]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
2009-06-18 Paul Pluzhnikov <ppluzhnikov@google.com>
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
72a80a16
AM
4 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009
5 Free Software Foundation, Inc.
252b5132 6
5e8d7549 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
5e8d7549
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
5e8d7549 12 (at your option) any later version.
252b5132 13
5e8d7549
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
5e8d7549 19 You should have received a copy of the GNU General Public License
b34976b6 20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
23
252b5132 24
1b74d094
BW
25/*
26SECTION
252b5132
RH
27 ELF backends
28
29 BFD support for ELF formats is being worked on.
30 Currently, the best supported back ends are for sparc and i386
31 (running svr4 or Solaris 2).
32
33 Documentation of the internals of the support code still needs
34 to be written. The code is changing quickly enough that we
661a3fd4 35 haven't bothered yet. */
252b5132 36
7ee38065
MS
37/* For sparc64-cross-sparc32. */
38#define _SYSCALL32
252b5132 39#include "sysdep.h"
3db64b00 40#include "bfd.h"
252b5132
RH
41#include "bfdlink.h"
42#include "libbfd.h"
43#define ARCH_SIZE 0
44#include "elf-bfd.h"
e0e8c97f 45#include "libiberty.h"
ff59fc36 46#include "safe-ctype.h"
252b5132 47
217aa764 48static int elf_sort_sections (const void *, const void *);
c84fca4d 49static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
50static bfd_boolean prep_headers (bfd *);
51static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
52static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
53static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
54 file_ptr offset);
50b2bdb7 55
252b5132
RH
56/* Swap version information in and out. The version information is
57 currently size independent. If that ever changes, this code will
58 need to move into elfcode.h. */
59
60/* Swap in a Verdef structure. */
61
62void
217aa764
AM
63_bfd_elf_swap_verdef_in (bfd *abfd,
64 const Elf_External_Verdef *src,
65 Elf_Internal_Verdef *dst)
252b5132 66{
dc810e39
AM
67 dst->vd_version = H_GET_16 (abfd, src->vd_version);
68 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
69 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
70 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
71 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
72 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
73 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
74}
75
76/* Swap out a Verdef structure. */
77
78void
217aa764
AM
79_bfd_elf_swap_verdef_out (bfd *abfd,
80 const Elf_Internal_Verdef *src,
81 Elf_External_Verdef *dst)
252b5132 82{
dc810e39
AM
83 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
84 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
85 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
86 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
87 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
88 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
89 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
90}
91
92/* Swap in a Verdaux structure. */
93
94void
217aa764
AM
95_bfd_elf_swap_verdaux_in (bfd *abfd,
96 const Elf_External_Verdaux *src,
97 Elf_Internal_Verdaux *dst)
252b5132 98{
dc810e39
AM
99 dst->vda_name = H_GET_32 (abfd, src->vda_name);
100 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
101}
102
103/* Swap out a Verdaux structure. */
104
105void
217aa764
AM
106_bfd_elf_swap_verdaux_out (bfd *abfd,
107 const Elf_Internal_Verdaux *src,
108 Elf_External_Verdaux *dst)
252b5132 109{
dc810e39
AM
110 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
111 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
112}
113
114/* Swap in a Verneed structure. */
115
116void
217aa764
AM
117_bfd_elf_swap_verneed_in (bfd *abfd,
118 const Elf_External_Verneed *src,
119 Elf_Internal_Verneed *dst)
252b5132 120{
dc810e39
AM
121 dst->vn_version = H_GET_16 (abfd, src->vn_version);
122 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
123 dst->vn_file = H_GET_32 (abfd, src->vn_file);
124 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
125 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
126}
127
128/* Swap out a Verneed structure. */
129
130void
217aa764
AM
131_bfd_elf_swap_verneed_out (bfd *abfd,
132 const Elf_Internal_Verneed *src,
133 Elf_External_Verneed *dst)
252b5132 134{
dc810e39
AM
135 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
136 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
137 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
138 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
139 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
140}
141
142/* Swap in a Vernaux structure. */
143
144void
217aa764
AM
145_bfd_elf_swap_vernaux_in (bfd *abfd,
146 const Elf_External_Vernaux *src,
147 Elf_Internal_Vernaux *dst)
252b5132 148{
dc810e39
AM
149 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
150 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
151 dst->vna_other = H_GET_16 (abfd, src->vna_other);
152 dst->vna_name = H_GET_32 (abfd, src->vna_name);
153 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
154}
155
156/* Swap out a Vernaux structure. */
157
158void
217aa764
AM
159_bfd_elf_swap_vernaux_out (bfd *abfd,
160 const Elf_Internal_Vernaux *src,
161 Elf_External_Vernaux *dst)
252b5132 162{
dc810e39
AM
163 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
164 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
165 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
166 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
167 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
168}
169
170/* Swap in a Versym structure. */
171
172void
217aa764
AM
173_bfd_elf_swap_versym_in (bfd *abfd,
174 const Elf_External_Versym *src,
175 Elf_Internal_Versym *dst)
252b5132 176{
dc810e39 177 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
178}
179
180/* Swap out a Versym structure. */
181
182void
217aa764
AM
183_bfd_elf_swap_versym_out (bfd *abfd,
184 const Elf_Internal_Versym *src,
185 Elf_External_Versym *dst)
252b5132 186{
dc810e39 187 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
188}
189
190/* Standard ELF hash function. Do not change this function; you will
191 cause invalid hash tables to be generated. */
3a99b017 192
252b5132 193unsigned long
217aa764 194bfd_elf_hash (const char *namearg)
252b5132 195{
3a99b017 196 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
197 unsigned long h = 0;
198 unsigned long g;
199 int ch;
200
201 while ((ch = *name++) != '\0')
202 {
203 h = (h << 4) + ch;
204 if ((g = (h & 0xf0000000)) != 0)
205 {
206 h ^= g >> 24;
207 /* The ELF ABI says `h &= ~g', but this is equivalent in
208 this case and on some machines one insn instead of two. */
209 h ^= g;
210 }
211 }
32dfa85d 212 return h & 0xffffffff;
252b5132
RH
213}
214
fdc90cb4
JJ
215/* DT_GNU_HASH hash function. Do not change this function; you will
216 cause invalid hash tables to be generated. */
217
218unsigned long
219bfd_elf_gnu_hash (const char *namearg)
220{
221 const unsigned char *name = (const unsigned char *) namearg;
222 unsigned long h = 5381;
223 unsigned char ch;
224
225 while ((ch = *name++) != '\0')
226 h = (h << 5) + h + ch;
227 return h & 0xffffffff;
228}
229
0c8d6e5c
AM
230/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
231 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 232bfd_boolean
0c8d6e5c 233bfd_elf_allocate_object (bfd *abfd,
0ffa91dd
NC
234 size_t object_size,
235 enum elf_object_id object_id)
252b5132 236{
0ffa91dd
NC
237 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
238 abfd->tdata.any = bfd_zalloc (abfd, object_size);
239 if (abfd->tdata.any == NULL)
240 return FALSE;
252b5132 241
0ffa91dd
NC
242 elf_object_id (abfd) = object_id;
243 elf_program_header_size (abfd) = (bfd_size_type) -1;
b34976b6 244 return TRUE;
252b5132
RH
245}
246
0ffa91dd
NC
247
248bfd_boolean
249bfd_elf_make_generic_object (bfd *abfd)
250{
251 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
252 GENERIC_ELF_TDATA);
253}
254
b34976b6 255bfd_boolean
217aa764 256bfd_elf_mkcorefile (bfd *abfd)
252b5132 257{
c044fabd 258 /* I think this can be done just like an object file. */
0ffa91dd 259 return bfd_elf_make_generic_object (abfd);
252b5132
RH
260}
261
72a80a16 262static char *
217aa764 263bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
264{
265 Elf_Internal_Shdr **i_shdrp;
f075ee0c 266 bfd_byte *shstrtab = NULL;
dc810e39
AM
267 file_ptr offset;
268 bfd_size_type shstrtabsize;
252b5132
RH
269
270 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
271 if (i_shdrp == 0
272 || shindex >= elf_numsections (abfd)
273 || i_shdrp[shindex] == 0)
f075ee0c 274 return NULL;
252b5132 275
f075ee0c 276 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
277 if (shstrtab == NULL)
278 {
c044fabd 279 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
280 offset = i_shdrp[shindex]->sh_offset;
281 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
282
283 /* Allocate and clear an extra byte at the end, to prevent crashes
284 in case the string table is not terminated. */
3471d59d 285 if (shstrtabsize + 1 <= 1
c6c60d09
JJ
286 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
287 || bfd_seek (abfd, offset, SEEK_SET) != 0)
288 shstrtab = NULL;
289 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
290 {
291 if (bfd_get_error () != bfd_error_system_call)
292 bfd_set_error (bfd_error_file_truncated);
293 shstrtab = NULL;
3471d59d
CC
294 /* Once we've failed to read it, make sure we don't keep
295 trying. Otherwise, we'll keep allocating space for
296 the string table over and over. */
297 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
298 }
299 else
300 shstrtab[shstrtabsize] = '\0';
217aa764 301 i_shdrp[shindex]->contents = shstrtab;
252b5132 302 }
f075ee0c 303 return (char *) shstrtab;
252b5132
RH
304}
305
306char *
217aa764
AM
307bfd_elf_string_from_elf_section (bfd *abfd,
308 unsigned int shindex,
309 unsigned int strindex)
252b5132
RH
310{
311 Elf_Internal_Shdr *hdr;
312
313 if (strindex == 0)
314 return "";
315
74f2e02b
AM
316 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
317 return NULL;
318
252b5132
RH
319 hdr = elf_elfsections (abfd)[shindex];
320
321 if (hdr->contents == NULL
322 && bfd_elf_get_str_section (abfd, shindex) == NULL)
323 return NULL;
324
325 if (strindex >= hdr->sh_size)
326 {
1b3a8575 327 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 328 (*_bfd_error_handler)
d003868e
AM
329 (_("%B: invalid string offset %u >= %lu for section `%s'"),
330 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 331 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 332 ? ".shstrtab"
1b3a8575 333 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
334 return "";
335 }
336
337 return ((char *) hdr->contents) + strindex;
338}
339
6cdc0ccc
AM
340/* Read and convert symbols to internal format.
341 SYMCOUNT specifies the number of symbols to read, starting from
342 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
343 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
344 symbols, and symbol section index extensions, respectively.
345 Returns a pointer to the internal symbol buffer (malloced if necessary)
346 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
347
348Elf_Internal_Sym *
217aa764
AM
349bfd_elf_get_elf_syms (bfd *ibfd,
350 Elf_Internal_Shdr *symtab_hdr,
351 size_t symcount,
352 size_t symoffset,
353 Elf_Internal_Sym *intsym_buf,
354 void *extsym_buf,
355 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
356{
357 Elf_Internal_Shdr *shndx_hdr;
217aa764 358 void *alloc_ext;
df622259 359 const bfd_byte *esym;
6cdc0ccc
AM
360 Elf_External_Sym_Shndx *alloc_extshndx;
361 Elf_External_Sym_Shndx *shndx;
4dd07732 362 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
363 Elf_Internal_Sym *isym;
364 Elf_Internal_Sym *isymend;
9c5bfbb7 365 const struct elf_backend_data *bed;
6cdc0ccc
AM
366 size_t extsym_size;
367 bfd_size_type amt;
368 file_ptr pos;
369
e44a2c9c
AM
370 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
371 abort ();
372
6cdc0ccc
AM
373 if (symcount == 0)
374 return intsym_buf;
375
376 /* Normal syms might have section extension entries. */
377 shndx_hdr = NULL;
378 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
379 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
380
381 /* Read the symbols. */
382 alloc_ext = NULL;
383 alloc_extshndx = NULL;
4dd07732 384 alloc_intsym = NULL;
6cdc0ccc
AM
385 bed = get_elf_backend_data (ibfd);
386 extsym_size = bed->s->sizeof_sym;
387 amt = symcount * extsym_size;
388 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
389 if (extsym_buf == NULL)
390 {
d0fb9a8d 391 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
392 extsym_buf = alloc_ext;
393 }
394 if (extsym_buf == NULL
395 || bfd_seek (ibfd, pos, SEEK_SET) != 0
396 || bfd_bread (extsym_buf, amt, ibfd) != amt)
397 {
398 intsym_buf = NULL;
399 goto out;
400 }
401
402 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
403 extshndx_buf = NULL;
404 else
405 {
406 amt = symcount * sizeof (Elf_External_Sym_Shndx);
407 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
408 if (extshndx_buf == NULL)
409 {
d0fb9a8d
JJ
410 alloc_extshndx = bfd_malloc2 (symcount,
411 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
412 extshndx_buf = alloc_extshndx;
413 }
414 if (extshndx_buf == NULL
415 || bfd_seek (ibfd, pos, SEEK_SET) != 0
416 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
417 {
418 intsym_buf = NULL;
419 goto out;
420 }
421 }
422
423 if (intsym_buf == NULL)
424 {
4dd07732
AM
425 alloc_intsym = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
426 intsym_buf = alloc_intsym;
6cdc0ccc
AM
427 if (intsym_buf == NULL)
428 goto out;
429 }
430
431 /* Convert the symbols to internal form. */
432 isymend = intsym_buf + symcount;
433 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
434 isym < isymend;
435 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
436 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
437 {
438 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
439 (*_bfd_error_handler) (_("%B symbol number %lu references "
440 "nonexistent SHT_SYMTAB_SHNDX section"),
441 ibfd, (unsigned long) symoffset);
4dd07732
AM
442 if (alloc_intsym != NULL)
443 free (alloc_intsym);
8384fb8f
AM
444 intsym_buf = NULL;
445 goto out;
446 }
6cdc0ccc
AM
447
448 out:
449 if (alloc_ext != NULL)
450 free (alloc_ext);
451 if (alloc_extshndx != NULL)
452 free (alloc_extshndx);
453
454 return intsym_buf;
455}
456
5cab59f6
AM
457/* Look up a symbol name. */
458const char *
be8dd2ca
AM
459bfd_elf_sym_name (bfd *abfd,
460 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
461 Elf_Internal_Sym *isym,
462 asection *sym_sec)
5cab59f6 463{
26c61ae5 464 const char *name;
5cab59f6 465 unsigned int iname = isym->st_name;
be8dd2ca 466 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 467
138f35cc
JJ
468 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
469 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 470 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
471 {
472 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
473 shindex = elf_elfheader (abfd)->e_shstrndx;
474 }
475
26c61ae5
L
476 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
477 if (name == NULL)
478 name = "(null)";
479 else if (sym_sec && *name == '\0')
480 name = bfd_section_name (abfd, sym_sec);
481
482 return name;
5cab59f6
AM
483}
484
dbb410c3
AM
485/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
486 sections. The first element is the flags, the rest are section
487 pointers. */
488
489typedef union elf_internal_group {
490 Elf_Internal_Shdr *shdr;
491 unsigned int flags;
492} Elf_Internal_Group;
493
b885599b
AM
494/* Return the name of the group signature symbol. Why isn't the
495 signature just a string? */
496
497static const char *
217aa764 498group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 499{
9dce4196 500 Elf_Internal_Shdr *hdr;
9dce4196
AM
501 unsigned char esym[sizeof (Elf64_External_Sym)];
502 Elf_External_Sym_Shndx eshndx;
503 Elf_Internal_Sym isym;
b885599b 504
13792e9d
L
505 /* First we need to ensure the symbol table is available. Make sure
506 that it is a symbol table section. */
4fbb74a6
AM
507 if (ghdr->sh_link >= elf_numsections (abfd))
508 return NULL;
13792e9d
L
509 hdr = elf_elfsections (abfd) [ghdr->sh_link];
510 if (hdr->sh_type != SHT_SYMTAB
511 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
512 return NULL;
513
9dce4196
AM
514 /* Go read the symbol. */
515 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
516 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
517 &isym, esym, &eshndx) == NULL)
b885599b 518 return NULL;
9dce4196 519
26c61ae5 520 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
521}
522
dbb410c3
AM
523/* Set next_in_group list pointer, and group name for NEWSECT. */
524
b34976b6 525static bfd_boolean
217aa764 526setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
527{
528 unsigned int num_group = elf_tdata (abfd)->num_group;
529
530 /* If num_group is zero, read in all SHT_GROUP sections. The count
531 is set to -1 if there are no SHT_GROUP sections. */
532 if (num_group == 0)
533 {
534 unsigned int i, shnum;
535
536 /* First count the number of groups. If we have a SHT_GROUP
537 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 538 shnum = elf_numsections (abfd);
dbb410c3 539 num_group = 0;
08a40648 540
1783205a
NC
541#define IS_VALID_GROUP_SECTION_HEADER(shdr) \
542 ( (shdr)->sh_type == SHT_GROUP \
543 && (shdr)->sh_size >= (2 * GRP_ENTRY_SIZE) \
544 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
545 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 546
dbb410c3
AM
547 for (i = 0; i < shnum; i++)
548 {
549 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
550
551 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3
AM
552 num_group += 1;
553 }
554
555 if (num_group == 0)
20dbb49d
L
556 {
557 num_group = (unsigned) -1;
558 elf_tdata (abfd)->num_group = num_group;
559 }
560 else
dbb410c3
AM
561 {
562 /* We keep a list of elf section headers for group sections,
563 so we can find them quickly. */
20dbb49d 564 bfd_size_type amt;
d0fb9a8d 565
20dbb49d 566 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
567 elf_tdata (abfd)->group_sect_ptr
568 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 569 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 570 return FALSE;
dbb410c3
AM
571
572 num_group = 0;
573 for (i = 0; i < shnum; i++)
574 {
575 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
576
577 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3 578 {
973ffd63 579 unsigned char *src;
dbb410c3
AM
580 Elf_Internal_Group *dest;
581
582 /* Add to list of sections. */
583 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
584 num_group += 1;
585
586 /* Read the raw contents. */
587 BFD_ASSERT (sizeof (*dest) >= 4);
588 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
589 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
590 sizeof (*dest) / 4);
1783205a
NC
591 /* PR binutils/4110: Handle corrupt group headers. */
592 if (shdr->contents == NULL)
593 {
594 _bfd_error_handler
595 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
596 bfd_set_error (bfd_error_bad_value);
597 return FALSE;
598 }
599
600 memset (shdr->contents, 0, amt);
601
602 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
603 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
604 != shdr->sh_size))
b34976b6 605 return FALSE;
dbb410c3
AM
606
607 /* Translate raw contents, a flag word followed by an
608 array of elf section indices all in target byte order,
609 to the flag word followed by an array of elf section
610 pointers. */
611 src = shdr->contents + shdr->sh_size;
612 dest = (Elf_Internal_Group *) (shdr->contents + amt);
613 while (1)
614 {
615 unsigned int idx;
616
617 src -= 4;
618 --dest;
619 idx = H_GET_32 (abfd, src);
620 if (src == shdr->contents)
621 {
622 dest->flags = idx;
b885599b
AM
623 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
624 shdr->bfd_section->flags
625 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
626 break;
627 }
628 if (idx >= shnum)
629 {
630 ((*_bfd_error_handler)
d003868e 631 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
632 idx = 0;
633 }
634 dest->shdr = elf_elfsections (abfd)[idx];
635 }
636 }
637 }
638 }
639 }
640
641 if (num_group != (unsigned) -1)
642 {
643 unsigned int i;
644
645 for (i = 0; i < num_group; i++)
646 {
647 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
648 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
649 unsigned int n_elt = shdr->sh_size / 4;
650
651 /* Look through this group's sections to see if current
652 section is a member. */
653 while (--n_elt != 0)
654 if ((++idx)->shdr == hdr)
655 {
e0e8c97f 656 asection *s = NULL;
dbb410c3
AM
657
658 /* We are a member of this group. Go looking through
659 other members to see if any others are linked via
660 next_in_group. */
661 idx = (Elf_Internal_Group *) shdr->contents;
662 n_elt = shdr->sh_size / 4;
663 while (--n_elt != 0)
664 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 665 && elf_next_in_group (s) != NULL)
dbb410c3
AM
666 break;
667 if (n_elt != 0)
668 {
dbb410c3
AM
669 /* Snarf the group name from other member, and
670 insert current section in circular list. */
945906ff
AM
671 elf_group_name (newsect) = elf_group_name (s);
672 elf_next_in_group (newsect) = elf_next_in_group (s);
673 elf_next_in_group (s) = newsect;
dbb410c3
AM
674 }
675 else
676 {
dbb410c3
AM
677 const char *gname;
678
b885599b
AM
679 gname = group_signature (abfd, shdr);
680 if (gname == NULL)
b34976b6 681 return FALSE;
945906ff 682 elf_group_name (newsect) = gname;
dbb410c3
AM
683
684 /* Start a circular list with one element. */
945906ff 685 elf_next_in_group (newsect) = newsect;
dbb410c3 686 }
b885599b 687
9dce4196
AM
688 /* If the group section has been created, point to the
689 new member. */
dbb410c3 690 if (shdr->bfd_section != NULL)
945906ff 691 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 692
dbb410c3
AM
693 i = num_group - 1;
694 break;
695 }
696 }
697 }
698
945906ff 699 if (elf_group_name (newsect) == NULL)
dbb410c3 700 {
d003868e
AM
701 (*_bfd_error_handler) (_("%B: no group info for section %A"),
702 abfd, newsect);
dbb410c3 703 }
b34976b6 704 return TRUE;
dbb410c3
AM
705}
706
3d7f7666 707bfd_boolean
dd863624 708_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
709{
710 unsigned int i;
711 unsigned int num_group = elf_tdata (abfd)->num_group;
712 bfd_boolean result = TRUE;
dd863624
L
713 asection *s;
714
715 /* Process SHF_LINK_ORDER. */
716 for (s = abfd->sections; s != NULL; s = s->next)
717 {
718 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
719 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
720 {
721 unsigned int elfsec = this_hdr->sh_link;
722 /* FIXME: The old Intel compiler and old strip/objcopy may
723 not set the sh_link or sh_info fields. Hence we could
724 get the situation where elfsec is 0. */
725 if (elfsec == 0)
726 {
4fbb74a6 727 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
728 if (bed->link_order_error_handler)
729 bed->link_order_error_handler
730 (_("%B: warning: sh_link not set for section `%A'"),
731 abfd, s);
732 }
733 else
734 {
4fbb74a6 735 asection *link = NULL;
25bbc984 736
4fbb74a6
AM
737 if (elfsec < elf_numsections (abfd))
738 {
739 this_hdr = elf_elfsections (abfd)[elfsec];
740 link = this_hdr->bfd_section;
741 }
25bbc984
L
742
743 /* PR 1991, 2008:
744 Some strip/objcopy may leave an incorrect value in
745 sh_link. We don't want to proceed. */
25bbc984
L
746 if (link == NULL)
747 {
748 (*_bfd_error_handler)
749 (_("%B: sh_link [%d] in section `%A' is incorrect"),
750 s->owner, s, elfsec);
751 result = FALSE;
752 }
753
754 elf_linked_to_section (s) = link;
dd863624
L
755 }
756 }
757 }
3d7f7666 758
dd863624 759 /* Process section groups. */
3d7f7666
L
760 if (num_group == (unsigned) -1)
761 return result;
762
763 for (i = 0; i < num_group; i++)
764 {
765 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
766 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
767 unsigned int n_elt = shdr->sh_size / 4;
768
769 while (--n_elt != 0)
770 if ((++idx)->shdr->bfd_section)
771 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
772 else if (idx->shdr->sh_type == SHT_RELA
773 || idx->shdr->sh_type == SHT_REL)
774 /* We won't include relocation sections in section groups in
775 output object files. We adjust the group section size here
776 so that relocatable link will work correctly when
777 relocation sections are in section group in input object
778 files. */
779 shdr->bfd_section->size -= 4;
780 else
781 {
782 /* There are some unknown sections in the group. */
783 (*_bfd_error_handler)
d003868e
AM
784 (_("%B: unknown [%d] section `%s' in group [%s]"),
785 abfd,
3d7f7666 786 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
787 bfd_elf_string_from_elf_section (abfd,
788 (elf_elfheader (abfd)
789 ->e_shstrndx),
790 idx->shdr->sh_name),
3d7f7666
L
791 shdr->bfd_section->name);
792 result = FALSE;
793 }
794 }
795 return result;
796}
797
72adc230
AM
798bfd_boolean
799bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
800{
801 return elf_next_in_group (sec) != NULL;
802}
803
252b5132
RH
804/* Make a BFD section from an ELF section. We store a pointer to the
805 BFD section in the bfd_section field of the header. */
806
b34976b6 807bfd_boolean
217aa764
AM
808_bfd_elf_make_section_from_shdr (bfd *abfd,
809 Elf_Internal_Shdr *hdr,
6dc132d9
L
810 const char *name,
811 int shindex)
252b5132
RH
812{
813 asection *newsect;
814 flagword flags;
9c5bfbb7 815 const struct elf_backend_data *bed;
252b5132
RH
816
817 if (hdr->bfd_section != NULL)
818 {
819 BFD_ASSERT (strcmp (name,
820 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 821 return TRUE;
252b5132
RH
822 }
823
824 newsect = bfd_make_section_anyway (abfd, name);
825 if (newsect == NULL)
b34976b6 826 return FALSE;
252b5132 827
1829f4b2
AM
828 hdr->bfd_section = newsect;
829 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 830 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 831
2f89ff8d
L
832 /* Always use the real type/flags. */
833 elf_section_type (newsect) = hdr->sh_type;
834 elf_section_flags (newsect) = hdr->sh_flags;
835
252b5132
RH
836 newsect->filepos = hdr->sh_offset;
837
838 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
839 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
840 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 841 bfd_log2 (hdr->sh_addralign)))
b34976b6 842 return FALSE;
252b5132
RH
843
844 flags = SEC_NO_FLAGS;
845 if (hdr->sh_type != SHT_NOBITS)
846 flags |= SEC_HAS_CONTENTS;
dbb410c3 847 if (hdr->sh_type == SHT_GROUP)
b3096250 848 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
849 if ((hdr->sh_flags & SHF_ALLOC) != 0)
850 {
851 flags |= SEC_ALLOC;
852 if (hdr->sh_type != SHT_NOBITS)
853 flags |= SEC_LOAD;
854 }
855 if ((hdr->sh_flags & SHF_WRITE) == 0)
856 flags |= SEC_READONLY;
857 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
858 flags |= SEC_CODE;
859 else if ((flags & SEC_LOAD) != 0)
860 flags |= SEC_DATA;
f5fa8ca2
JJ
861 if ((hdr->sh_flags & SHF_MERGE) != 0)
862 {
863 flags |= SEC_MERGE;
864 newsect->entsize = hdr->sh_entsize;
865 if ((hdr->sh_flags & SHF_STRINGS) != 0)
866 flags |= SEC_STRINGS;
867 }
dbb410c3
AM
868 if (hdr->sh_flags & SHF_GROUP)
869 if (!setup_group (abfd, hdr, newsect))
b34976b6 870 return FALSE;
13ae64f3
JJ
871 if ((hdr->sh_flags & SHF_TLS) != 0)
872 flags |= SEC_THREAD_LOCAL;
252b5132 873
3d2b39cf 874 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 875 {
3d2b39cf
L
876 /* The debugging sections appear to be recognized only by name,
877 not any sort of flag. Their SEC_ALLOC bits are cleared. */
878 static const struct
879 {
880 const char *name;
881 int len;
882 } debug_sections [] =
883 {
0112cd26 884 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
885 { NULL, 0 }, /* 'e' */
886 { NULL, 0 }, /* 'f' */
0112cd26 887 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
888 { NULL, 0 }, /* 'h' */
889 { NULL, 0 }, /* 'i' */
890 { NULL, 0 }, /* 'j' */
891 { NULL, 0 }, /* 'k' */
0112cd26 892 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
893 { NULL, 0 }, /* 'm' */
894 { NULL, 0 }, /* 'n' */
895 { NULL, 0 }, /* 'o' */
896 { NULL, 0 }, /* 'p' */
897 { NULL, 0 }, /* 'q' */
898 { NULL, 0 }, /* 'r' */
1b315056
CS
899 { STRING_COMMA_LEN ("stab") }, /* 's' */
900 { NULL, 0 }, /* 't' */
901 { NULL, 0 }, /* 'u' */
902 { NULL, 0 }, /* 'v' */
903 { NULL, 0 }, /* 'w' */
904 { NULL, 0 }, /* 'x' */
905 { NULL, 0 }, /* 'y' */
906 { STRING_COMMA_LEN ("zdebug") } /* 'z' */
3d2b39cf 907 };
08a40648 908
3d2b39cf
L
909 if (name [0] == '.')
910 {
911 int i = name [1] - 'd';
912 if (i >= 0
913 && i < (int) ARRAY_SIZE (debug_sections)
914 && debug_sections [i].name != NULL
915 && strncmp (&name [1], debug_sections [i].name,
916 debug_sections [i].len) == 0)
917 flags |= SEC_DEBUGGING;
918 }
919 }
252b5132
RH
920
921 /* As a GNU extension, if the name begins with .gnu.linkonce, we
922 only link a single copy of the section. This is used to support
923 g++. g++ will emit each template expansion in its own section.
924 The symbols will be defined as weak, so that multiple definitions
925 are permitted. The GNU linker extension is to actually discard
926 all but one of the sections. */
0112cd26 927 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 928 && elf_next_in_group (newsect) == NULL)
252b5132
RH
929 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
930
fa152c49
JW
931 bed = get_elf_backend_data (abfd);
932 if (bed->elf_backend_section_flags)
933 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 934 return FALSE;
fa152c49 935
252b5132 936 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 937 return FALSE;
252b5132 938
718175fa
JK
939 /* We do not parse the PT_NOTE segments as we are interested even in the
940 separate debug info files which may have the segments offsets corrupted.
941 PT_NOTEs from the core files are currently not parsed using BFD. */
942 if (hdr->sh_type == SHT_NOTE)
943 {
baea7ef1 944 bfd_byte *contents;
718175fa 945
baea7ef1 946 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
947 return FALSE;
948
baea7ef1 949 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
950 free (contents);
951 }
952
252b5132
RH
953 if ((flags & SEC_ALLOC) != 0)
954 {
955 Elf_Internal_Phdr *phdr;
6ffd7900
AM
956 unsigned int i, nload;
957
958 /* Some ELF linkers produce binaries with all the program header
959 p_paddr fields zero. If we have such a binary with more than
960 one PT_LOAD header, then leave the section lma equal to vma
961 so that we don't create sections with overlapping lma. */
962 phdr = elf_tdata (abfd)->phdr;
963 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
964 if (phdr->p_paddr != 0)
965 break;
966 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
967 ++nload;
968 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
969 return TRUE;
252b5132 970
252b5132
RH
971 phdr = elf_tdata (abfd)->phdr;
972 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
973 {
88967714
AM
974 /* This section is part of this segment if its file
975 offset plus size lies within the segment's memory
976 span and, if the section is loaded, the extent of the
977 loaded data lies within the extent of the segment.
978
979 Note - we used to check the p_paddr field as well, and
980 refuse to set the LMA if it was 0. This is wrong
981 though, as a perfectly valid initialised segment can
982 have a p_paddr of zero. Some architectures, eg ARM,
983 place special significance on the address 0 and
984 executables need to be able to have a segment which
985 covers this address. */
986 if (phdr->p_type == PT_LOAD
987 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
988 && (hdr->sh_offset + hdr->sh_size
989 <= phdr->p_offset + phdr->p_memsz)
990 && ((flags & SEC_LOAD) == 0
991 || (hdr->sh_offset + hdr->sh_size
992 <= phdr->p_offset + phdr->p_filesz)))
252b5132 993 {
88967714
AM
994 if ((flags & SEC_LOAD) == 0)
995 newsect->lma = (phdr->p_paddr
996 + hdr->sh_addr - phdr->p_vaddr);
997 else
998 /* We used to use the same adjustment for SEC_LOAD
999 sections, but that doesn't work if the segment
1000 is packed with code from multiple VMAs.
