daily update
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
b7c368d0 4 2002, 2003, 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
252b5132 5
5e8d7549 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
5e8d7549
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
cd123cb7 10 the Free Software Foundation; either version 3 of the License, or
5e8d7549 11 (at your option) any later version.
252b5132 12
5e8d7549
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
5e8d7549 18 You should have received a copy of the GNU General Public License
b34976b6 19 along with this program; if not, write to the Free Software
cd123cb7
NC
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
21 MA 02110-1301, USA. */
22
252b5132 23
1b74d094
BW
24/*
25SECTION
252b5132
RH
26 ELF backends
27
28 BFD support for ELF formats is being worked on.
29 Currently, the best supported back ends are for sparc and i386
30 (running svr4 or Solaris 2).
31
32 Documentation of the internals of the support code still needs
33 to be written. The code is changing quickly enough that we
661a3fd4 34 haven't bothered yet. */
252b5132 35
7ee38065
MS
36/* For sparc64-cross-sparc32. */
37#define _SYSCALL32
252b5132 38#include "sysdep.h"
3db64b00 39#include "bfd.h"
252b5132
RH
40#include "bfdlink.h"
41#include "libbfd.h"
42#define ARCH_SIZE 0
43#include "elf-bfd.h"
e0e8c97f 44#include "libiberty.h"
ff59fc36 45#include "safe-ctype.h"
252b5132 46
217aa764 47static int elf_sort_sections (const void *, const void *);
c84fca4d 48static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
49static bfd_boolean prep_headers (bfd *);
50static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
51static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
52static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
53 file_ptr offset);
50b2bdb7 54
252b5132
RH
55/* Swap version information in and out. The version information is
56 currently size independent. If that ever changes, this code will
57 need to move into elfcode.h. */
58
59/* Swap in a Verdef structure. */
60
61void
217aa764
AM
62_bfd_elf_swap_verdef_in (bfd *abfd,
63 const Elf_External_Verdef *src,
64 Elf_Internal_Verdef *dst)
252b5132 65{
dc810e39
AM
66 dst->vd_version = H_GET_16 (abfd, src->vd_version);
67 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
68 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
69 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
70 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
71 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
72 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
73}
74
75/* Swap out a Verdef structure. */
76
77void
217aa764
AM
78_bfd_elf_swap_verdef_out (bfd *abfd,
79 const Elf_Internal_Verdef *src,
80 Elf_External_Verdef *dst)
252b5132 81{
dc810e39
AM
82 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
83 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
84 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
85 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
86 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
87 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
88 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
89}
90
91/* Swap in a Verdaux structure. */
92
93void
217aa764
AM
94_bfd_elf_swap_verdaux_in (bfd *abfd,
95 const Elf_External_Verdaux *src,
96 Elf_Internal_Verdaux *dst)
252b5132 97{
dc810e39
AM
98 dst->vda_name = H_GET_32 (abfd, src->vda_name);
99 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
100}
101
102/* Swap out a Verdaux structure. */
103
104void
217aa764
AM
105_bfd_elf_swap_verdaux_out (bfd *abfd,
106 const Elf_Internal_Verdaux *src,
107 Elf_External_Verdaux *dst)
252b5132 108{
dc810e39
AM
109 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
110 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
111}
112
113/* Swap in a Verneed structure. */
114
115void
217aa764
AM
116_bfd_elf_swap_verneed_in (bfd *abfd,
117 const Elf_External_Verneed *src,
118 Elf_Internal_Verneed *dst)
252b5132 119{
dc810e39
AM
120 dst->vn_version = H_GET_16 (abfd, src->vn_version);
121 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
122 dst->vn_file = H_GET_32 (abfd, src->vn_file);
123 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
124 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
125}
126
127/* Swap out a Verneed structure. */
128
129void
217aa764
AM
130_bfd_elf_swap_verneed_out (bfd *abfd,
131 const Elf_Internal_Verneed *src,
132 Elf_External_Verneed *dst)
252b5132 133{
dc810e39
AM
134 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
135 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
136 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
137 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
138 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
139}
140
141/* Swap in a Vernaux structure. */
142
143void
217aa764
AM
144_bfd_elf_swap_vernaux_in (bfd *abfd,
145 const Elf_External_Vernaux *src,
146 Elf_Internal_Vernaux *dst)
252b5132 147{
dc810e39
AM
148 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
149 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
150 dst->vna_other = H_GET_16 (abfd, src->vna_other);
151 dst->vna_name = H_GET_32 (abfd, src->vna_name);
152 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
153}
154
155/* Swap out a Vernaux structure. */
156
157void
217aa764
AM
158_bfd_elf_swap_vernaux_out (bfd *abfd,
159 const Elf_Internal_Vernaux *src,
160 Elf_External_Vernaux *dst)
252b5132 161{
dc810e39
AM
162 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
163 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
164 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
165 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
166 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
167}
168
169/* Swap in a Versym structure. */
170
171void
217aa764
AM
172_bfd_elf_swap_versym_in (bfd *abfd,
173 const Elf_External_Versym *src,
174 Elf_Internal_Versym *dst)
252b5132 175{
dc810e39 176 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
177}
178
179/* Swap out a Versym structure. */
180
181void
217aa764
AM
182_bfd_elf_swap_versym_out (bfd *abfd,
183 const Elf_Internal_Versym *src,
184 Elf_External_Versym *dst)
252b5132 185{
dc810e39 186 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
187}
188
189/* Standard ELF hash function. Do not change this function; you will
190 cause invalid hash tables to be generated. */
3a99b017 191
252b5132 192unsigned long
217aa764 193bfd_elf_hash (const char *namearg)
252b5132 194{
3a99b017 195 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
196 unsigned long h = 0;
197 unsigned long g;
198 int ch;
199
200 while ((ch = *name++) != '\0')
201 {
202 h = (h << 4) + ch;
203 if ((g = (h & 0xf0000000)) != 0)
204 {
205 h ^= g >> 24;
206 /* The ELF ABI says `h &= ~g', but this is equivalent in
207 this case and on some machines one insn instead of two. */
208 h ^= g;
209 }
210 }
32dfa85d 211 return h & 0xffffffff;
252b5132
RH
212}
213
fdc90cb4
JJ
214/* DT_GNU_HASH hash function. Do not change this function; you will
215 cause invalid hash tables to be generated. */
216
217unsigned long
218bfd_elf_gnu_hash (const char *namearg)
219{
220 const unsigned char *name = (const unsigned char *) namearg;
221 unsigned long h = 5381;
222 unsigned char ch;
223
224 while ((ch = *name++) != '\0')
225 h = (h << 5) + h + ch;
226 return h & 0xffffffff;
227}
228
0c8d6e5c
AM
229/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
230 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 231bfd_boolean
0c8d6e5c 232bfd_elf_allocate_object (bfd *abfd,
0ffa91dd
NC
233 size_t object_size,
234 enum elf_object_id object_id)
252b5132 235{
0ffa91dd
NC
236 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
237 abfd->tdata.any = bfd_zalloc (abfd, object_size);
238 if (abfd->tdata.any == NULL)
239 return FALSE;
252b5132 240
0ffa91dd
NC
241 elf_object_id (abfd) = object_id;
242 elf_program_header_size (abfd) = (bfd_size_type) -1;
b34976b6 243 return TRUE;
252b5132
RH
244}
245
0ffa91dd
NC
246
247bfd_boolean
248bfd_elf_make_generic_object (bfd *abfd)
249{
250 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
251 GENERIC_ELF_TDATA);
252}
253
b34976b6 254bfd_boolean
217aa764 255bfd_elf_mkcorefile (bfd *abfd)
252b5132 256{
c044fabd 257 /* I think this can be done just like an object file. */
0ffa91dd 258 return bfd_elf_make_generic_object (abfd);
252b5132
RH
259}
260
261char *
217aa764 262bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
263{
264 Elf_Internal_Shdr **i_shdrp;
f075ee0c 265 bfd_byte *shstrtab = NULL;
dc810e39
AM
266 file_ptr offset;
267 bfd_size_type shstrtabsize;
252b5132
RH
268
269 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
270 if (i_shdrp == 0
271 || shindex >= elf_numsections (abfd)
272 || i_shdrp[shindex] == 0)
f075ee0c 273 return NULL;
252b5132 274
f075ee0c 275 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
276 if (shstrtab == NULL)
277 {
c044fabd 278 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
279 offset = i_shdrp[shindex]->sh_offset;
280 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
281
282 /* Allocate and clear an extra byte at the end, to prevent crashes
283 in case the string table is not terminated. */
3471d59d 284 if (shstrtabsize + 1 <= 1
c6c60d09
JJ
285 || (shstrtab = bfd_alloc (abfd, shstrtabsize + 1)) == NULL
286 || bfd_seek (abfd, offset, SEEK_SET) != 0)
287 shstrtab = NULL;
288 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
289 {
290 if (bfd_get_error () != bfd_error_system_call)
291 bfd_set_error (bfd_error_file_truncated);
292 shstrtab = NULL;
3471d59d
CC
293 /* Once we've failed to read it, make sure we don't keep
294 trying. Otherwise, we'll keep allocating space for
295 the string table over and over. */
296 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
297 }
298 else
299 shstrtab[shstrtabsize] = '\0';
217aa764 300 i_shdrp[shindex]->contents = shstrtab;
252b5132 301 }
f075ee0c 302 return (char *) shstrtab;
252b5132
RH
303}
304
305char *
217aa764
AM
306bfd_elf_string_from_elf_section (bfd *abfd,
307 unsigned int shindex,
308 unsigned int strindex)
252b5132
RH
309{
310 Elf_Internal_Shdr *hdr;
311
312 if (strindex == 0)
313 return "";
314
74f2e02b
AM
315 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
316 return NULL;
317
252b5132
RH
318 hdr = elf_elfsections (abfd)[shindex];
319
320 if (hdr->contents == NULL
321 && bfd_elf_get_str_section (abfd, shindex) == NULL)
322 return NULL;
323
324 if (strindex >= hdr->sh_size)
325 {
1b3a8575 326 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 327 (*_bfd_error_handler)
d003868e
AM
328 (_("%B: invalid string offset %u >= %lu for section `%s'"),
329 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 330 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 331 ? ".shstrtab"
1b3a8575 332 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
252b5132
RH
333 return "";
334 }
335
336 return ((char *) hdr->contents) + strindex;
337}
338
6cdc0ccc
AM
339/* Read and convert symbols to internal format.
340 SYMCOUNT specifies the number of symbols to read, starting from
341 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
342 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
343 symbols, and symbol section index extensions, respectively.
344 Returns a pointer to the internal symbol buffer (malloced if necessary)
345 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
346
347Elf_Internal_Sym *
217aa764
AM
348bfd_elf_get_elf_syms (bfd *ibfd,
349 Elf_Internal_Shdr *symtab_hdr,
350 size_t symcount,
351 size_t symoffset,
352 Elf_Internal_Sym *intsym_buf,
353 void *extsym_buf,
354 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
355{
356 Elf_Internal_Shdr *shndx_hdr;
217aa764 357 void *alloc_ext;
df622259 358 const bfd_byte *esym;
6cdc0ccc
AM
359 Elf_External_Sym_Shndx *alloc_extshndx;
360 Elf_External_Sym_Shndx *shndx;
4dd07732 361 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
362 Elf_Internal_Sym *isym;
363 Elf_Internal_Sym *isymend;
9c5bfbb7 364 const struct elf_backend_data *bed;
6cdc0ccc
AM
365 size_t extsym_size;
366 bfd_size_type amt;
367 file_ptr pos;
368
e44a2c9c
AM
369 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
370 abort ();
371
6cdc0ccc
AM
372 if (symcount == 0)
373 return intsym_buf;
374
375 /* Normal syms might have section extension entries. */
376 shndx_hdr = NULL;
377 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
378 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
379
380 /* Read the symbols. */
381 alloc_ext = NULL;
382 alloc_extshndx = NULL;
4dd07732 383 alloc_intsym = NULL;
6cdc0ccc
AM
384 bed = get_elf_backend_data (ibfd);
385 extsym_size = bed->s->sizeof_sym;
386 amt = symcount * extsym_size;
387 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
388 if (extsym_buf == NULL)
389 {
d0fb9a8d 390 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
391 extsym_buf = alloc_ext;
392 }
393 if (extsym_buf == NULL
394 || bfd_seek (ibfd, pos, SEEK_SET) != 0
395 || bfd_bread (extsym_buf, amt, ibfd) != amt)
396 {
397 intsym_buf = NULL;
398 goto out;
399 }
400
401 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
402 extshndx_buf = NULL;
403 else
404 {
405 amt = symcount * sizeof (Elf_External_Sym_Shndx);
406 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
407 if (extshndx_buf == NULL)
408 {
d0fb9a8d
JJ
409 alloc_extshndx = bfd_malloc2 (symcount,
410 sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
411 extshndx_buf = alloc_extshndx;
412 }
413 if (extshndx_buf == NULL
414 || bfd_seek (ibfd, pos, SEEK_SET) != 0
415 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
416 {
417 intsym_buf = NULL;
418 goto out;
419 }
420 }
421
422 if (intsym_buf == NULL)
423 {
4dd07732
AM
424 alloc_intsym = bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
425 intsym_buf = alloc_intsym;
6cdc0ccc
AM
426 if (intsym_buf == NULL)
427 goto out;
428 }
429
430 /* Convert the symbols to internal form. */
431 isymend = intsym_buf + symcount;
432 for (esym = extsym_buf, isym = intsym_buf, shndx = extshndx_buf;
433 isym < isymend;
434 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
435 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
436 {
437 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
438 (*_bfd_error_handler) (_("%B symbol number %lu references "
439 "nonexistent SHT_SYMTAB_SHNDX section"),
440 ibfd, (unsigned long) symoffset);
4dd07732
AM
441 if (alloc_intsym != NULL)
442 free (alloc_intsym);
8384fb8f
AM
443 intsym_buf = NULL;
444 goto out;
445 }
6cdc0ccc
AM
446
447 out:
448 if (alloc_ext != NULL)
449 free (alloc_ext);
450 if (alloc_extshndx != NULL)
451 free (alloc_extshndx);
452
453 return intsym_buf;
454}
455
5cab59f6
AM
456/* Look up a symbol name. */
457const char *
be8dd2ca
AM
458bfd_elf_sym_name (bfd *abfd,
459 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
460 Elf_Internal_Sym *isym,
461 asection *sym_sec)
5cab59f6 462{
26c61ae5 463 const char *name;
5cab59f6 464 unsigned int iname = isym->st_name;
be8dd2ca 465 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 466
138f35cc
JJ
467 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
468 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 469 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
470 {
471 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
472 shindex = elf_elfheader (abfd)->e_shstrndx;
473 }
474
26c61ae5
L
475 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
476 if (name == NULL)
477 name = "(null)";
478 else if (sym_sec && *name == '\0')
479 name = bfd_section_name (abfd, sym_sec);
480
481 return name;
5cab59f6
AM
482}
483
dbb410c3
AM
484/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
485 sections. The first element is the flags, the rest are section
486 pointers. */
487
488typedef union elf_internal_group {
489 Elf_Internal_Shdr *shdr;
490 unsigned int flags;
491} Elf_Internal_Group;
492
b885599b
AM
493/* Return the name of the group signature symbol. Why isn't the
494 signature just a string? */
495
496static const char *
217aa764 497group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 498{
9dce4196 499 Elf_Internal_Shdr *hdr;
9dce4196
AM
500 unsigned char esym[sizeof (Elf64_External_Sym)];
501 Elf_External_Sym_Shndx eshndx;
502 Elf_Internal_Sym isym;
b885599b 503
13792e9d
L
504 /* First we need to ensure the symbol table is available. Make sure
505 that it is a symbol table section. */
4fbb74a6
AM
506 if (ghdr->sh_link >= elf_numsections (abfd))
507 return NULL;
13792e9d
L
508 hdr = elf_elfsections (abfd) [ghdr->sh_link];
509 if (hdr->sh_type != SHT_SYMTAB
510 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
511 return NULL;
512
9dce4196
AM
513 /* Go read the symbol. */
514 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
515 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
516 &isym, esym, &eshndx) == NULL)
b885599b 517 return NULL;
9dce4196 518
26c61ae5 519 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
520}
521
dbb410c3
AM
522/* Set next_in_group list pointer, and group name for NEWSECT. */
523
b34976b6 524static bfd_boolean
217aa764 525setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
526{
527 unsigned int num_group = elf_tdata (abfd)->num_group;
528
529 /* If num_group is zero, read in all SHT_GROUP sections. The count
530 is set to -1 if there are no SHT_GROUP sections. */
531 if (num_group == 0)
532 {
533 unsigned int i, shnum;
534
535 /* First count the number of groups. If we have a SHT_GROUP
536 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 537 shnum = elf_numsections (abfd);
dbb410c3 538 num_group = 0;
08a40648 539
1783205a
NC
540#define IS_VALID_GROUP_SECTION_HEADER(shdr) \
541 ( (shdr)->sh_type == SHT_GROUP \
542 && (shdr)->sh_size >= (2 * GRP_ENTRY_SIZE) \
543 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
544 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 545
dbb410c3
AM
546 for (i = 0; i < shnum; i++)
547 {
548 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
549
550 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3
AM
551 num_group += 1;
552 }
553
554 if (num_group == 0)
20dbb49d
L
555 {
556 num_group = (unsigned) -1;
557 elf_tdata (abfd)->num_group = num_group;
558 }
559 else
dbb410c3
AM
560 {
561 /* We keep a list of elf section headers for group sections,
562 so we can find them quickly. */
20dbb49d 563 bfd_size_type amt;
d0fb9a8d 564
20dbb49d 565 elf_tdata (abfd)->num_group = num_group;
d0fb9a8d
JJ
566 elf_tdata (abfd)->group_sect_ptr
567 = bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 568 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 569 return FALSE;
dbb410c3
AM
570
571 num_group = 0;
572 for (i = 0; i < shnum; i++)
573 {
574 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
575
576 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3 577 {
973ffd63 578 unsigned char *src;
dbb410c3
AM
579 Elf_Internal_Group *dest;
580
581 /* Add to list of sections. */
582 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
583 num_group += 1;
584
585 /* Read the raw contents. */
586 BFD_ASSERT (sizeof (*dest) >= 4);
587 amt = shdr->sh_size * sizeof (*dest) / 4;
d0fb9a8d
JJ
588 shdr->contents = bfd_alloc2 (abfd, shdr->sh_size,
589 sizeof (*dest) / 4);
1783205a
NC
590 /* PR binutils/4110: Handle corrupt group headers. */
591 if (shdr->contents == NULL)
592 {
593 _bfd_error_handler
594 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
595 bfd_set_error (bfd_error_bad_value);
596 return FALSE;
597 }
598
599 memset (shdr->contents, 0, amt);
600
601 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
602 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
603 != shdr->sh_size))
b34976b6 604 return FALSE;
dbb410c3
AM
605
606 /* Translate raw contents, a flag word followed by an
607 array of elf section indices all in target byte order,
608 to the flag word followed by an array of elf section
609 pointers. */
610 src = shdr->contents + shdr->sh_size;
611 dest = (Elf_Internal_Group *) (shdr->contents + amt);
612 while (1)
613 {
614 unsigned int idx;
615
616 src -= 4;
617 --dest;
618 idx = H_GET_32 (abfd, src);
619 if (src == shdr->contents)
620 {
621 dest->flags = idx;
b885599b
AM
622 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
623 shdr->bfd_section->flags
624 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
625 break;
626 }
627 if (idx >= shnum)
628 {
629 ((*_bfd_error_handler)
d003868e 630 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
631 idx = 0;
632 }
633 dest->shdr = elf_elfsections (abfd)[idx];
634 }
635 }
636 }
637 }
638 }
639
640 if (num_group != (unsigned) -1)
641 {
642 unsigned int i;
643
644 for (i = 0; i < num_group; i++)
645 {
646 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
647 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
648 unsigned int n_elt = shdr->sh_size / 4;
649
650 /* Look through this group's sections to see if current
651 section is a member. */
652 while (--n_elt != 0)
653 if ((++idx)->shdr == hdr)
654 {
e0e8c97f 655 asection *s = NULL;
dbb410c3
AM
656
657 /* We are a member of this group. Go looking through
658 other members to see if any others are linked via
659 next_in_group. */
660 idx = (Elf_Internal_Group *) shdr->contents;
661 n_elt = shdr->sh_size / 4;
662 while (--n_elt != 0)
663 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 664 && elf_next_in_group (s) != NULL)
dbb410c3
AM
665 break;
666 if (n_elt != 0)
667 {
dbb410c3
AM
668 /* Snarf the group name from other member, and
669 insert current section in circular list. */
945906ff
AM
670 elf_group_name (newsect) = elf_group_name (s);
671 elf_next_in_group (newsect) = elf_next_in_group (s);
672 elf_next_in_group (s) = newsect;
dbb410c3
AM
673 }
674 else
675 {
dbb410c3
AM
676 const char *gname;
677
b885599b
AM
678 gname = group_signature (abfd, shdr);
679 if (gname == NULL)
b34976b6 680 return FALSE;
945906ff 681 elf_group_name (newsect) = gname;
dbb410c3
AM
682
683 /* Start a circular list with one element. */
945906ff 684 elf_next_in_group (newsect) = newsect;
dbb410c3 685 }
b885599b 686
9dce4196
AM
687 /* If the group section has been created, point to the
688 new member. */
dbb410c3 689 if (shdr->bfd_section != NULL)
945906ff 690 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 691
dbb410c3
AM
692 i = num_group - 1;
693 break;
694 }
695 }
696 }
697
945906ff 698 if (elf_group_name (newsect) == NULL)
dbb410c3 699 {
d003868e
AM
700 (*_bfd_error_handler) (_("%B: no group info for section %A"),
701 abfd, newsect);
dbb410c3 702 }
b34976b6 703 return TRUE;
dbb410c3
AM
704}
705
3d7f7666 706bfd_boolean
dd863624 707_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
708{
709 unsigned int i;
710 unsigned int num_group = elf_tdata (abfd)->num_group;
711 bfd_boolean result = TRUE;
dd863624
L
712 asection *s;
713
714 /* Process SHF_LINK_ORDER. */
715 for (s = abfd->sections; s != NULL; s = s->next)
716 {
717 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
718 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
719 {
720 unsigned int elfsec = this_hdr->sh_link;
721 /* FIXME: The old Intel compiler and old strip/objcopy may
722 not set the sh_link or sh_info fields. Hence we could
723 get the situation where elfsec is 0. */
724 if (elfsec == 0)
725 {
4fbb74a6 726 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
727 if (bed->link_order_error_handler)
728 bed->link_order_error_handler
729 (_("%B: warning: sh_link not set for section `%A'"),
730 abfd, s);
731 }
732 else
733 {
4fbb74a6 734 asection *link = NULL;
25bbc984 735
4fbb74a6
AM
736 if (elfsec < elf_numsections (abfd))
737 {
738 this_hdr = elf_elfsections (abfd)[elfsec];
739 link = this_hdr->bfd_section;
740 }
25bbc984
L
741
742 /* PR 1991, 2008:
743 Some strip/objcopy may leave an incorrect value in
744 sh_link. We don't want to proceed. */
25bbc984
L
745 if (link == NULL)
746 {
747 (*_bfd_error_handler)
748 (_("%B: sh_link [%d] in section `%A' is incorrect"),
749 s->owner, s, elfsec);
750 result = FALSE;
751 }
752
753 elf_linked_to_section (s) = link;
dd863624
L
754 }
755 }
756 }
3d7f7666 757
dd863624 758 /* Process section groups. */
3d7f7666
L
759 if (num_group == (unsigned) -1)
760 return result;
761
762 for (i = 0; i < num_group; i++)
763 {
764 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
765 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
766 unsigned int n_elt = shdr->sh_size / 4;
767
768 while (--n_elt != 0)
769 if ((++idx)->shdr->bfd_section)
770 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
771 else if (idx->shdr->sh_type == SHT_RELA
772 || idx->shdr->sh_type == SHT_REL)
773 /* We won't include relocation sections in section groups in
774 output object files. We adjust the group section size here
775 so that relocatable link will work correctly when
776 relocation sections are in section group in input object
777 files. */
778 shdr->bfd_section->size -= 4;
779 else
780 {
781 /* There are some unknown sections in the group. */
782 (*_bfd_error_handler)
d003868e
AM
783 (_("%B: unknown [%d] section `%s' in group [%s]"),
784 abfd,
3d7f7666 785 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
786 bfd_elf_string_from_elf_section (abfd,
787 (elf_elfheader (abfd)
788 ->e_shstrndx),
789 idx->shdr->sh_name),
3d7f7666
L
790 shdr->bfd_section->name);
791 result = FALSE;
792 }
793 }
794 return result;
795}
796
72adc230
AM
797bfd_boolean
798bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
799{
800 return elf_next_in_group (sec) != NULL;
801}
802
252b5132
RH
803/* Make a BFD section from an ELF section. We store a pointer to the
804 BFD section in the bfd_section field of the header. */
805
b34976b6 806bfd_boolean
217aa764
AM
807_bfd_elf_make_section_from_shdr (bfd *abfd,
808 Elf_Internal_Shdr *hdr,
6dc132d9
L
809 const char *name,
810 int shindex)
252b5132
RH
811{
812 asection *newsect;
813 flagword flags;
9c5bfbb7 814 const struct elf_backend_data *bed;
252b5132
RH
815
816 if (hdr->bfd_section != NULL)
817 {
818 BFD_ASSERT (strcmp (name,
819 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 820 return TRUE;
252b5132
RH
821 }
822
823 newsect = bfd_make_section_anyway (abfd, name);
824 if (newsect == NULL)
b34976b6 825 return FALSE;
252b5132 826
1829f4b2
AM
827 hdr->bfd_section = newsect;
828 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 829 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 830
2f89ff8d
L
831 /* Always use the real type/flags. */
832 elf_section_type (newsect) = hdr->sh_type;
833 elf_section_flags (newsect) = hdr->sh_flags;
834
252b5132
RH
835 newsect->filepos = hdr->sh_offset;
836
837 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
838 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
839 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 840 bfd_log2 (hdr->sh_addralign)))
b34976b6 841 return FALSE;
252b5132
RH
842
843 flags = SEC_NO_FLAGS;
844 if (hdr->sh_type != SHT_NOBITS)
845 flags |= SEC_HAS_CONTENTS;
dbb410c3 846 if (hdr->sh_type == SHT_GROUP)
b3096250 847 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
848 if ((hdr->sh_flags & SHF_ALLOC) != 0)
849 {
850 flags |= SEC_ALLOC;
851 if (hdr->sh_type != SHT_NOBITS)
852 flags |= SEC_LOAD;
853 }
854 if ((hdr->sh_flags & SHF_WRITE) == 0)
855 flags |= SEC_READONLY;
856 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
857 flags |= SEC_CODE;
858 else if ((flags & SEC_LOAD) != 0)
859 flags |= SEC_DATA;
f5fa8ca2
JJ
860 if ((hdr->sh_flags & SHF_MERGE) != 0)
861 {
862 flags |= SEC_MERGE;
863 newsect->entsize = hdr->sh_entsize;
864 if ((hdr->sh_flags & SHF_STRINGS) != 0)
865 flags |= SEC_STRINGS;
866 }
dbb410c3
AM
867 if (hdr->sh_flags & SHF_GROUP)
868 if (!setup_group (abfd, hdr, newsect))
b34976b6 869 return FALSE;
13ae64f3
JJ
870 if ((hdr->sh_flags & SHF_TLS) != 0)
871 flags |= SEC_THREAD_LOCAL;
252b5132 872
3d2b39cf 873 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 874 {
3d2b39cf
L
875 /* The debugging sections appear to be recognized only by name,
876 not any sort of flag. Their SEC_ALLOC bits are cleared. */
877 static const struct
878 {
879 const char *name;
880 int len;
881 } debug_sections [] =
882 {
0112cd26 883 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
884 { NULL, 0 }, /* 'e' */
885 { NULL, 0 }, /* 'f' */
0112cd26 886 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
887 { NULL, 0 }, /* 'h' */
888 { NULL, 0 }, /* 'i' */
889 { NULL, 0 }, /* 'j' */
890 { NULL, 0 }, /* 'k' */
0112cd26 891 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
892 { NULL, 0 }, /* 'm' */
893 { NULL, 0 }, /* 'n' */
894 { NULL, 0 }, /* 'o' */
895 { NULL, 0 }, /* 'p' */
896 { NULL, 0 }, /* 'q' */
897 { NULL, 0 }, /* 'r' */
1b315056
CS
898 { STRING_COMMA_LEN ("stab") }, /* 's' */
899 { NULL, 0 }, /* 't' */
900 { NULL, 0 }, /* 'u' */
901 { NULL, 0 }, /* 'v' */
902 { NULL, 0 }, /* 'w' */
903 { NULL, 0 }, /* 'x' */
904 { NULL, 0 }, /* 'y' */
905 { STRING_COMMA_LEN ("zdebug") } /* 'z' */
3d2b39cf 906 };
08a40648 907
3d2b39cf
L
908 if (name [0] == '.')
909 {
910 int i = name [1] - 'd';
911 if (i >= 0
912 && i < (int) ARRAY_SIZE (debug_sections)
913 && debug_sections [i].name != NULL
914 && strncmp (&name [1], debug_sections [i].name,
915 debug_sections [i].len) == 0)
916 flags |= SEC_DEBUGGING;
917 }
918 }
252b5132
RH
919
920 /* As a GNU extension, if the name begins with .gnu.linkonce, we
921 only link a single copy of the section. This is used to support
922 g++. g++ will emit each template expansion in its own section.
923 The symbols will be defined as weak, so that multiple definitions
924 are permitted. The GNU linker extension is to actually discard
925 all but one of the sections. */
0112cd26 926 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 927 && elf_next_in_group (newsect) == NULL)
252b5132
RH
928 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
929
fa152c49
JW
930 bed = get_elf_backend_data (abfd);
931 if (bed->elf_backend_section_flags)
932 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 933 return FALSE;
fa152c49 934
252b5132 935 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 936 return FALSE;
252b5132 937
718175fa
JK
938 /* We do not parse the PT_NOTE segments as we are interested even in the
939 separate debug info files which may have the segments offsets corrupted.
940 PT_NOTEs from the core files are currently not parsed using BFD. */
941 if (hdr->sh_type == SHT_NOTE)
942 {
baea7ef1 943 bfd_byte *contents;
718175fa 944
baea7ef1 945 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
946 return FALSE;
947
baea7ef1 948 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
949 free (contents);
950 }
951
252b5132
RH
952 if ((flags & SEC_ALLOC) != 0)
953 {
954 Elf_Internal_Phdr *phdr;
6ffd7900
AM
955 unsigned int i, nload;
956
957 /* Some ELF linkers produce binaries with all the program header
958 p_paddr fields zero. If we have such a binary with more than
959 one PT_LOAD header, then leave the section lma equal to vma
960 so that we don't create sections with overlapping lma. */
961 phdr = elf_tdata (abfd)->phdr;
962 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
963 if (phdr->p_paddr != 0)
964 break;
965 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
966 ++nload;
967 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
968 return TRUE;
252b5132 969
252b5132
RH
970 phdr = elf_tdata (abfd)->phdr;
971 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
972 {
88967714
AM
973 /* This section is part of this segment if its file
974 offset plus size lies within the segment's memory
975 span and, if the section is loaded, the extent of the
976 loaded data lies within the extent of the segment.
977
978 Note - we used to check the p_paddr field as well, and
979 refuse to set the LMA if it was 0. This is wrong
980 though, as a perfectly valid initialised segment can
981 have a p_paddr of zero. Some architectures, eg ARM,
982 place special significance on the address 0 and
983 executables need to be able to have a segment which
984 covers this address. */
985 if (phdr->p_type == PT_LOAD
986 && (bfd_vma) hdr->sh_offset >= phdr->p_offset
987 && (hdr->sh_offset + hdr->sh_size
988 <= phdr->p_offset + phdr->p_memsz)
989 && ((flags & SEC_LOAD) == 0
990 || (hdr->sh_offset + hdr->sh_size
991 <= phdr->p_offset + phdr->p_filesz)))
252b5132 992 {
88967714
AM
993 if ((flags & SEC_LOAD) == 0)
994 newsect->lma = (phdr->p_paddr
995 + hdr->sh_addr - phdr->p_vaddr);
996 else
997 /* We used to use the same adjustment for SEC_LOAD
998 sections, but that doesn't work if the segment
999 is packed with code from multiple VMAs.
1000 Instead we calculate the section LMA based on
1001 the segment LMA. It is assumed that the
1002 segment will contain sections with contiguous
1003 LMAs, even if the VMAs are not. */
1004 newsect->lma = (phdr->p_paddr
1005 + hdr->sh_offset - phdr->p_offset);
1006
1007 /* With contiguous segments, we can't tell from file
1008 offsets whether a section with zero size should
1009 be placed at the end of one segment or the
1010 beginning of the next. Decide based on vaddr. */
1011 if (hdr->sh_addr >= phdr->p_vaddr
1012 && (hdr->sh_addr + hdr->sh_size
1013 <= phdr->p_vaddr + phdr->p_memsz))
1014 break;
252b5132
RH
1015 }
1016 }
1017 }
1018
b34976b6 1019 return TRUE;
252b5132
RH
1020}
1021
1022/*
1023INTERNAL_FUNCTION
1024 bfd_elf_find_section
1025
1026SYNOPSIS
1027 struct elf_internal_shdr *bfd_elf_find_section (bfd *abfd, char *name);
1028
1029DESCRIPTION
1030 Helper functions for GDB to locate the string tables.
1031 Since BFD hides string tables from callers, GDB needs to use an
1032 internal hook to find them. Sun's .stabstr, in particular,
1033 isn't even pointed to by the .stab section, so ordinary
1034 mechanisms wouldn't work to find it, even if we had some.
