909 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 3910 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3911 if (m == NULL)
3912 goto error_return;
3913 m->next = NULL;
3914 m->p_type = PT_TLS;
3915 m->count = tls_count;
3916 /* Mandated PF_R. */
3917 m->p_flags = PF_R;
3918 m->p_flags_valid = 1;
91d6fa6a 3919 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f
AM
3920 {
3921 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3922 m->sections[i] = first_tls;
3923 first_tls = first_tls->next;
3924 }
252b5132 3925
8ded5a0f
AM
3926 *pm = m;
3927 pm = &m->next;
3928 }
252b5132 3929
8ded5a0f
AM
3930 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3931 segment. */
3932 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3933 if (eh_frame_hdr != NULL
3934 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 3935 {
dc810e39 3936 amt = sizeof (struct elf_segment_map);
a50b1753 3937 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3938 if (m == NULL)
3939 goto error_return;
3940 m->next = NULL;
8ded5a0f 3941 m->p_type = PT_GNU_EH_FRAME;
252b5132 3942 m->count = 1;
8ded5a0f 3943 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
3944
3945 *pm = m;
3946 pm = &m->next;
3947 }
13ae64f3 3948
8ded5a0f 3949 if (elf_tdata (abfd)->stack_flags)
13ae64f3 3950 {
8ded5a0f 3951 amt = sizeof (struct elf_segment_map);
a50b1753 3952 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3953 if (m == NULL)
3954 goto error_return;
3955 m->next = NULL;
2b05f1b7 3956 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
3957 m->p_flags = elf_tdata (abfd)->stack_flags;
3958 m->p_flags_valid = 1;
252b5132 3959
8ded5a0f
AM
3960 *pm = m;
3961 pm = &m->next;
3962 }
65765700 3963
ceae84aa 3964 if (info != NULL && info->relro)
8ded5a0f 3965 {
f210dcff
L
3966 for (m = mfirst; m != NULL; m = m->next)
3967 {
3968 if (m->p_type == PT_LOAD)
3969 {
3970 asection *last = m->sections[m->count - 1];
3971 bfd_vma vaddr = m->sections[0]->vma;
3972 bfd_vma filesz = last->vma - vaddr + last->size;
65765700 3973
f210dcff
L
3974 if (vaddr < info->relro_end
3975 && vaddr >= info->relro_start
3976 && (vaddr + filesz) >= info->relro_end)
3977 break;
3978 }
3979 }
3980
3981 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
3982 if (m != NULL)
3983 {
3984 amt = sizeof (struct elf_segment_map);
a50b1753 3985 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
3986 if (m == NULL)
3987 goto error_return;
3988 m->next = NULL;
3989 m->p_type = PT_GNU_RELRO;
3990 m->p_flags = PF_R;
3991 m->p_flags_valid = 1;
3992
3993 *pm = m;
3994 pm = &m->next;
3995 }
8ded5a0f 3996 }
9ee5e499 3997
8ded5a0f
AM
3998 free (sections);
3999 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
4000 }
4001
3dea8fca 4002 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4003 return FALSE;
8c37241b 4004
8ded5a0f
AM
4005 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4006 ++count;
4007 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 4008
b34976b6 4009 return TRUE;
252b5132
RH
4010
4011 error_return:
4012 if (sections != NULL)
4013 free (sections);
b34976b6 4014 return FALSE;
252b5132
RH
4015}
4016
4017/* Sort sections by address. */
4018
4019static int
217aa764 4020elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4021{
4022 const asection *sec1 = *(const asection **) arg1;
4023 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4024 bfd_size_type size1, size2;
252b5132
RH
4025
4026 /* Sort by LMA first, since this is the address used to
4027 place the section into a segment. */
4028 if (sec1->lma < sec2->lma)
4029 return -1;
4030 else if (sec1->lma > sec2->lma)
4031 return 1;
4032
4033 /* Then sort by VMA. Normally the LMA and the VMA will be
4034 the same, and this will do nothing. */
4035 if (sec1->vma < sec2->vma)
4036 return -1;
4037 else if (sec1->vma > sec2->vma)
4038 return 1;
4039
4040 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4041
07c6e936 4042#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4043
4044 if (TOEND (sec1))
4045 {
4046 if (TOEND (sec2))
00a7cdc5
NC
4047 {
4048 /* If the indicies are the same, do not return 0
4049 here, but continue to try the next comparison. */
4050 if (sec1->target_index - sec2->target_index != 0)
4051 return sec1->target_index - sec2->target_index;
4052 }
252b5132
RH
4053 else
4054 return 1;
4055 }
00a7cdc5 4056 else if (TOEND (sec2))
252b5132
RH
4057 return -1;
4058
4059#undef TOEND
4060
00a7cdc5
NC
4061 /* Sort by size, to put zero sized sections
4062 before others at the same address. */
252b5132 4063
eea6121a
AM
4064 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4065 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4066
4067 if (size1 < size2)
252b5132 4068 return -1;
eecdbe52 4069 if (size1 > size2)
252b5132
RH
4070 return 1;
4071
4072 return sec1->target_index - sec2->target_index;
4073}
4074
340b6d91
AC
4075/* Ian Lance Taylor writes:
4076
4077 We shouldn't be using % with a negative signed number. That's just
4078 not good. We have to make sure either that the number is not
4079 negative, or that the number has an unsigned type. When the types
4080 are all the same size they wind up as unsigned. When file_ptr is a
4081 larger signed type, the arithmetic winds up as signed long long,
4082 which is wrong.
4083
4084 What we're trying to say here is something like ``increase OFF by
4085 the least amount that will cause it to be equal to the VMA modulo
4086 the page size.'' */
4087/* In other words, something like:
4088
4089 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4090 off_offset = off % bed->maxpagesize;
4091 if (vma_offset < off_offset)
4092 adjustment = vma_offset + bed->maxpagesize - off_offset;
4093 else
4094 adjustment = vma_offset - off_offset;
08a40648 4095
340b6d91
AC
4096 which can can be collapsed into the expression below. */
4097
4098static file_ptr
4099vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4100{
4101 return ((vma - off) % maxpagesize);
4102}
4103
6d33f217
L
4104static void
4105print_segment_map (const struct elf_segment_map *m)
4106{
4107 unsigned int j;
4108 const char *pt = get_segment_type (m->p_type);
4109 char buf[32];
4110
4111 if (pt == NULL)
4112 {
4113 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4114 sprintf (buf, "LOPROC+%7.7x",
4115 (unsigned int) (m->p_type - PT_LOPROC));
4116 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4117 sprintf (buf, "LOOS+%7.7x",
4118 (unsigned int) (m->p_type - PT_LOOS));
4119 else
4120 snprintf (buf, sizeof (buf), "%8.8x",
4121 (unsigned int) m->p_type);
4122 pt = buf;
4123 }
4124 fprintf (stderr, "%s:", pt);
4125 for (j = 0; j < m->count; j++)
4126 fprintf (stderr, " %s", m->sections [j]->name);
4127 putc ('\n',stderr);
4128}
4129
32812159
AM
4130static bfd_boolean
4131write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4132{
4133 void *buf;
4134 bfd_boolean ret;
4135
4136 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4137 return FALSE;
4138 buf = bfd_zmalloc (len);
4139 if (buf == NULL)
4140 return FALSE;
4141 ret = bfd_bwrite (buf, len, abfd) == len;
4142 free (buf);
4143 return ret;
4144}
4145
252b5132
RH
4146/* Assign file positions to the sections based on the mapping from
4147 sections to segments. This function also sets up some fields in
f3520d2f 4148 the file header. */
252b5132 4149
b34976b6 4150static bfd_boolean
f3520d2f
AM
4151assign_file_positions_for_load_sections (bfd *abfd,
4152 struct bfd_link_info *link_info)
252b5132
RH
4153{
4154 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4155 struct elf_segment_map *m;
252b5132 4156 Elf_Internal_Phdr *phdrs;
252b5132 4157 Elf_Internal_Phdr *p;
02bf8d82 4158 file_ptr off;
3f570048 4159 bfd_size_type maxpagesize;
f3520d2f 4160 unsigned int alloc;
0920dee7 4161 unsigned int i, j;
2b0bc088 4162 bfd_vma header_pad = 0;
252b5132 4163
e36284ab 4164 if (link_info == NULL
ceae84aa 4165 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4166 return FALSE;
252b5132 4167
8ded5a0f 4168 alloc = 0;
252b5132 4169 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2b0bc088
NC
4170 {
4171 ++alloc;
4172 if (m->header_size)
4173 header_pad = m->header_size;
4174 }
252b5132
RH
4175
4176 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4177 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4178 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4179
62d7a5f6 4180 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4181 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4182 else
4183 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4184 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4185
4186 if (alloc == 0)
f3520d2f 4187 {
8ded5a0f
AM
4188 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4189 return TRUE;
f3520d2f 4190 }
252b5132 4191
57268894
HPN
4192 /* We're writing the size in elf_tdata (abfd)->program_header_size,
4193 see assign_file_positions_except_relocs, so make sure we have
4194 that amount allocated, with trailing space cleared.
4195 The variable alloc contains the computed need, while elf_tdata
4196 (abfd)->program_header_size contains the size used for the
4197 layout.
4198 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4199 where the layout is forced to according to a larger size in the
4200 last iterations for the testcase ld-elf/header. */
4201 BFD_ASSERT (elf_tdata (abfd)->program_header_size % bed->s->sizeof_phdr
4202 == 0);
a50b1753
NC
4203 phdrs = (Elf_Internal_Phdr *)
4204 bfd_zalloc2 (abfd,
4205 (elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr),
4206 sizeof (Elf_Internal_Phdr));
f3520d2f 4207 elf_tdata (abfd)->phdr = phdrs;
252b5132 4208 if (phdrs == NULL)
b34976b6 4209 return FALSE;
252b5132 4210
3f570048
AM
4211 maxpagesize = 1;
4212 if ((abfd->flags & D_PAGED) != 0)
4213 maxpagesize = bed->maxpagesize;
4214
252b5132
RH
4215 off = bed->s->sizeof_ehdr;
4216 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4217 if (header_pad < (bfd_vma) off)
4218 header_pad = 0;
4219 else
4220 header_pad -= off;
4221 off += header_pad;
252b5132 4222
0920dee7 4223 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4224 m != NULL;
0920dee7 4225 m = m->next, p++, j++)
252b5132 4226 {
252b5132 4227 asection **secpp;
bf988460
AM
4228 bfd_vma off_adjust;
4229 bfd_boolean no_contents;
252b5132
RH
4230
4231 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4232 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4233 not be done to the PT_NOTE section of a corefile, which may
4234 contain several pseudo-sections artificially created by bfd.
4235 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4236 if (m->count > 1
4237 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4238 && m->p_type == PT_NOTE))
252b5132
RH
4239 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4240 elf_sort_sections);
4241
b301b248
AM
4242 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4243 number of sections with contents contributing to both p_filesz
4244 and p_memsz, followed by a number of sections with no contents
4245 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4246 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4247 p->p_type = m->p_type;
28a7f3e7 4248 p->p_flags = m->p_flags;
252b5132 4249
3f570048
AM
4250 if (m->count == 0)
4251 p->p_vaddr = 0;
4252 else
3271a814 4253 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4254
4255 if (m->p_paddr_valid)
4256 p->p_paddr = m->p_paddr;
4257 else if (m->count == 0)
4258 p->p_paddr = 0;
4259 else
08a40648 4260 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4261
4262 if (p->p_type == PT_LOAD
4263 && (abfd->flags & D_PAGED) != 0)
4264 {
4265 /* p_align in demand paged PT_LOAD segments effectively stores
4266 the maximum page size. When copying an executable with
4267 objcopy, we set m->p_align from the input file. Use this
4268 value for maxpagesize rather than bed->maxpagesize, which
4269 may be different. Note that we use maxpagesize for PT_TLS
4270 segment alignment later in this function, so we are relying
4271 on at least one PT_LOAD segment appearing before a PT_TLS
4272 segment. */
4273 if (m->p_align_valid)
4274 maxpagesize = m->p_align;
4275
4276 p->p_align = maxpagesize;
4277 }
3271a814
NS
4278 else if (m->p_align_valid)
4279 p->p_align = m->p_align;
e970b90a
DJ
4280 else if (m->count == 0)
4281 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4282 else
4283 p->p_align = 0;
4284
bf988460
AM
4285 no_contents = FALSE;
4286 off_adjust = 0;
252b5132 4287 if (p->p_type == PT_LOAD
b301b248 4288 && m->count > 0)
252b5132 4289 {
b301b248 4290 bfd_size_type align;
a49e53ed 4291 unsigned int align_power = 0;
b301b248 4292
3271a814
NS
4293 if (m->p_align_valid)
4294 align = p->p_align;
4295 else
252b5132 4296 {
3271a814
NS
4297 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4298 {
4299 unsigned int secalign;
08a40648 4300
3271a814
NS
4301 secalign = bfd_get_section_alignment (abfd, *secpp);
4302 if (secalign > align_power)
4303 align_power = secalign;
4304 }
4305 align = (bfd_size_type) 1 << align_power;
4306 if (align < maxpagesize)
4307 align = maxpagesize;
b301b248 4308 }
252b5132 4309
02bf8d82
AM
4310 for (i = 0; i < m->count; i++)
4311 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4312 /* If we aren't making room for this section, then
4313 it must be SHT_NOBITS regardless of what we've
4314 set via struct bfd_elf_special_section. */
4315 elf_section_type (m->sections[i]) = SHT_NOBITS;
4316
bf988460 4317 /* Find out whether this segment contains any loadable
aea274d3
AM
4318 sections. */
4319 no_contents = TRUE;
4320 for (i = 0; i < m->count; i++)
4321 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4322 {
4323 no_contents = FALSE;
4324 break;
4325 }
bf988460
AM
4326
4327 off_adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4328 off += off_adjust;
4329 if (no_contents)
4330 {
4331 /* We shouldn't need to align the segment on disk since
4332 the segment doesn't need file space, but the gABI
4333 arguably requires the alignment and glibc ld.so
4334 checks it. So to comply with the alignment
4335 requirement but not waste file space, we adjust
4336 p_offset for just this segment. (OFF_ADJUST is
4337 subtracted from OFF later.) This may put p_offset
4338 past the end of file, but that shouldn't matter. */
4339 }
4340 else
4341 off_adjust = 0;
252b5132 4342 }
b1a6d0b1
NC
4343 /* Make sure the .dynamic section is the first section in the
4344 PT_DYNAMIC segment. */
4345 else if (p->p_type == PT_DYNAMIC
4346 && m->count > 1
4347 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4348 {
4349 _bfd_error_handler
b301b248
AM
4350 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4351 abfd);
b1a6d0b1
NC
4352 bfd_set_error (bfd_error_bad_value);
4353 return FALSE;
4354 }
3f001e84
JK
4355 /* Set the note section type to SHT_NOTE. */
4356 else if (p->p_type == PT_NOTE)
4357 for (i = 0; i < m->count; i++)
4358 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4359
252b5132
RH
4360 p->p_offset = 0;
4361 p->p_filesz = 0;
4362 p->p_memsz = 0;
4363
4364 if (m->includes_filehdr)
4365 {
bf988460 4366 if (!m->p_flags_valid)
252b5132 4367 p->p_flags |= PF_R;
252b5132
RH
4368 p->p_filesz = bed->s->sizeof_ehdr;
4369 p->p_memsz = bed->s->sizeof_ehdr;
4370 if (m->count > 0)
4371 {
4372 BFD_ASSERT (p->p_type == PT_LOAD);
4373
4374 if (p->p_vaddr < (bfd_vma) off)
4375 {
caf47ea6 4376 (*_bfd_error_handler)
b301b248
AM
4377 (_("%B: Not enough room for program headers, try linking with -N"),
4378 abfd);
252b5132 4379 bfd_set_error (bfd_error_bad_value);
b34976b6 4380 return FALSE;
252b5132
RH
4381 }
4382
4383 p->p_vaddr -= off;
bf988460 4384 if (!m->p_paddr_valid)
252b5132
RH
4385 p->p_paddr -= off;
4386 }
252b5132
RH
4387 }
4388
4389 if (m->includes_phdrs)
4390 {
bf988460 4391 if (!m->p_flags_valid)
252b5132
RH
4392 p->p_flags |= PF_R;
4393
f3520d2f 4394 if (!m->includes_filehdr)
252b5132
RH
4395 {
4396 p->p_offset = bed->s->sizeof_ehdr;
4397
4398 if (m->count > 0)
4399 {
4400 BFD_ASSERT (p->p_type == PT_LOAD);
4401 p->p_vaddr -= off - p->p_offset;
bf988460 4402 if (!m->p_paddr_valid)
252b5132
RH
4403 p->p_paddr -= off - p->p_offset;
4404 }
252b5132
RH
4405 }
4406
4407 p->p_filesz += alloc * bed->s->sizeof_phdr;
4408 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4409 if (m->count)
4410 {
4411 p->p_filesz += header_pad;
4412 p->p_memsz += header_pad;
4413 }
252b5132
RH
4414 }
4415
4416 if (p->p_type == PT_LOAD
4417 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4418 {
bf988460 4419 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4420 p->p_offset = off;
252b5132
RH
4421 else
4422 {
4423 file_ptr adjust;
4424
4425 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4426 if (!no_contents)
4427 p->p_filesz += adjust;
252b5132
RH
4428 p->p_memsz += adjust;
4429 }
4430 }
4431
1ea63fd2
AM
4432 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4433 maps. Set filepos for sections in PT_LOAD segments, and in
4434 core files, for sections in PT_NOTE segments.
4435 assign_file_positions_for_non_load_sections will set filepos
4436 for other sections and update p_filesz for other segments. */
252b5132
RH
4437 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4438 {
4439 asection *sec;
252b5132 4440 bfd_size_type align;
627b32bc 4441 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4442
4443 sec = *secpp;
02bf8d82 4444 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4445 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4446
88967714
AM
4447 if ((p->p_type == PT_LOAD
4448 || p->p_type == PT_TLS)
4449 && (this_hdr->sh_type != SHT_NOBITS
4450 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4451 && ((this_hdr->sh_flags & SHF_TLS) == 0
4452 || p->p_type == PT_TLS))))
252b5132 4453 {
11701589 4454 bfd_signed_vma adjust = sec->vma - (p->p_vaddr + p->p_memsz);
252b5132 4455
88967714 4456 if (adjust < 0)
252b5132 4457 {
88967714 4458 (*_bfd_error_handler)
11701589 4459 (_("%B: section %A vma 0x%lx overlaps previous sections"),
37c43c55 4460 abfd, sec, (unsigned long) sec->vma);
88967714
AM
4461 adjust = 0;
4462 }
4463 p->p_memsz += adjust;
0e922b77 4464
88967714
AM
4465 if (this_hdr->sh_type != SHT_NOBITS)
4466 {
32812159
AM
4467 if (p->p_filesz + adjust < p->p_memsz)
4468 {
4469 /* We have a PROGBITS section following NOBITS ones.
4470 Allocate file space for the NOBITS section(s) and
4471 zero it. */
4472 adjust = p->p_memsz - p->p_filesz;
4473 if (!write_zeros (abfd, off, adjust))
4474 return FALSE;
4475 }
88967714
AM
4476 off += adjust;
4477 p->p_filesz += adjust;
252b5132 4478 }
252b5132
RH
4479 }
4480
4481 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4482 {
b301b248
AM
4483 /* The section at i == 0 is the one that actually contains
4484 everything. */
4a938328
MS
4485 if (i == 0)
4486 {
627b32bc 4487 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4488 off += this_hdr->sh_size;
4489 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4490 p->p_memsz = 0;
4491 p->p_align = 1;
252b5132 4492 }
4a938328 4493 else
252b5132 4494 {
b301b248 4495 /* The rest are fake sections that shouldn't be written. */
252b5132 4496 sec->filepos = 0;
eea6121a 4497 sec->size = 0;
b301b248
AM
4498 sec->flags = 0;
4499 continue;
252b5132 4500 }
252b5132
RH
4501 }
4502 else
4503 {
b301b248
AM
4504 if (p->p_type == PT_LOAD)
4505 {
02bf8d82
AM
4506 this_hdr->sh_offset = sec->filepos = off;
4507 if (this_hdr->sh_type != SHT_NOBITS)
6a3cd2b4 4508 off += this_hdr->sh_size;
b301b248 4509 }
252b5132 4510
02bf8d82 4511 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4512 {
6a3cd2b4 4513 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4514 /* A load section without SHF_ALLOC is something like
4515 a note section in a PT_NOTE segment. These take
4516 file space but are not loaded into memory. */
4517 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4518 p->p_memsz += this_hdr->sh_size;
b301b248 4519 }
6a3cd2b4 4520 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4521 {
6a3cd2b4
AM
4522 if (p->p_type == PT_TLS)
4523 p->p_memsz += this_hdr->sh_size;
4524
4525 /* .tbss is special. It doesn't contribute to p_memsz of
4526 normal segments. */
4527 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4528 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4529 }
4530
b10a8ae0
L
4531 if (align > p->p_align
4532 && !m->p_align_valid
4533 && (p->p_type != PT_LOAD
4534 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4535 p->p_align = align;
4536 }
4537
bf988460 4538 if (!m->p_flags_valid)
252b5132
RH
4539 {
4540 p->p_flags |= PF_R;
02bf8d82 4541 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4542 p->p_flags |= PF_X;
02bf8d82 4543 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4544 p->p_flags |= PF_W;
4545 }
4546 }
bf988460 4547 off -= off_adjust;
0920dee7 4548
7c928300
AM
4549 /* Check that all sections are in a PT_LOAD segment.
