]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
2010-05-18 Hui Zhu <teawater@gmail.com>
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
415f38a6 4 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010
72a80a16 5 Free Software Foundation, Inc.
252b5132 6
5e8d7549 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
5e8d7549
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
5e8d7549 12 (at your option) any later version.
252b5132 13
5e8d7549
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
5e8d7549 19 You should have received a copy of the GNU General Public License
b34976b6 20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
23
252b5132 24
1b74d094
BW
25/*
26SECTION
252b5132
RH
27 ELF backends
28
29 BFD support for ELF formats is being worked on.
30 Currently, the best supported back ends are for sparc and i386
31 (running svr4 or Solaris 2).
32
33 Documentation of the internals of the support code still needs
34 to be written. The code is changing quickly enough that we
661a3fd4 35 haven't bothered yet. */
252b5132 36
7ee38065
MS
37/* For sparc64-cross-sparc32. */
38#define _SYSCALL32
252b5132 39#include "sysdep.h"
3db64b00 40#include "bfd.h"
252b5132
RH
41#include "bfdlink.h"
42#include "libbfd.h"
43#define ARCH_SIZE 0
44#include "elf-bfd.h"
e0e8c97f 45#include "libiberty.h"
ff59fc36 46#include "safe-ctype.h"
252b5132 47
8bc7f138
L
48#ifdef CORE_HEADER
49#include CORE_HEADER
50#endif
51
217aa764 52static int elf_sort_sections (const void *, const void *);
c84fca4d 53static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
54static bfd_boolean prep_headers (bfd *);
55static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
56static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
57static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
58 file_ptr offset);
50b2bdb7 59
252b5132
RH
60/* Swap version information in and out. The version information is
61 currently size independent. If that ever changes, this code will
62 need to move into elfcode.h. */
63
64/* Swap in a Verdef structure. */
65
66void
217aa764
AM
67_bfd_elf_swap_verdef_in (bfd *abfd,
68 const Elf_External_Verdef *src,
69 Elf_Internal_Verdef *dst)
252b5132 70{
dc810e39
AM
71 dst->vd_version = H_GET_16 (abfd, src->vd_version);
72 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
73 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
74 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
75 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
76 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
77 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
78}
79
80/* Swap out a Verdef structure. */
81
82void
217aa764
AM
83_bfd_elf_swap_verdef_out (bfd *abfd,
84 const Elf_Internal_Verdef *src,
85 Elf_External_Verdef *dst)
252b5132 86{
dc810e39
AM
87 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
88 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
89 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
90 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
91 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
92 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
93 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
94}
95
96/* Swap in a Verdaux structure. */
97
98void
217aa764
AM
99_bfd_elf_swap_verdaux_in (bfd *abfd,
100 const Elf_External_Verdaux *src,
101 Elf_Internal_Verdaux *dst)
252b5132 102{
dc810e39
AM
103 dst->vda_name = H_GET_32 (abfd, src->vda_name);
104 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
105}
106
107/* Swap out a Verdaux structure. */
108
109void
217aa764
AM
110_bfd_elf_swap_verdaux_out (bfd *abfd,
111 const Elf_Internal_Verdaux *src,
112 Elf_External_Verdaux *dst)
252b5132 113{
dc810e39
AM
114 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
115 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
116}
117
118/* Swap in a Verneed structure. */
119
120void
217aa764
AM
121_bfd_elf_swap_verneed_in (bfd *abfd,
122 const Elf_External_Verneed *src,
123 Elf_Internal_Verneed *dst)
252b5132 124{
dc810e39
AM
125 dst->vn_version = H_GET_16 (abfd, src->vn_version);
126 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
127 dst->vn_file = H_GET_32 (abfd, src->vn_file);
128 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
129 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
130}
131
132/* Swap out a Verneed structure. */
133
134void
217aa764
AM
135_bfd_elf_swap_verneed_out (bfd *abfd,
136 const Elf_Internal_Verneed *src,
137 Elf_External_Verneed *dst)
252b5132 138{
dc810e39
AM
139 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
140 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
141 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
142 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
143 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
144}
145
146/* Swap in a Vernaux structure. */
147
148void
217aa764
AM
149_bfd_elf_swap_vernaux_in (bfd *abfd,
150 const Elf_External_Vernaux *src,
151 Elf_Internal_Vernaux *dst)
252b5132 152{
dc810e39
AM
153 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
154 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
155 dst->vna_other = H_GET_16 (abfd, src->vna_other);
156 dst->vna_name = H_GET_32 (abfd, src->vna_name);
157 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
158}
159
160/* Swap out a Vernaux structure. */
161
162void
217aa764
AM
163_bfd_elf_swap_vernaux_out (bfd *abfd,
164 const Elf_Internal_Vernaux *src,
165 Elf_External_Vernaux *dst)
252b5132 166{
dc810e39
AM
167 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
168 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
169 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
170 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
171 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
172}
173
174/* Swap in a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_in (bfd *abfd,
178 const Elf_External_Versym *src,
179 Elf_Internal_Versym *dst)
252b5132 180{
dc810e39 181 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
182}
183
184/* Swap out a Versym structure. */
185
186void
217aa764
AM
187_bfd_elf_swap_versym_out (bfd *abfd,
188 const Elf_Internal_Versym *src,
189 Elf_External_Versym *dst)
252b5132 190{
dc810e39 191 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
192}
193
194/* Standard ELF hash function. Do not change this function; you will
195 cause invalid hash tables to be generated. */
3a99b017 196
252b5132 197unsigned long
217aa764 198bfd_elf_hash (const char *namearg)
252b5132 199{
3a99b017 200 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
201 unsigned long h = 0;
202 unsigned long g;
203 int ch;
204
205 while ((ch = *name++) != '\0')
206 {
207 h = (h << 4) + ch;
208 if ((g = (h & 0xf0000000)) != 0)
209 {
210 h ^= g >> 24;
211 /* The ELF ABI says `h &= ~g', but this is equivalent in
212 this case and on some machines one insn instead of two. */
213 h ^= g;
214 }
215 }
32dfa85d 216 return h & 0xffffffff;
252b5132
RH
217}
218
fdc90cb4
JJ
219/* DT_GNU_HASH hash function. Do not change this function; you will
220 cause invalid hash tables to be generated. */
221
222unsigned long
223bfd_elf_gnu_hash (const char *namearg)
224{
225 const unsigned char *name = (const unsigned char *) namearg;
226 unsigned long h = 5381;
227 unsigned char ch;
228
229 while ((ch = *name++) != '\0')
230 h = (h << 5) + h + ch;
231 return h & 0xffffffff;
232}
233
0c8d6e5c
AM
234/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
235 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 236bfd_boolean
0c8d6e5c 237bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 238 size_t object_size,
4dfe6ac6 239 enum elf_target_id object_id)
252b5132 240{
0ffa91dd
NC
241 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
242 abfd->tdata.any = bfd_zalloc (abfd, object_size);
243 if (abfd->tdata.any == NULL)
244 return FALSE;
252b5132 245
0ffa91dd
NC
246 elf_object_id (abfd) = object_id;
247 elf_program_header_size (abfd) = (bfd_size_type) -1;
b34976b6 248 return TRUE;
252b5132
RH
249}
250
0ffa91dd
NC
251
252bfd_boolean
253bfd_elf_make_generic_object (bfd *abfd)
254{
255 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
4dfe6ac6 256 GENERIC_ELF_DATA);
0ffa91dd
NC
257}
258
b34976b6 259bfd_boolean
217aa764 260bfd_elf_mkcorefile (bfd *abfd)
252b5132 261{
c044fabd 262 /* I think this can be done just like an object file. */
0ffa91dd 263 return bfd_elf_make_generic_object (abfd);
252b5132
RH
264}
265
72a80a16 266static char *
217aa764 267bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
268{
269 Elf_Internal_Shdr **i_shdrp;
f075ee0c 270 bfd_byte *shstrtab = NULL;
dc810e39
AM
271 file_ptr offset;
272 bfd_size_type shstrtabsize;
252b5132
RH
273
274 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
275 if (i_shdrp == 0
276 || shindex >= elf_numsections (abfd)
277 || i_shdrp[shindex] == 0)
f075ee0c 278 return NULL;
252b5132 279
f075ee0c 280 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
281 if (shstrtab == NULL)
282 {
c044fabd 283 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
284 offset = i_shdrp[shindex]->sh_offset;
285 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
286
287 /* Allocate and clear an extra byte at the end, to prevent crashes
288 in case the string table is not terminated. */
3471d59d 289 if (shstrtabsize + 1 <= 1
a50b1753 290 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL
c6c60d09
JJ
291 || bfd_seek (abfd, offset, SEEK_SET) != 0)
292 shstrtab = NULL;
293 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
294 {
295 if (bfd_get_error () != bfd_error_system_call)
296 bfd_set_error (bfd_error_file_truncated);
297 shstrtab = NULL;
3471d59d
CC
298 /* Once we've failed to read it, make sure we don't keep
299 trying. Otherwise, we'll keep allocating space for
300 the string table over and over. */
301 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
302 }
303 else
304 shstrtab[shstrtabsize] = '\0';
217aa764 305 i_shdrp[shindex]->contents = shstrtab;
252b5132 306 }
f075ee0c 307 return (char *) shstrtab;
252b5132
RH
308}
309
310char *
217aa764
AM
311bfd_elf_string_from_elf_section (bfd *abfd,
312 unsigned int shindex,
313 unsigned int strindex)
252b5132
RH
314{
315 Elf_Internal_Shdr *hdr;
316
317 if (strindex == 0)
318 return "";
319
74f2e02b
AM
320 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
321 return NULL;
322
252b5132
RH
323 hdr = elf_elfsections (abfd)[shindex];
324
325 if (hdr->contents == NULL
326 && bfd_elf_get_str_section (abfd, shindex) == NULL)
327 return NULL;
328
329 if (strindex >= hdr->sh_size)
330 {
1b3a8575 331 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 332 (*_bfd_error_handler)
d003868e
AM
333 (_("%B: invalid string offset %u >= %lu for section `%s'"),
334 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 335 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 336 ? ".shstrtab"
1b3a8575 337 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 338 return NULL;
252b5132
RH
339 }
340
341 return ((char *) hdr->contents) + strindex;
342}
343
6cdc0ccc
AM
344/* Read and convert symbols to internal format.
345 SYMCOUNT specifies the number of symbols to read, starting from
346 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
347 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
348 symbols, and symbol section index extensions, respectively.
349 Returns a pointer to the internal symbol buffer (malloced if necessary)
350 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
351
352Elf_Internal_Sym *
217aa764
AM
353bfd_elf_get_elf_syms (bfd *ibfd,
354 Elf_Internal_Shdr *symtab_hdr,
355 size_t symcount,
356 size_t symoffset,
357 Elf_Internal_Sym *intsym_buf,
358 void *extsym_buf,
359 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
360{
361 Elf_Internal_Shdr *shndx_hdr;
217aa764 362 void *alloc_ext;
df622259 363 const bfd_byte *esym;
6cdc0ccc
AM
364 Elf_External_Sym_Shndx *alloc_extshndx;
365 Elf_External_Sym_Shndx *shndx;
4dd07732 366 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
367 Elf_Internal_Sym *isym;
368 Elf_Internal_Sym *isymend;
9c5bfbb7 369 const struct elf_backend_data *bed;
6cdc0ccc
AM
370 size_t extsym_size;
371 bfd_size_type amt;
372 file_ptr pos;
373
e44a2c9c
AM
374 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
375 abort ();
376
6cdc0ccc
AM
377 if (symcount == 0)
378 return intsym_buf;
379
380 /* Normal syms might have section extension entries. */
381 shndx_hdr = NULL;
382 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
383 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
384
385 /* Read the symbols. */
386 alloc_ext = NULL;
387 alloc_extshndx = NULL;
4dd07732 388 alloc_intsym = NULL;
6cdc0ccc
AM
389 bed = get_elf_backend_data (ibfd);
390 extsym_size = bed->s->sizeof_sym;
391 amt = symcount * extsym_size;
392 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
393 if (extsym_buf == NULL)
394 {
d0fb9a8d 395 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
396 extsym_buf = alloc_ext;
397 }
398 if (extsym_buf == NULL
399 || bfd_seek (ibfd, pos, SEEK_SET) != 0
400 || bfd_bread (extsym_buf, amt, ibfd) != amt)
401 {
402 intsym_buf = NULL;
403 goto out;
404 }
405
406 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
407 extshndx_buf = NULL;
408 else
409 {
410 amt = symcount * sizeof (Elf_External_Sym_Shndx);
411 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
412 if (extshndx_buf == NULL)
413 {
a50b1753
NC
414 alloc_extshndx = (Elf_External_Sym_Shndx *)
415 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
416 extshndx_buf = alloc_extshndx;
417 }
418 if (extshndx_buf == NULL
419 || bfd_seek (ibfd, pos, SEEK_SET) != 0
420 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
421 {
422 intsym_buf = NULL;
423 goto out;
424 }
425 }
426
427 if (intsym_buf == NULL)
428 {
a50b1753
NC
429 alloc_intsym = (Elf_Internal_Sym *)
430 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 431 intsym_buf = alloc_intsym;
6cdc0ccc
AM
432 if (intsym_buf == NULL)
433 goto out;
434 }
435
436 /* Convert the symbols to internal form. */
437 isymend = intsym_buf + symcount;
a50b1753
NC
438 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
439 shndx = extshndx_buf;
6cdc0ccc
AM
440 isym < isymend;
441 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
442 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
443 {
444 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
445 (*_bfd_error_handler) (_("%B symbol number %lu references "
446 "nonexistent SHT_SYMTAB_SHNDX section"),
447 ibfd, (unsigned long) symoffset);
4dd07732
AM
448 if (alloc_intsym != NULL)
449 free (alloc_intsym);
8384fb8f
AM
450 intsym_buf = NULL;
451 goto out;
452 }
6cdc0ccc
AM
453
454 out:
455 if (alloc_ext != NULL)
456 free (alloc_ext);
457 if (alloc_extshndx != NULL)
458 free (alloc_extshndx);
459
460 return intsym_buf;
461}
462
5cab59f6
AM
463/* Look up a symbol name. */
464const char *
be8dd2ca
AM
465bfd_elf_sym_name (bfd *abfd,
466 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
467 Elf_Internal_Sym *isym,
468 asection *sym_sec)
5cab59f6 469{
26c61ae5 470 const char *name;
5cab59f6 471 unsigned int iname = isym->st_name;
be8dd2ca 472 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 473
138f35cc
JJ
474 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
475 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 476 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
477 {
478 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
479 shindex = elf_elfheader (abfd)->e_shstrndx;
480 }
481
26c61ae5
L
482 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
483 if (name == NULL)
484 name = "(null)";
485 else if (sym_sec && *name == '\0')
486 name = bfd_section_name (abfd, sym_sec);
487
488 return name;
5cab59f6
AM
489}
490
dbb410c3
AM
491/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
492 sections. The first element is the flags, the rest are section
493 pointers. */
494
495typedef union elf_internal_group {
496 Elf_Internal_Shdr *shdr;
497 unsigned int flags;
498} Elf_Internal_Group;
499
b885599b
AM
500/* Return the name of the group signature symbol. Why isn't the
501 signature just a string? */
502
503static const char *
217aa764 504group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 505{
9dce4196 506 Elf_Internal_Shdr *hdr;
9dce4196
AM
507 unsigned char esym[sizeof (Elf64_External_Sym)];
508 Elf_External_Sym_Shndx eshndx;
509 Elf_Internal_Sym isym;
b885599b 510
13792e9d
L
511 /* First we need to ensure the symbol table is available. Make sure
512 that it is a symbol table section. */
4fbb74a6
AM
513 if (ghdr->sh_link >= elf_numsections (abfd))
514 return NULL;
13792e9d
L
515 hdr = elf_elfsections (abfd) [ghdr->sh_link];
516 if (hdr->sh_type != SHT_SYMTAB
517 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
518 return NULL;
519
9dce4196
AM
520 /* Go read the symbol. */
521 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
522 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
523 &isym, esym, &eshndx) == NULL)
b885599b 524 return NULL;
9dce4196 525
26c61ae5 526 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
527}
528
dbb410c3
AM
529/* Set next_in_group list pointer, and group name for NEWSECT. */
530
b34976b6 531static bfd_boolean
217aa764 532setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
533{
534 unsigned int num_group = elf_tdata (abfd)->num_group;
535
536 /* If num_group is zero, read in all SHT_GROUP sections. The count
537 is set to -1 if there are no SHT_GROUP sections. */
538 if (num_group == 0)
539 {
540 unsigned int i, shnum;
541
542 /* First count the number of groups. If we have a SHT_GROUP
543 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 544 shnum = elf_numsections (abfd);
dbb410c3 545 num_group = 0;
08a40648 546
1783205a
NC
547#define IS_VALID_GROUP_SECTION_HEADER(shdr) \
548 ( (shdr)->sh_type == SHT_GROUP \
549 && (shdr)->sh_size >= (2 * GRP_ENTRY_SIZE) \
550 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
551 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 552
dbb410c3
AM
553 for (i = 0; i < shnum; i++)
554 {
555 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
556
557 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3
AM
558 num_group += 1;
559 }
560
561 if (num_group == 0)
20dbb49d
L
562 {
563 num_group = (unsigned) -1;
564 elf_tdata (abfd)->num_group = num_group;
565 }
566 else
dbb410c3
AM
567 {
568 /* We keep a list of elf section headers for group sections,
569 so we can find them quickly. */
20dbb49d 570 bfd_size_type amt;
d0fb9a8d 571
20dbb49d 572 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
573 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
574 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 575 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 576 return FALSE;
dbb410c3
AM
577
578 num_group = 0;
579 for (i = 0; i < shnum; i++)
580 {
581 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
582
583 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3 584 {
973ffd63 585 unsigned char *src;
dbb410c3
AM
586 Elf_Internal_Group *dest;
587
588 /* Add to list of sections. */
589 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
590 num_group += 1;
591
592 /* Read the raw contents. */
593 BFD_ASSERT (sizeof (*dest) >= 4);
594 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
595 shdr->contents = (unsigned char *)
596 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
597 /* PR binutils/4110: Handle corrupt group headers. */
598 if (shdr->contents == NULL)
599 {
600 _bfd_error_handler
601 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
602 bfd_set_error (bfd_error_bad_value);
603 return FALSE;
604 }
605
606 memset (shdr->contents, 0, amt);
607
608 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
609 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
610 != shdr->sh_size))
b34976b6 611 return FALSE;
dbb410c3
AM
612
613 /* Translate raw contents, a flag word followed by an
614 array of elf section indices all in target byte order,
615 to the flag word followed by an array of elf section
616 pointers. */
617 src = shdr->contents + shdr->sh_size;
618 dest = (Elf_Internal_Group *) (shdr->contents + amt);
619 while (1)
620 {
621 unsigned int idx;
622
623 src -= 4;
624 --dest;
625 idx = H_GET_32 (abfd, src);
626 if (src == shdr->contents)
627 {
628 dest->flags = idx;
b885599b
AM
629 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
630 shdr->bfd_section->flags
631 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
632 break;
633 }
634 if (idx >= shnum)
635 {
636 ((*_bfd_error_handler)
d003868e 637 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
638 idx = 0;
639 }
640 dest->shdr = elf_elfsections (abfd)[idx];
641 }
642 }
643 }
644 }
645 }
646
647 if (num_group != (unsigned) -1)
648 {
649 unsigned int i;
650
651 for (i = 0; i < num_group; i++)
652 {
653 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
654 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
655 unsigned int n_elt = shdr->sh_size / 4;
656
657 /* Look through this group's sections to see if current
658 section is a member. */
659 while (--n_elt != 0)
660 if ((++idx)->shdr == hdr)
661 {
e0e8c97f 662 asection *s = NULL;
dbb410c3
AM
663
664 /* We are a member of this group. Go looking through
665 other members to see if any others are linked via
666 next_in_group. */
667 idx = (Elf_Internal_Group *) shdr->contents;
668 n_elt = shdr->sh_size / 4;
669 while (--n_elt != 0)
670 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 671 && elf_next_in_group (s) != NULL)
dbb410c3
AM
672 break;
673 if (n_elt != 0)
674 {
dbb410c3
AM
675 /* Snarf the group name from other member, and
676 insert current section in circular list. */
945906ff
AM
677 elf_group_name (newsect) = elf_group_name (s);
678 elf_next_in_group (newsect) = elf_next_in_group (s);
679 elf_next_in_group (s) = newsect;
dbb410c3
AM
680 }
681 else
682 {
dbb410c3
AM
683 const char *gname;
684
b885599b
AM
685 gname = group_signature (abfd, shdr);
686 if (gname == NULL)
b34976b6 687 return FALSE;
945906ff 688 elf_group_name (newsect) = gname;
dbb410c3
AM
689
690 /* Start a circular list with one element. */
945906ff 691 elf_next_in_group (newsect) = newsect;
dbb410c3 692 }
b885599b 693
9dce4196
AM
694 /* If the group section has been created, point to the
695 new member. */
dbb410c3 696 if (shdr->bfd_section != NULL)
945906ff 697 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 698
dbb410c3
AM
699 i = num_group - 1;
700 break;
701 }
702 }
703 }
704
945906ff 705 if (elf_group_name (newsect) == NULL)
dbb410c3 706 {
d003868e
AM
707 (*_bfd_error_handler) (_("%B: no group info for section %A"),
708 abfd, newsect);
dbb410c3 709 }
b34976b6 710 return TRUE;
dbb410c3
AM
711}
712
3d7f7666 713bfd_boolean
dd863624 714_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
715{
716 unsigned int i;
717 unsigned int num_group = elf_tdata (abfd)->num_group;
718 bfd_boolean result = TRUE;
dd863624
L
719 asection *s;
720
721 /* Process SHF_LINK_ORDER. */
722 for (s = abfd->sections; s != NULL; s = s->next)
723 {
724 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
725 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
726 {
727 unsigned int elfsec = this_hdr->sh_link;
728 /* FIXME: The old Intel compiler and old strip/objcopy may
729 not set the sh_link or sh_info fields. Hence we could
730 get the situation where elfsec is 0. */
731 if (elfsec == 0)
732 {
4fbb74a6 733 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
734 if (bed->link_order_error_handler)
735 bed->link_order_error_handler
736 (_("%B: warning: sh_link not set for section `%A'"),
737 abfd, s);
738 }
739 else
740 {
91d6fa6a 741 asection *linksec = NULL;
25bbc984 742
4fbb74a6
AM
743 if (elfsec < elf_numsections (abfd))
744 {
745 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 746 linksec = this_hdr->bfd_section;
4fbb74a6 747 }
25bbc984
L
748
749 /* PR 1991, 2008:
750 Some strip/objcopy may leave an incorrect value in
751 sh_link. We don't want to proceed. */
91d6fa6a 752 if (linksec == NULL)
25bbc984
L
753 {
754 (*_bfd_error_handler)
755 (_("%B: sh_link [%d] in section `%A' is incorrect"),
756 s->owner, s, elfsec);
757 result = FALSE;
758 }
759
91d6fa6a 760 elf_linked_to_section (s) = linksec;
dd863624
L
761 }
762 }
763 }
3d7f7666 764
dd863624 765 /* Process section groups. */
3d7f7666
L
766 if (num_group == (unsigned) -1)
767 return result;
768
769 for (i = 0; i < num_group; i++)
770 {
771 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
772 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
773 unsigned int n_elt = shdr->sh_size / 4;
774
775 while (--n_elt != 0)
776 if ((++idx)->shdr->bfd_section)
777 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
778 else if (idx->shdr->sh_type == SHT_RELA
779 || idx->shdr->sh_type == SHT_REL)
780 /* We won't include relocation sections in section groups in
781 output object files. We adjust the group section size here
782 so that relocatable link will work correctly when
783 relocation sections are in section group in input object
784 files. */
785 shdr->bfd_section->size -= 4;
786 else
787 {
788 /* There are some unknown sections in the group. */
789 (*_bfd_error_handler)
d003868e
AM
790 (_("%B: unknown [%d] section `%s' in group [%s]"),
791 abfd,
3d7f7666 792 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
793 bfd_elf_string_from_elf_section (abfd,
794 (elf_elfheader (abfd)
795 ->e_shstrndx),
796 idx->shdr->sh_name),
3d7f7666
L
797 shdr->bfd_section->name);
798 result = FALSE;
799 }
800 }
801 return result;
802}
803
72adc230
AM
804bfd_boolean
805bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
806{
807 return elf_next_in_group (sec) != NULL;
808}
809
252b5132
RH
810/* Make a BFD section from an ELF section. We store a pointer to the
811 BFD section in the bfd_section field of the header. */
812
b34976b6 813bfd_boolean
217aa764
AM
814_bfd_elf_make_section_from_shdr (bfd *abfd,
815 Elf_Internal_Shdr *hdr,
6dc132d9
L
816 const char *name,
817 int shindex)
252b5132
RH
818{
819 asection *newsect;
820 flagword flags;
9c5bfbb7 821 const struct elf_backend_data *bed;
252b5132
RH
822
823 if (hdr->bfd_section != NULL)
824 {
825 BFD_ASSERT (strcmp (name,
826 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 827 return TRUE;
252b5132
RH
828 }
829
830 newsect = bfd_make_section_anyway (abfd, name);
831 if (newsect == NULL)
b34976b6 832 return FALSE;
252b5132 833
1829f4b2
AM
834 hdr->bfd_section = newsect;
835 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 836 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 837
2f89ff8d
L
838 /* Always use the real type/flags. */
839 elf_section_type (newsect) = hdr->sh_type;
840 elf_section_flags (newsect) = hdr->sh_flags;
841
252b5132
RH
842 newsect->filepos = hdr->sh_offset;
843
844 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
845 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
846 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 847 bfd_log2 (hdr->sh_addralign)))
b34976b6 848 return FALSE;
252b5132
RH
849
850 flags = SEC_NO_FLAGS;
851 if (hdr->sh_type != SHT_NOBITS)
852 flags |= SEC_HAS_CONTENTS;
dbb410c3 853 if (hdr->sh_type == SHT_GROUP)
b3096250 854 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
855 if ((hdr->sh_flags & SHF_ALLOC) != 0)
856 {
857 flags |= SEC_ALLOC;
858 if (hdr->sh_type != SHT_NOBITS)
859 flags |= SEC_LOAD;
860 }
861 if ((hdr->sh_flags & SHF_WRITE) == 0)
862 flags |= SEC_READONLY;
863 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
864 flags |= SEC_CODE;
865 else if ((flags & SEC_LOAD) != 0)
866 flags |= SEC_DATA;
f5fa8ca2
JJ
867 if ((hdr->sh_flags & SHF_MERGE) != 0)
868 {
869 flags |= SEC_MERGE;
870 newsect->entsize = hdr->sh_entsize;
871 if ((hdr->sh_flags & SHF_STRINGS) != 0)
872 flags |= SEC_STRINGS;
873 }
dbb410c3
AM
874 if (hdr->sh_flags & SHF_GROUP)
875 if (!setup_group (abfd, hdr, newsect))
b34976b6 876 return FALSE;
13ae64f3
JJ
877 if ((hdr->sh_flags & SHF_TLS) != 0)
878 flags |= SEC_THREAD_LOCAL;
252b5132 879
3d2b39cf 880 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 881 {
3d2b39cf
L
882 /* The debugging sections appear to be recognized only by name,
883 not any sort of flag. Their SEC_ALLOC bits are cleared. */
884 static const struct
885 {
886 const char *name;
887 int len;
888 } debug_sections [] =
889 {
0112cd26 890 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
891 { NULL, 0 }, /* 'e' */
892 { NULL, 0 }, /* 'f' */
0112cd26 893 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
894 { NULL, 0 }, /* 'h' */
895 { NULL, 0 }, /* 'i' */
896 { NULL, 0 }, /* 'j' */
897 { NULL, 0 }, /* 'k' */
0112cd26 898 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
899 { NULL, 0 }, /* 'm' */
900 { NULL, 0 }, /* 'n' */
901 { NULL, 0 }, /* 'o' */
902 { NULL, 0 }, /* 'p' */
903 { NULL, 0 }, /* 'q' */
904 { NULL, 0 }, /* 'r' */
1b315056
CS
905 { STRING_COMMA_LEN ("stab") }, /* 's' */
906 { NULL, 0 }, /* 't' */
907 { NULL, 0 }, /* 'u' */
908 { NULL, 0 }, /* 'v' */
909 { NULL, 0 }, /* 'w' */
910 { NULL, 0 }, /* 'x' */
911 { NULL, 0 }, /* 'y' */
912 { STRING_COMMA_LEN ("zdebug") } /* 'z' */
3d2b39cf 913 };
08a40648 914
3d2b39cf
L
915 if (name [0] == '.')
916 {
917 int i = name [1] - 'd';
918 if (i >= 0
919 && i < (int) ARRAY_SIZE (debug_sections)
920 && debug_sections [i].name != NULL
921 && strncmp (&name [1], debug_sections [i].name,
922 debug_sections [i].len) == 0)
923 flags |= SEC_DEBUGGING;
924 }
925 }
252b5132
RH
926
927 /* As a GNU extension, if the name begins with .gnu.linkonce, we
928 only link a single copy of the section. This is used to support
929 g++. g++ will emit each template expansion in its own section.
930 The symbols will be defined as weak, so that multiple definitions
931 are permitted. The GNU linker extension is to actually discard
932 all but one of the sections. */
0112cd26 933 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 934 && elf_next_in_group (newsect) == NULL)
252b5132
RH
935 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
936
fa152c49
JW
937 bed = get_elf_backend_data (abfd);
938 if (bed->elf_backend_section_flags)
939 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 940 return FALSE;
fa152c49 941
252b5132 942 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 943 return FALSE;
252b5132 944
718175fa
JK
945 /* We do not parse the PT_NOTE segments as we are interested even in the
946 separate debug info files which may have the segments offsets corrupted.
947 PT_NOTEs from the core files are currently not parsed using BFD. */
948 if (hdr->sh_type == SHT_NOTE)
949 {
baea7ef1 950 bfd_byte *contents;
718175fa 951
baea7ef1 952 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
953 return FALSE;
954
baea7ef1 955 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
956 free (contents);
957 }
958
252b5132
RH
959 if ((flags & SEC_ALLOC) != 0)
960 {
961 Elf_Internal_Phdr *phdr;
6ffd7900
AM
962 unsigned int i, nload;
963
964 /* Some ELF linkers produce binaries with all the program header
965 p_paddr fields zero. If we have such a binary with more than
966 one PT_LOAD header, then leave the section lma equal to vma
967 so that we don't create sections with overlapping lma. */
968 phdr = elf_tdata (abfd)->phdr;
969 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
970 if (phdr->p_paddr != 0)
971 break;
972 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
973 ++nload;
974 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
975 return TRUE;
252b5132 976
252b5132
RH
977 phdr = elf_tdata (abfd)->phdr;
978 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
979 {
88967714 980 if (phdr->p_type == PT_LOAD
9a83a553 981 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 982 {
88967714
AM
983 if ((flags & SEC_LOAD) == 0)
984 newsect->lma = (phdr->p_paddr
985 + hdr->sh_addr - phdr->p_vaddr);
986 else
987 /* We used to use the same adjustment for SEC_LOAD
988 sections, but that doesn't work if the segment
989 is packed with code from multiple VMAs.
990 Instead we calculate the section LMA based on
991 the segment LMA. It is assumed that the
992 segment will contain sections with contiguous
993 LMAs, even if the VMAs are not. */
994 newsect->lma = (phdr->p_paddr
995 + hdr->sh_offset - phdr->p_offset);
996
997 /* With contiguous segments, we can't tell from file
998 offsets whether a section with zero size should
999 be placed at the end of one segment or the
1000 beginning of the next. Decide based on vaddr. */
1001 if (hdr->sh_addr >= phdr->p_vaddr
1002 && (hdr->sh_addr + hdr->sh_size
1003 <= phdr->p_vaddr + phdr->p_memsz))
1004 break;
252b5132
RH
1005 }
1006 }
1007 }
1008
b34976b6 1009 return TRUE;
252b5132
RH
1010}
1011
252b5132
RH
1012const char *const bfd_elf_section_type_names[] = {
1013 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1014 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1015 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1016};
1017
1049f94e 1018/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1019 output, and the reloc is against an external symbol, and nothing
1020 has given us any additional addend, the resulting reloc will also
1021 be against the same symbol. In such a case, we don't want to
1022 change anything about the way the reloc is handled, since it will
1023 all be done at final link time. Rather than put special case code
1024 into bfd_perform_relocation, all the reloc types use this howto
1025 function. It just short circuits the reloc if producing
1049f94e 1026 relocatable output against an external symbol. */
252b5132 1027
252b5132 1028bfd_reloc_status_type
217aa764
AM
1029bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1030 arelent *reloc_entry,
1031 asymbol *symbol,
1032 void *data ATTRIBUTE_UNUSED,
1033 asection *input_section,
1034 bfd *output_bfd,
1035 char **error_message ATTRIBUTE_UNUSED)
1036{
1037 if (output_bfd != NULL
252b5132
RH
1038 && (symbol->flags & BSF_SECTION_SYM) == 0
1039 && (! reloc_entry->howto->partial_inplace
1040 || reloc_entry->addend == 0))
1041 {
1042 reloc_entry->address += input_section->output_offset;
1043 return bfd_reloc_ok;
1044 }
1045
1046 return bfd_reloc_continue;
1047}
1048\f
0ac4564e
L
1049/* Copy the program header and other data from one object module to
1050 another. */
252b5132 1051
b34976b6 1052bfd_boolean
217aa764 1053_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1054{
1055 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1056 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1057 return TRUE;
2d502050
L
1058
1059 BFD_ASSERT (!elf_flags_init (obfd)
1060 || (elf_elfheader (obfd)->e_flags
1061 == elf_elfheader (ibfd)->e_flags));
1062
0ac4564e 1063 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1064 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1065 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1066
1067 /* Copy object attributes. */
1068 _bfd_elf_copy_obj_attributes (ibfd, obfd);
b34976b6 1069 return TRUE;
2d502050
L
1070}
1071
cedc298e
L
1072static const char *
1073get_segment_type (unsigned int p_type)
1074{
1075 const char *pt;
1076 switch (p_type)
1077 {
1078 case PT_NULL: pt = "NULL"; break;
1079 case PT_LOAD: pt = "LOAD"; break;
1080 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1081 case PT_INTERP: pt = "INTERP"; break;
1082 case PT_NOTE: pt = "NOTE"; break;
1083 case PT_SHLIB: pt = "SHLIB"; break;
1084 case PT_PHDR: pt = "PHDR"; break;
1085 case PT_TLS: pt = "TLS"; break;
1086 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1087 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1088 case PT_GNU_RELRO: pt = "RELRO"; break;
1089 default: pt = NULL; break;
1090 }
1091 return pt;
1092}
1093
f0b79d91
L
1094/* Print out the program headers. */
1095
b34976b6 1096bfd_boolean
217aa764 1097_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1098{
a50b1753 1099 FILE *f = (FILE *) farg;
252b5132
RH
1100 Elf_Internal_Phdr *p;
1101 asection *s;
1102 bfd_byte *dynbuf = NULL;
1103
1104 p = elf_tdata (abfd)->phdr;
1105 if (p != NULL)
1106 {
1107 unsigned int i, c;
1108
1109 fprintf (f, _("\nProgram Header:\n"));
1110 c = elf_elfheader (abfd)->e_phnum;
1111 for (i = 0; i < c; i++, p++)
1112 {
cedc298e 1113 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1114 char buf[20];
1115
cedc298e 1116 if (pt == NULL)
252b5132 1117 {
cedc298e
L
1118 sprintf (buf, "0x%lx", p->p_type);
1119 pt = buf;
252b5132 1120 }
dc810e39 1121 fprintf (f, "%8s off 0x", pt);
60b89a18 1122 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1123 fprintf (f, " vaddr 0x");
60b89a18 1124 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1125 fprintf (f, " paddr 0x");
60b89a18 1126 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1127 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1128 fprintf (f, " filesz 0x");
60b89a18 1129 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1130 fprintf (f, " memsz 0x");
60b89a18 1131 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1132 fprintf (f, " flags %c%c%c",
1133 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1134 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1135 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1136 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1137 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1138 fprintf (f, "\n");
1139 }
1140 }
1141
1142 s = bfd_get_section_by_name (abfd, ".dynamic");
1143 if (s != NULL)
1144 {
cb33740c 1145 unsigned int elfsec;
dc810e39 1146 unsigned long shlink;
252b5132
RH
1147 bfd_byte *extdyn, *extdynend;
1148 size_t extdynsize;
217aa764 1149 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1150
1151 fprintf (f, _("\nDynamic Section:\n"));
1152
eea6121a 1153 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1154 goto error_return;
1155
1156 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1157 if (elfsec == SHN_BAD)
252b5132 1158 goto error_return;
dc810e39 1159 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1160
1161 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1162 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1163
1164 extdyn = dynbuf;
eea6121a 1165 extdynend = extdyn + s->size;
252b5132
RH
1166 for (; extdyn < extdynend; extdyn += extdynsize)
1167 {
1168 Elf_Internal_Dyn dyn;
ad9563d6 1169 const char *name = "";
252b5132 1170 char ab[20];
b34976b6 1171 bfd_boolean stringp;
ad9563d6 1172 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1173
217aa764 1174 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1175
1176 if (dyn.d_tag == DT_NULL)
1177 break;
1178
b34976b6 1179 stringp = FALSE;
252b5132
RH
1180 switch (dyn.d_tag)
1181 {
1182 default:
ad9563d6
CM
1183 if (bed->elf_backend_get_target_dtag)
1184 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1185
1186 if (!strcmp (name, ""))
1187 {
1188 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1189 name = ab;
1190 }
252b5132
RH
1191 break;
1192
b34976b6 1193 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1194 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1195 case DT_PLTGOT: name = "PLTGOT"; break;
1196 case DT_HASH: name = "HASH"; break;
1197 case DT_STRTAB: name = "STRTAB"; break;
1198 case DT_SYMTAB: name = "SYMTAB"; break;
1199 case DT_RELA: name = "RELA"; break;
1200 case DT_RELASZ: name = "RELASZ"; break;
1201 case DT_RELAENT: name = "RELAENT"; break;
1202 case DT_STRSZ: name = "STRSZ"; break;
1203 case DT_SYMENT: name = "SYMENT"; break;
1204 case DT_INIT: name = "INIT"; break;
1205 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1206 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1207 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1208 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1209 case DT_REL: name = "REL"; break;
1210 case DT_RELSZ: name = "RELSZ"; break;
1211 case DT_RELENT: name = "RELENT"; break;
1212 case DT_PLTREL: name = "PLTREL"; break;
1213 case DT_DEBUG: name = "DEBUG"; break;
1214 case DT_TEXTREL: name = "TEXTREL"; break;
1215 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1216 case DT_BIND_NOW: name = "BIND_NOW"; break;
1217 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1218 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1219 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1220 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1221 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1222 case DT_FLAGS: name = "FLAGS"; break;
1223 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1224 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1225 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1226 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1227 case DT_MOVEENT: name = "MOVEENT"; break;
1228 case DT_MOVESZ: name = "MOVESZ"; break;
1229 case DT_FEATURE: name = "FEATURE"; break;
1230 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1231 case DT_SYMINSZ: name = "SYMINSZ"; break;
1232 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1233 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1234 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1235 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1236 case DT_PLTPAD: name = "PLTPAD"; break;
1237 case DT_MOVETAB: name = "MOVETAB"; break;
1238 case DT_SYMINFO: name = "SYMINFO"; break;
1239 case DT_RELACOUNT: name = "RELACOUNT"; break;
1240 case DT_RELCOUNT: name = "RELCOUNT"; break;
1241 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1242 case DT_VERSYM: name = "VERSYM"; break;
1243 case DT_VERDEF: name = "VERDEF"; break;
1244 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1245 case DT_VERNEED: name = "VERNEED"; break;
1246 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1247 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1248 case DT_USED: name = "USED"; break;
b34976b6 1249 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1250 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1251 }
1252
ad9563d6 1253 fprintf (f, " %-20s ", name);
252b5132 1254 if (! stringp)
a1f3c56e
AN
1255 {
1256 fprintf (f, "0x");
1257 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1258 }
252b5132
RH
1259 else
1260 {
1261 const char *string;
dc810e39 1262 unsigned int tagv = dyn.d_un.d_val;
252b5132 1263
dc810e39 1264 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1265 if (string == NULL)
1266 goto error_return;
1267 fprintf (f, "%s", string);
1268 }
1269 fprintf (f, "\n");
1270 }
1271
1272 free (dynbuf);
1273 dynbuf = NULL;
1274 }
1275
1276 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1277 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1278 {
fc0e6df6 1279 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1280 return FALSE;
252b5132
RH
1281 }
1282
1283 if (elf_dynverdef (abfd) != 0)
1284 {
1285 Elf_Internal_Verdef *t;
1286
1287 fprintf (f, _("\nVersion definitions:\n"));
1288 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1289 {
1290 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1291 t->vd_flags, t->vd_hash,
1292 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1293 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1294 {
1295 Elf_Internal_Verdaux *a;
1296
1297 fprintf (f, "\t");
1298 for (a = t->vd_auxptr->vda_nextptr;
1299 a != NULL;
1300 a = a->vda_nextptr)
d0fb9a8d
JJ
1301 fprintf (f, "%s ",
1302 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1303 fprintf (f, "\n");
1304 }
1305 }
1306 }
1307
1308 if (elf_dynverref (abfd) != 0)
1309 {
1310 Elf_Internal_Verneed *t;
1311
1312 fprintf (f, _("\nVersion References:\n"));
1313 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1314 {
1315 Elf_Internal_Vernaux *a;
1316
d0fb9a8d
JJ
1317 fprintf (f, _(" required from %s:\n"),
1318 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1319 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1320 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1321 a->vna_flags, a->vna_other,
1322 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1323 }
1324 }
1325
b34976b6 1326 return TRUE;
252b5132
RH
1327
1328 error_return:
1329 if (dynbuf != NULL)
1330 free (dynbuf);
b34976b6 1331 return FALSE;
252b5132
RH
1332}
1333
1334/* Display ELF-specific fields of a symbol. */
1335
1336void
217aa764
AM
1337bfd_elf_print_symbol (bfd *abfd,
1338 void *filep,
1339 asymbol *symbol,
1340 bfd_print_symbol_type how)
252b5132 1341{
a50b1753 1342 FILE *file = (FILE *) filep;
252b5132
RH
1343 switch (how)
1344 {
1345 case bfd_print_symbol_name:
1346 fprintf (file, "%s", symbol->name);
1347 break;
1348 case bfd_print_symbol_more:
1349 fprintf (file, "elf ");
60b89a18 1350 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1351 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1352 break;
1353 case bfd_print_symbol_all:
1354 {
4e8a9624
AM
1355 const char *section_name;
1356 const char *name = NULL;
9c5bfbb7 1357 const struct elf_backend_data *bed;
7a13edea 1358 unsigned char st_other;
dbb410c3 1359 bfd_vma val;
c044fabd 1360
252b5132 1361 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1362
1363 bed = get_elf_backend_data (abfd);
1364 if (bed->elf_backend_print_symbol_all)
c044fabd 1365 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1366
1367 if (name == NULL)
1368 {
7ee38065 1369 name = symbol->name;
217aa764 1370 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1371 }
1372
252b5132
RH
1373 fprintf (file, " %s\t", section_name);
1374 /* Print the "other" value for a symbol. For common symbols,
1375 we've already printed the size; now print the alignment.
