daily update
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
abb3f6cc 3 Copyright 1993-2013 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
70a38d42 45#include "elf-linux-psinfo.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
53static bfd_boolean prep_headers (bfd *);
54static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
a50b1753 300 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL
c6c60d09
JJ
301 || bfd_seek (abfd, offset, SEEK_SET) != 0)
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
307 shstrtab = NULL;
3471d59d
CC
308 /* Once we've failed to read it, make sure we don't keep
309 trying. Otherwise, we'll keep allocating space for
310 the string table over and over. */
311 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
312 }
313 else
314 shstrtab[shstrtabsize] = '\0';
217aa764 315 i_shdrp[shindex]->contents = shstrtab;
252b5132 316 }
f075ee0c 317 return (char *) shstrtab;
252b5132
RH
318}
319
320char *
217aa764
AM
321bfd_elf_string_from_elf_section (bfd *abfd,
322 unsigned int shindex,
323 unsigned int strindex)
252b5132
RH
324{
325 Elf_Internal_Shdr *hdr;
326
327 if (strindex == 0)
328 return "";
329
74f2e02b
AM
330 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
331 return NULL;
332
252b5132
RH
333 hdr = elf_elfsections (abfd)[shindex];
334
335 if (hdr->contents == NULL
336 && bfd_elf_get_str_section (abfd, shindex) == NULL)
337 return NULL;
338
339 if (strindex >= hdr->sh_size)
340 {
1b3a8575 341 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 342 (*_bfd_error_handler)
d003868e
AM
343 (_("%B: invalid string offset %u >= %lu for section `%s'"),
344 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 345 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 346 ? ".shstrtab"
1b3a8575 347 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 348 return NULL;
252b5132
RH
349 }
350
351 return ((char *) hdr->contents) + strindex;
352}
353
6cdc0ccc
AM
354/* Read and convert symbols to internal format.
355 SYMCOUNT specifies the number of symbols to read, starting from
356 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
357 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
358 symbols, and symbol section index extensions, respectively.
359 Returns a pointer to the internal symbol buffer (malloced if necessary)
360 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
361
362Elf_Internal_Sym *
217aa764
AM
363bfd_elf_get_elf_syms (bfd *ibfd,
364 Elf_Internal_Shdr *symtab_hdr,
365 size_t symcount,
366 size_t symoffset,
367 Elf_Internal_Sym *intsym_buf,
368 void *extsym_buf,
369 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
370{
371 Elf_Internal_Shdr *shndx_hdr;
217aa764 372 void *alloc_ext;
df622259 373 const bfd_byte *esym;
6cdc0ccc
AM
374 Elf_External_Sym_Shndx *alloc_extshndx;
375 Elf_External_Sym_Shndx *shndx;
4dd07732 376 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
377 Elf_Internal_Sym *isym;
378 Elf_Internal_Sym *isymend;
9c5bfbb7 379 const struct elf_backend_data *bed;
6cdc0ccc
AM
380 size_t extsym_size;
381 bfd_size_type amt;
382 file_ptr pos;
383
e44a2c9c
AM
384 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
385 abort ();
386
6cdc0ccc
AM
387 if (symcount == 0)
388 return intsym_buf;
389
390 /* Normal syms might have section extension entries. */
391 shndx_hdr = NULL;
392 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
393 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
394
395 /* Read the symbols. */
396 alloc_ext = NULL;
397 alloc_extshndx = NULL;
4dd07732 398 alloc_intsym = NULL;
6cdc0ccc
AM
399 bed = get_elf_backend_data (ibfd);
400 extsym_size = bed->s->sizeof_sym;
401 amt = symcount * extsym_size;
402 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
403 if (extsym_buf == NULL)
404 {
d0fb9a8d 405 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
406 extsym_buf = alloc_ext;
407 }
408 if (extsym_buf == NULL
409 || bfd_seek (ibfd, pos, SEEK_SET) != 0
410 || bfd_bread (extsym_buf, amt, ibfd) != amt)
411 {
412 intsym_buf = NULL;
413 goto out;
414 }
415
416 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
417 extshndx_buf = NULL;
418 else
419 {
420 amt = symcount * sizeof (Elf_External_Sym_Shndx);
421 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
422 if (extshndx_buf == NULL)
423 {
a50b1753
NC
424 alloc_extshndx = (Elf_External_Sym_Shndx *)
425 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
426 extshndx_buf = alloc_extshndx;
427 }
428 if (extshndx_buf == NULL
429 || bfd_seek (ibfd, pos, SEEK_SET) != 0
430 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
431 {
432 intsym_buf = NULL;
433 goto out;
434 }
435 }
436
437 if (intsym_buf == NULL)
438 {
a50b1753
NC
439 alloc_intsym = (Elf_Internal_Sym *)
440 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 441 intsym_buf = alloc_intsym;
6cdc0ccc
AM
442 if (intsym_buf == NULL)
443 goto out;
444 }
445
446 /* Convert the symbols to internal form. */
447 isymend = intsym_buf + symcount;
a50b1753
NC
448 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
449 shndx = extshndx_buf;
6cdc0ccc
AM
450 isym < isymend;
451 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
452 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
453 {
454 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
455 (*_bfd_error_handler) (_("%B symbol number %lu references "
456 "nonexistent SHT_SYMTAB_SHNDX section"),
457 ibfd, (unsigned long) symoffset);
4dd07732
AM
458 if (alloc_intsym != NULL)
459 free (alloc_intsym);
8384fb8f
AM
460 intsym_buf = NULL;
461 goto out;
462 }
6cdc0ccc
AM
463
464 out:
465 if (alloc_ext != NULL)
466 free (alloc_ext);
467 if (alloc_extshndx != NULL)
468 free (alloc_extshndx);
469
470 return intsym_buf;
471}
472
5cab59f6
AM
473/* Look up a symbol name. */
474const char *
be8dd2ca
AM
475bfd_elf_sym_name (bfd *abfd,
476 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
477 Elf_Internal_Sym *isym,
478 asection *sym_sec)
5cab59f6 479{
26c61ae5 480 const char *name;
5cab59f6 481 unsigned int iname = isym->st_name;
be8dd2ca 482 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 483
138f35cc
JJ
484 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
485 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 486 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
487 {
488 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
489 shindex = elf_elfheader (abfd)->e_shstrndx;
490 }
491
26c61ae5
L
492 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
493 if (name == NULL)
494 name = "(null)";
495 else if (sym_sec && *name == '\0')
496 name = bfd_section_name (abfd, sym_sec);
497
498 return name;
5cab59f6
AM
499}
500
dbb410c3
AM
501/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
502 sections. The first element is the flags, the rest are section
503 pointers. */
504
505typedef union elf_internal_group {
506 Elf_Internal_Shdr *shdr;
507 unsigned int flags;
508} Elf_Internal_Group;
509
b885599b
AM
510/* Return the name of the group signature symbol. Why isn't the
511 signature just a string? */
512
513static const char *
217aa764 514group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 515{
9dce4196 516 Elf_Internal_Shdr *hdr;
9dce4196
AM
517 unsigned char esym[sizeof (Elf64_External_Sym)];
518 Elf_External_Sym_Shndx eshndx;
519 Elf_Internal_Sym isym;
b885599b 520
13792e9d
L
521 /* First we need to ensure the symbol table is available. Make sure
522 that it is a symbol table section. */
4fbb74a6
AM
523 if (ghdr->sh_link >= elf_numsections (abfd))
524 return NULL;
13792e9d
L
525 hdr = elf_elfsections (abfd) [ghdr->sh_link];
526 if (hdr->sh_type != SHT_SYMTAB
527 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
528 return NULL;
529
9dce4196
AM
530 /* Go read the symbol. */
531 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
532 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
533 &isym, esym, &eshndx) == NULL)
b885599b 534 return NULL;
9dce4196 535
26c61ae5 536 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
537}
538
dbb410c3
AM
539/* Set next_in_group list pointer, and group name for NEWSECT. */
540
b34976b6 541static bfd_boolean
217aa764 542setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
543{
544 unsigned int num_group = elf_tdata (abfd)->num_group;
545
546 /* If num_group is zero, read in all SHT_GROUP sections. The count
547 is set to -1 if there are no SHT_GROUP sections. */
548 if (num_group == 0)
549 {
550 unsigned int i, shnum;
551
552 /* First count the number of groups. If we have a SHT_GROUP
553 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 554 shnum = elf_numsections (abfd);
dbb410c3 555 num_group = 0;
08a40648 556
44534af3 557#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 558 ( (shdr)->sh_type == SHT_GROUP \
44534af3 559 && (shdr)->sh_size >= minsize \
1783205a
NC
560 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
561 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 562
dbb410c3
AM
563 for (i = 0; i < shnum; i++)
564 {
565 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 566
44534af3 567 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
568 num_group += 1;
569 }
570
571 if (num_group == 0)
20dbb49d
L
572 {
573 num_group = (unsigned) -1;
574 elf_tdata (abfd)->num_group = num_group;
575 }
576 else
dbb410c3
AM
577 {
578 /* We keep a list of elf section headers for group sections,
579 so we can find them quickly. */
20dbb49d 580 bfd_size_type amt;
d0fb9a8d 581
20dbb49d 582 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
583 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
584 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 585 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 586 return FALSE;
dbb410c3
AM
587
588 num_group = 0;
589 for (i = 0; i < shnum; i++)
590 {
591 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 592
44534af3 593 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 594 {
973ffd63 595 unsigned char *src;
dbb410c3
AM
596 Elf_Internal_Group *dest;
597
598 /* Add to list of sections. */
599 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
600 num_group += 1;
601
602 /* Read the raw contents. */
603 BFD_ASSERT (sizeof (*dest) >= 4);
604 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
605 shdr->contents = (unsigned char *)
606 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
607 /* PR binutils/4110: Handle corrupt group headers. */
608 if (shdr->contents == NULL)
609 {
610 _bfd_error_handler
611 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
612 bfd_set_error (bfd_error_bad_value);
613 return FALSE;
614 }
615
616 memset (shdr->contents, 0, amt);
617
618 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
619 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
620 != shdr->sh_size))
b34976b6 621 return FALSE;
dbb410c3
AM
622
623 /* Translate raw contents, a flag word followed by an
624 array of elf section indices all in target byte order,
625 to the flag word followed by an array of elf section
626 pointers. */
627 src = shdr->contents + shdr->sh_size;
628 dest = (Elf_Internal_Group *) (shdr->contents + amt);
629 while (1)
630 {
631 unsigned int idx;
632
633 src -= 4;
634 --dest;
635 idx = H_GET_32 (abfd, src);
636 if (src == shdr->contents)
637 {
638 dest->flags = idx;
b885599b
AM
639 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
640 shdr->bfd_section->flags
641 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
642 break;
643 }
644 if (idx >= shnum)
645 {
646 ((*_bfd_error_handler)
d003868e 647 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
648 idx = 0;
649 }
650 dest->shdr = elf_elfsections (abfd)[idx];
651 }
652 }
653 }
654 }
655 }
656
657 if (num_group != (unsigned) -1)
658 {
659 unsigned int i;
660
661 for (i = 0; i < num_group; i++)
662 {
663 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
664 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
665 unsigned int n_elt = shdr->sh_size / 4;
666
667 /* Look through this group's sections to see if current
668 section is a member. */
669 while (--n_elt != 0)
670 if ((++idx)->shdr == hdr)
671 {
e0e8c97f 672 asection *s = NULL;
dbb410c3
AM
673
674 /* We are a member of this group. Go looking through
675 other members to see if any others are linked via
676 next_in_group. */
677 idx = (Elf_Internal_Group *) shdr->contents;
678 n_elt = shdr->sh_size / 4;
679 while (--n_elt != 0)
680 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 681 && elf_next_in_group (s) != NULL)
dbb410c3
AM
682 break;
683 if (n_elt != 0)
684 {
dbb410c3
AM
685 /* Snarf the group name from other member, and
686 insert current section in circular list. */
945906ff
AM
687 elf_group_name (newsect) = elf_group_name (s);
688 elf_next_in_group (newsect) = elf_next_in_group (s);
689 elf_next_in_group (s) = newsect;
dbb410c3
AM
690 }
691 else
692 {
dbb410c3
AM
693 const char *gname;
694
b885599b
AM
695 gname = group_signature (abfd, shdr);
696 if (gname == NULL)
b34976b6 697 return FALSE;
945906ff 698 elf_group_name (newsect) = gname;
dbb410c3
AM
699
700 /* Start a circular list with one element. */
945906ff 701 elf_next_in_group (newsect) = newsect;
dbb410c3 702 }
b885599b 703
9dce4196
AM
704 /* If the group section has been created, point to the
705 new member. */
dbb410c3 706 if (shdr->bfd_section != NULL)
945906ff 707 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 708
dbb410c3
AM
709 i = num_group - 1;
710 break;
711 }
712 }
713 }
714
945906ff 715 if (elf_group_name (newsect) == NULL)
dbb410c3 716 {
d003868e
AM
717 (*_bfd_error_handler) (_("%B: no group info for section %A"),
718 abfd, newsect);
dbb410c3 719 }
b34976b6 720 return TRUE;
dbb410c3
AM
721}
722
3d7f7666 723bfd_boolean
dd863624 724_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
725{
726 unsigned int i;
727 unsigned int num_group = elf_tdata (abfd)->num_group;
728 bfd_boolean result = TRUE;
dd863624
L
729 asection *s;
730
731 /* Process SHF_LINK_ORDER. */
732 for (s = abfd->sections; s != NULL; s = s->next)
733 {
734 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
735 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
736 {
737 unsigned int elfsec = this_hdr->sh_link;
738 /* FIXME: The old Intel compiler and old strip/objcopy may
739 not set the sh_link or sh_info fields. Hence we could
740 get the situation where elfsec is 0. */
741 if (elfsec == 0)
742 {
4fbb74a6 743 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
744 if (bed->link_order_error_handler)
745 bed->link_order_error_handler
746 (_("%B: warning: sh_link not set for section `%A'"),
747 abfd, s);
748 }
749 else
750 {
91d6fa6a 751 asection *linksec = NULL;
25bbc984 752
4fbb74a6
AM
753 if (elfsec < elf_numsections (abfd))
754 {
755 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 756 linksec = this_hdr->bfd_section;
4fbb74a6 757 }
25bbc984
L
758
759 /* PR 1991, 2008:
760 Some strip/objcopy may leave an incorrect value in
761 sh_link. We don't want to proceed. */
91d6fa6a 762 if (linksec == NULL)
25bbc984
L
763 {
764 (*_bfd_error_handler)
765 (_("%B: sh_link [%d] in section `%A' is incorrect"),
766 s->owner, s, elfsec);
767 result = FALSE;
768 }
769
91d6fa6a 770 elf_linked_to_section (s) = linksec;
dd863624
L
771 }
772 }
773 }
3d7f7666 774
dd863624 775 /* Process section groups. */
3d7f7666
L
776 if (num_group == (unsigned) -1)
777 return result;
778
779 for (i = 0; i < num_group; i++)
780 {
781 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
782 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
783 unsigned int n_elt = shdr->sh_size / 4;
784
785 while (--n_elt != 0)
786 if ((++idx)->shdr->bfd_section)
787 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
788 else if (idx->shdr->sh_type == SHT_RELA
789 || idx->shdr->sh_type == SHT_REL)
790 /* We won't include relocation sections in section groups in
791 output object files. We adjust the group section size here
792 so that relocatable link will work correctly when
793 relocation sections are in section group in input object
794 files. */
795 shdr->bfd_section->size -= 4;
796 else
797 {
798 /* There are some unknown sections in the group. */
799 (*_bfd_error_handler)
d003868e
AM
800 (_("%B: unknown [%d] section `%s' in group [%s]"),
801 abfd,
3d7f7666 802 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
803 bfd_elf_string_from_elf_section (abfd,
804 (elf_elfheader (abfd)
805 ->e_shstrndx),
806 idx->shdr->sh_name),
3d7f7666
L
807 shdr->bfd_section->name);
808 result = FALSE;
809 }
810 }
811 return result;
812}
813
72adc230
AM
814bfd_boolean
815bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
816{
817 return elf_next_in_group (sec) != NULL;
818}
819
252b5132
RH
820/* Make a BFD section from an ELF section. We store a pointer to the
821 BFD section in the bfd_section field of the header. */
822
b34976b6 823bfd_boolean
217aa764
AM
824_bfd_elf_make_section_from_shdr (bfd *abfd,
825 Elf_Internal_Shdr *hdr,
6dc132d9
L
826 const char *name,
827 int shindex)
252b5132
RH
828{
829 asection *newsect;
830 flagword flags;
9c5bfbb7 831 const struct elf_backend_data *bed;
252b5132
RH
832
833 if (hdr->bfd_section != NULL)
4e011fb5 834 return TRUE;
252b5132
RH
835
836 newsect = bfd_make_section_anyway (abfd, name);
837 if (newsect == NULL)
b34976b6 838 return FALSE;
252b5132 839
1829f4b2
AM
840 hdr->bfd_section = newsect;
841 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 842 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 843
2f89ff8d
L
844 /* Always use the real type/flags. */
845 elf_section_type (newsect) = hdr->sh_type;
846 elf_section_flags (newsect) = hdr->sh_flags;
847
252b5132
RH
848 newsect->filepos = hdr->sh_offset;
849
850 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
851 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
852 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 853 bfd_log2 (hdr->sh_addralign)))
b34976b6 854 return FALSE;
252b5132
RH
855
856 flags = SEC_NO_FLAGS;
857 if (hdr->sh_type != SHT_NOBITS)
858 flags |= SEC_HAS_CONTENTS;
dbb410c3 859 if (hdr->sh_type == SHT_GROUP)
b3096250 860 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
861 if ((hdr->sh_flags & SHF_ALLOC) != 0)
862 {
863 flags |= SEC_ALLOC;
864 if (hdr->sh_type != SHT_NOBITS)
865 flags |= SEC_LOAD;
866 }
867 if ((hdr->sh_flags & SHF_WRITE) == 0)
868 flags |= SEC_READONLY;
869 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
870 flags |= SEC_CODE;
871 else if ((flags & SEC_LOAD) != 0)
872 flags |= SEC_DATA;
f5fa8ca2
JJ
873 if ((hdr->sh_flags & SHF_MERGE) != 0)
874 {
875 flags |= SEC_MERGE;
876 newsect->entsize = hdr->sh_entsize;
877 if ((hdr->sh_flags & SHF_STRINGS) != 0)
878 flags |= SEC_STRINGS;
879 }
dbb410c3
AM
880 if (hdr->sh_flags & SHF_GROUP)
881 if (!setup_group (abfd, hdr, newsect))
b34976b6 882 return FALSE;
13ae64f3
JJ
883 if ((hdr->sh_flags & SHF_TLS) != 0)
884 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
885 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
886 flags |= SEC_EXCLUDE;
252b5132 887
3d2b39cf 888 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 889 {
3d2b39cf
L
890 /* The debugging sections appear to be recognized only by name,
891 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
892 if (name [0] == '.')
893 {
f073ced3
AM
894 const char *p;
895 int n;
896 if (name[1] == 'd')
897 p = ".debug", n = 6;
898 else if (name[1] == 'g' && name[2] == 'n')
899 p = ".gnu.linkonce.wi.", n = 17;
900 else if (name[1] == 'g' && name[2] == 'd')
901 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
902 else if (name[1] == 'l')
903 p = ".line", n = 5;
904 else if (name[1] == 's')
905 p = ".stab", n = 5;
906 else if (name[1] == 'z')
907 p = ".zdebug", n = 7;
908 else
909 p = NULL, n = 0;
910 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
911 flags |= SEC_DEBUGGING;
912 }
913 }
252b5132
RH
914
915 /* As a GNU extension, if the name begins with .gnu.linkonce, we
916 only link a single copy of the section. This is used to support
917 g++. g++ will emit each template expansion in its own section.
918 The symbols will be defined as weak, so that multiple definitions
919 are permitted. The GNU linker extension is to actually discard
920 all but one of the sections. */
0112cd26 921 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 922 && elf_next_in_group (newsect) == NULL)
252b5132
RH
923 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
924
fa152c49
JW
925 bed = get_elf_backend_data (abfd);
926 if (bed->elf_backend_section_flags)
927 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 928 return FALSE;
fa152c49 929
252b5132 930 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 931 return FALSE;
252b5132 932
718175fa
JK
933 /* We do not parse the PT_NOTE segments as we are interested even in the
934 separate debug info files which may have the segments offsets corrupted.
935 PT_NOTEs from the core files are currently not parsed using BFD. */
936 if (hdr->sh_type == SHT_NOTE)
937 {
baea7ef1 938 bfd_byte *contents;
718175fa 939
baea7ef1 940 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
941 return FALSE;
942
baea7ef1 943 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
944 free (contents);
945 }
946
252b5132
RH
947 if ((flags & SEC_ALLOC) != 0)
948 {
949 Elf_Internal_Phdr *phdr;
6ffd7900
AM
950 unsigned int i, nload;
951
952 /* Some ELF linkers produce binaries with all the program header
953 p_paddr fields zero. If we have such a binary with more than
954 one PT_LOAD header, then leave the section lma equal to vma
955 so that we don't create sections with overlapping lma. */
956 phdr = elf_tdata (abfd)->phdr;
957 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
958 if (phdr->p_paddr != 0)
959 break;
960 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
961 ++nload;
962 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
963 return TRUE;
252b5132 964
252b5132
RH
965 phdr = elf_tdata (abfd)->phdr;
966 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
967 {
86b2281f
AM
968 if (((phdr->p_type == PT_LOAD
969 && (hdr->sh_flags & SHF_TLS) == 0)
970 || phdr->p_type == PT_TLS)
9a83a553 971 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 972 {
88967714
AM
973 if ((flags & SEC_LOAD) == 0)
974 newsect->lma = (phdr->p_paddr
975 + hdr->sh_addr - phdr->p_vaddr);
976 else
977 /* We used to use the same adjustment for SEC_LOAD
978 sections, but that doesn't work if the segment
979 is packed with code from multiple VMAs.
980 Instead we calculate the section LMA based on
981 the segment LMA. It is assumed that the
982 segment will contain sections with contiguous
983 LMAs, even if the VMAs are not. */
984 newsect->lma = (phdr->p_paddr
985 + hdr->sh_offset - phdr->p_offset);
986
987 /* With contiguous segments, we can't tell from file
988 offsets whether a section with zero size should
989 be placed at the end of one segment or the
990 beginning of the next. Decide based on vaddr. */
991 if (hdr->sh_addr >= phdr->p_vaddr
992 && (hdr->sh_addr + hdr->sh_size
993 <= phdr->p_vaddr + phdr->p_memsz))
994 break;
252b5132
RH
995 }
996 }
997 }
998
4a114e3e
L
999 /* Compress/decompress DWARF debug sections with names: .debug_* and
1000 .zdebug_*, after the section flags is set. */
1001 if ((flags & SEC_DEBUGGING)
1002 && ((name[1] == 'd' && name[6] == '_')
1003 || (name[1] == 'z' && name[7] == '_')))
1004 {
1005 enum { nothing, compress, decompress } action = nothing;
4e011fb5 1006 char *new_name;
4a114e3e
L
1007
1008 if (bfd_is_section_compressed (abfd, newsect))
1009 {
1010 /* Compressed section. Check if we should decompress. */
1011 if ((abfd->flags & BFD_DECOMPRESS))
1012 action = decompress;
1013 }
1014 else
1015 {
1016 /* Normal section. Check if we should compress. */
5a5ed5b0 1017 if ((abfd->flags & BFD_COMPRESS) && newsect->size != 0)
4a114e3e
L
1018 action = compress;
1019 }
1020
4e011fb5 1021 new_name = NULL;
4a114e3e
L
1022 switch (action)
1023 {
1024 case nothing:
1025 break;
1026 case compress:
1027 if (!bfd_init_section_compress_status (abfd, newsect))
1028 {
1029 (*_bfd_error_handler)
bc823199 1030 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1031 abfd, name);
1032 return FALSE;
1033 }
4e011fb5
AM
1034 if (name[1] != 'z')
1035 {
1036 unsigned int len = strlen (name);
1037
1038 new_name = bfd_alloc (abfd, len + 2);
1039 if (new_name == NULL)
1040 return FALSE;
1041 new_name[0] = '.';
1042 new_name[1] = 'z';
1043 memcpy (new_name + 2, name + 1, len);
1044 }
4a114e3e
L
1045 break;
1046 case decompress:
1047 if (!bfd_init_section_decompress_status (abfd, newsect))
1048 {
1049 (*_bfd_error_handler)
bc823199 1050 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1051 abfd, name);
1052 return FALSE;
1053 }
4e011fb5
AM
1054 if (name[1] == 'z')
1055 {
1056 unsigned int len = strlen (name);
1057
1058 new_name = bfd_alloc (abfd, len);
1059 if (new_name == NULL)
1060 return FALSE;
1061 new_name[0] = '.';
1062 memcpy (new_name + 1, name + 2, len - 1);
1063 }
4a114e3e
L
1064 break;
1065 }
4e011fb5
AM
1066 if (new_name != NULL)
1067 bfd_rename_section (abfd, newsect, new_name);
4a114e3e
L
1068 }
1069
b34976b6 1070 return TRUE;
252b5132
RH
1071}
1072
252b5132
RH
1073const char *const bfd_elf_section_type_names[] = {
1074 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1075 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1076 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1077};
1078
1049f94e 1079/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1080 output, and the reloc is against an external symbol, and nothing
1081 has given us any additional addend, the resulting reloc will also
1082 be against the same symbol. In such a case, we don't want to
1083 change anything about the way the reloc is handled, since it will
1084 all be done at final link time. Rather than put special case code
1085 into bfd_perform_relocation, all the reloc types use this howto
1086 function. It just short circuits the reloc if producing
1049f94e 1087 relocatable output against an external symbol. */
252b5132 1088
252b5132 1089bfd_reloc_status_type
217aa764
AM
1090bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1091 arelent *reloc_entry,
1092 asymbol *symbol,
1093 void *data ATTRIBUTE_UNUSED,
1094 asection *input_section,
1095 bfd *output_bfd,
1096 char **error_message ATTRIBUTE_UNUSED)
1097{
1098 if (output_bfd != NULL
252b5132
RH
1099 && (symbol->flags & BSF_SECTION_SYM) == 0
1100 && (! reloc_entry->howto->partial_inplace
1101 || reloc_entry->addend == 0))
1102 {
1103 reloc_entry->address += input_section->output_offset;
1104 return bfd_reloc_ok;
1105 }
1106
1107 return bfd_reloc_continue;
1108}
1109\f
0ac4564e
L
1110/* Copy the program header and other data from one object module to
1111 another. */
252b5132 1112
b34976b6 1113bfd_boolean
217aa764 1114_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1115{
1116 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1117 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1118 return TRUE;
2d502050 1119
57b828ef
L
1120 if (!elf_flags_init (obfd))
1121 {
1122 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1123 elf_flags_init (obfd) = TRUE;
1124 }
2d502050 1125
0ac4564e 1126 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1127
1128 /* Also copy the EI_OSABI field. */
1129 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1130 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1
JM
1131
1132 /* Copy object attributes. */
1133 _bfd_elf_copy_obj_attributes (ibfd, obfd);
b34976b6 1134 return TRUE;
2d502050
L
1135}
1136
cedc298e
L
1137static const char *
1138get_segment_type (unsigned int p_type)
1139{
1140 const char *pt;
1141 switch (p_type)
1142 {
1143 case PT_NULL: pt = "NULL"; break;
1144 case PT_LOAD: pt = "LOAD"; break;
1145 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1146 case PT_INTERP: pt = "INTERP"; break;
1147 case PT_NOTE: pt = "NOTE"; break;
1148 case PT_SHLIB: pt = "SHLIB"; break;
1149 case PT_PHDR: pt = "PHDR"; break;
1150 case PT_TLS: pt = "TLS"; break;
1151 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1152 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1153 case PT_GNU_RELRO: pt = "RELRO"; break;
1154 default: pt = NULL; break;
1155 }
1156 return pt;
1157}
1158
f0b79d91
L
1159/* Print out the program headers. */
1160
b34976b6 1161bfd_boolean
217aa764 1162_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1163{
a50b1753 1164 FILE *f = (FILE *) farg;
252b5132
RH
1165 Elf_Internal_Phdr *p;
1166 asection *s;
1167 bfd_byte *dynbuf = NULL;
1168
1169 p = elf_tdata (abfd)->phdr;
1170 if (p != NULL)
1171 {
1172 unsigned int i, c;
1173
1174 fprintf (f, _("\nProgram Header:\n"));
1175 c = elf_elfheader (abfd)->e_phnum;
1176 for (i = 0; i < c; i++, p++)
1177 {
cedc298e 1178 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1179 char buf[20];
1180
cedc298e 1181 if (pt == NULL)
252b5132 1182 {
cedc298e
L
1183 sprintf (buf, "0x%lx", p->p_type);
1184 pt = buf;
252b5132 1185 }
dc810e39 1186 fprintf (f, "%8s off 0x", pt);
60b89a18 1187 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1188 fprintf (f, " vaddr 0x");
60b89a18 1189 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1190 fprintf (f, " paddr 0x");
60b89a18 1191 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1192 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1193 fprintf (f, " filesz 0x");
60b89a18 1194 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1195 fprintf (f, " memsz 0x");
60b89a18 1196 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1197 fprintf (f, " flags %c%c%c",
1198 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1199 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1200 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1201 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1202 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1203 fprintf (f, "\n");
1204 }
1205 }
1206
1207 s = bfd_get_section_by_name (abfd, ".dynamic");
1208 if (s != NULL)
1209 {
cb33740c 1210 unsigned int elfsec;
dc810e39 1211 unsigned long shlink;
252b5132
RH
1212 bfd_byte *extdyn, *extdynend;
1213 size_t extdynsize;
217aa764 1214 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1215
1216 fprintf (f, _("\nDynamic Section:\n"));
1217
eea6121a 1218 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1219 goto error_return;
1220
1221 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1222 if (elfsec == SHN_BAD)
252b5132 1223 goto error_return;
dc810e39 1224 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1225
1226 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1227 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1228
1229 extdyn = dynbuf;
eea6121a 1230 extdynend = extdyn + s->size;
252b5132
RH
1231 for (; extdyn < extdynend; extdyn += extdynsize)
1232 {
1233 Elf_Internal_Dyn dyn;
ad9563d6 1234 const char *name = "";
252b5132 1235 char ab[20];
b34976b6 1236 bfd_boolean stringp;
ad9563d6 1237 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1238
217aa764 1239 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1240
1241 if (dyn.d_tag == DT_NULL)
1242 break;
1243
b34976b6 1244 stringp = FALSE;
252b5132
RH
1245 switch (dyn.d_tag)
1246 {
1247 default:
ad9563d6
CM
1248 if (bed->elf_backend_get_target_dtag)
1249 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1250
1251 if (!strcmp (name, ""))
1252 {
1253 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1254 name = ab;
1255 }
252b5132
RH
1256 break;
1257
b34976b6 1258 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1259 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1260 case DT_PLTGOT: name = "PLTGOT"; break;
1261 case DT_HASH: name = "HASH"; break;
1262 case DT_STRTAB: name = "STRTAB"; break;
1263 case DT_SYMTAB: name = "SYMTAB"; break;
1264 case DT_RELA: name = "RELA"; break;
1265 case DT_RELASZ: name = "RELASZ"; break;
1266 case DT_RELAENT: name = "RELAENT"; break;
1267 case DT_STRSZ: name = "STRSZ"; break;
1268 case DT_SYMENT: name = "SYMENT"; break;
1269 case DT_INIT: name = "INIT"; break;
1270 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1271 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1272 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1273 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1274 case DT_REL: name = "REL"; break;
1275 case DT_RELSZ: name = "RELSZ"; break;
1276 case DT_RELENT: name = "RELENT"; break;
1277 case DT_PLTREL: name = "PLTREL"; break;
1278 case DT_DEBUG: name = "DEBUG"; break;
1279 case DT_TEXTREL: name = "TEXTREL"; break;
1280 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1281 case DT_BIND_NOW: name = "BIND_NOW"; break;
1282 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1283 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1284 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1285 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1286 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1287 case DT_FLAGS: name = "FLAGS"; break;
1288 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1289 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1290 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1291 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1292 case DT_MOVEENT: name = "MOVEENT"; break;
1293 case DT_MOVESZ: name = "MOVESZ"; break;
1294 case DT_FEATURE: name = "FEATURE"; break;
1295 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1296 case DT_SYMINSZ: name = "SYMINSZ"; break;
1297 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1298 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1299 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1300 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1301 case DT_PLTPAD: name = "PLTPAD"; break;
1302 case DT_MOVETAB: name = "MOVETAB"; break;
1303 case DT_SYMINFO: name = "SYMINFO"; break;
1304 case DT_RELACOUNT: name = "RELACOUNT"; break;
1305 case DT_RELCOUNT: name = "RELCOUNT"; break;
1306 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1307 case DT_VERSYM: name = "VERSYM"; break;
1308 case DT_VERDEF: name = "VERDEF"; break;
1309 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1310 case DT_VERNEED: name = "VERNEED"; break;
1311 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1312 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1313 case DT_USED: name = "USED"; break;
b34976b6 1314 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1315 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1316 }
1317
ad9563d6 1318 fprintf (f, " %-20s ", name);
252b5132 1319 if (! stringp)
a1f3c56e
AN
1320 {
1321 fprintf (f, "0x");
1322 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1323 }
252b5132
RH
1324 else
1325 {
1326 const char *string;
dc810e39 1327 unsigned int tagv = dyn.d_un.d_val;
252b5132 1328
dc810e39 1329 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1330 if (string == NULL)
1331 goto error_return;
1332 fprintf (f, "%s", string);
1333 }
1334 fprintf (f, "\n");
1335 }
1336
1337 free (dynbuf);
1338 dynbuf = NULL;
1339 }
1340
1341 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1342 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1343 {
fc0e6df6 1344 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1345 return FALSE;
252b5132
RH
1346 }
1347
1348 if (elf_dynverdef (abfd) != 0)
1349 {
1350 Elf_Internal_Verdef *t;
1351
1352 fprintf (f, _("\nVersion definitions:\n"));
1353 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1354 {
1355 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1356 t->vd_flags, t->vd_hash,
1357 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1358 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1359 {
1360 Elf_Internal_Verdaux *a;
1361
1362 fprintf (f, "\t");
1363 for (a = t->vd_auxptr->vda_nextptr;
1364 a != NULL;
1365 a = a->vda_nextptr)
d0fb9a8d
JJ
1366 fprintf (f, "%s ",
1367 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1368 fprintf (f, "\n");
1369 }
1370 }
1371 }
1372
1373 if (elf_dynverref (abfd) != 0)
1374 {
1375 Elf_Internal_Verneed *t;
1376
1377 fprintf (f, _("\nVersion References:\n"));
1378 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1379 {
1380 Elf_Internal_Vernaux *a;
1381
d0fb9a8d
JJ
1382 fprintf (f, _(" required from %s:\n"),
1383 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1384 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1385 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1386 a->vna_flags, a->vna_other,
1387 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1388 }
1389 }
1390
b34976b6 1391 return TRUE;
252b5132
RH
1392
1393 error_return:
1394 if (dynbuf != NULL)
1395 free (dynbuf);
b34976b6 1396 return FALSE;
252b5132
RH
1397}
1398
1399/* Display ELF-specific fields of a symbol. */
1400
1401void
217aa764
AM
1402bfd_elf_print_symbol (bfd *abfd,
1403 void *filep,
1404 asymbol *symbol,
1405 bfd_print_symbol_type how)
252b5132 1406{
a50b1753 1407 FILE *file = (FILE *) filep;
252b5132
RH
1408 switch (how)
1409 {
1410 case bfd_print_symbol_name:
1411 fprintf (file, "%s", symbol->name);
1412 break;
1413 case bfd_print_symbol_more:
1414 fprintf (file, "elf ");
60b89a18 1415 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1416 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1417 break;
1418 case bfd_print_symbol_all:
1419 {
4e8a9624
AM
1420 const char *section_name;
1421 const char *name = NULL;
9c5bfbb7 1422 const struct elf_backend_data *bed;
7a13edea 1423 unsigned char st_other;
dbb410c3 1424 bfd_vma val;
c044fabd 1425
252b5132 1426 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1427
1428 bed = get_elf_backend_data (abfd);
1429 if (bed->elf_backend_print_symbol_all)
c044fabd 1430 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1431
1432 if (name == NULL)
1433 {
7ee38065 1434 name = symbol->name;
217aa764 1435 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1436 }
1437
252b5132
RH
1438 fprintf (file, " %s\t", section_name);
1439 /* Print the "other" value for a symbol. For common symbols,
1440 we've already printed the size; now print the alignment.
