* elf32-spu.c (spu_elf_size_sections): Omit fixups for non-alloc
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
415f38a6 4 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010
72a80a16 5 Free Software Foundation, Inc.
252b5132 6
5e8d7549 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
5e8d7549
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
5e8d7549 12 (at your option) any later version.
252b5132 13
5e8d7549
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
5e8d7549 19 You should have received a copy of the GNU General Public License
b34976b6 20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
23
252b5132 24
1b74d094
BW
25/*
26SECTION
252b5132
RH
27 ELF backends
28
29 BFD support for ELF formats is being worked on.
30 Currently, the best supported back ends are for sparc and i386
31 (running svr4 or Solaris 2).
32
33 Documentation of the internals of the support code still needs
34 to be written. The code is changing quickly enough that we
661a3fd4 35 haven't bothered yet. */
252b5132 36
7ee38065
MS
37/* For sparc64-cross-sparc32. */
38#define _SYSCALL32
252b5132 39#include "sysdep.h"
3db64b00 40#include "bfd.h"
252b5132
RH
41#include "bfdlink.h"
42#include "libbfd.h"
43#define ARCH_SIZE 0
44#include "elf-bfd.h"
e0e8c97f 45#include "libiberty.h"
ff59fc36 46#include "safe-ctype.h"
252b5132 47
8bc7f138
L
48#ifdef CORE_HEADER
49#include CORE_HEADER
50#endif
51
217aa764 52static int elf_sort_sections (const void *, const void *);
c84fca4d 53static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
54static bfd_boolean prep_headers (bfd *);
55static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
56static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
57static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
58 file_ptr offset);
50b2bdb7 59
252b5132
RH
60/* Swap version information in and out. The version information is
61 currently size independent. If that ever changes, this code will
62 need to move into elfcode.h. */
63
64/* Swap in a Verdef structure. */
65
66void
217aa764
AM
67_bfd_elf_swap_verdef_in (bfd *abfd,
68 const Elf_External_Verdef *src,
69 Elf_Internal_Verdef *dst)
252b5132 70{
dc810e39
AM
71 dst->vd_version = H_GET_16 (abfd, src->vd_version);
72 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
73 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
74 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
75 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
76 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
77 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
78}
79
80/* Swap out a Verdef structure. */
81
82void
217aa764
AM
83_bfd_elf_swap_verdef_out (bfd *abfd,
84 const Elf_Internal_Verdef *src,
85 Elf_External_Verdef *dst)
252b5132 86{
dc810e39
AM
87 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
88 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
89 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
90 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
91 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
92 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
93 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
94}
95
96/* Swap in a Verdaux structure. */
97
98void
217aa764
AM
99_bfd_elf_swap_verdaux_in (bfd *abfd,
100 const Elf_External_Verdaux *src,
101 Elf_Internal_Verdaux *dst)
252b5132 102{
dc810e39
AM
103 dst->vda_name = H_GET_32 (abfd, src->vda_name);
104 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
105}
106
107/* Swap out a Verdaux structure. */
108
109void
217aa764
AM
110_bfd_elf_swap_verdaux_out (bfd *abfd,
111 const Elf_Internal_Verdaux *src,
112 Elf_External_Verdaux *dst)
252b5132 113{
dc810e39
AM
114 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
115 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
116}
117
118/* Swap in a Verneed structure. */
119
120void
217aa764
AM
121_bfd_elf_swap_verneed_in (bfd *abfd,
122 const Elf_External_Verneed *src,
123 Elf_Internal_Verneed *dst)
252b5132 124{
dc810e39
AM
125 dst->vn_version = H_GET_16 (abfd, src->vn_version);
126 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
127 dst->vn_file = H_GET_32 (abfd, src->vn_file);
128 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
129 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
130}
131
132/* Swap out a Verneed structure. */
133
134void
217aa764
AM
135_bfd_elf_swap_verneed_out (bfd *abfd,
136 const Elf_Internal_Verneed *src,
137 Elf_External_Verneed *dst)
252b5132 138{
dc810e39
AM
139 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
140 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
141 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
142 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
143 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
144}
145
146/* Swap in a Vernaux structure. */
147
148void
217aa764
AM
149_bfd_elf_swap_vernaux_in (bfd *abfd,
150 const Elf_External_Vernaux *src,
151 Elf_Internal_Vernaux *dst)
252b5132 152{
dc810e39
AM
153 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
154 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
155 dst->vna_other = H_GET_16 (abfd, src->vna_other);
156 dst->vna_name = H_GET_32 (abfd, src->vna_name);
157 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
158}
159
160/* Swap out a Vernaux structure. */
161
162void
217aa764
AM
163_bfd_elf_swap_vernaux_out (bfd *abfd,
164 const Elf_Internal_Vernaux *src,
165 Elf_External_Vernaux *dst)
252b5132 166{
dc810e39
AM
167 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
168 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
169 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
170 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
171 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
172}
173
174/* Swap in a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_in (bfd *abfd,
178 const Elf_External_Versym *src,
179 Elf_Internal_Versym *dst)
252b5132 180{
dc810e39 181 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
182}
183
184/* Swap out a Versym structure. */
185
186void
217aa764
AM
187_bfd_elf_swap_versym_out (bfd *abfd,
188 const Elf_Internal_Versym *src,
189 Elf_External_Versym *dst)
252b5132 190{
dc810e39 191 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
192}
193
194/* Standard ELF hash function. Do not change this function; you will
195 cause invalid hash tables to be generated. */
3a99b017 196
252b5132 197unsigned long
217aa764 198bfd_elf_hash (const char *namearg)
252b5132 199{
3a99b017 200 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
201 unsigned long h = 0;
202 unsigned long g;
203 int ch;
204
205 while ((ch = *name++) != '\0')
206 {
207 h = (h << 4) + ch;
208 if ((g = (h & 0xf0000000)) != 0)
209 {
210 h ^= g >> 24;
211 /* The ELF ABI says `h &= ~g', but this is equivalent in
212 this case and on some machines one insn instead of two. */
213 h ^= g;
214 }
215 }
32dfa85d 216 return h & 0xffffffff;
252b5132
RH
217}
218
fdc90cb4
JJ
219/* DT_GNU_HASH hash function. Do not change this function; you will
220 cause invalid hash tables to be generated. */
221
222unsigned long
223bfd_elf_gnu_hash (const char *namearg)
224{
225 const unsigned char *name = (const unsigned char *) namearg;
226 unsigned long h = 5381;
227 unsigned char ch;
228
229 while ((ch = *name++) != '\0')
230 h = (h << 5) + h + ch;
231 return h & 0xffffffff;
232}
233
0c8d6e5c
AM
234/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
235 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 236bfd_boolean
0c8d6e5c 237bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 238 size_t object_size,
4dfe6ac6 239 enum elf_target_id object_id)
252b5132 240{
0ffa91dd
NC
241 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
242 abfd->tdata.any = bfd_zalloc (abfd, object_size);
243 if (abfd->tdata.any == NULL)
244 return FALSE;
252b5132 245
0ffa91dd
NC
246 elf_object_id (abfd) = object_id;
247 elf_program_header_size (abfd) = (bfd_size_type) -1;
b34976b6 248 return TRUE;
252b5132
RH
249}
250
0ffa91dd
NC
251
252bfd_boolean
ae95ffa6 253bfd_elf_make_object (bfd *abfd)
0ffa91dd 254{
ae95ffa6 255 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 256 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 257 bed->target_id);
0ffa91dd
NC
258}
259
b34976b6 260bfd_boolean
217aa764 261bfd_elf_mkcorefile (bfd *abfd)
252b5132 262{
c044fabd 263 /* I think this can be done just like an object file. */
ae95ffa6 264 return abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd);
252b5132
RH
265}
266
72a80a16 267static char *
217aa764 268bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
269{
270 Elf_Internal_Shdr **i_shdrp;
f075ee0c 271 bfd_byte *shstrtab = NULL;
dc810e39
AM
272 file_ptr offset;
273 bfd_size_type shstrtabsize;
252b5132
RH
274
275 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
276 if (i_shdrp == 0
277 || shindex >= elf_numsections (abfd)
278 || i_shdrp[shindex] == 0)
f075ee0c 279 return NULL;
252b5132 280
f075ee0c 281 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
282 if (shstrtab == NULL)
283 {
c044fabd 284 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
285 offset = i_shdrp[shindex]->sh_offset;
286 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
287
288 /* Allocate and clear an extra byte at the end, to prevent crashes
289 in case the string table is not terminated. */
3471d59d 290 if (shstrtabsize + 1 <= 1
a50b1753 291 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL
c6c60d09
JJ
292 || bfd_seek (abfd, offset, SEEK_SET) != 0)
293 shstrtab = NULL;
294 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
295 {
296 if (bfd_get_error () != bfd_error_system_call)
297 bfd_set_error (bfd_error_file_truncated);
298 shstrtab = NULL;
3471d59d
CC
299 /* Once we've failed to read it, make sure we don't keep
300 trying. Otherwise, we'll keep allocating space for
301 the string table over and over. */
302 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
303 }
304 else
305 shstrtab[shstrtabsize] = '\0';
217aa764 306 i_shdrp[shindex]->contents = shstrtab;
252b5132 307 }
f075ee0c 308 return (char *) shstrtab;
252b5132
RH
309}
310
311char *
217aa764
AM
312bfd_elf_string_from_elf_section (bfd *abfd,
313 unsigned int shindex,
314 unsigned int strindex)
252b5132
RH
315{
316 Elf_Internal_Shdr *hdr;
317
318 if (strindex == 0)
319 return "";
320
74f2e02b
AM
321 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
322 return NULL;
323
252b5132
RH
324 hdr = elf_elfsections (abfd)[shindex];
325
326 if (hdr->contents == NULL
327 && bfd_elf_get_str_section (abfd, shindex) == NULL)
328 return NULL;
329
330 if (strindex >= hdr->sh_size)
331 {
1b3a8575 332 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 333 (*_bfd_error_handler)
d003868e
AM
334 (_("%B: invalid string offset %u >= %lu for section `%s'"),
335 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 336 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 337 ? ".shstrtab"
1b3a8575 338 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 339 return NULL;
252b5132
RH
340 }
341
342 return ((char *) hdr->contents) + strindex;
343}
344
6cdc0ccc
AM
345/* Read and convert symbols to internal format.
346 SYMCOUNT specifies the number of symbols to read, starting from
347 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
348 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
349 symbols, and symbol section index extensions, respectively.
350 Returns a pointer to the internal symbol buffer (malloced if necessary)
351 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
352
353Elf_Internal_Sym *
217aa764
AM
354bfd_elf_get_elf_syms (bfd *ibfd,
355 Elf_Internal_Shdr *symtab_hdr,
356 size_t symcount,
357 size_t symoffset,
358 Elf_Internal_Sym *intsym_buf,
359 void *extsym_buf,
360 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
361{
362 Elf_Internal_Shdr *shndx_hdr;
217aa764 363 void *alloc_ext;
df622259 364 const bfd_byte *esym;
6cdc0ccc
AM
365 Elf_External_Sym_Shndx *alloc_extshndx;
366 Elf_External_Sym_Shndx *shndx;
4dd07732 367 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
368 Elf_Internal_Sym *isym;
369 Elf_Internal_Sym *isymend;
9c5bfbb7 370 const struct elf_backend_data *bed;
6cdc0ccc
AM
371 size_t extsym_size;
372 bfd_size_type amt;
373 file_ptr pos;
374
e44a2c9c
AM
375 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
376 abort ();
377
6cdc0ccc
AM
378 if (symcount == 0)
379 return intsym_buf;
380
381 /* Normal syms might have section extension entries. */
382 shndx_hdr = NULL;
383 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
384 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
385
386 /* Read the symbols. */
387 alloc_ext = NULL;
388 alloc_extshndx = NULL;
4dd07732 389 alloc_intsym = NULL;
6cdc0ccc
AM
390 bed = get_elf_backend_data (ibfd);
391 extsym_size = bed->s->sizeof_sym;
392 amt = symcount * extsym_size;
393 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
394 if (extsym_buf == NULL)
395 {
d0fb9a8d 396 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
397 extsym_buf = alloc_ext;
398 }
399 if (extsym_buf == NULL
400 || bfd_seek (ibfd, pos, SEEK_SET) != 0
401 || bfd_bread (extsym_buf, amt, ibfd) != amt)
402 {
403 intsym_buf = NULL;
404 goto out;
405 }
406
407 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
408 extshndx_buf = NULL;
409 else
410 {
411 amt = symcount * sizeof (Elf_External_Sym_Shndx);
412 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
413 if (extshndx_buf == NULL)
414 {
a50b1753
NC
415 alloc_extshndx = (Elf_External_Sym_Shndx *)
416 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
417 extshndx_buf = alloc_extshndx;
418 }
419 if (extshndx_buf == NULL
420 || bfd_seek (ibfd, pos, SEEK_SET) != 0
421 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
422 {
423 intsym_buf = NULL;
424 goto out;
425 }
426 }
427
428 if (intsym_buf == NULL)
429 {
a50b1753
NC
430 alloc_intsym = (Elf_Internal_Sym *)
431 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 432 intsym_buf = alloc_intsym;
6cdc0ccc
AM
433 if (intsym_buf == NULL)
434 goto out;
435 }
436
437 /* Convert the symbols to internal form. */
438 isymend = intsym_buf + symcount;
a50b1753
NC
439 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
440 shndx = extshndx_buf;
6cdc0ccc
AM
441 isym < isymend;
442 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
443 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
444 {
445 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
446 (*_bfd_error_handler) (_("%B symbol number %lu references "
447 "nonexistent SHT_SYMTAB_SHNDX section"),
448 ibfd, (unsigned long) symoffset);
4dd07732
AM
449 if (alloc_intsym != NULL)
450 free (alloc_intsym);
8384fb8f
AM
451 intsym_buf = NULL;
452 goto out;
453 }
6cdc0ccc
AM
454
455 out:
456 if (alloc_ext != NULL)
457 free (alloc_ext);
458 if (alloc_extshndx != NULL)
459 free (alloc_extshndx);
460
461 return intsym_buf;
462}
463
5cab59f6
AM
464/* Look up a symbol name. */
465const char *
be8dd2ca
AM
466bfd_elf_sym_name (bfd *abfd,
467 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
468 Elf_Internal_Sym *isym,
469 asection *sym_sec)
5cab59f6 470{
26c61ae5 471 const char *name;
5cab59f6 472 unsigned int iname = isym->st_name;
be8dd2ca 473 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 474
138f35cc
JJ
475 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
476 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 477 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
478 {
479 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
480 shindex = elf_elfheader (abfd)->e_shstrndx;
481 }
482
26c61ae5
L
483 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
484 if (name == NULL)
485 name = "(null)";
486 else if (sym_sec && *name == '\0')
487 name = bfd_section_name (abfd, sym_sec);
488
489 return name;
5cab59f6
AM
490}
491
dbb410c3
AM
492/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
493 sections. The first element is the flags, the rest are section
494 pointers. */
495
496typedef union elf_internal_group {
497 Elf_Internal_Shdr *shdr;
498 unsigned int flags;
499} Elf_Internal_Group;
500
b885599b
AM
501/* Return the name of the group signature symbol. Why isn't the
502 signature just a string? */
503
504static const char *
217aa764 505group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 506{
9dce4196 507 Elf_Internal_Shdr *hdr;
9dce4196
AM
508 unsigned char esym[sizeof (Elf64_External_Sym)];
509 Elf_External_Sym_Shndx eshndx;
510 Elf_Internal_Sym isym;
b885599b 511
13792e9d
L
512 /* First we need to ensure the symbol table is available. Make sure
513 that it is a symbol table section. */
4fbb74a6
AM
514 if (ghdr->sh_link >= elf_numsections (abfd))
515 return NULL;
13792e9d
L
516 hdr = elf_elfsections (abfd) [ghdr->sh_link];
517 if (hdr->sh_type != SHT_SYMTAB
518 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
519 return NULL;
520
9dce4196
AM
521 /* Go read the symbol. */
522 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
523 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
524 &isym, esym, &eshndx) == NULL)
b885599b 525 return NULL;
9dce4196 526
26c61ae5 527 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
528}
529
dbb410c3
AM
530/* Set next_in_group list pointer, and group name for NEWSECT. */
531
b34976b6 532static bfd_boolean
217aa764 533setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
534{
535 unsigned int num_group = elf_tdata (abfd)->num_group;
536
537 /* If num_group is zero, read in all SHT_GROUP sections. The count
538 is set to -1 if there are no SHT_GROUP sections. */
539 if (num_group == 0)
540 {
541 unsigned int i, shnum;
542
543 /* First count the number of groups. If we have a SHT_GROUP
544 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 545 shnum = elf_numsections (abfd);
dbb410c3 546 num_group = 0;
08a40648 547
1783205a
NC
548#define IS_VALID_GROUP_SECTION_HEADER(shdr) \
549 ( (shdr)->sh_type == SHT_GROUP \
550 && (shdr)->sh_size >= (2 * GRP_ENTRY_SIZE) \
551 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
552 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 553
dbb410c3
AM
554 for (i = 0; i < shnum; i++)
555 {
556 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
557
558 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3
AM
559 num_group += 1;
560 }
561
562 if (num_group == 0)
20dbb49d
L
563 {
564 num_group = (unsigned) -1;
565 elf_tdata (abfd)->num_group = num_group;
566 }
567 else
dbb410c3
AM
568 {
569 /* We keep a list of elf section headers for group sections,
570 so we can find them quickly. */
20dbb49d 571 bfd_size_type amt;
d0fb9a8d 572
20dbb49d 573 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
574 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
575 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 576 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 577 return FALSE;
dbb410c3
AM
578
579 num_group = 0;
580 for (i = 0; i < shnum; i++)
581 {
582 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
583
584 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3 585 {
973ffd63 586 unsigned char *src;
dbb410c3
AM
587 Elf_Internal_Group *dest;
588
589 /* Add to list of sections. */
590 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
591 num_group += 1;
592
593 /* Read the raw contents. */
594 BFD_ASSERT (sizeof (*dest) >= 4);
595 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
596 shdr->contents = (unsigned char *)
597 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
598 /* PR binutils/4110: Handle corrupt group headers. */
599 if (shdr->contents == NULL)
600 {
601 _bfd_error_handler
602 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
603 bfd_set_error (bfd_error_bad_value);
604 return FALSE;
605 }
606
607 memset (shdr->contents, 0, amt);
608
609 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
610 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
611 != shdr->sh_size))
b34976b6 612 return FALSE;
dbb410c3
AM
613
614 /* Translate raw contents, a flag word followed by an
615 array of elf section indices all in target byte order,
616 to the flag word followed by an array of elf section
617 pointers. */
618 src = shdr->contents + shdr->sh_size;
619 dest = (Elf_Internal_Group *) (shdr->contents + amt);
620 while (1)
621 {
622 unsigned int idx;
623
624 src -= 4;
625 --dest;
626 idx = H_GET_32 (abfd, src);
627 if (src == shdr->contents)
628 {
629 dest->flags = idx;
b885599b
AM
630 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
631 shdr->bfd_section->flags
632 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
633 break;
634 }
635 if (idx >= shnum)
636 {
637 ((*_bfd_error_handler)
d003868e 638 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
639 idx = 0;
640 }
641 dest->shdr = elf_elfsections (abfd)[idx];
642 }
643 }
644 }
645 }
646 }
647
648 if (num_group != (unsigned) -1)
649 {
650 unsigned int i;
651
652 for (i = 0; i < num_group; i++)
653 {
654 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
655 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
656 unsigned int n_elt = shdr->sh_size / 4;
657
658 /* Look through this group's sections to see if current
659 section is a member. */
660 while (--n_elt != 0)
661 if ((++idx)->shdr == hdr)
662 {
e0e8c97f 663 asection *s = NULL;
dbb410c3
AM
664
665 /* We are a member of this group. Go looking through
666 other members to see if any others are linked via
667 next_in_group. */
668 idx = (Elf_Internal_Group *) shdr->contents;
669 n_elt = shdr->sh_size / 4;
670 while (--n_elt != 0)
671 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 672 && elf_next_in_group (s) != NULL)
dbb410c3
AM
673 break;
674 if (n_elt != 0)
675 {
dbb410c3
AM
676 /* Snarf the group name from other member, and
677 insert current section in circular list. */
945906ff
AM
678 elf_group_name (newsect) = elf_group_name (s);
679 elf_next_in_group (newsect) = elf_next_in_group (s);
680 elf_next_in_group (s) = newsect;
dbb410c3
AM
681 }
682 else
683 {
dbb410c3
AM
684 const char *gname;
685
b885599b
AM
686 gname = group_signature (abfd, shdr);
687 if (gname == NULL)
b34976b6 688 return FALSE;
945906ff 689 elf_group_name (newsect) = gname;
dbb410c3
AM
690
691 /* Start a circular list with one element. */
945906ff 692 elf_next_in_group (newsect) = newsect;
dbb410c3 693 }
b885599b 694
9dce4196
AM
695 /* If the group section has been created, point to the
696 new member. */
dbb410c3 697 if (shdr->bfd_section != NULL)
945906ff 698 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 699
dbb410c3
AM
700 i = num_group - 1;
701 break;
702 }
703 }
704 }
705
945906ff 706 if (elf_group_name (newsect) == NULL)
dbb410c3 707 {
d003868e
AM
708 (*_bfd_error_handler) (_("%B: no group info for section %A"),
709 abfd, newsect);
dbb410c3 710 }
b34976b6 711 return TRUE;
dbb410c3
AM
712}
713
3d7f7666 714bfd_boolean
dd863624 715_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
716{
717 unsigned int i;
718 unsigned int num_group = elf_tdata (abfd)->num_group;
719 bfd_boolean result = TRUE;
dd863624
L
720 asection *s;
721
722 /* Process SHF_LINK_ORDER. */
723 for (s = abfd->sections; s != NULL; s = s->next)
724 {
725 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
726 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
727 {
728 unsigned int elfsec = this_hdr->sh_link;
729 /* FIXME: The old Intel compiler and old strip/objcopy may
730 not set the sh_link or sh_info fields. Hence we could
731 get the situation where elfsec is 0. */
732 if (elfsec == 0)
733 {
4fbb74a6 734 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
735 if (bed->link_order_error_handler)
736 bed->link_order_error_handler
737 (_("%B: warning: sh_link not set for section `%A'"),
738 abfd, s);
739 }
740 else
741 {
91d6fa6a 742 asection *linksec = NULL;
25bbc984 743
4fbb74a6
AM
744 if (elfsec < elf_numsections (abfd))
745 {
746 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 747 linksec = this_hdr->bfd_section;
4fbb74a6 748 }
25bbc984
L
749
750 /* PR 1991, 2008:
751 Some strip/objcopy may leave an incorrect value in
752 sh_link. We don't want to proceed. */
91d6fa6a 753 if (linksec == NULL)
25bbc984
L
754 {
755 (*_bfd_error_handler)
756 (_("%B: sh_link [%d] in section `%A' is incorrect"),
757 s->owner, s, elfsec);
758 result = FALSE;
759 }
760
91d6fa6a 761 elf_linked_to_section (s) = linksec;
dd863624
L
762 }
763 }
764 }
3d7f7666 765
dd863624 766 /* Process section groups. */
3d7f7666
L
767 if (num_group == (unsigned) -1)
768 return result;
769
770 for (i = 0; i < num_group; i++)
771 {
772 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
773 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
774 unsigned int n_elt = shdr->sh_size / 4;
775
776 while (--n_elt != 0)
777 if ((++idx)->shdr->bfd_section)
778 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
779 else if (idx->shdr->sh_type == SHT_RELA
780 || idx->shdr->sh_type == SHT_REL)
781 /* We won't include relocation sections in section groups in
782 output object files. We adjust the group section size here
783 so that relocatable link will work correctly when
784 relocation sections are in section group in input object
785 files. */
786 shdr->bfd_section->size -= 4;
787 else
788 {
789 /* There are some unknown sections in the group. */
790 (*_bfd_error_handler)
d003868e
AM
791 (_("%B: unknown [%d] section `%s' in group [%s]"),
792 abfd,
3d7f7666 793 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
794 bfd_elf_string_from_elf_section (abfd,
795 (elf_elfheader (abfd)
796 ->e_shstrndx),
797 idx->shdr->sh_name),
3d7f7666
L
798 shdr->bfd_section->name);
799 result = FALSE;
800 }
801 }
802 return result;
803}
804
72adc230
AM
805bfd_boolean
806bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
807{
808 return elf_next_in_group (sec) != NULL;
809}
810
252b5132
RH
811/* Make a BFD section from an ELF section. We store a pointer to the
812 BFD section in the bfd_section field of the header. */
813
b34976b6 814bfd_boolean
217aa764
AM
815_bfd_elf_make_section_from_shdr (bfd *abfd,
816 Elf_Internal_Shdr *hdr,
6dc132d9
L
817 const char *name,
818 int shindex)
252b5132
RH
819{
820 asection *newsect;
821 flagword flags;
9c5bfbb7 822 const struct elf_backend_data *bed;
252b5132
RH
823
824 if (hdr->bfd_section != NULL)
825 {
826 BFD_ASSERT (strcmp (name,
827 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 828 return TRUE;
252b5132
RH
829 }
830
831 newsect = bfd_make_section_anyway (abfd, name);
832 if (newsect == NULL)
b34976b6 833 return FALSE;
252b5132 834
1829f4b2
AM
835 hdr->bfd_section = newsect;
836 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 837 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 838
2f89ff8d
L
839 /* Always use the real type/flags. */
840 elf_section_type (newsect) = hdr->sh_type;
841 elf_section_flags (newsect) = hdr->sh_flags;
842
252b5132
RH
843 newsect->filepos = hdr->sh_offset;
844
845 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
846 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
847 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 848 bfd_log2 (hdr->sh_addralign)))
b34976b6 849 return FALSE;
252b5132
RH
850
851 flags = SEC_NO_FLAGS;
852 if (hdr->sh_type != SHT_NOBITS)
853 flags |= SEC_HAS_CONTENTS;
dbb410c3 854 if (hdr->sh_type == SHT_GROUP)
b3096250 855 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
856 if ((hdr->sh_flags & SHF_ALLOC) != 0)
857 {
858 flags |= SEC_ALLOC;
859 if (hdr->sh_type != SHT_NOBITS)
860 flags |= SEC_LOAD;
861 }
862 if ((hdr->sh_flags & SHF_WRITE) == 0)
863 flags |= SEC_READONLY;
864 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
865 flags |= SEC_CODE;
866 else if ((flags & SEC_LOAD) != 0)
867 flags |= SEC_DATA;
f5fa8ca2
JJ
868 if ((hdr->sh_flags & SHF_MERGE) != 0)
869 {
870 flags |= SEC_MERGE;
871 newsect->entsize = hdr->sh_entsize;
872 if ((hdr->sh_flags & SHF_STRINGS) != 0)
873 flags |= SEC_STRINGS;
874 }
dbb410c3
AM
875 if (hdr->sh_flags & SHF_GROUP)
876 if (!setup_group (abfd, hdr, newsect))
b34976b6 877 return FALSE;
13ae64f3
JJ
878 if ((hdr->sh_flags & SHF_TLS) != 0)
879 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
880 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
881 flags |= SEC_EXCLUDE;
252b5132 882
3d2b39cf 883 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 884 {
3d2b39cf
L
885 /* The debugging sections appear to be recognized only by name,
886 not any sort of flag. Their SEC_ALLOC bits are cleared. */
887 static const struct
888 {
889 const char *name;
890 int len;
891 } debug_sections [] =
892 {
0112cd26 893 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
894 { NULL, 0 }, /* 'e' */
895 { NULL, 0 }, /* 'f' */
0112cd26 896 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
897 { NULL, 0 }, /* 'h' */
898 { NULL, 0 }, /* 'i' */
899 { NULL, 0 }, /* 'j' */
900 { NULL, 0 }, /* 'k' */
0112cd26 901 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
902 { NULL, 0 }, /* 'm' */
903 { NULL, 0 }, /* 'n' */
904 { NULL, 0 }, /* 'o' */
905 { NULL, 0 }, /* 'p' */
906 { NULL, 0 }, /* 'q' */
907 { NULL, 0 }, /* 'r' */
1b315056
CS
908 { STRING_COMMA_LEN ("stab") }, /* 's' */
909 { NULL, 0 }, /* 't' */
910 { NULL, 0 }, /* 'u' */
911 { NULL, 0 }, /* 'v' */
912 { NULL, 0 }, /* 'w' */
913 { NULL, 0 }, /* 'x' */
914 { NULL, 0 }, /* 'y' */
915 { STRING_COMMA_LEN ("zdebug") } /* 'z' */
3d2b39cf 916 };
08a40648 917
3d2b39cf
L
918 if (name [0] == '.')
919 {
920 int i = name [1] - 'd';
921 if (i >= 0
922 && i < (int) ARRAY_SIZE (debug_sections)
923 && debug_sections [i].name != NULL
924 && strncmp (&name [1], debug_sections [i].name,
925 debug_sections [i].len) == 0)
926 flags |= SEC_DEBUGGING;
927 }
928 }
252b5132
RH
929
930 /* As a GNU extension, if the name begins with .gnu.linkonce, we
931 only link a single copy of the section. This is used to support
932 g++. g++ will emit each template expansion in its own section.
933 The symbols will be defined as weak, so that multiple definitions
934 are permitted. The GNU linker extension is to actually discard
935 all but one of the sections. */
0112cd26 936 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 937 && elf_next_in_group (newsect) == NULL)
252b5132
RH
938 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
939
fa152c49
JW
940 bed = get_elf_backend_data (abfd);
941 if (bed->elf_backend_section_flags)
942 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 943 return FALSE;
fa152c49 944
252b5132 945 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 946 return FALSE;
252b5132 947
718175fa
JK
948 /* We do not parse the PT_NOTE segments as we are interested even in the
949 separate debug info files which may have the segments offsets corrupted.
950 PT_NOTEs from the core files are currently not parsed using BFD. */
951 if (hdr->sh_type == SHT_NOTE)
952 {
baea7ef1 953 bfd_byte *contents;
718175fa 954
baea7ef1 955 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
956 return FALSE;
957
baea7ef1 958 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
959 free (contents);
960 }
961
252b5132
RH
962 if ((flags & SEC_ALLOC) != 0)
963 {
964 Elf_Internal_Phdr *phdr;
6ffd7900
AM
965 unsigned int i, nload;
966
967 /* Some ELF linkers produce binaries with all the program header
968 p_paddr fields zero. If we have such a binary with more than
969 one PT_LOAD header, then leave the section lma equal to vma
970 so that we don't create sections with overlapping lma. */
971 phdr = elf_tdata (abfd)->phdr;
972 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
973 if (phdr->p_paddr != 0)
974 break;
975 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
976 ++nload;
977 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
978 return TRUE;
252b5132 979
252b5132
RH
980 phdr = elf_tdata (abfd)->phdr;
981 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
982 {
88967714 983 if (phdr->p_type == PT_LOAD
9a83a553 984 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 985 {
88967714
AM
986 if ((flags & SEC_LOAD) == 0)
987 newsect->lma = (phdr->p_paddr
988 + hdr->sh_addr - phdr->p_vaddr);
989 else
990 /* We used to use the same adjustment for SEC_LOAD
991 sections, but that doesn't work if the segment
992 is packed with code from multiple VMAs.
993 Instead we calculate the section LMA based on
994 the segment LMA. It is assumed that the
995 segment will contain sections with contiguous
996 LMAs, even if the VMAs are not. */
997 newsect->lma = (phdr->p_paddr
998 + hdr->sh_offset - phdr->p_offset);
999
1000 /* With contiguous segments, we can't tell from file
1001 offsets whether a section with zero size should
1002 be placed at the end of one segment or the
1003 beginning of the next. Decide based on vaddr. */
1004 if (hdr->sh_addr >= phdr->p_vaddr
1005 && (hdr->sh_addr + hdr->sh_size
1006 <= phdr->p_vaddr + phdr->p_memsz))
1007 break;
252b5132
RH
1008 }
1009 }
1010 }
1011
b34976b6 1012 return TRUE;
252b5132
RH
1013}
1014
252b5132
RH
1015const char *const bfd_elf_section_type_names[] = {
1016 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1017 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1018 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1019};
1020
1049f94e 1021/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1022 output, and the reloc is against an external symbol, and nothing
1023 has given us any additional addend, the resulting reloc will also
1024 be against the same symbol. In such a case, we don't want to
1025 change anything about the way the reloc is handled, since it will
1026 all be done at final link time. Rather than put special case code
1027 into bfd_perform_relocation, all the reloc types use this howto
1028 function. It just short circuits the reloc if producing
1049f94e 1029 relocatable output against an external symbol. */
252b5132 1030
252b5132 1031bfd_reloc_status_type
217aa764
AM
1032bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1033 arelent *reloc_entry,
1034 asymbol *symbol,
1035 void *data ATTRIBUTE_UNUSED,
1036 asection *input_section,
1037 bfd *output_bfd,
1038 char **error_message ATTRIBUTE_UNUSED)
1039{
1040 if (output_bfd != NULL
252b5132
RH
1041 && (symbol->flags & BSF_SECTION_SYM) == 0
1042 && (! reloc_entry->howto->partial_inplace
1043 || reloc_entry->addend == 0))
1044 {
1045 reloc_entry->address += input_section->output_offset;
1046 return bfd_reloc_ok;
1047 }
1048
1049 return bfd_reloc_continue;
1050}
1051\f
0ac4564e
L
1052/* Copy the program header and other data from one object module to
1053 another. */
252b5132 1054
b34976b6 1055bfd_boolean
217aa764 1056_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1057{
1058 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1059 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1060 return TRUE;
2d502050
L
1061
1062 BFD_ASSERT (!elf_flags_init (obfd)
1063 || (elf_elfheader (obfd)->e_flags
1064 == elf_elfheader (ibfd)->e_flags));
1065
0ac4564e 1066 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1067 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1068 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1069
1070 /* Copy object attributes. */
1071 _bfd_elf_copy_obj_attributes (ibfd, obfd);
b34976b6 1072 return TRUE;
2d502050
L
1073}
1074
cedc298e
L
1075static const char *
1076get_segment_type (unsigned int p_type)
1077{
1078 const char *pt;
1079 switch (p_type)
1080 {
1081 case PT_NULL: pt = "NULL"; break;
1082 case PT_LOAD: pt = "LOAD"; break;
1083 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1084 case PT_INTERP: pt = "INTERP"; break;
1085 case PT_NOTE: pt = "NOTE"; break;
1086 case PT_SHLIB: pt = "SHLIB"; break;
1087 case PT_PHDR: pt = "PHDR"; break;
1088 case PT_TLS: pt = "TLS"; break;
1089 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1090 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1091 case PT_GNU_RELRO: pt = "RELRO"; break;
1092 default: pt = NULL; break;
1093 }
1094 return pt;
1095}
1096
f0b79d91
L
1097/* Print out the program headers. */
1098
b34976b6 1099bfd_boolean
217aa764 1100_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1101{
a50b1753 1102 FILE *f = (FILE *) farg;
252b5132
RH
1103 Elf_Internal_Phdr *p;
1104 asection *s;
1105 bfd_byte *dynbuf = NULL;
1106
1107 p = elf_tdata (abfd)->phdr;
1108 if (p != NULL)
1109 {
1110 unsigned int i, c;
1111
1112 fprintf (f, _("\nProgram Header:\n"));
1113 c = elf_elfheader (abfd)->e_phnum;
1114 for (i = 0; i < c; i++, p++)
1115 {
cedc298e 1116 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1117 char buf[20];
1118
cedc298e 1119 if (pt == NULL)
252b5132 1120 {
cedc298e
L
1121 sprintf (buf, "0x%lx", p->p_type);
1122 pt = buf;
252b5132 1123 }
dc810e39 1124 fprintf (f, "%8s off 0x", pt);
60b89a18 1125 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1126 fprintf (f, " vaddr 0x");
60b89a18 1127 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1128 fprintf (f, " paddr 0x");
60b89a18 1129 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1130 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1131 fprintf (f, " filesz 0x");
60b89a18 1132 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1133 fprintf (f, " memsz 0x");
60b89a18 1134 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1135 fprintf (f, " flags %c%c%c",
1136 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1137 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1138 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1139 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1140 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1141 fprintf (f, "\n");
1142 }
1143 }
1144
1145 s = bfd_get_section_by_name (abfd, ".dynamic");
1146 if (s != NULL)
1147 {
cb33740c 1148 unsigned int elfsec;
dc810e39 1149 unsigned long shlink;
252b5132
RH
1150 bfd_byte *extdyn, *extdynend;
1151 size_t extdynsize;
217aa764 1152 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1153
1154 fprintf (f, _("\nDynamic Section:\n"));
1155
eea6121a 1156 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1157 goto error_return;
1158
1159 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1160 if (elfsec == SHN_BAD)
252b5132 1161 goto error_return;
dc810e39 1162 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1163
1164 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1165 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1166
1167 extdyn = dynbuf;
eea6121a 1168 extdynend = extdyn + s->size;
252b5132
RH
1169 for (; extdyn < extdynend; extdyn += extdynsize)
1170 {
1171 Elf_Internal_Dyn dyn;
ad9563d6 1172 const char *name = "";
252b5132 1173 char ab[20];
b34976b6 1174 bfd_boolean stringp;
ad9563d6 1175 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1176
217aa764 1177 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1178
1179 if (dyn.d_tag == DT_NULL)
1180 break;
1181
b34976b6 1182 stringp = FALSE;
252b5132
RH
1183 switch (dyn.d_tag)
1184 {
1185 default:
ad9563d6
CM
1186 if (bed->elf_backend_get_target_dtag)
1187 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1188
1189 if (!strcmp (name, ""))
1190 {
1191 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1192 name = ab;
1193 }
252b5132
RH
1194 break;
1195
b34976b6 1196 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1197 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1198 case DT_PLTGOT: name = "PLTGOT"; break;
1199 case DT_HASH: name = "HASH"; break;
1200 case DT_STRTAB: name = "STRTAB"; break;
1201 case DT_SYMTAB: name = "SYMTAB"; break;
1202 case DT_RELA: name = "RELA"; break;
1203 case DT_RELASZ: name = "RELASZ"; break;
1204 case DT_RELAENT: name = "RELAENT"; break;
1205 case DT_STRSZ: name = "STRSZ"; break;
1206 case DT_SYMENT: name = "SYMENT"; break;
1207 case DT_INIT: name = "INIT"; break;
1208 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1209 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1210 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1211 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1212 case DT_REL: name = "REL"; break;
1213 case DT_RELSZ: name = "RELSZ"; break;
1214 case DT_RELENT: name = "RELENT"; break;
1215 case DT_PLTREL: name = "PLTREL"; break;
1216 case DT_DEBUG: name = "DEBUG"; break;
1217 case DT_TEXTREL: name = "TEXTREL"; break;
1218 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1219 case DT_BIND_NOW: name = "BIND_NOW"; break;
1220 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1221 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1222 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1223 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1224 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1225 case DT_FLAGS: name = "FLAGS"; break;
1226 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1227 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1228 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1229 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1230 case DT_MOVEENT: name = "MOVEENT"; break;
1231 case DT_MOVESZ: name = "MOVESZ"; break;
1232 case DT_FEATURE: name = "FEATURE"; break;
1233 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1234 case DT_SYMINSZ: name = "SYMINSZ"; break;
1235 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1236 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1237 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1238 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1239 case DT_PLTPAD: name = "PLTPAD"; break;
1240 case DT_MOVETAB: name = "MOVETAB"; break;
1241 case DT_SYMINFO: name = "SYMINFO"; break;
1242 case DT_RELACOUNT: name = "RELACOUNT"; break;
1243 case DT_RELCOUNT: name = "RELCOUNT"; break;
1244 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1245 case DT_VERSYM: name = "VERSYM"; break;
1246 case DT_VERDEF: name = "VERDEF"; break;
1247 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1248 case DT_VERNEED: name = "VERNEED"; break;
1249 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1250 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1251 case DT_USED: name = "USED"; break;
b34976b6 1252 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1253 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1254 }
1255
ad9563d6 1256 fprintf (f, " %-20s ", name);
252b5132 1257 if (! stringp)
a1f3c56e
AN
1258 {
1259 fprintf (f, "0x");
1260 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1261 }
252b5132
RH
1262 else
1263 {
1264 const char *string;
dc810e39 1265 unsigned int tagv = dyn.d_un.d_val;
252b5132 1266
dc810e39 1267 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1268 if (string == NULL)
1269 goto error_return;
1270 fprintf (f, "%s", string);
1271 }
1272 fprintf (f, "\n");
1273 }
1274
1275 free (dynbuf);
1276 dynbuf = NULL;
1277 }
1278
1279 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1280 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1281 {
fc0e6df6 1282 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1283 return FALSE;
252b5132
RH
1284 }
1285
1286 if (elf_dynverdef (abfd) != 0)
1287 {
1288 Elf_Internal_Verdef *t;
1289
1290 fprintf (f, _("\nVersion definitions:\n"));
1291 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1292 {
1293 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1294 t->vd_flags, t->vd_hash,
1295 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1296 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1297 {
1298 Elf_Internal_Verdaux *a;
1299
1300 fprintf (f, "\t");
1301 for (a = t->vd_auxptr->vda_nextptr;
1302 a != NULL;
1303 a = a->vda_nextptr)
d0fb9a8d
JJ
1304 fprintf (f, "%s ",
1305 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1306 fprintf (f, "\n");
1307 }
1308 }
1309 }
1310
1311 if (elf_dynverref (abfd) != 0)
1312 {
1313 Elf_Internal_Verneed *t;
1314
1315 fprintf (f, _("\nVersion References:\n"));
1316 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1317 {
1318 Elf_Internal_Vernaux *a;
1319
d0fb9a8d
JJ
1320 fprintf (f, _(" required from %s:\n"),
1321 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1322 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1323 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1324 a->vna_flags, a->vna_other,
1325 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1326 }
1327 }
1328
b34976b6 1329 return TRUE;
252b5132
RH
1330
1331 error_return:
1332 if (dynbuf != NULL)
1333 free (dynbuf);
b34976b6 1334 return FALSE;
252b5132
RH
1335}
1336
1337/* Display ELF-specific fields of a symbol. */
1338
1339void
217aa764
AM
1340bfd_elf_print_symbol (bfd *abfd,
1341 void *filep,
1342 asymbol *symbol,
1343 bfd_print_symbol_type how)
252b5132 1344{
a50b1753 1345 FILE *file = (FILE *) filep;
252b5132
RH
1346 switch (how)
1347 {
1348 case bfd_print_symbol_name:
1349 fprintf (file, "%s", symbol->name);
1350 break;
1351 case bfd_print_symbol_more:
1352 fprintf (file, "elf ");
60b89a18 1353 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1354 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1355 break;
1356 case bfd_print_symbol_all:
1357 {
4e8a9624
AM
1358 const char *section_name;
1359 const char *name = NULL;
9c5bfbb7 1360 const struct elf_backend_data *bed;
7a13edea 1361 unsigned char st_other;
dbb410c3 1362 bfd_vma val;
c044fabd 1363
252b5132 1364 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1365
1366 bed = get_elf_backend_data (abfd);
1367 if (bed->elf_backend_print_symbol_all)
c044fabd 1368 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1369
1370 if (name == NULL)
1371 {
7ee38065 1372 name = symbol->name;
217aa764 1373 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1374 }
1375
252b5132
RH
1376 fprintf (file, " %s\t", section_name);
1377 /* Print the "other" value for a symbol. For common symbols,
1378 we've already printed the size; now print the alignment.