1376 For other symbols, we have no specified alignment, and
1377 we've printed the address; now print the size. */
dcf6c779 1378 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1379 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1380 else
1381 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1382 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1383
1384 /* If we have version information, print it. */
1385 if (elf_tdata (abfd)->dynversym_section != 0
1386 && (elf_tdata (abfd)->dynverdef_section != 0
1387 || elf_tdata (abfd)->dynverref_section != 0))
1388 {
1389 unsigned int vernum;
1390 const char *version_string;
1391
1392 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1393
1394 if (vernum == 0)
1395 version_string = "";
1396 else if (vernum == 1)
1397 version_string = "Base";
1398 else if (vernum <= elf_tdata (abfd)->cverdefs)
1399 version_string =
1400 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1401 else
1402 {
1403 Elf_Internal_Verneed *t;
1404
1405 version_string = "";
1406 for (t = elf_tdata (abfd)->verref;
1407 t != NULL;
1408 t = t->vn_nextref)
1409 {
1410 Elf_Internal_Vernaux *a;
1411
1412 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1413 {
1414 if (a->vna_other == vernum)
1415 {
1416 version_string = a->vna_nodename;
1417 break;
1418 }
1419 }
1420 }
1421 }
1422
1423 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1424 fprintf (file, " %-11s", version_string);
1425 else
1426 {
1427 int i;
1428
1429 fprintf (file, " (%s)", version_string);
1430 for (i = 10 - strlen (version_string); i > 0; --i)
1431 putc (' ', file);
1432 }
1433 }
1434
1435 /* If the st_other field is not zero, print it. */
7a13edea 1436 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1437
7a13edea
NC
1438 switch (st_other)
1439 {
1440 case 0: break;
1441 case STV_INTERNAL: fprintf (file, " .internal"); break;
1442 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1443 case STV_PROTECTED: fprintf (file, " .protected"); break;
1444 default:
1445 /* Some other non-defined flags are also present, so print
1446 everything hex. */
1447 fprintf (file, " 0x%02x", (unsigned int) st_other);
1448 }
252b5132 1449
587ff49e 1450 fprintf (file, " %s", name);
252b5132
RH
1451 }
1452 break;
1453 }
1454}
252b5132 1455
252b5132
RH
1456/* Allocate an ELF string table--force the first byte to be zero. */
1457
1458struct bfd_strtab_hash *
217aa764 1459_bfd_elf_stringtab_init (void)
252b5132
RH
1460{
1461 struct bfd_strtab_hash *ret;
1462
1463 ret = _bfd_stringtab_init ();
1464 if (ret != NULL)
1465 {
1466 bfd_size_type loc;
1467
b34976b6 1468 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1469 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1470 if (loc == (bfd_size_type) -1)
1471 {
1472 _bfd_stringtab_free (ret);
1473 ret = NULL;
1474 }
1475 }
1476 return ret;
1477}
1478\f
1479/* ELF .o/exec file reading */
1480
c044fabd 1481/* Create a new bfd section from an ELF section header. */
252b5132 1482
b34976b6 1483bfd_boolean
217aa764 1484bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1485{
4fbb74a6
AM
1486 Elf_Internal_Shdr *hdr;
1487 Elf_Internal_Ehdr *ehdr;
1488 const struct elf_backend_data *bed;
90937f86 1489 const char *name;
252b5132 1490
4fbb74a6
AM
1491 if (shindex >= elf_numsections (abfd))
1492 return FALSE;
1493
1494 hdr = elf_elfsections (abfd)[shindex];
1495 ehdr = elf_elfheader (abfd);
1496 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1497 hdr->sh_name);
933d961a
JJ
1498 if (name == NULL)
1499 return FALSE;
252b5132 1500
4fbb74a6 1501 bed = get_elf_backend_data (abfd);
252b5132
RH
1502 switch (hdr->sh_type)
1503 {
1504 case SHT_NULL:
1505 /* Inactive section. Throw it away. */
b34976b6 1506 return TRUE;
252b5132
RH
1507
1508 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1509 case SHT_NOBITS: /* .bss section. */
1510 case SHT_HASH: /* .hash section. */
1511 case SHT_NOTE: /* .note section. */
25e27870
L
1512 case SHT_INIT_ARRAY: /* .init_array section. */
1513 case SHT_FINI_ARRAY: /* .fini_array section. */
1514 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1515 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1516 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1517 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1518
797fc050 1519 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1520 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1521 return FALSE;
cfcac11d
NC
1522 if (hdr->sh_link > elf_numsections (abfd))
1523 {
caa83f8b 1524 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1525 field set to SHN_BEFORE or SHN_AFTER. */
1526 switch (bfd_get_arch (abfd))
1527 {
caa83f8b 1528 case bfd_arch_i386:
cfcac11d
NC
1529 case bfd_arch_sparc:
1530 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1531 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1532 break;
1533 /* Otherwise fall through. */
1534 default:
1535 return FALSE;
1536 }
1537 }
1538 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
8e0ed13f 1539 return FALSE;
cfcac11d 1540 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1541 {
1542 Elf_Internal_Shdr *dynsymhdr;
1543
1544 /* The shared libraries distributed with hpux11 have a bogus
1545 sh_link field for the ".dynamic" section. Find the
1546 string table for the ".dynsym" section instead. */
1547 if (elf_dynsymtab (abfd) != 0)
1548 {
1549 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1550 hdr->sh_link = dynsymhdr->sh_link;
1551 }
1552 else
1553 {
1554 unsigned int i, num_sec;
1555
1556 num_sec = elf_numsections (abfd);
1557 for (i = 1; i < num_sec; i++)
1558 {
1559 dynsymhdr = elf_elfsections (abfd)[i];
1560 if (dynsymhdr->sh_type == SHT_DYNSYM)
1561 {
1562 hdr->sh_link = dynsymhdr->sh_link;
1563 break;
1564 }
1565 }
1566 }
1567 }
1568 break;
1569
252b5132
RH
1570 case SHT_SYMTAB: /* A symbol table */
1571 if (elf_onesymtab (abfd) == shindex)
b34976b6 1572 return TRUE;
252b5132 1573
a50b2160
JJ
1574 if (hdr->sh_entsize != bed->s->sizeof_sym)
1575 return FALSE;
3337c1e5
AM
1576 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1577 return FALSE;
252b5132
RH
1578 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1579 elf_onesymtab (abfd) = shindex;
1580 elf_tdata (abfd)->symtab_hdr = *hdr;
1581 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1582 abfd->flags |= HAS_SYMS;
1583
1584 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1585 SHF_ALLOC is set, and this is a shared object, then we also
1586 treat this section as a BFD section. We can not base the
1587 decision purely on SHF_ALLOC, because that flag is sometimes
1588 set in a relocatable object file, which would confuse the
1589 linker. */
252b5132
RH
1590 if ((hdr->sh_flags & SHF_ALLOC) != 0
1591 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1592 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1593 shindex))
b34976b6 1594 return FALSE;
252b5132 1595
1b3a8575
AM
1596 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1597 can't read symbols without that section loaded as well. It
1598 is most likely specified by the next section header. */
1599 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1600 {
1601 unsigned int i, num_sec;
1602
1603 num_sec = elf_numsections (abfd);
1604 for (i = shindex + 1; i < num_sec; i++)
1605 {
1606 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1607 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1608 && hdr2->sh_link == shindex)
1609 break;
1610 }
1611 if (i == num_sec)
1612 for (i = 1; i < shindex; i++)
1613 {
1614 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1615 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1616 && hdr2->sh_link == shindex)
1617 break;
1618 }
1619 if (i != shindex)
1620 return bfd_section_from_shdr (abfd, i);
1621 }
b34976b6 1622 return TRUE;
252b5132
RH
1623
1624 case SHT_DYNSYM: /* A dynamic symbol table */
1625 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1626 return TRUE;
252b5132 1627
a50b2160
JJ
1628 if (hdr->sh_entsize != bed->s->sizeof_sym)
1629 return FALSE;
252b5132
RH
1630 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1631 elf_dynsymtab (abfd) = shindex;
1632 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1633 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1634 abfd->flags |= HAS_SYMS;
1635
1636 /* Besides being a symbol table, we also treat this as a regular
1637 section, so that objcopy can handle it. */
6dc132d9 1638 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1639
9ad5cbcf
AM
1640 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1641 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1642 return TRUE;
9ad5cbcf 1643
1b3a8575 1644 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1645 elf_symtab_shndx (abfd) = shindex;
1646 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1647 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1648 return TRUE;
9ad5cbcf 1649
252b5132
RH
1650 case SHT_STRTAB: /* A string table */
1651 if (hdr->bfd_section != NULL)
b34976b6 1652 return TRUE;
252b5132
RH
1653 if (ehdr->e_shstrndx == shindex)
1654 {
1655 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1656 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1657 return TRUE;
252b5132 1658 }
1b3a8575
AM
1659 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1660 {
1661 symtab_strtab:
1662 elf_tdata (abfd)->strtab_hdr = *hdr;
1663 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1664 return TRUE;
1665 }
1666 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1667 {
1668 dynsymtab_strtab:
1669 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1670 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1671 elf_elfsections (abfd)[shindex] = hdr;
1672 /* We also treat this as a regular section, so that objcopy
1673 can handle it. */
6dc132d9
L
1674 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1675 shindex);
1b3a8575 1676 }
252b5132 1677
1b3a8575
AM
1678 /* If the string table isn't one of the above, then treat it as a
1679 regular section. We need to scan all the headers to be sure,
1680 just in case this strtab section appeared before the above. */
1681 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1682 {
1683 unsigned int i, num_sec;
252b5132 1684
1b3a8575
AM
1685 num_sec = elf_numsections (abfd);
1686 for (i = 1; i < num_sec; i++)
1687 {
1688 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1689 if (hdr2->sh_link == shindex)
1690 {
933d961a
JJ
1691 /* Prevent endless recursion on broken objects. */
1692 if (i == shindex)
1693 return FALSE;
1b3a8575
AM
1694 if (! bfd_section_from_shdr (abfd, i))
1695 return FALSE;
1696 if (elf_onesymtab (abfd) == i)
1697 goto symtab_strtab;
1698 if (elf_dynsymtab (abfd) == i)
1699 goto dynsymtab_strtab;
1700 }
1701 }
1702 }
6dc132d9 1703 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1704
1705 case SHT_REL:
1706 case SHT_RELA:
1707 /* *These* do a lot of work -- but build no sections! */
1708 {
1709 asection *target_sect;
1710 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1711 unsigned int num_sec = elf_numsections (abfd);
252b5132 1712
aa2ca951
JJ
1713 if (hdr->sh_entsize
1714 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1715 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1716 return FALSE;
1717
03ae5f59 1718 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1719 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1720 {
1721 ((*_bfd_error_handler)
d003868e
AM
1722 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1723 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1724 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1725 shindex);
03ae5f59
ILT
1726 }
1727
252b5132
RH
1728 /* For some incomprehensible reason Oracle distributes
1729 libraries for Solaris in which some of the objects have
1730 bogus sh_link fields. It would be nice if we could just
1731 reject them, but, unfortunately, some people need to use
1732 them. We scan through the section headers; if we find only
1733 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1734 to it. I hope this doesn't break anything.
1735
1736 Don't do it on executable nor shared library. */
1737 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1738 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1739 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1740 {
9ad5cbcf 1741 unsigned int scan;
252b5132
RH
1742 int found;
1743
1744 found = 0;
9ad5cbcf 1745 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1746 {
1747 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1748 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1749 {
1750 if (found != 0)
1751 {
1752 found = 0;
1753 break;
1754 }
1755 found = scan;
1756 }
1757 }
1758 if (found != 0)
1759 hdr->sh_link = found;
1760 }
1761
1762 /* Get the symbol table. */
1b3a8575
AM
1763 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1764 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1765 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1766 return FALSE;
252b5132
RH
1767
1768 /* If this reloc section does not use the main symbol table we
1769 don't treat it as a reloc section. BFD can't adequately
1770 represent such a section, so at least for now, we don't
c044fabd 1771 try. We just present it as a normal section. We also
60bcf0fa 1772 can't use it as a reloc section if it points to the null
83b89087
L
1773 section, an invalid section, another reloc section, or its
1774 sh_link points to the null section. */
185ef66d 1775 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1776 || hdr->sh_link == SHN_UNDEF
185ef66d 1777 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1778 || hdr->sh_info >= num_sec
1779 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1780 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1781 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1782 shindex);
252b5132
RH
1783
1784 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1785 return FALSE;
252b5132
RH
1786 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1787 if (target_sect == NULL)
b34976b6 1788 return FALSE;
252b5132
RH
1789
1790 if ((target_sect->flags & SEC_RELOC) == 0
1791 || target_sect->reloc_count == 0)
1792 hdr2 = &elf_section_data (target_sect)->rel_hdr;
1793 else
1794 {
dc810e39 1795 bfd_size_type amt;
252b5132 1796 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 1797 amt = sizeof (*hdr2);
a50b1753 1798 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
14b1c01e
AM
1799 if (hdr2 == NULL)
1800 return FALSE;
252b5132
RH
1801 elf_section_data (target_sect)->rel_hdr2 = hdr2;
1802 }
1803 *hdr2 = *hdr;
1804 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1805 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1806 target_sect->flags |= SEC_RELOC;
1807 target_sect->relocation = NULL;
1808 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1809 /* In the section to which the relocations apply, mark whether
1810 its relocations are of the REL or RELA variety. */
72730e0c 1811 if (hdr->sh_size != 0)
68bfbfcc 1812 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 1813 abfd->flags |= HAS_RELOC;
b34976b6 1814 return TRUE;
252b5132 1815 }
252b5132
RH
1816
1817 case SHT_GNU_verdef:
1818 elf_dynverdef (abfd) = shindex;
1819 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1820 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1821
1822 case SHT_GNU_versym:
a50b2160
JJ
1823 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1824 return FALSE;
252b5132
RH
1825 elf_dynversym (abfd) = shindex;
1826 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1827 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1828
1829 case SHT_GNU_verneed:
1830 elf_dynverref (abfd) = shindex;
1831 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1832 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1833
1834 case SHT_SHLIB:
b34976b6 1835 return TRUE;
252b5132 1836
dbb410c3 1837 case SHT_GROUP:
1783205a 1838 if (! IS_VALID_GROUP_SECTION_HEADER (hdr))
a50b2160 1839 return FALSE;
6dc132d9 1840 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1841 return FALSE;
dbb410c3
AM
1842 if (hdr->contents != NULL)
1843 {
1844 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1845 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1846 asection *s;
1847
b885599b
AM
1848 if (idx->flags & GRP_COMDAT)
1849 hdr->bfd_section->flags
1850 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1851
45c5e9ed
L
1852 /* We try to keep the same section order as it comes in. */
1853 idx += n_elt;
dbb410c3 1854 while (--n_elt != 0)
1783205a
NC
1855 {
1856 --idx;
1857
1858 if (idx->shdr != NULL
1859 && (s = idx->shdr->bfd_section) != NULL
1860 && elf_next_in_group (s) != NULL)
1861 {
1862 elf_next_in_group (hdr->bfd_section) = s;
1863 break;
1864 }
1865 }
dbb410c3
AM
1866 }
1867 break;
1868
252b5132 1869 default:
104d59d1
JM
1870 /* Possibly an attributes section. */
1871 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1872 || hdr->sh_type == bed->obj_attrs_section_type)
1873 {
1874 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1875 return FALSE;
1876 _bfd_elf_parse_attributes (abfd, hdr);
1877 return TRUE;
1878 }
1879
252b5132 1880 /* Check for any processor-specific section types. */
3eb70a79
L
1881 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1882 return TRUE;
1883
1884 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1885 {
1886 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1887 /* FIXME: How to properly handle allocated section reserved
1888 for applications? */
1889 (*_bfd_error_handler)
1890 (_("%B: don't know how to handle allocated, application "
1891 "specific section `%s' [0x%8x]"),
1892 abfd, name, hdr->sh_type);
1893 else
1894 /* Allow sections reserved for applications. */
1895 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1896 shindex);
1897 }
1898 else if (hdr->sh_type >= SHT_LOPROC
1899 && hdr->sh_type <= SHT_HIPROC)
1900 /* FIXME: We should handle this section. */
1901 (*_bfd_error_handler)
1902 (_("%B: don't know how to handle processor specific section "
1903 "`%s' [0x%8x]"),
1904 abfd, name, hdr->sh_type);
1905 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1906 {
1907 /* Unrecognised OS-specific sections. */
1908 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1909 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1910 required to correctly process the section and the file should
ff15b240
NC
1911 be rejected with an error message. */
1912 (*_bfd_error_handler)
1913 (_("%B: don't know how to handle OS specific section "
1914 "`%s' [0x%8x]"),
1915 abfd, name, hdr->sh_type);
1916 else
1917 /* Otherwise it should be processed. */
1918 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1919 }
3eb70a79
L
1920 else
1921 /* FIXME: We should handle this section. */
1922 (*_bfd_error_handler)
1923 (_("%B: don't know how to handle section `%s' [0x%8x]"),
1924 abfd, name, hdr->sh_type);
1925
1926 return FALSE;
252b5132
RH
1927 }
1928
b34976b6 1929 return TRUE;
252b5132
RH
1930}
1931
87d72d41 1932/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 1933
87d72d41
AM
1934Elf_Internal_Sym *
1935bfd_sym_from_r_symndx (struct sym_cache *cache,
1936 bfd *abfd,
1937 unsigned long r_symndx)
ec338859 1938{
ec338859
AM
1939 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
1940
a5d1b3b5
AM
1941 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
1942 {
1943 Elf_Internal_Shdr *symtab_hdr;
1944 unsigned char esym[sizeof (Elf64_External_Sym)];
1945 Elf_External_Sym_Shndx eshndx;
ec338859 1946
a5d1b3b5
AM
1947 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1948 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 1949 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 1950 return NULL;
9ad5cbcf 1951
a5d1b3b5
AM
1952 if (cache->abfd != abfd)
1953 {
1954 memset (cache->indx, -1, sizeof (cache->indx));
1955 cache->abfd = abfd;
1956 }
1957 cache->indx[ent] = r_symndx;
ec338859 1958 }
a5d1b3b5 1959
87d72d41 1960 return &cache->sym[ent];
ec338859
AM
1961}
1962
252b5132
RH
1963/* Given an ELF section number, retrieve the corresponding BFD
1964 section. */
1965
1966asection *
91d6fa6a 1967bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 1968{
91d6fa6a 1969 if (sec_index >= elf_numsections (abfd))
252b5132 1970 return NULL;
91d6fa6a 1971 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
1972}
1973
b35d266b 1974static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 1975{
0112cd26
NC
1976 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1977 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1978};
1979
b35d266b 1980static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 1981{
0112cd26
NC
1982 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1983 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1984};
1985
b35d266b 1986static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 1987{
0112cd26
NC
1988 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1989 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1990 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
1991 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
1992 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
1993 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
1994 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
1995 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
1996 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
1997 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
1998 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1999};
2000
b35d266b 2001static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2002{
0112cd26
NC
2003 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2004 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2005 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2006};
2007
b35d266b 2008static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2009{
0112cd26
NC
2010 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2011 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2012 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2013 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2014 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2015 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2016 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2017 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2018 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2019};
2020
b35d266b 2021static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2022{
0112cd26
NC
2023 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2024 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2025};
2026
b35d266b 2027static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2028{
0112cd26
NC
2029 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2030 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2031 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2032 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2033};
2034
b35d266b 2035static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2036{
0112cd26
NC
2037 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2038 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2039};
2040
b35d266b 2041static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2042{
0112cd26
NC
2043 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2044 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2045 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2046};
2047
b35d266b 2048static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2049{
0112cd26
NC
2050 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2051 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2052 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2053};
2054
b35d266b 2055static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2056{
0112cd26
NC
2057 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2058 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2059 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2060 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2061 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2062};
2063
b35d266b 2064static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2065{
0112cd26
NC
2066 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2067 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2068 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2069 /* See struct bfd_elf_special_section declaration for the semantics of
2070 this special case where .prefix_length != strlen (.prefix). */
2071 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2072 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2073};
2074
b35d266b 2075static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2076{
0112cd26
NC
2077 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2078 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2079 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2080 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2081};
2082
1b315056
CS
2083static const struct bfd_elf_special_section special_sections_z[] =
2084{
2085 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2086 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2087 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2088 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2089 { NULL, 0, 0, 0, 0 }
2090};
2091
b35d266b 2092static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2093{
7f4d3958 2094 special_sections_b, /* 'b' */
98ece1b3 2095 special_sections_c, /* 'c' */
7f4d3958
L
2096 special_sections_d, /* 'd' */
2097 NULL, /* 'e' */
2098 special_sections_f, /* 'f' */
2099 special_sections_g, /* 'g' */
2100 special_sections_h, /* 'h' */
2101 special_sections_i, /* 'i' */
2102 NULL, /* 'j' */
2103 NULL, /* 'k' */
2104 special_sections_l, /* 'l' */
2105 NULL, /* 'm' */
2106 special_sections_n, /* 'n' */
2107 NULL, /* 'o' */
2108 special_sections_p, /* 'p' */
2109 NULL, /* 'q' */
2110 special_sections_r, /* 'r' */
2111 special_sections_s, /* 's' */
2112 special_sections_t, /* 't' */
1b315056
CS
2113 NULL, /* 'u' */
2114 NULL, /* 'v' */
2115 NULL, /* 'w' */
2116 NULL, /* 'x' */
2117 NULL, /* 'y' */
2118 special_sections_z /* 'z' */
7f4d3958
L
2119};
2120
551b43fd
AM
2121const struct bfd_elf_special_section *
2122_bfd_elf_get_special_section (const char *name,
2123 const struct bfd_elf_special_section *spec,
2124 unsigned int rela)
2f89ff8d
L
2125{
2126 int i;
7f4d3958 2127 int len;
7f4d3958 2128
551b43fd 2129 len = strlen (name);
7f4d3958 2130
551b43fd 2131 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2132 {
2133 int suffix_len;
551b43fd 2134 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2135
2136 if (len < prefix_len)
2137 continue;
551b43fd 2138 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2139 continue;
2140
551b43fd 2141 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2142 if (suffix_len <= 0)
2143 {
2144 if (name[prefix_len] != 0)
2145 {
2146 if (suffix_len == 0)
2147 continue;
2148 if (name[prefix_len] != '.'
2149 && (suffix_len == -2
551b43fd 2150 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2151 continue;
2152 }
2153 }
2154 else
2155 {
2156 if (len < prefix_len + suffix_len)
2157 continue;
2158 if (memcmp (name + len - suffix_len,
551b43fd 2159 spec[i].prefix + prefix_len,
7dcb9820
AM
2160 suffix_len) != 0)
2161 continue;
2162 }
551b43fd 2163 return &spec[i];
7dcb9820 2164 }
2f89ff8d
L
2165
2166 return NULL;
2167}
2168
7dcb9820 2169const struct bfd_elf_special_section *
29ef7005 2170_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2171{
551b43fd
AM
2172 int i;
2173 const struct bfd_elf_special_section *spec;
29ef7005 2174 const struct elf_backend_data *bed;
2f89ff8d
L
2175
2176 /* See if this is one of the special sections. */
551b43fd
AM
2177 if (sec->name == NULL)
2178 return NULL;
2f89ff8d 2179
29ef7005
L
2180 bed = get_elf_backend_data (abfd);
2181 spec = bed->special_sections;
2182 if (spec)
2183 {
2184 spec = _bfd_elf_get_special_section (sec->name,
2185 bed->special_sections,
2186 sec->use_rela_p);
2187 if (spec != NULL)
2188 return spec;
2189 }
2190
551b43fd
AM
2191 if (sec->name[0] != '.')
2192 return NULL;
2f89ff8d 2193
551b43fd 2194 i = sec->name[1] - 'b';
1b315056 2195 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2196 return NULL;
2197
2198 spec = special_sections[i];
2f89ff8d 2199
551b43fd
AM
2200 if (spec == NULL)
2201 return NULL;
2202
2203 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2204}
2205
b34976b6 2206bfd_boolean
217aa764 2207_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2208{
2209 struct bfd_elf_section_data *sdata;
551b43fd 2210 const struct elf_backend_data *bed;
7dcb9820 2211 const struct bfd_elf_special_section *ssect;
252b5132 2212
f0abc2a1
AM
2213 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2214 if (sdata == NULL)
2215 {
a50b1753
NC
2216 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2217 sizeof (*sdata));
f0abc2a1
AM
2218 if (sdata == NULL)
2219 return FALSE;
217aa764 2220 sec->used_by_bfd = sdata;
f0abc2a1 2221 }
bf572ba0 2222
551b43fd
AM
2223 /* Indicate whether or not this section should use RELA relocations. */
2224 bed = get_elf_backend_data (abfd);
2225 sec->use_rela_p = bed->default_use_rela_p;
2226
e843e0f8
L
2227 /* When we read a file, we don't need to set ELF section type and
2228 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2229 anyway. We will set ELF section type and flags for all linker
2230 created sections. If user specifies BFD section flags, we will
2231 set ELF section type and flags based on BFD section flags in
2232 elf_fake_sections. */
2233 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2234 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2235 {
551b43fd 2236 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2237 if (ssect != NULL)
2238 {
2239 elf_section_type (sec) = ssect->type;
2240 elf_section_flags (sec) = ssect->attr;
2241 }
2f89ff8d
L
2242 }
2243
f592407e 2244 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2245}
2246
2247/* Create a new bfd section from an ELF program header.
2248
2249 Since program segments have no names, we generate a synthetic name
2250 of the form segment<NUM>, where NUM is generally the index in the
2251 program header table. For segments that are split (see below) we
2252 generate the names segment<NUM>a and segment<NUM>b.
2253
2254 Note that some program segments may have a file size that is different than
2255 (less than) the memory size. All this means is that at execution the
2256 system must allocate the amount of memory specified by the memory size,
2257 but only initialize it with the first "file size" bytes read from the
2258 file. This would occur for example, with program segments consisting
2259 of combined data+bss.
2260
2261 To handle the above situation, this routine generates TWO bfd sections
2262 for the single program segment. The first has the length specified by
2263 the file size of the segment, and the second has the length specified
2264 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2265 into its initialized and uninitialized parts.