4550 Don't check funky gdb generated core files. */
4551 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
0920dee7
L
4552 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4553 {
4554 Elf_Internal_Shdr *this_hdr;
4555 asection *sec;
4556
4557 sec = *secpp;
4558 this_hdr = &(elf_section_data(sec)->this_hdr);
4559 if (this_hdr->sh_size != 0
4560 && !ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, p))
4561 {
4562 (*_bfd_error_handler)
4563 (_("%B: section `%A' can't be allocated in segment %d"),
4564 abfd, sec, j);
6d33f217 4565 print_segment_map (m);
0920dee7
L
4566 bfd_set_error (bfd_error_bad_value);
4567 return FALSE;
4568 }
4569 }
252b5132
RH
4570 }
4571
f3520d2f
AM
4572 elf_tdata (abfd)->next_file_pos = off;
4573 return TRUE;
4574}
4575
4576/* Assign file positions for the other sections. */
4577
4578static bfd_boolean
4579assign_file_positions_for_non_load_sections (bfd *abfd,
4580 struct bfd_link_info *link_info)
4581{
4582 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4583 Elf_Internal_Shdr **i_shdrpp;
4584 Elf_Internal_Shdr **hdrpp;
4585 Elf_Internal_Phdr *phdrs;
4586 Elf_Internal_Phdr *p;
4587 struct elf_segment_map *m;
4588 bfd_vma filehdr_vaddr, filehdr_paddr;
4589 bfd_vma phdrs_vaddr, phdrs_paddr;
4590 file_ptr off;
4591 unsigned int num_sec;
4592 unsigned int i;
4593 unsigned int count;
4594
5c182d5f
AM
4595 i_shdrpp = elf_elfsections (abfd);
4596 num_sec = elf_numsections (abfd);
f3520d2f 4597 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4598 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4599 {
4600 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4601 Elf_Internal_Shdr *hdr;
4602
4603 hdr = *hdrpp;
4604 if (hdr->bfd_section != NULL
252e386e
AM
4605 && (hdr->bfd_section->filepos != 0
4606 || (hdr->sh_type == SHT_NOBITS
4607 && hdr->contents == NULL)))
627b32bc 4608 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4609 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4610 {
49c13adb
L
4611 if (hdr->sh_size != 0)
4612 ((*_bfd_error_handler)
4613 (_("%B: warning: allocated section `%s' not in segment"),
3ba71138
L
4614 abfd,
4615 (hdr->bfd_section == NULL
4616 ? "*unknown*"
4617 : hdr->bfd_section->name)));
4618 /* We don't need to page align empty sections. */
4619 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4620 off += vma_page_aligned_bias (hdr->sh_addr, off,
4621 bed->maxpagesize);
4622 else
4623 off += vma_page_aligned_bias (hdr->sh_addr, off,
4624 hdr->sh_addralign);
4625 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4626 FALSE);
4627 }
4628 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4629 && hdr->bfd_section == NULL)
4630 || hdr == i_shdrpp[tdata->symtab_section]
4631 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4632 || hdr == i_shdrpp[tdata->strtab_section])
4633 hdr->sh_offset = -1;
4634 else
4635 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4636 }
4637
252b5132
RH
4638 /* Now that we have set the section file positions, we can set up
4639 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4640 count = 0;
4641 filehdr_vaddr = 0;
4642 filehdr_paddr = 0;
4643 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4644 phdrs_paddr = 0;
4645 phdrs = elf_tdata (abfd)->phdr;
4646 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4647 m != NULL;
4648 m = m->next, p++)
4649 {
4650 ++count;
4651 if (p->p_type != PT_LOAD)
4652 continue;
4653
4654 if (m->includes_filehdr)
4655 {
4656 filehdr_vaddr = p->p_vaddr;
4657 filehdr_paddr = p->p_paddr;
4658 }
4659 if (m->includes_phdrs)
4660 {
4661 phdrs_vaddr = p->p_vaddr;
4662 phdrs_paddr = p->p_paddr;
4663 if (m->includes_filehdr)
4664 {
4665 phdrs_vaddr += bed->s->sizeof_ehdr;
4666 phdrs_paddr += bed->s->sizeof_ehdr;
4667 }
4668 }
4669 }
4670
252b5132
RH
4671 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4672 m != NULL;
4673 m = m->next, p++)
4674 {
129af99f 4675 if (p->p_type == PT_GNU_RELRO)
252b5132 4676 {
b84a33b5
AM
4677 const Elf_Internal_Phdr *lp;
4678
129af99f 4679 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
1ea63fd2 4680
129af99f 4681 if (link_info != NULL)
8c37241b 4682 {
129af99f
AS
4683 /* During linking the range of the RELRO segment is passed
4684 in link_info. */
8c37241b
JJ
4685 for (lp = phdrs; lp < phdrs + count; ++lp)
4686 {
4687 if (lp->p_type == PT_LOAD
8c37241b 4688 && lp->p_vaddr >= link_info->relro_start
b84a33b5
AM
4689 && lp->p_vaddr < link_info->relro_end
4690 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end)
8c37241b
JJ
4691 break;
4692 }
8c37241b 4693 }
129af99f
AS
4694 else
4695 {
4696 /* Otherwise we are copying an executable or shared
b84a33b5 4697 library, but we need to use the same linker logic. */
129af99f
AS
4698 for (lp = phdrs; lp < phdrs + count; ++lp)
4699 {
4700 if (lp->p_type == PT_LOAD
4701 && lp->p_paddr == p->p_paddr)
4702 break;
4703 }
b84a33b5
AM
4704 }
4705
4706 if (lp < phdrs + count)
4707 {
4708 p->p_vaddr = lp->p_vaddr;
4709 p->p_paddr = lp->p_paddr;
4710 p->p_offset = lp->p_offset;
4711 if (link_info != NULL)
4712 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4713 else if (m->p_size_valid)
4714 p->p_filesz = m->p_size;
129af99f
AS
4715 else
4716 abort ();
b84a33b5
AM
4717 p->p_memsz = p->p_filesz;
4718 p->p_align = 1;
4719 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 4720 }
9433b9b1 4721 else
b84a33b5
AM
4722 {
4723 memset (p, 0, sizeof *p);
4724 p->p_type = PT_NULL;
4725 }
129af99f
AS
4726 }
4727 else if (m->count != 0)
4728 {
4729 if (p->p_type != PT_LOAD
4730 && (p->p_type != PT_NOTE
4731 || bfd_get_format (abfd) != bfd_core))
4732 {
4733 Elf_Internal_Shdr *hdr;
4734 asection *sect;
4735
4736 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4737
4738 sect = m->sections[m->count - 1];
4739 hdr = &elf_section_data (sect)->this_hdr;
4740 p->p_filesz = sect->filepos - m->sections[0]->filepos;
4741 if (hdr->sh_type != SHT_NOBITS)
4742 p->p_filesz += hdr->sh_size;
4743 p->p_offset = m->sections[0]->filepos;
4744 }
4745 }
4746 else if (m->includes_filehdr)
4747 {
4748 p->p_vaddr = filehdr_vaddr;
4749 if (! m->p_paddr_valid)
4750 p->p_paddr = filehdr_paddr;
4751 }
4752 else if (m->includes_phdrs)
4753 {
4754 p->p_vaddr = phdrs_vaddr;
4755 if (! m->p_paddr_valid)
4756 p->p_paddr = phdrs_paddr;
252b5132
RH
4757 }
4758 }
4759
252b5132
RH
4760 elf_tdata (abfd)->next_file_pos = off;
4761
b34976b6 4762 return TRUE;
252b5132
RH
4763}
4764
252b5132
RH
4765/* Work out the file positions of all the sections. This is called by
4766 _bfd_elf_compute_section_file_positions. All the section sizes and
4767 VMAs must be known before this is called.
4768
e0638f70
AM
4769 Reloc sections come in two flavours: Those processed specially as
4770 "side-channel" data attached to a section to which they apply, and
4771 those that bfd doesn't process as relocations. The latter sort are
4772 stored in a normal bfd section by bfd_section_from_shdr. We don't
4773 consider the former sort here, unless they form part of the loadable
4774 image. Reloc sections not assigned here will be handled later by
4775 assign_file_positions_for_relocs.
252b5132
RH
4776
4777 We also don't set the positions of the .symtab and .strtab here. */
4778
b34976b6 4779static bfd_boolean
c84fca4d
AO
4780assign_file_positions_except_relocs (bfd *abfd,
4781 struct bfd_link_info *link_info)
252b5132 4782{
5c182d5f
AM
4783 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4784 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4785 file_ptr off;
9c5bfbb7 4786 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4787
4788 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4789 && bfd_get_format (abfd) != bfd_core)
4790 {
5c182d5f
AM
4791 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4792 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4793 Elf_Internal_Shdr **hdrpp;
4794 unsigned int i;
4795
4796 /* Start after the ELF header. */
4797 off = i_ehdrp->e_ehsize;
4798
4799 /* We are not creating an executable, which means that we are
4800 not creating a program header, and that the actual order of
4801 the sections in the file is unimportant. */
9ad5cbcf 4802 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4803 {
4804 Elf_Internal_Shdr *hdr;
4805
4806 hdr = *hdrpp;
e0638f70
AM
4807 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4808 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4809 || i == tdata->symtab_section
4810 || i == tdata->symtab_shndx_section
252b5132
RH
4811 || i == tdata->strtab_section)
4812 {
4813 hdr->sh_offset = -1;
252b5132 4814 }
9ad5cbcf 4815 else
b34976b6 4816 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
4817 }
4818 }
4819 else
4820 {
f3520d2f
AM
4821 unsigned int alloc;
4822
252b5132 4823 /* Assign file positions for the loaded sections based on the
08a40648 4824 assignment of sections to segments. */
f3520d2f
AM
4825 if (!assign_file_positions_for_load_sections (abfd, link_info))
4826 return FALSE;
4827
4828 /* And for non-load sections. */
4829 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4830 return FALSE;
4831
e36284ab
AM
4832 if (bed->elf_backend_modify_program_headers != NULL)
4833 {
4834 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4835 return FALSE;
4836 }
4837
f3520d2f
AM
4838 /* Write out the program headers. */
4839 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4840 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4841 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4842 return FALSE;
252b5132 4843
5c182d5f 4844 off = tdata->next_file_pos;
252b5132
RH
4845 }
4846
4847 /* Place the section headers. */
45d6a902 4848 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4849 i_ehdrp->e_shoff = off;
4850 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4851
5c182d5f 4852 tdata->next_file_pos = off;
252b5132 4853
b34976b6 4854 return TRUE;
252b5132
RH
4855}
4856
b34976b6 4857static bfd_boolean
217aa764 4858prep_headers (bfd *abfd)
252b5132
RH
4859{
4860 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4861 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
2b0f7ef9 4862 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4863 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4864
4865 i_ehdrp = elf_elfheader (abfd);
252b5132 4866
2b0f7ef9 4867 shstrtab = _bfd_elf_strtab_init ();
252b5132 4868 if (shstrtab == NULL)
b34976b6 4869 return FALSE;
252b5132
RH
4870
4871 elf_shstrtab (abfd) = shstrtab;
4872
4873 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4874 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4875 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4876 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4877
4878 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4879 i_ehdrp->e_ident[EI_DATA] =
4880 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4881 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4882
252b5132
RH
4883 if ((abfd->flags & DYNAMIC) != 0)
4884 i_ehdrp->e_type = ET_DYN;
4885 else if ((abfd->flags & EXEC_P) != 0)
4886 i_ehdrp->e_type = ET_EXEC;
4887 else if (bfd_get_format (abfd) == bfd_core)
4888 i_ehdrp->e_type = ET_CORE;
4889 else
4890 i_ehdrp->e_type = ET_REL;
4891
4892 switch (bfd_get_arch (abfd))
4893 {
4894 case bfd_arch_unknown:
4895 i_ehdrp->e_machine = EM_NONE;
4896 break;
aa4f99bb
AO
4897
4898 /* There used to be a long list of cases here, each one setting
4899 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4900 in the corresponding bfd definition. To avoid duplication,
4901 the switch was removed. Machines that need special handling
4902 can generally do it in elf_backend_final_write_processing(),
4903 unless they need the information earlier than the final write.
4904 Such need can generally be supplied by replacing the tests for
4905 e_machine with the conditions used to determine it. */
252b5132 4906 default:
9c5bfbb7
AM
4907 i_ehdrp->e_machine = bed->elf_machine_code;
4908 }
aa4f99bb 4909
252b5132
RH
4910 i_ehdrp->e_version = bed->s->ev_current;
4911 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4912
c044fabd 4913 /* No program header, for now. */
252b5132
RH
4914 i_ehdrp->e_phoff = 0;
4915 i_ehdrp->e_phentsize = 0;
4916 i_ehdrp->e_phnum = 0;
4917
c044fabd 4918 /* Each bfd section is section header entry. */
252b5132
RH
4919 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4920 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4921
c044fabd 4922 /* If we're building an executable, we'll need a program header table. */
252b5132 4923 if (abfd->flags & EXEC_P)
0e71e495
BE
4924 /* It all happens later. */
4925 ;
252b5132
RH
4926 else
4927 {
4928 i_ehdrp->e_phentsize = 0;
4929 i_phdrp = 0;
4930 i_ehdrp->e_phoff = 0;
4931 }
4932
4933 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4934 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4935 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4936 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4937 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4938 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4939 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4940 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4941 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4942 return FALSE;
252b5132 4943
b34976b6 4944 return TRUE;
252b5132
RH
4945}
4946
4947/* Assign file positions for all the reloc sections which are not part
4948 of the loadable file image. */
4949
4950void
217aa764 4951_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4952{
4953 file_ptr off;
9ad5cbcf 4954 unsigned int i, num_sec;
252b5132
RH
4955 Elf_Internal_Shdr **shdrpp;
4956
4957 off = elf_tdata (abfd)->next_file_pos;
4958
9ad5cbcf
AM
4959 num_sec = elf_numsections (abfd);
4960 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4961 {
4962 Elf_Internal_Shdr *shdrp;
4963
4964 shdrp = *shdrpp;
4965 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4966 && shdrp->sh_offset == -1)
b34976b6 4967 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4968 }
4969
4970 elf_tdata (abfd)->next_file_pos = off;
4971}
4972
b34976b6 4973bfd_boolean
217aa764 4974_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4975{
9c5bfbb7 4976 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4977 Elf_Internal_Ehdr *i_ehdrp;
4978 Elf_Internal_Shdr **i_shdrp;
b34976b6 4979 bfd_boolean failed;
9ad5cbcf 4980 unsigned int count, num_sec;
252b5132
RH
4981
4982 if (! abfd->output_has_begun
217aa764 4983 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4984 return FALSE;
252b5132
RH
4985
4986 i_shdrp = elf_elfsections (abfd);
4987 i_ehdrp = elf_elfheader (abfd);
4988
b34976b6 4989 failed = FALSE;
252b5132
RH
4990 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4991 if (failed)
b34976b6 4992 return FALSE;
252b5132
RH
4993
4994 _bfd_elf_assign_file_positions_for_relocs (abfd);
4995
c044fabd 4996 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4997 num_sec = elf_numsections (abfd);
4998 for (count = 1; count < num_sec; count++)
252b5132
RH
4999 {
5000 if (bed->elf_backend_section_processing)
5001 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5002 if (i_shdrp[count]->contents)
5003 {
dc810e39
AM
5004 bfd_size_type amt = i_shdrp[count]->sh_size;
5005
252b5132 5006 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5007 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5008 return FALSE;
252b5132
RH
5009 }
5010 }
5011
5012 /* Write out the section header names. */
26ae6d5e
DJ
5013 if (elf_shstrtab (abfd) != NULL
5014 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5015 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5016 return FALSE;
252b5132
RH
5017
5018 if (bed->elf_backend_final_write_processing)
5019 (*bed->elf_backend_final_write_processing) (abfd,
5020 elf_tdata (abfd)->linker);
5021
ff59fc36
RM
5022 if (!bed->s->write_shdrs_and_ehdr (abfd))
5023 return FALSE;
5024
5025 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
5026 if (elf_tdata (abfd)->after_write_object_contents)
5027 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
5028
5029 return TRUE;
252b5132
RH
5030}
5031
b34976b6 5032bfd_boolean
217aa764 5033_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5034{
c044fabd 5035 /* Hopefully this can be done just like an object file. */
252b5132
RH
5036 return _bfd_elf_write_object_contents (abfd);
5037}
c044fabd
KH
5038
5039/* Given a section, search the header to find them. */
5040
cb33740c 5041unsigned int
198beae2 5042_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5043{
9c5bfbb7 5044 const struct elf_backend_data *bed;
91d6fa6a 5045 unsigned int sec_index;
252b5132 5046
9ad5cbcf
AM
5047 if (elf_section_data (asect) != NULL
5048 && elf_section_data (asect)->this_idx != 0)
5049 return elf_section_data (asect)->this_idx;
5050
5051 if (bfd_is_abs_section (asect))
91d6fa6a 5052 sec_index = SHN_ABS;
af746e92 5053 else if (bfd_is_com_section (asect))
91d6fa6a 5054 sec_index = SHN_COMMON;
af746e92 5055 else if (bfd_is_und_section (asect))
91d6fa6a 5056 sec_index = SHN_UNDEF;
af746e92 5057 else
91d6fa6a 5058 sec_index = SHN_BAD;
252b5132 5059
af746e92 5060 bed = get_elf_backend_data (abfd);
252b5132
RH
5061 if (bed->elf_backend_section_from_bfd_section)
5062 {
91d6fa6a 5063 int retval = sec_index;
9ad5cbcf 5064
af746e92
AM
5065 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5066 return retval;
252b5132
RH
5067 }
5068
91d6fa6a 5069 if (sec_index == SHN_BAD)
af746e92 5070 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5071
91d6fa6a 5072 return sec_index;
252b5132
RH
5073}
5074
5075/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5076 on error. */
5077
5078int
217aa764 5079_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5080{
5081 asymbol *asym_ptr = *asym_ptr_ptr;
5082 int idx;
5083 flagword flags = asym_ptr->flags;
5084
5085 /* When gas creates relocations against local labels, it creates its
5086 own symbol for the section, but does put the symbol into the
5087 symbol chain, so udata is 0. When the linker is generating
5088 relocatable output, this section symbol may be for one of the
5089 input sections rather than the output section. */
5090 if (asym_ptr->udata.i == 0
5091 && (flags & BSF_SECTION_SYM)
5092 && asym_ptr->section)
5093 {
5372391b 5094 asection *sec;
252b5132
RH
5095 int indx;
5096
5372391b
AM
5097 sec = asym_ptr->section;
5098 if (sec->owner != abfd && sec->output_section != NULL)
5099 sec = sec->output_section;
5100 if (sec->owner == abfd
5101 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5102 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5103 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5104 }
5105
5106 idx = asym_ptr->udata.i;
5107
5108 if (idx == 0)
5109 {
5110 /* This case can occur when using --strip-symbol on a symbol
08a40648 5111 which is used in a relocation entry. */
252b5132 5112 (*_bfd_error_handler)
d003868e
AM
5113 (_("%B: symbol `%s' required but not present"),
5114 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5115 bfd_set_error (bfd_error_no_symbols);
5116 return -1;
5117 }
5118
5119#if DEBUG & 4
5120 {
5121 fprintf (stderr,
661a3fd4 5122 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5123 (long) asym_ptr, asym_ptr->name, idx, flags,
5124 elf_symbol_flags (flags));
5125 fflush (stderr);
5126 }
5127#endif
5128
5129 return idx;
5130}
5131
84d1d650 5132/* Rewrite program header information. */
252b5132 5133
b34976b6 5134static bfd_boolean
84d1d650 5135rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5136{
b34976b6
AM
5137 Elf_Internal_Ehdr *iehdr;
5138 struct elf_segment_map *map;
5139 struct elf_segment_map *map_first;
5140 struct elf_segment_map **pointer_to_map;
5141 Elf_Internal_Phdr *segment;
5142 asection *section;
5143 unsigned int i;
5144 unsigned int num_segments;
5145 bfd_boolean phdr_included = FALSE;
5c44b38e 5146 bfd_boolean p_paddr_valid;
b34976b6
AM
5147 bfd_vma maxpagesize;
5148 struct elf_segment_map *phdr_adjust_seg = NULL;
5149 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5150 const struct elf_backend_data *bed;
bc67d8a6 5151
caf47ea6 5152 bed = get_elf_backend_data (ibfd);
252b5132
RH
5153 iehdr = elf_elfheader (ibfd);
5154
bc67d8a6 5155 map_first = NULL;
c044fabd 5156 pointer_to_map = &map_first;
252b5132
RH
5157
5158 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5159 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5160
5161 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5162#define SEGMENT_END(segment, start) \
5163 (start + (segment->p_memsz > segment->p_filesz \
5164 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5165
eecdbe52
JJ
5166#define SECTION_SIZE(section, segment) \
5167 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5168 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5169 ? section->size : 0)
eecdbe52 5170
b34976b6 5171 /* Returns TRUE if the given section is contained within
bc67d8a6 5172 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5173#define IS_CONTAINED_BY_VMA(section, segment) \
5174 (section->vma >= segment->p_vaddr \
eecdbe52 5175 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5176 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5177
b34976b6 5178 /* Returns TRUE if the given section is contained within
bc67d8a6 5179 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5180#define IS_CONTAINED_BY_LMA(section, segment, base) \
5181 (section->lma >= base \
eecdbe52 5182 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5183 <= SEGMENT_END (segment, base)))
252b5132 5184
0efc80c8
L
5185 /* Handle PT_NOTE segment. */
5186#define IS_NOTE(p, s) \
aecc8f8a 5187 (p->p_type == PT_NOTE \
0efc80c8 5188 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5189 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5190 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5191 <= p->p_offset + p->p_filesz))
252b5132 5192
0efc80c8
L
5193 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5194 etc. */
5195#define IS_COREFILE_NOTE(p, s) \
5196 (IS_NOTE (p, s) \
5197 && bfd_get_format (ibfd) == bfd_core \
5198 && s->vma == 0 \
5199 && s->lma == 0)
5200
252b5132
RH
5201 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5202 linker, which generates a PT_INTERP section with p_vaddr and
5203 p_memsz set to 0. */
aecc8f8a
AM
5204#define IS_SOLARIS_PT_INTERP(p, s) \
5205 (p->p_vaddr == 0 \
5206 && p->p_paddr == 0 \
5207 && p->p_memsz == 0 \
5208 && p->p_filesz > 0 \
5209 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5210 && s->size > 0 \
aecc8f8a 5211 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5212 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5213 <= p->p_offset + p->p_filesz))
5c440b1e 5214
bc67d8a6
NC
5215 /* Decide if the given section should be included in the given segment.
