]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
Fix races in gdb.mi/mi-basics.exp
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
4a97a0e5 4 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011
72a80a16 5 Free Software Foundation, Inc.
252b5132 6
5e8d7549 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
5e8d7549
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
5e8d7549 12 (at your option) any later version.
252b5132 13
5e8d7549
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
5e8d7549 19 You should have received a copy of the GNU General Public License
b34976b6 20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
23
252b5132 24
1b74d094
BW
25/*
26SECTION
252b5132
RH
27 ELF backends
28
29 BFD support for ELF formats is being worked on.
30 Currently, the best supported back ends are for sparc and i386
31 (running svr4 or Solaris 2).
32
33 Documentation of the internals of the support code still needs
34 to be written. The code is changing quickly enough that we
661a3fd4 35 haven't bothered yet. */
252b5132 36
7ee38065
MS
37/* For sparc64-cross-sparc32. */
38#define _SYSCALL32
252b5132 39#include "sysdep.h"
3db64b00 40#include "bfd.h"
252b5132
RH
41#include "bfdlink.h"
42#include "libbfd.h"
43#define ARCH_SIZE 0
44#include "elf-bfd.h"
e0e8c97f 45#include "libiberty.h"
ff59fc36 46#include "safe-ctype.h"
252b5132 47
8bc7f138
L
48#ifdef CORE_HEADER
49#include CORE_HEADER
50#endif
51
217aa764 52static int elf_sort_sections (const void *, const void *);
c84fca4d 53static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
54static bfd_boolean prep_headers (bfd *);
55static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
56static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
57static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
58 file_ptr offset);
50b2bdb7 59
252b5132
RH
60/* Swap version information in and out. The version information is
61 currently size independent. If that ever changes, this code will
62 need to move into elfcode.h. */
63
64/* Swap in a Verdef structure. */
65
66void
217aa764
AM
67_bfd_elf_swap_verdef_in (bfd *abfd,
68 const Elf_External_Verdef *src,
69 Elf_Internal_Verdef *dst)
252b5132 70{
dc810e39
AM
71 dst->vd_version = H_GET_16 (abfd, src->vd_version);
72 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
73 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
74 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
75 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
76 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
77 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
78}
79
80/* Swap out a Verdef structure. */
81
82void
217aa764
AM
83_bfd_elf_swap_verdef_out (bfd *abfd,
84 const Elf_Internal_Verdef *src,
85 Elf_External_Verdef *dst)
252b5132 86{
dc810e39
AM
87 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
88 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
89 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
90 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
91 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
92 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
93 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
94}
95
96/* Swap in a Verdaux structure. */
97
98void
217aa764
AM
99_bfd_elf_swap_verdaux_in (bfd *abfd,
100 const Elf_External_Verdaux *src,
101 Elf_Internal_Verdaux *dst)
252b5132 102{
dc810e39
AM
103 dst->vda_name = H_GET_32 (abfd, src->vda_name);
104 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
105}
106
107/* Swap out a Verdaux structure. */
108
109void
217aa764
AM
110_bfd_elf_swap_verdaux_out (bfd *abfd,
111 const Elf_Internal_Verdaux *src,
112 Elf_External_Verdaux *dst)
252b5132 113{
dc810e39
AM
114 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
115 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
116}
117
118/* Swap in a Verneed structure. */
119
120void
217aa764
AM
121_bfd_elf_swap_verneed_in (bfd *abfd,
122 const Elf_External_Verneed *src,
123 Elf_Internal_Verneed *dst)
252b5132 124{
dc810e39
AM
125 dst->vn_version = H_GET_16 (abfd, src->vn_version);
126 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
127 dst->vn_file = H_GET_32 (abfd, src->vn_file);
128 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
129 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
130}
131
132/* Swap out a Verneed structure. */
133
134void
217aa764
AM
135_bfd_elf_swap_verneed_out (bfd *abfd,
136 const Elf_Internal_Verneed *src,
137 Elf_External_Verneed *dst)
252b5132 138{
dc810e39
AM
139 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
140 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
141 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
142 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
143 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
144}
145
146/* Swap in a Vernaux structure. */
147
148void
217aa764
AM
149_bfd_elf_swap_vernaux_in (bfd *abfd,
150 const Elf_External_Vernaux *src,
151 Elf_Internal_Vernaux *dst)
252b5132 152{
dc810e39
AM
153 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
154 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
155 dst->vna_other = H_GET_16 (abfd, src->vna_other);
156 dst->vna_name = H_GET_32 (abfd, src->vna_name);
157 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
158}
159
160/* Swap out a Vernaux structure. */
161
162void
217aa764
AM
163_bfd_elf_swap_vernaux_out (bfd *abfd,
164 const Elf_Internal_Vernaux *src,
165 Elf_External_Vernaux *dst)
252b5132 166{
dc810e39
AM
167 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
168 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
169 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
170 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
171 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
172}
173
174/* Swap in a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_in (bfd *abfd,
178 const Elf_External_Versym *src,
179 Elf_Internal_Versym *dst)
252b5132 180{
dc810e39 181 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
182}
183
184/* Swap out a Versym structure. */
185
186void
217aa764
AM
187_bfd_elf_swap_versym_out (bfd *abfd,
188 const Elf_Internal_Versym *src,
189 Elf_External_Versym *dst)
252b5132 190{
dc810e39 191 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
192}
193
194/* Standard ELF hash function. Do not change this function; you will
195 cause invalid hash tables to be generated. */
3a99b017 196
252b5132 197unsigned long
217aa764 198bfd_elf_hash (const char *namearg)
252b5132 199{
3a99b017 200 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
201 unsigned long h = 0;
202 unsigned long g;
203 int ch;
204
205 while ((ch = *name++) != '\0')
206 {
207 h = (h << 4) + ch;
208 if ((g = (h & 0xf0000000)) != 0)
209 {
210 h ^= g >> 24;
211 /* The ELF ABI says `h &= ~g', but this is equivalent in
212 this case and on some machines one insn instead of two. */
213 h ^= g;
214 }
215 }
32dfa85d 216 return h & 0xffffffff;
252b5132
RH
217}
218
fdc90cb4
JJ
219/* DT_GNU_HASH hash function. Do not change this function; you will
220 cause invalid hash tables to be generated. */
221
222unsigned long
223bfd_elf_gnu_hash (const char *namearg)
224{
225 const unsigned char *name = (const unsigned char *) namearg;
226 unsigned long h = 5381;
227 unsigned char ch;
228
229 while ((ch = *name++) != '\0')
230 h = (h << 5) + h + ch;
231 return h & 0xffffffff;
232}
233
0c8d6e5c
AM
234/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
235 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 236bfd_boolean
0c8d6e5c 237bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 238 size_t object_size,
4dfe6ac6 239 enum elf_target_id object_id)
252b5132 240{
0ffa91dd
NC
241 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
242 abfd->tdata.any = bfd_zalloc (abfd, object_size);
243 if (abfd->tdata.any == NULL)
244 return FALSE;
252b5132 245
0ffa91dd
NC
246 elf_object_id (abfd) = object_id;
247 elf_program_header_size (abfd) = (bfd_size_type) -1;
b34976b6 248 return TRUE;
252b5132
RH
249}
250
0ffa91dd
NC
251
252bfd_boolean
ae95ffa6 253bfd_elf_make_object (bfd *abfd)
0ffa91dd 254{
ae95ffa6 255 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 256 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 257 bed->target_id);
0ffa91dd
NC
258}
259
b34976b6 260bfd_boolean
217aa764 261bfd_elf_mkcorefile (bfd *abfd)
252b5132 262{
c044fabd 263 /* I think this can be done just like an object file. */
ae95ffa6 264 return abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd);
252b5132
RH
265}
266
72a80a16 267static char *
217aa764 268bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
269{
270 Elf_Internal_Shdr **i_shdrp;
f075ee0c 271 bfd_byte *shstrtab = NULL;
dc810e39
AM
272 file_ptr offset;
273 bfd_size_type shstrtabsize;
252b5132
RH
274
275 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
276 if (i_shdrp == 0
277 || shindex >= elf_numsections (abfd)
278 || i_shdrp[shindex] == 0)
f075ee0c 279 return NULL;
252b5132 280
f075ee0c 281 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
282 if (shstrtab == NULL)
283 {
c044fabd 284 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
285 offset = i_shdrp[shindex]->sh_offset;
286 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
287
288 /* Allocate and clear an extra byte at the end, to prevent crashes
289 in case the string table is not terminated. */
3471d59d 290 if (shstrtabsize + 1 <= 1
a50b1753 291 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL
c6c60d09
JJ
292 || bfd_seek (abfd, offset, SEEK_SET) != 0)
293 shstrtab = NULL;
294 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
295 {
296 if (bfd_get_error () != bfd_error_system_call)
297 bfd_set_error (bfd_error_file_truncated);
298 shstrtab = NULL;
3471d59d
CC
299 /* Once we've failed to read it, make sure we don't keep
300 trying. Otherwise, we'll keep allocating space for
301 the string table over and over. */
302 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
303 }
304 else
305 shstrtab[shstrtabsize] = '\0';
217aa764 306 i_shdrp[shindex]->contents = shstrtab;
252b5132 307 }
f075ee0c 308 return (char *) shstrtab;
252b5132
RH
309}
310
311char *
217aa764
AM
312bfd_elf_string_from_elf_section (bfd *abfd,
313 unsigned int shindex,
314 unsigned int strindex)
252b5132
RH
315{
316 Elf_Internal_Shdr *hdr;
317
318 if (strindex == 0)
319 return "";
320
74f2e02b
AM
321 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
322 return NULL;
323
252b5132
RH
324 hdr = elf_elfsections (abfd)[shindex];
325
326 if (hdr->contents == NULL
327 && bfd_elf_get_str_section (abfd, shindex) == NULL)
328 return NULL;
329
330 if (strindex >= hdr->sh_size)
331 {
1b3a8575 332 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 333 (*_bfd_error_handler)
d003868e
AM
334 (_("%B: invalid string offset %u >= %lu for section `%s'"),
335 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 336 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 337 ? ".shstrtab"
1b3a8575 338 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 339 return NULL;
252b5132
RH
340 }
341
342 return ((char *) hdr->contents) + strindex;
343}
344
6cdc0ccc
AM
345/* Read and convert symbols to internal format.
346 SYMCOUNT specifies the number of symbols to read, starting from
347 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
348 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
349 symbols, and symbol section index extensions, respectively.
350 Returns a pointer to the internal symbol buffer (malloced if necessary)
351 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
352
353Elf_Internal_Sym *
217aa764
AM
354bfd_elf_get_elf_syms (bfd *ibfd,
355 Elf_Internal_Shdr *symtab_hdr,
356 size_t symcount,
357 size_t symoffset,
358 Elf_Internal_Sym *intsym_buf,
359 void *extsym_buf,
360 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
361{
362 Elf_Internal_Shdr *shndx_hdr;
217aa764 363 void *alloc_ext;
df622259 364 const bfd_byte *esym;
6cdc0ccc
AM
365 Elf_External_Sym_Shndx *alloc_extshndx;
366 Elf_External_Sym_Shndx *shndx;
4dd07732 367 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
368 Elf_Internal_Sym *isym;
369 Elf_Internal_Sym *isymend;
9c5bfbb7 370 const struct elf_backend_data *bed;
6cdc0ccc
AM
371 size_t extsym_size;
372 bfd_size_type amt;
373 file_ptr pos;
374
e44a2c9c
AM
375 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
376 abort ();
377
6cdc0ccc
AM
378 if (symcount == 0)
379 return intsym_buf;
380
381 /* Normal syms might have section extension entries. */
382 shndx_hdr = NULL;
383 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
384 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
385
386 /* Read the symbols. */
387 alloc_ext = NULL;
388 alloc_extshndx = NULL;
4dd07732 389 alloc_intsym = NULL;
6cdc0ccc
AM
390 bed = get_elf_backend_data (ibfd);
391 extsym_size = bed->s->sizeof_sym;
392 amt = symcount * extsym_size;
393 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
394 if (extsym_buf == NULL)
395 {
d0fb9a8d 396 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
397 extsym_buf = alloc_ext;
398 }
399 if (extsym_buf == NULL
400 || bfd_seek (ibfd, pos, SEEK_SET) != 0
401 || bfd_bread (extsym_buf, amt, ibfd) != amt)
402 {
403 intsym_buf = NULL;
404 goto out;
405 }
406
407 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
408 extshndx_buf = NULL;
409 else
410 {
411 amt = symcount * sizeof (Elf_External_Sym_Shndx);
412 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
413 if (extshndx_buf == NULL)
414 {
a50b1753
NC
415 alloc_extshndx = (Elf_External_Sym_Shndx *)
416 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
417 extshndx_buf = alloc_extshndx;
418 }
419 if (extshndx_buf == NULL
420 || bfd_seek (ibfd, pos, SEEK_SET) != 0
421 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
422 {
423 intsym_buf = NULL;
424 goto out;
425 }
426 }
427
428 if (intsym_buf == NULL)
429 {
a50b1753
NC
430 alloc_intsym = (Elf_Internal_Sym *)
431 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 432 intsym_buf = alloc_intsym;
6cdc0ccc
AM
433 if (intsym_buf == NULL)
434 goto out;
435 }
436
437 /* Convert the symbols to internal form. */
438 isymend = intsym_buf + symcount;
a50b1753
NC
439 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
440 shndx = extshndx_buf;
6cdc0ccc
AM
441 isym < isymend;
442 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
443 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
444 {
445 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
446 (*_bfd_error_handler) (_("%B symbol number %lu references "
447 "nonexistent SHT_SYMTAB_SHNDX section"),
448 ibfd, (unsigned long) symoffset);
4dd07732
AM
449 if (alloc_intsym != NULL)
450 free (alloc_intsym);
8384fb8f
AM
451 intsym_buf = NULL;
452 goto out;
453 }
6cdc0ccc
AM
454
455 out:
456 if (alloc_ext != NULL)
457 free (alloc_ext);
458 if (alloc_extshndx != NULL)
459 free (alloc_extshndx);
460
461 return intsym_buf;
462}
463
5cab59f6
AM
464/* Look up a symbol name. */
465const char *
be8dd2ca
AM
466bfd_elf_sym_name (bfd *abfd,
467 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
468 Elf_Internal_Sym *isym,
469 asection *sym_sec)
5cab59f6 470{
26c61ae5 471 const char *name;
5cab59f6 472 unsigned int iname = isym->st_name;
be8dd2ca 473 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 474
138f35cc
JJ
475 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
476 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 477 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
478 {
479 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
480 shindex = elf_elfheader (abfd)->e_shstrndx;
481 }
482
26c61ae5
L
483 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
484 if (name == NULL)
485 name = "(null)";
486 else if (sym_sec && *name == '\0')
487 name = bfd_section_name (abfd, sym_sec);
488
489 return name;
5cab59f6
AM
490}
491
dbb410c3
AM
492/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
493 sections. The first element is the flags, the rest are section
494 pointers. */
495
496typedef union elf_internal_group {
497 Elf_Internal_Shdr *shdr;
498 unsigned int flags;
499} Elf_Internal_Group;
500
b885599b
AM
501/* Return the name of the group signature symbol. Why isn't the
502 signature just a string? */
503
504static const char *
217aa764 505group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 506{
9dce4196 507 Elf_Internal_Shdr *hdr;
9dce4196
AM
508 unsigned char esym[sizeof (Elf64_External_Sym)];
509 Elf_External_Sym_Shndx eshndx;
510 Elf_Internal_Sym isym;
b885599b 511
13792e9d
L
512 /* First we need to ensure the symbol table is available. Make sure
513 that it is a symbol table section. */
4fbb74a6
AM
514 if (ghdr->sh_link >= elf_numsections (abfd))
515 return NULL;
13792e9d
L
516 hdr = elf_elfsections (abfd) [ghdr->sh_link];
517 if (hdr->sh_type != SHT_SYMTAB
518 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
519 return NULL;
520
9dce4196
AM
521 /* Go read the symbol. */
522 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
523 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
524 &isym, esym, &eshndx) == NULL)
b885599b 525 return NULL;
9dce4196 526
26c61ae5 527 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
528}
529
dbb410c3
AM
530/* Set next_in_group list pointer, and group name for NEWSECT. */
531
b34976b6 532static bfd_boolean
217aa764 533setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
534{
535 unsigned int num_group = elf_tdata (abfd)->num_group;
536
537 /* If num_group is zero, read in all SHT_GROUP sections. The count
538 is set to -1 if there are no SHT_GROUP sections. */
539 if (num_group == 0)
540 {
541 unsigned int i, shnum;
542
543 /* First count the number of groups. If we have a SHT_GROUP
544 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 545 shnum = elf_numsections (abfd);
dbb410c3 546 num_group = 0;
08a40648 547
1783205a
NC
548#define IS_VALID_GROUP_SECTION_HEADER(shdr) \
549 ( (shdr)->sh_type == SHT_GROUP \
550 && (shdr)->sh_size >= (2 * GRP_ENTRY_SIZE) \
551 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
552 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 553
dbb410c3
AM
554 for (i = 0; i < shnum; i++)
555 {
556 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
557
558 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3
AM
559 num_group += 1;
560 }
561
562 if (num_group == 0)
20dbb49d
L
563 {
564 num_group = (unsigned) -1;
565 elf_tdata (abfd)->num_group = num_group;
566 }
567 else
dbb410c3
AM
568 {
569 /* We keep a list of elf section headers for group sections,
570 so we can find them quickly. */
20dbb49d 571 bfd_size_type amt;
d0fb9a8d 572
20dbb49d 573 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
574 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
575 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 576 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 577 return FALSE;
dbb410c3
AM
578
579 num_group = 0;
580 for (i = 0; i < shnum; i++)
581 {
582 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
583
584 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3 585 {
973ffd63 586 unsigned char *src;
dbb410c3
AM
587 Elf_Internal_Group *dest;
588
589 /* Add to list of sections. */
590 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
591 num_group += 1;
592
593 /* Read the raw contents. */
594 BFD_ASSERT (sizeof (*dest) >= 4);
595 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
596 shdr->contents = (unsigned char *)
597 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
598 /* PR binutils/4110: Handle corrupt group headers. */
599 if (shdr->contents == NULL)
600 {
601 _bfd_error_handler
602 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
603 bfd_set_error (bfd_error_bad_value);
604 return FALSE;
605 }
606
607 memset (shdr->contents, 0, amt);
608
609 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
610 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
611 != shdr->sh_size))
b34976b6 612 return FALSE;
dbb410c3
AM
613
614 /* Translate raw contents, a flag word followed by an
615 array of elf section indices all in target byte order,
616 to the flag word followed by an array of elf section
617 pointers. */
618 src = shdr->contents + shdr->sh_size;
619 dest = (Elf_Internal_Group *) (shdr->contents + amt);
620 while (1)
621 {
622 unsigned int idx;
623
624 src -= 4;
625 --dest;
626 idx = H_GET_32 (abfd, src);
627 if (src == shdr->contents)
628 {
629 dest->flags = idx;
b885599b
AM
630 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
631 shdr->bfd_section->flags
632 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
633 break;
634 }
635 if (idx >= shnum)
636 {
637 ((*_bfd_error_handler)
d003868e 638 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
639 idx = 0;
640 }
641 dest->shdr = elf_elfsections (abfd)[idx];
642 }
643 }
644 }
645 }
646 }
647
648 if (num_group != (unsigned) -1)
649 {
650 unsigned int i;
651
652 for (i = 0; i < num_group; i++)
653 {
654 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
655 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
656 unsigned int n_elt = shdr->sh_size / 4;
657
658 /* Look through this group's sections to see if current
659 section is a member. */
660 while (--n_elt != 0)
661 if ((++idx)->shdr == hdr)
662 {
e0e8c97f 663 asection *s = NULL;
dbb410c3
AM
664
665 /* We are a member of this group. Go looking through
666 other members to see if any others are linked via
667 next_in_group. */
668 idx = (Elf_Internal_Group *) shdr->contents;
669 n_elt = shdr->sh_size / 4;
670 while (--n_elt != 0)
671 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 672 && elf_next_in_group (s) != NULL)
dbb410c3
AM
673 break;
674 if (n_elt != 0)
675 {
dbb410c3
AM
676 /* Snarf the group name from other member, and
677 insert current section in circular list. */
945906ff
AM
678 elf_group_name (newsect) = elf_group_name (s);
679 elf_next_in_group (newsect) = elf_next_in_group (s);
680 elf_next_in_group (s) = newsect;
dbb410c3
AM
681 }
682 else
683 {
dbb410c3
AM
684 const char *gname;
685
b885599b
AM
686 gname = group_signature (abfd, shdr);
687 if (gname == NULL)
b34976b6 688 return FALSE;
945906ff 689 elf_group_name (newsect) = gname;
dbb410c3
AM
690
691 /* Start a circular list with one element. */
945906ff 692 elf_next_in_group (newsect) = newsect;
dbb410c3 693 }
b885599b 694
9dce4196
AM
695 /* If the group section has been created, point to the
696 new member. */
dbb410c3 697 if (shdr->bfd_section != NULL)
945906ff 698 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 699
dbb410c3
AM
700 i = num_group - 1;
701 break;
702 }
703 }
704 }
705
945906ff 706 if (elf_group_name (newsect) == NULL)
dbb410c3 707 {
d003868e
AM
708 (*_bfd_error_handler) (_("%B: no group info for section %A"),
709 abfd, newsect);
dbb410c3 710 }
b34976b6 711 return TRUE;
dbb410c3
AM
712}
713
3d7f7666 714bfd_boolean
dd863624 715_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
716{
717 unsigned int i;
718 unsigned int num_group = elf_tdata (abfd)->num_group;
719 bfd_boolean result = TRUE;
dd863624
L
720 asection *s;
721
722 /* Process SHF_LINK_ORDER. */
723 for (s = abfd->sections; s != NULL; s = s->next)
724 {
725 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
726 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
727 {
728 unsigned int elfsec = this_hdr->sh_link;
729 /* FIXME: The old Intel compiler and old strip/objcopy may
730 not set the sh_link or sh_info fields. Hence we could
731 get the situation where elfsec is 0. */
732 if (elfsec == 0)
733 {
4fbb74a6 734 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
735 if (bed->link_order_error_handler)
736 bed->link_order_error_handler
737 (_("%B: warning: sh_link not set for section `%A'"),
738 abfd, s);
739 }
740 else
741 {
91d6fa6a 742 asection *linksec = NULL;
25bbc984 743
4fbb74a6
AM
744 if (elfsec < elf_numsections (abfd))
745 {
746 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 747 linksec = this_hdr->bfd_section;
4fbb74a6 748 }
25bbc984
L
749
750 /* PR 1991, 2008:
751 Some strip/objcopy may leave an incorrect value in
752 sh_link. We don't want to proceed. */
91d6fa6a 753 if (linksec == NULL)
25bbc984
L
754 {
755 (*_bfd_error_handler)
756 (_("%B: sh_link [%d] in section `%A' is incorrect"),
757 s->owner, s, elfsec);
758 result = FALSE;
759 }
760
91d6fa6a 761 elf_linked_to_section (s) = linksec;
dd863624
L
762 }
763 }
764 }
3d7f7666 765
dd863624 766 /* Process section groups. */
3d7f7666
L
767 if (num_group == (unsigned) -1)
768 return result;
769
770 for (i = 0; i < num_group; i++)
771 {
772 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
773 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
774 unsigned int n_elt = shdr->sh_size / 4;
775
776 while (--n_elt != 0)
777 if ((++idx)->shdr->bfd_section)
778 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
779 else if (idx->shdr->sh_type == SHT_RELA
780 || idx->shdr->sh_type == SHT_REL)
781 /* We won't include relocation sections in section groups in
782 output object files. We adjust the group section size here
783 so that relocatable link will work correctly when
784 relocation sections are in section group in input object
785 files. */
786 shdr->bfd_section->size -= 4;
787 else
788 {
789 /* There are some unknown sections in the group. */
790 (*_bfd_error_handler)
d003868e
AM
791 (_("%B: unknown [%d] section `%s' in group [%s]"),
792 abfd,
3d7f7666 793 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
794 bfd_elf_string_from_elf_section (abfd,
795 (elf_elfheader (abfd)
796 ->e_shstrndx),
797 idx->shdr->sh_name),
3d7f7666
L
798 shdr->bfd_section->name);
799 result = FALSE;
800 }
801 }
802 return result;
803}
804
72adc230
AM
805bfd_boolean
806bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
807{
808 return elf_next_in_group (sec) != NULL;
809}
810
252b5132
RH
811/* Make a BFD section from an ELF section. We store a pointer to the
812 BFD section in the bfd_section field of the header. */
813
b34976b6 814bfd_boolean
217aa764
AM
815_bfd_elf_make_section_from_shdr (bfd *abfd,
816 Elf_Internal_Shdr *hdr,
6dc132d9
L
817 const char *name,
818 int shindex)
252b5132
RH
819{
820 asection *newsect;
821 flagword flags;
9c5bfbb7 822 const struct elf_backend_data *bed;
252b5132
RH
823
824 if (hdr->bfd_section != NULL)
4e011fb5 825 return TRUE;
252b5132
RH
826
827 newsect = bfd_make_section_anyway (abfd, name);
828 if (newsect == NULL)
b34976b6 829 return FALSE;
252b5132 830
1829f4b2
AM
831 hdr->bfd_section = newsect;
832 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 833 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 834
2f89ff8d
L
835 /* Always use the real type/flags. */
836 elf_section_type (newsect) = hdr->sh_type;
837 elf_section_flags (newsect) = hdr->sh_flags;
838
252b5132
RH
839 newsect->filepos = hdr->sh_offset;
840
841 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
842 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
843 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 844 bfd_log2 (hdr->sh_addralign)))
b34976b6 845 return FALSE;
252b5132
RH
846
847 flags = SEC_NO_FLAGS;
848 if (hdr->sh_type != SHT_NOBITS)
849 flags |= SEC_HAS_CONTENTS;
dbb410c3 850 if (hdr->sh_type == SHT_GROUP)
b3096250 851 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
852 if ((hdr->sh_flags & SHF_ALLOC) != 0)
853 {
854 flags |= SEC_ALLOC;
855 if (hdr->sh_type != SHT_NOBITS)
856 flags |= SEC_LOAD;
857 }
858 if ((hdr->sh_flags & SHF_WRITE) == 0)
859 flags |= SEC_READONLY;
860 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
861 flags |= SEC_CODE;
862 else if ((flags & SEC_LOAD) != 0)
863 flags |= SEC_DATA;
f5fa8ca2
JJ
864 if ((hdr->sh_flags & SHF_MERGE) != 0)
865 {
866 flags |= SEC_MERGE;
867 newsect->entsize = hdr->sh_entsize;
868 if ((hdr->sh_flags & SHF_STRINGS) != 0)
869 flags |= SEC_STRINGS;
870 }
dbb410c3
AM
871 if (hdr->sh_flags & SHF_GROUP)
872 if (!setup_group (abfd, hdr, newsect))
b34976b6 873 return FALSE;
13ae64f3
JJ
874 if ((hdr->sh_flags & SHF_TLS) != 0)
875 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
876 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
877 flags |= SEC_EXCLUDE;
252b5132 878
3d2b39cf 879 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 880 {
3d2b39cf
L
881 /* The debugging sections appear to be recognized only by name,
882 not any sort of flag. Their SEC_ALLOC bits are cleared. */
883 static const struct
884 {
885 const char *name;
886 int len;
887 } debug_sections [] =
888 {
0112cd26 889 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
890 { NULL, 0 }, /* 'e' */
891 { NULL, 0 }, /* 'f' */
0112cd26 892 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
893 { NULL, 0 }, /* 'h' */
894 { NULL, 0 }, /* 'i' */
895 { NULL, 0 }, /* 'j' */
896 { NULL, 0 }, /* 'k' */
0112cd26 897 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
898 { NULL, 0 }, /* 'm' */
899 { NULL, 0 }, /* 'n' */
900 { NULL, 0 }, /* 'o' */
901 { NULL, 0 }, /* 'p' */
902 { NULL, 0 }, /* 'q' */
903 { NULL, 0 }, /* 'r' */
1b315056
CS
904 { STRING_COMMA_LEN ("stab") }, /* 's' */
905 { NULL, 0 }, /* 't' */
906 { NULL, 0 }, /* 'u' */
907 { NULL, 0 }, /* 'v' */
908 { NULL, 0 }, /* 'w' */
909 { NULL, 0 }, /* 'x' */
910 { NULL, 0 }, /* 'y' */
911 { STRING_COMMA_LEN ("zdebug") } /* 'z' */
3d2b39cf 912 };
08a40648 913
3d2b39cf
L
914 if (name [0] == '.')
915 {
916 int i = name [1] - 'd';
917 if (i >= 0
918 && i < (int) ARRAY_SIZE (debug_sections)
919 && debug_sections [i].name != NULL
920 && strncmp (&name [1], debug_sections [i].name,
921 debug_sections [i].len) == 0)
922 flags |= SEC_DEBUGGING;
923 }
924 }
252b5132
RH
925
926 /* As a GNU extension, if the name begins with .gnu.linkonce, we
927 only link a single copy of the section. This is used to support
928 g++. g++ will emit each template expansion in its own section.
929 The symbols will be defined as weak, so that multiple definitions
930 are permitted. The GNU linker extension is to actually discard
931 all but one of the sections. */
0112cd26 932 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 933 && elf_next_in_group (newsect) == NULL)
252b5132
RH
934 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
935
fa152c49
JW
936 bed = get_elf_backend_data (abfd);
937 if (bed->elf_backend_section_flags)
938 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 939 return FALSE;
fa152c49 940
252b5132 941 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 942 return FALSE;
252b5132 943
718175fa
JK
944 /* We do not parse the PT_NOTE segments as we are interested even in the
945 separate debug info files which may have the segments offsets corrupted.
946 PT_NOTEs from the core files are currently not parsed using BFD. */
947 if (hdr->sh_type == SHT_NOTE)
948 {
baea7ef1 949 bfd_byte *contents;
718175fa 950
baea7ef1 951 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
952 return FALSE;
953
baea7ef1 954 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
955 free (contents);
956 }
957
252b5132
RH
958 if ((flags & SEC_ALLOC) != 0)
959 {
960 Elf_Internal_Phdr *phdr;
6ffd7900
AM
961 unsigned int i, nload;
962
963 /* Some ELF linkers produce binaries with all the program header
964 p_paddr fields zero. If we have such a binary with more than
965 one PT_LOAD header, then leave the section lma equal to vma
966 so that we don't create sections with overlapping lma. */
967 phdr = elf_tdata (abfd)->phdr;
968 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
969 if (phdr->p_paddr != 0)
970 break;
971 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
972 ++nload;
973 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
974 return TRUE;
252b5132 975
252b5132
RH
976 phdr = elf_tdata (abfd)->phdr;
977 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
978 {
88967714 979 if (phdr->p_type == PT_LOAD
9a83a553 980 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 981 {
88967714
AM
982 if ((flags & SEC_LOAD) == 0)
983 newsect->lma = (phdr->p_paddr
984 + hdr->sh_addr - phdr->p_vaddr);
985 else
986 /* We used to use the same adjustment for SEC_LOAD
987 sections, but that doesn't work if the segment
988 is packed with code from multiple VMAs.
989 Instead we calculate the section LMA based on
990 the segment LMA. It is assumed that the
991 segment will contain sections with contiguous
992 LMAs, even if the VMAs are not. */
993 newsect->lma = (phdr->p_paddr
994 + hdr->sh_offset - phdr->p_offset);
995
996 /* With contiguous segments, we can't tell from file
997 offsets whether a section with zero size should
998 be placed at the end of one segment or the
999 beginning of the next. Decide based on vaddr. */
1000 if (hdr->sh_addr >= phdr->p_vaddr
1001 && (hdr->sh_addr + hdr->sh_size
1002 <= phdr->p_vaddr + phdr->p_memsz))
1003 break;
252b5132
RH
1004 }
1005 }
1006 }
1007
4a114e3e
L
1008 /* Compress/decompress DWARF debug sections with names: .debug_* and
1009 .zdebug_*, after the section flags is set. */
1010 if ((flags & SEC_DEBUGGING)
1011 && ((name[1] == 'd' && name[6] == '_')
1012 || (name[1] == 'z' && name[7] == '_')))
1013 {
1014 enum { nothing, compress, decompress } action = nothing;
4e011fb5 1015 char *new_name;
4a114e3e
L
1016
1017 if (bfd_is_section_compressed (abfd, newsect))
1018 {
1019 /* Compressed section. Check if we should decompress. */
1020 if ((abfd->flags & BFD_DECOMPRESS))
1021 action = decompress;
1022 }
1023 else
1024 {
1025 /* Normal section. Check if we should compress. */
1026 if ((abfd->flags & BFD_COMPRESS))
1027 action = compress;
1028 }
1029
4e011fb5 1030 new_name = NULL;
4a114e3e
L
1031 switch (action)
1032 {
1033 case nothing:
1034 break;
1035 case compress:
1036 if (!bfd_init_section_compress_status (abfd, newsect))
1037 {
1038 (*_bfd_error_handler)
1039 (_("%B: unable to initialize commpress status for section %s"),
1040 abfd, name);
1041 return FALSE;
1042 }
4e011fb5
AM
1043 if (name[1] != 'z')
1044 {
1045 unsigned int len = strlen (name);
1046
1047 new_name = bfd_alloc (abfd, len + 2);
1048 if (new_name == NULL)
1049 return FALSE;
1050 new_name[0] = '.';
1051 new_name[1] = 'z';
1052 memcpy (new_name + 2, name + 1, len);
1053 }
4a114e3e
L
1054 break;
1055 case decompress:
1056 if (!bfd_init_section_decompress_status (abfd, newsect))
1057 {
1058 (*_bfd_error_handler)
1059 (_("%B: unable to initialize decommpress status for section %s"),
1060 abfd, name);
1061 return FALSE;
1062 }
4e011fb5
AM
1063 if (name[1] == 'z')
1064 {
1065 unsigned int len = strlen (name);
1066
1067 new_name = bfd_alloc (abfd, len);
1068 if (new_name == NULL)
1069 return FALSE;
1070 new_name[0] = '.';
1071 memcpy (new_name + 1, name + 2, len - 1);
1072 }
4a114e3e
L
1073 break;
1074 }
4e011fb5
AM
1075 if (new_name != NULL)
1076 bfd_rename_section (abfd, newsect, new_name);
4a114e3e
L
1077 }
1078
b34976b6 1079 return TRUE;
252b5132
RH
1080}
1081
252b5132
RH
1082const char *const bfd_elf_section_type_names[] = {
1083 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1084 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1085 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1086};
1087
1049f94e 1088/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1089 output, and the reloc is against an external symbol, and nothing
1090 has given us any additional addend, the resulting reloc will also
1091 be against the same symbol. In such a case, we don't want to
1092 change anything about the way the reloc is handled, since it will
1093 all be done at final link time. Rather than put special case code
1094 into bfd_perform_relocation, all the reloc types use this howto
1095 function. It just short circuits the reloc if producing
1049f94e 1096 relocatable output against an external symbol. */
252b5132 1097
252b5132 1098bfd_reloc_status_type
217aa764
AM
1099bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1100 arelent *reloc_entry,
1101 asymbol *symbol,
1102 void *data ATTRIBUTE_UNUSED,
1103 asection *input_section,
1104 bfd *output_bfd,
1105 char **error_message ATTRIBUTE_UNUSED)
1106{
1107 if (output_bfd != NULL
252b5132
RH
1108 && (symbol->flags & BSF_SECTION_SYM) == 0
1109 && (! reloc_entry->howto->partial_inplace
1110 || reloc_entry->addend == 0))
1111 {
1112 reloc_entry->address += input_section->output_offset;
1113 return bfd_reloc_ok;
1114 }
1115
1116 return bfd_reloc_continue;
1117}
1118\f
0ac4564e
L
1119/* Copy the program header and other data from one object module to
1120 another. */
252b5132 1121
b34976b6 1122bfd_boolean
217aa764 1123_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1124{
1125 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1126 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1127 return TRUE;
2d502050
L
1128
1129 BFD_ASSERT (!elf_flags_init (obfd)
1130 || (elf_elfheader (obfd)->e_flags
1131 == elf_elfheader (ibfd)->e_flags));
1132
0ac4564e 1133 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1134 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1135 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1136
1137 /* Copy object attributes. */
1138 _bfd_elf_copy_obj_attributes (ibfd, obfd);
b34976b6 1139 return TRUE;
2d502050
L
1140}
1141
cedc298e
L
1142static const char *
1143get_segment_type (unsigned int p_type)
1144{
1145 const char *pt;
1146 switch (p_type)
1147 {
1148 case PT_NULL: pt = "NULL"; break;
1149 case PT_LOAD: pt = "LOAD"; break;
1150 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1151 case PT_INTERP: pt = "INTERP"; break;
1152 case PT_NOTE: pt = "NOTE"; break;
1153 case PT_SHLIB: pt = "SHLIB"; break;
1154 case PT_PHDR: pt = "PHDR"; break;
1155 case PT_TLS: pt = "TLS"; break;
1156 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1157 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1158 case PT_GNU_RELRO: pt = "RELRO"; break;
1159 default: pt = NULL; break;
1160 }
1161 return pt;
1162}
1163
f0b79d91
L
1164/* Print out the program headers. */
1165
b34976b6 1166bfd_boolean
217aa764 1167_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1168{
a50b1753 1169 FILE *f = (FILE *) farg;
252b5132
RH
1170 Elf_Internal_Phdr *p;
1171 asection *s;
1172 bfd_byte *dynbuf = NULL;
1173
1174 p = elf_tdata (abfd)->phdr;
1175 if (p != NULL)
1176 {
1177 unsigned int i, c;
1178
1179 fprintf (f, _("\nProgram Header:\n"));
1180 c = elf_elfheader (abfd)->e_phnum;
1181 for (i = 0; i < c; i++, p++)
1182 {
cedc298e 1183 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1184 char buf[20];
1185
cedc298e 1186 if (pt == NULL)
252b5132 1187 {
cedc298e
L
1188 sprintf (buf, "0x%lx", p->p_type);
1189 pt = buf;
252b5132 1190 }
dc810e39 1191 fprintf (f, "%8s off 0x", pt);
60b89a18 1192 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1193 fprintf (f, " vaddr 0x");
60b89a18 1194 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1195 fprintf (f, " paddr 0x");
60b89a18 1196 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1197 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1198 fprintf (f, " filesz 0x");
60b89a18 1199 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1200 fprintf (f, " memsz 0x");
60b89a18 1201 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1202 fprintf (f, " flags %c%c%c",
1203 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1204 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1205 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1206 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1207 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1208 fprintf (f, "\n");
1209 }
1210 }
1211
1212 s = bfd_get_section_by_name (abfd, ".dynamic");
1213 if (s != NULL)
1214 {
cb33740c 1215 unsigned int elfsec;
dc810e39 1216 unsigned long shlink;
252b5132
RH
1217 bfd_byte *extdyn, *extdynend;
1218 size_t extdynsize;
217aa764 1219 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1220
1221 fprintf (f, _("\nDynamic Section:\n"));
1222
eea6121a 1223 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1224 goto error_return;
1225
1226 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1227 if (elfsec == SHN_BAD)
252b5132 1228 goto error_return;
dc810e39 1229 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1230
1231 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1232 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1233
1234 extdyn = dynbuf;
eea6121a 1235 extdynend = extdyn + s->size;
252b5132
RH
1236 for (; extdyn < extdynend; extdyn += extdynsize)
1237 {
1238 Elf_Internal_Dyn dyn;
ad9563d6 1239 const char *name = "";
252b5132 1240 char ab[20];
b34976b6 1241 bfd_boolean stringp;
ad9563d6 1242 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1243
217aa764 1244 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1245
1246 if (dyn.d_tag == DT_NULL)
1247 break;
1248
b34976b6 1249 stringp = FALSE;
252b5132
RH
1250 switch (dyn.d_tag)
1251 {
1252 default:
ad9563d6
CM
1253 if (bed->elf_backend_get_target_dtag)
1254 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1255
1256 if (!strcmp (name, ""))
1257 {
1258 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1259 name = ab;
1260 }
252b5132
RH
1261 break;
1262
b34976b6 1263 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1264 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1265 case DT_PLTGOT: name = "PLTGOT"; break;
1266 case DT_HASH: name = "HASH"; break;
1267 case DT_STRTAB: name = "STRTAB"; break;
1268 case DT_SYMTAB: name = "SYMTAB"; break;
1269 case DT_RELA: name = "RELA"; break;
1270 case DT_RELASZ: name = "RELASZ"; break;
1271 case DT_RELAENT: name = "RELAENT"; break;
1272 case DT_STRSZ: name = "STRSZ"; break;
1273 case DT_SYMENT: name = "SYMENT"; break;
1274 case DT_INIT: name = "INIT"; break;
1275 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1276 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1277 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1278 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1279 case DT_REL: name = "REL"; break;
1280 case DT_RELSZ: name = "RELSZ"; break;
1281 case DT_RELENT: name = "RELENT"; break;
1282 case DT_PLTREL: name = "PLTREL"; break;
1283 case DT_DEBUG: name = "DEBUG"; break;
1284 case DT_TEXTREL: name = "TEXTREL"; break;
1285 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1286 case DT_BIND_NOW: name = "BIND_NOW"; break;
1287 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1288 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1289 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1290 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1291 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1292 case DT_FLAGS: name = "FLAGS"; break;
1293 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1294 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1295 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1296 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1297 case DT_MOVEENT: name = "MOVEENT"; break;
1298 case DT_MOVESZ: name = "MOVESZ"; break;
1299 case DT_FEATURE: name = "FEATURE"; break;
1300 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1301 case DT_SYMINSZ: name = "SYMINSZ"; break;
1302 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1303 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1304 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1305 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1306 case DT_PLTPAD: name = "PLTPAD"; break;
1307 case DT_MOVETAB: name = "MOVETAB"; break;
1308 case DT_SYMINFO: name = "SYMINFO"; break;
1309 case DT_RELACOUNT: name = "RELACOUNT"; break;
1310 case DT_RELCOUNT: name = "RELCOUNT"; break;
1311 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1312 case DT_VERSYM: name = "VERSYM"; break;
1313 case DT_VERDEF: name = "VERDEF"; break;
1314 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1315 case DT_VERNEED: name = "VERNEED"; break;
1316 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1317 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1318 case DT_USED: name = "USED"; break;
b34976b6 1319 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1320 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1321 }
1322
ad9563d6 1323 fprintf (f, " %-20s ", name);
252b5132 1324 if (! stringp)
a1f3c56e
AN
1325 {
1326 fprintf (f, "0x");
1327 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1328 }
252b5132
RH
1329 else
1330 {
1331 const char *string;
dc810e39 1332 unsigned int tagv = dyn.d_un.d_val;
252b5132 1333
dc810e39 1334 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1335 if (string == NULL)
1336 goto error_return;
1337 fprintf (f, "%s", string);
1338 }
1339 fprintf (f, "\n");
1340 }
1341
1342 free (dynbuf);
1343 dynbuf = NULL;
1344 }
1345
1346 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1347 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1348 {
fc0e6df6 1349 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1350 return FALSE;
252b5132
RH
1351 }
1352
1353 if (elf_dynverdef (abfd) != 0)
1354 {
1355 Elf_Internal_Verdef *t;
1356
1357 fprintf (f, _("\nVersion definitions:\n"));
1358 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1359 {
1360 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1361 t->vd_flags, t->vd_hash,
1362 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1363 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1364 {
1365 Elf_Internal_Verdaux *a;
1366
1367 fprintf (f, "\t");
1368 for (a = t->vd_auxptr->vda_nextptr;
1369 a != NULL;
1370 a = a->vda_nextptr)
d0fb9a8d
JJ
1371 fprintf (f, "%s ",
1372 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1373 fprintf (f, "\n");
1374 }
1375 }
1376 }
1377
1378 if (elf_dynverref (abfd) != 0)
1379 {
1380 Elf_Internal_Verneed *t;
1381
1382 fprintf (f, _("\nVersion References:\n"));
1383 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1384 {
1385 Elf_Internal_Vernaux *a;
1386
d0fb9a8d
JJ
1387 fprintf (f, _(" required from %s:\n"),
1388 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1389 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1390 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1391 a->vna_flags, a->vna_other,
1392 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1393 }
1394 }
1395
b34976b6 1396 return TRUE;
252b5132
RH
1397
1398 error_return:
1399 if (dynbuf != NULL)
1400 free (dynbuf);
b34976b6 1401 return FALSE;
252b5132
RH
1402}
1403
1404/* Display ELF-specific fields of a symbol. */
1405
1406void
217aa764
AM
1407bfd_elf_print_symbol (bfd *abfd,
1408 void *filep,
1409 asymbol *symbol,
1410 bfd_print_symbol_type how)
252b5132 1411{
a50b1753 1412 FILE *file = (FILE *) filep;
252b5132
RH
1413 switch (how)
1414 {
1415 case bfd_print_symbol_name:
1416 fprintf (file, "%s", symbol->name);
1417 break;
1418 case bfd_print_symbol_more:
1419 fprintf (file, "elf ");
60b89a18 1420 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1421 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1422 break;
1423 case bfd_print_symbol_all:
1424 {
4e8a9624
AM
1425 const char *section_name;
1426 const char *name = NULL;
9c5bfbb7 1427 const struct elf_backend_data *bed;
7a13edea 1428 unsigned char st_other;
dbb410c3 1429 bfd_vma val;
c044fabd 1430
252b5132 1431 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1432
1433 bed = get_elf_backend_data (abfd);
1434 if (bed->elf_backend_print_symbol_all)
c044fabd 1435 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1436
1437 if (name == NULL)
1438 {
7ee38065 1439 name = symbol->name;
217aa764 1440 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1441 }
1442
252b5132
RH
1443 fprintf (file, " %s\t", section_name);
1444 /* Print the "other" value for a symbol. For common symbols,
1445 we've already printed the size; now print the alignment.
