]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
*** empty log message ***
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
72a80a16
AM
4 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009
5 Free Software Foundation, Inc.
252b5132 6
5e8d7549 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
5e8d7549
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
5e8d7549 12 (at your option) any later version.
252b5132 13
5e8d7549
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
5e8d7549 19 You should have received a copy of the GNU General Public License
b34976b6 20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
23
252b5132 24
1b74d094
BW
25/*
26SECTION
252b5132
RH
27 ELF backends
28
29 BFD support for ELF formats is being worked on.
30 Currently, the best supported back ends are for sparc and i386
31 (running svr4 or Solaris 2).
32
33 Documentation of the internals of the support code still needs
34 to be written. The code is changing quickly enough that we
661a3fd4 35 haven't bothered yet. */
252b5132 36
7ee38065
MS
37/* For sparc64-cross-sparc32. */
38#define _SYSCALL32
252b5132 39#include "sysdep.h"
3db64b00 40#include "bfd.h"
252b5132
RH
41#include "bfdlink.h"
42#include "libbfd.h"
43#define ARCH_SIZE 0
44#include "elf-bfd.h"
e0e8c97f 45#include "libiberty.h"
ff59fc36 46#include "safe-ctype.h"
252b5132 47
217aa764 48static int elf_sort_sections (const void *, const void *);
c84fca4d 49static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
50static bfd_boolean prep_headers (bfd *);
51static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
52static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
53static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
54 file_ptr offset);
50b2bdb7 55
252b5132
RH
56/* Swap version information in and out. The version information is
57 currently size independent. If that ever changes, this code will
58 need to move into elfcode.h. */
59
60/* Swap in a Verdef structure. */
61
62void
217aa764
AM
63_bfd_elf_swap_verdef_in (bfd *abfd,
64 const Elf_External_Verdef *src,
65 Elf_Internal_Verdef *dst)
252b5132 66{
dc810e39
AM
67 dst->vd_version = H_GET_16 (abfd, src->vd_version);
68 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
69 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
70 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
71 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
72 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
73 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
74}
75
76/* Swap out a Verdef structure. */
77
78void
217aa764
AM
79_bfd_elf_swap_verdef_out (bfd *abfd,
80 const Elf_Internal_Verdef *src,
81 Elf_External_Verdef *dst)
252b5132 82{
dc810e39
AM
83 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
84 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
85 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
86 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
87 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
88 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
89 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
90}
91
92/* Swap in a Verdaux structure. */
93
94void
217aa764
AM
95_bfd_elf_swap_verdaux_in (bfd *abfd,
96 const Elf_External_Verdaux *src,
97 Elf_Internal_Verdaux *dst)
252b5132 98{
dc810e39
AM
99 dst->vda_name = H_GET_32 (abfd, src->vda_name);
100 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
101}
102
103/* Swap out a Verdaux structure. */
104
105void
217aa764
AM
106_bfd_elf_swap_verdaux_out (bfd *abfd,
107 const Elf_Internal_Verdaux *src,
108 Elf_External_Verdaux *dst)
252b5132 109{
dc810e39
AM
110 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
111 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
112}
113
114/* Swap in a Verneed structure. */
115
116void
217aa764
AM
117_bfd_elf_swap_verneed_in (bfd *abfd,
118 const Elf_External_Verneed *src,
119 Elf_Internal_Verneed *dst)
252b5132 120{
dc810e39
AM
121 dst->vn_version = H_GET_16 (abfd, src->vn_version);
122 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
123 dst->vn_file = H_GET_32 (abfd, src->vn_file);
124 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
125 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
126}
127
128/* Swap out a Verneed structure. */
129
130void
217aa764
AM
131_bfd_elf_swap_verneed_out (bfd *abfd,
132 const Elf_Internal_Verneed *src,
133 Elf_External_Verneed *dst)
252b5132 134{
dc810e39
AM
135 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
136 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
137 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
138 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
139 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
140}
141
142/* Swap in a Vernaux structure. */
143
144void
217aa764
AM
145_bfd_elf_swap_vernaux_in (bfd *abfd,
146 const Elf_External_Vernaux *src,
147 Elf_Internal_Vernaux *dst)
252b5132 148{
dc810e39
AM
149 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
150 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
151 dst->vna_other = H_GET_16 (abfd, src->vna_other);
152 dst->vna_name = H_GET_32 (abfd, src->vna_name);
153 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
154}
155
156/* Swap out a Vernaux structure. */
157
158void
217aa764
AM
159_bfd_elf_swap_vernaux_out (bfd *abfd,
160 const Elf_Internal_Vernaux *src,
161 Elf_External_Vernaux *dst)
252b5132 162{
dc810e39
AM
163 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
164 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
165 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
166 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
167 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
168}
169
170/* Swap in a Versym structure. */
171
172void
217aa764
AM
173_bfd_elf_swap_versym_in (bfd *abfd,
174 const Elf_External_Versym *src,
175 Elf_Internal_Versym *dst)
252b5132 176{
dc810e39 177 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
178}
179
180/* Swap out a Versym structure. */
181
182void
217aa764
AM
183_bfd_elf_swap_versym_out (bfd *abfd,
184 const Elf_Internal_Versym *src,
185 Elf_External_Versym *dst)
252b5132 186{
dc810e39 187 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
188}
189
190/* Standard ELF hash function. Do not change this function; you will
191 cause invalid hash tables to be generated. */
3a99b017 192
252b5132 193unsigned long
217aa764 194bfd_elf_hash (const char *namearg)
252b5132 195{
3a99b017 196 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
197 unsigned long h = 0;
198 unsigned long g;
199 int ch;
200
201 while ((ch = *name++) != '\0')
202 {
203 h = (h << 4) + ch;
204 if ((g = (h & 0xf0000000)) != 0)
205 {
206 h ^= g >> 24;
207 /* The ELF ABI says `h &= ~g', but this is equivalent in
208 this case and on some machines one insn instead of two. */
209 h ^= g;
210 }
211 }
32dfa85d 212 return h & 0xffffffff;
252b5132
RH
213}
214
fdc90cb4
JJ
215/* DT_GNU_HASH hash function. Do not change this function; you will
216 cause invalid hash tables to be generated. */
217
218unsigned long
219bfd_elf_gnu_hash (const char *namearg)
220{
221 const unsigned char *name = (const unsigned char *) namearg;
222 unsigned long h = 5381;
223 unsigned char ch;
224
225 while ((ch = *name++) != '\0')
226 h = (h << 5) + h + ch;
227 return h & 0xffffffff;
228}
229
0c8d6e5c
AM
230/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
231 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 232bfd_boolean
0c8d6e5c 233bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 234 size_t object_size,
4dfe6ac6 235 enum elf_target_id object_id)
252b5132 236{
0ffa91dd
NC
237 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
238 abfd->tdata.any = bfd_zalloc (abfd, object_size);
239 if (abfd->tdata.any == NULL)
240 return FALSE;
252b5132 241
0ffa91dd
NC
242 elf_object_id (abfd) = object_id;
243 elf_program_header_size (abfd) = (bfd_size_type) -1;
b34976b6 244 return TRUE;
252b5132
RH
245}
246
0ffa91dd
NC
247
248bfd_boolean
249bfd_elf_make_generic_object (bfd *abfd)
250{
251 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
4dfe6ac6 252 GENERIC_ELF_DATA);
0ffa91dd
NC
253}
254
b34976b6 255bfd_boolean
217aa764 256bfd_elf_mkcorefile (bfd *abfd)
252b5132 257{
c044fabd 258 /* I think this can be done just like an object file. */
0ffa91dd 259 return bfd_elf_make_generic_object (abfd);
252b5132
RH
260}
261
72a80a16 262static char *
217aa764 263bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
264{
265 Elf_Internal_Shdr **i_shdrp;
f075ee0c 266 bfd_byte *shstrtab = NULL;
dc810e39
AM
267 file_ptr offset;
268 bfd_size_type shstrtabsize;
252b5132
RH
269
270 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
271 if (i_shdrp == 0
272 || shindex >= elf_numsections (abfd)
273 || i_shdrp[shindex] == 0)
f075ee0c 274 return NULL;
252b5132 275
f075ee0c 276 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
277 if (shstrtab == NULL)
278 {
c044fabd 279 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
280 offset = i_shdrp[shindex]->sh_offset;
281 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
282
283 /* Allocate and clear an extra byte at the end, to prevent crashes
284 in case the string table is not terminated. */
3471d59d 285 if (shstrtabsize + 1 <= 1
a50b1753 286 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL
c6c60d09
JJ
287 || bfd_seek (abfd, offset, SEEK_SET) != 0)
288 shstrtab = NULL;
289 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
290 {
291 if (bfd_get_error () != bfd_error_system_call)
292 bfd_set_error (bfd_error_file_truncated);
293 shstrtab = NULL;
3471d59d
CC
294 /* Once we've failed to read it, make sure we don't keep
295 trying. Otherwise, we'll keep allocating space for
296 the string table over and over. */
297 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
298 }
299 else
300 shstrtab[shstrtabsize] = '\0';
217aa764 301 i_shdrp[shindex]->contents = shstrtab;
252b5132 302 }
f075ee0c 303 return (char *) shstrtab;
252b5132
RH
304}
305
306char *
217aa764
AM
307bfd_elf_string_from_elf_section (bfd *abfd,
308 unsigned int shindex,
309 unsigned int strindex)
252b5132
RH
310{
311 Elf_Internal_Shdr *hdr;
312
313 if (strindex == 0)
314 return "";
315
74f2e02b
AM
316 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
317 return NULL;
318
252b5132
RH
319 hdr = elf_elfsections (abfd)[shindex];
320
321 if (hdr->contents == NULL
322 && bfd_elf_get_str_section (abfd, shindex) == NULL)
323 return NULL;
324
325 if (strindex >= hdr->sh_size)
326 {
1b3a8575 327 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 328 (*_bfd_error_handler)
d003868e
AM
329 (_("%B: invalid string offset %u >= %lu for section `%s'"),
330 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 331 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 332 ? ".shstrtab"
1b3a8575 333 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 334 return NULL;
252b5132
RH
335 }
336
337 return ((char *) hdr->contents) + strindex;
338}
339
6cdc0ccc
AM
340/* Read and convert symbols to internal format.
341 SYMCOUNT specifies the number of symbols to read, starting from
342 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
343 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
344 symbols, and symbol section index extensions, respectively.
345 Returns a pointer to the internal symbol buffer (malloced if necessary)
346 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
347
348Elf_Internal_Sym *
217aa764
AM
349bfd_elf_get_elf_syms (bfd *ibfd,
350 Elf_Internal_Shdr *symtab_hdr,
351 size_t symcount,
352 size_t symoffset,
353 Elf_Internal_Sym *intsym_buf,
354 void *extsym_buf,
355 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
356{
357 Elf_Internal_Shdr *shndx_hdr;
217aa764 358 void *alloc_ext;
df622259 359 const bfd_byte *esym;
6cdc0ccc
AM
360 Elf_External_Sym_Shndx *alloc_extshndx;
361 Elf_External_Sym_Shndx *shndx;
4dd07732 362 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
363 Elf_Internal_Sym *isym;
364 Elf_Internal_Sym *isymend;
9c5bfbb7 365 const struct elf_backend_data *bed;
6cdc0ccc
AM
366 size_t extsym_size;
367 bfd_size_type amt;
368 file_ptr pos;
369
e44a2c9c
AM
370 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
371 abort ();
372
6cdc0ccc
AM
373 if (symcount == 0)
374 return intsym_buf;
375
376 /* Normal syms might have section extension entries. */
377 shndx_hdr = NULL;
378 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
379 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
380
381 /* Read the symbols. */
382 alloc_ext = NULL;
383 alloc_extshndx = NULL;
4dd07732 384 alloc_intsym = NULL;
6cdc0ccc
AM
385 bed = get_elf_backend_data (ibfd);
386 extsym_size = bed->s->sizeof_sym;
387 amt = symcount * extsym_size;
388 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
389 if (extsym_buf == NULL)
390 {
d0fb9a8d 391 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
392 extsym_buf = alloc_ext;
393 }
394 if (extsym_buf == NULL
395 || bfd_seek (ibfd, pos, SEEK_SET) != 0
396 || bfd_bread (extsym_buf, amt, ibfd) != amt)
397 {
398 intsym_buf = NULL;
399 goto out;
400 }
401
402 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
403 extshndx_buf = NULL;
404 else
405 {
406 amt = symcount * sizeof (Elf_External_Sym_Shndx);
407 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
408 if (extshndx_buf == NULL)
409 {
a50b1753
NC
410 alloc_extshndx = (Elf_External_Sym_Shndx *)
411 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
412 extshndx_buf = alloc_extshndx;
413 }
414 if (extshndx_buf == NULL
415 || bfd_seek (ibfd, pos, SEEK_SET) != 0
416 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
417 {
418 intsym_buf = NULL;
419 goto out;
420 }
421 }
422
423 if (intsym_buf == NULL)
424 {
a50b1753
NC
425 alloc_intsym = (Elf_Internal_Sym *)
426 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 427 intsym_buf = alloc_intsym;
6cdc0ccc
AM
428 if (intsym_buf == NULL)
429 goto out;
430 }
431
432 /* Convert the symbols to internal form. */
433 isymend = intsym_buf + symcount;
a50b1753
NC
434 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
435 shndx = extshndx_buf;
6cdc0ccc
AM
436 isym < isymend;
437 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
438 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
439 {
440 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
441 (*_bfd_error_handler) (_("%B symbol number %lu references "
442 "nonexistent SHT_SYMTAB_SHNDX section"),
443 ibfd, (unsigned long) symoffset);
4dd07732
AM
444 if (alloc_intsym != NULL)
445 free (alloc_intsym);
8384fb8f
AM
446 intsym_buf = NULL;
447 goto out;
448 }
6cdc0ccc
AM
449
450 out:
451 if (alloc_ext != NULL)
452 free (alloc_ext);
453 if (alloc_extshndx != NULL)
454 free (alloc_extshndx);
455
456 return intsym_buf;
457}
458
5cab59f6
AM
459/* Look up a symbol name. */
460const char *
be8dd2ca
AM
461bfd_elf_sym_name (bfd *abfd,
462 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
463 Elf_Internal_Sym *isym,
464 asection *sym_sec)
5cab59f6 465{
26c61ae5 466 const char *name;
5cab59f6 467 unsigned int iname = isym->st_name;
be8dd2ca 468 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 469
138f35cc
JJ
470 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
471 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 472 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
473 {
474 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
475 shindex = elf_elfheader (abfd)->e_shstrndx;
476 }
477
26c61ae5
L
478 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
479 if (name == NULL)
480 name = "(null)";
481 else if (sym_sec && *name == '\0')
482 name = bfd_section_name (abfd, sym_sec);
483
484 return name;
5cab59f6
AM
485}
486
dbb410c3
AM
487/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
488 sections. The first element is the flags, the rest are section
489 pointers. */
490
491typedef union elf_internal_group {
492 Elf_Internal_Shdr *shdr;
493 unsigned int flags;
494} Elf_Internal_Group;
495
b885599b
AM
496/* Return the name of the group signature symbol. Why isn't the
497 signature just a string? */
498
499static const char *
217aa764 500group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 501{
9dce4196 502 Elf_Internal_Shdr *hdr;
9dce4196
AM
503 unsigned char esym[sizeof (Elf64_External_Sym)];
504 Elf_External_Sym_Shndx eshndx;
505 Elf_Internal_Sym isym;
b885599b 506
13792e9d
L
507 /* First we need to ensure the symbol table is available. Make sure
508 that it is a symbol table section. */
4fbb74a6
AM
509 if (ghdr->sh_link >= elf_numsections (abfd))
510 return NULL;
13792e9d
L
511 hdr = elf_elfsections (abfd) [ghdr->sh_link];
512 if (hdr->sh_type != SHT_SYMTAB
513 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
514 return NULL;
515
9dce4196
AM
516 /* Go read the symbol. */
517 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
518 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
519 &isym, esym, &eshndx) == NULL)
b885599b 520 return NULL;
9dce4196 521
26c61ae5 522 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
523}
524
dbb410c3
AM
525/* Set next_in_group list pointer, and group name for NEWSECT. */
526
b34976b6 527static bfd_boolean
217aa764 528setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
529{
530 unsigned int num_group = elf_tdata (abfd)->num_group;
531
532 /* If num_group is zero, read in all SHT_GROUP sections. The count
533 is set to -1 if there are no SHT_GROUP sections. */
534 if (num_group == 0)
535 {
536 unsigned int i, shnum;
537
538 /* First count the number of groups. If we have a SHT_GROUP
539 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 540 shnum = elf_numsections (abfd);
dbb410c3 541 num_group = 0;
08a40648 542
1783205a
NC
543#define IS_VALID_GROUP_SECTION_HEADER(shdr) \
544 ( (shdr)->sh_type == SHT_GROUP \
545 && (shdr)->sh_size >= (2 * GRP_ENTRY_SIZE) \
546 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
547 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 548
dbb410c3
AM
549 for (i = 0; i < shnum; i++)
550 {
551 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
552
553 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3
AM
554 num_group += 1;
555 }
556
557 if (num_group == 0)
20dbb49d
L
558 {
559 num_group = (unsigned) -1;
560 elf_tdata (abfd)->num_group = num_group;
561 }
562 else
dbb410c3
AM
563 {
564 /* We keep a list of elf section headers for group sections,
565 so we can find them quickly. */
20dbb49d 566 bfd_size_type amt;
d0fb9a8d 567
20dbb49d 568 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
569 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
570 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 571 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 572 return FALSE;
dbb410c3
AM
573
574 num_group = 0;
575 for (i = 0; i < shnum; i++)
576 {
577 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a
NC
578
579 if (IS_VALID_GROUP_SECTION_HEADER (shdr))
dbb410c3 580 {
973ffd63 581 unsigned char *src;
dbb410c3
AM
582 Elf_Internal_Group *dest;
583
584 /* Add to list of sections. */
585 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
586 num_group += 1;
587
588 /* Read the raw contents. */
589 BFD_ASSERT (sizeof (*dest) >= 4);
590 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
591 shdr->contents = (unsigned char *)
592 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
593 /* PR binutils/4110: Handle corrupt group headers. */
594 if (shdr->contents == NULL)
595 {
596 _bfd_error_handler
597 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
598 bfd_set_error (bfd_error_bad_value);
599 return FALSE;
600 }
601
602 memset (shdr->contents, 0, amt);
603
604 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
605 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
606 != shdr->sh_size))
b34976b6 607 return FALSE;
dbb410c3
AM
608
609 /* Translate raw contents, a flag word followed by an
610 array of elf section indices all in target byte order,
611 to the flag word followed by an array of elf section
612 pointers. */
613 src = shdr->contents + shdr->sh_size;
614 dest = (Elf_Internal_Group *) (shdr->contents + amt);
615 while (1)
616 {
617 unsigned int idx;
618
619 src -= 4;
620 --dest;
621 idx = H_GET_32 (abfd, src);
622 if (src == shdr->contents)
623 {
624 dest->flags = idx;
b885599b
AM
625 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
626 shdr->bfd_section->flags
627 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
628 break;
629 }
630 if (idx >= shnum)
631 {
632 ((*_bfd_error_handler)
d003868e 633 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
634 idx = 0;
635 }
636 dest->shdr = elf_elfsections (abfd)[idx];
637 }
638 }
639 }
640 }
641 }
642
643 if (num_group != (unsigned) -1)
644 {
645 unsigned int i;
646
647 for (i = 0; i < num_group; i++)
648 {
649 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
650 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
651 unsigned int n_elt = shdr->sh_size / 4;
652
653 /* Look through this group's sections to see if current
654 section is a member. */
655 while (--n_elt != 0)
656 if ((++idx)->shdr == hdr)
657 {
e0e8c97f 658 asection *s = NULL;
dbb410c3
AM
659
660 /* We are a member of this group. Go looking through
661 other members to see if any others are linked via
662 next_in_group. */
663 idx = (Elf_Internal_Group *) shdr->contents;
664 n_elt = shdr->sh_size / 4;
665 while (--n_elt != 0)
666 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 667 && elf_next_in_group (s) != NULL)
dbb410c3
AM
668 break;
669 if (n_elt != 0)
670 {
dbb410c3
AM
671 /* Snarf the group name from other member, and
672 insert current section in circular list. */
945906ff
AM
673 elf_group_name (newsect) = elf_group_name (s);
674 elf_next_in_group (newsect) = elf_next_in_group (s);
675 elf_next_in_group (s) = newsect;
dbb410c3
AM
676 }
677 else
678 {
dbb410c3
AM
679 const char *gname;
680
b885599b
AM
681 gname = group_signature (abfd, shdr);
682 if (gname == NULL)
b34976b6 683 return FALSE;
945906ff 684 elf_group_name (newsect) = gname;
dbb410c3
AM
685
686 /* Start a circular list with one element. */
945906ff 687 elf_next_in_group (newsect) = newsect;
dbb410c3 688 }
b885599b 689
9dce4196
AM
690 /* If the group section has been created, point to the
691 new member. */
dbb410c3 692 if (shdr->bfd_section != NULL)
945906ff 693 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 694
dbb410c3
AM
695 i = num_group - 1;
696 break;
697 }
698 }
699 }
700
945906ff 701 if (elf_group_name (newsect) == NULL)
dbb410c3 702 {
d003868e
AM
703 (*_bfd_error_handler) (_("%B: no group info for section %A"),
704 abfd, newsect);
dbb410c3 705 }
b34976b6 706 return TRUE;
dbb410c3
AM
707}
708
3d7f7666 709bfd_boolean
dd863624 710_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
711{
712 unsigned int i;
713 unsigned int num_group = elf_tdata (abfd)->num_group;
714 bfd_boolean result = TRUE;
dd863624
L
715 asection *s;
716
717 /* Process SHF_LINK_ORDER. */
718 for (s = abfd->sections; s != NULL; s = s->next)
719 {
720 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
721 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
722 {
723 unsigned int elfsec = this_hdr->sh_link;
724 /* FIXME: The old Intel compiler and old strip/objcopy may
725 not set the sh_link or sh_info fields. Hence we could
726 get the situation where elfsec is 0. */
727 if (elfsec == 0)
728 {
4fbb74a6 729 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
730 if (bed->link_order_error_handler)
731 bed->link_order_error_handler
732 (_("%B: warning: sh_link not set for section `%A'"),
733 abfd, s);
734 }
735 else
736 {
91d6fa6a 737 asection *linksec = NULL;
25bbc984 738
4fbb74a6
AM
739 if (elfsec < elf_numsections (abfd))
740 {
741 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 742 linksec = this_hdr->bfd_section;
4fbb74a6 743 }
25bbc984
L
744
745 /* PR 1991, 2008:
746 Some strip/objcopy may leave an incorrect value in
747 sh_link. We don't want to proceed. */
91d6fa6a 748 if (linksec == NULL)
25bbc984
L
749 {
750 (*_bfd_error_handler)
751 (_("%B: sh_link [%d] in section `%A' is incorrect"),
752 s->owner, s, elfsec);
753 result = FALSE;
754 }
755
91d6fa6a 756 elf_linked_to_section (s) = linksec;
dd863624
L
757 }
758 }
759 }
3d7f7666 760
dd863624 761 /* Process section groups. */
3d7f7666
L
762 if (num_group == (unsigned) -1)
763 return result;
764
765 for (i = 0; i < num_group; i++)
766 {
767 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
768 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
769 unsigned int n_elt = shdr->sh_size / 4;
770
771 while (--n_elt != 0)
772 if ((++idx)->shdr->bfd_section)
773 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
774 else if (idx->shdr->sh_type == SHT_RELA
775 || idx->shdr->sh_type == SHT_REL)
776 /* We won't include relocation sections in section groups in
777 output object files. We adjust the group section size here
778 so that relocatable link will work correctly when
779 relocation sections are in section group in input object
780 files. */
781 shdr->bfd_section->size -= 4;
782 else
783 {
784 /* There are some unknown sections in the group. */
785 (*_bfd_error_handler)
d003868e
AM
786 (_("%B: unknown [%d] section `%s' in group [%s]"),
787 abfd,
3d7f7666 788 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
789 bfd_elf_string_from_elf_section (abfd,
790 (elf_elfheader (abfd)
791 ->e_shstrndx),
792 idx->shdr->sh_name),
3d7f7666
L
793 shdr->bfd_section->name);
794 result = FALSE;
795 }
796 }
797 return result;
798}
799
72adc230
AM
800bfd_boolean
801bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
802{
803 return elf_next_in_group (sec) != NULL;
804}
805
252b5132
RH
806/* Make a BFD section from an ELF section. We store a pointer to the
807 BFD section in the bfd_section field of the header. */
808
b34976b6 809bfd_boolean
217aa764
AM
810_bfd_elf_make_section_from_shdr (bfd *abfd,
811 Elf_Internal_Shdr *hdr,
6dc132d9
L
812 const char *name,
813 int shindex)
252b5132
RH
814{
815 asection *newsect;
816 flagword flags;
9c5bfbb7 817 const struct elf_backend_data *bed;
252b5132
RH
818
819 if (hdr->bfd_section != NULL)
820 {
821 BFD_ASSERT (strcmp (name,
822 bfd_get_section_name (abfd, hdr->bfd_section)) == 0);
b34976b6 823 return TRUE;
252b5132
RH
824 }
825
826 newsect = bfd_make_section_anyway (abfd, name);
827 if (newsect == NULL)
b34976b6 828 return FALSE;
252b5132 829
1829f4b2
AM
830 hdr->bfd_section = newsect;
831 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 832 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 833
2f89ff8d
L
834 /* Always use the real type/flags. */
835 elf_section_type (newsect) = hdr->sh_type;
836 elf_section_flags (newsect) = hdr->sh_flags;
837
252b5132
RH
838 newsect->filepos = hdr->sh_offset;
839
840 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
841 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
842 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 843 bfd_log2 (hdr->sh_addralign)))
b34976b6 844 return FALSE;
252b5132
RH
845
846 flags = SEC_NO_FLAGS;
847 if (hdr->sh_type != SHT_NOBITS)
848 flags |= SEC_HAS_CONTENTS;
dbb410c3 849 if (hdr->sh_type == SHT_GROUP)
b3096250 850 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
851 if ((hdr->sh_flags & SHF_ALLOC) != 0)
852 {
853 flags |= SEC_ALLOC;
854 if (hdr->sh_type != SHT_NOBITS)
855 flags |= SEC_LOAD;
856 }
857 if ((hdr->sh_flags & SHF_WRITE) == 0)
858 flags |= SEC_READONLY;
859 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
860 flags |= SEC_CODE;
861 else if ((flags & SEC_LOAD) != 0)
862 flags |= SEC_DATA;
f5fa8ca2
JJ
863 if ((hdr->sh_flags & SHF_MERGE) != 0)
864 {
865 flags |= SEC_MERGE;
866 newsect->entsize = hdr->sh_entsize;
867 if ((hdr->sh_flags & SHF_STRINGS) != 0)
868 flags |= SEC_STRINGS;
869 }
dbb410c3
AM
870 if (hdr->sh_flags & SHF_GROUP)
871 if (!setup_group (abfd, hdr, newsect))
b34976b6 872 return FALSE;
13ae64f3
JJ
873 if ((hdr->sh_flags & SHF_TLS) != 0)
874 flags |= SEC_THREAD_LOCAL;
252b5132 875
3d2b39cf 876 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 877 {
3d2b39cf
L
878 /* The debugging sections appear to be recognized only by name,
879 not any sort of flag. Their SEC_ALLOC bits are cleared. */
880 static const struct
881 {
882 const char *name;
883 int len;
884 } debug_sections [] =
885 {
0112cd26 886 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
887 { NULL, 0 }, /* 'e' */
888 { NULL, 0 }, /* 'f' */
0112cd26 889 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
890 { NULL, 0 }, /* 'h' */
891 { NULL, 0 }, /* 'i' */
892 { NULL, 0 }, /* 'j' */
893 { NULL, 0 }, /* 'k' */
0112cd26 894 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
895 { NULL, 0 }, /* 'm' */
896 { NULL, 0 }, /* 'n' */
897 { NULL, 0 }, /* 'o' */
898 { NULL, 0 }, /* 'p' */
899 { NULL, 0 }, /* 'q' */
900 { NULL, 0 }, /* 'r' */
1b315056
CS
901 { STRING_COMMA_LEN ("stab") }, /* 's' */
902 { NULL, 0 }, /* 't' */
903 { NULL, 0 }, /* 'u' */
904 { NULL, 0 }, /* 'v' */
905 { NULL, 0 }, /* 'w' */
906 { NULL, 0 }, /* 'x' */
907 { NULL, 0 }, /* 'y' */
908 { STRING_COMMA_LEN ("zdebug") } /* 'z' */
3d2b39cf 909 };
08a40648 910
3d2b39cf
L
911 if (name [0] == '.')
912 {
913 int i = name [1] - 'd';
914 if (i >= 0
915 && i < (int) ARRAY_SIZE (debug_sections)
916 && debug_sections [i].name != NULL
917 && strncmp (&name [1], debug_sections [i].name,
918 debug_sections [i].len) == 0)
919 flags |= SEC_DEBUGGING;
920 }
921 }
252b5132
RH
922
923 /* As a GNU extension, if the name begins with .gnu.linkonce, we
924 only link a single copy of the section. This is used to support
925 g++. g++ will emit each template expansion in its own section.
926 The symbols will be defined as weak, so that multiple definitions
927 are permitted. The GNU linker extension is to actually discard
928 all but one of the sections. */
0112cd26 929 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 930 && elf_next_in_group (newsect) == NULL)
252b5132
RH
931 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
932
fa152c49
JW
933 bed = get_elf_backend_data (abfd);
934 if (bed->elf_backend_section_flags)
935 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 936 return FALSE;
fa152c49 937
252b5132 938 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 939 return FALSE;
252b5132 940
718175fa
JK
941 /* We do not parse the PT_NOTE segments as we are interested even in the
942 separate debug info files which may have the segments offsets corrupted.
