]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
* elf32-spu.c (spu_elf_size_stubs): Do set up soft-icache manager
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
72a80a16
AM
4 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009
5 Free Software Foundation, Inc.
252b5132 6
5e8d7549 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
5e8d7549
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
5e8d7549 12 (at your option) any later version.
252b5132 13
5e8d7549
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
5e8d7549 19 You should have received a copy of the GNU General Public License
b34976b6 20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
23
252b5132 24
1b74d094
BW
25/*
26SECTION
252b5132
RH
27 ELF backends
28
29 BFD support for ELF formats is being worked on.
30 Currently, the best supported back ends are for sparc and i386
31 (running svr4 or Solaris 2).
32
33 Documentation of the internals of the support code still needs
34 to be written. The code is changing quickly enough that we
661a3fd4 35 haven't bothered yet. */
252b5132 36
7ee38065
MS
37/* For sparc64-cross-sparc32. */
38#define _SYSCALL32
252b5132 39#include "sysdep.h"
3db64b00 40#include "bfd.h"
252b5132
RH
41#include "bfdlink.h"
42#include "libbfd.h"
43#define ARCH_SIZE 0
44#include "elf-bfd.h"
e0e8c97f 45#include "libiberty.h"
ff59fc36 46#include "safe-ctype.h"
252b5132 47
217aa764 48static int elf_sort_sections (const void *, const void *);
c84fca4d 49static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
50static bfd_boolean prep_headers (bfd *);
51static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
52static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
53static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
54 file_ptr offset);
50b2bdb7 55
252b5132
RH
56/* Swap version information in and out. The version information is
57 currently size independent. If that ever changes, this code will
58 need to move into elfcode.h. */
59
60/* Swap in a Verdef structure. */
61
62void
217aa764
AM
63_bfd_elf_swap_verdef_in (bfd *abfd,
64 const Elf_External_Verdef *src,
65 Elf_Internal_Verdef *dst)
252b5132 66{
dc810e39
AM
67 dst->vd_version = H_GET_16 (abfd, src->vd_version);
68 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
69 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
70 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
71 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
72 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
73 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
74}
75
76/* Swap out a Verdef structure. */
77
78void
217aa764
AM
79_bfd_elf_swap_verdef_out (bfd *abfd,
80 const Elf_Internal_Verdef *src,
81 Elf_External_Verdef *dst)
252b5132 82{
dc810e39
AM
83 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
84 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
85 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
86 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
87 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
88 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
89 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
90}
91
92/* Swap in a Verdaux structure. */
93
94void
217aa764
AM
95_bfd_elf_swap_verdaux_in (bfd *abfd,
96 const Elf_External_Verdaux *src,
97 Elf_Internal_Verdaux *dst)
252b5132 98{
dc810e39
AM
99 dst->vda_name = H_GET_32 (abfd, src->vda_name);
100 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
101}
102
103/* Swap out a Verdaux structure. */
104
105void
217aa764
AM
106_bfd_elf_swap_verdaux_out (bfd *abfd,
107 const Elf_Internal_Verdaux *src,
108 Elf_External_Verdaux *dst)
252b5132 109{
dc810e39
AM
110 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
111 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
112}
113
114/* Swap in a Verneed structure. */
115
116void
217aa764
AM
117_bfd_elf_swap_verneed_in (bfd *abfd,
118 const Elf_External_Verneed *src,
119 Elf_Internal_Verneed *dst)
252b5132 120{
dc810e39
AM
121 dst->vn_version = H_GET_16 (abfd, src->vn_version);
122 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
123 dst->vn_file = H_GET_32 (abfd, src->vn_file);
124 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
125 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
126}
127
128/* Swap out a Verneed structure. */
129
130void
217aa764
AM
131_bfd_elf_swap_verneed_out (bfd *abfd,
132 const Elf_Internal_Verneed *src,
133 Elf_External_Verneed *dst)
252b5132 134{
dc810e39
AM
135 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
136 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
137 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
138 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
139 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
140}
141
142/* Swap in a Vernaux structure. */
143
144void
217aa764
AM
145_bfd_elf_swap_vernaux_in (bfd *abfd,
146 const Elf_External_Vernaux *src,
147 Elf_Internal_Vernaux *dst)
252b5132 148{
dc810e39
AM
149 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
150 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
151 dst->vna_other = H_GET_16 (abfd, src->vna_other);
152 dst->vna_name = H_GET_32 (abfd, src->vna_name);
153 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
154}
155
156/* Swap out a Vernaux structure. */
157
158void
217aa764
AM
159_bfd_elf_swap_vernaux_out (bfd *abfd,
160 const Elf_Internal_Vernaux *src,
161 Elf_External_Vernaux *dst)
252b5132 162{
dc810e39
AM
163 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
164 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
165 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
166 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
167 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
168}
169
170/* Swap in a Versym structure. */
171
172void
217aa764
AM
173_bfd_elf_swap_versym_in (bfd *abfd,
174 const Elf_External_Versym *src,
175 Elf_Internal_Versym *dst)
252b5132 176{
dc810e39 177 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
178}
179
180/* Swap out a Versym structure. */
181
182void
217aa764
AM
183_bfd_elf_swap_versym_out (bfd *abfd,
184 const Elf_Internal_Versym *src,
185 Elf_External_Versym *dst)
252b5132 186{
dc810e39 187 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
188}
189
190/* Standard ELF hash function. Do not change this function; you will
191 cause invalid hash tables to be generated. */
3a99b017 192
252b5132 193unsigned long
217aa764 194bfd_elf_hash (const char *namearg)
252b5132 195{
3a99b017 196 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
197 unsigned long h = 0;
198 unsigned long g;
199 int ch;
200
201 while ((ch = *name++) != '\0')
202 {
203 h = (h << 4) + ch;
204 if ((g = (h & 0xf0000000)) != 0)
205 {
206 h ^= g >> 24;
207 /* The ELF ABI says `h &= ~g', but this is equivalent in
208 this case and on some machines one insn instead of two. */
209 h ^= g;
210 }
211 }
32dfa85d 212 return h & 0xffffffff;
252b5132
RH
213}
214
fdc90cb4
JJ
215/* DT_GNU_HASH hash function. Do not change this function; you will
216 cause invalid hash tables to be generated. */
217
218unsigned long
219bfd_elf_gnu_hash (const char *namearg)
220{
221 const unsigned char *name = (const unsigned char *) namearg;
222 unsigned long h = 5381;
223 unsigned char ch;
224
225 while ((ch = *name++) != '\0')
226 h = (h << 5) + h + ch;
227 return h & 0xffffffff;
228}
229
0c8d6e5c
AM
230/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
231 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 232bfd_boolean
0c8d6e5c 233bfd_elf_allocate_object (bfd *abfd,
0ffa91dd
NC
234 size_t object_size,
235 enum elf_object_id object_id)
252b5132 236{
0ffa91dd
NC
237 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
238 abfd->tdata.any = bfd_zalloc (abfd, object_size);
239 if (abfd->tdata.any == NULL)
240 return FALSE;
252b5132 241
0ffa91dd
NC
242 elf_object_id (abfd) = object_id;
243 elf_program_header_size (abfd) = (bfd_size_type) -1;
b34976b6 244 return TRUE;
252b5132
RH
245}
246
0ffa91dd
NC
247
248bfd_boolean
249bfd_elf_make_generic_object (bfd *abfd)
250{
251 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
252 GENERIC_ELF_TDATA);
253}
254
b34976b6 255bfd_boolean
217aa764 256bfd_elf_mkcorefile (bfd *abfd)
252b5132 257{
c044fabd 258 /* I think this can be done just like an object file. */
0ffa91dd 259 return bfd_elf_make_generic_object (abfd);
252b5132
RH
260}
261
72a80a16 262static char *
217aa764 263bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
264{
265 Elf_Internal_Shdr **i_shdrp;
f075ee0c 266 bfd_byte *shstrtab = NULL;
dc810e39
AM
267 file_ptr offset;
268 bfd_size_type shstrtabsize;
252b5132
RH
269
270 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
271 if (i_shdrp == 0
272 || shindex >= elf_numsections (abfd)
273 || i_shdrp[shindex] == 0)
f075ee0c 274 return NULL;
252b5132 275
f075ee0c 276 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
277 if (shstrtab == NULL)
278 {
c044fabd 279 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
280 offset = i_shdrp[shindex]->sh_offset;
281 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
282
283 /* Allocate and clear an extra byte at the end, to prevent crashes
284 in case the string table is not terminated. */
3471d59d 285 if (shstrtabsize + 1 <= 1
c6c60d09
JJ
286 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
287 || bfd_seek (abfd, offset, SEEK_SET) != 0)
288 shstrtab = NULL;
289 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
290 {
291 if (bfd_get_error () != bfd_error_system_call)
292 bfd_set_error (bfd_error_file_truncated);
293 shstrtab = NULL;
3471d59d
CC
294 /* Once we've failed to read it, make sure we don't keep
295 trying. Otherwise, we'll keep allocating space for
296 the string table over and over. */
297 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
298 }
299 else
300 shstrtab[shstrtabsize] = '\0';
217aa764 301 i_shdrp[shindex]->contents = shstrtab;
252b5132 302 }
f075ee0c 303 return (char *) shstrtab;
252b5132
RH
304}
305
306char *
217aa764
AM
307bfd_elf_string_from_elf_section (bfd *abfd,
308 unsigned int shindex,
309 unsigned int strindex)
252b5132
RH
310{
311 Elf_Internal_Shdr *hdr;
312
313 if (strindex == 0)
314 return "";
315
74f2e02b
AM
316 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
317 return NULL;
318
252b5132
RH
319 hdr = elf_elfsections (abfd)[shindex];
320
321 if (hdr->contents == NULL
322 && bfd_elf_get_str_section (abfd, shindex) == NULL)
323 return NULL;
324
325 if (strindex >= hdr->sh_size)
326 {
1b3a8575 327 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 328 (*_bfd_error_handler)
d003868e
AM
329 (_("%B: invalid string offset %u >= %lu for section `%s'"),
330 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 331 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 332 ? ".shstrtab"
1b3a8575 333 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
334 return "";
335 }
336
337 return ((char *) hdr->contents) + strindex;
338}
339
6cdc0ccc
AM
340/* Read and convert symbols to internal format.
341 SYMCOUNT specifies the number of symbols to read, starting from
342 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
343 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
344 symbols, and symbol section index extensions, respectively.
345 Returns a pointer to the internal symbol buffer (malloced if necessary)
346 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
347
348Elf_Internal_Sym *
217aa764
AM
349bfd_elf_get_elf_syms (bfd *ibfd,
350 Elf_Internal_Shdr *symtab_hdr,
351 size_t symcount,
352 size_t symoffset,
353 Elf_Internal_Sym *intsym_buf,
354 void *extsym_buf,
355 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
356{
357 Elf_Internal_Shdr *shndx_hdr;
217aa764 358 void *alloc_ext;
df622259 359 const bfd_byte *esym;
6cdc0ccc
AM
360 Elf_External_Sym_Shndx *alloc_extshndx;
361 Elf_External_Sym_Shndx *shndx;
4dd07732 362 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
363 Elf_Internal_Sym *isym;
364 Elf_Internal_Sym *isymend;
9c5bfbb7 365 const struct elf_backend_data *bed;
6cdc0ccc
AM
366 size_t extsym_size;
367 bfd_size_type amt;
368 file_ptr pos;
369
e44a2c9c
AM
370 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
371 abort ();
372
6cdc0ccc
AM
373 if (symcount == 0)
374 return intsym_buf;
375
376 /* Normal syms might have section extension entries. */
377 shndx_hdr = NULL;
378 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
379 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
380
381 /* Read the symbols. */
382 alloc_ext = NULL;
383 alloc_extshndx = NULL;
4dd07732 384 alloc_intsym = NULL;
6cdc0ccc
AM
385 bed = get_elf_backend_data (ibfd);
386 extsym_size = bed->s->sizeof_sym;
387 amt = symcount * extsym_size;
388 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
389 if (extsym_buf == NULL)
390 {
d0fb9a8d 391 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
392 extsym_buf = alloc_ext;
393 }
394 if (extsym_buf == NULL
395 || bfd_seek (ibfd, pos, SEEK_SET) != 0
396 || bfd_bread (extsym_buf, amt, ibfd) != amt)
397 {
398 intsym_buf = NULL;
399 goto out;
400 }
401
402 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
403 extshndx_buf = NULL;
404 else
405 {
406 amt = symcount * sizeof (Elf_External_Sym_Shndx);
407 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
408 if (extshndx_buf == NULL)
409 {
d0fb9a8d
JJ
410 alloc_extshndx = bfd_malloc2 (symcount,
411 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
412 extshndx_buf = alloc_extshndx;
413 }
414 if (extshndx_buf == NULL
415 || bfd_seek (ibfd, pos, SEEK_SET) != 0
416 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
417 {
418 intsym_buf = NULL;
419 goto out;
420 }
421 }
422
423 if (intsym_buf == NULL)
424 {
4dd07732
AM
425 alloc_intsym = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
426 intsym_buf = alloc_intsym;
6cdc0ccc
AM
427 if (intsym_buf == NULL)
428 goto out;
429 }
430
431 /* Convert the symbols to internal form. */
432 isymend = intsym_buf + symcount;
433 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
434 isym < isymend;
435 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
436 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
437 {
438 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
439 (*_bfd_error_handler) (_("%B symbol number %lu references "
440 "nonexistent SHT_SYMTAB_SHNDX section"),
441 ibfd, (unsigned long) symoffset);
4dd07732
AM
442 if (alloc_intsym != NULL)
443 free (alloc_intsym);
8384fb8f
AM
444 intsym_buf = NULL;
445 goto out;
446 }
6cdc0ccc
AM
447
448 out:
449 if (alloc_ext != NULL)
450 free (alloc_ext);
451 if (alloc_extshndx != NULL)
452 free (alloc_extshndx);
453
454 return intsym_buf;
455}
456
5cab59f6
AM
457/* Look up a symbol name. */
458const char *
be8dd2ca
AM
459bfd_elf_sym_name (bfd *abfd,
460 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
461 Elf_Internal_Sym *isym,
462 asection *sym_sec)
5cab59f6 463{
26c61ae5 464 const char *name;
5cab59f6 465 unsigned int iname = isym->st_name;
be8dd2ca 466 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 467
138f35cc
JJ
468 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
469 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 470 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
471 {
472 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
473 shindex = elf_elfheader (abfd)->e_shstrndx;
474 }
475
26c61ae5
L
476 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
477 if (name == NULL)
478 name = "(null)";
479 else if (sym_sec && *name == '\0')
480 name = bfd_section_name (abfd, sym_sec);
481
482 return name;
5cab59f6
AM
483}
484
dbb410c3
AM
485/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
486 sections. The first element is the flags, the rest are section
487 pointers. */
488
489typedef union elf_internal_group {
490 Elf_Internal_Shdr *shdr;
491 unsigned int flags;
492} Elf_Internal_Group;
493
b885599b
AM
494/* Return the name of the group signature symbol. Why isn't the
495 signature just a string? */
496
497static const char *
217aa764 498group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 499{
9dce4196 500 Elf_Internal_Shdr *hdr;
9dce4196
AM
501 unsigned char esym[sizeof (Elf64_External_Sym)];
502 Elf_External_Sym_Shndx eshndx;
503 Elf_Internal_Sym isym;
b885599b 504
13792e9d
L
505 /* First we need to ensure the symbol table is available. Make sure
506 that it is a symbol table section. */
4fbb74a6
AM
507 if (ghdr->sh_link >= elf_numsections (abfd))
508 return NULL;
13792e9d
L
509 hdr = elf_elfsections (abfd) [ghdr->sh_link];
510 if (hdr->sh_type != SHT_SYMTAB
511 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
512 return NULL;
513
9dce4196
AM
514 /* Go read the symbol. */
515 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
516 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
517 &isym, esym, &eshndx) == NULL)
b885599b 518 return NULL;
9dce4196 519
26c61ae5 520 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
521}
522
dbb410c3
AM
523/* Set next_in_group list pointer, and group name for NEWSECT. */
524
b34976b6 525static bfd_boolean
217aa764 526setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
527{
528 unsigned int num_group = elf_tdata (abfd)->num_group;
529
530 /* If num_group is zero, read in all SHT_GROUP sections. The count
531 is set to -1 if there are no SHT_GROUP sections. */
532 if (num_group == 0)
533 {
534 unsigned int i, shnum;
535
536 /* First count the number of groups. If we have a SHT_GROUP
537 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 538 shnum = elf_numsections (abfd);
dbb410c3 539 num_group = 0;
08a40648 540
1783205a
NC
541#define IS_VALID_GROUP_SECTION_HEADER(shdr) \
542 ( (shdr)->sh_type == SHT_GROUP \
543 && (shdr)->sh_size >= (2 * GRP_ENTRY_SIZE) \
544 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
545 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 546
dbb410c3
AM
547 for (i = 0; i < shnum; i++)
548 {
549 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
550
551 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3
AM
552 num_group += 1;
553 }
554
555 if (num_group == 0)
20dbb49d
L
556 {
557 num_group = (unsigned) -1;
558 elf_tdata (abfd)->num_group = num_group;
559 }
560 else
dbb410c3
AM
561 {
562 /* We keep a list of elf section headers for group sections,
563 so we can find them quickly. */
20dbb49d 564 bfd_size_type amt;
d0fb9a8d 565
20dbb49d 566 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
567 elf_tdata (abfd)->group_sect_ptr
568 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 569 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 570 return FALSE;
dbb410c3
AM
571
572 num_group = 0;
573 for (i = 0; i < shnum; i++)
574 {
575 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
576
577 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3 578 {
973ffd63 579 unsigned char *src;
dbb410c3
AM
580 Elf_Internal_Group *dest;
581
582 /* Add to list of sections. */
583 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
584 num_group += 1;
585
586 /* Read the raw contents. */
587 BFD_ASSERT (sizeof (*dest) >= 4);
588 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
589 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
590 sizeof (*dest) / 4);
1783205a
NC
591 /* PR binutils/4110: Handle corrupt group headers. */
592 if (shdr->contents == NULL)
593 {
594 _bfd_error_handler
595 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
596 bfd_set_error (bfd_error_bad_value);
597 return FALSE;
598 }
599
600 memset (shdr->contents, 0, amt);
601
602 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
603 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
604 != shdr->sh_size))
b34976b6 605 return FALSE;
dbb410c3
AM
606
607 /* Translate raw contents, a flag word followed by an
608 array of elf section indices all in target byte order,
609 to the flag word followed by an array of elf section
610 pointers. */
611 src = shdr->contents + shdr->sh_size;
612 dest = (Elf_Internal_Group *) (shdr->contents + amt);
613 while (1)
614 {
615 unsigned int idx;
616
617 src -= 4;
618 --dest;
619 idx = H_GET_32 (abfd, src);
620 if (src == shdr->contents)
621 {
622 dest->flags = idx;
b885599b
AM
623 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
624 shdr->bfd_section->flags
625 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
626 break;
627 }
628 if (idx >= shnum)
629 {
630 ((*_bfd_error_handler)
d003868e 631 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
632 idx = 0;
633 }
634 dest->shdr = elf_elfsections (abfd)[idx];
635 }
636 }
637 }
638 }
639 }
640
641 if (num_group != (unsigned) -1)
642 {
643 unsigned int i;
644
645 for (i = 0; i < num_group; i++)
646 {
647 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
648 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
649 unsigned int n_elt = shdr->sh_size / 4;
650
651 /* Look through this group's sections to see if current
652 section is a member. */
653 while (--n_elt != 0)
654 if ((++idx)->shdr == hdr)
655 {
e0e8c97f 656 asection *s = NULL;
dbb410c3
AM
657
658 /* We are a member of this group. Go looking through
659 other members to see if any others are linked via
660 next_in_group. */
661 idx = (Elf_Internal_Group *) shdr->contents;
662 n_elt = shdr->sh_size / 4;
663 while (--n_elt != 0)
664 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 665 && elf_next_in_group (s) != NULL)
dbb410c3
AM
666 break;
667 if (n_elt != 0)
668 {
dbb410c3
AM
669 /* Snarf the group name from other member, and
670 insert current section in circular list. */
945906ff
AM
671 elf_group_name (newsect) = elf_group_name (s);
672 elf_next_in_group (newsect) = elf_next_in_group (s);
673 elf_next_in_group (s) = newsect;
dbb410c3
AM
674 }
675 else
676 {
dbb410c3
AM
677 const char *gname;
678
b885599b
AM
679 gname = group_signature (abfd, shdr);
680 if (gname == NULL)
b34976b6 681 return FALSE;
945906ff 682 elf_group_name (newsect) = gname;
dbb410c3
AM
683
684 /* Start a circular list with one element. */
945906ff 685 elf_next_in_group (newsect) = newsect;
dbb410c3 686 }
b885599b 687
9dce4196
AM
688 /* If the group section has been created, point to the
689 new member. */
dbb410c3 690 if (shdr->bfd_section != NULL)
945906ff 691 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 692
dbb410c3
AM
693 i = num_group - 1;
694 break;
695 }
696 }
697 }
698
945906ff 699 if (elf_group_name (newsect) == NULL)
dbb410c3 700 {
d003868e
AM
701 (*_bfd_error_handler) (_("%B: no group info for section %A"),
702 abfd, newsect);
dbb410c3 703 }
b34976b6 704 return TRUE;
dbb410c3
AM
705}
706
3d7f7666 707bfd_boolean
dd863624 708_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
709{
710 unsigned int i;
711 unsigned int num_group = elf_tdata (abfd)->num_group;
712 bfd_boolean result = TRUE;
dd863624
L
713 asection *s;
714
715 /* Process SHF_LINK_ORDER. */
716 for (s = abfd->sections; s != NULL; s = s->next)
717 {
718 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
719 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
720 {
721 unsigned int elfsec = this_hdr->sh_link;
722 /* FIXME: The old Intel compiler and old strip/objcopy may
723 not set the sh_link or sh_info fields. Hence we could
724 get the situation where elfsec is 0. */
725 if (elfsec == 0)
726 {
4fbb74a6 727 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
728 if (bed->link_order_error_handler)
729 bed->link_order_error_handler
730 (_("%B: warning: sh_link not set for section `%A'"),
731 abfd, s);
732 }
733 else
734 {
4fbb74a6 735 asection *link = NULL;
25bbc984 736
4fbb74a6
AM
737 if (elfsec < elf_numsections (abfd))
738 {
739 this_hdr = elf_elfsections (abfd)[elfsec];
740 link = this_hdr->bfd_section;
741 }
25bbc984
L
742
743 /* PR 1991, 2008:
744 Some strip/objcopy may leave an incorrect value in
745 sh_link. We don't want to proceed. */
25bbc984
L
746 if (link == NULL)
747 {
748 (*_bfd_error_handler)
749 (_("%B: sh_link [%d] in section `%A' is incorrect"),
750 s->owner, s, elfsec);
751 result = FALSE;
752 }
753
754 elf_linked_to_section (s) = link;
dd863624
L
755 }
756 }
757 }
3d7f7666 758
dd863624 759 /* Process section groups. */
3d7f7666
L
760 if (num_group == (unsigned) -1)
761 return result;
762
763 for (i = 0; i < num_group; i++)
764 {
765 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
766 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
767 unsigned int n_elt = shdr->sh_size / 4;
768
769 while (--n_elt != 0)
770 if ((++idx)->shdr->bfd_section)
771 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
772 else if (idx->shdr->sh_type == SHT_RELA
773 || idx->shdr->sh_type == SHT_REL)
774 /* We won't include relocation sections in section groups in
775 output object files. We adjust the group section size here
776 so that relocatable link will work correctly when
777 relocation sections are in section group in input object
778 files. */
779 shdr->bfd_section->size -= 4;
780 else
781 {
782 /* There are some unknown sections in the group. */
783 (*_bfd_error_handler)
d003868e
AM
784 (_("%B: unknown [%d] section `%s' in group [%s]"),
785 abfd,
3d7f7666 786 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
787 bfd_elf_string_from_elf_section (abfd,
788 (elf_elfheader (abfd)
789 ->e_shstrndx),
790 idx->shdr->sh_name),
3d7f7666
L
791 shdr->bfd_section->name);
792 result = FALSE;
793 }
794 }
795 return result;
796}
797
72adc230
AM
798bfd_boolean
799bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
800{
801 return elf_next_in_group (sec) != NULL;
802}
803
252b5132
RH
804/* Make a BFD section from an ELF section. We store a pointer to the
805 BFD section in the bfd_section field of the header. */
806
b34976b6 807bfd_boolean
217aa764
AM
808_bfd_elf_make_section_from_shdr (bfd *abfd,
809 Elf_Internal_Shdr *hdr,
6dc132d9
L
810 const char *name,
811 int shindex)
252b5132
RH
812{
813 asection *newsect;
814 flagword flags;
9c5bfbb7 815 const struct elf_backend_data *bed;
252b5132
RH
816
817 if (hdr->bfd_section != NULL)
818 {
819 BFD_ASSERT (strcmp (name,
820 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 821 return TRUE;
252b5132
RH
822 }
823
824 newsect = bfd_make_section_anyway (abfd, name);
825 if (newsect == NULL)
b34976b6 826 return FALSE;
252b5132 827
1829f4b2
AM
828 hdr->bfd_section = newsect;
829 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 830 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 831
2f89ff8d
L
832 /* Always use the real type/flags. */
833 elf_section_type (newsect) = hdr->sh_type;
834 elf_section_flags (newsect) = hdr->sh_flags;
835
252b5132
RH
836 newsect->filepos = hdr->sh_offset;
837
838 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
839 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
840 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 841 bfd_log2 (hdr->sh_addralign)))
b34976b6 842 return FALSE;
252b5132
RH
843
844 flags = SEC_NO_FLAGS;
845 if (hdr->sh_type != SHT_NOBITS)
846 flags |= SEC_HAS_CONTENTS;
dbb410c3 847 if (hdr->sh_type == SHT_GROUP)
b3096250 848 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
849 if ((hdr->sh_flags & SHF_ALLOC) != 0)
850 {
851 flags |= SEC_ALLOC;
852 if (hdr->sh_type != SHT_NOBITS)
853 flags |= SEC_LOAD;
854 }
855 if ((hdr->sh_flags & SHF_WRITE) == 0)
856 flags |= SEC_READONLY;
857 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
858 flags |= SEC_CODE;
859 else if ((flags & SEC_LOAD) != 0)
860 flags |= SEC_DATA;
f5fa8ca2
JJ
861 if ((hdr->sh_flags & SHF_MERGE) != 0)
862 {
863 flags |= SEC_MERGE;
864 newsect->entsize = hdr->sh_entsize;
865 if ((hdr->sh_flags & SHF_STRINGS) != 0)
866 flags |= SEC_STRINGS;
867 }
dbb410c3
AM
868 if (hdr->sh_flags & SHF_GROUP)
869 if (!setup_group (abfd, hdr, newsect))
b34976b6 870 return FALSE;
13ae64f3
JJ
871 if ((hdr->sh_flags & SHF_TLS) != 0)
872 flags |= SEC_THREAD_LOCAL;
252b5132 873
3d2b39cf 874 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 875 {
3d2b39cf
L
876 /* The debugging sections appear to be recognized only by name,
877 not any sort of flag. Their SEC_ALLOC bits are cleared. */
878 static const struct
879 {
880 const char *name;
881 int len;
882 } debug_sections [] =
883 {
0112cd26 884 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
885 { NULL, 0 }, /* 'e' */
886 { NULL, 0 }, /* 'f' */
0112cd26 887 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
888 { NULL, 0 }, /* 'h' */
889 { NULL, 0 }, /* 'i' */
890 { NULL, 0 }, /* 'j' */
891 { NULL, 0 }, /* 'k' */
0112cd26 892 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
893 { NULL, 0 }, /* 'm' */
894 { NULL, 0 }, /* 'n' */
895 { NULL, 0 }, /* 'o' */
896 { NULL, 0 }, /* 'p' */
897 { NULL, 0 }, /* 'q' */
898 { NULL, 0 }, /* 'r' */
1b315056
CS
899 { STRING_COMMA_LEN ("stab") }, /* 's' */
900 { NULL, 0 }, /* 't' */
901 { NULL, 0 }, /* 'u' */
902 { NULL, 0 }, /* 'v' */
903 { NULL, 0 }, /* 'w' */
904 { NULL, 0 }, /* 'x' */
905 { NULL, 0 }, /* 'y' */
906 { STRING_COMMA_LEN ("zdebug") } /* 'z' */
3d2b39cf 907 };
08a40648 908
3d2b39cf
L
909 if (name [0] == '.')
910 {
911 int i = name [1] - 'd';
912 if (i >= 0
913 && i < (int) ARRAY_SIZE (debug_sections)
914 && debug_sections [i].name != NULL
915 && strncmp (&name [1], debug_sections [i].name,
916 debug_sections [i].len) == 0)
917 flags |= SEC_DEBUGGING;
918 }
919 }
252b5132
RH
920
921 /* As a GNU extension, if the name begins with .gnu.linkonce, we
922 only link a single copy of the section. This is used to support
923 g++. g++ will emit each template expansion in its own section.
924 The symbols will be defined as weak, so that multiple definitions
925 are permitted. The GNU linker extension is to actually discard
926 all but one of the sections. */
0112cd26 927 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 928 && elf_next_in_group (newsect) == NULL)
252b5132
RH
929 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
930
fa152c49
JW
931 bed = get_elf_backend_data (abfd);
932 if (bed->elf_backend_section_flags)
933 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 934 return FALSE;
fa152c49 935
252b5132 936 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 937 return FALSE;
252b5132 938
718175fa
JK
939 /* We do not parse the PT_NOTE segments as we are interested even in the
940 separate debug info files which may have the segments offsets corrupted.
941 PT_NOTEs from the core files are currently not parsed using BFD. */
942 if (hdr->sh_type == SHT_NOTE)
943 {
baea7ef1 944 bfd_byte *contents;
718175fa 945
baea7ef1 946 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
947 return FALSE;
948
baea7ef1 949 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
950 free (contents);
951 }
952
252b5132
RH
953 if ((flags & SEC_ALLOC) != 0)
954 {
955 Elf_Internal_Phdr *phdr;
6ffd7900
AM
956 unsigned int i, nload;
957
958 /* Some ELF linkers produce binaries with all the program header
959 p_paddr fields zero. If we have such a binary with more than
960 one PT_LOAD header, then leave the section lma equal to vma
961 so that we don't create sections with overlapping lma. */
962 phdr = elf_tdata (abfd)->phdr;
963 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
964 if (phdr->p_paddr != 0)
965 break;
966 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
967 ++nload;
968 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
969 return TRUE;
252b5132 970
252b5132
RH
971 phdr = elf_tdata (abfd)->phdr;
972 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
973 {
88967714
AM
974 /* This section is part of this segment if its file
975 offset plus size lies within the segment's memory
976 span and, if the section is loaded, the extent of the
977 loaded data lies within the extent of the segment.
978
979 Note - we used to check the p_paddr field as well, and
980 refuse to set the LMA if it was 0. This is wrong
981 though, as a perfectly valid initialised segment can
982 have a p_paddr of zero. Some architectures, eg ARM,
983 place special significance on the address 0 and
984 executables need to be able to have a segment which
985 covers this address. */
986 if (phdr->p_type == PT_LOAD
987 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
988 && (hdr->sh_offset + hdr->sh_size
989 <= phdr->p_offset + phdr->p_memsz)
990 && ((flags & SEC_LOAD) == 0
991 || (hdr->sh_offset + hdr->sh_size
992 <= phdr->p_offset + phdr->p_filesz)))
252b5132 993 {
88967714
AM
994 if ((flags & SEC_LOAD) == 0)
995 newsect->lma = (phdr->p_paddr
996 + hdr->sh_addr - phdr->p_vaddr);
997 else
998 /* We used to use the same adjustment for SEC_LOAD
999 sections, but that doesn't work if the segment
1000 is packed with code from multiple VMAs.