5216 A section will be included if:
f5ffc919 5217 1. It is within the address space of the segment -- we use the LMA
08a40648 5218 if that is set for the segment and the VMA otherwise,
0efc80c8
L
5219 2. It is an allocated section or a NOTE section in a PT_NOTE
5220 segment.
bc67d8a6 5221 3. There is an output section associated with it,
eecdbe52 5222 4. The section has not already been allocated to a previous segment.
2b05f1b7 5223 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5224 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5225 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5226 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5227 (with the possible exception of .dynamic). */
9f17e2a6 5228#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5229 ((((segment->p_paddr \
5230 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5231 : IS_CONTAINED_BY_VMA (section, segment)) \
5232 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5233 || IS_NOTE (segment, section)) \
2b05f1b7
L
5234 && segment->p_type != PT_GNU_STACK \
5235 && (segment->p_type != PT_TLS \
5236 || (section->flags & SEC_THREAD_LOCAL)) \
5237 && (segment->p_type == PT_LOAD \
5238 || segment->p_type == PT_TLS \
5239 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5240 && (segment->p_type != PT_DYNAMIC \
5241 || SECTION_SIZE (section, segment) > 0 \
5242 || (segment->p_paddr \
5243 ? segment->p_paddr != section->lma \
5244 : segment->p_vaddr != section->vma) \
5245 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5246 == 0)) \
0067a569 5247 && !section->segment_mark)
bc67d8a6 5248
9f17e2a6
L
5249/* If the output section of a section in the input segment is NULL,
5250 it is removed from the corresponding output segment. */
5251#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5252 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5253 && section->output_section != NULL)
5254
b34976b6 5255 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5256#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5257 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5258
5259 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5260 their VMA address ranges and their LMA address ranges overlap.
5261 It is possible to have overlapping VMA ranges without overlapping LMA
5262 ranges. RedBoot images for example can have both .data and .bss mapped
5263 to the same VMA range, but with the .data section mapped to a different
5264 LMA. */
aecc8f8a 5265#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5266 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5267 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5268 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5269 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5270
5271 /* Initialise the segment mark field. */
5272 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5273 section->segment_mark = FALSE;
bc67d8a6 5274
5c44b38e
AM
5275 /* The Solaris linker creates program headers in which all the
5276 p_paddr fields are zero. When we try to objcopy or strip such a
5277 file, we get confused. Check for this case, and if we find it
5278 don't set the p_paddr_valid fields. */
5279 p_paddr_valid = FALSE;
5280 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5281 i < num_segments;
5282 i++, segment++)
5283 if (segment->p_paddr != 0)
5284 {
5285 p_paddr_valid = TRUE;
5286 break;
5287 }
5288
252b5132 5289 /* Scan through the segments specified in the program header
bc67d8a6 5290 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5291 in the loadable segments. These can be created by weird
aecc8f8a 5292 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5293 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5294 i < num_segments;
c044fabd 5295 i++, segment++)
252b5132 5296 {
252b5132 5297 unsigned int j;
c044fabd 5298 Elf_Internal_Phdr *segment2;
252b5132 5299
aecc8f8a
AM
5300 if (segment->p_type == PT_INTERP)
5301 for (section = ibfd->sections; section; section = section->next)
5302 if (IS_SOLARIS_PT_INTERP (segment, section))
5303 {
5304 /* Mininal change so that the normal section to segment
4cc11e76 5305 assignment code will work. */
aecc8f8a
AM
5306 segment->p_vaddr = section->vma;
5307 break;
5308 }
5309
bc67d8a6 5310 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5311 {
5312 /* Remove PT_GNU_RELRO segment. */
5313 if (segment->p_type == PT_GNU_RELRO)
5314 segment->p_type = PT_NULL;
5315 continue;
5316 }
c044fabd 5317
bc67d8a6 5318 /* Determine if this segment overlaps any previous segments. */
0067a569 5319 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5320 {
5321 bfd_signed_vma extra_length;
c044fabd 5322
bc67d8a6 5323 if (segment2->p_type != PT_LOAD
0067a569 5324 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5325 continue;
c044fabd 5326
bc67d8a6
NC
5327 /* Merge the two segments together. */
5328 if (segment2->p_vaddr < segment->p_vaddr)
5329 {
c044fabd 5330 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5331 SEGMENT. */
0067a569
AM
5332 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5333 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5334
bc67d8a6
NC
5335 if (extra_length > 0)
5336 {
0067a569 5337 segment2->p_memsz += extra_length;
bc67d8a6
NC
5338 segment2->p_filesz += extra_length;
5339 }
c044fabd 5340
bc67d8a6 5341 segment->p_type = PT_NULL;
c044fabd 5342
bc67d8a6
NC
5343 /* Since we have deleted P we must restart the outer loop. */
5344 i = 0;
5345 segment = elf_tdata (ibfd)->phdr;
5346 break;
5347 }
5348 else
5349 {
c044fabd 5350 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5351 SEGMENT2. */
0067a569
AM
5352 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5353 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5354
bc67d8a6
NC
5355 if (extra_length > 0)
5356 {
0067a569 5357 segment->p_memsz += extra_length;
bc67d8a6
NC
5358 segment->p_filesz += extra_length;
5359 }
c044fabd 5360
bc67d8a6
NC
5361 segment2->p_type = PT_NULL;
5362 }
5363 }
5364 }
c044fabd 5365
bc67d8a6
NC
5366 /* The second scan attempts to assign sections to segments. */
5367 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5368 i < num_segments;
0067a569 5369 i++, segment++)
bc67d8a6 5370 {
0067a569
AM
5371 unsigned int section_count;
5372 asection **sections;
5373 asection *output_section;
5374 unsigned int isec;
5375 bfd_vma matching_lma;
5376 bfd_vma suggested_lma;
5377 unsigned int j;
dc810e39 5378 bfd_size_type amt;
0067a569
AM
5379 asection *first_section;
5380 bfd_boolean first_matching_lma;
5381 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5382
5383 if (segment->p_type == PT_NULL)
5384 continue;
c044fabd 5385
9f17e2a6 5386 first_section = NULL;
bc67d8a6 5387 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5388 for (section = ibfd->sections, section_count = 0;
5389 section != NULL;
5390 section = section->next)
9f17e2a6
L
5391 {
5392 /* Find the first section in the input segment, which may be
5393 removed from the corresponding output segment. */
5394 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5395 {
5396 if (first_section == NULL)
5397 first_section = section;
5398 if (section->output_section != NULL)
5399 ++section_count;
5400 }
5401 }
811072d8 5402
b5f852ea
NC
5403 /* Allocate a segment map big enough to contain
5404 all of the sections we have selected. */
dc810e39
AM
5405 amt = sizeof (struct elf_segment_map);
5406 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5407 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5408 if (map == NULL)
b34976b6 5409 return FALSE;
252b5132
RH
5410
5411 /* Initialise the fields of the segment map. Default to
5412 using the physical address of the segment in the input BFD. */
0067a569
AM
5413 map->next = NULL;
5414 map->p_type = segment->p_type;
5415 map->p_flags = segment->p_flags;
bc67d8a6 5416 map->p_flags_valid = 1;
55d55ac7 5417
9f17e2a6
L
5418 /* If the first section in the input segment is removed, there is
5419 no need to preserve segment physical address in the corresponding
5420 output segment. */
945c025a 5421 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5422 {
5423 map->p_paddr = segment->p_paddr;
5c44b38e 5424 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5425 }
252b5132
RH
5426
5427 /* Determine if this segment contains the ELF file header
5428 and if it contains the program headers themselves. */
bc67d8a6
NC
5429 map->includes_filehdr = (segment->p_offset == 0
5430 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5431 map->includes_phdrs = 0;
252b5132 5432
0067a569 5433 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5434 {
bc67d8a6
NC
5435 map->includes_phdrs =
5436 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5437 && (segment->p_offset + segment->p_filesz
252b5132
RH
5438 >= ((bfd_vma) iehdr->e_phoff
5439 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5440
bc67d8a6 5441 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5442 phdr_included = TRUE;
252b5132
RH
5443 }
5444
bc67d8a6 5445 if (section_count == 0)
252b5132
RH
5446 {
5447 /* Special segments, such as the PT_PHDR segment, may contain
5448 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5449 something. They are allowed by the ELF spec however, so only
5450 a warning is produced. */
bc67d8a6 5451 if (segment->p_type == PT_LOAD)
0067a569
AM
5452 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5453 " detected, is this intentional ?\n"),
5454 ibfd);
252b5132 5455
bc67d8a6 5456 map->count = 0;
c044fabd
KH
5457 *pointer_to_map = map;
5458 pointer_to_map = &map->next;
252b5132
RH
5459
5460 continue;
5461 }
5462
5463 /* Now scan the sections in the input BFD again and attempt
5464 to add their corresponding output sections to the segment map.
5465 The problem here is how to handle an output section which has
5466 been moved (ie had its LMA changed). There are four possibilities:
5467
5468 1. None of the sections have been moved.
5469 In this case we can continue to use the segment LMA from the
5470 input BFD.
5471
5472 2. All of the sections have been moved by the same amount.
5473 In this case we can change the segment's LMA to match the LMA
5474 of the first section.
5475
5476 3. Some of the sections have been moved, others have not.
5477 In this case those sections which have not been moved can be
5478 placed in the current segment which will have to have its size,
5479 and possibly its LMA changed, and a new segment or segments will
5480 have to be created to contain the other sections.
5481
b5f852ea 5482 4. The sections have been moved, but not by the same amount.
252b5132
RH
5483 In this case we can change the segment's LMA to match the LMA
5484 of the first section and we will have to create a new segment
5485 or segments to contain the other sections.
5486
5487 In order to save time, we allocate an array to hold the section
5488 pointers that we are interested in. As these sections get assigned
5489 to a segment, they are removed from this array. */
5490
a50b1753 5491 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5492 if (sections == NULL)
b34976b6 5493 return FALSE;
252b5132
RH
5494
5495 /* Step One: Scan for segment vs section LMA conflicts.
5496 Also add the sections to the section array allocated above.
5497 Also add the sections to the current segment. In the common
5498 case, where the sections have not been moved, this means that
5499 we have completely filled the segment, and there is nothing
5500 more to do. */
252b5132 5501 isec = 0;
72730e0c 5502 matching_lma = 0;
252b5132 5503 suggested_lma = 0;
0067a569
AM
5504 first_matching_lma = TRUE;
5505 first_suggested_lma = TRUE;
252b5132 5506
147d51c2 5507 for (section = ibfd->sections;
bc67d8a6
NC
5508 section != NULL;
5509 section = section->next)
147d51c2
L
5510 if (section == first_section)
5511 break;
5512
5513 for (j = 0; section != NULL; section = section->next)
252b5132 5514 {
caf47ea6 5515 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5516 {
bc67d8a6
NC
5517 output_section = section->output_section;
5518
0067a569 5519 sections[j++] = section;
252b5132
RH
5520
5521 /* The Solaris native linker always sets p_paddr to 0.
5522 We try to catch that case here, and set it to the
5e8d7549
NC
5523 correct value. Note - some backends require that
5524 p_paddr be left as zero. */
5c44b38e 5525 if (!p_paddr_valid
4455705d 5526 && segment->p_vaddr != 0
0067a569 5527 && !bed->want_p_paddr_set_to_zero
252b5132 5528 && isec == 0
bc67d8a6 5529 && output_section->lma != 0
0067a569
AM
5530 && output_section->vma == (segment->p_vaddr
5531 + (map->includes_filehdr
5532 ? iehdr->e_ehsize
5533 : 0)
5534 + (map->includes_phdrs
5535 ? (iehdr->e_phnum
5536 * iehdr->e_phentsize)
5537 : 0)))
bc67d8a6 5538 map->p_paddr = segment->p_vaddr;
252b5132
RH
5539
5540 /* Match up the physical address of the segment with the
5541 LMA address of the output section. */
bc67d8a6 5542 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5543 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5544 || (bed->want_p_paddr_set_to_zero
5545 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5546 {
0067a569
AM
5547 if (first_matching_lma || output_section->lma < matching_lma)
5548 {
5549 matching_lma = output_section->lma;
5550 first_matching_lma = FALSE;
5551 }
252b5132
RH
5552
5553 /* We assume that if the section fits within the segment
bc67d8a6 5554 then it does not overlap any other section within that
252b5132 5555 segment. */
0067a569
AM
5556 map->sections[isec++] = output_section;
5557 }
5558 else if (first_suggested_lma)
5559 {
5560 suggested_lma = output_section->lma;
5561 first_suggested_lma = FALSE;
252b5132 5562 }
147d51c2
L
5563
5564 if (j == section_count)
5565 break;
252b5132
RH
5566 }
5567 }
5568
bc67d8a6 5569 BFD_ASSERT (j == section_count);
252b5132
RH
5570
5571 /* Step Two: Adjust the physical address of the current segment,
5572 if necessary. */
bc67d8a6 5573 if (isec == section_count)
252b5132
RH
5574 {
5575 /* All of the sections fitted within the segment as currently
5576 specified. This is the default case. Add the segment to
5577 the list of built segments and carry on to process the next
5578 program header in the input BFD. */
bc67d8a6 5579 map->count = section_count;
c044fabd
KH
5580 *pointer_to_map = map;
5581 pointer_to_map = &map->next;
08a40648 5582
5c44b38e
AM
5583 if (p_paddr_valid
5584 && !bed->want_p_paddr_set_to_zero
147d51c2 5585 && matching_lma != map->p_paddr
5c44b38e
AM
5586 && !map->includes_filehdr
5587 && !map->includes_phdrs)
3271a814
NS
5588 /* There is some padding before the first section in the
5589 segment. So, we must account for that in the output
5590 segment's vma. */
5591 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5592
252b5132
RH
5593 free (sections);
5594 continue;
5595 }
252b5132
RH
5596 else
5597 {
0067a569 5598 if (!first_matching_lma)
72730e0c
AM
5599 {
5600 /* At least one section fits inside the current segment.
5601 Keep it, but modify its physical address to match the
5602 LMA of the first section that fitted. */
bc67d8a6 5603 map->p_paddr = matching_lma;
72730e0c
AM
5604 }
5605 else
5606 {
5607 /* None of the sections fitted inside the current segment.