1441 For other symbols, we have no specified alignment, and
1442 we've printed the address; now print the size. */
dcf6c779 1443 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1444 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1445 else
1446 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1447 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1448
1449 /* If we have version information, print it. */
12bd6957
AM
1450 if (elf_dynversym (abfd) != 0
1451 && (elf_dynverdef (abfd) != 0
1452 || elf_dynverref (abfd) != 0))
252b5132
RH
1453 {
1454 unsigned int vernum;
1455 const char *version_string;
1456
1457 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1458
1459 if (vernum == 0)
1460 version_string = "";
1461 else if (vernum == 1)
1462 version_string = "Base";
1463 else if (vernum <= elf_tdata (abfd)->cverdefs)
1464 version_string =
1465 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1466 else
1467 {
1468 Elf_Internal_Verneed *t;
1469
1470 version_string = "";
1471 for (t = elf_tdata (abfd)->verref;
1472 t != NULL;
1473 t = t->vn_nextref)
1474 {
1475 Elf_Internal_Vernaux *a;
1476
1477 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1478 {
1479 if (a->vna_other == vernum)
1480 {
1481 version_string = a->vna_nodename;
1482 break;
1483 }
1484 }
1485 }
1486 }
1487
1488 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1489 fprintf (file, " %-11s", version_string);
1490 else
1491 {
1492 int i;
1493
1494 fprintf (file, " (%s)", version_string);
1495 for (i = 10 - strlen (version_string); i > 0; --i)
1496 putc (' ', file);
1497 }
1498 }
1499
1500 /* If the st_other field is not zero, print it. */
7a13edea 1501 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1502
7a13edea
NC
1503 switch (st_other)
1504 {
1505 case 0: break;
1506 case STV_INTERNAL: fprintf (file, " .internal"); break;
1507 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1508 case STV_PROTECTED: fprintf (file, " .protected"); break;
1509 default:
1510 /* Some other non-defined flags are also present, so print
1511 everything hex. */
1512 fprintf (file, " 0x%02x", (unsigned int) st_other);
1513 }
252b5132 1514
587ff49e 1515 fprintf (file, " %s", name);
252b5132
RH
1516 }
1517 break;
1518 }
1519}
252b5132 1520
252b5132
RH
1521/* Allocate an ELF string table--force the first byte to be zero. */
1522
1523struct bfd_strtab_hash *
217aa764 1524_bfd_elf_stringtab_init (void)
252b5132
RH
1525{
1526 struct bfd_strtab_hash *ret;
1527
1528 ret = _bfd_stringtab_init ();
1529 if (ret != NULL)
1530 {
1531 bfd_size_type loc;
1532
b34976b6 1533 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1534 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1535 if (loc == (bfd_size_type) -1)
1536 {
1537 _bfd_stringtab_free (ret);
1538 ret = NULL;
1539 }
1540 }
1541 return ret;
1542}
1543\f
1544/* ELF .o/exec file reading */
1545
c044fabd 1546/* Create a new bfd section from an ELF section header. */
252b5132 1547
b34976b6 1548bfd_boolean
217aa764 1549bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1550{
4fbb74a6
AM
1551 Elf_Internal_Shdr *hdr;
1552 Elf_Internal_Ehdr *ehdr;
1553 const struct elf_backend_data *bed;
90937f86 1554 const char *name;
252b5132 1555
4fbb74a6
AM
1556 if (shindex >= elf_numsections (abfd))
1557 return FALSE;
1558
1559 hdr = elf_elfsections (abfd)[shindex];
1560 ehdr = elf_elfheader (abfd);
1561 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1562 hdr->sh_name);
933d961a
JJ
1563 if (name == NULL)
1564 return FALSE;
252b5132 1565
4fbb74a6 1566 bed = get_elf_backend_data (abfd);
252b5132
RH
1567 switch (hdr->sh_type)
1568 {
1569 case SHT_NULL:
1570 /* Inactive section. Throw it away. */
b34976b6 1571 return TRUE;
252b5132
RH
1572
1573 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1574 case SHT_NOBITS: /* .bss section. */
1575 case SHT_HASH: /* .hash section. */
1576 case SHT_NOTE: /* .note section. */
25e27870
L
1577 case SHT_INIT_ARRAY: /* .init_array section. */
1578 case SHT_FINI_ARRAY: /* .fini_array section. */
1579 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1580 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1581 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1582 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1583
797fc050 1584 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1585 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1586 return FALSE;
cfcac11d
NC
1587 if (hdr->sh_link > elf_numsections (abfd))
1588 {
caa83f8b 1589 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1590 field set to SHN_BEFORE or SHN_AFTER. */
1591 switch (bfd_get_arch (abfd))
1592 {
caa83f8b 1593 case bfd_arch_i386:
cfcac11d
NC
1594 case bfd_arch_sparc:
1595 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1596 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1597 break;
1598 /* Otherwise fall through. */
1599 default:
1600 return FALSE;
1601 }
1602 }
1603 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
8e0ed13f 1604 return FALSE;
cfcac11d 1605 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1606 {
1607 Elf_Internal_Shdr *dynsymhdr;
1608
1609 /* The shared libraries distributed with hpux11 have a bogus
1610 sh_link field for the ".dynamic" section. Find the
1611 string table for the ".dynsym" section instead. */
1612 if (elf_dynsymtab (abfd) != 0)
1613 {
1614 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1615 hdr->sh_link = dynsymhdr->sh_link;
1616 }
1617 else
1618 {
1619 unsigned int i, num_sec;
1620
1621 num_sec = elf_numsections (abfd);
1622 for (i = 1; i < num_sec; i++)
1623 {
1624 dynsymhdr = elf_elfsections (abfd)[i];
1625 if (dynsymhdr->sh_type == SHT_DYNSYM)
1626 {
1627 hdr->sh_link = dynsymhdr->sh_link;
1628 break;
1629 }
1630 }
1631 }
1632 }
1633 break;
1634
252b5132
RH
1635 case SHT_SYMTAB: /* A symbol table */
1636 if (elf_onesymtab (abfd) == shindex)
b34976b6 1637 return TRUE;
252b5132 1638
a50b2160
JJ
1639 if (hdr->sh_entsize != bed->s->sizeof_sym)
1640 return FALSE;
3337c1e5 1641 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
1642 {
1643 if (hdr->sh_size != 0)
1644 return FALSE;
1645 /* Some assemblers erroneously set sh_info to one with a
1646 zero sh_size. ld sees this as a global symbol count
1647 of (unsigned) -1. Fix it here. */
1648 hdr->sh_info = 0;
1649 return TRUE;
1650 }
252b5132
RH
1651 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1652 elf_onesymtab (abfd) = shindex;
1653 elf_tdata (abfd)->symtab_hdr = *hdr;
1654 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1655 abfd->flags |= HAS_SYMS;
1656
1657 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1658 SHF_ALLOC is set, and this is a shared object, then we also
1659 treat this section as a BFD section. We can not base the
1660 decision purely on SHF_ALLOC, because that flag is sometimes
1661 set in a relocatable object file, which would confuse the
1662 linker. */
252b5132
RH
1663 if ((hdr->sh_flags & SHF_ALLOC) != 0
1664 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1665 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1666 shindex))
b34976b6 1667 return FALSE;
252b5132 1668
1b3a8575
AM
1669 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1670 can't read symbols without that section loaded as well. It
1671 is most likely specified by the next section header. */
1672 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1673 {
1674 unsigned int i, num_sec;
1675
1676 num_sec = elf_numsections (abfd);
1677 for (i = shindex + 1; i < num_sec; i++)
1678 {
1679 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1680 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1681 && hdr2->sh_link == shindex)
1682 break;
1683 }
1684 if (i == num_sec)
1685 for (i = 1; i < shindex; i++)
1686 {
1687 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1688 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1689 && hdr2->sh_link == shindex)
1690 break;
1691 }
1692 if (i != shindex)
1693 return bfd_section_from_shdr (abfd, i);
1694 }
b34976b6 1695 return TRUE;
252b5132
RH
1696
1697 case SHT_DYNSYM: /* A dynamic symbol table */
1698 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1699 return TRUE;
252b5132 1700
a50b2160
JJ
1701 if (hdr->sh_entsize != bed->s->sizeof_sym)
1702 return FALSE;
eee3b786
AM
1703 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1704 {
1705 if (hdr->sh_size != 0)
1706 return FALSE;
1707 /* Some linkers erroneously set sh_info to one with a
1708 zero sh_size. ld sees this as a global symbol count
1709 of (unsigned) -1. Fix it here. */
1710 hdr->sh_info = 0;
1711 return TRUE;
1712 }
252b5132
RH
1713 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1714 elf_dynsymtab (abfd) = shindex;
1715 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1716 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1717 abfd->flags |= HAS_SYMS;
1718
1719 /* Besides being a symbol table, we also treat this as a regular
1720 section, so that objcopy can handle it. */
6dc132d9 1721 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1722
9ad5cbcf
AM
1723 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1724 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1725 return TRUE;
9ad5cbcf 1726
1b3a8575 1727 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1728 elf_symtab_shndx (abfd) = shindex;
1729 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1730 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1731 return TRUE;
9ad5cbcf 1732
252b5132
RH
1733 case SHT_STRTAB: /* A string table */
1734 if (hdr->bfd_section != NULL)
b34976b6 1735 return TRUE;
252b5132
RH
1736 if (ehdr->e_shstrndx == shindex)
1737 {
1738 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1739 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1740 return TRUE;
252b5132 1741 }
1b3a8575
AM
1742 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1743 {
1744 symtab_strtab:
1745 elf_tdata (abfd)->strtab_hdr = *hdr;
1746 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1747 return TRUE;
1748 }
1749 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1750 {
1751 dynsymtab_strtab:
1752 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1753 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1754 elf_elfsections (abfd)[shindex] = hdr;
1755 /* We also treat this as a regular section, so that objcopy
1756 can handle it. */
6dc132d9
L
1757 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1758 shindex);
1b3a8575 1759 }
252b5132 1760
1b3a8575
AM
1761 /* If the string table isn't one of the above, then treat it as a
1762 regular section. We need to scan all the headers to be sure,
1763 just in case this strtab section appeared before the above. */
1764 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1765 {
1766 unsigned int i, num_sec;
252b5132 1767
1b3a8575
AM
1768 num_sec = elf_numsections (abfd);
1769 for (i = 1; i < num_sec; i++)
1770 {
1771 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1772 if (hdr2->sh_link == shindex)
1773 {
933d961a
JJ
1774 /* Prevent endless recursion on broken objects. */
1775 if (i == shindex)
1776 return FALSE;
1b3a8575
AM
1777 if (! bfd_section_from_shdr (abfd, i))
1778 return FALSE;
1779 if (elf_onesymtab (abfd) == i)
1780 goto symtab_strtab;
1781 if (elf_dynsymtab (abfd) == i)
1782 goto dynsymtab_strtab;
1783 }
1784 }
1785 }
6dc132d9 1786 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1787
1788 case SHT_REL:
1789 case SHT_RELA:
1790 /* *These* do a lot of work -- but build no sections! */
1791 {
1792 asection *target_sect;
d4730f92 1793 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 1794 unsigned int num_sec = elf_numsections (abfd);
d4730f92
BS
1795 struct bfd_elf_section_data *esdt;
1796 bfd_size_type amt;
252b5132 1797
aa2ca951
JJ
1798 if (hdr->sh_entsize
1799 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1800 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1801 return FALSE;
1802
03ae5f59 1803 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1804 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1805 {
1806 ((*_bfd_error_handler)
d003868e
AM
1807 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1808 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1809 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1810 shindex);
03ae5f59
ILT
1811 }
1812
252b5132
RH
1813 /* For some incomprehensible reason Oracle distributes
1814 libraries for Solaris in which some of the objects have
1815 bogus sh_link fields. It would be nice if we could just
1816 reject them, but, unfortunately, some people need to use
1817 them. We scan through the section headers; if we find only
1818 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1819 to it. I hope this doesn't break anything.
1820
1821 Don't do it on executable nor shared library. */
1822 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1823 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1824 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1825 {
9ad5cbcf 1826 unsigned int scan;
252b5132
RH
1827 int found;
1828
1829 found = 0;
9ad5cbcf 1830 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1831 {
1832 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1833 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1834 {
1835 if (found != 0)
1836 {
1837 found = 0;
1838 break;
1839 }
1840 found = scan;
1841 }
1842 }
1843 if (found != 0)
1844 hdr->sh_link = found;
1845 }
1846
1847 /* Get the symbol table. */
1b3a8575
AM
1848 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1849 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1850 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1851 return FALSE;
252b5132
RH
1852
1853 /* If this reloc section does not use the main symbol table we
1854 don't treat it as a reloc section. BFD can't adequately
1855 represent such a section, so at least for now, we don't
c044fabd 1856 try. We just present it as a normal section. We also
60bcf0fa 1857 can't use it as a reloc section if it points to the null
83b89087
L
1858 section, an invalid section, another reloc section, or its
1859 sh_link points to the null section. */
185ef66d 1860 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1861 || hdr->sh_link == SHN_UNDEF
185ef66d 1862 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1863 || hdr->sh_info >= num_sec
1864 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1865 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1866 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1867 shindex);
252b5132
RH
1868
1869 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1870 return FALSE;
252b5132
RH
1871 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1872 if (target_sect == NULL)
b34976b6 1873 return FALSE;
252b5132 1874
d4730f92
BS
1875 esdt = elf_section_data (target_sect);
1876 if (hdr->sh_type == SHT_RELA)
1877 p_hdr = &esdt->rela.hdr;
252b5132 1878 else
d4730f92
BS
1879 p_hdr = &esdt->rel.hdr;
1880
1881 BFD_ASSERT (*p_hdr == NULL);
1882 amt = sizeof (*hdr2);
1883 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
1884 if (hdr2 == NULL)
1885 return FALSE;
252b5132 1886 *hdr2 = *hdr;
d4730f92 1887 *p_hdr = hdr2;
252b5132 1888 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1889 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1890 target_sect->flags |= SEC_RELOC;
1891 target_sect->relocation = NULL;
1892 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1893 /* In the section to which the relocations apply, mark whether
1894 its relocations are of the REL or RELA variety. */
72730e0c 1895 if (hdr->sh_size != 0)
d4730f92
BS
1896 {
1897 if (hdr->sh_type == SHT_RELA)
1898 target_sect->use_rela_p = 1;
1899 }
252b5132 1900 abfd->flags |= HAS_RELOC;
b34976b6 1901 return TRUE;
252b5132 1902 }
252b5132
RH
1903
1904 case SHT_GNU_verdef:
1905 elf_dynverdef (abfd) = shindex;
1906 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1907 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1908
1909 case SHT_GNU_versym:
a50b2160
JJ
1910 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1911 return FALSE;
252b5132
RH
1912 elf_dynversym (abfd) = shindex;
1913 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1914 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1915
1916 case SHT_GNU_verneed:
1917 elf_dynverref (abfd) = shindex;
1918 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1919 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1920
1921 case SHT_SHLIB:
b34976b6 1922 return TRUE;
252b5132 1923
dbb410c3 1924 case SHT_GROUP:
44534af3 1925 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
a50b2160 1926 return FALSE;
6dc132d9 1927 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1928 return FALSE;
dbb410c3
AM
1929 if (hdr->contents != NULL)
1930 {
1931 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1932 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1933 asection *s;
1934
b885599b
AM
1935 if (idx->flags & GRP_COMDAT)
1936 hdr->bfd_section->flags
1937 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1938
45c5e9ed
L
1939 /* We try to keep the same section order as it comes in. */
1940 idx += n_elt;
dbb410c3 1941 while (--n_elt != 0)
1783205a
NC
1942 {
1943 --idx;
1944
1945 if (idx->shdr != NULL
1946 && (s = idx->shdr->bfd_section) != NULL
1947 && elf_next_in_group (s) != NULL)
1948 {
1949 elf_next_in_group (hdr->bfd_section) = s;
1950 break;
1951 }
1952 }
dbb410c3
AM
1953 }
1954 break;
1955
252b5132 1956 default:
104d59d1
JM
1957 /* Possibly an attributes section. */
1958 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1959 || hdr->sh_type == bed->obj_attrs_section_type)
1960 {
1961 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1962 return FALSE;
1963 _bfd_elf_parse_attributes (abfd, hdr);
1964 return TRUE;
1965 }
1966
252b5132 1967 /* Check for any processor-specific section types. */
3eb70a79
L
1968 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1969 return TRUE;
1970
1971 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1972 {
1973 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1974 /* FIXME: How to properly handle allocated section reserved
1975 for applications? */
1976 (*_bfd_error_handler)
1977 (_("%B: don't know how to handle allocated, application "
1978 "specific section `%s' [0x%8x]"),
1979 abfd, name, hdr->sh_type);
1980 else
1981 /* Allow sections reserved for applications. */
1982 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1983 shindex);
1984 }
1985 else if (hdr->sh_type >= SHT_LOPROC
1986 && hdr->sh_type <= SHT_HIPROC)
1987 /* FIXME: We should handle this section. */
1988 (*_bfd_error_handler)
1989 (_("%B: don't know how to handle processor specific section "
1990 "`%s' [0x%8x]"),
1991 abfd, name, hdr->sh_type);
1992 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1993 {
1994 /* Unrecognised OS-specific sections. */
1995 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1996 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1997 required to correctly process the section and the file should
ff15b240
NC
1998 be rejected with an error message. */
1999 (*_bfd_error_handler)
2000 (_("%B: don't know how to handle OS specific section "
2001 "`%s' [0x%8x]"),
2002 abfd, name, hdr->sh_type);
2003 else
2004 /* Otherwise it should be processed. */
2005 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2006 }
3eb70a79
L
2007 else
2008 /* FIXME: We should handle this section. */
2009 (*_bfd_error_handler)
2010 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2011 abfd, name, hdr->sh_type);
2012
2013 return FALSE;
252b5132
RH
2014 }
2015
b34976b6 2016 return TRUE;
252b5132
RH
2017}
2018
87d72d41 2019/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2020
87d72d41
AM
2021Elf_Internal_Sym *
2022bfd_sym_from_r_symndx (struct sym_cache *cache,
2023 bfd *abfd,
2024 unsigned long r_symndx)
ec338859 2025{
ec338859
AM
2026 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2027
a5d1b3b5
AM
2028 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2029 {
2030 Elf_Internal_Shdr *symtab_hdr;
2031 unsigned char esym[sizeof (Elf64_External_Sym)];
2032 Elf_External_Sym_Shndx eshndx;
ec338859 2033
a5d1b3b5
AM
2034 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2035 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2036 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2037 return NULL;
9ad5cbcf 2038
a5d1b3b5
AM
2039 if (cache->abfd != abfd)
2040 {
2041 memset (cache->indx, -1, sizeof (cache->indx));
2042 cache->abfd = abfd;
2043 }
2044 cache->indx[ent] = r_symndx;
ec338859 2045 }
a5d1b3b5 2046
87d72d41 2047 return &cache->sym[ent];
ec338859
AM
2048}
2049
252b5132
RH
2050/* Given an ELF section number, retrieve the corresponding BFD
2051 section. */
2052
2053asection *
91d6fa6a 2054bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2055{
91d6fa6a 2056 if (sec_index >= elf_numsections (abfd))
252b5132 2057 return NULL;
91d6fa6a 2058 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2059}
2060
b35d266b 2061static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2062{
0112cd26
NC
2063 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2064 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2065};
2066
b35d266b 2067static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2068{
0112cd26
NC
2069 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2070 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2071};
2072
b35d266b 2073static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2074{
0112cd26
NC
2075 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2076 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2077 /* There are more DWARF sections than these, but they needn't be added here
2078 unless you have to cope with broken compilers that don't emit section
2079 attributes or you want to help the user writing assembler. */
0112cd26
NC
2080 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2081 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2082 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2083 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2084 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2085 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2086 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2087 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2088 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2089};
2090
b35d266b 2091static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2092{
0112cd26
NC
2093 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2094 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2095 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2096};
2097
b35d266b 2098static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2099{
0112cd26 2100 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2101 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2102 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2103 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2104 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2105 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2106 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2107 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2108 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2109 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2110};
2111
b35d266b 2112static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2113{
0112cd26
NC
2114 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2115 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2116};
2117
b35d266b 2118static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2119{
0112cd26
NC
2120 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2121 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2122 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2123 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2124};
2125
b35d266b 2126static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2127{
0112cd26
NC
2128 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2129 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2130};
2131
b35d266b 2132static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2133{
0112cd26
NC
2134 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2135 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2136 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2137};
2138
b35d266b 2139static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2140{
0112cd26
NC
2141 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2142 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2143 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2144};
2145
b35d266b 2146static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2147{
0112cd26
NC
2148 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2149 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2150 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2151 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2152 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2153};
2154
b35d266b 2155static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2156{
0112cd26
NC
2157 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2158 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2159 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2160 /* See struct bfd_elf_special_section declaration for the semantics of
2161 this special case where .prefix_length != strlen (.prefix). */
2162 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2163 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2164};
2165
b35d266b 2166static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2167{
0112cd26
NC
2168 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2169 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2170 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2171 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2172};
2173
1b315056
CS
2174static const struct bfd_elf_special_section special_sections_z[] =
2175{
2176 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2177 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2178 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2179 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2180 { NULL, 0, 0, 0, 0 }
2181};
2182
e4c93b56 2183static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2184{
7f4d3958 2185 special_sections_b, /* 'b' */
98ece1b3 2186 special_sections_c, /* 'c' */
7f4d3958
L
2187 special_sections_d, /* 'd' */
2188 NULL, /* 'e' */
2189 special_sections_f, /* 'f' */
2190 special_sections_g, /* 'g' */
2191 special_sections_h, /* 'h' */
2192 special_sections_i, /* 'i' */
2193 NULL, /* 'j' */
2194 NULL, /* 'k' */
2195 special_sections_l, /* 'l' */
2196 NULL, /* 'm' */
2197 special_sections_n, /* 'n' */
2198 NULL, /* 'o' */
2199 special_sections_p, /* 'p' */
2200 NULL, /* 'q' */
2201 special_sections_r, /* 'r' */
2202 special_sections_s, /* 's' */
2203 special_sections_t, /* 't' */
1b315056
CS
2204 NULL, /* 'u' */
2205 NULL, /* 'v' */
2206 NULL, /* 'w' */
2207 NULL, /* 'x' */
2208 NULL, /* 'y' */
2209 special_sections_z /* 'z' */
7f4d3958
L
2210};
2211
551b43fd
AM
2212const struct bfd_elf_special_section *
2213_bfd_elf_get_special_section (const char *name,
2214 const struct bfd_elf_special_section *spec,
2215 unsigned int rela)
2f89ff8d
L
2216{
2217 int i;
7f4d3958 2218 int len;
7f4d3958 2219
551b43fd 2220 len = strlen (name);
7f4d3958 2221
551b43fd 2222 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2223 {
2224 int suffix_len;
551b43fd 2225 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2226
2227 if (len < prefix_len)
2228 continue;
551b43fd 2229 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2230 continue;
2231
551b43fd 2232 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2233 if (suffix_len <= 0)
2234 {
2235 if (name[prefix_len] != 0)
2236 {
2237 if (suffix_len == 0)
2238 continue;
2239 if (name[prefix_len] != '.'
2240 && (suffix_len == -2
551b43fd 2241 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2242 continue;
2243 }
2244 }
2245 else
2246 {
2247 if (len < prefix_len + suffix_len)
2248 continue;
2249 if (memcmp (name + len - suffix_len,
551b43fd 2250 spec[i].prefix + prefix_len,
7dcb9820
AM
2251 suffix_len) != 0)
2252 continue;
2253 }
551b43fd 2254 return &spec[i];
7dcb9820 2255 }
2f89ff8d
L
2256
2257 return NULL;
2258}
2259
7dcb9820 2260const struct bfd_elf_special_section *
29ef7005 2261_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2262{
551b43fd
AM
2263 int i;
2264 const struct bfd_elf_special_section *spec;
29ef7005 2265 const struct elf_backend_data *bed;
2f89ff8d
L
2266
2267 /* See if this is one of the special sections. */
551b43fd
AM
2268 if (sec->name == NULL)
2269 return NULL;
2f89ff8d 2270
29ef7005
L
2271 bed = get_elf_backend_data (abfd);
2272 spec = bed->special_sections;
2273 if (spec)
2274 {
2275 spec = _bfd_elf_get_special_section (sec->name,
2276 bed->special_sections,
2277 sec->use_rela_p);
2278 if (spec != NULL)
2279 return spec;
2280 }
2281
551b43fd
AM
2282 if (sec->name[0] != '.')
2283 return NULL;
2f89ff8d 2284
551b43fd 2285 i = sec->name[1] - 'b';
1b315056 2286 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2287 return NULL;
2288
2289 spec = special_sections[i];
2f89ff8d 2290
551b43fd
AM
2291 if (spec == NULL)
2292 return NULL;
2293
2294 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2295}
2296
b34976b6 2297bfd_boolean
217aa764 2298_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2299{
2300 struct bfd_elf_section_data *sdata;
551b43fd 2301 const struct elf_backend_data *bed;
7dcb9820 2302 const struct bfd_elf_special_section *ssect;
252b5132 2303
f0abc2a1
AM
2304 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2305 if (sdata == NULL)
2306 {
a50b1753
NC
2307 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2308 sizeof (*sdata));
f0abc2a1
AM
2309 if (sdata == NULL)
2310 return FALSE;
217aa764 2311 sec->used_by_bfd = sdata;
f0abc2a1 2312 }
bf572ba0 2313
551b43fd
AM
2314 /* Indicate whether or not this section should use RELA relocations. */
2315 bed = get_elf_backend_data (abfd);
2316 sec->use_rela_p = bed->default_use_rela_p;
2317
e843e0f8
L
2318 /* When we read a file, we don't need to set ELF section type and
2319 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2320 anyway. We will set ELF section type and flags for all linker
2321 created sections. If user specifies BFD section flags, we will
2322 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2323 elf_fake_sections. Special handling for .init_array/.fini_array
2324 output sections since they may contain .ctors/.dtors input
2325 sections. We don't want _bfd_elf_init_private_section_data to
2326 copy ELF section type from .ctors/.dtors input sections. */
2327 if (abfd->direction != read_direction
3496cb2a 2328 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2329 {
551b43fd 2330 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2331 if (ssect != NULL
2332 && (!sec->flags
2333 || (sec->flags & SEC_LINKER_CREATED) != 0
2334 || ssect->type == SHT_INIT_ARRAY
2335 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2336 {
2337 elf_section_type (sec) = ssect->type;
2338 elf_section_flags (sec) = ssect->attr;
2339 }
2f89ff8d
L
2340 }
2341
f592407e 2342 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2343}
2344
2345/* Create a new bfd section from an ELF program header.
2346
2347 Since program segments have no names, we generate a synthetic name
2348 of the form segment<NUM>, where NUM is generally the index in the
2349 program header table. For segments that are split (see below) we
2350 generate the names segment<NUM>a and segment<NUM>b.
2351
2352 Note that some program segments may have a file size that is different than
2353 (less than) the memory size. All this means is that at execution the
2354 system must allocate the amount of memory specified by the memory size,
2355 but only initialize it with the first "file size" bytes read from the
2356 file. This would occur for example, with program segments consisting
2357 of combined data+bss.
2358
2359 To handle the above situation, this routine generates TWO bfd sections
2360 for the single program segment. The first has the length specified by
2361 the file size of the segment, and the second has the length specified
2362 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2363 into its initialized and uninitialized parts.
252b5132
RH
2364
2365 */
2366
b34976b6 2367bfd_boolean
217aa764
AM
2368_bfd_elf_make_section_from_phdr (bfd *abfd,
2369 Elf_Internal_Phdr *hdr,
91d6fa6a 2370 int hdr_index,
a50b1753 2371 const char *type_name)
252b5132
RH
2372{
2373 asection *newsect;
2374 char *name;
2375 char namebuf[64];
d4c88bbb 2376 size_t len;
252b5132
RH
2377 int split;
2378
2379 split = ((hdr->p_memsz > 0)
2380 && (hdr->p_filesz > 0)
2381 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2382
2383 if (hdr->p_filesz > 0)
252b5132 2384 {
91d6fa6a 2385 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2386 len = strlen (namebuf) + 1;
a50b1753 2387 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2388 if (!name)
2389 return FALSE;
2390 memcpy (name, namebuf, len);
2391 newsect = bfd_make_section (abfd, name);
2392 if (newsect == NULL)
2393 return FALSE;
2394 newsect->vma = hdr->p_vaddr;
2395 newsect->lma = hdr->p_paddr;
2396 newsect->size = hdr->p_filesz;
2397 newsect->filepos = hdr->p_offset;
2398 newsect->flags |= SEC_HAS_CONTENTS;
2399 newsect->alignment_power = bfd_log2 (hdr->p_align);
2400 if (hdr->p_type == PT_LOAD)
252b5132 2401 {
d5191d0c
AM
2402 newsect->flags |= SEC_ALLOC;
2403 newsect->flags |= SEC_LOAD;
2404 if (hdr->p_flags & PF_X)
2405 {
2406 /* FIXME: all we known is that it has execute PERMISSION,
2407 may be data. */
2408 newsect->flags |= SEC_CODE;
2409 }
2410 }
2411 if (!(hdr->p_flags & PF_W))
2412 {
2413 newsect->flags |= SEC_READONLY;
252b5132 2414 }
252b5132
RH
2415 }
2416
d5191d0c 2417 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2418 {
d5191d0c
AM
2419 bfd_vma align;
2420
91d6fa6a 2421 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2422 len = strlen (namebuf) + 1;
a50b1753 2423 name = (char *) bfd_alloc (abfd, len);
252b5132 2424 if (!name)
b34976b6 2425 return FALSE;
d4c88bbb 2426 memcpy (name, namebuf, len);
252b5132
RH
2427 newsect = bfd_make_section (abfd, name);
2428 if (newsect == NULL)
b34976b6 2429 return FALSE;
252b5132
RH
2430 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2431 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2432 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2433 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2434 align = newsect->vma & -newsect->vma;
2435 if (align == 0 || align > hdr->p_align)
2436 align = hdr->p_align;
2437 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2438 if (hdr->p_type == PT_LOAD)
2439 {
d5191d0c
AM
2440 /* Hack for gdb. Segments that have not been modified do
2441 not have their contents written to a core file, on the
2442 assumption that a debugger can find the contents in the
2443 executable. We flag this case by setting the fake
2444 section size to zero. Note that "real" bss sections will
2445 always have their contents dumped to the core file. */
2446 if (bfd_get_format (abfd) == bfd_core)
2447 newsect->size = 0;
252b5132
RH
2448 newsect->flags |= SEC_ALLOC;
2449 if (hdr->p_flags & PF_X)
2450 newsect->flags |= SEC_CODE;
2451 }
2452 if (!(hdr->p_flags & PF_W))
2453 newsect->flags |= SEC_READONLY;
2454 }
2455
b34976b6 2456 return TRUE;
252b5132
RH
2457}
2458
b34976b6 2459bfd_boolean
91d6fa6a 2460bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2461{
9c5bfbb7 2462 const struct elf_backend_data *bed;
20cfcaae
NC
2463
2464 switch (hdr->p_type)
2465 {
2466 case PT_NULL:
91d6fa6a 2467 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2468
2469 case PT_LOAD:
91d6fa6a 2470 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2471
2472 case PT_DYNAMIC:
91d6fa6a 2473 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2474
2475 case PT_INTERP:
91d6fa6a 2476 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2477
2478 case PT_NOTE:
91d6fa6a 2479 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2480 return FALSE;
718175fa 2481 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2482 return FALSE;
2483 return TRUE;
20cfcaae
NC
2484
2485 case PT_SHLIB:
91d6fa6a 2486 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2487
2488 case PT_PHDR:
91d6fa6a 2489 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2490
811072d8 2491 case PT_GNU_EH_FRAME:
91d6fa6a 2492 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2493 "eh_frame_hdr");
2494
2b05f1b7 2495 case PT_GNU_STACK:
91d6fa6a 2496 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2497
8c37241b 2498 case PT_GNU_RELRO:
91d6fa6a 2499 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2500
20cfcaae 2501 default:
8c1acd09 2502 /* Check for any processor-specific program segment types. */
20cfcaae 2503 bed = get_elf_backend_data (abfd);
91d6fa6a 2504 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2505 }
2506}
2507
d4730f92
BS
2508/* Return the REL_HDR for SEC, assuming there is only a single one, either
2509 REL or RELA. */
2510
2511Elf_Internal_Shdr *
2512_bfd_elf_single_rel_hdr (asection *sec)
2513{
2514 if (elf_section_data (sec)->rel.hdr)
2515 {
2516 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
2517 return elf_section_data (sec)->rel.hdr;
2518 }
2519 else
2520 return elf_section_data (sec)->rela.hdr;
2521}
2522
2523/* Allocate and initialize a section-header for a new reloc section,
2524 containing relocations against ASECT. It is stored in RELDATA. If
2525 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
2526 relocations. */
23bc299b 2527
5d13b3b3 2528static bfd_boolean
217aa764 2529_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 2530 struct bfd_elf_section_reloc_data *reldata,
217aa764
AM
2531 asection *asect,
2532 bfd_boolean use_rela_p)
23bc299b 2533{
d4730f92 2534 Elf_Internal_Shdr *rel_hdr;
23bc299b 2535 char *name;
9c5bfbb7 2536 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92
BS
2537 bfd_size_type amt;
2538
2539 amt = sizeof (Elf_Internal_Shdr);
2540 BFD_ASSERT (reldata->hdr == NULL);
2541 rel_hdr = bfd_zalloc (abfd, amt);
2542 reldata->hdr = rel_hdr;
23bc299b 2543
d324f6d6 2544 amt = sizeof ".rela" + strlen (asect->name);
a50b1753 2545 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2546 if (name == NULL)
b34976b6 2547 return FALSE;
23bc299b
MM
2548 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2549 rel_hdr->sh_name =
2b0f7ef9 2550 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2551 FALSE);
23bc299b 2552 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2553 return FALSE;
23bc299b
MM
2554 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2555 rel_hdr->sh_entsize = (use_rela_p
2556 ? bed->s->sizeof_rela
2557 : bed->s->sizeof_rel);
72de5009 2558 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2559 rel_hdr->sh_flags = 0;
2560 rel_hdr->sh_addr = 0;
2561 rel_hdr->sh_size = 0;
2562 rel_hdr->sh_offset = 0;
2563
b34976b6 2564 return TRUE;
23bc299b
MM
2565}
2566
94be91de
JB
2567/* Return the default section type based on the passed in section flags. */
2568
2569int
2570bfd_elf_get_default_section_type (flagword flags)
2571{
2572 if ((flags & SEC_ALLOC) != 0
2e76e85a 2573 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
2574 return SHT_NOBITS;
2575 return SHT_PROGBITS;
2576}
2577
d4730f92
BS
2578struct fake_section_arg
2579{
2580 struct bfd_link_info *link_info;
2581 bfd_boolean failed;
2582};
2583
252b5132
RH
2584/* Set up an ELF internal section header for a section. */
2585
252b5132 2586static void
d4730f92 2587elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 2588{
d4730f92 2589 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 2590 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 2591 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 2592 Elf_Internal_Shdr *this_hdr;
0414f35b 2593 unsigned int sh_type;
252b5132 2594
d4730f92 2595 if (arg->failed)
252b5132
RH
2596 {
2597 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2598 loop. */
252b5132
RH
2599 return;
2600 }
2601
d4730f92 2602 this_hdr = &esd->this_hdr;
252b5132 2603
e57b5356
AM
2604 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2605 asect->name, FALSE);
2606 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2607 {
d4730f92 2608 arg->failed = TRUE;
252b5132
RH
2609 return;
2610 }
2611
a4d8e49b 2612 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2613
2614 if ((asect->flags & SEC_ALLOC) != 0
2615 || asect->user_set_vma)
2616 this_hdr->sh_addr = asect->vma;
2617 else
2618 this_hdr->sh_addr = 0;
2619
2620 this_hdr->sh_offset = 0;
eea6121a 2621 this_hdr->sh_size = asect->size;
252b5132 2622 this_hdr->sh_link = 0;
72de5009 2623 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2624 /* The sh_entsize and sh_info fields may have been set already by
2625 copy_private_section_data. */
2626
2627 this_hdr->bfd_section = asect;
2628 this_hdr->contents = NULL;
2629
3cddba1e
L
2630 /* If the section type is unspecified, we set it based on
2631 asect->flags. */
98ece1b3
AM
2632 if ((asect->flags & SEC_GROUP) != 0)
2633 sh_type = SHT_GROUP;
98ece1b3 2634 else
94be91de 2635 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2636
3cddba1e 2637 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2638 this_hdr->sh_type = sh_type;
2639 else if (this_hdr->sh_type == SHT_NOBITS
2640 && sh_type == SHT_PROGBITS
2641 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2642 {
98ece1b3
AM
2643 /* Warn if we are changing a NOBITS section to PROGBITS, but
2644 allow the link to proceed. This can happen when users link
2645 non-bss input sections to bss output sections, or emit data
2646 to a bss output section via a linker script. */
2647 (*_bfd_error_handler)
58f0869b 2648 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2649 this_hdr->sh_type = sh_type;
3cddba1e
L
2650 }
2651
2f89ff8d 2652 switch (this_hdr->sh_type)
252b5132 2653 {
2f89ff8d 2654 default:
2f89ff8d
L
2655 break;
2656
2657 case SHT_STRTAB:
2658 case SHT_INIT_ARRAY:
2659 case SHT_FINI_ARRAY:
2660 case SHT_PREINIT_ARRAY:
2661 case SHT_NOTE:
2662 case SHT_NOBITS:
2663 case SHT_PROGBITS:
2664 break;
2665
2666 case SHT_HASH:
c7ac6ff8 2667 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2668 break;
5de3bf90 2669
2f89ff8d 2670 case SHT_DYNSYM:
252b5132 2671 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2672 break;
2673
2674 case SHT_DYNAMIC:
252b5132 2675 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2676 break;
2677
2678 case SHT_RELA:
2679 if (get_elf_backend_data (abfd)->may_use_rela_p)
2680 this_hdr->sh_entsize = bed->s->sizeof_rela;
2681 break;
2682
2683 case SHT_REL:
2684 if (get_elf_backend_data (abfd)->may_use_rel_p)
2685 this_hdr->sh_entsize = bed->s->sizeof_rel;
2686 break;
2687
2688 case SHT_GNU_versym:
252b5132 2689 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2690 break;
2691
2692 case SHT_GNU_verdef:
252b5132
RH
2693 this_hdr->sh_entsize = 0;
2694 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2695 cverdefs. The linker will set cverdefs, but sh_info will be
2696 zero. */
252b5132
RH
2697 if (this_hdr->sh_info == 0)
2698 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2699 else
2700 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2701 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2702 break;
2703
2704 case SHT_GNU_verneed:
252b5132
RH
2705 this_hdr->sh_entsize = 0;
2706 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2707 cverrefs. The linker will set cverrefs, but sh_info will be
2708 zero. */
252b5132
RH
2709 if (this_hdr->sh_info == 0)
2710 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2711 else
2712 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2713 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2714 break;
2715
2716 case SHT_GROUP:
1783205a 2717 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2718 break;
fdc90cb4
JJ
2719
2720 case SHT_GNU_HASH:
2721 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2722 break;
dbb410c3 2723 }
252b5132
RH
2724
2725 if ((asect->flags & SEC_ALLOC) != 0)
2726 this_hdr->sh_flags |= SHF_ALLOC;
2727 if ((asect->flags & SEC_READONLY) == 0)
2728 this_hdr->sh_flags |= SHF_WRITE;
2729 if ((asect->flags & SEC_CODE) != 0)
2730 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2731 if ((asect->flags & SEC_MERGE) != 0)
2732 {
2733 this_hdr->sh_flags |= SHF_MERGE;
2734 this_hdr->sh_entsize = asect->entsize;
2735 if ((asect->flags & SEC_STRINGS) != 0)
2736 this_hdr->sh_flags |= SHF_STRINGS;
2737 }
1126897b 2738 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2739 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2740 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2741 {
2742 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2743 if (asect->size == 0
2744 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2745 {
3a800eb9 2746 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2747
704afa60 2748 this_hdr->sh_size = 0;
3a800eb9
AM
2749 if (o != NULL)
2750 {
704afa60 2751 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2752 if (this_hdr->sh_size != 0)
2753 this_hdr->sh_type = SHT_NOBITS;
2754 }
704afa60
JJ
2755 }
2756 }
18ae9cc1
L
2757 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
2758 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 2759
d4730f92
BS
2760 /* If the section has relocs, set up a section header for the
2761 SHT_REL[A] section. If two relocation sections are required for
2762 this section, it is up to the processor-specific back-end to
2763 create the other. */
2764 if ((asect->flags & SEC_RELOC) != 0)
2765 {
2766 /* When doing a relocatable link, create both REL and RELA sections if
2767 needed. */
2768 if (arg->link_info
2769 /* Do the normal setup if we wouldn't create any sections here. */
2770 && esd->rel.count + esd->rela.count > 0
2771 && (arg->link_info->relocatable || arg->link_info->emitrelocations))
2772 {
2773 if (esd->rel.count && esd->rel.hdr == NULL
2774 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, asect, FALSE))
2775 {
2776 arg->failed = TRUE;
2777 return;
2778 }
2779 if (esd->rela.count && esd->rela.hdr == NULL
2780 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, asect, TRUE))
2781 {
2782 arg->failed = TRUE;
2783 return;
2784 }
2785 }
2786 else if (!_bfd_elf_init_reloc_shdr (abfd,
2787 (asect->use_rela_p
2788 ? &esd->rela : &esd->rel),
2789 asect,
2790 asect->use_rela_p))
2791 arg->failed = TRUE;
2792 }
2793
252b5132 2794 /* Check for processor-specific section types. */
0414f35b 2795 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2796 if (bed->elf_backend_fake_sections
2797 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 2798 arg->failed = TRUE;
252b5132 2799
42bb2e33 2800 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2801 {
2802 /* Don't change the header type from NOBITS if we are being
42bb2e33 2803 called for objcopy --only-keep-debug. */
0414f35b
AM
2804 this_hdr->sh_type = sh_type;
2805 }
252b5132
RH
2806}
2807
bcacc0f5
AM
2808/* Fill in the contents of a SHT_GROUP section. Called from
2809 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2810 when ELF targets use the generic linker, ld. Called for ld -r
2811 from bfd_elf_final_link. */
dbb410c3 2812
1126897b 2813void
217aa764 2814bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2815{
a50b1753 2816 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2817 asection *elt, *first;
dbb410c3 2818 unsigned char *loc;
b34976b6 2819 bfd_boolean gas;
dbb410c3 2820
7e4111ad
L
2821 /* Ignore linker created group section. See elfNN_ia64_object_p in
2822 elfxx-ia64.c. */
2823 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2824 || *failedptr)
2825 return;
2826
bcacc0f5
AM
2827 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2828 {
2829 unsigned long symindx = 0;
2830
2831 /* elf_group_id will have been set up by objcopy and the
2832 generic linker. */
2833 if (elf_group_id (sec) != NULL)
2834 symindx = elf_group_id (sec)->udata.i;
1126897b 2835
bcacc0f5
AM
2836 if (symindx == 0)
2837 {
2838 /* If called from the assembler, swap_out_syms will have set up
2839 elf_section_syms. */
2840 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2841 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2842 }
2843 elf_section_data (sec)->this_hdr.sh_info = symindx;
2844 }
2845 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2846 {
bcacc0f5
AM
2847 /* The ELF backend linker sets sh_info to -2 when the group
2848 signature symbol is global, and thus the index can't be
2849 set until all local symbols are output. */
2850 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2851 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2852 unsigned long symndx = sec_data->this_hdr.sh_info;
2853 unsigned long extsymoff = 0;
2854 struct elf_link_hash_entry *h;
2855
2856 if (!elf_bad_symtab (igroup->owner))
2857 {
2858 Elf_Internal_Shdr *symtab_hdr;
2859
2860 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2861 extsymoff = symtab_hdr->sh_info;
2862 }
2863 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2864 while (h->root.type == bfd_link_hash_indirect
2865 || h->root.type == bfd_link_hash_warning)
2866 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2867
2868 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2869 }
dbb410c3 2870
1126897b 2871 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2872 gas = TRUE;
dbb410c3
AM
2873 if (sec->contents == NULL)
2874 {
b34976b6 2875 gas = FALSE;
a50b1753 2876 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
2877
2878 /* Arrange for the section to be written out. */
2879 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2880 if (sec->contents == NULL)
2881 {
b34976b6 2882 *failedptr = TRUE;
dbb410c3
AM
2883 return;
2884 }
2885 }
2886
eea6121a 2887 loc = sec->contents + sec->size;
dbb410c3 2888
9dce4196
AM
2889 /* Get the pointer to the first section in the group that gas
2890 squirreled away here. objcopy arranges for this to be set to the
2891 start of the input section group. */
2892 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2893
2894 /* First element is a flag word. Rest of section is elf section
2895 indices for all the sections of the group. Write them backwards
2896 just to keep the group in the same order as given in .section
2897 directives, not that it matters. */
2898 while (elt != NULL)
2899 {
9dce4196 2900 asection *s;
9dce4196 2901
9dce4196 2902 s = elt;
415f38a6
AM
2903 if (!gas)
2904 s = s->output_section;
2905 if (s != NULL
2906 && !bfd_is_abs_section (s))
01e1a5bc 2907 {
415f38a6
AM
2908 unsigned int idx = elf_section_data (s)->this_idx;
2909
01e1a5bc 2910 loc -= 4;
01e1a5bc
NC
2911 H_PUT_32 (abfd, idx, loc);
2912 }
945906ff 2913 elt = elf_next_in_group (elt);
9dce4196
AM
2914 if (elt == first)
2915 break;
dbb410c3
AM
2916 }
2917
3d7f7666 2918 if ((loc -= 4) != sec->contents)
9dce4196 2919 abort ();
dbb410c3 2920
9dce4196 2921 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2922}
2923
252b5132
RH
2924/* Assign all ELF section numbers. The dummy first section is handled here
2925 too. The link/info pointers for the standard section types are filled
2926 in here too, while we're at it. */
2927
b34976b6 2928static bfd_boolean
da9f89d4 2929assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2930{
2931 struct elf_obj_tdata *t = elf_tdata (abfd);
2932 asection *sec;
2b0f7ef9 2933 unsigned int section_number, secn;
252b5132 2934 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2935 struct bfd_elf_section_data *d;
3516e984 2936 bfd_boolean need_symtab;
252b5132
RH
2937
2938 section_number = 1;
2939
2b0f7ef9
JJ
2940 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2941
da9f89d4
L
2942 /* SHT_GROUP sections are in relocatable files only. */
2943 if (link_info == NULL || link_info->relocatable)
252b5132 2944 {
da9f89d4 2945 /* Put SHT_GROUP sections first. */
04dd1667 2946 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2947 {
5daa8fe7 2948 d = elf_section_data (sec);
da9f89d4
L
2949
2950 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2951 {
5daa8fe7 2952 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2953 {
2954 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2955 bfd_section_list_remove (abfd, sec);
da9f89d4 2956 abfd->section_count--;
da9f89d4 2957 }
08a40648 2958 else
4fbb74a6 2959 d->this_idx = section_number++;
da9f89d4 2960 }
47cc2cf5
PB
2961 }
2962 }
2963
2964 for (sec = abfd->sections; sec; sec = sec->next)
2965 {
2966 d = elf_section_data (sec);
2967
2968 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2969 d->this_idx = section_number++;
2b0f7ef9 2970 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 2971 if (d->rel.hdr)
2b0f7ef9 2972 {
d4730f92
BS
2973 d->rel.idx = section_number++;
2974 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 2975 }
d4730f92
BS
2976 else
2977 d->rel.idx = 0;
23bc299b 2978
d4730f92 2979 if (d->rela.hdr)
2b0f7ef9 2980 {
d4730f92
BS
2981 d->rela.idx = section_number++;
2982 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 2983 }
23bc299b 2984 else
d4730f92 2985 d->rela.idx = 0;
252b5132
RH
2986 }
2987
12bd6957 2988 elf_shstrtab_sec (abfd) = section_number++;
2b0f7ef9 2989 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
12bd6957 2990 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
252b5132 2991
3516e984
L
2992 need_symtab = (bfd_get_symcount (abfd) > 0
2993 || (link_info == NULL
2994 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2995 == HAS_RELOC)));
2996 if (need_symtab)
252b5132 2997 {
12bd6957 2998 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 2999 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3000 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3001 {
12bd6957 3002 elf_symtab_shndx (abfd) = section_number++;
9ad5cbcf
AM
3003 t->symtab_shndx_hdr.sh_name
3004 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3005 ".symtab_shndx", FALSE);
9ad5cbcf 3006 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 3007 return FALSE;
9ad5cbcf 3008 }
12bd6957 3009 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3010 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3011 }
3012
1c52a645
L
3013 if (section_number >= SHN_LORESERVE)
3014 {
3015 _bfd_error_handler (_("%B: too many sections: %u"),
3016 abfd, section_number);
3017 return FALSE;
3018 }
3019
2b0f7ef9
JJ
3020 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3021 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3022
3023 elf_numsections (abfd) = section_number;
252b5132
RH
3024 elf_elfheader (abfd)->e_shnum = section_number;
3025
3026 /* Set up the list of section header pointers, in agreement with the
3027 indices. */
a50b1753
NC
3028 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3029 sizeof (Elf_Internal_Shdr *));
252b5132 3030 if (i_shdrp == NULL)
b34976b6 3031 return FALSE;
252b5132 3032
a50b1753
NC
3033 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3034 sizeof (Elf_Internal_Shdr));
252b5132
RH
3035 if (i_shdrp[0] == NULL)
3036 {
3037 bfd_release (abfd, i_shdrp);
b34976b6 3038 return FALSE;
252b5132 3039 }
252b5132
RH
3040
3041 elf_elfsections (abfd) = i_shdrp;
3042
12bd6957 3043 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3044 if (need_symtab)
252b5132 3045 {
12bd6957 3046 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3047 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3048 {
12bd6957
AM
3049 i_shdrp[elf_symtab_shndx (abfd)] = &t->symtab_shndx_hdr;
3050 t->symtab_shndx_hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3051 }
12bd6957
AM
3052 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3053 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3054 }
38ce5b11 3055
252b5132
RH
3056 for (sec = abfd->sections; sec; sec = sec->next)
3057 {
252b5132
RH
3058 asection *s;
3059 const char *name;
3060
91d6fa6a
NC
3061 d = elf_section_data (sec);
3062
252b5132 3063 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3064 if (d->rel.idx != 0)
3065 i_shdrp[d->rel.idx] = d->rel.hdr;
3066 if (d->rela.idx != 0)
3067 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3068
3069 /* Fill in the sh_link and sh_info fields while we're at it. */
3070
3071 /* sh_link of a reloc section is the section index of the symbol
3072 table. sh_info is the section index of the section to which
3073 the relocation entries apply. */
d4730f92 3074 if (d->rel.idx != 0)
252b5132 3075 {
12bd6957 3076 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3077 d->rel.hdr->sh_info = d->this_idx;
252b5132 3078 }
d4730f92 3079 if (d->rela.idx != 0)
23bc299b 3080 {
12bd6957 3081 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3082 d->rela.hdr->sh_info = d->this_idx;
23bc299b 3083 }
252b5132 3084
38ce5b11
L
3085 /* We need to set up sh_link for SHF_LINK_ORDER. */
3086 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3087 {
3088 s = elf_linked_to_section (sec);
3089 if (s)
38ce5b11 3090 {
f2876037 3091 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3092 if (link_info != NULL)
38ce5b11 3093 {
f2876037 3094 /* Check discarded linkonce section. */
dbaa2011 3095 if (discarded_section (s))
38ce5b11 3096 {
ccd2ec6a
L
3097 asection *kept;
3098 (*_bfd_error_handler)
3099 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3100 abfd, d->this_hdr.bfd_section,
3101 s, s->owner);
3102 /* Point to the kept section if it has the same
3103 size as the discarded one. */
c0f00686 3104 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3105 if (kept == NULL)
185d09ad 3106 {
ccd2ec6a
L
3107 bfd_set_error (bfd_error_bad_value);
3108 return FALSE;
185d09ad 3109 }
ccd2ec6a 3110 s = kept;
38ce5b11 3111 }
e424ecc8 3112
ccd2ec6a
L
3113 s = s->output_section;
3114 BFD_ASSERT (s != NULL);
38ce5b11 3115 }
f2876037
L
3116 else
3117 {
3118 /* Handle objcopy. */
3119 if (s->output_section == NULL)
3120 {
3121 (*_bfd_error_handler)
3122 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3123 abfd, d->this_hdr.bfd_section, s, s->owner);
3124 bfd_set_error (bfd_error_bad_value);
3125 return FALSE;
3126 }
3127 s = s->output_section;
3128 }
ccd2ec6a
L
3129 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3130 }
3131 else
3132 {
3133 /* PR 290:
3134 The Intel C compiler generates SHT_IA_64_UNWIND with
3135 SHF_LINK_ORDER. But it doesn't set the sh_link or
3136 sh_info fields. Hence we could get the situation
08a40648 3137 where s is NULL. */
ccd2ec6a
L
3138 const struct elf_backend_data *bed
3139 = get_elf_backend_data (abfd);
3140 if (bed->link_order_error_handler)
3141 bed->link_order_error_handler
3142 (_("%B: warning: sh_link not set for section `%A'"),
3143 abfd, sec);
38ce5b11
L
3144 }
3145 }
3146
252b5132
RH
3147 switch (d->this_hdr.sh_type)
3148 {
3149 case SHT_REL:
3150 case SHT_RELA:
3151 /* A reloc section which we are treating as a normal BFD
3152 section. sh_link is the section index of the symbol
3153 table. sh_info is the section index of the section to
3154 which the relocation entries apply. We assume that an
3155 allocated reloc section uses the dynamic symbol table.