1001 Instead we calculate the section LMA based on
1002 the segment LMA. It is assumed that the
1003 segment will contain sections with contiguous
1004 LMAs, even if the VMAs are not. */
1005 newsect->lma = (phdr->p_paddr
1006 + hdr->sh_offset - phdr->p_offset);
1007
1008 /* With contiguous segments, we can't tell from file
1009 offsets whether a section with zero size should
1010 be placed at the end of one segment or the
1011 beginning of the next. Decide based on vaddr. */
1012 if (hdr->sh_addr >= phdr->p_vaddr
1013 && (hdr->sh_addr + hdr->sh_size
1014 <= phdr->p_vaddr + phdr->p_memsz))
1015 break;
252b5132
RH
1016 }
1017 }
1018 }
1019
b34976b6 1020 return TRUE;
252b5132
RH
1021}
1022
252b5132
RH
1023const char *const bfd_elf_section_type_names[] = {
1024 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1025 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1026 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1027};
1028
1049f94e 1029/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1030 output, and the reloc is against an external symbol, and nothing
1031 has given us any additional addend, the resulting reloc will also
1032 be against the same symbol. In such a case, we don't want to
1033 change anything about the way the reloc is handled, since it will
1034 all be done at final link time. Rather than put special case code
1035 into bfd_perform_relocation, all the reloc types use this howto
1036 function. It just short circuits the reloc if producing
1049f94e 1037 relocatable output against an external symbol. */
252b5132 1038
252b5132 1039bfd_reloc_status_type
217aa764
AM
1040bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1041 arelent *reloc_entry,
1042 asymbol *symbol,
1043 void *data ATTRIBUTE_UNUSED,
1044 asection *input_section,
1045 bfd *output_bfd,
1046 char **error_message ATTRIBUTE_UNUSED)
1047{
1048 if (output_bfd != NULL
252b5132
RH
1049 && (symbol->flags & BSF_SECTION_SYM) == 0
1050 && (! reloc_entry->howto->partial_inplace
1051 || reloc_entry->addend == 0))
1052 {
1053 reloc_entry->address += input_section->output_offset;
1054 return bfd_reloc_ok;
1055 }
1056
1057 return bfd_reloc_continue;
1058}
1059\f
0ac4564e
L
1060/* Copy the program header and other data from one object module to
1061 another. */
252b5132 1062
b34976b6 1063bfd_boolean
217aa764 1064_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1065{
1066 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1067 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1068 return TRUE;
2d502050
L
1069
1070 BFD_ASSERT (!elf_flags_init (obfd)
1071 || (elf_elfheader (obfd)->e_flags
1072 == elf_elfheader (ibfd)->e_flags));
1073
0ac4564e 1074 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1075 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1076 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1077
1078 /* Copy object attributes. */
1079 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1080
b34976b6 1081 return TRUE;
2d502050
L
1082}
1083
cedc298e
L
1084static const char *
1085get_segment_type (unsigned int p_type)
1086{
1087 const char *pt;
1088 switch (p_type)
1089 {
1090 case PT_NULL: pt = "NULL"; break;
1091 case PT_LOAD: pt = "LOAD"; break;
1092 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1093 case PT_INTERP: pt = "INTERP"; break;
1094 case PT_NOTE: pt = "NOTE"; break;
1095 case PT_SHLIB: pt = "SHLIB"; break;
1096 case PT_PHDR: pt = "PHDR"; break;
1097 case PT_TLS: pt = "TLS"; break;
1098 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1099 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1100 case PT_GNU_RELRO: pt = "RELRO"; break;
1101 default: pt = NULL; break;
1102 }
1103 return pt;
1104}
1105
f0b79d91
L
1106/* Print out the program headers. */
1107
b34976b6 1108bfd_boolean
217aa764 1109_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1110{
217aa764 1111 FILE *f = farg;
252b5132
RH
1112 Elf_Internal_Phdr *p;
1113 asection *s;
1114 bfd_byte *dynbuf = NULL;
1115
1116 p = elf_tdata (abfd)->phdr;
1117 if (p != NULL)
1118 {
1119 unsigned int i, c;
1120
1121 fprintf (f, _("\nProgram Header:\n"));
1122 c = elf_elfheader (abfd)->e_phnum;
1123 for (i = 0; i < c; i++, p++)
1124 {
cedc298e 1125 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1126 char buf[20];
1127
cedc298e 1128 if (pt == NULL)
252b5132 1129 {
cedc298e
L
1130 sprintf (buf, "0x%lx", p->p_type);
1131 pt = buf;
252b5132 1132 }
dc810e39 1133 fprintf (f, "%8s off 0x", pt);
60b89a18 1134 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1135 fprintf (f, " vaddr 0x");
60b89a18 1136 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1137 fprintf (f, " paddr 0x");
60b89a18 1138 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1139 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1140 fprintf (f, " filesz 0x");
60b89a18 1141 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1142 fprintf (f, " memsz 0x");
60b89a18 1143 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1144 fprintf (f, " flags %c%c%c",
1145 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1146 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1147 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1148 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1149 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1150 fprintf (f, "\n");
1151 }
1152 }
1153
1154 s = bfd_get_section_by_name (abfd, ".dynamic");
1155 if (s != NULL)
1156 {
cb33740c 1157 unsigned int elfsec;
dc810e39 1158 unsigned long shlink;
252b5132
RH
1159 bfd_byte *extdyn, *extdynend;
1160 size_t extdynsize;
217aa764 1161 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1162
1163 fprintf (f, _("\nDynamic Section:\n"));
1164
eea6121a 1165 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1166 goto error_return;
1167
1168 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1169 if (elfsec == SHN_BAD)
252b5132 1170 goto error_return;
dc810e39 1171 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1172
1173 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1174 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1175
1176 extdyn = dynbuf;
eea6121a 1177 extdynend = extdyn + s->size;
252b5132
RH
1178 for (; extdyn < extdynend; extdyn += extdynsize)
1179 {
1180 Elf_Internal_Dyn dyn;
ad9563d6 1181 const char *name = "";
252b5132 1182 char ab[20];
b34976b6 1183 bfd_boolean stringp;
ad9563d6 1184 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1185
217aa764 1186 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1187
1188 if (dyn.d_tag == DT_NULL)
1189 break;
1190
b34976b6 1191 stringp = FALSE;
252b5132
RH
1192 switch (dyn.d_tag)
1193 {
1194 default:
ad9563d6
CM
1195 if (bed->elf_backend_get_target_dtag)
1196 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1197
1198 if (!strcmp (name, ""))
1199 {
1200 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1201 name = ab;
1202 }
252b5132
RH
1203 break;
1204
b34976b6 1205 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1206 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1207 case DT_PLTGOT: name = "PLTGOT"; break;
1208 case DT_HASH: name = "HASH"; break;
1209 case DT_STRTAB: name = "STRTAB"; break;
1210 case DT_SYMTAB: name = "SYMTAB"; break;
1211 case DT_RELA: name = "RELA"; break;
1212 case DT_RELASZ: name = "RELASZ"; break;
1213 case DT_RELAENT: name = "RELAENT"; break;
1214 case DT_STRSZ: name = "STRSZ"; break;
1215 case DT_SYMENT: name = "SYMENT"; break;
1216 case DT_INIT: name = "INIT"; break;
1217 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1218 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1219 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1220 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1221 case DT_REL: name = "REL"; break;
1222 case DT_RELSZ: name = "RELSZ"; break;
1223 case DT_RELENT: name = "RELENT"; break;
1224 case DT_PLTREL: name = "PLTREL"; break;
1225 case DT_DEBUG: name = "DEBUG"; break;
1226 case DT_TEXTREL: name = "TEXTREL"; break;
1227 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1228 case DT_BIND_NOW: name = "BIND_NOW"; break;
1229 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1230 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1231 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1232 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1233 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1234 case DT_FLAGS: name = "FLAGS"; break;
1235 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1236 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1237 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1238 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1239 case DT_MOVEENT: name = "MOVEENT"; break;
1240 case DT_MOVESZ: name = "MOVESZ"; break;
1241 case DT_FEATURE: name = "FEATURE"; break;
1242 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1243 case DT_SYMINSZ: name = "SYMINSZ"; break;
1244 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1245 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1246 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1247 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1248 case DT_PLTPAD: name = "PLTPAD"; break;
1249 case DT_MOVETAB: name = "MOVETAB"; break;
1250 case DT_SYMINFO: name = "SYMINFO"; break;
1251 case DT_RELACOUNT: name = "RELACOUNT"; break;
1252 case DT_RELCOUNT: name = "RELCOUNT"; break;
1253 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1254 case DT_VERSYM: name = "VERSYM"; break;
1255 case DT_VERDEF: name = "VERDEF"; break;
1256 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1257 case DT_VERNEED: name = "VERNEED"; break;
1258 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1259 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1260 case DT_USED: name = "USED"; break;
b34976b6 1261 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1262 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1263 }
1264
ad9563d6 1265 fprintf (f, " %-20s ", name);
252b5132 1266 if (! stringp)
a1f3c56e
AN
1267 {
1268 fprintf (f, "0x");
1269 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1270 }
252b5132
RH
1271 else
1272 {
1273 const char *string;
dc810e39 1274 unsigned int tagv = dyn.d_un.d_val;
252b5132 1275
dc810e39 1276 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1277 if (string == NULL)
1278 goto error_return;
1279 fprintf (f, "%s", string);
1280 }
1281 fprintf (f, "\n");
1282 }
1283
1284 free (dynbuf);
1285 dynbuf = NULL;
1286 }
1287
1288 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1289 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1290 {
fc0e6df6 1291 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1292 return FALSE;
252b5132
RH
1293 }
1294
1295 if (elf_dynverdef (abfd) != 0)
1296 {
1297 Elf_Internal_Verdef *t;
1298
1299 fprintf (f, _("\nVersion definitions:\n"));
1300 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1301 {
1302 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1303 t->vd_flags, t->vd_hash,
1304 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1305 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1306 {
1307 Elf_Internal_Verdaux *a;
1308
1309 fprintf (f, "\t");
1310 for (a = t->vd_auxptr->vda_nextptr;
1311 a != NULL;
1312 a = a->vda_nextptr)
d0fb9a8d
JJ
1313 fprintf (f, "%s ",
1314 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1315 fprintf (f, "\n");
1316 }
1317 }
1318 }
1319
1320 if (elf_dynverref (abfd) != 0)
1321 {
1322 Elf_Internal_Verneed *t;
1323
1324 fprintf (f, _("\nVersion References:\n"));
1325 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1326 {
1327 Elf_Internal_Vernaux *a;
1328
d0fb9a8d
JJ
1329 fprintf (f, _(" required from %s:\n"),
1330 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1331 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1332 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1333 a->vna_flags, a->vna_other,
1334 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1335 }
1336 }
1337
b34976b6 1338 return TRUE;
252b5132
RH
1339
1340 error_return:
1341 if (dynbuf != NULL)
1342 free (dynbuf);
b34976b6 1343 return FALSE;
252b5132
RH
1344}
1345
1346/* Display ELF-specific fields of a symbol. */
1347
1348void
217aa764
AM
1349bfd_elf_print_symbol (bfd *abfd,
1350 void *filep,
1351 asymbol *symbol,
1352 bfd_print_symbol_type how)
252b5132 1353{
217aa764 1354 FILE *file = filep;
252b5132
RH
1355 switch (how)
1356 {
1357 case bfd_print_symbol_name:
1358 fprintf (file, "%s", symbol->name);
1359 break;
1360 case bfd_print_symbol_more:
1361 fprintf (file, "elf ");
60b89a18 1362 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1363 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1364 break;
1365 case bfd_print_symbol_all:
1366 {
4e8a9624
AM
1367 const char *section_name;
1368 const char *name = NULL;
9c5bfbb7 1369 const struct elf_backend_data *bed;
7a13edea 1370 unsigned char st_other;
dbb410c3 1371 bfd_vma val;
c044fabd 1372
252b5132 1373 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1374
1375 bed = get_elf_backend_data (abfd);
1376 if (bed->elf_backend_print_symbol_all)
c044fabd 1377 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1378
1379 if (name == NULL)
1380 {
7ee38065 1381 name = symbol->name;
217aa764 1382 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1383 }
1384
252b5132
RH
1385 fprintf (file, " %s\t", section_name);
1386 /* Print the "other" value for a symbol. For common symbols,
1387 we've already printed the size; now print the alignment.
1388 For other symbols, we have no specified alignment, and
1389 we've printed the address; now print the size. */
dcf6c779 1390 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1391 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1392 else
1393 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1394 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1395
1396 /* If we have version information, print it. */
1397 if (elf_tdata (abfd)->dynversym_section != 0
1398 && (elf_tdata (abfd)->dynverdef_section != 0
1399 || elf_tdata (abfd)->dynverref_section != 0))
1400 {
1401 unsigned int vernum;
1402 const char *version_string;
1403
1404 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1405
1406 if (vernum == 0)
1407 version_string = "";
1408 else if (vernum == 1)
1409 version_string = "Base";
1410 else if (vernum <= elf_tdata (abfd)->cverdefs)
1411 version_string =
1412 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1413 else
1414 {
1415 Elf_Internal_Verneed *t;
1416
1417 version_string = "";
1418 for (t = elf_tdata (abfd)->verref;
1419 t != NULL;
1420 t = t->vn_nextref)
1421 {
1422 Elf_Internal_Vernaux *a;
1423
1424 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1425 {
1426 if (a->vna_other == vernum)
1427 {
1428 version_string = a->vna_nodename;
1429 break;
1430 }
1431 }
1432 }
1433 }
1434
1435 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1436 fprintf (file, " %-11s", version_string);
1437 else
1438 {
1439 int i;
1440
1441 fprintf (file, " (%s)", version_string);
1442 for (i = 10 - strlen (version_string); i > 0; --i)
1443 putc (' ', file);
1444 }
1445 }
1446
1447 /* If the st_other field is not zero, print it. */
7a13edea 1448 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1449
7a13edea
NC
1450 switch (st_other)
1451 {
1452 case 0: break;
1453 case STV_INTERNAL: fprintf (file, " .internal"); break;
1454 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1455 case STV_PROTECTED: fprintf (file, " .protected"); break;
1456 default:
1457 /* Some other non-defined flags are also present, so print
1458 everything hex. */
1459 fprintf (file, " 0x%02x", (unsigned int) st_other);
1460 }
252b5132 1461
587ff49e 1462 fprintf (file, " %s", name);
252b5132
RH
1463 }
1464 break;
1465 }
1466}
252b5132 1467
252b5132
RH
1468/* Allocate an ELF string table--force the first byte to be zero. */
1469
1470struct bfd_strtab_hash *
217aa764 1471_bfd_elf_stringtab_init (void)
252b5132
RH
1472{
1473 struct bfd_strtab_hash *ret;
1474
1475 ret = _bfd_stringtab_init ();
1476 if (ret != NULL)
1477 {
1478 bfd_size_type loc;
1479
b34976b6 1480 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1481 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1482 if (loc == (bfd_size_type) -1)
1483 {
1484 _bfd_stringtab_free (ret);
1485 ret = NULL;
1486 }
1487 }
1488 return ret;
1489}
1490\f
1491/* ELF .o/exec file reading */
1492
c044fabd 1493/* Create a new bfd section from an ELF section header. */
252b5132 1494
b34976b6 1495bfd_boolean
217aa764 1496bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1497{
4fbb74a6
AM
1498 Elf_Internal_Shdr *hdr;
1499 Elf_Internal_Ehdr *ehdr;
1500 const struct elf_backend_data *bed;
90937f86 1501 const char *name;
252b5132 1502
4fbb74a6
AM
1503 if (shindex >= elf_numsections (abfd))
1504 return FALSE;
1505
1506 hdr = elf_elfsections (abfd)[shindex];
1507 ehdr = elf_elfheader (abfd);
1508 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1509 hdr->sh_name);
933d961a
JJ
1510 if (name == NULL)
1511 return FALSE;
252b5132 1512
4fbb74a6 1513 bed = get_elf_backend_data (abfd);
252b5132
RH
1514 switch (hdr->sh_type)
1515 {
1516 case SHT_NULL:
1517 /* Inactive section. Throw it away. */
b34976b6 1518 return TRUE;
252b5132
RH
1519
1520 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1521 case SHT_NOBITS: /* .bss section. */
1522 case SHT_HASH: /* .hash section. */
1523 case SHT_NOTE: /* .note section. */
25e27870
L
1524 case SHT_INIT_ARRAY: /* .init_array section. */
1525 case SHT_FINI_ARRAY: /* .fini_array section. */
1526 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1527 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1528 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1529 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1530
797fc050 1531 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1532 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1533 return FALSE;
8e0ed13f
NC
1534 if (hdr->sh_link > elf_numsections (abfd)
1535 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1536 return FALSE;
797fc050
AM
1537 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1538 {
1539 Elf_Internal_Shdr *dynsymhdr;
1540
1541 /* The shared libraries distributed with hpux11 have a bogus
1542 sh_link field for the ".dynamic" section. Find the
1543 string table for the ".dynsym" section instead. */
1544 if (elf_dynsymtab (abfd) != 0)
1545 {
1546 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1547 hdr->sh_link = dynsymhdr->sh_link;
1548 }
1549 else
1550 {
1551 unsigned int i, num_sec;
1552
1553 num_sec = elf_numsections (abfd);
1554 for (i = 1; i < num_sec; i++)
1555 {
1556 dynsymhdr = elf_elfsections (abfd)[i];
1557 if (dynsymhdr->sh_type == SHT_DYNSYM)
1558 {
1559 hdr->sh_link = dynsymhdr->sh_link;
1560 break;
1561 }
1562 }
1563 }
1564 }
1565 break;
1566
252b5132
RH
1567 case SHT_SYMTAB: /* A symbol table */
1568 if (elf_onesymtab (abfd) == shindex)
b34976b6 1569 return TRUE;
252b5132 1570
a50b2160
JJ
1571 if (hdr->sh_entsize != bed->s->sizeof_sym)
1572 return FALSE;
3337c1e5
AM
1573 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1574 return FALSE;
252b5132
RH
1575 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1576 elf_onesymtab (abfd) = shindex;
1577 elf_tdata (abfd)->symtab_hdr = *hdr;
1578 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1579 abfd->flags |= HAS_SYMS;
1580
1581 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1582 SHF_ALLOC is set, and this is a shared object, then we also
1583 treat this section as a BFD section. We can not base the
1584 decision purely on SHF_ALLOC, because that flag is sometimes
1585 set in a relocatable object file, which would confuse the
1586 linker. */
252b5132
RH
1587 if ((hdr->sh_flags & SHF_ALLOC) != 0
1588 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1589 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1590 shindex))
b34976b6 1591 return FALSE;
252b5132 1592
1b3a8575
AM
1593 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1594 can't read symbols without that section loaded as well. It
1595 is most likely specified by the next section header. */
1596 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1597 {
1598 unsigned int i, num_sec;
1599
1600 num_sec = elf_numsections (abfd);
1601 for (i = shindex + 1; i < num_sec; i++)
1602 {
1603 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1604 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1605 && hdr2->sh_link == shindex)
1606 break;
1607 }
1608 if (i == num_sec)
1609 for (i = 1; i < shindex; i++)
1610 {
1611 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1612 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1613 && hdr2->sh_link == shindex)
1614 break;
1615 }
1616 if (i != shindex)
1617 return bfd_section_from_shdr (abfd, i);
1618 }
b34976b6 1619 return TRUE;
252b5132
RH
1620
1621 case SHT_DYNSYM: /* A dynamic symbol table */
1622 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1623 return TRUE;
252b5132 1624
a50b2160
JJ
1625 if (hdr->sh_entsize != bed->s->sizeof_sym)
1626 return FALSE;
252b5132
RH
1627 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1628 elf_dynsymtab (abfd) = shindex;
1629 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1630 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1631 abfd->flags |= HAS_SYMS;
1632
1633 /* Besides being a symbol table, we also treat this as a regular
1634 section, so that objcopy can handle it. */
6dc132d9 1635 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1636
9ad5cbcf
AM
1637 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1638 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1639 return TRUE;
9ad5cbcf 1640
1b3a8575 1641 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1642 elf_symtab_shndx (abfd) = shindex;
1643 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1644 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1645 return TRUE;
9ad5cbcf 1646
252b5132
RH
1647 case SHT_STRTAB: /* A string table */
1648 if (hdr->bfd_section != NULL)
b34976b6 1649 return TRUE;
252b5132
RH
1650 if (ehdr->e_shstrndx == shindex)
1651 {
1652 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1653 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1654 return TRUE;
252b5132 1655 }
1b3a8575
AM
1656 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1657 {
1658 symtab_strtab:
1659 elf_tdata (abfd)->strtab_hdr = *hdr;
1660 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1661 return TRUE;
1662 }
1663 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1664 {
1665 dynsymtab_strtab:
1666 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1667 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1668 elf_elfsections (abfd)[shindex] = hdr;
1669 /* We also treat this as a regular section, so that objcopy
1670 can handle it. */
6dc132d9
L
1671 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1672 shindex);
1b3a8575 1673 }
252b5132 1674
1b3a8575
AM
1675 /* If the string table isn't one of the above, then treat it as a
1676 regular section. We need to scan all the headers to be sure,
1677 just in case this strtab section appeared before the above. */
1678 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1679 {
1680 unsigned int i, num_sec;
252b5132 1681
1b3a8575
AM
1682 num_sec = elf_numsections (abfd);
1683 for (i = 1; i < num_sec; i++)
1684 {
1685 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1686 if (hdr2->sh_link == shindex)
1687 {
933d961a
JJ
1688 /* Prevent endless recursion on broken objects. */
1689 if (i == shindex)
1690 return FALSE;
1b3a8575
AM
1691 if (! bfd_section_from_shdr (abfd, i))
1692 return FALSE;
1693 if (elf_onesymtab (abfd) == i)
1694 goto symtab_strtab;
1695 if (elf_dynsymtab (abfd) == i)
1696 goto dynsymtab_strtab;
1697 }
1698 }
1699 }
6dc132d9 1700 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1701
1702 case SHT_REL:
1703 case SHT_RELA:
1704 /* *These* do a lot of work -- but build no sections! */
1705 {
1706 asection *target_sect;
1707 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1708 unsigned int num_sec = elf_numsections (abfd);
252b5132 1709
aa2ca951
JJ
1710 if (hdr->sh_entsize
1711 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1712 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1713 return FALSE;
1714
03ae5f59 1715 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1716 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1717 {
1718 ((*_bfd_error_handler)
d003868e
AM
1719 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1720 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1721 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1722 shindex);
03ae5f59
ILT
1723 }
1724
252b5132
RH
1725 /* For some incomprehensible reason Oracle distributes
1726 libraries for Solaris in which some of the objects have
1727 bogus sh_link fields. It would be nice if we could just
1728 reject them, but, unfortunately, some people need to use
1729 them. We scan through the section headers; if we find only
1730 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1731 to it. I hope this doesn't break anything.
1732
1733 Don't do it on executable nor shared library. */
1734 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1735 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1736 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1737 {
9ad5cbcf 1738 unsigned int scan;
252b5132
RH
1739 int found;
1740
1741 found = 0;
9ad5cbcf 1742 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1743 {
1744 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1745 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1746 {
1747 if (found != 0)
1748 {
1749 found = 0;
1750 break;
1751 }
1752 found = scan;
1753 }
1754 }
1755 if (found != 0)
1756 hdr->sh_link = found;
1757 }
1758
1759 /* Get the symbol table. */
1b3a8575
AM
1760 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1761 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1762 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1763 return FALSE;
252b5132
RH
1764
1765 /* If this reloc section does not use the main symbol table we
1766 don't treat it as a reloc section. BFD can't adequately
1767 represent such a section, so at least for now, we don't
c044fabd 1768 try. We just present it as a normal section. We also
60bcf0fa 1769 can't use it as a reloc section if it points to the null
83b89087
L
1770 section, an invalid section, another reloc section, or its
1771 sh_link points to the null section. */
185ef66d 1772 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1773 || hdr->sh_link == SHN_UNDEF
185ef66d 1774 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1775 || hdr->sh_info >= num_sec
1776 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1777 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1778 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1779 shindex);
252b5132
RH
1780
1781 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1782 return FALSE;
252b5132
RH
1783 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1784 if (target_sect == NULL)
b34976b6 1785 return FALSE;
252b5132
RH
1786
1787 if ((target_sect->flags & SEC_RELOC) == 0
1788 || target_sect->reloc_count == 0)
1789 hdr2 = &elf_section_data (target_sect)->rel_hdr;
1790 else
1791 {
dc810e39 1792 bfd_size_type amt;
252b5132 1793 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 1794 amt = sizeof (*hdr2);
217aa764 1795 hdr2 = bfd_alloc (abfd, amt);
14b1c01e
AM
1796 if (hdr2 == NULL)
1797 return FALSE;
252b5132
RH
1798 elf_section_data (target_sect)->rel_hdr2 = hdr2;
1799 }
1800 *hdr2 = *hdr;
1801 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1802 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1803 target_sect->flags |= SEC_RELOC;
1804 target_sect->relocation = NULL;
1805 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1806 /* In the section to which the relocations apply, mark whether
1807 its relocations are of the REL or RELA variety. */
72730e0c 1808 if (hdr->sh_size != 0)
68bfbfcc 1809 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 1810 abfd->flags |= HAS_RELOC;
b34976b6 1811 return TRUE;
252b5132 1812 }
252b5132
RH
1813
1814 case SHT_GNU_verdef:
1815 elf_dynverdef (abfd) = shindex;
1816 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1817 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1818
1819 case SHT_GNU_versym:
a50b2160
JJ
1820 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1821 return FALSE;
252b5132
RH
1822 elf_dynversym (abfd) = shindex;
1823 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1824 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1825
1826 case SHT_GNU_verneed:
1827 elf_dynverref (abfd) = shindex;
1828 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1829 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1830
1831 case SHT_SHLIB:
b34976b6 1832 return TRUE;
252b5132 1833
dbb410c3 1834 case SHT_GROUP:
1783205a 1835 if (! IS_VALID_GROUP_SECTION_HEADER (hdr))
a50b2160 1836 return FALSE;
6dc132d9 1837 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1838 return FALSE;
dbb410c3
AM
1839 if (hdr->contents != NULL)
1840 {
1841 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1842 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1843 asection *s;
1844
b885599b
AM
1845 if (idx->flags & GRP_COMDAT)
1846 hdr->bfd_section->flags
1847 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1848
45c5e9ed
L
1849 /* We try to keep the same section order as it comes in. */
1850 idx += n_elt;
dbb410c3 1851 while (--n_elt != 0)
1783205a
NC
1852 {
1853 --idx;
1854
1855 if (idx->shdr != NULL
1856 && (s = idx->shdr->bfd_section) != NULL
1857 && elf_next_in_group (s) != NULL)
1858 {
1859 elf_next_in_group (hdr->bfd_section) = s;
1860 break;
1861 }
1862 }
dbb410c3
AM
1863 }
1864 break;
1865
252b5132 1866 default:
104d59d1
JM
1867 /* Possibly an attributes section. */
1868 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1869 || hdr->sh_type == bed->obj_attrs_section_type)
1870 {
1871 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1872 return FALSE;
1873 _bfd_elf_parse_attributes (abfd, hdr);
1874 return TRUE;
1875 }
1876
252b5132 1877 /* Check for any processor-specific section types. */
3eb70a79
L
1878 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1879 return TRUE;
1880
1881 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1882 {
1883 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1884 /* FIXME: How to properly handle allocated section reserved
1885 for applications? */
1886 (*_bfd_error_handler)
1887 (_("%B: don't know how to handle allocated, application "
1888 "specific section `%s' [0x%8x]"),
1889 abfd, name, hdr->sh_type);
1890 else
1891 /* Allow sections reserved for applications. */
1892 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1893 shindex);
1894 }
1895 else if (hdr->sh_type >= SHT_LOPROC
1896 && hdr->sh_type <= SHT_HIPROC)
1897 /* FIXME: We should handle this section. */
1898 (*_bfd_error_handler)
1899 (_("%B: don't know how to handle processor specific section "
1900 "`%s' [0x%8x]"),
1901 abfd, name, hdr->sh_type);
1902 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1903 {
1904 /* Unrecognised OS-specific sections. */
1905 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1906 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1907 required to correctly process the section and the file should
ff15b240
NC
1908 be rejected with an error message. */
1909 (*_bfd_error_handler)
1910 (_("%B: don't know how to handle OS specific section "
1911 "`%s' [0x%8x]"),
1912 abfd, name, hdr->sh_type);
1913 else
1914 /* Otherwise it should be processed. */
1915 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1916 }
3eb70a79
L
1917 else
1918 /* FIXME: We should handle this section. */
1919 (*_bfd_error_handler)
1920 (_("%B: don't know how to handle section `%s' [0x%8x]"),
1921 abfd, name, hdr->sh_type);
1922
1923 return FALSE;
252b5132
RH
1924 }
1925
b34976b6 1926 return TRUE;
252b5132
RH
1927}
1928
87d72d41 1929/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 1930
87d72d41
AM
1931Elf_Internal_Sym *
1932bfd_sym_from_r_symndx (struct sym_cache *cache,
1933 bfd *abfd,
1934 unsigned long r_symndx)
ec338859 1935{
ec338859
AM
1936 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
1937
a5d1b3b5
AM
1938 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
1939 {
1940 Elf_Internal_Shdr *symtab_hdr;
1941 unsigned char esym[sizeof (Elf64_External_Sym)];
1942 Elf_External_Sym_Shndx eshndx;
ec338859 1943
a5d1b3b5
AM
1944 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1945 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 1946 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 1947 return NULL;
9ad5cbcf 1948
a5d1b3b5
AM
1949 if (cache->abfd != abfd)
1950 {
1951 memset (cache->indx, -1, sizeof (cache->indx));
1952 cache->abfd = abfd;
1953 }
1954 cache->indx[ent] = r_symndx;
ec338859 1955 }
a5d1b3b5 1956
87d72d41 1957 return &cache->sym[ent];
ec338859
AM
1958}
1959
252b5132
RH
1960/* Given an ELF section number, retrieve the corresponding BFD
1961 section. */
1962
1963asection *
217aa764 1964bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 1965{
9ad5cbcf 1966 if (index >= elf_numsections (abfd))
252b5132
RH
1967 return NULL;
1968 return elf_elfsections (abfd)[index]->bfd_section;
1969}
1970
b35d266b 1971static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 1972{
0112cd26
NC
1973 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1974 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1975};
1976
b35d266b 1977static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 1978{
0112cd26
NC
1979 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1980 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1981};
1982
b35d266b 1983static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 1984{
0112cd26
NC
1985 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1986 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1987 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
1988 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
1989 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
1990 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
1991 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
1992 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
1993 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
1994 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
1995 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1996};
1997
b35d266b 1998static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 1999{
0112cd26
NC
2000 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2001 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2002 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2003};
2004
b35d266b 2005static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2006{
0112cd26
NC
2007 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2008 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2009 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2010 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2011 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2012 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2013 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2014 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2015 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2016};
2017
b35d266b 2018static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2019{
0112cd26
NC
2020 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2021 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2022};
2023
b35d266b 2024static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2025{
0112cd26
NC
2026 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2027 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2028 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2029 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2030};
2031
b35d266b 2032static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2033{
0112cd26
NC
2034 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2035 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2036};
2037
b35d266b 2038static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2039{
0112cd26
NC
2040 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2041 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2042 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2043};
2044
b35d266b 2045static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2046{
0112cd26
NC
2047 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2048 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2049 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2050};
2051
b35d266b 2052static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2053{
0112cd26
NC
2054 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2055 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2056 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2057 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2058 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2059};
2060
b35d266b 2061static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2062{
0112cd26
NC
2063 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2064 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2065 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2066 /* See struct bfd_elf_special_section declaration for the semantics of
2067 this special case where .prefix_length != strlen (.prefix). */
2068 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2069 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2070};
2071
b35d266b 2072static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2073{
0112cd26
NC
2074 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2075 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2076 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2077 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2078};
2079
1b315056
CS
2080static const struct bfd_elf_special_section special_sections_z[] =
2081{
2082 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2083 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2084 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2085 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2086 { NULL, 0, 0, 0, 0 }
2087};
2088
b35d266b 2089static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2090{
7f4d3958 2091 special_sections_b, /* 'b' */
98ece1b3 2092 special_sections_c, /* 'c' */
7f4d3958
L
2093 special_sections_d, /* 'd' */
2094 NULL, /* 'e' */
2095 special_sections_f, /* 'f' */
2096 special_sections_g, /* 'g' */
2097 special_sections_h, /* 'h' */
2098 special_sections_i, /* 'i' */
2099 NULL, /* 'j' */
2100 NULL, /* 'k' */
2101 special_sections_l, /* 'l' */
2102 NULL, /* 'm' */
2103 special_sections_n, /* 'n' */
2104 NULL, /* 'o' */
2105 special_sections_p, /* 'p' */
2106 NULL, /* 'q' */
2107 special_sections_r, /* 'r' */
2108 special_sections_s, /* 's' */
2109 special_sections_t, /* 't' */
1b315056
CS
2110 NULL, /* 'u' */
2111 NULL, /* 'v' */
2112 NULL, /* 'w' */
2113 NULL, /* 'x' */
2114 NULL, /* 'y' */
2115 special_sections_z /* 'z' */
7f4d3958
L
2116};
2117
551b43fd
AM
2118const struct bfd_elf_special_section *
2119_bfd_elf_get_special_section (const char *name,
2120 const struct bfd_elf_special_section *spec,
2121 unsigned int rela)
2f89ff8d
L
2122{
2123 int i;
7f4d3958 2124 int len;
7f4d3958 2125
551b43fd 2126 len = strlen (name);
7f4d3958 2127
551b43fd 2128 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2129 {
2130 int suffix_len;
551b43fd 2131 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2132
2133 if (len < prefix_len)
2134 continue;
551b43fd 2135 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2136 continue;
2137
551b43fd 2138 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2139 if (suffix_len <= 0)
2140 {
2141 if (name[prefix_len] != 0)
2142 {
2143 if (suffix_len == 0)
2144 continue;
2145 if (name[prefix_len] != '.'
2146 && (suffix_len == -2
551b43fd 2147 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2148 continue;
2149 }
2150 }
2151 else
2152 {
2153 if (len < prefix_len + suffix_len)
2154 continue;
2155 if (memcmp (name + len - suffix_len,
551b43fd 2156 spec[i].prefix + prefix_len,
7dcb9820
AM
2157 suffix_len) != 0)
2158 continue;
2159 }
551b43fd 2160 return &spec[i];
7dcb9820 2161 }
2f89ff8d
L
2162
2163 return NULL;
2164}
2165
7dcb9820 2166const struct bfd_elf_special_section *
29ef7005 2167_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2168{
551b43fd
AM
2169 int i;
2170 const struct bfd_elf_special_section *spec;
29ef7005 2171 const struct elf_backend_data *bed;
2f89ff8d
L
2172
2173 /* See if this is one of the special sections. */
551b43fd
AM
2174 if (sec->name == NULL)
2175 return NULL;
2f89ff8d 2176
29ef7005
L
2177 bed = get_elf_backend_data (abfd);
2178 spec = bed->special_sections;
2179 if (spec)
2180 {
2181 spec = _bfd_elf_get_special_section (sec->name,
2182 bed->special_sections,
2183 sec->use_rela_p);
2184 if (spec != NULL)
2185 return spec;
2186 }
2187
551b43fd
AM
2188 if (sec->name[0] != '.')
2189 return NULL;
2f89ff8d 2190
551b43fd 2191 i = sec->name[1] - 'b';
1b315056 2192 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2193 return NULL;
2194
2195 spec = special_sections[i];
2f89ff8d 2196
551b43fd
AM
2197 if (spec == NULL)
2198 return NULL;
2199
2200 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2201}
2202
b34976b6 2203bfd_boolean
217aa764 2204_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2205{
2206 struct bfd_elf_section_data *sdata;
551b43fd 2207 const struct elf_backend_data *bed;
7dcb9820 2208 const struct bfd_elf_special_section *ssect;
252b5132 2209
f0abc2a1
AM
2210 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2211 if (sdata == NULL)
2212 {
217aa764 2213 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2214 if (sdata == NULL)
2215 return FALSE;
217aa764 2216 sec->used_by_bfd = sdata;
f0abc2a1 2217 }
bf572ba0 2218
551b43fd
AM
2219 /* Indicate whether or not this section should use RELA relocations. */
2220 bed = get_elf_backend_data (abfd);
2221 sec->use_rela_p = bed->default_use_rela_p;
2222
e843e0f8
L
2223 /* When we read a file, we don't need to set ELF section type and
2224 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2225 anyway. We will set ELF section type and flags for all linker
2226 created sections. If user specifies BFD section flags, we will
2227 set ELF section type and flags based on BFD section flags in
2228 elf_fake_sections. */
2229 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2230 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2231 {
551b43fd 2232 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2233 if (ssect != NULL)
2234 {
2235 elf_section_type (sec) = ssect->type;
2236 elf_section_flags (sec) = ssect->attr;
2237 }
2f89ff8d
L
2238 }
2239
f592407e 2240 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2241}
2242
2243/* Create a new bfd section from an ELF program header.
2244
2245 Since program segments have no names, we generate a synthetic name
2246 of the form segment<NUM>, where NUM is generally the index in the
2247 program header table. For segments that are split (see below) we
2248 generate the names segment<NUM>a and segment<NUM>b.
2249
2250 Note that some program segments may have a file size that is different than
2251 (less than) the memory size. All this means is that at execution the
2252 system must allocate the amount of memory specified by the memory size,
2253 but only initialize it with the first "file size" bytes read from the
2254 file. This would occur for example, with program segments consisting
2255 of combined data+bss.
2256
2257 To handle the above situation, this routine generates TWO bfd sections
2258 for the single program segment. The first has the length specified by
2259 the file size of the segment, and the second has the length specified
2260 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2261 into its initialized and uninitialized parts.