1446 For other symbols, we have no specified alignment, and
1447 we've printed the address; now print the size. */
dcf6c779 1448 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1449 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1450 else
1451 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1452 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1453
1454 /* If we have version information, print it. */
1455 if (elf_tdata (abfd)->dynversym_section != 0
1456 && (elf_tdata (abfd)->dynverdef_section != 0
1457 || elf_tdata (abfd)->dynverref_section != 0))
1458 {
1459 unsigned int vernum;
1460 const char *version_string;
1461
1462 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1463
1464 if (vernum == 0)
1465 version_string = "";
1466 else if (vernum == 1)
1467 version_string = "Base";
1468 else if (vernum <= elf_tdata (abfd)->cverdefs)
1469 version_string =
1470 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1471 else
1472 {
1473 Elf_Internal_Verneed *t;
1474
1475 version_string = "";
1476 for (t = elf_tdata (abfd)->verref;
1477 t != NULL;
1478 t = t->vn_nextref)
1479 {
1480 Elf_Internal_Vernaux *a;
1481
1482 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1483 {
1484 if (a->vna_other == vernum)
1485 {
1486 version_string = a->vna_nodename;
1487 break;
1488 }
1489 }
1490 }
1491 }
1492
1493 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1494 fprintf (file, " %-11s", version_string);
1495 else
1496 {
1497 int i;
1498
1499 fprintf (file, " (%s)", version_string);
1500 for (i = 10 - strlen (version_string); i > 0; --i)
1501 putc (' ', file);
1502 }
1503 }
1504
1505 /* If the st_other field is not zero, print it. */
7a13edea 1506 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1507
7a13edea
NC
1508 switch (st_other)
1509 {
1510 case 0: break;
1511 case STV_INTERNAL: fprintf (file, " .internal"); break;
1512 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1513 case STV_PROTECTED: fprintf (file, " .protected"); break;
1514 default:
1515 /* Some other non-defined flags are also present, so print
1516 everything hex. */
1517 fprintf (file, " 0x%02x", (unsigned int) st_other);
1518 }
252b5132 1519
587ff49e 1520 fprintf (file, " %s", name);
252b5132
RH
1521 }
1522 break;
1523 }
1524}
252b5132 1525
252b5132
RH
1526/* Allocate an ELF string table--force the first byte to be zero. */
1527
1528struct bfd_strtab_hash *
217aa764 1529_bfd_elf_stringtab_init (void)
252b5132
RH
1530{
1531 struct bfd_strtab_hash *ret;
1532
1533 ret = _bfd_stringtab_init ();
1534 if (ret != NULL)
1535 {
1536 bfd_size_type loc;
1537
b34976b6 1538 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1539 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1540 if (loc == (bfd_size_type) -1)
1541 {
1542 _bfd_stringtab_free (ret);
1543 ret = NULL;
1544 }
1545 }
1546 return ret;
1547}
1548\f
1549/* ELF .o/exec file reading */
1550
c044fabd 1551/* Create a new bfd section from an ELF section header. */
252b5132 1552
b34976b6 1553bfd_boolean
217aa764 1554bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1555{
4fbb74a6
AM
1556 Elf_Internal_Shdr *hdr;
1557 Elf_Internal_Ehdr *ehdr;
1558 const struct elf_backend_data *bed;
90937f86 1559 const char *name;
252b5132 1560
4fbb74a6
AM
1561 if (shindex >= elf_numsections (abfd))
1562 return FALSE;
1563
1564 hdr = elf_elfsections (abfd)[shindex];
1565 ehdr = elf_elfheader (abfd);
1566 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1567 hdr->sh_name);
933d961a
JJ
1568 if (name == NULL)
1569 return FALSE;
252b5132 1570
4fbb74a6 1571 bed = get_elf_backend_data (abfd);
252b5132
RH
1572 switch (hdr->sh_type)
1573 {
1574 case SHT_NULL:
1575 /* Inactive section. Throw it away. */
b34976b6 1576 return TRUE;
252b5132
RH
1577
1578 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1579 case SHT_NOBITS: /* .bss section. */
1580 case SHT_HASH: /* .hash section. */
1581 case SHT_NOTE: /* .note section. */
25e27870
L
1582 case SHT_INIT_ARRAY: /* .init_array section. */
1583 case SHT_FINI_ARRAY: /* .fini_array section. */
1584 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1585 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1586 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1587 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1588
797fc050 1589 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1590 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1591 return FALSE;
cfcac11d
NC
1592 if (hdr->sh_link > elf_numsections (abfd))
1593 {
caa83f8b 1594 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1595 field set to SHN_BEFORE or SHN_AFTER. */
1596 switch (bfd_get_arch (abfd))
1597 {
caa83f8b 1598 case bfd_arch_i386:
cfcac11d
NC
1599 case bfd_arch_sparc:
1600 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1601 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1602 break;
1603 /* Otherwise fall through. */
1604 default:
1605 return FALSE;
1606 }
1607 }
1608 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
8e0ed13f 1609 return FALSE;
cfcac11d 1610 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1611 {
1612 Elf_Internal_Shdr *dynsymhdr;
1613
1614 /* The shared libraries distributed with hpux11 have a bogus
1615 sh_link field for the ".dynamic" section. Find the
1616 string table for the ".dynsym" section instead. */
1617 if (elf_dynsymtab (abfd) != 0)
1618 {
1619 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1620 hdr->sh_link = dynsymhdr->sh_link;
1621 }
1622 else
1623 {
1624 unsigned int i, num_sec;
1625
1626 num_sec = elf_numsections (abfd);
1627 for (i = 1; i < num_sec; i++)
1628 {
1629 dynsymhdr = elf_elfsections (abfd)[i];
1630 if (dynsymhdr->sh_type == SHT_DYNSYM)
1631 {
1632 hdr->sh_link = dynsymhdr->sh_link;
1633 break;
1634 }
1635 }
1636 }
1637 }
1638 break;
1639
252b5132
RH
1640 case SHT_SYMTAB: /* A symbol table */
1641 if (elf_onesymtab (abfd) == shindex)
b34976b6 1642 return TRUE;
252b5132 1643
a50b2160
JJ
1644 if (hdr->sh_entsize != bed->s->sizeof_sym)
1645 return FALSE;
3337c1e5
AM
1646 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1647 return FALSE;
252b5132
RH
1648 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1649 elf_onesymtab (abfd) = shindex;
1650 elf_tdata (abfd)->symtab_hdr = *hdr;
1651 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1652 abfd->flags |= HAS_SYMS;
1653
1654 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1655 SHF_ALLOC is set, and this is a shared object, then we also
1656 treat this section as a BFD section. We can not base the
1657 decision purely on SHF_ALLOC, because that flag is sometimes
1658 set in a relocatable object file, which would confuse the
1659 linker. */
252b5132
RH
1660 if ((hdr->sh_flags & SHF_ALLOC) != 0
1661 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1662 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1663 shindex))
b34976b6 1664 return FALSE;
252b5132 1665
1b3a8575
AM
1666 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1667 can't read symbols without that section loaded as well. It
1668 is most likely specified by the next section header. */
1669 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1670 {
1671 unsigned int i, num_sec;
1672
1673 num_sec = elf_numsections (abfd);
1674 for (i = shindex + 1; i < num_sec; i++)
1675 {
1676 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1677 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1678 && hdr2->sh_link == shindex)
1679 break;
1680 }
1681 if (i == num_sec)
1682 for (i = 1; i < shindex; i++)
1683 {
1684 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1685 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1686 && hdr2->sh_link == shindex)
1687 break;
1688 }
1689 if (i != shindex)
1690 return bfd_section_from_shdr (abfd, i);
1691 }
b34976b6 1692 return TRUE;
252b5132
RH
1693
1694 case SHT_DYNSYM: /* A dynamic symbol table */
1695 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1696 return TRUE;
252b5132 1697
a50b2160
JJ
1698 if (hdr->sh_entsize != bed->s->sizeof_sym)
1699 return FALSE;
252b5132
RH
1700 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1701 elf_dynsymtab (abfd) = shindex;
1702 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1703 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1704 abfd->flags |= HAS_SYMS;
1705
1706 /* Besides being a symbol table, we also treat this as a regular
1707 section, so that objcopy can handle it. */
6dc132d9 1708 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1709
9ad5cbcf
AM
1710 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1711 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1712 return TRUE;
9ad5cbcf 1713
1b3a8575 1714 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1715 elf_symtab_shndx (abfd) = shindex;
1716 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1717 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1718 return TRUE;
9ad5cbcf 1719
252b5132
RH
1720 case SHT_STRTAB: /* A string table */
1721 if (hdr->bfd_section != NULL)
b34976b6 1722 return TRUE;
252b5132
RH
1723 if (ehdr->e_shstrndx == shindex)
1724 {
1725 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1726 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1727 return TRUE;
252b5132 1728 }
1b3a8575
AM
1729 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1730 {
1731 symtab_strtab:
1732 elf_tdata (abfd)->strtab_hdr = *hdr;
1733 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1734 return TRUE;
1735 }
1736 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1737 {
1738 dynsymtab_strtab:
1739 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1740 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1741 elf_elfsections (abfd)[shindex] = hdr;
1742 /* We also treat this as a regular section, so that objcopy
1743 can handle it. */
6dc132d9
L
1744 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1745 shindex);
1b3a8575 1746 }
252b5132 1747
1b3a8575
AM
1748 /* If the string table isn't one of the above, then treat it as a
1749 regular section. We need to scan all the headers to be sure,
1750 just in case this strtab section appeared before the above. */
1751 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1752 {
1753 unsigned int i, num_sec;
252b5132 1754
1b3a8575
AM
1755 num_sec = elf_numsections (abfd);
1756 for (i = 1; i < num_sec; i++)
1757 {
1758 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1759 if (hdr2->sh_link == shindex)
1760 {
933d961a
JJ
1761 /* Prevent endless recursion on broken objects. */
1762 if (i == shindex)
1763 return FALSE;
1b3a8575
AM
1764 if (! bfd_section_from_shdr (abfd, i))
1765 return FALSE;
1766 if (elf_onesymtab (abfd) == i)
1767 goto symtab_strtab;
1768 if (elf_dynsymtab (abfd) == i)
1769 goto dynsymtab_strtab;
1770 }
1771 }
1772 }
6dc132d9 1773 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1774
1775 case SHT_REL:
1776 case SHT_RELA:
1777 /* *These* do a lot of work -- but build no sections! */
1778 {
1779 asection *target_sect;
d4730f92 1780 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 1781 unsigned int num_sec = elf_numsections (abfd);
d4730f92
BS
1782 struct bfd_elf_section_data *esdt;
1783 bfd_size_type amt;
252b5132 1784
aa2ca951
JJ
1785 if (hdr->sh_entsize
1786 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1787 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1788 return FALSE;
1789
03ae5f59 1790 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1791 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1792 {
1793 ((*_bfd_error_handler)
d003868e
AM
1794 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1795 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1796 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1797 shindex);
03ae5f59
ILT
1798 }
1799
252b5132
RH
1800 /* For some incomprehensible reason Oracle distributes
1801 libraries for Solaris in which some of the objects have
1802 bogus sh_link fields. It would be nice if we could just
1803 reject them, but, unfortunately, some people need to use
1804 them. We scan through the section headers; if we find only
1805 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1806 to it. I hope this doesn't break anything.
1807
1808 Don't do it on executable nor shared library. */
1809 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1810 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1811 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1812 {
9ad5cbcf 1813 unsigned int scan;
252b5132
RH
1814 int found;
1815
1816 found = 0;
9ad5cbcf 1817 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1818 {
1819 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1820 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1821 {
1822 if (found != 0)
1823 {
1824 found = 0;
1825 break;
1826 }
1827 found = scan;
1828 }
1829 }
1830 if (found != 0)
1831 hdr->sh_link = found;
1832 }
1833
1834 /* Get the symbol table. */
1b3a8575
AM
1835 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1836 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1837 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1838 return FALSE;
252b5132
RH
1839
1840 /* If this reloc section does not use the main symbol table we
1841 don't treat it as a reloc section. BFD can't adequately
1842 represent such a section, so at least for now, we don't
c044fabd 1843 try. We just present it as a normal section. We also
60bcf0fa 1844 can't use it as a reloc section if it points to the null
83b89087
L
1845 section, an invalid section, another reloc section, or its
1846 sh_link points to the null section. */
185ef66d 1847 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1848 || hdr->sh_link == SHN_UNDEF
185ef66d 1849 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1850 || hdr->sh_info >= num_sec
1851 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1852 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1853 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1854 shindex);
252b5132
RH
1855
1856 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1857 return FALSE;
252b5132
RH
1858 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1859 if (target_sect == NULL)
b34976b6 1860 return FALSE;
252b5132 1861
d4730f92
BS
1862 esdt = elf_section_data (target_sect);
1863 if (hdr->sh_type == SHT_RELA)
1864 p_hdr = &esdt->rela.hdr;
252b5132 1865 else
d4730f92
BS
1866 p_hdr = &esdt->rel.hdr;
1867
1868 BFD_ASSERT (*p_hdr == NULL);
1869 amt = sizeof (*hdr2);
1870 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
1871 if (hdr2 == NULL)
1872 return FALSE;
252b5132 1873 *hdr2 = *hdr;
d4730f92 1874 *p_hdr = hdr2;
252b5132 1875 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1876 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1877 target_sect->flags |= SEC_RELOC;
1878 target_sect->relocation = NULL;
1879 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1880 /* In the section to which the relocations apply, mark whether
1881 its relocations are of the REL or RELA variety. */
72730e0c 1882 if (hdr->sh_size != 0)
d4730f92
BS
1883 {
1884 if (hdr->sh_type == SHT_RELA)
1885 target_sect->use_rela_p = 1;
1886 }
252b5132 1887 abfd->flags |= HAS_RELOC;
b34976b6 1888 return TRUE;
252b5132 1889 }
252b5132
RH
1890
1891 case SHT_GNU_verdef:
1892 elf_dynverdef (abfd) = shindex;
1893 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1894 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1895
1896 case SHT_GNU_versym:
a50b2160
JJ
1897 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1898 return FALSE;
252b5132
RH
1899 elf_dynversym (abfd) = shindex;
1900 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1901 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1902
1903 case SHT_GNU_verneed:
1904 elf_dynverref (abfd) = shindex;
1905 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1906 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1907
1908 case SHT_SHLIB:
b34976b6 1909 return TRUE;
252b5132 1910
dbb410c3 1911 case SHT_GROUP:
1783205a 1912 if (! IS_VALID_GROUP_SECTION_HEADER (hdr))
a50b2160 1913 return FALSE;
6dc132d9 1914 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1915 return FALSE;
dbb410c3
AM
1916 if (hdr->contents != NULL)
1917 {
1918 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1919 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1920 asection *s;
1921
b885599b
AM
1922 if (idx->flags & GRP_COMDAT)
1923 hdr->bfd_section->flags
1924 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1925
45c5e9ed
L
1926 /* We try to keep the same section order as it comes in. */
1927 idx += n_elt;
dbb410c3 1928 while (--n_elt != 0)
1783205a
NC
1929 {
1930 --idx;
1931
1932 if (idx->shdr != NULL
1933 && (s = idx->shdr->bfd_section) != NULL
1934 && elf_next_in_group (s) != NULL)
1935 {
1936 elf_next_in_group (hdr->bfd_section) = s;
1937 break;
1938 }
1939 }
dbb410c3
AM
1940 }
1941 break;
1942
252b5132 1943 default:
104d59d1
JM
1944 /* Possibly an attributes section. */
1945 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1946 || hdr->sh_type == bed->obj_attrs_section_type)
1947 {
1948 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1949 return FALSE;
1950 _bfd_elf_parse_attributes (abfd, hdr);
1951 return TRUE;
1952 }
1953
252b5132 1954 /* Check for any processor-specific section types. */
3eb70a79
L
1955 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1956 return TRUE;
1957
1958 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1959 {
1960 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1961 /* FIXME: How to properly handle allocated section reserved
1962 for applications? */
1963 (*_bfd_error_handler)
1964 (_("%B: don't know how to handle allocated, application "
1965 "specific section `%s' [0x%8x]"),
1966 abfd, name, hdr->sh_type);
1967 else
1968 /* Allow sections reserved for applications. */
1969 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1970 shindex);
1971 }
1972 else if (hdr->sh_type >= SHT_LOPROC
1973 && hdr->sh_type <= SHT_HIPROC)
1974 /* FIXME: We should handle this section. */
1975 (*_bfd_error_handler)
1976 (_("%B: don't know how to handle processor specific section "
1977 "`%s' [0x%8x]"),
1978 abfd, name, hdr->sh_type);
1979 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1980 {
1981 /* Unrecognised OS-specific sections. */
1982 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1983 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1984 required to correctly process the section and the file should
ff15b240
NC
1985 be rejected with an error message. */
1986 (*_bfd_error_handler)
1987 (_("%B: don't know how to handle OS specific section "
1988 "`%s' [0x%8x]"),
1989 abfd, name, hdr->sh_type);
1990 else
1991 /* Otherwise it should be processed. */
1992 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1993 }
3eb70a79
L
1994 else
1995 /* FIXME: We should handle this section. */
1996 (*_bfd_error_handler)
1997 (_("%B: don't know how to handle section `%s' [0x%8x]"),
1998 abfd, name, hdr->sh_type);
1999
2000 return FALSE;
252b5132
RH
2001 }
2002
b34976b6 2003 return TRUE;
252b5132
RH
2004}
2005
87d72d41 2006/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2007
87d72d41
AM
2008Elf_Internal_Sym *
2009bfd_sym_from_r_symndx (struct sym_cache *cache,
2010 bfd *abfd,
2011 unsigned long r_symndx)
ec338859 2012{
ec338859
AM
2013 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2014
a5d1b3b5
AM
2015 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2016 {
2017 Elf_Internal_Shdr *symtab_hdr;
2018 unsigned char esym[sizeof (Elf64_External_Sym)];
2019 Elf_External_Sym_Shndx eshndx;
ec338859 2020
a5d1b3b5
AM
2021 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2022 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2023 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2024 return NULL;
9ad5cbcf 2025
a5d1b3b5
AM
2026 if (cache->abfd != abfd)
2027 {
2028 memset (cache->indx, -1, sizeof (cache->indx));
2029 cache->abfd = abfd;
2030 }
2031 cache->indx[ent] = r_symndx;
ec338859 2032 }
a5d1b3b5 2033
87d72d41 2034 return &cache->sym[ent];
ec338859
AM
2035}
2036
252b5132
RH
2037/* Given an ELF section number, retrieve the corresponding BFD
2038 section. */
2039
2040asection *
91d6fa6a 2041bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2042{
91d6fa6a 2043 if (sec_index >= elf_numsections (abfd))
252b5132 2044 return NULL;
91d6fa6a 2045 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2046}
2047
b35d266b 2048static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2049{
0112cd26
NC
2050 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2051 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2052};
2053
b35d266b 2054static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2055{
0112cd26
NC
2056 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2057 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2058};
2059
b35d266b 2060static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2061{
0112cd26
NC
2062 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2063 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2064 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2065 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2066 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2067 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2068 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2069 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2070 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2071 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2072 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2073};
2074
b35d266b 2075static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2076{
0112cd26
NC
2077 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2078 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2079 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2080};
2081
b35d266b 2082static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2083{
0112cd26 2084 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2085 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2086 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2087 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2088 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2089 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2090 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2091 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2092 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2093 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2094};
2095
b35d266b 2096static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2097{
0112cd26
NC
2098 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2099 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2100};
2101
b35d266b 2102static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2103{
0112cd26
NC
2104 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2105 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2106 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2107 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2108};
2109
b35d266b 2110static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2111{
0112cd26
NC
2112 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2113 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2114};
2115
b35d266b 2116static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2117{
0112cd26
NC
2118 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2119 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2120 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2121};
2122
b35d266b 2123static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2124{
0112cd26
NC
2125 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2126 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2127 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2128};
2129
b35d266b 2130static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2131{
0112cd26
NC
2132 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2133 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2134 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2135 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2136 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2137};
2138
b35d266b 2139static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2140{
0112cd26
NC
2141 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2142 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2143 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2144 /* See struct bfd_elf_special_section declaration for the semantics of
2145 this special case where .prefix_length != strlen (.prefix). */
2146 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2147 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2148};
2149
b35d266b 2150static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2151{
0112cd26
NC
2152 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2153 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2154 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2155 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2156};
2157
1b315056
CS
2158static const struct bfd_elf_special_section special_sections_z[] =
2159{
2160 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2161 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2162 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2163 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2164 { NULL, 0, 0, 0, 0 }
2165};
2166
e4c93b56 2167static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2168{
7f4d3958 2169 special_sections_b, /* 'b' */
98ece1b3 2170 special_sections_c, /* 'c' */
7f4d3958
L
2171 special_sections_d, /* 'd' */
2172 NULL, /* 'e' */
2173 special_sections_f, /* 'f' */
2174 special_sections_g, /* 'g' */
2175 special_sections_h, /* 'h' */
2176 special_sections_i, /* 'i' */
2177 NULL, /* 'j' */
2178 NULL, /* 'k' */
2179 special_sections_l, /* 'l' */
2180 NULL, /* 'm' */
2181 special_sections_n, /* 'n' */
2182 NULL, /* 'o' */
2183 special_sections_p, /* 'p' */
2184 NULL, /* 'q' */
2185 special_sections_r, /* 'r' */
2186 special_sections_s, /* 's' */
2187 special_sections_t, /* 't' */
1b315056
CS
2188 NULL, /* 'u' */
2189 NULL, /* 'v' */
2190 NULL, /* 'w' */
2191 NULL, /* 'x' */
2192 NULL, /* 'y' */
2193 special_sections_z /* 'z' */
7f4d3958
L
2194};
2195
551b43fd
AM
2196const struct bfd_elf_special_section *
2197_bfd_elf_get_special_section (const char *name,
2198 const struct bfd_elf_special_section *spec,
2199 unsigned int rela)
2f89ff8d
L
2200{
2201 int i;
7f4d3958 2202 int len;
7f4d3958 2203
551b43fd 2204 len = strlen (name);
7f4d3958 2205
551b43fd 2206 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2207 {
2208 int suffix_len;
551b43fd 2209 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2210
2211 if (len < prefix_len)
2212 continue;
551b43fd 2213 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2214 continue;
2215
551b43fd 2216 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2217 if (suffix_len <= 0)
2218 {
2219 if (name[prefix_len] != 0)
2220 {
2221 if (suffix_len == 0)
2222 continue;
2223 if (name[prefix_len] != '.'
2224 && (suffix_len == -2
551b43fd 2225 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2226 continue;
2227 }
2228 }
2229 else
2230 {
2231 if (len < prefix_len + suffix_len)
2232 continue;
2233 if (memcmp (name + len - suffix_len,
551b43fd 2234 spec[i].prefix + prefix_len,
7dcb9820
AM
2235 suffix_len) != 0)
2236 continue;
2237 }
551b43fd 2238 return &spec[i];
7dcb9820 2239 }
2f89ff8d
L
2240
2241 return NULL;
2242}
2243
7dcb9820 2244const struct bfd_elf_special_section *
29ef7005 2245_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2246{
551b43fd
AM
2247 int i;
2248 const struct bfd_elf_special_section *spec;
29ef7005 2249 const struct elf_backend_data *bed;
2f89ff8d
L
2250
2251 /* See if this is one of the special sections. */
551b43fd
AM
2252 if (sec->name == NULL)
2253 return NULL;
2f89ff8d 2254
29ef7005
L
2255 bed = get_elf_backend_data (abfd);
2256 spec = bed->special_sections;
2257 if (spec)
2258 {
2259 spec = _bfd_elf_get_special_section (sec->name,
2260 bed->special_sections,
2261 sec->use_rela_p);
2262 if (spec != NULL)
2263 return spec;
2264 }
2265
551b43fd
AM
2266 if (sec->name[0] != '.')
2267 return NULL;
2f89ff8d 2268
551b43fd 2269 i = sec->name[1] - 'b';
1b315056 2270 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2271 return NULL;
2272
2273 spec = special_sections[i];
2f89ff8d 2274
551b43fd
AM
2275 if (spec == NULL)
2276 return NULL;
2277
2278 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2279}
2280
b34976b6 2281bfd_boolean
217aa764 2282_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2283{
2284 struct bfd_elf_section_data *sdata;
551b43fd 2285 const struct elf_backend_data *bed;
7dcb9820 2286 const struct bfd_elf_special_section *ssect;
252b5132 2287
f0abc2a1
AM
2288 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2289 if (sdata == NULL)
2290 {
a50b1753
NC
2291 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2292 sizeof (*sdata));
f0abc2a1
AM
2293 if (sdata == NULL)
2294 return FALSE;
217aa764 2295 sec->used_by_bfd = sdata;
f0abc2a1 2296 }
bf572ba0 2297
551b43fd
AM
2298 /* Indicate whether or not this section should use RELA relocations. */
2299 bed = get_elf_backend_data (abfd);
2300 sec->use_rela_p = bed->default_use_rela_p;
2301
e843e0f8
L
2302 /* When we read a file, we don't need to set ELF section type and
2303 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2304 anyway. We will set ELF section type and flags for all linker
2305 created sections. If user specifies BFD section flags, we will
2306 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2307 elf_fake_sections. Special handling for .init_array/.fini_array
2308 output sections since they may contain .ctors/.dtors input
2309 sections. We don't want _bfd_elf_init_private_section_data to
2310 copy ELF section type from .ctors/.dtors input sections. */
2311 if (abfd->direction != read_direction
3496cb2a 2312 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2313 {
551b43fd 2314 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2315 if (ssect != NULL
2316 && (!sec->flags
2317 || (sec->flags & SEC_LINKER_CREATED) != 0
2318 || ssect->type == SHT_INIT_ARRAY
2319 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2320 {
2321 elf_section_type (sec) = ssect->type;
2322 elf_section_flags (sec) = ssect->attr;
2323 }
2f89ff8d
L
2324 }
2325
f592407e 2326 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2327}
2328
2329/* Create a new bfd section from an ELF program header.
2330
2331 Since program segments have no names, we generate a synthetic name
2332 of the form segment<NUM>, where NUM is generally the index in the
2333 program header table. For segments that are split (see below) we
2334 generate the names segment<NUM>a and segment<NUM>b.
2335
2336 Note that some program segments may have a file size that is different than
2337 (less than) the memory size. All this means is that at execution the
2338 system must allocate the amount of memory specified by the memory size,
2339 but only initialize it with the first "file size" bytes read from the
2340 file. This would occur for example, with program segments consisting
2341 of combined data+bss.
2342
2343 To handle the above situation, this routine generates TWO bfd sections
2344 for the single program segment. The first has the length specified by
2345 the file size of the segment, and the second has the length specified
2346 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2347 into its initialized and uninitialized parts.