943 PT_NOTEs from the core files are currently not parsed using BFD. */
944 if (hdr->sh_type == SHT_NOTE)
945 {
baea7ef1 946 bfd_byte *contents;
718175fa 947
baea7ef1 948 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
949 return FALSE;
950
baea7ef1 951 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
952 free (contents);
953 }
954
252b5132
RH
955 if ((flags & SEC_ALLOC) != 0)
956 {
957 Elf_Internal_Phdr *phdr;
6ffd7900
AM
958 unsigned int i, nload;
959
960 /* Some ELF linkers produce binaries with all the program header
961 p_paddr fields zero. If we have such a binary with more than
962 one PT_LOAD header, then leave the section lma equal to vma
963 so that we don't create sections with overlapping lma. */
964 phdr = elf_tdata (abfd)->phdr;
965 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
966 if (phdr->p_paddr != 0)
967 break;
968 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
969 ++nload;
970 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
971 return TRUE;
252b5132 972
252b5132
RH
973 phdr = elf_tdata (abfd)->phdr;
974 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
975 {
88967714 976 if (phdr->p_type == PT_LOAD
e7e75368 977 && ELF_IS_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 978 {
88967714
AM
979 if ((flags & SEC_LOAD) == 0)
980 newsect->lma = (phdr->p_paddr
981 + hdr->sh_addr - phdr->p_vaddr);
982 else
983 /* We used to use the same adjustment for SEC_LOAD
984 sections, but that doesn't work if the segment
985 is packed with code from multiple VMAs.
986 Instead we calculate the section LMA based on
987 the segment LMA. It is assumed that the
988 segment will contain sections with contiguous
989 LMAs, even if the VMAs are not. */
990 newsect->lma = (phdr->p_paddr
991 + hdr->sh_offset - phdr->p_offset);
992
993 /* With contiguous segments, we can't tell from file
994 offsets whether a section with zero size should
995 be placed at the end of one segment or the
996 beginning of the next. Decide based on vaddr. */
997 if (hdr->sh_addr >= phdr->p_vaddr
998 && (hdr->sh_addr + hdr->sh_size
999 <= phdr->p_vaddr + phdr->p_memsz))
1000 break;
252b5132
RH
1001 }
1002 }
1003 }
1004
b34976b6 1005 return TRUE;
252b5132
RH
1006}
1007
252b5132
RH
1008const char *const bfd_elf_section_type_names[] = {
1009 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1010 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1011 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1012};
1013
1049f94e 1014/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1015 output, and the reloc is against an external symbol, and nothing
1016 has given us any additional addend, the resulting reloc will also
1017 be against the same symbol. In such a case, we don't want to
1018 change anything about the way the reloc is handled, since it will
1019 all be done at final link time. Rather than put special case code
1020 into bfd_perform_relocation, all the reloc types use this howto
1021 function. It just short circuits the reloc if producing
1049f94e 1022 relocatable output against an external symbol. */
252b5132 1023
252b5132 1024bfd_reloc_status_type
217aa764
AM
1025bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1026 arelent *reloc_entry,
1027 asymbol *symbol,
1028 void *data ATTRIBUTE_UNUSED,
1029 asection *input_section,
1030 bfd *output_bfd,
1031 char **error_message ATTRIBUTE_UNUSED)
1032{
1033 if (output_bfd != NULL
252b5132
RH
1034 && (symbol->flags & BSF_SECTION_SYM) == 0
1035 && (! reloc_entry->howto->partial_inplace
1036 || reloc_entry->addend == 0))
1037 {
1038 reloc_entry->address += input_section->output_offset;
1039 return bfd_reloc_ok;
1040 }
1041
1042 return bfd_reloc_continue;
1043}
1044\f
0ac4564e
L
1045/* Copy the program header and other data from one object module to
1046 another. */
252b5132 1047
b34976b6 1048bfd_boolean
217aa764 1049_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1050{
1051 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1052 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1053 return TRUE;
2d502050
L
1054
1055 BFD_ASSERT (!elf_flags_init (obfd)
1056 || (elf_elfheader (obfd)->e_flags
1057 == elf_elfheader (ibfd)->e_flags));
1058
0ac4564e 1059 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1060 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1061 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1062
1063 /* Copy object attributes. */
1064 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1065
b34976b6 1066 return TRUE;
2d502050
L
1067}
1068
cedc298e
L
1069static const char *
1070get_segment_type (unsigned int p_type)
1071{
1072 const char *pt;
1073 switch (p_type)
1074 {
1075 case PT_NULL: pt = "NULL"; break;
1076 case PT_LOAD: pt = "LOAD"; break;
1077 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1078 case PT_INTERP: pt = "INTERP"; break;
1079 case PT_NOTE: pt = "NOTE"; break;
1080 case PT_SHLIB: pt = "SHLIB"; break;
1081 case PT_PHDR: pt = "PHDR"; break;
1082 case PT_TLS: pt = "TLS"; break;
1083 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1084 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1085 case PT_GNU_RELRO: pt = "RELRO"; break;
1086 default: pt = NULL; break;
1087 }
1088 return pt;
1089}
1090
f0b79d91
L
1091/* Print out the program headers. */
1092
b34976b6 1093bfd_boolean
217aa764 1094_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1095{
a50b1753 1096 FILE *f = (FILE *) farg;
252b5132
RH
1097 Elf_Internal_Phdr *p;
1098 asection *s;
1099 bfd_byte *dynbuf = NULL;
1100
1101 p = elf_tdata (abfd)->phdr;
1102 if (p != NULL)
1103 {
1104 unsigned int i, c;
1105
1106 fprintf (f, _("\nProgram Header:\n"));
1107 c = elf_elfheader (abfd)->e_phnum;
1108 for (i = 0; i < c; i++, p++)
1109 {
cedc298e 1110 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1111 char buf[20];
1112
cedc298e 1113 if (pt == NULL)
252b5132 1114 {
cedc298e
L
1115 sprintf (buf, "0x%lx", p->p_type);
1116 pt = buf;
252b5132 1117 }
dc810e39 1118 fprintf (f, "%8s off 0x", pt);
60b89a18 1119 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1120 fprintf (f, " vaddr 0x");
60b89a18 1121 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1122 fprintf (f, " paddr 0x");
60b89a18 1123 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1124 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1125 fprintf (f, " filesz 0x");
60b89a18 1126 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1127 fprintf (f, " memsz 0x");
60b89a18 1128 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1129 fprintf (f, " flags %c%c%c",
1130 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1131 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1132 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1133 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1134 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1135 fprintf (f, "\n");
1136 }
1137 }
1138
1139 s = bfd_get_section_by_name (abfd, ".dynamic");
1140 if (s != NULL)
1141 {
cb33740c 1142 unsigned int elfsec;
dc810e39 1143 unsigned long shlink;
252b5132
RH
1144 bfd_byte *extdyn, *extdynend;
1145 size_t extdynsize;
217aa764 1146 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1147
1148 fprintf (f, _("\nDynamic Section:\n"));
1149
eea6121a 1150 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1151 goto error_return;
1152
1153 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1154 if (elfsec == SHN_BAD)
252b5132 1155 goto error_return;
dc810e39 1156 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1157
1158 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1159 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1160
1161 extdyn = dynbuf;
eea6121a 1162 extdynend = extdyn + s->size;
252b5132
RH
1163 for (; extdyn < extdynend; extdyn += extdynsize)
1164 {
1165 Elf_Internal_Dyn dyn;
ad9563d6 1166 const char *name = "";
252b5132 1167 char ab[20];
b34976b6 1168 bfd_boolean stringp;
ad9563d6 1169 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1170
217aa764 1171 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1172
1173 if (dyn.d_tag == DT_NULL)
1174 break;
1175
b34976b6 1176 stringp = FALSE;
252b5132
RH
1177 switch (dyn.d_tag)
1178 {
1179 default:
ad9563d6
CM
1180 if (bed->elf_backend_get_target_dtag)
1181 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1182
1183 if (!strcmp (name, ""))
1184 {
1185 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1186 name = ab;
1187 }
252b5132
RH
1188 break;
1189
b34976b6 1190 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1191 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1192 case DT_PLTGOT: name = "PLTGOT"; break;
1193 case DT_HASH: name = "HASH"; break;
1194 case DT_STRTAB: name = "STRTAB"; break;
1195 case DT_SYMTAB: name = "SYMTAB"; break;
1196 case DT_RELA: name = "RELA"; break;
1197 case DT_RELASZ: name = "RELASZ"; break;
1198 case DT_RELAENT: name = "RELAENT"; break;
1199 case DT_STRSZ: name = "STRSZ"; break;
1200 case DT_SYMENT: name = "SYMENT"; break;
1201 case DT_INIT: name = "INIT"; break;
1202 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1203 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1204 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1205 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1206 case DT_REL: name = "REL"; break;
1207 case DT_RELSZ: name = "RELSZ"; break;
1208 case DT_RELENT: name = "RELENT"; break;
1209 case DT_PLTREL: name = "PLTREL"; break;
1210 case DT_DEBUG: name = "DEBUG"; break;
1211 case DT_TEXTREL: name = "TEXTREL"; break;
1212 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1213 case DT_BIND_NOW: name = "BIND_NOW"; break;
1214 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1215 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1216 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1217 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1218 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1219 case DT_FLAGS: name = "FLAGS"; break;
1220 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1221 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1222 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1223 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1224 case DT_MOVEENT: name = "MOVEENT"; break;
1225 case DT_MOVESZ: name = "MOVESZ"; break;
1226 case DT_FEATURE: name = "FEATURE"; break;
1227 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1228 case DT_SYMINSZ: name = "SYMINSZ"; break;
1229 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1230 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1231 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1232 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1233 case DT_PLTPAD: name = "PLTPAD"; break;
1234 case DT_MOVETAB: name = "MOVETAB"; break;
1235 case DT_SYMINFO: name = "SYMINFO"; break;
1236 case DT_RELACOUNT: name = "RELACOUNT"; break;
1237 case DT_RELCOUNT: name = "RELCOUNT"; break;
1238 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1239 case DT_VERSYM: name = "VERSYM"; break;
1240 case DT_VERDEF: name = "VERDEF"; break;
1241 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1242 case DT_VERNEED: name = "VERNEED"; break;
1243 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1244 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1245 case DT_USED: name = "USED"; break;
b34976b6 1246 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1247 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1248 }
1249
ad9563d6 1250 fprintf (f, " %-20s ", name);
252b5132 1251 if (! stringp)
a1f3c56e
AN
1252 {
1253 fprintf (f, "0x");
1254 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1255 }
252b5132
RH
1256 else
1257 {
1258 const char *string;
dc810e39 1259 unsigned int tagv = dyn.d_un.d_val;
252b5132 1260
dc810e39 1261 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1262 if (string == NULL)
1263 goto error_return;
1264 fprintf (f, "%s", string);
1265 }
1266 fprintf (f, "\n");
1267 }
1268
1269 free (dynbuf);
1270 dynbuf = NULL;
1271 }
1272
1273 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1274 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1275 {
fc0e6df6 1276 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1277 return FALSE;
252b5132
RH
1278 }
1279
1280 if (elf_dynverdef (abfd) != 0)
1281 {
1282 Elf_Internal_Verdef *t;
1283
1284 fprintf (f, _("\nVersion definitions:\n"));
1285 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1286 {
1287 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1288 t->vd_flags, t->vd_hash,
1289 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1290 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1291 {
1292 Elf_Internal_Verdaux *a;
1293
1294 fprintf (f, "\t");
1295 for (a = t->vd_auxptr->vda_nextptr;
1296 a != NULL;
1297 a = a->vda_nextptr)
d0fb9a8d
JJ
1298 fprintf (f, "%s ",
1299 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1300 fprintf (f, "\n");
1301 }
1302 }
1303 }
1304
1305 if (elf_dynverref (abfd) != 0)
1306 {
1307 Elf_Internal_Verneed *t;
1308
1309 fprintf (f, _("\nVersion References:\n"));
1310 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1311 {
1312 Elf_Internal_Vernaux *a;
1313
d0fb9a8d
JJ
1314 fprintf (f, _(" required from %s:\n"),
1315 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1316 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1317 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1318 a->vna_flags, a->vna_other,
1319 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1320 }
1321 }
1322
b34976b6 1323 return TRUE;
252b5132
RH
1324
1325 error_return:
1326 if (dynbuf != NULL)
1327 free (dynbuf);
b34976b6 1328 return FALSE;
252b5132
RH
1329}
1330
1331/* Display ELF-specific fields of a symbol. */
1332
1333void
217aa764
AM
1334bfd_elf_print_symbol (bfd *abfd,
1335 void *filep,
1336 asymbol *symbol,
1337 bfd_print_symbol_type how)
252b5132 1338{
a50b1753 1339 FILE *file = (FILE *) filep;
252b5132
RH
1340 switch (how)
1341 {
1342 case bfd_print_symbol_name:
1343 fprintf (file, "%s", symbol->name);
1344 break;
1345 case bfd_print_symbol_more:
1346 fprintf (file, "elf ");
60b89a18 1347 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1348 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1349 break;
1350 case bfd_print_symbol_all:
1351 {
4e8a9624
AM
1352 const char *section_name;
1353 const char *name = NULL;
9c5bfbb7 1354 const struct elf_backend_data *bed;
7a13edea 1355 unsigned char st_other;
dbb410c3 1356 bfd_vma val;
c044fabd 1357
252b5132 1358 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1359
1360 bed = get_elf_backend_data (abfd);
1361 if (bed->elf_backend_print_symbol_all)
c044fabd 1362 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1363
1364 if (name == NULL)
1365 {
7ee38065 1366 name = symbol->name;
217aa764 1367 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1368 }
1369
252b5132
RH
1370 fprintf (file, " %s\t", section_name);
1371 /* Print the "other" value for a symbol. For common symbols,
1372 we've already printed the size; now print the alignment.
1373 For other symbols, we have no specified alignment, and
1374 we've printed the address; now print the size. */
dcf6c779 1375 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1376 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1377 else
1378 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1379 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1380
1381 /* If we have version information, print it. */
1382 if (elf_tdata (abfd)->dynversym_section != 0
1383 && (elf_tdata (abfd)->dynverdef_section != 0
1384 || elf_tdata (abfd)->dynverref_section != 0))
1385 {
1386 unsigned int vernum;
1387 const char *version_string;
1388
1389 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1390
1391 if (vernum == 0)
1392 version_string = "";
1393 else if (vernum == 1)
1394 version_string = "Base";
1395 else if (vernum <= elf_tdata (abfd)->cverdefs)
1396 version_string =
1397 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1398 else
1399 {
1400 Elf_Internal_Verneed *t;
1401
1402 version_string = "";
1403 for (t = elf_tdata (abfd)->verref;
1404 t != NULL;
1405 t = t->vn_nextref)
1406 {
1407 Elf_Internal_Vernaux *a;
1408
1409 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1410 {
1411 if (a->vna_other == vernum)
1412 {
1413 version_string = a->vna_nodename;
1414 break;
1415 }
1416 }
1417 }
1418 }
1419
1420 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1421 fprintf (file, " %-11s", version_string);
1422 else
1423 {
1424 int i;
1425
1426 fprintf (file, " (%s)", version_string);
1427 for (i = 10 - strlen (version_string); i > 0; --i)
1428 putc (' ', file);
1429 }
1430 }
1431
1432 /* If the st_other field is not zero, print it. */
7a13edea 1433 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1434
7a13edea
NC
1435 switch (st_other)
1436 {
1437 case 0: break;
1438 case STV_INTERNAL: fprintf (file, " .internal"); break;
1439 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1440 case STV_PROTECTED: fprintf (file, " .protected"); break;
1441 default:
1442 /* Some other non-defined flags are also present, so print
1443 everything hex. */
1444 fprintf (file, " 0x%02x", (unsigned int) st_other);
1445 }
252b5132 1446
587ff49e 1447 fprintf (file, " %s", name);
252b5132
RH
1448 }
1449 break;
1450 }
1451}
252b5132 1452
252b5132
RH
1453/* Allocate an ELF string table--force the first byte to be zero. */
1454
1455struct bfd_strtab_hash *
217aa764 1456_bfd_elf_stringtab_init (void)
252b5132
RH
1457{
1458 struct bfd_strtab_hash *ret;
1459
1460 ret = _bfd_stringtab_init ();
1461 if (ret != NULL)
1462 {
1463 bfd_size_type loc;
1464
b34976b6 1465 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1466 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1467 if (loc == (bfd_size_type) -1)
1468 {
1469 _bfd_stringtab_free (ret);
1470 ret = NULL;
1471 }
1472 }
1473 return ret;
1474}
1475\f
1476/* ELF .o/exec file reading */
1477
c044fabd 1478/* Create a new bfd section from an ELF section header. */
252b5132 1479
b34976b6 1480bfd_boolean
217aa764 1481bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1482{
4fbb74a6
AM
1483 Elf_Internal_Shdr *hdr;
1484 Elf_Internal_Ehdr *ehdr;
1485 const struct elf_backend_data *bed;
90937f86 1486 const char *name;
252b5132 1487
4fbb74a6
AM
1488 if (shindex >= elf_numsections (abfd))
1489 return FALSE;
1490
1491 hdr = elf_elfsections (abfd)[shindex];
1492 ehdr = elf_elfheader (abfd);
1493 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1494 hdr->sh_name);
933d961a
JJ
1495 if (name == NULL)
1496 return FALSE;
252b5132 1497
4fbb74a6 1498 bed = get_elf_backend_data (abfd);
252b5132
RH
1499 switch (hdr->sh_type)
1500 {
1501 case SHT_NULL:
1502 /* Inactive section. Throw it away. */
b34976b6 1503 return TRUE;
252b5132
RH
1504
1505 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1506 case SHT_NOBITS: /* .bss section. */
1507 case SHT_HASH: /* .hash section. */
1508 case SHT_NOTE: /* .note section. */
25e27870
L
1509 case SHT_INIT_ARRAY: /* .init_array section. */
1510 case SHT_FINI_ARRAY: /* .fini_array section. */
1511 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1512 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1513 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1514 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1515
797fc050 1516 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1517 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1518 return FALSE;
cfcac11d
NC
1519 if (hdr->sh_link > elf_numsections (abfd))
1520 {
caa83f8b 1521 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1522 field set to SHN_BEFORE or SHN_AFTER. */
1523 switch (bfd_get_arch (abfd))
1524 {
caa83f8b 1525 case bfd_arch_i386:
cfcac11d
NC
1526 case bfd_arch_sparc:
1527 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1528 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1529 break;
1530 /* Otherwise fall through. */
1531 default:
1532 return FALSE;
1533 }
1534 }
1535 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
8e0ed13f 1536 return FALSE;
cfcac11d 1537 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1538 {
1539 Elf_Internal_Shdr *dynsymhdr;
1540
1541 /* The shared libraries distributed with hpux11 have a bogus
1542 sh_link field for the ".dynamic" section. Find the
1543 string table for the ".dynsym" section instead. */
1544 if (elf_dynsymtab (abfd) != 0)
1545 {
1546 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1547 hdr->sh_link = dynsymhdr->sh_link;
1548 }
1549 else
1550 {
1551 unsigned int i, num_sec;
1552
1553 num_sec = elf_numsections (abfd);
1554 for (i = 1; i < num_sec; i++)
1555 {
1556 dynsymhdr = elf_elfsections (abfd)[i];
1557 if (dynsymhdr->sh_type == SHT_DYNSYM)
1558 {
1559 hdr->sh_link = dynsymhdr->sh_link;
1560 break;
1561 }
1562 }
1563 }
1564 }
1565 break;
1566
252b5132
RH
1567 case SHT_SYMTAB: /* A symbol table */
1568 if (elf_onesymtab (abfd) == shindex)
b34976b6 1569 return TRUE;
252b5132 1570
a50b2160
JJ
1571 if (hdr->sh_entsize != bed->s->sizeof_sym)
1572 return FALSE;
3337c1e5
AM
1573 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1574 return FALSE;
252b5132
RH
1575 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1576 elf_onesymtab (abfd) = shindex;
1577 elf_tdata (abfd)->symtab_hdr = *hdr;
1578 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1579 abfd->flags |= HAS_SYMS;
1580
1581 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1582 SHF_ALLOC is set, and this is a shared object, then we also
1583 treat this section as a BFD section. We can not base the
1584 decision purely on SHF_ALLOC, because that flag is sometimes
1585 set in a relocatable object file, which would confuse the
1586 linker. */
252b5132
RH
1587 if ((hdr->sh_flags & SHF_ALLOC) != 0
1588 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1589 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1590 shindex))
b34976b6 1591 return FALSE;
252b5132 1592
1b3a8575
AM
1593 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1594 can't read symbols without that section loaded as well. It
1595 is most likely specified by the next section header. */
1596 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1597 {
1598 unsigned int i, num_sec;
1599
1600 num_sec = elf_numsections (abfd);
1601 for (i = shindex + 1; i < num_sec; i++)
1602 {
1603 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1604 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1605 && hdr2->sh_link == shindex)
1606 break;
1607 }
1608 if (i == num_sec)
1609 for (i = 1; i < shindex; i++)
1610 {
1611 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1612 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1613 && hdr2->sh_link == shindex)
1614 break;
1615 }
1616 if (i != shindex)
1617 return bfd_section_from_shdr (abfd, i);
1618 }
b34976b6 1619 return TRUE;
252b5132
RH
1620
1621 case SHT_DYNSYM: /* A dynamic symbol table */
1622 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1623 return TRUE;
252b5132 1624
a50b2160
JJ
1625 if (hdr->sh_entsize != bed->s->sizeof_sym)
1626 return FALSE;
252b5132
RH
1627 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1628 elf_dynsymtab (abfd) = shindex;
1629 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1630 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1631 abfd->flags |= HAS_SYMS;
1632
1633 /* Besides being a symbol table, we also treat this as a regular
1634 section, so that objcopy can handle it. */
6dc132d9 1635 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1636
9ad5cbcf
AM
1637 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1638 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1639 return TRUE;
9ad5cbcf 1640
1b3a8575 1641 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1642 elf_symtab_shndx (abfd) = shindex;
1643 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1644 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1645 return TRUE;
9ad5cbcf 1646
252b5132
RH
1647 case SHT_STRTAB: /* A string table */
1648 if (hdr->bfd_section != NULL)
b34976b6 1649 return TRUE;
252b5132
RH
1650 if (ehdr->e_shstrndx == shindex)
1651 {
1652 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1653 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1654 return TRUE;
252b5132 1655 }
1b3a8575
AM
1656 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1657 {
1658 symtab_strtab:
1659 elf_tdata (abfd)->strtab_hdr = *hdr;
1660 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1661 return TRUE;
1662 }
1663 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1664 {
1665 dynsymtab_strtab:
1666 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1667 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1668 elf_elfsections (abfd)[shindex] = hdr;
1669 /* We also treat this as a regular section, so that objcopy
1670 can handle it. */
6dc132d9
L
1671 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1672 shindex);
1b3a8575 1673 }
252b5132 1674
1b3a8575
AM
1675 /* If the string table isn't one of the above, then treat it as a
1676 regular section. We need to scan all the headers to be sure,
1677 just in case this strtab section appeared before the above. */
1678 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1679 {
1680 unsigned int i, num_sec;
252b5132 1681
1b3a8575
AM
1682 num_sec = elf_numsections (abfd);
1683 for (i = 1; i < num_sec; i++)
1684 {
1685 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1686 if (hdr2->sh_link == shindex)
1687 {
933d961a
JJ
1688 /* Prevent endless recursion on broken objects. */
1689 if (i == shindex)
1690 return FALSE;
1b3a8575
AM
1691 if (! bfd_section_from_shdr (abfd, i))
1692 return FALSE;
1693 if (elf_onesymtab (abfd) == i)
1694 goto symtab_strtab;
1695 if (elf_dynsymtab (abfd) == i)
1696 goto dynsymtab_strtab;
1697 }
1698 }
1699 }
6dc132d9 1700 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1701
1702 case SHT_REL:
1703 case SHT_RELA:
1704 /* *These* do a lot of work -- but build no sections! */
1705 {
1706 asection *target_sect;
1707 Elf_Internal_Shdr *hdr2;
9ad5cbcf 1708 unsigned int num_sec = elf_numsections (abfd);
252b5132 1709
aa2ca951
JJ
1710 if (hdr->sh_entsize
1711 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1712 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1713 return FALSE;
1714
03ae5f59 1715 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1716 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1717 {
1718 ((*_bfd_error_handler)
d003868e
AM
1719 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1720 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1721 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1722 shindex);
03ae5f59
ILT
1723 }
1724
252b5132
RH
1725 /* For some incomprehensible reason Oracle distributes
1726 libraries for Solaris in which some of the objects have
1727 bogus sh_link fields. It would be nice if we could just
1728 reject them, but, unfortunately, some people need to use
1729 them. We scan through the section headers; if we find only
1730 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1731 to it. I hope this doesn't break anything.