252b5132
RH
2266
2267 */
2268
b34976b6 2269bfd_boolean
217aa764
AM
2270_bfd_elf_make_section_from_phdr (bfd *abfd,
2271 Elf_Internal_Phdr *hdr,
91d6fa6a 2272 int hdr_index,
a50b1753 2273 const char *type_name)
252b5132
RH
2274{
2275 asection *newsect;
2276 char *name;
2277 char namebuf[64];
d4c88bbb 2278 size_t len;
252b5132
RH
2279 int split;
2280
2281 split = ((hdr->p_memsz > 0)
2282 && (hdr->p_filesz > 0)
2283 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2284
2285 if (hdr->p_filesz > 0)
252b5132 2286 {
91d6fa6a 2287 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2288 len = strlen (namebuf) + 1;
a50b1753 2289 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2290 if (!name)
2291 return FALSE;
2292 memcpy (name, namebuf, len);
2293 newsect = bfd_make_section (abfd, name);
2294 if (newsect == NULL)
2295 return FALSE;
2296 newsect->vma = hdr->p_vaddr;
2297 newsect->lma = hdr->p_paddr;
2298 newsect->size = hdr->p_filesz;
2299 newsect->filepos = hdr->p_offset;
2300 newsect->flags |= SEC_HAS_CONTENTS;
2301 newsect->alignment_power = bfd_log2 (hdr->p_align);
2302 if (hdr->p_type == PT_LOAD)
252b5132 2303 {
d5191d0c
AM
2304 newsect->flags |= SEC_ALLOC;
2305 newsect->flags |= SEC_LOAD;
2306 if (hdr->p_flags & PF_X)
2307 {
2308 /* FIXME: all we known is that it has execute PERMISSION,
2309 may be data. */
2310 newsect->flags |= SEC_CODE;
2311 }
2312 }
2313 if (!(hdr->p_flags & PF_W))
2314 {
2315 newsect->flags |= SEC_READONLY;
252b5132 2316 }
252b5132
RH
2317 }
2318
d5191d0c 2319 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2320 {
d5191d0c
AM
2321 bfd_vma align;
2322
91d6fa6a 2323 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2324 len = strlen (namebuf) + 1;
a50b1753 2325 name = (char *) bfd_alloc (abfd, len);
252b5132 2326 if (!name)
b34976b6 2327 return FALSE;
d4c88bbb 2328 memcpy (name, namebuf, len);
252b5132
RH
2329 newsect = bfd_make_section (abfd, name);
2330 if (newsect == NULL)
b34976b6 2331 return FALSE;
252b5132
RH
2332 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2333 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2334 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2335 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2336 align = newsect->vma & -newsect->vma;
2337 if (align == 0 || align > hdr->p_align)
2338 align = hdr->p_align;
2339 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2340 if (hdr->p_type == PT_LOAD)
2341 {
d5191d0c
AM
2342 /* Hack for gdb. Segments that have not been modified do
2343 not have their contents written to a core file, on the
2344 assumption that a debugger can find the contents in the
2345 executable. We flag this case by setting the fake
2346 section size to zero. Note that "real" bss sections will
2347 always have their contents dumped to the core file. */
2348 if (bfd_get_format (abfd) == bfd_core)
2349 newsect->size = 0;
252b5132
RH
2350 newsect->flags |= SEC_ALLOC;
2351 if (hdr->p_flags & PF_X)
2352 newsect->flags |= SEC_CODE;
2353 }
2354 if (!(hdr->p_flags & PF_W))
2355 newsect->flags |= SEC_READONLY;
2356 }
2357
b34976b6 2358 return TRUE;
252b5132
RH
2359}
2360
b34976b6 2361bfd_boolean
91d6fa6a 2362bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2363{
9c5bfbb7 2364 const struct elf_backend_data *bed;
20cfcaae
NC
2365
2366 switch (hdr->p_type)
2367 {
2368 case PT_NULL:
91d6fa6a 2369 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2370
2371 case PT_LOAD:
91d6fa6a 2372 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2373
2374 case PT_DYNAMIC:
91d6fa6a 2375 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2376
2377 case PT_INTERP:
91d6fa6a 2378 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2379
2380 case PT_NOTE:
91d6fa6a 2381 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2382 return FALSE;
718175fa 2383 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2384 return FALSE;
2385 return TRUE;
20cfcaae
NC
2386
2387 case PT_SHLIB:
91d6fa6a 2388 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2389
2390 case PT_PHDR:
91d6fa6a 2391 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2392
811072d8 2393 case PT_GNU_EH_FRAME:
91d6fa6a 2394 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2395 "eh_frame_hdr");
2396
2b05f1b7 2397 case PT_GNU_STACK:
91d6fa6a 2398 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2399
8c37241b 2400 case PT_GNU_RELRO:
91d6fa6a 2401 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2402
20cfcaae 2403 default:
8c1acd09 2404 /* Check for any processor-specific program segment types. */
20cfcaae 2405 bed = get_elf_backend_data (abfd);
91d6fa6a 2406 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2407 }
2408}
2409
23bc299b 2410/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2411 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2412 relocations; otherwise, we use REL relocations. */
2413
b34976b6 2414bfd_boolean
217aa764
AM
2415_bfd_elf_init_reloc_shdr (bfd *abfd,
2416 Elf_Internal_Shdr *rel_hdr,
2417 asection *asect,
2418 bfd_boolean use_rela_p)
23bc299b
MM
2419{
2420 char *name;
9c5bfbb7 2421 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2422 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2423
a50b1753 2424 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2425 if (name == NULL)
b34976b6 2426 return FALSE;
23bc299b
MM
2427 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2428 rel_hdr->sh_name =
2b0f7ef9 2429 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2430 FALSE);
23bc299b 2431 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2432 return FALSE;
23bc299b
MM
2433 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2434 rel_hdr->sh_entsize = (use_rela_p
2435 ? bed->s->sizeof_rela
2436 : bed->s->sizeof_rel);
72de5009 2437 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2438 rel_hdr->sh_flags = 0;
2439 rel_hdr->sh_addr = 0;
2440 rel_hdr->sh_size = 0;
2441 rel_hdr->sh_offset = 0;
2442
b34976b6 2443 return TRUE;
23bc299b
MM
2444}
2445
94be91de
JB
2446/* Return the default section type based on the passed in section flags. */
2447
2448int
2449bfd_elf_get_default_section_type (flagword flags)
2450{
2451 if ((flags & SEC_ALLOC) != 0
2452 && ((flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0
2453 || (flags & SEC_NEVER_LOAD) != 0))
2454 return SHT_NOBITS;
2455 return SHT_PROGBITS;
2456}
2457
252b5132
RH
2458/* Set up an ELF internal section header for a section. */
2459
252b5132 2460static void
217aa764 2461elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2462{
9c5bfbb7 2463 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
a50b1753 2464 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
252b5132 2465 Elf_Internal_Shdr *this_hdr;
0414f35b 2466 unsigned int sh_type;
252b5132
RH
2467
2468 if (*failedptr)
2469 {
2470 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2471 loop. */
252b5132
RH
2472 return;
2473 }
2474
2475 this_hdr = &elf_section_data (asect)->this_hdr;
2476
e57b5356
AM
2477 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2478 asect->name, FALSE);
2479 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2480 {
b34976b6 2481 *failedptr = TRUE;
252b5132
RH
2482 return;
2483 }
2484
a4d8e49b 2485 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2486
2487 if ((asect->flags & SEC_ALLOC) != 0
2488 || asect->user_set_vma)
2489 this_hdr->sh_addr = asect->vma;
2490 else
2491 this_hdr->sh_addr = 0;
2492
2493 this_hdr->sh_offset = 0;
eea6121a 2494 this_hdr->sh_size = asect->size;
252b5132 2495 this_hdr->sh_link = 0;
72de5009 2496 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2497 /* The sh_entsize and sh_info fields may have been set already by
2498 copy_private_section_data. */
2499
2500 this_hdr->bfd_section = asect;
2501 this_hdr->contents = NULL;
2502
3cddba1e
L
2503 /* If the section type is unspecified, we set it based on
2504 asect->flags. */
98ece1b3
AM
2505 if ((asect->flags & SEC_GROUP) != 0)
2506 sh_type = SHT_GROUP;
98ece1b3 2507 else
94be91de 2508 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2509
3cddba1e 2510 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2511 this_hdr->sh_type = sh_type;
2512 else if (this_hdr->sh_type == SHT_NOBITS
2513 && sh_type == SHT_PROGBITS
2514 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2515 {
98ece1b3
AM
2516 /* Warn if we are changing a NOBITS section to PROGBITS, but
2517 allow the link to proceed. This can happen when users link
2518 non-bss input sections to bss output sections, or emit data
2519 to a bss output section via a linker script. */
2520 (*_bfd_error_handler)
58f0869b 2521 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2522 this_hdr->sh_type = sh_type;
3cddba1e
L
2523 }
2524
2f89ff8d 2525 switch (this_hdr->sh_type)
252b5132 2526 {
2f89ff8d 2527 default:
2f89ff8d
L
2528 break;
2529
2530 case SHT_STRTAB:
2531 case SHT_INIT_ARRAY:
2532 case SHT_FINI_ARRAY:
2533 case SHT_PREINIT_ARRAY:
2534 case SHT_NOTE:
2535 case SHT_NOBITS:
2536 case SHT_PROGBITS:
2537 break;
2538
2539 case SHT_HASH:
c7ac6ff8 2540 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2541 break;
5de3bf90 2542
2f89ff8d 2543 case SHT_DYNSYM:
252b5132 2544 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2545 break;
2546
2547 case SHT_DYNAMIC:
252b5132 2548 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2549 break;
2550
2551 case SHT_RELA:
2552 if (get_elf_backend_data (abfd)->may_use_rela_p)
2553 this_hdr->sh_entsize = bed->s->sizeof_rela;
2554 break;
2555
2556 case SHT_REL:
2557 if (get_elf_backend_data (abfd)->may_use_rel_p)
2558 this_hdr->sh_entsize = bed->s->sizeof_rel;
2559 break;
2560
2561 case SHT_GNU_versym:
252b5132 2562 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2563 break;
2564
2565 case SHT_GNU_verdef:
252b5132
RH
2566 this_hdr->sh_entsize = 0;
2567 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2568 cverdefs. The linker will set cverdefs, but sh_info will be
2569 zero. */
252b5132
RH
2570 if (this_hdr->sh_info == 0)
2571 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2572 else
2573 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2574 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2575 break;
2576
2577 case SHT_GNU_verneed:
252b5132
RH
2578 this_hdr->sh_entsize = 0;
2579 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2580 cverrefs. The linker will set cverrefs, but sh_info will be
2581 zero. */
252b5132
RH
2582 if (this_hdr->sh_info == 0)
2583 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2584 else
2585 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2586 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2587 break;
2588
2589 case SHT_GROUP:
1783205a 2590 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2591 break;
fdc90cb4
JJ
2592
2593 case SHT_GNU_HASH:
2594 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2595 break;
dbb410c3 2596 }
252b5132
RH
2597
2598 if ((asect->flags & SEC_ALLOC) != 0)
2599 this_hdr->sh_flags |= SHF_ALLOC;
2600 if ((asect->flags & SEC_READONLY) == 0)
2601 this_hdr->sh_flags |= SHF_WRITE;
2602 if ((asect->flags & SEC_CODE) != 0)
2603 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2604 if ((asect->flags & SEC_MERGE) != 0)
2605 {
2606 this_hdr->sh_flags |= SHF_MERGE;
2607 this_hdr->sh_entsize = asect->entsize;
2608 if ((asect->flags & SEC_STRINGS) != 0)
2609 this_hdr->sh_flags |= SHF_STRINGS;
2610 }
1126897b 2611 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2612 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2613 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2614 {
2615 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2616 if (asect->size == 0
2617 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2618 {
3a800eb9 2619 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2620
704afa60 2621 this_hdr->sh_size = 0;
3a800eb9
AM
2622 if (o != NULL)
2623 {
704afa60 2624 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2625 if (this_hdr->sh_size != 0)
2626 this_hdr->sh_type = SHT_NOBITS;
2627 }
704afa60
JJ
2628 }
2629 }
252b5132
RH
2630
2631 /* Check for processor-specific section types. */
0414f35b 2632 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2633 if (bed->elf_backend_fake_sections
2634 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2635 *failedptr = TRUE;
252b5132 2636
42bb2e33 2637 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2638 {
2639 /* Don't change the header type from NOBITS if we are being
42bb2e33 2640 called for objcopy --only-keep-debug. */
0414f35b
AM
2641 this_hdr->sh_type = sh_type;
2642 }
2643
252b5132 2644 /* If the section has relocs, set up a section header for the
23bc299b
MM
2645 SHT_REL[A] section. If two relocation sections are required for
2646 this section, it is up to the processor-specific back-end to
c044fabd 2647 create the other. */
23bc299b 2648 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2649 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2650 &elf_section_data (asect)->rel_hdr,
c044fabd 2651 asect,
68bfbfcc 2652 asect->use_rela_p))
b34976b6 2653 *failedptr = TRUE;
252b5132
RH
2654}
2655
bcacc0f5
AM
2656/* Fill in the contents of a SHT_GROUP section. Called from
2657 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2658 when ELF targets use the generic linker, ld. Called for ld -r
2659 from bfd_elf_final_link. */
dbb410c3 2660
1126897b 2661void
217aa764 2662bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2663{
a50b1753 2664 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2665 asection *elt, *first;
dbb410c3 2666 unsigned char *loc;
b34976b6 2667 bfd_boolean gas;
dbb410c3 2668
7e4111ad
L
2669 /* Ignore linker created group section. See elfNN_ia64_object_p in
2670 elfxx-ia64.c. */
2671 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2672 || *failedptr)
2673 return;
2674
bcacc0f5
AM
2675 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2676 {
2677 unsigned long symindx = 0;
2678
2679 /* elf_group_id will have been set up by objcopy and the
2680 generic linker. */
2681 if (elf_group_id (sec) != NULL)
2682 symindx = elf_group_id (sec)->udata.i;
1126897b 2683
bcacc0f5
AM
2684 if (symindx == 0)
2685 {
2686 /* If called from the assembler, swap_out_syms will have set up
2687 elf_section_syms. */
2688 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2689 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2690 }
2691 elf_section_data (sec)->this_hdr.sh_info = symindx;
2692 }
2693 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2694 {
bcacc0f5
AM
2695 /* The ELF backend linker sets sh_info to -2 when the group
2696 signature symbol is global, and thus the index can't be
2697 set until all local symbols are output. */
2698 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2699 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2700 unsigned long symndx = sec_data->this_hdr.sh_info;
2701 unsigned long extsymoff = 0;
2702 struct elf_link_hash_entry *h;
2703
2704 if (!elf_bad_symtab (igroup->owner))
2705 {
2706 Elf_Internal_Shdr *symtab_hdr;
2707
2708 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2709 extsymoff = symtab_hdr->sh_info;
2710 }
2711 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2712 while (h->root.type == bfd_link_hash_indirect
2713 || h->root.type == bfd_link_hash_warning)
2714 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2715
2716 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2717 }
dbb410c3 2718
1126897b 2719 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2720 gas = TRUE;
dbb410c3
AM
2721 if (sec->contents == NULL)
2722 {
b34976b6 2723 gas = FALSE;
a50b1753 2724 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
2725
2726 /* Arrange for the section to be written out. */
2727 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2728 if (sec->contents == NULL)
2729 {
b34976b6 2730 *failedptr = TRUE;
dbb410c3
AM
2731 return;
2732 }
2733 }
2734
eea6121a 2735 loc = sec->contents + sec->size;
dbb410c3 2736
9dce4196
AM
2737 /* Get the pointer to the first section in the group that gas
2738 squirreled away here. objcopy arranges for this to be set to the
2739 start of the input section group. */
2740 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2741
2742 /* First element is a flag word. Rest of section is elf section
2743 indices for all the sections of the group. Write them backwards
2744 just to keep the group in the same order as given in .section
2745 directives, not that it matters. */
2746 while (elt != NULL)
2747 {
9dce4196 2748 asection *s;
9dce4196 2749
9dce4196 2750 s = elt;
415f38a6
AM
2751 if (!gas)
2752 s = s->output_section;
2753 if (s != NULL
2754 && !bfd_is_abs_section (s))
01e1a5bc 2755 {
415f38a6
AM
2756 unsigned int idx = elf_section_data (s)->this_idx;
2757
01e1a5bc 2758 loc -= 4;
01e1a5bc
NC
2759 H_PUT_32 (abfd, idx, loc);
2760 }
945906ff 2761 elt = elf_next_in_group (elt);
9dce4196
AM
2762 if (elt == first)
2763 break;
dbb410c3
AM
2764 }
2765
3d7f7666 2766 if ((loc -= 4) != sec->contents)
9dce4196 2767 abort ();
dbb410c3 2768
9dce4196 2769 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2770}
2771
252b5132
RH
2772/* Assign all ELF section numbers. The dummy first section is handled here
2773 too. The link/info pointers for the standard section types are filled
2774 in here too, while we're at it. */
2775
b34976b6 2776static bfd_boolean
da9f89d4 2777assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2778{
2779 struct elf_obj_tdata *t = elf_tdata (abfd);
2780 asection *sec;
2b0f7ef9 2781 unsigned int section_number, secn;
252b5132 2782 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2783 struct bfd_elf_section_data *d;
3516e984 2784 bfd_boolean need_symtab;
252b5132
RH
2785
2786 section_number = 1;
2787
2b0f7ef9
JJ
2788 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2789
da9f89d4
L
2790 /* SHT_GROUP sections are in relocatable files only. */
2791 if (link_info == NULL || link_info->relocatable)
252b5132 2792 {
da9f89d4 2793 /* Put SHT_GROUP sections first. */
04dd1667 2794 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2795 {
5daa8fe7 2796 d = elf_section_data (sec);
da9f89d4
L
2797
2798 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2799 {
5daa8fe7 2800 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2801 {
2802 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2803 bfd_section_list_remove (abfd, sec);
da9f89d4 2804 abfd->section_count--;
da9f89d4 2805 }
08a40648 2806 else
4fbb74a6 2807 d->this_idx = section_number++;
da9f89d4 2808 }
47cc2cf5
PB
2809 }
2810 }
2811
2812 for (sec = abfd->sections; sec; sec = sec->next)
2813 {
2814 d = elf_section_data (sec);
2815
2816 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2817 d->this_idx = section_number++;
2b0f7ef9 2818 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2819 if ((sec->flags & SEC_RELOC) == 0)
2820 d->rel_idx = 0;
2821 else
2b0f7ef9
JJ
2822 {
2823 d->rel_idx = section_number++;
2824 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2825 }
23bc299b
MM
2826
2827 if (d->rel_hdr2)
2b0f7ef9
JJ
2828 {
2829 d->rel_idx2 = section_number++;
2830 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2831 }
23bc299b
MM
2832 else
2833 d->rel_idx2 = 0;
252b5132
RH
2834 }
2835
2836 t->shstrtab_section = section_number++;
2b0f7ef9 2837 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2838 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132 2839
3516e984
L
2840 need_symtab = (bfd_get_symcount (abfd) > 0
2841 || (link_info == NULL
2842 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2843 == HAS_RELOC)));
2844 if (need_symtab)
252b5132
RH
2845 {
2846 t->symtab_section = section_number++;
2b0f7ef9 2847 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 2848 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 2849 {
9ad5cbcf
AM
2850 t->symtab_shndx_section = section_number++;
2851 t->symtab_shndx_hdr.sh_name
2852 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2853 ".symtab_shndx", FALSE);
9ad5cbcf 2854 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2855 return FALSE;
9ad5cbcf 2856 }
252b5132 2857 t->strtab_section = section_number++;
2b0f7ef9 2858 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2859 }
2860
2b0f7ef9
JJ
2861 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2862 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2863
2864 elf_numsections (abfd) = section_number;
252b5132
RH
2865 elf_elfheader (abfd)->e_shnum = section_number;
2866
2867 /* Set up the list of section header pointers, in agreement with the
2868 indices. */
a50b1753
NC
2869 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
2870 sizeof (Elf_Internal_Shdr *));
252b5132 2871 if (i_shdrp == NULL)
b34976b6 2872 return FALSE;
252b5132 2873
a50b1753
NC
2874 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
2875 sizeof (Elf_Internal_Shdr));
252b5132
RH
2876 if (i_shdrp[0] == NULL)
2877 {
2878 bfd_release (abfd, i_shdrp);
b34976b6 2879 return FALSE;
252b5132 2880 }
252b5132
RH
2881
2882 elf_elfsections (abfd) = i_shdrp;
2883
2884 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3516e984 2885 if (need_symtab)
252b5132
RH
2886 {
2887 i_shdrp[t->symtab_section] = &t->symtab_hdr;
4fbb74a6 2888 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf
AM
2889 {
2890 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2891 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2892 }
252b5132
RH
2893 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2894 t->symtab_hdr.sh_link = t->strtab_section;
2895 }
38ce5b11 2896
252b5132
RH
2897 for (sec = abfd->sections; sec; sec = sec->next)
2898 {
252b5132
RH
2899 asection *s;
2900 const char *name;
2901
91d6fa6a
NC
2902 d = elf_section_data (sec);
2903
252b5132
RH
2904 i_shdrp[d->this_idx] = &d->this_hdr;
2905 if (d->rel_idx != 0)
2906 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
2907 if (d->rel_idx2 != 0)
2908 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
2909
2910 /* Fill in the sh_link and sh_info fields while we're at it. */
2911
2912 /* sh_link of a reloc section is the section index of the symbol
2913 table. sh_info is the section index of the section to which
2914 the relocation entries apply. */
2915 if (d->rel_idx != 0)
2916 {
2917 d->rel_hdr.sh_link = t->symtab_section;
2918 d->rel_hdr.sh_info = d->this_idx;
2919 }
23bc299b
MM
2920 if (d->rel_idx2 != 0)
2921 {
2922 d->rel_hdr2->sh_link = t->symtab_section;
2923 d->rel_hdr2->sh_info = d->this_idx;
2924 }
252b5132 2925
38ce5b11
L
2926 /* We need to set up sh_link for SHF_LINK_ORDER. */
2927 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
2928 {
2929 s = elf_linked_to_section (sec);
2930 if (s)
38ce5b11 2931 {
f2876037 2932 /* elf_linked_to_section points to the input section. */
ccd2ec6a 2933 if (link_info != NULL)
38ce5b11 2934 {
f2876037 2935 /* Check discarded linkonce section. */
ccd2ec6a 2936 if (elf_discarded_section (s))
38ce5b11 2937 {
ccd2ec6a
L
2938 asection *kept;
2939 (*_bfd_error_handler)
2940 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
2941 abfd, d->this_hdr.bfd_section,
2942 s, s->owner);
2943 /* Point to the kept section if it has the same
2944 size as the discarded one. */
c0f00686 2945 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 2946 if (kept == NULL)
185d09ad 2947 {
ccd2ec6a
L
2948 bfd_set_error (bfd_error_bad_value);
2949 return FALSE;
185d09ad 2950 }
ccd2ec6a 2951 s = kept;
38ce5b11 2952 }
e424ecc8 2953
ccd2ec6a
L
2954 s = s->output_section;
2955 BFD_ASSERT (s != NULL);
38ce5b11 2956 }
f2876037
L
2957 else
2958 {
2959 /* Handle objcopy. */
2960 if (s->output_section == NULL)
2961 {
2962 (*_bfd_error_handler)
2963 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
2964 abfd, d->this_hdr.bfd_section, s, s->owner);
2965 bfd_set_error (bfd_error_bad_value);
2966 return FALSE;
2967 }
2968 s = s->output_section;
2969 }
ccd2ec6a
L
2970 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2971 }
2972 else
2973 {
2974 /* PR 290:
2975 The Intel C compiler generates SHT_IA_64_UNWIND with
2976 SHF_LINK_ORDER. But it doesn't set the sh_link or
2977 sh_info fields. Hence we could get the situation
08a40648 2978 where s is NULL. */
ccd2ec6a
L
2979 const struct elf_backend_data *bed
2980 = get_elf_backend_data (abfd);
2981 if (bed->link_order_error_handler)
2982 bed->link_order_error_handler
2983 (_("%B: warning: sh_link not set for section `%A'"),
2984 abfd, sec);
38ce5b11
L
2985 }
2986 }
2987
252b5132
RH
2988 switch (d->this_hdr.sh_type)
2989 {
2990 case SHT_REL:
2991 case SHT_RELA:
2992 /* A reloc section which we are treating as a normal BFD
2993 section. sh_link is the section index of the symbol
2994 table. sh_info is the section index of the section to
2995 which the relocation entries apply. We assume that an
2996 allocated reloc section uses the dynamic symbol table.
2997 FIXME: How can we be sure? */
2998 s = bfd_get_section_by_name (abfd, ".dynsym");
2999 if (s != NULL)
3000 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3001
3002 /* We look up the section the relocs apply to by name. */
3003 name = sec->name;
3004 if (d->this_hdr.sh_type == SHT_REL)
3005 name += 4;
3006 else
3007 name += 5;
3008 s = bfd_get_section_by_name (abfd, name);
3009 if (s != NULL)
3010 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3011 break;
3012
3013 case SHT_STRTAB:
3014 /* We assume that a section named .stab*str is a stabs
3015 string section. We look for a section with the same name
3016 but without the trailing ``str'', and set its sh_link
3017 field to point to this section. */
0112cd26 3018 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3019 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3020 {
3021 size_t len;
3022 char *alc;
3023
3024 len = strlen (sec->name);
a50b1753 3025 alc = (char *) bfd_malloc (len - 2);
252b5132 3026 if (alc == NULL)
b34976b6 3027 return FALSE;
d4c88bbb 3028 memcpy (alc, sec->name, len - 3);
252b5132
RH
3029 alc[len - 3] = '\0';
3030 s = bfd_get_section_by_name (abfd, alc);
3031 free (alc);
3032 if (s != NULL)
3033 {
3034 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3035
3036 /* This is a .stab section. */
0594c12d
AM
3037 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3038 elf_section_data (s)->this_hdr.sh_entsize
3039 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3040 }
3041 }
3042 break;
3043
3044 case SHT_DYNAMIC:
3045 case SHT_DYNSYM:
3046 case SHT_GNU_verneed:
3047 case SHT_GNU_verdef:
3048 /* sh_link is the section header index of the string table
3049 used for the dynamic entries, or the symbol table, or the
3050 version strings. */
3051 s = bfd_get_section_by_name (abfd, ".dynstr");
3052 if (s != NULL)
3053 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3054 break;
3055
7f1204bb
JJ
3056 case SHT_GNU_LIBLIST:
3057 /* sh_link is the section header index of the prelink library
08a40648
AM
3058 list used for the dynamic entries, or the symbol table, or
3059 the version strings. */
7f1204bb
JJ
3060 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3061 ? ".dynstr" : ".gnu.libstr");
3062 if (s != NULL)
3063 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3064 break;
3065
252b5132 3066 case SHT_HASH:
fdc90cb4 3067 case SHT_GNU_HASH:
252b5132
RH
3068 case SHT_GNU_versym:
3069 /* sh_link is the section header index of the symbol table
3070 this hash table or version table is for. */
3071 s = bfd_get_section_by_name (abfd, ".dynsym");
3072 if (s != NULL)
3073 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3074 break;
dbb410c3
AM
3075
3076 case SHT_GROUP:
3077 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3078 }
3079 }
3080
2b0f7ef9 3081 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3082 if (i_shdrp[secn] == NULL)
3083 i_shdrp[secn] = i_shdrp[0];
3084 else
3085 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3086 i_shdrp[secn]->sh_name);
b34976b6 3087 return TRUE;
252b5132
RH
3088}
3089
3090/* Map symbol from it's internal number to the external number, moving
3091 all local symbols to be at the head of the list. */
3092
5372391b 3093static bfd_boolean
217aa764 3094sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3095{
3096 /* If the backend has a special mapping, use it. */
9c5bfbb7 3097 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3098 if (bed->elf_backend_sym_is_global)
3099 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3100
e47bf690 3101 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3102 || bfd_is_und_section (bfd_get_section (sym))
3103 || bfd_is_com_section (bfd_get_section (sym)));
3104}
3105
5372391b 3106/* Don't output section symbols for sections that are not going to be
0f0a5e58 3107 output. */
5372391b
AM
3108
3109static bfd_boolean
3110ignore_section_sym (bfd *abfd, asymbol *sym)
3111{
3112 return ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58
AM
3113 && !(sym->section->owner == abfd
3114 || (sym->section->output_section->owner == abfd
3115 && sym->section->output_offset == 0)));
5372391b
AM
3116}
3117
b34976b6 3118static bfd_boolean
217aa764 3119elf_map_symbols (bfd *abfd)
252b5132 3120{
dc810e39 3121 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3122 asymbol **syms = bfd_get_outsymbols (abfd);
3123 asymbol **sect_syms;
dc810e39
AM
3124 unsigned int num_locals = 0;
3125 unsigned int num_globals = 0;
3126 unsigned int num_locals2 = 0;
3127 unsigned int num_globals2 = 0;
252b5132 3128 int max_index = 0;
dc810e39 3129 unsigned int idx;
252b5132
RH
3130 asection *asect;
3131 asymbol **new_syms;
252b5132
RH
3132
3133#ifdef DEBUG
3134 fprintf (stderr, "elf_map_symbols\n");
3135 fflush (stderr);
3136#endif
3137
252b5132
RH
3138 for (asect = abfd->sections; asect; asect = asect->next)
3139 {
3140 if (max_index < asect->index)
3141 max_index = asect->index;
3142 }
3143
3144 max_index++;
a50b1753 3145 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3146 if (sect_syms == NULL)
b34976b6 3147 return FALSE;
252b5132 3148 elf_section_syms (abfd) = sect_syms;
4e89ac30 3149 elf_num_section_syms (abfd) = max_index;
252b5132 3150
079e9a2f
AM
3151 /* Init sect_syms entries for any section symbols we have already
3152 decided to output. */
252b5132
RH
3153 for (idx = 0; idx < symcount; idx++)
3154 {
dc810e39 3155 asymbol *sym = syms[idx];
c044fabd 3156
252b5132 3157 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3158 && sym->value == 0
5372391b 3159 && !ignore_section_sym (abfd, sym))
252b5132 3160 {
5372391b 3161 asection *sec = sym->section;
252b5132 3162
5372391b
AM
3163 if (sec->owner != abfd)
3164 sec = sec->output_section;
252b5132 3165
5372391b 3166 sect_syms[sec->index] = syms[idx];
252b5132
RH
3167 }
3168 }
3169
252b5132
RH
3170 /* Classify all of the symbols. */
3171 for (idx = 0; idx < symcount; idx++)
3172 {
5372391b
AM
3173 if (ignore_section_sym (abfd, syms[idx]))
3174 continue;
252b5132
RH
3175 if (!sym_is_global (abfd, syms[idx]))
3176 num_locals++;
3177 else
3178 num_globals++;
3179 }
079e9a2f 3180
5372391b 3181 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3182 sections will already have a section symbol in outsymbols, but
3183 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3184 at least in that case. */
252b5132
RH
3185 for (asect = abfd->sections; asect; asect = asect->next)
3186 {
079e9a2f 3187 if (sect_syms[asect->index] == NULL)
252b5132 3188 {
079e9a2f 3189 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3190 num_locals++;
3191 else
3192 num_globals++;
252b5132
RH
3193 }
3194 }
3195
3196 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3197 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3198 sizeof (asymbol *));
dc810e39 3199
252b5132 3200 if (new_syms == NULL)
b34976b6 3201 return FALSE;
252b5132
RH
3202
3203 for (idx = 0; idx < symcount; idx++)
3204 {
3205 asymbol *sym = syms[idx];
dc810e39 3206 unsigned int i;
252b5132 3207
5372391b
AM
3208 if (ignore_section_sym (abfd, sym))
3209 continue;
252b5132
RH
3210 if (!sym_is_global (abfd, sym))
3211 i = num_locals2++;
3212 else
3213 i = num_locals + num_globals2++;
3214 new_syms[i] = sym;
3215 sym->udata.i = i + 1;
3216 }
3217 for (asect = abfd->sections; asect; asect = asect->next)
3218 {
079e9a2f 3219 if (sect_syms[asect->index] == NULL)
252b5132 3220 {
079e9a2f 3221 asymbol *sym = asect->symbol;
dc810e39 3222 unsigned int i;
252b5132 3223
079e9a2f 3224 sect_syms[asect->index] = sym;
252b5132
RH
3225 if (!sym_is_global (abfd, sym))
3226 i = num_locals2++;
3227 else
3228 i = num_locals + num_globals2++;
3229 new_syms[i] = sym;
3230 sym->udata.i = i + 1;
3231 }
3232 }
3233
3234 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3235
3236 elf_num_locals (abfd) = num_locals;
3237 elf_num_globals (abfd) = num_globals;
b34976b6 3238 return TRUE;
252b5132
RH
3239}
3240
3241/* Align to the maximum file alignment that could be required for any
3242 ELF data structure. */
3243
268b6b39 3244static inline file_ptr
217aa764 3245align_file_position (file_ptr off, int align)
252b5132
RH
3246{
3247 return (off + align - 1) & ~(align - 1);
3248}
3249
3250/* Assign a file position to a section, optionally aligning to the
3251 required section alignment. */
3252
217aa764
AM
3253file_ptr
3254_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3255 file_ptr offset,
3256 bfd_boolean align)
252b5132 3257{
72de5009
AM
3258 if (align && i_shdrp->sh_addralign > 1)
3259 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3260 i_shdrp->sh_offset = offset;
3261 if (i_shdrp->bfd_section != NULL)
3262 i_shdrp->bfd_section->filepos = offset;
3263 if (i_shdrp->sh_type != SHT_NOBITS)
3264 offset += i_shdrp->sh_size;
3265 return offset;
3266}
3267
3268/* Compute the file positions we are going to put the sections at, and
3269 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3270 is not NULL, this is being called by the ELF backend linker. */
3271
b34976b6 3272bfd_boolean
217aa764
AM
3273_bfd_elf_compute_section_file_positions (bfd *abfd,
3274 struct bfd_link_info *link_info)
252b5132 3275{
9c5bfbb7 3276 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3277 bfd_boolean failed;
4b6c0f2f 3278 struct bfd_strtab_hash *strtab = NULL;
252b5132 3279 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3280 bfd_boolean need_symtab;
252b5132
RH
3281
3282 if (abfd->output_has_begun)
b34976b6 3283 return TRUE;
252b5132
RH
3284
3285 /* Do any elf backend specific processing first. */
3286 if (bed->elf_backend_begin_write_processing)
3287 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3288
3289 if (! prep_headers (abfd))
b34976b6 3290 return FALSE;
252b5132 3291
e6c51ed4
NC
3292 /* Post process the headers if necessary. */
3293 if (bed->elf_backend_post_process_headers)
3294 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3295
b34976b6 3296 failed = FALSE;
252b5132
RH
3297 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3298 if (failed)
b34976b6 3299 return FALSE;
252b5132 3300
da9f89d4 3301 if (!assign_section_numbers (abfd, link_info))
b34976b6 3302 return FALSE;
252b5132
RH
3303
3304 /* The backend linker builds symbol table information itself. */
3516e984
L
3305 need_symtab = (link_info == NULL
3306 && (bfd_get_symcount (abfd) > 0
3307 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3308 == HAS_RELOC)));
3309 if (need_symtab)
252b5132
RH
3310 {
3311 /* Non-zero if doing a relocatable link. */
3312 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3313
3314 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3315 return FALSE;
252b5132
RH
3316 }
3317
1126897b 3318 if (link_info == NULL)
dbb410c3 3319 {
1126897b 3320 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3321 if (failed)
b34976b6 3322 return FALSE;
dbb410c3
AM
3323 }
3324
252b5132
RH
3325 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3326 /* sh_name was set in prep_headers. */
3327 shstrtab_hdr->sh_type = SHT_STRTAB;
3328 shstrtab_hdr->sh_flags = 0;
3329 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3330 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3331 shstrtab_hdr->sh_entsize = 0;
3332 shstrtab_hdr->sh_link = 0;
3333 shstrtab_hdr->sh_info = 0;
3334 /* sh_offset is set in assign_file_positions_except_relocs. */
3335 shstrtab_hdr->sh_addralign = 1;
3336
c84fca4d 3337 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3338 return FALSE;
252b5132 3339
3516e984 3340 if (need_symtab)
252b5132
RH
3341 {
3342 file_ptr off;
3343 Elf_Internal_Shdr *hdr;
3344
3345 off = elf_tdata (abfd)->next_file_pos;
3346
3347 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3348 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3349
9ad5cbcf
AM
3350 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3351 if (hdr->sh_size != 0)
b34976b6 3352 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3353
252b5132 3354 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3355 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3356
3357 elf_tdata (abfd)->next_file_pos = off;
3358
3359 /* Now that we know where the .strtab section goes, write it
08a40648 3360 out. */
252b5132
RH
3361 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3362 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3363 return FALSE;
252b5132
RH
3364 _bfd_stringtab_free (strtab);
3365 }
3366
b34976b6 3367 abfd->output_has_begun = TRUE;
252b5132 3368
b34976b6 3369 return TRUE;
252b5132
RH
3370}
3371
8ded5a0f
AM
3372/* Make an initial estimate of the size of the program header. If we
3373 get the number wrong here, we'll redo section placement. */
3374
3375static bfd_size_type
3376get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3377{
3378 size_t segs;
3379 asection *s;
2b05f1b7 3380 const struct elf_backend_data *bed;
8ded5a0f
AM
3381
3382 /* Assume we will need exactly two PT_LOAD segments: one for text
3383 and one for data. */
3384 segs = 2;
3385
3386 s = bfd_get_section_by_name (abfd, ".interp");
3387 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3388 {
3389 /* If we have a loadable interpreter section, we need a
3390 PT_INTERP segment. In this case, assume we also need a
3391 PT_PHDR segment, although that may not be true for all
3392 targets. */
3393 segs += 2;
3394 }
3395
3396 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3397 {
3398 /* We need a PT_DYNAMIC segment. */
3399 ++segs;
f210dcff 3400 }
08a40648 3401
ceae84aa 3402 if (info != NULL && info->relro)
f210dcff
L
3403 {
3404 /* We need a PT_GNU_RELRO segment. */
3405 ++segs;
8ded5a0f
AM
3406 }
3407
3408 if (elf_tdata (abfd)->eh_frame_hdr)
3409 {
3410 /* We need a PT_GNU_EH_FRAME segment. */
3411 ++segs;
3412 }
3413
2b05f1b7 3414 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3415 {
2b05f1b7
L
3416 /* We need a PT_GNU_STACK segment. */
3417 ++segs;
3418 }
94b11780 3419
2b05f1b7
L
3420 for (s = abfd->sections; s != NULL; s = s->next)
3421 {
8ded5a0f 3422 if ((s->flags & SEC_LOAD) != 0
0112cd26 3423 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3424 {
3425 /* We need a PT_NOTE segment. */
3426 ++segs;
1c5265b5
JJ
3427 /* Try to create just one PT_NOTE segment
3428 for all adjacent loadable .note* sections.
