New gdbserver option --debug-format=timestamp.
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
dc9155b2 3 Copyright 1993-2014 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
70a38d42 45#include "elf-linux-psinfo.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
53static bfd_boolean prep_headers (bfd *);
54static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
a50b1753 300 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL
c6c60d09
JJ
301 || bfd_seek (abfd, offset, SEEK_SET) != 0)
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
307 shstrtab = NULL;
3471d59d
CC
308 /* Once we've failed to read it, make sure we don't keep
309 trying. Otherwise, we'll keep allocating space for
310 the string table over and over. */
311 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
312 }
313 else
314 shstrtab[shstrtabsize] = '\0';
217aa764 315 i_shdrp[shindex]->contents = shstrtab;
252b5132 316 }
f075ee0c 317 return (char *) shstrtab;
252b5132
RH
318}
319
320char *
217aa764
AM
321bfd_elf_string_from_elf_section (bfd *abfd,
322 unsigned int shindex,
323 unsigned int strindex)
252b5132
RH
324{
325 Elf_Internal_Shdr *hdr;
326
327 if (strindex == 0)
328 return "";
329
74f2e02b
AM
330 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
331 return NULL;
332
252b5132
RH
333 hdr = elf_elfsections (abfd)[shindex];
334
335 if (hdr->contents == NULL
336 && bfd_elf_get_str_section (abfd, shindex) == NULL)
337 return NULL;
338
339 if (strindex >= hdr->sh_size)
340 {
1b3a8575 341 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 342 (*_bfd_error_handler)
d003868e
AM
343 (_("%B: invalid string offset %u >= %lu for section `%s'"),
344 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 345 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 346 ? ".shstrtab"
1b3a8575 347 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 348 return NULL;
252b5132
RH
349 }
350
351 return ((char *) hdr->contents) + strindex;
352}
353
6cdc0ccc
AM
354/* Read and convert symbols to internal format.
355 SYMCOUNT specifies the number of symbols to read, starting from
356 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
357 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
358 symbols, and symbol section index extensions, respectively.
359 Returns a pointer to the internal symbol buffer (malloced if necessary)
360 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
361
362Elf_Internal_Sym *
217aa764
AM
363bfd_elf_get_elf_syms (bfd *ibfd,
364 Elf_Internal_Shdr *symtab_hdr,
365 size_t symcount,
366 size_t symoffset,
367 Elf_Internal_Sym *intsym_buf,
368 void *extsym_buf,
369 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
370{
371 Elf_Internal_Shdr *shndx_hdr;
217aa764 372 void *alloc_ext;
df622259 373 const bfd_byte *esym;
6cdc0ccc
AM
374 Elf_External_Sym_Shndx *alloc_extshndx;
375 Elf_External_Sym_Shndx *shndx;
4dd07732 376 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
377 Elf_Internal_Sym *isym;
378 Elf_Internal_Sym *isymend;
9c5bfbb7 379 const struct elf_backend_data *bed;
6cdc0ccc
AM
380 size_t extsym_size;
381 bfd_size_type amt;
382 file_ptr pos;
383
e44a2c9c
AM
384 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
385 abort ();
386
6cdc0ccc
AM
387 if (symcount == 0)
388 return intsym_buf;
389
390 /* Normal syms might have section extension entries. */
391 shndx_hdr = NULL;
392 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
393 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
394
395 /* Read the symbols. */
396 alloc_ext = NULL;
397 alloc_extshndx = NULL;
4dd07732 398 alloc_intsym = NULL;
6cdc0ccc
AM
399 bed = get_elf_backend_data (ibfd);
400 extsym_size = bed->s->sizeof_sym;
401 amt = symcount * extsym_size;
402 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
403 if (extsym_buf == NULL)
404 {
d0fb9a8d 405 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
406 extsym_buf = alloc_ext;
407 }
408 if (extsym_buf == NULL
409 || bfd_seek (ibfd, pos, SEEK_SET) != 0
410 || bfd_bread (extsym_buf, amt, ibfd) != amt)
411 {
412 intsym_buf = NULL;
413 goto out;
414 }
415
416 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
417 extshndx_buf = NULL;
418 else
419 {
420 amt = symcount * sizeof (Elf_External_Sym_Shndx);
421 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
422 if (extshndx_buf == NULL)
423 {
a50b1753
NC
424 alloc_extshndx = (Elf_External_Sym_Shndx *)
425 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
426 extshndx_buf = alloc_extshndx;
427 }
428 if (extshndx_buf == NULL
429 || bfd_seek (ibfd, pos, SEEK_SET) != 0
430 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
431 {
432 intsym_buf = NULL;
433 goto out;
434 }
435 }
436
437 if (intsym_buf == NULL)
438 {
a50b1753
NC
439 alloc_intsym = (Elf_Internal_Sym *)
440 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 441 intsym_buf = alloc_intsym;
6cdc0ccc
AM
442 if (intsym_buf == NULL)
443 goto out;
444 }
445
446 /* Convert the symbols to internal form. */
447 isymend = intsym_buf + symcount;
a50b1753
NC
448 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
449 shndx = extshndx_buf;
6cdc0ccc
AM
450 isym < isymend;
451 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
452 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
453 {
454 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
455 (*_bfd_error_handler) (_("%B symbol number %lu references "
456 "nonexistent SHT_SYMTAB_SHNDX section"),
457 ibfd, (unsigned long) symoffset);
4dd07732
AM
458 if (alloc_intsym != NULL)
459 free (alloc_intsym);
8384fb8f
AM
460 intsym_buf = NULL;
461 goto out;
462 }
6cdc0ccc
AM
463
464 out:
465 if (alloc_ext != NULL)
466 free (alloc_ext);
467 if (alloc_extshndx != NULL)
468 free (alloc_extshndx);
469
470 return intsym_buf;
471}
472
5cab59f6
AM
473/* Look up a symbol name. */
474const char *
be8dd2ca
AM
475bfd_elf_sym_name (bfd *abfd,
476 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
477 Elf_Internal_Sym *isym,
478 asection *sym_sec)
5cab59f6 479{
26c61ae5 480 const char *name;
5cab59f6 481 unsigned int iname = isym->st_name;
be8dd2ca 482 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 483
138f35cc
JJ
484 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
485 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 486 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
487 {
488 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
489 shindex = elf_elfheader (abfd)->e_shstrndx;
490 }
491
26c61ae5
L
492 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
493 if (name == NULL)
494 name = "(null)";
495 else if (sym_sec && *name == '\0')
496 name = bfd_section_name (abfd, sym_sec);
497
498 return name;
5cab59f6
AM
499}
500
dbb410c3
AM
501/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
502 sections. The first element is the flags, the rest are section
503 pointers. */
504
505typedef union elf_internal_group {
506 Elf_Internal_Shdr *shdr;
507 unsigned int flags;
508} Elf_Internal_Group;
509
b885599b
AM
510/* Return the name of the group signature symbol. Why isn't the
511 signature just a string? */
512
513static const char *
217aa764 514group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 515{
9dce4196 516 Elf_Internal_Shdr *hdr;
9dce4196
AM
517 unsigned char esym[sizeof (Elf64_External_Sym)];
518 Elf_External_Sym_Shndx eshndx;
519 Elf_Internal_Sym isym;
b885599b 520
13792e9d
L
521 /* First we need to ensure the symbol table is available. Make sure
522 that it is a symbol table section. */
4fbb74a6
AM
523 if (ghdr->sh_link >= elf_numsections (abfd))
524 return NULL;
13792e9d
L
525 hdr = elf_elfsections (abfd) [ghdr->sh_link];
526 if (hdr->sh_type != SHT_SYMTAB
527 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
528 return NULL;
529
9dce4196
AM
530 /* Go read the symbol. */
531 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
532 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
533 &isym, esym, &eshndx) == NULL)
b885599b 534 return NULL;
9dce4196 535
26c61ae5 536 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
537}
538
dbb410c3
AM
539/* Set next_in_group list pointer, and group name for NEWSECT. */
540
b34976b6 541static bfd_boolean
217aa764 542setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
543{
544 unsigned int num_group = elf_tdata (abfd)->num_group;
545
546 /* If num_group is zero, read in all SHT_GROUP sections. The count
547 is set to -1 if there are no SHT_GROUP sections. */
548 if (num_group == 0)
549 {
550 unsigned int i, shnum;
551
552 /* First count the number of groups. If we have a SHT_GROUP
553 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 554 shnum = elf_numsections (abfd);
dbb410c3 555 num_group = 0;
08a40648 556
44534af3 557#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 558 ( (shdr)->sh_type == SHT_GROUP \
44534af3 559 && (shdr)->sh_size >= minsize \
1783205a
NC
560 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
561 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 562
dbb410c3
AM
563 for (i = 0; i < shnum; i++)
564 {
565 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 566
44534af3 567 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
568 num_group += 1;
569 }
570
571 if (num_group == 0)
20dbb49d
L
572 {
573 num_group = (unsigned) -1;
574 elf_tdata (abfd)->num_group = num_group;
575 }
576 else
dbb410c3
AM
577 {
578 /* We keep a list of elf section headers for group sections,
579 so we can find them quickly. */
20dbb49d 580 bfd_size_type amt;
d0fb9a8d 581
20dbb49d 582 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
583 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
584 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 585 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 586 return FALSE;
dbb410c3
AM
587
588 num_group = 0;
589 for (i = 0; i < shnum; i++)
590 {
591 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 592
44534af3 593 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 594 {
973ffd63 595 unsigned char *src;
dbb410c3
AM
596 Elf_Internal_Group *dest;
597
598 /* Add to list of sections. */
599 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
600 num_group += 1;
601
602 /* Read the raw contents. */
603 BFD_ASSERT (sizeof (*dest) >= 4);
604 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
605 shdr->contents = (unsigned char *)
606 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
607 /* PR binutils/4110: Handle corrupt group headers. */
608 if (shdr->contents == NULL)
609 {
610 _bfd_error_handler
611 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
612 bfd_set_error (bfd_error_bad_value);
613 return FALSE;
614 }
615
616 memset (shdr->contents, 0, amt);
617
618 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
619 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
620 != shdr->sh_size))
b34976b6 621 return FALSE;
dbb410c3
AM
622
623 /* Translate raw contents, a flag word followed by an
624 array of elf section indices all in target byte order,
625 to the flag word followed by an array of elf section
626 pointers. */
627 src = shdr->contents + shdr->sh_size;
628 dest = (Elf_Internal_Group *) (shdr->contents + amt);
629 while (1)
630 {
631 unsigned int idx;
632
633 src -= 4;
634 --dest;
635 idx = H_GET_32 (abfd, src);
636 if (src == shdr->contents)
637 {
638 dest->flags = idx;
b885599b
AM
639 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
640 shdr->bfd_section->flags
641 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
642 break;
643 }
644 if (idx >= shnum)
645 {
646 ((*_bfd_error_handler)
d003868e 647 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
648 idx = 0;
649 }
650 dest->shdr = elf_elfsections (abfd)[idx];
651 }
652 }
653 }
654 }
655 }
656
657 if (num_group != (unsigned) -1)
658 {
659 unsigned int i;
660
661 for (i = 0; i < num_group; i++)
662 {
663 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
664 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
665 unsigned int n_elt = shdr->sh_size / 4;
666
667 /* Look through this group's sections to see if current
668 section is a member. */
669 while (--n_elt != 0)
670 if ((++idx)->shdr == hdr)
671 {
e0e8c97f 672 asection *s = NULL;
dbb410c3
AM
673
674 /* We are a member of this group. Go looking through
675 other members to see if any others are linked via
676 next_in_group. */
677 idx = (Elf_Internal_Group *) shdr->contents;
678 n_elt = shdr->sh_size / 4;
679 while (--n_elt != 0)
680 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 681 && elf_next_in_group (s) != NULL)
dbb410c3
AM
682 break;
683 if (n_elt != 0)
684 {
dbb410c3
AM
685 /* Snarf the group name from other member, and
686 insert current section in circular list. */
945906ff
AM
687 elf_group_name (newsect) = elf_group_name (s);
688 elf_next_in_group (newsect) = elf_next_in_group (s);
689 elf_next_in_group (s) = newsect;
dbb410c3
AM
690 }
691 else
692 {
dbb410c3
AM
693 const char *gname;
694
b885599b
AM
695 gname = group_signature (abfd, shdr);
696 if (gname == NULL)
b34976b6 697 return FALSE;
945906ff 698 elf_group_name (newsect) = gname;
dbb410c3
AM
699
700 /* Start a circular list with one element. */
945906ff 701 elf_next_in_group (newsect) = newsect;
dbb410c3 702 }
b885599b 703
9dce4196
AM
704 /* If the group section has been created, point to the
705 new member. */
dbb410c3 706 if (shdr->bfd_section != NULL)
945906ff 707 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 708
dbb410c3
AM
709 i = num_group - 1;
710 break;
711 }
712 }
713 }
714
945906ff 715 if (elf_group_name (newsect) == NULL)
dbb410c3 716 {
d003868e
AM
717 (*_bfd_error_handler) (_("%B: no group info for section %A"),
718 abfd, newsect);
dbb410c3 719 }
b34976b6 720 return TRUE;
dbb410c3
AM
721}
722
3d7f7666 723bfd_boolean
dd863624 724_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
725{
726 unsigned int i;
727 unsigned int num_group = elf_tdata (abfd)->num_group;
728 bfd_boolean result = TRUE;
dd863624
L
729 asection *s;
730
731 /* Process SHF_LINK_ORDER. */
732 for (s = abfd->sections; s != NULL; s = s->next)
733 {
734 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
735 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
736 {
737 unsigned int elfsec = this_hdr->sh_link;
738 /* FIXME: The old Intel compiler and old strip/objcopy may
739 not set the sh_link or sh_info fields. Hence we could
740 get the situation where elfsec is 0. */
741 if (elfsec == 0)
742 {
4fbb74a6 743 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
744 if (bed->link_order_error_handler)
745 bed->link_order_error_handler
746 (_("%B: warning: sh_link not set for section `%A'"),
747 abfd, s);
748 }
749 else
750 {
91d6fa6a 751 asection *linksec = NULL;
25bbc984 752
4fbb74a6
AM
753 if (elfsec < elf_numsections (abfd))
754 {
755 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 756 linksec = this_hdr->bfd_section;
4fbb74a6 757 }
25bbc984
L
758
759 /* PR 1991, 2008:
760 Some strip/objcopy may leave an incorrect value in
761 sh_link. We don't want to proceed. */
91d6fa6a 762 if (linksec == NULL)
25bbc984
L
763 {
764 (*_bfd_error_handler)
765 (_("%B: sh_link [%d] in section `%A' is incorrect"),
766 s->owner, s, elfsec);
767 result = FALSE;
768 }
769
91d6fa6a 770 elf_linked_to_section (s) = linksec;
dd863624
L
771 }
772 }
773 }
3d7f7666 774
dd863624 775 /* Process section groups. */
3d7f7666
L
776 if (num_group == (unsigned) -1)
777 return result;
778
779 for (i = 0; i < num_group; i++)
780 {
781 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
782 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
783 unsigned int n_elt = shdr->sh_size / 4;
784
785 while (--n_elt != 0)
786 if ((++idx)->shdr->bfd_section)
787 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
788 else if (idx->shdr->sh_type == SHT_RELA
789 || idx->shdr->sh_type == SHT_REL)
790 /* We won't include relocation sections in section groups in
791 output object files. We adjust the group section size here
792 so that relocatable link will work correctly when
793 relocation sections are in section group in input object
794 files. */
795 shdr->bfd_section->size -= 4;
796 else
797 {
798 /* There are some unknown sections in the group. */
799 (*_bfd_error_handler)
d003868e
AM
800 (_("%B: unknown [%d] section `%s' in group [%s]"),
801 abfd,
3d7f7666 802 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
803 bfd_elf_string_from_elf_section (abfd,
804 (elf_elfheader (abfd)
805 ->e_shstrndx),
806 idx->shdr->sh_name),
3d7f7666
L
807 shdr->bfd_section->name);
808 result = FALSE;
809 }
810 }
811 return result;
812}
813
72adc230
AM
814bfd_boolean
815bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
816{
817 return elf_next_in_group (sec) != NULL;
818}
819
252b5132
RH
820/* Make a BFD section from an ELF section. We store a pointer to the
821 BFD section in the bfd_section field of the header. */
822
b34976b6 823bfd_boolean
217aa764
AM
824_bfd_elf_make_section_from_shdr (bfd *abfd,
825 Elf_Internal_Shdr *hdr,
6dc132d9
L
826 const char *name,
827 int shindex)
252b5132
RH
828{
829 asection *newsect;
830 flagword flags;
9c5bfbb7 831 const struct elf_backend_data *bed;
252b5132
RH
832
833 if (hdr->bfd_section != NULL)
4e011fb5 834 return TRUE;
252b5132
RH
835
836 newsect = bfd_make_section_anyway (abfd, name);
837 if (newsect == NULL)
b34976b6 838 return FALSE;
252b5132 839
1829f4b2
AM
840 hdr->bfd_section = newsect;
841 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 842 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 843
2f89ff8d
L
844 /* Always use the real type/flags. */
845 elf_section_type (newsect) = hdr->sh_type;
846 elf_section_flags (newsect) = hdr->sh_flags;
847
252b5132
RH
848 newsect->filepos = hdr->sh_offset;
849
850 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
851 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
852 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 853 bfd_log2 (hdr->sh_addralign)))
b34976b6 854 return FALSE;
252b5132
RH
855
856 flags = SEC_NO_FLAGS;
857 if (hdr->sh_type != SHT_NOBITS)
858 flags |= SEC_HAS_CONTENTS;
dbb410c3 859 if (hdr->sh_type == SHT_GROUP)
b3096250 860 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
861 if ((hdr->sh_flags & SHF_ALLOC) != 0)
862 {
863 flags |= SEC_ALLOC;
864 if (hdr->sh_type != SHT_NOBITS)
865 flags |= SEC_LOAD;
866 }
867 if ((hdr->sh_flags & SHF_WRITE) == 0)
868 flags |= SEC_READONLY;
869 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
870 flags |= SEC_CODE;
871 else if ((flags & SEC_LOAD) != 0)
872 flags |= SEC_DATA;
f5fa8ca2
JJ
873 if ((hdr->sh_flags & SHF_MERGE) != 0)
874 {
875 flags |= SEC_MERGE;
876 newsect->entsize = hdr->sh_entsize;
877 if ((hdr->sh_flags & SHF_STRINGS) != 0)
878 flags |= SEC_STRINGS;
879 }
dbb410c3
AM
880 if (hdr->sh_flags & SHF_GROUP)
881 if (!setup_group (abfd, hdr, newsect))
b34976b6 882 return FALSE;
13ae64f3
JJ
883 if ((hdr->sh_flags & SHF_TLS) != 0)
884 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
885 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
886 flags |= SEC_EXCLUDE;
252b5132 887
3d2b39cf 888 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 889 {
3d2b39cf
L
890 /* The debugging sections appear to be recognized only by name,
891 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
892 if (name [0] == '.')
893 {
f073ced3
AM
894 const char *p;
895 int n;
896 if (name[1] == 'd')
897 p = ".debug", n = 6;
898 else if (name[1] == 'g' && name[2] == 'n')
899 p = ".gnu.linkonce.wi.", n = 17;
900 else if (name[1] == 'g' && name[2] == 'd')
901 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
902 else if (name[1] == 'l')
903 p = ".line", n = 5;
904 else if (name[1] == 's')
905 p = ".stab", n = 5;
906 else if (name[1] == 'z')
907 p = ".zdebug", n = 7;
908 else
909 p = NULL, n = 0;
910 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
911 flags |= SEC_DEBUGGING;
912 }
913 }
252b5132
RH
914
915 /* As a GNU extension, if the name begins with .gnu.linkonce, we
916 only link a single copy of the section. This is used to support
917 g++. g++ will emit each template expansion in its own section.
918 The symbols will be defined as weak, so that multiple definitions
919 are permitted. The GNU linker extension is to actually discard
920 all but one of the sections. */
0112cd26 921 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 922 && elf_next_in_group (newsect) == NULL)
252b5132
RH
923 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
924
fa152c49
JW
925 bed = get_elf_backend_data (abfd);
926 if (bed->elf_backend_section_flags)
927 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 928 return FALSE;
fa152c49 929
252b5132 930 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 931 return FALSE;
252b5132 932
718175fa
JK
933 /* We do not parse the PT_NOTE segments as we are interested even in the
934 separate debug info files which may have the segments offsets corrupted.
935 PT_NOTEs from the core files are currently not parsed using BFD. */
936 if (hdr->sh_type == SHT_NOTE)
937 {
baea7ef1 938 bfd_byte *contents;
718175fa 939
baea7ef1 940 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
941 return FALSE;
942
baea7ef1 943 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
944 free (contents);
945 }
946
252b5132
RH
947 if ((flags & SEC_ALLOC) != 0)
948 {
949 Elf_Internal_Phdr *phdr;
6ffd7900
AM
950 unsigned int i, nload;
951
952 /* Some ELF linkers produce binaries with all the program header
953 p_paddr fields zero. If we have such a binary with more than
954 one PT_LOAD header, then leave the section lma equal to vma
955 so that we don't create sections with overlapping lma. */
956 phdr = elf_tdata (abfd)->phdr;
957 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
958 if (phdr->p_paddr != 0)
959 break;
960 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
961 ++nload;
962 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
963 return TRUE;
252b5132 964
252b5132
RH
965 phdr = elf_tdata (abfd)->phdr;
966 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
967 {
86b2281f
AM
968 if (((phdr->p_type == PT_LOAD
969 && (hdr->sh_flags & SHF_TLS) == 0)
970 || phdr->p_type == PT_TLS)
9a83a553 971 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 972 {
88967714
AM
973 if ((flags & SEC_LOAD) == 0)
974 newsect->lma = (phdr->p_paddr
975 + hdr->sh_addr - phdr->p_vaddr);
976 else
977 /* We used to use the same adjustment for SEC_LOAD
978 sections, but that doesn't work if the segment
979 is packed with code from multiple VMAs.
980 Instead we calculate the section LMA based on
981 the segment LMA. It is assumed that the
982 segment will contain sections with contiguous
983 LMAs, even if the VMAs are not. */
984 newsect->lma = (phdr->p_paddr
985 + hdr->sh_offset - phdr->p_offset);
986
987 /* With contiguous segments, we can't tell from file
988 offsets whether a section with zero size should
989 be placed at the end of one segment or the
990 beginning of the next. Decide based on vaddr. */
991 if (hdr->sh_addr >= phdr->p_vaddr
992 && (hdr->sh_addr + hdr->sh_size
993 <= phdr->p_vaddr + phdr->p_memsz))
994 break;
252b5132
RH
995 }
996 }
997 }
998
4a114e3e
L
999 /* Compress/decompress DWARF debug sections with names: .debug_* and
1000 .zdebug_*, after the section flags is set. */
1001 if ((flags & SEC_DEBUGGING)
1002 && ((name[1] == 'd' && name[6] == '_')
1003 || (name[1] == 'z' && name[7] == '_')))
1004 {
1005 enum { nothing, compress, decompress } action = nothing;
4e011fb5 1006 char *new_name;
4a114e3e
L
1007
1008 if (bfd_is_section_compressed (abfd, newsect))
1009 {
1010 /* Compressed section. Check if we should decompress. */
1011 if ((abfd->flags & BFD_DECOMPRESS))
1012 action = decompress;
1013 }
1014 else
1015 {
1016 /* Normal section. Check if we should compress. */
5a5ed5b0 1017 if ((abfd->flags & BFD_COMPRESS) && newsect->size != 0)
4a114e3e
L
1018 action = compress;
1019 }
1020
4e011fb5 1021 new_name = NULL;
4a114e3e
L
1022 switch (action)
1023 {
1024 case nothing:
1025 break;
1026 case compress:
1027 if (!bfd_init_section_compress_status (abfd, newsect))
1028 {
1029 (*_bfd_error_handler)
bc823199 1030 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1031 abfd, name);
1032 return FALSE;
1033 }
4e011fb5
AM
1034 if (name[1] != 'z')
1035 {
1036 unsigned int len = strlen (name);
1037
1038 new_name = bfd_alloc (abfd, len + 2);
1039 if (new_name == NULL)
1040 return FALSE;
1041 new_name[0] = '.';
1042 new_name[1] = 'z';
1043 memcpy (new_name + 2, name + 1, len);
1044 }
4a114e3e
L
1045 break;
1046 case decompress:
1047 if (!bfd_init_section_decompress_status (abfd, newsect))
1048 {
1049 (*_bfd_error_handler)
bc823199 1050 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1051 abfd, name);
1052 return FALSE;
1053 }
4e011fb5
AM
1054 if (name[1] == 'z')
1055 {
1056 unsigned int len = strlen (name);
1057
1058 new_name = bfd_alloc (abfd, len);
1059 if (new_name == NULL)
1060 return FALSE;
1061 new_name[0] = '.';
1062 memcpy (new_name + 1, name + 2, len - 1);
1063 }
4a114e3e
L
1064 break;
1065 }
4e011fb5
AM
1066 if (new_name != NULL)
1067 bfd_rename_section (abfd, newsect, new_name);
4a114e3e
L
1068 }
1069
b34976b6 1070 return TRUE;
252b5132
RH
1071}
1072
252b5132
RH
1073const char *const bfd_elf_section_type_names[] = {
1074 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1075 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1076 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1077};
1078
1049f94e 1079/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1080 output, and the reloc is against an external symbol, and nothing
1081 has given us any additional addend, the resulting reloc will also
1082 be against the same symbol. In such a case, we don't want to
1083 change anything about the way the reloc is handled, since it will
1084 all be done at final link time. Rather than put special case code
1085 into bfd_perform_relocation, all the reloc types use this howto
1086 function. It just short circuits the reloc if producing
1049f94e 1087 relocatable output against an external symbol. */
252b5132 1088
252b5132 1089bfd_reloc_status_type
217aa764
AM
1090bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1091 arelent *reloc_entry,
1092 asymbol *symbol,
1093 void *data ATTRIBUTE_UNUSED,
1094 asection *input_section,
1095 bfd *output_bfd,
1096 char **error_message ATTRIBUTE_UNUSED)
1097{
1098 if (output_bfd != NULL
252b5132
RH
1099 && (symbol->flags & BSF_SECTION_SYM) == 0
1100 && (! reloc_entry->howto->partial_inplace
1101 || reloc_entry->addend == 0))
1102 {
1103 reloc_entry->address += input_section->output_offset;
1104 return bfd_reloc_ok;
1105 }
1106
1107 return bfd_reloc_continue;
1108}
1109\f
0ac4564e
L
1110/* Copy the program header and other data from one object module to
1111 another. */
252b5132 1112
b34976b6 1113bfd_boolean
217aa764 1114_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1115{
1116 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1117 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1118 return TRUE;
2d502050 1119
57b828ef
L
1120 if (!elf_flags_init (obfd))
1121 {
1122 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1123 elf_flags_init (obfd) = TRUE;
1124 }
2d502050 1125
0ac4564e 1126 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1127
1128 /* Also copy the EI_OSABI field. */
1129 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1130 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1
JM
1131
1132 /* Copy object attributes. */
1133 _bfd_elf_copy_obj_attributes (ibfd, obfd);
b34976b6 1134 return TRUE;
2d502050
L
1135}
1136
cedc298e
L
1137static const char *
1138get_segment_type (unsigned int p_type)
1139{
1140 const char *pt;
1141 switch (p_type)
1142 {
1143 case PT_NULL: pt = "NULL"; break;
1144 case PT_LOAD: pt = "LOAD"; break;
1145 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1146 case PT_INTERP: pt = "INTERP"; break;
1147 case PT_NOTE: pt = "NOTE"; break;
1148 case PT_SHLIB: pt = "SHLIB"; break;
1149 case PT_PHDR: pt = "PHDR"; break;
1150 case PT_TLS: pt = "TLS"; break;
1151 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1152 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1153 case PT_GNU_RELRO: pt = "RELRO"; break;
1154 default: pt = NULL; break;
1155 }
1156 return pt;
1157}
1158
f0b79d91
L
1159/* Print out the program headers. */
1160
b34976b6 1161bfd_boolean
217aa764 1162_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1163{
a50b1753 1164 FILE *f = (FILE *) farg;
252b5132
RH
1165 Elf_Internal_Phdr *p;
1166 asection *s;
1167 bfd_byte *dynbuf = NULL;
1168
1169 p = elf_tdata (abfd)->phdr;
1170 if (p != NULL)
1171 {
1172 unsigned int i, c;
1173
1174 fprintf (f, _("\nProgram Header:\n"));
1175 c = elf_elfheader (abfd)->e_phnum;
1176 for (i = 0; i < c; i++, p++)
1177 {
cedc298e 1178 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1179 char buf[20];
1180
cedc298e 1181 if (pt == NULL)
252b5132 1182 {
cedc298e
L
1183 sprintf (buf, "0x%lx", p->p_type);
1184 pt = buf;
252b5132 1185 }
dc810e39 1186 fprintf (f, "%8s off 0x", pt);
60b89a18 1187 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1188 fprintf (f, " vaddr 0x");
60b89a18 1189 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1190 fprintf (f, " paddr 0x");
60b89a18 1191 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1192 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1193 fprintf (f, " filesz 0x");
60b89a18 1194 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1195 fprintf (f, " memsz 0x");
60b89a18 1196 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1197 fprintf (f, " flags %c%c%c",
1198 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1199 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1200 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1201 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1202 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1203 fprintf (f, "\n");
1204 }
1205 }
1206
1207 s = bfd_get_section_by_name (abfd, ".dynamic");
1208 if (s != NULL)
1209 {
cb33740c 1210 unsigned int elfsec;
dc810e39 1211 unsigned long shlink;
252b5132
RH
1212 bfd_byte *extdyn, *extdynend;
1213 size_t extdynsize;
217aa764 1214 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1215
1216 fprintf (f, _("\nDynamic Section:\n"));
1217
eea6121a 1218 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1219 goto error_return;
1220
1221 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1222 if (elfsec == SHN_BAD)
252b5132 1223 goto error_return;
dc810e39 1224 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1225
1226 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1227 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1228
1229 extdyn = dynbuf;
eea6121a 1230 extdynend = extdyn + s->size;
252b5132
RH
1231 for (; extdyn < extdynend; extdyn += extdynsize)
1232 {
1233 Elf_Internal_Dyn dyn;
ad9563d6 1234 const char *name = "";
252b5132 1235 char ab[20];
b34976b6 1236 bfd_boolean stringp;
ad9563d6 1237 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1238
217aa764 1239 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1240
1241 if (dyn.d_tag == DT_NULL)
1242 break;
1243
b34976b6 1244 stringp = FALSE;
252b5132
RH
1245 switch (dyn.d_tag)
1246 {
1247 default:
ad9563d6
CM
1248 if (bed->elf_backend_get_target_dtag)
1249 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1250
1251 if (!strcmp (name, ""))
1252 {
1253 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1254 name = ab;
1255 }
252b5132
RH
1256 break;
1257
b34976b6 1258 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1259 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1260 case DT_PLTGOT: name = "PLTGOT"; break;
1261 case DT_HASH: name = "HASH"; break;
1262 case DT_STRTAB: name = "STRTAB"; break;
1263 case DT_SYMTAB: name = "SYMTAB"; break;
1264 case DT_RELA: name = "RELA"; break;
1265 case DT_RELASZ: name = "RELASZ"; break;
1266 case DT_RELAENT: name = "RELAENT"; break;
1267 case DT_STRSZ: name = "STRSZ"; break;
1268 case DT_SYMENT: name = "SYMENT"; break;
1269 case DT_INIT: name = "INIT"; break;
1270 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1271 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1272 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1273 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1274 case DT_REL: name = "REL"; break;
1275 case DT_RELSZ: name = "RELSZ"; break;
1276 case DT_RELENT: name = "RELENT"; break;
1277 case DT_PLTREL: name = "PLTREL"; break;
1278 case DT_DEBUG: name = "DEBUG"; break;
1279 case DT_TEXTREL: name = "TEXTREL"; break;
1280 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1281 case DT_BIND_NOW: name = "BIND_NOW"; break;
1282 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1283 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1284 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1285 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1286 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1287 case DT_FLAGS: name = "FLAGS"; break;
1288 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1289 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1290 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1291 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1292 case DT_MOVEENT: name = "MOVEENT"; break;
1293 case DT_MOVESZ: name = "MOVESZ"; break;
1294 case DT_FEATURE: name = "FEATURE"; break;
1295 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1296 case DT_SYMINSZ: name = "SYMINSZ"; break;
1297 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1298 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1299 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1300 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1301 case DT_PLTPAD: name = "PLTPAD"; break;
1302 case DT_MOVETAB: name = "MOVETAB"; break;
1303 case DT_SYMINFO: name = "SYMINFO"; break;
1304 case DT_RELACOUNT: name = "RELACOUNT"; break;
1305 case DT_RELCOUNT: name = "RELCOUNT"; break;
1306 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1307 case DT_VERSYM: name = "VERSYM"; break;
1308 case DT_VERDEF: name = "VERDEF"; break;
1309 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1310 case DT_VERNEED: name = "VERNEED"; break;
1311 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1312 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1313 case DT_USED: name = "USED"; break;
b34976b6 1314 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1315 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1316 }
1317
ad9563d6 1318 fprintf (f, " %-20s ", name);
252b5132 1319 if (! stringp)
a1f3c56e
AN
1320 {
1321 fprintf (f, "0x");
1322 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1323 }
252b5132
RH
1324 else
1325 {
1326 const char *string;
dc810e39 1327 unsigned int tagv = dyn.d_un.d_val;
252b5132 1328
dc810e39 1329 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1330 if (string == NULL)
1331 goto error_return;
1332 fprintf (f, "%s", string);
1333 }
1334 fprintf (f, "\n");
1335 }
1336
1337 free (dynbuf);
1338 dynbuf = NULL;
1339 }
1340
1341 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1342 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1343 {
fc0e6df6 1344 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1345 return FALSE;
252b5132
RH
1346 }
1347
1348 if (elf_dynverdef (abfd) != 0)
1349 {
1350 Elf_Internal_Verdef *t;
1351
1352 fprintf (f, _("\nVersion definitions:\n"));
1353 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1354 {
1355 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1356 t->vd_flags, t->vd_hash,
1357 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1358 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1359 {
1360 Elf_Internal_Verdaux *a;
1361
1362 fprintf (f, "\t");
1363 for (a = t->vd_auxptr->vda_nextptr;
1364 a != NULL;
1365 a = a->vda_nextptr)
d0fb9a8d
JJ
1366 fprintf (f, "%s ",
1367 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1368 fprintf (f, "\n");
1369 }
1370 }
1371 }
1372
1373 if (elf_dynverref (abfd) != 0)
1374 {
1375 Elf_Internal_Verneed *t;
1376
1377 fprintf (f, _("\nVersion References:\n"));
1378 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1379 {
1380 Elf_Internal_Vernaux *a;
1381
d0fb9a8d
JJ
1382 fprintf (f, _(" required from %s:\n"),
1383 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1384 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1385 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1386 a->vna_flags, a->vna_other,
1387 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1388 }
1389 }
1390
b34976b6 1391 return TRUE;
252b5132
RH
1392
1393 error_return:
1394 if (dynbuf != NULL)
1395 free (dynbuf);
b34976b6 1396 return FALSE;
252b5132
RH
1397}
1398
1399/* Display ELF-specific fields of a symbol. */
1400
1401void
217aa764
AM
1402bfd_elf_print_symbol (bfd *abfd,
1403 void *filep,
1404 asymbol *symbol,
1405 bfd_print_symbol_type how)
252b5132 1406{
a50b1753 1407 FILE *file = (FILE *) filep;
252b5132
RH
1408 switch (how)
1409 {
1410 case bfd_print_symbol_name:
1411 fprintf (file, "%s", symbol->name);
1412 break;
1413 case bfd_print_symbol_more:
1414 fprintf (file, "elf ");
60b89a18 1415 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1416 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1417 break;
1418 case bfd_print_symbol_all:
1419 {
4e8a9624
AM
1420 const char *section_name;
1421 const char *name = NULL;
9c5bfbb7 1422 const struct elf_backend_data *bed;
7a13edea 1423 unsigned char st_other;
dbb410c3 1424 bfd_vma val;
c044fabd 1425
252b5132 1426 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1427
1428 bed = get_elf_backend_data (abfd);
1429 if (bed->elf_backend_print_symbol_all)
c044fabd 1430 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1431
1432 if (name == NULL)
1433 {
7ee38065 1434 name = symbol->name;
217aa764 1435 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1436 }
1437
252b5132
RH
1438 fprintf (file, " %s\t", section_name);
1439 /* Print the "other" value for a symbol. For common symbols,
1440 we've already printed the size; now print the alignment.