1732
1733 Don't do it on executable nor shared library. */
1734 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1735 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1736 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1737 {
9ad5cbcf 1738 unsigned int scan;
252b5132
RH
1739 int found;
1740
1741 found = 0;
9ad5cbcf 1742 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1743 {
1744 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1745 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1746 {
1747 if (found != 0)
1748 {
1749 found = 0;
1750 break;
1751 }
1752 found = scan;
1753 }
1754 }
1755 if (found != 0)
1756 hdr->sh_link = found;
1757 }
1758
1759 /* Get the symbol table. */
1b3a8575
AM
1760 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1761 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1762 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1763 return FALSE;
252b5132
RH
1764
1765 /* If this reloc section does not use the main symbol table we
1766 don't treat it as a reloc section. BFD can't adequately
1767 represent such a section, so at least for now, we don't
c044fabd 1768 try. We just present it as a normal section. We also
60bcf0fa 1769 can't use it as a reloc section if it points to the null
83b89087
L
1770 section, an invalid section, another reloc section, or its
1771 sh_link points to the null section. */
185ef66d 1772 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1773 || hdr->sh_link == SHN_UNDEF
185ef66d 1774 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1775 || hdr->sh_info >= num_sec
1776 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1777 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1778 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1779 shindex);
252b5132
RH
1780
1781 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1782 return FALSE;
252b5132
RH
1783 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1784 if (target_sect == NULL)
b34976b6 1785 return FALSE;
252b5132
RH
1786
1787 if ((target_sect->flags & SEC_RELOC) == 0
1788 || target_sect->reloc_count == 0)
1789 hdr2 = &elf_section_data (target_sect)->rel_hdr;
1790 else
1791 {
dc810e39 1792 bfd_size_type amt;
252b5132 1793 BFD_ASSERT (elf_section_data (target_sect)->rel_hdr2 == NULL);
dc810e39 1794 amt = sizeof (*hdr2);
a50b1753 1795 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
14b1c01e
AM
1796 if (hdr2 == NULL)
1797 return FALSE;
252b5132
RH
1798 elf_section_data (target_sect)->rel_hdr2 = hdr2;
1799 }
1800 *hdr2 = *hdr;
1801 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1802 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1803 target_sect->flags |= SEC_RELOC;
1804 target_sect->relocation = NULL;
1805 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1806 /* In the section to which the relocations apply, mark whether
1807 its relocations are of the REL or RELA variety. */
72730e0c 1808 if (hdr->sh_size != 0)
68bfbfcc 1809 target_sect->use_rela_p = hdr->sh_type == SHT_RELA;
252b5132 1810 abfd->flags |= HAS_RELOC;
b34976b6 1811 return TRUE;
252b5132 1812 }
252b5132
RH
1813
1814 case SHT_GNU_verdef:
1815 elf_dynverdef (abfd) = shindex;
1816 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1817 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1818
1819 case SHT_GNU_versym:
a50b2160
JJ
1820 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1821 return FALSE;
252b5132
RH
1822 elf_dynversym (abfd) = shindex;
1823 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1824 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1825
1826 case SHT_GNU_verneed:
1827 elf_dynverref (abfd) = shindex;
1828 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1829 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1830
1831 case SHT_SHLIB:
b34976b6 1832 return TRUE;
252b5132 1833
dbb410c3 1834 case SHT_GROUP:
1783205a 1835 if (! IS_VALID_GROUP_SECTION_HEADER (hdr))
a50b2160 1836 return FALSE;
6dc132d9 1837 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1838 return FALSE;
dbb410c3
AM
1839 if (hdr->contents != NULL)
1840 {
1841 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1842 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1843 asection *s;
1844
b885599b
AM
1845 if (idx->flags & GRP_COMDAT)
1846 hdr->bfd_section->flags
1847 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1848
45c5e9ed
L
1849 /* We try to keep the same section order as it comes in. */
1850 idx += n_elt;
dbb410c3 1851 while (--n_elt != 0)
1783205a
NC
1852 {
1853 --idx;
1854
1855 if (idx->shdr != NULL
1856 && (s = idx->shdr->bfd_section) != NULL
1857 && elf_next_in_group (s) != NULL)
1858 {
1859 elf_next_in_group (hdr->bfd_section) = s;
1860 break;
1861 }
1862 }
dbb410c3
AM
1863 }
1864 break;
1865
252b5132 1866 default:
104d59d1
JM
1867 /* Possibly an attributes section. */
1868 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1869 || hdr->sh_type == bed->obj_attrs_section_type)
1870 {
1871 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1872 return FALSE;
1873 _bfd_elf_parse_attributes (abfd, hdr);
1874 return TRUE;
1875 }
1876
252b5132 1877 /* Check for any processor-specific section types. */
3eb70a79
L
1878 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1879 return TRUE;
1880
1881 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1882 {
1883 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1884 /* FIXME: How to properly handle allocated section reserved
1885 for applications? */
1886 (*_bfd_error_handler)
1887 (_("%B: don't know how to handle allocated, application "
1888 "specific section `%s' [0x%8x]"),
1889 abfd, name, hdr->sh_type);
1890 else
1891 /* Allow sections reserved for applications. */
1892 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1893 shindex);
1894 }
1895 else if (hdr->sh_type >= SHT_LOPROC
1896 && hdr->sh_type <= SHT_HIPROC)
1897 /* FIXME: We should handle this section. */
1898 (*_bfd_error_handler)
1899 (_("%B: don't know how to handle processor specific section "
1900 "`%s' [0x%8x]"),
1901 abfd, name, hdr->sh_type);
1902 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
1903 {
1904 /* Unrecognised OS-specific sections. */
1905 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
1906 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 1907 required to correctly process the section and the file should
ff15b240
NC
1908 be rejected with an error message. */
1909 (*_bfd_error_handler)
1910 (_("%B: don't know how to handle OS specific section "
1911 "`%s' [0x%8x]"),
1912 abfd, name, hdr->sh_type);
1913 else
1914 /* Otherwise it should be processed. */
1915 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1916 }
3eb70a79
L
1917 else
1918 /* FIXME: We should handle this section. */
1919 (*_bfd_error_handler)
1920 (_("%B: don't know how to handle section `%s' [0x%8x]"),
1921 abfd, name, hdr->sh_type);
1922
1923 return FALSE;
252b5132
RH
1924 }
1925
b34976b6 1926 return TRUE;
252b5132
RH
1927}
1928
87d72d41 1929/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 1930
87d72d41
AM
1931Elf_Internal_Sym *
1932bfd_sym_from_r_symndx (struct sym_cache *cache,
1933 bfd *abfd,
1934 unsigned long r_symndx)
ec338859 1935{
ec338859
AM
1936 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
1937
a5d1b3b5
AM
1938 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
1939 {
1940 Elf_Internal_Shdr *symtab_hdr;
1941 unsigned char esym[sizeof (Elf64_External_Sym)];
1942 Elf_External_Sym_Shndx eshndx;
ec338859 1943
a5d1b3b5
AM
1944 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1945 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 1946 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 1947 return NULL;
9ad5cbcf 1948
a5d1b3b5
AM
1949 if (cache->abfd != abfd)
1950 {
1951 memset (cache->indx, -1, sizeof (cache->indx));
1952 cache->abfd = abfd;
1953 }
1954 cache->indx[ent] = r_symndx;
ec338859 1955 }
a5d1b3b5 1956
87d72d41 1957 return &cache->sym[ent];
ec338859
AM
1958}
1959
252b5132
RH
1960/* Given an ELF section number, retrieve the corresponding BFD
1961 section. */
1962
1963asection *
91d6fa6a 1964bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 1965{
91d6fa6a 1966 if (sec_index >= elf_numsections (abfd))
252b5132 1967 return NULL;
91d6fa6a 1968 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
1969}
1970
b35d266b 1971static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 1972{
0112cd26
NC
1973 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1974 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1975};
1976
b35d266b 1977static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 1978{
0112cd26
NC
1979 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
1980 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1981};
1982
b35d266b 1983static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 1984{
0112cd26
NC
1985 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1986 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1987 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
1988 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
1989 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
1990 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
1991 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
1992 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
1993 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
1994 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
1995 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1996};
1997
b35d266b 1998static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 1999{
0112cd26
NC
2000 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2001 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2002 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2003};
2004
b35d266b 2005static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2006{
0112cd26
NC
2007 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2008 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2009 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2010 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2011 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2012 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2013 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2014 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2015 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2016};
2017
b35d266b 2018static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2019{
0112cd26
NC
2020 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2021 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2022};
2023
b35d266b 2024static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2025{
0112cd26
NC
2026 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2027 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2028 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2029 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2030};
2031
b35d266b 2032static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2033{
0112cd26
NC
2034 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2035 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2036};
2037
b35d266b 2038static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2039{
0112cd26
NC
2040 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2041 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2042 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2043};
2044
b35d266b 2045static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2046{
0112cd26
NC
2047 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2048 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2049 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2050};
2051
b35d266b 2052static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2053{
0112cd26
NC
2054 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2055 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2056 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2057 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2058 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2059};
2060
b35d266b 2061static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2062{
0112cd26
NC
2063 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2064 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2065 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2066 /* See struct bfd_elf_special_section declaration for the semantics of
2067 this special case where .prefix_length != strlen (.prefix). */
2068 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2069 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2070};
2071
b35d266b 2072static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2073{
0112cd26
NC
2074 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2075 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2076 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2077 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2078};
2079
1b315056
CS
2080static const struct bfd_elf_special_section special_sections_z[] =
2081{
2082 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2083 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2084 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2085 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2086 { NULL, 0, 0, 0, 0 }
2087};
2088
b35d266b 2089static const struct bfd_elf_special_section *special_sections[] =
7f4d3958 2090{
7f4d3958 2091 special_sections_b, /* 'b' */
98ece1b3 2092 special_sections_c, /* 'c' */
7f4d3958
L
2093 special_sections_d, /* 'd' */
2094 NULL, /* 'e' */
2095 special_sections_f, /* 'f' */
2096 special_sections_g, /* 'g' */
2097 special_sections_h, /* 'h' */
2098 special_sections_i, /* 'i' */
2099 NULL, /* 'j' */
2100 NULL, /* 'k' */
2101 special_sections_l, /* 'l' */
2102 NULL, /* 'm' */
2103 special_sections_n, /* 'n' */
2104 NULL, /* 'o' */
2105 special_sections_p, /* 'p' */
2106 NULL, /* 'q' */
2107 special_sections_r, /* 'r' */
2108 special_sections_s, /* 's' */
2109 special_sections_t, /* 't' */
1b315056
CS
2110 NULL, /* 'u' */
2111 NULL, /* 'v' */
2112 NULL, /* 'w' */
2113 NULL, /* 'x' */
2114 NULL, /* 'y' */
2115 special_sections_z /* 'z' */
7f4d3958
L
2116};
2117
551b43fd
AM
2118const struct bfd_elf_special_section *
2119_bfd_elf_get_special_section (const char *name,
2120 const struct bfd_elf_special_section *spec,
2121 unsigned int rela)
2f89ff8d
L
2122{
2123 int i;
7f4d3958 2124 int len;
7f4d3958 2125
551b43fd 2126 len = strlen (name);
7f4d3958 2127
551b43fd 2128 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2129 {
2130 int suffix_len;
551b43fd 2131 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2132
2133 if (len < prefix_len)
2134 continue;
551b43fd 2135 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2136 continue;
2137
551b43fd 2138 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2139 if (suffix_len <= 0)
2140 {
2141 if (name[prefix_len] != 0)
2142 {
2143 if (suffix_len == 0)
2144 continue;
2145 if (name[prefix_len] != '.'
2146 && (suffix_len == -2
551b43fd 2147 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2148 continue;
2149 }
2150 }
2151 else
2152 {
2153 if (len < prefix_len + suffix_len)
2154 continue;
2155 if (memcmp (name + len - suffix_len,
551b43fd 2156 spec[i].prefix + prefix_len,
7dcb9820
AM
2157 suffix_len) != 0)
2158 continue;
2159 }
551b43fd 2160 return &spec[i];
7dcb9820 2161 }
2f89ff8d
L
2162
2163 return NULL;
2164}
2165
7dcb9820 2166const struct bfd_elf_special_section *
29ef7005 2167_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2168{
551b43fd
AM
2169 int i;
2170 const struct bfd_elf_special_section *spec;
29ef7005 2171 const struct elf_backend_data *bed;
2f89ff8d
L
2172
2173 /* See if this is one of the special sections. */
551b43fd
AM
2174 if (sec->name == NULL)
2175 return NULL;
2f89ff8d 2176
29ef7005
L
2177 bed = get_elf_backend_data (abfd);
2178 spec = bed->special_sections;
2179 if (spec)
2180 {
2181 spec = _bfd_elf_get_special_section (sec->name,
2182 bed->special_sections,
2183 sec->use_rela_p);
2184 if (spec != NULL)
2185 return spec;
2186 }
2187
551b43fd
AM
2188 if (sec->name[0] != '.')
2189 return NULL;
2f89ff8d 2190
551b43fd 2191 i = sec->name[1] - 'b';
1b315056 2192 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2193 return NULL;
2194
2195 spec = special_sections[i];
2f89ff8d 2196
551b43fd
AM
2197 if (spec == NULL)
2198 return NULL;
2199
2200 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2201}
2202
b34976b6 2203bfd_boolean
217aa764 2204_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2205{
2206 struct bfd_elf_section_data *sdata;
551b43fd 2207 const struct elf_backend_data *bed;
7dcb9820 2208 const struct bfd_elf_special_section *ssect;
252b5132 2209
f0abc2a1
AM
2210 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2211 if (sdata == NULL)
2212 {
a50b1753
NC
2213 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2214 sizeof (*sdata));
f0abc2a1
AM
2215 if (sdata == NULL)
2216 return FALSE;
217aa764 2217 sec->used_by_bfd = sdata;
f0abc2a1 2218 }
bf572ba0 2219
551b43fd
AM
2220 /* Indicate whether or not this section should use RELA relocations. */
2221 bed = get_elf_backend_data (abfd);
2222 sec->use_rela_p = bed->default_use_rela_p;
2223
e843e0f8
L
2224 /* When we read a file, we don't need to set ELF section type and
2225 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2226 anyway. We will set ELF section type and flags for all linker
2227 created sections. If user specifies BFD section flags, we will
2228 set ELF section type and flags based on BFD section flags in
2229 elf_fake_sections. */
2230 if ((!sec->flags && abfd->direction != read_direction)
3496cb2a 2231 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2232 {
551b43fd 2233 ssect = (*bed->get_sec_type_attr) (abfd, sec);
a31501e9
L
2234 if (ssect != NULL)
2235 {
2236 elf_section_type (sec) = ssect->type;
2237 elf_section_flags (sec) = ssect->attr;
2238 }
2f89ff8d
L
2239 }
2240
f592407e 2241 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2242}
2243
2244/* Create a new bfd section from an ELF program header.
2245
2246 Since program segments have no names, we generate a synthetic name
2247 of the form segment<NUM>, where NUM is generally the index in the
2248 program header table. For segments that are split (see below) we
2249 generate the names segment<NUM>a and segment<NUM>b.
2250
2251 Note that some program segments may have a file size that is different than
2252 (less than) the memory size. All this means is that at execution the
2253 system must allocate the amount of memory specified by the memory size,
2254 but only initialize it with the first "file size" bytes read from the
2255 file. This would occur for example, with program segments consisting
2256 of combined data+bss.
2257
2258 To handle the above situation, this routine generates TWO bfd sections
2259 for the single program segment. The first has the length specified by
2260 the file size of the segment, and the second has the length specified
2261 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2262 into its initialized and uninitialized parts.
252b5132
RH
2263
2264 */
2265
b34976b6 2266bfd_boolean
217aa764
AM
2267_bfd_elf_make_section_from_phdr (bfd *abfd,
2268 Elf_Internal_Phdr *hdr,
91d6fa6a 2269 int hdr_index,
a50b1753 2270 const char *type_name)
252b5132
RH
2271{
2272 asection *newsect;
2273 char *name;
2274 char namebuf[64];
d4c88bbb 2275 size_t len;
252b5132
RH
2276 int split;
2277
2278 split = ((hdr->p_memsz > 0)
2279 && (hdr->p_filesz > 0)
2280 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2281
2282 if (hdr->p_filesz > 0)
252b5132 2283 {
91d6fa6a 2284 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2285 len = strlen (namebuf) + 1;
a50b1753 2286 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2287 if (!name)
2288 return FALSE;
2289 memcpy (name, namebuf, len);
2290 newsect = bfd_make_section (abfd, name);
2291 if (newsect == NULL)
2292 return FALSE;
2293 newsect->vma = hdr->p_vaddr;
2294 newsect->lma = hdr->p_paddr;
2295 newsect->size = hdr->p_filesz;
2296 newsect->filepos = hdr->p_offset;
2297 newsect->flags |= SEC_HAS_CONTENTS;
2298 newsect->alignment_power = bfd_log2 (hdr->p_align);
2299 if (hdr->p_type == PT_LOAD)
252b5132 2300 {
d5191d0c
AM
2301 newsect->flags |= SEC_ALLOC;
2302 newsect->flags |= SEC_LOAD;
2303 if (hdr->p_flags & PF_X)
2304 {
2305 /* FIXME: all we known is that it has execute PERMISSION,
2306 may be data. */
2307 newsect->flags |= SEC_CODE;
2308 }
2309 }
2310 if (!(hdr->p_flags & PF_W))
2311 {
2312 newsect->flags |= SEC_READONLY;
252b5132 2313 }
252b5132
RH
2314 }
2315
d5191d0c 2316 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2317 {
d5191d0c
AM
2318 bfd_vma align;
2319
91d6fa6a 2320 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2321 len = strlen (namebuf) + 1;
a50b1753 2322 name = (char *) bfd_alloc (abfd, len);
252b5132 2323 if (!name)
b34976b6 2324 return FALSE;
d4c88bbb 2325 memcpy (name, namebuf, len);
252b5132
RH
2326 newsect = bfd_make_section (abfd, name);
2327 if (newsect == NULL)
b34976b6 2328 return FALSE;
252b5132
RH
2329 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2330 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2331 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2332 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2333 align = newsect->vma & -newsect->vma;
2334 if (align == 0 || align > hdr->p_align)
2335 align = hdr->p_align;
2336 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2337 if (hdr->p_type == PT_LOAD)
2338 {
d5191d0c
AM
2339 /* Hack for gdb. Segments that have not been modified do
2340 not have their contents written to a core file, on the
2341 assumption that a debugger can find the contents in the
2342 executable. We flag this case by setting the fake
2343 section size to zero. Note that "real" bss sections will
2344 always have their contents dumped to the core file. */
2345 if (bfd_get_format (abfd) == bfd_core)
2346 newsect->size = 0;
252b5132
RH
2347 newsect->flags |= SEC_ALLOC;
2348 if (hdr->p_flags & PF_X)
2349 newsect->flags |= SEC_CODE;
2350 }
2351 if (!(hdr->p_flags & PF_W))
2352 newsect->flags |= SEC_READONLY;
2353 }
2354
b34976b6 2355 return TRUE;
252b5132
RH
2356}
2357
b34976b6 2358bfd_boolean
91d6fa6a 2359bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2360{
9c5bfbb7 2361 const struct elf_backend_data *bed;
20cfcaae
NC
2362
2363 switch (hdr->p_type)
2364 {
2365 case PT_NULL:
91d6fa6a 2366 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2367
2368 case PT_LOAD:
91d6fa6a 2369 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2370
2371 case PT_DYNAMIC:
91d6fa6a 2372 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2373
2374 case PT_INTERP:
91d6fa6a 2375 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2376
2377 case PT_NOTE:
91d6fa6a 2378 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2379 return FALSE;
718175fa 2380 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2381 return FALSE;
2382 return TRUE;
20cfcaae
NC
2383
2384 case PT_SHLIB:
91d6fa6a 2385 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2386
2387 case PT_PHDR:
91d6fa6a 2388 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2389
811072d8 2390 case PT_GNU_EH_FRAME:
91d6fa6a 2391 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2392 "eh_frame_hdr");
2393
2b05f1b7 2394 case PT_GNU_STACK:
91d6fa6a 2395 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2396
8c37241b 2397 case PT_GNU_RELRO:
91d6fa6a 2398 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2399
20cfcaae 2400 default:
8c1acd09 2401 /* Check for any processor-specific program segment types. */
20cfcaae 2402 bed = get_elf_backend_data (abfd);
91d6fa6a 2403 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2404 }
2405}
2406
23bc299b 2407/* Initialize REL_HDR, the section-header for new section, containing
b34976b6 2408 relocations against ASECT. If USE_RELA_P is TRUE, we use RELA
23bc299b
MM
2409 relocations; otherwise, we use REL relocations. */
2410
b34976b6 2411bfd_boolean
217aa764
AM
2412_bfd_elf_init_reloc_shdr (bfd *abfd,
2413 Elf_Internal_Shdr *rel_hdr,
2414 asection *asect,
2415 bfd_boolean use_rela_p)
23bc299b
MM
2416{
2417 char *name;
9c5bfbb7 2418 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dc810e39 2419 bfd_size_type amt = sizeof ".rela" + strlen (asect->name);
23bc299b 2420
a50b1753 2421 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2422 if (name == NULL)
b34976b6 2423 return FALSE;
23bc299b
MM
2424 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2425 rel_hdr->sh_name =
2b0f7ef9 2426 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2427 FALSE);
23bc299b 2428 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2429 return FALSE;
23bc299b
MM
2430 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2431 rel_hdr->sh_entsize = (use_rela_p
2432 ? bed->s->sizeof_rela
2433 : bed->s->sizeof_rel);
72de5009 2434 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2435 rel_hdr->sh_flags = 0;
2436 rel_hdr->sh_addr = 0;
2437 rel_hdr->sh_size = 0;
2438 rel_hdr->sh_offset = 0;
2439
b34976b6 2440 return TRUE;
23bc299b
MM
2441}
2442
94be91de
JB
2443/* Return the default section type based on the passed in section flags. */
2444
2445int
2446bfd_elf_get_default_section_type (flagword flags)
2447{
2448 if ((flags & SEC_ALLOC) != 0
2449 && ((flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0
2450 || (flags & SEC_NEVER_LOAD) != 0))
2451 return SHT_NOBITS;
2452 return SHT_PROGBITS;
2453}
2454
252b5132
RH
2455/* Set up an ELF internal section header for a section. */
2456
252b5132 2457static void
217aa764 2458elf_fake_sections (bfd *abfd, asection *asect, void *failedptrarg)
252b5132 2459{
9c5bfbb7 2460 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
a50b1753 2461 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
252b5132 2462 Elf_Internal_Shdr *this_hdr;
0414f35b 2463 unsigned int sh_type;
252b5132
RH
2464
2465 if (*failedptr)
2466 {
2467 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2468 loop. */
252b5132
RH
2469 return;
2470 }
2471
2472 this_hdr = &elf_section_data (asect)->this_hdr;
2473
e57b5356
AM
2474 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2475 asect->name, FALSE);
2476 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2477 {
b34976b6 2478 *failedptr = TRUE;
252b5132
RH
2479 return;
2480 }
2481
a4d8e49b 2482 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2483
2484 if ((asect->flags & SEC_ALLOC) != 0
2485 || asect->user_set_vma)
2486 this_hdr->sh_addr = asect->vma;
2487 else
2488 this_hdr->sh_addr = 0;
2489
2490 this_hdr->sh_offset = 0;
eea6121a 2491 this_hdr->sh_size = asect->size;
252b5132 2492 this_hdr->sh_link = 0;
72de5009 2493 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2494 /* The sh_entsize and sh_info fields may have been set already by
2495 copy_private_section_data. */
2496
2497 this_hdr->bfd_section = asect;
2498 this_hdr->contents = NULL;
2499
3cddba1e
L
2500 /* If the section type is unspecified, we set it based on
2501 asect->flags. */
98ece1b3
AM
2502 if ((asect->flags & SEC_GROUP) != 0)
2503 sh_type = SHT_GROUP;
98ece1b3 2504 else
94be91de 2505 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2506
3cddba1e 2507 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2508 this_hdr->sh_type = sh_type;
2509 else if (this_hdr->sh_type == SHT_NOBITS
2510 && sh_type == SHT_PROGBITS
2511 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2512 {
98ece1b3
AM
2513 /* Warn if we are changing a NOBITS section to PROGBITS, but
2514 allow the link to proceed. This can happen when users link
2515 non-bss input sections to bss output sections, or emit data
2516 to a bss output section via a linker script. */
2517 (*_bfd_error_handler)
58f0869b 2518 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2519 this_hdr->sh_type = sh_type;
3cddba1e
L
2520 }
2521
2f89ff8d 2522 switch (this_hdr->sh_type)
252b5132 2523 {
2f89ff8d 2524 default:
2f89ff8d
L
2525 break;
2526
2527 case SHT_STRTAB:
2528 case SHT_INIT_ARRAY:
2529 case SHT_FINI_ARRAY:
2530 case SHT_PREINIT_ARRAY:
2531 case SHT_NOTE:
2532 case SHT_NOBITS:
2533 case SHT_PROGBITS:
2534 break;
2535
2536 case SHT_HASH:
c7ac6ff8 2537 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2538 break;
5de3bf90 2539
2f89ff8d 2540 case SHT_DYNSYM:
252b5132 2541 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2542 break;
2543
2544 case SHT_DYNAMIC:
252b5132 2545 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2546 break;
2547
2548 case SHT_RELA:
2549 if (get_elf_backend_data (abfd)->may_use_rela_p)
2550 this_hdr->sh_entsize = bed->s->sizeof_rela;
2551 break;
2552
2553 case SHT_REL:
2554 if (get_elf_backend_data (abfd)->may_use_rel_p)
2555 this_hdr->sh_entsize = bed->s->sizeof_rel;
2556 break;
2557
2558 case SHT_GNU_versym:
252b5132 2559 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2560 break;
2561
2562 case SHT_GNU_verdef:
252b5132
RH
2563 this_hdr->sh_entsize = 0;
2564 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2565 cverdefs. The linker will set cverdefs, but sh_info will be
2566 zero. */
252b5132
RH
2567 if (this_hdr->sh_info == 0)
2568 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2569 else
2570 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2571 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2572 break;
2573
2574 case SHT_GNU_verneed:
252b5132
RH
2575 this_hdr->sh_entsize = 0;
2576 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2577 cverrefs. The linker will set cverrefs, but sh_info will be
2578 zero. */
252b5132
RH
2579 if (this_hdr->sh_info == 0)
2580 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2581 else
2582 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2583 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2584 break;
2585
2586 case SHT_GROUP:
1783205a 2587 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2588 break;
fdc90cb4
JJ
2589
2590 case SHT_GNU_HASH:
2591 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2592 break;
dbb410c3 2593 }
252b5132
RH
2594
2595 if ((asect->flags & SEC_ALLOC) != 0)
2596 this_hdr->sh_flags |= SHF_ALLOC;
2597 if ((asect->flags & SEC_READONLY) == 0)
2598 this_hdr->sh_flags |= SHF_WRITE;
2599 if ((asect->flags & SEC_CODE) != 0)
2600 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2601 if ((asect->flags & SEC_MERGE) != 0)
2602 {
2603 this_hdr->sh_flags |= SHF_MERGE;
2604 this_hdr->sh_entsize = asect->entsize;
2605 if ((asect->flags & SEC_STRINGS) != 0)
2606 this_hdr->sh_flags |= SHF_STRINGS;
2607 }
1126897b 2608 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2609 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2610 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2611 {
2612 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2613 if (asect->size == 0
2614 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2615 {
3a800eb9 2616 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2617
704afa60 2618 this_hdr->sh_size = 0;
3a800eb9
AM
2619 if (o != NULL)
2620 {
704afa60 2621 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2622 if (this_hdr->sh_size != 0)
2623 this_hdr->sh_type = SHT_NOBITS;
2624 }
704afa60
JJ
2625 }
2626 }
252b5132
RH
2627
2628 /* Check for processor-specific section types. */
0414f35b 2629 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2630 if (bed->elf_backend_fake_sections
2631 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
b34976b6 2632 *failedptr = TRUE;
252b5132 2633
42bb2e33 2634 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2635 {
2636 /* Don't change the header type from NOBITS if we are being
42bb2e33 2637 called for objcopy --only-keep-debug. */
0414f35b
AM
2638 this_hdr->sh_type = sh_type;
2639 }
2640
252b5132 2641 /* If the section has relocs, set up a section header for the
23bc299b
MM
2642 SHT_REL[A] section. If two relocation sections are required for
2643 this section, it is up to the processor-specific back-end to
c044fabd 2644 create the other. */
23bc299b 2645 if ((asect->flags & SEC_RELOC) != 0
c044fabd 2646 && !_bfd_elf_init_reloc_shdr (abfd,
23bc299b 2647 &elf_section_data (asect)->rel_hdr,
c044fabd 2648 asect,
68bfbfcc 2649 asect->use_rela_p))
b34976b6 2650 *failedptr = TRUE;
252b5132
RH
2651}
2652
bcacc0f5
AM
2653/* Fill in the contents of a SHT_GROUP section. Called from
2654 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2655 when ELF targets use the generic linker, ld. Called for ld -r
2656 from bfd_elf_final_link. */
dbb410c3 2657
1126897b 2658void
217aa764 2659bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2660{
a50b1753 2661 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2662 asection *elt, *first;
dbb410c3 2663 unsigned char *loc;
b34976b6 2664 bfd_boolean gas;
dbb410c3 2665
7e4111ad
L
2666 /* Ignore linker created group section. See elfNN_ia64_object_p in
2667 elfxx-ia64.c. */
2668 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2669 || *failedptr)
2670 return;
2671
bcacc0f5
AM
2672 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2673 {
2674 unsigned long symindx = 0;
2675
2676 /* elf_group_id will have been set up by objcopy and the
2677 generic linker. */
2678 if (elf_group_id (sec) != NULL)
2679 symindx = elf_group_id (sec)->udata.i;
1126897b 2680
bcacc0f5
AM
2681 if (symindx == 0)
2682 {
2683 /* If called from the assembler, swap_out_syms will have set up
2684 elf_section_syms. */
2685 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2686 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2687 }
2688 elf_section_data (sec)->this_hdr.sh_info = symindx;
2689 }
2690 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2691 {
bcacc0f5
AM
2692 /* The ELF backend linker sets sh_info to -2 when the group
2693 signature symbol is global, and thus the index can't be
2694 set until all local symbols are output. */
2695 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2696 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2697 unsigned long symndx = sec_data->this_hdr.sh_info;
2698 unsigned long extsymoff = 0;
2699 struct elf_link_hash_entry *h;
2700
2701 if (!elf_bad_symtab (igroup->owner))
2702 {
2703 Elf_Internal_Shdr *symtab_hdr;
2704
2705 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2706 extsymoff = symtab_hdr->sh_info;
2707 }
2708 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2709 while (h->root.type == bfd_link_hash_indirect
2710 || h->root.type == bfd_link_hash_warning)
2711 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2712
2713 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2714 }
dbb410c3 2715
1126897b 2716 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2717 gas = TRUE;
dbb410c3
AM
2718 if (sec->contents == NULL)
2719 {
b34976b6 2720 gas = FALSE;
a50b1753 2721 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
2722
2723 /* Arrange for the section to be written out. */
2724 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2725 if (sec->contents == NULL)
2726 {
b34976b6 2727 *failedptr = TRUE;
dbb410c3
AM
2728 return;
2729 }
2730 }
2731
eea6121a 2732 loc = sec->contents + sec->size;
dbb410c3 2733
9dce4196
AM
2734 /* Get the pointer to the first section in the group that gas
2735 squirreled away here. objcopy arranges for this to be set to the
2736 start of the input section group. */
2737 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2738
2739 /* First element is a flag word. Rest of section is elf section
2740 indices for all the sections of the group. Write them backwards
2741 just to keep the group in the same order as given in .section
2742 directives, not that it matters. */
2743 while (elt != NULL)
2744 {
9dce4196
AM
2745 asection *s;
2746 unsigned int idx;
2747
9dce4196 2748 s = elt;
01e1a5bc
NC
2749 if (! elf_discarded_section (s))
2750 {
2751 loc -= 4;
2752 if (!gas)
2753 s = s->output_section;
2754 idx = 0;
2755 if (s != NULL)
2756 idx = elf_section_data (s)->this_idx;
2757 H_PUT_32 (abfd, idx, loc);
2758 }
945906ff 2759 elt = elf_next_in_group (elt);
9dce4196
AM
2760 if (elt == first)
2761 break;
dbb410c3
AM
2762 }
2763
3d7f7666 2764 if ((loc -= 4) != sec->contents)
9dce4196 2765 abort ();
dbb410c3 2766
9dce4196 2767 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2768}
2769
252b5132
RH
2770/* Assign all ELF section numbers. The dummy first section is handled here
2771 too. The link/info pointers for the standard section types are filled
2772 in here too, while we're at it. */
2773
b34976b6 2774static bfd_boolean
da9f89d4 2775assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2776{
2777 struct elf_obj_tdata *t = elf_tdata (abfd);
2778 asection *sec;
2b0f7ef9 2779 unsigned int section_number, secn;
252b5132 2780 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2781 struct bfd_elf_section_data *d;
3516e984 2782 bfd_boolean need_symtab;
252b5132
RH
2783
2784 section_number = 1;
2785
2b0f7ef9
JJ
2786 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2787
da9f89d4
L
2788 /* SHT_GROUP sections are in relocatable files only. */
2789 if (link_info == NULL || link_info->relocatable)
252b5132 2790 {
da9f89d4 2791 /* Put SHT_GROUP sections first. */
04dd1667 2792 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2793 {
5daa8fe7 2794 d = elf_section_data (sec);
da9f89d4
L
2795
2796 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2797 {
5daa8fe7 2798 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2799 {
2800 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2801 bfd_section_list_remove (abfd, sec);
da9f89d4 2802 abfd->section_count--;
da9f89d4 2803 }
08a40648 2804 else
4fbb74a6 2805 d->this_idx = section_number++;
da9f89d4 2806 }
47cc2cf5
PB
2807 }
2808 }
2809
2810 for (sec = abfd->sections; sec; sec = sec->next)
2811 {
2812 d = elf_section_data (sec);
2813
2814 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2815 d->this_idx = section_number++;
2b0f7ef9 2816 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
252b5132
RH
2817 if ((sec->flags & SEC_RELOC) == 0)
2818 d->rel_idx = 0;
2819 else
2b0f7ef9
JJ
2820 {
2821 d->rel_idx = section_number++;
2822 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr.sh_name);
2823 }
23bc299b
MM
2824
2825 if (d->rel_hdr2)
2b0f7ef9
JJ
2826 {
2827 d->rel_idx2 = section_number++;
2828 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel_hdr2->sh_name);
2829 }
23bc299b
MM
2830 else
2831 d->rel_idx2 = 0;
252b5132
RH
2832 }
2833
2834 t->shstrtab_section = section_number++;
2b0f7ef9 2835 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2836 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132 2837
3516e984
L
2838 need_symtab = (bfd_get_symcount (abfd) > 0
2839 || (link_info == NULL
2840 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2841 == HAS_RELOC)));
2842 if (need_symtab)
252b5132
RH
2843 {
2844 t->symtab_section = section_number++;
2b0f7ef9 2845 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 2846 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 2847 {
9ad5cbcf
AM
2848 t->symtab_shndx_section = section_number++;
2849 t->symtab_shndx_hdr.sh_name
2850 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 2851 ".symtab_shndx", FALSE);
9ad5cbcf 2852 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 2853 return FALSE;
9ad5cbcf 2854 }
252b5132 2855 t->strtab_section = section_number++;
2b0f7ef9 2856 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
2857 }
2858
2b0f7ef9
JJ
2859 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
2860 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
2861
2862 elf_numsections (abfd) = section_number;
252b5132
RH
2863 elf_elfheader (abfd)->e_shnum = section_number;
2864
2865 /* Set up the list of section header pointers, in agreement with the
2866 indices. */
a50b1753
NC
2867 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
2868 sizeof (Elf_Internal_Shdr *));
252b5132 2869 if (i_shdrp == NULL)
b34976b6 2870 return FALSE;
252b5132 2871
a50b1753
NC
2872 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
2873 sizeof (Elf_Internal_Shdr));
252b5132
RH
2874 if (i_shdrp[0] == NULL)
2875 {
2876 bfd_release (abfd, i_shdrp);
b34976b6 2877 return FALSE;
252b5132 2878 }
252b5132
RH
2879
2880 elf_elfsections (abfd) = i_shdrp;
2881
2882 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3516e984 2883 if (need_symtab)
252b5132
RH
2884 {
2885 i_shdrp[t->symtab_section] = &t->symtab_hdr;
4fbb74a6 2886 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf
AM
2887 {
2888 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
2889 t->symtab_shndx_hdr.sh_link = t->symtab_section;
2890 }
252b5132
RH
2891 i_shdrp[t->strtab_section] = &t->strtab_hdr;
2892 t->symtab_hdr.sh_link = t->strtab_section;
2893 }
38ce5b11 2894
252b5132
RH
2895 for (sec = abfd->sections; sec; sec = sec->next)
2896 {
252b5132
RH
2897 asection *s;
2898 const char *name;
2899
91d6fa6a
NC
2900 d = elf_section_data (sec);
2901
252b5132
RH
2902 i_shdrp[d->this_idx] = &d->this_hdr;
2903 if (d->rel_idx != 0)
2904 i_shdrp[d->rel_idx] = &d->rel_hdr;
23bc299b
MM
2905 if (d->rel_idx2 != 0)
2906 i_shdrp[d->rel_idx2] = d->rel_hdr2;
252b5132
RH
2907
2908 /* Fill in the sh_link and sh_info fields while we're at it. */
2909
2910 /* sh_link of a reloc section is the section index of the symbol
2911 table. sh_info is the section index of the section to which
2912 the relocation entries apply. */
2913 if (d->rel_idx != 0)
2914 {
2915 d->rel_hdr.sh_link = t->symtab_section;
2916 d->rel_hdr.sh_info = d->this_idx;
2917 }
23bc299b
MM
2918 if (d->rel_idx2 != 0)
2919 {
2920 d->rel_hdr2->sh_link = t->symtab_section;
2921 d->rel_hdr2->sh_info = d->this_idx;
2922 }
252b5132 2923
38ce5b11
L
2924 /* We need to set up sh_link for SHF_LINK_ORDER. */
2925 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
2926 {
2927 s = elf_linked_to_section (sec);
2928 if (s)
38ce5b11 2929 {
f2876037 2930 /* elf_linked_to_section points to the input section. */
ccd2ec6a 2931 if (link_info != NULL)
38ce5b11 2932 {
f2876037 2933 /* Check discarded linkonce section. */
ccd2ec6a 2934 if (elf_discarded_section (s))
38ce5b11 2935 {
ccd2ec6a
L
2936 asection *kept;
2937 (*_bfd_error_handler)
2938 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
2939 abfd, d->this_hdr.bfd_section,
2940 s, s->owner);
2941 /* Point to the kept section if it has the same
2942 size as the discarded one. */
c0f00686 2943 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 2944 if (kept == NULL)
185d09ad 2945 {
ccd2ec6a
L
2946 bfd_set_error (bfd_error_bad_value);
2947 return FALSE;
185d09ad 2948 }
ccd2ec6a 2949 s = kept;
38ce5b11 2950 }
e424ecc8 2951
ccd2ec6a
L
2952 s = s->output_section;
2953 BFD_ASSERT (s != NULL);
38ce5b11 2954 }
f2876037
L
2955 else
2956 {
2957 /* Handle objcopy. */
2958 if (s->output_section == NULL)
2959 {
2960 (*_bfd_error_handler)
2961 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
2962 abfd, d->this_hdr.bfd_section, s, s->owner);
2963 bfd_set_error (bfd_error_bad_value);
2964 return FALSE;
2965 }
2966 s = s->output_section;
2967 }
ccd2ec6a
L
2968 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2969 }
2970 else
2971 {
2972 /* PR 290:
2973 The Intel C compiler generates SHT_IA_64_UNWIND with
2974 SHF_LINK_ORDER. But it doesn't set the sh_link or
2975 sh_info fields. Hence we could get the situation
08a40648 2976 where s is NULL. */
ccd2ec6a
L
2977 const struct elf_backend_data *bed
2978 = get_elf_backend_data (abfd);
2979 if (bed->link_order_error_handler)
2980 bed->link_order_error_handler
2981 (_("%B: warning: sh_link not set for section `%A'"),
2982 abfd, sec);
38ce5b11
L
2983 }
2984 }
2985
252b5132
RH
2986 switch (d->this_hdr.sh_type)
2987 {
2988 case SHT_REL:
2989 case SHT_RELA:
2990 /* A reloc section which we are treating as a normal BFD
2991 section. sh_link is the section index of the symbol
2992 table. sh_info is the section index of the section to
2993 which the relocation entries apply. We assume that an
2994 allocated reloc section uses the dynamic symbol table.