1379 For other symbols, we have no specified alignment, and
1380 we've printed the address; now print the size. */
dcf6c779 1381 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1382 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1383 else
1384 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1385 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1386
1387 /* If we have version information, print it. */
1388 if (elf_tdata (abfd)->dynversym_section != 0
1389 && (elf_tdata (abfd)->dynverdef_section != 0
1390 || elf_tdata (abfd)->dynverref_section != 0))
1391 {
1392 unsigned int vernum;
1393 const char *version_string;
1394
1395 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1396
1397 if (vernum == 0)
1398 version_string = "";
1399 else if (vernum == 1)
1400 version_string = "Base";
1401 else if (vernum <= elf_tdata (abfd)->cverdefs)
1402 version_string =
1403 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1404 else
1405 {
1406 Elf_Internal_Verneed *t;
1407
1408 version_string = "";
1409 for (t = elf_tdata (abfd)->verref;
1410 t != NULL;
1411 t = t->vn_nextref)
1412 {
1413 Elf_Internal_Vernaux *a;
1414
1415 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1416 {
1417 if (a->vna_other == vernum)
1418 {
1419 version_string = a->vna_nodename;
1420 break;
1421 }
1422 }
1423 }
1424 }
1425
1426 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1427 fprintf (file, " %-11s", version_string);
1428 else
1429 {
1430 int i;
1431
1432 fprintf (file, " (%s)", version_string);
1433 for (i = 10 - strlen (version_string); i > 0; --i)
1434 putc (' ', file);
1435 }
1436 }
1437
1438 /* If the st_other field is not zero, print it. */
7a13edea 1439 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1440
7a13edea
NC
1441 switch (st_other)
1442 {
1443 case 0: break;
1444 case STV_INTERNAL: fprintf (file, " .internal"); break;
1445 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1446 case STV_PROTECTED: fprintf (file, " .protected"); break;
1447 default:
1448 /* Some other non-defined flags are also present, so print
1449 everything hex. */
1450 fprintf (file, " 0x%02x", (unsigned int) st_other);
1451 }
252b5132 1452
587ff49e 1453 fprintf (file, " %s", name);
252b5132
RH
1454 }
1455 break;
1456 }
1457}
252b5132 1458
252b5132
RH
1459/* Allocate an ELF string table--force the first byte to be zero. */
1460
1461struct bfd_strtab_hash *
217aa764 1462_bfd_elf_stringtab_init (void)
252b5132
RH
1463{
1464 struct bfd_strtab_hash *ret;
1465
1466 ret = _bfd_stringtab_init ();
1467 if (ret != NULL)
1468 {
1469 bfd_size_type loc;
1470
b34976b6 1471 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1472 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1473 if (loc == (bfd_size_type) -1)
1474 {
1475 _bfd_stringtab_free (ret);
1476 ret = NULL;
1477 }
1478 }
1479 return ret;
1480}
1481\f
1482/* ELF .o/exec file reading */
1483
c044fabd 1484/* Create a new bfd section from an ELF section header. */
252b5132 1485
b34976b6 1486bfd_boolean
217aa764 1487bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1488{
4fbb74a6
AM
1489 Elf_Internal_Shdr *hdr;
1490 Elf_Internal_Ehdr *ehdr;
1491 const struct elf_backend_data *bed;
90937f86 1492 const char *name;
252b5132 1493
4fbb74a6
AM
1494 if (shindex >= elf_numsections (abfd))
1495 return FALSE;
1496
1497 hdr = elf_elfsections (abfd)[shindex];
1498 ehdr = elf_elfheader (abfd);
1499 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1500 hdr->sh_name);
933d961a
JJ
1501 if (name == NULL)
1502 return FALSE;
252b5132 1503
4fbb74a6 1504 bed = get_elf_backend_data (abfd);
252b5132
RH
1505 switch (hdr->sh_type)
1506 {
1507 case SHT_NULL:
1508 /* Inactive section. Throw it away. */
b34976b6 1509 return TRUE;
252b5132
RH
1510
1511 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1512 case SHT_NOBITS: /* .bss section. */
1513 case SHT_HASH: /* .hash section. */
1514 case SHT_NOTE: /* .note section. */
25e27870
L
1515 case SHT_INIT_ARRAY: /* .init_array section. */
1516 case SHT_FINI_ARRAY: /* .fini_array section. */
1517 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1518 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1519 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1520 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1521
797fc050 1522 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1523 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1524 return FALSE;
cfcac11d
NC
1525 if (hdr->sh_link > elf_numsections (abfd))
1526 {
caa83f8b 1527 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1528 field set to SHN_BEFORE or SHN_AFTER. */
1529 switch (bfd_get_arch (abfd))
1530 {
caa83f8b 1531 case bfd_arch_i386:
cfcac11d
NC
1532 case bfd_arch_sparc:
1533 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1534 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1535 break;
1536 /* Otherwise fall through. */
1537 default:
1538 return FALSE;
1539 }
1540 }
1541 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
8e0ed13f 1542 return FALSE;
cfcac11d 1543 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1544 {
1545 Elf_Internal_Shdr *dynsymhdr;
1546
1547 /* The shared libraries distributed with hpux11 have a bogus
1548 sh_link field for the ".dynamic" section. Find the
1549 string table for the ".dynsym" section instead. */
1550 if (elf_dynsymtab (abfd) != 0)
1551 {
1552 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1553 hdr->sh_link = dynsymhdr->sh_link;
1554 }
1555 else
1556 {
1557 unsigned int i, num_sec;
1558
1559 num_sec = elf_numsections (abfd);
1560 for (i = 1; i < num_sec; i++)
1561 {
1562 dynsymhdr = elf_elfsections (abfd)[i];
1563 if (dynsymhdr->sh_type == SHT_DYNSYM)
1564 {
1565 hdr->sh_link = dynsymhdr->sh_link;
1566 break;
1567 }
1568 }
1569 }
1570 }
1571 break;
1572
252b5132
RH
1573 case SHT_SYMTAB: /* A symbol table */
1574 if (elf_onesymtab (abfd) == shindex)
b34976b6 1575 return TRUE;
252b5132 1576
a50b2160
JJ
1577 if (hdr->sh_entsize != bed->s->sizeof_sym)
1578 return FALSE;
3337c1e5
AM
1579 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1580 return FALSE;
252b5132
RH
1581 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1582 elf_onesymtab (abfd) = shindex;
1583 elf_tdata (abfd)->symtab_hdr = *hdr;
1584 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1585 abfd->flags |= HAS_SYMS;
1586
1587 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1588 SHF_ALLOC is set, and this is a shared object, then we also
1589 treat this section as a BFD section. We can not base the
1590 decision purely on SHF_ALLOC, because that flag is sometimes
1591 set in a relocatable object file, which would confuse the
1592 linker. */
252b5132
RH
1593 if ((hdr->sh_flags & SHF_ALLOC) != 0
1594 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1595 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1596 shindex))
b34976b6 1597 return FALSE;
252b5132 1598
1b3a8575
AM
1599 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1600 can't read symbols without that section loaded as well. It
1601 is most likely specified by the next section header. */
1602 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1603 {
1604 unsigned int i, num_sec;
1605
1606 num_sec = elf_numsections (abfd);
1607 for (i = shindex + 1; i < num_sec; i++)
1608 {
1609 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1610 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1611 && hdr2->sh_link == shindex)
1612 break;
1613 }
1614 if (i == num_sec)
1615 for (i = 1; i < shindex; i++)
1616 {
1617 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1618 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1619 && hdr2->sh_link == shindex)
1620 break;
1621 }
1622 if (i != shindex)
1623 return bfd_section_from_shdr (abfd, i);
1624 }
b34976b6 1625 return TRUE;
252b5132
RH
1626
1627 case SHT_DYNSYM: /* A dynamic symbol table */
1628 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1629 return TRUE;
252b5132 1630
a50b2160
JJ
1631 if (hdr->sh_entsize != bed->s->sizeof_sym)
1632 return FALSE;
252b5132
RH
1633 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1634 elf_dynsymtab (abfd) = shindex;
1635 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1636 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1637 abfd->flags |= HAS_SYMS;
1638
1639 /* Besides being a symbol table, we also treat this as a regular
1640 section, so that objcopy can handle it. */
6dc132d9 1641 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1642
9ad5cbcf
AM
1643 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1644 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1645 return TRUE;
9ad5cbcf 1646
1b3a8575 1647 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1648 elf_symtab_shndx (abfd) = shindex;
1649 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1650 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1651 return TRUE;
9ad5cbcf 1652
252b5132
RH
1653 case SHT_STRTAB: /* A string table */
1654 if (hdr->bfd_section != NULL)
b34976b6 1655 return TRUE;
252b5132
RH
1656 if (ehdr->e_shstrndx == shindex)
1657 {
1658 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1659 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1660 return TRUE;
252b5132 1661 }
1b3a8575
AM
1662 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1663 {
1664 symtab_strtab:
1665 elf_tdata (abfd)->strtab_hdr = *hdr;
1666 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1667 return TRUE;
1668 }
1669 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1670 {
1671 dynsymtab_strtab:
1672 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1673 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1674 elf_elfsections (abfd)[shindex] = hdr;
1675 /* We also treat this as a regular section, so that objcopy
1676 can handle it. */
6dc132d9
L
1677 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1678 shindex);
1b3a8575 1679 }
252b5132 1680
1b3a8575
AM
1681 /* If the string table isn't one of the above, then treat it as a
1682 regular section. We need to scan all the headers to be sure,
1683 just in case this strtab section appeared before the above. */
1684 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1685 {
1686 unsigned int i, num_sec;
252b5132 1687
1b3a8575
AM
1688 num_sec = elf_numsections (abfd);
1689 for (i = 1; i < num_sec; i++)
1690 {
1691 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1692 if (hdr2->sh_link == shindex)
1693 {
933d961a
JJ
1694 /* Prevent endless recursion on broken objects. */
1695 if (i == shindex)
1696 return FALSE;
1b3a8575
AM
1697 if (! bfd_section_from_shdr (abfd, i))
1698 return FALSE;
1699 if (elf_onesymtab (abfd) == i)
1700 goto symtab_strtab;
1701 if (elf_dynsymtab (abfd) == i)
1702 goto dynsymtab_strtab;
1703 }
1704 }
1705 }
6dc132d9 1706 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1707
1708 case SHT_REL:
1709 case SHT_RELA:
1710 /* *These* do a lot of work -- but build no sections! */
1711 {
1712 asection *target_sect;
1713 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1714 unsigned int num_sec = elf_numsections (abfd);
252b5132 1715
aa2ca951
JJ
1716 if (hdr->sh_entsize
1717 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1718 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1719 return FALSE;
1720
03ae5f59 1721 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1722 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1723 {
1724 ((*_bfd_error_handler)
d003868e
AM
1725 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1726 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1727 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1728 shindex);
03ae5f59
ILT
1729 }
1730
252b5132
RH
1731 /* For some incomprehensible reason Oracle distributes
1732 libraries for Solaris in which some of the objects have
1733 bogus sh_link fields. It would be nice if we could just
1734 reject them, but, unfortunately, some people need to use
1735 them. We scan through the section headers; if we find only
1736 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1737 to it. I hope this doesn't break anything.
1738
1739 Don't do it on executable nor shared library. */
1740 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1741 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1742 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1743 {
9ad5cbcf 1744 unsigned int scan;
252b5132
RH
1745 int found;
1746
1747 found = 0;
9ad5cbcf 1748 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1749 {
1750 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1751 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1752 {
1753 if (found != 0)
1754 {
1755 found = 0;
1756 break;
1757 }
1758 found = scan;
1759 }
1760 }
1761 if (found != 0)
1762 hdr->sh_link = found;
1763 }
1764
1765 /* Get the symbol table. */
1b3a8575
AM
1766 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1767 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1768 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1769 return FALSE;
252b5132
RH
1770
1771 /* If this reloc section does not use the main symbol table we
1772 don't treat it as a reloc section. BFD can't adequately
1773 represent such a section, so at least for now, we don't
c044fabd 1774 try. We just present it as a normal section. We also
60bcf0fa 1775 can't use it as a reloc section if it points to the null
83b89087
L
1776 section, an invalid section, another reloc section, or its
1777 sh_link points to the null section. */
185ef66d 1778 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1779 || hdr->sh_link == SHN_UNDEF
185ef66d 1780 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1781 || hdr->sh_info >= num_sec
1782 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1783 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1784 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1785 shindex);
252b5132
RH
1786
1787 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1788 return FALSE;
252b5132
RH
1789 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1790 if (target_sect == NULL)
b34976b6 1791 return FALSE;
252b5132
RH
1792
1793 if ((target_sect->flags & SEC_RELOC) == 0
1794 || target_sect->reloc_count == 0)
1795 hdr2 = &elf_section_data (target_sect)->rel_hdr;
1796 else
1797 {
dc810e39 1798 bfd_size_type amt;
252b5132 1799 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 1800 amt = sizeof (*hdr2);
a50b1753 1801 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
14b1c01e
AM
1802 if (hdr2 == NULL)
1803 return FALSE;
252b5132
RH
1804 elf_section_data (target_sect)->rel_hdr2 = hdr2;
1805 }
1806 *hdr2 = *hdr;
1807 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1808 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1809 target_sect->flags |= SEC_RELOC;
1810 target_sect->relocation = NULL;
1811 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1812 /* In the section to which the relocations apply, mark whether
1813 its relocations are of the REL or RELA variety. */
72730e0c 1814 if (hdr->sh_size != 0)
68bfbfcc 1815 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 1816 abfd->flags |= HAS_RELOC;
b34976b6 1817 return TRUE;
252b5132 1818 }
252b5132
RH
1819
1820 case SHT_GNU_verdef:
1821 elf_dynverdef (abfd) = shindex;
1822 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1823 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1824
1825 case SHT_GNU_versym:
a50b2160
JJ
1826 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1827 return FALSE;
252b5132
RH
1828 elf_dynversym (abfd) = shindex;
1829 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1830 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1831
1832 case SHT_GNU_verneed:
1833 elf_dynverref (abfd) = shindex;
1834 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1835 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1836
1837 case SHT_SHLIB:
b34976b6 1838 return TRUE;
252b5132 1839
dbb410c3 1840 case SHT_GROUP:
1783205a 1841 if (! IS_VALID_GROUP_SECTION_HEADER (hdr))
a50b2160 1842 return FALSE;
6dc132d9 1843 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1844 return FALSE;
dbb410c3
AM
1845 if (hdr->contents != NULL)
1846 {
1847 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1848 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1849 asection *s;
1850
b885599b
AM
1851 if (idx->flags & GRP_COMDAT)
1852 hdr->bfd_section->flags
1853 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1854
45c5e9ed
L
1855 /* We try to keep the same section order as it comes in. */
1856 idx += n_elt;
dbb410c3 1857 while (--n_elt != 0)
1783205a
NC
1858 {
1859 --idx;
1860
1861 if (idx->shdr != NULL
1862 && (s = idx->shdr->bfd_section) != NULL
1863 && elf_next_in_group (s) != NULL)
1864 {
1865 elf_next_in_group (hdr->bfd_section) = s;
1866 break;
1867 }
1868 }
dbb410c3
AM
1869 }
1870 break;
1871
252b5132 1872 default:
104d59d1
JM
1873 /* Possibly an attributes section. */
1874 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1875 || hdr->sh_type == bed->obj_attrs_section_type)
1876 {
1877 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1878 return FALSE;
1879 _bfd_elf_parse_attributes (abfd, hdr);
1880 return TRUE;
1881 }
1882
252b5132 1883 /* Check for any processor-specific section types. */
3eb70a79
L
1884 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1885 return TRUE;
1886
1887 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1888 {
1889 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1890 /* FIXME: How to properly handle allocated section reserved
1891 for applications? */
1892 (*_bfd_error_handler)
1893 (_("%B: don't know how to handle allocated, application "
1894 "specific section `%s' [0x%8x]"),
1895 abfd, name, hdr->sh_type);
1896 else
1897 /* Allow sections reserved for applications. */
1898 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1899 shindex);
1900 }
1901 else if (hdr->sh_type >= SHT_LOPROC
1902 && hdr->sh_type <= SHT_HIPROC)
1903 /* FIXME: We should handle this section. */
1904 (*_bfd_error_handler)
1905 (_("%B: don't know how to handle processor specific section "
1906 "`%s' [0x%8x]"),
1907 abfd, name, hdr->sh_type);
1908 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1909 {
1910 /* Unrecognised OS-specific sections. */
1911 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1912 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1913 required to correctly process the section and the file should
ff15b240
NC
1914 be rejected with an error message. */
1915 (*_bfd_error_handler)
1916 (_("%B: don't know how to handle OS specific section "
1917 "`%s' [0x%8x]"),
1918 abfd, name, hdr->sh_type);
1919 else
1920 /* Otherwise it should be processed. */
1921 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1922 }
3eb70a79
L
1923 else
1924 /* FIXME: We should handle this section. */
1925 (*_bfd_error_handler)
1926 (_("%B: don't know how to handle section `%s' [0x%8x]"),
1927 abfd, name, hdr->sh_type);
1928
1929 return FALSE;
252b5132
RH
1930 }
1931
b34976b6 1932 return TRUE;
252b5132
RH
1933}
1934
87d72d41 1935/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 1936
87d72d41
AM
1937Elf_Internal_Sym *
1938bfd_sym_from_r_symndx (struct sym_cache *cache,
1939 bfd *abfd,
1940 unsigned long r_symndx)
ec338859 1941{
ec338859
AM
1942 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
1943
a5d1b3b5
AM
1944 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
1945 {
1946 Elf_Internal_Shdr *symtab_hdr;
1947 unsigned char esym[sizeof (Elf64_External_Sym)];
1948 Elf_External_Sym_Shndx eshndx;
ec338859 1949
a5d1b3b5
AM
1950 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1951 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 1952 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 1953 return NULL;
9ad5cbcf 1954
a5d1b3b5
AM
1955 if (cache->abfd != abfd)
1956 {
1957 memset (cache->indx, -1, sizeof (cache->indx));
1958 cache->abfd = abfd;
1959 }
1960 cache->indx[ent] = r_symndx;
ec338859 1961 }
a5d1b3b5 1962
87d72d41 1963 return &cache->sym[ent];
ec338859
AM
1964}
1965
252b5132
RH
1966/* Given an ELF section number, retrieve the corresponding BFD
1967 section. */
1968
1969asection *
91d6fa6a 1970bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 1971{
91d6fa6a 1972 if (sec_index >= elf_numsections (abfd))
252b5132 1973 return NULL;
91d6fa6a 1974 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
1975}
1976
b35d266b 1977static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 1978{
0112cd26
NC
1979 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1980 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1981};
1982
b35d266b 1983static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 1984{
0112cd26
NC
1985 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1986 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1987};
1988
b35d266b 1989static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 1990{
0112cd26
NC
1991 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1992 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1993 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
1994 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
1995 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
1996 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
1997 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
1998 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
1999 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2000 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2001 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2002};
2003
b35d266b 2004static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2005{
0112cd26
NC
2006 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2007 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2008 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2009};
2010
b35d266b 2011static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2012{
0112cd26
NC
2013 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2014 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2015 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2016 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2017 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2018 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2019 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2020 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2021 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2022};
2023
b35d266b 2024static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2025{
0112cd26
NC
2026 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2027 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2028};
2029
b35d266b 2030static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2031{
0112cd26
NC
2032 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2033 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2034 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2035 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2036};
2037
b35d266b 2038static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2039{
0112cd26
NC
2040 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2041 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2042};
2043
b35d266b 2044static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2045{
0112cd26
NC
2046 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2047 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2048 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2049};
2050
b35d266b 2051static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2052{
0112cd26
NC
2053 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2054 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2055 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2056};
2057
b35d266b 2058static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2059{
0112cd26
NC
2060 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2061 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2062 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2063 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2064 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2065};
2066
b35d266b 2067static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2068{
0112cd26
NC
2069 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2070 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2071 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2072 /* See struct bfd_elf_special_section declaration for the semantics of
2073 this special case where .prefix_length != strlen (.prefix). */
2074 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2075 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2076};
2077
b35d266b 2078static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2079{
0112cd26
NC
2080 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2081 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2082 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2083 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2084};
2085
1b315056
CS
2086static const struct bfd_elf_special_section special_sections_z[] =
2087{
2088 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2089 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2090 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2091 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2092 { NULL, 0, 0, 0, 0 }
2093};
2094
b35d266b 2095static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2096{
7f4d3958 2097 special_sections_b, /* 'b' */
98ece1b3 2098 special_sections_c, /* 'c' */
7f4d3958
L
2099 special_sections_d, /* 'd' */
2100 NULL, /* 'e' */
2101 special_sections_f, /* 'f' */
2102 special_sections_g, /* 'g' */
2103 special_sections_h, /* 'h' */
2104 special_sections_i, /* 'i' */
2105 NULL, /* 'j' */
2106 NULL, /* 'k' */
2107 special_sections_l, /* 'l' */
2108 NULL, /* 'm' */
2109 special_sections_n, /* 'n' */
2110 NULL, /* 'o' */
2111 special_sections_p, /* 'p' */
2112 NULL, /* 'q' */
2113 special_sections_r, /* 'r' */
2114 special_sections_s, /* 's' */
2115 special_sections_t, /* 't' */
1b315056
CS
2116 NULL, /* 'u' */
2117 NULL, /* 'v' */
2118 NULL, /* 'w' */
2119 NULL, /* 'x' */
2120 NULL, /* 'y' */
2121 special_sections_z /* 'z' */
7f4d3958
L
2122};
2123
551b43fd
AM
2124const struct bfd_elf_special_section *
2125_bfd_elf_get_special_section (const char *name,
2126 const struct bfd_elf_special_section *spec,
2127 unsigned int rela)
2f89ff8d
L
2128{
2129 int i;
7f4d3958 2130 int len;
7f4d3958 2131
551b43fd 2132 len = strlen (name);
7f4d3958 2133
551b43fd 2134 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2135 {
2136 int suffix_len;
551b43fd 2137 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2138
2139 if (len < prefix_len)
2140 continue;
551b43fd 2141 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2142 continue;
2143
551b43fd 2144 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2145 if (suffix_len <= 0)
2146 {
2147 if (name[prefix_len] != 0)
2148 {
2149 if (suffix_len == 0)
2150 continue;
2151 if (name[prefix_len] != '.'
2152 && (suffix_len == -2
551b43fd 2153 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2154 continue;
2155 }
2156 }
2157 else
2158 {
2159 if (len < prefix_len + suffix_len)
2160 continue;
2161 if (memcmp (name + len - suffix_len,
551b43fd 2162 spec[i].prefix + prefix_len,
7dcb9820
AM
2163 suffix_len) != 0)
2164 continue;
2165 }
551b43fd 2166 return &spec[i];
7dcb9820 2167 }
2f89ff8d
L
2168
2169 return NULL;
2170}
2171
7dcb9820 2172const struct bfd_elf_special_section *
29ef7005 2173_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2174{
551b43fd
AM
2175 int i;
2176 const struct bfd_elf_special_section *spec;
29ef7005 2177 const struct elf_backend_data *bed;
2f89ff8d
L
2178
2179 /* See if this is one of the special sections. */
551b43fd
AM
2180 if (sec->name == NULL)
2181 return NULL;
2f89ff8d 2182
29ef7005
L
2183 bed = get_elf_backend_data (abfd);
2184 spec = bed->special_sections;
2185 if (spec)
2186 {
2187 spec = _bfd_elf_get_special_section (sec->name,
2188 bed->special_sections,
2189 sec->use_rela_p);
2190 if (spec != NULL)
2191 return spec;
2192 }
2193
551b43fd
AM
2194 if (sec->name[0] != '.')
2195 return NULL;
2f89ff8d 2196
551b43fd 2197 i = sec->name[1] - 'b';
1b315056 2198 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2199 return NULL;
2200
2201 spec = special_sections[i];
2f89ff8d 2202
551b43fd
AM
2203 if (spec == NULL)
2204 return NULL;
2205
2206 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2207}
2208
b34976b6 2209bfd_boolean
217aa764 2210_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2211{
2212 struct bfd_elf_section_data *sdata;
551b43fd 2213 const struct elf_backend_data *bed;
7dcb9820 2214 const struct bfd_elf_special_section *ssect;
252b5132 2215
f0abc2a1
AM
2216 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2217 if (sdata == NULL)
2218 {
a50b1753
NC
2219 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2220 sizeof (*sdata));
f0abc2a1
AM
2221 if (sdata == NULL)
2222 return FALSE;
217aa764 2223 sec->used_by_bfd = sdata;
f0abc2a1 2224 }
bf572ba0 2225
551b43fd
AM
2226 /* Indicate whether or not this section should use RELA relocations. */
2227 bed = get_elf_backend_data (abfd);
2228 sec->use_rela_p = bed->default_use_rela_p;
2229
e843e0f8
L
2230 /* When we read a file, we don't need to set ELF section type and
2231 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2232 anyway. We will set ELF section type and flags for all linker
2233 created sections. If user specifies BFD section flags, we will
2234 set ELF section type and flags based on BFD section flags in
2235 elf_fake_sections. */
2236 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2237 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2238 {
551b43fd 2239 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2240 if (ssect != NULL)
2241 {
2242 elf_section_type (sec) = ssect->type;
2243 elf_section_flags (sec) = ssect->attr;
2244 }
2f89ff8d
L
2245 }
2246
f592407e 2247 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2248}
2249
2250/* Create a new bfd section from an ELF program header.
2251
2252 Since program segments have no names, we generate a synthetic name
2253 of the form segment<NUM>, where NUM is generally the index in the
2254 program header table. For segments that are split (see below) we
2255 generate the names segment<NUM>a and segment<NUM>b.
2256
2257 Note that some program segments may have a file size that is different than
2258 (less than) the memory size. All this means is that at execution the
2259 system must allocate the amount of memory specified by the memory size,
2260 but only initialize it with the first "file size" bytes read from the
2261 file. This would occur for example, with program segments consisting
2262 of combined data+bss.
2263
2264 To handle the above situation, this routine generates TWO bfd sections
2265 for the single program segment. The first has the length specified by
2266 the file size of the segment, and the second has the length specified
2267 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2268 into its initialized and uninitialized parts.