252b5132
RH
2262
2263 */
2264
b34976b6 2265bfd_boolean
217aa764
AM
2266_bfd_elf_make_section_from_phdr (bfd *abfd,
2267 Elf_Internal_Phdr *hdr,
2268 int index,
2269 const char *typename)
252b5132
RH
2270{
2271 asection *newsect;
2272 char *name;
2273 char namebuf[64];
d4c88bbb 2274 size_t len;
252b5132
RH
2275 int split;
2276
2277 split = ((hdr->p_memsz > 0)
2278 && (hdr->p_filesz > 0)
2279 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2280
2281 if (hdr->p_filesz > 0)
252b5132 2282 {
d5191d0c
AM
2283 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
2284 len = strlen (namebuf) + 1;
2285 name = bfd_alloc (abfd, len);
2286 if (!name)
2287 return FALSE;
2288 memcpy (name, namebuf, len);
2289 newsect = bfd_make_section (abfd, name);
2290 if (newsect == NULL)
2291 return FALSE;
2292 newsect->vma = hdr->p_vaddr;
2293 newsect->lma = hdr->p_paddr;
2294 newsect->size = hdr->p_filesz;
2295 newsect->filepos = hdr->p_offset;
2296 newsect->flags |= SEC_HAS_CONTENTS;
2297 newsect->alignment_power = bfd_log2 (hdr->p_align);
2298 if (hdr->p_type == PT_LOAD)
252b5132 2299 {
d5191d0c
AM
2300 newsect->flags |= SEC_ALLOC;
2301 newsect->flags |= SEC_LOAD;
2302 if (hdr->p_flags & PF_X)
2303 {
2304 /* FIXME: all we known is that it has execute PERMISSION,
2305 may be data. */
2306 newsect->flags |= SEC_CODE;
2307 }
2308 }
2309 if (!(hdr->p_flags & PF_W))
2310 {
2311 newsect->flags |= SEC_READONLY;
252b5132 2312 }
252b5132
RH
2313 }
2314
d5191d0c 2315 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2316 {
d5191d0c
AM
2317 bfd_vma align;
2318
2319 sprintf (namebuf, "%s%d%s", typename, index, split ? "b" : "");
d4c88bbb 2320 len = strlen (namebuf) + 1;
217aa764 2321 name = bfd_alloc (abfd, len);
252b5132 2322 if (!name)
b34976b6 2323 return FALSE;
d4c88bbb 2324 memcpy (name, namebuf, len);
252b5132
RH
2325 newsect = bfd_make_section (abfd, name);
2326 if (newsect == NULL)
b34976b6 2327 return FALSE;
252b5132
RH
2328 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2329 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2330 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2331 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2332 align = newsect->vma & -newsect->vma;
2333 if (align == 0 || align > hdr->p_align)
2334 align = hdr->p_align;
2335 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2336 if (hdr->p_type == PT_LOAD)
2337 {
d5191d0c
AM
2338 /* Hack for gdb. Segments that have not been modified do
2339 not have their contents written to a core file, on the
2340 assumption that a debugger can find the contents in the
2341 executable. We flag this case by setting the fake
2342 section size to zero. Note that "real" bss sections will
2343 always have their contents dumped to the core file. */
2344 if (bfd_get_format (abfd) == bfd_core)
2345 newsect->size = 0;
252b5132
RH
2346 newsect->flags |= SEC_ALLOC;
2347 if (hdr->p_flags & PF_X)
2348 newsect->flags |= SEC_CODE;
2349 }
2350 if (!(hdr->p_flags & PF_W))
2351 newsect->flags |= SEC_READONLY;
2352 }
2353
b34976b6 2354 return TRUE;
252b5132
RH
2355}
2356
b34976b6 2357bfd_boolean
217aa764 2358bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2359{
9c5bfbb7 2360 const struct elf_backend_data *bed;
20cfcaae
NC
2361
2362 switch (hdr->p_type)
2363 {
2364 case PT_NULL:
2365 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2366
2367 case PT_LOAD:
2368 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2369
2370 case PT_DYNAMIC:
2371 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2372
2373 case PT_INTERP:
2374 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2375
2376 case PT_NOTE:
2377 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2378 return FALSE;
718175fa 2379 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2380 return FALSE;
2381 return TRUE;
20cfcaae
NC
2382
2383 case PT_SHLIB:
2384 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2385
2386 case PT_PHDR:
2387 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2388
811072d8
RM
2389 case PT_GNU_EH_FRAME:
2390 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2391 "eh_frame_hdr");
2392
2b05f1b7
L
2393 case PT_GNU_STACK:
2394 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
9ee5e499 2395
8c37241b
JJ
2396 case PT_GNU_RELRO:
2397 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2398
20cfcaae 2399 default:
8c1acd09 2400 /* Check for any processor-specific program segment types. */
20cfcaae 2401 bed = get_elf_backend_data (abfd);
d27f5fa1 2402 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2403 }
2404}
2405
23bc299b 2406/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2407 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2408 relocations; otherwise, we use REL relocations. */
2409
b34976b6 2410bfd_boolean
217aa764
AM
2411_bfd_elf_init_reloc_shdr (bfd *abfd,
2412 Elf_Internal_Shdr *rel_hdr,
2413 asection *asect,
2414 bfd_boolean use_rela_p)
23bc299b
MM
2415{
2416 char *name;
9c5bfbb7 2417 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2418 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2419
dc810e39 2420 name = bfd_alloc (abfd, amt);
23bc299b 2421 if (name == NULL)
b34976b6 2422 return FALSE;
23bc299b
MM
2423 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2424 rel_hdr->sh_name =
2b0f7ef9 2425 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2426 FALSE);
23bc299b 2427 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2428 return FALSE;
23bc299b
MM
2429 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2430 rel_hdr->sh_entsize = (use_rela_p
2431 ? bed->s->sizeof_rela
2432 : bed->s->sizeof_rel);
72de5009 2433 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2434 rel_hdr->sh_flags = 0;
2435 rel_hdr->sh_addr = 0;
2436 rel_hdr->sh_size = 0;
2437 rel_hdr->sh_offset = 0;
2438
b34976b6 2439 return TRUE;
23bc299b
MM
2440}
2441
252b5132
RH
2442/* Set up an ELF internal section header for a section. */
2443
252b5132 2444static void
217aa764 2445elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2446{
9c5bfbb7 2447 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2448 bfd_boolean *failedptr = failedptrarg;
252b5132 2449 Elf_Internal_Shdr *this_hdr;
0414f35b 2450 unsigned int sh_type;
252b5132
RH
2451
2452 if (*failedptr)
2453 {
2454 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2455 loop. */
252b5132
RH
2456 return;
2457 }
2458
2459 this_hdr = &elf_section_data (asect)->this_hdr;
2460
e57b5356
AM
2461 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2462 asect->name, FALSE);
2463 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2464 {
b34976b6 2465 *failedptr = TRUE;
252b5132
RH
2466 return;
2467 }
2468
a4d8e49b 2469 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2470
2471 if ((asect->flags & SEC_ALLOC) != 0
2472 || asect->user_set_vma)
2473 this_hdr->sh_addr = asect->vma;
2474 else
2475 this_hdr->sh_addr = 0;
2476
2477 this_hdr->sh_offset = 0;
eea6121a 2478 this_hdr->sh_size = asect->size;
252b5132 2479 this_hdr->sh_link = 0;
72de5009 2480 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2481 /* The sh_entsize and sh_info fields may have been set already by
2482 copy_private_section_data. */
2483
2484 this_hdr->bfd_section = asect;
2485 this_hdr->contents = NULL;
2486
3cddba1e
L
2487 /* If the section type is unspecified, we set it based on
2488 asect->flags. */
98ece1b3
AM
2489 if ((asect->flags & SEC_GROUP) != 0)
2490 sh_type = SHT_GROUP;
2491 else if ((asect->flags & SEC_ALLOC) != 0
2492 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2493 || (asect->flags & SEC_NEVER_LOAD) != 0))
2494 sh_type = SHT_NOBITS;
2495 else
2496 sh_type = SHT_PROGBITS;
2497
3cddba1e 2498 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2499 this_hdr->sh_type = sh_type;
2500 else if (this_hdr->sh_type == SHT_NOBITS
2501 && sh_type == SHT_PROGBITS
2502 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2503 {
98ece1b3
AM
2504 /* Warn if we are changing a NOBITS section to PROGBITS, but
2505 allow the link to proceed. This can happen when users link
2506 non-bss input sections to bss output sections, or emit data
2507 to a bss output section via a linker script. */
2508 (*_bfd_error_handler)
58f0869b 2509 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2510 this_hdr->sh_type = sh_type;
3cddba1e
L
2511 }
2512
2f89ff8d 2513 switch (this_hdr->sh_type)
252b5132 2514 {
2f89ff8d 2515 default:
2f89ff8d
L
2516 break;
2517
2518 case SHT_STRTAB:
2519 case SHT_INIT_ARRAY:
2520 case SHT_FINI_ARRAY:
2521 case SHT_PREINIT_ARRAY:
2522 case SHT_NOTE:
2523 case SHT_NOBITS:
2524 case SHT_PROGBITS:
2525 break;
2526
2527 case SHT_HASH:
c7ac6ff8 2528 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2529 break;
5de3bf90 2530
2f89ff8d 2531 case SHT_DYNSYM:
252b5132 2532 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2533 break;
2534
2535 case SHT_DYNAMIC:
252b5132 2536 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2537 break;
2538
2539 case SHT_RELA:
2540 if (get_elf_backend_data (abfd)->may_use_rela_p)
2541 this_hdr->sh_entsize = bed->s->sizeof_rela;
2542 break;
2543
2544 case SHT_REL:
2545 if (get_elf_backend_data (abfd)->may_use_rel_p)
2546 this_hdr->sh_entsize = bed->s->sizeof_rel;
2547 break;
2548
2549 case SHT_GNU_versym:
252b5132 2550 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2551 break;
2552
2553 case SHT_GNU_verdef:
252b5132
RH
2554 this_hdr->sh_entsize = 0;
2555 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2556 cverdefs. The linker will set cverdefs, but sh_info will be
2557 zero. */
252b5132
RH
2558 if (this_hdr->sh_info == 0)
2559 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2560 else
2561 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2562 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2563 break;
2564
2565 case SHT_GNU_verneed:
252b5132
RH
2566 this_hdr->sh_entsize = 0;
2567 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2568 cverrefs. The linker will set cverrefs, but sh_info will be
2569 zero. */
252b5132
RH
2570 if (this_hdr->sh_info == 0)
2571 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2572 else
2573 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2574 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2575 break;
2576
2577 case SHT_GROUP:
1783205a 2578 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2579 break;
fdc90cb4
JJ
2580
2581 case SHT_GNU_HASH:
2582 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2583 break;
dbb410c3 2584 }
252b5132
RH
2585
2586 if ((asect->flags & SEC_ALLOC) != 0)
2587 this_hdr->sh_flags |= SHF_ALLOC;
2588 if ((asect->flags & SEC_READONLY) == 0)
2589 this_hdr->sh_flags |= SHF_WRITE;
2590 if ((asect->flags & SEC_CODE) != 0)
2591 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2592 if ((asect->flags & SEC_MERGE) != 0)
2593 {
2594 this_hdr->sh_flags |= SHF_MERGE;
2595 this_hdr->sh_entsize = asect->entsize;
2596 if ((asect->flags & SEC_STRINGS) != 0)
2597 this_hdr->sh_flags |= SHF_STRINGS;
2598 }
1126897b 2599 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2600 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2601 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2602 {
2603 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2604 if (asect->size == 0
2605 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2606 {
3a800eb9 2607 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2608
704afa60 2609 this_hdr->sh_size = 0;
3a800eb9
AM
2610 if (o != NULL)
2611 {
704afa60 2612 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2613 if (this_hdr->sh_size != 0)
2614 this_hdr->sh_type = SHT_NOBITS;
2615 }
704afa60
JJ
2616 }
2617 }
252b5132
RH
2618
2619 /* Check for processor-specific section types. */
0414f35b 2620 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2621 if (bed->elf_backend_fake_sections
2622 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2623 *failedptr = TRUE;
252b5132 2624
42bb2e33 2625 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2626 {
2627 /* Don't change the header type from NOBITS if we are being
42bb2e33 2628 called for objcopy --only-keep-debug. */
0414f35b
AM
2629 this_hdr->sh_type = sh_type;
2630 }
2631
252b5132 2632 /* If the section has relocs, set up a section header for the
23bc299b
MM
2633 SHT_REL[A] section. If two relocation sections are required for
2634 this section, it is up to the processor-specific back-end to
c044fabd 2635 create the other. */
23bc299b 2636 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2637 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2638 &elf_section_data (asect)->rel_hdr,
c044fabd 2639 asect,
68bfbfcc 2640 asect->use_rela_p))
b34976b6 2641 *failedptr = TRUE;
252b5132
RH
2642}
2643
bcacc0f5
AM
2644/* Fill in the contents of a SHT_GROUP section. Called from
2645 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2646 when ELF targets use the generic linker, ld. Called for ld -r
2647 from bfd_elf_final_link. */
dbb410c3 2648
1126897b 2649void
217aa764 2650bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2651{
217aa764 2652 bfd_boolean *failedptr = failedptrarg;
9dce4196 2653 asection *elt, *first;
dbb410c3 2654 unsigned char *loc;
b34976b6 2655 bfd_boolean gas;
dbb410c3 2656
7e4111ad
L
2657 /* Ignore linker created group section. See elfNN_ia64_object_p in
2658 elfxx-ia64.c. */
2659 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2660 || *failedptr)
2661 return;
2662
bcacc0f5
AM
2663 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2664 {
2665 unsigned long symindx = 0;
2666
2667 /* elf_group_id will have been set up by objcopy and the
2668 generic linker. */
2669 if (elf_group_id (sec) != NULL)
2670 symindx = elf_group_id (sec)->udata.i;
1126897b 2671
bcacc0f5
AM
2672 if (symindx == 0)
2673 {
2674 /* If called from the assembler, swap_out_syms will have set up
2675 elf_section_syms. */
2676 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2677 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2678 }
2679 elf_section_data (sec)->this_hdr.sh_info = symindx;
2680 }
2681 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2682 {
bcacc0f5
AM
2683 /* The ELF backend linker sets sh_info to -2 when the group
2684 signature symbol is global, and thus the index can't be
2685 set until all local symbols are output. */
2686 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2687 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2688 unsigned long symndx = sec_data->this_hdr.sh_info;
2689 unsigned long extsymoff = 0;
2690 struct elf_link_hash_entry *h;
2691
2692 if (!elf_bad_symtab (igroup->owner))
2693 {
2694 Elf_Internal_Shdr *symtab_hdr;
2695
2696 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2697 extsymoff = symtab_hdr->sh_info;
2698 }
2699 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2700 while (h->root.type == bfd_link_hash_indirect
2701 || h->root.type == bfd_link_hash_warning)
2702 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2703
2704 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2705 }
dbb410c3 2706
1126897b 2707 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2708 gas = TRUE;
dbb410c3
AM
2709 if (sec->contents == NULL)
2710 {
b34976b6 2711 gas = FALSE;
eea6121a 2712 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2713
2714 /* Arrange for the section to be written out. */
2715 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2716 if (sec->contents == NULL)
2717 {
b34976b6 2718 *failedptr = TRUE;
dbb410c3
AM
2719 return;
2720 }
2721 }
2722
eea6121a 2723 loc = sec->contents + sec->size;
dbb410c3 2724
9dce4196
AM
2725 /* Get the pointer to the first section in the group that gas
2726 squirreled away here. objcopy arranges for this to be set to the
2727 start of the input section group. */
2728 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2729
2730 /* First element is a flag word. Rest of section is elf section
2731 indices for all the sections of the group. Write them backwards
2732 just to keep the group in the same order as given in .section
2733 directives, not that it matters. */
2734 while (elt != NULL)
2735 {
9dce4196
AM
2736 asection *s;
2737 unsigned int idx;
2738
9dce4196 2739 s = elt;
01e1a5bc
NC
2740 if (! elf_discarded_section (s))
2741 {
2742 loc -= 4;
2743 if (!gas)
2744 s = s->output_section;
2745 idx = 0;
2746 if (s != NULL)
2747 idx = elf_section_data (s)->this_idx;
2748 H_PUT_32 (abfd, idx, loc);
2749 }
945906ff 2750 elt = elf_next_in_group (elt);
9dce4196
AM
2751 if (elt == first)
2752 break;
dbb410c3
AM
2753 }
2754
3d7f7666 2755 if ((loc -= 4) != sec->contents)
9dce4196 2756 abort ();
dbb410c3 2757
9dce4196 2758 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2759}
2760
252b5132
RH
2761/* Assign all ELF section numbers. The dummy first section is handled here
2762 too. The link/info pointers for the standard section types are filled
2763 in here too, while we're at it. */
2764
b34976b6 2765static bfd_boolean
da9f89d4 2766assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2767{
2768 struct elf_obj_tdata *t = elf_tdata (abfd);
2769 asection *sec;
2b0f7ef9 2770 unsigned int section_number, secn;
252b5132 2771 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2772 struct bfd_elf_section_data *d;
3516e984 2773 bfd_boolean need_symtab;
252b5132
RH
2774
2775 section_number = 1;
2776
2b0f7ef9
JJ
2777 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2778
da9f89d4
L
2779 /* SHT_GROUP sections are in relocatable files only. */
2780 if (link_info == NULL || link_info->relocatable)
252b5132 2781 {
da9f89d4 2782 /* Put SHT_GROUP sections first. */
04dd1667 2783 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2784 {
5daa8fe7 2785 d = elf_section_data (sec);
da9f89d4
L
2786
2787 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2788 {
5daa8fe7 2789 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2790 {
2791 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2792 bfd_section_list_remove (abfd, sec);
da9f89d4 2793 abfd->section_count--;
da9f89d4 2794 }
08a40648 2795 else
4fbb74a6 2796 d->this_idx = section_number++;
da9f89d4 2797 }
47cc2cf5
PB
2798 }
2799 }
2800
2801 for (sec = abfd->sections; sec; sec = sec->next)
2802 {
2803 d = elf_section_data (sec);
2804
2805 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2806 d->this_idx = section_number++;
2b0f7ef9 2807 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2808 if ((sec->flags & SEC_RELOC) == 0)
2809 d->rel_idx = 0;
2810 else
2b0f7ef9
JJ
2811 {
2812 d->rel_idx = section_number++;
2813 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2814 }
23bc299b
MM
2815
2816 if (d->rel_hdr2)
2b0f7ef9
JJ
2817 {
2818 d->rel_idx2 = section_number++;
2819 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2820 }
23bc299b
MM
2821 else
2822 d->rel_idx2 = 0;
252b5132
RH
2823 }
2824
2825 t->shstrtab_section = section_number++;
2b0f7ef9 2826 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2827 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132 2828
3516e984
L
2829 need_symtab = (bfd_get_symcount (abfd) > 0
2830 || (link_info == NULL
2831 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2832 == HAS_RELOC)));
2833 if (need_symtab)
252b5132
RH
2834 {
2835 t->symtab_section = section_number++;
2b0f7ef9 2836 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 2837 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 2838 {
9ad5cbcf
AM
2839 t->symtab_shndx_section = section_number++;
2840 t->symtab_shndx_hdr.sh_name
2841 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2842 ".symtab_shndx", FALSE);
9ad5cbcf 2843 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2844 return FALSE;
9ad5cbcf 2845 }
252b5132 2846 t->strtab_section = section_number++;
2b0f7ef9 2847 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2848 }
2849
2b0f7ef9
JJ
2850 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2851 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2852
2853 elf_numsections (abfd) = section_number;
252b5132
RH
2854 elf_elfheader (abfd)->e_shnum = section_number;
2855
2856 /* Set up the list of section header pointers, in agreement with the
2857 indices. */
d0fb9a8d 2858 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 2859 if (i_shdrp == NULL)
b34976b6 2860 return FALSE;
252b5132 2861
d0fb9a8d 2862 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
2863 if (i_shdrp[0] == NULL)
2864 {
2865 bfd_release (abfd, i_shdrp);
b34976b6 2866 return FALSE;
252b5132 2867 }
252b5132
RH
2868
2869 elf_elfsections (abfd) = i_shdrp;
2870
2871 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3516e984 2872 if (need_symtab)
252b5132
RH
2873 {
2874 i_shdrp[t->symtab_section] = &t->symtab_hdr;
4fbb74a6 2875 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf
AM
2876 {
2877 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2878 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2879 }
252b5132
RH
2880 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2881 t->symtab_hdr.sh_link = t->strtab_section;
2882 }
38ce5b11 2883
252b5132
RH
2884 for (sec = abfd->sections; sec; sec = sec->next)
2885 {
2886 struct bfd_elf_section_data *d = elf_section_data (sec);
2887 asection *s;
2888 const char *name;
2889
2890 i_shdrp[d->this_idx] = &d->this_hdr;
2891 if (d->rel_idx != 0)
2892 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
2893 if (d->rel_idx2 != 0)
2894 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
2895
2896 /* Fill in the sh_link and sh_info fields while we're at it. */
2897
2898 /* sh_link of a reloc section is the section index of the symbol
2899 table. sh_info is the section index of the section to which
2900 the relocation entries apply. */
2901 if (d->rel_idx != 0)
2902 {
2903 d->rel_hdr.sh_link = t->symtab_section;
2904 d->rel_hdr.sh_info = d->this_idx;
2905 }
23bc299b
MM
2906 if (d->rel_idx2 != 0)
2907 {
2908 d->rel_hdr2->sh_link = t->symtab_section;
2909 d->rel_hdr2->sh_info = d->this_idx;
2910 }
252b5132 2911
38ce5b11
L
2912 /* We need to set up sh_link for SHF_LINK_ORDER. */
2913 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
2914 {
2915 s = elf_linked_to_section (sec);
2916 if (s)
38ce5b11 2917 {
f2876037 2918 /* elf_linked_to_section points to the input section. */
ccd2ec6a 2919 if (link_info != NULL)
38ce5b11 2920 {
f2876037 2921 /* Check discarded linkonce section. */
ccd2ec6a 2922 if (elf_discarded_section (s))
38ce5b11 2923 {
ccd2ec6a
L
2924 asection *kept;
2925 (*_bfd_error_handler)
2926 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
2927 abfd, d->this_hdr.bfd_section,
2928 s, s->owner);
2929 /* Point to the kept section if it has the same
2930 size as the discarded one. */
c0f00686 2931 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 2932 if (kept == NULL)
185d09ad 2933 {
ccd2ec6a
L
2934 bfd_set_error (bfd_error_bad_value);
2935 return FALSE;
185d09ad 2936 }
ccd2ec6a 2937 s = kept;
38ce5b11 2938 }
e424ecc8 2939
ccd2ec6a
L
2940 s = s->output_section;
2941 BFD_ASSERT (s != NULL);
38ce5b11 2942 }
f2876037
L
2943 else
2944 {
2945 /* Handle objcopy. */
2946 if (s->output_section == NULL)
2947 {
2948 (*_bfd_error_handler)
2949 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
2950 abfd, d->this_hdr.bfd_section, s, s->owner);
2951 bfd_set_error (bfd_error_bad_value);
2952 return FALSE;
2953 }
2954 s = s->output_section;
2955 }
ccd2ec6a
L
2956 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2957 }
2958 else
2959 {
2960 /* PR 290:
2961 The Intel C compiler generates SHT_IA_64_UNWIND with
2962 SHF_LINK_ORDER. But it doesn't set the sh_link or
2963 sh_info fields. Hence we could get the situation
08a40648 2964 where s is NULL. */
ccd2ec6a
L
2965 const struct elf_backend_data *bed
2966 = get_elf_backend_data (abfd);
2967 if (bed->link_order_error_handler)
2968 bed->link_order_error_handler
2969 (_("%B: warning: sh_link not set for section `%A'"),
2970 abfd, sec);
38ce5b11
L
2971 }
2972 }
2973
252b5132
RH
2974 switch (d->this_hdr.sh_type)
2975 {
2976 case SHT_REL:
2977 case SHT_RELA:
2978 /* A reloc section which we are treating as a normal BFD
2979 section. sh_link is the section index of the symbol
2980 table. sh_info is the section index of the section to
2981 which the relocation entries apply. We assume that an
2982 allocated reloc section uses the dynamic symbol table.
2983 FIXME: How can we be sure? */
2984 s = bfd_get_section_by_name (abfd, ".dynsym");
2985 if (s != NULL)
2986 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2987
2988 /* We look up the section the relocs apply to by name. */
2989 name = sec->name;
2990 if (d->this_hdr.sh_type == SHT_REL)
2991 name += 4;
2992 else
2993 name += 5;
2994 s = bfd_get_section_by_name (abfd, name);
2995 if (s != NULL)
2996 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
2997 break;
2998
2999 case SHT_STRTAB:
3000 /* We assume that a section named .stab*str is a stabs
3001 string section. We look for a section with the same name
3002 but without the trailing ``str'', and set its sh_link
3003 field to point to this section. */
0112cd26 3004 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3005 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3006 {
3007 size_t len;
3008 char *alc;
3009
3010 len = strlen (sec->name);
217aa764 3011 alc = bfd_malloc (len - 2);
252b5132 3012 if (alc == NULL)
b34976b6 3013 return FALSE;
d4c88bbb 3014 memcpy (alc, sec->name, len - 3);
252b5132
RH
3015 alc[len - 3] = '\0';
3016 s = bfd_get_section_by_name (abfd, alc);
3017 free (alc);
3018 if (s != NULL)
3019 {
3020 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3021
3022 /* This is a .stab section. */
0594c12d
AM
3023 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3024 elf_section_data (s)->this_hdr.sh_entsize
3025 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3026 }
3027 }
3028 break;
3029
3030 case SHT_DYNAMIC:
3031 case SHT_DYNSYM:
3032 case SHT_GNU_verneed:
3033 case SHT_GNU_verdef:
3034 /* sh_link is the section header index of the string table
3035 used for the dynamic entries, or the symbol table, or the
3036 version strings. */
3037 s = bfd_get_section_by_name (abfd, ".dynstr");
3038 if (s != NULL)
3039 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3040 break;
3041
7f1204bb
JJ
3042 case SHT_GNU_LIBLIST:
3043 /* sh_link is the section header index of the prelink library
08a40648
AM
3044 list used for the dynamic entries, or the symbol table, or
3045 the version strings. */
7f1204bb
JJ
3046 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3047 ? ".dynstr" : ".gnu.libstr");
3048 if (s != NULL)
3049 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3050 break;
3051
252b5132 3052 case SHT_HASH:
fdc90cb4 3053 case SHT_GNU_HASH:
252b5132
RH
3054 case SHT_GNU_versym:
3055 /* sh_link is the section header index of the symbol table
3056 this hash table or version table is for. */
3057 s = bfd_get_section_by_name (abfd, ".dynsym");
3058 if (s != NULL)
3059 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3060 break;
dbb410c3
AM
3061
3062 case SHT_GROUP:
3063 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3064 }
3065 }
3066
2b0f7ef9 3067 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3068 if (i_shdrp[secn] == NULL)
3069 i_shdrp[secn] = i_shdrp[0];
3070 else
3071 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3072 i_shdrp[secn]->sh_name);
b34976b6 3073 return TRUE;
252b5132
RH
3074}
3075
3076/* Map symbol from it's internal number to the external number, moving
3077 all local symbols to be at the head of the list. */
3078
5372391b 3079static bfd_boolean
217aa764 3080sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3081{
3082 /* If the backend has a special mapping, use it. */
9c5bfbb7 3083 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3084 if (bed->elf_backend_sym_is_global)
3085 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3086
3087 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3088 || bfd_is_und_section (bfd_get_section (sym))
3089 || bfd_is_com_section (bfd_get_section (sym)));
3090}
3091
5372391b 3092/* Don't output section symbols for sections that are not going to be
0f0a5e58 3093 output. */
5372391b
AM
3094
3095static bfd_boolean
3096ignore_section_sym (bfd *abfd, asymbol *sym)
3097{
3098 return ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58
AM
3099 && !(sym->section->owner == abfd
3100 || (sym->section->output_section->owner == abfd
3101 && sym->section->output_offset == 0)));
5372391b
AM
3102}
3103
b34976b6 3104static bfd_boolean
217aa764 3105elf_map_symbols (bfd *abfd)
252b5132 3106{
dc810e39 3107 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3108 asymbol **syms = bfd_get_outsymbols (abfd);
3109 asymbol **sect_syms;
dc810e39
AM
3110 unsigned int num_locals = 0;
3111 unsigned int num_globals = 0;
3112 unsigned int num_locals2 = 0;
3113 unsigned int num_globals2 = 0;
252b5132 3114 int max_index = 0;
dc810e39 3115 unsigned int idx;
252b5132
RH
3116 asection *asect;
3117 asymbol **new_syms;
252b5132
RH
3118
3119#ifdef DEBUG
3120 fprintf (stderr, "elf_map_symbols\n");
3121 fflush (stderr);
3122#endif
3123
252b5132
RH
3124 for (asect = abfd->sections; asect; asect = asect->next)
3125 {
3126 if (max_index < asect->index)
3127 max_index = asect->index;
3128 }
3129
3130 max_index++;
d0fb9a8d 3131 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3132 if (sect_syms == NULL)
b34976b6 3133 return FALSE;
252b5132 3134 elf_section_syms (abfd) = sect_syms;
4e89ac30 3135 elf_num_section_syms (abfd) = max_index;
252b5132 3136
079e9a2f
AM
3137 /* Init sect_syms entries for any section symbols we have already
3138 decided to output. */
252b5132
RH
3139 for (idx = 0; idx < symcount; idx++)
3140 {
dc810e39 3141 asymbol *sym = syms[idx];
c044fabd 3142
252b5132 3143 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3144 && sym->value == 0
5372391b 3145 && !ignore_section_sym (abfd, sym))
252b5132 3146 {
5372391b 3147 asection *sec = sym->section;
252b5132 3148
5372391b
AM
3149 if (sec->owner != abfd)
3150 sec = sec->output_section;
252b5132 3151
5372391b 3152 sect_syms[sec->index] = syms[idx];
252b5132
RH
3153 }
3154 }
3155
252b5132
RH
3156 /* Classify all of the symbols. */
3157 for (idx = 0; idx < symcount; idx++)
3158 {
5372391b
AM
3159 if (ignore_section_sym (abfd, syms[idx]))
3160 continue;
252b5132
RH
3161 if (!sym_is_global (abfd, syms[idx]))
3162 num_locals++;
3163 else
3164 num_globals++;
3165 }
079e9a2f 3166
5372391b 3167 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3168 sections will already have a section symbol in outsymbols, but
3169 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3170 at least in that case. */
252b5132
RH
3171 for (asect = abfd->sections; asect; asect = asect->next)
3172 {
079e9a2f 3173 if (sect_syms[asect->index] == NULL)
252b5132 3174 {
079e9a2f 3175 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3176 num_locals++;
3177 else
3178 num_globals++;
252b5132
RH
3179 }
3180 }
3181
3182 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3183 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3184
252b5132 3185 if (new_syms == NULL)
b34976b6 3186 return FALSE;
252b5132
RH
3187
3188 for (idx = 0; idx < symcount; idx++)
3189 {
3190 asymbol *sym = syms[idx];
dc810e39 3191 unsigned int i;
252b5132 3192
5372391b
AM
3193 if (ignore_section_sym (abfd, sym))
3194 continue;
252b5132
RH
3195 if (!sym_is_global (abfd, sym))
3196 i = num_locals2++;
3197 else
3198 i = num_locals + num_globals2++;
3199 new_syms[i] = sym;
3200 sym->udata.i = i + 1;
3201 }
3202 for (asect = abfd->sections; asect; asect = asect->next)
3203 {
079e9a2f 3204 if (sect_syms[asect->index] == NULL)
252b5132 3205 {
079e9a2f 3206 asymbol *sym = asect->symbol;
dc810e39 3207 unsigned int i;
252b5132 3208
079e9a2f 3209 sect_syms[asect->index] = sym;
252b5132
RH
3210 if (!sym_is_global (abfd, sym))
3211 i = num_locals2++;
3212 else
3213 i = num_locals + num_globals2++;
3214 new_syms[i] = sym;
3215 sym->udata.i = i + 1;
3216 }
3217 }
3218
3219 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3220
3221 elf_num_locals (abfd) = num_locals;
3222 elf_num_globals (abfd) = num_globals;
b34976b6 3223 return TRUE;
252b5132
RH
3224}
3225
3226/* Align to the maximum file alignment that could be required for any
3227 ELF data structure. */
3228
268b6b39 3229static inline file_ptr
217aa764 3230align_file_position (file_ptr off, int align)
252b5132
RH
3231{
3232 return (off + align - 1) & ~(align - 1);
3233}
3234
3235/* Assign a file position to a section, optionally aligning to the
3236 required section alignment. */
3237
217aa764
AM
3238file_ptr
3239_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3240 file_ptr offset,
3241 bfd_boolean align)
252b5132 3242{
72de5009
AM
3243 if (align && i_shdrp->sh_addralign > 1)
3244 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3245 i_shdrp->sh_offset = offset;
3246 if (i_shdrp->bfd_section != NULL)
3247 i_shdrp->bfd_section->filepos = offset;
3248 if (i_shdrp->sh_type != SHT_NOBITS)
3249 offset += i_shdrp->sh_size;
3250 return offset;
3251}
3252
3253/* Compute the file positions we are going to put the sections at, and
3254 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3255 is not NULL, this is being called by the ELF backend linker. */
3256
b34976b6 3257bfd_boolean
217aa764
AM
3258_bfd_elf_compute_section_file_positions (bfd *abfd,
3259 struct bfd_link_info *link_info)
252b5132 3260{
9c5bfbb7 3261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3262 bfd_boolean failed;
4b6c0f2f 3263 struct bfd_strtab_hash *strtab = NULL;
252b5132 3264 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3265 bfd_boolean need_symtab;
252b5132
RH
3266
3267 if (abfd->output_has_begun)
b34976b6 3268 return TRUE;
252b5132
RH
3269
3270 /* Do any elf backend specific processing first. */
3271 if (bed->elf_backend_begin_write_processing)
3272 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3273
3274 if (! prep_headers (abfd))
b34976b6 3275 return FALSE;
252b5132 3276
e6c51ed4
NC
3277 /* Post process the headers if necessary. */
3278 if (bed->elf_backend_post_process_headers)
3279 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3280
b34976b6 3281 failed = FALSE;
252b5132
RH
3282 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3283 if (failed)
b34976b6 3284 return FALSE;
252b5132 3285
da9f89d4 3286 if (!assign_section_numbers (abfd, link_info))
b34976b6 3287 return FALSE;
252b5132
RH
3288
3289 /* The backend linker builds symbol table information itself. */
3516e984
L
3290 need_symtab = (link_info == NULL
3291 && (bfd_get_symcount (abfd) > 0
3292 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3293 == HAS_RELOC)));
3294 if (need_symtab)
252b5132
RH
3295 {
3296 /* Non-zero if doing a relocatable link. */
3297 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3298
3299 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3300 return FALSE;
252b5132
RH
3301 }
3302
1126897b 3303 if (link_info == NULL)
dbb410c3 3304 {
1126897b 3305 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3306 if (failed)
b34976b6 3307 return FALSE;
dbb410c3
AM
3308 }
3309
252b5132
RH
3310 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3311 /* sh_name was set in prep_headers. */
3312 shstrtab_hdr->sh_type = SHT_STRTAB;
3313 shstrtab_hdr->sh_flags = 0;
3314 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3315 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3316 shstrtab_hdr->sh_entsize = 0;
3317 shstrtab_hdr->sh_link = 0;
3318 shstrtab_hdr->sh_info = 0;
3319 /* sh_offset is set in assign_file_positions_except_relocs. */
3320 shstrtab_hdr->sh_addralign = 1;
3321
c84fca4d 3322 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3323 return FALSE;
252b5132 3324
3516e984 3325 if (need_symtab)
252b5132
RH
3326 {
3327 file_ptr off;
3328 Elf_Internal_Shdr *hdr;
3329
3330 off = elf_tdata (abfd)->next_file_pos;
3331
3332 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3333 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3334
9ad5cbcf
AM
3335 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3336 if (hdr->sh_size != 0)
b34976b6 3337 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3338
252b5132 3339 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3340 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3341
3342 elf_tdata (abfd)->next_file_pos = off;
3343
3344 /* Now that we know where the .strtab section goes, write it
08a40648 3345 out. */
252b5132
RH
3346 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3347 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3348 return FALSE;
252b5132
RH
3349 _bfd_stringtab_free (strtab);
3350 }
3351
b34976b6 3352 abfd->output_has_begun = TRUE;
252b5132 3353
b34976b6 3354 return TRUE;
252b5132
RH
3355}
3356
8ded5a0f
AM
3357/* Make an initial estimate of the size of the program header. If we
3358 get the number wrong here, we'll redo section placement. */
3359
3360static bfd_size_type
3361get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3362{
3363 size_t segs;
3364 asection *s;
2b05f1b7 3365 const struct elf_backend_data *bed;
8ded5a0f
AM
3366
3367 /* Assume we will need exactly two PT_LOAD segments: one for text
3368 and one for data. */
3369 segs = 2;
3370
3371 s = bfd_get_section_by_name (abfd, ".interp");
3372 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3373 {
3374 /* If we have a loadable interpreter section, we need a
3375 PT_INTERP segment. In this case, assume we also need a
3376 PT_PHDR segment, although that may not be true for all
3377 targets. */
3378 segs += 2;
3379 }
3380
3381 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3382 {
3383 /* We need a PT_DYNAMIC segment. */
3384 ++segs;
f210dcff 3385 }
08a40648 3386
ceae84aa 3387 if (info != NULL && info->relro)
f210dcff
L
3388 {
3389 /* We need a PT_GNU_RELRO segment. */
3390 ++segs;
8ded5a0f
AM
3391 }
3392
3393 if (elf_tdata (abfd)->eh_frame_hdr)
3394 {
3395 /* We need a PT_GNU_EH_FRAME segment. */
3396 ++segs;
3397 }
3398
2b05f1b7 3399 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3400 {
2b05f1b7
L
3401 /* We need a PT_GNU_STACK segment. */
3402 ++segs;
3403 }
94b11780 3404
2b05f1b7
L
3405 for (s = abfd->sections; s != NULL; s = s->next)
3406 {
8ded5a0f 3407 if ((s->flags & SEC_LOAD) != 0
0112cd26 3408 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3409 {
3410 /* We need a PT_NOTE segment. */
3411 ++segs;
1c5265b5
JJ
3412 /* Try to create just one PT_NOTE segment
3413 for all adjacent loadable .note* sections.