1035*/
1036
1037struct elf_internal_shdr *
217aa764 1038bfd_elf_find_section (bfd *abfd, char *name)
252b5132
RH
1039{
1040 Elf_Internal_Shdr **i_shdrp;
1041 char *shstrtab;
1042 unsigned int max;
1043 unsigned int i;
1044
1045 i_shdrp = elf_elfsections (abfd);
1046 if (i_shdrp != NULL)
1047 {
9ad5cbcf
AM
1048 shstrtab = bfd_elf_get_str_section (abfd,
1049 elf_elfheader (abfd)->e_shstrndx);
252b5132
RH
1050 if (shstrtab != NULL)
1051 {
9ad5cbcf 1052 max = elf_numsections (abfd);
252b5132
RH
1053 for (i = 1; i < max; i++)
1054 if (!strcmp (&shstrtab[i_shdrp[i]->sh_name], name))
1055 return i_shdrp[i];
1056 }
1057 }
1058 return 0;
1059}
1060
1061const char *const bfd_elf_section_type_names[] = {
1062 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1063 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1064 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1065};
1066
1049f94e 1067/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1068 output, and the reloc is against an external symbol, and nothing
1069 has given us any additional addend, the resulting reloc will also
1070 be against the same symbol. In such a case, we don't want to
1071 change anything about the way the reloc is handled, since it will
1072 all be done at final link time. Rather than put special case code
1073 into bfd_perform_relocation, all the reloc types use this howto
1074 function. It just short circuits the reloc if producing
1049f94e 1075 relocatable output against an external symbol. */
252b5132 1076
252b5132 1077bfd_reloc_status_type
217aa764
AM
1078bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1079 arelent *reloc_entry,
1080 asymbol *symbol,
1081 void *data ATTRIBUTE_UNUSED,
1082 asection *input_section,
1083 bfd *output_bfd,
1084 char **error_message ATTRIBUTE_UNUSED)
1085{
1086 if (output_bfd != NULL
252b5132
RH
1087 && (symbol->flags & BSF_SECTION_SYM) == 0
1088 && (! reloc_entry->howto->partial_inplace
1089 || reloc_entry->addend == 0))
1090 {
1091 reloc_entry->address += input_section->output_offset;
1092 return bfd_reloc_ok;
1093 }
1094
1095 return bfd_reloc_continue;
1096}
1097\f
0ac4564e
L
1098/* Copy the program header and other data from one object module to
1099 another. */
252b5132 1100
b34976b6 1101bfd_boolean
217aa764 1102_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1103{
1104 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1105 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1106 return TRUE;
2d502050
L
1107
1108 BFD_ASSERT (!elf_flags_init (obfd)
1109 || (elf_elfheader (obfd)->e_flags
1110 == elf_elfheader (ibfd)->e_flags));
1111
0ac4564e 1112 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1113 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1114 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1115
1116 /* Copy object attributes. */
1117 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1118
b34976b6 1119 return TRUE;
2d502050
L
1120}
1121
cedc298e
L
1122static const char *
1123get_segment_type (unsigned int p_type)
1124{
1125 const char *pt;
1126 switch (p_type)
1127 {
1128 case PT_NULL: pt = "NULL"; break;
1129 case PT_LOAD: pt = "LOAD"; break;
1130 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1131 case PT_INTERP: pt = "INTERP"; break;
1132 case PT_NOTE: pt = "NOTE"; break;
1133 case PT_SHLIB: pt = "SHLIB"; break;
1134 case PT_PHDR: pt = "PHDR"; break;
1135 case PT_TLS: pt = "TLS"; break;
1136 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1137 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1138 case PT_GNU_RELRO: pt = "RELRO"; break;
1139 default: pt = NULL; break;
1140 }
1141 return pt;
1142}
1143
f0b79d91
L
1144/* Print out the program headers. */
1145
b34976b6 1146bfd_boolean
217aa764 1147_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1148{
217aa764 1149 FILE *f = farg;
252b5132
RH
1150 Elf_Internal_Phdr *p;
1151 asection *s;
1152 bfd_byte *dynbuf = NULL;
1153
1154 p = elf_tdata (abfd)->phdr;
1155 if (p != NULL)
1156 {
1157 unsigned int i, c;
1158
1159 fprintf (f, _("\nProgram Header:\n"));
1160 c = elf_elfheader (abfd)->e_phnum;
1161 for (i = 0; i < c; i++, p++)
1162 {
cedc298e 1163 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1164 char buf[20];
1165
cedc298e 1166 if (pt == NULL)
252b5132 1167 {
cedc298e
L
1168 sprintf (buf, "0x%lx", p->p_type);
1169 pt = buf;
252b5132 1170 }
dc810e39 1171 fprintf (f, "%8s off 0x", pt);
60b89a18 1172 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1173 fprintf (f, " vaddr 0x");
60b89a18 1174 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1175 fprintf (f, " paddr 0x");
60b89a18 1176 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1177 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1178 fprintf (f, " filesz 0x");
60b89a18 1179 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1180 fprintf (f, " memsz 0x");
60b89a18 1181 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1182 fprintf (f, " flags %c%c%c",
1183 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1184 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1185 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1186 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1187 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1188 fprintf (f, "\n");
1189 }
1190 }
1191
1192 s = bfd_get_section_by_name (abfd, ".dynamic");
1193 if (s != NULL)
1194 {
cb33740c 1195 unsigned int elfsec;
dc810e39 1196 unsigned long shlink;
252b5132
RH
1197 bfd_byte *extdyn, *extdynend;
1198 size_t extdynsize;
217aa764 1199 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1200
1201 fprintf (f, _("\nDynamic Section:\n"));
1202
eea6121a 1203 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1204 goto error_return;
1205
1206 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1207 if (elfsec == SHN_BAD)
252b5132 1208 goto error_return;
dc810e39 1209 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1210
1211 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1212 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1213
1214 extdyn = dynbuf;
eea6121a 1215 extdynend = extdyn + s->size;
252b5132
RH
1216 for (; extdyn < extdynend; extdyn += extdynsize)
1217 {
1218 Elf_Internal_Dyn dyn;
ad9563d6 1219 const char *name = "";
252b5132 1220 char ab[20];
b34976b6 1221 bfd_boolean stringp;
ad9563d6 1222 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1223
217aa764 1224 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1225
1226 if (dyn.d_tag == DT_NULL)
1227 break;
1228
b34976b6 1229 stringp = FALSE;
252b5132
RH
1230 switch (dyn.d_tag)
1231 {
1232 default:
ad9563d6
CM
1233 if (bed->elf_backend_get_target_dtag)
1234 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1235
1236 if (!strcmp (name, ""))
1237 {
1238 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1239 name = ab;
1240 }
252b5132
RH
1241 break;
1242
b34976b6 1243 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1244 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1245 case DT_PLTGOT: name = "PLTGOT"; break;
1246 case DT_HASH: name = "HASH"; break;
1247 case DT_STRTAB: name = "STRTAB"; break;
1248 case DT_SYMTAB: name = "SYMTAB"; break;
1249 case DT_RELA: name = "RELA"; break;
1250 case DT_RELASZ: name = "RELASZ"; break;
1251 case DT_RELAENT: name = "RELAENT"; break;
1252 case DT_STRSZ: name = "STRSZ"; break;
1253 case DT_SYMENT: name = "SYMENT"; break;
1254 case DT_INIT: name = "INIT"; break;
1255 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1256 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1257 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1258 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1259 case DT_REL: name = "REL"; break;
1260 case DT_RELSZ: name = "RELSZ"; break;
1261 case DT_RELENT: name = "RELENT"; break;
1262 case DT_PLTREL: name = "PLTREL"; break;
1263 case DT_DEBUG: name = "DEBUG"; break;
1264 case DT_TEXTREL: name = "TEXTREL"; break;
1265 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1266 case DT_BIND_NOW: name = "BIND_NOW"; break;
1267 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1268 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1269 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1270 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1271 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1272 case DT_FLAGS: name = "FLAGS"; break;
1273 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1274 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1275 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1276 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1277 case DT_MOVEENT: name = "MOVEENT"; break;
1278 case DT_MOVESZ: name = "MOVESZ"; break;
1279 case DT_FEATURE: name = "FEATURE"; break;
1280 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1281 case DT_SYMINSZ: name = "SYMINSZ"; break;
1282 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1283 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1284 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1285 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1286 case DT_PLTPAD: name = "PLTPAD"; break;
1287 case DT_MOVETAB: name = "MOVETAB"; break;
1288 case DT_SYMINFO: name = "SYMINFO"; break;
1289 case DT_RELACOUNT: name = "RELACOUNT"; break;
1290 case DT_RELCOUNT: name = "RELCOUNT"; break;
1291 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1292 case DT_VERSYM: name = "VERSYM"; break;
1293 case DT_VERDEF: name = "VERDEF"; break;
1294 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1295 case DT_VERNEED: name = "VERNEED"; break;
1296 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1297 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1298 case DT_USED: name = "USED"; break;
b34976b6 1299 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1300 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1301 }
1302
ad9563d6 1303 fprintf (f, " %-20s ", name);
252b5132 1304 if (! stringp)
a1f3c56e
AN
1305 {
1306 fprintf (f, "0x");
1307 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1308 }
252b5132
RH
1309 else
1310 {
1311 const char *string;
dc810e39 1312 unsigned int tagv = dyn.d_un.d_val;
252b5132 1313
dc810e39 1314 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1315 if (string == NULL)
1316 goto error_return;
1317 fprintf (f, "%s", string);
1318 }
1319 fprintf (f, "\n");
1320 }
1321
1322 free (dynbuf);
1323 dynbuf = NULL;
1324 }
1325
1326 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1327 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1328 {
fc0e6df6 1329 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1330 return FALSE;
252b5132
RH
1331 }
1332
1333 if (elf_dynverdef (abfd) != 0)
1334 {
1335 Elf_Internal_Verdef *t;
1336
1337 fprintf (f, _("\nVersion definitions:\n"));
1338 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1339 {
1340 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1341 t->vd_flags, t->vd_hash,
1342 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1343 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1344 {
1345 Elf_Internal_Verdaux *a;
1346
1347 fprintf (f, "\t");
1348 for (a = t->vd_auxptr->vda_nextptr;
1349 a != NULL;
1350 a = a->vda_nextptr)
d0fb9a8d
JJ
1351 fprintf (f, "%s ",
1352 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1353 fprintf (f, "\n");
1354 }
1355 }
1356 }
1357
1358 if (elf_dynverref (abfd) != 0)
1359 {
1360 Elf_Internal_Verneed *t;
1361
1362 fprintf (f, _("\nVersion References:\n"));
1363 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1364 {
1365 Elf_Internal_Vernaux *a;
1366
d0fb9a8d
JJ
1367 fprintf (f, _(" required from %s:\n"),
1368 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1369 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1370 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1371 a->vna_flags, a->vna_other,
1372 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1373 }
1374 }
1375
b34976b6 1376 return TRUE;
252b5132
RH
1377
1378 error_return:
1379 if (dynbuf != NULL)
1380 free (dynbuf);
b34976b6 1381 return FALSE;
252b5132
RH
1382}
1383
1384/* Display ELF-specific fields of a symbol. */
1385
1386void
217aa764
AM
1387bfd_elf_print_symbol (bfd *abfd,
1388 void *filep,
1389 asymbol *symbol,
1390 bfd_print_symbol_type how)
252b5132 1391{
217aa764 1392 FILE *file = filep;
252b5132
RH
1393 switch (how)
1394 {
1395 case bfd_print_symbol_name:
1396 fprintf (file, "%s", symbol->name);
1397 break;
1398 case bfd_print_symbol_more:
1399 fprintf (file, "elf ");
60b89a18 1400 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1401 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1402 break;
1403 case bfd_print_symbol_all:
1404 {
4e8a9624
AM
1405 const char *section_name;
1406 const char *name = NULL;
9c5bfbb7 1407 const struct elf_backend_data *bed;
7a13edea 1408 unsigned char st_other;
dbb410c3 1409 bfd_vma val;
c044fabd 1410
252b5132 1411 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1412
1413 bed = get_elf_backend_data (abfd);
1414 if (bed->elf_backend_print_symbol_all)
c044fabd 1415 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1416
1417 if (name == NULL)
1418 {
7ee38065 1419 name = symbol->name;
217aa764 1420 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1421 }
1422
252b5132
RH
1423 fprintf (file, " %s\t", section_name);
1424 /* Print the "other" value for a symbol. For common symbols,
1425 we've already printed the size; now print the alignment.
1426 For other symbols, we have no specified alignment, and
1427 we've printed the address; now print the size. */
dcf6c779 1428 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1429 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1430 else
1431 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1432 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1433
1434 /* If we have version information, print it. */
1435 if (elf_tdata (abfd)->dynversym_section != 0
1436 && (elf_tdata (abfd)->dynverdef_section != 0
1437 || elf_tdata (abfd)->dynverref_section != 0))
1438 {
1439 unsigned int vernum;
1440 const char *version_string;
1441
1442 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1443
1444 if (vernum == 0)
1445 version_string = "";
1446 else if (vernum == 1)
1447 version_string = "Base";
1448 else if (vernum <= elf_tdata (abfd)->cverdefs)
1449 version_string =
1450 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1451 else
1452 {
1453 Elf_Internal_Verneed *t;
1454
1455 version_string = "";
1456 for (t = elf_tdata (abfd)->verref;
1457 t != NULL;
1458 t = t->vn_nextref)
1459 {
1460 Elf_Internal_Vernaux *a;
1461
1462 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1463 {
1464 if (a->vna_other == vernum)
1465 {
1466 version_string = a->vna_nodename;
1467 break;
1468 }
1469 }
1470 }
1471 }
1472
1473 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1474 fprintf (file, " %-11s", version_string);
1475 else
1476 {
1477 int i;
1478
1479 fprintf (file, " (%s)", version_string);
1480 for (i = 10 - strlen (version_string); i > 0; --i)
1481 putc (' ', file);
1482 }
1483 }
1484
1485 /* If the st_other field is not zero, print it. */
7a13edea 1486 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1487
7a13edea
NC
1488 switch (st_other)
1489 {
1490 case 0: break;
1491 case STV_INTERNAL: fprintf (file, " .internal"); break;
1492 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1493 case STV_PROTECTED: fprintf (file, " .protected"); break;
1494 default:
1495 /* Some other non-defined flags are also present, so print
1496 everything hex. */
1497 fprintf (file, " 0x%02x", (unsigned int) st_other);
1498 }
252b5132 1499
587ff49e 1500 fprintf (file, " %s", name);
252b5132
RH
1501 }
1502 break;
1503 }
1504}
252b5132 1505
252b5132
RH
1506/* Allocate an ELF string table--force the first byte to be zero. */
1507
1508struct bfd_strtab_hash *
217aa764 1509_bfd_elf_stringtab_init (void)
252b5132
RH
1510{
1511 struct bfd_strtab_hash *ret;
1512
1513 ret = _bfd_stringtab_init ();
1514 if (ret != NULL)
1515 {
1516 bfd_size_type loc;
1517
b34976b6 1518 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1519 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1520 if (loc == (bfd_size_type) -1)
1521 {
1522 _bfd_stringtab_free (ret);
1523 ret = NULL;
1524 }
1525 }
1526 return ret;
1527}
1528\f
1529/* ELF .o/exec file reading */
1530
c044fabd 1531/* Create a new bfd section from an ELF section header. */
252b5132 1532
b34976b6 1533bfd_boolean
217aa764 1534bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1535{
4fbb74a6
AM
1536 Elf_Internal_Shdr *hdr;
1537 Elf_Internal_Ehdr *ehdr;
1538 const struct elf_backend_data *bed;
90937f86 1539 const char *name;
252b5132 1540
4fbb74a6
AM
1541 if (shindex >= elf_numsections (abfd))
1542 return FALSE;
1543
1544 hdr = elf_elfsections (abfd)[shindex];
1545 ehdr = elf_elfheader (abfd);
1546 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1547 hdr->sh_name);
933d961a
JJ
1548 if (name == NULL)
1549 return FALSE;
252b5132 1550
4fbb74a6 1551 bed = get_elf_backend_data (abfd);
252b5132
RH
1552 switch (hdr->sh_type)
1553 {
1554 case SHT_NULL:
1555 /* Inactive section. Throw it away. */
b34976b6 1556 return TRUE;
252b5132
RH
1557
1558 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1559 case SHT_NOBITS: /* .bss section. */
1560 case SHT_HASH: /* .hash section. */
1561 case SHT_NOTE: /* .note section. */
25e27870
L
1562 case SHT_INIT_ARRAY: /* .init_array section. */
1563 case SHT_FINI_ARRAY: /* .fini_array section. */
1564 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1565 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1566 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1567 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1568
797fc050 1569 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1570 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1571 return FALSE;
8e0ed13f
NC
1572 if (hdr->sh_link > elf_numsections (abfd)
1573 || elf_elfsections (abfd)[hdr->sh_link] == NULL)
1574 return FALSE;
797fc050
AM
1575 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
1576 {
1577 Elf_Internal_Shdr *dynsymhdr;
1578
1579 /* The shared libraries distributed with hpux11 have a bogus
1580 sh_link field for the ".dynamic" section. Find the
1581 string table for the ".dynsym" section instead. */
1582 if (elf_dynsymtab (abfd) != 0)
1583 {
1584 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1585 hdr->sh_link = dynsymhdr->sh_link;
1586 }
1587 else
1588 {
1589 unsigned int i, num_sec;
1590
1591 num_sec = elf_numsections (abfd);
1592 for (i = 1; i < num_sec; i++)
1593 {
1594 dynsymhdr = elf_elfsections (abfd)[i];
1595 if (dynsymhdr->sh_type == SHT_DYNSYM)
1596 {
1597 hdr->sh_link = dynsymhdr->sh_link;
1598 break;
1599 }
1600 }
1601 }
1602 }
1603 break;
1604
252b5132
RH
1605 case SHT_SYMTAB: /* A symbol table */
1606 if (elf_onesymtab (abfd) == shindex)
b34976b6 1607 return TRUE;
252b5132 1608
a50b2160
JJ
1609 if (hdr->sh_entsize != bed->s->sizeof_sym)
1610 return FALSE;
3337c1e5
AM
1611 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1612 return FALSE;
252b5132
RH
1613 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1614 elf_onesymtab (abfd) = shindex;
1615 elf_tdata (abfd)->symtab_hdr = *hdr;
1616 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1617 abfd->flags |= HAS_SYMS;
1618
1619 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1620 SHF_ALLOC is set, and this is a shared object, then we also
1621 treat this section as a BFD section. We can not base the
1622 decision purely on SHF_ALLOC, because that flag is sometimes
1623 set in a relocatable object file, which would confuse the
1624 linker. */
252b5132
RH
1625 if ((hdr->sh_flags & SHF_ALLOC) != 0
1626 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1627 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1628 shindex))
b34976b6 1629 return FALSE;
252b5132 1630
1b3a8575
AM
1631 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1632 can't read symbols without that section loaded as well. It
1633 is most likely specified by the next section header. */
1634 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1635 {
1636 unsigned int i, num_sec;
1637
1638 num_sec = elf_numsections (abfd);
1639 for (i = shindex + 1; i < num_sec; i++)
1640 {
1641 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1642 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1643 && hdr2->sh_link == shindex)
1644 break;
1645 }
1646 if (i == num_sec)
1647 for (i = 1; i < shindex; i++)
1648 {
1649 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1650 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1651 && hdr2->sh_link == shindex)
1652 break;
1653 }
1654 if (i != shindex)
1655 return bfd_section_from_shdr (abfd, i);
1656 }
b34976b6 1657 return TRUE;
252b5132
RH
1658
1659 case SHT_DYNSYM: /* A dynamic symbol table */
1660 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1661 return TRUE;
252b5132 1662
a50b2160
JJ
1663 if (hdr->sh_entsize != bed->s->sizeof_sym)
1664 return FALSE;
252b5132
RH
1665 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1666 elf_dynsymtab (abfd) = shindex;
1667 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1668 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1669 abfd->flags |= HAS_SYMS;
1670
1671 /* Besides being a symbol table, we also treat this as a regular
1672 section, so that objcopy can handle it. */
6dc132d9 1673 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1674
9ad5cbcf
AM
1675 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1676 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1677 return TRUE;
9ad5cbcf 1678
1b3a8575 1679 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1680 elf_symtab_shndx (abfd) = shindex;
1681 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1682 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1683 return TRUE;
9ad5cbcf 1684
252b5132
RH
1685 case SHT_STRTAB: /* A string table */
1686 if (hdr->bfd_section != NULL)
b34976b6 1687 return TRUE;
252b5132
RH
1688 if (ehdr->e_shstrndx == shindex)
1689 {
1690 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1691 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1692 return TRUE;
252b5132 1693 }
1b3a8575
AM
1694 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1695 {
1696 symtab_strtab:
1697 elf_tdata (abfd)->strtab_hdr = *hdr;
1698 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1699 return TRUE;
1700 }
1701 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1702 {
1703 dynsymtab_strtab:
1704 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1705 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1706 elf_elfsections (abfd)[shindex] = hdr;
1707 /* We also treat this as a regular section, so that objcopy
1708 can handle it. */
6dc132d9
L
1709 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1710 shindex);
1b3a8575 1711 }
252b5132 1712
1b3a8575
AM
1713 /* If the string table isn't one of the above, then treat it as a
1714 regular section. We need to scan all the headers to be sure,
1715 just in case this strtab section appeared before the above. */
1716 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1717 {
1718 unsigned int i, num_sec;
252b5132 1719
1b3a8575
AM
1720 num_sec = elf_numsections (abfd);
1721 for (i = 1; i < num_sec; i++)
1722 {
1723 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1724 if (hdr2->sh_link == shindex)
1725 {
933d961a
JJ
1726 /* Prevent endless recursion on broken objects. */
1727 if (i == shindex)
1728 return FALSE;
1b3a8575
AM
1729 if (! bfd_section_from_shdr (abfd, i))
1730 return FALSE;
1731 if (elf_onesymtab (abfd) == i)
1732 goto symtab_strtab;
1733 if (elf_dynsymtab (abfd) == i)
1734 goto dynsymtab_strtab;
1735 }
1736 }
1737 }
6dc132d9 1738 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1739
1740 case SHT_REL:
1741 case SHT_RELA:
1742 /* *These* do a lot of work -- but build no sections! */
1743 {
1744 asection *target_sect;
1745 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1746 unsigned int num_sec = elf_numsections (abfd);
252b5132 1747
aa2ca951
JJ
1748 if (hdr->sh_entsize
1749 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1750 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1751 return FALSE;
1752
03ae5f59 1753 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1754 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1755 {
1756 ((*_bfd_error_handler)
d003868e
AM
1757 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1758 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1759 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1760 shindex);
03ae5f59
ILT
1761 }
1762
252b5132
RH
1763 /* For some incomprehensible reason Oracle distributes
1764 libraries for Solaris in which some of the objects have
1765 bogus sh_link fields. It would be nice if we could just
1766 reject them, but, unfortunately, some people need to use
1767 them. We scan through the section headers; if we find only
1768 one suitable symbol table, we clobber the sh_link to point
1769 to it. I hope this doesn't break anything. */
1770 if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
1771 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1772 {
9ad5cbcf 1773 unsigned int scan;
252b5132
RH
1774 int found;
1775
1776 found = 0;
9ad5cbcf 1777 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1778 {
1779 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1780 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1781 {
1782 if (found != 0)
1783 {
1784 found = 0;
1785 break;
1786 }
1787 found = scan;
1788 }
1789 }
1790 if (found != 0)
1791 hdr->sh_link = found;
1792 }
1793
1794 /* Get the symbol table. */
1b3a8575
AM
1795 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1796 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1797 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1798 return FALSE;
252b5132
RH
1799
1800 /* If this reloc section does not use the main symbol table we
1801 don't treat it as a reloc section. BFD can't adequately
1802 represent such a section, so at least for now, we don't
c044fabd 1803 try. We just present it as a normal section. We also
60bcf0fa 1804 can't use it as a reloc section if it points to the null
185ef66d
AM
1805 section, an invalid section, or another reloc section. */
1806 if (hdr->sh_link != elf_onesymtab (abfd)
1807 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1808 || hdr->sh_info >= num_sec
1809 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1810 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1811 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1812 shindex);
252b5132
RH
1813
1814 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1815 return FALSE;
252b5132
RH
1816 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1817 if (target_sect == NULL)
b34976b6 1818 return FALSE;
252b5132
RH
1819
1820 if ((target_sect->flags & SEC_RELOC) == 0
1821 || target_sect->reloc_count == 0)
1822 hdr2 = &elf_section_data (target_sect)->rel_hdr;
1823 else
1824 {
dc810e39 1825 bfd_size_type amt;
252b5132 1826 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 1827 amt = sizeof (*hdr2);
217aa764 1828 hdr2 = bfd_alloc (abfd, amt);
14b1c01e
AM
1829 if (hdr2 == NULL)
1830 return FALSE;
252b5132
RH
1831 elf_section_data (target_sect)->rel_hdr2 = hdr2;
1832 }
1833 *hdr2 = *hdr;
1834 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1835 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1836 target_sect->flags |= SEC_RELOC;
1837 target_sect->relocation = NULL;
1838 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1839 /* In the section to which the relocations apply, mark whether
1840 its relocations are of the REL or RELA variety. */
72730e0c 1841 if (hdr->sh_size != 0)
68bfbfcc 1842 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 1843 abfd->flags |= HAS_RELOC;
b34976b6 1844 return TRUE;
252b5132 1845 }
252b5132
RH
1846
1847 case SHT_GNU_verdef:
1848 elf_dynverdef (abfd) = shindex;
1849 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1850 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1851
1852 case SHT_GNU_versym:
a50b2160
JJ
1853 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1854 return FALSE;
252b5132
RH
1855 elf_dynversym (abfd) = shindex;
1856 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1857 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1858
1859 case SHT_GNU_verneed:
1860 elf_dynverref (abfd) = shindex;
1861 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1862 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1863
1864 case SHT_SHLIB:
b34976b6 1865 return TRUE;
252b5132 1866
dbb410c3 1867 case SHT_GROUP:
1783205a 1868 if (! IS_VALID_GROUP_SECTION_HEADER (hdr))
a50b2160 1869 return FALSE;
6dc132d9 1870 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1871 return FALSE;
dbb410c3
AM
1872 if (hdr->contents != NULL)
1873 {
1874 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1875 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1876 asection *s;
1877
b885599b
AM
1878 if (idx->flags & GRP_COMDAT)
1879 hdr->bfd_section->flags
1880 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1881
45c5e9ed
L
1882 /* We try to keep the same section order as it comes in. */
1883 idx += n_elt;
dbb410c3 1884 while (--n_elt != 0)
1783205a
NC
1885 {
1886 --idx;
1887
1888 if (idx->shdr != NULL
1889 && (s = idx->shdr->bfd_section) != NULL
1890 && elf_next_in_group (s) != NULL)
1891 {
1892 elf_next_in_group (hdr->bfd_section) = s;
1893 break;
1894 }
1895 }
dbb410c3
AM
1896 }
1897 break;
1898
252b5132 1899 default:
104d59d1
JM
1900 /* Possibly an attributes section. */
1901 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1902 || hdr->sh_type == bed->obj_attrs_section_type)
1903 {
1904 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1905 return FALSE;
1906 _bfd_elf_parse_attributes (abfd, hdr);
1907 return TRUE;
1908 }
1909
252b5132 1910 /* Check for any processor-specific section types. */
3eb70a79
L
1911 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1912 return TRUE;
1913
1914 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1915 {
1916 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1917 /* FIXME: How to properly handle allocated section reserved
1918 for applications? */
1919 (*_bfd_error_handler)
1920 (_("%B: don't know how to handle allocated, application "
1921 "specific section `%s' [0x%8x]"),
1922 abfd, name, hdr->sh_type);
1923 else
1924 /* Allow sections reserved for applications. */
1925 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1926 shindex);
1927 }
1928 else if (hdr->sh_type >= SHT_LOPROC
1929 && hdr->sh_type <= SHT_HIPROC)
1930 /* FIXME: We should handle this section. */
1931 (*_bfd_error_handler)
1932 (_("%B: don't know how to handle processor specific section "
1933 "`%s' [0x%8x]"),
1934 abfd, name, hdr->sh_type);
1935 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1936 {
1937 /* Unrecognised OS-specific sections. */
1938 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1939 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1940 required to correctly process the section and the file should
ff15b240
NC
1941 be rejected with an error message. */
1942 (*_bfd_error_handler)
1943 (_("%B: don't know how to handle OS specific section "
1944 "`%s' [0x%8x]"),
1945 abfd, name, hdr->sh_type);
1946 else
1947 /* Otherwise it should be processed. */
1948 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1949 }
3eb70a79
L
1950 else
1951 /* FIXME: We should handle this section. */
1952 (*_bfd_error_handler)
1953 (_("%B: don't know how to handle section `%s' [0x%8x]"),
1954 abfd, name, hdr->sh_type);
1955
1956 return FALSE;
252b5132
RH
1957 }
1958
b34976b6 1959 return TRUE;
252b5132
RH
1960}
1961
ec338859
AM
1962/* Return the section for the local symbol specified by ABFD, R_SYMNDX.
1963 Return SEC for sections that have no elf section, and NULL on error. */
1964
1965asection *
217aa764
AM
1966bfd_section_from_r_symndx (bfd *abfd,
1967 struct sym_sec_cache *cache,
1968 asection *sec,
1969 unsigned long r_symndx)
ec338859 1970{
ec338859 1971 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
a5d1b3b5 1972 asection *s;
ec338859 1973
a5d1b3b5
AM
1974 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
1975 {
1976 Elf_Internal_Shdr *symtab_hdr;
1977 unsigned char esym[sizeof (Elf64_External_Sym)];
1978 Elf_External_Sym_Shndx eshndx;
1979 Elf_Internal_Sym isym;
ec338859 1980
a5d1b3b5
AM
1981 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1982 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
1983 &isym, esym, &eshndx) == NULL)
1984 return NULL;
9ad5cbcf 1985
a5d1b3b5
AM
1986 if (cache->abfd != abfd)
1987 {
1988 memset (cache->indx, -1, sizeof (cache->indx));
1989 cache->abfd = abfd;
1990 }
1991 cache->indx[ent] = r_symndx;
1992 cache->shndx[ent] = isym.st_shndx;
ec338859 1993 }
a5d1b3b5
AM
1994
1995 s = bfd_section_from_elf_index (abfd, cache->shndx[ent]);
1996 if (s != NULL)
1997 return s;
1998
1999 return sec;
ec338859
AM
2000}
2001
252b5132
RH
2002/* Given an ELF section number, retrieve the corresponding BFD
2003 section. */
2004
2005asection *
217aa764 2006bfd_section_from_elf_index (bfd *abfd, unsigned int index)
252b5132 2007{
9ad5cbcf 2008 if (index >= elf_numsections (abfd))
252b5132
RH
2009 return NULL;
2010 return elf_elfsections (abfd)[index]->bfd_section;
2011}
2012
b35d266b 2013static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2014{
0112cd26
NC
2015 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2016 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2017};
2018
b35d266b 2019static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2020{
0112cd26
NC
2021 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2022 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2023};
2024
b35d266b 2025static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2026{
0112cd26
NC
2027 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2028 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2029 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2030 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2031 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2032 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2033 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2034 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2035 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2036 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2037 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2038};
2039
b35d266b 2040static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2041{
0112cd26
NC
2042 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2043 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2044 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2045};
2046
b35d266b 2047static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2048{
0112cd26
NC
2049 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2050 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2051 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2052 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2053 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2054 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2055 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2056 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2057 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2058};
2059
b35d266b 2060static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2061{
0112cd26
NC
2062 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2063 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2064};
2065
b35d266b 2066static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2067{
0112cd26
NC
2068 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2069 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2070 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2071 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2072};
2073
b35d266b 2074static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2075{
0112cd26
NC
2076 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2077 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2078};
2079
b35d266b 2080static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2081{
0112cd26
NC
2082 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2083 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2084 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2085};
2086
b35d266b 2087static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2088{
0112cd26
NC
2089 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2090 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2091 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2092};
2093
b35d266b 2094static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2095{
0112cd26
NC
2096 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2097 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2098 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2099 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2100 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2101};
2102
b35d266b 2103static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2104{
0112cd26
NC
2105 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2106 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2107 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2108 /* See struct bfd_elf_special_section declaration for the semantics of
2109 this special case where .prefix_length != strlen (.prefix). */
2110 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2111 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2112};
2113
b35d266b 2114static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2115{
0112cd26
NC
2116 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2117 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2118 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2119 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2120};
2121
1b315056
CS
2122static const struct bfd_elf_special_section special_sections_z[] =
2123{
2124 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2125 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2126 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2127 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2128 { NULL, 0, 0, 0, 0 }
2129};
2130
b35d266b 2131static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2132{
7f4d3958 2133 special_sections_b, /* 'b' */
98ece1b3 2134 special_sections_c, /* 'c' */
7f4d3958
L
2135 special_sections_d, /* 'd' */
2136 NULL, /* 'e' */
2137 special_sections_f, /* 'f' */
2138 special_sections_g, /* 'g' */
2139 special_sections_h, /* 'h' */
2140 special_sections_i, /* 'i' */
2141 NULL, /* 'j' */
2142 NULL, /* 'k' */
2143 special_sections_l, /* 'l' */
2144 NULL, /* 'm' */
2145 special_sections_n, /* 'n' */
2146 NULL, /* 'o' */
2147 special_sections_p, /* 'p' */
2148 NULL, /* 'q' */
2149 special_sections_r, /* 'r' */
2150 special_sections_s, /* 's' */
2151 special_sections_t, /* 't' */
1b315056
CS
2152 NULL, /* 'u' */
2153 NULL, /* 'v' */
2154 NULL, /* 'w' */
2155 NULL, /* 'x' */
2156 NULL, /* 'y' */
2157 special_sections_z /* 'z' */
7f4d3958
L
2158};
2159
551b43fd
AM
2160const struct bfd_elf_special_section *
2161_bfd_elf_get_special_section (const char *name,
2162 const struct bfd_elf_special_section *spec,
2163 unsigned int rela)
2f89ff8d
L
2164{
2165 int i;
7f4d3958 2166 int len;
7f4d3958 2167
551b43fd 2168 len = strlen (name);
7f4d3958 2169
551b43fd 2170 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2171 {
2172 int suffix_len;
551b43fd 2173 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2174
2175 if (len < prefix_len)
2176 continue;
551b43fd 2177 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2178 continue;
2179
551b43fd 2180 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2181 if (suffix_len <= 0)
2182 {
2183 if (name[prefix_len] != 0)
2184 {
2185 if (suffix_len == 0)
2186 continue;
2187 if (name[prefix_len] != '.'
2188 && (suffix_len == -2
551b43fd 2189 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2190 continue;
2191 }
2192 }
2193 else
2194 {
2195 if (len < prefix_len + suffix_len)
2196 continue;
2197 if (memcmp (name + len - suffix_len,
551b43fd 2198 spec[i].prefix + prefix_len,
7dcb9820
AM
2199 suffix_len) != 0)
2200 continue;
2201 }
551b43fd 2202 return &spec[i];
7dcb9820 2203 }
2f89ff8d
L
2204
2205 return NULL;
2206}
2207
7dcb9820 2208const struct bfd_elf_special_section *
29ef7005 2209_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2210{
551b43fd
AM
2211 int i;
2212 const struct bfd_elf_special_section *spec;
29ef7005 2213 const struct elf_backend_data *bed;
2f89ff8d
L
2214
2215 /* See if this is one of the special sections. */
551b43fd
AM
2216 if (sec->name == NULL)
2217 return NULL;
2f89ff8d 2218
29ef7005
L
2219 bed = get_elf_backend_data (abfd);
2220 spec = bed->special_sections;
2221 if (spec)
2222 {
2223 spec = _bfd_elf_get_special_section (sec->name,
2224 bed->special_sections,
2225 sec->use_rela_p);
2226 if (spec != NULL)
2227 return spec;
2228 }
2229
551b43fd
AM
2230 if (sec->name[0] != '.')
2231 return NULL;
2f89ff8d 2232
551b43fd 2233 i = sec->name[1] - 'b';
1b315056 2234 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2235 return NULL;
2236
2237 spec = special_sections[i];
2f89ff8d 2238
551b43fd
AM
2239 if (spec == NULL)
2240 return NULL;
2241
2242 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2243}
2244
b34976b6 2245bfd_boolean
217aa764 2246_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2247{
2248 struct bfd_elf_section_data *sdata;
551b43fd 2249 const struct elf_backend_data *bed;
7dcb9820 2250 const struct bfd_elf_special_section *ssect;
252b5132 2251
f0abc2a1
AM
2252 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2253 if (sdata == NULL)
2254 {
217aa764 2255 sdata = bfd_zalloc (abfd, sizeof (*sdata));
f0abc2a1
AM
2256 if (sdata == NULL)
2257 return FALSE;
217aa764 2258 sec->used_by_bfd = sdata;
f0abc2a1 2259 }
bf572ba0 2260
551b43fd
AM
2261 /* Indicate whether or not this section should use RELA relocations. */
2262 bed = get_elf_backend_data (abfd);
2263 sec->use_rela_p = bed->default_use_rela_p;
2264
e843e0f8
L
2265 /* When we read a file, we don't need to set ELF section type and
2266 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2267 anyway. We will set ELF section type and flags for all linker
2268 created sections. If user specifies BFD section flags, we will
2269 set ELF section type and flags based on BFD section flags in
2270 elf_fake_sections. */
2271 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2272 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2273 {
551b43fd 2274 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2275 if (ssect != NULL)
2276 {
2277 elf_section_type (sec) = ssect->type;
2278 elf_section_flags (sec) = ssect->attr;
2279 }
2f89ff8d
L
2280 }
2281
f592407e 2282 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2283}
2284
2285/* Create a new bfd section from an ELF program header.
2286
2287 Since program segments have no names, we generate a synthetic name
2288 of the form segment<NUM>, where NUM is generally the index in the
2289 program header table. For segments that are split (see below) we
2290 generate the names segment<NUM>a and segment<NUM>b.
2291
2292 Note that some program segments may have a file size that is different than
2293 (less than) the memory size. All this means is that at execution the
2294 system must allocate the amount of memory specified by the memory size,
2295 but only initialize it with the first "file size" bytes read from the
2296 file. This would occur for example, with program segments consisting
2297 of combined data+bss.
2298
2299 To handle the above situation, this routine generates TWO bfd sections
2300 for the single program segment. The first has the length specified by
2301 the file size of the segment, and the second has the length specified
2302 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2303 into its initialized and uninitialized parts.