5608 Change the current segment's physical address to match
5609 the LMA of the first section. */
bc67d8a6 5610 map->p_paddr = suggested_lma;
72730e0c
AM
5611 }
5612
bc67d8a6
NC
5613 /* Offset the segment physical address from the lma
5614 to allow for space taken up by elf headers. */
5615 if (map->includes_filehdr)
010c8431
AM
5616 {
5617 if (map->p_paddr >= iehdr->e_ehsize)
5618 map->p_paddr -= iehdr->e_ehsize;
5619 else
5620 {
5621 map->includes_filehdr = FALSE;
5622 map->includes_phdrs = FALSE;
5623 }
5624 }
252b5132 5625
bc67d8a6
NC
5626 if (map->includes_phdrs)
5627 {
010c8431
AM
5628 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5629 {
5630 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5631
5632 /* iehdr->e_phnum is just an estimate of the number
5633 of program headers that we will need. Make a note
5634 here of the number we used and the segment we chose
5635 to hold these headers, so that we can adjust the
5636 offset when we know the correct value. */
5637 phdr_adjust_num = iehdr->e_phnum;
5638 phdr_adjust_seg = map;
5639 }
5640 else
5641 map->includes_phdrs = FALSE;
bc67d8a6 5642 }
252b5132
RH
5643 }
5644
5645 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5646 those that fit to the current segment and removing them from the
252b5132
RH
5647 sections array; but making sure not to leave large gaps. Once all
5648 possible sections have been assigned to the current segment it is
5649 added to the list of built segments and if sections still remain
5650 to be assigned, a new segment is constructed before repeating
5651 the loop. */
5652 isec = 0;
5653 do
5654 {
bc67d8a6 5655 map->count = 0;
252b5132 5656 suggested_lma = 0;
0067a569 5657 first_suggested_lma = TRUE;
252b5132
RH
5658
5659 /* Fill the current segment with sections that fit. */
bc67d8a6 5660 for (j = 0; j < section_count; j++)
252b5132 5661 {
bc67d8a6 5662 section = sections[j];
252b5132 5663
bc67d8a6 5664 if (section == NULL)
252b5132
RH
5665 continue;
5666
bc67d8a6 5667 output_section = section->output_section;
252b5132 5668
bc67d8a6 5669 BFD_ASSERT (output_section != NULL);
c044fabd 5670
bc67d8a6
NC
5671 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5672 || IS_COREFILE_NOTE (segment, section))
252b5132 5673 {
bc67d8a6 5674 if (map->count == 0)
252b5132
RH
5675 {
5676 /* If the first section in a segment does not start at
bc67d8a6
NC
5677 the beginning of the segment, then something is
5678 wrong. */
0067a569
AM
5679 if (output_section->lma
5680 != (map->p_paddr
5681 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5682 + (map->includes_phdrs
5683 ? iehdr->e_phnum * iehdr->e_phentsize
5684 : 0)))
252b5132
RH
5685 abort ();
5686 }
5687 else
5688 {
0067a569 5689 asection *prev_sec;
252b5132 5690
bc67d8a6 5691 prev_sec = map->sections[map->count - 1];
252b5132
RH
5692
5693 /* If the gap between the end of the previous section
bc67d8a6
NC
5694 and the start of this section is more than
5695 maxpagesize then we need to start a new segment. */
eea6121a 5696 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5697 maxpagesize)
caf47ea6 5698 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 5699 || (prev_sec->lma + prev_sec->size
079e9a2f 5700 > output_section->lma))
252b5132 5701 {
0067a569
AM
5702 if (first_suggested_lma)
5703 {
5704 suggested_lma = output_section->lma;
5705 first_suggested_lma = FALSE;
5706 }
252b5132
RH
5707
5708 continue;
5709 }
5710 }
5711
bc67d8a6 5712 map->sections[map->count++] = output_section;
252b5132
RH
5713 ++isec;
5714 sections[j] = NULL;
b34976b6 5715 section->segment_mark = TRUE;
252b5132 5716 }
0067a569
AM
5717 else if (first_suggested_lma)
5718 {
5719 suggested_lma = output_section->lma;
5720 first_suggested_lma = FALSE;
5721 }
252b5132
RH
5722 }
5723
bc67d8a6 5724 BFD_ASSERT (map->count > 0);
252b5132
RH
5725
5726 /* Add the current segment to the list of built segments. */
c044fabd
KH
5727 *pointer_to_map = map;
5728 pointer_to_map = &map->next;
252b5132 5729
bc67d8a6 5730 if (isec < section_count)
252b5132
RH
5731 {
5732 /* We still have not allocated all of the sections to
5733 segments. Create a new segment here, initialise it
5734 and carry on looping. */
dc810e39
AM
5735 amt = sizeof (struct elf_segment_map);
5736 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5737 map = (struct elf_segment_map *) bfd_alloc (obfd, amt);
bc67d8a6 5738 if (map == NULL)
5ed6aba4
NC
5739 {
5740 free (sections);
5741 return FALSE;
5742 }
252b5132
RH
5743
5744 /* Initialise the fields of the segment map. Set the physical
5745 physical address to the LMA of the first section that has
5746 not yet been assigned. */
0067a569
AM
5747 map->next = NULL;
5748 map->p_type = segment->p_type;
5749 map->p_flags = segment->p_flags;
5750 map->p_flags_valid = 1;
5751 map->p_paddr = suggested_lma;
5c44b38e 5752 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 5753 map->includes_filehdr = 0;
0067a569 5754 map->includes_phdrs = 0;
252b5132
RH
5755 }
5756 }
bc67d8a6 5757 while (isec < section_count);
252b5132
RH
5758
5759 free (sections);
5760 }
5761
bc67d8a6
NC
5762 elf_tdata (obfd)->segment_map = map_first;
5763
5764 /* If we had to estimate the number of program headers that were
9ad5cbcf 5765 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5766 the offset if necessary. */
5767 if (phdr_adjust_seg != NULL)
5768 {
5769 unsigned int count;
c044fabd 5770
bc67d8a6 5771 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5772 count++;
252b5132 5773
bc67d8a6
NC
5774 if (count > phdr_adjust_num)
5775 phdr_adjust_seg->p_paddr
5776 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5777 }
c044fabd 5778
bc67d8a6 5779#undef SEGMENT_END
eecdbe52 5780#undef SECTION_SIZE
bc67d8a6
NC
5781#undef IS_CONTAINED_BY_VMA
5782#undef IS_CONTAINED_BY_LMA
0efc80c8 5783#undef IS_NOTE
252b5132 5784#undef IS_COREFILE_NOTE
bc67d8a6 5785#undef IS_SOLARIS_PT_INTERP
9f17e2a6 5786#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
5787#undef INCLUDE_SECTION_IN_SEGMENT
5788#undef SEGMENT_AFTER_SEGMENT
5789#undef SEGMENT_OVERLAPS
b34976b6 5790 return TRUE;
252b5132
RH
5791}
5792
84d1d650
L
5793/* Copy ELF program header information. */
5794
5795static bfd_boolean
5796copy_elf_program_header (bfd *ibfd, bfd *obfd)
5797{
5798 Elf_Internal_Ehdr *iehdr;
5799 struct elf_segment_map *map;
5800 struct elf_segment_map *map_first;
5801 struct elf_segment_map **pointer_to_map;
5802 Elf_Internal_Phdr *segment;
5803 unsigned int i;
5804 unsigned int num_segments;
5805 bfd_boolean phdr_included = FALSE;
88967714 5806 bfd_boolean p_paddr_valid;
84d1d650
L
5807
5808 iehdr = elf_elfheader (ibfd);
5809
5810 map_first = NULL;
5811 pointer_to_map = &map_first;
5812
88967714
AM
5813 /* If all the segment p_paddr fields are zero, don't set
5814 map->p_paddr_valid. */
5815 p_paddr_valid = FALSE;
84d1d650 5816 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
5817 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5818 i < num_segments;
5819 i++, segment++)
5820 if (segment->p_paddr != 0)
5821 {
5822 p_paddr_valid = TRUE;
5823 break;
5824 }
5825
84d1d650
L
5826 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5827 i < num_segments;
5828 i++, segment++)
5829 {
5830 asection *section;
5831 unsigned int section_count;
5832 bfd_size_type amt;
5833 Elf_Internal_Shdr *this_hdr;
53020534 5834 asection *first_section = NULL;
c981028a 5835 asection *lowest_section = NULL;
84d1d650 5836
84d1d650
L
5837 /* Compute how many sections are in this segment. */
5838 for (section = ibfd->sections, section_count = 0;
5839 section != NULL;
5840 section = section->next)
5841 {
5842 this_hdr = &(elf_section_data(section)->this_hdr);
5843 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
3271a814 5844 {
53020534 5845 if (!first_section)
c981028a
DJ
5846 first_section = lowest_section = section;
5847 if (section->lma < lowest_section->lma)
5848 lowest_section = section;
3271a814
NS
5849 section_count++;
5850 }
84d1d650
L
5851 }
5852
5853 /* Allocate a segment map big enough to contain
5854 all of the sections we have selected. */
5855 amt = sizeof (struct elf_segment_map);
5856 if (section_count != 0)
5857 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5858 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
5859 if (map == NULL)
5860 return FALSE;
5861
5862 /* Initialize the fields of the output segment map with the
5863 input segment. */
5864 map->next = NULL;
5865 map->p_type = segment->p_type;
5866 map->p_flags = segment->p_flags;
5867 map->p_flags_valid = 1;
5868 map->p_paddr = segment->p_paddr;
88967714 5869 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
5870 map->p_align = segment->p_align;
5871 map->p_align_valid = 1;
3271a814 5872 map->p_vaddr_offset = 0;
84d1d650 5873
9433b9b1 5874 if (map->p_type == PT_GNU_RELRO)
b10a8ae0
L
5875 {
5876 /* The PT_GNU_RELRO segment may contain the first a few
5877 bytes in the .got.plt section even if the whole .got.plt
5878 section isn't in the PT_GNU_RELRO segment. We won't
5879 change the size of the PT_GNU_RELRO segment. */
9433b9b1 5880 map->p_size = segment->p_memsz;
b10a8ae0
L
5881 map->p_size_valid = 1;
5882 }
5883
84d1d650
L
5884 /* Determine if this segment contains the ELF file header
5885 and if it contains the program headers themselves. */
5886 map->includes_filehdr = (segment->p_offset == 0
5887 && segment->p_filesz >= iehdr->e_ehsize);
5888
5889 map->includes_phdrs = 0;
5890 if (! phdr_included || segment->p_type != PT_LOAD)
5891 {
5892 map->includes_phdrs =
5893 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5894 && (segment->p_offset + segment->p_filesz
5895 >= ((bfd_vma) iehdr->e_phoff
5896 + iehdr->e_phnum * iehdr->e_phentsize)));
5897
5898 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5899 phdr_included = TRUE;
5900 }
5901
2b0bc088
NC
5902 if (map->includes_filehdr && first_section)
5903 /* We need to keep the space used by the headers fixed. */
5904 map->header_size = first_section->vma - segment->p_vaddr;
5905
88967714
AM
5906 if (!map->includes_phdrs
5907 && !map->includes_filehdr
5908 && map->p_paddr_valid)
3271a814 5909 /* There is some other padding before the first section. */
c981028a 5910 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
53020534 5911 - segment->p_paddr);
08a40648 5912
84d1d650
L
5913 if (section_count != 0)
5914 {
5915 unsigned int isec = 0;
5916
53020534 5917 for (section = first_section;
84d1d650
L
5918 section != NULL;
5919 section = section->next)
5920 {
5921 this_hdr = &(elf_section_data(section)->this_hdr);
5922 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
53020534
L
5923 {
5924 map->sections[isec++] = section->output_section;
5925 if (isec == section_count)
5926 break;
5927 }
84d1d650
L
5928 }
5929 }
5930
5931 map->count = section_count;
5932 *pointer_to_map = map;
5933 pointer_to_map = &map->next;
5934 }
5935
5936 elf_tdata (obfd)->segment_map = map_first;
5937 return TRUE;
5938}
5939
5940/* Copy private BFD data. This copies or rewrites ELF program header
5941 information. */
5942
5943static bfd_boolean
5944copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5945{
84d1d650
L
5946 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5947 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5948 return TRUE;
5949
5950 if (elf_tdata (ibfd)->phdr == NULL)
5951 return TRUE;
5952
5953 if (ibfd->xvec == obfd->xvec)
5954 {
cb3ff1e5
NC
5955 /* Check to see if any sections in the input BFD
5956 covered by ELF program header have changed. */
d55ce4e2 5957 Elf_Internal_Phdr *segment;
84d1d650
L
5958 asection *section, *osec;
5959 unsigned int i, num_segments;
5960 Elf_Internal_Shdr *this_hdr;
147d51c2
L
5961 const struct elf_backend_data *bed;
5962
5963 bed = get_elf_backend_data (ibfd);
5964
5965 /* Regenerate the segment map if p_paddr is set to 0. */
5966 if (bed->want_p_paddr_set_to_zero)
5967 goto rewrite;
84d1d650
L
5968
5969 /* Initialize the segment mark field. */
5970 for (section = obfd->sections; section != NULL;
5971 section = section->next)
5972 section->segment_mark = FALSE;
5973
5974 num_segments = elf_elfheader (ibfd)->e_phnum;
5975 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5976 i < num_segments;
5977 i++, segment++)
5978 {
5f6999aa
NC
5979 /* PR binutils/3535. The Solaris linker always sets the p_paddr
5980 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
5981 which severly confuses things, so always regenerate the segment
5982 map in this case. */
5983 if (segment->p_paddr == 0
5984 && segment->p_memsz == 0
5985 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 5986 goto rewrite;
5f6999aa 5987
84d1d650
L
5988 for (section = ibfd->sections;
5989 section != NULL; section = section->next)
5990 {
5991 /* We mark the output section so that we know it comes
5992 from the input BFD. */
5993 osec = section->output_section;
5994 if (osec)
5995 osec->segment_mark = TRUE;
5996
5997 /* Check if this section is covered by the segment. */
5998 this_hdr = &(elf_section_data(section)->this_hdr);
5999 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
6000 {
6001 /* FIXME: Check if its output section is changed or
6002 removed. What else do we need to check? */
6003 if (osec == NULL
6004 || section->flags != osec->flags
6005 || section->lma != osec->lma
6006 || section->vma != osec->vma
6007 || section->size != osec->size
6008 || section->rawsize != osec->rawsize
6009 || section->alignment_power != osec->alignment_power)
6010 goto rewrite;
6011 }
6012 }
6013 }
6014
cb3ff1e5 6015 /* Check to see if any output section do not come from the
84d1d650
L
6016 input BFD. */
6017 for (section = obfd->sections; section != NULL;
6018 section = section->next)
6019 {
6020 if (section->segment_mark == FALSE)
6021 goto rewrite;
6022 else
6023 section->segment_mark = FALSE;
6024 }
6025
6026 return copy_elf_program_header (ibfd, obfd);
6027 }
6028
6029rewrite:
6030 return rewrite_elf_program_header (ibfd, obfd);
6031}
6032
ccd2ec6a
L
6033/* Initialize private output section information from input section. */
6034
6035bfd_boolean
6036_bfd_elf_init_private_section_data (bfd *ibfd,
6037 asection *isec,
6038 bfd *obfd,
6039 asection *osec,
6040 struct bfd_link_info *link_info)
6041
6042{
6043 Elf_Internal_Shdr *ihdr, *ohdr;
6044 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
6045
6046 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6047 || obfd->xvec->flavour != bfd_target_elf_flavour)
6048 return TRUE;
6049
e843e0f8 6050 /* Don't copy the output ELF section type from input if the
d3fd4074 6051 output BFD section flags have been set to something different.
e843e0f8
L
6052 elf_fake_sections will set ELF section type based on BFD
6053 section flags. */
42bb2e33
AM
6054 if (elf_section_type (osec) == SHT_NULL
6055 && (osec->flags == isec->flags || !osec->flags))
6056 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6057
6058 /* FIXME: Is this correct for all OS/PROC specific flags? */
6059 elf_section_flags (osec) |= (elf_section_flags (isec)
6060 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6061
6062 /* Set things up for objcopy and relocatable link. The output
6063 SHT_GROUP section will have its elf_next_in_group pointing back
6064 to the input group members. Ignore linker created group section.
6065 See elfNN_ia64_object_p in elfxx-ia64.c. */
ccd2ec6a
L
6066 if (need_group)
6067 {
6068 if (elf_sec_group (isec) == NULL
6069 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6070 {
6071 if (elf_section_flags (isec) & SHF_GROUP)
6072 elf_section_flags (osec) |= SHF_GROUP;
6073 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6074 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6075 }
6076 }
6077
6078 ihdr = &elf_section_data (isec)->this_hdr;
6079
6080 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6081 don't use the output section of the linked-to section since it
6082 may be NULL at this point. */
6083 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6084 {
6085 ohdr = &elf_section_data (osec)->this_hdr;
6086 ohdr->sh_flags |= SHF_LINK_ORDER;
6087 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6088 }
6089
6090 osec->use_rela_p = isec->use_rela_p;
6091
6092 return TRUE;
6093}
6094
252b5132
RH
6095/* Copy private section information. This copies over the entsize
6096 field, and sometimes the info field. */
6097
b34976b6 6098bfd_boolean
217aa764
AM
6099_bfd_elf_copy_private_section_data (bfd *ibfd,
6100 asection *isec,
6101 bfd *obfd,
6102 asection *osec)
252b5132
RH
6103{
6104 Elf_Internal_Shdr *ihdr, *ohdr;
6105
6106 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6107 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6108 return TRUE;
252b5132 6109
252b5132
RH
6110 ihdr = &elf_section_data (isec)->this_hdr;
6111 ohdr = &elf_section_data (osec)->this_hdr;
6112
6113 ohdr->sh_entsize = ihdr->sh_entsize;
6114
6115 if (ihdr->sh_type == SHT_SYMTAB
6116 || ihdr->sh_type == SHT_DYNSYM
6117 || ihdr->sh_type == SHT_GNU_verneed
6118 || ihdr->sh_type == SHT_GNU_verdef)
6119 ohdr->sh_info = ihdr->sh_info;
6120
ccd2ec6a
L
6121 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6122 NULL);
252b5132
RH
6123}
6124
80fccad2
BW
6125/* Copy private header information. */
6126
6127bfd_boolean
6128_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6129{
30288845
AM
6130 asection *isec;
6131
80fccad2
BW
6132 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6133 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6134 return TRUE;
6135
6136 /* Copy over private BFD data if it has not already been copied.
6137 This must be done here, rather than in the copy_private_bfd_data
6138 entry point, because the latter is called after the section
6139 contents have been set, which means that the program headers have
6140 already been worked out. */
6141 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6142 {
6143 if (! copy_private_bfd_data (ibfd, obfd))
6144 return FALSE;
6145 }
6146
30288845
AM
6147 /* _bfd_elf_copy_private_section_data copied over the SHF_GROUP flag
6148 but this might be wrong if we deleted the group section. */
6149 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
6150 if (elf_section_type (isec) == SHT_GROUP
6151 && isec->output_section == NULL)
6152 {
6153 asection *first = elf_next_in_group (isec);
6154 asection *s = first;
6155 while (s != NULL)
6156 {
6157 if (s->output_section != NULL)
6158 {
6159 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6160 elf_group_name (s->output_section) = NULL;
6161 }
6162 s = elf_next_in_group (s);
6163 if (s == first)
6164 break;
6165 }
6166 }
6167
80fccad2
BW
6168 return TRUE;
6169}
6170
252b5132
RH
6171/* Copy private symbol information. If this symbol is in a section
6172 which we did not map into a BFD section, try to map the section
6173 index correctly. We use special macro definitions for the mapped
6174 section indices; these definitions are interpreted by the
6175 swap_out_syms function. */
6176
9ad5cbcf
AM
6177#define MAP_ONESYMTAB (SHN_HIOS + 1)
6178#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6179#define MAP_STRTAB (SHN_HIOS + 3)
6180#define MAP_SHSTRTAB (SHN_HIOS + 4)
6181#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6182
b34976b6 6183bfd_boolean
217aa764
AM
6184_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6185 asymbol *isymarg,
6186 bfd *obfd,
6187 asymbol *osymarg)
252b5132
RH
6188{
6189 elf_symbol_type *isym, *osym;
6190
6191 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6192 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6193 return TRUE;
252b5132
RH
6194
6195 isym = elf_symbol_from (ibfd, isymarg);
6196 osym = elf_symbol_from (obfd, osymarg);
6197
6198 if (isym != NULL
8424d8f5 6199 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6200 && osym != NULL
6201 && bfd_is_abs_section (isym->symbol.section))
6202 {
6203 unsigned int shndx;
6204
6205 shndx = isym->internal_elf_sym.st_shndx;
6206 if (shndx == elf_onesymtab (ibfd))
6207 shndx = MAP_ONESYMTAB;
6208 else if (shndx == elf_dynsymtab (ibfd))
6209 shndx = MAP_DYNSYMTAB;
6210 else if (shndx == elf_tdata (ibfd)->strtab_section)
6211 shndx = MAP_STRTAB;
6212 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6213 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6214 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6215 shndx = MAP_SYM_SHNDX;
252b5132
RH
6216 osym->internal_elf_sym.st_shndx = shndx;
6217 }
6218
b34976b6 6219 return TRUE;
252b5132
RH
6220}
6221
6222/* Swap out the symbols. */
6223
b34976b6 6224static bfd_boolean
217aa764
AM
6225swap_out_syms (bfd *abfd,
6226 struct bfd_strtab_hash **sttp,
6227 int relocatable_p)
252b5132 6228{
9c5bfbb7 6229 const struct elf_backend_data *bed;
079e9a2f
AM
6230 int symcount;
6231 asymbol **syms;
6232 struct bfd_strtab_hash *stt;
6233 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6234 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6235 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6236 bfd_byte *outbound_syms;
6237 bfd_byte *outbound_shndx;
079e9a2f
AM
6238 int idx;
6239 bfd_size_type amt;
174fd7f9 6240 bfd_boolean name_local_sections;
252b5132
RH
6241
6242 if (!elf_map_symbols (abfd))
b34976b6 6243 return FALSE;
252b5132 6244
c044fabd 6245 /* Dump out the symtabs. */
079e9a2f
AM
6246 stt = _bfd_elf_stringtab_init ();
6247 if (stt == NULL)
b34976b6 6248 return FALSE;
252b5132 6249
079e9a2f
AM
6250 bed = get_elf_backend_data (abfd);
6251 symcount = bfd_get_symcount (abfd);
6252 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6253 symtab_hdr->sh_type = SHT_SYMTAB;
6254 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6255 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6256 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
72de5009 6257 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6258
6259 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6260 symstrtab_hdr->sh_type = SHT_STRTAB;
6261
a50b1753
NC
6262 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6263 bed->s->sizeof_sym);
079e9a2f 6264 if (outbound_syms == NULL)
5ed6aba4
NC
6265 {
6266 _bfd_stringtab_free (stt);
6267 return FALSE;
6268 }
217aa764 6269 symtab_hdr->contents = outbound_syms;
252b5132 6270
9ad5cbcf
AM
6271 outbound_shndx = NULL;
6272 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6273 if (symtab_shndx_hdr->sh_name != 0)
6274 {
6275 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6276 outbound_shndx = (bfd_byte *)
6277 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6278 if (outbound_shndx == NULL)
5ed6aba4
NC
6279 {
6280 _bfd_stringtab_free (stt);
6281 return FALSE;
6282 }
6283
9ad5cbcf
AM
6284 symtab_shndx_hdr->contents = outbound_shndx;
6285 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6286 symtab_shndx_hdr->sh_size = amt;
6287 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6288 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6289 }
6290
589e6347 6291 /* Now generate the data (for "contents"). */
079e9a2f
AM
6292 {
6293 /* Fill in zeroth symbol and swap it out. */
6294 Elf_Internal_Sym sym;
6295 sym.st_name = 0;
6296 sym.st_value = 0;
6297 sym.st_size = 0;
6298 sym.st_info = 0;
6299 sym.st_other = 0;
6300 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6301 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6302 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6303 if (outbound_shndx != NULL)
6304 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6305 }
252b5132 6306
174fd7f9
RS
6307 name_local_sections
6308 = (bed->elf_backend_name_local_section_symbols
6309 && bed->elf_backend_name_local_section_symbols (abfd));
6310
079e9a2f
AM
6311 syms = bfd_get_outsymbols (abfd);
6312 for (idx = 0; idx < symcount; idx++)
252b5132 6313 {
252b5132 6314 Elf_Internal_Sym sym;
079e9a2f
AM
6315 bfd_vma value = syms[idx]->value;
6316 elf_symbol_type *type_ptr;
6317 flagword flags = syms[idx]->flags;
6318 int type;
252b5132 6319
174fd7f9
RS
6320 if (!name_local_sections
6321 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6322 {
6323 /* Local section symbols have no name. */
6324 sym.st_name = 0;
6325 }
6326 else
6327 {
6328 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6329 syms[idx]->name,
b34976b6 6330 TRUE, FALSE);
079e9a2f 6331 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6332 {
6333 _bfd_stringtab_free (stt);
6334 return FALSE;
6335 }
079e9a2f 6336 }
252b5132 6337
079e9a2f 6338 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6339
079e9a2f
AM
6340 if ((flags & BSF_SECTION_SYM) == 0
6341 && bfd_is_com_section (syms[idx]->section))
6342 {
6343 /* ELF common symbols put the alignment into the `value' field,
6344 and the size into the `size' field. This is backwards from
6345 how BFD handles it, so reverse it here. */
6346 sym.st_size = value;
6347 if (type_ptr == NULL
6348 || type_ptr->internal_elf_sym.st_value == 0)
6349 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6350 else
6351 sym.st_value = type_ptr->internal_elf_sym.st_value;
6352 sym.st_shndx = _bfd_elf_section_from_bfd_section
6353 (abfd, syms[idx]->section);
6354 }
6355 else
6356 {
6357 asection *sec = syms[idx]->section;
cb33740c 6358 unsigned int shndx;
252b5132 6359
079e9a2f
AM
6360 if (sec->output_section)
6361 {
6362 value += sec->output_offset;
6363 sec = sec->output_section;
6364 }
589e6347 6365
079e9a2f
AM
6366 /* Don't add in the section vma for relocatable output. */
6367 if (! relocatable_p)
6368 value += sec->vma;
6369 sym.st_value = value;
6370 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6371
6372 if (bfd_is_abs_section (sec)
6373 && type_ptr != NULL
6374 && type_ptr->internal_elf_sym.st_shndx != 0)
6375 {
6376 /* This symbol is in a real ELF section which we did
6377 not create as a BFD section. Undo the mapping done
6378 by copy_private_symbol_data. */
6379 shndx = type_ptr->internal_elf_sym.st_shndx;
6380 switch (shndx)
6381 {
6382 case MAP_ONESYMTAB:
6383 shndx = elf_onesymtab (abfd);
6384 break;
6385 case MAP_DYNSYMTAB:
6386 shndx = elf_dynsymtab (abfd);
6387 break;
6388 case MAP_STRTAB:
6389 shndx = elf_tdata (abfd)->strtab_section;
6390 break;
6391 case MAP_SHSTRTAB:
6392 shndx = elf_tdata (abfd)->shstrtab_section;
6393 break;
9ad5cbcf
AM
6394 case MAP_SYM_SHNDX:
6395 shndx = elf_tdata (abfd)->symtab_shndx_section;
6396 break;
079e9a2f
AM
6397 default:
6398 break;
6399 }
6400 }
6401 else
6402 {
6403 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6404
cb33740c 6405 if (shndx == SHN_BAD)
079e9a2f
AM
6406 {
6407 asection *sec2;
6408
6409 /* Writing this would be a hell of a lot easier if
6410 we had some decent documentation on bfd, and
6411 knew what to expect of the library, and what to
6412 demand of applications. For example, it
6413 appears that `objcopy' might not set the
6414 section of a symbol to be a section that is
6415 actually in the output file. */
6416 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6417 if (sec2 == NULL)
6418 {
6419 _bfd_error_handler (_("\
6420Unable to find equivalent output section for symbol '%s' from section '%s'"),
6421 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6422 sec->name);
811072d8 6423 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6424 _bfd_stringtab_free (stt);
589e6347
NC
6425 return FALSE;
6426 }
811072d8 6427
079e9a2f 6428 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6429 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6430 }
6431 }
252b5132 6432
079e9a2f
AM
6433 sym.st_shndx = shndx;
6434 }
252b5132 6435
13ae64f3
JJ
6436 if ((flags & BSF_THREAD_LOCAL) != 0)
6437 type = STT_TLS;
d8045f23
NC
6438 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6439 type = STT_GNU_IFUNC;
13ae64f3 6440 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6441 type = STT_FUNC;
6442 else if ((flags & BSF_OBJECT) != 0)
6443 type = STT_OBJECT;
d9352518
DB
6444 else if ((flags & BSF_RELC) != 0)
6445 type = STT_RELC;
6446 else if ((flags & BSF_SRELC) != 0)
6447 type = STT_SRELC;
079e9a2f
AM
6448 else
6449 type = STT_NOTYPE;
252b5132 6450
13ae64f3
JJ
6451 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6452 type = STT_TLS;
6453
589e6347 6454 /* Processor-specific types. */
079e9a2f
AM
6455 if (type_ptr != NULL
6456 && bed->elf_backend_get_symbol_type)
6457 type = ((*bed->elf_backend_get_symbol_type)
6458 (&type_ptr->internal_elf_sym, type));
252b5132 6459
079e9a2f
AM
6460 if (flags & BSF_SECTION_SYM)
6461 {
6462 if (flags & BSF_GLOBAL)
6463 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6464 else
6465 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6466 }
6467 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6468 {
504b7d20 6469#ifdef USE_STT_COMMON
0a40daed
MK
6470 if (type == STT_OBJECT)
6471 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6472 else
504b7d20 6473#endif
c91e322a 6474 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6475 }
079e9a2f
AM
6476 else if (bfd_is_und_section (syms[idx]->section))
6477 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6478 ? STB_WEAK
6479 : STB_GLOBAL),
6480 type);
6481 else if (flags & BSF_FILE)
6482 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6483 else
6484 {
6485 int bind = STB_LOCAL;
252b5132 6486
079e9a2f
AM
6487 if (flags & BSF_LOCAL)
6488 bind = STB_LOCAL;
3e7a7d11
NC
6489 else if (flags & BSF_GNU_UNIQUE)
6490 bind = STB_GNU_UNIQUE;
079e9a2f
AM
6491 else if (flags & BSF_WEAK)
6492 bind = STB_WEAK;
6493 else if (flags & BSF_GLOBAL)
6494 bind = STB_GLOBAL;
252b5132 6495
079e9a2f
AM
6496 sym.st_info = ELF_ST_INFO (bind, type);
6497 }
252b5132 6498
079e9a2f
AM
6499 if (type_ptr != NULL)
6500 sym.st_other = type_ptr->internal_elf_sym.st_other;
6501 else
6502 sym.st_other = 0;
252b5132 6503
9ad5cbcf 6504 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6505 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6506 if (outbound_shndx != NULL)
6507 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6508 }
252b5132 6509
079e9a2f
AM
6510 *sttp = stt;
6511 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6512 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6513
079e9a2f
AM
6514 symstrtab_hdr->sh_flags = 0;
6515 symstrtab_hdr->sh_addr = 0;
6516 symstrtab_hdr->sh_entsize = 0;
6517 symstrtab_hdr->sh_link = 0;
6518 symstrtab_hdr->sh_info = 0;
6519 symstrtab_hdr->sh_addralign = 1;
252b5132 6520
b34976b6 6521 return TRUE;
252b5132
RH
6522}
6523
6524/* Return the number of bytes required to hold the symtab vector.