3156 FIXME: How can we be sure? */
3157 s = bfd_get_section_by_name (abfd, ".dynsym");
3158 if (s != NULL)
3159 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3160
3161 /* We look up the section the relocs apply to by name. */
3162 name = sec->name;
3163 if (d->this_hdr.sh_type == SHT_REL)
3164 name += 4;
3165 else
3166 name += 5;
3167 s = bfd_get_section_by_name (abfd, name);
3168 if (s != NULL)
3169 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3170 break;
3171
3172 case SHT_STRTAB:
3173 /* We assume that a section named .stab*str is a stabs
3174 string section. We look for a section with the same name
3175 but without the trailing ``str'', and set its sh_link
3176 field to point to this section. */
0112cd26 3177 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3178 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3179 {
3180 size_t len;
3181 char *alc;
3182
3183 len = strlen (sec->name);
a50b1753 3184 alc = (char *) bfd_malloc (len - 2);
252b5132 3185 if (alc == NULL)
b34976b6 3186 return FALSE;
d4c88bbb 3187 memcpy (alc, sec->name, len - 3);
252b5132
RH
3188 alc[len - 3] = '\0';
3189 s = bfd_get_section_by_name (abfd, alc);
3190 free (alc);
3191 if (s != NULL)
3192 {
3193 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3194
3195 /* This is a .stab section. */
0594c12d
AM
3196 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3197 elf_section_data (s)->this_hdr.sh_entsize
3198 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3199 }
3200 }
3201 break;
3202
3203 case SHT_DYNAMIC:
3204 case SHT_DYNSYM:
3205 case SHT_GNU_verneed:
3206 case SHT_GNU_verdef:
3207 /* sh_link is the section header index of the string table
3208 used for the dynamic entries, or the symbol table, or the
3209 version strings. */
3210 s = bfd_get_section_by_name (abfd, ".dynstr");
3211 if (s != NULL)
3212 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3213 break;
3214
7f1204bb
JJ
3215 case SHT_GNU_LIBLIST:
3216 /* sh_link is the section header index of the prelink library
08a40648
AM
3217 list used for the dynamic entries, or the symbol table, or
3218 the version strings. */
7f1204bb
JJ
3219 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3220 ? ".dynstr" : ".gnu.libstr");
3221 if (s != NULL)
3222 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3223 break;
3224
252b5132 3225 case SHT_HASH:
fdc90cb4 3226 case SHT_GNU_HASH:
252b5132
RH
3227 case SHT_GNU_versym:
3228 /* sh_link is the section header index of the symbol table
3229 this hash table or version table is for. */
3230 s = bfd_get_section_by_name (abfd, ".dynsym");
3231 if (s != NULL)
3232 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3233 break;
dbb410c3
AM
3234
3235 case SHT_GROUP:
12bd6957 3236 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3237 }
3238 }
3239
2b0f7ef9 3240 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3241 if (i_shdrp[secn] == NULL)
3242 i_shdrp[secn] = i_shdrp[0];
3243 else
3244 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3245 i_shdrp[secn]->sh_name);
b34976b6 3246 return TRUE;
252b5132
RH
3247}
3248
5372391b 3249static bfd_boolean
217aa764 3250sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3251{
3252 /* If the backend has a special mapping, use it. */
9c5bfbb7 3253 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3254 if (bed->elf_backend_sym_is_global)
3255 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3256
e47bf690 3257 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3258 || bfd_is_und_section (bfd_get_section (sym))
3259 || bfd_is_com_section (bfd_get_section (sym)));
3260}
3261
5372391b 3262/* Don't output section symbols for sections that are not going to be
c6d8cab4 3263 output, that are duplicates or there is no BFD section. */
5372391b
AM
3264
3265static bfd_boolean
3266ignore_section_sym (bfd *abfd, asymbol *sym)
3267{
c6d8cab4
L
3268 elf_symbol_type *type_ptr;
3269
3270 if ((sym->flags & BSF_SECTION_SYM) == 0)
3271 return FALSE;
3272
3273 type_ptr = elf_symbol_from (abfd, sym);
3274 return ((type_ptr != NULL
3275 && type_ptr->internal_elf_sym.st_shndx != 0
3276 && bfd_is_abs_section (sym->section))
3277 || !(sym->section->owner == abfd
0f0a5e58 3278 || (sym->section->output_section->owner == abfd
2633a79c
AM
3279 && sym->section->output_offset == 0)
3280 || bfd_is_abs_section (sym->section)));
5372391b
AM
3281}
3282
2633a79c
AM
3283/* Map symbol from it's internal number to the external number, moving
3284 all local symbols to be at the head of the list. */
3285
b34976b6 3286static bfd_boolean
12bd6957 3287elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 3288{
dc810e39 3289 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3290 asymbol **syms = bfd_get_outsymbols (abfd);
3291 asymbol **sect_syms;
dc810e39
AM
3292 unsigned int num_locals = 0;
3293 unsigned int num_globals = 0;
3294 unsigned int num_locals2 = 0;
3295 unsigned int num_globals2 = 0;
252b5132 3296 int max_index = 0;
dc810e39 3297 unsigned int idx;
252b5132
RH
3298 asection *asect;
3299 asymbol **new_syms;
252b5132
RH
3300
3301#ifdef DEBUG
3302 fprintf (stderr, "elf_map_symbols\n");
3303 fflush (stderr);
3304#endif
3305
252b5132
RH
3306 for (asect = abfd->sections; asect; asect = asect->next)
3307 {
3308 if (max_index < asect->index)
3309 max_index = asect->index;
3310 }
3311
3312 max_index++;
a50b1753 3313 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3314 if (sect_syms == NULL)
b34976b6 3315 return FALSE;
252b5132 3316 elf_section_syms (abfd) = sect_syms;
4e89ac30 3317 elf_num_section_syms (abfd) = max_index;
252b5132 3318
079e9a2f
AM
3319 /* Init sect_syms entries for any section symbols we have already
3320 decided to output. */
252b5132
RH
3321 for (idx = 0; idx < symcount; idx++)
3322 {
dc810e39 3323 asymbol *sym = syms[idx];
c044fabd 3324
252b5132 3325 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3326 && sym->value == 0
2633a79c
AM
3327 && !ignore_section_sym (abfd, sym)
3328 && !bfd_is_abs_section (sym->section))
252b5132 3329 {
5372391b 3330 asection *sec = sym->section;
252b5132 3331
5372391b
AM
3332 if (sec->owner != abfd)
3333 sec = sec->output_section;
252b5132 3334
5372391b 3335 sect_syms[sec->index] = syms[idx];
252b5132
RH
3336 }
3337 }
3338
252b5132
RH
3339 /* Classify all of the symbols. */
3340 for (idx = 0; idx < symcount; idx++)
3341 {
2633a79c 3342 if (sym_is_global (abfd, syms[idx]))
252b5132 3343 num_globals++;
2633a79c
AM
3344 else if (!ignore_section_sym (abfd, syms[idx]))
3345 num_locals++;
252b5132 3346 }
079e9a2f 3347
5372391b 3348 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3349 sections will already have a section symbol in outsymbols, but
3350 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3351 at least in that case. */
252b5132
RH
3352 for (asect = abfd->sections; asect; asect = asect->next)
3353 {
079e9a2f 3354 if (sect_syms[asect->index] == NULL)
252b5132 3355 {
079e9a2f 3356 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3357 num_locals++;
3358 else
3359 num_globals++;
252b5132
RH
3360 }
3361 }
3362
3363 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3364 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3365 sizeof (asymbol *));
dc810e39 3366
252b5132 3367 if (new_syms == NULL)
b34976b6 3368 return FALSE;
252b5132
RH
3369
3370 for (idx = 0; idx < symcount; idx++)
3371 {
3372 asymbol *sym = syms[idx];
dc810e39 3373 unsigned int i;
252b5132 3374
2633a79c
AM
3375 if (sym_is_global (abfd, sym))
3376 i = num_locals + num_globals2++;
3377 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
3378 i = num_locals2++;
3379 else
2633a79c 3380 continue;
252b5132
RH
3381 new_syms[i] = sym;
3382 sym->udata.i = i + 1;
3383 }
3384 for (asect = abfd->sections; asect; asect = asect->next)
3385 {
079e9a2f 3386 if (sect_syms[asect->index] == NULL)
252b5132 3387 {
079e9a2f 3388 asymbol *sym = asect->symbol;
dc810e39 3389 unsigned int i;
252b5132 3390
079e9a2f 3391 sect_syms[asect->index] = sym;
252b5132
RH
3392 if (!sym_is_global (abfd, sym))
3393 i = num_locals2++;
3394 else
3395 i = num_locals + num_globals2++;
3396 new_syms[i] = sym;
3397 sym->udata.i = i + 1;
3398 }
3399 }
3400
3401 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3402
12bd6957 3403 *pnum_locals = num_locals;
b34976b6 3404 return TRUE;
252b5132
RH
3405}
3406
3407/* Align to the maximum file alignment that could be required for any
3408 ELF data structure. */
3409
268b6b39 3410static inline file_ptr
217aa764 3411align_file_position (file_ptr off, int align)
252b5132
RH
3412{
3413 return (off + align - 1) & ~(align - 1);
3414}
3415
3416/* Assign a file position to a section, optionally aligning to the
3417 required section alignment. */
3418
217aa764
AM
3419file_ptr
3420_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3421 file_ptr offset,
3422 bfd_boolean align)
252b5132 3423{
72de5009
AM
3424 if (align && i_shdrp->sh_addralign > 1)
3425 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3426 i_shdrp->sh_offset = offset;
3427 if (i_shdrp->bfd_section != NULL)
3428 i_shdrp->bfd_section->filepos = offset;
3429 if (i_shdrp->sh_type != SHT_NOBITS)
3430 offset += i_shdrp->sh_size;
3431 return offset;
3432}
3433
3434/* Compute the file positions we are going to put the sections at, and
3435 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3436 is not NULL, this is being called by the ELF backend linker. */
3437
b34976b6 3438bfd_boolean
217aa764
AM
3439_bfd_elf_compute_section_file_positions (bfd *abfd,
3440 struct bfd_link_info *link_info)
252b5132 3441{
9c5bfbb7 3442 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3443 struct fake_section_arg fsargs;
b34976b6 3444 bfd_boolean failed;
4b6c0f2f 3445 struct bfd_strtab_hash *strtab = NULL;
252b5132 3446 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3447 bfd_boolean need_symtab;
252b5132
RH
3448
3449 if (abfd->output_has_begun)
b34976b6 3450 return TRUE;
252b5132
RH
3451
3452 /* Do any elf backend specific processing first. */
3453 if (bed->elf_backend_begin_write_processing)
3454 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3455
3456 if (! prep_headers (abfd))
b34976b6 3457 return FALSE;
252b5132 3458
e6c51ed4
NC
3459 /* Post process the headers if necessary. */
3460 if (bed->elf_backend_post_process_headers)
3461 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3462
d4730f92
BS
3463 fsargs.failed = FALSE;
3464 fsargs.link_info = link_info;
3465 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
3466 if (fsargs.failed)
b34976b6 3467 return FALSE;
252b5132 3468
da9f89d4 3469 if (!assign_section_numbers (abfd, link_info))
b34976b6 3470 return FALSE;
252b5132
RH
3471
3472 /* The backend linker builds symbol table information itself. */
3516e984
L
3473 need_symtab = (link_info == NULL
3474 && (bfd_get_symcount (abfd) > 0
3475 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3476 == HAS_RELOC)));
3477 if (need_symtab)
252b5132
RH
3478 {
3479 /* Non-zero if doing a relocatable link. */
3480 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3481
3482 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3483 return FALSE;
252b5132
RH
3484 }
3485
d4730f92 3486 failed = FALSE;
1126897b 3487 if (link_info == NULL)
dbb410c3 3488 {
1126897b 3489 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3490 if (failed)
b34976b6 3491 return FALSE;
dbb410c3
AM
3492 }
3493
252b5132
RH
3494 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3495 /* sh_name was set in prep_headers. */
3496 shstrtab_hdr->sh_type = SHT_STRTAB;
3497 shstrtab_hdr->sh_flags = 0;
3498 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3499 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3500 shstrtab_hdr->sh_entsize = 0;
3501 shstrtab_hdr->sh_link = 0;
3502 shstrtab_hdr->sh_info = 0;
3503 /* sh_offset is set in assign_file_positions_except_relocs. */
3504 shstrtab_hdr->sh_addralign = 1;
3505
c84fca4d 3506 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3507 return FALSE;
252b5132 3508
3516e984 3509 if (need_symtab)
252b5132
RH
3510 {
3511 file_ptr off;
3512 Elf_Internal_Shdr *hdr;
3513
12bd6957 3514 off = elf_next_file_pos (abfd);
252b5132
RH
3515
3516 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3517 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3518
9ad5cbcf
AM
3519 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3520 if (hdr->sh_size != 0)
b34976b6 3521 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3522
252b5132 3523 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3524 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3525
12bd6957 3526 elf_next_file_pos (abfd) = off;
252b5132
RH
3527
3528 /* Now that we know where the .strtab section goes, write it
08a40648 3529 out. */
252b5132
RH
3530 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3531 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3532 return FALSE;
252b5132
RH
3533 _bfd_stringtab_free (strtab);
3534 }
3535
b34976b6 3536 abfd->output_has_begun = TRUE;
252b5132 3537
b34976b6 3538 return TRUE;
252b5132
RH
3539}
3540
8ded5a0f
AM
3541/* Make an initial estimate of the size of the program header. If we
3542 get the number wrong here, we'll redo section placement. */
3543
3544static bfd_size_type
3545get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3546{
3547 size_t segs;
3548 asection *s;
2b05f1b7 3549 const struct elf_backend_data *bed;
8ded5a0f
AM
3550
3551 /* Assume we will need exactly two PT_LOAD segments: one for text
3552 and one for data. */
3553 segs = 2;
3554
3555 s = bfd_get_section_by_name (abfd, ".interp");
3556 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3557 {
3558 /* If we have a loadable interpreter section, we need a
3559 PT_INTERP segment. In this case, assume we also need a
3560 PT_PHDR segment, although that may not be true for all
3561 targets. */
3562 segs += 2;
3563 }
3564
3565 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3566 {
3567 /* We need a PT_DYNAMIC segment. */
3568 ++segs;
f210dcff 3569 }
08a40648 3570
ceae84aa 3571 if (info != NULL && info->relro)
f210dcff
L
3572 {
3573 /* We need a PT_GNU_RELRO segment. */
3574 ++segs;
8ded5a0f
AM
3575 }
3576
12bd6957 3577 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
3578 {
3579 /* We need a PT_GNU_EH_FRAME segment. */
3580 ++segs;
3581 }
3582
12bd6957 3583 if (elf_stack_flags (abfd))
8ded5a0f 3584 {
2b05f1b7
L
3585 /* We need a PT_GNU_STACK segment. */
3586 ++segs;
3587 }
94b11780 3588
2b05f1b7
L
3589 for (s = abfd->sections; s != NULL; s = s->next)
3590 {
8ded5a0f 3591 if ((s->flags & SEC_LOAD) != 0
0112cd26 3592 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3593 {
3594 /* We need a PT_NOTE segment. */
3595 ++segs;
1c5265b5
JJ
3596 /* Try to create just one PT_NOTE segment
3597 for all adjacent loadable .note* sections.
3598 gABI requires that within a PT_NOTE segment
3599 (and also inside of each SHT_NOTE section)
3600 each note is padded to a multiple of 4 size,
3601 so we check whether the sections are correctly
3602 aligned. */
3603 if (s->alignment_power == 2)
3604 while (s->next != NULL
3605 && s->next->alignment_power == 2
3606 && (s->next->flags & SEC_LOAD) != 0
3607 && CONST_STRNEQ (s->next->name, ".note"))
3608 s = s->next;
8ded5a0f
AM
3609 }
3610 }
3611
3612 for (s = abfd->sections; s != NULL; s = s->next)
3613 {
3614 if (s->flags & SEC_THREAD_LOCAL)
3615 {
3616 /* We need a PT_TLS segment. */
3617 ++segs;
3618 break;
3619 }
3620 }
3621
3622 /* Let the backend count up any program headers it might need. */
2b05f1b7 3623 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3624 if (bed->elf_backend_additional_program_headers)
3625 {
3626 int a;
3627
3628 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3629 if (a == -1)
3630 abort ();
3631 segs += a;
3632 }
3633
3634 return segs * bed->s->sizeof_phdr;
3635}
3636
2ea37f1c
NC
3637/* Find the segment that contains the output_section of section. */
3638
3639Elf_Internal_Phdr *
3640_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3641{
3642 struct elf_segment_map *m;
3643 Elf_Internal_Phdr *p;
3644
12bd6957 3645 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
3646 m != NULL;
3647 m = m->next, p++)
3648 {
3649 int i;
3650
3651 for (i = m->count - 1; i >= 0; i--)
3652 if (m->sections[i] == section)
3653 return p;
3654 }
3655
3656 return NULL;
3657}
3658
252b5132
RH
3659/* Create a mapping from a set of sections to a program segment. */
3660
217aa764
AM
3661static struct elf_segment_map *
3662make_mapping (bfd *abfd,
3663 asection **sections,
3664 unsigned int from,
3665 unsigned int to,
3666 bfd_boolean phdr)
252b5132
RH
3667{
3668 struct elf_segment_map *m;
3669 unsigned int i;
3670 asection **hdrpp;
dc810e39 3671 bfd_size_type amt;
252b5132 3672
dc810e39
AM
3673 amt = sizeof (struct elf_segment_map);
3674 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3675 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3676 if (m == NULL)
3677 return NULL;
3678 m->next = NULL;
3679 m->p_type = PT_LOAD;
3680 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3681 m->sections[i - from] = *hdrpp;
3682 m->count = to - from;
3683
3684 if (from == 0 && phdr)
3685 {
3686 /* Include the headers in the first PT_LOAD segment. */
3687 m->includes_filehdr = 1;
3688 m->includes_phdrs = 1;
3689 }
3690
3691 return m;
3692}
3693
229fcec5
MM
3694/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3695 on failure. */
3696
3697struct elf_segment_map *
3698_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3699{
3700 struct elf_segment_map *m;
3701
a50b1753
NC
3702 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3703 sizeof (struct elf_segment_map));
229fcec5
MM
3704 if (m == NULL)
3705 return NULL;
3706 m->next = NULL;
3707 m->p_type = PT_DYNAMIC;
3708 m->count = 1;
3709 m->sections[0] = dynsec;
08a40648 3710
229fcec5
MM
3711 return m;
3712}
3713
8ded5a0f 3714/* Possibly add or remove segments from the segment map. */
252b5132 3715
b34976b6 3716static bfd_boolean
3dea8fca
AM
3717elf_modify_segment_map (bfd *abfd,
3718 struct bfd_link_info *info,
3719 bfd_boolean remove_empty_load)
252b5132 3720{
252e386e 3721 struct elf_segment_map **m;
8ded5a0f 3722 const struct elf_backend_data *bed;
252b5132 3723
8ded5a0f
AM
3724 /* The placement algorithm assumes that non allocated sections are
3725 not in PT_LOAD segments. We ensure this here by removing such
3726 sections from the segment map. We also remove excluded
252e386e
AM
3727 sections. Finally, any PT_LOAD segment without sections is
3728 removed. */
12bd6957 3729 m = &elf_seg_map (abfd);
252e386e 3730 while (*m)
8ded5a0f
AM
3731 {
3732 unsigned int i, new_count;
252b5132 3733
252e386e 3734 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3735 {
252e386e
AM
3736 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3737 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3738 || (*m)->p_type != PT_LOAD))
8ded5a0f 3739 {
252e386e
AM
3740 (*m)->sections[new_count] = (*m)->sections[i];
3741 new_count++;
8ded5a0f
AM
3742 }
3743 }
252e386e 3744 (*m)->count = new_count;
252b5132 3745
3dea8fca 3746 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3747 *m = (*m)->next;
3748 else
3749 m = &(*m)->next;
8ded5a0f 3750 }
252b5132 3751
8ded5a0f
AM
3752 bed = get_elf_backend_data (abfd);
3753 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3754 {
252e386e 3755 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3756 return FALSE;
252b5132 3757 }
252b5132 3758
8ded5a0f
AM
3759 return TRUE;
3760}
252b5132 3761
8ded5a0f 3762/* Set up a mapping from BFD sections to program segments. */
252b5132 3763
8ded5a0f
AM
3764bfd_boolean
3765_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3766{
3767 unsigned int count;
3768 struct elf_segment_map *m;
3769 asection **sections = NULL;
3770 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3771 bfd_boolean no_user_phdrs;
252b5132 3772
12bd6957 3773 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
3774
3775 if (info != NULL)
3776 info->user_phdrs = !no_user_phdrs;
3777
3dea8fca 3778 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3779 {
8ded5a0f
AM
3780 asection *s;
3781 unsigned int i;
3782 struct elf_segment_map *mfirst;
3783 struct elf_segment_map **pm;
3784 asection *last_hdr;
3785 bfd_vma last_size;
3786 unsigned int phdr_index;
3787 bfd_vma maxpagesize;
3788 asection **hdrpp;
3789 bfd_boolean phdr_in_segment = TRUE;
3790 bfd_boolean writable;
3791 int tls_count = 0;
3792 asection *first_tls = NULL;
3793 asection *dynsec, *eh_frame_hdr;
3794 bfd_size_type amt;
8d06853e 3795 bfd_vma addr_mask, wrap_to = 0;
252b5132 3796
8ded5a0f 3797 /* Select the allocated sections, and sort them. */
252b5132 3798
a50b1753
NC
3799 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
3800 sizeof (asection *));
8ded5a0f 3801 if (sections == NULL)
252b5132 3802 goto error_return;
252b5132 3803
8d06853e
AM
3804 /* Calculate top address, avoiding undefined behaviour of shift
3805 left operator when shift count is equal to size of type
3806 being shifted. */
3807 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
3808 addr_mask = (addr_mask << 1) + 1;
3809
8ded5a0f
AM
3810 i = 0;
3811 for (s = abfd->sections; s != NULL; s = s->next)
3812 {
3813 if ((s->flags & SEC_ALLOC) != 0)
3814 {
3815 sections[i] = s;
3816 ++i;
8d06853e
AM
3817 /* A wrapping section potentially clashes with header. */
3818 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
3819 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
3820 }
3821 }
3822 BFD_ASSERT (i <= bfd_count_sections (abfd));
3823 count = i;
252b5132 3824
8ded5a0f 3825 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3826
8ded5a0f 3827 /* Build the mapping. */
252b5132 3828
8ded5a0f
AM
3829 mfirst = NULL;
3830 pm = &mfirst;
252b5132 3831
8ded5a0f
AM
3832 /* If we have a .interp section, then create a PT_PHDR segment for
3833 the program headers and a PT_INTERP segment for the .interp
3834 section. */
3835 s = bfd_get_section_by_name (abfd, ".interp");
3836 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3837 {
3838 amt = sizeof (struct elf_segment_map);
a50b1753 3839 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3840 if (m == NULL)
3841 goto error_return;
3842 m->next = NULL;
3843 m->p_type = PT_PHDR;
3844 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3845 m->p_flags = PF_R | PF_X;
3846 m->p_flags_valid = 1;
3847 m->includes_phdrs = 1;
252b5132 3848
8ded5a0f
AM
3849 *pm = m;
3850 pm = &m->next;
252b5132 3851
8ded5a0f 3852 amt = sizeof (struct elf_segment_map);
a50b1753 3853 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3854 if (m == NULL)
3855 goto error_return;
3856 m->next = NULL;
3857 m->p_type = PT_INTERP;
3858 m->count = 1;
3859 m->sections[0] = s;
3860
3861 *pm = m;
3862 pm = &m->next;
252b5132 3863 }
8ded5a0f
AM
3864
3865 /* Look through the sections. We put sections in the same program
3866 segment when the start of the second section can be placed within
3867 a few bytes of the end of the first section. */
3868 last_hdr = NULL;
3869 last_size = 0;
3870 phdr_index = 0;
3871 maxpagesize = bed->maxpagesize;
3872 writable = FALSE;
3873 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3874 if (dynsec != NULL
3875 && (dynsec->flags & SEC_LOAD) == 0)
3876 dynsec = NULL;
3877
3878 /* Deal with -Ttext or something similar such that the first section
3879 is not adjacent to the program headers. This is an
3880 approximation, since at this point we don't know exactly how many
3881 program headers we will need. */
3882 if (count > 0)
252b5132 3883 {
12bd6957 3884 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 3885
62d7a5f6 3886 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 3887 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 3888 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 3889 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
3890 || (sections[0]->lma & addr_mask) < phdr_size
3891 || ((sections[0]->lma & addr_mask) % maxpagesize
3892 < phdr_size % maxpagesize)
3893 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 3894 phdr_in_segment = FALSE;
252b5132
RH
3895 }
3896
8ded5a0f 3897 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3898 {
8ded5a0f
AM
3899 asection *hdr;
3900 bfd_boolean new_segment;
3901
3902 hdr = *hdrpp;
3903
3904 /* See if this section and the last one will fit in the same
3905 segment. */
3906
3907 if (last_hdr == NULL)
3908 {
3909 /* If we don't have a segment yet, then we don't need a new
3910 one (we build the last one after this loop). */
3911 new_segment = FALSE;
3912 }
3913 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3914 {
3915 /* If this section has a different relation between the
3916 virtual address and the load address, then we need a new
3917 segment. */
3918 new_segment = TRUE;
3919 }
b5599592
AM
3920 else if (hdr->lma < last_hdr->lma + last_size
3921 || last_hdr->lma + last_size < last_hdr->lma)
3922 {
3923 /* If this section has a load address that makes it overlap
3924 the previous section, then we need a new segment. */
3925 new_segment = TRUE;
3926 }
39948a60
NC
3927 /* In the next test we have to be careful when last_hdr->lma is close
3928 to the end of the address space. If the aligned address wraps
3929 around to the start of the address space, then there are no more
3930 pages left in memory and it is OK to assume that the current
3931 section can be included in the current segment. */
3932 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3933 > last_hdr->lma)
3934 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3935 <= hdr->lma))
8ded5a0f
AM
3936 {
3937 /* If putting this section in this segment would force us to
3938 skip a page in the segment, then we need a new segment. */
3939 new_segment = TRUE;
3940 }
3941 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3942 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3943 {
3944 /* We don't want to put a loadable section after a
3945 nonloadable section in the same segment.