3429 gABI requires that within a PT_NOTE segment
3430 (and also inside of each SHT_NOTE section)
3431 each note is padded to a multiple of 4 size,
3432 so we check whether the sections are correctly
3433 aligned. */
3434 if (s->alignment_power == 2)
3435 while (s->next != NULL
3436 && s->next->alignment_power == 2
3437 && (s->next->flags & SEC_LOAD) != 0
3438 && CONST_STRNEQ (s->next->name, ".note"))
3439 s = s->next;
8ded5a0f
AM
3440 }
3441 }
3442
3443 for (s = abfd->sections; s != NULL; s = s->next)
3444 {
3445 if (s->flags & SEC_THREAD_LOCAL)
3446 {
3447 /* We need a PT_TLS segment. */
3448 ++segs;
3449 break;
3450 }
3451 }
3452
3453 /* Let the backend count up any program headers it might need. */
2b05f1b7 3454 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3455 if (bed->elf_backend_additional_program_headers)
3456 {
3457 int a;
3458
3459 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3460 if (a == -1)
3461 abort ();
3462 segs += a;
3463 }
3464
3465 return segs * bed->s->sizeof_phdr;
3466}
3467
2ea37f1c
NC
3468/* Find the segment that contains the output_section of section. */
3469
3470Elf_Internal_Phdr *
3471_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3472{
3473 struct elf_segment_map *m;
3474 Elf_Internal_Phdr *p;
3475
3476 for (m = elf_tdata (abfd)->segment_map,
3477 p = elf_tdata (abfd)->phdr;
3478 m != NULL;
3479 m = m->next, p++)
3480 {
3481 int i;
3482
3483 for (i = m->count - 1; i >= 0; i--)
3484 if (m->sections[i] == section)
3485 return p;
3486 }
3487
3488 return NULL;
3489}
3490
252b5132
RH
3491/* Create a mapping from a set of sections to a program segment. */
3492
217aa764
AM
3493static struct elf_segment_map *
3494make_mapping (bfd *abfd,
3495 asection **sections,
3496 unsigned int from,
3497 unsigned int to,
3498 bfd_boolean phdr)
252b5132
RH
3499{
3500 struct elf_segment_map *m;
3501 unsigned int i;
3502 asection **hdrpp;
dc810e39 3503 bfd_size_type amt;
252b5132 3504
dc810e39
AM
3505 amt = sizeof (struct elf_segment_map);
3506 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3507 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3508 if (m == NULL)
3509 return NULL;
3510 m->next = NULL;
3511 m->p_type = PT_LOAD;
3512 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3513 m->sections[i - from] = *hdrpp;
3514 m->count = to - from;
3515
3516 if (from == 0 && phdr)
3517 {
3518 /* Include the headers in the first PT_LOAD segment. */
3519 m->includes_filehdr = 1;
3520 m->includes_phdrs = 1;
3521 }
3522
3523 return m;
3524}
3525
229fcec5
MM
3526/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3527 on failure. */
3528
3529struct elf_segment_map *
3530_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3531{
3532 struct elf_segment_map *m;
3533
a50b1753
NC
3534 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3535 sizeof (struct elf_segment_map));
229fcec5
MM
3536 if (m == NULL)
3537 return NULL;
3538 m->next = NULL;
3539 m->p_type = PT_DYNAMIC;
3540 m->count = 1;
3541 m->sections[0] = dynsec;
08a40648 3542
229fcec5
MM
3543 return m;
3544}
3545
8ded5a0f 3546/* Possibly add or remove segments from the segment map. */
252b5132 3547
b34976b6 3548static bfd_boolean
3dea8fca
AM
3549elf_modify_segment_map (bfd *abfd,
3550 struct bfd_link_info *info,
3551 bfd_boolean remove_empty_load)
252b5132 3552{
252e386e 3553 struct elf_segment_map **m;
8ded5a0f 3554 const struct elf_backend_data *bed;
252b5132 3555
8ded5a0f
AM
3556 /* The placement algorithm assumes that non allocated sections are
3557 not in PT_LOAD segments. We ensure this here by removing such
3558 sections from the segment map. We also remove excluded
252e386e
AM
3559 sections. Finally, any PT_LOAD segment without sections is
3560 removed. */
3561 m = &elf_tdata (abfd)->segment_map;
3562 while (*m)
8ded5a0f
AM
3563 {
3564 unsigned int i, new_count;
252b5132 3565
252e386e 3566 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3567 {
252e386e
AM
3568 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3569 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3570 || (*m)->p_type != PT_LOAD))
8ded5a0f 3571 {
252e386e
AM
3572 (*m)->sections[new_count] = (*m)->sections[i];
3573 new_count++;
8ded5a0f
AM
3574 }
3575 }
252e386e 3576 (*m)->count = new_count;
252b5132 3577
3dea8fca 3578 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3579 *m = (*m)->next;
3580 else
3581 m = &(*m)->next;
8ded5a0f 3582 }
252b5132 3583
8ded5a0f
AM
3584 bed = get_elf_backend_data (abfd);
3585 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3586 {
252e386e 3587 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3588 return FALSE;
252b5132 3589 }
252b5132 3590
8ded5a0f
AM
3591 return TRUE;
3592}
252b5132 3593
8ded5a0f 3594/* Set up a mapping from BFD sections to program segments. */
252b5132 3595
8ded5a0f
AM
3596bfd_boolean
3597_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3598{
3599 unsigned int count;
3600 struct elf_segment_map *m;
3601 asection **sections = NULL;
3602 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3603 bfd_boolean no_user_phdrs;
252b5132 3604
3dea8fca
AM
3605 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
3606 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3607 {
8ded5a0f
AM
3608 asection *s;
3609 unsigned int i;
3610 struct elf_segment_map *mfirst;
3611 struct elf_segment_map **pm;
3612 asection *last_hdr;
3613 bfd_vma last_size;
3614 unsigned int phdr_index;
3615 bfd_vma maxpagesize;
3616 asection **hdrpp;
3617 bfd_boolean phdr_in_segment = TRUE;
3618 bfd_boolean writable;
3619 int tls_count = 0;
3620 asection *first_tls = NULL;
3621 asection *dynsec, *eh_frame_hdr;
3622 bfd_size_type amt;
252b5132 3623
8ded5a0f 3624 /* Select the allocated sections, and sort them. */
252b5132 3625
a50b1753
NC
3626 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
3627 sizeof (asection *));
8ded5a0f 3628 if (sections == NULL)
252b5132 3629 goto error_return;
252b5132 3630
8ded5a0f
AM
3631 i = 0;
3632 for (s = abfd->sections; s != NULL; s = s->next)
3633 {
3634 if ((s->flags & SEC_ALLOC) != 0)
3635 {
3636 sections[i] = s;
3637 ++i;
3638 }
3639 }
3640 BFD_ASSERT (i <= bfd_count_sections (abfd));
3641 count = i;
252b5132 3642
8ded5a0f 3643 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3644
8ded5a0f 3645 /* Build the mapping. */
252b5132 3646
8ded5a0f
AM
3647 mfirst = NULL;
3648 pm = &mfirst;
252b5132 3649
8ded5a0f
AM
3650 /* If we have a .interp section, then create a PT_PHDR segment for
3651 the program headers and a PT_INTERP segment for the .interp
3652 section. */
3653 s = bfd_get_section_by_name (abfd, ".interp");
3654 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3655 {
3656 amt = sizeof (struct elf_segment_map);
a50b1753 3657 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3658 if (m == NULL)
3659 goto error_return;
3660 m->next = NULL;
3661 m->p_type = PT_PHDR;
3662 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3663 m->p_flags = PF_R | PF_X;
3664 m->p_flags_valid = 1;
3665 m->includes_phdrs = 1;
252b5132 3666
8ded5a0f
AM
3667 *pm = m;
3668 pm = &m->next;
252b5132 3669
8ded5a0f 3670 amt = sizeof (struct elf_segment_map);
a50b1753 3671 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3672 if (m == NULL)
3673 goto error_return;
3674 m->next = NULL;
3675 m->p_type = PT_INTERP;
3676 m->count = 1;
3677 m->sections[0] = s;
3678
3679 *pm = m;
3680 pm = &m->next;
252b5132 3681 }
8ded5a0f
AM
3682
3683 /* Look through the sections. We put sections in the same program
3684 segment when the start of the second section can be placed within
3685 a few bytes of the end of the first section. */
3686 last_hdr = NULL;
3687 last_size = 0;
3688 phdr_index = 0;
3689 maxpagesize = bed->maxpagesize;
3690 writable = FALSE;
3691 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3692 if (dynsec != NULL
3693 && (dynsec->flags & SEC_LOAD) == 0)
3694 dynsec = NULL;
3695
3696 /* Deal with -Ttext or something similar such that the first section
3697 is not adjacent to the program headers. This is an
3698 approximation, since at this point we don't know exactly how many
3699 program headers we will need. */
3700 if (count > 0)
252b5132 3701 {
8ded5a0f
AM
3702 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3703
62d7a5f6 3704 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3705 phdr_size = get_program_header_size (abfd, info);
3706 if ((abfd->flags & D_PAGED) == 0
3707 || sections[0]->lma < phdr_size
3708 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
3709 phdr_in_segment = FALSE;
252b5132
RH
3710 }
3711
8ded5a0f 3712 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3713 {
8ded5a0f
AM
3714 asection *hdr;
3715 bfd_boolean new_segment;
3716
3717 hdr = *hdrpp;
3718
3719 /* See if this section and the last one will fit in the same
3720 segment. */
3721
3722 if (last_hdr == NULL)
3723 {
3724 /* If we don't have a segment yet, then we don't need a new
3725 one (we build the last one after this loop). */
3726 new_segment = FALSE;
3727 }
3728 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3729 {
3730 /* If this section has a different relation between the
3731 virtual address and the load address, then we need a new
3732 segment. */
3733 new_segment = TRUE;
3734 }
39948a60
NC
3735 /* In the next test we have to be careful when last_hdr->lma is close
3736 to the end of the address space. If the aligned address wraps
3737 around to the start of the address space, then there are no more
3738 pages left in memory and it is OK to assume that the current
3739 section can be included in the current segment. */
3740 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3741 > last_hdr->lma)
3742 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3743 <= hdr->lma))
8ded5a0f
AM
3744 {
3745 /* If putting this section in this segment would force us to
3746 skip a page in the segment, then we need a new segment. */
3747 new_segment = TRUE;
3748 }
3749 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3750 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3751 {
3752 /* We don't want to put a loadable section after a
3753 nonloadable section in the same segment.
3754 Consider .tbss sections as loadable for this purpose. */
3755 new_segment = TRUE;
3756 }
3757 else if ((abfd->flags & D_PAGED) == 0)
3758 {
3759 /* If the file is not demand paged, which means that we
3760 don't require the sections to be correctly aligned in the
3761 file, then there is no other reason for a new segment. */
3762 new_segment = FALSE;
3763 }
3764 else if (! writable
3765 && (hdr->flags & SEC_READONLY) == 0
3766 && (((last_hdr->lma + last_size - 1)
3767 & ~(maxpagesize - 1))
3768 != (hdr->lma & ~(maxpagesize - 1))))
3769 {
3770 /* We don't want to put a writable section in a read only
3771 segment, unless they are on the same page in memory
3772 anyhow. We already know that the last section does not
3773 bring us past the current section on the page, so the
3774 only case in which the new section is not on the same
3775 page as the previous section is when the previous section
3776 ends precisely on a page boundary. */
3777 new_segment = TRUE;
3778 }
3779 else
3780 {
3781 /* Otherwise, we can use the same segment. */
3782 new_segment = FALSE;
3783 }
3784
2889e75b 3785 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3786 if (last_hdr != NULL
3787 && info != NULL
3788 && info->callbacks->override_segment_assignment != NULL)
3789 new_segment
3790 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3791 last_hdr,
3792 new_segment);
2889e75b 3793
8ded5a0f
AM
3794 if (! new_segment)
3795 {
3796 if ((hdr->flags & SEC_READONLY) == 0)
3797 writable = TRUE;
3798 last_hdr = hdr;
3799 /* .tbss sections effectively have zero size. */
3800 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3801 != SEC_THREAD_LOCAL)
3802 last_size = hdr->size;
3803 else
3804 last_size = 0;
3805 continue;
3806 }
3807
3808 /* We need a new program segment. We must create a new program
3809 header holding all the sections from phdr_index until hdr. */
3810
3811 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3812 if (m == NULL)
3813 goto error_return;
3814
3815 *pm = m;
3816 pm = &m->next;
3817
252b5132 3818 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3819 writable = TRUE;
8ded5a0f
AM
3820 else
3821 writable = FALSE;
3822
baaff79e
JJ
3823 last_hdr = hdr;
3824 /* .tbss sections effectively have zero size. */
e5caec89 3825 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3826 last_size = hdr->size;
baaff79e
JJ
3827 else
3828 last_size = 0;
8ded5a0f
AM
3829 phdr_index = i;
3830 phdr_in_segment = FALSE;
252b5132
RH
3831 }
3832
8ded5a0f
AM
3833 /* Create a final PT_LOAD program segment. */
3834 if (last_hdr != NULL)
3835 {
3836 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3837 if (m == NULL)
3838 goto error_return;
252b5132 3839
8ded5a0f
AM
3840 *pm = m;
3841 pm = &m->next;
3842 }
252b5132 3843
8ded5a0f
AM
3844 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3845 if (dynsec != NULL)
3846 {
3847 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
3848 if (m == NULL)
3849 goto error_return;
3850 *pm = m;
3851 pm = &m->next;
3852 }
252b5132 3853
1c5265b5
JJ
3854 /* For each batch of consecutive loadable .note sections,
3855 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
3856 because if we link together nonloadable .note sections and
3857 loadable .note sections, we will generate two .note sections
3858 in the output file. FIXME: Using names for section types is
3859 bogus anyhow. */
8ded5a0f
AM
3860 for (s = abfd->sections; s != NULL; s = s->next)
3861 {
3862 if ((s->flags & SEC_LOAD) != 0
0112cd26 3863 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 3864 {
1c5265b5 3865 asection *s2;
91d6fa6a
NC
3866
3867 count = 1;
8ded5a0f 3868 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
3869 if (s->alignment_power == 2)
3870 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
3871 {
3872 if (s2->next->alignment_power == 2
3873 && (s2->next->flags & SEC_LOAD) != 0
3874 && CONST_STRNEQ (s2->next->name, ".note")
3875 && align_power (s2->vma + s2->size, 2)
3876 == s2->next->vma)
3877 count++;
3878 else
3879 break;
3880 }
1c5265b5 3881 amt += (count - 1) * sizeof (asection *);
a50b1753 3882 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3883 if (m == NULL)
3884 goto error_return;
3885 m->next = NULL;
3886 m->p_type = PT_NOTE;
1c5265b5
JJ
3887 m->count = count;
3888 while (count > 1)
3889 {
3890 m->sections[m->count - count--] = s;
3891 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
3892 s = s->next;
3893 }
3894 m->sections[m->count - 1] = s;
3895 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
3896 *pm = m;
3897 pm = &m->next;
3898 }
3899 if (s->flags & SEC_THREAD_LOCAL)
3900 {
3901 if (! tls_count)
3902 first_tls = s;
3903 tls_count++;
3904 }
3905 }
252b5132 3906
8ded5a0f
AM
3907 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3908 if (tls_count > 0)
3909 {
8ded5a0f
AM
3910 amt = sizeof (struct elf_segment_map);
3911 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 3912 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3913 if (m == NULL)
3914 goto error_return;
3915 m->next = NULL;
3916 m->p_type = PT_TLS;
3917 m->count = tls_count;
3918 /* Mandated PF_R. */
3919 m->p_flags = PF_R;
3920 m->p_flags_valid = 1;
91d6fa6a 3921 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f
AM
3922 {
3923 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3924 m->sections[i] = first_tls;
3925 first_tls = first_tls->next;
3926 }
252b5132 3927
8ded5a0f
AM
3928 *pm = m;
3929 pm = &m->next;
3930 }
252b5132 3931
8ded5a0f
AM
3932 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3933 segment. */
3934 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3935 if (eh_frame_hdr != NULL
3936 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 3937 {
dc810e39 3938 amt = sizeof (struct elf_segment_map);
a50b1753 3939 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3940 if (m == NULL)
3941 goto error_return;
3942 m->next = NULL;
8ded5a0f 3943 m->p_type = PT_GNU_EH_FRAME;
252b5132 3944 m->count = 1;
8ded5a0f 3945 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
3946
3947 *pm = m;
3948 pm = &m->next;
3949 }
13ae64f3 3950
8ded5a0f 3951 if (elf_tdata (abfd)->stack_flags)
13ae64f3 3952 {
8ded5a0f 3953 amt = sizeof (struct elf_segment_map);
a50b1753 3954 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3955 if (m == NULL)
3956 goto error_return;
3957 m->next = NULL;
2b05f1b7 3958 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
3959 m->p_flags = elf_tdata (abfd)->stack_flags;
3960 m->p_flags_valid = 1;
252b5132 3961
8ded5a0f
AM
3962 *pm = m;
3963 pm = &m->next;
3964 }
65765700 3965
ceae84aa 3966 if (info != NULL && info->relro)
8ded5a0f 3967 {
f210dcff
L
3968 for (m = mfirst; m != NULL; m = m->next)
3969 {
3970 if (m->p_type == PT_LOAD)
3971 {
3972 asection *last = m->sections[m->count - 1];
3973 bfd_vma vaddr = m->sections[0]->vma;
3974 bfd_vma filesz = last->vma - vaddr + last->size;
65765700 3975
f210dcff
L
3976 if (vaddr < info->relro_end
3977 && vaddr >= info->relro_start
3978 && (vaddr + filesz) >= info->relro_end)
3979 break;
3980 }
3981 }
3982
3983 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
3984 if (m != NULL)
3985 {
3986 amt = sizeof (struct elf_segment_map);
a50b1753 3987 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
3988 if (m == NULL)
3989 goto error_return;
3990 m->next = NULL;
3991 m->p_type = PT_GNU_RELRO;
3992 m->p_flags = PF_R;
3993 m->p_flags_valid = 1;
3994
3995 *pm = m;
3996 pm = &m->next;
3997 }
8ded5a0f 3998 }
9ee5e499 3999
8ded5a0f
AM
4000 free (sections);
4001 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
4002 }
4003
3dea8fca 4004 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4005 return FALSE;
8c37241b 4006
8ded5a0f
AM
4007 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4008 ++count;
4009 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 4010
b34976b6 4011 return TRUE;
252b5132
RH
4012
4013 error_return:
4014 if (sections != NULL)
4015 free (sections);
b34976b6 4016 return FALSE;
252b5132
RH
4017}
4018
4019/* Sort sections by address. */
4020
4021static int
217aa764 4022elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4023{
4024 const asection *sec1 = *(const asection **) arg1;
4025 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4026 bfd_size_type size1, size2;
252b5132
RH
4027
4028 /* Sort by LMA first, since this is the address used to
4029 place the section into a segment. */
4030 if (sec1->lma < sec2->lma)
4031 return -1;
4032 else if (sec1->lma > sec2->lma)
4033 return 1;
4034
4035 /* Then sort by VMA. Normally the LMA and the VMA will be
4036 the same, and this will do nothing. */
4037 if (sec1->vma < sec2->vma)
4038 return -1;
4039 else if (sec1->vma > sec2->vma)
4040 return 1;
4041
4042 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4043
07c6e936 4044#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4045
4046 if (TOEND (sec1))
4047 {
4048 if (TOEND (sec2))
00a7cdc5
NC
4049 {
4050 /* If the indicies are the same, do not return 0
4051 here, but continue to try the next comparison. */
4052 if (sec1->target_index - sec2->target_index != 0)
4053 return sec1->target_index - sec2->target_index;
4054 }
252b5132
RH
4055 else
4056 return 1;
4057 }
00a7cdc5 4058 else if (TOEND (sec2))
252b5132
RH
4059 return -1;
4060
4061#undef TOEND
4062
00a7cdc5
NC
4063 /* Sort by size, to put zero sized sections
4064 before others at the same address. */
252b5132 4065
eea6121a
AM
4066 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4067 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4068
4069 if (size1 < size2)
252b5132 4070 return -1;
eecdbe52 4071 if (size1 > size2)
252b5132
RH
4072 return 1;
4073
4074 return sec1->target_index - sec2->target_index;
4075}
4076
340b6d91
AC
4077/* Ian Lance Taylor writes:
4078
4079 We shouldn't be using % with a negative signed number. That's just
4080 not good. We have to make sure either that the number is not
4081 negative, or that the number has an unsigned type. When the types
4082 are all the same size they wind up as unsigned. When file_ptr is a
4083 larger signed type, the arithmetic winds up as signed long long,
4084 which is wrong.
4085
4086 What we're trying to say here is something like ``increase OFF by
4087 the least amount that will cause it to be equal to the VMA modulo
4088 the page size.'' */
4089/* In other words, something like:
4090
4091 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4092 off_offset = off % bed->maxpagesize;
4093 if (vma_offset < off_offset)
4094 adjustment = vma_offset + bed->maxpagesize - off_offset;
4095 else
4096 adjustment = vma_offset - off_offset;
08a40648 4097
340b6d91
AC
4098 which can can be collapsed into the expression below. */
4099
4100static file_ptr
4101vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4102{
4103 return ((vma - off) % maxpagesize);
4104}
4105
6d33f217
L
4106static void
4107print_segment_map (const struct elf_segment_map *m)
4108{
4109 unsigned int j;
4110 const char *pt = get_segment_type (m->p_type);
4111 char buf[32];
4112
4113 if (pt == NULL)
4114 {
4115 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4116 sprintf (buf, "LOPROC+%7.7x",
4117 (unsigned int) (m->p_type - PT_LOPROC));
4118 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4119 sprintf (buf, "LOOS+%7.7x",
4120 (unsigned int) (m->p_type - PT_LOOS));
4121 else
4122 snprintf (buf, sizeof (buf), "%8.8x",
4123 (unsigned int) m->p_type);
4124 pt = buf;
4125 }
4126 fprintf (stderr, "%s:", pt);
4127 for (j = 0; j < m->count; j++)
4128 fprintf (stderr, " %s", m->sections [j]->name);
4129 putc ('\n',stderr);
4130}
4131
32812159
AM
4132static bfd_boolean
4133write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4134{
4135 void *buf;
4136 bfd_boolean ret;
4137
4138 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4139 return FALSE;
4140 buf = bfd_zmalloc (len);
4141 if (buf == NULL)
4142 return FALSE;
4143 ret = bfd_bwrite (buf, len, abfd) == len;
4144 free (buf);
4145 return ret;
4146}
4147
252b5132
RH
4148/* Assign file positions to the sections based on the mapping from
4149 sections to segments. This function also sets up some fields in
f3520d2f 4150 the file header. */
252b5132 4151
b34976b6 4152static bfd_boolean
f3520d2f
AM
4153assign_file_positions_for_load_sections (bfd *abfd,
4154 struct bfd_link_info *link_info)
252b5132
RH
4155{
4156 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4157 struct elf_segment_map *m;
252b5132 4158 Elf_Internal_Phdr *phdrs;
252b5132 4159 Elf_Internal_Phdr *p;
02bf8d82 4160 file_ptr off;
3f570048 4161 bfd_size_type maxpagesize;
f3520d2f 4162 unsigned int alloc;
0920dee7 4163 unsigned int i, j;
2b0bc088 4164 bfd_vma header_pad = 0;
252b5132 4165
e36284ab 4166 if (link_info == NULL
ceae84aa 4167 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4168 return FALSE;
252b5132 4169
8ded5a0f 4170 alloc = 0;
252b5132 4171 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2b0bc088
NC
4172 {
4173 ++alloc;
4174 if (m->header_size)
4175 header_pad = m->header_size;
4176 }
252b5132
RH
4177
4178 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4179 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4180 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4181
62d7a5f6 4182 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4183 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4184 else
4185 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4186 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4187
4188 if (alloc == 0)
f3520d2f 4189 {
8ded5a0f
AM
4190 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4191 return TRUE;
f3520d2f 4192 }
252b5132 4193
57268894
HPN
4194 /* We're writing the size in elf_tdata (abfd)->program_header_size,
4195 see assign_file_positions_except_relocs, so make sure we have
4196 that amount allocated, with trailing space cleared.
4197 The variable alloc contains the computed need, while elf_tdata
4198 (abfd)->program_header_size contains the size used for the
4199 layout.
4200 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4201 where the layout is forced to according to a larger size in the
4202 last iterations for the testcase ld-elf/header. */
4203 BFD_ASSERT (elf_tdata (abfd)->program_header_size % bed->s->sizeof_phdr
4204 == 0);
a50b1753
NC
4205 phdrs = (Elf_Internal_Phdr *)
4206 bfd_zalloc2 (abfd,
4207 (elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr),
4208 sizeof (Elf_Internal_Phdr));
f3520d2f 4209 elf_tdata (abfd)->phdr = phdrs;
252b5132 4210 if (phdrs == NULL)
b34976b6 4211 return FALSE;
252b5132 4212
3f570048
AM
4213 maxpagesize = 1;
4214 if ((abfd->flags & D_PAGED) != 0)
4215 maxpagesize = bed->maxpagesize;
4216
252b5132
RH
4217 off = bed->s->sizeof_ehdr;
4218 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4219 if (header_pad < (bfd_vma) off)
4220 header_pad = 0;
4221 else
4222 header_pad -= off;
4223 off += header_pad;
252b5132 4224
0920dee7 4225 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4226 m != NULL;
0920dee7 4227 m = m->next, p++, j++)
252b5132 4228 {
252b5132 4229 asection **secpp;
bf988460
AM
4230 bfd_vma off_adjust;
4231 bfd_boolean no_contents;
252b5132
RH
4232
4233 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4234 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4235 not be done to the PT_NOTE section of a corefile, which may
4236 contain several pseudo-sections artificially created by bfd.
4237 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4238 if (m->count > 1
4239 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4240 && m->p_type == PT_NOTE))
252b5132
RH
4241 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4242 elf_sort_sections);
4243
b301b248
AM
4244 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4245 number of sections with contents contributing to both p_filesz
4246 and p_memsz, followed by a number of sections with no contents
4247 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4248 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4249 p->p_type = m->p_type;
28a7f3e7 4250 p->p_flags = m->p_flags;
252b5132 4251
3f570048
AM
4252 if (m->count == 0)
4253 p->p_vaddr = 0;
4254 else
3271a814 4255 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4256
4257 if (m->p_paddr_valid)
4258 p->p_paddr = m->p_paddr;
4259 else if (m->count == 0)
4260 p->p_paddr = 0;
4261 else
08a40648 4262 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4263
4264 if (p->p_type == PT_LOAD
4265 && (abfd->flags & D_PAGED) != 0)
4266 {
4267 /* p_align in demand paged PT_LOAD segments effectively stores
4268 the maximum page size. When copying an executable with
4269 objcopy, we set m->p_align from the input file. Use this
4270 value for maxpagesize rather than bed->maxpagesize, which
4271 may be different. Note that we use maxpagesize for PT_TLS
4272 segment alignment later in this function, so we are relying
4273 on at least one PT_LOAD segment appearing before a PT_TLS
4274 segment. */
4275 if (m->p_align_valid)
4276 maxpagesize = m->p_align;
4277
4278 p->p_align = maxpagesize;
4279 }
3271a814
NS
4280 else if (m->p_align_valid)
4281 p->p_align = m->p_align;
e970b90a
DJ
4282 else if (m->count == 0)
4283 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4284 else
4285 p->p_align = 0;
4286
bf988460
AM
4287 no_contents = FALSE;
4288 off_adjust = 0;
252b5132 4289 if (p->p_type == PT_LOAD
b301b248 4290 && m->count > 0)
252b5132 4291 {
b301b248 4292 bfd_size_type align;
a49e53ed 4293 unsigned int align_power = 0;
b301b248 4294
3271a814
NS
4295 if (m->p_align_valid)
4296 align = p->p_align;
4297 else
252b5132 4298 {
3271a814
NS
4299 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4300 {
4301 unsigned int secalign;
08a40648 4302
3271a814
NS
4303 secalign = bfd_get_section_alignment (abfd, *secpp);
4304 if (secalign > align_power)
4305 align_power = secalign;
4306 }
4307 align = (bfd_size_type) 1 << align_power;
4308 if (align < maxpagesize)
4309 align = maxpagesize;
b301b248 4310 }
252b5132 4311
02bf8d82
AM
4312 for (i = 0; i < m->count; i++)
4313 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4314 /* If we aren't making room for this section, then
4315 it must be SHT_NOBITS regardless of what we've
4316 set via struct bfd_elf_special_section. */
4317 elf_section_type (m->sections[i]) = SHT_NOBITS;
4318
bf988460 4319 /* Find out whether this segment contains any loadable
aea274d3
AM
4320 sections. */
4321 no_contents = TRUE;
4322 for (i = 0; i < m->count; i++)
4323 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4324 {
4325 no_contents = FALSE;
4326 break;
4327 }
bf988460
AM
4328
4329 off_adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4330 off += off_adjust;
4331 if (no_contents)
4332 {
4333 /* We shouldn't need to align the segment on disk since
4334 the segment doesn't need file space, but the gABI
4335 arguably requires the alignment and glibc ld.so
4336 checks it. So to comply with the alignment
4337 requirement but not waste file space, we adjust
4338 p_offset for just this segment. (OFF_ADJUST is
4339 subtracted from OFF later.) This may put p_offset
4340 past the end of file, but that shouldn't matter. */
4341 }
4342 else
4343 off_adjust = 0;
252b5132 4344 }
b1a6d0b1
NC
4345 /* Make sure the .dynamic section is the first section in the
4346 PT_DYNAMIC segment. */
4347 else if (p->p_type == PT_DYNAMIC
4348 && m->count > 1
4349 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4350 {
4351 _bfd_error_handler
b301b248
AM
4352 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4353 abfd);
b1a6d0b1
NC
4354 bfd_set_error (bfd_error_bad_value);
4355 return FALSE;
4356 }
3f001e84
JK
4357 /* Set the note section type to SHT_NOTE. */
4358 else if (p->p_type == PT_NOTE)
4359 for (i = 0; i < m->count; i++)
4360 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4361
252b5132
RH
4362 p->p_offset = 0;
4363 p->p_filesz = 0;
4364 p->p_memsz = 0;
4365
4366 if (m->includes_filehdr)
4367 {
bf988460 4368 if (!m->p_flags_valid)
252b5132 4369 p->p_flags |= PF_R;
252b5132
RH
4370 p->p_filesz = bed->s->sizeof_ehdr;
4371 p->p_memsz = bed->s->sizeof_ehdr;
4372 if (m->count > 0)
4373 {
4374 BFD_ASSERT (p->p_type == PT_LOAD);
4375
4376 if (p->p_vaddr < (bfd_vma) off)
4377 {
caf47ea6 4378 (*_bfd_error_handler)
b301b248
AM
4379 (_("%B: Not enough room for program headers, try linking with -N"),
4380 abfd);
252b5132 4381 bfd_set_error (bfd_error_bad_value);
b34976b6 4382 return FALSE;
252b5132
RH
4383 }
4384
4385 p->p_vaddr -= off;
bf988460 4386 if (!m->p_paddr_valid)
252b5132
RH
4387 p->p_paddr -= off;
4388 }
252b5132
RH
4389 }
4390
4391 if (m->includes_phdrs)
4392 {
bf988460 4393 if (!m->p_flags_valid)
252b5132
RH
4394 p->p_flags |= PF_R;
4395
f3520d2f 4396 if (!m->includes_filehdr)
252b5132
RH
4397 {
4398 p->p_offset = bed->s->sizeof_ehdr;
4399
4400 if (m->count > 0)
4401 {
4402 BFD_ASSERT (p->p_type == PT_LOAD);
4403 p->p_vaddr -= off - p->p_offset;
bf988460 4404 if (!m->p_paddr_valid)
252b5132
RH
4405 p->p_paddr -= off - p->p_offset;
4406 }
252b5132
RH
4407 }
4408
4409 p->p_filesz += alloc * bed->s->sizeof_phdr;
4410 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4411 if (m->count)
4412 {
4413 p->p_filesz += header_pad;
4414 p->p_memsz += header_pad;
4415 }
252b5132
RH
4416 }
4417
4418 if (p->p_type == PT_LOAD
4419 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4420 {
bf988460 4421 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4422 p->p_offset = off;
252b5132
RH
4423 else
4424 {
4425 file_ptr adjust;
4426
4427 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4428 if (!no_contents)
4429 p->p_filesz += adjust;
252b5132
RH
4430 p->p_memsz += adjust;
4431 }
4432 }
4433
1ea63fd2
AM
4434 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4435 maps. Set filepos for sections in PT_LOAD segments, and in
4436 core files, for sections in PT_NOTE segments.
4437 assign_file_positions_for_non_load_sections will set filepos
4438 for other sections and update p_filesz for other segments. */
252b5132
RH
4439 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4440 {
4441 asection *sec;
252b5132 4442 bfd_size_type align;
627b32bc 4443 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4444
4445 sec = *secpp;
02bf8d82 4446 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4447 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4448
88967714
AM
4449 if ((p->p_type == PT_LOAD
4450 || p->p_type == PT_TLS)
4451 && (this_hdr->sh_type != SHT_NOBITS
4452 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4453 && ((this_hdr->sh_flags & SHF_TLS) == 0
4454 || p->p_type == PT_TLS))))
252b5132 4455 {
3ac9b6c9 4456 bfd_vma adjust = sec->lma - (p->p_paddr + p->p_memsz);
252b5132 4457
3ac9b6c9 4458 if (sec->lma < p->p_paddr + p->p_memsz)
252b5132 4459 {
88967714 4460 (*_bfd_error_handler)
3ac9b6c9
AM
4461 (_("%B: section %A lma 0x%lx overlaps previous sections"),
4462 abfd, sec, (unsigned long) sec->lma);
88967714 4463 adjust = 0;
1cfb7d1e
SA
4464 sec->lma = p->p_paddr + p->p_memsz;
4465 }
3ac9b6c9 4466 p->p_memsz += adjust;
1cfb7d1e 4467
88967714
AM
4468 if (this_hdr->sh_type != SHT_NOBITS)
4469 {
32812159
AM
4470 if (p->p_filesz + adjust < p->p_memsz)
4471 {
4472 /* We have a PROGBITS section following NOBITS ones.
4473 Allocate file space for the NOBITS section(s) and
4474 zero it. */
4475 adjust = p->p_memsz - p->p_filesz;
4476 if (!write_zeros (abfd, off, adjust))
4477 return FALSE;
4478 }
88967714
AM
4479 off += adjust;
4480 p->p_filesz += adjust;
252b5132 4481 }
252b5132
RH
4482 }
4483
4484 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4485 {
b301b248
AM
4486 /* The section at i == 0 is the one that actually contains
4487 everything. */
4a938328
MS
4488 if (i == 0)
4489 {
627b32bc 4490 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4491 off += this_hdr->sh_size;
4492 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4493 p->p_memsz = 0;
4494 p->p_align = 1;
252b5132 4495 }
4a938328 4496 else
252b5132 4497 {
b301b248 4498 /* The rest are fake sections that shouldn't be written. */
252b5132 4499 sec->filepos = 0;
eea6121a 4500 sec->size = 0;
b301b248
AM
4501 sec->flags = 0;
4502 continue;
252b5132 4503 }
252b5132
RH
4504 }
4505 else
4506 {
b301b248
AM
4507 if (p->p_type == PT_LOAD)
4508 {
02bf8d82
AM
4509 this_hdr->sh_offset = sec->filepos = off;
4510 if (this_hdr->sh_type != SHT_NOBITS)
6a3cd2b4 4511 off += this_hdr->sh_size;
b301b248 4512 }
252b5132 4513
02bf8d82 4514 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4515 {
6a3cd2b4 4516 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4517 /* A load section without SHF_ALLOC is something like
4518 a note section in a PT_NOTE segment. These take
4519 file space but are not loaded into memory. */
4520 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4521 p->p_memsz += this_hdr->sh_size;
b301b248 4522 }
6a3cd2b4 4523 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4524 {
6a3cd2b4
AM
4525 if (p->p_type == PT_TLS)
4526 p->p_memsz += this_hdr->sh_size;
4527
4528 /* .tbss is special. It doesn't contribute to p_memsz of
4529 normal segments. */
4530 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4531 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4532 }
4533
b10a8ae0
L
4534 if (align > p->p_align
4535 && !m->p_align_valid
4536 && (p->p_type != PT_LOAD
4537 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4538 p->p_align = align;
4539 }
4540
bf988460 4541 if (!m->p_flags_valid)
252b5132
RH
4542 {
4543 p->p_flags |= PF_R;
02bf8d82 4544 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4545 p->p_flags |= PF_X;
02bf8d82 4546 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4547 p->p_flags |= PF_W;
4548 }
4549 }
bf988460 4550 off -= off_adjust;
0920dee7 4551
7c928300
AM
4552 /* Check that all sections are in a PT_LOAD segment.
4553 Don't check funky gdb generated core files. */
4554 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
4555 {
4556 bfd_boolean check_vma = TRUE;
4557
4558 for (i = 1; i < m->count; i++)
4559 if (m->sections[i]->vma == m->sections[i - 1]->vma
4560 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
4561 ->this_hdr), p) != 0
4562 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
4563 ->this_hdr), p) != 0)
0920dee7 4564 {
9a83a553
AM
4565 /* Looks like we have overlays packed into the segment. */
4566 check_vma = FALSE;
4567 break;
0920dee7 4568 }
9a83a553
AM
4569
4570 for (i = 0; i < m->count; i++)
4571 {
4572 Elf_Internal_Shdr *this_hdr;
4573 asection *sec;
4574
4575 sec = m->sections[i];
4576 this_hdr = &(elf_section_data(sec)->this_hdr);
4577 if (this_hdr->sh_size != 0
4578 && !ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma))
4579 {
4580 (*_bfd_error_handler)
4581 (_("%B: section `%A' can't be allocated in segment %d"),
4582 abfd, sec, j);
4583 print_segment_map (m);
4584 }
4585 }
4586 }
252b5132
RH
4587 }
4588
f3520d2f
AM
4589 elf_tdata (abfd)->next_file_pos = off;
4590 return TRUE;
4591}
4592
4593/* Assign file positions for the other sections. */
4594
4595static bfd_boolean
4596assign_file_positions_for_non_load_sections (bfd *abfd,
4597 struct bfd_link_info *link_info)
4598{
4599 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4600 Elf_Internal_Shdr **i_shdrpp;
4601 Elf_Internal_Shdr **hdrpp;
4602 Elf_Internal_Phdr *phdrs;
4603 Elf_Internal_Phdr *p;
4604 struct elf_segment_map *m;
4605 bfd_vma filehdr_vaddr, filehdr_paddr;
4606 bfd_vma phdrs_vaddr, phdrs_paddr;
4607 file_ptr off;
4608 unsigned int num_sec;
4609 unsigned int i;
4610 unsigned int count;
4611
5c182d5f
AM
4612 i_shdrpp = elf_elfsections (abfd);
4613 num_sec = elf_numsections (abfd);
f3520d2f 4614 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4615 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4616 {
4617 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4618 Elf_Internal_Shdr *hdr;
4619
4620 hdr = *hdrpp;
4621 if (hdr->bfd_section != NULL
252e386e
AM
4622 && (hdr->bfd_section->filepos != 0
4623 || (hdr->sh_type == SHT_NOBITS
4624 && hdr->contents == NULL)))
627b32bc 4625 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4626 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4627 {
49c13adb
L
4628 if (hdr->sh_size != 0)
4629 ((*_bfd_error_handler)
4630 (_("%B: warning: allocated section `%s' not in segment"),
3ba71138
L
4631 abfd,
4632 (hdr->bfd_section == NULL
4633 ? "*unknown*"
4634 : hdr->bfd_section->name)));
4635 /* We don't need to page align empty sections. */
4636 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4637 off += vma_page_aligned_bias (hdr->sh_addr, off,
4638 bed->maxpagesize);
4639 else
4640 off += vma_page_aligned_bias (hdr->sh_addr, off,
4641 hdr->sh_addralign);
4642 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4643 FALSE);
4644 }
4645 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4646 && hdr->bfd_section == NULL)
4647 || hdr == i_shdrpp[tdata->symtab_section]
4648 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4649 || hdr == i_shdrpp[tdata->strtab_section])
4650 hdr->sh_offset = -1;
4651 else
4652 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4653 }
4654
252b5132
RH
4655 /* Now that we have set the section file positions, we can set up
4656 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4657 count = 0;
4658 filehdr_vaddr = 0;
4659 filehdr_paddr = 0;
4660 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4661 phdrs_paddr = 0;
4662 phdrs = elf_tdata (abfd)->phdr;
4663 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4664 m != NULL;
4665 m = m->next, p++)
4666 {
4667 ++count;
4668 if (p->p_type != PT_LOAD)
4669 continue;
4670
4671 if (m->includes_filehdr)
4672 {
4673 filehdr_vaddr = p->p_vaddr;
4674 filehdr_paddr = p->p_paddr;
4675 }
4676 if (m->includes_phdrs)
4677 {
4678 phdrs_vaddr = p->p_vaddr;
4679 phdrs_paddr = p->p_paddr;
4680 if (m->includes_filehdr)
4681 {
4682 phdrs_vaddr += bed->s->sizeof_ehdr;
4683 phdrs_paddr += bed->s->sizeof_ehdr;
4684 }
4685 }
4686 }
4687
252b5132
RH
4688 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4689 m != NULL;
4690 m = m->next, p++)
4691 {
129af99f 4692 if (p->p_type == PT_GNU_RELRO)
252b5132 4693 {
b84a33b5
AM
4694 const Elf_Internal_Phdr *lp;
4695
129af99f 4696 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
1ea63fd2 4697
129af99f 4698 if (link_info != NULL)
8c37241b 4699 {
129af99f
AS
4700 /* During linking the range of the RELRO segment is passed
4701 in link_info. */
8c37241b
JJ
4702 for (lp = phdrs; lp < phdrs + count; ++lp)
4703 {
4704 if (lp->p_type == PT_LOAD
8c37241b 4705 && lp->p_vaddr >= link_info->relro_start
b84a33b5
AM
4706 && lp->p_vaddr < link_info->relro_end
4707 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end)
8c37241b
JJ
4708 break;
4709 }
8c37241b 4710 }
129af99f
AS
4711 else
4712 {
4713 /* Otherwise we are copying an executable or shared
b84a33b5 4714 library, but we need to use the same linker logic. */
129af99f
AS
4715 for (lp = phdrs; lp < phdrs + count; ++lp)
4716 {
4717 if (lp->p_type == PT_LOAD
4718 && lp->p_paddr == p->p_paddr)
4719 break;
4720 }
b84a33b5
AM
4721 }
4722
4723 if (lp < phdrs + count)
4724 {
4725 p->p_vaddr = lp->p_vaddr;
4726 p->p_paddr = lp->p_paddr;
4727 p->p_offset = lp->p_offset;
4728 if (link_info != NULL)
4729 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4730 else if (m->p_size_valid)
4731 p->p_filesz = m->p_size;
129af99f
AS
4732 else
4733 abort ();
b84a33b5
AM
4734 p->p_memsz = p->p_filesz;
4735 p->p_align = 1;
4736 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 4737 }
9433b9b1 4738 else
b84a33b5
AM
4739 {
4740 memset (p, 0, sizeof *p);
4741 p->p_type = PT_NULL;
4742 }
129af99f
AS
4743 }
4744 else if (m->count != 0)
4745 {
4746 if (p->p_type != PT_LOAD
4747 && (p->p_type != PT_NOTE
4748 || bfd_get_format (abfd) != bfd_core))
4749 {
4750 Elf_Internal_Shdr *hdr;
4751 asection *sect;
4752
4753 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4754
4755 sect = m->sections[m->count - 1];
4756 hdr = &elf_section_data (sect)->this_hdr;
4757 p->p_filesz = sect->filepos - m->sections[0]->filepos;
4758 if (hdr->sh_type != SHT_NOBITS)
4759 p->p_filesz += hdr->sh_size;
4760 p->p_offset = m->sections[0]->filepos;
4761 }
4762 }
4763 else if (m->includes_filehdr)
4764 {
4765 p->p_vaddr = filehdr_vaddr;
4766 if (! m->p_paddr_valid)
4767 p->p_paddr = filehdr_paddr;
4768 }
4769 else if (m->includes_phdrs)
4770 {
4771 p->p_vaddr = phdrs_vaddr;
4772 if (! m->p_paddr_valid)
4773 p->p_paddr = phdrs_paddr;
252b5132
RH
4774 }
4775 }
4776
252b5132
RH
4777 elf_tdata (abfd)->next_file_pos = off;
4778
b34976b6 4779 return TRUE;
252b5132
RH
4780}
4781
252b5132
RH
4782/* Work out the file positions of all the sections. This is called by
4783 _bfd_elf_compute_section_file_positions. All the section sizes and
4784 VMAs must be known before this is called.
4785
e0638f70
AM
4786 Reloc sections come in two flavours: Those processed specially as
4787 "side-channel" data attached to a section to which they apply, and
4788 those that bfd doesn't process as relocations. The latter sort are
4789 stored in a normal bfd section by bfd_section_from_shdr. We don't
4790 consider the former sort here, unless they form part of the loadable
4791 image. Reloc sections not assigned here will be handled later by
4792 assign_file_positions_for_relocs.