6525
6526 Note that we base it on the count plus 1, since we will null terminate
6527 the vector allocated based on this size. However, the ELF symbol table
6528 always has a dummy entry as symbol #0, so it ends up even. */
6529
6530long
217aa764 6531_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6532{
6533 long symcount;
6534 long symtab_size;
6535 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6536
6537 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6538 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6539 if (symcount > 0)
6540 symtab_size -= sizeof (asymbol *);
252b5132
RH
6541
6542 return symtab_size;
6543}
6544
6545long
217aa764 6546_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6547{
6548 long symcount;
6549 long symtab_size;
6550 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6551
6552 if (elf_dynsymtab (abfd) == 0)
6553 {
6554 bfd_set_error (bfd_error_invalid_operation);
6555 return -1;
6556 }
6557
6558 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6559 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6560 if (symcount > 0)
6561 symtab_size -= sizeof (asymbol *);
252b5132
RH
6562
6563 return symtab_size;
6564}
6565
6566long
217aa764
AM
6567_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6568 sec_ptr asect)
252b5132
RH
6569{
6570 return (asect->reloc_count + 1) * sizeof (arelent *);
6571}
6572
6573/* Canonicalize the relocs. */
6574
6575long
217aa764
AM
6576_bfd_elf_canonicalize_reloc (bfd *abfd,
6577 sec_ptr section,
6578 arelent **relptr,
6579 asymbol **symbols)
252b5132
RH
6580{
6581 arelent *tblptr;
6582 unsigned int i;
9c5bfbb7 6583 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6584
b34976b6 6585 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6586 return -1;
6587
6588 tblptr = section->relocation;
6589 for (i = 0; i < section->reloc_count; i++)
6590 *relptr++ = tblptr++;
6591
6592 *relptr = NULL;
6593
6594 return section->reloc_count;
6595}
6596
6597long
6cee3f79 6598_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6599{
9c5bfbb7 6600 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6601 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6602
6603 if (symcount >= 0)
6604 bfd_get_symcount (abfd) = symcount;
6605 return symcount;
6606}
6607
6608long
217aa764
AM
6609_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6610 asymbol **allocation)
252b5132 6611{
9c5bfbb7 6612 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6613 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6614
6615 if (symcount >= 0)
6616 bfd_get_dynamic_symcount (abfd) = symcount;
6617 return symcount;
252b5132
RH
6618}
6619
8615f3f2
AM
6620/* Return the size required for the dynamic reloc entries. Any loadable
6621 section that was actually installed in the BFD, and has type SHT_REL
6622 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6623 dynamic reloc section. */
252b5132
RH
6624
6625long
217aa764 6626_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6627{
6628 long ret;
6629 asection *s;
6630
6631 if (elf_dynsymtab (abfd) == 0)
6632 {
6633 bfd_set_error (bfd_error_invalid_operation);
6634 return -1;
6635 }
6636
6637 ret = sizeof (arelent *);
6638 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 6639 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6640 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6641 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6642 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6643 * sizeof (arelent *));
6644
6645 return ret;
6646}
6647
8615f3f2
AM
6648/* Canonicalize the dynamic relocation entries. Note that we return the
6649 dynamic relocations as a single block, although they are actually
6650 associated with particular sections; the interface, which was
6651 designed for SunOS style shared libraries, expects that there is only
6652 one set of dynamic relocs. Any loadable section that was actually
6653 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6654 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6655
6656long
217aa764
AM
6657_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6658 arelent **storage,
6659 asymbol **syms)
252b5132 6660{
217aa764 6661 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6662 asection *s;
6663 long ret;
6664
6665 if (elf_dynsymtab (abfd) == 0)
6666 {
6667 bfd_set_error (bfd_error_invalid_operation);
6668 return -1;
6669 }
6670
6671 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6672 ret = 0;
6673 for (s = abfd->sections; s != NULL; s = s->next)
6674 {
266b05cf 6675 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6676 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6677 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6678 {
6679 arelent *p;
6680 long count, i;
6681
b34976b6 6682 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6683 return -1;
eea6121a 6684 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6685 p = s->relocation;
6686 for (i = 0; i < count; i++)
6687 *storage++ = p++;
6688 ret += count;
6689 }
6690 }
6691
6692 *storage = NULL;
6693
6694 return ret;
6695}
6696\f
6697/* Read in the version information. */
6698
b34976b6 6699bfd_boolean
fc0e6df6 6700_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6701{
6702 bfd_byte *contents = NULL;
fc0e6df6
PB
6703 unsigned int freeidx = 0;
6704
6705 if (elf_dynverref (abfd) != 0)
6706 {
6707 Elf_Internal_Shdr *hdr;
6708 Elf_External_Verneed *everneed;
6709 Elf_Internal_Verneed *iverneed;
6710 unsigned int i;
d0fb9a8d 6711 bfd_byte *contents_end;
fc0e6df6
PB
6712
6713 hdr = &elf_tdata (abfd)->dynverref_hdr;
6714
a50b1753
NC
6715 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
6716 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6717 if (elf_tdata (abfd)->verref == NULL)
6718 goto error_return;
6719
6720 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6721
a50b1753 6722 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
fc0e6df6 6723 if (contents == NULL)
d0fb9a8d
JJ
6724 {
6725error_return_verref:
6726 elf_tdata (abfd)->verref = NULL;
6727 elf_tdata (abfd)->cverrefs = 0;
6728 goto error_return;
6729 }
fc0e6df6
PB
6730 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6731 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6732 goto error_return_verref;
fc0e6df6 6733
d0fb9a8d
JJ
6734 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6735 goto error_return_verref;
6736
6737 BFD_ASSERT (sizeof (Elf_External_Verneed)
6738 == sizeof (Elf_External_Vernaux));
6739 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6740 everneed = (Elf_External_Verneed *) contents;
6741 iverneed = elf_tdata (abfd)->verref;
6742 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6743 {
6744 Elf_External_Vernaux *evernaux;
6745 Elf_Internal_Vernaux *ivernaux;
6746 unsigned int j;
6747
6748 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6749
6750 iverneed->vn_bfd = abfd;
6751
6752 iverneed->vn_filename =
6753 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6754 iverneed->vn_file);
6755 if (iverneed->vn_filename == NULL)
d0fb9a8d 6756 goto error_return_verref;
fc0e6df6 6757
d0fb9a8d
JJ
6758 if (iverneed->vn_cnt == 0)
6759 iverneed->vn_auxptr = NULL;
6760 else
6761 {
a50b1753
NC
6762 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
6763 bfd_alloc2 (abfd, iverneed->vn_cnt,
6764 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
6765 if (iverneed->vn_auxptr == NULL)
6766 goto error_return_verref;
6767 }
6768
6769 if (iverneed->vn_aux
6770 > (size_t) (contents_end - (bfd_byte *) everneed))
6771 goto error_return_verref;
fc0e6df6
PB
6772
6773 evernaux = ((Elf_External_Vernaux *)
6774 ((bfd_byte *) everneed + iverneed->vn_aux));
6775 ivernaux = iverneed->vn_auxptr;
6776 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6777 {
6778 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6779
6780 ivernaux->vna_nodename =
6781 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6782 ivernaux->vna_name);
6783 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6784 goto error_return_verref;
fc0e6df6
PB
6785
6786 if (j + 1 < iverneed->vn_cnt)
6787 ivernaux->vna_nextptr = ivernaux + 1;
6788 else
6789 ivernaux->vna_nextptr = NULL;
6790
d0fb9a8d
JJ
6791 if (ivernaux->vna_next
6792 > (size_t) (contents_end - (bfd_byte *) evernaux))
6793 goto error_return_verref;
6794
fc0e6df6
PB
6795 evernaux = ((Elf_External_Vernaux *)
6796 ((bfd_byte *) evernaux + ivernaux->vna_next));
6797
6798 if (ivernaux->vna_other > freeidx)
6799 freeidx = ivernaux->vna_other;
6800 }
6801
6802 if (i + 1 < hdr->sh_info)
6803 iverneed->vn_nextref = iverneed + 1;
6804 else
6805 iverneed->vn_nextref = NULL;
6806
d0fb9a8d
JJ
6807 if (iverneed->vn_next
6808 > (size_t) (contents_end - (bfd_byte *) everneed))
6809 goto error_return_verref;
6810
fc0e6df6
PB
6811 everneed = ((Elf_External_Verneed *)
6812 ((bfd_byte *) everneed + iverneed->vn_next));
6813 }
6814
6815 free (contents);
6816 contents = NULL;
6817 }
252b5132
RH
6818
6819 if (elf_dynverdef (abfd) != 0)
6820 {
6821 Elf_Internal_Shdr *hdr;
6822 Elf_External_Verdef *everdef;
6823 Elf_Internal_Verdef *iverdef;
f631889e
UD
6824 Elf_Internal_Verdef *iverdefarr;
6825 Elf_Internal_Verdef iverdefmem;
252b5132 6826 unsigned int i;
062e2358 6827 unsigned int maxidx;
d0fb9a8d 6828 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6829
6830 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6831
a50b1753 6832 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132
RH
6833 if (contents == NULL)
6834 goto error_return;
6835 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6836 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6837 goto error_return;
6838
d0fb9a8d
JJ
6839 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6840 goto error_return;
6841
6842 BFD_ASSERT (sizeof (Elf_External_Verdef)
6843 >= sizeof (Elf_External_Verdaux));
6844 contents_end_def = contents + hdr->sh_size
6845 - sizeof (Elf_External_Verdef);
6846 contents_end_aux = contents + hdr->sh_size
6847 - sizeof (Elf_External_Verdaux);
6848
f631889e
UD
6849 /* We know the number of entries in the section but not the maximum
6850 index. Therefore we have to run through all entries and find
6851 the maximum. */
252b5132 6852 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6853 maxidx = 0;
6854 for (i = 0; i < hdr->sh_info; ++i)
6855 {
6856 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6857
062e2358
AM
6858 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6859 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6860
d0fb9a8d
JJ
6861 if (iverdefmem.vd_next
6862 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6863 goto error_return;
6864
f631889e
UD
6865 everdef = ((Elf_External_Verdef *)
6866 ((bfd_byte *) everdef + iverdefmem.vd_next));
6867 }
6868
fc0e6df6
PB
6869 if (default_imported_symver)
6870 {
6871 if (freeidx > maxidx)
6872 maxidx = ++freeidx;
6873 else
6874 freeidx = ++maxidx;
6875 }
a50b1753
NC
6876 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
6877 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e
UD
6878 if (elf_tdata (abfd)->verdef == NULL)
6879 goto error_return;
6880
6881 elf_tdata (abfd)->cverdefs = maxidx;
6882
6883 everdef = (Elf_External_Verdef *) contents;
6884 iverdefarr = elf_tdata (abfd)->verdef;
6885 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6886 {
6887 Elf_External_Verdaux *everdaux;
6888 Elf_Internal_Verdaux *iverdaux;
6889 unsigned int j;
6890
f631889e
UD
6891 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6892
d0fb9a8d
JJ
6893 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6894 {
6895error_return_verdef:
6896 elf_tdata (abfd)->verdef = NULL;
6897 elf_tdata (abfd)->cverdefs = 0;
6898 goto error_return;
6899 }
6900
f631889e
UD
6901 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6902 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6903
6904 iverdef->vd_bfd = abfd;
6905
d0fb9a8d
JJ
6906 if (iverdef->vd_cnt == 0)
6907 iverdef->vd_auxptr = NULL;
6908 else
6909 {
a50b1753
NC
6910 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
6911 bfd_alloc2 (abfd, iverdef->vd_cnt,
6912 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
6913 if (iverdef->vd_auxptr == NULL)
6914 goto error_return_verdef;
6915 }
6916
6917 if (iverdef->vd_aux
6918 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6919 goto error_return_verdef;
252b5132
RH
6920
6921 everdaux = ((Elf_External_Verdaux *)
6922 ((bfd_byte *) everdef + iverdef->vd_aux));
6923 iverdaux = iverdef->vd_auxptr;
6924 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6925 {
6926 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6927
6928 iverdaux->vda_nodename =
6929 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6930 iverdaux->vda_name);
6931 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6932 goto error_return_verdef;
252b5132
RH
6933
6934 if (j + 1 < iverdef->vd_cnt)
6935 iverdaux->vda_nextptr = iverdaux + 1;
6936 else
6937 iverdaux->vda_nextptr = NULL;
6938
d0fb9a8d
JJ
6939 if (iverdaux->vda_next
6940 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6941 goto error_return_verdef;
6942
252b5132
RH
6943 everdaux = ((Elf_External_Verdaux *)
6944 ((bfd_byte *) everdaux + iverdaux->vda_next));
6945 }
6946
d0fb9a8d
JJ
6947 if (iverdef->vd_cnt)
6948 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6949
d0fb9a8d 6950 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6951 iverdef->vd_nextdef = iverdef + 1;
6952 else
6953 iverdef->vd_nextdef = NULL;
6954
6955 everdef = ((Elf_External_Verdef *)
6956 ((bfd_byte *) everdef + iverdef->vd_next));
6957 }
6958
6959 free (contents);
6960 contents = NULL;
6961 }
fc0e6df6 6962 else if (default_imported_symver)
252b5132 6963 {
fc0e6df6
PB
6964 if (freeidx < 3)
6965 freeidx = 3;
6966 else
6967 freeidx++;
252b5132 6968
a50b1753
NC
6969 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
6970 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 6971 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6972 goto error_return;
6973
fc0e6df6
PB
6974 elf_tdata (abfd)->cverdefs = freeidx;
6975 }
252b5132 6976
fc0e6df6
PB
6977 /* Create a default version based on the soname. */
6978 if (default_imported_symver)
6979 {
6980 Elf_Internal_Verdef *iverdef;
6981 Elf_Internal_Verdaux *iverdaux;
252b5132 6982
fc0e6df6 6983 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6984
fc0e6df6
PB
6985 iverdef->vd_version = VER_DEF_CURRENT;
6986 iverdef->vd_flags = 0;
6987 iverdef->vd_ndx = freeidx;
6988 iverdef->vd_cnt = 1;
252b5132 6989
fc0e6df6 6990 iverdef->vd_bfd = abfd;
252b5132 6991
fc0e6df6
PB
6992 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6993 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6994 goto error_return_verdef;
fc0e6df6 6995 iverdef->vd_nextdef = NULL;
a50b1753
NC
6996 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
6997 bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
6998 if (iverdef->vd_auxptr == NULL)
6999 goto error_return_verdef;
252b5132 7000
fc0e6df6
PB
7001 iverdaux = iverdef->vd_auxptr;
7002 iverdaux->vda_nodename = iverdef->vd_nodename;
7003 iverdaux->vda_nextptr = NULL;
252b5132
RH
7004 }
7005
b34976b6 7006 return TRUE;
252b5132
RH
7007
7008 error_return:
5ed6aba4 7009 if (contents != NULL)
252b5132 7010 free (contents);
b34976b6 7011 return FALSE;
252b5132
RH
7012}
7013\f
7014asymbol *
217aa764 7015_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7016{
7017 elf_symbol_type *newsym;
dc810e39 7018 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 7019
a50b1753 7020 newsym = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132
RH
7021 if (!newsym)
7022 return NULL;
7023 else
7024 {
7025 newsym->symbol.the_bfd = abfd;
7026 return &newsym->symbol;
7027 }
7028}
7029
7030void
217aa764
AM
7031_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7032 asymbol *symbol,
7033 symbol_info *ret)
252b5132
RH
7034{
7035 bfd_symbol_info (symbol, ret);
7036}
7037
7038/* Return whether a symbol name implies a local symbol. Most targets
7039 use this function for the is_local_label_name entry point, but some
7040 override it. */
7041
b34976b6 7042bfd_boolean
217aa764
AM
7043_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7044 const char *name)
252b5132
RH
7045{
7046 /* Normal local symbols start with ``.L''. */
7047 if (name[0] == '.' && name[1] == 'L')
b34976b6 7048 return TRUE;
252b5132
RH
7049
7050 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7051 DWARF debugging symbols starting with ``..''. */
7052 if (name[0] == '.' && name[1] == '.')
