]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
2008-01-30 Ralf Wildenhues <Ralf.Wildenhues@gmx.de>
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
0e922b77 4 2002, 2003, 2004, 2005, 2006, 2007 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
cd123cb7 10 the Free Software Foundation; either version 3 of the License, or
5e8d7549 11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
cd123cb7
NC
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
21 MA 02110-1301, USA. */
22
252b5132 23
1b74d094
BW
24/*
25SECTION
252b5132
RH
26 ELF backends
27
28 BFD support for ELF formats is being worked on.
29 Currently, the best supported back ends are for sparc and i386
30 (running svr4 or Solaris 2).
31
32 Documentation of the internals of the support code still needs
33 to be written. The code is changing quickly enough that we
661a3fd4 34 haven't bothered yet. */
252b5132 35
7ee38065
MS
36/* For sparc64-cross-sparc32. */
37#define _SYSCALL32
252b5132 38#include "sysdep.h"
3db64b00 39#include "bfd.h"
252b5132
RH
40#include "bfdlink.h"
41#include "libbfd.h"
42#define ARCH_SIZE 0
43#include "elf-bfd.h"
e0e8c97f 44#include "libiberty.h"
ff59fc36 45#include "safe-ctype.h"
252b5132 46
217aa764 47static int elf_sort_sections (const void *, const void *);
c84fca4d 48static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
49static bfd_boolean prep_headers (bfd *);
50static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
51static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
52static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
53 file_ptr offset);
50b2bdb7 54
252b5132
RH
55/* Swap version information in and out. The version information is
56 currently size independent. If that ever changes, this code will
57 need to move into elfcode.h. */
58
59/* Swap in a Verdef structure. */
60
61void
217aa764
AM
62_bfd_elf_swap_verdef_in (bfd *abfd,
63 const Elf_External_Verdef *src,
64 Elf_Internal_Verdef *dst)
252b5132 65{
dc810e39
AM
66 dst->vd_version = H_GET_16 (abfd, src->vd_version);
67 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
68 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
69 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
70 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
71 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
72 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
73}
74
75/* Swap out a Verdef structure. */
76
77void
217aa764
AM
78_bfd_elf_swap_verdef_out (bfd *abfd,
79 const Elf_Internal_Verdef *src,
80 Elf_External_Verdef *dst)
252b5132 81{
dc810e39
AM
82 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
83 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
84 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
85 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
86 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
87 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
88 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
89}
90
91/* Swap in a Verdaux structure. */
92
93void
217aa764
AM
94_bfd_elf_swap_verdaux_in (bfd *abfd,
95 const Elf_External_Verdaux *src,
96 Elf_Internal_Verdaux *dst)
252b5132 97{
dc810e39
AM
98 dst->vda_name = H_GET_32 (abfd, src->vda_name);
99 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
100}
101
102/* Swap out a Verdaux structure. */
103
104void
217aa764
AM
105_bfd_elf_swap_verdaux_out (bfd *abfd,
106 const Elf_Internal_Verdaux *src,
107 Elf_External_Verdaux *dst)
252b5132 108{
dc810e39
AM
109 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
110 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
111}
112
113/* Swap in a Verneed structure. */
114
115void
217aa764
AM
116_bfd_elf_swap_verneed_in (bfd *abfd,
117 const Elf_External_Verneed *src,
118 Elf_Internal_Verneed *dst)
252b5132 119{
dc810e39
AM
120 dst->vn_version = H_GET_16 (abfd, src->vn_version);
121 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
122 dst->vn_file = H_GET_32 (abfd, src->vn_file);
123 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
124 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
125}
126
127/* Swap out a Verneed structure. */
128
129void
217aa764
AM
130_bfd_elf_swap_verneed_out (bfd *abfd,
131 const Elf_Internal_Verneed *src,
132 Elf_External_Verneed *dst)
252b5132 133{
dc810e39
AM
134 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
135 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
136 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
137 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
138 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
139}
140
141/* Swap in a Vernaux structure. */
142
143void
217aa764
AM
144_bfd_elf_swap_vernaux_in (bfd *abfd,
145 const Elf_External_Vernaux *src,
146 Elf_Internal_Vernaux *dst)
252b5132 147{
dc810e39
AM
148 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
149 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
150 dst->vna_other = H_GET_16 (abfd, src->vna_other);
151 dst->vna_name = H_GET_32 (abfd, src->vna_name);
152 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
153}
154
155/* Swap out a Vernaux structure. */
156
157void
217aa764
AM
158_bfd_elf_swap_vernaux_out (bfd *abfd,
159 const Elf_Internal_Vernaux *src,
160 Elf_External_Vernaux *dst)
252b5132 161{
dc810e39
AM
162 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
163 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
164 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
165 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
166 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
167}
168
169/* Swap in a Versym structure. */
170
171void
217aa764
AM
172_bfd_elf_swap_versym_in (bfd *abfd,
173 const Elf_External_Versym *src,
174 Elf_Internal_Versym *dst)
252b5132 175{
dc810e39 176 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
177}
178
179/* Swap out a Versym structure. */
180
181void
217aa764
AM
182_bfd_elf_swap_versym_out (bfd *abfd,
183 const Elf_Internal_Versym *src,
184 Elf_External_Versym *dst)
252b5132 185{
dc810e39 186 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
187}
188
189/* Standard ELF hash function. Do not change this function; you will
190 cause invalid hash tables to be generated. */
3a99b017 191
252b5132 192unsigned long
217aa764 193bfd_elf_hash (const char *namearg)
252b5132 194{
3a99b017 195 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
196 unsigned long h = 0;
197 unsigned long g;
198 int ch;
199
200 while ((ch = *name++) != '\0')
201 {
202 h = (h << 4) + ch;
203 if ((g = (h & 0xf0000000)) != 0)
204 {
205 h ^= g >> 24;
206 /* The ELF ABI says `h &= ~g', but this is equivalent in
207 this case and on some machines one insn instead of two. */
208 h ^= g;
209 }
210 }
32dfa85d 211 return h & 0xffffffff;
252b5132
RH
212}
213
fdc90cb4
JJ
214/* DT_GNU_HASH hash function. Do not change this function; you will
215 cause invalid hash tables to be generated. */
216
217unsigned long
218bfd_elf_gnu_hash (const char *namearg)
219{
220 const unsigned char *name = (const unsigned char *) namearg;
221 unsigned long h = 5381;
222 unsigned char ch;
223
224 while ((ch = *name++) != '\0')
225 h = (h << 5) + h + ch;
226 return h & 0xffffffff;
227}
228
b34976b6 229bfd_boolean
217aa764 230bfd_elf_mkobject (bfd *abfd)
252b5132 231{
62d7a5f6
AM
232 if (abfd->tdata.any == NULL)
233 {
234 abfd->tdata.any = bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
235 if (abfd->tdata.any == NULL)
236 return FALSE;
237 }
238
239 elf_tdata (abfd)->program_header_size = (bfd_size_type) -1;
252b5132 240
b34976b6 241 return TRUE;
252b5132
RH
242}
243
b34976b6 244bfd_boolean
217aa764 245bfd_elf_mkcorefile (bfd *abfd)
252b5132 246{
c044fabd 247 /* I think this can be done just like an object file. */
252b5132
RH
248 return bfd_elf_mkobject (abfd);
249}
250
251char *
217aa764 252bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
253{
254 Elf_Internal_Shdr **i_shdrp;
f075ee0c 255 bfd_byte *shstrtab = NULL;
dc810e39
AM
256 file_ptr offset;
257 bfd_size_type shstrtabsize;
252b5132
RH
258
259 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
260 if (i_shdrp == 0
261 || shindex >= elf_numsections (abfd)
262 || i_shdrp[shindex] == 0)
f075ee0c 263 return NULL;
252b5132 264
f075ee0c 265 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
266 if (shstrtab == NULL)
267 {
c044fabd 268 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
269 offset = i_shdrp[shindex]->sh_offset;
270 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
271
272 /* Allocate and clear an extra byte at the end, to prevent crashes
273 in case the string table is not terminated. */
274 if (shstrtabsize + 1 == 0
275 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
276 || bfd_seek (abfd, offset, SEEK_SET) != 0)
277 shstrtab = NULL;
278 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
279 {
280 if (bfd_get_error () != bfd_error_system_call)
281 bfd_set_error (bfd_error_file_truncated);
282 shstrtab = NULL;
283 }
284 else
285 shstrtab[shstrtabsize] = '\0';
217aa764 286 i_shdrp[shindex]->contents = shstrtab;
252b5132 287 }
f075ee0c 288 return (char *) shstrtab;
252b5132
RH
289}
290
291char *
217aa764
AM
292bfd_elf_string_from_elf_section (bfd *abfd,
293 unsigned int shindex,
294 unsigned int strindex)
252b5132
RH
295{
296 Elf_Internal_Shdr *hdr;
297
298 if (strindex == 0)
299 return "";
300
74f2e02b
AM
301 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
302 return NULL;
303
252b5132
RH
304 hdr = elf_elfsections (abfd)[shindex];
305
306 if (hdr->contents == NULL
307 && bfd_elf_get_str_section (abfd, shindex) == NULL)
308 return NULL;
309
310 if (strindex >= hdr->sh_size)
311 {
1b3a8575 312 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 313 (*_bfd_error_handler)
d003868e
AM
314 (_("%B: invalid string offset %u >= %lu for section `%s'"),
315 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 316 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 317 ? ".shstrtab"
1b3a8575 318 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
319 return "";
320 }
321
322 return ((char *) hdr->contents) + strindex;
323}
324
6cdc0ccc
AM
325/* Read and convert symbols to internal format.
326 SYMCOUNT specifies the number of symbols to read, starting from
327 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
328 are non-NULL, they are used to store the internal symbols, external
329 symbols, and symbol section index extensions, respectively. */
330
331Elf_Internal_Sym *
217aa764
AM
332bfd_elf_get_elf_syms (bfd *ibfd,
333 Elf_Internal_Shdr *symtab_hdr,
334 size_t symcount,
335 size_t symoffset,
336 Elf_Internal_Sym *intsym_buf,
337 void *extsym_buf,
338 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
339{
340 Elf_Internal_Shdr *shndx_hdr;
217aa764 341 void *alloc_ext;
df622259 342 const bfd_byte *esym;
6cdc0ccc
AM
343 Elf_External_Sym_Shndx *alloc_extshndx;
344 Elf_External_Sym_Shndx *shndx;
345 Elf_Internal_Sym *isym;
346 Elf_Internal_Sym *isymend;
9c5bfbb7 347 const struct elf_backend_data *bed;
6cdc0ccc
AM
348 size_t extsym_size;
349 bfd_size_type amt;
350 file_ptr pos;
351
352 if (symcount == 0)
353 return intsym_buf;
354
355 /* Normal syms might have section extension entries. */
356 shndx_hdr = NULL;
357 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
358 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
359
360 /* Read the symbols. */
361 alloc_ext = NULL;
362 alloc_extshndx = NULL;
363 bed = get_elf_backend_data (ibfd);
364 extsym_size = bed->s->sizeof_sym;
365 amt = symcount * extsym_size;
366 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
367 if (extsym_buf == NULL)
368 {
d0fb9a8d 369 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
370 extsym_buf = alloc_ext;
371 }
372 if (extsym_buf == NULL
373 || bfd_seek (ibfd, pos, SEEK_SET) != 0
374 || bfd_bread (extsym_buf, amt, ibfd) != amt)
375 {
376 intsym_buf = NULL;
377 goto out;
378 }
379
380 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
381 extshndx_buf = NULL;
382 else
383 {
384 amt = symcount * sizeof (Elf_External_Sym_Shndx);
385 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
386 if (extshndx_buf == NULL)
387 {
d0fb9a8d
JJ
388 alloc_extshndx = bfd_malloc2 (symcount,
389 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
390 extshndx_buf = alloc_extshndx;
391 }
392 if (extshndx_buf == NULL
393 || bfd_seek (ibfd, pos, SEEK_SET) != 0
394 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
395 {
396 intsym_buf = NULL;
397 goto out;
398 }
399 }
400
401 if (intsym_buf == NULL)
402 {
d0fb9a8d 403 intsym_buf = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
6cdc0ccc
AM
404 if (intsym_buf == NULL)
405 goto out;
406 }
407
408 /* Convert the symbols to internal form. */
409 isymend = intsym_buf + symcount;
410 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
411 isym < isymend;
412 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
413 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
414 {
415 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
416 (*_bfd_error_handler) (_("%B symbol number %lu references "
417 "nonexistent SHT_SYMTAB_SHNDX section"),
418 ibfd, (unsigned long) symoffset);
419 intsym_buf = NULL;
420 goto out;
421 }
6cdc0ccc
AM
422
423 out:
424 if (alloc_ext != NULL)
425 free (alloc_ext);
426 if (alloc_extshndx != NULL)
427 free (alloc_extshndx);
428
429 return intsym_buf;
430}
431
5cab59f6
AM
432/* Look up a symbol name. */
433const char *
be8dd2ca
AM
434bfd_elf_sym_name (bfd *abfd,
435 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
436 Elf_Internal_Sym *isym,
437 asection *sym_sec)
5cab59f6 438{
26c61ae5 439 const char *name;
5cab59f6 440 unsigned int iname = isym->st_name;
be8dd2ca 441 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 442
138f35cc
JJ
443 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
444 /* Check for a bogus st_shndx to avoid crashing. */
445 && isym->st_shndx < elf_numsections (abfd)
446 && !(isym->st_shndx >= SHN_LORESERVE && isym->st_shndx <= SHN_HIRESERVE))
5cab59f6
AM
447 {
448 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
449 shindex = elf_elfheader (abfd)->e_shstrndx;
450 }
451
26c61ae5
L
452 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
453 if (name == NULL)
454 name = "(null)";
455 else if (sym_sec && *name == '\0')
456 name = bfd_section_name (abfd, sym_sec);
457
458 return name;
5cab59f6
AM
459}
460
dbb410c3
AM
461/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
462 sections. The first element is the flags, the rest are section
463 pointers. */
464
465typedef union elf_internal_group {
466 Elf_Internal_Shdr *shdr;
467 unsigned int flags;
468} Elf_Internal_Group;
469
b885599b
AM
470/* Return the name of the group signature symbol. Why isn't the
471 signature just a string? */
472
473static const char *
217aa764 474group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 475{
9dce4196 476 Elf_Internal_Shdr *hdr;
9dce4196
AM
477 unsigned char esym[sizeof (Elf64_External_Sym)];
478 Elf_External_Sym_Shndx eshndx;
479 Elf_Internal_Sym isym;
b885599b 480
13792e9d
L
481 /* First we need to ensure the symbol table is available. Make sure
482 that it is a symbol table section. */
483 hdr = elf_elfsections (abfd) [ghdr->sh_link];
484 if (hdr->sh_type != SHT_SYMTAB
485 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
486 return NULL;
487
9dce4196
AM
488 /* Go read the symbol. */
489 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
490 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
491 &isym, esym, &eshndx) == NULL)
b885599b 492 return NULL;
9dce4196 493
26c61ae5 494 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
495}
496
dbb410c3
AM
497/* Set next_in_group list pointer, and group name for NEWSECT. */
498
b34976b6 499static bfd_boolean
217aa764 500setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
501{
502 unsigned int num_group = elf_tdata (abfd)->num_group;
503
504 /* If num_group is zero, read in all SHT_GROUP sections. The count
505 is set to -1 if there are no SHT_GROUP sections. */
506 if (num_group == 0)
507 {
508 unsigned int i, shnum;
509
510 /* First count the number of groups. If we have a SHT_GROUP
511 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 512 shnum = elf_numsections (abfd);
dbb410c3 513 num_group = 0;
08a40648 514
1783205a
NC
515#define IS_VALID_GROUP_SECTION_HEADER(shdr) \
516 ( (shdr)->sh_type == SHT_GROUP \
517 && (shdr)->sh_size >= (2 * GRP_ENTRY_SIZE) \
518 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
519 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 520
dbb410c3
AM
521 for (i = 0; i < shnum; i++)
522 {
523 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
524
525 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3
AM
526 num_group += 1;
527 }
528
529 if (num_group == 0)
20dbb49d
L
530 {
531 num_group = (unsigned) -1;
532 elf_tdata (abfd)->num_group = num_group;
533 }
534 else
dbb410c3
AM
535 {
536 /* We keep a list of elf section headers for group sections,
537 so we can find them quickly. */
20dbb49d 538 bfd_size_type amt;
d0fb9a8d 539
20dbb49d 540 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
541 elf_tdata (abfd)->group_sect_ptr
542 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 543 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 544 return FALSE;
dbb410c3
AM
545
546 num_group = 0;
547 for (i = 0; i < shnum; i++)
548 {
549 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
550
551 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3 552 {
973ffd63 553 unsigned char *src;
dbb410c3
AM
554 Elf_Internal_Group *dest;
555
556 /* Add to list of sections. */
557 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
558 num_group += 1;
559
560 /* Read the raw contents. */
561 BFD_ASSERT (sizeof (*dest) >= 4);
562 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
563 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
564 sizeof (*dest) / 4);
1783205a
NC
565 /* PR binutils/4110: Handle corrupt group headers. */
566 if (shdr->contents == NULL)
567 {
568 _bfd_error_handler
569 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
570 bfd_set_error (bfd_error_bad_value);
571 return FALSE;
572 }
573
574 memset (shdr->contents, 0, amt);
575
576 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
577 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
578 != shdr->sh_size))
b34976b6 579 return FALSE;
dbb410c3
AM
580
581 /* Translate raw contents, a flag word followed by an
582 array of elf section indices all in target byte order,
583 to the flag word followed by an array of elf section
584 pointers. */
585 src = shdr->contents + shdr->sh_size;
586 dest = (Elf_Internal_Group *) (shdr->contents + amt);
587 while (1)
588 {
589 unsigned int idx;
590
591 src -= 4;
592 --dest;
593 idx = H_GET_32 (abfd, src);
594 if (src == shdr->contents)
595 {
596 dest->flags = idx;
b885599b
AM
597 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
598 shdr->bfd_section->flags
599 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
600 break;
601 }
602 if (idx >= shnum)
603 {
604 ((*_bfd_error_handler)
d003868e 605 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
606 idx = 0;
607 }
608 dest->shdr = elf_elfsections (abfd)[idx];
609 }
610 }
611 }
612 }
613 }
614
615 if (num_group != (unsigned) -1)
616 {
617 unsigned int i;
618
619 for (i = 0; i < num_group; i++)
620 {
621 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
622 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
623 unsigned int n_elt = shdr->sh_size / 4;
624
625 /* Look through this group's sections to see if current
626 section is a member. */
627 while (--n_elt != 0)
628 if ((++idx)->shdr == hdr)
629 {
e0e8c97f 630 asection *s = NULL;
dbb410c3
AM
631
632 /* We are a member of this group. Go looking through
633 other members to see if any others are linked via
634 next_in_group. */
635 idx = (Elf_Internal_Group *) shdr->contents;
636 n_elt = shdr->sh_size / 4;
637 while (--n_elt != 0)
638 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 639 && elf_next_in_group (s) != NULL)
dbb410c3
AM
640 break;
641 if (n_elt != 0)
642 {
dbb410c3
AM
643 /* Snarf the group name from other member, and
644 insert current section in circular list. */
945906ff
AM
645 elf_group_name (newsect) = elf_group_name (s);
646 elf_next_in_group (newsect) = elf_next_in_group (s);
647 elf_next_in_group (s) = newsect;
dbb410c3
AM
648 }
649 else
650 {
dbb410c3
AM
651 const char *gname;
652
b885599b
AM
653 gname = group_signature (abfd, shdr);
654 if (gname == NULL)
b34976b6 655 return FALSE;
945906ff 656 elf_group_name (newsect) = gname;
dbb410c3
AM
657
658 /* Start a circular list with one element. */
945906ff 659 elf_next_in_group (newsect) = newsect;
dbb410c3 660 }
b885599b 661
9dce4196
AM
662 /* If the group section has been created, point to the
663 new member. */
dbb410c3 664 if (shdr->bfd_section != NULL)
945906ff 665 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 666
dbb410c3
AM
667 i = num_group - 1;
668 break;
669 }
670 }
671 }
672
945906ff 673 if (elf_group_name (newsect) == NULL)
dbb410c3 674 {
d003868e
AM
675 (*_bfd_error_handler) (_("%B: no group info for section %A"),
676 abfd, newsect);
dbb410c3 677 }
b34976b6 678 return TRUE;
dbb410c3
AM
679}
680
3d7f7666 681bfd_boolean
dd863624 682_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
683{
684 unsigned int i;
685 unsigned int num_group = elf_tdata (abfd)->num_group;
686 bfd_boolean result = TRUE;
dd863624
L
687 asection *s;
688
689 /* Process SHF_LINK_ORDER. */
690 for (s = abfd->sections; s != NULL; s = s->next)
691 {
692 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
693 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
694 {
695 unsigned int elfsec = this_hdr->sh_link;
696 /* FIXME: The old Intel compiler and old strip/objcopy may
697 not set the sh_link or sh_info fields. Hence we could
698 get the situation where elfsec is 0. */
699 if (elfsec == 0)
700 {
701 const struct elf_backend_data *bed
702 = get_elf_backend_data (abfd);
703 if (bed->link_order_error_handler)
704 bed->link_order_error_handler
705 (_("%B: warning: sh_link not set for section `%A'"),
706 abfd, s);
707 }
708 else
709 {
25bbc984
L
710 asection *link;
711
dd863624 712 this_hdr = elf_elfsections (abfd)[elfsec];
25bbc984
L
713
714 /* PR 1991, 2008:
715 Some strip/objcopy may leave an incorrect value in
716 sh_link. We don't want to proceed. */
717 link = this_hdr->bfd_section;
718 if (link == NULL)
719 {
720 (*_bfd_error_handler)
721 (_("%B: sh_link [%d] in section `%A' is incorrect"),
722 s->owner, s, elfsec);
723 result = FALSE;
724 }
725
726 elf_linked_to_section (s) = link;
dd863624
L
727 }
728 }
729 }
3d7f7666 730
dd863624 731 /* Process section groups. */
3d7f7666
L
732 if (num_group == (unsigned) -1)
733 return result;
734
735 for (i = 0; i < num_group; i++)
736 {
737 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
738 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
739 unsigned int n_elt = shdr->sh_size / 4;
740
741 while (--n_elt != 0)
742 if ((++idx)->shdr->bfd_section)
743 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
744 else if (idx->shdr->sh_type == SHT_RELA
745 || idx->shdr->sh_type == SHT_REL)
746 /* We won't include relocation sections in section groups in
747 output object files. We adjust the group section size here
748 so that relocatable link will work correctly when
749 relocation sections are in section group in input object
750 files. */
751 shdr->bfd_section->size -= 4;
752 else
753 {
754 /* There are some unknown sections in the group. */
755 (*_bfd_error_handler)
d003868e
AM
756 (_("%B: unknown [%d] section `%s' in group [%s]"),
757 abfd,
3d7f7666 758 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
759 bfd_elf_string_from_elf_section (abfd,
760 (elf_elfheader (abfd)
761 ->e_shstrndx),
762 idx->shdr->sh_name),
3d7f7666
L
763 shdr->bfd_section->name);
764 result = FALSE;
765 }
766 }
767 return result;
768}
769
72adc230
AM
770bfd_boolean
771bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
772{
773 return elf_next_in_group (sec) != NULL;
774}
775
252b5132
RH
776/* Make a BFD section from an ELF section. We store a pointer to the
777 BFD section in the bfd_section field of the header. */
778
b34976b6 779bfd_boolean
217aa764
AM
780_bfd_elf_make_section_from_shdr (bfd *abfd,
781 Elf_Internal_Shdr *hdr,
6dc132d9
L
782 const char *name,
783 int shindex)
252b5132
RH
784{
785 asection *newsect;
786 flagword flags;
9c5bfbb7 787 const struct elf_backend_data *bed;
252b5132
RH
788
789 if (hdr->bfd_section != NULL)
790 {
791 BFD_ASSERT (strcmp (name,
792 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 793 return TRUE;
252b5132
RH
794 }
795
796 newsect = bfd_make_section_anyway (abfd, name);
797 if (newsect == NULL)
b34976b6 798 return FALSE;
252b5132 799
1829f4b2
AM
800 hdr->bfd_section = newsect;
801 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 802 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 803
2f89ff8d
L
804 /* Always use the real type/flags. */
805 elf_section_type (newsect) = hdr->sh_type;
806 elf_section_flags (newsect) = hdr->sh_flags;
807
252b5132
RH
808 newsect->filepos = hdr->sh_offset;
809
810 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
811 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
812 || ! bfd_set_section_alignment (abfd, newsect,
dc810e39 813 bfd_log2 ((bfd_vma) hdr->sh_addralign)))
b34976b6 814 return FALSE;
252b5132
RH
815
816 flags = SEC_NO_FLAGS;
817 if (hdr->sh_type != SHT_NOBITS)
818 flags |= SEC_HAS_CONTENTS;
dbb410c3 819 if (hdr->sh_type == SHT_GROUP)
b3096250 820 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
821 if ((hdr->sh_flags & SHF_ALLOC) != 0)
822 {
823 flags |= SEC_ALLOC;
824 if (hdr->sh_type != SHT_NOBITS)
825 flags |= SEC_LOAD;
826 }
827 if ((hdr->sh_flags & SHF_WRITE) == 0)
828 flags |= SEC_READONLY;
829 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
830 flags |= SEC_CODE;
831 else if ((flags & SEC_LOAD) != 0)
832 flags |= SEC_DATA;
f5fa8ca2
JJ
833 if ((hdr->sh_flags & SHF_MERGE) != 0)
834 {
835 flags |= SEC_MERGE;
836 newsect->entsize = hdr->sh_entsize;
837 if ((hdr->sh_flags & SHF_STRINGS) != 0)
838 flags |= SEC_STRINGS;
839 }
dbb410c3
AM
840 if (hdr->sh_flags & SHF_GROUP)
841 if (!setup_group (abfd, hdr, newsect))
b34976b6 842 return FALSE;
13ae64f3
JJ
843 if ((hdr->sh_flags & SHF_TLS) != 0)
844 flags |= SEC_THREAD_LOCAL;
252b5132 845
3d2b39cf 846 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 847 {
3d2b39cf
L
848 /* The debugging sections appear to be recognized only by name,
849 not any sort of flag. Their SEC_ALLOC bits are cleared. */
850 static const struct
851 {
852 const char *name;
853 int len;
854 } debug_sections [] =
855 {
0112cd26 856 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
857 { NULL, 0 }, /* 'e' */
858 { NULL, 0 }, /* 'f' */
0112cd26 859 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
860 { NULL, 0 }, /* 'h' */
861 { NULL, 0 }, /* 'i' */
862 { NULL, 0 }, /* 'j' */
863 { NULL, 0 }, /* 'k' */
0112cd26 864 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
865 { NULL, 0 }, /* 'm' */
866 { NULL, 0 }, /* 'n' */
867 { NULL, 0 }, /* 'o' */
868 { NULL, 0 }, /* 'p' */
869 { NULL, 0 }, /* 'q' */
870 { NULL, 0 }, /* 'r' */
0112cd26 871 { STRING_COMMA_LEN ("stab") } /* 's' */
3d2b39cf 872 };
08a40648 873
3d2b39cf
L
874 if (name [0] == '.')
875 {
876 int i = name [1] - 'd';
877 if (i >= 0
878 && i < (int) ARRAY_SIZE (debug_sections)
879 && debug_sections [i].name != NULL
880 && strncmp (&name [1], debug_sections [i].name,
881 debug_sections [i].len) == 0)
882 flags |= SEC_DEBUGGING;
883 }
884 }
252b5132
RH
885
886 /* As a GNU extension, if the name begins with .gnu.linkonce, we
887 only link a single copy of the section. This is used to support
888 g++. g++ will emit each template expansion in its own section.
889 The symbols will be defined as weak, so that multiple definitions
890 are permitted. The GNU linker extension is to actually discard
891 all but one of the sections. */
0112cd26 892 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 893 && elf_next_in_group (newsect) == NULL)
252b5132
RH
894 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
895
fa152c49
JW
896 bed = get_elf_backend_data (abfd);
897 if (bed->elf_backend_section_flags)
898 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 899 return FALSE;
fa152c49 900
252b5132 901 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 902 return FALSE;
252b5132 903
718175fa
JK
904 /* We do not parse the PT_NOTE segments as we are interested even in the
905 separate debug info files which may have the segments offsets corrupted.
906 PT_NOTEs from the core files are currently not parsed using BFD. */
907 if (hdr->sh_type == SHT_NOTE)
908 {
909 char *contents;
910
911 contents = bfd_malloc (hdr->sh_size);
912 if (!contents)
913 return FALSE;
914
915 if (!bfd_get_section_contents (abfd, hdr->bfd_section, contents, 0,
916 hdr->sh_size)
917 || !elf_parse_notes (abfd, contents, hdr->sh_size, -1))
918 {
919 free (contents);
920 return FALSE;
921 }
922
923 free (contents);
924 }
925
252b5132
RH
926 if ((flags & SEC_ALLOC) != 0)
927 {
928 Elf_Internal_Phdr *phdr;
929 unsigned int i;
930
931 /* Look through the phdrs to see if we need to adjust the lma.
08a40648
AM
932 If all the p_paddr fields are zero, we ignore them, since
933 some ELF linkers produce such output. */
252b5132
RH
934 phdr = elf_tdata (abfd)->phdr;
935 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
936 {
937 if (phdr->p_paddr != 0)
938 break;
939 }
940 if (i < elf_elfheader (abfd)->e_phnum)
941 {
942 phdr = elf_tdata (abfd)->phdr;
943 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
944 {
e0e8c97f
NC
945 /* This section is part of this segment if its file
946 offset plus size lies within the segment's memory
947 span and, if the section is loaded, the extent of the
47d9a591 948 loaded data lies within the extent of the segment.
bf36db18
NC
949
950 Note - we used to check the p_paddr field as well, and
951 refuse to set the LMA if it was 0. This is wrong
dba143ef 952 though, as a perfectly valid initialised segment can
bf36db18 953 have a p_paddr of zero. Some architectures, eg ARM,
08a40648
AM
954 place special significance on the address 0 and
955 executables need to be able to have a segment which
956 covers this address. */
252b5132 957 if (phdr->p_type == PT_LOAD
e0e8c97f
NC
958 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
959 && (hdr->sh_offset + hdr->sh_size
960 <= phdr->p_offset + phdr->p_memsz)
252b5132 961 && ((flags & SEC_LOAD) == 0
d7866f04
AM
962 || (hdr->sh_offset + hdr->sh_size
963 <= phdr->p_offset + phdr->p_filesz)))
252b5132 964 {
dba143ef 965 if ((flags & SEC_LOAD) == 0)
d7866f04
AM
966 newsect->lma = (phdr->p_paddr
967 + hdr->sh_addr - phdr->p_vaddr);
dba143ef
AM
968 else
969 /* We used to use the same adjustment for SEC_LOAD
970 sections, but that doesn't work if the segment
971 is packed with code from multiple VMAs.
972 Instead we calculate the section LMA based on
973 the segment LMA. It is assumed that the
974 segment will contain sections with contiguous
975 LMAs, even if the VMAs are not. */
976 newsect->lma = (phdr->p_paddr
977 + hdr->sh_offset - phdr->p_offset);
d7866f04
AM
978
979 /* With contiguous segments, we can't tell from file
980 offsets whether a section with zero size should
981 be placed at the end of one segment or the
982 beginning of the next. Decide based on vaddr. */
983 if (hdr->sh_addr >= phdr->p_vaddr
984 && (hdr->sh_addr + hdr->sh_size
985 <= phdr->p_vaddr + phdr->p_memsz))
986 break;
252b5132
RH
987 }
988 }
989 }
990 }
991
b34976b6 992 return TRUE;
252b5132
RH
993}
994
995/*
996INTERNAL_FUNCTION
997 bfd_elf_find_section
998
999SYNOPSIS
1000 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
1001
1002DESCRIPTION
1003 Helper functions for GDB to locate the string tables.
1004 Since BFD hides string tables from callers, GDB needs to use an
1005 internal hook to find them. Sun's .stabstr, in particular,
1006 isn't even pointed to by the .stab section, so ordinary
1007 mechanisms wouldn't work to find it, even if we had some.