1001 Instead we calculate the section LMA based on
1002 the segment LMA. It is assumed that the
1003 segment will contain sections with contiguous
1004 LMAs, even if the VMAs are not. */
1005 newsect->lma = (phdr->p_paddr
1006 + hdr->sh_offset - phdr->p_offset);
1007
1008 /* With contiguous segments, we can't tell from file
1009 offsets whether a section with zero size should
1010 be placed at the end of one segment or the
1011 beginning of the next. Decide based on vaddr. */
1012 if (hdr->sh_addr >= phdr->p_vaddr
1013 && (hdr->sh_addr + hdr->sh_size
1014 <= phdr->p_vaddr + phdr->p_memsz))
1015 break;
252b5132
RH
1016 }
1017 }
1018 }
1019
b34976b6 1020 return TRUE;
252b5132
RH
1021}
1022
252b5132
RH
1023const char *const bfd_elf_section_type_names[] = {
1024 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1025 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1026 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1027};
1028
1049f94e 1029/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1030 output, and the reloc is against an external symbol, and nothing
1031 has given us any additional addend, the resulting reloc will also
1032 be against the same symbol. In such a case, we don't want to
1033 change anything about the way the reloc is handled, since it will
1034 all be done at final link time. Rather than put special case code
1035 into bfd_perform_relocation, all the reloc types use this howto
1036 function. It just short circuits the reloc if producing
1049f94e 1037 relocatable output against an external symbol. */
252b5132 1038
252b5132 1039bfd_reloc_status_type
217aa764
AM
1040bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1041 arelent *reloc_entry,
1042 asymbol *symbol,
1043 void *data ATTRIBUTE_UNUSED,
1044 asection *input_section,
1045 bfd *output_bfd,
1046 char **error_message ATTRIBUTE_UNUSED)
1047{
1048 if (output_bfd != NULL
252b5132
RH
1049 && (symbol->flags & BSF_SECTION_SYM) == 0
1050 && (! reloc_entry->howto->partial_inplace
1051 || reloc_entry->addend == 0))
1052 {
1053 reloc_entry->address += input_section->output_offset;
1054 return bfd_reloc_ok;
1055 }
1056
1057 return bfd_reloc_continue;
1058}
1059\f
0ac4564e
L
1060/* Copy the program header and other data from one object module to
1061 another. */
252b5132 1062
b34976b6 1063bfd_boolean
217aa764 1064_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1065{
1066 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1067 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1068 return TRUE;
2d502050
L
1069
1070 BFD_ASSERT (!elf_flags_init (obfd)
1071 || (elf_elfheader (obfd)->e_flags
1072 == elf_elfheader (ibfd)->e_flags));
1073
0ac4564e 1074 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1075 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1076 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1077
1078 /* Copy object attributes. */
1079 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1080
b34976b6 1081 return TRUE;
2d502050
L
1082}
1083
cedc298e
L
1084static const char *
1085get_segment_type (unsigned int p_type)
1086{
1087 const char *pt;
1088 switch (p_type)
1089 {
1090 case PT_NULL: pt = "NULL"; break;
1091 case PT_LOAD: pt = "LOAD"; break;
1092 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1093 case PT_INTERP: pt = "INTERP"; break;
1094 case PT_NOTE: pt = "NOTE"; break;
1095 case PT_SHLIB: pt = "SHLIB"; break;
1096 case PT_PHDR: pt = "PHDR"; break;
1097 case PT_TLS: pt = "TLS"; break;
1098 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1099 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1100 case PT_GNU_RELRO: pt = "RELRO"; break;
1101 default: pt = NULL; break;
1102 }
1103 return pt;
1104}
1105
f0b79d91
L
1106/* Print out the program headers. */
1107
b34976b6 1108bfd_boolean
217aa764 1109_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1110{
217aa764 1111 FILE *f = farg;
252b5132
RH
1112 Elf_Internal_Phdr *p;
1113 asection *s;
1114 bfd_byte *dynbuf = NULL;
1115
1116 p = elf_tdata (abfd)->phdr;
1117 if (p != NULL)
1118 {
1119 unsigned int i, c;
1120
1121 fprintf (f, _("\nProgram Header:\n"));
1122 c = elf_elfheader (abfd)->e_phnum;
1123 for (i = 0; i < c; i++, p++)
1124 {
cedc298e 1125 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1126 char buf[20];
1127
cedc298e 1128 if (pt == NULL)
252b5132 1129 {
cedc298e
L
1130 sprintf (buf, "0x%lx", p->p_type);
1131 pt = buf;
252b5132 1132 }
dc810e39 1133 fprintf (f, "%8s off 0x", pt);
60b89a18 1134 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1135 fprintf (f, " vaddr 0x");
60b89a18 1136 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1137 fprintf (f, " paddr 0x");
60b89a18 1138 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1139 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1140 fprintf (f, " filesz 0x");
60b89a18 1141 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1142 fprintf (f, " memsz 0x");
60b89a18 1143 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1144 fprintf (f, " flags %c%c%c",
1145 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1146 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1147 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1148 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1149 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1150 fprintf (f, "\n");
1151 }
1152 }
1153
1154 s = bfd_get_section_by_name (abfd, ".dynamic");
1155 if (s != NULL)
1156 {
cb33740c 1157 unsigned int elfsec;
dc810e39 1158 unsigned long shlink;
252b5132
RH
1159 bfd_byte *extdyn, *extdynend;
1160 size_t extdynsize;
217aa764 1161 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1162
1163 fprintf (f, _("\nDynamic Section:\n"));
1164
eea6121a 1165 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1166 goto error_return;
1167
1168 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1169 if (elfsec == SHN_BAD)
252b5132 1170 goto error_return;
dc810e39 1171 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1172
1173 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1174 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1175
1176 extdyn = dynbuf;
eea6121a 1177 extdynend = extdyn + s->size;
252b5132
RH
1178 for (; extdyn < extdynend; extdyn += extdynsize)
1179 {
1180 Elf_Internal_Dyn dyn;
ad9563d6 1181 const char *name = "";
252b5132 1182 char ab[20];
b34976b6 1183 bfd_boolean stringp;
ad9563d6 1184 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1185
217aa764 1186 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1187
1188 if (dyn.d_tag == DT_NULL)
1189 break;
1190
b34976b6 1191 stringp = FALSE;
252b5132
RH
1192 switch (dyn.d_tag)
1193 {
1194 default:
ad9563d6
CM
1195 if (bed->elf_backend_get_target_dtag)
1196 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1197
1198 if (!strcmp (name, ""))
1199 {
1200 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1201 name = ab;
1202 }
252b5132
RH
1203 break;
1204
b34976b6 1205 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1206 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1207 case DT_PLTGOT: name = "PLTGOT"; break;
1208 case DT_HASH: name = "HASH"; break;
1209 case DT_STRTAB: name = "STRTAB"; break;
1210 case DT_SYMTAB: name = "SYMTAB"; break;
1211 case DT_RELA: name = "RELA"; break;
1212 case DT_RELASZ: name = "RELASZ"; break;
1213 case DT_RELAENT: name = "RELAENT"; break;
1214 case DT_STRSZ: name = "STRSZ"; break;
1215 case DT_SYMENT: name = "SYMENT"; break;
1216 case DT_INIT: name = "INIT"; break;
1217 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1218 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1219 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1220 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1221 case DT_REL: name = "REL"; break;
1222 case DT_RELSZ: name = "RELSZ"; break;
1223 case DT_RELENT: name = "RELENT"; break;
1224 case DT_PLTREL: name = "PLTREL"; break;
1225 case DT_DEBUG: name = "DEBUG"; break;
1226 case DT_TEXTREL: name = "TEXTREL"; break;
1227 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1228 case DT_BIND_NOW: name = "BIND_NOW"; break;
1229 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1230 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1231 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1232 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1233 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1234 case DT_FLAGS: name = "FLAGS"; break;
1235 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1236 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1237 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1238 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1239 case DT_MOVEENT: name = "MOVEENT"; break;
1240 case DT_MOVESZ: name = "MOVESZ"; break;
1241 case DT_FEATURE: name = "FEATURE"; break;
1242 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1243 case DT_SYMINSZ: name = "SYMINSZ"; break;
1244 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1245 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1246 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1247 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1248 case DT_PLTPAD: name = "PLTPAD"; break;
1249 case DT_MOVETAB: name = "MOVETAB"; break;
1250 case DT_SYMINFO: name = "SYMINFO"; break;
1251 case DT_RELACOUNT: name = "RELACOUNT"; break;
1252 case DT_RELCOUNT: name = "RELCOUNT"; break;
1253 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1254 case DT_VERSYM: name = "VERSYM"; break;
1255 case DT_VERDEF: name = "VERDEF"; break;
1256 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1257 case DT_VERNEED: name = "VERNEED"; break;
1258 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1259 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1260 case DT_USED: name = "USED"; break;
b34976b6 1261 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1262 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1263 }
1264
ad9563d6 1265 fprintf (f, " %-20s ", name);
252b5132 1266 if (! stringp)
a1f3c56e
AN
1267 {
1268 fprintf (f, "0x");
1269 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1270 }
252b5132
RH
1271 else
1272 {
1273 const char *string;
dc810e39 1274 unsigned int tagv = dyn.d_un.d_val;
252b5132 1275
dc810e39 1276 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1277 if (string == NULL)
1278 goto error_return;
1279 fprintf (f, "%s", string);
1280 }
1281 fprintf (f, "\n");
1282 }
1283
1284 free (dynbuf);
1285 dynbuf = NULL;
1286 }
1287
1288 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1289 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1290 {
fc0e6df6 1291 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1292 return FALSE;
252b5132
RH
1293 }
1294
1295 if (elf_dynverdef (abfd) != 0)
1296 {
1297 Elf_Internal_Verdef *t;
1298
1299 fprintf (f, _("\nVersion definitions:\n"));
1300 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1301 {
1302 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1303 t->vd_flags, t->vd_hash,
1304 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1305 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1306 {
1307 Elf_Internal_Verdaux *a;
1308
1309 fprintf (f, "\t");
1310 for (a = t->vd_auxptr->vda_nextptr;
1311 a != NULL;
1312 a = a->vda_nextptr)
d0fb9a8d
JJ
1313 fprintf (f, "%s ",
1314 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1315 fprintf (f, "\n");
1316 }
1317 }
1318 }
1319
1320 if (elf_dynverref (abfd) != 0)
1321 {
1322 Elf_Internal_Verneed *t;
1323
1324 fprintf (f, _("\nVersion References:\n"));
1325 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1326 {
1327 Elf_Internal_Vernaux *a;
1328
d0fb9a8d
JJ
1329 fprintf (f, _(" required from %s:\n"),
1330 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1331 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1332 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1333 a->vna_flags, a->vna_other,
1334 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1335 }
1336 }
1337
b34976b6 1338 return TRUE;
252b5132
RH
1339
1340 error_return:
1341 if (dynbuf != NULL)
1342 free (dynbuf);
b34976b6 1343 return FALSE;
252b5132
RH
1344}
1345
1346/* Display ELF-specific fields of a symbol. */
1347
1348void
217aa764
AM
1349bfd_elf_print_symbol (bfd *abfd,
1350 void *filep,
1351 asymbol *symbol,
1352 bfd_print_symbol_type how)
252b5132 1353{
217aa764 1354 FILE *file = filep;
252b5132
RH
1355 switch (how)
1356 {
1357 case bfd_print_symbol_name:
1358 fprintf (file, "%s", symbol->name);
1359 break;
1360 case bfd_print_symbol_more:
1361 fprintf (file, "elf ");
60b89a18 1362 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1363 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1364 break;
1365 case bfd_print_symbol_all:
1366 {
4e8a9624
AM
1367 const char *section_name;
1368 const char *name = NULL;
9c5bfbb7 1369 const struct elf_backend_data *bed;
7a13edea 1370 unsigned char st_other;
dbb410c3 1371 bfd_vma val;
c044fabd 1372
252b5132 1373 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1374
1375 bed = get_elf_backend_data (abfd);
1376 if (bed->elf_backend_print_symbol_all)
c044fabd 1377 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1378
1379 if (name == NULL)
1380 {
7ee38065 1381 name = symbol->name;
217aa764 1382 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1383 }
1384
252b5132
RH
1385 fprintf (file, " %s\t", section_name);
1386 /* Print the "other" value for a symbol. For common symbols,
1387 we've already printed the size; now print the alignment.
1388 For other symbols, we have no specified alignment, and
1389 we've printed the address; now print the size. */
dcf6c779 1390 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1391 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1392 else
1393 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1394 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1395
1396 /* If we have version information, print it. */
1397 if (elf_tdata (abfd)->dynversym_section != 0
1398 && (elf_tdata (abfd)->dynverdef_section != 0
1399 || elf_tdata (abfd)->dynverref_section != 0))
1400 {
1401 unsigned int vernum;
1402 const char *version_string;
1403
1404 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1405
1406 if (vernum == 0)
1407 version_string = "";
1408 else if (vernum == 1)
1409 version_string = "Base";
1410 else if (vernum <= elf_tdata (abfd)->cverdefs)
1411 version_string =
1412 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1413 else
1414 {
1415 Elf_Internal_Verneed *t;
1416
1417 version_string = "";
1418 for (t = elf_tdata (abfd)->verref;
1419 t != NULL;
1420 t = t->vn_nextref)
1421 {
1422 Elf_Internal_Vernaux *a;
1423
1424 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1425 {
1426 if (a->vna_other == vernum)
1427 {
1428 version_string = a->vna_nodename;
1429 break;
1430 }
1431 }
1432 }
1433 }
1434
1435 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1436 fprintf (file, " %-11s", version_string);
1437 else
1438 {
1439 int i;
1440
1441 fprintf (file, " (%s)", version_string);
1442 for (i = 10 - strlen (version_string); i > 0; --i)
1443 putc (' ', file);
1444 }
1445 }
1446
1447 /* If the st_other field is not zero, print it. */
7a13edea 1448 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1449
7a13edea
NC
1450 switch (st_other)
1451 {
1452 case 0: break;
1453 case STV_INTERNAL: fprintf (file, " .internal"); break;
1454 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1455 case STV_PROTECTED: fprintf (file, " .protected"); break;
1456 default:
1457 /* Some other non-defined flags are also present, so print
1458 everything hex. */
1459 fprintf (file, " 0x%02x", (unsigned int) st_other);
1460 }
252b5132 1461
587ff49e 1462 fprintf (file, " %s", name);
252b5132
RH
1463 }
1464 break;
1465 }
1466}
252b5132 1467
252b5132
RH
1468/* Allocate an ELF string table--force the first byte to be zero. */
1469
1470struct bfd_strtab_hash *
217aa764 1471_bfd_elf_stringtab_init (void)
252b5132
RH
1472{
1473 struct bfd_strtab_hash *ret;
1474
1475 ret = _bfd_stringtab_init ();
1476 if (ret != NULL)
1477 {
1478 bfd_size_type loc;
1479
b34976b6 1480 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1481 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1482 if (loc == (bfd_size_type) -1)
1483 {
1484 _bfd_stringtab_free (ret);
1485 ret = NULL;
1486 }
1487 }
1488 return ret;
1489}
1490\f
1491/* ELF .o/exec file reading */
1492
c044fabd 1493/* Create a new bfd section from an ELF section header. */
252b5132 1494
b34976b6 1495bfd_boolean
217aa764 1496bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1497{
4fbb74a6
AM
1498 Elf_Internal_Shdr *hdr;
1499 Elf_Internal_Ehdr *ehdr;
1500 const struct elf_backend_data *bed;
90937f86 1501 const char *name;
252b5132 1502
4fbb74a6
AM
1503 if (shindex >= elf_numsections (abfd))
1504 return FALSE;
1505
1506 hdr = elf_elfsections (abfd)[shindex];
1507 ehdr = elf_elfheader (abfd);
1508 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1509 hdr->sh_name);
933d961a
JJ
1510 if (name == NULL)
1511 return FALSE;
252b5132 1512
4fbb74a6 1513 bed = get_elf_backend_data (abfd);
252b5132
RH
1514 switch (hdr->sh_type)
1515 {
1516 case SHT_NULL:
1517 /* Inactive section. Throw it away. */
b34976b6 1518 return TRUE;
252b5132
RH
1519
1520 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1521 case SHT_NOBITS: /* .bss section. */
1522 case SHT_HASH: /* .hash section. */
1523 case SHT_NOTE: /* .note section. */
25e27870
L
1524 case SHT_INIT_ARRAY: /* .init_array section. */
1525 case SHT_FINI_ARRAY: /* .fini_array section. */
1526 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1527 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1528 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1529 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1530
797fc050 1531 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1532 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1533 return FALSE;
8e0ed13f
NC
1534 if (hdr->sh_link > elf_numsections (abfd)
1535 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1536 return FALSE;
797fc050
AM
1537 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1538 {
1539 Elf_Internal_Shdr *dynsymhdr;
1540
1541 /* The shared libraries distributed with hpux11 have a bogus
1542 sh_link field for the ".dynamic" section. Find the
1543 string table for the ".dynsym" section instead. */
1544 if (elf_dynsymtab (abfd) != 0)
1545 {
1546 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1547 hdr->sh_link = dynsymhdr->sh_link;
1548 }
1549 else
1550 {
1551 unsigned int i, num_sec;
1552
1553 num_sec = elf_numsections (abfd);
1554 for (i = 1; i < num_sec; i++)
1555 {
1556 dynsymhdr = elf_elfsections (abfd)[i];
1557 if (dynsymhdr->sh_type == SHT_DYNSYM)
1558 {
1559 hdr->sh_link = dynsymhdr->sh_link;
1560 break;
1561 }
1562 }
1563 }
1564 }
1565 break;
1566
252b5132
RH
1567 case SHT_SYMTAB: /* A symbol table */
1568 if (elf_onesymtab (abfd) == shindex)
b34976b6 1569 return TRUE;
252b5132 1570
a50b2160
JJ
1571 if (hdr->sh_entsize != bed->s->sizeof_sym)
1572 return FALSE;
3337c1e5
AM
1573 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1574 return FALSE;
252b5132
RH
1575 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1576 elf_onesymtab (abfd) = shindex;
1577 elf_tdata (abfd)->symtab_hdr = *hdr;
1578 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1579 abfd->flags |= HAS_SYMS;
1580
1581 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1582 SHF_ALLOC is set, and this is a shared object, then we also
1583 treat this section as a BFD section. We can not base the
1584 decision purely on SHF_ALLOC, because that flag is sometimes
1585 set in a relocatable object file, which would confuse the
1586 linker. */
252b5132
RH
1587 if ((hdr->sh_flags & SHF_ALLOC) != 0
1588 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1589 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1590 shindex))
b34976b6 1591 return FALSE;
252b5132 1592
1b3a8575
AM
1593 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1594 can't read symbols without that section loaded as well. It
1595 is most likely specified by the next section header. */
1596 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1597 {
1598 unsigned int i, num_sec;
1599
1600 num_sec = elf_numsections (abfd);
1601 for (i = shindex + 1; i < num_sec; i++)
1602 {
1603 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1604 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1605 && hdr2->sh_link == shindex)
1606 break;
1607 }
1608 if (i == num_sec)
1609 for (i = 1; i < shindex; i++)
1610 {
1611 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1612 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1613 && hdr2->sh_link == shindex)
1614 break;
1615 }
1616 if (i != shindex)
1617 return bfd_section_from_shdr (abfd, i);
1618 }
b34976b6 1619 return TRUE;
252b5132
RH
1620
1621 case SHT_DYNSYM: /* A dynamic symbol table */
1622 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1623 return TRUE;
252b5132 1624
a50b2160
JJ
1625 if (hdr->sh_entsize != bed->s->sizeof_sym)
1626 return FALSE;
252b5132
RH
1627 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1628 elf_dynsymtab (abfd) = shindex;
1629 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1630 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1631 abfd->flags |= HAS_SYMS;
1632
1633 /* Besides being a symbol table, we also treat this as a regular
1634 section, so that objcopy can handle it. */
6dc132d9 1635 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1636
9ad5cbcf
AM
1637 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1638 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1639 return TRUE;
9ad5cbcf 1640
1b3a8575 1641 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1642 elf_symtab_shndx (abfd) = shindex;
1643 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1644 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1645 return TRUE;
9ad5cbcf 1646
252b5132
RH
1647 case SHT_STRTAB: /* A string table */
1648 if (hdr->bfd_section != NULL)
b34976b6 1649 return TRUE;
252b5132
RH
1650 if (ehdr->e_shstrndx == shindex)
1651 {
1652 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1653 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1654 return TRUE;
252b5132 1655 }
1b3a8575
AM
1656 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1657 {
1658 symtab_strtab:
1659 elf_tdata (abfd)->strtab_hdr = *hdr;
1660 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1661 return TRUE;
1662 }
1663 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1664 {
1665 dynsymtab_strtab:
1666 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1667 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1668 elf_elfsections (abfd)[shindex] = hdr;
1669 /* We also treat this as a regular section, so that objcopy
1670 can handle it. */
6dc132d9
L
1671 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1672 shindex);
1b3a8575 1673 }
252b5132 1674
1b3a8575
AM
1675 /* If the string table isn't one of the above, then treat it as a
1676 regular section. We need to scan all the headers to be sure,
1677 just in case this strtab section appeared before the above. */
1678 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1679 {
1680 unsigned int i, num_sec;
252b5132 1681
1b3a8575
AM
1682 num_sec = elf_numsections (abfd);
1683 for (i = 1; i < num_sec; i++)
1684 {
1685 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1686 if (hdr2->sh_link == shindex)
1687 {
933d961a
JJ
1688 /* Prevent endless recursion on broken objects. */
1689 if (i == shindex)
1690 return FALSE;
1b3a8575
AM
1691 if (! bfd_section_from_shdr (abfd, i))
1692 return FALSE;
1693 if (elf_onesymtab (abfd) == i)
1694 goto symtab_strtab;
1695 if (elf_dynsymtab (abfd) == i)
1696 goto dynsymtab_strtab;
1697 }
1698 }
1699 }
6dc132d9 1700 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1701
1702 case SHT_REL:
1703 case SHT_RELA:
1704 /* *These* do a lot of work -- but build no sections! */
1705 {
1706 asection *target_sect;
1707 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1708 unsigned int num_sec = elf_numsections (abfd);
252b5132 1709
aa2ca951
JJ
1710 if (hdr->sh_entsize
1711 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1712 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1713 return FALSE;
1714
03ae5f59 1715 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1716 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1717 {
1718 ((*_bfd_error_handler)
d003868e
AM
1719 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1720 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1721 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1722 shindex);
03ae5f59
ILT
1723 }
1724
252b5132
RH
1725 /* For some incomprehensible reason Oracle distributes
1726 libraries for Solaris in which some of the objects have
1727 bogus sh_link fields. It would be nice if we could just
1728 reject them, but, unfortunately, some people need to use
1729 them. We scan through the section headers; if we find only
1730 one suitable symbol table, we clobber the sh_link to point
1731 to it. I hope this doesn't break anything. */
1732 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1733 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1734 {
9ad5cbcf 1735 unsigned int scan;
252b5132
RH
1736 int found;
1737
1738 found = 0;
9ad5cbcf 1739 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1740 {
1741 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1742 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1743 {
1744 if (found != 0)
1745 {
1746 found = 0;
1747 break;
1748 }
1749 found = scan;
1750 }
1751 }
1752 if (found != 0)
1753 hdr->sh_link = found;
1754 }
1755
1756 /* Get the symbol table. */
1b3a8575
AM
1757 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1758 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1759 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1760 return FALSE;
252b5132
RH
1761
1762 /* If this reloc section does not use the main symbol table we
1763 don't treat it as a reloc section. BFD can't adequately
1764 represent such a section, so at least for now, we don't
c044fabd 1765 try. We just present it as a normal section. We also
60bcf0fa 1766 can't use it as a reloc section if it points to the null
185ef66d
AM
1767 section, an invalid section, or another reloc section. */
1768 if (hdr->sh_link != elf_onesymtab (abfd)
1769 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1770 || hdr->sh_info >= num_sec
1771 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1772 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1773 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1774 shindex);
252b5132
RH
1775
1776 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1777 return FALSE;
252b5132
RH
1778 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1779 if (target_sect == NULL)
b34976b6 1780 return FALSE;
252b5132
RH
1781
1782 if ((target_sect->flags & SEC_RELOC) == 0
1783 || target_sect->reloc_count == 0)
1784 hdr2 = &elf_section_data (target_sect)->rel_hdr;
1785 else
1786 {
dc810e39 1787 bfd_size_type amt;
252b5132 1788 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 1789 amt = sizeof (*hdr2);
217aa764 1790 hdr2 = bfd_alloc (abfd, amt);
14b1c01e
AM
1791 if (hdr2 == NULL)
1792 return FALSE;
252b5132
RH
1793 elf_section_data (target_sect)->rel_hdr2 = hdr2;
1794 }
1795 *hdr2 = *hdr;
1796 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1797 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1798 target_sect->flags |= SEC_RELOC;
1799 target_sect->relocation = NULL;
1800 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1801 /* In the section to which the relocations apply, mark whether
1802 its relocations are of the REL or RELA variety. */
72730e0c 1803 if (hdr->sh_size != 0)
68bfbfcc 1804 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 1805 abfd->flags |= HAS_RELOC;
b34976b6 1806 return TRUE;
252b5132 1807 }
252b5132
RH
1808
1809 case SHT_GNU_verdef:
1810 elf_dynverdef (abfd) = shindex;
1811 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1812 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1813
1814 case SHT_GNU_versym:
a50b2160
JJ
1815 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1816 return FALSE;
252b5132
RH
1817 elf_dynversym (abfd) = shindex;
1818 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1819 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1820
1821 case SHT_GNU_verneed:
1822 elf_dynverref (abfd) = shindex;
1823 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1824 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1825
1826 case SHT_SHLIB:
b34976b6 1827 return TRUE;
252b5132 1828
dbb410c3 1829 case SHT_GROUP:
1783205a 1830 if (! IS_VALID_GROUP_SECTION_HEADER (hdr))
a50b2160 1831 return FALSE;
6dc132d9 1832 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1833 return FALSE;
dbb410c3
AM
1834 if (hdr->contents != NULL)
1835 {
1836 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1837 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1838 asection *s;
1839
b885599b
AM
1840 if (idx->flags & GRP_COMDAT)
1841 hdr->bfd_section->flags
1842 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1843
45c5e9ed
L
1844 /* We try to keep the same section order as it comes in. */
1845 idx += n_elt;
dbb410c3 1846 while (--n_elt != 0)
1783205a
NC
1847 {
1848 --idx;
1849
1850 if (idx->shdr != NULL
1851 && (s = idx->shdr->bfd_section) != NULL
1852 && elf_next_in_group (s) != NULL)
1853 {
1854 elf_next_in_group (hdr->bfd_section) = s;
1855 break;
1856 }
1857 }
dbb410c3
AM
1858 }
1859 break;
1860
252b5132 1861 default:
104d59d1
JM
1862 /* Possibly an attributes section. */
1863 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1864 || hdr->sh_type == bed->obj_attrs_section_type)
1865 {
1866 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1867 return FALSE;
1868 _bfd_elf_parse_attributes (abfd, hdr);
1869 return TRUE;
1870 }
1871
252b5132 1872 /* Check for any processor-specific section types. */
3eb70a79
L
1873 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1874 return TRUE;
1875
1876 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1877 {
1878 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1879 /* FIXME: How to properly handle allocated section reserved
1880 for applications? */
1881 (*_bfd_error_handler)
1882 (_("%B: don't know how to handle allocated, application "
1883 "specific section `%s' [0x%8x]"),
1884 abfd, name, hdr->sh_type);
1885 else
1886 /* Allow sections reserved for applications. */
1887 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1888 shindex);
1889 }
1890 else if (hdr->sh_type >= SHT_LOPROC
1891 && hdr->sh_type <= SHT_HIPROC)
1892 /* FIXME: We should handle this section. */
1893 (*_bfd_error_handler)
1894 (_("%B: don't know how to handle processor specific section "
1895 "`%s' [0x%8x]"),
1896 abfd, name, hdr->sh_type);
1897 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1898 {
1899 /* Unrecognised OS-specific sections. */
1900 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1901 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1902 required to correctly process the section and the file should
ff15b240
NC
1903 be rejected with an error message. */
1904 (*_bfd_error_handler)
1905 (_("%B: don't know how to handle OS specific section "
1906 "`%s' [0x%8x]"),
1907 abfd, name, hdr->sh_type);
1908 else
1909 /* Otherwise it should be processed. */
1910 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1911 }
3eb70a79
L
1912 else
1913 /* FIXME: We should handle this section. */
1914 (*_bfd_error_handler)
1915 (_("%B: don't know how to handle section `%s' [0x%8x]"),
1916 abfd, name, hdr->sh_type);
1917
1918 return FALSE;
252b5132
RH
1919 }
1920
b34976b6 1921 return TRUE;
252b5132
RH
1922}
1923
ec338859
AM
1924/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
1925 Return SEC for sections that have no elf section, and NULL on error. */
1926
1927asection *
217aa764
AM
1928bfd_section_from_r_symndx (bfd *abfd,
1929 struct sym_sec_cache *cache,
1930 asection *sec,
1931 unsigned long r_symndx)
ec338859 1932{
ec338859 1933 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
a5d1b3b5 1934 asection *s;
ec338859 1935
a5d1b3b5
AM
1936 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
1937 {
1938 Elf_Internal_Shdr *symtab_hdr;
1939 unsigned char esym[sizeof (Elf64_External_Sym)];
1940 Elf_External_Sym_Shndx eshndx;
1941 Elf_Internal_Sym isym;
ec338859 1942
a5d1b3b5
AM
1943 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1944 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
1945 &isym, esym, &eshndx) == NULL)
1946 return NULL;
9ad5cbcf 1947
a5d1b3b5
AM
1948 if (cache->abfd != abfd)
1949 {
1950 memset (cache->indx, -1, sizeof (cache->indx));
1951 cache->abfd = abfd;
1952 }
1953 cache->indx[ent] = r_symndx;
1954 cache->shndx[ent] = isym.st_shndx;
ec338859 1955 }
a5d1b3b5
AM
1956
1957 s = bfd_section_from_elf_index (abfd, cache->shndx[ent]);
1958 if (s != NULL)
1959 return s;
1960
1961 return sec;
ec338859
AM
1962}
1963
252b5132
RH
1964/* Given an ELF section number, retrieve the corresponding BFD
1965 section. */
1966
1967asection *
217aa764 1968bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 1969{
9ad5cbcf 1970 if (index >= elf_numsections (abfd))
252b5132
RH
1971 return NULL;
1972 return elf_elfsections (abfd)[index]->bfd_section;
1973}
1974
b35d266b 1975static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 1976{
0112cd26
NC
1977 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1978 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1979};
1980
b35d266b 1981static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 1982{
0112cd26
NC
1983 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1984 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1985};
1986
b35d266b 1987static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 1988{
0112cd26
NC
1989 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1990 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1991 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
1992 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
1993 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
1994 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
1995 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
1996 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
1997 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
1998 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
1999 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2000};
2001
b35d266b 2002static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2003{
0112cd26
NC
2004 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2005 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2006 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2007};
2008
b35d266b 2009static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2010{
0112cd26
NC
2011 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2012 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2013 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2014 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2015 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2016 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2017 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2018 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2019 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2020};
2021
b35d266b 2022static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2023{
0112cd26
NC
2024 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2025 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2026};
2027
b35d266b 2028static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2029{
0112cd26
NC
2030 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2031 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2032 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2033 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2034};
2035
b35d266b 2036static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2037{
0112cd26
NC
2038 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2039 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2040};
2041
b35d266b 2042static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2043{
0112cd26
NC
2044 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2045 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2046 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2047};
2048
b35d266b 2049static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2050{
0112cd26
NC
2051 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2052 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2053 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2054};
2055
b35d266b 2056static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2057{
0112cd26
NC
2058 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2059 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2060 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2061 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2062 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2063};
2064
b35d266b 2065static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2066{
0112cd26
NC
2067 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2068 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2069 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2070 /* See struct bfd_elf_special_section declaration for the semantics of
2071 this special case where .prefix_length != strlen (.prefix). */
2072 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2073 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2074};
2075
b35d266b 2076static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2077{
0112cd26
NC
2078 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2079 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2080 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2081 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2082};
2083
1b315056
CS
2084static const struct bfd_elf_special_section special_sections_z[] =
2085{
2086 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2087 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2088 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2089 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2090 { NULL, 0, 0, 0, 0 }
2091};
2092
b35d266b 2093static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2094{
7f4d3958 2095 special_sections_b, /* 'b' */
98ece1b3 2096 special_sections_c, /* 'c' */
7f4d3958
L
2097 special_sections_d, /* 'd' */
2098 NULL, /* 'e' */
2099 special_sections_f, /* 'f' */
2100 special_sections_g, /* 'g' */
2101 special_sections_h, /* 'h' */
2102 special_sections_i, /* 'i' */
2103 NULL, /* 'j' */
2104 NULL, /* 'k' */
2105 special_sections_l, /* 'l' */
2106 NULL, /* 'm' */
2107 special_sections_n, /* 'n' */
2108 NULL, /* 'o' */
2109 special_sections_p, /* 'p' */
2110 NULL, /* 'q' */
2111 special_sections_r, /* 'r' */
2112 special_sections_s, /* 's' */
2113 special_sections_t, /* 't' */
1b315056
CS
2114 NULL, /* 'u' */
2115 NULL, /* 'v' */
2116 NULL, /* 'w' */
2117 NULL, /* 'x' */
2118 NULL, /* 'y' */
2119 special_sections_z /* 'z' */
7f4d3958
L
2120};
2121
551b43fd
AM
2122const struct bfd_elf_special_section *
2123_bfd_elf_get_special_section (const char *name,
2124 const struct bfd_elf_special_section *spec,
2125 unsigned int rela)
2f89ff8d
L
2126{
2127 int i;
7f4d3958 2128 int len;
7f4d3958 2129
551b43fd 2130 len = strlen (name);
7f4d3958 2131
551b43fd 2132 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2133 {
2134 int suffix_len;
551b43fd 2135 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2136
2137 if (len < prefix_len)
2138 continue;
551b43fd 2139 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2140 continue;
2141
551b43fd 2142 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2143 if (suffix_len <= 0)
2144 {
2145 if (name[prefix_len] != 0)
2146 {
2147 if (suffix_len == 0)
2148 continue;
2149 if (name[prefix_len] != '.'
2150 && (suffix_len == -2
551b43fd 2151 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2152 continue;
2153 }
2154 }
2155 else
2156 {
2157 if (len < prefix_len + suffix_len)
2158 continue;
2159 if (memcmp (name + len - suffix_len,
551b43fd 2160 spec[i].prefix + prefix_len,
7dcb9820
AM
2161 suffix_len) != 0)
2162 continue;
2163 }
551b43fd 2164 return &spec[i];
7dcb9820 2165 }
2f89ff8d
L
2166
2167 return NULL;
2168}
2169
7dcb9820 2170const struct bfd_elf_special_section *
29ef7005 2171_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2172{
551b43fd
AM
2173 int i;
2174 const struct bfd_elf_special_section *spec;
29ef7005 2175 const struct elf_backend_data *bed;
2f89ff8d
L
2176
2177 /* See if this is one of the special sections. */
551b43fd
AM
2178 if (sec->name == NULL)
2179 return NULL;
2f89ff8d 2180
29ef7005
L
2181 bed = get_elf_backend_data (abfd);
2182 spec = bed->special_sections;
2183 if (spec)
2184 {
2185 spec = _bfd_elf_get_special_section (sec->name,
2186 bed->special_sections,
2187 sec->use_rela_p);
2188 if (spec != NULL)
2189 return spec;
2190 }
2191
551b43fd
AM
2192 if (sec->name[0] != '.')
2193 return NULL;
2f89ff8d 2194
551b43fd 2195 i = sec->name[1] - 'b';
1b315056 2196 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2197 return NULL;
2198
2199 spec = special_sections[i];
2f89ff8d 2200
551b43fd
AM
2201 if (spec == NULL)
2202 return NULL;
2203
2204 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2205}
2206
b34976b6 2207bfd_boolean
217aa764 2208_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2209{
2210 struct bfd_elf_section_data *sdata;
551b43fd 2211 const struct elf_backend_data *bed;
7dcb9820 2212 const struct bfd_elf_special_section *ssect;
252b5132 2213
f0abc2a1
AM
2214 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2215 if (sdata == NULL)
2216 {
217aa764 2217 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2218 if (sdata == NULL)
2219 return FALSE;
217aa764 2220 sec->used_by_bfd = sdata;
f0abc2a1 2221 }
bf572ba0 2222
551b43fd
AM
2223 /* Indicate whether or not this section should use RELA relocations. */
2224 bed = get_elf_backend_data (abfd);
2225 sec->use_rela_p = bed->default_use_rela_p;
2226
e843e0f8
L
2227 /* When we read a file, we don't need to set ELF section type and
2228 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2229 anyway. We will set ELF section type and flags for all linker
2230 created sections. If user specifies BFD section flags, we will
2231 set ELF section type and flags based on BFD section flags in
2232 elf_fake_sections. */
2233 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2234 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2235 {
551b43fd 2236 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2237 if (ssect != NULL)
2238 {
2239 elf_section_type (sec) = ssect->type;
2240 elf_section_flags (sec) = ssect->attr;
2241 }
2f89ff8d
L
2242 }
2243
f592407e 2244 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2245}
2246
2247/* Create a new bfd section from an ELF program header.
2248
2249 Since program segments have no names, we generate a synthetic name
2250 of the form segment<NUM>, where NUM is generally the index in the
2251 program header table. For segments that are split (see below) we
2252 generate the names segment<NUM>a and segment<NUM>b.
2253
2254 Note that some program segments may have a file size that is different than
2255 (less than) the memory size. All this means is that at execution the
2256 system must allocate the amount of memory specified by the memory size,
2257 but only initialize it with the first "file size" bytes read from the
2258 file. This would occur for example, with program segments consisting
2259 of combined data+bss.
2260
2261 To handle the above situation, this routine generates TWO bfd sections
2262 for the single program segment. The first has the length specified by
2263 the file size of the segment, and the second has the length specified
2264 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2265 into its initialized and uninitialized parts.