3946 Consider .tbss sections as loadable for this purpose. */
3947 new_segment = TRUE;
3948 }
3949 else if ((abfd->flags & D_PAGED) == 0)
3950 {
3951 /* If the file is not demand paged, which means that we
3952 don't require the sections to be correctly aligned in the
3953 file, then there is no other reason for a new segment. */
3954 new_segment = FALSE;
3955 }
3956 else if (! writable
3957 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
3958 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
3959 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
3960 {
3961 /* We don't want to put a writable section in a read only
3962 segment, unless they are on the same page in memory
3963 anyhow. We already know that the last section does not
3964 bring us past the current section on the page, so the
3965 only case in which the new section is not on the same
3966 page as the previous section is when the previous section
3967 ends precisely on a page boundary. */
3968 new_segment = TRUE;
3969 }
3970 else
3971 {
3972 /* Otherwise, we can use the same segment. */
3973 new_segment = FALSE;
3974 }
3975
2889e75b 3976 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3977 if (last_hdr != NULL
3978 && info != NULL
3979 && info->callbacks->override_segment_assignment != NULL)
3980 new_segment
3981 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3982 last_hdr,
3983 new_segment);
2889e75b 3984
8ded5a0f
AM
3985 if (! new_segment)
3986 {
3987 if ((hdr->flags & SEC_READONLY) == 0)
3988 writable = TRUE;
3989 last_hdr = hdr;
3990 /* .tbss sections effectively have zero size. */
3991 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3992 != SEC_THREAD_LOCAL)
3993 last_size = hdr->size;
3994 else
3995 last_size = 0;
3996 continue;
3997 }
3998
3999 /* We need a new program segment. We must create a new program
4000 header holding all the sections from phdr_index until hdr. */
4001
4002 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4003 if (m == NULL)
4004 goto error_return;
4005
4006 *pm = m;
4007 pm = &m->next;
4008
252b5132 4009 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4010 writable = TRUE;
8ded5a0f
AM
4011 else
4012 writable = FALSE;
4013
baaff79e
JJ
4014 last_hdr = hdr;
4015 /* .tbss sections effectively have zero size. */
e5caec89 4016 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4017 last_size = hdr->size;
baaff79e
JJ
4018 else
4019 last_size = 0;
8ded5a0f
AM
4020 phdr_index = i;
4021 phdr_in_segment = FALSE;
252b5132
RH
4022 }
4023
86b2281f
AM
4024 /* Create a final PT_LOAD program segment, but not if it's just
4025 for .tbss. */
4026 if (last_hdr != NULL
4027 && (i - phdr_index != 1
4028 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4029 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4030 {
4031 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4032 if (m == NULL)
4033 goto error_return;
252b5132 4034
8ded5a0f
AM
4035 *pm = m;
4036 pm = &m->next;
4037 }
252b5132 4038
8ded5a0f
AM
4039 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4040 if (dynsec != NULL)
4041 {
4042 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4043 if (m == NULL)
4044 goto error_return;
4045 *pm = m;
4046 pm = &m->next;
4047 }
252b5132 4048
1c5265b5
JJ
4049 /* For each batch of consecutive loadable .note sections,
4050 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4051 because if we link together nonloadable .note sections and
4052 loadable .note sections, we will generate two .note sections
4053 in the output file. FIXME: Using names for section types is
4054 bogus anyhow. */
8ded5a0f
AM
4055 for (s = abfd->sections; s != NULL; s = s->next)
4056 {
4057 if ((s->flags & SEC_LOAD) != 0
0112cd26 4058 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4059 {
1c5265b5 4060 asection *s2;
91d6fa6a
NC
4061
4062 count = 1;
8ded5a0f 4063 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4064 if (s->alignment_power == 2)
4065 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4066 {
4067 if (s2->next->alignment_power == 2
4068 && (s2->next->flags & SEC_LOAD) != 0
4069 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4070 && align_power (s2->lma + s2->size, 2)
4071 == s2->next->lma)
55b581a6
JJ
4072 count++;
4073 else
4074 break;
4075 }
1c5265b5 4076 amt += (count - 1) * sizeof (asection *);
a50b1753 4077 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4078 if (m == NULL)
4079 goto error_return;
4080 m->next = NULL;
4081 m->p_type = PT_NOTE;
1c5265b5
JJ
4082 m->count = count;
4083 while (count > 1)
4084 {
4085 m->sections[m->count - count--] = s;
4086 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4087 s = s->next;
4088 }
4089 m->sections[m->count - 1] = s;
4090 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4091 *pm = m;
4092 pm = &m->next;
4093 }
4094 if (s->flags & SEC_THREAD_LOCAL)
4095 {
4096 if (! tls_count)
4097 first_tls = s;
4098 tls_count++;
4099 }
4100 }
252b5132 4101
8ded5a0f
AM
4102 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4103 if (tls_count > 0)
4104 {
8ded5a0f
AM
4105 amt = sizeof (struct elf_segment_map);
4106 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4107 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4108 if (m == NULL)
4109 goto error_return;
4110 m->next = NULL;
4111 m->p_type = PT_TLS;
4112 m->count = tls_count;
4113 /* Mandated PF_R. */
4114 m->p_flags = PF_R;
4115 m->p_flags_valid = 1;
91d6fa6a 4116 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f
AM
4117 {
4118 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
4119 m->sections[i] = first_tls;
4120 first_tls = first_tls->next;
4121 }
252b5132 4122
8ded5a0f
AM
4123 *pm = m;
4124 pm = &m->next;
4125 }
252b5132 4126
8ded5a0f
AM
4127 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4128 segment. */
12bd6957 4129 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4130 if (eh_frame_hdr != NULL
4131 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4132 {
dc810e39 4133 amt = sizeof (struct elf_segment_map);
a50b1753 4134 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4135 if (m == NULL)
4136 goto error_return;
4137 m->next = NULL;
8ded5a0f 4138 m->p_type = PT_GNU_EH_FRAME;
252b5132 4139 m->count = 1;
8ded5a0f 4140 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4141
4142 *pm = m;
4143 pm = &m->next;
4144 }
13ae64f3 4145
12bd6957 4146 if (elf_stack_flags (abfd))
13ae64f3 4147 {
8ded5a0f 4148 amt = sizeof (struct elf_segment_map);
a50b1753 4149 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4150 if (m == NULL)
4151 goto error_return;
4152 m->next = NULL;
2b05f1b7 4153 m->p_type = PT_GNU_STACK;
12bd6957 4154 m->p_flags = elf_stack_flags (abfd);
04c3a755 4155 m->p_align = bed->stack_align;
8ded5a0f 4156 m->p_flags_valid = 1;
04c3a755
NS
4157 m->p_align_valid = m->p_align != 0;
4158 if (info->stacksize > 0)
4159 {
4160 m->p_size = info->stacksize;
4161 m->p_size_valid = 1;
4162 }
252b5132 4163
8ded5a0f
AM
4164 *pm = m;
4165 pm = &m->next;
4166 }
65765700 4167
ceae84aa 4168 if (info != NULL && info->relro)
8ded5a0f 4169 {
f210dcff
L
4170 for (m = mfirst; m != NULL; m = m->next)
4171 {
3832a4d8
AM
4172 if (m->p_type == PT_LOAD
4173 && m->count != 0
4174 && m->sections[0]->vma >= info->relro_start
4175 && m->sections[0]->vma < info->relro_end)
f210dcff 4176 {
3832a4d8
AM
4177 i = m->count;
4178 while (--i != (unsigned) -1)
4179 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
4180 == (SEC_LOAD | SEC_HAS_CONTENTS))
4181 break;
4182
4183 if (i == (unsigned) -1)
4184 continue;
65765700 4185
3832a4d8
AM
4186 if (m->sections[i]->vma + m->sections[i]->size
4187 >= info->relro_end)
f210dcff
L
4188 break;
4189 }
be01b344 4190 }
f210dcff
L
4191
4192 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4193 if (m != NULL)
4194 {
4195 amt = sizeof (struct elf_segment_map);
a50b1753 4196 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4197 if (m == NULL)
4198 goto error_return;
4199 m->next = NULL;
4200 m->p_type = PT_GNU_RELRO;
4201 m->p_flags = PF_R;
4202 m->p_flags_valid = 1;
4203
4204 *pm = m;
4205 pm = &m->next;
4206 }
8ded5a0f 4207 }
9ee5e499 4208
8ded5a0f 4209 free (sections);
12bd6957 4210 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
4211 }
4212
3dea8fca 4213 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4214 return FALSE;
8c37241b 4215
12bd6957 4216 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 4217 ++count;
12bd6957 4218 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 4219
b34976b6 4220 return TRUE;
252b5132
RH
4221
4222 error_return:
4223 if (sections != NULL)
4224 free (sections);
b34976b6 4225 return FALSE;
252b5132
RH
4226}
4227
4228/* Sort sections by address. */
4229
4230static int
217aa764 4231elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4232{
4233 const asection *sec1 = *(const asection **) arg1;
4234 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4235 bfd_size_type size1, size2;
252b5132
RH
4236
4237 /* Sort by LMA first, since this is the address used to
4238 place the section into a segment. */
4239 if (sec1->lma < sec2->lma)
4240 return -1;
4241 else if (sec1->lma > sec2->lma)
4242 return 1;
4243
4244 /* Then sort by VMA. Normally the LMA and the VMA will be
4245 the same, and this will do nothing. */
4246 if (sec1->vma < sec2->vma)
4247 return -1;
4248 else if (sec1->vma > sec2->vma)
4249 return 1;
4250
4251 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4252
07c6e936 4253#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4254
4255 if (TOEND (sec1))
4256 {
4257 if (TOEND (sec2))
00a7cdc5
NC
4258 {
4259 /* If the indicies are the same, do not return 0
4260 here, but continue to try the next comparison. */
4261 if (sec1->target_index - sec2->target_index != 0)
4262 return sec1->target_index - sec2->target_index;
4263 }
252b5132
RH
4264 else
4265 return 1;
4266 }
00a7cdc5 4267 else if (TOEND (sec2))
252b5132
RH
4268 return -1;
4269
4270#undef TOEND
4271
00a7cdc5
NC
4272 /* Sort by size, to put zero sized sections
4273 before others at the same address. */
252b5132 4274
eea6121a
AM
4275 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4276 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4277
4278 if (size1 < size2)
252b5132 4279 return -1;
eecdbe52 4280 if (size1 > size2)
252b5132
RH
4281 return 1;
4282
4283 return sec1->target_index - sec2->target_index;
4284}
4285
340b6d91
AC
4286/* Ian Lance Taylor writes:
4287
4288 We shouldn't be using % with a negative signed number. That's just
4289 not good. We have to make sure either that the number is not
4290 negative, or that the number has an unsigned type. When the types
4291 are all the same size they wind up as unsigned. When file_ptr is a
4292 larger signed type, the arithmetic winds up as signed long long,
4293 which is wrong.
4294
4295 What we're trying to say here is something like ``increase OFF by
4296 the least amount that will cause it to be equal to the VMA modulo
4297 the page size.'' */
4298/* In other words, something like:
4299
4300 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4301 off_offset = off % bed->maxpagesize;
4302 if (vma_offset < off_offset)
4303 adjustment = vma_offset + bed->maxpagesize - off_offset;
4304 else
4305 adjustment = vma_offset - off_offset;
08a40648 4306
340b6d91
AC
4307 which can can be collapsed into the expression below. */
4308
4309static file_ptr
4310vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4311{
4312 return ((vma - off) % maxpagesize);
4313}
4314
6d33f217
L
4315static void
4316print_segment_map (const struct elf_segment_map *m)
4317{
4318 unsigned int j;
4319 const char *pt = get_segment_type (m->p_type);
4320 char buf[32];
4321
4322 if (pt == NULL)
4323 {
4324 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4325 sprintf (buf, "LOPROC+%7.7x",
4326 (unsigned int) (m->p_type - PT_LOPROC));
4327 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4328 sprintf (buf, "LOOS+%7.7x",
4329 (unsigned int) (m->p_type - PT_LOOS));
4330 else
4331 snprintf (buf, sizeof (buf), "%8.8x",
4332 (unsigned int) m->p_type);
4333 pt = buf;
4334 }
4a97a0e5 4335 fflush (stdout);
6d33f217
L
4336 fprintf (stderr, "%s:", pt);
4337 for (j = 0; j < m->count; j++)
4338 fprintf (stderr, " %s", m->sections [j]->name);
4339 putc ('\n',stderr);
4a97a0e5 4340 fflush (stderr);
6d33f217
L
4341}
4342
32812159
AM
4343static bfd_boolean
4344write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4345{
4346 void *buf;
4347 bfd_boolean ret;
4348
4349 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4350 return FALSE;
4351 buf = bfd_zmalloc (len);
4352 if (buf == NULL)
4353 return FALSE;
4354 ret = bfd_bwrite (buf, len, abfd) == len;
4355 free (buf);
4356 return ret;
4357}
4358
252b5132
RH
4359/* Assign file positions to the sections based on the mapping from
4360 sections to segments. This function also sets up some fields in
f3520d2f 4361 the file header. */
252b5132 4362
b34976b6 4363static bfd_boolean
f3520d2f
AM
4364assign_file_positions_for_load_sections (bfd *abfd,
4365 struct bfd_link_info *link_info)
252b5132
RH
4366{
4367 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4368 struct elf_segment_map *m;
252b5132 4369 Elf_Internal_Phdr *phdrs;
252b5132 4370 Elf_Internal_Phdr *p;
02bf8d82 4371 file_ptr off;
3f570048 4372 bfd_size_type maxpagesize;
f3520d2f 4373 unsigned int alloc;
0920dee7 4374 unsigned int i, j;
2b0bc088 4375 bfd_vma header_pad = 0;
252b5132 4376
e36284ab 4377 if (link_info == NULL
ceae84aa 4378 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4379 return FALSE;
252b5132 4380
8ded5a0f 4381 alloc = 0;
12bd6957 4382 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
4383 {
4384 ++alloc;
4385 if (m->header_size)
4386 header_pad = m->header_size;
4387 }
252b5132 4388
82f2dbf7
NC
4389 if (alloc)
4390 {
4391 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4392 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4393 }
4394 else
4395 {
4396 /* PR binutils/12467. */
4397 elf_elfheader (abfd)->e_phoff = 0;
4398 elf_elfheader (abfd)->e_phentsize = 0;
4399 }
d324f6d6 4400
8ded5a0f 4401 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4402
12bd6957
AM
4403 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
4404 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 4405 else
12bd6957 4406 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 4407 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4408
4409 if (alloc == 0)
f3520d2f 4410 {
12bd6957 4411 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 4412 return TRUE;
f3520d2f 4413 }
252b5132 4414
12bd6957 4415 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
4416 see assign_file_positions_except_relocs, so make sure we have
4417 that amount allocated, with trailing space cleared.
12bd6957
AM
4418 The variable alloc contains the computed need, while
4419 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
4420 layout.
4421 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4422 where the layout is forced to according to a larger size in the
4423 last iterations for the testcase ld-elf/header. */
12bd6957 4424 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 4425 == 0);
a50b1753
NC
4426 phdrs = (Elf_Internal_Phdr *)
4427 bfd_zalloc2 (abfd,
12bd6957 4428 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 4429 sizeof (Elf_Internal_Phdr));
f3520d2f 4430 elf_tdata (abfd)->phdr = phdrs;
252b5132 4431 if (phdrs == NULL)
b34976b6 4432 return FALSE;
252b5132 4433
3f570048
AM
4434 maxpagesize = 1;
4435 if ((abfd->flags & D_PAGED) != 0)
4436 maxpagesize = bed->maxpagesize;
4437
252b5132
RH
4438 off = bed->s->sizeof_ehdr;
4439 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4440 if (header_pad < (bfd_vma) off)
4441 header_pad = 0;
4442 else
4443 header_pad -= off;
4444 off += header_pad;
252b5132 4445
12bd6957 4446 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 4447 m != NULL;
0920dee7 4448 m = m->next, p++, j++)
252b5132 4449 {
252b5132 4450 asection **secpp;
bf988460
AM
4451 bfd_vma off_adjust;
4452 bfd_boolean no_contents;
252b5132
RH
4453
4454 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4455 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4456 not be done to the PT_NOTE section of a corefile, which may
4457 contain several pseudo-sections artificially created by bfd.
4458 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4459 if (m->count > 1
4460 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4461 && m->p_type == PT_NOTE))
252b5132
RH
4462 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4463 elf_sort_sections);
4464
b301b248
AM
4465 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4466 number of sections with contents contributing to both p_filesz
4467 and p_memsz, followed by a number of sections with no contents
4468 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4469 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4470 p->p_type = m->p_type;
28a7f3e7 4471 p->p_flags = m->p_flags;
252b5132 4472
3f570048
AM
4473 if (m->count == 0)
4474 p->p_vaddr = 0;
4475 else
3271a814 4476 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4477
4478 if (m->p_paddr_valid)
4479 p->p_paddr = m->p_paddr;
4480 else if (m->count == 0)
4481 p->p_paddr = 0;
4482 else
08a40648 4483 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4484
4485 if (p->p_type == PT_LOAD
4486 && (abfd->flags & D_PAGED) != 0)
4487 {
4488 /* p_align in demand paged PT_LOAD segments effectively stores
4489 the maximum page size. When copying an executable with
4490 objcopy, we set m->p_align from the input file. Use this
4491 value for maxpagesize rather than bed->maxpagesize, which
4492 may be different. Note that we use maxpagesize for PT_TLS
4493 segment alignment later in this function, so we are relying
4494 on at least one PT_LOAD segment appearing before a PT_TLS
4495 segment. */
4496 if (m->p_align_valid)
4497 maxpagesize = m->p_align;
4498
4499 p->p_align = maxpagesize;
4500 }
3271a814
NS
4501 else if (m->p_align_valid)
4502 p->p_align = m->p_align;
e970b90a
DJ
4503 else if (m->count == 0)
4504 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4505 else
4506 p->p_align = 0;
4507
bf988460
AM
4508 no_contents = FALSE;
4509 off_adjust = 0;
252b5132 4510 if (p->p_type == PT_LOAD
b301b248 4511 && m->count > 0)
252b5132 4512 {
b301b248 4513 bfd_size_type align;
a49e53ed 4514 unsigned int align_power = 0;
b301b248 4515
3271a814
NS
4516 if (m->p_align_valid)
4517 align = p->p_align;
4518 else
252b5132 4519 {
3271a814
NS
4520 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4521 {
4522 unsigned int secalign;
08a40648 4523
3271a814
NS
4524 secalign = bfd_get_section_alignment (abfd, *secpp);
4525 if (secalign > align_power)
4526 align_power = secalign;
4527 }
4528 align = (bfd_size_type) 1 << align_power;
4529 if (align < maxpagesize)
4530 align = maxpagesize;
b301b248 4531 }
252b5132 4532
02bf8d82
AM
4533 for (i = 0; i < m->count; i++)
4534 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4535 /* If we aren't making room for this section, then
4536 it must be SHT_NOBITS regardless of what we've
4537 set via struct bfd_elf_special_section. */
4538 elf_section_type (m->sections[i]) = SHT_NOBITS;
4539
bf988460 4540 /* Find out whether this segment contains any loadable
aea274d3
AM
4541 sections. */
4542 no_contents = TRUE;
4543 for (i = 0; i < m->count; i++)
4544 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4545 {
4546 no_contents = FALSE;
4547 break;
4548 }
bf988460 4549
85cfcbfb 4550 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
4551 off += off_adjust;
4552 if (no_contents)
4553 {
4554 /* We shouldn't need to align the segment on disk since
4555 the segment doesn't need file space, but the gABI
4556 arguably requires the alignment and glibc ld.so
4557 checks it. So to comply with the alignment
4558 requirement but not waste file space, we adjust
4559 p_offset for just this segment. (OFF_ADJUST is
4560 subtracted from OFF later.) This may put p_offset
4561 past the end of file, but that shouldn't matter. */
4562 }
4563 else
4564 off_adjust = 0;
252b5132 4565 }
b1a6d0b1
NC
4566 /* Make sure the .dynamic section is the first section in the
4567 PT_DYNAMIC segment. */
4568 else if (p->p_type == PT_DYNAMIC
4569 && m->count > 1
4570 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4571 {
4572 _bfd_error_handler
b301b248
AM
4573 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4574 abfd);
b1a6d0b1
NC
4575 bfd_set_error (bfd_error_bad_value);
4576 return FALSE;
4577 }
3f001e84
JK
4578 /* Set the note section type to SHT_NOTE. */
4579 else if (p->p_type == PT_NOTE)
4580 for (i = 0; i < m->count; i++)
4581 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4582
252b5132
RH
4583 p->p_offset = 0;
4584 p->p_filesz = 0;
4585 p->p_memsz = 0;
4586
4587 if (m->includes_filehdr)
4588 {
bf988460 4589 if (!m->p_flags_valid)
252b5132 4590 p->p_flags |= PF_R;
252b5132
RH
4591 p->p_filesz = bed->s->sizeof_ehdr;
4592 p->p_memsz = bed->s->sizeof_ehdr;
4593 if (m->count > 0)
4594 {
252b5132
RH
4595 if (p->p_vaddr < (bfd_vma) off)
4596 {
caf47ea6 4597 (*_bfd_error_handler)
b301b248
AM
4598 (_("%B: Not enough room for program headers, try linking with -N"),
4599 abfd);
252b5132 4600 bfd_set_error (bfd_error_bad_value);
b34976b6 4601 return FALSE;
252b5132
RH
4602 }
4603
4604 p->p_vaddr -= off;
bf988460 4605 if (!m->p_paddr_valid)
252b5132
RH
4606 p->p_paddr -= off;
4607 }
252b5132
RH
4608 }
4609
4610 if (m->includes_phdrs)
4611 {
bf988460 4612 if (!m->p_flags_valid)
252b5132
RH
4613 p->p_flags |= PF_R;
4614
f3520d2f 4615 if (!m->includes_filehdr)
252b5132
RH
4616 {
4617 p->p_offset = bed->s->sizeof_ehdr;
4618
4619 if (m->count > 0)
4620 {
252b5132 4621 p->p_vaddr -= off - p->p_offset;
bf988460 4622 if (!m->p_paddr_valid)
252b5132
RH
4623 p->p_paddr -= off - p->p_offset;
4624 }
252b5132
RH
4625 }
4626
4627 p->p_filesz += alloc * bed->s->sizeof_phdr;
4628 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4629 if (m->count)
4630 {
4631 p->p_filesz += header_pad;
4632 p->p_memsz += header_pad;
4633 }
252b5132
RH
4634 }
4635
4636 if (p->p_type == PT_LOAD
4637 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4638 {
bf988460 4639 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4640 p->p_offset = off;
252b5132
RH
4641 else
4642 {
4643 file_ptr adjust;
4644
4645 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4646 if (!no_contents)
4647 p->p_filesz += adjust;
252b5132
RH
4648 p->p_memsz += adjust;
4649 }
4650 }
4651
1ea63fd2
AM
4652 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4653 maps. Set filepos for sections in PT_LOAD segments, and in
4654 core files, for sections in PT_NOTE segments.
4655 assign_file_positions_for_non_load_sections will set filepos
4656 for other sections and update p_filesz for other segments. */
252b5132
RH
4657 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4658 {
4659 asection *sec;
252b5132 4660 bfd_size_type align;
627b32bc 4661 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4662
4663 sec = *secpp;
02bf8d82 4664 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4665 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4666
88967714
AM
4667 if ((p->p_type == PT_LOAD
4668 || p->p_type == PT_TLS)
4669 && (this_hdr->sh_type != SHT_NOBITS
4670 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4671 && ((this_hdr->sh_flags & SHF_TLS) == 0
4672 || p->p_type == PT_TLS))))
252b5132 4673 {
b5599592
AM
4674 bfd_vma p_start = p->p_paddr;
4675 bfd_vma p_end = p_start + p->p_memsz;
4676 bfd_vma s_start = sec->lma;
4677 bfd_vma adjust = s_start - p_end;
252b5132 4678
a2d1e028
L
4679 if (adjust != 0
4680 && (s_start < p_end
4681 || p_end < p_start))
252b5132 4682 {
88967714 4683 (*_bfd_error_handler)
b5599592
AM
4684 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
4685 (unsigned long) s_start, (unsigned long) p_end);
88967714 4686 adjust = 0;
b5599592 4687 sec->lma = p_end;
1cfb7d1e 4688 }
3ac9b6c9 4689 p->p_memsz += adjust;
1cfb7d1e 4690
88967714
AM
4691 if (this_hdr->sh_type != SHT_NOBITS)
4692 {
32812159
AM
4693 if (p->p_filesz + adjust < p->p_memsz)
4694 {
4695 /* We have a PROGBITS section following NOBITS ones.
4696 Allocate file space for the NOBITS section(s) and
4697 zero it. */
4698 adjust = p->p_memsz - p->p_filesz;
4699 if (!write_zeros (abfd, off, adjust))
4700 return FALSE;
4701 }
88967714
AM
4702 off += adjust;
4703 p->p_filesz += adjust;
252b5132 4704 }
252b5132
RH
4705 }
4706
4707 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4708 {
b301b248
AM
4709 /* The section at i == 0 is the one that actually contains
4710 everything. */
4a938328
MS
4711 if (i == 0)
4712 {
627b32bc 4713 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4714 off += this_hdr->sh_size;
4715 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4716 p->p_memsz = 0;
4717 p->p_align = 1;
252b5132 4718 }
4a938328 4719 else
252b5132 4720 {
b301b248 4721 /* The rest are fake sections that shouldn't be written. */
252b5132 4722 sec->filepos = 0;
eea6121a 4723 sec->size = 0;
b301b248
AM
4724 sec->flags = 0;
4725 continue;
252b5132 4726 }
252b5132
RH
4727 }
4728 else
4729 {
1e951488 4730 if (p->p_type == PT_LOAD)
b301b248 4731 {
1e951488
AM
4732 this_hdr->sh_offset = sec->filepos = off;
4733 if (this_hdr->sh_type != SHT_NOBITS)
4734 off += this_hdr->sh_size;
4735 }
4736 else if (this_hdr->sh_type == SHT_NOBITS
4737 && (this_hdr->sh_flags & SHF_TLS) != 0
4738 && this_hdr->sh_offset == 0)
4739 {
4740 /* This is a .tbss section that didn't get a PT_LOAD.
4741 (See _bfd_elf_map_sections_to_segments "Create a
4742 final PT_LOAD".) Set sh_offset to the value it
4743 would have if we had created a zero p_filesz and
4744 p_memsz PT_LOAD header for the section. This
4745 also makes the PT_TLS header have the same
4746 p_offset value. */
4747 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
4748 off, align);
4749 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 4750 }
252b5132 4751
02bf8d82 4752 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4753 {
6a3cd2b4 4754 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4755 /* A load section without SHF_ALLOC is something like
4756 a note section in a PT_NOTE segment. These take
4757 file space but are not loaded into memory. */
4758 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4759 p->p_memsz += this_hdr->sh_size;
b301b248 4760 }
6a3cd2b4 4761 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4762 {
6a3cd2b4
AM
4763 if (p->p_type == PT_TLS)
4764 p->p_memsz += this_hdr->sh_size;
4765
4766 /* .tbss is special. It doesn't contribute to p_memsz of
4767 normal segments. */
4768 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4769 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4770 }
4771
b10a8ae0
L
4772 if (align > p->p_align
4773 && !m->p_align_valid
4774 && (p->p_type != PT_LOAD
4775 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4776 p->p_align = align;
4777 }
4778
bf988460 4779 if (!m->p_flags_valid)
252b5132
RH
4780 {
4781 p->p_flags |= PF_R;
02bf8d82 4782 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4783 p->p_flags |= PF_X;
02bf8d82 4784 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4785 p->p_flags |= PF_W;
4786 }
4787 }
bf988460 4788 off -= off_adjust;
0920dee7 4789
7c928300
AM
4790 /* Check that all sections are in a PT_LOAD segment.
4791 Don't check funky gdb generated core files. */
4792 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
4793 {
4794 bfd_boolean check_vma = TRUE;
4795
4796 for (i = 1; i < m->count; i++)
4797 if (m->sections[i]->vma == m->sections[i - 1]->vma
4798 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
4799 ->this_hdr), p) != 0
4800 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
4801 ->this_hdr), p) != 0)
0920dee7 4802 {
9a83a553
AM
4803 /* Looks like we have overlays packed into the segment. */
4804 check_vma = FALSE;
4805 break;
0920dee7 4806 }
9a83a553
AM
4807
4808 for (i = 0; i < m->count; i++)
4809 {
4810 Elf_Internal_Shdr *this_hdr;
4811 asection *sec;
4812
4813 sec = m->sections[i];
4814 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
4815 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
4816 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553
AM
4817 {
4818 (*_bfd_error_handler)
4819 (_("%B: section `%A' can't be allocated in segment %d"),
4820 abfd, sec, j);
4821 print_segment_map (m);
4822 }
4823 }
4824 }
252b5132
RH
4825 }
4826
12bd6957 4827 elf_next_file_pos (abfd) = off;
f3520d2f
AM
4828 return TRUE;
4829}
4830
4831/* Assign file positions for the other sections. */
4832
4833static bfd_boolean
4834assign_file_positions_for_non_load_sections (bfd *abfd,
4835 struct bfd_link_info *link_info)
4836{
4837 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4838 Elf_Internal_Shdr **i_shdrpp;
4839 Elf_Internal_Shdr **hdrpp;
4840 Elf_Internal_Phdr *phdrs;
4841 Elf_Internal_Phdr *p;
4842 struct elf_segment_map *m;
62655c7b 4843 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
4844 bfd_vma filehdr_vaddr, filehdr_paddr;
4845 bfd_vma phdrs_vaddr, phdrs_paddr;
4846 file_ptr off;
4847 unsigned int num_sec;
4848 unsigned int i;
4849 unsigned int count;
4850
5c182d5f
AM
4851 i_shdrpp = elf_elfsections (abfd);
4852 num_sec = elf_numsections (abfd);
12bd6957 4853 off = elf_next_file_pos (abfd);
5c182d5f
AM
4854 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4855 {
5c182d5f
AM
4856 Elf_Internal_Shdr *hdr;
4857
4858 hdr = *hdrpp;
4859 if (hdr->bfd_section != NULL
252e386e
AM
4860 && (hdr->bfd_section->filepos != 0
4861 || (hdr->sh_type == SHT_NOBITS
4862 && hdr->contents == NULL)))
627b32bc 4863 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4864 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4865 {
e8d2ba53
AM
4866 if (hdr->sh_size != 0)
4867 (*_bfd_error_handler)
4868 (_("%B: warning: allocated section `%s' not in segment"),
4869 abfd,
4870 (hdr->bfd_section == NULL
4871 ? "*unknown*"
4872 : hdr->bfd_section->name));
3ba71138
L
4873 /* We don't need to page align empty sections. */
4874 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4875 off += vma_page_aligned_bias (hdr->sh_addr, off,
4876 bed->maxpagesize);
4877 else
4878 off += vma_page_aligned_bias (hdr->sh_addr, off,
4879 hdr->sh_addralign);
4880 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4881 FALSE);
4882 }
4883 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4884 && hdr->bfd_section == NULL)
12bd6957
AM
4885 || hdr == i_shdrpp[elf_onesymtab (abfd)]
4886 || hdr == i_shdrpp[elf_symtab_shndx (abfd)]
4887 || hdr == i_shdrpp[elf_strtab_sec (abfd)])
5c182d5f
AM
4888 hdr->sh_offset = -1;
4889 else
4890 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4891 }
4892
252b5132
RH
4893 /* Now that we have set the section file positions, we can set up
4894 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4895 count = 0;
4896 filehdr_vaddr = 0;
4897 filehdr_paddr = 0;
4898 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4899 phdrs_paddr = 0;
62655c7b 4900 hdrs_segment = NULL;
f3520d2f 4901 phdrs = elf_tdata (abfd)->phdr;
12bd6957 4902 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
4903 {
4904 ++count;
4905 if (p->p_type != PT_LOAD)
4906 continue;
4907
4908 if (m->includes_filehdr)
4909 {
4910 filehdr_vaddr = p->p_vaddr;
4911 filehdr_paddr = p->p_paddr;
4912 }
4913 if (m->includes_phdrs)
4914 {
4915 phdrs_vaddr = p->p_vaddr;
4916 phdrs_paddr = p->p_paddr;
4917 if (m->includes_filehdr)
4918 {
62655c7b 4919 hdrs_segment = m;
f3520d2f
AM
4920 phdrs_vaddr += bed->s->sizeof_ehdr;
4921 phdrs_paddr += bed->s->sizeof_ehdr;
4922 }
4923 }
4924 }
4925
62655c7b
RM
4926 if (hdrs_segment != NULL && link_info != NULL)
4927 {
4928 /* There is a segment that contains both the file headers and the
4929 program headers, so provide a symbol __ehdr_start pointing there.
4930 A program can use this to examine itself robustly. */
4931
4932 struct elf_link_hash_entry *hash
4933 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
4934 FALSE, FALSE, TRUE);
4935 /* If the symbol was referenced and not defined, define it. */
4936 if (hash != NULL
4937 && (hash->root.type == bfd_link_hash_new
4938 || hash->root.type == bfd_link_hash_undefined
4939 || hash->root.type == bfd_link_hash_undefweak
4940 || hash->root.type == bfd_link_hash_common))
4941 {
4942 asection *s = NULL;
4943 if (hdrs_segment->count != 0)
4944 /* The segment contains sections, so use the first one. */
4945 s = hdrs_segment->sections[0];
4946 else
4947 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 4948 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
4949 if (m->count != 0)
4950 {
4951 s = m->sections[0];
4952 break;
4953 }
4954
4955 if (s != NULL)
4956 {
4957 hash->root.u.def.value = filehdr_vaddr - s->vma;
4958 hash->root.u.def.section = s;
4959 }
4960 else
4961 {
4962 hash->root.u.def.value = filehdr_vaddr;
4963 hash->root.u.def.section = bfd_abs_section_ptr;
4964 }
4965
4966 hash->root.type = bfd_link_hash_defined;
4967 hash->def_regular = 1;
4968 hash->non_elf = 0;
4969 }
4970 }
4971
12bd6957 4972 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 4973 {
129af99f 4974 if (p->p_type == PT_GNU_RELRO)
252b5132 4975 {
b84a33b5 4976 const Elf_Internal_Phdr *lp;
3146fac4 4977 struct elf_segment_map *lm;
1ea63fd2 4978
129af99f 4979 if (link_info != NULL)
8c37241b 4980 {
129af99f
AS
4981 /* During linking the range of the RELRO segment is passed
4982 in link_info. */
12bd6957 4983 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
4984 lm != NULL;
4985 lm = lm->next, lp++)
8c37241b
JJ
4986 {
4987 if (lp->p_type == PT_LOAD
b84a33b5 4988 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
4989 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end
4990 && lm->count != 0
4991 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
4992 break;
4993 }
8981c88a
L
4994
4995 /* PR ld/14207. If the RELRO segment doesn't fit in the
4996 LOAD segment, it should be removed. */
3146fac4 4997 BFD_ASSERT (lm != NULL);
8c37241b 4998 }
129af99f
AS
4999 else
5000 {
5001 /* Otherwise we are copying an executable or shared
b84a33b5 5002 library, but we need to use the same linker logic. */
129af99f
AS
5003 for (lp = phdrs; lp < phdrs + count; ++lp)
5004 {
5005 if (lp->p_type == PT_LOAD
5006 && lp->p_paddr == p->p_paddr)
5007 break;
5008 }
b84a33b5
AM
5009 }
5010
5011 if (lp < phdrs + count)
5012 {
5013 p->p_vaddr = lp->p_vaddr;
5014 p->p_paddr = lp->p_paddr;
5015 p->p_offset = lp->p_offset;
5016 if (link_info != NULL)
5017 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5018 else if (m->p_size_valid)
5019 p->p_filesz = m->p_size;
129af99f
AS
5020 else
5021 abort ();
b84a33b5 5022 p->p_memsz = p->p_filesz;
f3944f72
L
5023 /* Preserve the alignment and flags if they are valid. The
5024 gold linker generates RW/4 for the PT_GNU_RELRO section.
5025 It is better for objcopy/strip to honor these attributes
5026 otherwise gdb will choke when using separate debug files.
5027 */
5028 if (!m->p_align_valid)
5029 p->p_align = 1;
5030 if (!m->p_flags_valid)
5031 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 5032 }
9433b9b1 5033 else
b84a33b5
AM
5034 {
5035 memset (p, 0, sizeof *p);
5036 p->p_type = PT_NULL;
5037 }
129af99f 5038 }
04c3a755
NS
5039 else if (p->p_type == PT_GNU_STACK)
5040 {
5041 if (m->p_size_valid)
5042 p->p_memsz = m->p_size;
5043 }
129af99f
AS
5044 else if (m->count != 0)
5045 {
5046 if (p->p_type != PT_LOAD
5047 && (p->p_type != PT_NOTE
5048 || bfd_get_format (abfd) != bfd_core))
5049 {
129af99f
AS
5050 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
5051
86b2281f 5052 p->p_filesz = 0;
129af99f 5053 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5054 for (i = m->count; i-- != 0;)
5055 {
5056 asection *sect = m->sections[i];
5057 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5058 if (hdr->sh_type != SHT_NOBITS)
5059 {
5060 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5061 + hdr->sh_size);
5062 break;
5063 }
5064 }
129af99f
AS
5065 }
5066 }
5067 else if (m->includes_filehdr)
5068 {
5069 p->p_vaddr = filehdr_vaddr;
5070 if (! m->p_paddr_valid)
5071 p->p_paddr = filehdr_paddr;
5072 }
5073 else if (m->includes_phdrs)
5074 {
5075 p->p_vaddr = phdrs_vaddr;
5076 if (! m->p_paddr_valid)
5077 p->p_paddr = phdrs_paddr;
252b5132
RH
5078 }
5079 }
5080
12bd6957 5081 elf_next_file_pos (abfd) = off;
252b5132 5082
b34976b6 5083 return TRUE;
252b5132
RH
5084}
5085
252b5132
RH
5086/* Work out the file positions of all the sections. This is called by
5087 _bfd_elf_compute_section_file_positions. All the section sizes and
5088 VMAs must be known before this is called.
5089
e0638f70
AM
5090 Reloc sections come in two flavours: Those processed specially as
5091 "side-channel" data attached to a section to which they apply, and
5092 those that bfd doesn't process as relocations. The latter sort are
5093 stored in a normal bfd section by bfd_section_from_shdr. We don't
5094 consider the former sort here, unless they form part of the loadable
5095 image. Reloc sections not assigned here will be handled later by
5096 assign_file_positions_for_relocs.
252b5132
RH
5097
5098 We also don't set the positions of the .symtab and .strtab here. */
5099
b34976b6 5100static bfd_boolean
c84fca4d
AO
5101assign_file_positions_except_relocs (bfd *abfd,
5102 struct bfd_link_info *link_info)
252b5132 5103{
5c182d5f
AM
5104 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5105 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 5106 file_ptr off;
9c5bfbb7 5107 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5108
5109 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5110 && bfd_get_format (abfd) != bfd_core)
5111 {
5c182d5f
AM
5112 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5113 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5114 Elf_Internal_Shdr **hdrpp;
5115 unsigned int i;
5116
5117 /* Start after the ELF header. */
5118 off = i_ehdrp->e_ehsize;
5119
5120 /* We are not creating an executable, which means that we are
5121 not creating a program header, and that the actual order of
5122 the sections in the file is unimportant. */
9ad5cbcf 5123 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5124 {
5125 Elf_Internal_Shdr *hdr;
5126
5127 hdr = *hdrpp;
e0638f70
AM
5128 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5129 && hdr->bfd_section == NULL)
12bd6957
AM
5130 || i == elf_onesymtab (abfd)
5131 || i == elf_symtab_shndx (abfd)
5132 || i == elf_strtab_sec (abfd))
252b5132
RH
5133 {
5134 hdr->sh_offset = -1;
252b5132 5135 }
9ad5cbcf 5136 else
b34976b6 5137 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
5138 }
5139 }
5140 else
5141 {
f3520d2f
AM
5142 unsigned int alloc;
5143
252b5132 5144 /* Assign file positions for the loaded sections based on the
08a40648 5145 assignment of sections to segments. */
f3520d2f
AM
5146 if (!assign_file_positions_for_load_sections (abfd, link_info))
5147 return FALSE;
5148
5149 /* And for non-load sections. */
5150 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
5151 return FALSE;
5152
e36284ab
AM
5153 if (bed->elf_backend_modify_program_headers != NULL)
5154 {
5155 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
5156 return FALSE;
5157 }
5158
58e7ebac
L
5159 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
5160 if (link_info != NULL
5161 && link_info->executable
5162 && link_info->shared)
5163 {
5164 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
5165 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
5166 Elf_Internal_Phdr *end_segment = &segment[num_segments];
5167
5168 /* Find the lowest p_vaddr in PT_LOAD segments. */
5169 bfd_vma p_vaddr = (bfd_vma) -1;
5170 for (; segment < end_segment; segment++)
5171 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
5172 p_vaddr = segment->p_vaddr;
5173
5174 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
5175 segments is non-zero. */
5176 if (p_vaddr)
5177 i_ehdrp->e_type = ET_EXEC;
5178 }
5179
f3520d2f 5180 /* Write out the program headers. */
12bd6957 5181 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
f3520d2f
AM
5182 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
5183 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 5184 return FALSE;
252b5132 5185
12bd6957 5186 off = elf_next_file_pos (abfd);
252b5132
RH
5187 }
5188
5189 /* Place the section headers. */
45d6a902 5190 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
5191 i_ehdrp->e_shoff = off;
5192 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
5193
12bd6957 5194 elf_next_file_pos (abfd) = off;
252b5132 5195
b34976b6 5196 return TRUE;
252b5132
RH
5197}
5198
b34976b6 5199static bfd_boolean
217aa764 5200prep_headers (bfd *abfd)
252b5132 5201{
3d540e93 5202 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 5203 struct elf_strtab_hash *shstrtab;
9c5bfbb7 5204 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5205
5206 i_ehdrp = elf_elfheader (abfd);
252b5132 5207
2b0f7ef9 5208 shstrtab = _bfd_elf_strtab_init ();
252b5132 5209 if (shstrtab == NULL)
b34976b6 5210 return FALSE;
252b5132
RH
5211
5212 elf_shstrtab (abfd) = shstrtab;
5213
5214 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
5215 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
5216 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
5217 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
5218
5219 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
5220 i_ehdrp->e_ident[EI_DATA] =
5221 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
5222 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
5223
252b5132
RH
5224 if ((abfd->flags & DYNAMIC) != 0)
5225 i_ehdrp->e_type = ET_DYN;
5226 else if ((abfd->flags & EXEC_P) != 0)
5227 i_ehdrp->e_type = ET_EXEC;
5228 else if (bfd_get_format (abfd) == bfd_core)
5229 i_ehdrp->e_type = ET_CORE;
5230 else
5231 i_ehdrp->e_type = ET_REL;
5232
5233 switch (bfd_get_arch (abfd))
5234 {
5235 case bfd_arch_unknown:
5236 i_ehdrp->e_machine = EM_NONE;
5237 break;
aa4f99bb
AO
5238
5239 /* There used to be a long list of cases here, each one setting
5240 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
5241 in the corresponding bfd definition. To avoid duplication,
5242 the switch was removed. Machines that need special handling
5243 can generally do it in elf_backend_final_write_processing(),
5244 unless they need the information earlier than the final write.