2995 FIXME: How can we be sure? */
2996 s = bfd_get_section_by_name (abfd, ".dynsym");
2997 if (s != NULL)
2998 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
2999
3000 /* We look up the section the relocs apply to by name. */
3001 name = sec->name;
3002 if (d->this_hdr.sh_type == SHT_REL)
3003 name += 4;
3004 else
3005 name += 5;
3006 s = bfd_get_section_by_name (abfd, name);
3007 if (s != NULL)
3008 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3009 break;
3010
3011 case SHT_STRTAB:
3012 /* We assume that a section named .stab*str is a stabs
3013 string section. We look for a section with the same name
3014 but without the trailing ``str'', and set its sh_link
3015 field to point to this section. */
0112cd26 3016 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3017 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3018 {
3019 size_t len;
3020 char *alc;
3021
3022 len = strlen (sec->name);
a50b1753 3023 alc = (char *) bfd_malloc (len - 2);
252b5132 3024 if (alc == NULL)
b34976b6 3025 return FALSE;
d4c88bbb 3026 memcpy (alc, sec->name, len - 3);
252b5132
RH
3027 alc[len - 3] = '\0';
3028 s = bfd_get_section_by_name (abfd, alc);
3029 free (alc);
3030 if (s != NULL)
3031 {
3032 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3033
3034 /* This is a .stab section. */
0594c12d
AM
3035 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3036 elf_section_data (s)->this_hdr.sh_entsize
3037 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3038 }
3039 }
3040 break;
3041
3042 case SHT_DYNAMIC:
3043 case SHT_DYNSYM:
3044 case SHT_GNU_verneed:
3045 case SHT_GNU_verdef:
3046 /* sh_link is the section header index of the string table
3047 used for the dynamic entries, or the symbol table, or the
3048 version strings. */
3049 s = bfd_get_section_by_name (abfd, ".dynstr");
3050 if (s != NULL)
3051 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3052 break;
3053
7f1204bb
JJ
3054 case SHT_GNU_LIBLIST:
3055 /* sh_link is the section header index of the prelink library
08a40648
AM
3056 list used for the dynamic entries, or the symbol table, or
3057 the version strings. */
7f1204bb
JJ
3058 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3059 ? ".dynstr" : ".gnu.libstr");
3060 if (s != NULL)
3061 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3062 break;
3063
252b5132 3064 case SHT_HASH:
fdc90cb4 3065 case SHT_GNU_HASH:
252b5132
RH
3066 case SHT_GNU_versym:
3067 /* sh_link is the section header index of the symbol table
3068 this hash table or version table is for. */
3069 s = bfd_get_section_by_name (abfd, ".dynsym");
3070 if (s != NULL)
3071 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3072 break;
dbb410c3
AM
3073
3074 case SHT_GROUP:
3075 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3076 }
3077 }
3078
2b0f7ef9 3079 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3080 if (i_shdrp[secn] == NULL)
3081 i_shdrp[secn] = i_shdrp[0];
3082 else
3083 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3084 i_shdrp[secn]->sh_name);
b34976b6 3085 return TRUE;
252b5132
RH
3086}
3087
3088/* Map symbol from it's internal number to the external number, moving
3089 all local symbols to be at the head of the list. */
3090
5372391b 3091static bfd_boolean
217aa764 3092sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3093{
3094 /* If the backend has a special mapping, use it. */
9c5bfbb7 3095 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3096 if (bed->elf_backend_sym_is_global)
3097 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3098
e47bf690 3099 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3100 || bfd_is_und_section (bfd_get_section (sym))
3101 || bfd_is_com_section (bfd_get_section (sym)));
3102}
3103
5372391b 3104/* Don't output section symbols for sections that are not going to be
0f0a5e58 3105 output. */
5372391b
AM
3106
3107static bfd_boolean
3108ignore_section_sym (bfd *abfd, asymbol *sym)
3109{
3110 return ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58
AM
3111 && !(sym->section->owner == abfd
3112 || (sym->section->output_section->owner == abfd
3113 && sym->section->output_offset == 0)));
5372391b
AM
3114}
3115
b34976b6 3116static bfd_boolean
217aa764 3117elf_map_symbols (bfd *abfd)
252b5132 3118{
dc810e39 3119 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3120 asymbol **syms = bfd_get_outsymbols (abfd);
3121 asymbol **sect_syms;
dc810e39
AM
3122 unsigned int num_locals = 0;
3123 unsigned int num_globals = 0;
3124 unsigned int num_locals2 = 0;
3125 unsigned int num_globals2 = 0;
252b5132 3126 int max_index = 0;
dc810e39 3127 unsigned int idx;
252b5132
RH
3128 asection *asect;
3129 asymbol **new_syms;
252b5132
RH
3130
3131#ifdef DEBUG
3132 fprintf (stderr, "elf_map_symbols\n");
3133 fflush (stderr);
3134#endif
3135
252b5132
RH
3136 for (asect = abfd->sections; asect; asect = asect->next)
3137 {
3138 if (max_index < asect->index)
3139 max_index = asect->index;
3140 }
3141
3142 max_index++;
a50b1753 3143 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3144 if (sect_syms == NULL)
b34976b6 3145 return FALSE;
252b5132 3146 elf_section_syms (abfd) = sect_syms;
4e89ac30 3147 elf_num_section_syms (abfd) = max_index;
252b5132 3148
079e9a2f
AM
3149 /* Init sect_syms entries for any section symbols we have already
3150 decided to output. */
252b5132
RH
3151 for (idx = 0; idx < symcount; idx++)
3152 {
dc810e39 3153 asymbol *sym = syms[idx];
c044fabd 3154
252b5132 3155 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3156 && sym->value == 0
5372391b 3157 && !ignore_section_sym (abfd, sym))
252b5132 3158 {
5372391b 3159 asection *sec = sym->section;
252b5132 3160
5372391b
AM
3161 if (sec->owner != abfd)
3162 sec = sec->output_section;
252b5132 3163
5372391b 3164 sect_syms[sec->index] = syms[idx];
252b5132
RH
3165 }
3166 }
3167
252b5132
RH
3168 /* Classify all of the symbols. */
3169 for (idx = 0; idx < symcount; idx++)
3170 {
5372391b
AM
3171 if (ignore_section_sym (abfd, syms[idx]))
3172 continue;
252b5132
RH
3173 if (!sym_is_global (abfd, syms[idx]))
3174 num_locals++;
3175 else
3176 num_globals++;
3177 }
079e9a2f 3178
5372391b 3179 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3180 sections will already have a section symbol in outsymbols, but
3181 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3182 at least in that case. */
252b5132
RH
3183 for (asect = abfd->sections; asect; asect = asect->next)
3184 {
079e9a2f 3185 if (sect_syms[asect->index] == NULL)
252b5132 3186 {
079e9a2f 3187 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3188 num_locals++;
3189 else
3190 num_globals++;
252b5132
RH
3191 }
3192 }
3193
3194 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3195 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3196 sizeof (asymbol *));
dc810e39 3197
252b5132 3198 if (new_syms == NULL)
b34976b6 3199 return FALSE;
252b5132
RH
3200
3201 for (idx = 0; idx < symcount; idx++)
3202 {
3203 asymbol *sym = syms[idx];
dc810e39 3204 unsigned int i;
252b5132 3205
5372391b
AM
3206 if (ignore_section_sym (abfd, sym))
3207 continue;
252b5132
RH
3208 if (!sym_is_global (abfd, sym))
3209 i = num_locals2++;
3210 else
3211 i = num_locals + num_globals2++;
3212 new_syms[i] = sym;
3213 sym->udata.i = i + 1;
3214 }
3215 for (asect = abfd->sections; asect; asect = asect->next)
3216 {
079e9a2f 3217 if (sect_syms[asect->index] == NULL)
252b5132 3218 {
079e9a2f 3219 asymbol *sym = asect->symbol;
dc810e39 3220 unsigned int i;
252b5132 3221
079e9a2f 3222 sect_syms[asect->index] = sym;
252b5132
RH
3223 if (!sym_is_global (abfd, sym))
3224 i = num_locals2++;
3225 else
3226 i = num_locals + num_globals2++;
3227 new_syms[i] = sym;
3228 sym->udata.i = i + 1;
3229 }
3230 }
3231
3232 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3233
3234 elf_num_locals (abfd) = num_locals;
3235 elf_num_globals (abfd) = num_globals;
b34976b6 3236 return TRUE;
252b5132
RH
3237}
3238
3239/* Align to the maximum file alignment that could be required for any
3240 ELF data structure. */
3241
268b6b39 3242static inline file_ptr
217aa764 3243align_file_position (file_ptr off, int align)
252b5132
RH
3244{
3245 return (off + align - 1) & ~(align - 1);
3246}
3247
3248/* Assign a file position to a section, optionally aligning to the
3249 required section alignment. */
3250
217aa764
AM
3251file_ptr
3252_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3253 file_ptr offset,
3254 bfd_boolean align)
252b5132 3255{
72de5009
AM
3256 if (align && i_shdrp->sh_addralign > 1)
3257 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3258 i_shdrp->sh_offset = offset;
3259 if (i_shdrp->bfd_section != NULL)
3260 i_shdrp->bfd_section->filepos = offset;
3261 if (i_shdrp->sh_type != SHT_NOBITS)
3262 offset += i_shdrp->sh_size;
3263 return offset;
3264}
3265
3266/* Compute the file positions we are going to put the sections at, and
3267 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3268 is not NULL, this is being called by the ELF backend linker. */
3269
b34976b6 3270bfd_boolean
217aa764
AM
3271_bfd_elf_compute_section_file_positions (bfd *abfd,
3272 struct bfd_link_info *link_info)
252b5132 3273{
9c5bfbb7 3274 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b34976b6 3275 bfd_boolean failed;
4b6c0f2f 3276 struct bfd_strtab_hash *strtab = NULL;
252b5132 3277 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3278 bfd_boolean need_symtab;
252b5132
RH
3279
3280 if (abfd->output_has_begun)
b34976b6 3281 return TRUE;
252b5132
RH
3282
3283 /* Do any elf backend specific processing first. */
3284 if (bed->elf_backend_begin_write_processing)
3285 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3286
3287 if (! prep_headers (abfd))
b34976b6 3288 return FALSE;
252b5132 3289
e6c51ed4
NC
3290 /* Post process the headers if necessary. */
3291 if (bed->elf_backend_post_process_headers)
3292 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3293
b34976b6 3294 failed = FALSE;
252b5132
RH
3295 bfd_map_over_sections (abfd, elf_fake_sections, &failed);
3296 if (failed)
b34976b6 3297 return FALSE;
252b5132 3298
da9f89d4 3299 if (!assign_section_numbers (abfd, link_info))
b34976b6 3300 return FALSE;
252b5132
RH
3301
3302 /* The backend linker builds symbol table information itself. */
3516e984
L
3303 need_symtab = (link_info == NULL
3304 && (bfd_get_symcount (abfd) > 0
3305 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3306 == HAS_RELOC)));
3307 if (need_symtab)
252b5132
RH
3308 {
3309 /* Non-zero if doing a relocatable link. */
3310 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3311
3312 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3313 return FALSE;
252b5132
RH
3314 }
3315
1126897b 3316 if (link_info == NULL)
dbb410c3 3317 {
1126897b 3318 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3319 if (failed)
b34976b6 3320 return FALSE;
dbb410c3
AM
3321 }
3322
252b5132
RH
3323 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3324 /* sh_name was set in prep_headers. */
3325 shstrtab_hdr->sh_type = SHT_STRTAB;
3326 shstrtab_hdr->sh_flags = 0;
3327 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3328 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3329 shstrtab_hdr->sh_entsize = 0;
3330 shstrtab_hdr->sh_link = 0;
3331 shstrtab_hdr->sh_info = 0;
3332 /* sh_offset is set in assign_file_positions_except_relocs. */
3333 shstrtab_hdr->sh_addralign = 1;
3334
c84fca4d 3335 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3336 return FALSE;
252b5132 3337
3516e984 3338 if (need_symtab)
252b5132
RH
3339 {
3340 file_ptr off;
3341 Elf_Internal_Shdr *hdr;
3342
3343 off = elf_tdata (abfd)->next_file_pos;
3344
3345 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3346 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3347
9ad5cbcf
AM
3348 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3349 if (hdr->sh_size != 0)
b34976b6 3350 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3351
252b5132 3352 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3353 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3354
3355 elf_tdata (abfd)->next_file_pos = off;
3356
3357 /* Now that we know where the .strtab section goes, write it
08a40648 3358 out. */
252b5132
RH
3359 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3360 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3361 return FALSE;
252b5132
RH
3362 _bfd_stringtab_free (strtab);
3363 }
3364
b34976b6 3365 abfd->output_has_begun = TRUE;
252b5132 3366
b34976b6 3367 return TRUE;
252b5132
RH
3368}
3369
8ded5a0f
AM
3370/* Make an initial estimate of the size of the program header. If we
3371 get the number wrong here, we'll redo section placement. */
3372
3373static bfd_size_type
3374get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3375{
3376 size_t segs;
3377 asection *s;
2b05f1b7 3378 const struct elf_backend_data *bed;
8ded5a0f
AM
3379
3380 /* Assume we will need exactly two PT_LOAD segments: one for text
3381 and one for data. */
3382 segs = 2;
3383
3384 s = bfd_get_section_by_name (abfd, ".interp");
3385 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3386 {
3387 /* If we have a loadable interpreter section, we need a
3388 PT_INTERP segment. In this case, assume we also need a
3389 PT_PHDR segment, although that may not be true for all
3390 targets. */
3391 segs += 2;
3392 }
3393
3394 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3395 {
3396 /* We need a PT_DYNAMIC segment. */
3397 ++segs;
f210dcff 3398 }
08a40648 3399
ceae84aa 3400 if (info != NULL && info->relro)
f210dcff
L
3401 {
3402 /* We need a PT_GNU_RELRO segment. */
3403 ++segs;
8ded5a0f
AM
3404 }
3405
3406 if (elf_tdata (abfd)->eh_frame_hdr)
3407 {
3408 /* We need a PT_GNU_EH_FRAME segment. */
3409 ++segs;
3410 }
3411
2b05f1b7 3412 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3413 {
2b05f1b7
L
3414 /* We need a PT_GNU_STACK segment. */
3415 ++segs;
3416 }
94b11780 3417
2b05f1b7
L
3418 for (s = abfd->sections; s != NULL; s = s->next)
3419 {
8ded5a0f 3420 if ((s->flags & SEC_LOAD) != 0
0112cd26 3421 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3422 {
3423 /* We need a PT_NOTE segment. */
3424 ++segs;
1c5265b5
JJ
3425 /* Try to create just one PT_NOTE segment
3426 for all adjacent loadable .note* sections.
3427 gABI requires that within a PT_NOTE segment
3428 (and also inside of each SHT_NOTE section)
3429 each note is padded to a multiple of 4 size,
3430 so we check whether the sections are correctly
3431 aligned. */
3432 if (s->alignment_power == 2)
3433 while (s->next != NULL
3434 && s->next->alignment_power == 2
3435 && (s->next->flags & SEC_LOAD) != 0
3436 && CONST_STRNEQ (s->next->name, ".note"))
3437 s = s->next;
8ded5a0f
AM
3438 }
3439 }
3440
3441 for (s = abfd->sections; s != NULL; s = s->next)
3442 {
3443 if (s->flags & SEC_THREAD_LOCAL)
3444 {
3445 /* We need a PT_TLS segment. */
3446 ++segs;
3447 break;
3448 }
3449 }
3450
3451 /* Let the backend count up any program headers it might need. */
2b05f1b7 3452 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3453 if (bed->elf_backend_additional_program_headers)
3454 {
3455 int a;
3456
3457 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3458 if (a == -1)
3459 abort ();
3460 segs += a;
3461 }
3462
3463 return segs * bed->s->sizeof_phdr;
3464}
3465
2ea37f1c
NC
3466/* Find the segment that contains the output_section of section. */
3467
3468Elf_Internal_Phdr *
3469_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3470{
3471 struct elf_segment_map *m;
3472 Elf_Internal_Phdr *p;
3473
3474 for (m = elf_tdata (abfd)->segment_map,
3475 p = elf_tdata (abfd)->phdr;
3476 m != NULL;
3477 m = m->next, p++)
3478 {
3479 int i;
3480
3481 for (i = m->count - 1; i >= 0; i--)
3482 if (m->sections[i] == section)
3483 return p;
3484 }
3485
3486 return NULL;
3487}
3488
252b5132
RH
3489/* Create a mapping from a set of sections to a program segment. */
3490
217aa764
AM
3491static struct elf_segment_map *
3492make_mapping (bfd *abfd,
3493 asection **sections,
3494 unsigned int from,
3495 unsigned int to,
3496 bfd_boolean phdr)
252b5132
RH
3497{
3498 struct elf_segment_map *m;
3499 unsigned int i;
3500 asection **hdrpp;
dc810e39 3501 bfd_size_type amt;
252b5132 3502
dc810e39
AM
3503 amt = sizeof (struct elf_segment_map);
3504 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3505 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3506 if (m == NULL)
3507 return NULL;
3508 m->next = NULL;
3509 m->p_type = PT_LOAD;
3510 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3511 m->sections[i - from] = *hdrpp;
3512 m->count = to - from;
3513
3514 if (from == 0 && phdr)
3515 {
3516 /* Include the headers in the first PT_LOAD segment. */
3517 m->includes_filehdr = 1;
3518 m->includes_phdrs = 1;
3519 }
3520
3521 return m;
3522}
3523
229fcec5
MM
3524/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3525 on failure. */
3526
3527struct elf_segment_map *
3528_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3529{
3530 struct elf_segment_map *m;
3531
a50b1753
NC
3532 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3533 sizeof (struct elf_segment_map));
229fcec5
MM
3534 if (m == NULL)
3535 return NULL;
3536 m->next = NULL;
3537 m->p_type = PT_DYNAMIC;
3538 m->count = 1;
3539 m->sections[0] = dynsec;
08a40648 3540
229fcec5
MM
3541 return m;
3542}
3543
8ded5a0f 3544/* Possibly add or remove segments from the segment map. */
252b5132 3545
b34976b6 3546static bfd_boolean
3dea8fca
AM
3547elf_modify_segment_map (bfd *abfd,
3548 struct bfd_link_info *info,
3549 bfd_boolean remove_empty_load)
252b5132 3550{
252e386e 3551 struct elf_segment_map **m;
8ded5a0f 3552 const struct elf_backend_data *bed;
252b5132 3553
8ded5a0f
AM
3554 /* The placement algorithm assumes that non allocated sections are
3555 not in PT_LOAD segments. We ensure this here by removing such
3556 sections from the segment map. We also remove excluded
252e386e
AM
3557 sections. Finally, any PT_LOAD segment without sections is
3558 removed. */
3559 m = &elf_tdata (abfd)->segment_map;
3560 while (*m)
8ded5a0f
AM
3561 {
3562 unsigned int i, new_count;
252b5132 3563
252e386e 3564 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3565 {
252e386e
AM
3566 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3567 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3568 || (*m)->p_type != PT_LOAD))
8ded5a0f 3569 {
252e386e
AM
3570 (*m)->sections[new_count] = (*m)->sections[i];
3571 new_count++;
8ded5a0f
AM
3572 }
3573 }
252e386e 3574 (*m)->count = new_count;
252b5132 3575
3dea8fca 3576 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3577 *m = (*m)->next;
3578 else
3579 m = &(*m)->next;
8ded5a0f 3580 }
252b5132 3581
8ded5a0f
AM
3582 bed = get_elf_backend_data (abfd);
3583 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3584 {
252e386e 3585 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3586 return FALSE;
252b5132 3587 }
252b5132 3588
8ded5a0f
AM
3589 return TRUE;
3590}
252b5132 3591
8ded5a0f 3592/* Set up a mapping from BFD sections to program segments. */
252b5132 3593
8ded5a0f
AM
3594bfd_boolean
3595_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3596{
3597 unsigned int count;
3598 struct elf_segment_map *m;
3599 asection **sections = NULL;
3600 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3601 bfd_boolean no_user_phdrs;
252b5132 3602
3dea8fca
AM
3603 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
3604 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3605 {
8ded5a0f
AM
3606 asection *s;
3607 unsigned int i;
3608 struct elf_segment_map *mfirst;
3609 struct elf_segment_map **pm;
3610 asection *last_hdr;
3611 bfd_vma last_size;
3612 unsigned int phdr_index;
3613 bfd_vma maxpagesize;
3614 asection **hdrpp;
3615 bfd_boolean phdr_in_segment = TRUE;
3616 bfd_boolean writable;
3617 int tls_count = 0;
3618 asection *first_tls = NULL;
3619 asection *dynsec, *eh_frame_hdr;
3620 bfd_size_type amt;
252b5132 3621
8ded5a0f 3622 /* Select the allocated sections, and sort them. */
252b5132 3623
a50b1753
NC
3624 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
3625 sizeof (asection *));
8ded5a0f 3626 if (sections == NULL)
252b5132 3627 goto error_return;
252b5132 3628
8ded5a0f
AM
3629 i = 0;
3630 for (s = abfd->sections; s != NULL; s = s->next)
3631 {
3632 if ((s->flags & SEC_ALLOC) != 0)
3633 {
3634 sections[i] = s;
3635 ++i;
3636 }
3637 }
3638 BFD_ASSERT (i <= bfd_count_sections (abfd));
3639 count = i;
252b5132 3640
8ded5a0f 3641 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3642
8ded5a0f 3643 /* Build the mapping. */
252b5132 3644
8ded5a0f
AM
3645 mfirst = NULL;
3646 pm = &mfirst;
252b5132 3647
8ded5a0f
AM
3648 /* If we have a .interp section, then create a PT_PHDR segment for
3649 the program headers and a PT_INTERP segment for the .interp
3650 section. */
3651 s = bfd_get_section_by_name (abfd, ".interp");
3652 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3653 {
3654 amt = sizeof (struct elf_segment_map);
a50b1753 3655 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3656 if (m == NULL)
3657 goto error_return;
3658 m->next = NULL;
3659 m->p_type = PT_PHDR;
3660 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3661 m->p_flags = PF_R | PF_X;
3662 m->p_flags_valid = 1;
3663 m->includes_phdrs = 1;
252b5132 3664
8ded5a0f
AM
3665 *pm = m;
3666 pm = &m->next;
252b5132 3667
8ded5a0f 3668 amt = sizeof (struct elf_segment_map);
a50b1753 3669 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3670 if (m == NULL)
3671 goto error_return;
3672 m->next = NULL;
3673 m->p_type = PT_INTERP;
3674 m->count = 1;
3675 m->sections[0] = s;
3676
3677 *pm = m;
3678 pm = &m->next;
252b5132 3679 }
8ded5a0f
AM
3680
3681 /* Look through the sections. We put sections in the same program
3682 segment when the start of the second section can be placed within
3683 a few bytes of the end of the first section. */
3684 last_hdr = NULL;
3685 last_size = 0;
3686 phdr_index = 0;
3687 maxpagesize = bed->maxpagesize;
3688 writable = FALSE;
3689 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3690 if (dynsec != NULL
3691 && (dynsec->flags & SEC_LOAD) == 0)
3692 dynsec = NULL;
3693
3694 /* Deal with -Ttext or something similar such that the first section
3695 is not adjacent to the program headers. This is an
3696 approximation, since at this point we don't know exactly how many
3697 program headers we will need. */
3698 if (count > 0)
252b5132 3699 {
8ded5a0f
AM
3700 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3701
62d7a5f6 3702 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3703 phdr_size = get_program_header_size (abfd, info);
3704 if ((abfd->flags & D_PAGED) == 0
3705 || sections[0]->lma < phdr_size
3706 || sections[0]->lma % maxpagesize < phdr_size % maxpagesize)
3707 phdr_in_segment = FALSE;
252b5132
RH
3708 }
3709
8ded5a0f 3710 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3711 {
8ded5a0f
AM
3712 asection *hdr;
3713 bfd_boolean new_segment;
3714
3715 hdr = *hdrpp;
3716
3717 /* See if this section and the last one will fit in the same
3718 segment. */
3719
3720 if (last_hdr == NULL)
3721 {
3722 /* If we don't have a segment yet, then we don't need a new
3723 one (we build the last one after this loop). */
3724 new_segment = FALSE;
3725 }
3726 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3727 {
3728 /* If this section has a different relation between the
3729 virtual address and the load address, then we need a new
3730 segment. */
3731 new_segment = TRUE;
3732 }
39948a60
NC
3733 /* In the next test we have to be careful when last_hdr->lma is close
3734 to the end of the address space. If the aligned address wraps
3735 around to the start of the address space, then there are no more
3736 pages left in memory and it is OK to assume that the current
3737 section can be included in the current segment. */
3738 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3739 > last_hdr->lma)
3740 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3741 <= hdr->lma))
8ded5a0f
AM
3742 {
3743 /* If putting this section in this segment would force us to
3744 skip a page in the segment, then we need a new segment. */
3745 new_segment = TRUE;
3746 }
3747 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3748 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3749 {
3750 /* We don't want to put a loadable section after a
3751 nonloadable section in the same segment.