3414 gABI requires that within a PT_NOTE segment
3415 (and also inside of each SHT_NOTE section)
3416 each note is padded to a multiple of 4 size,
3417 so we check whether the sections are correctly
3418 aligned. */
3419 if (s->alignment_power == 2)
3420 while (s->next != NULL
3421 && s->next->alignment_power == 2
3422 && (s->next->flags & SEC_LOAD) != 0
3423 && CONST_STRNEQ (s->next->name, ".note"))
3424 s = s->next;
8ded5a0f
AM
3425 }
3426 }
3427
3428 for (s = abfd->sections; s != NULL; s = s->next)
3429 {
3430 if (s->flags & SEC_THREAD_LOCAL)
3431 {
3432 /* We need a PT_TLS segment. */
3433 ++segs;
3434 break;
3435 }
3436 }
3437
3438 /* Let the backend count up any program headers it might need. */
2b05f1b7 3439 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3440 if (bed->elf_backend_additional_program_headers)
3441 {
3442 int a;
3443
3444 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3445 if (a == -1)
3446 abort ();
3447 segs += a;
3448 }
3449
3450 return segs * bed->s->sizeof_phdr;
3451}
3452
2ea37f1c
NC
3453/* Find the segment that contains the output_section of section. */
3454
3455Elf_Internal_Phdr *
3456_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3457{
3458 struct elf_segment_map *m;
3459 Elf_Internal_Phdr *p;
3460
3461 for (m = elf_tdata (abfd)->segment_map,
3462 p = elf_tdata (abfd)->phdr;
3463 m != NULL;
3464 m = m->next, p++)
3465 {
3466 int i;
3467
3468 for (i = m->count - 1; i >= 0; i--)
3469 if (m->sections[i] == section)
3470 return p;
3471 }
3472
3473 return NULL;
3474}
3475
252b5132
RH
3476/* Create a mapping from a set of sections to a program segment. */
3477
217aa764
AM
3478static struct elf_segment_map *
3479make_mapping (bfd *abfd,
3480 asection **sections,
3481 unsigned int from,
3482 unsigned int to,
3483 bfd_boolean phdr)
252b5132
RH
3484{
3485 struct elf_segment_map *m;
3486 unsigned int i;
3487 asection **hdrpp;
dc810e39 3488 bfd_size_type amt;
252b5132 3489
dc810e39
AM
3490 amt = sizeof (struct elf_segment_map);
3491 amt += (to - from - 1) * sizeof (asection *);
217aa764 3492 m = bfd_zalloc (abfd, amt);
252b5132
RH
3493 if (m == NULL)
3494 return NULL;
3495 m->next = NULL;
3496 m->p_type = PT_LOAD;
3497 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3498 m->sections[i - from] = *hdrpp;
3499 m->count = to - from;
3500
3501 if (from == 0 && phdr)
3502 {
3503 /* Include the headers in the first PT_LOAD segment. */
3504 m->includes_filehdr = 1;
3505 m->includes_phdrs = 1;
3506 }
3507
3508 return m;
3509}
3510
229fcec5
MM
3511/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3512 on failure. */
3513
3514struct elf_segment_map *
3515_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3516{
3517 struct elf_segment_map *m;
3518
3519 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3520 if (m == NULL)
3521 return NULL;
3522 m->next = NULL;
3523 m->p_type = PT_DYNAMIC;
3524 m->count = 1;
3525 m->sections[0] = dynsec;
08a40648 3526
229fcec5
MM
3527 return m;
3528}
3529
8ded5a0f 3530/* Possibly add or remove segments from the segment map. */
252b5132 3531
b34976b6 3532static bfd_boolean
3dea8fca
AM
3533elf_modify_segment_map (bfd *abfd,
3534 struct bfd_link_info *info,
3535 bfd_boolean remove_empty_load)
252b5132 3536{
252e386e 3537 struct elf_segment_map **m;
8ded5a0f 3538 const struct elf_backend_data *bed;
252b5132 3539
8ded5a0f
AM
3540 /* The placement algorithm assumes that non allocated sections are
3541 not in PT_LOAD segments. We ensure this here by removing such
3542 sections from the segment map. We also remove excluded
252e386e
AM
3543 sections. Finally, any PT_LOAD segment without sections is
3544 removed. */
3545 m = &elf_tdata (abfd)->segment_map;
3546 while (*m)
8ded5a0f
AM
3547 {
3548 unsigned int i, new_count;
252b5132 3549
252e386e 3550 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3551 {
252e386e
AM
3552 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3553 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3554 || (*m)->p_type != PT_LOAD))
8ded5a0f 3555 {
252e386e
AM
3556 (*m)->sections[new_count] = (*m)->sections[i];
3557 new_count++;
8ded5a0f
AM
3558 }
3559 }
252e386e 3560 (*m)->count = new_count;
252b5132 3561
3dea8fca 3562 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3563 *m = (*m)->next;
3564 else
3565 m = &(*m)->next;
8ded5a0f 3566 }
252b5132 3567
8ded5a0f
AM
3568 bed = get_elf_backend_data (abfd);
3569 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3570 {
252e386e 3571 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3572 return FALSE;
252b5132 3573 }
252b5132 3574
8ded5a0f
AM
3575 return TRUE;
3576}
252b5132 3577
8ded5a0f 3578/* Set up a mapping from BFD sections to program segments. */
252b5132 3579
8ded5a0f
AM
3580bfd_boolean
3581_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3582{
3583 unsigned int count;
3584 struct elf_segment_map *m;
3585 asection **sections = NULL;
3586 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3587 bfd_boolean no_user_phdrs;
252b5132 3588
3dea8fca
AM
3589 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
3590 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3591 {
8ded5a0f
AM
3592 asection *s;
3593 unsigned int i;
3594 struct elf_segment_map *mfirst;
3595 struct elf_segment_map **pm;
3596 asection *last_hdr;
3597 bfd_vma last_size;
3598 unsigned int phdr_index;
3599 bfd_vma maxpagesize;
3600 asection **hdrpp;
3601 bfd_boolean phdr_in_segment = TRUE;
3602 bfd_boolean writable;
3603 int tls_count = 0;
3604 asection *first_tls = NULL;
3605 asection *dynsec, *eh_frame_hdr;
3606 bfd_size_type amt;
252b5132 3607
8ded5a0f 3608 /* Select the allocated sections, and sort them. */
252b5132 3609
8ded5a0f
AM
3610 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
3611 if (sections == NULL)
252b5132 3612 goto error_return;
252b5132 3613
8ded5a0f
AM
3614 i = 0;
3615 for (s = abfd->sections; s != NULL; s = s->next)
3616 {
3617 if ((s->flags & SEC_ALLOC) != 0)
3618 {
3619 sections[i] = s;
3620 ++i;
3621 }
3622 }
3623 BFD_ASSERT (i <= bfd_count_sections (abfd));
3624 count = i;
252b5132 3625
8ded5a0f 3626 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3627
8ded5a0f 3628 /* Build the mapping. */
252b5132 3629
8ded5a0f
AM
3630 mfirst = NULL;
3631 pm = &mfirst;
252b5132 3632
8ded5a0f
AM
3633 /* If we have a .interp section, then create a PT_PHDR segment for
3634 the program headers and a PT_INTERP segment for the .interp
3635 section. */
3636 s = bfd_get_section_by_name (abfd, ".interp");
3637 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3638 {
3639 amt = sizeof (struct elf_segment_map);
3640 m = bfd_zalloc (abfd, amt);
3641 if (m == NULL)
3642 goto error_return;
3643 m->next = NULL;
3644 m->p_type = PT_PHDR;
3645 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3646 m->p_flags = PF_R | PF_X;
3647 m->p_flags_valid = 1;
3648 m->includes_phdrs = 1;
252b5132 3649
8ded5a0f
AM
3650 *pm = m;
3651 pm = &m->next;
252b5132 3652
8ded5a0f
AM
3653 amt = sizeof (struct elf_segment_map);
3654 m = bfd_zalloc (abfd, amt);
3655 if (m == NULL)
3656 goto error_return;
3657 m->next = NULL;
3658 m->p_type = PT_INTERP;
3659 m->count = 1;
3660 m->sections[0] = s;
3661
3662 *pm = m;
3663 pm = &m->next;
252b5132 3664 }
8ded5a0f
AM
3665
3666 /* Look through the sections. We put sections in the same program
3667 segment when the start of the second section can be placed within
3668 a few bytes of the end of the first section. */
3669 last_hdr = NULL;
3670 last_size = 0;
3671 phdr_index = 0;
3672 maxpagesize = bed->maxpagesize;
3673 writable = FALSE;
3674 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3675 if (dynsec != NULL
3676 && (dynsec->flags & SEC_LOAD) == 0)
3677 dynsec = NULL;
3678
3679 /* Deal with -Ttext or something similar such that the first section
3680 is not adjacent to the program headers. This is an
3681 approximation, since at this point we don't know exactly how many
3682 program headers we will need. */
3683 if (count > 0)
252b5132 3684 {
8ded5a0f
AM
3685 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3686
62d7a5f6 3687 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3688 phdr_size = get_program_header_size (abfd, info);
3689 if ((abfd->flags & D_PAGED) == 0
3690 || sections[0]->lma < phdr_size
3691 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
3692 phdr_in_segment = FALSE;
252b5132
RH
3693 }
3694
8ded5a0f 3695 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3696 {
8ded5a0f
AM
3697 asection *hdr;
3698 bfd_boolean new_segment;
3699
3700 hdr = *hdrpp;
3701
3702 /* See if this section and the last one will fit in the same
3703 segment. */
3704
3705 if (last_hdr == NULL)
3706 {
3707 /* If we don't have a segment yet, then we don't need a new
3708 one (we build the last one after this loop). */
3709 new_segment = FALSE;
3710 }
3711 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3712 {
3713 /* If this section has a different relation between the
3714 virtual address and the load address, then we need a new
3715 segment. */
3716 new_segment = TRUE;
3717 }
39948a60
NC
3718 /* In the next test we have to be careful when last_hdr->lma is close
3719 to the end of the address space. If the aligned address wraps
3720 around to the start of the address space, then there are no more
3721 pages left in memory and it is OK to assume that the current
3722 section can be included in the current segment. */
3723 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3724 > last_hdr->lma)
3725 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3726 <= hdr->lma))
8ded5a0f
AM
3727 {
3728 /* If putting this section in this segment would force us to
3729 skip a page in the segment, then we need a new segment. */
3730 new_segment = TRUE;
3731 }
3732 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3733 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3734 {
3735 /* We don't want to put a loadable section after a
3736 nonloadable section in the same segment.
3737 Consider .tbss sections as loadable for this purpose. */
3738 new_segment = TRUE;
3739 }
3740 else if ((abfd->flags & D_PAGED) == 0)
3741 {
3742 /* If the file is not demand paged, which means that we
3743 don't require the sections to be correctly aligned in the
3744 file, then there is no other reason for a new segment. */
3745 new_segment = FALSE;
3746 }
3747 else if (! writable
3748 && (hdr->flags & SEC_READONLY) == 0
3749 && (((last_hdr->lma + last_size - 1)
3750 & ~(maxpagesize - 1))
3751 != (hdr->lma & ~(maxpagesize - 1))))
3752 {
3753 /* We don't want to put a writable section in a read only
3754 segment, unless they are on the same page in memory
3755 anyhow. We already know that the last section does not
3756 bring us past the current section on the page, so the
3757 only case in which the new section is not on the same
3758 page as the previous section is when the previous section
3759 ends precisely on a page boundary. */
3760 new_segment = TRUE;
3761 }
3762 else
3763 {
3764 /* Otherwise, we can use the same segment. */
3765 new_segment = FALSE;
3766 }
3767
2889e75b 3768 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3769 if (last_hdr != NULL
3770 && info != NULL
3771 && info->callbacks->override_segment_assignment != NULL)
3772 new_segment
3773 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3774 last_hdr,
3775 new_segment);
2889e75b 3776
8ded5a0f
AM
3777 if (! new_segment)
3778 {
3779 if ((hdr->flags & SEC_READONLY) == 0)
3780 writable = TRUE;
3781 last_hdr = hdr;
3782 /* .tbss sections effectively have zero size. */
3783 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3784 != SEC_THREAD_LOCAL)
3785 last_size = hdr->size;
3786 else
3787 last_size = 0;
3788 continue;
3789 }
3790
3791 /* We need a new program segment. We must create a new program
3792 header holding all the sections from phdr_index until hdr. */
3793
3794 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3795 if (m == NULL)
3796 goto error_return;
3797
3798 *pm = m;
3799 pm = &m->next;
3800
252b5132 3801 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3802 writable = TRUE;
8ded5a0f
AM
3803 else
3804 writable = FALSE;
3805
baaff79e
JJ
3806 last_hdr = hdr;
3807 /* .tbss sections effectively have zero size. */
e5caec89 3808 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3809 last_size = hdr->size;
baaff79e
JJ
3810 else
3811 last_size = 0;
8ded5a0f
AM
3812 phdr_index = i;
3813 phdr_in_segment = FALSE;
252b5132
RH
3814 }
3815
8ded5a0f
AM
3816 /* Create a final PT_LOAD program segment. */
3817 if (last_hdr != NULL)
3818 {
3819 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3820 if (m == NULL)
3821 goto error_return;
252b5132 3822
8ded5a0f
AM
3823 *pm = m;
3824 pm = &m->next;
3825 }
252b5132 3826
8ded5a0f
AM
3827 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3828 if (dynsec != NULL)
3829 {
3830 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
3831 if (m == NULL)
3832 goto error_return;
3833 *pm = m;
3834 pm = &m->next;
3835 }
252b5132 3836
1c5265b5
JJ
3837 /* For each batch of consecutive loadable .note sections,
3838 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
3839 because if we link together nonloadable .note sections and
3840 loadable .note sections, we will generate two .note sections
3841 in the output file. FIXME: Using names for section types is
3842 bogus anyhow. */
8ded5a0f
AM
3843 for (s = abfd->sections; s != NULL; s = s->next)
3844 {
3845 if ((s->flags & SEC_LOAD) != 0
0112cd26 3846 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 3847 {
1c5265b5
JJ
3848 asection *s2;
3849 unsigned count = 1;
8ded5a0f 3850 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
3851 if (s->alignment_power == 2)
3852 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
3853 {
3854 if (s2->next->alignment_power == 2
3855 && (s2->next->flags & SEC_LOAD) != 0
3856 && CONST_STRNEQ (s2->next->name, ".note")
3857 && align_power (s2->vma + s2->size, 2)
3858 == s2->next->vma)
3859 count++;
3860 else
3861 break;
3862 }
1c5265b5 3863 amt += (count - 1) * sizeof (asection *);
8ded5a0f
AM
3864 m = bfd_zalloc (abfd, amt);
3865 if (m == NULL)
3866 goto error_return;
3867 m->next = NULL;
3868 m->p_type = PT_NOTE;
1c5265b5
JJ
3869 m->count = count;
3870 while (count > 1)
3871 {
3872 m->sections[m->count - count--] = s;
3873 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
3874 s = s->next;
3875 }
3876 m->sections[m->count - 1] = s;
3877 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
3878 *pm = m;
3879 pm = &m->next;
3880 }
3881 if (s->flags & SEC_THREAD_LOCAL)
3882 {
3883 if (! tls_count)
3884 first_tls = s;
3885 tls_count++;
3886 }
3887 }
252b5132 3888
8ded5a0f
AM
3889 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3890 if (tls_count > 0)
3891 {
3892 int i;
252b5132 3893
8ded5a0f
AM
3894 amt = sizeof (struct elf_segment_map);
3895 amt += (tls_count - 1) * sizeof (asection *);
3896 m = bfd_zalloc (abfd, amt);
3897 if (m == NULL)
3898 goto error_return;
3899 m->next = NULL;
3900 m->p_type = PT_TLS;
3901 m->count = tls_count;
3902 /* Mandated PF_R. */
3903 m->p_flags = PF_R;
3904 m->p_flags_valid = 1;
3905 for (i = 0; i < tls_count; ++i)
3906 {
3907 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3908 m->sections[i] = first_tls;
3909 first_tls = first_tls->next;
3910 }
252b5132 3911
8ded5a0f
AM
3912 *pm = m;
3913 pm = &m->next;
3914 }
252b5132 3915
8ded5a0f
AM
3916 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3917 segment. */
3918 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3919 if (eh_frame_hdr != NULL
3920 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 3921 {
dc810e39 3922 amt = sizeof (struct elf_segment_map);
217aa764 3923 m = bfd_zalloc (abfd, amt);
252b5132
RH
3924 if (m == NULL)
3925 goto error_return;
3926 m->next = NULL;
8ded5a0f 3927 m->p_type = PT_GNU_EH_FRAME;
252b5132 3928 m->count = 1;
8ded5a0f 3929 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
3930
3931 *pm = m;
3932 pm = &m->next;
3933 }
13ae64f3 3934
8ded5a0f 3935 if (elf_tdata (abfd)->stack_flags)
13ae64f3 3936 {
8ded5a0f
AM
3937 amt = sizeof (struct elf_segment_map);
3938 m = bfd_zalloc (abfd, amt);
3939 if (m == NULL)
3940 goto error_return;
3941 m->next = NULL;
2b05f1b7 3942 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
3943 m->p_flags = elf_tdata (abfd)->stack_flags;
3944 m->p_flags_valid = 1;
252b5132 3945
8ded5a0f
AM
3946 *pm = m;
3947 pm = &m->next;
3948 }
65765700 3949
ceae84aa 3950 if (info != NULL && info->relro)
8ded5a0f 3951 {
f210dcff
L
3952 for (m = mfirst; m != NULL; m = m->next)
3953 {
3954 if (m->p_type == PT_LOAD)
3955 {
3956 asection *last = m->sections[m->count - 1];
3957 bfd_vma vaddr = m->sections[0]->vma;
3958 bfd_vma filesz = last->vma - vaddr + last->size;
65765700 3959
f210dcff
L
3960 if (vaddr < info->relro_end
3961 && vaddr >= info->relro_start
3962 && (vaddr + filesz) >= info->relro_end)
3963 break;
3964 }
3965 }
3966
3967 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
3968 if (m != NULL)
3969 {
3970 amt = sizeof (struct elf_segment_map);
3971 m = bfd_zalloc (abfd, amt);
3972 if (m == NULL)
3973 goto error_return;
3974 m->next = NULL;
3975 m->p_type = PT_GNU_RELRO;
3976 m->p_flags = PF_R;
3977 m->p_flags_valid = 1;
3978
3979 *pm = m;
3980 pm = &m->next;
3981 }
8ded5a0f 3982 }
9ee5e499 3983
8ded5a0f
AM
3984 free (sections);
3985 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
3986 }
3987
3dea8fca 3988 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 3989 return FALSE;
8c37241b 3990
8ded5a0f
AM
3991 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
3992 ++count;
3993 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 3994
b34976b6 3995 return TRUE;
252b5132
RH
3996
3997 error_return:
3998 if (sections != NULL)
3999 free (sections);
b34976b6 4000 return FALSE;
252b5132
RH
4001}
4002
4003/* Sort sections by address. */
4004
4005static int
217aa764 4006elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4007{
4008 const asection *sec1 = *(const asection **) arg1;
4009 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4010 bfd_size_type size1, size2;
252b5132
RH
4011
4012 /* Sort by LMA first, since this is the address used to
4013 place the section into a segment. */
4014 if (sec1->lma < sec2->lma)
4015 return -1;
4016 else if (sec1->lma > sec2->lma)
4017 return 1;
4018
4019 /* Then sort by VMA. Normally the LMA and the VMA will be
4020 the same, and this will do nothing. */
4021 if (sec1->vma < sec2->vma)
4022 return -1;
4023 else if (sec1->vma > sec2->vma)
4024 return 1;
4025
4026 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4027
07c6e936 4028#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4029
4030 if (TOEND (sec1))
4031 {
4032 if (TOEND (sec2))
00a7cdc5
NC
4033 {
4034 /* If the indicies are the same, do not return 0
4035 here, but continue to try the next comparison. */
4036 if (sec1->target_index - sec2->target_index != 0)
4037 return sec1->target_index - sec2->target_index;
4038 }
252b5132
RH
4039 else
4040 return 1;
4041 }
00a7cdc5 4042 else if (TOEND (sec2))
252b5132
RH
4043 return -1;
4044
4045#undef TOEND
4046
00a7cdc5
NC
4047 /* Sort by size, to put zero sized sections
4048 before others at the same address. */
252b5132 4049
eea6121a
AM
4050 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4051 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4052
4053 if (size1 < size2)
252b5132 4054 return -1;
eecdbe52 4055 if (size1 > size2)
252b5132
RH
4056 return 1;
4057
4058 return sec1->target_index - sec2->target_index;
4059}
4060
340b6d91
AC
4061/* Ian Lance Taylor writes:
4062
4063 We shouldn't be using % with a negative signed number. That's just
4064 not good. We have to make sure either that the number is not
4065 negative, or that the number has an unsigned type. When the types
4066 are all the same size they wind up as unsigned. When file_ptr is a
4067 larger signed type, the arithmetic winds up as signed long long,
4068 which is wrong.
4069
4070 What we're trying to say here is something like ``increase OFF by
4071 the least amount that will cause it to be equal to the VMA modulo
4072 the page size.'' */
4073/* In other words, something like:
4074
4075 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4076 off_offset = off % bed->maxpagesize;
4077 if (vma_offset < off_offset)
4078 adjustment = vma_offset + bed->maxpagesize - off_offset;
4079 else
4080 adjustment = vma_offset - off_offset;
08a40648 4081
340b6d91
AC
4082 which can can be collapsed into the expression below. */
4083
4084static file_ptr
4085vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4086{
4087 return ((vma - off) % maxpagesize);
4088}
4089
6d33f217
L
4090static void
4091print_segment_map (const struct elf_segment_map *m)
4092{
4093 unsigned int j;
4094 const char *pt = get_segment_type (m->p_type);
4095 char buf[32];
4096
4097 if (pt == NULL)
4098 {
4099 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4100 sprintf (buf, "LOPROC+%7.7x",
4101 (unsigned int) (m->p_type - PT_LOPROC));
4102 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4103 sprintf (buf, "LOOS+%7.7x",
4104 (unsigned int) (m->p_type - PT_LOOS));
4105 else
4106 snprintf (buf, sizeof (buf), "%8.8x",
4107 (unsigned int) m->p_type);
4108 pt = buf;
4109 }
4110 fprintf (stderr, "%s:", pt);
4111 for (j = 0; j < m->count; j++)
4112 fprintf (stderr, " %s", m->sections [j]->name);
4113 putc ('\n',stderr);
4114}
4115
252b5132
RH
4116/* Assign file positions to the sections based on the mapping from
4117 sections to segments. This function also sets up some fields in
f3520d2f 4118 the file header. */
252b5132 4119
b34976b6 4120static bfd_boolean
f3520d2f
AM
4121assign_file_positions_for_load_sections (bfd *abfd,
4122 struct bfd_link_info *link_info)
252b5132
RH
4123{
4124 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4125 struct elf_segment_map *m;
252b5132 4126 Elf_Internal_Phdr *phdrs;
252b5132 4127 Elf_Internal_Phdr *p;
02bf8d82 4128 file_ptr off;
3f570048 4129 bfd_size_type maxpagesize;
f3520d2f 4130 unsigned int alloc;
0920dee7 4131 unsigned int i, j;
2b0bc088 4132 bfd_vma header_pad = 0;
252b5132 4133
e36284ab 4134 if (link_info == NULL
ceae84aa 4135 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4136 return FALSE;
252b5132 4137
8ded5a0f 4138 alloc = 0;
252b5132 4139 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2b0bc088
NC
4140 {
4141 ++alloc;
4142 if (m->header_size)
4143 header_pad = m->header_size;
4144 }
252b5132
RH
4145
4146 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4147 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4148 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4149
62d7a5f6 4150 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4151 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4152 else
4153 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4154 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4155
4156 if (alloc == 0)
f3520d2f 4157 {
8ded5a0f
AM
4158 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4159 return TRUE;
f3520d2f 4160 }
252b5132 4161
57268894
HPN
4162 /* We're writing the size in elf_tdata (abfd)->program_header_size,
4163 see assign_file_positions_except_relocs, so make sure we have
4164 that amount allocated, with trailing space cleared.
4165 The variable alloc contains the computed need, while elf_tdata
4166 (abfd)->program_header_size contains the size used for the
4167 layout.
4168 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4169 where the layout is forced to according to a larger size in the
4170 last iterations for the testcase ld-elf/header. */
4171 BFD_ASSERT (elf_tdata (abfd)->program_header_size % bed->s->sizeof_phdr
4172 == 0);
4173 phdrs = bfd_zalloc2 (abfd,
4174 (elf_tdata (abfd)->program_header_size
4175 / bed->s->sizeof_phdr),
4176 sizeof (Elf_Internal_Phdr));
f3520d2f 4177 elf_tdata (abfd)->phdr = phdrs;
252b5132 4178 if (phdrs == NULL)
b34976b6 4179 return FALSE;
252b5132 4180
3f570048
AM
4181 maxpagesize = 1;
4182 if ((abfd->flags & D_PAGED) != 0)
4183 maxpagesize = bed->maxpagesize;
4184
252b5132
RH
4185 off = bed->s->sizeof_ehdr;
4186 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4187 if (header_pad < (bfd_vma) off)
4188 header_pad = 0;
4189 else
4190 header_pad -= off;
4191 off += header_pad;
252b5132 4192
0920dee7 4193 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4194 m != NULL;
0920dee7 4195 m = m->next, p++, j++)
252b5132 4196 {
252b5132 4197 asection **secpp;
bf988460
AM
4198 bfd_vma off_adjust;
4199 bfd_boolean no_contents;
252b5132
RH
4200
4201 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4202 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4203 not be done to the PT_NOTE section of a corefile, which may
4204 contain several pseudo-sections artificially created by bfd.
4205 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4206 if (m->count > 1
4207 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4208 && m->p_type == PT_NOTE))
252b5132
RH
4209 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4210 elf_sort_sections);
4211
b301b248
AM
4212 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4213 number of sections with contents contributing to both p_filesz
4214 and p_memsz, followed by a number of sections with no contents
4215 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4216 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4217 p->p_type = m->p_type;
28a7f3e7 4218 p->p_flags = m->p_flags;
252b5132 4219
3f570048
AM
4220 if (m->count == 0)
4221 p->p_vaddr = 0;
4222 else
3271a814 4223 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4224
4225 if (m->p_paddr_valid)
4226 p->p_paddr = m->p_paddr;
4227 else if (m->count == 0)
4228 p->p_paddr = 0;
4229 else
08a40648 4230 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4231
4232 if (p->p_type == PT_LOAD
4233 && (abfd->flags & D_PAGED) != 0)
4234 {
4235 /* p_align in demand paged PT_LOAD segments effectively stores
4236 the maximum page size. When copying an executable with
4237 objcopy, we set m->p_align from the input file. Use this
4238 value for maxpagesize rather than bed->maxpagesize, which
4239 may be different. Note that we use maxpagesize for PT_TLS
4240 segment alignment later in this function, so we are relying
4241 on at least one PT_LOAD segment appearing before a PT_TLS
4242 segment. */
4243 if (m->p_align_valid)
4244 maxpagesize = m->p_align;
4245
4246 p->p_align = maxpagesize;
4247 }
3271a814
NS
4248 else if (m->p_align_valid)
4249 p->p_align = m->p_align;
e970b90a
DJ
4250 else if (m->count == 0)
4251 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4252 else
4253 p->p_align = 0;
4254
bf988460
AM
4255 no_contents = FALSE;
4256 off_adjust = 0;
252b5132 4257 if (p->p_type == PT_LOAD
b301b248 4258 && m->count > 0)
252b5132 4259 {
b301b248 4260 bfd_size_type align;
a49e53ed 4261 unsigned int align_power = 0;
b301b248 4262
3271a814
NS
4263 if (m->p_align_valid)
4264 align = p->p_align;
4265 else
252b5132 4266 {
3271a814
NS
4267 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4268 {
4269 unsigned int secalign;
08a40648 4270
3271a814
NS
4271 secalign = bfd_get_section_alignment (abfd, *secpp);
4272 if (secalign > align_power)
4273 align_power = secalign;
4274 }
4275 align = (bfd_size_type) 1 << align_power;
4276 if (align < maxpagesize)
4277 align = maxpagesize;
b301b248 4278 }
252b5132 4279
02bf8d82
AM
4280 for (i = 0; i < m->count; i++)
4281 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4282 /* If we aren't making room for this section, then
4283 it must be SHT_NOBITS regardless of what we've
4284 set via struct bfd_elf_special_section. */
4285 elf_section_type (m->sections[i]) = SHT_NOBITS;
4286
bf988460 4287 /* Find out whether this segment contains any loadable
aea274d3
AM
4288 sections. */
4289 no_contents = TRUE;
4290 for (i = 0; i < m->count; i++)
4291 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4292 {
4293 no_contents = FALSE;
4294 break;
4295 }
bf988460
AM
4296
4297 off_adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4298 off += off_adjust;
4299 if (no_contents)
4300 {
4301 /* We shouldn't need to align the segment on disk since
4302 the segment doesn't need file space, but the gABI
4303 arguably requires the alignment and glibc ld.so
4304 checks it. So to comply with the alignment
4305 requirement but not waste file space, we adjust
4306 p_offset for just this segment. (OFF_ADJUST is
4307 subtracted from OFF later.) This may put p_offset
4308 past the end of file, but that shouldn't matter. */
4309 }
4310 else
4311 off_adjust = 0;
252b5132 4312 }
b1a6d0b1
NC
4313 /* Make sure the .dynamic section is the first section in the
4314 PT_DYNAMIC segment. */
4315 else if (p->p_type == PT_DYNAMIC
4316 && m->count > 1
4317 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4318 {
4319 _bfd_error_handler
b301b248
AM
4320 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4321 abfd);
b1a6d0b1
NC
4322 bfd_set_error (bfd_error_bad_value);
4323 return FALSE;
4324 }
3f001e84
JK
4325 /* Set the note section type to SHT_NOTE. */
4326 else if (p->p_type == PT_NOTE)
4327 for (i = 0; i < m->count; i++)
4328 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4329
252b5132
RH
4330 p->p_offset = 0;
4331 p->p_filesz = 0;
4332 p->p_memsz = 0;
4333
4334 if (m->includes_filehdr)
4335 {
bf988460 4336 if (!m->p_flags_valid)
252b5132 4337 p->p_flags |= PF_R;
252b5132
RH
4338 p->p_filesz = bed->s->sizeof_ehdr;
4339 p->p_memsz = bed->s->sizeof_ehdr;
4340 if (m->count > 0)
4341 {
4342 BFD_ASSERT (p->p_type == PT_LOAD);
4343
4344 if (p->p_vaddr < (bfd_vma) off)
4345 {
caf47ea6 4346 (*_bfd_error_handler)
b301b248
AM
4347 (_("%B: Not enough room for program headers, try linking with -N"),
4348 abfd);
252b5132 4349 bfd_set_error (bfd_error_bad_value);
b34976b6 4350 return FALSE;
252b5132
RH
4351 }
4352
4353 p->p_vaddr -= off;
bf988460 4354 if (!m->p_paddr_valid)
252b5132
RH
4355 p->p_paddr -= off;
4356 }
252b5132
RH
4357 }
4358
4359 if (m->includes_phdrs)
4360 {
bf988460 4361 if (!m->p_flags_valid)
252b5132
RH
4362 p->p_flags |= PF_R;
4363
f3520d2f 4364 if (!m->includes_filehdr)
252b5132
RH
4365 {
4366 p->p_offset = bed->s->sizeof_ehdr;
4367
4368 if (m->count > 0)
4369 {
4370 BFD_ASSERT (p->p_type == PT_LOAD);
4371 p->p_vaddr -= off - p->p_offset;
bf988460 4372 if (!m->p_paddr_valid)
252b5132
RH
4373 p->p_paddr -= off - p->p_offset;
4374 }
252b5132
RH
4375 }
4376
4377 p->p_filesz += alloc * bed->s->sizeof_phdr;
4378 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4379 if (m->count)
4380 {
4381 p->p_filesz += header_pad;
4382 p->p_memsz += header_pad;
4383 }
252b5132
RH
4384 }
4385
4386 if (p->p_type == PT_LOAD
4387 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4388 {
bf988460 4389 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4390 p->p_offset = off;
252b5132
RH
4391 else
4392 {
4393 file_ptr adjust;
4394
4395 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4396 if (!no_contents)
4397 p->p_filesz += adjust;
252b5132
RH
4398 p->p_memsz += adjust;
4399 }
4400 }
4401
1ea63fd2
AM
4402 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4403 maps. Set filepos for sections in PT_LOAD segments, and in
4404 core files, for sections in PT_NOTE segments.
4405 assign_file_positions_for_non_load_sections will set filepos
4406 for other sections and update p_filesz for other segments. */
252b5132
RH
4407 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4408 {
4409 asection *sec;
252b5132 4410 bfd_size_type align;
627b32bc 4411 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4412
4413 sec = *secpp;
02bf8d82 4414 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4415 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4416
88967714
AM
4417 if ((p->p_type == PT_LOAD
4418 || p->p_type == PT_TLS)
4419 && (this_hdr->sh_type != SHT_NOBITS
4420 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4421 && ((this_hdr->sh_flags & SHF_TLS) == 0
4422 || p->p_type == PT_TLS))))
252b5132 4423 {
11701589 4424 bfd_signed_vma adjust = sec->vma - (p->p_vaddr + p->p_memsz);
252b5132 4425
88967714 4426 if (adjust < 0)
252b5132 4427 {
88967714 4428 (*_bfd_error_handler)
11701589 4429 (_("%B: section %A vma 0x%lx overlaps previous sections"),
37c43c55 4430 abfd, sec, (unsigned long) sec->vma);
88967714
AM
4431 adjust = 0;
4432 }
4433 p->p_memsz += adjust;
0e922b77 4434
88967714
AM
4435 if (this_hdr->sh_type != SHT_NOBITS)
4436 {
4437 off += adjust;
4438 p->p_filesz += adjust;
252b5132 4439 }
252b5132
RH
4440 }
4441
4442 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4443 {
b301b248
AM
4444 /* The section at i == 0 is the one that actually contains
4445 everything. */
4a938328
MS
4446 if (i == 0)
4447 {
627b32bc 4448 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4449 off += this_hdr->sh_size;
4450 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4451 p->p_memsz = 0;
4452 p->p_align = 1;
252b5132 4453 }
4a938328 4454 else
252b5132 4455 {
b301b248 4456 /* The rest are fake sections that shouldn't be written. */
252b5132 4457 sec->filepos = 0;
eea6121a 4458 sec->size = 0;
b301b248
AM
4459 sec->flags = 0;
4460 continue;
252b5132 4461 }
252b5132
RH
4462 }
4463 else
4464 {
b301b248
AM
4465 if (p->p_type == PT_LOAD)
4466 {
02bf8d82
AM
4467 this_hdr->sh_offset = sec->filepos = off;
4468 if (this_hdr->sh_type != SHT_NOBITS)
6a3cd2b4 4469 off += this_hdr->sh_size;
b301b248 4470 }
252b5132 4471
02bf8d82 4472 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4473 {
6a3cd2b4 4474 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4475 /* A load section without SHF_ALLOC is something like
4476 a note section in a PT_NOTE segment. These take
4477 file space but are not loaded into memory. */
4478 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4479 p->p_memsz += this_hdr->sh_size;
b301b248 4480 }
6a3cd2b4 4481 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4482 {
6a3cd2b4
AM
4483 if (p->p_type == PT_TLS)
4484 p->p_memsz += this_hdr->sh_size;
4485
4486 /* .tbss is special. It doesn't contribute to p_memsz of
4487 normal segments. */
4488 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4489 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4490 }
4491
b10a8ae0
L
4492 if (align > p->p_align
4493 && !m->p_align_valid
4494 && (p->p_type != PT_LOAD
4495 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4496 p->p_align = align;
4497 }
4498
bf988460 4499 if (!m->p_flags_valid)
252b5132
RH
4500 {
4501 p->p_flags |= PF_R;
02bf8d82 4502 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4503 p->p_flags |= PF_X;
02bf8d82 4504 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4505 p->p_flags |= PF_W;
4506 }
4507 }
bf988460 4508 off -= off_adjust;
0920dee7 4509
7c928300
AM
4510 /* Check that all sections are in a PT_LOAD segment.