252b5132
RH
2304
2305 */
2306
b34976b6 2307bfd_boolean
217aa764
AM
2308_bfd_elf_make_section_from_phdr (bfd *abfd,
2309 Elf_Internal_Phdr *hdr,
2310 int index,
2311 const char *typename)
252b5132
RH
2312{
2313 asection *newsect;
2314 char *name;
2315 char namebuf[64];
d4c88bbb 2316 size_t len;
252b5132
RH
2317 int split;
2318
2319 split = ((hdr->p_memsz > 0)
2320 && (hdr->p_filesz > 0)
2321 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2322
2323 if (hdr->p_filesz > 0)
252b5132 2324 {
d5191d0c
AM
2325 sprintf (namebuf, "%s%d%s", typename, index, split ? "a" : "");
2326 len = strlen (namebuf) + 1;
2327 name = bfd_alloc (abfd, len);
2328 if (!name)
2329 return FALSE;
2330 memcpy (name, namebuf, len);
2331 newsect = bfd_make_section (abfd, name);
2332 if (newsect == NULL)
2333 return FALSE;
2334 newsect->vma = hdr->p_vaddr;
2335 newsect->lma = hdr->p_paddr;
2336 newsect->size = hdr->p_filesz;
2337 newsect->filepos = hdr->p_offset;
2338 newsect->flags |= SEC_HAS_CONTENTS;
2339 newsect->alignment_power = bfd_log2 (hdr->p_align);
2340 if (hdr->p_type == PT_LOAD)
252b5132 2341 {
d5191d0c
AM
2342 newsect->flags |= SEC_ALLOC;
2343 newsect->flags |= SEC_LOAD;
2344 if (hdr->p_flags & PF_X)
2345 {
2346 /* FIXME: all we known is that it has execute PERMISSION,
2347 may be data. */
2348 newsect->flags |= SEC_CODE;
2349 }
2350 }
2351 if (!(hdr->p_flags & PF_W))
2352 {
2353 newsect->flags |= SEC_READONLY;
252b5132 2354 }
252b5132
RH
2355 }
2356
d5191d0c 2357 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2358 {
d5191d0c
AM
2359 bfd_vma align;
2360
2361 sprintf (namebuf, "%s%d%s", typename, index, split ? "b" : "");
d4c88bbb 2362 len = strlen (namebuf) + 1;
217aa764 2363 name = bfd_alloc (abfd, len);
252b5132 2364 if (!name)
b34976b6 2365 return FALSE;
d4c88bbb 2366 memcpy (name, namebuf, len);
252b5132
RH
2367 newsect = bfd_make_section (abfd, name);
2368 if (newsect == NULL)
b34976b6 2369 return FALSE;
252b5132
RH
2370 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2371 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2372 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2373 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2374 align = newsect->vma & -newsect->vma;
2375 if (align == 0 || align > hdr->p_align)
2376 align = hdr->p_align;
2377 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2378 if (hdr->p_type == PT_LOAD)
2379 {
d5191d0c
AM
2380 /* Hack for gdb. Segments that have not been modified do
2381 not have their contents written to a core file, on the
2382 assumption that a debugger can find the contents in the
2383 executable. We flag this case by setting the fake
2384 section size to zero. Note that "real" bss sections will
2385 always have their contents dumped to the core file. */
2386 if (bfd_get_format (abfd) == bfd_core)
2387 newsect->size = 0;
252b5132
RH
2388 newsect->flags |= SEC_ALLOC;
2389 if (hdr->p_flags & PF_X)
2390 newsect->flags |= SEC_CODE;
2391 }
2392 if (!(hdr->p_flags & PF_W))
2393 newsect->flags |= SEC_READONLY;
2394 }
2395
b34976b6 2396 return TRUE;
252b5132
RH
2397}
2398
b34976b6 2399bfd_boolean
217aa764 2400bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int index)
20cfcaae 2401{
9c5bfbb7 2402 const struct elf_backend_data *bed;
20cfcaae
NC
2403
2404 switch (hdr->p_type)
2405 {
2406 case PT_NULL:
2407 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "null");
2408
2409 case PT_LOAD:
2410 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "load");
2411
2412 case PT_DYNAMIC:
2413 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "dynamic");
2414
2415 case PT_INTERP:
2416 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "interp");
2417
2418 case PT_NOTE:
2419 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, index, "note"))
b34976b6 2420 return FALSE;
718175fa 2421 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2422 return FALSE;
2423 return TRUE;
20cfcaae
NC
2424
2425 case PT_SHLIB:
2426 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "shlib");
2427
2428 case PT_PHDR:
2429 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "phdr");
2430
811072d8
RM
2431 case PT_GNU_EH_FRAME:
2432 return _bfd_elf_make_section_from_phdr (abfd, hdr, index,
2433 "eh_frame_hdr");
2434
2b05f1b7
L
2435 case PT_GNU_STACK:
2436 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "stack");
9ee5e499 2437
8c37241b
JJ
2438 case PT_GNU_RELRO:
2439 return _bfd_elf_make_section_from_phdr (abfd, hdr, index, "relro");
2440
20cfcaae 2441 default:
8c1acd09 2442 /* Check for any processor-specific program segment types. */
20cfcaae 2443 bed = get_elf_backend_data (abfd);
d27f5fa1 2444 return bed->elf_backend_section_from_phdr (abfd, hdr, index, "proc");
20cfcaae
NC
2445 }
2446}
2447
23bc299b 2448/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2449 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2450 relocations; otherwise, we use REL relocations. */
2451
b34976b6 2452bfd_boolean
217aa764
AM
2453_bfd_elf_init_reloc_shdr (bfd *abfd,
2454 Elf_Internal_Shdr *rel_hdr,
2455 asection *asect,
2456 bfd_boolean use_rela_p)
23bc299b
MM
2457{
2458 char *name;
9c5bfbb7 2459 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2460 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2461
dc810e39 2462 name = bfd_alloc (abfd, amt);
23bc299b 2463 if (name == NULL)
b34976b6 2464 return FALSE;
23bc299b
MM
2465 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2466 rel_hdr->sh_name =
2b0f7ef9 2467 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2468 FALSE);
23bc299b 2469 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2470 return FALSE;
23bc299b
MM
2471 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2472 rel_hdr->sh_entsize = (use_rela_p
2473 ? bed->s->sizeof_rela
2474 : bed->s->sizeof_rel);
72de5009 2475 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2476 rel_hdr->sh_flags = 0;
2477 rel_hdr->sh_addr = 0;
2478 rel_hdr->sh_size = 0;
2479 rel_hdr->sh_offset = 0;
2480
b34976b6 2481 return TRUE;
23bc299b
MM
2482}
2483
252b5132
RH
2484/* Set up an ELF internal section header for a section. */
2485
252b5132 2486static void
217aa764 2487elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2488{
9c5bfbb7 2489 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 2490 bfd_boolean *failedptr = failedptrarg;
252b5132 2491 Elf_Internal_Shdr *this_hdr;
0414f35b 2492 unsigned int sh_type;
252b5132
RH
2493
2494 if (*failedptr)
2495 {
2496 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2497 loop. */
252b5132
RH
2498 return;
2499 }
2500
2501 this_hdr = &elf_section_data (asect)->this_hdr;
2502
e57b5356
AM
2503 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2504 asect->name, FALSE);
2505 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2506 {
b34976b6 2507 *failedptr = TRUE;
252b5132
RH
2508 return;
2509 }
2510
a4d8e49b 2511 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2512
2513 if ((asect->flags & SEC_ALLOC) != 0
2514 || asect->user_set_vma)
2515 this_hdr->sh_addr = asect->vma;
2516 else
2517 this_hdr->sh_addr = 0;
2518
2519 this_hdr->sh_offset = 0;
eea6121a 2520 this_hdr->sh_size = asect->size;
252b5132 2521 this_hdr->sh_link = 0;
72de5009 2522 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2523 /* The sh_entsize and sh_info fields may have been set already by
2524 copy_private_section_data. */
2525
2526 this_hdr->bfd_section = asect;
2527 this_hdr->contents = NULL;
2528
3cddba1e
L
2529 /* If the section type is unspecified, we set it based on
2530 asect->flags. */
98ece1b3
AM
2531 if ((asect->flags & SEC_GROUP) != 0)
2532 sh_type = SHT_GROUP;
2533 else if ((asect->flags & SEC_ALLOC) != 0
2534 && (((asect->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
2535 || (asect->flags & SEC_NEVER_LOAD) != 0))
2536 sh_type = SHT_NOBITS;
2537 else
2538 sh_type = SHT_PROGBITS;
2539
3cddba1e 2540 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2541 this_hdr->sh_type = sh_type;
2542 else if (this_hdr->sh_type == SHT_NOBITS
2543 && sh_type == SHT_PROGBITS
2544 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2545 {
98ece1b3
AM
2546 /* Warn if we are changing a NOBITS section to PROGBITS, but
2547 allow the link to proceed. This can happen when users link
2548 non-bss input sections to bss output sections, or emit data
2549 to a bss output section via a linker script. */
2550 (*_bfd_error_handler)
58f0869b 2551 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2552 this_hdr->sh_type = sh_type;
3cddba1e
L
2553 }
2554
2f89ff8d 2555 switch (this_hdr->sh_type)
252b5132 2556 {
2f89ff8d 2557 default:
2f89ff8d
L
2558 break;
2559
2560 case SHT_STRTAB:
2561 case SHT_INIT_ARRAY:
2562 case SHT_FINI_ARRAY:
2563 case SHT_PREINIT_ARRAY:
2564 case SHT_NOTE:
2565 case SHT_NOBITS:
2566 case SHT_PROGBITS:
2567 break;
2568
2569 case SHT_HASH:
c7ac6ff8 2570 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2571 break;
5de3bf90 2572
2f89ff8d 2573 case SHT_DYNSYM:
252b5132 2574 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2575 break;
2576
2577 case SHT_DYNAMIC:
252b5132 2578 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2579 break;
2580
2581 case SHT_RELA:
2582 if (get_elf_backend_data (abfd)->may_use_rela_p)
2583 this_hdr->sh_entsize = bed->s->sizeof_rela;
2584 break;
2585
2586 case SHT_REL:
2587 if (get_elf_backend_data (abfd)->may_use_rel_p)
2588 this_hdr->sh_entsize = bed->s->sizeof_rel;
2589 break;
2590
2591 case SHT_GNU_versym:
252b5132 2592 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2593 break;
2594
2595 case SHT_GNU_verdef:
252b5132
RH
2596 this_hdr->sh_entsize = 0;
2597 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2598 cverdefs. The linker will set cverdefs, but sh_info will be
2599 zero. */
252b5132
RH
2600 if (this_hdr->sh_info == 0)
2601 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2602 else
2603 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2604 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2605 break;
2606
2607 case SHT_GNU_verneed:
252b5132
RH
2608 this_hdr->sh_entsize = 0;
2609 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2610 cverrefs. The linker will set cverrefs, but sh_info will be
2611 zero. */
252b5132
RH
2612 if (this_hdr->sh_info == 0)
2613 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2614 else
2615 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2616 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2617 break;
2618
2619 case SHT_GROUP:
1783205a 2620 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2621 break;
fdc90cb4
JJ
2622
2623 case SHT_GNU_HASH:
2624 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2625 break;
dbb410c3 2626 }
252b5132
RH
2627
2628 if ((asect->flags & SEC_ALLOC) != 0)
2629 this_hdr->sh_flags |= SHF_ALLOC;
2630 if ((asect->flags & SEC_READONLY) == 0)
2631 this_hdr->sh_flags |= SHF_WRITE;
2632 if ((asect->flags & SEC_CODE) != 0)
2633 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2634 if ((asect->flags & SEC_MERGE) != 0)
2635 {
2636 this_hdr->sh_flags |= SHF_MERGE;
2637 this_hdr->sh_entsize = asect->entsize;
2638 if ((asect->flags & SEC_STRINGS) != 0)
2639 this_hdr->sh_flags |= SHF_STRINGS;
2640 }
1126897b 2641 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2642 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2643 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2644 {
2645 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2646 if (asect->size == 0
2647 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2648 {
3a800eb9 2649 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2650
704afa60 2651 this_hdr->sh_size = 0;
3a800eb9
AM
2652 if (o != NULL)
2653 {
704afa60 2654 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2655 if (this_hdr->sh_size != 0)
2656 this_hdr->sh_type = SHT_NOBITS;
2657 }
704afa60
JJ
2658 }
2659 }
252b5132
RH
2660
2661 /* Check for processor-specific section types. */
0414f35b 2662 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2663 if (bed->elf_backend_fake_sections
2664 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2665 *failedptr = TRUE;
252b5132 2666
42bb2e33 2667 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2668 {
2669 /* Don't change the header type from NOBITS if we are being
42bb2e33 2670 called for objcopy --only-keep-debug. */
0414f35b
AM
2671 this_hdr->sh_type = sh_type;
2672 }
2673
252b5132 2674 /* If the section has relocs, set up a section header for the
23bc299b
MM
2675 SHT_REL[A] section. If two relocation sections are required for
2676 this section, it is up to the processor-specific back-end to
c044fabd 2677 create the other. */
23bc299b 2678 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2679 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2680 &elf_section_data (asect)->rel_hdr,
c044fabd 2681 asect,
68bfbfcc 2682 asect->use_rela_p))
b34976b6 2683 *failedptr = TRUE;
252b5132
RH
2684}
2685
bcacc0f5
AM
2686/* Fill in the contents of a SHT_GROUP section. Called from
2687 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2688 when ELF targets use the generic linker, ld. Called for ld -r
2689 from bfd_elf_final_link. */
dbb410c3 2690
1126897b 2691void
217aa764 2692bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2693{
217aa764 2694 bfd_boolean *failedptr = failedptrarg;
9dce4196 2695 asection *elt, *first;
dbb410c3 2696 unsigned char *loc;
b34976b6 2697 bfd_boolean gas;
dbb410c3 2698
7e4111ad
L
2699 /* Ignore linker created group section. See elfNN_ia64_object_p in
2700 elfxx-ia64.c. */
2701 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2702 || *failedptr)
2703 return;
2704
bcacc0f5
AM
2705 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2706 {
2707 unsigned long symindx = 0;
2708
2709 /* elf_group_id will have been set up by objcopy and the
2710 generic linker. */
2711 if (elf_group_id (sec) != NULL)
2712 symindx = elf_group_id (sec)->udata.i;
1126897b 2713
bcacc0f5
AM
2714 if (symindx == 0)
2715 {
2716 /* If called from the assembler, swap_out_syms will have set up
2717 elf_section_syms. */
2718 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2719 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2720 }
2721 elf_section_data (sec)->this_hdr.sh_info = symindx;
2722 }
2723 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2724 {
bcacc0f5
AM
2725 /* The ELF backend linker sets sh_info to -2 when the group
2726 signature symbol is global, and thus the index can't be
2727 set until all local symbols are output. */
2728 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2729 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2730 unsigned long symndx = sec_data->this_hdr.sh_info;
2731 unsigned long extsymoff = 0;
2732 struct elf_link_hash_entry *h;
2733
2734 if (!elf_bad_symtab (igroup->owner))
2735 {
2736 Elf_Internal_Shdr *symtab_hdr;
2737
2738 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2739 extsymoff = symtab_hdr->sh_info;
2740 }
2741 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2742 while (h->root.type == bfd_link_hash_indirect
2743 || h->root.type == bfd_link_hash_warning)
2744 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2745
2746 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2747 }
dbb410c3 2748
1126897b 2749 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2750 gas = TRUE;
dbb410c3
AM
2751 if (sec->contents == NULL)
2752 {
b34976b6 2753 gas = FALSE;
eea6121a 2754 sec->contents = bfd_alloc (abfd, sec->size);
9dce4196
AM
2755
2756 /* Arrange for the section to be written out. */
2757 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2758 if (sec->contents == NULL)
2759 {
b34976b6 2760 *failedptr = TRUE;
dbb410c3
AM
2761 return;
2762 }
2763 }
2764
eea6121a 2765 loc = sec->contents + sec->size;
dbb410c3 2766
9dce4196
AM
2767 /* Get the pointer to the first section in the group that gas
2768 squirreled away here. objcopy arranges for this to be set to the
2769 start of the input section group. */
2770 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2771
2772 /* First element is a flag word. Rest of section is elf section
2773 indices for all the sections of the group. Write them backwards
2774 just to keep the group in the same order as given in .section
2775 directives, not that it matters. */
2776 while (elt != NULL)
2777 {
9dce4196
AM
2778 asection *s;
2779 unsigned int idx;
2780
9dce4196 2781 s = elt;
01e1a5bc
NC
2782 if (! elf_discarded_section (s))
2783 {
2784 loc -= 4;
2785 if (!gas)
2786 s = s->output_section;
2787 idx = 0;
2788 if (s != NULL)
2789 idx = elf_section_data (s)->this_idx;
2790 H_PUT_32 (abfd, idx, loc);
2791 }
945906ff 2792 elt = elf_next_in_group (elt);
9dce4196
AM
2793 if (elt == first)
2794 break;
dbb410c3
AM
2795 }
2796
3d7f7666 2797 if ((loc -= 4) != sec->contents)
9dce4196 2798 abort ();
dbb410c3 2799
9dce4196 2800 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2801}
2802
252b5132
RH
2803/* Assign all ELF section numbers. The dummy first section is handled here
2804 too. The link/info pointers for the standard section types are filled
2805 in here too, while we're at it. */
2806
b34976b6 2807static bfd_boolean
da9f89d4 2808assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2809{
2810 struct elf_obj_tdata *t = elf_tdata (abfd);
2811 asection *sec;
2b0f7ef9 2812 unsigned int section_number, secn;
252b5132 2813 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2814 struct bfd_elf_section_data *d;
252b5132
RH
2815
2816 section_number = 1;
2817
2b0f7ef9
JJ
2818 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2819
da9f89d4
L
2820 /* SHT_GROUP sections are in relocatable files only. */
2821 if (link_info == NULL || link_info->relocatable)
252b5132 2822 {
da9f89d4 2823 /* Put SHT_GROUP sections first. */
04dd1667 2824 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2825 {
5daa8fe7 2826 d = elf_section_data (sec);
da9f89d4
L
2827
2828 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2829 {
5daa8fe7 2830 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2831 {
2832 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2833 bfd_section_list_remove (abfd, sec);
da9f89d4 2834 abfd->section_count--;
da9f89d4 2835 }
08a40648 2836 else
4fbb74a6 2837 d->this_idx = section_number++;
da9f89d4 2838 }
47cc2cf5
PB
2839 }
2840 }
2841
2842 for (sec = abfd->sections; sec; sec = sec->next)
2843 {
2844 d = elf_section_data (sec);
2845
2846 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2847 d->this_idx = section_number++;
2b0f7ef9 2848 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2849 if ((sec->flags & SEC_RELOC) == 0)
2850 d->rel_idx = 0;
2851 else
2b0f7ef9
JJ
2852 {
2853 d->rel_idx = section_number++;
2854 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2855 }
23bc299b
MM
2856
2857 if (d->rel_hdr2)
2b0f7ef9
JJ
2858 {
2859 d->rel_idx2 = section_number++;
2860 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2861 }
23bc299b
MM
2862 else
2863 d->rel_idx2 = 0;
252b5132
RH
2864 }
2865
2866 t->shstrtab_section = section_number++;
2b0f7ef9 2867 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2868 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132
RH
2869
2870 if (bfd_get_symcount (abfd) > 0)
2871 {
2872 t->symtab_section = section_number++;
2b0f7ef9 2873 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 2874 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 2875 {
9ad5cbcf
AM
2876 t->symtab_shndx_section = section_number++;
2877 t->symtab_shndx_hdr.sh_name
2878 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2879 ".symtab_shndx", FALSE);
9ad5cbcf 2880 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2881 return FALSE;
9ad5cbcf 2882 }
252b5132 2883 t->strtab_section = section_number++;
2b0f7ef9 2884 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2885 }
2886
2b0f7ef9
JJ
2887 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2888 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2889
2890 elf_numsections (abfd) = section_number;
252b5132
RH
2891 elf_elfheader (abfd)->e_shnum = section_number;
2892
2893 /* Set up the list of section header pointers, in agreement with the
2894 indices. */
d0fb9a8d 2895 i_shdrp = bfd_zalloc2 (abfd, section_number, sizeof (Elf_Internal_Shdr *));
252b5132 2896 if (i_shdrp == NULL)
b34976b6 2897 return FALSE;
252b5132 2898
d0fb9a8d 2899 i_shdrp[0] = bfd_zalloc (abfd, sizeof (Elf_Internal_Shdr));
252b5132
RH
2900 if (i_shdrp[0] == NULL)
2901 {
2902 bfd_release (abfd, i_shdrp);
b34976b6 2903 return FALSE;
252b5132 2904 }
252b5132
RH
2905
2906 elf_elfsections (abfd) = i_shdrp;
2907
2908 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
2909 if (bfd_get_symcount (abfd) > 0)
2910 {
2911 i_shdrp[t->symtab_section] = &t->symtab_hdr;
4fbb74a6 2912 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf
AM
2913 {
2914 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2915 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2916 }
252b5132
RH
2917 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2918 t->symtab_hdr.sh_link = t->strtab_section;
2919 }
38ce5b11 2920
252b5132
RH
2921 for (sec = abfd->sections; sec; sec = sec->next)
2922 {
2923 struct bfd_elf_section_data *d = elf_section_data (sec);
2924 asection *s;
2925 const char *name;
2926
2927 i_shdrp[d->this_idx] = &d->this_hdr;
2928 if (d->rel_idx != 0)
2929 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
2930 if (d->rel_idx2 != 0)
2931 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
2932
2933 /* Fill in the sh_link and sh_info fields while we're at it. */
2934
2935 /* sh_link of a reloc section is the section index of the symbol
2936 table. sh_info is the section index of the section to which
2937 the relocation entries apply. */
2938 if (d->rel_idx != 0)
2939 {
2940 d->rel_hdr.sh_link = t->symtab_section;
2941 d->rel_hdr.sh_info = d->this_idx;
2942 }
23bc299b
MM
2943 if (d->rel_idx2 != 0)
2944 {
2945 d->rel_hdr2->sh_link = t->symtab_section;
2946 d->rel_hdr2->sh_info = d->this_idx;
2947 }
252b5132 2948
38ce5b11
L
2949 /* We need to set up sh_link for SHF_LINK_ORDER. */
2950 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
2951 {
2952 s = elf_linked_to_section (sec);
2953 if (s)
38ce5b11 2954 {
f2876037 2955 /* elf_linked_to_section points to the input section. */
ccd2ec6a 2956 if (link_info != NULL)
38ce5b11 2957 {
f2876037 2958 /* Check discarded linkonce section. */
ccd2ec6a 2959 if (elf_discarded_section (s))
38ce5b11 2960 {
ccd2ec6a
L
2961 asection *kept;
2962 (*_bfd_error_handler)
2963 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
2964 abfd, d->this_hdr.bfd_section,
2965 s, s->owner);
2966 /* Point to the kept section if it has the same
2967 size as the discarded one. */
c0f00686 2968 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 2969 if (kept == NULL)
185d09ad 2970 {
ccd2ec6a
L
2971 bfd_set_error (bfd_error_bad_value);
2972 return FALSE;
185d09ad 2973 }
ccd2ec6a 2974 s = kept;
38ce5b11 2975 }
e424ecc8 2976
ccd2ec6a
L
2977 s = s->output_section;
2978 BFD_ASSERT (s != NULL);
38ce5b11 2979 }
f2876037
L
2980 else
2981 {
2982 /* Handle objcopy. */
2983 if (s->output_section == NULL)
2984 {
2985 (*_bfd_error_handler)
2986 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
2987 abfd, d->this_hdr.bfd_section, s, s->owner);
2988 bfd_set_error (bfd_error_bad_value);
2989 return FALSE;
2990 }
2991 s = s->output_section;
2992 }
ccd2ec6a
L
2993 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2994 }
2995 else
2996 {
2997 /* PR 290:
2998 The Intel C compiler generates SHT_IA_64_UNWIND with
2999 SHF_LINK_ORDER. But it doesn't set the sh_link or
3000 sh_info fields. Hence we could get the situation
08a40648 3001 where s is NULL. */
ccd2ec6a
L
3002 const struct elf_backend_data *bed
3003 = get_elf_backend_data (abfd);
3004 if (bed->link_order_error_handler)
3005 bed->link_order_error_handler
3006 (_("%B: warning: sh_link not set for section `%A'"),
3007 abfd, sec);
38ce5b11
L
3008 }
3009 }
3010
252b5132
RH
3011 switch (d->this_hdr.sh_type)
3012 {
3013 case SHT_REL:
3014 case SHT_RELA:
3015 /* A reloc section which we are treating as a normal BFD
3016 section. sh_link is the section index of the symbol
3017 table. sh_info is the section index of the section to
3018 which the relocation entries apply. We assume that an
3019 allocated reloc section uses the dynamic symbol table.
3020 FIXME: How can we be sure? */
3021 s = bfd_get_section_by_name (abfd, ".dynsym");
3022 if (s != NULL)
3023 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3024
3025 /* We look up the section the relocs apply to by name. */
3026 name = sec->name;
3027 if (d->this_hdr.sh_type == SHT_REL)
3028 name += 4;
3029 else
3030 name += 5;
3031 s = bfd_get_section_by_name (abfd, name);
3032 if (s != NULL)
3033 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3034 break;
3035
3036 case SHT_STRTAB:
3037 /* We assume that a section named .stab*str is a stabs
3038 string section. We look for a section with the same name
3039 but without the trailing ``str'', and set its sh_link
3040 field to point to this section. */
0112cd26 3041 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3042 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3043 {
3044 size_t len;
3045 char *alc;
3046
3047 len = strlen (sec->name);
217aa764 3048 alc = bfd_malloc (len - 2);
252b5132 3049 if (alc == NULL)
b34976b6 3050 return FALSE;
d4c88bbb 3051 memcpy (alc, sec->name, len - 3);
252b5132
RH
3052 alc[len - 3] = '\0';
3053 s = bfd_get_section_by_name (abfd, alc);
3054 free (alc);
3055 if (s != NULL)
3056 {
3057 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3058
3059 /* This is a .stab section. */
0594c12d
AM
3060 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3061 elf_section_data (s)->this_hdr.sh_entsize
3062 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3063 }
3064 }
3065 break;
3066
3067 case SHT_DYNAMIC:
3068 case SHT_DYNSYM:
3069 case SHT_GNU_verneed:
3070 case SHT_GNU_verdef:
3071 /* sh_link is the section header index of the string table
3072 used for the dynamic entries, or the symbol table, or the
3073 version strings. */
3074 s = bfd_get_section_by_name (abfd, ".dynstr");
3075 if (s != NULL)
3076 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3077 break;
3078
7f1204bb
JJ
3079 case SHT_GNU_LIBLIST:
3080 /* sh_link is the section header index of the prelink library
08a40648
AM
3081 list used for the dynamic entries, or the symbol table, or
3082 the version strings. */
7f1204bb
JJ
3083 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3084 ? ".dynstr" : ".gnu.libstr");
3085 if (s != NULL)
3086 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3087 break;
3088
252b5132 3089 case SHT_HASH:
fdc90cb4 3090 case SHT_GNU_HASH:
252b5132
RH
3091 case SHT_GNU_versym:
3092 /* sh_link is the section header index of the symbol table
3093 this hash table or version table is for. */
3094 s = bfd_get_section_by_name (abfd, ".dynsym");
3095 if (s != NULL)
3096 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3097 break;
dbb410c3
AM
3098
3099 case SHT_GROUP:
3100 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3101 }
3102 }
3103
2b0f7ef9 3104 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3105 if (i_shdrp[secn] == NULL)
3106 i_shdrp[secn] = i_shdrp[0];
3107 else
3108 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3109 i_shdrp[secn]->sh_name);
b34976b6 3110 return TRUE;
252b5132
RH
3111}
3112
3113/* Map symbol from it's internal number to the external number, moving
3114 all local symbols to be at the head of the list. */
3115
5372391b 3116static bfd_boolean
217aa764 3117sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3118{
3119 /* If the backend has a special mapping, use it. */
9c5bfbb7 3120 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3121 if (bed->elf_backend_sym_is_global)
3122 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132
RH
3123
3124 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK)) != 0
3125 || bfd_is_und_section (bfd_get_section (sym))
3126 || bfd_is_com_section (bfd_get_section (sym)));
3127}
3128
5372391b 3129/* Don't output section symbols for sections that are not going to be
0f0a5e58 3130 output. */
5372391b
AM
3131
3132static bfd_boolean
3133ignore_section_sym (bfd *abfd, asymbol *sym)
3134{
3135 return ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58
AM
3136 && !(sym->section->owner == abfd
3137 || (sym->section->output_section->owner == abfd
3138 && sym->section->output_offset == 0)));
5372391b
AM
3139}
3140
b34976b6 3141static bfd_boolean
217aa764 3142elf_map_symbols (bfd *abfd)
252b5132 3143{
dc810e39 3144 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3145 asymbol **syms = bfd_get_outsymbols (abfd);
3146 asymbol **sect_syms;
dc810e39
AM
3147 unsigned int num_locals = 0;
3148 unsigned int num_globals = 0;
3149 unsigned int num_locals2 = 0;
3150 unsigned int num_globals2 = 0;
252b5132 3151 int max_index = 0;
dc810e39 3152 unsigned int idx;
252b5132
RH
3153 asection *asect;
3154 asymbol **new_syms;
252b5132
RH
3155
3156#ifdef DEBUG
3157 fprintf (stderr, "elf_map_symbols\n");
3158 fflush (stderr);
3159#endif
3160
252b5132
RH
3161 for (asect = abfd->sections; asect; asect = asect->next)
3162 {
3163 if (max_index < asect->index)
3164 max_index = asect->index;
3165 }
3166
3167 max_index++;
d0fb9a8d 3168 sect_syms = bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3169 if (sect_syms == NULL)
b34976b6 3170 return FALSE;
252b5132 3171 elf_section_syms (abfd) = sect_syms;
4e89ac30 3172 elf_num_section_syms (abfd) = max_index;
252b5132 3173
079e9a2f
AM
3174 /* Init sect_syms entries for any section symbols we have already
3175 decided to output. */
252b5132
RH
3176 for (idx = 0; idx < symcount; idx++)
3177 {
dc810e39 3178 asymbol *sym = syms[idx];
c044fabd 3179
252b5132 3180 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3181 && sym->value == 0
5372391b 3182 && !ignore_section_sym (abfd, sym))
252b5132 3183 {
5372391b 3184 asection *sec = sym->section;
252b5132 3185
5372391b
AM
3186 if (sec->owner != abfd)
3187 sec = sec->output_section;
252b5132 3188
5372391b 3189 sect_syms[sec->index] = syms[idx];
252b5132
RH
3190 }
3191 }
3192
252b5132
RH
3193 /* Classify all of the symbols. */
3194 for (idx = 0; idx < symcount; idx++)
3195 {
5372391b
AM
3196 if (ignore_section_sym (abfd, syms[idx]))
3197 continue;
252b5132
RH
3198 if (!sym_is_global (abfd, syms[idx]))
3199 num_locals++;
3200 else
3201 num_globals++;
3202 }
079e9a2f 3203
5372391b 3204 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3205 sections will already have a section symbol in outsymbols, but
3206 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3207 at least in that case. */
252b5132
RH
3208 for (asect = abfd->sections; asect; asect = asect->next)
3209 {
079e9a2f 3210 if (sect_syms[asect->index] == NULL)
252b5132 3211 {
079e9a2f 3212 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3213 num_locals++;
3214 else
3215 num_globals++;
252b5132
RH
3216 }
3217 }
3218
3219 /* Now sort the symbols so the local symbols are first. */
d0fb9a8d 3220 new_syms = bfd_alloc2 (abfd, num_locals + num_globals, sizeof (asymbol *));
dc810e39 3221
252b5132 3222 if (new_syms == NULL)
b34976b6 3223 return FALSE;
252b5132
RH
3224
3225 for (idx = 0; idx < symcount; idx++)
3226 {
3227 asymbol *sym = syms[idx];
dc810e39 3228 unsigned int i;
252b5132 3229
5372391b
AM
3230 if (ignore_section_sym (abfd, sym))
3231 continue;
252b5132
RH
3232 if (!sym_is_global (abfd, sym))
3233 i = num_locals2++;
3234 else
3235 i = num_locals + num_globals2++;
3236 new_syms[i] = sym;
3237 sym->udata.i = i + 1;
3238 }
3239 for (asect = abfd->sections; asect; asect = asect->next)
3240 {
079e9a2f 3241 if (sect_syms[asect->index] == NULL)
252b5132 3242 {
079e9a2f 3243 asymbol *sym = asect->symbol;
dc810e39 3244 unsigned int i;
252b5132 3245
079e9a2f 3246 sect_syms[asect->index] = sym;
252b5132
RH
3247 if (!sym_is_global (abfd, sym))
3248 i = num_locals2++;
3249 else
3250 i = num_locals + num_globals2++;
3251 new_syms[i] = sym;
3252 sym->udata.i = i + 1;
3253 }
3254 }
3255
3256 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3257
3258 elf_num_locals (abfd) = num_locals;
3259 elf_num_globals (abfd) = num_globals;
b34976b6 3260 return TRUE;
252b5132
RH
3261}
3262
3263/* Align to the maximum file alignment that could be required for any
3264 ELF data structure. */
3265
268b6b39 3266static inline file_ptr
217aa764 3267align_file_position (file_ptr off, int align)
252b5132
RH
3268{
3269 return (off + align - 1) & ~(align - 1);
3270}
3271
3272/* Assign a file position to a section, optionally aligning to the
3273 required section alignment. */
3274
217aa764
AM
3275file_ptr
3276_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3277 file_ptr offset,
3278 bfd_boolean align)
252b5132 3279{
72de5009
AM
3280 if (align && i_shdrp->sh_addralign > 1)
3281 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3282 i_shdrp->sh_offset = offset;
3283 if (i_shdrp->bfd_section != NULL)
3284 i_shdrp->bfd_section->filepos = offset;
3285 if (i_shdrp->sh_type != SHT_NOBITS)
3286 offset += i_shdrp->sh_size;
3287 return offset;
3288}
3289
3290/* Compute the file positions we are going to put the sections at, and
3291 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3292 is not NULL, this is being called by the ELF backend linker. */
3293
b34976b6 3294bfd_boolean
217aa764
AM
3295_bfd_elf_compute_section_file_positions (bfd *abfd,
3296 struct bfd_link_info *link_info)
252b5132 3297{
9c5bfbb7 3298 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3299 bfd_boolean failed;
4b6c0f2f 3300 struct bfd_strtab_hash *strtab = NULL;
252b5132
RH
3301 Elf_Internal_Shdr *shstrtab_hdr;
3302
3303 if (abfd->output_has_begun)
b34976b6 3304 return TRUE;
252b5132
RH
3305
3306 /* Do any elf backend specific processing first. */
3307 if (bed->elf_backend_begin_write_processing)
3308 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3309
3310 if (! prep_headers (abfd))
b34976b6 3311 return FALSE;
252b5132 3312
e6c51ed4
NC
3313 /* Post process the headers if necessary. */
3314 if (bed->elf_backend_post_process_headers)
3315 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3316
b34976b6 3317 failed = FALSE;
252b5132
RH
3318 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3319 if (failed)
b34976b6 3320 return FALSE;
252b5132 3321
da9f89d4 3322 if (!assign_section_numbers (abfd, link_info))
b34976b6 3323 return FALSE;
252b5132
RH
3324
3325 /* The backend linker builds symbol table information itself. */
3326 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3327 {
3328 /* Non-zero if doing a relocatable link. */
3329 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3330
3331 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3332 return FALSE;
252b5132
RH
3333 }
3334
1126897b 3335 if (link_info == NULL)
dbb410c3 3336 {
1126897b 3337 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3338 if (failed)
b34976b6 3339 return FALSE;
dbb410c3
AM
3340 }
3341
252b5132
RH
3342 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3343 /* sh_name was set in prep_headers. */
3344 shstrtab_hdr->sh_type = SHT_STRTAB;
3345 shstrtab_hdr->sh_flags = 0;
3346 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3347 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3348 shstrtab_hdr->sh_entsize = 0;
3349 shstrtab_hdr->sh_link = 0;
3350 shstrtab_hdr->sh_info = 0;
3351 /* sh_offset is set in assign_file_positions_except_relocs. */
3352 shstrtab_hdr->sh_addralign = 1;
3353
c84fca4d 3354 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3355 return FALSE;
252b5132
RH
3356
3357 if (link_info == NULL && bfd_get_symcount (abfd) > 0)
3358 {
3359 file_ptr off;
3360 Elf_Internal_Shdr *hdr;
3361
3362 off = elf_tdata (abfd)->next_file_pos;
3363
3364 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3365 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3366
9ad5cbcf
AM
3367 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3368 if (hdr->sh_size != 0)
b34976b6 3369 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3370
252b5132 3371 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3372 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3373
3374 elf_tdata (abfd)->next_file_pos = off;
3375
3376 /* Now that we know where the .strtab section goes, write it
08a40648 3377 out. */
252b5132
RH
3378 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3379 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3380 return FALSE;
252b5132
RH
3381 _bfd_stringtab_free (strtab);
3382 }
3383
b34976b6 3384 abfd->output_has_begun = TRUE;
252b5132 3385
b34976b6 3386 return TRUE;
252b5132
RH
3387}
3388
8ded5a0f
AM
3389/* Make an initial estimate of the size of the program header. If we
3390 get the number wrong here, we'll redo section placement. */
3391
3392static bfd_size_type
3393get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3394{
3395 size_t segs;
3396 asection *s;
2b05f1b7 3397 const struct elf_backend_data *bed;
8ded5a0f
AM
3398
3399 /* Assume we will need exactly two PT_LOAD segments: one for text
3400 and one for data. */
3401 segs = 2;
3402
3403 s = bfd_get_section_by_name (abfd, ".interp");
3404 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3405 {
3406 /* If we have a loadable interpreter section, we need a
3407 PT_INTERP segment. In this case, assume we also need a
3408 PT_PHDR segment, although that may not be true for all
3409 targets. */
3410 segs += 2;
3411 }
3412
3413 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3414 {
3415 /* We need a PT_DYNAMIC segment. */
3416 ++segs;
f210dcff 3417 }
08a40648 3418
ceae84aa 3419 if (info != NULL && info->relro)
f210dcff
L
3420 {
3421 /* We need a PT_GNU_RELRO segment. */
3422 ++segs;
8ded5a0f
AM
3423 }
3424
3425 if (elf_tdata (abfd)->eh_frame_hdr)
3426 {
3427 /* We need a PT_GNU_EH_FRAME segment. */
3428 ++segs;
3429 }
3430
2b05f1b7 3431 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3432 {
2b05f1b7
L
3433 /* We need a PT_GNU_STACK segment. */
3434 ++segs;
3435 }
94b11780 3436
2b05f1b7
L
3437 for (s = abfd->sections; s != NULL; s = s->next)
3438 {
8ded5a0f 3439 if ((s->flags & SEC_LOAD) != 0
0112cd26 3440 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3441 {
3442 /* We need a PT_NOTE segment. */
3443 ++segs;
1c5265b5
JJ
3444 /* Try to create just one PT_NOTE segment
3445 for all adjacent loadable .note* sections.