3752 Consider .tbss sections as loadable for this purpose. */
3753 new_segment = TRUE;
3754 }
3755 else if ((abfd->flags & D_PAGED) == 0)
3756 {
3757 /* If the file is not demand paged, which means that we
3758 don't require the sections to be correctly aligned in the
3759 file, then there is no other reason for a new segment. */
3760 new_segment = FALSE;
3761 }
3762 else if (! writable
3763 && (hdr->flags & SEC_READONLY) == 0
3764 && (((last_hdr->lma + last_size - 1)
3765 & ~(maxpagesize - 1))
3766 != (hdr->lma & ~(maxpagesize - 1))))
3767 {
3768 /* We don't want to put a writable section in a read only
3769 segment, unless they are on the same page in memory
3770 anyhow. We already know that the last section does not
3771 bring us past the current section on the page, so the
3772 only case in which the new section is not on the same
3773 page as the previous section is when the previous section
3774 ends precisely on a page boundary. */
3775 new_segment = TRUE;
3776 }
3777 else
3778 {
3779 /* Otherwise, we can use the same segment. */
3780 new_segment = FALSE;
3781 }
3782
2889e75b 3783 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3784 if (last_hdr != NULL
3785 && info != NULL
3786 && info->callbacks->override_segment_assignment != NULL)
3787 new_segment
3788 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3789 last_hdr,
3790 new_segment);
2889e75b 3791
8ded5a0f
AM
3792 if (! new_segment)
3793 {
3794 if ((hdr->flags & SEC_READONLY) == 0)
3795 writable = TRUE;
3796 last_hdr = hdr;
3797 /* .tbss sections effectively have zero size. */
3798 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3799 != SEC_THREAD_LOCAL)
3800 last_size = hdr->size;
3801 else
3802 last_size = 0;
3803 continue;
3804 }
3805
3806 /* We need a new program segment. We must create a new program
3807 header holding all the sections from phdr_index until hdr. */
3808
3809 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3810 if (m == NULL)
3811 goto error_return;
3812
3813 *pm = m;
3814 pm = &m->next;
3815
252b5132 3816 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 3817 writable = TRUE;
8ded5a0f
AM
3818 else
3819 writable = FALSE;
3820
baaff79e
JJ
3821 last_hdr = hdr;
3822 /* .tbss sections effectively have zero size. */
e5caec89 3823 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 3824 last_size = hdr->size;
baaff79e
JJ
3825 else
3826 last_size = 0;
8ded5a0f
AM
3827 phdr_index = i;
3828 phdr_in_segment = FALSE;
252b5132
RH
3829 }
3830
8ded5a0f
AM
3831 /* Create a final PT_LOAD program segment. */
3832 if (last_hdr != NULL)
3833 {
3834 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
3835 if (m == NULL)
3836 goto error_return;
252b5132 3837
8ded5a0f
AM
3838 *pm = m;
3839 pm = &m->next;
3840 }
252b5132 3841
8ded5a0f
AM
3842 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
3843 if (dynsec != NULL)
3844 {
3845 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
3846 if (m == NULL)
3847 goto error_return;
3848 *pm = m;
3849 pm = &m->next;
3850 }
252b5132 3851
1c5265b5
JJ
3852 /* For each batch of consecutive loadable .note sections,
3853 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
3854 because if we link together nonloadable .note sections and
3855 loadable .note sections, we will generate two .note sections
3856 in the output file. FIXME: Using names for section types is
3857 bogus anyhow. */
8ded5a0f
AM
3858 for (s = abfd->sections; s != NULL; s = s->next)
3859 {
3860 if ((s->flags & SEC_LOAD) != 0
0112cd26 3861 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 3862 {
1c5265b5 3863 asection *s2;
91d6fa6a
NC
3864
3865 count = 1;
8ded5a0f 3866 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
3867 if (s->alignment_power == 2)
3868 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
3869 {
3870 if (s2->next->alignment_power == 2
3871 && (s2->next->flags & SEC_LOAD) != 0
3872 && CONST_STRNEQ (s2->next->name, ".note")
3873 && align_power (s2->vma + s2->size, 2)
3874 == s2->next->vma)
3875 count++;
3876 else
3877 break;
3878 }
1c5265b5 3879 amt += (count - 1) * sizeof (asection *);
a50b1753 3880 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3881 if (m == NULL)
3882 goto error_return;
3883 m->next = NULL;
3884 m->p_type = PT_NOTE;
1c5265b5
JJ
3885 m->count = count;
3886 while (count > 1)
3887 {
3888 m->sections[m->count - count--] = s;
3889 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
3890 s = s->next;
3891 }
3892 m->sections[m->count - 1] = s;
3893 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
3894 *pm = m;
3895 pm = &m->next;
3896 }
3897 if (s->flags & SEC_THREAD_LOCAL)
3898 {
3899 if (! tls_count)
3900 first_tls = s;
3901 tls_count++;
3902 }
3903 }
252b5132 3904
8ded5a0f
AM
3905 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
3906 if (tls_count > 0)
3907 {
8ded5a0f
AM
3908 amt = sizeof (struct elf_segment_map);
3909 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 3910 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3911 if (m == NULL)
3912 goto error_return;
3913 m->next = NULL;
3914 m->p_type = PT_TLS;
3915 m->count = tls_count;
3916 /* Mandated PF_R. */
3917 m->p_flags = PF_R;
3918 m->p_flags_valid = 1;
91d6fa6a 3919 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f
AM
3920 {
3921 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
3922 m->sections[i] = first_tls;
3923 first_tls = first_tls->next;
3924 }
252b5132 3925
8ded5a0f
AM
3926 *pm = m;
3927 pm = &m->next;
3928 }
252b5132 3929
8ded5a0f
AM
3930 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
3931 segment. */
3932 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
3933 if (eh_frame_hdr != NULL
3934 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 3935 {
dc810e39 3936 amt = sizeof (struct elf_segment_map);
a50b1753 3937 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3938 if (m == NULL)
3939 goto error_return;
3940 m->next = NULL;
8ded5a0f 3941 m->p_type = PT_GNU_EH_FRAME;
252b5132 3942 m->count = 1;
8ded5a0f 3943 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
3944
3945 *pm = m;
3946 pm = &m->next;
3947 }
13ae64f3 3948
8ded5a0f 3949 if (elf_tdata (abfd)->stack_flags)
13ae64f3 3950 {
8ded5a0f 3951 amt = sizeof (struct elf_segment_map);
a50b1753 3952 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3953 if (m == NULL)
3954 goto error_return;
3955 m->next = NULL;
2b05f1b7 3956 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
3957 m->p_flags = elf_tdata (abfd)->stack_flags;
3958 m->p_flags_valid = 1;
252b5132 3959
8ded5a0f
AM
3960 *pm = m;
3961 pm = &m->next;
3962 }
65765700 3963
ceae84aa 3964 if (info != NULL && info->relro)
8ded5a0f 3965 {
f210dcff
L
3966 for (m = mfirst; m != NULL; m = m->next)
3967 {
3968 if (m->p_type == PT_LOAD)
3969 {
3970 asection *last = m->sections[m->count - 1];
3971 bfd_vma vaddr = m->sections[0]->vma;
3972 bfd_vma filesz = last->vma - vaddr + last->size;
65765700 3973
f210dcff
L
3974 if (vaddr < info->relro_end
3975 && vaddr >= info->relro_start
3976 && (vaddr + filesz) >= info->relro_end)
3977 break;
3978 }
3979 }
3980
3981 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
3982 if (m != NULL)
3983 {
3984 amt = sizeof (struct elf_segment_map);
a50b1753 3985 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
3986 if (m == NULL)
3987 goto error_return;
3988 m->next = NULL;
3989 m->p_type = PT_GNU_RELRO;
3990 m->p_flags = PF_R;
3991 m->p_flags_valid = 1;
3992
3993 *pm = m;
3994 pm = &m->next;
3995 }
8ded5a0f 3996 }
9ee5e499 3997
8ded5a0f
AM
3998 free (sections);
3999 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
4000 }
4001
3dea8fca 4002 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4003 return FALSE;
8c37241b 4004
8ded5a0f
AM
4005 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4006 ++count;
4007 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 4008
b34976b6 4009 return TRUE;
252b5132
RH
4010
4011 error_return:
4012 if (sections != NULL)
4013 free (sections);
b34976b6 4014 return FALSE;
252b5132
RH
4015}
4016
4017/* Sort sections by address. */
4018
4019static int
217aa764 4020elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4021{
4022 const asection *sec1 = *(const asection **) arg1;
4023 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4024 bfd_size_type size1, size2;
252b5132
RH
4025
4026 /* Sort by LMA first, since this is the address used to
4027 place the section into a segment. */
4028 if (sec1->lma < sec2->lma)
4029 return -1;
4030 else if (sec1->lma > sec2->lma)
4031 return 1;
4032
4033 /* Then sort by VMA. Normally the LMA and the VMA will be
4034 the same, and this will do nothing. */
4035 if (sec1->vma < sec2->vma)
4036 return -1;
4037 else if (sec1->vma > sec2->vma)
4038 return 1;
4039
4040 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4041
07c6e936 4042#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4043
4044 if (TOEND (sec1))
4045 {
4046 if (TOEND (sec2))
00a7cdc5
NC
4047 {
4048 /* If the indicies are the same, do not return 0
4049 here, but continue to try the next comparison. */
4050 if (sec1->target_index - sec2->target_index != 0)
4051 return sec1->target_index - sec2->target_index;
4052 }
252b5132
RH
4053 else
4054 return 1;
4055 }
00a7cdc5 4056 else if (TOEND (sec2))
252b5132
RH
4057 return -1;
4058
4059#undef TOEND
4060
00a7cdc5
NC
4061 /* Sort by size, to put zero sized sections
4062 before others at the same address. */
252b5132 4063
eea6121a
AM
4064 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4065 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4066
4067 if (size1 < size2)
252b5132 4068 return -1;
eecdbe52 4069 if (size1 > size2)
252b5132
RH
4070 return 1;
4071
4072 return sec1->target_index - sec2->target_index;
4073}
4074
340b6d91
AC
4075/* Ian Lance Taylor writes:
4076
4077 We shouldn't be using % with a negative signed number. That's just
4078 not good. We have to make sure either that the number is not
4079 negative, or that the number has an unsigned type. When the types
4080 are all the same size they wind up as unsigned. When file_ptr is a
4081 larger signed type, the arithmetic winds up as signed long long,
4082 which is wrong.
4083
4084 What we're trying to say here is something like ``increase OFF by
4085 the least amount that will cause it to be equal to the VMA modulo
4086 the page size.'' */
4087/* In other words, something like:
4088
4089 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4090 off_offset = off % bed->maxpagesize;
4091 if (vma_offset < off_offset)
4092 adjustment = vma_offset + bed->maxpagesize - off_offset;
4093 else
4094 adjustment = vma_offset - off_offset;
08a40648 4095
340b6d91
AC
4096 which can can be collapsed into the expression below. */
4097
4098static file_ptr
4099vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4100{
4101 return ((vma - off) % maxpagesize);
4102}
4103
6d33f217
L
4104static void
4105print_segment_map (const struct elf_segment_map *m)
4106{
4107 unsigned int j;
4108 const char *pt = get_segment_type (m->p_type);
4109 char buf[32];
4110
4111 if (pt == NULL)
4112 {
4113 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4114 sprintf (buf, "LOPROC+%7.7x",
4115 (unsigned int) (m->p_type - PT_LOPROC));
4116 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4117 sprintf (buf, "LOOS+%7.7x",
4118 (unsigned int) (m->p_type - PT_LOOS));
4119 else
4120 snprintf (buf, sizeof (buf), "%8.8x",
4121 (unsigned int) m->p_type);
4122 pt = buf;
4123 }
4124 fprintf (stderr, "%s:", pt);
4125 for (j = 0; j < m->count; j++)
4126 fprintf (stderr, " %s", m->sections [j]->name);
4127 putc ('\n',stderr);
4128}
4129
32812159
AM
4130static bfd_boolean
4131write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4132{
4133 void *buf;
4134 bfd_boolean ret;
4135
4136 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4137 return FALSE;
4138 buf = bfd_zmalloc (len);
4139 if (buf == NULL)
4140 return FALSE;
4141 ret = bfd_bwrite (buf, len, abfd) == len;
4142 free (buf);
4143 return ret;
4144}
4145
252b5132
RH
4146/* Assign file positions to the sections based on the mapping from
4147 sections to segments. This function also sets up some fields in
f3520d2f 4148 the file header. */
252b5132 4149
b34976b6 4150static bfd_boolean
f3520d2f
AM
4151assign_file_positions_for_load_sections (bfd *abfd,
4152 struct bfd_link_info *link_info)
252b5132
RH
4153{
4154 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4155 struct elf_segment_map *m;
252b5132 4156 Elf_Internal_Phdr *phdrs;
252b5132 4157 Elf_Internal_Phdr *p;
02bf8d82 4158 file_ptr off;
3f570048 4159 bfd_size_type maxpagesize;
f3520d2f 4160 unsigned int alloc;
0920dee7 4161 unsigned int i, j;
2b0bc088 4162 bfd_vma header_pad = 0;
252b5132 4163
e36284ab 4164 if (link_info == NULL
ceae84aa 4165 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4166 return FALSE;
252b5132 4167
8ded5a0f 4168 alloc = 0;
252b5132 4169 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2b0bc088
NC
4170 {
4171 ++alloc;
4172 if (m->header_size)
4173 header_pad = m->header_size;
4174 }
252b5132
RH
4175
4176 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4177 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
8ded5a0f 4178 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4179
62d7a5f6 4180 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4181 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4182 else
4183 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4184 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4185
4186 if (alloc == 0)
f3520d2f 4187 {
8ded5a0f
AM
4188 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4189 return TRUE;
f3520d2f 4190 }
252b5132 4191
57268894
HPN
4192 /* We're writing the size in elf_tdata (abfd)->program_header_size,
4193 see assign_file_positions_except_relocs, so make sure we have
4194 that amount allocated, with trailing space cleared.
4195 The variable alloc contains the computed need, while elf_tdata
4196 (abfd)->program_header_size contains the size used for the
4197 layout.
4198 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4199 where the layout is forced to according to a larger size in the
4200 last iterations for the testcase ld-elf/header. */
4201 BFD_ASSERT (elf_tdata (abfd)->program_header_size % bed->s->sizeof_phdr
4202 == 0);
a50b1753
NC
4203 phdrs = (Elf_Internal_Phdr *)
4204 bfd_zalloc2 (abfd,
4205 (elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr),
4206 sizeof (Elf_Internal_Phdr));
f3520d2f 4207 elf_tdata (abfd)->phdr = phdrs;
252b5132 4208 if (phdrs == NULL)
b34976b6 4209 return FALSE;
252b5132 4210
3f570048
AM
4211 maxpagesize = 1;
4212 if ((abfd->flags & D_PAGED) != 0)
4213 maxpagesize = bed->maxpagesize;
4214
252b5132
RH
4215 off = bed->s->sizeof_ehdr;
4216 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4217 if (header_pad < (bfd_vma) off)
4218 header_pad = 0;
4219 else
4220 header_pad -= off;
4221 off += header_pad;
252b5132 4222
0920dee7 4223 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4224 m != NULL;
0920dee7 4225 m = m->next, p++, j++)
252b5132 4226 {
252b5132 4227 asection **secpp;
bf988460
AM
4228 bfd_vma off_adjust;
4229 bfd_boolean no_contents;
252b5132
RH
4230
4231 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4232 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4233 not be done to the PT_NOTE section of a corefile, which may
4234 contain several pseudo-sections artificially created by bfd.
4235 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4236 if (m->count > 1
4237 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4238 && m->p_type == PT_NOTE))
252b5132
RH
4239 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4240 elf_sort_sections);
4241
b301b248
AM
4242 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4243 number of sections with contents contributing to both p_filesz
4244 and p_memsz, followed by a number of sections with no contents
4245 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4246 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4247 p->p_type = m->p_type;
28a7f3e7 4248 p->p_flags = m->p_flags;
252b5132 4249
3f570048
AM
4250 if (m->count == 0)
4251 p->p_vaddr = 0;
4252 else
3271a814 4253 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4254
4255 if (m->p_paddr_valid)
4256 p->p_paddr = m->p_paddr;
4257 else if (m->count == 0)
4258 p->p_paddr = 0;
4259 else
08a40648 4260 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4261
4262 if (p->p_type == PT_LOAD
4263 && (abfd->flags & D_PAGED) != 0)
4264 {
4265 /* p_align in demand paged PT_LOAD segments effectively stores
4266 the maximum page size. When copying an executable with
4267 objcopy, we set m->p_align from the input file. Use this
4268 value for maxpagesize rather than bed->maxpagesize, which
4269 may be different. Note that we use maxpagesize for PT_TLS
4270 segment alignment later in this function, so we are relying
4271 on at least one PT_LOAD segment appearing before a PT_TLS
4272 segment. */
4273 if (m->p_align_valid)
4274 maxpagesize = m->p_align;
4275
4276 p->p_align = maxpagesize;
4277 }
3271a814
NS
4278 else if (m->p_align_valid)
4279 p->p_align = m->p_align;
e970b90a
DJ
4280 else if (m->count == 0)
4281 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4282 else
4283 p->p_align = 0;
4284
bf988460
AM
4285 no_contents = FALSE;
4286 off_adjust = 0;
252b5132 4287 if (p->p_type == PT_LOAD
b301b248 4288 && m->count > 0)
252b5132 4289 {
b301b248 4290 bfd_size_type align;
a49e53ed 4291 unsigned int align_power = 0;
b301b248 4292
3271a814
NS
4293 if (m->p_align_valid)
4294 align = p->p_align;
4295 else
252b5132 4296 {
3271a814
NS
4297 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4298 {
4299 unsigned int secalign;
08a40648 4300
3271a814
NS
4301 secalign = bfd_get_section_alignment (abfd, *secpp);
4302 if (secalign > align_power)
4303 align_power = secalign;
4304 }
4305 align = (bfd_size_type) 1 << align_power;
4306 if (align < maxpagesize)
4307 align = maxpagesize;
b301b248 4308 }
252b5132 4309
02bf8d82
AM
4310 for (i = 0; i < m->count; i++)
4311 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4312 /* If we aren't making room for this section, then
4313 it must be SHT_NOBITS regardless of what we've
4314 set via struct bfd_elf_special_section. */
4315 elf_section_type (m->sections[i]) = SHT_NOBITS;
4316
bf988460 4317 /* Find out whether this segment contains any loadable
aea274d3
AM
4318 sections. */
4319 no_contents = TRUE;
4320 for (i = 0; i < m->count; i++)
4321 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4322 {
4323 no_contents = FALSE;
4324 break;
4325 }
bf988460
AM
4326
4327 off_adjust = vma_page_aligned_bias (m->sections[0]->vma, off, align);
4328 off += off_adjust;
4329 if (no_contents)
4330 {
4331 /* We shouldn't need to align the segment on disk since
4332 the segment doesn't need file space, but the gABI
4333 arguably requires the alignment and glibc ld.so
4334 checks it. So to comply with the alignment
4335 requirement but not waste file space, we adjust
4336 p_offset for just this segment. (OFF_ADJUST is
4337 subtracted from OFF later.) This may put p_offset
4338 past the end of file, but that shouldn't matter. */
4339 }
4340 else
4341 off_adjust = 0;
252b5132 4342 }
b1a6d0b1
NC
4343 /* Make sure the .dynamic section is the first section in the
4344 PT_DYNAMIC segment. */
4345 else if (p->p_type == PT_DYNAMIC
4346 && m->count > 1
4347 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4348 {
4349 _bfd_error_handler
b301b248
AM
4350 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4351 abfd);
b1a6d0b1
NC
4352 bfd_set_error (bfd_error_bad_value);
4353 return FALSE;
4354 }
3f001e84
JK
4355 /* Set the note section type to SHT_NOTE. */
4356 else if (p->p_type == PT_NOTE)
4357 for (i = 0; i < m->count; i++)
4358 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4359
252b5132
RH
4360 p->p_offset = 0;
4361 p->p_filesz = 0;
4362 p->p_memsz = 0;
4363
4364 if (m->includes_filehdr)
4365 {
bf988460 4366 if (!m->p_flags_valid)
252b5132 4367 p->p_flags |= PF_R;
252b5132
RH
4368 p->p_filesz = bed->s->sizeof_ehdr;
4369 p->p_memsz = bed->s->sizeof_ehdr;
4370 if (m->count > 0)
4371 {
4372 BFD_ASSERT (p->p_type == PT_LOAD);
4373
4374 if (p->p_vaddr < (bfd_vma) off)
4375 {
caf47ea6 4376 (*_bfd_error_handler)
b301b248
AM
4377 (_("%B: Not enough room for program headers, try linking with -N"),
4378 abfd);
252b5132 4379 bfd_set_error (bfd_error_bad_value);
b34976b6 4380 return FALSE;
252b5132
RH
4381 }
4382
4383 p->p_vaddr -= off;
bf988460 4384 if (!m->p_paddr_valid)
252b5132
RH
4385 p->p_paddr -= off;
4386 }
252b5132
RH
4387 }
4388
4389 if (m->includes_phdrs)
4390 {
bf988460 4391 if (!m->p_flags_valid)
252b5132
RH
4392 p->p_flags |= PF_R;
4393
f3520d2f 4394 if (!m->includes_filehdr)
252b5132
RH
4395 {
4396 p->p_offset = bed->s->sizeof_ehdr;
4397
4398 if (m->count > 0)
4399 {
4400 BFD_ASSERT (p->p_type == PT_LOAD);
4401 p->p_vaddr -= off - p->p_offset;
bf988460 4402 if (!m->p_paddr_valid)
252b5132
RH
4403 p->p_paddr -= off - p->p_offset;
4404 }
252b5132
RH
4405 }
4406
4407 p->p_filesz += alloc * bed->s->sizeof_phdr;
4408 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4409 if (m->count)
4410 {
4411 p->p_filesz += header_pad;
4412 p->p_memsz += header_pad;
4413 }
252b5132
RH
4414 }
4415
4416 if (p->p_type == PT_LOAD
4417 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4418 {
bf988460 4419 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4420 p->p_offset = off;
252b5132
RH
4421 else
4422 {
4423 file_ptr adjust;
4424
4425 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4426 if (!no_contents)
4427 p->p_filesz += adjust;
252b5132
RH
4428 p->p_memsz += adjust;
4429 }
4430 }
4431
1ea63fd2
AM
4432 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4433 maps. Set filepos for sections in PT_LOAD segments, and in
4434 core files, for sections in PT_NOTE segments.
4435 assign_file_positions_for_non_load_sections will set filepos
4436 for other sections and update p_filesz for other segments. */
252b5132
RH
4437 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4438 {
4439 asection *sec;
252b5132 4440 bfd_size_type align;
627b32bc 4441 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4442
4443 sec = *secpp;
02bf8d82 4444 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4445 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4446
88967714
AM
4447 if ((p->p_type == PT_LOAD
4448 || p->p_type == PT_TLS)
4449 && (this_hdr->sh_type != SHT_NOBITS
4450 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4451 && ((this_hdr->sh_flags & SHF_TLS) == 0
4452 || p->p_type == PT_TLS))))
252b5132 4453 {
11701589 4454 bfd_signed_vma adjust = sec->vma - (p->p_vaddr + p->p_memsz);
252b5132 4455
88967714 4456 if (adjust < 0)
252b5132 4457 {
88967714 4458 (*_bfd_error_handler)
11701589 4459 (_("%B: section %A vma 0x%lx overlaps previous sections"),
37c43c55 4460 abfd, sec, (unsigned long) sec->vma);
88967714
AM
4461 adjust = 0;
4462 }
4463 p->p_memsz += adjust;
0e922b77 4464
1cfb7d1e
SA
4465 if (p->p_paddr + p->p_memsz != sec->lma)
4466 {
4467 /* This behavior is a compromise--ld has long
4468 silently changed the lma of sections when
4469 lma - vma is not equal for every section in a
4470 pheader--but only in the internal elf structures.
4471 Silently changing the lma is probably a bug, but
4472 changing it would have subtle and unknown
4473 consequences for existing scripts.
4474
4475 Instead modify the bfd data structure to reflect
4476 what happened. This at least fixes the values
4477 for the lma in the mapfile. */
4478 sec->lma = p->p_paddr + p->p_memsz;
4479 }
4480
88967714
AM
4481 if (this_hdr->sh_type != SHT_NOBITS)
4482 {
32812159
AM
4483 if (p->p_filesz + adjust < p->p_memsz)
4484 {
4485 /* We have a PROGBITS section following NOBITS ones.
4486 Allocate file space for the NOBITS section(s) and
4487 zero it. */
4488 adjust = p->p_memsz - p->p_filesz;
4489 if (!write_zeros (abfd, off, adjust))
4490 return FALSE;
4491 }
88967714
AM
4492 off += adjust;
4493 p->p_filesz += adjust;
252b5132 4494 }
252b5132
RH
4495 }
4496
4497 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4498 {
b301b248
AM
4499 /* The section at i == 0 is the one that actually contains
4500 everything. */
4a938328
MS
4501 if (i == 0)
4502 {
627b32bc 4503 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4504 off += this_hdr->sh_size;
4505 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4506 p->p_memsz = 0;
4507 p->p_align = 1;
252b5132 4508 }
4a938328 4509 else
252b5132 4510 {
b301b248 4511 /* The rest are fake sections that shouldn't be written. */
252b5132 4512 sec->filepos = 0;
eea6121a 4513 sec->size = 0;
b301b248
AM
4514 sec->flags = 0;
4515 continue;
252b5132 4516 }
252b5132
RH
4517 }
4518 else
4519 {
b301b248
AM
4520 if (p->p_type == PT_LOAD)
4521 {
02bf8d82
AM
4522 this_hdr->sh_offset = sec->filepos = off;
4523 if (this_hdr->sh_type != SHT_NOBITS)
6a3cd2b4 4524 off += this_hdr->sh_size;
b301b248 4525 }
252b5132 4526
02bf8d82 4527 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4528 {
6a3cd2b4 4529 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4530 /* A load section without SHF_ALLOC is something like
4531 a note section in a PT_NOTE segment. These take
4532 file space but are not loaded into memory. */
4533 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4534 p->p_memsz += this_hdr->sh_size;
b301b248 4535 }
6a3cd2b4 4536 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4537 {
6a3cd2b4
AM
4538 if (p->p_type == PT_TLS)
4539 p->p_memsz += this_hdr->sh_size;
4540
4541 /* .tbss is special. It doesn't contribute to p_memsz of
4542 normal segments. */
4543 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4544 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4545 }
4546
b10a8ae0
L
4547 if (align > p->p_align
4548 && !m->p_align_valid
4549 && (p->p_type != PT_LOAD
4550 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4551 p->p_align = align;
4552 }
4553
bf988460 4554 if (!m->p_flags_valid)
252b5132
RH
4555 {
4556 p->p_flags |= PF_R;
02bf8d82 4557 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4558 p->p_flags |= PF_X;
02bf8d82 4559 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4560 p->p_flags |= PF_W;
4561 }
4562 }
bf988460 4563 off -= off_adjust;
0920dee7 4564
7c928300
AM
4565 /* Check that all sections are in a PT_LOAD segment.