252b5132
RH
2266
2267 */
2268
b34976b6 2269bfd_boolean
217aa764
AM
2270_bfd_elf_make_section_from_phdr (bfd *abfd,
2271 Elf_Internal_Phdr *hdr,
2272 int index,
2273 const char *typename)
252b5132
RH
2274{
2275 asection *newsect;
2276 char *name;
2277 char namebuf[64];
d4c88bbb 2278 size_t len;
252b5132
RH
2279 int split;
2280
2281 split = ((hdr->p_memsz > 0)
2282 && (hdr->p_filesz > 0)
2283 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2284
2285 if (hdr->p_filesz > 0)
252b5132 2286 {
d5191d0c
AM
2287 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
2288 len = strlen (namebuf) + 1;
2289 name = bfd_alloc (abfd, len);
2290 if (!name)
2291 return FALSE;
2292 memcpy (name, namebuf, len);
2293 newsect = bfd_make_section (abfd, name);
2294 if (newsect == NULL)
2295 return FALSE;
2296 newsect->vma = hdr->p_vaddr;
2297 newsect->lma = hdr->p_paddr;
2298 newsect->size = hdr->p_filesz;
2299 newsect->filepos = hdr->p_offset;
2300 newsect->flags |= SEC_HAS_CONTENTS;
2301 newsect->alignment_power = bfd_log2 (hdr->p_align);
2302 if (hdr->p_type == PT_LOAD)
252b5132 2303 {
d5191d0c
AM
2304 newsect->flags |= SEC_ALLOC;
2305 newsect->flags |= SEC_LOAD;
2306 if (hdr->p_flags & PF_X)
2307 {
2308 /* FIXME: all we known is that it has execute PERMISSION,
2309 may be data. */
2310 newsect->flags |= SEC_CODE;
2311 }
2312 }
2313 if (!(hdr->p_flags & PF_W))
2314 {
2315 newsect->flags |= SEC_READONLY;
252b5132 2316 }
252b5132
RH
2317 }
2318
d5191d0c 2319 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2320 {
d5191d0c
AM
2321 bfd_vma align;
2322
2323 sprintf (namebuf, "%s%d%s", typename, index, split ? "b" : "");
d4c88bbb 2324 len = strlen (namebuf) + 1;
217aa764 2325 name = bfd_alloc (abfd, len);
252b5132 2326 if (!name)
b34976b6 2327 return FALSE;
d4c88bbb 2328 memcpy (name, namebuf, len);
252b5132
RH
2329 newsect = bfd_make_section (abfd, name);
2330 if (newsect == NULL)
b34976b6 2331 return FALSE;
252b5132
RH
2332 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2333 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2334 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2335 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2336 align = newsect->vma & -newsect->vma;
2337 if (align == 0 || align > hdr->p_align)
2338 align = hdr->p_align;
2339 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2340 if (hdr->p_type == PT_LOAD)
2341 {
d5191d0c
AM
2342 /* Hack for gdb. Segments that have not been modified do
2343 not have their contents written to a core file, on the
2344 assumption that a debugger can find the contents in the
2345 executable. We flag this case by setting the fake
2346 section size to zero. Note that "real" bss sections will
2347 always have their contents dumped to the core file. */
2348 if (bfd_get_format (abfd) == bfd_core)
2349 newsect->size = 0;
252b5132
RH
2350 newsect->flags |= SEC_ALLOC;
2351 if (hdr->p_flags & PF_X)
2352 newsect->flags |= SEC_CODE;
2353 }
2354 if (!(hdr->p_flags & PF_W))
2355 newsect->flags |= SEC_READONLY;
2356 }
2357
b34976b6 2358 return TRUE;
252b5132
RH
2359}
2360
b34976b6 2361bfd_boolean
217aa764 2362bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2363{
9c5bfbb7 2364 const struct elf_backend_data *bed;
20cfcaae
NC
2365
2366 switch (hdr->p_type)
2367 {
2368 case PT_NULL:
2369 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2370
2371 case PT_LOAD:
2372 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2373
2374 case PT_DYNAMIC:
2375 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2376
2377 case PT_INTERP:
2378 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2379
2380 case PT_NOTE:
2381 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2382 return FALSE;
718175fa 2383 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2384 return FALSE;
2385 return TRUE;
20cfcaae
NC
2386
2387 case PT_SHLIB:
2388 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2389
2390 case PT_PHDR:
2391 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2392
811072d8
RM
2393 case PT_GNU_EH_FRAME:
2394 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2395 "eh_frame_hdr");
2396
2b05f1b7
L
2397 case PT_GNU_STACK:
2398 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
9ee5e499 2399
8c37241b
JJ
2400 case PT_GNU_RELRO:
2401 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2402
20cfcaae 2403 default:
8c1acd09 2404 /* Check for any processor-specific program segment types. */
20cfcaae 2405 bed = get_elf_backend_data (abfd);
d27f5fa1 2406 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2407 }
2408}
2409
23bc299b 2410/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2411 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2412 relocations; otherwise, we use REL relocations. */
2413
b34976b6 2414bfd_boolean
217aa764
AM
2415_bfd_elf_init_reloc_shdr (bfd *abfd,
2416 Elf_Internal_Shdr *rel_hdr,
2417 asection *asect,
2418 bfd_boolean use_rela_p)
23bc299b
MM
2419{
2420 char *name;
9c5bfbb7 2421 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2422 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2423
dc810e39 2424 name = bfd_alloc (abfd, amt);
23bc299b 2425 if (name == NULL)
b34976b6 2426 return FALSE;
23bc299b
MM
2427 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2428 rel_hdr->sh_name =
2b0f7ef9 2429 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2430 FALSE);
23bc299b 2431 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2432 return FALSE;
23bc299b
MM
2433 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2434 rel_hdr->sh_entsize = (use_rela_p
2435 ? bed->s->sizeof_rela
2436 : bed->s->sizeof_rel);
72de5009 2437 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2438 rel_hdr->sh_flags = 0;
2439 rel_hdr->sh_addr = 0;
2440 rel_hdr->sh_size = 0;
2441 rel_hdr->sh_offset = 0;
2442
b34976b6 2443 return TRUE;
23bc299b
MM
2444}
2445
252b5132
RH
2446/* Set up an ELF internal section header for a section. */
2447
252b5132 2448static void
217aa764 2449elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2450{
9c5bfbb7 2451 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2452 bfd_boolean *failedptr = failedptrarg;
252b5132 2453 Elf_Internal_Shdr *this_hdr;
0414f35b 2454 unsigned int sh_type;
252b5132
RH
2455
2456 if (*failedptr)
2457 {
2458 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2459 loop. */
252b5132
RH
2460 return;
2461 }
2462
2463 this_hdr = &elf_section_data (asect)->this_hdr;
2464
e57b5356
AM
2465 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2466 asect->name, FALSE);
2467 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2468 {
b34976b6 2469 *failedptr = TRUE;
252b5132
RH
2470 return;
2471 }
2472
a4d8e49b 2473 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2474
2475 if ((asect->flags & SEC_ALLOC) != 0
2476 || asect->user_set_vma)
2477 this_hdr->sh_addr = asect->vma;
2478 else
2479 this_hdr->sh_addr = 0;
2480
2481 this_hdr->sh_offset = 0;
eea6121a 2482 this_hdr->sh_size = asect->size;
252b5132 2483 this_hdr->sh_link = 0;
72de5009 2484 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2485 /* The sh_entsize and sh_info fields may have been set already by
2486 copy_private_section_data. */
2487
2488 this_hdr->bfd_section = asect;
2489 this_hdr->contents = NULL;
2490
3cddba1e
L
2491 /* If the section type is unspecified, we set it based on
2492 asect->flags. */
98ece1b3
AM
2493 if ((asect->flags & SEC_GROUP) != 0)
2494 sh_type = SHT_GROUP;
2495 else if ((asect->flags & SEC_ALLOC) != 0
2496 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2497 || (asect->flags & SEC_NEVER_LOAD) != 0))
2498 sh_type = SHT_NOBITS;
2499 else
2500 sh_type = SHT_PROGBITS;
2501
3cddba1e 2502 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2503 this_hdr->sh_type = sh_type;
2504 else if (this_hdr->sh_type == SHT_NOBITS
2505 && sh_type == SHT_PROGBITS
2506 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2507 {
98ece1b3
AM
2508 /* Warn if we are changing a NOBITS section to PROGBITS, but
2509 allow the link to proceed. This can happen when users link
2510 non-bss input sections to bss output sections, or emit data
2511 to a bss output section via a linker script. */
2512 (*_bfd_error_handler)
58f0869b 2513 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2514 this_hdr->sh_type = sh_type;
3cddba1e
L
2515 }
2516
2f89ff8d 2517 switch (this_hdr->sh_type)
252b5132 2518 {
2f89ff8d 2519 default:
2f89ff8d
L
2520 break;
2521
2522 case SHT_STRTAB:
2523 case SHT_INIT_ARRAY:
2524 case SHT_FINI_ARRAY:
2525 case SHT_PREINIT_ARRAY:
2526 case SHT_NOTE:
2527 case SHT_NOBITS:
2528 case SHT_PROGBITS:
2529 break;
2530
2531 case SHT_HASH:
c7ac6ff8 2532 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2533 break;
5de3bf90 2534
2f89ff8d 2535 case SHT_DYNSYM:
252b5132 2536 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2537 break;
2538
2539 case SHT_DYNAMIC:
252b5132 2540 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2541 break;
2542
2543 case SHT_RELA:
2544 if (get_elf_backend_data (abfd)->may_use_rela_p)
2545 this_hdr->sh_entsize = bed->s->sizeof_rela;
2546 break;
2547
2548 case SHT_REL:
2549 if (get_elf_backend_data (abfd)->may_use_rel_p)
2550 this_hdr->sh_entsize = bed->s->sizeof_rel;
2551 break;
2552
2553 case SHT_GNU_versym:
252b5132 2554 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2555 break;
2556
2557 case SHT_GNU_verdef:
252b5132
RH
2558 this_hdr->sh_entsize = 0;
2559 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2560 cverdefs. The linker will set cverdefs, but sh_info will be
2561 zero. */
252b5132
RH
2562 if (this_hdr->sh_info == 0)
2563 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2564 else
2565 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2566 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2567 break;
2568
2569 case SHT_GNU_verneed:
252b5132
RH
2570 this_hdr->sh_entsize = 0;
2571 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2572 cverrefs. The linker will set cverrefs, but sh_info will be
2573 zero. */
252b5132
RH
2574 if (this_hdr->sh_info == 0)
2575 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2576 else
2577 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2578 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2579 break;
2580
2581 case SHT_GROUP:
1783205a 2582 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2583 break;
fdc90cb4
JJ
2584
2585 case SHT_GNU_HASH:
2586 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2587 break;
dbb410c3 2588 }
252b5132
RH
2589
2590 if ((asect->flags & SEC_ALLOC) != 0)
2591 this_hdr->sh_flags |= SHF_ALLOC;
2592 if ((asect->flags & SEC_READONLY) == 0)
2593 this_hdr->sh_flags |= SHF_WRITE;
2594 if ((asect->flags & SEC_CODE) != 0)
2595 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2596 if ((asect->flags & SEC_MERGE) != 0)
2597 {
2598 this_hdr->sh_flags |= SHF_MERGE;
2599 this_hdr->sh_entsize = asect->entsize;
2600 if ((asect->flags & SEC_STRINGS) != 0)
2601 this_hdr->sh_flags |= SHF_STRINGS;
2602 }
1126897b 2603 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2604 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2605 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2606 {
2607 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2608 if (asect->size == 0
2609 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2610 {
3a800eb9 2611 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2612
704afa60 2613 this_hdr->sh_size = 0;
3a800eb9
AM
2614 if (o != NULL)
2615 {
704afa60 2616 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2617 if (this_hdr->sh_size != 0)
2618 this_hdr->sh_type = SHT_NOBITS;
2619 }
704afa60
JJ
2620 }
2621 }
252b5132
RH
2622
2623 /* Check for processor-specific section types. */
0414f35b 2624 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2625 if (bed->elf_backend_fake_sections
2626 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2627 *failedptr = TRUE;
252b5132 2628
42bb2e33 2629 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2630 {
2631 /* Don't change the header type from NOBITS if we are being
42bb2e33 2632 called for objcopy --only-keep-debug. */
0414f35b
AM
2633 this_hdr->sh_type = sh_type;
2634 }
2635
252b5132 2636 /* If the section has relocs, set up a section header for the
23bc299b
MM
2637 SHT_REL[A] section. If two relocation sections are required for
2638 this section, it is up to the processor-specific back-end to
c044fabd 2639 create the other. */
23bc299b 2640 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2641 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2642 &elf_section_data (asect)->rel_hdr,
c044fabd 2643 asect,
68bfbfcc 2644 asect->use_rela_p))
b34976b6 2645 *failedptr = TRUE;
252b5132
RH
2646}
2647
bcacc0f5
AM
2648/* Fill in the contents of a SHT_GROUP section. Called from
2649 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2650 when ELF targets use the generic linker, ld. Called for ld -r
2651 from bfd_elf_final_link. */
dbb410c3 2652
1126897b 2653void
217aa764 2654bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2655{
217aa764 2656 bfd_boolean *failedptr = failedptrarg;
9dce4196 2657 asection *elt, *first;
dbb410c3 2658 unsigned char *loc;
b34976b6 2659 bfd_boolean gas;
dbb410c3 2660
7e4111ad
L
2661 /* Ignore linker created group section. See elfNN_ia64_object_p in
2662 elfxx-ia64.c. */
2663 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2664 || *failedptr)
2665 return;
2666
bcacc0f5
AM
2667 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2668 {
2669 unsigned long symindx = 0;
2670
2671 /* elf_group_id will have been set up by objcopy and the
2672 generic linker. */
2673 if (elf_group_id (sec) != NULL)
2674 symindx = elf_group_id (sec)->udata.i;
1126897b 2675
bcacc0f5
AM
2676 if (symindx == 0)
2677 {
2678 /* If called from the assembler, swap_out_syms will have set up
2679 elf_section_syms. */
2680 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2681 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2682 }
2683 elf_section_data (sec)->this_hdr.sh_info = symindx;
2684 }
2685 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2686 {
bcacc0f5
AM
2687 /* The ELF backend linker sets sh_info to -2 when the group
2688 signature symbol is global, and thus the index can't be
2689 set until all local symbols are output. */
2690 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2691 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2692 unsigned long symndx = sec_data->this_hdr.sh_info;
2693 unsigned long extsymoff = 0;
2694 struct elf_link_hash_entry *h;
2695
2696 if (!elf_bad_symtab (igroup->owner))
2697 {
2698 Elf_Internal_Shdr *symtab_hdr;
2699
2700 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2701 extsymoff = symtab_hdr->sh_info;
2702 }
2703 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2704 while (h->root.type == bfd_link_hash_indirect
2705 || h->root.type == bfd_link_hash_warning)
2706 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2707
2708 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2709 }
dbb410c3 2710
1126897b 2711 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2712 gas = TRUE;
dbb410c3
AM
2713 if (sec->contents == NULL)
2714 {
b34976b6 2715 gas = FALSE;
eea6121a 2716 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2717
2718 /* Arrange for the section to be written out. */
2719 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2720 if (sec->contents == NULL)
2721 {
b34976b6 2722 *failedptr = TRUE;
dbb410c3
AM
2723 return;
2724 }
2725 }
2726
eea6121a 2727 loc = sec->contents + sec->size;
dbb410c3 2728
9dce4196
AM
2729 /* Get the pointer to the first section in the group that gas
2730 squirreled away here. objcopy arranges for this to be set to the
2731 start of the input section group. */
2732 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2733
2734 /* First element is a flag word. Rest of section is elf section
2735 indices for all the sections of the group. Write them backwards
2736 just to keep the group in the same order as given in .section
2737 directives, not that it matters. */
2738 while (elt != NULL)
2739 {
9dce4196
AM
2740 asection *s;
2741 unsigned int idx;
2742
9dce4196 2743 s = elt;
01e1a5bc
NC
2744 if (! elf_discarded_section (s))
2745 {
2746 loc -= 4;
2747 if (!gas)
2748 s = s->output_section;
2749 idx = 0;
2750 if (s != NULL)
2751 idx = elf_section_data (s)->this_idx;
2752 H_PUT_32 (abfd, idx, loc);
2753 }
945906ff 2754 elt = elf_next_in_group (elt);
9dce4196
AM
2755 if (elt == first)
2756 break;
dbb410c3
AM
2757 }
2758
3d7f7666 2759 if ((loc -= 4) != sec->contents)
9dce4196 2760 abort ();
dbb410c3 2761
9dce4196 2762 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2763}
2764
252b5132
RH
2765/* Assign all ELF section numbers. The dummy first section is handled here
2766 too. The link/info pointers for the standard section types are filled
2767 in here too, while we're at it. */
2768
b34976b6 2769static bfd_boolean
da9f89d4 2770assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2771{
2772 struct elf_obj_tdata *t = elf_tdata (abfd);
2773 asection *sec;
2b0f7ef9 2774 unsigned int section_number, secn;
252b5132 2775 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2776 struct bfd_elf_section_data *d;
3516e984 2777 bfd_boolean need_symtab;
252b5132
RH
2778
2779 section_number = 1;
2780
2b0f7ef9
JJ
2781 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2782
da9f89d4
L
2783 /* SHT_GROUP sections are in relocatable files only. */
2784 if (link_info == NULL || link_info->relocatable)
252b5132 2785 {
da9f89d4 2786 /* Put SHT_GROUP sections first. */
04dd1667 2787 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2788 {
5daa8fe7 2789 d = elf_section_data (sec);
da9f89d4
L
2790
2791 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2792 {
5daa8fe7 2793 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2794 {
2795 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2796 bfd_section_list_remove (abfd, sec);
da9f89d4 2797 abfd->section_count--;
da9f89d4 2798 }
08a40648 2799 else
4fbb74a6 2800 d->this_idx = section_number++;
da9f89d4 2801 }
47cc2cf5
PB
2802 }
2803 }
2804
2805 for (sec = abfd->sections; sec; sec = sec->next)
2806 {
2807 d = elf_section_data (sec);
2808
2809 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2810 d->this_idx = section_number++;
2b0f7ef9 2811 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2812 if ((sec->flags & SEC_RELOC) == 0)
2813 d->rel_idx = 0;
2814 else
2b0f7ef9
JJ
2815 {
2816 d->rel_idx = section_number++;
2817 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2818 }
23bc299b
MM
2819
2820 if (d->rel_hdr2)
2b0f7ef9
JJ
2821 {
2822 d->rel_idx2 = section_number++;
2823 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2824 }
23bc299b
MM
2825 else
2826 d->rel_idx2 = 0;
252b5132
RH
2827 }
2828
2829 t->shstrtab_section = section_number++;
2b0f7ef9 2830 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2831 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132 2832
3516e984
L
2833 need_symtab = (bfd_get_symcount (abfd) > 0
2834 || (link_info == NULL
2835 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2836 == HAS_RELOC)));
2837 if (need_symtab)
252b5132
RH
2838 {
2839 t->symtab_section = section_number++;
2b0f7ef9 2840 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 2841 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 2842 {
9ad5cbcf
AM
2843 t->symtab_shndx_section = section_number++;
2844 t->symtab_shndx_hdr.sh_name
2845 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2846 ".symtab_shndx", FALSE);
9ad5cbcf 2847 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2848 return FALSE;
9ad5cbcf 2849 }
252b5132 2850 t->strtab_section = section_number++;
2b0f7ef9 2851 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2852 }
2853
2b0f7ef9
JJ
2854 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2855 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2856
2857 elf_numsections (abfd) = section_number;
252b5132
RH
2858 elf_elfheader (abfd)->e_shnum = section_number;
2859
2860 /* Set up the list of section header pointers, in agreement with the
2861 indices. */
d0fb9a8d 2862 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 2863 if (i_shdrp == NULL)
b34976b6 2864 return FALSE;
252b5132 2865
d0fb9a8d 2866 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
2867 if (i_shdrp[0] == NULL)
2868 {
2869 bfd_release (abfd, i_shdrp);
b34976b6 2870 return FALSE;
252b5132 2871 }
252b5132
RH
2872
2873 elf_elfsections (abfd) = i_shdrp;
2874
2875 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3516e984 2876 if (need_symtab)
252b5132
RH
2877 {
2878 i_shdrp[t->symtab_section] = &t->symtab_hdr;
4fbb74a6 2879 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf
AM
2880 {
2881 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2882 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2883 }
252b5132
RH
2884 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2885 t->symtab_hdr.sh_link = t->strtab_section;
2886 }
38ce5b11 2887
252b5132
RH
2888 for (sec = abfd->sections; sec; sec = sec->next)
2889 {
2890 struct bfd_elf_section_data *d = elf_section_data (sec);
2891 asection *s;
2892 const char *name;
2893
2894 i_shdrp[d->this_idx] = &d->this_hdr;
2895 if (d->rel_idx != 0)
2896 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
2897 if (d->rel_idx2 != 0)
2898 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
2899
2900 /* Fill in the sh_link and sh_info fields while we're at it. */
2901
2902 /* sh_link of a reloc section is the section index of the symbol
2903 table. sh_info is the section index of the section to which
2904 the relocation entries apply. */
2905 if (d->rel_idx != 0)
2906 {
2907 d->rel_hdr.sh_link = t->symtab_section;
2908 d->rel_hdr.sh_info = d->this_idx;
2909 }
23bc299b
MM
2910 if (d->rel_idx2 != 0)
2911 {
2912 d->rel_hdr2->sh_link = t->symtab_section;
2913 d->rel_hdr2->sh_info = d->this_idx;
2914 }
252b5132 2915
38ce5b11
L
2916 /* We need to set up sh_link for SHF_LINK_ORDER. */
2917 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
2918 {
2919 s = elf_linked_to_section (sec);
2920 if (s)
38ce5b11 2921 {
f2876037 2922 /* elf_linked_to_section points to the input section. */
ccd2ec6a 2923 if (link_info != NULL)
38ce5b11 2924 {
f2876037 2925 /* Check discarded linkonce section. */
ccd2ec6a 2926 if (elf_discarded_section (s))
38ce5b11 2927 {
ccd2ec6a
L
2928 asection *kept;
2929 (*_bfd_error_handler)
2930 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
2931 abfd, d->this_hdr.bfd_section,
2932 s, s->owner);
2933 /* Point to the kept section if it has the same
2934 size as the discarded one. */
c0f00686 2935 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 2936 if (kept == NULL)
185d09ad 2937 {
ccd2ec6a
L
2938 bfd_set_error (bfd_error_bad_value);
2939 return FALSE;
185d09ad 2940 }
ccd2ec6a 2941 s = kept;
38ce5b11 2942 }
e424ecc8 2943
ccd2ec6a
L
2944 s = s->output_section;
2945 BFD_ASSERT (s != NULL);
38ce5b11 2946 }
f2876037
L
2947 else
2948 {
2949 /* Handle objcopy. */
2950 if (s->output_section == NULL)
2951 {
2952 (*_bfd_error_handler)
2953 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
2954 abfd, d->this_hdr.bfd_section, s, s->owner);
2955 bfd_set_error (bfd_error_bad_value);
2956 return FALSE;
2957 }
2958 s = s->output_section;
2959 }
ccd2ec6a
L
2960 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2961 }
2962 else
2963 {
2964 /* PR 290:
2965 The Intel C compiler generates SHT_IA_64_UNWIND with
2966 SHF_LINK_ORDER. But it doesn't set the sh_link or
2967 sh_info fields. Hence we could get the situation
08a40648 2968 where s is NULL. */
ccd2ec6a
L
2969 const struct elf_backend_data *bed
2970 = get_elf_backend_data (abfd);
2971 if (bed->link_order_error_handler)
2972 bed->link_order_error_handler
2973 (_("%B: warning: sh_link not set for section `%A'"),
2974 abfd, sec);
38ce5b11
L
2975 }
2976 }
2977
252b5132
RH
2978 switch (d->this_hdr.sh_type)
2979 {
2980 case SHT_REL:
2981 case SHT_RELA:
2982 /* A reloc section which we are treating as a normal BFD
2983 section. sh_link is the section index of the symbol
2984 table. sh_info is the section index of the section to
2985 which the relocation entries apply. We assume that an
2986 allocated reloc section uses the dynamic symbol table.
2987 FIXME: How can we be sure? */
2988 s = bfd_get_section_by_name (abfd, ".dynsym");
2989 if (s != NULL)
2990 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2991
2992 /* We look up the section the relocs apply to by name. */
2993 name = sec->name;
2994 if (d->this_hdr.sh_type == SHT_REL)
2995 name += 4;
2996 else
2997 name += 5;
2998 s = bfd_get_section_by_name (abfd, name);
2999 if (s != NULL)
3000 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3001 break;
3002
3003 case SHT_STRTAB:
3004 /* We assume that a section named .stab*str is a stabs
3005 string section. We look for a section with the same name
3006 but without the trailing ``str'', and set its sh_link
3007 field to point to this section. */
0112cd26 3008 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3009 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3010 {
3011 size_t len;
3012 char *alc;
3013
3014 len = strlen (sec->name);
217aa764 3015 alc = bfd_malloc (len - 2);
252b5132 3016 if (alc == NULL)
b34976b6 3017 return FALSE;
d4c88bbb 3018 memcpy (alc, sec->name, len - 3);
252b5132
RH
3019 alc[len - 3] = '\0';
3020 s = bfd_get_section_by_name (abfd, alc);
3021 free (alc);
3022 if (s != NULL)
3023 {
3024 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3025
3026 /* This is a .stab section. */
0594c12d
AM
3027 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3028 elf_section_data (s)->this_hdr.sh_entsize
3029 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3030 }
3031 }
3032 break;
3033
3034 case SHT_DYNAMIC:
3035 case SHT_DYNSYM:
3036 case SHT_GNU_verneed:
3037 case SHT_GNU_verdef:
3038 /* sh_link is the section header index of the string table
3039 used for the dynamic entries, or the symbol table, or the
3040 version strings. */
3041 s = bfd_get_section_by_name (abfd, ".dynstr");
3042 if (s != NULL)
3043 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3044 break;
3045
7f1204bb
JJ
3046 case SHT_GNU_LIBLIST:
3047 /* sh_link is the section header index of the prelink library
08a40648
AM
3048 list used for the dynamic entries, or the symbol table, or
3049 the version strings. */
7f1204bb
JJ
3050 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3051 ? ".dynstr" : ".gnu.libstr");
3052 if (s != NULL)
3053 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3054 break;
3055
252b5132 3056 case SHT_HASH:
fdc90cb4 3057 case SHT_GNU_HASH:
252b5132
RH
3058 case SHT_GNU_versym:
3059 /* sh_link is the section header index of the symbol table
3060 this hash table or version table is for. */
3061 s = bfd_get_section_by_name (abfd, ".dynsym");
3062 if (s != NULL)
3063 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3064 break;
dbb410c3
AM
3065
3066 case SHT_GROUP:
3067 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3068 }
3069 }
3070
2b0f7ef9 3071 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3072 if (i_shdrp[secn] == NULL)
3073 i_shdrp[secn] = i_shdrp[0];
3074 else
3075 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3076 i_shdrp[secn]->sh_name);
b34976b6 3077 return TRUE;
252b5132
RH
3078}
3079
3080/* Map symbol from it's internal number to the external number, moving
3081 all local symbols to be at the head of the list. */
3082
5372391b 3083static bfd_boolean
217aa764 3084sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3085{
3086 /* If the backend has a special mapping, use it. */
9c5bfbb7 3087 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3088 if (bed->elf_backend_sym_is_global)
3089 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3090
3091 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3092 || bfd_is_und_section (bfd_get_section (sym))
3093 || bfd_is_com_section (bfd_get_section (sym)));
3094}
3095
5372391b 3096/* Don't output section symbols for sections that are not going to be
0f0a5e58 3097 output. */
5372391b
AM
3098
3099static bfd_boolean
3100ignore_section_sym (bfd *abfd, asymbol *sym)
3101{
3102 return ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58
AM
3103 && !(sym->section->owner == abfd
3104 || (sym->section->output_section->owner == abfd
3105 && sym->section->output_offset == 0)));
5372391b
AM
3106}
3107
b34976b6 3108static bfd_boolean
217aa764 3109elf_map_symbols (bfd *abfd)
252b5132 3110{
dc810e39 3111 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3112 asymbol **syms = bfd_get_outsymbols (abfd);
3113 asymbol **sect_syms;
dc810e39
AM
3114 unsigned int num_locals = 0;
3115 unsigned int num_globals = 0;
3116 unsigned int num_locals2 = 0;
3117 unsigned int num_globals2 = 0;
252b5132 3118 int max_index = 0;
dc810e39 3119 unsigned int idx;
252b5132
RH
3120 asection *asect;
3121 asymbol **new_syms;
252b5132
RH
3122
3123#ifdef DEBUG
3124 fprintf (stderr, "elf_map_symbols\n");
3125 fflush (stderr);
3126#endif
3127
252b5132
RH
3128 for (asect = abfd->sections; asect; asect = asect->next)
3129 {
3130 if (max_index < asect->index)
3131 max_index = asect->index;
3132 }
3133
3134 max_index++;
d0fb9a8d 3135 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3136 if (sect_syms == NULL)
b34976b6 3137 return FALSE;
252b5132 3138 elf_section_syms (abfd) = sect_syms;
4e89ac30 3139 elf_num_section_syms (abfd) = max_index;
252b5132 3140
079e9a2f
AM
3141 /* Init sect_syms entries for any section symbols we have already
3142 decided to output. */
252b5132
RH
3143 for (idx = 0; idx < symcount; idx++)
3144 {
dc810e39 3145 asymbol *sym = syms[idx];
c044fabd 3146
252b5132 3147 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3148 && sym->value == 0
5372391b 3149 && !ignore_section_sym (abfd, sym))
252b5132 3150 {
5372391b 3151 asection *sec = sym->section;
252b5132 3152
5372391b
AM
3153 if (sec->owner != abfd)
3154 sec = sec->output_section;
252b5132 3155
5372391b 3156 sect_syms[sec->index] = syms[idx];
252b5132
RH
3157 }
3158 }
3159
252b5132
RH
3160 /* Classify all of the symbols. */
3161 for (idx = 0; idx < symcount; idx++)
3162 {
5372391b
AM
3163 if (ignore_section_sym (abfd, syms[idx]))
3164 continue;
252b5132
RH
3165 if (!sym_is_global (abfd, syms[idx]))
3166 num_locals++;
3167 else
3168 num_globals++;
3169 }
079e9a2f 3170
5372391b 3171 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3172 sections will already have a section symbol in outsymbols, but
3173 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3174 at least in that case. */
252b5132
RH
3175 for (asect = abfd->sections; asect; asect = asect->next)
3176 {
079e9a2f 3177 if (sect_syms[asect->index] == NULL)
252b5132 3178 {
079e9a2f 3179 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3180 num_locals++;
3181 else
3182 num_globals++;
252b5132
RH
3183 }
3184 }
3185
3186 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3187 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3188
252b5132 3189 if (new_syms == NULL)
b34976b6 3190 return FALSE;
252b5132
RH
3191
3192 for (idx = 0; idx < symcount; idx++)
3193 {
3194 asymbol *sym = syms[idx];
dc810e39 3195 unsigned int i;
252b5132 3196
5372391b
AM
3197 if (ignore_section_sym (abfd, sym))
3198 continue;
252b5132
RH
3199 if (!sym_is_global (abfd, sym))
3200 i = num_locals2++;
3201 else
3202 i = num_locals + num_globals2++;
3203 new_syms[i] = sym;
3204 sym->udata.i = i + 1;
3205 }
3206 for (asect = abfd->sections; asect; asect = asect->next)
3207 {
079e9a2f 3208 if (sect_syms[asect->index] == NULL)
252b5132 3209 {
079e9a2f 3210 asymbol *sym = asect->symbol;
dc810e39 3211 unsigned int i;
252b5132 3212
079e9a2f 3213 sect_syms[asect->index] = sym;
252b5132
RH
3214 if (!sym_is_global (abfd, sym))
3215 i = num_locals2++;
3216 else
3217 i = num_locals + num_globals2++;
3218 new_syms[i] = sym;
3219 sym->udata.i = i + 1;
3220 }
3221 }
3222
3223 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3224
3225 elf_num_locals (abfd) = num_locals;
3226 elf_num_globals (abfd) = num_globals;
b34976b6 3227 return TRUE;
252b5132
RH
3228}
3229
3230/* Align to the maximum file alignment that could be required for any
3231 ELF data structure. */
3232
268b6b39 3233static inline file_ptr
217aa764 3234align_file_position (file_ptr off, int align)
252b5132
RH
3235{
3236 return (off + align - 1) & ~(align - 1);
3237}
3238
3239/* Assign a file position to a section, optionally aligning to the
3240 required section alignment. */
3241
217aa764
AM
3242file_ptr
3243_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3244 file_ptr offset,
3245 bfd_boolean align)
252b5132 3246{
72de5009
AM
3247 if (align && i_shdrp->sh_addralign > 1)
3248 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3249 i_shdrp->sh_offset = offset;
3250 if (i_shdrp->bfd_section != NULL)
3251 i_shdrp->bfd_section->filepos = offset;
3252 if (i_shdrp->sh_type != SHT_NOBITS)
3253 offset += i_shdrp->sh_size;
3254 return offset;
3255}
3256
3257/* Compute the file positions we are going to put the sections at, and
3258 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3259 is not NULL, this is being called by the ELF backend linker. */
3260
b34976b6 3261bfd_boolean
217aa764
AM
3262_bfd_elf_compute_section_file_positions (bfd *abfd,
3263 struct bfd_link_info *link_info)
252b5132 3264{
9c5bfbb7 3265 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3266 bfd_boolean failed;
4b6c0f2f 3267 struct bfd_strtab_hash *strtab = NULL;
252b5132 3268 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3269 bfd_boolean need_symtab;
252b5132
RH
3270
3271 if (abfd->output_has_begun)
b34976b6 3272 return TRUE;
252b5132
RH
3273
3274 /* Do any elf backend specific processing first. */
3275 if (bed->elf_backend_begin_write_processing)
3276 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3277
3278 if (! prep_headers (abfd))
b34976b6 3279 return FALSE;
252b5132 3280
e6c51ed4
NC
3281 /* Post process the headers if necessary. */
3282 if (bed->elf_backend_post_process_headers)
3283 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3284
b34976b6 3285 failed = FALSE;
252b5132
RH
3286 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3287 if (failed)
b34976b6 3288 return FALSE;
252b5132 3289
da9f89d4 3290 if (!assign_section_numbers (abfd, link_info))
b34976b6 3291 return FALSE;
252b5132
RH
3292
3293 /* The backend linker builds symbol table information itself. */
3516e984
L
3294 need_symtab = (link_info == NULL
3295 && (bfd_get_symcount (abfd) > 0
3296 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3297 == HAS_RELOC)));
3298 if (need_symtab)
252b5132
RH
3299 {
3300 /* Non-zero if doing a relocatable link. */
3301 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3302
3303 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3304 return FALSE;
252b5132
RH
3305 }
3306
1126897b 3307 if (link_info == NULL)
dbb410c3 3308 {
1126897b 3309 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3310 if (failed)
b34976b6 3311 return FALSE;
dbb410c3
AM
3312 }
3313
252b5132
RH
3314 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3315 /* sh_name was set in prep_headers. */
3316 shstrtab_hdr->sh_type = SHT_STRTAB;
3317 shstrtab_hdr->sh_flags = 0;
3318 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3319 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3320 shstrtab_hdr->sh_entsize = 0;
3321 shstrtab_hdr->sh_link = 0;
3322 shstrtab_hdr->sh_info = 0;
3323 /* sh_offset is set in assign_file_positions_except_relocs. */
3324 shstrtab_hdr->sh_addralign = 1;
3325
c84fca4d 3326 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3327 return FALSE;
252b5132 3328
3516e984 3329 if (need_symtab)
252b5132
RH
3330 {
3331 file_ptr off;
3332 Elf_Internal_Shdr *hdr;
3333
3334 off = elf_tdata (abfd)->next_file_pos;
3335
3336 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3337 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3338
9ad5cbcf
AM
3339 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3340 if (hdr->sh_size != 0)
b34976b6 3341 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3342
252b5132 3343 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3344 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3345
3346 elf_tdata (abfd)->next_file_pos = off;
3347
3348 /* Now that we know where the .strtab section goes, write it
08a40648 3349 out. */
252b5132
RH
3350 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3351 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3352 return FALSE;
252b5132
RH
3353 _bfd_stringtab_free (strtab);
3354 }
3355
b34976b6 3356 abfd->output_has_begun = TRUE;
252b5132 3357
b34976b6 3358 return TRUE;
252b5132
RH
3359}
3360
8ded5a0f
AM
3361/* Make an initial estimate of the size of the program header. If we
3362 get the number wrong here, we'll redo section placement. */
3363
3364static bfd_size_type
3365get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3366{
3367 size_t segs;
3368 asection *s;
2b05f1b7 3369 const struct elf_backend_data *bed;
8ded5a0f
AM
3370
3371 /* Assume we will need exactly two PT_LOAD segments: one for text
3372 and one for data. */
3373 segs = 2;
3374
3375 s = bfd_get_section_by_name (abfd, ".interp");
3376 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3377 {
3378 /* If we have a loadable interpreter section, we need a
3379 PT_INTERP segment. In this case, assume we also need a
3380 PT_PHDR segment, although that may not be true for all
3381 targets. */
3382 segs += 2;
3383 }
3384
3385 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3386 {
3387 /* We need a PT_DYNAMIC segment. */
3388 ++segs;
f210dcff 3389 }
08a40648 3390
ceae84aa 3391 if (info != NULL && info->relro)
f210dcff
L
3392 {
3393 /* We need a PT_GNU_RELRO segment. */
3394 ++segs;
8ded5a0f
AM
3395 }
3396
3397 if (elf_tdata (abfd)->eh_frame_hdr)
3398 {
3399 /* We need a PT_GNU_EH_FRAME segment. */
3400 ++segs;
3401 }
3402
2b05f1b7 3403 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3404 {
2b05f1b7
L
3405 /* We need a PT_GNU_STACK segment. */
3406 ++segs;
3407 }
94b11780 3408
2b05f1b7
L
3409 for (s = abfd->sections; s != NULL; s = s->next)
3410 {
8ded5a0f 3411 if ((s->flags & SEC_LOAD) != 0
0112cd26 3412 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3413 {
3414 /* We need a PT_NOTE segment. */
3415 ++segs;
1c5265b5
JJ
3416 /* Try to create just one PT_NOTE segment
3417 for all adjacent loadable .note* sections.