1441 For other symbols, we have no specified alignment, and
1442 we've printed the address; now print the size. */
dcf6c779 1443 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1444 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1445 else
1446 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1447 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1448
1449 /* If we have version information, print it. */
12bd6957
AM
1450 if (elf_dynversym (abfd) != 0
1451 && (elf_dynverdef (abfd) != 0
1452 || elf_dynverref (abfd) != 0))
252b5132
RH
1453 {
1454 unsigned int vernum;
1455 const char *version_string;
1456
1457 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1458
1459 if (vernum == 0)
1460 version_string = "";
1461 else if (vernum == 1)
1462 version_string = "Base";
1463 else if (vernum <= elf_tdata (abfd)->cverdefs)
1464 version_string =
1465 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1466 else
1467 {
1468 Elf_Internal_Verneed *t;
1469
1470 version_string = "";
1471 for (t = elf_tdata (abfd)->verref;
1472 t != NULL;
1473 t = t->vn_nextref)
1474 {
1475 Elf_Internal_Vernaux *a;
1476
1477 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1478 {
1479 if (a->vna_other == vernum)
1480 {
1481 version_string = a->vna_nodename;
1482 break;
1483 }
1484 }
1485 }
1486 }
1487
1488 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1489 fprintf (file, " %-11s", version_string);
1490 else
1491 {
1492 int i;
1493
1494 fprintf (file, " (%s)", version_string);
1495 for (i = 10 - strlen (version_string); i > 0; --i)
1496 putc (' ', file);
1497 }
1498 }
1499
1500 /* If the st_other field is not zero, print it. */
7a13edea 1501 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1502
7a13edea
NC
1503 switch (st_other)
1504 {
1505 case 0: break;
1506 case STV_INTERNAL: fprintf (file, " .internal"); break;
1507 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1508 case STV_PROTECTED: fprintf (file, " .protected"); break;
1509 default:
1510 /* Some other non-defined flags are also present, so print
1511 everything hex. */
1512 fprintf (file, " 0x%02x", (unsigned int) st_other);
1513 }
252b5132 1514
587ff49e 1515 fprintf (file, " %s", name);
252b5132
RH
1516 }
1517 break;
1518 }
1519}
252b5132 1520
252b5132
RH
1521/* Allocate an ELF string table--force the first byte to be zero. */
1522
1523struct bfd_strtab_hash *
217aa764 1524_bfd_elf_stringtab_init (void)
252b5132
RH
1525{
1526 struct bfd_strtab_hash *ret;
1527
1528 ret = _bfd_stringtab_init ();
1529 if (ret != NULL)
1530 {
1531 bfd_size_type loc;
1532
b34976b6 1533 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1534 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1535 if (loc == (bfd_size_type) -1)
1536 {
1537 _bfd_stringtab_free (ret);
1538 ret = NULL;
1539 }
1540 }
1541 return ret;
1542}
1543\f
1544/* ELF .o/exec file reading */
1545
c044fabd 1546/* Create a new bfd section from an ELF section header. */
252b5132 1547
b34976b6 1548bfd_boolean
217aa764 1549bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1550{
4fbb74a6
AM
1551 Elf_Internal_Shdr *hdr;
1552 Elf_Internal_Ehdr *ehdr;
1553 const struct elf_backend_data *bed;
90937f86 1554 const char *name;
252b5132 1555
4fbb74a6
AM
1556 if (shindex >= elf_numsections (abfd))
1557 return FALSE;
1558
1559 hdr = elf_elfsections (abfd)[shindex];
1560 ehdr = elf_elfheader (abfd);
1561 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1562 hdr->sh_name);
933d961a
JJ
1563 if (name == NULL)
1564 return FALSE;
252b5132 1565
4fbb74a6 1566 bed = get_elf_backend_data (abfd);
252b5132
RH
1567 switch (hdr->sh_type)
1568 {
1569 case SHT_NULL:
1570 /* Inactive section. Throw it away. */
b34976b6 1571 return TRUE;
252b5132
RH
1572
1573 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1574 case SHT_NOBITS: /* .bss section. */
1575 case SHT_HASH: /* .hash section. */
1576 case SHT_NOTE: /* .note section. */
25e27870
L
1577 case SHT_INIT_ARRAY: /* .init_array section. */
1578 case SHT_FINI_ARRAY: /* .fini_array section. */
1579 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1580 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1581 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1582 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1583
797fc050 1584 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1585 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1586 return FALSE;
cfcac11d
NC
1587 if (hdr->sh_link > elf_numsections (abfd))
1588 {
caa83f8b 1589 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1590 field set to SHN_BEFORE or SHN_AFTER. */
1591 switch (bfd_get_arch (abfd))
1592 {
caa83f8b 1593 case bfd_arch_i386:
cfcac11d
NC
1594 case bfd_arch_sparc:
1595 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1596 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1597 break;
1598 /* Otherwise fall through. */
1599 default:
1600 return FALSE;
1601 }
1602 }
1603 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
8e0ed13f 1604 return FALSE;
cfcac11d 1605 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1606 {
1607 Elf_Internal_Shdr *dynsymhdr;
1608
1609 /* The shared libraries distributed with hpux11 have a bogus
1610 sh_link field for the ".dynamic" section. Find the
1611 string table for the ".dynsym" section instead. */
1612 if (elf_dynsymtab (abfd) != 0)
1613 {
1614 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1615 hdr->sh_link = dynsymhdr->sh_link;
1616 }
1617 else
1618 {
1619 unsigned int i, num_sec;
1620
1621 num_sec = elf_numsections (abfd);
1622 for (i = 1; i < num_sec; i++)
1623 {
1624 dynsymhdr = elf_elfsections (abfd)[i];
1625 if (dynsymhdr->sh_type == SHT_DYNSYM)
1626 {
1627 hdr->sh_link = dynsymhdr->sh_link;
1628 break;
1629 }
1630 }
1631 }
1632 }
1633 break;
1634
252b5132
RH
1635 case SHT_SYMTAB: /* A symbol table */
1636 if (elf_onesymtab (abfd) == shindex)
b34976b6 1637 return TRUE;
252b5132 1638
a50b2160
JJ
1639 if (hdr->sh_entsize != bed->s->sizeof_sym)
1640 return FALSE;
3337c1e5 1641 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
1642 {
1643 if (hdr->sh_size != 0)
1644 return FALSE;
1645 /* Some assemblers erroneously set sh_info to one with a
1646 zero sh_size. ld sees this as a global symbol count
1647 of (unsigned) -1. Fix it here. */
1648 hdr->sh_info = 0;
1649 return TRUE;
1650 }
252b5132
RH
1651 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1652 elf_onesymtab (abfd) = shindex;
1653 elf_tdata (abfd)->symtab_hdr = *hdr;
1654 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1655 abfd->flags |= HAS_SYMS;
1656
1657 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1658 SHF_ALLOC is set, and this is a shared object, then we also
1659 treat this section as a BFD section. We can not base the
1660 decision purely on SHF_ALLOC, because that flag is sometimes
1661 set in a relocatable object file, which would confuse the
1662 linker. */
252b5132
RH
1663 if ((hdr->sh_flags & SHF_ALLOC) != 0
1664 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1665 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1666 shindex))
b34976b6 1667 return FALSE;
252b5132 1668
1b3a8575
AM
1669 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1670 can't read symbols without that section loaded as well. It
1671 is most likely specified by the next section header. */
1672 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1673 {
1674 unsigned int i, num_sec;
1675
1676 num_sec = elf_numsections (abfd);
1677 for (i = shindex + 1; i < num_sec; i++)
1678 {
1679 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1680 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1681 && hdr2->sh_link == shindex)
1682 break;
1683 }
1684 if (i == num_sec)
1685 for (i = 1; i < shindex; i++)
1686 {
1687 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1688 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1689 && hdr2->sh_link == shindex)
1690 break;
1691 }
1692 if (i != shindex)
1693 return bfd_section_from_shdr (abfd, i);
1694 }
b34976b6 1695 return TRUE;
252b5132
RH
1696
1697 case SHT_DYNSYM: /* A dynamic symbol table */
1698 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1699 return TRUE;
252b5132 1700
a50b2160
JJ
1701 if (hdr->sh_entsize != bed->s->sizeof_sym)
1702 return FALSE;
eee3b786
AM
1703 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1704 {
1705 if (hdr->sh_size != 0)
1706 return FALSE;
1707 /* Some linkers erroneously set sh_info to one with a
1708 zero sh_size. ld sees this as a global symbol count
1709 of (unsigned) -1. Fix it here. */
1710 hdr->sh_info = 0;
1711 return TRUE;
1712 }
252b5132
RH
1713 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1714 elf_dynsymtab (abfd) = shindex;
1715 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1716 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1717 abfd->flags |= HAS_SYMS;
1718
1719 /* Besides being a symbol table, we also treat this as a regular
1720 section, so that objcopy can handle it. */
6dc132d9 1721 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1722
9ad5cbcf
AM
1723 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1724 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1725 return TRUE;
9ad5cbcf 1726
1b3a8575 1727 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1728 elf_symtab_shndx (abfd) = shindex;
1729 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1730 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1731 return TRUE;
9ad5cbcf 1732
252b5132
RH
1733 case SHT_STRTAB: /* A string table */
1734 if (hdr->bfd_section != NULL)
b34976b6 1735 return TRUE;
252b5132
RH
1736 if (ehdr->e_shstrndx == shindex)
1737 {
1738 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1739 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1740 return TRUE;
252b5132 1741 }
1b3a8575
AM
1742 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1743 {
1744 symtab_strtab:
1745 elf_tdata (abfd)->strtab_hdr = *hdr;
1746 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1747 return TRUE;
1748 }
1749 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1750 {
1751 dynsymtab_strtab:
1752 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1753 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1754 elf_elfsections (abfd)[shindex] = hdr;
1755 /* We also treat this as a regular section, so that objcopy
1756 can handle it. */
6dc132d9
L
1757 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1758 shindex);
1b3a8575 1759 }
252b5132 1760
1b3a8575
AM
1761 /* If the string table isn't one of the above, then treat it as a
1762 regular section. We need to scan all the headers to be sure,
1763 just in case this strtab section appeared before the above. */
1764 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1765 {
1766 unsigned int i, num_sec;
252b5132 1767
1b3a8575
AM
1768 num_sec = elf_numsections (abfd);
1769 for (i = 1; i < num_sec; i++)
1770 {
1771 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1772 if (hdr2->sh_link == shindex)
1773 {
933d961a
JJ
1774 /* Prevent endless recursion on broken objects. */
1775 if (i == shindex)
1776 return FALSE;
1b3a8575
AM
1777 if (! bfd_section_from_shdr (abfd, i))
1778 return FALSE;
1779 if (elf_onesymtab (abfd) == i)
1780 goto symtab_strtab;
1781 if (elf_dynsymtab (abfd) == i)
1782 goto dynsymtab_strtab;
1783 }
1784 }
1785 }
6dc132d9 1786 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1787
1788 case SHT_REL:
1789 case SHT_RELA:
1790 /* *These* do a lot of work -- but build no sections! */
1791 {
1792 asection *target_sect;
d4730f92 1793 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 1794 unsigned int num_sec = elf_numsections (abfd);
d4730f92
BS
1795 struct bfd_elf_section_data *esdt;
1796 bfd_size_type amt;
252b5132 1797
aa2ca951
JJ
1798 if (hdr->sh_entsize
1799 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1800 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1801 return FALSE;
1802
03ae5f59 1803 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1804 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1805 {
1806 ((*_bfd_error_handler)
d003868e
AM
1807 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1808 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1809 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1810 shindex);
03ae5f59
ILT
1811 }
1812
252b5132
RH
1813 /* For some incomprehensible reason Oracle distributes
1814 libraries for Solaris in which some of the objects have
1815 bogus sh_link fields. It would be nice if we could just
1816 reject them, but, unfortunately, some people need to use
1817 them. We scan through the section headers; if we find only
1818 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1819 to it. I hope this doesn't break anything.
1820
1821 Don't do it on executable nor shared library. */
1822 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1823 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1824 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1825 {
9ad5cbcf 1826 unsigned int scan;
252b5132
RH
1827 int found;
1828
1829 found = 0;
9ad5cbcf 1830 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1831 {
1832 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1833 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1834 {
1835 if (found != 0)
1836 {
1837 found = 0;
1838 break;
1839 }
1840 found = scan;
1841 }
1842 }
1843 if (found != 0)
1844 hdr->sh_link = found;
1845 }
1846
1847 /* Get the symbol table. */
1b3a8575
AM
1848 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1849 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1850 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1851 return FALSE;
252b5132
RH
1852
1853 /* If this reloc section does not use the main symbol table we
1854 don't treat it as a reloc section. BFD can't adequately
1855 represent such a section, so at least for now, we don't
c044fabd 1856 try. We just present it as a normal section. We also
60bcf0fa 1857 can't use it as a reloc section if it points to the null
83b89087
L
1858 section, an invalid section, another reloc section, or its
1859 sh_link points to the null section. */
185ef66d 1860 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1861 || hdr->sh_link == SHN_UNDEF
185ef66d 1862 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1863 || hdr->sh_info >= num_sec
1864 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1865 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1866 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1867 shindex);
252b5132
RH
1868
1869 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1870 return FALSE;
252b5132
RH
1871 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1872 if (target_sect == NULL)
b34976b6 1873 return FALSE;
252b5132 1874
d4730f92
BS
1875 esdt = elf_section_data (target_sect);
1876 if (hdr->sh_type == SHT_RELA)
1877 p_hdr = &esdt->rela.hdr;
252b5132 1878 else
d4730f92
BS
1879 p_hdr = &esdt->rel.hdr;
1880
1881 BFD_ASSERT (*p_hdr == NULL);
1882 amt = sizeof (*hdr2);
1883 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
1884 if (hdr2 == NULL)
1885 return FALSE;
252b5132 1886 *hdr2 = *hdr;
d4730f92 1887 *p_hdr = hdr2;
252b5132 1888 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1889 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1890 target_sect->flags |= SEC_RELOC;
1891 target_sect->relocation = NULL;
1892 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1893 /* In the section to which the relocations apply, mark whether
1894 its relocations are of the REL or RELA variety. */
72730e0c 1895 if (hdr->sh_size != 0)
d4730f92
BS
1896 {
1897 if (hdr->sh_type == SHT_RELA)
1898 target_sect->use_rela_p = 1;
1899 }
252b5132 1900 abfd->flags |= HAS_RELOC;
b34976b6 1901 return TRUE;
252b5132 1902 }
252b5132
RH
1903
1904 case SHT_GNU_verdef:
1905 elf_dynverdef (abfd) = shindex;
1906 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1907 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1908
1909 case SHT_GNU_versym:
a50b2160
JJ
1910 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1911 return FALSE;
252b5132
RH
1912 elf_dynversym (abfd) = shindex;
1913 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1914 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1915
1916 case SHT_GNU_verneed:
1917 elf_dynverref (abfd) = shindex;
1918 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1919 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1920
1921 case SHT_SHLIB:
b34976b6 1922 return TRUE;
252b5132 1923
dbb410c3 1924 case SHT_GROUP:
44534af3 1925 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
a50b2160 1926 return FALSE;
6dc132d9 1927 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1928 return FALSE;
dbb410c3
AM
1929 if (hdr->contents != NULL)
1930 {
1931 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1932 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1933 asection *s;
1934
b885599b
AM
1935 if (idx->flags & GRP_COMDAT)
1936 hdr->bfd_section->flags
1937 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1938
45c5e9ed
L
1939 /* We try to keep the same section order as it comes in. */
1940 idx += n_elt;
dbb410c3 1941 while (--n_elt != 0)
1783205a
NC
1942 {
1943 --idx;
1944
1945 if (idx->shdr != NULL
1946 && (s = idx->shdr->bfd_section) != NULL
1947 && elf_next_in_group (s) != NULL)
1948 {
1949 elf_next_in_group (hdr->bfd_section) = s;
1950 break;
1951 }
1952 }
dbb410c3
AM
1953 }
1954 break;
1955
252b5132 1956 default:
104d59d1
JM
1957 /* Possibly an attributes section. */
1958 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1959 || hdr->sh_type == bed->obj_attrs_section_type)
1960 {
1961 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1962 return FALSE;
1963 _bfd_elf_parse_attributes (abfd, hdr);
1964 return TRUE;
1965 }
1966
252b5132 1967 /* Check for any processor-specific section types. */
3eb70a79
L
1968 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1969 return TRUE;
1970
1971 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1972 {
1973 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1974 /* FIXME: How to properly handle allocated section reserved
1975 for applications? */
1976 (*_bfd_error_handler)
1977 (_("%B: don't know how to handle allocated, application "
1978 "specific section `%s' [0x%8x]"),
1979 abfd, name, hdr->sh_type);
1980 else
1981 /* Allow sections reserved for applications. */
1982 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1983 shindex);
1984 }
1985 else if (hdr->sh_type >= SHT_LOPROC
1986 && hdr->sh_type <= SHT_HIPROC)
1987 /* FIXME: We should handle this section. */
1988 (*_bfd_error_handler)
1989 (_("%B: don't know how to handle processor specific section "
1990 "`%s' [0x%8x]"),
1991 abfd, name, hdr->sh_type);
1992 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1993 {
1994 /* Unrecognised OS-specific sections. */
1995 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1996 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1997 required to correctly process the section and the file should
ff15b240
NC
1998 be rejected with an error message. */
1999 (*_bfd_error_handler)
2000 (_("%B: don't know how to handle OS specific section "
2001 "`%s' [0x%8x]"),
2002 abfd, name, hdr->sh_type);
2003 else
2004 /* Otherwise it should be processed. */
2005 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2006 }
3eb70a79
L
2007 else
2008 /* FIXME: We should handle this section. */
2009 (*_bfd_error_handler)
2010 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2011 abfd, name, hdr->sh_type);
2012
2013 return FALSE;
252b5132
RH
2014 }
2015
b34976b6 2016 return TRUE;
252b5132
RH
2017}
2018
87d72d41 2019/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2020
87d72d41
AM
2021Elf_Internal_Sym *
2022bfd_sym_from_r_symndx (struct sym_cache *cache,
2023 bfd *abfd,
2024 unsigned long r_symndx)
ec338859 2025{
ec338859
AM
2026 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2027
a5d1b3b5
AM
2028 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2029 {
2030 Elf_Internal_Shdr *symtab_hdr;
2031 unsigned char esym[sizeof (Elf64_External_Sym)];
2032 Elf_External_Sym_Shndx eshndx;
ec338859 2033
a5d1b3b5
AM
2034 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2035 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2036 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2037 return NULL;
9ad5cbcf 2038
a5d1b3b5
AM
2039 if (cache->abfd != abfd)
2040 {
2041 memset (cache->indx, -1, sizeof (cache->indx));
2042 cache->abfd = abfd;
2043 }
2044 cache->indx[ent] = r_symndx;
ec338859 2045 }
a5d1b3b5 2046
87d72d41 2047 return &cache->sym[ent];
ec338859
AM
2048}
2049
252b5132
RH
2050/* Given an ELF section number, retrieve the corresponding BFD
2051 section. */
2052
2053asection *
91d6fa6a 2054bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2055{
91d6fa6a 2056 if (sec_index >= elf_numsections (abfd))
252b5132 2057 return NULL;
91d6fa6a 2058 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2059}
2060
b35d266b 2061static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2062{
0112cd26
NC
2063 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2064 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2065};
2066
b35d266b 2067static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2068{
0112cd26
NC
2069 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2070 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2071};
2072
b35d266b 2073static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2074{
0112cd26
NC
2075 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2076 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2077 /* There are more DWARF sections than these, but they needn't be added here
2078 unless you have to cope with broken compilers that don't emit section
2079 attributes or you want to help the user writing assembler. */
0112cd26
NC
2080 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2081 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2082 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2083 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2084 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2085 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2086 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2087 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2088 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2089};
2090
b35d266b 2091static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2092{
0112cd26
NC
2093 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2094 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2095 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2096};
2097
b35d266b 2098static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2099{
0112cd26 2100 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2101 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2102 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2103 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2104 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2105 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2106 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2107 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2108 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2109 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2110};
2111
b35d266b 2112static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2113{
0112cd26
NC
2114 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2115 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2116};
2117
b35d266b 2118static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2119{
0112cd26
NC
2120 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2121 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2122 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2123 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2124};
2125
b35d266b 2126static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2127{
0112cd26
NC
2128 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2129 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2130};
2131
b35d266b 2132static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2133{
0112cd26
NC
2134 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2135 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2136 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2137};
2138
b35d266b 2139static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2140{
0112cd26
NC
2141 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2142 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2143 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2144};
2145
b35d266b 2146static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2147{
0112cd26
NC
2148 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2149 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2150 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2151 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2152 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2153};
2154
b35d266b 2155static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2156{
0112cd26
NC
2157 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2158 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2159 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2160 /* See struct bfd_elf_special_section declaration for the semantics of
2161 this special case where .prefix_length != strlen (.prefix). */
2162 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2163 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2164};
2165
b35d266b 2166static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2167{
0112cd26
NC
2168 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2169 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2170 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2171 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2172};
2173
1b315056
CS
2174static const struct bfd_elf_special_section special_sections_z[] =
2175{
2176 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2177 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2178 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2179 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2180 { NULL, 0, 0, 0, 0 }
2181};
2182
e4c93b56 2183static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2184{
7f4d3958 2185 special_sections_b, /* 'b' */
98ece1b3 2186 special_sections_c, /* 'c' */
7f4d3958
L
2187 special_sections_d, /* 'd' */
2188 NULL, /* 'e' */
2189 special_sections_f, /* 'f' */
2190 special_sections_g, /* 'g' */
2191 special_sections_h, /* 'h' */
2192 special_sections_i, /* 'i' */
2193 NULL, /* 'j' */
2194 NULL, /* 'k' */
2195 special_sections_l, /* 'l' */
2196 NULL, /* 'm' */
2197 special_sections_n, /* 'n' */
2198 NULL, /* 'o' */
2199 special_sections_p, /* 'p' */
2200 NULL, /* 'q' */
2201 special_sections_r, /* 'r' */
2202 special_sections_s, /* 's' */
2203 special_sections_t, /* 't' */
1b315056
CS
2204 NULL, /* 'u' */
2205 NULL, /* 'v' */
2206 NULL, /* 'w' */
2207 NULL, /* 'x' */
2208 NULL, /* 'y' */
2209 special_sections_z /* 'z' */
7f4d3958
L
2210};
2211
551b43fd
AM
2212const struct bfd_elf_special_section *
2213_bfd_elf_get_special_section (const char *name,
2214 const struct bfd_elf_special_section *spec,
2215 unsigned int rela)
2f89ff8d
L
2216{
2217 int i;
7f4d3958 2218 int len;
7f4d3958 2219
551b43fd 2220 len = strlen (name);
7f4d3958 2221
551b43fd 2222 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2223 {
2224 int suffix_len;
551b43fd 2225 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2226
2227 if (len < prefix_len)
2228 continue;
551b43fd 2229 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2230 continue;
2231
551b43fd 2232 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2233 if (suffix_len <= 0)
2234 {
2235 if (name[prefix_len] != 0)
2236 {
2237 if (suffix_len == 0)
2238 continue;
2239 if (name[prefix_len] != '.'
2240 && (suffix_len == -2
551b43fd 2241 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2242 continue;
2243 }
2244 }
2245 else
2246 {
2247 if (len < prefix_len + suffix_len)
2248 continue;
2249 if (memcmp (name + len - suffix_len,
551b43fd 2250 spec[i].prefix + prefix_len,
7dcb9820
AM
2251 suffix_len) != 0)
2252 continue;
2253 }
551b43fd 2254 return &spec[i];
7dcb9820 2255 }
2f89ff8d
L
2256
2257 return NULL;
2258}
2259
7dcb9820 2260const struct bfd_elf_special_section *
29ef7005 2261_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2262{
551b43fd
AM
2263 int i;
2264 const struct bfd_elf_special_section *spec;
29ef7005 2265 const struct elf_backend_data *bed;
2f89ff8d
L
2266
2267 /* See if this is one of the special sections. */
551b43fd
AM
2268 if (sec->name == NULL)
2269 return NULL;
2f89ff8d 2270
29ef7005
L
2271 bed = get_elf_backend_data (abfd);
2272 spec = bed->special_sections;
2273 if (spec)
2274 {
2275 spec = _bfd_elf_get_special_section (sec->name,
2276 bed->special_sections,
2277 sec->use_rela_p);
2278 if (spec != NULL)
2279 return spec;
2280 }
2281
551b43fd
AM
2282 if (sec->name[0] != '.')
2283 return NULL;
2f89ff8d 2284
551b43fd 2285 i = sec->name[1] - 'b';
1b315056 2286 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2287 return NULL;
2288
2289 spec = special_sections[i];
2f89ff8d 2290
551b43fd
AM
2291 if (spec == NULL)
2292 return NULL;
2293
2294 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2295}
2296
b34976b6 2297bfd_boolean
217aa764 2298_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2299{
2300 struct bfd_elf_section_data *sdata;
551b43fd 2301 const struct elf_backend_data *bed;
7dcb9820 2302 const struct bfd_elf_special_section *ssect;
252b5132 2303
f0abc2a1
AM
2304 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2305 if (sdata == NULL)
2306 {
a50b1753
NC
2307 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2308 sizeof (*sdata));
f0abc2a1
AM
2309 if (sdata == NULL)
2310 return FALSE;
217aa764 2311 sec->used_by_bfd = sdata;
f0abc2a1 2312 }
bf572ba0 2313
551b43fd
AM
2314 /* Indicate whether or not this section should use RELA relocations. */
2315 bed = get_elf_backend_data (abfd);
2316 sec->use_rela_p = bed->default_use_rela_p;
2317
e843e0f8
L
2318 /* When we read a file, we don't need to set ELF section type and
2319 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2320 anyway. We will set ELF section type and flags for all linker
2321 created sections. If user specifies BFD section flags, we will
2322 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2323 elf_fake_sections. Special handling for .init_array/.fini_array
2324 output sections since they may contain .ctors/.dtors input
2325 sections. We don't want _bfd_elf_init_private_section_data to
2326 copy ELF section type from .ctors/.dtors input sections. */
2327 if (abfd->direction != read_direction
3496cb2a 2328 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2329 {
551b43fd 2330 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2331 if (ssect != NULL
2332 && (!sec->flags
2333 || (sec->flags & SEC_LINKER_CREATED) != 0
2334 || ssect->type == SHT_INIT_ARRAY
2335 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2336 {
2337 elf_section_type (sec) = ssect->type;
2338 elf_section_flags (sec) = ssect->attr;
2339 }
2f89ff8d
L
2340 }
2341
f592407e 2342 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2343}
2344
2345/* Create a new bfd section from an ELF program header.
2346
2347 Since program segments have no names, we generate a synthetic name
2348 of the form segment<NUM>, where NUM is generally the index in the
2349 program header table. For segments that are split (see below) we
2350 generate the names segment<NUM>a and segment<NUM>b.
2351
2352 Note that some program segments may have a file size that is different than
2353 (less than) the memory size. All this means is that at execution the
2354 system must allocate the amount of memory specified by the memory size,
2355 but only initialize it with the first "file size" bytes read from the
2356 file. This would occur for example, with program segments consisting
2357 of combined data+bss.
2358
2359 To handle the above situation, this routine generates TWO bfd sections
2360 for the single program segment. The first has the length specified by
2361 the file size of the segment, and the second has the length specified
2362 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2363 into its initialized and uninitialized parts.
252b5132
RH
2364
2365 */
2366
b34976b6 2367bfd_boolean
217aa764
AM
2368_bfd_elf_make_section_from_phdr (bfd *abfd,
2369 Elf_Internal_Phdr *hdr,
91d6fa6a 2370 int hdr_index,
a50b1753 2371 const char *type_name)
252b5132
RH
2372{
2373 asection *newsect;
2374 char *name;
2375 char namebuf[64];
d4c88bbb 2376 size_t len;
252b5132
RH
2377 int split;
2378
2379 split = ((hdr->p_memsz > 0)
2380 && (hdr->p_filesz > 0)
2381 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2382
2383 if (hdr->p_filesz > 0)
252b5132 2384 {
91d6fa6a 2385 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2386 len = strlen (namebuf) + 1;
a50b1753 2387 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2388 if (!name)
2389 return FALSE;
2390 memcpy (name, namebuf, len);
2391 newsect = bfd_make_section (abfd, name);
2392 if (newsect == NULL)
2393 return FALSE;
2394 newsect->vma = hdr->p_vaddr;
2395 newsect->lma = hdr->p_paddr;
2396 newsect->size = hdr->p_filesz;
2397 newsect->filepos = hdr->p_offset;
2398 newsect->flags |= SEC_HAS_CONTENTS;
2399 newsect->alignment_power = bfd_log2 (hdr->p_align);
2400 if (hdr->p_type == PT_LOAD)
252b5132 2401 {
d5191d0c
AM
2402 newsect->flags |= SEC_ALLOC;
2403 newsect->flags |= SEC_LOAD;
2404 if (hdr->p_flags & PF_X)
2405 {
2406 /* FIXME: all we known is that it has execute PERMISSION,
2407 may be data. */
2408 newsect->flags |= SEC_CODE;
2409 }
2410 }
2411 if (!(hdr->p_flags & PF_W))
2412 {
2413 newsect->flags |= SEC_READONLY;
252b5132 2414 }
252b5132
RH
2415 }
2416
d5191d0c 2417 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2418 {
d5191d0c
AM
2419 bfd_vma align;
2420
91d6fa6a 2421 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2422 len = strlen (namebuf) + 1;
a50b1753 2423 name = (char *) bfd_alloc (abfd, len);
252b5132 2424 if (!name)
b34976b6 2425 return FALSE;
d4c88bbb 2426 memcpy (name, namebuf, len);
252b5132
RH
2427 newsect = bfd_make_section (abfd, name);
2428 if (newsect == NULL)
b34976b6 2429 return FALSE;
252b5132
RH
2430 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2431 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2432 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2433 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2434 align = newsect->vma & -newsect->vma;
2435 if (align == 0 || align > hdr->p_align)
2436 align = hdr->p_align;
2437 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2438 if (hdr->p_type == PT_LOAD)
2439 {
d5191d0c
AM
2440 /* Hack for gdb. Segments that have not been modified do
2441 not have their contents written to a core file, on the
2442 assumption that a debugger can find the contents in the
2443 executable. We flag this case by setting the fake
2444 section size to zero. Note that "real" bss sections will
2445 always have their contents dumped to the core file. */
2446 if (bfd_get_format (abfd) == bfd_core)
2447 newsect->size = 0;
252b5132
RH
2448 newsect->flags |= SEC_ALLOC;
2449 if (hdr->p_flags & PF_X)
2450 newsect->flags |= SEC_CODE;
2451 }
2452 if (!(hdr->p_flags & PF_W))
2453 newsect->flags |= SEC_READONLY;
2454 }
2455
b34976b6 2456 return TRUE;
252b5132
RH
2457}
2458
b34976b6 2459bfd_boolean
91d6fa6a 2460bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2461{
9c5bfbb7 2462 const struct elf_backend_data *bed;
20cfcaae
NC
2463
2464 switch (hdr->p_type)
2465 {
2466 case PT_NULL:
91d6fa6a 2467 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2468
2469 case PT_LOAD:
91d6fa6a 2470 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2471
2472 case PT_DYNAMIC:
91d6fa6a 2473 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2474
2475 case PT_INTERP:
91d6fa6a 2476 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2477
2478 case PT_NOTE:
91d6fa6a 2479 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2480 return FALSE;
718175fa 2481 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2482 return FALSE;
2483 return TRUE;
20cfcaae
NC
2484
2485 case PT_SHLIB:
91d6fa6a 2486 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2487
2488 case PT_PHDR:
91d6fa6a 2489 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2490
811072d8 2491 case PT_GNU_EH_FRAME:
91d6fa6a 2492 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2493 "eh_frame_hdr");
2494
2b05f1b7 2495 case PT_GNU_STACK:
91d6fa6a 2496 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2497
8c37241b 2498 case PT_GNU_RELRO:
91d6fa6a 2499 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2500
20cfcaae 2501 default:
8c1acd09 2502 /* Check for any processor-specific program segment types. */
20cfcaae 2503 bed = get_elf_backend_data (abfd);
91d6fa6a 2504 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2505 }
2506}
2507
d4730f92
BS
2508/* Return the REL_HDR for SEC, assuming there is only a single one, either
2509 REL or RELA. */
2510
2511Elf_Internal_Shdr *
2512_bfd_elf_single_rel_hdr (asection *sec)
2513{
2514 if (elf_section_data (sec)->rel.hdr)
2515 {
2516 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
2517 return elf_section_data (sec)->rel.hdr;
2518 }
2519 else
2520 return elf_section_data (sec)->rela.hdr;
2521}
2522
2523/* Allocate and initialize a section-header for a new reloc section,
2524 containing relocations against ASECT. It is stored in RELDATA. If
2525 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
2526 relocations. */
23bc299b 2527
5d13b3b3 2528static bfd_boolean
217aa764 2529_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 2530 struct bfd_elf_section_reloc_data *reldata,
217aa764
AM
2531 asection *asect,
2532 bfd_boolean use_rela_p)
23bc299b 2533{
d4730f92 2534 Elf_Internal_Shdr *rel_hdr;
23bc299b 2535 char *name;
9c5bfbb7 2536 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92
BS
2537 bfd_size_type amt;
2538
2539 amt = sizeof (Elf_Internal_Shdr);
2540 BFD_ASSERT (reldata->hdr == NULL);
2541 rel_hdr = bfd_zalloc (abfd, amt);
2542 reldata->hdr = rel_hdr;
23bc299b 2543
d324f6d6 2544 amt = sizeof ".rela" + strlen (asect->name);
a50b1753 2545 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2546 if (name == NULL)
b34976b6 2547 return FALSE;
23bc299b
MM
2548 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2549 rel_hdr->sh_name =
2b0f7ef9 2550 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2551 FALSE);
23bc299b 2552 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2553 return FALSE;
23bc299b
MM
2554 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2555 rel_hdr->sh_entsize = (use_rela_p
2556 ? bed->s->sizeof_rela
2557 : bed->s->sizeof_rel);
72de5009 2558 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2559 rel_hdr->sh_flags = 0;
2560 rel_hdr->sh_addr = 0;
2561 rel_hdr->sh_size = 0;
2562 rel_hdr->sh_offset = 0;
2563
b34976b6 2564 return TRUE;
23bc299b
MM
2565}
2566
94be91de
JB
2567/* Return the default section type based on the passed in section flags. */
2568
2569int
2570bfd_elf_get_default_section_type (flagword flags)
2571{
2572 if ((flags & SEC_ALLOC) != 0
2e76e85a 2573 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
2574 return SHT_NOBITS;
2575 return SHT_PROGBITS;
2576}
2577
d4730f92
BS
2578struct fake_section_arg
2579{
2580 struct bfd_link_info *link_info;
2581 bfd_boolean failed;
2582};
2583
252b5132
RH
2584/* Set up an ELF internal section header for a section. */
2585
252b5132 2586static void
d4730f92 2587elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 2588{
d4730f92 2589 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 2590 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 2591 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 2592 Elf_Internal_Shdr *this_hdr;
0414f35b 2593 unsigned int sh_type;
252b5132 2594
d4730f92 2595 if (arg->failed)
252b5132
RH
2596 {
2597 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2598 loop. */
252b5132
RH
2599 return;
2600 }
2601
d4730f92 2602 this_hdr = &esd->this_hdr;
252b5132 2603
e57b5356
AM
2604 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2605 asect->name, FALSE);
2606 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2607 {
d4730f92 2608 arg->failed = TRUE;
252b5132
RH
2609 return;
2610 }
2611
a4d8e49b 2612 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2613
2614 if ((asect->flags & SEC_ALLOC) != 0
2615 || asect->user_set_vma)
2616 this_hdr->sh_addr = asect->vma;
2617 else
2618 this_hdr->sh_addr = 0;
2619
2620 this_hdr->sh_offset = 0;
eea6121a 2621 this_hdr->sh_size = asect->size;
252b5132 2622 this_hdr->sh_link = 0;
72de5009 2623 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2624 /* The sh_entsize and sh_info fields may have been set already by
2625 copy_private_section_data. */
2626
2627 this_hdr->bfd_section = asect;
2628 this_hdr->contents = NULL;
2629
3cddba1e
L
2630 /* If the section type is unspecified, we set it based on
2631 asect->flags. */
98ece1b3
AM
2632 if ((asect->flags & SEC_GROUP) != 0)
2633 sh_type = SHT_GROUP;
98ece1b3 2634 else
94be91de 2635 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2636
3cddba1e 2637 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2638 this_hdr->sh_type = sh_type;
2639 else if (this_hdr->sh_type == SHT_NOBITS
2640 && sh_type == SHT_PROGBITS
2641 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2642 {
98ece1b3
AM
2643 /* Warn if we are changing a NOBITS section to PROGBITS, but
2644 allow the link to proceed. This can happen when users link
2645 non-bss input sections to bss output sections, or emit data
2646 to a bss output section via a linker script. */
2647 (*_bfd_error_handler)
58f0869b 2648 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2649 this_hdr->sh_type = sh_type;
3cddba1e
L
2650 }
2651
2f89ff8d 2652 switch (this_hdr->sh_type)
252b5132 2653 {
2f89ff8d 2654 default:
2f89ff8d
L
2655 break;
2656
2657 case SHT_STRTAB:
2658 case SHT_INIT_ARRAY:
2659 case SHT_FINI_ARRAY:
2660 case SHT_PREINIT_ARRAY:
2661 case SHT_NOTE:
2662 case SHT_NOBITS:
2663 case SHT_PROGBITS:
2664 break;
2665
2666 case SHT_HASH:
c7ac6ff8 2667 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2668 break;
5de3bf90 2669
2f89ff8d 2670 case SHT_DYNSYM:
252b5132 2671 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2672 break;
2673
2674 case SHT_DYNAMIC:
252b5132 2675 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2676 break;
2677
2678 case SHT_RELA:
2679 if (get_elf_backend_data (abfd)->may_use_rela_p)
2680 this_hdr->sh_entsize = bed->s->sizeof_rela;
2681 break;
2682
2683 case SHT_REL:
2684 if (get_elf_backend_data (abfd)->may_use_rel_p)
2685 this_hdr->sh_entsize = bed->s->sizeof_rel;
2686 break;
2687
2688 case SHT_GNU_versym:
252b5132 2689 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2690 break;
2691
2692 case SHT_GNU_verdef:
252b5132
RH
2693 this_hdr->sh_entsize = 0;
2694 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2695 cverdefs. The linker will set cverdefs, but sh_info will be
2696 zero. */
252b5132
RH
2697 if (this_hdr->sh_info == 0)
2698 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2699 else
2700 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2701 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2702 break;
2703
2704 case SHT_GNU_verneed:
252b5132
RH
2705 this_hdr->sh_entsize = 0;
2706 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2707 cverrefs. The linker will set cverrefs, but sh_info will be
2708 zero. */
252b5132
RH
2709 if (this_hdr->sh_info == 0)
2710 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2711 else
2712 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2713 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2714 break;
2715
2716 case SHT_GROUP:
1783205a 2717 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2718 break;
fdc90cb4
JJ
2719
2720 case SHT_GNU_HASH:
2721 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2722 break;
dbb410c3 2723 }
252b5132
RH
2724
2725 if ((asect->flags & SEC_ALLOC) != 0)
2726 this_hdr->sh_flags |= SHF_ALLOC;
2727 if ((asect->flags & SEC_READONLY) == 0)
2728 this_hdr->sh_flags |= SHF_WRITE;
2729 if ((asect->flags & SEC_CODE) != 0)
2730 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2731 if ((asect->flags & SEC_MERGE) != 0)
2732 {
2733 this_hdr->sh_flags |= SHF_MERGE;
2734 this_hdr->sh_entsize = asect->entsize;
2735 if ((asect->flags & SEC_STRINGS) != 0)
2736 this_hdr->sh_flags |= SHF_STRINGS;
2737 }
1126897b 2738 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2739 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2740 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2741 {
2742 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2743 if (asect->size == 0
2744 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2745 {
3a800eb9 2746 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2747
704afa60 2748 this_hdr->sh_size = 0;
3a800eb9
AM
2749 if (o != NULL)
2750 {
704afa60 2751 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2752 if (this_hdr->sh_size != 0)
2753 this_hdr->sh_type = SHT_NOBITS;
2754 }
704afa60
JJ
2755 }
2756 }
18ae9cc1
L
2757 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
2758 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 2759
d4730f92
BS
2760 /* If the section has relocs, set up a section header for the
2761 SHT_REL[A] section. If two relocation sections are required for
2762 this section, it is up to the processor-specific back-end to
2763 create the other. */
2764 if ((asect->flags & SEC_RELOC) != 0)
2765 {
2766 /* When doing a relocatable link, create both REL and RELA sections if
2767 needed. */
2768 if (arg->link_info
2769 /* Do the normal setup if we wouldn't create any sections here. */
2770 && esd->rel.count + esd->rela.count > 0
2771 && (arg->link_info->relocatable || arg->link_info->emitrelocations))
2772 {
2773 if (esd->rel.count && esd->rel.hdr == NULL
2774 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, asect, FALSE))
2775 {
2776 arg->failed = TRUE;
2777 return;
2778 }
2779 if (esd->rela.count && esd->rela.hdr == NULL
2780 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, asect, TRUE))
2781 {
2782 arg->failed = TRUE;
2783 return;
2784 }
2785 }
2786 else if (!_bfd_elf_init_reloc_shdr (abfd,
2787 (asect->use_rela_p
2788 ? &esd->rela : &esd->rel),
2789 asect,
2790 asect->use_rela_p))
2791 arg->failed = TRUE;
2792 }
2793
252b5132 2794 /* Check for processor-specific section types. */
0414f35b 2795 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2796 if (bed->elf_backend_fake_sections
2797 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 2798 arg->failed = TRUE;
252b5132 2799
42bb2e33 2800 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2801 {
2802 /* Don't change the header type from NOBITS if we are being
42bb2e33 2803 called for objcopy --only-keep-debug. */
0414f35b
AM
2804 this_hdr->sh_type = sh_type;
2805 }
252b5132
RH
2806}
2807
bcacc0f5
AM
2808/* Fill in the contents of a SHT_GROUP section. Called from
2809 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2810 when ELF targets use the generic linker, ld. Called for ld -r
2811 from bfd_elf_final_link. */
dbb410c3 2812
1126897b 2813void
217aa764 2814bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2815{
a50b1753 2816 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2817 asection *elt, *first;
dbb410c3 2818 unsigned char *loc;
b34976b6 2819 bfd_boolean gas;
dbb410c3 2820
7e4111ad
L
2821 /* Ignore linker created group section. See elfNN_ia64_object_p in
2822 elfxx-ia64.c. */
2823 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2824 || *failedptr)
2825 return;
2826
bcacc0f5
AM
2827 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2828 {
2829 unsigned long symindx = 0;
2830
2831 /* elf_group_id will have been set up by objcopy and the
2832 generic linker. */
2833 if (elf_group_id (sec) != NULL)
2834 symindx = elf_group_id (sec)->udata.i;
1126897b 2835
bcacc0f5
AM
2836 if (symindx == 0)
2837 {
2838 /* If called from the assembler, swap_out_syms will have set up
2839 elf_section_syms. */
2840 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2841 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2842 }
2843 elf_section_data (sec)->this_hdr.sh_info = symindx;
2844 }
2845 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2846 {
bcacc0f5
AM
2847 /* The ELF backend linker sets sh_info to -2 when the group
2848 signature symbol is global, and thus the index can't be
2849 set until all local symbols are output. */
2850 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2851 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2852 unsigned long symndx = sec_data->this_hdr.sh_info;
2853 unsigned long extsymoff = 0;
2854 struct elf_link_hash_entry *h;
2855
2856 if (!elf_bad_symtab (igroup->owner))
2857 {
2858 Elf_Internal_Shdr *symtab_hdr;
2859
2860 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2861 extsymoff = symtab_hdr->sh_info;
2862 }
2863 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2864 while (h->root.type == bfd_link_hash_indirect
2865 || h->root.type == bfd_link_hash_warning)
2866 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2867
2868 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2869 }
dbb410c3 2870
1126897b 2871 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2872 gas = TRUE;
dbb410c3
AM
2873 if (sec->contents == NULL)
2874 {
b34976b6 2875 gas = FALSE;
a50b1753 2876 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
2877
2878 /* Arrange for the section to be written out. */
2879 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2880 if (sec->contents == NULL)
2881 {
b34976b6 2882 *failedptr = TRUE;
dbb410c3
AM
2883 return;
2884 }
2885 }
2886
eea6121a 2887 loc = sec->contents + sec->size;
dbb410c3 2888
9dce4196
AM
2889 /* Get the pointer to the first section in the group that gas
2890 squirreled away here. objcopy arranges for this to be set to the
2891 start of the input section group. */
2892 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2893
2894 /* First element is a flag word. Rest of section is elf section
2895 indices for all the sections of the group. Write them backwards
2896 just to keep the group in the same order as given in .section
2897 directives, not that it matters. */
2898 while (elt != NULL)
2899 {
9dce4196 2900 asection *s;
9dce4196 2901
9dce4196 2902 s = elt;
415f38a6
AM
2903 if (!gas)
2904 s = s->output_section;
2905 if (s != NULL
2906 && !bfd_is_abs_section (s))
01e1a5bc 2907 {
415f38a6
AM
2908 unsigned int idx = elf_section_data (s)->this_idx;
2909
01e1a5bc 2910 loc -= 4;
01e1a5bc
NC
2911 H_PUT_32 (abfd, idx, loc);
2912 }
945906ff 2913 elt = elf_next_in_group (elt);
9dce4196
AM
2914 if (elt == first)
2915 break;
dbb410c3
AM
2916 }
2917
3d7f7666 2918 if ((loc -= 4) != sec->contents)
9dce4196 2919 abort ();
dbb410c3 2920
9dce4196 2921 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2922}
2923
252b5132
RH
2924/* Assign all ELF section numbers. The dummy first section is handled here
2925 too. The link/info pointers for the standard section types are filled
2926 in here too, while we're at it. */
2927
b34976b6 2928static bfd_boolean
da9f89d4 2929assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2930{
2931 struct elf_obj_tdata *t = elf_tdata (abfd);
2932 asection *sec;
2b0f7ef9 2933 unsigned int section_number, secn;
252b5132 2934 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2935 struct bfd_elf_section_data *d;
3516e984 2936 bfd_boolean need_symtab;
252b5132
RH
2937
2938 section_number = 1;
2939
2b0f7ef9
JJ
2940 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2941
da9f89d4
L
2942 /* SHT_GROUP sections are in relocatable files only. */
2943 if (link_info == NULL || link_info->relocatable)
252b5132 2944 {
da9f89d4 2945 /* Put SHT_GROUP sections first. */
04dd1667 2946 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2947 {
5daa8fe7 2948 d = elf_section_data (sec);
da9f89d4
L
2949
2950 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2951 {
5daa8fe7 2952 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2953 {
2954 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2955 bfd_section_list_remove (abfd, sec);
da9f89d4 2956 abfd->section_count--;
da9f89d4 2957 }
08a40648 2958 else
4fbb74a6 2959 d->this_idx = section_number++;
da9f89d4 2960 }
47cc2cf5
PB
2961 }
2962 }
2963
2964 for (sec = abfd->sections; sec; sec = sec->next)
2965 {
2966 d = elf_section_data (sec);
2967
2968 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2969 d->this_idx = section_number++;
2b0f7ef9 2970 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 2971 if (d->rel.hdr)
2b0f7ef9 2972 {
d4730f92
BS
2973 d->rel.idx = section_number++;
2974 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 2975 }
d4730f92
BS
2976 else
2977 d->rel.idx = 0;
23bc299b 2978
d4730f92 2979 if (d->rela.hdr)
2b0f7ef9 2980 {
d4730f92
BS
2981 d->rela.idx = section_number++;
2982 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 2983 }
23bc299b 2984 else
d4730f92 2985 d->rela.idx = 0;
252b5132
RH
2986 }
2987
12bd6957 2988 elf_shstrtab_sec (abfd) = section_number++;
2b0f7ef9 2989 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
12bd6957 2990 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
252b5132 2991
3516e984
L
2992 need_symtab = (bfd_get_symcount (abfd) > 0
2993 || (link_info == NULL
2994 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2995 == HAS_RELOC)));
2996 if (need_symtab)
252b5132 2997 {
12bd6957 2998 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 2999 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3000 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3001 {
12bd6957 3002 elf_symtab_shndx (abfd) = section_number++;
9ad5cbcf
AM
3003 t->symtab_shndx_hdr.sh_name
3004 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3005 ".symtab_shndx", FALSE);
9ad5cbcf 3006 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 3007 return FALSE;
9ad5cbcf 3008 }
12bd6957 3009 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3010 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3011 }
3012
1c52a645
L
3013 if (section_number >= SHN_LORESERVE)
3014 {
3015 _bfd_error_handler (_("%B: too many sections: %u"),
3016 abfd, section_number);
3017 return FALSE;
3018 }
3019
2b0f7ef9
JJ
3020 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3021 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3022
3023 elf_numsections (abfd) = section_number;
252b5132
RH
3024 elf_elfheader (abfd)->e_shnum = section_number;
3025
3026 /* Set up the list of section header pointers, in agreement with the
3027 indices. */
a50b1753
NC
3028 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3029 sizeof (Elf_Internal_Shdr *));
252b5132 3030 if (i_shdrp == NULL)
b34976b6 3031 return FALSE;
252b5132 3032
a50b1753
NC
3033 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3034 sizeof (Elf_Internal_Shdr));
252b5132
RH
3035 if (i_shdrp[0] == NULL)
3036 {
3037 bfd_release (abfd, i_shdrp);
b34976b6 3038 return FALSE;
252b5132 3039 }
252b5132
RH
3040
3041 elf_elfsections (abfd) = i_shdrp;
3042
12bd6957 3043 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3044 if (need_symtab)
252b5132 3045 {
12bd6957 3046 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3047 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3048 {
12bd6957
AM
3049 i_shdrp[elf_symtab_shndx (abfd)] = &t->symtab_shndx_hdr;
3050 t->symtab_shndx_hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3051 }
12bd6957
AM
3052 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3053 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3054 }
38ce5b11 3055
252b5132
RH
3056 for (sec = abfd->sections; sec; sec = sec->next)
3057 {
252b5132
RH
3058 asection *s;
3059 const char *name;
3060
91d6fa6a
NC
3061 d = elf_section_data (sec);
3062
252b5132 3063 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3064 if (d->rel.idx != 0)
3065 i_shdrp[d->rel.idx] = d->rel.hdr;
3066 if (d->rela.idx != 0)
3067 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3068
3069 /* Fill in the sh_link and sh_info fields while we're at it. */
3070
3071 /* sh_link of a reloc section is the section index of the symbol
3072 table. sh_info is the section index of the section to which
3073 the relocation entries apply. */
d4730f92 3074 if (d->rel.idx != 0)
252b5132 3075 {
12bd6957 3076 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3077 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3078 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3079 }
d4730f92 3080 if (d->rela.idx != 0)
23bc299b 3081 {
12bd6957 3082 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3083 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3084 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3085 }
252b5132 3086
38ce5b11
L
3087 /* We need to set up sh_link for SHF_LINK_ORDER. */
3088 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3089 {
3090 s = elf_linked_to_section (sec);
3091 if (s)
38ce5b11 3092 {
f2876037 3093 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3094 if (link_info != NULL)
38ce5b11 3095 {
f2876037 3096 /* Check discarded linkonce section. */
dbaa2011 3097 if (discarded_section (s))
38ce5b11 3098 {
ccd2ec6a
L
3099 asection *kept;
3100 (*_bfd_error_handler)
3101 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3102 abfd, d->this_hdr.bfd_section,
3103 s, s->owner);
3104 /* Point to the kept section if it has the same
3105 size as the discarded one. */
c0f00686 3106 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3107 if (kept == NULL)
185d09ad 3108 {
ccd2ec6a
L
3109 bfd_set_error (bfd_error_bad_value);
3110 return FALSE;
185d09ad 3111 }
ccd2ec6a 3112 s = kept;
38ce5b11 3113 }
e424ecc8 3114
ccd2ec6a
L
3115 s = s->output_section;
3116 BFD_ASSERT (s != NULL);
38ce5b11 3117 }
f2876037
L
3118 else
3119 {
3120 /* Handle objcopy. */
3121 if (s->output_section == NULL)
3122 {
3123 (*_bfd_error_handler)
3124 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3125 abfd, d->this_hdr.bfd_section, s, s->owner);
3126 bfd_set_error (bfd_error_bad_value);
3127 return FALSE;
3128 }
3129 s = s->output_section;
3130 }
ccd2ec6a
L
3131 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3132 }
3133 else
3134 {
3135 /* PR 290:
3136 The Intel C compiler generates SHT_IA_64_UNWIND with
3137 SHF_LINK_ORDER. But it doesn't set the sh_link or
3138 sh_info fields. Hence we could get the situation
08a40648 3139 where s is NULL. */
ccd2ec6a
L
3140 const struct elf_backend_data *bed
3141 = get_elf_backend_data (abfd);
3142 if (bed->link_order_error_handler)
3143 bed->link_order_error_handler
3144 (_("%B: warning: sh_link not set for section `%A'"),
3145 abfd, sec);
38ce5b11
L
3146 }
3147 }
3148
252b5132
RH
3149 switch (d->this_hdr.sh_type)
3150 {
3151 case SHT_REL:
3152 case SHT_RELA:
3153 /* A reloc section which we are treating as a normal BFD
3154 section. sh_link is the section index of the symbol
3155 table. sh_info is the section index of the section to
3156 which the relocation entries apply. We assume that an
3157 allocated reloc section uses the dynamic symbol table.