4566 Don't check funky gdb generated core files. */
4567 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
0920dee7
L
4568 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4569 {
4570 Elf_Internal_Shdr *this_hdr;
4571 asection *sec;
4572
4573 sec = *secpp;
4574 this_hdr = &(elf_section_data(sec)->this_hdr);
4575 if (this_hdr->sh_size != 0
4576 && !ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, p))
4577 {
4578 (*_bfd_error_handler)
4579 (_("%B: section `%A' can't be allocated in segment %d"),
4580 abfd, sec, j);
6d33f217 4581 print_segment_map (m);
0920dee7
L
4582 bfd_set_error (bfd_error_bad_value);
4583 return FALSE;
4584 }
4585 }
252b5132
RH
4586 }
4587
f3520d2f
AM
4588 elf_tdata (abfd)->next_file_pos = off;
4589 return TRUE;
4590}
4591
4592/* Assign file positions for the other sections. */
4593
4594static bfd_boolean
4595assign_file_positions_for_non_load_sections (bfd *abfd,
4596 struct bfd_link_info *link_info)
4597{
4598 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4599 Elf_Internal_Shdr **i_shdrpp;
4600 Elf_Internal_Shdr **hdrpp;
4601 Elf_Internal_Phdr *phdrs;
4602 Elf_Internal_Phdr *p;
4603 struct elf_segment_map *m;
4604 bfd_vma filehdr_vaddr, filehdr_paddr;
4605 bfd_vma phdrs_vaddr, phdrs_paddr;
4606 file_ptr off;
4607 unsigned int num_sec;
4608 unsigned int i;
4609 unsigned int count;
4610
5c182d5f
AM
4611 i_shdrpp = elf_elfsections (abfd);
4612 num_sec = elf_numsections (abfd);
f3520d2f 4613 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4614 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4615 {
4616 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4617 Elf_Internal_Shdr *hdr;
4618
4619 hdr = *hdrpp;
4620 if (hdr->bfd_section != NULL
252e386e
AM
4621 && (hdr->bfd_section->filepos != 0
4622 || (hdr->sh_type == SHT_NOBITS
4623 && hdr->contents == NULL)))
627b32bc 4624 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4625 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4626 {
49c13adb
L
4627 if (hdr->sh_size != 0)
4628 ((*_bfd_error_handler)
4629 (_("%B: warning: allocated section `%s' not in segment"),
3ba71138
L
4630 abfd,
4631 (hdr->bfd_section == NULL
4632 ? "*unknown*"
4633 : hdr->bfd_section->name)));
4634 /* We don't need to page align empty sections. */
4635 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4636 off += vma_page_aligned_bias (hdr->sh_addr, off,
4637 bed->maxpagesize);
4638 else
4639 off += vma_page_aligned_bias (hdr->sh_addr, off,
4640 hdr->sh_addralign);
4641 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4642 FALSE);
4643 }
4644 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4645 && hdr->bfd_section == NULL)
4646 || hdr == i_shdrpp[tdata->symtab_section]
4647 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4648 || hdr == i_shdrpp[tdata->strtab_section])
4649 hdr->sh_offset = -1;
4650 else
4651 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4652 }
4653
252b5132
RH
4654 /* Now that we have set the section file positions, we can set up
4655 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4656 count = 0;
4657 filehdr_vaddr = 0;
4658 filehdr_paddr = 0;
4659 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4660 phdrs_paddr = 0;
4661 phdrs = elf_tdata (abfd)->phdr;
4662 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4663 m != NULL;
4664 m = m->next, p++)
4665 {
4666 ++count;
4667 if (p->p_type != PT_LOAD)
4668 continue;
4669
4670 if (m->includes_filehdr)
4671 {
4672 filehdr_vaddr = p->p_vaddr;
4673 filehdr_paddr = p->p_paddr;
4674 }
4675 if (m->includes_phdrs)
4676 {
4677 phdrs_vaddr = p->p_vaddr;
4678 phdrs_paddr = p->p_paddr;
4679 if (m->includes_filehdr)
4680 {
4681 phdrs_vaddr += bed->s->sizeof_ehdr;
4682 phdrs_paddr += bed->s->sizeof_ehdr;
4683 }
4684 }
4685 }
4686
252b5132
RH
4687 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4688 m != NULL;
4689 m = m->next, p++)
4690 {
129af99f 4691 if (p->p_type == PT_GNU_RELRO)
252b5132 4692 {
b84a33b5
AM
4693 const Elf_Internal_Phdr *lp;
4694
129af99f 4695 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
1ea63fd2 4696
129af99f 4697 if (link_info != NULL)
8c37241b 4698 {
129af99f
AS
4699 /* During linking the range of the RELRO segment is passed
4700 in link_info. */
8c37241b
JJ
4701 for (lp = phdrs; lp < phdrs + count; ++lp)
4702 {
4703 if (lp->p_type == PT_LOAD
8c37241b 4704 && lp->p_vaddr >= link_info->relro_start
b84a33b5
AM
4705 && lp->p_vaddr < link_info->relro_end
4706 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end)
8c37241b
JJ
4707 break;
4708 }
8c37241b 4709 }
129af99f
AS
4710 else
4711 {
4712 /* Otherwise we are copying an executable or shared
b84a33b5 4713 library, but we need to use the same linker logic. */
129af99f
AS
4714 for (lp = phdrs; lp < phdrs + count; ++lp)
4715 {
4716 if (lp->p_type == PT_LOAD
4717 && lp->p_paddr == p->p_paddr)
4718 break;
4719 }
b84a33b5
AM
4720 }
4721
4722 if (lp < phdrs + count)
4723 {
4724 p->p_vaddr = lp->p_vaddr;
4725 p->p_paddr = lp->p_paddr;
4726 p->p_offset = lp->p_offset;
4727 if (link_info != NULL)
4728 p->p_filesz = link_info->relro_end - lp->p_vaddr;
4729 else if (m->p_size_valid)
4730 p->p_filesz = m->p_size;
129af99f
AS
4731 else
4732 abort ();
b84a33b5
AM
4733 p->p_memsz = p->p_filesz;
4734 p->p_align = 1;
4735 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 4736 }
9433b9b1 4737 else
b84a33b5
AM
4738 {
4739 memset (p, 0, sizeof *p);
4740 p->p_type = PT_NULL;
4741 }
129af99f
AS
4742 }
4743 else if (m->count != 0)
4744 {
4745 if (p->p_type != PT_LOAD
4746 && (p->p_type != PT_NOTE
4747 || bfd_get_format (abfd) != bfd_core))
4748 {
4749 Elf_Internal_Shdr *hdr;
4750 asection *sect;
4751
4752 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
4753
4754 sect = m->sections[m->count - 1];
4755 hdr = &elf_section_data (sect)->this_hdr;
4756 p->p_filesz = sect->filepos - m->sections[0]->filepos;
4757 if (hdr->sh_type != SHT_NOBITS)
4758 p->p_filesz += hdr->sh_size;
4759 p->p_offset = m->sections[0]->filepos;
4760 }
4761 }
4762 else if (m->includes_filehdr)
4763 {
4764 p->p_vaddr = filehdr_vaddr;
4765 if (! m->p_paddr_valid)
4766 p->p_paddr = filehdr_paddr;
4767 }
4768 else if (m->includes_phdrs)
4769 {
4770 p->p_vaddr = phdrs_vaddr;
4771 if (! m->p_paddr_valid)
4772 p->p_paddr = phdrs_paddr;
252b5132
RH
4773 }
4774 }
4775
252b5132
RH
4776 elf_tdata (abfd)->next_file_pos = off;
4777
b34976b6 4778 return TRUE;
252b5132
RH
4779}
4780
252b5132
RH
4781/* Work out the file positions of all the sections. This is called by
4782 _bfd_elf_compute_section_file_positions. All the section sizes and
4783 VMAs must be known before this is called.
4784
e0638f70
AM
4785 Reloc sections come in two flavours: Those processed specially as
4786 "side-channel" data attached to a section to which they apply, and
4787 those that bfd doesn't process as relocations. The latter sort are
4788 stored in a normal bfd section by bfd_section_from_shdr. We don't
4789 consider the former sort here, unless they form part of the loadable
4790 image. Reloc sections not assigned here will be handled later by
4791 assign_file_positions_for_relocs.
252b5132
RH
4792
4793 We also don't set the positions of the .symtab and .strtab here. */
4794
b34976b6 4795static bfd_boolean
c84fca4d
AO
4796assign_file_positions_except_relocs (bfd *abfd,
4797 struct bfd_link_info *link_info)
252b5132 4798{
5c182d5f
AM
4799 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4800 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 4801 file_ptr off;
9c5bfbb7 4802 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4803
4804 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
4805 && bfd_get_format (abfd) != bfd_core)
4806 {
5c182d5f
AM
4807 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
4808 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
4809 Elf_Internal_Shdr **hdrpp;
4810 unsigned int i;
4811
4812 /* Start after the ELF header. */
4813 off = i_ehdrp->e_ehsize;
4814
4815 /* We are not creating an executable, which means that we are
4816 not creating a program header, and that the actual order of
4817 the sections in the file is unimportant. */
9ad5cbcf 4818 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
4819 {
4820 Elf_Internal_Shdr *hdr;
4821
4822 hdr = *hdrpp;
e0638f70
AM
4823 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4824 && hdr->bfd_section == NULL)
9ad5cbcf
AM
4825 || i == tdata->symtab_section
4826 || i == tdata->symtab_shndx_section
252b5132
RH
4827 || i == tdata->strtab_section)
4828 {
4829 hdr->sh_offset = -1;
252b5132 4830 }
9ad5cbcf 4831 else
b34976b6 4832 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
4833 }
4834 }
4835 else
4836 {
f3520d2f
AM
4837 unsigned int alloc;
4838
252b5132 4839 /* Assign file positions for the loaded sections based on the
08a40648 4840 assignment of sections to segments. */
f3520d2f
AM
4841 if (!assign_file_positions_for_load_sections (abfd, link_info))
4842 return FALSE;
4843
4844 /* And for non-load sections. */
4845 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
4846 return FALSE;
4847
e36284ab
AM
4848 if (bed->elf_backend_modify_program_headers != NULL)
4849 {
4850 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
4851 return FALSE;
4852 }
4853
f3520d2f
AM
4854 /* Write out the program headers. */
4855 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
4856 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
4857 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 4858 return FALSE;
252b5132 4859
5c182d5f 4860 off = tdata->next_file_pos;
252b5132
RH
4861 }
4862
4863 /* Place the section headers. */
45d6a902 4864 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
4865 i_ehdrp->e_shoff = off;
4866 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
4867
5c182d5f 4868 tdata->next_file_pos = off;
252b5132 4869
b34976b6 4870 return TRUE;
252b5132
RH
4871}
4872
b34976b6 4873static bfd_boolean
217aa764 4874prep_headers (bfd *abfd)
252b5132
RH
4875{
4876 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
4877 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
2b0f7ef9 4878 struct elf_strtab_hash *shstrtab;
9c5bfbb7 4879 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4880
4881 i_ehdrp = elf_elfheader (abfd);
252b5132 4882
2b0f7ef9 4883 shstrtab = _bfd_elf_strtab_init ();
252b5132 4884 if (shstrtab == NULL)
b34976b6 4885 return FALSE;
252b5132
RH
4886
4887 elf_shstrtab (abfd) = shstrtab;
4888
4889 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
4890 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
4891 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
4892 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
4893
4894 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
4895 i_ehdrp->e_ident[EI_DATA] =
4896 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
4897 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
4898
252b5132
RH
4899 if ((abfd->flags & DYNAMIC) != 0)
4900 i_ehdrp->e_type = ET_DYN;
4901 else if ((abfd->flags & EXEC_P) != 0)
4902 i_ehdrp->e_type = ET_EXEC;
4903 else if (bfd_get_format (abfd) == bfd_core)
4904 i_ehdrp->e_type = ET_CORE;
4905 else
4906 i_ehdrp->e_type = ET_REL;
4907
4908 switch (bfd_get_arch (abfd))
4909 {
4910 case bfd_arch_unknown:
4911 i_ehdrp->e_machine = EM_NONE;
4912 break;
aa4f99bb
AO
4913
4914 /* There used to be a long list of cases here, each one setting
4915 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
4916 in the corresponding bfd definition. To avoid duplication,
4917 the switch was removed. Machines that need special handling
4918 can generally do it in elf_backend_final_write_processing(),
4919 unless they need the information earlier than the final write.
4920 Such need can generally be supplied by replacing the tests for
4921 e_machine with the conditions used to determine it. */
252b5132 4922 default:
9c5bfbb7
AM
4923 i_ehdrp->e_machine = bed->elf_machine_code;
4924 }
aa4f99bb 4925
252b5132
RH
4926 i_ehdrp->e_version = bed->s->ev_current;
4927 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
4928
c044fabd 4929 /* No program header, for now. */
252b5132
RH
4930 i_ehdrp->e_phoff = 0;
4931 i_ehdrp->e_phentsize = 0;
4932 i_ehdrp->e_phnum = 0;
4933
c044fabd 4934 /* Each bfd section is section header entry. */
252b5132
RH
4935 i_ehdrp->e_entry = bfd_get_start_address (abfd);
4936 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
4937
c044fabd 4938 /* If we're building an executable, we'll need a program header table. */
252b5132 4939 if (abfd->flags & EXEC_P)
0e71e495
BE
4940 /* It all happens later. */
4941 ;
252b5132
RH
4942 else
4943 {
4944 i_ehdrp->e_phentsize = 0;
4945 i_phdrp = 0;
4946 i_ehdrp->e_phoff = 0;
4947 }
4948
4949 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 4950 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 4951 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 4952 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 4953 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 4954 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
4955 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4956 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
4957 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 4958 return FALSE;
252b5132 4959
b34976b6 4960 return TRUE;
252b5132
RH
4961}
4962
4963/* Assign file positions for all the reloc sections which are not part
4964 of the loadable file image. */
4965
4966void
217aa764 4967_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
4968{
4969 file_ptr off;
9ad5cbcf 4970 unsigned int i, num_sec;
252b5132
RH
4971 Elf_Internal_Shdr **shdrpp;
4972
4973 off = elf_tdata (abfd)->next_file_pos;
4974
9ad5cbcf
AM
4975 num_sec = elf_numsections (abfd);
4976 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
4977 {
4978 Elf_Internal_Shdr *shdrp;
4979
4980 shdrp = *shdrpp;
4981 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
4982 && shdrp->sh_offset == -1)
b34976b6 4983 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
4984 }
4985
4986 elf_tdata (abfd)->next_file_pos = off;
4987}
4988
b34976b6 4989bfd_boolean
217aa764 4990_bfd_elf_write_object_contents (bfd *abfd)
252b5132 4991{
9c5bfbb7 4992 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
4993 Elf_Internal_Ehdr *i_ehdrp;
4994 Elf_Internal_Shdr **i_shdrp;
b34976b6 4995 bfd_boolean failed;
9ad5cbcf 4996 unsigned int count, num_sec;
252b5132
RH
4997
4998 if (! abfd->output_has_begun
217aa764 4999 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5000 return FALSE;
252b5132
RH
5001
5002 i_shdrp = elf_elfsections (abfd);
5003 i_ehdrp = elf_elfheader (abfd);
5004
b34976b6 5005 failed = FALSE;
252b5132
RH
5006 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5007 if (failed)
b34976b6 5008 return FALSE;
252b5132
RH
5009
5010 _bfd_elf_assign_file_positions_for_relocs (abfd);
5011
c044fabd 5012 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5013 num_sec = elf_numsections (abfd);
5014 for (count = 1; count < num_sec; count++)
252b5132
RH
5015 {
5016 if (bed->elf_backend_section_processing)
5017 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5018 if (i_shdrp[count]->contents)
5019 {
dc810e39
AM
5020 bfd_size_type amt = i_shdrp[count]->sh_size;
5021
252b5132 5022 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5023 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5024 return FALSE;
252b5132
RH
5025 }
5026 }
5027
5028 /* Write out the section header names. */
26ae6d5e
DJ
5029 if (elf_shstrtab (abfd) != NULL
5030 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5031 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5032 return FALSE;
252b5132
RH
5033
5034 if (bed->elf_backend_final_write_processing)
5035 (*bed->elf_backend_final_write_processing) (abfd,
5036 elf_tdata (abfd)->linker);
5037
ff59fc36
RM
5038 if (!bed->s->write_shdrs_and_ehdr (abfd))
5039 return FALSE;
5040
5041 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
5042 if (elf_tdata (abfd)->after_write_object_contents)
5043 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
5044
5045 return TRUE;
252b5132
RH
5046}
5047
b34976b6 5048bfd_boolean
217aa764 5049_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5050{
c044fabd 5051 /* Hopefully this can be done just like an object file. */
252b5132
RH
5052 return _bfd_elf_write_object_contents (abfd);
5053}
c044fabd
KH
5054
5055/* Given a section, search the header to find them. */
5056
cb33740c 5057unsigned int
198beae2 5058_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5059{
9c5bfbb7 5060 const struct elf_backend_data *bed;
91d6fa6a 5061 unsigned int sec_index;
252b5132 5062
9ad5cbcf
AM
5063 if (elf_section_data (asect) != NULL
5064 && elf_section_data (asect)->this_idx != 0)
5065 return elf_section_data (asect)->this_idx;
5066
5067 if (bfd_is_abs_section (asect))
91d6fa6a 5068 sec_index = SHN_ABS;
af746e92 5069 else if (bfd_is_com_section (asect))
91d6fa6a 5070 sec_index = SHN_COMMON;
af746e92 5071 else if (bfd_is_und_section (asect))
91d6fa6a 5072 sec_index = SHN_UNDEF;
af746e92 5073 else
91d6fa6a 5074 sec_index = SHN_BAD;
252b5132 5075
af746e92 5076 bed = get_elf_backend_data (abfd);
252b5132
RH
5077 if (bed->elf_backend_section_from_bfd_section)
5078 {
91d6fa6a 5079 int retval = sec_index;
9ad5cbcf 5080
af746e92
AM
5081 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5082 return retval;
252b5132
RH
5083 }
5084
91d6fa6a 5085 if (sec_index == SHN_BAD)
af746e92 5086 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5087
91d6fa6a 5088 return sec_index;
252b5132
RH
5089}
5090
5091/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5092 on error. */
5093
5094int
217aa764 5095_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5096{
5097 asymbol *asym_ptr = *asym_ptr_ptr;
5098 int idx;
5099 flagword flags = asym_ptr->flags;
5100
5101 /* When gas creates relocations against local labels, it creates its
5102 own symbol for the section, but does put the symbol into the
5103 symbol chain, so udata is 0. When the linker is generating
5104 relocatable output, this section symbol may be for one of the
5105 input sections rather than the output section. */
5106 if (asym_ptr->udata.i == 0
5107 && (flags & BSF_SECTION_SYM)
5108 && asym_ptr->section)
5109 {
5372391b 5110 asection *sec;
252b5132
RH
5111 int indx;
5112
5372391b
AM
5113 sec = asym_ptr->section;
5114 if (sec->owner != abfd && sec->output_section != NULL)
5115 sec = sec->output_section;
5116 if (sec->owner == abfd
5117 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5118 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5119 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5120 }
5121
5122 idx = asym_ptr->udata.i;
5123
5124 if (idx == 0)
5125 {
5126 /* This case can occur when using --strip-symbol on a symbol
08a40648 5127 which is used in a relocation entry. */
252b5132 5128 (*_bfd_error_handler)
d003868e
AM
5129 (_("%B: symbol `%s' required but not present"),
5130 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5131 bfd_set_error (bfd_error_no_symbols);
5132 return -1;
5133 }
5134
5135#if DEBUG & 4
5136 {
5137 fprintf (stderr,
661a3fd4 5138 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx%s\n",
252b5132
RH
5139 (long) asym_ptr, asym_ptr->name, idx, flags,
5140 elf_symbol_flags (flags));
5141 fflush (stderr);
5142 }
5143#endif
5144
5145 return idx;
5146}
5147
84d1d650 5148/* Rewrite program header information. */
252b5132 5149
b34976b6 5150static bfd_boolean
84d1d650 5151rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5152{
b34976b6
AM
5153 Elf_Internal_Ehdr *iehdr;
5154 struct elf_segment_map *map;
5155 struct elf_segment_map *map_first;
5156 struct elf_segment_map **pointer_to_map;
5157 Elf_Internal_Phdr *segment;
5158 asection *section;
5159 unsigned int i;
5160 unsigned int num_segments;
5161 bfd_boolean phdr_included = FALSE;
5c44b38e 5162 bfd_boolean p_paddr_valid;
b34976b6
AM
5163 bfd_vma maxpagesize;
5164 struct elf_segment_map *phdr_adjust_seg = NULL;
5165 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5166 const struct elf_backend_data *bed;
bc67d8a6 5167
caf47ea6 5168 bed = get_elf_backend_data (ibfd);
252b5132
RH
5169 iehdr = elf_elfheader (ibfd);
5170
bc67d8a6 5171 map_first = NULL;
c044fabd 5172 pointer_to_map = &map_first;
252b5132
RH
5173
5174 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5175 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5176
5177 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5178#define SEGMENT_END(segment, start) \
5179 (start + (segment->p_memsz > segment->p_filesz \
5180 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5181
eecdbe52
JJ
5182#define SECTION_SIZE(section, segment) \
5183 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5184 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5185 ? section->size : 0)
eecdbe52 5186
b34976b6 5187 /* Returns TRUE if the given section is contained within
bc67d8a6 5188 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5189#define IS_CONTAINED_BY_VMA(section, segment) \
5190 (section->vma >= segment->p_vaddr \
eecdbe52 5191 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5192 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5193
b34976b6 5194 /* Returns TRUE if the given section is contained within
bc67d8a6 5195 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5196#define IS_CONTAINED_BY_LMA(section, segment, base) \
5197 (section->lma >= base \
eecdbe52 5198 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5199 <= SEGMENT_END (segment, base)))
252b5132 5200
0efc80c8
L
5201 /* Handle PT_NOTE segment. */
5202#define IS_NOTE(p, s) \
aecc8f8a 5203 (p->p_type == PT_NOTE \
0efc80c8 5204 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5205 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5206 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5207 <= p->p_offset + p->p_filesz))
252b5132 5208
0efc80c8
L
5209 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5210 etc. */
5211#define IS_COREFILE_NOTE(p, s) \
5212 (IS_NOTE (p, s) \
5213 && bfd_get_format (ibfd) == bfd_core \
5214 && s->vma == 0 \
5215 && s->lma == 0)
5216
252b5132
RH
5217 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5218 linker, which generates a PT_INTERP section with p_vaddr and
5219 p_memsz set to 0. */
aecc8f8a
AM
5220#define IS_SOLARIS_PT_INTERP(p, s) \
5221 (p->p_vaddr == 0 \
5222 && p->p_paddr == 0 \
5223 && p->p_memsz == 0 \
5224 && p->p_filesz > 0 \
5225 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5226 && s->size > 0 \
aecc8f8a 5227 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5228 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5229 <= p->p_offset + p->p_filesz))
5c440b1e 5230
bc67d8a6
NC
5231 /* Decide if the given section should be included in the given segment.
5232 A section will be included if:
f5ffc919 5233 1. It is within the address space of the segment -- we use the LMA
08a40648 5234 if that is set for the segment and the VMA otherwise,
0efc80c8
L
5235 2. It is an allocated section or a NOTE section in a PT_NOTE
5236 segment.
bc67d8a6 5237 3. There is an output section associated with it,
eecdbe52 5238 4. The section has not already been allocated to a previous segment.
2b05f1b7 5239 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5240 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5241 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5242 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5243 (with the possible exception of .dynamic). */
9f17e2a6 5244#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5245 ((((segment->p_paddr \
5246 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5247 : IS_CONTAINED_BY_VMA (section, segment)) \
5248 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5249 || IS_NOTE (segment, section)) \
2b05f1b7
L
5250 && segment->p_type != PT_GNU_STACK \
5251 && (segment->p_type != PT_TLS \
5252 || (section->flags & SEC_THREAD_LOCAL)) \
5253 && (segment->p_type == PT_LOAD \
5254 || segment->p_type == PT_TLS \
5255 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5256 && (segment->p_type != PT_DYNAMIC \
5257 || SECTION_SIZE (section, segment) > 0 \
5258 || (segment->p_paddr \
5259 ? segment->p_paddr != section->lma \
5260 : segment->p_vaddr != section->vma) \
5261 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5262 == 0)) \
0067a569 5263 && !section->segment_mark)
bc67d8a6 5264
9f17e2a6
L
5265/* If the output section of a section in the input segment is NULL,
5266 it is removed from the corresponding output segment. */
5267#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5268 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5269 && section->output_section != NULL)
5270
b34976b6 5271 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5272#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5273 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5274
5275 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5276 their VMA address ranges and their LMA address ranges overlap.
5277 It is possible to have overlapping VMA ranges without overlapping LMA
5278 ranges. RedBoot images for example can have both .data and .bss mapped
5279 to the same VMA range, but with the .data section mapped to a different
5280 LMA. */
aecc8f8a 5281#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5282 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5283 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5284 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5285 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5286
5287 /* Initialise the segment mark field. */
5288 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5289 section->segment_mark = FALSE;
bc67d8a6 5290
5c44b38e
AM
5291 /* The Solaris linker creates program headers in which all the
5292 p_paddr fields are zero. When we try to objcopy or strip such a
5293 file, we get confused. Check for this case, and if we find it
5294 don't set the p_paddr_valid fields. */
5295 p_paddr_valid = FALSE;
5296 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5297 i < num_segments;
5298 i++, segment++)
5299 if (segment->p_paddr != 0)
5300 {
5301 p_paddr_valid = TRUE;
5302 break;
5303 }
5304
252b5132 5305 /* Scan through the segments specified in the program header
bc67d8a6 5306 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5307 in the loadable segments. These can be created by weird
aecc8f8a 5308 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5309 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5310 i < num_segments;
c044fabd 5311 i++, segment++)
252b5132 5312 {
252b5132 5313 unsigned int j;
c044fabd 5314 Elf_Internal_Phdr *segment2;
252b5132 5315
aecc8f8a
AM
5316 if (segment->p_type == PT_INTERP)
5317 for (section = ibfd->sections; section; section = section->next)
5318 if (IS_SOLARIS_PT_INTERP (segment, section))
5319 {
5320 /* Mininal change so that the normal section to segment
4cc11e76 5321 assignment code will work. */
aecc8f8a
AM
5322 segment->p_vaddr = section->vma;
5323 break;
5324 }
5325
bc67d8a6 5326 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5327 {
5328 /* Remove PT_GNU_RELRO segment. */
5329 if (segment->p_type == PT_GNU_RELRO)
5330 segment->p_type = PT_NULL;
5331 continue;
5332 }
c044fabd 5333
bc67d8a6 5334 /* Determine if this segment overlaps any previous segments. */
0067a569 5335 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5336 {
5337 bfd_signed_vma extra_length;
c044fabd 5338
bc67d8a6 5339 if (segment2->p_type != PT_LOAD
0067a569 5340 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5341 continue;
c044fabd 5342
bc67d8a6
NC
5343 /* Merge the two segments together. */
5344 if (segment2->p_vaddr < segment->p_vaddr)
5345 {
c044fabd 5346 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5347 SEGMENT. */
0067a569
AM
5348 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5349 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5350
bc67d8a6
NC
5351 if (extra_length > 0)
5352 {
0067a569 5353 segment2->p_memsz += extra_length;
bc67d8a6
NC
5354 segment2->p_filesz += extra_length;
5355 }
c044fabd 5356
bc67d8a6 5357 segment->p_type = PT_NULL;
c044fabd 5358
bc67d8a6
NC
5359 /* Since we have deleted P we must restart the outer loop. */
5360 i = 0;
5361 segment = elf_tdata (ibfd)->phdr;
5362 break;
5363 }
5364 else
5365 {
c044fabd 5366 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5367 SEGMENT2. */
0067a569
AM
5368 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5369 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5370
bc67d8a6
NC
5371 if (extra_length > 0)
5372 {
0067a569 5373 segment->p_memsz += extra_length;
bc67d8a6
NC
5374 segment->p_filesz += extra_length;
5375 }
c044fabd 5376
bc67d8a6
NC
5377 segment2->p_type = PT_NULL;
5378 }
5379 }
5380 }
c044fabd 5381
bc67d8a6
NC
5382 /* The second scan attempts to assign sections to segments. */
5383 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5384 i < num_segments;
0067a569 5385 i++, segment++)
bc67d8a6 5386 {
0067a569
AM
5387 unsigned int section_count;
5388 asection **sections;
5389 asection *output_section;
5390 unsigned int isec;
5391 bfd_vma matching_lma;
5392 bfd_vma suggested_lma;
5393 unsigned int j;
dc810e39 5394 bfd_size_type amt;
0067a569
AM
5395 asection *first_section;
5396 bfd_boolean first_matching_lma;
5397 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5398
5399 if (segment->p_type == PT_NULL)
5400 continue;
c044fabd 5401
9f17e2a6 5402 first_section = NULL;
bc67d8a6 5403 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5404 for (section = ibfd->sections, section_count = 0;
5405 section != NULL;
5406 section = section->next)
9f17e2a6
L
5407 {
5408 /* Find the first section in the input segment, which may be
5409 removed from the corresponding output segment. */
5410 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5411 {
5412 if (first_section == NULL)
5413 first_section = section;
5414 if (section->output_section != NULL)
5415 ++section_count;
5416 }
5417 }
811072d8 5418
b5f852ea
NC
5419 /* Allocate a segment map big enough to contain
5420 all of the sections we have selected. */
dc810e39
AM
5421 amt = sizeof (struct elf_segment_map);
5422 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5423 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5424 if (map == NULL)
b34976b6 5425 return FALSE;
252b5132
RH
5426
5427 /* Initialise the fields of the segment map. Default to
5428 using the physical address of the segment in the input BFD. */
0067a569
AM
5429 map->next = NULL;
5430 map->p_type = segment->p_type;
5431 map->p_flags = segment->p_flags;
bc67d8a6 5432 map->p_flags_valid = 1;
55d55ac7 5433
9f17e2a6
L
5434 /* If the first section in the input segment is removed, there is
5435 no need to preserve segment physical address in the corresponding
5436 output segment. */
945c025a 5437 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5438 {
5439 map->p_paddr = segment->p_paddr;
5c44b38e 5440 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5441 }
252b5132
RH
5442
5443 /* Determine if this segment contains the ELF file header
5444 and if it contains the program headers themselves. */
bc67d8a6
NC
5445 map->includes_filehdr = (segment->p_offset == 0
5446 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5447 map->includes_phdrs = 0;
252b5132 5448
0067a569 5449 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5450 {
bc67d8a6
NC
5451 map->includes_phdrs =
5452 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5453 && (segment->p_offset + segment->p_filesz
252b5132
RH
5454 >= ((bfd_vma) iehdr->e_phoff
5455 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5456
bc67d8a6 5457 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5458 phdr_included = TRUE;
252b5132
RH
5459 }
5460
bc67d8a6 5461 if (section_count == 0)
252b5132
RH
5462 {
5463 /* Special segments, such as the PT_PHDR segment, may contain
5464 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5465 something. They are allowed by the ELF spec however, so only
5466 a warning is produced. */
bc67d8a6 5467 if (segment->p_type == PT_LOAD)
0067a569
AM
5468 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5469 " detected, is this intentional ?\n"),
5470 ibfd);
252b5132 5471
bc67d8a6 5472 map->count = 0;
c044fabd
KH
5473 *pointer_to_map = map;
5474 pointer_to_map = &map->next;
252b5132
RH
5475
5476 continue;
5477 }
5478
5479 /* Now scan the sections in the input BFD again and attempt
5480 to add their corresponding output sections to the segment map.