252b5132
RH
4793
4794 We also don't set the positions of the .symtab and .strtab here. */
4795
b34976b6 4796static bfd_boolean
c84fca4d
AO
4797assign_file_positions_except_relocs (bfd *abfd,
4798 struct bfd_link_info *link_info)
252b5132 4799{
5c182d5f
AM
4800 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4801 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4802 file_ptr off;
9c5bfbb7 4803 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4804
4805 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4806 && bfd_get_format (abfd) != bfd_core)
4807 {
5c182d5f
AM
4808 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4809 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4810 Elf_Internal_Shdr **hdrpp;
4811 unsigned int i;
4812
4813 /* Start after the ELF header. */
4814 off = i_ehdrp->e_ehsize;
4815
4816 /* We are not creating an executable, which means that we are
4817 not creating a program header, and that the actual order of
4818 the sections in the file is unimportant. */
9ad5cbcf 4819 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4820 {
4821 Elf_Internal_Shdr *hdr;
4822
4823 hdr = *hdrpp;
e0638f70
AM
4824 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4825 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4826 || i == tdata->symtab_section
4827 || i == tdata->symtab_shndx_section
252b5132
RH
4828 || i == tdata->strtab_section)
4829 {
4830 hdr->sh_offset = -1;
252b5132 4831 }
9ad5cbcf 4832 else
b34976b6 4833 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
4834 }
4835 }
4836 else
4837 {
f3520d2f
AM
4838 unsigned int alloc;
4839
252b5132 4840 /* Assign file positions for the loaded sections based on the
08a40648 4841 assignment of sections to segments. */
f3520d2f
AM
4842 if (!assign_file_positions_for_load_sections (abfd, link_info))
4843 return FALSE;
4844
4845 /* And for non-load sections. */
4846 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4847 return FALSE;
4848
e36284ab
AM
4849 if (bed->elf_backend_modify_program_headers != NULL)
4850 {
4851 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4852 return FALSE;
4853 }
4854
f3520d2f
AM
4855 /* Write out the program headers. */
4856 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4857 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4858 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4859 return FALSE;
252b5132 4860
5c182d5f 4861 off = tdata->next_file_pos;
252b5132
RH
4862 }
4863
4864 /* Place the section headers. */
45d6a902 4865 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4866 i_ehdrp->e_shoff = off;
4867 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4868
5c182d5f 4869 tdata->next_file_pos = off;
252b5132 4870
b34976b6 4871 return TRUE;
252b5132
RH
4872}
4873
b34976b6 4874static bfd_boolean
217aa764 4875prep_headers (bfd *abfd)
252b5132 4876{
3d540e93 4877 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 4878 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4879 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4880
4881 i_ehdrp = elf_elfheader (abfd);
252b5132 4882
2b0f7ef9 4883 shstrtab = _bfd_elf_strtab_init ();
252b5132 4884 if (shstrtab == NULL)
b34976b6 4885 return FALSE;
252b5132
RH
4886
4887 elf_shstrtab (abfd) = shstrtab;
4888
4889 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4890 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4891 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4892 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4893
4894 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4895 i_ehdrp->e_ident[EI_DATA] =
4896 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4897 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4898
252b5132
RH
4899 if ((abfd->flags & DYNAMIC) != 0)
4900 i_ehdrp->e_type = ET_DYN;
4901 else if ((abfd->flags & EXEC_P) != 0)
4902 i_ehdrp->e_type = ET_EXEC;
4903 else if (bfd_get_format (abfd) == bfd_core)
4904 i_ehdrp->e_type = ET_CORE;
4905 else
4906 i_ehdrp->e_type = ET_REL;
4907
4908 switch (bfd_get_arch (abfd))
4909 {
4910 case bfd_arch_unknown:
4911 i_ehdrp->e_machine = EM_NONE;
4912 break;
aa4f99bb
AO
4913
4914 /* There used to be a long list of cases here, each one setting
4915 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4916 in the corresponding bfd definition. To avoid duplication,
4917 the switch was removed. Machines that need special handling
4918 can generally do it in elf_backend_final_write_processing(),
4919 unless they need the information earlier than the final write.
4920 Such need can generally be supplied by replacing the tests for
4921 e_machine with the conditions used to determine it. */
252b5132 4922 default:
9c5bfbb7
AM
4923 i_ehdrp->e_machine = bed->elf_machine_code;
4924 }
aa4f99bb 4925
252b5132
RH
4926 i_ehdrp->e_version = bed->s->ev_current;
4927 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4928
c044fabd 4929 /* No program header, for now. */
252b5132
RH
4930 i_ehdrp->e_phoff = 0;
4931 i_ehdrp->e_phentsize = 0;
4932 i_ehdrp->e_phnum = 0;
4933
c044fabd 4934 /* Each bfd section is section header entry. */
252b5132
RH
4935 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4936 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4937
c044fabd 4938 /* If we're building an executable, we'll need a program header table. */
252b5132 4939 if (abfd->flags & EXEC_P)
0e71e495
BE
4940 /* It all happens later. */
4941 ;
252b5132
RH
4942 else
4943 {
4944 i_ehdrp->e_phentsize = 0;
252b5132
RH
4945 i_ehdrp->e_phoff = 0;
4946 }
4947
4948 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4949 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4950 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4951 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4952 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4953 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4954 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4955 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4956 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4957 return FALSE;
252b5132 4958
b34976b6 4959 return TRUE;
252b5132
RH
4960}
4961
4962/* Assign file positions for all the reloc sections which are not part
4963 of the loadable file image. */
4964
4965void
217aa764 4966_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4967{
4968 file_ptr off;
9ad5cbcf 4969 unsigned int i, num_sec;
252b5132
RH
4970 Elf_Internal_Shdr **shdrpp;
4971
4972 off = elf_tdata (abfd)->next_file_pos;
4973
9ad5cbcf
AM
4974 num_sec = elf_numsections (abfd);
4975 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4976 {
4977 Elf_Internal_Shdr *shdrp;
4978
4979 shdrp = *shdrpp;
4980 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4981 && shdrp->sh_offset == -1)
b34976b6 4982 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4983 }
4984
4985 elf_tdata (abfd)->next_file_pos = off;
4986}
4987
b34976b6 4988bfd_boolean
217aa764 4989_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4990{
9c5bfbb7 4991 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4992 Elf_Internal_Shdr **i_shdrp;
b34976b6 4993 bfd_boolean failed;
9ad5cbcf 4994 unsigned int count, num_sec;
252b5132
RH
4995
4996 if (! abfd->output_has_begun
217aa764 4997 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 4998 return FALSE;
252b5132
RH
4999
5000 i_shdrp = elf_elfsections (abfd);
252b5132 5001
b34976b6 5002 failed = FALSE;
252b5132
RH
5003 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5004 if (failed)
b34976b6 5005 return FALSE;
252b5132
RH
5006
5007 _bfd_elf_assign_file_positions_for_relocs (abfd);
5008
c044fabd 5009 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5010 num_sec = elf_numsections (abfd);
5011 for (count = 1; count < num_sec; count++)
252b5132
RH
5012 {
5013 if (bed->elf_backend_section_processing)
5014 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5015 if (i_shdrp[count]->contents)
5016 {
dc810e39
AM
5017 bfd_size_type amt = i_shdrp[count]->sh_size;
5018
252b5132 5019 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5020 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5021 return FALSE;
252b5132
RH
5022 }
5023 }
5024
5025 /* Write out the section header names. */
26ae6d5e
DJ
5026 if (elf_shstrtab (abfd) != NULL
5027 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5028 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5029 return FALSE;
252b5132
RH
5030
5031 if (bed->elf_backend_final_write_processing)
5032 (*bed->elf_backend_final_write_processing) (abfd,
5033 elf_tdata (abfd)->linker);
5034
ff59fc36
RM
5035 if (!bed->s->write_shdrs_and_ehdr (abfd))
5036 return FALSE;
5037
5038 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
5039 if (elf_tdata (abfd)->after_write_object_contents)
5040 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
5041
5042 return TRUE;
252b5132
RH
5043}
5044
b34976b6 5045bfd_boolean
217aa764 5046_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5047{
c044fabd 5048 /* Hopefully this can be done just like an object file. */
252b5132
RH
5049 return _bfd_elf_write_object_contents (abfd);
5050}
c044fabd
KH
5051
5052/* Given a section, search the header to find them. */
5053
cb33740c 5054unsigned int
198beae2 5055_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5056{
9c5bfbb7 5057 const struct elf_backend_data *bed;
91d6fa6a 5058 unsigned int sec_index;
252b5132 5059
9ad5cbcf
AM
5060 if (elf_section_data (asect) != NULL
5061 && elf_section_data (asect)->this_idx != 0)
5062 return elf_section_data (asect)->this_idx;
5063
5064 if (bfd_is_abs_section (asect))
91d6fa6a 5065 sec_index = SHN_ABS;
af746e92 5066 else if (bfd_is_com_section (asect))
91d6fa6a 5067 sec_index = SHN_COMMON;
af746e92 5068 else if (bfd_is_und_section (asect))
91d6fa6a 5069 sec_index = SHN_UNDEF;
af746e92 5070 else
91d6fa6a 5071 sec_index = SHN_BAD;
252b5132 5072
af746e92 5073 bed = get_elf_backend_data (abfd);
252b5132
RH
5074 if (bed->elf_backend_section_from_bfd_section)
5075 {
91d6fa6a 5076 int retval = sec_index;
9ad5cbcf 5077
af746e92
AM
5078 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5079 return retval;
252b5132
RH
5080 }
5081
91d6fa6a 5082 if (sec_index == SHN_BAD)
af746e92 5083 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5084
91d6fa6a 5085 return sec_index;
252b5132
RH
5086}
5087
5088/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5089 on error. */
5090
5091int
217aa764 5092_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5093{
5094 asymbol *asym_ptr = *asym_ptr_ptr;
5095 int idx;
5096 flagword flags = asym_ptr->flags;
5097
5098 /* When gas creates relocations against local labels, it creates its
5099 own symbol for the section, but does put the symbol into the
5100 symbol chain, so udata is 0. When the linker is generating
5101 relocatable output, this section symbol may be for one of the
5102 input sections rather than the output section. */
5103 if (asym_ptr->udata.i == 0
5104 && (flags & BSF_SECTION_SYM)
5105 && asym_ptr->section)
5106 {
5372391b 5107 asection *sec;
252b5132
RH
5108 int indx;
5109
5372391b
AM
5110 sec = asym_ptr->section;
5111 if (sec->owner != abfd && sec->output_section != NULL)
5112 sec = sec->output_section;
5113 if (sec->owner == abfd
5114 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5115 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5116 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5117 }
5118
5119 idx = asym_ptr->udata.i;
5120
5121 if (idx == 0)
5122 {
5123 /* This case can occur when using --strip-symbol on a symbol
08a40648 5124 which is used in a relocation entry. */
252b5132 5125 (*_bfd_error_handler)
d003868e
AM
5126 (_("%B: symbol `%s' required but not present"),
5127 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5128 bfd_set_error (bfd_error_no_symbols);
5129 return -1;
5130 }
5131
5132#if DEBUG & 4
5133 {
5134 fprintf (stderr,
661a3fd4 5135 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5136 (long) asym_ptr, asym_ptr->name, idx, flags,
5137 elf_symbol_flags (flags));
5138 fflush (stderr);
5139 }
5140#endif
5141
5142 return idx;
5143}
5144
84d1d650 5145/* Rewrite program header information. */
252b5132 5146
b34976b6 5147static bfd_boolean
84d1d650 5148rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5149{
b34976b6
AM
5150 Elf_Internal_Ehdr *iehdr;
5151 struct elf_segment_map *map;
5152 struct elf_segment_map *map_first;
5153 struct elf_segment_map **pointer_to_map;
5154 Elf_Internal_Phdr *segment;
5155 asection *section;
5156 unsigned int i;
5157 unsigned int num_segments;
5158 bfd_boolean phdr_included = FALSE;
5c44b38e 5159 bfd_boolean p_paddr_valid;
b34976b6
AM
5160 bfd_vma maxpagesize;
5161 struct elf_segment_map *phdr_adjust_seg = NULL;
5162 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5163 const struct elf_backend_data *bed;
bc67d8a6 5164
caf47ea6 5165 bed = get_elf_backend_data (ibfd);
252b5132
RH
5166 iehdr = elf_elfheader (ibfd);
5167
bc67d8a6 5168 map_first = NULL;
c044fabd 5169 pointer_to_map = &map_first;
252b5132
RH
5170
5171 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5172 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5173
5174 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5175#define SEGMENT_END(segment, start) \
5176 (start + (segment->p_memsz > segment->p_filesz \
5177 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5178
eecdbe52
JJ
5179#define SECTION_SIZE(section, segment) \
5180 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5181 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5182 ? section->size : 0)
eecdbe52 5183
b34976b6 5184 /* Returns TRUE if the given section is contained within
bc67d8a6 5185 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5186#define IS_CONTAINED_BY_VMA(section, segment) \
5187 (section->vma >= segment->p_vaddr \
eecdbe52 5188 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5189 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5190
b34976b6 5191 /* Returns TRUE if the given section is contained within
bc67d8a6 5192 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5193#define IS_CONTAINED_BY_LMA(section, segment, base) \
5194 (section->lma >= base \
eecdbe52 5195 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5196 <= SEGMENT_END (segment, base)))
252b5132 5197
0efc80c8
L
5198 /* Handle PT_NOTE segment. */
5199#define IS_NOTE(p, s) \
aecc8f8a 5200 (p->p_type == PT_NOTE \
0efc80c8 5201 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5202 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5203 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5204 <= p->p_offset + p->p_filesz))
252b5132 5205
0efc80c8
L
5206 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5207 etc. */
5208#define IS_COREFILE_NOTE(p, s) \
5209 (IS_NOTE (p, s) \
5210 && bfd_get_format (ibfd) == bfd_core \
5211 && s->vma == 0 \
5212 && s->lma == 0)
5213
252b5132
RH
5214 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5215 linker, which generates a PT_INTERP section with p_vaddr and
5216 p_memsz set to 0. */
aecc8f8a
AM
5217#define IS_SOLARIS_PT_INTERP(p, s) \
5218 (p->p_vaddr == 0 \
5219 && p->p_paddr == 0 \
5220 && p->p_memsz == 0 \
5221 && p->p_filesz > 0 \
5222 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5223 && s->size > 0 \
aecc8f8a 5224 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5225 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5226 <= p->p_offset + p->p_filesz))
5c440b1e 5227
bc67d8a6
NC
5228 /* Decide if the given section should be included in the given segment.
5229 A section will be included if:
f5ffc919 5230 1. It is within the address space of the segment -- we use the LMA
08a40648 5231 if that is set for the segment and the VMA otherwise,
0efc80c8
L
5232 2. It is an allocated section or a NOTE section in a PT_NOTE
5233 segment.
bc67d8a6 5234 3. There is an output section associated with it,
eecdbe52 5235 4. The section has not already been allocated to a previous segment.
2b05f1b7 5236 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5237 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5238 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5239 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5240 (with the possible exception of .dynamic). */
9f17e2a6 5241#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5242 ((((segment->p_paddr \
5243 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5244 : IS_CONTAINED_BY_VMA (section, segment)) \
5245 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5246 || IS_NOTE (segment, section)) \
2b05f1b7
L
5247 && segment->p_type != PT_GNU_STACK \
5248 && (segment->p_type != PT_TLS \
5249 || (section->flags & SEC_THREAD_LOCAL)) \
5250 && (segment->p_type == PT_LOAD \
5251 || segment->p_type == PT_TLS \
5252 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5253 && (segment->p_type != PT_DYNAMIC \
5254 || SECTION_SIZE (section, segment) > 0 \
5255 || (segment->p_paddr \
5256 ? segment->p_paddr != section->lma \
5257 : segment->p_vaddr != section->vma) \
5258 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5259 == 0)) \
0067a569 5260 && !section->segment_mark)
bc67d8a6 5261
9f17e2a6
L
5262/* If the output section of a section in the input segment is NULL,
5263 it is removed from the corresponding output segment. */
5264#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5265 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5266 && section->output_section != NULL)
5267
b34976b6 5268 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5269#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5270 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5271
5272 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5273 their VMA address ranges and their LMA address ranges overlap.
5274 It is possible to have overlapping VMA ranges without overlapping LMA
5275 ranges. RedBoot images for example can have both .data and .bss mapped
5276 to the same VMA range, but with the .data section mapped to a different
5277 LMA. */
aecc8f8a 5278#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5279 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5280 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5281 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5282 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5283
5284 /* Initialise the segment mark field. */
5285 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5286 section->segment_mark = FALSE;
bc67d8a6 5287
5c44b38e
AM
5288 /* The Solaris linker creates program headers in which all the
5289 p_paddr fields are zero. When we try to objcopy or strip such a
5290 file, we get confused. Check for this case, and if we find it
5291 don't set the p_paddr_valid fields. */
5292 p_paddr_valid = FALSE;
5293 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5294 i < num_segments;
5295 i++, segment++)
5296 if (segment->p_paddr != 0)
5297 {
5298 p_paddr_valid = TRUE;
5299 break;
5300 }
5301
252b5132 5302 /* Scan through the segments specified in the program header
bc67d8a6 5303 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5304 in the loadable segments. These can be created by weird
aecc8f8a 5305 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5306 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5307 i < num_segments;
c044fabd 5308 i++, segment++)
252b5132 5309 {
252b5132 5310 unsigned int j;
c044fabd 5311 Elf_Internal_Phdr *segment2;
252b5132 5312
aecc8f8a
AM
5313 if (segment->p_type == PT_INTERP)
5314 for (section = ibfd->sections; section; section = section->next)
5315 if (IS_SOLARIS_PT_INTERP (segment, section))
5316 {
5317 /* Mininal change so that the normal section to segment
4cc11e76 5318 assignment code will work. */
aecc8f8a
AM
5319 segment->p_vaddr = section->vma;
5320 break;
5321 }
5322
bc67d8a6 5323 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5324 {
5325 /* Remove PT_GNU_RELRO segment. */
5326 if (segment->p_type == PT_GNU_RELRO)
5327 segment->p_type = PT_NULL;
5328 continue;
5329 }
c044fabd 5330
bc67d8a6 5331 /* Determine if this segment overlaps any previous segments. */
0067a569 5332 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5333 {
5334 bfd_signed_vma extra_length;
c044fabd 5335
bc67d8a6 5336 if (segment2->p_type != PT_LOAD
0067a569 5337 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5338 continue;
c044fabd 5339
bc67d8a6
NC
5340 /* Merge the two segments together. */
5341 if (segment2->p_vaddr < segment->p_vaddr)
5342 {
c044fabd 5343 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5344 SEGMENT. */
0067a569
AM
5345 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5346 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5347
bc67d8a6
NC
5348 if (extra_length > 0)
5349 {
0067a569 5350 segment2->p_memsz += extra_length;
bc67d8a6
NC
5351 segment2->p_filesz += extra_length;
5352 }
c044fabd 5353
bc67d8a6 5354 segment->p_type = PT_NULL;
c044fabd 5355
bc67d8a6
NC
5356 /* Since we have deleted P we must restart the outer loop. */
5357 i = 0;
5358 segment = elf_tdata (ibfd)->phdr;
5359 break;
5360 }
5361 else
5362 {
c044fabd 5363 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5364 SEGMENT2. */
0067a569
AM
5365 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5366 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5367
bc67d8a6
NC
5368 if (extra_length > 0)
5369 {
0067a569 5370 segment->p_memsz += extra_length;
bc67d8a6
NC
5371 segment->p_filesz += extra_length;
5372 }
c044fabd 5373
bc67d8a6
NC
5374 segment2->p_type = PT_NULL;
5375 }
5376 }
5377 }
c044fabd 5378
bc67d8a6
NC
5379 /* The second scan attempts to assign sections to segments. */
5380 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5381 i < num_segments;
0067a569 5382 i++, segment++)
bc67d8a6 5383 {
0067a569
AM
5384 unsigned int section_count;
5385 asection **sections;
5386 asection *output_section;
5387 unsigned int isec;
5388 bfd_vma matching_lma;
5389 bfd_vma suggested_lma;
5390 unsigned int j;
dc810e39 5391 bfd_size_type amt;
0067a569
AM
5392 asection *first_section;
5393 bfd_boolean first_matching_lma;
5394 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5395
5396 if (segment->p_type == PT_NULL)
5397 continue;
c044fabd 5398
9f17e2a6 5399 first_section = NULL;
bc67d8a6 5400 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5401 for (section = ibfd->sections, section_count = 0;
5402 section != NULL;
5403 section = section->next)
9f17e2a6
L
5404 {
5405 /* Find the first section in the input segment, which may be
5406 removed from the corresponding output segment. */
5407 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5408 {
5409 if (first_section == NULL)
5410 first_section = section;
5411 if (section->output_section != NULL)
5412 ++section_count;
5413 }
5414 }
811072d8 5415
b5f852ea
NC
5416 /* Allocate a segment map big enough to contain
5417 all of the sections we have selected. */
dc810e39
AM
5418 amt = sizeof (struct elf_segment_map);
5419 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5420 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5421 if (map == NULL)
b34976b6 5422 return FALSE;
252b5132
RH
5423
5424 /* Initialise the fields of the segment map. Default to
5425 using the physical address of the segment in the input BFD. */
0067a569
AM
5426 map->next = NULL;
5427 map->p_type = segment->p_type;
5428 map->p_flags = segment->p_flags;
bc67d8a6 5429 map->p_flags_valid = 1;
55d55ac7 5430
9f17e2a6
L
5431 /* If the first section in the input segment is removed, there is
5432 no need to preserve segment physical address in the corresponding
5433 output segment. */
945c025a 5434 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5435 {
5436 map->p_paddr = segment->p_paddr;
5c44b38e 5437 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5438 }
252b5132
RH
5439
5440 /* Determine if this segment contains the ELF file header
5441 and if it contains the program headers themselves. */
bc67d8a6
NC
5442 map->includes_filehdr = (segment->p_offset == 0
5443 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5444 map->includes_phdrs = 0;
252b5132 5445
0067a569 5446 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5447 {
bc67d8a6
NC
5448 map->includes_phdrs =
5449 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5450 && (segment->p_offset + segment->p_filesz
252b5132
RH
5451 >= ((bfd_vma) iehdr->e_phoff
5452 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5453
bc67d8a6 5454 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5455 phdr_included = TRUE;
252b5132
RH
5456 }
5457
bc67d8a6 5458 if (section_count == 0)
252b5132
RH
5459 {
5460 /* Special segments, such as the PT_PHDR segment, may contain
5461 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5462 something. They are allowed by the ELF spec however, so only
5463 a warning is produced. */
bc67d8a6 5464 if (segment->p_type == PT_LOAD)
0067a569
AM
5465 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5466 " detected, is this intentional ?\n"),
5467 ibfd);
252b5132 5468
bc67d8a6 5469 map->count = 0;
c044fabd
KH
5470 *pointer_to_map = map;
5471 pointer_to_map = &map->next;
252b5132
RH
5472
5473 continue;
5474 }
5475
5476 /* Now scan the sections in the input BFD again and attempt
5477 to add their corresponding output sections to the segment map.
5478 The problem here is how to handle an output section which has
5479 been moved (ie had its LMA changed). There are four possibilities:
5480
5481 1. None of the sections have been moved.
5482 In this case we can continue to use the segment LMA from the
5483 input BFD.
5484
5485 2. All of the sections have been moved by the same amount.
5486 In this case we can change the segment's LMA to match the LMA
5487 of the first section.
5488
5489 3. Some of the sections have been moved, others have not.
5490 In this case those sections which have not been moved can be
5491 placed in the current segment which will have to have its size,
5492 and possibly its LMA changed, and a new segment or segments will
5493 have to be created to contain the other sections.
5494
b5f852ea 5495 4. The sections have been moved, but not by the same amount.
252b5132
RH
5496 In this case we can change the segment's LMA to match the LMA
5497 of the first section and we will have to create a new segment
5498 or segments to contain the other sections.
5499
5500 In order to save time, we allocate an array to hold the section
5501 pointers that we are interested in. As these sections get assigned
5502 to a segment, they are removed from this array. */
5503
a50b1753 5504 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5505 if (sections == NULL)
b34976b6 5506 return FALSE;
252b5132
RH
5507
5508 /* Step One: Scan for segment vs section LMA conflicts.
5509 Also add the sections to the section array allocated above.
5510 Also add the sections to the current segment. In the common
5511 case, where the sections have not been moved, this means that
5512 we have completely filled the segment, and there is nothing
5513 more to do. */
252b5132 5514 isec = 0;
72730e0c 5515 matching_lma = 0;
252b5132 5516 suggested_lma = 0;
0067a569
AM
5517 first_matching_lma = TRUE;
5518 first_suggested_lma = TRUE;
252b5132 5519
147d51c2 5520 for (section = ibfd->sections;
bc67d8a6
NC
5521 section != NULL;
5522 section = section->next)
147d51c2
L
5523 if (section == first_section)
5524 break;
5525
5526 for (j = 0; section != NULL; section = section->next)
252b5132 5527 {
caf47ea6 5528 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5529 {
bc67d8a6
NC
5530 output_section = section->output_section;
5531
0067a569 5532 sections[j++] = section;
252b5132
RH
5533
5534 /* The Solaris native linker always sets p_paddr to 0.
5535 We try to catch that case here, and set it to the
5e8d7549
NC
5536 correct value. Note - some backends require that
5537 p_paddr be left as zero. */
5c44b38e 5538 if (!p_paddr_valid
4455705d 5539 && segment->p_vaddr != 0
0067a569 5540 && !bed->want_p_paddr_set_to_zero
252b5132 5541 && isec == 0
bc67d8a6 5542 && output_section->lma != 0
0067a569
AM
5543 && output_section->vma == (segment->p_vaddr
5544 + (map->includes_filehdr
5545 ? iehdr->e_ehsize
5546 : 0)
5547 + (map->includes_phdrs
5548 ? (iehdr->e_phnum
5549 * iehdr->e_phentsize)
5550 : 0)))
bc67d8a6 5551 map->p_paddr = segment->p_vaddr;
252b5132
RH
5552
5553 /* Match up the physical address of the segment with the
5554 LMA address of the output section. */
bc67d8a6 5555 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5556 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5557 || (bed->want_p_paddr_set_to_zero
5558 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5559 {
0067a569
AM
5560 if (first_matching_lma || output_section->lma < matching_lma)
5561 {
5562 matching_lma = output_section->lma;
5563 first_matching_lma = FALSE;
5564 }
252b5132
RH
5565
5566 /* We assume that if the section fits within the segment
bc67d8a6 5567 then it does not overlap any other section within that
252b5132 5568 segment. */
0067a569
AM
5569 map->sections[isec++] = output_section;
5570 }
5571 else if (first_suggested_lma)
5572 {
5573 suggested_lma = output_section->lma;
5574 first_suggested_lma = FALSE;
252b5132 5575 }
147d51c2
L
5576
5577 if (j == section_count)
5578 break;
252b5132
RH
5579 }
5580 }
5581
bc67d8a6 5582 BFD_ASSERT (j == section_count);
252b5132
RH
5583
5584 /* Step Two: Adjust the physical address of the current segment,
5585 if necessary. */
bc67d8a6 5586 if (isec == section_count)
252b5132
RH
5587 {
5588 /* All of the sections fitted within the segment as currently
5589 specified. This is the default case. Add the segment to
5590 the list of built segments and carry on to process the next
5591 program header in the input BFD. */
bc67d8a6 5592 map->count = section_count;
c044fabd
KH
5593 *pointer_to_map = map;
5594 pointer_to_map = &map->next;
08a40648 5595
5c44b38e
AM
5596 if (p_paddr_valid
5597 && !bed->want_p_paddr_set_to_zero
147d51c2 5598 && matching_lma != map->p_paddr
5c44b38e
AM
5599 && !map->includes_filehdr
5600 && !map->includes_phdrs)
3271a814
NS
5601 /* There is some padding before the first section in the
5602 segment. So, we must account for that in the output
5603 segment's vma. */
5604 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5605
252b5132
RH
5606 free (sections);
5607 continue;
5608 }
252b5132
RH
5609 else
5610 {
0067a569 5611 if (!first_matching_lma)
72730e0c
AM
5612 {
5613 /* At least one section fits inside the current segment.
5614 Keep it, but modify its physical address to match the
5615 LMA of the first section that fitted. */
bc67d8a6 5616 map->p_paddr = matching_lma;
72730e0c
AM
5617 }
5618 else
5619 {
5620 /* None of the sections fitted inside the current segment.