1008*/
1009
1010struct elf_internal_shdr *
217aa764 1011bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
1012{
1013 Elf_Internal_Shdr **i_shdrp;
1014 char *shstrtab;
1015 unsigned int max;
1016 unsigned int i;
1017
1018 i_shdrp = elf_elfsections (abfd);
1019 if (i_shdrp != NULL)
1020 {
9ad5cbcf
AM
1021 shstrtab = bfd_elf_get_str_section (abfd,
1022 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
1023 if (shstrtab != NULL)
1024 {
9ad5cbcf 1025 max = elf_numsections (abfd);
252b5132
RH
1026 for (i = 1; i < max; i++)
1027 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
1028 return i_shdrp[i];
1029 }
1030 }
1031 return 0;
1032}
1033
1034const char *const bfd_elf_section_type_names[] = {
1035 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1036 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1037 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1038};
1039
1049f94e 1040/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1041 output, and the reloc is against an external symbol, and nothing
1042 has given us any additional addend, the resulting reloc will also
1043 be against the same symbol. In such a case, we don't want to
1044 change anything about the way the reloc is handled, since it will
1045 all be done at final link time. Rather than put special case code
1046 into bfd_perform_relocation, all the reloc types use this howto
1047 function. It just short circuits the reloc if producing
1049f94e 1048 relocatable output against an external symbol. */
252b5132 1049
252b5132 1050bfd_reloc_status_type
217aa764
AM
1051bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1052 arelent *reloc_entry,
1053 asymbol *symbol,
1054 void *data ATTRIBUTE_UNUSED,
1055 asection *input_section,
1056 bfd *output_bfd,
1057 char **error_message ATTRIBUTE_UNUSED)
1058{
1059 if (output_bfd != NULL
252b5132
RH
1060 && (symbol->flags & BSF_SECTION_SYM) == 0
1061 && (! reloc_entry->howto->partial_inplace
1062 || reloc_entry->addend == 0))
1063 {
1064 reloc_entry->address += input_section->output_offset;
1065 return bfd_reloc_ok;
1066 }
1067
1068 return bfd_reloc_continue;
1069}
1070\f
0ac4564e
L
1071/* Copy the program header and other data from one object module to
1072 another. */
252b5132 1073
b34976b6 1074bfd_boolean
217aa764 1075_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1076{
1077 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1078 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1079 return TRUE;
2d502050
L
1080
1081 BFD_ASSERT (!elf_flags_init (obfd)
1082 || (elf_elfheader (obfd)->e_flags
1083 == elf_elfheader (ibfd)->e_flags));
1084
0ac4564e 1085 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1086 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1087 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1088
1089 /* Copy object attributes. */
1090 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1091
b34976b6 1092 return TRUE;
2d502050
L
1093}
1094
cedc298e
L
1095static const char *
1096get_segment_type (unsigned int p_type)
1097{
1098 const char *pt;
1099 switch (p_type)
1100 {
1101 case PT_NULL: pt = "NULL"; break;
1102 case PT_LOAD: pt = "LOAD"; break;
1103 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1104 case PT_INTERP: pt = "INTERP"; break;
1105 case PT_NOTE: pt = "NOTE"; break;
1106 case PT_SHLIB: pt = "SHLIB"; break;
1107 case PT_PHDR: pt = "PHDR"; break;
1108 case PT_TLS: pt = "TLS"; break;
1109 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1110 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1111 case PT_GNU_RELRO: pt = "RELRO"; break;
1112 default: pt = NULL; break;
1113 }
1114 return pt;
1115}
1116
f0b79d91
L
1117/* Print out the program headers. */
1118
b34976b6 1119bfd_boolean
217aa764 1120_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1121{
217aa764 1122 FILE *f = farg;
252b5132
RH
1123 Elf_Internal_Phdr *p;
1124 asection *s;
1125 bfd_byte *dynbuf = NULL;
1126
1127 p = elf_tdata (abfd)->phdr;
1128 if (p != NULL)
1129 {
1130 unsigned int i, c;
1131
1132 fprintf (f, _("\nProgram Header:\n"));
1133 c = elf_elfheader (abfd)->e_phnum;
1134 for (i = 0; i < c; i++, p++)
1135 {
cedc298e 1136 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1137 char buf[20];
1138
cedc298e 1139 if (pt == NULL)
252b5132 1140 {
cedc298e
L
1141 sprintf (buf, "0x%lx", p->p_type);
1142 pt = buf;
252b5132 1143 }
dc810e39 1144 fprintf (f, "%8s off 0x", pt);
60b89a18 1145 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1146 fprintf (f, " vaddr 0x");
60b89a18 1147 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1148 fprintf (f, " paddr 0x");
60b89a18 1149 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1150 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1151 fprintf (f, " filesz 0x");
60b89a18 1152 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1153 fprintf (f, " memsz 0x");
60b89a18 1154 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1155 fprintf (f, " flags %c%c%c",
1156 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1157 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1158 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1159 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1160 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1161 fprintf (f, "\n");
1162 }
1163 }
1164
1165 s = bfd_get_section_by_name (abfd, ".dynamic");
1166 if (s != NULL)
1167 {
1168 int elfsec;
dc810e39 1169 unsigned long shlink;
252b5132
RH
1170 bfd_byte *extdyn, *extdynend;
1171 size_t extdynsize;
217aa764 1172 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1173
1174 fprintf (f, _("\nDynamic Section:\n"));
1175
eea6121a 1176 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1177 goto error_return;
1178
1179 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1180 if (elfsec == -1)
1181 goto error_return;
dc810e39 1182 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1183
1184 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1185 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1186
1187 extdyn = dynbuf;
eea6121a 1188 extdynend = extdyn + s->size;
252b5132
RH
1189 for (; extdyn < extdynend; extdyn += extdynsize)
1190 {
1191 Elf_Internal_Dyn dyn;
1192 const char *name;
1193 char ab[20];
b34976b6 1194 bfd_boolean stringp;
252b5132 1195
217aa764 1196 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1197
1198 if (dyn.d_tag == DT_NULL)
1199 break;
1200
b34976b6 1201 stringp = FALSE;
252b5132
RH
1202 switch (dyn.d_tag)
1203 {
1204 default:
1205 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1206 name = ab;
1207 break;
1208
b34976b6 1209 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1210 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1211 case DT_PLTGOT: name = "PLTGOT"; break;
1212 case DT_HASH: name = "HASH"; break;
1213 case DT_STRTAB: name = "STRTAB"; break;
1214 case DT_SYMTAB: name = "SYMTAB"; break;
1215 case DT_RELA: name = "RELA"; break;
1216 case DT_RELASZ: name = "RELASZ"; break;
1217 case DT_RELAENT: name = "RELAENT"; break;
1218 case DT_STRSZ: name = "STRSZ"; break;
1219 case DT_SYMENT: name = "SYMENT"; break;
1220 case DT_INIT: name = "INIT"; break;
1221 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1222 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1223 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1224 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1225 case DT_REL: name = "REL"; break;
1226 case DT_RELSZ: name = "RELSZ"; break;
1227 case DT_RELENT: name = "RELENT"; break;
1228 case DT_PLTREL: name = "PLTREL"; break;
1229 case DT_DEBUG: name = "DEBUG"; break;
1230 case DT_TEXTREL: name = "TEXTREL"; break;
1231 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1232 case DT_BIND_NOW: name = "BIND_NOW"; break;
1233 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1234 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1235 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1236 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1237 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1238 case DT_FLAGS: name = "FLAGS"; break;
1239 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1240 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1241 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1242 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1243 case DT_MOVEENT: name = "MOVEENT"; break;
1244 case DT_MOVESZ: name = "MOVESZ"; break;
1245 case DT_FEATURE: name = "FEATURE"; break;
1246 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1247 case DT_SYMINSZ: name = "SYMINSZ"; break;
1248 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1249 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1250 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1251 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1252 case DT_PLTPAD: name = "PLTPAD"; break;
1253 case DT_MOVETAB: name = "MOVETAB"; break;
1254 case DT_SYMINFO: name = "SYMINFO"; break;
1255 case DT_RELACOUNT: name = "RELACOUNT"; break;
1256 case DT_RELCOUNT: name = "RELCOUNT"; break;
1257 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1258 case DT_VERSYM: name = "VERSYM"; break;
1259 case DT_VERDEF: name = "VERDEF"; break;
1260 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1261 case DT_VERNEED: name = "VERNEED"; break;
1262 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1263 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1264 case DT_USED: name = "USED"; break;
b34976b6 1265 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1266 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1267 }
1268
1269 fprintf (f, " %-11s ", name);
1270 if (! stringp)
1271 fprintf (f, "0x%lx", (unsigned long) dyn.d_un.d_val);
1272 else
1273 {
1274 const char *string;
dc810e39 1275 unsigned int tagv = dyn.d_un.d_val;
252b5132 1276
dc810e39 1277 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1278 if (string == NULL)
1279 goto error_return;
1280 fprintf (f, "%s", string);
1281 }
1282 fprintf (f, "\n");
1283 }
1284
1285 free (dynbuf);
1286 dynbuf = NULL;
1287 }
1288
1289 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1290 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1291 {
fc0e6df6 1292 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1293 return FALSE;
252b5132
RH
1294 }
1295
1296 if (elf_dynverdef (abfd) != 0)
1297 {
1298 Elf_Internal_Verdef *t;
1299
1300 fprintf (f, _("\nVersion definitions:\n"));
1301 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1302 {
1303 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1304 t->vd_flags, t->vd_hash,
1305 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1306 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1307 {
1308 Elf_Internal_Verdaux *a;
1309
1310 fprintf (f, "\t");
1311 for (a = t->vd_auxptr->vda_nextptr;
1312 a != NULL;
1313 a = a->vda_nextptr)
d0fb9a8d
JJ
1314 fprintf (f, "%s ",
1315 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1316 fprintf (f, "\n");
1317 }
1318 }
1319 }
1320
1321 if (elf_dynverref (abfd) != 0)
1322 {
1323 Elf_Internal_Verneed *t;
1324
1325 fprintf (f, _("\nVersion References:\n"));
1326 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1327 {
1328 Elf_Internal_Vernaux *a;
1329
d0fb9a8d
JJ
1330 fprintf (f, _(" required from %s:\n"),
1331 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1332 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1333 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1334 a->vna_flags, a->vna_other,
1335 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1336 }
1337 }
1338
b34976b6 1339 return TRUE;
252b5132
RH
1340
1341 error_return:
1342 if (dynbuf != NULL)
1343 free (dynbuf);
b34976b6 1344 return FALSE;
252b5132
RH
1345}
1346
1347/* Display ELF-specific fields of a symbol. */
1348
1349void
217aa764
AM
1350bfd_elf_print_symbol (bfd *abfd,
1351 void *filep,
1352 asymbol *symbol,
1353 bfd_print_symbol_type how)
252b5132 1354{
217aa764 1355 FILE *file = filep;
252b5132
RH
1356 switch (how)
1357 {
1358 case bfd_print_symbol_name:
1359 fprintf (file, "%s", symbol->name);
1360 break;
1361 case bfd_print_symbol_more:
1362 fprintf (file, "elf ");
60b89a18 1363 bfd_fprintf_vma (abfd, file, symbol->value);
252b5132
RH
1364 fprintf (file, " %lx", (long) symbol->flags);
1365 break;
1366 case bfd_print_symbol_all:
1367 {
4e8a9624
AM
1368 const char *section_name;
1369 const char *name = NULL;
9c5bfbb7 1370 const struct elf_backend_data *bed;
7a13edea 1371 unsigned char st_other;
dbb410c3 1372 bfd_vma val;
c044fabd 1373
252b5132 1374 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1375
1376 bed = get_elf_backend_data (abfd);
1377 if (bed->elf_backend_print_symbol_all)
c044fabd 1378 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1379
1380 if (name == NULL)
1381 {
7ee38065 1382 name = symbol->name;
217aa764 1383 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1384 }
1385
252b5132
RH
1386 fprintf (file, " %s\t", section_name);
1387 /* Print the "other" value for a symbol. For common symbols,
1388 we've already printed the size; now print the alignment.
1389 For other symbols, we have no specified alignment, and
1390 we've printed the address; now print the size. */
dcf6c779 1391 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1392 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1393 else
1394 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1395 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1396
1397 /* If we have version information, print it. */
1398 if (elf_tdata (abfd)->dynversym_section != 0
1399 && (elf_tdata (abfd)->dynverdef_section != 0
1400 || elf_tdata (abfd)->dynverref_section != 0))
1401 {
1402 unsigned int vernum;
1403 const char *version_string;
1404
1405 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1406
1407 if (vernum == 0)
1408 version_string = "";
1409 else if (vernum == 1)
1410 version_string = "Base";
1411 else if (vernum <= elf_tdata (abfd)->cverdefs)
1412 version_string =
1413 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1414 else
1415 {
1416 Elf_Internal_Verneed *t;
1417
1418 version_string = "";
1419 for (t = elf_tdata (abfd)->verref;
1420 t != NULL;
1421 t = t->vn_nextref)
1422 {
1423 Elf_Internal_Vernaux *a;
1424
1425 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1426 {
1427 if (a->vna_other == vernum)
1428 {
1429 version_string = a->vna_nodename;
1430 break;
1431 }
1432 }
1433 }
1434 }
1435
1436 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1437 fprintf (file, " %-11s", version_string);
1438 else
1439 {
1440 int i;
1441
1442 fprintf (file, " (%s)", version_string);
1443 for (i = 10 - strlen (version_string); i > 0; --i)
1444 putc (' ', file);
1445 }
1446 }
1447
1448 /* If the st_other field is not zero, print it. */
7a13edea 1449 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1450
7a13edea
NC
1451 switch (st_other)
1452 {
1453 case 0: break;
1454 case STV_INTERNAL: fprintf (file, " .internal"); break;
1455 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1456 case STV_PROTECTED: fprintf (file, " .protected"); break;
1457 default:
1458 /* Some other non-defined flags are also present, so print
1459 everything hex. */
1460 fprintf (file, " 0x%02x", (unsigned int) st_other);
1461 }
252b5132 1462
587ff49e 1463 fprintf (file, " %s", name);
252b5132
RH
1464 }
1465 break;
1466 }
1467}
252b5132 1468
252b5132
RH
1469/* Allocate an ELF string table--force the first byte to be zero. */
1470
1471struct bfd_strtab_hash *
217aa764 1472_bfd_elf_stringtab_init (void)
252b5132
RH
1473{
1474 struct bfd_strtab_hash *ret;
1475
1476 ret = _bfd_stringtab_init ();
1477 if (ret != NULL)
1478 {
1479 bfd_size_type loc;
1480
b34976b6 1481 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1482 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1483 if (loc == (bfd_size_type) -1)
1484 {
1485 _bfd_stringtab_free (ret);
1486 ret = NULL;
1487 }
1488 }
1489 return ret;
1490}
1491\f
1492/* ELF .o/exec file reading */
1493
c044fabd 1494/* Create a new bfd section from an ELF section header. */
252b5132 1495
b34976b6 1496bfd_boolean
217aa764 1497bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132
RH
1498{
1499 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
1500 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
9c5bfbb7 1501 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
90937f86 1502 const char *name;
252b5132 1503
1b3a8575
AM
1504 name = bfd_elf_string_from_elf_section (abfd,
1505 elf_elfheader (abfd)->e_shstrndx,
1506 hdr->sh_name);
933d961a
JJ
1507 if (name == NULL)
1508 return FALSE;
252b5132
RH
1509
1510 switch (hdr->sh_type)
1511 {
1512 case SHT_NULL:
1513 /* Inactive section. Throw it away. */
b34976b6 1514 return TRUE;
252b5132
RH
1515
1516 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1517 case SHT_NOBITS: /* .bss section. */
1518 case SHT_HASH: /* .hash section. */
1519 case SHT_NOTE: /* .note section. */
25e27870
L
1520 case SHT_INIT_ARRAY: /* .init_array section. */
1521 case SHT_FINI_ARRAY: /* .fini_array section. */
1522 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1523 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1524 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1525 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1526
797fc050 1527 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1528 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1529 return FALSE;
8e0ed13f
NC
1530 if (hdr->sh_link > elf_numsections (abfd)
1531 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1532 return FALSE;
797fc050
AM
1533 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1534 {
1535 Elf_Internal_Shdr *dynsymhdr;
1536
1537 /* The shared libraries distributed with hpux11 have a bogus
1538 sh_link field for the ".dynamic" section. Find the
1539 string table for the ".dynsym" section instead. */
1540 if (elf_dynsymtab (abfd) != 0)
1541 {
1542 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1543 hdr->sh_link = dynsymhdr->sh_link;
1544 }
1545 else
1546 {
1547 unsigned int i, num_sec;
1548
1549 num_sec = elf_numsections (abfd);
1550 for (i = 1; i < num_sec; i++)
1551 {
1552 dynsymhdr = elf_elfsections (abfd)[i];
1553 if (dynsymhdr->sh_type == SHT_DYNSYM)
1554 {
1555 hdr->sh_link = dynsymhdr->sh_link;
1556 break;
1557 }
1558 }
1559 }
1560 }
1561 break;
1562
252b5132
RH
1563 case SHT_SYMTAB: /* A symbol table */
1564 if (elf_onesymtab (abfd) == shindex)
b34976b6 1565 return TRUE;
252b5132 1566
a50b2160
JJ
1567 if (hdr->sh_entsize != bed->s->sizeof_sym)
1568 return FALSE;
252b5132
RH
1569 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1570 elf_onesymtab (abfd) = shindex;
1571 elf_tdata (abfd)->symtab_hdr = *hdr;
1572 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1573 abfd->flags |= HAS_SYMS;
1574
1575 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1576 SHF_ALLOC is set, and this is a shared object, then we also
1577 treat this section as a BFD section. We can not base the
1578 decision purely on SHF_ALLOC, because that flag is sometimes
1579 set in a relocatable object file, which would confuse the
1580 linker. */
252b5132
RH
1581 if ((hdr->sh_flags & SHF_ALLOC) != 0
1582 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1583 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1584 shindex))
b34976b6 1585 return FALSE;
252b5132 1586
1b3a8575
AM
1587 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1588 can't read symbols without that section loaded as well. It
1589 is most likely specified by the next section header. */
1590 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1591 {
1592 unsigned int i, num_sec;
1593
1594 num_sec = elf_numsections (abfd);
1595 for (i = shindex + 1; i < num_sec; i++)
1596 {
1597 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1598 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1599 && hdr2->sh_link == shindex)
1600 break;
1601 }
1602 if (i == num_sec)
1603 for (i = 1; i < shindex; i++)
1604 {
1605 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1606 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1607 && hdr2->sh_link == shindex)
1608 break;
1609 }
1610 if (i != shindex)
1611 return bfd_section_from_shdr (abfd, i);
1612 }
b34976b6 1613 return TRUE;
252b5132
RH
1614
1615 case SHT_DYNSYM: /* A dynamic symbol table */
1616 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1617 return TRUE;
252b5132 1618
a50b2160
JJ
1619 if (hdr->sh_entsize != bed->s->sizeof_sym)
1620 return FALSE;
252b5132
RH
1621 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1622 elf_dynsymtab (abfd) = shindex;
1623 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1624 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1625 abfd->flags |= HAS_SYMS;
1626
1627 /* Besides being a symbol table, we also treat this as a regular
1628 section, so that objcopy can handle it. */
6dc132d9 1629 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1630
9ad5cbcf
AM
1631 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1632 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1633 return TRUE;
9ad5cbcf 1634
1b3a8575 1635 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1636 elf_symtab_shndx (abfd) = shindex;
1637 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1638 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1639 return TRUE;
9ad5cbcf 1640
252b5132
RH
1641 case SHT_STRTAB: /* A string table */
1642 if (hdr->bfd_section != NULL)
b34976b6 1643 return TRUE;
252b5132
RH
1644 if (ehdr->e_shstrndx == shindex)
1645 {
1646 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1647 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1648 return TRUE;
252b5132 1649 }
1b3a8575
AM
1650 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1651 {
1652 symtab_strtab:
1653 elf_tdata (abfd)->strtab_hdr = *hdr;
1654 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1655 return TRUE;
1656 }
1657 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1658 {
1659 dynsymtab_strtab:
1660 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1661 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1662 elf_elfsections (abfd)[shindex] = hdr;
1663 /* We also treat this as a regular section, so that objcopy
1664 can handle it. */
6dc132d9
L
1665 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1666 shindex);
1b3a8575 1667 }
252b5132 1668
1b3a8575
AM
1669 /* If the string table isn't one of the above, then treat it as a
1670 regular section. We need to scan all the headers to be sure,
1671 just in case this strtab section appeared before the above. */
1672 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1673 {
1674 unsigned int i, num_sec;
252b5132 1675
1b3a8575
AM
1676 num_sec = elf_numsections (abfd);
1677 for (i = 1; i < num_sec; i++)
1678 {
1679 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1680 if (hdr2->sh_link == shindex)
1681 {
933d961a
JJ
1682 /* Prevent endless recursion on broken objects. */
1683 if (i == shindex)
1684 return FALSE;
1b3a8575
AM
1685 if (! bfd_section_from_shdr (abfd, i))
1686 return FALSE;
1687 if (elf_onesymtab (abfd) == i)
1688 goto symtab_strtab;
1689 if (elf_dynsymtab (abfd) == i)
1690 goto dynsymtab_strtab;
1691 }
1692 }
1693 }
6dc132d9 1694 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1695
1696 case SHT_REL:
1697 case SHT_RELA:
1698 /* *These* do a lot of work -- but build no sections! */
1699 {
1700 asection *target_sect;
1701 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1702 unsigned int num_sec = elf_numsections (abfd);
252b5132 1703
aa2ca951
JJ
1704 if (hdr->sh_entsize
1705 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1706 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1707 return FALSE;
1708
03ae5f59 1709 /* Check for a bogus link to avoid crashing. */
9ad5cbcf
AM
1710 if ((hdr->sh_link >= SHN_LORESERVE && hdr->sh_link <= SHN_HIRESERVE)
1711 || hdr->sh_link >= num_sec)
03ae5f59
ILT
1712 {
1713 ((*_bfd_error_handler)
d003868e
AM
1714 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1715 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1716 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1717 shindex);
03ae5f59
ILT
1718 }
1719
252b5132
RH
1720 /* For some incomprehensible reason Oracle distributes
1721 libraries for Solaris in which some of the objects have
1722 bogus sh_link fields. It would be nice if we could just
1723 reject them, but, unfortunately, some people need to use
1724 them. We scan through the section headers; if we find only
1725 one suitable symbol table, we clobber the sh_link to point
1726 to it. I hope this doesn't break anything. */
1727 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1728 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1729 {
9ad5cbcf 1730 unsigned int scan;
252b5132
RH
1731 int found;
1732
1733 found = 0;
9ad5cbcf 1734 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1735 {
1736 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1737 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1738 {
1739 if (found != 0)
1740 {
1741 found = 0;
1742 break;
1743 }
1744 found = scan;
1745 }
1746 }
1747 if (found != 0)
1748 hdr->sh_link = found;
1749 }
1750
1751 /* Get the symbol table. */
1b3a8575
AM
1752 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1753 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1754 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1755 return FALSE;
252b5132
RH
1756
1757 /* If this reloc section does not use the main symbol table we
1758 don't treat it as a reloc section. BFD can't adequately
1759 represent such a section, so at least for now, we don't
c044fabd 1760 try. We just present it as a normal section. We also
60bcf0fa 1761 can't use it as a reloc section if it points to the null
185ef66d
AM
1762 section, an invalid section, or another reloc section. */
1763 if (hdr->sh_link != elf_onesymtab (abfd)
1764 || hdr->sh_info == SHN_UNDEF
1765 || (hdr->sh_info >= SHN_LORESERVE && hdr->sh_info <= SHN_HIRESERVE)
1766 || hdr->sh_info >= num_sec
1767 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1768 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1769 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1770 shindex);
252b5132
RH
1771
1772 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1773 return FALSE;
252b5132
RH
1774 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1775 if (target_sect == NULL)
b34976b6 1776 return FALSE;
252b5132
RH
1777
1778 if ((target_sect->flags & SEC_RELOC) == 0
1779 || target_sect->reloc_count == 0)
1780 hdr2 = &elf_section_data (target_sect)->rel_hdr;
1781 else
1782 {
dc810e39 1783 bfd_size_type amt;
252b5132 1784 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 1785 amt = sizeof (*hdr2);
217aa764 1786 hdr2 = bfd_alloc (abfd, amt);
14b1c01e
AM
1787 if (hdr2 == NULL)
1788 return FALSE;
252b5132
RH
1789 elf_section_data (target_sect)->rel_hdr2 = hdr2;
1790 }
1791 *hdr2 = *hdr;
1792 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1793 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1794 target_sect->flags |= SEC_RELOC;
1795 target_sect->relocation = NULL;
1796 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1797 /* In the section to which the relocations apply, mark whether
1798 its relocations are of the REL or RELA variety. */
72730e0c 1799 if (hdr->sh_size != 0)
68bfbfcc 1800 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 1801 abfd->flags |= HAS_RELOC;
b34976b6 1802 return TRUE;
252b5132 1803 }
252b5132
RH
1804
1805 case SHT_GNU_verdef:
1806 elf_dynverdef (abfd) = shindex;
1807 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1808 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1809
1810 case SHT_GNU_versym:
a50b2160
JJ
1811 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1812 return FALSE;
252b5132
RH
1813 elf_dynversym (abfd) = shindex;
1814 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1815 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1816
1817 case SHT_GNU_verneed:
1818 elf_dynverref (abfd) = shindex;
1819 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1820 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1821
1822 case SHT_SHLIB:
b34976b6 1823 return TRUE;
252b5132 1824
dbb410c3 1825 case SHT_GROUP:
b885599b
AM
1826 /* We need a BFD section for objcopy and relocatable linking,
1827 and it's handy to have the signature available as the section
1828 name. */
1783205a 1829 if (! IS_VALID_GROUP_SECTION_HEADER (hdr))
a50b2160 1830 return FALSE;
b885599b
AM
1831 name = group_signature (abfd, hdr);
1832 if (name == NULL)
b34976b6 1833 return FALSE;
6dc132d9 1834 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1835 return FALSE;
dbb410c3
AM
1836 if (hdr->contents != NULL)
1837 {
1838 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1839 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1840 asection *s;
1841
b885599b
AM
1842 if (idx->flags & GRP_COMDAT)
1843 hdr->bfd_section->flags
1844 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1845
45c5e9ed
L
1846 /* We try to keep the same section order as it comes in. */
1847 idx += n_elt;
dbb410c3 1848 while (--n_elt != 0)
1783205a
NC
1849 {
1850 --idx;
1851
1852 if (idx->shdr != NULL
1853 && (s = idx->shdr->bfd_section) != NULL
1854 && elf_next_in_group (s) != NULL)
1855 {
1856 elf_next_in_group (hdr->bfd_section) = s;
1857 break;
1858 }
1859 }
dbb410c3
AM
1860 }
1861 break;
1862
252b5132 1863 default:
104d59d1
JM
1864 /* Possibly an attributes section. */
1865 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1866 || hdr->sh_type == bed->obj_attrs_section_type)
1867 {
1868 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1869 return FALSE;
1870 _bfd_elf_parse_attributes (abfd, hdr);
1871 return TRUE;
1872 }
1873
252b5132 1874 /* Check for any processor-specific section types. */
3eb70a79
L
1875 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1876 return TRUE;
1877
1878 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1879 {
1880 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1881 /* FIXME: How to properly handle allocated section reserved
1882 for applications? */
1883 (*_bfd_error_handler)
1884 (_("%B: don't know how to handle allocated, application "
1885 "specific section `%s' [0x%8x]"),
1886 abfd, name, hdr->sh_type);
1887 else
1888 /* Allow sections reserved for applications. */
1889 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1890 shindex);
1891 }
1892 else if (hdr->sh_type >= SHT_LOPROC
1893 && hdr->sh_type <= SHT_HIPROC)
1894 /* FIXME: We should handle this section. */
1895 (*_bfd_error_handler)
1896 (_("%B: don't know how to handle processor specific section "
1897 "`%s' [0x%8x]"),
1898 abfd, name, hdr->sh_type);
1899 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1900 {
1901 /* Unrecognised OS-specific sections. */
1902 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1903 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1904 required to correctly process the section and the file should
ff15b240
NC
1905 be rejected with an error message. */
1906 (*_bfd_error_handler)
1907 (_("%B: don't know how to handle OS specific section "
1908 "`%s' [0x%8x]"),
1909 abfd, name, hdr->sh_type);
1910 else
1911 /* Otherwise it should be processed. */
1912 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1913 }
3eb70a79
L
1914 else
1915 /* FIXME: We should handle this section. */
1916 (*_bfd_error_handler)
1917 (_("%B: don't know how to handle section `%s' [0x%8x]"),
1918 abfd, name, hdr->sh_type);
1919
1920 return FALSE;
252b5132
RH
1921 }
1922
b34976b6 1923 return TRUE;
252b5132
RH
1924}
1925
ec338859
AM
1926/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
1927 Return SEC for sections that have no elf section, and NULL on error. */
1928
1929asection *
217aa764
AM
1930bfd_section_from_r_symndx (bfd *abfd,
1931 struct sym_sec_cache *cache,
1932 asection *sec,
1933 unsigned long r_symndx)
ec338859 1934{
ec338859 1935 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
a5d1b3b5 1936 asection *s;
ec338859 1937
a5d1b3b5
AM
1938 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
1939 {
1940 Elf_Internal_Shdr *symtab_hdr;
1941 unsigned char esym[sizeof (Elf64_External_Sym)];
1942 Elf_External_Sym_Shndx eshndx;
1943 Elf_Internal_Sym isym;
ec338859 1944
a5d1b3b5
AM
1945 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1946 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
1947 &isym, esym, &eshndx) == NULL)
1948 return NULL;
9ad5cbcf 1949
a5d1b3b5
AM
1950 if (cache->abfd != abfd)
1951 {
1952 memset (cache->indx, -1, sizeof (cache->indx));
1953 cache->abfd = abfd;
1954 }
1955 cache->indx[ent] = r_symndx;
1956 cache->shndx[ent] = isym.st_shndx;
ec338859 1957 }
a5d1b3b5
AM
1958
1959 s = bfd_section_from_elf_index (abfd, cache->shndx[ent]);
1960 if (s != NULL)
1961 return s;
1962
1963 return sec;
ec338859
AM
1964}
1965
252b5132
RH
1966/* Given an ELF section number, retrieve the corresponding BFD
1967 section. */
1968
1969asection *
217aa764 1970bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 1971{
9ad5cbcf 1972 if (index >= elf_numsections (abfd))
252b5132
RH
1973 return NULL;
1974 return elf_elfsections (abfd)[index]->bfd_section;
1975}
1976
b35d266b 1977static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 1978{
0112cd26
NC
1979 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1980 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1981};
1982
b35d266b 1983static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 1984{
0112cd26
NC
1985 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1986 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1987};
1988
b35d266b 1989static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 1990{
0112cd26
NC
1991 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1992 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1993 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
1994 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
1995 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
1996 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
1997 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
1998 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
1999 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2000 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2001 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2002};
2003
b35d266b 2004static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2005{
0112cd26
NC
2006 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2007 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2008 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2009};
2010
b35d266b 2011static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2012{
0112cd26
NC
2013 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2014 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2015 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2016 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2017 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2018 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2019 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2020 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2021 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2022};
2023
b35d266b 2024static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2025{
0112cd26
NC
2026 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2027 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2028};
2029
b35d266b 2030static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2031{
0112cd26
NC
2032 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2033 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2034 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2035 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2036};
2037
b35d266b 2038static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2039{
0112cd26
NC
2040 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2041 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2042};
2043
b35d266b 2044static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2045{
0112cd26
NC
2046 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2047 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2048 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2049};
2050
b35d266b 2051static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2052{
0112cd26
NC
2053 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2054 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2055 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2056};
2057
b35d266b 2058static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2059{
0112cd26
NC
2060 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2061 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2062 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2063 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2064 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2065};
2066
b35d266b 2067static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2068{
0112cd26
NC
2069 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2070 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2071 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2072 /* See struct bfd_elf_special_section declaration for the semantics of
2073 this special case where .prefix_length != strlen (.prefix). */
2074 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2075 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2076};
2077
b35d266b 2078static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2079{
0112cd26
NC
2080 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2081 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2082 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2083 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2084};
2085
b35d266b 2086static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2087{
7f4d3958 2088 special_sections_b, /* 'b' */
98ece1b3 2089 special_sections_c, /* 'c' */
7f4d3958
L
2090 special_sections_d, /* 'd' */
2091 NULL, /* 'e' */
2092 special_sections_f, /* 'f' */
2093 special_sections_g, /* 'g' */
2094 special_sections_h, /* 'h' */
2095 special_sections_i, /* 'i' */
2096 NULL, /* 'j' */
2097 NULL, /* 'k' */
2098 special_sections_l, /* 'l' */
2099 NULL, /* 'm' */
2100 special_sections_n, /* 'n' */
2101 NULL, /* 'o' */
2102 special_sections_p, /* 'p' */
2103 NULL, /* 'q' */
2104 special_sections_r, /* 'r' */
2105 special_sections_s, /* 's' */
2106 special_sections_t, /* 't' */
7f4d3958
L
2107};
2108
551b43fd
AM
2109const struct bfd_elf_special_section *
2110_bfd_elf_get_special_section (const char *name,
2111 const struct bfd_elf_special_section *spec,
2112 unsigned int rela)
2f89ff8d
L
2113{
2114 int i;
7f4d3958 2115 int len;
7f4d3958 2116
551b43fd 2117 len = strlen (name);
7f4d3958 2118
551b43fd 2119 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2120 {
2121 int suffix_len;
551b43fd 2122 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2123
2124 if (len < prefix_len)
2125 continue;
551b43fd 2126 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2127 continue;
2128
551b43fd 2129 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2130 if (suffix_len <= 0)
2131 {
2132 if (name[prefix_len] != 0)
2133 {
2134 if (suffix_len == 0)
2135 continue;
2136 if (name[prefix_len] != '.'
2137 && (suffix_len == -2
551b43fd 2138 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2139 continue;
2140 }
2141 }
2142 else
2143 {
2144 if (len < prefix_len + suffix_len)
2145 continue;
2146 if (memcmp (name + len - suffix_len,
551b43fd 2147 spec[i].prefix + prefix_len,
7dcb9820
AM
2148 suffix_len) != 0)
2149 continue;
2150 }
551b43fd 2151 return &spec[i];
7dcb9820 2152 }
2f89ff8d
L
2153
2154 return NULL;
2155}
2156
7dcb9820 2157const struct bfd_elf_special_section *
29ef7005 2158_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2159{
551b43fd
AM
2160 int i;
2161 const struct bfd_elf_special_section *spec;
29ef7005 2162 const struct elf_backend_data *bed;
2f89ff8d
L
2163
2164 /* See if this is one of the special sections. */
551b43fd
AM
2165 if (sec->name == NULL)
2166 return NULL;
2f89ff8d 2167
29ef7005
L
2168 bed = get_elf_backend_data (abfd);
2169 spec = bed->special_sections;
2170 if (spec)
2171 {
2172 spec = _bfd_elf_get_special_section (sec->name,
2173 bed->special_sections,
2174 sec->use_rela_p);
2175 if (spec != NULL)
2176 return spec;
2177 }
2178
551b43fd
AM
2179 if (sec->name[0] != '.')
2180 return NULL;
2f89ff8d 2181
551b43fd
AM
2182 i = sec->name[1] - 'b';
2183 if (i < 0 || i > 't' - 'b')
2184 return NULL;
2185
2186 spec = special_sections[i];
2f89ff8d 2187
551b43fd
AM
2188 if (spec == NULL)
2189 return NULL;
2190
2191 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2192}
2193
b34976b6 2194bfd_boolean
217aa764 2195_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2196{
2197 struct bfd_elf_section_data *sdata;
551b43fd 2198 const struct elf_backend_data *bed;
7dcb9820 2199 const struct bfd_elf_special_section *ssect;
252b5132 2200
f0abc2a1
AM
2201 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2202 if (sdata == NULL)
2203 {
217aa764 2204 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2205 if (sdata == NULL)
2206 return FALSE;
217aa764 2207 sec->used_by_bfd = sdata;
f0abc2a1 2208 }
bf572ba0 2209
551b43fd
AM
2210 /* Indicate whether or not this section should use RELA relocations. */
2211 bed = get_elf_backend_data (abfd);
2212 sec->use_rela_p = bed->default_use_rela_p;
2213
e843e0f8
L
2214 /* When we read a file, we don't need to set ELF section type and
2215 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2216 anyway. We will set ELF section type and flags for all linker
2217 created sections. If user specifies BFD section flags, we will
2218 set ELF section type and flags based on BFD section flags in
2219 elf_fake_sections. */
2220 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2221 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2222 {
551b43fd 2223 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2224 if (ssect != NULL)
2225 {
2226 elf_section_type (sec) = ssect->type;
2227 elf_section_flags (sec) = ssect->attr;
2228 }
2f89ff8d
L
2229 }
2230
f592407e 2231 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2232}
2233
2234/* Create a new bfd section from an ELF program header.
2235
2236 Since program segments have no names, we generate a synthetic name
2237 of the form segment<NUM>, where NUM is generally the index in the
2238 program header table. For segments that are split (see below) we
2239 generate the names segment<NUM>a and segment<NUM>b.
2240
2241 Note that some program segments may have a file size that is different than
2242 (less than) the memory size. All this means is that at execution the
2243 system must allocate the amount of memory specified by the memory size,
2244 but only initialize it with the first "file size" bytes read from the
2245 file. This would occur for example, with program segments consisting
2246 of combined data+bss.
2247
2248 To handle the above situation, this routine generates TWO bfd sections
2249 for the single program segment. The first has the length specified by
2250 the file size of the segment, and the second has the length specified
2251 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2252 into its initialized and uninitialized parts.