5245 Such need can generally be supplied by replacing the tests for
5246 e_machine with the conditions used to determine it. */
252b5132 5247 default:
9c5bfbb7
AM
5248 i_ehdrp->e_machine = bed->elf_machine_code;
5249 }
aa4f99bb 5250
252b5132
RH
5251 i_ehdrp->e_version = bed->s->ev_current;
5252 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
5253
c044fabd 5254 /* No program header, for now. */
252b5132
RH
5255 i_ehdrp->e_phoff = 0;
5256 i_ehdrp->e_phentsize = 0;
5257 i_ehdrp->e_phnum = 0;
5258
c044fabd 5259 /* Each bfd section is section header entry. */
252b5132
RH
5260 i_ehdrp->e_entry = bfd_get_start_address (abfd);
5261 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
5262
c044fabd 5263 /* If we're building an executable, we'll need a program header table. */
252b5132 5264 if (abfd->flags & EXEC_P)
0e71e495
BE
5265 /* It all happens later. */
5266 ;
252b5132
RH
5267 else
5268 {
5269 i_ehdrp->e_phentsize = 0;
252b5132
RH
5270 i_ehdrp->e_phoff = 0;
5271 }
5272
5273 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 5274 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 5275 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 5276 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 5277 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 5278 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
5279 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
5280 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
5281 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 5282 return FALSE;
252b5132 5283
b34976b6 5284 return TRUE;
252b5132
RH
5285}
5286
5287/* Assign file positions for all the reloc sections which are not part
5288 of the loadable file image. */
5289
5290void
217aa764 5291_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
5292{
5293 file_ptr off;
9ad5cbcf 5294 unsigned int i, num_sec;
252b5132
RH
5295 Elf_Internal_Shdr **shdrpp;
5296
12bd6957 5297 off = elf_next_file_pos (abfd);
252b5132 5298
9ad5cbcf
AM
5299 num_sec = elf_numsections (abfd);
5300 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5301 {
5302 Elf_Internal_Shdr *shdrp;
5303
5304 shdrp = *shdrpp;
5305 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5306 && shdrp->sh_offset == -1)
b34976b6 5307 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5308 }
5309
12bd6957 5310 elf_next_file_pos (abfd) = off;
252b5132
RH
5311}
5312
b34976b6 5313bfd_boolean
217aa764 5314_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5315{
9c5bfbb7 5316 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5317 Elf_Internal_Shdr **i_shdrp;
b34976b6 5318 bfd_boolean failed;
9ad5cbcf 5319 unsigned int count, num_sec;
30e8ee25 5320 struct elf_obj_tdata *t;
252b5132
RH
5321
5322 if (! abfd->output_has_begun
217aa764 5323 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5324 return FALSE;
252b5132
RH
5325
5326 i_shdrp = elf_elfsections (abfd);
252b5132 5327
b34976b6 5328 failed = FALSE;
252b5132
RH
5329 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5330 if (failed)
b34976b6 5331 return FALSE;
252b5132
RH
5332
5333 _bfd_elf_assign_file_positions_for_relocs (abfd);
5334
c044fabd 5335 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5336 num_sec = elf_numsections (abfd);
5337 for (count = 1; count < num_sec; count++)
252b5132
RH
5338 {
5339 if (bed->elf_backend_section_processing)
5340 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5341 if (i_shdrp[count]->contents)
5342 {
dc810e39
AM
5343 bfd_size_type amt = i_shdrp[count]->sh_size;
5344
252b5132 5345 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5346 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5347 return FALSE;
252b5132
RH
5348 }
5349 }
5350
5351 /* Write out the section header names. */
30e8ee25 5352 t = elf_tdata (abfd);
26ae6d5e 5353 if (elf_shstrtab (abfd) != NULL
30e8ee25 5354 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5355 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5356 return FALSE;
252b5132
RH
5357
5358 if (bed->elf_backend_final_write_processing)
12bd6957 5359 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 5360
ff59fc36
RM
5361 if (!bed->s->write_shdrs_and_ehdr (abfd))
5362 return FALSE;
5363
5364 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
5365 if (t->o->build_id.after_write_object_contents != NULL)
5366 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
5367
5368 return TRUE;
252b5132
RH
5369}
5370
b34976b6 5371bfd_boolean
217aa764 5372_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5373{
c044fabd 5374 /* Hopefully this can be done just like an object file. */
252b5132
RH
5375 return _bfd_elf_write_object_contents (abfd);
5376}
c044fabd
KH
5377
5378/* Given a section, search the header to find them. */
5379
cb33740c 5380unsigned int
198beae2 5381_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5382{
9c5bfbb7 5383 const struct elf_backend_data *bed;
91d6fa6a 5384 unsigned int sec_index;
252b5132 5385
9ad5cbcf
AM
5386 if (elf_section_data (asect) != NULL
5387 && elf_section_data (asect)->this_idx != 0)
5388 return elf_section_data (asect)->this_idx;
5389
5390 if (bfd_is_abs_section (asect))
91d6fa6a 5391 sec_index = SHN_ABS;
af746e92 5392 else if (bfd_is_com_section (asect))
91d6fa6a 5393 sec_index = SHN_COMMON;
af746e92 5394 else if (bfd_is_und_section (asect))
91d6fa6a 5395 sec_index = SHN_UNDEF;
af746e92 5396 else
91d6fa6a 5397 sec_index = SHN_BAD;
252b5132 5398
af746e92 5399 bed = get_elf_backend_data (abfd);
252b5132
RH
5400 if (bed->elf_backend_section_from_bfd_section)
5401 {
91d6fa6a 5402 int retval = sec_index;
9ad5cbcf 5403
af746e92
AM
5404 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5405 return retval;
252b5132
RH
5406 }
5407
91d6fa6a 5408 if (sec_index == SHN_BAD)
af746e92 5409 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5410
91d6fa6a 5411 return sec_index;
252b5132
RH
5412}
5413
5414/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5415 on error. */
5416
5417int
217aa764 5418_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5419{
5420 asymbol *asym_ptr = *asym_ptr_ptr;
5421 int idx;
5422 flagword flags = asym_ptr->flags;
5423
5424 /* When gas creates relocations against local labels, it creates its
5425 own symbol for the section, but does put the symbol into the
5426 symbol chain, so udata is 0. When the linker is generating
5427 relocatable output, this section symbol may be for one of the
5428 input sections rather than the output section. */
5429 if (asym_ptr->udata.i == 0
5430 && (flags & BSF_SECTION_SYM)
5431 && asym_ptr->section)
5432 {
5372391b 5433 asection *sec;
252b5132
RH
5434 int indx;
5435
5372391b
AM
5436 sec = asym_ptr->section;
5437 if (sec->owner != abfd && sec->output_section != NULL)
5438 sec = sec->output_section;
5439 if (sec->owner == abfd
5440 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5441 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5442 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5443 }
5444
5445 idx = asym_ptr->udata.i;
5446
5447 if (idx == 0)
5448 {
5449 /* This case can occur when using --strip-symbol on a symbol
08a40648 5450 which is used in a relocation entry. */
252b5132 5451 (*_bfd_error_handler)
d003868e
AM
5452 (_("%B: symbol `%s' required but not present"),
5453 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5454 bfd_set_error (bfd_error_no_symbols);
5455 return -1;
5456 }
5457
5458#if DEBUG & 4
5459 {
5460 fprintf (stderr,
9ccb8af9
AM
5461 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
5462 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
5463 fflush (stderr);
5464 }
5465#endif
5466
5467 return idx;
5468}
5469
84d1d650 5470/* Rewrite program header information. */
252b5132 5471
b34976b6 5472static bfd_boolean
84d1d650 5473rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5474{
b34976b6
AM
5475 Elf_Internal_Ehdr *iehdr;
5476 struct elf_segment_map *map;
5477 struct elf_segment_map *map_first;
5478 struct elf_segment_map **pointer_to_map;
5479 Elf_Internal_Phdr *segment;
5480 asection *section;
5481 unsigned int i;
5482 unsigned int num_segments;
5483 bfd_boolean phdr_included = FALSE;
5c44b38e 5484 bfd_boolean p_paddr_valid;
b34976b6
AM
5485 bfd_vma maxpagesize;
5486 struct elf_segment_map *phdr_adjust_seg = NULL;
5487 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5488 const struct elf_backend_data *bed;
bc67d8a6 5489
caf47ea6 5490 bed = get_elf_backend_data (ibfd);
252b5132
RH
5491 iehdr = elf_elfheader (ibfd);
5492
bc67d8a6 5493 map_first = NULL;
c044fabd 5494 pointer_to_map = &map_first;
252b5132
RH
5495
5496 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5497 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5498
5499 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5500#define SEGMENT_END(segment, start) \
5501 (start + (segment->p_memsz > segment->p_filesz \
5502 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5503
eecdbe52
JJ
5504#define SECTION_SIZE(section, segment) \
5505 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5506 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5507 ? section->size : 0)
eecdbe52 5508
b34976b6 5509 /* Returns TRUE if the given section is contained within
bc67d8a6 5510 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5511#define IS_CONTAINED_BY_VMA(section, segment) \
5512 (section->vma >= segment->p_vaddr \
eecdbe52 5513 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5514 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5515
b34976b6 5516 /* Returns TRUE if the given section is contained within
bc67d8a6 5517 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5518#define IS_CONTAINED_BY_LMA(section, segment, base) \
5519 (section->lma >= base \
eecdbe52 5520 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5521 <= SEGMENT_END (segment, base)))
252b5132 5522
0efc80c8
L
5523 /* Handle PT_NOTE segment. */
5524#define IS_NOTE(p, s) \
aecc8f8a 5525 (p->p_type == PT_NOTE \
0efc80c8 5526 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5527 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5528 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5529 <= p->p_offset + p->p_filesz))
252b5132 5530
0efc80c8
L
5531 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5532 etc. */
5533#define IS_COREFILE_NOTE(p, s) \
5534 (IS_NOTE (p, s) \
5535 && bfd_get_format (ibfd) == bfd_core \
5536 && s->vma == 0 \
5537 && s->lma == 0)
5538
252b5132
RH
5539 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5540 linker, which generates a PT_INTERP section with p_vaddr and
5541 p_memsz set to 0. */
aecc8f8a
AM
5542#define IS_SOLARIS_PT_INTERP(p, s) \
5543 (p->p_vaddr == 0 \
5544 && p->p_paddr == 0 \
5545 && p->p_memsz == 0 \
5546 && p->p_filesz > 0 \
5547 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5548 && s->size > 0 \
aecc8f8a 5549 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5550 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5551 <= p->p_offset + p->p_filesz))
5c440b1e 5552
bc67d8a6
NC
5553 /* Decide if the given section should be included in the given segment.
5554 A section will be included if:
f5ffc919 5555 1. It is within the address space of the segment -- we use the LMA
08a40648 5556 if that is set for the segment and the VMA otherwise,
0efc80c8 5557 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 5558 segment.
bc67d8a6 5559 3. There is an output section associated with it,
eecdbe52 5560 4. The section has not already been allocated to a previous segment.
2b05f1b7 5561 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5562 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5563 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5564 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5565 (with the possible exception of .dynamic). */
9f17e2a6 5566#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5567 ((((segment->p_paddr \
5568 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5569 : IS_CONTAINED_BY_VMA (section, segment)) \
5570 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5571 || IS_NOTE (segment, section)) \
2b05f1b7
L
5572 && segment->p_type != PT_GNU_STACK \
5573 && (segment->p_type != PT_TLS \
5574 || (section->flags & SEC_THREAD_LOCAL)) \
5575 && (segment->p_type == PT_LOAD \
5576 || segment->p_type == PT_TLS \
5577 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5578 && (segment->p_type != PT_DYNAMIC \
5579 || SECTION_SIZE (section, segment) > 0 \
5580 || (segment->p_paddr \
5581 ? segment->p_paddr != section->lma \
5582 : segment->p_vaddr != section->vma) \
5583 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5584 == 0)) \
0067a569 5585 && !section->segment_mark)
bc67d8a6 5586
9f17e2a6
L
5587/* If the output section of a section in the input segment is NULL,
5588 it is removed from the corresponding output segment. */
5589#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5590 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5591 && section->output_section != NULL)
5592
b34976b6 5593 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5594#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5595 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5596
5597 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5598 their VMA address ranges and their LMA address ranges overlap.
5599 It is possible to have overlapping VMA ranges without overlapping LMA
5600 ranges. RedBoot images for example can have both .data and .bss mapped
5601 to the same VMA range, but with the .data section mapped to a different
5602 LMA. */
aecc8f8a 5603#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5604 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5605 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5606 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5607 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5608
5609 /* Initialise the segment mark field. */
5610 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5611 section->segment_mark = FALSE;
bc67d8a6 5612
5c44b38e
AM
5613 /* The Solaris linker creates program headers in which all the
5614 p_paddr fields are zero. When we try to objcopy or strip such a
5615 file, we get confused. Check for this case, and if we find it
5616 don't set the p_paddr_valid fields. */
5617 p_paddr_valid = FALSE;
5618 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5619 i < num_segments;
5620 i++, segment++)
5621 if (segment->p_paddr != 0)
5622 {
5623 p_paddr_valid = TRUE;
5624 break;
5625 }
5626
252b5132 5627 /* Scan through the segments specified in the program header
bc67d8a6 5628 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5629 in the loadable segments. These can be created by weird
aecc8f8a 5630 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5631 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5632 i < num_segments;
c044fabd 5633 i++, segment++)
252b5132 5634 {
252b5132 5635 unsigned int j;
c044fabd 5636 Elf_Internal_Phdr *segment2;
252b5132 5637
aecc8f8a
AM
5638 if (segment->p_type == PT_INTERP)
5639 for (section = ibfd->sections; section; section = section->next)
5640 if (IS_SOLARIS_PT_INTERP (segment, section))
5641 {
5642 /* Mininal change so that the normal section to segment
4cc11e76 5643 assignment code will work. */
aecc8f8a
AM
5644 segment->p_vaddr = section->vma;
5645 break;
5646 }
5647
bc67d8a6 5648 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5649 {
5650 /* Remove PT_GNU_RELRO segment. */
5651 if (segment->p_type == PT_GNU_RELRO)
5652 segment->p_type = PT_NULL;
5653 continue;
5654 }
c044fabd 5655
bc67d8a6 5656 /* Determine if this segment overlaps any previous segments. */
0067a569 5657 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5658 {
5659 bfd_signed_vma extra_length;
c044fabd 5660
bc67d8a6 5661 if (segment2->p_type != PT_LOAD
0067a569 5662 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5663 continue;
c044fabd 5664
bc67d8a6
NC
5665 /* Merge the two segments together. */
5666 if (segment2->p_vaddr < segment->p_vaddr)
5667 {
c044fabd 5668 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5669 SEGMENT. */
0067a569
AM
5670 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5671 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5672
bc67d8a6
NC
5673 if (extra_length > 0)
5674 {
0067a569 5675 segment2->p_memsz += extra_length;
bc67d8a6
NC
5676 segment2->p_filesz += extra_length;
5677 }
c044fabd 5678
bc67d8a6 5679 segment->p_type = PT_NULL;
c044fabd 5680
bc67d8a6
NC
5681 /* Since we have deleted P we must restart the outer loop. */
5682 i = 0;
5683 segment = elf_tdata (ibfd)->phdr;
5684 break;
5685 }
5686 else
5687 {
c044fabd 5688 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5689 SEGMENT2. */
0067a569
AM
5690 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5691 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5692
bc67d8a6
NC
5693 if (extra_length > 0)
5694 {
0067a569 5695 segment->p_memsz += extra_length;
bc67d8a6
NC
5696 segment->p_filesz += extra_length;
5697 }
c044fabd 5698
bc67d8a6
NC
5699 segment2->p_type = PT_NULL;
5700 }
5701 }
5702 }
c044fabd 5703
bc67d8a6
NC
5704 /* The second scan attempts to assign sections to segments. */
5705 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5706 i < num_segments;
0067a569 5707 i++, segment++)
bc67d8a6 5708 {
0067a569
AM
5709 unsigned int section_count;
5710 asection **sections;
5711 asection *output_section;
5712 unsigned int isec;
5713 bfd_vma matching_lma;
5714 bfd_vma suggested_lma;
5715 unsigned int j;
dc810e39 5716 bfd_size_type amt;
0067a569
AM
5717 asection *first_section;
5718 bfd_boolean first_matching_lma;
5719 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5720
5721 if (segment->p_type == PT_NULL)
5722 continue;
c044fabd 5723
9f17e2a6 5724 first_section = NULL;
bc67d8a6 5725 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5726 for (section = ibfd->sections, section_count = 0;
5727 section != NULL;
5728 section = section->next)
9f17e2a6
L
5729 {
5730 /* Find the first section in the input segment, which may be
5731 removed from the corresponding output segment. */
5732 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5733 {
5734 if (first_section == NULL)
5735 first_section = section;
5736 if (section->output_section != NULL)
5737 ++section_count;
5738 }
5739 }
811072d8 5740
b5f852ea
NC
5741 /* Allocate a segment map big enough to contain
5742 all of the sections we have selected. */
dc810e39
AM
5743 amt = sizeof (struct elf_segment_map);
5744 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5745 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5746 if (map == NULL)
b34976b6 5747 return FALSE;
252b5132
RH
5748
5749 /* Initialise the fields of the segment map. Default to
5750 using the physical address of the segment in the input BFD. */
0067a569
AM
5751 map->next = NULL;
5752 map->p_type = segment->p_type;
5753 map->p_flags = segment->p_flags;
bc67d8a6 5754 map->p_flags_valid = 1;
55d55ac7 5755
9f17e2a6
L
5756 /* If the first section in the input segment is removed, there is
5757 no need to preserve segment physical address in the corresponding
5758 output segment. */
945c025a 5759 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5760 {
5761 map->p_paddr = segment->p_paddr;
5c44b38e 5762 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5763 }
252b5132
RH
5764
5765 /* Determine if this segment contains the ELF file header
5766 and if it contains the program headers themselves. */
bc67d8a6
NC
5767 map->includes_filehdr = (segment->p_offset == 0
5768 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5769 map->includes_phdrs = 0;
252b5132 5770
0067a569 5771 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5772 {
bc67d8a6
NC
5773 map->includes_phdrs =
5774 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5775 && (segment->p_offset + segment->p_filesz
252b5132
RH
5776 >= ((bfd_vma) iehdr->e_phoff
5777 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5778
bc67d8a6 5779 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5780 phdr_included = TRUE;
252b5132
RH
5781 }
5782
bc67d8a6 5783 if (section_count == 0)
252b5132
RH
5784 {
5785 /* Special segments, such as the PT_PHDR segment, may contain
5786 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5787 something. They are allowed by the ELF spec however, so only
5788 a warning is produced. */
bc67d8a6 5789 if (segment->p_type == PT_LOAD)
0067a569
AM
5790 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5791 " detected, is this intentional ?\n"),
5792 ibfd);
252b5132 5793
bc67d8a6 5794 map->count = 0;
c044fabd
KH
5795 *pointer_to_map = map;
5796 pointer_to_map = &map->next;
252b5132
RH
5797
5798 continue;
5799 }
5800
5801 /* Now scan the sections in the input BFD again and attempt
5802 to add their corresponding output sections to the segment map.
5803 The problem here is how to handle an output section which has
5804 been moved (ie had its LMA changed). There are four possibilities:
5805
5806 1. None of the sections have been moved.
5807 In this case we can continue to use the segment LMA from the
5808 input BFD.
5809
5810 2. All of the sections have been moved by the same amount.
5811 In this case we can change the segment's LMA to match the LMA
5812 of the first section.
5813
5814 3. Some of the sections have been moved, others have not.
5815 In this case those sections which have not been moved can be
5816 placed in the current segment which will have to have its size,
5817 and possibly its LMA changed, and a new segment or segments will
5818 have to be created to contain the other sections.
5819
b5f852ea 5820 4. The sections have been moved, but not by the same amount.
252b5132
RH
5821 In this case we can change the segment's LMA to match the LMA
5822 of the first section and we will have to create a new segment
5823 or segments to contain the other sections.
5824
5825 In order to save time, we allocate an array to hold the section
5826 pointers that we are interested in. As these sections get assigned
5827 to a segment, they are removed from this array. */
5828
a50b1753 5829 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5830 if (sections == NULL)
b34976b6 5831 return FALSE;
252b5132
RH
5832
5833 /* Step One: Scan for segment vs section LMA conflicts.
5834 Also add the sections to the section array allocated above.
5835 Also add the sections to the current segment. In the common
5836 case, where the sections have not been moved, this means that
5837 we have completely filled the segment, and there is nothing
5838 more to do. */
252b5132 5839 isec = 0;
72730e0c 5840 matching_lma = 0;
252b5132 5841 suggested_lma = 0;
0067a569
AM
5842 first_matching_lma = TRUE;
5843 first_suggested_lma = TRUE;
252b5132 5844
147d51c2 5845 for (section = ibfd->sections;
bc67d8a6
NC
5846 section != NULL;
5847 section = section->next)
147d51c2
L
5848 if (section == first_section)
5849 break;
5850
5851 for (j = 0; section != NULL; section = section->next)
252b5132 5852 {
caf47ea6 5853 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5854 {
bc67d8a6
NC
5855 output_section = section->output_section;
5856
0067a569 5857 sections[j++] = section;
252b5132
RH
5858
5859 /* The Solaris native linker always sets p_paddr to 0.
5860 We try to catch that case here, and set it to the
5e8d7549
NC
5861 correct value. Note - some backends require that
5862 p_paddr be left as zero. */
5c44b38e 5863 if (!p_paddr_valid
4455705d 5864 && segment->p_vaddr != 0
0067a569 5865 && !bed->want_p_paddr_set_to_zero
252b5132 5866 && isec == 0
bc67d8a6 5867 && output_section->lma != 0
0067a569
AM
5868 && output_section->vma == (segment->p_vaddr
5869 + (map->includes_filehdr
5870 ? iehdr->e_ehsize
5871 : 0)
5872 + (map->includes_phdrs
5873 ? (iehdr->e_phnum
5874 * iehdr->e_phentsize)
5875 : 0)))
bc67d8a6 5876 map->p_paddr = segment->p_vaddr;
252b5132
RH
5877
5878 /* Match up the physical address of the segment with the
5879 LMA address of the output section. */
bc67d8a6 5880 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5881 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5882 || (bed->want_p_paddr_set_to_zero
5883 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5884 {
0067a569
AM
5885 if (first_matching_lma || output_section->lma < matching_lma)
5886 {
5887 matching_lma = output_section->lma;
5888 first_matching_lma = FALSE;
5889 }
252b5132
RH
5890
5891 /* We assume that if the section fits within the segment
bc67d8a6 5892 then it does not overlap any other section within that
252b5132 5893 segment. */
0067a569
AM
5894 map->sections[isec++] = output_section;
5895 }
5896 else if (first_suggested_lma)
5897 {
5898 suggested_lma = output_section->lma;
5899 first_suggested_lma = FALSE;
252b5132 5900 }
147d51c2
L
5901
5902 if (j == section_count)
5903 break;
252b5132
RH
5904 }
5905 }
5906
bc67d8a6 5907 BFD_ASSERT (j == section_count);
252b5132
RH
5908
5909 /* Step Two: Adjust the physical address of the current segment,
5910 if necessary. */
bc67d8a6 5911 if (isec == section_count)
252b5132
RH
5912 {
5913 /* All of the sections fitted within the segment as currently
5914 specified. This is the default case. Add the segment to
5915 the list of built segments and carry on to process the next
5916 program header in the input BFD. */
bc67d8a6 5917 map->count = section_count;
c044fabd
KH
5918 *pointer_to_map = map;
5919 pointer_to_map = &map->next;
08a40648 5920
5c44b38e
AM
5921 if (p_paddr_valid
5922 && !bed->want_p_paddr_set_to_zero
147d51c2 5923 && matching_lma != map->p_paddr
5c44b38e
AM
5924 && !map->includes_filehdr
5925 && !map->includes_phdrs)
3271a814
NS
5926 /* There is some padding before the first section in the
5927 segment. So, we must account for that in the output
5928 segment's vma. */
5929 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5930
252b5132
RH
5931 free (sections);
5932 continue;
5933 }
252b5132
RH
5934 else
5935 {
0067a569 5936 if (!first_matching_lma)
72730e0c
AM
5937 {
5938 /* At least one section fits inside the current segment.
5939 Keep it, but modify its physical address to match the
5940 LMA of the first section that fitted. */
bc67d8a6 5941 map->p_paddr = matching_lma;
72730e0c
AM
5942 }
5943 else
5944 {
5945 /* None of the sections fitted inside the current segment.
5946 Change the current segment's physical address to match
5947 the LMA of the first section. */
bc67d8a6 5948 map->p_paddr = suggested_lma;
72730e0c
AM
5949 }
5950
bc67d8a6
NC
5951 /* Offset the segment physical address from the lma
5952 to allow for space taken up by elf headers. */
5953 if (map->includes_filehdr)
010c8431
AM
5954 {
5955 if (map->p_paddr >= iehdr->e_ehsize)
5956 map->p_paddr -= iehdr->e_ehsize;
5957 else
5958 {
5959 map->includes_filehdr = FALSE;
5960 map->includes_phdrs = FALSE;
5961 }
5962 }
252b5132 5963
bc67d8a6
NC
5964 if (map->includes_phdrs)
5965 {
010c8431
AM
5966 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5967 {
5968 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5969
5970 /* iehdr->e_phnum is just an estimate of the number
5971 of program headers that we will need. Make a note
5972 here of the number we used and the segment we chose
5973 to hold these headers, so that we can adjust the
5974 offset when we know the correct value. */
5975 phdr_adjust_num = iehdr->e_phnum;
5976 phdr_adjust_seg = map;
5977 }
5978 else
5979 map->includes_phdrs = FALSE;
bc67d8a6 5980 }
252b5132
RH
5981 }
5982
5983 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5984 those that fit to the current segment and removing them from the
252b5132
RH
5985 sections array; but making sure not to leave large gaps. Once all
5986 possible sections have been assigned to the current segment it is
5987 added to the list of built segments and if sections still remain
5988 to be assigned, a new segment is constructed before repeating
5989 the loop. */
5990 isec = 0;
5991 do
5992 {
bc67d8a6 5993 map->count = 0;
252b5132 5994 suggested_lma = 0;
0067a569 5995 first_suggested_lma = TRUE;
252b5132
RH
5996
5997 /* Fill the current segment with sections that fit. */
bc67d8a6 5998 for (j = 0; j < section_count; j++)
252b5132 5999 {
bc67d8a6 6000 section = sections[j];
252b5132 6001
bc67d8a6 6002 if (section == NULL)
252b5132
RH
6003 continue;
6004
bc67d8a6 6005 output_section = section->output_section;
252b5132 6006
bc67d8a6 6007 BFD_ASSERT (output_section != NULL);
c044fabd 6008
bc67d8a6
NC
6009 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6010 || IS_COREFILE_NOTE (segment, section))
252b5132 6011 {
bc67d8a6 6012 if (map->count == 0)
252b5132
RH
6013 {
6014 /* If the first section in a segment does not start at
bc67d8a6
NC
6015 the beginning of the segment, then something is
6016 wrong. */
0067a569
AM
6017 if (output_section->lma
6018 != (map->p_paddr
6019 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
6020 + (map->includes_phdrs
6021 ? iehdr->e_phnum * iehdr->e_phentsize
6022 : 0)))
252b5132
RH
6023 abort ();
6024 }
6025 else
6026 {
0067a569 6027 asection *prev_sec;
252b5132 6028
bc67d8a6 6029 prev_sec = map->sections[map->count - 1];
252b5132
RH
6030
6031 /* If the gap between the end of the previous section
bc67d8a6
NC
6032 and the start of this section is more than
6033 maxpagesize then we need to start a new segment. */
eea6121a 6034 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 6035 maxpagesize)
caf47ea6 6036 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 6037 || (prev_sec->lma + prev_sec->size
079e9a2f 6038 > output_section->lma))
252b5132 6039 {
0067a569
AM
6040 if (first_suggested_lma)
6041 {
6042 suggested_lma = output_section->lma;
6043 first_suggested_lma = FALSE;
6044 }
252b5132
RH
6045
6046 continue;
6047 }
6048 }
6049
bc67d8a6 6050 map->sections[map->count++] = output_section;
252b5132
RH
6051 ++isec;
6052 sections[j] = NULL;
b34976b6 6053 section->segment_mark = TRUE;
252b5132 6054 }
0067a569
AM
6055 else if (first_suggested_lma)
6056 {
6057 suggested_lma = output_section->lma;
6058 first_suggested_lma = FALSE;
6059 }
252b5132
RH
6060 }
6061
bc67d8a6 6062 BFD_ASSERT (map->count > 0);
252b5132
RH
6063
6064 /* Add the current segment to the list of built segments. */
c044fabd
KH
6065 *pointer_to_map = map;
6066 pointer_to_map = &map->next;
252b5132 6067
bc67d8a6 6068 if (isec < section_count)
252b5132
RH
6069 {
6070 /* We still have not allocated all of the sections to
6071 segments. Create a new segment here, initialise it
6072 and carry on looping. */
dc810e39
AM
6073 amt = sizeof (struct elf_segment_map);
6074 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 6075 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6076 if (map == NULL)
5ed6aba4
NC
6077 {
6078 free (sections);
6079 return FALSE;
6080 }
252b5132
RH
6081
6082 /* Initialise the fields of the segment map. Set the physical
6083 physical address to the LMA of the first section that has
6084 not yet been assigned. */
0067a569
AM
6085 map->next = NULL;
6086 map->p_type = segment->p_type;
6087 map->p_flags = segment->p_flags;
6088 map->p_flags_valid = 1;
6089 map->p_paddr = suggested_lma;
5c44b38e 6090 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 6091 map->includes_filehdr = 0;
0067a569 6092 map->includes_phdrs = 0;
252b5132
RH
6093 }
6094 }
bc67d8a6 6095 while (isec < section_count);
252b5132
RH
6096
6097 free (sections);
6098 }
6099
12bd6957 6100 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
6101
6102 /* If we had to estimate the number of program headers that were
9ad5cbcf 6103 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
6104 the offset if necessary. */
6105 if (phdr_adjust_seg != NULL)
6106 {
6107 unsigned int count;
c044fabd 6108
bc67d8a6 6109 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 6110 count++;
252b5132 6111
bc67d8a6
NC
6112 if (count > phdr_adjust_num)
6113 phdr_adjust_seg->p_paddr
6114 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
6115 }
c044fabd 6116
bc67d8a6 6117#undef SEGMENT_END
eecdbe52 6118#undef SECTION_SIZE
bc67d8a6
NC
6119#undef IS_CONTAINED_BY_VMA
6120#undef IS_CONTAINED_BY_LMA
0efc80c8 6121#undef IS_NOTE
252b5132 6122#undef IS_COREFILE_NOTE
bc67d8a6 6123#undef IS_SOLARIS_PT_INTERP
9f17e2a6 6124#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
6125#undef INCLUDE_SECTION_IN_SEGMENT
6126#undef SEGMENT_AFTER_SEGMENT
6127#undef SEGMENT_OVERLAPS
b34976b6 6128 return TRUE;
252b5132
RH
6129}
6130
84d1d650
L
6131/* Copy ELF program header information. */
6132
6133static bfd_boolean
6134copy_elf_program_header (bfd *ibfd, bfd *obfd)
6135{
6136 Elf_Internal_Ehdr *iehdr;
6137 struct elf_segment_map *map;
6138 struct elf_segment_map *map_first;
6139 struct elf_segment_map **pointer_to_map;
6140 Elf_Internal_Phdr *segment;
6141 unsigned int i;
6142 unsigned int num_segments;
6143 bfd_boolean phdr_included = FALSE;
88967714 6144 bfd_boolean p_paddr_valid;
84d1d650
L
6145
6146 iehdr = elf_elfheader (ibfd);
6147
6148 map_first = NULL;
6149 pointer_to_map = &map_first;
6150
88967714
AM
6151 /* If all the segment p_paddr fields are zero, don't set
6152 map->p_paddr_valid. */
6153 p_paddr_valid = FALSE;
84d1d650 6154 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
6155 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6156 i < num_segments;
6157 i++, segment++)
6158 if (segment->p_paddr != 0)
6159 {
6160 p_paddr_valid = TRUE;
6161 break;
6162 }
6163
84d1d650
L
6164 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6165 i < num_segments;
6166 i++, segment++)
6167 {
6168 asection *section;
6169 unsigned int section_count;
6170 bfd_size_type amt;
6171 Elf_Internal_Shdr *this_hdr;
53020534 6172 asection *first_section = NULL;
a76e6f2f 6173 asection *lowest_section;
84d1d650 6174
84d1d650
L
6175 /* Compute how many sections are in this segment. */
6176 for (section = ibfd->sections, section_count = 0;
6177 section != NULL;
6178 section = section->next)
6179 {
6180 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6181 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 6182 {
a76e6f2f
AM
6183 if (first_section == NULL)
6184 first_section = section;
3271a814
NS
6185 section_count++;
6186 }
84d1d650
L
6187 }
6188
6189 /* Allocate a segment map big enough to contain
6190 all of the sections we have selected. */
6191 amt = sizeof (struct elf_segment_map);
6192 if (section_count != 0)
6193 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6194 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
6195 if (map == NULL)
6196 return FALSE;
6197
6198 /* Initialize the fields of the output segment map with the
6199 input segment. */
6200 map->next = NULL;
6201 map->p_type = segment->p_type;
6202 map->p_flags = segment->p_flags;
6203 map->p_flags_valid = 1;
6204 map->p_paddr = segment->p_paddr;
88967714 6205 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
6206 map->p_align = segment->p_align;
6207 map->p_align_valid = 1;
3271a814 6208 map->p_vaddr_offset = 0;
84d1d650 6209
04c3a755
NS
6210 if (map->p_type == PT_GNU_RELRO
6211 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
6212 {
6213 /* The PT_GNU_RELRO segment may contain the first a few
6214 bytes in the .got.plt section even if the whole .got.plt
6215 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
6216 change the size of the PT_GNU_RELRO segment.
6217 Similarly, PT_GNU_STACK size is significant on uclinux
6218 systems. */
9433b9b1 6219 map->p_size = segment->p_memsz;
b10a8ae0
L
6220 map->p_size_valid = 1;
6221 }
6222
84d1d650
L
6223 /* Determine if this segment contains the ELF file header
6224 and if it contains the program headers themselves. */
6225 map->includes_filehdr = (segment->p_offset == 0
6226 && segment->p_filesz >= iehdr->e_ehsize);
6227
6228 map->includes_phdrs = 0;
6229 if (! phdr_included || segment->p_type != PT_LOAD)
6230 {
6231 map->includes_phdrs =
6232 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6233 && (segment->p_offset + segment->p_filesz
6234 >= ((bfd_vma) iehdr->e_phoff
6235 + iehdr->e_phnum * iehdr->e_phentsize)));
6236
6237 if (segment->p_type == PT_LOAD && map->includes_phdrs)
6238 phdr_included = TRUE;
6239 }
6240
a76e6f2f 6241 lowest_section = first_section;
84d1d650
L
6242 if (section_count != 0)
6243 {
6244 unsigned int isec = 0;
6245
53020534 6246 for (section = first_section;
84d1d650
L
6247 section != NULL;
6248 section = section->next)
6249 {
6250 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6251 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
6252 {
6253 map->sections[isec++] = section->output_section;
a76e6f2f
AM
6254 if ((section->flags & SEC_ALLOC) != 0)
6255 {
6256 bfd_vma seg_off;
6257
fb8a5684
AM
6258 if (section->lma < lowest_section->lma)
6259 lowest_section = section;
6260
a76e6f2f
AM
6261 /* Section lmas are set up from PT_LOAD header
6262 p_paddr in _bfd_elf_make_section_from_shdr.