3158 FIXME: How can we be sure? */
3159 s = bfd_get_section_by_name (abfd, ".dynsym");
3160 if (s != NULL)
3161 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3162
3163 /* We look up the section the relocs apply to by name. */
3164 name = sec->name;
3165 if (d->this_hdr.sh_type == SHT_REL)
3166 name += 4;
3167 else
3168 name += 5;
3169 s = bfd_get_section_by_name (abfd, name);
3170 if (s != NULL)
9ef5d938
L
3171 {
3172 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3173 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3174 }
252b5132
RH
3175 break;
3176
3177 case SHT_STRTAB:
3178 /* We assume that a section named .stab*str is a stabs
3179 string section. We look for a section with the same name
3180 but without the trailing ``str'', and set its sh_link
3181 field to point to this section. */
0112cd26 3182 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3183 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3184 {
3185 size_t len;
3186 char *alc;
3187
3188 len = strlen (sec->name);
a50b1753 3189 alc = (char *) bfd_malloc (len - 2);
252b5132 3190 if (alc == NULL)
b34976b6 3191 return FALSE;
d4c88bbb 3192 memcpy (alc, sec->name, len - 3);
252b5132
RH
3193 alc[len - 3] = '\0';
3194 s = bfd_get_section_by_name (abfd, alc);
3195 free (alc);
3196 if (s != NULL)
3197 {
3198 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3199
3200 /* This is a .stab section. */
0594c12d
AM
3201 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3202 elf_section_data (s)->this_hdr.sh_entsize
3203 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3204 }
3205 }
3206 break;
3207
3208 case SHT_DYNAMIC:
3209 case SHT_DYNSYM:
3210 case SHT_GNU_verneed:
3211 case SHT_GNU_verdef:
3212 /* sh_link is the section header index of the string table
3213 used for the dynamic entries, or the symbol table, or the
3214 version strings. */
3215 s = bfd_get_section_by_name (abfd, ".dynstr");
3216 if (s != NULL)
3217 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3218 break;
3219
7f1204bb
JJ
3220 case SHT_GNU_LIBLIST:
3221 /* sh_link is the section header index of the prelink library
08a40648
AM
3222 list used for the dynamic entries, or the symbol table, or
3223 the version strings. */
7f1204bb
JJ
3224 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3225 ? ".dynstr" : ".gnu.libstr");
3226 if (s != NULL)
3227 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3228 break;
3229
252b5132 3230 case SHT_HASH:
fdc90cb4 3231 case SHT_GNU_HASH:
252b5132
RH
3232 case SHT_GNU_versym:
3233 /* sh_link is the section header index of the symbol table
3234 this hash table or version table is for. */
3235 s = bfd_get_section_by_name (abfd, ".dynsym");
3236 if (s != NULL)
3237 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3238 break;
dbb410c3
AM
3239
3240 case SHT_GROUP:
12bd6957 3241 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3242 }
3243 }
3244
2b0f7ef9 3245 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3246 if (i_shdrp[secn] == NULL)
3247 i_shdrp[secn] = i_shdrp[0];
3248 else
3249 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3250 i_shdrp[secn]->sh_name);
b34976b6 3251 return TRUE;
252b5132
RH
3252}
3253
5372391b 3254static bfd_boolean
217aa764 3255sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3256{
3257 /* If the backend has a special mapping, use it. */
9c5bfbb7 3258 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3259 if (bed->elf_backend_sym_is_global)
3260 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3261
e47bf690 3262 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3263 || bfd_is_und_section (bfd_get_section (sym))
3264 || bfd_is_com_section (bfd_get_section (sym)));
3265}
3266
5372391b 3267/* Don't output section symbols for sections that are not going to be
c6d8cab4 3268 output, that are duplicates or there is no BFD section. */
5372391b
AM
3269
3270static bfd_boolean
3271ignore_section_sym (bfd *abfd, asymbol *sym)
3272{
c6d8cab4
L
3273 elf_symbol_type *type_ptr;
3274
3275 if ((sym->flags & BSF_SECTION_SYM) == 0)
3276 return FALSE;
3277
3278 type_ptr = elf_symbol_from (abfd, sym);
3279 return ((type_ptr != NULL
3280 && type_ptr->internal_elf_sym.st_shndx != 0
3281 && bfd_is_abs_section (sym->section))
3282 || !(sym->section->owner == abfd
0f0a5e58 3283 || (sym->section->output_section->owner == abfd
2633a79c
AM
3284 && sym->section->output_offset == 0)
3285 || bfd_is_abs_section (sym->section)));
5372391b
AM
3286}
3287
2633a79c
AM
3288/* Map symbol from it's internal number to the external number, moving
3289 all local symbols to be at the head of the list. */
3290
b34976b6 3291static bfd_boolean
12bd6957 3292elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 3293{
dc810e39 3294 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3295 asymbol **syms = bfd_get_outsymbols (abfd);
3296 asymbol **sect_syms;
dc810e39
AM
3297 unsigned int num_locals = 0;
3298 unsigned int num_globals = 0;
3299 unsigned int num_locals2 = 0;
3300 unsigned int num_globals2 = 0;
252b5132 3301 int max_index = 0;
dc810e39 3302 unsigned int idx;
252b5132
RH
3303 asection *asect;
3304 asymbol **new_syms;
252b5132
RH
3305
3306#ifdef DEBUG
3307 fprintf (stderr, "elf_map_symbols\n");
3308 fflush (stderr);
3309#endif
3310
252b5132
RH
3311 for (asect = abfd->sections; asect; asect = asect->next)
3312 {
3313 if (max_index < asect->index)
3314 max_index = asect->index;
3315 }
3316
3317 max_index++;
a50b1753 3318 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3319 if (sect_syms == NULL)
b34976b6 3320 return FALSE;
252b5132 3321 elf_section_syms (abfd) = sect_syms;
4e89ac30 3322 elf_num_section_syms (abfd) = max_index;
252b5132 3323
079e9a2f
AM
3324 /* Init sect_syms entries for any section symbols we have already
3325 decided to output. */
252b5132
RH
3326 for (idx = 0; idx < symcount; idx++)
3327 {
dc810e39 3328 asymbol *sym = syms[idx];
c044fabd 3329
252b5132 3330 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3331 && sym->value == 0
2633a79c
AM
3332 && !ignore_section_sym (abfd, sym)
3333 && !bfd_is_abs_section (sym->section))
252b5132 3334 {
5372391b 3335 asection *sec = sym->section;
252b5132 3336
5372391b
AM
3337 if (sec->owner != abfd)
3338 sec = sec->output_section;
252b5132 3339
5372391b 3340 sect_syms[sec->index] = syms[idx];
252b5132
RH
3341 }
3342 }
3343
252b5132
RH
3344 /* Classify all of the symbols. */
3345 for (idx = 0; idx < symcount; idx++)
3346 {
2633a79c 3347 if (sym_is_global (abfd, syms[idx]))
252b5132 3348 num_globals++;
2633a79c
AM
3349 else if (!ignore_section_sym (abfd, syms[idx]))
3350 num_locals++;
252b5132 3351 }
079e9a2f 3352
5372391b 3353 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3354 sections will already have a section symbol in outsymbols, but
3355 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3356 at least in that case. */
252b5132
RH
3357 for (asect = abfd->sections; asect; asect = asect->next)
3358 {
079e9a2f 3359 if (sect_syms[asect->index] == NULL)
252b5132 3360 {
079e9a2f 3361 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3362 num_locals++;
3363 else
3364 num_globals++;
252b5132
RH
3365 }
3366 }
3367
3368 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3369 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3370 sizeof (asymbol *));
dc810e39 3371
252b5132 3372 if (new_syms == NULL)
b34976b6 3373 return FALSE;
252b5132
RH
3374
3375 for (idx = 0; idx < symcount; idx++)
3376 {
3377 asymbol *sym = syms[idx];
dc810e39 3378 unsigned int i;
252b5132 3379
2633a79c
AM
3380 if (sym_is_global (abfd, sym))
3381 i = num_locals + num_globals2++;
3382 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
3383 i = num_locals2++;
3384 else
2633a79c 3385 continue;
252b5132
RH
3386 new_syms[i] = sym;
3387 sym->udata.i = i + 1;
3388 }
3389 for (asect = abfd->sections; asect; asect = asect->next)
3390 {
079e9a2f 3391 if (sect_syms[asect->index] == NULL)
252b5132 3392 {
079e9a2f 3393 asymbol *sym = asect->symbol;
dc810e39 3394 unsigned int i;
252b5132 3395
079e9a2f 3396 sect_syms[asect->index] = sym;
252b5132
RH
3397 if (!sym_is_global (abfd, sym))
3398 i = num_locals2++;
3399 else
3400 i = num_locals + num_globals2++;
3401 new_syms[i] = sym;
3402 sym->udata.i = i + 1;
3403 }
3404 }
3405
3406 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3407
12bd6957 3408 *pnum_locals = num_locals;
b34976b6 3409 return TRUE;
252b5132
RH
3410}
3411
3412/* Align to the maximum file alignment that could be required for any
3413 ELF data structure. */
3414
268b6b39 3415static inline file_ptr
217aa764 3416align_file_position (file_ptr off, int align)
252b5132
RH
3417{
3418 return (off + align - 1) & ~(align - 1);
3419}
3420
3421/* Assign a file position to a section, optionally aligning to the
3422 required section alignment. */
3423
217aa764
AM
3424file_ptr
3425_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3426 file_ptr offset,
3427 bfd_boolean align)
252b5132 3428{
72de5009
AM
3429 if (align && i_shdrp->sh_addralign > 1)
3430 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3431 i_shdrp->sh_offset = offset;
3432 if (i_shdrp->bfd_section != NULL)
3433 i_shdrp->bfd_section->filepos = offset;
3434 if (i_shdrp->sh_type != SHT_NOBITS)
3435 offset += i_shdrp->sh_size;
3436 return offset;
3437}
3438
3439/* Compute the file positions we are going to put the sections at, and
3440 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3441 is not NULL, this is being called by the ELF backend linker. */
3442
b34976b6 3443bfd_boolean
217aa764
AM
3444_bfd_elf_compute_section_file_positions (bfd *abfd,
3445 struct bfd_link_info *link_info)
252b5132 3446{
9c5bfbb7 3447 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3448 struct fake_section_arg fsargs;
b34976b6 3449 bfd_boolean failed;
4b6c0f2f 3450 struct bfd_strtab_hash *strtab = NULL;
252b5132 3451 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3452 bfd_boolean need_symtab;
252b5132
RH
3453
3454 if (abfd->output_has_begun)
b34976b6 3455 return TRUE;
252b5132
RH
3456
3457 /* Do any elf backend specific processing first. */
3458 if (bed->elf_backend_begin_write_processing)
3459 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3460
3461 if (! prep_headers (abfd))
b34976b6 3462 return FALSE;
252b5132 3463
e6c51ed4 3464 /* Post process the headers if necessary. */
78245035 3465 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 3466
d4730f92
BS
3467 fsargs.failed = FALSE;
3468 fsargs.link_info = link_info;
3469 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
3470 if (fsargs.failed)
b34976b6 3471 return FALSE;
252b5132 3472
da9f89d4 3473 if (!assign_section_numbers (abfd, link_info))
b34976b6 3474 return FALSE;
252b5132
RH
3475
3476 /* The backend linker builds symbol table information itself. */
3516e984
L
3477 need_symtab = (link_info == NULL
3478 && (bfd_get_symcount (abfd) > 0
3479 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3480 == HAS_RELOC)));
3481 if (need_symtab)
252b5132
RH
3482 {
3483 /* Non-zero if doing a relocatable link. */
3484 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3485
3486 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3487 return FALSE;
252b5132
RH
3488 }
3489
d4730f92 3490 failed = FALSE;
1126897b 3491 if (link_info == NULL)
dbb410c3 3492 {
1126897b 3493 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3494 if (failed)
b34976b6 3495 return FALSE;
dbb410c3
AM
3496 }
3497
252b5132
RH
3498 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3499 /* sh_name was set in prep_headers. */
3500 shstrtab_hdr->sh_type = SHT_STRTAB;
3501 shstrtab_hdr->sh_flags = 0;
3502 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3503 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3504 shstrtab_hdr->sh_entsize = 0;
3505 shstrtab_hdr->sh_link = 0;
3506 shstrtab_hdr->sh_info = 0;
3507 /* sh_offset is set in assign_file_positions_except_relocs. */
3508 shstrtab_hdr->sh_addralign = 1;
3509
c84fca4d 3510 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3511 return FALSE;
252b5132 3512
3516e984 3513 if (need_symtab)
252b5132
RH
3514 {
3515 file_ptr off;
3516 Elf_Internal_Shdr *hdr;
3517
12bd6957 3518 off = elf_next_file_pos (abfd);
252b5132
RH
3519
3520 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3521 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3522
9ad5cbcf
AM
3523 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3524 if (hdr->sh_size != 0)
b34976b6 3525 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3526
252b5132 3527 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3528 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3529
12bd6957 3530 elf_next_file_pos (abfd) = off;
252b5132
RH
3531
3532 /* Now that we know where the .strtab section goes, write it
08a40648 3533 out. */
252b5132
RH
3534 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3535 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3536 return FALSE;
252b5132
RH
3537 _bfd_stringtab_free (strtab);
3538 }
3539
b34976b6 3540 abfd->output_has_begun = TRUE;
252b5132 3541
b34976b6 3542 return TRUE;
252b5132
RH
3543}
3544
8ded5a0f
AM
3545/* Make an initial estimate of the size of the program header. If we
3546 get the number wrong here, we'll redo section placement. */
3547
3548static bfd_size_type
3549get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3550{
3551 size_t segs;
3552 asection *s;
2b05f1b7 3553 const struct elf_backend_data *bed;
8ded5a0f
AM
3554
3555 /* Assume we will need exactly two PT_LOAD segments: one for text
3556 and one for data. */
3557 segs = 2;
3558
3559 s = bfd_get_section_by_name (abfd, ".interp");
3560 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3561 {
3562 /* If we have a loadable interpreter section, we need a
3563 PT_INTERP segment. In this case, assume we also need a
3564 PT_PHDR segment, although that may not be true for all
3565 targets. */
3566 segs += 2;
3567 }
3568
3569 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3570 {
3571 /* We need a PT_DYNAMIC segment. */
3572 ++segs;
f210dcff 3573 }
08a40648 3574
ceae84aa 3575 if (info != NULL && info->relro)
f210dcff
L
3576 {
3577 /* We need a PT_GNU_RELRO segment. */
3578 ++segs;
8ded5a0f
AM
3579 }
3580
12bd6957 3581 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
3582 {
3583 /* We need a PT_GNU_EH_FRAME segment. */
3584 ++segs;
3585 }
3586
12bd6957 3587 if (elf_stack_flags (abfd))
8ded5a0f 3588 {
2b05f1b7
L
3589 /* We need a PT_GNU_STACK segment. */
3590 ++segs;
3591 }
94b11780 3592
2b05f1b7
L
3593 for (s = abfd->sections; s != NULL; s = s->next)
3594 {
8ded5a0f 3595 if ((s->flags & SEC_LOAD) != 0
0112cd26 3596 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3597 {
3598 /* We need a PT_NOTE segment. */
3599 ++segs;
1c5265b5
JJ
3600 /* Try to create just one PT_NOTE segment
3601 for all adjacent loadable .note* sections.
3602 gABI requires that within a PT_NOTE segment
3603 (and also inside of each SHT_NOTE section)
3604 each note is padded to a multiple of 4 size,
3605 so we check whether the sections are correctly
3606 aligned. */
3607 if (s->alignment_power == 2)
3608 while (s->next != NULL
3609 && s->next->alignment_power == 2
3610 && (s->next->flags & SEC_LOAD) != 0
3611 && CONST_STRNEQ (s->next->name, ".note"))
3612 s = s->next;
8ded5a0f
AM
3613 }
3614 }
3615
3616 for (s = abfd->sections; s != NULL; s = s->next)
3617 {
3618 if (s->flags & SEC_THREAD_LOCAL)
3619 {
3620 /* We need a PT_TLS segment. */
3621 ++segs;
3622 break;
3623 }
3624 }
3625
3626 /* Let the backend count up any program headers it might need. */
2b05f1b7 3627 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3628 if (bed->elf_backend_additional_program_headers)
3629 {
3630 int a;
3631
3632 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3633 if (a == -1)
3634 abort ();
3635 segs += a;
3636 }
3637
3638 return segs * bed->s->sizeof_phdr;
3639}
3640
2ea37f1c
NC
3641/* Find the segment that contains the output_section of section. */
3642
3643Elf_Internal_Phdr *
3644_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3645{
3646 struct elf_segment_map *m;
3647 Elf_Internal_Phdr *p;
3648
12bd6957 3649 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
3650 m != NULL;
3651 m = m->next, p++)
3652 {
3653 int i;
3654
3655 for (i = m->count - 1; i >= 0; i--)
3656 if (m->sections[i] == section)
3657 return p;
3658 }
3659
3660 return NULL;
3661}
3662
252b5132
RH
3663/* Create a mapping from a set of sections to a program segment. */
3664
217aa764
AM
3665static struct elf_segment_map *
3666make_mapping (bfd *abfd,
3667 asection **sections,
3668 unsigned int from,
3669 unsigned int to,
3670 bfd_boolean phdr)
252b5132
RH
3671{
3672 struct elf_segment_map *m;
3673 unsigned int i;
3674 asection **hdrpp;
dc810e39 3675 bfd_size_type amt;
252b5132 3676
dc810e39
AM
3677 amt = sizeof (struct elf_segment_map);
3678 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3679 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3680 if (m == NULL)
3681 return NULL;
3682 m->next = NULL;
3683 m->p_type = PT_LOAD;
3684 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3685 m->sections[i - from] = *hdrpp;
3686 m->count = to - from;
3687
3688 if (from == 0 && phdr)
3689 {
3690 /* Include the headers in the first PT_LOAD segment. */
3691 m->includes_filehdr = 1;
3692 m->includes_phdrs = 1;
3693 }
3694
3695 return m;
3696}
3697
229fcec5
MM
3698/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3699 on failure. */
3700
3701struct elf_segment_map *
3702_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3703{
3704 struct elf_segment_map *m;
3705
a50b1753
NC
3706 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3707 sizeof (struct elf_segment_map));
229fcec5
MM
3708 if (m == NULL)
3709 return NULL;
3710 m->next = NULL;
3711 m->p_type = PT_DYNAMIC;
3712 m->count = 1;
3713 m->sections[0] = dynsec;
08a40648 3714
229fcec5
MM
3715 return m;
3716}
3717
8ded5a0f 3718/* Possibly add or remove segments from the segment map. */
252b5132 3719
b34976b6 3720static bfd_boolean
3dea8fca
AM
3721elf_modify_segment_map (bfd *abfd,
3722 struct bfd_link_info *info,
3723 bfd_boolean remove_empty_load)
252b5132 3724{
252e386e 3725 struct elf_segment_map **m;
8ded5a0f 3726 const struct elf_backend_data *bed;
252b5132 3727
8ded5a0f
AM
3728 /* The placement algorithm assumes that non allocated sections are
3729 not in PT_LOAD segments. We ensure this here by removing such
3730 sections from the segment map. We also remove excluded
252e386e
AM
3731 sections. Finally, any PT_LOAD segment without sections is
3732 removed. */
12bd6957 3733 m = &elf_seg_map (abfd);
252e386e 3734 while (*m)
8ded5a0f
AM
3735 {
3736 unsigned int i, new_count;
252b5132 3737
252e386e 3738 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3739 {
252e386e
AM
3740 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3741 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3742 || (*m)->p_type != PT_LOAD))
8ded5a0f 3743 {
252e386e
AM
3744 (*m)->sections[new_count] = (*m)->sections[i];
3745 new_count++;
8ded5a0f
AM
3746 }
3747 }
252e386e 3748 (*m)->count = new_count;
252b5132 3749
3dea8fca 3750 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3751 *m = (*m)->next;
3752 else
3753 m = &(*m)->next;
8ded5a0f 3754 }
252b5132 3755
8ded5a0f
AM
3756 bed = get_elf_backend_data (abfd);
3757 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3758 {
252e386e 3759 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3760 return FALSE;
252b5132 3761 }
252b5132 3762
8ded5a0f
AM
3763 return TRUE;
3764}
252b5132 3765
8ded5a0f 3766/* Set up a mapping from BFD sections to program segments. */
252b5132 3767
8ded5a0f
AM
3768bfd_boolean
3769_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3770{
3771 unsigned int count;
3772 struct elf_segment_map *m;
3773 asection **sections = NULL;
3774 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3775 bfd_boolean no_user_phdrs;
252b5132 3776
12bd6957 3777 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
3778
3779 if (info != NULL)
3780 info->user_phdrs = !no_user_phdrs;
3781
3dea8fca 3782 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3783 {
8ded5a0f
AM
3784 asection *s;
3785 unsigned int i;
3786 struct elf_segment_map *mfirst;
3787 struct elf_segment_map **pm;
3788 asection *last_hdr;
3789 bfd_vma last_size;
3790 unsigned int phdr_index;
3791 bfd_vma maxpagesize;
3792 asection **hdrpp;
3793 bfd_boolean phdr_in_segment = TRUE;
3794 bfd_boolean writable;
3795 int tls_count = 0;
3796 asection *first_tls = NULL;
3797 asection *dynsec, *eh_frame_hdr;
3798 bfd_size_type amt;
8d06853e 3799 bfd_vma addr_mask, wrap_to = 0;
252b5132 3800
8ded5a0f 3801 /* Select the allocated sections, and sort them. */
252b5132 3802
a50b1753
NC
3803 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
3804 sizeof (asection *));
8ded5a0f 3805 if (sections == NULL)
252b5132 3806 goto error_return;
252b5132 3807
8d06853e
AM
3808 /* Calculate top address, avoiding undefined behaviour of shift
3809 left operator when shift count is equal to size of type
3810 being shifted. */
3811 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
3812 addr_mask = (addr_mask << 1) + 1;
3813
8ded5a0f
AM
3814 i = 0;
3815 for (s = abfd->sections; s != NULL; s = s->next)
3816 {
3817 if ((s->flags & SEC_ALLOC) != 0)
3818 {
3819 sections[i] = s;
3820 ++i;
8d06853e
AM
3821 /* A wrapping section potentially clashes with header. */
3822 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
3823 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
3824 }
3825 }
3826 BFD_ASSERT (i <= bfd_count_sections (abfd));
3827 count = i;
252b5132 3828
8ded5a0f 3829 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3830
8ded5a0f 3831 /* Build the mapping. */
252b5132 3832
8ded5a0f
AM
3833 mfirst = NULL;
3834 pm = &mfirst;
252b5132 3835
8ded5a0f
AM
3836 /* If we have a .interp section, then create a PT_PHDR segment for
3837 the program headers and a PT_INTERP segment for the .interp
3838 section. */
3839 s = bfd_get_section_by_name (abfd, ".interp");
3840 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3841 {
3842 amt = sizeof (struct elf_segment_map);
a50b1753 3843 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3844 if (m == NULL)
3845 goto error_return;
3846 m->next = NULL;
3847 m->p_type = PT_PHDR;
3848 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3849 m->p_flags = PF_R | PF_X;
3850 m->p_flags_valid = 1;
3851 m->includes_phdrs = 1;
252b5132 3852
8ded5a0f
AM
3853 *pm = m;
3854 pm = &m->next;
252b5132 3855
8ded5a0f 3856 amt = sizeof (struct elf_segment_map);
a50b1753 3857 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3858 if (m == NULL)
3859 goto error_return;
3860 m->next = NULL;
3861 m->p_type = PT_INTERP;
3862 m->count = 1;
3863 m->sections[0] = s;
3864
3865 *pm = m;
3866 pm = &m->next;
252b5132 3867 }
8ded5a0f
AM
3868
3869 /* Look through the sections. We put sections in the same program
3870 segment when the start of the second section can be placed within
3871 a few bytes of the end of the first section. */
3872 last_hdr = NULL;
3873 last_size = 0;
3874 phdr_index = 0;
3875 maxpagesize = bed->maxpagesize;
3876 writable = FALSE;
3877 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3878 if (dynsec != NULL
3879 && (dynsec->flags & SEC_LOAD) == 0)
3880 dynsec = NULL;
3881
3882 /* Deal with -Ttext or something similar such that the first section
3883 is not adjacent to the program headers. This is an
3884 approximation, since at this point we don't know exactly how many
3885 program headers we will need. */
3886 if (count > 0)
252b5132 3887 {
12bd6957 3888 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 3889
62d7a5f6 3890 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 3891 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 3892 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 3893 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
3894 || (sections[0]->lma & addr_mask) < phdr_size
3895 || ((sections[0]->lma & addr_mask) % maxpagesize
3896 < phdr_size % maxpagesize)
3897 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 3898 phdr_in_segment = FALSE;
252b5132
RH
3899 }
3900
8ded5a0f 3901 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3902 {
8ded5a0f
AM
3903 asection *hdr;
3904 bfd_boolean new_segment;
3905
3906 hdr = *hdrpp;
3907
3908 /* See if this section and the last one will fit in the same
3909 segment. */
3910
3911 if (last_hdr == NULL)
3912 {
3913 /* If we don't have a segment yet, then we don't need a new
3914 one (we build the last one after this loop). */
3915 new_segment = FALSE;
3916 }
3917 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3918 {
3919 /* If this section has a different relation between the
3920 virtual address and the load address, then we need a new
3921 segment. */
3922 new_segment = TRUE;
3923 }
b5599592
AM
3924 else if (hdr->lma < last_hdr->lma + last_size
3925 || last_hdr->lma + last_size < last_hdr->lma)
3926 {
3927 /* If this section has a load address that makes it overlap
3928 the previous section, then we need a new segment. */
3929 new_segment = TRUE;
3930 }
39948a60
NC
3931 /* In the next test we have to be careful when last_hdr->lma is close
3932 to the end of the address space. If the aligned address wraps
3933 around to the start of the address space, then there are no more
3934 pages left in memory and it is OK to assume that the current
3935 section can be included in the current segment. */
3936 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3937 > last_hdr->lma)
3938 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3939 <= hdr->lma))
8ded5a0f
AM
3940 {
3941 /* If putting this section in this segment would force us to
3942 skip a page in the segment, then we need a new segment. */
3943 new_segment = TRUE;
3944 }
3945 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3946 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3947 {
3948 /* We don't want to put a loadable section after a
3949 nonloadable section in the same segment.