252b5132
RH
2269
2270 */
2271
b34976b6 2272bfd_boolean
217aa764
AM
2273_bfd_elf_make_section_from_phdr (bfd *abfd,
2274 Elf_Internal_Phdr *hdr,
91d6fa6a 2275 int hdr_index,
a50b1753 2276 const char *type_name)
252b5132
RH
2277{
2278 asection *newsect;
2279 char *name;
2280 char namebuf[64];
d4c88bbb 2281 size_t len;
252b5132
RH
2282 int split;
2283
2284 split = ((hdr->p_memsz > 0)
2285 && (hdr->p_filesz > 0)
2286 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2287
2288 if (hdr->p_filesz > 0)
252b5132 2289 {
91d6fa6a 2290 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2291 len = strlen (namebuf) + 1;
a50b1753 2292 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2293 if (!name)
2294 return FALSE;
2295 memcpy (name, namebuf, len);
2296 newsect = bfd_make_section (abfd, name);
2297 if (newsect == NULL)
2298 return FALSE;
2299 newsect->vma = hdr->p_vaddr;
2300 newsect->lma = hdr->p_paddr;
2301 newsect->size = hdr->p_filesz;
2302 newsect->filepos = hdr->p_offset;
2303 newsect->flags |= SEC_HAS_CONTENTS;
2304 newsect->alignment_power = bfd_log2 (hdr->p_align);
2305 if (hdr->p_type == PT_LOAD)
252b5132 2306 {
d5191d0c
AM
2307 newsect->flags |= SEC_ALLOC;
2308 newsect->flags |= SEC_LOAD;
2309 if (hdr->p_flags & PF_X)
2310 {
2311 /* FIXME: all we known is that it has execute PERMISSION,
2312 may be data. */
2313 newsect->flags |= SEC_CODE;
2314 }
2315 }
2316 if (!(hdr->p_flags & PF_W))
2317 {
2318 newsect->flags |= SEC_READONLY;
252b5132 2319 }
252b5132
RH
2320 }
2321
d5191d0c 2322 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2323 {
d5191d0c
AM
2324 bfd_vma align;
2325
91d6fa6a 2326 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2327 len = strlen (namebuf) + 1;
a50b1753 2328 name = (char *) bfd_alloc (abfd, len);
252b5132 2329 if (!name)
b34976b6 2330 return FALSE;
d4c88bbb 2331 memcpy (name, namebuf, len);
252b5132
RH
2332 newsect = bfd_make_section (abfd, name);
2333 if (newsect == NULL)
b34976b6 2334 return FALSE;
252b5132
RH
2335 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2336 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2337 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2338 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2339 align = newsect->vma & -newsect->vma;
2340 if (align == 0 || align > hdr->p_align)
2341 align = hdr->p_align;
2342 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2343 if (hdr->p_type == PT_LOAD)
2344 {
d5191d0c
AM
2345 /* Hack for gdb. Segments that have not been modified do
2346 not have their contents written to a core file, on the
2347 assumption that a debugger can find the contents in the
2348 executable. We flag this case by setting the fake
2349 section size to zero. Note that "real" bss sections will
2350 always have their contents dumped to the core file. */
2351 if (bfd_get_format (abfd) == bfd_core)
2352 newsect->size = 0;
252b5132
RH
2353 newsect->flags |= SEC_ALLOC;
2354 if (hdr->p_flags & PF_X)
2355 newsect->flags |= SEC_CODE;
2356 }
2357 if (!(hdr->p_flags & PF_W))
2358 newsect->flags |= SEC_READONLY;
2359 }
2360
b34976b6 2361 return TRUE;
252b5132
RH
2362}
2363
b34976b6 2364bfd_boolean
91d6fa6a 2365bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2366{
9c5bfbb7 2367 const struct elf_backend_data *bed;
20cfcaae
NC
2368
2369 switch (hdr->p_type)
2370 {
2371 case PT_NULL:
91d6fa6a 2372 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2373
2374 case PT_LOAD:
91d6fa6a 2375 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2376
2377 case PT_DYNAMIC:
91d6fa6a 2378 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2379
2380 case PT_INTERP:
91d6fa6a 2381 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2382
2383 case PT_NOTE:
91d6fa6a 2384 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2385 return FALSE;
718175fa 2386 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2387 return FALSE;
2388 return TRUE;
20cfcaae
NC
2389
2390 case PT_SHLIB:
91d6fa6a 2391 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2392
2393 case PT_PHDR:
91d6fa6a 2394 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2395
811072d8 2396 case PT_GNU_EH_FRAME:
91d6fa6a 2397 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2398 "eh_frame_hdr");
2399
2b05f1b7 2400 case PT_GNU_STACK:
91d6fa6a 2401 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2402
8c37241b 2403 case PT_GNU_RELRO:
91d6fa6a 2404 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2405
20cfcaae 2406 default:
8c1acd09 2407 /* Check for any processor-specific program segment types. */
20cfcaae 2408 bed = get_elf_backend_data (abfd);
91d6fa6a 2409 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2410 }
2411}
2412
23bc299b 2413/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2414 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2415 relocations; otherwise, we use REL relocations. */
2416
b34976b6 2417bfd_boolean
217aa764
AM
2418_bfd_elf_init_reloc_shdr (bfd *abfd,
2419 Elf_Internal_Shdr *rel_hdr,
2420 asection *asect,
2421 bfd_boolean use_rela_p)
23bc299b
MM
2422{
2423 char *name;
9c5bfbb7 2424 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2425 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2426
a50b1753 2427 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2428 if (name == NULL)
b34976b6 2429 return FALSE;
23bc299b
MM
2430 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2431 rel_hdr->sh_name =
2b0f7ef9 2432 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2433 FALSE);
23bc299b 2434 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2435 return FALSE;
23bc299b
MM
2436 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2437 rel_hdr->sh_entsize = (use_rela_p
2438 ? bed->s->sizeof_rela
2439 : bed->s->sizeof_rel);
72de5009 2440 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2441 rel_hdr->sh_flags = 0;
2442 rel_hdr->sh_addr = 0;
2443 rel_hdr->sh_size = 0;
2444 rel_hdr->sh_offset = 0;
2445
b34976b6 2446 return TRUE;
23bc299b
MM
2447}
2448
94be91de
JB
2449/* Return the default section type based on the passed in section flags. */
2450
2451int
2452bfd_elf_get_default_section_type (flagword flags)
2453{
2454 if ((flags & SEC_ALLOC) != 0
2e76e85a 2455 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
2456 return SHT_NOBITS;
2457 return SHT_PROGBITS;
2458}
2459
252b5132
RH
2460/* Set up an ELF internal section header for a section. */
2461
252b5132 2462static void
217aa764 2463elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2464{
9c5bfbb7 2465 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
a50b1753 2466 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
252b5132 2467 Elf_Internal_Shdr *this_hdr;
0414f35b 2468 unsigned int sh_type;
252b5132
RH
2469
2470 if (*failedptr)
2471 {
2472 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2473 loop. */
252b5132
RH
2474 return;
2475 }
2476
2477 this_hdr = &elf_section_data (asect)->this_hdr;
2478
e57b5356
AM
2479 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2480 asect->name, FALSE);
2481 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2482 {
b34976b6 2483 *failedptr = TRUE;
252b5132
RH
2484 return;
2485 }
2486
a4d8e49b 2487 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2488
2489 if ((asect->flags & SEC_ALLOC) != 0
2490 || asect->user_set_vma)
2491 this_hdr->sh_addr = asect->vma;
2492 else
2493 this_hdr->sh_addr = 0;
2494
2495 this_hdr->sh_offset = 0;
eea6121a 2496 this_hdr->sh_size = asect->size;
252b5132 2497 this_hdr->sh_link = 0;
72de5009 2498 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2499 /* The sh_entsize and sh_info fields may have been set already by
2500 copy_private_section_data. */
2501
2502 this_hdr->bfd_section = asect;
2503 this_hdr->contents = NULL;
2504
3cddba1e
L
2505 /* If the section type is unspecified, we set it based on
2506 asect->flags. */
98ece1b3
AM
2507 if ((asect->flags & SEC_GROUP) != 0)
2508 sh_type = SHT_GROUP;
98ece1b3 2509 else
94be91de 2510 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2511
3cddba1e 2512 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2513 this_hdr->sh_type = sh_type;
2514 else if (this_hdr->sh_type == SHT_NOBITS
2515 && sh_type == SHT_PROGBITS
2516 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2517 {
98ece1b3
AM
2518 /* Warn if we are changing a NOBITS section to PROGBITS, but
2519 allow the link to proceed. This can happen when users link
2520 non-bss input sections to bss output sections, or emit data
2521 to a bss output section via a linker script. */
2522 (*_bfd_error_handler)
58f0869b 2523 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2524 this_hdr->sh_type = sh_type;
3cddba1e
L
2525 }
2526
2f89ff8d 2527 switch (this_hdr->sh_type)
252b5132 2528 {
2f89ff8d 2529 default:
2f89ff8d
L
2530 break;
2531
2532 case SHT_STRTAB:
2533 case SHT_INIT_ARRAY:
2534 case SHT_FINI_ARRAY:
2535 case SHT_PREINIT_ARRAY:
2536 case SHT_NOTE:
2537 case SHT_NOBITS:
2538 case SHT_PROGBITS:
2539 break;
2540
2541 case SHT_HASH:
c7ac6ff8 2542 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2543 break;
5de3bf90 2544
2f89ff8d 2545 case SHT_DYNSYM:
252b5132 2546 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2547 break;
2548
2549 case SHT_DYNAMIC:
252b5132 2550 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2551 break;
2552
2553 case SHT_RELA:
2554 if (get_elf_backend_data (abfd)->may_use_rela_p)
2555 this_hdr->sh_entsize = bed->s->sizeof_rela;
2556 break;
2557
2558 case SHT_REL:
2559 if (get_elf_backend_data (abfd)->may_use_rel_p)
2560 this_hdr->sh_entsize = bed->s->sizeof_rel;
2561 break;
2562
2563 case SHT_GNU_versym:
252b5132 2564 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2565 break;
2566
2567 case SHT_GNU_verdef:
252b5132
RH
2568 this_hdr->sh_entsize = 0;
2569 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2570 cverdefs. The linker will set cverdefs, but sh_info will be
2571 zero. */
252b5132
RH
2572 if (this_hdr->sh_info == 0)
2573 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2574 else
2575 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2576 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2577 break;
2578
2579 case SHT_GNU_verneed:
252b5132
RH
2580 this_hdr->sh_entsize = 0;
2581 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2582 cverrefs. The linker will set cverrefs, but sh_info will be
2583 zero. */
252b5132
RH
2584 if (this_hdr->sh_info == 0)
2585 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2586 else
2587 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2588 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2589 break;
2590
2591 case SHT_GROUP:
1783205a 2592 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2593 break;
fdc90cb4
JJ
2594
2595 case SHT_GNU_HASH:
2596 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2597 break;
dbb410c3 2598 }
252b5132
RH
2599
2600 if ((asect->flags & SEC_ALLOC) != 0)
2601 this_hdr->sh_flags |= SHF_ALLOC;
2602 if ((asect->flags & SEC_READONLY) == 0)
2603 this_hdr->sh_flags |= SHF_WRITE;
2604 if ((asect->flags & SEC_CODE) != 0)
2605 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2606 if ((asect->flags & SEC_MERGE) != 0)
2607 {
2608 this_hdr->sh_flags |= SHF_MERGE;
2609 this_hdr->sh_entsize = asect->entsize;
2610 if ((asect->flags & SEC_STRINGS) != 0)
2611 this_hdr->sh_flags |= SHF_STRINGS;
2612 }
1126897b 2613 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2614 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2615 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2616 {
2617 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2618 if (asect->size == 0
2619 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2620 {
3a800eb9 2621 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2622
704afa60 2623 this_hdr->sh_size = 0;
3a800eb9
AM
2624 if (o != NULL)
2625 {
704afa60 2626 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2627 if (this_hdr->sh_size != 0)
2628 this_hdr->sh_type = SHT_NOBITS;
2629 }
704afa60
JJ
2630 }
2631 }
18ae9cc1
L
2632 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
2633 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132
RH
2634
2635 /* Check for processor-specific section types. */
0414f35b 2636 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2637 if (bed->elf_backend_fake_sections
2638 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2639 *failedptr = TRUE;
252b5132 2640
42bb2e33 2641 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2642 {
2643 /* Don't change the header type from NOBITS if we are being
42bb2e33 2644 called for objcopy --only-keep-debug. */
0414f35b
AM
2645 this_hdr->sh_type = sh_type;
2646 }
2647
252b5132 2648 /* If the section has relocs, set up a section header for the
23bc299b
MM
2649 SHT_REL[A] section. If two relocation sections are required for
2650 this section, it is up to the processor-specific back-end to
c044fabd 2651 create the other. */
23bc299b 2652 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2653 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2654 &elf_section_data (asect)->rel_hdr,
c044fabd 2655 asect,
68bfbfcc 2656 asect->use_rela_p))
b34976b6 2657 *failedptr = TRUE;
252b5132
RH
2658}
2659
bcacc0f5
AM
2660/* Fill in the contents of a SHT_GROUP section. Called from
2661 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2662 when ELF targets use the generic linker, ld. Called for ld -r
2663 from bfd_elf_final_link. */
dbb410c3 2664
1126897b 2665void
217aa764 2666bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2667{
a50b1753 2668 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2669 asection *elt, *first;
dbb410c3 2670 unsigned char *loc;
b34976b6 2671 bfd_boolean gas;
dbb410c3 2672
7e4111ad
L
2673 /* Ignore linker created group section. See elfNN_ia64_object_p in
2674 elfxx-ia64.c. */
2675 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2676 || *failedptr)
2677 return;
2678
bcacc0f5
AM
2679 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2680 {
2681 unsigned long symindx = 0;
2682
2683 /* elf_group_id will have been set up by objcopy and the
2684 generic linker. */
2685 if (elf_group_id (sec) != NULL)
2686 symindx = elf_group_id (sec)->udata.i;
1126897b 2687
bcacc0f5
AM
2688 if (symindx == 0)
2689 {
2690 /* If called from the assembler, swap_out_syms will have set up
2691 elf_section_syms. */
2692 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2693 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2694 }
2695 elf_section_data (sec)->this_hdr.sh_info = symindx;
2696 }
2697 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2698 {
bcacc0f5
AM
2699 /* The ELF backend linker sets sh_info to -2 when the group
2700 signature symbol is global, and thus the index can't be
2701 set until all local symbols are output. */
2702 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2703 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2704 unsigned long symndx = sec_data->this_hdr.sh_info;
2705 unsigned long extsymoff = 0;
2706 struct elf_link_hash_entry *h;
2707
2708 if (!elf_bad_symtab (igroup->owner))
2709 {
2710 Elf_Internal_Shdr *symtab_hdr;
2711
2712 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2713 extsymoff = symtab_hdr->sh_info;
2714 }
2715 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2716 while (h->root.type == bfd_link_hash_indirect
2717 || h->root.type == bfd_link_hash_warning)
2718 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2719
2720 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2721 }
dbb410c3 2722
1126897b 2723 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2724 gas = TRUE;
dbb410c3
AM
2725 if (sec->contents == NULL)
2726 {
b34976b6 2727 gas = FALSE;
a50b1753 2728 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
2729
2730 /* Arrange for the section to be written out. */
2731 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2732 if (sec->contents == NULL)
2733 {
b34976b6 2734 *failedptr = TRUE;
dbb410c3
AM
2735 return;
2736 }
2737 }
2738
eea6121a 2739 loc = sec->contents + sec->size;
dbb410c3 2740
9dce4196
AM
2741 /* Get the pointer to the first section in the group that gas
2742 squirreled away here. objcopy arranges for this to be set to the
2743 start of the input section group. */
2744 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2745
2746 /* First element is a flag word. Rest of section is elf section
2747 indices for all the sections of the group. Write them backwards
2748 just to keep the group in the same order as given in .section
2749 directives, not that it matters. */
2750 while (elt != NULL)
2751 {
9dce4196 2752 asection *s;
9dce4196 2753
9dce4196 2754 s = elt;
415f38a6
AM
2755 if (!gas)
2756 s = s->output_section;
2757 if (s != NULL
2758 && !bfd_is_abs_section (s))
01e1a5bc 2759 {
415f38a6
AM
2760 unsigned int idx = elf_section_data (s)->this_idx;
2761
01e1a5bc 2762 loc -= 4;
01e1a5bc
NC
2763 H_PUT_32 (abfd, idx, loc);
2764 }
945906ff 2765 elt = elf_next_in_group (elt);
9dce4196
AM
2766 if (elt == first)
2767 break;
dbb410c3
AM
2768 }
2769
3d7f7666 2770 if ((loc -= 4) != sec->contents)
9dce4196 2771 abort ();
dbb410c3 2772
9dce4196 2773 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2774}
2775
252b5132
RH
2776/* Assign all ELF section numbers. The dummy first section is handled here
2777 too. The link/info pointers for the standard section types are filled
2778 in here too, while we're at it. */
2779
b34976b6 2780static bfd_boolean
da9f89d4 2781assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2782{
2783 struct elf_obj_tdata *t = elf_tdata (abfd);
2784 asection *sec;
2b0f7ef9 2785 unsigned int section_number, secn;
252b5132 2786 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2787 struct bfd_elf_section_data *d;
3516e984 2788 bfd_boolean need_symtab;
252b5132
RH
2789
2790 section_number = 1;
2791
2b0f7ef9
JJ
2792 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2793
da9f89d4
L
2794 /* SHT_GROUP sections are in relocatable files only. */
2795 if (link_info == NULL || link_info->relocatable)
252b5132 2796 {
da9f89d4 2797 /* Put SHT_GROUP sections first. */
04dd1667 2798 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2799 {
5daa8fe7 2800 d = elf_section_data (sec);
da9f89d4
L
2801
2802 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2803 {
5daa8fe7 2804 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2805 {
2806 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2807 bfd_section_list_remove (abfd, sec);
da9f89d4 2808 abfd->section_count--;
da9f89d4 2809 }
08a40648 2810 else
4fbb74a6 2811 d->this_idx = section_number++;
da9f89d4 2812 }
47cc2cf5
PB
2813 }
2814 }
2815
2816 for (sec = abfd->sections; sec; sec = sec->next)
2817 {
2818 d = elf_section_data (sec);
2819
2820 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2821 d->this_idx = section_number++;
2b0f7ef9 2822 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2823 if ((sec->flags & SEC_RELOC) == 0)
2824 d->rel_idx = 0;
2825 else
2b0f7ef9
JJ
2826 {
2827 d->rel_idx = section_number++;
2828 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2829 }
23bc299b
MM
2830
2831 if (d->rel_hdr2)
2b0f7ef9
JJ
2832 {
2833 d->rel_idx2 = section_number++;
2834 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2835 }
23bc299b
MM
2836 else
2837 d->rel_idx2 = 0;
252b5132
RH
2838 }
2839
2840 t->shstrtab_section = section_number++;
2b0f7ef9 2841 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2842 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132 2843
3516e984
L
2844 need_symtab = (bfd_get_symcount (abfd) > 0
2845 || (link_info == NULL
2846 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2847 == HAS_RELOC)));
2848 if (need_symtab)
252b5132
RH
2849 {
2850 t->symtab_section = section_number++;
2b0f7ef9 2851 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 2852 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 2853 {
9ad5cbcf
AM
2854 t->symtab_shndx_section = section_number++;
2855 t->symtab_shndx_hdr.sh_name
2856 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2857 ".symtab_shndx", FALSE);
9ad5cbcf 2858 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2859 return FALSE;
9ad5cbcf 2860 }
252b5132 2861 t->strtab_section = section_number++;
2b0f7ef9 2862 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2863 }
2864
2b0f7ef9
JJ
2865 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2866 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2867
2868 elf_numsections (abfd) = section_number;
252b5132
RH
2869 elf_elfheader (abfd)->e_shnum = section_number;
2870
2871 /* Set up the list of section header pointers, in agreement with the
2872 indices. */
a50b1753
NC
2873 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
2874 sizeof (Elf_Internal_Shdr *));
252b5132 2875 if (i_shdrp == NULL)
b34976b6 2876 return FALSE;
252b5132 2877
a50b1753
NC
2878 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
2879 sizeof (Elf_Internal_Shdr));
252b5132
RH
2880 if (i_shdrp[0] == NULL)
2881 {
2882 bfd_release (abfd, i_shdrp);
b34976b6 2883 return FALSE;
252b5132 2884 }
252b5132
RH
2885
2886 elf_elfsections (abfd) = i_shdrp;
2887
2888 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3516e984 2889 if (need_symtab)
252b5132
RH
2890 {
2891 i_shdrp[t->symtab_section] = &t->symtab_hdr;
4fbb74a6 2892 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf
AM
2893 {
2894 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2895 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2896 }
252b5132
RH
2897 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2898 t->symtab_hdr.sh_link = t->strtab_section;
2899 }
38ce5b11 2900
252b5132
RH
2901 for (sec = abfd->sections; sec; sec = sec->next)
2902 {
252b5132
RH
2903 asection *s;
2904 const char *name;
2905
91d6fa6a
NC
2906 d = elf_section_data (sec);
2907
252b5132
RH
2908 i_shdrp[d->this_idx] = &d->this_hdr;
2909 if (d->rel_idx != 0)
2910 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
2911 if (d->rel_idx2 != 0)
2912 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
2913
2914 /* Fill in the sh_link and sh_info fields while we're at it. */
2915
2916 /* sh_link of a reloc section is the section index of the symbol
2917 table. sh_info is the section index of the section to which
2918 the relocation entries apply. */
2919 if (d->rel_idx != 0)
2920 {
2921 d->rel_hdr.sh_link = t->symtab_section;
2922 d->rel_hdr.sh_info = d->this_idx;
2923 }
23bc299b
MM
2924 if (d->rel_idx2 != 0)
2925 {
2926 d->rel_hdr2->sh_link = t->symtab_section;
2927 d->rel_hdr2->sh_info = d->this_idx;
2928 }
252b5132 2929
38ce5b11
L
2930 /* We need to set up sh_link for SHF_LINK_ORDER. */
2931 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
2932 {
2933 s = elf_linked_to_section (sec);
2934 if (s)
38ce5b11 2935 {
f2876037 2936 /* elf_linked_to_section points to the input section. */
ccd2ec6a 2937 if (link_info != NULL)
38ce5b11 2938 {
f2876037 2939 /* Check discarded linkonce section. */
ccd2ec6a 2940 if (elf_discarded_section (s))
38ce5b11 2941 {
ccd2ec6a
L
2942 asection *kept;
2943 (*_bfd_error_handler)
2944 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
2945 abfd, d->this_hdr.bfd_section,
2946 s, s->owner);
2947 /* Point to the kept section if it has the same
2948 size as the discarded one. */
c0f00686 2949 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 2950 if (kept == NULL)
185d09ad 2951 {
ccd2ec6a
L
2952 bfd_set_error (bfd_error_bad_value);
2953 return FALSE;
185d09ad 2954 }
ccd2ec6a 2955 s = kept;
38ce5b11 2956 }
e424ecc8 2957
ccd2ec6a
L
2958 s = s->output_section;
2959 BFD_ASSERT (s != NULL);
38ce5b11 2960 }
f2876037
L
2961 else
2962 {
2963 /* Handle objcopy. */
2964 if (s->output_section == NULL)
2965 {
2966 (*_bfd_error_handler)
2967 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
2968 abfd, d->this_hdr.bfd_section, s, s->owner);
2969 bfd_set_error (bfd_error_bad_value);
2970 return FALSE;
2971 }
2972 s = s->output_section;
2973 }
ccd2ec6a
L
2974 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2975 }
2976 else
2977 {
2978 /* PR 290:
2979 The Intel C compiler generates SHT_IA_64_UNWIND with
2980 SHF_LINK_ORDER. But it doesn't set the sh_link or
2981 sh_info fields. Hence we could get the situation
08a40648 2982 where s is NULL. */
ccd2ec6a
L
2983 const struct elf_backend_data *bed
2984 = get_elf_backend_data (abfd);
2985 if (bed->link_order_error_handler)
2986 bed->link_order_error_handler
2987 (_("%B: warning: sh_link not set for section `%A'"),
2988 abfd, sec);
38ce5b11
L
2989 }
2990 }
2991
252b5132
RH
2992 switch (d->this_hdr.sh_type)
2993 {
2994 case SHT_REL:
2995 case SHT_RELA:
2996 /* A reloc section which we are treating as a normal BFD
2997 section. sh_link is the section index of the symbol
2998 table. sh_info is the section index of the section to
2999 which the relocation entries apply. We assume that an
3000 allocated reloc section uses the dynamic symbol table.
3001 FIXME: How can we be sure? */
3002 s = bfd_get_section_by_name (abfd, ".dynsym");
3003 if (s != NULL)
3004 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3005
3006 /* We look up the section the relocs apply to by name. */
3007 name = sec->name;
3008 if (d->this_hdr.sh_type == SHT_REL)
3009 name += 4;
3010 else
3011 name += 5;
3012 s = bfd_get_section_by_name (abfd, name);
3013 if (s != NULL)
3014 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3015 break;
3016
3017 case SHT_STRTAB:
3018 /* We assume that a section named .stab*str is a stabs
3019 string section. We look for a section with the same name
3020 but without the trailing ``str'', and set its sh_link
3021 field to point to this section. */
0112cd26 3022 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3023 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3024 {
3025 size_t len;
3026 char *alc;
3027
3028 len = strlen (sec->name);
a50b1753 3029 alc = (char *) bfd_malloc (len - 2);
252b5132 3030 if (alc == NULL)
b34976b6 3031 return FALSE;
d4c88bbb 3032 memcpy (alc, sec->name, len - 3);
252b5132
RH
3033 alc[len - 3] = '\0';
3034 s = bfd_get_section_by_name (abfd, alc);
3035 free (alc);
3036 if (s != NULL)
3037 {
3038 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3039
3040 /* This is a .stab section. */
0594c12d
AM
3041 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3042 elf_section_data (s)->this_hdr.sh_entsize
3043 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3044 }
3045 }
3046 break;
3047
3048 case SHT_DYNAMIC:
3049 case SHT_DYNSYM:
3050 case SHT_GNU_verneed:
3051 case SHT_GNU_verdef:
3052 /* sh_link is the section header index of the string table
3053 used for the dynamic entries, or the symbol table, or the
3054 version strings. */
3055 s = bfd_get_section_by_name (abfd, ".dynstr");
3056 if (s != NULL)
3057 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3058 break;
3059
7f1204bb
JJ
3060 case SHT_GNU_LIBLIST:
3061 /* sh_link is the section header index of the prelink library
08a40648
AM
3062 list used for the dynamic entries, or the symbol table, or
3063 the version strings. */
7f1204bb
JJ
3064 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3065 ? ".dynstr" : ".gnu.libstr");
3066 if (s != NULL)
3067 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3068 break;
3069
252b5132 3070 case SHT_HASH:
fdc90cb4 3071 case SHT_GNU_HASH:
252b5132
RH
3072 case SHT_GNU_versym:
3073 /* sh_link is the section header index of the symbol table
3074 this hash table or version table is for. */
3075 s = bfd_get_section_by_name (abfd, ".dynsym");
3076 if (s != NULL)
3077 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3078 break;
dbb410c3
AM
3079
3080 case SHT_GROUP:
3081 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3082 }
3083 }
3084
2b0f7ef9 3085 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3086 if (i_shdrp[secn] == NULL)
3087 i_shdrp[secn] = i_shdrp[0];
3088 else
3089 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3090 i_shdrp[secn]->sh_name);
b34976b6 3091 return TRUE;
252b5132
RH
3092}
3093
3094/* Map symbol from it's internal number to the external number, moving
3095 all local symbols to be at the head of the list. */
3096
5372391b 3097static bfd_boolean
217aa764 3098sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3099{
3100 /* If the backend has a special mapping, use it. */
9c5bfbb7 3101 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3102 if (bed->elf_backend_sym_is_global)
3103 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3104
e47bf690 3105 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3106 || bfd_is_und_section (bfd_get_section (sym))
3107 || bfd_is_com_section (bfd_get_section (sym)));
3108}
3109
5372391b 3110/* Don't output section symbols for sections that are not going to be
0f0a5e58 3111 output. */
5372391b
AM
3112
3113static bfd_boolean
3114ignore_section_sym (bfd *abfd, asymbol *sym)
3115{
3116 return ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58
AM
3117 && !(sym->section->owner == abfd
3118 || (sym->section->output_section->owner == abfd
3119 && sym->section->output_offset == 0)));
5372391b
AM
3120}
3121
b34976b6 3122static bfd_boolean
217aa764 3123elf_map_symbols (bfd *abfd)
252b5132 3124{
dc810e39 3125 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3126 asymbol **syms = bfd_get_outsymbols (abfd);
3127 asymbol **sect_syms;
dc810e39
AM
3128 unsigned int num_locals = 0;
3129 unsigned int num_globals = 0;
3130 unsigned int num_locals2 = 0;
3131 unsigned int num_globals2 = 0;
252b5132 3132 int max_index = 0;
dc810e39 3133 unsigned int idx;
252b5132
RH
3134 asection *asect;
3135 asymbol **new_syms;
252b5132
RH
3136
3137#ifdef DEBUG
3138 fprintf (stderr, "elf_map_symbols\n");
3139 fflush (stderr);
3140#endif
3141
252b5132
RH
3142 for (asect = abfd->sections; asect; asect = asect->next)
3143 {
3144 if (max_index < asect->index)
3145 max_index = asect->index;
3146 }
3147
3148 max_index++;
a50b1753 3149 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3150 if (sect_syms == NULL)
b34976b6 3151 return FALSE;
252b5132 3152 elf_section_syms (abfd) = sect_syms;
4e89ac30 3153 elf_num_section_syms (abfd) = max_index;
252b5132 3154
079e9a2f
AM
3155 /* Init sect_syms entries for any section symbols we have already
3156 decided to output. */
252b5132
RH
3157 for (idx = 0; idx < symcount; idx++)
3158 {
dc810e39 3159 asymbol *sym = syms[idx];
c044fabd 3160
252b5132 3161 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3162 && sym->value == 0
5372391b 3163 && !ignore_section_sym (abfd, sym))
252b5132 3164 {
5372391b 3165 asection *sec = sym->section;
252b5132 3166
5372391b
AM
3167 if (sec->owner != abfd)
3168 sec = sec->output_section;
252b5132 3169
5372391b 3170 sect_syms[sec->index] = syms[idx];
252b5132
RH
3171 }
3172 }
3173
252b5132
RH
3174 /* Classify all of the symbols. */
3175 for (idx = 0; idx < symcount; idx++)
3176 {
5372391b
AM
3177 if (ignore_section_sym (abfd, syms[idx]))
3178 continue;
252b5132
RH
3179 if (!sym_is_global (abfd, syms[idx]))
3180 num_locals++;
3181 else
3182 num_globals++;
3183 }
079e9a2f 3184
5372391b 3185 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3186 sections will already have a section symbol in outsymbols, but
3187 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3188 at least in that case. */
252b5132
RH
3189 for (asect = abfd->sections; asect; asect = asect->next)
3190 {
079e9a2f 3191 if (sect_syms[asect->index] == NULL)
252b5132 3192 {
079e9a2f 3193 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3194 num_locals++;
3195 else
3196 num_globals++;
252b5132
RH
3197 }
3198 }
3199
3200 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3201 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3202 sizeof (asymbol *));
dc810e39 3203
252b5132 3204 if (new_syms == NULL)
b34976b6 3205 return FALSE;
252b5132
RH
3206
3207 for (idx = 0; idx < symcount; idx++)
3208 {
3209 asymbol *sym = syms[idx];
dc810e39 3210 unsigned int i;
252b5132 3211
5372391b
AM
3212 if (ignore_section_sym (abfd, sym))
3213 continue;
252b5132
RH
3214 if (!sym_is_global (abfd, sym))
3215 i = num_locals2++;
3216 else
3217 i = num_locals + num_globals2++;
3218 new_syms[i] = sym;
3219 sym->udata.i = i + 1;
3220 }
3221 for (asect = abfd->sections; asect; asect = asect->next)
3222 {
079e9a2f 3223 if (sect_syms[asect->index] == NULL)
252b5132 3224 {
079e9a2f 3225 asymbol *sym = asect->symbol;
dc810e39 3226 unsigned int i;
252b5132 3227
079e9a2f 3228 sect_syms[asect->index] = sym;
252b5132
RH
3229 if (!sym_is_global (abfd, sym))
3230 i = num_locals2++;
3231 else
3232 i = num_locals + num_globals2++;
3233 new_syms[i] = sym;
3234 sym->udata.i = i + 1;
3235 }
3236 }
3237
3238 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3239
3240 elf_num_locals (abfd) = num_locals;
3241 elf_num_globals (abfd) = num_globals;
b34976b6 3242 return TRUE;
252b5132
RH
3243}
3244
3245/* Align to the maximum file alignment that could be required for any
3246 ELF data structure. */
3247
268b6b39 3248static inline file_ptr
217aa764 3249align_file_position (file_ptr off, int align)
252b5132
RH
3250{
3251 return (off + align - 1) & ~(align - 1);
3252}
3253
3254/* Assign a file position to a section, optionally aligning to the
3255 required section alignment. */
3256
217aa764
AM
3257file_ptr
3258_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3259 file_ptr offset,
3260 bfd_boolean align)
252b5132 3261{
72de5009
AM
3262 if (align && i_shdrp->sh_addralign > 1)
3263 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3264 i_shdrp->sh_offset = offset;
3265 if (i_shdrp->bfd_section != NULL)
3266 i_shdrp->bfd_section->filepos = offset;
3267 if (i_shdrp->sh_type != SHT_NOBITS)
3268 offset += i_shdrp->sh_size;
3269 return offset;
3270}
3271
3272/* Compute the file positions we are going to put the sections at, and
3273 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3274 is not NULL, this is being called by the ELF backend linker. */
3275
b34976b6 3276bfd_boolean
217aa764
AM
3277_bfd_elf_compute_section_file_positions (bfd *abfd,
3278 struct bfd_link_info *link_info)
252b5132 3279{
9c5bfbb7 3280 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3281 bfd_boolean failed;
4b6c0f2f 3282 struct bfd_strtab_hash *strtab = NULL;
252b5132 3283 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3284 bfd_boolean need_symtab;
252b5132
RH
3285
3286 if (abfd->output_has_begun)
b34976b6 3287 return TRUE;
252b5132
RH
3288
3289 /* Do any elf backend specific processing first. */
3290 if (bed->elf_backend_begin_write_processing)
3291 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3292
3293 if (! prep_headers (abfd))
b34976b6 3294 return FALSE;
252b5132 3295
e6c51ed4
NC
3296 /* Post process the headers if necessary. */
3297 if (bed->elf_backend_post_process_headers)
3298 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3299
b34976b6 3300 failed = FALSE;
252b5132
RH
3301 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3302 if (failed)
b34976b6 3303 return FALSE;
252b5132 3304
da9f89d4 3305 if (!assign_section_numbers (abfd, link_info))
b34976b6 3306 return FALSE;
252b5132
RH
3307
3308 /* The backend linker builds symbol table information itself. */
3516e984
L
3309 need_symtab = (link_info == NULL
3310 && (bfd_get_symcount (abfd) > 0
3311 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3312 == HAS_RELOC)));
3313 if (need_symtab)
252b5132
RH
3314 {
3315 /* Non-zero if doing a relocatable link. */
3316 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3317
3318 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3319 return FALSE;
252b5132
RH
3320 }
3321
1126897b 3322 if (link_info == NULL)
dbb410c3 3323 {
1126897b 3324 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3325 if (failed)
b34976b6 3326 return FALSE;
dbb410c3
AM
3327 }
3328
252b5132
RH
3329 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3330 /* sh_name was set in prep_headers. */
3331 shstrtab_hdr->sh_type = SHT_STRTAB;
3332 shstrtab_hdr->sh_flags = 0;
3333 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3334 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3335 shstrtab_hdr->sh_entsize = 0;
3336 shstrtab_hdr->sh_link = 0;
3337 shstrtab_hdr->sh_info = 0;
3338 /* sh_offset is set in assign_file_positions_except_relocs. */
3339 shstrtab_hdr->sh_addralign = 1;
3340
c84fca4d 3341 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3342 return FALSE;
252b5132 3343
3516e984 3344 if (need_symtab)
252b5132
RH
3345 {
3346 file_ptr off;
3347 Elf_Internal_Shdr *hdr;
3348
3349 off = elf_tdata (abfd)->next_file_pos;
3350
3351 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3352 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3353
9ad5cbcf
AM
3354 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3355 if (hdr->sh_size != 0)
b34976b6 3356 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3357
252b5132 3358 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3359 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3360
3361 elf_tdata (abfd)->next_file_pos = off;
3362
3363 /* Now that we know where the .strtab section goes, write it
08a40648 3364 out. */
252b5132
RH
3365 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3366 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3367 return FALSE;
252b5132
RH
3368 _bfd_stringtab_free (strtab);
3369 }
3370
b34976b6 3371 abfd->output_has_begun = TRUE;
252b5132 3372
b34976b6 3373 return TRUE;
252b5132
RH
3374}
3375
8ded5a0f
AM
3376/* Make an initial estimate of the size of the program header. If we
3377 get the number wrong here, we'll redo section placement. */
3378
3379static bfd_size_type
3380get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3381{
3382 size_t segs;
3383 asection *s;
2b05f1b7 3384 const struct elf_backend_data *bed;
8ded5a0f
AM
3385
3386 /* Assume we will need exactly two PT_LOAD segments: one for text
3387 and one for data. */
3388 segs = 2;
3389
3390 s = bfd_get_section_by_name (abfd, ".interp");
3391 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3392 {
3393 /* If we have a loadable interpreter section, we need a
3394 PT_INTERP segment. In this case, assume we also need a
3395 PT_PHDR segment, although that may not be true for all
3396 targets. */
3397 segs += 2;
3398 }
3399
3400 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3401 {
3402 /* We need a PT_DYNAMIC segment. */
3403 ++segs;
f210dcff 3404 }
08a40648 3405
ceae84aa 3406 if (info != NULL && info->relro)
f210dcff
L
3407 {
3408 /* We need a PT_GNU_RELRO segment. */
3409 ++segs;
8ded5a0f
AM
3410 }
3411
3412 if (elf_tdata (abfd)->eh_frame_hdr)
3413 {
3414 /* We need a PT_GNU_EH_FRAME segment. */
3415 ++segs;
3416 }
3417
2b05f1b7 3418 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3419 {
2b05f1b7
L
3420 /* We need a PT_GNU_STACK segment. */
3421 ++segs;
3422 }
94b11780 3423
2b05f1b7
L
3424 for (s = abfd->sections; s != NULL; s = s->next)
3425 {
8ded5a0f 3426 if ((s->flags & SEC_LOAD) != 0
0112cd26 3427 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3428 {
3429 /* We need a PT_NOTE segment. */
3430 ++segs;
1c5265b5
JJ
3431 /* Try to create just one PT_NOTE segment
3432 for all adjacent loadable .note* sections.