5621 Change the current segment's physical address to match
5622 the LMA of the first section. */
bc67d8a6 5623 map->p_paddr = suggested_lma;
72730e0c
AM
5624 }
5625
bc67d8a6
NC
5626 /* Offset the segment physical address from the lma
5627 to allow for space taken up by elf headers. */
5628 if (map->includes_filehdr)
010c8431
AM
5629 {
5630 if (map->p_paddr >= iehdr->e_ehsize)
5631 map->p_paddr -= iehdr->e_ehsize;
5632 else
5633 {
5634 map->includes_filehdr = FALSE;
5635 map->includes_phdrs = FALSE;
5636 }
5637 }
252b5132 5638
bc67d8a6
NC
5639 if (map->includes_phdrs)
5640 {
010c8431
AM
5641 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5642 {
5643 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5644
5645 /* iehdr->e_phnum is just an estimate of the number
5646 of program headers that we will need. Make a note
5647 here of the number we used and the segment we chose
5648 to hold these headers, so that we can adjust the
5649 offset when we know the correct value. */
5650 phdr_adjust_num = iehdr->e_phnum;
5651 phdr_adjust_seg = map;
5652 }
5653 else
5654 map->includes_phdrs = FALSE;
bc67d8a6 5655 }
252b5132
RH
5656 }
5657
5658 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5659 those that fit to the current segment and removing them from the
252b5132
RH
5660 sections array; but making sure not to leave large gaps. Once all
5661 possible sections have been assigned to the current segment it is
5662 added to the list of built segments and if sections still remain
5663 to be assigned, a new segment is constructed before repeating
5664 the loop. */
5665 isec = 0;
5666 do
5667 {
bc67d8a6 5668 map->count = 0;
252b5132 5669 suggested_lma = 0;
0067a569 5670 first_suggested_lma = TRUE;
252b5132
RH
5671
5672 /* Fill the current segment with sections that fit. */
bc67d8a6 5673 for (j = 0; j < section_count; j++)
252b5132 5674 {
bc67d8a6 5675 section = sections[j];
252b5132 5676
bc67d8a6 5677 if (section == NULL)
252b5132
RH
5678 continue;
5679
bc67d8a6 5680 output_section = section->output_section;
252b5132 5681
bc67d8a6 5682 BFD_ASSERT (output_section != NULL);
c044fabd 5683
bc67d8a6
NC
5684 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5685 || IS_COREFILE_NOTE (segment, section))
252b5132 5686 {
bc67d8a6 5687 if (map->count == 0)
252b5132
RH
5688 {
5689 /* If the first section in a segment does not start at
bc67d8a6
NC
5690 the beginning of the segment, then something is
5691 wrong. */
0067a569
AM
5692 if (output_section->lma
5693 != (map->p_paddr
5694 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5695 + (map->includes_phdrs
5696 ? iehdr->e_phnum * iehdr->e_phentsize
5697 : 0)))
252b5132
RH
5698 abort ();
5699 }
5700 else
5701 {
0067a569 5702 asection *prev_sec;
252b5132 5703
bc67d8a6 5704 prev_sec = map->sections[map->count - 1];
252b5132
RH
5705
5706 /* If the gap between the end of the previous section
bc67d8a6
NC
5707 and the start of this section is more than
5708 maxpagesize then we need to start a new segment. */
eea6121a 5709 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5710 maxpagesize)
caf47ea6 5711 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 5712 || (prev_sec->lma + prev_sec->size
079e9a2f 5713 > output_section->lma))
252b5132 5714 {
0067a569
AM
5715 if (first_suggested_lma)
5716 {
5717 suggested_lma = output_section->lma;
5718 first_suggested_lma = FALSE;
5719 }
252b5132
RH
5720
5721 continue;
5722 }
5723 }
5724
bc67d8a6 5725 map->sections[map->count++] = output_section;
252b5132
RH
5726 ++isec;
5727 sections[j] = NULL;
b34976b6 5728 section->segment_mark = TRUE;
252b5132 5729 }
0067a569
AM
5730 else if (first_suggested_lma)
5731 {
5732 suggested_lma = output_section->lma;
5733 first_suggested_lma = FALSE;
5734 }
252b5132
RH
5735 }
5736
bc67d8a6 5737 BFD_ASSERT (map->count > 0);
252b5132
RH
5738
5739 /* Add the current segment to the list of built segments. */
c044fabd
KH
5740 *pointer_to_map = map;
5741 pointer_to_map = &map->next;
252b5132 5742
bc67d8a6 5743 if (isec < section_count)
252b5132
RH
5744 {
5745 /* We still have not allocated all of the sections to
5746 segments. Create a new segment here, initialise it
5747 and carry on looping. */
dc810e39
AM
5748 amt = sizeof (struct elf_segment_map);
5749 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5750 map = (struct elf_segment_map *) bfd_alloc (obfd, amt);
bc67d8a6 5751 if (map == NULL)
5ed6aba4
NC
5752 {
5753 free (sections);
5754 return FALSE;
5755 }
252b5132
RH
5756
5757 /* Initialise the fields of the segment map. Set the physical
5758 physical address to the LMA of the first section that has
5759 not yet been assigned. */
0067a569
AM
5760 map->next = NULL;
5761 map->p_type = segment->p_type;
5762 map->p_flags = segment->p_flags;
5763 map->p_flags_valid = 1;
5764 map->p_paddr = suggested_lma;
5c44b38e 5765 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 5766 map->includes_filehdr = 0;
0067a569 5767 map->includes_phdrs = 0;
252b5132
RH
5768 }
5769 }
bc67d8a6 5770 while (isec < section_count);
252b5132
RH
5771
5772 free (sections);
5773 }
5774
bc67d8a6
NC
5775 elf_tdata (obfd)->segment_map = map_first;
5776
5777 /* If we had to estimate the number of program headers that were
9ad5cbcf 5778 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5779 the offset if necessary. */
5780 if (phdr_adjust_seg != NULL)
5781 {
5782 unsigned int count;
c044fabd 5783
bc67d8a6 5784 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5785 count++;
252b5132 5786
bc67d8a6
NC
5787 if (count > phdr_adjust_num)
5788 phdr_adjust_seg->p_paddr
5789 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5790 }
c044fabd 5791
bc67d8a6 5792#undef SEGMENT_END
eecdbe52 5793#undef SECTION_SIZE
bc67d8a6
NC
5794#undef IS_CONTAINED_BY_VMA
5795#undef IS_CONTAINED_BY_LMA
0efc80c8 5796#undef IS_NOTE
252b5132 5797#undef IS_COREFILE_NOTE
bc67d8a6 5798#undef IS_SOLARIS_PT_INTERP
9f17e2a6 5799#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
5800#undef INCLUDE_SECTION_IN_SEGMENT
5801#undef SEGMENT_AFTER_SEGMENT
5802#undef SEGMENT_OVERLAPS
b34976b6 5803 return TRUE;
252b5132
RH
5804}
5805
84d1d650
L
5806/* Copy ELF program header information. */
5807
5808static bfd_boolean
5809copy_elf_program_header (bfd *ibfd, bfd *obfd)
5810{
5811 Elf_Internal_Ehdr *iehdr;
5812 struct elf_segment_map *map;
5813 struct elf_segment_map *map_first;
5814 struct elf_segment_map **pointer_to_map;
5815 Elf_Internal_Phdr *segment;
5816 unsigned int i;
5817 unsigned int num_segments;
5818 bfd_boolean phdr_included = FALSE;
88967714 5819 bfd_boolean p_paddr_valid;
84d1d650
L
5820
5821 iehdr = elf_elfheader (ibfd);
5822
5823 map_first = NULL;
5824 pointer_to_map = &map_first;
5825
88967714
AM
5826 /* If all the segment p_paddr fields are zero, don't set
5827 map->p_paddr_valid. */
5828 p_paddr_valid = FALSE;
84d1d650 5829 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
5830 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5831 i < num_segments;
5832 i++, segment++)
5833 if (segment->p_paddr != 0)
5834 {
5835 p_paddr_valid = TRUE;
5836 break;
5837 }
5838
84d1d650
L
5839 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5840 i < num_segments;
5841 i++, segment++)
5842 {
5843 asection *section;
5844 unsigned int section_count;
5845 bfd_size_type amt;
5846 Elf_Internal_Shdr *this_hdr;
53020534 5847 asection *first_section = NULL;
c981028a 5848 asection *lowest_section = NULL;
84d1d650 5849
84d1d650
L
5850 /* Compute how many sections are in this segment. */
5851 for (section = ibfd->sections, section_count = 0;
5852 section != NULL;
5853 section = section->next)
5854 {
5855 this_hdr = &(elf_section_data(section)->this_hdr);
9a83a553
AM
5856 if (this_hdr->sh_size != 0
5857 && ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 5858 {
53020534 5859 if (!first_section)
c981028a
DJ
5860 first_section = lowest_section = section;
5861 if (section->lma < lowest_section->lma)
5862 lowest_section = section;
3271a814
NS
5863 section_count++;
5864 }
84d1d650
L
5865 }
5866
5867 /* Allocate a segment map big enough to contain
5868 all of the sections we have selected. */
5869 amt = sizeof (struct elf_segment_map);
5870 if (section_count != 0)
5871 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5872 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
5873 if (map == NULL)
5874 return FALSE;
5875
5876 /* Initialize the fields of the output segment map with the
5877 input segment. */
5878 map->next = NULL;
5879 map->p_type = segment->p_type;
5880 map->p_flags = segment->p_flags;
5881 map->p_flags_valid = 1;
5882 map->p_paddr = segment->p_paddr;
88967714 5883 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
5884 map->p_align = segment->p_align;
5885 map->p_align_valid = 1;
3271a814 5886 map->p_vaddr_offset = 0;
84d1d650 5887
9433b9b1 5888 if (map->p_type == PT_GNU_RELRO)
b10a8ae0
L
5889 {
5890 /* The PT_GNU_RELRO segment may contain the first a few
5891 bytes in the .got.plt section even if the whole .got.plt
5892 section isn't in the PT_GNU_RELRO segment. We won't
5893 change the size of the PT_GNU_RELRO segment. */
9433b9b1 5894 map->p_size = segment->p_memsz;
b10a8ae0
L
5895 map->p_size_valid = 1;
5896 }
5897
84d1d650
L
5898 /* Determine if this segment contains the ELF file header
5899 and if it contains the program headers themselves. */
5900 map->includes_filehdr = (segment->p_offset == 0
5901 && segment->p_filesz >= iehdr->e_ehsize);
5902
5903 map->includes_phdrs = 0;
5904 if (! phdr_included || segment->p_type != PT_LOAD)
5905 {
5906 map->includes_phdrs =
5907 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5908 && (segment->p_offset + segment->p_filesz
5909 >= ((bfd_vma) iehdr->e_phoff
5910 + iehdr->e_phnum * iehdr->e_phentsize)));
5911
5912 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5913 phdr_included = TRUE;
5914 }
5915
2b0bc088
NC
5916 if (map->includes_filehdr && first_section)
5917 /* We need to keep the space used by the headers fixed. */
5918 map->header_size = first_section->vma - segment->p_vaddr;
5919
88967714
AM
5920 if (!map->includes_phdrs
5921 && !map->includes_filehdr
5922 && map->p_paddr_valid)
3271a814 5923 /* There is some other padding before the first section. */
c981028a 5924 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
53020534 5925 - segment->p_paddr);
08a40648 5926
84d1d650
L
5927 if (section_count != 0)
5928 {
5929 unsigned int isec = 0;
5930
53020534 5931 for (section = first_section;
84d1d650
L
5932 section != NULL;
5933 section = section->next)
5934 {
5935 this_hdr = &(elf_section_data(section)->this_hdr);
9a83a553
AM
5936 if (this_hdr->sh_size != 0
5937 && ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
5938 {
5939 map->sections[isec++] = section->output_section;
5940 if (isec == section_count)
5941 break;
5942 }
84d1d650
L
5943 }
5944 }
5945
5946 map->count = section_count;
5947 *pointer_to_map = map;
5948 pointer_to_map = &map->next;
5949 }
5950
5951 elf_tdata (obfd)->segment_map = map_first;
5952 return TRUE;
5953}
5954
5955/* Copy private BFD data. This copies or rewrites ELF program header
5956 information. */
5957
5958static bfd_boolean
5959copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5960{
84d1d650
L
5961 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5962 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5963 return TRUE;
5964
5965 if (elf_tdata (ibfd)->phdr == NULL)
5966 return TRUE;
5967
5968 if (ibfd->xvec == obfd->xvec)
5969 {
cb3ff1e5
NC
5970 /* Check to see if any sections in the input BFD
5971 covered by ELF program header have changed. */
d55ce4e2 5972 Elf_Internal_Phdr *segment;
84d1d650
L
5973 asection *section, *osec;
5974 unsigned int i, num_segments;
5975 Elf_Internal_Shdr *this_hdr;
147d51c2
L
5976 const struct elf_backend_data *bed;
5977
5978 bed = get_elf_backend_data (ibfd);
5979
5980 /* Regenerate the segment map if p_paddr is set to 0. */
5981 if (bed->want_p_paddr_set_to_zero)
5982 goto rewrite;
84d1d650
L
5983
5984 /* Initialize the segment mark field. */
5985 for (section = obfd->sections; section != NULL;
5986 section = section->next)
5987 section->segment_mark = FALSE;
5988
5989 num_segments = elf_elfheader (ibfd)->e_phnum;
5990 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5991 i < num_segments;
5992 i++, segment++)
5993 {
5f6999aa
NC
5994 /* PR binutils/3535. The Solaris linker always sets the p_paddr
5995 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
5996 which severly confuses things, so always regenerate the segment
5997 map in this case. */
5998 if (segment->p_paddr == 0
5999 && segment->p_memsz == 0
6000 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6001 goto rewrite;
5f6999aa 6002
84d1d650
L
6003 for (section = ibfd->sections;
6004 section != NULL; section = section->next)
6005 {
6006 /* We mark the output section so that we know it comes
6007 from the input BFD. */
6008 osec = section->output_section;
6009 if (osec)
6010 osec->segment_mark = TRUE;
6011
6012 /* Check if this section is covered by the segment. */
6013 this_hdr = &(elf_section_data(section)->this_hdr);
9a83a553
AM
6014 if (this_hdr->sh_size != 0
6015 && ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6016 {
6017 /* FIXME: Check if its output section is changed or
6018 removed. What else do we need to check? */
6019 if (osec == NULL
6020 || section->flags != osec->flags
6021 || section->lma != osec->lma
6022 || section->vma != osec->vma
6023 || section->size != osec->size
6024 || section->rawsize != osec->rawsize
6025 || section->alignment_power != osec->alignment_power)
6026 goto rewrite;
6027 }
6028 }
6029 }
6030
cb3ff1e5 6031 /* Check to see if any output section do not come from the
84d1d650
L
6032 input BFD. */
6033 for (section = obfd->sections; section != NULL;
6034 section = section->next)
6035 {
6036 if (section->segment_mark == FALSE)
6037 goto rewrite;
6038 else
6039 section->segment_mark = FALSE;
6040 }
6041
6042 return copy_elf_program_header (ibfd, obfd);
6043 }
6044
6045rewrite:
6046 return rewrite_elf_program_header (ibfd, obfd);
6047}
6048
ccd2ec6a
L
6049/* Initialize private output section information from input section. */
6050
6051bfd_boolean
6052_bfd_elf_init_private_section_data (bfd *ibfd,
6053 asection *isec,
6054 bfd *obfd,
6055 asection *osec,
6056 struct bfd_link_info *link_info)
6057
6058{
6059 Elf_Internal_Shdr *ihdr, *ohdr;
dfa7b0b8 6060 bfd_boolean final_link = link_info != NULL && !link_info->relocatable;
ccd2ec6a
L
6061
6062 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6063 || obfd->xvec->flavour != bfd_target_elf_flavour)
6064 return TRUE;
6065
dfa7b0b8
AM
6066 /* For objcopy and relocatable link, don't copy the output ELF
6067 section type from input if the output BFD section flags have been
6068 set to something different. For a final link allow some flags
6069 that the linker clears to differ. */
42bb2e33 6070 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6071 && (osec->flags == isec->flags
6072 || (final_link
6073 && ((osec->flags ^ isec->flags)
6074 & ~ (SEC_LINK_ONCE | SEC_LINK_DUPLICATES)) == 0)))
42bb2e33 6075 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6076
6077 /* FIXME: Is this correct for all OS/PROC specific flags? */
6078 elf_section_flags (osec) |= (elf_section_flags (isec)
6079 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6080
6081 /* Set things up for objcopy and relocatable link. The output
6082 SHT_GROUP section will have its elf_next_in_group pointing back
6083 to the input group members. Ignore linker created group section.
6084 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 6085 if (!final_link)
ccd2ec6a
L
6086 {
6087 if (elf_sec_group (isec) == NULL
6088 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6089 {
6090 if (elf_section_flags (isec) & SHF_GROUP)
6091 elf_section_flags (osec) |= SHF_GROUP;
6092 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6093 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6094 }
6095 }
6096
6097 ihdr = &elf_section_data (isec)->this_hdr;
6098
6099 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6100 don't use the output section of the linked-to section since it
6101 may be NULL at this point. */
6102 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6103 {
6104 ohdr = &elf_section_data (osec)->this_hdr;
6105 ohdr->sh_flags |= SHF_LINK_ORDER;
6106 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6107 }
6108
6109 osec->use_rela_p = isec->use_rela_p;
6110
6111 return TRUE;
6112}
6113
252b5132
RH
6114/* Copy private section information. This copies over the entsize
6115 field, and sometimes the info field. */
6116
b34976b6 6117bfd_boolean
217aa764
AM
6118_bfd_elf_copy_private_section_data (bfd *ibfd,
6119 asection *isec,
6120 bfd *obfd,
6121 asection *osec)
252b5132
RH
6122{
6123 Elf_Internal_Shdr *ihdr, *ohdr;
6124
6125 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6126 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6127 return TRUE;
252b5132 6128
252b5132
RH
6129 ihdr = &elf_section_data (isec)->this_hdr;
6130 ohdr = &elf_section_data (osec)->this_hdr;
6131
6132 ohdr->sh_entsize = ihdr->sh_entsize;
6133
6134 if (ihdr->sh_type == SHT_SYMTAB
6135 || ihdr->sh_type == SHT_DYNSYM
6136 || ihdr->sh_type == SHT_GNU_verneed
6137 || ihdr->sh_type == SHT_GNU_verdef)
6138 ohdr->sh_info = ihdr->sh_info;
6139
ccd2ec6a
L
6140 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6141 NULL);
252b5132
RH
6142}
6143
d0bf826b
AM
6144/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
6145 necessary if we are removing either the SHT_GROUP section or any of
6146 the group member sections. DISCARDED is the value that a section's
6147 output_section has if the section will be discarded, NULL when this
6148 function is called from objcopy, bfd_abs_section_ptr when called
6149 from the linker. */
80fccad2
BW
6150
6151bfd_boolean
d0bf826b 6152_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 6153{
30288845
AM
6154 asection *isec;
6155
30288845 6156 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 6157 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
6158 {
6159 asection *first = elf_next_in_group (isec);
6160 asection *s = first;
d0bf826b
AM
6161 bfd_size_type removed = 0;
6162
30288845
AM
6163 while (s != NULL)
6164 {
415f38a6
AM
6165 /* If this member section is being output but the
6166 SHT_GROUP section is not, then clear the group info
6167 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
6168 if (s->output_section != discarded
6169 && isec->output_section == discarded)
30288845
AM
6170 {
6171 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6172 elf_group_name (s->output_section) = NULL;
6173 }
415f38a6
AM
6174 /* Conversely, if the member section is not being output
6175 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
6176 else if (s->output_section == discarded
6177 && isec->output_section != discarded)
6178 removed += 4;
30288845
AM
6179 s = elf_next_in_group (s);
6180 if (s == first)
6181 break;
6182 }
d0bf826b
AM
6183 if (removed != 0)
6184 {
6185 if (discarded != NULL)
6186 {
6187 /* If we've been called for ld -r, then we need to
6188 adjust the input section size. This function may
6189 be called multiple times, so save the original
6190 size. */
6191 if (isec->rawsize == 0)
6192 isec->rawsize = isec->size;
6193 isec->size = isec->rawsize - removed;
6194 }
6195 else
6196 {
6197 /* Adjust the output section size when called from
6198 objcopy. */
6199 isec->output_section->size -= removed;
6200 }
6201 }
30288845
AM
6202 }
6203
80fccad2
BW
6204 return TRUE;
6205}
6206
d0bf826b
AM
6207/* Copy private header information. */
6208
6209bfd_boolean
6210_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6211{
6212 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6213 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6214 return TRUE;
6215
6216 /* Copy over private BFD data if it has not already been copied.
6217 This must be done here, rather than in the copy_private_bfd_data
6218 entry point, because the latter is called after the section
6219 contents have been set, which means that the program headers have
6220 already been worked out. */
6221 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6222 {
6223 if (! copy_private_bfd_data (ibfd, obfd))
6224 return FALSE;
6225 }
6226
6227 return _bfd_elf_fixup_group_sections (ibfd, NULL);
6228}
6229
252b5132
RH
6230/* Copy private symbol information. If this symbol is in a section
6231 which we did not map into a BFD section, try to map the section
6232 index correctly. We use special macro definitions for the mapped
6233 section indices; these definitions are interpreted by the
6234 swap_out_syms function. */
6235
9ad5cbcf
AM
6236#define MAP_ONESYMTAB (SHN_HIOS + 1)
6237#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6238#define MAP_STRTAB (SHN_HIOS + 3)
6239#define MAP_SHSTRTAB (SHN_HIOS + 4)
6240#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6241
b34976b6 6242bfd_boolean
217aa764
AM
6243_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6244 asymbol *isymarg,
6245 bfd *obfd,
6246 asymbol *osymarg)
252b5132
RH
6247{
6248 elf_symbol_type *isym, *osym;
6249
6250 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6251 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6252 return TRUE;
252b5132
RH
6253
6254 isym = elf_symbol_from (ibfd, isymarg);
6255 osym = elf_symbol_from (obfd, osymarg);
6256
6257 if (isym != NULL
8424d8f5 6258 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6259 && osym != NULL
6260 && bfd_is_abs_section (isym->symbol.section))
6261 {
6262 unsigned int shndx;
6263
6264 shndx = isym->internal_elf_sym.st_shndx;
6265 if (shndx == elf_onesymtab (ibfd))
6266 shndx = MAP_ONESYMTAB;
6267 else if (shndx == elf_dynsymtab (ibfd))
6268 shndx = MAP_DYNSYMTAB;
6269 else if (shndx == elf_tdata (ibfd)->strtab_section)
6270 shndx = MAP_STRTAB;
6271 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6272 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6273 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6274 shndx = MAP_SYM_SHNDX;
252b5132
RH
6275 osym->internal_elf_sym.st_shndx = shndx;
6276 }
6277
b34976b6 6278 return TRUE;
252b5132
RH
6279}
6280
6281/* Swap out the symbols. */
6282
b34976b6 6283static bfd_boolean
217aa764
AM
6284swap_out_syms (bfd *abfd,
6285 struct bfd_strtab_hash **sttp,
6286 int relocatable_p)
252b5132 6287{
9c5bfbb7 6288 const struct elf_backend_data *bed;
079e9a2f
AM
6289 int symcount;
6290 asymbol **syms;
6291 struct bfd_strtab_hash *stt;
6292 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6293 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6294 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6295 bfd_byte *outbound_syms;
6296 bfd_byte *outbound_shndx;
079e9a2f
AM
6297 int idx;
6298 bfd_size_type amt;
174fd7f9 6299 bfd_boolean name_local_sections;
252b5132
RH
6300
6301 if (!elf_map_symbols (abfd))
b34976b6 6302 return FALSE;
252b5132 6303
c044fabd 6304 /* Dump out the symtabs. */
079e9a2f
AM
6305 stt = _bfd_elf_stringtab_init ();
6306 if (stt == NULL)
b34976b6 6307 return FALSE;
252b5132 6308
079e9a2f
AM
6309 bed = get_elf_backend_data (abfd);
6310 symcount = bfd_get_symcount (abfd);
6311 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6312 symtab_hdr->sh_type = SHT_SYMTAB;
6313 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6314 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6315 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
72de5009 6316 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6317
6318 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6319 symstrtab_hdr->sh_type = SHT_STRTAB;
6320
a50b1753
NC
6321 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6322 bed->s->sizeof_sym);
079e9a2f 6323 if (outbound_syms == NULL)
5ed6aba4
NC
6324 {
6325 _bfd_stringtab_free (stt);
6326 return FALSE;
6327 }
217aa764 6328 symtab_hdr->contents = outbound_syms;
252b5132 6329
9ad5cbcf
AM
6330 outbound_shndx = NULL;
6331 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6332 if (symtab_shndx_hdr->sh_name != 0)
6333 {
6334 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6335 outbound_shndx = (bfd_byte *)
6336 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6337 if (outbound_shndx == NULL)
5ed6aba4
NC
6338 {
6339 _bfd_stringtab_free (stt);
6340 return FALSE;
6341 }
6342
9ad5cbcf
AM
6343 symtab_shndx_hdr->contents = outbound_shndx;
6344 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6345 symtab_shndx_hdr->sh_size = amt;
6346 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6347 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6348 }
6349
589e6347 6350 /* Now generate the data (for "contents"). */
079e9a2f
AM
6351 {
6352 /* Fill in zeroth symbol and swap it out. */
6353 Elf_Internal_Sym sym;
6354 sym.st_name = 0;
6355 sym.st_value = 0;
6356 sym.st_size = 0;
6357 sym.st_info = 0;
6358 sym.st_other = 0;
6359 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6360 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6361 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6362 if (outbound_shndx != NULL)
6363 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6364 }
252b5132 6365
174fd7f9
RS
6366 name_local_sections
6367 = (bed->elf_backend_name_local_section_symbols
6368 && bed->elf_backend_name_local_section_symbols (abfd));
6369
079e9a2f
AM
6370 syms = bfd_get_outsymbols (abfd);
6371 for (idx = 0; idx < symcount; idx++)
252b5132 6372 {
252b5132 6373 Elf_Internal_Sym sym;
079e9a2f
AM
6374 bfd_vma value = syms[idx]->value;
6375 elf_symbol_type *type_ptr;
6376 flagword flags = syms[idx]->flags;
6377 int type;
252b5132 6378
174fd7f9
RS
6379 if (!name_local_sections
6380 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6381 {
6382 /* Local section symbols have no name. */
6383 sym.st_name = 0;
6384 }
6385 else
6386 {
6387 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6388 syms[idx]->name,
b34976b6 6389 TRUE, FALSE);
079e9a2f 6390 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6391 {
6392 _bfd_stringtab_free (stt);
6393 return FALSE;
6394 }
079e9a2f 6395 }
252b5132 6396
079e9a2f 6397 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6398
079e9a2f
AM
6399 if ((flags & BSF_SECTION_SYM) == 0
6400 && bfd_is_com_section (syms[idx]->section))
6401 {
6402 /* ELF common symbols put the alignment into the `value' field,
6403 and the size into the `size' field. This is backwards from
6404 how BFD handles it, so reverse it here. */
6405 sym.st_size = value;
6406 if (type_ptr == NULL
6407 || type_ptr->internal_elf_sym.st_value == 0)
6408 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6409 else
6410 sym.st_value = type_ptr->internal_elf_sym.st_value;
6411 sym.st_shndx = _bfd_elf_section_from_bfd_section
6412 (abfd, syms[idx]->section);
6413 }
6414 else
6415 {
6416 asection *sec = syms[idx]->section;
cb33740c 6417 unsigned int shndx;
252b5132 6418
079e9a2f
AM
6419 if (sec->output_section)
6420 {
6421 value += sec->output_offset;
6422 sec = sec->output_section;
6423 }
589e6347 6424
079e9a2f
AM
6425 /* Don't add in the section vma for relocatable output. */
6426 if (! relocatable_p)
6427 value += sec->vma;
6428 sym.st_value = value;
6429 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6430
6431 if (bfd_is_abs_section (sec)
6432 && type_ptr != NULL
6433 && type_ptr->internal_elf_sym.st_shndx != 0)
6434 {
6435 /* This symbol is in a real ELF section which we did
6436 not create as a BFD section. Undo the mapping done
6437 by copy_private_symbol_data. */
6438 shndx = type_ptr->internal_elf_sym.st_shndx;
6439 switch (shndx)
6440 {
6441 case MAP_ONESYMTAB:
6442 shndx = elf_onesymtab (abfd);
6443 break;
6444 case MAP_DYNSYMTAB:
6445 shndx = elf_dynsymtab (abfd);
6446 break;
6447 case MAP_STRTAB:
6448 shndx = elf_tdata (abfd)->strtab_section;
6449 break;
6450 case MAP_SHSTRTAB:
6451 shndx = elf_tdata (abfd)->shstrtab_section;
6452 break;
9ad5cbcf
AM
6453 case MAP_SYM_SHNDX:
6454 shndx = elf_tdata (abfd)->symtab_shndx_section;
6455 break;
079e9a2f
AM
6456 default:
6457 break;
6458 }
6459 }
6460 else
6461 {
6462 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6463
cb33740c 6464 if (shndx == SHN_BAD)
079e9a2f
AM
6465 {
6466 asection *sec2;
6467
6468 /* Writing this would be a hell of a lot easier if
6469 we had some decent documentation on bfd, and
6470 knew what to expect of the library, and what to
6471 demand of applications. For example, it
6472 appears that `objcopy' might not set the
6473 section of a symbol to be a section that is
6474 actually in the output file. */
6475 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6476 if (sec2 == NULL)
6477 {
6478 _bfd_error_handler (_("\
6479Unable to find equivalent output section for symbol '%s' from section '%s'"),
6480 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6481 sec->name);
811072d8 6482 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6483 _bfd_stringtab_free (stt);
589e6347
NC
6484 return FALSE;
6485 }
811072d8 6486
079e9a2f 6487 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6488 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6489 }
6490 }
252b5132 6491
079e9a2f
AM
6492 sym.st_shndx = shndx;
6493 }
252b5132 6494
13ae64f3
JJ
6495 if ((flags & BSF_THREAD_LOCAL) != 0)
6496 type = STT_TLS;
d8045f23
NC
6497 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6498 type = STT_GNU_IFUNC;
13ae64f3 6499 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6500 type = STT_FUNC;
6501 else if ((flags & BSF_OBJECT) != 0)
6502 type = STT_OBJECT;
d9352518
DB
6503 else if ((flags & BSF_RELC) != 0)
6504 type = STT_RELC;
6505 else if ((flags & BSF_SRELC) != 0)
6506 type = STT_SRELC;
079e9a2f
AM
6507 else
6508 type = STT_NOTYPE;
252b5132 6509
13ae64f3
JJ
6510 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6511 type = STT_TLS;
6512
589e6347 6513 /* Processor-specific types. */
079e9a2f
AM
6514 if (type_ptr != NULL
6515 && bed->elf_backend_get_symbol_type)
6516 type = ((*bed->elf_backend_get_symbol_type)
6517 (&type_ptr->internal_elf_sym, type));
252b5132 6518
079e9a2f
AM
6519 if (flags & BSF_SECTION_SYM)
6520 {
6521 if (flags & BSF_GLOBAL)
6522 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6523 else
6524 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6525 }
6526 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6527 {
504b7d20 6528#ifdef USE_STT_COMMON
0a40daed
MK
6529 if (type == STT_OBJECT)
6530 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6531 else
504b7d20 6532#endif
c91e322a 6533 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6534 }
079e9a2f
AM
6535 else if (bfd_is_und_section (syms[idx]->section))
6536 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6537 ? STB_WEAK
6538 : STB_GLOBAL),
6539 type);
6540 else if (flags & BSF_FILE)
6541 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6542 else
6543 {
6544 int bind = STB_LOCAL;
252b5132 6545
079e9a2f
AM
6546 if (flags & BSF_LOCAL)
6547 bind = STB_LOCAL;
3e7a7d11
NC
6548 else if (flags & BSF_GNU_UNIQUE)
6549 bind = STB_GNU_UNIQUE;
079e9a2f
AM
6550 else if (flags & BSF_WEAK)
6551 bind = STB_WEAK;
6552 else if (flags & BSF_GLOBAL)
6553 bind = STB_GLOBAL;
252b5132 6554
079e9a2f
AM
6555 sym.st_info = ELF_ST_INFO (bind, type);
6556 }
252b5132 6557
079e9a2f
AM
6558 if (type_ptr != NULL)
6559 sym.st_other = type_ptr->internal_elf_sym.st_other;
6560 else
6561 sym.st_other = 0;
252b5132 6562
9ad5cbcf 6563 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6564 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6565 if (outbound_shndx != NULL)
6566 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6567 }
252b5132 6568
079e9a2f
AM
6569 *sttp = stt;
6570 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6571 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6572
079e9a2f
AM
6573 symstrtab_hdr->sh_flags = 0;
6574 symstrtab_hdr->sh_addr = 0;
6575 symstrtab_hdr->sh_entsize = 0;
6576 symstrtab_hdr->sh_link = 0;
6577 symstrtab_hdr->sh_info = 0;
6578 symstrtab_hdr->sh_addralign = 1;
252b5132 6579
b34976b6 6580 return TRUE;
252b5132
RH
6581}
6582
6583/* Return the number of bytes required to hold the symtab vector.
6584
6585 Note that we base it on the count plus 1, since we will null terminate
6586 the vector allocated based on this size. However, the ELF symbol table
6587 always has a dummy entry as symbol #0, so it ends up even. */
6588
6589long
217aa764 6590_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6591{
6592 long symcount;
6593 long symtab_size;
6594 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6595
6596 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6597 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6598 if (symcount > 0)
6599 symtab_size -= sizeof (asymbol *);
252b5132
RH
6600
6601 return symtab_size;
6602}
6603
6604long
217aa764 6605_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6606{
6607 long symcount;
6608 long symtab_size;
6609 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6610
6611 if (elf_dynsymtab (abfd) == 0)
6612 {
6613 bfd_set_error (bfd_error_invalid_operation);
6614 return -1;
6615 }
6616
6617 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6618 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6619 if (symcount > 0)
6620 symtab_size -= sizeof (asymbol *);
252b5132
RH
6621
6622 return symtab_size;
6623}
6624
6625long
217aa764
AM
6626_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6627 sec_ptr asect)
252b5132
RH
6628{
6629 return (asect->reloc_count + 1) * sizeof (arelent *);
6630}
6631
6632/* Canonicalize the relocs. */
6633
6634long
217aa764
AM
6635_bfd_elf_canonicalize_reloc (bfd *abfd,
6636 sec_ptr section,
6637 arelent **relptr,
6638 asymbol **symbols)
252b5132
RH
6639{
6640 arelent *tblptr;
6641 unsigned int i;
9c5bfbb7 6642 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6643
b34976b6 6644 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6645 return -1;
6646
6647 tblptr = section->relocation;
6648 for (i = 0; i < section->reloc_count; i++)
6649 *relptr++ = tblptr++;
6650
6651 *relptr = NULL;
6652
6653 return section->reloc_count;
6654}
6655
6656long
6cee3f79 6657_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6658{
9c5bfbb7 6659 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6660 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6661
6662 if (symcount >= 0)
6663 bfd_get_symcount (abfd) = symcount;
6664 return symcount;
6665}
6666
6667long
217aa764
AM
6668_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6669 asymbol **allocation)
252b5132 6670{
9c5bfbb7 6671 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6672 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6673
6674 if (symcount >= 0)
6675 bfd_get_dynamic_symcount (abfd) = symcount;
6676 return symcount;
252b5132
RH
6677}
6678
8615f3f2
AM
6679/* Return the size required for the dynamic reloc entries. Any loadable
6680 section that was actually installed in the BFD, and has type SHT_REL
6681 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6682 dynamic reloc section. */
252b5132
RH
6683
6684long
217aa764 6685_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6686{
6687 long ret;
6688 asection *s;
6689
6690 if (elf_dynsymtab (abfd) == 0)
6691 {
6692 bfd_set_error (bfd_error_invalid_operation);
6693 return -1;
6694 }
6695
6696 ret = sizeof (arelent *);
6697 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 6698 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6699 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6700 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6701 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6702 * sizeof (arelent *));
6703
6704 return ret;
6705}
6706
8615f3f2
AM
6707/* Canonicalize the dynamic relocation entries. Note that we return the
6708 dynamic relocations as a single block, although they are actually
6709 associated with particular sections; the interface, which was
6710 designed for SunOS style shared libraries, expects that there is only
6711 one set of dynamic relocs. Any loadable section that was actually
6712 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6713 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6714
6715long
217aa764
AM
6716_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6717 arelent **storage,
6718 asymbol **syms)
252b5132 6719{
217aa764 6720 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6721 asection *s;
6722 long ret;
6723
6724 if (elf_dynsymtab (abfd) == 0)
6725 {
6726 bfd_set_error (bfd_error_invalid_operation);
6727 return -1;
6728 }
6729
6730 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6731 ret = 0;
6732 for (s = abfd->sections; s != NULL; s = s->next)
6733 {
266b05cf 6734 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6735 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6736 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6737 {
6738 arelent *p;
6739 long count, i;
6740
b34976b6 6741 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6742 return -1;
eea6121a 6743 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6744 p = s->relocation;
6745 for (i = 0; i < count; i++)
6746 *storage++ = p++;
6747 ret += count;
6748 }
6749 }
6750
6751 *storage = NULL;
6752
6753 return ret;
6754}
6755\f
6756/* Read in the version information. */
6757
b34976b6 6758bfd_boolean
fc0e6df6 6759_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6760{
6761 bfd_byte *contents = NULL;
fc0e6df6
PB
6762 unsigned int freeidx = 0;
6763
6764 if (elf_dynverref (abfd) != 0)
6765 {
6766 Elf_Internal_Shdr *hdr;
6767 Elf_External_Verneed *everneed;
6768 Elf_Internal_Verneed *iverneed;
6769 unsigned int i;
d0fb9a8d 6770 bfd_byte *contents_end;
fc0e6df6
PB
6771
6772 hdr = &elf_tdata (abfd)->dynverref_hdr;
6773
a50b1753
NC
6774 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
6775 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6776 if (elf_tdata (abfd)->verref == NULL)
6777 goto error_return;
6778
6779 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6780
a50b1753 6781 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
fc0e6df6 6782 if (contents == NULL)
d0fb9a8d
JJ
6783 {
6784error_return_verref:
6785 elf_tdata (abfd)->verref = NULL;
6786 elf_tdata (abfd)->cverrefs = 0;
6787 goto error_return;
6788 }
fc0e6df6
PB
6789 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6790 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6791 goto error_return_verref;
fc0e6df6 6792
d0fb9a8d
JJ
6793 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6794 goto error_return_verref;
6795
6796 BFD_ASSERT (sizeof (Elf_External_Verneed)
6797 == sizeof (Elf_External_Vernaux));
6798 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6799 everneed = (Elf_External_Verneed *) contents;
6800 iverneed = elf_tdata (abfd)->verref;
6801 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6802 {
6803 Elf_External_Vernaux *evernaux;
6804 Elf_Internal_Vernaux *ivernaux;
6805 unsigned int j;
6806
6807 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6808
6809 iverneed->vn_bfd = abfd;
6810
6811 iverneed->vn_filename =
6812 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6813 iverneed->vn_file);
6814 if (iverneed->vn_filename == NULL)
d0fb9a8d 6815 goto error_return_verref;
fc0e6df6 6816
d0fb9a8d
JJ
6817 if (iverneed->vn_cnt == 0)
6818 iverneed->vn_auxptr = NULL;
6819 else
6820 {
a50b1753
NC
6821 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
6822 bfd_alloc2 (abfd, iverneed->vn_cnt,
6823 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
6824 if (iverneed->vn_auxptr == NULL)
6825 goto error_return_verref;
6826 }
6827
6828 if (iverneed->vn_aux
6829 > (size_t) (contents_end - (bfd_byte *) everneed))
6830 goto error_return_verref;
fc0e6df6
PB
6831
6832 evernaux = ((Elf_External_Vernaux *)
6833 ((bfd_byte *) everneed + iverneed->vn_aux));
6834 ivernaux = iverneed->vn_auxptr;
6835 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6836 {
6837 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6838
6839 ivernaux->vna_nodename =
6840 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6841 ivernaux->vna_name);
6842 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6843 goto error_return_verref;
fc0e6df6
PB
6844
6845 if (j + 1 < iverneed->vn_cnt)
6846 ivernaux->vna_nextptr = ivernaux + 1;
6847 else
6848 ivernaux->vna_nextptr = NULL;
6849
d0fb9a8d
JJ
6850 if (ivernaux->vna_next
6851 > (size_t) (contents_end - (bfd_byte *) evernaux))
6852 goto error_return_verref;
6853
fc0e6df6
PB
6854 evernaux = ((Elf_External_Vernaux *)
6855 ((bfd_byte *) evernaux + ivernaux->vna_next));
6856
6857 if (ivernaux->vna_other > freeidx)
6858 freeidx = ivernaux->vna_other;
6859 }
6860
6861 if (i + 1 < hdr->sh_info)
6862 iverneed->vn_nextref = iverneed + 1;
6863 else
6864 iverneed->vn_nextref = NULL;
6865
d0fb9a8d
JJ
6866 if (iverneed->vn_next
6867 > (size_t) (contents_end - (bfd_byte *) everneed))
6868 goto error_return_verref;
6869
fc0e6df6
PB
6870 everneed = ((Elf_External_Verneed *)
6871 ((bfd_byte *) everneed + iverneed->vn_next));
6872 }
6873
6874 free (contents);
6875 contents = NULL;
6876 }
252b5132
RH
6877
6878 if (elf_dynverdef (abfd) != 0)
6879 {
6880 Elf_Internal_Shdr *hdr;
6881 Elf_External_Verdef *everdef;
6882 Elf_Internal_Verdef *iverdef;
f631889e
UD
6883 Elf_Internal_Verdef *iverdefarr;
6884 Elf_Internal_Verdef iverdefmem;
252b5132 6885 unsigned int i;
062e2358 6886 unsigned int maxidx;
d0fb9a8d 6887 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6888
6889 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6890
a50b1753 6891 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132
RH
6892 if (contents == NULL)
6893 goto error_return;
6894 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6895 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6896 goto error_return;
6897
d0fb9a8d
JJ
6898 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6899 goto error_return;
6900
6901 BFD_ASSERT (sizeof (Elf_External_Verdef)
6902 >= sizeof (Elf_External_Verdaux));
6903 contents_end_def = contents + hdr->sh_size
6904 - sizeof (Elf_External_Verdef);
6905 contents_end_aux = contents + hdr->sh_size
6906 - sizeof (Elf_External_Verdaux);
6907
f631889e
UD
6908 /* We know the number of entries in the section but not the maximum
6909 index. Therefore we have to run through all entries and find
6910 the maximum. */
252b5132 6911 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6912 maxidx = 0;
6913 for (i = 0; i < hdr->sh_info; ++i)
6914 {
6915 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6916
062e2358
AM
6917 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6918 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6919
d0fb9a8d
JJ
6920 if (iverdefmem.vd_next
6921 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6922 goto error_return;
6923
f631889e
UD
6924 everdef = ((Elf_External_Verdef *)
6925 ((bfd_byte *) everdef + iverdefmem.vd_next));
6926 }
6927
fc0e6df6
PB
6928 if (default_imported_symver)
6929 {
6930 if (freeidx > maxidx)
6931 maxidx = ++freeidx;
6932 else
6933 freeidx = ++maxidx;
6934 }
a50b1753
NC
6935 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
6936 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e
UD
6937 if (elf_tdata (abfd)->verdef == NULL)
6938 goto error_return;
6939
6940 elf_tdata (abfd)->cverdefs = maxidx;
6941
6942 everdef = (Elf_External_Verdef *) contents;
6943 iverdefarr = elf_tdata (abfd)->verdef;
6944 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6945 {
6946 Elf_External_Verdaux *everdaux;
6947 Elf_Internal_Verdaux *iverdaux;
6948 unsigned int j;
6949
f631889e
UD
6950 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6951
d0fb9a8d
JJ
6952 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6953 {
6954error_return_verdef:
6955 elf_tdata (abfd)->verdef = NULL;
6956 elf_tdata (abfd)->cverdefs = 0;
6957 goto error_return;
6958 }
6959
f631889e
UD
6960 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6961 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6962
6963 iverdef->vd_bfd = abfd;
6964
d0fb9a8d
JJ
6965 if (iverdef->vd_cnt == 0)
6966 iverdef->vd_auxptr = NULL;
6967 else
6968 {
a50b1753
NC
6969 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
6970 bfd_alloc2 (abfd, iverdef->vd_cnt,
6971 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
6972 if (iverdef->vd_auxptr == NULL)
6973 goto error_return_verdef;
6974 }
6975
6976 if (iverdef->vd_aux
6977 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6978 goto error_return_verdef;
252b5132
RH
6979
6980 everdaux = ((Elf_External_Verdaux *)
6981 ((bfd_byte *) everdef + iverdef->vd_aux));
6982 iverdaux = iverdef->vd_auxptr;
6983 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6984 {
6985 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6986
6987 iverdaux->vda_nodename =
6988 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6989 iverdaux->vda_name);
6990 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6991 goto error_return_verdef;
252b5132
RH
6992
6993 if (j + 1 < iverdef->vd_cnt)
6994 iverdaux->vda_nextptr = iverdaux + 1;
6995 else
6996 iverdaux->vda_nextptr = NULL;
6997
d0fb9a8d
JJ
6998 if (iverdaux->vda_next
6999 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
7000 goto error_return_verdef;
7001
252b5132
RH
7002 everdaux = ((Elf_External_Verdaux *)
7003 ((bfd_byte *) everdaux + iverdaux->vda_next));
7004 }
7005
d0fb9a8d
JJ
7006 if (iverdef->vd_cnt)
7007 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 7008
d0fb9a8d 7009 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
7010 iverdef->vd_nextdef = iverdef + 1;
7011 else
7012 iverdef->vd_nextdef = NULL;
7013
7014 everdef = ((Elf_External_Verdef *)
7015 ((bfd_byte *) everdef + iverdef->vd_next));
7016 }
7017
7018 free (contents);
7019 contents = NULL;
7020 }
fc0e6df6 7021 else if (default_imported_symver)
252b5132 7022 {
fc0e6df6
PB
7023 if (freeidx < 3)
7024 freeidx = 3;
7025 else
7026 freeidx++;
252b5132 7027
a50b1753
NC
7028 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7029 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 7030 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
7031 goto error_return;
7032
fc0e6df6
PB
7033 elf_tdata (abfd)->cverdefs = freeidx;
7034 }
252b5132 7035
fc0e6df6
PB
7036 /* Create a default version based on the soname. */
7037 if (default_imported_symver)
7038 {
7039 Elf_Internal_Verdef *iverdef;
7040 Elf_Internal_Verdaux *iverdaux;
252b5132 7041
fc0e6df6 7042 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 7043
fc0e6df6
PB
7044 iverdef->vd_version = VER_DEF_CURRENT;
7045 iverdef->vd_flags = 0;
7046 iverdef->vd_ndx = freeidx;
7047 iverdef->vd_cnt = 1;
252b5132 7048
fc0e6df6 7049 iverdef->vd_bfd = abfd;
252b5132 7050
fc0e6df6
PB
7051 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
7052 if (iverdef->vd_nodename == NULL)
d0fb9a8d 7053 goto error_return_verdef;
fc0e6df6 7054 iverdef->vd_nextdef = NULL;
a50b1753
NC
7055 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7056 bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7057 if (iverdef->vd_auxptr == NULL)
7058 goto error_return_verdef;
252b5132 7059
fc0e6df6
PB
7060 iverdaux = iverdef->vd_auxptr;
7061 iverdaux->vda_nodename = iverdef->vd_nodename;
7062 iverdaux->vda_nextptr = NULL;
252b5132
RH
7063 }
7064
b34976b6 7065 return TRUE;
252b5132
RH
7066
7067 error_return:
5ed6aba4 7068 if (contents != NULL)
252b5132 7069 free (contents);
b34976b6 7070 return FALSE;
252b5132
RH
7071}
7072\f
7073asymbol *
217aa764 7074_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7075{
7076 elf_symbol_type *newsym;
dc810e39 7077 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 7078
a50b1753 7079 newsym = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132
RH
7080 if (!newsym)
7081 return NULL;
7082 else
7083 {
7084 newsym->symbol.the_bfd = abfd;
7085 return &newsym->symbol;
7086 }
7087}
7088
7089void
217aa764
AM
7090_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7091 asymbol *symbol,
7092 symbol_info *ret)
252b5132
RH
7093{
7094 bfd_symbol_info (symbol, ret);
7095}
7096
7097/* Return whether a symbol name implies a local symbol. Most targets
7098 use this function for the is_local_label_name entry point, but some
7099 override it. */
7100
b34976b6 7101bfd_boolean
217aa764
AM
7102_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7103 const char *name)
252b5132
RH
7104{
7105 /* Normal local symbols start with ``.L''. */
7106 if (name[0] == '.' && name[1] == 'L')
b34976b6 7107 return TRUE;
252b5132
RH
7108
7109 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7110 DWARF debugging symbols starting with ``..''. */
7111 if (name[0] == '.' && name[1] == '.')