3950 Consider .tbss sections as loadable for this purpose. */
3951 new_segment = TRUE;
3952 }
3953 else if ((abfd->flags & D_PAGED) == 0)
3954 {
3955 /* If the file is not demand paged, which means that we
3956 don't require the sections to be correctly aligned in the
3957 file, then there is no other reason for a new segment. */
3958 new_segment = FALSE;
3959 }
3960 else if (! writable
3961 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
3962 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
3963 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
3964 {
3965 /* We don't want to put a writable section in a read only
3966 segment, unless they are on the same page in memory
3967 anyhow. We already know that the last section does not
3968 bring us past the current section on the page, so the
3969 only case in which the new section is not on the same
3970 page as the previous section is when the previous section
3971 ends precisely on a page boundary. */
3972 new_segment = TRUE;
3973 }
3974 else
3975 {
3976 /* Otherwise, we can use the same segment. */
3977 new_segment = FALSE;
3978 }
3979
2889e75b 3980 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3981 if (last_hdr != NULL
3982 && info != NULL
3983 && info->callbacks->override_segment_assignment != NULL)
3984 new_segment
3985 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3986 last_hdr,
3987 new_segment);
2889e75b 3988
8ded5a0f
AM
3989 if (! new_segment)
3990 {
3991 if ((hdr->flags & SEC_READONLY) == 0)
3992 writable = TRUE;
3993 last_hdr = hdr;
3994 /* .tbss sections effectively have zero size. */
3995 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3996 != SEC_THREAD_LOCAL)
3997 last_size = hdr->size;
3998 else
3999 last_size = 0;
4000 continue;
4001 }
4002
4003 /* We need a new program segment. We must create a new program
4004 header holding all the sections from phdr_index until hdr. */
4005
4006 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4007 if (m == NULL)
4008 goto error_return;
4009
4010 *pm = m;
4011 pm = &m->next;
4012
252b5132 4013 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4014 writable = TRUE;
8ded5a0f
AM
4015 else
4016 writable = FALSE;
4017
baaff79e
JJ
4018 last_hdr = hdr;
4019 /* .tbss sections effectively have zero size. */
e5caec89 4020 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4021 last_size = hdr->size;
baaff79e
JJ
4022 else
4023 last_size = 0;
8ded5a0f
AM
4024 phdr_index = i;
4025 phdr_in_segment = FALSE;
252b5132
RH
4026 }
4027
86b2281f
AM
4028 /* Create a final PT_LOAD program segment, but not if it's just
4029 for .tbss. */
4030 if (last_hdr != NULL
4031 && (i - phdr_index != 1
4032 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4033 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4034 {
4035 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4036 if (m == NULL)
4037 goto error_return;
252b5132 4038
8ded5a0f
AM
4039 *pm = m;
4040 pm = &m->next;
4041 }
252b5132 4042
8ded5a0f
AM
4043 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4044 if (dynsec != NULL)
4045 {
4046 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4047 if (m == NULL)
4048 goto error_return;
4049 *pm = m;
4050 pm = &m->next;
4051 }
252b5132 4052
1c5265b5
JJ
4053 /* For each batch of consecutive loadable .note sections,
4054 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4055 because if we link together nonloadable .note sections and
4056 loadable .note sections, we will generate two .note sections
4057 in the output file. FIXME: Using names for section types is
4058 bogus anyhow. */
8ded5a0f
AM
4059 for (s = abfd->sections; s != NULL; s = s->next)
4060 {
4061 if ((s->flags & SEC_LOAD) != 0
0112cd26 4062 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4063 {
1c5265b5 4064 asection *s2;
91d6fa6a
NC
4065
4066 count = 1;
8ded5a0f 4067 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4068 if (s->alignment_power == 2)
4069 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4070 {
4071 if (s2->next->alignment_power == 2
4072 && (s2->next->flags & SEC_LOAD) != 0
4073 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4074 && align_power (s2->lma + s2->size, 2)
4075 == s2->next->lma)
55b581a6
JJ
4076 count++;
4077 else
4078 break;
4079 }
1c5265b5 4080 amt += (count - 1) * sizeof (asection *);
a50b1753 4081 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4082 if (m == NULL)
4083 goto error_return;
4084 m->next = NULL;
4085 m->p_type = PT_NOTE;
1c5265b5
JJ
4086 m->count = count;
4087 while (count > 1)
4088 {
4089 m->sections[m->count - count--] = s;
4090 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4091 s = s->next;
4092 }
4093 m->sections[m->count - 1] = s;
4094 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4095 *pm = m;
4096 pm = &m->next;
4097 }
4098 if (s->flags & SEC_THREAD_LOCAL)
4099 {
4100 if (! tls_count)
4101 first_tls = s;
4102 tls_count++;
4103 }
4104 }
252b5132 4105
8ded5a0f
AM
4106 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4107 if (tls_count > 0)
4108 {
8ded5a0f
AM
4109 amt = sizeof (struct elf_segment_map);
4110 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4111 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4112 if (m == NULL)
4113 goto error_return;
4114 m->next = NULL;
4115 m->p_type = PT_TLS;
4116 m->count = tls_count;
4117 /* Mandated PF_R. */
4118 m->p_flags = PF_R;
4119 m->p_flags_valid = 1;
91d6fa6a 4120 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f
AM
4121 {
4122 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
4123 m->sections[i] = first_tls;
4124 first_tls = first_tls->next;
4125 }
252b5132 4126
8ded5a0f
AM
4127 *pm = m;
4128 pm = &m->next;
4129 }
252b5132 4130
8ded5a0f
AM
4131 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4132 segment. */
12bd6957 4133 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4134 if (eh_frame_hdr != NULL
4135 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4136 {
dc810e39 4137 amt = sizeof (struct elf_segment_map);
a50b1753 4138 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4139 if (m == NULL)
4140 goto error_return;
4141 m->next = NULL;
8ded5a0f 4142 m->p_type = PT_GNU_EH_FRAME;
252b5132 4143 m->count = 1;
8ded5a0f 4144 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4145
4146 *pm = m;
4147 pm = &m->next;
4148 }
13ae64f3 4149
12bd6957 4150 if (elf_stack_flags (abfd))
13ae64f3 4151 {
8ded5a0f 4152 amt = sizeof (struct elf_segment_map);
a50b1753 4153 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4154 if (m == NULL)
4155 goto error_return;
4156 m->next = NULL;
2b05f1b7 4157 m->p_type = PT_GNU_STACK;
12bd6957 4158 m->p_flags = elf_stack_flags (abfd);
04c3a755 4159 m->p_align = bed->stack_align;
8ded5a0f 4160 m->p_flags_valid = 1;
04c3a755
NS
4161 m->p_align_valid = m->p_align != 0;
4162 if (info->stacksize > 0)
4163 {
4164 m->p_size = info->stacksize;
4165 m->p_size_valid = 1;
4166 }
252b5132 4167
8ded5a0f
AM
4168 *pm = m;
4169 pm = &m->next;
4170 }
65765700 4171
ceae84aa 4172 if (info != NULL && info->relro)
8ded5a0f 4173 {
f210dcff
L
4174 for (m = mfirst; m != NULL; m = m->next)
4175 {
3832a4d8
AM
4176 if (m->p_type == PT_LOAD
4177 && m->count != 0
4178 && m->sections[0]->vma >= info->relro_start
4179 && m->sections[0]->vma < info->relro_end)
f210dcff 4180 {
3832a4d8
AM
4181 i = m->count;
4182 while (--i != (unsigned) -1)
4183 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
4184 == (SEC_LOAD | SEC_HAS_CONTENTS))
4185 break;
4186
43a8475c 4187 if (i != (unsigned) -1)
f210dcff
L
4188 break;
4189 }
be01b344 4190 }
f210dcff
L
4191
4192 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4193 if (m != NULL)
4194 {
4195 amt = sizeof (struct elf_segment_map);
a50b1753 4196 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4197 if (m == NULL)
4198 goto error_return;
4199 m->next = NULL;
4200 m->p_type = PT_GNU_RELRO;
4201 m->p_flags = PF_R;
4202 m->p_flags_valid = 1;
4203
4204 *pm = m;
4205 pm = &m->next;
4206 }
8ded5a0f 4207 }
9ee5e499 4208
8ded5a0f 4209 free (sections);
12bd6957 4210 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
4211 }
4212
3dea8fca 4213 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4214 return FALSE;
8c37241b 4215
12bd6957 4216 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 4217 ++count;
12bd6957 4218 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 4219
b34976b6 4220 return TRUE;
252b5132
RH
4221
4222 error_return:
4223 if (sections != NULL)
4224 free (sections);
b34976b6 4225 return FALSE;
252b5132
RH
4226}
4227
4228/* Sort sections by address. */
4229
4230static int
217aa764 4231elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4232{
4233 const asection *sec1 = *(const asection **) arg1;
4234 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4235 bfd_size_type size1, size2;
252b5132
RH
4236
4237 /* Sort by LMA first, since this is the address used to
4238 place the section into a segment. */
4239 if (sec1->lma < sec2->lma)
4240 return -1;
4241 else if (sec1->lma > sec2->lma)
4242 return 1;
4243
4244 /* Then sort by VMA. Normally the LMA and the VMA will be
4245 the same, and this will do nothing. */
4246 if (sec1->vma < sec2->vma)
4247 return -1;
4248 else if (sec1->vma > sec2->vma)
4249 return 1;
4250
4251 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4252
07c6e936 4253#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4254
4255 if (TOEND (sec1))
4256 {
4257 if (TOEND (sec2))
00a7cdc5
NC
4258 {
4259 /* If the indicies are the same, do not return 0
4260 here, but continue to try the next comparison. */
4261 if (sec1->target_index - sec2->target_index != 0)
4262 return sec1->target_index - sec2->target_index;
4263 }
252b5132
RH
4264 else
4265 return 1;
4266 }
00a7cdc5 4267 else if (TOEND (sec2))
252b5132
RH
4268 return -1;
4269
4270#undef TOEND
4271
00a7cdc5
NC
4272 /* Sort by size, to put zero sized sections
4273 before others at the same address. */
252b5132 4274
eea6121a
AM
4275 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4276 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4277
4278 if (size1 < size2)
252b5132 4279 return -1;
eecdbe52 4280 if (size1 > size2)
252b5132
RH
4281 return 1;
4282
4283 return sec1->target_index - sec2->target_index;
4284}
4285
340b6d91
AC
4286/* Ian Lance Taylor writes:
4287
4288 We shouldn't be using % with a negative signed number. That's just
4289 not good. We have to make sure either that the number is not
4290 negative, or that the number has an unsigned type. When the types
4291 are all the same size they wind up as unsigned. When file_ptr is a
4292 larger signed type, the arithmetic winds up as signed long long,
4293 which is wrong.
4294
4295 What we're trying to say here is something like ``increase OFF by
4296 the least amount that will cause it to be equal to the VMA modulo
4297 the page size.'' */
4298/* In other words, something like:
4299
4300 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4301 off_offset = off % bed->maxpagesize;
4302 if (vma_offset < off_offset)
4303 adjustment = vma_offset + bed->maxpagesize - off_offset;
4304 else
4305 adjustment = vma_offset - off_offset;
08a40648 4306
340b6d91
AC
4307 which can can be collapsed into the expression below. */
4308
4309static file_ptr
4310vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4311{
dc9155b2
NC
4312 /* PR binutils/16199: Handle an alignment of zero. */
4313 if (maxpagesize == 0)
4314 maxpagesize = 1;
340b6d91
AC
4315 return ((vma - off) % maxpagesize);
4316}
4317
6d33f217
L
4318static void
4319print_segment_map (const struct elf_segment_map *m)
4320{
4321 unsigned int j;
4322 const char *pt = get_segment_type (m->p_type);
4323 char buf[32];
4324
4325 if (pt == NULL)
4326 {
4327 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4328 sprintf (buf, "LOPROC+%7.7x",
4329 (unsigned int) (m->p_type - PT_LOPROC));
4330 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4331 sprintf (buf, "LOOS+%7.7x",
4332 (unsigned int) (m->p_type - PT_LOOS));
4333 else
4334 snprintf (buf, sizeof (buf), "%8.8x",
4335 (unsigned int) m->p_type);
4336 pt = buf;
4337 }
4a97a0e5 4338 fflush (stdout);
6d33f217
L
4339 fprintf (stderr, "%s:", pt);
4340 for (j = 0; j < m->count; j++)
4341 fprintf (stderr, " %s", m->sections [j]->name);
4342 putc ('\n',stderr);
4a97a0e5 4343 fflush (stderr);
6d33f217
L
4344}
4345
32812159
AM
4346static bfd_boolean
4347write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4348{
4349 void *buf;
4350 bfd_boolean ret;
4351
4352 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4353 return FALSE;
4354 buf = bfd_zmalloc (len);
4355 if (buf == NULL)
4356 return FALSE;
4357 ret = bfd_bwrite (buf, len, abfd) == len;
4358 free (buf);
4359 return ret;
4360}
4361
252b5132
RH
4362/* Assign file positions to the sections based on the mapping from
4363 sections to segments. This function also sets up some fields in
f3520d2f 4364 the file header. */
252b5132 4365
b34976b6 4366static bfd_boolean
f3520d2f
AM
4367assign_file_positions_for_load_sections (bfd *abfd,
4368 struct bfd_link_info *link_info)
252b5132
RH
4369{
4370 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4371 struct elf_segment_map *m;
252b5132 4372 Elf_Internal_Phdr *phdrs;
252b5132 4373 Elf_Internal_Phdr *p;
02bf8d82 4374 file_ptr off;
3f570048 4375 bfd_size_type maxpagesize;
f3520d2f 4376 unsigned int alloc;
0920dee7 4377 unsigned int i, j;
2b0bc088 4378 bfd_vma header_pad = 0;
252b5132 4379
e36284ab 4380 if (link_info == NULL
ceae84aa 4381 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4382 return FALSE;
252b5132 4383
8ded5a0f 4384 alloc = 0;
12bd6957 4385 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
4386 {
4387 ++alloc;
4388 if (m->header_size)
4389 header_pad = m->header_size;
4390 }
252b5132 4391
82f2dbf7
NC
4392 if (alloc)
4393 {
4394 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4395 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4396 }
4397 else
4398 {
4399 /* PR binutils/12467. */
4400 elf_elfheader (abfd)->e_phoff = 0;
4401 elf_elfheader (abfd)->e_phentsize = 0;
4402 }
d324f6d6 4403
8ded5a0f 4404 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4405
12bd6957
AM
4406 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
4407 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 4408 else
12bd6957 4409 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 4410 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4411
4412 if (alloc == 0)
f3520d2f 4413 {
12bd6957 4414 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 4415 return TRUE;
f3520d2f 4416 }
252b5132 4417
12bd6957 4418 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
4419 see assign_file_positions_except_relocs, so make sure we have
4420 that amount allocated, with trailing space cleared.
12bd6957
AM
4421 The variable alloc contains the computed need, while
4422 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
4423 layout.
4424 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4425 where the layout is forced to according to a larger size in the
4426 last iterations for the testcase ld-elf/header. */
12bd6957 4427 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 4428 == 0);
a50b1753
NC
4429 phdrs = (Elf_Internal_Phdr *)
4430 bfd_zalloc2 (abfd,
12bd6957 4431 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 4432 sizeof (Elf_Internal_Phdr));
f3520d2f 4433 elf_tdata (abfd)->phdr = phdrs;
252b5132 4434 if (phdrs == NULL)
b34976b6 4435 return FALSE;
252b5132 4436
3f570048
AM
4437 maxpagesize = 1;
4438 if ((abfd->flags & D_PAGED) != 0)
4439 maxpagesize = bed->maxpagesize;
4440
252b5132
RH
4441 off = bed->s->sizeof_ehdr;
4442 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4443 if (header_pad < (bfd_vma) off)
4444 header_pad = 0;
4445 else
4446 header_pad -= off;
4447 off += header_pad;
252b5132 4448
12bd6957 4449 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 4450 m != NULL;
0920dee7 4451 m = m->next, p++, j++)
252b5132 4452 {
252b5132 4453 asection **secpp;
bf988460
AM
4454 bfd_vma off_adjust;
4455 bfd_boolean no_contents;
252b5132
RH
4456
4457 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4458 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4459 not be done to the PT_NOTE section of a corefile, which may
4460 contain several pseudo-sections artificially created by bfd.
4461 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4462 if (m->count > 1
4463 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4464 && m->p_type == PT_NOTE))
252b5132
RH
4465 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4466 elf_sort_sections);
4467
b301b248
AM
4468 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4469 number of sections with contents contributing to both p_filesz
4470 and p_memsz, followed by a number of sections with no contents
4471 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4472 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4473 p->p_type = m->p_type;
28a7f3e7 4474 p->p_flags = m->p_flags;
252b5132 4475
3f570048
AM
4476 if (m->count == 0)
4477 p->p_vaddr = 0;
4478 else
3271a814 4479 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4480
4481 if (m->p_paddr_valid)
4482 p->p_paddr = m->p_paddr;
4483 else if (m->count == 0)
4484 p->p_paddr = 0;
4485 else
08a40648 4486 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4487
4488 if (p->p_type == PT_LOAD
4489 && (abfd->flags & D_PAGED) != 0)
4490 {
4491 /* p_align in demand paged PT_LOAD segments effectively stores
4492 the maximum page size. When copying an executable with
4493 objcopy, we set m->p_align from the input file. Use this
4494 value for maxpagesize rather than bed->maxpagesize, which
4495 may be different. Note that we use maxpagesize for PT_TLS
4496 segment alignment later in this function, so we are relying
4497 on at least one PT_LOAD segment appearing before a PT_TLS
4498 segment. */
4499 if (m->p_align_valid)
4500 maxpagesize = m->p_align;
4501
4502 p->p_align = maxpagesize;
4503 }
3271a814
NS
4504 else if (m->p_align_valid)
4505 p->p_align = m->p_align;
e970b90a
DJ
4506 else if (m->count == 0)
4507 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4508 else
4509 p->p_align = 0;
4510
bf988460
AM
4511 no_contents = FALSE;
4512 off_adjust = 0;
252b5132 4513 if (p->p_type == PT_LOAD
b301b248 4514 && m->count > 0)
252b5132 4515 {
b301b248 4516 bfd_size_type align;
a49e53ed 4517 unsigned int align_power = 0;
b301b248 4518
3271a814
NS
4519 if (m->p_align_valid)
4520 align = p->p_align;
4521 else
252b5132 4522 {
3271a814
NS
4523 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4524 {
4525 unsigned int secalign;
08a40648 4526
3271a814
NS
4527 secalign = bfd_get_section_alignment (abfd, *secpp);
4528 if (secalign > align_power)
4529 align_power = secalign;
4530 }
4531 align = (bfd_size_type) 1 << align_power;
4532 if (align < maxpagesize)
4533 align = maxpagesize;
b301b248 4534 }
252b5132 4535
02bf8d82
AM
4536 for (i = 0; i < m->count; i++)
4537 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4538 /* If we aren't making room for this section, then
4539 it must be SHT_NOBITS regardless of what we've
4540 set via struct bfd_elf_special_section. */
4541 elf_section_type (m->sections[i]) = SHT_NOBITS;
4542
bf988460 4543 /* Find out whether this segment contains any loadable
aea274d3
AM
4544 sections. */
4545 no_contents = TRUE;
4546 for (i = 0; i < m->count; i++)
4547 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4548 {
4549 no_contents = FALSE;
4550 break;
4551 }
bf988460 4552
85cfcbfb 4553 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
4554 off += off_adjust;
4555 if (no_contents)
4556 {
4557 /* We shouldn't need to align the segment on disk since
4558 the segment doesn't need file space, but the gABI
4559 arguably requires the alignment and glibc ld.so
4560 checks it. So to comply with the alignment
4561 requirement but not waste file space, we adjust
4562 p_offset for just this segment. (OFF_ADJUST is
4563 subtracted from OFF later.) This may put p_offset
4564 past the end of file, but that shouldn't matter. */
4565 }
4566 else
4567 off_adjust = 0;
252b5132 4568 }
b1a6d0b1
NC
4569 /* Make sure the .dynamic section is the first section in the
4570 PT_DYNAMIC segment. */
4571 else if (p->p_type == PT_DYNAMIC
4572 && m->count > 1
4573 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4574 {
4575 _bfd_error_handler
b301b248
AM
4576 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4577 abfd);
b1a6d0b1
NC
4578 bfd_set_error (bfd_error_bad_value);
4579 return FALSE;
4580 }
3f001e84
JK
4581 /* Set the note section type to SHT_NOTE. */
4582 else if (p->p_type == PT_NOTE)
4583 for (i = 0; i < m->count; i++)
4584 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4585
252b5132
RH
4586 p->p_offset = 0;
4587 p->p_filesz = 0;
4588 p->p_memsz = 0;
4589
4590 if (m->includes_filehdr)
4591 {
bf988460 4592 if (!m->p_flags_valid)
252b5132 4593 p->p_flags |= PF_R;
252b5132
RH
4594 p->p_filesz = bed->s->sizeof_ehdr;
4595 p->p_memsz = bed->s->sizeof_ehdr;
4596 if (m->count > 0)
4597 {
252b5132
RH
4598 if (p->p_vaddr < (bfd_vma) off)
4599 {
caf47ea6 4600 (*_bfd_error_handler)
b301b248
AM
4601 (_("%B: Not enough room for program headers, try linking with -N"),
4602 abfd);
252b5132 4603 bfd_set_error (bfd_error_bad_value);
b34976b6 4604 return FALSE;
252b5132
RH
4605 }
4606
4607 p->p_vaddr -= off;
bf988460 4608 if (!m->p_paddr_valid)
252b5132
RH
4609 p->p_paddr -= off;
4610 }
252b5132
RH
4611 }
4612
4613 if (m->includes_phdrs)
4614 {
bf988460 4615 if (!m->p_flags_valid)
252b5132
RH
4616 p->p_flags |= PF_R;
4617
f3520d2f 4618 if (!m->includes_filehdr)
252b5132
RH
4619 {
4620 p->p_offset = bed->s->sizeof_ehdr;
4621
4622 if (m->count > 0)
4623 {
252b5132 4624 p->p_vaddr -= off - p->p_offset;
bf988460 4625 if (!m->p_paddr_valid)
252b5132
RH
4626 p->p_paddr -= off - p->p_offset;
4627 }
252b5132
RH
4628 }
4629
4630 p->p_filesz += alloc * bed->s->sizeof_phdr;
4631 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4632 if (m->count)
4633 {
4634 p->p_filesz += header_pad;
4635 p->p_memsz += header_pad;
4636 }
252b5132
RH
4637 }
4638
4639 if (p->p_type == PT_LOAD
4640 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4641 {
bf988460 4642 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4643 p->p_offset = off;
252b5132
RH
4644 else
4645 {
4646 file_ptr adjust;
4647
4648 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4649 if (!no_contents)
4650 p->p_filesz += adjust;
252b5132
RH
4651 p->p_memsz += adjust;
4652 }
4653 }
4654
1ea63fd2
AM
4655 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4656 maps. Set filepos for sections in PT_LOAD segments, and in
4657 core files, for sections in PT_NOTE segments.
4658 assign_file_positions_for_non_load_sections will set filepos
4659 for other sections and update p_filesz for other segments. */
252b5132
RH
4660 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4661 {
4662 asection *sec;
252b5132 4663 bfd_size_type align;
627b32bc 4664 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4665
4666 sec = *secpp;
02bf8d82 4667 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4668 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4669
88967714
AM
4670 if ((p->p_type == PT_LOAD
4671 || p->p_type == PT_TLS)
4672 && (this_hdr->sh_type != SHT_NOBITS
4673 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4674 && ((this_hdr->sh_flags & SHF_TLS) == 0
4675 || p->p_type == PT_TLS))))
252b5132 4676 {
b5599592
AM
4677 bfd_vma p_start = p->p_paddr;
4678 bfd_vma p_end = p_start + p->p_memsz;
4679 bfd_vma s_start = sec->lma;
4680 bfd_vma adjust = s_start - p_end;
252b5132 4681
a2d1e028
L
4682 if (adjust != 0
4683 && (s_start < p_end
4684 || p_end < p_start))
252b5132 4685 {
88967714 4686 (*_bfd_error_handler)
b5599592
AM
4687 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
4688 (unsigned long) s_start, (unsigned long) p_end);
88967714 4689 adjust = 0;
b5599592 4690 sec->lma = p_end;
1cfb7d1e 4691 }
3ac9b6c9 4692 p->p_memsz += adjust;
1cfb7d1e 4693
88967714
AM
4694 if (this_hdr->sh_type != SHT_NOBITS)
4695 {
32812159
AM
4696 if (p->p_filesz + adjust < p->p_memsz)
4697 {
4698 /* We have a PROGBITS section following NOBITS ones.
4699 Allocate file space for the NOBITS section(s) and
4700 zero it. */
4701 adjust = p->p_memsz - p->p_filesz;
4702 if (!write_zeros (abfd, off, adjust))
4703 return FALSE;
4704 }
88967714
AM
4705 off += adjust;
4706 p->p_filesz += adjust;
252b5132 4707 }
252b5132
RH
4708 }
4709
4710 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4711 {
b301b248
AM
4712 /* The section at i == 0 is the one that actually contains
4713 everything. */
4a938328
MS
4714 if (i == 0)
4715 {
627b32bc 4716 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4717 off += this_hdr->sh_size;
4718 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4719 p->p_memsz = 0;
4720 p->p_align = 1;
252b5132 4721 }
4a938328 4722 else
252b5132 4723 {
b301b248 4724 /* The rest are fake sections that shouldn't be written. */
252b5132 4725 sec->filepos = 0;
eea6121a 4726 sec->size = 0;
b301b248
AM
4727 sec->flags = 0;
4728 continue;
252b5132 4729 }
252b5132
RH
4730 }
4731 else
4732 {
1e951488 4733 if (p->p_type == PT_LOAD)
b301b248 4734 {
1e951488
AM
4735 this_hdr->sh_offset = sec->filepos = off;
4736 if (this_hdr->sh_type != SHT_NOBITS)
4737 off += this_hdr->sh_size;
4738 }
4739 else if (this_hdr->sh_type == SHT_NOBITS
4740 && (this_hdr->sh_flags & SHF_TLS) != 0
4741 && this_hdr->sh_offset == 0)
4742 {
4743 /* This is a .tbss section that didn't get a PT_LOAD.
4744 (See _bfd_elf_map_sections_to_segments "Create a
4745 final PT_LOAD".) Set sh_offset to the value it
4746 would have if we had created a zero p_filesz and
4747 p_memsz PT_LOAD header for the section. This
4748 also makes the PT_TLS header have the same
4749 p_offset value. */
4750 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
4751 off, align);
4752 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 4753 }
252b5132 4754
02bf8d82 4755 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4756 {
6a3cd2b4 4757 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4758 /* A load section without SHF_ALLOC is something like
4759 a note section in a PT_NOTE segment. These take
4760 file space but are not loaded into memory. */
4761 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4762 p->p_memsz += this_hdr->sh_size;
b301b248 4763 }
6a3cd2b4 4764 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4765 {
6a3cd2b4
AM
4766 if (p->p_type == PT_TLS)
4767 p->p_memsz += this_hdr->sh_size;
4768
4769 /* .tbss is special. It doesn't contribute to p_memsz of
4770 normal segments. */
4771 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4772 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4773 }
4774
b10a8ae0
L
4775 if (align > p->p_align
4776 && !m->p_align_valid
4777 && (p->p_type != PT_LOAD
4778 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4779 p->p_align = align;
4780 }
4781
bf988460 4782 if (!m->p_flags_valid)
252b5132
RH
4783 {
4784 p->p_flags |= PF_R;
02bf8d82 4785 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4786 p->p_flags |= PF_X;
02bf8d82 4787 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4788 p->p_flags |= PF_W;
4789 }
4790 }
43a8475c 4791
bf988460 4792 off -= off_adjust;
0920dee7 4793
7c928300
AM
4794 /* Check that all sections are in a PT_LOAD segment.
4795 Don't check funky gdb generated core files. */
4796 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
4797 {
4798 bfd_boolean check_vma = TRUE;
4799
4800 for (i = 1; i < m->count; i++)
4801 if (m->sections[i]->vma == m->sections[i - 1]->vma
4802 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
4803 ->this_hdr), p) != 0
4804 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
4805 ->this_hdr), p) != 0)
0920dee7 4806 {
9a83a553
AM
4807 /* Looks like we have overlays packed into the segment. */
4808 check_vma = FALSE;
4809 break;
0920dee7 4810 }
9a83a553
AM
4811
4812 for (i = 0; i < m->count; i++)
4813 {
4814 Elf_Internal_Shdr *this_hdr;
4815 asection *sec;
4816
4817 sec = m->sections[i];
4818 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
4819 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
4820 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553
AM
4821 {
4822 (*_bfd_error_handler)
4823 (_("%B: section `%A' can't be allocated in segment %d"),
4824 abfd, sec, j);
4825 print_segment_map (m);
4826 }
4827 }
4828 }
252b5132
RH
4829 }
4830
12bd6957 4831 elf_next_file_pos (abfd) = off;
f3520d2f
AM
4832 return TRUE;
4833}
4834
4835/* Assign file positions for the other sections. */
4836
4837static bfd_boolean
4838assign_file_positions_for_non_load_sections (bfd *abfd,
4839 struct bfd_link_info *link_info)
4840{
4841 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4842 Elf_Internal_Shdr **i_shdrpp;
4843 Elf_Internal_Shdr **hdrpp;
4844 Elf_Internal_Phdr *phdrs;
4845 Elf_Internal_Phdr *p;
4846 struct elf_segment_map *m;
62655c7b 4847 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
4848 bfd_vma filehdr_vaddr, filehdr_paddr;
4849 bfd_vma phdrs_vaddr, phdrs_paddr;
4850 file_ptr off;
4851 unsigned int num_sec;
4852 unsigned int i;
4853 unsigned int count;
4854
5c182d5f
AM
4855 i_shdrpp = elf_elfsections (abfd);
4856 num_sec = elf_numsections (abfd);
12bd6957 4857 off = elf_next_file_pos (abfd);
5c182d5f
AM
4858 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4859 {
5c182d5f
AM
4860 Elf_Internal_Shdr *hdr;
4861
4862 hdr = *hdrpp;
4863 if (hdr->bfd_section != NULL
252e386e
AM
4864 && (hdr->bfd_section->filepos != 0
4865 || (hdr->sh_type == SHT_NOBITS
4866 && hdr->contents == NULL)))
627b32bc 4867 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4868 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4869 {
e8d2ba53
AM
4870 if (hdr->sh_size != 0)
4871 (*_bfd_error_handler)
4872 (_("%B: warning: allocated section `%s' not in segment"),
4873 abfd,
4874 (hdr->bfd_section == NULL
4875 ? "*unknown*"
4876 : hdr->bfd_section->name));
3ba71138
L
4877 /* We don't need to page align empty sections. */
4878 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4879 off += vma_page_aligned_bias (hdr->sh_addr, off,
4880 bed->maxpagesize);
4881 else
4882 off += vma_page_aligned_bias (hdr->sh_addr, off,
4883 hdr->sh_addralign);
4884 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4885 FALSE);
4886 }
4887 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4888 && hdr->bfd_section == NULL)
12bd6957
AM
4889 || hdr == i_shdrpp[elf_onesymtab (abfd)]
4890 || hdr == i_shdrpp[elf_symtab_shndx (abfd)]
4891 || hdr == i_shdrpp[elf_strtab_sec (abfd)])
5c182d5f
AM
4892 hdr->sh_offset = -1;
4893 else
4894 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4895 }
4896
252b5132
RH
4897 /* Now that we have set the section file positions, we can set up
4898 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4899 count = 0;
4900 filehdr_vaddr = 0;
4901 filehdr_paddr = 0;
4902 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4903 phdrs_paddr = 0;
62655c7b 4904 hdrs_segment = NULL;
f3520d2f 4905 phdrs = elf_tdata (abfd)->phdr;
12bd6957 4906 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
4907 {
4908 ++count;
4909 if (p->p_type != PT_LOAD)
4910 continue;
4911
4912 if (m->includes_filehdr)
4913 {
4914 filehdr_vaddr = p->p_vaddr;
4915 filehdr_paddr = p->p_paddr;
4916 }
4917 if (m->includes_phdrs)
4918 {
4919 phdrs_vaddr = p->p_vaddr;
4920 phdrs_paddr = p->p_paddr;
4921 if (m->includes_filehdr)
4922 {
62655c7b 4923 hdrs_segment = m;
f3520d2f
AM
4924 phdrs_vaddr += bed->s->sizeof_ehdr;
4925 phdrs_paddr += bed->s->sizeof_ehdr;
4926 }
4927 }
4928 }
4929
62655c7b
RM
4930 if (hdrs_segment != NULL && link_info != NULL)
4931 {
4932 /* There is a segment that contains both the file headers and the
4933 program headers, so provide a symbol __ehdr_start pointing there.
4934 A program can use this to examine itself robustly. */
4935
4936 struct elf_link_hash_entry *hash
4937 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
4938 FALSE, FALSE, TRUE);
4939 /* If the symbol was referenced and not defined, define it. */
4940 if (hash != NULL
4941 && (hash->root.type == bfd_link_hash_new
4942 || hash->root.type == bfd_link_hash_undefined
4943 || hash->root.type == bfd_link_hash_undefweak
4944 || hash->root.type == bfd_link_hash_common))
4945 {
4946 asection *s = NULL;
4947 if (hdrs_segment->count != 0)
4948 /* The segment contains sections, so use the first one. */
4949 s = hdrs_segment->sections[0];
4950 else
4951 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 4952 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
4953 if (m->count != 0)
4954 {
4955 s = m->sections[0];
4956 break;
4957 }
4958
4959 if (s != NULL)
4960 {
4961 hash->root.u.def.value = filehdr_vaddr - s->vma;
4962 hash->root.u.def.section = s;
4963 }
4964 else
4965 {
4966 hash->root.u.def.value = filehdr_vaddr;
4967 hash->root.u.def.section = bfd_abs_section_ptr;
4968 }
4969
4970 hash->root.type = bfd_link_hash_defined;
4971 hash->def_regular = 1;
4972 hash->non_elf = 0;
4973 }
4974 }
4975
12bd6957 4976 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 4977 {
129af99f 4978 if (p->p_type == PT_GNU_RELRO)
252b5132 4979 {
b84a33b5 4980 const Elf_Internal_Phdr *lp;
3146fac4 4981 struct elf_segment_map *lm;
1ea63fd2 4982
129af99f 4983 if (link_info != NULL)
8c37241b 4984 {
129af99f
AS
4985 /* During linking the range of the RELRO segment is passed
4986 in link_info. */
12bd6957 4987 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
4988 lm != NULL;
4989 lm = lm->next, lp++)
8c37241b
JJ
4990 {
4991 if (lp->p_type == PT_LOAD
b84a33b5 4992 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
4993 && lm->count != 0
4994 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
4995 break;
4996 }
8981c88a 4997
3146fac4 4998 BFD_ASSERT (lm != NULL);
8c37241b 4999 }
129af99f
AS
5000 else
5001 {
5002 /* Otherwise we are copying an executable or shared
b84a33b5 5003 library, but we need to use the same linker logic. */
129af99f
AS
5004 for (lp = phdrs; lp < phdrs + count; ++lp)
5005 {
5006 if (lp->p_type == PT_LOAD
5007 && lp->p_paddr == p->p_paddr)
5008 break;
5009 }
b84a33b5
AM
5010 }
5011
5012 if (lp < phdrs + count)
5013 {
5014 p->p_vaddr = lp->p_vaddr;
5015 p->p_paddr = lp->p_paddr;
5016 p->p_offset = lp->p_offset;
5017 if (link_info != NULL)
5018 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5019 else if (m->p_size_valid)
5020 p->p_filesz = m->p_size;
129af99f
AS
5021 else
5022 abort ();
b84a33b5 5023 p->p_memsz = p->p_filesz;
f3944f72
L
5024 /* Preserve the alignment and flags if they are valid. The
5025 gold linker generates RW/4 for the PT_GNU_RELRO section.
5026 It is better for objcopy/strip to honor these attributes
5027 otherwise gdb will choke when using separate debug files.
5028 */
5029 if (!m->p_align_valid)
5030 p->p_align = 1;
5031 if (!m->p_flags_valid)
5032 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 5033 }
9433b9b1 5034 else
b84a33b5
AM
5035 {
5036 memset (p, 0, sizeof *p);
5037 p->p_type = PT_NULL;
5038 }
129af99f 5039 }
04c3a755
NS
5040 else if (p->p_type == PT_GNU_STACK)
5041 {
5042 if (m->p_size_valid)
5043 p->p_memsz = m->p_size;
5044 }
129af99f
AS
5045 else if (m->count != 0)
5046 {
5047 if (p->p_type != PT_LOAD
5048 && (p->p_type != PT_NOTE
5049 || bfd_get_format (abfd) != bfd_core))
5050 {
129af99f
AS
5051 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
5052
86b2281f 5053 p->p_filesz = 0;
129af99f 5054 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5055 for (i = m->count; i-- != 0;)
5056 {
5057 asection *sect = m->sections[i];
5058 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5059 if (hdr->sh_type != SHT_NOBITS)
5060 {
5061 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5062 + hdr->sh_size);
5063 break;
5064 }
5065 }
129af99f
AS
5066 }
5067 }
5068 else if (m->includes_filehdr)
5069 {
5070 p->p_vaddr = filehdr_vaddr;
5071 if (! m->p_paddr_valid)
5072 p->p_paddr = filehdr_paddr;
5073 }
5074 else if (m->includes_phdrs)
5075 {
5076 p->p_vaddr = phdrs_vaddr;
5077 if (! m->p_paddr_valid)
5078 p->p_paddr = phdrs_paddr;
252b5132
RH
5079 }
5080 }
5081
12bd6957 5082 elf_next_file_pos (abfd) = off;
252b5132 5083
b34976b6 5084 return TRUE;
252b5132
RH
5085}
5086
252b5132
RH
5087/* Work out the file positions of all the sections. This is called by
5088 _bfd_elf_compute_section_file_positions. All the section sizes and
5089 VMAs must be known before this is called.
5090
e0638f70
AM
5091 Reloc sections come in two flavours: Those processed specially as
5092 "side-channel" data attached to a section to which they apply, and
5093 those that bfd doesn't process as relocations. The latter sort are
5094 stored in a normal bfd section by bfd_section_from_shdr. We don't
5095 consider the former sort here, unless they form part of the loadable
5096 image. Reloc sections not assigned here will be handled later by
5097 assign_file_positions_for_relocs.
252b5132
RH
5098
5099 We also don't set the positions of the .symtab and .strtab here. */
5100
b34976b6 5101static bfd_boolean
c84fca4d
AO
5102assign_file_positions_except_relocs (bfd *abfd,
5103 struct bfd_link_info *link_info)
252b5132 5104{
5c182d5f
AM
5105 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5106 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 5107 file_ptr off;
9c5bfbb7 5108 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5109
5110 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5111 && bfd_get_format (abfd) != bfd_core)
5112 {
5c182d5f
AM
5113 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5114 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5115 Elf_Internal_Shdr **hdrpp;
5116 unsigned int i;
5117
5118 /* Start after the ELF header. */
5119 off = i_ehdrp->e_ehsize;
5120
5121 /* We are not creating an executable, which means that we are
5122 not creating a program header, and that the actual order of
5123 the sections in the file is unimportant. */
9ad5cbcf 5124 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5125 {
5126 Elf_Internal_Shdr *hdr;
5127
5128 hdr = *hdrpp;
e0638f70
AM
5129 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5130 && hdr->bfd_section == NULL)
12bd6957
AM
5131 || i == elf_onesymtab (abfd)
5132 || i == elf_symtab_shndx (abfd)
5133 || i == elf_strtab_sec (abfd))
252b5132
RH
5134 {
5135 hdr->sh_offset = -1;
252b5132 5136 }
9ad5cbcf 5137 else
b34976b6 5138 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
5139 }
5140 }
5141 else
5142 {
f3520d2f
AM
5143 unsigned int alloc;
5144
252b5132 5145 /* Assign file positions for the loaded sections based on the
08a40648 5146 assignment of sections to segments. */
f3520d2f
AM
5147 if (!assign_file_positions_for_load_sections (abfd, link_info))
5148 return FALSE;
5149
5150 /* And for non-load sections. */
5151 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
5152 return FALSE;
5153
e36284ab
AM
5154 if (bed->elf_backend_modify_program_headers != NULL)
5155 {
5156 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
5157 return FALSE;
5158 }
5159
58e7ebac
L
5160 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
5161 if (link_info != NULL
5162 && link_info->executable
5163 && link_info->shared)
5164 {
5165 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
5166 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
5167 Elf_Internal_Phdr *end_segment = &segment[num_segments];
5168
5169 /* Find the lowest p_vaddr in PT_LOAD segments. */
5170 bfd_vma p_vaddr = (bfd_vma) -1;
5171 for (; segment < end_segment; segment++)
5172 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
5173 p_vaddr = segment->p_vaddr;
5174
5175 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
5176 segments is non-zero. */
5177 if (p_vaddr)
5178 i_ehdrp->e_type = ET_EXEC;
5179 }
5180
f3520d2f 5181 /* Write out the program headers. */
12bd6957 5182 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
f3520d2f
AM
5183 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
5184 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 5185 return FALSE;
252b5132 5186
12bd6957 5187 off = elf_next_file_pos (abfd);
252b5132
RH
5188 }
5189
5190 /* Place the section headers. */
45d6a902 5191 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
5192 i_ehdrp->e_shoff = off;
5193 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
5194
12bd6957 5195 elf_next_file_pos (abfd) = off;
252b5132 5196
b34976b6 5197 return TRUE;
252b5132
RH
5198}
5199
b34976b6 5200static bfd_boolean
217aa764 5201prep_headers (bfd *abfd)
252b5132 5202{
3d540e93 5203 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 5204 struct elf_strtab_hash *shstrtab;
9c5bfbb7 5205 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5206
5207 i_ehdrp = elf_elfheader (abfd);
252b5132 5208
2b0f7ef9 5209 shstrtab = _bfd_elf_strtab_init ();
252b5132 5210 if (shstrtab == NULL)
b34976b6 5211 return FALSE;
252b5132
RH
5212
5213 elf_shstrtab (abfd) = shstrtab;
5214
5215 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
5216 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
5217 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
5218 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
5219
5220 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
5221 i_ehdrp->e_ident[EI_DATA] =
5222 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
5223 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
5224
252b5132
RH
5225 if ((abfd->flags & DYNAMIC) != 0)
5226 i_ehdrp->e_type = ET_DYN;
5227 else if ((abfd->flags & EXEC_P) != 0)
5228 i_ehdrp->e_type = ET_EXEC;
5229 else if (bfd_get_format (abfd) == bfd_core)
5230 i_ehdrp->e_type = ET_CORE;
5231 else
5232 i_ehdrp->e_type = ET_REL;
5233
5234 switch (bfd_get_arch (abfd))
5235 {
5236 case bfd_arch_unknown:
5237 i_ehdrp->e_machine = EM_NONE;
5238 break;
aa4f99bb
AO
5239
5240 /* There used to be a long list of cases here, each one setting
5241 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
5242 in the corresponding bfd definition. To avoid duplication,
5243 the switch was removed. Machines that need special handling
5244 can generally do it in elf_backend_final_write_processing(),
5245 unless they need the information earlier than the final write.