252b5132
RH
2253
2254 */
2255
b34976b6 2256bfd_boolean
217aa764
AM
2257_bfd_elf_make_section_from_phdr (bfd *abfd,
2258 Elf_Internal_Phdr *hdr,
2259 int index,
2260 const char *typename)
252b5132
RH
2261{
2262 asection *newsect;
2263 char *name;
2264 char namebuf[64];
d4c88bbb 2265 size_t len;
252b5132
RH
2266 int split;
2267
2268 split = ((hdr->p_memsz > 0)
2269 && (hdr->p_filesz > 0)
2270 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2271
2272 if (hdr->p_filesz > 0)
252b5132 2273 {
d5191d0c
AM
2274 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
2275 len = strlen (namebuf) + 1;
2276 name = bfd_alloc (abfd, len);
2277 if (!name)
2278 return FALSE;
2279 memcpy (name, namebuf, len);
2280 newsect = bfd_make_section (abfd, name);
2281 if (newsect == NULL)
2282 return FALSE;
2283 newsect->vma = hdr->p_vaddr;
2284 newsect->lma = hdr->p_paddr;
2285 newsect->size = hdr->p_filesz;
2286 newsect->filepos = hdr->p_offset;
2287 newsect->flags |= SEC_HAS_CONTENTS;
2288 newsect->alignment_power = bfd_log2 (hdr->p_align);
2289 if (hdr->p_type == PT_LOAD)
252b5132 2290 {
d5191d0c
AM
2291 newsect->flags |= SEC_ALLOC;
2292 newsect->flags |= SEC_LOAD;
2293 if (hdr->p_flags & PF_X)
2294 {
2295 /* FIXME: all we known is that it has execute PERMISSION,
2296 may be data. */
2297 newsect->flags |= SEC_CODE;
2298 }
2299 }
2300 if (!(hdr->p_flags & PF_W))
2301 {
2302 newsect->flags |= SEC_READONLY;
252b5132 2303 }
252b5132
RH
2304 }
2305
d5191d0c 2306 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2307 {
d5191d0c
AM
2308 bfd_vma align;
2309
2310 sprintf (namebuf, "%s%d%s", typename, index, split ? "b" : "");
d4c88bbb 2311 len = strlen (namebuf) + 1;
217aa764 2312 name = bfd_alloc (abfd, len);
252b5132 2313 if (!name)
b34976b6 2314 return FALSE;
d4c88bbb 2315 memcpy (name, namebuf, len);
252b5132
RH
2316 newsect = bfd_make_section (abfd, name);
2317 if (newsect == NULL)
b34976b6 2318 return FALSE;
252b5132
RH
2319 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2320 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2321 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2322 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2323 align = newsect->vma & -newsect->vma;
2324 if (align == 0 || align > hdr->p_align)
2325 align = hdr->p_align;
2326 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2327 if (hdr->p_type == PT_LOAD)
2328 {
d5191d0c
AM
2329 /* Hack for gdb. Segments that have not been modified do
2330 not have their contents written to a core file, on the
2331 assumption that a debugger can find the contents in the
2332 executable. We flag this case by setting the fake
2333 section size to zero. Note that "real" bss sections will
2334 always have their contents dumped to the core file. */
2335 if (bfd_get_format (abfd) == bfd_core)
2336 newsect->size = 0;
252b5132
RH
2337 newsect->flags |= SEC_ALLOC;
2338 if (hdr->p_flags & PF_X)
2339 newsect->flags |= SEC_CODE;
2340 }
2341 if (!(hdr->p_flags & PF_W))
2342 newsect->flags |= SEC_READONLY;
2343 }
2344
b34976b6 2345 return TRUE;
252b5132
RH
2346}
2347
b34976b6 2348bfd_boolean
217aa764 2349bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2350{
9c5bfbb7 2351 const struct elf_backend_data *bed;
20cfcaae
NC
2352
2353 switch (hdr->p_type)
2354 {
2355 case PT_NULL:
2356 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2357
2358 case PT_LOAD:
2359 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2360
2361 case PT_DYNAMIC:
2362 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2363
2364 case PT_INTERP:
2365 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2366
2367 case PT_NOTE:
2368 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2369 return FALSE;
718175fa 2370 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2371 return FALSE;
2372 return TRUE;
20cfcaae
NC
2373
2374 case PT_SHLIB:
2375 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2376
2377 case PT_PHDR:
2378 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2379
811072d8
RM
2380 case PT_GNU_EH_FRAME:
2381 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2382 "eh_frame_hdr");
2383
2b05f1b7
L
2384 case PT_GNU_STACK:
2385 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
9ee5e499 2386
8c37241b
JJ
2387 case PT_GNU_RELRO:
2388 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2389
20cfcaae 2390 default:
8c1acd09 2391 /* Check for any processor-specific program segment types. */
20cfcaae 2392 bed = get_elf_backend_data (abfd);
d27f5fa1 2393 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2394 }
2395}
2396
23bc299b 2397/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2398 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2399 relocations; otherwise, we use REL relocations. */
2400
b34976b6 2401bfd_boolean
217aa764
AM
2402_bfd_elf_init_reloc_shdr (bfd *abfd,
2403 Elf_Internal_Shdr *rel_hdr,
2404 asection *asect,
2405 bfd_boolean use_rela_p)
23bc299b
MM
2406{
2407 char *name;
9c5bfbb7 2408 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2409 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2410
dc810e39 2411 name = bfd_alloc (abfd, amt);
23bc299b 2412 if (name == NULL)
b34976b6 2413 return FALSE;
23bc299b
MM
2414 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2415 rel_hdr->sh_name =
2b0f7ef9 2416 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2417 FALSE);
23bc299b 2418 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2419 return FALSE;
23bc299b
MM
2420 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2421 rel_hdr->sh_entsize = (use_rela_p
2422 ? bed->s->sizeof_rela
2423 : bed->s->sizeof_rel);
45d6a902 2424 rel_hdr->sh_addralign = 1 << bed->s->log_file_align;
23bc299b
MM
2425 rel_hdr->sh_flags = 0;
2426 rel_hdr->sh_addr = 0;
2427 rel_hdr->sh_size = 0;
2428 rel_hdr->sh_offset = 0;
2429
b34976b6 2430 return TRUE;
23bc299b
MM
2431}
2432
252b5132
RH
2433/* Set up an ELF internal section header for a section. */
2434
252b5132 2435static void
217aa764 2436elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2437{
9c5bfbb7 2438 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2439 bfd_boolean *failedptr = failedptrarg;
252b5132 2440 Elf_Internal_Shdr *this_hdr;
0414f35b 2441 unsigned int sh_type;
252b5132
RH
2442
2443 if (*failedptr)
2444 {
2445 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2446 loop. */
252b5132
RH
2447 return;
2448 }
2449
2450 this_hdr = &elf_section_data (asect)->this_hdr;
2451
e57b5356
AM
2452 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2453 asect->name, FALSE);
2454 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2455 {
b34976b6 2456 *failedptr = TRUE;
252b5132
RH
2457 return;
2458 }
2459
a4d8e49b 2460 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2461
2462 if ((asect->flags & SEC_ALLOC) != 0
2463 || asect->user_set_vma)
2464 this_hdr->sh_addr = asect->vma;
2465 else
2466 this_hdr->sh_addr = 0;
2467
2468 this_hdr->sh_offset = 0;
eea6121a 2469 this_hdr->sh_size = asect->size;
252b5132
RH
2470 this_hdr->sh_link = 0;
2471 this_hdr->sh_addralign = 1 << asect->alignment_power;
2472 /* The sh_entsize and sh_info fields may have been set already by
2473 copy_private_section_data. */
2474
2475 this_hdr->bfd_section = asect;
2476 this_hdr->contents = NULL;
2477
3cddba1e
L
2478 /* If the section type is unspecified, we set it based on
2479 asect->flags. */
98ece1b3
AM
2480 if ((asect->flags & SEC_GROUP) != 0)
2481 sh_type = SHT_GROUP;
2482 else if ((asect->flags & SEC_ALLOC) != 0
2483 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2484 || (asect->flags & SEC_NEVER_LOAD) != 0))
2485 sh_type = SHT_NOBITS;
2486 else
2487 sh_type = SHT_PROGBITS;
2488
3cddba1e 2489 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2490 this_hdr->sh_type = sh_type;
2491 else if (this_hdr->sh_type == SHT_NOBITS
2492 && sh_type == SHT_PROGBITS
2493 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2494 {
98ece1b3
AM
2495 /* Warn if we are changing a NOBITS section to PROGBITS, but
2496 allow the link to proceed. This can happen when users link
2497 non-bss input sections to bss output sections, or emit data
2498 to a bss output section via a linker script. */
2499 (*_bfd_error_handler)
58f0869b 2500 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2501 this_hdr->sh_type = sh_type;
3cddba1e
L
2502 }
2503
2f89ff8d 2504 switch (this_hdr->sh_type)
252b5132 2505 {
2f89ff8d 2506 default:
2f89ff8d
L
2507 break;
2508
2509 case SHT_STRTAB:
2510 case SHT_INIT_ARRAY:
2511 case SHT_FINI_ARRAY:
2512 case SHT_PREINIT_ARRAY:
2513 case SHT_NOTE:
2514 case SHT_NOBITS:
2515 case SHT_PROGBITS:
2516 break;
2517
2518 case SHT_HASH:
c7ac6ff8 2519 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2520 break;
5de3bf90 2521
2f89ff8d 2522 case SHT_DYNSYM:
252b5132 2523 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2524 break;
2525
2526 case SHT_DYNAMIC:
252b5132 2527 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2528 break;
2529
2530 case SHT_RELA:
2531 if (get_elf_backend_data (abfd)->may_use_rela_p)
2532 this_hdr->sh_entsize = bed->s->sizeof_rela;
2533 break;
2534
2535 case SHT_REL:
2536 if (get_elf_backend_data (abfd)->may_use_rel_p)
2537 this_hdr->sh_entsize = bed->s->sizeof_rel;
2538 break;
2539
2540 case SHT_GNU_versym:
252b5132 2541 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2542 break;
2543
2544 case SHT_GNU_verdef:
252b5132
RH
2545 this_hdr->sh_entsize = 0;
2546 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2547 cverdefs. The linker will set cverdefs, but sh_info will be
2548 zero. */
252b5132
RH
2549 if (this_hdr->sh_info == 0)
2550 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2551 else
2552 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2553 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2554 break;
2555
2556 case SHT_GNU_verneed:
252b5132
RH
2557 this_hdr->sh_entsize = 0;
2558 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2559 cverrefs. The linker will set cverrefs, but sh_info will be
2560 zero. */
252b5132
RH
2561 if (this_hdr->sh_info == 0)
2562 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2563 else
2564 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2565 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2566 break;
2567
2568 case SHT_GROUP:
1783205a 2569 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2570 break;
fdc90cb4
JJ
2571
2572 case SHT_GNU_HASH:
2573 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2574 break;
dbb410c3 2575 }
252b5132
RH
2576
2577 if ((asect->flags & SEC_ALLOC) != 0)
2578 this_hdr->sh_flags |= SHF_ALLOC;
2579 if ((asect->flags & SEC_READONLY) == 0)
2580 this_hdr->sh_flags |= SHF_WRITE;
2581 if ((asect->flags & SEC_CODE) != 0)
2582 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2583 if ((asect->flags & SEC_MERGE) != 0)
2584 {
2585 this_hdr->sh_flags |= SHF_MERGE;
2586 this_hdr->sh_entsize = asect->entsize;
2587 if ((asect->flags & SEC_STRINGS) != 0)
2588 this_hdr->sh_flags |= SHF_STRINGS;
2589 }
1126897b 2590 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2591 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2592 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2593 {
2594 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2595 if (asect->size == 0
2596 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2597 {
3a800eb9 2598 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2599
704afa60 2600 this_hdr->sh_size = 0;
3a800eb9
AM
2601 if (o != NULL)
2602 {
704afa60 2603 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2604 if (this_hdr->sh_size != 0)
2605 this_hdr->sh_type = SHT_NOBITS;
2606 }
704afa60
JJ
2607 }
2608 }
252b5132
RH
2609
2610 /* Check for processor-specific section types. */
0414f35b 2611 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2612 if (bed->elf_backend_fake_sections
2613 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2614 *failedptr = TRUE;
252b5132 2615
42bb2e33 2616 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2617 {
2618 /* Don't change the header type from NOBITS if we are being
42bb2e33 2619 called for objcopy --only-keep-debug. */
0414f35b
AM
2620 this_hdr->sh_type = sh_type;
2621 }
2622
252b5132 2623 /* If the section has relocs, set up a section header for the
23bc299b
MM
2624 SHT_REL[A] section. If two relocation sections are required for
2625 this section, it is up to the processor-specific back-end to
c044fabd 2626 create the other. */
23bc299b 2627 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2628 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2629 &elf_section_data (asect)->rel_hdr,
c044fabd 2630 asect,
68bfbfcc 2631 asect->use_rela_p))
b34976b6 2632 *failedptr = TRUE;
252b5132
RH
2633}
2634
dbb410c3
AM
2635/* Fill in the contents of a SHT_GROUP section. */
2636
1126897b 2637void
217aa764 2638bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2639{
217aa764 2640 bfd_boolean *failedptr = failedptrarg;
dbb410c3 2641 unsigned long symindx;
9dce4196 2642 asection *elt, *first;
dbb410c3 2643 unsigned char *loc;
b34976b6 2644 bfd_boolean gas;
dbb410c3 2645
7e4111ad
L
2646 /* Ignore linker created group section. See elfNN_ia64_object_p in
2647 elfxx-ia64.c. */
2648 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2649 || *failedptr)
2650 return;
2651
1126897b
AM
2652 symindx = 0;
2653 if (elf_group_id (sec) != NULL)
2654 symindx = elf_group_id (sec)->udata.i;
2655
2656 if (symindx == 0)
2657 {
2658 /* If called from the assembler, swap_out_syms will have set up
2659 elf_section_syms; If called for "ld -r", use target_index. */
2660 if (elf_section_syms (abfd) != NULL)
2661 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2662 else
2663 symindx = sec->target_index;
2664 }
dbb410c3
AM
2665 elf_section_data (sec)->this_hdr.sh_info = symindx;
2666
1126897b 2667 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2668 gas = TRUE;
dbb410c3
AM
2669 if (sec->contents == NULL)
2670 {
b34976b6 2671 gas = FALSE;
eea6121a 2672 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2673
2674 /* Arrange for the section to be written out. */
2675 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2676 if (sec->contents == NULL)
2677 {
b34976b6 2678 *failedptr = TRUE;
dbb410c3
AM
2679 return;
2680 }
2681 }
2682
eea6121a 2683 loc = sec->contents + sec->size;
dbb410c3 2684
9dce4196
AM
2685 /* Get the pointer to the first section in the group that gas
2686 squirreled away here. objcopy arranges for this to be set to the
2687 start of the input section group. */
2688 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2689
2690 /* First element is a flag word. Rest of section is elf section
2691 indices for all the sections of the group. Write them backwards
2692 just to keep the group in the same order as given in .section
2693 directives, not that it matters. */
2694 while (elt != NULL)
2695 {
9dce4196
AM
2696 asection *s;
2697 unsigned int idx;
2698
dbb410c3 2699 loc -= 4;
9dce4196
AM
2700 s = elt;
2701 if (!gas)
2702 s = s->output_section;
2703 idx = 0;
2704 if (s != NULL)
2705 idx = elf_section_data (s)->this_idx;
2706 H_PUT_32 (abfd, idx, loc);
945906ff 2707 elt = elf_next_in_group (elt);
9dce4196
AM
2708 if (elt == first)
2709 break;
dbb410c3
AM
2710 }
2711
3d7f7666 2712 if ((loc -= 4) != sec->contents)
9dce4196 2713 abort ();
dbb410c3 2714
9dce4196 2715 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2716}
2717
252b5132
RH
2718/* Assign all ELF section numbers. The dummy first section is handled here
2719 too. The link/info pointers for the standard section types are filled
2720 in here too, while we're at it. */
2721
b34976b6 2722static bfd_boolean
da9f89d4 2723assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2724{
2725 struct elf_obj_tdata *t = elf_tdata (abfd);
2726 asection *sec;
2b0f7ef9 2727 unsigned int section_number, secn;
252b5132 2728 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2729 struct bfd_elf_section_data *d;
252b5132
RH
2730
2731 section_number = 1;
2732
2b0f7ef9
JJ
2733 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2734
da9f89d4
L
2735 /* SHT_GROUP sections are in relocatable files only. */
2736 if (link_info == NULL || link_info->relocatable)
252b5132 2737 {
da9f89d4 2738 /* Put SHT_GROUP sections first. */
04dd1667 2739 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2740 {
5daa8fe7 2741 d = elf_section_data (sec);
da9f89d4
L
2742
2743 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2744 {
5daa8fe7 2745 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2746 {
2747 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2748 bfd_section_list_remove (abfd, sec);
da9f89d4 2749 abfd->section_count--;
da9f89d4 2750 }
08a40648 2751 else
da9f89d4
L
2752 {
2753 if (section_number == SHN_LORESERVE)
2754 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2755 d->this_idx = section_number++;
2756 }
2757 }
47cc2cf5
PB
2758 }
2759 }
2760
2761 for (sec = abfd->sections; sec; sec = sec->next)
2762 {
2763 d = elf_section_data (sec);
2764
2765 if (d->this_hdr.sh_type != SHT_GROUP)
2766 {
2767 if (section_number == SHN_LORESERVE)
2768 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2769 d->this_idx = section_number++;
2770 }
2b0f7ef9 2771 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2772 if ((sec->flags & SEC_RELOC) == 0)
2773 d->rel_idx = 0;
2774 else
2b0f7ef9 2775 {
9ad5cbcf
AM
2776 if (section_number == SHN_LORESERVE)
2777 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2778 d->rel_idx = section_number++;
2779 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2780 }
23bc299b
MM
2781
2782 if (d->rel_hdr2)
2b0f7ef9 2783 {
9ad5cbcf
AM
2784 if (section_number == SHN_LORESERVE)
2785 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2b0f7ef9
JJ
2786 d->rel_idx2 = section_number++;
2787 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2788 }
23bc299b
MM
2789 else
2790 d->rel_idx2 = 0;
252b5132
RH
2791 }
2792
9ad5cbcf
AM
2793 if (section_number == SHN_LORESERVE)
2794 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2795 t->shstrtab_section = section_number++;
2b0f7ef9 2796 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2797 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2798
2799 if (bfd_get_symcount (abfd) > 0)
2800 {
9ad5cbcf
AM
2801 if (section_number == SHN_LORESERVE)
2802 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2803 t->symtab_section = section_number++;
2b0f7ef9 2804 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
9ad5cbcf
AM
2805 if (section_number > SHN_LORESERVE - 2)
2806 {
2807 if (section_number == SHN_LORESERVE)
2808 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
2809 t->symtab_shndx_section = section_number++;
2810 t->symtab_shndx_hdr.sh_name
2811 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2812 ".symtab_shndx", FALSE);
9ad5cbcf 2813 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2814 return FALSE;
9ad5cbcf
AM
2815 }
2816 if (section_number == SHN_LORESERVE)
2817 section_number += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132 2818 t->strtab_section = section_number++;
2b0f7ef9 2819 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2820 }
2821
2b0f7ef9
JJ
2822 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2823 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2824
2825 elf_numsections (abfd) = section_number;
252b5132 2826 elf_elfheader (abfd)->e_shnum = section_number;
9ad5cbcf
AM
2827 if (section_number > SHN_LORESERVE)
2828 elf_elfheader (abfd)->e_shnum -= SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
2829
2830 /* Set up the list of section header pointers, in agreement with the
2831 indices. */
d0fb9a8d 2832 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 2833 if (i_shdrp == NULL)
b34976b6 2834 return FALSE;
252b5132 2835
d0fb9a8d 2836 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
2837 if (i_shdrp[0] == NULL)
2838 {
2839 bfd_release (abfd, i_shdrp);
b34976b6 2840 return FALSE;
252b5132 2841 }
252b5132
RH
2842
2843 elf_elfsections (abfd) = i_shdrp;
2844
2845 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
2846 if (bfd_get_symcount (abfd) > 0)
2847 {
2848 i_shdrp[t->symtab_section] = &t->symtab_hdr;
9ad5cbcf
AM
2849 if (elf_numsections (abfd) > SHN_LORESERVE)
2850 {
2851 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2852 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2853 }
252b5132
RH
2854 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2855 t->symtab_hdr.sh_link = t->strtab_section;
2856 }
38ce5b11 2857
252b5132
RH
2858 for (sec = abfd->sections; sec; sec = sec->next)
2859 {
2860 struct bfd_elf_section_data *d = elf_section_data (sec);
2861 asection *s;
2862 const char *name;
2863
2864 i_shdrp[d->this_idx] = &d->this_hdr;
2865 if (d->rel_idx != 0)
2866 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
2867 if (d->rel_idx2 != 0)
2868 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
2869
2870 /* Fill in the sh_link and sh_info fields while we're at it. */
2871
2872 /* sh_link of a reloc section is the section index of the symbol
2873 table. sh_info is the section index of the section to which
2874 the relocation entries apply. */
2875 if (d->rel_idx != 0)
2876 {
2877 d->rel_hdr.sh_link = t->symtab_section;
2878 d->rel_hdr.sh_info = d->this_idx;
2879 }
23bc299b
MM
2880 if (d->rel_idx2 != 0)
2881 {
2882 d->rel_hdr2->sh_link = t->symtab_section;
2883 d->rel_hdr2->sh_info = d->this_idx;
2884 }
252b5132 2885
38ce5b11
L
2886 /* We need to set up sh_link for SHF_LINK_ORDER. */
2887 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
2888 {
2889 s = elf_linked_to_section (sec);
2890 if (s)
38ce5b11 2891 {
f2876037 2892 /* elf_linked_to_section points to the input section. */
ccd2ec6a 2893 if (link_info != NULL)
38ce5b11 2894 {
f2876037 2895 /* Check discarded linkonce section. */
ccd2ec6a 2896 if (elf_discarded_section (s))
38ce5b11 2897 {
ccd2ec6a
L
2898 asection *kept;
2899 (*_bfd_error_handler)
2900 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
2901 abfd, d->this_hdr.bfd_section,
2902 s, s->owner);
2903 /* Point to the kept section if it has the same
2904 size as the discarded one. */
c0f00686 2905 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 2906 if (kept == NULL)
185d09ad 2907 {
ccd2ec6a
L
2908 bfd_set_error (bfd_error_bad_value);
2909 return FALSE;
185d09ad 2910 }
ccd2ec6a 2911 s = kept;
38ce5b11 2912 }
e424ecc8 2913
ccd2ec6a
L
2914 s = s->output_section;
2915 BFD_ASSERT (s != NULL);
38ce5b11 2916 }
f2876037
L
2917 else
2918 {
2919 /* Handle objcopy. */
2920 if (s->output_section == NULL)
2921 {
2922 (*_bfd_error_handler)
2923 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
2924 abfd, d->this_hdr.bfd_section, s, s->owner);
2925 bfd_set_error (bfd_error_bad_value);
2926 return FALSE;
2927 }
2928 s = s->output_section;
2929 }
ccd2ec6a
L
2930 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2931 }
2932 else
2933 {
2934 /* PR 290:
2935 The Intel C compiler generates SHT_IA_64_UNWIND with
2936 SHF_LINK_ORDER. But it doesn't set the sh_link or
2937 sh_info fields. Hence we could get the situation
08a40648 2938 where s is NULL. */
ccd2ec6a
L
2939 const struct elf_backend_data *bed
2940 = get_elf_backend_data (abfd);
2941 if (bed->link_order_error_handler)
2942 bed->link_order_error_handler
2943 (_("%B: warning: sh_link not set for section `%A'"),
2944 abfd, sec);
38ce5b11
L
2945 }
2946 }
2947
252b5132
RH
2948 switch (d->this_hdr.sh_type)
2949 {
2950 case SHT_REL:
2951 case SHT_RELA:
2952 /* A reloc section which we are treating as a normal BFD
2953 section. sh_link is the section index of the symbol
2954 table. sh_info is the section index of the section to
2955 which the relocation entries apply. We assume that an
2956 allocated reloc section uses the dynamic symbol table.
2957 FIXME: How can we be sure? */
2958 s = bfd_get_section_by_name (abfd, ".dynsym");
2959 if (s != NULL)
2960 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2961
2962 /* We look up the section the relocs apply to by name. */
2963 name = sec->name;
2964 if (d->this_hdr.sh_type == SHT_REL)
2965 name += 4;
2966 else
2967 name += 5;
2968 s = bfd_get_section_by_name (abfd, name);
2969 if (s != NULL)
2970 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
2971 break;
2972
2973 case SHT_STRTAB:
2974 /* We assume that a section named .stab*str is a stabs
2975 string section. We look for a section with the same name
2976 but without the trailing ``str'', and set its sh_link
2977 field to point to this section. */
0112cd26 2978 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
2979 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
2980 {
2981 size_t len;
2982 char *alc;
2983
2984 len = strlen (sec->name);
217aa764 2985 alc = bfd_malloc (len - 2);
252b5132 2986 if (alc == NULL)
b34976b6 2987 return FALSE;
d4c88bbb 2988 memcpy (alc, sec->name, len - 3);
252b5132
RH
2989 alc[len - 3] = '\0';
2990 s = bfd_get_section_by_name (abfd, alc);
2991 free (alc);
2992 if (s != NULL)
2993 {
2994 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
2995
2996 /* This is a .stab section. */
0594c12d
AM
2997 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
2998 elf_section_data (s)->this_hdr.sh_entsize
2999 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3000 }
3001 }
3002 break;
3003
3004 case SHT_DYNAMIC:
3005 case SHT_DYNSYM:
3006 case SHT_GNU_verneed:
3007 case SHT_GNU_verdef:
3008 /* sh_link is the section header index of the string table
3009 used for the dynamic entries, or the symbol table, or the
3010 version strings. */
3011 s = bfd_get_section_by_name (abfd, ".dynstr");
3012 if (s != NULL)
3013 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3014 break;
3015
7f1204bb
JJ
3016 case SHT_GNU_LIBLIST:
3017 /* sh_link is the section header index of the prelink library
08a40648
AM
3018 list used for the dynamic entries, or the symbol table, or
3019 the version strings. */
7f1204bb
JJ
3020 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3021 ? ".dynstr" : ".gnu.libstr");
3022 if (s != NULL)
3023 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3024 break;
3025
252b5132 3026 case SHT_HASH:
fdc90cb4 3027 case SHT_GNU_HASH:
252b5132
RH
3028 case SHT_GNU_versym:
3029 /* sh_link is the section header index of the symbol table
3030 this hash table or version table is for. */
3031 s = bfd_get_section_by_name (abfd, ".dynsym");
3032 if (s != NULL)
3033 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3034 break;
dbb410c3
AM
3035
3036 case SHT_GROUP:
3037 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3038 }
3039 }
3040
2b0f7ef9 3041 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3042 if (i_shdrp[secn] == NULL)
3043 i_shdrp[secn] = i_shdrp[0];
3044 else
3045 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3046 i_shdrp[secn]->sh_name);
b34976b6 3047 return TRUE;
252b5132
RH
3048}
3049
3050/* Map symbol from it's internal number to the external number, moving
3051 all local symbols to be at the head of the list. */
3052
5372391b 3053static bfd_boolean
217aa764 3054sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3055{
3056 /* If the backend has a special mapping, use it. */
9c5bfbb7 3057 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3058 if (bed->elf_backend_sym_is_global)
3059 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3060
3061 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3062 || bfd_is_und_section (bfd_get_section (sym))
3063 || bfd_is_com_section (bfd_get_section (sym)));
3064}
3065
5372391b
AM
3066/* Don't output section symbols for sections that are not going to be
3067 output. Also, don't output section symbols for reloc and other
3068 special sections. */
3069
3070static bfd_boolean
3071ignore_section_sym (bfd *abfd, asymbol *sym)
3072{
3073 return ((sym->flags & BSF_SECTION_SYM) != 0
3074 && (sym->value != 0
3075 || (sym->section->owner != abfd
3076 && (sym->section->output_section->owner != abfd
3077 || sym->section->output_offset != 0))));
3078}
3079
b34976b6 3080static bfd_boolean
217aa764 3081elf_map_symbols (bfd *abfd)
252b5132 3082{
dc810e39 3083 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3084 asymbol **syms = bfd_get_outsymbols (abfd);
3085 asymbol **sect_syms;
dc810e39
AM
3086 unsigned int num_locals = 0;
3087 unsigned int num_globals = 0;
3088 unsigned int num_locals2 = 0;
3089 unsigned int num_globals2 = 0;
252b5132 3090 int max_index = 0;
dc810e39 3091 unsigned int idx;
252b5132
RH
3092 asection *asect;
3093 asymbol **new_syms;
252b5132
RH
3094
3095#ifdef DEBUG
3096 fprintf (stderr, "elf_map_symbols\n");
3097 fflush (stderr);
3098#endif
3099
252b5132
RH
3100 for (asect = abfd->sections; asect; asect = asect->next)
3101 {
3102 if (max_index < asect->index)
3103 max_index = asect->index;
3104 }
3105
3106 max_index++;
d0fb9a8d 3107 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3108 if (sect_syms == NULL)
b34976b6 3109 return FALSE;
252b5132 3110 elf_section_syms (abfd) = sect_syms;
4e89ac30 3111 elf_num_section_syms (abfd) = max_index;
252b5132 3112
079e9a2f
AM
3113 /* Init sect_syms entries for any section symbols we have already
3114 decided to output. */
252b5132
RH
3115 for (idx = 0; idx < symcount; idx++)
3116 {
dc810e39 3117 asymbol *sym = syms[idx];
c044fabd 3118
252b5132 3119 if ((sym->flags & BSF_SECTION_SYM) != 0
5372391b 3120 && !ignore_section_sym (abfd, sym))
252b5132 3121 {
5372391b 3122 asection *sec = sym->section;
252b5132 3123
5372391b
AM
3124 if (sec->owner != abfd)
3125 sec = sec->output_section;
252b5132 3126
5372391b 3127 sect_syms[sec->index] = syms[idx];
252b5132
RH
3128 }
3129 }
3130
252b5132
RH
3131 /* Classify all of the symbols. */
3132 for (idx = 0; idx < symcount; idx++)
3133 {
5372391b
AM
3134 if (ignore_section_sym (abfd, syms[idx]))
3135 continue;
252b5132
RH
3136 if (!sym_is_global (abfd, syms[idx]))
3137 num_locals++;
3138 else
3139 num_globals++;
3140 }
079e9a2f 3141
5372391b 3142 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3143 sections will already have a section symbol in outsymbols, but
3144 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3145 at least in that case. */
252b5132
RH
3146 for (asect = abfd->sections; asect; asect = asect->next)
3147 {
079e9a2f 3148 if (sect_syms[asect->index] == NULL)
252b5132 3149 {
079e9a2f 3150 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3151 num_locals++;
3152 else
3153 num_globals++;
252b5132
RH
3154 }
3155 }
3156
3157 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3158 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3159
252b5132 3160 if (new_syms == NULL)
b34976b6 3161 return FALSE;
252b5132
RH
3162
3163 for (idx = 0; idx < symcount; idx++)
3164 {
3165 asymbol *sym = syms[idx];
dc810e39 3166 unsigned int i;
252b5132 3167
5372391b
AM
3168 if (ignore_section_sym (abfd, sym))
3169 continue;
252b5132
RH
3170 if (!sym_is_global (abfd, sym))
3171 i = num_locals2++;
3172 else
3173 i = num_locals + num_globals2++;
3174 new_syms[i] = sym;
3175 sym->udata.i = i + 1;
3176 }
3177 for (asect = abfd->sections; asect; asect = asect->next)
3178 {
079e9a2f 3179 if (sect_syms[asect->index] == NULL)
252b5132 3180 {
079e9a2f 3181 asymbol *sym = asect->symbol;
dc810e39 3182 unsigned int i;
252b5132 3183
079e9a2f 3184 sect_syms[asect->index] = sym;
252b5132
RH
3185 if (!sym_is_global (abfd, sym))
3186 i = num_locals2++;
3187 else
3188 i = num_locals + num_globals2++;
3189 new_syms[i] = sym;
3190 sym->udata.i = i + 1;
3191 }
3192 }
3193
3194 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3195
3196 elf_num_locals (abfd) = num_locals;
3197 elf_num_globals (abfd) = num_globals;
b34976b6 3198 return TRUE;
252b5132
RH
3199}
3200
3201/* Align to the maximum file alignment that could be required for any
3202 ELF data structure. */
3203
268b6b39 3204static inline file_ptr
217aa764 3205align_file_position (file_ptr off, int align)
252b5132
RH
3206{
3207 return (off + align - 1) & ~(align - 1);
3208}
3209
3210/* Assign a file position to a section, optionally aligning to the
3211 required section alignment. */
3212
217aa764
AM
3213file_ptr
3214_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3215 file_ptr offset,
3216 bfd_boolean align)
252b5132
RH
3217{
3218 if (align)
3219 {
3220 unsigned int al;
3221
3222 al = i_shdrp->sh_addralign;
3223 if (al > 1)
3224 offset = BFD_ALIGN (offset, al);
3225 }
3226 i_shdrp->sh_offset = offset;
3227 if (i_shdrp->bfd_section != NULL)
3228 i_shdrp->bfd_section->filepos = offset;
3229 if (i_shdrp->sh_type != SHT_NOBITS)
3230 offset += i_shdrp->sh_size;
3231 return offset;
3232}
3233
3234/* Compute the file positions we are going to put the sections at, and
3235 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3236 is not NULL, this is being called by the ELF backend linker. */
3237
b34976b6 3238bfd_boolean
217aa764
AM
3239_bfd_elf_compute_section_file_positions (bfd *abfd,
3240 struct bfd_link_info *link_info)
252b5132 3241{
9c5bfbb7 3242 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3243 bfd_boolean failed;
4b6c0f2f 3244 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3245 Elf_Internal_Shdr *shstrtab_hdr;
3246
3247 if (abfd->output_has_begun)
b34976b6 3248 return TRUE;
252b5132
RH
3249
3250 /* Do any elf backend specific processing first. */
3251 if (bed->elf_backend_begin_write_processing)
3252 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3253
3254 if (! prep_headers (abfd))
b34976b6 3255 return FALSE;
252b5132 3256
e6c51ed4
NC
3257 /* Post process the headers if necessary. */
3258 if (bed->elf_backend_post_process_headers)
3259 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3260
b34976b6 3261 failed = FALSE;
252b5132
RH
3262 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3263 if (failed)
b34976b6 3264 return FALSE;
252b5132 3265
da9f89d4 3266 if (!assign_section_numbers (abfd, link_info))
b34976b6 3267 return FALSE;
252b5132
RH
3268
3269 /* The backend linker builds symbol table information itself. */
3270 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3271 {
3272 /* Non-zero if doing a relocatable link. */
3273 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3274
3275 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3276 return FALSE;
252b5132
RH
3277 }
3278
1126897b 3279 if (link_info == NULL)
dbb410c3 3280 {
1126897b 3281 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3282 if (failed)
b34976b6 3283 return FALSE;
dbb410c3
AM
3284 }
3285
252b5132
RH
3286 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3287 /* sh_name was set in prep_headers. */
3288 shstrtab_hdr->sh_type = SHT_STRTAB;
3289 shstrtab_hdr->sh_flags = 0;
3290 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3291 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3292 shstrtab_hdr->sh_entsize = 0;
3293 shstrtab_hdr->sh_link = 0;
3294 shstrtab_hdr->sh_info = 0;
3295 /* sh_offset is set in assign_file_positions_except_relocs. */
3296 shstrtab_hdr->sh_addralign = 1;
3297
c84fca4d 3298 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3299 return FALSE;
252b5132
RH
3300
3301 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3302 {
3303 file_ptr off;
3304 Elf_Internal_Shdr *hdr;
3305
3306 off = elf_tdata (abfd)->next_file_pos;
3307
3308 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3309 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3310
9ad5cbcf
AM
3311 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3312 if (hdr->sh_size != 0)
b34976b6 3313 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3314
252b5132 3315 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3316 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3317
3318 elf_tdata (abfd)->next_file_pos = off;
3319
3320 /* Now that we know where the .strtab section goes, write it
08a40648 3321 out. */
252b5132
RH
3322 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3323 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3324 return FALSE;
252b5132
RH
3325 _bfd_stringtab_free (strtab);
3326 }
3327
b34976b6 3328 abfd->output_has_begun = TRUE;
252b5132 3329
b34976b6 3330 return TRUE;
252b5132
RH
3331}
3332
8ded5a0f
AM
3333/* Make an initial estimate of the size of the program header. If we
3334 get the number wrong here, we'll redo section placement. */
3335
3336static bfd_size_type
3337get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3338{
3339 size_t segs;
3340 asection *s;
2b05f1b7 3341 const struct elf_backend_data *bed;
8ded5a0f
AM
3342
3343 /* Assume we will need exactly two PT_LOAD segments: one for text
3344 and one for data. */
3345 segs = 2;
3346
3347 s = bfd_get_section_by_name (abfd, ".interp");
3348 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3349 {
3350 /* If we have a loadable interpreter section, we need a
3351 PT_INTERP segment. In this case, assume we also need a
3352 PT_PHDR segment, although that may not be true for all
3353 targets. */
3354 segs += 2;
3355 }
3356
3357 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3358 {
3359 /* We need a PT_DYNAMIC segment. */
3360 ++segs;
f210dcff 3361 }
08a40648 3362
f210dcff
L
3363 if (info->relro)
3364 {
3365 /* We need a PT_GNU_RELRO segment. */
3366 ++segs;
8ded5a0f
AM
3367 }
3368
3369 if (elf_tdata (abfd)->eh_frame_hdr)
3370 {
3371 /* We need a PT_GNU_EH_FRAME segment. */
3372 ++segs;
3373 }
3374
2b05f1b7 3375 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3376 {
2b05f1b7
L
3377 /* We need a PT_GNU_STACK segment. */
3378 ++segs;
3379 }
94b11780 3380
2b05f1b7
L
3381 for (s = abfd->sections; s != NULL; s = s->next)
3382 {
8ded5a0f 3383 if ((s->flags & SEC_LOAD) != 0
0112cd26 3384 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3385 {
3386 /* We need a PT_NOTE segment. */
3387 ++segs;
1c5265b5
JJ
3388 /* Try to create just one PT_NOTE segment
3389 for all adjacent loadable .note* sections.