6263 If this header has a p_paddr that disagrees
6264 with the section lma, flag the p_paddr as
6265 invalid. */
6266 if ((section->flags & SEC_LOAD) != 0)
6267 seg_off = this_hdr->sh_offset - segment->p_offset;
6268 else
6269 seg_off = this_hdr->sh_addr - segment->p_vaddr;
6270 if (section->lma - segment->p_paddr != seg_off)
6271 map->p_paddr_valid = FALSE;
6272 }
53020534
L
6273 if (isec == section_count)
6274 break;
6275 }
84d1d650
L
6276 }
6277 }
6278
a76e6f2f
AM
6279 if (map->includes_filehdr && lowest_section != NULL)
6280 /* We need to keep the space used by the headers fixed. */
6281 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 6282
a76e6f2f
AM
6283 if (!map->includes_phdrs
6284 && !map->includes_filehdr
6285 && map->p_paddr_valid)
6286 /* There is some other padding before the first section. */
6287 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
6288 - segment->p_paddr);
6289
84d1d650
L
6290 map->count = section_count;
6291 *pointer_to_map = map;
6292 pointer_to_map = &map->next;
6293 }
6294
12bd6957 6295 elf_seg_map (obfd) = map_first;
84d1d650
L
6296 return TRUE;
6297}
6298
6299/* Copy private BFD data. This copies or rewrites ELF program header
6300 information. */
6301
6302static bfd_boolean
6303copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6304{
84d1d650
L
6305 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6306 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6307 return TRUE;
6308
6309 if (elf_tdata (ibfd)->phdr == NULL)
6310 return TRUE;
6311
6312 if (ibfd->xvec == obfd->xvec)
6313 {
cb3ff1e5
NC
6314 /* Check to see if any sections in the input BFD
6315 covered by ELF program header have changed. */
d55ce4e2 6316 Elf_Internal_Phdr *segment;
84d1d650
L
6317 asection *section, *osec;
6318 unsigned int i, num_segments;
6319 Elf_Internal_Shdr *this_hdr;
147d51c2
L
6320 const struct elf_backend_data *bed;
6321
6322 bed = get_elf_backend_data (ibfd);
6323
6324 /* Regenerate the segment map if p_paddr is set to 0. */
6325 if (bed->want_p_paddr_set_to_zero)
6326 goto rewrite;
84d1d650
L
6327
6328 /* Initialize the segment mark field. */
6329 for (section = obfd->sections; section != NULL;
6330 section = section->next)
6331 section->segment_mark = FALSE;
6332
6333 num_segments = elf_elfheader (ibfd)->e_phnum;
6334 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6335 i < num_segments;
6336 i++, segment++)
6337 {
5f6999aa
NC
6338 /* PR binutils/3535. The Solaris linker always sets the p_paddr
6339 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
6340 which severly confuses things, so always regenerate the segment
6341 map in this case. */
6342 if (segment->p_paddr == 0
6343 && segment->p_memsz == 0
6344 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6345 goto rewrite;
5f6999aa 6346
84d1d650
L
6347 for (section = ibfd->sections;
6348 section != NULL; section = section->next)
6349 {
6350 /* We mark the output section so that we know it comes
6351 from the input BFD. */
6352 osec = section->output_section;
6353 if (osec)
6354 osec->segment_mark = TRUE;
6355
6356 /* Check if this section is covered by the segment. */
6357 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6358 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6359 {
6360 /* FIXME: Check if its output section is changed or
6361 removed. What else do we need to check? */
6362 if (osec == NULL
6363 || section->flags != osec->flags
6364 || section->lma != osec->lma
6365 || section->vma != osec->vma
6366 || section->size != osec->size
6367 || section->rawsize != osec->rawsize
6368 || section->alignment_power != osec->alignment_power)
6369 goto rewrite;
6370 }
6371 }
6372 }
6373
cb3ff1e5 6374 /* Check to see if any output section do not come from the
84d1d650
L
6375 input BFD. */
6376 for (section = obfd->sections; section != NULL;
6377 section = section->next)
6378 {
6379 if (section->segment_mark == FALSE)
6380 goto rewrite;
6381 else
6382 section->segment_mark = FALSE;
6383 }
6384
6385 return copy_elf_program_header (ibfd, obfd);
6386 }
6387
6388rewrite:
f1d85785
L
6389 if (ibfd->xvec == obfd->xvec)
6390 {
6391 /* When rewriting program header, set the output maxpagesize to
6392 the maximum alignment of input PT_LOAD segments. */
6393 Elf_Internal_Phdr *segment;
6394 unsigned int i;
6395 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
6396 bfd_vma maxpagesize = 0;
6397
6398 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6399 i < num_segments;
6400 i++, segment++)
6401 if (segment->p_type == PT_LOAD
6402 && maxpagesize < segment->p_align)
6403 maxpagesize = segment->p_align;
6404
6405 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
6406 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
6407 }
6408
84d1d650
L
6409 return rewrite_elf_program_header (ibfd, obfd);
6410}
6411
ccd2ec6a
L
6412/* Initialize private output section information from input section. */
6413
6414bfd_boolean
6415_bfd_elf_init_private_section_data (bfd *ibfd,
6416 asection *isec,
6417 bfd *obfd,
6418 asection *osec,
6419 struct bfd_link_info *link_info)
6420
6421{
6422 Elf_Internal_Shdr *ihdr, *ohdr;
dfa7b0b8 6423 bfd_boolean final_link = link_info != NULL && !link_info->relocatable;
ccd2ec6a
L
6424
6425 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6426 || obfd->xvec->flavour != bfd_target_elf_flavour)
6427 return TRUE;
6428
ba85c43e
NC
6429 BFD_ASSERT (elf_section_data (osec) != NULL);
6430
dfa7b0b8
AM
6431 /* For objcopy and relocatable link, don't copy the output ELF
6432 section type from input if the output BFD section flags have been
6433 set to something different. For a final link allow some flags
6434 that the linker clears to differ. */
42bb2e33 6435 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6436 && (osec->flags == isec->flags
6437 || (final_link
6438 && ((osec->flags ^ isec->flags)
0814be7d 6439 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 6440 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6441
6442 /* FIXME: Is this correct for all OS/PROC specific flags? */
6443 elf_section_flags (osec) |= (elf_section_flags (isec)
6444 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6445
6446 /* Set things up for objcopy and relocatable link. The output
6447 SHT_GROUP section will have its elf_next_in_group pointing back
6448 to the input group members. Ignore linker created group section.
6449 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 6450 if (!final_link)
ccd2ec6a
L
6451 {
6452 if (elf_sec_group (isec) == NULL
6453 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6454 {
6455 if (elf_section_flags (isec) & SHF_GROUP)
6456 elf_section_flags (osec) |= SHF_GROUP;
6457 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6458 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6459 }
6460 }
6461
6462 ihdr = &elf_section_data (isec)->this_hdr;
6463
6464 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6465 don't use the output section of the linked-to section since it
6466 may be NULL at this point. */
6467 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6468 {
6469 ohdr = &elf_section_data (osec)->this_hdr;
6470 ohdr->sh_flags |= SHF_LINK_ORDER;
6471 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6472 }
6473
6474 osec->use_rela_p = isec->use_rela_p;
6475
6476 return TRUE;
6477}
6478
252b5132
RH
6479/* Copy private section information. This copies over the entsize
6480 field, and sometimes the info field. */
6481
b34976b6 6482bfd_boolean
217aa764
AM
6483_bfd_elf_copy_private_section_data (bfd *ibfd,
6484 asection *isec,
6485 bfd *obfd,
6486 asection *osec)
252b5132
RH
6487{
6488 Elf_Internal_Shdr *ihdr, *ohdr;
6489
6490 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6491 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6492 return TRUE;
252b5132 6493
252b5132
RH
6494 ihdr = &elf_section_data (isec)->this_hdr;
6495 ohdr = &elf_section_data (osec)->this_hdr;
6496
6497 ohdr->sh_entsize = ihdr->sh_entsize;
6498
6499 if (ihdr->sh_type == SHT_SYMTAB
6500 || ihdr->sh_type == SHT_DYNSYM
6501 || ihdr->sh_type == SHT_GNU_verneed
6502 || ihdr->sh_type == SHT_GNU_verdef)
6503 ohdr->sh_info = ihdr->sh_info;
6504
ccd2ec6a
L
6505 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6506 NULL);
252b5132
RH
6507}
6508
d0bf826b
AM
6509/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
6510 necessary if we are removing either the SHT_GROUP section or any of
6511 the group member sections. DISCARDED is the value that a section's
6512 output_section has if the section will be discarded, NULL when this
6513 function is called from objcopy, bfd_abs_section_ptr when called
6514 from the linker. */
80fccad2
BW
6515
6516bfd_boolean
d0bf826b 6517_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 6518{
30288845
AM
6519 asection *isec;
6520
30288845 6521 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 6522 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
6523 {
6524 asection *first = elf_next_in_group (isec);
6525 asection *s = first;
d0bf826b
AM
6526 bfd_size_type removed = 0;
6527
30288845
AM
6528 while (s != NULL)
6529 {
415f38a6
AM
6530 /* If this member section is being output but the
6531 SHT_GROUP section is not, then clear the group info
6532 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
6533 if (s->output_section != discarded
6534 && isec->output_section == discarded)
30288845
AM
6535 {
6536 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6537 elf_group_name (s->output_section) = NULL;
6538 }
415f38a6
AM
6539 /* Conversely, if the member section is not being output
6540 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
6541 else if (s->output_section == discarded
6542 && isec->output_section != discarded)
6543 removed += 4;
30288845
AM
6544 s = elf_next_in_group (s);
6545 if (s == first)
6546 break;
6547 }
d0bf826b
AM
6548 if (removed != 0)
6549 {
6550 if (discarded != NULL)
6551 {
6552 /* If we've been called for ld -r, then we need to
6553 adjust the input section size. This function may
6554 be called multiple times, so save the original
6555 size. */
6556 if (isec->rawsize == 0)
6557 isec->rawsize = isec->size;
6558 isec->size = isec->rawsize - removed;
6559 }
6560 else
6561 {
6562 /* Adjust the output section size when called from
6563 objcopy. */
6564 isec->output_section->size -= removed;
6565 }
6566 }
30288845
AM
6567 }
6568
80fccad2
BW
6569 return TRUE;
6570}
6571
d0bf826b
AM
6572/* Copy private header information. */
6573
6574bfd_boolean
6575_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6576{
6577 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6578 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6579 return TRUE;
6580
6581 /* Copy over private BFD data if it has not already been copied.
6582 This must be done here, rather than in the copy_private_bfd_data
6583 entry point, because the latter is called after the section
6584 contents have been set, which means that the program headers have
6585 already been worked out. */
12bd6957 6586 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
6587 {
6588 if (! copy_private_bfd_data (ibfd, obfd))
6589 return FALSE;
6590 }
6591
6592 return _bfd_elf_fixup_group_sections (ibfd, NULL);
6593}
6594
252b5132
RH
6595/* Copy private symbol information. If this symbol is in a section
6596 which we did not map into a BFD section, try to map the section
6597 index correctly. We use special macro definitions for the mapped
6598 section indices; these definitions are interpreted by the
6599 swap_out_syms function. */
6600
9ad5cbcf
AM
6601#define MAP_ONESYMTAB (SHN_HIOS + 1)
6602#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6603#define MAP_STRTAB (SHN_HIOS + 3)
6604#define MAP_SHSTRTAB (SHN_HIOS + 4)
6605#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6606
b34976b6 6607bfd_boolean
217aa764
AM
6608_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6609 asymbol *isymarg,
6610 bfd *obfd,
6611 asymbol *osymarg)
252b5132
RH
6612{
6613 elf_symbol_type *isym, *osym;
6614
6615 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6616 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6617 return TRUE;
252b5132
RH
6618
6619 isym = elf_symbol_from (ibfd, isymarg);
6620 osym = elf_symbol_from (obfd, osymarg);
6621
6622 if (isym != NULL
8424d8f5 6623 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6624 && osym != NULL
6625 && bfd_is_abs_section (isym->symbol.section))
6626 {
6627 unsigned int shndx;
6628
6629 shndx = isym->internal_elf_sym.st_shndx;
6630 if (shndx == elf_onesymtab (ibfd))
6631 shndx = MAP_ONESYMTAB;
6632 else if (shndx == elf_dynsymtab (ibfd))
6633 shndx = MAP_DYNSYMTAB;
12bd6957 6634 else if (shndx == elf_strtab_sec (ibfd))
252b5132 6635 shndx = MAP_STRTAB;
12bd6957 6636 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 6637 shndx = MAP_SHSTRTAB;
12bd6957 6638 else if (shndx == elf_symtab_shndx (ibfd))
9ad5cbcf 6639 shndx = MAP_SYM_SHNDX;
252b5132
RH
6640 osym->internal_elf_sym.st_shndx = shndx;
6641 }
6642
b34976b6 6643 return TRUE;
252b5132
RH
6644}
6645
6646/* Swap out the symbols. */
6647
b34976b6 6648static bfd_boolean
217aa764
AM
6649swap_out_syms (bfd *abfd,
6650 struct bfd_strtab_hash **sttp,
6651 int relocatable_p)
252b5132 6652{
9c5bfbb7 6653 const struct elf_backend_data *bed;
079e9a2f
AM
6654 int symcount;
6655 asymbol **syms;
6656 struct bfd_strtab_hash *stt;
6657 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6658 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6659 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6660 bfd_byte *outbound_syms;
6661 bfd_byte *outbound_shndx;
079e9a2f 6662 int idx;
12bd6957 6663 unsigned int num_locals;
079e9a2f 6664 bfd_size_type amt;
174fd7f9 6665 bfd_boolean name_local_sections;
252b5132 6666
12bd6957 6667 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 6668 return FALSE;
252b5132 6669
c044fabd 6670 /* Dump out the symtabs. */
079e9a2f
AM
6671 stt = _bfd_elf_stringtab_init ();
6672 if (stt == NULL)
b34976b6 6673 return FALSE;
252b5132 6674
079e9a2f
AM
6675 bed = get_elf_backend_data (abfd);
6676 symcount = bfd_get_symcount (abfd);
6677 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6678 symtab_hdr->sh_type = SHT_SYMTAB;
6679 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6680 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 6681 symtab_hdr->sh_info = num_locals + 1;
72de5009 6682 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6683
6684 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6685 symstrtab_hdr->sh_type = SHT_STRTAB;
6686
a50b1753
NC
6687 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6688 bed->s->sizeof_sym);
079e9a2f 6689 if (outbound_syms == NULL)
5ed6aba4
NC
6690 {
6691 _bfd_stringtab_free (stt);
6692 return FALSE;
6693 }
217aa764 6694 symtab_hdr->contents = outbound_syms;
252b5132 6695
9ad5cbcf
AM
6696 outbound_shndx = NULL;
6697 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6698 if (symtab_shndx_hdr->sh_name != 0)
6699 {
6700 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6701 outbound_shndx = (bfd_byte *)
6702 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6703 if (outbound_shndx == NULL)
5ed6aba4
NC
6704 {
6705 _bfd_stringtab_free (stt);
6706 return FALSE;
6707 }
6708
9ad5cbcf
AM
6709 symtab_shndx_hdr->contents = outbound_shndx;
6710 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6711 symtab_shndx_hdr->sh_size = amt;
6712 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6713 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6714 }
6715
589e6347 6716 /* Now generate the data (for "contents"). */
079e9a2f
AM
6717 {
6718 /* Fill in zeroth symbol and swap it out. */
6719 Elf_Internal_Sym sym;
6720 sym.st_name = 0;
6721 sym.st_value = 0;
6722 sym.st_size = 0;
6723 sym.st_info = 0;
6724 sym.st_other = 0;
6725 sym.st_shndx = SHN_UNDEF;
35fc36a8 6726 sym.st_target_internal = 0;
9ad5cbcf 6727 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6728 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6729 if (outbound_shndx != NULL)
6730 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6731 }
252b5132 6732
174fd7f9
RS
6733 name_local_sections
6734 = (bed->elf_backend_name_local_section_symbols
6735 && bed->elf_backend_name_local_section_symbols (abfd));
6736
079e9a2f
AM
6737 syms = bfd_get_outsymbols (abfd);
6738 for (idx = 0; idx < symcount; idx++)
252b5132 6739 {
252b5132 6740 Elf_Internal_Sym sym;
079e9a2f
AM
6741 bfd_vma value = syms[idx]->value;
6742 elf_symbol_type *type_ptr;
6743 flagword flags = syms[idx]->flags;
6744 int type;
252b5132 6745
174fd7f9
RS
6746 if (!name_local_sections
6747 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6748 {
6749 /* Local section symbols have no name. */
6750 sym.st_name = 0;
6751 }
6752 else
6753 {
6754 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6755 syms[idx]->name,
b34976b6 6756 TRUE, FALSE);
079e9a2f 6757 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6758 {
6759 _bfd_stringtab_free (stt);
6760 return FALSE;
6761 }
079e9a2f 6762 }
252b5132 6763
079e9a2f 6764 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6765
079e9a2f
AM
6766 if ((flags & BSF_SECTION_SYM) == 0
6767 && bfd_is_com_section (syms[idx]->section))
6768 {
6769 /* ELF common symbols put the alignment into the `value' field,
6770 and the size into the `size' field. This is backwards from
6771 how BFD handles it, so reverse it here. */
6772 sym.st_size = value;
6773 if (type_ptr == NULL
6774 || type_ptr->internal_elf_sym.st_value == 0)
6775 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6776 else
6777 sym.st_value = type_ptr->internal_elf_sym.st_value;
6778 sym.st_shndx = _bfd_elf_section_from_bfd_section
6779 (abfd, syms[idx]->section);
6780 }
6781 else
6782 {
6783 asection *sec = syms[idx]->section;
cb33740c 6784 unsigned int shndx;
252b5132 6785
079e9a2f
AM
6786 if (sec->output_section)
6787 {
6788 value += sec->output_offset;
6789 sec = sec->output_section;
6790 }
589e6347 6791
079e9a2f
AM
6792 /* Don't add in the section vma for relocatable output. */
6793 if (! relocatable_p)
6794 value += sec->vma;
6795 sym.st_value = value;
6796 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6797
6798 if (bfd_is_abs_section (sec)
6799 && type_ptr != NULL
6800 && type_ptr->internal_elf_sym.st_shndx != 0)
6801 {
6802 /* This symbol is in a real ELF section which we did
6803 not create as a BFD section. Undo the mapping done
6804 by copy_private_symbol_data. */
6805 shndx = type_ptr->internal_elf_sym.st_shndx;
6806 switch (shndx)
6807 {
6808 case MAP_ONESYMTAB:
6809 shndx = elf_onesymtab (abfd);
6810 break;
6811 case MAP_DYNSYMTAB:
6812 shndx = elf_dynsymtab (abfd);
6813 break;
6814 case MAP_STRTAB:
12bd6957 6815 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
6816 break;
6817 case MAP_SHSTRTAB:
12bd6957 6818 shndx = elf_shstrtab_sec (abfd);
079e9a2f 6819 break;
9ad5cbcf 6820 case MAP_SYM_SHNDX:
12bd6957 6821 shndx = elf_symtab_shndx (abfd);
9ad5cbcf 6822 break;
079e9a2f 6823 default:
15bc576a 6824 shndx = SHN_ABS;
079e9a2f
AM
6825 break;
6826 }
6827 }
6828 else
6829 {
6830 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6831
cb33740c 6832 if (shndx == SHN_BAD)
079e9a2f
AM
6833 {
6834 asection *sec2;
6835
6836 /* Writing this would be a hell of a lot easier if
6837 we had some decent documentation on bfd, and
6838 knew what to expect of the library, and what to
6839 demand of applications. For example, it
6840 appears that `objcopy' might not set the
6841 section of a symbol to be a section that is
6842 actually in the output file. */
6843 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6844 if (sec2 == NULL)
6845 {
6846 _bfd_error_handler (_("\
6847Unable to find equivalent output section for symbol '%s' from section '%s'"),
6848 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6849 sec->name);
811072d8 6850 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6851 _bfd_stringtab_free (stt);
589e6347
NC
6852 return FALSE;
6853 }
811072d8 6854
079e9a2f 6855 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6856 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6857 }
6858 }
252b5132 6859
079e9a2f
AM
6860 sym.st_shndx = shndx;
6861 }
252b5132 6862
13ae64f3
JJ
6863 if ((flags & BSF_THREAD_LOCAL) != 0)
6864 type = STT_TLS;
d8045f23
NC
6865 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6866 type = STT_GNU_IFUNC;
13ae64f3 6867 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6868 type = STT_FUNC;
6869 else if ((flags & BSF_OBJECT) != 0)
6870 type = STT_OBJECT;
d9352518
DB
6871 else if ((flags & BSF_RELC) != 0)
6872 type = STT_RELC;
6873 else if ((flags & BSF_SRELC) != 0)
6874 type = STT_SRELC;
079e9a2f
AM
6875 else
6876 type = STT_NOTYPE;
252b5132 6877
13ae64f3
JJ
6878 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6879 type = STT_TLS;
6880
589e6347 6881 /* Processor-specific types. */
079e9a2f
AM
6882 if (type_ptr != NULL
6883 && bed->elf_backend_get_symbol_type)
6884 type = ((*bed->elf_backend_get_symbol_type)
6885 (&type_ptr->internal_elf_sym, type));
252b5132 6886
079e9a2f
AM
6887 if (flags & BSF_SECTION_SYM)
6888 {
6889 if (flags & BSF_GLOBAL)
6890 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6891 else
6892 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6893 }
6894 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6895 {
504b7d20 6896#ifdef USE_STT_COMMON
0a40daed
MK
6897 if (type == STT_OBJECT)
6898 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6899 else
504b7d20 6900#endif
c91e322a 6901 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6902 }
079e9a2f
AM
6903 else if (bfd_is_und_section (syms[idx]->section))
6904 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6905 ? STB_WEAK
6906 : STB_GLOBAL),
6907 type);
6908 else if (flags & BSF_FILE)
6909 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6910 else
6911 {
6912 int bind = STB_LOCAL;
252b5132 6913
079e9a2f
AM
6914 if (flags & BSF_LOCAL)
6915 bind = STB_LOCAL;
3e7a7d11
NC
6916 else if (flags & BSF_GNU_UNIQUE)
6917 bind = STB_GNU_UNIQUE;
079e9a2f
AM
6918 else if (flags & BSF_WEAK)
6919 bind = STB_WEAK;
6920 else if (flags & BSF_GLOBAL)
6921 bind = STB_GLOBAL;
252b5132 6922
079e9a2f
AM
6923 sym.st_info = ELF_ST_INFO (bind, type);
6924 }
252b5132 6925
079e9a2f 6926 if (type_ptr != NULL)
35fc36a8
RS
6927 {
6928 sym.st_other = type_ptr->internal_elf_sym.st_other;
6929 sym.st_target_internal
6930 = type_ptr->internal_elf_sym.st_target_internal;
6931 }
079e9a2f 6932 else
35fc36a8
RS
6933 {
6934 sym.st_other = 0;
6935 sym.st_target_internal = 0;
6936 }
252b5132 6937
9ad5cbcf 6938 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6939 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6940 if (outbound_shndx != NULL)
6941 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6942 }
252b5132 6943
079e9a2f
AM
6944 *sttp = stt;
6945 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6946 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6947
079e9a2f
AM
6948 symstrtab_hdr->sh_flags = 0;
6949 symstrtab_hdr->sh_addr = 0;
6950 symstrtab_hdr->sh_entsize = 0;
6951 symstrtab_hdr->sh_link = 0;
6952 symstrtab_hdr->sh_info = 0;
6953 symstrtab_hdr->sh_addralign = 1;
252b5132 6954
b34976b6 6955 return TRUE;
252b5132
RH
6956}
6957
6958/* Return the number of bytes required to hold the symtab vector.
6959
6960 Note that we base it on the count plus 1, since we will null terminate
6961 the vector allocated based on this size. However, the ELF symbol table
6962 always has a dummy entry as symbol #0, so it ends up even. */
6963
6964long
217aa764 6965_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6966{
6967 long symcount;
6968 long symtab_size;
6969 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6970
6971 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6972 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6973 if (symcount > 0)
6974 symtab_size -= sizeof (asymbol *);
252b5132
RH
6975
6976 return symtab_size;
6977}
6978
6979long
217aa764 6980_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6981{
6982 long symcount;
6983 long symtab_size;
6984 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6985
6986 if (elf_dynsymtab (abfd) == 0)
6987 {
6988 bfd_set_error (bfd_error_invalid_operation);
6989 return -1;
6990 }
6991
6992 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6993 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6994 if (symcount > 0)
6995 symtab_size -= sizeof (asymbol *);
252b5132
RH
6996
6997 return symtab_size;
6998}
6999
7000long
217aa764
AM
7001_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
7002 sec_ptr asect)
252b5132
RH
7003{
7004 return (asect->reloc_count + 1) * sizeof (arelent *);
7005}
7006
7007/* Canonicalize the relocs. */
7008
7009long
217aa764
AM
7010_bfd_elf_canonicalize_reloc (bfd *abfd,
7011 sec_ptr section,
7012 arelent **relptr,
7013 asymbol **symbols)
252b5132
RH
7014{
7015 arelent *tblptr;
7016 unsigned int i;
9c5bfbb7 7017 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7018
b34976b6 7019 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
7020 return -1;
7021
7022 tblptr = section->relocation;
7023 for (i = 0; i < section->reloc_count; i++)
7024 *relptr++ = tblptr++;
7025
7026 *relptr = NULL;
7027
7028 return section->reloc_count;
7029}
7030
7031long
6cee3f79 7032_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 7033{
9c5bfbb7 7034 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7035 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
7036
7037 if (symcount >= 0)
7038 bfd_get_symcount (abfd) = symcount;
7039 return symcount;
7040}
7041
7042long
217aa764
AM
7043_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
7044 asymbol **allocation)
252b5132 7045{
9c5bfbb7 7046 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7047 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
7048
7049 if (symcount >= 0)
7050 bfd_get_dynamic_symcount (abfd) = symcount;
7051 return symcount;
252b5132
RH
7052}
7053
8615f3f2
AM
7054/* Return the size required for the dynamic reloc entries. Any loadable
7055 section that was actually installed in the BFD, and has type SHT_REL
7056 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
7057 dynamic reloc section. */
252b5132
RH
7058
7059long
217aa764 7060_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
7061{
7062 long ret;
7063 asection *s;
7064
7065 if (elf_dynsymtab (abfd) == 0)
7066 {
7067 bfd_set_error (bfd_error_invalid_operation);
7068 return -1;
7069 }
7070
7071 ret = sizeof (arelent *);
7072 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 7073 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7074 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7075 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 7076 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
7077 * sizeof (arelent *));
7078
7079 return ret;
7080}
7081
8615f3f2
AM
7082/* Canonicalize the dynamic relocation entries. Note that we return the
7083 dynamic relocations as a single block, although they are actually
7084 associated with particular sections; the interface, which was
7085 designed for SunOS style shared libraries, expects that there is only
7086 one set of dynamic relocs. Any loadable section that was actually
7087 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
7088 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
7089
7090long
217aa764
AM
7091_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
7092 arelent **storage,
7093 asymbol **syms)
252b5132 7094{
217aa764 7095 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
7096 asection *s;
7097 long ret;
7098
7099 if (elf_dynsymtab (abfd) == 0)
7100 {
7101 bfd_set_error (bfd_error_invalid_operation);
7102 return -1;
7103 }
7104
7105 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
7106 ret = 0;
7107 for (s = abfd->sections; s != NULL; s = s->next)
7108 {
266b05cf 7109 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7110 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7111 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
7112 {
7113 arelent *p;
7114 long count, i;
7115
b34976b6 7116 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 7117 return -1;
eea6121a 7118 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
7119 p = s->relocation;
7120 for (i = 0; i < count; i++)
7121 *storage++ = p++;
7122 ret += count;
7123 }
7124 }
7125
7126 *storage = NULL;
7127
7128 return ret;
7129}
7130\f
7131/* Read in the version information. */
7132
b34976b6 7133bfd_boolean
fc0e6df6 7134_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
7135{
7136 bfd_byte *contents = NULL;
fc0e6df6
PB
7137 unsigned int freeidx = 0;
7138
7139 if (elf_dynverref (abfd) != 0)
7140 {
7141 Elf_Internal_Shdr *hdr;
7142 Elf_External_Verneed *everneed;
7143 Elf_Internal_Verneed *iverneed;
7144 unsigned int i;
d0fb9a8d 7145 bfd_byte *contents_end;
fc0e6df6
PB
7146
7147 hdr = &elf_tdata (abfd)->dynverref_hdr;
7148
a50b1753
NC
7149 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
7150 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
7151 if (elf_tdata (abfd)->verref == NULL)
7152 goto error_return;
7153
7154 elf_tdata (abfd)->cverrefs = hdr->sh_info;
7155
a50b1753 7156 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
fc0e6df6 7157 if (contents == NULL)
d0fb9a8d
JJ
7158 {
7159error_return_verref:
7160 elf_tdata (abfd)->verref = NULL;
7161 elf_tdata (abfd)->cverrefs = 0;
7162 goto error_return;
7163 }
fc0e6df6
PB
7164 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
7165 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 7166 goto error_return_verref;
fc0e6df6 7167
d0fb9a8d
JJ
7168 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
7169 goto error_return_verref;
7170
7171 BFD_ASSERT (sizeof (Elf_External_Verneed)
7172 == sizeof (Elf_External_Vernaux));
7173 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
7174 everneed = (Elf_External_Verneed *) contents;
7175 iverneed = elf_tdata (abfd)->verref;
7176 for (i = 0; i < hdr->sh_info; i++, iverneed++)
7177 {
7178 Elf_External_Vernaux *evernaux;
7179 Elf_Internal_Vernaux *ivernaux;
7180 unsigned int j;
7181
7182 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
7183
7184 iverneed->vn_bfd = abfd;
7185
7186 iverneed->vn_filename =
7187 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7188 iverneed->vn_file);
7189 if (iverneed->vn_filename == NULL)
d0fb9a8d 7190 goto error_return_verref;
fc0e6df6 7191
d0fb9a8d
JJ
7192 if (iverneed->vn_cnt == 0)
7193 iverneed->vn_auxptr = NULL;
7194 else
7195 {
a50b1753
NC
7196 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
7197 bfd_alloc2 (abfd, iverneed->vn_cnt,
7198 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
7199 if (iverneed->vn_auxptr == NULL)
7200 goto error_return_verref;
7201 }
7202
7203 if (iverneed->vn_aux
7204 > (size_t) (contents_end - (bfd_byte *) everneed))
7205 goto error_return_verref;
fc0e6df6
PB
7206
7207 evernaux = ((Elf_External_Vernaux *)
7208 ((bfd_byte *) everneed + iverneed->vn_aux));
7209 ivernaux = iverneed->vn_auxptr;
7210 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
7211 {
7212 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
7213
7214 ivernaux->vna_nodename =
7215 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7216 ivernaux->vna_name);
7217 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 7218 goto error_return_verref;
fc0e6df6
PB
7219
7220 if (j + 1 < iverneed->vn_cnt)
7221 ivernaux->vna_nextptr = ivernaux + 1;
7222 else
7223 ivernaux->vna_nextptr = NULL;
7224
d0fb9a8d
JJ
7225 if (ivernaux->vna_next
7226 > (size_t) (contents_end - (bfd_byte *) evernaux))
7227 goto error_return_verref;
7228
fc0e6df6
PB
7229 evernaux = ((Elf_External_Vernaux *)
7230 ((bfd_byte *) evernaux + ivernaux->vna_next));
7231
7232 if (ivernaux->vna_other > freeidx)
7233 freeidx = ivernaux->vna_other;
7234 }
7235
7236 if (i + 1 < hdr->sh_info)
7237 iverneed->vn_nextref = iverneed + 1;
7238 else
7239 iverneed->vn_nextref = NULL;
7240
d0fb9a8d
JJ
7241 if (iverneed->vn_next
7242 > (size_t) (contents_end - (bfd_byte *) everneed))
7243 goto error_return_verref;
7244
fc0e6df6
PB
7245 everneed = ((Elf_External_Verneed *)
7246 ((bfd_byte *) everneed + iverneed->vn_next));
7247 }
7248
7249 free (contents);
7250 contents = NULL;
7251 }
252b5132
RH
7252
7253 if (elf_dynverdef (abfd) != 0)
7254 {
7255 Elf_Internal_Shdr *hdr;
7256 Elf_External_Verdef *everdef;
7257 Elf_Internal_Verdef *iverdef;
f631889e
UD
7258 Elf_Internal_Verdef *iverdefarr;
7259 Elf_Internal_Verdef iverdefmem;
252b5132 7260 unsigned int i;
062e2358 7261 unsigned int maxidx;
d0fb9a8d 7262 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
7263
7264 hdr = &elf_tdata (abfd)->dynverdef_hdr;
7265
a50b1753 7266 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132
RH
7267 if (contents == NULL)
7268 goto error_return;
7269 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 7270 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
7271 goto error_return;
7272
d0fb9a8d
JJ
7273 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
7274 goto error_return;
7275
7276 BFD_ASSERT (sizeof (Elf_External_Verdef)
7277 >= sizeof (Elf_External_Verdaux));
7278 contents_end_def = contents + hdr->sh_size
7279 - sizeof (Elf_External_Verdef);
7280 contents_end_aux = contents + hdr->sh_size
7281 - sizeof (Elf_External_Verdaux);
7282
f631889e
UD
7283 /* We know the number of entries in the section but not the maximum
7284 index. Therefore we have to run through all entries and find
7285 the maximum. */
252b5132 7286 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
7287 maxidx = 0;
7288 for (i = 0; i < hdr->sh_info; ++i)
7289 {
7290 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7291
062e2358
AM
7292 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
7293 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 7294
d0fb9a8d
JJ
7295 if (iverdefmem.vd_next
7296 > (size_t) (contents_end_def - (bfd_byte *) everdef))
7297 goto error_return;
7298
f631889e
UD
7299 everdef = ((Elf_External_Verdef *)
7300 ((bfd_byte *) everdef + iverdefmem.vd_next));
7301 }
7302
fc0e6df6
PB
7303 if (default_imported_symver)
7304 {
7305 if (freeidx > maxidx)
7306 maxidx = ++freeidx;
7307 else
7308 freeidx = ++maxidx;
7309 }
a50b1753
NC
7310 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7311 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e
UD
7312 if (elf_tdata (abfd)->verdef == NULL)
7313 goto error_return;
7314
7315 elf_tdata (abfd)->cverdefs = maxidx;
7316
7317 everdef = (Elf_External_Verdef *) contents;
7318 iverdefarr = elf_tdata (abfd)->verdef;
7319 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
7320 {
7321 Elf_External_Verdaux *everdaux;
7322 Elf_Internal_Verdaux *iverdaux;
7323 unsigned int j;
7324
f631889e
UD
7325 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7326
d0fb9a8d
JJ
7327 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
7328 {
7329error_return_verdef:
7330 elf_tdata (abfd)->verdef = NULL;
7331 elf_tdata (abfd)->cverdefs = 0;
7332 goto error_return;
7333 }
7334
f631889e
UD
7335 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
7336 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
7337
7338 iverdef->vd_bfd = abfd;
7339
d0fb9a8d
JJ
7340 if (iverdef->vd_cnt == 0)
7341 iverdef->vd_auxptr = NULL;
7342 else
7343 {
a50b1753
NC
7344 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7345 bfd_alloc2 (abfd, iverdef->vd_cnt,
7346 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7347 if (iverdef->vd_auxptr == NULL)
7348 goto error_return_verdef;
7349 }
7350
7351 if (iverdef->vd_aux
7352 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
7353 goto error_return_verdef;
252b5132
RH
7354
7355 everdaux = ((Elf_External_Verdaux *)
7356 ((bfd_byte *) everdef + iverdef->vd_aux));
7357 iverdaux = iverdef->vd_auxptr;
7358 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
7359 {
7360 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
7361
7362 iverdaux->vda_nodename =
7363 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7364 iverdaux->vda_name);
7365 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 7366 goto error_return_verdef;
252b5132
RH
7367
7368 if (j + 1 < iverdef->vd_cnt)
7369 iverdaux->vda_nextptr = iverdaux + 1;
7370 else
7371 iverdaux->vda_nextptr = NULL;
7372
d0fb9a8d
JJ
7373 if (iverdaux->vda_next
7374 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
7375 goto error_return_verdef;
7376
252b5132
RH
7377 everdaux = ((Elf_External_Verdaux *)
7378 ((bfd_byte *) everdaux + iverdaux->vda_next));
7379 }
7380
d0fb9a8d
JJ
7381 if (iverdef->vd_cnt)
7382 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 7383
d0fb9a8d 7384 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
7385 iverdef->vd_nextdef = iverdef + 1;
7386 else
7387 iverdef->vd_nextdef = NULL;
7388
7389 everdef = ((Elf_External_Verdef *)
7390 ((bfd_byte *) everdef + iverdef->vd_next));
7391 }
7392
7393 free (contents);
7394 contents = NULL;
7395 }
fc0e6df6 7396 else if (default_imported_symver)
252b5132 7397 {
fc0e6df6
PB
7398 if (freeidx < 3)
7399 freeidx = 3;
7400 else
7401 freeidx++;
252b5132 7402
a50b1753
NC
7403 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7404 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 7405 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
7406 goto error_return;
7407
fc0e6df6
PB
7408 elf_tdata (abfd)->cverdefs = freeidx;
7409 }
252b5132 7410
fc0e6df6
PB
7411 /* Create a default version based on the soname. */
7412 if (default_imported_symver)
7413 {
7414 Elf_Internal_Verdef *iverdef;
7415 Elf_Internal_Verdaux *iverdaux;
252b5132 7416
5bb3703f 7417 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 7418
fc0e6df6
PB
7419 iverdef->vd_version = VER_DEF_CURRENT;
7420 iverdef->vd_flags = 0;
7421 iverdef->vd_ndx = freeidx;
7422 iverdef->vd_cnt = 1;
252b5132 7423
fc0e6df6 7424 iverdef->vd_bfd = abfd;
252b5132 7425
fc0e6df6
PB
7426 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
7427 if (iverdef->vd_nodename == NULL)
d0fb9a8d 7428 goto error_return_verdef;
fc0e6df6 7429 iverdef->vd_nextdef = NULL;
a50b1753
NC
7430 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7431 bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7432 if (iverdef->vd_auxptr == NULL)
7433 goto error_return_verdef;
252b5132 7434
fc0e6df6
PB
7435 iverdaux = iverdef->vd_auxptr;
7436 iverdaux->vda_nodename = iverdef->vd_nodename;
7437 iverdaux->vda_nextptr = NULL;
252b5132
RH
7438 }
7439
b34976b6 7440 return TRUE;
252b5132
RH
7441
7442 error_return:
5ed6aba4 7443 if (contents != NULL)
252b5132 7444 free (contents);
b34976b6 7445 return FALSE;
252b5132
RH
7446}
7447\f
7448asymbol *
217aa764 7449_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7450{
7451 elf_symbol_type *newsym;
dc810e39 7452 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 7453
a50b1753 7454 newsym = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132
RH
7455 if (!newsym)
7456 return NULL;
7457 else
7458 {
7459 newsym->symbol.the_bfd = abfd;
7460 return &newsym->symbol;
7461 }
7462}
7463
7464void
217aa764
AM
7465_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7466 asymbol *symbol,
7467 symbol_info *ret)
252b5132
RH
7468{
7469 bfd_symbol_info (symbol, ret);
7470}
7471
7472/* Return whether a symbol name implies a local symbol. Most targets
7473 use this function for the is_local_label_name entry point, but some
7474 override it. */
7475
b34976b6 7476bfd_boolean
217aa764
AM
7477_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7478 const char *name)
252b5132
RH
7479{
7480 /* Normal local symbols start with ``.L''. */
7481 if (name[0] == '.' && name[1] == 'L')
b34976b6 7482 return TRUE;
252b5132
RH
7483
7484 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7485 DWARF debugging symbols starting with ``..''. */
7486 if (name[0] == '.' && name[1] == '.')