4511 Don't check funky gdb generated core files. */
4512 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
0920dee7
L
4513 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4514 {
4515 Elf_Internal_Shdr *this_hdr;
4516 asection *sec;
4517
4518 sec = *secpp;
4519 this_hdr = &(elf_section_data(sec)->this_hdr);
4520 if (this_hdr->sh_size != 0
4521 && !ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, p))
4522 {
4523 (*_bfd_error_handler)
4524 (_("%B: section `%A' can't be allocated in segment %d"),
4525 abfd, sec, j);
6d33f217 4526 print_segment_map (m);
0920dee7
L
4527 bfd_set_error (bfd_error_bad_value);
4528 return FALSE;
4529 }
4530 }
252b5132
RH
4531 }
4532
f3520d2f
AM
4533 elf_tdata (abfd)->next_file_pos = off;
4534 return TRUE;
4535}
4536
4537/* Assign file positions for the other sections. */
4538
4539static bfd_boolean
4540assign_file_positions_for_non_load_sections (bfd *abfd,
4541 struct bfd_link_info *link_info)
4542{
4543 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4544 Elf_Internal_Shdr **i_shdrpp;
4545 Elf_Internal_Shdr **hdrpp;
4546 Elf_Internal_Phdr *phdrs;
4547 Elf_Internal_Phdr *p;
4548 struct elf_segment_map *m;
4549 bfd_vma filehdr_vaddr, filehdr_paddr;
4550 bfd_vma phdrs_vaddr, phdrs_paddr;
4551 file_ptr off;
4552 unsigned int num_sec;
4553 unsigned int i;
4554 unsigned int count;
4555
5c182d5f
AM
4556 i_shdrpp = elf_elfsections (abfd);
4557 num_sec = elf_numsections (abfd);
f3520d2f 4558 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4559 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4560 {
4561 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4562 Elf_Internal_Shdr *hdr;
4563
4564 hdr = *hdrpp;
4565 if (hdr->bfd_section != NULL
252e386e
AM
4566 && (hdr->bfd_section->filepos != 0
4567 || (hdr->sh_type == SHT_NOBITS
4568 && hdr->contents == NULL)))
627b32bc 4569 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4570 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4571 {
49c13adb
L
4572 if (hdr->sh_size != 0)
4573 ((*_bfd_error_handler)
4574 (_("%B: warning: allocated section `%s' not in segment"),
3ba71138
L
4575 abfd,
4576 (hdr->bfd_section == NULL
4577 ? "*unknown*"
4578 : hdr->bfd_section->name)));
4579 /* We don't need to page align empty sections. */
4580 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4581 off += vma_page_aligned_bias (hdr->sh_addr, off,
4582 bed->maxpagesize);
4583 else
4584 off += vma_page_aligned_bias (hdr->sh_addr, off,
4585 hdr->sh_addralign);
4586 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4587 FALSE);
4588 }
4589 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4590 && hdr->bfd_section == NULL)
4591 || hdr == i_shdrpp[tdata->symtab_section]
4592 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4593 || hdr == i_shdrpp[tdata->strtab_section])
4594 hdr->sh_offset = -1;
4595 else
4596 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4597 }
4598
252b5132
RH
4599 /* Now that we have set the section file positions, we can set up
4600 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4601 count = 0;
4602 filehdr_vaddr = 0;
4603 filehdr_paddr = 0;
4604 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4605 phdrs_paddr = 0;
4606 phdrs = elf_tdata (abfd)->phdr;
4607 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4608 m != NULL;
4609 m = m->next, p++)
4610 {
4611 ++count;
4612 if (p->p_type != PT_LOAD)
4613 continue;
4614
4615 if (m->includes_filehdr)
4616 {
4617 filehdr_vaddr = p->p_vaddr;
4618 filehdr_paddr = p->p_paddr;
4619 }
4620 if (m->includes_phdrs)
4621 {
4622 phdrs_vaddr = p->p_vaddr;
4623 phdrs_paddr = p->p_paddr;
4624 if (m->includes_filehdr)
4625 {
4626 phdrs_vaddr += bed->s->sizeof_ehdr;
4627 phdrs_paddr += bed->s->sizeof_ehdr;
4628 }
4629 }
4630 }
4631
252b5132
RH
4632 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4633 m != NULL;
4634 m = m->next, p++)
4635 {
129af99f 4636 if (p->p_type == PT_GNU_RELRO)
252b5132 4637 {
b84a33b5
AM
4638 const Elf_Internal_Phdr *lp;
4639
129af99f 4640 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
1ea63fd2 4641
129af99f 4642 if (link_info != NULL)
8c37241b 4643 {
129af99f
AS
4644 /* During linking the range of the RELRO segment is passed
4645 in link_info. */
8c37241b
JJ
4646 for (lp = phdrs; lp < phdrs + count; ++lp)
4647 {
4648 if (lp->p_type == PT_LOAD
8c37241b 4649 && lp->p_vaddr >= link_info->relro_start
b84a33b5
AM
4650 && lp->p_vaddr < link_info->relro_end
4651 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end)
8c37241b
JJ
4652 break;
4653 }
8c37241b 4654 }
129af99f
AS
4655 else
4656 {
4657 /* Otherwise we are copying an executable or shared
b84a33b5 4658 library, but we need to use the same linker logic. */
129af99f
AS
4659 for (lp = phdrs; lp < phdrs + count; ++lp)
4660 {
4661 if (lp->p_type == PT_LOAD
4662 && lp->p_paddr == p->p_paddr)
4663 break;
4664 }
b84a33b5
AM
4665 }
4666
4667 if (lp < phdrs + count)
4668 {
4669 p->p_vaddr = lp->p_vaddr;
4670 p->p_paddr = lp->p_paddr;
4671 p->p_offset = lp->p_offset;
4672 if (link_info != NULL)
4673 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4674 else if (m->p_size_valid)
4675 p->p_filesz = m->p_size;
129af99f
AS
4676 else
4677 abort ();
b84a33b5
AM
4678 p->p_memsz = p->p_filesz;
4679 p->p_align = 1;
4680 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 4681 }
9433b9b1 4682 else
b84a33b5
AM
4683 {
4684 memset (p, 0, sizeof *p);
4685 p->p_type = PT_NULL;
4686 }
129af99f
AS
4687 }
4688 else if (m->count != 0)
4689 {
4690 if (p->p_type != PT_LOAD
4691 && (p->p_type != PT_NOTE
4692 || bfd_get_format (abfd) != bfd_core))
4693 {
4694 Elf_Internal_Shdr *hdr;
4695 asection *sect;
4696
4697 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4698
4699 sect = m->sections[m->count - 1];
4700 hdr = &elf_section_data (sect)->this_hdr;
4701 p->p_filesz = sect->filepos - m->sections[0]->filepos;
4702 if (hdr->sh_type != SHT_NOBITS)
4703 p->p_filesz += hdr->sh_size;
4704 p->p_offset = m->sections[0]->filepos;
4705 }
4706 }
4707 else if (m->includes_filehdr)
4708 {
4709 p->p_vaddr = filehdr_vaddr;
4710 if (! m->p_paddr_valid)
4711 p->p_paddr = filehdr_paddr;
4712 }
4713 else if (m->includes_phdrs)
4714 {
4715 p->p_vaddr = phdrs_vaddr;
4716 if (! m->p_paddr_valid)
4717 p->p_paddr = phdrs_paddr;
252b5132
RH
4718 }
4719 }
4720
252b5132
RH
4721 elf_tdata (abfd)->next_file_pos = off;
4722
b34976b6 4723 return TRUE;
252b5132
RH
4724}
4725
252b5132
RH
4726/* Work out the file positions of all the sections. This is called by
4727 _bfd_elf_compute_section_file_positions. All the section sizes and
4728 VMAs must be known before this is called.
4729
e0638f70
AM
4730 Reloc sections come in two flavours: Those processed specially as
4731 "side-channel" data attached to a section to which they apply, and
4732 those that bfd doesn't process as relocations. The latter sort are
4733 stored in a normal bfd section by bfd_section_from_shdr. We don't
4734 consider the former sort here, unless they form part of the loadable
4735 image. Reloc sections not assigned here will be handled later by
4736 assign_file_positions_for_relocs.
252b5132
RH
4737
4738 We also don't set the positions of the .symtab and .strtab here. */
4739
b34976b6 4740static bfd_boolean
c84fca4d
AO
4741assign_file_positions_except_relocs (bfd *abfd,
4742 struct bfd_link_info *link_info)
252b5132 4743{
5c182d5f
AM
4744 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4745 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4746 file_ptr off;
9c5bfbb7 4747 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4748
4749 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4750 && bfd_get_format (abfd) != bfd_core)
4751 {
5c182d5f
AM
4752 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4753 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4754 Elf_Internal_Shdr **hdrpp;
4755 unsigned int i;
4756
4757 /* Start after the ELF header. */
4758 off = i_ehdrp->e_ehsize;
4759
4760 /* We are not creating an executable, which means that we are
4761 not creating a program header, and that the actual order of
4762 the sections in the file is unimportant. */
9ad5cbcf 4763 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4764 {
4765 Elf_Internal_Shdr *hdr;
4766
4767 hdr = *hdrpp;
e0638f70
AM
4768 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4769 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4770 || i == tdata->symtab_section
4771 || i == tdata->symtab_shndx_section
252b5132
RH
4772 || i == tdata->strtab_section)
4773 {
4774 hdr->sh_offset = -1;
252b5132 4775 }
9ad5cbcf 4776 else
b34976b6 4777 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
4778 }
4779 }
4780 else
4781 {
f3520d2f
AM
4782 unsigned int alloc;
4783
252b5132 4784 /* Assign file positions for the loaded sections based on the
08a40648 4785 assignment of sections to segments. */
f3520d2f
AM
4786 if (!assign_file_positions_for_load_sections (abfd, link_info))
4787 return FALSE;
4788
4789 /* And for non-load sections. */
4790 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4791 return FALSE;
4792
e36284ab
AM
4793 if (bed->elf_backend_modify_program_headers != NULL)
4794 {
4795 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4796 return FALSE;
4797 }
4798
f3520d2f
AM
4799 /* Write out the program headers. */
4800 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4801 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4802 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4803 return FALSE;
252b5132 4804
5c182d5f 4805 off = tdata->next_file_pos;
252b5132
RH
4806 }
4807
4808 /* Place the section headers. */
45d6a902 4809 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4810 i_ehdrp->e_shoff = off;
4811 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4812
5c182d5f 4813 tdata->next_file_pos = off;
252b5132 4814
b34976b6 4815 return TRUE;
252b5132
RH
4816}
4817
b34976b6 4818static bfd_boolean
217aa764 4819prep_headers (bfd *abfd)
252b5132
RH
4820{
4821 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4822 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
2b0f7ef9 4823 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4824 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4825
4826 i_ehdrp = elf_elfheader (abfd);
252b5132 4827
2b0f7ef9 4828 shstrtab = _bfd_elf_strtab_init ();
252b5132 4829 if (shstrtab == NULL)
b34976b6 4830 return FALSE;
252b5132
RH
4831
4832 elf_shstrtab (abfd) = shstrtab;
4833
4834 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4835 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4836 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4837 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4838
4839 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4840 i_ehdrp->e_ident[EI_DATA] =
4841 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4842 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4843
252b5132
RH
4844 if ((abfd->flags & DYNAMIC) != 0)
4845 i_ehdrp->e_type = ET_DYN;
4846 else if ((abfd->flags & EXEC_P) != 0)
4847 i_ehdrp->e_type = ET_EXEC;
4848 else if (bfd_get_format (abfd) == bfd_core)
4849 i_ehdrp->e_type = ET_CORE;
4850 else
4851 i_ehdrp->e_type = ET_REL;
4852
4853 switch (bfd_get_arch (abfd))
4854 {
4855 case bfd_arch_unknown:
4856 i_ehdrp->e_machine = EM_NONE;
4857 break;
aa4f99bb
AO
4858
4859 /* There used to be a long list of cases here, each one setting
4860 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4861 in the corresponding bfd definition. To avoid duplication,
4862 the switch was removed. Machines that need special handling
4863 can generally do it in elf_backend_final_write_processing(),
4864 unless they need the information earlier than the final write.
4865 Such need can generally be supplied by replacing the tests for
4866 e_machine with the conditions used to determine it. */
252b5132 4867 default:
9c5bfbb7
AM
4868 i_ehdrp->e_machine = bed->elf_machine_code;
4869 }
aa4f99bb 4870
252b5132
RH
4871 i_ehdrp->e_version = bed->s->ev_current;
4872 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4873
c044fabd 4874 /* No program header, for now. */
252b5132
RH
4875 i_ehdrp->e_phoff = 0;
4876 i_ehdrp->e_phentsize = 0;
4877 i_ehdrp->e_phnum = 0;
4878
c044fabd 4879 /* Each bfd section is section header entry. */
252b5132
RH
4880 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4881 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4882
c044fabd 4883 /* If we're building an executable, we'll need a program header table. */
252b5132 4884 if (abfd->flags & EXEC_P)
0e71e495
BE
4885 /* It all happens later. */
4886 ;
252b5132
RH
4887 else
4888 {
4889 i_ehdrp->e_phentsize = 0;
4890 i_phdrp = 0;
4891 i_ehdrp->e_phoff = 0;
4892 }
4893
4894 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4895 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4896 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4897 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4898 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4899 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4900 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4901 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4902 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4903 return FALSE;
252b5132 4904
b34976b6 4905 return TRUE;
252b5132
RH
4906}
4907
4908/* Assign file positions for all the reloc sections which are not part
4909 of the loadable file image. */
4910
4911void
217aa764 4912_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4913{
4914 file_ptr off;
9ad5cbcf 4915 unsigned int i, num_sec;
252b5132
RH
4916 Elf_Internal_Shdr **shdrpp;
4917
4918 off = elf_tdata (abfd)->next_file_pos;
4919
9ad5cbcf
AM
4920 num_sec = elf_numsections (abfd);
4921 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4922 {
4923 Elf_Internal_Shdr *shdrp;
4924
4925 shdrp = *shdrpp;
4926 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4927 && shdrp->sh_offset == -1)
b34976b6 4928 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4929 }
4930
4931 elf_tdata (abfd)->next_file_pos = off;
4932}
4933
b34976b6 4934bfd_boolean
217aa764 4935_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4936{
9c5bfbb7 4937 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4938 Elf_Internal_Ehdr *i_ehdrp;
4939 Elf_Internal_Shdr **i_shdrp;
b34976b6 4940 bfd_boolean failed;
9ad5cbcf 4941 unsigned int count, num_sec;
252b5132
RH
4942
4943 if (! abfd->output_has_begun
217aa764 4944 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4945 return FALSE;
252b5132
RH
4946
4947 i_shdrp = elf_elfsections (abfd);
4948 i_ehdrp = elf_elfheader (abfd);
4949
b34976b6 4950 failed = FALSE;
252b5132
RH
4951 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4952 if (failed)
b34976b6 4953 return FALSE;
252b5132
RH
4954
4955 _bfd_elf_assign_file_positions_for_relocs (abfd);
4956
c044fabd 4957 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4958 num_sec = elf_numsections (abfd);
4959 for (count = 1; count < num_sec; count++)
252b5132
RH
4960 {
4961 if (bed->elf_backend_section_processing)
4962 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4963 if (i_shdrp[count]->contents)
4964 {
dc810e39
AM
4965 bfd_size_type amt = i_shdrp[count]->sh_size;
4966
252b5132 4967 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4968 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4969 return FALSE;
252b5132
RH
4970 }
4971 }
4972
4973 /* Write out the section header names. */
26ae6d5e
DJ
4974 if (elf_shstrtab (abfd) != NULL
4975 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 4976 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4977 return FALSE;
252b5132
RH
4978
4979 if (bed->elf_backend_final_write_processing)
4980 (*bed->elf_backend_final_write_processing) (abfd,
4981 elf_tdata (abfd)->linker);
4982
ff59fc36
RM
4983 if (!bed->s->write_shdrs_and_ehdr (abfd))
4984 return FALSE;
4985
4986 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
4987 if (elf_tdata (abfd)->after_write_object_contents)
4988 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
4989
4990 return TRUE;
252b5132
RH
4991}
4992
b34976b6 4993bfd_boolean
217aa764 4994_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4995{
c044fabd 4996 /* Hopefully this can be done just like an object file. */
252b5132
RH
4997 return _bfd_elf_write_object_contents (abfd);
4998}
c044fabd
KH
4999
5000/* Given a section, search the header to find them. */
5001
cb33740c 5002unsigned int
198beae2 5003_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5004{
9c5bfbb7 5005 const struct elf_backend_data *bed;
cb33740c 5006 unsigned int index;
252b5132 5007
9ad5cbcf
AM
5008 if (elf_section_data (asect) != NULL
5009 && elf_section_data (asect)->this_idx != 0)
5010 return elf_section_data (asect)->this_idx;
5011
5012 if (bfd_is_abs_section (asect))
af746e92
AM
5013 index = SHN_ABS;
5014 else if (bfd_is_com_section (asect))
5015 index = SHN_COMMON;
5016 else if (bfd_is_und_section (asect))
5017 index = SHN_UNDEF;
5018 else
cb33740c 5019 index = SHN_BAD;
252b5132 5020
af746e92 5021 bed = get_elf_backend_data (abfd);
252b5132
RH
5022 if (bed->elf_backend_section_from_bfd_section)
5023 {
af746e92 5024 int retval = index;
9ad5cbcf 5025
af746e92
AM
5026 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5027 return retval;
252b5132
RH
5028 }
5029
cb33740c 5030 if (index == SHN_BAD)
af746e92 5031 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5032
af746e92 5033 return index;
252b5132
RH
5034}
5035
5036/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5037 on error. */
5038
5039int
217aa764 5040_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5041{
5042 asymbol *asym_ptr = *asym_ptr_ptr;
5043 int idx;
5044 flagword flags = asym_ptr->flags;
5045
5046 /* When gas creates relocations against local labels, it creates its
5047 own symbol for the section, but does put the symbol into the
5048 symbol chain, so udata is 0. When the linker is generating
5049 relocatable output, this section symbol may be for one of the
5050 input sections rather than the output section. */
5051 if (asym_ptr->udata.i == 0
5052 && (flags & BSF_SECTION_SYM)
5053 && asym_ptr->section)
5054 {
5372391b 5055 asection *sec;
252b5132
RH
5056 int indx;
5057
5372391b
AM
5058 sec = asym_ptr->section;
5059 if (sec->owner != abfd && sec->output_section != NULL)
5060 sec = sec->output_section;
5061 if (sec->owner == abfd
5062 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5063 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5064 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5065 }
5066
5067 idx = asym_ptr->udata.i;
5068
5069 if (idx == 0)
5070 {
5071 /* This case can occur when using --strip-symbol on a symbol
08a40648 5072 which is used in a relocation entry. */
252b5132 5073 (*_bfd_error_handler)
d003868e
AM
5074 (_("%B: symbol `%s' required but not present"),
5075 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5076 bfd_set_error (bfd_error_no_symbols);
5077 return -1;
5078 }
5079
5080#if DEBUG & 4
5081 {
5082 fprintf (stderr,
661a3fd4 5083 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5084 (long) asym_ptr, asym_ptr->name, idx, flags,
5085 elf_symbol_flags (flags));
5086 fflush (stderr);
5087 }
5088#endif
5089
5090 return idx;
5091}
5092
84d1d650 5093/* Rewrite program header information. */
252b5132 5094
b34976b6 5095static bfd_boolean
84d1d650 5096rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5097{
b34976b6
AM
5098 Elf_Internal_Ehdr *iehdr;
5099 struct elf_segment_map *map;
5100 struct elf_segment_map *map_first;
5101 struct elf_segment_map **pointer_to_map;
5102 Elf_Internal_Phdr *segment;
5103 asection *section;
5104 unsigned int i;
5105 unsigned int num_segments;
5106 bfd_boolean phdr_included = FALSE;
5c44b38e 5107 bfd_boolean p_paddr_valid;
b34976b6
AM
5108 bfd_vma maxpagesize;
5109 struct elf_segment_map *phdr_adjust_seg = NULL;
5110 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5111 const struct elf_backend_data *bed;
bc67d8a6 5112
caf47ea6 5113 bed = get_elf_backend_data (ibfd);
252b5132
RH
5114 iehdr = elf_elfheader (ibfd);
5115
bc67d8a6 5116 map_first = NULL;
c044fabd 5117 pointer_to_map = &map_first;
252b5132
RH
5118
5119 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5120 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5121
5122 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5123#define SEGMENT_END(segment, start) \
5124 (start + (segment->p_memsz > segment->p_filesz \
5125 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5126
eecdbe52
JJ
5127#define SECTION_SIZE(section, segment) \
5128 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5129 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5130 ? section->size : 0)
eecdbe52 5131
b34976b6 5132 /* Returns TRUE if the given section is contained within
bc67d8a6 5133 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5134#define IS_CONTAINED_BY_VMA(section, segment) \
5135 (section->vma >= segment->p_vaddr \
eecdbe52 5136 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5137 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5138
b34976b6 5139 /* Returns TRUE if the given section is contained within
bc67d8a6 5140 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5141#define IS_CONTAINED_BY_LMA(section, segment, base) \
5142 (section->lma >= base \
eecdbe52 5143 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5144 <= SEGMENT_END (segment, base)))
252b5132 5145
0efc80c8
L
5146 /* Handle PT_NOTE segment. */
5147#define IS_NOTE(p, s) \
aecc8f8a 5148 (p->p_type == PT_NOTE \
0efc80c8 5149 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5150 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5151 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5152 <= p->p_offset + p->p_filesz))
252b5132 5153
0efc80c8
L
5154 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5155 etc. */
5156#define IS_COREFILE_NOTE(p, s) \
5157 (IS_NOTE (p, s) \
5158 && bfd_get_format (ibfd) == bfd_core \
5159 && s->vma == 0 \
5160 && s->lma == 0)
5161
252b5132
RH
5162 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5163 linker, which generates a PT_INTERP section with p_vaddr and
5164 p_memsz set to 0. */
aecc8f8a
AM
5165#define IS_SOLARIS_PT_INTERP(p, s) \
5166 (p->p_vaddr == 0 \
5167 && p->p_paddr == 0 \
5168 && p->p_memsz == 0 \
5169 && p->p_filesz > 0 \
5170 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5171 && s->size > 0 \
aecc8f8a 5172 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5173 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5174 <= p->p_offset + p->p_filesz))
5c440b1e 5175
bc67d8a6
NC
5176 /* Decide if the given section should be included in the given segment.
5177 A section will be included if:
f5ffc919 5178 1. It is within the address space of the segment -- we use the LMA
08a40648 5179 if that is set for the segment and the VMA otherwise,
0efc80c8
L
5180 2. It is an allocated section or a NOTE section in a PT_NOTE
5181 segment.
bc67d8a6 5182 3. There is an output section associated with it,
eecdbe52 5183 4. The section has not already been allocated to a previous segment.
2b05f1b7 5184 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5185 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5186 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5187 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5188 (with the possible exception of .dynamic). */
9f17e2a6 5189#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5190 ((((segment->p_paddr \
5191 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5192 : IS_CONTAINED_BY_VMA (section, segment)) \
5193 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5194 || IS_NOTE (segment, section)) \
2b05f1b7
L
5195 && segment->p_type != PT_GNU_STACK \
5196 && (segment->p_type != PT_TLS \
5197 || (section->flags & SEC_THREAD_LOCAL)) \
5198 && (segment->p_type == PT_LOAD \
5199 || segment->p_type == PT_TLS \
5200 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5201 && (segment->p_type != PT_DYNAMIC \
5202 || SECTION_SIZE (section, segment) > 0 \
5203 || (segment->p_paddr \
5204 ? segment->p_paddr != section->lma \
5205 : segment->p_vaddr != section->vma) \
5206 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5207 == 0)) \
0067a569 5208 && !section->segment_mark)
bc67d8a6 5209
9f17e2a6
L
5210/* If the output section of a section in the input segment is NULL,
5211 it is removed from the corresponding output segment. */
5212#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5213 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5214 && section->output_section != NULL)
5215
b34976b6 5216 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5217#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5218 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5219
5220 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5221 their VMA address ranges and their LMA address ranges overlap.
5222 It is possible to have overlapping VMA ranges without overlapping LMA
5223 ranges. RedBoot images for example can have both .data and .bss mapped
5224 to the same VMA range, but with the .data section mapped to a different
5225 LMA. */
aecc8f8a 5226#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5227 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5228 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5229 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5230 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5231
5232 /* Initialise the segment mark field. */
5233 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5234 section->segment_mark = FALSE;
bc67d8a6 5235
5c44b38e
AM
5236 /* The Solaris linker creates program headers in which all the
5237 p_paddr fields are zero. When we try to objcopy or strip such a
5238 file, we get confused. Check for this case, and if we find it
5239 don't set the p_paddr_valid fields. */
5240 p_paddr_valid = FALSE;
5241 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5242 i < num_segments;
5243 i++, segment++)
5244 if (segment->p_paddr != 0)
5245 {
5246 p_paddr_valid = TRUE;
5247 break;
5248 }
5249
252b5132 5250 /* Scan through the segments specified in the program header
bc67d8a6 5251 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5252 in the loadable segments. These can be created by weird
aecc8f8a 5253 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5254 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5255 i < num_segments;
c044fabd 5256 i++, segment++)
252b5132 5257 {
252b5132 5258 unsigned int j;
c044fabd 5259 Elf_Internal_Phdr *segment2;
252b5132 5260
aecc8f8a
AM
5261 if (segment->p_type == PT_INTERP)
5262 for (section = ibfd->sections; section; section = section->next)
5263 if (IS_SOLARIS_PT_INTERP (segment, section))
5264 {
5265 /* Mininal change so that the normal section to segment
4cc11e76 5266 assignment code will work. */
aecc8f8a
AM
5267 segment->p_vaddr = section->vma;
5268 break;
5269 }
5270
bc67d8a6 5271 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5272 {
5273 /* Remove PT_GNU_RELRO segment. */
5274 if (segment->p_type == PT_GNU_RELRO)
5275 segment->p_type = PT_NULL;
5276 continue;
5277 }
c044fabd 5278
bc67d8a6 5279 /* Determine if this segment overlaps any previous segments. */
0067a569 5280 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5281 {
5282 bfd_signed_vma extra_length;
c044fabd 5283
bc67d8a6 5284 if (segment2->p_type != PT_LOAD
0067a569 5285 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5286 continue;
c044fabd 5287
bc67d8a6
NC
5288 /* Merge the two segments together. */
5289 if (segment2->p_vaddr < segment->p_vaddr)
5290 {
c044fabd 5291 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5292 SEGMENT. */
0067a569
AM
5293 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5294 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5295
bc67d8a6
NC
5296 if (extra_length > 0)
5297 {
0067a569 5298 segment2->p_memsz += extra_length;
bc67d8a6
NC
5299 segment2->p_filesz += extra_length;
5300 }
c044fabd 5301
bc67d8a6 5302 segment->p_type = PT_NULL;
c044fabd 5303
bc67d8a6
NC
5304 /* Since we have deleted P we must restart the outer loop. */
5305 i = 0;
5306 segment = elf_tdata (ibfd)->phdr;
5307 break;
5308 }
5309 else
5310 {
c044fabd 5311 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5312 SEGMENT2. */
0067a569
AM
5313 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5314 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5315
bc67d8a6
NC
5316 if (extra_length > 0)
5317 {
0067a569 5318 segment->p_memsz += extra_length;
bc67d8a6
NC
5319 segment->p_filesz += extra_length;
5320 }
c044fabd 5321
bc67d8a6
NC
5322 segment2->p_type = PT_NULL;
5323 }
5324 }
5325 }
c044fabd 5326
bc67d8a6
NC
5327 /* The second scan attempts to assign sections to segments. */
5328 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5329 i < num_segments;
0067a569 5330 i++, segment++)
bc67d8a6 5331 {
0067a569
AM
5332 unsigned int section_count;
5333 asection **sections;
5334 asection *output_section;
5335 unsigned int isec;
5336 bfd_vma matching_lma;
5337 bfd_vma suggested_lma;
5338 unsigned int j;
dc810e39 5339 bfd_size_type amt;
0067a569
AM
5340 asection *first_section;
5341 bfd_boolean first_matching_lma;
5342 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5343
5344 if (segment->p_type == PT_NULL)
5345 continue;
c044fabd 5346
9f17e2a6 5347 first_section = NULL;
bc67d8a6 5348 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5349 for (section = ibfd->sections, section_count = 0;
5350 section != NULL;
5351 section = section->next)
9f17e2a6
L
5352 {
5353 /* Find the first section in the input segment, which may be
5354 removed from the corresponding output segment. */
5355 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5356 {
5357 if (first_section == NULL)
5358 first_section = section;
5359 if (section->output_section != NULL)
5360 ++section_count;
5361 }
5362 }
811072d8 5363
b5f852ea
NC
5364 /* Allocate a segment map big enough to contain
5365 all of the sections we have selected. */
dc810e39
AM
5366 amt = sizeof (struct elf_segment_map);
5367 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
41f8ce69 5368 map = bfd_zalloc (obfd, amt);
bc67d8a6 5369 if (map == NULL)
b34976b6 5370 return FALSE;
252b5132
RH
5371
5372 /* Initialise the fields of the segment map. Default to
5373 using the physical address of the segment in the input BFD. */
0067a569
AM
5374 map->next = NULL;
5375 map->p_type = segment->p_type;
5376 map->p_flags = segment->p_flags;
bc67d8a6 5377 map->p_flags_valid = 1;
55d55ac7 5378
9f17e2a6
L
5379 /* If the first section in the input segment is removed, there is
5380 no need to preserve segment physical address in the corresponding
5381 output segment. */
945c025a 5382 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5383 {
5384 map->p_paddr = segment->p_paddr;
5c44b38e 5385 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5386 }
252b5132
RH
5387
5388 /* Determine if this segment contains the ELF file header
5389 and if it contains the program headers themselves. */
bc67d8a6
NC
5390 map->includes_filehdr = (segment->p_offset == 0
5391 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5392 map->includes_phdrs = 0;
252b5132 5393
0067a569 5394 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5395 {
bc67d8a6
NC
5396 map->includes_phdrs =
5397 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5398 && (segment->p_offset + segment->p_filesz
252b5132
RH
5399 >= ((bfd_vma) iehdr->e_phoff
5400 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5401
bc67d8a6 5402 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5403 phdr_included = TRUE;
252b5132
RH
5404 }
5405
bc67d8a6 5406 if (section_count == 0)
252b5132
RH
5407 {
5408 /* Special segments, such as the PT_PHDR segment, may contain
5409 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5410 something. They are allowed by the ELF spec however, so only
5411 a warning is produced. */
bc67d8a6 5412 if (segment->p_type == PT_LOAD)
0067a569
AM
5413 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5414 " detected, is this intentional ?\n"),
5415 ibfd);
252b5132 5416
bc67d8a6 5417 map->count = 0;
c044fabd
KH
5418 *pointer_to_map = map;
5419 pointer_to_map = &map->next;
252b5132
RH
5420
5421 continue;
5422 }
5423
5424 /* Now scan the sections in the input BFD again and attempt
5425 to add their corresponding output sections to the segment map.
5426 The problem here is how to handle an output section which has
5427 been moved (ie had its LMA changed). There are four possibilities:
5428
5429 1. None of the sections have been moved.
5430 In this case we can continue to use the segment LMA from the
5431 input BFD.
5432
5433 2. All of the sections have been moved by the same amount.
5434 In this case we can change the segment's LMA to match the LMA
5435 of the first section.
5436
5437 3. Some of the sections have been moved, others have not.
5438 In this case those sections which have not been moved can be
5439 placed in the current segment which will have to have its size,
5440 and possibly its LMA changed, and a new segment or segments will
5441 have to be created to contain the other sections.
5442
b5f852ea 5443 4. The sections have been moved, but not by the same amount.
252b5132
RH
5444 In this case we can change the segment's LMA to match the LMA
5445 of the first section and we will have to create a new segment
5446 or segments to contain the other sections.
5447
5448 In order to save time, we allocate an array to hold the section
5449 pointers that we are interested in. As these sections get assigned
5450 to a segment, they are removed from this array. */
5451
d0fb9a8d 5452 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5453 if (sections == NULL)
b34976b6 5454 return FALSE;
252b5132
RH
5455
5456 /* Step One: Scan for segment vs section LMA conflicts.
5457 Also add the sections to the section array allocated above.
5458 Also add the sections to the current segment. In the common
5459 case, where the sections have not been moved, this means that
5460 we have completely filled the segment, and there is nothing
5461 more to do. */
252b5132 5462 isec = 0;
72730e0c 5463 matching_lma = 0;
252b5132 5464 suggested_lma = 0;
0067a569
AM
5465 first_matching_lma = TRUE;
5466 first_suggested_lma = TRUE;
252b5132 5467
147d51c2 5468 for (section = ibfd->sections;
bc67d8a6
NC
5469 section != NULL;
5470 section = section->next)
147d51c2
L
5471 if (section == first_section)
5472 break;
5473
5474 for (j = 0; section != NULL; section = section->next)
252b5132 5475 {
caf47ea6 5476 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5477 {
bc67d8a6
NC
5478 output_section = section->output_section;
5479
0067a569 5480 sections[j++] = section;
252b5132
RH
5481
5482 /* The Solaris native linker always sets p_paddr to 0.
5483 We try to catch that case here, and set it to the
5e8d7549
NC
5484 correct value. Note - some backends require that
5485 p_paddr be left as zero. */
5c44b38e 5486 if (!p_paddr_valid
4455705d 5487 && segment->p_vaddr != 0
0067a569 5488 && !bed->want_p_paddr_set_to_zero
252b5132 5489 && isec == 0
bc67d8a6 5490 && output_section->lma != 0
0067a569
AM
5491 && output_section->vma == (segment->p_vaddr
5492 + (map->includes_filehdr
5493 ? iehdr->e_ehsize
5494 : 0)
5495 + (map->includes_phdrs
5496 ? (iehdr->e_phnum
5497 * iehdr->e_phentsize)
5498 : 0)))
bc67d8a6 5499 map->p_paddr = segment->p_vaddr;
252b5132
RH
5500
5501 /* Match up the physical address of the segment with the
5502 LMA address of the output section. */
bc67d8a6 5503 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5504 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5505 || (bed->want_p_paddr_set_to_zero
5506 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5507 {
0067a569
AM
5508 if (first_matching_lma || output_section->lma < matching_lma)
5509 {
5510 matching_lma = output_section->lma;
5511 first_matching_lma = FALSE;
5512 }
252b5132
RH
5513
5514 /* We assume that if the section fits within the segment
bc67d8a6 5515 then it does not overlap any other section within that
252b5132 5516 segment. */
0067a569
AM
5517 map->sections[isec++] = output_section;
5518 }
5519 else if (first_suggested_lma)
5520 {
5521 suggested_lma = output_section->lma;
5522 first_suggested_lma = FALSE;
252b5132 5523 }
147d51c2
L
5524
5525 if (j == section_count)
5526 break;
252b5132
RH
5527 }
5528 }
5529
bc67d8a6 5530 BFD_ASSERT (j == section_count);
252b5132
RH
5531
5532 /* Step Two: Adjust the physical address of the current segment,
5533 if necessary. */
bc67d8a6 5534 if (isec == section_count)
252b5132
RH
5535 {
5536 /* All of the sections fitted within the segment as currently
5537 specified. This is the default case. Add the segment to
5538 the list of built segments and carry on to process the next
5539 program header in the input BFD. */
bc67d8a6 5540 map->count = section_count;
c044fabd
KH
5541 *pointer_to_map = map;
5542 pointer_to_map = &map->next;
08a40648 5543
5c44b38e
AM
5544 if (p_paddr_valid
5545 && !bed->want_p_paddr_set_to_zero
147d51c2 5546 && matching_lma != map->p_paddr
5c44b38e
AM
5547 && !map->includes_filehdr
5548 && !map->includes_phdrs)
3271a814
NS
5549 /* There is some padding before the first section in the
5550 segment. So, we must account for that in the output
5551 segment's vma. */
5552 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5553
252b5132
RH
5554 free (sections);
5555 continue;
5556 }
252b5132
RH
5557 else
5558 {
0067a569 5559 if (!first_matching_lma)
72730e0c
AM
5560 {
5561 /* At least one section fits inside the current segment.