3446 gABI requires that within a PT_NOTE segment
3447 (and also inside of each SHT_NOTE section)
3448 each note is padded to a multiple of 4 size,
3449 so we check whether the sections are correctly
3450 aligned. */
3451 if (s->alignment_power == 2)
3452 while (s->next != NULL
3453 && s->next->alignment_power == 2
3454 && (s->next->flags & SEC_LOAD) != 0
3455 && CONST_STRNEQ (s->next->name, ".note"))
3456 s = s->next;
8ded5a0f
AM
3457 }
3458 }
3459
3460 for (s = abfd->sections; s != NULL; s = s->next)
3461 {
3462 if (s->flags & SEC_THREAD_LOCAL)
3463 {
3464 /* We need a PT_TLS segment. */
3465 ++segs;
3466 break;
3467 }
3468 }
3469
3470 /* Let the backend count up any program headers it might need. */
2b05f1b7 3471 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3472 if (bed->elf_backend_additional_program_headers)
3473 {
3474 int a;
3475
3476 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3477 if (a == -1)
3478 abort ();
3479 segs += a;
3480 }
3481
3482 return segs * bed->s->sizeof_phdr;
3483}
3484
2ea37f1c
NC
3485/* Find the segment that contains the output_section of section. */
3486
3487Elf_Internal_Phdr *
3488_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3489{
3490 struct elf_segment_map *m;
3491 Elf_Internal_Phdr *p;
3492
3493 for (m = elf_tdata (abfd)->segment_map,
3494 p = elf_tdata (abfd)->phdr;
3495 m != NULL;
3496 m = m->next, p++)
3497 {
3498 int i;
3499
3500 for (i = m->count - 1; i >= 0; i--)
3501 if (m->sections[i] == section)
3502 return p;
3503 }
3504
3505 return NULL;
3506}
3507
252b5132
RH
3508/* Create a mapping from a set of sections to a program segment. */
3509
217aa764
AM
3510static struct elf_segment_map *
3511make_mapping (bfd *abfd,
3512 asection **sections,
3513 unsigned int from,
3514 unsigned int to,
3515 bfd_boolean phdr)
252b5132
RH
3516{
3517 struct elf_segment_map *m;
3518 unsigned int i;
3519 asection **hdrpp;
dc810e39 3520 bfd_size_type amt;
252b5132 3521
dc810e39
AM
3522 amt = sizeof (struct elf_segment_map);
3523 amt += (to - from - 1) * sizeof (asection *);
217aa764 3524 m = bfd_zalloc (abfd, amt);
252b5132
RH
3525 if (m == NULL)
3526 return NULL;
3527 m->next = NULL;
3528 m->p_type = PT_LOAD;
3529 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3530 m->sections[i - from] = *hdrpp;
3531 m->count = to - from;
3532
3533 if (from == 0 && phdr)
3534 {
3535 /* Include the headers in the first PT_LOAD segment. */
3536 m->includes_filehdr = 1;
3537 m->includes_phdrs = 1;
3538 }
3539
3540 return m;
3541}
3542
229fcec5
MM
3543/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3544 on failure. */
3545
3546struct elf_segment_map *
3547_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3548{
3549 struct elf_segment_map *m;
3550
3551 m = bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3552 if (m == NULL)
3553 return NULL;
3554 m->next = NULL;
3555 m->p_type = PT_DYNAMIC;
3556 m->count = 1;
3557 m->sections[0] = dynsec;
08a40648 3558
229fcec5
MM
3559 return m;
3560}
3561
8ded5a0f 3562/* Possibly add or remove segments from the segment map. */
252b5132 3563
b34976b6 3564static bfd_boolean
3dea8fca
AM
3565elf_modify_segment_map (bfd *abfd,
3566 struct bfd_link_info *info,
3567 bfd_boolean remove_empty_load)
252b5132 3568{
252e386e 3569 struct elf_segment_map **m;
8ded5a0f 3570 const struct elf_backend_data *bed;
252b5132 3571
8ded5a0f
AM
3572 /* The placement algorithm assumes that non allocated sections are
3573 not in PT_LOAD segments. We ensure this here by removing such
3574 sections from the segment map. We also remove excluded
252e386e
AM
3575 sections. Finally, any PT_LOAD segment without sections is
3576 removed. */
3577 m = &elf_tdata (abfd)->segment_map;
3578 while (*m)
8ded5a0f
AM
3579 {
3580 unsigned int i, new_count;
252b5132 3581
252e386e 3582 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3583 {
252e386e
AM
3584 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3585 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3586 || (*m)->p_type != PT_LOAD))
8ded5a0f 3587 {
252e386e
AM
3588 (*m)->sections[new_count] = (*m)->sections[i];
3589 new_count++;
8ded5a0f
AM
3590 }
3591 }
252e386e 3592 (*m)->count = new_count;
252b5132 3593
3dea8fca 3594 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3595 *m = (*m)->next;
3596 else
3597 m = &(*m)->next;
8ded5a0f 3598 }
252b5132 3599
8ded5a0f
AM
3600 bed = get_elf_backend_data (abfd);
3601 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3602 {
252e386e 3603 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3604 return FALSE;
252b5132 3605 }
252b5132 3606
8ded5a0f
AM
3607 return TRUE;
3608}
252b5132 3609
8ded5a0f 3610/* Set up a mapping from BFD sections to program segments. */
252b5132 3611
8ded5a0f
AM
3612bfd_boolean
3613_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3614{
3615 unsigned int count;
3616 struct elf_segment_map *m;
3617 asection **sections = NULL;
3618 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3619 bfd_boolean no_user_phdrs;
252b5132 3620
3dea8fca
AM
3621 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
3622 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3623 {
8ded5a0f
AM
3624 asection *s;
3625 unsigned int i;
3626 struct elf_segment_map *mfirst;
3627 struct elf_segment_map **pm;
3628 asection *last_hdr;
3629 bfd_vma last_size;
3630 unsigned int phdr_index;
3631 bfd_vma maxpagesize;
3632 asection **hdrpp;
3633 bfd_boolean phdr_in_segment = TRUE;
3634 bfd_boolean writable;
3635 int tls_count = 0;
3636 asection *first_tls = NULL;
3637 asection *dynsec, *eh_frame_hdr;
3638 bfd_size_type amt;
252b5132 3639
8ded5a0f 3640 /* Select the allocated sections, and sort them. */
252b5132 3641
8ded5a0f
AM
3642 sections = bfd_malloc2 (bfd_count_sections (abfd), sizeof (asection *));
3643 if (sections == NULL)
252b5132 3644 goto error_return;
252b5132 3645
8ded5a0f
AM
3646 i = 0;
3647 for (s = abfd->sections; s != NULL; s = s->next)
3648 {
3649 if ((s->flags & SEC_ALLOC) != 0)
3650 {
3651 sections[i] = s;
3652 ++i;
3653 }
3654 }
3655 BFD_ASSERT (i <= bfd_count_sections (abfd));
3656 count = i;
252b5132 3657
8ded5a0f 3658 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3659
8ded5a0f 3660 /* Build the mapping. */
252b5132 3661
8ded5a0f
AM
3662 mfirst = NULL;
3663 pm = &mfirst;
252b5132 3664
8ded5a0f
AM
3665 /* If we have a .interp section, then create a PT_PHDR segment for
3666 the program headers and a PT_INTERP segment for the .interp
3667 section. */
3668 s = bfd_get_section_by_name (abfd, ".interp");
3669 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3670 {
3671 amt = sizeof (struct elf_segment_map);
3672 m = bfd_zalloc (abfd, amt);
3673 if (m == NULL)
3674 goto error_return;
3675 m->next = NULL;
3676 m->p_type = PT_PHDR;
3677 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3678 m->p_flags = PF_R | PF_X;
3679 m->p_flags_valid = 1;
3680 m->includes_phdrs = 1;
252b5132 3681
8ded5a0f
AM
3682 *pm = m;
3683 pm = &m->next;
252b5132 3684
8ded5a0f
AM
3685 amt = sizeof (struct elf_segment_map);
3686 m = bfd_zalloc (abfd, amt);
3687 if (m == NULL)
3688 goto error_return;
3689 m->next = NULL;
3690 m->p_type = PT_INTERP;
3691 m->count = 1;
3692 m->sections[0] = s;
3693
3694 *pm = m;
3695 pm = &m->next;
252b5132 3696 }
8ded5a0f
AM
3697
3698 /* Look through the sections. We put sections in the same program
3699 segment when the start of the second section can be placed within
3700 a few bytes of the end of the first section. */
3701 last_hdr = NULL;
3702 last_size = 0;
3703 phdr_index = 0;
3704 maxpagesize = bed->maxpagesize;
3705 writable = FALSE;
3706 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3707 if (dynsec != NULL
3708 && (dynsec->flags & SEC_LOAD) == 0)
3709 dynsec = NULL;
3710
3711 /* Deal with -Ttext or something similar such that the first section
3712 is not adjacent to the program headers. This is an
3713 approximation, since at this point we don't know exactly how many
3714 program headers we will need. */
3715 if (count > 0)
252b5132 3716 {
8ded5a0f
AM
3717 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3718
62d7a5f6 3719 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3720 phdr_size = get_program_header_size (abfd, info);
3721 if ((abfd->flags & D_PAGED) == 0
3722 || sections[0]->lma < phdr_size
3723 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
3724 phdr_in_segment = FALSE;
252b5132
RH
3725 }
3726
8ded5a0f 3727 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3728 {
8ded5a0f
AM
3729 asection *hdr;
3730 bfd_boolean new_segment;
3731
3732 hdr = *hdrpp;
3733
3734 /* See if this section and the last one will fit in the same
3735 segment. */
3736
3737 if (last_hdr == NULL)
3738 {
3739 /* If we don't have a segment yet, then we don't need a new
3740 one (we build the last one after this loop). */
3741 new_segment = FALSE;
3742 }
3743 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3744 {
3745 /* If this section has a different relation between the
3746 virtual address and the load address, then we need a new
3747 segment. */
3748 new_segment = TRUE;
3749 }
39948a60
NC
3750 /* In the next test we have to be careful when last_hdr->lma is close
3751 to the end of the address space. If the aligned address wraps
3752 around to the start of the address space, then there are no more
3753 pages left in memory and it is OK to assume that the current
3754 section can be included in the current segment. */
3755 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3756 > last_hdr->lma)
3757 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3758 <= hdr->lma))
8ded5a0f
AM
3759 {
3760 /* If putting this section in this segment would force us to
3761 skip a page in the segment, then we need a new segment. */
3762 new_segment = TRUE;
3763 }
3764 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3765 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3766 {
3767 /* We don't want to put a loadable section after a
3768 nonloadable section in the same segment.
3769 Consider .tbss sections as loadable for this purpose. */
3770 new_segment = TRUE;
3771 }
3772 else if ((abfd->flags & D_PAGED) == 0)
3773 {
3774 /* If the file is not demand paged, which means that we
3775 don't require the sections to be correctly aligned in the
3776 file, then there is no other reason for a new segment. */
3777 new_segment = FALSE;
3778 }
3779 else if (! writable
3780 && (hdr->flags & SEC_READONLY) == 0
3781 && (((last_hdr->lma + last_size - 1)
3782 & ~(maxpagesize - 1))
3783 != (hdr->lma & ~(maxpagesize - 1))))
3784 {
3785 /* We don't want to put a writable section in a read only
3786 segment, unless they are on the same page in memory
3787 anyhow. We already know that the last section does not
3788 bring us past the current section on the page, so the
3789 only case in which the new section is not on the same
3790 page as the previous section is when the previous section
3791 ends precisely on a page boundary. */
3792 new_segment = TRUE;
3793 }
3794 else
3795 {
3796 /* Otherwise, we can use the same segment. */
3797 new_segment = FALSE;
3798 }
3799
2889e75b 3800 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3801 if (last_hdr != NULL
3802 && info != NULL
3803 && info->callbacks->override_segment_assignment != NULL)
3804 new_segment
3805 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3806 last_hdr,
3807 new_segment);
2889e75b 3808
8ded5a0f
AM
3809 if (! new_segment)
3810 {
3811 if ((hdr->flags & SEC_READONLY) == 0)
3812 writable = TRUE;
3813 last_hdr = hdr;
3814 /* .tbss sections effectively have zero size. */
3815 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3816 != SEC_THREAD_LOCAL)
3817 last_size = hdr->size;
3818 else
3819 last_size = 0;
3820 continue;
3821 }
3822
3823 /* We need a new program segment. We must create a new program
3824 header holding all the sections from phdr_index until hdr. */
3825
3826 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3827 if (m == NULL)
3828 goto error_return;
3829
3830 *pm = m;
3831 pm = &m->next;
3832
252b5132 3833 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3834 writable = TRUE;
8ded5a0f
AM
3835 else
3836 writable = FALSE;
3837
baaff79e
JJ
3838 last_hdr = hdr;
3839 /* .tbss sections effectively have zero size. */
e5caec89 3840 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3841 last_size = hdr->size;
baaff79e
JJ
3842 else
3843 last_size = 0;
8ded5a0f
AM
3844 phdr_index = i;
3845 phdr_in_segment = FALSE;
252b5132
RH
3846 }
3847
8ded5a0f
AM
3848 /* Create a final PT_LOAD program segment. */
3849 if (last_hdr != NULL)
3850 {
3851 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3852 if (m == NULL)
3853 goto error_return;
252b5132 3854
8ded5a0f
AM
3855 *pm = m;
3856 pm = &m->next;
3857 }
252b5132 3858
8ded5a0f
AM
3859 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3860 if (dynsec != NULL)
3861 {
3862 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
3863 if (m == NULL)
3864 goto error_return;
3865 *pm = m;
3866 pm = &m->next;
3867 }
252b5132 3868
1c5265b5
JJ
3869 /* For each batch of consecutive loadable .note sections,
3870 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
3871 because if we link together nonloadable .note sections and
3872 loadable .note sections, we will generate two .note sections
3873 in the output file. FIXME: Using names for section types is
3874 bogus anyhow. */
8ded5a0f
AM
3875 for (s = abfd->sections; s != NULL; s = s->next)
3876 {
3877 if ((s->flags & SEC_LOAD) != 0
0112cd26 3878 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 3879 {
1c5265b5
JJ
3880 asection *s2;
3881 unsigned count = 1;
8ded5a0f 3882 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
3883 if (s->alignment_power == 2)
3884 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
3885 {
3886 if (s2->next->alignment_power == 2
3887 && (s2->next->flags & SEC_LOAD) != 0
3888 && CONST_STRNEQ (s2->next->name, ".note")
3889 && align_power (s2->vma + s2->size, 2)
3890 == s2->next->vma)
3891 count++;
3892 else
3893 break;
3894 }
1c5265b5 3895 amt += (count - 1) * sizeof (asection *);
8ded5a0f
AM
3896 m = bfd_zalloc (abfd, amt);
3897 if (m == NULL)
3898 goto error_return;
3899 m->next = NULL;
3900 m->p_type = PT_NOTE;
1c5265b5
JJ
3901 m->count = count;
3902 while (count > 1)
3903 {
3904 m->sections[m->count - count--] = s;
3905 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
3906 s = s->next;
3907 }
3908 m->sections[m->count - 1] = s;
3909 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
3910 *pm = m;
3911 pm = &m->next;
3912 }
3913 if (s->flags & SEC_THREAD_LOCAL)
3914 {
3915 if (! tls_count)
3916 first_tls = s;
3917 tls_count++;
3918 }
3919 }
252b5132 3920
8ded5a0f
AM
3921 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3922 if (tls_count > 0)
3923 {
3924 int i;
252b5132 3925
8ded5a0f
AM
3926 amt = sizeof (struct elf_segment_map);
3927 amt += (tls_count - 1) * sizeof (asection *);
3928 m = bfd_zalloc (abfd, amt);
3929 if (m == NULL)
3930 goto error_return;
3931 m->next = NULL;
3932 m->p_type = PT_TLS;
3933 m->count = tls_count;
3934 /* Mandated PF_R. */
3935 m->p_flags = PF_R;
3936 m->p_flags_valid = 1;
3937 for (i = 0; i < tls_count; ++i)
3938 {
3939 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3940 m->sections[i] = first_tls;
3941 first_tls = first_tls->next;
3942 }
252b5132 3943
8ded5a0f
AM
3944 *pm = m;
3945 pm = &m->next;
3946 }
252b5132 3947
8ded5a0f
AM
3948 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3949 segment. */
3950 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3951 if (eh_frame_hdr != NULL
3952 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 3953 {
dc810e39 3954 amt = sizeof (struct elf_segment_map);
217aa764 3955 m = bfd_zalloc (abfd, amt);
252b5132
RH
3956 if (m == NULL)
3957 goto error_return;
3958 m->next = NULL;
8ded5a0f 3959 m->p_type = PT_GNU_EH_FRAME;
252b5132 3960 m->count = 1;
8ded5a0f 3961 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
3962
3963 *pm = m;
3964 pm = &m->next;
3965 }
13ae64f3 3966
8ded5a0f 3967 if (elf_tdata (abfd)->stack_flags)
13ae64f3 3968 {
8ded5a0f
AM
3969 amt = sizeof (struct elf_segment_map);
3970 m = bfd_zalloc (abfd, amt);
3971 if (m == NULL)
3972 goto error_return;
3973 m->next = NULL;
2b05f1b7 3974 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
3975 m->p_flags = elf_tdata (abfd)->stack_flags;
3976 m->p_flags_valid = 1;
252b5132 3977
8ded5a0f
AM
3978 *pm = m;
3979 pm = &m->next;
3980 }
65765700 3981
ceae84aa 3982 if (info != NULL && info->relro)
8ded5a0f 3983 {
f210dcff
L
3984 for (m = mfirst; m != NULL; m = m->next)
3985 {
3986 if (m->p_type == PT_LOAD)
3987 {
3988 asection *last = m->sections[m->count - 1];
3989 bfd_vma vaddr = m->sections[0]->vma;
3990 bfd_vma filesz = last->vma - vaddr + last->size;
65765700 3991
f210dcff
L
3992 if (vaddr < info->relro_end
3993 && vaddr >= info->relro_start
3994 && (vaddr + filesz) >= info->relro_end)
3995 break;
3996 }
3997 }
3998
3999 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4000 if (m != NULL)
4001 {
4002 amt = sizeof (struct elf_segment_map);
4003 m = bfd_zalloc (abfd, amt);
4004 if (m == NULL)
4005 goto error_return;
4006 m->next = NULL;
4007 m->p_type = PT_GNU_RELRO;
4008 m->p_flags = PF_R;
4009 m->p_flags_valid = 1;
4010
4011 *pm = m;
4012 pm = &m->next;
4013 }
8ded5a0f 4014 }
9ee5e499 4015
8ded5a0f
AM
4016 free (sections);
4017 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
4018 }
4019
3dea8fca 4020 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4021 return FALSE;
8c37241b 4022
8ded5a0f
AM
4023 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4024 ++count;
4025 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 4026
b34976b6 4027 return TRUE;
252b5132
RH
4028
4029 error_return:
4030 if (sections != NULL)
4031 free (sections);
b34976b6 4032 return FALSE;
252b5132
RH
4033}
4034
4035/* Sort sections by address. */
4036
4037static int
217aa764 4038elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4039{
4040 const asection *sec1 = *(const asection **) arg1;
4041 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4042 bfd_size_type size1, size2;
252b5132
RH
4043
4044 /* Sort by LMA first, since this is the address used to
4045 place the section into a segment. */
4046 if (sec1->lma < sec2->lma)
4047 return -1;
4048 else if (sec1->lma > sec2->lma)
4049 return 1;
4050
4051 /* Then sort by VMA. Normally the LMA and the VMA will be
4052 the same, and this will do nothing. */
4053 if (sec1->vma < sec2->vma)
4054 return -1;
4055 else if (sec1->vma > sec2->vma)
4056 return 1;
4057
4058 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4059
07c6e936 4060#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4061
4062 if (TOEND (sec1))
4063 {
4064 if (TOEND (sec2))
00a7cdc5
NC
4065 {
4066 /* If the indicies are the same, do not return 0
4067 here, but continue to try the next comparison. */
4068 if (sec1->target_index - sec2->target_index != 0)
4069 return sec1->target_index - sec2->target_index;
4070 }
252b5132
RH
4071 else
4072 return 1;
4073 }
00a7cdc5 4074 else if (TOEND (sec2))
252b5132
RH
4075 return -1;
4076
4077#undef TOEND
4078
00a7cdc5
NC
4079 /* Sort by size, to put zero sized sections
4080 before others at the same address. */
252b5132 4081
eea6121a
AM
4082 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4083 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4084
4085 if (size1 < size2)
252b5132 4086 return -1;
eecdbe52 4087 if (size1 > size2)
252b5132
RH
4088 return 1;
4089
4090 return sec1->target_index - sec2->target_index;
4091}
4092
340b6d91
AC
4093/* Ian Lance Taylor writes:
4094
4095 We shouldn't be using % with a negative signed number. That's just
4096 not good. We have to make sure either that the number is not
4097 negative, or that the number has an unsigned type. When the types
4098 are all the same size they wind up as unsigned. When file_ptr is a
4099 larger signed type, the arithmetic winds up as signed long long,
4100 which is wrong.
4101
4102 What we're trying to say here is something like ``increase OFF by
4103 the least amount that will cause it to be equal to the VMA modulo
4104 the page size.'' */
4105/* In other words, something like:
4106
4107 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4108 off_offset = off % bed->maxpagesize;
4109 if (vma_offset < off_offset)
4110 adjustment = vma_offset + bed->maxpagesize - off_offset;
4111 else
4112 adjustment = vma_offset - off_offset;
08a40648 4113
340b6d91
AC
4114 which can can be collapsed into the expression below. */
4115
4116static file_ptr
4117vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4118{
4119 return ((vma - off) % maxpagesize);
4120}
4121
6d33f217
L
4122static void
4123print_segment_map (const struct elf_segment_map *m)
4124{
4125 unsigned int j;
4126 const char *pt = get_segment_type (m->p_type);
4127 char buf[32];
4128
4129 if (pt == NULL)
4130 {
4131 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4132 sprintf (buf, "LOPROC+%7.7x",
4133 (unsigned int) (m->p_type - PT_LOPROC));
4134 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4135 sprintf (buf, "LOOS+%7.7x",
4136 (unsigned int) (m->p_type - PT_LOOS));
4137 else
4138 snprintf (buf, sizeof (buf), "%8.8x",
4139 (unsigned int) m->p_type);
4140 pt = buf;
4141 }
4142 fprintf (stderr, "%s:", pt);
4143 for (j = 0; j < m->count; j++)
4144 fprintf (stderr, " %s", m->sections [j]->name);
4145 putc ('\n',stderr);
4146}
4147
252b5132
RH
4148/* Assign file positions to the sections based on the mapping from
4149 sections to segments. This function also sets up some fields in
f3520d2f 4150 the file header. */
252b5132 4151
b34976b6 4152static bfd_boolean
f3520d2f
AM
4153assign_file_positions_for_load_sections (bfd *abfd,
4154 struct bfd_link_info *link_info)
252b5132
RH
4155{
4156 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4157 struct elf_segment_map *m;
252b5132 4158 Elf_Internal_Phdr *phdrs;
252b5132 4159 Elf_Internal_Phdr *p;
02bf8d82 4160 file_ptr off;
3f570048 4161 bfd_size_type maxpagesize;
f3520d2f 4162 unsigned int alloc;
0920dee7 4163 unsigned int i, j;
2b0bc088 4164 bfd_vma header_pad = 0;
252b5132 4165
e36284ab 4166 if (link_info == NULL
ceae84aa 4167 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4168 return FALSE;
252b5132 4169
8ded5a0f 4170 alloc = 0;
252b5132 4171 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2b0bc088
NC
4172 {
4173 ++alloc;
4174 if (m->header_size)
4175 header_pad = m->header_size;
4176 }
252b5132
RH
4177
4178 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4179 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4180 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4181
62d7a5f6 4182 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4183 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4184 else
4185 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4186 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4187
4188 if (alloc == 0)
f3520d2f 4189 {
8ded5a0f
AM
4190 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4191 return TRUE;
f3520d2f 4192 }
252b5132 4193
57268894
HPN
4194 /* We're writing the size in elf_tdata (abfd)->program_header_size,
4195 see assign_file_positions_except_relocs, so make sure we have
4196 that amount allocated, with trailing space cleared.
4197 The variable alloc contains the computed need, while elf_tdata
4198 (abfd)->program_header_size contains the size used for the
4199 layout.
4200 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4201 where the layout is forced to according to a larger size in the
4202 last iterations for the testcase ld-elf/header. */
4203 BFD_ASSERT (elf_tdata (abfd)->program_header_size % bed->s->sizeof_phdr
4204 == 0);
4205 phdrs = bfd_zalloc2 (abfd,
4206 (elf_tdata (abfd)->program_header_size
4207 / bed->s->sizeof_phdr),
4208 sizeof (Elf_Internal_Phdr));
f3520d2f 4209 elf_tdata (abfd)->phdr = phdrs;
252b5132 4210 if (phdrs == NULL)
b34976b6 4211 return FALSE;
252b5132 4212
3f570048
AM
4213 maxpagesize = 1;
4214 if ((abfd->flags & D_PAGED) != 0)
4215 maxpagesize = bed->maxpagesize;
4216
252b5132
RH
4217 off = bed->s->sizeof_ehdr;
4218 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4219 if (header_pad < (bfd_vma) off)
4220 header_pad = 0;
4221 else
4222 header_pad -= off;
4223 off += header_pad;
252b5132 4224
0920dee7 4225 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4226 m != NULL;
0920dee7 4227 m = m->next, p++, j++)
252b5132 4228 {
252b5132 4229 asection **secpp;
bf988460
AM
4230 bfd_vma off_adjust;
4231 bfd_boolean no_contents;
252b5132
RH
4232
4233 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4234 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4235 not be done to the PT_NOTE section of a corefile, which may
4236 contain several pseudo-sections artificially created by bfd.
4237 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4238 if (m->count > 1
4239 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4240 && m->p_type == PT_NOTE))
252b5132
RH
4241 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4242 elf_sort_sections);
4243
b301b248
AM
4244 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4245 number of sections with contents contributing to both p_filesz
4246 and p_memsz, followed by a number of sections with no contents
4247 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4248 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4249 p->p_type = m->p_type;
28a7f3e7 4250 p->p_flags = m->p_flags;
252b5132 4251
3f570048
AM
4252 if (m->count == 0)
4253 p->p_vaddr = 0;
4254 else
3271a814 4255 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4256
4257 if (m->p_paddr_valid)
4258 p->p_paddr = m->p_paddr;
4259 else if (m->count == 0)
4260 p->p_paddr = 0;
4261 else
08a40648 4262 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4263
4264 if (p->p_type == PT_LOAD
4265 && (abfd->flags & D_PAGED) != 0)
4266 {
4267 /* p_align in demand paged PT_LOAD segments effectively stores
4268 the maximum page size. When copying an executable with
4269 objcopy, we set m->p_align from the input file. Use this
4270 value for maxpagesize rather than bed->maxpagesize, which
4271 may be different. Note that we use maxpagesize for PT_TLS
4272 segment alignment later in this function, so we are relying
4273 on at least one PT_LOAD segment appearing before a PT_TLS
4274 segment. */
4275 if (m->p_align_valid)
4276 maxpagesize = m->p_align;
4277
4278 p->p_align = maxpagesize;
4279 }
3271a814
NS
4280 else if (m->p_align_valid)
4281 p->p_align = m->p_align;
e970b90a
DJ
4282 else if (m->count == 0)
4283 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4284 else
4285 p->p_align = 0;
4286
bf988460
AM
4287 no_contents = FALSE;
4288 off_adjust = 0;
252b5132 4289 if (p->p_type == PT_LOAD
b301b248 4290 && m->count > 0)
252b5132 4291 {
b301b248 4292 bfd_size_type align;
a49e53ed 4293 unsigned int align_power = 0;
b301b248 4294
3271a814
NS
4295 if (m->p_align_valid)
4296 align = p->p_align;
4297 else
252b5132 4298 {
3271a814
NS
4299 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4300 {
4301 unsigned int secalign;
08a40648 4302
3271a814
NS
4303 secalign = bfd_get_section_alignment (abfd, *secpp);
4304 if (secalign > align_power)
4305 align_power = secalign;
4306 }
4307 align = (bfd_size_type) 1 << align_power;
4308 if (align < maxpagesize)
4309 align = maxpagesize;
b301b248 4310 }
252b5132 4311
02bf8d82
AM
4312 for (i = 0; i < m->count; i++)
4313 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4314 /* If we aren't making room for this section, then
4315 it must be SHT_NOBITS regardless of what we've
4316 set via struct bfd_elf_special_section. */
4317 elf_section_type (m->sections[i]) = SHT_NOBITS;
4318
bf988460 4319 /* Find out whether this segment contains any loadable
aea274d3
AM
4320 sections. */
4321 no_contents = TRUE;
4322 for (i = 0; i < m->count; i++)
4323 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4324 {
4325 no_contents = FALSE;
4326 break;
4327 }
bf988460
AM
4328
4329 off_adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4330 off += off_adjust;
4331 if (no_contents)
4332 {
4333 /* We shouldn't need to align the segment on disk since
4334 the segment doesn't need file space, but the gABI
4335 arguably requires the alignment and glibc ld.so
4336 checks it. So to comply with the alignment
4337 requirement but not waste file space, we adjust
4338 p_offset for just this segment. (OFF_ADJUST is
4339 subtracted from OFF later.) This may put p_offset
4340 past the end of file, but that shouldn't matter. */
4341 }
4342 else
4343 off_adjust = 0;
252b5132 4344 }
b1a6d0b1
NC
4345 /* Make sure the .dynamic section is the first section in the
4346 PT_DYNAMIC segment. */
4347 else if (p->p_type == PT_DYNAMIC
4348 && m->count > 1
4349 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4350 {
4351 _bfd_error_handler
b301b248
AM
4352 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4353 abfd);
b1a6d0b1
NC
4354 bfd_set_error (bfd_error_bad_value);
4355 return FALSE;
4356 }
3f001e84
JK
4357 /* Set the note section type to SHT_NOTE. */
4358 else if (p->p_type == PT_NOTE)
4359 for (i = 0; i < m->count; i++)
4360 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4361
252b5132
RH
4362 p->p_offset = 0;
4363 p->p_filesz = 0;
4364 p->p_memsz = 0;
4365
4366 if (m->includes_filehdr)
4367 {
bf988460 4368 if (!m->p_flags_valid)
252b5132 4369 p->p_flags |= PF_R;
252b5132
RH
4370 p->p_filesz = bed->s->sizeof_ehdr;
4371 p->p_memsz = bed->s->sizeof_ehdr;
4372 if (m->count > 0)
4373 {
4374 BFD_ASSERT (p->p_type == PT_LOAD);
4375
4376 if (p->p_vaddr < (bfd_vma) off)
4377 {
caf47ea6 4378 (*_bfd_error_handler)
b301b248
AM
4379 (_("%B: Not enough room for program headers, try linking with -N"),
4380 abfd);
252b5132 4381 bfd_set_error (bfd_error_bad_value);
b34976b6 4382 return FALSE;
252b5132
RH
4383 }
4384
4385 p->p_vaddr -= off;
bf988460 4386 if (!m->p_paddr_valid)
252b5132
RH
4387 p->p_paddr -= off;
4388 }
252b5132
RH
4389 }
4390
4391 if (m->includes_phdrs)
4392 {
bf988460 4393 if (!m->p_flags_valid)
252b5132
RH
4394 p->p_flags |= PF_R;
4395
f3520d2f 4396 if (!m->includes_filehdr)
252b5132
RH
4397 {
4398 p->p_offset = bed->s->sizeof_ehdr;
4399
4400 if (m->count > 0)
4401 {
4402 BFD_ASSERT (p->p_type == PT_LOAD);
4403 p->p_vaddr -= off - p->p_offset;
bf988460 4404 if (!m->p_paddr_valid)
252b5132
RH
4405 p->p_paddr -= off - p->p_offset;
4406 }
252b5132
RH
4407 }
4408
4409 p->p_filesz += alloc * bed->s->sizeof_phdr;
4410 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4411 if (m->count)
4412 {
4413 p->p_filesz += header_pad;
4414 p->p_memsz += header_pad;
4415 }
252b5132
RH
4416 }
4417
4418 if (p->p_type == PT_LOAD
4419 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4420 {
bf988460 4421 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4422 p->p_offset = off;
252b5132
RH
4423 else
4424 {
4425 file_ptr adjust;
4426
4427 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4428 if (!no_contents)
4429 p->p_filesz += adjust;
252b5132
RH
4430 p->p_memsz += adjust;
4431 }
4432 }
4433
1ea63fd2
AM
4434 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4435 maps. Set filepos for sections in PT_LOAD segments, and in
4436 core files, for sections in PT_NOTE segments.