5246 Such need can generally be supplied by replacing the tests for
5247 e_machine with the conditions used to determine it. */
252b5132 5248 default:
9c5bfbb7
AM
5249 i_ehdrp->e_machine = bed->elf_machine_code;
5250 }
aa4f99bb 5251
252b5132
RH
5252 i_ehdrp->e_version = bed->s->ev_current;
5253 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
5254
c044fabd 5255 /* No program header, for now. */
252b5132
RH
5256 i_ehdrp->e_phoff = 0;
5257 i_ehdrp->e_phentsize = 0;
5258 i_ehdrp->e_phnum = 0;
5259
c044fabd 5260 /* Each bfd section is section header entry. */
252b5132
RH
5261 i_ehdrp->e_entry = bfd_get_start_address (abfd);
5262 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
5263
c044fabd 5264 /* If we're building an executable, we'll need a program header table. */
252b5132 5265 if (abfd->flags & EXEC_P)
0e71e495
BE
5266 /* It all happens later. */
5267 ;
252b5132
RH
5268 else
5269 {
5270 i_ehdrp->e_phentsize = 0;
252b5132
RH
5271 i_ehdrp->e_phoff = 0;
5272 }
5273
5274 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 5275 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 5276 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 5277 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 5278 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 5279 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
5280 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
5281 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
5282 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 5283 return FALSE;
252b5132 5284
b34976b6 5285 return TRUE;
252b5132
RH
5286}
5287
5288/* Assign file positions for all the reloc sections which are not part
5289 of the loadable file image. */
5290
5291void
217aa764 5292_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
5293{
5294 file_ptr off;
9ad5cbcf 5295 unsigned int i, num_sec;
252b5132
RH
5296 Elf_Internal_Shdr **shdrpp;
5297
12bd6957 5298 off = elf_next_file_pos (abfd);
252b5132 5299
9ad5cbcf
AM
5300 num_sec = elf_numsections (abfd);
5301 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5302 {
5303 Elf_Internal_Shdr *shdrp;
5304
5305 shdrp = *shdrpp;
5306 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5307 && shdrp->sh_offset == -1)
b34976b6 5308 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5309 }
5310
12bd6957 5311 elf_next_file_pos (abfd) = off;
252b5132
RH
5312}
5313
b34976b6 5314bfd_boolean
217aa764 5315_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5316{
9c5bfbb7 5317 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5318 Elf_Internal_Shdr **i_shdrp;
b34976b6 5319 bfd_boolean failed;
9ad5cbcf 5320 unsigned int count, num_sec;
30e8ee25 5321 struct elf_obj_tdata *t;
252b5132
RH
5322
5323 if (! abfd->output_has_begun
217aa764 5324 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5325 return FALSE;
252b5132
RH
5326
5327 i_shdrp = elf_elfsections (abfd);
252b5132 5328
b34976b6 5329 failed = FALSE;
252b5132
RH
5330 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5331 if (failed)
b34976b6 5332 return FALSE;
252b5132
RH
5333
5334 _bfd_elf_assign_file_positions_for_relocs (abfd);
5335
c044fabd 5336 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5337 num_sec = elf_numsections (abfd);
5338 for (count = 1; count < num_sec; count++)
252b5132
RH
5339 {
5340 if (bed->elf_backend_section_processing)
5341 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5342 if (i_shdrp[count]->contents)
5343 {
dc810e39
AM
5344 bfd_size_type amt = i_shdrp[count]->sh_size;
5345
252b5132 5346 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5347 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5348 return FALSE;
252b5132
RH
5349 }
5350 }
5351
5352 /* Write out the section header names. */
30e8ee25 5353 t = elf_tdata (abfd);
26ae6d5e 5354 if (elf_shstrtab (abfd) != NULL
30e8ee25 5355 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5356 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5357 return FALSE;
252b5132
RH
5358
5359 if (bed->elf_backend_final_write_processing)
12bd6957 5360 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 5361
ff59fc36
RM
5362 if (!bed->s->write_shdrs_and_ehdr (abfd))
5363 return FALSE;
5364
5365 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
5366 if (t->o->build_id.after_write_object_contents != NULL)
5367 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
5368
5369 return TRUE;
252b5132
RH
5370}
5371
b34976b6 5372bfd_boolean
217aa764 5373_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5374{
c044fabd 5375 /* Hopefully this can be done just like an object file. */
252b5132
RH
5376 return _bfd_elf_write_object_contents (abfd);
5377}
c044fabd
KH
5378
5379/* Given a section, search the header to find them. */
5380
cb33740c 5381unsigned int
198beae2 5382_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5383{
9c5bfbb7 5384 const struct elf_backend_data *bed;
91d6fa6a 5385 unsigned int sec_index;
252b5132 5386
9ad5cbcf
AM
5387 if (elf_section_data (asect) != NULL
5388 && elf_section_data (asect)->this_idx != 0)
5389 return elf_section_data (asect)->this_idx;
5390
5391 if (bfd_is_abs_section (asect))
91d6fa6a 5392 sec_index = SHN_ABS;
af746e92 5393 else if (bfd_is_com_section (asect))
91d6fa6a 5394 sec_index = SHN_COMMON;
af746e92 5395 else if (bfd_is_und_section (asect))
91d6fa6a 5396 sec_index = SHN_UNDEF;
af746e92 5397 else
91d6fa6a 5398 sec_index = SHN_BAD;
252b5132 5399
af746e92 5400 bed = get_elf_backend_data (abfd);
252b5132
RH
5401 if (bed->elf_backend_section_from_bfd_section)
5402 {
91d6fa6a 5403 int retval = sec_index;
9ad5cbcf 5404
af746e92
AM
5405 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5406 return retval;
252b5132
RH
5407 }
5408
91d6fa6a 5409 if (sec_index == SHN_BAD)
af746e92 5410 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5411
91d6fa6a 5412 return sec_index;
252b5132
RH
5413}
5414
5415/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5416 on error. */
5417
5418int
217aa764 5419_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5420{
5421 asymbol *asym_ptr = *asym_ptr_ptr;
5422 int idx;
5423 flagword flags = asym_ptr->flags;
5424
5425 /* When gas creates relocations against local labels, it creates its
5426 own symbol for the section, but does put the symbol into the
5427 symbol chain, so udata is 0. When the linker is generating
5428 relocatable output, this section symbol may be for one of the
5429 input sections rather than the output section. */
5430 if (asym_ptr->udata.i == 0
5431 && (flags & BSF_SECTION_SYM)
5432 && asym_ptr->section)
5433 {
5372391b 5434 asection *sec;
252b5132
RH
5435 int indx;
5436
5372391b
AM
5437 sec = asym_ptr->section;
5438 if (sec->owner != abfd && sec->output_section != NULL)
5439 sec = sec->output_section;
5440 if (sec->owner == abfd
5441 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5442 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5443 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5444 }
5445
5446 idx = asym_ptr->udata.i;
5447
5448 if (idx == 0)
5449 {
5450 /* This case can occur when using --strip-symbol on a symbol
08a40648 5451 which is used in a relocation entry. */
252b5132 5452 (*_bfd_error_handler)
d003868e
AM
5453 (_("%B: symbol `%s' required but not present"),
5454 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5455 bfd_set_error (bfd_error_no_symbols);
5456 return -1;
5457 }
5458
5459#if DEBUG & 4
5460 {
5461 fprintf (stderr,
9ccb8af9
AM
5462 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
5463 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
5464 fflush (stderr);
5465 }
5466#endif
5467
5468 return idx;
5469}
5470
84d1d650 5471/* Rewrite program header information. */
252b5132 5472
b34976b6 5473static bfd_boolean
84d1d650 5474rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5475{
b34976b6
AM
5476 Elf_Internal_Ehdr *iehdr;
5477 struct elf_segment_map *map;
5478 struct elf_segment_map *map_first;
5479 struct elf_segment_map **pointer_to_map;
5480 Elf_Internal_Phdr *segment;
5481 asection *section;
5482 unsigned int i;
5483 unsigned int num_segments;
5484 bfd_boolean phdr_included = FALSE;
5c44b38e 5485 bfd_boolean p_paddr_valid;
b34976b6
AM
5486 bfd_vma maxpagesize;
5487 struct elf_segment_map *phdr_adjust_seg = NULL;
5488 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5489 const struct elf_backend_data *bed;
bc67d8a6 5490
caf47ea6 5491 bed = get_elf_backend_data (ibfd);
252b5132
RH
5492 iehdr = elf_elfheader (ibfd);
5493
bc67d8a6 5494 map_first = NULL;
c044fabd 5495 pointer_to_map = &map_first;
252b5132
RH
5496
5497 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5498 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5499
5500 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5501#define SEGMENT_END(segment, start) \
5502 (start + (segment->p_memsz > segment->p_filesz \
5503 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5504
eecdbe52
JJ
5505#define SECTION_SIZE(section, segment) \
5506 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5507 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5508 ? section->size : 0)
eecdbe52 5509
b34976b6 5510 /* Returns TRUE if the given section is contained within
bc67d8a6 5511 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5512#define IS_CONTAINED_BY_VMA(section, segment) \
5513 (section->vma >= segment->p_vaddr \
eecdbe52 5514 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5515 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5516
b34976b6 5517 /* Returns TRUE if the given section is contained within
bc67d8a6 5518 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5519#define IS_CONTAINED_BY_LMA(section, segment, base) \
5520 (section->lma >= base \
eecdbe52 5521 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5522 <= SEGMENT_END (segment, base)))
252b5132 5523
0efc80c8
L
5524 /* Handle PT_NOTE segment. */
5525#define IS_NOTE(p, s) \
aecc8f8a 5526 (p->p_type == PT_NOTE \
0efc80c8 5527 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5528 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5529 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5530 <= p->p_offset + p->p_filesz))
252b5132 5531
0efc80c8
L
5532 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5533 etc. */
5534#define IS_COREFILE_NOTE(p, s) \
5535 (IS_NOTE (p, s) \
5536 && bfd_get_format (ibfd) == bfd_core \
5537 && s->vma == 0 \
5538 && s->lma == 0)
5539
252b5132
RH
5540 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5541 linker, which generates a PT_INTERP section with p_vaddr and
5542 p_memsz set to 0. */
aecc8f8a
AM
5543#define IS_SOLARIS_PT_INTERP(p, s) \
5544 (p->p_vaddr == 0 \
5545 && p->p_paddr == 0 \
5546 && p->p_memsz == 0 \
5547 && p->p_filesz > 0 \
5548 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5549 && s->size > 0 \
aecc8f8a 5550 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5551 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5552 <= p->p_offset + p->p_filesz))
5c440b1e 5553
bc67d8a6
NC
5554 /* Decide if the given section should be included in the given segment.
5555 A section will be included if:
f5ffc919 5556 1. It is within the address space of the segment -- we use the LMA
08a40648 5557 if that is set for the segment and the VMA otherwise,
0efc80c8 5558 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 5559 segment.
bc67d8a6 5560 3. There is an output section associated with it,
eecdbe52 5561 4. The section has not already been allocated to a previous segment.
2b05f1b7 5562 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5563 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5564 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5565 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5566 (with the possible exception of .dynamic). */
9f17e2a6 5567#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5568 ((((segment->p_paddr \
5569 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5570 : IS_CONTAINED_BY_VMA (section, segment)) \
5571 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5572 || IS_NOTE (segment, section)) \
2b05f1b7
L
5573 && segment->p_type != PT_GNU_STACK \
5574 && (segment->p_type != PT_TLS \
5575 || (section->flags & SEC_THREAD_LOCAL)) \
5576 && (segment->p_type == PT_LOAD \
5577 || segment->p_type == PT_TLS \
5578 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5579 && (segment->p_type != PT_DYNAMIC \
5580 || SECTION_SIZE (section, segment) > 0 \
5581 || (segment->p_paddr \
5582 ? segment->p_paddr != section->lma \
5583 : segment->p_vaddr != section->vma) \
5584 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5585 == 0)) \
0067a569 5586 && !section->segment_mark)
bc67d8a6 5587
9f17e2a6
L
5588/* If the output section of a section in the input segment is NULL,
5589 it is removed from the corresponding output segment. */
5590#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5591 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5592 && section->output_section != NULL)
5593
b34976b6 5594 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5595#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5596 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5597
5598 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5599 their VMA address ranges and their LMA address ranges overlap.
5600 It is possible to have overlapping VMA ranges without overlapping LMA
5601 ranges. RedBoot images for example can have both .data and .bss mapped
5602 to the same VMA range, but with the .data section mapped to a different
5603 LMA. */
aecc8f8a 5604#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5605 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5606 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5607 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5608 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5609
5610 /* Initialise the segment mark field. */
5611 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5612 section->segment_mark = FALSE;
bc67d8a6 5613
5c44b38e
AM
5614 /* The Solaris linker creates program headers in which all the
5615 p_paddr fields are zero. When we try to objcopy or strip such a
5616 file, we get confused. Check for this case, and if we find it
5617 don't set the p_paddr_valid fields. */
5618 p_paddr_valid = FALSE;
5619 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5620 i < num_segments;
5621 i++, segment++)
5622 if (segment->p_paddr != 0)
5623 {
5624 p_paddr_valid = TRUE;
5625 break;
5626 }
5627
252b5132 5628 /* Scan through the segments specified in the program header
bc67d8a6 5629 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5630 in the loadable segments. These can be created by weird
aecc8f8a 5631 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5632 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5633 i < num_segments;
c044fabd 5634 i++, segment++)
252b5132 5635 {
252b5132 5636 unsigned int j;
c044fabd 5637 Elf_Internal_Phdr *segment2;
252b5132 5638
aecc8f8a
AM
5639 if (segment->p_type == PT_INTERP)
5640 for (section = ibfd->sections; section; section = section->next)
5641 if (IS_SOLARIS_PT_INTERP (segment, section))
5642 {
5643 /* Mininal change so that the normal section to segment
4cc11e76 5644 assignment code will work. */
aecc8f8a
AM
5645 segment->p_vaddr = section->vma;
5646 break;
5647 }
5648
bc67d8a6 5649 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5650 {
5651 /* Remove PT_GNU_RELRO segment. */
5652 if (segment->p_type == PT_GNU_RELRO)
5653 segment->p_type = PT_NULL;
5654 continue;
5655 }
c044fabd 5656
bc67d8a6 5657 /* Determine if this segment overlaps any previous segments. */
0067a569 5658 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5659 {
5660 bfd_signed_vma extra_length;
c044fabd 5661
bc67d8a6 5662 if (segment2->p_type != PT_LOAD
0067a569 5663 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5664 continue;
c044fabd 5665
bc67d8a6
NC
5666 /* Merge the two segments together. */
5667 if (segment2->p_vaddr < segment->p_vaddr)
5668 {
c044fabd 5669 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5670 SEGMENT. */
0067a569
AM
5671 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5672 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5673
bc67d8a6
NC
5674 if (extra_length > 0)
5675 {
0067a569 5676 segment2->p_memsz += extra_length;
bc67d8a6
NC
5677 segment2->p_filesz += extra_length;
5678 }
c044fabd 5679
bc67d8a6 5680 segment->p_type = PT_NULL;
c044fabd 5681
bc67d8a6
NC
5682 /* Since we have deleted P we must restart the outer loop. */
5683 i = 0;
5684 segment = elf_tdata (ibfd)->phdr;
5685 break;
5686 }
5687 else
5688 {
c044fabd 5689 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5690 SEGMENT2. */
0067a569
AM
5691 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5692 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5693
bc67d8a6
NC
5694 if (extra_length > 0)
5695 {
0067a569 5696 segment->p_memsz += extra_length;
bc67d8a6
NC
5697 segment->p_filesz += extra_length;
5698 }
c044fabd 5699
bc67d8a6
NC
5700 segment2->p_type = PT_NULL;
5701 }
5702 }
5703 }
c044fabd 5704
bc67d8a6
NC
5705 /* The second scan attempts to assign sections to segments. */
5706 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5707 i < num_segments;
0067a569 5708 i++, segment++)
bc67d8a6 5709 {
0067a569
AM
5710 unsigned int section_count;
5711 asection **sections;
5712 asection *output_section;
5713 unsigned int isec;
5714 bfd_vma matching_lma;
5715 bfd_vma suggested_lma;
5716 unsigned int j;
dc810e39 5717 bfd_size_type amt;
0067a569
AM
5718 asection *first_section;
5719 bfd_boolean first_matching_lma;
5720 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5721
5722 if (segment->p_type == PT_NULL)
5723 continue;
c044fabd 5724
9f17e2a6 5725 first_section = NULL;
bc67d8a6 5726 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5727 for (section = ibfd->sections, section_count = 0;
5728 section != NULL;
5729 section = section->next)
9f17e2a6
L
5730 {
5731 /* Find the first section in the input segment, which may be
5732 removed from the corresponding output segment. */
5733 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5734 {
5735 if (first_section == NULL)
5736 first_section = section;
5737 if (section->output_section != NULL)
5738 ++section_count;
5739 }
5740 }
811072d8 5741
b5f852ea
NC
5742 /* Allocate a segment map big enough to contain
5743 all of the sections we have selected. */
dc810e39
AM
5744 amt = sizeof (struct elf_segment_map);
5745 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5746 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5747 if (map == NULL)
b34976b6 5748 return FALSE;
252b5132
RH
5749
5750 /* Initialise the fields of the segment map. Default to
5751 using the physical address of the segment in the input BFD. */
0067a569
AM
5752 map->next = NULL;
5753 map->p_type = segment->p_type;
5754 map->p_flags = segment->p_flags;
bc67d8a6 5755 map->p_flags_valid = 1;
55d55ac7 5756
9f17e2a6
L
5757 /* If the first section in the input segment is removed, there is
5758 no need to preserve segment physical address in the corresponding
5759 output segment. */
945c025a 5760 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5761 {
5762 map->p_paddr = segment->p_paddr;
5c44b38e 5763 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5764 }
252b5132
RH
5765
5766 /* Determine if this segment contains the ELF file header
5767 and if it contains the program headers themselves. */
bc67d8a6
NC
5768 map->includes_filehdr = (segment->p_offset == 0
5769 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5770 map->includes_phdrs = 0;
252b5132 5771
0067a569 5772 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5773 {
bc67d8a6
NC
5774 map->includes_phdrs =
5775 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5776 && (segment->p_offset + segment->p_filesz
252b5132
RH
5777 >= ((bfd_vma) iehdr->e_phoff
5778 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5779
bc67d8a6 5780 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5781 phdr_included = TRUE;
252b5132
RH
5782 }
5783
bc67d8a6 5784 if (section_count == 0)
252b5132
RH
5785 {
5786 /* Special segments, such as the PT_PHDR segment, may contain
5787 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5788 something. They are allowed by the ELF spec however, so only
5789 a warning is produced. */
bc67d8a6 5790 if (segment->p_type == PT_LOAD)
0067a569
AM
5791 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5792 " detected, is this intentional ?\n"),
5793 ibfd);
252b5132 5794
bc67d8a6 5795 map->count = 0;
c044fabd
KH
5796 *pointer_to_map = map;
5797 pointer_to_map = &map->next;
252b5132
RH
5798
5799 continue;
5800 }
5801
5802 /* Now scan the sections in the input BFD again and attempt
5803 to add their corresponding output sections to the segment map.
5804 The problem here is how to handle an output section which has
5805 been moved (ie had its LMA changed). There are four possibilities:
5806
5807 1. None of the sections have been moved.
5808 In this case we can continue to use the segment LMA from the
5809 input BFD.
5810
5811 2. All of the sections have been moved by the same amount.
5812 In this case we can change the segment's LMA to match the LMA
5813 of the first section.
5814
5815 3. Some of the sections have been moved, others have not.
5816 In this case those sections which have not been moved can be
5817 placed in the current segment which will have to have its size,
5818 and possibly its LMA changed, and a new segment or segments will
5819 have to be created to contain the other sections.
5820
b5f852ea 5821 4. The sections have been moved, but not by the same amount.
252b5132
RH
5822 In this case we can change the segment's LMA to match the LMA
5823 of the first section and we will have to create a new segment
5824 or segments to contain the other sections.
5825
5826 In order to save time, we allocate an array to hold the section
5827 pointers that we are interested in. As these sections get assigned
5828 to a segment, they are removed from this array. */
5829
a50b1753 5830 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5831 if (sections == NULL)
b34976b6 5832 return FALSE;
252b5132
RH
5833
5834 /* Step One: Scan for segment vs section LMA conflicts.
5835 Also add the sections to the section array allocated above.
5836 Also add the sections to the current segment. In the common
5837 case, where the sections have not been moved, this means that
5838 we have completely filled the segment, and there is nothing
5839 more to do. */
252b5132 5840 isec = 0;
72730e0c 5841 matching_lma = 0;
252b5132 5842 suggested_lma = 0;
0067a569
AM
5843 first_matching_lma = TRUE;
5844 first_suggested_lma = TRUE;
252b5132 5845
147d51c2 5846 for (section = ibfd->sections;
bc67d8a6
NC
5847 section != NULL;
5848 section = section->next)
147d51c2
L
5849 if (section == first_section)
5850 break;
5851
5852 for (j = 0; section != NULL; section = section->next)
252b5132 5853 {
caf47ea6 5854 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5855 {
bc67d8a6
NC
5856 output_section = section->output_section;
5857
0067a569 5858 sections[j++] = section;
252b5132
RH
5859
5860 /* The Solaris native linker always sets p_paddr to 0.
5861 We try to catch that case here, and set it to the
5e8d7549
NC
5862 correct value. Note - some backends require that
5863 p_paddr be left as zero. */
5c44b38e 5864 if (!p_paddr_valid
4455705d 5865 && segment->p_vaddr != 0
0067a569 5866 && !bed->want_p_paddr_set_to_zero
252b5132 5867 && isec == 0
bc67d8a6 5868 && output_section->lma != 0
0067a569
AM
5869 && output_section->vma == (segment->p_vaddr
5870 + (map->includes_filehdr
5871 ? iehdr->e_ehsize
5872 : 0)
5873 + (map->includes_phdrs
5874 ? (iehdr->e_phnum
5875 * iehdr->e_phentsize)
5876 : 0)))
bc67d8a6 5877 map->p_paddr = segment->p_vaddr;
252b5132
RH
5878
5879 /* Match up the physical address of the segment with the
5880 LMA address of the output section. */
bc67d8a6 5881 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5882 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5883 || (bed->want_p_paddr_set_to_zero
5884 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5885 {
0067a569
AM
5886 if (first_matching_lma || output_section->lma < matching_lma)
5887 {
5888 matching_lma = output_section->lma;
5889 first_matching_lma = FALSE;
5890 }
252b5132
RH
5891
5892 /* We assume that if the section fits within the segment
bc67d8a6 5893 then it does not overlap any other section within that
252b5132 5894 segment. */
0067a569
AM
5895 map->sections[isec++] = output_section;
5896 }
5897 else if (first_suggested_lma)
5898 {
5899 suggested_lma = output_section->lma;
5900 first_suggested_lma = FALSE;
252b5132 5901 }
147d51c2
L
5902
5903 if (j == section_count)
5904 break;
252b5132
RH
5905 }
5906 }
5907
bc67d8a6 5908 BFD_ASSERT (j == section_count);
252b5132
RH
5909
5910 /* Step Two: Adjust the physical address of the current segment,
5911 if necessary. */
bc67d8a6 5912 if (isec == section_count)
252b5132
RH
5913 {
5914 /* All of the sections fitted within the segment as currently
5915 specified. This is the default case. Add the segment to
5916 the list of built segments and carry on to process the next
5917 program header in the input BFD. */
bc67d8a6 5918 map->count = section_count;
c044fabd
KH
5919 *pointer_to_map = map;
5920 pointer_to_map = &map->next;
08a40648 5921
5c44b38e
AM
5922 if (p_paddr_valid
5923 && !bed->want_p_paddr_set_to_zero
147d51c2 5924 && matching_lma != map->p_paddr
5c44b38e
AM
5925 && !map->includes_filehdr
5926 && !map->includes_phdrs)
3271a814
NS
5927 /* There is some padding before the first section in the
5928 segment. So, we must account for that in the output
5929 segment's vma. */
5930 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5931
252b5132
RH
5932 free (sections);
5933 continue;
5934 }
252b5132
RH
5935 else
5936 {
0067a569 5937 if (!first_matching_lma)
72730e0c
AM
5938 {
5939 /* At least one section fits inside the current segment.
5940 Keep it, but modify its physical address to match the
5941 LMA of the first section that fitted. */
bc67d8a6 5942 map->p_paddr = matching_lma;
72730e0c
AM
5943 }
5944 else
5945 {
5946 /* None of the sections fitted inside the current segment.
5947 Change the current segment's physical address to match
5948 the LMA of the first section. */
bc67d8a6 5949 map->p_paddr = suggested_lma;
72730e0c
AM
5950 }
5951
bc67d8a6
NC
5952 /* Offset the segment physical address from the lma
5953 to allow for space taken up by elf headers. */
5954 if (map->includes_filehdr)
010c8431
AM
5955 {
5956 if (map->p_paddr >= iehdr->e_ehsize)
5957 map->p_paddr -= iehdr->e_ehsize;
5958 else
5959 {
5960 map->includes_filehdr = FALSE;
5961 map->includes_phdrs = FALSE;
5962 }
5963 }
252b5132 5964
bc67d8a6
NC
5965 if (map->includes_phdrs)
5966 {
010c8431
AM
5967 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5968 {
5969 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5970
5971 /* iehdr->e_phnum is just an estimate of the number
5972 of program headers that we will need. Make a note
5973 here of the number we used and the segment we chose
5974 to hold these headers, so that we can adjust the
5975 offset when we know the correct value. */
5976 phdr_adjust_num = iehdr->e_phnum;
5977 phdr_adjust_seg = map;
5978 }
5979 else
5980 map->includes_phdrs = FALSE;
bc67d8a6 5981 }
252b5132
RH
5982 }
5983
5984 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5985 those that fit to the current segment and removing them from the
252b5132
RH
5986 sections array; but making sure not to leave large gaps. Once all
5987 possible sections have been assigned to the current segment it is
5988 added to the list of built segments and if sections still remain
5989 to be assigned, a new segment is constructed before repeating
5990 the loop. */
5991 isec = 0;
5992 do
5993 {
bc67d8a6 5994 map->count = 0;
252b5132 5995 suggested_lma = 0;
0067a569 5996 first_suggested_lma = TRUE;
252b5132
RH
5997
5998 /* Fill the current segment with sections that fit. */
bc67d8a6 5999 for (j = 0; j < section_count; j++)
252b5132 6000 {
bc67d8a6 6001 section = sections[j];
252b5132 6002
bc67d8a6 6003 if (section == NULL)
252b5132
RH
6004 continue;
6005
bc67d8a6 6006 output_section = section->output_section;
252b5132 6007
bc67d8a6 6008 BFD_ASSERT (output_section != NULL);
c044fabd 6009
bc67d8a6
NC
6010 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6011 || IS_COREFILE_NOTE (segment, section))
252b5132 6012 {
bc67d8a6 6013 if (map->count == 0)
252b5132
RH
6014 {
6015 /* If the first section in a segment does not start at
bc67d8a6
NC
6016 the beginning of the segment, then something is
6017 wrong. */
0067a569
AM
6018 if (output_section->lma
6019 != (map->p_paddr
6020 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
6021 + (map->includes_phdrs
6022 ? iehdr->e_phnum * iehdr->e_phentsize
6023 : 0)))
252b5132
RH
6024 abort ();
6025 }
6026 else
6027 {
0067a569 6028 asection *prev_sec;
252b5132 6029
bc67d8a6 6030 prev_sec = map->sections[map->count - 1];
252b5132
RH
6031
6032 /* If the gap between the end of the previous section
bc67d8a6
NC
6033 and the start of this section is more than
6034 maxpagesize then we need to start a new segment. */
eea6121a 6035 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 6036 maxpagesize)
caf47ea6 6037 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 6038 || (prev_sec->lma + prev_sec->size
079e9a2f 6039 > output_section->lma))
252b5132 6040 {
0067a569
AM
6041 if (first_suggested_lma)
6042 {
6043 suggested_lma = output_section->lma;
6044 first_suggested_lma = FALSE;
6045 }
252b5132
RH
6046
6047 continue;
6048 }
6049 }
6050
bc67d8a6 6051 map->sections[map->count++] = output_section;
252b5132
RH
6052 ++isec;
6053 sections[j] = NULL;
b34976b6 6054 section->segment_mark = TRUE;
252b5132 6055 }
0067a569
AM
6056 else if (first_suggested_lma)
6057 {
6058 suggested_lma = output_section->lma;
6059 first_suggested_lma = FALSE;
6060 }
252b5132
RH
6061 }
6062
bc67d8a6 6063 BFD_ASSERT (map->count > 0);
252b5132
RH
6064
6065 /* Add the current segment to the list of built segments. */
c044fabd
KH
6066 *pointer_to_map = map;
6067 pointer_to_map = &map->next;
252b5132 6068
bc67d8a6 6069 if (isec < section_count)
252b5132
RH
6070 {
6071 /* We still have not allocated all of the sections to
6072 segments. Create a new segment here, initialise it
6073 and carry on looping. */
dc810e39
AM
6074 amt = sizeof (struct elf_segment_map);
6075 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 6076 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6077 if (map == NULL)
5ed6aba4
NC
6078 {
6079 free (sections);
6080 return FALSE;
6081 }
252b5132
RH
6082
6083 /* Initialise the fields of the segment map. Set the physical
6084 physical address to the LMA of the first section that has
6085 not yet been assigned. */
0067a569
AM
6086 map->next = NULL;
6087 map->p_type = segment->p_type;
6088 map->p_flags = segment->p_flags;
6089 map->p_flags_valid = 1;
6090 map->p_paddr = suggested_lma;
5c44b38e 6091 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 6092 map->includes_filehdr = 0;
0067a569 6093 map->includes_phdrs = 0;
252b5132
RH
6094 }
6095 }
bc67d8a6 6096 while (isec < section_count);
252b5132
RH
6097
6098 free (sections);
6099 }
6100
12bd6957 6101 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
6102
6103 /* If we had to estimate the number of program headers that were
9ad5cbcf 6104 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
6105 the offset if necessary. */
6106 if (phdr_adjust_seg != NULL)
6107 {
6108 unsigned int count;
c044fabd 6109
bc67d8a6 6110 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 6111 count++;
252b5132 6112
bc67d8a6
NC
6113 if (count > phdr_adjust_num)
6114 phdr_adjust_seg->p_paddr
6115 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
6116 }
c044fabd 6117
bc67d8a6 6118#undef SEGMENT_END
eecdbe52 6119#undef SECTION_SIZE
bc67d8a6
NC
6120#undef IS_CONTAINED_BY_VMA
6121#undef IS_CONTAINED_BY_LMA
0efc80c8 6122#undef IS_NOTE
252b5132 6123#undef IS_COREFILE_NOTE
bc67d8a6 6124#undef IS_SOLARIS_PT_INTERP
9f17e2a6 6125#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
6126#undef INCLUDE_SECTION_IN_SEGMENT
6127#undef SEGMENT_AFTER_SEGMENT
6128#undef SEGMENT_OVERLAPS
b34976b6 6129 return TRUE;
252b5132
RH
6130}
6131
84d1d650
L
6132/* Copy ELF program header information. */
6133
6134static bfd_boolean
6135copy_elf_program_header (bfd *ibfd, bfd *obfd)
6136{
6137 Elf_Internal_Ehdr *iehdr;
6138 struct elf_segment_map *map;
6139 struct elf_segment_map *map_first;
6140 struct elf_segment_map **pointer_to_map;
6141 Elf_Internal_Phdr *segment;
6142 unsigned int i;
6143 unsigned int num_segments;
6144 bfd_boolean phdr_included = FALSE;
88967714 6145 bfd_boolean p_paddr_valid;
84d1d650
L
6146
6147 iehdr = elf_elfheader (ibfd);
6148
6149 map_first = NULL;
6150 pointer_to_map = &map_first;
6151
88967714
AM
6152 /* If all the segment p_paddr fields are zero, don't set
6153 map->p_paddr_valid. */
6154 p_paddr_valid = FALSE;
84d1d650 6155 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
6156 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6157 i < num_segments;
6158 i++, segment++)
6159 if (segment->p_paddr != 0)
6160 {
6161 p_paddr_valid = TRUE;
6162 break;
6163 }
6164
84d1d650
L
6165 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6166 i < num_segments;
6167 i++, segment++)
6168 {
6169 asection *section;
6170 unsigned int section_count;
6171 bfd_size_type amt;
6172 Elf_Internal_Shdr *this_hdr;
53020534 6173 asection *first_section = NULL;
a76e6f2f 6174 asection *lowest_section;
84d1d650 6175
84d1d650
L
6176 /* Compute how many sections are in this segment. */
6177 for (section = ibfd->sections, section_count = 0;
6178 section != NULL;
6179 section = section->next)
6180 {
6181 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6182 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 6183 {
a76e6f2f
AM
6184 if (first_section == NULL)
6185 first_section = section;
3271a814
NS
6186 section_count++;
6187 }
84d1d650
L
6188 }
6189
6190 /* Allocate a segment map big enough to contain
6191 all of the sections we have selected. */
6192 amt = sizeof (struct elf_segment_map);
6193 if (section_count != 0)
6194 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6195 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
6196 if (map == NULL)
6197 return FALSE;
6198
6199 /* Initialize the fields of the output segment map with the
6200 input segment. */
6201 map->next = NULL;
6202 map->p_type = segment->p_type;
6203 map->p_flags = segment->p_flags;
6204 map->p_flags_valid = 1;
6205 map->p_paddr = segment->p_paddr;
88967714 6206 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
6207 map->p_align = segment->p_align;
6208 map->p_align_valid = 1;
3271a814 6209 map->p_vaddr_offset = 0;
84d1d650 6210
04c3a755
NS
6211 if (map->p_type == PT_GNU_RELRO
6212 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
6213 {
6214 /* The PT_GNU_RELRO segment may contain the first a few
6215 bytes in the .got.plt section even if the whole .got.plt
6216 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
6217 change the size of the PT_GNU_RELRO segment.
6218 Similarly, PT_GNU_STACK size is significant on uclinux
6219 systems. */
9433b9b1 6220 map->p_size = segment->p_memsz;
b10a8ae0
L
6221 map->p_size_valid = 1;
6222 }
6223
84d1d650
L
6224 /* Determine if this segment contains the ELF file header
6225 and if it contains the program headers themselves. */
6226 map->includes_filehdr = (segment->p_offset == 0
6227 && segment->p_filesz >= iehdr->e_ehsize);
6228
6229 map->includes_phdrs = 0;
6230 if (! phdr_included || segment->p_type != PT_LOAD)
6231 {
6232 map->includes_phdrs =
6233 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6234 && (segment->p_offset + segment->p_filesz
6235 >= ((bfd_vma) iehdr->e_phoff
6236 + iehdr->e_phnum * iehdr->e_phentsize)));
6237
6238 if (segment->p_type == PT_LOAD && map->includes_phdrs)
6239 phdr_included = TRUE;
6240 }
6241
a76e6f2f 6242 lowest_section = first_section;
84d1d650
L
6243 if (section_count != 0)
6244 {
6245 unsigned int isec = 0;
6246
53020534 6247 for (section = first_section;
84d1d650
L
6248 section != NULL;
6249 section = section->next)
6250 {
6251 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6252 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
6253 {
6254 map->sections[isec++] = section->output_section;
a76e6f2f
AM
6255 if ((section->flags & SEC_ALLOC) != 0)
6256 {
6257 bfd_vma seg_off;
6258
fb8a5684
AM
6259 if (section->lma < lowest_section->lma)
6260 lowest_section = section;
6261
a76e6f2f
AM
6262 /* Section lmas are set up from PT_LOAD header
6263 p_paddr in _bfd_elf_make_section_from_shdr.