3390 gABI requires that within a PT_NOTE segment
3391 (and also inside of each SHT_NOTE section)
3392 each note is padded to a multiple of 4 size,
3393 so we check whether the sections are correctly
3394 aligned. */
3395 if (s->alignment_power == 2)
3396 while (s->next != NULL
3397 && s->next->alignment_power == 2
3398 && (s->next->flags & SEC_LOAD) != 0
3399 && CONST_STRNEQ (s->next->name, ".note"))
3400 s = s->next;
8ded5a0f
AM
3401 }
3402 }
3403
3404 for (s = abfd->sections; s != NULL; s = s->next)
3405 {
3406 if (s->flags & SEC_THREAD_LOCAL)
3407 {
3408 /* We need a PT_TLS segment. */
3409 ++segs;
3410 break;
3411 }
3412 }
3413
3414 /* Let the backend count up any program headers it might need. */
2b05f1b7 3415 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3416 if (bed->elf_backend_additional_program_headers)
3417 {
3418 int a;
3419
3420 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3421 if (a == -1)
3422 abort ();
3423 segs += a;
3424 }
3425
3426 return segs * bed->s->sizeof_phdr;
3427}
3428
2ea37f1c
NC
3429/* Find the segment that contains the output_section of section. */
3430
3431Elf_Internal_Phdr *
3432_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3433{
3434 struct elf_segment_map *m;
3435 Elf_Internal_Phdr *p;
3436
3437 for (m = elf_tdata (abfd)->segment_map,
3438 p = elf_tdata (abfd)->phdr;
3439 m != NULL;
3440 m = m->next, p++)
3441 {
3442 int i;
3443
3444 for (i = m->count - 1; i >= 0; i--)
3445 if (m->sections[i] == section)
3446 return p;
3447 }
3448
3449 return NULL;
3450}
3451
252b5132
RH
3452/* Create a mapping from a set of sections to a program segment. */
3453
217aa764
AM
3454static struct elf_segment_map *
3455make_mapping (bfd *abfd,
3456 asection **sections,
3457 unsigned int from,
3458 unsigned int to,
3459 bfd_boolean phdr)
252b5132
RH
3460{
3461 struct elf_segment_map *m;
3462 unsigned int i;
3463 asection **hdrpp;
dc810e39 3464 bfd_size_type amt;
252b5132 3465
dc810e39
AM
3466 amt = sizeof (struct elf_segment_map);
3467 amt += (to - from - 1) * sizeof (asection *);
217aa764 3468 m = bfd_zalloc (abfd, amt);
252b5132
RH
3469 if (m == NULL)
3470 return NULL;
3471 m->next = NULL;
3472 m->p_type = PT_LOAD;
3473 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3474 m->sections[i - from] = *hdrpp;
3475 m->count = to - from;
3476
3477 if (from == 0 && phdr)
3478 {
3479 /* Include the headers in the first PT_LOAD segment. */
3480 m->includes_filehdr = 1;
3481 m->includes_phdrs = 1;
3482 }
3483
3484 return m;
3485}
3486
229fcec5
MM
3487/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3488 on failure. */
3489
3490struct elf_segment_map *
3491_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3492{
3493 struct elf_segment_map *m;
3494
3495 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3496 if (m == NULL)
3497 return NULL;
3498 m->next = NULL;
3499 m->p_type = PT_DYNAMIC;
3500 m->count = 1;
3501 m->sections[0] = dynsec;
08a40648 3502
229fcec5
MM
3503 return m;
3504}
3505
8ded5a0f 3506/* Possibly add or remove segments from the segment map. */
252b5132 3507
b34976b6 3508static bfd_boolean
3dea8fca
AM
3509elf_modify_segment_map (bfd *abfd,
3510 struct bfd_link_info *info,
3511 bfd_boolean remove_empty_load)
252b5132 3512{
252e386e 3513 struct elf_segment_map **m;
8ded5a0f 3514 const struct elf_backend_data *bed;
252b5132 3515
8ded5a0f
AM
3516 /* The placement algorithm assumes that non allocated sections are
3517 not in PT_LOAD segments. We ensure this here by removing such
3518 sections from the segment map. We also remove excluded
252e386e
AM
3519 sections. Finally, any PT_LOAD segment without sections is
3520 removed. */
3521 m = &elf_tdata (abfd)->segment_map;
3522 while (*m)
8ded5a0f
AM
3523 {
3524 unsigned int i, new_count;
252b5132 3525
252e386e 3526 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3527 {
252e386e
AM
3528 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3529 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3530 || (*m)->p_type != PT_LOAD))
8ded5a0f 3531 {
252e386e
AM
3532 (*m)->sections[new_count] = (*m)->sections[i];
3533 new_count++;
8ded5a0f
AM
3534 }
3535 }
252e386e 3536 (*m)->count = new_count;
252b5132 3537
3dea8fca 3538 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3539 *m = (*m)->next;
3540 else
3541 m = &(*m)->next;
8ded5a0f 3542 }
252b5132 3543
8ded5a0f
AM
3544 bed = get_elf_backend_data (abfd);
3545 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3546 {
252e386e 3547 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3548 return FALSE;
252b5132 3549 }
252b5132 3550
8ded5a0f
AM
3551 return TRUE;
3552}
252b5132 3553
8ded5a0f 3554/* Set up a mapping from BFD sections to program segments. */
252b5132 3555
8ded5a0f
AM
3556bfd_boolean
3557_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3558{
3559 unsigned int count;
3560 struct elf_segment_map *m;
3561 asection **sections = NULL;
3562 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3563 bfd_boolean no_user_phdrs;
252b5132 3564
3dea8fca
AM
3565 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
3566 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3567 {
8ded5a0f
AM
3568 asection *s;
3569 unsigned int i;
3570 struct elf_segment_map *mfirst;
3571 struct elf_segment_map **pm;
3572 asection *last_hdr;
3573 bfd_vma last_size;
3574 unsigned int phdr_index;
3575 bfd_vma maxpagesize;
3576 asection **hdrpp;
3577 bfd_boolean phdr_in_segment = TRUE;
3578 bfd_boolean writable;
3579 int tls_count = 0;
3580 asection *first_tls = NULL;
3581 asection *dynsec, *eh_frame_hdr;
3582 bfd_size_type amt;
252b5132 3583
8ded5a0f 3584 /* Select the allocated sections, and sort them. */
252b5132 3585
8ded5a0f
AM
3586 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
3587 if (sections == NULL)
252b5132 3588 goto error_return;
252b5132 3589
8ded5a0f
AM
3590 i = 0;
3591 for (s = abfd->sections; s != NULL; s = s->next)
3592 {
3593 if ((s->flags & SEC_ALLOC) != 0)
3594 {
3595 sections[i] = s;
3596 ++i;
3597 }
3598 }
3599 BFD_ASSERT (i <= bfd_count_sections (abfd));
3600 count = i;
252b5132 3601
8ded5a0f 3602 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3603
8ded5a0f 3604 /* Build the mapping. */
252b5132 3605
8ded5a0f
AM
3606 mfirst = NULL;
3607 pm = &mfirst;
252b5132 3608
8ded5a0f
AM
3609 /* If we have a .interp section, then create a PT_PHDR segment for
3610 the program headers and a PT_INTERP segment for the .interp
3611 section. */
3612 s = bfd_get_section_by_name (abfd, ".interp");
3613 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3614 {
3615 amt = sizeof (struct elf_segment_map);
3616 m = bfd_zalloc (abfd, amt);
3617 if (m == NULL)
3618 goto error_return;
3619 m->next = NULL;
3620 m->p_type = PT_PHDR;
3621 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3622 m->p_flags = PF_R | PF_X;
3623 m->p_flags_valid = 1;
3624 m->includes_phdrs = 1;
252b5132 3625
8ded5a0f
AM
3626 *pm = m;
3627 pm = &m->next;
252b5132 3628
8ded5a0f
AM
3629 amt = sizeof (struct elf_segment_map);
3630 m = bfd_zalloc (abfd, amt);
3631 if (m == NULL)
3632 goto error_return;
3633 m->next = NULL;
3634 m->p_type = PT_INTERP;
3635 m->count = 1;
3636 m->sections[0] = s;
3637
3638 *pm = m;
3639 pm = &m->next;
252b5132 3640 }
8ded5a0f
AM
3641
3642 /* Look through the sections. We put sections in the same program
3643 segment when the start of the second section can be placed within
3644 a few bytes of the end of the first section. */
3645 last_hdr = NULL;
3646 last_size = 0;
3647 phdr_index = 0;
3648 maxpagesize = bed->maxpagesize;
3649 writable = FALSE;
3650 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3651 if (dynsec != NULL
3652 && (dynsec->flags & SEC_LOAD) == 0)
3653 dynsec = NULL;
3654
3655 /* Deal with -Ttext or something similar such that the first section
3656 is not adjacent to the program headers. This is an
3657 approximation, since at this point we don't know exactly how many
3658 program headers we will need. */
3659 if (count > 0)
252b5132 3660 {
8ded5a0f
AM
3661 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3662
62d7a5f6 3663 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3664 phdr_size = get_program_header_size (abfd, info);
3665 if ((abfd->flags & D_PAGED) == 0
3666 || sections[0]->lma < phdr_size
3667 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
3668 phdr_in_segment = FALSE;
252b5132
RH
3669 }
3670
8ded5a0f 3671 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3672 {
8ded5a0f
AM
3673 asection *hdr;
3674 bfd_boolean new_segment;
3675
3676 hdr = *hdrpp;
3677
3678 /* See if this section and the last one will fit in the same
3679 segment. */
3680
3681 if (last_hdr == NULL)
3682 {
3683 /* If we don't have a segment yet, then we don't need a new
3684 one (we build the last one after this loop). */
3685 new_segment = FALSE;
3686 }
3687 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3688 {
3689 /* If this section has a different relation between the
3690 virtual address and the load address, then we need a new
3691 segment. */
3692 new_segment = TRUE;
3693 }
3694 else if (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
3695 < BFD_ALIGN (hdr->lma, maxpagesize))
3696 {
3697 /* If putting this section in this segment would force us to
3698 skip a page in the segment, then we need a new segment. */
3699 new_segment = TRUE;
3700 }
3701 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3702 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3703 {
3704 /* We don't want to put a loadable section after a
3705 nonloadable section in the same segment.
3706 Consider .tbss sections as loadable for this purpose. */
3707 new_segment = TRUE;
3708 }
3709 else if ((abfd->flags & D_PAGED) == 0)
3710 {
3711 /* If the file is not demand paged, which means that we
3712 don't require the sections to be correctly aligned in the
3713 file, then there is no other reason for a new segment. */
3714 new_segment = FALSE;
3715 }
3716 else if (! writable
3717 && (hdr->flags & SEC_READONLY) == 0
3718 && (((last_hdr->lma + last_size - 1)
3719 & ~(maxpagesize - 1))
3720 != (hdr->lma & ~(maxpagesize - 1))))
3721 {
3722 /* We don't want to put a writable section in a read only
3723 segment, unless they are on the same page in memory
3724 anyhow. We already know that the last section does not
3725 bring us past the current section on the page, so the
3726 only case in which the new section is not on the same
3727 page as the previous section is when the previous section
3728 ends precisely on a page boundary. */
3729 new_segment = TRUE;
3730 }
3731 else
3732 {
3733 /* Otherwise, we can use the same segment. */
3734 new_segment = FALSE;
3735 }
3736
2889e75b
NC
3737 /* Allow interested parties a chance to override our decision. */
3738 if (last_hdr && info->callbacks->override_segment_assignment)
3739 new_segment = info->callbacks->override_segment_assignment (info, abfd, hdr, last_hdr, new_segment);
3740
8ded5a0f
AM
3741 if (! new_segment)
3742 {
3743 if ((hdr->flags & SEC_READONLY) == 0)
3744 writable = TRUE;
3745 last_hdr = hdr;
3746 /* .tbss sections effectively have zero size. */
3747 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3748 != SEC_THREAD_LOCAL)
3749 last_size = hdr->size;
3750 else
3751 last_size = 0;
3752 continue;
3753 }
3754
3755 /* We need a new program segment. We must create a new program
3756 header holding all the sections from phdr_index until hdr. */
3757
3758 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3759 if (m == NULL)
3760 goto error_return;
3761
3762 *pm = m;
3763 pm = &m->next;
3764
252b5132 3765 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3766 writable = TRUE;
8ded5a0f
AM
3767 else
3768 writable = FALSE;
3769
baaff79e
JJ
3770 last_hdr = hdr;
3771 /* .tbss sections effectively have zero size. */
e5caec89 3772 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3773 last_size = hdr->size;
baaff79e
JJ
3774 else
3775 last_size = 0;
8ded5a0f
AM
3776 phdr_index = i;
3777 phdr_in_segment = FALSE;
252b5132
RH
3778 }
3779
8ded5a0f
AM
3780 /* Create a final PT_LOAD program segment. */
3781 if (last_hdr != NULL)
3782 {
3783 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3784 if (m == NULL)
3785 goto error_return;
252b5132 3786
8ded5a0f
AM
3787 *pm = m;
3788 pm = &m->next;
3789 }
252b5132 3790
8ded5a0f
AM
3791 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3792 if (dynsec != NULL)
3793 {
3794 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
3795 if (m == NULL)
3796 goto error_return;
3797 *pm = m;
3798 pm = &m->next;
3799 }
252b5132 3800
1c5265b5
JJ
3801 /* For each batch of consecutive loadable .note sections,
3802 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
3803 because if we link together nonloadable .note sections and
3804 loadable .note sections, we will generate two .note sections
3805 in the output file. FIXME: Using names for section types is
3806 bogus anyhow. */
8ded5a0f
AM
3807 for (s = abfd->sections; s != NULL; s = s->next)
3808 {
3809 if ((s->flags & SEC_LOAD) != 0
0112cd26 3810 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 3811 {
1c5265b5
JJ
3812 asection *s2;
3813 unsigned count = 1;
8ded5a0f 3814 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
3815 if (s->alignment_power == 2)
3816 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
3817 {
3818 if (s2->next->alignment_power == 2
3819 && (s2->next->flags & SEC_LOAD) != 0
3820 && CONST_STRNEQ (s2->next->name, ".note")
3821 && align_power (s2->vma + s2->size, 2)
3822 == s2->next->vma)
3823 count++;
3824 else
3825 break;
3826 }
1c5265b5 3827 amt += (count - 1) * sizeof (asection *);
8ded5a0f
AM
3828 m = bfd_zalloc (abfd, amt);
3829 if (m == NULL)
3830 goto error_return;
3831 m->next = NULL;
3832 m->p_type = PT_NOTE;
1c5265b5
JJ
3833 m->count = count;
3834 while (count > 1)
3835 {
3836 m->sections[m->count - count--] = s;
3837 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
3838 s = s->next;
3839 }
3840 m->sections[m->count - 1] = s;
3841 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
3842 *pm = m;
3843 pm = &m->next;
3844 }
3845 if (s->flags & SEC_THREAD_LOCAL)
3846 {
3847 if (! tls_count)
3848 first_tls = s;
3849 tls_count++;
3850 }
3851 }
252b5132 3852
8ded5a0f
AM
3853 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3854 if (tls_count > 0)
3855 {
3856 int i;
252b5132 3857
8ded5a0f
AM
3858 amt = sizeof (struct elf_segment_map);
3859 amt += (tls_count - 1) * sizeof (asection *);
3860 m = bfd_zalloc (abfd, amt);
3861 if (m == NULL)
3862 goto error_return;
3863 m->next = NULL;
3864 m->p_type = PT_TLS;
3865 m->count = tls_count;
3866 /* Mandated PF_R. */
3867 m->p_flags = PF_R;
3868 m->p_flags_valid = 1;
3869 for (i = 0; i < tls_count; ++i)
3870 {
3871 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3872 m->sections[i] = first_tls;
3873 first_tls = first_tls->next;
3874 }
252b5132 3875
8ded5a0f
AM
3876 *pm = m;
3877 pm = &m->next;
3878 }
252b5132 3879
8ded5a0f
AM
3880 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3881 segment. */
3882 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3883 if (eh_frame_hdr != NULL
3884 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 3885 {
dc810e39 3886 amt = sizeof (struct elf_segment_map);
217aa764 3887 m = bfd_zalloc (abfd, amt);
252b5132
RH
3888 if (m == NULL)
3889 goto error_return;
3890 m->next = NULL;
8ded5a0f 3891 m->p_type = PT_GNU_EH_FRAME;
252b5132 3892 m->count = 1;
8ded5a0f 3893 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
3894
3895 *pm = m;
3896 pm = &m->next;
3897 }
13ae64f3 3898
8ded5a0f 3899 if (elf_tdata (abfd)->stack_flags)
13ae64f3 3900 {
8ded5a0f
AM
3901 amt = sizeof (struct elf_segment_map);
3902 m = bfd_zalloc (abfd, amt);
3903 if (m == NULL)
3904 goto error_return;
3905 m->next = NULL;
2b05f1b7 3906 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
3907 m->p_flags = elf_tdata (abfd)->stack_flags;
3908 m->p_flags_valid = 1;
252b5132 3909
8ded5a0f
AM
3910 *pm = m;
3911 pm = &m->next;
3912 }
65765700 3913
f210dcff 3914 if (info->relro)
8ded5a0f 3915 {
f210dcff
L
3916 for (m = mfirst; m != NULL; m = m->next)
3917 {
3918 if (m->p_type == PT_LOAD)
3919 {
3920 asection *last = m->sections[m->count - 1];
3921 bfd_vma vaddr = m->sections[0]->vma;
3922 bfd_vma filesz = last->vma - vaddr + last->size;
65765700 3923
f210dcff
L
3924 if (vaddr < info->relro_end
3925 && vaddr >= info->relro_start
3926 && (vaddr + filesz) >= info->relro_end)
3927 break;
3928 }
3929 }
3930
3931 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
3932 if (m != NULL)
3933 {
3934 amt = sizeof (struct elf_segment_map);
3935 m = bfd_zalloc (abfd, amt);
3936 if (m == NULL)
3937 goto error_return;
3938 m->next = NULL;
3939 m->p_type = PT_GNU_RELRO;
3940 m->p_flags = PF_R;
3941 m->p_flags_valid = 1;
3942
3943 *pm = m;
3944 pm = &m->next;
3945 }
8ded5a0f 3946 }
9ee5e499 3947
8ded5a0f
AM
3948 free (sections);
3949 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
3950 }
3951
3dea8fca 3952 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 3953 return FALSE;
8c37241b 3954
8ded5a0f
AM
3955 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
3956 ++count;
3957 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 3958
b34976b6 3959 return TRUE;
252b5132
RH
3960
3961 error_return:
3962 if (sections != NULL)
3963 free (sections);
b34976b6 3964 return FALSE;
252b5132
RH
3965}
3966
3967/* Sort sections by address. */
3968
3969static int
217aa764 3970elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
3971{
3972 const asection *sec1 = *(const asection **) arg1;
3973 const asection *sec2 = *(const asection **) arg2;
eecdbe52 3974 bfd_size_type size1, size2;
252b5132
RH
3975
3976 /* Sort by LMA first, since this is the address used to
3977 place the section into a segment. */
3978 if (sec1->lma < sec2->lma)
3979 return -1;
3980 else if (sec1->lma > sec2->lma)
3981 return 1;
3982
3983 /* Then sort by VMA. Normally the LMA and the VMA will be
3984 the same, and this will do nothing. */
3985 if (sec1->vma < sec2->vma)
3986 return -1;
3987 else if (sec1->vma > sec2->vma)
3988 return 1;
3989
3990 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
3991
07c6e936 3992#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
3993
3994 if (TOEND (sec1))
3995 {
3996 if (TOEND (sec2))
00a7cdc5
NC
3997 {
3998 /* If the indicies are the same, do not return 0
3999 here, but continue to try the next comparison. */
4000 if (sec1->target_index - sec2->target_index != 0)
4001 return sec1->target_index - sec2->target_index;
4002 }
252b5132
RH
4003 else
4004 return 1;
4005 }
00a7cdc5 4006 else if (TOEND (sec2))
252b5132
RH
4007 return -1;
4008
4009#undef TOEND
4010
00a7cdc5
NC
4011 /* Sort by size, to put zero sized sections
4012 before others at the same address. */
252b5132 4013
eea6121a
AM
4014 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4015 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4016
4017 if (size1 < size2)
252b5132 4018 return -1;
eecdbe52 4019 if (size1 > size2)
252b5132
RH
4020 return 1;
4021
4022 return sec1->target_index - sec2->target_index;
4023}
4024
340b6d91
AC
4025/* Ian Lance Taylor writes:
4026
4027 We shouldn't be using % with a negative signed number. That's just
4028 not good. We have to make sure either that the number is not
4029 negative, or that the number has an unsigned type. When the types
4030 are all the same size they wind up as unsigned. When file_ptr is a
4031 larger signed type, the arithmetic winds up as signed long long,
4032 which is wrong.
4033
4034 What we're trying to say here is something like ``increase OFF by
4035 the least amount that will cause it to be equal to the VMA modulo
4036 the page size.'' */
4037/* In other words, something like:
4038
4039 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4040 off_offset = off % bed->maxpagesize;
4041 if (vma_offset < off_offset)
4042 adjustment = vma_offset + bed->maxpagesize - off_offset;
4043 else
4044 adjustment = vma_offset - off_offset;
08a40648 4045
340b6d91
AC
4046 which can can be collapsed into the expression below. */
4047
4048static file_ptr
4049vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4050{
4051 return ((vma - off) % maxpagesize);
4052}
4053
6d33f217
L
4054static void
4055print_segment_map (const struct elf_segment_map *m)
4056{
4057 unsigned int j;
4058 const char *pt = get_segment_type (m->p_type);
4059 char buf[32];
4060
4061 if (pt == NULL)
4062 {
4063 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4064 sprintf (buf, "LOPROC+%7.7x",
4065 (unsigned int) (m->p_type - PT_LOPROC));
4066 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4067 sprintf (buf, "LOOS+%7.7x",
4068 (unsigned int) (m->p_type - PT_LOOS));
4069 else
4070 snprintf (buf, sizeof (buf), "%8.8x",
4071 (unsigned int) m->p_type);
4072 pt = buf;
4073 }
4074 fprintf (stderr, "%s:", pt);
4075 for (j = 0; j < m->count; j++)
4076 fprintf (stderr, " %s", m->sections [j]->name);
4077 putc ('\n',stderr);
4078}
4079
252b5132
RH
4080/* Assign file positions to the sections based on the mapping from
4081 sections to segments. This function also sets up some fields in
f3520d2f 4082 the file header. */
252b5132 4083
b34976b6 4084static bfd_boolean
f3520d2f
AM
4085assign_file_positions_for_load_sections (bfd *abfd,
4086 struct bfd_link_info *link_info)
252b5132
RH
4087{
4088 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4089 struct elf_segment_map *m;
252b5132 4090 Elf_Internal_Phdr *phdrs;
252b5132 4091 Elf_Internal_Phdr *p;
02bf8d82 4092 file_ptr off;
3f570048 4093 bfd_size_type maxpagesize;
f3520d2f 4094 unsigned int alloc;
0920dee7 4095 unsigned int i, j;
252b5132 4096
e36284ab 4097 if (link_info == NULL
3dea8fca 4098 && !elf_modify_segment_map (abfd, link_info, FALSE))
8ded5a0f 4099 return FALSE;
252b5132 4100
8ded5a0f 4101 alloc = 0;
252b5132 4102 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
8ded5a0f 4103 ++alloc;
252b5132
RH
4104
4105 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4106 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4107 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4108
62d7a5f6 4109 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4110 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4111 else
4112 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4113 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4114
4115 if (alloc == 0)
f3520d2f 4116 {
8ded5a0f
AM
4117 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4118 return TRUE;
f3520d2f 4119 }
252b5132 4120
d0fb9a8d 4121 phdrs = bfd_alloc2 (abfd, alloc, sizeof (Elf_Internal_Phdr));
f3520d2f 4122 elf_tdata (abfd)->phdr = phdrs;
252b5132 4123 if (phdrs == NULL)
b34976b6 4124 return FALSE;
252b5132 4125
3f570048
AM
4126 maxpagesize = 1;
4127 if ((abfd->flags & D_PAGED) != 0)
4128 maxpagesize = bed->maxpagesize;
4129
252b5132
RH
4130 off = bed->s->sizeof_ehdr;
4131 off += alloc * bed->s->sizeof_phdr;
4132
0920dee7 4133 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4134 m != NULL;
0920dee7 4135 m = m->next, p++, j++)
252b5132 4136 {
252b5132 4137 asection **secpp;
bf988460
AM
4138 bfd_vma off_adjust;
4139 bfd_boolean no_contents;
252b5132
RH
4140
4141 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4142 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4143 not be done to the PT_NOTE section of a corefile, which may
4144 contain several pseudo-sections artificially created by bfd.
4145 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4146 if (m->count > 1
4147 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4148 && m->p_type == PT_NOTE))
252b5132
RH
4149 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4150 elf_sort_sections);
4151
b301b248
AM
4152 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4153 number of sections with contents contributing to both p_filesz
4154 and p_memsz, followed by a number of sections with no contents
4155 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4156 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4157 p->p_type = m->p_type;
28a7f3e7 4158 p->p_flags = m->p_flags;
252b5132 4159
3f570048
AM
4160 if (m->count == 0)
4161 p->p_vaddr = 0;
4162 else
3271a814 4163 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4164
4165 if (m->p_paddr_valid)
4166 p->p_paddr = m->p_paddr;
4167 else if (m->count == 0)
4168 p->p_paddr = 0;
4169 else
08a40648 4170 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4171
4172 if (p->p_type == PT_LOAD
4173 && (abfd->flags & D_PAGED) != 0)
4174 {
4175 /* p_align in demand paged PT_LOAD segments effectively stores
4176 the maximum page size. When copying an executable with
4177 objcopy, we set m->p_align from the input file. Use this
4178 value for maxpagesize rather than bed->maxpagesize, which
4179 may be different. Note that we use maxpagesize for PT_TLS
4180 segment alignment later in this function, so we are relying
4181 on at least one PT_LOAD segment appearing before a PT_TLS
4182 segment. */
4183 if (m->p_align_valid)
4184 maxpagesize = m->p_align;
4185
4186 p->p_align = maxpagesize;
4187 }
3271a814
NS
4188 else if (m->p_align_valid)
4189 p->p_align = m->p_align;
e970b90a
DJ
4190 else if (m->count == 0)
4191 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4192 else
4193 p->p_align = 0;
4194
bf988460
AM
4195 no_contents = FALSE;
4196 off_adjust = 0;
252b5132 4197 if (p->p_type == PT_LOAD
b301b248 4198 && m->count > 0)
252b5132 4199 {
b301b248 4200 bfd_size_type align;
a49e53ed 4201 unsigned int align_power = 0;
b301b248 4202
3271a814
NS
4203 if (m->p_align_valid)
4204 align = p->p_align;
4205 else
252b5132 4206 {
3271a814
NS
4207 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4208 {
4209 unsigned int secalign;
08a40648 4210
3271a814
NS
4211 secalign = bfd_get_section_alignment (abfd, *secpp);
4212 if (secalign > align_power)
4213 align_power = secalign;
4214 }
4215 align = (bfd_size_type) 1 << align_power;
4216 if (align < maxpagesize)
4217 align = maxpagesize;
b301b248 4218 }
252b5132 4219
02bf8d82
AM
4220 for (i = 0; i < m->count; i++)
4221 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4222 /* If we aren't making room for this section, then
4223 it must be SHT_NOBITS regardless of what we've
4224 set via struct bfd_elf_special_section. */
4225 elf_section_type (m->sections[i]) = SHT_NOBITS;
4226
bf988460
AM
4227 /* Find out whether this segment contains any loadable
4228 sections. If the first section isn't loadable, the same
4229 holds for any other sections. */
4230 i = 0;
4231 while (elf_section_type (m->sections[i]) == SHT_NOBITS)
b301b248 4232 {
bf988460
AM
4233 /* If a segment starts with .tbss, we need to look
4234 at the next section to decide whether the segment
4235 has any loadable sections. */
4236 if ((elf_section_flags (m->sections[i]) & SHF_TLS) == 0
4237 || ++i >= m->count)
b301b248 4238 {
bf988460
AM
4239 no_contents = TRUE;
4240 break;
b301b248 4241 }
252b5132 4242 }
bf988460
AM
4243
4244 off_adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4245 off += off_adjust;
4246 if (no_contents)
4247 {
4248 /* We shouldn't need to align the segment on disk since
4249 the segment doesn't need file space, but the gABI
4250 arguably requires the alignment and glibc ld.so
4251 checks it. So to comply with the alignment
4252 requirement but not waste file space, we adjust
4253 p_offset for just this segment. (OFF_ADJUST is
4254 subtracted from OFF later.) This may put p_offset
4255 past the end of file, but that shouldn't matter. */
4256 }
4257 else
4258 off_adjust = 0;
252b5132 4259 }
b1a6d0b1
NC
4260 /* Make sure the .dynamic section is the first section in the
4261 PT_DYNAMIC segment. */
4262 else if (p->p_type == PT_DYNAMIC
4263 && m->count > 1
4264 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4265 {
4266 _bfd_error_handler
b301b248
AM
4267 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4268 abfd);
b1a6d0b1
NC
4269 bfd_set_error (bfd_error_bad_value);
4270 return FALSE;
4271 }
252b5132 4272
252b5132
RH
4273 p->p_offset = 0;
4274 p->p_filesz = 0;
4275 p->p_memsz = 0;
4276
4277 if (m->includes_filehdr)
4278 {
bf988460 4279 if (!m->p_flags_valid)
252b5132 4280 p->p_flags |= PF_R;
252b5132
RH
4281 p->p_filesz = bed->s->sizeof_ehdr;
4282 p->p_memsz = bed->s->sizeof_ehdr;
4283 if (m->count > 0)
4284 {
4285 BFD_ASSERT (p->p_type == PT_LOAD);
4286
4287 if (p->p_vaddr < (bfd_vma) off)
4288 {
caf47ea6 4289 (*_bfd_error_handler)
b301b248
AM
4290 (_("%B: Not enough room for program headers, try linking with -N"),
4291 abfd);
252b5132 4292 bfd_set_error (bfd_error_bad_value);
b34976b6 4293 return FALSE;
252b5132
RH
4294 }
4295
4296 p->p_vaddr -= off;
bf988460 4297 if (!m->p_paddr_valid)
252b5132
RH
4298 p->p_paddr -= off;
4299 }
252b5132
RH
4300 }
4301
4302 if (m->includes_phdrs)
4303 {
bf988460 4304 if (!m->p_flags_valid)
252b5132
RH
4305 p->p_flags |= PF_R;
4306
f3520d2f 4307 if (!m->includes_filehdr)
252b5132
RH
4308 {
4309 p->p_offset = bed->s->sizeof_ehdr;
4310
4311 if (m->count > 0)
4312 {
4313 BFD_ASSERT (p->p_type == PT_LOAD);
4314 p->p_vaddr -= off - p->p_offset;
bf988460 4315 if (!m->p_paddr_valid)
252b5132
RH
4316 p->p_paddr -= off - p->p_offset;
4317 }
252b5132
RH
4318 }
4319
4320 p->p_filesz += alloc * bed->s->sizeof_phdr;
4321 p->p_memsz += alloc * bed->s->sizeof_phdr;
4322 }
4323
4324 if (p->p_type == PT_LOAD
4325 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4326 {
bf988460 4327 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4328 p->p_offset = off;
252b5132
RH
4329 else
4330 {
4331 file_ptr adjust;
4332
4333 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4334 if (!no_contents)
4335 p->p_filesz += adjust;
252b5132
RH
4336 p->p_memsz += adjust;
4337 }
4338 }
4339
1ea63fd2
AM
4340 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4341 maps. Set filepos for sections in PT_LOAD segments, and in
4342 core files, for sections in PT_NOTE segments.
4343 assign_file_positions_for_non_load_sections will set filepos
4344 for other sections and update p_filesz for other segments. */
252b5132
RH
4345 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4346 {
4347 asection *sec;
252b5132 4348 bfd_size_type align;
627b32bc 4349 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4350
4351 sec = *secpp;
02bf8d82 4352 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4353 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4354
b301b248
AM
4355 if (p->p_type == PT_LOAD
4356 || p->p_type == PT_TLS)
252b5132 4357 {
8c252fd9 4358 bfd_signed_vma adjust = sec->lma - (p->p_paddr + p->p_memsz);
252b5132 4359
02bf8d82
AM
4360 if (this_hdr->sh_type != SHT_NOBITS
4361 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4362 && ((this_hdr->sh_flags & SHF_TLS) == 0
0e922b77 4363 || p->p_type == PT_TLS)))
252b5132 4364 {
252b5132 4365 if (adjust < 0)
b301b248
AM
4366 {
4367 (*_bfd_error_handler)
4368 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4369 abfd, sec, (unsigned long) sec->lma);
4370 adjust = 0;
4371 }
252b5132 4372 p->p_memsz += adjust;
0e922b77 4373
02bf8d82 4374 if (this_hdr->sh_type != SHT_NOBITS)
0e922b77
AM
4375 {
4376 off += adjust;
4377 p->p_filesz += adjust;
4378 }
252b5132 4379 }
252b5132
RH
4380 }
4381
4382 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4383 {
b301b248
AM
4384 /* The section at i == 0 is the one that actually contains
4385 everything. */
4a938328
MS
4386 if (i == 0)
4387 {
627b32bc 4388 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4389 off += this_hdr->sh_size;
4390 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4391 p->p_memsz = 0;
4392 p->p_align = 1;
252b5132 4393 }
4a938328 4394 else
252b5132 4395 {
b301b248 4396 /* The rest are fake sections that shouldn't be written. */
252b5132 4397 sec->filepos = 0;
eea6121a 4398 sec->size = 0;
b301b248
AM
4399 sec->flags = 0;
4400 continue;
252b5132 4401 }
252b5132
RH
4402 }
4403 else
4404 {
b301b248
AM
4405 if (p->p_type == PT_LOAD)
4406 {
02bf8d82
AM
4407 this_hdr->sh_offset = sec->filepos = off;
4408 if (this_hdr->sh_type != SHT_NOBITS)
6a3cd2b4 4409 off += this_hdr->sh_size;
b301b248 4410 }
252b5132 4411
02bf8d82 4412 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4413 {
6a3cd2b4 4414 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4415 /* A load section without SHF_ALLOC is something like
4416 a note section in a PT_NOTE segment. These take
4417 file space but are not loaded into memory. */
4418 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4419 p->p_memsz += this_hdr->sh_size;
b301b248 4420 }
6a3cd2b4 4421 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4422 {
6a3cd2b4
AM
4423 if (p->p_type == PT_TLS)
4424 p->p_memsz += this_hdr->sh_size;
4425
4426 /* .tbss is special. It doesn't contribute to p_memsz of
4427 normal segments. */
4428 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4429 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4430 }
4431
b10a8ae0
L
4432 if (align > p->p_align
4433 && !m->p_align_valid
4434 && (p->p_type != PT_LOAD
4435 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4436 p->p_align = align;
4437 }
4438
bf988460 4439 if (!m->p_flags_valid)
252b5132
RH
4440 {
4441 p->p_flags |= PF_R;
02bf8d82 4442 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4443 p->p_flags |= PF_X;
02bf8d82 4444 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4445 p->p_flags |= PF_W;
4446 }
4447 }
bf988460 4448 off -= off_adjust;
0920dee7 4449
7c928300
AM
4450 /* Check that all sections are in a PT_LOAD segment.