3433 gABI requires that within a PT_NOTE segment
3434 (and also inside of each SHT_NOTE section)
3435 each note is padded to a multiple of 4 size,
3436 so we check whether the sections are correctly
3437 aligned. */
3438 if (s->alignment_power == 2)
3439 while (s->next != NULL
3440 && s->next->alignment_power == 2
3441 && (s->next->flags & SEC_LOAD) != 0
3442 && CONST_STRNEQ (s->next->name, ".note"))
3443 s = s->next;
8ded5a0f
AM
3444 }
3445 }
3446
3447 for (s = abfd->sections; s != NULL; s = s->next)
3448 {
3449 if (s->flags & SEC_THREAD_LOCAL)
3450 {
3451 /* We need a PT_TLS segment. */
3452 ++segs;
3453 break;
3454 }
3455 }
3456
3457 /* Let the backend count up any program headers it might need. */
2b05f1b7 3458 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3459 if (bed->elf_backend_additional_program_headers)
3460 {
3461 int a;
3462
3463 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3464 if (a == -1)
3465 abort ();
3466 segs += a;
3467 }
3468
3469 return segs * bed->s->sizeof_phdr;
3470}
3471
2ea37f1c
NC
3472/* Find the segment that contains the output_section of section. */
3473
3474Elf_Internal_Phdr *
3475_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3476{
3477 struct elf_segment_map *m;
3478 Elf_Internal_Phdr *p;
3479
3480 for (m = elf_tdata (abfd)->segment_map,
3481 p = elf_tdata (abfd)->phdr;
3482 m != NULL;
3483 m = m->next, p++)
3484 {
3485 int i;
3486
3487 for (i = m->count - 1; i >= 0; i--)
3488 if (m->sections[i] == section)
3489 return p;
3490 }
3491
3492 return NULL;
3493}
3494
252b5132
RH
3495/* Create a mapping from a set of sections to a program segment. */
3496
217aa764
AM
3497static struct elf_segment_map *
3498make_mapping (bfd *abfd,
3499 asection **sections,
3500 unsigned int from,
3501 unsigned int to,
3502 bfd_boolean phdr)
252b5132
RH
3503{
3504 struct elf_segment_map *m;
3505 unsigned int i;
3506 asection **hdrpp;
dc810e39 3507 bfd_size_type amt;
252b5132 3508
dc810e39
AM
3509 amt = sizeof (struct elf_segment_map);
3510 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3511 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3512 if (m == NULL)
3513 return NULL;
3514 m->next = NULL;
3515 m->p_type = PT_LOAD;
3516 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3517 m->sections[i - from] = *hdrpp;
3518 m->count = to - from;
3519
3520 if (from == 0 && phdr)
3521 {
3522 /* Include the headers in the first PT_LOAD segment. */
3523 m->includes_filehdr = 1;
3524 m->includes_phdrs = 1;
3525 }
3526
3527 return m;
3528}
3529
229fcec5
MM
3530/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3531 on failure. */
3532
3533struct elf_segment_map *
3534_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3535{
3536 struct elf_segment_map *m;
3537
a50b1753
NC
3538 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3539 sizeof (struct elf_segment_map));
229fcec5
MM
3540 if (m == NULL)
3541 return NULL;
3542 m->next = NULL;
3543 m->p_type = PT_DYNAMIC;
3544 m->count = 1;
3545 m->sections[0] = dynsec;
08a40648 3546
229fcec5
MM
3547 return m;
3548}
3549
8ded5a0f 3550/* Possibly add or remove segments from the segment map. */
252b5132 3551
b34976b6 3552static bfd_boolean
3dea8fca
AM
3553elf_modify_segment_map (bfd *abfd,
3554 struct bfd_link_info *info,
3555 bfd_boolean remove_empty_load)
252b5132 3556{
252e386e 3557 struct elf_segment_map **m;
8ded5a0f 3558 const struct elf_backend_data *bed;
252b5132 3559
8ded5a0f
AM
3560 /* The placement algorithm assumes that non allocated sections are
3561 not in PT_LOAD segments. We ensure this here by removing such
3562 sections from the segment map. We also remove excluded
252e386e
AM
3563 sections. Finally, any PT_LOAD segment without sections is
3564 removed. */
3565 m = &elf_tdata (abfd)->segment_map;
3566 while (*m)
8ded5a0f
AM
3567 {
3568 unsigned int i, new_count;
252b5132 3569
252e386e 3570 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3571 {
252e386e
AM
3572 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3573 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3574 || (*m)->p_type != PT_LOAD))
8ded5a0f 3575 {
252e386e
AM
3576 (*m)->sections[new_count] = (*m)->sections[i];
3577 new_count++;
8ded5a0f
AM
3578 }
3579 }
252e386e 3580 (*m)->count = new_count;
252b5132 3581
3dea8fca 3582 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3583 *m = (*m)->next;
3584 else
3585 m = &(*m)->next;
8ded5a0f 3586 }
252b5132 3587
8ded5a0f
AM
3588 bed = get_elf_backend_data (abfd);
3589 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3590 {
252e386e 3591 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3592 return FALSE;
252b5132 3593 }
252b5132 3594
8ded5a0f
AM
3595 return TRUE;
3596}
252b5132 3597
8ded5a0f 3598/* Set up a mapping from BFD sections to program segments. */
252b5132 3599
8ded5a0f
AM
3600bfd_boolean
3601_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3602{
3603 unsigned int count;
3604 struct elf_segment_map *m;
3605 asection **sections = NULL;
3606 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3607 bfd_boolean no_user_phdrs;
252b5132 3608
3dea8fca
AM
3609 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
3610 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3611 {
8ded5a0f
AM
3612 asection *s;
3613 unsigned int i;
3614 struct elf_segment_map *mfirst;
3615 struct elf_segment_map **pm;
3616 asection *last_hdr;
3617 bfd_vma last_size;
3618 unsigned int phdr_index;
3619 bfd_vma maxpagesize;
3620 asection **hdrpp;
3621 bfd_boolean phdr_in_segment = TRUE;
3622 bfd_boolean writable;
3623 int tls_count = 0;
3624 asection *first_tls = NULL;
3625 asection *dynsec, *eh_frame_hdr;
3626 bfd_size_type amt;
8d06853e 3627 bfd_vma addr_mask, wrap_to = 0;
252b5132 3628
8ded5a0f 3629 /* Select the allocated sections, and sort them. */
252b5132 3630
a50b1753
NC
3631 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
3632 sizeof (asection *));
8ded5a0f 3633 if (sections == NULL)
252b5132 3634 goto error_return;
252b5132 3635
8d06853e
AM
3636 /* Calculate top address, avoiding undefined behaviour of shift
3637 left operator when shift count is equal to size of type
3638 being shifted. */
3639 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
3640 addr_mask = (addr_mask << 1) + 1;
3641
8ded5a0f
AM
3642 i = 0;
3643 for (s = abfd->sections; s != NULL; s = s->next)
3644 {
3645 if ((s->flags & SEC_ALLOC) != 0)
3646 {
3647 sections[i] = s;
3648 ++i;
8d06853e
AM
3649 /* A wrapping section potentially clashes with header. */
3650 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
3651 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
3652 }
3653 }
3654 BFD_ASSERT (i <= bfd_count_sections (abfd));
3655 count = i;
252b5132 3656
8ded5a0f 3657 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3658
8ded5a0f 3659 /* Build the mapping. */
252b5132 3660
8ded5a0f
AM
3661 mfirst = NULL;
3662 pm = &mfirst;
252b5132 3663
8ded5a0f
AM
3664 /* If we have a .interp section, then create a PT_PHDR segment for
3665 the program headers and a PT_INTERP segment for the .interp
3666 section. */
3667 s = bfd_get_section_by_name (abfd, ".interp");
3668 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3669 {
3670 amt = sizeof (struct elf_segment_map);
a50b1753 3671 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3672 if (m == NULL)
3673 goto error_return;
3674 m->next = NULL;
3675 m->p_type = PT_PHDR;
3676 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3677 m->p_flags = PF_R | PF_X;
3678 m->p_flags_valid = 1;
3679 m->includes_phdrs = 1;
252b5132 3680
8ded5a0f
AM
3681 *pm = m;
3682 pm = &m->next;
252b5132 3683
8ded5a0f 3684 amt = sizeof (struct elf_segment_map);
a50b1753 3685 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3686 if (m == NULL)
3687 goto error_return;
3688 m->next = NULL;
3689 m->p_type = PT_INTERP;
3690 m->count = 1;
3691 m->sections[0] = s;
3692
3693 *pm = m;
3694 pm = &m->next;
252b5132 3695 }
8ded5a0f
AM
3696
3697 /* Look through the sections. We put sections in the same program
3698 segment when the start of the second section can be placed within
3699 a few bytes of the end of the first section. */
3700 last_hdr = NULL;
3701 last_size = 0;
3702 phdr_index = 0;
3703 maxpagesize = bed->maxpagesize;
3704 writable = FALSE;
3705 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3706 if (dynsec != NULL
3707 && (dynsec->flags & SEC_LOAD) == 0)
3708 dynsec = NULL;
3709
3710 /* Deal with -Ttext or something similar such that the first section
3711 is not adjacent to the program headers. This is an
3712 approximation, since at this point we don't know exactly how many
3713 program headers we will need. */
3714 if (count > 0)
252b5132 3715 {
8ded5a0f
AM
3716 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3717
62d7a5f6 3718 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3719 phdr_size = get_program_header_size (abfd, info);
3720 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
3721 || (sections[0]->lma & addr_mask) < phdr_size
3722 || ((sections[0]->lma & addr_mask) % maxpagesize
3723 < phdr_size % maxpagesize)
3724 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 3725 phdr_in_segment = FALSE;
252b5132
RH
3726 }
3727
8ded5a0f 3728 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3729 {
8ded5a0f
AM
3730 asection *hdr;
3731 bfd_boolean new_segment;
3732
3733 hdr = *hdrpp;
3734
3735 /* See if this section and the last one will fit in the same
3736 segment. */
3737
3738 if (last_hdr == NULL)
3739 {
3740 /* If we don't have a segment yet, then we don't need a new
3741 one (we build the last one after this loop). */
3742 new_segment = FALSE;
3743 }
3744 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3745 {
3746 /* If this section has a different relation between the
3747 virtual address and the load address, then we need a new
3748 segment. */
3749 new_segment = TRUE;
3750 }
b5599592
AM
3751 else if (hdr->lma < last_hdr->lma + last_size
3752 || last_hdr->lma + last_size < last_hdr->lma)
3753 {
3754 /* If this section has a load address that makes it overlap
3755 the previous section, then we need a new segment. */
3756 new_segment = TRUE;
3757 }
39948a60
NC
3758 /* In the next test we have to be careful when last_hdr->lma is close
3759 to the end of the address space. If the aligned address wraps
3760 around to the start of the address space, then there are no more
3761 pages left in memory and it is OK to assume that the current
3762 section can be included in the current segment. */
3763 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3764 > last_hdr->lma)
3765 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3766 <= hdr->lma))
8ded5a0f
AM
3767 {
3768 /* If putting this section in this segment would force us to
3769 skip a page in the segment, then we need a new segment. */
3770 new_segment = TRUE;
3771 }
3772 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3773 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3774 {
3775 /* We don't want to put a loadable section after a
3776 nonloadable section in the same segment.
3777 Consider .tbss sections as loadable for this purpose. */
3778 new_segment = TRUE;
3779 }
3780 else if ((abfd->flags & D_PAGED) == 0)
3781 {
3782 /* If the file is not demand paged, which means that we
3783 don't require the sections to be correctly aligned in the
3784 file, then there is no other reason for a new segment. */
3785 new_segment = FALSE;
3786 }
3787 else if (! writable
3788 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
3789 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
3790 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
3791 {
3792 /* We don't want to put a writable section in a read only
3793 segment, unless they are on the same page in memory
3794 anyhow. We already know that the last section does not
3795 bring us past the current section on the page, so the
3796 only case in which the new section is not on the same
3797 page as the previous section is when the previous section
3798 ends precisely on a page boundary. */
3799 new_segment = TRUE;
3800 }
3801 else
3802 {
3803 /* Otherwise, we can use the same segment. */
3804 new_segment = FALSE;
3805 }
3806
2889e75b 3807 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3808 if (last_hdr != NULL
3809 && info != NULL
3810 && info->callbacks->override_segment_assignment != NULL)
3811 new_segment
3812 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3813 last_hdr,
3814 new_segment);
2889e75b 3815
8ded5a0f
AM
3816 if (! new_segment)
3817 {
3818 if ((hdr->flags & SEC_READONLY) == 0)
3819 writable = TRUE;
3820 last_hdr = hdr;
3821 /* .tbss sections effectively have zero size. */
3822 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3823 != SEC_THREAD_LOCAL)
3824 last_size = hdr->size;
3825 else
3826 last_size = 0;
3827 continue;
3828 }
3829
3830 /* We need a new program segment. We must create a new program
3831 header holding all the sections from phdr_index until hdr. */
3832
3833 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3834 if (m == NULL)
3835 goto error_return;
3836
3837 *pm = m;
3838 pm = &m->next;
3839
252b5132 3840 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3841 writable = TRUE;
8ded5a0f
AM
3842 else
3843 writable = FALSE;
3844
baaff79e
JJ
3845 last_hdr = hdr;
3846 /* .tbss sections effectively have zero size. */
e5caec89 3847 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3848 last_size = hdr->size;
baaff79e
JJ
3849 else
3850 last_size = 0;
8ded5a0f
AM
3851 phdr_index = i;
3852 phdr_in_segment = FALSE;
252b5132
RH
3853 }
3854
8ded5a0f
AM
3855 /* Create a final PT_LOAD program segment. */
3856 if (last_hdr != NULL)
3857 {
3858 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3859 if (m == NULL)
3860 goto error_return;
252b5132 3861
8ded5a0f
AM
3862 *pm = m;
3863 pm = &m->next;
3864 }
252b5132 3865
8ded5a0f
AM
3866 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3867 if (dynsec != NULL)
3868 {
3869 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
3870 if (m == NULL)
3871 goto error_return;
3872 *pm = m;
3873 pm = &m->next;
3874 }
252b5132 3875
1c5265b5
JJ
3876 /* For each batch of consecutive loadable .note sections,
3877 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
3878 because if we link together nonloadable .note sections and
3879 loadable .note sections, we will generate two .note sections
3880 in the output file. FIXME: Using names for section types is
3881 bogus anyhow. */
8ded5a0f
AM
3882 for (s = abfd->sections; s != NULL; s = s->next)
3883 {
3884 if ((s->flags & SEC_LOAD) != 0
0112cd26 3885 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 3886 {
1c5265b5 3887 asection *s2;
91d6fa6a
NC
3888
3889 count = 1;
8ded5a0f 3890 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
3891 if (s->alignment_power == 2)
3892 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
3893 {
3894 if (s2->next->alignment_power == 2
3895 && (s2->next->flags & SEC_LOAD) != 0
3896 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
3897 && align_power (s2->lma + s2->size, 2)
3898 == s2->next->lma)
55b581a6
JJ
3899 count++;
3900 else
3901 break;
3902 }
1c5265b5 3903 amt += (count - 1) * sizeof (asection *);
a50b1753 3904 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3905 if (m == NULL)
3906 goto error_return;
3907 m->next = NULL;
3908 m->p_type = PT_NOTE;
1c5265b5
JJ
3909 m->count = count;
3910 while (count > 1)
3911 {
3912 m->sections[m->count - count--] = s;
3913 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
3914 s = s->next;
3915 }
3916 m->sections[m->count - 1] = s;
3917 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
3918 *pm = m;
3919 pm = &m->next;
3920 }
3921 if (s->flags & SEC_THREAD_LOCAL)
3922 {
3923 if (! tls_count)
3924 first_tls = s;
3925 tls_count++;
3926 }
3927 }
252b5132 3928
8ded5a0f
AM
3929 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3930 if (tls_count > 0)
3931 {
8ded5a0f
AM
3932 amt = sizeof (struct elf_segment_map);
3933 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 3934 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3935 if (m == NULL)
3936 goto error_return;
3937 m->next = NULL;
3938 m->p_type = PT_TLS;
3939 m->count = tls_count;
3940 /* Mandated PF_R. */
3941 m->p_flags = PF_R;
3942 m->p_flags_valid = 1;
91d6fa6a 3943 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f
AM
3944 {
3945 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3946 m->sections[i] = first_tls;
3947 first_tls = first_tls->next;
3948 }
252b5132 3949
8ded5a0f
AM
3950 *pm = m;
3951 pm = &m->next;
3952 }
252b5132 3953
8ded5a0f
AM
3954 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3955 segment. */
3956 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3957 if (eh_frame_hdr != NULL
3958 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 3959 {
dc810e39 3960 amt = sizeof (struct elf_segment_map);
a50b1753 3961 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3962 if (m == NULL)
3963 goto error_return;
3964 m->next = NULL;
8ded5a0f 3965 m->p_type = PT_GNU_EH_FRAME;
252b5132 3966 m->count = 1;
8ded5a0f 3967 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
3968
3969 *pm = m;
3970 pm = &m->next;
3971 }
13ae64f3 3972
8ded5a0f 3973 if (elf_tdata (abfd)->stack_flags)
13ae64f3 3974 {
8ded5a0f 3975 amt = sizeof (struct elf_segment_map);
a50b1753 3976 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3977 if (m == NULL)
3978 goto error_return;
3979 m->next = NULL;
2b05f1b7 3980 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
3981 m->p_flags = elf_tdata (abfd)->stack_flags;
3982 m->p_flags_valid = 1;
252b5132 3983
8ded5a0f
AM
3984 *pm = m;
3985 pm = &m->next;
3986 }
65765700 3987
ceae84aa 3988 if (info != NULL && info->relro)
8ded5a0f 3989 {
f210dcff
L
3990 for (m = mfirst; m != NULL; m = m->next)
3991 {
3992 if (m->p_type == PT_LOAD)
3993 {
3994 asection *last = m->sections[m->count - 1];
3995 bfd_vma vaddr = m->sections[0]->vma;
3996 bfd_vma filesz = last->vma - vaddr + last->size;
65765700 3997
f210dcff
L
3998 if (vaddr < info->relro_end
3999 && vaddr >= info->relro_start
4000 && (vaddr + filesz) >= info->relro_end)
4001 break;
4002 }
4003 }
4004
4005 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4006 if (m != NULL)
4007 {
4008 amt = sizeof (struct elf_segment_map);
a50b1753 4009 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4010 if (m == NULL)
4011 goto error_return;
4012 m->next = NULL;
4013 m->p_type = PT_GNU_RELRO;
4014 m->p_flags = PF_R;
4015 m->p_flags_valid = 1;
4016
4017 *pm = m;
4018 pm = &m->next;
4019 }
8ded5a0f 4020 }
9ee5e499 4021
8ded5a0f
AM
4022 free (sections);
4023 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
4024 }
4025
3dea8fca 4026 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4027 return FALSE;
8c37241b 4028
8ded5a0f
AM
4029 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4030 ++count;
4031 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 4032
b34976b6 4033 return TRUE;
252b5132
RH
4034
4035 error_return:
4036 if (sections != NULL)
4037 free (sections);
b34976b6 4038 return FALSE;
252b5132
RH
4039}
4040
4041/* Sort sections by address. */
4042
4043static int
217aa764 4044elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4045{
4046 const asection *sec1 = *(const asection **) arg1;
4047 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4048 bfd_size_type size1, size2;
252b5132
RH
4049
4050 /* Sort by LMA first, since this is the address used to
4051 place the section into a segment. */
4052 if (sec1->lma < sec2->lma)
4053 return -1;
4054 else if (sec1->lma > sec2->lma)
4055 return 1;
4056
4057 /* Then sort by VMA. Normally the LMA and the VMA will be
4058 the same, and this will do nothing. */
4059 if (sec1->vma < sec2->vma)
4060 return -1;
4061 else if (sec1->vma > sec2->vma)
4062 return 1;
4063
4064 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4065
07c6e936 4066#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4067
4068 if (TOEND (sec1))
4069 {
4070 if (TOEND (sec2))
00a7cdc5
NC
4071 {
4072 /* If the indicies are the same, do not return 0
4073 here, but continue to try the next comparison. */
4074 if (sec1->target_index - sec2->target_index != 0)
4075 return sec1->target_index - sec2->target_index;
4076 }
252b5132
RH
4077 else
4078 return 1;
4079 }
00a7cdc5 4080 else if (TOEND (sec2))
252b5132
RH
4081 return -1;
4082
4083#undef TOEND
4084
00a7cdc5
NC
4085 /* Sort by size, to put zero sized sections
4086 before others at the same address. */
252b5132 4087
eea6121a
AM
4088 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4089 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4090
4091 if (size1 < size2)
252b5132 4092 return -1;
eecdbe52 4093 if (size1 > size2)
252b5132
RH
4094 return 1;
4095
4096 return sec1->target_index - sec2->target_index;
4097}
4098
340b6d91
AC
4099/* Ian Lance Taylor writes:
4100
4101 We shouldn't be using % with a negative signed number. That's just
4102 not good. We have to make sure either that the number is not
4103 negative, or that the number has an unsigned type. When the types
4104 are all the same size they wind up as unsigned. When file_ptr is a
4105 larger signed type, the arithmetic winds up as signed long long,
4106 which is wrong.
4107
4108 What we're trying to say here is something like ``increase OFF by
4109 the least amount that will cause it to be equal to the VMA modulo
4110 the page size.'' */
4111/* In other words, something like:
4112
4113 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4114 off_offset = off % bed->maxpagesize;
4115 if (vma_offset < off_offset)
4116 adjustment = vma_offset + bed->maxpagesize - off_offset;
4117 else
4118 adjustment = vma_offset - off_offset;
08a40648 4119
340b6d91
AC
4120 which can can be collapsed into the expression below. */
4121
4122static file_ptr
4123vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4124{
4125 return ((vma - off) % maxpagesize);
4126}
4127
6d33f217
L
4128static void
4129print_segment_map (const struct elf_segment_map *m)
4130{
4131 unsigned int j;
4132 const char *pt = get_segment_type (m->p_type);
4133 char buf[32];
4134
4135 if (pt == NULL)
4136 {
4137 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4138 sprintf (buf, "LOPROC+%7.7x",
4139 (unsigned int) (m->p_type - PT_LOPROC));
4140 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4141 sprintf (buf, "LOOS+%7.7x",
4142 (unsigned int) (m->p_type - PT_LOOS));
4143 else
4144 snprintf (buf, sizeof (buf), "%8.8x",
4145 (unsigned int) m->p_type);
4146 pt = buf;
4147 }
4148 fprintf (stderr, "%s:", pt);
4149 for (j = 0; j < m->count; j++)
4150 fprintf (stderr, " %s", m->sections [j]->name);
4151 putc ('\n',stderr);
4152}
4153
32812159
AM
4154static bfd_boolean
4155write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4156{
4157 void *buf;
4158 bfd_boolean ret;
4159
4160 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4161 return FALSE;
4162 buf = bfd_zmalloc (len);
4163 if (buf == NULL)
4164 return FALSE;
4165 ret = bfd_bwrite (buf, len, abfd) == len;
4166 free (buf);
4167 return ret;
4168}
4169
252b5132
RH
4170/* Assign file positions to the sections based on the mapping from
4171 sections to segments. This function also sets up some fields in
f3520d2f 4172 the file header. */
252b5132 4173
b34976b6 4174static bfd_boolean
f3520d2f
AM
4175assign_file_positions_for_load_sections (bfd *abfd,
4176 struct bfd_link_info *link_info)
252b5132
RH
4177{
4178 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4179 struct elf_segment_map *m;
252b5132 4180 Elf_Internal_Phdr *phdrs;
252b5132 4181 Elf_Internal_Phdr *p;
02bf8d82 4182 file_ptr off;
3f570048 4183 bfd_size_type maxpagesize;
f3520d2f 4184 unsigned int alloc;
0920dee7 4185 unsigned int i, j;
2b0bc088 4186 bfd_vma header_pad = 0;
252b5132 4187
e36284ab 4188 if (link_info == NULL
ceae84aa 4189 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4190 return FALSE;
252b5132 4191
8ded5a0f 4192 alloc = 0;
252b5132 4193 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2b0bc088
NC
4194 {
4195 ++alloc;
4196 if (m->header_size)
4197 header_pad = m->header_size;
4198 }
252b5132
RH
4199
4200 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4201 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4202 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4203
62d7a5f6 4204 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4205 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4206 else
4207 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4208 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4209
4210 if (alloc == 0)
f3520d2f 4211 {
8ded5a0f
AM
4212 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4213 return TRUE;
f3520d2f 4214 }
252b5132 4215
57268894
HPN
4216 /* We're writing the size in elf_tdata (abfd)->program_header_size,
4217 see assign_file_positions_except_relocs, so make sure we have
4218 that amount allocated, with trailing space cleared.
4219 The variable alloc contains the computed need, while elf_tdata
4220 (abfd)->program_header_size contains the size used for the
4221 layout.
4222 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4223 where the layout is forced to according to a larger size in the
4224 last iterations for the testcase ld-elf/header. */
4225 BFD_ASSERT (elf_tdata (abfd)->program_header_size % bed->s->sizeof_phdr
4226 == 0);
a50b1753
NC
4227 phdrs = (Elf_Internal_Phdr *)
4228 bfd_zalloc2 (abfd,
4229 (elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr),
4230 sizeof (Elf_Internal_Phdr));
f3520d2f 4231 elf_tdata (abfd)->phdr = phdrs;
252b5132 4232 if (phdrs == NULL)
b34976b6 4233 return FALSE;
252b5132 4234
3f570048
AM
4235 maxpagesize = 1;
4236 if ((abfd->flags & D_PAGED) != 0)
4237 maxpagesize = bed->maxpagesize;
4238
252b5132
RH
4239 off = bed->s->sizeof_ehdr;
4240 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4241 if (header_pad < (bfd_vma) off)
4242 header_pad = 0;
4243 else
4244 header_pad -= off;
4245 off += header_pad;
252b5132 4246
0920dee7 4247 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4248 m != NULL;
0920dee7 4249 m = m->next, p++, j++)
252b5132 4250 {
252b5132 4251 asection **secpp;
bf988460
AM
4252 bfd_vma off_adjust;
4253 bfd_boolean no_contents;
252b5132
RH
4254
4255 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4256 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4257 not be done to the PT_NOTE section of a corefile, which may
4258 contain several pseudo-sections artificially created by bfd.
4259 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4260 if (m->count > 1
4261 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4262 && m->p_type == PT_NOTE))
252b5132
RH
4263 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4264 elf_sort_sections);
4265
b301b248
AM
4266 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4267 number of sections with contents contributing to both p_filesz
4268 and p_memsz, followed by a number of sections with no contents
4269 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4270 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4271 p->p_type = m->p_type;
28a7f3e7 4272 p->p_flags = m->p_flags;
252b5132 4273
3f570048
AM
4274 if (m->count == 0)
4275 p->p_vaddr = 0;
4276 else
3271a814 4277 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4278
4279 if (m->p_paddr_valid)
4280 p->p_paddr = m->p_paddr;
4281 else if (m->count == 0)
4282 p->p_paddr = 0;
4283 else
08a40648 4284 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4285
4286 if (p->p_type == PT_LOAD
4287 && (abfd->flags & D_PAGED) != 0)
4288 {
4289 /* p_align in demand paged PT_LOAD segments effectively stores
4290 the maximum page size. When copying an executable with
4291 objcopy, we set m->p_align from the input file. Use this
4292 value for maxpagesize rather than bed->maxpagesize, which
4293 may be different. Note that we use maxpagesize for PT_TLS
4294 segment alignment later in this function, so we are relying
4295 on at least one PT_LOAD segment appearing before a PT_TLS
4296 segment. */
4297 if (m->p_align_valid)
4298 maxpagesize = m->p_align;
4299
4300 p->p_align = maxpagesize;
4301 }
3271a814
NS
4302 else if (m->p_align_valid)
4303 p->p_align = m->p_align;
e970b90a
DJ
4304 else if (m->count == 0)
4305 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4306 else
4307 p->p_align = 0;
4308
bf988460
AM
4309 no_contents = FALSE;
4310 off_adjust = 0;
252b5132 4311 if (p->p_type == PT_LOAD
b301b248 4312 && m->count > 0)
252b5132 4313 {
b301b248 4314 bfd_size_type align;
a49e53ed 4315 unsigned int align_power = 0;
b301b248 4316
3271a814
NS
4317 if (m->p_align_valid)
4318 align = p->p_align;
4319 else
252b5132 4320 {
3271a814
NS
4321 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4322 {
4323 unsigned int secalign;
08a40648 4324
3271a814
NS
4325 secalign = bfd_get_section_alignment (abfd, *secpp);
4326 if (secalign > align_power)
4327 align_power = secalign;
4328 }
4329 align = (bfd_size_type) 1 << align_power;
4330 if (align < maxpagesize)
4331 align = maxpagesize;
b301b248 4332 }
252b5132 4333
02bf8d82
AM
4334 for (i = 0; i < m->count; i++)
4335 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4336 /* If we aren't making room for this section, then
4337 it must be SHT_NOBITS regardless of what we've
4338 set via struct bfd_elf_special_section. */
4339 elf_section_type (m->sections[i]) = SHT_NOBITS;
4340
bf988460 4341 /* Find out whether this segment contains any loadable
aea274d3
AM
4342 sections. */
4343 no_contents = TRUE;
4344 for (i = 0; i < m->count; i++)
4345 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4346 {
4347 no_contents = FALSE;
4348 break;
4349 }
bf988460 4350
85cfcbfb 4351 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
4352 off += off_adjust;
4353 if (no_contents)
4354 {
4355 /* We shouldn't need to align the segment on disk since
4356 the segment doesn't need file space, but the gABI
4357 arguably requires the alignment and glibc ld.so
4358 checks it. So to comply with the alignment
4359 requirement but not waste file space, we adjust
4360 p_offset for just this segment. (OFF_ADJUST is
4361 subtracted from OFF later.) This may put p_offset
4362 past the end of file, but that shouldn't matter. */
4363 }
4364 else
4365 off_adjust = 0;
252b5132 4366 }
b1a6d0b1
NC
4367 /* Make sure the .dynamic section is the first section in the
4368 PT_DYNAMIC segment. */
4369 else if (p->p_type == PT_DYNAMIC
4370 && m->count > 1
4371 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4372 {
4373 _bfd_error_handler
b301b248
AM
4374 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4375 abfd);
b1a6d0b1
NC
4376 bfd_set_error (bfd_error_bad_value);
4377 return FALSE;
4378 }
3f001e84
JK
4379 /* Set the note section type to SHT_NOTE. */
4380 else if (p->p_type == PT_NOTE)
4381 for (i = 0; i < m->count; i++)
4382 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4383
252b5132
RH
4384 p->p_offset = 0;
4385 p->p_filesz = 0;
4386 p->p_memsz = 0;
4387
4388 if (m->includes_filehdr)
4389 {
bf988460 4390 if (!m->p_flags_valid)
252b5132 4391 p->p_flags |= PF_R;
252b5132
RH
4392 p->p_filesz = bed->s->sizeof_ehdr;
4393 p->p_memsz = bed->s->sizeof_ehdr;
4394 if (m->count > 0)
4395 {
4396 BFD_ASSERT (p->p_type == PT_LOAD);
4397
4398 if (p->p_vaddr < (bfd_vma) off)
4399 {
caf47ea6 4400 (*_bfd_error_handler)
b301b248
AM
4401 (_("%B: Not enough room for program headers, try linking with -N"),
4402 abfd);
252b5132 4403 bfd_set_error (bfd_error_bad_value);
b34976b6 4404 return FALSE;
252b5132
RH
4405 }
4406
4407 p->p_vaddr -= off;
bf988460 4408 if (!m->p_paddr_valid)
252b5132
RH
4409 p->p_paddr -= off;
4410 }
252b5132
RH
4411 }
4412
4413 if (m->includes_phdrs)
4414 {
bf988460 4415 if (!m->p_flags_valid)
252b5132
RH
4416 p->p_flags |= PF_R;
4417
f3520d2f 4418 if (!m->includes_filehdr)
252b5132
RH
4419 {
4420 p->p_offset = bed->s->sizeof_ehdr;
4421
4422 if (m->count > 0)
4423 {
4424 BFD_ASSERT (p->p_type == PT_LOAD);
4425 p->p_vaddr -= off - p->p_offset;
bf988460 4426 if (!m->p_paddr_valid)
252b5132
RH
4427 p->p_paddr -= off - p->p_offset;
4428 }
252b5132
RH
4429 }
4430
4431 p->p_filesz += alloc * bed->s->sizeof_phdr;
4432 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4433 if (m->count)
4434 {
4435 p->p_filesz += header_pad;
4436 p->p_memsz += header_pad;
4437 }
252b5132
RH
4438 }
4439
4440 if (p->p_type == PT_LOAD
4441 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4442 {
bf988460 4443 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4444 p->p_offset = off;
252b5132
RH
4445 else
4446 {
4447 file_ptr adjust;
4448
4449 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4450 if (!no_contents)
4451 p->p_filesz += adjust;
252b5132
RH
4452 p->p_memsz += adjust;
4453 }
4454 }
4455
1ea63fd2
AM
4456 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4457 maps. Set filepos for sections in PT_LOAD segments, and in
4458 core files, for sections in PT_NOTE segments.
4459 assign_file_positions_for_non_load_sections will set filepos
4460 for other sections and update p_filesz for other segments. */
252b5132
RH
4461 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4462 {
4463 asection *sec;
252b5132 4464 bfd_size_type align;
627b32bc 4465 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4466
4467 sec = *secpp;
02bf8d82 4468 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4469 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4470
88967714
AM
4471 if ((p->p_type == PT_LOAD
4472 || p->p_type == PT_TLS)
4473 && (this_hdr->sh_type != SHT_NOBITS
4474 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4475 && ((this_hdr->sh_flags & SHF_TLS) == 0
4476 || p->p_type == PT_TLS))))
252b5132 4477 {
b5599592
AM
4478 bfd_vma p_start = p->p_paddr;
4479 bfd_vma p_end = p_start + p->p_memsz;
4480 bfd_vma s_start = sec->lma;
4481 bfd_vma adjust = s_start - p_end;
252b5132 4482
a2d1e028
L
4483 if (adjust != 0
4484 && (s_start < p_end
4485 || p_end < p_start))
252b5132 4486 {
88967714 4487 (*_bfd_error_handler)
b5599592
AM
4488 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
4489 (unsigned long) s_start, (unsigned long) p_end);
88967714 4490 adjust = 0;
b5599592 4491 sec->lma = p_end;
1cfb7d1e 4492 }
3ac9b6c9 4493 p->p_memsz += adjust;
1cfb7d1e 4494
88967714
AM
4495 if (this_hdr->sh_type != SHT_NOBITS)
4496 {
32812159
AM
4497 if (p->p_filesz + adjust < p->p_memsz)
4498 {
4499 /* We have a PROGBITS section following NOBITS ones.
4500 Allocate file space for the NOBITS section(s) and
4501 zero it. */
4502 adjust = p->p_memsz - p->p_filesz;
4503 if (!write_zeros (abfd, off, adjust))
4504 return FALSE;
4505 }
88967714
AM
4506 off += adjust;
4507 p->p_filesz += adjust;
252b5132 4508 }
252b5132
RH
4509 }
4510
4511 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4512 {
b301b248
AM
4513 /* The section at i == 0 is the one that actually contains
4514 everything. */
4a938328
MS
4515 if (i == 0)
4516 {
627b32bc 4517 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4518 off += this_hdr->sh_size;
4519 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4520 p->p_memsz = 0;
4521 p->p_align = 1;
252b5132 4522 }
4a938328 4523 else
252b5132 4524 {
b301b248 4525 /* The rest are fake sections that shouldn't be written. */
252b5132 4526 sec->filepos = 0;
eea6121a 4527 sec->size = 0;
b301b248
AM
4528 sec->flags = 0;
4529 continue;
252b5132 4530 }
252b5132
RH
4531 }
4532 else
4533 {
b301b248
AM
4534 if (p->p_type == PT_LOAD)
4535 {
02bf8d82
AM
4536 this_hdr->sh_offset = sec->filepos = off;
4537 if (this_hdr->sh_type != SHT_NOBITS)
6a3cd2b4 4538 off += this_hdr->sh_size;
b301b248 4539 }
252b5132 4540
02bf8d82 4541 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4542 {
6a3cd2b4 4543 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4544 /* A load section without SHF_ALLOC is something like
4545 a note section in a PT_NOTE segment. These take
4546 file space but are not loaded into memory. */
4547 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4548 p->p_memsz += this_hdr->sh_size;
b301b248 4549 }
6a3cd2b4 4550 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4551 {
6a3cd2b4
AM
4552 if (p->p_type == PT_TLS)
4553 p->p_memsz += this_hdr->sh_size;
4554
4555 /* .tbss is special. It doesn't contribute to p_memsz of
4556 normal segments. */
4557 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4558 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4559 }
4560
b10a8ae0
L
4561 if (align > p->p_align
4562 && !m->p_align_valid
4563 && (p->p_type != PT_LOAD
4564 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4565 p->p_align = align;
4566 }
4567
bf988460 4568 if (!m->p_flags_valid)
252b5132
RH
4569 {
4570 p->p_flags |= PF_R;
02bf8d82 4571 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4572 p->p_flags |= PF_X;
02bf8d82 4573 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4574 p->p_flags |= PF_W;
4575 }
4576 }
bf988460 4577 off -= off_adjust;
0920dee7 4578
7c928300
AM
4579 /* Check that all sections are in a PT_LOAD segment.
4580 Don't check funky gdb generated core files. */
4581 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
4582 {
4583 bfd_boolean check_vma = TRUE;
4584
4585 for (i = 1; i < m->count; i++)
4586 if (m->sections[i]->vma == m->sections[i - 1]->vma
4587 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
4588 ->this_hdr), p) != 0
4589 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
4590 ->this_hdr), p) != 0)
0920dee7 4591 {
9a83a553
AM
4592 /* Looks like we have overlays packed into the segment. */
4593 check_vma = FALSE;
4594 break;
0920dee7 4595 }
9a83a553
AM
4596
4597 for (i = 0; i < m->count; i++)
4598 {
4599 Elf_Internal_Shdr *this_hdr;
4600 asection *sec;
4601
4602 sec = m->sections[i];
4603 this_hdr = &(elf_section_data(sec)->this_hdr);
f4638467 4604 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0))
9a83a553
AM
4605 {
4606 (*_bfd_error_handler)
4607 (_("%B: section `%A' can't be allocated in segment %d"),
4608 abfd, sec, j);
4609 print_segment_map (m);
4610 }
4611 }
4612 }
252b5132
RH
4613 }
4614
f3520d2f
AM
4615 elf_tdata (abfd)->next_file_pos = off;
4616 return TRUE;
4617}
4618
4619/* Assign file positions for the other sections. */
4620
4621static bfd_boolean
4622assign_file_positions_for_non_load_sections (bfd *abfd,
4623 struct bfd_link_info *link_info)
4624{
4625 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4626 Elf_Internal_Shdr **i_shdrpp;
4627 Elf_Internal_Shdr **hdrpp;
4628 Elf_Internal_Phdr *phdrs;
4629 Elf_Internal_Phdr *p;
4630 struct elf_segment_map *m;
4631 bfd_vma filehdr_vaddr, filehdr_paddr;
4632 bfd_vma phdrs_vaddr, phdrs_paddr;
4633 file_ptr off;
4634 unsigned int num_sec;
4635 unsigned int i;
4636 unsigned int count;
4637
5c182d5f
AM
4638 i_shdrpp = elf_elfsections (abfd);
4639 num_sec = elf_numsections (abfd);
f3520d2f 4640 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4641 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4642 {
4643 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4644 Elf_Internal_Shdr *hdr;
4645
4646 hdr = *hdrpp;
4647 if (hdr->bfd_section != NULL
252e386e
AM
4648 && (hdr->bfd_section->filepos != 0
4649 || (hdr->sh_type == SHT_NOBITS
4650 && hdr->contents == NULL)))
627b32bc 4651 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4652 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4653 {
f4638467
AM
4654 (*_bfd_error_handler)
4655 (_("%B: warning: allocated section `%s' not in segment"),
4656 abfd,
4657 (hdr->bfd_section == NULL
4658 ? "*unknown*"
4659 : hdr->bfd_section->name));
3ba71138
L
4660 /* We don't need to page align empty sections. */
4661 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4662 off += vma_page_aligned_bias (hdr->sh_addr, off,
4663 bed->maxpagesize);
4664 else
4665 off += vma_page_aligned_bias (hdr->sh_addr, off,
4666 hdr->sh_addralign);
4667 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4668 FALSE);
4669 }
4670 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4671 && hdr->bfd_section == NULL)
4672 || hdr == i_shdrpp[tdata->symtab_section]
4673 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4674 || hdr == i_shdrpp[tdata->strtab_section])
4675 hdr->sh_offset = -1;
4676 else
4677 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4678 }
4679
252b5132
RH
4680 /* Now that we have set the section file positions, we can set up
4681 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4682 count = 0;
4683 filehdr_vaddr = 0;
4684 filehdr_paddr = 0;
4685 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4686 phdrs_paddr = 0;
4687 phdrs = elf_tdata (abfd)->phdr;
4688 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4689 m != NULL;
4690 m = m->next, p++)
4691 {
4692 ++count;
4693 if (p->p_type != PT_LOAD)
4694 continue;
4695
4696 if (m->includes_filehdr)
4697 {
4698 filehdr_vaddr = p->p_vaddr;
4699 filehdr_paddr = p->p_paddr;
4700 }
4701 if (m->includes_phdrs)
4702 {
4703 phdrs_vaddr = p->p_vaddr;
4704 phdrs_paddr = p->p_paddr;
4705 if (m->includes_filehdr)
4706 {
4707 phdrs_vaddr += bed->s->sizeof_ehdr;
4708 phdrs_paddr += bed->s->sizeof_ehdr;
4709 }
4710 }
4711 }
4712
252b5132
RH
4713 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4714 m != NULL;
4715 m = m->next, p++)
4716 {
129af99f 4717 if (p->p_type == PT_GNU_RELRO)
252b5132 4718 {
b84a33b5
AM
4719 const Elf_Internal_Phdr *lp;
4720
129af99f 4721 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
1ea63fd2 4722
129af99f 4723 if (link_info != NULL)
8c37241b 4724 {
129af99f
AS
4725 /* During linking the range of the RELRO segment is passed
4726 in link_info. */
8c37241b
JJ
4727 for (lp = phdrs; lp < phdrs + count; ++lp)
4728 {
4729 if (lp->p_type == PT_LOAD
8c37241b 4730 && lp->p_vaddr >= link_info->relro_start
b84a33b5
AM
4731 && lp->p_vaddr < link_info->relro_end
4732 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end)
8c37241b
JJ
4733 break;
4734 }
8c37241b 4735 }
129af99f
AS
4736 else
4737 {
4738 /* Otherwise we are copying an executable or shared
b84a33b5 4739 library, but we need to use the same linker logic. */
129af99f
AS
4740 for (lp = phdrs; lp < phdrs + count; ++lp)
4741 {
4742 if (lp->p_type == PT_LOAD
4743 && lp->p_paddr == p->p_paddr)
4744 break;
4745 }
b84a33b5
AM
4746 }
4747
4748 if (lp < phdrs + count)
4749 {
4750 p->p_vaddr = lp->p_vaddr;
4751 p->p_paddr = lp->p_paddr;
4752 p->p_offset = lp->p_offset;
4753 if (link_info != NULL)
4754 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4755 else if (m->p_size_valid)
4756 p->p_filesz = m->p_size;
129af99f
AS
4757 else
4758 abort ();
b84a33b5
AM
4759 p->p_memsz = p->p_filesz;
4760 p->p_align = 1;
4761 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 4762 }
9433b9b1 4763 else
b84a33b5
AM
4764 {
4765 memset (p, 0, sizeof *p);
4766 p->p_type = PT_NULL;
4767 }
129af99f
AS
4768 }
4769 else if (m->count != 0)
4770 {
4771 if (p->p_type != PT_LOAD
4772 && (p->p_type != PT_NOTE
4773 || bfd_get_format (abfd) != bfd_core))
4774 {
4775 Elf_Internal_Shdr *hdr;
4776 asection *sect;
4777
4778 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4779
4780 sect = m->sections[m->count - 1];
4781 hdr = &elf_section_data (sect)->this_hdr;
4782 p->p_filesz = sect->filepos - m->sections[0]->filepos;
4783 if (hdr->sh_type != SHT_NOBITS)
4784 p->p_filesz += hdr->sh_size;
4785 p->p_offset = m->sections[0]->filepos;
4786 }
4787 }
4788 else if (m->includes_filehdr)
4789 {
4790 p->p_vaddr = filehdr_vaddr;
4791 if (! m->p_paddr_valid)
4792 p->p_paddr = filehdr_paddr;
4793 }
4794 else if (m->includes_phdrs)
4795 {
4796 p->p_vaddr = phdrs_vaddr;
4797 if (! m->p_paddr_valid)
4798 p->p_paddr = phdrs_paddr;
252b5132
RH
4799 }
4800 }
4801
252b5132
RH
4802 elf_tdata (abfd)->next_file_pos = off;
4803
b34976b6 4804 return TRUE;
252b5132
RH
4805}
4806
252b5132
RH
4807/* Work out the file positions of all the sections. This is called by
4808 _bfd_elf_compute_section_file_positions. All the section sizes and
4809 VMAs must be known before this is called.
4810
e0638f70
AM
4811 Reloc sections come in two flavours: Those processed specially as
4812 "side-channel" data attached to a section to which they apply, and
4813 those that bfd doesn't process as relocations. The latter sort are
4814 stored in a normal bfd section by bfd_section_from_shdr. We don't
4815 consider the former sort here, unless they form part of the loadable
4816 image. Reloc sections not assigned here will be handled later by
4817 assign_file_positions_for_relocs.