6264 If this header has a p_paddr that disagrees
6265 with the section lma, flag the p_paddr as
6266 invalid. */
6267 if ((section->flags & SEC_LOAD) != 0)
6268 seg_off = this_hdr->sh_offset - segment->p_offset;
6269 else
6270 seg_off = this_hdr->sh_addr - segment->p_vaddr;
6271 if (section->lma - segment->p_paddr != seg_off)
6272 map->p_paddr_valid = FALSE;
6273 }
53020534
L
6274 if (isec == section_count)
6275 break;
6276 }
84d1d650
L
6277 }
6278 }
6279
a76e6f2f
AM
6280 if (map->includes_filehdr && lowest_section != NULL)
6281 /* We need to keep the space used by the headers fixed. */
6282 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 6283
a76e6f2f
AM
6284 if (!map->includes_phdrs
6285 && !map->includes_filehdr
6286 && map->p_paddr_valid)
6287 /* There is some other padding before the first section. */
6288 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
6289 - segment->p_paddr);
6290
84d1d650
L
6291 map->count = section_count;
6292 *pointer_to_map = map;
6293 pointer_to_map = &map->next;
6294 }
6295
12bd6957 6296 elf_seg_map (obfd) = map_first;
84d1d650
L
6297 return TRUE;
6298}
6299
6300/* Copy private BFD data. This copies or rewrites ELF program header
6301 information. */
6302
6303static bfd_boolean
6304copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6305{
84d1d650
L
6306 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6307 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6308 return TRUE;
6309
6310 if (elf_tdata (ibfd)->phdr == NULL)
6311 return TRUE;
6312
6313 if (ibfd->xvec == obfd->xvec)
6314 {
cb3ff1e5
NC
6315 /* Check to see if any sections in the input BFD
6316 covered by ELF program header have changed. */
d55ce4e2 6317 Elf_Internal_Phdr *segment;
84d1d650
L
6318 asection *section, *osec;
6319 unsigned int i, num_segments;
6320 Elf_Internal_Shdr *this_hdr;
147d51c2
L
6321 const struct elf_backend_data *bed;
6322
6323 bed = get_elf_backend_data (ibfd);
6324
6325 /* Regenerate the segment map if p_paddr is set to 0. */
6326 if (bed->want_p_paddr_set_to_zero)
6327 goto rewrite;
84d1d650
L
6328
6329 /* Initialize the segment mark field. */
6330 for (section = obfd->sections; section != NULL;
6331 section = section->next)
6332 section->segment_mark = FALSE;
6333
6334 num_segments = elf_elfheader (ibfd)->e_phnum;
6335 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6336 i < num_segments;
6337 i++, segment++)
6338 {
5f6999aa
NC
6339 /* PR binutils/3535. The Solaris linker always sets the p_paddr
6340 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
6341 which severly confuses things, so always regenerate the segment
6342 map in this case. */
6343 if (segment->p_paddr == 0
6344 && segment->p_memsz == 0
6345 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6346 goto rewrite;
5f6999aa 6347
84d1d650
L
6348 for (section = ibfd->sections;
6349 section != NULL; section = section->next)
6350 {
6351 /* We mark the output section so that we know it comes
6352 from the input BFD. */
6353 osec = section->output_section;
6354 if (osec)
6355 osec->segment_mark = TRUE;
6356
6357 /* Check if this section is covered by the segment. */
6358 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6359 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6360 {
6361 /* FIXME: Check if its output section is changed or
6362 removed. What else do we need to check? */
6363 if (osec == NULL
6364 || section->flags != osec->flags
6365 || section->lma != osec->lma
6366 || section->vma != osec->vma
6367 || section->size != osec->size
6368 || section->rawsize != osec->rawsize
6369 || section->alignment_power != osec->alignment_power)
6370 goto rewrite;
6371 }
6372 }
6373 }
6374
cb3ff1e5 6375 /* Check to see if any output section do not come from the
84d1d650
L
6376 input BFD. */
6377 for (section = obfd->sections; section != NULL;
6378 section = section->next)
6379 {
6380 if (section->segment_mark == FALSE)
6381 goto rewrite;
6382 else
6383 section->segment_mark = FALSE;
6384 }
6385
6386 return copy_elf_program_header (ibfd, obfd);
6387 }
6388
6389rewrite:
f1d85785
L
6390 if (ibfd->xvec == obfd->xvec)
6391 {
6392 /* When rewriting program header, set the output maxpagesize to
6393 the maximum alignment of input PT_LOAD segments. */
6394 Elf_Internal_Phdr *segment;
6395 unsigned int i;
6396 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
6397 bfd_vma maxpagesize = 0;
6398
6399 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6400 i < num_segments;
6401 i++, segment++)
6402 if (segment->p_type == PT_LOAD
6403 && maxpagesize < segment->p_align)
6404 maxpagesize = segment->p_align;
6405
6406 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
6407 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
6408 }
6409
84d1d650
L
6410 return rewrite_elf_program_header (ibfd, obfd);
6411}
6412
ccd2ec6a
L
6413/* Initialize private output section information from input section. */
6414
6415bfd_boolean
6416_bfd_elf_init_private_section_data (bfd *ibfd,
6417 asection *isec,
6418 bfd *obfd,
6419 asection *osec,
6420 struct bfd_link_info *link_info)
6421
6422{
6423 Elf_Internal_Shdr *ihdr, *ohdr;
dfa7b0b8 6424 bfd_boolean final_link = link_info != NULL && !link_info->relocatable;
ccd2ec6a
L
6425
6426 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6427 || obfd->xvec->flavour != bfd_target_elf_flavour)
6428 return TRUE;
6429
ba85c43e
NC
6430 BFD_ASSERT (elf_section_data (osec) != NULL);
6431
dfa7b0b8
AM
6432 /* For objcopy and relocatable link, don't copy the output ELF
6433 section type from input if the output BFD section flags have been
6434 set to something different. For a final link allow some flags
6435 that the linker clears to differ. */
42bb2e33 6436 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6437 && (osec->flags == isec->flags
6438 || (final_link
6439 && ((osec->flags ^ isec->flags)
0814be7d 6440 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 6441 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6442
6443 /* FIXME: Is this correct for all OS/PROC specific flags? */
6444 elf_section_flags (osec) |= (elf_section_flags (isec)
6445 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6446
6447 /* Set things up for objcopy and relocatable link. The output
6448 SHT_GROUP section will have its elf_next_in_group pointing back
6449 to the input group members. Ignore linker created group section.
6450 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 6451 if (!final_link)
ccd2ec6a
L
6452 {
6453 if (elf_sec_group (isec) == NULL
6454 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6455 {
6456 if (elf_section_flags (isec) & SHF_GROUP)
6457 elf_section_flags (osec) |= SHF_GROUP;
6458 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6459 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6460 }
6461 }
6462
6463 ihdr = &elf_section_data (isec)->this_hdr;
6464
6465 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6466 don't use the output section of the linked-to section since it
6467 may be NULL at this point. */
6468 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6469 {
6470 ohdr = &elf_section_data (osec)->this_hdr;
6471 ohdr->sh_flags |= SHF_LINK_ORDER;
6472 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6473 }
6474
6475 osec->use_rela_p = isec->use_rela_p;
6476
6477 return TRUE;
6478}
6479
252b5132
RH
6480/* Copy private section information. This copies over the entsize
6481 field, and sometimes the info field. */
6482
b34976b6 6483bfd_boolean
217aa764
AM
6484_bfd_elf_copy_private_section_data (bfd *ibfd,
6485 asection *isec,
6486 bfd *obfd,
6487 asection *osec)
252b5132
RH
6488{
6489 Elf_Internal_Shdr *ihdr, *ohdr;
6490
6491 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6492 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6493 return TRUE;
252b5132 6494
252b5132
RH
6495 ihdr = &elf_section_data (isec)->this_hdr;
6496 ohdr = &elf_section_data (osec)->this_hdr;
6497
6498 ohdr->sh_entsize = ihdr->sh_entsize;
6499
6500 if (ihdr->sh_type == SHT_SYMTAB
6501 || ihdr->sh_type == SHT_DYNSYM
6502 || ihdr->sh_type == SHT_GNU_verneed
6503 || ihdr->sh_type == SHT_GNU_verdef)
6504 ohdr->sh_info = ihdr->sh_info;
6505
ccd2ec6a
L
6506 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6507 NULL);
252b5132
RH
6508}
6509
d0bf826b
AM
6510/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
6511 necessary if we are removing either the SHT_GROUP section or any of
6512 the group member sections. DISCARDED is the value that a section's
6513 output_section has if the section will be discarded, NULL when this
6514 function is called from objcopy, bfd_abs_section_ptr when called
6515 from the linker. */
80fccad2
BW
6516
6517bfd_boolean
d0bf826b 6518_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 6519{
30288845
AM
6520 asection *isec;
6521
30288845 6522 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 6523 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
6524 {
6525 asection *first = elf_next_in_group (isec);
6526 asection *s = first;
d0bf826b
AM
6527 bfd_size_type removed = 0;
6528
30288845
AM
6529 while (s != NULL)
6530 {
415f38a6
AM
6531 /* If this member section is being output but the
6532 SHT_GROUP section is not, then clear the group info
6533 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
6534 if (s->output_section != discarded
6535 && isec->output_section == discarded)
30288845
AM
6536 {
6537 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6538 elf_group_name (s->output_section) = NULL;
6539 }
415f38a6
AM
6540 /* Conversely, if the member section is not being output
6541 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
6542 else if (s->output_section == discarded
6543 && isec->output_section != discarded)
6544 removed += 4;
30288845
AM
6545 s = elf_next_in_group (s);
6546 if (s == first)
6547 break;
6548 }
d0bf826b
AM
6549 if (removed != 0)
6550 {
6551 if (discarded != NULL)
6552 {
6553 /* If we've been called for ld -r, then we need to
6554 adjust the input section size. This function may
6555 be called multiple times, so save the original
6556 size. */
6557 if (isec->rawsize == 0)
6558 isec->rawsize = isec->size;
6559 isec->size = isec->rawsize - removed;
6560 }
6561 else
6562 {
6563 /* Adjust the output section size when called from
6564 objcopy. */
6565 isec->output_section->size -= removed;
6566 }
6567 }
30288845
AM
6568 }
6569
80fccad2
BW
6570 return TRUE;
6571}
6572
d0bf826b
AM
6573/* Copy private header information. */
6574
6575bfd_boolean
6576_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6577{
6578 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6579 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6580 return TRUE;
6581
6582 /* Copy over private BFD data if it has not already been copied.
6583 This must be done here, rather than in the copy_private_bfd_data
6584 entry point, because the latter is called after the section
6585 contents have been set, which means that the program headers have
6586 already been worked out. */
12bd6957 6587 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
6588 {
6589 if (! copy_private_bfd_data (ibfd, obfd))
6590 return FALSE;
6591 }
6592
6593 return _bfd_elf_fixup_group_sections (ibfd, NULL);
6594}
6595
252b5132
RH
6596/* Copy private symbol information. If this symbol is in a section
6597 which we did not map into a BFD section, try to map the section
6598 index correctly. We use special macro definitions for the mapped
6599 section indices; these definitions are interpreted by the
6600 swap_out_syms function. */
6601
9ad5cbcf
AM
6602#define MAP_ONESYMTAB (SHN_HIOS + 1)
6603#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6604#define MAP_STRTAB (SHN_HIOS + 3)
6605#define MAP_SHSTRTAB (SHN_HIOS + 4)
6606#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6607
b34976b6 6608bfd_boolean
217aa764
AM
6609_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6610 asymbol *isymarg,
6611 bfd *obfd,
6612 asymbol *osymarg)
252b5132
RH
6613{
6614 elf_symbol_type *isym, *osym;
6615
6616 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6617 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6618 return TRUE;
252b5132
RH
6619
6620 isym = elf_symbol_from (ibfd, isymarg);
6621 osym = elf_symbol_from (obfd, osymarg);
6622
6623 if (isym != NULL
8424d8f5 6624 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6625 && osym != NULL
6626 && bfd_is_abs_section (isym->symbol.section))
6627 {
6628 unsigned int shndx;
6629
6630 shndx = isym->internal_elf_sym.st_shndx;
6631 if (shndx == elf_onesymtab (ibfd))
6632 shndx = MAP_ONESYMTAB;
6633 else if (shndx == elf_dynsymtab (ibfd))
6634 shndx = MAP_DYNSYMTAB;
12bd6957 6635 else if (shndx == elf_strtab_sec (ibfd))
252b5132 6636 shndx = MAP_STRTAB;
12bd6957 6637 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 6638 shndx = MAP_SHSTRTAB;
12bd6957 6639 else if (shndx == elf_symtab_shndx (ibfd))
9ad5cbcf 6640 shndx = MAP_SYM_SHNDX;
252b5132
RH
6641 osym->internal_elf_sym.st_shndx = shndx;
6642 }
6643
b34976b6 6644 return TRUE;
252b5132
RH
6645}
6646
6647/* Swap out the symbols. */
6648
b34976b6 6649static bfd_boolean
217aa764
AM
6650swap_out_syms (bfd *abfd,
6651 struct bfd_strtab_hash **sttp,
6652 int relocatable_p)
252b5132 6653{
9c5bfbb7 6654 const struct elf_backend_data *bed;
079e9a2f
AM
6655 int symcount;
6656 asymbol **syms;
6657 struct bfd_strtab_hash *stt;
6658 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6659 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6660 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6661 bfd_byte *outbound_syms;
6662 bfd_byte *outbound_shndx;
079e9a2f 6663 int idx;
12bd6957 6664 unsigned int num_locals;
079e9a2f 6665 bfd_size_type amt;
174fd7f9 6666 bfd_boolean name_local_sections;
252b5132 6667
12bd6957 6668 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 6669 return FALSE;
252b5132 6670
c044fabd 6671 /* Dump out the symtabs. */
079e9a2f
AM
6672 stt = _bfd_elf_stringtab_init ();
6673 if (stt == NULL)
b34976b6 6674 return FALSE;
252b5132 6675
079e9a2f
AM
6676 bed = get_elf_backend_data (abfd);
6677 symcount = bfd_get_symcount (abfd);
6678 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6679 symtab_hdr->sh_type = SHT_SYMTAB;
6680 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6681 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 6682 symtab_hdr->sh_info = num_locals + 1;
72de5009 6683 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6684
6685 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6686 symstrtab_hdr->sh_type = SHT_STRTAB;
6687
a50b1753
NC
6688 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6689 bed->s->sizeof_sym);
079e9a2f 6690 if (outbound_syms == NULL)
5ed6aba4
NC
6691 {
6692 _bfd_stringtab_free (stt);
6693 return FALSE;
6694 }
217aa764 6695 symtab_hdr->contents = outbound_syms;
252b5132 6696
9ad5cbcf
AM
6697 outbound_shndx = NULL;
6698 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6699 if (symtab_shndx_hdr->sh_name != 0)
6700 {
6701 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6702 outbound_shndx = (bfd_byte *)
6703 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6704 if (outbound_shndx == NULL)
5ed6aba4
NC
6705 {
6706 _bfd_stringtab_free (stt);
6707 return FALSE;
6708 }
6709
9ad5cbcf
AM
6710 symtab_shndx_hdr->contents = outbound_shndx;
6711 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6712 symtab_shndx_hdr->sh_size = amt;
6713 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6714 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6715 }
6716
589e6347 6717 /* Now generate the data (for "contents"). */
079e9a2f
AM
6718 {
6719 /* Fill in zeroth symbol and swap it out. */
6720 Elf_Internal_Sym sym;
6721 sym.st_name = 0;
6722 sym.st_value = 0;
6723 sym.st_size = 0;
6724 sym.st_info = 0;
6725 sym.st_other = 0;
6726 sym.st_shndx = SHN_UNDEF;
35fc36a8 6727 sym.st_target_internal = 0;
9ad5cbcf 6728 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6729 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6730 if (outbound_shndx != NULL)
6731 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6732 }
252b5132 6733
174fd7f9
RS
6734 name_local_sections
6735 = (bed->elf_backend_name_local_section_symbols
6736 && bed->elf_backend_name_local_section_symbols (abfd));
6737
079e9a2f
AM
6738 syms = bfd_get_outsymbols (abfd);
6739 for (idx = 0; idx < symcount; idx++)
252b5132 6740 {
252b5132 6741 Elf_Internal_Sym sym;
079e9a2f
AM
6742 bfd_vma value = syms[idx]->value;
6743 elf_symbol_type *type_ptr;
6744 flagword flags = syms[idx]->flags;
6745 int type;
252b5132 6746
174fd7f9
RS
6747 if (!name_local_sections
6748 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6749 {
6750 /* Local section symbols have no name. */
6751 sym.st_name = 0;
6752 }
6753 else
6754 {
6755 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6756 syms[idx]->name,
b34976b6 6757 TRUE, FALSE);
079e9a2f 6758 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6759 {
6760 _bfd_stringtab_free (stt);
6761 return FALSE;
6762 }
079e9a2f 6763 }
252b5132 6764
079e9a2f 6765 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6766
079e9a2f
AM
6767 if ((flags & BSF_SECTION_SYM) == 0
6768 && bfd_is_com_section (syms[idx]->section))
6769 {
6770 /* ELF common symbols put the alignment into the `value' field,
6771 and the size into the `size' field. This is backwards from
6772 how BFD handles it, so reverse it here. */
6773 sym.st_size = value;
6774 if (type_ptr == NULL
6775 || type_ptr->internal_elf_sym.st_value == 0)
6776 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6777 else
6778 sym.st_value = type_ptr->internal_elf_sym.st_value;
6779 sym.st_shndx = _bfd_elf_section_from_bfd_section
6780 (abfd, syms[idx]->section);
6781 }
6782 else
6783 {
6784 asection *sec = syms[idx]->section;
cb33740c 6785 unsigned int shndx;
252b5132 6786
079e9a2f
AM
6787 if (sec->output_section)
6788 {
6789 value += sec->output_offset;
6790 sec = sec->output_section;
6791 }
589e6347 6792
079e9a2f
AM
6793 /* Don't add in the section vma for relocatable output. */
6794 if (! relocatable_p)
6795 value += sec->vma;
6796 sym.st_value = value;
6797 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6798
6799 if (bfd_is_abs_section (sec)
6800 && type_ptr != NULL
6801 && type_ptr->internal_elf_sym.st_shndx != 0)
6802 {
6803 /* This symbol is in a real ELF section which we did
6804 not create as a BFD section. Undo the mapping done
6805 by copy_private_symbol_data. */
6806 shndx = type_ptr->internal_elf_sym.st_shndx;
6807 switch (shndx)
6808 {
6809 case MAP_ONESYMTAB:
6810 shndx = elf_onesymtab (abfd);
6811 break;
6812 case MAP_DYNSYMTAB:
6813 shndx = elf_dynsymtab (abfd);
6814 break;
6815 case MAP_STRTAB:
12bd6957 6816 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
6817 break;
6818 case MAP_SHSTRTAB:
12bd6957 6819 shndx = elf_shstrtab_sec (abfd);
079e9a2f 6820 break;
9ad5cbcf 6821 case MAP_SYM_SHNDX:
12bd6957 6822 shndx = elf_symtab_shndx (abfd);
9ad5cbcf 6823 break;
079e9a2f 6824 default:
15bc576a 6825 shndx = SHN_ABS;
079e9a2f
AM
6826 break;
6827 }
6828 }
6829 else
6830 {
6831 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6832
cb33740c 6833 if (shndx == SHN_BAD)
079e9a2f
AM
6834 {
6835 asection *sec2;
6836
6837 /* Writing this would be a hell of a lot easier if
6838 we had some decent documentation on bfd, and
6839 knew what to expect of the library, and what to
6840 demand of applications. For example, it
6841 appears that `objcopy' might not set the
6842 section of a symbol to be a section that is
6843 actually in the output file. */
6844 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6845 if (sec2 == NULL)
6846 {
6847 _bfd_error_handler (_("\
6848Unable to find equivalent output section for symbol '%s' from section '%s'"),
6849 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6850 sec->name);
811072d8 6851 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6852 _bfd_stringtab_free (stt);
589e6347
NC
6853 return FALSE;
6854 }
811072d8 6855
079e9a2f 6856 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6857 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6858 }
6859 }
252b5132 6860
079e9a2f
AM
6861 sym.st_shndx = shndx;
6862 }
252b5132 6863
13ae64f3
JJ
6864 if ((flags & BSF_THREAD_LOCAL) != 0)
6865 type = STT_TLS;
d8045f23
NC
6866 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6867 type = STT_GNU_IFUNC;
13ae64f3 6868 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6869 type = STT_FUNC;
6870 else if ((flags & BSF_OBJECT) != 0)
6871 type = STT_OBJECT;
d9352518
DB
6872 else if ((flags & BSF_RELC) != 0)
6873 type = STT_RELC;
6874 else if ((flags & BSF_SRELC) != 0)
6875 type = STT_SRELC;
079e9a2f
AM
6876 else
6877 type = STT_NOTYPE;
252b5132 6878
13ae64f3
JJ
6879 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6880 type = STT_TLS;
6881
589e6347 6882 /* Processor-specific types. */
079e9a2f
AM
6883 if (type_ptr != NULL
6884 && bed->elf_backend_get_symbol_type)
6885 type = ((*bed->elf_backend_get_symbol_type)
6886 (&type_ptr->internal_elf_sym, type));
252b5132 6887
079e9a2f
AM
6888 if (flags & BSF_SECTION_SYM)
6889 {
6890 if (flags & BSF_GLOBAL)
6891 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6892 else
6893 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6894 }
6895 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6896 {
504b7d20 6897#ifdef USE_STT_COMMON
0a40daed
MK
6898 if (type == STT_OBJECT)
6899 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6900 else
504b7d20 6901#endif
c91e322a 6902 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6903 }
079e9a2f
AM
6904 else if (bfd_is_und_section (syms[idx]->section))
6905 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6906 ? STB_WEAK
6907 : STB_GLOBAL),
6908 type);
6909 else if (flags & BSF_FILE)
6910 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6911 else
6912 {
6913 int bind = STB_LOCAL;
252b5132 6914
079e9a2f
AM
6915 if (flags & BSF_LOCAL)
6916 bind = STB_LOCAL;
3e7a7d11
NC
6917 else if (flags & BSF_GNU_UNIQUE)
6918 bind = STB_GNU_UNIQUE;
079e9a2f
AM
6919 else if (flags & BSF_WEAK)
6920 bind = STB_WEAK;
6921 else if (flags & BSF_GLOBAL)
6922 bind = STB_GLOBAL;
252b5132 6923
079e9a2f
AM
6924 sym.st_info = ELF_ST_INFO (bind, type);
6925 }
252b5132 6926
079e9a2f 6927 if (type_ptr != NULL)
35fc36a8
RS
6928 {
6929 sym.st_other = type_ptr->internal_elf_sym.st_other;
6930 sym.st_target_internal
6931 = type_ptr->internal_elf_sym.st_target_internal;
6932 }
079e9a2f 6933 else
35fc36a8
RS
6934 {
6935 sym.st_other = 0;
6936 sym.st_target_internal = 0;
6937 }
252b5132 6938
9ad5cbcf 6939 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6940 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6941 if (outbound_shndx != NULL)
6942 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6943 }
252b5132 6944
079e9a2f
AM
6945 *sttp = stt;
6946 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6947 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6948
079e9a2f
AM
6949 symstrtab_hdr->sh_flags = 0;
6950 symstrtab_hdr->sh_addr = 0;
6951 symstrtab_hdr->sh_entsize = 0;
6952 symstrtab_hdr->sh_link = 0;
6953 symstrtab_hdr->sh_info = 0;
6954 symstrtab_hdr->sh_addralign = 1;
252b5132 6955
b34976b6 6956 return TRUE;
252b5132
RH
6957}
6958
6959/* Return the number of bytes required to hold the symtab vector.
6960
6961 Note that we base it on the count plus 1, since we will null terminate
6962 the vector allocated based on this size. However, the ELF symbol table
6963 always has a dummy entry as symbol #0, so it ends up even. */
6964
6965long
217aa764 6966_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6967{
6968 long symcount;
6969 long symtab_size;
6970 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6971
6972 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6973 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6974 if (symcount > 0)
6975 symtab_size -= sizeof (asymbol *);
252b5132
RH
6976
6977 return symtab_size;
6978}
6979
6980long
217aa764 6981_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6982{
6983 long symcount;
6984 long symtab_size;
6985 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6986
6987 if (elf_dynsymtab (abfd) == 0)
6988 {
6989 bfd_set_error (bfd_error_invalid_operation);
6990 return -1;
6991 }
6992
6993 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6994 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6995 if (symcount > 0)
6996 symtab_size -= sizeof (asymbol *);
252b5132
RH
6997
6998 return symtab_size;
6999}
7000
7001long
217aa764
AM
7002_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
7003 sec_ptr asect)
252b5132
RH
7004{
7005 return (asect->reloc_count + 1) * sizeof (arelent *);
7006}
7007
7008/* Canonicalize the relocs. */
7009
7010long
217aa764
AM
7011_bfd_elf_canonicalize_reloc (bfd *abfd,
7012 sec_ptr section,
7013 arelent **relptr,
7014 asymbol **symbols)
252b5132
RH
7015{
7016 arelent *tblptr;
7017 unsigned int i;
9c5bfbb7 7018 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7019
b34976b6 7020 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
7021 return -1;
7022
7023 tblptr = section->relocation;
7024 for (i = 0; i < section->reloc_count; i++)
7025 *relptr++ = tblptr++;
7026
7027 *relptr = NULL;
7028
7029 return section->reloc_count;
7030}
7031
7032long
6cee3f79 7033_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 7034{
9c5bfbb7 7035 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7036 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
7037
7038 if (symcount >= 0)
7039 bfd_get_symcount (abfd) = symcount;
7040 return symcount;
7041}
7042
7043long
217aa764
AM
7044_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
7045 asymbol **allocation)
252b5132 7046{
9c5bfbb7 7047 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7048 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
7049
7050 if (symcount >= 0)
7051 bfd_get_dynamic_symcount (abfd) = symcount;
7052 return symcount;
252b5132
RH
7053}
7054
8615f3f2
AM
7055/* Return the size required for the dynamic reloc entries. Any loadable
7056 section that was actually installed in the BFD, and has type SHT_REL
7057 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
7058 dynamic reloc section. */
252b5132
RH
7059
7060long
217aa764 7061_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
7062{
7063 long ret;
7064 asection *s;
7065
7066 if (elf_dynsymtab (abfd) == 0)
7067 {
7068 bfd_set_error (bfd_error_invalid_operation);
7069 return -1;
7070 }
7071
7072 ret = sizeof (arelent *);
7073 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 7074 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7075 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7076 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 7077 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
7078 * sizeof (arelent *));
7079
7080 return ret;
7081}
7082
8615f3f2
AM
7083/* Canonicalize the dynamic relocation entries. Note that we return the
7084 dynamic relocations as a single block, although they are actually
7085 associated with particular sections; the interface, which was
7086 designed for SunOS style shared libraries, expects that there is only
7087 one set of dynamic relocs. Any loadable section that was actually
7088 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
7089 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
7090
7091long
217aa764
AM
7092_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
7093 arelent **storage,
7094 asymbol **syms)
252b5132 7095{
217aa764 7096 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
7097 asection *s;
7098 long ret;
7099
7100 if (elf_dynsymtab (abfd) == 0)
7101 {
7102 bfd_set_error (bfd_error_invalid_operation);
7103 return -1;
7104 }
7105
7106 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
7107 ret = 0;
7108 for (s = abfd->sections; s != NULL; s = s->next)
7109 {
266b05cf 7110 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7111 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7112 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
7113 {
7114 arelent *p;
7115 long count, i;
7116
b34976b6 7117 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 7118 return -1;
eea6121a 7119 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
7120 p = s->relocation;
7121 for (i = 0; i < count; i++)
7122 *storage++ = p++;
7123 ret += count;
7124 }
7125 }
7126
7127 *storage = NULL;
7128
7129 return ret;
7130}
7131\f
7132/* Read in the version information. */
7133
b34976b6 7134bfd_boolean
fc0e6df6 7135_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
7136{
7137 bfd_byte *contents = NULL;
fc0e6df6
PB
7138 unsigned int freeidx = 0;
7139
7140 if (elf_dynverref (abfd) != 0)
7141 {
7142 Elf_Internal_Shdr *hdr;
7143 Elf_External_Verneed *everneed;
7144 Elf_Internal_Verneed *iverneed;
7145 unsigned int i;
d0fb9a8d 7146 bfd_byte *contents_end;
fc0e6df6
PB
7147
7148 hdr = &elf_tdata (abfd)->dynverref_hdr;
7149
a50b1753
NC
7150 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
7151 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
7152 if (elf_tdata (abfd)->verref == NULL)
7153 goto error_return;
7154
7155 elf_tdata (abfd)->cverrefs = hdr->sh_info;
7156
a50b1753 7157 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
fc0e6df6 7158 if (contents == NULL)
d0fb9a8d
JJ
7159 {
7160error_return_verref:
7161 elf_tdata (abfd)->verref = NULL;
7162 elf_tdata (abfd)->cverrefs = 0;
7163 goto error_return;
7164 }
fc0e6df6
PB
7165 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
7166 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 7167 goto error_return_verref;
fc0e6df6 7168
d0fb9a8d
JJ
7169 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
7170 goto error_return_verref;
7171
7172 BFD_ASSERT (sizeof (Elf_External_Verneed)
7173 == sizeof (Elf_External_Vernaux));
7174 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
7175 everneed = (Elf_External_Verneed *) contents;
7176 iverneed = elf_tdata (abfd)->verref;
7177 for (i = 0; i < hdr->sh_info; i++, iverneed++)
7178 {
7179 Elf_External_Vernaux *evernaux;
7180 Elf_Internal_Vernaux *ivernaux;
7181 unsigned int j;
7182
7183 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
7184
7185 iverneed->vn_bfd = abfd;
7186
7187 iverneed->vn_filename =
7188 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7189 iverneed->vn_file);
7190 if (iverneed->vn_filename == NULL)
d0fb9a8d 7191 goto error_return_verref;
fc0e6df6 7192
d0fb9a8d
JJ
7193 if (iverneed->vn_cnt == 0)
7194 iverneed->vn_auxptr = NULL;
7195 else
7196 {
a50b1753
NC
7197 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
7198 bfd_alloc2 (abfd, iverneed->vn_cnt,
7199 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
7200 if (iverneed->vn_auxptr == NULL)
7201 goto error_return_verref;
7202 }
7203
7204 if (iverneed->vn_aux
7205 > (size_t) (contents_end - (bfd_byte *) everneed))
7206 goto error_return_verref;
fc0e6df6
PB
7207
7208 evernaux = ((Elf_External_Vernaux *)
7209 ((bfd_byte *) everneed + iverneed->vn_aux));
7210 ivernaux = iverneed->vn_auxptr;
7211 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
7212 {
7213 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
7214
7215 ivernaux->vna_nodename =
7216 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7217 ivernaux->vna_name);
7218 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 7219 goto error_return_verref;
fc0e6df6
PB
7220
7221 if (j + 1 < iverneed->vn_cnt)
7222 ivernaux->vna_nextptr = ivernaux + 1;
7223 else
7224 ivernaux->vna_nextptr = NULL;
7225
d0fb9a8d
JJ
7226 if (ivernaux->vna_next
7227 > (size_t) (contents_end - (bfd_byte *) evernaux))
7228 goto error_return_verref;
7229
fc0e6df6
PB
7230 evernaux = ((Elf_External_Vernaux *)
7231 ((bfd_byte *) evernaux + ivernaux->vna_next));
7232
7233 if (ivernaux->vna_other > freeidx)
7234 freeidx = ivernaux->vna_other;
7235 }
7236
7237 if (i + 1 < hdr->sh_info)
7238 iverneed->vn_nextref = iverneed + 1;
7239 else
7240 iverneed->vn_nextref = NULL;
7241
d0fb9a8d
JJ
7242 if (iverneed->vn_next
7243 > (size_t) (contents_end - (bfd_byte *) everneed))
7244 goto error_return_verref;
7245
fc0e6df6
PB
7246 everneed = ((Elf_External_Verneed *)
7247 ((bfd_byte *) everneed + iverneed->vn_next));
7248 }
7249
7250 free (contents);
7251 contents = NULL;
7252 }
252b5132
RH
7253
7254 if (elf_dynverdef (abfd) != 0)
7255 {
7256 Elf_Internal_Shdr *hdr;
7257 Elf_External_Verdef *everdef;
7258 Elf_Internal_Verdef *iverdef;
f631889e
UD
7259 Elf_Internal_Verdef *iverdefarr;
7260 Elf_Internal_Verdef iverdefmem;
252b5132 7261 unsigned int i;
062e2358 7262 unsigned int maxidx;
d0fb9a8d 7263 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
7264
7265 hdr = &elf_tdata (abfd)->dynverdef_hdr;
7266
a50b1753 7267 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132
RH
7268 if (contents == NULL)
7269 goto error_return;
7270 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 7271 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
7272 goto error_return;
7273
d0fb9a8d
JJ
7274 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
7275 goto error_return;
7276
7277 BFD_ASSERT (sizeof (Elf_External_Verdef)
7278 >= sizeof (Elf_External_Verdaux));
7279 contents_end_def = contents + hdr->sh_size
7280 - sizeof (Elf_External_Verdef);
7281 contents_end_aux = contents + hdr->sh_size
7282 - sizeof (Elf_External_Verdaux);
7283
f631889e
UD
7284 /* We know the number of entries in the section but not the maximum
7285 index. Therefore we have to run through all entries and find
7286 the maximum. */
252b5132 7287 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
7288 maxidx = 0;
7289 for (i = 0; i < hdr->sh_info; ++i)
7290 {
7291 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7292
062e2358
AM
7293 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
7294 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 7295
d0fb9a8d
JJ
7296 if (iverdefmem.vd_next
7297 > (size_t) (contents_end_def - (bfd_byte *) everdef))
7298 goto error_return;
7299
f631889e
UD
7300 everdef = ((Elf_External_Verdef *)
7301 ((bfd_byte *) everdef + iverdefmem.vd_next));
7302 }
7303
fc0e6df6
PB
7304 if (default_imported_symver)
7305 {
7306 if (freeidx > maxidx)
7307 maxidx = ++freeidx;
7308 else
7309 freeidx = ++maxidx;
7310 }
a50b1753
NC
7311 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7312 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e
UD
7313 if (elf_tdata (abfd)->verdef == NULL)
7314 goto error_return;
7315
7316 elf_tdata (abfd)->cverdefs = maxidx;
7317
7318 everdef = (Elf_External_Verdef *) contents;
7319 iverdefarr = elf_tdata (abfd)->verdef;
7320 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
7321 {
7322 Elf_External_Verdaux *everdaux;
7323 Elf_Internal_Verdaux *iverdaux;
7324 unsigned int j;
7325
f631889e
UD
7326 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7327
d0fb9a8d
JJ
7328 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
7329 {
7330error_return_verdef:
7331 elf_tdata (abfd)->verdef = NULL;
7332 elf_tdata (abfd)->cverdefs = 0;
7333 goto error_return;
7334 }
7335
f631889e
UD
7336 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
7337 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
7338
7339 iverdef->vd_bfd = abfd;
7340
d0fb9a8d
JJ
7341 if (iverdef->vd_cnt == 0)
7342 iverdef->vd_auxptr = NULL;
7343 else
7344 {
a50b1753
NC
7345 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7346 bfd_alloc2 (abfd, iverdef->vd_cnt,
7347 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7348 if (iverdef->vd_auxptr == NULL)
7349 goto error_return_verdef;
7350 }
7351
7352 if (iverdef->vd_aux
7353 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
7354 goto error_return_verdef;
252b5132
RH
7355
7356 everdaux = ((Elf_External_Verdaux *)
7357 ((bfd_byte *) everdef + iverdef->vd_aux));
7358 iverdaux = iverdef->vd_auxptr;
7359 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
7360 {
7361 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
7362
7363 iverdaux->vda_nodename =
7364 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7365 iverdaux->vda_name);
7366 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 7367 goto error_return_verdef;
252b5132
RH
7368
7369 if (j + 1 < iverdef->vd_cnt)
7370 iverdaux->vda_nextptr = iverdaux + 1;
7371 else
7372 iverdaux->vda_nextptr = NULL;
7373
d0fb9a8d
JJ
7374 if (iverdaux->vda_next
7375 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
7376 goto error_return_verdef;
7377
252b5132
RH
7378 everdaux = ((Elf_External_Verdaux *)
7379 ((bfd_byte *) everdaux + iverdaux->vda_next));
7380 }
7381
d0fb9a8d
JJ
7382 if (iverdef->vd_cnt)
7383 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 7384
d0fb9a8d 7385 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
7386 iverdef->vd_nextdef = iverdef + 1;
7387 else
7388 iverdef->vd_nextdef = NULL;
7389
7390 everdef = ((Elf_External_Verdef *)
7391 ((bfd_byte *) everdef + iverdef->vd_next));
7392 }
7393
7394 free (contents);
7395 contents = NULL;
7396 }
fc0e6df6 7397 else if (default_imported_symver)
252b5132 7398 {
fc0e6df6
PB
7399 if (freeidx < 3)
7400 freeidx = 3;
7401 else
7402 freeidx++;
252b5132 7403
a50b1753
NC
7404 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7405 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 7406 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
7407 goto error_return;
7408
fc0e6df6
PB
7409 elf_tdata (abfd)->cverdefs = freeidx;
7410 }
252b5132 7411
fc0e6df6
PB
7412 /* Create a default version based on the soname. */
7413 if (default_imported_symver)
7414 {
7415 Elf_Internal_Verdef *iverdef;
7416 Elf_Internal_Verdaux *iverdaux;
252b5132 7417
5bb3703f 7418 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 7419
fc0e6df6
PB
7420 iverdef->vd_version = VER_DEF_CURRENT;
7421 iverdef->vd_flags = 0;
7422 iverdef->vd_ndx = freeidx;
7423 iverdef->vd_cnt = 1;
252b5132 7424
fc0e6df6 7425 iverdef->vd_bfd = abfd;
252b5132 7426
fc0e6df6
PB
7427 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
7428 if (iverdef->vd_nodename == NULL)
d0fb9a8d 7429 goto error_return_verdef;
fc0e6df6 7430 iverdef->vd_nextdef = NULL;
a50b1753
NC
7431 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7432 bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7433 if (iverdef->vd_auxptr == NULL)
7434 goto error_return_verdef;
252b5132 7435
fc0e6df6
PB
7436 iverdaux = iverdef->vd_auxptr;
7437 iverdaux->vda_nodename = iverdef->vd_nodename;
7438 iverdaux->vda_nextptr = NULL;
252b5132
RH
7439 }
7440
b34976b6 7441 return TRUE;
252b5132
RH
7442
7443 error_return:
5ed6aba4 7444 if (contents != NULL)
252b5132 7445 free (contents);
b34976b6 7446 return FALSE;
252b5132
RH
7447}
7448\f
7449asymbol *
217aa764 7450_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7451{
7452 elf_symbol_type *newsym;
dc810e39 7453 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 7454
a50b1753 7455 newsym = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132
RH
7456 if (!newsym)
7457 return NULL;
7458 else
7459 {
7460 newsym->symbol.the_bfd = abfd;
7461 return &newsym->symbol;
7462 }
7463}
7464
7465void
217aa764
AM
7466_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7467 asymbol *symbol,
7468 symbol_info *ret)
252b5132
RH
7469{
7470 bfd_symbol_info (symbol, ret);
7471}
7472
7473/* Return whether a symbol name implies a local symbol. Most targets
7474 use this function for the is_local_label_name entry point, but some
7475 override it. */
7476
b34976b6 7477bfd_boolean
217aa764
AM
7478_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7479 const char *name)
252b5132
RH
7480{
7481 /* Normal local symbols start with ``.L''. */
7482 if (name[0] == '.' && name[1] == 'L')
b34976b6 7483 return TRUE;
252b5132
RH
7484
7485 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7486 DWARF debugging symbols starting with ``..''. */
7487 if (name[0] == '.' && name[1] == '.')