4451 Don't check funky gdb generated core files. */
4452 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
0920dee7
L
4453 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4454 {
4455 Elf_Internal_Shdr *this_hdr;
4456 asection *sec;
4457
4458 sec = *secpp;
4459 this_hdr = &(elf_section_data(sec)->this_hdr);
4460 if (this_hdr->sh_size != 0
4461 && !ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, p))
4462 {
4463 (*_bfd_error_handler)
4464 (_("%B: section `%A' can't be allocated in segment %d"),
4465 abfd, sec, j);
6d33f217 4466 print_segment_map (m);
0920dee7
L
4467 bfd_set_error (bfd_error_bad_value);
4468 return FALSE;
4469 }
4470 }
252b5132
RH
4471 }
4472
f3520d2f
AM
4473 elf_tdata (abfd)->next_file_pos = off;
4474 return TRUE;
4475}
4476
4477/* Assign file positions for the other sections. */
4478
4479static bfd_boolean
4480assign_file_positions_for_non_load_sections (bfd *abfd,
4481 struct bfd_link_info *link_info)
4482{
4483 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4484 Elf_Internal_Shdr **i_shdrpp;
4485 Elf_Internal_Shdr **hdrpp;
4486 Elf_Internal_Phdr *phdrs;
4487 Elf_Internal_Phdr *p;
4488 struct elf_segment_map *m;
4489 bfd_vma filehdr_vaddr, filehdr_paddr;
4490 bfd_vma phdrs_vaddr, phdrs_paddr;
4491 file_ptr off;
4492 unsigned int num_sec;
4493 unsigned int i;
4494 unsigned int count;
4495
5c182d5f
AM
4496 i_shdrpp = elf_elfsections (abfd);
4497 num_sec = elf_numsections (abfd);
f3520d2f 4498 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4499 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4500 {
4501 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4502 Elf_Internal_Shdr *hdr;
4503
4504 hdr = *hdrpp;
4505 if (hdr->bfd_section != NULL
252e386e
AM
4506 && (hdr->bfd_section->filepos != 0
4507 || (hdr->sh_type == SHT_NOBITS
4508 && hdr->contents == NULL)))
627b32bc 4509 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4510 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4511 {
49c13adb
L
4512 if (hdr->sh_size != 0)
4513 ((*_bfd_error_handler)
4514 (_("%B: warning: allocated section `%s' not in segment"),
3ba71138
L
4515 abfd,
4516 (hdr->bfd_section == NULL
4517 ? "*unknown*"
4518 : hdr->bfd_section->name)));
4519 /* We don't need to page align empty sections. */
4520 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4521 off += vma_page_aligned_bias (hdr->sh_addr, off,
4522 bed->maxpagesize);
4523 else
4524 off += vma_page_aligned_bias (hdr->sh_addr, off,
4525 hdr->sh_addralign);
4526 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4527 FALSE);
4528 }
4529 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4530 && hdr->bfd_section == NULL)
4531 || hdr == i_shdrpp[tdata->symtab_section]
4532 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4533 || hdr == i_shdrpp[tdata->strtab_section])
4534 hdr->sh_offset = -1;
4535 else
4536 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4537
4538 if (i == SHN_LORESERVE - 1)
4539 {
4540 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4541 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4542 }
4543 }
4544
252b5132
RH
4545 /* Now that we have set the section file positions, we can set up
4546 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4547 count = 0;
4548 filehdr_vaddr = 0;
4549 filehdr_paddr = 0;
4550 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4551 phdrs_paddr = 0;
4552 phdrs = elf_tdata (abfd)->phdr;
4553 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4554 m != NULL;
4555 m = m->next, p++)
4556 {
4557 ++count;
4558 if (p->p_type != PT_LOAD)
4559 continue;
4560
4561 if (m->includes_filehdr)
4562 {
4563 filehdr_vaddr = p->p_vaddr;
4564 filehdr_paddr = p->p_paddr;
4565 }
4566 if (m->includes_phdrs)
4567 {
4568 phdrs_vaddr = p->p_vaddr;
4569 phdrs_paddr = p->p_paddr;
4570 if (m->includes_filehdr)
4571 {
4572 phdrs_vaddr += bed->s->sizeof_ehdr;
4573 phdrs_paddr += bed->s->sizeof_ehdr;
4574 }
4575 }
4576 }
4577
252b5132
RH
4578 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4579 m != NULL;
4580 m = m->next, p++)
4581 {
1ea63fd2 4582 if (m->count != 0)
252b5132 4583 {
1ea63fd2 4584 if (p->p_type != PT_LOAD
b10a8ae0
L
4585 && (p->p_type != PT_NOTE
4586 || bfd_get_format (abfd) != bfd_core))
229fcec5 4587 {
1ea63fd2 4588 Elf_Internal_Shdr *hdr;
b10a8ae0
L
4589 asection *sect;
4590
1ea63fd2
AM
4591 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4592
b10a8ae0
L
4593 sect = m->sections[m->count - 1];
4594 hdr = &elf_section_data (sect)->this_hdr;
4595 p->p_filesz = sect->filepos - m->sections[0]->filepos;
1ea63fd2
AM
4596 if (hdr->sh_type != SHT_NOBITS)
4597 p->p_filesz += hdr->sh_size;
4598
b10a8ae0
L
4599 if (p->p_type == PT_GNU_RELRO)
4600 {
4601 /* When we get here, we are copying executable
4602 or shared library. But we need to use the same
4603 linker logic. */
4604 Elf_Internal_Phdr *lp;
4605
4606 for (lp = phdrs; lp < phdrs + count; ++lp)
4607 {
4608 if (lp->p_type == PT_LOAD
4609 && lp->p_paddr == p->p_paddr)
4610 break;
4611 }
4612
4613 if (lp < phdrs + count)
4614 {
4615 /* We should use p_size if it is valid since it
4616 may contain the first few bytes of the next
4617 SEC_ALLOC section. */
4618 if (m->p_size_valid)
4619 p->p_filesz = m->p_size;
4620 else
4621 abort ();
4622 p->p_vaddr = lp->p_vaddr;
4623 p->p_offset = lp->p_offset;
4624 p->p_memsz = p->p_filesz;
4625 p->p_align = 1;
4626 }
4627 else
4628 abort ();
4629 }
4630 else
4631 p->p_offset = m->sections[0]->filepos;
229fcec5 4632 }
252b5132 4633 }
1ea63fd2 4634 else
252b5132
RH
4635 {
4636 if (m->includes_filehdr)
4637 {
4638 p->p_vaddr = filehdr_vaddr;
4639 if (! m->p_paddr_valid)
4640 p->p_paddr = filehdr_paddr;
4641 }
4642 else if (m->includes_phdrs)
4643 {
4644 p->p_vaddr = phdrs_vaddr;
4645 if (! m->p_paddr_valid)
4646 p->p_paddr = phdrs_paddr;
4647 }
8c37241b
JJ
4648 else if (p->p_type == PT_GNU_RELRO)
4649 {
4650 Elf_Internal_Phdr *lp;
4651
4652 for (lp = phdrs; lp < phdrs + count; ++lp)
4653 {
4654 if (lp->p_type == PT_LOAD
4655 && lp->p_vaddr <= link_info->relro_end
4656 && lp->p_vaddr >= link_info->relro_start
e36284ab
AM
4657 && (lp->p_vaddr + lp->p_filesz
4658 >= link_info->relro_end))
8c37241b
JJ
4659 break;
4660 }
4661
4662 if (lp < phdrs + count
4663 && link_info->relro_end > lp->p_vaddr)
4664 {
4665 p->p_vaddr = lp->p_vaddr;
4666 p->p_paddr = lp->p_paddr;
4667 p->p_offset = lp->p_offset;
4668 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4669 p->p_memsz = p->p_filesz;
4670 p->p_align = 1;
4671 p->p_flags = (lp->p_flags & ~PF_W);
4672 }
4673 else
4674 {
4675 memset (p, 0, sizeof *p);
4676 p->p_type = PT_NULL;
4677 }
4678 }
252b5132
RH
4679 }
4680 }
4681
252b5132
RH
4682 elf_tdata (abfd)->next_file_pos = off;
4683
b34976b6 4684 return TRUE;
252b5132
RH
4685}
4686
252b5132
RH
4687/* Work out the file positions of all the sections. This is called by
4688 _bfd_elf_compute_section_file_positions. All the section sizes and
4689 VMAs must be known before this is called.
4690
e0638f70
AM
4691 Reloc sections come in two flavours: Those processed specially as
4692 "side-channel" data attached to a section to which they apply, and
4693 those that bfd doesn't process as relocations. The latter sort are
4694 stored in a normal bfd section by bfd_section_from_shdr. We don't
4695 consider the former sort here, unless they form part of the loadable
4696 image. Reloc sections not assigned here will be handled later by
4697 assign_file_positions_for_relocs.
252b5132
RH
4698
4699 We also don't set the positions of the .symtab and .strtab here. */
4700
b34976b6 4701static bfd_boolean
c84fca4d
AO
4702assign_file_positions_except_relocs (bfd *abfd,
4703 struct bfd_link_info *link_info)
252b5132 4704{
5c182d5f
AM
4705 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4706 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4707 file_ptr off;
9c5bfbb7 4708 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4709
4710 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4711 && bfd_get_format (abfd) != bfd_core)
4712 {
5c182d5f
AM
4713 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4714 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4715 Elf_Internal_Shdr **hdrpp;
4716 unsigned int i;
4717
4718 /* Start after the ELF header. */
4719 off = i_ehdrp->e_ehsize;
4720
4721 /* We are not creating an executable, which means that we are
4722 not creating a program header, and that the actual order of
4723 the sections in the file is unimportant. */
9ad5cbcf 4724 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4725 {
4726 Elf_Internal_Shdr *hdr;
4727
4728 hdr = *hdrpp;
e0638f70
AM
4729 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4730 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4731 || i == tdata->symtab_section
4732 || i == tdata->symtab_shndx_section
252b5132
RH
4733 || i == tdata->strtab_section)
4734 {
4735 hdr->sh_offset = -1;
252b5132 4736 }
9ad5cbcf 4737 else
b34976b6 4738 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4739
9ad5cbcf
AM
4740 if (i == SHN_LORESERVE - 1)
4741 {
4742 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4743 hdrpp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
4744 }
252b5132
RH
4745 }
4746 }
4747 else
4748 {
f3520d2f
AM
4749 unsigned int alloc;
4750
252b5132 4751 /* Assign file positions for the loaded sections based on the
08a40648 4752 assignment of sections to segments. */
f3520d2f
AM
4753 if (!assign_file_positions_for_load_sections (abfd, link_info))
4754 return FALSE;
4755
4756 /* And for non-load sections. */
4757 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4758 return FALSE;
4759
e36284ab
AM
4760 if (bed->elf_backend_modify_program_headers != NULL)
4761 {
4762 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4763 return FALSE;
4764 }
4765
f3520d2f
AM
4766 /* Write out the program headers. */
4767 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4768 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4769 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4770 return FALSE;
252b5132 4771
5c182d5f 4772 off = tdata->next_file_pos;
252b5132
RH
4773 }
4774
4775 /* Place the section headers. */
45d6a902 4776 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4777 i_ehdrp->e_shoff = off;
4778 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4779
5c182d5f 4780 tdata->next_file_pos = off;
252b5132 4781
b34976b6 4782 return TRUE;
252b5132
RH
4783}
4784
b34976b6 4785static bfd_boolean
217aa764 4786prep_headers (bfd *abfd)
252b5132
RH
4787{
4788 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4789 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
4790 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
2b0f7ef9 4791 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4792 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4793
4794 i_ehdrp = elf_elfheader (abfd);
4795 i_shdrp = elf_elfsections (abfd);
4796
2b0f7ef9 4797 shstrtab = _bfd_elf_strtab_init ();
252b5132 4798 if (shstrtab == NULL)
b34976b6 4799 return FALSE;
252b5132
RH
4800
4801 elf_shstrtab (abfd) = shstrtab;
4802
4803 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4804 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4805 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4806 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4807
4808 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4809 i_ehdrp->e_ident[EI_DATA] =
4810 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4811 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4812
252b5132
RH
4813 if ((abfd->flags & DYNAMIC) != 0)
4814 i_ehdrp->e_type = ET_DYN;
4815 else if ((abfd->flags & EXEC_P) != 0)
4816 i_ehdrp->e_type = ET_EXEC;
4817 else if (bfd_get_format (abfd) == bfd_core)
4818 i_ehdrp->e_type = ET_CORE;
4819 else
4820 i_ehdrp->e_type = ET_REL;
4821
4822 switch (bfd_get_arch (abfd))
4823 {
4824 case bfd_arch_unknown:
4825 i_ehdrp->e_machine = EM_NONE;
4826 break;
aa4f99bb
AO
4827
4828 /* There used to be a long list of cases here, each one setting
4829 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4830 in the corresponding bfd definition. To avoid duplication,
4831 the switch was removed. Machines that need special handling
4832 can generally do it in elf_backend_final_write_processing(),
4833 unless they need the information earlier than the final write.
4834 Such need can generally be supplied by replacing the tests for
4835 e_machine with the conditions used to determine it. */
252b5132 4836 default:
9c5bfbb7
AM
4837 i_ehdrp->e_machine = bed->elf_machine_code;
4838 }
aa4f99bb 4839
252b5132
RH
4840 i_ehdrp->e_version = bed->s->ev_current;
4841 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4842
c044fabd 4843 /* No program header, for now. */
252b5132
RH
4844 i_ehdrp->e_phoff = 0;
4845 i_ehdrp->e_phentsize = 0;
4846 i_ehdrp->e_phnum = 0;
4847
c044fabd 4848 /* Each bfd section is section header entry. */
252b5132
RH
4849 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4850 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4851
c044fabd 4852 /* If we're building an executable, we'll need a program header table. */
252b5132 4853 if (abfd->flags & EXEC_P)
0e71e495
BE
4854 /* It all happens later. */
4855 ;
252b5132
RH
4856 else
4857 {
4858 i_ehdrp->e_phentsize = 0;
4859 i_phdrp = 0;
4860 i_ehdrp->e_phoff = 0;
4861 }
4862
4863 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4864 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4865 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4866 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4867 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4868 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4869 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4870 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4871 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4872 return FALSE;
252b5132 4873
b34976b6 4874 return TRUE;
252b5132
RH
4875}
4876
4877/* Assign file positions for all the reloc sections which are not part
4878 of the loadable file image. */
4879
4880void
217aa764 4881_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4882{
4883 file_ptr off;
9ad5cbcf 4884 unsigned int i, num_sec;
252b5132
RH
4885 Elf_Internal_Shdr **shdrpp;
4886
4887 off = elf_tdata (abfd)->next_file_pos;
4888
9ad5cbcf
AM
4889 num_sec = elf_numsections (abfd);
4890 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4891 {
4892 Elf_Internal_Shdr *shdrp;
4893
4894 shdrp = *shdrpp;
4895 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4896 && shdrp->sh_offset == -1)
b34976b6 4897 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4898 }
4899
4900 elf_tdata (abfd)->next_file_pos = off;
4901}
4902
b34976b6 4903bfd_boolean
217aa764 4904_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4905{
9c5bfbb7 4906 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4907 Elf_Internal_Ehdr *i_ehdrp;
4908 Elf_Internal_Shdr **i_shdrp;
b34976b6 4909 bfd_boolean failed;
9ad5cbcf 4910 unsigned int count, num_sec;
252b5132
RH
4911
4912 if (! abfd->output_has_begun
217aa764 4913 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4914 return FALSE;
252b5132
RH
4915
4916 i_shdrp = elf_elfsections (abfd);
4917 i_ehdrp = elf_elfheader (abfd);
4918
b34976b6 4919 failed = FALSE;
252b5132
RH
4920 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4921 if (failed)
b34976b6 4922 return FALSE;
252b5132
RH
4923
4924 _bfd_elf_assign_file_positions_for_relocs (abfd);
4925
c044fabd 4926 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4927 num_sec = elf_numsections (abfd);
4928 for (count = 1; count < num_sec; count++)
252b5132
RH
4929 {
4930 if (bed->elf_backend_section_processing)
4931 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4932 if (i_shdrp[count]->contents)
4933 {
dc810e39
AM
4934 bfd_size_type amt = i_shdrp[count]->sh_size;
4935
252b5132 4936 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4937 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4938 return FALSE;
252b5132 4939 }
9ad5cbcf
AM
4940 if (count == SHN_LORESERVE - 1)
4941 count += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
4942 }
4943
4944 /* Write out the section header names. */
26ae6d5e
DJ
4945 if (elf_shstrtab (abfd) != NULL
4946 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 4947 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4948 return FALSE;
252b5132
RH
4949
4950 if (bed->elf_backend_final_write_processing)
4951 (*bed->elf_backend_final_write_processing) (abfd,
4952 elf_tdata (abfd)->linker);
4953
ff59fc36
RM
4954 if (!bed->s->write_shdrs_and_ehdr (abfd))
4955 return FALSE;
4956
4957 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
4958 if (elf_tdata (abfd)->after_write_object_contents)
4959 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
4960
4961 return TRUE;
252b5132
RH
4962}
4963
b34976b6 4964bfd_boolean
217aa764 4965_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4966{
c044fabd 4967 /* Hopefully this can be done just like an object file. */
252b5132
RH
4968 return _bfd_elf_write_object_contents (abfd);
4969}
c044fabd
KH
4970
4971/* Given a section, search the header to find them. */
4972
252b5132 4973int
198beae2 4974_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 4975{
9c5bfbb7 4976 const struct elf_backend_data *bed;
252b5132 4977 int index;
252b5132 4978
9ad5cbcf
AM
4979 if (elf_section_data (asect) != NULL
4980 && elf_section_data (asect)->this_idx != 0)
4981 return elf_section_data (asect)->this_idx;
4982
4983 if (bfd_is_abs_section (asect))
af746e92
AM
4984 index = SHN_ABS;
4985 else if (bfd_is_com_section (asect))
4986 index = SHN_COMMON;
4987 else if (bfd_is_und_section (asect))
4988 index = SHN_UNDEF;
4989 else
6dc132d9 4990 index = -1;
252b5132 4991
af746e92 4992 bed = get_elf_backend_data (abfd);
252b5132
RH
4993 if (bed->elf_backend_section_from_bfd_section)
4994 {
af746e92 4995 int retval = index;
9ad5cbcf 4996
af746e92
AM
4997 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
4998 return retval;
252b5132
RH
4999 }
5000
af746e92
AM
5001 if (index == -1)
5002 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5003
af746e92 5004 return index;
252b5132
RH
5005}
5006
5007/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5008 on error. */
5009
5010int
217aa764 5011_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5012{
5013 asymbol *asym_ptr = *asym_ptr_ptr;
5014 int idx;
5015 flagword flags = asym_ptr->flags;
5016
5017 /* When gas creates relocations against local labels, it creates its
5018 own symbol for the section, but does put the symbol into the
5019 symbol chain, so udata is 0. When the linker is generating
5020 relocatable output, this section symbol may be for one of the
5021 input sections rather than the output section. */
5022 if (asym_ptr->udata.i == 0
5023 && (flags & BSF_SECTION_SYM)
5024 && asym_ptr->section)
5025 {
5372391b 5026 asection *sec;
252b5132
RH
5027 int indx;
5028
5372391b
AM
5029 sec = asym_ptr->section;
5030 if (sec->owner != abfd && sec->output_section != NULL)
5031 sec = sec->output_section;
5032 if (sec->owner == abfd
5033 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5034 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5035 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5036 }
5037
5038 idx = asym_ptr->udata.i;
5039
5040 if (idx == 0)
5041 {
5042 /* This case can occur when using --strip-symbol on a symbol
08a40648 5043 which is used in a relocation entry. */
252b5132 5044 (*_bfd_error_handler)
d003868e
AM
5045 (_("%B: symbol `%s' required but not present"),
5046 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5047 bfd_set_error (bfd_error_no_symbols);
5048 return -1;
5049 }
5050
5051#if DEBUG & 4
5052 {
5053 fprintf (stderr,
661a3fd4 5054 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5055 (long) asym_ptr, asym_ptr->name, idx, flags,
5056 elf_symbol_flags (flags));
5057 fflush (stderr);
5058 }
5059#endif
5060
5061 return idx;
5062}
5063
84d1d650 5064/* Rewrite program header information. */
252b5132 5065
b34976b6 5066static bfd_boolean
84d1d650 5067rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5068{
b34976b6
AM
5069 Elf_Internal_Ehdr *iehdr;
5070 struct elf_segment_map *map;
5071 struct elf_segment_map *map_first;
5072 struct elf_segment_map **pointer_to_map;
5073 Elf_Internal_Phdr *segment;
5074 asection *section;
5075 unsigned int i;
5076 unsigned int num_segments;
5077 bfd_boolean phdr_included = FALSE;
5078 bfd_vma maxpagesize;
5079 struct elf_segment_map *phdr_adjust_seg = NULL;
5080 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5081 const struct elf_backend_data *bed;
bc67d8a6 5082
caf47ea6 5083 bed = get_elf_backend_data (ibfd);
252b5132
RH
5084 iehdr = elf_elfheader (ibfd);
5085
bc67d8a6 5086 map_first = NULL;
c044fabd 5087 pointer_to_map = &map_first;
252b5132
RH
5088
5089 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5090 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5091
5092 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5093#define SEGMENT_END(segment, start) \
5094 (start + (segment->p_memsz > segment->p_filesz \
5095 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5096
eecdbe52
JJ
5097#define SECTION_SIZE(section, segment) \
5098 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5099 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5100 ? section->size : 0)
eecdbe52 5101
b34976b6 5102 /* Returns TRUE if the given section is contained within
bc67d8a6 5103 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5104#define IS_CONTAINED_BY_VMA(section, segment) \
5105 (section->vma >= segment->p_vaddr \
eecdbe52 5106 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5107 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5108
b34976b6 5109 /* Returns TRUE if the given section is contained within
bc67d8a6 5110 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5111#define IS_CONTAINED_BY_LMA(section, segment, base) \
5112 (section->lma >= base \
eecdbe52 5113 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5114 <= SEGMENT_END (segment, base)))
252b5132 5115
0efc80c8
L
5116 /* Handle PT_NOTE segment. */
5117#define IS_NOTE(p, s) \
aecc8f8a 5118 (p->p_type == PT_NOTE \
0efc80c8 5119 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5120 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5121 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5122 <= p->p_offset + p->p_filesz))
252b5132 5123
0efc80c8
L
5124 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5125 etc. */
5126#define IS_COREFILE_NOTE(p, s) \
5127 (IS_NOTE (p, s) \
5128 && bfd_get_format (ibfd) == bfd_core \
5129 && s->vma == 0 \
5130 && s->lma == 0)
5131
252b5132
RH
5132 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5133 linker, which generates a PT_INTERP section with p_vaddr and
5134 p_memsz set to 0. */
aecc8f8a
AM
5135#define IS_SOLARIS_PT_INTERP(p, s) \
5136 (p->p_vaddr == 0 \
5137 && p->p_paddr == 0 \
5138 && p->p_memsz == 0 \
5139 && p->p_filesz > 0 \
5140 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5141 && s->size > 0 \
aecc8f8a 5142 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5143 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5144 <= p->p_offset + p->p_filesz))
5c440b1e 5145
bc67d8a6
NC
5146 /* Decide if the given section should be included in the given segment.
5147 A section will be included if:
f5ffc919 5148 1. It is within the address space of the segment -- we use the LMA
08a40648 5149 if that is set for the segment and the VMA otherwise,
0efc80c8
L
5150 2. It is an allocated section or a NOTE section in a PT_NOTE
5151 segment.
bc67d8a6 5152 3. There is an output section associated with it,
eecdbe52 5153 4. The section has not already been allocated to a previous segment.
2b05f1b7 5154 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5155 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5156 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5157 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5158 (with the possible exception of .dynamic). */
9f17e2a6 5159#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5160 ((((segment->p_paddr \
5161 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5162 : IS_CONTAINED_BY_VMA (section, segment)) \
5163 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5164 || IS_NOTE (segment, section)) \
2b05f1b7
L
5165 && segment->p_type != PT_GNU_STACK \
5166 && (segment->p_type != PT_TLS \
5167 || (section->flags & SEC_THREAD_LOCAL)) \
5168 && (segment->p_type == PT_LOAD \
5169 || segment->p_type == PT_TLS \
5170 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5171 && (segment->p_type != PT_DYNAMIC \
5172 || SECTION_SIZE (section, segment) > 0 \
5173 || (segment->p_paddr \
5174 ? segment->p_paddr != section->lma \
5175 : segment->p_vaddr != section->vma) \
5176 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5177 == 0)) \
0067a569 5178 && !section->segment_mark)
bc67d8a6 5179
9f17e2a6
L
5180/* If the output section of a section in the input segment is NULL,
5181 it is removed from the corresponding output segment. */
5182#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5183 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5184 && section->output_section != NULL)
5185
b34976b6 5186 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5187#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5188 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5189
5190 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5191 their VMA address ranges and their LMA address ranges overlap.
5192 It is possible to have overlapping VMA ranges without overlapping LMA
5193 ranges. RedBoot images for example can have both .data and .bss mapped
5194 to the same VMA range, but with the .data section mapped to a different
5195 LMA. */
aecc8f8a 5196#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5197 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5198 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5199 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5200 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5201
5202 /* Initialise the segment mark field. */
5203 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5204 section->segment_mark = FALSE;
bc67d8a6 5205
252b5132 5206 /* Scan through the segments specified in the program header
bc67d8a6 5207 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5208 in the loadable segments. These can be created by weird
aecc8f8a 5209 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5210 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5211 i < num_segments;
c044fabd 5212 i++, segment++)
252b5132 5213 {
252b5132 5214 unsigned int j;
c044fabd 5215 Elf_Internal_Phdr *segment2;
252b5132 5216
aecc8f8a
AM
5217 if (segment->p_type == PT_INTERP)
5218 for (section = ibfd->sections; section; section = section->next)
5219 if (IS_SOLARIS_PT_INTERP (segment, section))
5220 {
5221 /* Mininal change so that the normal section to segment
4cc11e76 5222 assignment code will work. */
aecc8f8a
AM
5223 segment->p_vaddr = section->vma;
5224 break;
5225 }
5226
bc67d8a6 5227 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5228 {
5229 /* Remove PT_GNU_RELRO segment. */
5230 if (segment->p_type == PT_GNU_RELRO)
5231 segment->p_type = PT_NULL;
5232 continue;
5233 }
c044fabd 5234
bc67d8a6 5235 /* Determine if this segment overlaps any previous segments. */
0067a569 5236 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5237 {
5238 bfd_signed_vma extra_length;
c044fabd 5239
bc67d8a6 5240 if (segment2->p_type != PT_LOAD
0067a569 5241 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5242 continue;
c044fabd 5243
bc67d8a6
NC
5244 /* Merge the two segments together. */
5245 if (segment2->p_vaddr < segment->p_vaddr)
5246 {
c044fabd 5247 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5248 SEGMENT. */
0067a569
AM
5249 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5250 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5251
bc67d8a6
NC
5252 if (extra_length > 0)
5253 {
0067a569 5254 segment2->p_memsz += extra_length;
bc67d8a6
NC
5255 segment2->p_filesz += extra_length;
5256 }
c044fabd 5257
bc67d8a6 5258 segment->p_type = PT_NULL;
c044fabd 5259
bc67d8a6
NC
5260 /* Since we have deleted P we must restart the outer loop. */
5261 i = 0;
5262 segment = elf_tdata (ibfd)->phdr;
5263 break;
5264 }
5265 else
5266 {
c044fabd 5267 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5268 SEGMENT2. */
0067a569
AM
5269 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5270 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5271
bc67d8a6
NC
5272 if (extra_length > 0)
5273 {
0067a569 5274 segment->p_memsz += extra_length;
bc67d8a6
NC
5275 segment->p_filesz += extra_length;
5276 }
c044fabd 5277
bc67d8a6
NC
5278 segment2->p_type = PT_NULL;
5279 }
5280 }
5281 }
c044fabd 5282
bc67d8a6
NC
5283 /* The second scan attempts to assign sections to segments. */
5284 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5285 i < num_segments;
0067a569 5286 i++, segment++)
bc67d8a6 5287 {
0067a569
AM
5288 unsigned int section_count;
5289 asection **sections;
5290 asection *output_section;
5291 unsigned int isec;
5292 bfd_vma matching_lma;
5293 bfd_vma suggested_lma;
5294 unsigned int j;
dc810e39 5295 bfd_size_type amt;
0067a569
AM
5296 asection *first_section;
5297 bfd_boolean first_matching_lma;
5298 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5299
5300 if (segment->p_type == PT_NULL)
5301 continue;
c044fabd 5302
9f17e2a6 5303 first_section = NULL;
bc67d8a6 5304 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5305 for (section = ibfd->sections, section_count = 0;
5306 section != NULL;
5307 section = section->next)
9f17e2a6
L
5308 {
5309 /* Find the first section in the input segment, which may be
5310 removed from the corresponding output segment. */
5311 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5312 {
5313 if (first_section == NULL)
5314 first_section = section;
5315 if (section->output_section != NULL)
5316 ++section_count;
5317 }
5318 }
811072d8 5319
b5f852ea
NC
5320 /* Allocate a segment map big enough to contain
5321 all of the sections we have selected. */
dc810e39
AM
5322 amt = sizeof (struct elf_segment_map);
5323 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
41f8ce69 5324 map = bfd_zalloc (obfd, amt);
bc67d8a6 5325 if (map == NULL)
b34976b6 5326 return FALSE;
252b5132
RH
5327
5328 /* Initialise the fields of the segment map. Default to
5329 using the physical address of the segment in the input BFD. */
0067a569
AM
5330 map->next = NULL;
5331 map->p_type = segment->p_type;
5332 map->p_flags = segment->p_flags;
bc67d8a6 5333 map->p_flags_valid = 1;
55d55ac7 5334
9f17e2a6
L
5335 /* If the first section in the input segment is removed, there is
5336 no need to preserve segment physical address in the corresponding
5337 output segment. */
945c025a 5338 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5339 {
5340 map->p_paddr = segment->p_paddr;
5341 map->p_paddr_valid = 1;
5342 }
252b5132
RH
5343
5344 /* Determine if this segment contains the ELF file header
5345 and if it contains the program headers themselves. */
bc67d8a6
NC
5346 map->includes_filehdr = (segment->p_offset == 0
5347 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5348 map->includes_phdrs = 0;
252b5132 5349
0067a569 5350 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5351 {
bc67d8a6
NC
5352 map->includes_phdrs =
5353 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5354 && (segment->p_offset + segment->p_filesz
252b5132
RH
5355 >= ((bfd_vma) iehdr->e_phoff
5356 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5357
bc67d8a6 5358 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5359 phdr_included = TRUE;
252b5132
RH
5360 }
5361
bc67d8a6 5362 if (section_count == 0)
252b5132
RH
5363 {
5364 /* Special segments, such as the PT_PHDR segment, may contain
5365 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5366 something. They are allowed by the ELF spec however, so only
5367 a warning is produced. */
bc67d8a6 5368 if (segment->p_type == PT_LOAD)
0067a569
AM
5369 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5370 " detected, is this intentional ?\n"),
5371 ibfd);
252b5132 5372
bc67d8a6 5373 map->count = 0;
c044fabd
KH
5374 *pointer_to_map = map;
5375 pointer_to_map = &map->next;
252b5132
RH
5376
5377 continue;
5378 }
5379
5380 /* Now scan the sections in the input BFD again and attempt
5381 to add their corresponding output sections to the segment map.
5382 The problem here is how to handle an output section which has
5383 been moved (ie had its LMA changed). There are four possibilities:
5384
5385 1. None of the sections have been moved.
5386 In this case we can continue to use the segment LMA from the
5387 input BFD.
5388
5389 2. All of the sections have been moved by the same amount.
5390 In this case we can change the segment's LMA to match the LMA
5391 of the first section.
5392
5393 3. Some of the sections have been moved, others have not.
5394 In this case those sections which have not been moved can be
5395 placed in the current segment which will have to have its size,
5396 and possibly its LMA changed, and a new segment or segments will
5397 have to be created to contain the other sections.
5398
b5f852ea 5399 4. The sections have been moved, but not by the same amount.
252b5132
RH
5400 In this case we can change the segment's LMA to match the LMA
5401 of the first section and we will have to create a new segment
5402 or segments to contain the other sections.
5403
5404 In order to save time, we allocate an array to hold the section
5405 pointers that we are interested in. As these sections get assigned
5406 to a segment, they are removed from this array. */
5407
0b14c2aa
L
5408 /* Gcc 2.96 miscompiles this code on mips. Don't do casting here
5409 to work around this long long bug. */
d0fb9a8d 5410 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5411 if (sections == NULL)
b34976b6 5412 return FALSE;
252b5132
RH
5413
5414 /* Step One: Scan for segment vs section LMA conflicts.
5415 Also add the sections to the section array allocated above.
5416 Also add the sections to the current segment. In the common
5417 case, where the sections have not been moved, this means that
5418 we have completely filled the segment, and there is nothing
5419 more to do. */
252b5132 5420 isec = 0;
72730e0c 5421 matching_lma = 0;
252b5132 5422 suggested_lma = 0;
0067a569
AM
5423 first_matching_lma = TRUE;
5424 first_suggested_lma = TRUE;
252b5132 5425
147d51c2 5426 for (section = ibfd->sections;
bc67d8a6
NC
5427 section != NULL;
5428 section = section->next)
147d51c2
L
5429 if (section == first_section)
5430 break;
5431
5432 for (j = 0; section != NULL; section = section->next)
252b5132 5433 {
caf47ea6 5434 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5435 {
bc67d8a6
NC
5436 output_section = section->output_section;
5437
0067a569 5438 sections[j++] = section;
252b5132
RH
5439
5440 /* The Solaris native linker always sets p_paddr to 0.