3418 gABI requires that within a PT_NOTE segment
3419 (and also inside of each SHT_NOTE section)
3420 each note is padded to a multiple of 4 size,
3421 so we check whether the sections are correctly
3422 aligned. */
3423 if (s->alignment_power == 2)
3424 while (s->next != NULL
3425 && s->next->alignment_power == 2
3426 && (s->next->flags & SEC_LOAD) != 0
3427 && CONST_STRNEQ (s->next->name, ".note"))
3428 s = s->next;
8ded5a0f
AM
3429 }
3430 }
3431
3432 for (s = abfd->sections; s != NULL; s = s->next)
3433 {
3434 if (s->flags & SEC_THREAD_LOCAL)
3435 {
3436 /* We need a PT_TLS segment. */
3437 ++segs;
3438 break;
3439 }
3440 }
3441
3442 /* Let the backend count up any program headers it might need. */
2b05f1b7 3443 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3444 if (bed->elf_backend_additional_program_headers)
3445 {
3446 int a;
3447
3448 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3449 if (a == -1)
3450 abort ();
3451 segs += a;
3452 }
3453
3454 return segs * bed->s->sizeof_phdr;
3455}
3456
2ea37f1c
NC
3457/* Find the segment that contains the output_section of section. */
3458
3459Elf_Internal_Phdr *
3460_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3461{
3462 struct elf_segment_map *m;
3463 Elf_Internal_Phdr *p;
3464
3465 for (m = elf_tdata (abfd)->segment_map,
3466 p = elf_tdata (abfd)->phdr;
3467 m != NULL;
3468 m = m->next, p++)
3469 {
3470 int i;
3471
3472 for (i = m->count - 1; i >= 0; i--)
3473 if (m->sections[i] == section)
3474 return p;
3475 }
3476
3477 return NULL;
3478}
3479
252b5132
RH
3480/* Create a mapping from a set of sections to a program segment. */
3481
217aa764
AM
3482static struct elf_segment_map *
3483make_mapping (bfd *abfd,
3484 asection **sections,
3485 unsigned int from,
3486 unsigned int to,
3487 bfd_boolean phdr)
252b5132
RH
3488{
3489 struct elf_segment_map *m;
3490 unsigned int i;
3491 asection **hdrpp;
dc810e39 3492 bfd_size_type amt;
252b5132 3493
dc810e39
AM
3494 amt = sizeof (struct elf_segment_map);
3495 amt += (to - from - 1) * sizeof (asection *);
217aa764 3496 m = bfd_zalloc (abfd, amt);
252b5132
RH
3497 if (m == NULL)
3498 return NULL;
3499 m->next = NULL;
3500 m->p_type = PT_LOAD;
3501 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3502 m->sections[i - from] = *hdrpp;
3503 m->count = to - from;
3504
3505 if (from == 0 && phdr)
3506 {
3507 /* Include the headers in the first PT_LOAD segment. */
3508 m->includes_filehdr = 1;
3509 m->includes_phdrs = 1;
3510 }
3511
3512 return m;
3513}
3514
229fcec5
MM
3515/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3516 on failure. */
3517
3518struct elf_segment_map *
3519_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3520{
3521 struct elf_segment_map *m;
3522
3523 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3524 if (m == NULL)
3525 return NULL;
3526 m->next = NULL;
3527 m->p_type = PT_DYNAMIC;
3528 m->count = 1;
3529 m->sections[0] = dynsec;
08a40648 3530
229fcec5
MM
3531 return m;
3532}
3533
8ded5a0f 3534/* Possibly add or remove segments from the segment map. */
252b5132 3535
b34976b6 3536static bfd_boolean
3dea8fca
AM
3537elf_modify_segment_map (bfd *abfd,
3538 struct bfd_link_info *info,
3539 bfd_boolean remove_empty_load)
252b5132 3540{
252e386e 3541 struct elf_segment_map **m;
8ded5a0f 3542 const struct elf_backend_data *bed;
252b5132 3543
8ded5a0f
AM
3544 /* The placement algorithm assumes that non allocated sections are
3545 not in PT_LOAD segments. We ensure this here by removing such
3546 sections from the segment map. We also remove excluded
252e386e
AM
3547 sections. Finally, any PT_LOAD segment without sections is
3548 removed. */
3549 m = &elf_tdata (abfd)->segment_map;
3550 while (*m)
8ded5a0f
AM
3551 {
3552 unsigned int i, new_count;
252b5132 3553
252e386e 3554 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3555 {
252e386e
AM
3556 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3557 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3558 || (*m)->p_type != PT_LOAD))
8ded5a0f 3559 {
252e386e
AM
3560 (*m)->sections[new_count] = (*m)->sections[i];
3561 new_count++;
8ded5a0f
AM
3562 }
3563 }
252e386e 3564 (*m)->count = new_count;
252b5132 3565
3dea8fca 3566 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3567 *m = (*m)->next;
3568 else
3569 m = &(*m)->next;
8ded5a0f 3570 }
252b5132 3571
8ded5a0f
AM
3572 bed = get_elf_backend_data (abfd);
3573 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3574 {
252e386e 3575 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3576 return FALSE;
252b5132 3577 }
252b5132 3578
8ded5a0f
AM
3579 return TRUE;
3580}
252b5132 3581
8ded5a0f 3582/* Set up a mapping from BFD sections to program segments. */
252b5132 3583
8ded5a0f
AM
3584bfd_boolean
3585_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3586{
3587 unsigned int count;
3588 struct elf_segment_map *m;
3589 asection **sections = NULL;
3590 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3591 bfd_boolean no_user_phdrs;
252b5132 3592
3dea8fca
AM
3593 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
3594 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3595 {
8ded5a0f
AM
3596 asection *s;
3597 unsigned int i;
3598 struct elf_segment_map *mfirst;
3599 struct elf_segment_map **pm;
3600 asection *last_hdr;
3601 bfd_vma last_size;
3602 unsigned int phdr_index;
3603 bfd_vma maxpagesize;
3604 asection **hdrpp;
3605 bfd_boolean phdr_in_segment = TRUE;
3606 bfd_boolean writable;
3607 int tls_count = 0;
3608 asection *first_tls = NULL;
3609 asection *dynsec, *eh_frame_hdr;
3610 bfd_size_type amt;
252b5132 3611
8ded5a0f 3612 /* Select the allocated sections, and sort them. */
252b5132 3613
8ded5a0f
AM
3614 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
3615 if (sections == NULL)
252b5132 3616 goto error_return;
252b5132 3617
8ded5a0f
AM
3618 i = 0;
3619 for (s = abfd->sections; s != NULL; s = s->next)
3620 {
3621 if ((s->flags & SEC_ALLOC) != 0)
3622 {
3623 sections[i] = s;
3624 ++i;
3625 }
3626 }
3627 BFD_ASSERT (i <= bfd_count_sections (abfd));
3628 count = i;
252b5132 3629
8ded5a0f 3630 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3631
8ded5a0f 3632 /* Build the mapping. */
252b5132 3633
8ded5a0f
AM
3634 mfirst = NULL;
3635 pm = &mfirst;
252b5132 3636
8ded5a0f
AM
3637 /* If we have a .interp section, then create a PT_PHDR segment for
3638 the program headers and a PT_INTERP segment for the .interp
3639 section. */
3640 s = bfd_get_section_by_name (abfd, ".interp");
3641 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3642 {
3643 amt = sizeof (struct elf_segment_map);
3644 m = bfd_zalloc (abfd, amt);
3645 if (m == NULL)
3646 goto error_return;
3647 m->next = NULL;
3648 m->p_type = PT_PHDR;
3649 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3650 m->p_flags = PF_R | PF_X;
3651 m->p_flags_valid = 1;
3652 m->includes_phdrs = 1;
252b5132 3653
8ded5a0f
AM
3654 *pm = m;
3655 pm = &m->next;
252b5132 3656
8ded5a0f
AM
3657 amt = sizeof (struct elf_segment_map);
3658 m = bfd_zalloc (abfd, amt);
3659 if (m == NULL)
3660 goto error_return;
3661 m->next = NULL;
3662 m->p_type = PT_INTERP;
3663 m->count = 1;
3664 m->sections[0] = s;
3665
3666 *pm = m;
3667 pm = &m->next;
252b5132 3668 }
8ded5a0f
AM
3669
3670 /* Look through the sections. We put sections in the same program
3671 segment when the start of the second section can be placed within
3672 a few bytes of the end of the first section. */
3673 last_hdr = NULL;
3674 last_size = 0;
3675 phdr_index = 0;
3676 maxpagesize = bed->maxpagesize;
3677 writable = FALSE;
3678 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3679 if (dynsec != NULL
3680 && (dynsec->flags & SEC_LOAD) == 0)
3681 dynsec = NULL;
3682
3683 /* Deal with -Ttext or something similar such that the first section
3684 is not adjacent to the program headers. This is an
3685 approximation, since at this point we don't know exactly how many
3686 program headers we will need. */
3687 if (count > 0)
252b5132 3688 {
8ded5a0f
AM
3689 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3690
62d7a5f6 3691 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3692 phdr_size = get_program_header_size (abfd, info);
3693 if ((abfd->flags & D_PAGED) == 0
3694 || sections[0]->lma < phdr_size
3695 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
3696 phdr_in_segment = FALSE;
252b5132
RH
3697 }
3698
8ded5a0f 3699 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3700 {
8ded5a0f
AM
3701 asection *hdr;
3702 bfd_boolean new_segment;
3703
3704 hdr = *hdrpp;
3705
3706 /* See if this section and the last one will fit in the same
3707 segment. */
3708
3709 if (last_hdr == NULL)
3710 {
3711 /* If we don't have a segment yet, then we don't need a new
3712 one (we build the last one after this loop). */
3713 new_segment = FALSE;
3714 }
3715 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3716 {
3717 /* If this section has a different relation between the
3718 virtual address and the load address, then we need a new
3719 segment. */
3720 new_segment = TRUE;
3721 }
39948a60
NC
3722 /* In the next test we have to be careful when last_hdr->lma is close
3723 to the end of the address space. If the aligned address wraps
3724 around to the start of the address space, then there are no more
3725 pages left in memory and it is OK to assume that the current
3726 section can be included in the current segment. */
3727 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3728 > last_hdr->lma)
3729 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3730 <= hdr->lma))
8ded5a0f
AM
3731 {
3732 /* If putting this section in this segment would force us to
3733 skip a page in the segment, then we need a new segment. */
3734 new_segment = TRUE;
3735 }
3736 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3737 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3738 {
3739 /* We don't want to put a loadable section after a
3740 nonloadable section in the same segment.
3741 Consider .tbss sections as loadable for this purpose. */
3742 new_segment = TRUE;
3743 }
3744 else if ((abfd->flags & D_PAGED) == 0)
3745 {
3746 /* If the file is not demand paged, which means that we
3747 don't require the sections to be correctly aligned in the
3748 file, then there is no other reason for a new segment. */
3749 new_segment = FALSE;
3750 }
3751 else if (! writable
3752 && (hdr->flags & SEC_READONLY) == 0
3753 && (((last_hdr->lma + last_size - 1)
3754 & ~(maxpagesize - 1))
3755 != (hdr->lma & ~(maxpagesize - 1))))
3756 {
3757 /* We don't want to put a writable section in a read only
3758 segment, unless they are on the same page in memory
3759 anyhow. We already know that the last section does not
3760 bring us past the current section on the page, so the
3761 only case in which the new section is not on the same
3762 page as the previous section is when the previous section
3763 ends precisely on a page boundary. */
3764 new_segment = TRUE;
3765 }
3766 else
3767 {
3768 /* Otherwise, we can use the same segment. */
3769 new_segment = FALSE;
3770 }
3771
2889e75b 3772 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3773 if (last_hdr != NULL
3774 && info != NULL
3775 && info->callbacks->override_segment_assignment != NULL)
3776 new_segment
3777 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3778 last_hdr,
3779 new_segment);
2889e75b 3780
8ded5a0f
AM
3781 if (! new_segment)
3782 {
3783 if ((hdr->flags & SEC_READONLY) == 0)
3784 writable = TRUE;
3785 last_hdr = hdr;
3786 /* .tbss sections effectively have zero size. */
3787 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3788 != SEC_THREAD_LOCAL)
3789 last_size = hdr->size;
3790 else
3791 last_size = 0;
3792 continue;
3793 }
3794
3795 /* We need a new program segment. We must create a new program
3796 header holding all the sections from phdr_index until hdr. */
3797
3798 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3799 if (m == NULL)
3800 goto error_return;
3801
3802 *pm = m;
3803 pm = &m->next;
3804
252b5132 3805 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3806 writable = TRUE;
8ded5a0f
AM
3807 else
3808 writable = FALSE;
3809
baaff79e
JJ
3810 last_hdr = hdr;
3811 /* .tbss sections effectively have zero size. */
e5caec89 3812 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3813 last_size = hdr->size;
baaff79e
JJ
3814 else
3815 last_size = 0;
8ded5a0f
AM
3816 phdr_index = i;
3817 phdr_in_segment = FALSE;
252b5132
RH
3818 }
3819
8ded5a0f
AM
3820 /* Create a final PT_LOAD program segment. */
3821 if (last_hdr != NULL)
3822 {
3823 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3824 if (m == NULL)
3825 goto error_return;
252b5132 3826
8ded5a0f
AM
3827 *pm = m;
3828 pm = &m->next;
3829 }
252b5132 3830
8ded5a0f
AM
3831 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3832 if (dynsec != NULL)
3833 {
3834 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
3835 if (m == NULL)
3836 goto error_return;
3837 *pm = m;
3838 pm = &m->next;
3839 }
252b5132 3840
1c5265b5
JJ
3841 /* For each batch of consecutive loadable .note sections,
3842 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
3843 because if we link together nonloadable .note sections and
3844 loadable .note sections, we will generate two .note sections
3845 in the output file. FIXME: Using names for section types is
3846 bogus anyhow. */
8ded5a0f
AM
3847 for (s = abfd->sections; s != NULL; s = s->next)
3848 {
3849 if ((s->flags & SEC_LOAD) != 0
0112cd26 3850 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 3851 {
1c5265b5
JJ
3852 asection *s2;
3853 unsigned count = 1;
8ded5a0f 3854 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
3855 if (s->alignment_power == 2)
3856 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
3857 {
3858 if (s2->next->alignment_power == 2
3859 && (s2->next->flags & SEC_LOAD) != 0
3860 && CONST_STRNEQ (s2->next->name, ".note")
3861 && align_power (s2->vma + s2->size, 2)
3862 == s2->next->vma)
3863 count++;
3864 else
3865 break;
3866 }
1c5265b5 3867 amt += (count - 1) * sizeof (asection *);
8ded5a0f
AM
3868 m = bfd_zalloc (abfd, amt);
3869 if (m == NULL)
3870 goto error_return;
3871 m->next = NULL;
3872 m->p_type = PT_NOTE;
1c5265b5
JJ
3873 m->count = count;
3874 while (count > 1)
3875 {
3876 m->sections[m->count - count--] = s;
3877 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
3878 s = s->next;
3879 }
3880 m->sections[m->count - 1] = s;
3881 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
3882 *pm = m;
3883 pm = &m->next;
3884 }
3885 if (s->flags & SEC_THREAD_LOCAL)
3886 {
3887 if (! tls_count)
3888 first_tls = s;
3889 tls_count++;
3890 }
3891 }
252b5132 3892
8ded5a0f
AM
3893 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3894 if (tls_count > 0)
3895 {
3896 int i;
252b5132 3897
8ded5a0f
AM
3898 amt = sizeof (struct elf_segment_map);
3899 amt += (tls_count - 1) * sizeof (asection *);
3900 m = bfd_zalloc (abfd, amt);
3901 if (m == NULL)
3902 goto error_return;
3903 m->next = NULL;
3904 m->p_type = PT_TLS;
3905 m->count = tls_count;
3906 /* Mandated PF_R. */
3907 m->p_flags = PF_R;
3908 m->p_flags_valid = 1;
3909 for (i = 0; i < tls_count; ++i)
3910 {
3911 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3912 m->sections[i] = first_tls;
3913 first_tls = first_tls->next;
3914 }
252b5132 3915
8ded5a0f
AM
3916 *pm = m;
3917 pm = &m->next;
3918 }
252b5132 3919
8ded5a0f
AM
3920 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3921 segment. */
3922 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3923 if (eh_frame_hdr != NULL
3924 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 3925 {
dc810e39 3926 amt = sizeof (struct elf_segment_map);
217aa764 3927 m = bfd_zalloc (abfd, amt);
252b5132
RH
3928 if (m == NULL)
3929 goto error_return;
3930 m->next = NULL;
8ded5a0f 3931 m->p_type = PT_GNU_EH_FRAME;
252b5132 3932 m->count = 1;
8ded5a0f 3933 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
3934
3935 *pm = m;
3936 pm = &m->next;
3937 }
13ae64f3 3938
8ded5a0f 3939 if (elf_tdata (abfd)->stack_flags)
13ae64f3 3940 {
8ded5a0f
AM
3941 amt = sizeof (struct elf_segment_map);
3942 m = bfd_zalloc (abfd, amt);
3943 if (m == NULL)
3944 goto error_return;
3945 m->next = NULL;
2b05f1b7 3946 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
3947 m->p_flags = elf_tdata (abfd)->stack_flags;
3948 m->p_flags_valid = 1;
252b5132 3949
8ded5a0f
AM
3950 *pm = m;
3951 pm = &m->next;
3952 }
65765700 3953
ceae84aa 3954 if (info != NULL && info->relro)
8ded5a0f 3955 {
f210dcff
L
3956 for (m = mfirst; m != NULL; m = m->next)
3957 {
3958 if (m->p_type == PT_LOAD)
3959 {
3960 asection *last = m->sections[m->count - 1];
3961 bfd_vma vaddr = m->sections[0]->vma;
3962 bfd_vma filesz = last->vma - vaddr + last->size;
65765700 3963
f210dcff
L
3964 if (vaddr < info->relro_end
3965 && vaddr >= info->relro_start
3966 && (vaddr + filesz) >= info->relro_end)
3967 break;
3968 }
3969 }
3970
3971 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
3972 if (m != NULL)
3973 {
3974 amt = sizeof (struct elf_segment_map);
3975 m = bfd_zalloc (abfd, amt);
3976 if (m == NULL)
3977 goto error_return;
3978 m->next = NULL;
3979 m->p_type = PT_GNU_RELRO;
3980 m->p_flags = PF_R;
3981 m->p_flags_valid = 1;
3982
3983 *pm = m;
3984 pm = &m->next;
3985 }
8ded5a0f 3986 }
9ee5e499 3987
8ded5a0f
AM
3988 free (sections);
3989 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
3990 }
3991
3dea8fca 3992 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 3993 return FALSE;
8c37241b 3994
8ded5a0f
AM
3995 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
3996 ++count;
3997 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 3998
b34976b6 3999 return TRUE;
252b5132
RH
4000
4001 error_return:
4002 if (sections != NULL)
4003 free (sections);
b34976b6 4004 return FALSE;
252b5132
RH
4005}
4006
4007/* Sort sections by address. */
4008
4009static int
217aa764 4010elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4011{
4012 const asection *sec1 = *(const asection **) arg1;
4013 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4014 bfd_size_type size1, size2;
252b5132
RH
4015
4016 /* Sort by LMA first, since this is the address used to
4017 place the section into a segment. */
4018 if (sec1->lma < sec2->lma)
4019 return -1;
4020 else if (sec1->lma > sec2->lma)
4021 return 1;
4022
4023 /* Then sort by VMA. Normally the LMA and the VMA will be
4024 the same, and this will do nothing. */
4025 if (sec1->vma < sec2->vma)
4026 return -1;
4027 else if (sec1->vma > sec2->vma)
4028 return 1;
4029
4030 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4031
07c6e936 4032#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4033
4034 if (TOEND (sec1))
4035 {
4036 if (TOEND (sec2))
00a7cdc5
NC
4037 {
4038 /* If the indicies are the same, do not return 0
4039 here, but continue to try the next comparison. */
4040 if (sec1->target_index - sec2->target_index != 0)
4041 return sec1->target_index - sec2->target_index;
4042 }
252b5132
RH
4043 else
4044 return 1;
4045 }
00a7cdc5 4046 else if (TOEND (sec2))
252b5132
RH
4047 return -1;
4048
4049#undef TOEND
4050
00a7cdc5
NC
4051 /* Sort by size, to put zero sized sections
4052 before others at the same address. */
252b5132 4053
eea6121a
AM
4054 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4055 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4056
4057 if (size1 < size2)
252b5132 4058 return -1;
eecdbe52 4059 if (size1 > size2)
252b5132
RH
4060 return 1;
4061
4062 return sec1->target_index - sec2->target_index;
4063}
4064
340b6d91
AC
4065/* Ian Lance Taylor writes:
4066
4067 We shouldn't be using % with a negative signed number. That's just
4068 not good. We have to make sure either that the number is not
4069 negative, or that the number has an unsigned type. When the types
4070 are all the same size they wind up as unsigned. When file_ptr is a
4071 larger signed type, the arithmetic winds up as signed long long,
4072 which is wrong.
4073
4074 What we're trying to say here is something like ``increase OFF by
4075 the least amount that will cause it to be equal to the VMA modulo
4076 the page size.'' */
4077/* In other words, something like:
4078
4079 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4080 off_offset = off % bed->maxpagesize;
4081 if (vma_offset < off_offset)
4082 adjustment = vma_offset + bed->maxpagesize - off_offset;
4083 else
4084 adjustment = vma_offset - off_offset;
08a40648 4085
340b6d91
AC
4086 which can can be collapsed into the expression below. */
4087
4088static file_ptr
4089vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4090{
4091 return ((vma - off) % maxpagesize);
4092}
4093
6d33f217
L
4094static void
4095print_segment_map (const struct elf_segment_map *m)
4096{
4097 unsigned int j;
4098 const char *pt = get_segment_type (m->p_type);
4099 char buf[32];
4100
4101 if (pt == NULL)
4102 {
4103 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4104 sprintf (buf, "LOPROC+%7.7x",
4105 (unsigned int) (m->p_type - PT_LOPROC));
4106 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4107 sprintf (buf, "LOOS+%7.7x",
4108 (unsigned int) (m->p_type - PT_LOOS));
4109 else
4110 snprintf (buf, sizeof (buf), "%8.8x",
4111 (unsigned int) m->p_type);
4112 pt = buf;
4113 }
4114 fprintf (stderr, "%s:", pt);
4115 for (j = 0; j < m->count; j++)
4116 fprintf (stderr, " %s", m->sections [j]->name);
4117 putc ('\n',stderr);
4118}
4119
252b5132
RH
4120/* Assign file positions to the sections based on the mapping from
4121 sections to segments. This function also sets up some fields in
f3520d2f 4122 the file header. */
252b5132 4123
b34976b6 4124static bfd_boolean
f3520d2f
AM
4125assign_file_positions_for_load_sections (bfd *abfd,
4126 struct bfd_link_info *link_info)
252b5132
RH
4127{
4128 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4129 struct elf_segment_map *m;
252b5132 4130 Elf_Internal_Phdr *phdrs;
252b5132 4131 Elf_Internal_Phdr *p;
02bf8d82 4132 file_ptr off;
3f570048 4133 bfd_size_type maxpagesize;
f3520d2f 4134 unsigned int alloc;
0920dee7 4135 unsigned int i, j;
2b0bc088 4136 bfd_vma header_pad = 0;
252b5132 4137
e36284ab 4138 if (link_info == NULL
ceae84aa 4139 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4140 return FALSE;
252b5132 4141
8ded5a0f 4142 alloc = 0;
252b5132 4143 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2b0bc088
NC
4144 {
4145 ++alloc;
4146 if (m->header_size)
4147 header_pad = m->header_size;
4148 }
252b5132
RH
4149
4150 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4151 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4152 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4153
62d7a5f6 4154 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4155 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4156 else
4157 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4158 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4159
4160 if (alloc == 0)
f3520d2f 4161 {
8ded5a0f
AM
4162 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4163 return TRUE;
f3520d2f 4164 }
252b5132 4165
57268894
HPN
4166 /* We're writing the size in elf_tdata (abfd)->program_header_size,
4167 see assign_file_positions_except_relocs, so make sure we have
4168 that amount allocated, with trailing space cleared.
4169 The variable alloc contains the computed need, while elf_tdata
4170 (abfd)->program_header_size contains the size used for the
4171 layout.
4172 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4173 where the layout is forced to according to a larger size in the
4174 last iterations for the testcase ld-elf/header. */
4175 BFD_ASSERT (elf_tdata (abfd)->program_header_size % bed->s->sizeof_phdr
4176 == 0);
4177 phdrs = bfd_zalloc2 (abfd,
4178 (elf_tdata (abfd)->program_header_size
4179 / bed->s->sizeof_phdr),
4180 sizeof (Elf_Internal_Phdr));
f3520d2f 4181 elf_tdata (abfd)->phdr = phdrs;
252b5132 4182 if (phdrs == NULL)
b34976b6 4183 return FALSE;
252b5132 4184
3f570048
AM
4185 maxpagesize = 1;
4186 if ((abfd->flags & D_PAGED) != 0)
4187 maxpagesize = bed->maxpagesize;
4188
252b5132
RH
4189 off = bed->s->sizeof_ehdr;
4190 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4191 if (header_pad < (bfd_vma) off)
4192 header_pad = 0;
4193 else
4194 header_pad -= off;
4195 off += header_pad;
252b5132 4196
0920dee7 4197 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4198 m != NULL;
0920dee7 4199 m = m->next, p++, j++)
252b5132 4200 {
252b5132 4201 asection **secpp;
bf988460
AM
4202 bfd_vma off_adjust;
4203 bfd_boolean no_contents;
252b5132
RH
4204
4205 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4206 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4207 not be done to the PT_NOTE section of a corefile, which may
4208 contain several pseudo-sections artificially created by bfd.
4209 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4210 if (m->count > 1
4211 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4212 && m->p_type == PT_NOTE))
252b5132
RH
4213 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4214 elf_sort_sections);
4215
b301b248
AM
4216 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4217 number of sections with contents contributing to both p_filesz
4218 and p_memsz, followed by a number of sections with no contents
4219 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4220 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4221 p->p_type = m->p_type;
28a7f3e7 4222 p->p_flags = m->p_flags;
252b5132 4223
3f570048
AM
4224 if (m->count == 0)
4225 p->p_vaddr = 0;
4226 else
3271a814 4227 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4228
4229 if (m->p_paddr_valid)
4230 p->p_paddr = m->p_paddr;
4231 else if (m->count == 0)
4232 p->p_paddr = 0;
4233 else
08a40648 4234 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4235
4236 if (p->p_type == PT_LOAD
4237 && (abfd->flags & D_PAGED) != 0)
4238 {
4239 /* p_align in demand paged PT_LOAD segments effectively stores
4240 the maximum page size. When copying an executable with
4241 objcopy, we set m->p_align from the input file. Use this
4242 value for maxpagesize rather than bed->maxpagesize, which
4243 may be different. Note that we use maxpagesize for PT_TLS
4244 segment alignment later in this function, so we are relying
4245 on at least one PT_LOAD segment appearing before a PT_TLS
4246 segment. */
4247 if (m->p_align_valid)
4248 maxpagesize = m->p_align;
4249
4250 p->p_align = maxpagesize;
4251 }
3271a814
NS
4252 else if (m->p_align_valid)
4253 p->p_align = m->p_align;
e970b90a
DJ
4254 else if (m->count == 0)
4255 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4256 else
4257 p->p_align = 0;
4258
bf988460
AM
4259 no_contents = FALSE;
4260 off_adjust = 0;
252b5132 4261 if (p->p_type == PT_LOAD
b301b248 4262 && m->count > 0)
252b5132 4263 {
b301b248 4264 bfd_size_type align;
a49e53ed 4265 unsigned int align_power = 0;
b301b248 4266
3271a814
NS
4267 if (m->p_align_valid)
4268 align = p->p_align;
4269 else
252b5132 4270 {
3271a814
NS
4271 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4272 {
4273 unsigned int secalign;
08a40648 4274
3271a814
NS
4275 secalign = bfd_get_section_alignment (abfd, *secpp);
4276 if (secalign > align_power)
4277 align_power = secalign;
4278 }
4279 align = (bfd_size_type) 1 << align_power;
4280 if (align < maxpagesize)
4281 align = maxpagesize;
b301b248 4282 }
252b5132 4283
02bf8d82
AM
4284 for (i = 0; i < m->count; i++)
4285 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4286 /* If we aren't making room for this section, then
4287 it must be SHT_NOBITS regardless of what we've
4288 set via struct bfd_elf_special_section. */
4289 elf_section_type (m->sections[i]) = SHT_NOBITS;
4290
bf988460 4291 /* Find out whether this segment contains any loadable
aea274d3
AM
4292 sections. */
4293 no_contents = TRUE;
4294 for (i = 0; i < m->count; i++)
4295 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4296 {
4297 no_contents = FALSE;
4298 break;
4299 }
bf988460
AM
4300
4301 off_adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4302 off += off_adjust;
4303 if (no_contents)
4304 {
4305 /* We shouldn't need to align the segment on disk since
4306 the segment doesn't need file space, but the gABI
4307 arguably requires the alignment and glibc ld.so
4308 checks it. So to comply with the alignment
4309 requirement but not waste file space, we adjust
4310 p_offset for just this segment. (OFF_ADJUST is
4311 subtracted from OFF later.) This may put p_offset
4312 past the end of file, but that shouldn't matter. */
4313 }
4314 else
4315 off_adjust = 0;
252b5132 4316 }
b1a6d0b1
NC
4317 /* Make sure the .dynamic section is the first section in the
4318 PT_DYNAMIC segment. */
4319 else if (p->p_type == PT_DYNAMIC
4320 && m->count > 1
4321 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4322 {
4323 _bfd_error_handler
b301b248
AM
4324 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4325 abfd);
b1a6d0b1
NC
4326 bfd_set_error (bfd_error_bad_value);
4327 return FALSE;
4328 }
3f001e84
JK
4329 /* Set the note section type to SHT_NOTE. */
4330 else if (p->p_type == PT_NOTE)
4331 for (i = 0; i < m->count; i++)
4332 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4333
252b5132
RH
4334 p->p_offset = 0;
4335 p->p_filesz = 0;
4336 p->p_memsz = 0;
4337
4338 if (m->includes_filehdr)
4339 {
bf988460 4340 if (!m->p_flags_valid)
252b5132 4341 p->p_flags |= PF_R;
252b5132
RH
4342 p->p_filesz = bed->s->sizeof_ehdr;
4343 p->p_memsz = bed->s->sizeof_ehdr;
4344 if (m->count > 0)
4345 {
4346 BFD_ASSERT (p->p_type == PT_LOAD);
4347
4348 if (p->p_vaddr < (bfd_vma) off)
4349 {
caf47ea6 4350 (*_bfd_error_handler)
b301b248
AM
4351 (_("%B: Not enough room for program headers, try linking with -N"),
4352 abfd);
252b5132 4353 bfd_set_error (bfd_error_bad_value);
b34976b6 4354 return FALSE;
252b5132
RH
4355 }
4356
4357 p->p_vaddr -= off;
bf988460 4358 if (!m->p_paddr_valid)
252b5132
RH
4359 p->p_paddr -= off;
4360 }
252b5132
RH
4361 }
4362
4363 if (m->includes_phdrs)
4364 {
bf988460 4365 if (!m->p_flags_valid)
252b5132
RH
4366 p->p_flags |= PF_R;
4367
f3520d2f 4368 if (!m->includes_filehdr)
252b5132
RH
4369 {
4370 p->p_offset = bed->s->sizeof_ehdr;
4371
4372 if (m->count > 0)
4373 {
4374 BFD_ASSERT (p->p_type == PT_LOAD);
4375 p->p_vaddr -= off - p->p_offset;
bf988460 4376 if (!m->p_paddr_valid)
252b5132
RH
4377 p->p_paddr -= off - p->p_offset;
4378 }
252b5132
RH
4379 }
4380
4381 p->p_filesz += alloc * bed->s->sizeof_phdr;
4382 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4383 if (m->count)
4384 {
4385 p->p_filesz += header_pad;
4386 p->p_memsz += header_pad;
4387 }
252b5132
RH
4388 }
4389
4390 if (p->p_type == PT_LOAD
4391 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4392 {
bf988460 4393 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4394 p->p_offset = off;
252b5132
RH
4395 else
4396 {
4397 file_ptr adjust;
4398
4399 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4400 if (!no_contents)
4401 p->p_filesz += adjust;
252b5132
RH
4402 p->p_memsz += adjust;
4403 }
4404 }
4405
1ea63fd2
AM
4406 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4407 maps. Set filepos for sections in PT_LOAD segments, and in
4408 core files, for sections in PT_NOTE segments.
4409 assign_file_positions_for_non_load_sections will set filepos
4410 for other sections and update p_filesz for other segments. */
252b5132
RH
4411 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4412 {
4413 asection *sec;
252b5132 4414 bfd_size_type align;
627b32bc 4415 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4416
4417 sec = *secpp;
02bf8d82 4418 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4419 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4420
88967714
AM
4421 if ((p->p_type == PT_LOAD
4422 || p->p_type == PT_TLS)
4423 && (this_hdr->sh_type != SHT_NOBITS
4424 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4425 && ((this_hdr->sh_flags & SHF_TLS) == 0
4426 || p->p_type == PT_TLS))))
252b5132 4427 {
11701589 4428 bfd_signed_vma adjust = sec->vma - (p->p_vaddr + p->p_memsz);
252b5132 4429
88967714 4430 if (adjust < 0)
252b5132 4431 {
88967714 4432 (*_bfd_error_handler)
11701589 4433 (_("%B: section %A vma 0x%lx overlaps previous sections"),
37c43c55 4434 abfd, sec, (unsigned long) sec->vma);
88967714
AM
4435 adjust = 0;
4436 }
4437 p->p_memsz += adjust;
0e922b77 4438
88967714
AM
4439 if (this_hdr->sh_type != SHT_NOBITS)
4440 {
4441 off += adjust;
4442 p->p_filesz += adjust;
252b5132 4443 }
252b5132
RH
4444 }
4445
4446 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4447 {
b301b248
AM
4448 /* The section at i == 0 is the one that actually contains
4449 everything. */
4a938328
MS
4450 if (i == 0)
4451 {
627b32bc 4452 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4453 off += this_hdr->sh_size;
4454 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4455 p->p_memsz = 0;
4456 p->p_align = 1;
252b5132 4457 }
4a938328 4458 else
252b5132 4459 {
b301b248 4460 /* The rest are fake sections that shouldn't be written. */
252b5132 4461 sec->filepos = 0;
eea6121a 4462 sec->size = 0;
b301b248
AM
4463 sec->flags = 0;
4464 continue;
252b5132 4465 }
252b5132
RH
4466 }
4467 else
4468 {
b301b248
AM
4469 if (p->p_type == PT_LOAD)
4470 {
02bf8d82
AM
4471 this_hdr->sh_offset = sec->filepos = off;
4472 if (this_hdr->sh_type != SHT_NOBITS)
6a3cd2b4 4473 off += this_hdr->sh_size;
b301b248 4474 }
252b5132 4475
02bf8d82 4476 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4477 {
6a3cd2b4 4478 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4479 /* A load section without SHF_ALLOC is something like
4480 a note section in a PT_NOTE segment. These take
4481 file space but are not loaded into memory. */
4482 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4483 p->p_memsz += this_hdr->sh_size;
b301b248 4484 }
6a3cd2b4 4485 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4486 {
6a3cd2b4
AM
4487 if (p->p_type == PT_TLS)
4488 p->p_memsz += this_hdr->sh_size;
4489
4490 /* .tbss is special. It doesn't contribute to p_memsz of
4491 normal segments. */
4492 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4493 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4494 }
4495
b10a8ae0
L
4496 if (align > p->p_align
4497 && !m->p_align_valid
4498 && (p->p_type != PT_LOAD
4499 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4500 p->p_align = align;
4501 }
4502
bf988460 4503 if (!m->p_flags_valid)
252b5132
RH
4504 {
4505 p->p_flags |= PF_R;
02bf8d82 4506 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4507 p->p_flags |= PF_X;
02bf8d82 4508 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4509 p->p_flags |= PF_W;
4510 }
4511 }
bf988460 4512 off -= off_adjust;
0920dee7 4513
7c928300
AM
4514 /* Check that all sections are in a PT_LOAD segment.