252b5132
RH
4818
4819 We also don't set the positions of the .symtab and .strtab here. */
4820
b34976b6 4821static bfd_boolean
c84fca4d
AO
4822assign_file_positions_except_relocs (bfd *abfd,
4823 struct bfd_link_info *link_info)
252b5132 4824{
5c182d5f
AM
4825 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4826 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4827 file_ptr off;
9c5bfbb7 4828 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4829
4830 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4831 && bfd_get_format (abfd) != bfd_core)
4832 {
5c182d5f
AM
4833 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4834 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4835 Elf_Internal_Shdr **hdrpp;
4836 unsigned int i;
4837
4838 /* Start after the ELF header. */
4839 off = i_ehdrp->e_ehsize;
4840
4841 /* We are not creating an executable, which means that we are
4842 not creating a program header, and that the actual order of
4843 the sections in the file is unimportant. */
9ad5cbcf 4844 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4845 {
4846 Elf_Internal_Shdr *hdr;
4847
4848 hdr = *hdrpp;
e0638f70
AM
4849 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4850 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4851 || i == tdata->symtab_section
4852 || i == tdata->symtab_shndx_section
252b5132
RH
4853 || i == tdata->strtab_section)
4854 {
4855 hdr->sh_offset = -1;
252b5132 4856 }
9ad5cbcf 4857 else
b34976b6 4858 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
4859 }
4860 }
4861 else
4862 {
f3520d2f
AM
4863 unsigned int alloc;
4864
252b5132 4865 /* Assign file positions for the loaded sections based on the
08a40648 4866 assignment of sections to segments. */
f3520d2f
AM
4867 if (!assign_file_positions_for_load_sections (abfd, link_info))
4868 return FALSE;
4869
4870 /* And for non-load sections. */
4871 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4872 return FALSE;
4873
e36284ab
AM
4874 if (bed->elf_backend_modify_program_headers != NULL)
4875 {
4876 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4877 return FALSE;
4878 }
4879
f3520d2f
AM
4880 /* Write out the program headers. */
4881 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4882 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4883 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4884 return FALSE;
252b5132 4885
5c182d5f 4886 off = tdata->next_file_pos;
252b5132
RH
4887 }
4888
4889 /* Place the section headers. */
45d6a902 4890 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4891 i_ehdrp->e_shoff = off;
4892 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4893
5c182d5f 4894 tdata->next_file_pos = off;
252b5132 4895
b34976b6 4896 return TRUE;
252b5132
RH
4897}
4898
b34976b6 4899static bfd_boolean
217aa764 4900prep_headers (bfd *abfd)
252b5132 4901{
3d540e93 4902 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 4903 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4904 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4905
4906 i_ehdrp = elf_elfheader (abfd);
252b5132 4907
2b0f7ef9 4908 shstrtab = _bfd_elf_strtab_init ();
252b5132 4909 if (shstrtab == NULL)
b34976b6 4910 return FALSE;
252b5132
RH
4911
4912 elf_shstrtab (abfd) = shstrtab;
4913
4914 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4915 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4916 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4917 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4918
4919 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4920 i_ehdrp->e_ident[EI_DATA] =
4921 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4922 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4923
252b5132
RH
4924 if ((abfd->flags & DYNAMIC) != 0)
4925 i_ehdrp->e_type = ET_DYN;
4926 else if ((abfd->flags & EXEC_P) != 0)
4927 i_ehdrp->e_type = ET_EXEC;
4928 else if (bfd_get_format (abfd) == bfd_core)
4929 i_ehdrp->e_type = ET_CORE;
4930 else
4931 i_ehdrp->e_type = ET_REL;
4932
4933 switch (bfd_get_arch (abfd))
4934 {
4935 case bfd_arch_unknown:
4936 i_ehdrp->e_machine = EM_NONE;
4937 break;
aa4f99bb
AO
4938
4939 /* There used to be a long list of cases here, each one setting
4940 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4941 in the corresponding bfd definition. To avoid duplication,
4942 the switch was removed. Machines that need special handling
4943 can generally do it in elf_backend_final_write_processing(),
4944 unless they need the information earlier than the final write.
4945 Such need can generally be supplied by replacing the tests for
4946 e_machine with the conditions used to determine it. */
252b5132 4947 default:
9c5bfbb7
AM
4948 i_ehdrp->e_machine = bed->elf_machine_code;
4949 }
aa4f99bb 4950
252b5132
RH
4951 i_ehdrp->e_version = bed->s->ev_current;
4952 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4953
c044fabd 4954 /* No program header, for now. */
252b5132
RH
4955 i_ehdrp->e_phoff = 0;
4956 i_ehdrp->e_phentsize = 0;
4957 i_ehdrp->e_phnum = 0;
4958
c044fabd 4959 /* Each bfd section is section header entry. */
252b5132
RH
4960 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4961 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4962
c044fabd 4963 /* If we're building an executable, we'll need a program header table. */
252b5132 4964 if (abfd->flags & EXEC_P)
0e71e495
BE
4965 /* It all happens later. */
4966 ;
252b5132
RH
4967 else
4968 {
4969 i_ehdrp->e_phentsize = 0;
252b5132
RH
4970 i_ehdrp->e_phoff = 0;
4971 }
4972
4973 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4974 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4975 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4976 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4977 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4978 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4979 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4980 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4981 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4982 return FALSE;
252b5132 4983
b34976b6 4984 return TRUE;
252b5132
RH
4985}
4986
4987/* Assign file positions for all the reloc sections which are not part
4988 of the loadable file image. */
4989
4990void
217aa764 4991_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4992{
4993 file_ptr off;
9ad5cbcf 4994 unsigned int i, num_sec;
252b5132
RH
4995 Elf_Internal_Shdr **shdrpp;
4996
4997 off = elf_tdata (abfd)->next_file_pos;
4998
9ad5cbcf
AM
4999 num_sec = elf_numsections (abfd);
5000 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5001 {
5002 Elf_Internal_Shdr *shdrp;
5003
5004 shdrp = *shdrpp;
5005 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5006 && shdrp->sh_offset == -1)
b34976b6 5007 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5008 }
5009
5010 elf_tdata (abfd)->next_file_pos = off;
5011}
5012
b34976b6 5013bfd_boolean
217aa764 5014_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5015{
9c5bfbb7 5016 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5017 Elf_Internal_Shdr **i_shdrp;
b34976b6 5018 bfd_boolean failed;
9ad5cbcf 5019 unsigned int count, num_sec;
252b5132
RH
5020
5021 if (! abfd->output_has_begun
217aa764 5022 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5023 return FALSE;
252b5132
RH
5024
5025 i_shdrp = elf_elfsections (abfd);
252b5132 5026
b34976b6 5027 failed = FALSE;
252b5132
RH
5028 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5029 if (failed)
b34976b6 5030 return FALSE;
252b5132
RH
5031
5032 _bfd_elf_assign_file_positions_for_relocs (abfd);
5033
c044fabd 5034 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5035 num_sec = elf_numsections (abfd);
5036 for (count = 1; count < num_sec; count++)
252b5132
RH
5037 {
5038 if (bed->elf_backend_section_processing)
5039 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5040 if (i_shdrp[count]->contents)
5041 {
dc810e39
AM
5042 bfd_size_type amt = i_shdrp[count]->sh_size;
5043
252b5132 5044 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5045 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5046 return FALSE;
252b5132
RH
5047 }
5048 }
5049
5050 /* Write out the section header names. */
26ae6d5e
DJ
5051 if (elf_shstrtab (abfd) != NULL
5052 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5053 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5054 return FALSE;
252b5132
RH
5055
5056 if (bed->elf_backend_final_write_processing)
5057 (*bed->elf_backend_final_write_processing) (abfd,
5058 elf_tdata (abfd)->linker);
5059
ff59fc36
RM
5060 if (!bed->s->write_shdrs_and_ehdr (abfd))
5061 return FALSE;
5062
5063 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
5064 if (elf_tdata (abfd)->after_write_object_contents)
5065 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
5066
5067 return TRUE;
252b5132
RH
5068}
5069
b34976b6 5070bfd_boolean
217aa764 5071_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5072{
c044fabd 5073 /* Hopefully this can be done just like an object file. */
252b5132
RH
5074 return _bfd_elf_write_object_contents (abfd);
5075}
c044fabd
KH
5076
5077/* Given a section, search the header to find them. */
5078
cb33740c 5079unsigned int
198beae2 5080_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5081{
9c5bfbb7 5082 const struct elf_backend_data *bed;
91d6fa6a 5083 unsigned int sec_index;
252b5132 5084
9ad5cbcf
AM
5085 if (elf_section_data (asect) != NULL
5086 && elf_section_data (asect)->this_idx != 0)
5087 return elf_section_data (asect)->this_idx;
5088
5089 if (bfd_is_abs_section (asect))
91d6fa6a 5090 sec_index = SHN_ABS;
af746e92 5091 else if (bfd_is_com_section (asect))
91d6fa6a 5092 sec_index = SHN_COMMON;
af746e92 5093 else if (bfd_is_und_section (asect))
91d6fa6a 5094 sec_index = SHN_UNDEF;
af746e92 5095 else
91d6fa6a 5096 sec_index = SHN_BAD;
252b5132 5097
af746e92 5098 bed = get_elf_backend_data (abfd);
252b5132
RH
5099 if (bed->elf_backend_section_from_bfd_section)
5100 {
91d6fa6a 5101 int retval = sec_index;
9ad5cbcf 5102
af746e92
AM
5103 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5104 return retval;
252b5132
RH
5105 }
5106
91d6fa6a 5107 if (sec_index == SHN_BAD)
af746e92 5108 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5109
91d6fa6a 5110 return sec_index;
252b5132
RH
5111}
5112
5113/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5114 on error. */
5115
5116int
217aa764 5117_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5118{
5119 asymbol *asym_ptr = *asym_ptr_ptr;
5120 int idx;
5121 flagword flags = asym_ptr->flags;
5122
5123 /* When gas creates relocations against local labels, it creates its
5124 own symbol for the section, but does put the symbol into the
5125 symbol chain, so udata is 0. When the linker is generating
5126 relocatable output, this section symbol may be for one of the
5127 input sections rather than the output section. */
5128 if (asym_ptr->udata.i == 0
5129 && (flags & BSF_SECTION_SYM)
5130 && asym_ptr->section)
5131 {
5372391b 5132 asection *sec;
252b5132
RH
5133 int indx;
5134
5372391b
AM
5135 sec = asym_ptr->section;
5136 if (sec->owner != abfd && sec->output_section != NULL)
5137 sec = sec->output_section;
5138 if (sec->owner == abfd
5139 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5140 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5141 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5142 }
5143
5144 idx = asym_ptr->udata.i;
5145
5146 if (idx == 0)
5147 {
5148 /* This case can occur when using --strip-symbol on a symbol
08a40648 5149 which is used in a relocation entry. */
252b5132 5150 (*_bfd_error_handler)
d003868e
AM
5151 (_("%B: symbol `%s' required but not present"),
5152 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5153 bfd_set_error (bfd_error_no_symbols);
5154 return -1;
5155 }
5156
5157#if DEBUG & 4
5158 {
5159 fprintf (stderr,
661a3fd4 5160 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5161 (long) asym_ptr, asym_ptr->name, idx, flags,
5162 elf_symbol_flags (flags));
5163 fflush (stderr);
5164 }
5165#endif
5166
5167 return idx;
5168}
5169
84d1d650 5170/* Rewrite program header information. */
252b5132 5171
b34976b6 5172static bfd_boolean
84d1d650 5173rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5174{
b34976b6
AM
5175 Elf_Internal_Ehdr *iehdr;
5176 struct elf_segment_map *map;
5177 struct elf_segment_map *map_first;
5178 struct elf_segment_map **pointer_to_map;
5179 Elf_Internal_Phdr *segment;
5180 asection *section;
5181 unsigned int i;
5182 unsigned int num_segments;
5183 bfd_boolean phdr_included = FALSE;
5c44b38e 5184 bfd_boolean p_paddr_valid;
b34976b6
AM
5185 bfd_vma maxpagesize;
5186 struct elf_segment_map *phdr_adjust_seg = NULL;
5187 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5188 const struct elf_backend_data *bed;
bc67d8a6 5189
caf47ea6 5190 bed = get_elf_backend_data (ibfd);
252b5132
RH
5191 iehdr = elf_elfheader (ibfd);
5192
bc67d8a6 5193 map_first = NULL;
c044fabd 5194 pointer_to_map = &map_first;
252b5132
RH
5195
5196 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5197 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5198
5199 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5200#define SEGMENT_END(segment, start) \
5201 (start + (segment->p_memsz > segment->p_filesz \
5202 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5203
eecdbe52
JJ
5204#define SECTION_SIZE(section, segment) \
5205 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5206 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5207 ? section->size : 0)
eecdbe52 5208
b34976b6 5209 /* Returns TRUE if the given section is contained within
bc67d8a6 5210 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5211#define IS_CONTAINED_BY_VMA(section, segment) \
5212 (section->vma >= segment->p_vaddr \
eecdbe52 5213 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5214 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5215
b34976b6 5216 /* Returns TRUE if the given section is contained within
bc67d8a6 5217 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5218#define IS_CONTAINED_BY_LMA(section, segment, base) \
5219 (section->lma >= base \
eecdbe52 5220 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5221 <= SEGMENT_END (segment, base)))
252b5132 5222
0efc80c8
L
5223 /* Handle PT_NOTE segment. */
5224#define IS_NOTE(p, s) \
aecc8f8a 5225 (p->p_type == PT_NOTE \
0efc80c8 5226 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5227 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5228 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5229 <= p->p_offset + p->p_filesz))
252b5132 5230
0efc80c8
L
5231 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5232 etc. */
5233#define IS_COREFILE_NOTE(p, s) \
5234 (IS_NOTE (p, s) \
5235 && bfd_get_format (ibfd) == bfd_core \
5236 && s->vma == 0 \
5237 && s->lma == 0)
5238
252b5132
RH
5239 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5240 linker, which generates a PT_INTERP section with p_vaddr and
5241 p_memsz set to 0. */
aecc8f8a
AM
5242#define IS_SOLARIS_PT_INTERP(p, s) \
5243 (p->p_vaddr == 0 \
5244 && p->p_paddr == 0 \
5245 && p->p_memsz == 0 \
5246 && p->p_filesz > 0 \
5247 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5248 && s->size > 0 \
aecc8f8a 5249 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5250 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5251 <= p->p_offset + p->p_filesz))
5c440b1e 5252
bc67d8a6
NC
5253 /* Decide if the given section should be included in the given segment.
5254 A section will be included if:
f5ffc919 5255 1. It is within the address space of the segment -- we use the LMA
08a40648 5256 if that is set for the segment and the VMA otherwise,
0efc80c8
L
5257 2. It is an allocated section or a NOTE section in a PT_NOTE
5258 segment.
bc67d8a6 5259 3. There is an output section associated with it,
eecdbe52 5260 4. The section has not already been allocated to a previous segment.
2b05f1b7 5261 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5262 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5263 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5264 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5265 (with the possible exception of .dynamic). */
9f17e2a6 5266#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5267 ((((segment->p_paddr \
5268 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5269 : IS_CONTAINED_BY_VMA (section, segment)) \
5270 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5271 || IS_NOTE (segment, section)) \
2b05f1b7
L
5272 && segment->p_type != PT_GNU_STACK \
5273 && (segment->p_type != PT_TLS \
5274 || (section->flags & SEC_THREAD_LOCAL)) \
5275 && (segment->p_type == PT_LOAD \
5276 || segment->p_type == PT_TLS \
5277 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5278 && (segment->p_type != PT_DYNAMIC \
5279 || SECTION_SIZE (section, segment) > 0 \
5280 || (segment->p_paddr \
5281 ? segment->p_paddr != section->lma \
5282 : segment->p_vaddr != section->vma) \
5283 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5284 == 0)) \
0067a569 5285 && !section->segment_mark)
bc67d8a6 5286
9f17e2a6
L
5287/* If the output section of a section in the input segment is NULL,
5288 it is removed from the corresponding output segment. */
5289#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5290 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5291 && section->output_section != NULL)
5292
b34976b6 5293 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5294#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5295 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5296
5297 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5298 their VMA address ranges and their LMA address ranges overlap.
5299 It is possible to have overlapping VMA ranges without overlapping LMA
5300 ranges. RedBoot images for example can have both .data and .bss mapped
5301 to the same VMA range, but with the .data section mapped to a different
5302 LMA. */
aecc8f8a 5303#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5304 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5305 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5306 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5307 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5308
5309 /* Initialise the segment mark field. */
5310 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5311 section->segment_mark = FALSE;
bc67d8a6 5312
5c44b38e
AM
5313 /* The Solaris linker creates program headers in which all the
5314 p_paddr fields are zero. When we try to objcopy or strip such a
5315 file, we get confused. Check for this case, and if we find it
5316 don't set the p_paddr_valid fields. */
5317 p_paddr_valid = FALSE;
5318 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5319 i < num_segments;
5320 i++, segment++)
5321 if (segment->p_paddr != 0)
5322 {
5323 p_paddr_valid = TRUE;
5324 break;
5325 }
5326
252b5132 5327 /* Scan through the segments specified in the program header
bc67d8a6 5328 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5329 in the loadable segments. These can be created by weird
aecc8f8a 5330 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5331 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5332 i < num_segments;
c044fabd 5333 i++, segment++)
252b5132 5334 {
252b5132 5335 unsigned int j;
c044fabd 5336 Elf_Internal_Phdr *segment2;
252b5132 5337
aecc8f8a
AM
5338 if (segment->p_type == PT_INTERP)
5339 for (section = ibfd->sections; section; section = section->next)
5340 if (IS_SOLARIS_PT_INTERP (segment, section))
5341 {
5342 /* Mininal change so that the normal section to segment
4cc11e76 5343 assignment code will work. */
aecc8f8a
AM
5344 segment->p_vaddr = section->vma;
5345 break;
5346 }
5347
bc67d8a6 5348 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5349 {
5350 /* Remove PT_GNU_RELRO segment. */
5351 if (segment->p_type == PT_GNU_RELRO)
5352 segment->p_type = PT_NULL;
5353 continue;
5354 }
c044fabd 5355
bc67d8a6 5356 /* Determine if this segment overlaps any previous segments. */
0067a569 5357 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5358 {
5359 bfd_signed_vma extra_length;
c044fabd 5360
bc67d8a6 5361 if (segment2->p_type != PT_LOAD
0067a569 5362 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5363 continue;
c044fabd 5364
bc67d8a6
NC
5365 /* Merge the two segments together. */
5366 if (segment2->p_vaddr < segment->p_vaddr)
5367 {
c044fabd 5368 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5369 SEGMENT. */
0067a569
AM
5370 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5371 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5372
bc67d8a6
NC
5373 if (extra_length > 0)
5374 {
0067a569 5375 segment2->p_memsz += extra_length;
bc67d8a6
NC
5376 segment2->p_filesz += extra_length;
5377 }
c044fabd 5378
bc67d8a6 5379 segment->p_type = PT_NULL;
c044fabd 5380
bc67d8a6
NC
5381 /* Since we have deleted P we must restart the outer loop. */
5382 i = 0;
5383 segment = elf_tdata (ibfd)->phdr;
5384 break;
5385 }
5386 else
5387 {
c044fabd 5388 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5389 SEGMENT2. */
0067a569
AM
5390 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5391 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5392
bc67d8a6
NC
5393 if (extra_length > 0)
5394 {
0067a569 5395 segment->p_memsz += extra_length;
bc67d8a6
NC
5396 segment->p_filesz += extra_length;
5397 }
c044fabd 5398
bc67d8a6
NC
5399 segment2->p_type = PT_NULL;
5400 }
5401 }
5402 }
c044fabd 5403
bc67d8a6
NC
5404 /* The second scan attempts to assign sections to segments. */
5405 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5406 i < num_segments;
0067a569 5407 i++, segment++)
bc67d8a6 5408 {
0067a569
AM
5409 unsigned int section_count;
5410 asection **sections;
5411 asection *output_section;
5412 unsigned int isec;
5413 bfd_vma matching_lma;
5414 bfd_vma suggested_lma;
5415 unsigned int j;
dc810e39 5416 bfd_size_type amt;
0067a569
AM
5417 asection *first_section;
5418 bfd_boolean first_matching_lma;
5419 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5420
5421 if (segment->p_type == PT_NULL)
5422 continue;
c044fabd 5423
9f17e2a6 5424 first_section = NULL;
bc67d8a6 5425 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5426 for (section = ibfd->sections, section_count = 0;
5427 section != NULL;
5428 section = section->next)
9f17e2a6
L
5429 {
5430 /* Find the first section in the input segment, which may be
5431 removed from the corresponding output segment. */
5432 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5433 {
5434 if (first_section == NULL)
5435 first_section = section;
5436 if (section->output_section != NULL)
5437 ++section_count;
5438 }
5439 }
811072d8 5440
b5f852ea
NC
5441 /* Allocate a segment map big enough to contain
5442 all of the sections we have selected. */
dc810e39
AM
5443 amt = sizeof (struct elf_segment_map);
5444 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5445 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5446 if (map == NULL)
b34976b6 5447 return FALSE;
252b5132
RH
5448
5449 /* Initialise the fields of the segment map. Default to
5450 using the physical address of the segment in the input BFD. */
0067a569
AM
5451 map->next = NULL;
5452 map->p_type = segment->p_type;
5453 map->p_flags = segment->p_flags;
bc67d8a6 5454 map->p_flags_valid = 1;
55d55ac7 5455
9f17e2a6
L
5456 /* If the first section in the input segment is removed, there is
5457 no need to preserve segment physical address in the corresponding
5458 output segment. */
945c025a 5459 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5460 {
5461 map->p_paddr = segment->p_paddr;
5c44b38e 5462 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5463 }
252b5132
RH
5464
5465 /* Determine if this segment contains the ELF file header
5466 and if it contains the program headers themselves. */
bc67d8a6
NC
5467 map->includes_filehdr = (segment->p_offset == 0
5468 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5469 map->includes_phdrs = 0;
252b5132 5470
0067a569 5471 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5472 {
bc67d8a6
NC
5473 map->includes_phdrs =
5474 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5475 && (segment->p_offset + segment->p_filesz
252b5132
RH
5476 >= ((bfd_vma) iehdr->e_phoff
5477 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5478
bc67d8a6 5479 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5480 phdr_included = TRUE;
252b5132
RH
5481 }
5482
bc67d8a6 5483 if (section_count == 0)
252b5132
RH
5484 {
5485 /* Special segments, such as the PT_PHDR segment, may contain
5486 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5487 something. They are allowed by the ELF spec however, so only
5488 a warning is produced. */
bc67d8a6 5489 if (segment->p_type == PT_LOAD)
0067a569
AM
5490 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5491 " detected, is this intentional ?\n"),
5492 ibfd);
252b5132 5493
bc67d8a6 5494 map->count = 0;
c044fabd
KH
5495 *pointer_to_map = map;
5496 pointer_to_map = &map->next;
252b5132
RH
5497
5498 continue;
5499 }
5500
5501 /* Now scan the sections in the input BFD again and attempt
5502 to add their corresponding output sections to the segment map.
5503 The problem here is how to handle an output section which has
5504 been moved (ie had its LMA changed). There are four possibilities:
5505
5506 1. None of the sections have been moved.
5507 In this case we can continue to use the segment LMA from the
5508 input BFD.
5509
5510 2. All of the sections have been moved by the same amount.
5511 In this case we can change the segment's LMA to match the LMA
5512 of the first section.
5513
5514 3. Some of the sections have been moved, others have not.
5515 In this case those sections which have not been moved can be
5516 placed in the current segment which will have to have its size,
5517 and possibly its LMA changed, and a new segment or segments will
5518 have to be created to contain the other sections.
5519
b5f852ea 5520 4. The sections have been moved, but not by the same amount.
252b5132
RH
5521 In this case we can change the segment's LMA to match the LMA
5522 of the first section and we will have to create a new segment
5523 or segments to contain the other sections.
5524
5525 In order to save time, we allocate an array to hold the section
5526 pointers that we are interested in. As these sections get assigned
5527 to a segment, they are removed from this array. */
5528
a50b1753 5529 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5530 if (sections == NULL)
b34976b6 5531 return FALSE;
252b5132
RH
5532
5533 /* Step One: Scan for segment vs section LMA conflicts.
5534 Also add the sections to the section array allocated above.
5535 Also add the sections to the current segment. In the common
5536 case, where the sections have not been moved, this means that
5537 we have completely filled the segment, and there is nothing
5538 more to do. */
252b5132 5539 isec = 0;
72730e0c 5540 matching_lma = 0;
252b5132 5541 suggested_lma = 0;
0067a569
AM
5542 first_matching_lma = TRUE;
5543 first_suggested_lma = TRUE;
252b5132 5544
147d51c2 5545 for (section = ibfd->sections;
bc67d8a6
NC
5546 section != NULL;
5547 section = section->next)
147d51c2
L
5548 if (section == first_section)
5549 break;
5550
5551 for (j = 0; section != NULL; section = section->next)
252b5132 5552 {
caf47ea6 5553 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5554 {
bc67d8a6
NC
5555 output_section = section->output_section;
5556
0067a569 5557 sections[j++] = section;
252b5132
RH
5558
5559 /* The Solaris native linker always sets p_paddr to 0.
5560 We try to catch that case here, and set it to the
5e8d7549
NC
5561 correct value. Note - some backends require that
5562 p_paddr be left as zero. */
5c44b38e 5563 if (!p_paddr_valid
4455705d 5564 && segment->p_vaddr != 0
0067a569 5565 && !bed->want_p_paddr_set_to_zero
252b5132 5566 && isec == 0
bc67d8a6 5567 && output_section->lma != 0
0067a569
AM
5568 && output_section->vma == (segment->p_vaddr
5569 + (map->includes_filehdr
5570 ? iehdr->e_ehsize
5571 : 0)
5572 + (map->includes_phdrs
5573 ? (iehdr->e_phnum
5574 * iehdr->e_phentsize)
5575 : 0)))
bc67d8a6 5576 map->p_paddr = segment->p_vaddr;
252b5132
RH
5577
5578 /* Match up the physical address of the segment with the
5579 LMA address of the output section. */
bc67d8a6 5580 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5581 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5582 || (bed->want_p_paddr_set_to_zero
5583 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5584 {
0067a569
AM
5585 if (first_matching_lma || output_section->lma < matching_lma)
5586 {
5587 matching_lma = output_section->lma;
5588 first_matching_lma = FALSE;
5589 }
252b5132
RH
5590
5591 /* We assume that if the section fits within the segment
bc67d8a6 5592 then it does not overlap any other section within that
252b5132 5593 segment. */
0067a569
AM
5594 map->sections[isec++] = output_section;
5595 }
5596 else if (first_suggested_lma)
5597 {
5598 suggested_lma = output_section->lma;
5599 first_suggested_lma = FALSE;
252b5132 5600 }
147d51c2
L
5601
5602 if (j == section_count)
5603 break;
252b5132
RH
5604 }
5605 }
5606
bc67d8a6 5607 BFD_ASSERT (j == section_count);
252b5132
RH
5608
5609 /* Step Two: Adjust the physical address of the current segment,
5610 if necessary. */
bc67d8a6 5611 if (isec == section_count)
252b5132
RH
5612 {
5613 /* All of the sections fitted within the segment as currently
5614 specified. This is the default case. Add the segment to
5615 the list of built segments and carry on to process the next
5616 program header in the input BFD. */
bc67d8a6 5617 map->count = section_count;
c044fabd
KH
5618 *pointer_to_map = map;
5619 pointer_to_map = &map->next;
08a40648 5620
5c44b38e
AM
5621 if (p_paddr_valid
5622 && !bed->want_p_paddr_set_to_zero
147d51c2 5623 && matching_lma != map->p_paddr
5c44b38e
AM
5624 && !map->includes_filehdr
5625 && !map->includes_phdrs)
3271a814
NS
5626 /* There is some padding before the first section in the
5627 segment. So, we must account for that in the output
5628 segment's vma. */
5629 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5630
252b5132
RH
5631 free (sections);
5632 continue;
5633 }
252b5132
RH
5634 else
5635 {
0067a569 5636 if (!first_matching_lma)
72730e0c
AM
5637 {
5638 /* At least one section fits inside the current segment.
5639 Keep it, but modify its physical address to match the
5640 LMA of the first section that fitted. */
bc67d8a6 5641 map->p_paddr = matching_lma;
72730e0c
AM
5642 }
5643 else
5644 {
5645 /* None of the sections fitted inside the current segment.