5441 We try to catch that case here, and set it to the
5e8d7549
NC
5442 correct value. Note - some backends require that
5443 p_paddr be left as zero. */
bc67d8a6 5444 if (segment->p_paddr == 0
4455705d 5445 && segment->p_vaddr != 0
0067a569 5446 && !bed->want_p_paddr_set_to_zero
252b5132 5447 && isec == 0
bc67d8a6 5448 && output_section->lma != 0
0067a569
AM
5449 && output_section->vma == (segment->p_vaddr
5450 + (map->includes_filehdr
5451 ? iehdr->e_ehsize
5452 : 0)
5453 + (map->includes_phdrs
5454 ? (iehdr->e_phnum
5455 * iehdr->e_phentsize)
5456 : 0)))
bc67d8a6 5457 map->p_paddr = segment->p_vaddr;
252b5132
RH
5458
5459 /* Match up the physical address of the segment with the
5460 LMA address of the output section. */
bc67d8a6 5461 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5462 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5463 || (bed->want_p_paddr_set_to_zero
5464 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5465 {
0067a569
AM
5466 if (first_matching_lma || output_section->lma < matching_lma)
5467 {
5468 matching_lma = output_section->lma;
5469 first_matching_lma = FALSE;
5470 }
252b5132
RH
5471
5472 /* We assume that if the section fits within the segment
bc67d8a6 5473 then it does not overlap any other section within that
252b5132 5474 segment. */
0067a569
AM
5475 map->sections[isec++] = output_section;
5476 }
5477 else if (first_suggested_lma)
5478 {
5479 suggested_lma = output_section->lma;
5480 first_suggested_lma = FALSE;
252b5132 5481 }
147d51c2
L
5482
5483 if (j == section_count)
5484 break;
252b5132
RH
5485 }
5486 }
5487
bc67d8a6 5488 BFD_ASSERT (j == section_count);
252b5132
RH
5489
5490 /* Step Two: Adjust the physical address of the current segment,
5491 if necessary. */
bc67d8a6 5492 if (isec == section_count)
252b5132
RH
5493 {
5494 /* All of the sections fitted within the segment as currently
5495 specified. This is the default case. Add the segment to
5496 the list of built segments and carry on to process the next
5497 program header in the input BFD. */
bc67d8a6 5498 map->count = section_count;
c044fabd
KH
5499 *pointer_to_map = map;
5500 pointer_to_map = &map->next;
08a40648 5501
147d51c2
L
5502 if (!bed->want_p_paddr_set_to_zero
5503 && matching_lma != map->p_paddr
3271a814
NS
5504 && !map->includes_filehdr && !map->includes_phdrs)
5505 /* There is some padding before the first section in the
5506 segment. So, we must account for that in the output
5507 segment's vma. */
5508 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5509
252b5132
RH
5510 free (sections);
5511 continue;
5512 }
252b5132
RH
5513 else
5514 {
0067a569 5515 if (!first_matching_lma)
72730e0c
AM
5516 {
5517 /* At least one section fits inside the current segment.
5518 Keep it, but modify its physical address to match the
5519 LMA of the first section that fitted. */
bc67d8a6 5520 map->p_paddr = matching_lma;
72730e0c
AM
5521 }
5522 else
5523 {
5524 /* None of the sections fitted inside the current segment.
5525 Change the current segment's physical address to match
5526 the LMA of the first section. */
bc67d8a6 5527 map->p_paddr = suggested_lma;
72730e0c
AM
5528 }
5529
bc67d8a6
NC
5530 /* Offset the segment physical address from the lma
5531 to allow for space taken up by elf headers. */
5532 if (map->includes_filehdr)
5533 map->p_paddr -= iehdr->e_ehsize;
252b5132 5534
bc67d8a6
NC
5535 if (map->includes_phdrs)
5536 {
5537 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5538
5539 /* iehdr->e_phnum is just an estimate of the number
5540 of program headers that we will need. Make a note
5541 here of the number we used and the segment we chose
5542 to hold these headers, so that we can adjust the
5543 offset when we know the correct value. */
5544 phdr_adjust_num = iehdr->e_phnum;
5545 phdr_adjust_seg = map;
5546 }
252b5132
RH
5547 }
5548
5549 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5550 those that fit to the current segment and removing them from the
252b5132
RH
5551 sections array; but making sure not to leave large gaps. Once all
5552 possible sections have been assigned to the current segment it is
5553 added to the list of built segments and if sections still remain
5554 to be assigned, a new segment is constructed before repeating
5555 the loop. */
5556 isec = 0;
5557 do
5558 {
bc67d8a6 5559 map->count = 0;
252b5132 5560 suggested_lma = 0;
0067a569 5561 first_suggested_lma = TRUE;
252b5132
RH
5562
5563 /* Fill the current segment with sections that fit. */
bc67d8a6 5564 for (j = 0; j < section_count; j++)
252b5132 5565 {
bc67d8a6 5566 section = sections[j];
252b5132 5567
bc67d8a6 5568 if (section == NULL)
252b5132
RH
5569 continue;
5570
bc67d8a6 5571 output_section = section->output_section;
252b5132 5572
bc67d8a6 5573 BFD_ASSERT (output_section != NULL);
c044fabd 5574
bc67d8a6
NC
5575 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5576 || IS_COREFILE_NOTE (segment, section))
252b5132 5577 {
bc67d8a6 5578 if (map->count == 0)
252b5132
RH
5579 {
5580 /* If the first section in a segment does not start at
bc67d8a6
NC
5581 the beginning of the segment, then something is
5582 wrong. */
0067a569
AM
5583 if (output_section->lma
5584 != (map->p_paddr
5585 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5586 + (map->includes_phdrs
5587 ? iehdr->e_phnum * iehdr->e_phentsize
5588 : 0)))
252b5132
RH
5589 abort ();
5590 }
5591 else
5592 {
0067a569 5593 asection *prev_sec;
252b5132 5594
bc67d8a6 5595 prev_sec = map->sections[map->count - 1];
252b5132
RH
5596
5597 /* If the gap between the end of the previous section
bc67d8a6
NC
5598 and the start of this section is more than
5599 maxpagesize then we need to start a new segment. */
eea6121a 5600 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5601 maxpagesize)
caf47ea6 5602 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 5603 || (prev_sec->lma + prev_sec->size
079e9a2f 5604 > output_section->lma))
252b5132 5605 {
0067a569
AM
5606 if (first_suggested_lma)
5607 {
5608 suggested_lma = output_section->lma;
5609 first_suggested_lma = FALSE;
5610 }
252b5132
RH
5611
5612 continue;
5613 }
5614 }
5615
bc67d8a6 5616 map->sections[map->count++] = output_section;
252b5132
RH
5617 ++isec;
5618 sections[j] = NULL;
b34976b6 5619 section->segment_mark = TRUE;
252b5132 5620 }
0067a569
AM
5621 else if (first_suggested_lma)
5622 {
5623 suggested_lma = output_section->lma;
5624 first_suggested_lma = FALSE;
5625 }
252b5132
RH
5626 }
5627
bc67d8a6 5628 BFD_ASSERT (map->count > 0);
252b5132
RH
5629
5630 /* Add the current segment to the list of built segments. */
c044fabd
KH
5631 *pointer_to_map = map;
5632 pointer_to_map = &map->next;
252b5132 5633
bc67d8a6 5634 if (isec < section_count)
252b5132
RH
5635 {
5636 /* We still have not allocated all of the sections to
5637 segments. Create a new segment here, initialise it
5638 and carry on looping. */
dc810e39
AM
5639 amt = sizeof (struct elf_segment_map);
5640 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5641 map = bfd_alloc (obfd, amt);
bc67d8a6 5642 if (map == NULL)
5ed6aba4
NC
5643 {
5644 free (sections);
5645 return FALSE;
5646 }
252b5132
RH
5647
5648 /* Initialise the fields of the segment map. Set the physical
5649 physical address to the LMA of the first section that has
5650 not yet been assigned. */
0067a569
AM
5651 map->next = NULL;
5652 map->p_type = segment->p_type;
5653 map->p_flags = segment->p_flags;
5654 map->p_flags_valid = 1;
5655 map->p_paddr = suggested_lma;
5656 map->p_paddr_valid = 1;
bc67d8a6 5657 map->includes_filehdr = 0;
0067a569 5658 map->includes_phdrs = 0;
252b5132
RH
5659 }
5660 }
bc67d8a6 5661 while (isec < section_count);
252b5132
RH
5662
5663 free (sections);
5664 }
5665
5666 /* The Solaris linker creates program headers in which all the
5667 p_paddr fields are zero. When we try to objcopy or strip such a
5668 file, we get confused. Check for this case, and if we find it
5669 reset the p_paddr_valid fields. */
bc67d8a6
NC
5670 for (map = map_first; map != NULL; map = map->next)
5671 if (map->p_paddr != 0)
252b5132 5672 break;
bc67d8a6 5673 if (map == NULL)
b5f852ea
NC
5674 for (map = map_first; map != NULL; map = map->next)
5675 map->p_paddr_valid = 0;
252b5132 5676
bc67d8a6
NC
5677 elf_tdata (obfd)->segment_map = map_first;
5678
5679 /* If we had to estimate the number of program headers that were
9ad5cbcf 5680 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5681 the offset if necessary. */
5682 if (phdr_adjust_seg != NULL)
5683 {
5684 unsigned int count;
c044fabd 5685
bc67d8a6 5686 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5687 count++;
252b5132 5688
bc67d8a6
NC
5689 if (count > phdr_adjust_num)
5690 phdr_adjust_seg->p_paddr
5691 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5692 }
c044fabd 5693
bc67d8a6 5694#undef SEGMENT_END
eecdbe52 5695#undef SECTION_SIZE
bc67d8a6
NC
5696#undef IS_CONTAINED_BY_VMA
5697#undef IS_CONTAINED_BY_LMA
0efc80c8 5698#undef IS_NOTE
252b5132 5699#undef IS_COREFILE_NOTE
bc67d8a6 5700#undef IS_SOLARIS_PT_INTERP
9f17e2a6 5701#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
5702#undef INCLUDE_SECTION_IN_SEGMENT
5703#undef SEGMENT_AFTER_SEGMENT
5704#undef SEGMENT_OVERLAPS
b34976b6 5705 return TRUE;
252b5132
RH
5706}
5707
84d1d650
L
5708/* Copy ELF program header information. */
5709
5710static bfd_boolean
5711copy_elf_program_header (bfd *ibfd, bfd *obfd)
5712{
5713 Elf_Internal_Ehdr *iehdr;
5714 struct elf_segment_map *map;
5715 struct elf_segment_map *map_first;
5716 struct elf_segment_map **pointer_to_map;
5717 Elf_Internal_Phdr *segment;
5718 unsigned int i;
5719 unsigned int num_segments;
5720 bfd_boolean phdr_included = FALSE;
5721
5722 iehdr = elf_elfheader (ibfd);
5723
5724 map_first = NULL;
5725 pointer_to_map = &map_first;
5726
5727 num_segments = elf_elfheader (ibfd)->e_phnum;
5728 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5729 i < num_segments;
5730 i++, segment++)
5731 {
5732 asection *section;
5733 unsigned int section_count;
5734 bfd_size_type amt;
5735 Elf_Internal_Shdr *this_hdr;
53020534 5736 asection *first_section = NULL;
c981028a 5737 asection *lowest_section = NULL;
84d1d650 5738
84d1d650
L
5739 /* Compute how many sections are in this segment. */
5740 for (section = ibfd->sections, section_count = 0;
5741 section != NULL;
5742 section = section->next)
5743 {
5744 this_hdr = &(elf_section_data(section)->this_hdr);
5745 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
3271a814 5746 {
53020534 5747 if (!first_section)
c981028a
DJ
5748 first_section = lowest_section = section;
5749 if (section->lma < lowest_section->lma)
5750 lowest_section = section;
3271a814
NS
5751 section_count++;
5752 }
84d1d650
L
5753 }
5754
5755 /* Allocate a segment map big enough to contain
5756 all of the sections we have selected. */
5757 amt = sizeof (struct elf_segment_map);
5758 if (section_count != 0)
5759 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
41f8ce69 5760 map = bfd_zalloc (obfd, amt);
84d1d650
L
5761 if (map == NULL)
5762 return FALSE;
5763
5764 /* Initialize the fields of the output segment map with the
5765 input segment. */
5766 map->next = NULL;
5767 map->p_type = segment->p_type;
5768 map->p_flags = segment->p_flags;
5769 map->p_flags_valid = 1;
5770 map->p_paddr = segment->p_paddr;
5771 map->p_paddr_valid = 1;
3f570048
AM
5772 map->p_align = segment->p_align;
5773 map->p_align_valid = 1;
3271a814 5774 map->p_vaddr_offset = 0;
84d1d650 5775
b10a8ae0
L
5776 if (map->p_type == PT_GNU_RELRO
5777 && segment->p_filesz == segment->p_memsz)
5778 {
5779 /* The PT_GNU_RELRO segment may contain the first a few
5780 bytes in the .got.plt section even if the whole .got.plt
5781 section isn't in the PT_GNU_RELRO segment. We won't
5782 change the size of the PT_GNU_RELRO segment. */
5783 map->p_size = segment->p_filesz;
5784 map->p_size_valid = 1;
5785 }
5786
84d1d650
L
5787 /* Determine if this segment contains the ELF file header
5788 and if it contains the program headers themselves. */
5789 map->includes_filehdr = (segment->p_offset == 0
5790 && segment->p_filesz >= iehdr->e_ehsize);
5791
5792 map->includes_phdrs = 0;
5793 if (! phdr_included || segment->p_type != PT_LOAD)
5794 {
5795 map->includes_phdrs =
5796 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5797 && (segment->p_offset + segment->p_filesz
5798 >= ((bfd_vma) iehdr->e_phoff
5799 + iehdr->e_phnum * iehdr->e_phentsize)));
5800
5801 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5802 phdr_included = TRUE;
5803 }
5804
3271a814
NS
5805 if (!map->includes_phdrs && !map->includes_filehdr)
5806 /* There is some other padding before the first section. */
c981028a 5807 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
53020534 5808 - segment->p_paddr);
08a40648 5809
84d1d650
L
5810 if (section_count != 0)
5811 {
5812 unsigned int isec = 0;
5813
53020534 5814 for (section = first_section;
84d1d650
L
5815 section != NULL;
5816 section = section->next)
5817 {
5818 this_hdr = &(elf_section_data(section)->this_hdr);
5819 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
53020534
L
5820 {
5821 map->sections[isec++] = section->output_section;
5822 if (isec == section_count)
5823 break;
5824 }
84d1d650
L
5825 }
5826 }
5827
5828 map->count = section_count;
5829 *pointer_to_map = map;
5830 pointer_to_map = &map->next;
5831 }
5832
5833 elf_tdata (obfd)->segment_map = map_first;
5834 return TRUE;
5835}
5836
5837/* Copy private BFD data. This copies or rewrites ELF program header
5838 information. */
5839
5840static bfd_boolean
5841copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5842{
84d1d650
L
5843 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5844 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5845 return TRUE;
5846
5847 if (elf_tdata (ibfd)->phdr == NULL)
5848 return TRUE;
5849
5850 if (ibfd->xvec == obfd->xvec)
5851 {
cb3ff1e5
NC
5852 /* Check to see if any sections in the input BFD
5853 covered by ELF program header have changed. */
d55ce4e2 5854 Elf_Internal_Phdr *segment;
84d1d650
L
5855 asection *section, *osec;
5856 unsigned int i, num_segments;
5857 Elf_Internal_Shdr *this_hdr;
147d51c2
L
5858 const struct elf_backend_data *bed;
5859
5860 bed = get_elf_backend_data (ibfd);
5861
5862 /* Regenerate the segment map if p_paddr is set to 0. */
5863 if (bed->want_p_paddr_set_to_zero)
5864 goto rewrite;
84d1d650
L
5865
5866 /* Initialize the segment mark field. */
5867 for (section = obfd->sections; section != NULL;
5868 section = section->next)
5869 section->segment_mark = FALSE;
5870
5871 num_segments = elf_elfheader (ibfd)->e_phnum;
5872 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5873 i < num_segments;
5874 i++, segment++)
5875 {
5f6999aa
NC
5876 /* PR binutils/3535. The Solaris linker always sets the p_paddr
5877 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
5878 which severly confuses things, so always regenerate the segment
5879 map in this case. */
5880 if (segment->p_paddr == 0
5881 && segment->p_memsz == 0
5882 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 5883 goto rewrite;
5f6999aa 5884
84d1d650
L
5885 for (section = ibfd->sections;
5886 section != NULL; section = section->next)
5887 {
5888 /* We mark the output section so that we know it comes
5889 from the input BFD. */
5890 osec = section->output_section;
5891 if (osec)
5892 osec->segment_mark = TRUE;
5893
5894 /* Check if this section is covered by the segment. */
5895 this_hdr = &(elf_section_data(section)->this_hdr);
5896 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5897 {
5898 /* FIXME: Check if its output section is changed or
5899 removed. What else do we need to check? */
5900 if (osec == NULL
5901 || section->flags != osec->flags
5902 || section->lma != osec->lma
5903 || section->vma != osec->vma
5904 || section->size != osec->size
5905 || section->rawsize != osec->rawsize
5906 || section->alignment_power != osec->alignment_power)
5907 goto rewrite;
5908 }
5909 }
5910 }
5911
cb3ff1e5 5912 /* Check to see if any output section do not come from the
84d1d650
L
5913 input BFD. */
5914 for (section = obfd->sections; section != NULL;
5915 section = section->next)
5916 {
5917 if (section->segment_mark == FALSE)
5918 goto rewrite;
5919 else
5920 section->segment_mark = FALSE;
5921 }
5922
5923 return copy_elf_program_header (ibfd, obfd);
5924 }
5925
5926rewrite:
5927 return rewrite_elf_program_header (ibfd, obfd);
5928}
5929
ccd2ec6a
L
5930/* Initialize private output section information from input section. */
5931
5932bfd_boolean
5933_bfd_elf_init_private_section_data (bfd *ibfd,
5934 asection *isec,
5935 bfd *obfd,
5936 asection *osec,
5937 struct bfd_link_info *link_info)
5938
5939{
5940 Elf_Internal_Shdr *ihdr, *ohdr;
5941 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
5942
5943 if (ibfd->xvec->flavour != bfd_target_elf_flavour
5944 || obfd->xvec->flavour != bfd_target_elf_flavour)
5945 return TRUE;
5946
e843e0f8 5947 /* Don't copy the output ELF section type from input if the
d3fd4074 5948 output BFD section flags have been set to something different.
e843e0f8
L
5949 elf_fake_sections will set ELF section type based on BFD
5950 section flags. */
42bb2e33
AM
5951 if (elf_section_type (osec) == SHT_NULL
5952 && (osec->flags == isec->flags || !osec->flags))
5953 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
5954
5955 /* FIXME: Is this correct for all OS/PROC specific flags? */
5956 elf_section_flags (osec) |= (elf_section_flags (isec)
5957 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
5958
5959 /* Set things up for objcopy and relocatable link. The output
5960 SHT_GROUP section will have its elf_next_in_group pointing back
5961 to the input group members. Ignore linker created group section.
5962 See elfNN_ia64_object_p in elfxx-ia64.c. */
ccd2ec6a
L
5963 if (need_group)
5964 {
5965 if (elf_sec_group (isec) == NULL
5966 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
5967 {
5968 if (elf_section_flags (isec) & SHF_GROUP)
5969 elf_section_flags (osec) |= SHF_GROUP;
5970 elf_next_in_group (osec) = elf_next_in_group (isec);
5971 elf_group_name (osec) = elf_group_name (isec);
5972 }
5973 }
5974
5975 ihdr = &elf_section_data (isec)->this_hdr;
5976
5977 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
5978 don't use the output section of the linked-to section since it
5979 may be NULL at this point. */
5980 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
5981 {
5982 ohdr = &elf_section_data (osec)->this_hdr;
5983 ohdr->sh_flags |= SHF_LINK_ORDER;
5984 elf_linked_to_section (osec) = elf_linked_to_section (isec);
5985 }
5986
5987 osec->use_rela_p = isec->use_rela_p;
5988
5989 return TRUE;
5990}
5991
252b5132
RH
5992/* Copy private section information. This copies over the entsize
5993 field, and sometimes the info field. */
5994
b34976b6 5995bfd_boolean
217aa764
AM
5996_bfd_elf_copy_private_section_data (bfd *ibfd,
5997 asection *isec,
5998 bfd *obfd,
5999 asection *osec)
252b5132
RH
6000{
6001 Elf_Internal_Shdr *ihdr, *ohdr;
6002
6003 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6004 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6005 return TRUE;
252b5132 6006
252b5132
RH
6007 ihdr = &elf_section_data (isec)->this_hdr;
6008 ohdr = &elf_section_data (osec)->this_hdr;
6009
6010 ohdr->sh_entsize = ihdr->sh_entsize;
6011
6012 if (ihdr->sh_type == SHT_SYMTAB
6013 || ihdr->sh_type == SHT_DYNSYM
6014 || ihdr->sh_type == SHT_GNU_verneed
6015 || ihdr->sh_type == SHT_GNU_verdef)
6016 ohdr->sh_info = ihdr->sh_info;
6017
ccd2ec6a
L
6018 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6019 NULL);
252b5132
RH
6020}
6021
80fccad2
BW
6022/* Copy private header information. */
6023
6024bfd_boolean
6025_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6026{
30288845
AM
6027 asection *isec;
6028
80fccad2
BW
6029 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6030 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6031 return TRUE;
6032
6033 /* Copy over private BFD data if it has not already been copied.
6034 This must be done here, rather than in the copy_private_bfd_data
6035 entry point, because the latter is called after the section
6036 contents have been set, which means that the program headers have
6037 already been worked out. */
6038 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6039 {
6040 if (! copy_private_bfd_data (ibfd, obfd))
6041 return FALSE;
6042 }
6043
30288845
AM
6044 /* _bfd_elf_copy_private_section_data copied over the SHF_GROUP flag
6045 but this might be wrong if we deleted the group section. */
6046 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
6047 if (elf_section_type (isec) == SHT_GROUP
6048 && isec->output_section == NULL)
6049 {
6050 asection *first = elf_next_in_group (isec);
6051 asection *s = first;
6052 while (s != NULL)
6053 {
6054 if (s->output_section != NULL)
6055 {
6056 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6057 elf_group_name (s->output_section) = NULL;
6058 }
6059 s = elf_next_in_group (s);
6060 if (s == first)
6061 break;
6062 }
6063 }
6064
80fccad2
BW
6065 return TRUE;
6066}
6067
252b5132
RH
6068/* Copy private symbol information. If this symbol is in a section
6069 which we did not map into a BFD section, try to map the section
6070 index correctly. We use special macro definitions for the mapped
6071 section indices; these definitions are interpreted by the
6072 swap_out_syms function. */
6073
9ad5cbcf
AM
6074#define MAP_ONESYMTAB (SHN_HIOS + 1)
6075#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6076#define MAP_STRTAB (SHN_HIOS + 3)
6077#define MAP_SHSTRTAB (SHN_HIOS + 4)
6078#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6079
b34976b6 6080bfd_boolean
217aa764
AM
6081_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6082 asymbol *isymarg,
6083 bfd *obfd,
6084 asymbol *osymarg)
252b5132
RH
6085{
6086 elf_symbol_type *isym, *osym;
6087
6088 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6089 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6090 return TRUE;
252b5132
RH
6091
6092 isym = elf_symbol_from (ibfd, isymarg);
6093 osym = elf_symbol_from (obfd, osymarg);
6094
6095 if (isym != NULL
8424d8f5 6096 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6097 && osym != NULL
6098 && bfd_is_abs_section (isym->symbol.section))
6099 {
6100 unsigned int shndx;
6101
6102 shndx = isym->internal_elf_sym.st_shndx;
6103 if (shndx == elf_onesymtab (ibfd))
6104 shndx = MAP_ONESYMTAB;
6105 else if (shndx == elf_dynsymtab (ibfd))
6106 shndx = MAP_DYNSYMTAB;
6107 else if (shndx == elf_tdata (ibfd)->strtab_section)
6108 shndx = MAP_STRTAB;
6109 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6110 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6111 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6112 shndx = MAP_SYM_SHNDX;
252b5132
RH
6113 osym->internal_elf_sym.st_shndx = shndx;
6114 }
6115
b34976b6 6116 return TRUE;
252b5132
RH
6117}
6118
6119/* Swap out the symbols. */
6120
b34976b6 6121static bfd_boolean
217aa764
AM
6122swap_out_syms (bfd *abfd,
6123 struct bfd_strtab_hash **sttp,
6124 int relocatable_p)
252b5132 6125{
9c5bfbb7 6126 const struct elf_backend_data *bed;
079e9a2f
AM
6127 int symcount;
6128 asymbol **syms;
6129 struct bfd_strtab_hash *stt;
6130 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6131 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6132 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6133 bfd_byte *outbound_syms;
6134 bfd_byte *outbound_shndx;
079e9a2f
AM
6135 int idx;
6136 bfd_size_type amt;
174fd7f9 6137 bfd_boolean name_local_sections;
252b5132
RH
6138
6139 if (!elf_map_symbols (abfd))
b34976b6 6140 return FALSE;
252b5132 6141
c044fabd 6142 /* Dump out the symtabs. */
079e9a2f
AM
6143 stt = _bfd_elf_stringtab_init ();
6144 if (stt == NULL)
b34976b6 6145 return FALSE;
252b5132 6146
079e9a2f
AM
6147 bed = get_elf_backend_data (abfd);
6148 symcount = bfd_get_symcount (abfd);
6149 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6150 symtab_hdr->sh_type = SHT_SYMTAB;
6151 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6152 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6153 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
45d6a902 6154 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
079e9a2f
AM
6155
6156 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6157 symstrtab_hdr->sh_type = SHT_STRTAB;
6158
d0fb9a8d 6159 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 6160 if (outbound_syms == NULL)
5ed6aba4
NC
6161 {
6162 _bfd_stringtab_free (stt);
6163 return FALSE;
6164 }
217aa764 6165 symtab_hdr->contents = outbound_syms;
252b5132 6166
9ad5cbcf
AM
6167 outbound_shndx = NULL;
6168 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6169 if (symtab_shndx_hdr->sh_name != 0)
6170 {
6171 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
6172 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
6173 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6174 if (outbound_shndx == NULL)
5ed6aba4
NC
6175 {
6176 _bfd_stringtab_free (stt);
6177 return FALSE;
6178 }
6179
9ad5cbcf
AM
6180 symtab_shndx_hdr->contents = outbound_shndx;
6181 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6182 symtab_shndx_hdr->sh_size = amt;
6183 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6184 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6185 }
6186
589e6347 6187 /* Now generate the data (for "contents"). */
079e9a2f
AM
6188 {
6189 /* Fill in zeroth symbol and swap it out. */
6190 Elf_Internal_Sym sym;
6191 sym.st_name = 0;
6192 sym.st_value = 0;
6193 sym.st_size = 0;
6194 sym.st_info = 0;
6195 sym.st_other = 0;
6196 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6197 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6198 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6199 if (outbound_shndx != NULL)
6200 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6201 }
252b5132 6202
174fd7f9
RS
6203 name_local_sections
6204 = (bed->elf_backend_name_local_section_symbols
6205 && bed->elf_backend_name_local_section_symbols (abfd));
6206
079e9a2f
AM
6207 syms = bfd_get_outsymbols (abfd);
6208 for (idx = 0; idx < symcount; idx++)
252b5132 6209 {
252b5132 6210 Elf_Internal_Sym sym;
079e9a2f
AM
6211 bfd_vma value = syms[idx]->value;
6212 elf_symbol_type *type_ptr;
6213 flagword flags = syms[idx]->flags;
6214 int type;
252b5132 6215
174fd7f9
RS
6216 if (!name_local_sections
6217 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6218 {
6219 /* Local section symbols have no name. */
6220 sym.st_name = 0;
6221 }
6222 else
6223 {
6224 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6225 syms[idx]->name,
b34976b6 6226 TRUE, FALSE);
079e9a2f 6227 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6228 {
6229 _bfd_stringtab_free (stt);
6230 return FALSE;
6231 }
079e9a2f 6232 }
252b5132 6233
079e9a2f 6234 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6235
079e9a2f
AM
6236 if ((flags & BSF_SECTION_SYM) == 0
6237 && bfd_is_com_section (syms[idx]->section))
6238 {
6239 /* ELF common symbols put the alignment into the `value' field,
6240 and the size into the `size' field. This is backwards from
6241 how BFD handles it, so reverse it here. */
6242 sym.st_size = value;
6243 if (type_ptr == NULL
6244 || type_ptr->internal_elf_sym.st_value == 0)
6245 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6246 else
6247 sym.st_value = type_ptr->internal_elf_sym.st_value;
6248 sym.st_shndx = _bfd_elf_section_from_bfd_section
6249 (abfd, syms[idx]->section);
6250 }
6251 else
6252 {
6253 asection *sec = syms[idx]->section;
6254 int shndx;
252b5132 6255
079e9a2f
AM
6256 if (sec->output_section)
6257 {
6258 value += sec->output_offset;
6259 sec = sec->output_section;
6260 }
589e6347 6261
079e9a2f
AM
6262 /* Don't add in the section vma for relocatable output. */
6263 if (! relocatable_p)
6264 value += sec->vma;
6265 sym.st_value = value;
6266 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6267
6268 if (bfd_is_abs_section (sec)
6269 && type_ptr != NULL
6270 && type_ptr->internal_elf_sym.st_shndx != 0)
6271 {
6272 /* This symbol is in a real ELF section which we did
6273 not create as a BFD section. Undo the mapping done
6274 by copy_private_symbol_data. */
6275 shndx = type_ptr->internal_elf_sym.st_shndx;
6276 switch (shndx)
6277 {
6278 case MAP_ONESYMTAB:
6279 shndx = elf_onesymtab (abfd);
6280 break;
6281 case MAP_DYNSYMTAB:
6282 shndx = elf_dynsymtab (abfd);
6283 break;
6284 case MAP_STRTAB:
6285 shndx = elf_tdata (abfd)->strtab_section;
6286 break;
6287 case MAP_SHSTRTAB:
6288 shndx = elf_tdata (abfd)->shstrtab_section;
6289 break;
9ad5cbcf
AM
6290 case MAP_SYM_SHNDX:
6291 shndx = elf_tdata (abfd)->symtab_shndx_section;
6292 break;
079e9a2f
AM
6293 default:
6294 break;
6295 }
6296 }
6297 else
6298 {
6299 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6300
079e9a2f
AM
6301 if (shndx == -1)
6302 {
6303 asection *sec2;
6304
6305 /* Writing this would be a hell of a lot easier if
6306 we had some decent documentation on bfd, and
6307 knew what to expect of the library, and what to
6308 demand of applications. For example, it
6309 appears that `objcopy' might not set the
6310 section of a symbol to be a section that is
6311 actually in the output file. */
6312 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6313 if (sec2 == NULL)
6314 {
6315 _bfd_error_handler (_("\
6316Unable to find equivalent output section for symbol '%s' from section '%s'"),
6317 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6318 sec->name);
811072d8 6319 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6320 _bfd_stringtab_free (stt);
589e6347
NC
6321 return FALSE;
6322 }
811072d8 6323
079e9a2f
AM
6324 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
6325 BFD_ASSERT (shndx != -1);
6326 }
6327 }
252b5132 6328
079e9a2f
AM
6329 sym.st_shndx = shndx;
6330 }
252b5132 6331
13ae64f3
JJ
6332 if ((flags & BSF_THREAD_LOCAL) != 0)
6333 type = STT_TLS;
6334 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6335 type = STT_FUNC;
6336 else if ((flags & BSF_OBJECT) != 0)
6337 type = STT_OBJECT;
d9352518
DB
6338 else if ((flags & BSF_RELC) != 0)
6339 type = STT_RELC;
6340 else if ((flags & BSF_SRELC) != 0)
6341 type = STT_SRELC;
079e9a2f
AM
6342 else
6343 type = STT_NOTYPE;
252b5132 6344
13ae64f3
JJ
6345 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6346 type = STT_TLS;
6347
589e6347 6348 /* Processor-specific types. */
079e9a2f
AM
6349 if (type_ptr != NULL
6350 && bed->elf_backend_get_symbol_type)
6351 type = ((*bed->elf_backend_get_symbol_type)
6352 (&type_ptr->internal_elf_sym, type));
252b5132 6353
079e9a2f
AM
6354 if (flags & BSF_SECTION_SYM)
6355 {
6356 if (flags & BSF_GLOBAL)
6357 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6358 else
6359 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6360 }
6361 else if (bfd_is_com_section (syms[idx]->section))
504b7d20
NC
6362 sym.st_info = ELF_ST_INFO (STB_GLOBAL,
6363#ifdef USE_STT_COMMON
6364 type == STT_OBJECT ? STT_COMMON :
6365#endif
6366 type);
079e9a2f
AM
6367 else if (bfd_is_und_section (syms[idx]->section))
6368 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6369 ? STB_WEAK
6370 : STB_GLOBAL),
6371 type);
6372 else if (flags & BSF_FILE)
6373 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6374 else
6375 {
6376 int bind = STB_LOCAL;
252b5132 6377
079e9a2f
AM
6378 if (flags & BSF_LOCAL)
6379 bind = STB_LOCAL;
6380 else if (flags & BSF_WEAK)
6381 bind = STB_WEAK;
6382 else if (flags & BSF_GLOBAL)
6383 bind = STB_GLOBAL;
252b5132 6384
079e9a2f
AM
6385 sym.st_info = ELF_ST_INFO (bind, type);
6386 }
252b5132 6387
079e9a2f
AM
6388 if (type_ptr != NULL)
6389 sym.st_other = type_ptr->internal_elf_sym.st_other;
6390 else
6391 sym.st_other = 0;
252b5132 6392
9ad5cbcf 6393 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6394 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6395 if (outbound_shndx != NULL)
6396 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6397 }
252b5132 6398
079e9a2f
AM
6399 *sttp = stt;
6400 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6401 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6402
079e9a2f
AM
6403 symstrtab_hdr->sh_flags = 0;
6404 symstrtab_hdr->sh_addr = 0;
6405 symstrtab_hdr->sh_entsize = 0;
6406 symstrtab_hdr->sh_link = 0;
6407 symstrtab_hdr->sh_info = 0;
6408 symstrtab_hdr->sh_addralign = 1;
252b5132 6409
b34976b6 6410 return TRUE;
252b5132
RH
6411}
6412
6413/* Return the number of bytes required to hold the symtab vector.