4515 Don't check funky gdb generated core files. */
4516 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
0920dee7
L
4517 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4518 {
4519 Elf_Internal_Shdr *this_hdr;
4520 asection *sec;
4521
4522 sec = *secpp;
4523 this_hdr = &(elf_section_data(sec)->this_hdr);
4524 if (this_hdr->sh_size != 0
4525 && !ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, p))
4526 {
4527 (*_bfd_error_handler)
4528 (_("%B: section `%A' can't be allocated in segment %d"),
4529 abfd, sec, j);
6d33f217 4530 print_segment_map (m);
0920dee7
L
4531 bfd_set_error (bfd_error_bad_value);
4532 return FALSE;
4533 }
4534 }
252b5132
RH
4535 }
4536
f3520d2f
AM
4537 elf_tdata (abfd)->next_file_pos = off;
4538 return TRUE;
4539}
4540
4541/* Assign file positions for the other sections. */
4542
4543static bfd_boolean
4544assign_file_positions_for_non_load_sections (bfd *abfd,
4545 struct bfd_link_info *link_info)
4546{
4547 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4548 Elf_Internal_Shdr **i_shdrpp;
4549 Elf_Internal_Shdr **hdrpp;
4550 Elf_Internal_Phdr *phdrs;
4551 Elf_Internal_Phdr *p;
4552 struct elf_segment_map *m;
4553 bfd_vma filehdr_vaddr, filehdr_paddr;
4554 bfd_vma phdrs_vaddr, phdrs_paddr;
4555 file_ptr off;
4556 unsigned int num_sec;
4557 unsigned int i;
4558 unsigned int count;
4559
5c182d5f
AM
4560 i_shdrpp = elf_elfsections (abfd);
4561 num_sec = elf_numsections (abfd);
f3520d2f 4562 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4563 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4564 {
4565 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4566 Elf_Internal_Shdr *hdr;
4567
4568 hdr = *hdrpp;
4569 if (hdr->bfd_section != NULL
252e386e
AM
4570 && (hdr->bfd_section->filepos != 0
4571 || (hdr->sh_type == SHT_NOBITS
4572 && hdr->contents == NULL)))
627b32bc 4573 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4574 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4575 {
49c13adb
L
4576 if (hdr->sh_size != 0)
4577 ((*_bfd_error_handler)
4578 (_("%B: warning: allocated section `%s' not in segment"),
3ba71138
L
4579 abfd,
4580 (hdr->bfd_section == NULL
4581 ? "*unknown*"
4582 : hdr->bfd_section->name)));
4583 /* We don't need to page align empty sections. */
4584 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4585 off += vma_page_aligned_bias (hdr->sh_addr, off,
4586 bed->maxpagesize);
4587 else
4588 off += vma_page_aligned_bias (hdr->sh_addr, off,
4589 hdr->sh_addralign);
4590 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4591 FALSE);
4592 }
4593 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4594 && hdr->bfd_section == NULL)
4595 || hdr == i_shdrpp[tdata->symtab_section]
4596 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4597 || hdr == i_shdrpp[tdata->strtab_section])
4598 hdr->sh_offset = -1;
4599 else
4600 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4601 }
4602
252b5132
RH
4603 /* Now that we have set the section file positions, we can set up
4604 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4605 count = 0;
4606 filehdr_vaddr = 0;
4607 filehdr_paddr = 0;
4608 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4609 phdrs_paddr = 0;
4610 phdrs = elf_tdata (abfd)->phdr;
4611 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4612 m != NULL;
4613 m = m->next, p++)
4614 {
4615 ++count;
4616 if (p->p_type != PT_LOAD)
4617 continue;
4618
4619 if (m->includes_filehdr)
4620 {
4621 filehdr_vaddr = p->p_vaddr;
4622 filehdr_paddr = p->p_paddr;
4623 }
4624 if (m->includes_phdrs)
4625 {
4626 phdrs_vaddr = p->p_vaddr;
4627 phdrs_paddr = p->p_paddr;
4628 if (m->includes_filehdr)
4629 {
4630 phdrs_vaddr += bed->s->sizeof_ehdr;
4631 phdrs_paddr += bed->s->sizeof_ehdr;
4632 }
4633 }
4634 }
4635
252b5132
RH
4636 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4637 m != NULL;
4638 m = m->next, p++)
4639 {
129af99f 4640 if (p->p_type == PT_GNU_RELRO)
252b5132 4641 {
b84a33b5
AM
4642 const Elf_Internal_Phdr *lp;
4643
129af99f 4644 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
1ea63fd2 4645
129af99f 4646 if (link_info != NULL)
8c37241b 4647 {
129af99f
AS
4648 /* During linking the range of the RELRO segment is passed
4649 in link_info. */
8c37241b
JJ
4650 for (lp = phdrs; lp < phdrs + count; ++lp)
4651 {
4652 if (lp->p_type == PT_LOAD
8c37241b 4653 && lp->p_vaddr >= link_info->relro_start
b84a33b5
AM
4654 && lp->p_vaddr < link_info->relro_end
4655 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end)
8c37241b
JJ
4656 break;
4657 }
8c37241b 4658 }
129af99f
AS
4659 else
4660 {
4661 /* Otherwise we are copying an executable or shared
b84a33b5 4662 library, but we need to use the same linker logic. */
129af99f
AS
4663 for (lp = phdrs; lp < phdrs + count; ++lp)
4664 {
4665 if (lp->p_type == PT_LOAD
4666 && lp->p_paddr == p->p_paddr)
4667 break;
4668 }
b84a33b5
AM
4669 }
4670
4671 if (lp < phdrs + count)
4672 {
4673 p->p_vaddr = lp->p_vaddr;
4674 p->p_paddr = lp->p_paddr;
4675 p->p_offset = lp->p_offset;
4676 if (link_info != NULL)
4677 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4678 else if (m->p_size_valid)
4679 p->p_filesz = m->p_size;
129af99f
AS
4680 else
4681 abort ();
b84a33b5
AM
4682 p->p_memsz = p->p_filesz;
4683 p->p_align = 1;
4684 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 4685 }
9433b9b1 4686 else
b84a33b5
AM
4687 {
4688 memset (p, 0, sizeof *p);
4689 p->p_type = PT_NULL;
4690 }
129af99f
AS
4691 }
4692 else if (m->count != 0)
4693 {
4694 if (p->p_type != PT_LOAD
4695 && (p->p_type != PT_NOTE
4696 || bfd_get_format (abfd) != bfd_core))
4697 {
4698 Elf_Internal_Shdr *hdr;
4699 asection *sect;
4700
4701 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4702
4703 sect = m->sections[m->count - 1];
4704 hdr = &elf_section_data (sect)->this_hdr;
4705 p->p_filesz = sect->filepos - m->sections[0]->filepos;
4706 if (hdr->sh_type != SHT_NOBITS)
4707 p->p_filesz += hdr->sh_size;
4708 p->p_offset = m->sections[0]->filepos;
4709 }
4710 }
4711 else if (m->includes_filehdr)
4712 {
4713 p->p_vaddr = filehdr_vaddr;
4714 if (! m->p_paddr_valid)
4715 p->p_paddr = filehdr_paddr;
4716 }
4717 else if (m->includes_phdrs)
4718 {
4719 p->p_vaddr = phdrs_vaddr;
4720 if (! m->p_paddr_valid)
4721 p->p_paddr = phdrs_paddr;
252b5132
RH
4722 }
4723 }
4724
252b5132
RH
4725 elf_tdata (abfd)->next_file_pos = off;
4726
b34976b6 4727 return TRUE;
252b5132
RH
4728}
4729
252b5132
RH
4730/* Work out the file positions of all the sections. This is called by
4731 _bfd_elf_compute_section_file_positions. All the section sizes and
4732 VMAs must be known before this is called.
4733
e0638f70
AM
4734 Reloc sections come in two flavours: Those processed specially as
4735 "side-channel" data attached to a section to which they apply, and
4736 those that bfd doesn't process as relocations. The latter sort are
4737 stored in a normal bfd section by bfd_section_from_shdr. We don't
4738 consider the former sort here, unless they form part of the loadable
4739 image. Reloc sections not assigned here will be handled later by
4740 assign_file_positions_for_relocs.
252b5132
RH
4741
4742 We also don't set the positions of the .symtab and .strtab here. */
4743
b34976b6 4744static bfd_boolean
c84fca4d
AO
4745assign_file_positions_except_relocs (bfd *abfd,
4746 struct bfd_link_info *link_info)
252b5132 4747{
5c182d5f
AM
4748 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4749 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4750 file_ptr off;
9c5bfbb7 4751 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4752
4753 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4754 && bfd_get_format (abfd) != bfd_core)
4755 {
5c182d5f
AM
4756 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4757 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4758 Elf_Internal_Shdr **hdrpp;
4759 unsigned int i;
4760
4761 /* Start after the ELF header. */
4762 off = i_ehdrp->e_ehsize;
4763
4764 /* We are not creating an executable, which means that we are
4765 not creating a program header, and that the actual order of
4766 the sections in the file is unimportant. */
9ad5cbcf 4767 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4768 {
4769 Elf_Internal_Shdr *hdr;
4770
4771 hdr = *hdrpp;
e0638f70
AM
4772 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4773 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4774 || i == tdata->symtab_section
4775 || i == tdata->symtab_shndx_section
252b5132
RH
4776 || i == tdata->strtab_section)
4777 {
4778 hdr->sh_offset = -1;
252b5132 4779 }
9ad5cbcf 4780 else
b34976b6 4781 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
4782 }
4783 }
4784 else
4785 {
f3520d2f
AM
4786 unsigned int alloc;
4787
252b5132 4788 /* Assign file positions for the loaded sections based on the
08a40648 4789 assignment of sections to segments. */
f3520d2f
AM
4790 if (!assign_file_positions_for_load_sections (abfd, link_info))
4791 return FALSE;
4792
4793 /* And for non-load sections. */
4794 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4795 return FALSE;
4796
e36284ab
AM
4797 if (bed->elf_backend_modify_program_headers != NULL)
4798 {
4799 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4800 return FALSE;
4801 }
4802
f3520d2f
AM
4803 /* Write out the program headers. */
4804 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4805 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4806 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4807 return FALSE;
252b5132 4808
5c182d5f 4809 off = tdata->next_file_pos;
252b5132
RH
4810 }
4811
4812 /* Place the section headers. */
45d6a902 4813 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4814 i_ehdrp->e_shoff = off;
4815 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4816
5c182d5f 4817 tdata->next_file_pos = off;
252b5132 4818
b34976b6 4819 return TRUE;
252b5132
RH
4820}
4821
b34976b6 4822static bfd_boolean
217aa764 4823prep_headers (bfd *abfd)
252b5132
RH
4824{
4825 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4826 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
2b0f7ef9 4827 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4828 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4829
4830 i_ehdrp = elf_elfheader (abfd);
252b5132 4831
2b0f7ef9 4832 shstrtab = _bfd_elf_strtab_init ();
252b5132 4833 if (shstrtab == NULL)
b34976b6 4834 return FALSE;
252b5132
RH
4835
4836 elf_shstrtab (abfd) = shstrtab;
4837
4838 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4839 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4840 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4841 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4842
4843 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4844 i_ehdrp->e_ident[EI_DATA] =
4845 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4846 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4847
252b5132
RH
4848 if ((abfd->flags & DYNAMIC) != 0)
4849 i_ehdrp->e_type = ET_DYN;
4850 else if ((abfd->flags & EXEC_P) != 0)
4851 i_ehdrp->e_type = ET_EXEC;
4852 else if (bfd_get_format (abfd) == bfd_core)
4853 i_ehdrp->e_type = ET_CORE;
4854 else
4855 i_ehdrp->e_type = ET_REL;
4856
4857 switch (bfd_get_arch (abfd))
4858 {
4859 case bfd_arch_unknown:
4860 i_ehdrp->e_machine = EM_NONE;
4861 break;
aa4f99bb
AO
4862
4863 /* There used to be a long list of cases here, each one setting
4864 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4865 in the corresponding bfd definition. To avoid duplication,
4866 the switch was removed. Machines that need special handling
4867 can generally do it in elf_backend_final_write_processing(),
4868 unless they need the information earlier than the final write.
4869 Such need can generally be supplied by replacing the tests for
4870 e_machine with the conditions used to determine it. */
252b5132 4871 default:
9c5bfbb7
AM
4872 i_ehdrp->e_machine = bed->elf_machine_code;
4873 }
aa4f99bb 4874
252b5132
RH
4875 i_ehdrp->e_version = bed->s->ev_current;
4876 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4877
c044fabd 4878 /* No program header, for now. */
252b5132
RH
4879 i_ehdrp->e_phoff = 0;
4880 i_ehdrp->e_phentsize = 0;
4881 i_ehdrp->e_phnum = 0;
4882
c044fabd 4883 /* Each bfd section is section header entry. */
252b5132
RH
4884 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4885 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4886
c044fabd 4887 /* If we're building an executable, we'll need a program header table. */
252b5132 4888 if (abfd->flags & EXEC_P)
0e71e495
BE
4889 /* It all happens later. */
4890 ;
252b5132
RH
4891 else
4892 {
4893 i_ehdrp->e_phentsize = 0;
4894 i_phdrp = 0;
4895 i_ehdrp->e_phoff = 0;
4896 }
4897
4898 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4899 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4900 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4901 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4902 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4903 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4904 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4905 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4906 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4907 return FALSE;
252b5132 4908
b34976b6 4909 return TRUE;
252b5132
RH
4910}
4911
4912/* Assign file positions for all the reloc sections which are not part
4913 of the loadable file image. */
4914
4915void
217aa764 4916_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4917{
4918 file_ptr off;
9ad5cbcf 4919 unsigned int i, num_sec;
252b5132
RH
4920 Elf_Internal_Shdr **shdrpp;
4921
4922 off = elf_tdata (abfd)->next_file_pos;
4923
9ad5cbcf
AM
4924 num_sec = elf_numsections (abfd);
4925 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4926 {
4927 Elf_Internal_Shdr *shdrp;
4928
4929 shdrp = *shdrpp;
4930 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4931 && shdrp->sh_offset == -1)
b34976b6 4932 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4933 }
4934
4935 elf_tdata (abfd)->next_file_pos = off;
4936}
4937
b34976b6 4938bfd_boolean
217aa764 4939_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4940{
9c5bfbb7 4941 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4942 Elf_Internal_Ehdr *i_ehdrp;
4943 Elf_Internal_Shdr **i_shdrp;
b34976b6 4944 bfd_boolean failed;
9ad5cbcf 4945 unsigned int count, num_sec;
252b5132
RH
4946
4947 if (! abfd->output_has_begun
217aa764 4948 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4949 return FALSE;
252b5132
RH
4950
4951 i_shdrp = elf_elfsections (abfd);
4952 i_ehdrp = elf_elfheader (abfd);
4953
b34976b6 4954 failed = FALSE;
252b5132
RH
4955 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4956 if (failed)
b34976b6 4957 return FALSE;
252b5132
RH
4958
4959 _bfd_elf_assign_file_positions_for_relocs (abfd);
4960
c044fabd 4961 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4962 num_sec = elf_numsections (abfd);
4963 for (count = 1; count < num_sec; count++)
252b5132
RH
4964 {
4965 if (bed->elf_backend_section_processing)
4966 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4967 if (i_shdrp[count]->contents)
4968 {
dc810e39
AM
4969 bfd_size_type amt = i_shdrp[count]->sh_size;
4970
252b5132 4971 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 4972 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 4973 return FALSE;
252b5132
RH
4974 }
4975 }
4976
4977 /* Write out the section header names. */
26ae6d5e
DJ
4978 if (elf_shstrtab (abfd) != NULL
4979 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 4980 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 4981 return FALSE;
252b5132
RH
4982
4983 if (bed->elf_backend_final_write_processing)
4984 (*bed->elf_backend_final_write_processing) (abfd,
4985 elf_tdata (abfd)->linker);
4986
ff59fc36
RM
4987 if (!bed->s->write_shdrs_and_ehdr (abfd))
4988 return FALSE;
4989
4990 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
4991 if (elf_tdata (abfd)->after_write_object_contents)
4992 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
4993
4994 return TRUE;
252b5132
RH
4995}
4996
b34976b6 4997bfd_boolean
217aa764 4998_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 4999{
c044fabd 5000 /* Hopefully this can be done just like an object file. */
252b5132
RH
5001 return _bfd_elf_write_object_contents (abfd);
5002}
c044fabd
KH
5003
5004/* Given a section, search the header to find them. */
5005
cb33740c 5006unsigned int
198beae2 5007_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5008{
9c5bfbb7 5009 const struct elf_backend_data *bed;
cb33740c 5010 unsigned int index;
252b5132 5011
9ad5cbcf
AM
5012 if (elf_section_data (asect) != NULL
5013 && elf_section_data (asect)->this_idx != 0)
5014 return elf_section_data (asect)->this_idx;
5015
5016 if (bfd_is_abs_section (asect))
af746e92
AM
5017 index = SHN_ABS;
5018 else if (bfd_is_com_section (asect))
5019 index = SHN_COMMON;
5020 else if (bfd_is_und_section (asect))
5021 index = SHN_UNDEF;
5022 else
cb33740c 5023 index = SHN_BAD;
252b5132 5024
af746e92 5025 bed = get_elf_backend_data (abfd);
252b5132
RH
5026 if (bed->elf_backend_section_from_bfd_section)
5027 {
af746e92 5028 int retval = index;
9ad5cbcf 5029
af746e92
AM
5030 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5031 return retval;
252b5132
RH
5032 }
5033
cb33740c 5034 if (index == SHN_BAD)
af746e92 5035 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5036
af746e92 5037 return index;
252b5132
RH
5038}
5039
5040/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5041 on error. */
5042
5043int
217aa764 5044_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5045{
5046 asymbol *asym_ptr = *asym_ptr_ptr;
5047 int idx;
5048 flagword flags = asym_ptr->flags;
5049
5050 /* When gas creates relocations against local labels, it creates its
5051 own symbol for the section, but does put the symbol into the
5052 symbol chain, so udata is 0. When the linker is generating
5053 relocatable output, this section symbol may be for one of the
5054 input sections rather than the output section. */
5055 if (asym_ptr->udata.i == 0
5056 && (flags & BSF_SECTION_SYM)
5057 && asym_ptr->section)
5058 {
5372391b 5059 asection *sec;
252b5132
RH
5060 int indx;
5061
5372391b
AM
5062 sec = asym_ptr->section;
5063 if (sec->owner != abfd && sec->output_section != NULL)
5064 sec = sec->output_section;
5065 if (sec->owner == abfd
5066 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5067 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5068 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5069 }
5070
5071 idx = asym_ptr->udata.i;
5072
5073 if (idx == 0)
5074 {
5075 /* This case can occur when using --strip-symbol on a symbol
08a40648 5076 which is used in a relocation entry. */
252b5132 5077 (*_bfd_error_handler)
d003868e
AM
5078 (_("%B: symbol `%s' required but not present"),
5079 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5080 bfd_set_error (bfd_error_no_symbols);
5081 return -1;
5082 }
5083
5084#if DEBUG & 4
5085 {
5086 fprintf (stderr,
661a3fd4 5087 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5088 (long) asym_ptr, asym_ptr->name, idx, flags,
5089 elf_symbol_flags (flags));
5090 fflush (stderr);
5091 }
5092#endif
5093
5094 return idx;
5095}
5096
84d1d650 5097/* Rewrite program header information. */
252b5132 5098
b34976b6 5099static bfd_boolean
84d1d650 5100rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5101{
b34976b6
AM
5102 Elf_Internal_Ehdr *iehdr;
5103 struct elf_segment_map *map;
5104 struct elf_segment_map *map_first;
5105 struct elf_segment_map **pointer_to_map;
5106 Elf_Internal_Phdr *segment;
5107 asection *section;
5108 unsigned int i;
5109 unsigned int num_segments;
5110 bfd_boolean phdr_included = FALSE;
5c44b38e 5111 bfd_boolean p_paddr_valid;
b34976b6
AM
5112 bfd_vma maxpagesize;
5113 struct elf_segment_map *phdr_adjust_seg = NULL;
5114 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5115 const struct elf_backend_data *bed;
bc67d8a6 5116
caf47ea6 5117 bed = get_elf_backend_data (ibfd);
252b5132
RH
5118 iehdr = elf_elfheader (ibfd);
5119
bc67d8a6 5120 map_first = NULL;
c044fabd 5121 pointer_to_map = &map_first;
252b5132
RH
5122
5123 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5124 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5125
5126 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5127#define SEGMENT_END(segment, start) \
5128 (start + (segment->p_memsz > segment->p_filesz \
5129 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5130
eecdbe52
JJ
5131#define SECTION_SIZE(section, segment) \
5132 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5133 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5134 ? section->size : 0)
eecdbe52 5135
b34976b6 5136 /* Returns TRUE if the given section is contained within
bc67d8a6 5137 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5138#define IS_CONTAINED_BY_VMA(section, segment) \
5139 (section->vma >= segment->p_vaddr \
eecdbe52 5140 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5141 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5142
b34976b6 5143 /* Returns TRUE if the given section is contained within
bc67d8a6 5144 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5145#define IS_CONTAINED_BY_LMA(section, segment, base) \
5146 (section->lma >= base \
eecdbe52 5147 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5148 <= SEGMENT_END (segment, base)))
252b5132 5149
0efc80c8
L
5150 /* Handle PT_NOTE segment. */
5151#define IS_NOTE(p, s) \
aecc8f8a 5152 (p->p_type == PT_NOTE \
0efc80c8 5153 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5154 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5155 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5156 <= p->p_offset + p->p_filesz))
252b5132 5157
0efc80c8
L
5158 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5159 etc. */
5160#define IS_COREFILE_NOTE(p, s) \
5161 (IS_NOTE (p, s) \
5162 && bfd_get_format (ibfd) == bfd_core \
5163 && s->vma == 0 \
5164 && s->lma == 0)
5165
252b5132
RH
5166 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5167 linker, which generates a PT_INTERP section with p_vaddr and
5168 p_memsz set to 0. */
aecc8f8a
AM
5169#define IS_SOLARIS_PT_INTERP(p, s) \
5170 (p->p_vaddr == 0 \
5171 && p->p_paddr == 0 \
5172 && p->p_memsz == 0 \
5173 && p->p_filesz > 0 \
5174 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5175 && s->size > 0 \
aecc8f8a 5176 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5177 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5178 <= p->p_offset + p->p_filesz))
5c440b1e 5179
bc67d8a6
NC
5180 /* Decide if the given section should be included in the given segment.
5181 A section will be included if:
f5ffc919 5182 1. It is within the address space of the segment -- we use the LMA
08a40648 5183 if that is set for the segment and the VMA otherwise,
0efc80c8
L
5184 2. It is an allocated section or a NOTE section in a PT_NOTE
5185 segment.
bc67d8a6 5186 3. There is an output section associated with it,
eecdbe52 5187 4. The section has not already been allocated to a previous segment.
2b05f1b7 5188 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5189 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5190 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5191 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5192 (with the possible exception of .dynamic). */
9f17e2a6 5193#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5194 ((((segment->p_paddr \
5195 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5196 : IS_CONTAINED_BY_VMA (section, segment)) \
5197 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5198 || IS_NOTE (segment, section)) \
2b05f1b7
L
5199 && segment->p_type != PT_GNU_STACK \
5200 && (segment->p_type != PT_TLS \
5201 || (section->flags & SEC_THREAD_LOCAL)) \
5202 && (segment->p_type == PT_LOAD \
5203 || segment->p_type == PT_TLS \
5204 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5205 && (segment->p_type != PT_DYNAMIC \
5206 || SECTION_SIZE (section, segment) > 0 \
5207 || (segment->p_paddr \
5208 ? segment->p_paddr != section->lma \
5209 : segment->p_vaddr != section->vma) \
5210 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5211 == 0)) \
0067a569 5212 && !section->segment_mark)
bc67d8a6 5213
9f17e2a6
L
5214/* If the output section of a section in the input segment is NULL,
5215 it is removed from the corresponding output segment. */
5216#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5217 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5218 && section->output_section != NULL)
5219
b34976b6 5220 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5221#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5222 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5223
5224 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5225 their VMA address ranges and their LMA address ranges overlap.
5226 It is possible to have overlapping VMA ranges without overlapping LMA
5227 ranges. RedBoot images for example can have both .data and .bss mapped
5228 to the same VMA range, but with the .data section mapped to a different
5229 LMA. */
aecc8f8a 5230#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5231 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5232 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5233 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5234 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5235
5236 /* Initialise the segment mark field. */
5237 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5238 section->segment_mark = FALSE;
bc67d8a6 5239
5c44b38e
AM
5240 /* The Solaris linker creates program headers in which all the
5241 p_paddr fields are zero. When we try to objcopy or strip such a
5242 file, we get confused. Check for this case, and if we find it
5243 don't set the p_paddr_valid fields. */
5244 p_paddr_valid = FALSE;
5245 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5246 i < num_segments;
5247 i++, segment++)
5248 if (segment->p_paddr != 0)
5249 {
5250 p_paddr_valid = TRUE;
5251 break;
5252 }
5253
252b5132 5254 /* Scan through the segments specified in the program header
bc67d8a6 5255 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5256 in the loadable segments. These can be created by weird
aecc8f8a 5257 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5258 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5259 i < num_segments;
c044fabd 5260 i++, segment++)
252b5132 5261 {
252b5132 5262 unsigned int j;
c044fabd 5263 Elf_Internal_Phdr *segment2;
252b5132 5264
aecc8f8a
AM
5265 if (segment->p_type == PT_INTERP)
5266 for (section = ibfd->sections; section; section = section->next)
5267 if (IS_SOLARIS_PT_INTERP (segment, section))
5268 {
5269 /* Mininal change so that the normal section to segment
4cc11e76 5270 assignment code will work. */
aecc8f8a
AM
5271 segment->p_vaddr = section->vma;
5272 break;
5273 }
5274
bc67d8a6 5275 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5276 {
5277 /* Remove PT_GNU_RELRO segment. */
5278 if (segment->p_type == PT_GNU_RELRO)
5279 segment->p_type = PT_NULL;
5280 continue;
5281 }
c044fabd 5282
bc67d8a6 5283 /* Determine if this segment overlaps any previous segments. */
0067a569 5284 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5285 {
5286 bfd_signed_vma extra_length;
c044fabd 5287
bc67d8a6 5288 if (segment2->p_type != PT_LOAD
0067a569 5289 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5290 continue;
c044fabd 5291
bc67d8a6
NC
5292 /* Merge the two segments together. */
5293 if (segment2->p_vaddr < segment->p_vaddr)
5294 {
c044fabd 5295 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5296 SEGMENT. */
0067a569
AM
5297 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5298 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5299
bc67d8a6
NC
5300 if (extra_length > 0)
5301 {
0067a569 5302 segment2->p_memsz += extra_length;
bc67d8a6
NC
5303 segment2->p_filesz += extra_length;
5304 }
c044fabd 5305
bc67d8a6 5306 segment->p_type = PT_NULL;
c044fabd 5307
bc67d8a6
NC
5308 /* Since we have deleted P we must restart the outer loop. */
5309 i = 0;
5310 segment = elf_tdata (ibfd)->phdr;
5311 break;
5312 }
5313 else
5314 {
c044fabd 5315 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5316 SEGMENT2. */
0067a569
AM
5317 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5318 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5319
bc67d8a6
NC
5320 if (extra_length > 0)
5321 {
0067a569 5322 segment->p_memsz += extra_length;
bc67d8a6
NC
5323 segment->p_filesz += extra_length;
5324 }
c044fabd 5325
bc67d8a6
NC
5326 segment2->p_type = PT_NULL;
5327 }
5328 }
5329 }
c044fabd 5330
bc67d8a6
NC
5331 /* The second scan attempts to assign sections to segments. */
5332 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5333 i < num_segments;
0067a569 5334 i++, segment++)
bc67d8a6 5335 {
0067a569
AM
5336 unsigned int section_count;
5337 asection **sections;
5338 asection *output_section;
5339 unsigned int isec;
5340 bfd_vma matching_lma;
5341 bfd_vma suggested_lma;
5342 unsigned int j;
dc810e39 5343 bfd_size_type amt;
0067a569
AM
5344 asection *first_section;
5345 bfd_boolean first_matching_lma;
5346 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5347
5348 if (segment->p_type == PT_NULL)
5349 continue;
c044fabd 5350
9f17e2a6 5351 first_section = NULL;
bc67d8a6 5352 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5353 for (section = ibfd->sections, section_count = 0;
5354 section != NULL;
5355 section = section->next)
9f17e2a6
L
5356 {
5357 /* Find the first section in the input segment, which may be
5358 removed from the corresponding output segment. */
5359 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5360 {
5361 if (first_section == NULL)
5362 first_section = section;
5363 if (section->output_section != NULL)
5364 ++section_count;
5365 }
5366 }
811072d8 5367
b5f852ea
NC
5368 /* Allocate a segment map big enough to contain
5369 all of the sections we have selected. */
dc810e39
AM
5370 amt = sizeof (struct elf_segment_map);
5371 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
41f8ce69 5372 map = bfd_zalloc (obfd, amt);
bc67d8a6 5373 if (map == NULL)
b34976b6 5374 return FALSE;
252b5132
RH
5375
5376 /* Initialise the fields of the segment map. Default to
5377 using the physical address of the segment in the input BFD. */
0067a569
AM
5378 map->next = NULL;
5379 map->p_type = segment->p_type;
5380 map->p_flags = segment->p_flags;
bc67d8a6 5381 map->p_flags_valid = 1;
55d55ac7 5382
9f17e2a6
L
5383 /* If the first section in the input segment is removed, there is
5384 no need to preserve segment physical address in the corresponding
5385 output segment. */
945c025a 5386 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5387 {
5388 map->p_paddr = segment->p_paddr;
5c44b38e 5389 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5390 }
252b5132
RH
5391
5392 /* Determine if this segment contains the ELF file header
5393 and if it contains the program headers themselves. */
bc67d8a6
NC
5394 map->includes_filehdr = (segment->p_offset == 0
5395 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5396 map->includes_phdrs = 0;
252b5132 5397
0067a569 5398 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5399 {
bc67d8a6
NC
5400 map->includes_phdrs =
5401 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5402 && (segment->p_offset + segment->p_filesz
252b5132
RH
5403 >= ((bfd_vma) iehdr->e_phoff
5404 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5405
bc67d8a6 5406 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5407 phdr_included = TRUE;
252b5132
RH
5408 }
5409
bc67d8a6 5410 if (section_count == 0)
252b5132
RH
5411 {
5412 /* Special segments, such as the PT_PHDR segment, may contain
5413 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5414 something. They are allowed by the ELF spec however, so only
5415 a warning is produced. */
bc67d8a6 5416 if (segment->p_type == PT_LOAD)
0067a569
AM
5417 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5418 " detected, is this intentional ?\n"),
5419 ibfd);
252b5132 5420
bc67d8a6 5421 map->count = 0;
c044fabd
KH
5422 *pointer_to_map = map;
5423 pointer_to_map = &map->next;
252b5132
RH
5424
5425 continue;
5426 }
5427
5428 /* Now scan the sections in the input BFD again and attempt
5429 to add their corresponding output sections to the segment map.
5430 The problem here is how to handle an output section which has
5431 been moved (ie had its LMA changed). There are four possibilities:
5432
5433 1. None of the sections have been moved.
5434 In this case we can continue to use the segment LMA from the
5435 input BFD.
5436
5437 2. All of the sections have been moved by the same amount.
5438 In this case we can change the segment's LMA to match the LMA
5439 of the first section.
5440
5441 3. Some of the sections have been moved, others have not.
5442 In this case those sections which have not been moved can be
5443 placed in the current segment which will have to have its size,
5444 and possibly its LMA changed, and a new segment or segments will
5445 have to be created to contain the other sections.
5446
b5f852ea 5447 4. The sections have been moved, but not by the same amount.
252b5132
RH
5448 In this case we can change the segment's LMA to match the LMA
5449 of the first section and we will have to create a new segment
5450 or segments to contain the other sections.
5451
5452 In order to save time, we allocate an array to hold the section
5453 pointers that we are interested in. As these sections get assigned
5454 to a segment, they are removed from this array. */
5455
d0fb9a8d 5456 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5457 if (sections == NULL)
b34976b6 5458 return FALSE;
252b5132
RH
5459
5460 /* Step One: Scan for segment vs section LMA conflicts.
5461 Also add the sections to the section array allocated above.
5462 Also add the sections to the current segment. In the common
5463 case, where the sections have not been moved, this means that
5464 we have completely filled the segment, and there is nothing
5465 more to do. */
252b5132 5466 isec = 0;
72730e0c 5467 matching_lma = 0;
252b5132 5468 suggested_lma = 0;
0067a569
AM
5469 first_matching_lma = TRUE;
5470 first_suggested_lma = TRUE;
252b5132 5471
147d51c2 5472 for (section = ibfd->sections;
bc67d8a6
NC
5473 section != NULL;
5474 section = section->next)
147d51c2
L
5475 if (section == first_section)
5476 break;
5477
5478 for (j = 0; section != NULL; section = section->next)
252b5132 5479 {
caf47ea6 5480 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5481 {
bc67d8a6
NC
5482 output_section = section->output_section;
5483
0067a569 5484 sections[j++] = section;
252b5132
RH
5485
5486 /* The Solaris native linker always sets p_paddr to 0.
5487 We try to catch that case here, and set it to the
5e8d7549
NC
5488 correct value. Note - some backends require that
5489 p_paddr be left as zero. */
5c44b38e 5490 if (!p_paddr_valid
4455705d 5491 && segment->p_vaddr != 0
0067a569 5492 && !bed->want_p_paddr_set_to_zero
252b5132 5493 && isec == 0
bc67d8a6 5494 && output_section->lma != 0
0067a569
AM
5495 && output_section->vma == (segment->p_vaddr
5496 + (map->includes_filehdr
5497 ? iehdr->e_ehsize
5498 : 0)
5499 + (map->includes_phdrs
5500 ? (iehdr->e_phnum
5501 * iehdr->e_phentsize)
5502 : 0)))
bc67d8a6 5503 map->p_paddr = segment->p_vaddr;
252b5132
RH
5504
5505 /* Match up the physical address of the segment with the
5506 LMA address of the output section. */
bc67d8a6 5507 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5508 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5509 || (bed->want_p_paddr_set_to_zero
5510 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5511 {
0067a569
AM
5512 if (first_matching_lma || output_section->lma < matching_lma)
5513 {
5514 matching_lma = output_section->lma;
5515 first_matching_lma = FALSE;
5516 }
252b5132
RH
5517
5518 /* We assume that if the section fits within the segment
bc67d8a6 5519 then it does not overlap any other section within that
252b5132 5520 segment. */
0067a569
AM
5521 map->sections[isec++] = output_section;
5522 }
5523 else if (first_suggested_lma)
5524 {
5525 suggested_lma = output_section->lma;
5526 first_suggested_lma = FALSE;
252b5132 5527 }
147d51c2
L
5528
5529 if (j == section_count)
5530 break;
252b5132
RH
5531 }
5532 }
5533
bc67d8a6 5534 BFD_ASSERT (j == section_count);
252b5132
RH
5535
5536 /* Step Two: Adjust the physical address of the current segment,
5537 if necessary. */
bc67d8a6 5538 if (isec == section_count)
252b5132
RH
5539 {
5540 /* All of the sections fitted within the segment as currently
5541 specified. This is the default case. Add the segment to
5542 the list of built segments and carry on to process the next
5543 program header in the input BFD. */
bc67d8a6 5544 map->count = section_count;
c044fabd
KH
5545 *pointer_to_map = map;
5546 pointer_to_map = &map->next;
08a40648 5547
5c44b38e
AM
5548 if (p_paddr_valid
5549 && !bed->want_p_paddr_set_to_zero
147d51c2 5550 && matching_lma != map->p_paddr
5c44b38e
AM
5551 && !map->includes_filehdr
5552 && !map->includes_phdrs)
3271a814
NS
5553 /* There is some padding before the first section in the
5554 segment. So, we must account for that in the output
5555 segment's vma. */
5556 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5557
252b5132
RH
5558 free (sections);
5559 continue;
5560 }
252b5132
RH
5561 else
5562 {
0067a569 5563 if (!first_matching_lma)
72730e0c
AM
5564 {
5565 /* At least one section fits inside the current segment.