5562 Keep it, but modify its physical address to match the
5563 LMA of the first section that fitted. */
bc67d8a6 5564 map->p_paddr = matching_lma;
72730e0c
AM
5565 }
5566 else
5567 {
5568 /* None of the sections fitted inside the current segment.
5569 Change the current segment's physical address to match
5570 the LMA of the first section. */
bc67d8a6 5571 map->p_paddr = suggested_lma;
72730e0c
AM
5572 }
5573
bc67d8a6
NC
5574 /* Offset the segment physical address from the lma
5575 to allow for space taken up by elf headers. */
5576 if (map->includes_filehdr)
010c8431
AM
5577 {
5578 if (map->p_paddr >= iehdr->e_ehsize)
5579 map->p_paddr -= iehdr->e_ehsize;
5580 else
5581 {
5582 map->includes_filehdr = FALSE;
5583 map->includes_phdrs = FALSE;
5584 }
5585 }
252b5132 5586
bc67d8a6
NC
5587 if (map->includes_phdrs)
5588 {
010c8431
AM
5589 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5590 {
5591 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5592
5593 /* iehdr->e_phnum is just an estimate of the number
5594 of program headers that we will need. Make a note
5595 here of the number we used and the segment we chose
5596 to hold these headers, so that we can adjust the
5597 offset when we know the correct value. */
5598 phdr_adjust_num = iehdr->e_phnum;
5599 phdr_adjust_seg = map;
5600 }
5601 else
5602 map->includes_phdrs = FALSE;
bc67d8a6 5603 }
252b5132
RH
5604 }
5605
5606 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5607 those that fit to the current segment and removing them from the
252b5132
RH
5608 sections array; but making sure not to leave large gaps. Once all
5609 possible sections have been assigned to the current segment it is
5610 added to the list of built segments and if sections still remain
5611 to be assigned, a new segment is constructed before repeating
5612 the loop. */
5613 isec = 0;
5614 do
5615 {
bc67d8a6 5616 map->count = 0;
252b5132 5617 suggested_lma = 0;
0067a569 5618 first_suggested_lma = TRUE;
252b5132
RH
5619
5620 /* Fill the current segment with sections that fit. */
bc67d8a6 5621 for (j = 0; j < section_count; j++)
252b5132 5622 {
bc67d8a6 5623 section = sections[j];
252b5132 5624
bc67d8a6 5625 if (section == NULL)
252b5132
RH
5626 continue;
5627
bc67d8a6 5628 output_section = section->output_section;
252b5132 5629
bc67d8a6 5630 BFD_ASSERT (output_section != NULL);
c044fabd 5631
bc67d8a6
NC
5632 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5633 || IS_COREFILE_NOTE (segment, section))
252b5132 5634 {
bc67d8a6 5635 if (map->count == 0)
252b5132
RH
5636 {
5637 /* If the first section in a segment does not start at
bc67d8a6
NC
5638 the beginning of the segment, then something is
5639 wrong. */
0067a569
AM
5640 if (output_section->lma
5641 != (map->p_paddr
5642 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5643 + (map->includes_phdrs
5644 ? iehdr->e_phnum * iehdr->e_phentsize
5645 : 0)))
252b5132
RH
5646 abort ();
5647 }
5648 else
5649 {
0067a569 5650 asection *prev_sec;
252b5132 5651
bc67d8a6 5652 prev_sec = map->sections[map->count - 1];
252b5132
RH
5653
5654 /* If the gap between the end of the previous section
bc67d8a6
NC
5655 and the start of this section is more than
5656 maxpagesize then we need to start a new segment. */
eea6121a 5657 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5658 maxpagesize)
caf47ea6 5659 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 5660 || (prev_sec->lma + prev_sec->size
079e9a2f 5661 > output_section->lma))
252b5132 5662 {
0067a569
AM
5663 if (first_suggested_lma)
5664 {
5665 suggested_lma = output_section->lma;
5666 first_suggested_lma = FALSE;
5667 }
252b5132
RH
5668
5669 continue;
5670 }
5671 }
5672
bc67d8a6 5673 map->sections[map->count++] = output_section;
252b5132
RH
5674 ++isec;
5675 sections[j] = NULL;
b34976b6 5676 section->segment_mark = TRUE;
252b5132 5677 }
0067a569
AM
5678 else if (first_suggested_lma)
5679 {
5680 suggested_lma = output_section->lma;
5681 first_suggested_lma = FALSE;
5682 }
252b5132
RH
5683 }
5684
bc67d8a6 5685 BFD_ASSERT (map->count > 0);
252b5132
RH
5686
5687 /* Add the current segment to the list of built segments. */
c044fabd
KH
5688 *pointer_to_map = map;
5689 pointer_to_map = &map->next;
252b5132 5690
bc67d8a6 5691 if (isec < section_count)
252b5132
RH
5692 {
5693 /* We still have not allocated all of the sections to
5694 segments. Create a new segment here, initialise it
5695 and carry on looping. */
dc810e39
AM
5696 amt = sizeof (struct elf_segment_map);
5697 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5698 map = bfd_alloc (obfd, amt);
bc67d8a6 5699 if (map == NULL)
5ed6aba4
NC
5700 {
5701 free (sections);
5702 return FALSE;
5703 }
252b5132
RH
5704
5705 /* Initialise the fields of the segment map. Set the physical
5706 physical address to the LMA of the first section that has
5707 not yet been assigned. */
0067a569
AM
5708 map->next = NULL;
5709 map->p_type = segment->p_type;
5710 map->p_flags = segment->p_flags;
5711 map->p_flags_valid = 1;
5712 map->p_paddr = suggested_lma;
5c44b38e 5713 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 5714 map->includes_filehdr = 0;
0067a569 5715 map->includes_phdrs = 0;
252b5132
RH
5716 }
5717 }
bc67d8a6 5718 while (isec < section_count);
252b5132
RH
5719
5720 free (sections);
5721 }
5722
bc67d8a6
NC
5723 elf_tdata (obfd)->segment_map = map_first;
5724
5725 /* If we had to estimate the number of program headers that were
9ad5cbcf 5726 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5727 the offset if necessary. */
5728 if (phdr_adjust_seg != NULL)
5729 {
5730 unsigned int count;
c044fabd 5731
bc67d8a6 5732 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5733 count++;
252b5132 5734
bc67d8a6
NC
5735 if (count > phdr_adjust_num)
5736 phdr_adjust_seg->p_paddr
5737 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5738 }
c044fabd 5739
bc67d8a6 5740#undef SEGMENT_END
eecdbe52 5741#undef SECTION_SIZE
bc67d8a6
NC
5742#undef IS_CONTAINED_BY_VMA
5743#undef IS_CONTAINED_BY_LMA
0efc80c8 5744#undef IS_NOTE
252b5132 5745#undef IS_COREFILE_NOTE
bc67d8a6 5746#undef IS_SOLARIS_PT_INTERP
9f17e2a6 5747#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
5748#undef INCLUDE_SECTION_IN_SEGMENT
5749#undef SEGMENT_AFTER_SEGMENT
5750#undef SEGMENT_OVERLAPS
b34976b6 5751 return TRUE;
252b5132
RH
5752}
5753
84d1d650
L
5754/* Copy ELF program header information. */
5755
5756static bfd_boolean
5757copy_elf_program_header (bfd *ibfd, bfd *obfd)
5758{
5759 Elf_Internal_Ehdr *iehdr;
5760 struct elf_segment_map *map;
5761 struct elf_segment_map *map_first;
5762 struct elf_segment_map **pointer_to_map;
5763 Elf_Internal_Phdr *segment;
5764 unsigned int i;
5765 unsigned int num_segments;
5766 bfd_boolean phdr_included = FALSE;
88967714 5767 bfd_boolean p_paddr_valid;
84d1d650
L
5768
5769 iehdr = elf_elfheader (ibfd);
5770
5771 map_first = NULL;
5772 pointer_to_map = &map_first;
5773
88967714
AM
5774 /* If all the segment p_paddr fields are zero, don't set
5775 map->p_paddr_valid. */
5776 p_paddr_valid = FALSE;
84d1d650 5777 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
5778 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5779 i < num_segments;
5780 i++, segment++)
5781 if (segment->p_paddr != 0)
5782 {
5783 p_paddr_valid = TRUE;
5784 break;
5785 }
5786
84d1d650
L
5787 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5788 i < num_segments;
5789 i++, segment++)
5790 {
5791 asection *section;
5792 unsigned int section_count;
5793 bfd_size_type amt;
5794 Elf_Internal_Shdr *this_hdr;
53020534 5795 asection *first_section = NULL;
c981028a 5796 asection *lowest_section = NULL;
84d1d650 5797
84d1d650
L
5798 /* Compute how many sections are in this segment. */
5799 for (section = ibfd->sections, section_count = 0;
5800 section != NULL;
5801 section = section->next)
5802 {
5803 this_hdr = &(elf_section_data(section)->this_hdr);
5804 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
3271a814 5805 {
53020534 5806 if (!first_section)
c981028a
DJ
5807 first_section = lowest_section = section;
5808 if (section->lma < lowest_section->lma)
5809 lowest_section = section;
3271a814
NS
5810 section_count++;
5811 }
84d1d650
L
5812 }
5813
5814 /* Allocate a segment map big enough to contain
5815 all of the sections we have selected. */
5816 amt = sizeof (struct elf_segment_map);
5817 if (section_count != 0)
5818 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
41f8ce69 5819 map = bfd_zalloc (obfd, amt);
84d1d650
L
5820 if (map == NULL)
5821 return FALSE;
5822
5823 /* Initialize the fields of the output segment map with the
5824 input segment. */
5825 map->next = NULL;
5826 map->p_type = segment->p_type;
5827 map->p_flags = segment->p_flags;
5828 map->p_flags_valid = 1;
5829 map->p_paddr = segment->p_paddr;
88967714 5830 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
5831 map->p_align = segment->p_align;
5832 map->p_align_valid = 1;
3271a814 5833 map->p_vaddr_offset = 0;
84d1d650 5834
9433b9b1 5835 if (map->p_type == PT_GNU_RELRO)
b10a8ae0
L
5836 {
5837 /* The PT_GNU_RELRO segment may contain the first a few
5838 bytes in the .got.plt section even if the whole .got.plt
5839 section isn't in the PT_GNU_RELRO segment. We won't
5840 change the size of the PT_GNU_RELRO segment. */
9433b9b1 5841 map->p_size = segment->p_memsz;
b10a8ae0
L
5842 map->p_size_valid = 1;
5843 }
5844
84d1d650
L
5845 /* Determine if this segment contains the ELF file header
5846 and if it contains the program headers themselves. */
5847 map->includes_filehdr = (segment->p_offset == 0
5848 && segment->p_filesz >= iehdr->e_ehsize);
5849
5850 map->includes_phdrs = 0;
5851 if (! phdr_included || segment->p_type != PT_LOAD)
5852 {
5853 map->includes_phdrs =
5854 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5855 && (segment->p_offset + segment->p_filesz
5856 >= ((bfd_vma) iehdr->e_phoff
5857 + iehdr->e_phnum * iehdr->e_phentsize)));
5858
5859 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5860 phdr_included = TRUE;
5861 }
5862
2b0bc088
NC
5863 if (map->includes_filehdr && first_section)
5864 /* We need to keep the space used by the headers fixed. */
5865 map->header_size = first_section->vma - segment->p_vaddr;
5866
88967714
AM
5867 if (!map->includes_phdrs
5868 && !map->includes_filehdr
5869 && map->p_paddr_valid)
3271a814 5870 /* There is some other padding before the first section. */
c981028a 5871 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
53020534 5872 - segment->p_paddr);
08a40648 5873
84d1d650
L
5874 if (section_count != 0)
5875 {
5876 unsigned int isec = 0;
5877
53020534 5878 for (section = first_section;
84d1d650
L
5879 section != NULL;
5880 section = section->next)
5881 {
5882 this_hdr = &(elf_section_data(section)->this_hdr);
5883 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
53020534
L
5884 {
5885 map->sections[isec++] = section->output_section;
5886 if (isec == section_count)
5887 break;
5888 }
84d1d650
L
5889 }
5890 }
5891
5892 map->count = section_count;
5893 *pointer_to_map = map;
5894 pointer_to_map = &map->next;
5895 }
5896
5897 elf_tdata (obfd)->segment_map = map_first;
5898 return TRUE;
5899}
5900
5901/* Copy private BFD data. This copies or rewrites ELF program header
5902 information. */
5903
5904static bfd_boolean
5905copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5906{
84d1d650
L
5907 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5908 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5909 return TRUE;
5910
5911 if (elf_tdata (ibfd)->phdr == NULL)
5912 return TRUE;
5913
5914 if (ibfd->xvec == obfd->xvec)
5915 {
cb3ff1e5
NC
5916 /* Check to see if any sections in the input BFD
5917 covered by ELF program header have changed. */
d55ce4e2 5918 Elf_Internal_Phdr *segment;
84d1d650
L
5919 asection *section, *osec;
5920 unsigned int i, num_segments;
5921 Elf_Internal_Shdr *this_hdr;
147d51c2
L
5922 const struct elf_backend_data *bed;
5923
5924 bed = get_elf_backend_data (ibfd);
5925
5926 /* Regenerate the segment map if p_paddr is set to 0. */
5927 if (bed->want_p_paddr_set_to_zero)
5928 goto rewrite;
84d1d650
L
5929
5930 /* Initialize the segment mark field. */
5931 for (section = obfd->sections; section != NULL;
5932 section = section->next)
5933 section->segment_mark = FALSE;
5934
5935 num_segments = elf_elfheader (ibfd)->e_phnum;
5936 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5937 i < num_segments;
5938 i++, segment++)
5939 {
5f6999aa
NC
5940 /* PR binutils/3535. The Solaris linker always sets the p_paddr
5941 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
5942 which severly confuses things, so always regenerate the segment
5943 map in this case. */
5944 if (segment->p_paddr == 0
5945 && segment->p_memsz == 0
5946 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 5947 goto rewrite;
5f6999aa 5948
84d1d650
L
5949 for (section = ibfd->sections;
5950 section != NULL; section = section->next)
5951 {
5952 /* We mark the output section so that we know it comes
5953 from the input BFD. */
5954 osec = section->output_section;
5955 if (osec)
5956 osec->segment_mark = TRUE;
5957
5958 /* Check if this section is covered by the segment. */
5959 this_hdr = &(elf_section_data(section)->this_hdr);
5960 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5961 {
5962 /* FIXME: Check if its output section is changed or
5963 removed. What else do we need to check? */
5964 if (osec == NULL
5965 || section->flags != osec->flags
5966 || section->lma != osec->lma
5967 || section->vma != osec->vma
5968 || section->size != osec->size
5969 || section->rawsize != osec->rawsize
5970 || section->alignment_power != osec->alignment_power)
5971 goto rewrite;
5972 }
5973 }
5974 }
5975
cb3ff1e5 5976 /* Check to see if any output section do not come from the
84d1d650
L
5977 input BFD. */
5978 for (section = obfd->sections; section != NULL;
5979 section = section->next)
5980 {
5981 if (section->segment_mark == FALSE)
5982 goto rewrite;
5983 else
5984 section->segment_mark = FALSE;
5985 }
5986
5987 return copy_elf_program_header (ibfd, obfd);
5988 }
5989
5990rewrite:
5991 return rewrite_elf_program_header (ibfd, obfd);
5992}
5993
ccd2ec6a
L
5994/* Initialize private output section information from input section. */
5995
5996bfd_boolean
5997_bfd_elf_init_private_section_data (bfd *ibfd,
5998 asection *isec,
5999 bfd *obfd,
6000 asection *osec,
6001 struct bfd_link_info *link_info)
6002
6003{
6004 Elf_Internal_Shdr *ihdr, *ohdr;
6005 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
6006
6007 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6008 || obfd->xvec->flavour != bfd_target_elf_flavour)
6009 return TRUE;
6010
e843e0f8 6011 /* Don't copy the output ELF section type from input if the
d3fd4074 6012 output BFD section flags have been set to something different.
e843e0f8
L
6013 elf_fake_sections will set ELF section type based on BFD
6014 section flags. */
42bb2e33
AM
6015 if (elf_section_type (osec) == SHT_NULL
6016 && (osec->flags == isec->flags || !osec->flags))
6017 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6018
6019 /* FIXME: Is this correct for all OS/PROC specific flags? */
6020 elf_section_flags (osec) |= (elf_section_flags (isec)
6021 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6022
6023 /* Set things up for objcopy and relocatable link. The output
6024 SHT_GROUP section will have its elf_next_in_group pointing back
6025 to the input group members. Ignore linker created group section.
6026 See elfNN_ia64_object_p in elfxx-ia64.c. */
ccd2ec6a
L
6027 if (need_group)
6028 {
6029 if (elf_sec_group (isec) == NULL
6030 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6031 {
6032 if (elf_section_flags (isec) & SHF_GROUP)
6033 elf_section_flags (osec) |= SHF_GROUP;
6034 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6035 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6036 }
6037 }
6038
6039 ihdr = &elf_section_data (isec)->this_hdr;
6040
6041 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6042 don't use the output section of the linked-to section since it
6043 may be NULL at this point. */
6044 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6045 {
6046 ohdr = &elf_section_data (osec)->this_hdr;
6047 ohdr->sh_flags |= SHF_LINK_ORDER;
6048 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6049 }
6050
6051 osec->use_rela_p = isec->use_rela_p;
6052
6053 return TRUE;
6054}
6055
252b5132
RH
6056/* Copy private section information. This copies over the entsize
6057 field, and sometimes the info field. */
6058
b34976b6 6059bfd_boolean
217aa764
AM
6060_bfd_elf_copy_private_section_data (bfd *ibfd,
6061 asection *isec,
6062 bfd *obfd,
6063 asection *osec)
252b5132
RH
6064{
6065 Elf_Internal_Shdr *ihdr, *ohdr;
6066
6067 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6068 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6069 return TRUE;
252b5132 6070
252b5132
RH
6071 ihdr = &elf_section_data (isec)->this_hdr;
6072 ohdr = &elf_section_data (osec)->this_hdr;
6073
6074 ohdr->sh_entsize = ihdr->sh_entsize;
6075
6076 if (ihdr->sh_type == SHT_SYMTAB
6077 || ihdr->sh_type == SHT_DYNSYM
6078 || ihdr->sh_type == SHT_GNU_verneed
6079 || ihdr->sh_type == SHT_GNU_verdef)
6080 ohdr->sh_info = ihdr->sh_info;
6081
ccd2ec6a
L
6082 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6083 NULL);
252b5132
RH
6084}
6085
80fccad2
BW
6086/* Copy private header information. */
6087
6088bfd_boolean
6089_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6090{
30288845
AM
6091 asection *isec;
6092
80fccad2
BW
6093 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6094 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6095 return TRUE;
6096
6097 /* Copy over private BFD data if it has not already been copied.
6098 This must be done here, rather than in the copy_private_bfd_data
6099 entry point, because the latter is called after the section
6100 contents have been set, which means that the program headers have
6101 already been worked out. */
6102 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6103 {
6104 if (! copy_private_bfd_data (ibfd, obfd))
6105 return FALSE;
6106 }
6107
30288845
AM
6108 /* _bfd_elf_copy_private_section_data copied over the SHF_GROUP flag
6109 but this might be wrong if we deleted the group section. */
6110 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
6111 if (elf_section_type (isec) == SHT_GROUP
6112 && isec->output_section == NULL)
6113 {
6114 asection *first = elf_next_in_group (isec);
6115 asection *s = first;
6116 while (s != NULL)
6117 {
6118 if (s->output_section != NULL)
6119 {
6120 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6121 elf_group_name (s->output_section) = NULL;
6122 }
6123 s = elf_next_in_group (s);
6124 if (s == first)
6125 break;
6126 }
6127 }
6128
80fccad2
BW
6129 return TRUE;
6130}
6131
252b5132
RH
6132/* Copy private symbol information. If this symbol is in a section
6133 which we did not map into a BFD section, try to map the section
6134 index correctly. We use special macro definitions for the mapped
6135 section indices; these definitions are interpreted by the
6136 swap_out_syms function. */
6137
9ad5cbcf
AM
6138#define MAP_ONESYMTAB (SHN_HIOS + 1)
6139#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6140#define MAP_STRTAB (SHN_HIOS + 3)
6141#define MAP_SHSTRTAB (SHN_HIOS + 4)
6142#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6143
b34976b6 6144bfd_boolean
217aa764
AM
6145_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6146 asymbol *isymarg,
6147 bfd *obfd,
6148 asymbol *osymarg)
252b5132
RH
6149{
6150 elf_symbol_type *isym, *osym;
6151
6152 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6153 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6154 return TRUE;
252b5132
RH
6155
6156 isym = elf_symbol_from (ibfd, isymarg);
6157 osym = elf_symbol_from (obfd, osymarg);
6158
6159 if (isym != NULL
8424d8f5 6160 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6161 && osym != NULL
6162 && bfd_is_abs_section (isym->symbol.section))
6163 {
6164 unsigned int shndx;
6165
6166 shndx = isym->internal_elf_sym.st_shndx;
6167 if (shndx == elf_onesymtab (ibfd))
6168 shndx = MAP_ONESYMTAB;
6169 else if (shndx == elf_dynsymtab (ibfd))
6170 shndx = MAP_DYNSYMTAB;
6171 else if (shndx == elf_tdata (ibfd)->strtab_section)
6172 shndx = MAP_STRTAB;
6173 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6174 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6175 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6176 shndx = MAP_SYM_SHNDX;
252b5132
RH
6177 osym->internal_elf_sym.st_shndx = shndx;
6178 }
6179
b34976b6 6180 return TRUE;
252b5132
RH
6181}
6182
6183/* Swap out the symbols. */
6184
b34976b6 6185static bfd_boolean
217aa764
AM
6186swap_out_syms (bfd *abfd,
6187 struct bfd_strtab_hash **sttp,
6188 int relocatable_p)
252b5132 6189{
9c5bfbb7 6190 const struct elf_backend_data *bed;
079e9a2f
AM
6191 int symcount;
6192 asymbol **syms;
6193 struct bfd_strtab_hash *stt;
6194 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6195 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6196 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6197 bfd_byte *outbound_syms;
6198 bfd_byte *outbound_shndx;
079e9a2f
AM
6199 int idx;
6200 bfd_size_type amt;
174fd7f9 6201 bfd_boolean name_local_sections;
252b5132
RH
6202
6203 if (!elf_map_symbols (abfd))
b34976b6 6204 return FALSE;
252b5132 6205
c044fabd 6206 /* Dump out the symtabs. */
079e9a2f
AM
6207 stt = _bfd_elf_stringtab_init ();
6208 if (stt == NULL)
b34976b6 6209 return FALSE;
252b5132 6210
079e9a2f
AM
6211 bed = get_elf_backend_data (abfd);
6212 symcount = bfd_get_symcount (abfd);
6213 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6214 symtab_hdr->sh_type = SHT_SYMTAB;
6215 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6216 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6217 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
72de5009 6218 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6219
6220 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6221 symstrtab_hdr->sh_type = SHT_STRTAB;
6222
d0fb9a8d 6223 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 6224 if (outbound_syms == NULL)
5ed6aba4
NC
6225 {
6226 _bfd_stringtab_free (stt);
6227 return FALSE;
6228 }
217aa764 6229 symtab_hdr->contents = outbound_syms;
252b5132 6230
9ad5cbcf
AM
6231 outbound_shndx = NULL;
6232 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6233 if (symtab_shndx_hdr->sh_name != 0)
6234 {
6235 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
6236 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
6237 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6238 if (outbound_shndx == NULL)
5ed6aba4
NC
6239 {
6240 _bfd_stringtab_free (stt);
6241 return FALSE;
6242 }
6243
9ad5cbcf
AM
6244 symtab_shndx_hdr->contents = outbound_shndx;
6245 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6246 symtab_shndx_hdr->sh_size = amt;
6247 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6248 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6249 }
6250
589e6347 6251 /* Now generate the data (for "contents"). */
079e9a2f
AM
6252 {
6253 /* Fill in zeroth symbol and swap it out. */
6254 Elf_Internal_Sym sym;
6255 sym.st_name = 0;
6256 sym.st_value = 0;
6257 sym.st_size = 0;
6258 sym.st_info = 0;
6259 sym.st_other = 0;
6260 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6261 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6262 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6263 if (outbound_shndx != NULL)
6264 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6265 }
252b5132 6266
174fd7f9
RS
6267 name_local_sections
6268 = (bed->elf_backend_name_local_section_symbols
6269 && bed->elf_backend_name_local_section_symbols (abfd));
6270
079e9a2f
AM
6271 syms = bfd_get_outsymbols (abfd);
6272 for (idx = 0; idx < symcount; idx++)
252b5132 6273 {
252b5132 6274 Elf_Internal_Sym sym;
079e9a2f
AM
6275 bfd_vma value = syms[idx]->value;
6276 elf_symbol_type *type_ptr;
6277 flagword flags = syms[idx]->flags;
6278 int type;
252b5132 6279
174fd7f9
RS
6280 if (!name_local_sections
6281 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6282 {
6283 /* Local section symbols have no name. */
6284 sym.st_name = 0;
6285 }
6286 else
6287 {
6288 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6289 syms[idx]->name,
b34976b6 6290 TRUE, FALSE);
079e9a2f 6291 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6292 {
6293 _bfd_stringtab_free (stt);
6294 return FALSE;
6295 }
079e9a2f 6296 }
252b5132 6297
079e9a2f 6298 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6299
079e9a2f
AM
6300 if ((flags & BSF_SECTION_SYM) == 0
6301 && bfd_is_com_section (syms[idx]->section))
6302 {
6303 /* ELF common symbols put the alignment into the `value' field,
6304 and the size into the `size' field. This is backwards from
6305 how BFD handles it, so reverse it here. */
6306 sym.st_size = value;
6307 if (type_ptr == NULL
6308 || type_ptr->internal_elf_sym.st_value == 0)
6309 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6310 else
6311 sym.st_value = type_ptr->internal_elf_sym.st_value;
6312 sym.st_shndx = _bfd_elf_section_from_bfd_section
6313 (abfd, syms[idx]->section);
6314 }
6315 else
6316 {
6317 asection *sec = syms[idx]->section;
cb33740c 6318 unsigned int shndx;
252b5132 6319
079e9a2f
AM
6320 if (sec->output_section)
6321 {
6322 value += sec->output_offset;
6323 sec = sec->output_section;
6324 }
589e6347 6325
079e9a2f
AM
6326 /* Don't add in the section vma for relocatable output. */
6327 if (! relocatable_p)
6328 value += sec->vma;
6329 sym.st_value = value;
6330 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6331
6332 if (bfd_is_abs_section (sec)
6333 && type_ptr != NULL
6334 && type_ptr->internal_elf_sym.st_shndx != 0)
6335 {
6336 /* This symbol is in a real ELF section which we did
6337 not create as a BFD section. Undo the mapping done
6338 by copy_private_symbol_data. */
6339 shndx = type_ptr->internal_elf_sym.st_shndx;
6340 switch (shndx)
6341 {
6342 case MAP_ONESYMTAB:
6343 shndx = elf_onesymtab (abfd);
6344 break;
6345 case MAP_DYNSYMTAB:
6346 shndx = elf_dynsymtab (abfd);
6347 break;
6348 case MAP_STRTAB:
6349 shndx = elf_tdata (abfd)->strtab_section;
6350 break;
6351 case MAP_SHSTRTAB:
6352 shndx = elf_tdata (abfd)->shstrtab_section;
6353 break;
9ad5cbcf
AM
6354 case MAP_SYM_SHNDX:
6355 shndx = elf_tdata (abfd)->symtab_shndx_section;
6356 break;
079e9a2f
AM
6357 default:
6358 break;
6359 }
6360 }
6361 else
6362 {
6363 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6364
cb33740c 6365 if (shndx == SHN_BAD)
079e9a2f
AM
6366 {
6367 asection *sec2;
6368
6369 /* Writing this would be a hell of a lot easier if
6370 we had some decent documentation on bfd, and
6371 knew what to expect of the library, and what to
6372 demand of applications. For example, it
6373 appears that `objcopy' might not set the
6374 section of a symbol to be a section that is
6375 actually in the output file. */
6376 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6377 if (sec2 == NULL)
6378 {
6379 _bfd_error_handler (_("\
6380Unable to find equivalent output section for symbol '%s' from section '%s'"),
6381 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6382 sec->name);
811072d8 6383 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6384 _bfd_stringtab_free (stt);
589e6347
NC
6385 return FALSE;
6386 }
811072d8 6387
079e9a2f 6388 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6389 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6390 }
6391 }
252b5132 6392
079e9a2f
AM
6393 sym.st_shndx = shndx;
6394 }
252b5132 6395
13ae64f3
JJ
6396 if ((flags & BSF_THREAD_LOCAL) != 0)
6397 type = STT_TLS;
d8045f23
NC
6398 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6399 type = STT_GNU_IFUNC;
13ae64f3 6400 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6401 type = STT_FUNC;
6402 else if ((flags & BSF_OBJECT) != 0)
6403 type = STT_OBJECT;
d9352518
DB
6404 else if ((flags & BSF_RELC) != 0)
6405 type = STT_RELC;
6406 else if ((flags & BSF_SRELC) != 0)
6407 type = STT_SRELC;
079e9a2f
AM
6408 else
6409 type = STT_NOTYPE;
252b5132 6410
13ae64f3
JJ
6411 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6412 type = STT_TLS;
6413
589e6347 6414 /* Processor-specific types. */
079e9a2f
AM
6415 if (type_ptr != NULL
6416 && bed->elf_backend_get_symbol_type)
6417 type = ((*bed->elf_backend_get_symbol_type)
6418 (&type_ptr->internal_elf_sym, type));
252b5132 6419
079e9a2f
AM
6420 if (flags & BSF_SECTION_SYM)
6421 {
6422 if (flags & BSF_GLOBAL)
6423 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6424 else
6425 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6426 }
6427 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6428 {
504b7d20 6429#ifdef USE_STT_COMMON
0a40daed
MK
6430 if (type == STT_OBJECT)
6431 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6432 else
504b7d20 6433#endif
c91e322a 6434 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6435 }
079e9a2f
AM
6436 else if (bfd_is_und_section (syms[idx]->section))
6437 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6438 ? STB_WEAK
6439 : STB_GLOBAL),
6440 type);
6441 else if (flags & BSF_FILE)
6442 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6443 else
6444 {
6445 int bind = STB_LOCAL;
252b5132 6446
079e9a2f
AM
6447 if (flags & BSF_LOCAL)
6448 bind = STB_LOCAL;
6449 else if (flags & BSF_WEAK)
6450 bind = STB_WEAK;
6451 else if (flags & BSF_GLOBAL)
6452 bind = STB_GLOBAL;
252b5132 6453
079e9a2f
AM
6454 sym.st_info = ELF_ST_INFO (bind, type);
6455 }
252b5132 6456
079e9a2f
AM
6457 if (type_ptr != NULL)
6458 sym.st_other = type_ptr->internal_elf_sym.st_other;
6459 else
6460 sym.st_other = 0;
252b5132 6461
9ad5cbcf 6462 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6463 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6464 if (outbound_shndx != NULL)
6465 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6466 }
252b5132 6467
079e9a2f
AM
6468 *sttp = stt;
6469 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6470 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6471
079e9a2f
AM
6472 symstrtab_hdr->sh_flags = 0;
6473 symstrtab_hdr->sh_addr = 0;
6474 symstrtab_hdr->sh_entsize = 0;
6475 symstrtab_hdr->sh_link = 0;
6476 symstrtab_hdr->sh_info = 0;
6477 symstrtab_hdr->sh_addralign = 1;
252b5132 6478
b34976b6 6479 return TRUE;
252b5132
RH
6480}
6481
6482/* Return the number of bytes required to hold the symtab vector.