6414
6415 Note that we base it on the count plus 1, since we will null terminate
6416 the vector allocated based on this size. However, the ELF symbol table
6417 always has a dummy entry as symbol #0, so it ends up even. */
6418
6419long
217aa764 6420_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6421{
6422 long symcount;
6423 long symtab_size;
6424 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6425
6426 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6427 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6428 if (symcount > 0)
6429 symtab_size -= sizeof (asymbol *);
252b5132
RH
6430
6431 return symtab_size;
6432}
6433
6434long
217aa764 6435_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6436{
6437 long symcount;
6438 long symtab_size;
6439 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6440
6441 if (elf_dynsymtab (abfd) == 0)
6442 {
6443 bfd_set_error (bfd_error_invalid_operation);
6444 return -1;
6445 }
6446
6447 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6448 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6449 if (symcount > 0)
6450 symtab_size -= sizeof (asymbol *);
252b5132
RH
6451
6452 return symtab_size;
6453}
6454
6455long
217aa764
AM
6456_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6457 sec_ptr asect)
252b5132
RH
6458{
6459 return (asect->reloc_count + 1) * sizeof (arelent *);
6460}
6461
6462/* Canonicalize the relocs. */
6463
6464long
217aa764
AM
6465_bfd_elf_canonicalize_reloc (bfd *abfd,
6466 sec_ptr section,
6467 arelent **relptr,
6468 asymbol **symbols)
252b5132
RH
6469{
6470 arelent *tblptr;
6471 unsigned int i;
9c5bfbb7 6472 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6473
b34976b6 6474 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6475 return -1;
6476
6477 tblptr = section->relocation;
6478 for (i = 0; i < section->reloc_count; i++)
6479 *relptr++ = tblptr++;
6480
6481 *relptr = NULL;
6482
6483 return section->reloc_count;
6484}
6485
6486long
6cee3f79 6487_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6488{
9c5bfbb7 6489 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6490 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6491
6492 if (symcount >= 0)
6493 bfd_get_symcount (abfd) = symcount;
6494 return symcount;
6495}
6496
6497long
217aa764
AM
6498_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6499 asymbol **allocation)
252b5132 6500{
9c5bfbb7 6501 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6502 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6503
6504 if (symcount >= 0)
6505 bfd_get_dynamic_symcount (abfd) = symcount;
6506 return symcount;
252b5132
RH
6507}
6508
8615f3f2
AM
6509/* Return the size required for the dynamic reloc entries. Any loadable
6510 section that was actually installed in the BFD, and has type SHT_REL
6511 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6512 dynamic reloc section. */
252b5132
RH
6513
6514long
217aa764 6515_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6516{
6517 long ret;
6518 asection *s;
6519
6520 if (elf_dynsymtab (abfd) == 0)
6521 {
6522 bfd_set_error (bfd_error_invalid_operation);
6523 return -1;
6524 }
6525
6526 ret = sizeof (arelent *);
6527 for (s = abfd->sections; s != NULL; s = s->next)
8615f3f2
AM
6528 if ((s->flags & SEC_LOAD) != 0
6529 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6530 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6531 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6532 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6533 * sizeof (arelent *));
6534
6535 return ret;
6536}
6537
8615f3f2
AM
6538/* Canonicalize the dynamic relocation entries. Note that we return the
6539 dynamic relocations as a single block, although they are actually
6540 associated with particular sections; the interface, which was
6541 designed for SunOS style shared libraries, expects that there is only
6542 one set of dynamic relocs. Any loadable section that was actually
6543 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6544 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6545
6546long
217aa764
AM
6547_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6548 arelent **storage,
6549 asymbol **syms)
252b5132 6550{
217aa764 6551 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6552 asection *s;
6553 long ret;
6554
6555 if (elf_dynsymtab (abfd) == 0)
6556 {
6557 bfd_set_error (bfd_error_invalid_operation);
6558 return -1;
6559 }
6560
6561 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6562 ret = 0;
6563 for (s = abfd->sections; s != NULL; s = s->next)
6564 {
8615f3f2
AM
6565 if ((s->flags & SEC_LOAD) != 0
6566 && elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6567 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6568 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6569 {
6570 arelent *p;
6571 long count, i;
6572
b34976b6 6573 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6574 return -1;
eea6121a 6575 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6576 p = s->relocation;
6577 for (i = 0; i < count; i++)
6578 *storage++ = p++;
6579 ret += count;
6580 }
6581 }
6582
6583 *storage = NULL;
6584
6585 return ret;
6586}
6587\f
6588/* Read in the version information. */
6589
b34976b6 6590bfd_boolean
fc0e6df6 6591_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6592{
6593 bfd_byte *contents = NULL;
fc0e6df6
PB
6594 unsigned int freeidx = 0;
6595
6596 if (elf_dynverref (abfd) != 0)
6597 {
6598 Elf_Internal_Shdr *hdr;
6599 Elf_External_Verneed *everneed;
6600 Elf_Internal_Verneed *iverneed;
6601 unsigned int i;
d0fb9a8d 6602 bfd_byte *contents_end;
fc0e6df6
PB
6603
6604 hdr = &elf_tdata (abfd)->dynverref_hdr;
6605
d0fb9a8d
JJ
6606 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6607 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6608 if (elf_tdata (abfd)->verref == NULL)
6609 goto error_return;
6610
6611 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6612
6613 contents = bfd_malloc (hdr->sh_size);
6614 if (contents == NULL)
d0fb9a8d
JJ
6615 {
6616error_return_verref:
6617 elf_tdata (abfd)->verref = NULL;
6618 elf_tdata (abfd)->cverrefs = 0;
6619 goto error_return;
6620 }
fc0e6df6
PB
6621 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6622 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6623 goto error_return_verref;
fc0e6df6 6624
d0fb9a8d
JJ
6625 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6626 goto error_return_verref;
6627
6628 BFD_ASSERT (sizeof (Elf_External_Verneed)
6629 == sizeof (Elf_External_Vernaux));
6630 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6631 everneed = (Elf_External_Verneed *) contents;
6632 iverneed = elf_tdata (abfd)->verref;
6633 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6634 {
6635 Elf_External_Vernaux *evernaux;
6636 Elf_Internal_Vernaux *ivernaux;
6637 unsigned int j;
6638
6639 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6640
6641 iverneed->vn_bfd = abfd;
6642
6643 iverneed->vn_filename =
6644 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6645 iverneed->vn_file);
6646 if (iverneed->vn_filename == NULL)
d0fb9a8d 6647 goto error_return_verref;
fc0e6df6 6648
d0fb9a8d
JJ
6649 if (iverneed->vn_cnt == 0)
6650 iverneed->vn_auxptr = NULL;
6651 else
6652 {
6653 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6654 sizeof (Elf_Internal_Vernaux));
6655 if (iverneed->vn_auxptr == NULL)
6656 goto error_return_verref;
6657 }
6658
6659 if (iverneed->vn_aux
6660 > (size_t) (contents_end - (bfd_byte *) everneed))
6661 goto error_return_verref;
fc0e6df6
PB
6662
6663 evernaux = ((Elf_External_Vernaux *)
6664 ((bfd_byte *) everneed + iverneed->vn_aux));
6665 ivernaux = iverneed->vn_auxptr;
6666 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6667 {
6668 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6669
6670 ivernaux->vna_nodename =
6671 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6672 ivernaux->vna_name);
6673 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6674 goto error_return_verref;
fc0e6df6
PB
6675
6676 if (j + 1 < iverneed->vn_cnt)
6677 ivernaux->vna_nextptr = ivernaux + 1;
6678 else
6679 ivernaux->vna_nextptr = NULL;
6680
d0fb9a8d
JJ
6681 if (ivernaux->vna_next
6682 > (size_t) (contents_end - (bfd_byte *) evernaux))
6683 goto error_return_verref;
6684
fc0e6df6
PB
6685 evernaux = ((Elf_External_Vernaux *)
6686 ((bfd_byte *) evernaux + ivernaux->vna_next));
6687
6688 if (ivernaux->vna_other > freeidx)
6689 freeidx = ivernaux->vna_other;
6690 }
6691
6692 if (i + 1 < hdr->sh_info)
6693 iverneed->vn_nextref = iverneed + 1;
6694 else
6695 iverneed->vn_nextref = NULL;
6696
d0fb9a8d
JJ
6697 if (iverneed->vn_next
6698 > (size_t) (contents_end - (bfd_byte *) everneed))
6699 goto error_return_verref;
6700
fc0e6df6
PB
6701 everneed = ((Elf_External_Verneed *)
6702 ((bfd_byte *) everneed + iverneed->vn_next));
6703 }
6704
6705 free (contents);
6706 contents = NULL;
6707 }
252b5132
RH
6708
6709 if (elf_dynverdef (abfd) != 0)
6710 {
6711 Elf_Internal_Shdr *hdr;
6712 Elf_External_Verdef *everdef;
6713 Elf_Internal_Verdef *iverdef;
f631889e
UD
6714 Elf_Internal_Verdef *iverdefarr;
6715 Elf_Internal_Verdef iverdefmem;
252b5132 6716 unsigned int i;
062e2358 6717 unsigned int maxidx;
d0fb9a8d 6718 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6719
6720 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6721
217aa764 6722 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6723 if (contents == NULL)
6724 goto error_return;
6725 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6726 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6727 goto error_return;
6728
d0fb9a8d
JJ
6729 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6730 goto error_return;
6731
6732 BFD_ASSERT (sizeof (Elf_External_Verdef)
6733 >= sizeof (Elf_External_Verdaux));
6734 contents_end_def = contents + hdr->sh_size
6735 - sizeof (Elf_External_Verdef);
6736 contents_end_aux = contents + hdr->sh_size
6737 - sizeof (Elf_External_Verdaux);
6738
f631889e
UD
6739 /* We know the number of entries in the section but not the maximum
6740 index. Therefore we have to run through all entries and find
6741 the maximum. */
252b5132 6742 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6743 maxidx = 0;
6744 for (i = 0; i < hdr->sh_info; ++i)
6745 {
6746 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6747
062e2358
AM
6748 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6749 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6750
d0fb9a8d
JJ
6751 if (iverdefmem.vd_next
6752 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6753 goto error_return;
6754
f631889e
UD
6755 everdef = ((Elf_External_Verdef *)
6756 ((bfd_byte *) everdef + iverdefmem.vd_next));
6757 }
6758
fc0e6df6
PB
6759 if (default_imported_symver)
6760 {
6761 if (freeidx > maxidx)
6762 maxidx = ++freeidx;
6763 else
6764 freeidx = ++maxidx;
6765 }
d0fb9a8d
JJ
6766 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6767 sizeof (Elf_Internal_Verdef));
f631889e
UD
6768 if (elf_tdata (abfd)->verdef == NULL)
6769 goto error_return;
6770
6771 elf_tdata (abfd)->cverdefs = maxidx;
6772
6773 everdef = (Elf_External_Verdef *) contents;
6774 iverdefarr = elf_tdata (abfd)->verdef;
6775 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6776 {
6777 Elf_External_Verdaux *everdaux;
6778 Elf_Internal_Verdaux *iverdaux;
6779 unsigned int j;
6780
f631889e
UD
6781 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6782
d0fb9a8d
JJ
6783 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6784 {
6785error_return_verdef:
6786 elf_tdata (abfd)->verdef = NULL;
6787 elf_tdata (abfd)->cverdefs = 0;
6788 goto error_return;
6789 }
6790
f631889e
UD
6791 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6792 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6793
6794 iverdef->vd_bfd = abfd;
6795
d0fb9a8d
JJ
6796 if (iverdef->vd_cnt == 0)
6797 iverdef->vd_auxptr = NULL;
6798 else
6799 {
6800 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6801 sizeof (Elf_Internal_Verdaux));
6802 if (iverdef->vd_auxptr == NULL)
6803 goto error_return_verdef;
6804 }
6805
6806 if (iverdef->vd_aux
6807 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6808 goto error_return_verdef;
252b5132
RH
6809
6810 everdaux = ((Elf_External_Verdaux *)
6811 ((bfd_byte *) everdef + iverdef->vd_aux));
6812 iverdaux = iverdef->vd_auxptr;
6813 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6814 {
6815 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6816
6817 iverdaux->vda_nodename =
6818 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6819 iverdaux->vda_name);
6820 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6821 goto error_return_verdef;
252b5132
RH
6822
6823 if (j + 1 < iverdef->vd_cnt)
6824 iverdaux->vda_nextptr = iverdaux + 1;
6825 else
6826 iverdaux->vda_nextptr = NULL;
6827
d0fb9a8d
JJ
6828 if (iverdaux->vda_next
6829 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6830 goto error_return_verdef;
6831
252b5132
RH
6832 everdaux = ((Elf_External_Verdaux *)
6833 ((bfd_byte *) everdaux + iverdaux->vda_next));
6834 }
6835
d0fb9a8d
JJ
6836 if (iverdef->vd_cnt)
6837 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6838
d0fb9a8d 6839 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6840 iverdef->vd_nextdef = iverdef + 1;
6841 else
6842 iverdef->vd_nextdef = NULL;
6843
6844 everdef = ((Elf_External_Verdef *)
6845 ((bfd_byte *) everdef + iverdef->vd_next));
6846 }
6847
6848 free (contents);
6849 contents = NULL;
6850 }
fc0e6df6 6851 else if (default_imported_symver)
252b5132 6852 {
fc0e6df6
PB
6853 if (freeidx < 3)
6854 freeidx = 3;
6855 else
6856 freeidx++;
252b5132 6857
d0fb9a8d
JJ
6858 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6859 sizeof (Elf_Internal_Verdef));
fc0e6df6 6860 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6861 goto error_return;
6862
fc0e6df6
PB
6863 elf_tdata (abfd)->cverdefs = freeidx;
6864 }
252b5132 6865
fc0e6df6
PB
6866 /* Create a default version based on the soname. */
6867 if (default_imported_symver)
6868 {
6869 Elf_Internal_Verdef *iverdef;
6870 Elf_Internal_Verdaux *iverdaux;
252b5132 6871
fc0e6df6 6872 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6873
fc0e6df6
PB
6874 iverdef->vd_version = VER_DEF_CURRENT;
6875 iverdef->vd_flags = 0;
6876 iverdef->vd_ndx = freeidx;
6877 iverdef->vd_cnt = 1;
252b5132 6878
fc0e6df6 6879 iverdef->vd_bfd = abfd;
252b5132 6880
fc0e6df6
PB
6881 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6882 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6883 goto error_return_verdef;
fc0e6df6 6884 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6885 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6886 if (iverdef->vd_auxptr == NULL)
6887 goto error_return_verdef;
252b5132 6888
fc0e6df6
PB
6889 iverdaux = iverdef->vd_auxptr;
6890 iverdaux->vda_nodename = iverdef->vd_nodename;
6891 iverdaux->vda_nextptr = NULL;
252b5132
RH
6892 }
6893
b34976b6 6894 return TRUE;
252b5132
RH
6895
6896 error_return:
5ed6aba4 6897 if (contents != NULL)
252b5132 6898 free (contents);
b34976b6 6899 return FALSE;
252b5132
RH
6900}
6901\f
6902asymbol *
217aa764 6903_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6904{
6905 elf_symbol_type *newsym;
dc810e39 6906 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6907
217aa764 6908 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6909 if (!newsym)
6910 return NULL;
6911 else
6912 {
6913 newsym->symbol.the_bfd = abfd;
6914 return &newsym->symbol;
6915 }
6916}
6917
6918void
217aa764
AM
6919_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6920 asymbol *symbol,
6921 symbol_info *ret)
252b5132
RH
6922{
6923 bfd_symbol_info (symbol, ret);
6924}
6925
6926/* Return whether a symbol name implies a local symbol. Most targets
6927 use this function for the is_local_label_name entry point, but some
6928 override it. */
6929
b34976b6 6930bfd_boolean
217aa764
AM
6931_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
6932 const char *name)
252b5132
RH
6933{
6934 /* Normal local symbols start with ``.L''. */
6935 if (name[0] == '.' && name[1] == 'L')
b34976b6 6936 return TRUE;
252b5132
RH
6937
6938 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
6939 DWARF debugging symbols starting with ``..''. */
6940 if (name[0] == '.' && name[1] == '.')
b34976b6 6941 return TRUE;
252b5132
RH
6942
6943 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
6944 emitting DWARF debugging output. I suspect this is actually a
6945 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
6946 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
6947 underscore to be emitted on some ELF targets). For ease of use,
6948 we treat such symbols as local. */
6949 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 6950 return TRUE;
252b5132 6951
b34976b6 6952 return FALSE;
252b5132
RH
6953}
6954
6955alent *
217aa764
AM
6956_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
6957 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
6958{
6959 abort ();
6960 return NULL;
6961}
6962
b34976b6 6963bfd_boolean
217aa764
AM
6964_bfd_elf_set_arch_mach (bfd *abfd,
6965 enum bfd_architecture arch,
6966 unsigned long machine)
252b5132
RH
6967{
6968 /* If this isn't the right architecture for this backend, and this
6969 isn't the generic backend, fail. */
6970 if (arch != get_elf_backend_data (abfd)->arch
6971 && arch != bfd_arch_unknown
6972 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 6973 return FALSE;
252b5132
RH
6974
6975 return bfd_default_set_arch_mach (abfd, arch, machine);
6976}
6977
d1fad7c6
NC
6978/* Find the function to a particular section and offset,
6979 for error reporting. */
252b5132 6980
b34976b6 6981static bfd_boolean
217aa764
AM
6982elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
6983 asection *section,
6984 asymbol **symbols,
6985 bfd_vma offset,
6986 const char **filename_ptr,
6987 const char **functionname_ptr)
252b5132 6988{
252b5132 6989 const char *filename;
57426232 6990 asymbol *func, *file;
252b5132
RH
6991 bfd_vma low_func;
6992 asymbol **p;
57426232
JB
6993 /* ??? Given multiple file symbols, it is impossible to reliably
6994 choose the right file name for global symbols. File symbols are
6995 local symbols, and thus all file symbols must sort before any
6996 global symbols. The ELF spec may be interpreted to say that a
6997 file symbol must sort before other local symbols, but currently
6998 ld -r doesn't do this. So, for ld -r output, it is possible to
6999 make a better choice of file name for local symbols by ignoring
7000 file symbols appearing after a given local symbol. */
7001 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 7002
252b5132
RH
7003 filename = NULL;
7004 func = NULL;
57426232 7005 file = NULL;
252b5132 7006 low_func = 0;
57426232 7007 state = nothing_seen;
252b5132
RH
7008
7009 for (p = symbols; *p != NULL; p++)
7010 {
7011 elf_symbol_type *q;
7012
7013 q = (elf_symbol_type *) *p;
7014
252b5132
RH
7015 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
7016 {
7017 default:
7018 break;
7019 case STT_FILE:
57426232
JB
7020 file = &q->symbol;
7021 if (state == symbol_seen)
7022 state = file_after_symbol_seen;
7023 continue;
252b5132
RH
7024 case STT_NOTYPE:
7025 case STT_FUNC:
6b40fcba 7026 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7027 && q->symbol.value >= low_func
7028 && q->symbol.value <= offset)
7029 {
7030 func = (asymbol *) q;
7031 low_func = q->symbol.value;
a1923858
AM
7032 filename = NULL;
7033 if (file != NULL
7034 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7035 || state != file_after_symbol_seen))
57426232 7036 filename = bfd_asymbol_name (file);
252b5132
RH
7037 }
7038 break;
7039 }
57426232
JB
7040 if (state == nothing_seen)
7041 state = symbol_seen;
252b5132
RH
7042 }
7043
7044 if (func == NULL)
b34976b6 7045 return FALSE;
252b5132 7046
d1fad7c6
NC
7047 if (filename_ptr)
7048 *filename_ptr = filename;
7049 if (functionname_ptr)
7050 *functionname_ptr = bfd_asymbol_name (func);
7051
b34976b6 7052 return TRUE;
d1fad7c6
NC
7053}
7054
7055/* Find the nearest line to a particular section and offset,
7056 for error reporting. */
7057
b34976b6 7058bfd_boolean
217aa764
AM
7059_bfd_elf_find_nearest_line (bfd *abfd,
7060 asection *section,
7061 asymbol **symbols,
7062 bfd_vma offset,
7063 const char **filename_ptr,
7064 const char **functionname_ptr,
7065 unsigned int *line_ptr)
d1fad7c6 7066{
b34976b6 7067 bfd_boolean found;
d1fad7c6
NC
7068
7069 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7070 filename_ptr, functionname_ptr,
7071 line_ptr))
d1fad7c6
NC
7072 {
7073 if (!*functionname_ptr)
4e8a9624
AM
7074 elf_find_function (abfd, section, symbols, offset,
7075 *filename_ptr ? NULL : filename_ptr,
7076 functionname_ptr);
7077
b34976b6 7078 return TRUE;
d1fad7c6
NC
7079 }
7080
7081 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7082 filename_ptr, functionname_ptr,
7083 line_ptr, 0,
7084 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7085 {
7086 if (!*functionname_ptr)
4e8a9624
AM
7087 elf_find_function (abfd, section, symbols, offset,
7088 *filename_ptr ? NULL : filename_ptr,
7089 functionname_ptr);
7090
b34976b6 7091 return TRUE;
d1fad7c6
NC
7092 }
7093
7094 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7095 &found, filename_ptr,
7096 functionname_ptr, line_ptr,
7097 &elf_tdata (abfd)->line_info))
b34976b6 7098 return FALSE;
dc43ada5 7099 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7100 return TRUE;
d1fad7c6
NC
7101
7102 if (symbols == NULL)
b34976b6 7103 return FALSE;
d1fad7c6
NC
7104
7105 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7106 filename_ptr, functionname_ptr))
b34976b6 7107 return FALSE;
d1fad7c6 7108
252b5132 7109 *line_ptr = 0;
b34976b6 7110 return TRUE;
252b5132
RH
7111}
7112
5420f73d
L
7113/* Find the line for a symbol. */
7114
7115bfd_boolean
7116_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7117 const char **filename_ptr, unsigned int *line_ptr)
7118{
7119 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7120 filename_ptr, line_ptr, 0,
7121 &elf_tdata (abfd)->dwarf2_find_line_info);
7122}
7123
4ab527b0
FF
7124/* After a call to bfd_find_nearest_line, successive calls to
7125 bfd_find_inliner_info can be used to get source information about
7126 each level of function inlining that terminated at the address
7127 passed to bfd_find_nearest_line. Currently this is only supported
7128 for DWARF2 with appropriate DWARF3 extensions. */
7129
7130bfd_boolean
7131_bfd_elf_find_inliner_info (bfd *abfd,
7132 const char **filename_ptr,
7133 const char **functionname_ptr,
7134 unsigned int *line_ptr)
7135{
7136 bfd_boolean found;
7137 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7138 functionname_ptr, line_ptr,
7139 & elf_tdata (abfd)->dwarf2_find_line_info);
7140 return found;
7141}
7142
252b5132 7143int
a6b96beb 7144_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7145{
8ded5a0f
AM
7146 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7147 int ret = bed->s->sizeof_ehdr;
252b5132 7148
a6b96beb 7149 if (!info->relocatable)
8ded5a0f 7150 {
62d7a5f6 7151 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7152
62d7a5f6
AM
7153 if (phdr_size == (bfd_size_type) -1)
7154 {
7155 struct elf_segment_map *m;
7156
7157 phdr_size = 0;
7158 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7159 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7160
62d7a5f6
AM
7161 if (phdr_size == 0)
7162 phdr_size = get_program_header_size (abfd, info);
7163 }
8ded5a0f
AM
7164
7165 elf_tdata (abfd)->program_header_size = phdr_size;
7166 ret += phdr_size;
7167 }
7168
252b5132
RH
7169 return ret;
7170}
7171
b34976b6 7172bfd_boolean
217aa764
AM
7173_bfd_elf_set_section_contents (bfd *abfd,
7174 sec_ptr section,
0f867abe 7175 const void *location,
217aa764
AM
7176 file_ptr offset,
7177 bfd_size_type count)
252b5132
RH
7178{
7179 Elf_Internal_Shdr *hdr;
dc810e39 7180 bfd_signed_vma pos;
252b5132
RH
7181
7182 if (! abfd->output_has_begun
217aa764 7183 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7184 return FALSE;
252b5132
RH
7185
7186 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7187 pos = hdr->sh_offset + offset;
7188 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7189 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7190 return FALSE;
252b5132 7191
b34976b6 7192 return TRUE;
252b5132
RH
7193}
7194
7195void
217aa764
AM
7196_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7197 arelent *cache_ptr ATTRIBUTE_UNUSED,
7198 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7199{
7200 abort ();
7201}
7202
252b5132
RH
7203/* Try to convert a non-ELF reloc into an ELF one. */
7204
b34976b6 7205bfd_boolean
217aa764 7206_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7207{
c044fabd 7208 /* Check whether we really have an ELF howto. */
252b5132
RH
7209
7210 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7211 {
7212 bfd_reloc_code_real_type code;
7213 reloc_howto_type *howto;
7214
7215 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7216 equivalent ELF reloc. */
252b5132
RH
7217
7218 if (areloc->howto->pc_relative)
7219 {
7220 switch (areloc->howto->bitsize)
7221 {
7222 case 8:
7223 code = BFD_RELOC_8_PCREL;
7224 break;
7225 case 12:
7226 code = BFD_RELOC_12_PCREL;
7227 break;
7228 case 16:
7229 code = BFD_RELOC_16_PCREL;
7230 break;
7231 case 24:
7232 code = BFD_RELOC_24_PCREL;
7233 break;
7234 case 32:
7235 code = BFD_RELOC_32_PCREL;
7236 break;
7237 case 64:
7238 code = BFD_RELOC_64_PCREL;
7239 break;
7240 default:
7241 goto fail;
7242 }
7243
7244 howto = bfd_reloc_type_lookup (abfd, code);
7245
7246 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7247 {
7248 if (howto->pcrel_offset)
7249 areloc->addend += areloc->address;
7250 else
7251 areloc->addend -= areloc->address; /* addend is unsigned!! */
7252 }
7253 }
7254 else
7255 {
7256 switch (areloc->howto->bitsize)
7257 {
7258 case 8:
7259 code = BFD_RELOC_8;
7260 break;
7261 case 14:
7262 code = BFD_RELOC_14;
7263 break;
7264 case 16:
7265 code = BFD_RELOC_16;
7266 break;
7267 case 26:
7268 code = BFD_RELOC_26;
7269 break;
7270 case 32:
7271 code = BFD_RELOC_32;
7272 break;
7273 case 64:
7274 code = BFD_RELOC_64;
7275 break;
7276 default:
7277 goto fail;
7278 }
7279
7280 howto = bfd_reloc_type_lookup (abfd, code);
7281 }
7282
7283 if (howto)
7284 areloc->howto = howto;
7285 else
7286 goto fail;
7287 }
7288
b34976b6 7289 return TRUE;
252b5132
RH
7290
7291 fail:
7292 (*_bfd_error_handler)
d003868e
AM
7293 (_("%B: unsupported relocation type %s"),
7294 abfd, areloc->howto->name);
252b5132 7295 bfd_set_error (bfd_error_bad_value);
b34976b6 7296 return FALSE;
252b5132
RH
7297}
7298
b34976b6 7299bfd_boolean
217aa764 7300_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7301{
7302 if (bfd_get_format (abfd) == bfd_object)
7303 {
b25e3d87 7304 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7305 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7306 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7307 }
7308
7309 return _bfd_generic_close_and_cleanup (abfd);
7310}
7311
7312/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7313 in the relocation's offset. Thus we cannot allow any sort of sanity
7314 range-checking to interfere. There is nothing else to do in processing
7315 this reloc. */
7316
7317bfd_reloc_status_type
217aa764
AM
7318_bfd_elf_rel_vtable_reloc_fn
7319 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7320 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7321 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7322 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7323{
7324 return bfd_reloc_ok;
7325}
252b5132
RH
7326\f
7327/* Elf core file support. Much of this only works on native
7328 toolchains, since we rely on knowing the
7329 machine-dependent procfs structure in order to pick
c044fabd 7330 out details about the corefile. */
252b5132
RH
7331
7332#ifdef HAVE_SYS_PROCFS_H
7333# include <sys/procfs.h>
7334#endif
7335
c044fabd 7336/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7337
7338static int
217aa764 7339elfcore_make_pid (bfd *abfd)
252b5132
RH
7340{
7341 return ((elf_tdata (abfd)->core_lwpid << 16)
7342 + (elf_tdata (abfd)->core_pid));
7343}
7344
252b5132
RH
7345/* If there isn't a section called NAME, make one, using
7346 data from SECT. Note, this function will generate a
7347 reference to NAME, so you shouldn't deallocate or
c044fabd 7348 overwrite it. */
252b5132 7349
b34976b6 7350static bfd_boolean
217aa764 7351elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7352{
c044fabd 7353 asection *sect2;
252b5132
RH
7354
7355 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7356 return TRUE;
252b5132 7357
117ed4f8 7358 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7359 if (sect2 == NULL)
b34976b6 7360 return FALSE;
252b5132 7361
eea6121a 7362 sect2->size = sect->size;
252b5132 7363 sect2->filepos = sect->filepos;
252b5132 7364 sect2->alignment_power = sect->alignment_power;
b34976b6 7365 return TRUE;
252b5132
RH
7366}
7367
bb0082d6
AM
7368/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7369 actually creates up to two pseudosections:
7370 - For the single-threaded case, a section named NAME, unless
7371 such a section already exists.