252b5132
RH
2348
2349 */
2350
b34976b6 2351bfd_boolean
217aa764
AM
2352_bfd_elf_make_section_from_phdr (bfd *abfd,
2353 Elf_Internal_Phdr *hdr,
91d6fa6a 2354 int hdr_index,
a50b1753 2355 const char *type_name)
252b5132
RH
2356{
2357 asection *newsect;
2358 char *name;
2359 char namebuf[64];
d4c88bbb 2360 size_t len;
252b5132
RH
2361 int split;
2362
2363 split = ((hdr->p_memsz > 0)
2364 && (hdr->p_filesz > 0)
2365 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2366
2367 if (hdr->p_filesz > 0)
252b5132 2368 {
91d6fa6a 2369 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2370 len = strlen (namebuf) + 1;
a50b1753 2371 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2372 if (!name)
2373 return FALSE;
2374 memcpy (name, namebuf, len);
2375 newsect = bfd_make_section (abfd, name);
2376 if (newsect == NULL)
2377 return FALSE;
2378 newsect->vma = hdr->p_vaddr;
2379 newsect->lma = hdr->p_paddr;
2380 newsect->size = hdr->p_filesz;
2381 newsect->filepos = hdr->p_offset;
2382 newsect->flags |= SEC_HAS_CONTENTS;
2383 newsect->alignment_power = bfd_log2 (hdr->p_align);
2384 if (hdr->p_type == PT_LOAD)
252b5132 2385 {
d5191d0c
AM
2386 newsect->flags |= SEC_ALLOC;
2387 newsect->flags |= SEC_LOAD;
2388 if (hdr->p_flags & PF_X)
2389 {
2390 /* FIXME: all we known is that it has execute PERMISSION,
2391 may be data. */
2392 newsect->flags |= SEC_CODE;
2393 }
2394 }
2395 if (!(hdr->p_flags & PF_W))
2396 {
2397 newsect->flags |= SEC_READONLY;
252b5132 2398 }
252b5132
RH
2399 }
2400
d5191d0c 2401 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2402 {
d5191d0c
AM
2403 bfd_vma align;
2404
91d6fa6a 2405 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2406 len = strlen (namebuf) + 1;
a50b1753 2407 name = (char *) bfd_alloc (abfd, len);
252b5132 2408 if (!name)
b34976b6 2409 return FALSE;
d4c88bbb 2410 memcpy (name, namebuf, len);
252b5132
RH
2411 newsect = bfd_make_section (abfd, name);
2412 if (newsect == NULL)
b34976b6 2413 return FALSE;
252b5132
RH
2414 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2415 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2416 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2417 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2418 align = newsect->vma & -newsect->vma;
2419 if (align == 0 || align > hdr->p_align)
2420 align = hdr->p_align;
2421 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2422 if (hdr->p_type == PT_LOAD)
2423 {
d5191d0c
AM
2424 /* Hack for gdb. Segments that have not been modified do
2425 not have their contents written to a core file, on the
2426 assumption that a debugger can find the contents in the
2427 executable. We flag this case by setting the fake
2428 section size to zero. Note that "real" bss sections will
2429 always have their contents dumped to the core file. */
2430 if (bfd_get_format (abfd) == bfd_core)
2431 newsect->size = 0;
252b5132
RH
2432 newsect->flags |= SEC_ALLOC;
2433 if (hdr->p_flags & PF_X)
2434 newsect->flags |= SEC_CODE;
2435 }
2436 if (!(hdr->p_flags & PF_W))
2437 newsect->flags |= SEC_READONLY;
2438 }
2439
b34976b6 2440 return TRUE;
252b5132
RH
2441}
2442
b34976b6 2443bfd_boolean
91d6fa6a 2444bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2445{
9c5bfbb7 2446 const struct elf_backend_data *bed;
20cfcaae
NC
2447
2448 switch (hdr->p_type)
2449 {
2450 case PT_NULL:
91d6fa6a 2451 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2452
2453 case PT_LOAD:
91d6fa6a 2454 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2455
2456 case PT_DYNAMIC:
91d6fa6a 2457 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2458
2459 case PT_INTERP:
91d6fa6a 2460 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2461
2462 case PT_NOTE:
91d6fa6a 2463 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2464 return FALSE;
718175fa 2465 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2466 return FALSE;
2467 return TRUE;
20cfcaae
NC
2468
2469 case PT_SHLIB:
91d6fa6a 2470 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2471
2472 case PT_PHDR:
91d6fa6a 2473 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2474
811072d8 2475 case PT_GNU_EH_FRAME:
91d6fa6a 2476 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2477 "eh_frame_hdr");
2478
2b05f1b7 2479 case PT_GNU_STACK:
91d6fa6a 2480 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2481
8c37241b 2482 case PT_GNU_RELRO:
91d6fa6a 2483 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2484
20cfcaae 2485 default:
8c1acd09 2486 /* Check for any processor-specific program segment types. */
20cfcaae 2487 bed = get_elf_backend_data (abfd);
91d6fa6a 2488 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2489 }
2490}
2491
d4730f92
BS
2492/* Return the REL_HDR for SEC, assuming there is only a single one, either
2493 REL or RELA. */
2494
2495Elf_Internal_Shdr *
2496_bfd_elf_single_rel_hdr (asection *sec)
2497{
2498 if (elf_section_data (sec)->rel.hdr)
2499 {
2500 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
2501 return elf_section_data (sec)->rel.hdr;
2502 }
2503 else
2504 return elf_section_data (sec)->rela.hdr;
2505}
2506
2507/* Allocate and initialize a section-header for a new reloc section,
2508 containing relocations against ASECT. It is stored in RELDATA. If
2509 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
2510 relocations. */
23bc299b 2511
b34976b6 2512bfd_boolean
217aa764 2513_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 2514 struct bfd_elf_section_reloc_data *reldata,
217aa764
AM
2515 asection *asect,
2516 bfd_boolean use_rela_p)
23bc299b 2517{
d4730f92 2518 Elf_Internal_Shdr *rel_hdr;
23bc299b 2519 char *name;
9c5bfbb7 2520 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92
BS
2521 bfd_size_type amt;
2522
2523 amt = sizeof (Elf_Internal_Shdr);
2524 BFD_ASSERT (reldata->hdr == NULL);
2525 rel_hdr = bfd_zalloc (abfd, amt);
2526 reldata->hdr = rel_hdr;
23bc299b 2527
d4730f92 2528 amt = sizeof ".rela" + strlen (asect->name);
a50b1753 2529 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2530 if (name == NULL)
b34976b6 2531 return FALSE;
23bc299b
MM
2532 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2533 rel_hdr->sh_name =
2b0f7ef9 2534 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2535 FALSE);
23bc299b 2536 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2537 return FALSE;
23bc299b
MM
2538 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2539 rel_hdr->sh_entsize = (use_rela_p
2540 ? bed->s->sizeof_rela
2541 : bed->s->sizeof_rel);
72de5009 2542 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2543 rel_hdr->sh_flags = 0;
2544 rel_hdr->sh_addr = 0;
2545 rel_hdr->sh_size = 0;
2546 rel_hdr->sh_offset = 0;
2547
b34976b6 2548 return TRUE;
23bc299b
MM
2549}
2550
94be91de
JB
2551/* Return the default section type based on the passed in section flags. */
2552
2553int
2554bfd_elf_get_default_section_type (flagword flags)
2555{
2556 if ((flags & SEC_ALLOC) != 0
2e76e85a 2557 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
2558 return SHT_NOBITS;
2559 return SHT_PROGBITS;
2560}
2561
d4730f92
BS
2562struct fake_section_arg
2563{
2564 struct bfd_link_info *link_info;
2565 bfd_boolean failed;
2566};
2567
252b5132
RH
2568/* Set up an ELF internal section header for a section. */
2569
252b5132 2570static void
d4730f92 2571elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 2572{
d4730f92 2573 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 2574 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 2575 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 2576 Elf_Internal_Shdr *this_hdr;
0414f35b 2577 unsigned int sh_type;
252b5132 2578
d4730f92 2579 if (arg->failed)
252b5132
RH
2580 {
2581 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2582 loop. */
252b5132
RH
2583 return;
2584 }
2585
d4730f92 2586 this_hdr = &esd->this_hdr;
252b5132 2587
e57b5356
AM
2588 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2589 asect->name, FALSE);
2590 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2591 {
d4730f92 2592 arg->failed = TRUE;
252b5132
RH
2593 return;
2594 }
2595
a4d8e49b 2596 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2597
2598 if ((asect->flags & SEC_ALLOC) != 0
2599 || asect->user_set_vma)
2600 this_hdr->sh_addr = asect->vma;
2601 else
2602 this_hdr->sh_addr = 0;
2603
2604 this_hdr->sh_offset = 0;
eea6121a 2605 this_hdr->sh_size = asect->size;
252b5132 2606 this_hdr->sh_link = 0;
72de5009 2607 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2608 /* The sh_entsize and sh_info fields may have been set already by
2609 copy_private_section_data. */
2610
2611 this_hdr->bfd_section = asect;
2612 this_hdr->contents = NULL;
2613
3cddba1e
L
2614 /* If the section type is unspecified, we set it based on
2615 asect->flags. */
98ece1b3
AM
2616 if ((asect->flags & SEC_GROUP) != 0)
2617 sh_type = SHT_GROUP;
98ece1b3 2618 else
94be91de 2619 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2620
3cddba1e 2621 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2622 this_hdr->sh_type = sh_type;
2623 else if (this_hdr->sh_type == SHT_NOBITS
2624 && sh_type == SHT_PROGBITS
2625 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2626 {
98ece1b3
AM
2627 /* Warn if we are changing a NOBITS section to PROGBITS, but
2628 allow the link to proceed. This can happen when users link
2629 non-bss input sections to bss output sections, or emit data
2630 to a bss output section via a linker script. */
2631 (*_bfd_error_handler)
58f0869b 2632 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2633 this_hdr->sh_type = sh_type;
3cddba1e
L
2634 }
2635
2f89ff8d 2636 switch (this_hdr->sh_type)
252b5132 2637 {
2f89ff8d 2638 default:
2f89ff8d
L
2639 break;
2640
2641 case SHT_STRTAB:
2642 case SHT_INIT_ARRAY:
2643 case SHT_FINI_ARRAY:
2644 case SHT_PREINIT_ARRAY:
2645 case SHT_NOTE:
2646 case SHT_NOBITS:
2647 case SHT_PROGBITS:
2648 break;
2649
2650 case SHT_HASH:
c7ac6ff8 2651 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2652 break;
5de3bf90 2653
2f89ff8d 2654 case SHT_DYNSYM:
252b5132 2655 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2656 break;
2657
2658 case SHT_DYNAMIC:
252b5132 2659 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2660 break;
2661
2662 case SHT_RELA:
2663 if (get_elf_backend_data (abfd)->may_use_rela_p)
2664 this_hdr->sh_entsize = bed->s->sizeof_rela;
2665 break;
2666
2667 case SHT_REL:
2668 if (get_elf_backend_data (abfd)->may_use_rel_p)
2669 this_hdr->sh_entsize = bed->s->sizeof_rel;
2670 break;
2671
2672 case SHT_GNU_versym:
252b5132 2673 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2674 break;
2675
2676 case SHT_GNU_verdef:
252b5132
RH
2677 this_hdr->sh_entsize = 0;
2678 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2679 cverdefs. The linker will set cverdefs, but sh_info will be
2680 zero. */
252b5132
RH
2681 if (this_hdr->sh_info == 0)
2682 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2683 else
2684 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2685 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2686 break;
2687
2688 case SHT_GNU_verneed:
252b5132
RH
2689 this_hdr->sh_entsize = 0;
2690 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2691 cverrefs. The linker will set cverrefs, but sh_info will be
2692 zero. */
252b5132
RH
2693 if (this_hdr->sh_info == 0)
2694 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2695 else
2696 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2697 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2698 break;
2699
2700 case SHT_GROUP:
1783205a 2701 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2702 break;
fdc90cb4
JJ
2703
2704 case SHT_GNU_HASH:
2705 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2706 break;
dbb410c3 2707 }
252b5132
RH
2708
2709 if ((asect->flags & SEC_ALLOC) != 0)
2710 this_hdr->sh_flags |= SHF_ALLOC;
2711 if ((asect->flags & SEC_READONLY) == 0)
2712 this_hdr->sh_flags |= SHF_WRITE;
2713 if ((asect->flags & SEC_CODE) != 0)
2714 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2715 if ((asect->flags & SEC_MERGE) != 0)
2716 {
2717 this_hdr->sh_flags |= SHF_MERGE;
2718 this_hdr->sh_entsize = asect->entsize;
2719 if ((asect->flags & SEC_STRINGS) != 0)
2720 this_hdr->sh_flags |= SHF_STRINGS;
2721 }
1126897b 2722 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2723 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2724 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2725 {
2726 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2727 if (asect->size == 0
2728 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2729 {
3a800eb9 2730 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2731
704afa60 2732 this_hdr->sh_size = 0;
3a800eb9
AM
2733 if (o != NULL)
2734 {
704afa60 2735 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2736 if (this_hdr->sh_size != 0)
2737 this_hdr->sh_type = SHT_NOBITS;
2738 }
704afa60
JJ
2739 }
2740 }
18ae9cc1
L
2741 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
2742 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 2743
d4730f92
BS
2744 /* If the section has relocs, set up a section header for the
2745 SHT_REL[A] section. If two relocation sections are required for
2746 this section, it is up to the processor-specific back-end to
2747 create the other. */
2748 if ((asect->flags & SEC_RELOC) != 0)
2749 {
2750 /* When doing a relocatable link, create both REL and RELA sections if
2751 needed. */
2752 if (arg->link_info
2753 /* Do the normal setup if we wouldn't create any sections here. */
2754 && esd->rel.count + esd->rela.count > 0
2755 && (arg->link_info->relocatable || arg->link_info->emitrelocations))
2756 {
2757 if (esd->rel.count && esd->rel.hdr == NULL
2758 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, asect, FALSE))
2759 {
2760 arg->failed = TRUE;
2761 return;
2762 }
2763 if (esd->rela.count && esd->rela.hdr == NULL
2764 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, asect, TRUE))
2765 {
2766 arg->failed = TRUE;
2767 return;
2768 }
2769 }
2770 else if (!_bfd_elf_init_reloc_shdr (abfd,
2771 (asect->use_rela_p
2772 ? &esd->rela : &esd->rel),
2773 asect,
2774 asect->use_rela_p))
2775 arg->failed = TRUE;
2776 }
2777
252b5132 2778 /* Check for processor-specific section types. */
0414f35b 2779 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2780 if (bed->elf_backend_fake_sections
2781 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 2782 arg->failed = TRUE;
252b5132 2783
42bb2e33 2784 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2785 {
2786 /* Don't change the header type from NOBITS if we are being
42bb2e33 2787 called for objcopy --only-keep-debug. */
0414f35b
AM
2788 this_hdr->sh_type = sh_type;
2789 }
252b5132
RH
2790}
2791
bcacc0f5
AM
2792/* Fill in the contents of a SHT_GROUP section. Called from
2793 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2794 when ELF targets use the generic linker, ld. Called for ld -r
2795 from bfd_elf_final_link. */
dbb410c3 2796
1126897b 2797void
217aa764 2798bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2799{
a50b1753 2800 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2801 asection *elt, *first;
dbb410c3 2802 unsigned char *loc;
b34976b6 2803 bfd_boolean gas;
dbb410c3 2804
7e4111ad
L
2805 /* Ignore linker created group section. See elfNN_ia64_object_p in
2806 elfxx-ia64.c. */
2807 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2808 || *failedptr)
2809 return;
2810
bcacc0f5
AM
2811 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2812 {
2813 unsigned long symindx = 0;
2814
2815 /* elf_group_id will have been set up by objcopy and the
2816 generic linker. */
2817 if (elf_group_id (sec) != NULL)
2818 symindx = elf_group_id (sec)->udata.i;
1126897b 2819
bcacc0f5
AM
2820 if (symindx == 0)
2821 {
2822 /* If called from the assembler, swap_out_syms will have set up
2823 elf_section_syms. */
2824 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2825 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2826 }
2827 elf_section_data (sec)->this_hdr.sh_info = symindx;
2828 }
2829 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2830 {
bcacc0f5
AM
2831 /* The ELF backend linker sets sh_info to -2 when the group
2832 signature symbol is global, and thus the index can't be
2833 set until all local symbols are output. */
2834 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2835 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2836 unsigned long symndx = sec_data->this_hdr.sh_info;
2837 unsigned long extsymoff = 0;
2838 struct elf_link_hash_entry *h;
2839
2840 if (!elf_bad_symtab (igroup->owner))
2841 {
2842 Elf_Internal_Shdr *symtab_hdr;
2843
2844 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2845 extsymoff = symtab_hdr->sh_info;
2846 }
2847 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2848 while (h->root.type == bfd_link_hash_indirect
2849 || h->root.type == bfd_link_hash_warning)
2850 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2851
2852 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2853 }
dbb410c3 2854
1126897b 2855 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2856 gas = TRUE;
dbb410c3
AM
2857 if (sec->contents == NULL)
2858 {
b34976b6 2859 gas = FALSE;
a50b1753 2860 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
2861
2862 /* Arrange for the section to be written out. */
2863 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2864 if (sec->contents == NULL)
2865 {
b34976b6 2866 *failedptr = TRUE;
dbb410c3
AM
2867 return;
2868 }
2869 }
2870
eea6121a 2871 loc = sec->contents + sec->size;
dbb410c3 2872
9dce4196
AM
2873 /* Get the pointer to the first section in the group that gas
2874 squirreled away here. objcopy arranges for this to be set to the
2875 start of the input section group. */
2876 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2877
2878 /* First element is a flag word. Rest of section is elf section
2879 indices for all the sections of the group. Write them backwards
2880 just to keep the group in the same order as given in .section
2881 directives, not that it matters. */
2882 while (elt != NULL)
2883 {
9dce4196 2884 asection *s;
9dce4196 2885
9dce4196 2886 s = elt;
415f38a6
AM
2887 if (!gas)
2888 s = s->output_section;
2889 if (s != NULL
2890 && !bfd_is_abs_section (s))
01e1a5bc 2891 {
415f38a6
AM
2892 unsigned int idx = elf_section_data (s)->this_idx;
2893
01e1a5bc 2894 loc -= 4;
01e1a5bc
NC
2895 H_PUT_32 (abfd, idx, loc);
2896 }
945906ff 2897 elt = elf_next_in_group (elt);
9dce4196
AM
2898 if (elt == first)
2899 break;
dbb410c3
AM
2900 }
2901
3d7f7666 2902 if ((loc -= 4) != sec->contents)
9dce4196 2903 abort ();
dbb410c3 2904
9dce4196 2905 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2906}
2907
252b5132
RH
2908/* Assign all ELF section numbers. The dummy first section is handled here
2909 too. The link/info pointers for the standard section types are filled
2910 in here too, while we're at it. */
2911
b34976b6 2912static bfd_boolean
da9f89d4 2913assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2914{
2915 struct elf_obj_tdata *t = elf_tdata (abfd);
2916 asection *sec;
2b0f7ef9 2917 unsigned int section_number, secn;
252b5132 2918 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2919 struct bfd_elf_section_data *d;
3516e984 2920 bfd_boolean need_symtab;
252b5132
RH
2921
2922 section_number = 1;
2923
2b0f7ef9
JJ
2924 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2925
da9f89d4
L
2926 /* SHT_GROUP sections are in relocatable files only. */
2927 if (link_info == NULL || link_info->relocatable)
252b5132 2928 {
da9f89d4 2929 /* Put SHT_GROUP sections first. */
04dd1667 2930 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2931 {
5daa8fe7 2932 d = elf_section_data (sec);
da9f89d4
L
2933
2934 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2935 {
5daa8fe7 2936 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2937 {
2938 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2939 bfd_section_list_remove (abfd, sec);
da9f89d4 2940 abfd->section_count--;
da9f89d4 2941 }
08a40648 2942 else
4fbb74a6 2943 d->this_idx = section_number++;
da9f89d4 2944 }
47cc2cf5
PB
2945 }
2946 }
2947
2948 for (sec = abfd->sections; sec; sec = sec->next)
2949 {
2950 d = elf_section_data (sec);
2951
2952 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2953 d->this_idx = section_number++;
2b0f7ef9 2954 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 2955 if (d->rel.hdr)
2b0f7ef9 2956 {
d4730f92
BS
2957 d->rel.idx = section_number++;
2958 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 2959 }
d4730f92
BS
2960 else
2961 d->rel.idx = 0;
23bc299b 2962
d4730f92 2963 if (d->rela.hdr)
2b0f7ef9 2964 {
d4730f92
BS
2965 d->rela.idx = section_number++;
2966 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 2967 }
23bc299b 2968 else
d4730f92 2969 d->rela.idx = 0;
252b5132
RH
2970 }
2971
2972 t->shstrtab_section = section_number++;
2b0f7ef9 2973 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2974 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132 2975
3516e984
L
2976 need_symtab = (bfd_get_symcount (abfd) > 0
2977 || (link_info == NULL
2978 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2979 == HAS_RELOC)));
2980 if (need_symtab)
252b5132
RH
2981 {
2982 t->symtab_section = section_number++;
2b0f7ef9 2983 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 2984 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 2985 {
9ad5cbcf
AM
2986 t->symtab_shndx_section = section_number++;
2987 t->symtab_shndx_hdr.sh_name
2988 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2989 ".symtab_shndx", FALSE);
9ad5cbcf 2990 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2991 return FALSE;
9ad5cbcf 2992 }
252b5132 2993 t->strtab_section = section_number++;
2b0f7ef9 2994 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2995 }
2996
2b0f7ef9
JJ
2997 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2998 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2999
3000 elf_numsections (abfd) = section_number;
252b5132
RH
3001 elf_elfheader (abfd)->e_shnum = section_number;
3002
3003 /* Set up the list of section header pointers, in agreement with the
3004 indices. */
a50b1753
NC
3005 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3006 sizeof (Elf_Internal_Shdr *));
252b5132 3007 if (i_shdrp == NULL)
b34976b6 3008 return FALSE;
252b5132 3009
a50b1753
NC
3010 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3011 sizeof (Elf_Internal_Shdr));
252b5132
RH
3012 if (i_shdrp[0] == NULL)
3013 {
3014 bfd_release (abfd, i_shdrp);
b34976b6 3015 return FALSE;
252b5132 3016 }
252b5132
RH
3017
3018 elf_elfsections (abfd) = i_shdrp;
3019
3020 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3516e984 3021 if (need_symtab)
252b5132
RH
3022 {
3023 i_shdrp[t->symtab_section] = &t->symtab_hdr;
4fbb74a6 3024 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf
AM
3025 {
3026 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3027 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3028 }
252b5132
RH
3029 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3030 t->symtab_hdr.sh_link = t->strtab_section;
3031 }
38ce5b11 3032
252b5132
RH
3033 for (sec = abfd->sections; sec; sec = sec->next)
3034 {
252b5132
RH
3035 asection *s;
3036 const char *name;
3037
91d6fa6a
NC
3038 d = elf_section_data (sec);
3039
252b5132 3040 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3041 if (d->rel.idx != 0)
3042 i_shdrp[d->rel.idx] = d->rel.hdr;
3043 if (d->rela.idx != 0)
3044 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3045
3046 /* Fill in the sh_link and sh_info fields while we're at it. */
3047
3048 /* sh_link of a reloc section is the section index of the symbol
3049 table. sh_info is the section index of the section to which
3050 the relocation entries apply. */
d4730f92 3051 if (d->rel.idx != 0)
252b5132 3052 {
d4730f92
BS
3053 d->rel.hdr->sh_link = t->symtab_section;
3054 d->rel.hdr->sh_info = d->this_idx;
252b5132 3055 }
d4730f92 3056 if (d->rela.idx != 0)
23bc299b 3057 {
d4730f92
BS
3058 d->rela.hdr->sh_link = t->symtab_section;
3059 d->rela.hdr->sh_info = d->this_idx;
23bc299b 3060 }
252b5132 3061
38ce5b11
L
3062 /* We need to set up sh_link for SHF_LINK_ORDER. */
3063 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3064 {
3065 s = elf_linked_to_section (sec);
3066 if (s)
38ce5b11 3067 {
f2876037 3068 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3069 if (link_info != NULL)
38ce5b11 3070 {
f2876037 3071 /* Check discarded linkonce section. */
ccd2ec6a 3072 if (elf_discarded_section (s))
38ce5b11 3073 {
ccd2ec6a
L
3074 asection *kept;
3075 (*_bfd_error_handler)
3076 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3077 abfd, d->this_hdr.bfd_section,
3078 s, s->owner);
3079 /* Point to the kept section if it has the same
3080 size as the discarded one. */
c0f00686 3081 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3082 if (kept == NULL)
185d09ad 3083 {
ccd2ec6a
L
3084 bfd_set_error (bfd_error_bad_value);
3085 return FALSE;
185d09ad 3086 }
ccd2ec6a 3087 s = kept;
38ce5b11 3088 }
e424ecc8 3089
ccd2ec6a
L
3090 s = s->output_section;
3091 BFD_ASSERT (s != NULL);
38ce5b11 3092 }
f2876037
L
3093 else
3094 {
3095 /* Handle objcopy. */
3096 if (s->output_section == NULL)
3097 {
3098 (*_bfd_error_handler)
3099 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3100 abfd, d->this_hdr.bfd_section, s, s->owner);
3101 bfd_set_error (bfd_error_bad_value);
3102 return FALSE;
3103 }
3104 s = s->output_section;
3105 }
ccd2ec6a
L
3106 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3107 }
3108 else
3109 {
3110 /* PR 290:
3111 The Intel C compiler generates SHT_IA_64_UNWIND with
3112 SHF_LINK_ORDER. But it doesn't set the sh_link or
3113 sh_info fields. Hence we could get the situation
08a40648 3114 where s is NULL. */
ccd2ec6a
L
3115 const struct elf_backend_data *bed
3116 = get_elf_backend_data (abfd);
3117 if (bed->link_order_error_handler)
3118 bed->link_order_error_handler
3119 (_("%B: warning: sh_link not set for section `%A'"),
3120 abfd, sec);
38ce5b11
L
3121 }
3122 }
3123
252b5132
RH
3124 switch (d->this_hdr.sh_type)
3125 {
3126 case SHT_REL:
3127 case SHT_RELA:
3128 /* A reloc section which we are treating as a normal BFD
3129 section. sh_link is the section index of the symbol
3130 table. sh_info is the section index of the section to
3131 which the relocation entries apply. We assume that an
3132 allocated reloc section uses the dynamic symbol table.
3133 FIXME: How can we be sure? */
3134 s = bfd_get_section_by_name (abfd, ".dynsym");
3135 if (s != NULL)
3136 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3137
3138 /* We look up the section the relocs apply to by name. */
3139 name = sec->name;
3140 if (d->this_hdr.sh_type == SHT_REL)
3141 name += 4;
3142 else
3143 name += 5;
3144 s = bfd_get_section_by_name (abfd, name);
3145 if (s != NULL)
3146 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3147 break;
3148
3149 case SHT_STRTAB:
3150 /* We assume that a section named .stab*str is a stabs
3151 string section. We look for a section with the same name
3152 but without the trailing ``str'', and set its sh_link
3153 field to point to this section. */
0112cd26 3154 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3155 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3156 {
3157 size_t len;
3158 char *alc;
3159
3160 len = strlen (sec->name);
a50b1753 3161 alc = (char *) bfd_malloc (len - 2);
252b5132 3162 if (alc == NULL)
b34976b6 3163 return FALSE;
d4c88bbb 3164 memcpy (alc, sec->name, len - 3);
252b5132
RH
3165 alc[len - 3] = '\0';
3166 s = bfd_get_section_by_name (abfd, alc);
3167 free (alc);
3168 if (s != NULL)
3169 {
3170 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3171
3172 /* This is a .stab section. */
0594c12d
AM
3173 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3174 elf_section_data (s)->this_hdr.sh_entsize
3175 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3176 }
3177 }
3178 break;
3179
3180 case SHT_DYNAMIC:
3181 case SHT_DYNSYM:
3182 case SHT_GNU_verneed:
3183 case SHT_GNU_verdef:
3184 /* sh_link is the section header index of the string table
3185 used for the dynamic entries, or the symbol table, or the
3186 version strings. */
3187 s = bfd_get_section_by_name (abfd, ".dynstr");
3188 if (s != NULL)
3189 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3190 break;
3191
7f1204bb
JJ
3192 case SHT_GNU_LIBLIST:
3193 /* sh_link is the section header index of the prelink library
08a40648
AM
3194 list used for the dynamic entries, or the symbol table, or
3195 the version strings. */
7f1204bb
JJ
3196 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3197 ? ".dynstr" : ".gnu.libstr");
3198 if (s != NULL)
3199 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3200 break;
3201
252b5132 3202 case SHT_HASH:
fdc90cb4 3203 case SHT_GNU_HASH:
252b5132
RH
3204 case SHT_GNU_versym:
3205 /* sh_link is the section header index of the symbol table
3206 this hash table or version table is for. */
3207 s = bfd_get_section_by_name (abfd, ".dynsym");
3208 if (s != NULL)
3209 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3210 break;
dbb410c3
AM
3211
3212 case SHT_GROUP:
3213 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3214 }
3215 }
3216
2b0f7ef9 3217 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3218 if (i_shdrp[secn] == NULL)
3219 i_shdrp[secn] = i_shdrp[0];
3220 else
3221 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3222 i_shdrp[secn]->sh_name);
b34976b6 3223 return TRUE;
252b5132
RH
3224}
3225
3226/* Map symbol from it's internal number to the external number, moving
3227 all local symbols to be at the head of the list. */
3228
5372391b 3229static bfd_boolean
217aa764 3230sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3231{
3232 /* If the backend has a special mapping, use it. */
9c5bfbb7 3233 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3234 if (bed->elf_backend_sym_is_global)
3235 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3236
e47bf690 3237 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3238 || bfd_is_und_section (bfd_get_section (sym))
3239 || bfd_is_com_section (bfd_get_section (sym)));
3240}
3241
5372391b 3242/* Don't output section symbols for sections that are not going to be
0f0a5e58 3243 output. */
5372391b
AM
3244
3245static bfd_boolean
3246ignore_section_sym (bfd *abfd, asymbol *sym)
3247{
3248 return ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58
AM
3249 && !(sym->section->owner == abfd
3250 || (sym->section->output_section->owner == abfd
3251 && sym->section->output_offset == 0)));
5372391b
AM
3252}
3253
b34976b6 3254static bfd_boolean
217aa764 3255elf_map_symbols (bfd *abfd)
252b5132 3256{
dc810e39 3257 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3258 asymbol **syms = bfd_get_outsymbols (abfd);
3259 asymbol **sect_syms;
dc810e39
AM
3260 unsigned int num_locals = 0;
3261 unsigned int num_globals = 0;
3262 unsigned int num_locals2 = 0;
3263 unsigned int num_globals2 = 0;
252b5132 3264 int max_index = 0;
dc810e39 3265 unsigned int idx;
252b5132
RH
3266 asection *asect;
3267 asymbol **new_syms;
252b5132
RH
3268
3269#ifdef DEBUG
3270 fprintf (stderr, "elf_map_symbols\n");
3271 fflush (stderr);
3272#endif
3273
252b5132
RH
3274 for (asect = abfd->sections; asect; asect = asect->next)
3275 {
3276 if (max_index < asect->index)
3277 max_index = asect->index;
3278 }
3279
3280 max_index++;
a50b1753 3281 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3282 if (sect_syms == NULL)
b34976b6 3283 return FALSE;
252b5132 3284 elf_section_syms (abfd) = sect_syms;
4e89ac30 3285 elf_num_section_syms (abfd) = max_index;
252b5132 3286
079e9a2f
AM
3287 /* Init sect_syms entries for any section symbols we have already
3288 decided to output. */
252b5132
RH
3289 for (idx = 0; idx < symcount; idx++)
3290 {
dc810e39 3291 asymbol *sym = syms[idx];
c044fabd 3292
252b5132 3293 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3294 && sym->value == 0
5372391b 3295 && !ignore_section_sym (abfd, sym))
252b5132 3296 {
5372391b 3297 asection *sec = sym->section;
252b5132 3298
5372391b
AM
3299 if (sec->owner != abfd)
3300 sec = sec->output_section;
252b5132 3301
5372391b 3302 sect_syms[sec->index] = syms[idx];
252b5132
RH
3303 }
3304 }
3305
252b5132
RH
3306 /* Classify all of the symbols. */
3307 for (idx = 0; idx < symcount; idx++)
3308 {
5372391b
AM
3309 if (ignore_section_sym (abfd, syms[idx]))
3310 continue;
252b5132
RH
3311 if (!sym_is_global (abfd, syms[idx]))
3312 num_locals++;
3313 else
3314 num_globals++;
3315 }
079e9a2f 3316
5372391b 3317 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3318 sections will already have a section symbol in outsymbols, but
3319 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3320 at least in that case. */
252b5132
RH
3321 for (asect = abfd->sections; asect; asect = asect->next)
3322 {
079e9a2f 3323 if (sect_syms[asect->index] == NULL)
252b5132 3324 {
079e9a2f 3325 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3326 num_locals++;
3327 else
3328 num_globals++;
252b5132
RH
3329 }
3330 }
3331
3332 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3333 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3334 sizeof (asymbol *));
dc810e39 3335
252b5132 3336 if (new_syms == NULL)
b34976b6 3337 return FALSE;
252b5132
RH
3338
3339 for (idx = 0; idx < symcount; idx++)
3340 {
3341 asymbol *sym = syms[idx];
dc810e39 3342 unsigned int i;
252b5132 3343
5372391b
AM
3344 if (ignore_section_sym (abfd, sym))
3345 continue;
252b5132
RH
3346 if (!sym_is_global (abfd, sym))
3347 i = num_locals2++;
3348 else
3349 i = num_locals + num_globals2++;
3350 new_syms[i] = sym;
3351 sym->udata.i = i + 1;
3352 }
3353 for (asect = abfd->sections; asect; asect = asect->next)
3354 {
079e9a2f 3355 if (sect_syms[asect->index] == NULL)
252b5132 3356 {
079e9a2f 3357 asymbol *sym = asect->symbol;
dc810e39 3358 unsigned int i;
252b5132 3359
079e9a2f 3360 sect_syms[asect->index] = sym;
252b5132
RH
3361 if (!sym_is_global (abfd, sym))
3362 i = num_locals2++;
3363 else
3364 i = num_locals + num_globals2++;
3365 new_syms[i] = sym;
3366 sym->udata.i = i + 1;
3367 }
3368 }
3369
3370 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3371
3372 elf_num_locals (abfd) = num_locals;
3373 elf_num_globals (abfd) = num_globals;
b34976b6 3374 return TRUE;
252b5132
RH
3375}
3376
3377/* Align to the maximum file alignment that could be required for any
3378 ELF data structure. */
3379
268b6b39 3380static inline file_ptr
217aa764 3381align_file_position (file_ptr off, int align)
252b5132
RH
3382{
3383 return (off + align - 1) & ~(align - 1);
3384}
3385
3386/* Assign a file position to a section, optionally aligning to the
3387 required section alignment. */
3388
217aa764
AM
3389file_ptr
3390_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3391 file_ptr offset,
3392 bfd_boolean align)
252b5132 3393{
72de5009
AM
3394 if (align && i_shdrp->sh_addralign > 1)
3395 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3396 i_shdrp->sh_offset = offset;
3397 if (i_shdrp->bfd_section != NULL)
3398 i_shdrp->bfd_section->filepos = offset;
3399 if (i_shdrp->sh_type != SHT_NOBITS)
3400 offset += i_shdrp->sh_size;
3401 return offset;
3402}
3403
3404/* Compute the file positions we are going to put the sections at, and
3405 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3406 is not NULL, this is being called by the ELF backend linker. */
3407
b34976b6 3408bfd_boolean
217aa764
AM
3409_bfd_elf_compute_section_file_positions (bfd *abfd,
3410 struct bfd_link_info *link_info)
252b5132 3411{
9c5bfbb7 3412 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3413 struct fake_section_arg fsargs;
b34976b6 3414 bfd_boolean failed;
4b6c0f2f 3415 struct bfd_strtab_hash *strtab = NULL;
252b5132 3416 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3417 bfd_boolean need_symtab;
252b5132
RH
3418
3419 if (abfd->output_has_begun)
b34976b6 3420 return TRUE;
252b5132
RH
3421
3422 /* Do any elf backend specific processing first. */
3423 if (bed->elf_backend_begin_write_processing)
3424 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3425
3426 if (! prep_headers (abfd))
b34976b6 3427 return FALSE;
252b5132 3428
e6c51ed4
NC
3429 /* Post process the headers if necessary. */
3430 if (bed->elf_backend_post_process_headers)
3431 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3432
d4730f92
BS
3433 fsargs.failed = FALSE;
3434 fsargs.link_info = link_info;
3435 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
3436 if (fsargs.failed)
b34976b6 3437 return FALSE;
252b5132 3438
da9f89d4 3439 if (!assign_section_numbers (abfd, link_info))
b34976b6 3440 return FALSE;
252b5132
RH
3441
3442 /* The backend linker builds symbol table information itself. */
3516e984
L
3443 need_symtab = (link_info == NULL
3444 && (bfd_get_symcount (abfd) > 0
3445 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3446 == HAS_RELOC)));
3447 if (need_symtab)
252b5132
RH
3448 {
3449 /* Non-zero if doing a relocatable link. */
3450 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3451
3452 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3453 return FALSE;
252b5132
RH
3454 }
3455
d4730f92 3456 failed = FALSE;
1126897b 3457 if (link_info == NULL)
dbb410c3 3458 {
1126897b 3459 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3460 if (failed)
b34976b6 3461 return FALSE;
dbb410c3
AM
3462 }
3463
252b5132
RH
3464 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3465 /* sh_name was set in prep_headers. */
3466 shstrtab_hdr->sh_type = SHT_STRTAB;
3467 shstrtab_hdr->sh_flags = 0;
3468 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3469 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3470 shstrtab_hdr->sh_entsize = 0;
3471 shstrtab_hdr->sh_link = 0;
3472 shstrtab_hdr->sh_info = 0;
3473 /* sh_offset is set in assign_file_positions_except_relocs. */
3474 shstrtab_hdr->sh_addralign = 1;
3475
c84fca4d 3476 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3477 return FALSE;
252b5132 3478
3516e984 3479 if (need_symtab)
252b5132
RH
3480 {
3481 file_ptr off;
3482 Elf_Internal_Shdr *hdr;
3483
3484 off = elf_tdata (abfd)->next_file_pos;
3485
3486 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3487 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3488
9ad5cbcf
AM
3489 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3490 if (hdr->sh_size != 0)
b34976b6 3491 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3492
252b5132 3493 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3494 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3495
3496 elf_tdata (abfd)->next_file_pos = off;
3497
3498 /* Now that we know where the .strtab section goes, write it
08a40648 3499 out. */
252b5132
RH
3500 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3501 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3502 return FALSE;
252b5132
RH
3503 _bfd_stringtab_free (strtab);
3504 }
3505
b34976b6 3506 abfd->output_has_begun = TRUE;
252b5132 3507
b34976b6 3508 return TRUE;
252b5132
RH
3509}
3510
8ded5a0f
AM
3511/* Make an initial estimate of the size of the program header. If we
3512 get the number wrong here, we'll redo section placement. */
3513
3514static bfd_size_type
3515get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3516{
3517 size_t segs;
3518 asection *s;
2b05f1b7 3519 const struct elf_backend_data *bed;
8ded5a0f
AM
3520
3521 /* Assume we will need exactly two PT_LOAD segments: one for text
3522 and one for data. */
3523 segs = 2;
3524
3525 s = bfd_get_section_by_name (abfd, ".interp");
3526 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3527 {
3528 /* If we have a loadable interpreter section, we need a
3529 PT_INTERP segment. In this case, assume we also need a
3530 PT_PHDR segment, although that may not be true for all
3531 targets. */
3532 segs += 2;
3533 }
3534
3535 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3536 {
3537 /* We need a PT_DYNAMIC segment. */
3538 ++segs;
f210dcff 3539 }
08a40648 3540
ceae84aa 3541 if (info != NULL && info->relro)
f210dcff
L
3542 {
3543 /* We need a PT_GNU_RELRO segment. */
3544 ++segs;
8ded5a0f
AM
3545 }
3546
3547 if (elf_tdata (abfd)->eh_frame_hdr)
3548 {
3549 /* We need a PT_GNU_EH_FRAME segment. */
3550 ++segs;
3551 }
3552
2b05f1b7 3553 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3554 {
2b05f1b7
L
3555 /* We need a PT_GNU_STACK segment. */
3556 ++segs;
3557 }
94b11780 3558
2b05f1b7
L
3559 for (s = abfd->sections; s != NULL; s = s->next)
3560 {
8ded5a0f 3561 if ((s->flags & SEC_LOAD) != 0
0112cd26 3562 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3563 {
3564 /* We need a PT_NOTE segment. */
3565 ++segs;
1c5265b5
JJ
3566 /* Try to create just one PT_NOTE segment
3567 for all adjacent loadable .note* sections.