5646 Change the current segment's physical address to match
5647 the LMA of the first section. */
bc67d8a6 5648 map->p_paddr = suggested_lma;
72730e0c
AM
5649 }
5650
bc67d8a6
NC
5651 /* Offset the segment physical address from the lma
5652 to allow for space taken up by elf headers. */
5653 if (map->includes_filehdr)
010c8431
AM
5654 {
5655 if (map->p_paddr >= iehdr->e_ehsize)
5656 map->p_paddr -= iehdr->e_ehsize;
5657 else
5658 {
5659 map->includes_filehdr = FALSE;
5660 map->includes_phdrs = FALSE;
5661 }
5662 }
252b5132 5663
bc67d8a6
NC
5664 if (map->includes_phdrs)
5665 {
010c8431
AM
5666 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5667 {
5668 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5669
5670 /* iehdr->e_phnum is just an estimate of the number
5671 of program headers that we will need. Make a note
5672 here of the number we used and the segment we chose
5673 to hold these headers, so that we can adjust the
5674 offset when we know the correct value. */
5675 phdr_adjust_num = iehdr->e_phnum;
5676 phdr_adjust_seg = map;
5677 }
5678 else
5679 map->includes_phdrs = FALSE;
bc67d8a6 5680 }
252b5132
RH
5681 }
5682
5683 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5684 those that fit to the current segment and removing them from the
252b5132
RH
5685 sections array; but making sure not to leave large gaps. Once all
5686 possible sections have been assigned to the current segment it is
5687 added to the list of built segments and if sections still remain
5688 to be assigned, a new segment is constructed before repeating
5689 the loop. */
5690 isec = 0;
5691 do
5692 {
bc67d8a6 5693 map->count = 0;
252b5132 5694 suggested_lma = 0;
0067a569 5695 first_suggested_lma = TRUE;
252b5132
RH
5696
5697 /* Fill the current segment with sections that fit. */
bc67d8a6 5698 for (j = 0; j < section_count; j++)
252b5132 5699 {
bc67d8a6 5700 section = sections[j];
252b5132 5701
bc67d8a6 5702 if (section == NULL)
252b5132
RH
5703 continue;
5704
bc67d8a6 5705 output_section = section->output_section;
252b5132 5706
bc67d8a6 5707 BFD_ASSERT (output_section != NULL);
c044fabd 5708
bc67d8a6
NC
5709 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5710 || IS_COREFILE_NOTE (segment, section))
252b5132 5711 {
bc67d8a6 5712 if (map->count == 0)
252b5132
RH
5713 {
5714 /* If the first section in a segment does not start at
bc67d8a6
NC
5715 the beginning of the segment, then something is
5716 wrong. */
0067a569
AM
5717 if (output_section->lma
5718 != (map->p_paddr
5719 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5720 + (map->includes_phdrs
5721 ? iehdr->e_phnum * iehdr->e_phentsize
5722 : 0)))
252b5132
RH
5723 abort ();
5724 }
5725 else
5726 {
0067a569 5727 asection *prev_sec;
252b5132 5728
bc67d8a6 5729 prev_sec = map->sections[map->count - 1];
252b5132
RH
5730
5731 /* If the gap between the end of the previous section
bc67d8a6
NC
5732 and the start of this section is more than
5733 maxpagesize then we need to start a new segment. */
eea6121a 5734 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5735 maxpagesize)
caf47ea6 5736 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 5737 || (prev_sec->lma + prev_sec->size
079e9a2f 5738 > output_section->lma))
252b5132 5739 {
0067a569
AM
5740 if (first_suggested_lma)
5741 {
5742 suggested_lma = output_section->lma;
5743 first_suggested_lma = FALSE;
5744 }
252b5132
RH
5745
5746 continue;
5747 }
5748 }
5749
bc67d8a6 5750 map->sections[map->count++] = output_section;
252b5132
RH
5751 ++isec;
5752 sections[j] = NULL;
b34976b6 5753 section->segment_mark = TRUE;
252b5132 5754 }
0067a569
AM
5755 else if (first_suggested_lma)
5756 {
5757 suggested_lma = output_section->lma;
5758 first_suggested_lma = FALSE;
5759 }
252b5132
RH
5760 }
5761
bc67d8a6 5762 BFD_ASSERT (map->count > 0);
252b5132
RH
5763
5764 /* Add the current segment to the list of built segments. */
c044fabd
KH
5765 *pointer_to_map = map;
5766 pointer_to_map = &map->next;
252b5132 5767
bc67d8a6 5768 if (isec < section_count)
252b5132
RH
5769 {
5770 /* We still have not allocated all of the sections to
5771 segments. Create a new segment here, initialise it
5772 and carry on looping. */
dc810e39
AM
5773 amt = sizeof (struct elf_segment_map);
5774 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5775 map = (struct elf_segment_map *) bfd_alloc (obfd, amt);
bc67d8a6 5776 if (map == NULL)
5ed6aba4
NC
5777 {
5778 free (sections);
5779 return FALSE;
5780 }
252b5132
RH
5781
5782 /* Initialise the fields of the segment map. Set the physical
5783 physical address to the LMA of the first section that has
5784 not yet been assigned. */
0067a569
AM
5785 map->next = NULL;
5786 map->p_type = segment->p_type;
5787 map->p_flags = segment->p_flags;
5788 map->p_flags_valid = 1;
5789 map->p_paddr = suggested_lma;
5c44b38e 5790 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 5791 map->includes_filehdr = 0;
0067a569 5792 map->includes_phdrs = 0;
252b5132
RH
5793 }
5794 }
bc67d8a6 5795 while (isec < section_count);
252b5132
RH
5796
5797 free (sections);
5798 }
5799
bc67d8a6
NC
5800 elf_tdata (obfd)->segment_map = map_first;
5801
5802 /* If we had to estimate the number of program headers that were
9ad5cbcf 5803 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5804 the offset if necessary. */
5805 if (phdr_adjust_seg != NULL)
5806 {
5807 unsigned int count;
c044fabd 5808
bc67d8a6 5809 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5810 count++;
252b5132 5811
bc67d8a6
NC
5812 if (count > phdr_adjust_num)
5813 phdr_adjust_seg->p_paddr
5814 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5815 }
c044fabd 5816
bc67d8a6 5817#undef SEGMENT_END
eecdbe52 5818#undef SECTION_SIZE
bc67d8a6
NC
5819#undef IS_CONTAINED_BY_VMA
5820#undef IS_CONTAINED_BY_LMA
0efc80c8 5821#undef IS_NOTE
252b5132 5822#undef IS_COREFILE_NOTE
bc67d8a6 5823#undef IS_SOLARIS_PT_INTERP
9f17e2a6 5824#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
5825#undef INCLUDE_SECTION_IN_SEGMENT
5826#undef SEGMENT_AFTER_SEGMENT
5827#undef SEGMENT_OVERLAPS
b34976b6 5828 return TRUE;
252b5132
RH
5829}
5830
84d1d650
L
5831/* Copy ELF program header information. */
5832
5833static bfd_boolean
5834copy_elf_program_header (bfd *ibfd, bfd *obfd)
5835{
5836 Elf_Internal_Ehdr *iehdr;
5837 struct elf_segment_map *map;
5838 struct elf_segment_map *map_first;
5839 struct elf_segment_map **pointer_to_map;
5840 Elf_Internal_Phdr *segment;
5841 unsigned int i;
5842 unsigned int num_segments;
5843 bfd_boolean phdr_included = FALSE;
88967714 5844 bfd_boolean p_paddr_valid;
84d1d650
L
5845
5846 iehdr = elf_elfheader (ibfd);
5847
5848 map_first = NULL;
5849 pointer_to_map = &map_first;
5850
88967714
AM
5851 /* If all the segment p_paddr fields are zero, don't set
5852 map->p_paddr_valid. */
5853 p_paddr_valid = FALSE;
84d1d650 5854 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
5855 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5856 i < num_segments;
5857 i++, segment++)
5858 if (segment->p_paddr != 0)
5859 {
5860 p_paddr_valid = TRUE;
5861 break;
5862 }
5863
84d1d650
L
5864 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5865 i < num_segments;
5866 i++, segment++)
5867 {
5868 asection *section;
5869 unsigned int section_count;
5870 bfd_size_type amt;
5871 Elf_Internal_Shdr *this_hdr;
53020534 5872 asection *first_section = NULL;
a76e6f2f 5873 asection *lowest_section;
84d1d650 5874
84d1d650
L
5875 /* Compute how many sections are in this segment. */
5876 for (section = ibfd->sections, section_count = 0;
5877 section != NULL;
5878 section = section->next)
5879 {
5880 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 5881 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 5882 {
a76e6f2f
AM
5883 if (first_section == NULL)
5884 first_section = section;
3271a814
NS
5885 section_count++;
5886 }
84d1d650
L
5887 }
5888
5889 /* Allocate a segment map big enough to contain
5890 all of the sections we have selected. */
5891 amt = sizeof (struct elf_segment_map);
5892 if (section_count != 0)
5893 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5894 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
5895 if (map == NULL)
5896 return FALSE;
5897
5898 /* Initialize the fields of the output segment map with the
5899 input segment. */
5900 map->next = NULL;
5901 map->p_type = segment->p_type;
5902 map->p_flags = segment->p_flags;
5903 map->p_flags_valid = 1;
5904 map->p_paddr = segment->p_paddr;
88967714 5905 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
5906 map->p_align = segment->p_align;
5907 map->p_align_valid = 1;
3271a814 5908 map->p_vaddr_offset = 0;
84d1d650 5909
9433b9b1 5910 if (map->p_type == PT_GNU_RELRO)
b10a8ae0
L
5911 {
5912 /* The PT_GNU_RELRO segment may contain the first a few
5913 bytes in the .got.plt section even if the whole .got.plt
5914 section isn't in the PT_GNU_RELRO segment. We won't
5915 change the size of the PT_GNU_RELRO segment. */
9433b9b1 5916 map->p_size = segment->p_memsz;
b10a8ae0
L
5917 map->p_size_valid = 1;
5918 }
5919
84d1d650
L
5920 /* Determine if this segment contains the ELF file header
5921 and if it contains the program headers themselves. */
5922 map->includes_filehdr = (segment->p_offset == 0
5923 && segment->p_filesz >= iehdr->e_ehsize);
5924
5925 map->includes_phdrs = 0;
5926 if (! phdr_included || segment->p_type != PT_LOAD)
5927 {
5928 map->includes_phdrs =
5929 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5930 && (segment->p_offset + segment->p_filesz
5931 >= ((bfd_vma) iehdr->e_phoff
5932 + iehdr->e_phnum * iehdr->e_phentsize)));
5933
5934 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5935 phdr_included = TRUE;
5936 }
5937
a76e6f2f 5938 lowest_section = first_section;
84d1d650
L
5939 if (section_count != 0)
5940 {
5941 unsigned int isec = 0;
5942
53020534 5943 for (section = first_section;
84d1d650
L
5944 section != NULL;
5945 section = section->next)
5946 {
5947 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 5948 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
5949 {
5950 map->sections[isec++] = section->output_section;
a76e6f2f
AM
5951 if (section->lma < lowest_section->lma)
5952 lowest_section = section;
5953 if ((section->flags & SEC_ALLOC) != 0)
5954 {
5955 bfd_vma seg_off;
5956
5957 /* Section lmas are set up from PT_LOAD header
5958 p_paddr in _bfd_elf_make_section_from_shdr.
5959 If this header has a p_paddr that disagrees
5960 with the section lma, flag the p_paddr as
5961 invalid. */
5962 if ((section->flags & SEC_LOAD) != 0)
5963 seg_off = this_hdr->sh_offset - segment->p_offset;
5964 else
5965 seg_off = this_hdr->sh_addr - segment->p_vaddr;
5966 if (section->lma - segment->p_paddr != seg_off)
5967 map->p_paddr_valid = FALSE;
5968 }
53020534
L
5969 if (isec == section_count)
5970 break;
5971 }
84d1d650
L
5972 }
5973 }
5974
a76e6f2f
AM
5975 if (map->includes_filehdr && lowest_section != NULL)
5976 /* We need to keep the space used by the headers fixed. */
5977 map->header_size = lowest_section->vma - segment->p_vaddr;
5978
5979 if (!map->includes_phdrs
5980 && !map->includes_filehdr
5981 && map->p_paddr_valid)
5982 /* There is some other padding before the first section. */
5983 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
5984 - segment->p_paddr);
5985
84d1d650
L
5986 map->count = section_count;
5987 *pointer_to_map = map;
5988 pointer_to_map = &map->next;
5989 }
5990
5991 elf_tdata (obfd)->segment_map = map_first;
5992 return TRUE;
5993}
5994
5995/* Copy private BFD data. This copies or rewrites ELF program header
5996 information. */
5997
5998static bfd_boolean
5999copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6000{
84d1d650
L
6001 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6002 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6003 return TRUE;
6004
6005 if (elf_tdata (ibfd)->phdr == NULL)
6006 return TRUE;
6007
6008 if (ibfd->xvec == obfd->xvec)
6009 {
cb3ff1e5
NC
6010 /* Check to see if any sections in the input BFD
6011 covered by ELF program header have changed. */
d55ce4e2 6012 Elf_Internal_Phdr *segment;
84d1d650
L
6013 asection *section, *osec;
6014 unsigned int i, num_segments;
6015 Elf_Internal_Shdr *this_hdr;
147d51c2
L
6016 const struct elf_backend_data *bed;
6017
6018 bed = get_elf_backend_data (ibfd);
6019
6020 /* Regenerate the segment map if p_paddr is set to 0. */
6021 if (bed->want_p_paddr_set_to_zero)
6022 goto rewrite;
84d1d650
L
6023
6024 /* Initialize the segment mark field. */
6025 for (section = obfd->sections; section != NULL;
6026 section = section->next)
6027 section->segment_mark = FALSE;
6028
6029 num_segments = elf_elfheader (ibfd)->e_phnum;
6030 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6031 i < num_segments;
6032 i++, segment++)
6033 {
5f6999aa
NC
6034 /* PR binutils/3535. The Solaris linker always sets the p_paddr
6035 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
6036 which severly confuses things, so always regenerate the segment
6037 map in this case. */
6038 if (segment->p_paddr == 0
6039 && segment->p_memsz == 0
6040 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6041 goto rewrite;
5f6999aa 6042
84d1d650
L
6043 for (section = ibfd->sections;
6044 section != NULL; section = section->next)
6045 {
6046 /* We mark the output section so that we know it comes
6047 from the input BFD. */
6048 osec = section->output_section;
6049 if (osec)
6050 osec->segment_mark = TRUE;
6051
6052 /* Check if this section is covered by the segment. */
6053 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6054 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6055 {
6056 /* FIXME: Check if its output section is changed or
6057 removed. What else do we need to check? */
6058 if (osec == NULL
6059 || section->flags != osec->flags
6060 || section->lma != osec->lma
6061 || section->vma != osec->vma
6062 || section->size != osec->size
6063 || section->rawsize != osec->rawsize
6064 || section->alignment_power != osec->alignment_power)
6065 goto rewrite;
6066 }
6067 }
6068 }
6069
cb3ff1e5 6070 /* Check to see if any output section do not come from the
84d1d650
L
6071 input BFD. */
6072 for (section = obfd->sections; section != NULL;
6073 section = section->next)
6074 {
6075 if (section->segment_mark == FALSE)
6076 goto rewrite;
6077 else
6078 section->segment_mark = FALSE;
6079 }
6080
6081 return copy_elf_program_header (ibfd, obfd);
6082 }
6083
6084rewrite:
6085 return rewrite_elf_program_header (ibfd, obfd);
6086}
6087
ccd2ec6a
L
6088/* Initialize private output section information from input section. */
6089
6090bfd_boolean
6091_bfd_elf_init_private_section_data (bfd *ibfd,
6092 asection *isec,
6093 bfd *obfd,
6094 asection *osec,
6095 struct bfd_link_info *link_info)
6096
6097{
6098 Elf_Internal_Shdr *ihdr, *ohdr;
dfa7b0b8 6099 bfd_boolean final_link = link_info != NULL && !link_info->relocatable;
ccd2ec6a
L
6100
6101 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6102 || obfd->xvec->flavour != bfd_target_elf_flavour)
6103 return TRUE;
6104
dfa7b0b8
AM
6105 /* For objcopy and relocatable link, don't copy the output ELF
6106 section type from input if the output BFD section flags have been
6107 set to something different. For a final link allow some flags
6108 that the linker clears to differ. */
42bb2e33 6109 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6110 && (osec->flags == isec->flags
6111 || (final_link
6112 && ((osec->flags ^ isec->flags)
6113 & ~ (SEC_LINK_ONCE | SEC_LINK_DUPLICATES)) == 0)))
42bb2e33 6114 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6115
6116 /* FIXME: Is this correct for all OS/PROC specific flags? */
6117 elf_section_flags (osec) |= (elf_section_flags (isec)
6118 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6119
6120 /* Set things up for objcopy and relocatable link. The output
6121 SHT_GROUP section will have its elf_next_in_group pointing back
6122 to the input group members. Ignore linker created group section.
6123 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 6124 if (!final_link)
ccd2ec6a
L
6125 {
6126 if (elf_sec_group (isec) == NULL
6127 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6128 {
6129 if (elf_section_flags (isec) & SHF_GROUP)
6130 elf_section_flags (osec) |= SHF_GROUP;
6131 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6132 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6133 }
6134 }
6135
6136 ihdr = &elf_section_data (isec)->this_hdr;
6137
6138 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6139 don't use the output section of the linked-to section since it
6140 may be NULL at this point. */
6141 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6142 {
6143 ohdr = &elf_section_data (osec)->this_hdr;
6144 ohdr->sh_flags |= SHF_LINK_ORDER;
6145 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6146 }
6147
6148 osec->use_rela_p = isec->use_rela_p;
6149
6150 return TRUE;
6151}
6152
252b5132
RH
6153/* Copy private section information. This copies over the entsize
6154 field, and sometimes the info field. */
6155
b34976b6 6156bfd_boolean
217aa764
AM
6157_bfd_elf_copy_private_section_data (bfd *ibfd,
6158 asection *isec,
6159 bfd *obfd,
6160 asection *osec)
252b5132
RH
6161{
6162 Elf_Internal_Shdr *ihdr, *ohdr;
6163
6164 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6165 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6166 return TRUE;
252b5132 6167
252b5132
RH
6168 ihdr = &elf_section_data (isec)->this_hdr;
6169 ohdr = &elf_section_data (osec)->this_hdr;
6170
6171 ohdr->sh_entsize = ihdr->sh_entsize;
6172
6173 if (ihdr->sh_type == SHT_SYMTAB
6174 || ihdr->sh_type == SHT_DYNSYM
6175 || ihdr->sh_type == SHT_GNU_verneed
6176 || ihdr->sh_type == SHT_GNU_verdef)
6177 ohdr->sh_info = ihdr->sh_info;
6178
ccd2ec6a
L
6179 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6180 NULL);
252b5132
RH
6181}
6182
d0bf826b
AM
6183/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
6184 necessary if we are removing either the SHT_GROUP section or any of
6185 the group member sections. DISCARDED is the value that a section's
6186 output_section has if the section will be discarded, NULL when this
6187 function is called from objcopy, bfd_abs_section_ptr when called
6188 from the linker. */
80fccad2
BW
6189
6190bfd_boolean
d0bf826b 6191_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 6192{
30288845
AM
6193 asection *isec;
6194
30288845 6195 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 6196 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
6197 {
6198 asection *first = elf_next_in_group (isec);
6199 asection *s = first;
d0bf826b
AM
6200 bfd_size_type removed = 0;
6201
30288845
AM
6202 while (s != NULL)
6203 {
415f38a6
AM
6204 /* If this member section is being output but the
6205 SHT_GROUP section is not, then clear the group info
6206 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
6207 if (s->output_section != discarded
6208 && isec->output_section == discarded)
30288845
AM
6209 {
6210 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6211 elf_group_name (s->output_section) = NULL;
6212 }
415f38a6
AM
6213 /* Conversely, if the member section is not being output
6214 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
6215 else if (s->output_section == discarded
6216 && isec->output_section != discarded)
6217 removed += 4;
30288845
AM
6218 s = elf_next_in_group (s);
6219 if (s == first)
6220 break;
6221 }
d0bf826b
AM
6222 if (removed != 0)
6223 {
6224 if (discarded != NULL)
6225 {
6226 /* If we've been called for ld -r, then we need to
6227 adjust the input section size. This function may
6228 be called multiple times, so save the original
6229 size. */
6230 if (isec->rawsize == 0)
6231 isec->rawsize = isec->size;
6232 isec->size = isec->rawsize - removed;
6233 }
6234 else
6235 {
6236 /* Adjust the output section size when called from
6237 objcopy. */
6238 isec->output_section->size -= removed;
6239 }
6240 }
30288845
AM
6241 }
6242
80fccad2
BW
6243 return TRUE;
6244}
6245
d0bf826b
AM
6246/* Copy private header information. */
6247
6248bfd_boolean
6249_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6250{
6251 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6252 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6253 return TRUE;
6254
6255 /* Copy over private BFD data if it has not already been copied.
6256 This must be done here, rather than in the copy_private_bfd_data
6257 entry point, because the latter is called after the section
6258 contents have been set, which means that the program headers have
6259 already been worked out. */
6260 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6261 {
6262 if (! copy_private_bfd_data (ibfd, obfd))
6263 return FALSE;
6264 }
6265
6266 return _bfd_elf_fixup_group_sections (ibfd, NULL);
6267}
6268
252b5132
RH
6269/* Copy private symbol information. If this symbol is in a section
6270 which we did not map into a BFD section, try to map the section
6271 index correctly. We use special macro definitions for the mapped
6272 section indices; these definitions are interpreted by the
6273 swap_out_syms function. */
6274
9ad5cbcf
AM
6275#define MAP_ONESYMTAB (SHN_HIOS + 1)
6276#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6277#define MAP_STRTAB (SHN_HIOS + 3)
6278#define MAP_SHSTRTAB (SHN_HIOS + 4)
6279#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6280
b34976b6 6281bfd_boolean
217aa764
AM
6282_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6283 asymbol *isymarg,
6284 bfd *obfd,
6285 asymbol *osymarg)
252b5132
RH
6286{
6287 elf_symbol_type *isym, *osym;
6288
6289 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6290 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6291 return TRUE;
252b5132
RH
6292
6293 isym = elf_symbol_from (ibfd, isymarg);
6294 osym = elf_symbol_from (obfd, osymarg);
6295
6296 if (isym != NULL
8424d8f5 6297 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6298 && osym != NULL
6299 && bfd_is_abs_section (isym->symbol.section))
6300 {
6301 unsigned int shndx;
6302
6303 shndx = isym->internal_elf_sym.st_shndx;
6304 if (shndx == elf_onesymtab (ibfd))
6305 shndx = MAP_ONESYMTAB;
6306 else if (shndx == elf_dynsymtab (ibfd))
6307 shndx = MAP_DYNSYMTAB;
6308 else if (shndx == elf_tdata (ibfd)->strtab_section)
6309 shndx = MAP_STRTAB;
6310 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6311 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6312 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6313 shndx = MAP_SYM_SHNDX;
252b5132
RH
6314 osym->internal_elf_sym.st_shndx = shndx;
6315 }
6316
b34976b6 6317 return TRUE;
252b5132
RH
6318}
6319
6320/* Swap out the symbols. */
6321
b34976b6 6322static bfd_boolean
217aa764
AM
6323swap_out_syms (bfd *abfd,
6324 struct bfd_strtab_hash **sttp,
6325 int relocatable_p)
252b5132 6326{
9c5bfbb7 6327 const struct elf_backend_data *bed;
079e9a2f
AM
6328 int symcount;
6329 asymbol **syms;
6330 struct bfd_strtab_hash *stt;
6331 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6332 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6333 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6334 bfd_byte *outbound_syms;
6335 bfd_byte *outbound_shndx;
079e9a2f
AM
6336 int idx;
6337 bfd_size_type amt;
174fd7f9 6338 bfd_boolean name_local_sections;
252b5132
RH
6339
6340 if (!elf_map_symbols (abfd))
b34976b6 6341 return FALSE;
252b5132 6342
c044fabd 6343 /* Dump out the symtabs. */
079e9a2f
AM
6344 stt = _bfd_elf_stringtab_init ();
6345 if (stt == NULL)
b34976b6 6346 return FALSE;
252b5132 6347
079e9a2f
AM
6348 bed = get_elf_backend_data (abfd);
6349 symcount = bfd_get_symcount (abfd);
6350 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6351 symtab_hdr->sh_type = SHT_SYMTAB;
6352 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6353 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6354 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
72de5009 6355 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6356
6357 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6358 symstrtab_hdr->sh_type = SHT_STRTAB;
6359
a50b1753
NC
6360 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6361 bed->s->sizeof_sym);
079e9a2f 6362 if (outbound_syms == NULL)
5ed6aba4
NC
6363 {
6364 _bfd_stringtab_free (stt);
6365 return FALSE;
6366 }
217aa764 6367 symtab_hdr->contents = outbound_syms;
252b5132 6368
9ad5cbcf
AM
6369 outbound_shndx = NULL;
6370 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6371 if (symtab_shndx_hdr->sh_name != 0)
6372 {
6373 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6374 outbound_shndx = (bfd_byte *)
6375 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6376 if (outbound_shndx == NULL)
5ed6aba4
NC
6377 {
6378 _bfd_stringtab_free (stt);
6379 return FALSE;
6380 }
6381
9ad5cbcf
AM
6382 symtab_shndx_hdr->contents = outbound_shndx;
6383 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6384 symtab_shndx_hdr->sh_size = amt;
6385 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6386 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6387 }
6388
589e6347 6389 /* Now generate the data (for "contents"). */
079e9a2f
AM
6390 {
6391 /* Fill in zeroth symbol and swap it out. */
6392 Elf_Internal_Sym sym;
6393 sym.st_name = 0;
6394 sym.st_value = 0;
6395 sym.st_size = 0;
6396 sym.st_info = 0;
6397 sym.st_other = 0;
6398 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6399 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6400 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6401 if (outbound_shndx != NULL)
6402 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6403 }
252b5132 6404
174fd7f9
RS
6405 name_local_sections
6406 = (bed->elf_backend_name_local_section_symbols
6407 && bed->elf_backend_name_local_section_symbols (abfd));
6408
079e9a2f
AM
6409 syms = bfd_get_outsymbols (abfd);
6410 for (idx = 0; idx < symcount; idx++)
252b5132 6411 {
252b5132 6412 Elf_Internal_Sym sym;
079e9a2f
AM
6413 bfd_vma value = syms[idx]->value;
6414 elf_symbol_type *type_ptr;
6415 flagword flags = syms[idx]->flags;
6416 int type;
252b5132 6417
174fd7f9
RS
6418 if (!name_local_sections
6419 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6420 {
6421 /* Local section symbols have no name. */
6422 sym.st_name = 0;
6423 }
6424 else
6425 {
6426 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6427 syms[idx]->name,
b34976b6 6428 TRUE, FALSE);
079e9a2f 6429 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6430 {
6431 _bfd_stringtab_free (stt);
6432 return FALSE;
6433 }
079e9a2f 6434 }
252b5132 6435
079e9a2f 6436 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6437
079e9a2f
AM
6438 if ((flags & BSF_SECTION_SYM) == 0
6439 && bfd_is_com_section (syms[idx]->section))
6440 {
6441 /* ELF common symbols put the alignment into the `value' field,
6442 and the size into the `size' field. This is backwards from
6443 how BFD handles it, so reverse it here. */
6444 sym.st_size = value;
6445 if (type_ptr == NULL
6446 || type_ptr->internal_elf_sym.st_value == 0)
6447 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6448 else
6449 sym.st_value = type_ptr->internal_elf_sym.st_value;
6450 sym.st_shndx = _bfd_elf_section_from_bfd_section
6451 (abfd, syms[idx]->section);
6452 }
6453 else
6454 {
6455 asection *sec = syms[idx]->section;
cb33740c 6456 unsigned int shndx;
252b5132 6457
079e9a2f
AM
6458 if (sec->output_section)
6459 {
6460 value += sec->output_offset;
6461 sec = sec->output_section;
6462 }
589e6347 6463
079e9a2f
AM
6464 /* Don't add in the section vma for relocatable output. */
6465 if (! relocatable_p)
6466 value += sec->vma;
6467 sym.st_value = value;
6468 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6469
6470 if (bfd_is_abs_section (sec)
6471 && type_ptr != NULL
6472 && type_ptr->internal_elf_sym.st_shndx != 0)
6473 {
6474 /* This symbol is in a real ELF section which we did
6475 not create as a BFD section. Undo the mapping done
6476 by copy_private_symbol_data. */
6477 shndx = type_ptr->internal_elf_sym.st_shndx;
6478 switch (shndx)
6479 {
6480 case MAP_ONESYMTAB:
6481 shndx = elf_onesymtab (abfd);
6482 break;
6483 case MAP_DYNSYMTAB:
6484 shndx = elf_dynsymtab (abfd);
6485 break;
6486 case MAP_STRTAB:
6487 shndx = elf_tdata (abfd)->strtab_section;
6488 break;
6489 case MAP_SHSTRTAB:
6490 shndx = elf_tdata (abfd)->shstrtab_section;
6491 break;
9ad5cbcf
AM
6492 case MAP_SYM_SHNDX:
6493 shndx = elf_tdata (abfd)->symtab_shndx_section;
6494 break;
079e9a2f
AM
6495 default:
6496 break;
6497 }
6498 }
6499 else
6500 {
6501 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6502
cb33740c 6503 if (shndx == SHN_BAD)
079e9a2f
AM
6504 {
6505 asection *sec2;
6506
6507 /* Writing this would be a hell of a lot easier if
6508 we had some decent documentation on bfd, and
6509 knew what to expect of the library, and what to
6510 demand of applications. For example, it
6511 appears that `objcopy' might not set the
6512 section of a symbol to be a section that is
6513 actually in the output file. */
6514 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6515 if (sec2 == NULL)
6516 {
6517 _bfd_error_handler (_("\
6518Unable to find equivalent output section for symbol '%s' from section '%s'"),
6519 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6520 sec->name);
811072d8 6521 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6522 _bfd_stringtab_free (stt);
589e6347
NC
6523 return FALSE;
6524 }
811072d8 6525
079e9a2f 6526 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6527 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6528 }
6529 }
252b5132 6530
079e9a2f
AM
6531 sym.st_shndx = shndx;
6532 }
252b5132 6533
13ae64f3
JJ
6534 if ((flags & BSF_THREAD_LOCAL) != 0)
6535 type = STT_TLS;
d8045f23
NC
6536 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6537 type = STT_GNU_IFUNC;
13ae64f3 6538 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6539 type = STT_FUNC;
6540 else if ((flags & BSF_OBJECT) != 0)
6541 type = STT_OBJECT;
d9352518
DB
6542 else if ((flags & BSF_RELC) != 0)
6543 type = STT_RELC;
6544 else if ((flags & BSF_SRELC) != 0)
6545 type = STT_SRELC;
079e9a2f
AM
6546 else
6547 type = STT_NOTYPE;
252b5132 6548
13ae64f3
JJ
6549 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6550 type = STT_TLS;
6551
589e6347 6552 /* Processor-specific types. */
079e9a2f
AM
6553 if (type_ptr != NULL
6554 && bed->elf_backend_get_symbol_type)
6555 type = ((*bed->elf_backend_get_symbol_type)
6556 (&type_ptr->internal_elf_sym, type));
252b5132 6557
079e9a2f
AM
6558 if (flags & BSF_SECTION_SYM)
6559 {
6560 if (flags & BSF_GLOBAL)
6561 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6562 else
6563 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6564 }
6565 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6566 {
504b7d20 6567#ifdef USE_STT_COMMON
0a40daed
MK
6568 if (type == STT_OBJECT)
6569 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6570 else
504b7d20 6571#endif
c91e322a 6572 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6573 }
079e9a2f
AM
6574 else if (bfd_is_und_section (syms[idx]->section))
6575 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6576 ? STB_WEAK
6577 : STB_GLOBAL),
6578 type);
6579 else if (flags & BSF_FILE)
6580 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6581 else
6582 {
6583 int bind = STB_LOCAL;
252b5132 6584
079e9a2f
AM
6585 if (flags & BSF_LOCAL)
6586 bind = STB_LOCAL;
3e7a7d11
NC
6587 else if (flags & BSF_GNU_UNIQUE)
6588 bind = STB_GNU_UNIQUE;
079e9a2f
AM
6589 else if (flags & BSF_WEAK)
6590 bind = STB_WEAK;
6591 else if (flags & BSF_GLOBAL)
6592 bind = STB_GLOBAL;
252b5132 6593
079e9a2f
AM
6594 sym.st_info = ELF_ST_INFO (bind, type);
6595 }
252b5132 6596
079e9a2f
AM
6597 if (type_ptr != NULL)
6598 sym.st_other = type_ptr->internal_elf_sym.st_other;
6599 else
6600 sym.st_other = 0;
252b5132 6601
9ad5cbcf 6602 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6603 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6604 if (outbound_shndx != NULL)
6605 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6606 }
252b5132 6607
079e9a2f
AM
6608 *sttp = stt;
6609 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6610 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6611
079e9a2f
AM
6612 symstrtab_hdr->sh_flags = 0;
6613 symstrtab_hdr->sh_addr = 0;
6614 symstrtab_hdr->sh_entsize = 0;
6615 symstrtab_hdr->sh_link = 0;
6616 symstrtab_hdr->sh_info = 0;
6617 symstrtab_hdr->sh_addralign = 1;
252b5132 6618
b34976b6 6619 return TRUE;
252b5132
RH
6620}
6621
6622/* Return the number of bytes required to hold the symtab vector.
6623
6624 Note that we base it on the count plus 1, since we will null terminate
6625 the vector allocated based on this size. However, the ELF symbol table
6626 always has a dummy entry as symbol #0, so it ends up even. */
6627
6628long
217aa764 6629_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6630{
6631 long symcount;
6632 long symtab_size;
6633 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6634
6635 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6636 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6637 if (symcount > 0)
6638 symtab_size -= sizeof (asymbol *);
252b5132
RH
6639
6640 return symtab_size;
6641}
6642
6643long
217aa764 6644_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6645{
6646 long symcount;
6647 long symtab_size;
6648 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6649
6650 if (elf_dynsymtab (abfd) == 0)
6651 {
6652 bfd_set_error (bfd_error_invalid_operation);
6653 return -1;
6654 }
6655
6656 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6657 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6658 if (symcount > 0)
6659 symtab_size -= sizeof (asymbol *);
252b5132
RH
6660
6661 return symtab_size;
6662}
6663
6664long
217aa764
AM
6665_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6666 sec_ptr asect)
252b5132
RH
6667{
6668 return (asect->reloc_count + 1) * sizeof (arelent *);
6669}
6670
6671/* Canonicalize the relocs. */
6672
6673long
217aa764
AM
6674_bfd_elf_canonicalize_reloc (bfd *abfd,
6675 sec_ptr section,
6676 arelent **relptr,
6677 asymbol **symbols)
252b5132
RH
6678{
6679 arelent *tblptr;
6680 unsigned int i;
9c5bfbb7 6681 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6682
b34976b6 6683 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6684 return -1;
6685
6686 tblptr = section->relocation;
6687 for (i = 0; i < section->reloc_count; i++)
6688 *relptr++ = tblptr++;
6689
6690 *relptr = NULL;
6691
6692 return section->reloc_count;
6693}
6694
6695long
6cee3f79 6696_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6697{
9c5bfbb7 6698 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6699 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6700
6701 if (symcount >= 0)
6702 bfd_get_symcount (abfd) = symcount;
6703 return symcount;
6704}
6705
6706long
217aa764
AM
6707_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6708 asymbol **allocation)
252b5132 6709{
9c5bfbb7 6710 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6711 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6712
6713 if (symcount >= 0)
6714 bfd_get_dynamic_symcount (abfd) = symcount;
6715 return symcount;
252b5132
RH
6716}
6717
8615f3f2
AM
6718/* Return the size required for the dynamic reloc entries. Any loadable
6719 section that was actually installed in the BFD, and has type SHT_REL
6720 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6721 dynamic reloc section. */
252b5132
RH
6722
6723long
217aa764 6724_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6725{
6726 long ret;
6727 asection *s;
6728
6729 if (elf_dynsymtab (abfd) == 0)
6730 {
6731 bfd_set_error (bfd_error_invalid_operation);
6732 return -1;
6733 }
6734
6735 ret = sizeof (arelent *);
6736 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 6737 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6738 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6739 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6740 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6741 * sizeof (arelent *));
6742
6743 return ret;
6744}
6745
8615f3f2
AM
6746/* Canonicalize the dynamic relocation entries. Note that we return the
6747 dynamic relocations as a single block, although they are actually
6748 associated with particular sections; the interface, which was
6749 designed for SunOS style shared libraries, expects that there is only
6750 one set of dynamic relocs. Any loadable section that was actually
6751 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6752 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6753
6754long
217aa764
AM
6755_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6756 arelent **storage,
6757 asymbol **syms)
252b5132 6758{
217aa764 6759 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6760 asection *s;
6761 long ret;
6762
6763 if (elf_dynsymtab (abfd) == 0)
6764 {
6765 bfd_set_error (bfd_error_invalid_operation);
6766 return -1;
6767 }
6768
6769 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6770 ret = 0;
6771 for (s = abfd->sections; s != NULL; s = s->next)
6772 {
266b05cf 6773 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6774 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6775 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6776 {
6777 arelent *p;
6778 long count, i;
6779
b34976b6 6780 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6781 return -1;
eea6121a 6782 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6783 p = s->relocation;
6784 for (i = 0; i < count; i++)
6785 *storage++ = p++;
6786 ret += count;
6787 }
6788 }
6789
6790 *storage = NULL;
6791
6792 return ret;
6793}
6794\f
6795/* Read in the version information. */
6796
b34976b6 6797bfd_boolean
fc0e6df6 6798_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6799{
6800 bfd_byte *contents = NULL;
fc0e6df6
PB
6801 unsigned int freeidx = 0;
6802
6803 if (elf_dynverref (abfd) != 0)
6804 {
6805 Elf_Internal_Shdr *hdr;
6806 Elf_External_Verneed *everneed;
6807 Elf_Internal_Verneed *iverneed;
6808 unsigned int i;
d0fb9a8d 6809 bfd_byte *contents_end;
fc0e6df6
PB
6810
6811 hdr = &elf_tdata (abfd)->dynverref_hdr;
6812
a50b1753
NC
6813 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
6814 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6815 if (elf_tdata (abfd)->verref == NULL)
6816 goto error_return;
6817
6818 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6819
a50b1753 6820 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
fc0e6df6 6821 if (contents == NULL)
d0fb9a8d
JJ
6822 {
6823error_return_verref:
6824 elf_tdata (abfd)->verref = NULL;
6825 elf_tdata (abfd)->cverrefs = 0;
6826 goto error_return;
6827 }
fc0e6df6
PB
6828 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6829 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6830 goto error_return_verref;
fc0e6df6 6831
d0fb9a8d
JJ
6832 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6833 goto error_return_verref;
6834
6835 BFD_ASSERT (sizeof (Elf_External_Verneed)
6836 == sizeof (Elf_External_Vernaux));
6837 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6838 everneed = (Elf_External_Verneed *) contents;
6839 iverneed = elf_tdata (abfd)->verref;
6840 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6841 {
6842 Elf_External_Vernaux *evernaux;
6843 Elf_Internal_Vernaux *ivernaux;
6844 unsigned int j;
6845
6846 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6847
6848 iverneed->vn_bfd = abfd;
6849
6850 iverneed->vn_filename =
6851 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6852 iverneed->vn_file);
6853 if (iverneed->vn_filename == NULL)
d0fb9a8d 6854 goto error_return_verref;
fc0e6df6 6855
d0fb9a8d
JJ
6856 if (iverneed->vn_cnt == 0)
6857 iverneed->vn_auxptr = NULL;
6858 else
6859 {
a50b1753
NC
6860 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
6861 bfd_alloc2 (abfd, iverneed->vn_cnt,
6862 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
6863 if (iverneed->vn_auxptr == NULL)
6864 goto error_return_verref;
6865 }
6866
6867 if (iverneed->vn_aux
6868 > (size_t) (contents_end - (bfd_byte *) everneed))
6869 goto error_return_verref;
fc0e6df6
PB
6870
6871 evernaux = ((Elf_External_Vernaux *)
6872 ((bfd_byte *) everneed + iverneed->vn_aux));
6873 ivernaux = iverneed->vn_auxptr;
6874 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6875 {
6876 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6877
6878 ivernaux->vna_nodename =
6879 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6880 ivernaux->vna_name);
6881 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6882 goto error_return_verref;
fc0e6df6
PB
6883
6884 if (j + 1 < iverneed->vn_cnt)
6885 ivernaux->vna_nextptr = ivernaux + 1;
6886 else
6887 ivernaux->vna_nextptr = NULL;
6888
d0fb9a8d
JJ
6889 if (ivernaux->vna_next
6890 > (size_t) (contents_end - (bfd_byte *) evernaux))
6891 goto error_return_verref;
6892
fc0e6df6
PB
6893 evernaux = ((Elf_External_Vernaux *)
6894 ((bfd_byte *) evernaux + ivernaux->vna_next));
6895
6896 if (ivernaux->vna_other > freeidx)
6897 freeidx = ivernaux->vna_other;
6898 }
6899
6900 if (i + 1 < hdr->sh_info)
6901 iverneed->vn_nextref = iverneed + 1;
6902 else
6903 iverneed->vn_nextref = NULL;
6904
d0fb9a8d
JJ
6905 if (iverneed->vn_next
6906 > (size_t) (contents_end - (bfd_byte *) everneed))
6907 goto error_return_verref;
6908
fc0e6df6
PB
6909 everneed = ((Elf_External_Verneed *)
6910 ((bfd_byte *) everneed + iverneed->vn_next));
6911 }
6912
6913 free (contents);
6914 contents = NULL;
6915 }
252b5132
RH
6916
6917 if (elf_dynverdef (abfd) != 0)
6918 {
6919 Elf_Internal_Shdr *hdr;
6920 Elf_External_Verdef *everdef;
6921 Elf_Internal_Verdef *iverdef;
f631889e
UD
6922 Elf_Internal_Verdef *iverdefarr;
6923 Elf_Internal_Verdef iverdefmem;
252b5132 6924 unsigned int i;
062e2358 6925 unsigned int maxidx;
d0fb9a8d 6926 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6927
6928 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6929
a50b1753 6930 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132
RH
6931 if (contents == NULL)
6932 goto error_return;
6933 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6934 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6935 goto error_return;
6936
d0fb9a8d
JJ
6937 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6938 goto error_return;
6939
6940 BFD_ASSERT (sizeof (Elf_External_Verdef)
6941 >= sizeof (Elf_External_Verdaux));
6942 contents_end_def = contents + hdr->sh_size
6943 - sizeof (Elf_External_Verdef);
6944 contents_end_aux = contents + hdr->sh_size
6945 - sizeof (Elf_External_Verdaux);
6946
f631889e
UD
6947 /* We know the number of entries in the section but not the maximum
6948 index. Therefore we have to run through all entries and find
6949 the maximum. */
252b5132 6950 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6951 maxidx = 0;
6952 for (i = 0; i < hdr->sh_info; ++i)
6953 {
6954 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6955
062e2358
AM
6956 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6957 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6958
d0fb9a8d
JJ
6959 if (iverdefmem.vd_next
6960 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6961 goto error_return;
6962
f631889e
UD
6963 everdef = ((Elf_External_Verdef *)
6964 ((bfd_byte *) everdef + iverdefmem.vd_next));
6965 }
6966
fc0e6df6
PB
6967 if (default_imported_symver)
6968 {
6969 if (freeidx > maxidx)
6970 maxidx = ++freeidx;
6971 else
6972 freeidx = ++maxidx;
6973 }
a50b1753
NC
6974 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
6975 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e
UD
6976 if (elf_tdata (abfd)->verdef == NULL)
6977 goto error_return;
6978
6979 elf_tdata (abfd)->cverdefs = maxidx;
6980
6981 everdef = (Elf_External_Verdef *) contents;
6982 iverdefarr = elf_tdata (abfd)->verdef;
6983 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6984 {
6985 Elf_External_Verdaux *everdaux;
6986 Elf_Internal_Verdaux *iverdaux;
6987 unsigned int j;
6988
f631889e
UD
6989 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6990
d0fb9a8d
JJ
6991 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6992 {
6993error_return_verdef:
6994 elf_tdata (abfd)->verdef = NULL;
6995 elf_tdata (abfd)->cverdefs = 0;
6996 goto error_return;
6997 }
6998
f631889e
UD
6999 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
7000 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
7001
7002 iverdef->vd_bfd = abfd;
7003
d0fb9a8d
JJ
7004 if (iverdef->vd_cnt == 0)
7005 iverdef->vd_auxptr = NULL;
7006 else
7007 {
a50b1753
NC
7008 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7009 bfd_alloc2 (abfd, iverdef->vd_cnt,
7010 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7011 if (iverdef->vd_auxptr == NULL)
7012 goto error_return_verdef;
7013 }
7014
7015 if (iverdef->vd_aux
7016 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
7017 goto error_return_verdef;
252b5132
RH
7018
7019 everdaux = ((Elf_External_Verdaux *)
7020 ((bfd_byte *) everdef + iverdef->vd_aux));
7021 iverdaux = iverdef->vd_auxptr;
7022 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
7023 {
7024 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
7025
7026 iverdaux->vda_nodename =
7027 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7028 iverdaux->vda_name);
7029 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 7030 goto error_return_verdef;
252b5132
RH
7031
7032 if (j + 1 < iverdef->vd_cnt)
7033 iverdaux->vda_nextptr = iverdaux + 1;
7034 else
7035 iverdaux->vda_nextptr = NULL;
7036
d0fb9a8d
JJ
7037 if (iverdaux->vda_next
7038 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
7039 goto error_return_verdef;
7040
252b5132
RH
7041 everdaux = ((Elf_External_Verdaux *)
7042 ((bfd_byte *) everdaux + iverdaux->vda_next));
7043 }
7044
d0fb9a8d
JJ
7045 if (iverdef->vd_cnt)
7046 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 7047
d0fb9a8d 7048 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
7049 iverdef->vd_nextdef = iverdef + 1;
7050 else
7051 iverdef->vd_nextdef = NULL;
7052
7053 everdef = ((Elf_External_Verdef *)
7054 ((bfd_byte *) everdef + iverdef->vd_next));
7055 }
7056
7057 free (contents);
7058 contents = NULL;
7059 }
fc0e6df6 7060 else if (default_imported_symver)
252b5132 7061 {
fc0e6df6
PB
7062 if (freeidx < 3)
7063 freeidx = 3;
7064 else
7065 freeidx++;
252b5132 7066
a50b1753
NC
7067 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7068 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 7069 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
7070 goto error_return;
7071
fc0e6df6
PB
7072 elf_tdata (abfd)->cverdefs = freeidx;
7073 }
252b5132 7074
fc0e6df6
PB
7075 /* Create a default version based on the soname. */
7076 if (default_imported_symver)
7077 {
7078 Elf_Internal_Verdef *iverdef;
7079 Elf_Internal_Verdaux *iverdaux;
252b5132 7080
fc0e6df6 7081 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 7082
fc0e6df6
PB
7083 iverdef->vd_version = VER_DEF_CURRENT;
7084 iverdef->vd_flags = 0;
7085 iverdef->vd_ndx = freeidx;
7086 iverdef->vd_cnt = 1;
252b5132 7087
fc0e6df6 7088 iverdef->vd_bfd = abfd;
252b5132 7089
fc0e6df6
PB
7090 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
7091 if (iverdef->vd_nodename == NULL)
d0fb9a8d 7092 goto error_return_verdef;
fc0e6df6 7093 iverdef->vd_nextdef = NULL;
a50b1753
NC
7094 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7095 bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7096 if (iverdef->vd_auxptr == NULL)
7097 goto error_return_verdef;
252b5132 7098
fc0e6df6
PB
7099 iverdaux = iverdef->vd_auxptr;
7100 iverdaux->vda_nodename = iverdef->vd_nodename;
7101 iverdaux->vda_nextptr = NULL;
252b5132
RH
7102 }
7103
b34976b6 7104 return TRUE;
252b5132
RH
7105
7106 error_return:
5ed6aba4 7107 if (contents != NULL)
252b5132 7108 free (contents);
b34976b6 7109 return FALSE;
252b5132
RH
7110}
7111\f
7112asymbol *
217aa764 7113_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7114{
7115 elf_symbol_type *newsym;
dc810e39 7116 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 7117
a50b1753 7118 newsym = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132
RH
7119 if (!newsym)
7120 return NULL;
7121 else
7122 {
7123 newsym->symbol.the_bfd = abfd;
7124 return &newsym->symbol;
7125 }
7126}
7127
7128void
217aa764
AM
7129_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7130 asymbol *symbol,
7131 symbol_info *ret)
252b5132
RH
7132{
7133 bfd_symbol_info (symbol, ret);
7134}
7135
7136/* Return whether a symbol name implies a local symbol. Most targets
7137 use this function for the is_local_label_name entry point, but some
7138 override it. */
7139
b34976b6 7140bfd_boolean
217aa764
AM
7141_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7142 const char *name)
252b5132
RH
7143{
7144 /* Normal local symbols start with ``.L''. */
7145 if (name[0] == '.' && name[1] == 'L')
b34976b6 7146 return TRUE;
252b5132
RH
7147
7148 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7149 DWARF debugging symbols starting with ``..''. */
7150 if (name[0] == '.' && name[1] == '.')