5566 Keep it, but modify its physical address to match the
5567 LMA of the first section that fitted. */
bc67d8a6 5568 map->p_paddr = matching_lma;
72730e0c
AM
5569 }
5570 else
5571 {
5572 /* None of the sections fitted inside the current segment.
5573 Change the current segment's physical address to match
5574 the LMA of the first section. */
bc67d8a6 5575 map->p_paddr = suggested_lma;
72730e0c
AM
5576 }
5577
bc67d8a6
NC
5578 /* Offset the segment physical address from the lma
5579 to allow for space taken up by elf headers. */
5580 if (map->includes_filehdr)
010c8431
AM
5581 {
5582 if (map->p_paddr >= iehdr->e_ehsize)
5583 map->p_paddr -= iehdr->e_ehsize;
5584 else
5585 {
5586 map->includes_filehdr = FALSE;
5587 map->includes_phdrs = FALSE;
5588 }
5589 }
252b5132 5590
bc67d8a6
NC
5591 if (map->includes_phdrs)
5592 {
010c8431
AM
5593 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5594 {
5595 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5596
5597 /* iehdr->e_phnum is just an estimate of the number
5598 of program headers that we will need. Make a note
5599 here of the number we used and the segment we chose
5600 to hold these headers, so that we can adjust the
5601 offset when we know the correct value. */
5602 phdr_adjust_num = iehdr->e_phnum;
5603 phdr_adjust_seg = map;
5604 }
5605 else
5606 map->includes_phdrs = FALSE;
bc67d8a6 5607 }
252b5132
RH
5608 }
5609
5610 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5611 those that fit to the current segment and removing them from the
252b5132
RH
5612 sections array; but making sure not to leave large gaps. Once all
5613 possible sections have been assigned to the current segment it is
5614 added to the list of built segments and if sections still remain
5615 to be assigned, a new segment is constructed before repeating
5616 the loop. */
5617 isec = 0;
5618 do
5619 {
bc67d8a6 5620 map->count = 0;
252b5132 5621 suggested_lma = 0;
0067a569 5622 first_suggested_lma = TRUE;
252b5132
RH
5623
5624 /* Fill the current segment with sections that fit. */
bc67d8a6 5625 for (j = 0; j < section_count; j++)
252b5132 5626 {
bc67d8a6 5627 section = sections[j];
252b5132 5628
bc67d8a6 5629 if (section == NULL)
252b5132
RH
5630 continue;
5631
bc67d8a6 5632 output_section = section->output_section;
252b5132 5633
bc67d8a6 5634 BFD_ASSERT (output_section != NULL);
c044fabd 5635
bc67d8a6
NC
5636 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5637 || IS_COREFILE_NOTE (segment, section))
252b5132 5638 {
bc67d8a6 5639 if (map->count == 0)
252b5132
RH
5640 {
5641 /* If the first section in a segment does not start at
bc67d8a6
NC
5642 the beginning of the segment, then something is
5643 wrong. */
0067a569
AM
5644 if (output_section->lma
5645 != (map->p_paddr
5646 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5647 + (map->includes_phdrs
5648 ? iehdr->e_phnum * iehdr->e_phentsize
5649 : 0)))
252b5132
RH
5650 abort ();
5651 }
5652 else
5653 {
0067a569 5654 asection *prev_sec;
252b5132 5655
bc67d8a6 5656 prev_sec = map->sections[map->count - 1];
252b5132
RH
5657
5658 /* If the gap between the end of the previous section
bc67d8a6
NC
5659 and the start of this section is more than
5660 maxpagesize then we need to start a new segment. */
eea6121a 5661 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5662 maxpagesize)
caf47ea6 5663 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 5664 || (prev_sec->lma + prev_sec->size
079e9a2f 5665 > output_section->lma))
252b5132 5666 {
0067a569
AM
5667 if (first_suggested_lma)
5668 {
5669 suggested_lma = output_section->lma;
5670 first_suggested_lma = FALSE;
5671 }
252b5132
RH
5672
5673 continue;
5674 }
5675 }
5676
bc67d8a6 5677 map->sections[map->count++] = output_section;
252b5132
RH
5678 ++isec;
5679 sections[j] = NULL;
b34976b6 5680 section->segment_mark = TRUE;
252b5132 5681 }
0067a569
AM
5682 else if (first_suggested_lma)
5683 {
5684 suggested_lma = output_section->lma;
5685 first_suggested_lma = FALSE;
5686 }
252b5132
RH
5687 }
5688
bc67d8a6 5689 BFD_ASSERT (map->count > 0);
252b5132
RH
5690
5691 /* Add the current segment to the list of built segments. */
c044fabd
KH
5692 *pointer_to_map = map;
5693 pointer_to_map = &map->next;
252b5132 5694
bc67d8a6 5695 if (isec < section_count)
252b5132
RH
5696 {
5697 /* We still have not allocated all of the sections to
5698 segments. Create a new segment here, initialise it
5699 and carry on looping. */
dc810e39
AM
5700 amt = sizeof (struct elf_segment_map);
5701 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5702 map = bfd_alloc (obfd, amt);
bc67d8a6 5703 if (map == NULL)
5ed6aba4
NC
5704 {
5705 free (sections);
5706 return FALSE;
5707 }
252b5132
RH
5708
5709 /* Initialise the fields of the segment map. Set the physical
5710 physical address to the LMA of the first section that has
5711 not yet been assigned. */
0067a569
AM
5712 map->next = NULL;
5713 map->p_type = segment->p_type;
5714 map->p_flags = segment->p_flags;
5715 map->p_flags_valid = 1;
5716 map->p_paddr = suggested_lma;
5c44b38e 5717 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 5718 map->includes_filehdr = 0;
0067a569 5719 map->includes_phdrs = 0;
252b5132
RH
5720 }
5721 }
bc67d8a6 5722 while (isec < section_count);
252b5132
RH
5723
5724 free (sections);
5725 }
5726
bc67d8a6
NC
5727 elf_tdata (obfd)->segment_map = map_first;
5728
5729 /* If we had to estimate the number of program headers that were
9ad5cbcf 5730 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5731 the offset if necessary. */
5732 if (phdr_adjust_seg != NULL)
5733 {
5734 unsigned int count;
c044fabd 5735
bc67d8a6 5736 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5737 count++;
252b5132 5738
bc67d8a6
NC
5739 if (count > phdr_adjust_num)
5740 phdr_adjust_seg->p_paddr
5741 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5742 }
c044fabd 5743
bc67d8a6 5744#undef SEGMENT_END
eecdbe52 5745#undef SECTION_SIZE
bc67d8a6
NC
5746#undef IS_CONTAINED_BY_VMA
5747#undef IS_CONTAINED_BY_LMA
0efc80c8 5748#undef IS_NOTE
252b5132 5749#undef IS_COREFILE_NOTE
bc67d8a6 5750#undef IS_SOLARIS_PT_INTERP
9f17e2a6 5751#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
5752#undef INCLUDE_SECTION_IN_SEGMENT
5753#undef SEGMENT_AFTER_SEGMENT
5754#undef SEGMENT_OVERLAPS
b34976b6 5755 return TRUE;
252b5132
RH
5756}
5757
84d1d650
L
5758/* Copy ELF program header information. */
5759
5760static bfd_boolean
5761copy_elf_program_header (bfd *ibfd, bfd *obfd)
5762{
5763 Elf_Internal_Ehdr *iehdr;
5764 struct elf_segment_map *map;
5765 struct elf_segment_map *map_first;
5766 struct elf_segment_map **pointer_to_map;
5767 Elf_Internal_Phdr *segment;
5768 unsigned int i;
5769 unsigned int num_segments;
5770 bfd_boolean phdr_included = FALSE;
88967714 5771 bfd_boolean p_paddr_valid;
84d1d650
L
5772
5773 iehdr = elf_elfheader (ibfd);
5774
5775 map_first = NULL;
5776 pointer_to_map = &map_first;
5777
88967714
AM
5778 /* If all the segment p_paddr fields are zero, don't set
5779 map->p_paddr_valid. */
5780 p_paddr_valid = FALSE;
84d1d650 5781 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
5782 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5783 i < num_segments;
5784 i++, segment++)
5785 if (segment->p_paddr != 0)
5786 {
5787 p_paddr_valid = TRUE;
5788 break;
5789 }
5790
84d1d650
L
5791 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5792 i < num_segments;
5793 i++, segment++)
5794 {
5795 asection *section;
5796 unsigned int section_count;
5797 bfd_size_type amt;
5798 Elf_Internal_Shdr *this_hdr;
53020534 5799 asection *first_section = NULL;
c981028a 5800 asection *lowest_section = NULL;
84d1d650 5801
84d1d650
L
5802 /* Compute how many sections are in this segment. */
5803 for (section = ibfd->sections, section_count = 0;
5804 section != NULL;
5805 section = section->next)
5806 {
5807 this_hdr = &(elf_section_data(section)->this_hdr);
5808 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
3271a814 5809 {
53020534 5810 if (!first_section)
c981028a
DJ
5811 first_section = lowest_section = section;
5812 if (section->lma < lowest_section->lma)
5813 lowest_section = section;
3271a814
NS
5814 section_count++;
5815 }
84d1d650
L
5816 }
5817
5818 /* Allocate a segment map big enough to contain
5819 all of the sections we have selected. */
5820 amt = sizeof (struct elf_segment_map);
5821 if (section_count != 0)
5822 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
41f8ce69 5823 map = bfd_zalloc (obfd, amt);
84d1d650
L
5824 if (map == NULL)
5825 return FALSE;
5826
5827 /* Initialize the fields of the output segment map with the
5828 input segment. */
5829 map->next = NULL;
5830 map->p_type = segment->p_type;
5831 map->p_flags = segment->p_flags;
5832 map->p_flags_valid = 1;
5833 map->p_paddr = segment->p_paddr;
88967714 5834 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
5835 map->p_align = segment->p_align;
5836 map->p_align_valid = 1;
3271a814 5837 map->p_vaddr_offset = 0;
84d1d650 5838
9433b9b1 5839 if (map->p_type == PT_GNU_RELRO)
b10a8ae0
L
5840 {
5841 /* The PT_GNU_RELRO segment may contain the first a few
5842 bytes in the .got.plt section even if the whole .got.plt
5843 section isn't in the PT_GNU_RELRO segment. We won't
5844 change the size of the PT_GNU_RELRO segment. */
9433b9b1 5845 map->p_size = segment->p_memsz;
b10a8ae0
L
5846 map->p_size_valid = 1;
5847 }
5848
84d1d650
L
5849 /* Determine if this segment contains the ELF file header
5850 and if it contains the program headers themselves. */
5851 map->includes_filehdr = (segment->p_offset == 0
5852 && segment->p_filesz >= iehdr->e_ehsize);
5853
5854 map->includes_phdrs = 0;
5855 if (! phdr_included || segment->p_type != PT_LOAD)
5856 {
5857 map->includes_phdrs =
5858 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5859 && (segment->p_offset + segment->p_filesz
5860 >= ((bfd_vma) iehdr->e_phoff
5861 + iehdr->e_phnum * iehdr->e_phentsize)));
5862
5863 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5864 phdr_included = TRUE;
5865 }
5866
2b0bc088
NC
5867 if (map->includes_filehdr && first_section)
5868 /* We need to keep the space used by the headers fixed. */
5869 map->header_size = first_section->vma - segment->p_vaddr;
5870
88967714
AM
5871 if (!map->includes_phdrs
5872 && !map->includes_filehdr
5873 && map->p_paddr_valid)
3271a814 5874 /* There is some other padding before the first section. */
c981028a 5875 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
53020534 5876 - segment->p_paddr);
08a40648 5877
84d1d650
L
5878 if (section_count != 0)
5879 {
5880 unsigned int isec = 0;
5881
53020534 5882 for (section = first_section;
84d1d650
L
5883 section != NULL;
5884 section = section->next)
5885 {
5886 this_hdr = &(elf_section_data(section)->this_hdr);
5887 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
53020534
L
5888 {
5889 map->sections[isec++] = section->output_section;
5890 if (isec == section_count)
5891 break;
5892 }
84d1d650
L
5893 }
5894 }
5895
5896 map->count = section_count;
5897 *pointer_to_map = map;
5898 pointer_to_map = &map->next;
5899 }
5900
5901 elf_tdata (obfd)->segment_map = map_first;
5902 return TRUE;
5903}
5904
5905/* Copy private BFD data. This copies or rewrites ELF program header
5906 information. */
5907
5908static bfd_boolean
5909copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5910{
84d1d650
L
5911 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5912 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5913 return TRUE;
5914
5915 if (elf_tdata (ibfd)->phdr == NULL)
5916 return TRUE;
5917
5918 if (ibfd->xvec == obfd->xvec)
5919 {
cb3ff1e5
NC
5920 /* Check to see if any sections in the input BFD
5921 covered by ELF program header have changed. */
d55ce4e2 5922 Elf_Internal_Phdr *segment;
84d1d650
L
5923 asection *section, *osec;
5924 unsigned int i, num_segments;
5925 Elf_Internal_Shdr *this_hdr;
147d51c2
L
5926 const struct elf_backend_data *bed;
5927
5928 bed = get_elf_backend_data (ibfd);
5929
5930 /* Regenerate the segment map if p_paddr is set to 0. */
5931 if (bed->want_p_paddr_set_to_zero)
5932 goto rewrite;
84d1d650
L
5933
5934 /* Initialize the segment mark field. */
5935 for (section = obfd->sections; section != NULL;
5936 section = section->next)
5937 section->segment_mark = FALSE;
5938
5939 num_segments = elf_elfheader (ibfd)->e_phnum;
5940 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5941 i < num_segments;
5942 i++, segment++)
5943 {
5f6999aa
NC
5944 /* PR binutils/3535. The Solaris linker always sets the p_paddr
5945 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
5946 which severly confuses things, so always regenerate the segment
5947 map in this case. */
5948 if (segment->p_paddr == 0
5949 && segment->p_memsz == 0
5950 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 5951 goto rewrite;
5f6999aa 5952
84d1d650
L
5953 for (section = ibfd->sections;
5954 section != NULL; section = section->next)
5955 {
5956 /* We mark the output section so that we know it comes
5957 from the input BFD. */
5958 osec = section->output_section;
5959 if (osec)
5960 osec->segment_mark = TRUE;
5961
5962 /* Check if this section is covered by the segment. */
5963 this_hdr = &(elf_section_data(section)->this_hdr);
5964 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5965 {
5966 /* FIXME: Check if its output section is changed or
5967 removed. What else do we need to check? */
5968 if (osec == NULL
5969 || section->flags != osec->flags
5970 || section->lma != osec->lma
5971 || section->vma != osec->vma
5972 || section->size != osec->size
5973 || section->rawsize != osec->rawsize
5974 || section->alignment_power != osec->alignment_power)
5975 goto rewrite;
5976 }
5977 }
5978 }
5979
cb3ff1e5 5980 /* Check to see if any output section do not come from the
84d1d650
L
5981 input BFD. */
5982 for (section = obfd->sections; section != NULL;
5983 section = section->next)
5984 {
5985 if (section->segment_mark == FALSE)
5986 goto rewrite;
5987 else
5988 section->segment_mark = FALSE;
5989 }
5990
5991 return copy_elf_program_header (ibfd, obfd);
5992 }
5993
5994rewrite:
5995 return rewrite_elf_program_header (ibfd, obfd);
5996}
5997
ccd2ec6a
L
5998/* Initialize private output section information from input section. */
5999
6000bfd_boolean
6001_bfd_elf_init_private_section_data (bfd *ibfd,
6002 asection *isec,
6003 bfd *obfd,
6004 asection *osec,
6005 struct bfd_link_info *link_info)
6006
6007{
6008 Elf_Internal_Shdr *ihdr, *ohdr;
6009 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
6010
6011 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6012 || obfd->xvec->flavour != bfd_target_elf_flavour)
6013 return TRUE;
6014
e843e0f8 6015 /* Don't copy the output ELF section type from input if the
d3fd4074 6016 output BFD section flags have been set to something different.
e843e0f8
L
6017 elf_fake_sections will set ELF section type based on BFD
6018 section flags. */
42bb2e33
AM
6019 if (elf_section_type (osec) == SHT_NULL
6020 && (osec->flags == isec->flags || !osec->flags))
6021 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6022
6023 /* FIXME: Is this correct for all OS/PROC specific flags? */
6024 elf_section_flags (osec) |= (elf_section_flags (isec)
6025 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6026
6027 /* Set things up for objcopy and relocatable link. The output
6028 SHT_GROUP section will have its elf_next_in_group pointing back
6029 to the input group members. Ignore linker created group section.
6030 See elfNN_ia64_object_p in elfxx-ia64.c. */
ccd2ec6a
L
6031 if (need_group)
6032 {
6033 if (elf_sec_group (isec) == NULL
6034 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6035 {
6036 if (elf_section_flags (isec) & SHF_GROUP)
6037 elf_section_flags (osec) |= SHF_GROUP;
6038 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6039 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6040 }
6041 }
6042
6043 ihdr = &elf_section_data (isec)->this_hdr;
6044
6045 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6046 don't use the output section of the linked-to section since it
6047 may be NULL at this point. */
6048 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6049 {
6050 ohdr = &elf_section_data (osec)->this_hdr;
6051 ohdr->sh_flags |= SHF_LINK_ORDER;
6052 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6053 }
6054
6055 osec->use_rela_p = isec->use_rela_p;
6056
6057 return TRUE;
6058}
6059
252b5132
RH
6060/* Copy private section information. This copies over the entsize
6061 field, and sometimes the info field. */
6062
b34976b6 6063bfd_boolean
217aa764
AM
6064_bfd_elf_copy_private_section_data (bfd *ibfd,
6065 asection *isec,
6066 bfd *obfd,
6067 asection *osec)
252b5132
RH
6068{
6069 Elf_Internal_Shdr *ihdr, *ohdr;
6070
6071 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6072 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6073 return TRUE;
252b5132 6074
252b5132
RH
6075 ihdr = &elf_section_data (isec)->this_hdr;
6076 ohdr = &elf_section_data (osec)->this_hdr;
6077
6078 ohdr->sh_entsize = ihdr->sh_entsize;
6079
6080 if (ihdr->sh_type == SHT_SYMTAB
6081 || ihdr->sh_type == SHT_DYNSYM
6082 || ihdr->sh_type == SHT_GNU_verneed
6083 || ihdr->sh_type == SHT_GNU_verdef)
6084 ohdr->sh_info = ihdr->sh_info;
6085
ccd2ec6a
L
6086 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6087 NULL);
252b5132
RH
6088}
6089
80fccad2
BW
6090/* Copy private header information. */
6091
6092bfd_boolean
6093_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6094{
30288845
AM
6095 asection *isec;
6096
80fccad2
BW
6097 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6098 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6099 return TRUE;
6100
6101 /* Copy over private BFD data if it has not already been copied.
6102 This must be done here, rather than in the copy_private_bfd_data
6103 entry point, because the latter is called after the section
6104 contents have been set, which means that the program headers have
6105 already been worked out. */
6106 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6107 {
6108 if (! copy_private_bfd_data (ibfd, obfd))
6109 return FALSE;
6110 }
6111
30288845
AM
6112 /* _bfd_elf_copy_private_section_data copied over the SHF_GROUP flag
6113 but this might be wrong if we deleted the group section. */
6114 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
6115 if (elf_section_type (isec) == SHT_GROUP
6116 && isec->output_section == NULL)
6117 {
6118 asection *first = elf_next_in_group (isec);
6119 asection *s = first;
6120 while (s != NULL)
6121 {
6122 if (s->output_section != NULL)
6123 {
6124 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6125 elf_group_name (s->output_section) = NULL;
6126 }
6127 s = elf_next_in_group (s);
6128 if (s == first)
6129 break;
6130 }
6131 }
6132
80fccad2
BW
6133 return TRUE;
6134}
6135
252b5132
RH
6136/* Copy private symbol information. If this symbol is in a section
6137 which we did not map into a BFD section, try to map the section
6138 index correctly. We use special macro definitions for the mapped
6139 section indices; these definitions are interpreted by the
6140 swap_out_syms function. */
6141
9ad5cbcf
AM
6142#define MAP_ONESYMTAB (SHN_HIOS + 1)
6143#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6144#define MAP_STRTAB (SHN_HIOS + 3)
6145#define MAP_SHSTRTAB (SHN_HIOS + 4)
6146#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6147
b34976b6 6148bfd_boolean
217aa764
AM
6149_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6150 asymbol *isymarg,
6151 bfd *obfd,
6152 asymbol *osymarg)
252b5132
RH
6153{
6154 elf_symbol_type *isym, *osym;
6155
6156 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6157 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6158 return TRUE;
252b5132
RH
6159
6160 isym = elf_symbol_from (ibfd, isymarg);
6161 osym = elf_symbol_from (obfd, osymarg);
6162
6163 if (isym != NULL
8424d8f5 6164 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6165 && osym != NULL
6166 && bfd_is_abs_section (isym->symbol.section))
6167 {
6168 unsigned int shndx;
6169
6170 shndx = isym->internal_elf_sym.st_shndx;
6171 if (shndx == elf_onesymtab (ibfd))
6172 shndx = MAP_ONESYMTAB;
6173 else if (shndx == elf_dynsymtab (ibfd))
6174 shndx = MAP_DYNSYMTAB;
6175 else if (shndx == elf_tdata (ibfd)->strtab_section)
6176 shndx = MAP_STRTAB;
6177 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6178 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6179 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6180 shndx = MAP_SYM_SHNDX;
252b5132
RH
6181 osym->internal_elf_sym.st_shndx = shndx;
6182 }
6183
b34976b6 6184 return TRUE;
252b5132
RH
6185}
6186
6187/* Swap out the symbols. */
6188
b34976b6 6189static bfd_boolean
217aa764
AM
6190swap_out_syms (bfd *abfd,
6191 struct bfd_strtab_hash **sttp,
6192 int relocatable_p)
252b5132 6193{
9c5bfbb7 6194 const struct elf_backend_data *bed;
079e9a2f
AM
6195 int symcount;
6196 asymbol **syms;
6197 struct bfd_strtab_hash *stt;
6198 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6199 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6200 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6201 bfd_byte *outbound_syms;
6202 bfd_byte *outbound_shndx;
079e9a2f
AM
6203 int idx;
6204 bfd_size_type amt;
174fd7f9 6205 bfd_boolean name_local_sections;
252b5132
RH
6206
6207 if (!elf_map_symbols (abfd))
b34976b6 6208 return FALSE;
252b5132 6209
c044fabd 6210 /* Dump out the symtabs. */
079e9a2f
AM
6211 stt = _bfd_elf_stringtab_init ();
6212 if (stt == NULL)
b34976b6 6213 return FALSE;
252b5132 6214
079e9a2f
AM
6215 bed = get_elf_backend_data (abfd);
6216 symcount = bfd_get_symcount (abfd);
6217 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6218 symtab_hdr->sh_type = SHT_SYMTAB;
6219 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6220 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6221 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
72de5009 6222 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6223
6224 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6225 symstrtab_hdr->sh_type = SHT_STRTAB;
6226
d0fb9a8d 6227 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 6228 if (outbound_syms == NULL)
5ed6aba4
NC
6229 {
6230 _bfd_stringtab_free (stt);
6231 return FALSE;
6232 }
217aa764 6233 symtab_hdr->contents = outbound_syms;
252b5132 6234
9ad5cbcf
AM
6235 outbound_shndx = NULL;
6236 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6237 if (symtab_shndx_hdr->sh_name != 0)
6238 {
6239 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
6240 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
6241 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6242 if (outbound_shndx == NULL)
5ed6aba4
NC
6243 {
6244 _bfd_stringtab_free (stt);
6245 return FALSE;
6246 }
6247
9ad5cbcf
AM
6248 symtab_shndx_hdr->contents = outbound_shndx;
6249 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6250 symtab_shndx_hdr->sh_size = amt;
6251 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6252 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6253 }
6254
589e6347 6255 /* Now generate the data (for "contents"). */
079e9a2f
AM
6256 {
6257 /* Fill in zeroth symbol and swap it out. */
6258 Elf_Internal_Sym sym;
6259 sym.st_name = 0;
6260 sym.st_value = 0;
6261 sym.st_size = 0;
6262 sym.st_info = 0;
6263 sym.st_other = 0;
6264 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6265 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6266 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6267 if (outbound_shndx != NULL)
6268 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6269 }
252b5132 6270
174fd7f9
RS
6271 name_local_sections
6272 = (bed->elf_backend_name_local_section_symbols
6273 && bed->elf_backend_name_local_section_symbols (abfd));
6274
079e9a2f
AM
6275 syms = bfd_get_outsymbols (abfd);
6276 for (idx = 0; idx < symcount; idx++)
252b5132 6277 {
252b5132 6278 Elf_Internal_Sym sym;
079e9a2f
AM
6279 bfd_vma value = syms[idx]->value;
6280 elf_symbol_type *type_ptr;
6281 flagword flags = syms[idx]->flags;
6282 int type;
252b5132 6283
174fd7f9
RS
6284 if (!name_local_sections
6285 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6286 {
6287 /* Local section symbols have no name. */
6288 sym.st_name = 0;
6289 }
6290 else
6291 {
6292 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6293 syms[idx]->name,
b34976b6 6294 TRUE, FALSE);
079e9a2f 6295 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6296 {
6297 _bfd_stringtab_free (stt);
6298 return FALSE;
6299 }
079e9a2f 6300 }
252b5132 6301
079e9a2f 6302 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6303
079e9a2f
AM
6304 if ((flags & BSF_SECTION_SYM) == 0
6305 && bfd_is_com_section (syms[idx]->section))
6306 {
6307 /* ELF common symbols put the alignment into the `value' field,
6308 and the size into the `size' field. This is backwards from
6309 how BFD handles it, so reverse it here. */
6310 sym.st_size = value;
6311 if (type_ptr == NULL
6312 || type_ptr->internal_elf_sym.st_value == 0)
6313 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6314 else
6315 sym.st_value = type_ptr->internal_elf_sym.st_value;
6316 sym.st_shndx = _bfd_elf_section_from_bfd_section
6317 (abfd, syms[idx]->section);
6318 }
6319 else
6320 {
6321 asection *sec = syms[idx]->section;
cb33740c 6322 unsigned int shndx;
252b5132 6323
079e9a2f
AM
6324 if (sec->output_section)
6325 {
6326 value += sec->output_offset;
6327 sec = sec->output_section;
6328 }
589e6347 6329
079e9a2f
AM
6330 /* Don't add in the section vma for relocatable output. */
6331 if (! relocatable_p)
6332 value += sec->vma;
6333 sym.st_value = value;
6334 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6335
6336 if (bfd_is_abs_section (sec)
6337 && type_ptr != NULL
6338 && type_ptr->internal_elf_sym.st_shndx != 0)
6339 {
6340 /* This symbol is in a real ELF section which we did
6341 not create as a BFD section. Undo the mapping done
6342 by copy_private_symbol_data. */
6343 shndx = type_ptr->internal_elf_sym.st_shndx;
6344 switch (shndx)
6345 {
6346 case MAP_ONESYMTAB:
6347 shndx = elf_onesymtab (abfd);
6348 break;
6349 case MAP_DYNSYMTAB:
6350 shndx = elf_dynsymtab (abfd);
6351 break;
6352 case MAP_STRTAB:
6353 shndx = elf_tdata (abfd)->strtab_section;
6354 break;
6355 case MAP_SHSTRTAB:
6356 shndx = elf_tdata (abfd)->shstrtab_section;
6357 break;
9ad5cbcf
AM
6358 case MAP_SYM_SHNDX:
6359 shndx = elf_tdata (abfd)->symtab_shndx_section;
6360 break;
079e9a2f
AM
6361 default:
6362 break;
6363 }
6364 }
6365 else
6366 {
6367 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6368
cb33740c 6369 if (shndx == SHN_BAD)
079e9a2f
AM
6370 {
6371 asection *sec2;
6372
6373 /* Writing this would be a hell of a lot easier if
6374 we had some decent documentation on bfd, and
6375 knew what to expect of the library, and what to
6376 demand of applications. For example, it
6377 appears that `objcopy' might not set the
6378 section of a symbol to be a section that is
6379 actually in the output file. */
6380 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6381 if (sec2 == NULL)
6382 {
6383 _bfd_error_handler (_("\
6384Unable to find equivalent output section for symbol '%s' from section '%s'"),
6385 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6386 sec->name);
811072d8 6387 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6388 _bfd_stringtab_free (stt);
589e6347
NC
6389 return FALSE;
6390 }
811072d8 6391
079e9a2f 6392 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6393 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6394 }
6395 }
252b5132 6396
079e9a2f
AM
6397 sym.st_shndx = shndx;
6398 }
252b5132 6399
13ae64f3
JJ
6400 if ((flags & BSF_THREAD_LOCAL) != 0)
6401 type = STT_TLS;
d8045f23
NC
6402 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6403 type = STT_GNU_IFUNC;
13ae64f3 6404 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6405 type = STT_FUNC;
6406 else if ((flags & BSF_OBJECT) != 0)
6407 type = STT_OBJECT;
d9352518
DB
6408 else if ((flags & BSF_RELC) != 0)
6409 type = STT_RELC;
6410 else if ((flags & BSF_SRELC) != 0)
6411 type = STT_SRELC;
079e9a2f
AM
6412 else
6413 type = STT_NOTYPE;
252b5132 6414
13ae64f3
JJ
6415 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6416 type = STT_TLS;
6417
589e6347 6418 /* Processor-specific types. */
079e9a2f
AM
6419 if (type_ptr != NULL
6420 && bed->elf_backend_get_symbol_type)
6421 type = ((*bed->elf_backend_get_symbol_type)
6422 (&type_ptr->internal_elf_sym, type));
252b5132 6423
079e9a2f
AM
6424 if (flags & BSF_SECTION_SYM)
6425 {
6426 if (flags & BSF_GLOBAL)
6427 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6428 else
6429 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6430 }
6431 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6432 {
504b7d20 6433#ifdef USE_STT_COMMON
0a40daed
MK
6434 if (type == STT_OBJECT)
6435 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6436 else
504b7d20 6437#endif
c91e322a 6438 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6439 }
079e9a2f
AM
6440 else if (bfd_is_und_section (syms[idx]->section))
6441 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6442 ? STB_WEAK
6443 : STB_GLOBAL),
6444 type);
6445 else if (flags & BSF_FILE)
6446 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6447 else
6448 {
6449 int bind = STB_LOCAL;
252b5132 6450
079e9a2f
AM
6451 if (flags & BSF_LOCAL)
6452 bind = STB_LOCAL;
6453 else if (flags & BSF_WEAK)
6454 bind = STB_WEAK;
6455 else if (flags & BSF_GLOBAL)
6456 bind = STB_GLOBAL;
252b5132 6457
079e9a2f
AM
6458 sym.st_info = ELF_ST_INFO (bind, type);
6459 }
252b5132 6460
079e9a2f
AM
6461 if (type_ptr != NULL)
6462 sym.st_other = type_ptr->internal_elf_sym.st_other;
6463 else
6464 sym.st_other = 0;
252b5132 6465
9ad5cbcf 6466 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6467 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6468 if (outbound_shndx != NULL)
6469 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6470 }
252b5132 6471
079e9a2f
AM
6472 *sttp = stt;
6473 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6474 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6475
079e9a2f
AM
6476 symstrtab_hdr->sh_flags = 0;
6477 symstrtab_hdr->sh_addr = 0;
6478 symstrtab_hdr->sh_entsize = 0;
6479 symstrtab_hdr->sh_link = 0;
6480 symstrtab_hdr->sh_info = 0;
6481 symstrtab_hdr->sh_addralign = 1;
252b5132 6482
b34976b6 6483 return TRUE;
252b5132
RH
6484}
6485
6486/* Return the number of bytes required to hold the symtab vector.