3568 gABI requires that within a PT_NOTE segment
3569 (and also inside of each SHT_NOTE section)
3570 each note is padded to a multiple of 4 size,
3571 so we check whether the sections are correctly
3572 aligned. */
3573 if (s->alignment_power == 2)
3574 while (s->next != NULL
3575 && s->next->alignment_power == 2
3576 && (s->next->flags & SEC_LOAD) != 0
3577 && CONST_STRNEQ (s->next->name, ".note"))
3578 s = s->next;
8ded5a0f
AM
3579 }
3580 }
3581
3582 for (s = abfd->sections; s != NULL; s = s->next)
3583 {
3584 if (s->flags & SEC_THREAD_LOCAL)
3585 {
3586 /* We need a PT_TLS segment. */
3587 ++segs;
3588 break;
3589 }
3590 }
3591
3592 /* Let the backend count up any program headers it might need. */
2b05f1b7 3593 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3594 if (bed->elf_backend_additional_program_headers)
3595 {
3596 int a;
3597
3598 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3599 if (a == -1)
3600 abort ();
3601 segs += a;
3602 }
3603
3604 return segs * bed->s->sizeof_phdr;
3605}
3606
2ea37f1c
NC
3607/* Find the segment that contains the output_section of section. */
3608
3609Elf_Internal_Phdr *
3610_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3611{
3612 struct elf_segment_map *m;
3613 Elf_Internal_Phdr *p;
3614
3615 for (m = elf_tdata (abfd)->segment_map,
3616 p = elf_tdata (abfd)->phdr;
3617 m != NULL;
3618 m = m->next, p++)
3619 {
3620 int i;
3621
3622 for (i = m->count - 1; i >= 0; i--)
3623 if (m->sections[i] == section)
3624 return p;
3625 }
3626
3627 return NULL;
3628}
3629
252b5132
RH
3630/* Create a mapping from a set of sections to a program segment. */
3631
217aa764
AM
3632static struct elf_segment_map *
3633make_mapping (bfd *abfd,
3634 asection **sections,
3635 unsigned int from,
3636 unsigned int to,
3637 bfd_boolean phdr)
252b5132
RH
3638{
3639 struct elf_segment_map *m;
3640 unsigned int i;
3641 asection **hdrpp;
dc810e39 3642 bfd_size_type amt;
252b5132 3643
dc810e39
AM
3644 amt = sizeof (struct elf_segment_map);
3645 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3646 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3647 if (m == NULL)
3648 return NULL;
3649 m->next = NULL;
3650 m->p_type = PT_LOAD;
3651 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3652 m->sections[i - from] = *hdrpp;
3653 m->count = to - from;
3654
3655 if (from == 0 && phdr)
3656 {
3657 /* Include the headers in the first PT_LOAD segment. */
3658 m->includes_filehdr = 1;
3659 m->includes_phdrs = 1;
3660 }
3661
3662 return m;
3663}
3664
229fcec5
MM
3665/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3666 on failure. */
3667
3668struct elf_segment_map *
3669_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3670{
3671 struct elf_segment_map *m;
3672
a50b1753
NC
3673 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3674 sizeof (struct elf_segment_map));
229fcec5
MM
3675 if (m == NULL)
3676 return NULL;
3677 m->next = NULL;
3678 m->p_type = PT_DYNAMIC;
3679 m->count = 1;
3680 m->sections[0] = dynsec;
08a40648 3681
229fcec5
MM
3682 return m;
3683}
3684
8ded5a0f 3685/* Possibly add or remove segments from the segment map. */
252b5132 3686
b34976b6 3687static bfd_boolean
3dea8fca
AM
3688elf_modify_segment_map (bfd *abfd,
3689 struct bfd_link_info *info,
3690 bfd_boolean remove_empty_load)
252b5132 3691{
252e386e 3692 struct elf_segment_map **m;
8ded5a0f 3693 const struct elf_backend_data *bed;
252b5132 3694
8ded5a0f
AM
3695 /* The placement algorithm assumes that non allocated sections are
3696 not in PT_LOAD segments. We ensure this here by removing such
3697 sections from the segment map. We also remove excluded
252e386e
AM
3698 sections. Finally, any PT_LOAD segment without sections is
3699 removed. */
3700 m = &elf_tdata (abfd)->segment_map;
3701 while (*m)
8ded5a0f
AM
3702 {
3703 unsigned int i, new_count;
252b5132 3704
252e386e 3705 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3706 {
252e386e
AM
3707 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3708 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3709 || (*m)->p_type != PT_LOAD))
8ded5a0f 3710 {
252e386e
AM
3711 (*m)->sections[new_count] = (*m)->sections[i];
3712 new_count++;
8ded5a0f
AM
3713 }
3714 }
252e386e 3715 (*m)->count = new_count;
252b5132 3716
3dea8fca 3717 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3718 *m = (*m)->next;
3719 else
3720 m = &(*m)->next;
8ded5a0f 3721 }
252b5132 3722
8ded5a0f
AM
3723 bed = get_elf_backend_data (abfd);
3724 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3725 {
252e386e 3726 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3727 return FALSE;
252b5132 3728 }
252b5132 3729
8ded5a0f
AM
3730 return TRUE;
3731}
252b5132 3732
8ded5a0f 3733/* Set up a mapping from BFD sections to program segments. */
252b5132 3734
8ded5a0f
AM
3735bfd_boolean
3736_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3737{
3738 unsigned int count;
3739 struct elf_segment_map *m;
3740 asection **sections = NULL;
3741 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3742 bfd_boolean no_user_phdrs;
252b5132 3743
3dea8fca
AM
3744 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
3745 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3746 {
8ded5a0f
AM
3747 asection *s;
3748 unsigned int i;
3749 struct elf_segment_map *mfirst;
3750 struct elf_segment_map **pm;
3751 asection *last_hdr;
3752 bfd_vma last_size;
3753 unsigned int phdr_index;
3754 bfd_vma maxpagesize;
3755 asection **hdrpp;
3756 bfd_boolean phdr_in_segment = TRUE;
3757 bfd_boolean writable;
3758 int tls_count = 0;
3759 asection *first_tls = NULL;
3760 asection *dynsec, *eh_frame_hdr;
3761 bfd_size_type amt;
8d06853e 3762 bfd_vma addr_mask, wrap_to = 0;
252b5132 3763
8ded5a0f 3764 /* Select the allocated sections, and sort them. */
252b5132 3765
a50b1753
NC
3766 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
3767 sizeof (asection *));
8ded5a0f 3768 if (sections == NULL)
252b5132 3769 goto error_return;
252b5132 3770
8d06853e
AM
3771 /* Calculate top address, avoiding undefined behaviour of shift
3772 left operator when shift count is equal to size of type
3773 being shifted. */
3774 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
3775 addr_mask = (addr_mask << 1) + 1;
3776
8ded5a0f
AM
3777 i = 0;
3778 for (s = abfd->sections; s != NULL; s = s->next)
3779 {
3780 if ((s->flags & SEC_ALLOC) != 0)
3781 {
3782 sections[i] = s;
3783 ++i;
8d06853e
AM
3784 /* A wrapping section potentially clashes with header. */
3785 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
3786 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
3787 }
3788 }
3789 BFD_ASSERT (i <= bfd_count_sections (abfd));
3790 count = i;
252b5132 3791
8ded5a0f 3792 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3793
8ded5a0f 3794 /* Build the mapping. */
252b5132 3795
8ded5a0f
AM
3796 mfirst = NULL;
3797 pm = &mfirst;
252b5132 3798
8ded5a0f
AM
3799 /* If we have a .interp section, then create a PT_PHDR segment for
3800 the program headers and a PT_INTERP segment for the .interp
3801 section. */
3802 s = bfd_get_section_by_name (abfd, ".interp");
3803 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3804 {
3805 amt = sizeof (struct elf_segment_map);
a50b1753 3806 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3807 if (m == NULL)
3808 goto error_return;
3809 m->next = NULL;
3810 m->p_type = PT_PHDR;
3811 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3812 m->p_flags = PF_R | PF_X;
3813 m->p_flags_valid = 1;
3814 m->includes_phdrs = 1;
252b5132 3815
8ded5a0f
AM
3816 *pm = m;
3817 pm = &m->next;
252b5132 3818
8ded5a0f 3819 amt = sizeof (struct elf_segment_map);
a50b1753 3820 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3821 if (m == NULL)
3822 goto error_return;
3823 m->next = NULL;
3824 m->p_type = PT_INTERP;
3825 m->count = 1;
3826 m->sections[0] = s;
3827
3828 *pm = m;
3829 pm = &m->next;
252b5132 3830 }
8ded5a0f
AM
3831
3832 /* Look through the sections. We put sections in the same program
3833 segment when the start of the second section can be placed within
3834 a few bytes of the end of the first section. */
3835 last_hdr = NULL;
3836 last_size = 0;
3837 phdr_index = 0;
3838 maxpagesize = bed->maxpagesize;
3839 writable = FALSE;
3840 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3841 if (dynsec != NULL
3842 && (dynsec->flags & SEC_LOAD) == 0)
3843 dynsec = NULL;
3844
3845 /* Deal with -Ttext or something similar such that the first section
3846 is not adjacent to the program headers. This is an
3847 approximation, since at this point we don't know exactly how many
3848 program headers we will need. */
3849 if (count > 0)
252b5132 3850 {
8ded5a0f
AM
3851 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3852
62d7a5f6 3853 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3854 phdr_size = get_program_header_size (abfd, info);
3855 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
3856 || (sections[0]->lma & addr_mask) < phdr_size
3857 || ((sections[0]->lma & addr_mask) % maxpagesize
3858 < phdr_size % maxpagesize)
3859 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 3860 phdr_in_segment = FALSE;
252b5132
RH
3861 }
3862
8ded5a0f 3863 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3864 {
8ded5a0f
AM
3865 asection *hdr;
3866 bfd_boolean new_segment;
3867
3868 hdr = *hdrpp;
3869
3870 /* See if this section and the last one will fit in the same
3871 segment. */
3872
3873 if (last_hdr == NULL)
3874 {
3875 /* If we don't have a segment yet, then we don't need a new
3876 one (we build the last one after this loop). */
3877 new_segment = FALSE;
3878 }
3879 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3880 {
3881 /* If this section has a different relation between the
3882 virtual address and the load address, then we need a new
3883 segment. */
3884 new_segment = TRUE;
3885 }
b5599592
AM
3886 else if (hdr->lma < last_hdr->lma + last_size
3887 || last_hdr->lma + last_size < last_hdr->lma)
3888 {
3889 /* If this section has a load address that makes it overlap
3890 the previous section, then we need a new segment. */
3891 new_segment = TRUE;
3892 }
39948a60
NC
3893 /* In the next test we have to be careful when last_hdr->lma is close
3894 to the end of the address space. If the aligned address wraps
3895 around to the start of the address space, then there are no more
3896 pages left in memory and it is OK to assume that the current
3897 section can be included in the current segment. */
3898 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3899 > last_hdr->lma)
3900 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3901 <= hdr->lma))
8ded5a0f
AM
3902 {
3903 /* If putting this section in this segment would force us to
3904 skip a page in the segment, then we need a new segment. */
3905 new_segment = TRUE;
3906 }
3907 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3908 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3909 {
3910 /* We don't want to put a loadable section after a
3911 nonloadable section in the same segment.
3912 Consider .tbss sections as loadable for this purpose. */
3913 new_segment = TRUE;
3914 }
3915 else if ((abfd->flags & D_PAGED) == 0)
3916 {
3917 /* If the file is not demand paged, which means that we
3918 don't require the sections to be correctly aligned in the
3919 file, then there is no other reason for a new segment. */
3920 new_segment = FALSE;
3921 }
3922 else if (! writable
3923 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
3924 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
3925 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
3926 {
3927 /* We don't want to put a writable section in a read only
3928 segment, unless they are on the same page in memory
3929 anyhow. We already know that the last section does not
3930 bring us past the current section on the page, so the
3931 only case in which the new section is not on the same
3932 page as the previous section is when the previous section
3933 ends precisely on a page boundary. */
3934 new_segment = TRUE;
3935 }
3936 else
3937 {
3938 /* Otherwise, we can use the same segment. */
3939 new_segment = FALSE;
3940 }
3941
2889e75b 3942 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3943 if (last_hdr != NULL
3944 && info != NULL
3945 && info->callbacks->override_segment_assignment != NULL)
3946 new_segment
3947 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3948 last_hdr,
3949 new_segment);
2889e75b 3950
8ded5a0f
AM
3951 if (! new_segment)
3952 {
3953 if ((hdr->flags & SEC_READONLY) == 0)
3954 writable = TRUE;
3955 last_hdr = hdr;
3956 /* .tbss sections effectively have zero size. */
3957 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3958 != SEC_THREAD_LOCAL)
3959 last_size = hdr->size;
3960 else
3961 last_size = 0;
3962 continue;
3963 }
3964
3965 /* We need a new program segment. We must create a new program
3966 header holding all the sections from phdr_index until hdr. */
3967
3968 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3969 if (m == NULL)
3970 goto error_return;
3971
3972 *pm = m;
3973 pm = &m->next;
3974
252b5132 3975 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3976 writable = TRUE;
8ded5a0f
AM
3977 else
3978 writable = FALSE;
3979
baaff79e
JJ
3980 last_hdr = hdr;
3981 /* .tbss sections effectively have zero size. */
e5caec89 3982 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3983 last_size = hdr->size;
baaff79e
JJ
3984 else
3985 last_size = 0;
8ded5a0f
AM
3986 phdr_index = i;
3987 phdr_in_segment = FALSE;
252b5132
RH
3988 }
3989
8ded5a0f
AM
3990 /* Create a final PT_LOAD program segment. */
3991 if (last_hdr != NULL)
3992 {
3993 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3994 if (m == NULL)
3995 goto error_return;
252b5132 3996
8ded5a0f
AM
3997 *pm = m;
3998 pm = &m->next;
3999 }
252b5132 4000
8ded5a0f
AM
4001 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4002 if (dynsec != NULL)
4003 {
4004 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4005 if (m == NULL)
4006 goto error_return;
4007 *pm = m;
4008 pm = &m->next;
4009 }
252b5132 4010
1c5265b5
JJ
4011 /* For each batch of consecutive loadable .note sections,
4012 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4013 because if we link together nonloadable .note sections and
4014 loadable .note sections, we will generate two .note sections
4015 in the output file. FIXME: Using names for section types is
4016 bogus anyhow. */
8ded5a0f
AM
4017 for (s = abfd->sections; s != NULL; s = s->next)
4018 {
4019 if ((s->flags & SEC_LOAD) != 0
0112cd26 4020 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4021 {
1c5265b5 4022 asection *s2;
91d6fa6a
NC
4023
4024 count = 1;
8ded5a0f 4025 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4026 if (s->alignment_power == 2)
4027 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4028 {
4029 if (s2->next->alignment_power == 2
4030 && (s2->next->flags & SEC_LOAD) != 0
4031 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4032 && align_power (s2->lma + s2->size, 2)
4033 == s2->next->lma)
55b581a6
JJ
4034 count++;
4035 else
4036 break;
4037 }
1c5265b5 4038 amt += (count - 1) * sizeof (asection *);
a50b1753 4039 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4040 if (m == NULL)
4041 goto error_return;
4042 m->next = NULL;
4043 m->p_type = PT_NOTE;
1c5265b5
JJ
4044 m->count = count;
4045 while (count > 1)
4046 {
4047 m->sections[m->count - count--] = s;
4048 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4049 s = s->next;
4050 }
4051 m->sections[m->count - 1] = s;
4052 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4053 *pm = m;
4054 pm = &m->next;
4055 }
4056 if (s->flags & SEC_THREAD_LOCAL)
4057 {
4058 if (! tls_count)
4059 first_tls = s;
4060 tls_count++;
4061 }
4062 }
252b5132 4063
8ded5a0f
AM
4064 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4065 if (tls_count > 0)
4066 {
8ded5a0f
AM
4067 amt = sizeof (struct elf_segment_map);
4068 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4069 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4070 if (m == NULL)
4071 goto error_return;
4072 m->next = NULL;
4073 m->p_type = PT_TLS;
4074 m->count = tls_count;
4075 /* Mandated PF_R. */
4076 m->p_flags = PF_R;
4077 m->p_flags_valid = 1;
91d6fa6a 4078 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f
AM
4079 {
4080 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
4081 m->sections[i] = first_tls;
4082 first_tls = first_tls->next;
4083 }
252b5132 4084
8ded5a0f
AM
4085 *pm = m;
4086 pm = &m->next;
4087 }
252b5132 4088
8ded5a0f
AM
4089 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4090 segment. */
4091 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
4092 if (eh_frame_hdr != NULL
4093 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4094 {
dc810e39 4095 amt = sizeof (struct elf_segment_map);
a50b1753 4096 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4097 if (m == NULL)
4098 goto error_return;
4099 m->next = NULL;
8ded5a0f 4100 m->p_type = PT_GNU_EH_FRAME;
252b5132 4101 m->count = 1;
8ded5a0f 4102 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4103
4104 *pm = m;
4105 pm = &m->next;
4106 }
13ae64f3 4107
8ded5a0f 4108 if (elf_tdata (abfd)->stack_flags)
13ae64f3 4109 {
8ded5a0f 4110 amt = sizeof (struct elf_segment_map);
a50b1753 4111 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4112 if (m == NULL)
4113 goto error_return;
4114 m->next = NULL;
2b05f1b7 4115 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
4116 m->p_flags = elf_tdata (abfd)->stack_flags;
4117 m->p_flags_valid = 1;
252b5132 4118
8ded5a0f
AM
4119 *pm = m;
4120 pm = &m->next;
4121 }
65765700 4122
ceae84aa 4123 if (info != NULL && info->relro)
8ded5a0f 4124 {
f210dcff
L
4125 for (m = mfirst; m != NULL; m = m->next)
4126 {
4127 if (m->p_type == PT_LOAD)
4128 {
4129 asection *last = m->sections[m->count - 1];
4130 bfd_vma vaddr = m->sections[0]->vma;
4131 bfd_vma filesz = last->vma - vaddr + last->size;
65765700 4132
f210dcff
L
4133 if (vaddr < info->relro_end
4134 && vaddr >= info->relro_start
4135 && (vaddr + filesz) >= info->relro_end)
4136 break;
4137 }
4138 }
4139
4140 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4141 if (m != NULL)
4142 {
4143 amt = sizeof (struct elf_segment_map);
a50b1753 4144 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4145 if (m == NULL)
4146 goto error_return;
4147 m->next = NULL;
4148 m->p_type = PT_GNU_RELRO;
4149 m->p_flags = PF_R;
4150 m->p_flags_valid = 1;
4151
4152 *pm = m;
4153 pm = &m->next;
4154 }
8ded5a0f 4155 }
9ee5e499 4156
8ded5a0f
AM
4157 free (sections);
4158 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
4159 }
4160
3dea8fca 4161 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4162 return FALSE;
8c37241b 4163
8ded5a0f
AM
4164 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4165 ++count;
4166 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 4167
b34976b6 4168 return TRUE;
252b5132
RH
4169
4170 error_return:
4171 if (sections != NULL)
4172 free (sections);
b34976b6 4173 return FALSE;
252b5132
RH
4174}
4175
4176/* Sort sections by address. */
4177
4178static int
217aa764 4179elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4180{
4181 const asection *sec1 = *(const asection **) arg1;
4182 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4183 bfd_size_type size1, size2;
252b5132
RH
4184
4185 /* Sort by LMA first, since this is the address used to
4186 place the section into a segment. */
4187 if (sec1->lma < sec2->lma)
4188 return -1;
4189 else if (sec1->lma > sec2->lma)
4190 return 1;
4191
4192 /* Then sort by VMA. Normally the LMA and the VMA will be
4193 the same, and this will do nothing. */
4194 if (sec1->vma < sec2->vma)
4195 return -1;
4196 else if (sec1->vma > sec2->vma)
4197 return 1;
4198
4199 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4200
07c6e936 4201#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4202
4203 if (TOEND (sec1))
4204 {
4205 if (TOEND (sec2))
00a7cdc5
NC
4206 {
4207 /* If the indicies are the same, do not return 0
4208 here, but continue to try the next comparison. */
4209 if (sec1->target_index - sec2->target_index != 0)
4210 return sec1->target_index - sec2->target_index;
4211 }
252b5132
RH
4212 else
4213 return 1;
4214 }
00a7cdc5 4215 else if (TOEND (sec2))
252b5132
RH
4216 return -1;
4217
4218#undef TOEND
4219
00a7cdc5
NC
4220 /* Sort by size, to put zero sized sections
4221 before others at the same address. */
252b5132 4222
eea6121a
AM
4223 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4224 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4225
4226 if (size1 < size2)
252b5132 4227 return -1;
eecdbe52 4228 if (size1 > size2)
252b5132
RH
4229 return 1;
4230
4231 return sec1->target_index - sec2->target_index;
4232}
4233
340b6d91
AC
4234/* Ian Lance Taylor writes:
4235
4236 We shouldn't be using % with a negative signed number. That's just
4237 not good. We have to make sure either that the number is not
4238 negative, or that the number has an unsigned type. When the types
4239 are all the same size they wind up as unsigned. When file_ptr is a
4240 larger signed type, the arithmetic winds up as signed long long,
4241 which is wrong.
4242
4243 What we're trying to say here is something like ``increase OFF by
4244 the least amount that will cause it to be equal to the VMA modulo
4245 the page size.'' */
4246/* In other words, something like:
4247
4248 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4249 off_offset = off % bed->maxpagesize;
4250 if (vma_offset < off_offset)
4251 adjustment = vma_offset + bed->maxpagesize - off_offset;
4252 else
4253 adjustment = vma_offset - off_offset;
08a40648 4254
340b6d91
AC
4255 which can can be collapsed into the expression below. */
4256
4257static file_ptr
4258vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4259{
4260 return ((vma - off) % maxpagesize);
4261}
4262
6d33f217
L
4263static void
4264print_segment_map (const struct elf_segment_map *m)
4265{
4266 unsigned int j;
4267 const char *pt = get_segment_type (m->p_type);
4268 char buf[32];
4269
4270 if (pt == NULL)
4271 {
4272 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4273 sprintf (buf, "LOPROC+%7.7x",
4274 (unsigned int) (m->p_type - PT_LOPROC));
4275 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4276 sprintf (buf, "LOOS+%7.7x",
4277 (unsigned int) (m->p_type - PT_LOOS));
4278 else
4279 snprintf (buf, sizeof (buf), "%8.8x",
4280 (unsigned int) m->p_type);
4281 pt = buf;
4282 }
4a97a0e5 4283 fflush (stdout);
6d33f217
L
4284 fprintf (stderr, "%s:", pt);
4285 for (j = 0; j < m->count; j++)
4286 fprintf (stderr, " %s", m->sections [j]->name);
4287 putc ('\n',stderr);
4a97a0e5 4288 fflush (stderr);
6d33f217
L
4289}
4290
32812159
AM
4291static bfd_boolean
4292write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4293{
4294 void *buf;
4295 bfd_boolean ret;
4296
4297 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4298 return FALSE;
4299 buf = bfd_zmalloc (len);
4300 if (buf == NULL)
4301 return FALSE;
4302 ret = bfd_bwrite (buf, len, abfd) == len;
4303 free (buf);
4304 return ret;
4305}
4306
252b5132
RH
4307/* Assign file positions to the sections based on the mapping from
4308 sections to segments. This function also sets up some fields in
f3520d2f 4309 the file header. */
252b5132 4310
b34976b6 4311static bfd_boolean
f3520d2f
AM
4312assign_file_positions_for_load_sections (bfd *abfd,
4313 struct bfd_link_info *link_info)
252b5132
RH
4314{
4315 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4316 struct elf_segment_map *m;
252b5132 4317 Elf_Internal_Phdr *phdrs;
252b5132 4318 Elf_Internal_Phdr *p;
02bf8d82 4319 file_ptr off;
3f570048 4320 bfd_size_type maxpagesize;
f3520d2f 4321 unsigned int alloc;
0920dee7 4322 unsigned int i, j;
2b0bc088 4323 bfd_vma header_pad = 0;
252b5132 4324
e36284ab 4325 if (link_info == NULL
ceae84aa 4326 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4327 return FALSE;
252b5132 4328
8ded5a0f 4329 alloc = 0;
252b5132 4330 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2b0bc088
NC
4331 {
4332 ++alloc;
4333 if (m->header_size)
4334 header_pad = m->header_size;
4335 }
252b5132 4336
82f2dbf7
NC
4337 if (alloc)
4338 {
4339 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4340 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4341 }
4342 else
4343 {
4344 /* PR binutils/12467. */
4345 elf_elfheader (abfd)->e_phoff = 0;
4346 elf_elfheader (abfd)->e_phentsize = 0;
4347 }
4348
8ded5a0f 4349 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4350
62d7a5f6 4351 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4352 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4353 else
4354 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4355 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4356
4357 if (alloc == 0)
f3520d2f 4358 {
8ded5a0f
AM
4359 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4360 return TRUE;
f3520d2f 4361 }
252b5132 4362
57268894
HPN
4363 /* We're writing the size in elf_tdata (abfd)->program_header_size,
4364 see assign_file_positions_except_relocs, so make sure we have
4365 that amount allocated, with trailing space cleared.
4366 The variable alloc contains the computed need, while elf_tdata
4367 (abfd)->program_header_size contains the size used for the
4368 layout.
4369 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4370 where the layout is forced to according to a larger size in the
4371 last iterations for the testcase ld-elf/header. */
4372 BFD_ASSERT (elf_tdata (abfd)->program_header_size % bed->s->sizeof_phdr
4373 == 0);
a50b1753
NC
4374 phdrs = (Elf_Internal_Phdr *)
4375 bfd_zalloc2 (abfd,
4376 (elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr),
4377 sizeof (Elf_Internal_Phdr));
f3520d2f 4378 elf_tdata (abfd)->phdr = phdrs;
252b5132 4379 if (phdrs == NULL)
b34976b6 4380 return FALSE;
252b5132 4381
3f570048
AM
4382 maxpagesize = 1;
4383 if ((abfd->flags & D_PAGED) != 0)
4384 maxpagesize = bed->maxpagesize;
4385
252b5132
RH
4386 off = bed->s->sizeof_ehdr;
4387 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4388 if (header_pad < (bfd_vma) off)
4389 header_pad = 0;
4390 else
4391 header_pad -= off;
4392 off += header_pad;
252b5132 4393
0920dee7 4394 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4395 m != NULL;
0920dee7 4396 m = m->next, p++, j++)
252b5132 4397 {
252b5132 4398 asection **secpp;
bf988460
AM
4399 bfd_vma off_adjust;
4400 bfd_boolean no_contents;
252b5132
RH
4401
4402 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4403 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4404 not be done to the PT_NOTE section of a corefile, which may
4405 contain several pseudo-sections artificially created by bfd.
4406 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4407 if (m->count > 1
4408 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4409 && m->p_type == PT_NOTE))
252b5132
RH
4410 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4411 elf_sort_sections);
4412
b301b248
AM
4413 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4414 number of sections with contents contributing to both p_filesz
4415 and p_memsz, followed by a number of sections with no contents
4416 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4417 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4418 p->p_type = m->p_type;
28a7f3e7 4419 p->p_flags = m->p_flags;
252b5132 4420
3f570048
AM
4421 if (m->count == 0)
4422 p->p_vaddr = 0;
4423 else
3271a814 4424 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4425
4426 if (m->p_paddr_valid)
4427 p->p_paddr = m->p_paddr;
4428 else if (m->count == 0)
4429 p->p_paddr = 0;
4430 else
08a40648 4431 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4432
4433 if (p->p_type == PT_LOAD
4434 && (abfd->flags & D_PAGED) != 0)
4435 {
4436 /* p_align in demand paged PT_LOAD segments effectively stores
4437 the maximum page size. When copying an executable with
4438 objcopy, we set m->p_align from the input file. Use this
4439 value for maxpagesize rather than bed->maxpagesize, which
4440 may be different. Note that we use maxpagesize for PT_TLS
4441 segment alignment later in this function, so we are relying
4442 on at least one PT_LOAD segment appearing before a PT_TLS
4443 segment. */
4444 if (m->p_align_valid)
4445 maxpagesize = m->p_align;
4446
4447 p->p_align = maxpagesize;
4448 }
3271a814
NS
4449 else if (m->p_align_valid)
4450 p->p_align = m->p_align;
e970b90a
DJ
4451 else if (m->count == 0)
4452 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4453 else
4454 p->p_align = 0;
4455
bf988460
AM
4456 no_contents = FALSE;
4457 off_adjust = 0;
252b5132 4458 if (p->p_type == PT_LOAD
b301b248 4459 && m->count > 0)
252b5132 4460 {
b301b248 4461 bfd_size_type align;
a49e53ed 4462 unsigned int align_power = 0;
b301b248 4463
3271a814
NS
4464 if (m->p_align_valid)
4465 align = p->p_align;
4466 else
252b5132 4467 {
3271a814
NS
4468 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4469 {
4470 unsigned int secalign;
08a40648 4471
3271a814
NS
4472 secalign = bfd_get_section_alignment (abfd, *secpp);
4473 if (secalign > align_power)
4474 align_power = secalign;
4475 }
4476 align = (bfd_size_type) 1 << align_power;
4477 if (align < maxpagesize)
4478 align = maxpagesize;
b301b248 4479 }
252b5132 4480
02bf8d82
AM
4481 for (i = 0; i < m->count; i++)
4482 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4483 /* If we aren't making room for this section, then
4484 it must be SHT_NOBITS regardless of what we've
4485 set via struct bfd_elf_special_section. */
4486 elf_section_type (m->sections[i]) = SHT_NOBITS;
4487
bf988460 4488 /* Find out whether this segment contains any loadable
aea274d3
AM
4489 sections. */
4490 no_contents = TRUE;
4491 for (i = 0; i < m->count; i++)
4492 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4493 {
4494 no_contents = FALSE;
4495 break;
4496 }
bf988460 4497
85cfcbfb 4498 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
4499 off += off_adjust;
4500 if (no_contents)
4501 {
4502 /* We shouldn't need to align the segment on disk since
4503 the segment doesn't need file space, but the gABI
4504 arguably requires the alignment and glibc ld.so
4505 checks it. So to comply with the alignment
4506 requirement but not waste file space, we adjust
4507 p_offset for just this segment. (OFF_ADJUST is
4508 subtracted from OFF later.) This may put p_offset
4509 past the end of file, but that shouldn't matter. */
4510 }
4511 else
4512 off_adjust = 0;
252b5132 4513 }
b1a6d0b1
NC
4514 /* Make sure the .dynamic section is the first section in the
4515 PT_DYNAMIC segment. */
4516 else if (p->p_type == PT_DYNAMIC
4517 && m->count > 1
4518 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4519 {
4520 _bfd_error_handler
b301b248
AM
4521 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4522 abfd);
b1a6d0b1
NC
4523 bfd_set_error (bfd_error_bad_value);
4524 return FALSE;
4525 }
3f001e84
JK
4526 /* Set the note section type to SHT_NOTE. */
4527 else if (p->p_type == PT_NOTE)
4528 for (i = 0; i < m->count; i++)
4529 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4530
252b5132
RH
4531 p->p_offset = 0;
4532 p->p_filesz = 0;
4533 p->p_memsz = 0;
4534
4535 if (m->includes_filehdr)
4536 {
bf988460 4537 if (!m->p_flags_valid)
252b5132 4538 p->p_flags |= PF_R;
252b5132
RH
4539 p->p_filesz = bed->s->sizeof_ehdr;
4540 p->p_memsz = bed->s->sizeof_ehdr;
4541 if (m->count > 0)
4542 {
4543 BFD_ASSERT (p->p_type == PT_LOAD);
4544
4545 if (p->p_vaddr < (bfd_vma) off)
4546 {
caf47ea6 4547 (*_bfd_error_handler)
b301b248
AM
4548 (_("%B: Not enough room for program headers, try linking with -N"),
4549 abfd);
252b5132 4550 bfd_set_error (bfd_error_bad_value);
b34976b6 4551 return FALSE;
252b5132
RH
4552 }
4553
4554 p->p_vaddr -= off;
bf988460 4555 if (!m->p_paddr_valid)
252b5132
RH
4556 p->p_paddr -= off;
4557 }
252b5132
RH
4558 }
4559
4560 if (m->includes_phdrs)
4561 {
bf988460 4562 if (!m->p_flags_valid)
252b5132
RH
4563 p->p_flags |= PF_R;
4564
f3520d2f 4565 if (!m->includes_filehdr)
252b5132
RH
4566 {
4567 p->p_offset = bed->s->sizeof_ehdr;
4568
4569 if (m->count > 0)
4570 {
4571 BFD_ASSERT (p->p_type == PT_LOAD);
4572 p->p_vaddr -= off - p->p_offset;
bf988460 4573 if (!m->p_paddr_valid)
252b5132
RH
4574 p->p_paddr -= off - p->p_offset;
4575 }
252b5132
RH
4576 }
4577
4578 p->p_filesz += alloc * bed->s->sizeof_phdr;
4579 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4580 if (m->count)
4581 {
4582 p->p_filesz += header_pad;
4583 p->p_memsz += header_pad;
4584 }
252b5132
RH
4585 }
4586
4587 if (p->p_type == PT_LOAD
4588 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4589 {
bf988460 4590 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4591 p->p_offset = off;
252b5132
RH
4592 else
4593 {
4594 file_ptr adjust;
4595
4596 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4597 if (!no_contents)
4598 p->p_filesz += adjust;
252b5132
RH
4599 p->p_memsz += adjust;
4600 }
4601 }
4602
1ea63fd2
AM
4603 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4604 maps. Set filepos for sections in PT_LOAD segments, and in
4605 core files, for sections in PT_NOTE segments.
4606 assign_file_positions_for_non_load_sections will set filepos
4607 for other sections and update p_filesz for other segments. */
252b5132
RH
4608 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4609 {
4610 asection *sec;
252b5132 4611 bfd_size_type align;
627b32bc 4612 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4613
4614 sec = *secpp;
02bf8d82 4615 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4616 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4617
88967714
AM
4618 if ((p->p_type == PT_LOAD
4619 || p->p_type == PT_TLS)
4620 && (this_hdr->sh_type != SHT_NOBITS
4621 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4622 && ((this_hdr->sh_flags & SHF_TLS) == 0
4623 || p->p_type == PT_TLS))))
252b5132 4624 {
b5599592
AM
4625 bfd_vma p_start = p->p_paddr;
4626 bfd_vma p_end = p_start + p->p_memsz;
4627 bfd_vma s_start = sec->lma;
4628 bfd_vma adjust = s_start - p_end;
252b5132 4629
a2d1e028
L
4630 if (adjust != 0
4631 && (s_start < p_end
4632 || p_end < p_start))
252b5132 4633 {
88967714 4634 (*_bfd_error_handler)
b5599592
AM
4635 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
4636 (unsigned long) s_start, (unsigned long) p_end);
88967714 4637 adjust = 0;
b5599592 4638 sec->lma = p_end;
1cfb7d1e 4639 }
3ac9b6c9 4640 p->p_memsz += adjust;
1cfb7d1e 4641
88967714
AM
4642 if (this_hdr->sh_type != SHT_NOBITS)
4643 {
32812159
AM
4644 if (p->p_filesz + adjust < p->p_memsz)
4645 {
4646 /* We have a PROGBITS section following NOBITS ones.
4647 Allocate file space for the NOBITS section(s) and
4648 zero it. */
4649 adjust = p->p_memsz - p->p_filesz;
4650 if (!write_zeros (abfd, off, adjust))
4651 return FALSE;
4652 }
88967714
AM
4653 off += adjust;
4654 p->p_filesz += adjust;
252b5132 4655 }
252b5132
RH
4656 }
4657
4658 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4659 {
b301b248
AM
4660 /* The section at i == 0 is the one that actually contains
4661 everything. */
4a938328
MS
4662 if (i == 0)
4663 {
627b32bc 4664 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4665 off += this_hdr->sh_size;
4666 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4667 p->p_memsz = 0;
4668 p->p_align = 1;
252b5132 4669 }
4a938328 4670 else
252b5132 4671 {
b301b248 4672 /* The rest are fake sections that shouldn't be written. */
252b5132 4673 sec->filepos = 0;
eea6121a 4674 sec->size = 0;
b301b248
AM
4675 sec->flags = 0;
4676 continue;
252b5132 4677 }
252b5132
RH
4678 }
4679 else
4680 {
b301b248
AM
4681 if (p->p_type == PT_LOAD)
4682 {
02bf8d82
AM
4683 this_hdr->sh_offset = sec->filepos = off;
4684 if (this_hdr->sh_type != SHT_NOBITS)
6a3cd2b4 4685 off += this_hdr->sh_size;
b301b248 4686 }
252b5132 4687
02bf8d82 4688 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4689 {
6a3cd2b4 4690 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4691 /* A load section without SHF_ALLOC is something like
4692 a note section in a PT_NOTE segment. These take
4693 file space but are not loaded into memory. */
4694 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4695 p->p_memsz += this_hdr->sh_size;
b301b248 4696 }
6a3cd2b4 4697 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4698 {
6a3cd2b4
AM
4699 if (p->p_type == PT_TLS)
4700 p->p_memsz += this_hdr->sh_size;
4701
4702 /* .tbss is special. It doesn't contribute to p_memsz of
4703 normal segments. */
4704 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4705 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4706 }
4707
b10a8ae0
L
4708 if (align > p->p_align
4709 && !m->p_align_valid
4710 && (p->p_type != PT_LOAD
4711 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4712 p->p_align = align;
4713 }
4714
bf988460 4715 if (!m->p_flags_valid)
252b5132
RH
4716 {
4717 p->p_flags |= PF_R;
02bf8d82 4718 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4719 p->p_flags |= PF_X;
02bf8d82 4720 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4721 p->p_flags |= PF_W;
4722 }
4723 }
bf988460 4724 off -= off_adjust;
0920dee7 4725
7c928300
AM
4726 /* Check that all sections are in a PT_LOAD segment.