b34976b6 7053 return TRUE;
252b5132
RH
7054
7055 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7056 emitting DWARF debugging output. I suspect this is actually a
7057 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7058 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7059 underscore to be emitted on some ELF targets). For ease of use,
7060 we treat such symbols as local. */
7061 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7062 return TRUE;
252b5132 7063
b34976b6 7064 return FALSE;
252b5132
RH
7065}
7066
7067alent *
217aa764
AM
7068_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7069 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7070{
7071 abort ();
7072 return NULL;
7073}
7074
b34976b6 7075bfd_boolean
217aa764
AM
7076_bfd_elf_set_arch_mach (bfd *abfd,
7077 enum bfd_architecture arch,
7078 unsigned long machine)
252b5132
RH
7079{
7080 /* If this isn't the right architecture for this backend, and this
7081 isn't the generic backend, fail. */
7082 if (arch != get_elf_backend_data (abfd)->arch
7083 && arch != bfd_arch_unknown
7084 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7085 return FALSE;
252b5132
RH
7086
7087 return bfd_default_set_arch_mach (abfd, arch, machine);
7088}
7089
d1fad7c6
NC
7090/* Find the function to a particular section and offset,
7091 for error reporting. */
252b5132 7092
b34976b6 7093static bfd_boolean
b9d678e0 7094elf_find_function (bfd *abfd,
217aa764
AM
7095 asection *section,
7096 asymbol **symbols,
7097 bfd_vma offset,
7098 const char **filename_ptr,
7099 const char **functionname_ptr)
252b5132 7100{
252b5132 7101 const char *filename;
57426232 7102 asymbol *func, *file;
252b5132
RH
7103 bfd_vma low_func;
7104 asymbol **p;
57426232
JB
7105 /* ??? Given multiple file symbols, it is impossible to reliably
7106 choose the right file name for global symbols. File symbols are
7107 local symbols, and thus all file symbols must sort before any
7108 global symbols. The ELF spec may be interpreted to say that a
7109 file symbol must sort before other local symbols, but currently
7110 ld -r doesn't do this. So, for ld -r output, it is possible to
7111 make a better choice of file name for local symbols by ignoring
7112 file symbols appearing after a given local symbol. */
7113 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
b9d678e0 7114 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7115
252b5132
RH
7116 filename = NULL;
7117 func = NULL;
57426232 7118 file = NULL;
252b5132 7119 low_func = 0;
57426232 7120 state = nothing_seen;
252b5132
RH
7121
7122 for (p = symbols; *p != NULL; p++)
7123 {
7124 elf_symbol_type *q;
b9d678e0 7125 unsigned int type;
252b5132
RH
7126
7127 q = (elf_symbol_type *) *p;
7128
b9d678e0
L
7129 type = ELF_ST_TYPE (q->internal_elf_sym.st_info);
7130 switch (type)
252b5132 7131 {
252b5132 7132 case STT_FILE:
57426232
JB
7133 file = &q->symbol;
7134 if (state == symbol_seen)
7135 state = file_after_symbol_seen;
7136 continue;
b9d678e0
L
7137 default:
7138 if (!bed->is_function_type (type))
7139 break;
252b5132 7140 case STT_NOTYPE:
6b40fcba 7141 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7142 && q->symbol.value >= low_func
7143 && q->symbol.value <= offset)
7144 {
7145 func = (asymbol *) q;
7146 low_func = q->symbol.value;
a1923858
AM
7147 filename = NULL;
7148 if (file != NULL
7149 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7150 || state != file_after_symbol_seen))
57426232 7151 filename = bfd_asymbol_name (file);
252b5132
RH
7152 }
7153 break;
7154 }
57426232
JB
7155 if (state == nothing_seen)
7156 state = symbol_seen;
252b5132
RH
7157 }
7158
7159 if (func == NULL)
b34976b6 7160 return FALSE;
252b5132 7161
d1fad7c6
NC
7162 if (filename_ptr)
7163 *filename_ptr = filename;
7164 if (functionname_ptr)
7165 *functionname_ptr = bfd_asymbol_name (func);
7166
b34976b6 7167 return TRUE;
d1fad7c6
NC
7168}
7169
7170/* Find the nearest line to a particular section and offset,
7171 for error reporting. */
7172
b34976b6 7173bfd_boolean
217aa764
AM
7174_bfd_elf_find_nearest_line (bfd *abfd,
7175 asection *section,
7176 asymbol **symbols,
7177 bfd_vma offset,
7178 const char **filename_ptr,
7179 const char **functionname_ptr,
7180 unsigned int *line_ptr)
d1fad7c6 7181{
b34976b6 7182 bfd_boolean found;
d1fad7c6
NC
7183
7184 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7185 filename_ptr, functionname_ptr,
7186 line_ptr))
d1fad7c6
NC
7187 {
7188 if (!*functionname_ptr)
4e8a9624
AM
7189 elf_find_function (abfd, section, symbols, offset,
7190 *filename_ptr ? NULL : filename_ptr,
7191 functionname_ptr);
7192
b34976b6 7193 return TRUE;
d1fad7c6
NC
7194 }
7195
7196 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7197 filename_ptr, functionname_ptr,
7198 line_ptr, 0,
7199 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7200 {
7201 if (!*functionname_ptr)
4e8a9624
AM
7202 elf_find_function (abfd, section, symbols, offset,
7203 *filename_ptr ? NULL : filename_ptr,
7204 functionname_ptr);
7205
b34976b6 7206 return TRUE;
d1fad7c6
NC
7207 }
7208
7209 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7210 &found, filename_ptr,
7211 functionname_ptr, line_ptr,
7212 &elf_tdata (abfd)->line_info))
b34976b6 7213 return FALSE;
dc43ada5 7214 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7215 return TRUE;
d1fad7c6
NC
7216
7217 if (symbols == NULL)
b34976b6 7218 return FALSE;
d1fad7c6
NC
7219
7220 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7221 filename_ptr, functionname_ptr))
b34976b6 7222 return FALSE;
d1fad7c6 7223
252b5132 7224 *line_ptr = 0;
b34976b6 7225 return TRUE;
252b5132
RH
7226}
7227
5420f73d
L
7228/* Find the line for a symbol. */
7229
7230bfd_boolean
7231_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7232 const char **filename_ptr, unsigned int *line_ptr)
7233{
7234 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7235 filename_ptr, line_ptr, 0,
7236 &elf_tdata (abfd)->dwarf2_find_line_info);
7237}
7238
4ab527b0
FF
7239/* After a call to bfd_find_nearest_line, successive calls to
7240 bfd_find_inliner_info can be used to get source information about
7241 each level of function inlining that terminated at the address
7242 passed to bfd_find_nearest_line. Currently this is only supported
7243 for DWARF2 with appropriate DWARF3 extensions. */
7244
7245bfd_boolean
7246_bfd_elf_find_inliner_info (bfd *abfd,
7247 const char **filename_ptr,
7248 const char **functionname_ptr,
7249 unsigned int *line_ptr)
7250{
7251 bfd_boolean found;
7252 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7253 functionname_ptr, line_ptr,
7254 & elf_tdata (abfd)->dwarf2_find_line_info);
7255 return found;
7256}
7257
252b5132 7258int
a6b96beb 7259_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7260{
8ded5a0f
AM
7261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7262 int ret = bed->s->sizeof_ehdr;
252b5132 7263
a6b96beb 7264 if (!info->relocatable)
8ded5a0f 7265 {
62d7a5f6 7266 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7267
62d7a5f6
AM
7268 if (phdr_size == (bfd_size_type) -1)
7269 {
7270 struct elf_segment_map *m;
7271
7272 phdr_size = 0;
7273 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7274 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7275
62d7a5f6
AM
7276 if (phdr_size == 0)
7277 phdr_size = get_program_header_size (abfd, info);
7278 }
8ded5a0f
AM
7279
7280 elf_tdata (abfd)->program_header_size = phdr_size;
7281 ret += phdr_size;
7282 }
7283
252b5132
RH
7284 return ret;
7285}
7286
b34976b6 7287bfd_boolean
217aa764
AM
7288_bfd_elf_set_section_contents (bfd *abfd,
7289 sec_ptr section,
0f867abe 7290 const void *location,
217aa764
AM
7291 file_ptr offset,
7292 bfd_size_type count)
252b5132
RH
7293{
7294 Elf_Internal_Shdr *hdr;
dc810e39 7295 bfd_signed_vma pos;
252b5132
RH
7296
7297 if (! abfd->output_has_begun
217aa764 7298 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7299 return FALSE;
252b5132
RH
7300
7301 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7302 pos = hdr->sh_offset + offset;
7303 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7304 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7305 return FALSE;
252b5132 7306
b34976b6 7307 return TRUE;
252b5132
RH
7308}
7309
7310void
217aa764
AM
7311_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7312 arelent *cache_ptr ATTRIBUTE_UNUSED,
7313 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7314{
7315 abort ();
7316}
7317
252b5132
RH
7318/* Try to convert a non-ELF reloc into an ELF one. */
7319
b34976b6 7320bfd_boolean
217aa764 7321_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7322{
c044fabd 7323 /* Check whether we really have an ELF howto. */
252b5132
RH
7324
7325 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7326 {
7327 bfd_reloc_code_real_type code;
7328 reloc_howto_type *howto;
7329
7330 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7331 equivalent ELF reloc. */
252b5132
RH
7332
7333 if (areloc->howto->pc_relative)
7334 {
7335 switch (areloc->howto->bitsize)
7336 {
7337 case 8:
7338 code = BFD_RELOC_8_PCREL;
7339 break;
7340 case 12:
7341 code = BFD_RELOC_12_PCREL;
7342 break;
7343 case 16:
7344 code = BFD_RELOC_16_PCREL;
7345 break;
7346 case 24:
7347 code = BFD_RELOC_24_PCREL;
7348 break;
7349 case 32:
7350 code = BFD_RELOC_32_PCREL;
7351 break;
7352 case 64:
7353 code = BFD_RELOC_64_PCREL;
7354 break;
7355 default:
7356 goto fail;
7357 }
7358
7359 howto = bfd_reloc_type_lookup (abfd, code);
7360
7361 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7362 {
7363 if (howto->pcrel_offset)
7364 areloc->addend += areloc->address;
7365 else
7366 areloc->addend -= areloc->address; /* addend is unsigned!! */
7367 }
7368 }
7369 else
7370 {
7371 switch (areloc->howto->bitsize)
7372 {
7373 case 8:
7374 code = BFD_RELOC_8;
7375 break;
7376 case 14:
7377 code = BFD_RELOC_14;
7378 break;
7379 case 16:
7380 code = BFD_RELOC_16;
7381 break;
7382 case 26:
7383 code = BFD_RELOC_26;
7384 break;
7385 case 32:
7386 code = BFD_RELOC_32;
7387 break;
7388 case 64:
7389 code = BFD_RELOC_64;
7390 break;
7391 default:
7392 goto fail;
7393 }
7394
7395 howto = bfd_reloc_type_lookup (abfd, code);
7396 }
7397
7398 if (howto)
7399 areloc->howto = howto;
7400 else
7401 goto fail;
7402 }
7403
b34976b6 7404 return TRUE;
252b5132
RH
7405
7406 fail:
7407 (*_bfd_error_handler)
d003868e
AM
7408 (_("%B: unsupported relocation type %s"),
7409 abfd, areloc->howto->name);
252b5132 7410 bfd_set_error (bfd_error_bad_value);
b34976b6 7411 return FALSE;
252b5132
RH
7412}
7413
b34976b6 7414bfd_boolean
217aa764 7415_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7416{
7417 if (bfd_get_format (abfd) == bfd_object)
7418 {
b25e3d87 7419 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7420 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7421 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7422 }
7423
7424 return _bfd_generic_close_and_cleanup (abfd);
7425}
7426
7427/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7428 in the relocation's offset. Thus we cannot allow any sort of sanity
7429 range-checking to interfere. There is nothing else to do in processing
7430 this reloc. */
7431
7432bfd_reloc_status_type
217aa764
AM
7433_bfd_elf_rel_vtable_reloc_fn
7434 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7435 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7436 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7437 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7438{
7439 return bfd_reloc_ok;
7440}
252b5132
RH
7441\f
7442/* Elf core file support. Much of this only works on native
7443 toolchains, since we rely on knowing the
7444 machine-dependent procfs structure in order to pick
c044fabd 7445 out details about the corefile. */
252b5132
RH
7446
7447#ifdef HAVE_SYS_PROCFS_H
7448# include <sys/procfs.h>
7449#endif
7450
c044fabd 7451/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7452
7453static int
217aa764 7454elfcore_make_pid (bfd *abfd)
252b5132
RH
7455{
7456 return ((elf_tdata (abfd)->core_lwpid << 16)
7457 + (elf_tdata (abfd)->core_pid));
7458}
7459
252b5132
RH
7460/* If there isn't a section called NAME, make one, using
7461 data from SECT. Note, this function will generate a
7462 reference to NAME, so you shouldn't deallocate or
c044fabd 7463 overwrite it. */
252b5132 7464
b34976b6 7465static bfd_boolean
217aa764 7466elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7467{
c044fabd 7468 asection *sect2;
252b5132
RH
7469
7470 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7471 return TRUE;
252b5132 7472
117ed4f8 7473 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7474 if (sect2 == NULL)
b34976b6 7475 return FALSE;
252b5132 7476
eea6121a 7477 sect2->size = sect->size;
252b5132 7478 sect2->filepos = sect->filepos;
252b5132 7479 sect2->alignment_power = sect->alignment_power;
b34976b6 7480 return TRUE;
252b5132
RH
7481}
7482
bb0082d6
AM
7483/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7484 actually creates up to two pseudosections:
7485 - For the single-threaded case, a section named NAME, unless
7486 such a section already exists.