b34976b6 7487 return TRUE;
252b5132
RH
7488
7489 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7490 emitting DWARF debugging output. I suspect this is actually a
7491 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7492 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7493 underscore to be emitted on some ELF targets). For ease of use,
7494 we treat such symbols as local. */
7495 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7496 return TRUE;
252b5132 7497
b34976b6 7498 return FALSE;
252b5132
RH
7499}
7500
7501alent *
217aa764
AM
7502_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7503 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7504{
7505 abort ();
7506 return NULL;
7507}
7508
b34976b6 7509bfd_boolean
217aa764
AM
7510_bfd_elf_set_arch_mach (bfd *abfd,
7511 enum bfd_architecture arch,
7512 unsigned long machine)
252b5132
RH
7513{
7514 /* If this isn't the right architecture for this backend, and this
7515 isn't the generic backend, fail. */
7516 if (arch != get_elf_backend_data (abfd)->arch
7517 && arch != bfd_arch_unknown
7518 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7519 return FALSE;
252b5132
RH
7520
7521 return bfd_default_set_arch_mach (abfd, arch, machine);
7522}
7523
d1fad7c6
NC
7524/* Find the function to a particular section and offset,
7525 for error reporting. */
252b5132 7526
b34976b6 7527static bfd_boolean
b9d678e0 7528elf_find_function (bfd *abfd,
217aa764
AM
7529 asection *section,
7530 asymbol **symbols,
7531 bfd_vma offset,
7532 const char **filename_ptr,
7533 const char **functionname_ptr)
252b5132 7534{
619a703e
AM
7535 struct elf_find_function_cache
7536 {
7537 asection *last_section;
7538 asymbol *func;
7539 const char *filename;
7540 bfd_size_type func_size;
7541 } *cache;
252b5132 7542
a06c7d5a
NC
7543 if (symbols == NULL)
7544 return FALSE;
7545
619a703e
AM
7546 cache = elf_tdata (abfd)->elf_find_function_cache;
7547 if (cache == NULL)
7548 {
7549 cache = bfd_zalloc (abfd, sizeof (*cache));
7550 elf_tdata (abfd)->elf_find_function_cache = cache;
7551 if (cache == NULL)
7552 return FALSE;
7553 }
7554 if (cache->last_section != section
7555 || cache->func == NULL
7556 || offset < cache->func->value
7557 || offset >= cache->func->value + cache->func_size)
aef36ac1
AM
7558 {
7559 asymbol *file;
7560 bfd_vma low_func;
7561 asymbol **p;
7562 /* ??? Given multiple file symbols, it is impossible to reliably
7563 choose the right file name for global symbols. File symbols are
7564 local symbols, and thus all file symbols must sort before any
7565 global symbols. The ELF spec may be interpreted to say that a
7566 file symbol must sort before other local symbols, but currently
7567 ld -r doesn't do this. So, for ld -r output, it is possible to
7568 make a better choice of file name for local symbols by ignoring
7569 file symbols appearing after a given local symbol. */
7570 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
7571 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7572
aef36ac1
AM
7573 file = NULL;
7574 low_func = 0;
7575 state = nothing_seen;
619a703e
AM
7576 cache->filename = NULL;
7577 cache->func = NULL;
7578 cache->func_size = 0;
7579 cache->last_section = section;
aef36ac1
AM
7580
7581 for (p = symbols; *p != NULL; p++)
7582 {
7583 asymbol *sym = *p;
7584 bfd_vma code_off;
7585 bfd_size_type size;
7586
7587 if ((sym->flags & BSF_FILE) != 0)
7588 {
7589 file = sym;
7590 if (state == symbol_seen)
7591 state = file_after_symbol_seen;
7592 continue;
7593 }
ff9e0f5b 7594
aef36ac1
AM
7595 size = bed->maybe_function_sym (sym, section, &code_off);
7596 if (size != 0
7597 && code_off <= offset
7598 && (code_off > low_func
7599 || (code_off == low_func
619a703e 7600 && size > cache->func_size)))
aef36ac1 7601 {
619a703e
AM
7602 cache->func = sym;
7603 cache->func_size = size;
7604 cache->filename = NULL;
aef36ac1 7605 low_func = code_off;
aef36ac1
AM
7606 if (file != NULL
7607 && ((sym->flags & BSF_LOCAL) != 0
7608 || state != file_after_symbol_seen))
619a703e 7609 cache->filename = bfd_asymbol_name (file);
aef36ac1
AM
7610 }
7611 if (state == nothing_seen)
7612 state = symbol_seen;
252b5132
RH
7613 }
7614 }
7615
619a703e 7616 if (cache->func == NULL)
b34976b6 7617 return FALSE;
252b5132 7618
d1fad7c6 7619 if (filename_ptr)
619a703e 7620 *filename_ptr = cache->filename;
d1fad7c6 7621 if (functionname_ptr)
619a703e 7622 *functionname_ptr = bfd_asymbol_name (cache->func);
d1fad7c6 7623
b34976b6 7624 return TRUE;
d1fad7c6
NC
7625}
7626
7627/* Find the nearest line to a particular section and offset,
7628 for error reporting. */
7629
b34976b6 7630bfd_boolean
217aa764
AM
7631_bfd_elf_find_nearest_line (bfd *abfd,
7632 asection *section,
7633 asymbol **symbols,
7634 bfd_vma offset,
7635 const char **filename_ptr,
7636 const char **functionname_ptr,
7637 unsigned int *line_ptr)
9b8d1a36
CC
7638{
7639 return _bfd_elf_find_nearest_line_discriminator (abfd, section, symbols,
7640 offset, filename_ptr,
7641 functionname_ptr,
7642 line_ptr,
7643 NULL);
7644}
7645
7646bfd_boolean
7647_bfd_elf_find_nearest_line_discriminator (bfd *abfd,
7648 asection *section,
7649 asymbol **symbols,
7650 bfd_vma offset,
7651 const char **filename_ptr,
7652 const char **functionname_ptr,
7653 unsigned int *line_ptr,
7654 unsigned int *discriminator_ptr)
d1fad7c6 7655{
b34976b6 7656 bfd_boolean found;
d1fad7c6
NC
7657
7658 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7659 filename_ptr, functionname_ptr,
7660 line_ptr))
d1fad7c6
NC
7661 {
7662 if (!*functionname_ptr)
4e8a9624
AM
7663 elf_find_function (abfd, section, symbols, offset,
7664 *filename_ptr ? NULL : filename_ptr,
7665 functionname_ptr);
7666
b34976b6 7667 return TRUE;
d1fad7c6
NC
7668 }
7669
fc28f9aa
TG
7670 if (_bfd_dwarf2_find_nearest_line (abfd, dwarf_debug_sections,
7671 section, symbols, offset,
4e8a9624 7672 filename_ptr, functionname_ptr,
9b8d1a36 7673 line_ptr, discriminator_ptr, 0,
4e8a9624 7674 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7675 {
7676 if (!*functionname_ptr)
4e8a9624
AM
7677 elf_find_function (abfd, section, symbols, offset,
7678 *filename_ptr ? NULL : filename_ptr,
7679 functionname_ptr);
7680
b34976b6 7681 return TRUE;
d1fad7c6
NC
7682 }
7683
7684 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7685 &found, filename_ptr,
7686 functionname_ptr, line_ptr,
7687 &elf_tdata (abfd)->line_info))
b34976b6 7688 return FALSE;
dc43ada5 7689 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7690 return TRUE;
d1fad7c6
NC
7691
7692 if (symbols == NULL)
b34976b6 7693 return FALSE;
d1fad7c6
NC
7694
7695 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7696 filename_ptr, functionname_ptr))
b34976b6 7697 return FALSE;
d1fad7c6 7698
252b5132 7699 *line_ptr = 0;
b34976b6 7700 return TRUE;
252b5132
RH
7701}
7702
5420f73d
L
7703/* Find the line for a symbol. */
7704
7705bfd_boolean
7706_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7707 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36
CC
7708{
7709 return _bfd_elf_find_line_discriminator (abfd, symbols, symbol,
7710 filename_ptr, line_ptr,
7711 NULL);
7712}
7713
7714bfd_boolean
7715_bfd_elf_find_line_discriminator (bfd *abfd, asymbol **symbols, asymbol *symbol,
7716 const char **filename_ptr,
7717 unsigned int *line_ptr,
7718 unsigned int *discriminator_ptr)
5420f73d
L
7719{
7720 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
9b8d1a36 7721 filename_ptr, line_ptr, discriminator_ptr, 0,
5420f73d
L
7722 &elf_tdata (abfd)->dwarf2_find_line_info);
7723}
7724
4ab527b0
FF
7725/* After a call to bfd_find_nearest_line, successive calls to
7726 bfd_find_inliner_info can be used to get source information about
7727 each level of function inlining that terminated at the address
7728 passed to bfd_find_nearest_line. Currently this is only supported
7729 for DWARF2 with appropriate DWARF3 extensions. */
7730
7731bfd_boolean
7732_bfd_elf_find_inliner_info (bfd *abfd,
7733 const char **filename_ptr,
7734 const char **functionname_ptr,
7735 unsigned int *line_ptr)
7736{
7737 bfd_boolean found;
7738 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7739 functionname_ptr, line_ptr,
7740 & elf_tdata (abfd)->dwarf2_find_line_info);
7741 return found;
7742}
7743
252b5132 7744int
a6b96beb 7745_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7746{
8ded5a0f
AM
7747 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7748 int ret = bed->s->sizeof_ehdr;
252b5132 7749
a6b96beb 7750 if (!info->relocatable)
8ded5a0f 7751 {
12bd6957 7752 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 7753
62d7a5f6
AM
7754 if (phdr_size == (bfd_size_type) -1)
7755 {
7756 struct elf_segment_map *m;
7757
7758 phdr_size = 0;
12bd6957 7759 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 7760 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7761
62d7a5f6
AM
7762 if (phdr_size == 0)
7763 phdr_size = get_program_header_size (abfd, info);
7764 }
8ded5a0f 7765
12bd6957 7766 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
7767 ret += phdr_size;
7768 }
7769
252b5132
RH
7770 return ret;
7771}
7772
b34976b6 7773bfd_boolean
217aa764
AM
7774_bfd_elf_set_section_contents (bfd *abfd,
7775 sec_ptr section,
0f867abe 7776 const void *location,
217aa764
AM
7777 file_ptr offset,
7778 bfd_size_type count)
252b5132
RH
7779{
7780 Elf_Internal_Shdr *hdr;
dc810e39 7781 bfd_signed_vma pos;
252b5132
RH
7782
7783 if (! abfd->output_has_begun
217aa764 7784 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7785 return FALSE;
252b5132
RH
7786
7787 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7788 pos = hdr->sh_offset + offset;
7789 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7790 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7791 return FALSE;
252b5132 7792
b34976b6 7793 return TRUE;
252b5132
RH
7794}
7795
7796void
217aa764
AM
7797_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7798 arelent *cache_ptr ATTRIBUTE_UNUSED,
7799 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7800{
7801 abort ();
7802}
7803
252b5132
RH
7804/* Try to convert a non-ELF reloc into an ELF one. */
7805
b34976b6 7806bfd_boolean
217aa764 7807_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7808{
c044fabd 7809 /* Check whether we really have an ELF howto. */
252b5132
RH
7810
7811 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7812 {
7813 bfd_reloc_code_real_type code;
7814 reloc_howto_type *howto;
7815
7816 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7817 equivalent ELF reloc. */
252b5132
RH
7818
7819 if (areloc->howto->pc_relative)
7820 {
7821 switch (areloc->howto->bitsize)
7822 {
7823 case 8:
7824 code = BFD_RELOC_8_PCREL;
7825 break;
7826 case 12:
7827 code = BFD_RELOC_12_PCREL;
7828 break;
7829 case 16:
7830 code = BFD_RELOC_16_PCREL;
7831 break;
7832 case 24:
7833 code = BFD_RELOC_24_PCREL;
7834 break;
7835 case 32:
7836 code = BFD_RELOC_32_PCREL;
7837 break;
7838 case 64:
7839 code = BFD_RELOC_64_PCREL;
7840 break;
7841 default:
7842 goto fail;
7843 }
7844
7845 howto = bfd_reloc_type_lookup (abfd, code);
7846
7847 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7848 {
7849 if (howto->pcrel_offset)
7850 areloc->addend += areloc->address;
7851 else
7852 areloc->addend -= areloc->address; /* addend is unsigned!! */
7853 }
7854 }
7855 else
7856 {
7857 switch (areloc->howto->bitsize)
7858 {
7859 case 8:
7860 code = BFD_RELOC_8;
7861 break;
7862 case 14:
7863 code = BFD_RELOC_14;
7864 break;
7865 case 16:
7866 code = BFD_RELOC_16;
7867 break;
7868 case 26:
7869 code = BFD_RELOC_26;
7870 break;
7871 case 32:
7872 code = BFD_RELOC_32;
7873 break;
7874 case 64:
7875 code = BFD_RELOC_64;
7876 break;
7877 default:
7878 goto fail;
7879 }
7880
7881 howto = bfd_reloc_type_lookup (abfd, code);
7882 }
7883
7884 if (howto)
7885 areloc->howto = howto;
7886 else
7887 goto fail;
7888 }
7889
b34976b6 7890 return TRUE;
252b5132
RH
7891
7892 fail:
7893 (*_bfd_error_handler)
d003868e
AM
7894 (_("%B: unsupported relocation type %s"),
7895 abfd, areloc->howto->name);
252b5132 7896 bfd_set_error (bfd_error_bad_value);
b34976b6 7897 return FALSE;
252b5132
RH
7898}
7899
b34976b6 7900bfd_boolean
217aa764 7901_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 7902{
d9071b0c
TG
7903 struct elf_obj_tdata *tdata = elf_tdata (abfd);
7904 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 7905 {
c0355132 7906 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7907 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 7908 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
7909 }
7910
7911 return _bfd_generic_close_and_cleanup (abfd);
7912}
7913
7914/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7915 in the relocation's offset. Thus we cannot allow any sort of sanity
7916 range-checking to interfere. There is nothing else to do in processing
7917 this reloc. */
7918
7919bfd_reloc_status_type
217aa764
AM
7920_bfd_elf_rel_vtable_reloc_fn
7921 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7922 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7923 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7924 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7925{
7926 return bfd_reloc_ok;
7927}
252b5132
RH
7928\f
7929/* Elf core file support. Much of this only works on native
7930 toolchains, since we rely on knowing the
7931 machine-dependent procfs structure in order to pick
c044fabd 7932 out details about the corefile. */
252b5132
RH
7933
7934#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
7935/* Needed for new procfs interface on sparc-solaris. */
7936# define _STRUCTURED_PROC 1
252b5132
RH
7937# include <sys/procfs.h>
7938#endif
7939
261b8d08
PA
7940/* Return a PID that identifies a "thread" for threaded cores, or the
7941 PID of the main process for non-threaded cores. */
252b5132
RH
7942
7943static int
217aa764 7944elfcore_make_pid (bfd *abfd)
252b5132 7945{
261b8d08
PA
7946 int pid;
7947
228e534f 7948 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 7949 if (pid == 0)
228e534f 7950 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
7951
7952 return pid;
252b5132
RH
7953}
7954
252b5132
RH
7955/* If there isn't a section called NAME, make one, using
7956 data from SECT. Note, this function will generate a
7957 reference to NAME, so you shouldn't deallocate or
c044fabd 7958 overwrite it. */
252b5132 7959
b34976b6 7960static bfd_boolean
217aa764 7961elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7962{
c044fabd 7963 asection *sect2;
252b5132
RH
7964
7965 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7966 return TRUE;
252b5132 7967
117ed4f8 7968 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7969 if (sect2 == NULL)
b34976b6 7970 return FALSE;
252b5132 7971
eea6121a 7972 sect2->size = sect->size;
252b5132 7973 sect2->filepos = sect->filepos;
252b5132 7974 sect2->alignment_power = sect->alignment_power;
b34976b6 7975 return TRUE;
252b5132
RH
7976}
7977
bb0082d6
AM
7978/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7979 actually creates up to two pseudosections:
7980 - For the single-threaded case, a section named NAME, unless
7981 such a section already exists.
7982 - For the multi-threaded case, a section named "NAME/PID", where
7983 PID is elfcore_make_pid (abfd).
7984 Both pseudosections have identical contents. */
b34976b6 7985bfd_boolean
217aa764
AM
7986_bfd_elfcore_make_pseudosection (bfd *abfd,
7987 char *name,
7988 size_t size,
7989 ufile_ptr filepos)
bb0082d6
AM
7990{
7991 char buf[100];
7992 char *threaded_name;
d4c88bbb 7993 size_t len;
bb0082d6
AM
7994 asection *sect;
7995
7996 /* Build the section name. */
7997
7998 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7999 len = strlen (buf) + 1;
a50b1753 8000 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8001 if (threaded_name == NULL)
b34976b6 8002 return FALSE;
d4c88bbb 8003 memcpy (threaded_name, buf, len);
bb0082d6 8004
117ed4f8
AM
8005 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8006 SEC_HAS_CONTENTS);
bb0082d6 8007 if (sect == NULL)
b34976b6 8008 return FALSE;
eea6121a 8009 sect->size = size;
bb0082d6 8010 sect->filepos = filepos;
bb0082d6
AM
8011 sect->alignment_power = 2;
8012
936e320b 8013 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
8014}
8015
252b5132 8016/* prstatus_t exists on:
4a938328 8017 solaris 2.5+
252b5132
RH
8018 linux 2.[01] + glibc
8019 unixware 4.2
8020*/
8021
8022#if defined (HAVE_PRSTATUS_T)
a7b97311 8023
b34976b6 8024static bfd_boolean
217aa764 8025elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8026{
eea6121a 8027 size_t size;
7ee38065 8028 int offset;
252b5132 8029
4a938328
MS
8030 if (note->descsz == sizeof (prstatus_t))
8031 {
8032 prstatus_t prstat;
252b5132 8033
eea6121a 8034 size = sizeof (prstat.pr_reg);
7ee38065 8035 offset = offsetof (prstatus_t, pr_reg);
4a938328 8036 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 8037
fa49d224
NC
8038 /* Do not overwrite the core signal if it
8039 has already been set by another thread. */
228e534f
AM
8040 if (elf_tdata (abfd)->core->signal == 0)
8041 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8042 if (elf_tdata (abfd)->core->pid == 0)
8043 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 8044
4a938328
MS
8045 /* pr_who exists on:
8046 solaris 2.5+
8047 unixware 4.2
8048 pr_who doesn't exist on:
8049 linux 2.[01]
8050 */
252b5132 8051#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 8052 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8053#else
228e534f 8054 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 8055#endif
4a938328 8056 }
7ee38065 8057#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
8058 else if (note->descsz == sizeof (prstatus32_t))
8059 {
8060 /* 64-bit host, 32-bit corefile */
8061 prstatus32_t prstat;
8062
eea6121a 8063 size = sizeof (prstat.pr_reg);
7ee38065 8064 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
8065 memcpy (&prstat, note->descdata, sizeof (prstat));
8066
fa49d224
NC
8067 /* Do not overwrite the core signal if it
8068 has already been set by another thread. */
228e534f
AM
8069 if (elf_tdata (abfd)->core->signal == 0)
8070 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8071 if (elf_tdata (abfd)->core->pid == 0)
8072 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
8073
8074 /* pr_who exists on:
8075 solaris 2.5+
8076 unixware 4.2
8077 pr_who doesn't exist on:
8078 linux 2.[01]
8079 */
7ee38065 8080#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 8081 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8082#else
228e534f 8083 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
8084#endif
8085 }
7ee38065 8086#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
8087 else
8088 {
8089 /* Fail - we don't know how to handle any other
8090 note size (ie. data object type). */
b34976b6 8091 return TRUE;
4a938328 8092 }
252b5132 8093
bb0082d6 8094 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 8095 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 8096 size, note->descpos + offset);
252b5132
RH
8097}
8098#endif /* defined (HAVE_PRSTATUS_T) */
8099
bb0082d6 8100/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 8101static bfd_boolean
217aa764
AM
8102elfcore_make_note_pseudosection (bfd *abfd,
8103 char *name,
8104 Elf_Internal_Note *note)
252b5132 8105{
936e320b
AM
8106 return _bfd_elfcore_make_pseudosection (abfd, name,
8107 note->descsz, note->descpos);
252b5132
RH
8108}
8109
ff08c6bb
JB
8110/* There isn't a consistent prfpregset_t across platforms,
8111 but it doesn't matter, because we don't have to pick this
c044fabd
KH
8112 data structure apart. */
8113
b34976b6 8114static bfd_boolean
217aa764 8115elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8116{
8117 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8118}
8119
ff08c6bb 8120/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 8121 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 8122 literally. */
c044fabd 8123
b34976b6 8124static bfd_boolean
217aa764 8125elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8126{
8127 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8128}
8129
4339cae0
L
8130/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
8131 with a note type of NT_X86_XSTATE. Just include the whole note's
8132 contents literally. */
8133
8134static bfd_boolean
8135elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
8136{
8137 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
8138}
8139
97753bd5
AM
8140static bfd_boolean
8141elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
8142{
8143 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
8144}
8145
89eeb0bc
LM
8146static bfd_boolean
8147elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
8148{
8149 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
8150}
97753bd5 8151
0675e188
UW
8152static bfd_boolean
8153elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
8154{
8155 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
8156}
8157
d7eeb400
MS
8158static bfd_boolean
8159elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
8160{
8161 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
8162}
8163
8164static bfd_boolean
8165elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
8166{
8167 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
8168}
8169
8170static bfd_boolean
8171elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
8172{
8173 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
8174}
8175
8176static bfd_boolean
8177elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
8178{
8179 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
8180}
8181
8182static bfd_boolean
8183elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
8184{
8185 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
8186}
8187
355b81d9
UW
8188static bfd_boolean
8189elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
8190{
8191 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
8192}
8193
8194static bfd_boolean
8195elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
8196{
8197 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
8198}
8199
abb3f6cc
NC
8200static bfd_boolean
8201elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
8202{
8203 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
8204}
8205
faa9a424
UW
8206static bfd_boolean
8207elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
8208{
8209 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
8210}
8211
652451f8
YZ
8212static bfd_boolean
8213elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
8214{
8215 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
8216}
8217
8218static bfd_boolean
8219elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
8220{
8221 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
8222}
8223
8224static bfd_boolean
8225elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
8226{
8227 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
8228}
8229
252b5132 8230#if defined (HAVE_PRPSINFO_T)
4a938328 8231typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 8232#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8233typedef prpsinfo32_t elfcore_psinfo32_t;
8234#endif
252b5132
RH
8235#endif
8236
8237#if defined (HAVE_PSINFO_T)
4a938328 8238typedef psinfo_t elfcore_psinfo_t;
7ee38065 8239#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8240typedef psinfo32_t elfcore_psinfo32_t;
8241#endif
252b5132
RH
8242#endif
8243
252b5132
RH
8244/* return a malloc'ed copy of a string at START which is at
8245 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 8246 the copy will always have a terminating '\0'. */
252b5132 8247
936e320b 8248char *
217aa764 8249_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 8250{
dc810e39 8251 char *dups;
a50b1753 8252 char *end = (char *) memchr (start, '\0', max);
dc810e39 8253 size_t len;
252b5132
RH
8254
8255 if (end == NULL)
8256 len = max;
8257 else
8258 len = end - start;
8259
a50b1753 8260 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 8261 if (dups == NULL)
252b5132
RH
8262 return NULL;
8263
dc810e39
AM
8264 memcpy (dups, start, len);
8265 dups[len] = '\0';
252b5132 8266
dc810e39 8267 return dups;
252b5132
RH
8268}
8269
bb0082d6 8270#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 8271static bfd_boolean
217aa764 8272elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 8273{
4a938328
MS
8274 if (note->descsz == sizeof (elfcore_psinfo_t))
8275 {
8276 elfcore_psinfo_t psinfo;
252b5132 8277
7ee38065 8278 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8279
335e41d4 8280#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 8281 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8282#endif
228e534f 8283 elf_tdata (abfd)->core->program
936e320b
AM
8284 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8285 sizeof (psinfo.pr_fname));
252b5132 8286
228e534f 8287 elf_tdata (abfd)->core->command
936e320b
AM
8288 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8289 sizeof (psinfo.pr_psargs));
4a938328 8290 }
7ee38065 8291#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
8292 else if (note->descsz == sizeof (elfcore_psinfo32_t))
8293 {
8294 /* 64-bit host, 32-bit corefile */
8295 elfcore_psinfo32_t psinfo;
8296
7ee38065 8297 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8298
335e41d4 8299#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 8300 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8301#endif
228e534f 8302 elf_tdata (abfd)->core->program
936e320b
AM
8303 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8304 sizeof (psinfo.pr_fname));
4a938328 8305
228e534f 8306 elf_tdata (abfd)->core->command
936e320b
AM
8307 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8308 sizeof (psinfo.pr_psargs));
4a938328
MS
8309 }
8310#endif
8311
8312 else
8313 {
8314 /* Fail - we don't know how to handle any other
8315 note size (ie. data object type). */
b34976b6 8316 return TRUE;
4a938328 8317 }
252b5132
RH
8318
8319 /* Note that for some reason, a spurious space is tacked
8320 onto the end of the args in some (at least one anyway)
c044fabd 8321 implementations, so strip it off if it exists. */
252b5132
RH
8322
8323 {
228e534f 8324 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
8325 int n = strlen (command);
8326
8327 if (0 < n && command[n - 1] == ' ')
8328 command[n - 1] = '\0';
8329 }
8330
b34976b6 8331 return TRUE;
252b5132
RH
8332}
8333#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
8334
252b5132 8335#if defined (HAVE_PSTATUS_T)
b34976b6 8336static bfd_boolean
217aa764 8337elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8338{
f572a39d
AM
8339 if (note->descsz == sizeof (pstatus_t)
8340#if defined (HAVE_PXSTATUS_T)
8341 || note->descsz == sizeof (pxstatus_t)
8342#endif
8343 )
4a938328
MS
8344 {
8345 pstatus_t pstat;
252b5132 8346
4a938328 8347 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8348
228e534f 8349 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 8350 }
7ee38065 8351#if defined (HAVE_PSTATUS32_T)
4a938328
MS
8352 else if (note->descsz == sizeof (pstatus32_t))
8353 {
8354 /* 64-bit host, 32-bit corefile */
8355 pstatus32_t pstat;
252b5132 8356
4a938328 8357 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8358
228e534f 8359 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
8360 }
8361#endif
252b5132
RH
8362 /* Could grab some more details from the "representative"
8363 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 8364 NT_LWPSTATUS note, presumably. */
252b5132 8365
b34976b6 8366 return TRUE;
252b5132
RH
8367}
8368#endif /* defined (HAVE_PSTATUS_T) */
8369
252b5132 8370#if defined (HAVE_LWPSTATUS_T)
b34976b6 8371static bfd_boolean
217aa764 8372elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
8373{
8374 lwpstatus_t lwpstat;
8375 char buf[100];
c044fabd 8376 char *name;
d4c88bbb 8377 size_t len;
c044fabd 8378 asection *sect;
252b5132 8379
f572a39d
AM
8380 if (note->descsz != sizeof (lwpstat)
8381#if defined (HAVE_LWPXSTATUS_T)
8382 && note->descsz != sizeof (lwpxstatus_t)
8383#endif
8384 )
b34976b6 8385 return TRUE;
252b5132
RH
8386
8387 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
8388
228e534f 8389 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
8390 /* Do not overwrite the core signal if it has already been set by
8391 another thread. */
228e534f
AM
8392 if (elf_tdata (abfd)->core->signal == 0)
8393 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 8394
c044fabd 8395 /* Make a ".reg/999" section. */
252b5132
RH
8396
8397 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 8398 len = strlen (buf) + 1;
217aa764 8399 name = bfd_alloc (abfd, len);
252b5132 8400 if (name == NULL)
b34976b6 8401 return FALSE;
d4c88bbb 8402 memcpy (name, buf, len);
252b5132 8403
117ed4f8 8404 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8405 if (sect == NULL)
b34976b6 8406 return FALSE;
252b5132
RH
8407
8408#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8409 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
8410 sect->filepos = note->descpos
8411 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
8412#endif
8413
8414#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 8415 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
8416 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
8417#endif
8418
252b5132
RH
8419 sect->alignment_power = 2;
8420
8421 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8422 return FALSE;
252b5132
RH
8423
8424 /* Make a ".reg2/999" section */
8425
8426 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 8427 len = strlen (buf) + 1;
217aa764 8428 name = bfd_alloc (abfd, len);
252b5132 8429 if (name == NULL)
b34976b6 8430 return FALSE;
d4c88bbb 8431 memcpy (name, buf, len);
252b5132 8432
117ed4f8 8433 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8434 if (sect == NULL)
b34976b6 8435 return FALSE;
252b5132
RH
8436
8437#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8438 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
8439 sect->filepos = note->descpos
8440 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
8441#endif
8442
8443#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 8444 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
8445 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
8446#endif
8447
252b5132
RH
8448 sect->alignment_power = 2;
8449
936e320b 8450 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
8451}
8452#endif /* defined (HAVE_LWPSTATUS_T) */
8453
b34976b6 8454static bfd_boolean
217aa764 8455elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
8456{
8457 char buf[30];
c044fabd 8458 char *name;
d4c88bbb 8459 size_t len;
c044fabd 8460 asection *sect;
4a6636fb
PA
8461 int type;
8462 int is_active_thread;
8463 bfd_vma base_addr;
16e9c715 8464
4a6636fb 8465 if (note->descsz < 728)
b34976b6 8466 return TRUE;
16e9c715 8467
4a6636fb
PA
8468 if (! CONST_STRNEQ (note->namedata, "win32"))
8469 return TRUE;
8470
8471 type = bfd_get_32 (abfd, note->descdata);
c044fabd 8472
4a6636fb 8473 switch (type)
16e9c715 8474 {
4a6636fb 8475 case 1 /* NOTE_INFO_PROCESS */:
228e534f 8476 /* FIXME: need to add ->core->command. */
4a6636fb 8477 /* process_info.pid */
228e534f 8478 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 8479 /* process_info.signal */
228e534f 8480 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 8481 break;
16e9c715 8482
4a6636fb 8483 case 2 /* NOTE_INFO_THREAD */:
16e9c715 8484 /* Make a ".reg/999" section. */
4a6636fb
PA
8485 /* thread_info.tid */
8486 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 8487
d4c88bbb 8488 len = strlen (buf) + 1;
a50b1753 8489 name = (char *) bfd_alloc (abfd, len);
16e9c715 8490 if (name == NULL)
b34976b6 8491 return FALSE;
c044fabd 8492
d4c88bbb 8493 memcpy (name, buf, len);
16e9c715 8494
117ed4f8 8495 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 8496 if (sect == NULL)
b34976b6 8497 return FALSE;
c044fabd 8498
4a6636fb
PA
8499 /* sizeof (thread_info.thread_context) */
8500 sect->size = 716;
8501 /* offsetof (thread_info.thread_context) */
8502 sect->filepos = note->descpos + 12;
16e9c715
NC
8503 sect->alignment_power = 2;
8504
4a6636fb
PA
8505 /* thread_info.is_active_thread */
8506 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
8507
8508 if (is_active_thread)
16e9c715 8509 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8510 return FALSE;
16e9c715
NC
8511 break;
8512
4a6636fb 8513 case 3 /* NOTE_INFO_MODULE */:
16e9c715 8514 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
8515 /* module_info.base_address */
8516 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 8517 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 8518
d4c88bbb 8519 len = strlen (buf) + 1;
a50b1753 8520 name = (char *) bfd_alloc (abfd, len);
16e9c715 8521 if (name == NULL)
b34976b6 8522 return FALSE;
c044fabd 8523
d4c88bbb 8524 memcpy (name, buf, len);
252b5132 8525
117ed4f8 8526 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 8527
16e9c715 8528 if (sect == NULL)
b34976b6 8529 return FALSE;
c044fabd 8530
eea6121a 8531 sect->size = note->descsz;
16e9c715 8532 sect->filepos = note->descpos;
16e9c715
NC
8533 sect->alignment_power = 2;
8534 break;
8535
8536 default:
b34976b6 8537 return TRUE;
16e9c715
NC
8538 }
8539
b34976b6 8540 return TRUE;
16e9c715 8541}
252b5132 8542
b34976b6 8543static bfd_boolean
217aa764 8544elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 8545{
9c5bfbb7 8546 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 8547
252b5132
RH
8548 switch (note->type)
8549 {
8550 default:
b34976b6 8551 return TRUE;
252b5132 8552
252b5132 8553 case NT_PRSTATUS:
bb0082d6
AM
8554 if (bed->elf_backend_grok_prstatus)
8555 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 8556 return TRUE;
bb0082d6 8557#if defined (HAVE_PRSTATUS_T)
252b5132 8558 return elfcore_grok_prstatus (abfd, note);
bb0082d6 8559#else
b34976b6 8560 return TRUE;
252b5132
RH
8561#endif
8562
8563#if defined (HAVE_PSTATUS_T)
8564 case NT_PSTATUS:
8565 return elfcore_grok_pstatus (abfd, note);
8566#endif
8567
8568#if defined (HAVE_LWPSTATUS_T)
8569 case NT_LWPSTATUS:
8570 return elfcore_grok_lwpstatus (abfd, note);
8571#endif
8572
8573 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
8574 return elfcore_grok_prfpreg (abfd, note);
8575
c044fabd 8576 case NT_WIN32PSTATUS:
16e9c715 8577 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 8578
c044fabd 8579 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
8580 if (note->namesz == 6
8581 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
8582 return elfcore_grok_prxfpreg (abfd, note);
8583 else
b34976b6 8584 return TRUE;
ff08c6bb 8585
4339cae0
L
8586 case NT_X86_XSTATE: /* Linux XSAVE extension */
8587 if (note->namesz == 6
8588 && strcmp (note->namedata, "LINUX") == 0)
8589 return elfcore_grok_xstatereg (abfd, note);
8590 else
8591 return TRUE;
8592
97753bd5
AM
8593 case NT_PPC_VMX:
8594 if (note->namesz == 6
8595 && strcmp (note->namedata, "LINUX") == 0)
8596 return elfcore_grok_ppc_vmx (abfd, note);
8597 else
8598 return TRUE;
8599
89eeb0bc
LM
8600 case NT_PPC_VSX:
8601 if (note->namesz == 6
8602 && strcmp (note->namedata, "LINUX") == 0)
8603 return elfcore_grok_ppc_vsx (abfd, note);
8604 else
8605 return TRUE;
8606
0675e188
UW
8607 case NT_S390_HIGH_GPRS:
8608 if (note->namesz == 6
8609 && strcmp (note->namedata, "LINUX") == 0)
8610 return elfcore_grok_s390_high_gprs (abfd, note);
8611 else
8612 return TRUE;
8613
d7eeb400
MS
8614 case NT_S390_TIMER:
8615 if (note->namesz == 6
8616 && strcmp (note->namedata, "LINUX") == 0)
8617 return elfcore_grok_s390_timer (abfd, note);
8618 else
8619 return TRUE;
8620
8621 case NT_S390_TODCMP:
8622 if (note->namesz == 6
8623 && strcmp (note->namedata, "LINUX") == 0)
8624 return elfcore_grok_s390_todcmp (abfd, note);
8625 else
8626 return TRUE;
8627
8628 case NT_S390_TODPREG:
8629 if (note->namesz == 6
8630 && strcmp (note->namedata, "LINUX") == 0)
8631 return elfcore_grok_s390_todpreg (abfd, note);
8632 else
8633 return TRUE;
8634
8635 case NT_S390_CTRS:
8636 if (note->namesz == 6
8637 && strcmp (note->namedata, "LINUX") == 0)
8638 return elfcore_grok_s390_ctrs (abfd, note);
8639 else
8640 return TRUE;
8641
8642 case NT_S390_PREFIX:
8643 if (note->namesz == 6
8644 && strcmp (note->namedata, "LINUX") == 0)
8645 return elfcore_grok_s390_prefix (abfd, note);
8646 else
8647 return TRUE;
8648
355b81d9
UW
8649 case NT_S390_LAST_BREAK:
8650 if (note->namesz == 6
8651 && strcmp (note->namedata, "LINUX") == 0)
8652 return elfcore_grok_s390_last_break (abfd, note);
8653 else
8654 return TRUE;
8655
8656 case NT_S390_SYSTEM_CALL:
8657 if (note->namesz == 6
8658 && strcmp (note->namedata, "LINUX") == 0)
8659 return elfcore_grok_s390_system_call (abfd, note);
8660 else
8661 return TRUE;
8662
abb3f6cc
NC
8663 case NT_S390_TDB:
8664 if (note->namesz == 6
8665 && strcmp (note->namedata, "LINUX") == 0)
8666 return elfcore_grok_s390_tdb (abfd, note);
8667 else
8668 return TRUE;
8669
faa9a424
UW
8670 case NT_ARM_VFP:
8671 if (note->namesz == 6
8672 && strcmp (note->namedata, "LINUX") == 0)
8673 return elfcore_grok_arm_vfp (abfd, note);
8674 else
8675 return TRUE;
8676
652451f8
YZ
8677 case NT_ARM_TLS:
8678 if (note->namesz == 6
8679 && strcmp (note->namedata, "LINUX") == 0)
8680 return elfcore_grok_aarch_tls (abfd, note);
8681 else
8682 return TRUE;
8683
8684 case NT_ARM_HW_BREAK:
8685 if (note->namesz == 6
8686 && strcmp (note->namedata, "LINUX") == 0)
8687 return elfcore_grok_aarch_hw_break (abfd, note);
8688 else
8689 return TRUE;
8690
8691 case NT_ARM_HW_WATCH:
8692 if (note->namesz == 6
8693 && strcmp (note->namedata, "LINUX") == 0)
8694 return elfcore_grok_aarch_hw_watch (abfd, note);
8695 else
8696 return TRUE;
8697
252b5132
RH
8698 case NT_PRPSINFO:
8699 case NT_PSINFO:
bb0082d6
AM
8700 if (bed->elf_backend_grok_psinfo)
8701 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8702 return TRUE;
bb0082d6 8703#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8704 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8705#else
b34976b6 8706 return TRUE;
252b5132 8707#endif
3333a7c3
RM
8708
8709 case NT_AUXV:
8710 {
117ed4f8
AM
8711 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8712 SEC_HAS_CONTENTS);
3333a7c3
RM
8713
8714 if (sect == NULL)
8715 return FALSE;
eea6121a 8716 sect->size = note->descsz;
3333a7c3 8717 sect->filepos = note->descpos;
3333a7c3
RM
8718 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8719
8720 return TRUE;
8721 }
9015683b 8722
451b7c33
TT
8723 case NT_FILE:
8724 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
8725 note);
8726
9015683b
TT
8727 case NT_SIGINFO:
8728 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
8729 note);
252b5132
RH
8730 }
8731}
8732
718175fa
JK
8733static bfd_boolean
8734elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8735{
30e8ee25
AM
8736 struct elf_obj_tdata *t;
8737
8738 if (note->descsz == 0)
8739 return FALSE;
8740
8741 t = elf_tdata (abfd);
c0355132 8742 t->build_id = bfd_alloc (abfd, sizeof (*t->build_id) - 1 + note->descsz);
30e8ee25 8743 if (t->build_id == NULL)
718175fa
JK
8744 return FALSE;
8745
c0355132
AM
8746 t->build_id->size = note->descsz;
8747 memcpy (t->build_id->data, note->descdata, note->descsz);
718175fa
JK
8748
8749 return TRUE;
8750}
8751
8752static bfd_boolean
8753elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8754{
8755 switch (note->type)
8756 {
8757 default:
8758 return TRUE;
8759
8760 case NT_GNU_BUILD_ID:
8761 return elfobj_grok_gnu_build_id (abfd, note);
8762 }
8763}
8764
e21e5835
NC
8765static bfd_boolean
8766elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
8767{
8768 struct sdt_note *cur =
8769 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
8770 + note->descsz);
8771
8772 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
8773 cur->size = (bfd_size_type) note->descsz;
8774 memcpy (cur->data, note->descdata, note->descsz);
8775
8776 elf_tdata (abfd)->sdt_note_head = cur;
8777
8778 return TRUE;
8779}
8780
8781static bfd_boolean
8782elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
8783{
8784 switch (note->type)
8785 {
8786 case NT_STAPSDT:
8787 return elfobj_grok_stapsdt_note_1 (abfd, note);
8788
8789 default:
8790 return TRUE;
8791 }
8792}
8793
b34976b6 8794static bfd_boolean
217aa764 8795elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8796{
8797 char *cp;
8798
8799 cp = strchr (note->namedata, '@');
8800 if (cp != NULL)
8801 {
d2b64500 8802 *lwpidp = atoi(cp + 1);
b34976b6 8803 return TRUE;
50b2bdb7 8804 }
b34976b6 8805 return FALSE;
50b2bdb7
AM
8806}
8807
b34976b6 8808static bfd_boolean
217aa764 8809elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8810{
50b2bdb7 8811 /* Signal number at offset 0x08. */
228e534f 8812 elf_tdata (abfd)->core->signal
50b2bdb7
AM
8813 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8814
8815 /* Process ID at offset 0x50. */
228e534f 8816 elf_tdata (abfd)->core->pid
50b2bdb7
AM
8817 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8818
8819 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 8820 elf_tdata (abfd)->core->command
50b2bdb7
AM
8821 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8822
7720ba9f
MK
8823 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8824 note);
50b2bdb7
AM
8825}
8826
b34976b6 8827static bfd_boolean
217aa764 8828elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8829{
8830 int lwp;
8831
8832 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 8833 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 8834
b4db1224 8835 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8836 {
8837 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8838 find this note before any of the others, which is fine,
8839 since the kernel writes this note out first when it
8840 creates a core file. */
47d9a591 8841
50b2bdb7
AM
8842 return elfcore_grok_netbsd_procinfo (abfd, note);
8843 }
8844
b4db1224
JT
8845 /* As of Jan 2002 there are no other machine-independent notes
8846 defined for NetBSD core files. If the note type is less
8847 than the start of the machine-dependent note types, we don't
8848 understand it. */
47d9a591 8849
b4db1224 8850 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8851 return TRUE;
50b2bdb7
AM
8852
8853
8854 switch (bfd_get_arch (abfd))
8855 {
08a40648
AM
8856 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8857 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8858
8859 case bfd_arch_alpha:
8860 case bfd_arch_sparc:
8861 switch (note->type)
08a40648
AM
8862 {
8863 case NT_NETBSDCORE_FIRSTMACH+0:
8864 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8865
08a40648
AM
8866 case NT_NETBSDCORE_FIRSTMACH+2:
8867 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8868
08a40648
AM
8869 default:
8870 return TRUE;
8871 }
50b2bdb7 8872
08a40648
AM
8873 /* On all other arch's, PT_GETREGS == mach+1 and
8874 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8875
8876 default:
8877 switch (note->type)
08a40648
AM
8878 {
8879 case NT_NETBSDCORE_FIRSTMACH+1:
8880 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8881
08a40648
AM
8882 case NT_NETBSDCORE_FIRSTMACH+3:
8883 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8884
08a40648
AM
8885 default:
8886 return TRUE;
8887 }
50b2bdb7
AM
8888 }
8889 /* NOTREACHED */
8890}
8891
67cc5033
MK
8892static bfd_boolean
8893elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8894{
8895 /* Signal number at offset 0x08. */
228e534f 8896 elf_tdata (abfd)->core->signal
67cc5033
MK
8897 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8898
8899 /* Process ID at offset 0x20. */
228e534f 8900 elf_tdata (abfd)->core->pid
67cc5033
MK
8901 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8902
8903 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 8904 elf_tdata (abfd)->core->command
67cc5033
MK
8905 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8906
8907 return TRUE;
8908}
8909
8910static bfd_boolean
8911elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8912{
8913 if (note->type == NT_OPENBSD_PROCINFO)
8914 return elfcore_grok_openbsd_procinfo (abfd, note);
8915
8916 if (note->type == NT_OPENBSD_REGS)
8917 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8918
8919 if (note->type == NT_OPENBSD_FPREGS)
8920 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8921
8922 if (note->type == NT_OPENBSD_XFPREGS)
8923 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8924
8925 if (note->type == NT_OPENBSD_AUXV)
8926 {
8927 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8928 SEC_HAS_CONTENTS);
8929
8930 if (sect == NULL)
8931 return FALSE;
8932 sect->size = note->descsz;
8933 sect->filepos = note->descpos;
8934 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8935
8936 return TRUE;
8937 }
8938
8939 if (note->type == NT_OPENBSD_WCOOKIE)
8940 {
8941 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8942 SEC_HAS_CONTENTS);
8943
8944 if (sect == NULL)
8945 return FALSE;
8946 sect->size = note->descsz;
8947 sect->filepos = note->descpos;
8948 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8949
8950 return TRUE;
8951 }
8952
8953 return TRUE;
8954}
8955
07c6e936 8956static bfd_boolean
d3fd4074 8957elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8958{
8959 void *ddata = note->descdata;
8960 char buf[100];
8961 char *name;
8962 asection *sect;
f8843e87
AM
8963 short sig;
8964 unsigned flags;
07c6e936
NC
8965
8966 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 8967 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 8968
f8843e87
AM
8969 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8970 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8971
8972 /* nto_procfs_status 'flags' field is at offset 8. */
8973 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8974
8975 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8976 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8977 {
228e534f
AM
8978 elf_tdata (abfd)->core->signal = sig;
8979 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 8980 }
07c6e936 8981
f8843e87
AM
8982 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8983 do not come from signals so we make sure we set the current
8984 thread just in case. */
8985 if (flags & 0x00000080)
228e534f 8986 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
8987
8988 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8989 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8990
a50b1753 8991 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8992 if (name == NULL)
8993 return FALSE;
8994 strcpy (name, buf);
8995
117ed4f8 8996 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8997 if (sect == NULL)
8998 return FALSE;
8999
eea6121a 9000 sect->size = note->descsz;
07c6e936 9001 sect->filepos = note->descpos;
07c6e936
NC
9002 sect->alignment_power = 2;
9003
9004 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
9005}
9006
9007static bfd_boolean
d69f560c
KW
9008elfcore_grok_nto_regs (bfd *abfd,
9009 Elf_Internal_Note *note,
d3fd4074 9010 long tid,
d69f560c 9011 char *base)
07c6e936
NC
9012{
9013 char buf[100];
9014 char *name;
9015 asection *sect;
9016
d69f560c 9017 /* Make a "(base)/%d" section. */
d3fd4074 9018 sprintf (buf, "%s/%ld", base, tid);
07c6e936 9019
a50b1753 9020 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9021 if (name == NULL)
9022 return FALSE;
9023 strcpy (name, buf);
9024
117ed4f8 9025 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
9026 if (sect == NULL)
9027 return FALSE;
9028
eea6121a 9029 sect->size = note->descsz;
07c6e936 9030 sect->filepos = note->descpos;
07c6e936
NC
9031 sect->alignment_power = 2;
9032
f8843e87 9033 /* This is the current thread. */
228e534f 9034 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 9035 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
9036
9037 return TRUE;
07c6e936
NC
9038}
9039
9040#define BFD_QNT_CORE_INFO 7
9041#define BFD_QNT_CORE_STATUS 8
9042#define BFD_QNT_CORE_GREG 9
9043#define BFD_QNT_CORE_FPREG 10
9044
9045static bfd_boolean
217aa764 9046elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
9047{
9048 /* Every GREG section has a STATUS section before it. Store the
811072d8 9049 tid from the previous call to pass down to the next gregs
07c6e936 9050 function. */
d3fd4074 9051 static long tid = 1;
07c6e936
NC
9052
9053 switch (note->type)
9054 {
d69f560c
KW
9055 case BFD_QNT_CORE_INFO:
9056 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
9057 case BFD_QNT_CORE_STATUS:
9058 return elfcore_grok_nto_status (abfd, note, &tid);
9059 case BFD_QNT_CORE_GREG:
9060 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
9061 case BFD_QNT_CORE_FPREG:
9062 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
9063 default:
9064 return TRUE;
07c6e936
NC
9065 }
9066}
9067
b15fa79e
AM
9068static bfd_boolean
9069elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
9070{
9071 char *name;
9072 asection *sect;
9073 size_t len;
9074
9075 /* Use note name as section name. */
9076 len = note->namesz;
a50b1753 9077 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
9078 if (name == NULL)
9079 return FALSE;
9080 memcpy (name, note->namedata, len);
9081 name[len - 1] = '\0';
9082
9083 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9084 if (sect == NULL)
9085 return FALSE;
9086
9087 sect->size = note->descsz;
9088 sect->filepos = note->descpos;
9089 sect->alignment_power = 1;
9090
9091 return TRUE;
9092}
9093
7c76fa91
MS
9094/* Function: elfcore_write_note
9095
47d9a591 9096 Inputs:
a39f3346 9097 buffer to hold note, and current size of buffer
7c76fa91
MS
9098 name of note
9099 type of note
9100 data for note
9101 size of data for note
9102
a39f3346
AM
9103 Writes note to end of buffer. ELF64 notes are written exactly as
9104 for ELF32, despite the current (as of 2006) ELF gabi specifying
9105 that they ought to have 8-byte namesz and descsz field, and have
9106 8-byte alignment. Other writers, eg. Linux kernel, do the same.