4727 Don't check funky gdb generated core files. */
4728 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
4729 {
4730 bfd_boolean check_vma = TRUE;
4731
4732 for (i = 1; i < m->count; i++)
4733 if (m->sections[i]->vma == m->sections[i - 1]->vma
4734 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
4735 ->this_hdr), p) != 0
4736 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
4737 ->this_hdr), p) != 0)
0920dee7 4738 {
9a83a553
AM
4739 /* Looks like we have overlays packed into the segment. */
4740 check_vma = FALSE;
4741 break;
0920dee7 4742 }
9a83a553
AM
4743
4744 for (i = 0; i < m->count; i++)
4745 {
4746 Elf_Internal_Shdr *this_hdr;
4747 asection *sec;
4748
4749 sec = m->sections[i];
4750 this_hdr = &(elf_section_data(sec)->this_hdr);
f4638467 4751 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0))
9a83a553
AM
4752 {
4753 (*_bfd_error_handler)
4754 (_("%B: section `%A' can't be allocated in segment %d"),
4755 abfd, sec, j);
4756 print_segment_map (m);
4757 }
4758 }
4759 }
252b5132
RH
4760 }
4761
f3520d2f
AM
4762 elf_tdata (abfd)->next_file_pos = off;
4763 return TRUE;
4764}
4765
4766/* Assign file positions for the other sections. */
4767
4768static bfd_boolean
4769assign_file_positions_for_non_load_sections (bfd *abfd,
4770 struct bfd_link_info *link_info)
4771{
4772 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4773 Elf_Internal_Shdr **i_shdrpp;
4774 Elf_Internal_Shdr **hdrpp;
4775 Elf_Internal_Phdr *phdrs;
4776 Elf_Internal_Phdr *p;
4777 struct elf_segment_map *m;
4778 bfd_vma filehdr_vaddr, filehdr_paddr;
4779 bfd_vma phdrs_vaddr, phdrs_paddr;
4780 file_ptr off;
4781 unsigned int num_sec;
4782 unsigned int i;
4783 unsigned int count;
4784
5c182d5f
AM
4785 i_shdrpp = elf_elfsections (abfd);
4786 num_sec = elf_numsections (abfd);
f3520d2f 4787 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4788 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4789 {
4790 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4791 Elf_Internal_Shdr *hdr;
4792
4793 hdr = *hdrpp;
4794 if (hdr->bfd_section != NULL
252e386e
AM
4795 && (hdr->bfd_section->filepos != 0
4796 || (hdr->sh_type == SHT_NOBITS
4797 && hdr->contents == NULL)))
627b32bc 4798 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4799 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4800 {
f4638467
AM
4801 (*_bfd_error_handler)
4802 (_("%B: warning: allocated section `%s' not in segment"),
4803 abfd,
4804 (hdr->bfd_section == NULL
4805 ? "*unknown*"
4806 : hdr->bfd_section->name));
3ba71138
L
4807 /* We don't need to page align empty sections. */
4808 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4809 off += vma_page_aligned_bias (hdr->sh_addr, off,
4810 bed->maxpagesize);
4811 else
4812 off += vma_page_aligned_bias (hdr->sh_addr, off,
4813 hdr->sh_addralign);
4814 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4815 FALSE);
4816 }
4817 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4818 && hdr->bfd_section == NULL)
4819 || hdr == i_shdrpp[tdata->symtab_section]
4820 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4821 || hdr == i_shdrpp[tdata->strtab_section])
4822 hdr->sh_offset = -1;
4823 else
4824 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4825 }
4826
252b5132
RH
4827 /* Now that we have set the section file positions, we can set up
4828 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4829 count = 0;
4830 filehdr_vaddr = 0;
4831 filehdr_paddr = 0;
4832 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4833 phdrs_paddr = 0;
4834 phdrs = elf_tdata (abfd)->phdr;
4835 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4836 m != NULL;
4837 m = m->next, p++)
4838 {
4839 ++count;
4840 if (p->p_type != PT_LOAD)
4841 continue;
4842
4843 if (m->includes_filehdr)
4844 {
4845 filehdr_vaddr = p->p_vaddr;
4846 filehdr_paddr = p->p_paddr;
4847 }
4848 if (m->includes_phdrs)
4849 {
4850 phdrs_vaddr = p->p_vaddr;
4851 phdrs_paddr = p->p_paddr;
4852 if (m->includes_filehdr)
4853 {
4854 phdrs_vaddr += bed->s->sizeof_ehdr;
4855 phdrs_paddr += bed->s->sizeof_ehdr;
4856 }
4857 }
4858 }
4859
252b5132
RH
4860 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4861 m != NULL;
4862 m = m->next, p++)
4863 {
129af99f 4864 if (p->p_type == PT_GNU_RELRO)
252b5132 4865 {
b84a33b5
AM
4866 const Elf_Internal_Phdr *lp;
4867
129af99f 4868 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
1ea63fd2 4869
129af99f 4870 if (link_info != NULL)
8c37241b 4871 {
129af99f
AS
4872 /* During linking the range of the RELRO segment is passed
4873 in link_info. */
8c37241b
JJ
4874 for (lp = phdrs; lp < phdrs + count; ++lp)
4875 {
4876 if (lp->p_type == PT_LOAD
8c37241b 4877 && lp->p_vaddr >= link_info->relro_start
b84a33b5
AM
4878 && lp->p_vaddr < link_info->relro_end
4879 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end)
8c37241b
JJ
4880 break;
4881 }
8c37241b 4882 }
129af99f
AS
4883 else
4884 {
4885 /* Otherwise we are copying an executable or shared
b84a33b5 4886 library, but we need to use the same linker logic. */
129af99f
AS
4887 for (lp = phdrs; lp < phdrs + count; ++lp)
4888 {
4889 if (lp->p_type == PT_LOAD
4890 && lp->p_paddr == p->p_paddr)
4891 break;
4892 }
b84a33b5
AM
4893 }
4894
4895 if (lp < phdrs + count)
4896 {
4897 p->p_vaddr = lp->p_vaddr;
4898 p->p_paddr = lp->p_paddr;
4899 p->p_offset = lp->p_offset;
4900 if (link_info != NULL)
4901 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4902 else if (m->p_size_valid)
4903 p->p_filesz = m->p_size;
129af99f
AS
4904 else
4905 abort ();
b84a33b5
AM
4906 p->p_memsz = p->p_filesz;
4907 p->p_align = 1;
4908 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 4909 }
9433b9b1 4910 else
b84a33b5
AM
4911 {
4912 memset (p, 0, sizeof *p);
4913 p->p_type = PT_NULL;
4914 }
129af99f
AS
4915 }
4916 else if (m->count != 0)
4917 {
4918 if (p->p_type != PT_LOAD
4919 && (p->p_type != PT_NOTE
4920 || bfd_get_format (abfd) != bfd_core))
4921 {
4922 Elf_Internal_Shdr *hdr;
4923 asection *sect;
4924
4925 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4926
4927 sect = m->sections[m->count - 1];
4928 hdr = &elf_section_data (sect)->this_hdr;
4929 p->p_filesz = sect->filepos - m->sections[0]->filepos;
4930 if (hdr->sh_type != SHT_NOBITS)
4931 p->p_filesz += hdr->sh_size;
4932 p->p_offset = m->sections[0]->filepos;
4933 }
4934 }
4935 else if (m->includes_filehdr)
4936 {
4937 p->p_vaddr = filehdr_vaddr;
4938 if (! m->p_paddr_valid)
4939 p->p_paddr = filehdr_paddr;
4940 }
4941 else if (m->includes_phdrs)
4942 {
4943 p->p_vaddr = phdrs_vaddr;
4944 if (! m->p_paddr_valid)
4945 p->p_paddr = phdrs_paddr;
252b5132
RH
4946 }
4947 }
4948
252b5132
RH
4949 elf_tdata (abfd)->next_file_pos = off;
4950
b34976b6 4951 return TRUE;
252b5132
RH
4952}
4953
252b5132
RH
4954/* Work out the file positions of all the sections. This is called by
4955 _bfd_elf_compute_section_file_positions. All the section sizes and
4956 VMAs must be known before this is called.
4957
e0638f70
AM
4958 Reloc sections come in two flavours: Those processed specially as
4959 "side-channel" data attached to a section to which they apply, and
4960 those that bfd doesn't process as relocations. The latter sort are
4961 stored in a normal bfd section by bfd_section_from_shdr. We don't
4962 consider the former sort here, unless they form part of the loadable
4963 image. Reloc sections not assigned here will be handled later by
4964 assign_file_positions_for_relocs.
252b5132
RH
4965
4966 We also don't set the positions of the .symtab and .strtab here. */
4967
b34976b6 4968static bfd_boolean
c84fca4d
AO
4969assign_file_positions_except_relocs (bfd *abfd,
4970 struct bfd_link_info *link_info)
252b5132 4971{
5c182d5f
AM
4972 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4973 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4974 file_ptr off;
9c5bfbb7 4975 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4976
4977 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4978 && bfd_get_format (abfd) != bfd_core)
4979 {
5c182d5f
AM
4980 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4981 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4982 Elf_Internal_Shdr **hdrpp;
4983 unsigned int i;
4984
4985 /* Start after the ELF header. */
4986 off = i_ehdrp->e_ehsize;
4987
4988 /* We are not creating an executable, which means that we are
4989 not creating a program header, and that the actual order of
4990 the sections in the file is unimportant. */
9ad5cbcf 4991 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4992 {
4993 Elf_Internal_Shdr *hdr;
4994
4995 hdr = *hdrpp;
e0638f70
AM
4996 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4997 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4998 || i == tdata->symtab_section
4999 || i == tdata->symtab_shndx_section
252b5132
RH
5000 || i == tdata->strtab_section)
5001 {
5002 hdr->sh_offset = -1;
252b5132 5003 }
9ad5cbcf 5004 else
b34976b6 5005 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
5006 }
5007 }
5008 else
5009 {
f3520d2f
AM
5010 unsigned int alloc;
5011
252b5132 5012 /* Assign file positions for the loaded sections based on the
08a40648 5013 assignment of sections to segments. */
f3520d2f
AM
5014 if (!assign_file_positions_for_load_sections (abfd, link_info))
5015 return FALSE;
5016
5017 /* And for non-load sections. */
5018 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
5019 return FALSE;
5020
e36284ab
AM
5021 if (bed->elf_backend_modify_program_headers != NULL)
5022 {
5023 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
5024 return FALSE;
5025 }
5026
f3520d2f
AM
5027 /* Write out the program headers. */
5028 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
5029 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
5030 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 5031 return FALSE;
252b5132 5032
5c182d5f 5033 off = tdata->next_file_pos;
252b5132
RH
5034 }
5035
5036 /* Place the section headers. */
45d6a902 5037 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
5038 i_ehdrp->e_shoff = off;
5039 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
5040
5c182d5f 5041 tdata->next_file_pos = off;
252b5132 5042
b34976b6 5043 return TRUE;
252b5132
RH
5044}
5045
b34976b6 5046static bfd_boolean
217aa764 5047prep_headers (bfd *abfd)
252b5132 5048{
3d540e93 5049 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 5050 struct elf_strtab_hash *shstrtab;
9c5bfbb7 5051 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5052
5053 i_ehdrp = elf_elfheader (abfd);
252b5132 5054
2b0f7ef9 5055 shstrtab = _bfd_elf_strtab_init ();
252b5132 5056 if (shstrtab == NULL)
b34976b6 5057 return FALSE;
252b5132
RH
5058
5059 elf_shstrtab (abfd) = shstrtab;
5060
5061 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
5062 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
5063 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
5064 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
5065
5066 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
5067 i_ehdrp->e_ident[EI_DATA] =
5068 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
5069 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
5070
252b5132
RH
5071 if ((abfd->flags & DYNAMIC) != 0)
5072 i_ehdrp->e_type = ET_DYN;
5073 else if ((abfd->flags & EXEC_P) != 0)
5074 i_ehdrp->e_type = ET_EXEC;
5075 else if (bfd_get_format (abfd) == bfd_core)
5076 i_ehdrp->e_type = ET_CORE;
5077 else
5078 i_ehdrp->e_type = ET_REL;
5079
5080 switch (bfd_get_arch (abfd))
5081 {
5082 case bfd_arch_unknown:
5083 i_ehdrp->e_machine = EM_NONE;
5084 break;
aa4f99bb
AO
5085
5086 /* There used to be a long list of cases here, each one setting
5087 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
5088 in the corresponding bfd definition. To avoid duplication,
5089 the switch was removed. Machines that need special handling
5090 can generally do it in elf_backend_final_write_processing(),
5091 unless they need the information earlier than the final write.
5092 Such need can generally be supplied by replacing the tests for
5093 e_machine with the conditions used to determine it. */
252b5132 5094 default:
9c5bfbb7
AM
5095 i_ehdrp->e_machine = bed->elf_machine_code;
5096 }
aa4f99bb 5097
252b5132
RH
5098 i_ehdrp->e_version = bed->s->ev_current;
5099 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
5100
c044fabd 5101 /* No program header, for now. */
252b5132
RH
5102 i_ehdrp->e_phoff = 0;
5103 i_ehdrp->e_phentsize = 0;
5104 i_ehdrp->e_phnum = 0;
5105
c044fabd 5106 /* Each bfd section is section header entry. */
252b5132
RH
5107 i_ehdrp->e_entry = bfd_get_start_address (abfd);
5108 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
5109
c044fabd 5110 /* If we're building an executable, we'll need a program header table. */
252b5132 5111 if (abfd->flags & EXEC_P)
0e71e495
BE
5112 /* It all happens later. */
5113 ;
252b5132
RH
5114 else
5115 {
5116 i_ehdrp->e_phentsize = 0;
252b5132
RH
5117 i_ehdrp->e_phoff = 0;
5118 }
5119
5120 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 5121 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 5122 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 5123 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 5124 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 5125 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
5126 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
5127 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
5128 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 5129 return FALSE;
252b5132 5130
b34976b6 5131 return TRUE;
252b5132
RH
5132}
5133
5134/* Assign file positions for all the reloc sections which are not part
5135 of the loadable file image. */
5136
5137void
217aa764 5138_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
5139{
5140 file_ptr off;
9ad5cbcf 5141 unsigned int i, num_sec;
252b5132
RH
5142 Elf_Internal_Shdr **shdrpp;
5143
5144 off = elf_tdata (abfd)->next_file_pos;
5145
9ad5cbcf
AM
5146 num_sec = elf_numsections (abfd);
5147 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5148 {
5149 Elf_Internal_Shdr *shdrp;
5150
5151 shdrp = *shdrpp;
5152 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5153 && shdrp->sh_offset == -1)
b34976b6 5154 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5155 }
5156
5157 elf_tdata (abfd)->next_file_pos = off;
5158}
5159
b34976b6 5160bfd_boolean
217aa764 5161_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5162{
9c5bfbb7 5163 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5164 Elf_Internal_Shdr **i_shdrp;
b34976b6 5165 bfd_boolean failed;
9ad5cbcf 5166 unsigned int count, num_sec;
252b5132
RH
5167
5168 if (! abfd->output_has_begun
217aa764 5169 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5170 return FALSE;
252b5132
RH
5171
5172 i_shdrp = elf_elfsections (abfd);
252b5132 5173
b34976b6 5174 failed = FALSE;
252b5132
RH
5175 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5176 if (failed)
b34976b6 5177 return FALSE;
252b5132
RH
5178
5179 _bfd_elf_assign_file_positions_for_relocs (abfd);
5180
c044fabd 5181 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5182 num_sec = elf_numsections (abfd);
5183 for (count = 1; count < num_sec; count++)
252b5132
RH
5184 {
5185 if (bed->elf_backend_section_processing)
5186 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5187 if (i_shdrp[count]->contents)
5188 {
dc810e39
AM
5189 bfd_size_type amt = i_shdrp[count]->sh_size;
5190
252b5132 5191 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5192 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5193 return FALSE;
252b5132
RH
5194 }
5195 }
5196
5197 /* Write out the section header names. */
26ae6d5e
DJ
5198 if (elf_shstrtab (abfd) != NULL
5199 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5200 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5201 return FALSE;
252b5132
RH
5202
5203 if (bed->elf_backend_final_write_processing)
5204 (*bed->elf_backend_final_write_processing) (abfd,
5205 elf_tdata (abfd)->linker);
5206
ff59fc36
RM
5207 if (!bed->s->write_shdrs_and_ehdr (abfd))
5208 return FALSE;
5209
5210 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
5211 if (elf_tdata (abfd)->after_write_object_contents)
5212 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
5213
5214 return TRUE;
252b5132
RH
5215}
5216
b34976b6 5217bfd_boolean
217aa764 5218_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5219{
c044fabd 5220 /* Hopefully this can be done just like an object file. */
252b5132
RH
5221 return _bfd_elf_write_object_contents (abfd);
5222}
c044fabd
KH
5223
5224/* Given a section, search the header to find them. */
5225
cb33740c 5226unsigned int
198beae2 5227_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5228{
9c5bfbb7 5229 const struct elf_backend_data *bed;
91d6fa6a 5230 unsigned int sec_index;
252b5132 5231
9ad5cbcf
AM
5232 if (elf_section_data (asect) != NULL
5233 && elf_section_data (asect)->this_idx != 0)
5234 return elf_section_data (asect)->this_idx;
5235
5236 if (bfd_is_abs_section (asect))
91d6fa6a 5237 sec_index = SHN_ABS;
af746e92 5238 else if (bfd_is_com_section (asect))
91d6fa6a 5239 sec_index = SHN_COMMON;
af746e92 5240 else if (bfd_is_und_section (asect))
91d6fa6a 5241 sec_index = SHN_UNDEF;
af746e92 5242 else
91d6fa6a 5243 sec_index = SHN_BAD;
252b5132 5244
af746e92 5245 bed = get_elf_backend_data (abfd);
252b5132
RH
5246 if (bed->elf_backend_section_from_bfd_section)
5247 {
91d6fa6a 5248 int retval = sec_index;
9ad5cbcf 5249
af746e92
AM
5250 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5251 return retval;
252b5132
RH
5252 }
5253
91d6fa6a 5254 if (sec_index == SHN_BAD)
af746e92 5255 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5256
91d6fa6a 5257 return sec_index;
252b5132
RH
5258}
5259
5260/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5261 on error. */
5262
5263int
217aa764 5264_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5265{
5266 asymbol *asym_ptr = *asym_ptr_ptr;
5267 int idx;
5268 flagword flags = asym_ptr->flags;
5269
5270 /* When gas creates relocations against local labels, it creates its
5271 own symbol for the section, but does put the symbol into the
5272 symbol chain, so udata is 0. When the linker is generating
5273 relocatable output, this section symbol may be for one of the
5274 input sections rather than the output section. */
5275 if (asym_ptr->udata.i == 0
5276 && (flags & BSF_SECTION_SYM)
5277 && asym_ptr->section)
5278 {
5372391b 5279 asection *sec;
252b5132
RH
5280 int indx;
5281
5372391b
AM
5282 sec = asym_ptr->section;
5283 if (sec->owner != abfd && sec->output_section != NULL)
5284 sec = sec->output_section;
5285 if (sec->owner == abfd
5286 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5287 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5288 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5289 }
5290
5291 idx = asym_ptr->udata.i;
5292
5293 if (idx == 0)
5294 {
5295 /* This case can occur when using --strip-symbol on a symbol
08a40648 5296 which is used in a relocation entry. */
252b5132 5297 (*_bfd_error_handler)
d003868e
AM
5298 (_("%B: symbol `%s' required but not present"),
5299 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5300 bfd_set_error (bfd_error_no_symbols);
5301 return -1;
5302 }
5303
5304#if DEBUG & 4
5305 {
5306 fprintf (stderr,
9ccb8af9
AM
5307 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
5308 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
5309 fflush (stderr);
5310 }
5311#endif
5312
5313 return idx;
5314}
5315
84d1d650 5316/* Rewrite program header information. */
252b5132 5317
b34976b6 5318static bfd_boolean
84d1d650 5319rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5320{
b34976b6
AM
5321 Elf_Internal_Ehdr *iehdr;
5322 struct elf_segment_map *map;
5323 struct elf_segment_map *map_first;
5324 struct elf_segment_map **pointer_to_map;
5325 Elf_Internal_Phdr *segment;
5326 asection *section;
5327 unsigned int i;
5328 unsigned int num_segments;
5329 bfd_boolean phdr_included = FALSE;
5c44b38e 5330 bfd_boolean p_paddr_valid;
b34976b6
AM
5331 bfd_vma maxpagesize;
5332 struct elf_segment_map *phdr_adjust_seg = NULL;
5333 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5334 const struct elf_backend_data *bed;
bc67d8a6 5335
caf47ea6 5336 bed = get_elf_backend_data (ibfd);
252b5132
RH
5337 iehdr = elf_elfheader (ibfd);
5338
bc67d8a6 5339 map_first = NULL;
c044fabd 5340 pointer_to_map = &map_first;
252b5132
RH
5341
5342 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5343 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5344
5345 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5346#define SEGMENT_END(segment, start) \
5347 (start + (segment->p_memsz > segment->p_filesz \
5348 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5349
eecdbe52
JJ
5350#define SECTION_SIZE(section, segment) \
5351 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5352 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5353 ? section->size : 0)
eecdbe52 5354
b34976b6 5355 /* Returns TRUE if the given section is contained within
bc67d8a6 5356 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5357#define IS_CONTAINED_BY_VMA(section, segment) \
5358 (section->vma >= segment->p_vaddr \
eecdbe52 5359 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5360 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5361
b34976b6 5362 /* Returns TRUE if the given section is contained within
bc67d8a6 5363 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5364#define IS_CONTAINED_BY_LMA(section, segment, base) \
5365 (section->lma >= base \
eecdbe52 5366 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5367 <= SEGMENT_END (segment, base)))
252b5132 5368
0efc80c8
L
5369 /* Handle PT_NOTE segment. */
5370#define IS_NOTE(p, s) \
aecc8f8a 5371 (p->p_type == PT_NOTE \
0efc80c8 5372 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5373 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5374 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5375 <= p->p_offset + p->p_filesz))
252b5132 5376
0efc80c8
L
5377 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5378 etc. */
5379#define IS_COREFILE_NOTE(p, s) \
5380 (IS_NOTE (p, s) \
5381 && bfd_get_format (ibfd) == bfd_core \
5382 && s->vma == 0 \
5383 && s->lma == 0)
5384
252b5132
RH
5385 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5386 linker, which generates a PT_INTERP section with p_vaddr and
5387 p_memsz set to 0. */
aecc8f8a
AM
5388#define IS_SOLARIS_PT_INTERP(p, s) \
5389 (p->p_vaddr == 0 \
5390 && p->p_paddr == 0 \
5391 && p->p_memsz == 0 \
5392 && p->p_filesz > 0 \
5393 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5394 && s->size > 0 \
aecc8f8a 5395 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5396 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5397 <= p->p_offset + p->p_filesz))
5c440b1e 5398
bc67d8a6
NC
5399 /* Decide if the given section should be included in the given segment.
5400 A section will be included if:
f5ffc919 5401 1. It is within the address space of the segment -- we use the LMA
08a40648 5402 if that is set for the segment and the VMA otherwise,
0efc80c8
L
5403 2. It is an allocated section or a NOTE section in a PT_NOTE
5404 segment.
bc67d8a6 5405 3. There is an output section associated with it,
eecdbe52 5406 4. The section has not already been allocated to a previous segment.
2b05f1b7 5407 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5408 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5409 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5410 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5411 (with the possible exception of .dynamic). */
9f17e2a6 5412#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5413 ((((segment->p_paddr \
5414 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5415 : IS_CONTAINED_BY_VMA (section, segment)) \
5416 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5417 || IS_NOTE (segment, section)) \
2b05f1b7
L
5418 && segment->p_type != PT_GNU_STACK \
5419 && (segment->p_type != PT_TLS \
5420 || (section->flags & SEC_THREAD_LOCAL)) \
5421 && (segment->p_type == PT_LOAD \
5422 || segment->p_type == PT_TLS \
5423 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5424 && (segment->p_type != PT_DYNAMIC \
5425 || SECTION_SIZE (section, segment) > 0 \
5426 || (segment->p_paddr \
5427 ? segment->p_paddr != section->lma \
5428 : segment->p_vaddr != section->vma) \
5429 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5430 == 0)) \
0067a569 5431 && !section->segment_mark)
bc67d8a6 5432
9f17e2a6
L
5433/* If the output section of a section in the input segment is NULL,
5434 it is removed from the corresponding output segment. */
5435#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5436 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5437 && section->output_section != NULL)
5438
b34976b6 5439 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5440#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5441 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5442
5443 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5444 their VMA address ranges and their LMA address ranges overlap.
5445 It is possible to have overlapping VMA ranges without overlapping LMA
5446 ranges. RedBoot images for example can have both .data and .bss mapped
5447 to the same VMA range, but with the .data section mapped to a different
5448 LMA. */
aecc8f8a 5449#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5450 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5451 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5452 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5453 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5454
5455 /* Initialise the segment mark field. */
5456 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5457 section->segment_mark = FALSE;
bc67d8a6 5458
5c44b38e
AM
5459 /* The Solaris linker creates program headers in which all the
5460 p_paddr fields are zero. When we try to objcopy or strip such a
5461 file, we get confused. Check for this case, and if we find it
5462 don't set the p_paddr_valid fields. */
5463 p_paddr_valid = FALSE;
5464 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5465 i < num_segments;
5466 i++, segment++)
5467 if (segment->p_paddr != 0)
5468 {
5469 p_paddr_valid = TRUE;
5470 break;
5471 }
5472
252b5132 5473 /* Scan through the segments specified in the program header
bc67d8a6 5474 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5475 in the loadable segments. These can be created by weird
aecc8f8a 5476 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5477 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5478 i < num_segments;
c044fabd 5479 i++, segment++)
252b5132 5480 {
252b5132 5481 unsigned int j;
c044fabd 5482 Elf_Internal_Phdr *segment2;
252b5132 5483
aecc8f8a
AM
5484 if (segment->p_type == PT_INTERP)
5485 for (section = ibfd->sections; section; section = section->next)
5486 if (IS_SOLARIS_PT_INTERP (segment, section))
5487 {
5488 /* Mininal change so that the normal section to segment
4cc11e76 5489 assignment code will work. */
aecc8f8a
AM
5490 segment->p_vaddr = section->vma;
5491 break;
5492 }
5493
bc67d8a6 5494 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5495 {
5496 /* Remove PT_GNU_RELRO segment. */
5497 if (segment->p_type == PT_GNU_RELRO)
5498 segment->p_type = PT_NULL;
5499 continue;
5500 }
c044fabd 5501
bc67d8a6 5502 /* Determine if this segment overlaps any previous segments. */
0067a569 5503 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5504 {
5505 bfd_signed_vma extra_length;
c044fabd 5506
bc67d8a6 5507 if (segment2->p_type != PT_LOAD
0067a569 5508 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5509 continue;
c044fabd 5510
bc67d8a6
NC
5511 /* Merge the two segments together. */
5512 if (segment2->p_vaddr < segment->p_vaddr)
5513 {
c044fabd 5514 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5515 SEGMENT. */
0067a569
AM
5516 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5517 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5518
bc67d8a6
NC
5519 if (extra_length > 0)
5520 {
0067a569 5521 segment2->p_memsz += extra_length;
bc67d8a6
NC
5522 segment2->p_filesz += extra_length;
5523 }
c044fabd 5524
bc67d8a6 5525 segment->p_type = PT_NULL;
c044fabd 5526
bc67d8a6
NC
5527 /* Since we have deleted P we must restart the outer loop. */
5528 i = 0;
5529 segment = elf_tdata (ibfd)->phdr;
5530 break;
5531 }
5532 else
5533 {
c044fabd 5534 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5535 SEGMENT2. */
0067a569
AM
5536 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5537 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5538
bc67d8a6
NC
5539 if (extra_length > 0)
5540 {
0067a569 5541 segment->p_memsz += extra_length;
bc67d8a6
NC
5542 segment->p_filesz += extra_length;
5543 }
c044fabd 5544
bc67d8a6
NC
5545 segment2->p_type = PT_NULL;
5546 }
5547 }
5548 }
c044fabd 5549
bc67d8a6
NC
5550 /* The second scan attempts to assign sections to segments. */
5551 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5552 i < num_segments;
0067a569 5553 i++, segment++)
bc67d8a6 5554 {
0067a569
AM
5555 unsigned int section_count;
5556 asection **sections;
5557 asection *output_section;
5558 unsigned int isec;
5559 bfd_vma matching_lma;
5560 bfd_vma suggested_lma;
5561 unsigned int j;
dc810e39 5562 bfd_size_type amt;
0067a569
AM
5563 asection *first_section;
5564 bfd_boolean first_matching_lma;
5565 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5566
5567 if (segment->p_type == PT_NULL)
5568 continue;
c044fabd 5569
9f17e2a6 5570 first_section = NULL;
bc67d8a6 5571 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5572 for (section = ibfd->sections, section_count = 0;
5573 section != NULL;
5574 section = section->next)
9f17e2a6
L
5575 {
5576 /* Find the first section in the input segment, which may be
5577 removed from the corresponding output segment. */
5578 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5579 {
5580 if (first_section == NULL)
5581 first_section = section;
5582 if (section->output_section != NULL)
5583 ++section_count;
5584 }
5585 }
811072d8 5586
b5f852ea
NC
5587 /* Allocate a segment map big enough to contain
5588 all of the sections we have selected. */
dc810e39
AM
5589 amt = sizeof (struct elf_segment_map);
5590 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5591 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5592 if (map == NULL)
b34976b6 5593 return FALSE;
252b5132
RH
5594
5595 /* Initialise the fields of the segment map. Default to
5596 using the physical address of the segment in the input BFD. */
0067a569
AM
5597 map->next = NULL;
5598 map->p_type = segment->p_type;
5599 map->p_flags = segment->p_flags;
bc67d8a6 5600 map->p_flags_valid = 1;
55d55ac7 5601
9f17e2a6
L
5602 /* If the first section in the input segment is removed, there is
5603 no need to preserve segment physical address in the corresponding
5604 output segment. */
945c025a 5605 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5606 {
5607 map->p_paddr = segment->p_paddr;
5c44b38e 5608 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5609 }
252b5132
RH
5610
5611 /* Determine if this segment contains the ELF file header
5612 and if it contains the program headers themselves. */
bc67d8a6
NC
5613 map->includes_filehdr = (segment->p_offset == 0
5614 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5615 map->includes_phdrs = 0;
252b5132 5616
0067a569 5617 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5618 {
bc67d8a6
NC
5619 map->includes_phdrs =
5620 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5621 && (segment->p_offset + segment->p_filesz
252b5132
RH
5622 >= ((bfd_vma) iehdr->e_phoff
5623 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5624
bc67d8a6 5625 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5626 phdr_included = TRUE;
252b5132
RH
5627 }
5628
bc67d8a6 5629 if (section_count == 0)
252b5132
RH
5630 {
5631 /* Special segments, such as the PT_PHDR segment, may contain
5632 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5633 something. They are allowed by the ELF spec however, so only
5634 a warning is produced. */
bc67d8a6 5635 if (segment->p_type == PT_LOAD)
0067a569
AM
5636 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5637 " detected, is this intentional ?\n"),
5638 ibfd);
252b5132 5639
bc67d8a6 5640 map->count = 0;
c044fabd
KH
5641 *pointer_to_map = map;
5642 pointer_to_map = &map->next;
252b5132
RH
5643
5644 continue;
5645 }
5646
5647 /* Now scan the sections in the input BFD again and attempt
5648 to add their corresponding output sections to the segment map.
5649 The problem here is how to handle an output section which has
5650 been moved (ie had its LMA changed). There are four possibilities:
5651
5652 1. None of the sections have been moved.
5653 In this case we can continue to use the segment LMA from the
5654 input BFD.
5655
5656 2. All of the sections have been moved by the same amount.
5657 In this case we can change the segment's LMA to match the LMA
5658 of the first section.
5659
5660 3. Some of the sections have been moved, others have not.
5661 In this case those sections which have not been moved can be
5662 placed in the current segment which will have to have its size,
5663 and possibly its LMA changed, and a new segment or segments will
5664 have to be created to contain the other sections.
5665
b5f852ea 5666 4. The sections have been moved, but not by the same amount.
252b5132
RH
5667 In this case we can change the segment's LMA to match the LMA
5668 of the first section and we will have to create a new segment
5669 or segments to contain the other sections.
5670
5671 In order to save time, we allocate an array to hold the section
5672 pointers that we are interested in. As these sections get assigned
5673 to a segment, they are removed from this array. */
5674
a50b1753 5675 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5676 if (sections == NULL)
b34976b6 5677 return FALSE;
252b5132
RH
5678
5679 /* Step One: Scan for segment vs section LMA conflicts.
5680 Also add the sections to the section array allocated above.
5681 Also add the sections to the current segment. In the common
5682 case, where the sections have not been moved, this means that
5683 we have completely filled the segment, and there is nothing
5684 more to do. */
252b5132 5685 isec = 0;
72730e0c 5686 matching_lma = 0;
252b5132 5687 suggested_lma = 0;
0067a569
AM
5688 first_matching_lma = TRUE;
5689 first_suggested_lma = TRUE;
252b5132 5690
147d51c2 5691 for (section = ibfd->sections;
bc67d8a6
NC
5692 section != NULL;
5693 section = section->next)
147d51c2
L
5694 if (section == first_section)
5695 break;
5696
5697 for (j = 0; section != NULL; section = section->next)
252b5132 5698 {
caf47ea6 5699 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5700 {
bc67d8a6
NC
5701 output_section = section->output_section;
5702
0067a569 5703 sections[j++] = section;
252b5132
RH
5704
5705 /* The Solaris native linker always sets p_paddr to 0.
5706 We try to catch that case here, and set it to the
5e8d7549
NC
5707 correct value. Note - some backends require that
5708 p_paddr be left as zero. */
5c44b38e 5709 if (!p_paddr_valid
4455705d 5710 && segment->p_vaddr != 0
0067a569 5711 && !bed->want_p_paddr_set_to_zero
252b5132 5712 && isec == 0
bc67d8a6 5713 && output_section->lma != 0
0067a569
AM
5714 && output_section->vma == (segment->p_vaddr
5715 + (map->includes_filehdr
5716 ? iehdr->e_ehsize
5717 : 0)
5718 + (map->includes_phdrs
5719 ? (iehdr->e_phnum
5720 * iehdr->e_phentsize)
5721 : 0)))
bc67d8a6 5722 map->p_paddr = segment->p_vaddr;
252b5132
RH
5723
5724 /* Match up the physical address of the segment with the
5725 LMA address of the output section. */
bc67d8a6 5726 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5727 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5728 || (bed->want_p_paddr_set_to_zero
5729 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5730 {
0067a569
AM
5731 if (first_matching_lma || output_section->lma < matching_lma)
5732 {
5733 matching_lma = output_section->lma;
5734 first_matching_lma = FALSE;
5735 }
252b5132
RH
5736
5737 /* We assume that if the section fits within the segment
bc67d8a6 5738 then it does not overlap any other section within that
252b5132 5739 segment. */
0067a569
AM
5740 map->sections[isec++] = output_section;
5741 }
5742 else if (first_suggested_lma)
5743 {
5744 suggested_lma = output_section->lma;
5745 first_suggested_lma = FALSE;
252b5132 5746 }
147d51c2
L
5747
5748 if (j == section_count)
5749 break;
252b5132
RH
5750 }
5751 }
5752
bc67d8a6 5753 BFD_ASSERT (j == section_count);
252b5132
RH
5754
5755 /* Step Two: Adjust the physical address of the current segment,
5756 if necessary. */
bc67d8a6 5757 if (isec == section_count)
252b5132
RH
5758 {
5759 /* All of the sections fitted within the segment as currently
5760 specified. This is the default case. Add the segment to
5761 the list of built segments and carry on to process the next
5762 program header in the input BFD. */
bc67d8a6 5763 map->count = section_count;
c044fabd
KH
5764 *pointer_to_map = map;
5765 pointer_to_map = &map->next;
08a40648 5766
5c44b38e
AM
5767 if (p_paddr_valid
5768 && !bed->want_p_paddr_set_to_zero
147d51c2 5769 && matching_lma != map->p_paddr
5c44b38e
AM
5770 && !map->includes_filehdr
5771 && !map->includes_phdrs)
3271a814
NS
5772 /* There is some padding before the first section in the
5773 segment. So, we must account for that in the output
5774 segment's vma. */
5775 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5776
252b5132
RH
5777 free (sections);
5778 continue;
5779 }
252b5132
RH
5780 else
5781 {
0067a569 5782 if (!first_matching_lma)
72730e0c
AM
5783 {
5784 /* At least one section fits inside the current segment.
5785 Keep it, but modify its physical address to match the
5786 LMA of the first section that fitted. */
bc67d8a6 5787 map->p_paddr = matching_lma;
72730e0c
AM
5788 }
5789 else
5790 {
5791 /* None of the sections fitted inside the current segment.