5481 The problem here is how to handle an output section which has
5482 been moved (ie had its LMA changed). There are four possibilities:
5483
5484 1. None of the sections have been moved.
5485 In this case we can continue to use the segment LMA from the
5486 input BFD.
5487
5488 2. All of the sections have been moved by the same amount.
5489 In this case we can change the segment's LMA to match the LMA
5490 of the first section.
5491
5492 3. Some of the sections have been moved, others have not.
5493 In this case those sections which have not been moved can be
5494 placed in the current segment which will have to have its size,
5495 and possibly its LMA changed, and a new segment or segments will
5496 have to be created to contain the other sections.
5497
b5f852ea 5498 4. The sections have been moved, but not by the same amount.
252b5132
RH
5499 In this case we can change the segment's LMA to match the LMA
5500 of the first section and we will have to create a new segment
5501 or segments to contain the other sections.
5502
5503 In order to save time, we allocate an array to hold the section
5504 pointers that we are interested in. As these sections get assigned
5505 to a segment, they are removed from this array. */
5506
a50b1753 5507 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5508 if (sections == NULL)
b34976b6 5509 return FALSE;
252b5132
RH
5510
5511 /* Step One: Scan for segment vs section LMA conflicts.
5512 Also add the sections to the section array allocated above.
5513 Also add the sections to the current segment. In the common
5514 case, where the sections have not been moved, this means that
5515 we have completely filled the segment, and there is nothing
5516 more to do. */
252b5132 5517 isec = 0;
72730e0c 5518 matching_lma = 0;
252b5132 5519 suggested_lma = 0;
0067a569
AM
5520 first_matching_lma = TRUE;
5521 first_suggested_lma = TRUE;
252b5132 5522
147d51c2 5523 for (section = ibfd->sections;
bc67d8a6
NC
5524 section != NULL;
5525 section = section->next)
147d51c2
L
5526 if (section == first_section)
5527 break;
5528
5529 for (j = 0; section != NULL; section = section->next)
252b5132 5530 {
caf47ea6 5531 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5532 {
bc67d8a6
NC
5533 output_section = section->output_section;
5534
0067a569 5535 sections[j++] = section;
252b5132
RH
5536
5537 /* The Solaris native linker always sets p_paddr to 0.
5538 We try to catch that case here, and set it to the
5e8d7549
NC
5539 correct value. Note - some backends require that
5540 p_paddr be left as zero. */
5c44b38e 5541 if (!p_paddr_valid
4455705d 5542 && segment->p_vaddr != 0
0067a569 5543 && !bed->want_p_paddr_set_to_zero
252b5132 5544 && isec == 0
bc67d8a6 5545 && output_section->lma != 0
0067a569
AM
5546 && output_section->vma == (segment->p_vaddr
5547 + (map->includes_filehdr
5548 ? iehdr->e_ehsize
5549 : 0)
5550 + (map->includes_phdrs
5551 ? (iehdr->e_phnum
5552 * iehdr->e_phentsize)
5553 : 0)))
bc67d8a6 5554 map->p_paddr = segment->p_vaddr;
252b5132
RH
5555
5556 /* Match up the physical address of the segment with the
5557 LMA address of the output section. */
bc67d8a6 5558 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5559 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5560 || (bed->want_p_paddr_set_to_zero
5561 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5562 {
0067a569
AM
5563 if (first_matching_lma || output_section->lma < matching_lma)
5564 {
5565 matching_lma = output_section->lma;
5566 first_matching_lma = FALSE;
5567 }
252b5132
RH
5568
5569 /* We assume that if the section fits within the segment
bc67d8a6 5570 then it does not overlap any other section within that
252b5132 5571 segment. */
0067a569
AM
5572 map->sections[isec++] = output_section;
5573 }
5574 else if (first_suggested_lma)
5575 {
5576 suggested_lma = output_section->lma;
5577 first_suggested_lma = FALSE;
252b5132 5578 }
147d51c2
L
5579
5580 if (j == section_count)
5581 break;
252b5132
RH
5582 }
5583 }
5584
bc67d8a6 5585 BFD_ASSERT (j == section_count);
252b5132
RH
5586
5587 /* Step Two: Adjust the physical address of the current segment,
5588 if necessary. */
bc67d8a6 5589 if (isec == section_count)
252b5132
RH
5590 {
5591 /* All of the sections fitted within the segment as currently
5592 specified. This is the default case. Add the segment to
5593 the list of built segments and carry on to process the next
5594 program header in the input BFD. */
bc67d8a6 5595 map->count = section_count;
c044fabd
KH
5596 *pointer_to_map = map;
5597 pointer_to_map = &map->next;
08a40648 5598
5c44b38e
AM
5599 if (p_paddr_valid
5600 && !bed->want_p_paddr_set_to_zero
147d51c2 5601 && matching_lma != map->p_paddr
5c44b38e
AM
5602 && !map->includes_filehdr
5603 && !map->includes_phdrs)
3271a814
NS
5604 /* There is some padding before the first section in the
5605 segment. So, we must account for that in the output
5606 segment's vma. */
5607 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5608
252b5132
RH
5609 free (sections);
5610 continue;
5611 }
252b5132
RH
5612 else
5613 {
0067a569 5614 if (!first_matching_lma)
72730e0c
AM
5615 {
5616 /* At least one section fits inside the current segment.
5617 Keep it, but modify its physical address to match the
5618 LMA of the first section that fitted. */
bc67d8a6 5619 map->p_paddr = matching_lma;
72730e0c
AM
5620 }
5621 else
5622 {
5623 /* None of the sections fitted inside the current segment.
5624 Change the current segment's physical address to match
5625 the LMA of the first section. */
bc67d8a6 5626 map->p_paddr = suggested_lma;
72730e0c
AM
5627 }
5628
bc67d8a6
NC
5629 /* Offset the segment physical address from the lma
5630 to allow for space taken up by elf headers. */
5631 if (map->includes_filehdr)
010c8431
AM
5632 {
5633 if (map->p_paddr >= iehdr->e_ehsize)
5634 map->p_paddr -= iehdr->e_ehsize;
5635 else
5636 {
5637 map->includes_filehdr = FALSE;
5638 map->includes_phdrs = FALSE;
5639 }
5640 }
252b5132 5641
bc67d8a6
NC
5642 if (map->includes_phdrs)
5643 {
010c8431
AM
5644 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5645 {
5646 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5647
5648 /* iehdr->e_phnum is just an estimate of the number
5649 of program headers that we will need. Make a note
5650 here of the number we used and the segment we chose
5651 to hold these headers, so that we can adjust the
5652 offset when we know the correct value. */
5653 phdr_adjust_num = iehdr->e_phnum;
5654 phdr_adjust_seg = map;
5655 }
5656 else
5657 map->includes_phdrs = FALSE;
bc67d8a6 5658 }
252b5132
RH
5659 }
5660
5661 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5662 those that fit to the current segment and removing them from the
252b5132
RH
5663 sections array; but making sure not to leave large gaps. Once all
5664 possible sections have been assigned to the current segment it is
5665 added to the list of built segments and if sections still remain
5666 to be assigned, a new segment is constructed before repeating
5667 the loop. */
5668 isec = 0;
5669 do
5670 {
bc67d8a6 5671 map->count = 0;
252b5132 5672 suggested_lma = 0;
0067a569 5673 first_suggested_lma = TRUE;
252b5132
RH
5674
5675 /* Fill the current segment with sections that fit. */
bc67d8a6 5676 for (j = 0; j < section_count; j++)
252b5132 5677 {
bc67d8a6 5678 section = sections[j];
252b5132 5679
bc67d8a6 5680 if (section == NULL)
252b5132
RH
5681 continue;
5682
bc67d8a6 5683 output_section = section->output_section;
252b5132 5684
bc67d8a6 5685 BFD_ASSERT (output_section != NULL);
c044fabd 5686
bc67d8a6
NC
5687 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5688 || IS_COREFILE_NOTE (segment, section))
252b5132 5689 {
bc67d8a6 5690 if (map->count == 0)
252b5132
RH
5691 {
5692 /* If the first section in a segment does not start at
bc67d8a6
NC
5693 the beginning of the segment, then something is
5694 wrong. */
0067a569
AM
5695 if (output_section->lma
5696 != (map->p_paddr
5697 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5698 + (map->includes_phdrs
5699 ? iehdr->e_phnum * iehdr->e_phentsize
5700 : 0)))
252b5132
RH
5701 abort ();
5702 }
5703 else
5704 {
0067a569 5705 asection *prev_sec;
252b5132 5706
bc67d8a6 5707 prev_sec = map->sections[map->count - 1];
252b5132
RH
5708
5709 /* If the gap between the end of the previous section
bc67d8a6
NC
5710 and the start of this section is more than
5711 maxpagesize then we need to start a new segment. */
eea6121a 5712 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 5713 maxpagesize)
caf47ea6 5714 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 5715 || (prev_sec->lma + prev_sec->size
079e9a2f 5716 > output_section->lma))
252b5132 5717 {
0067a569
AM
5718 if (first_suggested_lma)
5719 {
5720 suggested_lma = output_section->lma;
5721 first_suggested_lma = FALSE;
5722 }
252b5132
RH
5723
5724 continue;
5725 }
5726 }
5727
bc67d8a6 5728 map->sections[map->count++] = output_section;
252b5132
RH
5729 ++isec;
5730 sections[j] = NULL;
b34976b6 5731 section->segment_mark = TRUE;
252b5132 5732 }
0067a569
AM
5733 else if (first_suggested_lma)
5734 {
5735 suggested_lma = output_section->lma;
5736 first_suggested_lma = FALSE;
5737 }
252b5132
RH
5738 }
5739
bc67d8a6 5740 BFD_ASSERT (map->count > 0);
252b5132
RH
5741
5742 /* Add the current segment to the list of built segments. */
c044fabd
KH
5743 *pointer_to_map = map;
5744 pointer_to_map = &map->next;
252b5132 5745
bc67d8a6 5746 if (isec < section_count)
252b5132
RH
5747 {
5748 /* We still have not allocated all of the sections to
5749 segments. Create a new segment here, initialise it
5750 and carry on looping. */
dc810e39
AM
5751 amt = sizeof (struct elf_segment_map);
5752 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5753 map = (struct elf_segment_map *) bfd_alloc (obfd, amt);
bc67d8a6 5754 if (map == NULL)
5ed6aba4
NC
5755 {
5756 free (sections);
5757 return FALSE;
5758 }
252b5132
RH
5759
5760 /* Initialise the fields of the segment map. Set the physical
5761 physical address to the LMA of the first section that has
5762 not yet been assigned. */
0067a569
AM
5763 map->next = NULL;
5764 map->p_type = segment->p_type;
5765 map->p_flags = segment->p_flags;
5766 map->p_flags_valid = 1;
5767 map->p_paddr = suggested_lma;
5c44b38e 5768 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 5769 map->includes_filehdr = 0;
0067a569 5770 map->includes_phdrs = 0;
252b5132
RH
5771 }
5772 }
bc67d8a6 5773 while (isec < section_count);
252b5132
RH
5774
5775 free (sections);
5776 }
5777
bc67d8a6
NC
5778 elf_tdata (obfd)->segment_map = map_first;
5779
5780 /* If we had to estimate the number of program headers that were
9ad5cbcf 5781 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
5782 the offset if necessary. */
5783 if (phdr_adjust_seg != NULL)
5784 {
5785 unsigned int count;
c044fabd 5786
bc67d8a6 5787 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 5788 count++;
252b5132 5789
bc67d8a6
NC
5790 if (count > phdr_adjust_num)
5791 phdr_adjust_seg->p_paddr
5792 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
5793 }
c044fabd 5794
bc67d8a6 5795#undef SEGMENT_END
eecdbe52 5796#undef SECTION_SIZE
bc67d8a6
NC
5797#undef IS_CONTAINED_BY_VMA
5798#undef IS_CONTAINED_BY_LMA
0efc80c8 5799#undef IS_NOTE
252b5132 5800#undef IS_COREFILE_NOTE
bc67d8a6 5801#undef IS_SOLARIS_PT_INTERP
9f17e2a6 5802#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
5803#undef INCLUDE_SECTION_IN_SEGMENT
5804#undef SEGMENT_AFTER_SEGMENT
5805#undef SEGMENT_OVERLAPS
b34976b6 5806 return TRUE;
252b5132
RH
5807}
5808
84d1d650
L
5809/* Copy ELF program header information. */
5810
5811static bfd_boolean
5812copy_elf_program_header (bfd *ibfd, bfd *obfd)
5813{
5814 Elf_Internal_Ehdr *iehdr;
5815 struct elf_segment_map *map;
5816 struct elf_segment_map *map_first;
5817 struct elf_segment_map **pointer_to_map;
5818 Elf_Internal_Phdr *segment;
5819 unsigned int i;
5820 unsigned int num_segments;
5821 bfd_boolean phdr_included = FALSE;
88967714 5822 bfd_boolean p_paddr_valid;
84d1d650
L
5823
5824 iehdr = elf_elfheader (ibfd);
5825
5826 map_first = NULL;
5827 pointer_to_map = &map_first;
5828
88967714
AM
5829 /* If all the segment p_paddr fields are zero, don't set
5830 map->p_paddr_valid. */
5831 p_paddr_valid = FALSE;
84d1d650 5832 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
5833 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5834 i < num_segments;
5835 i++, segment++)
5836 if (segment->p_paddr != 0)
5837 {
5838 p_paddr_valid = TRUE;
5839 break;
5840 }
5841
84d1d650
L
5842 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5843 i < num_segments;
5844 i++, segment++)
5845 {
5846 asection *section;
5847 unsigned int section_count;
5848 bfd_size_type amt;
5849 Elf_Internal_Shdr *this_hdr;
53020534 5850 asection *first_section = NULL;
c981028a 5851 asection *lowest_section = NULL;
84d1d650 5852
84d1d650
L
5853 /* Compute how many sections are in this segment. */
5854 for (section = ibfd->sections, section_count = 0;
5855 section != NULL;
5856 section = section->next)
5857 {
5858 this_hdr = &(elf_section_data(section)->this_hdr);
5859 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
3271a814 5860 {
53020534 5861 if (!first_section)
c981028a
DJ
5862 first_section = lowest_section = section;
5863 if (section->lma < lowest_section->lma)
5864 lowest_section = section;
3271a814
NS
5865 section_count++;
5866 }
84d1d650
L
5867 }
5868
5869 /* Allocate a segment map big enough to contain
5870 all of the sections we have selected. */
5871 amt = sizeof (struct elf_segment_map);
5872 if (section_count != 0)
5873 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5874 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
5875 if (map == NULL)
5876 return FALSE;
5877
5878 /* Initialize the fields of the output segment map with the
5879 input segment. */
5880 map->next = NULL;
5881 map->p_type = segment->p_type;
5882 map->p_flags = segment->p_flags;
5883 map->p_flags_valid = 1;
5884 map->p_paddr = segment->p_paddr;
88967714 5885 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
5886 map->p_align = segment->p_align;
5887 map->p_align_valid = 1;
3271a814 5888 map->p_vaddr_offset = 0;
84d1d650 5889
9433b9b1 5890 if (map->p_type == PT_GNU_RELRO)
b10a8ae0
L
5891 {
5892 /* The PT_GNU_RELRO segment may contain the first a few
5893 bytes in the .got.plt section even if the whole .got.plt
5894 section isn't in the PT_GNU_RELRO segment. We won't
5895 change the size of the PT_GNU_RELRO segment. */
9433b9b1 5896 map->p_size = segment->p_memsz;
b10a8ae0
L
5897 map->p_size_valid = 1;
5898 }
5899
84d1d650
L
5900 /* Determine if this segment contains the ELF file header
5901 and if it contains the program headers themselves. */
5902 map->includes_filehdr = (segment->p_offset == 0
5903 && segment->p_filesz >= iehdr->e_ehsize);
5904
5905 map->includes_phdrs = 0;
5906 if (! phdr_included || segment->p_type != PT_LOAD)
5907 {
5908 map->includes_phdrs =
5909 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5910 && (segment->p_offset + segment->p_filesz
5911 >= ((bfd_vma) iehdr->e_phoff
5912 + iehdr->e_phnum * iehdr->e_phentsize)));
5913
5914 if (segment->p_type == PT_LOAD && map->includes_phdrs)
5915 phdr_included = TRUE;
5916 }
5917
2b0bc088
NC
5918 if (map->includes_filehdr && first_section)
5919 /* We need to keep the space used by the headers fixed. */
5920 map->header_size = first_section->vma - segment->p_vaddr;
5921
88967714
AM
5922 if (!map->includes_phdrs
5923 && !map->includes_filehdr
5924 && map->p_paddr_valid)
3271a814 5925 /* There is some other padding before the first section. */
c981028a 5926 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
53020534 5927 - segment->p_paddr);
08a40648 5928
84d1d650
L
5929 if (section_count != 0)
5930 {
5931 unsigned int isec = 0;
5932
53020534 5933 for (section = first_section;
84d1d650
L
5934 section != NULL;
5935 section = section->next)
5936 {
5937 this_hdr = &(elf_section_data(section)->this_hdr);
5938 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
53020534
L
5939 {
5940 map->sections[isec++] = section->output_section;
5941 if (isec == section_count)
5942 break;
5943 }
84d1d650
L
5944 }
5945 }
5946
5947 map->count = section_count;
5948 *pointer_to_map = map;
5949 pointer_to_map = &map->next;
5950 }
5951
5952 elf_tdata (obfd)->segment_map = map_first;
5953 return TRUE;
5954}
5955
5956/* Copy private BFD data. This copies or rewrites ELF program header
5957 information. */
5958
5959static bfd_boolean
5960copy_private_bfd_data (bfd *ibfd, bfd *obfd)
5961{
84d1d650
L
5962 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
5963 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
5964 return TRUE;
5965
5966 if (elf_tdata (ibfd)->phdr == NULL)
5967 return TRUE;
5968
5969 if (ibfd->xvec == obfd->xvec)
5970 {
cb3ff1e5
NC
5971 /* Check to see if any sections in the input BFD
5972 covered by ELF program header have changed. */
d55ce4e2 5973 Elf_Internal_Phdr *segment;
84d1d650
L
5974 asection *section, *osec;
5975 unsigned int i, num_segments;
5976 Elf_Internal_Shdr *this_hdr;
147d51c2
L
5977 const struct elf_backend_data *bed;
5978
5979 bed = get_elf_backend_data (ibfd);
5980
5981 /* Regenerate the segment map if p_paddr is set to 0. */
5982 if (bed->want_p_paddr_set_to_zero)
5983 goto rewrite;
84d1d650
L
5984
5985 /* Initialize the segment mark field. */
5986 for (section = obfd->sections; section != NULL;
5987 section = section->next)
5988 section->segment_mark = FALSE;
5989
5990 num_segments = elf_elfheader (ibfd)->e_phnum;
5991 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5992 i < num_segments;
5993 i++, segment++)
5994 {
5f6999aa
NC
5995 /* PR binutils/3535. The Solaris linker always sets the p_paddr
5996 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
5997 which severly confuses things, so always regenerate the segment
5998 map in this case. */
5999 if (segment->p_paddr == 0
6000 && segment->p_memsz == 0
6001 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6002 goto rewrite;
5f6999aa 6003
84d1d650
L
6004 for (section = ibfd->sections;
6005 section != NULL; section = section->next)
6006 {
6007 /* We mark the output section so that we know it comes
6008 from the input BFD. */
6009 osec = section->output_section;
6010 if (osec)
6011 osec->segment_mark = TRUE;
6012
6013 /* Check if this section is covered by the segment. */
6014 this_hdr = &(elf_section_data(section)->this_hdr);
6015 if (ELF_IS_SECTION_IN_SEGMENT_FILE (this_hdr, segment))
6016 {
6017 /* FIXME: Check if its output section is changed or
6018 removed. What else do we need to check? */
6019 if (osec == NULL
6020 || section->flags != osec->flags
6021 || section->lma != osec->lma
6022 || section->vma != osec->vma
6023 || section->size != osec->size
6024 || section->rawsize != osec->rawsize
6025 || section->alignment_power != osec->alignment_power)
6026 goto rewrite;
6027 }
6028 }
6029 }
6030
cb3ff1e5 6031 /* Check to see if any output section do not come from the
84d1d650
L
6032 input BFD. */
6033 for (section = obfd->sections; section != NULL;
6034 section = section->next)
6035 {
6036 if (section->segment_mark == FALSE)
6037 goto rewrite;
6038 else
6039 section->segment_mark = FALSE;
6040 }
6041
6042 return copy_elf_program_header (ibfd, obfd);
6043 }
6044
6045rewrite:
6046 return rewrite_elf_program_header (ibfd, obfd);
6047}
6048
ccd2ec6a
L
6049/* Initialize private output section information from input section. */
6050
6051bfd_boolean
6052_bfd_elf_init_private_section_data (bfd *ibfd,
6053 asection *isec,
6054 bfd *obfd,
6055 asection *osec,
6056 struct bfd_link_info *link_info)
6057
6058{
6059 Elf_Internal_Shdr *ihdr, *ohdr;
6060 bfd_boolean need_group = link_info == NULL || link_info->relocatable;
6061
6062 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6063 || obfd->xvec->flavour != bfd_target_elf_flavour)
6064 return TRUE;
6065
e843e0f8 6066 /* Don't copy the output ELF section type from input if the
d3fd4074 6067 output BFD section flags have been set to something different.
e843e0f8
L
6068 elf_fake_sections will set ELF section type based on BFD
6069 section flags. */
42bb2e33
AM
6070 if (elf_section_type (osec) == SHT_NULL
6071 && (osec->flags == isec->flags || !osec->flags))
6072 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6073
6074 /* FIXME: Is this correct for all OS/PROC specific flags? */
6075 elf_section_flags (osec) |= (elf_section_flags (isec)
6076 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6077
6078 /* Set things up for objcopy and relocatable link. The output
6079 SHT_GROUP section will have its elf_next_in_group pointing back
6080 to the input group members. Ignore linker created group section.
6081 See elfNN_ia64_object_p in elfxx-ia64.c. */
ccd2ec6a
L
6082 if (need_group)
6083 {
6084 if (elf_sec_group (isec) == NULL
6085 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6086 {
6087 if (elf_section_flags (isec) & SHF_GROUP)
6088 elf_section_flags (osec) |= SHF_GROUP;
6089 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6090 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6091 }
6092 }
6093
6094 ihdr = &elf_section_data (isec)->this_hdr;
6095
6096 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6097 don't use the output section of the linked-to section since it
6098 may be NULL at this point. */
6099 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6100 {
6101 ohdr = &elf_section_data (osec)->this_hdr;
6102 ohdr->sh_flags |= SHF_LINK_ORDER;
6103 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6104 }
6105
6106 osec->use_rela_p = isec->use_rela_p;
6107
6108 return TRUE;
6109}
6110
252b5132
RH
6111/* Copy private section information. This copies over the entsize
6112 field, and sometimes the info field. */
6113
b34976b6 6114bfd_boolean
217aa764
AM
6115_bfd_elf_copy_private_section_data (bfd *ibfd,
6116 asection *isec,
6117 bfd *obfd,
6118 asection *osec)
252b5132
RH
6119{
6120 Elf_Internal_Shdr *ihdr, *ohdr;
6121
6122 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6123 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6124 return TRUE;
252b5132 6125
252b5132
RH
6126 ihdr = &elf_section_data (isec)->this_hdr;
6127 ohdr = &elf_section_data (osec)->this_hdr;
6128
6129 ohdr->sh_entsize = ihdr->sh_entsize;
6130
6131 if (ihdr->sh_type == SHT_SYMTAB
6132 || ihdr->sh_type == SHT_DYNSYM
6133 || ihdr->sh_type == SHT_GNU_verneed
6134 || ihdr->sh_type == SHT_GNU_verdef)
6135 ohdr->sh_info = ihdr->sh_info;
6136
ccd2ec6a
L
6137 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6138 NULL);
252b5132
RH
6139}
6140
80fccad2
BW
6141/* Copy private header information. */
6142
6143bfd_boolean
6144_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6145{
30288845
AM
6146 asection *isec;
6147
80fccad2
BW
6148 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6149 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6150 return TRUE;
6151
6152 /* Copy over private BFD data if it has not already been copied.