4437 assign_file_positions_for_non_load_sections will set filepos
4438 for other sections and update p_filesz for other segments. */
252b5132
RH
4439 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4440 {
4441 asection *sec;
252b5132 4442 bfd_size_type align;
627b32bc 4443 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4444
4445 sec = *secpp;
02bf8d82 4446 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4447 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4448
88967714
AM
4449 if ((p->p_type == PT_LOAD
4450 || p->p_type == PT_TLS)
4451 && (this_hdr->sh_type != SHT_NOBITS
4452 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4453 && ((this_hdr->sh_flags & SHF_TLS) == 0
4454 || p->p_type == PT_TLS))))
252b5132 4455 {
11701589 4456 bfd_signed_vma adjust = sec->vma - (p->p_vaddr + p->p_memsz);
252b5132 4457
88967714 4458 if (adjust < 0)
252b5132 4459 {
88967714 4460 (*_bfd_error_handler)
11701589 4461 (_("%B: section %A vma 0x%lx overlaps previous sections"),
37c43c55 4462 abfd, sec, (unsigned long) sec->vma);
88967714
AM
4463 adjust = 0;
4464 }
4465 p->p_memsz += adjust;
0e922b77 4466
88967714
AM
4467 if (this_hdr->sh_type != SHT_NOBITS)
4468 {
4469 off += adjust;
4470 p->p_filesz += adjust;
252b5132 4471 }
252b5132
RH
4472 }
4473
4474 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4475 {
b301b248
AM
4476 /* The section at i == 0 is the one that actually contains
4477 everything. */
4a938328
MS
4478 if (i == 0)
4479 {
627b32bc 4480 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4481 off += this_hdr->sh_size;
4482 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4483 p->p_memsz = 0;
4484 p->p_align = 1;
252b5132 4485 }
4a938328 4486 else
252b5132 4487 {
b301b248 4488 /* The rest are fake sections that shouldn't be written. */
252b5132 4489 sec->filepos = 0;
eea6121a 4490 sec->size = 0;
b301b248
AM
4491 sec->flags = 0;
4492 continue;
252b5132 4493 }
252b5132
RH
4494 }
4495 else
4496 {
b301b248
AM
4497 if (p->p_type == PT_LOAD)
4498 {
02bf8d82
AM
4499 this_hdr->sh_offset = sec->filepos = off;
4500 if (this_hdr->sh_type != SHT_NOBITS)
6a3cd2b4 4501 off += this_hdr->sh_size;
b301b248 4502 }
252b5132 4503
02bf8d82 4504 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4505 {
6a3cd2b4 4506 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4507 /* A load section without SHF_ALLOC is something like
4508 a note section in a PT_NOTE segment. These take
4509 file space but are not loaded into memory. */
4510 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4511 p->p_memsz += this_hdr->sh_size;
b301b248 4512 }
6a3cd2b4 4513 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4514 {
6a3cd2b4
AM
4515 if (p->p_type == PT_TLS)
4516 p->p_memsz += this_hdr->sh_size;
4517
4518 /* .tbss is special. It doesn't contribute to p_memsz of
4519 normal segments. */
4520 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4521 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4522 }
4523
b10a8ae0
L
4524 if (align > p->p_align
4525 && !m->p_align_valid
4526 && (p->p_type != PT_LOAD
4527 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4528 p->p_align = align;
4529 }
4530
bf988460 4531 if (!m->p_flags_valid)
252b5132
RH
4532 {
4533 p->p_flags |= PF_R;
02bf8d82 4534 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4535 p->p_flags |= PF_X;
02bf8d82 4536 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4537 p->p_flags |= PF_W;
4538 }
4539 }
bf988460 4540 off -= off_adjust;
0920dee7 4541
7c928300
AM
4542 /* Check that all sections are in a PT_LOAD segment.
4543 Don't check funky gdb generated core files. */
4544 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
0920dee7
L
4545 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4546 {
4547 Elf_Internal_Shdr *this_hdr;
4548 asection *sec;
4549
4550 sec = *secpp;
4551 this_hdr = &(elf_section_data(sec)->this_hdr);
4552 if (this_hdr->sh_size != 0
4553 && !ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, p))
4554 {
4555 (*_bfd_error_handler)
4556 (_("%B: section `%A' can't be allocated in segment %d"),
4557 abfd, sec, j);
6d33f217 4558 print_segment_map (m);
0920dee7
L
4559 bfd_set_error (bfd_error_bad_value);
4560 return FALSE;
4561 }
4562 }
252b5132
RH
4563 }
4564
f3520d2f
AM
4565 elf_tdata (abfd)->next_file_pos = off;
4566 return TRUE;
4567}
4568
4569/* Assign file positions for the other sections. */
4570
4571static bfd_boolean
4572assign_file_positions_for_non_load_sections (bfd *abfd,
4573 struct bfd_link_info *link_info)
4574{
4575 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4576 Elf_Internal_Shdr **i_shdrpp;
4577 Elf_Internal_Shdr **hdrpp;
4578 Elf_Internal_Phdr *phdrs;
4579 Elf_Internal_Phdr *p;
4580 struct elf_segment_map *m;
4581 bfd_vma filehdr_vaddr, filehdr_paddr;
4582 bfd_vma phdrs_vaddr, phdrs_paddr;
4583 file_ptr off;
4584 unsigned int num_sec;
4585 unsigned int i;
4586 unsigned int count;
4587
5c182d5f
AM
4588 i_shdrpp = elf_elfsections (abfd);
4589 num_sec = elf_numsections (abfd);
f3520d2f 4590 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4591 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4592 {
4593 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4594 Elf_Internal_Shdr *hdr;
4595
4596 hdr = *hdrpp;
4597 if (hdr->bfd_section != NULL
252e386e
AM
4598 && (hdr->bfd_section->filepos != 0
4599 || (hdr->sh_type == SHT_NOBITS
4600 && hdr->contents == NULL)))
627b32bc 4601 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4602 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4603 {
49c13adb
L
4604 if (hdr->sh_size != 0)
4605 ((*_bfd_error_handler)
4606 (_("%B: warning: allocated section `%s' not in segment"),
3ba71138
L
4607 abfd,
4608 (hdr->bfd_section == NULL
4609 ? "*unknown*"
4610 : hdr->bfd_section->name)));
4611 /* We don't need to page align empty sections. */
4612 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4613 off += vma_page_aligned_bias (hdr->sh_addr, off,
4614 bed->maxpagesize);
4615 else
4616 off += vma_page_aligned_bias (hdr->sh_addr, off,
4617 hdr->sh_addralign);
4618 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4619 FALSE);
4620 }
4621 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4622 && hdr->bfd_section == NULL)
4623 || hdr == i_shdrpp[tdata->symtab_section]
4624 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4625 || hdr == i_shdrpp[tdata->strtab_section])
4626 hdr->sh_offset = -1;
4627 else
4628 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4629 }
4630
252b5132
RH
4631 /* Now that we have set the section file positions, we can set up
4632 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4633 count = 0;
4634 filehdr_vaddr = 0;
4635 filehdr_paddr = 0;
4636 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4637 phdrs_paddr = 0;
4638 phdrs = elf_tdata (abfd)->phdr;
4639 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4640 m != NULL;
4641 m = m->next, p++)
4642 {
4643 ++count;
4644 if (p->p_type != PT_LOAD)
4645 continue;
4646
4647 if (m->includes_filehdr)
4648 {
4649 filehdr_vaddr = p->p_vaddr;
4650 filehdr_paddr = p->p_paddr;
4651 }
4652 if (m->includes_phdrs)
4653 {
4654 phdrs_vaddr = p->p_vaddr;
4655 phdrs_paddr = p->p_paddr;
4656 if (m->includes_filehdr)
4657 {
4658 phdrs_vaddr += bed->s->sizeof_ehdr;
4659 phdrs_paddr += bed->s->sizeof_ehdr;
4660 }
4661 }
4662 }
4663
252b5132
RH
4664 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4665 m != NULL;
4666 m = m->next, p++)
4667 {
129af99f 4668 if (p->p_type == PT_GNU_RELRO)
252b5132 4669 {
b84a33b5
AM
4670 const Elf_Internal_Phdr *lp;
4671
129af99f 4672 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
1ea63fd2 4673
129af99f 4674 if (link_info != NULL)
8c37241b 4675 {
129af99f
AS
4676 /* During linking the range of the RELRO segment is passed
4677 in link_info. */
8c37241b
JJ
4678 for (lp = phdrs; lp < phdrs + count; ++lp)
4679 {
4680 if (lp->p_type == PT_LOAD
8c37241b 4681 && lp->p_vaddr >= link_info->relro_start
b84a33b5
AM
4682 && lp->p_vaddr < link_info->relro_end
4683 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end)
8c37241b
JJ
4684 break;
4685 }
8c37241b 4686 }
129af99f
AS
4687 else
4688 {
4689 /* Otherwise we are copying an executable or shared
b84a33b5 4690 library, but we need to use the same linker logic. */
129af99f
AS
4691 for (lp = phdrs; lp < phdrs + count; ++lp)
4692 {
4693 if (lp->p_type == PT_LOAD
4694 && lp->p_paddr == p->p_paddr)
4695 break;
4696 }
b84a33b5
AM
4697 }
4698
4699 if (lp < phdrs + count)
4700 {
4701 p->p_vaddr = lp->p_vaddr;
4702 p->p_paddr = lp->p_paddr;
4703 p->p_offset = lp->p_offset;
4704 if (link_info != NULL)
4705 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4706 else if (m->p_size_valid)
4707 p->p_filesz = m->p_size;
129af99f
AS
4708 else
4709 abort ();
b84a33b5
AM
4710 p->p_memsz = p->p_filesz;
4711 p->p_align = 1;
4712 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 4713 }
b84a33b5
AM
4714 else if (link_info != NULL)
4715 {
4716 memset (p, 0, sizeof *p);
4717 p->p_type = PT_NULL;
4718 }
4719 else
4720 abort ();
129af99f
AS
4721 }
4722 else if (m->count != 0)
4723 {
4724 if (p->p_type != PT_LOAD
4725 && (p->p_type != PT_NOTE
4726 || bfd_get_format (abfd) != bfd_core))
4727 {
4728 Elf_Internal_Shdr *hdr;
4729 asection *sect;
4730
4731 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4732
4733 sect = m->sections[m->count - 1];
4734 hdr = &elf_section_data (sect)->this_hdr;
4735 p->p_filesz = sect->filepos - m->sections[0]->filepos;
4736 if (hdr->sh_type != SHT_NOBITS)
4737 p->p_filesz += hdr->sh_size;
4738 p->p_offset = m->sections[0]->filepos;
4739 }
4740 }
4741 else if (m->includes_filehdr)
4742 {
4743 p->p_vaddr = filehdr_vaddr;
4744 if (! m->p_paddr_valid)
4745 p->p_paddr = filehdr_paddr;
4746 }
4747 else if (m->includes_phdrs)
4748 {
4749 p->p_vaddr = phdrs_vaddr;
4750 if (! m->p_paddr_valid)
4751 p->p_paddr = phdrs_paddr;
252b5132
RH
4752 }
4753 }
4754
252b5132
RH
4755 elf_tdata (abfd)->next_file_pos = off;
4756
b34976b6 4757 return TRUE;
252b5132
RH
4758}
4759
252b5132
RH
4760/* Work out the file positions of all the sections. This is called by
4761 _bfd_elf_compute_section_file_positions. All the section sizes and
4762 VMAs must be known before this is called.
4763
e0638f70
AM
4764 Reloc sections come in two flavours: Those processed specially as
4765 "side-channel" data attached to a section to which they apply, and
4766 those that bfd doesn't process as relocations. The latter sort are
4767 stored in a normal bfd section by bfd_section_from_shdr. We don't
4768 consider the former sort here, unless they form part of the loadable
4769 image. Reloc sections not assigned here will be handled later by
4770 assign_file_positions_for_relocs.
252b5132
RH
4771
4772 We also don't set the positions of the .symtab and .strtab here. */
4773
b34976b6 4774static bfd_boolean
c84fca4d
AO
4775assign_file_positions_except_relocs (bfd *abfd,
4776 struct bfd_link_info *link_info)
252b5132 4777{
5c182d5f
AM
4778 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4779 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4780 file_ptr off;
9c5bfbb7 4781 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4782
4783 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4784 && bfd_get_format (abfd) != bfd_core)
4785 {
5c182d5f
AM
4786 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4787 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4788 Elf_Internal_Shdr **hdrpp;
4789 unsigned int i;
4790
4791 /* Start after the ELF header. */
4792 off = i_ehdrp->e_ehsize;
4793
4794 /* We are not creating an executable, which means that we are
4795 not creating a program header, and that the actual order of
4796 the sections in the file is unimportant. */
9ad5cbcf 4797 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4798 {
4799 Elf_Internal_Shdr *hdr;
4800
4801 hdr = *hdrpp;
e0638f70
AM
4802 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4803 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4804 || i == tdata->symtab_section
4805 || i == tdata->symtab_shndx_section
252b5132
RH
4806 || i == tdata->strtab_section)
4807 {
4808 hdr->sh_offset = -1;
252b5132 4809 }
9ad5cbcf 4810 else
b34976b6 4811 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
4812 }
4813 }
4814 else
4815 {
f3520d2f
AM
4816 unsigned int alloc;
4817
252b5132 4818 /* Assign file positions for the loaded sections based on the
08a40648 4819 assignment of sections to segments. */
f3520d2f
AM
4820 if (!assign_file_positions_for_load_sections (abfd, link_info))
4821 return FALSE;
4822
4823 /* And for non-load sections. */
4824 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4825 return FALSE;
4826
e36284ab
AM
4827 if (bed->elf_backend_modify_program_headers != NULL)
4828 {
4829 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4830 return FALSE;
4831 }
4832
f3520d2f
AM
4833 /* Write out the program headers. */
4834 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4835 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4836 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4837 return FALSE;
252b5132 4838
5c182d5f 4839 off = tdata->next_file_pos;
252b5132
RH
4840 }
4841
4842 /* Place the section headers. */
45d6a902 4843 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4844 i_ehdrp->e_shoff = off;
4845 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4846
5c182d5f 4847 tdata->next_file_pos = off;
252b5132 4848
b34976b6 4849 return TRUE;
252b5132
RH
4850}
4851
b34976b6 4852static bfd_boolean
217aa764 4853prep_headers (bfd *abfd)
252b5132
RH
4854{
4855 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4856 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
2b0f7ef9 4857 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4858 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4859
4860 i_ehdrp = elf_elfheader (abfd);
252b5132 4861
2b0f7ef9 4862 shstrtab = _bfd_elf_strtab_init ();
252b5132 4863 if (shstrtab == NULL)
b34976b6 4864 return FALSE;
252b5132
RH
4865
4866 elf_shstrtab (abfd) = shstrtab;
4867
4868 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4869 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4870 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4871 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4872
4873 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4874 i_ehdrp->e_ident[EI_DATA] =
4875 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4876 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4877
252b5132
RH
4878 if ((abfd->flags & DYNAMIC) != 0)
4879 i_ehdrp->e_type = ET_DYN;
4880 else if ((abfd->flags & EXEC_P) != 0)
4881 i_ehdrp->e_type = ET_EXEC;
4882 else if (bfd_get_format (abfd) == bfd_core)
4883 i_ehdrp->e_type = ET_CORE;
4884 else
4885 i_ehdrp->e_type = ET_REL;
4886
4887 switch (bfd_get_arch (abfd))
4888 {
4889 case bfd_arch_unknown:
4890 i_ehdrp->e_machine = EM_NONE;
4891 break;
aa4f99bb
AO
4892
4893 /* There used to be a long list of cases here, each one setting
4894 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4895 in the corresponding bfd definition. To avoid duplication,
4896 the switch was removed. Machines that need special handling
4897 can generally do it in elf_backend_final_write_processing(),
4898 unless they need the information earlier than the final write.
4899 Such need can generally be supplied by replacing the tests for
4900 e_machine with the conditions used to determine it. */
252b5132 4901 default:
9c5bfbb7
AM
4902 i_ehdrp->e_machine = bed->elf_machine_code;
4903 }
aa4f99bb 4904
252b5132
RH
4905 i_ehdrp->e_version = bed->s->ev_current;
4906 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4907
c044fabd 4908 /* No program header, for now. */
252b5132
RH
4909 i_ehdrp->e_phoff = 0;
4910 i_ehdrp->e_phentsize = 0;
4911 i_ehdrp->e_phnum = 0;
4912
c044fabd 4913 /* Each bfd section is section header entry. */
252b5132
RH
4914 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4915 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4916
c044fabd 4917 /* If we're building an executable, we'll need a program header table. */
252b5132 4918 if (abfd->flags & EXEC_P)
0e71e495
BE
4919 /* It all happens later. */
4920 ;
252b5132
RH
4921 else
4922 {
4923 i_ehdrp->e_phentsize = 0;
4924 i_phdrp = 0;
4925 i_ehdrp->e_phoff = 0;
4926 }
4927
4928 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4929 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4930 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4931 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4932 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4933 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4934 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4935 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4936 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4937 return FALSE;
252b5132 4938
b34976b6 4939 return TRUE;
252b5132
RH
4940}
4941
4942/* Assign file positions for all the reloc sections which are not part
4943 of the loadable file image. */
4944
4945void
217aa764 4946_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4947{
4948 file_ptr off;
9ad5cbcf 4949 unsigned int i, num_sec;
252b5132
RH
4950 Elf_Internal_Shdr **shdrpp;
4951
4952 off = elf_tdata (abfd)->next_file_pos;
4953
9ad5cbcf
AM
4954 num_sec = elf_numsections (abfd);
4955 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4956 {
4957 Elf_Internal_Shdr *shdrp;
4958
4959 shdrp = *shdrpp;
4960 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4961 && shdrp->sh_offset == -1)
b34976b6 4962 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4963 }
4964
4965 elf_tdata (abfd)->next_file_pos = off;
4966}
4967
b34976b6 4968bfd_boolean
217aa764 4969_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4970{
9c5bfbb7 4971 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4972 Elf_Internal_Ehdr *i_ehdrp;
4973 Elf_Internal_Shdr **i_shdrp;
b34976b6 4974 bfd_boolean failed;
9ad5cbcf 4975 unsigned int count, num_sec;
252b5132
RH
4976
4977 if (! abfd->output_has_begun
217aa764 4978 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4979 return FALSE;
252b5132
RH
4980
4981 i_shdrp = elf_elfsections (abfd);
4982 i_ehdrp = elf_elfheader (abfd);
4983
b34976b6 4984 failed = FALSE;
252b5132
RH
4985 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
4986 if (failed)
b34976b6 4987 return FALSE;
252b5132
RH
4988
4989 _bfd_elf_assign_file_positions_for_relocs (abfd);
4990
c044fabd 4991 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
4992 num_sec = elf_numsections (abfd);
4993 for (count = 1; count < num_sec; count++)
252b5132
RH
4994 {
4995 if (bed->elf_backend_section_processing)
4996 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
4997 if (i_shdrp[count]->contents)
4998 {
dc810e39
AM
4999 bfd_size_type amt = i_shdrp[count]->sh_size;
5000
252b5132 5001 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5002 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5003 return FALSE;
252b5132
RH
5004 }
5005 }
5006
5007 /* Write out the section header names. */
26ae6d5e
DJ
5008 if (elf_shstrtab (abfd) != NULL
5009 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5010 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5011 return FALSE;
252b5132
RH
5012
5013 if (bed->elf_backend_final_write_processing)
5014 (*bed->elf_backend_final_write_processing) (abfd,
5015 elf_tdata (abfd)->linker);
5016
ff59fc36
RM
5017 if (!bed->s->write_shdrs_and_ehdr (abfd))
5018 return FALSE;
5019
5020 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
5021 if (elf_tdata (abfd)->after_write_object_contents)
5022 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
5023
5024 return TRUE;
252b5132
RH
5025}
5026
b34976b6 5027bfd_boolean
217aa764 5028_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5029{
c044fabd 5030 /* Hopefully this can be done just like an object file. */
252b5132
RH
5031 return _bfd_elf_write_object_contents (abfd);
5032}
c044fabd
KH
5033
5034/* Given a section, search the header to find them. */
5035
cb33740c 5036unsigned int
198beae2 5037_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5038{
9c5bfbb7 5039 const struct elf_backend_data *bed;
cb33740c 5040 unsigned int index;
252b5132 5041
9ad5cbcf
AM
5042 if (elf_section_data (asect) != NULL
5043 && elf_section_data (asect)->this_idx != 0)
5044 return elf_section_data (asect)->this_idx;
5045
5046 if (bfd_is_abs_section (asect))
af746e92
AM
5047 index = SHN_ABS;
5048 else if (bfd_is_com_section (asect))
5049 index = SHN_COMMON;
5050 else if (bfd_is_und_section (asect))
5051 index = SHN_UNDEF;
5052 else
cb33740c 5053 index = SHN_BAD;
252b5132 5054
af746e92 5055 bed = get_elf_backend_data (abfd);
252b5132
RH
5056 if (bed->elf_backend_section_from_bfd_section)
5057 {
af746e92 5058 int retval = index;
9ad5cbcf 5059
af746e92
AM
5060 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5061 return retval;
252b5132
RH
5062 }
5063
cb33740c 5064 if (index == SHN_BAD)
af746e92 5065 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5066
af746e92 5067 return index;
252b5132
RH
5068}
5069
5070/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5071 on error. */
5072
5073int
217aa764 5074_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5075{
5076 asymbol *asym_ptr = *asym_ptr_ptr;
5077 int idx;
5078 flagword flags = asym_ptr->flags;
5079
5080 /* When gas creates relocations against local labels, it creates its
5081 own symbol for the section, but does put the symbol into the
5082 symbol chain, so udata is 0. When the linker is generating
5083 relocatable output, this section symbol may be for one of the
5084 input sections rather than the output section. */
5085 if (asym_ptr->udata.i == 0
5086 && (flags & BSF_SECTION_SYM)
5087 && asym_ptr->section)
5088 {
5372391b 5089 asection *sec;
252b5132
RH
5090 int indx;
5091
5372391b
AM
5092 sec = asym_ptr->section;
5093 if (sec->owner != abfd && sec->output_section != NULL)
5094 sec = sec->output_section;
5095 if (sec->owner == abfd
5096 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5097 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5098 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5099 }
5100
5101 idx = asym_ptr->udata.i;
5102
5103 if (idx == 0)
5104 {
5105 /* This case can occur when using --strip-symbol on a symbol
08a40648 5106 which is used in a relocation entry. */
252b5132 5107 (*_bfd_error_handler)
d003868e
AM
5108 (_("%B: symbol `%s' required but not present"),
5109 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5110 bfd_set_error (bfd_error_no_symbols);
5111 return -1;
5112 }
5113
5114#if DEBUG & 4
5115 {
5116 fprintf (stderr,
661a3fd4 5117 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5118 (long) asym_ptr, asym_ptr->name, idx, flags,
5119 elf_symbol_flags (flags));
5120 fflush (stderr);
5121 }
5122#endif
5123
5124 return idx;
5125}
5126
84d1d650 5127/* Rewrite program header information. */
252b5132 5128
b34976b6 5129static bfd_boolean
84d1d650 5130rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5131{
b34976b6
AM
5132 Elf_Internal_Ehdr *iehdr;
5133 struct elf_segment_map *map;
5134 struct elf_segment_map *map_first;
5135 struct elf_segment_map **pointer_to_map;
5136 Elf_Internal_Phdr *segment;
5137 asection *section;
5138 unsigned int i;
5139 unsigned int num_segments;
5140 bfd_boolean phdr_included = FALSE;
5c44b38e 5141 bfd_boolean p_paddr_valid;
b34976b6
AM
5142 bfd_vma maxpagesize;
5143 struct elf_segment_map *phdr_adjust_seg = NULL;
5144 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5145 const struct elf_backend_data *bed;
bc67d8a6 5146
caf47ea6 5147 bed = get_elf_backend_data (ibfd);
252b5132
RH
5148 iehdr = elf_elfheader (ibfd);
5149
bc67d8a6 5150 map_first = NULL;
c044fabd 5151 pointer_to_map = &map_first;
252b5132
RH
5152
5153 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5154 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5155
5156 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5157#define SEGMENT_END(segment, start) \
5158 (start + (segment->p_memsz > segment->p_filesz \
5159 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5160
eecdbe52
JJ
5161#define SECTION_SIZE(section, segment) \
5162 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5163 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5164 ? section->size : 0)
eecdbe52 5165
b34976b6 5166 /* Returns TRUE if the given section is contained within
bc67d8a6 5167 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5168#define IS_CONTAINED_BY_VMA(section, segment) \
5169 (section->vma >= segment->p_vaddr \
eecdbe52 5170 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5171 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5172
b34976b6 5173 /* Returns TRUE if the given section is contained within
bc67d8a6 5174 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5175#define IS_CONTAINED_BY_LMA(section, segment, base) \
5176 (section->lma >= base \
eecdbe52 5177 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5178 <= SEGMENT_END (segment, base)))
252b5132 5179
0efc80c8
L
5180 /* Handle PT_NOTE segment. */
5181#define IS_NOTE(p, s) \
aecc8f8a 5182 (p->p_type == PT_NOTE \
0efc80c8 5183 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5184 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5185 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5186 <= p->p_offset + p->p_filesz))
252b5132 5187
0efc80c8
L
5188 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5189 etc. */
5190#define IS_COREFILE_NOTE(p, s) \
5191 (IS_NOTE (p, s) \
5192 && bfd_get_format (ibfd) == bfd_core \
5193 && s->vma == 0 \
5194 && s->lma == 0)
5195
252b5132
RH
5196 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5197 linker, which generates a PT_INTERP section with p_vaddr and
5198 p_memsz set to 0. */
aecc8f8a
AM
5199#define IS_SOLARIS_PT_INTERP(p, s) \
5200 (p->p_vaddr == 0 \
5201 && p->p_paddr == 0 \
5202 && p->p_memsz == 0 \
5203 && p->p_filesz > 0 \
5204 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5205 && s->size > 0 \
aecc8f8a 5206 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5207 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5208 <= p->p_offset + p->p_filesz))
5c440b1e 5209
bc67d8a6
NC
5210 /* Decide if the given section should be included in the given segment.
5211 A section will be included if:
f5ffc919 5212 1. It is within the address space of the segment -- we use the LMA
08a40648 5213 if that is set for the segment and the VMA otherwise,
0efc80c8
L
5214 2. It is an allocated section or a NOTE section in a PT_NOTE
5215 segment.
bc67d8a6 5216 3. There is an output section associated with it,
eecdbe52 5217 4. The section has not already been allocated to a previous segment.
2b05f1b7 5218 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5219 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5220 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5221 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5222 (with the possible exception of .dynamic). */
9f17e2a6 5223#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5224 ((((segment->p_paddr \
5225 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5226 : IS_CONTAINED_BY_VMA (section, segment)) \
5227 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5228 || IS_NOTE (segment, section)) \
2b05f1b7
L
5229 && segment->p_type != PT_GNU_STACK \
5230 && (segment->p_type != PT_TLS \
5231 || (section->flags & SEC_THREAD_LOCAL)) \
5232 && (segment->p_type == PT_LOAD \
5233 || segment->p_type == PT_TLS \
5234 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5235 && (segment->p_type != PT_DYNAMIC \
5236 || SECTION_SIZE (section, segment) > 0 \
5237 || (segment->p_paddr \
5238 ? segment->p_paddr != section->lma \
5239 : segment->p_vaddr != section->vma) \
5240 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5241 == 0)) \
0067a569 5242 && !section->segment_mark)
bc67d8a6 5243
9f17e2a6
L
5244/* If the output section of a section in the input segment is NULL,
5245 it is removed from the corresponding output segment. */
5246#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5247 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5248 && section->output_section != NULL)
5249
b34976b6 5250 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5251#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5252 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5253
5254 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5255 their VMA address ranges and their LMA address ranges overlap.
5256 It is possible to have overlapping VMA ranges without overlapping LMA
5257 ranges. RedBoot images for example can have both .data and .bss mapped
5258 to the same VMA range, but with the .data section mapped to a different
5259 LMA. */
aecc8f8a 5260#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5261 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5262 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5263 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5264 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5265
5266 /* Initialise the segment mark field. */
5267 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5268 section->segment_mark = FALSE;
bc67d8a6 5269
5c44b38e
AM
5270 /* The Solaris linker creates program headers in which all the
5271 p_paddr fields are zero. When we try to objcopy or strip such a
5272 file, we get confused. Check for this case, and if we find it
5273 don't set the p_paddr_valid fields. */
5274 p_paddr_valid = FALSE;
5275 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5276 i < num_segments;
5277 i++, segment++)
5278 if (segment->p_paddr != 0)
5279 {
5280 p_paddr_valid = TRUE;
5281 break;
5282 }
5283
252b5132 5284 /* Scan through the segments specified in the program header
bc67d8a6 5285 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5286 in the loadable segments. These can be created by weird
aecc8f8a 5287 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5288 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5289 i < num_segments;
c044fabd 5290 i++, segment++)
252b5132 5291 {
252b5132 5292 unsigned int j;
c044fabd 5293 Elf_Internal_Phdr *segment2;
252b5132 5294
aecc8f8a
AM
5295 if (segment->p_type == PT_INTERP)
5296 for (section = ibfd->sections; section; section = section->next)
5297 if (IS_SOLARIS_PT_INTERP (segment, section))
5298 {
5299 /* Mininal change so that the normal section to segment
4cc11e76 5300 assignment code will work. */
aecc8f8a
AM
5301 segment->p_vaddr = section->vma;
5302 break;
5303 }
5304
bc67d8a6 5305 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5306 {
5307 /* Remove PT_GNU_RELRO segment. */
5308 if (segment->p_type == PT_GNU_RELRO)
5309 segment->p_type = PT_NULL;
5310 continue;
5311 }
c044fabd 5312
bc67d8a6 5313 /* Determine if this segment overlaps any previous segments. */
0067a569 5314 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5315 {
5316 bfd_signed_vma extra_length;
c044fabd 5317
bc67d8a6 5318 if (segment2->p_type != PT_LOAD
0067a569 5319 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5320 continue;
c044fabd 5321
bc67d8a6
NC
5322 /* Merge the two segments together. */
5323 if (segment2->p_vaddr < segment->p_vaddr)
5324 {
c044fabd 5325 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5326 SEGMENT. */
0067a569
AM
5327 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5328 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5329
bc67d8a6
NC
5330 if (extra_length > 0)
5331 {
0067a569 5332 segment2->p_memsz += extra_length;
bc67d8a6
NC
5333 segment2->p_filesz += extra_length;
5334 }
c044fabd 5335
bc67d8a6 5336 segment->p_type = PT_NULL;
c044fabd 5337
bc67d8a6
NC
5338 /* Since we have deleted P we must restart the outer loop. */
5339 i = 0;
5340 segment = elf_tdata (ibfd)->phdr;
5341 break;
5342 }
5343 else
5344 {
c044fabd 5345 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5346 SEGMENT2. */
0067a569
AM
5347 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5348 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5349
bc67d8a6
NC
5350 if (extra_length > 0)
5351 {
0067a569 5352 segment->p_memsz += extra_length;
bc67d8a6
NC
5353 segment->p_filesz += extra_length;
5354 }
c044fabd 5355
bc67d8a6
NC
5356 segment2->p_type = PT_NULL;
5357 }
5358 }
5359 }
c044fabd 5360
bc67d8a6
NC
5361 /* The second scan attempts to assign sections to segments. */
5362 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5363 i < num_segments;
0067a569 5364 i++, segment++)
bc67d8a6 5365 {
0067a569
AM
5366 unsigned int section_count;
5367 asection **sections;
5368 asection *output_section;
5369 unsigned int isec;
5370 bfd_vma matching_lma;
5371 bfd_vma suggested_lma;
5372 unsigned int j;
dc810e39 5373 bfd_size_type amt;
0067a569
AM
5374 asection *first_section;
5375 bfd_boolean first_matching_lma;
5376 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5377
5378 if (segment->p_type == PT_NULL)
5379 continue;
c044fabd 5380
9f17e2a6 5381 first_section = NULL;
bc67d8a6 5382 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5383 for (section = ibfd->sections, section_count = 0;
5384 section != NULL;
5385 section = section->next)
9f17e2a6
L
5386 {
5387 /* Find the first section in the input segment, which may be
5388 removed from the corresponding output segment. */
5389 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5390 {
5391 if (first_section == NULL)
5392 first_section = section;
5393 if (section->output_section != NULL)
5394 ++section_count;
5395 }
5396 }
811072d8 5397
b5f852ea
NC
5398 /* Allocate a segment map big enough to contain
5399 all of the sections we have selected. */
dc810e39
AM
5400 amt = sizeof (struct elf_segment_map);
5401 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
41f8ce69 5402 map = bfd_zalloc (obfd, amt);
bc67d8a6 5403 if (map == NULL)
b34976b6 5404 return FALSE;
252b5132
RH
5405
5406 /* Initialise the fields of the segment map. Default to
5407 using the physical address of the segment in the input BFD. */
0067a569
AM
5408 map->next = NULL;
5409 map->p_type = segment->p_type;
5410 map->p_flags = segment->p_flags;
bc67d8a6 5411 map->p_flags_valid = 1;
55d55ac7 5412
9f17e2a6
L
5413 /* If the first section in the input segment is removed, there is
5414 no need to preserve segment physical address in the corresponding
5415 output segment. */
945c025a 5416 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5417 {
5418 map->p_paddr = segment->p_paddr;
5c44b38e 5419 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5420 }
252b5132
RH
5421
5422 /* Determine if this segment contains the ELF file header
5423 and if it contains the program headers themselves. */
bc67d8a6
NC
5424 map->includes_filehdr = (segment->p_offset == 0
5425 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5426 map->includes_phdrs = 0;
252b5132 5427
0067a569 5428 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5429 {
bc67d8a6
NC
5430 map->includes_phdrs =
5431 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5432 && (segment->p_offset + segment->p_filesz
252b5132
RH
5433 >= ((bfd_vma) iehdr->e_phoff
5434 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5435
bc67d8a6 5436 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5437 phdr_included = TRUE;
252b5132
RH
5438 }
5439
bc67d8a6 5440 if (section_count == 0)
252b5132
RH
5441 {
5442 /* Special segments, such as the PT_PHDR segment, may contain
5443 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5444 something. They are allowed by the ELF spec however, so only
5445 a warning is produced. */
bc67d8a6 5446 if (segment->p_type == PT_LOAD)
0067a569
AM
5447 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5448 " detected, is this intentional ?\n"),
5449 ibfd);
252b5132 5450
bc67d8a6 5451 map->count = 0;
c044fabd
KH
5452 *pointer_to_map = map;
5453 pointer_to_map = &map->next;
252b5132
RH
5454
5455 continue;
5456 }
5457
5458 /* Now scan the sections in the input BFD again and attempt
5459 to add their corresponding output sections to the segment map.
5460 The problem here is how to handle an output section which has
5461 been moved (ie had its LMA changed). There are four possibilities:
5462
5463 1. None of the sections have been moved.
5464 In this case we can continue to use the segment LMA from the
5465 input BFD.
5466
5467 2. All of the sections have been moved by the same amount.
5468 In this case we can change the segment's LMA to match the LMA
5469 of the first section.
5470
5471 3. Some of the sections have been moved, others have not.
5472 In this case those sections which have not been moved can be
5473 placed in the current segment which will have to have its size,
5474 and possibly its LMA changed, and a new segment or segments will
5475 have to be created to contain the other sections.
5476
b5f852ea 5477 4. The sections have been moved, but not by the same amount.
252b5132
RH
5478 In this case we can change the segment's LMA to match the LMA
5479 of the first section and we will have to create a new segment
5480 or segments to contain the other sections.
5481
5482 In order to save time, we allocate an array to hold the section
5483 pointers that we are interested in. As these sections get assigned
5484 to a segment, they are removed from this array. */
5485
d0fb9a8d 5486 sections = bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5487 if (sections == NULL)
b34976b6 5488 return FALSE;
252b5132
RH
5489
5490 /* Step One: Scan for segment vs section LMA conflicts.
5491 Also add the sections to the section array allocated above.
5492 Also add the sections to the current segment. In the common
5493 case, where the sections have not been moved, this means that
5494 we have completely filled the segment, and there is nothing
5495 more to do. */
252b5132 5496 isec = 0;
72730e0c 5497 matching_lma = 0;
252b5132 5498 suggested_lma = 0;
0067a569
AM
5499 first_matching_lma = TRUE;
5500 first_suggested_lma = TRUE;
252b5132 5501
147d51c2 5502 for (section = ibfd->sections;
bc67d8a6
NC
5503 section != NULL;
5504 section = section->next)
147d51c2
L
5505 if (section == first_section)
5506 break;
5507
5508 for (j = 0; section != NULL; section = section->next)
252b5132 5509 {
caf47ea6 5510 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5511 {
bc67d8a6
NC
5512 output_section = section->output_section;
5513
0067a569 5514 sections[j++] = section;
252b5132
RH
5515
5516 /* The Solaris native linker always sets p_paddr to 0.