6483
6484 Note that we base it on the count plus 1, since we will null terminate
6485 the vector allocated based on this size. However, the ELF symbol table
6486 always has a dummy entry as symbol #0, so it ends up even. */
6487
6488long
217aa764 6489_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6490{
6491 long symcount;
6492 long symtab_size;
6493 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6494
6495 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6496 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6497 if (symcount > 0)
6498 symtab_size -= sizeof (asymbol *);
252b5132
RH
6499
6500 return symtab_size;
6501}
6502
6503long
217aa764 6504_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6505{
6506 long symcount;
6507 long symtab_size;
6508 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6509
6510 if (elf_dynsymtab (abfd) == 0)
6511 {
6512 bfd_set_error (bfd_error_invalid_operation);
6513 return -1;
6514 }
6515
6516 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6517 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6518 if (symcount > 0)
6519 symtab_size -= sizeof (asymbol *);
252b5132
RH
6520
6521 return symtab_size;
6522}
6523
6524long
217aa764
AM
6525_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6526 sec_ptr asect)
252b5132
RH
6527{
6528 return (asect->reloc_count + 1) * sizeof (arelent *);
6529}
6530
6531/* Canonicalize the relocs. */
6532
6533long
217aa764
AM
6534_bfd_elf_canonicalize_reloc (bfd *abfd,
6535 sec_ptr section,
6536 arelent **relptr,
6537 asymbol **symbols)
252b5132
RH
6538{
6539 arelent *tblptr;
6540 unsigned int i;
9c5bfbb7 6541 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6542
b34976b6 6543 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6544 return -1;
6545
6546 tblptr = section->relocation;
6547 for (i = 0; i < section->reloc_count; i++)
6548 *relptr++ = tblptr++;
6549
6550 *relptr = NULL;
6551
6552 return section->reloc_count;
6553}
6554
6555long
6cee3f79 6556_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6557{
9c5bfbb7 6558 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6559 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6560
6561 if (symcount >= 0)
6562 bfd_get_symcount (abfd) = symcount;
6563 return symcount;
6564}
6565
6566long
217aa764
AM
6567_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6568 asymbol **allocation)
252b5132 6569{
9c5bfbb7 6570 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6571 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6572
6573 if (symcount >= 0)
6574 bfd_get_dynamic_symcount (abfd) = symcount;
6575 return symcount;
252b5132
RH
6576}
6577
8615f3f2
AM
6578/* Return the size required for the dynamic reloc entries. Any loadable
6579 section that was actually installed in the BFD, and has type SHT_REL
6580 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6581 dynamic reloc section. */
252b5132
RH
6582
6583long
217aa764 6584_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6585{
6586 long ret;
6587 asection *s;
6588
6589 if (elf_dynsymtab (abfd) == 0)
6590 {
6591 bfd_set_error (bfd_error_invalid_operation);
6592 return -1;
6593 }
6594
6595 ret = sizeof (arelent *);
6596 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 6597 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6598 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6599 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6600 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6601 * sizeof (arelent *));
6602
6603 return ret;
6604}
6605
8615f3f2
AM
6606/* Canonicalize the dynamic relocation entries. Note that we return the
6607 dynamic relocations as a single block, although they are actually
6608 associated with particular sections; the interface, which was
6609 designed for SunOS style shared libraries, expects that there is only
6610 one set of dynamic relocs. Any loadable section that was actually
6611 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6612 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6613
6614long
217aa764
AM
6615_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6616 arelent **storage,
6617 asymbol **syms)
252b5132 6618{
217aa764 6619 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6620 asection *s;
6621 long ret;
6622
6623 if (elf_dynsymtab (abfd) == 0)
6624 {
6625 bfd_set_error (bfd_error_invalid_operation);
6626 return -1;
6627 }
6628
6629 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6630 ret = 0;
6631 for (s = abfd->sections; s != NULL; s = s->next)
6632 {
266b05cf 6633 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6634 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6635 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6636 {
6637 arelent *p;
6638 long count, i;
6639
b34976b6 6640 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6641 return -1;
eea6121a 6642 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6643 p = s->relocation;
6644 for (i = 0; i < count; i++)
6645 *storage++ = p++;
6646 ret += count;
6647 }
6648 }
6649
6650 *storage = NULL;
6651
6652 return ret;
6653}
6654\f
6655/* Read in the version information. */
6656
b34976b6 6657bfd_boolean
fc0e6df6 6658_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6659{
6660 bfd_byte *contents = NULL;
fc0e6df6
PB
6661 unsigned int freeidx = 0;
6662
6663 if (elf_dynverref (abfd) != 0)
6664 {
6665 Elf_Internal_Shdr *hdr;
6666 Elf_External_Verneed *everneed;
6667 Elf_Internal_Verneed *iverneed;
6668 unsigned int i;
d0fb9a8d 6669 bfd_byte *contents_end;
fc0e6df6
PB
6670
6671 hdr = &elf_tdata (abfd)->dynverref_hdr;
6672
d0fb9a8d
JJ
6673 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6674 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6675 if (elf_tdata (abfd)->verref == NULL)
6676 goto error_return;
6677
6678 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6679
6680 contents = bfd_malloc (hdr->sh_size);
6681 if (contents == NULL)
d0fb9a8d
JJ
6682 {
6683error_return_verref:
6684 elf_tdata (abfd)->verref = NULL;
6685 elf_tdata (abfd)->cverrefs = 0;
6686 goto error_return;
6687 }
fc0e6df6
PB
6688 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6689 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6690 goto error_return_verref;
fc0e6df6 6691
d0fb9a8d
JJ
6692 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6693 goto error_return_verref;
6694
6695 BFD_ASSERT (sizeof (Elf_External_Verneed)
6696 == sizeof (Elf_External_Vernaux));
6697 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6698 everneed = (Elf_External_Verneed *) contents;
6699 iverneed = elf_tdata (abfd)->verref;
6700 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6701 {
6702 Elf_External_Vernaux *evernaux;
6703 Elf_Internal_Vernaux *ivernaux;
6704 unsigned int j;
6705
6706 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6707
6708 iverneed->vn_bfd = abfd;
6709
6710 iverneed->vn_filename =
6711 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6712 iverneed->vn_file);
6713 if (iverneed->vn_filename == NULL)
d0fb9a8d 6714 goto error_return_verref;
fc0e6df6 6715
d0fb9a8d
JJ
6716 if (iverneed->vn_cnt == 0)
6717 iverneed->vn_auxptr = NULL;
6718 else
6719 {
6720 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6721 sizeof (Elf_Internal_Vernaux));
6722 if (iverneed->vn_auxptr == NULL)
6723 goto error_return_verref;
6724 }
6725
6726 if (iverneed->vn_aux
6727 > (size_t) (contents_end - (bfd_byte *) everneed))
6728 goto error_return_verref;
fc0e6df6
PB
6729
6730 evernaux = ((Elf_External_Vernaux *)
6731 ((bfd_byte *) everneed + iverneed->vn_aux));
6732 ivernaux = iverneed->vn_auxptr;
6733 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6734 {
6735 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6736
6737 ivernaux->vna_nodename =
6738 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6739 ivernaux->vna_name);
6740 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6741 goto error_return_verref;
fc0e6df6
PB
6742
6743 if (j + 1 < iverneed->vn_cnt)
6744 ivernaux->vna_nextptr = ivernaux + 1;
6745 else
6746 ivernaux->vna_nextptr = NULL;
6747
d0fb9a8d
JJ
6748 if (ivernaux->vna_next
6749 > (size_t) (contents_end - (bfd_byte *) evernaux))
6750 goto error_return_verref;
6751
fc0e6df6
PB
6752 evernaux = ((Elf_External_Vernaux *)
6753 ((bfd_byte *) evernaux + ivernaux->vna_next));
6754
6755 if (ivernaux->vna_other > freeidx)
6756 freeidx = ivernaux->vna_other;
6757 }
6758
6759 if (i + 1 < hdr->sh_info)
6760 iverneed->vn_nextref = iverneed + 1;
6761 else
6762 iverneed->vn_nextref = NULL;
6763
d0fb9a8d
JJ
6764 if (iverneed->vn_next
6765 > (size_t) (contents_end - (bfd_byte *) everneed))
6766 goto error_return_verref;
6767
fc0e6df6
PB
6768 everneed = ((Elf_External_Verneed *)
6769 ((bfd_byte *) everneed + iverneed->vn_next));
6770 }
6771
6772 free (contents);
6773 contents = NULL;
6774 }
252b5132
RH
6775
6776 if (elf_dynverdef (abfd) != 0)
6777 {
6778 Elf_Internal_Shdr *hdr;
6779 Elf_External_Verdef *everdef;
6780 Elf_Internal_Verdef *iverdef;
f631889e
UD
6781 Elf_Internal_Verdef *iverdefarr;
6782 Elf_Internal_Verdef iverdefmem;
252b5132 6783 unsigned int i;
062e2358 6784 unsigned int maxidx;
d0fb9a8d 6785 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6786
6787 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6788
217aa764 6789 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6790 if (contents == NULL)
6791 goto error_return;
6792 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6793 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6794 goto error_return;
6795
d0fb9a8d
JJ
6796 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6797 goto error_return;
6798
6799 BFD_ASSERT (sizeof (Elf_External_Verdef)
6800 >= sizeof (Elf_External_Verdaux));
6801 contents_end_def = contents + hdr->sh_size
6802 - sizeof (Elf_External_Verdef);
6803 contents_end_aux = contents + hdr->sh_size
6804 - sizeof (Elf_External_Verdaux);
6805
f631889e
UD
6806 /* We know the number of entries in the section but not the maximum
6807 index. Therefore we have to run through all entries and find
6808 the maximum. */
252b5132 6809 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6810 maxidx = 0;
6811 for (i = 0; i < hdr->sh_info; ++i)
6812 {
6813 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6814
062e2358
AM
6815 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6816 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6817
d0fb9a8d
JJ
6818 if (iverdefmem.vd_next
6819 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6820 goto error_return;
6821
f631889e
UD
6822 everdef = ((Elf_External_Verdef *)
6823 ((bfd_byte *) everdef + iverdefmem.vd_next));
6824 }
6825
fc0e6df6
PB
6826 if (default_imported_symver)
6827 {
6828 if (freeidx > maxidx)
6829 maxidx = ++freeidx;
6830 else
6831 freeidx = ++maxidx;
6832 }
d0fb9a8d
JJ
6833 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6834 sizeof (Elf_Internal_Verdef));
f631889e
UD
6835 if (elf_tdata (abfd)->verdef == NULL)
6836 goto error_return;
6837
6838 elf_tdata (abfd)->cverdefs = maxidx;
6839
6840 everdef = (Elf_External_Verdef *) contents;
6841 iverdefarr = elf_tdata (abfd)->verdef;
6842 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6843 {
6844 Elf_External_Verdaux *everdaux;
6845 Elf_Internal_Verdaux *iverdaux;
6846 unsigned int j;
6847
f631889e
UD
6848 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6849
d0fb9a8d
JJ
6850 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6851 {
6852error_return_verdef:
6853 elf_tdata (abfd)->verdef = NULL;
6854 elf_tdata (abfd)->cverdefs = 0;
6855 goto error_return;
6856 }
6857
f631889e
UD
6858 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6859 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6860
6861 iverdef->vd_bfd = abfd;
6862
d0fb9a8d
JJ
6863 if (iverdef->vd_cnt == 0)
6864 iverdef->vd_auxptr = NULL;
6865 else
6866 {
6867 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6868 sizeof (Elf_Internal_Verdaux));
6869 if (iverdef->vd_auxptr == NULL)
6870 goto error_return_verdef;
6871 }
6872
6873 if (iverdef->vd_aux
6874 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6875 goto error_return_verdef;
252b5132
RH
6876
6877 everdaux = ((Elf_External_Verdaux *)
6878 ((bfd_byte *) everdef + iverdef->vd_aux));
6879 iverdaux = iverdef->vd_auxptr;
6880 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6881 {
6882 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6883
6884 iverdaux->vda_nodename =
6885 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6886 iverdaux->vda_name);
6887 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6888 goto error_return_verdef;
252b5132
RH
6889
6890 if (j + 1 < iverdef->vd_cnt)
6891 iverdaux->vda_nextptr = iverdaux + 1;
6892 else
6893 iverdaux->vda_nextptr = NULL;
6894
d0fb9a8d
JJ
6895 if (iverdaux->vda_next
6896 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6897 goto error_return_verdef;
6898
252b5132
RH
6899 everdaux = ((Elf_External_Verdaux *)
6900 ((bfd_byte *) everdaux + iverdaux->vda_next));
6901 }
6902
d0fb9a8d
JJ
6903 if (iverdef->vd_cnt)
6904 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6905
d0fb9a8d 6906 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6907 iverdef->vd_nextdef = iverdef + 1;
6908 else
6909 iverdef->vd_nextdef = NULL;
6910
6911 everdef = ((Elf_External_Verdef *)
6912 ((bfd_byte *) everdef + iverdef->vd_next));
6913 }
6914
6915 free (contents);
6916 contents = NULL;
6917 }
fc0e6df6 6918 else if (default_imported_symver)
252b5132 6919 {
fc0e6df6
PB
6920 if (freeidx < 3)
6921 freeidx = 3;
6922 else
6923 freeidx++;
252b5132 6924
d0fb9a8d
JJ
6925 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6926 sizeof (Elf_Internal_Verdef));
fc0e6df6 6927 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6928 goto error_return;
6929
fc0e6df6
PB
6930 elf_tdata (abfd)->cverdefs = freeidx;
6931 }
252b5132 6932
fc0e6df6
PB
6933 /* Create a default version based on the soname. */
6934 if (default_imported_symver)
6935 {
6936 Elf_Internal_Verdef *iverdef;
6937 Elf_Internal_Verdaux *iverdaux;
252b5132 6938
fc0e6df6 6939 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6940
fc0e6df6
PB
6941 iverdef->vd_version = VER_DEF_CURRENT;
6942 iverdef->vd_flags = 0;
6943 iverdef->vd_ndx = freeidx;
6944 iverdef->vd_cnt = 1;
252b5132 6945
fc0e6df6 6946 iverdef->vd_bfd = abfd;
252b5132 6947
fc0e6df6
PB
6948 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6949 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6950 goto error_return_verdef;
fc0e6df6 6951 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6952 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6953 if (iverdef->vd_auxptr == NULL)
6954 goto error_return_verdef;
252b5132 6955
fc0e6df6
PB
6956 iverdaux = iverdef->vd_auxptr;
6957 iverdaux->vda_nodename = iverdef->vd_nodename;
6958 iverdaux->vda_nextptr = NULL;
252b5132
RH
6959 }
6960
b34976b6 6961 return TRUE;
252b5132
RH
6962
6963 error_return:
5ed6aba4 6964 if (contents != NULL)
252b5132 6965 free (contents);
b34976b6 6966 return FALSE;
252b5132
RH
6967}
6968\f
6969asymbol *
217aa764 6970_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6971{
6972 elf_symbol_type *newsym;
dc810e39 6973 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6974
217aa764 6975 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6976 if (!newsym)
6977 return NULL;
6978 else
6979 {
6980 newsym->symbol.the_bfd = abfd;
6981 return &newsym->symbol;
6982 }
6983}
6984
6985void
217aa764
AM
6986_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6987 asymbol *symbol,
6988 symbol_info *ret)
252b5132
RH
6989{
6990 bfd_symbol_info (symbol, ret);
6991}
6992
6993/* Return whether a symbol name implies a local symbol. Most targets
6994 use this function for the is_local_label_name entry point, but some
6995 override it. */
6996
b34976b6 6997bfd_boolean
217aa764
AM
6998_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6999 const char *name)
252b5132
RH
7000{
7001 /* Normal local symbols start with ``.L''. */
7002 if (name[0] == '.' && name[1] == 'L')
b34976b6 7003 return TRUE;
252b5132
RH
7004
7005 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7006 DWARF debugging symbols starting with ``..''. */
7007 if (name[0] == '.' && name[1] == '.')
b34976b6 7008 return TRUE;
252b5132
RH
7009
7010 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7011 emitting DWARF debugging output. I suspect this is actually a
7012 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7013 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7014 underscore to be emitted on some ELF targets). For ease of use,
7015 we treat such symbols as local. */
7016 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7017 return TRUE;
252b5132 7018
b34976b6 7019 return FALSE;
252b5132
RH
7020}
7021
7022alent *
217aa764
AM
7023_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7024 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7025{
7026 abort ();
7027 return NULL;
7028}
7029
b34976b6 7030bfd_boolean
217aa764
AM
7031_bfd_elf_set_arch_mach (bfd *abfd,
7032 enum bfd_architecture arch,
7033 unsigned long machine)
252b5132
RH
7034{
7035 /* If this isn't the right architecture for this backend, and this
7036 isn't the generic backend, fail. */
7037 if (arch != get_elf_backend_data (abfd)->arch
7038 && arch != bfd_arch_unknown
7039 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7040 return FALSE;
252b5132
RH
7041
7042 return bfd_default_set_arch_mach (abfd, arch, machine);
7043}
7044
d1fad7c6
NC
7045/* Find the function to a particular section and offset,
7046 for error reporting. */
252b5132 7047
b34976b6 7048static bfd_boolean
b9d678e0 7049elf_find_function (bfd *abfd,
217aa764
AM
7050 asection *section,
7051 asymbol **symbols,
7052 bfd_vma offset,
7053 const char **filename_ptr,
7054 const char **functionname_ptr)
252b5132 7055{
252b5132 7056 const char *filename;
57426232 7057 asymbol *func, *file;
252b5132
RH
7058 bfd_vma low_func;
7059 asymbol **p;
57426232
JB
7060 /* ??? Given multiple file symbols, it is impossible to reliably
7061 choose the right file name for global symbols. File symbols are
7062 local symbols, and thus all file symbols must sort before any
7063 global symbols. The ELF spec may be interpreted to say that a
7064 file symbol must sort before other local symbols, but currently
7065 ld -r doesn't do this. So, for ld -r output, it is possible to
7066 make a better choice of file name for local symbols by ignoring
7067 file symbols appearing after a given local symbol. */
7068 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
b9d678e0 7069 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7070
252b5132
RH
7071 filename = NULL;
7072 func = NULL;
57426232 7073 file = NULL;
252b5132 7074 low_func = 0;
57426232 7075 state = nothing_seen;
252b5132
RH
7076
7077 for (p = symbols; *p != NULL; p++)
7078 {
7079 elf_symbol_type *q;
b9d678e0 7080 unsigned int type;
252b5132
RH
7081
7082 q = (elf_symbol_type *) *p;
7083
b9d678e0
L
7084 type = ELF_ST_TYPE (q->internal_elf_sym.st_info);
7085 switch (type)
252b5132 7086 {
252b5132 7087 case STT_FILE:
57426232
JB
7088 file = &q->symbol;
7089 if (state == symbol_seen)
7090 state = file_after_symbol_seen;
7091 continue;
b9d678e0
L
7092 default:
7093 if (!bed->is_function_type (type))
7094 break;
252b5132 7095 case STT_NOTYPE:
6b40fcba 7096 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7097 && q->symbol.value >= low_func
7098 && q->symbol.value <= offset)
7099 {
7100 func = (asymbol *) q;
7101 low_func = q->symbol.value;
a1923858
AM
7102 filename = NULL;
7103 if (file != NULL
7104 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7105 || state != file_after_symbol_seen))
57426232 7106 filename = bfd_asymbol_name (file);
252b5132
RH
7107 }
7108 break;
7109 }
57426232
JB
7110 if (state == nothing_seen)
7111 state = symbol_seen;
252b5132
RH
7112 }
7113
7114 if (func == NULL)
b34976b6 7115 return FALSE;
252b5132 7116
d1fad7c6
NC
7117 if (filename_ptr)
7118 *filename_ptr = filename;
7119 if (functionname_ptr)
7120 *functionname_ptr = bfd_asymbol_name (func);
7121
b34976b6 7122 return TRUE;
d1fad7c6
NC
7123}
7124
7125/* Find the nearest line to a particular section and offset,
7126 for error reporting. */
7127
b34976b6 7128bfd_boolean
217aa764
AM
7129_bfd_elf_find_nearest_line (bfd *abfd,
7130 asection *section,
7131 asymbol **symbols,
7132 bfd_vma offset,
7133 const char **filename_ptr,
7134 const char **functionname_ptr,
7135 unsigned int *line_ptr)
d1fad7c6 7136{
b34976b6 7137 bfd_boolean found;
d1fad7c6
NC
7138
7139 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7140 filename_ptr, functionname_ptr,
7141 line_ptr))
d1fad7c6
NC
7142 {
7143 if (!*functionname_ptr)
4e8a9624
AM
7144 elf_find_function (abfd, section, symbols, offset,
7145 *filename_ptr ? NULL : filename_ptr,
7146 functionname_ptr);
7147
b34976b6 7148 return TRUE;
d1fad7c6
NC
7149 }
7150
7151 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7152 filename_ptr, functionname_ptr,
7153 line_ptr, 0,
7154 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7155 {
7156 if (!*functionname_ptr)
4e8a9624
AM
7157 elf_find_function (abfd, section, symbols, offset,
7158 *filename_ptr ? NULL : filename_ptr,
7159 functionname_ptr);
7160
b34976b6 7161 return TRUE;
d1fad7c6
NC
7162 }
7163
7164 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7165 &found, filename_ptr,
7166 functionname_ptr, line_ptr,
7167 &elf_tdata (abfd)->line_info))
b34976b6 7168 return FALSE;
dc43ada5 7169 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7170 return TRUE;
d1fad7c6
NC
7171
7172 if (symbols == NULL)
b34976b6 7173 return FALSE;
d1fad7c6
NC
7174
7175 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7176 filename_ptr, functionname_ptr))
b34976b6 7177 return FALSE;
d1fad7c6 7178
252b5132 7179 *line_ptr = 0;
b34976b6 7180 return TRUE;
252b5132
RH
7181}
7182
5420f73d
L
7183/* Find the line for a symbol. */
7184
7185bfd_boolean
7186_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7187 const char **filename_ptr, unsigned int *line_ptr)
7188{
7189 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7190 filename_ptr, line_ptr, 0,
7191 &elf_tdata (abfd)->dwarf2_find_line_info);
7192}
7193
4ab527b0
FF
7194/* After a call to bfd_find_nearest_line, successive calls to
7195 bfd_find_inliner_info can be used to get source information about
7196 each level of function inlining that terminated at the address
7197 passed to bfd_find_nearest_line. Currently this is only supported
7198 for DWARF2 with appropriate DWARF3 extensions. */
7199
7200bfd_boolean
7201_bfd_elf_find_inliner_info (bfd *abfd,
7202 const char **filename_ptr,
7203 const char **functionname_ptr,
7204 unsigned int *line_ptr)
7205{
7206 bfd_boolean found;
7207 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7208 functionname_ptr, line_ptr,
7209 & elf_tdata (abfd)->dwarf2_find_line_info);
7210 return found;
7211}
7212
252b5132 7213int
a6b96beb 7214_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7215{
8ded5a0f
AM
7216 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7217 int ret = bed->s->sizeof_ehdr;
252b5132 7218
a6b96beb 7219 if (!info->relocatable)
8ded5a0f 7220 {
62d7a5f6 7221 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7222
62d7a5f6
AM
7223 if (phdr_size == (bfd_size_type) -1)
7224 {
7225 struct elf_segment_map *m;
7226
7227 phdr_size = 0;
7228 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7229 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7230
62d7a5f6
AM
7231 if (phdr_size == 0)
7232 phdr_size = get_program_header_size (abfd, info);
7233 }
8ded5a0f
AM
7234
7235 elf_tdata (abfd)->program_header_size = phdr_size;
7236 ret += phdr_size;
7237 }
7238
252b5132
RH
7239 return ret;
7240}
7241
b34976b6 7242bfd_boolean
217aa764
AM
7243_bfd_elf_set_section_contents (bfd *abfd,
7244 sec_ptr section,
0f867abe 7245 const void *location,
217aa764
AM
7246 file_ptr offset,
7247 bfd_size_type count)
252b5132
RH
7248{
7249 Elf_Internal_Shdr *hdr;
dc810e39 7250 bfd_signed_vma pos;
252b5132
RH
7251
7252 if (! abfd->output_has_begun
217aa764 7253 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7254 return FALSE;
252b5132
RH
7255
7256 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7257 pos = hdr->sh_offset + offset;
7258 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7259 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7260 return FALSE;
252b5132 7261
b34976b6 7262 return TRUE;
252b5132
RH
7263}
7264
7265void
217aa764
AM
7266_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7267 arelent *cache_ptr ATTRIBUTE_UNUSED,
7268 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7269{
7270 abort ();
7271}
7272
252b5132
RH
7273/* Try to convert a non-ELF reloc into an ELF one. */
7274
b34976b6 7275bfd_boolean
217aa764 7276_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7277{
c044fabd 7278 /* Check whether we really have an ELF howto. */
252b5132
RH
7279
7280 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7281 {
7282 bfd_reloc_code_real_type code;
7283 reloc_howto_type *howto;
7284
7285 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7286 equivalent ELF reloc. */
252b5132
RH
7287
7288 if (areloc->howto->pc_relative)
7289 {
7290 switch (areloc->howto->bitsize)
7291 {
7292 case 8:
7293 code = BFD_RELOC_8_PCREL;
7294 break;
7295 case 12:
7296 code = BFD_RELOC_12_PCREL;
7297 break;
7298 case 16:
7299 code = BFD_RELOC_16_PCREL;
7300 break;
7301 case 24:
7302 code = BFD_RELOC_24_PCREL;
7303 break;
7304 case 32:
7305 code = BFD_RELOC_32_PCREL;
7306 break;
7307 case 64:
7308 code = BFD_RELOC_64_PCREL;
7309 break;
7310 default:
7311 goto fail;
7312 }
7313
7314 howto = bfd_reloc_type_lookup (abfd, code);
7315
7316 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7317 {
7318 if (howto->pcrel_offset)
7319 areloc->addend += areloc->address;
7320 else
7321 areloc->addend -= areloc->address; /* addend is unsigned!! */
7322 }
7323 }
7324 else
7325 {
7326 switch (areloc->howto->bitsize)
7327 {
7328 case 8:
7329 code = BFD_RELOC_8;
7330 break;
7331 case 14:
7332 code = BFD_RELOC_14;
7333 break;
7334 case 16:
7335 code = BFD_RELOC_16;
7336 break;
7337 case 26:
7338 code = BFD_RELOC_26;
7339 break;
7340 case 32:
7341 code = BFD_RELOC_32;
7342 break;
7343 case 64:
7344 code = BFD_RELOC_64;
7345 break;
7346 default:
7347 goto fail;
7348 }
7349
7350 howto = bfd_reloc_type_lookup (abfd, code);
7351 }
7352
7353 if (howto)
7354 areloc->howto = howto;
7355 else
7356 goto fail;
7357 }
7358
b34976b6 7359 return TRUE;
252b5132
RH
7360
7361 fail:
7362 (*_bfd_error_handler)
d003868e
AM
7363 (_("%B: unsupported relocation type %s"),
7364 abfd, areloc->howto->name);
252b5132 7365 bfd_set_error (bfd_error_bad_value);
b34976b6 7366 return FALSE;
252b5132
RH
7367}
7368
b34976b6 7369bfd_boolean
217aa764 7370_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7371{
7372 if (bfd_get_format (abfd) == bfd_object)
7373 {
b25e3d87 7374 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7375 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7376 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7377 }
7378
7379 return _bfd_generic_close_and_cleanup (abfd);
7380}
7381
7382/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7383 in the relocation's offset. Thus we cannot allow any sort of sanity
7384 range-checking to interfere. There is nothing else to do in processing
7385 this reloc. */
7386
7387bfd_reloc_status_type
217aa764
AM
7388_bfd_elf_rel_vtable_reloc_fn
7389 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7390 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7391 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7392 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7393{
7394 return bfd_reloc_ok;
7395}
252b5132
RH
7396\f
7397/* Elf core file support. Much of this only works on native
7398 toolchains, since we rely on knowing the
7399 machine-dependent procfs structure in order to pick
c044fabd 7400 out details about the corefile. */
252b5132
RH
7401
7402#ifdef HAVE_SYS_PROCFS_H
7403# include <sys/procfs.h>
7404#endif
7405
c044fabd 7406/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7407
7408static int
217aa764 7409elfcore_make_pid (bfd *abfd)
252b5132
RH
7410{
7411 return ((elf_tdata (abfd)->core_lwpid << 16)
7412 + (elf_tdata (abfd)->core_pid));
7413}
7414
252b5132
RH
7415/* If there isn't a section called NAME, make one, using
7416 data from SECT. Note, this function will generate a
7417 reference to NAME, so you shouldn't deallocate or
c044fabd 7418 overwrite it. */
252b5132 7419
b34976b6 7420static bfd_boolean
217aa764 7421elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7422{
c044fabd 7423 asection *sect2;
252b5132
RH
7424
7425 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7426 return TRUE;
252b5132 7427
117ed4f8 7428 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7429 if (sect2 == NULL)
b34976b6 7430 return FALSE;
252b5132 7431
eea6121a 7432 sect2->size = sect->size;
252b5132 7433 sect2->filepos = sect->filepos;
252b5132 7434 sect2->alignment_power = sect->alignment_power;
b34976b6 7435 return TRUE;
252b5132
RH
7436}
7437
bb0082d6
AM
7438/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7439 actually creates up to two pseudosections:
7440 - For the single-threaded case, a section named NAME, unless
7441 such a section already exists.
7442 - For the multi-threaded case, a section named "NAME/PID", where
7443 PID is elfcore_make_pid (abfd).
7444 Both pseudosections have identical contents. */
b34976b6 7445bfd_boolean
217aa764
AM
7446_bfd_elfcore_make_pseudosection (bfd *abfd,
7447 char *name,
7448 size_t size,
7449 ufile_ptr filepos)
bb0082d6
AM
7450{
7451 char buf[100];
7452 char *threaded_name;
d4c88bbb 7453 size_t len;
bb0082d6
AM
7454 asection *sect;
7455
7456 /* Build the section name. */
7457
7458 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7459 len = strlen (buf) + 1;
217aa764 7460 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7461 if (threaded_name == NULL)
b34976b6 7462 return FALSE;
d4c88bbb 7463 memcpy (threaded_name, buf, len);
bb0082d6 7464
117ed4f8
AM
7465 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7466 SEC_HAS_CONTENTS);
bb0082d6 7467 if (sect == NULL)
b34976b6 7468 return FALSE;
eea6121a 7469 sect->size = size;
bb0082d6 7470 sect->filepos = filepos;
bb0082d6
AM
7471 sect->alignment_power = 2;
7472
936e320b 7473 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7474}
7475
252b5132 7476/* prstatus_t exists on:
4a938328 7477 solaris 2.5+
252b5132
RH
7478 linux 2.[01] + glibc
7479 unixware 4.2
7480*/
7481
7482#if defined (HAVE_PRSTATUS_T)
a7b97311 7483
b34976b6 7484static bfd_boolean
217aa764 7485elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7486{
eea6121a 7487 size_t size;
7ee38065 7488 int offset;
252b5132 7489
4a938328
MS
7490 if (note->descsz == sizeof (prstatus_t))
7491 {
7492 prstatus_t prstat;
252b5132 7493
eea6121a 7494 size = sizeof (prstat.pr_reg);
7ee38065 7495 offset = offsetof (prstatus_t, pr_reg);
4a938328 7496 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7497
fa49d224
NC
7498 /* Do not overwrite the core signal if it
7499 has already been set by another thread. */
7500 if (elf_tdata (abfd)->core_signal == 0)
7501 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7502 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7503
4a938328
MS
7504 /* pr_who exists on:
7505 solaris 2.5+
7506 unixware 4.2
7507 pr_who doesn't exist on:
7508 linux 2.[01]
7509 */
252b5132 7510#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7511 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7512#endif
4a938328 7513 }
7ee38065 7514#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7515 else if (note->descsz == sizeof (prstatus32_t))
7516 {
7517 /* 64-bit host, 32-bit corefile */
7518 prstatus32_t prstat;
7519
eea6121a 7520 size = sizeof (prstat.pr_reg);
7ee38065 7521 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7522 memcpy (&prstat, note->descdata, sizeof (prstat));
7523
fa49d224
NC
7524 /* Do not overwrite the core signal if it
7525 has already been set by another thread. */
7526 if (elf_tdata (abfd)->core_signal == 0)
7527 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7528 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7529
7530 /* pr_who exists on:
7531 solaris 2.5+
7532 unixware 4.2
7533 pr_who doesn't exist on:
7534 linux 2.[01]
7535 */
7ee38065 7536#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7537 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7538#endif
7539 }
7ee38065 7540#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7541 else
7542 {
7543 /* Fail - we don't know how to handle any other
7544 note size (ie. data object type). */
b34976b6 7545 return TRUE;
4a938328 7546 }
252b5132 7547
bb0082d6 7548 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7549 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7550 size, note->descpos + offset);
252b5132
RH
7551}
7552#endif /* defined (HAVE_PRSTATUS_T) */
7553
bb0082d6 7554/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7555static bfd_boolean
217aa764
AM
7556elfcore_make_note_pseudosection (bfd *abfd,
7557 char *name,
7558 Elf_Internal_Note *note)
252b5132 7559{
936e320b
AM
7560 return _bfd_elfcore_make_pseudosection (abfd, name,
7561 note->descsz, note->descpos);
252b5132
RH
7562}
7563
ff08c6bb
JB
7564/* There isn't a consistent prfpregset_t across platforms,
7565 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7566 data structure apart. */
7567
b34976b6 7568static bfd_boolean
217aa764 7569elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7570{
7571 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7572}
7573
ff08c6bb 7574/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 7575 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 7576 literally. */
c044fabd 7577
b34976b6 7578static bfd_boolean
217aa764 7579elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7580{
7581 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7582}
7583
97753bd5
AM
7584static bfd_boolean
7585elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
7586{
7587 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
7588}
7589
89eeb0bc
LM
7590static bfd_boolean
7591elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
7592{
7593 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
7594}
97753bd5 7595
252b5132 7596#if defined (HAVE_PRPSINFO_T)
4a938328 7597typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7598#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7599typedef prpsinfo32_t elfcore_psinfo32_t;
7600#endif
252b5132
RH
7601#endif
7602
7603#if defined (HAVE_PSINFO_T)
4a938328 7604typedef psinfo_t elfcore_psinfo_t;
7ee38065 7605#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7606typedef psinfo32_t elfcore_psinfo32_t;
7607#endif
252b5132
RH
7608#endif
7609
252b5132
RH
7610/* return a malloc'ed copy of a string at START which is at
7611 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7612 the copy will always have a terminating '\0'. */
252b5132 7613
936e320b 7614char *
217aa764 7615_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7616{
dc810e39 7617 char *dups;
c044fabd 7618 char *end = memchr (start, '\0', max);
dc810e39 7619 size_t len;
252b5132
RH
7620
7621 if (end == NULL)
7622 len = max;
7623 else
7624 len = end - start;
7625
217aa764 7626 dups = bfd_alloc (abfd, len + 1);
dc810e39 7627 if (dups == NULL)
252b5132
RH
7628 return NULL;
7629
dc810e39
AM
7630 memcpy (dups, start, len);
7631 dups[len] = '\0';
252b5132 7632
dc810e39 7633 return dups;
252b5132
RH
7634}
7635
bb0082d6 7636#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7637static bfd_boolean
217aa764 7638elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7639{
4a938328
MS
7640 if (note->descsz == sizeof (elfcore_psinfo_t))
7641 {
7642 elfcore_psinfo_t psinfo;
252b5132 7643
7ee38065 7644 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7645
4a938328 7646 elf_tdata (abfd)->core_program
936e320b
AM
7647 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7648 sizeof (psinfo.pr_fname));
252b5132 7649
4a938328 7650 elf_tdata (abfd)->core_command
936e320b
AM
7651 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7652 sizeof (psinfo.pr_psargs));
4a938328 7653 }
7ee38065 7654#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7655 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7656 {
7657 /* 64-bit host, 32-bit corefile */
7658 elfcore_psinfo32_t psinfo;
7659
7ee38065 7660 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7661
4a938328 7662 elf_tdata (abfd)->core_program
936e320b
AM
7663 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7664 sizeof (psinfo.pr_fname));
4a938328
MS
7665
7666 elf_tdata (abfd)->core_command
936e320b
AM
7667 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7668 sizeof (psinfo.pr_psargs));
4a938328
MS
7669 }
7670#endif
7671
7672 else
7673 {
7674 /* Fail - we don't know how to handle any other
7675 note size (ie. data object type). */
b34976b6 7676 return TRUE;
4a938328 7677 }
252b5132
RH
7678
7679 /* Note that for some reason, a spurious space is tacked
7680 onto the end of the args in some (at least one anyway)
c044fabd 7681 implementations, so strip it off if it exists. */
252b5132
RH
7682
7683 {
c044fabd 7684 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7685 int n = strlen (command);
7686
7687 if (0 < n && command[n - 1] == ' ')
7688 command[n - 1] = '\0';
7689 }
7690
b34976b6 7691 return TRUE;
252b5132
RH
7692}
7693#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7694
252b5132 7695#if defined (HAVE_PSTATUS_T)
b34976b6 7696static bfd_boolean
217aa764 7697elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7698{
f572a39d
AM
7699 if (note->descsz == sizeof (pstatus_t)
7700#if defined (HAVE_PXSTATUS_T)
7701 || note->descsz == sizeof (pxstatus_t)
7702#endif
7703 )
4a938328
MS
7704 {
7705 pstatus_t pstat;
252b5132 7706
4a938328 7707 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7708
4a938328
MS
7709 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7710 }
7ee38065 7711#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7712 else if (note->descsz == sizeof (pstatus32_t))
7713 {
7714 /* 64-bit host, 32-bit corefile */
7715 pstatus32_t pstat;
252b5132 7716
4a938328 7717 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7718
4a938328
MS
7719 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7720 }
7721#endif
252b5132
RH
7722 /* Could grab some more details from the "representative"
7723 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7724 NT_LWPSTATUS note, presumably. */
252b5132 7725
b34976b6 7726 return TRUE;
252b5132
RH
7727}
7728#endif /* defined (HAVE_PSTATUS_T) */
7729
252b5132 7730#if defined (HAVE_LWPSTATUS_T)