b34976b6 7488 return TRUE;
252b5132
RH
7489
7490 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7491 emitting DWARF debugging output. I suspect this is actually a
7492 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7493 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7494 underscore to be emitted on some ELF targets). For ease of use,
7495 we treat such symbols as local. */
7496 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7497 return TRUE;
252b5132 7498
b34976b6 7499 return FALSE;
252b5132
RH
7500}
7501
7502alent *
217aa764
AM
7503_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7504 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7505{
7506 abort ();
7507 return NULL;
7508}
7509
b34976b6 7510bfd_boolean
217aa764
AM
7511_bfd_elf_set_arch_mach (bfd *abfd,
7512 enum bfd_architecture arch,
7513 unsigned long machine)
252b5132
RH
7514{
7515 /* If this isn't the right architecture for this backend, and this
7516 isn't the generic backend, fail. */
7517 if (arch != get_elf_backend_data (abfd)->arch
7518 && arch != bfd_arch_unknown
7519 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7520 return FALSE;
252b5132
RH
7521
7522 return bfd_default_set_arch_mach (abfd, arch, machine);
7523}
7524
d1fad7c6
NC
7525/* Find the function to a particular section and offset,
7526 for error reporting. */
252b5132 7527
b34976b6 7528static bfd_boolean
b9d678e0 7529elf_find_function (bfd *abfd,
217aa764
AM
7530 asection *section,
7531 asymbol **symbols,
7532 bfd_vma offset,
7533 const char **filename_ptr,
7534 const char **functionname_ptr)
252b5132 7535{
619a703e
AM
7536 struct elf_find_function_cache
7537 {
7538 asection *last_section;
7539 asymbol *func;
7540 const char *filename;
7541 bfd_size_type func_size;
7542 } *cache;
252b5132 7543
a06c7d5a
NC
7544 if (symbols == NULL)
7545 return FALSE;
7546
619a703e
AM
7547 cache = elf_tdata (abfd)->elf_find_function_cache;
7548 if (cache == NULL)
7549 {
7550 cache = bfd_zalloc (abfd, sizeof (*cache));
7551 elf_tdata (abfd)->elf_find_function_cache = cache;
7552 if (cache == NULL)
7553 return FALSE;
7554 }
7555 if (cache->last_section != section
7556 || cache->func == NULL
7557 || offset < cache->func->value
7558 || offset >= cache->func->value + cache->func_size)
aef36ac1
AM
7559 {
7560 asymbol *file;
7561 bfd_vma low_func;
7562 asymbol **p;
7563 /* ??? Given multiple file symbols, it is impossible to reliably
7564 choose the right file name for global symbols. File symbols are
7565 local symbols, and thus all file symbols must sort before any
7566 global symbols. The ELF spec may be interpreted to say that a
7567 file symbol must sort before other local symbols, but currently
7568 ld -r doesn't do this. So, for ld -r output, it is possible to
7569 make a better choice of file name for local symbols by ignoring
7570 file symbols appearing after a given local symbol. */
7571 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
7572 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7573
aef36ac1
AM
7574 file = NULL;
7575 low_func = 0;
7576 state = nothing_seen;
619a703e
AM
7577 cache->filename = NULL;
7578 cache->func = NULL;
7579 cache->func_size = 0;
7580 cache->last_section = section;
aef36ac1
AM
7581
7582 for (p = symbols; *p != NULL; p++)
7583 {
7584 asymbol *sym = *p;
7585 bfd_vma code_off;
7586 bfd_size_type size;
7587
7588 if ((sym->flags & BSF_FILE) != 0)
7589 {
7590 file = sym;
7591 if (state == symbol_seen)
7592 state = file_after_symbol_seen;
7593 continue;
7594 }
ff9e0f5b 7595
aef36ac1
AM
7596 size = bed->maybe_function_sym (sym, section, &code_off);
7597 if (size != 0
7598 && code_off <= offset
7599 && (code_off > low_func
7600 || (code_off == low_func
619a703e 7601 && size > cache->func_size)))
aef36ac1 7602 {
619a703e
AM
7603 cache->func = sym;
7604 cache->func_size = size;
7605 cache->filename = NULL;
aef36ac1 7606 low_func = code_off;
aef36ac1
AM
7607 if (file != NULL
7608 && ((sym->flags & BSF_LOCAL) != 0
7609 || state != file_after_symbol_seen))
619a703e 7610 cache->filename = bfd_asymbol_name (file);
aef36ac1
AM
7611 }
7612 if (state == nothing_seen)
7613 state = symbol_seen;
252b5132
RH
7614 }
7615 }
7616
619a703e 7617 if (cache->func == NULL)
b34976b6 7618 return FALSE;
252b5132 7619
d1fad7c6 7620 if (filename_ptr)
619a703e 7621 *filename_ptr = cache->filename;
d1fad7c6 7622 if (functionname_ptr)
619a703e 7623 *functionname_ptr = bfd_asymbol_name (cache->func);
d1fad7c6 7624
b34976b6 7625 return TRUE;
d1fad7c6
NC
7626}
7627
7628/* Find the nearest line to a particular section and offset,
7629 for error reporting. */
7630
b34976b6 7631bfd_boolean
217aa764
AM
7632_bfd_elf_find_nearest_line (bfd *abfd,
7633 asection *section,
7634 asymbol **symbols,
7635 bfd_vma offset,
7636 const char **filename_ptr,
7637 const char **functionname_ptr,
7638 unsigned int *line_ptr)
9b8d1a36
CC
7639{
7640 return _bfd_elf_find_nearest_line_discriminator (abfd, section, symbols,
7641 offset, filename_ptr,
7642 functionname_ptr,
7643 line_ptr,
7644 NULL);
7645}
7646
7647bfd_boolean
7648_bfd_elf_find_nearest_line_discriminator (bfd *abfd,
7649 asection *section,
7650 asymbol **symbols,
7651 bfd_vma offset,
7652 const char **filename_ptr,
7653 const char **functionname_ptr,
7654 unsigned int *line_ptr,
7655 unsigned int *discriminator_ptr)
d1fad7c6 7656{
b34976b6 7657 bfd_boolean found;
d1fad7c6
NC
7658
7659 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7660 filename_ptr, functionname_ptr,
7661 line_ptr))
d1fad7c6
NC
7662 {
7663 if (!*functionname_ptr)
4e8a9624
AM
7664 elf_find_function (abfd, section, symbols, offset,
7665 *filename_ptr ? NULL : filename_ptr,
7666 functionname_ptr);
7667
b34976b6 7668 return TRUE;
d1fad7c6
NC
7669 }
7670
fc28f9aa
TG
7671 if (_bfd_dwarf2_find_nearest_line (abfd, dwarf_debug_sections,
7672 section, symbols, offset,
4e8a9624 7673 filename_ptr, functionname_ptr,
9b8d1a36 7674 line_ptr, discriminator_ptr, 0,
4e8a9624 7675 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7676 {
7677 if (!*functionname_ptr)
4e8a9624
AM
7678 elf_find_function (abfd, section, symbols, offset,
7679 *filename_ptr ? NULL : filename_ptr,
7680 functionname_ptr);
7681
b34976b6 7682 return TRUE;
d1fad7c6
NC
7683 }
7684
7685 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7686 &found, filename_ptr,
7687 functionname_ptr, line_ptr,
7688 &elf_tdata (abfd)->line_info))
b34976b6 7689 return FALSE;
dc43ada5 7690 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7691 return TRUE;
d1fad7c6
NC
7692
7693 if (symbols == NULL)
b34976b6 7694 return FALSE;
d1fad7c6
NC
7695
7696 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7697 filename_ptr, functionname_ptr))
b34976b6 7698 return FALSE;
d1fad7c6 7699
252b5132 7700 *line_ptr = 0;
b34976b6 7701 return TRUE;
252b5132
RH
7702}
7703
5420f73d
L
7704/* Find the line for a symbol. */
7705
7706bfd_boolean
7707_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7708 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36
CC
7709{
7710 return _bfd_elf_find_line_discriminator (abfd, symbols, symbol,
7711 filename_ptr, line_ptr,
7712 NULL);
7713}
7714
7715bfd_boolean
7716_bfd_elf_find_line_discriminator (bfd *abfd, asymbol **symbols, asymbol *symbol,
7717 const char **filename_ptr,
7718 unsigned int *line_ptr,
7719 unsigned int *discriminator_ptr)
5420f73d
L
7720{
7721 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
9b8d1a36 7722 filename_ptr, line_ptr, discriminator_ptr, 0,
5420f73d
L
7723 &elf_tdata (abfd)->dwarf2_find_line_info);
7724}
7725
4ab527b0
FF
7726/* After a call to bfd_find_nearest_line, successive calls to
7727 bfd_find_inliner_info can be used to get source information about
7728 each level of function inlining that terminated at the address
7729 passed to bfd_find_nearest_line. Currently this is only supported
7730 for DWARF2 with appropriate DWARF3 extensions. */
7731
7732bfd_boolean
7733_bfd_elf_find_inliner_info (bfd *abfd,
7734 const char **filename_ptr,
7735 const char **functionname_ptr,
7736 unsigned int *line_ptr)
7737{
7738 bfd_boolean found;
7739 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7740 functionname_ptr, line_ptr,
7741 & elf_tdata (abfd)->dwarf2_find_line_info);
7742 return found;
7743}
7744
252b5132 7745int
a6b96beb 7746_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7747{
8ded5a0f
AM
7748 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7749 int ret = bed->s->sizeof_ehdr;
252b5132 7750
a6b96beb 7751 if (!info->relocatable)
8ded5a0f 7752 {
12bd6957 7753 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 7754
62d7a5f6
AM
7755 if (phdr_size == (bfd_size_type) -1)
7756 {
7757 struct elf_segment_map *m;
7758
7759 phdr_size = 0;
12bd6957 7760 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 7761 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7762
62d7a5f6
AM
7763 if (phdr_size == 0)
7764 phdr_size = get_program_header_size (abfd, info);
7765 }
8ded5a0f 7766
12bd6957 7767 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
7768 ret += phdr_size;
7769 }
7770
252b5132
RH
7771 return ret;
7772}
7773
b34976b6 7774bfd_boolean
217aa764
AM
7775_bfd_elf_set_section_contents (bfd *abfd,
7776 sec_ptr section,
0f867abe 7777 const void *location,
217aa764
AM
7778 file_ptr offset,
7779 bfd_size_type count)
252b5132
RH
7780{
7781 Elf_Internal_Shdr *hdr;
dc810e39 7782 bfd_signed_vma pos;
252b5132
RH
7783
7784 if (! abfd->output_has_begun
217aa764 7785 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7786 return FALSE;
252b5132
RH
7787
7788 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7789 pos = hdr->sh_offset + offset;
7790 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7791 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7792 return FALSE;
252b5132 7793
b34976b6 7794 return TRUE;
252b5132
RH
7795}
7796
7797void
217aa764
AM
7798_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7799 arelent *cache_ptr ATTRIBUTE_UNUSED,
7800 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7801{
7802 abort ();
7803}
7804
252b5132
RH
7805/* Try to convert a non-ELF reloc into an ELF one. */
7806
b34976b6 7807bfd_boolean
217aa764 7808_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7809{
c044fabd 7810 /* Check whether we really have an ELF howto. */
252b5132
RH
7811
7812 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7813 {
7814 bfd_reloc_code_real_type code;
7815 reloc_howto_type *howto;
7816
7817 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7818 equivalent ELF reloc. */
252b5132
RH
7819
7820 if (areloc->howto->pc_relative)
7821 {
7822 switch (areloc->howto->bitsize)
7823 {
7824 case 8:
7825 code = BFD_RELOC_8_PCREL;
7826 break;
7827 case 12:
7828 code = BFD_RELOC_12_PCREL;
7829 break;
7830 case 16:
7831 code = BFD_RELOC_16_PCREL;
7832 break;
7833 case 24:
7834 code = BFD_RELOC_24_PCREL;
7835 break;
7836 case 32:
7837 code = BFD_RELOC_32_PCREL;
7838 break;
7839 case 64:
7840 code = BFD_RELOC_64_PCREL;
7841 break;
7842 default:
7843 goto fail;
7844 }
7845
7846 howto = bfd_reloc_type_lookup (abfd, code);
7847
7848 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7849 {
7850 if (howto->pcrel_offset)
7851 areloc->addend += areloc->address;
7852 else
7853 areloc->addend -= areloc->address; /* addend is unsigned!! */
7854 }
7855 }
7856 else
7857 {
7858 switch (areloc->howto->bitsize)
7859 {
7860 case 8:
7861 code = BFD_RELOC_8;
7862 break;
7863 case 14:
7864 code = BFD_RELOC_14;
7865 break;
7866 case 16:
7867 code = BFD_RELOC_16;
7868 break;
7869 case 26:
7870 code = BFD_RELOC_26;
7871 break;
7872 case 32:
7873 code = BFD_RELOC_32;
7874 break;
7875 case 64:
7876 code = BFD_RELOC_64;
7877 break;
7878 default:
7879 goto fail;
7880 }
7881
7882 howto = bfd_reloc_type_lookup (abfd, code);
7883 }
7884
7885 if (howto)
7886 areloc->howto = howto;
7887 else
7888 goto fail;
7889 }
7890
b34976b6 7891 return TRUE;
252b5132
RH
7892
7893 fail:
7894 (*_bfd_error_handler)
d003868e
AM
7895 (_("%B: unsupported relocation type %s"),
7896 abfd, areloc->howto->name);
252b5132 7897 bfd_set_error (bfd_error_bad_value);
b34976b6 7898 return FALSE;
252b5132
RH
7899}
7900
b34976b6 7901bfd_boolean
217aa764 7902_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 7903{
d9071b0c
TG
7904 struct elf_obj_tdata *tdata = elf_tdata (abfd);
7905 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 7906 {
c0355132 7907 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7908 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 7909 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
7910 }
7911
7912 return _bfd_generic_close_and_cleanup (abfd);
7913}
7914
7915/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7916 in the relocation's offset. Thus we cannot allow any sort of sanity
7917 range-checking to interfere. There is nothing else to do in processing
7918 this reloc. */
7919
7920bfd_reloc_status_type
217aa764
AM
7921_bfd_elf_rel_vtable_reloc_fn
7922 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7923 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7924 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7925 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7926{
7927 return bfd_reloc_ok;
7928}
252b5132
RH
7929\f
7930/* Elf core file support. Much of this only works on native
7931 toolchains, since we rely on knowing the
7932 machine-dependent procfs structure in order to pick
c044fabd 7933 out details about the corefile. */
252b5132
RH
7934
7935#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
7936/* Needed for new procfs interface on sparc-solaris. */
7937# define _STRUCTURED_PROC 1
252b5132
RH
7938# include <sys/procfs.h>
7939#endif
7940
261b8d08
PA
7941/* Return a PID that identifies a "thread" for threaded cores, or the
7942 PID of the main process for non-threaded cores. */
252b5132
RH
7943
7944static int
217aa764 7945elfcore_make_pid (bfd *abfd)
252b5132 7946{
261b8d08
PA
7947 int pid;
7948
228e534f 7949 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 7950 if (pid == 0)
228e534f 7951 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
7952
7953 return pid;
252b5132
RH
7954}
7955
252b5132
RH
7956/* If there isn't a section called NAME, make one, using
7957 data from SECT. Note, this function will generate a
7958 reference to NAME, so you shouldn't deallocate or
c044fabd 7959 overwrite it. */
252b5132 7960
b34976b6 7961static bfd_boolean
217aa764 7962elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7963{
c044fabd 7964 asection *sect2;
252b5132
RH
7965
7966 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7967 return TRUE;
252b5132 7968
117ed4f8 7969 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7970 if (sect2 == NULL)
b34976b6 7971 return FALSE;
252b5132 7972
eea6121a 7973 sect2->size = sect->size;
252b5132 7974 sect2->filepos = sect->filepos;
252b5132 7975 sect2->alignment_power = sect->alignment_power;
b34976b6 7976 return TRUE;
252b5132
RH
7977}
7978
bb0082d6
AM
7979/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7980 actually creates up to two pseudosections:
7981 - For the single-threaded case, a section named NAME, unless
7982 such a section already exists.
7983 - For the multi-threaded case, a section named "NAME/PID", where
7984 PID is elfcore_make_pid (abfd).
7985 Both pseudosections have identical contents. */
b34976b6 7986bfd_boolean
217aa764
AM
7987_bfd_elfcore_make_pseudosection (bfd *abfd,
7988 char *name,
7989 size_t size,
7990 ufile_ptr filepos)
bb0082d6
AM
7991{
7992 char buf[100];
7993 char *threaded_name;
d4c88bbb 7994 size_t len;
bb0082d6
AM
7995 asection *sect;
7996
7997 /* Build the section name. */
7998
7999 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 8000 len = strlen (buf) + 1;
a50b1753 8001 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8002 if (threaded_name == NULL)
b34976b6 8003 return FALSE;
d4c88bbb 8004 memcpy (threaded_name, buf, len);
bb0082d6 8005
117ed4f8
AM
8006 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8007 SEC_HAS_CONTENTS);
bb0082d6 8008 if (sect == NULL)
b34976b6 8009 return FALSE;
eea6121a 8010 sect->size = size;
bb0082d6 8011 sect->filepos = filepos;
bb0082d6
AM
8012 sect->alignment_power = 2;
8013
936e320b 8014 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
8015}
8016
252b5132 8017/* prstatus_t exists on:
4a938328 8018 solaris 2.5+
252b5132
RH
8019 linux 2.[01] + glibc
8020 unixware 4.2
8021*/
8022
8023#if defined (HAVE_PRSTATUS_T)
a7b97311 8024
b34976b6 8025static bfd_boolean
217aa764 8026elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8027{
eea6121a 8028 size_t size;
7ee38065 8029 int offset;
252b5132 8030
4a938328
MS
8031 if (note->descsz == sizeof (prstatus_t))
8032 {
8033 prstatus_t prstat;
252b5132 8034
eea6121a 8035 size = sizeof (prstat.pr_reg);
7ee38065 8036 offset = offsetof (prstatus_t, pr_reg);
4a938328 8037 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 8038
fa49d224
NC
8039 /* Do not overwrite the core signal if it
8040 has already been set by another thread. */
228e534f
AM
8041 if (elf_tdata (abfd)->core->signal == 0)
8042 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8043 if (elf_tdata (abfd)->core->pid == 0)
8044 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 8045
4a938328
MS
8046 /* pr_who exists on:
8047 solaris 2.5+
8048 unixware 4.2
8049 pr_who doesn't exist on:
8050 linux 2.[01]
8051 */
252b5132 8052#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 8053 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8054#else
228e534f 8055 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 8056#endif
4a938328 8057 }
7ee38065 8058#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
8059 else if (note->descsz == sizeof (prstatus32_t))
8060 {
8061 /* 64-bit host, 32-bit corefile */
8062 prstatus32_t prstat;
8063
eea6121a 8064 size = sizeof (prstat.pr_reg);
7ee38065 8065 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
8066 memcpy (&prstat, note->descdata, sizeof (prstat));
8067
fa49d224
NC
8068 /* Do not overwrite the core signal if it
8069 has already been set by another thread. */
228e534f
AM
8070 if (elf_tdata (abfd)->core->signal == 0)
8071 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8072 if (elf_tdata (abfd)->core->pid == 0)
8073 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
8074
8075 /* pr_who exists on:
8076 solaris 2.5+
8077 unixware 4.2
8078 pr_who doesn't exist on:
8079 linux 2.[01]
8080 */
7ee38065 8081#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 8082 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8083#else
228e534f 8084 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
8085#endif
8086 }
7ee38065 8087#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
8088 else
8089 {
8090 /* Fail - we don't know how to handle any other
8091 note size (ie. data object type). */
b34976b6 8092 return TRUE;
4a938328 8093 }
252b5132 8094
bb0082d6 8095 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 8096 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 8097 size, note->descpos + offset);
252b5132
RH
8098}
8099#endif /* defined (HAVE_PRSTATUS_T) */
8100
bb0082d6 8101/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 8102static bfd_boolean
217aa764
AM
8103elfcore_make_note_pseudosection (bfd *abfd,
8104 char *name,
8105 Elf_Internal_Note *note)
252b5132 8106{
936e320b
AM
8107 return _bfd_elfcore_make_pseudosection (abfd, name,
8108 note->descsz, note->descpos);
252b5132
RH
8109}
8110
ff08c6bb
JB
8111/* There isn't a consistent prfpregset_t across platforms,
8112 but it doesn't matter, because we don't have to pick this
c044fabd
KH
8113 data structure apart. */
8114
b34976b6 8115static bfd_boolean
217aa764 8116elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8117{
8118 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8119}
8120
ff08c6bb 8121/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 8122 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 8123 literally. */
c044fabd 8124
b34976b6 8125static bfd_boolean
217aa764 8126elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8127{
8128 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8129}
8130
4339cae0
L
8131/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
8132 with a note type of NT_X86_XSTATE. Just include the whole note's
8133 contents literally. */
8134
8135static bfd_boolean
8136elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
8137{
8138 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
8139}
8140
97753bd5
AM
8141static bfd_boolean
8142elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
8143{
8144 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
8145}
8146
89eeb0bc
LM
8147static bfd_boolean
8148elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
8149{
8150 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
8151}
97753bd5 8152
0675e188
UW
8153static bfd_boolean
8154elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
8155{
8156 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
8157}
8158
d7eeb400
MS
8159static bfd_boolean
8160elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
8161{
8162 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
8163}
8164
8165static bfd_boolean
8166elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
8167{
8168 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
8169}
8170
8171static bfd_boolean
8172elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
8173{
8174 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
8175}
8176
8177static bfd_boolean
8178elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
8179{
8180 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
8181}
8182
8183static bfd_boolean
8184elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
8185{
8186 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
8187}
8188
355b81d9
UW
8189static bfd_boolean
8190elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
8191{
8192 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
8193}
8194
8195static bfd_boolean
8196elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
8197{
8198 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
8199}
8200
abb3f6cc
NC
8201static bfd_boolean
8202elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
8203{
8204 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
8205}
8206
faa9a424
UW
8207static bfd_boolean
8208elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
8209{
8210 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
8211}
8212
652451f8
YZ
8213static bfd_boolean
8214elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
8215{
8216 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
8217}
8218
8219static bfd_boolean
8220elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
8221{
8222 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
8223}
8224
8225static bfd_boolean
8226elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
8227{
8228 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
8229}
8230
252b5132 8231#if defined (HAVE_PRPSINFO_T)
4a938328 8232typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 8233#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8234typedef prpsinfo32_t elfcore_psinfo32_t;
8235#endif
252b5132
RH
8236#endif
8237
8238#if defined (HAVE_PSINFO_T)
4a938328 8239typedef psinfo_t elfcore_psinfo_t;
7ee38065 8240#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8241typedef psinfo32_t elfcore_psinfo32_t;
8242#endif
252b5132
RH
8243#endif
8244
252b5132
RH
8245/* return a malloc'ed copy of a string at START which is at
8246 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 8247 the copy will always have a terminating '\0'. */
252b5132 8248
936e320b 8249char *
217aa764 8250_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 8251{
dc810e39 8252 char *dups;
a50b1753 8253 char *end = (char *) memchr (start, '\0', max);
dc810e39 8254 size_t len;
252b5132
RH
8255
8256 if (end == NULL)
8257 len = max;
8258 else
8259 len = end - start;
8260
a50b1753 8261 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 8262 if (dups == NULL)
252b5132
RH
8263 return NULL;
8264
dc810e39
AM
8265 memcpy (dups, start, len);
8266 dups[len] = '\0';
252b5132 8267
dc810e39 8268 return dups;
252b5132
RH
8269}
8270
bb0082d6 8271#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 8272static bfd_boolean
217aa764 8273elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 8274{
4a938328
MS
8275 if (note->descsz == sizeof (elfcore_psinfo_t))
8276 {
8277 elfcore_psinfo_t psinfo;
252b5132 8278
7ee38065 8279 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8280
335e41d4 8281#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 8282 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8283#endif
228e534f 8284 elf_tdata (abfd)->core->program
936e320b
AM
8285 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8286 sizeof (psinfo.pr_fname));
252b5132 8287
228e534f 8288 elf_tdata (abfd)->core->command
936e320b
AM
8289 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8290 sizeof (psinfo.pr_psargs));
4a938328 8291 }
7ee38065 8292#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
8293 else if (note->descsz == sizeof (elfcore_psinfo32_t))
8294 {
8295 /* 64-bit host, 32-bit corefile */
8296 elfcore_psinfo32_t psinfo;
8297
7ee38065 8298 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8299
335e41d4 8300#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 8301 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 8302#endif
228e534f 8303 elf_tdata (abfd)->core->program
936e320b
AM
8304 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8305 sizeof (psinfo.pr_fname));
4a938328 8306
228e534f 8307 elf_tdata (abfd)->core->command
936e320b
AM
8308 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8309 sizeof (psinfo.pr_psargs));
4a938328
MS
8310 }
8311#endif
8312
8313 else
8314 {
8315 /* Fail - we don't know how to handle any other
8316 note size (ie. data object type). */
b34976b6 8317 return TRUE;
4a938328 8318 }
252b5132
RH
8319
8320 /* Note that for some reason, a spurious space is tacked
8321 onto the end of the args in some (at least one anyway)
c044fabd 8322 implementations, so strip it off if it exists. */
252b5132
RH
8323
8324 {
228e534f 8325 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
8326 int n = strlen (command);
8327
8328 if (0 < n && command[n - 1] == ' ')
8329 command[n - 1] = '\0';
8330 }
8331
b34976b6 8332 return TRUE;
252b5132
RH
8333}
8334#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
8335
252b5132 8336#if defined (HAVE_PSTATUS_T)
b34976b6 8337static bfd_boolean
217aa764 8338elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8339{
f572a39d
AM
8340 if (note->descsz == sizeof (pstatus_t)
8341#if defined (HAVE_PXSTATUS_T)
8342 || note->descsz == sizeof (pxstatus_t)
8343#endif
8344 )
4a938328
MS
8345 {
8346 pstatus_t pstat;
252b5132 8347
4a938328 8348 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8349
228e534f 8350 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 8351 }
7ee38065 8352#if defined (HAVE_PSTATUS32_T)
4a938328
MS
8353 else if (note->descsz == sizeof (pstatus32_t))
8354 {
8355 /* 64-bit host, 32-bit corefile */
8356 pstatus32_t pstat;
252b5132 8357
4a938328 8358 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8359
228e534f 8360 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
8361 }
8362#endif
252b5132
RH
8363 /* Could grab some more details from the "representative"
8364 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 8365 NT_LWPSTATUS note, presumably. */
252b5132 8366
b34976b6 8367 return TRUE;
252b5132
RH
8368}
8369#endif /* defined (HAVE_PSTATUS_T) */
8370
252b5132 8371#if defined (HAVE_LWPSTATUS_T)
b34976b6 8372static bfd_boolean
217aa764 8373elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
8374{
8375 lwpstatus_t lwpstat;
8376 char buf[100];
c044fabd 8377 char *name;
d4c88bbb 8378 size_t len;
c044fabd 8379 asection *sect;
252b5132 8380
f572a39d
AM
8381 if (note->descsz != sizeof (lwpstat)
8382#if defined (HAVE_LWPXSTATUS_T)
8383 && note->descsz != sizeof (lwpxstatus_t)
8384#endif
8385 )
b34976b6 8386 return TRUE;
252b5132
RH
8387
8388 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
8389
228e534f 8390 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
8391 /* Do not overwrite the core signal if it has already been set by
8392 another thread. */
228e534f
AM
8393 if (elf_tdata (abfd)->core->signal == 0)
8394 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 8395
c044fabd 8396 /* Make a ".reg/999" section. */
252b5132
RH
8397
8398 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 8399 len = strlen (buf) + 1;
217aa764 8400 name = bfd_alloc (abfd, len);
252b5132 8401 if (name == NULL)
b34976b6 8402 return FALSE;
d4c88bbb 8403 memcpy (name, buf, len);
252b5132 8404
117ed4f8 8405 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8406 if (sect == NULL)
b34976b6 8407 return FALSE;
252b5132
RH
8408
8409#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8410 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
8411 sect->filepos = note->descpos
8412 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
8413#endif
8414
8415#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 8416 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
8417 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
8418#endif
8419
252b5132
RH
8420 sect->alignment_power = 2;
8421
8422 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8423 return FALSE;
252b5132
RH
8424
8425 /* Make a ".reg2/999" section */
8426
8427 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 8428 len = strlen (buf) + 1;
217aa764 8429 name = bfd_alloc (abfd, len);
252b5132 8430 if (name == NULL)
b34976b6 8431 return FALSE;
d4c88bbb 8432 memcpy (name, buf, len);
252b5132 8433
117ed4f8 8434 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8435 if (sect == NULL)
b34976b6 8436 return FALSE;
252b5132
RH
8437
8438#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8439 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
8440 sect->filepos = note->descpos
8441 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
8442#endif
8443
8444#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 8445 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
8446 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
8447#endif
8448
252b5132
RH
8449 sect->alignment_power = 2;
8450
936e320b 8451 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
8452}
8453#endif /* defined (HAVE_LWPSTATUS_T) */
8454
b34976b6 8455static bfd_boolean
217aa764 8456elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
8457{
8458 char buf[30];
c044fabd 8459 char *name;
d4c88bbb 8460 size_t len;
c044fabd 8461 asection *sect;
4a6636fb
PA
8462 int type;
8463 int is_active_thread;
8464 bfd_vma base_addr;
16e9c715 8465
4a6636fb 8466 if (note->descsz < 728)
b34976b6 8467 return TRUE;
16e9c715 8468
4a6636fb
PA
8469 if (! CONST_STRNEQ (note->namedata, "win32"))
8470 return TRUE;
8471
8472 type = bfd_get_32 (abfd, note->descdata);
c044fabd 8473
4a6636fb 8474 switch (type)
16e9c715 8475 {
4a6636fb 8476 case 1 /* NOTE_INFO_PROCESS */:
228e534f 8477 /* FIXME: need to add ->core->command. */
4a6636fb 8478 /* process_info.pid */
228e534f 8479 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 8480 /* process_info.signal */
228e534f 8481 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 8482 break;
16e9c715 8483
4a6636fb 8484 case 2 /* NOTE_INFO_THREAD */:
16e9c715 8485 /* Make a ".reg/999" section. */
4a6636fb
PA
8486 /* thread_info.tid */
8487 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 8488
d4c88bbb 8489 len = strlen (buf) + 1;
a50b1753 8490 name = (char *) bfd_alloc (abfd, len);
16e9c715 8491 if (name == NULL)
b34976b6 8492 return FALSE;
c044fabd 8493
d4c88bbb 8494 memcpy (name, buf, len);
16e9c715 8495
117ed4f8 8496 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 8497 if (sect == NULL)
b34976b6 8498 return FALSE;
c044fabd 8499
4a6636fb
PA
8500 /* sizeof (thread_info.thread_context) */
8501 sect->size = 716;
8502 /* offsetof (thread_info.thread_context) */
8503 sect->filepos = note->descpos + 12;
16e9c715
NC
8504 sect->alignment_power = 2;
8505
4a6636fb
PA
8506 /* thread_info.is_active_thread */
8507 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
8508
8509 if (is_active_thread)
16e9c715 8510 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8511 return FALSE;
16e9c715
NC
8512 break;
8513
4a6636fb 8514 case 3 /* NOTE_INFO_MODULE */:
16e9c715 8515 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
8516 /* module_info.base_address */
8517 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 8518 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 8519
d4c88bbb 8520 len = strlen (buf) + 1;
a50b1753 8521 name = (char *) bfd_alloc (abfd, len);
16e9c715 8522 if (name == NULL)
b34976b6 8523 return FALSE;
c044fabd 8524
d4c88bbb 8525 memcpy (name, buf, len);
252b5132 8526
117ed4f8 8527 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 8528
16e9c715 8529 if (sect == NULL)
b34976b6 8530 return FALSE;
c044fabd 8531
eea6121a 8532 sect->size = note->descsz;
16e9c715 8533 sect->filepos = note->descpos;
16e9c715
NC
8534 sect->alignment_power = 2;
8535 break;
8536
8537 default:
b34976b6 8538 return TRUE;
16e9c715
NC
8539 }
8540
b34976b6 8541 return TRUE;
16e9c715 8542}
252b5132 8543
b34976b6 8544static bfd_boolean
217aa764 8545elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 8546{
9c5bfbb7 8547 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 8548
252b5132
RH
8549 switch (note->type)
8550 {
8551 default:
b34976b6 8552 return TRUE;
252b5132 8553
252b5132 8554 case NT_PRSTATUS:
bb0082d6
AM
8555 if (bed->elf_backend_grok_prstatus)
8556 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 8557 return TRUE;
bb0082d6 8558#if defined (HAVE_PRSTATUS_T)
252b5132 8559 return elfcore_grok_prstatus (abfd, note);
bb0082d6 8560#else
b34976b6 8561 return TRUE;
252b5132
RH
8562#endif
8563
8564#if defined (HAVE_PSTATUS_T)
8565 case NT_PSTATUS:
8566 return elfcore_grok_pstatus (abfd, note);
8567#endif
8568
8569#if defined (HAVE_LWPSTATUS_T)
8570 case NT_LWPSTATUS:
8571 return elfcore_grok_lwpstatus (abfd, note);
8572#endif
8573
8574 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
8575 return elfcore_grok_prfpreg (abfd, note);
8576
c044fabd 8577 case NT_WIN32PSTATUS:
16e9c715 8578 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 8579
c044fabd 8580 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
8581 if (note->namesz == 6
8582 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
8583 return elfcore_grok_prxfpreg (abfd, note);
8584 else
b34976b6 8585 return TRUE;
ff08c6bb 8586
4339cae0
L
8587 case NT_X86_XSTATE: /* Linux XSAVE extension */
8588 if (note->namesz == 6
8589 && strcmp (note->namedata, "LINUX") == 0)
8590 return elfcore_grok_xstatereg (abfd, note);
8591 else
8592 return TRUE;
8593
97753bd5
AM
8594 case NT_PPC_VMX:
8595 if (note->namesz == 6
8596 && strcmp (note->namedata, "LINUX") == 0)
8597 return elfcore_grok_ppc_vmx (abfd, note);
8598 else
8599 return TRUE;
8600
89eeb0bc
LM
8601 case NT_PPC_VSX:
8602 if (note->namesz == 6
8603 && strcmp (note->namedata, "LINUX") == 0)
8604 return elfcore_grok_ppc_vsx (abfd, note);
8605 else
8606 return TRUE;
8607
0675e188
UW
8608 case NT_S390_HIGH_GPRS:
8609 if (note->namesz == 6
8610 && strcmp (note->namedata, "LINUX") == 0)
8611 return elfcore_grok_s390_high_gprs (abfd, note);
8612 else
8613 return TRUE;
8614
d7eeb400
MS
8615 case NT_S390_TIMER:
8616 if (note->namesz == 6
8617 && strcmp (note->namedata, "LINUX") == 0)
8618 return elfcore_grok_s390_timer (abfd, note);
8619 else
8620 return TRUE;
8621
8622 case NT_S390_TODCMP:
8623 if (note->namesz == 6
8624 && strcmp (note->namedata, "LINUX") == 0)
8625 return elfcore_grok_s390_todcmp (abfd, note);
8626 else
8627 return TRUE;
8628
8629 case NT_S390_TODPREG:
8630 if (note->namesz == 6
8631 && strcmp (note->namedata, "LINUX") == 0)
8632 return elfcore_grok_s390_todpreg (abfd, note);
8633 else
8634 return TRUE;
8635
8636 case NT_S390_CTRS:
8637 if (note->namesz == 6
8638 && strcmp (note->namedata, "LINUX") == 0)
8639 return elfcore_grok_s390_ctrs (abfd, note);
8640 else
8641 return TRUE;
8642
8643 case NT_S390_PREFIX:
8644 if (note->namesz == 6
8645 && strcmp (note->namedata, "LINUX") == 0)
8646 return elfcore_grok_s390_prefix (abfd, note);
8647 else
8648 return TRUE;
8649
355b81d9
UW
8650 case NT_S390_LAST_BREAK:
8651 if (note->namesz == 6
8652 && strcmp (note->namedata, "LINUX") == 0)
8653 return elfcore_grok_s390_last_break (abfd, note);
8654 else
8655 return TRUE;
8656
8657 case NT_S390_SYSTEM_CALL:
8658 if (note->namesz == 6
8659 && strcmp (note->namedata, "LINUX") == 0)
8660 return elfcore_grok_s390_system_call (abfd, note);
8661 else
8662 return TRUE;
8663
abb3f6cc
NC
8664 case NT_S390_TDB:
8665 if (note->namesz == 6
8666 && strcmp (note->namedata, "LINUX") == 0)
8667 return elfcore_grok_s390_tdb (abfd, note);
8668 else
8669 return TRUE;
8670
faa9a424
UW
8671 case NT_ARM_VFP:
8672 if (note->namesz == 6
8673 && strcmp (note->namedata, "LINUX") == 0)
8674 return elfcore_grok_arm_vfp (abfd, note);
8675 else
8676 return TRUE;
8677
652451f8
YZ
8678 case NT_ARM_TLS:
8679 if (note->namesz == 6
8680 && strcmp (note->namedata, "LINUX") == 0)
8681 return elfcore_grok_aarch_tls (abfd, note);
8682 else
8683 return TRUE;
8684
8685 case NT_ARM_HW_BREAK:
8686 if (note->namesz == 6
8687 && strcmp (note->namedata, "LINUX") == 0)
8688 return elfcore_grok_aarch_hw_break (abfd, note);
8689 else
8690 return TRUE;
8691
8692 case NT_ARM_HW_WATCH:
8693 if (note->namesz == 6
8694 && strcmp (note->namedata, "LINUX") == 0)
8695 return elfcore_grok_aarch_hw_watch (abfd, note);
8696 else
8697 return TRUE;
8698
252b5132
RH
8699 case NT_PRPSINFO:
8700 case NT_PSINFO:
bb0082d6
AM
8701 if (bed->elf_backend_grok_psinfo)
8702 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8703 return TRUE;
bb0082d6 8704#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8705 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8706#else
b34976b6 8707 return TRUE;
252b5132 8708#endif
3333a7c3
RM
8709
8710 case NT_AUXV:
8711 {
117ed4f8
AM
8712 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8713 SEC_HAS_CONTENTS);
3333a7c3
RM
8714
8715 if (sect == NULL)
8716 return FALSE;
eea6121a 8717 sect->size = note->descsz;
3333a7c3 8718 sect->filepos = note->descpos;
3333a7c3
RM
8719 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8720
8721 return TRUE;
8722 }
9015683b 8723
451b7c33
TT
8724 case NT_FILE:
8725 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
8726 note);
8727
9015683b
TT
8728 case NT_SIGINFO:
8729 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
8730 note);
252b5132
RH
8731 }
8732}
8733
718175fa
JK
8734static bfd_boolean
8735elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8736{
30e8ee25
AM
8737 struct elf_obj_tdata *t;
8738
8739 if (note->descsz == 0)
8740 return FALSE;
8741
8742 t = elf_tdata (abfd);
c0355132 8743 t->build_id = bfd_alloc (abfd, sizeof (*t->build_id) - 1 + note->descsz);
30e8ee25 8744 if (t->build_id == NULL)
718175fa
JK
8745 return FALSE;
8746
c0355132
AM
8747 t->build_id->size = note->descsz;
8748 memcpy (t->build_id->data, note->descdata, note->descsz);
718175fa
JK
8749
8750 return TRUE;
8751}
8752
8753static bfd_boolean
8754elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8755{
8756 switch (note->type)
8757 {
8758 default:
8759 return TRUE;
8760
8761 case NT_GNU_BUILD_ID:
8762 return elfobj_grok_gnu_build_id (abfd, note);
8763 }
8764}
8765
e21e5835
NC
8766static bfd_boolean
8767elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
8768{
8769 struct sdt_note *cur =
8770 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
8771 + note->descsz);
8772
8773 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
8774 cur->size = (bfd_size_type) note->descsz;
8775 memcpy (cur->data, note->descdata, note->descsz);
8776
8777 elf_tdata (abfd)->sdt_note_head = cur;
8778
8779 return TRUE;
8780}
8781
8782static bfd_boolean
8783elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
8784{
8785 switch (note->type)
8786 {
8787 case NT_STAPSDT:
8788 return elfobj_grok_stapsdt_note_1 (abfd, note);
8789
8790 default:
8791 return TRUE;
8792 }
8793}
8794
b34976b6 8795static bfd_boolean
217aa764 8796elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8797{
8798 char *cp;
8799
8800 cp = strchr (note->namedata, '@');
8801 if (cp != NULL)
8802 {
d2b64500 8803 *lwpidp = atoi(cp + 1);
b34976b6 8804 return TRUE;
50b2bdb7 8805 }
b34976b6 8806 return FALSE;
50b2bdb7
AM
8807}
8808
b34976b6 8809static bfd_boolean
217aa764 8810elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8811{
50b2bdb7 8812 /* Signal number at offset 0x08. */
228e534f 8813 elf_tdata (abfd)->core->signal
50b2bdb7
AM
8814 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8815
8816 /* Process ID at offset 0x50. */
228e534f 8817 elf_tdata (abfd)->core->pid
50b2bdb7
AM
8818 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8819
8820 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 8821 elf_tdata (abfd)->core->command
50b2bdb7
AM
8822 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8823
7720ba9f
MK
8824 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8825 note);
50b2bdb7
AM
8826}
8827
b34976b6 8828static bfd_boolean
217aa764 8829elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8830{
8831 int lwp;
8832
8833 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 8834 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 8835
b4db1224 8836 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8837 {
8838 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8839 find this note before any of the others, which is fine,
8840 since the kernel writes this note out first when it
8841 creates a core file. */
47d9a591 8842
50b2bdb7
AM
8843 return elfcore_grok_netbsd_procinfo (abfd, note);
8844 }
8845
b4db1224
JT
8846 /* As of Jan 2002 there are no other machine-independent notes
8847 defined for NetBSD core files. If the note type is less
8848 than the start of the machine-dependent note types, we don't
8849 understand it. */
47d9a591 8850
b4db1224 8851 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8852 return TRUE;
50b2bdb7
AM
8853
8854
8855 switch (bfd_get_arch (abfd))
8856 {
08a40648
AM
8857 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8858 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8859
8860 case bfd_arch_alpha:
8861 case bfd_arch_sparc:
8862 switch (note->type)
08a40648
AM
8863 {
8864 case NT_NETBSDCORE_FIRSTMACH+0:
8865 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8866
08a40648
AM
8867 case NT_NETBSDCORE_FIRSTMACH+2:
8868 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8869
08a40648
AM
8870 default:
8871 return TRUE;
8872 }
50b2bdb7 8873
08a40648
AM
8874 /* On all other arch's, PT_GETREGS == mach+1 and
8875 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8876
8877 default:
8878 switch (note->type)
08a40648
AM
8879 {
8880 case NT_NETBSDCORE_FIRSTMACH+1:
8881 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8882
08a40648
AM
8883 case NT_NETBSDCORE_FIRSTMACH+3:
8884 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8885
08a40648
AM
8886 default:
8887 return TRUE;
8888 }
50b2bdb7
AM
8889 }
8890 /* NOTREACHED */
8891}
8892
67cc5033
MK
8893static bfd_boolean
8894elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8895{
8896 /* Signal number at offset 0x08. */
228e534f 8897 elf_tdata (abfd)->core->signal
67cc5033
MK
8898 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8899
8900 /* Process ID at offset 0x20. */
228e534f 8901 elf_tdata (abfd)->core->pid
67cc5033
MK
8902 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8903
8904 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 8905 elf_tdata (abfd)->core->command
67cc5033
MK
8906 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8907
8908 return TRUE;
8909}
8910
8911static bfd_boolean
8912elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8913{
8914 if (note->type == NT_OPENBSD_PROCINFO)
8915 return elfcore_grok_openbsd_procinfo (abfd, note);
8916
8917 if (note->type == NT_OPENBSD_REGS)
8918 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8919
8920 if (note->type == NT_OPENBSD_FPREGS)
8921 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8922
8923 if (note->type == NT_OPENBSD_XFPREGS)
8924 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8925
8926 if (note->type == NT_OPENBSD_AUXV)
8927 {
8928 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8929 SEC_HAS_CONTENTS);
8930
8931 if (sect == NULL)
8932 return FALSE;
8933 sect->size = note->descsz;
8934 sect->filepos = note->descpos;
8935 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8936
8937 return TRUE;
8938 }
8939
8940 if (note->type == NT_OPENBSD_WCOOKIE)
8941 {
8942 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8943 SEC_HAS_CONTENTS);
8944
8945 if (sect == NULL)
8946 return FALSE;
8947 sect->size = note->descsz;
8948 sect->filepos = note->descpos;
8949 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8950
8951 return TRUE;
8952 }
8953
8954 return TRUE;
8955}
8956
07c6e936 8957static bfd_boolean
d3fd4074 8958elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8959{
8960 void *ddata = note->descdata;
8961 char buf[100];
8962 char *name;
8963 asection *sect;
f8843e87
AM
8964 short sig;
8965 unsigned flags;
07c6e936
NC
8966
8967 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 8968 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 8969
f8843e87
AM
8970 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8971 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8972
8973 /* nto_procfs_status 'flags' field is at offset 8. */
8974 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8975
8976 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8977 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8978 {
228e534f
AM
8979 elf_tdata (abfd)->core->signal = sig;
8980 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 8981 }
07c6e936 8982
f8843e87
AM
8983 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8984 do not come from signals so we make sure we set the current
8985 thread just in case. */
8986 if (flags & 0x00000080)
228e534f 8987 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
8988
8989 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8990 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8991
a50b1753 8992 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8993 if (name == NULL)
8994 return FALSE;
8995 strcpy (name, buf);
8996
117ed4f8 8997 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8998 if (sect == NULL)
8999 return FALSE;
9000
eea6121a 9001 sect->size = note->descsz;
07c6e936 9002 sect->filepos = note->descpos;
07c6e936
NC
9003 sect->alignment_power = 2;
9004
9005 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
9006}
9007
9008static bfd_boolean
d69f560c
KW
9009elfcore_grok_nto_regs (bfd *abfd,
9010 Elf_Internal_Note *note,
d3fd4074 9011 long tid,
d69f560c 9012 char *base)
07c6e936
NC
9013{
9014 char buf[100];
9015 char *name;
9016 asection *sect;
9017
d69f560c 9018 /* Make a "(base)/%d" section. */
d3fd4074 9019 sprintf (buf, "%s/%ld", base, tid);
07c6e936 9020
a50b1753 9021 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
9022 if (name == NULL)
9023 return FALSE;
9024 strcpy (name, buf);
9025
117ed4f8 9026 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
9027 if (sect == NULL)
9028 return FALSE;
9029
eea6121a 9030 sect->size = note->descsz;
07c6e936 9031 sect->filepos = note->descpos;
07c6e936
NC
9032 sect->alignment_power = 2;
9033
f8843e87 9034 /* This is the current thread. */
228e534f 9035 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 9036 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
9037
9038 return TRUE;
07c6e936
NC
9039}
9040
9041#define BFD_QNT_CORE_INFO 7
9042#define BFD_QNT_CORE_STATUS 8
9043#define BFD_QNT_CORE_GREG 9
9044#define BFD_QNT_CORE_FPREG 10
9045
9046static bfd_boolean
217aa764 9047elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
9048{
9049 /* Every GREG section has a STATUS section before it. Store the
811072d8 9050 tid from the previous call to pass down to the next gregs
07c6e936 9051 function. */
d3fd4074 9052 static long tid = 1;
07c6e936
NC
9053
9054 switch (note->type)
9055 {
d69f560c
KW
9056 case BFD_QNT_CORE_INFO:
9057 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
9058 case BFD_QNT_CORE_STATUS:
9059 return elfcore_grok_nto_status (abfd, note, &tid);
9060 case BFD_QNT_CORE_GREG:
9061 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
9062 case BFD_QNT_CORE_FPREG:
9063 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
9064 default:
9065 return TRUE;
07c6e936
NC
9066 }
9067}
9068
b15fa79e
AM
9069static bfd_boolean
9070elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
9071{
9072 char *name;
9073 asection *sect;
9074 size_t len;
9075
9076 /* Use note name as section name. */
9077 len = note->namesz;
a50b1753 9078 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
9079 if (name == NULL)
9080 return FALSE;
9081 memcpy (name, note->namedata, len);
9082 name[len - 1] = '\0';
9083
9084 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9085 if (sect == NULL)
9086 return FALSE;
9087
9088 sect->size = note->descsz;
9089 sect->filepos = note->descpos;
9090 sect->alignment_power = 1;
9091
9092 return TRUE;
9093}
9094
7c76fa91
MS
9095/* Function: elfcore_write_note
9096
47d9a591 9097 Inputs:
a39f3346 9098 buffer to hold note, and current size of buffer
7c76fa91
MS
9099 name of note
9100 type of note
9101 data for note
9102 size of data for note
9103
a39f3346
AM
9104 Writes note to end of buffer. ELF64 notes are written exactly as
9105 for ELF32, despite the current (as of 2006) ELF gabi specifying
9106 that they ought to have 8-byte namesz and descsz field, and have
9107 8-byte alignment. Other writers, eg. Linux kernel, do the same.