5517 We try to catch that case here, and set it to the
5e8d7549
NC
5518 correct value. Note - some backends require that
5519 p_paddr be left as zero. */
5c44b38e 5520 if (!p_paddr_valid
4455705d 5521 && segment->p_vaddr != 0
0067a569 5522 && !bed->want_p_paddr_set_to_zero
252b5132 5523 && isec == 0
bc67d8a6 5524 && output_section->lma != 0
0067a569
AM
5525 && output_section->vma == (segment->p_vaddr
5526 + (map->includes_filehdr
5527 ? iehdr->e_ehsize
5528 : 0)
5529 + (map->includes_phdrs
5530 ? (iehdr->e_phnum
5531 * iehdr->e_phentsize)
5532 : 0)))
bc67d8a6 5533 map->p_paddr = segment->p_vaddr;
252b5132
RH
5534
5535 /* Match up the physical address of the segment with the
5536 LMA address of the output section. */
bc67d8a6 5537 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5538 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5539 || (bed->want_p_paddr_set_to_zero
5540 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5541 {
0067a569
AM
5542 if (first_matching_lma || output_section->lma < matching_lma)
5543 {
5544 matching_lma = output_section->lma;
5545 first_matching_lma = FALSE;
5546 }
252b5132
RH
5547
5548 /* We assume that if the section fits within the segment
bc67d8a6 5549 then it does not overlap any other section within that
252b5132 5550 segment. */
0067a569
AM
5551 map->sections[isec++] = output_section;
5552 }
5553 else if (first_suggested_lma)
5554 {
5555 suggested_lma = output_section->lma;
5556 first_suggested_lma = FALSE;
252b5132 5557 }
147d51c2
L
5558
5559 if (j == section_count)
5560 break;
252b5132
RH
5561 }
5562 }
5563
bc67d8a6 5564 BFD_ASSERT (j == section_count);
252b5132
RH
5565
5566 /* Step Two: Adjust the physical address of the current segment,
5567 if necessary. */
bc67d8a6 5568 if (isec == section_count)
252b5132
RH
5569 {
5570 /* All of the sections fitted within the segment as currently
5571 specified. This is the default case. Add the segment to
5572 the list of built segments and carry on to process the next
5573 program header in the input BFD. */
bc67d8a6 5574 map->count = section_count;
c044fabd
KH
5575 *pointer_to_map = map;
5576 pointer_to_map = &map->next;
08a40648 5577
5c44b38e
AM
5578 if (p_paddr_valid
5579 && !bed->want_p_paddr_set_to_zero
147d51c2 5580 && matching_lma != map->p_paddr
5c44b38e
AM
5581 && !map->includes_filehdr
5582 && !map->includes_phdrs)
3271a814
NS
5583 /* There is some padding before the first section in the
5584 segment. So, we must account for that in the output
5585 segment's vma. */
5586 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5587
252b5132
RH
5588 free (sections);
5589 continue;
5590 }
252b5132
RH
5591 else
5592 {
0067a569 5593 if (!first_matching_lma)
72730e0c
AM
5594 {
5595 /* At least one section fits inside the current segment.
5596 Keep it, but modify its physical address to match the
5597 LMA of the first section that fitted. */
bc67d8a6 5598 map->p_paddr = matching_lma;
72730e0c
AM
5599 }
5600 else
5601 {
5602 /* None of the sections fitted inside the current segment.
5603 Change the current segment's physical address to match
5604 the LMA of the first section. */
bc67d8a6 5605 map->p_paddr = suggested_lma;
72730e0c
AM
5606 }
5607
bc67d8a6
NC
5608 /* Offset the segment physical address from the lma
5609 to allow for space taken up by elf headers. */
5610 if (map->includes_filehdr)
010c8431
AM
5611 {
5612 if (map->p_paddr >= iehdr->e_ehsize)
5613 map->p_paddr -= iehdr->e_ehsize;
5614 else
5615 {
5616 map->includes_filehdr = FALSE;
5617 map->includes_phdrs = FALSE;
5618 }
5619 }
252b5132 5620
bc67d8a6
NC
5621 if (map->includes_phdrs)
5622 {
010c8431
AM
5623 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5624 {
5625 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5626
5627 /* iehdr->e_phnum is just an estimate of the number
5628 of program headers that we will need. Make a note
5629 here of the number we used and the segment we chose
5630 to hold these headers, so that we can adjust the
5631 offset when we know the correct value. */
5632 phdr_adjust_num = iehdr->e_phnum;
5633 phdr_adjust_seg = map;
5634 }
5635 else
5636 map->includes_phdrs = FALSE;
bc67d8a6 5637 }
252b5132
RH
5638 }
5639
5640 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5641 those that fit to the current segment and removing them from the
252b5132
RH
5642 sections array; but making sure not to leave large gaps. Once all
5643 possible sections have been assigned to the current segment it is
5644 added to the list of built segments and if sections still remain
5645 to be assigned, a new segment is constructed before repeating
5646 the loop. */
5647 isec = 0;
5648 do
5649 {
bc67d8a6 5650 map->count = 0;
252b5132 5651 suggested_lma = 0;
0067a569 5652 first_suggested_lma = TRUE;
252b5132
RH
5653
5654 /* Fill the current segment with sections that fit. */
bc67d8a6 5655 for (j = 0; j < section_count; j++)
252b5132 5656 {
bc67d8a6 5657 section = sections[j];
252b5132 5658
bc67d8a6 5659 if (section == NULL)
252b5132
RH
5660 continue;
5661
bc67d8a6 5662 output_section = section->output_section;
252b5132 5663
bc67d8a6 5664 BFD_ASSERT (output_section != NULL);
c044fabd 5665
bc67d8a6
NC
5666 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5667 || IS_COREFILE_NOTE (segment, section))
252b5132 5668 {
bc67d8a6 5669 if (map->count == 0)
252b5132
RH
5670 {
5671 /* If the first section in a segment does not start at
bc67d8a6
NC
5672 the beginning of the segment, then something is
5673 wrong. */
0067a569
AM
5674 if (output_section->lma
5675 != (map->p_paddr
5676 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5677 + (map->includes_phdrs
5678 ? iehdr->e_phnum * iehdr->e_phentsize
5679 : 0)))
252b5132
RH
5680 abort ();
5681 }
5682 else
5683 {
0067a569 5684 asection *prev_sec;
252b5132 5685
bc67d8a6 5686 prev_sec = map->sections[map->count - 1];
252b5132
RH
5687
5688 /* If the gap between the end of the previous section
bc67d8a6
NC
5689 and the start of this section is more than
5690 maxpagesize then we need to start a new segment. */
eea6121a 5691 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5692 maxpagesize)
caf47ea6 5693 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 5694 || (prev_sec->lma + prev_sec->size
079e9a2f 5695 > output_section->lma))
252b5132 5696 {
0067a569
AM
5697 if (first_suggested_lma)
5698 {
5699 suggested_lma = output_section->lma;
5700 first_suggested_lma = FALSE;
5701 }
252b5132
RH
5702
5703 continue;
5704 }
5705 }
5706
bc67d8a6 5707 map->sections[map->count++] = output_section;
252b5132
RH
5708 ++isec;
5709 sections[j] = NULL;
b34976b6 5710 section->segment_mark = TRUE;
252b5132 5711 }
0067a569
AM
5712 else if (first_suggested_lma)
5713 {
5714 suggested_lma = output_section->lma;
5715 first_suggested_lma = FALSE;
5716 }
252b5132
RH
5717 }
5718
bc67d8a6 5719 BFD_ASSERT (map->count > 0);
252b5132
RH
5720
5721 /* Add the current segment to the list of built segments. */
c044fabd
KH
5722 *pointer_to_map = map;
5723 pointer_to_map = &map->next;
252b5132 5724
bc67d8a6 5725 if (isec < section_count)
252b5132
RH
5726 {
5727 /* We still have not allocated all of the sections to
5728 segments. Create a new segment here, initialise it
5729 and carry on looping. */
dc810e39
AM
5730 amt = sizeof (struct elf_segment_map);
5731 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
217aa764 5732 map = bfd_alloc (obfd, amt);
bc67d8a6 5733 if (map == NULL)
5ed6aba4
NC
5734 {
5735 free (sections);
5736 return FALSE;
5737 }
252b5132
RH
5738
5739 /* Initialise the fields of the segment map. Set the physical
5740 physical address to the LMA of the first section that has
5741 not yet been assigned. */
0067a569
AM
5742 map->next = NULL;
5743 map->p_type = segment->p_type;
5744 map->p_flags = segment->p_flags;
5745 map->p_flags_valid = 1;
5746 map->p_paddr = suggested_lma;
5c44b38e 5747 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 5748 map->includes_filehdr = 0;
0067a569 5749 map->includes_phdrs = 0;
252b5132
RH
5750 }
5751 }
bc67d8a6 5752 while (isec < section_count);
252b5132
RH
5753
5754 free (sections);
5755 }
5756
bc67d8a6
NC
5757 elf_tdata (obfd)->segment_map = map_first;
5758
5759 /* If we had to estimate the number of program headers that were
9ad5cbcf 5760 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5761 the offset if necessary. */
5762 if (phdr_adjust_seg != NULL)
5763 {
5764 unsigned int count;
c044fabd 5765
bc67d8a6 5766 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5767 count++;
252b5132 5768
bc67d8a6
NC
5769 if (count > phdr_adjust_num)
5770 phdr_adjust_seg->p_paddr
5771 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5772 }
c044fabd 5773
bc67d8a6 5774#undef SEGMENT_END
eecdbe52 5775#undef SECTION_SIZE
bc67d8a6
NC
5776#undef IS_CONTAINED_BY_VMA
5777#undef IS_CONTAINED_BY_LMA
0efc80c8 5778#undef IS_NOTE
252b5132 5779#undef IS_COREFILE_NOTE
bc67d8a6 5780#undef IS_SOLARIS_PT_INTERP
9f17e2a6 5781#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
5782#undef INCLUDE_SECTION_IN_SEGMENT
5783#undef SEGMENT_AFTER_SEGMENT
5784#undef SEGMENT_OVERLAPS
b34976b6 5785 return TRUE;
252b5132
RH
5786}
5787
84d1d650
L
5788/* Copy ELF program header information. */
5789
5790static bfd_boolean
5791copy_elf_program_header (bfd *ibfd, bfd *obfd)
5792{
5793 Elf_Internal_Ehdr *iehdr;
5794 struct elf_segment_map *map;
5795 struct elf_segment_map *map_first;
5796 struct elf_segment_map **pointer_to_map;
5797 Elf_Internal_Phdr *segment;
5798 unsigned int i;
5799 unsigned int num_segments;
5800 bfd_boolean phdr_included = FALSE;
88967714 5801 bfd_boolean p_paddr_valid;
84d1d650
L
5802
5803 iehdr = elf_elfheader (ibfd);
5804
5805 map_first = NULL;
5806 pointer_to_map = &map_first;
5807
88967714
AM
5808 /* If all the segment p_paddr fields are zero, don't set
5809 map->p_paddr_valid. */
5810 p_paddr_valid = FALSE;
84d1d650 5811 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
5812 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5813 i < num_segments;
5814 i++, segment++)
5815 if (segment->p_paddr != 0)
5816 {
5817 p_paddr_valid = TRUE;
5818 break;
5819 }
5820
84d1d650
L
5821 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5822 i < num_segments;
5823 i++, segment++)
5824 {
5825 asection *section;
5826 unsigned int section_count;
5827 bfd_size_type amt;
5828 Elf_Internal_Shdr *this_hdr;
53020534 5829 asection *first_section = NULL;
c981028a 5830 asection *lowest_section = NULL;
84d1d650 5831
84d1d650
L
5832 /* Compute how many sections are in this segment. */
5833 for (section = ibfd->sections, section_count = 0;
5834 section != NULL;
5835 section = section->next)
5836 {
5837 this_hdr = &(elf_section_data(section)->this_hdr);
5838 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
3271a814 5839 {
53020534 5840 if (!first_section)
c981028a
DJ
5841 first_section = lowest_section = section;
5842 if (section->lma < lowest_section->lma)
5843 lowest_section = section;
3271a814
NS
5844 section_count++;
5845 }
84d1d650
L
5846 }
5847
5848 /* Allocate a segment map big enough to contain
5849 all of the sections we have selected. */
5850 amt = sizeof (struct elf_segment_map);
5851 if (section_count != 0)
5852 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
41f8ce69 5853 map = bfd_zalloc (obfd, amt);
84d1d650
L
5854 if (map == NULL)
5855 return FALSE;
5856
5857 /* Initialize the fields of the output segment map with the
5858 input segment. */
5859 map->next = NULL;
5860 map->p_type = segment->p_type;
5861 map->p_flags = segment->p_flags;
5862 map->p_flags_valid = 1;
5863 map->p_paddr = segment->p_paddr;
88967714 5864 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
5865 map->p_align = segment->p_align;
5866 map->p_align_valid = 1;
3271a814 5867 map->p_vaddr_offset = 0;
84d1d650 5868
b10a8ae0
L
5869 if (map->p_type == PT_GNU_RELRO
5870 && segment->p_filesz == segment->p_memsz)
5871 {
5872 /* The PT_GNU_RELRO segment may contain the first a few
5873 bytes in the .got.plt section even if the whole .got.plt
5874 section isn't in the PT_GNU_RELRO segment. We won't
5875 change the size of the PT_GNU_RELRO segment. */
5876 map->p_size = segment->p_filesz;
5877 map->p_size_valid = 1;
5878 }
5879
84d1d650
L
5880 /* Determine if this segment contains the ELF file header
5881 and if it contains the program headers themselves. */
5882 map->includes_filehdr = (segment->p_offset == 0
5883 && segment->p_filesz >= iehdr->e_ehsize);
5884
5885 map->includes_phdrs = 0;
5886 if (! phdr_included || segment->p_type != PT_LOAD)
5887 {
5888 map->includes_phdrs =
5889 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5890 && (segment->p_offset + segment->p_filesz
5891 >= ((bfd_vma) iehdr->e_phoff
5892 + iehdr->e_phnum * iehdr->e_phentsize)));
5893
5894 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5895 phdr_included = TRUE;
5896 }
5897
2b0bc088
NC
5898 if (map->includes_filehdr && first_section)
5899 /* We need to keep the space used by the headers fixed. */
5900 map->header_size = first_section->vma - segment->p_vaddr;
5901
88967714
AM
5902 if (!map->includes_phdrs
5903 && !map->includes_filehdr
5904 && map->p_paddr_valid)
3271a814 5905 /* There is some other padding before the first section. */
c981028a 5906 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
53020534 5907 - segment->p_paddr);
08a40648 5908
84d1d650
L
5909 if (section_count != 0)
5910 {
5911 unsigned int isec = 0;
5912
53020534 5913 for (section = first_section;
84d1d650
L
5914 section != NULL;
5915 section = section->next)
5916 {
5917 this_hdr = &(elf_section_data(section)->this_hdr);
5918 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
53020534
L
5919 {
5920 map->sections[isec++] = section->output_section;
5921 if (isec == section_count)
5922 break;
5923 }
84d1d650
L
5924 }
5925 }
5926
5927 map->count = section_count;
5928 *pointer_to_map = map;
5929 pointer_to_map = &map->next;
5930 }
5931
5932 elf_tdata (obfd)->segment_map = map_first;
5933 return TRUE;
5934}
5935
5936/* Copy private BFD data. This copies or rewrites ELF program header
5937 information. */
5938
5939static bfd_boolean
5940copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5941{
84d1d650
L
5942 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5943 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5944 return TRUE;
5945
5946 if (elf_tdata (ibfd)->phdr == NULL)
5947 return TRUE;
5948
5949 if (ibfd->xvec == obfd->xvec)
5950 {
cb3ff1e5
NC
5951 /* Check to see if any sections in the input BFD
5952 covered by ELF program header have changed. */
d55ce4e2 5953 Elf_Internal_Phdr *segment;
84d1d650
L
5954 asection *section, *osec;
5955 unsigned int i, num_segments;
5956 Elf_Internal_Shdr *this_hdr;
147d51c2
L
5957 const struct elf_backend_data *bed;
5958
5959 bed = get_elf_backend_data (ibfd);
5960
5961 /* Regenerate the segment map if p_paddr is set to 0. */
5962 if (bed->want_p_paddr_set_to_zero)
5963 goto rewrite;
84d1d650
L
5964
5965 /* Initialize the segment mark field. */
5966 for (section = obfd->sections; section != NULL;
5967 section = section->next)
5968 section->segment_mark = FALSE;
5969
5970 num_segments = elf_elfheader (ibfd)->e_phnum;
5971 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5972 i < num_segments;
5973 i++, segment++)
5974 {
5f6999aa
NC
5975 /* PR binutils/3535. The Solaris linker always sets the p_paddr
5976 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
5977 which severly confuses things, so always regenerate the segment
5978 map in this case. */
5979 if (segment->p_paddr == 0
5980 && segment->p_memsz == 0
5981 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 5982 goto rewrite;
5f6999aa 5983
84d1d650
L
5984 for (section = ibfd->sections;
5985 section != NULL; section = section->next)
5986 {
5987 /* We mark the output section so that we know it comes
5988 from the input BFD. */
5989 osec = section->output_section;
5990 if (osec)
5991 osec->segment_mark = TRUE;
5992
5993 /* Check if this section is covered by the segment. */
5994 this_hdr = &(elf_section_data(section)->this_hdr);
5995 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
5996 {
5997 /* FIXME: Check if its output section is changed or
5998 removed. What else do we need to check? */
5999 if (osec == NULL
6000 || section->flags != osec->flags
6001 || section->lma != osec->lma
6002 || section->vma != osec->vma
6003 || section->size != osec->size
6004 || section->rawsize != osec->rawsize
6005 || section->alignment_power != osec->alignment_power)
6006 goto rewrite;
6007 }
6008 }
6009 }
6010
cb3ff1e5 6011 /* Check to see if any output section do not come from the
84d1d650
L
6012 input BFD. */
6013 for (section = obfd->sections; section != NULL;
6014 section = section->next)
6015 {
6016 if (section->segment_mark == FALSE)
6017 goto rewrite;
6018 else
6019 section->segment_mark = FALSE;
6020 }
6021
6022 return copy_elf_program_header (ibfd, obfd);
6023 }
6024
6025rewrite:
6026 return rewrite_elf_program_header (ibfd, obfd);
6027}
6028
ccd2ec6a
L
6029/* Initialize private output section information from input section. */
6030
6031bfd_boolean
6032_bfd_elf_init_private_section_data (bfd *ibfd,
6033 asection *isec,
6034 bfd *obfd,
6035 asection *osec,
6036 struct bfd_link_info *link_info)
6037
6038{
6039 Elf_Internal_Shdr *ihdr, *ohdr;
6040 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
6041
6042 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6043 || obfd->xvec->flavour != bfd_target_elf_flavour)
6044 return TRUE;
6045
e843e0f8 6046 /* Don't copy the output ELF section type from input if the
d3fd4074 6047 output BFD section flags have been set to something different.
e843e0f8
L
6048 elf_fake_sections will set ELF section type based on BFD
6049 section flags. */
42bb2e33
AM
6050 if (elf_section_type (osec) == SHT_NULL
6051 && (osec->flags == isec->flags || !osec->flags))
6052 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6053
6054 /* FIXME: Is this correct for all OS/PROC specific flags? */
6055 elf_section_flags (osec) |= (elf_section_flags (isec)
6056 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6057
6058 /* Set things up for objcopy and relocatable link. The output
6059 SHT_GROUP section will have its elf_next_in_group pointing back
6060 to the input group members. Ignore linker created group section.
6061 See elfNN_ia64_object_p in elfxx-ia64.c. */
ccd2ec6a
L
6062 if (need_group)
6063 {
6064 if (elf_sec_group (isec) == NULL
6065 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6066 {
6067 if (elf_section_flags (isec) & SHF_GROUP)
6068 elf_section_flags (osec) |= SHF_GROUP;
6069 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6070 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6071 }
6072 }
6073
6074 ihdr = &elf_section_data (isec)->this_hdr;
6075
6076 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6077 don't use the output section of the linked-to section since it
6078 may be NULL at this point. */
6079 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6080 {
6081 ohdr = &elf_section_data (osec)->this_hdr;
6082 ohdr->sh_flags |= SHF_LINK_ORDER;
6083 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6084 }
6085
6086 osec->use_rela_p = isec->use_rela_p;
6087
6088 return TRUE;
6089}
6090
252b5132
RH
6091/* Copy private section information. This copies over the entsize
6092 field, and sometimes the info field. */
6093
b34976b6 6094bfd_boolean
217aa764
AM
6095_bfd_elf_copy_private_section_data (bfd *ibfd,
6096 asection *isec,
6097 bfd *obfd,
6098 asection *osec)
252b5132
RH
6099{
6100 Elf_Internal_Shdr *ihdr, *ohdr;
6101
6102 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6103 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6104 return TRUE;
252b5132 6105
252b5132
RH
6106 ihdr = &elf_section_data (isec)->this_hdr;
6107 ohdr = &elf_section_data (osec)->this_hdr;
6108
6109 ohdr->sh_entsize = ihdr->sh_entsize;
6110
6111 if (ihdr->sh_type == SHT_SYMTAB
6112 || ihdr->sh_type == SHT_DYNSYM
6113 || ihdr->sh_type == SHT_GNU_verneed
6114 || ihdr->sh_type == SHT_GNU_verdef)
6115 ohdr->sh_info = ihdr->sh_info;
6116
ccd2ec6a
L
6117 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6118 NULL);
252b5132
RH
6119}
6120
80fccad2
BW
6121/* Copy private header information. */
6122
6123bfd_boolean
6124_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6125{
30288845
AM
6126 asection *isec;
6127
80fccad2
BW
6128 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6129 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6130 return TRUE;
6131
6132 /* Copy over private BFD data if it has not already been copied.
6133 This must be done here, rather than in the copy_private_bfd_data
6134 entry point, because the latter is called after the section
6135 contents have been set, which means that the program headers have
6136 already been worked out. */
6137 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6138 {
6139 if (! copy_private_bfd_data (ibfd, obfd))
6140 return FALSE;
6141 }
6142
30288845
AM
6143 /* _bfd_elf_copy_private_section_data copied over the SHF_GROUP flag
6144 but this might be wrong if we deleted the group section. */
6145 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
6146 if (elf_section_type (isec) == SHT_GROUP
6147 && isec->output_section == NULL)
6148 {
6149 asection *first = elf_next_in_group (isec);
6150 asection *s = first;
6151 while (s != NULL)
6152 {
6153 if (s->output_section != NULL)
6154 {
6155 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6156 elf_group_name (s->output_section) = NULL;
6157 }
6158 s = elf_next_in_group (s);
6159 if (s == first)
6160 break;
6161 }
6162 }
6163
80fccad2
BW
6164 return TRUE;
6165}
6166
252b5132
RH
6167/* Copy private symbol information. If this symbol is in a section
6168 which we did not map into a BFD section, try to map the section
6169 index correctly. We use special macro definitions for the mapped
6170 section indices; these definitions are interpreted by the
6171 swap_out_syms function. */
6172
9ad5cbcf
AM
6173#define MAP_ONESYMTAB (SHN_HIOS + 1)
6174#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6175#define MAP_STRTAB (SHN_HIOS + 3)
6176#define MAP_SHSTRTAB (SHN_HIOS + 4)
6177#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6178
b34976b6 6179bfd_boolean
217aa764
AM
6180_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6181 asymbol *isymarg,
6182 bfd *obfd,
6183 asymbol *osymarg)
252b5132
RH
6184{
6185 elf_symbol_type *isym, *osym;
6186
6187 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6188 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6189 return TRUE;
252b5132
RH
6190
6191 isym = elf_symbol_from (ibfd, isymarg);
6192 osym = elf_symbol_from (obfd, osymarg);
6193
6194 if (isym != NULL
8424d8f5 6195 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6196 && osym != NULL
6197 && bfd_is_abs_section (isym->symbol.section))
6198 {
6199 unsigned int shndx;
6200
6201 shndx = isym->internal_elf_sym.st_shndx;
6202 if (shndx == elf_onesymtab (ibfd))
6203 shndx = MAP_ONESYMTAB;
6204 else if (shndx == elf_dynsymtab (ibfd))
6205 shndx = MAP_DYNSYMTAB;
6206 else if (shndx == elf_tdata (ibfd)->strtab_section)
6207 shndx = MAP_STRTAB;
6208 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6209 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6210 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6211 shndx = MAP_SYM_SHNDX;
252b5132
RH
6212 osym->internal_elf_sym.st_shndx = shndx;
6213 }
6214
b34976b6 6215 return TRUE;
252b5132
RH
6216}
6217
6218/* Swap out the symbols. */
6219
b34976b6 6220static bfd_boolean
217aa764
AM
6221swap_out_syms (bfd *abfd,
6222 struct bfd_strtab_hash **sttp,
6223 int relocatable_p)
252b5132 6224{
9c5bfbb7 6225 const struct elf_backend_data *bed;
079e9a2f
AM
6226 int symcount;
6227 asymbol **syms;
6228 struct bfd_strtab_hash *stt;
6229 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6230 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6231 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6232 bfd_byte *outbound_syms;
6233 bfd_byte *outbound_shndx;
079e9a2f
AM
6234 int idx;
6235 bfd_size_type amt;
174fd7f9 6236 bfd_boolean name_local_sections;
252b5132
RH
6237
6238 if (!elf_map_symbols (abfd))
b34976b6 6239 return FALSE;
252b5132 6240
c044fabd 6241 /* Dump out the symtabs. */
079e9a2f
AM
6242 stt = _bfd_elf_stringtab_init ();
6243 if (stt == NULL)
b34976b6 6244 return FALSE;
252b5132 6245
079e9a2f
AM
6246 bed = get_elf_backend_data (abfd);
6247 symcount = bfd_get_symcount (abfd);
6248 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6249 symtab_hdr->sh_type = SHT_SYMTAB;
6250 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6251 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6252 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
72de5009 6253 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6254
6255 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6256 symstrtab_hdr->sh_type = SHT_STRTAB;
6257
d0fb9a8d 6258 outbound_syms = bfd_alloc2 (abfd, 1 + symcount, bed->s->sizeof_sym);
079e9a2f 6259 if (outbound_syms == NULL)
5ed6aba4
NC
6260 {
6261 _bfd_stringtab_free (stt);
6262 return FALSE;
6263 }
217aa764 6264 symtab_hdr->contents = outbound_syms;
252b5132 6265
9ad5cbcf
AM
6266 outbound_shndx = NULL;
6267 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6268 if (symtab_shndx_hdr->sh_name != 0)
6269 {
6270 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
d0fb9a8d
JJ
6271 outbound_shndx = bfd_zalloc2 (abfd, 1 + symcount,
6272 sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6273 if (outbound_shndx == NULL)
5ed6aba4
NC
6274 {
6275 _bfd_stringtab_free (stt);
6276 return FALSE;
6277 }
6278
9ad5cbcf
AM
6279 symtab_shndx_hdr->contents = outbound_shndx;
6280 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6281 symtab_shndx_hdr->sh_size = amt;
6282 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6283 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6284 }
6285
589e6347 6286 /* Now generate the data (for "contents"). */
079e9a2f
AM
6287 {
6288 /* Fill in zeroth symbol and swap it out. */
6289 Elf_Internal_Sym sym;
6290 sym.st_name = 0;
6291 sym.st_value = 0;
6292 sym.st_size = 0;
6293 sym.st_info = 0;
6294 sym.st_other = 0;
6295 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6296 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6297 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6298 if (outbound_shndx != NULL)
6299 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6300 }
252b5132 6301
174fd7f9
RS
6302 name_local_sections
6303 = (bed->elf_backend_name_local_section_symbols
6304 && bed->elf_backend_name_local_section_symbols (abfd));
6305
079e9a2f
AM
6306 syms = bfd_get_outsymbols (abfd);
6307 for (idx = 0; idx < symcount; idx++)
252b5132 6308 {
252b5132 6309 Elf_Internal_Sym sym;
079e9a2f
AM
6310 bfd_vma value = syms[idx]->value;
6311 elf_symbol_type *type_ptr;
6312 flagword flags = syms[idx]->flags;
6313 int type;
252b5132 6314
174fd7f9
RS
6315 if (!name_local_sections
6316 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6317 {
6318 /* Local section symbols have no name. */
6319 sym.st_name = 0;
6320 }
6321 else
6322 {
6323 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6324 syms[idx]->name,
b34976b6 6325 TRUE, FALSE);
079e9a2f 6326 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6327 {
6328 _bfd_stringtab_free (stt);
6329 return FALSE;
6330 }
079e9a2f 6331 }
252b5132 6332
079e9a2f 6333 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6334
079e9a2f
AM
6335 if ((flags & BSF_SECTION_SYM) == 0
6336 && bfd_is_com_section (syms[idx]->section))
6337 {
6338 /* ELF common symbols put the alignment into the `value' field,
6339 and the size into the `size' field. This is backwards from
6340 how BFD handles it, so reverse it here. */
6341 sym.st_size = value;
6342 if (type_ptr == NULL
6343 || type_ptr->internal_elf_sym.st_value == 0)
6344 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6345 else
6346 sym.st_value = type_ptr->internal_elf_sym.st_value;
6347 sym.st_shndx = _bfd_elf_section_from_bfd_section
6348 (abfd, syms[idx]->section);
6349 }
6350 else
6351 {
6352 asection *sec = syms[idx]->section;
cb33740c 6353 unsigned int shndx;
252b5132 6354
079e9a2f
AM
6355 if (sec->output_section)
6356 {
6357 value += sec->output_offset;
6358 sec = sec->output_section;
6359 }
589e6347 6360
079e9a2f
AM
6361 /* Don't add in the section vma for relocatable output. */
6362 if (! relocatable_p)
6363 value += sec->vma;
6364 sym.st_value = value;
6365 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6366
6367 if (bfd_is_abs_section (sec)
6368 && type_ptr != NULL
6369 && type_ptr->internal_elf_sym.st_shndx != 0)
6370 {
6371 /* This symbol is in a real ELF section which we did
6372 not create as a BFD section. Undo the mapping done
6373 by copy_private_symbol_data. */
6374 shndx = type_ptr->internal_elf_sym.st_shndx;
6375 switch (shndx)
6376 {
6377 case MAP_ONESYMTAB:
6378 shndx = elf_onesymtab (abfd);
6379 break;
6380 case MAP_DYNSYMTAB:
6381 shndx = elf_dynsymtab (abfd);
6382 break;
6383 case MAP_STRTAB:
6384 shndx = elf_tdata (abfd)->strtab_section;
6385 break;
6386 case MAP_SHSTRTAB:
6387 shndx = elf_tdata (abfd)->shstrtab_section;
6388 break;
9ad5cbcf
AM
6389 case MAP_SYM_SHNDX:
6390 shndx = elf_tdata (abfd)->symtab_shndx_section;
6391 break;
079e9a2f
AM
6392 default:
6393 break;
6394 }
6395 }
6396 else
6397 {
6398 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6399
cb33740c 6400 if (shndx == SHN_BAD)
079e9a2f
AM
6401 {
6402 asection *sec2;
6403
6404 /* Writing this would be a hell of a lot easier if
6405 we had some decent documentation on bfd, and
6406 knew what to expect of the library, and what to
6407 demand of applications. For example, it
6408 appears that `objcopy' might not set the
6409 section of a symbol to be a section that is
6410 actually in the output file. */
6411 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6412 if (sec2 == NULL)
6413 {
6414 _bfd_error_handler (_("\
6415Unable to find equivalent output section for symbol '%s' from section '%s'"),
6416 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6417 sec->name);
811072d8 6418 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6419 _bfd_stringtab_free (stt);
589e6347
NC
6420 return FALSE;
6421 }
811072d8 6422
079e9a2f 6423 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6424 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6425 }
6426 }
252b5132 6427
079e9a2f
AM
6428 sym.st_shndx = shndx;
6429 }
252b5132 6430
13ae64f3
JJ
6431 if ((flags & BSF_THREAD_LOCAL) != 0)
6432 type = STT_TLS;
6433 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6434 type = STT_FUNC;
6435 else if ((flags & BSF_OBJECT) != 0)
6436 type = STT_OBJECT;
d9352518
DB
6437 else if ((flags & BSF_RELC) != 0)
6438 type = STT_RELC;
6439 else if ((flags & BSF_SRELC) != 0)
6440 type = STT_SRELC;
079e9a2f
AM
6441 else
6442 type = STT_NOTYPE;
252b5132 6443
13ae64f3
JJ
6444 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6445 type = STT_TLS;
6446
589e6347 6447 /* Processor-specific types. */
079e9a2f
AM
6448 if (type_ptr != NULL
6449 && bed->elf_backend_get_symbol_type)
6450 type = ((*bed->elf_backend_get_symbol_type)
6451 (&type_ptr->internal_elf_sym, type));
252b5132 6452
079e9a2f
AM
6453 if (flags & BSF_SECTION_SYM)
6454 {
6455 if (flags & BSF_GLOBAL)
6456 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6457 else
6458 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6459 }
6460 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6461 {
504b7d20 6462#ifdef USE_STT_COMMON
0a40daed
MK
6463 if (type == STT_OBJECT)
6464 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6465 else
504b7d20 6466#endif
c91e322a 6467 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6468 }
079e9a2f
AM
6469 else if (bfd_is_und_section (syms[idx]->section))
6470 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6471 ? STB_WEAK
6472 : STB_GLOBAL),
6473 type);
6474 else if (flags & BSF_FILE)
6475 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6476 else
6477 {
6478 int bind = STB_LOCAL;
252b5132 6479
079e9a2f
AM
6480 if (flags & BSF_LOCAL)
6481 bind = STB_LOCAL;
6482 else if (flags & BSF_WEAK)
6483 bind = STB_WEAK;
6484 else if (flags & BSF_GLOBAL)
6485 bind = STB_GLOBAL;
252b5132 6486
079e9a2f
AM
6487 sym.st_info = ELF_ST_INFO (bind, type);
6488 }
252b5132 6489
079e9a2f
AM
6490 if (type_ptr != NULL)
6491 sym.st_other = type_ptr->internal_elf_sym.st_other;
6492 else
6493 sym.st_other = 0;
252b5132 6494
9ad5cbcf 6495 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6496 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6497 if (outbound_shndx != NULL)
6498 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6499 }
252b5132 6500
079e9a2f
AM
6501 *sttp = stt;
6502 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6503 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6504
079e9a2f
AM
6505 symstrtab_hdr->sh_flags = 0;
6506 symstrtab_hdr->sh_addr = 0;
6507 symstrtab_hdr->sh_entsize = 0;
6508 symstrtab_hdr->sh_link = 0;
6509 symstrtab_hdr->sh_info = 0;
6510 symstrtab_hdr->sh_addralign = 1;
252b5132 6511
b34976b6 6512 return TRUE;
252b5132
RH
6513}
6514
6515/* Return the number of bytes required to hold the symtab vector.