5792 Change the current segment's physical address to match
5793 the LMA of the first section. */
bc67d8a6 5794 map->p_paddr = suggested_lma;
72730e0c
AM
5795 }
5796
bc67d8a6
NC
5797 /* Offset the segment physical address from the lma
5798 to allow for space taken up by elf headers. */
5799 if (map->includes_filehdr)
010c8431
AM
5800 {
5801 if (map->p_paddr >= iehdr->e_ehsize)
5802 map->p_paddr -= iehdr->e_ehsize;
5803 else
5804 {
5805 map->includes_filehdr = FALSE;
5806 map->includes_phdrs = FALSE;
5807 }
5808 }
252b5132 5809
bc67d8a6
NC
5810 if (map->includes_phdrs)
5811 {
010c8431
AM
5812 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5813 {
5814 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5815
5816 /* iehdr->e_phnum is just an estimate of the number
5817 of program headers that we will need. Make a note
5818 here of the number we used and the segment we chose
5819 to hold these headers, so that we can adjust the
5820 offset when we know the correct value. */
5821 phdr_adjust_num = iehdr->e_phnum;
5822 phdr_adjust_seg = map;
5823 }
5824 else
5825 map->includes_phdrs = FALSE;
bc67d8a6 5826 }
252b5132
RH
5827 }
5828
5829 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5830 those that fit to the current segment and removing them from the
252b5132
RH
5831 sections array; but making sure not to leave large gaps. Once all
5832 possible sections have been assigned to the current segment it is
5833 added to the list of built segments and if sections still remain
5834 to be assigned, a new segment is constructed before repeating
5835 the loop. */
5836 isec = 0;
5837 do
5838 {
bc67d8a6 5839 map->count = 0;
252b5132 5840 suggested_lma = 0;
0067a569 5841 first_suggested_lma = TRUE;
252b5132
RH
5842
5843 /* Fill the current segment with sections that fit. */
bc67d8a6 5844 for (j = 0; j < section_count; j++)
252b5132 5845 {
bc67d8a6 5846 section = sections[j];
252b5132 5847
bc67d8a6 5848 if (section == NULL)
252b5132
RH
5849 continue;
5850
bc67d8a6 5851 output_section = section->output_section;
252b5132 5852
bc67d8a6 5853 BFD_ASSERT (output_section != NULL);
c044fabd 5854
bc67d8a6
NC
5855 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5856 || IS_COREFILE_NOTE (segment, section))
252b5132 5857 {
bc67d8a6 5858 if (map->count == 0)
252b5132
RH
5859 {
5860 /* If the first section in a segment does not start at
bc67d8a6
NC
5861 the beginning of the segment, then something is
5862 wrong. */
0067a569
AM
5863 if (output_section->lma
5864 != (map->p_paddr
5865 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5866 + (map->includes_phdrs
5867 ? iehdr->e_phnum * iehdr->e_phentsize
5868 : 0)))
252b5132
RH
5869 abort ();
5870 }
5871 else
5872 {
0067a569 5873 asection *prev_sec;
252b5132 5874
bc67d8a6 5875 prev_sec = map->sections[map->count - 1];
252b5132
RH
5876
5877 /* If the gap between the end of the previous section
bc67d8a6
NC
5878 and the start of this section is more than
5879 maxpagesize then we need to start a new segment. */
eea6121a 5880 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5881 maxpagesize)
caf47ea6 5882 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 5883 || (prev_sec->lma + prev_sec->size
079e9a2f 5884 > output_section->lma))
252b5132 5885 {
0067a569
AM
5886 if (first_suggested_lma)
5887 {
5888 suggested_lma = output_section->lma;
5889 first_suggested_lma = FALSE;
5890 }
252b5132
RH
5891
5892 continue;
5893 }
5894 }
5895
bc67d8a6 5896 map->sections[map->count++] = output_section;
252b5132
RH
5897 ++isec;
5898 sections[j] = NULL;
b34976b6 5899 section->segment_mark = TRUE;
252b5132 5900 }
0067a569
AM
5901 else if (first_suggested_lma)
5902 {
5903 suggested_lma = output_section->lma;
5904 first_suggested_lma = FALSE;
5905 }
252b5132
RH
5906 }
5907
bc67d8a6 5908 BFD_ASSERT (map->count > 0);
252b5132
RH
5909
5910 /* Add the current segment to the list of built segments. */
c044fabd
KH
5911 *pointer_to_map = map;
5912 pointer_to_map = &map->next;
252b5132 5913
bc67d8a6 5914 if (isec < section_count)
252b5132
RH
5915 {
5916 /* We still have not allocated all of the sections to
5917 segments. Create a new segment here, initialise it
5918 and carry on looping. */
dc810e39
AM
5919 amt = sizeof (struct elf_segment_map);
5920 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5921 map = (struct elf_segment_map *) bfd_alloc (obfd, amt);
bc67d8a6 5922 if (map == NULL)
5ed6aba4
NC
5923 {
5924 free (sections);
5925 return FALSE;
5926 }
252b5132
RH
5927
5928 /* Initialise the fields of the segment map. Set the physical
5929 physical address to the LMA of the first section that has
5930 not yet been assigned. */
0067a569
AM
5931 map->next = NULL;
5932 map->p_type = segment->p_type;
5933 map->p_flags = segment->p_flags;
5934 map->p_flags_valid = 1;
5935 map->p_paddr = suggested_lma;
5c44b38e 5936 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 5937 map->includes_filehdr = 0;
0067a569 5938 map->includes_phdrs = 0;
252b5132
RH
5939 }
5940 }
bc67d8a6 5941 while (isec < section_count);
252b5132
RH
5942
5943 free (sections);
5944 }
5945
bc67d8a6
NC
5946 elf_tdata (obfd)->segment_map = map_first;
5947
5948 /* If we had to estimate the number of program headers that were
9ad5cbcf 5949 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5950 the offset if necessary. */
5951 if (phdr_adjust_seg != NULL)
5952 {
5953 unsigned int count;
c044fabd 5954
bc67d8a6 5955 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5956 count++;
252b5132 5957
bc67d8a6
NC
5958 if (count > phdr_adjust_num)
5959 phdr_adjust_seg->p_paddr
5960 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5961 }
c044fabd 5962
bc67d8a6 5963#undef SEGMENT_END
eecdbe52 5964#undef SECTION_SIZE
bc67d8a6
NC
5965#undef IS_CONTAINED_BY_VMA
5966#undef IS_CONTAINED_BY_LMA
0efc80c8 5967#undef IS_NOTE
252b5132 5968#undef IS_COREFILE_NOTE
bc67d8a6 5969#undef IS_SOLARIS_PT_INTERP
9f17e2a6 5970#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
5971#undef INCLUDE_SECTION_IN_SEGMENT
5972#undef SEGMENT_AFTER_SEGMENT
5973#undef SEGMENT_OVERLAPS
b34976b6 5974 return TRUE;
252b5132
RH
5975}
5976
84d1d650
L
5977/* Copy ELF program header information. */
5978
5979static bfd_boolean
5980copy_elf_program_header (bfd *ibfd, bfd *obfd)
5981{
5982 Elf_Internal_Ehdr *iehdr;
5983 struct elf_segment_map *map;
5984 struct elf_segment_map *map_first;
5985 struct elf_segment_map **pointer_to_map;
5986 Elf_Internal_Phdr *segment;
5987 unsigned int i;
5988 unsigned int num_segments;
5989 bfd_boolean phdr_included = FALSE;
88967714 5990 bfd_boolean p_paddr_valid;
84d1d650
L
5991
5992 iehdr = elf_elfheader (ibfd);
5993
5994 map_first = NULL;
5995 pointer_to_map = &map_first;
5996
88967714
AM
5997 /* If all the segment p_paddr fields are zero, don't set
5998 map->p_paddr_valid. */
5999 p_paddr_valid = FALSE;
84d1d650 6000 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
6001 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6002 i < num_segments;
6003 i++, segment++)
6004 if (segment->p_paddr != 0)
6005 {
6006 p_paddr_valid = TRUE;
6007 break;
6008 }
6009
84d1d650
L
6010 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6011 i < num_segments;
6012 i++, segment++)
6013 {
6014 asection *section;
6015 unsigned int section_count;
6016 bfd_size_type amt;
6017 Elf_Internal_Shdr *this_hdr;
53020534 6018 asection *first_section = NULL;
a76e6f2f 6019 asection *lowest_section;
84d1d650 6020
84d1d650
L
6021 /* Compute how many sections are in this segment. */
6022 for (section = ibfd->sections, section_count = 0;
6023 section != NULL;
6024 section = section->next)
6025 {
6026 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6027 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 6028 {
a76e6f2f
AM
6029 if (first_section == NULL)
6030 first_section = section;
3271a814
NS
6031 section_count++;
6032 }
84d1d650
L
6033 }
6034
6035 /* Allocate a segment map big enough to contain
6036 all of the sections we have selected. */
6037 amt = sizeof (struct elf_segment_map);
6038 if (section_count != 0)
6039 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6040 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
6041 if (map == NULL)
6042 return FALSE;
6043
6044 /* Initialize the fields of the output segment map with the
6045 input segment. */
6046 map->next = NULL;
6047 map->p_type = segment->p_type;
6048 map->p_flags = segment->p_flags;
6049 map->p_flags_valid = 1;
6050 map->p_paddr = segment->p_paddr;
88967714 6051 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
6052 map->p_align = segment->p_align;
6053 map->p_align_valid = 1;
3271a814 6054 map->p_vaddr_offset = 0;
84d1d650 6055
9433b9b1 6056 if (map->p_type == PT_GNU_RELRO)
b10a8ae0
L
6057 {
6058 /* The PT_GNU_RELRO segment may contain the first a few
6059 bytes in the .got.plt section even if the whole .got.plt
6060 section isn't in the PT_GNU_RELRO segment. We won't
6061 change the size of the PT_GNU_RELRO segment. */
9433b9b1 6062 map->p_size = segment->p_memsz;
b10a8ae0
L
6063 map->p_size_valid = 1;
6064 }
6065
84d1d650
L
6066 /* Determine if this segment contains the ELF file header
6067 and if it contains the program headers themselves. */
6068 map->includes_filehdr = (segment->p_offset == 0
6069 && segment->p_filesz >= iehdr->e_ehsize);
6070
6071 map->includes_phdrs = 0;
6072 if (! phdr_included || segment->p_type != PT_LOAD)
6073 {
6074 map->includes_phdrs =
6075 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6076 && (segment->p_offset + segment->p_filesz
6077 >= ((bfd_vma) iehdr->e_phoff
6078 + iehdr->e_phnum * iehdr->e_phentsize)));
6079
6080 if (segment->p_type == PT_LOAD && map->includes_phdrs)
6081 phdr_included = TRUE;
6082 }
6083
a76e6f2f 6084 lowest_section = first_section;
84d1d650
L
6085 if (section_count != 0)
6086 {
6087 unsigned int isec = 0;
6088
53020534 6089 for (section = first_section;
84d1d650
L
6090 section != NULL;
6091 section = section->next)
6092 {
6093 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6094 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
6095 {
6096 map->sections[isec++] = section->output_section;
a76e6f2f
AM
6097 if (section->lma < lowest_section->lma)
6098 lowest_section = section;
6099 if ((section->flags & SEC_ALLOC) != 0)
6100 {
6101 bfd_vma seg_off;
6102
6103 /* Section lmas are set up from PT_LOAD header
6104 p_paddr in _bfd_elf_make_section_from_shdr.
6105 If this header has a p_paddr that disagrees
6106 with the section lma, flag the p_paddr as
6107 invalid. */
6108 if ((section->flags & SEC_LOAD) != 0)
6109 seg_off = this_hdr->sh_offset - segment->p_offset;
6110 else
6111 seg_off = this_hdr->sh_addr - segment->p_vaddr;
6112 if (section->lma - segment->p_paddr != seg_off)
6113 map->p_paddr_valid = FALSE;
6114 }
53020534
L
6115 if (isec == section_count)
6116 break;
6117 }
84d1d650
L
6118 }
6119 }
6120
a76e6f2f
AM
6121 if (map->includes_filehdr && lowest_section != NULL)
6122 /* We need to keep the space used by the headers fixed. */
6123 map->header_size = lowest_section->vma - segment->p_vaddr;
6124
6125 if (!map->includes_phdrs
6126 && !map->includes_filehdr
6127 && map->p_paddr_valid)
6128 /* There is some other padding before the first section. */
6129 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
6130 - segment->p_paddr);
6131
84d1d650
L
6132 map->count = section_count;
6133 *pointer_to_map = map;
6134 pointer_to_map = &map->next;
6135 }
6136
6137 elf_tdata (obfd)->segment_map = map_first;
6138 return TRUE;
6139}
6140
6141/* Copy private BFD data. This copies or rewrites ELF program header
6142 information. */
6143
6144static bfd_boolean
6145copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6146{
84d1d650
L
6147 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6148 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6149 return TRUE;
6150
6151 if (elf_tdata (ibfd)->phdr == NULL)
6152 return TRUE;
6153
6154 if (ibfd->xvec == obfd->xvec)
6155 {
cb3ff1e5
NC
6156 /* Check to see if any sections in the input BFD
6157 covered by ELF program header have changed. */
d55ce4e2 6158 Elf_Internal_Phdr *segment;
84d1d650
L
6159 asection *section, *osec;
6160 unsigned int i, num_segments;
6161 Elf_Internal_Shdr *this_hdr;
147d51c2
L
6162 const struct elf_backend_data *bed;
6163
6164 bed = get_elf_backend_data (ibfd);
6165
6166 /* Regenerate the segment map if p_paddr is set to 0. */
6167 if (bed->want_p_paddr_set_to_zero)
6168 goto rewrite;
84d1d650
L
6169
6170 /* Initialize the segment mark field. */
6171 for (section = obfd->sections; section != NULL;
6172 section = section->next)
6173 section->segment_mark = FALSE;
6174
6175 num_segments = elf_elfheader (ibfd)->e_phnum;
6176 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6177 i < num_segments;
6178 i++, segment++)
6179 {
5f6999aa
NC
6180 /* PR binutils/3535. The Solaris linker always sets the p_paddr
6181 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
6182 which severly confuses things, so always regenerate the segment
6183 map in this case. */
6184 if (segment->p_paddr == 0
6185 && segment->p_memsz == 0
6186 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6187 goto rewrite;
5f6999aa 6188
84d1d650
L
6189 for (section = ibfd->sections;
6190 section != NULL; section = section->next)
6191 {
6192 /* We mark the output section so that we know it comes
6193 from the input BFD. */
6194 osec = section->output_section;
6195 if (osec)
6196 osec->segment_mark = TRUE;
6197
6198 /* Check if this section is covered by the segment. */
6199 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6200 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6201 {
6202 /* FIXME: Check if its output section is changed or
6203 removed. What else do we need to check? */
6204 if (osec == NULL
6205 || section->flags != osec->flags
6206 || section->lma != osec->lma
6207 || section->vma != osec->vma
6208 || section->size != osec->size
6209 || section->rawsize != osec->rawsize
6210 || section->alignment_power != osec->alignment_power)
6211 goto rewrite;
6212 }
6213 }
6214 }
6215
cb3ff1e5 6216 /* Check to see if any output section do not come from the
84d1d650
L
6217 input BFD. */
6218 for (section = obfd->sections; section != NULL;
6219 section = section->next)
6220 {
6221 if (section->segment_mark == FALSE)
6222 goto rewrite;
6223 else
6224 section->segment_mark = FALSE;
6225 }
6226
6227 return copy_elf_program_header (ibfd, obfd);
6228 }
6229
6230rewrite:
6231 return rewrite_elf_program_header (ibfd, obfd);
6232}
6233
ccd2ec6a
L
6234/* Initialize private output section information from input section. */
6235
6236bfd_boolean
6237_bfd_elf_init_private_section_data (bfd *ibfd,
6238 asection *isec,
6239 bfd *obfd,
6240 asection *osec,
6241 struct bfd_link_info *link_info)
6242
6243{
6244 Elf_Internal_Shdr *ihdr, *ohdr;
dfa7b0b8 6245 bfd_boolean final_link = link_info != NULL && !link_info->relocatable;
ccd2ec6a
L
6246
6247 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6248 || obfd->xvec->flavour != bfd_target_elf_flavour)
6249 return TRUE;
6250
dfa7b0b8
AM
6251 /* For objcopy and relocatable link, don't copy the output ELF
6252 section type from input if the output BFD section flags have been
6253 set to something different. For a final link allow some flags
6254 that the linker clears to differ. */
42bb2e33 6255 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6256 && (osec->flags == isec->flags
6257 || (final_link
6258 && ((osec->flags ^ isec->flags)
0814be7d 6259 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 6260 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6261
6262 /* FIXME: Is this correct for all OS/PROC specific flags? */
6263 elf_section_flags (osec) |= (elf_section_flags (isec)
6264 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6265
6266 /* Set things up for objcopy and relocatable link. The output
6267 SHT_GROUP section will have its elf_next_in_group pointing back
6268 to the input group members. Ignore linker created group section.
6269 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 6270 if (!final_link)
ccd2ec6a
L
6271 {
6272 if (elf_sec_group (isec) == NULL
6273 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6274 {
6275 if (elf_section_flags (isec) & SHF_GROUP)
6276 elf_section_flags (osec) |= SHF_GROUP;
6277 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6278 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6279 }
6280 }
6281
6282 ihdr = &elf_section_data (isec)->this_hdr;
6283
6284 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6285 don't use the output section of the linked-to section since it
6286 may be NULL at this point. */
6287 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6288 {
6289 ohdr = &elf_section_data (osec)->this_hdr;
6290 ohdr->sh_flags |= SHF_LINK_ORDER;
6291 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6292 }
6293
6294 osec->use_rela_p = isec->use_rela_p;
6295
6296 return TRUE;
6297}
6298
252b5132
RH
6299/* Copy private section information. This copies over the entsize
6300 field, and sometimes the info field. */
6301
b34976b6 6302bfd_boolean
217aa764
AM
6303_bfd_elf_copy_private_section_data (bfd *ibfd,
6304 asection *isec,
6305 bfd *obfd,
6306 asection *osec)
252b5132
RH
6307{
6308 Elf_Internal_Shdr *ihdr, *ohdr;
6309
6310 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6311 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6312 return TRUE;
252b5132 6313
252b5132
RH
6314 ihdr = &elf_section_data (isec)->this_hdr;
6315 ohdr = &elf_section_data (osec)->this_hdr;
6316
6317 ohdr->sh_entsize = ihdr->sh_entsize;
6318
6319 if (ihdr->sh_type == SHT_SYMTAB
6320 || ihdr->sh_type == SHT_DYNSYM
6321 || ihdr->sh_type == SHT_GNU_verneed
6322 || ihdr->sh_type == SHT_GNU_verdef)
6323 ohdr->sh_info = ihdr->sh_info;
6324
ccd2ec6a
L
6325 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6326 NULL);
252b5132
RH
6327}
6328
d0bf826b
AM
6329/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
6330 necessary if we are removing either the SHT_GROUP section or any of
6331 the group member sections. DISCARDED is the value that a section's
6332 output_section has if the section will be discarded, NULL when this
6333 function is called from objcopy, bfd_abs_section_ptr when called
6334 from the linker. */
80fccad2
BW
6335
6336bfd_boolean
d0bf826b 6337_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 6338{
30288845
AM
6339 asection *isec;
6340
30288845 6341 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 6342 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
6343 {
6344 asection *first = elf_next_in_group (isec);
6345 asection *s = first;
d0bf826b
AM
6346 bfd_size_type removed = 0;
6347
30288845
AM
6348 while (s != NULL)
6349 {
415f38a6
AM
6350 /* If this member section is being output but the
6351 SHT_GROUP section is not, then clear the group info
6352 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
6353 if (s->output_section != discarded
6354 && isec->output_section == discarded)
30288845
AM
6355 {
6356 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6357 elf_group_name (s->output_section) = NULL;
6358 }
415f38a6
AM
6359 /* Conversely, if the member section is not being output
6360 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
6361 else if (s->output_section == discarded
6362 && isec->output_section != discarded)
6363 removed += 4;
30288845
AM
6364 s = elf_next_in_group (s);
6365 if (s == first)
6366 break;
6367 }
d0bf826b
AM
6368 if (removed != 0)
6369 {
6370 if (discarded != NULL)
6371 {
6372 /* If we've been called for ld -r, then we need to
6373 adjust the input section size. This function may
6374 be called multiple times, so save the original
6375 size. */
6376 if (isec->rawsize == 0)
6377 isec->rawsize = isec->size;
6378 isec->size = isec->rawsize - removed;
6379 }
6380 else
6381 {
6382 /* Adjust the output section size when called from
6383 objcopy. */
6384 isec->output_section->size -= removed;
6385 }
6386 }
30288845
AM
6387 }
6388
80fccad2
BW
6389 return TRUE;
6390}
6391
d0bf826b
AM
6392/* Copy private header information. */
6393
6394bfd_boolean
6395_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6396{
6397 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6398 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6399 return TRUE;
6400
6401 /* Copy over private BFD data if it has not already been copied.
6402 This must be done here, rather than in the copy_private_bfd_data
6403 entry point, because the latter is called after the section
6404 contents have been set, which means that the program headers have
6405 already been worked out. */
6406 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6407 {
6408 if (! copy_private_bfd_data (ibfd, obfd))
6409 return FALSE;
6410 }
6411
6412 return _bfd_elf_fixup_group_sections (ibfd, NULL);
6413}
6414
252b5132
RH
6415/* Copy private symbol information. If this symbol is in a section
6416 which we did not map into a BFD section, try to map the section
6417 index correctly. We use special macro definitions for the mapped
6418 section indices; these definitions are interpreted by the
6419 swap_out_syms function. */
6420
9ad5cbcf
AM
6421#define MAP_ONESYMTAB (SHN_HIOS + 1)
6422#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6423#define MAP_STRTAB (SHN_HIOS + 3)
6424#define MAP_SHSTRTAB (SHN_HIOS + 4)
6425#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6426
b34976b6 6427bfd_boolean
217aa764
AM
6428_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6429 asymbol *isymarg,
6430 bfd *obfd,
6431 asymbol *osymarg)
252b5132
RH
6432{
6433 elf_symbol_type *isym, *osym;
6434
6435 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6436 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6437 return TRUE;
252b5132
RH
6438
6439 isym = elf_symbol_from (ibfd, isymarg);
6440 osym = elf_symbol_from (obfd, osymarg);
6441
6442 if (isym != NULL
8424d8f5 6443 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6444 && osym != NULL
6445 && bfd_is_abs_section (isym->symbol.section))
6446 {
6447 unsigned int shndx;
6448
6449 shndx = isym->internal_elf_sym.st_shndx;
6450 if (shndx == elf_onesymtab (ibfd))
6451 shndx = MAP_ONESYMTAB;
6452 else if (shndx == elf_dynsymtab (ibfd))
6453 shndx = MAP_DYNSYMTAB;
6454 else if (shndx == elf_tdata (ibfd)->strtab_section)
6455 shndx = MAP_STRTAB;
6456 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6457 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6458 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6459 shndx = MAP_SYM_SHNDX;
252b5132
RH
6460 osym->internal_elf_sym.st_shndx = shndx;
6461 }
6462
b34976b6 6463 return TRUE;
252b5132
RH
6464}
6465
6466/* Swap out the symbols. */
6467
b34976b6 6468static bfd_boolean
217aa764
AM
6469swap_out_syms (bfd *abfd,
6470 struct bfd_strtab_hash **sttp,
6471 int relocatable_p)
252b5132 6472{
9c5bfbb7 6473 const struct elf_backend_data *bed;
079e9a2f
AM
6474 int symcount;
6475 asymbol **syms;
6476 struct bfd_strtab_hash *stt;
6477 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6478 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6479 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6480 bfd_byte *outbound_syms;
6481 bfd_byte *outbound_shndx;
079e9a2f
AM
6482 int idx;
6483 bfd_size_type amt;
174fd7f9 6484 bfd_boolean name_local_sections;
252b5132
RH
6485
6486 if (!elf_map_symbols (abfd))
b34976b6 6487 return FALSE;
252b5132 6488
c044fabd 6489 /* Dump out the symtabs. */
079e9a2f
AM
6490 stt = _bfd_elf_stringtab_init ();
6491 if (stt == NULL)
b34976b6 6492 return FALSE;
252b5132 6493
079e9a2f
AM
6494 bed = get_elf_backend_data (abfd);
6495 symcount = bfd_get_symcount (abfd);
6496 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6497 symtab_hdr->sh_type = SHT_SYMTAB;
6498 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6499 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6500 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
72de5009 6501 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6502
6503 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6504 symstrtab_hdr->sh_type = SHT_STRTAB;
6505
a50b1753
NC
6506 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6507 bed->s->sizeof_sym);
079e9a2f 6508 if (outbound_syms == NULL)
5ed6aba4
NC
6509 {
6510 _bfd_stringtab_free (stt);
6511 return FALSE;
6512 }
217aa764 6513 symtab_hdr->contents = outbound_syms;
252b5132 6514
9ad5cbcf
AM
6515 outbound_shndx = NULL;
6516 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6517 if (symtab_shndx_hdr->sh_name != 0)
6518 {
6519 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6520 outbound_shndx = (bfd_byte *)
6521 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6522 if (outbound_shndx == NULL)
5ed6aba4
NC
6523 {
6524 _bfd_stringtab_free (stt);
6525 return FALSE;
6526 }
6527
9ad5cbcf
AM
6528 symtab_shndx_hdr->contents = outbound_shndx;
6529 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6530 symtab_shndx_hdr->sh_size = amt;
6531 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6532 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6533 }
6534
589e6347 6535 /* Now generate the data (for "contents"). */
079e9a2f
AM
6536 {
6537 /* Fill in zeroth symbol and swap it out. */
6538 Elf_Internal_Sym sym;
6539 sym.st_name = 0;
6540 sym.st_value = 0;
6541 sym.st_size = 0;
6542 sym.st_info = 0;
6543 sym.st_other = 0;
6544 sym.st_shndx = SHN_UNDEF;
35fc36a8 6545 sym.st_target_internal = 0;
9ad5cbcf 6546 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6547 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6548 if (outbound_shndx != NULL)
6549 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6550 }
252b5132 6551
174fd7f9
RS
6552 name_local_sections
6553 = (bed->elf_backend_name_local_section_symbols
6554 && bed->elf_backend_name_local_section_symbols (abfd));
6555
079e9a2f
AM
6556 syms = bfd_get_outsymbols (abfd);
6557 for (idx = 0; idx < symcount; idx++)
252b5132 6558 {
252b5132 6559 Elf_Internal_Sym sym;
079e9a2f
AM
6560 bfd_vma value = syms[idx]->value;
6561 elf_symbol_type *type_ptr;
6562 flagword flags = syms[idx]->flags;
6563 int type;
252b5132 6564
174fd7f9
RS
6565 if (!name_local_sections
6566 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6567 {
6568 /* Local section symbols have no name. */
6569 sym.st_name = 0;
6570 }
6571 else
6572 {
6573 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6574 syms[idx]->name,
b34976b6 6575 TRUE, FALSE);
079e9a2f 6576 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6577 {
6578 _bfd_stringtab_free (stt);
6579 return FALSE;
6580 }
079e9a2f 6581 }
252b5132 6582
079e9a2f 6583 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6584
079e9a2f
AM
6585 if ((flags & BSF_SECTION_SYM) == 0
6586 && bfd_is_com_section (syms[idx]->section))
6587 {
6588 /* ELF common symbols put the alignment into the `value' field,
6589 and the size into the `size' field. This is backwards from
6590 how BFD handles it, so reverse it here. */
6591 sym.st_size = value;
6592 if (type_ptr == NULL
6593 || type_ptr->internal_elf_sym.st_value == 0)
6594 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6595 else
6596 sym.st_value = type_ptr->internal_elf_sym.st_value;
6597 sym.st_shndx = _bfd_elf_section_from_bfd_section
6598 (abfd, syms[idx]->section);
6599 }
6600 else
6601 {
6602 asection *sec = syms[idx]->section;
cb33740c 6603 unsigned int shndx;
252b5132 6604
079e9a2f
AM
6605 if (sec->output_section)
6606 {
6607 value += sec->output_offset;
6608 sec = sec->output_section;
6609 }
589e6347 6610
079e9a2f
AM
6611 /* Don't add in the section vma for relocatable output. */
6612 if (! relocatable_p)
6613 value += sec->vma;
6614 sym.st_value = value;
6615 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6616
6617 if (bfd_is_abs_section (sec)
6618 && type_ptr != NULL
6619 && type_ptr->internal_elf_sym.st_shndx != 0)
6620 {
6621 /* This symbol is in a real ELF section which we did
6622 not create as a BFD section. Undo the mapping done
6623 by copy_private_symbol_data. */
6624 shndx = type_ptr->internal_elf_sym.st_shndx;
6625 switch (shndx)
6626 {
6627 case MAP_ONESYMTAB:
6628 shndx = elf_onesymtab (abfd);
6629 break;
6630 case MAP_DYNSYMTAB:
6631 shndx = elf_dynsymtab (abfd);
6632 break;
6633 case MAP_STRTAB:
6634 shndx = elf_tdata (abfd)->strtab_section;
6635 break;
6636 case MAP_SHSTRTAB:
6637 shndx = elf_tdata (abfd)->shstrtab_section;
6638 break;
9ad5cbcf
AM
6639 case MAP_SYM_SHNDX:
6640 shndx = elf_tdata (abfd)->symtab_shndx_section;
6641 break;
079e9a2f
AM
6642 default:
6643 break;
6644 }
6645 }
6646 else
6647 {
6648 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6649
cb33740c 6650 if (shndx == SHN_BAD)
079e9a2f
AM
6651 {
6652 asection *sec2;
6653
6654 /* Writing this would be a hell of a lot easier if
6655 we had some decent documentation on bfd, and
6656 knew what to expect of the library, and what to
6657 demand of applications. For example, it
6658 appears that `objcopy' might not set the
6659 section of a symbol to be a section that is
6660 actually in the output file. */
6661 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6662 if (sec2 == NULL)
6663 {
6664 _bfd_error_handler (_("\
6665Unable to find equivalent output section for symbol '%s' from section '%s'"),
6666 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6667 sec->name);
811072d8 6668 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6669 _bfd_stringtab_free (stt);
589e6347
NC
6670 return FALSE;
6671 }
811072d8 6672
079e9a2f 6673 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6674 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6675 }
6676 }
252b5132 6677
079e9a2f
AM
6678 sym.st_shndx = shndx;
6679 }
252b5132 6680
13ae64f3
JJ
6681 if ((flags & BSF_THREAD_LOCAL) != 0)
6682 type = STT_TLS;
d8045f23
NC
6683 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6684 type = STT_GNU_IFUNC;
13ae64f3 6685 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6686 type = STT_FUNC;
6687 else if ((flags & BSF_OBJECT) != 0)
6688 type = STT_OBJECT;
d9352518
DB
6689 else if ((flags & BSF_RELC) != 0)
6690 type = STT_RELC;
6691 else if ((flags & BSF_SRELC) != 0)
6692 type = STT_SRELC;
079e9a2f
AM
6693 else
6694 type = STT_NOTYPE;
252b5132 6695
13ae64f3
JJ
6696 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6697 type = STT_TLS;
6698
589e6347 6699 /* Processor-specific types. */
079e9a2f
AM
6700 if (type_ptr != NULL
6701 && bed->elf_backend_get_symbol_type)
6702 type = ((*bed->elf_backend_get_symbol_type)
6703 (&type_ptr->internal_elf_sym, type));
252b5132 6704
079e9a2f
AM
6705 if (flags & BSF_SECTION_SYM)
6706 {
6707 if (flags & BSF_GLOBAL)
6708 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6709 else
6710 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6711 }
6712 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6713 {
504b7d20 6714#ifdef USE_STT_COMMON
0a40daed
MK
6715 if (type == STT_OBJECT)
6716 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6717 else
504b7d20 6718#endif
c91e322a 6719 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6720 }
079e9a2f
AM
6721 else if (bfd_is_und_section (syms[idx]->section))
6722 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6723 ? STB_WEAK
6724 : STB_GLOBAL),
6725 type);
6726 else if (flags & BSF_FILE)
6727 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6728 else
6729 {
6730 int bind = STB_LOCAL;
252b5132 6731
079e9a2f
AM
6732 if (flags & BSF_LOCAL)
6733 bind = STB_LOCAL;
3e7a7d11
NC
6734 else if (flags & BSF_GNU_UNIQUE)
6735 bind = STB_GNU_UNIQUE;
079e9a2f
AM
6736 else if (flags & BSF_WEAK)
6737 bind = STB_WEAK;
6738 else if (flags & BSF_GLOBAL)
6739 bind = STB_GLOBAL;
252b5132 6740
079e9a2f
AM
6741 sym.st_info = ELF_ST_INFO (bind, type);
6742 }
252b5132 6743
079e9a2f 6744 if (type_ptr != NULL)
35fc36a8
RS
6745 {
6746 sym.st_other = type_ptr->internal_elf_sym.st_other;
6747 sym.st_target_internal
6748 = type_ptr->internal_elf_sym.st_target_internal;
6749 }
079e9a2f 6750 else
35fc36a8
RS
6751 {
6752 sym.st_other = 0;
6753 sym.st_target_internal = 0;
6754 }
252b5132 6755
9ad5cbcf 6756 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6757 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6758 if (outbound_shndx != NULL)
6759 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6760 }
252b5132 6761
079e9a2f
AM
6762 *sttp = stt;
6763 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6764 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6765
079e9a2f
AM
6766 symstrtab_hdr->sh_flags = 0;
6767 symstrtab_hdr->sh_addr = 0;
6768 symstrtab_hdr->sh_entsize = 0;
6769 symstrtab_hdr->sh_link = 0;
6770 symstrtab_hdr->sh_info = 0;
6771 symstrtab_hdr->sh_addralign = 1;
252b5132 6772
b34976b6 6773 return TRUE;
252b5132
RH
6774}
6775
6776/* Return the number of bytes required to hold the symtab vector.
6777
6778 Note that we base it on the count plus 1, since we will null terminate
6779 the vector allocated based on this size. However, the ELF symbol table
6780 always has a dummy entry as symbol #0, so it ends up even. */
6781
6782long
217aa764 6783_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6784{
6785 long symcount;
6786 long symtab_size;
6787 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6788
6789 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6790 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6791 if (symcount > 0)
6792 symtab_size -= sizeof (asymbol *);
252b5132
RH
6793
6794 return symtab_size;
6795}
6796
6797long
217aa764 6798_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6799{
6800 long symcount;
6801 long symtab_size;
6802 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6803
6804 if (elf_dynsymtab (abfd) == 0)
6805 {
6806 bfd_set_error (bfd_error_invalid_operation);
6807 return -1;
6808 }
6809
6810 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6811 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6812 if (symcount > 0)
6813 symtab_size -= sizeof (asymbol *);
252b5132
RH
6814
6815 return symtab_size;
6816}
6817
6818long
217aa764
AM
6819_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6820 sec_ptr asect)
252b5132
RH
6821{
6822 return (asect->reloc_count + 1) * sizeof (arelent *);
6823}
6824
6825/* Canonicalize the relocs. */
6826
6827long
217aa764
AM
6828_bfd_elf_canonicalize_reloc (bfd *abfd,
6829 sec_ptr section,
6830 arelent **relptr,
6831 asymbol **symbols)
252b5132
RH
6832{
6833 arelent *tblptr;
6834 unsigned int i;
9c5bfbb7 6835 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6836
b34976b6 6837 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6838 return -1;
6839
6840 tblptr = section->relocation;
6841 for (i = 0; i < section->reloc_count; i++)
6842 *relptr++ = tblptr++;
6843
6844 *relptr = NULL;
6845
6846 return section->reloc_count;
6847}
6848
6849long
6cee3f79 6850_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6851{
9c5bfbb7 6852 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6853 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6854
6855 if (symcount >= 0)
6856 bfd_get_symcount (abfd) = symcount;
6857 return symcount;
6858}
6859
6860long
217aa764
AM
6861_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6862 asymbol **allocation)
252b5132 6863{
9c5bfbb7 6864 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6865 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6866
6867 if (symcount >= 0)
6868 bfd_get_dynamic_symcount (abfd) = symcount;
6869 return symcount;
252b5132
RH
6870}
6871
8615f3f2
AM
6872/* Return the size required for the dynamic reloc entries. Any loadable
6873 section that was actually installed in the BFD, and has type SHT_REL
6874 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6875 dynamic reloc section. */
252b5132
RH
6876
6877long
217aa764 6878_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6879{
6880 long ret;
6881 asection *s;
6882
6883 if (elf_dynsymtab (abfd) == 0)
6884 {
6885 bfd_set_error (bfd_error_invalid_operation);
6886 return -1;
6887 }
6888
6889 ret = sizeof (arelent *);
6890 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 6891 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6892 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6893 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6894 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6895 * sizeof (arelent *));
6896
6897 return ret;
6898}
6899
8615f3f2
AM
6900/* Canonicalize the dynamic relocation entries. Note that we return the
6901 dynamic relocations as a single block, although they are actually
6902 associated with particular sections; the interface, which was
6903 designed for SunOS style shared libraries, expects that there is only
6904 one set of dynamic relocs. Any loadable section that was actually
6905 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6906 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6907
6908long
217aa764
AM
6909_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6910 arelent **storage,
6911 asymbol **syms)
252b5132 6912{
217aa764 6913 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6914 asection *s;
6915 long ret;
6916
6917 if (elf_dynsymtab (abfd) == 0)
6918 {
6919 bfd_set_error (bfd_error_invalid_operation);
6920 return -1;
6921 }
6922
6923 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6924 ret = 0;
6925 for (s = abfd->sections; s != NULL; s = s->next)
6926 {
266b05cf 6927 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6928 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6929 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6930 {
6931 arelent *p;
6932 long count, i;
6933
b34976b6 6934 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6935 return -1;
eea6121a 6936 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6937 p = s->relocation;
6938 for (i = 0; i < count; i++)
6939 *storage++ = p++;
6940 ret += count;
6941 }
6942 }
6943
6944 *storage = NULL;
6945
6946 return ret;
6947}
6948\f
6949/* Read in the version information. */
6950
b34976b6 6951bfd_boolean
fc0e6df6 6952_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6953{
6954 bfd_byte *contents = NULL;
fc0e6df6
PB
6955 unsigned int freeidx = 0;
6956
6957 if (elf_dynverref (abfd) != 0)
6958 {
6959 Elf_Internal_Shdr *hdr;
6960 Elf_External_Verneed *everneed;
6961 Elf_Internal_Verneed *iverneed;
6962 unsigned int i;
d0fb9a8d 6963 bfd_byte *contents_end;
fc0e6df6
PB
6964
6965 hdr = &elf_tdata (abfd)->dynverref_hdr;
6966
a50b1753
NC
6967 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
6968 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6969 if (elf_tdata (abfd)->verref == NULL)
6970 goto error_return;
6971
6972 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6973
a50b1753 6974 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
fc0e6df6 6975 if (contents == NULL)
d0fb9a8d
JJ
6976 {
6977error_return_verref:
6978 elf_tdata (abfd)->verref = NULL;
6979 elf_tdata (abfd)->cverrefs = 0;
6980 goto error_return;
6981 }
fc0e6df6
PB
6982 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6983 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6984 goto error_return_verref;
fc0e6df6 6985
d0fb9a8d
JJ
6986 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6987 goto error_return_verref;
6988
6989 BFD_ASSERT (sizeof (Elf_External_Verneed)
6990 == sizeof (Elf_External_Vernaux));
6991 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6992 everneed = (Elf_External_Verneed *) contents;
6993 iverneed = elf_tdata (abfd)->verref;
6994 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6995 {
6996 Elf_External_Vernaux *evernaux;
6997 Elf_Internal_Vernaux *ivernaux;
6998 unsigned int j;
6999
7000 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
7001
7002 iverneed->vn_bfd = abfd;
7003
7004 iverneed->vn_filename =
7005 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7006 iverneed->vn_file);
7007 if (iverneed->vn_filename == NULL)
d0fb9a8d 7008 goto error_return_verref;
fc0e6df6 7009
d0fb9a8d
JJ
7010 if (iverneed->vn_cnt == 0)
7011 iverneed->vn_auxptr = NULL;
7012 else
7013 {
a50b1753
NC
7014 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
7015 bfd_alloc2 (abfd, iverneed->vn_cnt,
7016 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
7017 if (iverneed->vn_auxptr == NULL)
7018 goto error_return_verref;
7019 }
7020
7021 if (iverneed->vn_aux
7022 > (size_t) (contents_end - (bfd_byte *) everneed))
7023 goto error_return_verref;
fc0e6df6
PB
7024
7025 evernaux = ((Elf_External_Vernaux *)
7026 ((bfd_byte *) everneed + iverneed->vn_aux));
7027 ivernaux = iverneed->vn_auxptr;
7028 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
7029 {
7030 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
7031
7032 ivernaux->vna_nodename =
7033 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7034 ivernaux->vna_name);
7035 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 7036 goto error_return_verref;
fc0e6df6
PB
7037
7038 if (j + 1 < iverneed->vn_cnt)
7039 ivernaux->vna_nextptr = ivernaux + 1;
7040 else
7041 ivernaux->vna_nextptr = NULL;
7042
d0fb9a8d
JJ
7043 if (ivernaux->vna_next
7044 > (size_t) (contents_end - (bfd_byte *) evernaux))
7045 goto error_return_verref;
7046
fc0e6df6
PB
7047 evernaux = ((Elf_External_Vernaux *)
7048 ((bfd_byte *) evernaux + ivernaux->vna_next));
7049
7050 if (ivernaux->vna_other > freeidx)
7051 freeidx = ivernaux->vna_other;
7052 }
7053
7054 if (i + 1 < hdr->sh_info)
7055 iverneed->vn_nextref = iverneed + 1;
7056 else
7057 iverneed->vn_nextref = NULL;
7058
d0fb9a8d
JJ
7059 if (iverneed->vn_next
7060 > (size_t) (contents_end - (bfd_byte *) everneed))
7061 goto error_return_verref;
7062
fc0e6df6
PB
7063 everneed = ((Elf_External_Verneed *)
7064 ((bfd_byte *) everneed + iverneed->vn_next));
7065 }
7066
7067 free (contents);
7068 contents = NULL;
7069 }
252b5132
RH
7070
7071 if (elf_dynverdef (abfd) != 0)
7072 {
7073 Elf_Internal_Shdr *hdr;
7074 Elf_External_Verdef *everdef;
7075 Elf_Internal_Verdef *iverdef;
f631889e
UD
7076 Elf_Internal_Verdef *iverdefarr;
7077 Elf_Internal_Verdef iverdefmem;
252b5132 7078 unsigned int i;
062e2358 7079 unsigned int maxidx;
d0fb9a8d 7080 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
7081
7082 hdr = &elf_tdata (abfd)->dynverdef_hdr;
7083
a50b1753 7084 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132
RH
7085 if (contents == NULL)
7086 goto error_return;
7087 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 7088 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
7089 goto error_return;
7090
d0fb9a8d
JJ
7091 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
7092 goto error_return;
7093
7094 BFD_ASSERT (sizeof (Elf_External_Verdef)
7095 >= sizeof (Elf_External_Verdaux));
7096 contents_end_def = contents + hdr->sh_size
7097 - sizeof (Elf_External_Verdef);
7098 contents_end_aux = contents + hdr->sh_size
7099 - sizeof (Elf_External_Verdaux);
7100
f631889e
UD
7101 /* We know the number of entries in the section but not the maximum
7102 index. Therefore we have to run through all entries and find
7103 the maximum. */
252b5132 7104 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
7105 maxidx = 0;
7106 for (i = 0; i < hdr->sh_info; ++i)
7107 {
7108 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7109
062e2358
AM
7110 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
7111 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 7112
d0fb9a8d
JJ
7113 if (iverdefmem.vd_next
7114 > (size_t) (contents_end_def - (bfd_byte *) everdef))
7115 goto error_return;
7116
f631889e
UD
7117 everdef = ((Elf_External_Verdef *)
7118 ((bfd_byte *) everdef + iverdefmem.vd_next));
7119 }
7120
fc0e6df6
PB
7121 if (default_imported_symver)
7122 {
7123 if (freeidx > maxidx)
7124 maxidx = ++freeidx;
7125 else
7126 freeidx = ++maxidx;
7127 }
a50b1753
NC
7128 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7129 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e
UD
7130 if (elf_tdata (abfd)->verdef == NULL)
7131 goto error_return;
7132
7133 elf_tdata (abfd)->cverdefs = maxidx;
7134
7135 everdef = (Elf_External_Verdef *) contents;
7136 iverdefarr = elf_tdata (abfd)->verdef;
7137 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
7138 {
7139 Elf_External_Verdaux *everdaux;
7140 Elf_Internal_Verdaux *iverdaux;
7141 unsigned int j;
7142
f631889e
UD
7143 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7144
d0fb9a8d
JJ
7145 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
7146 {
7147error_return_verdef:
7148 elf_tdata (abfd)->verdef = NULL;
7149 elf_tdata (abfd)->cverdefs = 0;
7150 goto error_return;
7151 }
7152
f631889e
UD
7153 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
7154 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
7155
7156 iverdef->vd_bfd = abfd;
7157
d0fb9a8d
JJ
7158 if (iverdef->vd_cnt == 0)
7159 iverdef->vd_auxptr = NULL;
7160 else
7161 {
a50b1753
NC
7162 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7163 bfd_alloc2 (abfd, iverdef->vd_cnt,
7164 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7165 if (iverdef->vd_auxptr == NULL)
7166 goto error_return_verdef;
7167 }
7168
7169 if (iverdef->vd_aux
7170 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
7171 goto error_return_verdef;
252b5132
RH
7172
7173 everdaux = ((Elf_External_Verdaux *)
7174 ((bfd_byte *) everdef + iverdef->vd_aux));
7175 iverdaux = iverdef->vd_auxptr;
7176 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
7177 {
7178 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
7179
7180 iverdaux->vda_nodename =
7181 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7182 iverdaux->vda_name);
7183 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 7184 goto error_return_verdef;
252b5132
RH
7185
7186 if (j + 1 < iverdef->vd_cnt)
7187 iverdaux->vda_nextptr = iverdaux + 1;
7188 else
7189 iverdaux->vda_nextptr = NULL;
7190
d0fb9a8d
JJ
7191 if (iverdaux->vda_next
7192 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
7193 goto error_return_verdef;
7194
252b5132
RH
7195 everdaux = ((Elf_External_Verdaux *)
7196 ((bfd_byte *) everdaux + iverdaux->vda_next));
7197 }
7198
d0fb9a8d
JJ
7199 if (iverdef->vd_cnt)
7200 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 7201
d0fb9a8d 7202 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
7203 iverdef->vd_nextdef = iverdef + 1;
7204 else
7205 iverdef->vd_nextdef = NULL;
7206
7207 everdef = ((Elf_External_Verdef *)
7208 ((bfd_byte *) everdef + iverdef->vd_next));
7209 }
7210
7211 free (contents);
7212 contents = NULL;
7213 }
fc0e6df6 7214 else if (default_imported_symver)
252b5132 7215 {
fc0e6df6
PB
7216 if (freeidx < 3)
7217 freeidx = 3;
7218 else
7219 freeidx++;
252b5132 7220
a50b1753
NC
7221 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7222 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 7223 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
7224 goto error_return;
7225
fc0e6df6
PB
7226 elf_tdata (abfd)->cverdefs = freeidx;
7227 }
252b5132 7228
fc0e6df6
PB
7229 /* Create a default version based on the soname. */
7230 if (default_imported_symver)
7231 {
7232 Elf_Internal_Verdef *iverdef;
7233 Elf_Internal_Verdaux *iverdaux;
252b5132 7234
fc0e6df6 7235 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 7236
fc0e6df6
PB
7237 iverdef->vd_version = VER_DEF_CURRENT;
7238 iverdef->vd_flags = 0;
7239 iverdef->vd_ndx = freeidx;
7240 iverdef->vd_cnt = 1;
252b5132 7241
fc0e6df6 7242 iverdef->vd_bfd = abfd;
252b5132 7243
fc0e6df6
PB
7244 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
7245 if (iverdef->vd_nodename == NULL)
d0fb9a8d 7246 goto error_return_verdef;
fc0e6df6 7247 iverdef->vd_nextdef = NULL;
a50b1753
NC
7248 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7249 bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7250 if (iverdef->vd_auxptr == NULL)
7251 goto error_return_verdef;
252b5132 7252
fc0e6df6
PB
7253 iverdaux = iverdef->vd_auxptr;
7254 iverdaux->vda_nodename = iverdef->vd_nodename;
7255 iverdaux->vda_nextptr = NULL;
252b5132
RH
7256 }
7257
b34976b6 7258 return TRUE;
252b5132
RH
7259
7260 error_return:
5ed6aba4 7261 if (contents != NULL)
252b5132 7262 free (contents);
b34976b6 7263 return FALSE;
252b5132
RH
7264}
7265\f
7266asymbol *
217aa764 7267_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7268{
7269 elf_symbol_type *newsym;
dc810e39 7270 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 7271
a50b1753 7272 newsym = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132
RH
7273 if (!newsym)
7274 return NULL;
7275 else
7276 {
7277 newsym->symbol.the_bfd = abfd;
7278 return &newsym->symbol;
7279 }
7280}
7281
7282void
217aa764
AM
7283_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7284 asymbol *symbol,
7285 symbol_info *ret)
252b5132
RH
7286{
7287 bfd_symbol_info (symbol, ret);
7288}
7289
7290/* Return whether a symbol name implies a local symbol. Most targets
7291 use this function for the is_local_label_name entry point, but some
7292 override it. */
7293
b34976b6 7294bfd_boolean
217aa764
AM
7295_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7296 const char *name)
252b5132
RH
7297{
7298 /* Normal local symbols start with ``.L''. */
7299 if (name[0] == '.' && name[1] == 'L')
b34976b6 7300 return TRUE;
252b5132
RH
7301
7302 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7303 DWARF debugging symbols starting with ``..''. */
7304 if (name[0] == '.' && name[1] == '.')