b34976b6 7151 return TRUE;
252b5132
RH
7152
7153 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7154 emitting DWARF debugging output. I suspect this is actually a
7155 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7156 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7157 underscore to be emitted on some ELF targets). For ease of use,
7158 we treat such symbols as local. */
7159 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7160 return TRUE;
252b5132 7161
b34976b6 7162 return FALSE;
252b5132
RH
7163}
7164
7165alent *
217aa764
AM
7166_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7167 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7168{
7169 abort ();
7170 return NULL;
7171}
7172
b34976b6 7173bfd_boolean
217aa764
AM
7174_bfd_elf_set_arch_mach (bfd *abfd,
7175 enum bfd_architecture arch,
7176 unsigned long machine)
252b5132
RH
7177{
7178 /* If this isn't the right architecture for this backend, and this
7179 isn't the generic backend, fail. */
7180 if (arch != get_elf_backend_data (abfd)->arch
7181 && arch != bfd_arch_unknown
7182 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7183 return FALSE;
252b5132
RH
7184
7185 return bfd_default_set_arch_mach (abfd, arch, machine);
7186}
7187
d1fad7c6
NC
7188/* Find the function to a particular section and offset,
7189 for error reporting. */
252b5132 7190
b34976b6 7191static bfd_boolean
b9d678e0 7192elf_find_function (bfd *abfd,
217aa764
AM
7193 asection *section,
7194 asymbol **symbols,
7195 bfd_vma offset,
7196 const char **filename_ptr,
7197 const char **functionname_ptr)
252b5132 7198{
252b5132 7199 const char *filename;
57426232 7200 asymbol *func, *file;
252b5132
RH
7201 bfd_vma low_func;
7202 asymbol **p;
57426232
JB
7203 /* ??? Given multiple file symbols, it is impossible to reliably
7204 choose the right file name for global symbols. File symbols are
7205 local symbols, and thus all file symbols must sort before any
7206 global symbols. The ELF spec may be interpreted to say that a
7207 file symbol must sort before other local symbols, but currently
7208 ld -r doesn't do this. So, for ld -r output, it is possible to
7209 make a better choice of file name for local symbols by ignoring
7210 file symbols appearing after a given local symbol. */
7211 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
b9d678e0 7212 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7213
252b5132
RH
7214 filename = NULL;
7215 func = NULL;
57426232 7216 file = NULL;
252b5132 7217 low_func = 0;
57426232 7218 state = nothing_seen;
252b5132
RH
7219
7220 for (p = symbols; *p != NULL; p++)
7221 {
7222 elf_symbol_type *q;
b9d678e0 7223 unsigned int type;
252b5132
RH
7224
7225 q = (elf_symbol_type *) *p;
7226
b9d678e0
L
7227 type = ELF_ST_TYPE (q->internal_elf_sym.st_info);
7228 switch (type)
252b5132 7229 {
252b5132 7230 case STT_FILE:
57426232
JB
7231 file = &q->symbol;
7232 if (state == symbol_seen)
7233 state = file_after_symbol_seen;
7234 continue;
b9d678e0
L
7235 default:
7236 if (!bed->is_function_type (type))
7237 break;
252b5132 7238 case STT_NOTYPE:
6b40fcba 7239 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7240 && q->symbol.value >= low_func
7241 && q->symbol.value <= offset)
7242 {
7243 func = (asymbol *) q;
7244 low_func = q->symbol.value;
a1923858
AM
7245 filename = NULL;
7246 if (file != NULL
7247 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7248 || state != file_after_symbol_seen))
57426232 7249 filename = bfd_asymbol_name (file);
252b5132
RH
7250 }
7251 break;
7252 }
57426232
JB
7253 if (state == nothing_seen)
7254 state = symbol_seen;
252b5132
RH
7255 }
7256
7257 if (func == NULL)
b34976b6 7258 return FALSE;
252b5132 7259
d1fad7c6
NC
7260 if (filename_ptr)
7261 *filename_ptr = filename;
7262 if (functionname_ptr)
7263 *functionname_ptr = bfd_asymbol_name (func);
7264
b34976b6 7265 return TRUE;
d1fad7c6
NC
7266}
7267
7268/* Find the nearest line to a particular section and offset,
7269 for error reporting. */
7270
b34976b6 7271bfd_boolean
217aa764
AM
7272_bfd_elf_find_nearest_line (bfd *abfd,
7273 asection *section,
7274 asymbol **symbols,
7275 bfd_vma offset,
7276 const char **filename_ptr,
7277 const char **functionname_ptr,
7278 unsigned int *line_ptr)
d1fad7c6 7279{
b34976b6 7280 bfd_boolean found;
d1fad7c6
NC
7281
7282 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7283 filename_ptr, functionname_ptr,
7284 line_ptr))
d1fad7c6
NC
7285 {
7286 if (!*functionname_ptr)
4e8a9624
AM
7287 elf_find_function (abfd, section, symbols, offset,
7288 *filename_ptr ? NULL : filename_ptr,
7289 functionname_ptr);
7290
b34976b6 7291 return TRUE;
d1fad7c6
NC
7292 }
7293
7294 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7295 filename_ptr, functionname_ptr,
7296 line_ptr, 0,
7297 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7298 {
7299 if (!*functionname_ptr)
4e8a9624
AM
7300 elf_find_function (abfd, section, symbols, offset,
7301 *filename_ptr ? NULL : filename_ptr,
7302 functionname_ptr);
7303
b34976b6 7304 return TRUE;
d1fad7c6
NC
7305 }
7306
7307 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7308 &found, filename_ptr,
7309 functionname_ptr, line_ptr,
7310 &elf_tdata (abfd)->line_info))
b34976b6 7311 return FALSE;
dc43ada5 7312 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7313 return TRUE;
d1fad7c6
NC
7314
7315 if (symbols == NULL)
b34976b6 7316 return FALSE;
d1fad7c6
NC
7317
7318 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7319 filename_ptr, functionname_ptr))
b34976b6 7320 return FALSE;
d1fad7c6 7321
252b5132 7322 *line_ptr = 0;
b34976b6 7323 return TRUE;
252b5132
RH
7324}
7325
5420f73d
L
7326/* Find the line for a symbol. */
7327
7328bfd_boolean
7329_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7330 const char **filename_ptr, unsigned int *line_ptr)
7331{
7332 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7333 filename_ptr, line_ptr, 0,
7334 &elf_tdata (abfd)->dwarf2_find_line_info);
7335}
7336
4ab527b0
FF
7337/* After a call to bfd_find_nearest_line, successive calls to
7338 bfd_find_inliner_info can be used to get source information about
7339 each level of function inlining that terminated at the address
7340 passed to bfd_find_nearest_line. Currently this is only supported
7341 for DWARF2 with appropriate DWARF3 extensions. */
7342
7343bfd_boolean
7344_bfd_elf_find_inliner_info (bfd *abfd,
7345 const char **filename_ptr,
7346 const char **functionname_ptr,
7347 unsigned int *line_ptr)
7348{
7349 bfd_boolean found;
7350 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7351 functionname_ptr, line_ptr,
7352 & elf_tdata (abfd)->dwarf2_find_line_info);
7353 return found;
7354}
7355
252b5132 7356int
a6b96beb 7357_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7358{
8ded5a0f
AM
7359 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7360 int ret = bed->s->sizeof_ehdr;
252b5132 7361
a6b96beb 7362 if (!info->relocatable)
8ded5a0f 7363 {
62d7a5f6 7364 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7365
62d7a5f6
AM
7366 if (phdr_size == (bfd_size_type) -1)
7367 {
7368 struct elf_segment_map *m;
7369
7370 phdr_size = 0;
7371 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7372 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7373
62d7a5f6
AM
7374 if (phdr_size == 0)
7375 phdr_size = get_program_header_size (abfd, info);
7376 }
8ded5a0f
AM
7377
7378 elf_tdata (abfd)->program_header_size = phdr_size;
7379 ret += phdr_size;
7380 }
7381
252b5132
RH
7382 return ret;
7383}
7384
b34976b6 7385bfd_boolean
217aa764
AM
7386_bfd_elf_set_section_contents (bfd *abfd,
7387 sec_ptr section,
0f867abe 7388 const void *location,
217aa764
AM
7389 file_ptr offset,
7390 bfd_size_type count)
252b5132
RH
7391{
7392 Elf_Internal_Shdr *hdr;
dc810e39 7393 bfd_signed_vma pos;
252b5132
RH
7394
7395 if (! abfd->output_has_begun
217aa764 7396 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7397 return FALSE;
252b5132
RH
7398
7399 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7400 pos = hdr->sh_offset + offset;
7401 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7402 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7403 return FALSE;
252b5132 7404
b34976b6 7405 return TRUE;
252b5132
RH
7406}
7407
7408void
217aa764
AM
7409_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7410 arelent *cache_ptr ATTRIBUTE_UNUSED,
7411 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7412{
7413 abort ();
7414}
7415
252b5132
RH
7416/* Try to convert a non-ELF reloc into an ELF one. */
7417
b34976b6 7418bfd_boolean
217aa764 7419_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7420{
c044fabd 7421 /* Check whether we really have an ELF howto. */
252b5132
RH
7422
7423 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7424 {
7425 bfd_reloc_code_real_type code;
7426 reloc_howto_type *howto;
7427
7428 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7429 equivalent ELF reloc. */
252b5132
RH
7430
7431 if (areloc->howto->pc_relative)
7432 {
7433 switch (areloc->howto->bitsize)
7434 {
7435 case 8:
7436 code = BFD_RELOC_8_PCREL;
7437 break;
7438 case 12:
7439 code = BFD_RELOC_12_PCREL;
7440 break;
7441 case 16:
7442 code = BFD_RELOC_16_PCREL;
7443 break;
7444 case 24:
7445 code = BFD_RELOC_24_PCREL;
7446 break;
7447 case 32:
7448 code = BFD_RELOC_32_PCREL;
7449 break;
7450 case 64:
7451 code = BFD_RELOC_64_PCREL;
7452 break;
7453 default:
7454 goto fail;
7455 }
7456
7457 howto = bfd_reloc_type_lookup (abfd, code);
7458
7459 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7460 {
7461 if (howto->pcrel_offset)
7462 areloc->addend += areloc->address;
7463 else
7464 areloc->addend -= areloc->address; /* addend is unsigned!! */
7465 }
7466 }
7467 else
7468 {
7469 switch (areloc->howto->bitsize)
7470 {
7471 case 8:
7472 code = BFD_RELOC_8;
7473 break;
7474 case 14:
7475 code = BFD_RELOC_14;
7476 break;
7477 case 16:
7478 code = BFD_RELOC_16;
7479 break;
7480 case 26:
7481 code = BFD_RELOC_26;
7482 break;
7483 case 32:
7484 code = BFD_RELOC_32;
7485 break;
7486 case 64:
7487 code = BFD_RELOC_64;
7488 break;
7489 default:
7490 goto fail;
7491 }
7492
7493 howto = bfd_reloc_type_lookup (abfd, code);
7494 }
7495
7496 if (howto)
7497 areloc->howto = howto;
7498 else
7499 goto fail;
7500 }
7501
b34976b6 7502 return TRUE;
252b5132
RH
7503
7504 fail:
7505 (*_bfd_error_handler)
d003868e
AM
7506 (_("%B: unsupported relocation type %s"),
7507 abfd, areloc->howto->name);
252b5132 7508 bfd_set_error (bfd_error_bad_value);
b34976b6 7509 return FALSE;
252b5132
RH
7510}
7511
b34976b6 7512bfd_boolean
217aa764 7513_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7514{
7515 if (bfd_get_format (abfd) == bfd_object)
7516 {
b25e3d87 7517 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7518 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7519 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7520 }
7521
7522 return _bfd_generic_close_and_cleanup (abfd);
7523}
7524
7525/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7526 in the relocation's offset. Thus we cannot allow any sort of sanity
7527 range-checking to interfere. There is nothing else to do in processing
7528 this reloc. */
7529
7530bfd_reloc_status_type
217aa764
AM
7531_bfd_elf_rel_vtable_reloc_fn
7532 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7533 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7534 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7535 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7536{
7537 return bfd_reloc_ok;
7538}
252b5132
RH
7539\f
7540/* Elf core file support. Much of this only works on native
7541 toolchains, since we rely on knowing the
7542 machine-dependent procfs structure in order to pick
c044fabd 7543 out details about the corefile. */
252b5132
RH
7544
7545#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
7546/* Needed for new procfs interface on sparc-solaris. */
7547# define _STRUCTURED_PROC 1
252b5132
RH
7548# include <sys/procfs.h>
7549#endif
7550
261b8d08
PA
7551/* Return a PID that identifies a "thread" for threaded cores, or the
7552 PID of the main process for non-threaded cores. */
252b5132
RH
7553
7554static int
217aa764 7555elfcore_make_pid (bfd *abfd)
252b5132 7556{
261b8d08
PA
7557 int pid;
7558
7559 pid = elf_tdata (abfd)->core_lwpid;
7560 if (pid == 0)
7561 pid = elf_tdata (abfd)->core_pid;
7562
7563 return pid;
252b5132
RH
7564}
7565
252b5132
RH
7566/* If there isn't a section called NAME, make one, using
7567 data from SECT. Note, this function will generate a
7568 reference to NAME, so you shouldn't deallocate or
c044fabd 7569 overwrite it. */
252b5132 7570
b34976b6 7571static bfd_boolean
217aa764 7572elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7573{
c044fabd 7574 asection *sect2;
252b5132
RH
7575
7576 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7577 return TRUE;
252b5132 7578
117ed4f8 7579 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7580 if (sect2 == NULL)
b34976b6 7581 return FALSE;
252b5132 7582
eea6121a 7583 sect2->size = sect->size;
252b5132 7584 sect2->filepos = sect->filepos;
252b5132 7585 sect2->alignment_power = sect->alignment_power;
b34976b6 7586 return TRUE;
252b5132
RH
7587}
7588
bb0082d6
AM
7589/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7590 actually creates up to two pseudosections:
7591 - For the single-threaded case, a section named NAME, unless
7592 such a section already exists.
7593 - For the multi-threaded case, a section named "NAME/PID", where
7594 PID is elfcore_make_pid (abfd).
7595 Both pseudosections have identical contents. */
b34976b6 7596bfd_boolean
217aa764
AM
7597_bfd_elfcore_make_pseudosection (bfd *abfd,
7598 char *name,
7599 size_t size,
7600 ufile_ptr filepos)
bb0082d6
AM
7601{
7602 char buf[100];
7603 char *threaded_name;
d4c88bbb 7604 size_t len;
bb0082d6
AM
7605 asection *sect;
7606
7607 /* Build the section name. */
7608
7609 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7610 len = strlen (buf) + 1;
a50b1753 7611 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 7612 if (threaded_name == NULL)
b34976b6 7613 return FALSE;
d4c88bbb 7614 memcpy (threaded_name, buf, len);
bb0082d6 7615
117ed4f8
AM
7616 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7617 SEC_HAS_CONTENTS);
bb0082d6 7618 if (sect == NULL)
b34976b6 7619 return FALSE;
eea6121a 7620 sect->size = size;
bb0082d6 7621 sect->filepos = filepos;
bb0082d6
AM
7622 sect->alignment_power = 2;
7623
936e320b 7624 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7625}
7626
252b5132 7627/* prstatus_t exists on:
4a938328 7628 solaris 2.5+
252b5132
RH
7629 linux 2.[01] + glibc
7630 unixware 4.2
7631*/
7632
7633#if defined (HAVE_PRSTATUS_T)
a7b97311 7634
b34976b6 7635static bfd_boolean
217aa764 7636elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7637{
eea6121a 7638 size_t size;
7ee38065 7639 int offset;
252b5132 7640
4a938328
MS
7641 if (note->descsz == sizeof (prstatus_t))
7642 {
7643 prstatus_t prstat;
252b5132 7644
eea6121a 7645 size = sizeof (prstat.pr_reg);
7ee38065 7646 offset = offsetof (prstatus_t, pr_reg);
4a938328 7647 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7648
fa49d224
NC
7649 /* Do not overwrite the core signal if it
7650 has already been set by another thread. */
7651 if (elf_tdata (abfd)->core_signal == 0)
7652 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
261b8d08
PA
7653 if (elf_tdata (abfd)->core_pid == 0)
7654 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7655
4a938328
MS
7656 /* pr_who exists on:
7657 solaris 2.5+
7658 unixware 4.2
7659 pr_who doesn't exist on:
7660 linux 2.[01]
7661 */
252b5132 7662#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7663 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
261b8d08
PA
7664#else
7665 elf_tdata (abfd)->core_lwpid = prstat.pr_pid;
252b5132 7666#endif
4a938328 7667 }
7ee38065 7668#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7669 else if (note->descsz == sizeof (prstatus32_t))
7670 {
7671 /* 64-bit host, 32-bit corefile */
7672 prstatus32_t prstat;
7673
eea6121a 7674 size = sizeof (prstat.pr_reg);
7ee38065 7675 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7676 memcpy (&prstat, note->descdata, sizeof (prstat));
7677
fa49d224
NC
7678 /* Do not overwrite the core signal if it
7679 has already been set by another thread. */
7680 if (elf_tdata (abfd)->core_signal == 0)
7681 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
261b8d08
PA
7682 if (elf_tdata (abfd)->core_pid == 0)
7683 elf_tdata (abfd)->core_pid = prstat.pr_pid;
4a938328
MS
7684
7685 /* pr_who exists on:
7686 solaris 2.5+
7687 unixware 4.2
7688 pr_who doesn't exist on:
7689 linux 2.[01]
7690 */
7ee38065 7691#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328 7692 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
261b8d08
PA
7693#else
7694 elf_tdata (abfd)->core_lwpid = prstat.pr_pid;
4a938328
MS
7695#endif
7696 }
7ee38065 7697#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7698 else
7699 {
7700 /* Fail - we don't know how to handle any other
7701 note size (ie. data object type). */
b34976b6 7702 return TRUE;
4a938328 7703 }
252b5132 7704
bb0082d6 7705 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7706 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7707 size, note->descpos + offset);
252b5132
RH
7708}
7709#endif /* defined (HAVE_PRSTATUS_T) */
7710
bb0082d6 7711/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7712static bfd_boolean
217aa764
AM
7713elfcore_make_note_pseudosection (bfd *abfd,
7714 char *name,
7715 Elf_Internal_Note *note)
252b5132 7716{
936e320b
AM
7717 return _bfd_elfcore_make_pseudosection (abfd, name,
7718 note->descsz, note->descpos);
252b5132
RH
7719}
7720
ff08c6bb
JB
7721/* There isn't a consistent prfpregset_t across platforms,
7722 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7723 data structure apart. */
7724
b34976b6 7725static bfd_boolean
217aa764 7726elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7727{
7728 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7729}
7730
ff08c6bb 7731/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 7732 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 7733 literally. */
c044fabd 7734
b34976b6 7735static bfd_boolean
217aa764 7736elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7737{
7738 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7739}
7740
4339cae0
L
7741/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
7742 with a note type of NT_X86_XSTATE. Just include the whole note's
7743 contents literally. */
7744
7745static bfd_boolean
7746elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
7747{
7748 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
7749}
7750
97753bd5
AM
7751static bfd_boolean
7752elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
7753{
7754 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
7755}
7756
89eeb0bc
LM
7757static bfd_boolean
7758elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
7759{
7760 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
7761}
97753bd5 7762
0675e188
UW
7763static bfd_boolean
7764elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
7765{
7766 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
7767}
7768
d7eeb400
MS
7769static bfd_boolean
7770elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
7771{
7772 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
7773}
7774
7775static bfd_boolean
7776elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
7777{
7778 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
7779}
7780
7781static bfd_boolean
7782elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
7783{
7784 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
7785}
7786
7787static bfd_boolean
7788elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
7789{
7790 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
7791}
7792
7793static bfd_boolean
7794elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
7795{
7796 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
7797}
7798
252b5132 7799#if defined (HAVE_PRPSINFO_T)
4a938328 7800typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7801#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7802typedef prpsinfo32_t elfcore_psinfo32_t;
7803#endif
252b5132
RH
7804#endif
7805
7806#if defined (HAVE_PSINFO_T)
4a938328 7807typedef psinfo_t elfcore_psinfo_t;
7ee38065 7808#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7809typedef psinfo32_t elfcore_psinfo32_t;
7810#endif
252b5132
RH
7811#endif
7812
252b5132
RH
7813/* return a malloc'ed copy of a string at START which is at
7814 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7815 the copy will always have a terminating '\0'. */
252b5132 7816
936e320b 7817char *
217aa764 7818_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7819{
dc810e39 7820 char *dups;
a50b1753 7821 char *end = (char *) memchr (start, '\0', max);
dc810e39 7822 size_t len;
252b5132
RH
7823
7824 if (end == NULL)
7825 len = max;
7826 else
7827 len = end - start;
7828
a50b1753 7829 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 7830 if (dups == NULL)
252b5132
RH
7831 return NULL;
7832
dc810e39
AM
7833 memcpy (dups, start, len);
7834 dups[len] = '\0';
252b5132 7835
dc810e39 7836 return dups;
252b5132
RH
7837}
7838
bb0082d6 7839#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7840static bfd_boolean
217aa764 7841elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7842{
4a938328
MS
7843 if (note->descsz == sizeof (elfcore_psinfo_t))
7844 {
7845 elfcore_psinfo_t psinfo;
252b5132 7846
7ee38065 7847 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7848
4a938328 7849 elf_tdata (abfd)->core_program
936e320b
AM
7850 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7851 sizeof (psinfo.pr_fname));
252b5132 7852
4a938328 7853 elf_tdata (abfd)->core_command
936e320b
AM
7854 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7855 sizeof (psinfo.pr_psargs));
4a938328 7856 }
7ee38065 7857#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7858 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7859 {
7860 /* 64-bit host, 32-bit corefile */
7861 elfcore_psinfo32_t psinfo;
7862
7ee38065 7863 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7864
4a938328 7865 elf_tdata (abfd)->core_program
936e320b
AM
7866 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7867 sizeof (psinfo.pr_fname));
4a938328
MS
7868
7869 elf_tdata (abfd)->core_command
936e320b
AM
7870 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7871 sizeof (psinfo.pr_psargs));
4a938328
MS
7872 }
7873#endif
7874
7875 else
7876 {
7877 /* Fail - we don't know how to handle any other
7878 note size (ie. data object type). */
b34976b6 7879 return TRUE;
4a938328 7880 }
252b5132
RH
7881
7882 /* Note that for some reason, a spurious space is tacked
7883 onto the end of the args in some (at least one anyway)
c044fabd 7884 implementations, so strip it off if it exists. */
252b5132
RH
7885
7886 {
c044fabd 7887 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7888 int n = strlen (command);
7889
7890 if (0 < n && command[n - 1] == ' ')
7891 command[n - 1] = '\0';
7892 }
7893
b34976b6 7894 return TRUE;
252b5132
RH
7895}
7896#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7897
252b5132 7898#if defined (HAVE_PSTATUS_T)
b34976b6 7899static bfd_boolean
217aa764 7900elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7901{
f572a39d
AM
7902 if (note->descsz == sizeof (pstatus_t)
7903#if defined (HAVE_PXSTATUS_T)
7904 || note->descsz == sizeof (pxstatus_t)
7905#endif
7906 )
4a938328
MS
7907 {
7908 pstatus_t pstat;
252b5132 7909
4a938328 7910 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7911
4a938328
MS
7912 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7913 }
7ee38065 7914#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7915 else if (note->descsz == sizeof (pstatus32_t))
7916 {
7917 /* 64-bit host, 32-bit corefile */
7918 pstatus32_t pstat;
252b5132 7919
4a938328 7920 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7921
4a938328
MS
7922 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7923 }
7924#endif
252b5132
RH
7925 /* Could grab some more details from the "representative"
7926 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7927 NT_LWPSTATUS note, presumably. */
252b5132 7928
b34976b6 7929 return TRUE;
252b5132
RH
7930}
7931#endif /* defined (HAVE_PSTATUS_T) */
7932
252b5132 7933#if defined (HAVE_LWPSTATUS_T)
b34976b6 7934static bfd_boolean
217aa764 7935elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7936{
7937 lwpstatus_t lwpstat;
7938 char buf[100];
c044fabd 7939 char *name;
d4c88bbb 7940 size_t len;
c044fabd 7941 asection *sect;
252b5132 7942
f572a39d
AM
7943 if (note->descsz != sizeof (lwpstat)
7944#if defined (HAVE_LWPXSTATUS_T)
7945 && note->descsz != sizeof (lwpxstatus_t)
7946#endif
7947 )
b34976b6 7948 return TRUE;
252b5132
RH
7949
7950 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7951
7952 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
a1504221
JB
7953 /* Do not overwrite the core signal if it has already been set by
7954 another thread. */
7955 if (elf_tdata (abfd)->core_signal == 0)
7956 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
252b5132 7957
c044fabd 7958 /* Make a ".reg/999" section. */
252b5132
RH
7959
7960 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7961 len = strlen (buf) + 1;
217aa764 7962 name = bfd_alloc (abfd, len);
252b5132 7963 if (name == NULL)
b34976b6 7964 return FALSE;
d4c88bbb 7965 memcpy (name, buf, len);
252b5132 7966
117ed4f8 7967 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7968 if (sect == NULL)
b34976b6 7969 return FALSE;
252b5132
RH
7970
7971#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7972 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7973 sect->filepos = note->descpos
7974 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7975#endif
7976
7977#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7978 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7979 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7980#endif
7981
252b5132
RH
7982 sect->alignment_power = 2;
7983
7984 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7985 return FALSE;
252b5132
RH
7986
7987 /* Make a ".reg2/999" section */
7988
7989 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7990 len = strlen (buf) + 1;
217aa764 7991 name = bfd_alloc (abfd, len);
252b5132 7992 if (name == NULL)
b34976b6 7993 return FALSE;
d4c88bbb 7994 memcpy (name, buf, len);
252b5132 7995
117ed4f8 7996 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7997 if (sect == NULL)
b34976b6 7998 return FALSE;
252b5132
RH
7999
8000#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8001 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
8002 sect->filepos = note->descpos
8003 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
8004#endif
8005
8006#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 8007 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
8008 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
8009#endif
8010
252b5132
RH
8011 sect->alignment_power = 2;
8012
936e320b 8013 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
8014}
8015#endif /* defined (HAVE_LWPSTATUS_T) */
8016
b34976b6 8017static bfd_boolean
217aa764 8018elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
8019{
8020 char buf[30];
c044fabd 8021 char *name;
d4c88bbb 8022 size_t len;
c044fabd 8023 asection *sect;
4a6636fb
PA
8024 int type;
8025 int is_active_thread;
8026 bfd_vma base_addr;
16e9c715 8027
4a6636fb 8028 if (note->descsz < 728)
b34976b6 8029 return TRUE;
16e9c715 8030
4a6636fb
PA
8031 if (! CONST_STRNEQ (note->namedata, "win32"))
8032 return TRUE;
8033
8034 type = bfd_get_32 (abfd, note->descdata);
c044fabd 8035
4a6636fb 8036 switch (type)
16e9c715 8037 {
4a6636fb 8038 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 8039 /* FIXME: need to add ->core_command. */
4a6636fb
PA
8040 /* process_info.pid */
8041 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
8042 /* process_info.signal */
8043 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 8044 break;
16e9c715 8045
4a6636fb 8046 case 2 /* NOTE_INFO_THREAD */:
16e9c715 8047 /* Make a ".reg/999" section. */
4a6636fb
PA
8048 /* thread_info.tid */
8049 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 8050
d4c88bbb 8051 len = strlen (buf) + 1;
a50b1753 8052 name = (char *) bfd_alloc (abfd, len);
16e9c715 8053 if (name == NULL)
b34976b6 8054 return FALSE;
c044fabd 8055
d4c88bbb 8056 memcpy (name, buf, len);
16e9c715 8057
117ed4f8 8058 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 8059 if (sect == NULL)
b34976b6 8060 return FALSE;
c044fabd 8061
4a6636fb
PA
8062 /* sizeof (thread_info.thread_context) */
8063 sect->size = 716;
8064 /* offsetof (thread_info.thread_context) */
8065 sect->filepos = note->descpos + 12;
16e9c715
NC
8066 sect->alignment_power = 2;
8067
4a6636fb
PA
8068 /* thread_info.is_active_thread */
8069 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
8070
8071 if (is_active_thread)
16e9c715 8072 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8073 return FALSE;
16e9c715
NC
8074 break;
8075
4a6636fb 8076 case 3 /* NOTE_INFO_MODULE */:
16e9c715 8077 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
8078 /* module_info.base_address */
8079 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 8080 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 8081
d4c88bbb 8082 len = strlen (buf) + 1;
a50b1753 8083 name = (char *) bfd_alloc (abfd, len);
16e9c715 8084 if (name == NULL)
b34976b6 8085 return FALSE;
c044fabd 8086
d4c88bbb 8087 memcpy (name, buf, len);
252b5132 8088
117ed4f8 8089 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 8090
16e9c715 8091 if (sect == NULL)
b34976b6 8092 return FALSE;
c044fabd 8093
eea6121a 8094 sect->size = note->descsz;
16e9c715 8095 sect->filepos = note->descpos;
16e9c715
NC
8096 sect->alignment_power = 2;
8097 break;
8098
8099 default:
b34976b6 8100 return TRUE;
16e9c715
NC
8101 }
8102
b34976b6 8103 return TRUE;
16e9c715 8104}
252b5132 8105
b34976b6 8106static bfd_boolean
217aa764 8107elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 8108{
9c5bfbb7 8109 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 8110
252b5132
RH
8111 switch (note->type)
8112 {
8113 default:
b34976b6 8114 return TRUE;
252b5132 8115
252b5132 8116 case NT_PRSTATUS:
bb0082d6
AM
8117 if (bed->elf_backend_grok_prstatus)
8118 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 8119 return TRUE;
bb0082d6 8120#if defined (HAVE_PRSTATUS_T)
252b5132 8121 return elfcore_grok_prstatus (abfd, note);
bb0082d6 8122#else
b34976b6 8123 return TRUE;
252b5132
RH
8124#endif
8125
8126#if defined (HAVE_PSTATUS_T)
8127 case NT_PSTATUS:
8128 return elfcore_grok_pstatus (abfd, note);
8129#endif
8130
8131#if defined (HAVE_LWPSTATUS_T)
8132 case NT_LWPSTATUS:
8133 return elfcore_grok_lwpstatus (abfd, note);
8134#endif
8135
8136 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
8137 return elfcore_grok_prfpreg (abfd, note);
8138
c044fabd 8139 case NT_WIN32PSTATUS:
16e9c715 8140 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 8141
c044fabd 8142 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
8143 if (note->namesz == 6
8144 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
8145 return elfcore_grok_prxfpreg (abfd, note);
8146 else
b34976b6 8147 return TRUE;
ff08c6bb 8148
4339cae0
L
8149 case NT_X86_XSTATE: /* Linux XSAVE extension */
8150 if (note->namesz == 6
8151 && strcmp (note->namedata, "LINUX") == 0)
8152 return elfcore_grok_xstatereg (abfd, note);
8153 else
8154 return TRUE;
8155
97753bd5
AM
8156 case NT_PPC_VMX:
8157 if (note->namesz == 6
8158 && strcmp (note->namedata, "LINUX") == 0)
8159 return elfcore_grok_ppc_vmx (abfd, note);
8160 else
8161 return TRUE;
8162
89eeb0bc
LM
8163 case NT_PPC_VSX:
8164 if (note->namesz == 6
8165 && strcmp (note->namedata, "LINUX") == 0)
8166 return elfcore_grok_ppc_vsx (abfd, note);
8167 else
8168 return TRUE;
8169
0675e188
UW
8170 case NT_S390_HIGH_GPRS:
8171 if (note->namesz == 6
8172 && strcmp (note->namedata, "LINUX") == 0)
8173 return elfcore_grok_s390_high_gprs (abfd, note);
8174 else
8175 return TRUE;
8176
d7eeb400
MS
8177 case NT_S390_TIMER:
8178 if (note->namesz == 6
8179 && strcmp (note->namedata, "LINUX") == 0)
8180 return elfcore_grok_s390_timer (abfd, note);
8181 else
8182 return TRUE;
8183
8184 case NT_S390_TODCMP:
8185 if (note->namesz == 6
8186 && strcmp (note->namedata, "LINUX") == 0)
8187 return elfcore_grok_s390_todcmp (abfd, note);
8188 else
8189 return TRUE;
8190
8191 case NT_S390_TODPREG:
8192 if (note->namesz == 6
8193 && strcmp (note->namedata, "LINUX") == 0)
8194 return elfcore_grok_s390_todpreg (abfd, note);
8195 else
8196 return TRUE;
8197
8198 case NT_S390_CTRS:
8199 if (note->namesz == 6
8200 && strcmp (note->namedata, "LINUX") == 0)
8201 return elfcore_grok_s390_ctrs (abfd, note);
8202 else
8203 return TRUE;
8204
8205 case NT_S390_PREFIX:
8206 if (note->namesz == 6
8207 && strcmp (note->namedata, "LINUX") == 0)
8208 return elfcore_grok_s390_prefix (abfd, note);
8209 else
8210 return TRUE;
8211
252b5132
RH
8212 case NT_PRPSINFO:
8213 case NT_PSINFO:
bb0082d6
AM
8214 if (bed->elf_backend_grok_psinfo)
8215 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8216 return TRUE;
bb0082d6 8217#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8218 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8219#else
b34976b6 8220 return TRUE;
252b5132 8221#endif
3333a7c3
RM
8222
8223 case NT_AUXV:
8224 {
117ed4f8
AM
8225 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8226 SEC_HAS_CONTENTS);
3333a7c3
RM
8227
8228 if (sect == NULL)
8229 return FALSE;
eea6121a 8230 sect->size = note->descsz;
3333a7c3 8231 sect->filepos = note->descpos;
3333a7c3
RM
8232 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8233
8234 return TRUE;
8235 }
252b5132
RH
8236 }