6516
6517 Note that we base it on the count plus 1, since we will null terminate
6518 the vector allocated based on this size. However, the ELF symbol table
6519 always has a dummy entry as symbol #0, so it ends up even. */
6520
6521long
217aa764 6522_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6523{
6524 long symcount;
6525 long symtab_size;
6526 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6527
6528 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6529 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6530 if (symcount > 0)
6531 symtab_size -= sizeof (asymbol *);
252b5132
RH
6532
6533 return symtab_size;
6534}
6535
6536long
217aa764 6537_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6538{
6539 long symcount;
6540 long symtab_size;
6541 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6542
6543 if (elf_dynsymtab (abfd) == 0)
6544 {
6545 bfd_set_error (bfd_error_invalid_operation);
6546 return -1;
6547 }
6548
6549 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6550 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6551 if (symcount > 0)
6552 symtab_size -= sizeof (asymbol *);
252b5132
RH
6553
6554 return symtab_size;
6555}
6556
6557long
217aa764
AM
6558_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6559 sec_ptr asect)
252b5132
RH
6560{
6561 return (asect->reloc_count + 1) * sizeof (arelent *);
6562}
6563
6564/* Canonicalize the relocs. */
6565
6566long
217aa764
AM
6567_bfd_elf_canonicalize_reloc (bfd *abfd,
6568 sec_ptr section,
6569 arelent **relptr,
6570 asymbol **symbols)
252b5132
RH
6571{
6572 arelent *tblptr;
6573 unsigned int i;
9c5bfbb7 6574 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6575
b34976b6 6576 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6577 return -1;
6578
6579 tblptr = section->relocation;
6580 for (i = 0; i < section->reloc_count; i++)
6581 *relptr++ = tblptr++;
6582
6583 *relptr = NULL;
6584
6585 return section->reloc_count;
6586}
6587
6588long
6cee3f79 6589_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6590{
9c5bfbb7 6591 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6592 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6593
6594 if (symcount >= 0)
6595 bfd_get_symcount (abfd) = symcount;
6596 return symcount;
6597}
6598
6599long
217aa764
AM
6600_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6601 asymbol **allocation)
252b5132 6602{
9c5bfbb7 6603 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6604 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6605
6606 if (symcount >= 0)
6607 bfd_get_dynamic_symcount (abfd) = symcount;
6608 return symcount;
252b5132
RH
6609}
6610
8615f3f2
AM
6611/* Return the size required for the dynamic reloc entries. Any loadable
6612 section that was actually installed in the BFD, and has type SHT_REL
6613 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6614 dynamic reloc section. */
252b5132
RH
6615
6616long
217aa764 6617_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6618{
6619 long ret;
6620 asection *s;
6621
6622 if (elf_dynsymtab (abfd) == 0)
6623 {
6624 bfd_set_error (bfd_error_invalid_operation);
6625 return -1;
6626 }
6627
6628 ret = sizeof (arelent *);
6629 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 6630 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6631 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6632 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6633 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6634 * sizeof (arelent *));
6635
6636 return ret;
6637}
6638
8615f3f2
AM
6639/* Canonicalize the dynamic relocation entries. Note that we return the
6640 dynamic relocations as a single block, although they are actually
6641 associated with particular sections; the interface, which was
6642 designed for SunOS style shared libraries, expects that there is only
6643 one set of dynamic relocs. Any loadable section that was actually
6644 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6645 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6646
6647long
217aa764
AM
6648_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6649 arelent **storage,
6650 asymbol **syms)
252b5132 6651{
217aa764 6652 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6653 asection *s;
6654 long ret;
6655
6656 if (elf_dynsymtab (abfd) == 0)
6657 {
6658 bfd_set_error (bfd_error_invalid_operation);
6659 return -1;
6660 }
6661
6662 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6663 ret = 0;
6664 for (s = abfd->sections; s != NULL; s = s->next)
6665 {
266b05cf 6666 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6667 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6668 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6669 {
6670 arelent *p;
6671 long count, i;
6672
b34976b6 6673 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6674 return -1;
eea6121a 6675 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6676 p = s->relocation;
6677 for (i = 0; i < count; i++)
6678 *storage++ = p++;
6679 ret += count;
6680 }
6681 }
6682
6683 *storage = NULL;
6684
6685 return ret;
6686}
6687\f
6688/* Read in the version information. */
6689
b34976b6 6690bfd_boolean
fc0e6df6 6691_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6692{
6693 bfd_byte *contents = NULL;
fc0e6df6
PB
6694 unsigned int freeidx = 0;
6695
6696 if (elf_dynverref (abfd) != 0)
6697 {
6698 Elf_Internal_Shdr *hdr;
6699 Elf_External_Verneed *everneed;
6700 Elf_Internal_Verneed *iverneed;
6701 unsigned int i;
d0fb9a8d 6702 bfd_byte *contents_end;
fc0e6df6
PB
6703
6704 hdr = &elf_tdata (abfd)->dynverref_hdr;
6705
d0fb9a8d
JJ
6706 elf_tdata (abfd)->verref = bfd_zalloc2 (abfd, hdr->sh_info,
6707 sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6708 if (elf_tdata (abfd)->verref == NULL)
6709 goto error_return;
6710
6711 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6712
6713 contents = bfd_malloc (hdr->sh_size);
6714 if (contents == NULL)
d0fb9a8d
JJ
6715 {
6716error_return_verref:
6717 elf_tdata (abfd)->verref = NULL;
6718 elf_tdata (abfd)->cverrefs = 0;
6719 goto error_return;
6720 }
fc0e6df6
PB
6721 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6722 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6723 goto error_return_verref;
fc0e6df6 6724
d0fb9a8d
JJ
6725 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6726 goto error_return_verref;
6727
6728 BFD_ASSERT (sizeof (Elf_External_Verneed)
6729 == sizeof (Elf_External_Vernaux));
6730 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6731 everneed = (Elf_External_Verneed *) contents;
6732 iverneed = elf_tdata (abfd)->verref;
6733 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6734 {
6735 Elf_External_Vernaux *evernaux;
6736 Elf_Internal_Vernaux *ivernaux;
6737 unsigned int j;
6738
6739 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6740
6741 iverneed->vn_bfd = abfd;
6742
6743 iverneed->vn_filename =
6744 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6745 iverneed->vn_file);
6746 if (iverneed->vn_filename == NULL)
d0fb9a8d 6747 goto error_return_verref;
fc0e6df6 6748
d0fb9a8d
JJ
6749 if (iverneed->vn_cnt == 0)
6750 iverneed->vn_auxptr = NULL;
6751 else
6752 {
6753 iverneed->vn_auxptr = bfd_alloc2 (abfd, iverneed->vn_cnt,
6754 sizeof (Elf_Internal_Vernaux));
6755 if (iverneed->vn_auxptr == NULL)
6756 goto error_return_verref;
6757 }
6758
6759 if (iverneed->vn_aux
6760 > (size_t) (contents_end - (bfd_byte *) everneed))
6761 goto error_return_verref;
fc0e6df6
PB
6762
6763 evernaux = ((Elf_External_Vernaux *)
6764 ((bfd_byte *) everneed + iverneed->vn_aux));
6765 ivernaux = iverneed->vn_auxptr;
6766 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6767 {
6768 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6769
6770 ivernaux->vna_nodename =
6771 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6772 ivernaux->vna_name);
6773 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6774 goto error_return_verref;
fc0e6df6
PB
6775
6776 if (j + 1 < iverneed->vn_cnt)
6777 ivernaux->vna_nextptr = ivernaux + 1;
6778 else
6779 ivernaux->vna_nextptr = NULL;
6780
d0fb9a8d
JJ
6781 if (ivernaux->vna_next
6782 > (size_t) (contents_end - (bfd_byte *) evernaux))
6783 goto error_return_verref;
6784
fc0e6df6
PB
6785 evernaux = ((Elf_External_Vernaux *)
6786 ((bfd_byte *) evernaux + ivernaux->vna_next));
6787
6788 if (ivernaux->vna_other > freeidx)
6789 freeidx = ivernaux->vna_other;
6790 }
6791
6792 if (i + 1 < hdr->sh_info)
6793 iverneed->vn_nextref = iverneed + 1;
6794 else
6795 iverneed->vn_nextref = NULL;
6796
d0fb9a8d
JJ
6797 if (iverneed->vn_next
6798 > (size_t) (contents_end - (bfd_byte *) everneed))
6799 goto error_return_verref;
6800
fc0e6df6
PB
6801 everneed = ((Elf_External_Verneed *)
6802 ((bfd_byte *) everneed + iverneed->vn_next));
6803 }
6804
6805 free (contents);
6806 contents = NULL;
6807 }
252b5132
RH
6808
6809 if (elf_dynverdef (abfd) != 0)
6810 {
6811 Elf_Internal_Shdr *hdr;
6812 Elf_External_Verdef *everdef;
6813 Elf_Internal_Verdef *iverdef;
f631889e
UD
6814 Elf_Internal_Verdef *iverdefarr;
6815 Elf_Internal_Verdef iverdefmem;
252b5132 6816 unsigned int i;
062e2358 6817 unsigned int maxidx;
d0fb9a8d 6818 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6819
6820 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6821
217aa764 6822 contents = bfd_malloc (hdr->sh_size);
252b5132
RH
6823 if (contents == NULL)
6824 goto error_return;
6825 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6826 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6827 goto error_return;
6828
d0fb9a8d
JJ
6829 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6830 goto error_return;
6831
6832 BFD_ASSERT (sizeof (Elf_External_Verdef)
6833 >= sizeof (Elf_External_Verdaux));
6834 contents_end_def = contents + hdr->sh_size
6835 - sizeof (Elf_External_Verdef);
6836 contents_end_aux = contents + hdr->sh_size
6837 - sizeof (Elf_External_Verdaux);
6838
f631889e
UD
6839 /* We know the number of entries in the section but not the maximum
6840 index. Therefore we have to run through all entries and find
6841 the maximum. */
252b5132 6842 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6843 maxidx = 0;
6844 for (i = 0; i < hdr->sh_info; ++i)
6845 {
6846 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6847
062e2358
AM
6848 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6849 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6850
d0fb9a8d
JJ
6851 if (iverdefmem.vd_next
6852 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6853 goto error_return;
6854
f631889e
UD
6855 everdef = ((Elf_External_Verdef *)
6856 ((bfd_byte *) everdef + iverdefmem.vd_next));
6857 }
6858
fc0e6df6
PB
6859 if (default_imported_symver)
6860 {
6861 if (freeidx > maxidx)
6862 maxidx = ++freeidx;
6863 else
6864 freeidx = ++maxidx;
6865 }
d0fb9a8d
JJ
6866 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, maxidx,
6867 sizeof (Elf_Internal_Verdef));
f631889e
UD
6868 if (elf_tdata (abfd)->verdef == NULL)
6869 goto error_return;
6870
6871 elf_tdata (abfd)->cverdefs = maxidx;
6872
6873 everdef = (Elf_External_Verdef *) contents;
6874 iverdefarr = elf_tdata (abfd)->verdef;
6875 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6876 {
6877 Elf_External_Verdaux *everdaux;
6878 Elf_Internal_Verdaux *iverdaux;
6879 unsigned int j;
6880
f631889e
UD
6881 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6882
d0fb9a8d
JJ
6883 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6884 {
6885error_return_verdef:
6886 elf_tdata (abfd)->verdef = NULL;
6887 elf_tdata (abfd)->cverdefs = 0;
6888 goto error_return;
6889 }
6890
f631889e
UD
6891 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6892 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6893
6894 iverdef->vd_bfd = abfd;
6895
d0fb9a8d
JJ
6896 if (iverdef->vd_cnt == 0)
6897 iverdef->vd_auxptr = NULL;
6898 else
6899 {
6900 iverdef->vd_auxptr = bfd_alloc2 (abfd, iverdef->vd_cnt,
6901 sizeof (Elf_Internal_Verdaux));
6902 if (iverdef->vd_auxptr == NULL)
6903 goto error_return_verdef;
6904 }
6905
6906 if (iverdef->vd_aux
6907 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6908 goto error_return_verdef;
252b5132
RH
6909
6910 everdaux = ((Elf_External_Verdaux *)
6911 ((bfd_byte *) everdef + iverdef->vd_aux));
6912 iverdaux = iverdef->vd_auxptr;
6913 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6914 {
6915 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6916
6917 iverdaux->vda_nodename =
6918 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6919 iverdaux->vda_name);
6920 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6921 goto error_return_verdef;
252b5132
RH
6922
6923 if (j + 1 < iverdef->vd_cnt)
6924 iverdaux->vda_nextptr = iverdaux + 1;
6925 else
6926 iverdaux->vda_nextptr = NULL;
6927
d0fb9a8d
JJ
6928 if (iverdaux->vda_next
6929 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6930 goto error_return_verdef;
6931
252b5132
RH
6932 everdaux = ((Elf_External_Verdaux *)
6933 ((bfd_byte *) everdaux + iverdaux->vda_next));
6934 }
6935
d0fb9a8d
JJ
6936 if (iverdef->vd_cnt)
6937 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6938
d0fb9a8d 6939 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6940 iverdef->vd_nextdef = iverdef + 1;
6941 else
6942 iverdef->vd_nextdef = NULL;
6943
6944 everdef = ((Elf_External_Verdef *)
6945 ((bfd_byte *) everdef + iverdef->vd_next));
6946 }
6947
6948 free (contents);
6949 contents = NULL;
6950 }
fc0e6df6 6951 else if (default_imported_symver)
252b5132 6952 {
fc0e6df6
PB
6953 if (freeidx < 3)
6954 freeidx = 3;
6955 else
6956 freeidx++;
252b5132 6957
d0fb9a8d
JJ
6958 elf_tdata (abfd)->verdef = bfd_zalloc2 (abfd, freeidx,
6959 sizeof (Elf_Internal_Verdef));
fc0e6df6 6960 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6961 goto error_return;
6962
fc0e6df6
PB
6963 elf_tdata (abfd)->cverdefs = freeidx;
6964 }
252b5132 6965
fc0e6df6
PB
6966 /* Create a default version based on the soname. */
6967 if (default_imported_symver)
6968 {
6969 Elf_Internal_Verdef *iverdef;
6970 Elf_Internal_Verdaux *iverdaux;
252b5132 6971
fc0e6df6 6972 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 6973
fc0e6df6
PB
6974 iverdef->vd_version = VER_DEF_CURRENT;
6975 iverdef->vd_flags = 0;
6976 iverdef->vd_ndx = freeidx;
6977 iverdef->vd_cnt = 1;
252b5132 6978
fc0e6df6 6979 iverdef->vd_bfd = abfd;
252b5132 6980
fc0e6df6
PB
6981 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
6982 if (iverdef->vd_nodename == NULL)
d0fb9a8d 6983 goto error_return_verdef;
fc0e6df6 6984 iverdef->vd_nextdef = NULL;
d0fb9a8d
JJ
6985 iverdef->vd_auxptr = bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
6986 if (iverdef->vd_auxptr == NULL)
6987 goto error_return_verdef;
252b5132 6988
fc0e6df6
PB
6989 iverdaux = iverdef->vd_auxptr;
6990 iverdaux->vda_nodename = iverdef->vd_nodename;
6991 iverdaux->vda_nextptr = NULL;
252b5132
RH
6992 }
6993
b34976b6 6994 return TRUE;
252b5132
RH
6995
6996 error_return:
5ed6aba4 6997 if (contents != NULL)
252b5132 6998 free (contents);
b34976b6 6999 return FALSE;
252b5132
RH
7000}
7001\f
7002asymbol *
217aa764 7003_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7004{
7005 elf_symbol_type *newsym;
dc810e39 7006 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 7007
217aa764 7008 newsym = bfd_zalloc (abfd, amt);
252b5132
RH
7009 if (!newsym)
7010 return NULL;
7011 else
7012 {
7013 newsym->symbol.the_bfd = abfd;
7014 return &newsym->symbol;
7015 }
7016}
7017
7018void
217aa764
AM
7019_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7020 asymbol *symbol,
7021 symbol_info *ret)
252b5132
RH
7022{
7023 bfd_symbol_info (symbol, ret);
7024}
7025
7026/* Return whether a symbol name implies a local symbol. Most targets
7027 use this function for the is_local_label_name entry point, but some
7028 override it. */
7029
b34976b6 7030bfd_boolean
217aa764
AM
7031_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7032 const char *name)
252b5132
RH
7033{
7034 /* Normal local symbols start with ``.L''. */
7035 if (name[0] == '.' && name[1] == 'L')
b34976b6 7036 return TRUE;
252b5132
RH
7037
7038 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7039 DWARF debugging symbols starting with ``..''. */
7040 if (name[0] == '.' && name[1] == '.')
b34976b6 7041 return TRUE;
252b5132
RH
7042
7043 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7044 emitting DWARF debugging output. I suspect this is actually a
7045 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7046 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7047 underscore to be emitted on some ELF targets). For ease of use,
7048 we treat such symbols as local. */
7049 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7050 return TRUE;
252b5132 7051
b34976b6 7052 return FALSE;
252b5132
RH
7053}
7054
7055alent *
217aa764
AM
7056_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7057 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7058{
7059 abort ();
7060 return NULL;
7061}
7062
b34976b6 7063bfd_boolean
217aa764
AM
7064_bfd_elf_set_arch_mach (bfd *abfd,
7065 enum bfd_architecture arch,
7066 unsigned long machine)
252b5132
RH
7067{
7068 /* If this isn't the right architecture for this backend, and this
7069 isn't the generic backend, fail. */
7070 if (arch != get_elf_backend_data (abfd)->arch
7071 && arch != bfd_arch_unknown
7072 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7073 return FALSE;
252b5132
RH
7074
7075 return bfd_default_set_arch_mach (abfd, arch, machine);
7076}
7077
d1fad7c6
NC
7078/* Find the function to a particular section and offset,
7079 for error reporting. */
252b5132 7080
b34976b6 7081static bfd_boolean
217aa764
AM
7082elf_find_function (bfd *abfd ATTRIBUTE_UNUSED,
7083 asection *section,
7084 asymbol **symbols,
7085 bfd_vma offset,
7086 const char **filename_ptr,
7087 const char **functionname_ptr)
252b5132 7088{
252b5132 7089 const char *filename;
57426232 7090 asymbol *func, *file;
252b5132
RH
7091 bfd_vma low_func;
7092 asymbol **p;
57426232
JB
7093 /* ??? Given multiple file symbols, it is impossible to reliably
7094 choose the right file name for global symbols. File symbols are
7095 local symbols, and thus all file symbols must sort before any
7096 global symbols. The ELF spec may be interpreted to say that a
7097 file symbol must sort before other local symbols, but currently
7098 ld -r doesn't do this. So, for ld -r output, it is possible to
7099 make a better choice of file name for local symbols by ignoring
7100 file symbols appearing after a given local symbol. */
7101 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
252b5132 7102
252b5132
RH
7103 filename = NULL;
7104 func = NULL;
57426232 7105 file = NULL;
252b5132 7106 low_func = 0;
57426232 7107 state = nothing_seen;
252b5132
RH
7108
7109 for (p = symbols; *p != NULL; p++)
7110 {
7111 elf_symbol_type *q;
7112
7113 q = (elf_symbol_type *) *p;
7114
252b5132
RH
7115 switch (ELF_ST_TYPE (q->internal_elf_sym.st_info))
7116 {
7117 default:
7118 break;
7119 case STT_FILE:
57426232
JB
7120 file = &q->symbol;
7121 if (state == symbol_seen)
7122 state = file_after_symbol_seen;
7123 continue;
252b5132
RH
7124 case STT_NOTYPE:
7125 case STT_FUNC:
6b40fcba 7126 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7127 && q->symbol.value >= low_func
7128 && q->symbol.value <= offset)
7129 {
7130 func = (asymbol *) q;
7131 low_func = q->symbol.value;
a1923858
AM
7132 filename = NULL;
7133 if (file != NULL
7134 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7135 || state != file_after_symbol_seen))
57426232 7136 filename = bfd_asymbol_name (file);
252b5132
RH
7137 }
7138 break;
7139 }
57426232
JB
7140 if (state == nothing_seen)
7141 state = symbol_seen;
252b5132
RH
7142 }
7143
7144 if (func == NULL)
b34976b6 7145 return FALSE;
252b5132 7146
d1fad7c6
NC
7147 if (filename_ptr)
7148 *filename_ptr = filename;
7149 if (functionname_ptr)
7150 *functionname_ptr = bfd_asymbol_name (func);
7151
b34976b6 7152 return TRUE;
d1fad7c6
NC
7153}
7154
7155/* Find the nearest line to a particular section and offset,
7156 for error reporting. */
7157
b34976b6 7158bfd_boolean
217aa764
AM
7159_bfd_elf_find_nearest_line (bfd *abfd,
7160 asection *section,
7161 asymbol **symbols,
7162 bfd_vma offset,
7163 const char **filename_ptr,
7164 const char **functionname_ptr,
7165 unsigned int *line_ptr)
d1fad7c6 7166{
b34976b6 7167 bfd_boolean found;
d1fad7c6
NC
7168
7169 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7170 filename_ptr, functionname_ptr,
7171 line_ptr))
d1fad7c6
NC
7172 {
7173 if (!*functionname_ptr)
4e8a9624
AM
7174 elf_find_function (abfd, section, symbols, offset,
7175 *filename_ptr ? NULL : filename_ptr,
7176 functionname_ptr);
7177
b34976b6 7178 return TRUE;
d1fad7c6
NC
7179 }
7180
7181 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7182 filename_ptr, functionname_ptr,
7183 line_ptr, 0,
7184 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7185 {
7186 if (!*functionname_ptr)
4e8a9624
AM
7187 elf_find_function (abfd, section, symbols, offset,
7188 *filename_ptr ? NULL : filename_ptr,
7189 functionname_ptr);
7190
b34976b6 7191 return TRUE;
d1fad7c6
NC
7192 }
7193
7194 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7195 &found, filename_ptr,
7196 functionname_ptr, line_ptr,
7197 &elf_tdata (abfd)->line_info))
b34976b6 7198 return FALSE;
dc43ada5 7199 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7200 return TRUE;
d1fad7c6
NC
7201
7202 if (symbols == NULL)
b34976b6 7203 return FALSE;
d1fad7c6
NC
7204
7205 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7206 filename_ptr, functionname_ptr))
b34976b6 7207 return FALSE;
d1fad7c6 7208
252b5132 7209 *line_ptr = 0;
b34976b6 7210 return TRUE;
252b5132
RH
7211}
7212
5420f73d
L
7213/* Find the line for a symbol. */
7214
7215bfd_boolean
7216_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7217 const char **filename_ptr, unsigned int *line_ptr)
7218{
7219 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7220 filename_ptr, line_ptr, 0,
7221 &elf_tdata (abfd)->dwarf2_find_line_info);
7222}
7223
4ab527b0
FF
7224/* After a call to bfd_find_nearest_line, successive calls to
7225 bfd_find_inliner_info can be used to get source information about
7226 each level of function inlining that terminated at the address
7227 passed to bfd_find_nearest_line. Currently this is only supported
7228 for DWARF2 with appropriate DWARF3 extensions. */
7229
7230bfd_boolean
7231_bfd_elf_find_inliner_info (bfd *abfd,
7232 const char **filename_ptr,
7233 const char **functionname_ptr,
7234 unsigned int *line_ptr)
7235{
7236 bfd_boolean found;
7237 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7238 functionname_ptr, line_ptr,
7239 & elf_tdata (abfd)->dwarf2_find_line_info);
7240 return found;
7241}
7242
252b5132 7243int
a6b96beb 7244_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7245{
8ded5a0f
AM
7246 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7247 int ret = bed->s->sizeof_ehdr;
252b5132 7248
a6b96beb 7249 if (!info->relocatable)
8ded5a0f 7250 {
62d7a5f6 7251 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7252
62d7a5f6
AM
7253 if (phdr_size == (bfd_size_type) -1)
7254 {
7255 struct elf_segment_map *m;
7256
7257 phdr_size = 0;
7258 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7259 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7260
62d7a5f6
AM
7261 if (phdr_size == 0)
7262 phdr_size = get_program_header_size (abfd, info);
7263 }
8ded5a0f
AM
7264
7265 elf_tdata (abfd)->program_header_size = phdr_size;
7266 ret += phdr_size;
7267 }
7268
252b5132
RH
7269 return ret;
7270}
7271
b34976b6 7272bfd_boolean
217aa764
AM
7273_bfd_elf_set_section_contents (bfd *abfd,
7274 sec_ptr section,
0f867abe 7275 const void *location,
217aa764
AM
7276 file_ptr offset,
7277 bfd_size_type count)
252b5132
RH
7278{
7279 Elf_Internal_Shdr *hdr;
dc810e39 7280 bfd_signed_vma pos;
252b5132
RH
7281
7282 if (! abfd->output_has_begun
217aa764 7283 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7284 return FALSE;
252b5132
RH
7285
7286 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7287 pos = hdr->sh_offset + offset;
7288 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7289 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7290 return FALSE;
252b5132 7291
b34976b6 7292 return TRUE;
252b5132
RH
7293}
7294
7295void
217aa764
AM
7296_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7297 arelent *cache_ptr ATTRIBUTE_UNUSED,
7298 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7299{
7300 abort ();
7301}
7302
252b5132
RH
7303/* Try to convert a non-ELF reloc into an ELF one. */
7304
b34976b6 7305bfd_boolean
217aa764 7306_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7307{
c044fabd 7308 /* Check whether we really have an ELF howto. */
252b5132
RH
7309
7310 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7311 {
7312 bfd_reloc_code_real_type code;
7313 reloc_howto_type *howto;
7314
7315 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7316 equivalent ELF reloc. */
252b5132
RH
7317
7318 if (areloc->howto->pc_relative)
7319 {
7320 switch (areloc->howto->bitsize)
7321 {
7322 case 8:
7323 code = BFD_RELOC_8_PCREL;
7324 break;
7325 case 12:
7326 code = BFD_RELOC_12_PCREL;
7327 break;
7328 case 16:
7329 code = BFD_RELOC_16_PCREL;
7330 break;
7331 case 24:
7332 code = BFD_RELOC_24_PCREL;
7333 break;
7334 case 32:
7335 code = BFD_RELOC_32_PCREL;
7336 break;
7337 case 64:
7338 code = BFD_RELOC_64_PCREL;
7339 break;
7340 default:
7341 goto fail;
7342 }
7343
7344 howto = bfd_reloc_type_lookup (abfd, code);
7345
7346 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7347 {
7348 if (howto->pcrel_offset)
7349 areloc->addend += areloc->address;
7350 else
7351 areloc->addend -= areloc->address; /* addend is unsigned!! */
7352 }
7353 }
7354 else
7355 {
7356 switch (areloc->howto->bitsize)
7357 {
7358 case 8:
7359 code = BFD_RELOC_8;
7360 break;
7361 case 14:
7362 code = BFD_RELOC_14;
7363 break;
7364 case 16:
7365 code = BFD_RELOC_16;
7366 break;
7367 case 26:
7368 code = BFD_RELOC_26;
7369 break;
7370 case 32:
7371 code = BFD_RELOC_32;
7372 break;
7373 case 64:
7374 code = BFD_RELOC_64;
7375 break;
7376 default:
7377 goto fail;
7378 }
7379
7380 howto = bfd_reloc_type_lookup (abfd, code);
7381 }
7382
7383 if (howto)
7384 areloc->howto = howto;
7385 else
7386 goto fail;
7387 }
7388
b34976b6 7389 return TRUE;
252b5132
RH
7390
7391 fail:
7392 (*_bfd_error_handler)
d003868e
AM
7393 (_("%B: unsupported relocation type %s"),
7394 abfd, areloc->howto->name);
252b5132 7395 bfd_set_error (bfd_error_bad_value);
b34976b6 7396 return FALSE;
252b5132
RH
7397}
7398
b34976b6 7399bfd_boolean
217aa764 7400_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7401{
7402 if (bfd_get_format (abfd) == bfd_object)
7403 {
b25e3d87 7404 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7405 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7406 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7407 }
7408
7409 return _bfd_generic_close_and_cleanup (abfd);
7410}
7411
7412/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7413 in the relocation's offset. Thus we cannot allow any sort of sanity
7414 range-checking to interfere. There is nothing else to do in processing
7415 this reloc. */
7416
7417bfd_reloc_status_type
217aa764
AM
7418_bfd_elf_rel_vtable_reloc_fn
7419 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7420 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7421 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7422 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7423{
7424 return bfd_reloc_ok;
7425}
252b5132
RH
7426\f
7427/* Elf core file support. Much of this only works on native
7428 toolchains, since we rely on knowing the
7429 machine-dependent procfs structure in order to pick
c044fabd 7430 out details about the corefile. */
252b5132
RH
7431
7432#ifdef HAVE_SYS_PROCFS_H
7433# include <sys/procfs.h>
7434#endif
7435
c044fabd 7436/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7437
7438static int
217aa764 7439elfcore_make_pid (bfd *abfd)
252b5132
RH
7440{
7441 return ((elf_tdata (abfd)->core_lwpid << 16)
7442 + (elf_tdata (abfd)->core_pid));
7443}
7444
252b5132
RH
7445/* If there isn't a section called NAME, make one, using
7446 data from SECT. Note, this function will generate a
7447 reference to NAME, so you shouldn't deallocate or
c044fabd 7448 overwrite it. */
252b5132 7449
b34976b6 7450static bfd_boolean
217aa764 7451elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7452{
c044fabd 7453 asection *sect2;
252b5132
RH
7454
7455 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7456 return TRUE;
252b5132 7457
117ed4f8 7458 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7459 if (sect2 == NULL)
b34976b6 7460 return FALSE;
252b5132 7461
eea6121a 7462 sect2->size = sect->size;
252b5132 7463 sect2->filepos = sect->filepos;
252b5132 7464 sect2->alignment_power = sect->alignment_power;
b34976b6 7465 return TRUE;
252b5132
RH
7466}
7467
bb0082d6
AM
7468/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7469 actually creates up to two pseudosections:
7470 - For the single-threaded case, a section named NAME, unless
7471 such a section already exists.