6487
6488 Note that we base it on the count plus 1, since we will null terminate
6489 the vector allocated based on this size. However, the ELF symbol table
6490 always has a dummy entry as symbol #0, so it ends up even. */
6491
6492long
217aa764 6493_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6494{
6495 long symcount;
6496 long symtab_size;
6497 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6498
6499 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6500 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6501 if (symcount > 0)
6502 symtab_size -= sizeof (asymbol *);
252b5132
RH
6503
6504 return symtab_size;
6505}
6506
6507long
217aa764 6508_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6509{
6510 long symcount;
6511 long symtab_size;
6512 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6513
6514 if (elf_dynsymtab (abfd) == 0)
6515 {
6516 bfd_set_error (bfd_error_invalid_operation);
6517 return -1;
6518 }
6519
6520 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6521 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6522 if (symcount > 0)
6523 symtab_size -= sizeof (asymbol *);
252b5132
RH
6524
6525 return symtab_size;
6526}
6527
6528long
217aa764
AM
6529_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6530 sec_ptr asect)
252b5132
RH
6531{
6532 return (asect->reloc_count + 1) * sizeof (arelent *);
6533}
6534
6535/* Canonicalize the relocs. */
6536
6537long
217aa764
AM
6538_bfd_elf_canonicalize_reloc (bfd *abfd,
6539 sec_ptr section,
6540 arelent **relptr,
6541 asymbol **symbols)
252b5132
RH
6542{
6543 arelent *tblptr;
6544 unsigned int i;
9c5bfbb7 6545 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6546
b34976b6 6547 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6548 return -1;
6549
6550 tblptr = section->relocation;
6551 for (i = 0; i < section->reloc_count; i++)
6552 *relptr++ = tblptr++;
6553
6554 *relptr = NULL;
6555
6556 return section->reloc_count;
6557}
6558
6559long
6cee3f79 6560_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6561{
9c5bfbb7 6562 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6563 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6564
6565 if (symcount >= 0)
6566 bfd_get_symcount (abfd) = symcount;
6567 return symcount;
6568}
6569
6570long
217aa764
AM
6571_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6572 asymbol **allocation)
252b5132 6573{
9c5bfbb7 6574 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6575 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6576
6577 if (symcount >= 0)
6578 bfd_get_dynamic_symcount (abfd) = symcount;
6579 return symcount;
252b5132
RH
6580}
6581
8615f3f2
AM
6582/* Return the size required for the dynamic reloc entries. Any loadable
6583 section that was actually installed in the BFD, and has type SHT_REL
6584 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6585 dynamic reloc section. */
252b5132
RH
6586
6587long
217aa764 6588_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6589{
6590 long ret;
6591 asection *s;
6592
6593 if (elf_dynsymtab (abfd) == 0)
6594 {
6595 bfd_set_error (bfd_error_invalid_operation);
6596 return -1;
6597 }
6598
6599 ret = sizeof (arelent *);
6600 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 6601 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6602 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6603 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6604 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6605 * sizeof (arelent *));
6606
6607 return ret;
6608}
6609
8615f3f2
AM
6610/* Canonicalize the dynamic relocation entries. Note that we return the
6611 dynamic relocations as a single block, although they are actually
6612 associated with particular sections; the interface, which was
6613 designed for SunOS style shared libraries, expects that there is only
6614 one set of dynamic relocs. Any loadable section that was actually
6615 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6616 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6617
6618long
217aa764
AM
6619_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6620 arelent **storage,
6621 asymbol **syms)
252b5132 6622{
217aa764 6623 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6624 asection *s;
6625 long ret;
6626
6627 if (elf_dynsymtab (abfd) == 0)
6628 {
6629 bfd_set_error (bfd_error_invalid_operation);
6630 return -1;
6631 }
6632
6633 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6634 ret = 0;
6635 for (s = abfd->sections; s != NULL; s = s->next)
6636 {
266b05cf 6637 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6638 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6639 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6640 {
6641 arelent *p;
6642 long count, i;
6643
b34976b6 6644 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6645 return -1;
eea6121a 6646 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6647 p = s->relocation;
6648 for (i = 0; i < count; i++)
6649 *storage++ = p++;
6650 ret += count;
6651 }
6652 }
6653
6654 *storage = NULL;
6655
6656 return ret;
6657}
6658\f
6659/* Read in the version information. */
6660
b34976b6 6661bfd_boolean
fc0e6df6 6662_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6663{
6664 bfd_byte *contents = NULL;
fc0e6df6
PB
6665 unsigned int freeidx = 0;
6666
6667 if (elf_dynverref (abfd) != 0)
6668 {
6669 Elf_Internal_Shdr *hdr;
6670 Elf_External_Verneed *everneed;
6671 Elf_Internal_Verneed *iverneed;
6672 unsigned int i;
d0fb9a8d 6673 bfd_byte *contents_end;
fc0e6df6
PB
6674
6675 hdr = &elf_tdata (abfd)->dynverref_hdr;
6676
d0fb9a8d
JJ
6677 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6678 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6679 if (elf_tdata (abfd)->verref == NULL)
6680 goto error_return;
6681
6682 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6683
6684 contents = bfd_malloc (hdr->sh_size);
6685 if (contents == NULL)
d0fb9a8d
JJ
6686 {
6687error_return_verref:
6688 elf_tdata (abfd)->verref = NULL;
6689 elf_tdata (abfd)->cverrefs = 0;
6690 goto error_return;
6691 }
fc0e6df6
PB
6692 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6693 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6694 goto error_return_verref;
fc0e6df6 6695
d0fb9a8d
JJ
6696 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6697 goto error_return_verref;
6698
6699 BFD_ASSERT (sizeof (Elf_External_Verneed)
6700 == sizeof (Elf_External_Vernaux));
6701 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6702 everneed = (Elf_External_Verneed *) contents;
6703 iverneed = elf_tdata (abfd)->verref;
6704 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6705 {
6706 Elf_External_Vernaux *evernaux;
6707 Elf_Internal_Vernaux *ivernaux;
6708 unsigned int j;
6709
6710 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6711
6712 iverneed->vn_bfd = abfd;
6713
6714 iverneed->vn_filename =
6715 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6716 iverneed->vn_file);
6717 if (iverneed->vn_filename == NULL)
d0fb9a8d 6718 goto error_return_verref;
fc0e6df6 6719
d0fb9a8d
JJ
6720 if (iverneed->vn_cnt == 0)
6721 iverneed->vn_auxptr = NULL;
6722 else
6723 {
6724 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6725 sizeof (Elf_Internal_Vernaux));
6726 if (iverneed->vn_auxptr == NULL)
6727 goto error_return_verref;
6728 }
6729
6730 if (iverneed->vn_aux
6731 > (size_t) (contents_end - (bfd_byte *) everneed))
6732 goto error_return_verref;
fc0e6df6
PB
6733
6734 evernaux = ((Elf_External_Vernaux *)
6735 ((bfd_byte *) everneed + iverneed->vn_aux));
6736 ivernaux = iverneed->vn_auxptr;
6737 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6738 {
6739 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6740
6741 ivernaux->vna_nodename =
6742 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6743 ivernaux->vna_name);
6744 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6745 goto error_return_verref;
fc0e6df6
PB
6746
6747 if (j + 1 < iverneed->vn_cnt)
6748 ivernaux->vna_nextptr = ivernaux + 1;
6749 else
6750 ivernaux->vna_nextptr = NULL;
6751
d0fb9a8d
JJ
6752 if (ivernaux->vna_next
6753 > (size_t) (contents_end - (bfd_byte *) evernaux))
6754 goto error_return_verref;
6755
fc0e6df6
PB
6756 evernaux = ((Elf_External_Vernaux *)
6757 ((bfd_byte *) evernaux + ivernaux->vna_next));
6758
6759 if (ivernaux->vna_other > freeidx)
6760 freeidx = ivernaux->vna_other;
6761 }
6762
6763 if (i + 1 < hdr->sh_info)
6764 iverneed->vn_nextref = iverneed + 1;
6765 else
6766 iverneed->vn_nextref = NULL;
6767
d0fb9a8d
JJ
6768 if (iverneed->vn_next
6769 > (size_t) (contents_end - (bfd_byte *) everneed))
6770 goto error_return_verref;
6771
fc0e6df6
PB
6772 everneed = ((Elf_External_Verneed *)
6773 ((bfd_byte *) everneed + iverneed->vn_next));
6774 }
6775
6776 free (contents);
6777 contents = NULL;
6778 }
252b5132
RH
6779
6780 if (elf_dynverdef (abfd) != 0)
6781 {
6782 Elf_Internal_Shdr *hdr;
6783 Elf_External_Verdef *everdef;
6784 Elf_Internal_Verdef *iverdef;
f631889e
UD
6785 Elf_Internal_Verdef *iverdefarr;
6786 Elf_Internal_Verdef iverdefmem;
252b5132 6787 unsigned int i;
062e2358 6788 unsigned int maxidx;
d0fb9a8d 6789 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6790
6791 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6792
217aa764 6793 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6794 if (contents == NULL)
6795 goto error_return;
6796 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6797 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6798 goto error_return;
6799
d0fb9a8d
JJ
6800 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6801 goto error_return;
6802
6803 BFD_ASSERT (sizeof (Elf_External_Verdef)
6804 >= sizeof (Elf_External_Verdaux));
6805 contents_end_def = contents + hdr->sh_size
6806 - sizeof (Elf_External_Verdef);
6807 contents_end_aux = contents + hdr->sh_size
6808 - sizeof (Elf_External_Verdaux);
6809
f631889e
UD
6810 /* We know the number of entries in the section but not the maximum
6811 index. Therefore we have to run through all entries and find
6812 the maximum. */
252b5132 6813 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6814 maxidx = 0;
6815 for (i = 0; i < hdr->sh_info; ++i)
6816 {
6817 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6818
062e2358
AM
6819 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6820 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6821
d0fb9a8d
JJ
6822 if (iverdefmem.vd_next
6823 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6824 goto error_return;
6825
f631889e
UD
6826 everdef = ((Elf_External_Verdef *)
6827 ((bfd_byte *) everdef + iverdefmem.vd_next));
6828 }
6829
fc0e6df6
PB
6830 if (default_imported_symver)
6831 {
6832 if (freeidx > maxidx)
6833 maxidx = ++freeidx;
6834 else
6835 freeidx = ++maxidx;
6836 }
d0fb9a8d
JJ
6837 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6838 sizeof (Elf_Internal_Verdef));
f631889e
UD
6839 if (elf_tdata (abfd)->verdef == NULL)
6840 goto error_return;
6841
6842 elf_tdata (abfd)->cverdefs = maxidx;
6843
6844 everdef = (Elf_External_Verdef *) contents;
6845 iverdefarr = elf_tdata (abfd)->verdef;
6846 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6847 {
6848 Elf_External_Verdaux *everdaux;
6849 Elf_Internal_Verdaux *iverdaux;
6850 unsigned int j;
6851
f631889e
UD
6852 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6853
d0fb9a8d
JJ
6854 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6855 {
6856error_return_verdef:
6857 elf_tdata (abfd)->verdef = NULL;
6858 elf_tdata (abfd)->cverdefs = 0;
6859 goto error_return;
6860 }
6861
f631889e
UD
6862 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6863 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6864
6865 iverdef->vd_bfd = abfd;
6866
d0fb9a8d
JJ
6867 if (iverdef->vd_cnt == 0)
6868 iverdef->vd_auxptr = NULL;
6869 else
6870 {
6871 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6872 sizeof (Elf_Internal_Verdaux));
6873 if (iverdef->vd_auxptr == NULL)
6874 goto error_return_verdef;
6875 }
6876
6877 if (iverdef->vd_aux
6878 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6879 goto error_return_verdef;
252b5132
RH
6880
6881 everdaux = ((Elf_External_Verdaux *)
6882 ((bfd_byte *) everdef + iverdef->vd_aux));
6883 iverdaux = iverdef->vd_auxptr;
6884 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6885 {
6886 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6887
6888 iverdaux->vda_nodename =
6889 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6890 iverdaux->vda_name);
6891 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6892 goto error_return_verdef;
252b5132
RH
6893
6894 if (j + 1 < iverdef->vd_cnt)
6895 iverdaux->vda_nextptr = iverdaux + 1;
6896 else
6897 iverdaux->vda_nextptr = NULL;
6898
d0fb9a8d
JJ
6899 if (iverdaux->vda_next
6900 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6901 goto error_return_verdef;
6902
252b5132
RH
6903 everdaux = ((Elf_External_Verdaux *)
6904 ((bfd_byte *) everdaux + iverdaux->vda_next));
6905 }
6906
d0fb9a8d
JJ
6907 if (iverdef->vd_cnt)
6908 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6909
d0fb9a8d 6910 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6911 iverdef->vd_nextdef = iverdef + 1;
6912 else
6913 iverdef->vd_nextdef = NULL;
6914
6915 everdef = ((Elf_External_Verdef *)
6916 ((bfd_byte *) everdef + iverdef->vd_next));
6917 }
6918
6919 free (contents);
6920 contents = NULL;
6921 }
fc0e6df6 6922 else if (default_imported_symver)
252b5132 6923 {
fc0e6df6
PB
6924 if (freeidx < 3)
6925 freeidx = 3;
6926 else
6927 freeidx++;
252b5132 6928
d0fb9a8d
JJ
6929 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6930 sizeof (Elf_Internal_Verdef));
fc0e6df6 6931 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6932 goto error_return;
6933
fc0e6df6
PB
6934 elf_tdata (abfd)->cverdefs = freeidx;
6935 }
252b5132 6936
fc0e6df6
PB
6937 /* Create a default version based on the soname. */
6938 if (default_imported_symver)
6939 {
6940 Elf_Internal_Verdef *iverdef;
6941 Elf_Internal_Verdaux *iverdaux;
252b5132 6942
fc0e6df6 6943 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6944
fc0e6df6
PB
6945 iverdef->vd_version = VER_DEF_CURRENT;
6946 iverdef->vd_flags = 0;
6947 iverdef->vd_ndx = freeidx;
6948 iverdef->vd_cnt = 1;
252b5132 6949
fc0e6df6 6950 iverdef->vd_bfd = abfd;
252b5132 6951
fc0e6df6
PB
6952 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6953 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6954 goto error_return_verdef;
fc0e6df6 6955 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6956 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6957 if (iverdef->vd_auxptr == NULL)
6958 goto error_return_verdef;
252b5132 6959
fc0e6df6
PB
6960 iverdaux = iverdef->vd_auxptr;
6961 iverdaux->vda_nodename = iverdef->vd_nodename;
6962 iverdaux->vda_nextptr = NULL;
252b5132
RH
6963 }
6964
b34976b6 6965 return TRUE;
252b5132
RH
6966
6967 error_return:
5ed6aba4 6968 if (contents != NULL)
252b5132 6969 free (contents);
b34976b6 6970 return FALSE;
252b5132
RH
6971}
6972\f
6973asymbol *
217aa764 6974_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
6975{
6976 elf_symbol_type *newsym;
dc810e39 6977 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 6978
217aa764 6979 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
6980 if (!newsym)
6981 return NULL;
6982 else
6983 {
6984 newsym->symbol.the_bfd = abfd;
6985 return &newsym->symbol;
6986 }
6987}
6988
6989void
217aa764
AM
6990_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
6991 asymbol *symbol,
6992 symbol_info *ret)
252b5132
RH
6993{
6994 bfd_symbol_info (symbol, ret);
6995}
6996
6997/* Return whether a symbol name implies a local symbol. Most targets
6998 use this function for the is_local_label_name entry point, but some
6999 override it. */
7000
b34976b6 7001bfd_boolean
217aa764
AM
7002_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7003 const char *name)
252b5132
RH
7004{
7005 /* Normal local symbols start with ``.L''. */
7006 if (name[0] == '.' && name[1] == 'L')
b34976b6 7007 return TRUE;
252b5132
RH
7008
7009 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7010 DWARF debugging symbols starting with ``..''. */
7011 if (name[0] == '.' && name[1] == '.')
b34976b6 7012 return TRUE;
252b5132
RH
7013
7014 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7015 emitting DWARF debugging output. I suspect this is actually a
7016 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7017 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7018 underscore to be emitted on some ELF targets). For ease of use,
7019 we treat such symbols as local. */
7020 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7021 return TRUE;
252b5132 7022
b34976b6 7023 return FALSE;
252b5132
RH
7024}
7025
7026alent *
217aa764
AM
7027_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7028 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7029{
7030 abort ();
7031 return NULL;
7032}
7033
b34976b6 7034bfd_boolean
217aa764
AM
7035_bfd_elf_set_arch_mach (bfd *abfd,
7036 enum bfd_architecture arch,
7037 unsigned long machine)
252b5132
RH
7038{
7039 /* If this isn't the right architecture for this backend, and this
7040 isn't the generic backend, fail. */
7041 if (arch != get_elf_backend_data (abfd)->arch
7042 && arch != bfd_arch_unknown
7043 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7044 return FALSE;
252b5132
RH
7045
7046 return bfd_default_set_arch_mach (abfd, arch, machine);
7047}
7048
d1fad7c6
NC
7049/* Find the function to a particular section and offset,
7050 for error reporting. */
252b5132 7051
b34976b6 7052static bfd_boolean
b9d678e0 7053elf_find_function (bfd *abfd,
217aa764
AM
7054 asection *section,
7055 asymbol **symbols,
7056 bfd_vma offset,
7057 const char **filename_ptr,
7058 const char **functionname_ptr)
252b5132 7059{
252b5132 7060 const char *filename;
57426232 7061 asymbol *func, *file;
252b5132
RH
7062 bfd_vma low_func;
7063 asymbol **p;
57426232
JB
7064 /* ??? Given multiple file symbols, it is impossible to reliably
7065 choose the right file name for global symbols. File symbols are
7066 local symbols, and thus all file symbols must sort before any
7067 global symbols. The ELF spec may be interpreted to say that a
7068 file symbol must sort before other local symbols, but currently
7069 ld -r doesn't do this. So, for ld -r output, it is possible to
7070 make a better choice of file name for local symbols by ignoring
7071 file symbols appearing after a given local symbol. */
7072 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
b9d678e0 7073 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7074
252b5132
RH
7075 filename = NULL;
7076 func = NULL;
57426232 7077 file = NULL;
252b5132 7078 low_func = 0;
57426232 7079 state = nothing_seen;
252b5132
RH
7080
7081 for (p = symbols; *p != NULL; p++)
7082 {
7083 elf_symbol_type *q;
b9d678e0 7084 unsigned int type;
252b5132
RH
7085
7086 q = (elf_symbol_type *) *p;
7087
b9d678e0
L
7088 type = ELF_ST_TYPE (q->internal_elf_sym.st_info);
7089 switch (type)
252b5132 7090 {
252b5132 7091 case STT_FILE:
57426232
JB
7092 file = &q->symbol;
7093 if (state == symbol_seen)
7094 state = file_after_symbol_seen;
7095 continue;
b9d678e0
L
7096 default:
7097 if (!bed->is_function_type (type))
7098 break;
252b5132 7099 case STT_NOTYPE:
6b40fcba 7100 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7101 && q->symbol.value >= low_func
7102 && q->symbol.value <= offset)
7103 {
7104 func = (asymbol *) q;
7105 low_func = q->symbol.value;
a1923858
AM
7106 filename = NULL;
7107 if (file != NULL
7108 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7109 || state != file_after_symbol_seen))
57426232 7110 filename = bfd_asymbol_name (file);
252b5132
RH
7111 }
7112 break;
7113 }
57426232
JB
7114 if (state == nothing_seen)
7115 state = symbol_seen;
252b5132
RH
7116 }
7117
7118 if (func == NULL)
b34976b6 7119 return FALSE;
252b5132 7120
d1fad7c6
NC
7121 if (filename_ptr)
7122 *filename_ptr = filename;
7123 if (functionname_ptr)
7124 *functionname_ptr = bfd_asymbol_name (func);
7125
b34976b6 7126 return TRUE;
d1fad7c6
NC
7127}
7128
7129/* Find the nearest line to a particular section and offset,
7130 for error reporting. */
7131
b34976b6 7132bfd_boolean
217aa764
AM
7133_bfd_elf_find_nearest_line (bfd *abfd,
7134 asection *section,
7135 asymbol **symbols,
7136 bfd_vma offset,
7137 const char **filename_ptr,
7138 const char **functionname_ptr,
7139 unsigned int *line_ptr)
d1fad7c6 7140{
b34976b6 7141 bfd_boolean found;
d1fad7c6
NC
7142
7143 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7144 filename_ptr, functionname_ptr,
7145 line_ptr))
d1fad7c6
NC
7146 {
7147 if (!*functionname_ptr)
4e8a9624
AM
7148 elf_find_function (abfd, section, symbols, offset,
7149 *filename_ptr ? NULL : filename_ptr,
7150 functionname_ptr);
7151
b34976b6 7152 return TRUE;
d1fad7c6
NC
7153 }
7154
7155 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7156 filename_ptr, functionname_ptr,
7157 line_ptr, 0,
7158 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7159 {
7160 if (!*functionname_ptr)
4e8a9624
AM
7161 elf_find_function (abfd, section, symbols, offset,
7162 *filename_ptr ? NULL : filename_ptr,
7163 functionname_ptr);
7164
b34976b6 7165 return TRUE;
d1fad7c6
NC
7166 }
7167
7168 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7169 &found, filename_ptr,
7170 functionname_ptr, line_ptr,
7171 &elf_tdata (abfd)->line_info))
b34976b6 7172 return FALSE;
dc43ada5 7173 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7174 return TRUE;
d1fad7c6
NC
7175
7176 if (symbols == NULL)
b34976b6 7177 return FALSE;
d1fad7c6
NC
7178
7179 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7180 filename_ptr, functionname_ptr))
b34976b6 7181 return FALSE;
d1fad7c6 7182
252b5132 7183 *line_ptr = 0;
b34976b6 7184 return TRUE;
252b5132
RH
7185}
7186
5420f73d
L
7187/* Find the line for a symbol. */
7188
7189bfd_boolean
7190_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7191 const char **filename_ptr, unsigned int *line_ptr)
7192{
7193 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7194 filename_ptr, line_ptr, 0,
7195 &elf_tdata (abfd)->dwarf2_find_line_info);
7196}
7197
4ab527b0
FF
7198/* After a call to bfd_find_nearest_line, successive calls to
7199 bfd_find_inliner_info can be used to get source information about
7200 each level of function inlining that terminated at the address
7201 passed to bfd_find_nearest_line. Currently this is only supported
7202 for DWARF2 with appropriate DWARF3 extensions. */
7203
7204bfd_boolean
7205_bfd_elf_find_inliner_info (bfd *abfd,
7206 const char **filename_ptr,
7207 const char **functionname_ptr,
7208 unsigned int *line_ptr)
7209{
7210 bfd_boolean found;
7211 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7212 functionname_ptr, line_ptr,
7213 & elf_tdata (abfd)->dwarf2_find_line_info);
7214 return found;
7215}
7216
252b5132 7217int
a6b96beb 7218_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7219{
8ded5a0f
AM
7220 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7221 int ret = bed->s->sizeof_ehdr;
252b5132 7222
a6b96beb 7223 if (!info->relocatable)
8ded5a0f 7224 {
62d7a5f6 7225 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7226
62d7a5f6
AM
7227 if (phdr_size == (bfd_size_type) -1)
7228 {
7229 struct elf_segment_map *m;
7230
7231 phdr_size = 0;
7232 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7233 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7234
62d7a5f6
AM
7235 if (phdr_size == 0)
7236 phdr_size = get_program_header_size (abfd, info);
7237 }
8ded5a0f
AM
7238
7239 elf_tdata (abfd)->program_header_size = phdr_size;
7240 ret += phdr_size;
7241 }
7242
252b5132
RH
7243 return ret;
7244}
7245
b34976b6 7246bfd_boolean
217aa764
AM
7247_bfd_elf_set_section_contents (bfd *abfd,
7248 sec_ptr section,
0f867abe 7249 const void *location,
217aa764
AM
7250 file_ptr offset,
7251 bfd_size_type count)
252b5132
RH
7252{
7253 Elf_Internal_Shdr *hdr;
dc810e39 7254 bfd_signed_vma pos;
252b5132
RH
7255
7256 if (! abfd->output_has_begun
217aa764 7257 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7258 return FALSE;
252b5132
RH
7259
7260 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7261 pos = hdr->sh_offset + offset;
7262 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7263 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7264 return FALSE;
252b5132 7265
b34976b6 7266 return TRUE;
252b5132
RH
7267}
7268
7269void
217aa764
AM
7270_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7271 arelent *cache_ptr ATTRIBUTE_UNUSED,
7272 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7273{
7274 abort ();
7275}
7276
252b5132
RH
7277/* Try to convert a non-ELF reloc into an ELF one. */
7278
b34976b6 7279bfd_boolean
217aa764 7280_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7281{
c044fabd 7282 /* Check whether we really have an ELF howto. */
252b5132
RH
7283
7284 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7285 {
7286 bfd_reloc_code_real_type code;
7287 reloc_howto_type *howto;
7288
7289 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7290 equivalent ELF reloc. */
252b5132
RH
7291
7292 if (areloc->howto->pc_relative)
7293 {
7294 switch (areloc->howto->bitsize)
7295 {
7296 case 8:
7297 code = BFD_RELOC_8_PCREL;
7298 break;
7299 case 12:
7300 code = BFD_RELOC_12_PCREL;
7301 break;
7302 case 16:
7303 code = BFD_RELOC_16_PCREL;
7304 break;
7305 case 24:
7306 code = BFD_RELOC_24_PCREL;
7307 break;
7308 case 32:
7309 code = BFD_RELOC_32_PCREL;
7310 break;
7311 case 64:
7312 code = BFD_RELOC_64_PCREL;
7313 break;
7314 default:
7315 goto fail;
7316 }
7317
7318 howto = bfd_reloc_type_lookup (abfd, code);
7319
7320 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7321 {
7322 if (howto->pcrel_offset)
7323 areloc->addend += areloc->address;
7324 else
7325 areloc->addend -= areloc->address; /* addend is unsigned!! */
7326 }
7327 }
7328 else
7329 {
7330 switch (areloc->howto->bitsize)
7331 {
7332 case 8:
7333 code = BFD_RELOC_8;
7334 break;
7335 case 14:
7336 code = BFD_RELOC_14;
7337 break;
7338 case 16:
7339 code = BFD_RELOC_16;
7340 break;
7341 case 26:
7342 code = BFD_RELOC_26;
7343 break;
7344 case 32:
7345 code = BFD_RELOC_32;
7346 break;
7347 case 64:
7348 code = BFD_RELOC_64;
7349 break;
7350 default:
7351 goto fail;
7352 }
7353
7354 howto = bfd_reloc_type_lookup (abfd, code);
7355 }
7356
7357 if (howto)
7358 areloc->howto = howto;
7359 else
7360 goto fail;
7361 }
7362
b34976b6 7363 return TRUE;
252b5132
RH
7364
7365 fail:
7366 (*_bfd_error_handler)
d003868e
AM
7367 (_("%B: unsupported relocation type %s"),
7368 abfd, areloc->howto->name);
252b5132 7369 bfd_set_error (bfd_error_bad_value);
b34976b6 7370 return FALSE;
252b5132
RH
7371}
7372
b34976b6 7373bfd_boolean
217aa764 7374_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7375{
7376 if (bfd_get_format (abfd) == bfd_object)
7377 {
b25e3d87 7378 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7379 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7380 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7381 }
7382
7383 return _bfd_generic_close_and_cleanup (abfd);
7384}
7385
7386/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7387 in the relocation's offset. Thus we cannot allow any sort of sanity
7388 range-checking to interfere. There is nothing else to do in processing
7389 this reloc. */
7390
7391bfd_reloc_status_type
217aa764
AM
7392_bfd_elf_rel_vtable_reloc_fn
7393 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7394 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7395 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7396 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7397{
7398 return bfd_reloc_ok;
7399}
252b5132
RH
7400\f
7401/* Elf core file support. Much of this only works on native
7402 toolchains, since we rely on knowing the
7403 machine-dependent procfs structure in order to pick
c044fabd 7404 out details about the corefile. */
252b5132
RH
7405
7406#ifdef HAVE_SYS_PROCFS_H
7407# include <sys/procfs.h>
7408#endif
7409
c044fabd 7410/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7411
7412static int
217aa764 7413elfcore_make_pid (bfd *abfd)
252b5132
RH
7414{
7415 return ((elf_tdata (abfd)->core_lwpid << 16)
7416 + (elf_tdata (abfd)->core_pid));
7417}
7418
252b5132
RH
7419/* If there isn't a section called NAME, make one, using
7420 data from SECT. Note, this function will generate a
7421 reference to NAME, so you shouldn't deallocate or
c044fabd 7422 overwrite it. */
252b5132 7423
b34976b6 7424static bfd_boolean
217aa764 7425elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7426{
c044fabd 7427 asection *sect2;
252b5132
RH
7428
7429 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7430 return TRUE;
252b5132 7431
117ed4f8 7432 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7433 if (sect2 == NULL)
b34976b6 7434 return FALSE;
252b5132 7435
eea6121a 7436 sect2->size = sect->size;
252b5132 7437 sect2->filepos = sect->filepos;
252b5132 7438 sect2->alignment_power = sect->alignment_power;
b34976b6 7439 return TRUE;
252b5132
RH
7440}
7441
bb0082d6
AM
7442/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7443 actually creates up to two pseudosections:
7444 - For the single-threaded case, a section named NAME, unless
7445 such a section already exists.