b34976b6 7731static bfd_boolean
217aa764 7732elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7733{
7734 lwpstatus_t lwpstat;
7735 char buf[100];
c044fabd 7736 char *name;
d4c88bbb 7737 size_t len;
c044fabd 7738 asection *sect;
252b5132 7739
f572a39d
AM
7740 if (note->descsz != sizeof (lwpstat)
7741#if defined (HAVE_LWPXSTATUS_T)
7742 && note->descsz != sizeof (lwpxstatus_t)
7743#endif
7744 )
b34976b6 7745 return TRUE;
252b5132
RH
7746
7747 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7748
7749 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7750 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7751
c044fabd 7752 /* Make a ".reg/999" section. */
252b5132
RH
7753
7754 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7755 len = strlen (buf) + 1;
217aa764 7756 name = bfd_alloc (abfd, len);
252b5132 7757 if (name == NULL)
b34976b6 7758 return FALSE;
d4c88bbb 7759 memcpy (name, buf, len);
252b5132 7760
117ed4f8 7761 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7762 if (sect == NULL)
b34976b6 7763 return FALSE;
252b5132
RH
7764
7765#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7766 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7767 sect->filepos = note->descpos
7768 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7769#endif
7770
7771#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7772 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7773 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7774#endif
7775
252b5132
RH
7776 sect->alignment_power = 2;
7777
7778 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7779 return FALSE;
252b5132
RH
7780
7781 /* Make a ".reg2/999" section */
7782
7783 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7784 len = strlen (buf) + 1;
217aa764 7785 name = bfd_alloc (abfd, len);
252b5132 7786 if (name == NULL)
b34976b6 7787 return FALSE;
d4c88bbb 7788 memcpy (name, buf, len);
252b5132 7789
117ed4f8 7790 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7791 if (sect == NULL)
b34976b6 7792 return FALSE;
252b5132
RH
7793
7794#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7795 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7796 sect->filepos = note->descpos
7797 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7798#endif
7799
7800#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7801 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7802 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7803#endif
7804
252b5132
RH
7805 sect->alignment_power = 2;
7806
936e320b 7807 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7808}
7809#endif /* defined (HAVE_LWPSTATUS_T) */
7810
b34976b6 7811static bfd_boolean
217aa764 7812elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7813{
7814 char buf[30];
c044fabd 7815 char *name;
d4c88bbb 7816 size_t len;
c044fabd 7817 asection *sect;
4a6636fb
PA
7818 int type;
7819 int is_active_thread;
7820 bfd_vma base_addr;
16e9c715 7821
4a6636fb 7822 if (note->descsz < 728)
b34976b6 7823 return TRUE;
16e9c715 7824
4a6636fb
PA
7825 if (! CONST_STRNEQ (note->namedata, "win32"))
7826 return TRUE;
7827
7828 type = bfd_get_32 (abfd, note->descdata);
c044fabd 7829
4a6636fb 7830 switch (type)
16e9c715 7831 {
4a6636fb 7832 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 7833 /* FIXME: need to add ->core_command. */
4a6636fb
PA
7834 /* process_info.pid */
7835 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
7836 /* process_info.signal */
7837 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 7838 break;
16e9c715 7839
4a6636fb 7840 case 2 /* NOTE_INFO_THREAD */:
16e9c715 7841 /* Make a ".reg/999" section. */
4a6636fb
PA
7842 /* thread_info.tid */
7843 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 7844
d4c88bbb 7845 len = strlen (buf) + 1;
217aa764 7846 name = bfd_alloc (abfd, len);
16e9c715 7847 if (name == NULL)
b34976b6 7848 return FALSE;
c044fabd 7849
d4c88bbb 7850 memcpy (name, buf, len);
16e9c715 7851
117ed4f8 7852 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 7853 if (sect == NULL)
b34976b6 7854 return FALSE;
c044fabd 7855
4a6636fb
PA
7856 /* sizeof (thread_info.thread_context) */
7857 sect->size = 716;
7858 /* offsetof (thread_info.thread_context) */
7859 sect->filepos = note->descpos + 12;
16e9c715
NC
7860 sect->alignment_power = 2;
7861
4a6636fb
PA
7862 /* thread_info.is_active_thread */
7863 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
7864
7865 if (is_active_thread)
16e9c715 7866 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7867 return FALSE;
16e9c715
NC
7868 break;
7869
4a6636fb 7870 case 3 /* NOTE_INFO_MODULE */:
16e9c715 7871 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
7872 /* module_info.base_address */
7873 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 7874 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 7875
d4c88bbb 7876 len = strlen (buf) + 1;
217aa764 7877 name = bfd_alloc (abfd, len);
16e9c715 7878 if (name == NULL)
b34976b6 7879 return FALSE;
c044fabd 7880
d4c88bbb 7881 memcpy (name, buf, len);
252b5132 7882
117ed4f8 7883 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 7884
16e9c715 7885 if (sect == NULL)
b34976b6 7886 return FALSE;
c044fabd 7887
eea6121a 7888 sect->size = note->descsz;
16e9c715 7889 sect->filepos = note->descpos;
16e9c715
NC
7890 sect->alignment_power = 2;
7891 break;
7892
7893 default:
b34976b6 7894 return TRUE;
16e9c715
NC
7895 }
7896
b34976b6 7897 return TRUE;
16e9c715 7898}
252b5132 7899
b34976b6 7900static bfd_boolean
217aa764 7901elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7902{
9c5bfbb7 7903 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7904
252b5132
RH
7905 switch (note->type)
7906 {
7907 default:
b34976b6 7908 return TRUE;
252b5132 7909
252b5132 7910 case NT_PRSTATUS:
bb0082d6
AM
7911 if (bed->elf_backend_grok_prstatus)
7912 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7913 return TRUE;
bb0082d6 7914#if defined (HAVE_PRSTATUS_T)
252b5132 7915 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7916#else
b34976b6 7917 return TRUE;
252b5132
RH
7918#endif
7919
7920#if defined (HAVE_PSTATUS_T)
7921 case NT_PSTATUS:
7922 return elfcore_grok_pstatus (abfd, note);
7923#endif
7924
7925#if defined (HAVE_LWPSTATUS_T)
7926 case NT_LWPSTATUS:
7927 return elfcore_grok_lwpstatus (abfd, note);
7928#endif
7929
7930 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7931 return elfcore_grok_prfpreg (abfd, note);
7932
c044fabd 7933 case NT_WIN32PSTATUS:
16e9c715 7934 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 7935
c044fabd 7936 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7937 if (note->namesz == 6
7938 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7939 return elfcore_grok_prxfpreg (abfd, note);
7940 else
b34976b6 7941 return TRUE;
ff08c6bb 7942
97753bd5
AM
7943 case NT_PPC_VMX:
7944 if (note->namesz == 6
7945 && strcmp (note->namedata, "LINUX") == 0)
7946 return elfcore_grok_ppc_vmx (abfd, note);
7947 else
7948 return TRUE;
7949
89eeb0bc
LM
7950 case NT_PPC_VSX:
7951 if (note->namesz == 6
7952 && strcmp (note->namedata, "LINUX") == 0)
7953 return elfcore_grok_ppc_vsx (abfd, note);
7954 else
7955 return TRUE;
7956
252b5132
RH
7957 case NT_PRPSINFO:
7958 case NT_PSINFO:
bb0082d6
AM
7959 if (bed->elf_backend_grok_psinfo)
7960 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7961 return TRUE;
bb0082d6 7962#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7963 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7964#else
b34976b6 7965 return TRUE;
252b5132 7966#endif
3333a7c3
RM
7967
7968 case NT_AUXV:
7969 {
117ed4f8
AM
7970 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
7971 SEC_HAS_CONTENTS);
3333a7c3
RM
7972
7973 if (sect == NULL)
7974 return FALSE;
eea6121a 7975 sect->size = note->descsz;
3333a7c3 7976 sect->filepos = note->descpos;
3333a7c3
RM
7977 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7978
7979 return TRUE;
7980 }
252b5132
RH
7981 }
7982}
7983
718175fa
JK
7984static bfd_boolean
7985elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
7986{
7987 elf_tdata (abfd)->build_id_size = note->descsz;
7988 elf_tdata (abfd)->build_id = bfd_alloc (abfd, note->descsz);
7989 if (elf_tdata (abfd)->build_id == NULL)
7990 return FALSE;
7991
7992 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
7993
7994 return TRUE;
7995}
7996
7997static bfd_boolean
7998elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
7999{
8000 switch (note->type)
8001 {
8002 default:
8003 return TRUE;
8004
8005 case NT_GNU_BUILD_ID:
8006 return elfobj_grok_gnu_build_id (abfd, note);
8007 }
8008}
8009
b34976b6 8010static bfd_boolean
217aa764 8011elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8012{
8013 char *cp;
8014
8015 cp = strchr (note->namedata, '@');
8016 if (cp != NULL)
8017 {
d2b64500 8018 *lwpidp = atoi(cp + 1);
b34976b6 8019 return TRUE;
50b2bdb7 8020 }
b34976b6 8021 return FALSE;
50b2bdb7
AM
8022}
8023
b34976b6 8024static bfd_boolean
217aa764 8025elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8026{
50b2bdb7
AM
8027 /* Signal number at offset 0x08. */
8028 elf_tdata (abfd)->core_signal
8029 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8030
8031 /* Process ID at offset 0x50. */
8032 elf_tdata (abfd)->core_pid
8033 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8034
8035 /* Command name at 0x7c (max 32 bytes, including nul). */
8036 elf_tdata (abfd)->core_command
8037 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8038
7720ba9f
MK
8039 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8040 note);
50b2bdb7
AM
8041}
8042
b34976b6 8043static bfd_boolean
217aa764 8044elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8045{
8046 int lwp;
8047
8048 if (elfcore_netbsd_get_lwpid (note, &lwp))
8049 elf_tdata (abfd)->core_lwpid = lwp;
8050
b4db1224 8051 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8052 {
8053 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8054 find this note before any of the others, which is fine,
8055 since the kernel writes this note out first when it
8056 creates a core file. */
47d9a591 8057
50b2bdb7
AM
8058 return elfcore_grok_netbsd_procinfo (abfd, note);
8059 }
8060
b4db1224
JT
8061 /* As of Jan 2002 there are no other machine-independent notes
8062 defined for NetBSD core files. If the note type is less
8063 than the start of the machine-dependent note types, we don't
8064 understand it. */
47d9a591 8065
b4db1224 8066 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8067 return TRUE;
50b2bdb7
AM
8068
8069
8070 switch (bfd_get_arch (abfd))
8071 {
08a40648
AM
8072 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8073 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8074
8075 case bfd_arch_alpha:
8076 case bfd_arch_sparc:
8077 switch (note->type)
08a40648
AM
8078 {
8079 case NT_NETBSDCORE_FIRSTMACH+0:
8080 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8081
08a40648
AM
8082 case NT_NETBSDCORE_FIRSTMACH+2:
8083 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8084
08a40648
AM
8085 default:
8086 return TRUE;
8087 }
50b2bdb7 8088
08a40648
AM
8089 /* On all other arch's, PT_GETREGS == mach+1 and
8090 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8091
8092 default:
8093 switch (note->type)
08a40648
AM
8094 {
8095 case NT_NETBSDCORE_FIRSTMACH+1:
8096 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8097
08a40648
AM
8098 case NT_NETBSDCORE_FIRSTMACH+3:
8099 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8100
08a40648
AM
8101 default:
8102 return TRUE;
8103 }
50b2bdb7
AM
8104 }
8105 /* NOTREACHED */
8106}
8107
67cc5033
MK
8108static bfd_boolean
8109elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8110{
8111 /* Signal number at offset 0x08. */
8112 elf_tdata (abfd)->core_signal
8113 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8114
8115 /* Process ID at offset 0x20. */
8116 elf_tdata (abfd)->core_pid
8117 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8118
8119 /* Command name at 0x48 (max 32 bytes, including nul). */
8120 elf_tdata (abfd)->core_command
8121 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8122
8123 return TRUE;
8124}
8125
8126static bfd_boolean
8127elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8128{
8129 if (note->type == NT_OPENBSD_PROCINFO)
8130 return elfcore_grok_openbsd_procinfo (abfd, note);
8131
8132 if (note->type == NT_OPENBSD_REGS)
8133 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8134
8135 if (note->type == NT_OPENBSD_FPREGS)
8136 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8137
8138 if (note->type == NT_OPENBSD_XFPREGS)
8139 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8140
8141 if (note->type == NT_OPENBSD_AUXV)
8142 {
8143 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8144 SEC_HAS_CONTENTS);
8145
8146 if (sect == NULL)
8147 return FALSE;
8148 sect->size = note->descsz;
8149 sect->filepos = note->descpos;
8150 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8151
8152 return TRUE;
8153 }
8154
8155 if (note->type == NT_OPENBSD_WCOOKIE)
8156 {
8157 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8158 SEC_HAS_CONTENTS);
8159
8160 if (sect == NULL)
8161 return FALSE;
8162 sect->size = note->descsz;
8163 sect->filepos = note->descpos;
8164 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8165
8166 return TRUE;
8167 }
8168
8169 return TRUE;
8170}
8171
07c6e936 8172static bfd_boolean
d3fd4074 8173elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8174{
8175 void *ddata = note->descdata;
8176 char buf[100];
8177 char *name;
8178 asection *sect;
f8843e87
AM
8179 short sig;
8180 unsigned flags;
07c6e936
NC
8181
8182 /* nto_procfs_status 'pid' field is at offset 0. */
8183 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8184
f8843e87
AM
8185 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8186 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8187
8188 /* nto_procfs_status 'flags' field is at offset 8. */
8189 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8190
8191 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8192 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8193 {
8194 elf_tdata (abfd)->core_signal = sig;
8195 elf_tdata (abfd)->core_lwpid = *tid;
8196 }
07c6e936 8197
f8843e87
AM
8198 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8199 do not come from signals so we make sure we set the current
8200 thread just in case. */
8201 if (flags & 0x00000080)
8202 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8203
8204 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8205 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8206
217aa764 8207 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8208 if (name == NULL)
8209 return FALSE;
8210 strcpy (name, buf);
8211
117ed4f8 8212 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8213 if (sect == NULL)
8214 return FALSE;
8215
eea6121a 8216 sect->size = note->descsz;
07c6e936 8217 sect->filepos = note->descpos;
07c6e936
NC
8218 sect->alignment_power = 2;
8219
8220 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8221}
8222
8223static bfd_boolean
d69f560c
KW
8224elfcore_grok_nto_regs (bfd *abfd,
8225 Elf_Internal_Note *note,
d3fd4074 8226 long tid,
d69f560c 8227 char *base)
07c6e936
NC
8228{
8229 char buf[100];
8230 char *name;
8231 asection *sect;
8232
d69f560c 8233 /* Make a "(base)/%d" section. */
d3fd4074 8234 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8235
217aa764 8236 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8237 if (name == NULL)
8238 return FALSE;
8239 strcpy (name, buf);
8240
117ed4f8 8241 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8242 if (sect == NULL)
8243 return FALSE;
8244
eea6121a 8245 sect->size = note->descsz;
07c6e936 8246 sect->filepos = note->descpos;
07c6e936
NC
8247 sect->alignment_power = 2;
8248
f8843e87
AM
8249 /* This is the current thread. */
8250 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8251 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8252
8253 return TRUE;
07c6e936
NC
8254}
8255
8256#define BFD_QNT_CORE_INFO 7
8257#define BFD_QNT_CORE_STATUS 8
8258#define BFD_QNT_CORE_GREG 9
8259#define BFD_QNT_CORE_FPREG 10
8260
8261static bfd_boolean
217aa764 8262elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8263{
8264 /* Every GREG section has a STATUS section before it. Store the
811072d8 8265 tid from the previous call to pass down to the next gregs
07c6e936 8266 function. */
d3fd4074 8267 static long tid = 1;
07c6e936
NC
8268
8269 switch (note->type)
8270 {
d69f560c
KW
8271 case BFD_QNT_CORE_INFO:
8272 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8273 case BFD_QNT_CORE_STATUS:
8274 return elfcore_grok_nto_status (abfd, note, &tid);
8275 case BFD_QNT_CORE_GREG:
8276 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8277 case BFD_QNT_CORE_FPREG:
8278 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8279 default:
8280 return TRUE;
07c6e936
NC
8281 }
8282}
8283
b15fa79e
AM
8284static bfd_boolean
8285elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8286{
8287 char *name;
8288 asection *sect;
8289 size_t len;
8290
8291 /* Use note name as section name. */
8292 len = note->namesz;
8293 name = bfd_alloc (abfd, len);
8294 if (name == NULL)
8295 return FALSE;
8296 memcpy (name, note->namedata, len);
8297 name[len - 1] = '\0';
8298
8299 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8300 if (sect == NULL)
8301 return FALSE;
8302
8303 sect->size = note->descsz;
8304 sect->filepos = note->descpos;
8305 sect->alignment_power = 1;
8306
8307 return TRUE;
8308}
8309
7c76fa91
MS
8310/* Function: elfcore_write_note
8311
47d9a591 8312 Inputs:
a39f3346 8313 buffer to hold note, and current size of buffer
7c76fa91
MS
8314 name of note
8315 type of note
8316 data for note
8317 size of data for note
8318
a39f3346
AM
8319 Writes note to end of buffer. ELF64 notes are written exactly as
8320 for ELF32, despite the current (as of 2006) ELF gabi specifying
8321 that they ought to have 8-byte namesz and descsz field, and have
8322 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8323
7c76fa91 8324 Return:
a39f3346 8325 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8326
8327char *
a39f3346 8328elfcore_write_note (bfd *abfd,
217aa764 8329 char *buf,
a39f3346 8330 int *bufsiz,
217aa764 8331 const char *name,
a39f3346 8332 int type,
217aa764 8333 const void *input,
a39f3346 8334 int size)
7c76fa91
MS
8335{
8336 Elf_External_Note *xnp;
d4c88bbb 8337 size_t namesz;
d4c88bbb 8338 size_t newspace;
a39f3346 8339 char *dest;
7c76fa91 8340
d4c88bbb 8341 namesz = 0;
d4c88bbb 8342 if (name != NULL)
a39f3346 8343 namesz = strlen (name) + 1;
d4c88bbb 8344
a39f3346 8345 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 8346
a39f3346 8347 buf = realloc (buf, *bufsiz + newspace);
14b1c01e
AM
8348 if (buf == NULL)
8349 return buf;
a39f3346 8350 dest = buf + *bufsiz;
7c76fa91
MS
8351 *bufsiz += newspace;
8352 xnp = (Elf_External_Note *) dest;
8353 H_PUT_32 (abfd, namesz, xnp->namesz);
8354 H_PUT_32 (abfd, size, xnp->descsz);
8355 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8356 dest = xnp->name;
8357 if (name != NULL)
8358 {
8359 memcpy (dest, name, namesz);
8360 dest += namesz;
a39f3346 8361 while (namesz & 3)
d4c88bbb
AM
8362 {
8363 *dest++ = '\0';
a39f3346 8364 ++namesz;
d4c88bbb
AM
8365 }
8366 }
8367 memcpy (dest, input, size);
a39f3346
AM
8368 dest += size;
8369 while (size & 3)
8370 {
8371 *dest++ = '\0';
8372 ++size;
8373 }
8374 return buf;
7c76fa91
MS
8375}
8376
8377#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8378char *
217aa764
AM
8379elfcore_write_prpsinfo (bfd *abfd,
8380 char *buf,
8381 int *bufsiz,
8382 const char *fname,
8383 const char *psargs)
7c76fa91 8384{
183e98be
AM
8385 const char *note_name = "CORE";
8386 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8387
8388 if (bed->elf_backend_write_core_note != NULL)
8389 {
8390 char *ret;
8391 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8392 NT_PRPSINFO, fname, psargs);
8393 if (ret != NULL)
8394 return ret;
8395 }
7c76fa91 8396
183e98be
AM
8397#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
8398 if (bed->s->elfclass == ELFCLASS32)
8399 {
8400#if defined (HAVE_PSINFO32_T)
8401 psinfo32_t data;
8402 int note_type = NT_PSINFO;
8403#else
8404 prpsinfo32_t data;
8405 int note_type = NT_PRPSINFO;
8406#endif
8407
8408 memset (&data, 0, sizeof (data));
8409 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8410 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8411 return elfcore_write_note (abfd, buf, bufsiz,
8412 note_name, note_type, &data, sizeof (data));
8413 }
8414 else
8415#endif
8416 {
7c76fa91 8417#if defined (HAVE_PSINFO_T)
183e98be
AM
8418 psinfo_t data;
8419 int note_type = NT_PSINFO;
7c76fa91 8420#else
183e98be
AM
8421 prpsinfo_t data;
8422 int note_type = NT_PRPSINFO;
7c76fa91
MS
8423#endif
8424
183e98be
AM
8425 memset (&data, 0, sizeof (data));
8426 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8427 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8428 return elfcore_write_note (abfd, buf, bufsiz,
8429 note_name, note_type, &data, sizeof (data));
8430 }
7c76fa91
MS
8431}
8432#endif /* PSINFO_T or PRPSINFO_T */
8433
8434#if defined (HAVE_PRSTATUS_T)
8435char *
217aa764
AM
8436elfcore_write_prstatus (bfd *abfd,
8437 char *buf,
8438 int *bufsiz,
8439 long pid,
8440 int cursig,
8441 const void *gregs)
7c76fa91 8442{
183e98be
AM
8443 const char *note_name = "CORE";
8444 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8445
183e98be
AM
8446 if (bed->elf_backend_write_core_note != NULL)
8447 {
8448 char *ret;
8449 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8450 NT_PRSTATUS,
8451 pid, cursig, gregs);
8452 if (ret != NULL)
8453 return ret;
8454 }
8455
8456#if defined (HAVE_PRSTATUS32_T)
8457 if (bed->s->elfclass == ELFCLASS32)
8458 {
8459 prstatus32_t prstat;
8460
8461 memset (&prstat, 0, sizeof (prstat));
8462 prstat.pr_pid = pid;
8463 prstat.pr_cursig = cursig;
8464 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8465 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8466 NT_PRSTATUS, &prstat, sizeof (prstat));
8467 }
8468 else
8469#endif
8470 {
8471 prstatus_t prstat;
8472
8473 memset (&prstat, 0, sizeof (prstat));
8474 prstat.pr_pid = pid;
8475 prstat.pr_cursig = cursig;
8476 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8477 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8478 NT_PRSTATUS, &prstat, sizeof (prstat));
8479 }
7c76fa91
MS
8480}
8481#endif /* HAVE_PRSTATUS_T */
8482
51316059
MS
8483#if defined (HAVE_LWPSTATUS_T)
8484char *
217aa764
AM
8485elfcore_write_lwpstatus (bfd *abfd,
8486 char *buf,
8487 int *bufsiz,
8488 long pid,
8489 int cursig,
8490 const void *gregs)
51316059
MS
8491{
8492 lwpstatus_t lwpstat;
183e98be 8493 const char *note_name = "CORE";
51316059
MS
8494
8495 memset (&lwpstat, 0, sizeof (lwpstat));
8496 lwpstat.pr_lwpid = pid >> 16;
8497 lwpstat.pr_cursig = cursig;
8498#if defined (HAVE_LWPSTATUS_T_PR_REG)
8499 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8500#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8501#if !defined(gregs)
8502 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8503 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8504#else
8505 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8506 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8507#endif
8508#endif
47d9a591 8509 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8510 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8511}
8512#endif /* HAVE_LWPSTATUS_T */
8513
7c76fa91
MS
8514#if defined (HAVE_PSTATUS_T)
8515char *
217aa764
AM
8516elfcore_write_pstatus (bfd *abfd,
8517 char *buf,
8518 int *bufsiz,
8519 long pid,
6c10990d
NC
8520 int cursig ATTRIBUTE_UNUSED,
8521 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 8522{
183e98be
AM
8523 const char *note_name = "CORE";
8524#if defined (HAVE_PSTATUS32_T)
8525 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8526
183e98be
AM
8527 if (bed->s->elfclass == ELFCLASS32)
8528 {
8529 pstatus32_t pstat;
8530
8531 memset (&pstat, 0, sizeof (pstat));
8532 pstat.pr_pid = pid & 0xffff;
8533 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8534 NT_PSTATUS, &pstat, sizeof (pstat));
8535 return buf;
8536 }
8537 else
8538#endif
8539 {
8540 pstatus_t pstat;
8541
8542 memset (&pstat, 0, sizeof (pstat));
8543 pstat.pr_pid = pid & 0xffff;
8544 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8545 NT_PSTATUS, &pstat, sizeof (pstat));
8546 return buf;
8547 }
7c76fa91
MS
8548}
8549#endif /* HAVE_PSTATUS_T */
8550
8551char *
217aa764
AM
8552elfcore_write_prfpreg (bfd *abfd,
8553 char *buf,
8554 int *bufsiz,
8555 const void *fpregs,
8556 int size)
7c76fa91 8557{
183e98be 8558 const char *note_name = "CORE";
47d9a591 8559 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8560 note_name, NT_FPREGSET, fpregs, size);
8561}
8562
8563char *
217aa764
AM
8564elfcore_write_prxfpreg (bfd *abfd,
8565 char *buf,
8566 int *bufsiz,
8567 const void *xfpregs,
8568 int size)
7c76fa91
MS
8569{
8570 char *note_name = "LINUX";
47d9a591 8571 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8572 note_name, NT_PRXFPREG, xfpregs, size);
8573}
8574
97753bd5
AM
8575char *
8576elfcore_write_ppc_vmx (bfd *abfd,
8577 char *buf,
8578 int *bufsiz,
8579 const void *ppc_vmx,
8580 int size)
8581{
8582 char *note_name = "LINUX";
8583 return elfcore_write_note (abfd, buf, bufsiz,
8584 note_name, NT_PPC_VMX, ppc_vmx, size);
8585}
8586
89eeb0bc
LM
8587char *
8588elfcore_write_ppc_vsx (bfd *abfd,
8589 char *buf,
8590 int *bufsiz,
8591 const void *ppc_vsx,
8592 int size)
8593{
8594 char *note_name = "LINUX";
8595 return elfcore_write_note (abfd, buf, bufsiz,
8596 note_name, NT_PPC_VSX, ppc_vsx, size);
8597}
8598
bb864ac1
CES
8599char *
8600elfcore_write_register_note (bfd *abfd,
8601 char *buf,
8602 int *bufsiz,
8603 const char *section,
8604 const void *data,
8605 int size)
8606{
8607 if (strcmp (section, ".reg2") == 0)
8608 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
8609 if (strcmp (section, ".reg-xfp") == 0)
8610 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
8611 if (strcmp (section, ".reg-ppc-vmx") == 0)
8612 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
8613 if (strcmp (section, ".reg-ppc-vsx") == 0)
8614 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
bb864ac1
CES
8615 return NULL;
8616}
8617
b34976b6 8618static bfd_boolean
718175fa 8619elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 8620{
c044fabd 8621 char *p;
252b5132 8622
252b5132
RH
8623 p = buf;
8624 while (p < buf + size)
8625 {
c044fabd
KH
8626 /* FIXME: bad alignment assumption. */
8627 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8628 Elf_Internal_Note in;
8629
baea7ef1
AM
8630 if (offsetof (Elf_External_Note, name) > buf - p + size)
8631 return FALSE;
8632
dc810e39 8633 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8634
dc810e39 8635 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 8636 in.namedata = xnp->name;
baea7ef1
AM
8637 if (in.namesz > buf - in.namedata + size)
8638 return FALSE;
252b5132 8639
dc810e39 8640 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8641 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8642 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
8643 if (in.descsz != 0
8644 && (in.descdata >= buf + size
8645 || in.descsz > buf - in.descdata + size))
8646 return FALSE;
252b5132 8647
718175fa
JK
8648 switch (bfd_get_format (abfd))
8649 {
8650 default:
8651 return TRUE;
8652
8653 case bfd_core:
8654 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
8655 {
8656 if (! elfcore_grok_netbsd_note (abfd, &in))
8657 return FALSE;
8658 }
67cc5033
MK
8659 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
8660 {
8661 if (! elfcore_grok_openbsd_note (abfd, &in))
8662 return FALSE;
8663 }
718175fa
JK
8664 else if (CONST_STRNEQ (in.namedata, "QNX"))
8665 {
8666 if (! elfcore_grok_nto_note (abfd, &in))
8667 return FALSE;
8668 }
b15fa79e
AM
8669 else if (CONST_STRNEQ (in.namedata, "SPU/"))
8670 {
8671 if (! elfcore_grok_spu_note (abfd, &in))
8672 return FALSE;
8673 }
718175fa
JK
8674 else
8675 {
8676 if (! elfcore_grok_note (abfd, &in))
8677 return FALSE;
8678 }
8679 break;
8680
8681 case bfd_object:
8682 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
8683 {
8684 if (! elfobj_grok_gnu_note (abfd, &in))
8685 return FALSE;
8686 }
8687 break;
08a40648 8688 }
252b5132
RH
8689
8690 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8691 }
8692
718175fa
JK
8693 return TRUE;
8694}
8695
8696static bfd_boolean
8697elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
8698{
8699 char *buf;
8700
8701 if (size <= 0)
8702 return TRUE;
8703
8704 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
8705 return FALSE;
8706
8707 buf = bfd_malloc (size);
8708 if (buf == NULL)
8709 return FALSE;
8710
8711 if (bfd_bread (buf, size, abfd) != size
8712 || !elf_parse_notes (abfd, buf, size, offset))
8713 {
8714 free (buf);
8715 return FALSE;
8716 }
8717
252b5132 8718 free (buf);
b34976b6 8719 return TRUE;
252b5132 8720}
98d8431c
JB
8721\f
8722/* Providing external access to the ELF program header table. */
8723
8724/* Return an upper bound on the number of bytes required to store a
8725 copy of ABFD's program header table entries. Return -1 if an error
8726 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8727
98d8431c 8728long
217aa764 8729bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8730{
8731 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8732 {
8733 bfd_set_error (bfd_error_wrong_format);
8734 return -1;
8735 }
8736
936e320b 8737 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8738}
8739
98d8431c
JB
8740/* Copy ABFD's program header table entries to *PHDRS. The entries
8741 will be stored as an array of Elf_Internal_Phdr structures, as
8742 defined in include/elf/internal.h. To find out how large the
8743 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
8744
8745 Return the number of program header table entries read, or -1 if an
8746 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 8747
98d8431c 8748int
217aa764 8749bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
8750{
8751 int num_phdrs;
8752
8753 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8754 {
8755 bfd_set_error (bfd_error_wrong_format);
8756 return -1;
8757 }
8758
8759 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8760 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8761 num_phdrs * sizeof (Elf_Internal_Phdr));
8762
8763 return num_phdrs;
8764}
ae4221d7 8765
db6751f2 8766enum elf_reloc_type_class
217aa764 8767_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8768{
8769 return reloc_class_normal;
8770}
f8df10f4 8771
47d9a591 8772/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8773 relocation against a local symbol. */
8774
8775bfd_vma
217aa764
AM
8776_bfd_elf_rela_local_sym (bfd *abfd,
8777 Elf_Internal_Sym *sym,
8517fae7 8778 asection **psec,
217aa764 8779 Elf_Internal_Rela *rel)
f8df10f4 8780{
8517fae7 8781 asection *sec = *psec;
f8df10f4
JJ
8782 bfd_vma relocation;
8783
8784 relocation = (sec->output_section->vma
8785 + sec->output_offset
8786 + sym->st_value);
8787 if ((sec->flags & SEC_MERGE)
c629eae0 8788 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8789 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8790 {
f8df10f4 8791 rel->r_addend =
8517fae7 8792 _bfd_merged_section_offset (abfd, psec,
65765700 8793 elf_section_data (sec)->sec_info,
753731ee
AM
8794 sym->st_value + rel->r_addend);
8795 if (sec != *psec)
8796 {
8797 /* If we have changed the section, and our original section is
8798 marked with SEC_EXCLUDE, it means that the original
8799 SEC_MERGE section has been completely subsumed in some
8800 other SEC_MERGE section. In this case, we need to leave
8801 some info around for --emit-relocs. */
8802 if ((sec->flags & SEC_EXCLUDE) != 0)
8803 sec->kept_section = *psec;
8804 sec = *psec;
8805 }
8517fae7
AM
8806 rel->r_addend -= relocation;
8807 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8808 }
8809 return relocation;
8810}
c629eae0
JJ
8811
8812bfd_vma
217aa764
AM
8813_bfd_elf_rel_local_sym (bfd *abfd,
8814 Elf_Internal_Sym *sym,
8815 asection **psec,
8816 bfd_vma addend)
47d9a591 8817{
c629eae0
JJ
8818 asection *sec = *psec;
8819
68bfbfcc 8820 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8821 return sym->st_value + addend;
8822
8823 return _bfd_merged_section_offset (abfd, psec,
65765700 8824 elf_section_data (sec)->sec_info,
753731ee 8825 sym->st_value + addend);
c629eae0
JJ
8826}
8827
8828bfd_vma
217aa764 8829_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8830 struct bfd_link_info *info,
217aa764
AM
8831 asection *sec,
8832 bfd_vma offset)
c629eae0 8833{
68bfbfcc 8834 switch (sec->sec_info_type)
65765700
JJ
8835 {
8836 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8837 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8838 offset);
65765700 8839 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8840 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8841 default:
8842 return offset;
8843 }
c629eae0 8844}
3333a7c3
RM
8845\f
8846/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8847 reconstruct an ELF file by reading the segments out of remote memory
8848 based on the ELF file header at EHDR_VMA and the ELF program headers it
8849 points to. If not null, *LOADBASEP is filled in with the difference
8850 between the VMAs from which the segments were read, and the VMAs the
8851 file headers (and hence BFD's idea of each section's VMA) put them at.
8852
8853 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8854 remote memory at target address VMA into the local buffer at MYADDR; it
8855 should return zero on success or an `errno' code on failure. TEMPL must
8856 be a BFD for an ELF target with the word size and byte order found in
8857 the remote memory. */
8858
8859bfd *
217aa764
AM
8860bfd_elf_bfd_from_remote_memory
8861 (bfd *templ,
8862 bfd_vma ehdr_vma,
8863 bfd_vma *loadbasep,
f075ee0c 8864 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8865{
8866 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8867 (templ, ehdr_vma, loadbasep, target_read_memory);
8868}
4c45e5c9
JJ
8869\f
8870long
c9727e01
AM
8871_bfd_elf_get_synthetic_symtab (bfd *abfd,
8872 long symcount ATTRIBUTE_UNUSED,
8873 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8874 long dynsymcount,
c9727e01
AM
8875 asymbol **dynsyms,
8876 asymbol **ret)
4c45e5c9
JJ
8877{
8878 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8879 asection *relplt;
8880 asymbol *s;
8881 const char *relplt_name;
8882 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8883 arelent *p;
8884 long count, i, n;
8885 size_t size;
8886 Elf_Internal_Shdr *hdr;
8887 char *names;
8888 asection *plt;
8889
8615f3f2
AM
8890 *ret = NULL;
8891
90e3cdf2
JJ
8892 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8893 return 0;
8894
8615f3f2
AM
8895 if (dynsymcount <= 0)
8896 return 0;
8897
4c45e5c9
JJ
8898 if (!bed->plt_sym_val)
8899 return 0;
8900
8901 relplt_name = bed->relplt_name;
8902 if (relplt_name == NULL)
d35fd659 8903 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
8904 relplt = bfd_get_section_by_name (abfd, relplt_name);
8905 if (relplt == NULL)
8906 return 0;
8907
8908 hdr = &elf_section_data (relplt)->this_hdr;
8909 if (hdr->sh_link != elf_dynsymtab (abfd)
8910 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8911 return 0;
8912
8913 plt = bfd_get_section_by_name (abfd, ".plt");
8914 if (plt == NULL)
8915 return 0;
8916
8917 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8918 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8919 return -1;
8920
eea6121a 8921 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8922 size = count * sizeof (asymbol);
8923 p = relplt->relocation;
cb53bf42 8924 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
8925 {
8926 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8927 if (p->addend != 0)
8928 {
8929#ifdef BFD64
8930 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
8931#else
8932 size += sizeof ("+0x") - 1 + 8;
8933#endif
8934 }
8935 }
4c45e5c9
JJ
8936
8937 s = *ret = bfd_malloc (size);
8938 if (s == NULL)
8939 return -1;
8940
8941 names = (char *) (s + count);
8942 p = relplt->relocation;
8943 n = 0;
cb53bf42 8944 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
8945 {
8946 size_t len;
8947 bfd_vma addr;
8948
8949 addr = bed->plt_sym_val (i, plt, p);
8950 if (addr == (bfd_vma) -1)
8951 continue;
8952
8953 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8954 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8955 we are defining a symbol, ensure one of them is set. */
8956 if ((s->flags & BSF_LOCAL) == 0)
8957 s->flags |= BSF_GLOBAL;
6ba2a415 8958 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
8959 s->section = plt;
8960 s->value = addr - plt->vma;
8961 s->name = names;
8f39ba8e 8962 s->udata.p = NULL;
4c45e5c9
JJ
8963 len = strlen ((*p->sym_ptr_ptr)->name);
8964 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8965 names += len;
041de40d
AM
8966 if (p->addend != 0)
8967 {
8968 memcpy (names, "+0x", sizeof ("+0x") - 1);
8969 names += sizeof ("+0x") - 1;
8970 bfd_sprintf_vma (abfd, names, p->addend);
8971 names += strlen (names);
8972 }
4c45e5c9
JJ
8973 memcpy (names, "@plt", sizeof ("@plt"));
8974 names += sizeof ("@plt");
8f39ba8e 8975 ++s, ++n;
4c45e5c9
JJ
8976 }
8977
8978 return n;
8979}
3d7f7666 8980
3b22753a
L
8981/* It is only used by x86-64 so far. */
8982asection _bfd_elf_large_com_section
8983 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 8984 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 8985
d1036acb
L
8986void
8987_bfd_elf_set_osabi (bfd * abfd,
8988 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
8989{
8990 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
8991
8992 i_ehdrp = elf_elfheader (abfd);
8993
8994 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
8995
8996 /* To make things simpler for the loader on Linux systems we set the
8997 osabi field to ELFOSABI_LINUX if the binary contains symbols of
8998 the STT_GNU_IFUNC type. */
8999 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
9000 && elf_tdata (abfd)->has_ifunc_symbols)
9001 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
d1036acb 9002}
fcb93ecf
PB
9003
9004
9005/* Return TRUE for ELF symbol types that represent functions.
9006 This is the default version of this function, which is sufficient for
d8045f23 9007 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
9008
9009bfd_boolean
9010_bfd_elf_is_function_type (unsigned int type)
9011{
d8045f23
NC
9012 return (type == STT_FUNC
9013 || type == STT_GNU_IFUNC);
fcb93ecf 9014}