7472 - For the multi-threaded case, a section named "NAME/PID", where
7473 PID is elfcore_make_pid (abfd).
7474 Both pseudosections have identical contents. */
b34976b6 7475bfd_boolean
217aa764
AM
7476_bfd_elfcore_make_pseudosection (bfd *abfd,
7477 char *name,
7478 size_t size,
7479 ufile_ptr filepos)
bb0082d6
AM
7480{
7481 char buf[100];
7482 char *threaded_name;
d4c88bbb 7483 size_t len;
bb0082d6
AM
7484 asection *sect;
7485
7486 /* Build the section name. */
7487
7488 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7489 len = strlen (buf) + 1;
217aa764 7490 threaded_name = bfd_alloc (abfd, len);
bb0082d6 7491 if (threaded_name == NULL)
b34976b6 7492 return FALSE;
d4c88bbb 7493 memcpy (threaded_name, buf, len);
bb0082d6 7494
117ed4f8
AM
7495 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7496 SEC_HAS_CONTENTS);
bb0082d6 7497 if (sect == NULL)
b34976b6 7498 return FALSE;
eea6121a 7499 sect->size = size;
bb0082d6 7500 sect->filepos = filepos;
bb0082d6
AM
7501 sect->alignment_power = 2;
7502
936e320b 7503 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7504}
7505
252b5132 7506/* prstatus_t exists on:
4a938328 7507 solaris 2.5+
252b5132
RH
7508 linux 2.[01] + glibc
7509 unixware 4.2
7510*/
7511
7512#if defined (HAVE_PRSTATUS_T)
a7b97311 7513
b34976b6 7514static bfd_boolean
217aa764 7515elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7516{
eea6121a 7517 size_t size;
7ee38065 7518 int offset;
252b5132 7519
4a938328
MS
7520 if (note->descsz == sizeof (prstatus_t))
7521 {
7522 prstatus_t prstat;
252b5132 7523
eea6121a 7524 size = sizeof (prstat.pr_reg);
7ee38065 7525 offset = offsetof (prstatus_t, pr_reg);
4a938328 7526 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7527
fa49d224
NC
7528 /* Do not overwrite the core signal if it
7529 has already been set by another thread. */
7530 if (elf_tdata (abfd)->core_signal == 0)
7531 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7532 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7533
4a938328
MS
7534 /* pr_who exists on:
7535 solaris 2.5+
7536 unixware 4.2
7537 pr_who doesn't exist on:
7538 linux 2.[01]
7539 */
252b5132 7540#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7541 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7542#endif
4a938328 7543 }
7ee38065 7544#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7545 else if (note->descsz == sizeof (prstatus32_t))
7546 {
7547 /* 64-bit host, 32-bit corefile */
7548 prstatus32_t prstat;
7549
eea6121a 7550 size = sizeof (prstat.pr_reg);
7ee38065 7551 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7552 memcpy (&prstat, note->descdata, sizeof (prstat));
7553
fa49d224
NC
7554 /* Do not overwrite the core signal if it
7555 has already been set by another thread. */
7556 if (elf_tdata (abfd)->core_signal == 0)
7557 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7558 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7559
7560 /* pr_who exists on:
7561 solaris 2.5+
7562 unixware 4.2
7563 pr_who doesn't exist on:
7564 linux 2.[01]
7565 */
7ee38065 7566#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7567 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7568#endif
7569 }
7ee38065 7570#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7571 else
7572 {
7573 /* Fail - we don't know how to handle any other
7574 note size (ie. data object type). */
b34976b6 7575 return TRUE;
4a938328 7576 }
252b5132 7577
bb0082d6 7578 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7579 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7580 size, note->descpos + offset);
252b5132
RH
7581}
7582#endif /* defined (HAVE_PRSTATUS_T) */
7583
bb0082d6 7584/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7585static bfd_boolean
217aa764
AM
7586elfcore_make_note_pseudosection (bfd *abfd,
7587 char *name,
7588 Elf_Internal_Note *note)
252b5132 7589{
936e320b
AM
7590 return _bfd_elfcore_make_pseudosection (abfd, name,
7591 note->descsz, note->descpos);
252b5132
RH
7592}
7593
ff08c6bb
JB
7594/* There isn't a consistent prfpregset_t across platforms,
7595 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7596 data structure apart. */
7597
b34976b6 7598static bfd_boolean
217aa764 7599elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7600{
7601 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7602}
7603
ff08c6bb 7604/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 7605 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 7606 literally. */
c044fabd 7607
b34976b6 7608static bfd_boolean
217aa764 7609elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7610{
7611 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7612}
7613
97753bd5
AM
7614static bfd_boolean
7615elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
7616{
7617 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
7618}
7619
89eeb0bc
LM
7620static bfd_boolean
7621elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
7622{
7623 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
7624}
97753bd5 7625
252b5132 7626#if defined (HAVE_PRPSINFO_T)
4a938328 7627typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7628#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7629typedef prpsinfo32_t elfcore_psinfo32_t;
7630#endif
252b5132
RH
7631#endif
7632
7633#if defined (HAVE_PSINFO_T)
4a938328 7634typedef psinfo_t elfcore_psinfo_t;
7ee38065 7635#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7636typedef psinfo32_t elfcore_psinfo32_t;
7637#endif
252b5132
RH
7638#endif
7639
252b5132
RH
7640/* return a malloc'ed copy of a string at START which is at
7641 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7642 the copy will always have a terminating '\0'. */
252b5132 7643
936e320b 7644char *
217aa764 7645_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7646{
dc810e39 7647 char *dups;
c044fabd 7648 char *end = memchr (start, '\0', max);
dc810e39 7649 size_t len;
252b5132
RH
7650
7651 if (end == NULL)
7652 len = max;
7653 else
7654 len = end - start;
7655
217aa764 7656 dups = bfd_alloc (abfd, len + 1);
dc810e39 7657 if (dups == NULL)
252b5132
RH
7658 return NULL;
7659
dc810e39
AM
7660 memcpy (dups, start, len);
7661 dups[len] = '\0';
252b5132 7662
dc810e39 7663 return dups;
252b5132
RH
7664}
7665
bb0082d6 7666#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7667static bfd_boolean
217aa764 7668elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7669{
4a938328
MS
7670 if (note->descsz == sizeof (elfcore_psinfo_t))
7671 {
7672 elfcore_psinfo_t psinfo;
252b5132 7673
7ee38065 7674 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7675
4a938328 7676 elf_tdata (abfd)->core_program
936e320b
AM
7677 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7678 sizeof (psinfo.pr_fname));
252b5132 7679
4a938328 7680 elf_tdata (abfd)->core_command
936e320b
AM
7681 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7682 sizeof (psinfo.pr_psargs));
4a938328 7683 }
7ee38065 7684#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7685 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7686 {
7687 /* 64-bit host, 32-bit corefile */
7688 elfcore_psinfo32_t psinfo;
7689
7ee38065 7690 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7691
4a938328 7692 elf_tdata (abfd)->core_program
936e320b
AM
7693 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7694 sizeof (psinfo.pr_fname));
4a938328
MS
7695
7696 elf_tdata (abfd)->core_command
936e320b
AM
7697 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7698 sizeof (psinfo.pr_psargs));
4a938328
MS
7699 }
7700#endif
7701
7702 else
7703 {
7704 /* Fail - we don't know how to handle any other
7705 note size (ie. data object type). */
b34976b6 7706 return TRUE;
4a938328 7707 }
252b5132
RH
7708
7709 /* Note that for some reason, a spurious space is tacked
7710 onto the end of the args in some (at least one anyway)
c044fabd 7711 implementations, so strip it off if it exists. */
252b5132
RH
7712
7713 {
c044fabd 7714 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7715 int n = strlen (command);
7716
7717 if (0 < n && command[n - 1] == ' ')
7718 command[n - 1] = '\0';
7719 }
7720
b34976b6 7721 return TRUE;
252b5132
RH
7722}
7723#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7724
252b5132 7725#if defined (HAVE_PSTATUS_T)
b34976b6 7726static bfd_boolean
217aa764 7727elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7728{
f572a39d
AM
7729 if (note->descsz == sizeof (pstatus_t)
7730#if defined (HAVE_PXSTATUS_T)
7731 || note->descsz == sizeof (pxstatus_t)
7732#endif
7733 )
4a938328
MS
7734 {
7735 pstatus_t pstat;
252b5132 7736
4a938328 7737 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7738
4a938328
MS
7739 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7740 }
7ee38065 7741#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7742 else if (note->descsz == sizeof (pstatus32_t))
7743 {
7744 /* 64-bit host, 32-bit corefile */
7745 pstatus32_t pstat;
252b5132 7746
4a938328 7747 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7748
4a938328
MS
7749 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7750 }
7751#endif
252b5132
RH
7752 /* Could grab some more details from the "representative"
7753 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7754 NT_LWPSTATUS note, presumably. */
252b5132 7755
b34976b6 7756 return TRUE;
252b5132
RH
7757}
7758#endif /* defined (HAVE_PSTATUS_T) */
7759
252b5132 7760#if defined (HAVE_LWPSTATUS_T)
b34976b6 7761static bfd_boolean
217aa764 7762elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7763{
7764 lwpstatus_t lwpstat;
7765 char buf[100];
c044fabd 7766 char *name;
d4c88bbb 7767 size_t len;
c044fabd 7768 asection *sect;
252b5132 7769
f572a39d
AM
7770 if (note->descsz != sizeof (lwpstat)
7771#if defined (HAVE_LWPXSTATUS_T)
7772 && note->descsz != sizeof (lwpxstatus_t)
7773#endif
7774 )
b34976b6 7775 return TRUE;
252b5132
RH
7776
7777 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7778
7779 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
7780 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
7781
c044fabd 7782 /* Make a ".reg/999" section. */
252b5132
RH
7783
7784 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7785 len = strlen (buf) + 1;
217aa764 7786 name = bfd_alloc (abfd, len);
252b5132 7787 if (name == NULL)
b34976b6 7788 return FALSE;
d4c88bbb 7789 memcpy (name, buf, len);
252b5132 7790
117ed4f8 7791 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7792 if (sect == NULL)
b34976b6 7793 return FALSE;
252b5132
RH
7794
7795#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7796 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7797 sect->filepos = note->descpos
7798 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7799#endif
7800
7801#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7802 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7803 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7804#endif
7805
252b5132
RH
7806 sect->alignment_power = 2;
7807
7808 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7809 return FALSE;
252b5132
RH
7810
7811 /* Make a ".reg2/999" section */
7812
7813 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7814 len = strlen (buf) + 1;
217aa764 7815 name = bfd_alloc (abfd, len);
252b5132 7816 if (name == NULL)
b34976b6 7817 return FALSE;
d4c88bbb 7818 memcpy (name, buf, len);
252b5132 7819
117ed4f8 7820 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7821 if (sect == NULL)
b34976b6 7822 return FALSE;
252b5132
RH
7823
7824#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7825 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7826 sect->filepos = note->descpos
7827 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7828#endif
7829
7830#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7831 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7832 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7833#endif
7834
252b5132
RH
7835 sect->alignment_power = 2;
7836
936e320b 7837 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7838}
7839#endif /* defined (HAVE_LWPSTATUS_T) */
7840
b34976b6 7841static bfd_boolean
217aa764 7842elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7843{
7844 char buf[30];
c044fabd 7845 char *name;
d4c88bbb 7846 size_t len;
c044fabd 7847 asection *sect;
4a6636fb
PA
7848 int type;
7849 int is_active_thread;
7850 bfd_vma base_addr;
16e9c715 7851
4a6636fb 7852 if (note->descsz < 728)
b34976b6 7853 return TRUE;
16e9c715 7854
4a6636fb
PA
7855 if (! CONST_STRNEQ (note->namedata, "win32"))
7856 return TRUE;
7857
7858 type = bfd_get_32 (abfd, note->descdata);
c044fabd 7859
4a6636fb 7860 switch (type)
16e9c715 7861 {
4a6636fb 7862 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 7863 /* FIXME: need to add ->core_command. */
4a6636fb
PA
7864 /* process_info.pid */
7865 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
7866 /* process_info.signal */
7867 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 7868 break;
16e9c715 7869
4a6636fb 7870 case 2 /* NOTE_INFO_THREAD */:
16e9c715 7871 /* Make a ".reg/999" section. */
4a6636fb
PA
7872 /* thread_info.tid */
7873 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 7874
d4c88bbb 7875 len = strlen (buf) + 1;
217aa764 7876 name = bfd_alloc (abfd, len);
16e9c715 7877 if (name == NULL)
b34976b6 7878 return FALSE;
c044fabd 7879
d4c88bbb 7880 memcpy (name, buf, len);
16e9c715 7881
117ed4f8 7882 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 7883 if (sect == NULL)
b34976b6 7884 return FALSE;
c044fabd 7885
4a6636fb
PA
7886 /* sizeof (thread_info.thread_context) */
7887 sect->size = 716;
7888 /* offsetof (thread_info.thread_context) */
7889 sect->filepos = note->descpos + 12;
16e9c715
NC
7890 sect->alignment_power = 2;
7891
4a6636fb
PA
7892 /* thread_info.is_active_thread */
7893 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
7894
7895 if (is_active_thread)
16e9c715 7896 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7897 return FALSE;
16e9c715
NC
7898 break;
7899
4a6636fb 7900 case 3 /* NOTE_INFO_MODULE */:
16e9c715 7901 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
7902 /* module_info.base_address */
7903 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 7904 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 7905
d4c88bbb 7906 len = strlen (buf) + 1;
217aa764 7907 name = bfd_alloc (abfd, len);
16e9c715 7908 if (name == NULL)
b34976b6 7909 return FALSE;
c044fabd 7910
d4c88bbb 7911 memcpy (name, buf, len);
252b5132 7912
117ed4f8 7913 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 7914
16e9c715 7915 if (sect == NULL)
b34976b6 7916 return FALSE;
c044fabd 7917
eea6121a 7918 sect->size = note->descsz;
16e9c715 7919 sect->filepos = note->descpos;
16e9c715
NC
7920 sect->alignment_power = 2;
7921 break;
7922
7923 default:
b34976b6 7924 return TRUE;
16e9c715
NC
7925 }
7926
b34976b6 7927 return TRUE;
16e9c715 7928}
252b5132 7929
b34976b6 7930static bfd_boolean
217aa764 7931elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 7932{
9c5bfbb7 7933 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 7934
252b5132
RH
7935 switch (note->type)
7936 {
7937 default:
b34976b6 7938 return TRUE;
252b5132 7939
252b5132 7940 case NT_PRSTATUS:
bb0082d6
AM
7941 if (bed->elf_backend_grok_prstatus)
7942 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 7943 return TRUE;
bb0082d6 7944#if defined (HAVE_PRSTATUS_T)
252b5132 7945 return elfcore_grok_prstatus (abfd, note);
bb0082d6 7946#else
b34976b6 7947 return TRUE;
252b5132
RH
7948#endif
7949
7950#if defined (HAVE_PSTATUS_T)
7951 case NT_PSTATUS:
7952 return elfcore_grok_pstatus (abfd, note);
7953#endif
7954
7955#if defined (HAVE_LWPSTATUS_T)
7956 case NT_LWPSTATUS:
7957 return elfcore_grok_lwpstatus (abfd, note);
7958#endif
7959
7960 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
7961 return elfcore_grok_prfpreg (abfd, note);
7962
c044fabd 7963 case NT_WIN32PSTATUS:
16e9c715 7964 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 7965
c044fabd 7966 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
7967 if (note->namesz == 6
7968 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
7969 return elfcore_grok_prxfpreg (abfd, note);
7970 else
b34976b6 7971 return TRUE;
ff08c6bb 7972
97753bd5
AM
7973 case NT_PPC_VMX:
7974 if (note->namesz == 6
7975 && strcmp (note->namedata, "LINUX") == 0)
7976 return elfcore_grok_ppc_vmx (abfd, note);
7977 else
7978 return TRUE;
7979
89eeb0bc
LM
7980 case NT_PPC_VSX:
7981 if (note->namesz == 6
7982 && strcmp (note->namedata, "LINUX") == 0)
7983 return elfcore_grok_ppc_vsx (abfd, note);
7984 else
7985 return TRUE;
7986
252b5132
RH
7987 case NT_PRPSINFO:
7988 case NT_PSINFO:
bb0082d6
AM
7989 if (bed->elf_backend_grok_psinfo)
7990 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 7991 return TRUE;
bb0082d6 7992#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 7993 return elfcore_grok_psinfo (abfd, note);
bb0082d6 7994#else
b34976b6 7995 return TRUE;
252b5132 7996#endif
3333a7c3
RM
7997
7998 case NT_AUXV:
7999 {
117ed4f8
AM
8000 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8001 SEC_HAS_CONTENTS);
3333a7c3
RM
8002
8003 if (sect == NULL)
8004 return FALSE;
eea6121a 8005 sect->size = note->descsz;
3333a7c3 8006 sect->filepos = note->descpos;
3333a7c3
RM
8007 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8008
8009 return TRUE;
8010 }
252b5132
RH
8011 }
8012}
8013
718175fa
JK
8014static bfd_boolean
8015elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8016{
8017 elf_tdata (abfd)->build_id_size = note->descsz;
8018 elf_tdata (abfd)->build_id = bfd_alloc (abfd, note->descsz);
8019 if (elf_tdata (abfd)->build_id == NULL)
8020 return FALSE;
8021
8022 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
8023
8024 return TRUE;
8025}
8026
8027static bfd_boolean
8028elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8029{
8030 switch (note->type)
8031 {
8032 default:
8033 return TRUE;
8034
8035 case NT_GNU_BUILD_ID:
8036 return elfobj_grok_gnu_build_id (abfd, note);
8037 }
8038}
8039
b34976b6 8040static bfd_boolean
217aa764 8041elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8042{
8043 char *cp;
8044
8045 cp = strchr (note->namedata, '@');
8046 if (cp != NULL)
8047 {
d2b64500 8048 *lwpidp = atoi(cp + 1);
b34976b6 8049 return TRUE;
50b2bdb7 8050 }
b34976b6 8051 return FALSE;
50b2bdb7
AM
8052}
8053
b34976b6 8054static bfd_boolean
217aa764 8055elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8056{
50b2bdb7
AM
8057 /* Signal number at offset 0x08. */
8058 elf_tdata (abfd)->core_signal
8059 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8060
8061 /* Process ID at offset 0x50. */
8062 elf_tdata (abfd)->core_pid
8063 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8064
8065 /* Command name at 0x7c (max 32 bytes, including nul). */
8066 elf_tdata (abfd)->core_command
8067 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8068
7720ba9f
MK
8069 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8070 note);
50b2bdb7
AM
8071}
8072
b34976b6 8073static bfd_boolean
217aa764 8074elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8075{
8076 int lwp;
8077
8078 if (elfcore_netbsd_get_lwpid (note, &lwp))
8079 elf_tdata (abfd)->core_lwpid = lwp;
8080
b4db1224 8081 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8082 {
8083 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8084 find this note before any of the others, which is fine,
8085 since the kernel writes this note out first when it
8086 creates a core file. */
47d9a591 8087
50b2bdb7
AM
8088 return elfcore_grok_netbsd_procinfo (abfd, note);
8089 }
8090
b4db1224
JT
8091 /* As of Jan 2002 there are no other machine-independent notes
8092 defined for NetBSD core files. If the note type is less
8093 than the start of the machine-dependent note types, we don't
8094 understand it. */
47d9a591 8095
b4db1224 8096 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8097 return TRUE;
50b2bdb7
AM
8098
8099
8100 switch (bfd_get_arch (abfd))
8101 {
08a40648
AM
8102 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8103 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8104
8105 case bfd_arch_alpha:
8106 case bfd_arch_sparc:
8107 switch (note->type)
08a40648
AM
8108 {
8109 case NT_NETBSDCORE_FIRSTMACH+0:
8110 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8111
08a40648
AM
8112 case NT_NETBSDCORE_FIRSTMACH+2:
8113 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8114
08a40648
AM
8115 default:
8116 return TRUE;
8117 }
50b2bdb7 8118
08a40648
AM
8119 /* On all other arch's, PT_GETREGS == mach+1 and
8120 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8121
8122 default:
8123 switch (note->type)
08a40648
AM
8124 {
8125 case NT_NETBSDCORE_FIRSTMACH+1:
8126 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8127
08a40648
AM
8128 case NT_NETBSDCORE_FIRSTMACH+3:
8129 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8130
08a40648
AM
8131 default:
8132 return TRUE;
8133 }
50b2bdb7
AM
8134 }
8135 /* NOTREACHED */
8136}
8137
07c6e936 8138static bfd_boolean
d3fd4074 8139elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8140{
8141 void *ddata = note->descdata;
8142 char buf[100];
8143 char *name;
8144 asection *sect;
f8843e87
AM
8145 short sig;
8146 unsigned flags;
07c6e936
NC
8147
8148 /* nto_procfs_status 'pid' field is at offset 0. */
8149 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8150
f8843e87
AM
8151 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8152 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8153
8154 /* nto_procfs_status 'flags' field is at offset 8. */
8155 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8156
8157 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8158 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8159 {
8160 elf_tdata (abfd)->core_signal = sig;
8161 elf_tdata (abfd)->core_lwpid = *tid;
8162 }
07c6e936 8163
f8843e87
AM
8164 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8165 do not come from signals so we make sure we set the current
8166 thread just in case. */
8167 if (flags & 0x00000080)
8168 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8169
8170 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8171 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8172
217aa764 8173 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8174 if (name == NULL)
8175 return FALSE;
8176 strcpy (name, buf);
8177
117ed4f8 8178 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8179 if (sect == NULL)
8180 return FALSE;
8181
eea6121a 8182 sect->size = note->descsz;
07c6e936 8183 sect->filepos = note->descpos;
07c6e936
NC
8184 sect->alignment_power = 2;
8185
8186 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8187}
8188
8189static bfd_boolean
d69f560c
KW
8190elfcore_grok_nto_regs (bfd *abfd,
8191 Elf_Internal_Note *note,
d3fd4074 8192 long tid,
d69f560c 8193 char *base)
07c6e936
NC
8194{
8195 char buf[100];
8196 char *name;
8197 asection *sect;
8198
d69f560c 8199 /* Make a "(base)/%d" section. */
d3fd4074 8200 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8201
217aa764 8202 name = bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8203 if (name == NULL)
8204 return FALSE;
8205 strcpy (name, buf);
8206
117ed4f8 8207 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8208 if (sect == NULL)
8209 return FALSE;
8210
eea6121a 8211 sect->size = note->descsz;
07c6e936 8212 sect->filepos = note->descpos;
07c6e936
NC
8213 sect->alignment_power = 2;
8214
f8843e87
AM
8215 /* This is the current thread. */
8216 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8217 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8218
8219 return TRUE;
07c6e936
NC
8220}
8221
8222#define BFD_QNT_CORE_INFO 7
8223#define BFD_QNT_CORE_STATUS 8
8224#define BFD_QNT_CORE_GREG 9
8225#define BFD_QNT_CORE_FPREG 10
8226
8227static bfd_boolean
217aa764 8228elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8229{
8230 /* Every GREG section has a STATUS section before it. Store the
811072d8 8231 tid from the previous call to pass down to the next gregs
07c6e936 8232 function. */
d3fd4074 8233 static long tid = 1;
07c6e936
NC
8234
8235 switch (note->type)
8236 {
d69f560c
KW
8237 case BFD_QNT_CORE_INFO:
8238 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8239 case BFD_QNT_CORE_STATUS:
8240 return elfcore_grok_nto_status (abfd, note, &tid);
8241 case BFD_QNT_CORE_GREG:
8242 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8243 case BFD_QNT_CORE_FPREG:
8244 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8245 default:
8246 return TRUE;
07c6e936
NC
8247 }
8248}
8249
b15fa79e
AM
8250static bfd_boolean
8251elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8252{
8253 char *name;
8254 asection *sect;
8255 size_t len;
8256
8257 /* Use note name as section name. */
8258 len = note->namesz;
8259 name = bfd_alloc (abfd, len);
8260 if (name == NULL)
8261 return FALSE;
8262 memcpy (name, note->namedata, len);
8263 name[len - 1] = '\0';
8264
8265 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8266 if (sect == NULL)
8267 return FALSE;
8268
8269 sect->size = note->descsz;
8270 sect->filepos = note->descpos;
8271 sect->alignment_power = 1;
8272
8273 return TRUE;
8274}
8275
7c76fa91
MS
8276/* Function: elfcore_write_note
8277
47d9a591 8278 Inputs:
a39f3346 8279 buffer to hold note, and current size of buffer
7c76fa91
MS
8280 name of note
8281 type of note
8282 data for note
8283 size of data for note
8284
a39f3346
AM
8285 Writes note to end of buffer. ELF64 notes are written exactly as
8286 for ELF32, despite the current (as of 2006) ELF gabi specifying
8287 that they ought to have 8-byte namesz and descsz field, and have
8288 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8289
7c76fa91 8290 Return:
a39f3346 8291 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8292
8293char *
a39f3346 8294elfcore_write_note (bfd *abfd,
217aa764 8295 char *buf,
a39f3346 8296 int *bufsiz,
217aa764 8297 const char *name,
a39f3346 8298 int type,
217aa764 8299 const void *input,
a39f3346 8300 int size)
7c76fa91
MS
8301{
8302 Elf_External_Note *xnp;
d4c88bbb 8303 size_t namesz;
d4c88bbb 8304 size_t newspace;
a39f3346 8305 char *dest;
7c76fa91 8306
d4c88bbb 8307 namesz = 0;
d4c88bbb 8308 if (name != NULL)
a39f3346 8309 namesz = strlen (name) + 1;
d4c88bbb 8310
a39f3346 8311 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 8312
a39f3346 8313 buf = realloc (buf, *bufsiz + newspace);
14b1c01e
AM
8314 if (buf == NULL)
8315 return buf;
a39f3346 8316 dest = buf + *bufsiz;
7c76fa91
MS
8317 *bufsiz += newspace;
8318 xnp = (Elf_External_Note *) dest;
8319 H_PUT_32 (abfd, namesz, xnp->namesz);
8320 H_PUT_32 (abfd, size, xnp->descsz);
8321 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8322 dest = xnp->name;
8323 if (name != NULL)
8324 {
8325 memcpy (dest, name, namesz);
8326 dest += namesz;
a39f3346 8327 while (namesz & 3)
d4c88bbb
AM
8328 {
8329 *dest++ = '\0';
a39f3346 8330 ++namesz;
d4c88bbb
AM
8331 }
8332 }
8333 memcpy (dest, input, size);
a39f3346
AM
8334 dest += size;
8335 while (size & 3)
8336 {
8337 *dest++ = '\0';
8338 ++size;
8339 }
8340 return buf;
7c76fa91
MS
8341}
8342
8343#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8344char *
217aa764
AM
8345elfcore_write_prpsinfo (bfd *abfd,
8346 char *buf,
8347 int *bufsiz,
8348 const char *fname,
8349 const char *psargs)
7c76fa91 8350{
183e98be
AM
8351 const char *note_name = "CORE";
8352 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8353
8354 if (bed->elf_backend_write_core_note != NULL)
8355 {
8356 char *ret;
8357 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8358 NT_PRPSINFO, fname, psargs);
8359 if (ret != NULL)
8360 return ret;
8361 }
7c76fa91 8362
183e98be
AM
8363#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
8364 if (bed->s->elfclass == ELFCLASS32)
8365 {
8366#if defined (HAVE_PSINFO32_T)
8367 psinfo32_t data;
8368 int note_type = NT_PSINFO;
8369#else
8370 prpsinfo32_t data;
8371 int note_type = NT_PRPSINFO;
8372#endif
8373
8374 memset (&data, 0, sizeof (data));
8375 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8376 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8377 return elfcore_write_note (abfd, buf, bufsiz,
8378 note_name, note_type, &data, sizeof (data));
8379 }
8380 else
8381#endif
8382 {
7c76fa91 8383#if defined (HAVE_PSINFO_T)
183e98be
AM
8384 psinfo_t data;
8385 int note_type = NT_PSINFO;
7c76fa91 8386#else
183e98be
AM
8387 prpsinfo_t data;
8388 int note_type = NT_PRPSINFO;
7c76fa91
MS
8389#endif
8390
183e98be
AM
8391 memset (&data, 0, sizeof (data));
8392 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8393 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8394 return elfcore_write_note (abfd, buf, bufsiz,
8395 note_name, note_type, &data, sizeof (data));
8396 }
7c76fa91
MS
8397}
8398#endif /* PSINFO_T or PRPSINFO_T */
8399
8400#if defined (HAVE_PRSTATUS_T)
8401char *
217aa764
AM
8402elfcore_write_prstatus (bfd *abfd,
8403 char *buf,
8404 int *bufsiz,
8405 long pid,
8406 int cursig,
8407 const void *gregs)
7c76fa91 8408{
183e98be
AM
8409 const char *note_name = "CORE";
8410 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8411
183e98be
AM
8412 if (bed->elf_backend_write_core_note != NULL)
8413 {
8414 char *ret;
8415 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8416 NT_PRSTATUS,
8417 pid, cursig, gregs);
8418 if (ret != NULL)
8419 return ret;
8420 }
8421
8422#if defined (HAVE_PRSTATUS32_T)
8423 if (bed->s->elfclass == ELFCLASS32)
8424 {
8425 prstatus32_t prstat;
8426
8427 memset (&prstat, 0, sizeof (prstat));
8428 prstat.pr_pid = pid;
8429 prstat.pr_cursig = cursig;
8430 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8431 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8432 NT_PRSTATUS, &prstat, sizeof (prstat));
8433 }
8434 else
8435#endif
8436 {
8437 prstatus_t prstat;
8438
8439 memset (&prstat, 0, sizeof (prstat));
8440 prstat.pr_pid = pid;
8441 prstat.pr_cursig = cursig;
8442 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8443 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8444 NT_PRSTATUS, &prstat, sizeof (prstat));
8445 }
7c76fa91
MS
8446}
8447#endif /* HAVE_PRSTATUS_T */
8448
51316059
MS
8449#if defined (HAVE_LWPSTATUS_T)
8450char *
217aa764
AM
8451elfcore_write_lwpstatus (bfd *abfd,
8452 char *buf,
8453 int *bufsiz,
8454 long pid,
8455 int cursig,
8456 const void *gregs)
51316059
MS
8457{
8458 lwpstatus_t lwpstat;
183e98be 8459 const char *note_name = "CORE";
51316059
MS
8460
8461 memset (&lwpstat, 0, sizeof (lwpstat));
8462 lwpstat.pr_lwpid = pid >> 16;
8463 lwpstat.pr_cursig = cursig;
8464#if defined (HAVE_LWPSTATUS_T_PR_REG)
8465 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8466#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8467#if !defined(gregs)
8468 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8469 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8470#else
8471 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8472 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8473#endif
8474#endif
47d9a591 8475 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8476 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8477}
8478#endif /* HAVE_LWPSTATUS_T */
8479
7c76fa91
MS
8480#if defined (HAVE_PSTATUS_T)
8481char *
217aa764
AM
8482elfcore_write_pstatus (bfd *abfd,
8483 char *buf,
8484 int *bufsiz,
8485 long pid,
6c10990d
NC
8486 int cursig ATTRIBUTE_UNUSED,
8487 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 8488{
183e98be
AM
8489 const char *note_name = "CORE";
8490#if defined (HAVE_PSTATUS32_T)
8491 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8492
183e98be
AM
8493 if (bed->s->elfclass == ELFCLASS32)
8494 {
8495 pstatus32_t pstat;
8496
8497 memset (&pstat, 0, sizeof (pstat));
8498 pstat.pr_pid = pid & 0xffff;
8499 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8500 NT_PSTATUS, &pstat, sizeof (pstat));
8501 return buf;
8502 }
8503 else
8504#endif
8505 {
8506 pstatus_t pstat;
8507
8508 memset (&pstat, 0, sizeof (pstat));
8509 pstat.pr_pid = pid & 0xffff;
8510 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8511 NT_PSTATUS, &pstat, sizeof (pstat));
8512 return buf;
8513 }
7c76fa91
MS
8514}
8515#endif /* HAVE_PSTATUS_T */
8516
8517char *
217aa764
AM
8518elfcore_write_prfpreg (bfd *abfd,
8519 char *buf,
8520 int *bufsiz,
8521 const void *fpregs,
8522 int size)
7c76fa91 8523{
183e98be 8524 const char *note_name = "CORE";
47d9a591 8525 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8526 note_name, NT_FPREGSET, fpregs, size);
8527}
8528
8529char *
217aa764
AM
8530elfcore_write_prxfpreg (bfd *abfd,
8531 char *buf,
8532 int *bufsiz,
8533 const void *xfpregs,
8534 int size)
7c76fa91
MS
8535{
8536 char *note_name = "LINUX";
47d9a591 8537 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8538 note_name, NT_PRXFPREG, xfpregs, size);
8539}
8540
97753bd5
AM
8541char *
8542elfcore_write_ppc_vmx (bfd *abfd,
8543 char *buf,
8544 int *bufsiz,
8545 const void *ppc_vmx,
8546 int size)
8547{
8548 char *note_name = "LINUX";
8549 return elfcore_write_note (abfd, buf, bufsiz,
8550 note_name, NT_PPC_VMX, ppc_vmx, size);
8551}
8552
89eeb0bc
LM
8553char *
8554elfcore_write_ppc_vsx (bfd *abfd,
8555 char *buf,
8556 int *bufsiz,
8557 const void *ppc_vsx,
8558 int size)
8559{
8560 char *note_name = "LINUX";
8561 return elfcore_write_note (abfd, buf, bufsiz,
8562 note_name, NT_PPC_VSX, ppc_vsx, size);
8563}
8564
bb864ac1
CES
8565char *
8566elfcore_write_register_note (bfd *abfd,
8567 char *buf,
8568 int *bufsiz,
8569 const char *section,
8570 const void *data,
8571 int size)
8572{
8573 if (strcmp (section, ".reg2") == 0)
8574 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
8575 if (strcmp (section, ".reg-xfp") == 0)
8576 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
8577 if (strcmp (section, ".reg-ppc-vmx") == 0)
8578 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
8579 if (strcmp (section, ".reg-ppc-vsx") == 0)
8580 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
bb864ac1
CES
8581 return NULL;
8582}
8583
b34976b6 8584static bfd_boolean
718175fa 8585elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 8586{
c044fabd 8587 char *p;
252b5132 8588
252b5132
RH
8589 p = buf;
8590 while (p < buf + size)
8591 {
c044fabd
KH
8592 /* FIXME: bad alignment assumption. */
8593 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8594 Elf_Internal_Note in;
8595
baea7ef1
AM
8596 if (offsetof (Elf_External_Note, name) > buf - p + size)
8597 return FALSE;
8598
dc810e39 8599 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8600
dc810e39 8601 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 8602 in.namedata = xnp->name;
baea7ef1
AM
8603 if (in.namesz > buf - in.namedata + size)
8604 return FALSE;
252b5132 8605
dc810e39 8606 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8607 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8608 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
8609 if (in.descsz != 0
8610 && (in.descdata >= buf + size
8611 || in.descsz > buf - in.descdata + size))
8612 return FALSE;
252b5132 8613
718175fa
JK
8614 switch (bfd_get_format (abfd))
8615 {
8616 default:
8617 return TRUE;
8618
8619 case bfd_core:
8620 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
8621 {
8622 if (! elfcore_grok_netbsd_note (abfd, &in))
8623 return FALSE;
8624 }
8625 else if (CONST_STRNEQ (in.namedata, "QNX"))
8626 {
8627 if (! elfcore_grok_nto_note (abfd, &in))
8628 return FALSE;
8629 }
b15fa79e
AM
8630 else if (CONST_STRNEQ (in.namedata, "SPU/"))
8631 {
8632 if (! elfcore_grok_spu_note (abfd, &in))
8633 return FALSE;
8634 }
718175fa
JK
8635 else
8636 {
8637 if (! elfcore_grok_note (abfd, &in))
8638 return FALSE;
8639 }
8640 break;
8641
8642 case bfd_object:
8643 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
8644 {
8645 if (! elfobj_grok_gnu_note (abfd, &in))
8646 return FALSE;
8647 }
8648 break;
08a40648 8649 }
252b5132
RH
8650
8651 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8652 }
8653
718175fa
JK
8654 return TRUE;
8655}
8656
8657static bfd_boolean
8658elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
8659{
8660 char *buf;
8661
8662 if (size <= 0)
8663 return TRUE;
8664
8665 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
8666 return FALSE;
8667
8668 buf = bfd_malloc (size);
8669 if (buf == NULL)
8670 return FALSE;
8671
8672 if (bfd_bread (buf, size, abfd) != size
8673 || !elf_parse_notes (abfd, buf, size, offset))
8674 {
8675 free (buf);
8676 return FALSE;
8677 }
8678
252b5132 8679 free (buf);
b34976b6 8680 return TRUE;
252b5132 8681}
98d8431c
JB
8682\f
8683/* Providing external access to the ELF program header table. */
8684
8685/* Return an upper bound on the number of bytes required to store a
8686 copy of ABFD's program header table entries. Return -1 if an error
8687 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8688
98d8431c 8689long
217aa764 8690bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8691{
8692 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8693 {
8694 bfd_set_error (bfd_error_wrong_format);
8695 return -1;
8696 }
8697
936e320b 8698 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8699}
8700
98d8431c
JB
8701/* Copy ABFD's program header table entries to *PHDRS. The entries
8702 will be stored as an array of Elf_Internal_Phdr structures, as
8703 defined in include/elf/internal.h. To find out how large the
8704 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
8705
8706 Return the number of program header table entries read, or -1 if an
8707 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 8708
98d8431c 8709int
217aa764 8710bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
8711{
8712 int num_phdrs;
8713
8714 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8715 {
8716 bfd_set_error (bfd_error_wrong_format);
8717 return -1;
8718 }
8719
8720 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 8721 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
8722 num_phdrs * sizeof (Elf_Internal_Phdr));
8723
8724 return num_phdrs;
8725}
ae4221d7 8726
db6751f2 8727enum elf_reloc_type_class
217aa764 8728_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
8729{
8730 return reloc_class_normal;
8731}
f8df10f4 8732
47d9a591 8733/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
8734 relocation against a local symbol. */
8735
8736bfd_vma
217aa764
AM
8737_bfd_elf_rela_local_sym (bfd *abfd,
8738 Elf_Internal_Sym *sym,
8517fae7 8739 asection **psec,
217aa764 8740 Elf_Internal_Rela *rel)
f8df10f4 8741{
8517fae7 8742 asection *sec = *psec;
f8df10f4
JJ
8743 bfd_vma relocation;
8744
8745 relocation = (sec->output_section->vma
8746 + sec->output_offset
8747 + sym->st_value);
8748 if ((sec->flags & SEC_MERGE)
c629eae0 8749 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 8750 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 8751 {
f8df10f4 8752 rel->r_addend =
8517fae7 8753 _bfd_merged_section_offset (abfd, psec,
65765700 8754 elf_section_data (sec)->sec_info,
753731ee
AM
8755 sym->st_value + rel->r_addend);
8756 if (sec != *psec)
8757 {
8758 /* If we have changed the section, and our original section is
8759 marked with SEC_EXCLUDE, it means that the original
8760 SEC_MERGE section has been completely subsumed in some
8761 other SEC_MERGE section. In this case, we need to leave
8762 some info around for --emit-relocs. */
8763 if ((sec->flags & SEC_EXCLUDE) != 0)
8764 sec->kept_section = *psec;
8765 sec = *psec;
8766 }
8517fae7
AM
8767 rel->r_addend -= relocation;
8768 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
8769 }
8770 return relocation;
8771}
c629eae0
JJ
8772
8773bfd_vma
217aa764
AM
8774_bfd_elf_rel_local_sym (bfd *abfd,
8775 Elf_Internal_Sym *sym,
8776 asection **psec,
8777 bfd_vma addend)
47d9a591 8778{
c629eae0
JJ
8779 asection *sec = *psec;
8780
68bfbfcc 8781 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
8782 return sym->st_value + addend;
8783
8784 return _bfd_merged_section_offset (abfd, psec,
65765700 8785 elf_section_data (sec)->sec_info,
753731ee 8786 sym->st_value + addend);
c629eae0
JJ
8787}
8788
8789bfd_vma
217aa764 8790_bfd_elf_section_offset (bfd *abfd,
92e4ec35 8791 struct bfd_link_info *info,
217aa764
AM
8792 asection *sec,
8793 bfd_vma offset)
c629eae0 8794{
68bfbfcc 8795 switch (sec->sec_info_type)
65765700
JJ
8796 {
8797 case ELF_INFO_TYPE_STABS:
eea6121a
AM
8798 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
8799 offset);
65765700 8800 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 8801 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
8802 default:
8803 return offset;
8804 }
c629eae0 8805}
3333a7c3
RM
8806\f
8807/* Create a new BFD as if by bfd_openr. Rather than opening a file,
8808 reconstruct an ELF file by reading the segments out of remote memory
8809 based on the ELF file header at EHDR_VMA and the ELF program headers it
8810 points to. If not null, *LOADBASEP is filled in with the difference
8811 between the VMAs from which the segments were read, and the VMAs the
8812 file headers (and hence BFD's idea of each section's VMA) put them at.
8813
8814 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
8815 remote memory at target address VMA into the local buffer at MYADDR; it
8816 should return zero on success or an `errno' code on failure. TEMPL must
8817 be a BFD for an ELF target with the word size and byte order found in
8818 the remote memory. */
8819
8820bfd *
217aa764
AM
8821bfd_elf_bfd_from_remote_memory
8822 (bfd *templ,
8823 bfd_vma ehdr_vma,
8824 bfd_vma *loadbasep,
f075ee0c 8825 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
8826{
8827 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
8828 (templ, ehdr_vma, loadbasep, target_read_memory);
8829}
4c45e5c9
JJ
8830\f
8831long
c9727e01
AM
8832_bfd_elf_get_synthetic_symtab (bfd *abfd,
8833 long symcount ATTRIBUTE_UNUSED,
8834 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 8835 long dynsymcount,
c9727e01
AM
8836 asymbol **dynsyms,
8837 asymbol **ret)
4c45e5c9
JJ
8838{
8839 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8840 asection *relplt;
8841 asymbol *s;
8842 const char *relplt_name;
8843 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8844 arelent *p;
8845 long count, i, n;
8846 size_t size;
8847 Elf_Internal_Shdr *hdr;
8848 char *names;
8849 asection *plt;
8850
8615f3f2
AM
8851 *ret = NULL;
8852
90e3cdf2
JJ
8853 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
8854 return 0;
8855
8615f3f2
AM
8856 if (dynsymcount <= 0)
8857 return 0;
8858
4c45e5c9
JJ
8859 if (!bed->plt_sym_val)
8860 return 0;
8861
8862 relplt_name = bed->relplt_name;
8863 if (relplt_name == NULL)
d35fd659 8864 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
8865 relplt = bfd_get_section_by_name (abfd, relplt_name);
8866 if (relplt == NULL)
8867 return 0;
8868
8869 hdr = &elf_section_data (relplt)->this_hdr;
8870 if (hdr->sh_link != elf_dynsymtab (abfd)
8871 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
8872 return 0;
8873
8874 plt = bfd_get_section_by_name (abfd, ".plt");
8875 if (plt == NULL)
8876 return 0;
8877
8878 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 8879 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
8880 return -1;
8881
eea6121a 8882 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
8883 size = count * sizeof (asymbol);
8884 p = relplt->relocation;
cb53bf42 8885 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
8886 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
8887
8888 s = *ret = bfd_malloc (size);
8889 if (s == NULL)
8890 return -1;
8891
8892 names = (char *) (s + count);
8893 p = relplt->relocation;
8894 n = 0;
cb53bf42 8895 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
8896 {
8897 size_t len;
8898 bfd_vma addr;
8899
8900 addr = bed->plt_sym_val (i, plt, p);
8901 if (addr == (bfd_vma) -1)
8902 continue;
8903
8904 *s = **p->sym_ptr_ptr;
65a7a66f
AM
8905 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
8906 we are defining a symbol, ensure one of them is set. */
8907 if ((s->flags & BSF_LOCAL) == 0)
8908 s->flags |= BSF_GLOBAL;
6ba2a415 8909 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
8910 s->section = plt;
8911 s->value = addr - plt->vma;
8912 s->name = names;
8f39ba8e 8913 s->udata.p = NULL;
4c45e5c9
JJ
8914 len = strlen ((*p->sym_ptr_ptr)->name);
8915 memcpy (names, (*p->sym_ptr_ptr)->name, len);
8916 names += len;
8917 memcpy (names, "@plt", sizeof ("@plt"));
8918 names += sizeof ("@plt");
8f39ba8e 8919 ++s, ++n;
4c45e5c9
JJ
8920 }
8921
8922 return n;
8923}
3d7f7666 8924
3b22753a
L
8925/* It is only used by x86-64 so far. */
8926asection _bfd_elf_large_com_section
8927 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 8928 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 8929
d1036acb
L
8930void
8931_bfd_elf_set_osabi (bfd * abfd,
8932 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
8933{
8934 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
8935
8936 i_ehdrp = elf_elfheader (abfd);
8937
8938 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
8939}
fcb93ecf
PB
8940
8941
8942/* Return TRUE for ELF symbol types that represent functions.
8943 This is the default version of this function, which is sufficient for
0f88be7a 8944 most targets. It returns true if TYPE is STT_FUNC. */
fcb93ecf
PB
8945
8946bfd_boolean
8947_bfd_elf_is_function_type (unsigned int type)
8948{
0f88be7a 8949 return (type == STT_FUNC);
fcb93ecf 8950}
This page took 1.436393 seconds and 4 git commands to generate.