7487 - For the multi-threaded case, a section named "NAME/PID", where
7488 PID is elfcore_make_pid (abfd).
7489 Both pseudosections have identical contents. */
b34976b6 7490bfd_boolean
217aa764
AM
7491_bfd_elfcore_make_pseudosection (bfd *abfd,
7492 char *name,
7493 size_t size,
7494 ufile_ptr filepos)
bb0082d6
AM
7495{
7496 char buf[100];
7497 char *threaded_name;
d4c88bbb 7498 size_t len;
bb0082d6
AM
7499 asection *sect;
7500
7501 /* Build the section name. */
7502
7503 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7504 len = strlen (buf) + 1;
a50b1753 7505 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 7506 if (threaded_name == NULL)
b34976b6 7507 return FALSE;
d4c88bbb 7508 memcpy (threaded_name, buf, len);
bb0082d6 7509
117ed4f8
AM
7510 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7511 SEC_HAS_CONTENTS);
bb0082d6 7512 if (sect == NULL)
b34976b6 7513 return FALSE;
eea6121a 7514 sect->size = size;
bb0082d6 7515 sect->filepos = filepos;
bb0082d6
AM
7516 sect->alignment_power = 2;
7517
936e320b 7518 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7519}
7520
252b5132 7521/* prstatus_t exists on:
4a938328 7522 solaris 2.5+
252b5132
RH
7523 linux 2.[01] + glibc
7524 unixware 4.2
7525*/
7526
7527#if defined (HAVE_PRSTATUS_T)
a7b97311 7528
b34976b6 7529static bfd_boolean
217aa764 7530elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7531{
eea6121a 7532 size_t size;
7ee38065 7533 int offset;
252b5132 7534
4a938328
MS
7535 if (note->descsz == sizeof (prstatus_t))
7536 {
7537 prstatus_t prstat;
252b5132 7538
eea6121a 7539 size = sizeof (prstat.pr_reg);
7ee38065 7540 offset = offsetof (prstatus_t, pr_reg);
4a938328 7541 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7542
fa49d224
NC
7543 /* Do not overwrite the core signal if it
7544 has already been set by another thread. */
7545 if (elf_tdata (abfd)->core_signal == 0)
7546 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7547 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7548
4a938328
MS
7549 /* pr_who exists on:
7550 solaris 2.5+
7551 unixware 4.2
7552 pr_who doesn't exist on:
7553 linux 2.[01]
7554 */
252b5132 7555#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7556 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7557#endif
4a938328 7558 }
7ee38065 7559#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7560 else if (note->descsz == sizeof (prstatus32_t))
7561 {
7562 /* 64-bit host, 32-bit corefile */
7563 prstatus32_t prstat;
7564
eea6121a 7565 size = sizeof (prstat.pr_reg);
7ee38065 7566 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7567 memcpy (&prstat, note->descdata, sizeof (prstat));
7568
fa49d224
NC
7569 /* Do not overwrite the core signal if it
7570 has already been set by another thread. */
7571 if (elf_tdata (abfd)->core_signal == 0)
7572 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7573 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7574
7575 /* pr_who exists on:
7576 solaris 2.5+
7577 unixware 4.2
7578 pr_who doesn't exist on:
7579 linux 2.[01]
7580 */
7ee38065 7581#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7582 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7583#endif
7584 }
7ee38065 7585#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7586 else
7587 {
7588 /* Fail - we don't know how to handle any other
7589 note size (ie. data object type). */
b34976b6 7590 return TRUE;
4a938328 7591 }
252b5132 7592
bb0082d6 7593 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7594 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7595 size, note->descpos + offset);
252b5132
RH
7596}
7597#endif /* defined (HAVE_PRSTATUS_T) */
7598
bb0082d6 7599/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7600static bfd_boolean
217aa764
AM
7601elfcore_make_note_pseudosection (bfd *abfd,
7602 char *name,
7603 Elf_Internal_Note *note)
252b5132 7604{
936e320b
AM
7605 return _bfd_elfcore_make_pseudosection (abfd, name,
7606 note->descsz, note->descpos);
252b5132
RH
7607}
7608
ff08c6bb
JB
7609/* There isn't a consistent prfpregset_t across platforms,
7610 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7611 data structure apart. */
7612
b34976b6 7613static bfd_boolean
217aa764 7614elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7615{
7616 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7617}
7618
ff08c6bb 7619/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 7620 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 7621 literally. */
c044fabd 7622
b34976b6 7623static bfd_boolean
217aa764 7624elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7625{
7626 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7627}
7628
97753bd5
AM
7629static bfd_boolean
7630elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
7631{
7632 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
7633}
7634
89eeb0bc
LM
7635static bfd_boolean
7636elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
7637{
7638 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
7639}
97753bd5 7640
252b5132 7641#if defined (HAVE_PRPSINFO_T)
4a938328 7642typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7643#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7644typedef prpsinfo32_t elfcore_psinfo32_t;
7645#endif
252b5132
RH
7646#endif
7647
7648#if defined (HAVE_PSINFO_T)
4a938328 7649typedef psinfo_t elfcore_psinfo_t;
7ee38065 7650#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7651typedef psinfo32_t elfcore_psinfo32_t;
7652#endif
252b5132
RH
7653#endif
7654
252b5132
RH
7655/* return a malloc'ed copy of a string at START which is at
7656 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7657 the copy will always have a terminating '\0'. */
252b5132 7658
936e320b 7659char *
217aa764 7660_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7661{
dc810e39 7662 char *dups;
a50b1753 7663 char *end = (char *) memchr (start, '\0', max);
dc810e39 7664 size_t len;
252b5132
RH
7665
7666 if (end == NULL)
7667 len = max;
7668 else
7669 len = end - start;
7670
a50b1753 7671 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 7672 if (dups == NULL)
252b5132
RH
7673 return NULL;
7674
dc810e39
AM
7675 memcpy (dups, start, len);
7676 dups[len] = '\0';
252b5132 7677
dc810e39 7678 return dups;
252b5132
RH
7679}
7680
bb0082d6 7681#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7682static bfd_boolean
217aa764 7683elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7684{
4a938328
MS
7685 if (note->descsz == sizeof (elfcore_psinfo_t))
7686 {
7687 elfcore_psinfo_t psinfo;
252b5132 7688
7ee38065 7689 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7690
4a938328 7691 elf_tdata (abfd)->core_program
936e320b
AM
7692 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7693 sizeof (psinfo.pr_fname));
252b5132 7694
4a938328 7695 elf_tdata (abfd)->core_command
936e320b
AM
7696 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7697 sizeof (psinfo.pr_psargs));
4a938328 7698 }
7ee38065 7699#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7700 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7701 {
7702 /* 64-bit host, 32-bit corefile */
7703 elfcore_psinfo32_t psinfo;
7704
7ee38065 7705 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7706
4a938328 7707 elf_tdata (abfd)->core_program
936e320b
AM
7708 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7709 sizeof (psinfo.pr_fname));
4a938328
MS
7710
7711 elf_tdata (abfd)->core_command
936e320b
AM
7712 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7713 sizeof (psinfo.pr_psargs));
4a938328
MS
7714 }
7715#endif
7716
7717 else
7718 {
7719 /* Fail - we don't know how to handle any other
7720 note size (ie. data object type). */
b34976b6 7721 return TRUE;
4a938328 7722 }
252b5132
RH
7723
7724 /* Note that for some reason, a spurious space is tacked
7725 onto the end of the args in some (at least one anyway)
c044fabd 7726 implementations, so strip it off if it exists. */
252b5132
RH
7727
7728 {
c044fabd 7729 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7730 int n = strlen (command);
7731
7732 if (0 < n && command[n - 1] == ' ')
7733 command[n - 1] = '\0';
7734 }
7735
b34976b6 7736 return TRUE;
252b5132
RH
7737}
7738#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7739
252b5132 7740#if defined (HAVE_PSTATUS_T)
b34976b6 7741static bfd_boolean
217aa764 7742elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7743{
f572a39d
AM
7744 if (note->descsz == sizeof (pstatus_t)
7745#if defined (HAVE_PXSTATUS_T)
7746 || note->descsz == sizeof (pxstatus_t)
7747#endif
7748 )
4a938328
MS
7749 {
7750 pstatus_t pstat;
252b5132 7751
4a938328 7752 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7753
4a938328
MS
7754 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7755 }
7ee38065 7756#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7757 else if (note->descsz == sizeof (pstatus32_t))
7758 {
7759 /* 64-bit host, 32-bit corefile */
7760 pstatus32_t pstat;
252b5132 7761
4a938328 7762 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7763
4a938328
MS
7764 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7765 }
7766#endif
252b5132
RH
7767 /* Could grab some more details from the "representative"
7768 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7769 NT_LWPSTATUS note, presumably. */
252b5132 7770
b34976b6 7771 return TRUE;
252b5132
RH
7772}
7773#endif /* defined (HAVE_PSTATUS_T) */
7774
252b5132 7775#if defined (HAVE_LWPSTATUS_T)
b34976b6 7776static bfd_boolean
217aa764 7777elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7778{
7779 lwpstatus_t lwpstat;
7780 char buf[100];
c044fabd 7781 char *name;
d4c88bbb 7782 size_t len;
c044fabd 7783 asection *sect;
252b5132 7784
f572a39d
AM
7785 if (note->descsz != sizeof (lwpstat)
7786#if defined (HAVE_LWPXSTATUS_T)
7787 && note->descsz != sizeof (lwpxstatus_t)
7788#endif
7789 )
b34976b6 7790 return TRUE;
252b5132
RH
7791
7792 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7793
7794 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7795 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7796
c044fabd 7797 /* Make a ".reg/999" section. */
252b5132
RH
7798
7799 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7800 len = strlen (buf) + 1;
217aa764 7801 name = bfd_alloc (abfd, len);
252b5132 7802 if (name == NULL)
b34976b6 7803 return FALSE;
d4c88bbb 7804 memcpy (name, buf, len);
252b5132 7805
117ed4f8 7806 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7807 if (sect == NULL)
b34976b6 7808 return FALSE;
252b5132
RH
7809
7810#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7811 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7812 sect->filepos = note->descpos
7813 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7814#endif
7815
7816#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7817 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7818 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7819#endif
7820
252b5132
RH
7821 sect->alignment_power = 2;
7822
7823 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7824 return FALSE;
252b5132
RH
7825
7826 /* Make a ".reg2/999" section */
7827
7828 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7829 len = strlen (buf) + 1;
217aa764 7830 name = bfd_alloc (abfd, len);
252b5132 7831 if (name == NULL)
b34976b6 7832 return FALSE;
d4c88bbb 7833 memcpy (name, buf, len);
252b5132 7834
117ed4f8 7835 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7836 if (sect == NULL)
b34976b6 7837 return FALSE;
252b5132
RH
7838
7839#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7840 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7841 sect->filepos = note->descpos
7842 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7843#endif
7844
7845#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7846 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7847 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7848#endif
7849
252b5132
RH
7850 sect->alignment_power = 2;
7851
936e320b 7852 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7853}
7854#endif /* defined (HAVE_LWPSTATUS_T) */
7855
b34976b6 7856static bfd_boolean
217aa764 7857elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7858{
7859 char buf[30];
c044fabd 7860 char *name;
d4c88bbb 7861 size_t len;
c044fabd 7862 asection *sect;
4a6636fb
PA
7863 int type;
7864 int is_active_thread;
7865 bfd_vma base_addr;
16e9c715 7866
4a6636fb 7867 if (note->descsz < 728)
b34976b6 7868 return TRUE;
16e9c715 7869
4a6636fb
PA
7870 if (! CONST_STRNEQ (note->namedata, "win32"))
7871 return TRUE;
7872
7873 type = bfd_get_32 (abfd, note->descdata);
c044fabd 7874
4a6636fb 7875 switch (type)
16e9c715 7876 {
4a6636fb 7877 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 7878 /* FIXME: need to add ->core_command. */
4a6636fb
PA
7879 /* process_info.pid */
7880 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
7881 /* process_info.signal */
7882 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 7883 break;
16e9c715 7884
4a6636fb 7885 case 2 /* NOTE_INFO_THREAD */:
16e9c715 7886 /* Make a ".reg/999" section. */
4a6636fb
PA
7887 /* thread_info.tid */
7888 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 7889
d4c88bbb 7890 len = strlen (buf) + 1;
a50b1753 7891 name = (char *) bfd_alloc (abfd, len);
16e9c715 7892 if (name == NULL)
b34976b6 7893 return FALSE;
c044fabd 7894
d4c88bbb 7895 memcpy (name, buf, len);
16e9c715 7896
117ed4f8 7897 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 7898 if (sect == NULL)
b34976b6 7899 return FALSE;
c044fabd 7900
4a6636fb
PA
7901 /* sizeof (thread_info.thread_context) */
7902 sect->size = 716;
7903 /* offsetof (thread_info.thread_context) */
7904 sect->filepos = note->descpos + 12;
16e9c715
NC
7905 sect->alignment_power = 2;
7906
4a6636fb
PA
7907 /* thread_info.is_active_thread */
7908 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
7909
7910 if (is_active_thread)
16e9c715 7911 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7912 return FALSE;
16e9c715
NC
7913 break;
7914
4a6636fb 7915 case 3 /* NOTE_INFO_MODULE */:
16e9c715 7916 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
7917 /* module_info.base_address */
7918 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 7919 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 7920
d4c88bbb 7921 len = strlen (buf) + 1;
a50b1753 7922 name = (char *) bfd_alloc (abfd, len);
16e9c715 7923 if (name == NULL)
b34976b6 7924 return FALSE;
c044fabd 7925
d4c88bbb 7926 memcpy (name, buf, len);
252b5132 7927
117ed4f8 7928 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 7929
16e9c715 7930 if (sect == NULL)
b34976b6 7931 return FALSE;
c044fabd 7932
eea6121a 7933 sect->size = note->descsz;
16e9c715 7934 sect->filepos = note->descpos;
16e9c715
NC
7935 sect->alignment_power = 2;
7936 break;
7937
7938 default:
b34976b6 7939 return TRUE;
16e9c715
NC
7940 }
7941
b34976b6 7942 return TRUE;
16e9c715 7943}
252b5132 7944
b34976b6 7945static bfd_boolean
217aa764 7946elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7947{
9c5bfbb7 7948 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7949
252b5132
RH
7950 switch (note->type)
7951 {
7952 default:
b34976b6 7953 return TRUE;
252b5132 7954
252b5132 7955 case NT_PRSTATUS:
bb0082d6
AM
7956 if (bed->elf_backend_grok_prstatus)
7957 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7958 return TRUE;
bb0082d6 7959#if defined (HAVE_PRSTATUS_T)
252b5132 7960 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7961#else
b34976b6 7962 return TRUE;
252b5132
RH
7963#endif
7964
7965#if defined (HAVE_PSTATUS_T)
7966 case NT_PSTATUS:
7967 return elfcore_grok_pstatus (abfd, note);
7968#endif
7969
7970#if defined (HAVE_LWPSTATUS_T)
7971 case NT_LWPSTATUS:
7972 return elfcore_grok_lwpstatus (abfd, note);
7973#endif
7974
7975 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7976 return elfcore_grok_prfpreg (abfd, note);
7977
c044fabd 7978 case NT_WIN32PSTATUS:
16e9c715 7979 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 7980
c044fabd 7981 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7982 if (note->namesz == 6
7983 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7984 return elfcore_grok_prxfpreg (abfd, note);
7985 else
b34976b6 7986 return TRUE;
ff08c6bb 7987
97753bd5
AM
7988 case NT_PPC_VMX:
7989 if (note->namesz == 6
7990 && strcmp (note->namedata, "LINUX") == 0)
7991 return elfcore_grok_ppc_vmx (abfd, note);
7992 else
7993 return TRUE;
7994
89eeb0bc
LM
7995 case NT_PPC_VSX:
7996 if (note->namesz == 6
7997 && strcmp (note->namedata, "LINUX") == 0)
7998 return elfcore_grok_ppc_vsx (abfd, note);
7999 else
8000 return TRUE;
8001
252b5132
RH
8002 case NT_PRPSINFO:
8003 case NT_PSINFO:
bb0082d6
AM
8004 if (bed->elf_backend_grok_psinfo)
8005 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8006 return TRUE;
bb0082d6 8007#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8008 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8009#else
b34976b6 8010 return TRUE;
252b5132 8011#endif
3333a7c3
RM
8012
8013 case NT_AUXV:
8014 {
117ed4f8
AM
8015 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8016 SEC_HAS_CONTENTS);
3333a7c3
RM
8017
8018 if (sect == NULL)
8019 return FALSE;
eea6121a 8020 sect->size = note->descsz;
3333a7c3 8021 sect->filepos = note->descpos;
3333a7c3
RM
8022 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8023
8024 return TRUE;
8025 }
252b5132
RH
8026 }
8027}
8028
718175fa
JK
8029static bfd_boolean
8030elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8031{
8032 elf_tdata (abfd)->build_id_size = note->descsz;
a50b1753 8033 elf_tdata (abfd)->build_id = (bfd_byte *) bfd_alloc (abfd, note->descsz);
718175fa
JK
8034 if (elf_tdata (abfd)->build_id == NULL)
8035 return FALSE;
8036
8037 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
8038
8039 return TRUE;
8040}
8041
8042static bfd_boolean
8043elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8044{
8045 switch (note->type)
8046 {
8047 default:
8048 return TRUE;
8049
8050 case NT_GNU_BUILD_ID:
8051 return elfobj_grok_gnu_build_id (abfd, note);
8052 }
8053}
8054
b34976b6 8055static bfd_boolean
217aa764 8056elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8057{
8058 char *cp;
8059
8060 cp = strchr (note->namedata, '@');
8061 if (cp != NULL)
8062 {
d2b64500 8063 *lwpidp = atoi(cp + 1);
b34976b6 8064 return TRUE;
50b2bdb7 8065 }
b34976b6 8066 return FALSE;
50b2bdb7
AM
8067}
8068
b34976b6 8069static bfd_boolean
217aa764 8070elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8071{
50b2bdb7
AM
8072 /* Signal number at offset 0x08. */
8073 elf_tdata (abfd)->core_signal
8074 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8075
8076 /* Process ID at offset 0x50. */
8077 elf_tdata (abfd)->core_pid
8078 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8079
8080 /* Command name at 0x7c (max 32 bytes, including nul). */
8081 elf_tdata (abfd)->core_command
8082 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8083
7720ba9f
MK
8084 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8085 note);
50b2bdb7
AM
8086}
8087
b34976b6 8088static bfd_boolean
217aa764 8089elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8090{
8091 int lwp;
8092
8093 if (elfcore_netbsd_get_lwpid (note, &lwp))
8094 elf_tdata (abfd)->core_lwpid = lwp;
8095
b4db1224 8096 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8097 {
8098 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8099 find this note before any of the others, which is fine,
8100 since the kernel writes this note out first when it
8101 creates a core file. */
47d9a591 8102
50b2bdb7
AM
8103 return elfcore_grok_netbsd_procinfo (abfd, note);
8104 }
8105
b4db1224
JT
8106 /* As of Jan 2002 there are no other machine-independent notes
8107 defined for NetBSD core files. If the note type is less
8108 than the start of the machine-dependent note types, we don't
8109 understand it. */
47d9a591 8110
b4db1224 8111 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8112 return TRUE;
50b2bdb7
AM
8113
8114
8115 switch (bfd_get_arch (abfd))
8116 {
08a40648
AM
8117 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8118 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8119
8120 case bfd_arch_alpha:
8121 case bfd_arch_sparc:
8122 switch (note->type)
08a40648
AM
8123 {
8124 case NT_NETBSDCORE_FIRSTMACH+0:
8125 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8126
08a40648
AM
8127 case NT_NETBSDCORE_FIRSTMACH+2:
8128 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8129
08a40648
AM
8130 default:
8131 return TRUE;
8132 }
50b2bdb7 8133
08a40648
AM
8134 /* On all other arch's, PT_GETREGS == mach+1 and
8135 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8136
8137 default:
8138 switch (note->type)
08a40648
AM
8139 {
8140 case NT_NETBSDCORE_FIRSTMACH+1:
8141 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8142
08a40648
AM
8143 case NT_NETBSDCORE_FIRSTMACH+3:
8144 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8145
08a40648
AM
8146 default:
8147 return TRUE;
8148 }
50b2bdb7
AM
8149 }
8150 /* NOTREACHED */
8151}
8152
67cc5033
MK
8153static bfd_boolean
8154elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8155{
8156 /* Signal number at offset 0x08. */
8157 elf_tdata (abfd)->core_signal
8158 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8159
8160 /* Process ID at offset 0x20. */
8161 elf_tdata (abfd)->core_pid
8162 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8163
8164 /* Command name at 0x48 (max 32 bytes, including nul). */
8165 elf_tdata (abfd)->core_command
8166 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8167
8168 return TRUE;
8169}
8170
8171static bfd_boolean
8172elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8173{
8174 if (note->type == NT_OPENBSD_PROCINFO)
8175 return elfcore_grok_openbsd_procinfo (abfd, note);
8176
8177 if (note->type == NT_OPENBSD_REGS)
8178 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8179
8180 if (note->type == NT_OPENBSD_FPREGS)
8181 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8182
8183 if (note->type == NT_OPENBSD_XFPREGS)
8184 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8185
8186 if (note->type == NT_OPENBSD_AUXV)
8187 {
8188 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8189 SEC_HAS_CONTENTS);
8190
8191 if (sect == NULL)
8192 return FALSE;
8193 sect->size = note->descsz;
8194 sect->filepos = note->descpos;
8195 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8196
8197 return TRUE;
8198 }
8199
8200 if (note->type == NT_OPENBSD_WCOOKIE)
8201 {
8202 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8203 SEC_HAS_CONTENTS);
8204
8205 if (sect == NULL)
8206 return FALSE;
8207 sect->size = note->descsz;
8208 sect->filepos = note->descpos;
8209 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8210
8211 return TRUE;
8212 }
8213
8214 return TRUE;
8215}
8216
07c6e936 8217static bfd_boolean
d3fd4074 8218elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8219{
8220 void *ddata = note->descdata;
8221 char buf[100];
8222 char *name;
8223 asection *sect;
f8843e87
AM
8224 short sig;
8225 unsigned flags;
07c6e936
NC
8226
8227 /* nto_procfs_status 'pid' field is at offset 0. */
8228 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8229
f8843e87
AM
8230 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8231 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8232
8233 /* nto_procfs_status 'flags' field is at offset 8. */
8234 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8235
8236 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8237 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8238 {
8239 elf_tdata (abfd)->core_signal = sig;
8240 elf_tdata (abfd)->core_lwpid = *tid;
8241 }
07c6e936 8242
f8843e87
AM
8243 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8244 do not come from signals so we make sure we set the current
8245 thread just in case. */
8246 if (flags & 0x00000080)
8247 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8248
8249 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8250 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8251
a50b1753 8252 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8253 if (name == NULL)
8254 return FALSE;
8255 strcpy (name, buf);
8256