b34976b6 7112 return TRUE;
252b5132
RH
7113
7114 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7115 emitting DWARF debugging output. I suspect this is actually a
7116 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7117 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7118 underscore to be emitted on some ELF targets). For ease of use,
7119 we treat such symbols as local. */
7120 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7121 return TRUE;
252b5132 7122
b34976b6 7123 return FALSE;
252b5132
RH
7124}
7125
7126alent *
217aa764
AM
7127_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7128 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7129{
7130 abort ();
7131 return NULL;
7132}
7133
b34976b6 7134bfd_boolean
217aa764
AM
7135_bfd_elf_set_arch_mach (bfd *abfd,
7136 enum bfd_architecture arch,
7137 unsigned long machine)
252b5132
RH
7138{
7139 /* If this isn't the right architecture for this backend, and this
7140 isn't the generic backend, fail. */
7141 if (arch != get_elf_backend_data (abfd)->arch
7142 && arch != bfd_arch_unknown
7143 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7144 return FALSE;
252b5132
RH
7145
7146 return bfd_default_set_arch_mach (abfd, arch, machine);
7147}
7148
d1fad7c6
NC
7149/* Find the function to a particular section and offset,
7150 for error reporting. */
252b5132 7151
b34976b6 7152static bfd_boolean
b9d678e0 7153elf_find_function (bfd *abfd,
217aa764
AM
7154 asection *section,
7155 asymbol **symbols,
7156 bfd_vma offset,
7157 const char **filename_ptr,
7158 const char **functionname_ptr)
252b5132 7159{
252b5132 7160 const char *filename;
57426232 7161 asymbol *func, *file;
252b5132
RH
7162 bfd_vma low_func;
7163 asymbol **p;
57426232
JB
7164 /* ??? Given multiple file symbols, it is impossible to reliably
7165 choose the right file name for global symbols. File symbols are
7166 local symbols, and thus all file symbols must sort before any
7167 global symbols. The ELF spec may be interpreted to say that a
7168 file symbol must sort before other local symbols, but currently
7169 ld -r doesn't do this. So, for ld -r output, it is possible to
7170 make a better choice of file name for local symbols by ignoring
7171 file symbols appearing after a given local symbol. */
7172 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
b9d678e0 7173 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7174
252b5132
RH
7175 filename = NULL;
7176 func = NULL;
57426232 7177 file = NULL;
252b5132 7178 low_func = 0;
57426232 7179 state = nothing_seen;
252b5132
RH
7180
7181 for (p = symbols; *p != NULL; p++)
7182 {
7183 elf_symbol_type *q;
b9d678e0 7184 unsigned int type;
252b5132
RH
7185
7186 q = (elf_symbol_type *) *p;
7187
b9d678e0
L
7188 type = ELF_ST_TYPE (q->internal_elf_sym.st_info);
7189 switch (type)
252b5132 7190 {
252b5132 7191 case STT_FILE:
57426232
JB
7192 file = &q->symbol;
7193 if (state == symbol_seen)
7194 state = file_after_symbol_seen;
7195 continue;
b9d678e0
L
7196 default:
7197 if (!bed->is_function_type (type))
7198 break;
252b5132 7199 case STT_NOTYPE:
6b40fcba 7200 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7201 && q->symbol.value >= low_func
7202 && q->symbol.value <= offset)
7203 {
7204 func = (asymbol *) q;
7205 low_func = q->symbol.value;
a1923858
AM
7206 filename = NULL;
7207 if (file != NULL
7208 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7209 || state != file_after_symbol_seen))
57426232 7210 filename = bfd_asymbol_name (file);
252b5132
RH
7211 }
7212 break;
7213 }
57426232
JB
7214 if (state == nothing_seen)
7215 state = symbol_seen;
252b5132
RH
7216 }
7217
7218 if (func == NULL)
b34976b6 7219 return FALSE;
252b5132 7220
d1fad7c6
NC
7221 if (filename_ptr)
7222 *filename_ptr = filename;
7223 if (functionname_ptr)
7224 *functionname_ptr = bfd_asymbol_name (func);
7225
b34976b6 7226 return TRUE;
d1fad7c6
NC
7227}
7228
7229/* Find the nearest line to a particular section and offset,
7230 for error reporting. */
7231
b34976b6 7232bfd_boolean
217aa764
AM
7233_bfd_elf_find_nearest_line (bfd *abfd,
7234 asection *section,
7235 asymbol **symbols,
7236 bfd_vma offset,
7237 const char **filename_ptr,
7238 const char **functionname_ptr,
7239 unsigned int *line_ptr)
d1fad7c6 7240{
b34976b6 7241 bfd_boolean found;
d1fad7c6
NC
7242
7243 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7244 filename_ptr, functionname_ptr,
7245 line_ptr))
d1fad7c6
NC
7246 {
7247 if (!*functionname_ptr)
4e8a9624
AM
7248 elf_find_function (abfd, section, symbols, offset,
7249 *filename_ptr ? NULL : filename_ptr,
7250 functionname_ptr);
7251
b34976b6 7252 return TRUE;
d1fad7c6
NC
7253 }
7254
7255 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7256 filename_ptr, functionname_ptr,
7257 line_ptr, 0,
7258 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7259 {
7260 if (!*functionname_ptr)
4e8a9624
AM
7261 elf_find_function (abfd, section, symbols, offset,
7262 *filename_ptr ? NULL : filename_ptr,
7263 functionname_ptr);
7264
b34976b6 7265 return TRUE;
d1fad7c6
NC
7266 }
7267
7268 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7269 &found, filename_ptr,
7270 functionname_ptr, line_ptr,
7271 &elf_tdata (abfd)->line_info))
b34976b6 7272 return FALSE;
dc43ada5 7273 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7274 return TRUE;
d1fad7c6
NC
7275
7276 if (symbols == NULL)
b34976b6 7277 return FALSE;
d1fad7c6
NC
7278
7279 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7280 filename_ptr, functionname_ptr))
b34976b6 7281 return FALSE;
d1fad7c6 7282
252b5132 7283 *line_ptr = 0;
b34976b6 7284 return TRUE;
252b5132
RH
7285}
7286
5420f73d
L
7287/* Find the line for a symbol. */
7288
7289bfd_boolean
7290_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7291 const char **filename_ptr, unsigned int *line_ptr)
7292{
7293 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7294 filename_ptr, line_ptr, 0,
7295 &elf_tdata (abfd)->dwarf2_find_line_info);
7296}
7297
4ab527b0
FF
7298/* After a call to bfd_find_nearest_line, successive calls to
7299 bfd_find_inliner_info can be used to get source information about
7300 each level of function inlining that terminated at the address
7301 passed to bfd_find_nearest_line. Currently this is only supported
7302 for DWARF2 with appropriate DWARF3 extensions. */
7303
7304bfd_boolean
7305_bfd_elf_find_inliner_info (bfd *abfd,
7306 const char **filename_ptr,
7307 const char **functionname_ptr,
7308 unsigned int *line_ptr)
7309{
7310 bfd_boolean found;
7311 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7312 functionname_ptr, line_ptr,
7313 & elf_tdata (abfd)->dwarf2_find_line_info);
7314 return found;
7315}
7316
252b5132 7317int
a6b96beb 7318_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7319{
8ded5a0f
AM
7320 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7321 int ret = bed->s->sizeof_ehdr;
252b5132 7322
a6b96beb 7323 if (!info->relocatable)
8ded5a0f 7324 {
62d7a5f6 7325 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7326
62d7a5f6
AM
7327 if (phdr_size == (bfd_size_type) -1)
7328 {
7329 struct elf_segment_map *m;
7330
7331 phdr_size = 0;
7332 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7333 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7334
62d7a5f6
AM
7335 if (phdr_size == 0)
7336 phdr_size = get_program_header_size (abfd, info);
7337 }
8ded5a0f
AM
7338
7339 elf_tdata (abfd)->program_header_size = phdr_size;
7340 ret += phdr_size;
7341 }
7342
252b5132
RH
7343 return ret;
7344}
7345
b34976b6 7346bfd_boolean
217aa764
AM
7347_bfd_elf_set_section_contents (bfd *abfd,
7348 sec_ptr section,
0f867abe 7349 const void *location,
217aa764
AM
7350 file_ptr offset,
7351 bfd_size_type count)
252b5132
RH
7352{
7353 Elf_Internal_Shdr *hdr;
dc810e39 7354 bfd_signed_vma pos;
252b5132
RH
7355
7356 if (! abfd->output_has_begun
217aa764 7357 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7358 return FALSE;
252b5132
RH
7359
7360 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7361 pos = hdr->sh_offset + offset;
7362 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7363 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7364 return FALSE;
252b5132 7365
b34976b6 7366 return TRUE;
252b5132
RH
7367}
7368
7369void
217aa764
AM
7370_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7371 arelent *cache_ptr ATTRIBUTE_UNUSED,
7372 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7373{
7374 abort ();
7375}
7376
252b5132
RH
7377/* Try to convert a non-ELF reloc into an ELF one. */
7378
b34976b6 7379bfd_boolean
217aa764 7380_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7381{
c044fabd 7382 /* Check whether we really have an ELF howto. */
252b5132
RH
7383
7384 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7385 {
7386 bfd_reloc_code_real_type code;
7387 reloc_howto_type *howto;
7388
7389 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7390 equivalent ELF reloc. */
252b5132
RH
7391
7392 if (areloc->howto->pc_relative)
7393 {
7394 switch (areloc->howto->bitsize)
7395 {
7396 case 8:
7397 code = BFD_RELOC_8_PCREL;
7398 break;
7399 case 12:
7400 code = BFD_RELOC_12_PCREL;
7401 break;
7402 case 16:
7403 code = BFD_RELOC_16_PCREL;
7404 break;
7405 case 24:
7406 code = BFD_RELOC_24_PCREL;
7407 break;
7408 case 32:
7409 code = BFD_RELOC_32_PCREL;
7410 break;
7411 case 64:
7412 code = BFD_RELOC_64_PCREL;
7413 break;
7414 default:
7415 goto fail;
7416 }
7417
7418 howto = bfd_reloc_type_lookup (abfd, code);
7419
7420 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7421 {
7422 if (howto->pcrel_offset)
7423 areloc->addend += areloc->address;
7424 else
7425 areloc->addend -= areloc->address; /* addend is unsigned!! */
7426 }
7427 }
7428 else
7429 {
7430 switch (areloc->howto->bitsize)
7431 {
7432 case 8:
7433 code = BFD_RELOC_8;
7434 break;
7435 case 14:
7436 code = BFD_RELOC_14;
7437 break;
7438 case 16:
7439 code = BFD_RELOC_16;
7440 break;
7441 case 26:
7442 code = BFD_RELOC_26;
7443 break;
7444 case 32:
7445 code = BFD_RELOC_32;
7446 break;
7447 case 64:
7448 code = BFD_RELOC_64;
7449 break;
7450 default:
7451 goto fail;
7452 }
7453
7454 howto = bfd_reloc_type_lookup (abfd, code);
7455 }
7456
7457 if (howto)
7458 areloc->howto = howto;
7459 else
7460 goto fail;
7461 }
7462
b34976b6 7463 return TRUE;
252b5132
RH
7464
7465 fail:
7466 (*_bfd_error_handler)
d003868e
AM
7467 (_("%B: unsupported relocation type %s"),
7468 abfd, areloc->howto->name);
252b5132 7469 bfd_set_error (bfd_error_bad_value);
b34976b6 7470 return FALSE;
252b5132
RH
7471}
7472
b34976b6 7473bfd_boolean
217aa764 7474_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7475{
7476 if (bfd_get_format (abfd) == bfd_object)
7477 {
b25e3d87 7478 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7479 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7480 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7481 }
7482
7483 return _bfd_generic_close_and_cleanup (abfd);
7484}
7485
7486/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7487 in the relocation's offset. Thus we cannot allow any sort of sanity
7488 range-checking to interfere. There is nothing else to do in processing
7489 this reloc. */
7490
7491bfd_reloc_status_type
217aa764
AM
7492_bfd_elf_rel_vtable_reloc_fn
7493 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7494 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7495 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7496 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7497{
7498 return bfd_reloc_ok;
7499}
252b5132
RH
7500\f
7501/* Elf core file support. Much of this only works on native
7502 toolchains, since we rely on knowing the
7503 machine-dependent procfs structure in order to pick
c044fabd 7504 out details about the corefile. */
252b5132
RH
7505
7506#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
7507/* Needed for new procfs interface on sparc-solaris. */
7508# define _STRUCTURED_PROC 1
252b5132
RH
7509# include <sys/procfs.h>
7510#endif
7511
c044fabd 7512/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7513
7514static int
217aa764 7515elfcore_make_pid (bfd *abfd)
252b5132
RH
7516{
7517 return ((elf_tdata (abfd)->core_lwpid << 16)
7518 + (elf_tdata (abfd)->core_pid));
7519}
7520
252b5132
RH
7521/* If there isn't a section called NAME, make one, using
7522 data from SECT. Note, this function will generate a
7523 reference to NAME, so you shouldn't deallocate or
c044fabd 7524 overwrite it. */
252b5132 7525
b34976b6 7526static bfd_boolean
217aa764 7527elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7528{
c044fabd 7529 asection *sect2;
252b5132
RH
7530
7531 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7532 return TRUE;
252b5132 7533
117ed4f8 7534 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7535 if (sect2 == NULL)
b34976b6 7536 return FALSE;
252b5132 7537
eea6121a 7538 sect2->size = sect->size;
252b5132 7539 sect2->filepos = sect->filepos;
252b5132 7540 sect2->alignment_power = sect->alignment_power;
b34976b6 7541 return TRUE;
252b5132
RH
7542}
7543
bb0082d6
AM
7544/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7545 actually creates up to two pseudosections:
7546 - For the single-threaded case, a section named NAME, unless
7547 such a section already exists.
7548 - For the multi-threaded case, a section named "NAME/PID", where
7549 PID is elfcore_make_pid (abfd).
7550 Both pseudosections have identical contents. */
b34976b6 7551bfd_boolean
217aa764
AM
7552_bfd_elfcore_make_pseudosection (bfd *abfd,
7553 char *name,
7554 size_t size,
7555 ufile_ptr filepos)
bb0082d6
AM
7556{
7557 char buf[100];
7558 char *threaded_name;
d4c88bbb 7559 size_t len;
bb0082d6
AM
7560 asection *sect;
7561
7562 /* Build the section name. */
7563
7564 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7565 len = strlen (buf) + 1;
a50b1753 7566 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 7567 if (threaded_name == NULL)
b34976b6 7568 return FALSE;
d4c88bbb 7569 memcpy (threaded_name, buf, len);
bb0082d6 7570
117ed4f8
AM
7571 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7572 SEC_HAS_CONTENTS);
bb0082d6 7573 if (sect == NULL)
b34976b6 7574 return FALSE;
eea6121a 7575 sect->size = size;
bb0082d6 7576 sect->filepos = filepos;
bb0082d6
AM
7577 sect->alignment_power = 2;
7578
936e320b 7579 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7580}
7581
252b5132 7582/* prstatus_t exists on:
4a938328 7583 solaris 2.5+
252b5132
RH
7584 linux 2.[01] + glibc
7585 unixware 4.2
7586*/
7587
7588#if defined (HAVE_PRSTATUS_T)
a7b97311 7589
b34976b6 7590static bfd_boolean
217aa764 7591elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7592{
eea6121a 7593 size_t size;
7ee38065 7594 int offset;
252b5132 7595
4a938328
MS
7596 if (note->descsz == sizeof (prstatus_t))
7597 {
7598 prstatus_t prstat;
252b5132 7599
eea6121a 7600 size = sizeof (prstat.pr_reg);
7ee38065 7601 offset = offsetof (prstatus_t, pr_reg);
4a938328 7602 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7603
fa49d224
NC
7604 /* Do not overwrite the core signal if it
7605 has already been set by another thread. */
7606 if (elf_tdata (abfd)->core_signal == 0)
7607 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7608 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7609
4a938328
MS
7610 /* pr_who exists on:
7611 solaris 2.5+
7612 unixware 4.2
7613 pr_who doesn't exist on:
7614 linux 2.[01]
7615 */
252b5132 7616#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7617 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7618#endif
4a938328 7619 }
7ee38065 7620#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7621 else if (note->descsz == sizeof (prstatus32_t))
7622 {
7623 /* 64-bit host, 32-bit corefile */
7624 prstatus32_t prstat;
7625
eea6121a 7626 size = sizeof (prstat.pr_reg);
7ee38065 7627 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7628 memcpy (&prstat, note->descdata, sizeof (prstat));
7629
fa49d224
NC
7630 /* Do not overwrite the core signal if it
7631 has already been set by another thread. */
7632 if (elf_tdata (abfd)->core_signal == 0)
7633 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7634 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7635
7636 /* pr_who exists on:
7637 solaris 2.5+
7638 unixware 4.2
7639 pr_who doesn't exist on:
7640 linux 2.[01]
7641 */
7ee38065 7642#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7643 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7644#endif
7645 }
7ee38065 7646#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7647 else
7648 {
7649 /* Fail - we don't know how to handle any other
7650 note size (ie. data object type). */
b34976b6 7651 return TRUE;
4a938328 7652 }
252b5132 7653
bb0082d6 7654 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7655 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7656 size, note->descpos + offset);
252b5132
RH
7657}
7658#endif /* defined (HAVE_PRSTATUS_T) */
7659
bb0082d6 7660/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7661static bfd_boolean
217aa764
AM
7662elfcore_make_note_pseudosection (bfd *abfd,
7663 char *name,
7664 Elf_Internal_Note *note)
252b5132 7665{
936e320b
AM
7666 return _bfd_elfcore_make_pseudosection (abfd, name,
7667 note->descsz, note->descpos);
252b5132
RH
7668}
7669
ff08c6bb
JB
7670/* There isn't a consistent prfpregset_t across platforms,
7671 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7672 data structure apart. */
7673
b34976b6 7674static bfd_boolean
217aa764 7675elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7676{
7677 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7678}
7679
ff08c6bb 7680/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 7681 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 7682 literally. */
c044fabd 7683
b34976b6 7684static bfd_boolean
217aa764 7685elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7686{
7687 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7688}
7689
4339cae0
L
7690/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
7691 with a note type of NT_X86_XSTATE. Just include the whole note's
7692 contents literally. */
7693
7694static bfd_boolean
7695elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
7696{
7697 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
7698}
7699
97753bd5
AM
7700static bfd_boolean
7701elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
7702{
7703 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
7704}
7705
89eeb0bc
LM
7706static bfd_boolean
7707elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
7708{
7709 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
7710}
97753bd5 7711
0675e188
UW
7712static bfd_boolean
7713elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
7714{
7715 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
7716}
7717
d7eeb400
MS
7718static bfd_boolean
7719elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
7720{
7721 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
7722}
7723
7724static bfd_boolean
7725elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
7726{
7727 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
7728}
7729
7730static bfd_boolean
7731elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
7732{
7733 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
7734}
7735
7736static bfd_boolean
7737elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
7738{
7739 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
7740}
7741
7742static bfd_boolean
7743elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
7744{
7745 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
7746}
7747
252b5132 7748#if defined (HAVE_PRPSINFO_T)
4a938328 7749typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7750#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7751typedef prpsinfo32_t elfcore_psinfo32_t;
7752#endif
252b5132
RH
7753#endif
7754
7755#if defined (HAVE_PSINFO_T)
4a938328 7756typedef psinfo_t elfcore_psinfo_t;
7ee38065 7757#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7758typedef psinfo32_t elfcore_psinfo32_t;
7759#endif
252b5132
RH
7760#endif
7761
252b5132
RH
7762/* return a malloc'ed copy of a string at START which is at
7763 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7764 the copy will always have a terminating '\0'. */
252b5132 7765
936e320b 7766char *
217aa764 7767_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7768{
dc810e39 7769 char *dups;
a50b1753 7770 char *end = (char *) memchr (start, '\0', max);
dc810e39 7771 size_t len;
252b5132
RH
7772
7773 if (end == NULL)
7774 len = max;
7775 else
7776 len = end - start;
7777
a50b1753 7778 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 7779 if (dups == NULL)
252b5132
RH
7780 return NULL;
7781
dc810e39
AM
7782 memcpy (dups, start, len);
7783 dups[len] = '\0';
252b5132 7784
dc810e39 7785 return dups;
252b5132
RH
7786}
7787
bb0082d6 7788#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7789static bfd_boolean
217aa764 7790elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7791{
4a938328
MS
7792 if (note->descsz == sizeof (elfcore_psinfo_t))
7793 {
7794 elfcore_psinfo_t psinfo;
252b5132 7795
7ee38065 7796 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7797
4a938328 7798 elf_tdata (abfd)->core_program
936e320b
AM
7799 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7800 sizeof (psinfo.pr_fname));
252b5132 7801
4a938328 7802 elf_tdata (abfd)->core_command
936e320b
AM
7803 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7804 sizeof (psinfo.pr_psargs));
4a938328 7805 }
7ee38065 7806#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7807 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7808 {
7809 /* 64-bit host, 32-bit corefile */
7810 elfcore_psinfo32_t psinfo;
7811
7ee38065 7812 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7813
4a938328 7814 elf_tdata (abfd)->core_program
936e320b
AM
7815 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7816 sizeof (psinfo.pr_fname));
4a938328
MS
7817
7818 elf_tdata (abfd)->core_command
936e320b
AM
7819 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7820 sizeof (psinfo.pr_psargs));
4a938328
MS
7821 }
7822#endif
7823
7824 else
7825 {
7826 /* Fail - we don't know how to handle any other
7827 note size (ie. data object type). */
b34976b6 7828 return TRUE;
4a938328 7829 }
252b5132
RH
7830
7831 /* Note that for some reason, a spurious space is tacked
7832 onto the end of the args in some (at least one anyway)
c044fabd 7833 implementations, so strip it off if it exists. */
252b5132
RH
7834
7835 {
c044fabd 7836 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7837 int n = strlen (command);
7838
7839 if (0 < n && command[n - 1] == ' ')
7840 command[n - 1] = '\0';
7841 }
7842
b34976b6 7843 return TRUE;
252b5132
RH
7844}
7845#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7846
252b5132 7847#if defined (HAVE_PSTATUS_T)
b34976b6 7848static bfd_boolean
217aa764 7849elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7850{
f572a39d
AM
7851 if (note->descsz == sizeof (pstatus_t)
7852#if defined (HAVE_PXSTATUS_T)
7853 || note->descsz == sizeof (pxstatus_t)
7854#endif
7855 )
4a938328
MS
7856 {
7857 pstatus_t pstat;
252b5132 7858
4a938328 7859 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7860
4a938328
MS
7861 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7862 }
7ee38065 7863#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7864 else if (note->descsz == sizeof (pstatus32_t))
7865 {
7866 /* 64-bit host, 32-bit corefile */
7867 pstatus32_t pstat;
252b5132 7868
4a938328 7869 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7870
4a938328
MS
7871 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7872 }
7873#endif
252b5132
RH
7874 /* Could grab some more details from the "representative"
7875 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7876 NT_LWPSTATUS note, presumably. */
252b5132 7877
b34976b6 7878 return TRUE;
252b5132
RH
7879}
7880#endif /* defined (HAVE_PSTATUS_T) */
7881
252b5132 7882#if defined (HAVE_LWPSTATUS_T)
b34976b6 7883static bfd_boolean
217aa764 7884elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7885{
7886 lwpstatus_t lwpstat;
7887 char buf[100];
c044fabd 7888 char *name;
d4c88bbb 7889 size_t len;
c044fabd 7890 asection *sect;
252b5132 7891
f572a39d
AM
7892 if (note->descsz != sizeof (lwpstat)
7893#if defined (HAVE_LWPXSTATUS_T)
7894 && note->descsz != sizeof (lwpxstatus_t)
7895#endif
7896 )
b34976b6 7897 return TRUE;
252b5132
RH
7898
7899 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7900
7901 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
a1504221
JB
7902 /* Do not overwrite the core signal if it has already been set by
7903 another thread. */
7904 if (elf_tdata (abfd)->core_signal == 0)
7905 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
252b5132 7906
c044fabd 7907 /* Make a ".reg/999" section. */
252b5132
RH
7908
7909 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7910 len = strlen (buf) + 1;
217aa764 7911 name = bfd_alloc (abfd, len);
252b5132 7912 if (name == NULL)
b34976b6 7913 return FALSE;
d4c88bbb 7914 memcpy (name, buf, len);
252b5132 7915
117ed4f8 7916 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7917 if (sect == NULL)
b34976b6 7918 return FALSE;
252b5132
RH
7919
7920#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7921 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7922 sect->filepos = note->descpos
7923 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7924#endif
7925
7926#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7927 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7928 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7929#endif
7930
252b5132
RH
7931 sect->alignment_power = 2;
7932
7933 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7934 return FALSE;
252b5132
RH
7935
7936 /* Make a ".reg2/999" section */
7937
7938 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7939 len = strlen (buf) + 1;
217aa764 7940 name = bfd_alloc (abfd, len);
252b5132 7941 if (name == NULL)
b34976b6 7942 return FALSE;
d4c88bbb 7943 memcpy (name, buf, len);
252b5132 7944
117ed4f8 7945 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7946 if (sect == NULL)
b34976b6 7947 return FALSE;
252b5132
RH
7948
7949#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7950 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7951 sect->filepos = note->descpos
7952 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7953#endif
7954
7955#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7956 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7957 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7958#endif
7959
252b5132
RH
7960 sect->alignment_power = 2;
7961
936e320b 7962 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7963}
7964#endif /* defined (HAVE_LWPSTATUS_T) */
7965
b34976b6 7966static bfd_boolean
217aa764 7967elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7968{
7969 char buf[30];
c044fabd 7970 char *name;
d4c88bbb 7971 size_t len;
c044fabd 7972 asection *sect;
4a6636fb
PA
7973 int type;
7974 int is_active_thread;
7975 bfd_vma base_addr;
16e9c715 7976
4a6636fb 7977 if (note->descsz < 728)
b34976b6 7978 return TRUE;
16e9c715 7979
4a6636fb
PA
7980 if (! CONST_STRNEQ (note->namedata, "win32"))
7981 return TRUE;
7982
7983 type = bfd_get_32 (abfd, note->descdata);
c044fabd 7984
4a6636fb 7985 switch (type)
16e9c715 7986 {
4a6636fb 7987 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 7988 /* FIXME: need to add ->core_command. */
4a6636fb
PA
7989 /* process_info.pid */
7990 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
7991 /* process_info.signal */
7992 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 7993 break;
16e9c715 7994
4a6636fb 7995 case 2 /* NOTE_INFO_THREAD */:
16e9c715 7996 /* Make a ".reg/999" section. */
4a6636fb
PA
7997 /* thread_info.tid */
7998 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 7999
d4c88bbb 8000 len = strlen (buf) + 1;
a50b1753 8001 name = (char *) bfd_alloc (abfd, len);
16e9c715 8002 if (name == NULL)
b34976b6 8003 return FALSE;
c044fabd 8004
d4c88bbb 8005 memcpy (name, buf, len);
16e9c715 8006
117ed4f8 8007 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 8008 if (sect == NULL)
b34976b6 8009 return FALSE;
c044fabd 8010
4a6636fb
PA
8011 /* sizeof (thread_info.thread_context) */
8012 sect->size = 716;
8013 /* offsetof (thread_info.thread_context) */
8014 sect->filepos = note->descpos + 12;
16e9c715
NC
8015 sect->alignment_power = 2;
8016
4a6636fb
PA
8017 /* thread_info.is_active_thread */
8018 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
8019
8020 if (is_active_thread)
16e9c715 8021 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8022 return FALSE;
16e9c715
NC
8023 break;
8024
4a6636fb 8025 case 3 /* NOTE_INFO_MODULE */:
16e9c715 8026 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
8027 /* module_info.base_address */
8028 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 8029 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 8030
d4c88bbb 8031 len = strlen (buf) + 1;
a50b1753 8032 name = (char *) bfd_alloc (abfd, len);
16e9c715 8033 if (name == NULL)
b34976b6 8034 return FALSE;
c044fabd 8035
d4c88bbb 8036 memcpy (name, buf, len);
252b5132 8037
117ed4f8 8038 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 8039
16e9c715 8040 if (sect == NULL)
b34976b6 8041 return FALSE;
c044fabd 8042
eea6121a 8043 sect->size = note->descsz;
16e9c715 8044 sect->filepos = note->descpos;
16e9c715
NC
8045 sect->alignment_power = 2;
8046 break;
8047
8048 default:
b34976b6 8049 return TRUE;
16e9c715
NC
8050 }
8051
b34976b6 8052 return TRUE;
16e9c715 8053}
252b5132 8054
b34976b6 8055static bfd_boolean
217aa764 8056elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 8057{
9c5bfbb7 8058 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 8059
252b5132
RH
8060 switch (note->type)
8061 {
8062 default:
b34976b6 8063 return TRUE;
252b5132 8064
252b5132 8065 case NT_PRSTATUS:
bb0082d6
AM
8066 if (bed->elf_backend_grok_prstatus)
8067 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 8068 return TRUE;
bb0082d6 8069#if defined (HAVE_PRSTATUS_T)
252b5132 8070 return elfcore_grok_prstatus (abfd, note);
bb0082d6 8071#else
b34976b6 8072 return TRUE;
252b5132
RH
8073#endif
8074
8075#if defined (HAVE_PSTATUS_T)
8076 case NT_PSTATUS:
8077 return elfcore_grok_pstatus (abfd, note);
8078#endif
8079
8080#if defined (HAVE_LWPSTATUS_T)
8081 case NT_LWPSTATUS:
8082 return elfcore_grok_lwpstatus (abfd, note);
8083#endif
8084
8085 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
8086 return elfcore_grok_prfpreg (abfd, note);
8087
c044fabd 8088 case NT_WIN32PSTATUS:
16e9c715 8089 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 8090
c044fabd 8091 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
8092 if (note->namesz == 6
8093 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
8094 return elfcore_grok_prxfpreg (abfd, note);
8095 else
b34976b6 8096 return TRUE;
ff08c6bb 8097
4339cae0
L
8098 case NT_X86_XSTATE: /* Linux XSAVE extension */
8099 if (note->namesz == 6
8100 && strcmp (note->namedata, "LINUX") == 0)
8101 return elfcore_grok_xstatereg (abfd, note);
8102 else
8103 return TRUE;
8104
97753bd5
AM
8105 case NT_PPC_VMX:
8106 if (note->namesz == 6
8107 && strcmp (note->namedata, "LINUX") == 0)
8108 return elfcore_grok_ppc_vmx (abfd, note);
8109 else
8110 return TRUE;
8111
89eeb0bc
LM
8112 case NT_PPC_VSX:
8113 if (note->namesz == 6
8114 && strcmp (note->namedata, "LINUX") == 0)
8115 return elfcore_grok_ppc_vsx (abfd, note);
8116 else
8117 return TRUE;
8118
0675e188
UW
8119 case NT_S390_HIGH_GPRS:
8120 if (note->namesz == 6
8121 && strcmp (note->namedata, "LINUX") == 0)
8122 return elfcore_grok_s390_high_gprs (abfd, note);
8123 else
8124 return TRUE;
8125
d7eeb400
MS
8126 case NT_S390_TIMER:
8127 if (note->namesz == 6
8128 && strcmp (note->namedata, "LINUX") == 0)
8129 return elfcore_grok_s390_timer (abfd, note);
8130 else
8131 return TRUE;
8132
8133 case NT_S390_TODCMP:
8134 if (note->namesz == 6
8135 && strcmp (note->namedata, "LINUX") == 0)
8136 return elfcore_grok_s390_todcmp (abfd, note);
8137 else
8138 return TRUE;
8139
8140 case NT_S390_TODPREG:
8141 if (note->namesz == 6
8142 && strcmp (note->namedata, "LINUX") == 0)
8143 return elfcore_grok_s390_todpreg (abfd, note);
8144 else
8145 return TRUE;
8146
8147 case NT_S390_CTRS:
8148 if (note->namesz == 6
8149 && strcmp (note->namedata, "LINUX") == 0)
8150 return elfcore_grok_s390_ctrs (abfd, note);
8151 else
8152 return TRUE;
8153
8154 case NT_S390_PREFIX:
8155 if (note->namesz == 6
8156 && strcmp (note->namedata, "LINUX") == 0)
8157 return elfcore_grok_s390_prefix (abfd, note);
8158 else
8159 return TRUE;
8160
252b5132
RH
8161 case NT_PRPSINFO:
8162 case NT_PSINFO:
bb0082d6
AM
8163 if (bed->elf_backend_grok_psinfo)
8164 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8165 return TRUE;
bb0082d6 8166#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8167 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8168#else
b34976b6 8169 return TRUE;
252b5132 8170#endif
3333a7c3
RM
8171
8172 case NT_AUXV:
8173 {
117ed4f8
AM
8174 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8175 SEC_HAS_CONTENTS);
3333a7c3
RM
8176
8177 if (sect == NULL)
8178 return FALSE;
eea6121a 8179 sect->size = note->descsz;
3333a7c3 8180 sect->filepos = note->descpos;
3333a7c3
RM
8181 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8182
8183 return TRUE;
8184 }
252b5132
RH
8185 }
8186}
8187
718175fa
JK
8188static bfd_boolean
8189elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8190{
8191 elf_tdata (abfd)->build_id_size = note->descsz;