9107
7c76fa91 9108 Return:
a39f3346 9109 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
9110
9111char *
a39f3346 9112elfcore_write_note (bfd *abfd,
217aa764 9113 char *buf,
a39f3346 9114 int *bufsiz,
217aa764 9115 const char *name,
a39f3346 9116 int type,
217aa764 9117 const void *input,
a39f3346 9118 int size)
7c76fa91
MS
9119{
9120 Elf_External_Note *xnp;
d4c88bbb 9121 size_t namesz;
d4c88bbb 9122 size_t newspace;
a39f3346 9123 char *dest;
7c76fa91 9124
d4c88bbb 9125 namesz = 0;
d4c88bbb 9126 if (name != NULL)
a39f3346 9127 namesz = strlen (name) + 1;
d4c88bbb 9128
a39f3346 9129 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 9130
a50b1753 9131 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
9132 if (buf == NULL)
9133 return buf;
a39f3346 9134 dest = buf + *bufsiz;
7c76fa91
MS
9135 *bufsiz += newspace;
9136 xnp = (Elf_External_Note *) dest;
9137 H_PUT_32 (abfd, namesz, xnp->namesz);
9138 H_PUT_32 (abfd, size, xnp->descsz);
9139 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
9140 dest = xnp->name;
9141 if (name != NULL)
9142 {
9143 memcpy (dest, name, namesz);
9144 dest += namesz;
a39f3346 9145 while (namesz & 3)
d4c88bbb
AM
9146 {
9147 *dest++ = '\0';
a39f3346 9148 ++namesz;
d4c88bbb
AM
9149 }
9150 }
9151 memcpy (dest, input, size);
a39f3346
AM
9152 dest += size;
9153 while (size & 3)
9154 {
9155 *dest++ = '\0';
9156 ++size;
9157 }
9158 return buf;
7c76fa91
MS
9159}
9160
7c76fa91 9161char *
217aa764
AM
9162elfcore_write_prpsinfo (bfd *abfd,
9163 char *buf,
9164 int *bufsiz,
9165 const char *fname,
9166 const char *psargs)
7c76fa91 9167{
183e98be
AM
9168 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9169
9170 if (bed->elf_backend_write_core_note != NULL)
9171 {
9172 char *ret;
9173 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9174 NT_PRPSINFO, fname, psargs);
9175 if (ret != NULL)
9176 return ret;
9177 }
7c76fa91 9178
1f20dca5 9179#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
9180#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9181 if (bed->s->elfclass == ELFCLASS32)
9182 {
9183#if defined (HAVE_PSINFO32_T)
9184 psinfo32_t data;
9185 int note_type = NT_PSINFO;
9186#else
9187 prpsinfo32_t data;
9188 int note_type = NT_PRPSINFO;
9189#endif
9190
9191 memset (&data, 0, sizeof (data));
9192 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9193 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9194 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9195 "CORE", note_type, &data, sizeof (data));
183e98be
AM
9196 }
9197 else
9198#endif
9199 {
7c76fa91 9200#if defined (HAVE_PSINFO_T)
183e98be
AM
9201 psinfo_t data;
9202 int note_type = NT_PSINFO;
7c76fa91 9203#else
183e98be
AM
9204 prpsinfo_t data;
9205 int note_type = NT_PRPSINFO;
7c76fa91
MS
9206#endif
9207
183e98be
AM
9208 memset (&data, 0, sizeof (data));
9209 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9210 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9211 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9212 "CORE", note_type, &data, sizeof (data));
183e98be 9213 }
7c76fa91
MS
9214#endif /* PSINFO_T or PRPSINFO_T */
9215
1f20dca5
UW
9216 free (buf);
9217 return NULL;
9218}
9219
70a38d42
SDJ
9220char *
9221elfcore_write_linux_prpsinfo32
9222 (bfd *abfd, char *buf, int *bufsiz,
9223 const struct elf_internal_linux_prpsinfo *prpsinfo)
9224{
9225 struct elf_external_linux_prpsinfo32 data;
9226
9227 memset (&data, 0, sizeof (data));
9228 LINUX_PRPSINFO32_SWAP_FIELDS (abfd, prpsinfo, data);
9229
9230 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
9231 &data, sizeof (data));
9232}
9233
9234char *
9235elfcore_write_linux_prpsinfo64
9236 (bfd *abfd, char *buf, int *bufsiz,
9237 const struct elf_internal_linux_prpsinfo *prpsinfo)
9238{
9239 struct elf_external_linux_prpsinfo64 data;
9240
9241 memset (&data, 0, sizeof (data));
9242 LINUX_PRPSINFO64_SWAP_FIELDS (abfd, prpsinfo, data);
9243
9244 return elfcore_write_note (abfd, buf, bufsiz,
9245 "CORE", NT_PRPSINFO, &data, sizeof (data));
9246}
9247
7c76fa91 9248char *
217aa764
AM
9249elfcore_write_prstatus (bfd *abfd,
9250 char *buf,
9251 int *bufsiz,
9252 long pid,
9253 int cursig,
9254 const void *gregs)
7c76fa91 9255{
183e98be 9256 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9257
183e98be
AM
9258 if (bed->elf_backend_write_core_note != NULL)
9259 {
9260 char *ret;
9261 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9262 NT_PRSTATUS,
9263 pid, cursig, gregs);
9264 if (ret != NULL)
9265 return ret;
9266 }
9267
1f20dca5 9268#if defined (HAVE_PRSTATUS_T)
183e98be
AM
9269#if defined (HAVE_PRSTATUS32_T)
9270 if (bed->s->elfclass == ELFCLASS32)
9271 {
9272 prstatus32_t prstat;
9273
9274 memset (&prstat, 0, sizeof (prstat));
9275 prstat.pr_pid = pid;
9276 prstat.pr_cursig = cursig;
9277 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9278 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9279 NT_PRSTATUS, &prstat, sizeof (prstat));
9280 }
9281 else
9282#endif
9283 {
9284 prstatus_t prstat;
9285
9286 memset (&prstat, 0, sizeof (prstat));
9287 prstat.pr_pid = pid;
9288 prstat.pr_cursig = cursig;
9289 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9290 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9291 NT_PRSTATUS, &prstat, sizeof (prstat));
9292 }
7c76fa91
MS
9293#endif /* HAVE_PRSTATUS_T */
9294
1f20dca5
UW
9295 free (buf);
9296 return NULL;
9297}
9298
51316059
MS
9299#if defined (HAVE_LWPSTATUS_T)
9300char *
217aa764
AM
9301elfcore_write_lwpstatus (bfd *abfd,
9302 char *buf,
9303 int *bufsiz,
9304 long pid,
9305 int cursig,
9306 const void *gregs)
51316059
MS
9307{
9308 lwpstatus_t lwpstat;
183e98be 9309 const char *note_name = "CORE";
51316059
MS
9310
9311 memset (&lwpstat, 0, sizeof (lwpstat));
9312 lwpstat.pr_lwpid = pid >> 16;
9313 lwpstat.pr_cursig = cursig;
9314#if defined (HAVE_LWPSTATUS_T_PR_REG)
9315 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
9316#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9317#if !defined(gregs)
9318 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
9319 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
9320#else
9321 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
9322 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
9323#endif
9324#endif
47d9a591 9325 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
9326 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
9327}
9328#endif /* HAVE_LWPSTATUS_T */
9329
7c76fa91
MS
9330#if defined (HAVE_PSTATUS_T)
9331char *
217aa764
AM
9332elfcore_write_pstatus (bfd *abfd,
9333 char *buf,
9334 int *bufsiz,
9335 long pid,
6c10990d
NC
9336 int cursig ATTRIBUTE_UNUSED,
9337 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 9338{
183e98be
AM
9339 const char *note_name = "CORE";
9340#if defined (HAVE_PSTATUS32_T)
9341 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9342
183e98be
AM
9343 if (bed->s->elfclass == ELFCLASS32)
9344 {
9345 pstatus32_t pstat;
9346
9347 memset (&pstat, 0, sizeof (pstat));
9348 pstat.pr_pid = pid & 0xffff;
9349 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9350 NT_PSTATUS, &pstat, sizeof (pstat));
9351 return buf;
9352 }
9353 else
9354#endif
9355 {
9356 pstatus_t pstat;
9357
9358 memset (&pstat, 0, sizeof (pstat));
9359 pstat.pr_pid = pid & 0xffff;
9360 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9361 NT_PSTATUS, &pstat, sizeof (pstat));
9362 return buf;
9363 }
7c76fa91
MS
9364}
9365#endif /* HAVE_PSTATUS_T */
9366
9367char *
217aa764
AM
9368elfcore_write_prfpreg (bfd *abfd,
9369 char *buf,
9370 int *bufsiz,
9371 const void *fpregs,
9372 int size)
7c76fa91 9373{
183e98be 9374 const char *note_name = "CORE";
47d9a591 9375 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9376 note_name, NT_FPREGSET, fpregs, size);
9377}
9378
9379char *
217aa764
AM
9380elfcore_write_prxfpreg (bfd *abfd,
9381 char *buf,
9382 int *bufsiz,
9383 const void *xfpregs,
9384 int size)
7c76fa91
MS
9385{
9386 char *note_name = "LINUX";
47d9a591 9387 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9388 note_name, NT_PRXFPREG, xfpregs, size);
9389}
9390
4339cae0
L
9391char *
9392elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
9393 const void *xfpregs, int size)
9394{
9395 char *note_name = "LINUX";
9396 return elfcore_write_note (abfd, buf, bufsiz,
9397 note_name, NT_X86_XSTATE, xfpregs, size);
9398}
9399
97753bd5
AM
9400char *
9401elfcore_write_ppc_vmx (bfd *abfd,
9402 char *buf,
9403 int *bufsiz,
9404 const void *ppc_vmx,
9405 int size)
9406{
9407 char *note_name = "LINUX";
9408 return elfcore_write_note (abfd, buf, bufsiz,
9409 note_name, NT_PPC_VMX, ppc_vmx, size);
9410}
9411
89eeb0bc
LM
9412char *
9413elfcore_write_ppc_vsx (bfd *abfd,
9414 char *buf,
9415 int *bufsiz,
9416 const void *ppc_vsx,
9417 int size)
9418{
9419 char *note_name = "LINUX";
9420 return elfcore_write_note (abfd, buf, bufsiz,
9421 note_name, NT_PPC_VSX, ppc_vsx, size);
9422}
9423
0675e188
UW
9424static char *
9425elfcore_write_s390_high_gprs (bfd *abfd,
9426 char *buf,
9427 int *bufsiz,
9428 const void *s390_high_gprs,
9429 int size)
9430{
9431 char *note_name = "LINUX";
9432 return elfcore_write_note (abfd, buf, bufsiz,
9433 note_name, NT_S390_HIGH_GPRS,
9434 s390_high_gprs, size);
9435}
9436
d7eeb400
MS
9437char *
9438elfcore_write_s390_timer (bfd *abfd,
9439 char *buf,
9440 int *bufsiz,
9441 const void *s390_timer,
9442 int size)
9443{
9444 char *note_name = "LINUX";
9445 return elfcore_write_note (abfd, buf, bufsiz,
9446 note_name, NT_S390_TIMER, s390_timer, size);
9447}
9448
9449char *
9450elfcore_write_s390_todcmp (bfd *abfd,
9451 char *buf,
9452 int *bufsiz,
9453 const void *s390_todcmp,
9454 int size)
9455{
9456 char *note_name = "LINUX";
9457 return elfcore_write_note (abfd, buf, bufsiz,
9458 note_name, NT_S390_TODCMP, s390_todcmp, size);
9459}
9460
9461char *
9462elfcore_write_s390_todpreg (bfd *abfd,
9463 char *buf,
9464 int *bufsiz,
9465 const void *s390_todpreg,
9466 int size)
9467{
9468 char *note_name = "LINUX";
9469 return elfcore_write_note (abfd, buf, bufsiz,
9470 note_name, NT_S390_TODPREG, s390_todpreg, size);
9471}
9472
9473char *
9474elfcore_write_s390_ctrs (bfd *abfd,
9475 char *buf,
9476 int *bufsiz,
9477 const void *s390_ctrs,
9478 int size)
9479{
9480 char *note_name = "LINUX";
9481 return elfcore_write_note (abfd, buf, bufsiz,
9482 note_name, NT_S390_CTRS, s390_ctrs, size);
9483}
9484
9485char *
9486elfcore_write_s390_prefix (bfd *abfd,
9487 char *buf,
9488 int *bufsiz,
9489 const void *s390_prefix,
9490 int size)
9491{
9492 char *note_name = "LINUX";
9493 return elfcore_write_note (abfd, buf, bufsiz,
9494 note_name, NT_S390_PREFIX, s390_prefix, size);
9495}
9496
355b81d9
UW
9497char *
9498elfcore_write_s390_last_break (bfd *abfd,
9499 char *buf,
9500 int *bufsiz,
9501 const void *s390_last_break,
9502 int size)
9503{
9504 char *note_name = "LINUX";
9505 return elfcore_write_note (abfd, buf, bufsiz,
9506 note_name, NT_S390_LAST_BREAK,
9507 s390_last_break, size);
9508}
9509
9510char *
9511elfcore_write_s390_system_call (bfd *abfd,
9512 char *buf,
9513 int *bufsiz,
9514 const void *s390_system_call,
9515 int size)
9516{
9517 char *note_name = "LINUX";
9518 return elfcore_write_note (abfd, buf, bufsiz,
9519 note_name, NT_S390_SYSTEM_CALL,
9520 s390_system_call, size);
9521}
9522
abb3f6cc
NC
9523char *
9524elfcore_write_s390_tdb (bfd *abfd,
9525 char *buf,
9526 int *bufsiz,
9527 const void *s390_tdb,
9528 int size)
9529{
9530 char *note_name = "LINUX";
9531 return elfcore_write_note (abfd, buf, bufsiz,
9532 note_name, NT_S390_TDB, s390_tdb, size);
9533}
9534
faa9a424
UW
9535char *
9536elfcore_write_arm_vfp (bfd *abfd,
9537 char *buf,
9538 int *bufsiz,
9539 const void *arm_vfp,
9540 int size)
9541{
9542 char *note_name = "LINUX";
9543 return elfcore_write_note (abfd, buf, bufsiz,
9544 note_name, NT_ARM_VFP, arm_vfp, size);
9545}
9546
652451f8
YZ
9547char *
9548elfcore_write_aarch_tls (bfd *abfd,
9549 char *buf,
9550 int *bufsiz,
9551 const void *aarch_tls,
9552 int size)
9553{
9554 char *note_name = "LINUX";
9555 return elfcore_write_note (abfd, buf, bufsiz,
9556 note_name, NT_ARM_TLS, aarch_tls, size);
9557}
9558
9559char *
9560elfcore_write_aarch_hw_break (bfd *abfd,
9561 char *buf,
9562 int *bufsiz,
9563 const void *aarch_hw_break,
9564 int size)
9565{
9566 char *note_name = "LINUX";
9567 return elfcore_write_note (abfd, buf, bufsiz,
9568 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
9569}
9570
9571char *
9572elfcore_write_aarch_hw_watch (bfd *abfd,
9573 char *buf,
9574 int *bufsiz,
9575 const void *aarch_hw_watch,
9576 int size)
9577{
9578 char *note_name = "LINUX";
9579 return elfcore_write_note (abfd, buf, bufsiz,
9580 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
9581}
9582
bb864ac1
CES
9583char *
9584elfcore_write_register_note (bfd *abfd,
9585 char *buf,
9586 int *bufsiz,
9587 const char *section,
9588 const void *data,
9589 int size)
9590{
9591 if (strcmp (section, ".reg2") == 0)
9592 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
9593 if (strcmp (section, ".reg-xfp") == 0)
9594 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
9595 if (strcmp (section, ".reg-xstate") == 0)
9596 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9597 if (strcmp (section, ".reg-ppc-vmx") == 0)
9598 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
9599 if (strcmp (section, ".reg-ppc-vsx") == 0)
9600 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
9601 if (strcmp (section, ".reg-s390-high-gprs") == 0)
9602 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
9603 if (strcmp (section, ".reg-s390-timer") == 0)
9604 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
9605 if (strcmp (section, ".reg-s390-todcmp") == 0)
9606 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
9607 if (strcmp (section, ".reg-s390-todpreg") == 0)
9608 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
9609 if (strcmp (section, ".reg-s390-ctrs") == 0)
9610 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
9611 if (strcmp (section, ".reg-s390-prefix") == 0)
9612 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
9613 if (strcmp (section, ".reg-s390-last-break") == 0)
9614 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
9615 if (strcmp (section, ".reg-s390-system-call") == 0)
9616 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
9617 if (strcmp (section, ".reg-s390-tdb") == 0)
9618 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
faa9a424
UW
9619 if (strcmp (section, ".reg-arm-vfp") == 0)
9620 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
9621 if (strcmp (section, ".reg-aarch-tls") == 0)
9622 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
9623 if (strcmp (section, ".reg-aarch-hw-break") == 0)
9624 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
9625 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
9626 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9627 return NULL;
9628}
9629
b34976b6 9630static bfd_boolean
718175fa 9631elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 9632{
c044fabd 9633 char *p;
252b5132 9634
252b5132
RH
9635 p = buf;
9636 while (p < buf + size)
9637 {
c044fabd
KH
9638 /* FIXME: bad alignment assumption. */
9639 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
9640 Elf_Internal_Note in;
9641
baea7ef1
AM
9642 if (offsetof (Elf_External_Note, name) > buf - p + size)
9643 return FALSE;
9644
dc810e39 9645 in.type = H_GET_32 (abfd, xnp->type);
252b5132 9646
dc810e39 9647 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 9648 in.namedata = xnp->name;
baea7ef1
AM
9649 if (in.namesz > buf - in.namedata + size)
9650 return FALSE;
252b5132 9651
dc810e39 9652 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
9653 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
9654 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
9655 if (in.descsz != 0
9656 && (in.descdata >= buf + size
9657 || in.descsz > buf - in.descdata + size))
9658 return FALSE;
252b5132 9659
718175fa
JK
9660 switch (bfd_get_format (abfd))
9661 {
9662 default:
9663 return TRUE;
9664
9665 case bfd_core:
9666 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
9667 {
9668 if (! elfcore_grok_netbsd_note (abfd, &in))
9669 return FALSE;
9670 }
67cc5033
MK
9671 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
9672 {
9673 if (! elfcore_grok_openbsd_note (abfd, &in))
9674 return FALSE;
9675 }
718175fa
JK
9676 else if (CONST_STRNEQ (in.namedata, "QNX"))
9677 {
9678 if (! elfcore_grok_nto_note (abfd, &in))
9679 return FALSE;
9680 }
b15fa79e
AM
9681 else if (CONST_STRNEQ (in.namedata, "SPU/"))
9682 {
9683 if (! elfcore_grok_spu_note (abfd, &in))
9684 return FALSE;
9685 }
718175fa
JK
9686 else
9687 {
9688 if (! elfcore_grok_note (abfd, &in))
9689 return FALSE;
9690 }
9691 break;
9692
9693 case bfd_object:
9694 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
9695 {
9696 if (! elfobj_grok_gnu_note (abfd, &in))
9697 return FALSE;
9698 }
e21e5835
NC
9699 else if (in.namesz == sizeof "stapsdt"
9700 && strcmp (in.namedata, "stapsdt") == 0)
9701 {
9702 if (! elfobj_grok_stapsdt_note (abfd, &in))
9703 return FALSE;
9704 }
718175fa 9705 break;
08a40648 9706 }
252b5132
RH
9707
9708 p = in.descdata + BFD_ALIGN (in.descsz, 4);
9709 }
9710
718175fa
JK
9711 return TRUE;
9712}
9713
9714static bfd_boolean
9715elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
9716{
9717 char *buf;
9718
9719 if (size <= 0)
9720 return TRUE;
9721
9722 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
9723 return FALSE;
9724
a50b1753 9725 buf = (char *) bfd_malloc (size);
718175fa
JK
9726 if (buf == NULL)
9727 return FALSE;
9728
9729 if (bfd_bread (buf, size, abfd) != size
9730 || !elf_parse_notes (abfd, buf, size, offset))
9731 {
9732 free (buf);
9733 return FALSE;
9734 }
9735
252b5132 9736 free (buf);
b34976b6 9737 return TRUE;
252b5132 9738}
98d8431c
JB
9739\f
9740/* Providing external access to the ELF program header table. */
9741
9742/* Return an upper bound on the number of bytes required to store a
9743 copy of ABFD's program header table entries. Return -1 if an error
9744 occurs; bfd_get_error will return an appropriate code. */
c044fabd 9745
98d8431c 9746long
217aa764 9747bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
9748{
9749 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9750 {
9751 bfd_set_error (bfd_error_wrong_format);
9752 return -1;
9753 }
9754
936e320b 9755 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
9756}
9757
98d8431c
JB
9758/* Copy ABFD's program header table entries to *PHDRS. The entries
9759 will be stored as an array of Elf_Internal_Phdr structures, as
9760 defined in include/elf/internal.h. To find out how large the
9761 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
9762
9763 Return the number of program header table entries read, or -1 if an
9764 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 9765
98d8431c 9766int
217aa764 9767bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
9768{
9769 int num_phdrs;
9770
9771 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9772 {
9773 bfd_set_error (bfd_error_wrong_format);
9774 return -1;
9775 }
9776
9777 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 9778 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
9779 num_phdrs * sizeof (Elf_Internal_Phdr));
9780
9781 return num_phdrs;
9782}
ae4221d7 9783
db6751f2 9784enum elf_reloc_type_class
7e612e98
AM
9785_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
9786 const asection *rel_sec ATTRIBUTE_UNUSED,
9787 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
9788{
9789 return reloc_class_normal;
9790}
f8df10f4 9791
47d9a591 9792/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
9793 relocation against a local symbol. */
9794
9795bfd_vma
217aa764
AM
9796_bfd_elf_rela_local_sym (bfd *abfd,
9797 Elf_Internal_Sym *sym,
8517fae7 9798 asection **psec,
217aa764 9799 Elf_Internal_Rela *rel)
f8df10f4 9800{
8517fae7 9801 asection *sec = *psec;
f8df10f4
JJ
9802 bfd_vma relocation;
9803
9804 relocation = (sec->output_section->vma
9805 + sec->output_offset
9806 + sym->st_value);
9807 if ((sec->flags & SEC_MERGE)
c629eae0 9808 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 9809 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 9810 {
f8df10f4 9811 rel->r_addend =
8517fae7 9812 _bfd_merged_section_offset (abfd, psec,
65765700 9813 elf_section_data (sec)->sec_info,
753731ee
AM
9814 sym->st_value + rel->r_addend);
9815 if (sec != *psec)
9816 {
9817 /* If we have changed the section, and our original section is
9818 marked with SEC_EXCLUDE, it means that the original
9819 SEC_MERGE section has been completely subsumed in some
9820 other SEC_MERGE section. In this case, we need to leave
9821 some info around for --emit-relocs. */
9822 if ((sec->flags & SEC_EXCLUDE) != 0)
9823 sec->kept_section = *psec;
9824 sec = *psec;
9825 }
8517fae7
AM
9826 rel->r_addend -= relocation;
9827 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
9828 }
9829 return relocation;
9830}
c629eae0
JJ
9831
9832bfd_vma
217aa764
AM
9833_bfd_elf_rel_local_sym (bfd *abfd,
9834 Elf_Internal_Sym *sym,
9835 asection **psec,
9836 bfd_vma addend)
47d9a591 9837{
c629eae0
JJ
9838 asection *sec = *psec;
9839
dbaa2011 9840 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
9841 return sym->st_value + addend;
9842
9843 return _bfd_merged_section_offset (abfd, psec,
65765700 9844 elf_section_data (sec)->sec_info,
753731ee 9845 sym->st_value + addend);
c629eae0
JJ
9846}
9847
9848bfd_vma
217aa764 9849_bfd_elf_section_offset (bfd *abfd,
92e4ec35 9850 struct bfd_link_info *info,
217aa764
AM
9851 asection *sec,
9852 bfd_vma offset)
c629eae0 9853{
68bfbfcc 9854 switch (sec->sec_info_type)
65765700 9855 {
dbaa2011 9856 case SEC_INFO_TYPE_STABS:
eea6121a
AM
9857 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
9858 offset);
dbaa2011 9859 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 9860 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700 9861 default:
310fd250
L
9862 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
9863 {
9864 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9865 bfd_size_type address_size = bed->s->arch_size / 8;
9866 offset = sec->size - offset - address_size;
9867 }
65765700
JJ
9868 return offset;
9869 }
c629eae0 9870}
3333a7c3
RM
9871\f
9872/* Create a new BFD as if by bfd_openr. Rather than opening a file,
9873 reconstruct an ELF file by reading the segments out of remote memory
9874 based on the ELF file header at EHDR_VMA and the ELF program headers it
9875 points to. If not null, *LOADBASEP is filled in with the difference
9876 between the VMAs from which the segments were read, and the VMAs the
9877 file headers (and hence BFD's idea of each section's VMA) put them at.
9878
9879 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
9880 remote memory at target address VMA into the local buffer at MYADDR; it
9881 should return zero on success or an `errno' code on failure. TEMPL must
9882 be a BFD for an ELF target with the word size and byte order found in
9883 the remote memory. */
9884
9885bfd *
217aa764
AM
9886bfd_elf_bfd_from_remote_memory
9887 (bfd *templ,
9888 bfd_vma ehdr_vma,
9889 bfd_vma *loadbasep,
fe78531d 9890 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
9891{
9892 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
9893 (templ, ehdr_vma, loadbasep, target_read_memory);
9894}
4c45e5c9
JJ
9895\f
9896long
c9727e01
AM
9897_bfd_elf_get_synthetic_symtab (bfd *abfd,
9898 long symcount ATTRIBUTE_UNUSED,
9899 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 9900 long dynsymcount,
c9727e01
AM
9901 asymbol **dynsyms,
9902 asymbol **ret)
4c45e5c9
JJ
9903{
9904 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9905 asection *relplt;
9906 asymbol *s;
9907 const char *relplt_name;
9908 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
9909 arelent *p;
9910 long count, i, n;
9911 size_t size;
9912 Elf_Internal_Shdr *hdr;
9913 char *names;
9914 asection *plt;
9915
8615f3f2
AM
9916 *ret = NULL;
9917
90e3cdf2
JJ
9918 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
9919 return 0;
9920
8615f3f2
AM
9921 if (dynsymcount <= 0)
9922 return 0;
9923
4c45e5c9
JJ
9924 if (!bed->plt_sym_val)
9925 return 0;
9926
9927 relplt_name = bed->relplt_name;
9928 if (relplt_name == NULL)
d35fd659 9929 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
9930 relplt = bfd_get_section_by_name (abfd, relplt_name);
9931 if (relplt == NULL)
9932 return 0;
9933
9934 hdr = &elf_section_data (relplt)->this_hdr;
9935 if (hdr->sh_link != elf_dynsymtab (abfd)
9936 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
9937 return 0;
9938
9939 plt = bfd_get_section_by_name (abfd, ".plt");
9940 if (plt == NULL)
9941 return 0;
9942
9943 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 9944 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
9945 return -1;
9946
eea6121a 9947 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
9948 size = count * sizeof (asymbol);
9949 p = relplt->relocation;
cb53bf42 9950 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
9951 {
9952 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
9953 if (p->addend != 0)
9954 {
9955#ifdef BFD64
9956 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
9957#else
9958 size += sizeof ("+0x") - 1 + 8;
9959#endif
9960 }
9961 }
4c45e5c9 9962
a50b1753 9963 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
9964 if (s == NULL)
9965 return -1;
9966
9967 names = (char *) (s + count);
9968 p = relplt->relocation;
9969 n = 0;
cb53bf42 9970 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
9971 {
9972 size_t len;
9973 bfd_vma addr;
9974
9975 addr = bed->plt_sym_val (i, plt, p);
9976 if (addr == (bfd_vma) -1)
9977 continue;
9978
9979 *s = **p->sym_ptr_ptr;
65a7a66f
AM
9980 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
9981 we are defining a symbol, ensure one of them is set. */
9982 if ((s->flags & BSF_LOCAL) == 0)
9983 s->flags |= BSF_GLOBAL;
6ba2a415 9984 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
9985 s->section = plt;
9986 s->value = addr - plt->vma;
9987 s->name = names;
8f39ba8e 9988 s->udata.p = NULL;
4c45e5c9
JJ
9989 len = strlen ((*p->sym_ptr_ptr)->name);
9990 memcpy (names, (*p->sym_ptr_ptr)->name, len);
9991 names += len;
041de40d
AM
9992 if (p->addend != 0)
9993 {
1d770845 9994 char buf[30], *a;
d324f6d6 9995
041de40d
AM
9996 memcpy (names, "+0x", sizeof ("+0x") - 1);
9997 names += sizeof ("+0x") - 1;
1d770845
L
9998 bfd_sprintf_vma (abfd, buf, p->addend);
9999 for (a = buf; *a == '0'; ++a)
10000 ;
10001 len = strlen (a);
10002 memcpy (names, a, len);
10003 names += len;
041de40d 10004 }
4c45e5c9
JJ
10005 memcpy (names, "@plt", sizeof ("@plt"));
10006 names += sizeof ("@plt");
8f39ba8e 10007 ++s, ++n;
4c45e5c9
JJ
10008 }
10009
10010 return n;
10011}
3d7f7666 10012
3b22753a
L
10013/* It is only used by x86-64 so far. */
10014asection _bfd_elf_large_com_section
10015 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 10016 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 10017
d1036acb
L
10018void
10019_bfd_elf_set_osabi (bfd * abfd,
10020 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
10021{
10022 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
10023
10024 i_ehdrp = elf_elfheader (abfd);
10025
10026 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
10027
10028 /* To make things simpler for the loader on Linux systems we set the
9c55345c 10029 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 10030 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 10031 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 10032 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 10033 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 10034}
fcb93ecf
PB
10035
10036
10037/* Return TRUE for ELF symbol types that represent functions.
10038 This is the default version of this function, which is sufficient for
d8045f23 10039 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
10040
10041bfd_boolean
10042_bfd_elf_is_function_type (unsigned int type)
10043{
d8045f23
NC
10044 return (type == STT_FUNC
10045 || type == STT_GNU_IFUNC);
fcb93ecf 10046}
9f296da3 10047
aef36ac1
AM
10048/* If the ELF symbol SYM might be a function in SEC, return the
10049 function size and set *CODE_OFF to the function's entry point,
10050 otherwise return zero. */
9f296da3 10051
aef36ac1
AM
10052bfd_size_type
10053_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
10054 bfd_vma *code_off)
9f296da3 10055{
aef36ac1
AM
10056 bfd_size_type size;
10057
ff9e0f5b 10058 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
10059 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
10060 || sym->section != sec)
10061 return 0;
ff9e0f5b 10062
ff9e0f5b 10063 *code_off = sym->value;
aef36ac1
AM
10064 size = 0;
10065 if (!(sym->flags & BSF_SYNTHETIC))
10066 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
10067 if (size == 0)
10068 size = 1;
10069 return size;
9f296da3 10070}
This page took 1.565995 seconds and 4 git commands to generate.