9108
7c76fa91 9109 Return:
a39f3346 9110 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
9111
9112char *
a39f3346 9113elfcore_write_note (bfd *abfd,
217aa764 9114 char *buf,
a39f3346 9115 int *bufsiz,
217aa764 9116 const char *name,
a39f3346 9117 int type,
217aa764 9118 const void *input,
a39f3346 9119 int size)
7c76fa91
MS
9120{
9121 Elf_External_Note *xnp;
d4c88bbb 9122 size_t namesz;
d4c88bbb 9123 size_t newspace;
a39f3346 9124 char *dest;
7c76fa91 9125
d4c88bbb 9126 namesz = 0;
d4c88bbb 9127 if (name != NULL)
a39f3346 9128 namesz = strlen (name) + 1;
d4c88bbb 9129
a39f3346 9130 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 9131
a50b1753 9132 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
9133 if (buf == NULL)
9134 return buf;
a39f3346 9135 dest = buf + *bufsiz;
7c76fa91
MS
9136 *bufsiz += newspace;
9137 xnp = (Elf_External_Note *) dest;
9138 H_PUT_32 (abfd, namesz, xnp->namesz);
9139 H_PUT_32 (abfd, size, xnp->descsz);
9140 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
9141 dest = xnp->name;
9142 if (name != NULL)
9143 {
9144 memcpy (dest, name, namesz);
9145 dest += namesz;
a39f3346 9146 while (namesz & 3)
d4c88bbb
AM
9147 {
9148 *dest++ = '\0';
a39f3346 9149 ++namesz;
d4c88bbb
AM
9150 }
9151 }
9152 memcpy (dest, input, size);
a39f3346
AM
9153 dest += size;
9154 while (size & 3)
9155 {
9156 *dest++ = '\0';
9157 ++size;
9158 }
9159 return buf;
7c76fa91
MS
9160}
9161
7c76fa91 9162char *
217aa764
AM
9163elfcore_write_prpsinfo (bfd *abfd,
9164 char *buf,
9165 int *bufsiz,
9166 const char *fname,
9167 const char *psargs)
7c76fa91 9168{
183e98be
AM
9169 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9170
9171 if (bed->elf_backend_write_core_note != NULL)
9172 {
9173 char *ret;
9174 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9175 NT_PRPSINFO, fname, psargs);
9176 if (ret != NULL)
9177 return ret;
9178 }
7c76fa91 9179
1f20dca5 9180#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
9181#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9182 if (bed->s->elfclass == ELFCLASS32)
9183 {
9184#if defined (HAVE_PSINFO32_T)
9185 psinfo32_t data;
9186 int note_type = NT_PSINFO;
9187#else
9188 prpsinfo32_t data;
9189 int note_type = NT_PRPSINFO;
9190#endif
9191
9192 memset (&data, 0, sizeof (data));
9193 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9194 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9195 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9196 "CORE", note_type, &data, sizeof (data));
183e98be
AM
9197 }
9198 else
9199#endif
9200 {
7c76fa91 9201#if defined (HAVE_PSINFO_T)
183e98be
AM
9202 psinfo_t data;
9203 int note_type = NT_PSINFO;
7c76fa91 9204#else
183e98be
AM
9205 prpsinfo_t data;
9206 int note_type = NT_PRPSINFO;
7c76fa91
MS
9207#endif
9208
183e98be
AM
9209 memset (&data, 0, sizeof (data));
9210 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9211 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9212 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9213 "CORE", note_type, &data, sizeof (data));
183e98be 9214 }
7c76fa91
MS
9215#endif /* PSINFO_T or PRPSINFO_T */
9216
1f20dca5
UW
9217 free (buf);
9218 return NULL;
9219}
9220
70a38d42
SDJ
9221char *
9222elfcore_write_linux_prpsinfo32
9223 (bfd *abfd, char *buf, int *bufsiz,
9224 const struct elf_internal_linux_prpsinfo *prpsinfo)
9225{
9226 struct elf_external_linux_prpsinfo32 data;
9227
9228 memset (&data, 0, sizeof (data));
9229 LINUX_PRPSINFO32_SWAP_FIELDS (abfd, prpsinfo, data);
9230
9231 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
9232 &data, sizeof (data));
9233}
9234
9235char *
9236elfcore_write_linux_prpsinfo64
9237 (bfd *abfd, char *buf, int *bufsiz,
9238 const struct elf_internal_linux_prpsinfo *prpsinfo)
9239{
9240 struct elf_external_linux_prpsinfo64 data;
9241
9242 memset (&data, 0, sizeof (data));
9243 LINUX_PRPSINFO64_SWAP_FIELDS (abfd, prpsinfo, data);
9244
9245 return elfcore_write_note (abfd, buf, bufsiz,
9246 "CORE", NT_PRPSINFO, &data, sizeof (data));
9247}
9248
7c76fa91 9249char *
217aa764
AM
9250elfcore_write_prstatus (bfd *abfd,
9251 char *buf,
9252 int *bufsiz,
9253 long pid,
9254 int cursig,
9255 const void *gregs)
7c76fa91 9256{
183e98be 9257 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9258
183e98be
AM
9259 if (bed->elf_backend_write_core_note != NULL)
9260 {
9261 char *ret;
9262 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9263 NT_PRSTATUS,
9264 pid, cursig, gregs);
9265 if (ret != NULL)
9266 return ret;
9267 }
9268
1f20dca5 9269#if defined (HAVE_PRSTATUS_T)
183e98be
AM
9270#if defined (HAVE_PRSTATUS32_T)
9271 if (bed->s->elfclass == ELFCLASS32)
9272 {
9273 prstatus32_t prstat;
9274
9275 memset (&prstat, 0, sizeof (prstat));
9276 prstat.pr_pid = pid;
9277 prstat.pr_cursig = cursig;
9278 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9279 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9280 NT_PRSTATUS, &prstat, sizeof (prstat));
9281 }
9282 else
9283#endif
9284 {
9285 prstatus_t prstat;
9286
9287 memset (&prstat, 0, sizeof (prstat));
9288 prstat.pr_pid = pid;
9289 prstat.pr_cursig = cursig;
9290 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9291 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9292 NT_PRSTATUS, &prstat, sizeof (prstat));
9293 }
7c76fa91
MS
9294#endif /* HAVE_PRSTATUS_T */
9295
1f20dca5
UW
9296 free (buf);
9297 return NULL;
9298}
9299
51316059
MS
9300#if defined (HAVE_LWPSTATUS_T)
9301char *
217aa764
AM
9302elfcore_write_lwpstatus (bfd *abfd,
9303 char *buf,
9304 int *bufsiz,
9305 long pid,
9306 int cursig,
9307 const void *gregs)
51316059
MS
9308{
9309 lwpstatus_t lwpstat;
183e98be 9310 const char *note_name = "CORE";
51316059
MS
9311
9312 memset (&lwpstat, 0, sizeof (lwpstat));
9313 lwpstat.pr_lwpid = pid >> 16;
9314 lwpstat.pr_cursig = cursig;
9315#if defined (HAVE_LWPSTATUS_T_PR_REG)
9316 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
9317#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9318#if !defined(gregs)
9319 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
9320 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
9321#else
9322 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
9323 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
9324#endif
9325#endif
47d9a591 9326 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
9327 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
9328}
9329#endif /* HAVE_LWPSTATUS_T */
9330
7c76fa91
MS
9331#if defined (HAVE_PSTATUS_T)
9332char *
217aa764
AM
9333elfcore_write_pstatus (bfd *abfd,
9334 char *buf,
9335 int *bufsiz,
9336 long pid,
6c10990d
NC
9337 int cursig ATTRIBUTE_UNUSED,
9338 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 9339{
183e98be
AM
9340 const char *note_name = "CORE";
9341#if defined (HAVE_PSTATUS32_T)
9342 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9343
183e98be
AM
9344 if (bed->s->elfclass == ELFCLASS32)
9345 {
9346 pstatus32_t pstat;
9347
9348 memset (&pstat, 0, sizeof (pstat));
9349 pstat.pr_pid = pid & 0xffff;
9350 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9351 NT_PSTATUS, &pstat, sizeof (pstat));
9352 return buf;
9353 }
9354 else
9355#endif
9356 {
9357 pstatus_t pstat;
9358
9359 memset (&pstat, 0, sizeof (pstat));
9360 pstat.pr_pid = pid & 0xffff;
9361 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9362 NT_PSTATUS, &pstat, sizeof (pstat));
9363 return buf;
9364 }
7c76fa91
MS
9365}
9366#endif /* HAVE_PSTATUS_T */
9367
9368char *
217aa764
AM
9369elfcore_write_prfpreg (bfd *abfd,
9370 char *buf,
9371 int *bufsiz,
9372 const void *fpregs,
9373 int size)
7c76fa91 9374{
183e98be 9375 const char *note_name = "CORE";
47d9a591 9376 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9377 note_name, NT_FPREGSET, fpregs, size);
9378}
9379
9380char *
217aa764
AM
9381elfcore_write_prxfpreg (bfd *abfd,
9382 char *buf,
9383 int *bufsiz,
9384 const void *xfpregs,
9385 int size)
7c76fa91
MS
9386{
9387 char *note_name = "LINUX";
47d9a591 9388 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9389 note_name, NT_PRXFPREG, xfpregs, size);
9390}
9391
4339cae0
L
9392char *
9393elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
9394 const void *xfpregs, int size)
9395{
9396 char *note_name = "LINUX";
9397 return elfcore_write_note (abfd, buf, bufsiz,
9398 note_name, NT_X86_XSTATE, xfpregs, size);
9399}
9400
97753bd5
AM
9401char *
9402elfcore_write_ppc_vmx (bfd *abfd,
9403 char *buf,
9404 int *bufsiz,
9405 const void *ppc_vmx,
9406 int size)
9407{
9408 char *note_name = "LINUX";
9409 return elfcore_write_note (abfd, buf, bufsiz,
9410 note_name, NT_PPC_VMX, ppc_vmx, size);
9411}
9412
89eeb0bc
LM
9413char *
9414elfcore_write_ppc_vsx (bfd *abfd,
9415 char *buf,
9416 int *bufsiz,
9417 const void *ppc_vsx,
9418 int size)
9419{
9420 char *note_name = "LINUX";
9421 return elfcore_write_note (abfd, buf, bufsiz,
9422 note_name, NT_PPC_VSX, ppc_vsx, size);
9423}
9424
0675e188
UW
9425static char *
9426elfcore_write_s390_high_gprs (bfd *abfd,
9427 char *buf,
9428 int *bufsiz,
9429 const void *s390_high_gprs,
9430 int size)
9431{
9432 char *note_name = "LINUX";
9433 return elfcore_write_note (abfd, buf, bufsiz,
9434 note_name, NT_S390_HIGH_GPRS,
9435 s390_high_gprs, size);
9436}
9437
d7eeb400
MS
9438char *
9439elfcore_write_s390_timer (bfd *abfd,
9440 char *buf,
9441 int *bufsiz,
9442 const void *s390_timer,
9443 int size)
9444{
9445 char *note_name = "LINUX";
9446 return elfcore_write_note (abfd, buf, bufsiz,
9447 note_name, NT_S390_TIMER, s390_timer, size);
9448}
9449
9450char *
9451elfcore_write_s390_todcmp (bfd *abfd,
9452 char *buf,
9453 int *bufsiz,
9454 const void *s390_todcmp,
9455 int size)
9456{
9457 char *note_name = "LINUX";
9458 return elfcore_write_note (abfd, buf, bufsiz,
9459 note_name, NT_S390_TODCMP, s390_todcmp, size);
9460}
9461
9462char *
9463elfcore_write_s390_todpreg (bfd *abfd,
9464 char *buf,
9465 int *bufsiz,
9466 const void *s390_todpreg,
9467 int size)
9468{
9469 char *note_name = "LINUX";
9470 return elfcore_write_note (abfd, buf, bufsiz,
9471 note_name, NT_S390_TODPREG, s390_todpreg, size);
9472}
9473
9474char *
9475elfcore_write_s390_ctrs (bfd *abfd,
9476 char *buf,
9477 int *bufsiz,
9478 const void *s390_ctrs,
9479 int size)
9480{
9481 char *note_name = "LINUX";
9482 return elfcore_write_note (abfd, buf, bufsiz,
9483 note_name, NT_S390_CTRS, s390_ctrs, size);
9484}
9485
9486char *
9487elfcore_write_s390_prefix (bfd *abfd,
9488 char *buf,
9489 int *bufsiz,
9490 const void *s390_prefix,
9491 int size)
9492{
9493 char *note_name = "LINUX";
9494 return elfcore_write_note (abfd, buf, bufsiz,
9495 note_name, NT_S390_PREFIX, s390_prefix, size);
9496}
9497
355b81d9
UW
9498char *
9499elfcore_write_s390_last_break (bfd *abfd,
9500 char *buf,
9501 int *bufsiz,
9502 const void *s390_last_break,
9503 int size)
9504{
9505 char *note_name = "LINUX";
9506 return elfcore_write_note (abfd, buf, bufsiz,
9507 note_name, NT_S390_LAST_BREAK,
9508 s390_last_break, size);
9509}
9510
9511char *
9512elfcore_write_s390_system_call (bfd *abfd,
9513 char *buf,
9514 int *bufsiz,
9515 const void *s390_system_call,
9516 int size)
9517{
9518 char *note_name = "LINUX";
9519 return elfcore_write_note (abfd, buf, bufsiz,
9520 note_name, NT_S390_SYSTEM_CALL,
9521 s390_system_call, size);
9522}
9523
abb3f6cc
NC
9524char *
9525elfcore_write_s390_tdb (bfd *abfd,
9526 char *buf,
9527 int *bufsiz,
9528 const void *s390_tdb,
9529 int size)
9530{
9531 char *note_name = "LINUX";
9532 return elfcore_write_note (abfd, buf, bufsiz,
9533 note_name, NT_S390_TDB, s390_tdb, size);
9534}
9535
faa9a424
UW
9536char *
9537elfcore_write_arm_vfp (bfd *abfd,
9538 char *buf,
9539 int *bufsiz,
9540 const void *arm_vfp,
9541 int size)
9542{
9543 char *note_name = "LINUX";
9544 return elfcore_write_note (abfd, buf, bufsiz,
9545 note_name, NT_ARM_VFP, arm_vfp, size);
9546}
9547
652451f8
YZ
9548char *
9549elfcore_write_aarch_tls (bfd *abfd,
9550 char *buf,
9551 int *bufsiz,
9552 const void *aarch_tls,
9553 int size)
9554{
9555 char *note_name = "LINUX";
9556 return elfcore_write_note (abfd, buf, bufsiz,
9557 note_name, NT_ARM_TLS, aarch_tls, size);
9558}
9559
9560char *
9561elfcore_write_aarch_hw_break (bfd *abfd,
9562 char *buf,
9563 int *bufsiz,
9564 const void *aarch_hw_break,
9565 int size)
9566{
9567 char *note_name = "LINUX";
9568 return elfcore_write_note (abfd, buf, bufsiz,
9569 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
9570}
9571
9572char *
9573elfcore_write_aarch_hw_watch (bfd *abfd,
9574 char *buf,
9575 int *bufsiz,
9576 const void *aarch_hw_watch,
9577 int size)
9578{
9579 char *note_name = "LINUX";
9580 return elfcore_write_note (abfd, buf, bufsiz,
9581 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
9582}
9583
bb864ac1
CES
9584char *
9585elfcore_write_register_note (bfd *abfd,
9586 char *buf,
9587 int *bufsiz,
9588 const char *section,
9589 const void *data,
9590 int size)
9591{
9592 if (strcmp (section, ".reg2") == 0)
9593 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
9594 if (strcmp (section, ".reg-xfp") == 0)
9595 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
9596 if (strcmp (section, ".reg-xstate") == 0)
9597 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9598 if (strcmp (section, ".reg-ppc-vmx") == 0)
9599 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
9600 if (strcmp (section, ".reg-ppc-vsx") == 0)
9601 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
9602 if (strcmp (section, ".reg-s390-high-gprs") == 0)
9603 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
9604 if (strcmp (section, ".reg-s390-timer") == 0)
9605 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
9606 if (strcmp (section, ".reg-s390-todcmp") == 0)
9607 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
9608 if (strcmp (section, ".reg-s390-todpreg") == 0)
9609 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
9610 if (strcmp (section, ".reg-s390-ctrs") == 0)
9611 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
9612 if (strcmp (section, ".reg-s390-prefix") == 0)
9613 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
9614 if (strcmp (section, ".reg-s390-last-break") == 0)
9615 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
9616 if (strcmp (section, ".reg-s390-system-call") == 0)
9617 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
9618 if (strcmp (section, ".reg-s390-tdb") == 0)
9619 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
faa9a424
UW
9620 if (strcmp (section, ".reg-arm-vfp") == 0)
9621 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
9622 if (strcmp (section, ".reg-aarch-tls") == 0)
9623 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
9624 if (strcmp (section, ".reg-aarch-hw-break") == 0)
9625 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
9626 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
9627 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9628 return NULL;
9629}
9630
b34976b6 9631static bfd_boolean
718175fa 9632elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 9633{
c044fabd 9634 char *p;
252b5132 9635
252b5132
RH
9636 p = buf;
9637 while (p < buf + size)
9638 {
c044fabd
KH
9639 /* FIXME: bad alignment assumption. */
9640 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
9641 Elf_Internal_Note in;
9642
baea7ef1
AM
9643 if (offsetof (Elf_External_Note, name) > buf - p + size)
9644 return FALSE;
9645
dc810e39 9646 in.type = H_GET_32 (abfd, xnp->type);
252b5132 9647
dc810e39 9648 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 9649 in.namedata = xnp->name;
baea7ef1
AM
9650 if (in.namesz > buf - in.namedata + size)
9651 return FALSE;
252b5132 9652
dc810e39 9653 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
9654 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
9655 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
9656 if (in.descsz != 0
9657 && (in.descdata >= buf + size
9658 || in.descsz > buf - in.descdata + size))
9659 return FALSE;
252b5132 9660
718175fa
JK
9661 switch (bfd_get_format (abfd))
9662 {
9663 default:
9664 return TRUE;
9665
9666 case bfd_core:
9667 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
9668 {
9669 if (! elfcore_grok_netbsd_note (abfd, &in))
9670 return FALSE;
9671 }
67cc5033
MK
9672 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
9673 {
9674 if (! elfcore_grok_openbsd_note (abfd, &in))
9675 return FALSE;
9676 }
718175fa
JK
9677 else if (CONST_STRNEQ (in.namedata, "QNX"))
9678 {
9679 if (! elfcore_grok_nto_note (abfd, &in))
9680 return FALSE;
9681 }
b15fa79e
AM
9682 else if (CONST_STRNEQ (in.namedata, "SPU/"))
9683 {
9684 if (! elfcore_grok_spu_note (abfd, &in))
9685 return FALSE;
9686 }
718175fa
JK
9687 else
9688 {
9689 if (! elfcore_grok_note (abfd, &in))
9690 return FALSE;
9691 }
9692 break;
9693
9694 case bfd_object:
9695 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
9696 {
9697 if (! elfobj_grok_gnu_note (abfd, &in))
9698 return FALSE;
9699 }
e21e5835
NC
9700 else if (in.namesz == sizeof "stapsdt"
9701 && strcmp (in.namedata, "stapsdt") == 0)
9702 {
9703 if (! elfobj_grok_stapsdt_note (abfd, &in))
9704 return FALSE;
9705 }
718175fa 9706 break;
08a40648 9707 }
252b5132
RH
9708
9709 p = in.descdata + BFD_ALIGN (in.descsz, 4);
9710 }
9711
718175fa
JK
9712 return TRUE;
9713}
9714
9715static bfd_boolean
9716elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
9717{
9718 char *buf;
9719
9720 if (size <= 0)
9721 return TRUE;
9722
9723 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
9724 return FALSE;
9725
a50b1753 9726 buf = (char *) bfd_malloc (size);
718175fa
JK
9727 if (buf == NULL)
9728 return FALSE;
9729
9730 if (bfd_bread (buf, size, abfd) != size
9731 || !elf_parse_notes (abfd, buf, size, offset))
9732 {
9733 free (buf);
9734 return FALSE;
9735 }
9736
252b5132 9737 free (buf);
b34976b6 9738 return TRUE;
252b5132 9739}
98d8431c
JB
9740\f
9741/* Providing external access to the ELF program header table. */
9742
9743/* Return an upper bound on the number of bytes required to store a
9744 copy of ABFD's program header table entries. Return -1 if an error
9745 occurs; bfd_get_error will return an appropriate code. */
c044fabd 9746
98d8431c 9747long
217aa764 9748bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
9749{
9750 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9751 {
9752 bfd_set_error (bfd_error_wrong_format);
9753 return -1;
9754 }
9755
936e320b 9756 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
9757}
9758
98d8431c
JB
9759/* Copy ABFD's program header table entries to *PHDRS. The entries
9760 will be stored as an array of Elf_Internal_Phdr structures, as
9761 defined in include/elf/internal.h. To find out how large the
9762 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
9763
9764 Return the number of program header table entries read, or -1 if an
9765 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 9766
98d8431c 9767int
217aa764 9768bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
9769{
9770 int num_phdrs;
9771
9772 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9773 {
9774 bfd_set_error (bfd_error_wrong_format);
9775 return -1;
9776 }
9777
9778 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 9779 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
9780 num_phdrs * sizeof (Elf_Internal_Phdr));
9781
9782 return num_phdrs;
9783}
ae4221d7 9784
db6751f2 9785enum elf_reloc_type_class
7e612e98
AM
9786_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
9787 const asection *rel_sec ATTRIBUTE_UNUSED,
9788 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
9789{
9790 return reloc_class_normal;
9791}
f8df10f4 9792
47d9a591 9793/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
9794 relocation against a local symbol. */
9795
9796bfd_vma
217aa764
AM
9797_bfd_elf_rela_local_sym (bfd *abfd,
9798 Elf_Internal_Sym *sym,
8517fae7 9799 asection **psec,
217aa764 9800 Elf_Internal_Rela *rel)
f8df10f4 9801{
8517fae7 9802 asection *sec = *psec;
f8df10f4
JJ
9803 bfd_vma relocation;
9804
9805 relocation = (sec->output_section->vma
9806 + sec->output_offset
9807 + sym->st_value);
9808 if ((sec->flags & SEC_MERGE)
c629eae0 9809 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 9810 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 9811 {
f8df10f4 9812 rel->r_addend =
8517fae7 9813 _bfd_merged_section_offset (abfd, psec,
65765700 9814 elf_section_data (sec)->sec_info,
753731ee
AM
9815 sym->st_value + rel->r_addend);
9816 if (sec != *psec)
9817 {
9818 /* If we have changed the section, and our original section is
9819 marked with SEC_EXCLUDE, it means that the original
9820 SEC_MERGE section has been completely subsumed in some
9821 other SEC_MERGE section. In this case, we need to leave
9822 some info around for --emit-relocs. */
9823 if ((sec->flags & SEC_EXCLUDE) != 0)
9824 sec->kept_section = *psec;
9825 sec = *psec;
9826 }
8517fae7
AM
9827 rel->r_addend -= relocation;
9828 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
9829 }
9830 return relocation;
9831}
c629eae0
JJ
9832
9833bfd_vma
217aa764
AM
9834_bfd_elf_rel_local_sym (bfd *abfd,
9835 Elf_Internal_Sym *sym,
9836 asection **psec,
9837 bfd_vma addend)
47d9a591 9838{
c629eae0
JJ
9839 asection *sec = *psec;
9840
dbaa2011 9841 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
9842 return sym->st_value + addend;
9843
9844 return _bfd_merged_section_offset (abfd, psec,
65765700 9845 elf_section_data (sec)->sec_info,
753731ee 9846 sym->st_value + addend);
c629eae0
JJ
9847}
9848
9849bfd_vma
217aa764 9850_bfd_elf_section_offset (bfd *abfd,
92e4ec35 9851 struct bfd_link_info *info,
217aa764
AM
9852 asection *sec,
9853 bfd_vma offset)
c629eae0 9854{
68bfbfcc 9855 switch (sec->sec_info_type)
65765700 9856 {
dbaa2011 9857 case SEC_INFO_TYPE_STABS:
eea6121a
AM
9858 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
9859 offset);
dbaa2011 9860 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 9861 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700 9862 default:
310fd250
L
9863 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
9864 {
9865 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9866 bfd_size_type address_size = bed->s->arch_size / 8;
9867 offset = sec->size - offset - address_size;
9868 }
65765700
JJ
9869 return offset;
9870 }
c629eae0 9871}
3333a7c3
RM
9872\f
9873/* Create a new BFD as if by bfd_openr. Rather than opening a file,
9874 reconstruct an ELF file by reading the segments out of remote memory
9875 based on the ELF file header at EHDR_VMA and the ELF program headers it
9876 points to. If not null, *LOADBASEP is filled in with the difference
9877 between the VMAs from which the segments were read, and the VMAs the
9878 file headers (and hence BFD's idea of each section's VMA) put them at.
9879
9880 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
9881 remote memory at target address VMA into the local buffer at MYADDR; it
9882 should return zero on success or an `errno' code on failure. TEMPL must
9883 be a BFD for an ELF target with the word size and byte order found in
9884 the remote memory. */
9885
9886bfd *
217aa764
AM
9887bfd_elf_bfd_from_remote_memory
9888 (bfd *templ,
9889 bfd_vma ehdr_vma,
9890 bfd_vma *loadbasep,
fe78531d 9891 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
9892{
9893 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
9894 (templ, ehdr_vma, loadbasep, target_read_memory);
9895}
4c45e5c9
JJ
9896\f
9897long
c9727e01
AM
9898_bfd_elf_get_synthetic_symtab (bfd *abfd,
9899 long symcount ATTRIBUTE_UNUSED,
9900 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 9901 long dynsymcount,
c9727e01
AM
9902 asymbol **dynsyms,
9903 asymbol **ret)
4c45e5c9
JJ
9904{
9905 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9906 asection *relplt;
9907 asymbol *s;
9908 const char *relplt_name;
9909 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
9910 arelent *p;
9911 long count, i, n;
9912 size_t size;
9913 Elf_Internal_Shdr *hdr;
9914 char *names;
9915 asection *plt;
9916
8615f3f2
AM
9917 *ret = NULL;
9918
90e3cdf2
JJ
9919 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
9920 return 0;
9921
8615f3f2
AM
9922 if (dynsymcount <= 0)
9923 return 0;
9924
4c45e5c9
JJ
9925 if (!bed->plt_sym_val)
9926 return 0;
9927
9928 relplt_name = bed->relplt_name;
9929 if (relplt_name == NULL)
d35fd659 9930 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
9931 relplt = bfd_get_section_by_name (abfd, relplt_name);
9932 if (relplt == NULL)
9933 return 0;
9934
9935 hdr = &elf_section_data (relplt)->this_hdr;
9936 if (hdr->sh_link != elf_dynsymtab (abfd)
9937 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
9938 return 0;
9939
9940 plt = bfd_get_section_by_name (abfd, ".plt");
9941 if (plt == NULL)
9942 return 0;
9943
9944 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 9945 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
9946 return -1;
9947
eea6121a 9948 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
9949 size = count * sizeof (asymbol);
9950 p = relplt->relocation;
cb53bf42 9951 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
9952 {
9953 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
9954 if (p->addend != 0)
9955 {
9956#ifdef BFD64
9957 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
9958#else
9959 size += sizeof ("+0x") - 1 + 8;
9960#endif
9961 }
9962 }
4c45e5c9 9963
a50b1753 9964 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
9965 if (s == NULL)
9966 return -1;
9967
9968 names = (char *) (s + count);
9969 p = relplt->relocation;
9970 n = 0;
cb53bf42 9971 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
9972 {
9973 size_t len;
9974 bfd_vma addr;
9975
9976 addr = bed->plt_sym_val (i, plt, p);
9977 if (addr == (bfd_vma) -1)
9978 continue;
9979
9980 *s = **p->sym_ptr_ptr;
65a7a66f
AM
9981 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
9982 we are defining a symbol, ensure one of them is set. */
9983 if ((s->flags & BSF_LOCAL) == 0)
9984 s->flags |= BSF_GLOBAL;
6ba2a415 9985 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
9986 s->section = plt;
9987 s->value = addr - plt->vma;
9988 s->name = names;
8f39ba8e 9989 s->udata.p = NULL;
4c45e5c9
JJ
9990 len = strlen ((*p->sym_ptr_ptr)->name);
9991 memcpy (names, (*p->sym_ptr_ptr)->name, len);
9992 names += len;
041de40d
AM
9993 if (p->addend != 0)
9994 {
1d770845 9995 char buf[30], *a;
d324f6d6 9996
041de40d
AM
9997 memcpy (names, "+0x", sizeof ("+0x") - 1);
9998 names += sizeof ("+0x") - 1;
1d770845
L
9999 bfd_sprintf_vma (abfd, buf, p->addend);
10000 for (a = buf; *a == '0'; ++a)
10001 ;
10002 len = strlen (a);
10003 memcpy (names, a, len);
10004 names += len;
041de40d 10005 }
4c45e5c9
JJ
10006 memcpy (names, "@plt", sizeof ("@plt"));
10007 names += sizeof ("@plt");
8f39ba8e 10008 ++s, ++n;
4c45e5c9
JJ
10009 }
10010
10011 return n;
10012}
3d7f7666 10013
3b22753a
L
10014/* It is only used by x86-64 so far. */
10015asection _bfd_elf_large_com_section
10016 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 10017 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 10018
d1036acb 10019void
78245035
L
10020_bfd_elf_post_process_headers (bfd * abfd,
10021 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
10022{
10023 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
10024
10025 i_ehdrp = elf_elfheader (abfd);
10026
10027 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
10028
10029 /* To make things simpler for the loader on Linux systems we set the
9c55345c 10030 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 10031 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 10032 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 10033 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 10034 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 10035}
fcb93ecf
PB
10036
10037
10038/* Return TRUE for ELF symbol types that represent functions.
10039 This is the default version of this function, which is sufficient for
d8045f23 10040 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
10041
10042bfd_boolean
10043_bfd_elf_is_function_type (unsigned int type)
10044{
d8045f23
NC
10045 return (type == STT_FUNC
10046 || type == STT_GNU_IFUNC);
fcb93ecf 10047}
9f296da3 10048
aef36ac1
AM
10049/* If the ELF symbol SYM might be a function in SEC, return the
10050 function size and set *CODE_OFF to the function's entry point,
10051 otherwise return zero. */
9f296da3 10052
aef36ac1
AM
10053bfd_size_type
10054_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
10055 bfd_vma *code_off)
9f296da3 10056{
aef36ac1
AM
10057 bfd_size_type size;
10058
ff9e0f5b 10059 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
10060 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
10061 || sym->section != sec)
10062 return 0;
ff9e0f5b 10063
ff9e0f5b 10064 *code_off = sym->value;
aef36ac1
AM
10065 size = 0;
10066 if (!(sym->flags & BSF_SYNTHETIC))
10067 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
10068 if (size == 0)
10069 size = 1;
10070 return size;
9f296da3 10071}
This page took 1.617689 seconds and 4 git commands to generate.