8237}
8238
718175fa
JK
8239static bfd_boolean
8240elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8241{
8242 elf_tdata (abfd)->build_id_size = note->descsz;
a50b1753 8243 elf_tdata (abfd)->build_id = (bfd_byte *) bfd_alloc (abfd, note->descsz);
718175fa
JK
8244 if (elf_tdata (abfd)->build_id == NULL)
8245 return FALSE;
8246
8247 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
8248
8249 return TRUE;
8250}
8251
8252static bfd_boolean
8253elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8254{
8255 switch (note->type)
8256 {
8257 default:
8258 return TRUE;
8259
8260 case NT_GNU_BUILD_ID:
8261 return elfobj_grok_gnu_build_id (abfd, note);
8262 }
8263}
8264
b34976b6 8265static bfd_boolean
217aa764 8266elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8267{
8268 char *cp;
8269
8270 cp = strchr (note->namedata, '@');
8271 if (cp != NULL)
8272 {
d2b64500 8273 *lwpidp = atoi(cp + 1);
b34976b6 8274 return TRUE;
50b2bdb7 8275 }
b34976b6 8276 return FALSE;
50b2bdb7
AM
8277}
8278
b34976b6 8279static bfd_boolean
217aa764 8280elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8281{
50b2bdb7
AM
8282 /* Signal number at offset 0x08. */
8283 elf_tdata (abfd)->core_signal
8284 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8285
8286 /* Process ID at offset 0x50. */
8287 elf_tdata (abfd)->core_pid
8288 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8289
8290 /* Command name at 0x7c (max 32 bytes, including nul). */
8291 elf_tdata (abfd)->core_command
8292 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8293
7720ba9f
MK
8294 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8295 note);
50b2bdb7
AM
8296}
8297
b34976b6 8298static bfd_boolean
217aa764 8299elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8300{
8301 int lwp;
8302
8303 if (elfcore_netbsd_get_lwpid (note, &lwp))
8304 elf_tdata (abfd)->core_lwpid = lwp;
8305
b4db1224 8306 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8307 {
8308 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8309 find this note before any of the others, which is fine,
8310 since the kernel writes this note out first when it
8311 creates a core file. */
47d9a591 8312
50b2bdb7
AM
8313 return elfcore_grok_netbsd_procinfo (abfd, note);
8314 }
8315
b4db1224
JT
8316 /* As of Jan 2002 there are no other machine-independent notes
8317 defined for NetBSD core files. If the note type is less
8318 than the start of the machine-dependent note types, we don't
8319 understand it. */
47d9a591 8320
b4db1224 8321 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8322 return TRUE;
50b2bdb7
AM
8323
8324
8325 switch (bfd_get_arch (abfd))
8326 {
08a40648
AM
8327 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8328 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8329
8330 case bfd_arch_alpha:
8331 case bfd_arch_sparc:
8332 switch (note->type)
08a40648
AM
8333 {
8334 case NT_NETBSDCORE_FIRSTMACH+0:
8335 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8336
08a40648
AM
8337 case NT_NETBSDCORE_FIRSTMACH+2:
8338 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8339
08a40648
AM
8340 default:
8341 return TRUE;
8342 }
50b2bdb7 8343
08a40648
AM
8344 /* On all other arch's, PT_GETREGS == mach+1 and
8345 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8346
8347 default:
8348 switch (note->type)
08a40648
AM
8349 {
8350 case NT_NETBSDCORE_FIRSTMACH+1:
8351 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8352
08a40648
AM
8353 case NT_NETBSDCORE_FIRSTMACH+3:
8354 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8355
08a40648
AM
8356 default:
8357 return TRUE;
8358 }
50b2bdb7
AM
8359 }
8360 /* NOTREACHED */
8361}
8362
67cc5033
MK
8363static bfd_boolean
8364elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8365{
8366 /* Signal number at offset 0x08. */
8367 elf_tdata (abfd)->core_signal
8368 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8369
8370 /* Process ID at offset 0x20. */
8371 elf_tdata (abfd)->core_pid
8372 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8373
8374 /* Command name at 0x48 (max 32 bytes, including nul). */
8375 elf_tdata (abfd)->core_command
8376 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8377
8378 return TRUE;
8379}
8380
8381static bfd_boolean
8382elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8383{
8384 if (note->type == NT_OPENBSD_PROCINFO)
8385 return elfcore_grok_openbsd_procinfo (abfd, note);
8386
8387 if (note->type == NT_OPENBSD_REGS)
8388 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8389
8390 if (note->type == NT_OPENBSD_FPREGS)
8391 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8392
8393 if (note->type == NT_OPENBSD_XFPREGS)
8394 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8395
8396 if (note->type == NT_OPENBSD_AUXV)
8397 {
8398 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8399 SEC_HAS_CONTENTS);
8400
8401 if (sect == NULL)
8402 return FALSE;
8403 sect->size = note->descsz;
8404 sect->filepos = note->descpos;
8405 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8406
8407 return TRUE;
8408 }
8409
8410 if (note->type == NT_OPENBSD_WCOOKIE)
8411 {
8412 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8413 SEC_HAS_CONTENTS);
8414
8415 if (sect == NULL)
8416 return FALSE;
8417 sect->size = note->descsz;
8418 sect->filepos = note->descpos;
8419 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8420
8421 return TRUE;
8422 }
8423
8424 return TRUE;
8425}
8426
07c6e936 8427static bfd_boolean
d3fd4074 8428elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8429{
8430 void *ddata = note->descdata;
8431 char buf[100];
8432 char *name;
8433 asection *sect;
f8843e87
AM
8434 short sig;
8435 unsigned flags;
07c6e936
NC
8436
8437 /* nto_procfs_status 'pid' field is at offset 0. */
8438 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8439
f8843e87
AM
8440 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8441 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8442
8443 /* nto_procfs_status 'flags' field is at offset 8. */
8444 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8445
8446 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8447 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8448 {
8449 elf_tdata (abfd)->core_signal = sig;
8450 elf_tdata (abfd)->core_lwpid = *tid;
8451 }
07c6e936 8452
f8843e87
AM
8453 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8454 do not come from signals so we make sure we set the current
8455 thread just in case. */
8456 if (flags & 0x00000080)
8457 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8458
8459 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8460 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8461
a50b1753 8462 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8463 if (name == NULL)
8464 return FALSE;
8465 strcpy (name, buf);
8466
117ed4f8 8467 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8468 if (sect == NULL)
8469 return FALSE;
8470
eea6121a 8471 sect->size = note->descsz;
07c6e936 8472 sect->filepos = note->descpos;
07c6e936
NC
8473 sect->alignment_power = 2;
8474
8475 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8476}
8477
8478static bfd_boolean
d69f560c
KW
8479elfcore_grok_nto_regs (bfd *abfd,
8480 Elf_Internal_Note *note,
d3fd4074 8481 long tid,
d69f560c 8482 char *base)
07c6e936
NC
8483{
8484 char buf[100];
8485 char *name;
8486 asection *sect;
8487
d69f560c 8488 /* Make a "(base)/%d" section. */
d3fd4074 8489 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8490
a50b1753 8491 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8492 if (name == NULL)
8493 return FALSE;
8494 strcpy (name, buf);
8495
117ed4f8 8496 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8497 if (sect == NULL)
8498 return FALSE;
8499
eea6121a 8500 sect->size = note->descsz;
07c6e936 8501 sect->filepos = note->descpos;
07c6e936
NC
8502 sect->alignment_power = 2;
8503
f8843e87
AM
8504 /* This is the current thread. */
8505 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8506 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8507
8508 return TRUE;
07c6e936
NC
8509}
8510
8511#define BFD_QNT_CORE_INFO 7
8512#define BFD_QNT_CORE_STATUS 8
8513#define BFD_QNT_CORE_GREG 9
8514#define BFD_QNT_CORE_FPREG 10
8515
8516static bfd_boolean
217aa764 8517elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8518{
8519 /* Every GREG section has a STATUS section before it. Store the
811072d8 8520 tid from the previous call to pass down to the next gregs
07c6e936 8521 function. */
d3fd4074 8522 static long tid = 1;
07c6e936
NC
8523
8524 switch (note->type)
8525 {
d69f560c
KW
8526 case BFD_QNT_CORE_INFO:
8527 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8528 case BFD_QNT_CORE_STATUS:
8529 return elfcore_grok_nto_status (abfd, note, &tid);
8530 case BFD_QNT_CORE_GREG:
8531 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8532 case BFD_QNT_CORE_FPREG:
8533 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8534 default:
8535 return TRUE;
07c6e936
NC
8536 }
8537}
8538
b15fa79e
AM
8539static bfd_boolean
8540elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8541{
8542 char *name;
8543 asection *sect;
8544 size_t len;
8545
8546 /* Use note name as section name. */
8547 len = note->namesz;
a50b1753 8548 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
8549 if (name == NULL)
8550 return FALSE;
8551 memcpy (name, note->namedata, len);
8552 name[len - 1] = '\0';
8553
8554 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8555 if (sect == NULL)
8556 return FALSE;
8557
8558 sect->size = note->descsz;
8559 sect->filepos = note->descpos;
8560 sect->alignment_power = 1;
8561
8562 return TRUE;
8563}
8564
7c76fa91
MS
8565/* Function: elfcore_write_note
8566
47d9a591 8567 Inputs:
a39f3346 8568 buffer to hold note, and current size of buffer
7c76fa91
MS
8569 name of note
8570 type of note
8571 data for note
8572 size of data for note
8573
a39f3346
AM
8574 Writes note to end of buffer. ELF64 notes are written exactly as
8575 for ELF32, despite the current (as of 2006) ELF gabi specifying
8576 that they ought to have 8-byte namesz and descsz field, and have
8577 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8578
7c76fa91 8579 Return:
a39f3346 8580 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8581
8582char *
a39f3346 8583elfcore_write_note (bfd *abfd,
217aa764 8584 char *buf,
a39f3346 8585 int *bufsiz,
217aa764 8586 const char *name,
a39f3346 8587 int type,
217aa764 8588 const void *input,
a39f3346 8589 int size)
7c76fa91
MS
8590{
8591 Elf_External_Note *xnp;
d4c88bbb 8592 size_t namesz;
d4c88bbb 8593 size_t newspace;
a39f3346 8594 char *dest;
7c76fa91 8595
d4c88bbb 8596 namesz = 0;
d4c88bbb 8597 if (name != NULL)
a39f3346 8598 namesz = strlen (name) + 1;
d4c88bbb 8599
a39f3346 8600 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 8601
a50b1753 8602 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
8603 if (buf == NULL)
8604 return buf;
a39f3346 8605 dest = buf + *bufsiz;
7c76fa91
MS
8606 *bufsiz += newspace;
8607 xnp = (Elf_External_Note *) dest;
8608 H_PUT_32 (abfd, namesz, xnp->namesz);
8609 H_PUT_32 (abfd, size, xnp->descsz);
8610 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8611 dest = xnp->name;
8612 if (name != NULL)
8613 {
8614 memcpy (dest, name, namesz);
8615 dest += namesz;
a39f3346 8616 while (namesz & 3)
d4c88bbb
AM
8617 {
8618 *dest++ = '\0';
a39f3346 8619 ++namesz;
d4c88bbb
AM
8620 }
8621 }
8622 memcpy (dest, input, size);
a39f3346
AM
8623 dest += size;
8624 while (size & 3)
8625 {
8626 *dest++ = '\0';
8627 ++size;
8628 }
8629 return buf;
7c76fa91
MS
8630}
8631
8632#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8633char *
217aa764
AM
8634elfcore_write_prpsinfo (bfd *abfd,
8635 char *buf,
8636 int *bufsiz,
8637 const char *fname,
8638 const char *psargs)
7c76fa91 8639{
183e98be
AM
8640 const char *note_name = "CORE";
8641 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8642
8643 if (bed->elf_backend_write_core_note != NULL)
8644 {
8645 char *ret;
8646 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8647 NT_PRPSINFO, fname, psargs);
8648 if (ret != NULL)
8649 return ret;
8650 }
7c76fa91 8651
183e98be
AM
8652#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
8653 if (bed->s->elfclass == ELFCLASS32)
8654 {
8655#if defined (HAVE_PSINFO32_T)
8656 psinfo32_t data;
8657 int note_type = NT_PSINFO;
8658#else
8659 prpsinfo32_t data;
8660 int note_type = NT_PRPSINFO;
8661#endif
8662
8663 memset (&data, 0, sizeof (data));
8664 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8665 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8666 return elfcore_write_note (abfd, buf, bufsiz,
8667 note_name, note_type, &data, sizeof (data));
8668 }
8669 else
8670#endif
8671 {
7c76fa91 8672#if defined (HAVE_PSINFO_T)
183e98be
AM
8673 psinfo_t data;
8674 int note_type = NT_PSINFO;
7c76fa91 8675#else
183e98be
AM
8676 prpsinfo_t data;
8677 int note_type = NT_PRPSINFO;
7c76fa91
MS
8678#endif
8679
183e98be
AM
8680 memset (&data, 0, sizeof (data));
8681 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8682 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8683 return elfcore_write_note (abfd, buf, bufsiz,
8684 note_name, note_type, &data, sizeof (data));
8685 }
7c76fa91
MS
8686}
8687#endif /* PSINFO_T or PRPSINFO_T */
8688
8689#if defined (HAVE_PRSTATUS_T)
8690char *
217aa764
AM
8691elfcore_write_prstatus (bfd *abfd,
8692 char *buf,
8693 int *bufsiz,
8694 long pid,
8695 int cursig,
8696 const void *gregs)
7c76fa91 8697{
183e98be
AM
8698 const char *note_name = "CORE";
8699 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8700
183e98be
AM
8701 if (bed->elf_backend_write_core_note != NULL)
8702 {
8703 char *ret;
8704 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8705 NT_PRSTATUS,
8706 pid, cursig, gregs);
8707 if (ret != NULL)
8708 return ret;
8709 }
8710
8711#if defined (HAVE_PRSTATUS32_T)
8712 if (bed->s->elfclass == ELFCLASS32)
8713 {
8714 prstatus32_t prstat;
8715
8716 memset (&prstat, 0, sizeof (prstat));
8717 prstat.pr_pid = pid;
8718 prstat.pr_cursig = cursig;
8719 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8720 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8721 NT_PRSTATUS, &prstat, sizeof (prstat));
8722 }
8723 else
8724#endif
8725 {
8726 prstatus_t prstat;
8727
8728 memset (&prstat, 0, sizeof (prstat));
8729 prstat.pr_pid = pid;
8730 prstat.pr_cursig = cursig;
8731 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8732 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8733 NT_PRSTATUS, &prstat, sizeof (prstat));
8734 }
7c76fa91
MS
8735}
8736#endif /* HAVE_PRSTATUS_T */
8737
51316059
MS
8738#if defined (HAVE_LWPSTATUS_T)
8739char *
217aa764
AM
8740elfcore_write_lwpstatus (bfd *abfd,
8741 char *buf,
8742 int *bufsiz,
8743 long pid,
8744 int cursig,
8745 const void *gregs)
51316059
MS
8746{
8747 lwpstatus_t lwpstat;
183e98be 8748 const char *note_name = "CORE";
51316059
MS
8749
8750 memset (&lwpstat, 0, sizeof (lwpstat));
8751 lwpstat.pr_lwpid = pid >> 16;
8752 lwpstat.pr_cursig = cursig;
8753#if defined (HAVE_LWPSTATUS_T_PR_REG)
8754 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8755#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8756#if !defined(gregs)
8757 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8758 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8759#else
8760 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8761 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8762#endif
8763#endif
47d9a591 8764 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8765 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8766}
8767#endif /* HAVE_LWPSTATUS_T */
8768
7c76fa91
MS
8769#if defined (HAVE_PSTATUS_T)
8770char *
217aa764
AM
8771elfcore_write_pstatus (bfd *abfd,
8772 char *buf,
8773 int *bufsiz,
8774 long pid,
6c10990d
NC
8775 int cursig ATTRIBUTE_UNUSED,
8776 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 8777{
183e98be
AM
8778 const char *note_name = "CORE";
8779#if defined (HAVE_PSTATUS32_T)
8780 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8781
183e98be
AM
8782 if (bed->s->elfclass == ELFCLASS32)
8783 {
8784 pstatus32_t pstat;
8785
8786 memset (&pstat, 0, sizeof (pstat));
8787 pstat.pr_pid = pid & 0xffff;
8788 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8789 NT_PSTATUS, &pstat, sizeof (pstat));
8790 return buf;
8791 }
8792 else
8793#endif
8794 {
8795 pstatus_t pstat;
8796
8797 memset (&pstat, 0, sizeof (pstat));
8798 pstat.pr_pid = pid & 0xffff;
8799 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8800 NT_PSTATUS, &pstat, sizeof (pstat));
8801 return buf;
8802 }
7c76fa91
MS
8803}
8804#endif /* HAVE_PSTATUS_T */
8805
8806char *
217aa764
AM
8807elfcore_write_prfpreg (bfd *abfd,
8808 char *buf,
8809 int *bufsiz,
8810 const void *fpregs,
8811 int size)
7c76fa91 8812{
183e98be 8813 const char *note_name = "CORE";
47d9a591 8814 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8815 note_name, NT_FPREGSET, fpregs, size);
8816}
8817
8818char *
217aa764
AM
8819elfcore_write_prxfpreg (bfd *abfd,
8820 char *buf,
8821 int *bufsiz,
8822 const void *xfpregs,
8823 int size)
7c76fa91
MS
8824{
8825 char *note_name = "LINUX";
47d9a591 8826 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8827 note_name, NT_PRXFPREG, xfpregs, size);
8828}
8829
4339cae0
L
8830char *
8831elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
8832 const void *xfpregs, int size)
8833{
8834 char *note_name = "LINUX";
8835 return elfcore_write_note (abfd, buf, bufsiz,
8836 note_name, NT_X86_XSTATE, xfpregs, size);
8837}
8838
97753bd5
AM
8839char *
8840elfcore_write_ppc_vmx (bfd *abfd,
8841 char *buf,
8842 int *bufsiz,
8843 const void *ppc_vmx,
8844 int size)
8845{
8846 char *note_name = "LINUX";
8847 return elfcore_write_note (abfd, buf, bufsiz,
8848 note_name, NT_PPC_VMX, ppc_vmx, size);
8849}
8850
89eeb0bc
LM
8851char *
8852elfcore_write_ppc_vsx (bfd *abfd,
8853 char *buf,
8854 int *bufsiz,
8855 const void *ppc_vsx,
8856 int size)
8857{
8858 char *note_name = "LINUX";
8859 return elfcore_write_note (abfd, buf, bufsiz,
8860 note_name, NT_PPC_VSX, ppc_vsx, size);
8861}
8862
0675e188
UW
8863static char *
8864elfcore_write_s390_high_gprs (bfd *abfd,
8865 char *buf,
8866 int *bufsiz,
8867 const void *s390_high_gprs,
8868 int size)
8869{
8870 char *note_name = "LINUX";
8871 return elfcore_write_note (abfd, buf, bufsiz,
8872 note_name, NT_S390_HIGH_GPRS,
8873 s390_high_gprs, size);
8874}
8875
d7eeb400
MS
8876char *
8877elfcore_write_s390_timer (bfd *abfd,
8878 char *buf,
8879 int *bufsiz,
8880 const void *s390_timer,
8881 int size)
8882{
8883 char *note_name = "LINUX";
8884 return elfcore_write_note (abfd, buf, bufsiz,
8885 note_name, NT_S390_TIMER, s390_timer, size);
8886}
8887
8888char *
8889elfcore_write_s390_todcmp (bfd *abfd,
8890 char *buf,
8891 int *bufsiz,
8892 const void *s390_todcmp,
8893 int size)
8894{
8895 char *note_name = "LINUX";
8896 return elfcore_write_note (abfd, buf, bufsiz,
8897 note_name, NT_S390_TODCMP, s390_todcmp, size);
8898}
8899
8900char *
8901elfcore_write_s390_todpreg (bfd *abfd,
8902 char *buf,
8903 int *bufsiz,
8904 const void *s390_todpreg,
8905 int size)
8906{
8907 char *note_name = "LINUX";
8908 return elfcore_write_note (abfd, buf, bufsiz,
8909 note_name, NT_S390_TODPREG, s390_todpreg, size);
8910}
8911
8912char *
8913elfcore_write_s390_ctrs (bfd *abfd,
8914 char *buf,
8915 int *bufsiz,
8916 const void *s390_ctrs,
8917 int size)
8918{
8919 char *note_name = "LINUX";
8920 return elfcore_write_note (abfd, buf, bufsiz,
8921 note_name, NT_S390_CTRS, s390_ctrs, size);
8922}
8923
8924char *
8925elfcore_write_s390_prefix (bfd *abfd,
8926 char *buf,
8927 int *bufsiz,
8928 const void *s390_prefix,
8929 int size)
8930{
8931 char *note_name = "LINUX";
8932 return elfcore_write_note (abfd, buf, bufsiz,
8933 note_name, NT_S390_PREFIX, s390_prefix, size);
8934}
8935
bb864ac1
CES
8936char *
8937elfcore_write_register_note (bfd *abfd,
8938 char *buf,
8939 int *bufsiz,
8940 const char *section,
8941 const void *data,
8942 int size)
8943{
8944 if (strcmp (section, ".reg2") == 0)
8945 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
8946 if (strcmp (section, ".reg-xfp") == 0)
8947 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
8948 if (strcmp (section, ".reg-xstate") == 0)
8949 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
8950 if (strcmp (section, ".reg-ppc-vmx") == 0)
8951 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
8952 if (strcmp (section, ".reg-ppc-vsx") == 0)
8953 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
8954 if (strcmp (section, ".reg-s390-high-gprs") == 0)
8955 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
8956 if (strcmp (section, ".reg-s390-timer") == 0)
8957 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
8958 if (strcmp (section, ".reg-s390-todcmp") == 0)
8959 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
8960 if (strcmp (section, ".reg-s390-todpreg") == 0)
8961 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
8962 if (strcmp (section, ".reg-s390-ctrs") == 0)
8963 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
8964 if (strcmp (section, ".reg-s390-prefix") == 0)
8965 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
bb864ac1
CES
8966 return NULL;
8967}
8968
b34976b6 8969static bfd_boolean
718175fa 8970elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 8971{
c044fabd 8972 char *p;
252b5132 8973
252b5132
RH
8974 p = buf;
8975 while (p < buf + size)
8976 {
c044fabd
KH
8977 /* FIXME: bad alignment assumption. */
8978 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8979 Elf_Internal_Note in;
8980
baea7ef1
AM
8981 if (offsetof (Elf_External_Note, name) > buf - p + size)
8982 return FALSE;
8983
dc810e39 8984 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8985
dc810e39 8986 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 8987 in.namedata = xnp->name;
baea7ef1
AM
8988 if (in.namesz > buf - in.namedata + size)
8989 return FALSE;
252b5132 8990
dc810e39 8991 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8992 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8993 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
8994 if (in.descsz != 0
8995 && (in.descdata >= buf + size
8996 || in.descsz > buf - in.descdata + size))
8997 return FALSE;
252b5132 8998
718175fa
JK
8999 switch (bfd_get_format (abfd))
9000 {
9001 default:
9002 return TRUE;
9003
9004 case bfd_core:
9005 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
9006 {
9007 if (! elfcore_grok_netbsd_note (abfd, &in))
9008 return FALSE;
9009 }
67cc5033
MK
9010 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
9011 {
9012 if (! elfcore_grok_openbsd_note (abfd, &in))
9013 return FALSE;
9014 }
718175fa
JK
9015 else if (CONST_STRNEQ (in.namedata, "QNX"))
9016 {
9017 if (! elfcore_grok_nto_note (abfd, &in))
9018 return FALSE;
9019 }
b15fa79e
AM
9020 else if (CONST_STRNEQ (in.namedata, "SPU/"))
9021 {
9022 if (! elfcore_grok_spu_note (abfd, &in))
9023 return FALSE;
9024 }
718175fa
JK
9025 else
9026 {
9027 if (! elfcore_grok_note (abfd, &in))
9028 return FALSE;
9029 }
9030 break;
9031
9032 case bfd_object:
9033 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
9034 {
9035 if (! elfobj_grok_gnu_note (abfd, &in))
9036 return FALSE;
9037 }
9038 break;
08a40648 9039 }
252b5132
RH
9040
9041 p = in.descdata + BFD_ALIGN (in.descsz, 4);
9042 }
9043
718175fa
JK
9044 return TRUE;
9045}
9046
9047static bfd_boolean
9048elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
9049{
9050 char *buf;
9051
9052 if (size <= 0)
9053 return TRUE;
9054
9055 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
9056 return FALSE;
9057
a50b1753 9058 buf = (char *) bfd_malloc (size);
718175fa
JK
9059 if (buf == NULL)
9060 return FALSE;
9061
9062 if (bfd_bread (buf, size, abfd) != size
9063 || !elf_parse_notes (abfd, buf, size, offset))
9064 {
9065 free (buf);
9066 return FALSE;
9067 }
9068
252b5132 9069 free (buf);
b34976b6 9070 return TRUE;
252b5132 9071}
98d8431c
JB
9072\f
9073/* Providing external access to the ELF program header table. */
9074
9075/* Return an upper bound on the number of bytes required to store a
9076 copy of ABFD's program header table entries. Return -1 if an error
9077 occurs; bfd_get_error will return an appropriate code. */
c044fabd 9078
98d8431c 9079long
217aa764 9080bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
9081{
9082 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9083 {
9084 bfd_set_error (bfd_error_wrong_format);
9085 return -1;
9086 }
9087
936e320b 9088 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
9089}
9090
98d8431c
JB
9091/* Copy ABFD's program header table entries to *PHDRS. The entries
9092 will be stored as an array of Elf_Internal_Phdr structures, as
9093 defined in include/elf/internal.h. To find out how large the
9094 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
9095
9096 Return the number of program header table entries read, or -1 if an
9097 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 9098
98d8431c 9099int
217aa764 9100bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
9101{
9102 int num_phdrs;
9103
9104 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9105 {
9106 bfd_set_error (bfd_error_wrong_format);
9107 return -1;
9108 }
9109
9110 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 9111 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
9112 num_phdrs * sizeof (Elf_Internal_Phdr));
9113
9114 return num_phdrs;
9115}
ae4221d7 9116
db6751f2 9117enum elf_reloc_type_class
217aa764 9118_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
9119{
9120 return reloc_class_normal;
9121}
f8df10f4 9122
47d9a591 9123/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
9124 relocation against a local symbol. */
9125
9126bfd_vma
217aa764
AM
9127_bfd_elf_rela_local_sym (bfd *abfd,
9128 Elf_Internal_Sym *sym,
8517fae7 9129 asection **psec,
217aa764 9130 Elf_Internal_Rela *rel)
f8df10f4 9131{
8517fae7 9132 asection *sec = *psec;
f8df10f4
JJ
9133 bfd_vma relocation;
9134
9135 relocation = (sec->output_section->vma
9136 + sec->output_offset
9137 + sym->st_value);
9138 if ((sec->flags & SEC_MERGE)
c629eae0 9139 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 9140 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 9141 {
f8df10f4 9142 rel->r_addend =
8517fae7 9143 _bfd_merged_section_offset (abfd, psec,
65765700 9144 elf_section_data (sec)->sec_info,
753731ee
AM
9145 sym->st_value + rel->r_addend);
9146 if (sec != *psec)
9147 {
9148 /* If we have changed the section, and our original section is
9149 marked with SEC_EXCLUDE, it means that the original
9150 SEC_MERGE section has been completely subsumed in some
9151 other SEC_MERGE section. In this case, we need to leave
9152 some info around for --emit-relocs. */
9153 if ((sec->flags & SEC_EXCLUDE) != 0)
9154 sec->kept_section = *psec;
9155 sec = *psec;
9156 }
8517fae7
AM
9157 rel->r_addend -= relocation;
9158 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
9159 }
9160 return relocation;
9161}
c629eae0
JJ
9162
9163bfd_vma
217aa764
AM
9164_bfd_elf_rel_local_sym (bfd *abfd,
9165 Elf_Internal_Sym *sym,
9166 asection **psec,
9167 bfd_vma addend)
47d9a591 9168{
c629eae0
JJ
9169 asection *sec = *psec;
9170
68bfbfcc 9171 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
9172 return sym->st_value + addend;
9173
9174 return _bfd_merged_section_offset (abfd, psec,
65765700 9175 elf_section_data (sec)->sec_info,
753731ee 9176 sym->st_value + addend);
c629eae0
JJ
9177}
9178
9179bfd_vma
217aa764 9180_bfd_elf_section_offset (bfd *abfd,
92e4ec35 9181 struct bfd_link_info *info,
217aa764
AM
9182 asection *sec,
9183 bfd_vma offset)
c629eae0 9184{
68bfbfcc 9185 switch (sec->sec_info_type)
65765700
JJ
9186 {
9187 case ELF_INFO_TYPE_STABS:
eea6121a
AM
9188 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
9189 offset);
65765700 9190 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 9191 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
9192 default:
9193 return offset;
9194 }
c629eae0 9195}
3333a7c3
RM
9196\f
9197/* Create a new BFD as if by bfd_openr. Rather than opening a file,
9198 reconstruct an ELF file by reading the segments out of remote memory
9199 based on the ELF file header at EHDR_VMA and the ELF program headers it
9200 points to. If not null, *LOADBASEP is filled in with the difference
9201 between the VMAs from which the segments were read, and the VMAs the
9202 file headers (and hence BFD's idea of each section's VMA) put them at.
9203
9204 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
9205 remote memory at target address VMA into the local buffer at MYADDR; it
9206 should return zero on success or an `errno' code on failure. TEMPL must
9207 be a BFD for an ELF target with the word size and byte order found in
9208 the remote memory. */
9209
9210bfd *
217aa764
AM
9211bfd_elf_bfd_from_remote_memory
9212 (bfd *templ,
9213 bfd_vma ehdr_vma,
9214 bfd_vma *loadbasep,
f075ee0c 9215 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
9216{
9217 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
9218 (templ, ehdr_vma, loadbasep, target_read_memory);
9219}
4c45e5c9
JJ
9220\f
9221long
c9727e01
AM
9222_bfd_elf_get_synthetic_symtab (bfd *abfd,
9223 long symcount ATTRIBUTE_UNUSED,
9224 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 9225 long dynsymcount,
c9727e01
AM
9226 asymbol **dynsyms,
9227 asymbol **ret)
4c45e5c9
JJ
9228{
9229 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9230 asection *relplt;
9231 asymbol *s;
9232 const char *relplt_name;
9233 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
9234 arelent *p;
9235 long count, i, n;
9236 size_t size;
9237 Elf_Internal_Shdr *hdr;
9238 char *names;
9239 asection *plt;
9240
8615f3f2
AM
9241 *ret = NULL;
9242
90e3cdf2
JJ
9243 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
9244 return 0;
9245
8615f3f2
AM
9246 if (dynsymcount <= 0)
9247 return 0;
9248
4c45e5c9
JJ
9249 if (!bed->plt_sym_val)
9250 return 0;
9251
9252 relplt_name = bed->relplt_name;
9253 if (relplt_name == NULL)
d35fd659 9254 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
9255 relplt = bfd_get_section_by_name (abfd, relplt_name);
9256 if (relplt == NULL)
9257 return 0;
9258
9259 hdr = &elf_section_data (relplt)->this_hdr;
9260 if (hdr->sh_link != elf_dynsymtab (abfd)
9261 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
9262 return 0;
9263
9264 plt = bfd_get_section_by_name (abfd, ".plt");
9265 if (plt == NULL)
9266 return 0;
9267
9268 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 9269 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
9270 return -1;
9271
eea6121a 9272 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
9273 size = count * sizeof (asymbol);
9274 p = relplt->relocation;
cb53bf42 9275 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
9276 {
9277 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
9278 if (p->addend != 0)
9279 {
9280#ifdef BFD64
9281 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
9282#else
9283 size += sizeof ("+0x") - 1 + 8;
9284#endif
9285 }
9286 }
4c45e5c9 9287
a50b1753 9288 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
9289 if (s == NULL)
9290 return -1;
9291
9292 names = (char *) (s + count);
9293 p = relplt->relocation;
9294 n = 0;
cb53bf42 9295 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
9296 {
9297 size_t len;
9298 bfd_vma addr;
9299
9300 addr = bed->plt_sym_val (i, plt, p);
9301 if (addr == (bfd_vma) -1)
9302 continue;
9303
9304 *s = **p->sym_ptr_ptr;
65a7a66f
AM
9305 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
9306 we are defining a symbol, ensure one of them is set. */
9307 if ((s->flags & BSF_LOCAL) == 0)
9308 s->flags |= BSF_GLOBAL;
6ba2a415 9309 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
9310 s->section = plt;
9311 s->value = addr - plt->vma;
9312 s->name = names;
8f39ba8e 9313 s->udata.p = NULL;
4c45e5c9
JJ
9314 len = strlen ((*p->sym_ptr_ptr)->name);
9315 memcpy (names, (*p->sym_ptr_ptr)->name, len);
9316 names += len;
041de40d
AM
9317 if (p->addend != 0)
9318 {
1d770845 9319 char buf[30], *a;
91d6fa6a 9320
041de40d
AM
9321 memcpy (names, "+0x", sizeof ("+0x") - 1);
9322 names += sizeof ("+0x") - 1;
1d770845
L
9323 bfd_sprintf_vma (abfd, buf, p->addend);
9324 for (a = buf; *a == '0'; ++a)
9325 ;
9326 len = strlen (a);
9327 memcpy (names, a, len);
9328 names += len;
041de40d 9329 }
4c45e5c9
JJ
9330 memcpy (names, "@plt", sizeof ("@plt"));
9331 names += sizeof ("@plt");
8f39ba8e 9332 ++s, ++n;
4c45e5c9
JJ
9333 }
9334
9335 return n;
9336}
3d7f7666 9337
3b22753a
L
9338/* It is only used by x86-64 so far. */
9339asection _bfd_elf_large_com_section
9340 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 9341 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 9342
d1036acb
L
9343void
9344_bfd_elf_set_osabi (bfd * abfd,
9345 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
9346{
9347 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
9348
9349 i_ehdrp = elf_elfheader (abfd);
9350
9351 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
9352
9353 /* To make things simpler for the loader on Linux systems we set the
9354 osabi field to ELFOSABI_LINUX if the binary contains symbols of
9355 the STT_GNU_IFUNC type. */
9356 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
9357 && elf_tdata (abfd)->has_ifunc_symbols)
9358 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
d1036acb 9359}
fcb93ecf
PB
9360
9361
9362/* Return TRUE for ELF symbol types that represent functions.
9363 This is the default version of this function, which is sufficient for
d8045f23 9364 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
9365
9366bfd_boolean
9367_bfd_elf_is_function_type (unsigned int type)
9368{
d8045f23
NC
9369 return (type == STT_FUNC
9370 || type == STT_GNU_IFUNC);
fcb93ecf 9371}
This page took 1.677901 seconds and 4 git commands to generate.