b34976b6 7305 return TRUE;
252b5132
RH
7306
7307 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7308 emitting DWARF debugging output. I suspect this is actually a
7309 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7310 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7311 underscore to be emitted on some ELF targets). For ease of use,
7312 we treat such symbols as local. */
7313 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7314 return TRUE;
252b5132 7315
b34976b6 7316 return FALSE;
252b5132
RH
7317}
7318
7319alent *
217aa764
AM
7320_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7321 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7322{
7323 abort ();
7324 return NULL;
7325}
7326
b34976b6 7327bfd_boolean
217aa764
AM
7328_bfd_elf_set_arch_mach (bfd *abfd,
7329 enum bfd_architecture arch,
7330 unsigned long machine)
252b5132
RH
7331{
7332 /* If this isn't the right architecture for this backend, and this
7333 isn't the generic backend, fail. */
7334 if (arch != get_elf_backend_data (abfd)->arch
7335 && arch != bfd_arch_unknown
7336 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7337 return FALSE;
252b5132
RH
7338
7339 return bfd_default_set_arch_mach (abfd, arch, machine);
7340}
7341
d1fad7c6
NC
7342/* Find the function to a particular section and offset,
7343 for error reporting. */
252b5132 7344
b34976b6 7345static bfd_boolean
b9d678e0 7346elf_find_function (bfd *abfd,
217aa764
AM
7347 asection *section,
7348 asymbol **symbols,
7349 bfd_vma offset,
7350 const char **filename_ptr,
7351 const char **functionname_ptr)
252b5132 7352{
252b5132 7353 const char *filename;
57426232 7354 asymbol *func, *file;
252b5132
RH
7355 bfd_vma low_func;
7356 asymbol **p;
57426232
JB
7357 /* ??? Given multiple file symbols, it is impossible to reliably
7358 choose the right file name for global symbols. File symbols are
7359 local symbols, and thus all file symbols must sort before any
7360 global symbols. The ELF spec may be interpreted to say that a
7361 file symbol must sort before other local symbols, but currently
7362 ld -r doesn't do this. So, for ld -r output, it is possible to
7363 make a better choice of file name for local symbols by ignoring
7364 file symbols appearing after a given local symbol. */
7365 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
b9d678e0 7366 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7367
252b5132
RH
7368 filename = NULL;
7369 func = NULL;
57426232 7370 file = NULL;
252b5132 7371 low_func = 0;
57426232 7372 state = nothing_seen;
252b5132
RH
7373
7374 for (p = symbols; *p != NULL; p++)
7375 {
7376 elf_symbol_type *q;
b9d678e0 7377 unsigned int type;
252b5132
RH
7378
7379 q = (elf_symbol_type *) *p;
7380
b9d678e0
L
7381 type = ELF_ST_TYPE (q->internal_elf_sym.st_info);
7382 switch (type)
252b5132 7383 {
252b5132 7384 case STT_FILE:
57426232
JB
7385 file = &q->symbol;
7386 if (state == symbol_seen)
7387 state = file_after_symbol_seen;
7388 continue;
b9d678e0
L
7389 default:
7390 if (!bed->is_function_type (type))
7391 break;
252b5132 7392 case STT_NOTYPE:
6b40fcba 7393 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7394 && q->symbol.value >= low_func
7395 && q->symbol.value <= offset)
7396 {
7397 func = (asymbol *) q;
7398 low_func = q->symbol.value;
a1923858
AM
7399 filename = NULL;
7400 if (file != NULL
7401 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7402 || state != file_after_symbol_seen))
57426232 7403 filename = bfd_asymbol_name (file);
252b5132
RH
7404 }
7405 break;
7406 }
57426232
JB
7407 if (state == nothing_seen)
7408 state = symbol_seen;
252b5132
RH
7409 }
7410
7411 if (func == NULL)
b34976b6 7412 return FALSE;
252b5132 7413
d1fad7c6
NC
7414 if (filename_ptr)
7415 *filename_ptr = filename;
7416 if (functionname_ptr)
7417 *functionname_ptr = bfd_asymbol_name (func);
7418
b34976b6 7419 return TRUE;
d1fad7c6
NC
7420}
7421
7422/* Find the nearest line to a particular section and offset,
7423 for error reporting. */
7424
b34976b6 7425bfd_boolean
217aa764
AM
7426_bfd_elf_find_nearest_line (bfd *abfd,
7427 asection *section,
7428 asymbol **symbols,
7429 bfd_vma offset,
7430 const char **filename_ptr,
7431 const char **functionname_ptr,
7432 unsigned int *line_ptr)
d1fad7c6 7433{
b34976b6 7434 bfd_boolean found;
d1fad7c6
NC
7435
7436 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7437 filename_ptr, functionname_ptr,
7438 line_ptr))
d1fad7c6
NC
7439 {
7440 if (!*functionname_ptr)
4e8a9624
AM
7441 elf_find_function (abfd, section, symbols, offset,
7442 *filename_ptr ? NULL : filename_ptr,
7443 functionname_ptr);
7444
b34976b6 7445 return TRUE;
d1fad7c6
NC
7446 }
7447
7448 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7449 filename_ptr, functionname_ptr,
7450 line_ptr, 0,
7451 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7452 {
7453 if (!*functionname_ptr)
4e8a9624
AM
7454 elf_find_function (abfd, section, symbols, offset,
7455 *filename_ptr ? NULL : filename_ptr,
7456 functionname_ptr);
7457
b34976b6 7458 return TRUE;
d1fad7c6
NC
7459 }
7460
7461 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7462 &found, filename_ptr,
7463 functionname_ptr, line_ptr,
7464 &elf_tdata (abfd)->line_info))
b34976b6 7465 return FALSE;
dc43ada5 7466 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7467 return TRUE;
d1fad7c6
NC
7468
7469 if (symbols == NULL)
b34976b6 7470 return FALSE;
d1fad7c6
NC
7471
7472 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7473 filename_ptr, functionname_ptr))
b34976b6 7474 return FALSE;
d1fad7c6 7475
252b5132 7476 *line_ptr = 0;
b34976b6 7477 return TRUE;
252b5132
RH
7478}
7479
5420f73d
L
7480/* Find the line for a symbol. */
7481
7482bfd_boolean
7483_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7484 const char **filename_ptr, unsigned int *line_ptr)
7485{
7486 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7487 filename_ptr, line_ptr, 0,
7488 &elf_tdata (abfd)->dwarf2_find_line_info);
7489}
7490
4ab527b0
FF
7491/* After a call to bfd_find_nearest_line, successive calls to
7492 bfd_find_inliner_info can be used to get source information about
7493 each level of function inlining that terminated at the address
7494 passed to bfd_find_nearest_line. Currently this is only supported
7495 for DWARF2 with appropriate DWARF3 extensions. */
7496
7497bfd_boolean
7498_bfd_elf_find_inliner_info (bfd *abfd,
7499 const char **filename_ptr,
7500 const char **functionname_ptr,
7501 unsigned int *line_ptr)
7502{
7503 bfd_boolean found;
7504 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7505 functionname_ptr, line_ptr,
7506 & elf_tdata (abfd)->dwarf2_find_line_info);
7507 return found;
7508}
7509
252b5132 7510int
a6b96beb 7511_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7512{
8ded5a0f
AM
7513 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7514 int ret = bed->s->sizeof_ehdr;
252b5132 7515
a6b96beb 7516 if (!info->relocatable)
8ded5a0f 7517 {
62d7a5f6 7518 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7519
62d7a5f6
AM
7520 if (phdr_size == (bfd_size_type) -1)
7521 {
7522 struct elf_segment_map *m;
7523
7524 phdr_size = 0;
7525 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7526 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7527
62d7a5f6
AM
7528 if (phdr_size == 0)
7529 phdr_size = get_program_header_size (abfd, info);
7530 }
8ded5a0f
AM
7531
7532 elf_tdata (abfd)->program_header_size = phdr_size;
7533 ret += phdr_size;
7534 }
7535
252b5132
RH
7536 return ret;
7537}
7538
b34976b6 7539bfd_boolean
217aa764
AM
7540_bfd_elf_set_section_contents (bfd *abfd,
7541 sec_ptr section,
0f867abe 7542 const void *location,
217aa764
AM
7543 file_ptr offset,
7544 bfd_size_type count)
252b5132
RH
7545{
7546 Elf_Internal_Shdr *hdr;
dc810e39 7547 bfd_signed_vma pos;
252b5132
RH
7548
7549 if (! abfd->output_has_begun
217aa764 7550 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7551 return FALSE;
252b5132
RH
7552
7553 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7554 pos = hdr->sh_offset + offset;
7555 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7556 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7557 return FALSE;
252b5132 7558
b34976b6 7559 return TRUE;
252b5132
RH
7560}
7561
7562void
217aa764
AM
7563_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7564 arelent *cache_ptr ATTRIBUTE_UNUSED,
7565 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7566{
7567 abort ();
7568}
7569
252b5132
RH
7570/* Try to convert a non-ELF reloc into an ELF one. */
7571
b34976b6 7572bfd_boolean
217aa764 7573_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7574{
c044fabd 7575 /* Check whether we really have an ELF howto. */
252b5132
RH
7576
7577 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7578 {
7579 bfd_reloc_code_real_type code;
7580 reloc_howto_type *howto;
7581
7582 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7583 equivalent ELF reloc. */
252b5132
RH
7584
7585 if (areloc->howto->pc_relative)
7586 {
7587 switch (areloc->howto->bitsize)
7588 {
7589 case 8:
7590 code = BFD_RELOC_8_PCREL;
7591 break;
7592 case 12:
7593 code = BFD_RELOC_12_PCREL;
7594 break;
7595 case 16:
7596 code = BFD_RELOC_16_PCREL;
7597 break;
7598 case 24:
7599 code = BFD_RELOC_24_PCREL;
7600 break;
7601 case 32:
7602 code = BFD_RELOC_32_PCREL;
7603 break;
7604 case 64:
7605 code = BFD_RELOC_64_PCREL;
7606 break;
7607 default:
7608 goto fail;
7609 }
7610
7611 howto = bfd_reloc_type_lookup (abfd, code);
7612
7613 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7614 {
7615 if (howto->pcrel_offset)
7616 areloc->addend += areloc->address;
7617 else
7618 areloc->addend -= areloc->address; /* addend is unsigned!! */
7619 }
7620 }
7621 else
7622 {
7623 switch (areloc->howto->bitsize)
7624 {
7625 case 8:
7626 code = BFD_RELOC_8;
7627 break;
7628 case 14:
7629 code = BFD_RELOC_14;
7630 break;
7631 case 16:
7632 code = BFD_RELOC_16;
7633 break;
7634 case 26:
7635 code = BFD_RELOC_26;
7636 break;
7637 case 32:
7638 code = BFD_RELOC_32;
7639 break;
7640 case 64:
7641 code = BFD_RELOC_64;
7642 break;
7643 default:
7644 goto fail;
7645 }
7646
7647 howto = bfd_reloc_type_lookup (abfd, code);
7648 }
7649
7650 if (howto)
7651 areloc->howto = howto;
7652 else
7653 goto fail;
7654 }
7655
b34976b6 7656 return TRUE;
252b5132
RH
7657
7658 fail:
7659 (*_bfd_error_handler)
d003868e
AM
7660 (_("%B: unsupported relocation type %s"),
7661 abfd, areloc->howto->name);
252b5132 7662 bfd_set_error (bfd_error_bad_value);
b34976b6 7663 return FALSE;
252b5132
RH
7664}
7665
b34976b6 7666bfd_boolean
217aa764 7667_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7668{
7669 if (bfd_get_format (abfd) == bfd_object)
7670 {
b25e3d87 7671 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7672 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7673 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7674 }
7675
7676 return _bfd_generic_close_and_cleanup (abfd);
7677}
7678
7679/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7680 in the relocation's offset. Thus we cannot allow any sort of sanity
7681 range-checking to interfere. There is nothing else to do in processing
7682 this reloc. */
7683
7684bfd_reloc_status_type
217aa764
AM
7685_bfd_elf_rel_vtable_reloc_fn
7686 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7687 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7688 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7689 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7690{
7691 return bfd_reloc_ok;
7692}
252b5132
RH
7693\f
7694/* Elf core file support. Much of this only works on native
7695 toolchains, since we rely on knowing the
7696 machine-dependent procfs structure in order to pick
c044fabd 7697 out details about the corefile. */
252b5132
RH
7698
7699#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
7700/* Needed for new procfs interface on sparc-solaris. */
7701# define _STRUCTURED_PROC 1
252b5132
RH
7702# include <sys/procfs.h>
7703#endif
7704
261b8d08
PA
7705/* Return a PID that identifies a "thread" for threaded cores, or the
7706 PID of the main process for non-threaded cores. */
252b5132
RH
7707
7708static int
217aa764 7709elfcore_make_pid (bfd *abfd)
252b5132 7710{
261b8d08
PA
7711 int pid;
7712
7713 pid = elf_tdata (abfd)->core_lwpid;
7714 if (pid == 0)
7715 pid = elf_tdata (abfd)->core_pid;
7716
7717 return pid;
252b5132
RH
7718}
7719
252b5132
RH
7720/* If there isn't a section called NAME, make one, using
7721 data from SECT. Note, this function will generate a
7722 reference to NAME, so you shouldn't deallocate or
c044fabd 7723 overwrite it. */
252b5132 7724
b34976b6 7725static bfd_boolean
217aa764 7726elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7727{
c044fabd 7728 asection *sect2;
252b5132
RH
7729
7730 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7731 return TRUE;
252b5132 7732
117ed4f8 7733 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7734 if (sect2 == NULL)
b34976b6 7735 return FALSE;
252b5132 7736
eea6121a 7737 sect2->size = sect->size;
252b5132 7738 sect2->filepos = sect->filepos;
252b5132 7739 sect2->alignment_power = sect->alignment_power;
b34976b6 7740 return TRUE;
252b5132
RH
7741}
7742
bb0082d6
AM
7743/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7744 actually creates up to two pseudosections:
7745 - For the single-threaded case, a section named NAME, unless
7746 such a section already exists.
7747 - For the multi-threaded case, a section named "NAME/PID", where
7748 PID is elfcore_make_pid (abfd).
7749 Both pseudosections have identical contents. */
b34976b6 7750bfd_boolean
217aa764
AM
7751_bfd_elfcore_make_pseudosection (bfd *abfd,
7752 char *name,
7753 size_t size,
7754 ufile_ptr filepos)
bb0082d6
AM
7755{
7756 char buf[100];
7757 char *threaded_name;
d4c88bbb 7758 size_t len;
bb0082d6
AM
7759 asection *sect;
7760
7761 /* Build the section name. */
7762
7763 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7764 len = strlen (buf) + 1;
a50b1753 7765 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 7766 if (threaded_name == NULL)
b34976b6 7767 return FALSE;
d4c88bbb 7768 memcpy (threaded_name, buf, len);
bb0082d6 7769
117ed4f8
AM
7770 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7771 SEC_HAS_CONTENTS);
bb0082d6 7772 if (sect == NULL)
b34976b6 7773 return FALSE;
eea6121a 7774 sect->size = size;
bb0082d6 7775 sect->filepos = filepos;
bb0082d6
AM
7776 sect->alignment_power = 2;
7777
936e320b 7778 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7779}
7780
252b5132 7781/* prstatus_t exists on:
4a938328 7782 solaris 2.5+
252b5132
RH
7783 linux 2.[01] + glibc
7784 unixware 4.2
7785*/
7786
7787#if defined (HAVE_PRSTATUS_T)
a7b97311 7788
b34976b6 7789static bfd_boolean
217aa764 7790elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7791{
eea6121a 7792 size_t size;
7ee38065 7793 int offset;
252b5132 7794
4a938328
MS
7795 if (note->descsz == sizeof (prstatus_t))
7796 {
7797 prstatus_t prstat;
252b5132 7798
eea6121a 7799 size = sizeof (prstat.pr_reg);
7ee38065 7800 offset = offsetof (prstatus_t, pr_reg);
4a938328 7801 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7802
fa49d224
NC
7803 /* Do not overwrite the core signal if it
7804 has already been set by another thread. */
7805 if (elf_tdata (abfd)->core_signal == 0)
7806 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
261b8d08
PA
7807 if (elf_tdata (abfd)->core_pid == 0)
7808 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7809
4a938328
MS
7810 /* pr_who exists on:
7811 solaris 2.5+
7812 unixware 4.2
7813 pr_who doesn't exist on:
7814 linux 2.[01]
7815 */
252b5132 7816#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7817 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
261b8d08
PA
7818#else
7819 elf_tdata (abfd)->core_lwpid = prstat.pr_pid;
252b5132 7820#endif
4a938328 7821 }
7ee38065 7822#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7823 else if (note->descsz == sizeof (prstatus32_t))
7824 {
7825 /* 64-bit host, 32-bit corefile */
7826 prstatus32_t prstat;
7827
eea6121a 7828 size = sizeof (prstat.pr_reg);
7ee38065 7829 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7830 memcpy (&prstat, note->descdata, sizeof (prstat));
7831
fa49d224
NC
7832 /* Do not overwrite the core signal if it
7833 has already been set by another thread. */
7834 if (elf_tdata (abfd)->core_signal == 0)
7835 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
261b8d08
PA
7836 if (elf_tdata (abfd)->core_pid == 0)
7837 elf_tdata (abfd)->core_pid = prstat.pr_pid;
4a938328
MS
7838
7839 /* pr_who exists on:
7840 solaris 2.5+
7841 unixware 4.2
7842 pr_who doesn't exist on:
7843 linux 2.[01]
7844 */
7ee38065 7845#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328 7846 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
261b8d08
PA
7847#else
7848 elf_tdata (abfd)->core_lwpid = prstat.pr_pid;
4a938328
MS
7849#endif
7850 }
7ee38065 7851#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7852 else
7853 {
7854 /* Fail - we don't know how to handle any other
7855 note size (ie. data object type). */
b34976b6 7856 return TRUE;
4a938328 7857 }
252b5132 7858
bb0082d6 7859 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7860 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7861 size, note->descpos + offset);
252b5132
RH
7862}
7863#endif /* defined (HAVE_PRSTATUS_T) */
7864
bb0082d6 7865/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7866static bfd_boolean
217aa764
AM
7867elfcore_make_note_pseudosection (bfd *abfd,
7868 char *name,
7869 Elf_Internal_Note *note)
252b5132 7870{
936e320b
AM
7871 return _bfd_elfcore_make_pseudosection (abfd, name,
7872 note->descsz, note->descpos);
252b5132
RH
7873}
7874
ff08c6bb
JB
7875/* There isn't a consistent prfpregset_t across platforms,
7876 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7877 data structure apart. */
7878
b34976b6 7879static bfd_boolean
217aa764 7880elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7881{
7882 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7883}
7884
ff08c6bb 7885/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 7886 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 7887 literally. */
c044fabd 7888
b34976b6 7889static bfd_boolean
217aa764 7890elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7891{
7892 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7893}
7894
4339cae0
L
7895/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
7896 with a note type of NT_X86_XSTATE. Just include the whole note's
7897 contents literally. */
7898
7899static bfd_boolean
7900elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
7901{
7902 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
7903}
7904
97753bd5
AM
7905static bfd_boolean
7906elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
7907{
7908 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
7909}
7910
89eeb0bc
LM
7911static bfd_boolean
7912elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
7913{
7914 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
7915}
97753bd5 7916
0675e188
UW
7917static bfd_boolean
7918elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
7919{
7920 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
7921}
7922
d7eeb400
MS
7923static bfd_boolean
7924elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
7925{
7926 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
7927}
7928
7929static bfd_boolean
7930elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
7931{
7932 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
7933}
7934
7935static bfd_boolean
7936elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
7937{
7938 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
7939}
7940
7941static bfd_boolean
7942elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
7943{
7944 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
7945}
7946
7947static bfd_boolean
7948elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
7949{
7950 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
7951}
7952
252b5132 7953#if defined (HAVE_PRPSINFO_T)
4a938328 7954typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7955#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7956typedef prpsinfo32_t elfcore_psinfo32_t;
7957#endif
252b5132
RH
7958#endif
7959
7960#if defined (HAVE_PSINFO_T)
4a938328 7961typedef psinfo_t elfcore_psinfo_t;
7ee38065 7962#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7963typedef psinfo32_t elfcore_psinfo32_t;
7964#endif
252b5132
RH
7965#endif
7966
252b5132
RH
7967/* return a malloc'ed copy of a string at START which is at
7968 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7969 the copy will always have a terminating '\0'. */
252b5132 7970
936e320b 7971char *
217aa764 7972_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7973{
dc810e39 7974 char *dups;
a50b1753 7975 char *end = (char *) memchr (start, '\0', max);
dc810e39 7976 size_t len;
252b5132
RH
7977
7978 if (end == NULL)
7979 len = max;
7980 else
7981 len = end - start;
7982
a50b1753 7983 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 7984 if (dups == NULL)
252b5132
RH
7985 return NULL;
7986
dc810e39
AM
7987 memcpy (dups, start, len);
7988 dups[len] = '\0';
252b5132 7989
dc810e39 7990 return dups;
252b5132
RH
7991}
7992
bb0082d6 7993#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7994static bfd_boolean
217aa764 7995elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7996{
4a938328
MS
7997 if (note->descsz == sizeof (elfcore_psinfo_t))
7998 {
7999 elfcore_psinfo_t psinfo;
252b5132 8000
7ee38065 8001 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8002
bc989cdc 8003 elf_tdata (abfd)->core_pid = psinfo.pr_pid;
4a938328 8004 elf_tdata (abfd)->core_program
936e320b
AM
8005 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8006 sizeof (psinfo.pr_fname));
252b5132 8007
4a938328 8008 elf_tdata (abfd)->core_command
936e320b
AM
8009 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8010 sizeof (psinfo.pr_psargs));
4a938328 8011 }
7ee38065 8012#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
8013 else if (note->descsz == sizeof (elfcore_psinfo32_t))
8014 {
8015 /* 64-bit host, 32-bit corefile */
8016 elfcore_psinfo32_t psinfo;
8017
7ee38065 8018 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8019
bc989cdc 8020 elf_tdata (abfd)->core_pid = psinfo.pr_pid;
4a938328 8021 elf_tdata (abfd)->core_program
936e320b
AM
8022 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8023 sizeof (psinfo.pr_fname));
4a938328
MS
8024
8025 elf_tdata (abfd)->core_command
936e320b
AM
8026 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8027 sizeof (psinfo.pr_psargs));
4a938328
MS
8028 }
8029#endif
8030
8031 else
8032 {
8033 /* Fail - we don't know how to handle any other
8034 note size (ie. data object type). */
b34976b6 8035 return TRUE;
4a938328 8036 }
252b5132
RH
8037
8038 /* Note that for some reason, a spurious space is tacked
8039 onto the end of the args in some (at least one anyway)
c044fabd 8040 implementations, so strip it off if it exists. */
252b5132
RH
8041
8042 {
c044fabd 8043 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
8044 int n = strlen (command);
8045
8046 if (0 < n && command[n - 1] == ' ')
8047 command[n - 1] = '\0';
8048 }
8049
b34976b6 8050 return TRUE;
252b5132
RH
8051}
8052#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
8053
252b5132 8054#if defined (HAVE_PSTATUS_T)
b34976b6 8055static bfd_boolean
217aa764 8056elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8057{
f572a39d
AM
8058 if (note->descsz == sizeof (pstatus_t)
8059#if defined (HAVE_PXSTATUS_T)
8060 || note->descsz == sizeof (pxstatus_t)
8061#endif
8062 )
4a938328
MS
8063 {
8064 pstatus_t pstat;
252b5132 8065
4a938328 8066 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8067
4a938328
MS
8068 elf_tdata (abfd)->core_pid = pstat.pr_pid;
8069 }
7ee38065 8070#if defined (HAVE_PSTATUS32_T)
4a938328
MS
8071 else if (note->descsz == sizeof (pstatus32_t))
8072 {
8073 /* 64-bit host, 32-bit corefile */
8074 pstatus32_t pstat;
252b5132 8075
4a938328 8076 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8077
4a938328
MS
8078 elf_tdata (abfd)->core_pid = pstat.pr_pid;
8079 }
8080#endif
252b5132
RH
8081 /* Could grab some more details from the "representative"
8082 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 8083 NT_LWPSTATUS note, presumably. */
252b5132 8084
b34976b6 8085 return TRUE;
252b5132
RH
8086}
8087#endif /* defined (HAVE_PSTATUS_T) */
8088
252b5132 8089#if defined (HAVE_LWPSTATUS_T)
b34976b6 8090static bfd_boolean
217aa764 8091elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
8092{
8093 lwpstatus_t lwpstat;
8094 char buf[100];
c044fabd 8095 char *name;
d4c88bbb 8096 size_t len;
c044fabd 8097 asection *sect;
252b5132 8098
f572a39d
AM
8099 if (note->descsz != sizeof (lwpstat)
8100#if defined (HAVE_LWPXSTATUS_T)
8101 && note->descsz != sizeof (lwpxstatus_t)
8102#endif
8103 )
b34976b6 8104 return TRUE;
252b5132
RH
8105
8106 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
8107
8108 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
a1504221
JB
8109 /* Do not overwrite the core signal if it has already been set by
8110 another thread. */
8111 if (elf_tdata (abfd)->core_signal == 0)
8112 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
252b5132 8113
c044fabd 8114 /* Make a ".reg/999" section. */
252b5132
RH
8115
8116 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 8117 len = strlen (buf) + 1;
217aa764 8118 name = bfd_alloc (abfd, len);
252b5132 8119 if (name == NULL)
b34976b6 8120 return FALSE;
d4c88bbb 8121 memcpy (name, buf, len);
252b5132 8122
117ed4f8 8123 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8124 if (sect == NULL)
b34976b6 8125 return FALSE;
252b5132
RH
8126
8127#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8128 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
8129 sect->filepos = note->descpos
8130 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
8131#endif
8132
8133#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 8134 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
8135 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
8136#endif
8137
252b5132
RH
8138 sect->alignment_power = 2;
8139
8140 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8141 return FALSE;
252b5132
RH
8142
8143 /* Make a ".reg2/999" section */
8144
8145 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 8146 len = strlen (buf) + 1;
217aa764 8147 name = bfd_alloc (abfd, len);
252b5132 8148 if (name == NULL)
b34976b6 8149 return FALSE;
d4c88bbb 8150 memcpy (name, buf, len);
252b5132 8151
117ed4f8 8152 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8153 if (sect == NULL)
b34976b6 8154 return FALSE;
252b5132
RH
8155
8156#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8157 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
8158 sect->filepos = note->descpos
8159 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
8160#endif
8161
8162#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 8163 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
8164 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
8165#endif
8166
252b5132
RH
8167 sect->alignment_power = 2;
8168
936e320b 8169 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
8170}
8171#endif /* defined (HAVE_LWPSTATUS_T) */
8172
b34976b6 8173static bfd_boolean
217aa764 8174elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
8175{
8176 char buf[30];
c044fabd 8177 char *name;
d4c88bbb 8178 size_t len;
c044fabd 8179 asection *sect;
4a6636fb
PA
8180 int type;
8181 int is_active_thread;
8182 bfd_vma base_addr;
16e9c715 8183
4a6636fb 8184 if (note->descsz < 728)
b34976b6 8185 return TRUE;
16e9c715 8186
4a6636fb
PA
8187 if (! CONST_STRNEQ (note->namedata, "win32"))
8188 return TRUE;
8189
8190 type = bfd_get_32 (abfd, note->descdata);
c044fabd 8191
4a6636fb 8192 switch (type)
16e9c715 8193 {
4a6636fb 8194 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 8195 /* FIXME: need to add ->core_command. */
4a6636fb
PA
8196 /* process_info.pid */
8197 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
8198 /* process_info.signal */
8199 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 8200 break;
16e9c715 8201
4a6636fb 8202 case 2 /* NOTE_INFO_THREAD */:
16e9c715 8203 /* Make a ".reg/999" section. */
4a6636fb
PA
8204 /* thread_info.tid */
8205 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 8206
d4c88bbb 8207 len = strlen (buf) + 1;
a50b1753 8208 name = (char *) bfd_alloc (abfd, len);
16e9c715 8209 if (name == NULL)
b34976b6 8210 return FALSE;
c044fabd 8211
d4c88bbb 8212 memcpy (name, buf, len);
16e9c715 8213
117ed4f8 8214 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 8215 if (sect == NULL)
b34976b6 8216 return FALSE;
c044fabd 8217
4a6636fb
PA
8218 /* sizeof (thread_info.thread_context) */
8219 sect->size = 716;
8220 /* offsetof (thread_info.thread_context) */
8221 sect->filepos = note->descpos + 12;
16e9c715
NC
8222 sect->alignment_power = 2;
8223
4a6636fb
PA
8224 /* thread_info.is_active_thread */
8225 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
8226
8227 if (is_active_thread)
16e9c715 8228 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8229 return FALSE;
16e9c715
NC
8230 break;
8231
4a6636fb 8232 case 3 /* NOTE_INFO_MODULE */:
16e9c715 8233 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
8234 /* module_info.base_address */
8235 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 8236 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 8237
d4c88bbb 8238 len = strlen (buf) + 1;
a50b1753 8239 name = (char *) bfd_alloc (abfd, len);
16e9c715 8240 if (name == NULL)
b34976b6 8241 return FALSE;
c044fabd 8242
d4c88bbb 8243 memcpy (name, buf, len);
252b5132 8244
117ed4f8 8245 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 8246
16e9c715 8247 if (sect == NULL)
b34976b6 8248 return FALSE;
c044fabd 8249
eea6121a 8250 sect->size = note->descsz;
16e9c715 8251 sect->filepos = note->descpos;
16e9c715
NC
8252 sect->alignment_power = 2;
8253 break;
8254
8255 default:
b34976b6 8256 return TRUE;
16e9c715
NC
8257 }
8258
b34976b6 8259 return TRUE;
16e9c715 8260}
252b5132 8261
b34976b6 8262static bfd_boolean
217aa764 8263elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 8264{
9c5bfbb7 8265 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 8266
252b5132
RH
8267 switch (note->type)
8268 {
8269 default:
b34976b6 8270 return TRUE;
252b5132 8271
252b5132 8272 case NT_PRSTATUS:
bb0082d6
AM
8273 if (bed->elf_backend_grok_prstatus)
8274 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 8275 return TRUE;
bb0082d6 8276#if defined (HAVE_PRSTATUS_T)
252b5132 8277 return elfcore_grok_prstatus (abfd, note);
bb0082d6 8278#else
b34976b6 8279 return TRUE;
252b5132
RH
8280#endif
8281
8282#if defined (HAVE_PSTATUS_T)
8283 case NT_PSTATUS:
8284 return elfcore_grok_pstatus (abfd, note);
8285#endif
8286
8287#if defined (HAVE_LWPSTATUS_T)
8288 case NT_LWPSTATUS:
8289 return elfcore_grok_lwpstatus (abfd, note);
8290#endif
8291
8292 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
8293 return elfcore_grok_prfpreg (abfd, note);
8294
c044fabd 8295 case NT_WIN32PSTATUS:
16e9c715 8296 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 8297
c044fabd 8298 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
8299 if (note->namesz == 6
8300 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
8301 return elfcore_grok_prxfpreg (abfd, note);
8302 else
b34976b6 8303 return TRUE;
ff08c6bb 8304
4339cae0
L
8305 case NT_X86_XSTATE: /* Linux XSAVE extension */
8306 if (note->namesz == 6
8307 && strcmp (note->namedata, "LINUX") == 0)
8308 return elfcore_grok_xstatereg (abfd, note);
8309 else
8310 return TRUE;
8311
97753bd5
AM
8312 case NT_PPC_VMX:
8313 if (note->namesz == 6
8314 && strcmp (note->namedata, "LINUX") == 0)
8315 return elfcore_grok_ppc_vmx (abfd, note);
8316 else
8317 return TRUE;
8318
89eeb0bc
LM
8319 case NT_PPC_VSX:
8320 if (note->namesz == 6
8321 && strcmp (note->namedata, "LINUX") == 0)
8322 return elfcore_grok_ppc_vsx (abfd, note);
8323 else
8324 return TRUE;
8325
0675e188
UW
8326 case NT_S390_HIGH_GPRS:
8327 if (note->namesz == 6
8328 && strcmp (note->namedata, "LINUX") == 0)
8329 return elfcore_grok_s390_high_gprs (abfd, note);
8330 else
8331 return TRUE;
8332
d7eeb400
MS
8333 case NT_S390_TIMER:
8334 if (note->namesz == 6
8335 && strcmp (note->namedata, "LINUX") == 0)
8336 return elfcore_grok_s390_timer (abfd, note);
8337 else
8338 return TRUE;
8339
8340 case NT_S390_TODCMP:
8341 if (note->namesz == 6
8342 && strcmp (note->namedata, "LINUX") == 0)
8343 return elfcore_grok_s390_todcmp (abfd, note);
8344 else
8345 return TRUE;
8346
8347 case NT_S390_TODPREG:
8348 if (note->namesz == 6
8349 && strcmp (note->namedata, "LINUX") == 0)
8350 return elfcore_grok_s390_todpreg (abfd, note);
8351 else
8352 return TRUE;
8353
8354 case NT_S390_CTRS:
8355 if (note->namesz == 6
8356 && strcmp (note->namedata, "LINUX") == 0)
8357 return elfcore_grok_s390_ctrs (abfd, note);
8358 else
8359 return TRUE;
8360
8361 case NT_S390_PREFIX:
8362 if (note->namesz == 6
8363 && strcmp (note->namedata, "LINUX") == 0)
8364 return elfcore_grok_s390_prefix (abfd, note);
8365 else
8366 return TRUE;
8367
252b5132
RH
8368 case NT_PRPSINFO:
8369 case NT_PSINFO:
bb0082d6
AM
8370 if (bed->elf_backend_grok_psinfo)
8371 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8372 return TRUE;
bb0082d6 8373#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8374 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8375#else
b34976b6 8376 return TRUE;
252b5132 8377#endif
3333a7c3
RM
8378
8379 case NT_AUXV:
8380 {
117ed4f8
AM
8381 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8382 SEC_HAS_CONTENTS);
3333a7c3
RM
8383
8384 if (sect == NULL)
8385 return FALSE;
eea6121a 8386 sect->size = note->descsz;
3333a7c3 8387 sect->filepos = note->descpos;
3333a7c3
RM
8388 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8389
8390 return TRUE;
8391 }
252b5132
RH
8392 }
8393}
8394
718175fa
JK
8395static bfd_boolean
8396elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8397{
8398 elf_tdata (abfd)->build_id_size = note->descsz;
a50b1753 8399 elf_tdata (abfd)->build_id = (bfd_byte *) bfd_alloc (abfd, note->descsz);
718175fa
JK
8400 if (elf_tdata (abfd)->build_id == NULL)
8401 return FALSE;
8402
8403 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
8404
8405 return TRUE;
8406}
8407
8408static bfd_boolean
8409elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8410{