a50b1753 8192 elf_tdata (abfd)->build_id = (bfd_byte *) bfd_alloc (abfd, note->descsz);
718175fa
JK
8193 if (elf_tdata (abfd)->build_id == NULL)
8194 return FALSE;
8195
8196 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
8197
8198 return TRUE;
8199}
8200
8201static bfd_boolean
8202elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8203{
8204 switch (note->type)
8205 {
8206 default:
8207 return TRUE;
8208
8209 case NT_GNU_BUILD_ID:
8210 return elfobj_grok_gnu_build_id (abfd, note);
8211 }
8212}
8213
b34976b6 8214static bfd_boolean
217aa764 8215elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8216{
8217 char *cp;
8218
8219 cp = strchr (note->namedata, '@');
8220 if (cp != NULL)
8221 {
d2b64500 8222 *lwpidp = atoi(cp + 1);
b34976b6 8223 return TRUE;
50b2bdb7 8224 }
b34976b6 8225 return FALSE;
50b2bdb7
AM
8226}
8227
b34976b6 8228static bfd_boolean
217aa764 8229elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8230{
50b2bdb7
AM
8231 /* Signal number at offset 0x08. */
8232 elf_tdata (abfd)->core_signal
8233 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8234
8235 /* Process ID at offset 0x50. */
8236 elf_tdata (abfd)->core_pid
8237 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8238
8239 /* Command name at 0x7c (max 32 bytes, including nul). */
8240 elf_tdata (abfd)->core_command
8241 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8242
7720ba9f
MK
8243 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8244 note);
50b2bdb7
AM
8245}
8246
b34976b6 8247static bfd_boolean
217aa764 8248elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8249{
8250 int lwp;
8251
8252 if (elfcore_netbsd_get_lwpid (note, &lwp))
8253 elf_tdata (abfd)->core_lwpid = lwp;
8254
b4db1224 8255 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8256 {
8257 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8258 find this note before any of the others, which is fine,
8259 since the kernel writes this note out first when it
8260 creates a core file. */
47d9a591 8261
50b2bdb7
AM
8262 return elfcore_grok_netbsd_procinfo (abfd, note);
8263 }
8264
b4db1224
JT
8265 /* As of Jan 2002 there are no other machine-independent notes
8266 defined for NetBSD core files. If the note type is less
8267 than the start of the machine-dependent note types, we don't
8268 understand it. */
47d9a591 8269
b4db1224 8270 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8271 return TRUE;
50b2bdb7
AM
8272
8273
8274 switch (bfd_get_arch (abfd))
8275 {
08a40648
AM
8276 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8277 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8278
8279 case bfd_arch_alpha:
8280 case bfd_arch_sparc:
8281 switch (note->type)
08a40648
AM
8282 {
8283 case NT_NETBSDCORE_FIRSTMACH+0:
8284 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8285
08a40648
AM
8286 case NT_NETBSDCORE_FIRSTMACH+2:
8287 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8288
08a40648
AM
8289 default:
8290 return TRUE;
8291 }
50b2bdb7 8292
08a40648
AM
8293 /* On all other arch's, PT_GETREGS == mach+1 and
8294 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8295
8296 default:
8297 switch (note->type)
08a40648
AM
8298 {
8299 case NT_NETBSDCORE_FIRSTMACH+1:
8300 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8301
08a40648
AM
8302 case NT_NETBSDCORE_FIRSTMACH+3:
8303 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8304
08a40648
AM
8305 default:
8306 return TRUE;
8307 }
50b2bdb7
AM
8308 }
8309 /* NOTREACHED */
8310}
8311
67cc5033
MK
8312static bfd_boolean
8313elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8314{
8315 /* Signal number at offset 0x08. */
8316 elf_tdata (abfd)->core_signal
8317 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8318
8319 /* Process ID at offset 0x20. */
8320 elf_tdata (abfd)->core_pid
8321 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8322
8323 /* Command name at 0x48 (max 32 bytes, including nul). */
8324 elf_tdata (abfd)->core_command
8325 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8326
8327 return TRUE;
8328}
8329
8330static bfd_boolean
8331elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8332{
8333 if (note->type == NT_OPENBSD_PROCINFO)
8334 return elfcore_grok_openbsd_procinfo (abfd, note);
8335
8336 if (note->type == NT_OPENBSD_REGS)
8337 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8338
8339 if (note->type == NT_OPENBSD_FPREGS)
8340 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8341
8342 if (note->type == NT_OPENBSD_XFPREGS)
8343 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8344
8345 if (note->type == NT_OPENBSD_AUXV)
8346 {
8347 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8348 SEC_HAS_CONTENTS);
8349
8350 if (sect == NULL)
8351 return FALSE;
8352 sect->size = note->descsz;
8353 sect->filepos = note->descpos;
8354 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8355
8356 return TRUE;
8357 }
8358
8359 if (note->type == NT_OPENBSD_WCOOKIE)
8360 {
8361 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8362 SEC_HAS_CONTENTS);
8363
8364 if (sect == NULL)
8365 return FALSE;
8366 sect->size = note->descsz;
8367 sect->filepos = note->descpos;
8368 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8369
8370 return TRUE;
8371 }
8372
8373 return TRUE;
8374}
8375
07c6e936 8376static bfd_boolean
d3fd4074 8377elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8378{
8379 void *ddata = note->descdata;
8380 char buf[100];
8381 char *name;
8382 asection *sect;
f8843e87
AM
8383 short sig;
8384 unsigned flags;
07c6e936
NC
8385
8386 /* nto_procfs_status 'pid' field is at offset 0. */
8387 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8388
f8843e87
AM
8389 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8390 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8391
8392 /* nto_procfs_status 'flags' field is at offset 8. */
8393 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8394
8395 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8396 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8397 {
8398 elf_tdata (abfd)->core_signal = sig;
8399 elf_tdata (abfd)->core_lwpid = *tid;
8400 }
07c6e936 8401
f8843e87
AM
8402 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8403 do not come from signals so we make sure we set the current
8404 thread just in case. */
8405 if (flags & 0x00000080)
8406 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8407
8408 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8409 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8410
a50b1753 8411 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8412 if (name == NULL)
8413 return FALSE;
8414 strcpy (name, buf);
8415
117ed4f8 8416 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8417 if (sect == NULL)
8418 return FALSE;
8419
eea6121a 8420 sect->size = note->descsz;
07c6e936 8421 sect->filepos = note->descpos;
07c6e936
NC
8422 sect->alignment_power = 2;
8423
8424 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8425}
8426
8427static bfd_boolean
d69f560c
KW
8428elfcore_grok_nto_regs (bfd *abfd,
8429 Elf_Internal_Note *note,
d3fd4074 8430 long tid,
d69f560c 8431 char *base)
07c6e936
NC
8432{
8433 char buf[100];
8434 char *name;
8435 asection *sect;
8436
d69f560c 8437 /* Make a "(base)/%d" section. */
d3fd4074 8438 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8439
a50b1753 8440 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8441 if (name == NULL)
8442 return FALSE;
8443 strcpy (name, buf);
8444
117ed4f8 8445 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8446 if (sect == NULL)
8447 return FALSE;
8448
eea6121a 8449 sect->size = note->descsz;
07c6e936 8450 sect->filepos = note->descpos;
07c6e936
NC
8451 sect->alignment_power = 2;
8452
f8843e87
AM
8453 /* This is the current thread. */
8454 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8455 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8456
8457 return TRUE;
07c6e936
NC
8458}
8459
8460#define BFD_QNT_CORE_INFO 7
8461#define BFD_QNT_CORE_STATUS 8
8462#define BFD_QNT_CORE_GREG 9
8463#define BFD_QNT_CORE_FPREG 10
8464
8465static bfd_boolean
217aa764 8466elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8467{
8468 /* Every GREG section has a STATUS section before it. Store the
811072d8 8469 tid from the previous call to pass down to the next gregs
07c6e936 8470 function. */
d3fd4074 8471 static long tid = 1;
07c6e936
NC
8472
8473 switch (note->type)
8474 {
d69f560c
KW
8475 case BFD_QNT_CORE_INFO:
8476 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8477 case BFD_QNT_CORE_STATUS:
8478 return elfcore_grok_nto_status (abfd, note, &tid);
8479 case BFD_QNT_CORE_GREG:
8480 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8481 case BFD_QNT_CORE_FPREG:
8482 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8483 default:
8484 return TRUE;
07c6e936
NC
8485 }
8486}
8487
b15fa79e
AM
8488static bfd_boolean
8489elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8490{
8491 char *name;
8492 asection *sect;
8493 size_t len;
8494
8495 /* Use note name as section name. */
8496 len = note->namesz;
a50b1753 8497 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
8498 if (name == NULL)
8499 return FALSE;
8500 memcpy (name, note->namedata, len);
8501 name[len - 1] = '\0';
8502
8503 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8504 if (sect == NULL)
8505 return FALSE;
8506
8507 sect->size = note->descsz;
8508 sect->filepos = note->descpos;
8509 sect->alignment_power = 1;
8510
8511 return TRUE;
8512}
8513
7c76fa91
MS
8514/* Function: elfcore_write_note
8515
47d9a591 8516 Inputs:
a39f3346 8517 buffer to hold note, and current size of buffer
7c76fa91
MS
8518 name of note
8519 type of note
8520 data for note
8521 size of data for note
8522
a39f3346
AM
8523 Writes note to end of buffer. ELF64 notes are written exactly as
8524 for ELF32, despite the current (as of 2006) ELF gabi specifying
8525 that they ought to have 8-byte namesz and descsz field, and have
8526 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8527
7c76fa91 8528 Return:
a39f3346 8529 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8530
8531char *
a39f3346 8532elfcore_write_note (bfd *abfd,
217aa764 8533 char *buf,
a39f3346 8534 int *bufsiz,
217aa764 8535 const char *name,
a39f3346 8536 int type,
217aa764 8537 const void *input,
a39f3346 8538 int size)
7c76fa91
MS
8539{
8540 Elf_External_Note *xnp;
d4c88bbb 8541 size_t namesz;
d4c88bbb 8542 size_t newspace;
a39f3346 8543 char *dest;
7c76fa91 8544
d4c88bbb 8545 namesz = 0;
d4c88bbb 8546 if (name != NULL)
a39f3346 8547 namesz = strlen (name) + 1;
d4c88bbb 8548
a39f3346 8549 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 8550
a50b1753 8551 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
8552 if (buf == NULL)
8553 return buf;
a39f3346 8554 dest = buf + *bufsiz;
7c76fa91
MS
8555 *bufsiz += newspace;
8556 xnp = (Elf_External_Note *) dest;
8557 H_PUT_32 (abfd, namesz, xnp->namesz);
8558 H_PUT_32 (abfd, size, xnp->descsz);
8559 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8560 dest = xnp->name;
8561 if (name != NULL)
8562 {
8563 memcpy (dest, name, namesz);
8564 dest += namesz;
a39f3346 8565 while (namesz & 3)
d4c88bbb
AM
8566 {
8567 *dest++ = '\0';
a39f3346 8568 ++namesz;
d4c88bbb
AM
8569 }
8570 }
8571 memcpy (dest, input, size);
a39f3346
AM
8572 dest += size;
8573 while (size & 3)
8574 {
8575 *dest++ = '\0';
8576 ++size;
8577 }
8578 return buf;
7c76fa91
MS
8579}
8580
8581#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8582char *
217aa764
AM
8583elfcore_write_prpsinfo (bfd *abfd,
8584 char *buf,
8585 int *bufsiz,
8586 const char *fname,
8587 const char *psargs)
7c76fa91 8588{
183e98be
AM
8589 const char *note_name = "CORE";
8590 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8591
8592 if (bed->elf_backend_write_core_note != NULL)
8593 {
8594 char *ret;
8595 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8596 NT_PRPSINFO, fname, psargs);
8597 if (ret != NULL)
8598 return ret;
8599 }
7c76fa91 8600
183e98be
AM
8601#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
8602 if (bed->s->elfclass == ELFCLASS32)
8603 {
8604#if defined (HAVE_PSINFO32_T)
8605 psinfo32_t data;
8606 int note_type = NT_PSINFO;
8607#else
8608 prpsinfo32_t data;
8609 int note_type = NT_PRPSINFO;
8610#endif
8611
8612 memset (&data, 0, sizeof (data));
8613 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8614 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8615 return elfcore_write_note (abfd, buf, bufsiz,
8616 note_name, note_type, &data, sizeof (data));
8617 }
8618 else
8619#endif
8620 {
7c76fa91 8621#if defined (HAVE_PSINFO_T)
183e98be
AM
8622 psinfo_t data;
8623 int note_type = NT_PSINFO;
7c76fa91 8624#else
183e98be
AM
8625 prpsinfo_t data;
8626 int note_type = NT_PRPSINFO;
7c76fa91
MS
8627#endif
8628
183e98be
AM
8629 memset (&data, 0, sizeof (data));
8630 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8631 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8632 return elfcore_write_note (abfd, buf, bufsiz,
8633 note_name, note_type, &data, sizeof (data));
8634 }
7c76fa91
MS
8635}
8636#endif /* PSINFO_T or PRPSINFO_T */
8637
8638#if defined (HAVE_PRSTATUS_T)
8639char *
217aa764
AM
8640elfcore_write_prstatus (bfd *abfd,
8641 char *buf,
8642 int *bufsiz,
8643 long pid,
8644 int cursig,
8645 const void *gregs)
7c76fa91 8646{
183e98be
AM
8647 const char *note_name = "CORE";
8648 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8649
183e98be
AM
8650 if (bed->elf_backend_write_core_note != NULL)
8651 {
8652 char *ret;
8653 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8654 NT_PRSTATUS,
8655 pid, cursig, gregs);
8656 if (ret != NULL)
8657 return ret;
8658 }
8659
8660#if defined (HAVE_PRSTATUS32_T)
8661 if (bed->s->elfclass == ELFCLASS32)
8662 {
8663 prstatus32_t prstat;
8664
8665 memset (&prstat, 0, sizeof (prstat));
8666 prstat.pr_pid = pid;
8667 prstat.pr_cursig = cursig;
8668 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8669 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8670 NT_PRSTATUS, &prstat, sizeof (prstat));
8671 }
8672 else
8673#endif
8674 {
8675 prstatus_t prstat;
8676
8677 memset (&prstat, 0, sizeof (prstat));
8678 prstat.pr_pid = pid;
8679 prstat.pr_cursig = cursig;
8680 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8681 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8682 NT_PRSTATUS, &prstat, sizeof (prstat));
8683 }
7c76fa91
MS
8684}
8685#endif /* HAVE_PRSTATUS_T */
8686
51316059
MS
8687#if defined (HAVE_LWPSTATUS_T)
8688char *
217aa764
AM
8689elfcore_write_lwpstatus (bfd *abfd,
8690 char *buf,
8691 int *bufsiz,
8692 long pid,
8693 int cursig,
8694 const void *gregs)
51316059
MS
8695{
8696 lwpstatus_t lwpstat;
183e98be 8697 const char *note_name = "CORE";
51316059
MS
8698
8699 memset (&lwpstat, 0, sizeof (lwpstat));
8700 lwpstat.pr_lwpid = pid >> 16;
8701 lwpstat.pr_cursig = cursig;
8702#if defined (HAVE_LWPSTATUS_T_PR_REG)
8703 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8704#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8705#if !defined(gregs)
8706 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8707 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8708#else
8709 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8710 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8711#endif
8712#endif
47d9a591 8713 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8714 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8715}
8716#endif /* HAVE_LWPSTATUS_T */
8717
7c76fa91
MS
8718#if defined (HAVE_PSTATUS_T)
8719char *
217aa764
AM
8720elfcore_write_pstatus (bfd *abfd,
8721 char *buf,
8722 int *bufsiz,
8723 long pid,
6c10990d
NC
8724 int cursig ATTRIBUTE_UNUSED,
8725 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 8726{
183e98be
AM
8727 const char *note_name = "CORE";
8728#if defined (HAVE_PSTATUS32_T)
8729 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8730
183e98be
AM
8731 if (bed->s->elfclass == ELFCLASS32)
8732 {
8733 pstatus32_t pstat;
8734
8735 memset (&pstat, 0, sizeof (pstat));
8736 pstat.pr_pid = pid & 0xffff;
8737 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8738 NT_PSTATUS, &pstat, sizeof (pstat));
8739 return buf;
8740 }
8741 else
8742#endif
8743 {
8744 pstatus_t pstat;
8745
8746 memset (&pstat, 0, sizeof (pstat));
8747 pstat.pr_pid = pid & 0xffff;
8748 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8749 NT_PSTATUS, &pstat, sizeof (pstat));
8750 return buf;
8751 }
7c76fa91
MS
8752}
8753#endif /* HAVE_PSTATUS_T */
8754
8755char *
217aa764
AM
8756elfcore_write_prfpreg (bfd *abfd,
8757 char *buf,
8758 int *bufsiz,
8759 const void *fpregs,
8760 int size)
7c76fa91 8761{
183e98be 8762 const char *note_name = "CORE";
47d9a591 8763 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8764 note_name, NT_FPREGSET, fpregs, size);
8765}
8766
8767char *
217aa764
AM
8768elfcore_write_prxfpreg (bfd *abfd,
8769 char *buf,
8770 int *bufsiz,
8771 const void *xfpregs,
8772 int size)
7c76fa91
MS
8773{
8774 char *note_name = "LINUX";
47d9a591 8775 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8776 note_name, NT_PRXFPREG, xfpregs, size);
8777}
8778
4339cae0
L
8779char *
8780elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
8781 const void *xfpregs, int size)
8782{
8783 char *note_name = "LINUX";
8784 return elfcore_write_note (abfd, buf, bufsiz,
8785 note_name, NT_X86_XSTATE, xfpregs, size);
8786}
8787
97753bd5
AM
8788char *
8789elfcore_write_ppc_vmx (bfd *abfd,
8790 char *buf,
8791 int *bufsiz,
8792 const void *ppc_vmx,
8793 int size)
8794{
8795 char *note_name = "LINUX";
8796 return elfcore_write_note (abfd, buf, bufsiz,
8797 note_name, NT_PPC_VMX, ppc_vmx, size);
8798}
8799
89eeb0bc
LM
8800char *
8801elfcore_write_ppc_vsx (bfd *abfd,
8802 char *buf,
8803 int *bufsiz,
8804 const void *ppc_vsx,
8805 int size)
8806{
8807 char *note_name = "LINUX";
8808 return elfcore_write_note (abfd, buf, bufsiz,
8809 note_name, NT_PPC_VSX, ppc_vsx, size);
8810}
8811
0675e188
UW
8812static char *
8813elfcore_write_s390_high_gprs (bfd *abfd,
8814 char *buf,
8815 int *bufsiz,
8816 const void *s390_high_gprs,
8817 int size)
8818{
8819 char *note_name = "LINUX";
8820 return elfcore_write_note (abfd, buf, bufsiz,
8821 note_name, NT_S390_HIGH_GPRS,
8822 s390_high_gprs, size);
8823}
8824
d7eeb400
MS
8825char *
8826elfcore_write_s390_timer (bfd *abfd,
8827 char *buf,
8828 int *bufsiz,
8829 const void *s390_timer,
8830 int size)
8831{
8832 char *note_name = "LINUX";
8833 return elfcore_write_note (abfd, buf, bufsiz,
8834 note_name, NT_S390_TIMER, s390_timer, size);
8835}
8836
8837char *
8838elfcore_write_s390_todcmp (bfd *abfd,
8839 char *buf,
8840 int *bufsiz,
8841 const void *s390_todcmp,
8842 int size)
8843{
8844 char *note_name = "LINUX";
8845 return elfcore_write_note (abfd, buf, bufsiz,
8846 note_name, NT_S390_TODCMP, s390_todcmp, size);
8847}
8848
8849char *
8850elfcore_write_s390_todpreg (bfd *abfd,
8851 char *buf,
8852 int *bufsiz,
8853 const void *s390_todpreg,
8854 int size)
8855{
8856 char *note_name = "LINUX";
8857 return elfcore_write_note (abfd, buf, bufsiz,
8858 note_name, NT_S390_TODPREG, s390_todpreg, size);
8859}
8860
8861char *
8862elfcore_write_s390_ctrs (bfd *abfd,
8863 char *buf,
8864 int *bufsiz,
8865 const void *s390_ctrs,
8866 int size)
8867{
8868 char *note_name = "LINUX";
8869 return elfcore_write_note (abfd, buf, bufsiz,
8870 note_name, NT_S390_CTRS, s390_ctrs, size);
8871}
8872
8873char *
8874elfcore_write_s390_prefix (bfd *abfd,
8875 char *buf,
8876 int *bufsiz,
8877 const void *s390_prefix,
8878 int size)
8879{
8880 char *note_name = "LINUX";
8881 return elfcore_write_note (abfd, buf, bufsiz,
8882 note_name, NT_S390_PREFIX, s390_prefix, size);
8883}
8884
bb864ac1
CES
8885char *
8886elfcore_write_register_note (bfd *abfd,
8887 char *buf,
8888 int *bufsiz,
8889 const char *section,
8890 const void *data,
8891 int size)
8892{
8893 if (strcmp (section, ".reg2") == 0)
8894 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
8895 if (strcmp (section, ".reg-xfp") == 0)
8896 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
8897 if (strcmp (section, ".reg-xstate") == 0)
8898 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
8899 if (strcmp (section, ".reg-ppc-vmx") == 0)
8900 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
8901 if (strcmp (section, ".reg-ppc-vsx") == 0)
8902 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
8903 if (strcmp (section, ".reg-s390-high-gprs") == 0)
8904 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
8905 if (strcmp (section, ".reg-s390-timer") == 0)
8906 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
8907 if (strcmp (section, ".reg-s390-todcmp") == 0)
8908 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
8909 if (strcmp (section, ".reg-s390-todpreg") == 0)
8910 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
8911 if (strcmp (section, ".reg-s390-ctrs") == 0)
8912 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
8913 if (strcmp (section, ".reg-s390-prefix") == 0)
8914 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
bb864ac1
CES
8915 return NULL;
8916}
8917
b34976b6 8918static bfd_boolean
718175fa 8919elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 8920{
c044fabd 8921 char *p;
252b5132 8922
252b5132
RH
8923 p = buf;
8924 while (p < buf + size)
8925 {
c044fabd
KH
8926 /* FIXME: bad alignment assumption. */
8927 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8928 Elf_Internal_Note in;
8929
baea7ef1
AM
8930 if (offsetof (Elf_External_Note, name) > buf - p + size)
8931 return FALSE;
8932
dc810e39 8933 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8934
dc810e39 8935 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 8936 in.namedata = xnp->name;
baea7ef1
AM
8937 if (in.namesz > buf - in.namedata + size)
8938 return FALSE;
252b5132 8939
dc810e39 8940 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8941 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8942 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
8943 if (in.descsz != 0
8944 && (in.descdata >= buf + size
8945 || in.descsz > buf - in.descdata + size))
8946 return FALSE;
252b5132 8947
718175fa
JK
8948 switch (bfd_get_format (abfd))
8949 {
8950 default:
8951 return TRUE;
8952
8953 case bfd_core:
8954 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
8955 {
8956 if (! elfcore_grok_netbsd_note (abfd, &in))
8957 return FALSE;
8958 }
67cc5033
MK
8959 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
8960 {
8961 if (! elfcore_grok_openbsd_note (abfd, &in))
8962 return FALSE;
8963 }
718175fa
JK
8964 else if (CONST_STRNEQ (in.namedata, "QNX"))
8965 {
8966 if (! elfcore_grok_nto_note (abfd, &in))
8967 return FALSE;
8968 }
b15fa79e
AM
8969 else if (CONST_STRNEQ (in.namedata, "SPU/"))
8970 {
8971 if (! elfcore_grok_spu_note (abfd, &in))
8972 return FALSE;
8973 }
718175fa
JK
8974 else
8975 {
8976 if (! elfcore_grok_note (abfd, &in))
8977 return FALSE;
8978 }
8979 break;
8980
8981 case bfd_object:
8982 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
8983 {
8984 if (! elfobj_grok_gnu_note (abfd, &in))
8985 return FALSE;
8986 }
8987 break;
08a40648 8988 }
252b5132
RH
8989
8990 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8991 }
8992
718175fa
JK
8993 return TRUE;
8994}
8995
8996static bfd_boolean
8997elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
8998{
8999 char *buf;
9000
9001 if (size <= 0)
9002 return TRUE;
9003
9004 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
9005 return FALSE;
9006
a50b1753 9007 buf = (char *) bfd_malloc (size);
718175fa
JK
9008 if (buf == NULL)
9009 return FALSE;
9010
9011 if (bfd_bread (buf, size, abfd) != size
9012 || !elf_parse_notes (abfd, buf, size, offset))
9013 {
9014 free (buf);
9015 return FALSE;
9016 }
9017
252b5132 9018 free (buf);
b34976b6 9019 return TRUE;
252b5132 9020}
98d8431c
JB
9021\f
9022/* Providing external access to the ELF program header table. */
9023
9024/* Return an upper bound on the number of bytes required to store a
9025 copy of ABFD's program header table entries. Return -1 if an error
9026 occurs; bfd_get_error will return an appropriate code. */
c044fabd 9027
98d8431c 9028long
217aa764 9029bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
9030{
9031 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9032 {
9033 bfd_set_error (bfd_error_wrong_format);
9034 return -1;
9035 }
9036
936e320b 9037 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
9038}
9039
98d8431c
JB
9040/* Copy ABFD's program header table entries to *PHDRS. The entries
9041 will be stored as an array of Elf_Internal_Phdr structures, as
9042 defined in include/elf/internal.h. To find out how large the
9043 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
9044
9045 Return the number of program header table entries read, or -1 if an
9046 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 9047
98d8431c 9048int
217aa764 9049bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
9050{
9051 int num_phdrs;
9052
9053 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9054 {
9055 bfd_set_error (bfd_error_wrong_format);
9056 return -1;
9057 }
9058
9059 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 9060 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
9061 num_phdrs * sizeof (Elf_Internal_Phdr));
9062
9063 return num_phdrs;
9064}
ae4221d7 9065
db6751f2 9066enum elf_reloc_type_class
217aa764 9067_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
9068{
9069 return reloc_class_normal;
9070}
f8df10f4 9071
47d9a591 9072/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
9073 relocation against a local symbol. */
9074
9075bfd_vma
217aa764
AM
9076_bfd_elf_rela_local_sym (bfd *abfd,
9077 Elf_Internal_Sym *sym,
8517fae7 9078 asection **psec,
217aa764 9079 Elf_Internal_Rela *rel)
f8df10f4 9080{
8517fae7 9081 asection *sec = *psec;
f8df10f4
JJ
9082 bfd_vma relocation;
9083
9084 relocation = (sec->output_section->vma
9085 + sec->output_offset
9086 + sym->st_value);
9087 if ((sec->flags & SEC_MERGE)
c629eae0 9088 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 9089 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 9090 {
f8df10f4 9091 rel->r_addend =
8517fae7 9092 _bfd_merged_section_offset (abfd, psec,
65765700 9093 elf_section_data (sec)->sec_info,
753731ee
AM
9094 sym->st_value + rel->r_addend);
9095 if (sec != *psec)
9096 {
9097 /* If we have changed the section, and our original section is
9098 marked with SEC_EXCLUDE, it means that the original
9099 SEC_MERGE section has been completely subsumed in some
9100 other SEC_MERGE section. In this case, we need to leave
9101 some info around for --emit-relocs. */
9102 if ((sec->flags & SEC_EXCLUDE) != 0)
9103 sec->kept_section = *psec;
9104 sec = *psec;
9105 }
8517fae7
AM
9106 rel->r_addend -= relocation;
9107 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
9108 }
9109 return relocation;
9110}
c629eae0
JJ
9111
9112bfd_vma
217aa764
AM
9113_bfd_elf_rel_local_sym (bfd *abfd,
9114 Elf_Internal_Sym *sym,
9115 asection **psec,
9116 bfd_vma addend)
47d9a591 9117{
c629eae0
JJ
9118 asection *sec = *psec;
9119
68bfbfcc 9120 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
9121 return sym->st_value + addend;
9122
9123 return _bfd_merged_section_offset (abfd, psec,
65765700 9124 elf_section_data (sec)->sec_info,
753731ee 9125 sym->st_value + addend);
c629eae0
JJ
9126}
9127
9128bfd_vma
217aa764 9129_bfd_elf_section_offset (bfd *abfd,
92e4ec35 9130 struct bfd_link_info *info,
217aa764
AM
9131 asection *sec,
9132 bfd_vma offset)
c629eae0 9133{
68bfbfcc 9134 switch (sec->sec_info_type)
65765700
JJ
9135 {
9136 case ELF_INFO_TYPE_STABS:
eea6121a
AM
9137 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
9138 offset);
65765700 9139 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 9140 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
9141 default:
9142 return offset;
9143 }
c629eae0 9144}
3333a7c3
RM
9145\f
9146/* Create a new BFD as if by bfd_openr. Rather than opening a file,
9147 reconstruct an ELF file by reading the segments out of remote memory
9148 based on the ELF file header at EHDR_VMA and the ELF program headers it
9149 points to. If not null, *LOADBASEP is filled in with the difference
9150 between the VMAs from which the segments were read, and the VMAs the
9151 file headers (and hence BFD's idea of each section's VMA) put them at.
9152
9153 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
9154 remote memory at target address VMA into the local buffer at MYADDR; it
9155 should return zero on success or an `errno' code on failure. TEMPL must
9156 be a BFD for an ELF target with the word size and byte order found in
9157 the remote memory. */
9158
9159bfd *
217aa764
AM
9160bfd_elf_bfd_from_remote_memory
9161 (bfd *templ,
9162 bfd_vma ehdr_vma,
9163 bfd_vma *loadbasep,
f075ee0c 9164 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
9165{
9166 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
9167 (templ, ehdr_vma, loadbasep, target_read_memory);
9168}
4c45e5c9
JJ
9169\f
9170long
c9727e01
AM
9171_bfd_elf_get_synthetic_symtab (bfd *abfd,
9172 long symcount ATTRIBUTE_UNUSED,
9173 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 9174 long dynsymcount,
c9727e01
AM
9175 asymbol **dynsyms,
9176 asymbol **ret)
4c45e5c9
JJ
9177{
9178 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9179 asection *relplt;
9180 asymbol *s;
9181 const char *relplt_name;
9182 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
9183 arelent *p;
9184 long count, i, n;
9185 size_t size;
9186 Elf_Internal_Shdr *hdr;
9187 char *names;
9188 asection *plt;
9189
8615f3f2
AM
9190 *ret = NULL;
9191
90e3cdf2
JJ
9192 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
9193 return 0;
9194
8615f3f2
AM
9195 if (dynsymcount <= 0)
9196 return 0;
9197
4c45e5c9
JJ
9198 if (!bed->plt_sym_val)
9199 return 0;
9200
9201 relplt_name = bed->relplt_name;
9202 if (relplt_name == NULL)
d35fd659 9203 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
9204 relplt = bfd_get_section_by_name (abfd, relplt_name);
9205 if (relplt == NULL)
9206 return 0;
9207
9208 hdr = &elf_section_data (relplt)->this_hdr;
9209 if (hdr->sh_link != elf_dynsymtab (abfd)
9210 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
9211 return 0;
9212
9213 plt = bfd_get_section_by_name (abfd, ".plt");
9214 if (plt == NULL)
9215 return 0;
9216
9217 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 9218 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
9219 return -1;
9220
eea6121a 9221 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
9222 size = count * sizeof (asymbol);
9223 p = relplt->relocation;
cb53bf42 9224 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
9225 {
9226 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
9227 if (p->addend != 0)
9228 {
9229#ifdef BFD64
9230 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
9231#else
9232 size += sizeof ("+0x") - 1 + 8;
9233#endif
9234 }
9235 }
4c45e5c9 9236
a50b1753 9237 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
9238 if (s == NULL)
9239 return -1;
9240
9241 names = (char *) (s + count);
9242 p = relplt->relocation;
9243 n = 0;
cb53bf42 9244 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
9245 {
9246 size_t len;
9247 bfd_vma addr;
9248
9249 addr = bed->plt_sym_val (i, plt, p);
9250 if (addr == (bfd_vma) -1)
9251 continue;
9252
9253 *s = **p->sym_ptr_ptr;
65a7a66f
AM
9254 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
9255 we are defining a symbol, ensure one of them is set. */
9256 if ((s->flags & BSF_LOCAL) == 0)
9257 s->flags |= BSF_GLOBAL;
6ba2a415 9258 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
9259 s->section = plt;
9260 s->value = addr - plt->vma;
9261 s->name = names;
8f39ba8e 9262 s->udata.p = NULL;
4c45e5c9
JJ
9263 len = strlen ((*p->sym_ptr_ptr)->name);
9264 memcpy (names, (*p->sym_ptr_ptr)->name, len);
9265 names += len;
041de40d
AM
9266 if (p->addend != 0)
9267 {
1d770845 9268 char buf[30], *a;
91d6fa6a 9269
041de40d
AM
9270 memcpy (names, "+0x", sizeof ("+0x") - 1);
9271 names += sizeof ("+0x") - 1;
1d770845
L
9272 bfd_sprintf_vma (abfd, buf, p->addend);
9273 for (a = buf; *a == '0'; ++a)
9274 ;
9275 len = strlen (a);
9276 memcpy (names, a, len);
9277 names += len;
041de40d 9278 }
4c45e5c9
JJ
9279 memcpy (names, "@plt", sizeof ("@plt"));
9280 names += sizeof ("@plt");
8f39ba8e 9281 ++s, ++n;
4c45e5c9
JJ
9282 }
9283
9284 return n;
9285}
3d7f7666 9286
3b22753a
L
9287/* It is only used by x86-64 so far. */
9288asection _bfd_elf_large_com_section
9289 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 9290 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 9291
d1036acb
L
9292void
9293_bfd_elf_set_osabi (bfd * abfd,
9294 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
9295{
9296 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
9297
9298 i_ehdrp = elf_elfheader (abfd);
9299
9300 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
9301
9302 /* To make things simpler for the loader on Linux systems we set the
9303 osabi field to ELFOSABI_LINUX if the binary contains symbols of
9304 the STT_GNU_IFUNC type. */
9305 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
9306 && elf_tdata (abfd)->has_ifunc_symbols)
9307 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
d1036acb 9308}
fcb93ecf
PB
9309
9310
9311/* Return TRUE for ELF symbol types that represent functions.
9312 This is the default version of this function, which is sufficient for
d8045f23 9313 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
9314
9315bfd_boolean
9316_bfd_elf_is_function_type (unsigned int type)
9317{
d8045f23
NC
9318 return (type == STT_FUNC
9319 || type == STT_GNU_IFUNC);
fcb93ecf 9320}