7446 - For the multi-threaded case, a section named "NAME/PID", where
7447 PID is elfcore_make_pid (abfd).
7448 Both pseudosections have identical contents. */
b34976b6 7449bfd_boolean
217aa764
AM
7450_bfd_elfcore_make_pseudosection (bfd *abfd,
7451 char *name,
7452 size_t size,
7453 ufile_ptr filepos)
bb0082d6
AM
7454{
7455 char buf[100];
7456 char *threaded_name;
d4c88bbb 7457 size_t len;
bb0082d6
AM
7458 asection *sect;
7459
7460 /* Build the section name. */
7461
7462 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7463 len = strlen (buf) + 1;
217aa764 7464 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7465 if (threaded_name == NULL)
b34976b6 7466 return FALSE;
d4c88bbb 7467 memcpy (threaded_name, buf, len);
bb0082d6 7468
117ed4f8
AM
7469 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7470 SEC_HAS_CONTENTS);
bb0082d6 7471 if (sect == NULL)
b34976b6 7472 return FALSE;
eea6121a 7473 sect->size = size;
bb0082d6 7474 sect->filepos = filepos;
bb0082d6
AM
7475 sect->alignment_power = 2;
7476
936e320b 7477 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7478}
7479
252b5132 7480/* prstatus_t exists on:
4a938328 7481 solaris 2.5+
252b5132
RH
7482 linux 2.[01] + glibc
7483 unixware 4.2
7484*/
7485
7486#if defined (HAVE_PRSTATUS_T)
a7b97311 7487
b34976b6 7488static bfd_boolean
217aa764 7489elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7490{
eea6121a 7491 size_t size;
7ee38065 7492 int offset;
252b5132 7493
4a938328
MS
7494 if (note->descsz == sizeof (prstatus_t))
7495 {
7496 prstatus_t prstat;
252b5132 7497
eea6121a 7498 size = sizeof (prstat.pr_reg);
7ee38065 7499 offset = offsetof (prstatus_t, pr_reg);
4a938328 7500 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7501
fa49d224
NC
7502 /* Do not overwrite the core signal if it
7503 has already been set by another thread. */
7504 if (elf_tdata (abfd)->core_signal == 0)
7505 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7506 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7507
4a938328
MS
7508 /* pr_who exists on:
7509 solaris 2.5+
7510 unixware 4.2
7511 pr_who doesn't exist on:
7512 linux 2.[01]
7513 */
252b5132 7514#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7515 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7516#endif
4a938328 7517 }
7ee38065 7518#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7519 else if (note->descsz == sizeof (prstatus32_t))
7520 {
7521 /* 64-bit host, 32-bit corefile */
7522 prstatus32_t prstat;
7523
eea6121a 7524 size = sizeof (prstat.pr_reg);
7ee38065 7525 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7526 memcpy (&prstat, note->descdata, sizeof (prstat));
7527
fa49d224
NC
7528 /* Do not overwrite the core signal if it
7529 has already been set by another thread. */
7530 if (elf_tdata (abfd)->core_signal == 0)
7531 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7532 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7533
7534 /* pr_who exists on:
7535 solaris 2.5+
7536 unixware 4.2
7537 pr_who doesn't exist on:
7538 linux 2.[01]
7539 */
7ee38065 7540#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7541 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7542#endif
7543 }
7ee38065 7544#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7545 else
7546 {
7547 /* Fail - we don't know how to handle any other
7548 note size (ie. data object type). */
b34976b6 7549 return TRUE;
4a938328 7550 }
252b5132 7551
bb0082d6 7552 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7553 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7554 size, note->descpos + offset);
252b5132
RH
7555}
7556#endif /* defined (HAVE_PRSTATUS_T) */
7557
bb0082d6 7558/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7559static bfd_boolean
217aa764
AM
7560elfcore_make_note_pseudosection (bfd *abfd,
7561 char *name,
7562 Elf_Internal_Note *note)
252b5132 7563{
936e320b
AM
7564 return _bfd_elfcore_make_pseudosection (abfd, name,
7565 note->descsz, note->descpos);
252b5132
RH
7566}
7567
ff08c6bb
JB
7568/* There isn't a consistent prfpregset_t across platforms,
7569 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7570 data structure apart. */
7571
b34976b6 7572static bfd_boolean
217aa764 7573elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7574{
7575 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7576}
7577
ff08c6bb 7578/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 7579 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 7580 literally. */
c044fabd 7581
b34976b6 7582static bfd_boolean
217aa764 7583elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7584{
7585 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7586}
7587
97753bd5
AM
7588static bfd_boolean
7589elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
7590{
7591 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
7592}
7593
89eeb0bc
LM
7594static bfd_boolean
7595elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
7596{
7597 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
7598}
97753bd5 7599
252b5132 7600#if defined (HAVE_PRPSINFO_T)
4a938328 7601typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7602#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7603typedef prpsinfo32_t elfcore_psinfo32_t;
7604#endif
252b5132
RH
7605#endif
7606
7607#if defined (HAVE_PSINFO_T)
4a938328 7608typedef psinfo_t elfcore_psinfo_t;
7ee38065 7609#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7610typedef psinfo32_t elfcore_psinfo32_t;
7611#endif
252b5132
RH
7612#endif
7613
252b5132
RH
7614/* return a malloc'ed copy of a string at START which is at
7615 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7616 the copy will always have a terminating '\0'. */
252b5132 7617
936e320b 7618char *
217aa764 7619_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7620{
dc810e39 7621 char *dups;
c044fabd 7622 char *end = memchr (start, '\0', max);
dc810e39 7623 size_t len;
252b5132
RH
7624
7625 if (end == NULL)
7626 len = max;
7627 else
7628 len = end - start;
7629
217aa764 7630 dups = bfd_alloc (abfd, len + 1);
dc810e39 7631 if (dups == NULL)
252b5132
RH
7632 return NULL;
7633
dc810e39
AM
7634 memcpy (dups, start, len);
7635 dups[len] = '\0';
252b5132 7636
dc810e39 7637 return dups;
252b5132
RH
7638}
7639
bb0082d6 7640#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7641static bfd_boolean
217aa764 7642elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7643{
4a938328
MS
7644 if (note->descsz == sizeof (elfcore_psinfo_t))
7645 {
7646 elfcore_psinfo_t psinfo;
252b5132 7647
7ee38065 7648 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7649
4a938328 7650 elf_tdata (abfd)->core_program
936e320b
AM
7651 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7652 sizeof (psinfo.pr_fname));
252b5132 7653
4a938328 7654 elf_tdata (abfd)->core_command
936e320b
AM
7655 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7656 sizeof (psinfo.pr_psargs));
4a938328 7657 }
7ee38065 7658#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7659 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7660 {
7661 /* 64-bit host, 32-bit corefile */
7662 elfcore_psinfo32_t psinfo;
7663
7ee38065 7664 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7665
4a938328 7666 elf_tdata (abfd)->core_program
936e320b
AM
7667 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7668 sizeof (psinfo.pr_fname));
4a938328
MS
7669
7670 elf_tdata (abfd)->core_command
936e320b
AM
7671 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7672 sizeof (psinfo.pr_psargs));
4a938328
MS
7673 }
7674#endif
7675
7676 else
7677 {
7678 /* Fail - we don't know how to handle any other
7679 note size (ie. data object type). */
b34976b6 7680 return TRUE;
4a938328 7681 }
252b5132
RH
7682
7683 /* Note that for some reason, a spurious space is tacked
7684 onto the end of the args in some (at least one anyway)
c044fabd 7685 implementations, so strip it off if it exists. */
252b5132
RH
7686
7687 {
c044fabd 7688 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7689 int n = strlen (command);
7690
7691 if (0 < n && command[n - 1] == ' ')
7692 command[n - 1] = '\0';
7693 }
7694
b34976b6 7695 return TRUE;
252b5132
RH
7696}
7697#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7698
252b5132 7699#if defined (HAVE_PSTATUS_T)
b34976b6 7700static bfd_boolean
217aa764 7701elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7702{
f572a39d
AM
7703 if (note->descsz == sizeof (pstatus_t)
7704#if defined (HAVE_PXSTATUS_T)
7705 || note->descsz == sizeof (pxstatus_t)
7706#endif
7707 )
4a938328
MS
7708 {
7709 pstatus_t pstat;
252b5132 7710
4a938328 7711 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7712
4a938328
MS
7713 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7714 }
7ee38065 7715#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7716 else if (note->descsz == sizeof (pstatus32_t))
7717 {
7718 /* 64-bit host, 32-bit corefile */
7719 pstatus32_t pstat;
252b5132 7720
4a938328 7721 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7722
4a938328
MS
7723 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7724 }
7725#endif
252b5132
RH
7726 /* Could grab some more details from the "representative"
7727 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7728 NT_LWPSTATUS note, presumably. */
252b5132 7729
b34976b6 7730 return TRUE;
252b5132
RH
7731}
7732#endif /* defined (HAVE_PSTATUS_T) */
7733
252b5132 7734#if defined (HAVE_LWPSTATUS_T)
b34976b6 7735static bfd_boolean
217aa764 7736elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7737{
7738 lwpstatus_t lwpstat;
7739 char buf[100];
c044fabd 7740 char *name;
d4c88bbb 7741 size_t len;
c044fabd 7742 asection *sect;
252b5132 7743
f572a39d
AM
7744 if (note->descsz != sizeof (lwpstat)
7745#if defined (HAVE_LWPXSTATUS_T)
7746 && note->descsz != sizeof (lwpxstatus_t)
7747#endif
7748 )
b34976b6 7749 return TRUE;
252b5132
RH
7750
7751 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7752
7753 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7754 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7755
c044fabd 7756 /* Make a ".reg/999" section. */
252b5132
RH
7757
7758 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7759 len = strlen (buf) + 1;
217aa764 7760 name = bfd_alloc (abfd, len);
252b5132 7761 if (name == NULL)
b34976b6 7762 return FALSE;
d4c88bbb 7763 memcpy (name, buf, len);
252b5132 7764
117ed4f8 7765 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7766 if (sect == NULL)
b34976b6 7767 return FALSE;
252b5132
RH
7768
7769#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7770 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7771 sect->filepos = note->descpos
7772 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7773#endif
7774
7775#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7776 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7777 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7778#endif
7779
252b5132
RH
7780 sect->alignment_power = 2;
7781
7782 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7783 return FALSE;
252b5132
RH
7784
7785 /* Make a ".reg2/999" section */
7786
7787 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7788 len = strlen (buf) + 1;
217aa764 7789 name = bfd_alloc (abfd, len);
252b5132 7790 if (name == NULL)
b34976b6 7791 return FALSE;
d4c88bbb 7792 memcpy (name, buf, len);
252b5132 7793
117ed4f8 7794 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7795 if (sect == NULL)
b34976b6 7796 return FALSE;
252b5132
RH
7797
7798#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7799 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7800 sect->filepos = note->descpos
7801 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7802#endif
7803
7804#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7805 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7806 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7807#endif
7808
252b5132
RH
7809 sect->alignment_power = 2;
7810
936e320b 7811 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7812}
7813#endif /* defined (HAVE_LWPSTATUS_T) */
7814
b34976b6 7815static bfd_boolean
217aa764 7816elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7817{
7818 char buf[30];
c044fabd 7819 char *name;
d4c88bbb 7820 size_t len;
c044fabd 7821 asection *sect;
4a6636fb
PA
7822 int type;
7823 int is_active_thread;
7824 bfd_vma base_addr;
16e9c715 7825
4a6636fb 7826 if (note->descsz < 728)
b34976b6 7827 return TRUE;
16e9c715 7828
4a6636fb
PA
7829 if (! CONST_STRNEQ (note->namedata, "win32"))
7830 return TRUE;
7831
7832 type = bfd_get_32 (abfd, note->descdata);
c044fabd 7833
4a6636fb 7834 switch (type)
16e9c715 7835 {
4a6636fb 7836 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 7837 /* FIXME: need to add ->core_command. */
4a6636fb
PA
7838 /* process_info.pid */
7839 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
7840 /* process_info.signal */
7841 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 7842 break;
16e9c715 7843
4a6636fb 7844 case 2 /* NOTE_INFO_THREAD */:
16e9c715 7845 /* Make a ".reg/999" section. */
4a6636fb
PA
7846 /* thread_info.tid */
7847 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 7848
d4c88bbb 7849 len = strlen (buf) + 1;
217aa764 7850 name = bfd_alloc (abfd, len);
16e9c715 7851 if (name == NULL)
b34976b6 7852 return FALSE;
c044fabd 7853
d4c88bbb 7854 memcpy (name, buf, len);
16e9c715 7855
117ed4f8 7856 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 7857 if (sect == NULL)
b34976b6 7858 return FALSE;
c044fabd 7859
4a6636fb
PA
7860 /* sizeof (thread_info.thread_context) */
7861 sect->size = 716;
7862 /* offsetof (thread_info.thread_context) */
7863 sect->filepos = note->descpos + 12;
16e9c715
NC
7864 sect->alignment_power = 2;
7865
4a6636fb
PA
7866 /* thread_info.is_active_thread */
7867 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
7868
7869 if (is_active_thread)
16e9c715 7870 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7871 return FALSE;
16e9c715
NC
7872 break;
7873
4a6636fb 7874 case 3 /* NOTE_INFO_MODULE */:
16e9c715 7875 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
7876 /* module_info.base_address */
7877 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 7878 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 7879
d4c88bbb 7880 len = strlen (buf) + 1;
217aa764 7881 name = bfd_alloc (abfd, len);
16e9c715 7882 if (name == NULL)
b34976b6 7883 return FALSE;
c044fabd 7884
d4c88bbb 7885 memcpy (name, buf, len);
252b5132 7886
117ed4f8 7887 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 7888
16e9c715 7889 if (sect == NULL)
b34976b6 7890 return FALSE;
c044fabd 7891
eea6121a 7892 sect->size = note->descsz;
16e9c715 7893 sect->filepos = note->descpos;
16e9c715
NC
7894 sect->alignment_power = 2;
7895 break;
7896
7897 default:
b34976b6 7898 return TRUE;
16e9c715
NC
7899 }
7900
b34976b6 7901 return TRUE;
16e9c715 7902}
252b5132 7903
b34976b6 7904static bfd_boolean
217aa764 7905elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7906{
9c5bfbb7 7907 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7908
252b5132
RH
7909 switch (note->type)
7910 {
7911 default:
b34976b6 7912 return TRUE;
252b5132 7913
252b5132 7914 case NT_PRSTATUS:
bb0082d6
AM
7915 if (bed->elf_backend_grok_prstatus)
7916 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7917 return TRUE;
bb0082d6 7918#if defined (HAVE_PRSTATUS_T)
252b5132 7919 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7920#else
b34976b6 7921 return TRUE;
252b5132
RH
7922#endif
7923
7924#if defined (HAVE_PSTATUS_T)
7925 case NT_PSTATUS:
7926 return elfcore_grok_pstatus (abfd, note);
7927#endif
7928
7929#if defined (HAVE_LWPSTATUS_T)
7930 case NT_LWPSTATUS:
7931 return elfcore_grok_lwpstatus (abfd, note);
7932#endif
7933
7934 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7935 return elfcore_grok_prfpreg (abfd, note);
7936
c044fabd 7937 case NT_WIN32PSTATUS:
16e9c715 7938 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 7939
c044fabd 7940 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7941 if (note->namesz == 6
7942 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7943 return elfcore_grok_prxfpreg (abfd, note);
7944 else
b34976b6 7945 return TRUE;
ff08c6bb 7946
97753bd5
AM
7947 case NT_PPC_VMX:
7948 if (note->namesz == 6
7949 && strcmp (note->namedata, "LINUX") == 0)
7950 return elfcore_grok_ppc_vmx (abfd, note);
7951 else
7952 return TRUE;
7953
89eeb0bc
LM
7954 case NT_PPC_VSX:
7955 if (note->namesz == 6
7956 && strcmp (note->namedata, "LINUX") == 0)
7957 return elfcore_grok_ppc_vsx (abfd, note);
7958 else
7959 return TRUE;
7960
252b5132
RH
7961 case NT_PRPSINFO:
7962 case NT_PSINFO:
bb0082d6
AM
7963 if (bed->elf_backend_grok_psinfo)
7964 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7965 return TRUE;
bb0082d6 7966#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7967 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7968#else
b34976b6 7969 return TRUE;
252b5132 7970#endif
3333a7c3
RM
7971
7972 case NT_AUXV:
7973 {
117ed4f8
AM
7974 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
7975 SEC_HAS_CONTENTS);
3333a7c3
RM
7976
7977 if (sect == NULL)
7978 return FALSE;
eea6121a 7979 sect->size = note->descsz;
3333a7c3 7980 sect->filepos = note->descpos;
3333a7c3
RM
7981 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
7982
7983 return TRUE;
7984 }
252b5132
RH
7985 }
7986}
7987
718175fa
JK
7988static bfd_boolean
7989elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
7990{
7991 elf_tdata (abfd)->build_id_size = note->descsz;
7992 elf_tdata (abfd)->build_id = bfd_alloc (abfd, note->descsz);
7993 if (elf_tdata (abfd)->build_id == NULL)
7994 return FALSE;
7995
7996 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
7997
7998 return TRUE;
7999}
8000
8001static bfd_boolean
8002elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8003{
8004 switch (note->type)
8005 {
8006 default:
8007 return TRUE;
8008
8009 case NT_GNU_BUILD_ID:
8010 return elfobj_grok_gnu_build_id (abfd, note);
8011 }
8012}
8013
b34976b6 8014static bfd_boolean
217aa764 8015elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8016{
8017 char *cp;
8018
8019 cp = strchr (note->namedata, '@');
8020 if (cp != NULL)
8021 {
d2b64500 8022 *lwpidp = atoi(cp + 1);
b34976b6 8023 return TRUE;
50b2bdb7 8024 }
b34976b6 8025 return FALSE;
50b2bdb7
AM
8026}
8027
b34976b6 8028static bfd_boolean
217aa764 8029elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8030{
50b2bdb7
AM
8031 /* Signal number at offset 0x08. */
8032 elf_tdata (abfd)->core_signal
8033 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8034
8035 /* Process ID at offset 0x50. */
8036 elf_tdata (abfd)->core_pid
8037 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8038
8039 /* Command name at 0x7c (max 32 bytes, including nul). */
8040 elf_tdata (abfd)->core_command
8041 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8042
7720ba9f
MK
8043 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8044 note);
50b2bdb7
AM
8045}
8046
b34976b6 8047static bfd_boolean
217aa764 8048elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8049{
8050 int lwp;
8051
8052 if (elfcore_netbsd_get_lwpid (note, &lwp))
8053 elf_tdata (abfd)->core_lwpid = lwp;
8054
b4db1224 8055 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8056 {
8057 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8058 find this note before any of the others, which is fine,
8059 since the kernel writes this note out first when it
8060 creates a core file. */
47d9a591 8061
50b2bdb7
AM
8062 return elfcore_grok_netbsd_procinfo (abfd, note);
8063 }
8064
b4db1224
JT
8065 /* As of Jan 2002 there are no other machine-independent notes
8066 defined for NetBSD core files. If the note type is less
8067 than the start of the machine-dependent note types, we don't
8068 understand it. */
47d9a591 8069
b4db1224 8070 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8071 return TRUE;
50b2bdb7
AM
8072
8073
8074 switch (bfd_get_arch (abfd))
8075 {
08a40648
AM
8076 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8077 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8078
8079 case bfd_arch_alpha:
8080 case bfd_arch_sparc:
8081 switch (note->type)
08a40648
AM
8082 {
8083 case NT_NETBSDCORE_FIRSTMACH+0:
8084 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8085
08a40648
AM
8086 case NT_NETBSDCORE_FIRSTMACH+2:
8087 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8088
08a40648
AM
8089 default:
8090 return TRUE;
8091 }
50b2bdb7 8092
08a40648
AM
8093 /* On all other arch's, PT_GETREGS == mach+1 and
8094 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8095
8096 default:
8097 switch (note->type)
08a40648
AM
8098 {
8099 case NT_NETBSDCORE_FIRSTMACH+1:
8100 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8101
08a40648
AM
8102 case NT_NETBSDCORE_FIRSTMACH+3:
8103 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8104
08a40648
AM
8105 default:
8106 return TRUE;
8107 }
50b2bdb7
AM
8108 }
8109 /* NOTREACHED */
8110}
8111
67cc5033
MK
8112static bfd_boolean
8113elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8114{
8115 /* Signal number at offset 0x08. */
8116 elf_tdata (abfd)->core_signal
8117 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8118
8119 /* Process ID at offset 0x20. */
8120 elf_tdata (abfd)->core_pid
8121 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8122
8123 /* Command name at 0x48 (max 32 bytes, including nul). */
8124 elf_tdata (abfd)->core_command
8125 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8126
8127 return TRUE;
8128}
8129
8130static bfd_boolean
8131elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8132{
8133 if (note->type == NT_OPENBSD_PROCINFO)
8134 return elfcore_grok_openbsd_procinfo (abfd, note);
8135
8136 if (note->type == NT_OPENBSD_REGS)
8137 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8138
8139 if (note->type == NT_OPENBSD_FPREGS)
8140 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8141
8142 if (note->type == NT_OPENBSD_XFPREGS)
8143 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8144
8145 if (note->type == NT_OPENBSD_AUXV)
8146 {
8147 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8148 SEC_HAS_CONTENTS);
8149
8150 if (sect == NULL)
8151 return FALSE;
8152 sect->size = note->descsz;
8153 sect->filepos = note->descpos;
8154 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8155
8156 return TRUE;
8157 }
8158
8159 if (note->type == NT_OPENBSD_WCOOKIE)
8160 {
8161 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8162 SEC_HAS_CONTENTS);
8163
8164 if (sect == NULL)
8165 return FALSE;
8166 sect->size = note->descsz;
8167 sect->filepos = note->descpos;
8168 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8169
8170 return TRUE;
8171 }
8172
8173 return TRUE;
8174}
8175
07c6e936 8176static bfd_boolean
d3fd4074 8177elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8178{
8179 void *ddata = note->descdata;
8180 char buf[100];
8181 char *name;
8182 asection *sect;
f8843e87
AM
8183 short sig;
8184 unsigned flags;
07c6e936
NC
8185
8186 /* nto_procfs_status 'pid' field is at offset 0. */
8187 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8188
f8843e87
AM
8189 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8190 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8191
8192 /* nto_procfs_status 'flags' field is at offset 8. */
8193 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8194
8195 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8196 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8197 {
8198 elf_tdata (abfd)->core_signal = sig;
8199 elf_tdata (abfd)->core_lwpid = *tid;
8200 }
07c6e936 8201
f8843e87
AM
8202 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8203 do not come from signals so we make sure we set the current
8204 thread just in case. */
8205 if (flags & 0x00000080)
8206 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8207
8208 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8209 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8210
217aa764 8211 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8212 if (name == NULL)
8213 return FALSE;
8214 strcpy (name, buf);
8215
117ed4f8 8216 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8217 if (sect == NULL)
8218 return FALSE;
8219
eea6121a 8220 sect->size = note->descsz;
07c6e936 8221 sect->filepos = note->descpos;
07c6e936
NC
8222 sect->alignment_power = 2;
8223
8224 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8225}
8226
8227static bfd_boolean
d69f560c
KW
8228elfcore_grok_nto_regs (bfd *abfd,
8229 Elf_Internal_Note *note,
d3fd4074 8230 long tid,
d69f560c 8231 char *base)
07c6e936
NC
8232{
8233 char buf[100];
8234 char *name;
8235 asection *sect;
8236
d69f560c 8237 /* Make a "(base)/%d" section. */
d3fd4074 8238 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8239
217aa764 8240 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8241 if (name == NULL)
8242 return FALSE;
8243 strcpy (name, buf);
8244
117ed4f8 8245 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8246 if (sect == NULL)
8247 return FALSE;
8248
eea6121a 8249 sect->size = note->descsz;
07c6e936 8250 sect->filepos = note->descpos;
07c6e936
NC
8251 sect->alignment_power = 2;
8252
f8843e87
AM
8253 /* This is the current thread. */
8254 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8255 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8256
8257 return TRUE;
07c6e936
NC
8258}
8259
8260#define BFD_QNT_CORE_INFO 7
8261#define BFD_QNT_CORE_STATUS 8
8262#define BFD_QNT_CORE_GREG 9
8263#define BFD_QNT_CORE_FPREG 10
8264
8265static bfd_boolean
217aa764 8266elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8267{
8268 /* Every GREG section has a STATUS section before it. Store the
811072d8 8269 tid from the previous call to pass down to the next gregs
07c6e936 8270 function. */
d3fd4074 8271 static long tid = 1;
07c6e936
NC
8272
8273 switch (note->type)
8274 {
d69f560c
KW
8275 case BFD_QNT_CORE_INFO:
8276 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8277 case BFD_QNT_CORE_STATUS:
8278 return elfcore_grok_nto_status (abfd, note, &tid);
8279 case BFD_QNT_CORE_GREG:
8280 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8281 case BFD_QNT_CORE_FPREG:
8282 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8283 default:
8284 return TRUE;
07c6e936
NC
8285 }
8286}
8287
b15fa79e
AM
8288static bfd_boolean
8289elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8290{
8291 char *name;
8292 asection *sect;
8293 size_t len;
8294
8295 /* Use note name as section name. */
8296 len = note->namesz;
8297 name = bfd_alloc (abfd, len);
8298 if (name == NULL)
8299 return FALSE;
8300 memcpy (name, note->namedata, len);
8301 name[len - 1] = '\0';
8302
8303 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8304 if (sect == NULL)
8305 return FALSE;
8306
8307 sect->size = note->descsz;
8308 sect->filepos = note->descpos;
8309 sect->alignment_power = 1;
8310
8311 return TRUE;
8312}
8313
7c76fa91
MS
8314/* Function: elfcore_write_note
8315
47d9a591 8316 Inputs:
a39f3346 8317 buffer to hold note, and current size of buffer
7c76fa91
MS
8318 name of note
8319 type of note
8320 data for note
8321 size of data for note
8322
a39f3346
AM
8323 Writes note to end of buffer. ELF64 notes are written exactly as
8324 for ELF32, despite the current (as of 2006) ELF gabi specifying
8325 that they ought to have 8-byte namesz and descsz field, and have
8326 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8327
7c76fa91 8328 Return:
a39f3346 8329 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8330
8331char *
a39f3346 8332elfcore_write_note (bfd *abfd,
217aa764 8333 char *buf,
a39f3346 8334 int *bufsiz,
217aa764 8335 const char *name,
a39f3346 8336 int type,
217aa764 8337 const void *input,
a39f3346 8338 int size)
7c76fa91
MS
8339{
8340 Elf_External_Note *xnp;
d4c88bbb 8341 size_t namesz;
d4c88bbb 8342 size_t newspace;
a39f3346 8343 char *dest;
7c76fa91 8344
d4c88bbb 8345 namesz = 0;
d4c88bbb 8346 if (name != NULL)
a39f3346 8347 namesz = strlen (name) + 1;
d4c88bbb 8348
a39f3346 8349 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 8350
a39f3346 8351 buf = realloc (buf, *bufsiz + newspace);
14b1c01e
AM
8352 if (buf == NULL)
8353 return buf;
a39f3346 8354 dest = buf + *bufsiz;
7c76fa91
MS
8355 *bufsiz += newspace;
8356 xnp = (Elf_External_Note *) dest;
8357 H_PUT_32 (abfd, namesz, xnp->namesz);
8358 H_PUT_32 (abfd, size, xnp->descsz);
8359 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8360 dest = xnp->name;
8361 if (name != NULL)
8362 {
8363 memcpy (dest, name, namesz);
8364 dest += namesz;
a39f3346 8365 while (namesz & 3)
d4c88bbb
AM
8366 {
8367 *dest++ = '\0';
a39f3346 8368 ++namesz;
d4c88bbb
AM
8369 }
8370 }
8371 memcpy (dest, input, size);
a39f3346
AM
8372 dest += size;
8373 while (size & 3)
8374 {
8375 *dest++ = '\0';
8376 ++size;
8377 }
8378 return buf;
7c76fa91
MS
8379}
8380
8381#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8382char *
217aa764
AM
8383elfcore_write_prpsinfo (bfd *abfd,
8384 char *buf,
8385 int *bufsiz,
8386 const char *fname,
8387 const char *psargs)
7c76fa91 8388{
183e98be
AM
8389 const char *note_name = "CORE";
8390 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8391
8392 if (bed->elf_backend_write_core_note != NULL)
8393 {
8394 char *ret;
8395 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8396 NT_PRPSINFO, fname, psargs);
8397 if (ret != NULL)
8398 return ret;
8399 }
7c76fa91 8400
183e98be
AM
8401#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
8402 if (bed->s->elfclass == ELFCLASS32)
8403 {
8404#if defined (HAVE_PSINFO32_T)
8405 psinfo32_t data;
8406 int note_type = NT_PSINFO;
8407#else
8408 prpsinfo32_t data;
8409 int note_type = NT_PRPSINFO;
8410#endif
8411
8412 memset (&data, 0, sizeof (data));
8413 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8414 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8415 return elfcore_write_note (abfd, buf, bufsiz,
8416 note_name, note_type, &data, sizeof (data));
8417 }
8418 else
8419#endif
8420 {
7c76fa91 8421#if defined (HAVE_PSINFO_T)
183e98be
AM
8422 psinfo_t data;
8423 int note_type = NT_PSINFO;
7c76fa91 8424#else
183e98be
AM
8425 prpsinfo_t data;
8426 int note_type = NT_PRPSINFO;
7c76fa91
MS
8427#endif
8428
183e98be
AM
8429 memset (&data, 0, sizeof (data));
8430 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8431 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8432 return elfcore_write_note (abfd, buf, bufsiz,
8433 note_name, note_type, &data, sizeof (data));
8434 }
7c76fa91
MS
8435}
8436#endif /* PSINFO_T or PRPSINFO_T */
8437
8438#if defined (HAVE_PRSTATUS_T)
8439char *
217aa764
AM
8440elfcore_write_prstatus (bfd *abfd,
8441 char *buf,
8442 int *bufsiz,
8443 long pid,
8444 int cursig,
8445 const void *gregs)
7c76fa91 8446{
183e98be
AM
8447 const char *note_name = "CORE";
8448 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8449
183e98be
AM
8450 if (bed->elf_backend_write_core_note != NULL)
8451 {
8452 char *ret;
8453 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8454 NT_PRSTATUS,
8455 pid, cursig, gregs);
8456 if (ret != NULL)
8457 return ret;
8458 }
8459
8460#if defined (HAVE_PRSTATUS32_T)
8461 if (bed->s->elfclass == ELFCLASS32)
8462 {
8463 prstatus32_t prstat;
8464
8465 memset (&prstat, 0, sizeof (prstat));
8466 prstat.pr_pid = pid;
8467 prstat.pr_cursig = cursig;
8468 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8469 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8470 NT_PRSTATUS, &prstat, sizeof (prstat));
8471 }
8472 else
8473#endif
8474 {
8475 prstatus_t prstat;
8476
8477 memset (&prstat, 0, sizeof (prstat));
8478 prstat.pr_pid = pid;
8479 prstat.pr_cursig = cursig;
8480 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8481 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8482 NT_PRSTATUS, &prstat, sizeof (prstat));
8483 }
7c76fa91
MS
8484}
8485#endif /* HAVE_PRSTATUS_T */
8486
51316059
MS
8487#if defined (HAVE_LWPSTATUS_T)
8488char *
217aa764
AM
8489elfcore_write_lwpstatus (bfd *abfd,
8490 char *buf,
8491 int *bufsiz,
8492 long pid,
8493 int cursig,
8494 const void *gregs)
51316059
MS
8495{
8496 lwpstatus_t lwpstat;
183e98be 8497 const char *note_name = "CORE";
51316059
MS
8498
8499 memset (&lwpstat, 0, sizeof (lwpstat));
8500 lwpstat.pr_lwpid = pid >> 16;
8501 lwpstat.pr_cursig = cursig;
8502#if defined (HAVE_LWPSTATUS_T_PR_REG)
8503 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8504#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8505#if !defined(gregs)
8506 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8507 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8508#else
8509 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8510 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8511#endif
8512#endif
47d9a591 8513 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8514 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8515}
8516#endif /* HAVE_LWPSTATUS_T */
8517
7c76fa91
MS
8518#if defined (HAVE_PSTATUS_T)
8519char *
217aa764
AM
8520elfcore_write_pstatus (bfd *abfd,
8521 char *buf,
8522 int *bufsiz,
8523 long pid,
6c10990d
NC
8524 int cursig ATTRIBUTE_UNUSED,
8525 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 8526{
183e98be
AM
8527 const char *note_name = "CORE";
8528#if defined (HAVE_PSTATUS32_T)
8529 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8530
183e98be
AM
8531 if (bed->s->elfclass == ELFCLASS32)
8532 {
8533 pstatus32_t pstat;
8534
8535 memset (&pstat, 0, sizeof (pstat));
8536 pstat.pr_pid = pid & 0xffff;
8537 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8538 NT_PSTATUS, &pstat, sizeof (pstat));
8539 return buf;
8540 }
8541 else
8542#endif
8543 {
8544 pstatus_t pstat;
8545
8546 memset (&pstat, 0, sizeof (pstat));
8547 pstat.pr_pid = pid & 0xffff;
8548 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8549 NT_PSTATUS, &pstat, sizeof (pstat));
8550 return buf;
8551 }
7c76fa91
MS
8552}
8553#endif /* HAVE_PSTATUS_T */
8554
8555char *
217aa764
AM
8556elfcore_write_prfpreg (bfd *abfd,
8557 char *buf,
8558 int *bufsiz,
8559 const void *fpregs,
8560 int size)
7c76fa91 8561{
183e98be 8562 const char *note_name = "CORE";
47d9a591 8563 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8564 note_name, NT_FPREGSET, fpregs, size);
8565}
8566
8567char *
217aa764
AM
8568elfcore_write_prxfpreg (bfd *abfd,
8569 char *buf,
8570 int *bufsiz,
8571 const void *xfpregs,
8572 int size)
7c76fa91
MS
8573{
8574 char *note_name = "LINUX";
47d9a591 8575 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8576 note_name, NT_PRXFPREG, xfpregs, size);
8577}
8578
97753bd5
AM
8579char *
8580elfcore_write_ppc_vmx (bfd *abfd,
8581 char *buf,
8582 int *bufsiz,
8583 const void *ppc_vmx,
8584 int size)
8585{
8586 char *note_name = "LINUX";
8587 return elfcore_write_note (abfd, buf, bufsiz,
8588 note_name, NT_PPC_VMX, ppc_vmx, size);
8589}
8590
89eeb0bc
LM
8591char *
8592elfcore_write_ppc_vsx (bfd *abfd,
8593 char *buf,
8594 int *bufsiz,
8595 const void *ppc_vsx,
8596 int size)
8597{
8598 char *note_name = "LINUX";
8599 return elfcore_write_note (abfd, buf, bufsiz,
8600 note_name, NT_PPC_VSX, ppc_vsx, size);
8601}
8602
bb864ac1
CES
8603char *
8604elfcore_write_register_note (bfd *abfd,
8605 char *buf,
8606 int *bufsiz,
8607 const char *section,
8608 const void *data,
8609 int size)
8610{
8611 if (strcmp (section, ".reg2") == 0)
8612 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
8613 if (strcmp (section, ".reg-xfp") == 0)
8614 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
8615 if (strcmp (section, ".reg-ppc-vmx") == 0)
8616 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
8617 if (strcmp (section, ".reg-ppc-vsx") == 0)
8618 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
bb864ac1
CES
8619 return NULL;
8620}
8621
b34976b6 8622static bfd_boolean
718175fa 8623elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 8624{
c044fabd 8625 char *p;
252b5132 8626
252b5132
RH
8627 p = buf;
8628 while (p < buf + size)
8629 {
c044fabd
KH
8630 /* FIXME: bad alignment assumption. */
8631 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8632 Elf_Internal_Note in;
8633
baea7ef1
AM
8634 if (offsetof (Elf_External_Note, name) > buf - p + size)
8635 return FALSE;
8636
dc810e39 8637 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8638
dc810e39 8639 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 8640 in.namedata = xnp->name;
baea7ef1
AM
8641 if (in.namesz > buf - in.namedata + size)
8642 return FALSE;
252b5132 8643
dc810e39 8644 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8645 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8646 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
8647 if (in.descsz != 0
8648 && (in.descdata >= buf + size
8649 || in.descsz > buf - in.descdata + size))
8650 return FALSE;
252b5132 8651
718175fa
JK
8652 switch (bfd_get_format (abfd))
8653 {
8654 default:
8655 return TRUE;
8656
8657 case bfd_core:
8658 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
8659 {
8660 if (! elfcore_grok_netbsd_note (abfd, &in))
8661 return FALSE;
8662 }
67cc5033
MK
8663 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
8664 {
8665 if (! elfcore_grok_openbsd_note (abfd, &in))
8666 return FALSE;
8667 }
718175fa
JK
8668 else if (CONST_STRNEQ (in.namedata, "QNX"))
8669 {
8670 if (! elfcore_grok_nto_note (abfd, &in))
8671 return FALSE;
8672 }
b15fa79e
AM
8673 else if (CONST_STRNEQ (in.namedata, "SPU/"))
8674 {
8675 if (! elfcore_grok_spu_note (abfd, &in))
8676 return FALSE;
8677 }
718175fa
JK
8678 else
8679 {
8680 if (! elfcore_grok_note (abfd, &in))
8681 return FALSE;
8682 }
8683 break;
8684
8685 case bfd_object:
8686 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
8687 {
8688 if (! elfobj_grok_gnu_note (abfd, &in))
8689 return FALSE;
8690 }
8691 break;
08a40648 8692 }
252b5132
RH
8693
8694 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8695 }
8696
718175fa
JK
8697 return TRUE;
8698}
8699
8700static bfd_boolean
8701elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
8702{
8703 char *buf;
8704
8705 if (size <= 0)
8706 return TRUE;
8707
8708 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
8709 return FALSE;
8710
8711 buf = bfd_malloc (size);
8712 if (buf == NULL)
8713 return FALSE;
8714
8715 if (bfd_bread (buf, size, abfd) != size
8716 || !elf_parse_notes (abfd, buf, size, offset))
8717 {
8718 free (buf);
8719 return FALSE;
8720 }
8721
252b5132 8722 free (buf);
b34976b6 8723 return TRUE;
252b5132 8724}
98d8431c
JB
8725\f
8726/* Providing external access to the ELF program header table. */
8727
8728/* Return an upper bound on the number of bytes required to store a
8729 copy of ABFD's program header table entries. Return -1 if an error
8730 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8731
98d8431c 8732long
217aa764 8733bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8734{
8735 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8736 {
8737 bfd_set_error (bfd_error_wrong_format);
8738 return -1;
8739 }
8740
936e320b 8741 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8742}
8743
98d8431c
JB
8744/* Copy ABFD's program header table entries to *PHDRS. The entries
8745 will be stored as an array of Elf_Internal_Phdr structures, as
8746 defined in include/elf/internal.h. To find out how large the
8747 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
8748
8749 Return the number of program header table entries read, or -1 if an
8750 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 8751
98d8431c 8752int
217aa764 8753bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
8754{
8755 int num_phdrs;
8756
8757 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8758 {
8759 bfd_set_error (bfd_error_wrong_format);
8760 return -1;
8761 }
8762
8763 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8764 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8765 num_phdrs * sizeof (Elf_Internal_Phdr));
8766
8767 return num_phdrs;
8768}
ae4221d7 8769
db6751f2 8770enum elf_reloc_type_class
217aa764 8771_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8772{
8773 return reloc_class_normal;
8774}
f8df10f4 8775
47d9a591 8776/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8777 relocation against a local symbol. */
8778
8779bfd_vma
217aa764
AM
8780_bfd_elf_rela_local_sym (bfd *abfd,
8781 Elf_Internal_Sym *sym,
8517fae7 8782 asection **psec,
217aa764 8783 Elf_Internal_Rela *rel)
f8df10f4 8784{
8517fae7 8785 asection *sec = *psec;
f8df10f4
JJ
8786 bfd_vma relocation;
8787
8788 relocation = (sec->output_section->vma
8789 + sec->output_offset
8790 + sym->st_value);
8791 if ((sec->flags & SEC_MERGE)
c629eae0 8792 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8793 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8794 {
f8df10f4 8795 rel->r_addend =
8517fae7 8796 _bfd_merged_section_offset (abfd, psec,
65765700 8797 elf_section_data (sec)->sec_info,
753731ee
AM
8798 sym->st_value + rel->r_addend);
8799 if (sec != *psec)
8800 {
8801 /* If we have changed the section, and our original section is
8802 marked with SEC_EXCLUDE, it means that the original
8803 SEC_MERGE section has been completely subsumed in some
8804 other SEC_MERGE section. In this case, we need to leave
8805 some info around for --emit-relocs. */
8806 if ((sec->flags & SEC_EXCLUDE) != 0)
8807 sec->kept_section = *psec;
8808 sec = *psec;
8809 }
8517fae7
AM
8810 rel->r_addend -= relocation;
8811 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8812 }
8813 return relocation;
8814}
c629eae0
JJ
8815
8816bfd_vma
217aa764
AM
8817_bfd_elf_rel_local_sym (bfd *abfd,
8818 Elf_Internal_Sym *sym,
8819 asection **psec,
8820 bfd_vma addend)
47d9a591 8821{
c629eae0
JJ
8822 asection *sec = *psec;
8823
68bfbfcc 8824 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8825 return sym->st_value + addend;
8826
8827 return _bfd_merged_section_offset (abfd, psec,
65765700 8828 elf_section_data (sec)->sec_info,
753731ee 8829 sym->st_value + addend);
c629eae0
JJ
8830}
8831
8832bfd_vma
217aa764 8833_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8834 struct bfd_link_info *info,
217aa764
AM
8835 asection *sec,
8836 bfd_vma offset)
c629eae0 8837{
68bfbfcc 8838 switch (sec->sec_info_type)
65765700
JJ
8839 {
8840 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8841 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8842 offset);
65765700 8843 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8844 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8845 default:
8846 return offset;
8847 }
c629eae0 8848}
3333a7c3
RM
8849\f
8850/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8851 reconstruct an ELF file by reading the segments out of remote memory
8852 based on the ELF file header at EHDR_VMA and the ELF program headers it
8853 points to. If not null, *LOADBASEP is filled in with the difference
8854 between the VMAs from which the segments were read, and the VMAs the
8855 file headers (and hence BFD's idea of each section's VMA) put them at.
8856
8857 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8858 remote memory at target address VMA into the local buffer at MYADDR; it
8859 should return zero on success or an `errno' code on failure. TEMPL must
8860 be a BFD for an ELF target with the word size and byte order found in
8861 the remote memory. */
8862
8863bfd *
217aa764
AM
8864bfd_elf_bfd_from_remote_memory
8865 (bfd *templ,
8866 bfd_vma ehdr_vma,
8867 bfd_vma *loadbasep,
f075ee0c 8868 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8869{
8870 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8871 (templ, ehdr_vma, loadbasep, target_read_memory);
8872}
4c45e5c9
JJ
8873\f
8874long
c9727e01
AM
8875_bfd_elf_get_synthetic_symtab (bfd *abfd,
8876 long symcount ATTRIBUTE_UNUSED,
8877 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8878 long dynsymcount,
c9727e01
AM
8879 asymbol **dynsyms,
8880 asymbol **ret)
4c45e5c9
JJ
8881{
8882 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8883 asection *relplt;
8884 asymbol *s;
8885 const char *relplt_name;
8886 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8887 arelent *p;
8888 long count, i, n;
8889 size_t size;
8890 Elf_Internal_Shdr *hdr;
8891 char *names;
8892 asection *plt;
8893
8615f3f2
AM
8894 *ret = NULL;
8895
90e3cdf2
JJ
8896 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8897 return 0;
8898
8615f3f2
AM
8899 if (dynsymcount <= 0)
8900 return 0;
8901
4c45e5c9
JJ
8902 if (!bed->plt_sym_val)
8903 return 0;
8904
8905 relplt_name = bed->relplt_name;
8906 if (relplt_name == NULL)
d35fd659 8907 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
8908 relplt = bfd_get_section_by_name (abfd, relplt_name);
8909 if (relplt == NULL)
8910 return 0;
8911
8912 hdr = &elf_section_data (relplt)->this_hdr;
8913 if (hdr->sh_link != elf_dynsymtab (abfd)
8914 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8915 return 0;
8916
8917 plt = bfd_get_section_by_name (abfd, ".plt");
8918 if (plt == NULL)
8919 return 0;
8920
8921 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8922 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8923 return -1;
8924
eea6121a 8925 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8926 size = count * sizeof (asymbol);
8927 p = relplt->relocation;
cb53bf42 8928 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
8929 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8930
8931 s = *ret = bfd_malloc (size);
8932 if (s == NULL)
8933 return -1;
8934
8935 names = (char *) (s + count);
8936 p = relplt->relocation;
8937 n = 0;
cb53bf42 8938 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
8939 {
8940 size_t len;
8941 bfd_vma addr;
8942
8943 addr = bed->plt_sym_val (i, plt, p);
8944 if (addr == (bfd_vma) -1)
8945 continue;
8946
8947 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8948 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8949 we are defining a symbol, ensure one of them is set. */
8950 if ((s->flags & BSF_LOCAL) == 0)
8951 s->flags |= BSF_GLOBAL;
6ba2a415 8952 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
8953 s->section = plt;
8954 s->value = addr - plt->vma;
8955 s->name = names;
8f39ba8e 8956 s->udata.p = NULL;
4c45e5c9
JJ
8957 len = strlen ((*p->sym_ptr_ptr)->name);
8958 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8959 names += len;
8960 memcpy (names, "@plt", sizeof ("@plt"));
8961 names += sizeof ("@plt");
8f39ba8e 8962 ++s, ++n;
4c45e5c9
JJ
8963 }
8964
8965 return n;
8966}
3d7f7666 8967
3b22753a
L
8968/* It is only used by x86-64 so far. */
8969asection _bfd_elf_large_com_section
8970 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 8971 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 8972
d1036acb
L
8973void
8974_bfd_elf_set_osabi (bfd * abfd,
8975 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
8976{
8977 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
8978
8979 i_ehdrp = elf_elfheader (abfd);
8980
8981 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
8982
8983 /* To make things simpler for the loader on Linux systems we set the
8984 osabi field to ELFOSABI_LINUX if the binary contains symbols of
8985 the STT_GNU_IFUNC type. */
8986 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
8987 && elf_tdata (abfd)->has_ifunc_symbols)
8988 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
d1036acb 8989}
fcb93ecf
PB
8990
8991
8992/* Return TRUE for ELF symbol types that represent functions.
8993 This is the default version of this function, which is sufficient for
d8045f23 8994 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
8995
8996bfd_boolean
8997_bfd_elf_is_function_type (unsigned int type)
8998{
d8045f23
NC
8999 return (type == STT_FUNC
9000 || type == STT_GNU_IFUNC);
fcb93ecf 9001}