117ed4f8 8257 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8258 if (sect == NULL)
8259 return FALSE;
8260
eea6121a 8261 sect->size = note->descsz;
07c6e936 8262 sect->filepos = note->descpos;
07c6e936
NC
8263 sect->alignment_power = 2;
8264
8265 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8266}
8267
8268static bfd_boolean
d69f560c
KW
8269elfcore_grok_nto_regs (bfd *abfd,
8270 Elf_Internal_Note *note,
d3fd4074 8271 long tid,
d69f560c 8272 char *base)
07c6e936
NC
8273{
8274 char buf[100];
8275 char *name;
8276 asection *sect;
8277
d69f560c 8278 /* Make a "(base)/%d" section. */
d3fd4074 8279 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8280
a50b1753 8281 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8282 if (name == NULL)
8283 return FALSE;
8284 strcpy (name, buf);
8285
117ed4f8 8286 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8287 if (sect == NULL)
8288 return FALSE;
8289
eea6121a 8290 sect->size = note->descsz;
07c6e936 8291 sect->filepos = note->descpos;
07c6e936
NC
8292 sect->alignment_power = 2;
8293
f8843e87
AM
8294 /* This is the current thread. */
8295 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8296 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8297
8298 return TRUE;
07c6e936
NC
8299}
8300
8301#define BFD_QNT_CORE_INFO 7
8302#define BFD_QNT_CORE_STATUS 8
8303#define BFD_QNT_CORE_GREG 9
8304#define BFD_QNT_CORE_FPREG 10
8305
8306static bfd_boolean
217aa764 8307elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8308{
8309 /* Every GREG section has a STATUS section before it. Store the
811072d8 8310 tid from the previous call to pass down to the next gregs
07c6e936 8311 function. */
d3fd4074 8312 static long tid = 1;
07c6e936
NC
8313
8314 switch (note->type)
8315 {
d69f560c
KW
8316 case BFD_QNT_CORE_INFO:
8317 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8318 case BFD_QNT_CORE_STATUS:
8319 return elfcore_grok_nto_status (abfd, note, &tid);
8320 case BFD_QNT_CORE_GREG:
8321 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8322 case BFD_QNT_CORE_FPREG:
8323 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8324 default:
8325 return TRUE;
07c6e936
NC
8326 }
8327}
8328
b15fa79e
AM
8329static bfd_boolean
8330elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8331{
8332 char *name;
8333 asection *sect;
8334 size_t len;
8335
8336 /* Use note name as section name. */
8337 len = note->namesz;
a50b1753 8338 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
8339 if (name == NULL)
8340 return FALSE;
8341 memcpy (name, note->namedata, len);
8342 name[len - 1] = '\0';
8343
8344 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8345 if (sect == NULL)
8346 return FALSE;
8347
8348 sect->size = note->descsz;
8349 sect->filepos = note->descpos;
8350 sect->alignment_power = 1;
8351
8352 return TRUE;
8353}
8354
7c76fa91
MS
8355/* Function: elfcore_write_note
8356
47d9a591 8357 Inputs:
a39f3346 8358 buffer to hold note, and current size of buffer
7c76fa91
MS
8359 name of note
8360 type of note
8361 data for note
8362 size of data for note
8363
a39f3346
AM
8364 Writes note to end of buffer. ELF64 notes are written exactly as
8365 for ELF32, despite the current (as of 2006) ELF gabi specifying
8366 that they ought to have 8-byte namesz and descsz field, and have
8367 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8368
7c76fa91 8369 Return:
a39f3346 8370 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8371
8372char *
a39f3346 8373elfcore_write_note (bfd *abfd,
217aa764 8374 char *buf,
a39f3346 8375 int *bufsiz,
217aa764 8376 const char *name,
a39f3346 8377 int type,
217aa764 8378 const void *input,
a39f3346 8379 int size)
7c76fa91
MS
8380{
8381 Elf_External_Note *xnp;
d4c88bbb 8382 size_t namesz;
d4c88bbb 8383 size_t newspace;
a39f3346 8384 char *dest;
7c76fa91 8385
d4c88bbb 8386 namesz = 0;
d4c88bbb 8387 if (name != NULL)
a39f3346 8388 namesz = strlen (name) + 1;
d4c88bbb 8389
a39f3346 8390 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 8391
a50b1753 8392 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
8393 if (buf == NULL)
8394 return buf;
a39f3346 8395 dest = buf + *bufsiz;
7c76fa91
MS
8396 *bufsiz += newspace;
8397 xnp = (Elf_External_Note *) dest;
8398 H_PUT_32 (abfd, namesz, xnp->namesz);
8399 H_PUT_32 (abfd, size, xnp->descsz);
8400 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8401 dest = xnp->name;
8402 if (name != NULL)
8403 {
8404 memcpy (dest, name, namesz);
8405 dest += namesz;
a39f3346 8406 while (namesz & 3)
d4c88bbb
AM
8407 {
8408 *dest++ = '\0';
a39f3346 8409 ++namesz;
d4c88bbb
AM
8410 }
8411 }
8412 memcpy (dest, input, size);
a39f3346
AM
8413 dest += size;
8414 while (size & 3)
8415 {
8416 *dest++ = '\0';
8417 ++size;
8418 }
8419 return buf;
7c76fa91
MS
8420}
8421
8422#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8423char *
217aa764
AM
8424elfcore_write_prpsinfo (bfd *abfd,
8425 char *buf,
8426 int *bufsiz,
8427 const char *fname,
8428 const char *psargs)
7c76fa91 8429{
183e98be
AM
8430 const char *note_name = "CORE";
8431 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8432
8433 if (bed->elf_backend_write_core_note != NULL)
8434 {
8435 char *ret;
8436 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8437 NT_PRPSINFO, fname, psargs);
8438 if (ret != NULL)
8439 return ret;
8440 }
7c76fa91 8441
183e98be
AM
8442#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
8443 if (bed->s->elfclass == ELFCLASS32)
8444 {
8445#if defined (HAVE_PSINFO32_T)
8446 psinfo32_t data;
8447 int note_type = NT_PSINFO;
8448#else
8449 prpsinfo32_t data;
8450 int note_type = NT_PRPSINFO;
8451#endif
8452
8453 memset (&data, 0, sizeof (data));
8454 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8455 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8456 return elfcore_write_note (abfd, buf, bufsiz,
8457 note_name, note_type, &data, sizeof (data));
8458 }
8459 else
8460#endif
8461 {
7c76fa91 8462#if defined (HAVE_PSINFO_T)
183e98be
AM
8463 psinfo_t data;
8464 int note_type = NT_PSINFO;
7c76fa91 8465#else
183e98be
AM
8466 prpsinfo_t data;
8467 int note_type = NT_PRPSINFO;
7c76fa91
MS
8468#endif
8469
183e98be
AM
8470 memset (&data, 0, sizeof (data));
8471 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8472 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8473 return elfcore_write_note (abfd, buf, bufsiz,
8474 note_name, note_type, &data, sizeof (data));
8475 }
7c76fa91
MS
8476}
8477#endif /* PSINFO_T or PRPSINFO_T */
8478
8479#if defined (HAVE_PRSTATUS_T)
8480char *
217aa764
AM
8481elfcore_write_prstatus (bfd *abfd,
8482 char *buf,
8483 int *bufsiz,
8484 long pid,
8485 int cursig,
8486 const void *gregs)
7c76fa91 8487{
183e98be
AM
8488 const char *note_name = "CORE";
8489 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8490
183e98be
AM
8491 if (bed->elf_backend_write_core_note != NULL)
8492 {
8493 char *ret;
8494 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8495 NT_PRSTATUS,
8496 pid, cursig, gregs);
8497 if (ret != NULL)
8498 return ret;
8499 }
8500
8501#if defined (HAVE_PRSTATUS32_T)
8502 if (bed->s->elfclass == ELFCLASS32)
8503 {
8504 prstatus32_t prstat;
8505
8506 memset (&prstat, 0, sizeof (prstat));
8507 prstat.pr_pid = pid;
8508 prstat.pr_cursig = cursig;
8509 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8510 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8511 NT_PRSTATUS, &prstat, sizeof (prstat));
8512 }
8513 else
8514#endif
8515 {
8516 prstatus_t prstat;
8517
8518 memset (&prstat, 0, sizeof (prstat));
8519 prstat.pr_pid = pid;
8520 prstat.pr_cursig = cursig;
8521 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8522 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8523 NT_PRSTATUS, &prstat, sizeof (prstat));
8524 }
7c76fa91
MS
8525}
8526#endif /* HAVE_PRSTATUS_T */
8527
51316059
MS
8528#if defined (HAVE_LWPSTATUS_T)
8529char *
217aa764
AM
8530elfcore_write_lwpstatus (bfd *abfd,
8531 char *buf,
8532 int *bufsiz,
8533 long pid,
8534 int cursig,
8535 const void *gregs)
51316059
MS
8536{
8537 lwpstatus_t lwpstat;
183e98be 8538 const char *note_name = "CORE";
51316059
MS
8539
8540 memset (&lwpstat, 0, sizeof (lwpstat));
8541 lwpstat.pr_lwpid = pid >> 16;
8542 lwpstat.pr_cursig = cursig;
8543#if defined (HAVE_LWPSTATUS_T_PR_REG)
8544 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8545#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8546#if !defined(gregs)
8547 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8548 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8549#else
8550 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8551 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8552#endif
8553#endif
47d9a591 8554 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8555 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8556}
8557#endif /* HAVE_LWPSTATUS_T */
8558
7c76fa91
MS
8559#if defined (HAVE_PSTATUS_T)
8560char *
217aa764
AM
8561elfcore_write_pstatus (bfd *abfd,
8562 char *buf,
8563 int *bufsiz,
8564 long pid,
6c10990d
NC
8565 int cursig ATTRIBUTE_UNUSED,
8566 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 8567{
183e98be
AM
8568 const char *note_name = "CORE";
8569#if defined (HAVE_PSTATUS32_T)
8570 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8571
183e98be
AM
8572 if (bed->s->elfclass == ELFCLASS32)
8573 {
8574 pstatus32_t pstat;
8575
8576 memset (&pstat, 0, sizeof (pstat));
8577 pstat.pr_pid = pid & 0xffff;
8578 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8579 NT_PSTATUS, &pstat, sizeof (pstat));
8580 return buf;
8581 }
8582 else
8583#endif
8584 {
8585 pstatus_t pstat;
8586
8587 memset (&pstat, 0, sizeof (pstat));
8588 pstat.pr_pid = pid & 0xffff;
8589 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8590 NT_PSTATUS, &pstat, sizeof (pstat));
8591 return buf;
8592 }
7c76fa91
MS
8593}
8594#endif /* HAVE_PSTATUS_T */
8595
8596char *
217aa764
AM
8597elfcore_write_prfpreg (bfd *abfd,
8598 char *buf,
8599 int *bufsiz,
8600 const void *fpregs,
8601 int size)
7c76fa91 8602{
183e98be 8603 const char *note_name = "CORE";
47d9a591 8604 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8605 note_name, NT_FPREGSET, fpregs, size);
8606}
8607
8608char *
217aa764
AM
8609elfcore_write_prxfpreg (bfd *abfd,
8610 char *buf,
8611 int *bufsiz,
8612 const void *xfpregs,
8613 int size)
7c76fa91
MS
8614{
8615 char *note_name = "LINUX";
47d9a591 8616 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8617 note_name, NT_PRXFPREG, xfpregs, size);
8618}
8619
97753bd5
AM
8620char *
8621elfcore_write_ppc_vmx (bfd *abfd,
8622 char *buf,
8623 int *bufsiz,
8624 const void *ppc_vmx,
8625 int size)
8626{
8627 char *note_name = "LINUX";
8628 return elfcore_write_note (abfd, buf, bufsiz,
8629 note_name, NT_PPC_VMX, ppc_vmx, size);
8630}
8631
89eeb0bc
LM
8632char *
8633elfcore_write_ppc_vsx (bfd *abfd,
8634 char *buf,
8635 int *bufsiz,
8636 const void *ppc_vsx,
8637 int size)
8638{
8639 char *note_name = "LINUX";
8640 return elfcore_write_note (abfd, buf, bufsiz,
8641 note_name, NT_PPC_VSX, ppc_vsx, size);
8642}
8643
bb864ac1
CES
8644char *
8645elfcore_write_register_note (bfd *abfd,
8646 char *buf,
8647 int *bufsiz,
8648 const char *section,
8649 const void *data,
8650 int size)
8651{
8652 if (strcmp (section, ".reg2") == 0)
8653 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
8654 if (strcmp (section, ".reg-xfp") == 0)
8655 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
8656 if (strcmp (section, ".reg-ppc-vmx") == 0)
8657 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
8658 if (strcmp (section, ".reg-ppc-vsx") == 0)
8659 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
bb864ac1
CES
8660 return NULL;
8661}
8662
b34976b6 8663static bfd_boolean
718175fa 8664elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 8665{
c044fabd 8666 char *p;
252b5132 8667
252b5132
RH
8668 p = buf;
8669 while (p < buf + size)
8670 {
c044fabd
KH
8671 /* FIXME: bad alignment assumption. */
8672 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8673 Elf_Internal_Note in;
8674
baea7ef1
AM
8675 if (offsetof (Elf_External_Note, name) > buf - p + size)
8676 return FALSE;
8677
dc810e39 8678 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8679
dc810e39 8680 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 8681 in.namedata = xnp->name;
baea7ef1
AM
8682 if (in.namesz > buf - in.namedata + size)
8683 return FALSE;
252b5132 8684
dc810e39 8685 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8686 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8687 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
8688 if (in.descsz != 0
8689 && (in.descdata >= buf + size
8690 || in.descsz > buf - in.descdata + size))
8691 return FALSE;
252b5132 8692
718175fa
JK
8693 switch (bfd_get_format (abfd))
8694 {
8695 default:
8696 return TRUE;
8697
8698 case bfd_core:
8699 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
8700 {
8701 if (! elfcore_grok_netbsd_note (abfd, &in))
8702 return FALSE;
8703 }
67cc5033
MK
8704 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
8705 {
8706 if (! elfcore_grok_openbsd_note (abfd, &in))
8707 return FALSE;
8708 }
718175fa
JK
8709 else if (CONST_STRNEQ (in.namedata, "QNX"))
8710 {
8711 if (! elfcore_grok_nto_note (abfd, &in))
8712 return FALSE;
8713 }
b15fa79e
AM
8714 else if (CONST_STRNEQ (in.namedata, "SPU/"))
8715 {
8716 if (! elfcore_grok_spu_note (abfd, &in))
8717 return FALSE;
8718 }
718175fa
JK
8719 else
8720 {
8721 if (! elfcore_grok_note (abfd, &in))
8722 return FALSE;
8723 }
8724 break;
8725
8726 case bfd_object:
8727 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
8728 {
8729 if (! elfobj_grok_gnu_note (abfd, &in))
8730 return FALSE;
8731 }
8732 break;
08a40648 8733 }
252b5132
RH
8734
8735 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8736 }
8737
718175fa
JK
8738 return TRUE;
8739}
8740
8741static bfd_boolean
8742elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
8743{
8744 char *buf;
8745
8746 if (size <= 0)
8747 return TRUE;
8748
8749 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
8750 return FALSE;
8751
a50b1753 8752 buf = (char *) bfd_malloc (size);
718175fa
JK
8753 if (buf == NULL)
8754 return FALSE;
8755
8756 if (bfd_bread (buf, size, abfd) != size
8757 || !elf_parse_notes (abfd, buf, size, offset))
8758 {
8759 free (buf);
8760 return FALSE;
8761 }
8762
252b5132 8763 free (buf);
b34976b6 8764 return TRUE;
252b5132 8765}
98d8431c
JB
8766\f
8767/* Providing external access to the ELF program header table. */
8768
8769/* Return an upper bound on the number of bytes required to store a
8770 copy of ABFD's program header table entries. Return -1 if an error
8771 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8772
98d8431c 8773long
217aa764 8774bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8775{
8776 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8777 {
8778 bfd_set_error (bfd_error_wrong_format);
8779 return -1;
8780 }
8781
936e320b 8782 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8783}
8784
98d8431c
JB
8785/* Copy ABFD's program header table entries to *PHDRS. The entries
8786 will be stored as an array of Elf_Internal_Phdr structures, as
8787 defined in include/elf/internal.h. To find out how large the
8788 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
8789
8790 Return the number of program header table entries read, or -1 if an
8791 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 8792
98d8431c 8793int
217aa764 8794bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
8795{
8796 int num_phdrs;
8797
8798 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8799 {
8800 bfd_set_error (bfd_error_wrong_format);
8801 return -1;
8802 }
8803
8804 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8805 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8806 num_phdrs * sizeof (Elf_Internal_Phdr));
8807
8808 return num_phdrs;
8809}
ae4221d7 8810
db6751f2 8811enum elf_reloc_type_class
217aa764 8812_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8813{
8814 return reloc_class_normal;
8815}
f8df10f4 8816
47d9a591 8817/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8818 relocation against a local symbol. */
8819
8820bfd_vma
217aa764
AM
8821_bfd_elf_rela_local_sym (bfd *abfd,
8822 Elf_Internal_Sym *sym,
8517fae7 8823 asection **psec,
217aa764 8824 Elf_Internal_Rela *rel)
f8df10f4 8825{
8517fae7 8826 asection *sec = *psec;
f8df10f4
JJ
8827 bfd_vma relocation;
8828
8829 relocation = (sec->output_section->vma
8830 + sec->output_offset
8831 + sym->st_value);
8832 if ((sec->flags & SEC_MERGE)
c629eae0 8833 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8834 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8835 {
f8df10f4 8836 rel->r_addend =
8517fae7 8837 _bfd_merged_section_offset (abfd, psec,
65765700 8838 elf_section_data (sec)->sec_info,
753731ee
AM
8839 sym->st_value + rel->r_addend);
8840 if (sec != *psec)
8841 {
8842 /* If we have changed the section, and our original section is
8843 marked with SEC_EXCLUDE, it means that the original
8844 SEC_MERGE section has been completely subsumed in some
8845 other SEC_MERGE section. In this case, we need to leave
8846 some info around for --emit-relocs. */
8847 if ((sec->flags & SEC_EXCLUDE) != 0)
8848 sec->kept_section = *psec;
8849 sec = *psec;
8850 }
8517fae7
AM
8851 rel->r_addend -= relocation;
8852 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8853 }
8854 return relocation;
8855}
c629eae0
JJ
8856
8857bfd_vma
217aa764
AM
8858_bfd_elf_rel_local_sym (bfd *abfd,
8859 Elf_Internal_Sym *sym,
8860 asection **psec,
8861 bfd_vma addend)
47d9a591 8862{
c629eae0
JJ
8863 asection *sec = *psec;
8864
68bfbfcc 8865 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8866 return sym->st_value + addend;
8867
8868 return _bfd_merged_section_offset (abfd, psec,
65765700 8869 elf_section_data (sec)->sec_info,
753731ee 8870 sym->st_value + addend);
c629eae0
JJ
8871}
8872
8873bfd_vma
217aa764 8874_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8875 struct bfd_link_info *info,
217aa764
AM
8876 asection *sec,
8877 bfd_vma offset)
c629eae0 8878{
68bfbfcc 8879 switch (sec->sec_info_type)
65765700
JJ
8880 {
8881 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8882 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8883 offset);
65765700 8884 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8885 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8886 default:
8887 return offset;
8888 }
c629eae0 8889}
3333a7c3
RM
8890\f
8891/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8892 reconstruct an ELF file by reading the segments out of remote memory
8893 based on the ELF file header at EHDR_VMA and the ELF program headers it
8894 points to. If not null, *LOADBASEP is filled in with the difference
8895 between the VMAs from which the segments were read, and the VMAs the
8896 file headers (and hence BFD's idea of each section's VMA) put them at.
8897
8898 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8899 remote memory at target address VMA into the local buffer at MYADDR; it
8900 should return zero on success or an `errno' code on failure. TEMPL must
8901 be a BFD for an ELF target with the word size and byte order found in
8902 the remote memory. */
8903
8904bfd *
217aa764
AM
8905bfd_elf_bfd_from_remote_memory
8906 (bfd *templ,
8907 bfd_vma ehdr_vma,
8908 bfd_vma *loadbasep,
f075ee0c 8909 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8910{
8911 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8912 (templ, ehdr_vma, loadbasep, target_read_memory);
8913}
4c45e5c9
JJ
8914\f
8915long
c9727e01
AM
8916_bfd_elf_get_synthetic_symtab (bfd *abfd,
8917 long symcount ATTRIBUTE_UNUSED,
8918 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8919 long dynsymcount,
c9727e01
AM
8920 asymbol **dynsyms,
8921 asymbol **ret)
4c45e5c9
JJ
8922{
8923 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8924 asection *relplt;
8925 asymbol *s;
8926 const char *relplt_name;
8927 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8928 arelent *p;
8929 long count, i, n;
8930 size_t size;
8931 Elf_Internal_Shdr *hdr;
8932 char *names;
8933 asection *plt;
8934
8615f3f2
AM
8935 *ret = NULL;
8936
90e3cdf2
JJ
8937 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8938 return 0;
8939
8615f3f2
AM
8940 if (dynsymcount <= 0)
8941 return 0;
8942
4c45e5c9
JJ
8943 if (!bed->plt_sym_val)
8944 return 0;
8945
8946 relplt_name = bed->relplt_name;
8947 if (relplt_name == NULL)
d35fd659 8948 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
8949 relplt = bfd_get_section_by_name (abfd, relplt_name);
8950 if (relplt == NULL)
8951 return 0;
8952
8953 hdr = &elf_section_data (relplt)->this_hdr;
8954 if (hdr->sh_link != elf_dynsymtab (abfd)
8955 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8956 return 0;
8957
8958 plt = bfd_get_section_by_name (abfd, ".plt");
8959 if (plt == NULL)
8960 return 0;
8961
8962 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8963 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8964 return -1;
8965
eea6121a 8966 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8967 size = count * sizeof (asymbol);
8968 p = relplt->relocation;
cb53bf42 8969 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
8970 {
8971 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8972 if (p->addend != 0)
8973 {
8974#ifdef BFD64
8975 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
8976#else
8977 size += sizeof ("+0x") - 1 + 8;
8978#endif
8979 }
8980 }
4c45e5c9 8981
a50b1753 8982 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
8983 if (s == NULL)
8984 return -1;
8985
8986 names = (char *) (s + count);
8987 p = relplt->relocation;
8988 n = 0;
cb53bf42 8989 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
8990 {
8991 size_t len;
8992 bfd_vma addr;
8993
8994 addr = bed->plt_sym_val (i, plt, p);
8995 if (addr == (bfd_vma) -1)
8996 continue;
8997
8998 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8999 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
9000 we are defining a symbol, ensure one of them is set. */
9001 if ((s->flags & BSF_LOCAL) == 0)
9002 s->flags |= BSF_GLOBAL;
6ba2a415 9003 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
9004 s->section = plt;
9005 s->value = addr - plt->vma;
9006 s->name = names;
8f39ba8e 9007 s->udata.p = NULL;
4c45e5c9
JJ
9008 len = strlen ((*p->sym_ptr_ptr)->name);
9009 memcpy (names, (*p->sym_ptr_ptr)->name, len);
9010 names += len;
041de40d
AM
9011 if (p->addend != 0)
9012 {
1d770845 9013 char buf[30], *a;
91d6fa6a 9014
041de40d
AM
9015 memcpy (names, "+0x", sizeof ("+0x") - 1);
9016 names += sizeof ("+0x") - 1;
1d770845
L
9017 bfd_sprintf_vma (abfd, buf, p->addend);
9018 for (a = buf; *a == '0'; ++a)
9019 ;
9020 len = strlen (a);
9021 memcpy (names, a, len);
9022 names += len;
041de40d 9023 }
4c45e5c9
JJ
9024 memcpy (names, "@plt", sizeof ("@plt"));
9025 names += sizeof ("@plt");
8f39ba8e 9026 ++s, ++n;
4c45e5c9
JJ
9027 }
9028
9029 return n;
9030}
3d7f7666 9031
3b22753a
L
9032/* It is only used by x86-64 so far. */
9033asection _bfd_elf_large_com_section
9034 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 9035 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 9036
d1036acb
L
9037void
9038_bfd_elf_set_osabi (bfd * abfd,
9039 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
9040{
9041 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
9042
9043 i_ehdrp = elf_elfheader (abfd);
9044
9045 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
9046
9047 /* To make things simpler for the loader on Linux systems we set the
9048 osabi field to ELFOSABI_LINUX if the binary contains symbols of
9049 the STT_GNU_IFUNC type. */
9050 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
9051 && elf_tdata (abfd)->has_ifunc_symbols)
9052 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
d1036acb 9053}
fcb93ecf
PB
9054
9055
9056/* Return TRUE for ELF symbol types that represent functions.
9057 This is the default version of this function, which is sufficient for
d8045f23 9058 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
9059
9060bfd_boolean
9061_bfd_elf_is_function_type (unsigned int type)
9062{
d8045f23
NC
9063 return (type == STT_FUNC
9064 || type == STT_GNU_IFUNC);
fcb93ecf 9065}