8411 switch (note->type)
8412 {
8413 default:
8414 return TRUE;
8415
8416 case NT_GNU_BUILD_ID:
8417 return elfobj_grok_gnu_build_id (abfd, note);
8418 }
8419}
8420
e21e5835
NC
8421static bfd_boolean
8422elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
8423{
8424 struct sdt_note *cur =
8425 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
8426 + note->descsz);
8427
8428 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
8429 cur->size = (bfd_size_type) note->descsz;
8430 memcpy (cur->data, note->descdata, note->descsz);
8431
8432 elf_tdata (abfd)->sdt_note_head = cur;
8433
8434 return TRUE;
8435}
8436
8437static bfd_boolean
8438elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
8439{
8440 switch (note->type)
8441 {
8442 case NT_STAPSDT:
8443 return elfobj_grok_stapsdt_note_1 (abfd, note);
8444
8445 default:
8446 return TRUE;
8447 }
8448}
8449
b34976b6 8450static bfd_boolean
217aa764 8451elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8452{
8453 char *cp;
8454
8455 cp = strchr (note->namedata, '@');
8456 if (cp != NULL)
8457 {
d2b64500 8458 *lwpidp = atoi(cp + 1);
b34976b6 8459 return TRUE;
50b2bdb7 8460 }
b34976b6 8461 return FALSE;
50b2bdb7
AM
8462}
8463
b34976b6 8464static bfd_boolean
217aa764 8465elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8466{
50b2bdb7
AM
8467 /* Signal number at offset 0x08. */
8468 elf_tdata (abfd)->core_signal
8469 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8470
8471 /* Process ID at offset 0x50. */
8472 elf_tdata (abfd)->core_pid
8473 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8474
8475 /* Command name at 0x7c (max 32 bytes, including nul). */
8476 elf_tdata (abfd)->core_command
8477 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8478
7720ba9f
MK
8479 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8480 note);
50b2bdb7
AM
8481}
8482
b34976b6 8483static bfd_boolean
217aa764 8484elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8485{
8486 int lwp;
8487
8488 if (elfcore_netbsd_get_lwpid (note, &lwp))
8489 elf_tdata (abfd)->core_lwpid = lwp;
8490
b4db1224 8491 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8492 {
8493 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8494 find this note before any of the others, which is fine,
8495 since the kernel writes this note out first when it
8496 creates a core file. */
47d9a591 8497
50b2bdb7
AM
8498 return elfcore_grok_netbsd_procinfo (abfd, note);
8499 }
8500
b4db1224
JT
8501 /* As of Jan 2002 there are no other machine-independent notes
8502 defined for NetBSD core files. If the note type is less
8503 than the start of the machine-dependent note types, we don't
8504 understand it. */
47d9a591 8505
b4db1224 8506 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8507 return TRUE;
50b2bdb7
AM
8508
8509
8510 switch (bfd_get_arch (abfd))
8511 {
08a40648
AM
8512 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8513 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8514
8515 case bfd_arch_alpha:
8516 case bfd_arch_sparc:
8517 switch (note->type)
08a40648
AM
8518 {
8519 case NT_NETBSDCORE_FIRSTMACH+0:
8520 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8521
08a40648
AM
8522 case NT_NETBSDCORE_FIRSTMACH+2:
8523 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8524
08a40648
AM
8525 default:
8526 return TRUE;
8527 }
50b2bdb7 8528
08a40648
AM
8529 /* On all other arch's, PT_GETREGS == mach+1 and
8530 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8531
8532 default:
8533 switch (note->type)
08a40648
AM
8534 {
8535 case NT_NETBSDCORE_FIRSTMACH+1:
8536 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8537
08a40648
AM
8538 case NT_NETBSDCORE_FIRSTMACH+3:
8539 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8540
08a40648
AM
8541 default:
8542 return TRUE;
8543 }
50b2bdb7
AM
8544 }
8545 /* NOTREACHED */
8546}
8547
67cc5033
MK
8548static bfd_boolean
8549elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8550{
8551 /* Signal number at offset 0x08. */
8552 elf_tdata (abfd)->core_signal
8553 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8554
8555 /* Process ID at offset 0x20. */
8556 elf_tdata (abfd)->core_pid
8557 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8558
8559 /* Command name at 0x48 (max 32 bytes, including nul). */
8560 elf_tdata (abfd)->core_command
8561 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8562
8563 return TRUE;
8564}
8565
8566static bfd_boolean
8567elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8568{
8569 if (note->type == NT_OPENBSD_PROCINFO)
8570 return elfcore_grok_openbsd_procinfo (abfd, note);
8571
8572 if (note->type == NT_OPENBSD_REGS)
8573 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8574
8575 if (note->type == NT_OPENBSD_FPREGS)
8576 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8577
8578 if (note->type == NT_OPENBSD_XFPREGS)
8579 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8580
8581 if (note->type == NT_OPENBSD_AUXV)
8582 {
8583 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8584 SEC_HAS_CONTENTS);
8585
8586 if (sect == NULL)
8587 return FALSE;
8588 sect->size = note->descsz;
8589 sect->filepos = note->descpos;
8590 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8591
8592 return TRUE;
8593 }
8594
8595 if (note->type == NT_OPENBSD_WCOOKIE)
8596 {
8597 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8598 SEC_HAS_CONTENTS);
8599
8600 if (sect == NULL)
8601 return FALSE;
8602 sect->size = note->descsz;
8603 sect->filepos = note->descpos;
8604 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8605
8606 return TRUE;
8607 }
8608
8609 return TRUE;
8610}
8611
07c6e936 8612static bfd_boolean
d3fd4074 8613elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8614{
8615 void *ddata = note->descdata;
8616 char buf[100];
8617 char *name;
8618 asection *sect;
f8843e87
AM
8619 short sig;
8620 unsigned flags;
07c6e936
NC
8621
8622 /* nto_procfs_status 'pid' field is at offset 0. */
8623 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8624
f8843e87
AM
8625 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8626 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8627
8628 /* nto_procfs_status 'flags' field is at offset 8. */
8629 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8630
8631 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8632 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8633 {
8634 elf_tdata (abfd)->core_signal = sig;
8635 elf_tdata (abfd)->core_lwpid = *tid;
8636 }
07c6e936 8637
f8843e87
AM
8638 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8639 do not come from signals so we make sure we set the current
8640 thread just in case. */
8641 if (flags & 0x00000080)
8642 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8643
8644 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8645 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8646
a50b1753 8647 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8648 if (name == NULL)
8649 return FALSE;
8650 strcpy (name, buf);
8651
117ed4f8 8652 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8653 if (sect == NULL)
8654 return FALSE;
8655
eea6121a 8656 sect->size = note->descsz;
07c6e936 8657 sect->filepos = note->descpos;
07c6e936
NC
8658 sect->alignment_power = 2;
8659
8660 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8661}
8662
8663static bfd_boolean
d69f560c
KW
8664elfcore_grok_nto_regs (bfd *abfd,
8665 Elf_Internal_Note *note,
d3fd4074 8666 long tid,
d69f560c 8667 char *base)
07c6e936
NC
8668{
8669 char buf[100];
8670 char *name;
8671 asection *sect;
8672
d69f560c 8673 /* Make a "(base)/%d" section. */
d3fd4074 8674 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8675
a50b1753 8676 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8677 if (name == NULL)
8678 return FALSE;
8679 strcpy (name, buf);
8680
117ed4f8 8681 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8682 if (sect == NULL)
8683 return FALSE;
8684
eea6121a 8685 sect->size = note->descsz;
07c6e936 8686 sect->filepos = note->descpos;
07c6e936
NC
8687 sect->alignment_power = 2;
8688
f8843e87
AM
8689 /* This is the current thread. */
8690 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8691 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8692
8693 return TRUE;
07c6e936
NC
8694}
8695
8696#define BFD_QNT_CORE_INFO 7
8697#define BFD_QNT_CORE_STATUS 8
8698#define BFD_QNT_CORE_GREG 9
8699#define BFD_QNT_CORE_FPREG 10
8700
8701static bfd_boolean
217aa764 8702elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8703{
8704 /* Every GREG section has a STATUS section before it. Store the
811072d8 8705 tid from the previous call to pass down to the next gregs
07c6e936 8706 function. */
d3fd4074 8707 static long tid = 1;
07c6e936
NC
8708
8709 switch (note->type)
8710 {
d69f560c
KW
8711 case BFD_QNT_CORE_INFO:
8712 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8713 case BFD_QNT_CORE_STATUS:
8714 return elfcore_grok_nto_status (abfd, note, &tid);
8715 case BFD_QNT_CORE_GREG:
8716 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8717 case BFD_QNT_CORE_FPREG:
8718 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8719 default:
8720 return TRUE;
07c6e936
NC
8721 }
8722}
8723
b15fa79e
AM
8724static bfd_boolean
8725elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8726{
8727 char *name;
8728 asection *sect;
8729 size_t len;
8730
8731 /* Use note name as section name. */
8732 len = note->namesz;
a50b1753 8733 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
8734 if (name == NULL)
8735 return FALSE;
8736 memcpy (name, note->namedata, len);
8737 name[len - 1] = '\0';
8738
8739 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8740 if (sect == NULL)
8741 return FALSE;
8742
8743 sect->size = note->descsz;
8744 sect->filepos = note->descpos;
8745 sect->alignment_power = 1;
8746
8747 return TRUE;
8748}
8749
7c76fa91
MS
8750/* Function: elfcore_write_note
8751
47d9a591 8752 Inputs:
a39f3346 8753 buffer to hold note, and current size of buffer
7c76fa91
MS
8754 name of note
8755 type of note
8756 data for note
8757 size of data for note
8758
a39f3346
AM
8759 Writes note to end of buffer. ELF64 notes are written exactly as
8760 for ELF32, despite the current (as of 2006) ELF gabi specifying
8761 that they ought to have 8-byte namesz and descsz field, and have
8762 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8763
7c76fa91 8764 Return:
a39f3346 8765 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8766
8767char *
a39f3346 8768elfcore_write_note (bfd *abfd,
217aa764 8769 char *buf,
a39f3346 8770 int *bufsiz,
217aa764 8771 const char *name,
a39f3346 8772 int type,
217aa764 8773 const void *input,
a39f3346 8774 int size)
7c76fa91
MS
8775{
8776 Elf_External_Note *xnp;
d4c88bbb 8777 size_t namesz;
d4c88bbb 8778 size_t newspace;
a39f3346 8779 char *dest;
7c76fa91 8780
d4c88bbb 8781 namesz = 0;
d4c88bbb 8782 if (name != NULL)
a39f3346 8783 namesz = strlen (name) + 1;
d4c88bbb 8784
a39f3346 8785 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 8786
a50b1753 8787 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
8788 if (buf == NULL)
8789 return buf;
a39f3346 8790 dest = buf + *bufsiz;
7c76fa91
MS
8791 *bufsiz += newspace;
8792 xnp = (Elf_External_Note *) dest;
8793 H_PUT_32 (abfd, namesz, xnp->namesz);
8794 H_PUT_32 (abfd, size, xnp->descsz);
8795 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8796 dest = xnp->name;
8797 if (name != NULL)
8798 {
8799 memcpy (dest, name, namesz);
8800 dest += namesz;
a39f3346 8801 while (namesz & 3)
d4c88bbb
AM
8802 {
8803 *dest++ = '\0';
a39f3346 8804 ++namesz;
d4c88bbb
AM
8805 }
8806 }
8807 memcpy (dest, input, size);
a39f3346
AM
8808 dest += size;
8809 while (size & 3)
8810 {
8811 *dest++ = '\0';
8812 ++size;
8813 }
8814 return buf;
7c76fa91
MS
8815}
8816
8817#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8818char *
217aa764
AM
8819elfcore_write_prpsinfo (bfd *abfd,
8820 char *buf,
8821 int *bufsiz,
8822 const char *fname,
8823 const char *psargs)
7c76fa91 8824{
183e98be
AM
8825 const char *note_name = "CORE";
8826 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8827
8828 if (bed->elf_backend_write_core_note != NULL)
8829 {
8830 char *ret;
8831 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8832 NT_PRPSINFO, fname, psargs);
8833 if (ret != NULL)
8834 return ret;
8835 }
7c76fa91 8836
183e98be
AM
8837#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
8838 if (bed->s->elfclass == ELFCLASS32)
8839 {
8840#if defined (HAVE_PSINFO32_T)
8841 psinfo32_t data;
8842 int note_type = NT_PSINFO;
8843#else
8844 prpsinfo32_t data;
8845 int note_type = NT_PRPSINFO;
8846#endif
8847
8848 memset (&data, 0, sizeof (data));
8849 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8850 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8851 return elfcore_write_note (abfd, buf, bufsiz,
8852 note_name, note_type, &data, sizeof (data));
8853 }
8854 else
8855#endif
8856 {
7c76fa91 8857#if defined (HAVE_PSINFO_T)
183e98be
AM
8858 psinfo_t data;
8859 int note_type = NT_PSINFO;
7c76fa91 8860#else
183e98be
AM
8861 prpsinfo_t data;
8862 int note_type = NT_PRPSINFO;
7c76fa91
MS
8863#endif
8864
183e98be
AM
8865 memset (&data, 0, sizeof (data));
8866 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8867 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8868 return elfcore_write_note (abfd, buf, bufsiz,
8869 note_name, note_type, &data, sizeof (data));
8870 }
7c76fa91
MS
8871}
8872#endif /* PSINFO_T or PRPSINFO_T */
8873
8874#if defined (HAVE_PRSTATUS_T)
8875char *
217aa764
AM
8876elfcore_write_prstatus (bfd *abfd,
8877 char *buf,
8878 int *bufsiz,
8879 long pid,
8880 int cursig,
8881 const void *gregs)
7c76fa91 8882{
183e98be
AM
8883 const char *note_name = "CORE";
8884 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8885
183e98be
AM
8886 if (bed->elf_backend_write_core_note != NULL)
8887 {
8888 char *ret;
8889 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8890 NT_PRSTATUS,
8891 pid, cursig, gregs);
8892 if (ret != NULL)
8893 return ret;
8894 }
8895
8896#if defined (HAVE_PRSTATUS32_T)
8897 if (bed->s->elfclass == ELFCLASS32)
8898 {
8899 prstatus32_t prstat;
8900
8901 memset (&prstat, 0, sizeof (prstat));
8902 prstat.pr_pid = pid;
8903 prstat.pr_cursig = cursig;
8904 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8905 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8906 NT_PRSTATUS, &prstat, sizeof (prstat));
8907 }
8908 else
8909#endif
8910 {
8911 prstatus_t prstat;
8912
8913 memset (&prstat, 0, sizeof (prstat));
8914 prstat.pr_pid = pid;
8915 prstat.pr_cursig = cursig;
8916 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8917 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8918 NT_PRSTATUS, &prstat, sizeof (prstat));
8919 }
7c76fa91
MS
8920}
8921#endif /* HAVE_PRSTATUS_T */
8922
51316059
MS
8923#if defined (HAVE_LWPSTATUS_T)
8924char *
217aa764
AM
8925elfcore_write_lwpstatus (bfd *abfd,
8926 char *buf,
8927 int *bufsiz,
8928 long pid,
8929 int cursig,
8930 const void *gregs)
51316059
MS
8931{
8932 lwpstatus_t lwpstat;
183e98be 8933 const char *note_name = "CORE";
51316059
MS
8934
8935 memset (&lwpstat, 0, sizeof (lwpstat));
8936 lwpstat.pr_lwpid = pid >> 16;
8937 lwpstat.pr_cursig = cursig;
8938#if defined (HAVE_LWPSTATUS_T_PR_REG)
8939 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8940#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8941#if !defined(gregs)
8942 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8943 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8944#else
8945 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8946 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8947#endif
8948#endif
47d9a591 8949 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8950 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8951}
8952#endif /* HAVE_LWPSTATUS_T */
8953
7c76fa91
MS
8954#if defined (HAVE_PSTATUS_T)
8955char *
217aa764
AM
8956elfcore_write_pstatus (bfd *abfd,
8957 char *buf,
8958 int *bufsiz,
8959 long pid,
6c10990d
NC
8960 int cursig ATTRIBUTE_UNUSED,
8961 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 8962{
183e98be
AM
8963 const char *note_name = "CORE";
8964#if defined (HAVE_PSTATUS32_T)
8965 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8966
183e98be
AM
8967 if (bed->s->elfclass == ELFCLASS32)
8968 {
8969 pstatus32_t pstat;
8970
8971 memset (&pstat, 0, sizeof (pstat));
8972 pstat.pr_pid = pid & 0xffff;
8973 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8974 NT_PSTATUS, &pstat, sizeof (pstat));
8975 return buf;
8976 }
8977 else
8978#endif
8979 {
8980 pstatus_t pstat;
8981
8982 memset (&pstat, 0, sizeof (pstat));
8983 pstat.pr_pid = pid & 0xffff;
8984 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8985 NT_PSTATUS, &pstat, sizeof (pstat));
8986 return buf;
8987 }
7c76fa91
MS
8988}
8989#endif /* HAVE_PSTATUS_T */
8990
8991char *
217aa764
AM
8992elfcore_write_prfpreg (bfd *abfd,
8993 char *buf,
8994 int *bufsiz,
8995 const void *fpregs,
8996 int size)
7c76fa91 8997{
183e98be 8998 const char *note_name = "CORE";
47d9a591 8999 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9000 note_name, NT_FPREGSET, fpregs, size);
9001}
9002
9003char *
217aa764
AM
9004elfcore_write_prxfpreg (bfd *abfd,
9005 char *buf,
9006 int *bufsiz,
9007 const void *xfpregs,
9008 int size)
7c76fa91
MS
9009{
9010 char *note_name = "LINUX";
47d9a591 9011 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9012 note_name, NT_PRXFPREG, xfpregs, size);
9013}
9014
4339cae0
L
9015char *
9016elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
9017 const void *xfpregs, int size)
9018{
9019 char *note_name = "LINUX";
9020 return elfcore_write_note (abfd, buf, bufsiz,
9021 note_name, NT_X86_XSTATE, xfpregs, size);
9022}
9023
97753bd5
AM
9024char *
9025elfcore_write_ppc_vmx (bfd *abfd,
9026 char *buf,
9027 int *bufsiz,
9028 const void *ppc_vmx,
9029 int size)
9030{
9031 char *note_name = "LINUX";
9032 return elfcore_write_note (abfd, buf, bufsiz,
9033 note_name, NT_PPC_VMX, ppc_vmx, size);
9034}
9035
89eeb0bc
LM
9036char *
9037elfcore_write_ppc_vsx (bfd *abfd,
9038 char *buf,
9039 int *bufsiz,
9040 const void *ppc_vsx,
9041 int size)
9042{
9043 char *note_name = "LINUX";
9044 return elfcore_write_note (abfd, buf, bufsiz,
9045 note_name, NT_PPC_VSX, ppc_vsx, size);
9046}
9047
0675e188
UW
9048static char *
9049elfcore_write_s390_high_gprs (bfd *abfd,
9050 char *buf,
9051 int *bufsiz,
9052 const void *s390_high_gprs,
9053 int size)
9054{
9055 char *note_name = "LINUX";
9056 return elfcore_write_note (abfd, buf, bufsiz,
9057 note_name, NT_S390_HIGH_GPRS,
9058 s390_high_gprs, size);
9059}
9060
d7eeb400
MS
9061char *
9062elfcore_write_s390_timer (bfd *abfd,
9063 char *buf,
9064 int *bufsiz,
9065 const void *s390_timer,
9066 int size)
9067{
9068 char *note_name = "LINUX";
9069 return elfcore_write_note (abfd, buf, bufsiz,
9070 note_name, NT_S390_TIMER, s390_timer, size);
9071}
9072
9073char *
9074elfcore_write_s390_todcmp (bfd *abfd,
9075 char *buf,
9076 int *bufsiz,
9077 const void *s390_todcmp,
9078 int size)
9079{
9080 char *note_name = "LINUX";
9081 return elfcore_write_note (abfd, buf, bufsiz,
9082 note_name, NT_S390_TODCMP, s390_todcmp, size);
9083}
9084
9085char *
9086elfcore_write_s390_todpreg (bfd *abfd,
9087 char *buf,
9088 int *bufsiz,
9089 const void *s390_todpreg,
9090 int size)
9091{
9092 char *note_name = "LINUX";
9093 return elfcore_write_note (abfd, buf, bufsiz,
9094 note_name, NT_S390_TODPREG, s390_todpreg, size);
9095}
9096
9097char *
9098elfcore_write_s390_ctrs (bfd *abfd,
9099 char *buf,
9100 int *bufsiz,
9101 const void *s390_ctrs,
9102 int size)
9103{
9104 char *note_name = "LINUX";
9105 return elfcore_write_note (abfd, buf, bufsiz,
9106 note_name, NT_S390_CTRS, s390_ctrs, size);
9107}
9108
9109char *
9110elfcore_write_s390_prefix (bfd *abfd,
9111 char *buf,
9112 int *bufsiz,
9113 const void *s390_prefix,
9114 int size)
9115{
9116 char *note_name = "LINUX";
9117 return elfcore_write_note (abfd, buf, bufsiz,
9118 note_name, NT_S390_PREFIX, s390_prefix, size);
9119}
9120
bb864ac1
CES
9121char *
9122elfcore_write_register_note (bfd *abfd,
9123 char *buf,
9124 int *bufsiz,
9125 const char *section,
9126 const void *data,
9127 int size)
9128{
9129 if (strcmp (section, ".reg2") == 0)
9130 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
9131 if (strcmp (section, ".reg-xfp") == 0)
9132 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
9133 if (strcmp (section, ".reg-xstate") == 0)
9134 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9135 if (strcmp (section, ".reg-ppc-vmx") == 0)
9136 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
9137 if (strcmp (section, ".reg-ppc-vsx") == 0)
9138 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
9139 if (strcmp (section, ".reg-s390-high-gprs") == 0)
9140 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
9141 if (strcmp (section, ".reg-s390-timer") == 0)
9142 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
9143 if (strcmp (section, ".reg-s390-todcmp") == 0)
9144 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
9145 if (strcmp (section, ".reg-s390-todpreg") == 0)
9146 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
9147 if (strcmp (section, ".reg-s390-ctrs") == 0)
9148 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
9149 if (strcmp (section, ".reg-s390-prefix") == 0)
9150 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9151 return NULL;
9152}
9153
b34976b6 9154static bfd_boolean
718175fa 9155elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 9156{
c044fabd 9157 char *p;
252b5132 9158
252b5132
RH
9159 p = buf;
9160 while (p < buf + size)
9161 {
c044fabd
KH
9162 /* FIXME: bad alignment assumption. */
9163 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
9164 Elf_Internal_Note in;
9165
baea7ef1
AM
9166 if (offsetof (Elf_External_Note, name) > buf - p + size)
9167 return FALSE;
9168
dc810e39 9169 in.type = H_GET_32 (abfd, xnp->type);
252b5132 9170
dc810e39 9171 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 9172 in.namedata = xnp->name;
baea7ef1
AM
9173 if (in.namesz > buf - in.namedata + size)
9174 return FALSE;
252b5132 9175
dc810e39 9176 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
9177 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
9178 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
9179 if (in.descsz != 0
9180 && (in.descdata >= buf + size
9181 || in.descsz > buf - in.descdata + size))
9182 return FALSE;
252b5132 9183
718175fa
JK
9184 switch (bfd_get_format (abfd))
9185 {
9186 default:
9187 return TRUE;
9188
9189 case bfd_core:
9190 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
9191 {
9192 if (! elfcore_grok_netbsd_note (abfd, &in))
9193 return FALSE;
9194 }
67cc5033
MK
9195 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
9196 {
9197 if (! elfcore_grok_openbsd_note (abfd, &in))
9198 return FALSE;
9199 }
718175fa
JK
9200 else if (CONST_STRNEQ (in.namedata, "QNX"))
9201 {
9202 if (! elfcore_grok_nto_note (abfd, &in))
9203 return FALSE;
9204 }
b15fa79e
AM
9205 else if (CONST_STRNEQ (in.namedata, "SPU/"))
9206 {
9207 if (! elfcore_grok_spu_note (abfd, &in))
9208 return FALSE;
9209 }
718175fa
JK
9210 else
9211 {
9212 if (! elfcore_grok_note (abfd, &in))
9213 return FALSE;
9214 }
9215 break;
9216
9217 case bfd_object:
9218 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
9219 {
9220 if (! elfobj_grok_gnu_note (abfd, &in))
9221 return FALSE;
9222 }
e21e5835
NC
9223 else if (in.namesz == sizeof "stapsdt"
9224 && strcmp (in.namedata, "stapsdt") == 0)
9225 {
9226 if (! elfobj_grok_stapsdt_note (abfd, &in))
9227 return FALSE;
9228 }
718175fa 9229 break;
08a40648 9230 }
252b5132
RH
9231
9232 p = in.descdata + BFD_ALIGN (in.descsz, 4);
9233 }
9234
718175fa
JK
9235 return TRUE;
9236}
9237
9238static bfd_boolean
9239elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
9240{
9241 char *buf;
9242
9243 if (size <= 0)
9244 return TRUE;
9245
9246 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
9247 return FALSE;
9248
a50b1753 9249 buf = (char *) bfd_malloc (size);
718175fa
JK
9250 if (buf == NULL)
9251 return FALSE;
9252
9253 if (bfd_bread (buf, size, abfd) != size
9254 || !elf_parse_notes (abfd, buf, size, offset))
9255 {
9256 free (buf);
9257 return FALSE;
9258 }
9259
252b5132 9260 free (buf);
b34976b6 9261 return TRUE;
252b5132 9262}
98d8431c
JB
9263\f
9264/* Providing external access to the ELF program header table. */
9265
9266/* Return an upper bound on the number of bytes required to store a
9267 copy of ABFD's program header table entries. Return -1 if an error
9268 occurs; bfd_get_error will return an appropriate code. */
c044fabd 9269
98d8431c 9270long
217aa764 9271bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
9272{
9273 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9274 {
9275 bfd_set_error (bfd_error_wrong_format);
9276 return -1;
9277 }
9278
936e320b 9279 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
9280}
9281
98d8431c
JB
9282/* Copy ABFD's program header table entries to *PHDRS. The entries
9283 will be stored as an array of Elf_Internal_Phdr structures, as
9284 defined in include/elf/internal.h. To find out how large the
9285 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
9286
9287 Return the number of program header table entries read, or -1 if an
9288 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 9289
98d8431c 9290int
217aa764 9291bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
9292{
9293 int num_phdrs;
9294
9295 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9296 {
9297 bfd_set_error (bfd_error_wrong_format);
9298 return -1;
9299 }
9300
9301 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 9302 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
9303 num_phdrs * sizeof (Elf_Internal_Phdr));
9304
9305 return num_phdrs;
9306}
ae4221d7 9307
db6751f2 9308enum elf_reloc_type_class
217aa764 9309_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
9310{
9311 return reloc_class_normal;
9312}
f8df10f4 9313
47d9a591 9314/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
9315 relocation against a local symbol. */
9316
9317bfd_vma
217aa764
AM
9318_bfd_elf_rela_local_sym (bfd *abfd,
9319 Elf_Internal_Sym *sym,
8517fae7 9320 asection **psec,
217aa764 9321 Elf_Internal_Rela *rel)
f8df10f4 9322{
8517fae7 9323 asection *sec = *psec;
f8df10f4
JJ
9324 bfd_vma relocation;
9325
9326 relocation = (sec->output_section->vma
9327 + sec->output_offset
9328 + sym->st_value);
9329 if ((sec->flags & SEC_MERGE)
c629eae0 9330 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 9331 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 9332 {
f8df10f4 9333 rel->r_addend =
8517fae7 9334 _bfd_merged_section_offset (abfd, psec,
65765700 9335 elf_section_data (sec)->sec_info,
753731ee
AM
9336 sym->st_value + rel->r_addend);
9337 if (sec != *psec)
9338 {
9339 /* If we have changed the section, and our original section is
9340 marked with SEC_EXCLUDE, it means that the original
9341 SEC_MERGE section has been completely subsumed in some
9342 other SEC_MERGE section. In this case, we need to leave
9343 some info around for --emit-relocs. */
9344 if ((sec->flags & SEC_EXCLUDE) != 0)
9345 sec->kept_section = *psec;
9346 sec = *psec;
9347 }
8517fae7
AM
9348 rel->r_addend -= relocation;
9349 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
9350 }
9351 return relocation;
9352}
c629eae0
JJ
9353
9354bfd_vma
217aa764
AM
9355_bfd_elf_rel_local_sym (bfd *abfd,
9356 Elf_Internal_Sym *sym,
9357 asection **psec,
9358 bfd_vma addend)
47d9a591 9359{
c629eae0
JJ
9360 asection *sec = *psec;
9361
68bfbfcc 9362 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
9363 return sym->st_value + addend;
9364
9365 return _bfd_merged_section_offset (abfd, psec,
65765700 9366 elf_section_data (sec)->sec_info,
753731ee 9367 sym->st_value + addend);
c629eae0
JJ
9368}
9369
9370bfd_vma
217aa764 9371_bfd_elf_section_offset (bfd *abfd,
92e4ec35 9372 struct bfd_link_info *info,
217aa764
AM
9373 asection *sec,
9374 bfd_vma offset)
c629eae0 9375{
68bfbfcc 9376 switch (sec->sec_info_type)
65765700
JJ
9377 {
9378 case ELF_INFO_TYPE_STABS:
eea6121a
AM
9379 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
9380 offset);
65765700 9381 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 9382 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700 9383 default:
310fd250
L
9384 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
9385 {
9386 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9387 bfd_size_type address_size = bed->s->arch_size / 8;
9388 offset = sec->size - offset - address_size;
9389 }
65765700
JJ
9390 return offset;
9391 }
c629eae0 9392}
3333a7c3
RM
9393\f
9394/* Create a new BFD as if by bfd_openr. Rather than opening a file,
9395 reconstruct an ELF file by reading the segments out of remote memory
9396 based on the ELF file header at EHDR_VMA and the ELF program headers it
9397 points to. If not null, *LOADBASEP is filled in with the difference
9398 between the VMAs from which the segments were read, and the VMAs the
9399 file headers (and hence BFD's idea of each section's VMA) put them at.
9400
9401 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
9402 remote memory at target address VMA into the local buffer at MYADDR; it
9403 should return zero on success or an `errno' code on failure. TEMPL must
9404 be a BFD for an ELF target with the word size and byte order found in
9405 the remote memory. */
9406
9407bfd *
217aa764
AM
9408bfd_elf_bfd_from_remote_memory
9409 (bfd *templ,
9410 bfd_vma ehdr_vma,
9411 bfd_vma *loadbasep,
f075ee0c 9412 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
9413{
9414 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
9415 (templ, ehdr_vma, loadbasep, target_read_memory);
9416}
4c45e5c9
JJ
9417\f
9418long
c9727e01
AM
9419_bfd_elf_get_synthetic_symtab (bfd *abfd,
9420 long symcount ATTRIBUTE_UNUSED,
9421 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 9422 long dynsymcount,
c9727e01
AM
9423 asymbol **dynsyms,
9424 asymbol **ret)
4c45e5c9
JJ
9425{
9426 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9427 asection *relplt;
9428 asymbol *s;
9429 const char *relplt_name;
9430 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
9431 arelent *p;
9432 long count, i, n;
9433 size_t size;
9434 Elf_Internal_Shdr *hdr;
9435 char *names;
9436 asection *plt;
9437
8615f3f2
AM
9438 *ret = NULL;
9439
90e3cdf2
JJ
9440 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
9441 return 0;
9442
8615f3f2
AM
9443 if (dynsymcount <= 0)
9444 return 0;
9445
4c45e5c9
JJ
9446 if (!bed->plt_sym_val)
9447 return 0;
9448
9449 relplt_name = bed->relplt_name;
9450 if (relplt_name == NULL)
d35fd659 9451 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
9452 relplt = bfd_get_section_by_name (abfd, relplt_name);
9453 if (relplt == NULL)
9454 return 0;
9455
9456 hdr = &elf_section_data (relplt)->this_hdr;
9457 if (hdr->sh_link != elf_dynsymtab (abfd)
9458 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
9459 return 0;
9460
9461 plt = bfd_get_section_by_name (abfd, ".plt");
9462 if (plt == NULL)
9463 return 0;
9464
9465 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 9466 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
9467 return -1;
9468
eea6121a 9469 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
9470 size = count * sizeof (asymbol);
9471 p = relplt->relocation;
cb53bf42 9472 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
9473 {
9474 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
9475 if (p->addend != 0)
9476 {
9477#ifdef BFD64
9478 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
9479#else
9480 size += sizeof ("+0x") - 1 + 8;
9481#endif
9482 }
9483 }
4c45e5c9 9484
a50b1753 9485 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
9486 if (s == NULL)
9487 return -1;
9488
9489 names = (char *) (s + count);
9490 p = relplt->relocation;
9491 n = 0;
cb53bf42 9492 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
9493 {
9494 size_t len;
9495 bfd_vma addr;
9496
9497 addr = bed->plt_sym_val (i, plt, p);
9498 if (addr == (bfd_vma) -1)
9499 continue;
9500
9501 *s = **p->sym_ptr_ptr;
65a7a66f
AM
9502 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
9503 we are defining a symbol, ensure one of them is set. */
9504 if ((s->flags & BSF_LOCAL) == 0)
9505 s->flags |= BSF_GLOBAL;
6ba2a415 9506 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
9507 s->section = plt;
9508 s->value = addr - plt->vma;
9509 s->name = names;
8f39ba8e 9510 s->udata.p = NULL;
4c45e5c9
JJ
9511 len = strlen ((*p->sym_ptr_ptr)->name);
9512 memcpy (names, (*p->sym_ptr_ptr)->name, len);
9513 names += len;
041de40d
AM
9514 if (p->addend != 0)
9515 {
1d770845 9516 char buf[30], *a;
91d6fa6a 9517
041de40d
AM
9518 memcpy (names, "+0x", sizeof ("+0x") - 1);
9519 names += sizeof ("+0x") - 1;
1d770845
L
9520 bfd_sprintf_vma (abfd, buf, p->addend);
9521 for (a = buf; *a == '0'; ++a)
9522 ;
9523 len = strlen (a);
9524 memcpy (names, a, len);
9525 names += len;
041de40d 9526 }
4c45e5c9
JJ
9527 memcpy (names, "@plt", sizeof ("@plt"));
9528 names += sizeof ("@plt");
8f39ba8e 9529 ++s, ++n;
4c45e5c9
JJ
9530 }
9531
9532 return n;
9533}
3d7f7666 9534
3b22753a
L
9535/* It is only used by x86-64 so far. */
9536asection _bfd_elf_large_com_section
9537 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 9538 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 9539
d1036acb
L
9540void
9541_bfd_elf_set_osabi (bfd * abfd,
9542 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
9543{
9544 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
9545
9546 i_ehdrp = elf_elfheader (abfd);
9547
9548 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
9549
9550 /* To make things simpler for the loader on Linux systems we set the
9551 osabi field to ELFOSABI_LINUX if the binary contains symbols of
f64b2e8d 9552 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 9553 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 9554 && elf_tdata (abfd)->has_gnu_symbols)
d8045f23 9555 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
d1036acb 9556}
fcb93ecf
PB
9557
9558
9559/* Return TRUE for ELF symbol types that represent functions.
9560 This is the default version of this function, which is sufficient for
d8045f23 9561 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
9562
9563bfd_boolean
9564_bfd_elf_is_function_type (unsigned int type)
9565{
d8045f23
NC
9566 return (type == STT_FUNC
9567 || type == STT_GNU_IFUNC);
fcb93ecf 9568}