7372 - For the multi-threaded case, a section named "NAME/PID", where
7373 PID is elfcore_make_pid (abfd).
7374 Both pseudosections have identical contents. */
b34976b6 7375bfd_boolean
217aa764
AM
7376_bfd_elfcore_make_pseudosection (bfd *abfd,
7377 char *name,
7378 size_t size,
7379 ufile_ptr filepos)
bb0082d6
AM
7380{
7381 char buf[100];
7382 char *threaded_name;
d4c88bbb 7383 size_t len;
bb0082d6
AM
7384 asection *sect;
7385
7386 /* Build the section name. */
7387
7388 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7389 len = strlen (buf) + 1;
217aa764 7390 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7391 if (threaded_name == NULL)
b34976b6 7392 return FALSE;
d4c88bbb 7393 memcpy (threaded_name, buf, len);
bb0082d6 7394
117ed4f8
AM
7395 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7396 SEC_HAS_CONTENTS);
bb0082d6 7397 if (sect == NULL)
b34976b6 7398 return FALSE;
eea6121a 7399 sect->size = size;
bb0082d6 7400 sect->filepos = filepos;
bb0082d6
AM
7401 sect->alignment_power = 2;
7402
936e320b 7403 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7404}
7405
252b5132 7406/* prstatus_t exists on:
4a938328 7407 solaris 2.5+
252b5132
RH
7408 linux 2.[01] + glibc
7409 unixware 4.2
7410*/
7411
7412#if defined (HAVE_PRSTATUS_T)
a7b97311 7413
b34976b6 7414static bfd_boolean
217aa764 7415elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7416{
eea6121a 7417 size_t size;
7ee38065 7418 int offset;
252b5132 7419
4a938328
MS
7420 if (note->descsz == sizeof (prstatus_t))
7421 {
7422 prstatus_t prstat;
252b5132 7423
eea6121a 7424 size = sizeof (prstat.pr_reg);
7ee38065 7425 offset = offsetof (prstatus_t, pr_reg);
4a938328 7426 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7427
fa49d224
NC
7428 /* Do not overwrite the core signal if it
7429 has already been set by another thread. */
7430 if (elf_tdata (abfd)->core_signal == 0)
7431 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7432 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7433
4a938328
MS
7434 /* pr_who exists on:
7435 solaris 2.5+
7436 unixware 4.2
7437 pr_who doesn't exist on:
7438 linux 2.[01]
7439 */
252b5132 7440#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7441 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7442#endif
4a938328 7443 }
7ee38065 7444#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7445 else if (note->descsz == sizeof (prstatus32_t))
7446 {
7447 /* 64-bit host, 32-bit corefile */
7448 prstatus32_t prstat;
7449
eea6121a 7450 size = sizeof (prstat.pr_reg);
7ee38065 7451 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7452 memcpy (&prstat, note->descdata, sizeof (prstat));
7453
fa49d224
NC
7454 /* Do not overwrite the core signal if it
7455 has already been set by another thread. */
7456 if (elf_tdata (abfd)->core_signal == 0)
7457 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7458 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7459
7460 /* pr_who exists on:
7461 solaris 2.5+
7462 unixware 4.2
7463 pr_who doesn't exist on:
7464 linux 2.[01]
7465 */
7ee38065 7466#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7467 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7468#endif
7469 }
7ee38065 7470#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7471 else
7472 {
7473 /* Fail - we don't know how to handle any other
7474 note size (ie. data object type). */
b34976b6 7475 return TRUE;
4a938328 7476 }
252b5132 7477
bb0082d6 7478 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7479 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7480 size, note->descpos + offset);
252b5132
RH
7481}
7482#endif /* defined (HAVE_PRSTATUS_T) */
7483
bb0082d6 7484/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7485static bfd_boolean
217aa764
AM
7486elfcore_make_note_pseudosection (bfd *abfd,
7487 char *name,
7488 Elf_Internal_Note *note)
252b5132 7489{
936e320b
AM
7490 return _bfd_elfcore_make_pseudosection (abfd, name,
7491 note->descsz, note->descpos);
252b5132
RH
7492}
7493
ff08c6bb
JB
7494/* There isn't a consistent prfpregset_t across platforms,
7495 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7496 data structure apart. */
7497
b34976b6 7498static bfd_boolean
217aa764 7499elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7500{
7501 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7502}
7503
ff08c6bb 7504/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 7505 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 7506 literally. */
c044fabd 7507
b34976b6 7508static bfd_boolean
217aa764 7509elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7510{
7511 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7512}
7513
97753bd5
AM
7514static bfd_boolean
7515elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
7516{
7517 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
7518}
7519
7520
252b5132 7521#if defined (HAVE_PRPSINFO_T)
4a938328 7522typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7523#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7524typedef prpsinfo32_t elfcore_psinfo32_t;
7525#endif
252b5132
RH
7526#endif
7527
7528#if defined (HAVE_PSINFO_T)
4a938328 7529typedef psinfo_t elfcore_psinfo_t;
7ee38065 7530#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7531typedef psinfo32_t elfcore_psinfo32_t;
7532#endif
252b5132
RH
7533#endif
7534
252b5132
RH
7535/* return a malloc'ed copy of a string at START which is at
7536 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7537 the copy will always have a terminating '\0'. */
252b5132 7538
936e320b 7539char *
217aa764 7540_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7541{
dc810e39 7542 char *dups;
c044fabd 7543 char *end = memchr (start, '\0', max);
dc810e39 7544 size_t len;
252b5132
RH
7545
7546 if (end == NULL)
7547 len = max;
7548 else
7549 len = end - start;
7550
217aa764 7551 dups = bfd_alloc (abfd, len + 1);
dc810e39 7552 if (dups == NULL)
252b5132
RH
7553 return NULL;
7554
dc810e39
AM
7555 memcpy (dups, start, len);
7556 dups[len] = '\0';
252b5132 7557
dc810e39 7558 return dups;
252b5132
RH
7559}
7560
bb0082d6 7561#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7562static bfd_boolean
217aa764 7563elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7564{
4a938328
MS
7565 if (note->descsz == sizeof (elfcore_psinfo_t))
7566 {
7567 elfcore_psinfo_t psinfo;
252b5132 7568
7ee38065 7569 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7570
4a938328 7571 elf_tdata (abfd)->core_program
936e320b
AM
7572 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7573 sizeof (psinfo.pr_fname));
252b5132 7574
4a938328 7575 elf_tdata (abfd)->core_command
936e320b
AM
7576 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7577 sizeof (psinfo.pr_psargs));
4a938328 7578 }
7ee38065 7579#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7580 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7581 {
7582 /* 64-bit host, 32-bit corefile */
7583 elfcore_psinfo32_t psinfo;
7584
7ee38065 7585 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7586
4a938328 7587 elf_tdata (abfd)->core_program
936e320b
AM
7588 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7589 sizeof (psinfo.pr_fname));
4a938328
MS
7590
7591 elf_tdata (abfd)->core_command
936e320b
AM
7592 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7593 sizeof (psinfo.pr_psargs));
4a938328
MS
7594 }
7595#endif
7596
7597 else
7598 {
7599 /* Fail - we don't know how to handle any other
7600 note size (ie. data object type). */
b34976b6 7601 return TRUE;
4a938328 7602 }
252b5132
RH
7603
7604 /* Note that for some reason, a spurious space is tacked
7605 onto the end of the args in some (at least one anyway)
c044fabd 7606 implementations, so strip it off if it exists. */
252b5132
RH
7607
7608 {
c044fabd 7609 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7610 int n = strlen (command);
7611
7612 if (0 < n && command[n - 1] == ' ')
7613 command[n - 1] = '\0';
7614 }
7615
b34976b6 7616 return TRUE;
252b5132
RH
7617}
7618#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7619
252b5132 7620#if defined (HAVE_PSTATUS_T)
b34976b6 7621static bfd_boolean
217aa764 7622elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7623{
f572a39d
AM
7624 if (note->descsz == sizeof (pstatus_t)
7625#if defined (HAVE_PXSTATUS_T)
7626 || note->descsz == sizeof (pxstatus_t)
7627#endif
7628 )
4a938328
MS
7629 {
7630 pstatus_t pstat;
252b5132 7631
4a938328 7632 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7633
4a938328
MS
7634 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7635 }
7ee38065 7636#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7637 else if (note->descsz == sizeof (pstatus32_t))
7638 {
7639 /* 64-bit host, 32-bit corefile */
7640 pstatus32_t pstat;
252b5132 7641
4a938328 7642 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7643
4a938328
MS
7644 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7645 }
7646#endif
252b5132
RH
7647 /* Could grab some more details from the "representative"
7648 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7649 NT_LWPSTATUS note, presumably. */
252b5132 7650
b34976b6 7651 return TRUE;
252b5132
RH
7652}
7653#endif /* defined (HAVE_PSTATUS_T) */
7654
252b5132 7655#if defined (HAVE_LWPSTATUS_T)
b34976b6 7656static bfd_boolean
217aa764 7657elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7658{
7659 lwpstatus_t lwpstat;
7660 char buf[100];
c044fabd 7661 char *name;
d4c88bbb 7662 size_t len;
c044fabd 7663 asection *sect;
252b5132 7664
f572a39d
AM
7665 if (note->descsz != sizeof (lwpstat)
7666#if defined (HAVE_LWPXSTATUS_T)
7667 && note->descsz != sizeof (lwpxstatus_t)
7668#endif
7669 )
b34976b6 7670 return TRUE;
252b5132
RH
7671
7672 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7673
7674 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7675 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7676
c044fabd 7677 /* Make a ".reg/999" section. */
252b5132
RH
7678
7679 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7680 len = strlen (buf) + 1;
217aa764 7681 name = bfd_alloc (abfd, len);
252b5132 7682 if (name == NULL)
b34976b6 7683 return FALSE;
d4c88bbb 7684 memcpy (name, buf, len);
252b5132 7685
117ed4f8 7686 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7687 if (sect == NULL)
b34976b6 7688 return FALSE;
252b5132
RH
7689
7690#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7691 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7692 sect->filepos = note->descpos
7693 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7694#endif
7695
7696#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7697 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7698 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7699#endif
7700
252b5132
RH
7701 sect->alignment_power = 2;
7702
7703 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7704 return FALSE;
252b5132
RH
7705
7706 /* Make a ".reg2/999" section */
7707
7708 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7709 len = strlen (buf) + 1;
217aa764 7710 name = bfd_alloc (abfd, len);
252b5132 7711 if (name == NULL)
b34976b6 7712 return FALSE;
d4c88bbb 7713 memcpy (name, buf, len);
252b5132 7714
117ed4f8 7715 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7716 if (sect == NULL)
b34976b6 7717 return FALSE;
252b5132
RH
7718
7719#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7720 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7721 sect->filepos = note->descpos
7722 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7723#endif
7724
7725#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7726 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7727 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7728#endif
7729
252b5132
RH
7730 sect->alignment_power = 2;
7731
936e320b 7732 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7733}
7734#endif /* defined (HAVE_LWPSTATUS_T) */
7735
b34976b6 7736static bfd_boolean
217aa764 7737elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7738{
7739 char buf[30];
c044fabd 7740 char *name;
d4c88bbb 7741 size_t len;
c044fabd 7742 asection *sect;
4a6636fb
PA
7743 int type;
7744 int is_active_thread;
7745 bfd_vma base_addr;
16e9c715 7746
4a6636fb 7747 if (note->descsz < 728)
b34976b6 7748 return TRUE;
16e9c715 7749
4a6636fb
PA
7750 if (! CONST_STRNEQ (note->namedata, "win32"))
7751 return TRUE;
7752
7753 type = bfd_get_32 (abfd, note->descdata);
c044fabd 7754
4a6636fb 7755 switch (type)
16e9c715 7756 {
4a6636fb 7757 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 7758 /* FIXME: need to add ->core_command. */
4a6636fb
PA
7759 /* process_info.pid */
7760 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
7761 /* process_info.signal */
7762 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 7763 break;
16e9c715 7764
4a6636fb 7765 case 2 /* NOTE_INFO_THREAD */:
16e9c715 7766 /* Make a ".reg/999" section. */
4a6636fb
PA
7767 /* thread_info.tid */
7768 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 7769
d4c88bbb 7770 len = strlen (buf) + 1;
217aa764 7771 name = bfd_alloc (abfd, len);
16e9c715 7772 if (name == NULL)
b34976b6 7773 return FALSE;
c044fabd 7774
d4c88bbb 7775 memcpy (name, buf, len);
16e9c715 7776
117ed4f8 7777 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 7778 if (sect == NULL)
b34976b6 7779 return FALSE;
c044fabd 7780
4a6636fb
PA
7781 /* sizeof (thread_info.thread_context) */
7782 sect->size = 716;
7783 /* offsetof (thread_info.thread_context) */
7784 sect->filepos = note->descpos + 12;
16e9c715
NC
7785 sect->alignment_power = 2;
7786
4a6636fb
PA
7787 /* thread_info.is_active_thread */
7788 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
7789
7790 if (is_active_thread)
16e9c715 7791 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7792 return FALSE;
16e9c715
NC
7793 break;
7794
4a6636fb 7795 case 3 /* NOTE_INFO_MODULE */:
16e9c715 7796 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
7797 /* module_info.base_address */
7798 base_addr = bfd_get_32 (abfd, note->descdata + 4);
7799 sprintf (buf, ".module/%08lx", (long) base_addr);
c044fabd 7800
d4c88bbb 7801 len = strlen (buf) + 1;
217aa764 7802 name = bfd_alloc (abfd, len);
16e9c715 7803 if (name == NULL)
b34976b6 7804 return FALSE;
c044fabd 7805
d4c88bbb 7806 memcpy (name, buf, len);
252b5132 7807
117ed4f8 7808 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 7809
16e9c715 7810 if (sect == NULL)
b34976b6 7811 return FALSE;
c044fabd 7812
eea6121a 7813 sect->size = note->descsz;
16e9c715 7814 sect->filepos = note->descpos;
16e9c715
NC
7815 sect->alignment_power = 2;
7816 break;
7817
7818 default:
b34976b6 7819 return TRUE;
16e9c715
NC
7820 }
7821
b34976b6 7822 return TRUE;
16e9c715 7823}
252b5132 7824
b34976b6 7825static bfd_boolean
217aa764 7826elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7827{
9c5bfbb7 7828 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7829
252b5132
RH
7830 switch (note->type)
7831 {
7832 default:
b34976b6 7833 return TRUE;
252b5132 7834
252b5132 7835 case NT_PRSTATUS:
bb0082d6
AM
7836 if (bed->elf_backend_grok_prstatus)
7837 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7838 return TRUE;
bb0082d6 7839#if defined (HAVE_PRSTATUS_T)
252b5132 7840 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7841#else
b34976b6 7842 return TRUE;
252b5132
RH
7843#endif
7844
7845#if defined (HAVE_PSTATUS_T)
7846 case NT_PSTATUS:
7847 return elfcore_grok_pstatus (abfd, note);
7848#endif
7849
7850#if defined (HAVE_LWPSTATUS_T)
7851 case NT_LWPSTATUS:
7852 return elfcore_grok_lwpstatus (abfd, note);
7853#endif
7854
7855 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7856 return elfcore_grok_prfpreg (abfd, note);
7857
c044fabd 7858 case NT_WIN32PSTATUS:
16e9c715 7859 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 7860
c044fabd 7861 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7862 if (note->namesz == 6
7863 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7864 return elfcore_grok_prxfpreg (abfd, note);
7865 else
b34976b6 7866 return TRUE;
ff08c6bb 7867
97753bd5
AM
7868 case NT_PPC_VMX:
7869 if (note->namesz == 6
7870 && strcmp (note->namedata, "LINUX") == 0)
7871 return elfcore_grok_ppc_vmx (abfd, note);
7872 else
7873 return TRUE;
7874
252b5132
RH
7875 case NT_PRPSINFO:
7876 case NT_PSINFO:
bb0082d6
AM
7877 if (bed->elf_backend_grok_psinfo)
7878 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7879 return TRUE;
bb0082d6 7880#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7881 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7882#else
b34976b6 7883 return TRUE;
252b5132 7884#endif
3333a7c3
RM
7885
7886 case NT_AUXV:
7887 {
117ed4f8
AM
7888 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
7889 SEC_HAS_CONTENTS);
3333a7c3
RM
7890
7891 if (sect == NULL)
7892 return FALSE;
eea6121a 7893 sect->size = note->descsz;
3333a7c3 7894 sect->filepos = note->descpos;
3333a7c3
RM
7895 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7896
7897 return TRUE;
7898 }
252b5132
RH
7899 }
7900}
7901
718175fa
JK
7902static bfd_boolean
7903elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
7904{
7905 elf_tdata (abfd)->build_id_size = note->descsz;
7906 elf_tdata (abfd)->build_id = bfd_alloc (abfd, note->descsz);
7907 if (elf_tdata (abfd)->build_id == NULL)
7908 return FALSE;
7909
7910 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
7911
7912 return TRUE;
7913}
7914
7915static bfd_boolean
7916elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
7917{
7918 switch (note->type)
7919 {
7920 default:
7921 return TRUE;
7922
7923 case NT_GNU_BUILD_ID:
7924 return elfobj_grok_gnu_build_id (abfd, note);
7925 }
7926}
7927
b34976b6 7928static bfd_boolean
217aa764 7929elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
7930{
7931 char *cp;
7932
7933 cp = strchr (note->namedata, '@');
7934 if (cp != NULL)
7935 {
d2b64500 7936 *lwpidp = atoi(cp + 1);
b34976b6 7937 return TRUE;
50b2bdb7 7938 }
b34976b6 7939 return FALSE;
50b2bdb7
AM
7940}
7941
b34976b6 7942static bfd_boolean
217aa764 7943elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 7944{
50b2bdb7
AM
7945 /* Signal number at offset 0x08. */
7946 elf_tdata (abfd)->core_signal
7947 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
7948
7949 /* Process ID at offset 0x50. */
7950 elf_tdata (abfd)->core_pid
7951 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
7952
7953 /* Command name at 0x7c (max 32 bytes, including nul). */
7954 elf_tdata (abfd)->core_command
7955 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
7956
7720ba9f
MK
7957 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
7958 note);
50b2bdb7
AM
7959}
7960
b34976b6 7961static bfd_boolean
217aa764 7962elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
7963{
7964 int lwp;
7965
7966 if (elfcore_netbsd_get_lwpid (note, &lwp))
7967 elf_tdata (abfd)->core_lwpid = lwp;
7968
b4db1224 7969 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
7970 {
7971 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
7972 find this note before any of the others, which is fine,
7973 since the kernel writes this note out first when it
7974 creates a core file. */
47d9a591 7975
50b2bdb7
AM
7976 return elfcore_grok_netbsd_procinfo (abfd, note);
7977 }
7978
b4db1224
JT
7979 /* As of Jan 2002 there are no other machine-independent notes
7980 defined for NetBSD core files. If the note type is less
7981 than the start of the machine-dependent note types, we don't
7982 understand it. */
47d9a591 7983
b4db1224 7984 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 7985 return TRUE;
50b2bdb7
AM
7986
7987
7988 switch (bfd_get_arch (abfd))
7989 {
08a40648
AM
7990 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
7991 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
7992
7993 case bfd_arch_alpha:
7994 case bfd_arch_sparc:
7995 switch (note->type)
08a40648
AM
7996 {
7997 case NT_NETBSDCORE_FIRSTMACH+0:
7998 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 7999
08a40648
AM
8000 case NT_NETBSDCORE_FIRSTMACH+2:
8001 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8002
08a40648
AM
8003 default:
8004 return TRUE;
8005 }
50b2bdb7 8006
08a40648
AM
8007 /* On all other arch's, PT_GETREGS == mach+1 and
8008 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8009
8010 default:
8011 switch (note->type)
08a40648
AM
8012 {
8013 case NT_NETBSDCORE_FIRSTMACH+1:
8014 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8015
08a40648
AM
8016 case NT_NETBSDCORE_FIRSTMACH+3:
8017 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8018
08a40648
AM
8019 default:
8020 return TRUE;
8021 }
50b2bdb7
AM
8022 }
8023 /* NOTREACHED */
8024}
8025
07c6e936 8026static bfd_boolean
d3fd4074 8027elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8028{
8029 void *ddata = note->descdata;
8030 char buf[100];
8031 char *name;
8032 asection *sect;
f8843e87
AM
8033 short sig;
8034 unsigned flags;
07c6e936
NC
8035
8036 /* nto_procfs_status 'pid' field is at offset 0. */
8037 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8038
f8843e87
AM
8039 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8040 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8041
8042 /* nto_procfs_status 'flags' field is at offset 8. */
8043 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8044
8045 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8046 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8047 {
8048 elf_tdata (abfd)->core_signal = sig;
8049 elf_tdata (abfd)->core_lwpid = *tid;
8050 }
07c6e936 8051
f8843e87
AM
8052 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8053 do not come from signals so we make sure we set the current
8054 thread just in case. */
8055 if (flags & 0x00000080)
8056 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8057
8058 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8059 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8060
217aa764 8061 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8062 if (name == NULL)
8063 return FALSE;
8064 strcpy (name, buf);
8065
117ed4f8 8066 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8067 if (sect == NULL)
8068 return FALSE;
8069
eea6121a 8070 sect->size = note->descsz;
07c6e936 8071 sect->filepos = note->descpos;
07c6e936
NC
8072 sect->alignment_power = 2;
8073
8074 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8075}
8076
8077static bfd_boolean
d69f560c
KW
8078elfcore_grok_nto_regs (bfd *abfd,
8079 Elf_Internal_Note *note,
d3fd4074 8080 long tid,
d69f560c 8081 char *base)
07c6e936
NC
8082{
8083 char buf[100];
8084 char *name;
8085 asection *sect;
8086
d69f560c 8087 /* Make a "(base)/%d" section. */
d3fd4074 8088 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8089
217aa764 8090 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8091 if (name == NULL)
8092 return FALSE;
8093 strcpy (name, buf);
8094
117ed4f8 8095 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8096 if (sect == NULL)
8097 return FALSE;
8098
eea6121a 8099 sect->size = note->descsz;
07c6e936 8100 sect->filepos = note->descpos;
07c6e936
NC
8101 sect->alignment_power = 2;
8102
f8843e87
AM
8103 /* This is the current thread. */
8104 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8105 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8106
8107 return TRUE;
07c6e936
NC
8108}
8109
8110#define BFD_QNT_CORE_INFO 7
8111#define BFD_QNT_CORE_STATUS 8
8112#define BFD_QNT_CORE_GREG 9
8113#define BFD_QNT_CORE_FPREG 10
8114
8115static bfd_boolean
217aa764 8116elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8117{
8118 /* Every GREG section has a STATUS section before it. Store the
811072d8 8119 tid from the previous call to pass down to the next gregs
07c6e936 8120 function. */
d3fd4074 8121 static long tid = 1;
07c6e936
NC
8122
8123 switch (note->type)
8124 {
d69f560c
KW
8125 case BFD_QNT_CORE_INFO:
8126 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8127 case BFD_QNT_CORE_STATUS:
8128 return elfcore_grok_nto_status (abfd, note, &tid);
8129 case BFD_QNT_CORE_GREG:
8130 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8131 case BFD_QNT_CORE_FPREG:
8132 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8133 default:
8134 return TRUE;
07c6e936
NC
8135 }
8136}
8137
b15fa79e
AM
8138static bfd_boolean
8139elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8140{
8141 char *name;
8142 asection *sect;
8143 size_t len;
8144
8145 /* Use note name as section name. */
8146 len = note->namesz;
8147 name = bfd_alloc (abfd, len);
8148 if (name == NULL)
8149 return FALSE;
8150 memcpy (name, note->namedata, len);
8151 name[len - 1] = '\0';
8152
8153 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8154 if (sect == NULL)
8155 return FALSE;
8156
8157 sect->size = note->descsz;
8158 sect->filepos = note->descpos;
8159 sect->alignment_power = 1;
8160
8161 return TRUE;
8162}
8163
7c76fa91
MS
8164/* Function: elfcore_write_note
8165
47d9a591 8166 Inputs:
a39f3346 8167 buffer to hold note, and current size of buffer
7c76fa91
MS
8168 name of note
8169 type of note
8170 data for note
8171 size of data for note
8172
a39f3346
AM
8173 Writes note to end of buffer. ELF64 notes are written exactly as
8174 for ELF32, despite the current (as of 2006) ELF gabi specifying
8175 that they ought to have 8-byte namesz and descsz field, and have
8176 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8177
7c76fa91 8178 Return:
a39f3346 8179 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8180
8181char *
a39f3346 8182elfcore_write_note (bfd *abfd,
217aa764 8183 char *buf,
a39f3346 8184 int *bufsiz,
217aa764 8185 const char *name,
a39f3346 8186 int type,
217aa764 8187 const void *input,
a39f3346 8188 int size)
7c76fa91
MS
8189{
8190 Elf_External_Note *xnp;
d4c88bbb 8191 size_t namesz;
d4c88bbb 8192 size_t newspace;
a39f3346 8193 char *dest;
7c76fa91 8194
d4c88bbb 8195 namesz = 0;
d4c88bbb 8196 if (name != NULL)
a39f3346 8197 namesz = strlen (name) + 1;
d4c88bbb 8198
a39f3346 8199 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 8200
a39f3346 8201 buf = realloc (buf, *bufsiz + newspace);
14b1c01e
AM
8202 if (buf == NULL)
8203 return buf;
a39f3346 8204 dest = buf + *bufsiz;
7c76fa91
MS
8205 *bufsiz += newspace;
8206 xnp = (Elf_External_Note *) dest;
8207 H_PUT_32 (abfd, namesz, xnp->namesz);
8208 H_PUT_32 (abfd, size, xnp->descsz);
8209 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8210 dest = xnp->name;
8211 if (name != NULL)
8212 {
8213 memcpy (dest, name, namesz);
8214 dest += namesz;
a39f3346 8215 while (namesz & 3)
d4c88bbb
AM
8216 {
8217 *dest++ = '\0';
a39f3346 8218 ++namesz;
d4c88bbb
AM
8219 }
8220 }
8221 memcpy (dest, input, size);
a39f3346
AM
8222 dest += size;
8223 while (size & 3)
8224 {
8225 *dest++ = '\0';
8226 ++size;
8227 }
8228 return buf;
7c76fa91
MS
8229}
8230
8231#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8232char *
217aa764
AM
8233elfcore_write_prpsinfo (bfd *abfd,
8234 char *buf,
8235 int *bufsiz,
8236 const char *fname,
8237 const char *psargs)
7c76fa91 8238{
183e98be
AM
8239 const char *note_name = "CORE";
8240 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8241
8242 if (bed->elf_backend_write_core_note != NULL)
8243 {
8244 char *ret;
8245 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8246 NT_PRPSINFO, fname, psargs);
8247 if (ret != NULL)
8248 return ret;
8249 }
7c76fa91 8250
183e98be
AM
8251#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
8252 if (bed->s->elfclass == ELFCLASS32)
8253 {
8254#if defined (HAVE_PSINFO32_T)
8255 psinfo32_t data;
8256 int note_type = NT_PSINFO;
8257#else
8258 prpsinfo32_t data;
8259 int note_type = NT_PRPSINFO;
8260#endif
8261
8262 memset (&data, 0, sizeof (data));
8263 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8264 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8265 return elfcore_write_note (abfd, buf, bufsiz,
8266 note_name, note_type, &data, sizeof (data));
8267 }
8268 else
8269#endif
8270 {
7c76fa91 8271#if defined (HAVE_PSINFO_T)
183e98be
AM
8272 psinfo_t data;
8273 int note_type = NT_PSINFO;
7c76fa91 8274#else
183e98be
AM
8275 prpsinfo_t data;
8276 int note_type = NT_PRPSINFO;
7c76fa91
MS
8277#endif
8278
183e98be
AM
8279 memset (&data, 0, sizeof (data));
8280 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8281 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8282 return elfcore_write_note (abfd, buf, bufsiz,
8283 note_name, note_type, &data, sizeof (data));
8284 }
7c76fa91
MS
8285}
8286#endif /* PSINFO_T or PRPSINFO_T */
8287
8288#if defined (HAVE_PRSTATUS_T)
8289char *
217aa764
AM
8290elfcore_write_prstatus (bfd *abfd,
8291 char *buf,
8292 int *bufsiz,
8293 long pid,
8294 int cursig,
8295 const void *gregs)
7c76fa91 8296{
183e98be
AM
8297 const char *note_name = "CORE";
8298 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8299
183e98be
AM
8300 if (bed->elf_backend_write_core_note != NULL)
8301 {
8302 char *ret;
8303 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8304 NT_PRSTATUS,
8305 pid, cursig, gregs);
8306 if (ret != NULL)
8307 return ret;
8308 }
8309
8310#if defined (HAVE_PRSTATUS32_T)
8311 if (bed->s->elfclass == ELFCLASS32)
8312 {
8313 prstatus32_t prstat;
8314
8315 memset (&prstat, 0, sizeof (prstat));
8316 prstat.pr_pid = pid;
8317 prstat.pr_cursig = cursig;
8318 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8319 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8320 NT_PRSTATUS, &prstat, sizeof (prstat));
8321 }
8322 else
8323#endif
8324 {
8325 prstatus_t prstat;
8326
8327 memset (&prstat, 0, sizeof (prstat));
8328 prstat.pr_pid = pid;
8329 prstat.pr_cursig = cursig;
8330 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8331 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8332 NT_PRSTATUS, &prstat, sizeof (prstat));
8333 }
7c76fa91
MS
8334}
8335#endif /* HAVE_PRSTATUS_T */
8336
51316059
MS
8337#if defined (HAVE_LWPSTATUS_T)
8338char *
217aa764
AM
8339elfcore_write_lwpstatus (bfd *abfd,
8340 char *buf,
8341 int *bufsiz,
8342 long pid,
8343 int cursig,
8344 const void *gregs)
51316059
MS
8345{
8346 lwpstatus_t lwpstat;
183e98be 8347 const char *note_name = "CORE";
51316059
MS
8348
8349 memset (&lwpstat, 0, sizeof (lwpstat));
8350 lwpstat.pr_lwpid = pid >> 16;
8351 lwpstat.pr_cursig = cursig;
8352#if defined (HAVE_LWPSTATUS_T_PR_REG)
8353 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8354#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8355#if !defined(gregs)
8356 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8357 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8358#else
8359 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8360 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8361#endif
8362#endif
47d9a591 8363 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8364 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8365}
8366#endif /* HAVE_LWPSTATUS_T */
8367
7c76fa91
MS
8368#if defined (HAVE_PSTATUS_T)
8369char *
217aa764
AM
8370elfcore_write_pstatus (bfd *abfd,
8371 char *buf,
8372 int *bufsiz,
8373 long pid,
6c10990d
NC
8374 int cursig ATTRIBUTE_UNUSED,
8375 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 8376{
183e98be
AM
8377 const char *note_name = "CORE";
8378#if defined (HAVE_PSTATUS32_T)
8379 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8380
183e98be
AM
8381 if (bed->s->elfclass == ELFCLASS32)
8382 {
8383 pstatus32_t pstat;
8384
8385 memset (&pstat, 0, sizeof (pstat));
8386 pstat.pr_pid = pid & 0xffff;
8387 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8388 NT_PSTATUS, &pstat, sizeof (pstat));
8389 return buf;
8390 }
8391 else
8392#endif
8393 {
8394 pstatus_t pstat;
8395
8396 memset (&pstat, 0, sizeof (pstat));
8397 pstat.pr_pid = pid & 0xffff;
8398 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8399 NT_PSTATUS, &pstat, sizeof (pstat));
8400 return buf;
8401 }
7c76fa91
MS
8402}
8403#endif /* HAVE_PSTATUS_T */
8404
8405char *
217aa764
AM
8406elfcore_write_prfpreg (bfd *abfd,
8407 char *buf,
8408 int *bufsiz,
8409 const void *fpregs,
8410 int size)
7c76fa91 8411{
183e98be 8412 const char *note_name = "CORE";
47d9a591 8413 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8414 note_name, NT_FPREGSET, fpregs, size);
8415}
8416
8417char *
217aa764
AM
8418elfcore_write_prxfpreg (bfd *abfd,
8419 char *buf,
8420 int *bufsiz,
8421 const void *xfpregs,
8422 int size)
7c76fa91
MS
8423{
8424 char *note_name = "LINUX";
47d9a591 8425 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8426 note_name, NT_PRXFPREG, xfpregs, size);
8427}
8428
97753bd5
AM
8429char *
8430elfcore_write_ppc_vmx (bfd *abfd,
8431 char *buf,
8432 int *bufsiz,
8433 const void *ppc_vmx,
8434 int size)
8435{
8436 char *note_name = "LINUX";
8437 return elfcore_write_note (abfd, buf, bufsiz,
8438 note_name, NT_PPC_VMX, ppc_vmx, size);
8439}
8440
b34976b6 8441static bfd_boolean
718175fa 8442elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 8443{
c044fabd 8444 char *p;
252b5132 8445
252b5132
RH
8446 p = buf;
8447 while (p < buf + size)
8448 {
c044fabd
KH
8449 /* FIXME: bad alignment assumption. */
8450 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8451 Elf_Internal_Note in;
8452
dc810e39 8453 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8454
dc810e39 8455 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132
RH
8456 in.namedata = xnp->name;
8457
dc810e39 8458 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8459 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8460 in.descpos = offset + (in.descdata - buf);
8461
718175fa
JK
8462 switch (bfd_get_format (abfd))
8463 {
8464 default:
8465 return TRUE;
8466
8467 case bfd_core:
8468 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
8469 {
8470 if (! elfcore_grok_netbsd_note (abfd, &in))
8471 return FALSE;
8472 }
8473 else if (CONST_STRNEQ (in.namedata, "QNX"))
8474 {
8475 if (! elfcore_grok_nto_note (abfd, &in))
8476 return FALSE;
8477 }
b15fa79e
AM
8478 else if (CONST_STRNEQ (in.namedata, "SPU/"))
8479 {
8480 if (! elfcore_grok_spu_note (abfd, &in))
8481 return FALSE;
8482 }
718175fa
JK
8483 else
8484 {
8485 if (! elfcore_grok_note (abfd, &in))
8486 return FALSE;
8487 }
8488 break;
8489
8490 case bfd_object:
8491 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
8492 {
8493 if (! elfobj_grok_gnu_note (abfd, &in))
8494 return FALSE;
8495 }
8496 break;
08a40648 8497 }
252b5132
RH
8498
8499 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8500 }
8501
718175fa
JK
8502 return TRUE;
8503}
8504
8505static bfd_boolean
8506elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
8507{
8508 char *buf;
8509
8510 if (size <= 0)
8511 return TRUE;
8512
8513 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
8514 return FALSE;
8515
8516 buf = bfd_malloc (size);
8517 if (buf == NULL)
8518 return FALSE;
8519
8520 if (bfd_bread (buf, size, abfd) != size
8521 || !elf_parse_notes (abfd, buf, size, offset))
8522 {
8523 free (buf);
8524 return FALSE;
8525 }
8526
252b5132 8527 free (buf);
b34976b6 8528 return TRUE;
252b5132 8529}
98d8431c
JB
8530\f
8531/* Providing external access to the ELF program header table. */
8532
8533/* Return an upper bound on the number of bytes required to store a
8534 copy of ABFD's program header table entries. Return -1 if an error
8535 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8536
98d8431c 8537long
217aa764 8538bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8539{
8540 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8541 {
8542 bfd_set_error (bfd_error_wrong_format);
8543 return -1;
8544 }
8545
936e320b 8546 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8547}
8548
98d8431c
JB
8549/* Copy ABFD's program header table entries to *PHDRS. The entries
8550 will be stored as an array of Elf_Internal_Phdr structures, as
8551 defined in include/elf/internal.h. To find out how large the
8552 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
8553
8554 Return the number of program header table entries read, or -1 if an
8555 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 8556
98d8431c 8557int
217aa764 8558bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
8559{
8560 int num_phdrs;
8561
8562 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8563 {
8564 bfd_set_error (bfd_error_wrong_format);
8565 return -1;
8566 }
8567
8568 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8569 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8570 num_phdrs * sizeof (Elf_Internal_Phdr));
8571
8572 return num_phdrs;
8573}
ae4221d7 8574
db6751f2 8575enum elf_reloc_type_class
217aa764 8576_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8577{
8578 return reloc_class_normal;
8579}
f8df10f4 8580
47d9a591 8581/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8582 relocation against a local symbol. */
8583
8584bfd_vma
217aa764
AM
8585_bfd_elf_rela_local_sym (bfd *abfd,
8586 Elf_Internal_Sym *sym,
8517fae7 8587 asection **psec,
217aa764 8588 Elf_Internal_Rela *rel)
f8df10f4 8589{
8517fae7 8590 asection *sec = *psec;
f8df10f4
JJ
8591 bfd_vma relocation;
8592
8593 relocation = (sec->output_section->vma
8594 + sec->output_offset
8595 + sym->st_value);
8596 if ((sec->flags & SEC_MERGE)
c629eae0 8597 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8598 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8599 {
f8df10f4 8600 rel->r_addend =
8517fae7 8601 _bfd_merged_section_offset (abfd, psec,
65765700 8602 elf_section_data (sec)->sec_info,
753731ee
AM
8603 sym->st_value + rel->r_addend);
8604 if (sec != *psec)
8605 {
8606 /* If we have changed the section, and our original section is
8607 marked with SEC_EXCLUDE, it means that the original
8608 SEC_MERGE section has been completely subsumed in some
8609 other SEC_MERGE section. In this case, we need to leave
8610 some info around for --emit-relocs. */
8611 if ((sec->flags & SEC_EXCLUDE) != 0)
8612 sec->kept_section = *psec;
8613 sec = *psec;
8614 }
8517fae7
AM
8615 rel->r_addend -= relocation;
8616 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8617 }
8618 return relocation;
8619}
c629eae0
JJ
8620
8621bfd_vma
217aa764
AM
8622_bfd_elf_rel_local_sym (bfd *abfd,
8623 Elf_Internal_Sym *sym,
8624 asection **psec,
8625 bfd_vma addend)
47d9a591 8626{
c629eae0
JJ
8627 asection *sec = *psec;
8628
68bfbfcc 8629 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8630 return sym->st_value + addend;
8631
8632 return _bfd_merged_section_offset (abfd, psec,
65765700 8633 elf_section_data (sec)->sec_info,
753731ee 8634 sym->st_value + addend);
c629eae0
JJ
8635}
8636
8637bfd_vma
217aa764 8638_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8639 struct bfd_link_info *info,
217aa764
AM
8640 asection *sec,
8641 bfd_vma offset)
c629eae0 8642{
68bfbfcc 8643 switch (sec->sec_info_type)
65765700
JJ
8644 {
8645 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8646 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8647 offset);
65765700 8648 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8649 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8650 default:
8651 return offset;
8652 }
c629eae0 8653}
3333a7c3
RM
8654\f
8655/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8656 reconstruct an ELF file by reading the segments out of remote memory
8657 based on the ELF file header at EHDR_VMA and the ELF program headers it
8658 points to. If not null, *LOADBASEP is filled in with the difference
8659 between the VMAs from which the segments were read, and the VMAs the
8660 file headers (and hence BFD's idea of each section's VMA) put them at.
8661
8662 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8663 remote memory at target address VMA into the local buffer at MYADDR; it
8664 should return zero on success or an `errno' code on failure. TEMPL must
8665 be a BFD for an ELF target with the word size and byte order found in
8666 the remote memory. */
8667
8668bfd *
217aa764
AM
8669bfd_elf_bfd_from_remote_memory
8670 (bfd *templ,
8671 bfd_vma ehdr_vma,
8672 bfd_vma *loadbasep,
f075ee0c 8673 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8674{
8675 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8676 (templ, ehdr_vma, loadbasep, target_read_memory);
8677}
4c45e5c9
JJ
8678\f
8679long
c9727e01
AM
8680_bfd_elf_get_synthetic_symtab (bfd *abfd,
8681 long symcount ATTRIBUTE_UNUSED,
8682 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8683 long dynsymcount,
c9727e01
AM
8684 asymbol **dynsyms,
8685 asymbol **ret)
4c45e5c9
JJ
8686{
8687 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8688 asection *relplt;
8689 asymbol *s;
8690 const char *relplt_name;
8691 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8692 arelent *p;
8693 long count, i, n;
8694 size_t size;
8695 Elf_Internal_Shdr *hdr;
8696 char *names;
8697 asection *plt;
8698
8615f3f2
AM
8699 *ret = NULL;
8700
90e3cdf2
JJ
8701 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8702 return 0;
8703
8615f3f2
AM
8704 if (dynsymcount <= 0)
8705 return 0;
8706
4c45e5c9
JJ
8707 if (!bed->plt_sym_val)
8708 return 0;
8709
8710 relplt_name = bed->relplt_name;
8711 if (relplt_name == NULL)
8712 relplt_name = bed->default_use_rela_p ? ".rela.plt" : ".rel.plt";
8713 relplt = bfd_get_section_by_name (abfd, relplt_name);
8714 if (relplt == NULL)
8715 return 0;
8716
8717 hdr = &elf_section_data (relplt)->this_hdr;
8718 if (hdr->sh_link != elf_dynsymtab (abfd)
8719 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8720 return 0;
8721
8722 plt = bfd_get_section_by_name (abfd, ".plt");
8723 if (plt == NULL)
8724 return 0;
8725
8726 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8727 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8728 return -1;
8729
eea6121a 8730 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8731 size = count * sizeof (asymbol);
8732 p = relplt->relocation;
b7fd5ce1 8733 for (i = 0; i < count; i++, p++)
4c45e5c9
JJ
8734 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8735
8736 s = *ret = bfd_malloc (size);
8737 if (s == NULL)
8738 return -1;
8739
8740 names = (char *) (s + count);
8741 p = relplt->relocation;
8742 n = 0;
8f39ba8e 8743 for (i = 0; i < count; i++, p++)
4c45e5c9
JJ
8744 {
8745 size_t len;
8746 bfd_vma addr;
8747
8748 addr = bed->plt_sym_val (i, plt, p);
8749 if (addr == (bfd_vma) -1)
8750 continue;
8751
8752 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8753 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8754 we are defining a symbol, ensure one of them is set. */
8755 if ((s->flags & BSF_LOCAL) == 0)
8756 s->flags |= BSF_GLOBAL;
4c45e5c9
JJ
8757 s->section = plt;
8758 s->value = addr - plt->vma;
8759 s->name = names;
8f39ba8e 8760 s->udata.p = NULL;
4c45e5c9
JJ
8761 len = strlen ((*p->sym_ptr_ptr)->name);
8762 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8763 names += len;
8764 memcpy (names, "@plt", sizeof ("@plt"));
8765 names += sizeof ("@plt");
8f39ba8e 8766 ++s, ++n;
4c45e5c9
JJ
8767 }
8768
8769 return n;
8770}
3d7f7666 8771
3b22753a
L
8772/* It is only used by x86-64 so far. */
8773asection _bfd_elf_large_com_section
8774 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 8775 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 8776
d1036acb
L
8777void
8778_bfd_elf_set_osabi (bfd * abfd,
8779 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
8780{
8781 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
8782
8783 i_ehdrp = elf_elfheader (abfd);
8784
8785 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
8786}
fcb93ecf
PB
8787
8788
8789/* Return TRUE for ELF symbol types that represent functions.
8790 This is the default version of this function, which is sufficient for
8791 most targets. It returns true if TYPE is STT_FUNC. */
8792
8793bfd_boolean
8794_bfd_elf_is_function_type (unsigned int type)
8795{
8796 return (type == STT_FUNC);
8797}