6153 This must be done here, rather than in the copy_private_bfd_data
6154 entry point, because the latter is called after the section
6155 contents have been set, which means that the program headers have
6156 already been worked out. */
6157 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6158 {
6159 if (! copy_private_bfd_data (ibfd, obfd))
6160 return FALSE;
6161 }
6162
30288845
AM
6163 /* _bfd_elf_copy_private_section_data copied over the SHF_GROUP flag
6164 but this might be wrong if we deleted the group section. */
6165 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
6166 if (elf_section_type (isec) == SHT_GROUP
6167 && isec->output_section == NULL)
6168 {
6169 asection *first = elf_next_in_group (isec);
6170 asection *s = first;
6171 while (s != NULL)
6172 {
6173 if (s->output_section != NULL)
6174 {
6175 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6176 elf_group_name (s->output_section) = NULL;
6177 }
6178 s = elf_next_in_group (s);
6179 if (s == first)
6180 break;
6181 }
6182 }
6183
80fccad2
BW
6184 return TRUE;
6185}
6186
252b5132
RH
6187/* Copy private symbol information. If this symbol is in a section
6188 which we did not map into a BFD section, try to map the section
6189 index correctly. We use special macro definitions for the mapped
6190 section indices; these definitions are interpreted by the
6191 swap_out_syms function. */
6192
9ad5cbcf
AM
6193#define MAP_ONESYMTAB (SHN_HIOS + 1)
6194#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6195#define MAP_STRTAB (SHN_HIOS + 3)
6196#define MAP_SHSTRTAB (SHN_HIOS + 4)
6197#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6198
b34976b6 6199bfd_boolean
217aa764
AM
6200_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6201 asymbol *isymarg,
6202 bfd *obfd,
6203 asymbol *osymarg)
252b5132
RH
6204{
6205 elf_symbol_type *isym, *osym;
6206
6207 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6208 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6209 return TRUE;
252b5132
RH
6210
6211 isym = elf_symbol_from (ibfd, isymarg);
6212 osym = elf_symbol_from (obfd, osymarg);
6213
6214 if (isym != NULL
8424d8f5 6215 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6216 && osym != NULL
6217 && bfd_is_abs_section (isym->symbol.section))
6218 {
6219 unsigned int shndx;
6220
6221 shndx = isym->internal_elf_sym.st_shndx;
6222 if (shndx == elf_onesymtab (ibfd))
6223 shndx = MAP_ONESYMTAB;
6224 else if (shndx == elf_dynsymtab (ibfd))
6225 shndx = MAP_DYNSYMTAB;
6226 else if (shndx == elf_tdata (ibfd)->strtab_section)
6227 shndx = MAP_STRTAB;
6228 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6229 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6230 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6231 shndx = MAP_SYM_SHNDX;
252b5132
RH
6232 osym->internal_elf_sym.st_shndx = shndx;
6233 }
6234
b34976b6 6235 return TRUE;
252b5132
RH
6236}
6237
6238/* Swap out the symbols. */
6239
b34976b6 6240static bfd_boolean
217aa764
AM
6241swap_out_syms (bfd *abfd,
6242 struct bfd_strtab_hash **sttp,
6243 int relocatable_p)
252b5132 6244{
9c5bfbb7 6245 const struct elf_backend_data *bed;
079e9a2f
AM
6246 int symcount;
6247 asymbol **syms;
6248 struct bfd_strtab_hash *stt;
6249 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6250 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6251 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6252 bfd_byte *outbound_syms;
6253 bfd_byte *outbound_shndx;
079e9a2f
AM
6254 int idx;
6255 bfd_size_type amt;
174fd7f9 6256 bfd_boolean name_local_sections;
252b5132
RH
6257
6258 if (!elf_map_symbols (abfd))
b34976b6 6259 return FALSE;
252b5132 6260
c044fabd 6261 /* Dump out the symtabs. */
079e9a2f
AM
6262 stt = _bfd_elf_stringtab_init ();
6263 if (stt == NULL)
b34976b6 6264 return FALSE;
252b5132 6265
079e9a2f
AM
6266 bed = get_elf_backend_data (abfd);
6267 symcount = bfd_get_symcount (abfd);
6268 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6269 symtab_hdr->sh_type = SHT_SYMTAB;
6270 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6271 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6272 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
72de5009 6273 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6274
6275 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6276 symstrtab_hdr->sh_type = SHT_STRTAB;
6277
a50b1753
NC
6278 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6279 bed->s->sizeof_sym);
079e9a2f 6280 if (outbound_syms == NULL)
5ed6aba4
NC
6281 {
6282 _bfd_stringtab_free (stt);
6283 return FALSE;
6284 }
217aa764 6285 symtab_hdr->contents = outbound_syms;
252b5132 6286
9ad5cbcf
AM
6287 outbound_shndx = NULL;
6288 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6289 if (symtab_shndx_hdr->sh_name != 0)
6290 {
6291 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6292 outbound_shndx = (bfd_byte *)
6293 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6294 if (outbound_shndx == NULL)
5ed6aba4
NC
6295 {
6296 _bfd_stringtab_free (stt);
6297 return FALSE;
6298 }
6299
9ad5cbcf
AM
6300 symtab_shndx_hdr->contents = outbound_shndx;
6301 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6302 symtab_shndx_hdr->sh_size = amt;
6303 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6304 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6305 }
6306
589e6347 6307 /* Now generate the data (for "contents"). */
079e9a2f
AM
6308 {
6309 /* Fill in zeroth symbol and swap it out. */
6310 Elf_Internal_Sym sym;
6311 sym.st_name = 0;
6312 sym.st_value = 0;
6313 sym.st_size = 0;
6314 sym.st_info = 0;
6315 sym.st_other = 0;
6316 sym.st_shndx = SHN_UNDEF;
9ad5cbcf 6317 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6318 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6319 if (outbound_shndx != NULL)
6320 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6321 }
252b5132 6322
174fd7f9
RS
6323 name_local_sections
6324 = (bed->elf_backend_name_local_section_symbols
6325 && bed->elf_backend_name_local_section_symbols (abfd));
6326
079e9a2f
AM
6327 syms = bfd_get_outsymbols (abfd);
6328 for (idx = 0; idx < symcount; idx++)
252b5132 6329 {
252b5132 6330 Elf_Internal_Sym sym;
079e9a2f
AM
6331 bfd_vma value = syms[idx]->value;
6332 elf_symbol_type *type_ptr;
6333 flagword flags = syms[idx]->flags;
6334 int type;
252b5132 6335
174fd7f9
RS
6336 if (!name_local_sections
6337 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6338 {
6339 /* Local section symbols have no name. */
6340 sym.st_name = 0;
6341 }
6342 else
6343 {
6344 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6345 syms[idx]->name,
b34976b6 6346 TRUE, FALSE);
079e9a2f 6347 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6348 {
6349 _bfd_stringtab_free (stt);
6350 return FALSE;
6351 }
079e9a2f 6352 }
252b5132 6353
079e9a2f 6354 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6355
079e9a2f
AM
6356 if ((flags & BSF_SECTION_SYM) == 0
6357 && bfd_is_com_section (syms[idx]->section))
6358 {
6359 /* ELF common symbols put the alignment into the `value' field,
6360 and the size into the `size' field. This is backwards from
6361 how BFD handles it, so reverse it here. */
6362 sym.st_size = value;
6363 if (type_ptr == NULL
6364 || type_ptr->internal_elf_sym.st_value == 0)
6365 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6366 else
6367 sym.st_value = type_ptr->internal_elf_sym.st_value;
6368 sym.st_shndx = _bfd_elf_section_from_bfd_section
6369 (abfd, syms[idx]->section);
6370 }
6371 else
6372 {
6373 asection *sec = syms[idx]->section;
cb33740c 6374 unsigned int shndx;
252b5132 6375
079e9a2f
AM
6376 if (sec->output_section)
6377 {
6378 value += sec->output_offset;
6379 sec = sec->output_section;
6380 }
589e6347 6381
079e9a2f
AM
6382 /* Don't add in the section vma for relocatable output. */
6383 if (! relocatable_p)
6384 value += sec->vma;
6385 sym.st_value = value;
6386 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6387
6388 if (bfd_is_abs_section (sec)
6389 && type_ptr != NULL
6390 && type_ptr->internal_elf_sym.st_shndx != 0)
6391 {
6392 /* This symbol is in a real ELF section which we did
6393 not create as a BFD section. Undo the mapping done
6394 by copy_private_symbol_data. */
6395 shndx = type_ptr->internal_elf_sym.st_shndx;
6396 switch (shndx)
6397 {
6398 case MAP_ONESYMTAB:
6399 shndx = elf_onesymtab (abfd);
6400 break;
6401 case MAP_DYNSYMTAB:
6402 shndx = elf_dynsymtab (abfd);
6403 break;
6404 case MAP_STRTAB:
6405 shndx = elf_tdata (abfd)->strtab_section;
6406 break;
6407 case MAP_SHSTRTAB:
6408 shndx = elf_tdata (abfd)->shstrtab_section;
6409 break;
9ad5cbcf
AM
6410 case MAP_SYM_SHNDX:
6411 shndx = elf_tdata (abfd)->symtab_shndx_section;
6412 break;
079e9a2f
AM
6413 default:
6414 break;
6415 }
6416 }
6417 else
6418 {
6419 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6420
cb33740c 6421 if (shndx == SHN_BAD)
079e9a2f
AM
6422 {
6423 asection *sec2;
6424
6425 /* Writing this would be a hell of a lot easier if
6426 we had some decent documentation on bfd, and
6427 knew what to expect of the library, and what to
6428 demand of applications. For example, it
6429 appears that `objcopy' might not set the
6430 section of a symbol to be a section that is
6431 actually in the output file. */
6432 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6433 if (sec2 == NULL)
6434 {
6435 _bfd_error_handler (_("\
6436Unable to find equivalent output section for symbol '%s' from section '%s'"),
6437 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6438 sec->name);
811072d8 6439 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6440 _bfd_stringtab_free (stt);
589e6347
NC
6441 return FALSE;
6442 }
811072d8 6443
079e9a2f 6444 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6445 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6446 }
6447 }
252b5132 6448
079e9a2f
AM
6449 sym.st_shndx = shndx;
6450 }
252b5132 6451
13ae64f3
JJ
6452 if ((flags & BSF_THREAD_LOCAL) != 0)
6453 type = STT_TLS;
d8045f23
NC
6454 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6455 type = STT_GNU_IFUNC;
13ae64f3 6456 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6457 type = STT_FUNC;
6458 else if ((flags & BSF_OBJECT) != 0)
6459 type = STT_OBJECT;
d9352518
DB
6460 else if ((flags & BSF_RELC) != 0)
6461 type = STT_RELC;
6462 else if ((flags & BSF_SRELC) != 0)
6463 type = STT_SRELC;
079e9a2f
AM
6464 else
6465 type = STT_NOTYPE;
252b5132 6466
13ae64f3
JJ
6467 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6468 type = STT_TLS;
6469
589e6347 6470 /* Processor-specific types. */
079e9a2f
AM
6471 if (type_ptr != NULL
6472 && bed->elf_backend_get_symbol_type)
6473 type = ((*bed->elf_backend_get_symbol_type)
6474 (&type_ptr->internal_elf_sym, type));
252b5132 6475
079e9a2f
AM
6476 if (flags & BSF_SECTION_SYM)
6477 {
6478 if (flags & BSF_GLOBAL)
6479 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6480 else
6481 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6482 }
6483 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6484 {
504b7d20 6485#ifdef USE_STT_COMMON
0a40daed
MK
6486 if (type == STT_OBJECT)
6487 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6488 else
504b7d20 6489#endif
c91e322a 6490 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6491 }
079e9a2f
AM
6492 else if (bfd_is_und_section (syms[idx]->section))
6493 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6494 ? STB_WEAK
6495 : STB_GLOBAL),
6496 type);
6497 else if (flags & BSF_FILE)
6498 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6499 else
6500 {
6501 int bind = STB_LOCAL;
252b5132 6502
079e9a2f
AM
6503 if (flags & BSF_LOCAL)
6504 bind = STB_LOCAL;
3e7a7d11
NC
6505 else if (flags & BSF_GNU_UNIQUE)
6506 bind = STB_GNU_UNIQUE;
079e9a2f
AM
6507 else if (flags & BSF_WEAK)
6508 bind = STB_WEAK;
6509 else if (flags & BSF_GLOBAL)
6510 bind = STB_GLOBAL;
252b5132 6511
079e9a2f
AM
6512 sym.st_info = ELF_ST_INFO (bind, type);
6513 }
252b5132 6514
079e9a2f
AM
6515 if (type_ptr != NULL)
6516 sym.st_other = type_ptr->internal_elf_sym.st_other;
6517 else
6518 sym.st_other = 0;
252b5132 6519
9ad5cbcf 6520 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6521 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6522 if (outbound_shndx != NULL)
6523 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6524 }
252b5132 6525
079e9a2f
AM
6526 *sttp = stt;
6527 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6528 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6529
079e9a2f
AM
6530 symstrtab_hdr->sh_flags = 0;
6531 symstrtab_hdr->sh_addr = 0;
6532 symstrtab_hdr->sh_entsize = 0;
6533 symstrtab_hdr->sh_link = 0;
6534 symstrtab_hdr->sh_info = 0;
6535 symstrtab_hdr->sh_addralign = 1;
252b5132 6536
b34976b6 6537 return TRUE;
252b5132
RH
6538}
6539
6540/* Return the number of bytes required to hold the symtab vector.
6541
6542 Note that we base it on the count plus 1, since we will null terminate
6543 the vector allocated based on this size. However, the ELF symbol table
6544 always has a dummy entry as symbol #0, so it ends up even. */
6545
6546long
217aa764 6547_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6548{
6549 long symcount;
6550 long symtab_size;
6551 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6552
6553 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6554 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6555 if (symcount > 0)
6556 symtab_size -= sizeof (asymbol *);
252b5132
RH
6557
6558 return symtab_size;
6559}
6560
6561long
217aa764 6562_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6563{
6564 long symcount;
6565 long symtab_size;
6566 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6567
6568 if (elf_dynsymtab (abfd) == 0)
6569 {
6570 bfd_set_error (bfd_error_invalid_operation);
6571 return -1;
6572 }
6573
6574 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6575 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6576 if (symcount > 0)
6577 symtab_size -= sizeof (asymbol *);
252b5132
RH
6578
6579 return symtab_size;
6580}
6581
6582long
217aa764
AM
6583_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6584 sec_ptr asect)
252b5132
RH
6585{
6586 return (asect->reloc_count + 1) * sizeof (arelent *);
6587}
6588
6589/* Canonicalize the relocs. */
6590
6591long
217aa764
AM
6592_bfd_elf_canonicalize_reloc (bfd *abfd,
6593 sec_ptr section,
6594 arelent **relptr,
6595 asymbol **symbols)
252b5132
RH
6596{
6597 arelent *tblptr;
6598 unsigned int i;
9c5bfbb7 6599 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6600
b34976b6 6601 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6602 return -1;
6603
6604 tblptr = section->relocation;
6605 for (i = 0; i < section->reloc_count; i++)
6606 *relptr++ = tblptr++;
6607
6608 *relptr = NULL;
6609
6610 return section->reloc_count;
6611}
6612
6613long
6cee3f79 6614_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6615{
9c5bfbb7 6616 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6617 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6618
6619 if (symcount >= 0)
6620 bfd_get_symcount (abfd) = symcount;
6621 return symcount;
6622}
6623
6624long
217aa764
AM
6625_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6626 asymbol **allocation)
252b5132 6627{
9c5bfbb7 6628 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6629 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6630
6631 if (symcount >= 0)
6632 bfd_get_dynamic_symcount (abfd) = symcount;
6633 return symcount;
252b5132
RH
6634}
6635
8615f3f2
AM
6636/* Return the size required for the dynamic reloc entries. Any loadable
6637 section that was actually installed in the BFD, and has type SHT_REL
6638 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
6639 dynamic reloc section. */
252b5132
RH
6640
6641long
217aa764 6642_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
6643{
6644 long ret;
6645 asection *s;
6646
6647 if (elf_dynsymtab (abfd) == 0)
6648 {
6649 bfd_set_error (bfd_error_invalid_operation);
6650 return -1;
6651 }
6652
6653 ret = sizeof (arelent *);
6654 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 6655 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6656 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6657 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 6658 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
6659 * sizeof (arelent *));
6660
6661 return ret;
6662}
6663
8615f3f2
AM
6664/* Canonicalize the dynamic relocation entries. Note that we return the
6665 dynamic relocations as a single block, although they are actually
6666 associated with particular sections; the interface, which was
6667 designed for SunOS style shared libraries, expects that there is only
6668 one set of dynamic relocs. Any loadable section that was actually
6669 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
6670 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
6671
6672long
217aa764
AM
6673_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
6674 arelent **storage,
6675 asymbol **syms)
252b5132 6676{
217aa764 6677 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
6678 asection *s;
6679 long ret;
6680
6681 if (elf_dynsymtab (abfd) == 0)
6682 {
6683 bfd_set_error (bfd_error_invalid_operation);
6684 return -1;
6685 }
6686
6687 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
6688 ret = 0;
6689 for (s = abfd->sections; s != NULL; s = s->next)
6690 {
266b05cf 6691 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
6692 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
6693 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
6694 {
6695 arelent *p;
6696 long count, i;
6697
b34976b6 6698 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 6699 return -1;
eea6121a 6700 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
6701 p = s->relocation;
6702 for (i = 0; i < count; i++)
6703 *storage++ = p++;
6704 ret += count;
6705 }
6706 }
6707
6708 *storage = NULL;
6709
6710 return ret;
6711}
6712\f
6713/* Read in the version information. */
6714
b34976b6 6715bfd_boolean
fc0e6df6 6716_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
6717{
6718 bfd_byte *contents = NULL;
fc0e6df6
PB
6719 unsigned int freeidx = 0;
6720
6721 if (elf_dynverref (abfd) != 0)
6722 {
6723 Elf_Internal_Shdr *hdr;
6724 Elf_External_Verneed *everneed;
6725 Elf_Internal_Verneed *iverneed;
6726 unsigned int i;
d0fb9a8d 6727 bfd_byte *contents_end;
fc0e6df6
PB
6728
6729 hdr = &elf_tdata (abfd)->dynverref_hdr;
6730
a50b1753
NC
6731 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
6732 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
6733 if (elf_tdata (abfd)->verref == NULL)
6734 goto error_return;
6735
6736 elf_tdata (abfd)->cverrefs = hdr->sh_info;
6737
a50b1753 6738 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
fc0e6df6 6739 if (contents == NULL)
d0fb9a8d
JJ
6740 {
6741error_return_verref:
6742 elf_tdata (abfd)->verref = NULL;
6743 elf_tdata (abfd)->cverrefs = 0;
6744 goto error_return;
6745 }
fc0e6df6
PB
6746 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
6747 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 6748 goto error_return_verref;
fc0e6df6 6749
d0fb9a8d
JJ
6750 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
6751 goto error_return_verref;
6752
6753 BFD_ASSERT (sizeof (Elf_External_Verneed)
6754 == sizeof (Elf_External_Vernaux));
6755 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
6756 everneed = (Elf_External_Verneed *) contents;
6757 iverneed = elf_tdata (abfd)->verref;
6758 for (i = 0; i < hdr->sh_info; i++, iverneed++)
6759 {
6760 Elf_External_Vernaux *evernaux;
6761 Elf_Internal_Vernaux *ivernaux;
6762 unsigned int j;
6763
6764 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
6765
6766 iverneed->vn_bfd = abfd;
6767
6768 iverneed->vn_filename =
6769 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6770 iverneed->vn_file);
6771 if (iverneed->vn_filename == NULL)
d0fb9a8d 6772 goto error_return_verref;
fc0e6df6 6773
d0fb9a8d
JJ
6774 if (iverneed->vn_cnt == 0)
6775 iverneed->vn_auxptr = NULL;
6776 else
6777 {
a50b1753
NC
6778 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
6779 bfd_alloc2 (abfd, iverneed->vn_cnt,
6780 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
6781 if (iverneed->vn_auxptr == NULL)
6782 goto error_return_verref;
6783 }
6784
6785 if (iverneed->vn_aux
6786 > (size_t) (contents_end - (bfd_byte *) everneed))
6787 goto error_return_verref;
fc0e6df6
PB
6788
6789 evernaux = ((Elf_External_Vernaux *)
6790 ((bfd_byte *) everneed + iverneed->vn_aux));
6791 ivernaux = iverneed->vn_auxptr;
6792 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
6793 {
6794 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
6795
6796 ivernaux->vna_nodename =
6797 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6798 ivernaux->vna_name);
6799 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 6800 goto error_return_verref;
fc0e6df6
PB
6801
6802 if (j + 1 < iverneed->vn_cnt)
6803 ivernaux->vna_nextptr = ivernaux + 1;
6804 else
6805 ivernaux->vna_nextptr = NULL;
6806
d0fb9a8d
JJ
6807 if (ivernaux->vna_next
6808 > (size_t) (contents_end - (bfd_byte *) evernaux))
6809 goto error_return_verref;
6810
fc0e6df6
PB
6811 evernaux = ((Elf_External_Vernaux *)
6812 ((bfd_byte *) evernaux + ivernaux->vna_next));
6813
6814 if (ivernaux->vna_other > freeidx)
6815 freeidx = ivernaux->vna_other;
6816 }
6817
6818 if (i + 1 < hdr->sh_info)
6819 iverneed->vn_nextref = iverneed + 1;
6820 else
6821 iverneed->vn_nextref = NULL;
6822
d0fb9a8d
JJ
6823 if (iverneed->vn_next
6824 > (size_t) (contents_end - (bfd_byte *) everneed))
6825 goto error_return_verref;
6826
fc0e6df6
PB
6827 everneed = ((Elf_External_Verneed *)
6828 ((bfd_byte *) everneed + iverneed->vn_next));
6829 }
6830
6831 free (contents);
6832 contents = NULL;
6833 }
252b5132
RH
6834
6835 if (elf_dynverdef (abfd) != 0)
6836 {
6837 Elf_Internal_Shdr *hdr;
6838 Elf_External_Verdef *everdef;
6839 Elf_Internal_Verdef *iverdef;
f631889e
UD
6840 Elf_Internal_Verdef *iverdefarr;
6841 Elf_Internal_Verdef iverdefmem;
252b5132 6842 unsigned int i;
062e2358 6843 unsigned int maxidx;
d0fb9a8d 6844 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
6845
6846 hdr = &elf_tdata (abfd)->dynverdef_hdr;
6847
a50b1753 6848 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132
RH
6849 if (contents == NULL)
6850 goto error_return;
6851 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 6852 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
6853 goto error_return;
6854
d0fb9a8d
JJ
6855 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
6856 goto error_return;
6857
6858 BFD_ASSERT (sizeof (Elf_External_Verdef)
6859 >= sizeof (Elf_External_Verdaux));
6860 contents_end_def = contents + hdr->sh_size
6861 - sizeof (Elf_External_Verdef);
6862 contents_end_aux = contents + hdr->sh_size
6863 - sizeof (Elf_External_Verdaux);
6864
f631889e
UD
6865 /* We know the number of entries in the section but not the maximum
6866 index. Therefore we have to run through all entries and find
6867 the maximum. */
252b5132 6868 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
6869 maxidx = 0;
6870 for (i = 0; i < hdr->sh_info; ++i)
6871 {
6872 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6873
062e2358
AM
6874 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
6875 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 6876
d0fb9a8d
JJ
6877 if (iverdefmem.vd_next
6878 > (size_t) (contents_end_def - (bfd_byte *) everdef))
6879 goto error_return;
6880
f631889e
UD
6881 everdef = ((Elf_External_Verdef *)
6882 ((bfd_byte *) everdef + iverdefmem.vd_next));
6883 }
6884
fc0e6df6
PB
6885 if (default_imported_symver)
6886 {
6887 if (freeidx > maxidx)
6888 maxidx = ++freeidx;
6889 else
6890 freeidx = ++maxidx;
6891 }
a50b1753
NC
6892 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
6893 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e
UD
6894 if (elf_tdata (abfd)->verdef == NULL)
6895 goto error_return;
6896
6897 elf_tdata (abfd)->cverdefs = maxidx;
6898
6899 everdef = (Elf_External_Verdef *) contents;
6900 iverdefarr = elf_tdata (abfd)->verdef;
6901 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
6902 {
6903 Elf_External_Verdaux *everdaux;
6904 Elf_Internal_Verdaux *iverdaux;
6905 unsigned int j;
6906
f631889e
UD
6907 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
6908
d0fb9a8d
JJ
6909 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
6910 {
6911error_return_verdef:
6912 elf_tdata (abfd)->verdef = NULL;
6913 elf_tdata (abfd)->cverdefs = 0;
6914 goto error_return;
6915 }
6916
f631889e
UD
6917 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
6918 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
6919
6920 iverdef->vd_bfd = abfd;
6921
d0fb9a8d
JJ
6922 if (iverdef->vd_cnt == 0)
6923 iverdef->vd_auxptr = NULL;
6924 else
6925 {
a50b1753
NC
6926 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
6927 bfd_alloc2 (abfd, iverdef->vd_cnt,
6928 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
6929 if (iverdef->vd_auxptr == NULL)
6930 goto error_return_verdef;
6931 }
6932
6933 if (iverdef->vd_aux
6934 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
6935 goto error_return_verdef;
252b5132
RH
6936
6937 everdaux = ((Elf_External_Verdaux *)
6938 ((bfd_byte *) everdef + iverdef->vd_aux));
6939 iverdaux = iverdef->vd_auxptr;
6940 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
6941 {
6942 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
6943
6944 iverdaux->vda_nodename =
6945 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
6946 iverdaux->vda_name);
6947 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 6948 goto error_return_verdef;
252b5132
RH
6949
6950 if (j + 1 < iverdef->vd_cnt)
6951 iverdaux->vda_nextptr = iverdaux + 1;
6952 else
6953 iverdaux->vda_nextptr = NULL;
6954
d0fb9a8d
JJ
6955 if (iverdaux->vda_next
6956 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
6957 goto error_return_verdef;
6958
252b5132
RH
6959 everdaux = ((Elf_External_Verdaux *)
6960 ((bfd_byte *) everdaux + iverdaux->vda_next));
6961 }
6962
d0fb9a8d
JJ
6963 if (iverdef->vd_cnt)
6964 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 6965
d0fb9a8d 6966 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
6967 iverdef->vd_nextdef = iverdef + 1;
6968 else
6969 iverdef->vd_nextdef = NULL;
6970
6971 everdef = ((Elf_External_Verdef *)
6972 ((bfd_byte *) everdef + iverdef->vd_next));
6973 }
6974
6975 free (contents);
6976 contents = NULL;
6977 }
fc0e6df6 6978 else if (default_imported_symver)
252b5132 6979 {
fc0e6df6
PB
6980 if (freeidx < 3)
6981 freeidx = 3;
6982 else
6983 freeidx++;
252b5132 6984
a50b1753
NC
6985 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
6986 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 6987 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
6988 goto error_return;
6989
fc0e6df6
PB
6990 elf_tdata (abfd)->cverdefs = freeidx;
6991 }
252b5132 6992
fc0e6df6
PB
6993 /* Create a default version based on the soname. */
6994 if (default_imported_symver)
6995 {
6996 Elf_Internal_Verdef *iverdef;
6997 Elf_Internal_Verdaux *iverdaux;
252b5132 6998
fc0e6df6 6999 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 7000
fc0e6df6
PB
7001 iverdef->vd_version = VER_DEF_CURRENT;
7002 iverdef->vd_flags = 0;
7003 iverdef->vd_ndx = freeidx;
7004 iverdef->vd_cnt = 1;
252b5132 7005
fc0e6df6 7006 iverdef->vd_bfd = abfd;
252b5132 7007
fc0e6df6
PB
7008 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
7009 if (iverdef->vd_nodename == NULL)
d0fb9a8d 7010 goto error_return_verdef;
fc0e6df6 7011 iverdef->vd_nextdef = NULL;
a50b1753
NC
7012 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7013 bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7014 if (iverdef->vd_auxptr == NULL)
7015 goto error_return_verdef;
252b5132 7016
fc0e6df6
PB
7017 iverdaux = iverdef->vd_auxptr;
7018 iverdaux->vda_nodename = iverdef->vd_nodename;
7019 iverdaux->vda_nextptr = NULL;
252b5132
RH
7020 }
7021
b34976b6 7022 return TRUE;
252b5132
RH
7023
7024 error_return:
5ed6aba4 7025 if (contents != NULL)
252b5132 7026 free (contents);
b34976b6 7027 return FALSE;
252b5132
RH
7028}
7029\f
7030asymbol *
217aa764 7031_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7032{
7033 elf_symbol_type *newsym;
dc810e39 7034 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 7035
a50b1753 7036 newsym = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132
RH
7037 if (!newsym)
7038 return NULL;
7039 else
7040 {
7041 newsym->symbol.the_bfd = abfd;
7042 return &newsym->symbol;
7043 }
7044}
7045
7046void
217aa764
AM
7047_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7048 asymbol *symbol,
7049 symbol_info *ret)
252b5132
RH
7050{
7051 bfd_symbol_info (symbol, ret);
7052}
7053
7054/* Return whether a symbol name implies a local symbol. Most targets
7055 use this function for the is_local_label_name entry point, but some
7056 override it. */
7057
b34976b6 7058bfd_boolean
217aa764
AM
7059_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7060 const char *name)
252b5132
RH
7061{
7062 /* Normal local symbols start with ``.L''. */
7063 if (name[0] == '.' && name[1] == 'L')
b34976b6 7064 return TRUE;
252b5132
RH
7065
7066 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7067 DWARF debugging symbols starting with ``..''. */
7068 if (name[0] == '.' && name[1] == '.')
b34976b6 7069 return TRUE;
252b5132
RH
7070
7071 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7072 emitting DWARF debugging output. I suspect this is actually a
7073 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7074 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7075 underscore to be emitted on some ELF targets). For ease of use,
7076 we treat such symbols as local. */
7077 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7078 return TRUE;
252b5132 7079
b34976b6 7080 return FALSE;
252b5132
RH
7081}
7082
7083alent *
217aa764
AM
7084_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7085 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7086{
7087 abort ();
7088 return NULL;
7089}
7090
b34976b6 7091bfd_boolean
217aa764
AM
7092_bfd_elf_set_arch_mach (bfd *abfd,
7093 enum bfd_architecture arch,
7094 unsigned long machine)
252b5132
RH
7095{
7096 /* If this isn't the right architecture for this backend, and this
7097 isn't the generic backend, fail. */
7098 if (arch != get_elf_backend_data (abfd)->arch
7099 && arch != bfd_arch_unknown
7100 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7101 return FALSE;
252b5132
RH
7102
7103 return bfd_default_set_arch_mach (abfd, arch, machine);
7104}
7105
d1fad7c6
NC
7106/* Find the function to a particular section and offset,
7107 for error reporting. */
252b5132 7108
b34976b6 7109static bfd_boolean
b9d678e0 7110elf_find_function (bfd *abfd,
217aa764
AM
7111 asection *section,
7112 asymbol **symbols,
7113 bfd_vma offset,
7114 const char **filename_ptr,
7115 const char **functionname_ptr)
252b5132 7116{
252b5132 7117 const char *filename;
57426232 7118 asymbol *func, *file;
252b5132
RH
7119 bfd_vma low_func;
7120 asymbol **p;
57426232
JB
7121 /* ??? Given multiple file symbols, it is impossible to reliably
7122 choose the right file name for global symbols. File symbols are
7123 local symbols, and thus all file symbols must sort before any
7124 global symbols. The ELF spec may be interpreted to say that a
7125 file symbol must sort before other local symbols, but currently
7126 ld -r doesn't do this. So, for ld -r output, it is possible to
7127 make a better choice of file name for local symbols by ignoring
7128 file symbols appearing after a given local symbol. */
7129 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
b9d678e0 7130 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7131
252b5132
RH
7132 filename = NULL;
7133 func = NULL;
57426232 7134 file = NULL;
252b5132 7135 low_func = 0;
57426232 7136 state = nothing_seen;
252b5132
RH
7137
7138 for (p = symbols; *p != NULL; p++)
7139 {
7140 elf_symbol_type *q;
b9d678e0 7141 unsigned int type;
252b5132
RH
7142
7143 q = (elf_symbol_type *) *p;
7144
b9d678e0
L
7145 type = ELF_ST_TYPE (q->internal_elf_sym.st_info);
7146 switch (type)
252b5132 7147 {
252b5132 7148 case STT_FILE:
57426232
JB
7149 file = &q->symbol;
7150 if (state == symbol_seen)
7151 state = file_after_symbol_seen;
7152 continue;
b9d678e0
L
7153 default:
7154 if (!bed->is_function_type (type))
7155 break;
252b5132 7156 case STT_NOTYPE:
6b40fcba 7157 if (bfd_get_section (&q->symbol) == section
252b5132
RH
7158 && q->symbol.value >= low_func
7159 && q->symbol.value <= offset)
7160 {
7161 func = (asymbol *) q;
7162 low_func = q->symbol.value;
a1923858
AM
7163 filename = NULL;
7164 if (file != NULL
7165 && (ELF_ST_BIND (q->internal_elf_sym.st_info) == STB_LOCAL
7166 || state != file_after_symbol_seen))
57426232 7167 filename = bfd_asymbol_name (file);
252b5132
RH
7168 }
7169 break;
7170 }
57426232
JB
7171 if (state == nothing_seen)
7172 state = symbol_seen;
252b5132
RH
7173 }
7174
7175 if (func == NULL)
b34976b6 7176 return FALSE;
252b5132 7177
d1fad7c6
NC
7178 if (filename_ptr)
7179 *filename_ptr = filename;
7180 if (functionname_ptr)
7181 *functionname_ptr = bfd_asymbol_name (func);
7182
b34976b6 7183 return TRUE;
d1fad7c6
NC
7184}
7185
7186/* Find the nearest line to a particular section and offset,
7187 for error reporting. */
7188
b34976b6 7189bfd_boolean
217aa764
AM
7190_bfd_elf_find_nearest_line (bfd *abfd,
7191 asection *section,
7192 asymbol **symbols,
7193 bfd_vma offset,
7194 const char **filename_ptr,
7195 const char **functionname_ptr,
7196 unsigned int *line_ptr)
d1fad7c6 7197{
b34976b6 7198 bfd_boolean found;
d1fad7c6
NC
7199
7200 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7201 filename_ptr, functionname_ptr,
7202 line_ptr))
d1fad7c6
NC
7203 {
7204 if (!*functionname_ptr)
4e8a9624
AM
7205 elf_find_function (abfd, section, symbols, offset,
7206 *filename_ptr ? NULL : filename_ptr,
7207 functionname_ptr);
7208
b34976b6 7209 return TRUE;
d1fad7c6
NC
7210 }
7211
7212 if (_bfd_dwarf2_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7213 filename_ptr, functionname_ptr,
7214 line_ptr, 0,
7215 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7216 {
7217 if (!*functionname_ptr)
4e8a9624
AM
7218 elf_find_function (abfd, section, symbols, offset,
7219 *filename_ptr ? NULL : filename_ptr,
7220 functionname_ptr);
7221
b34976b6 7222 return TRUE;
d1fad7c6
NC
7223 }
7224
7225 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7226 &found, filename_ptr,
7227 functionname_ptr, line_ptr,
7228 &elf_tdata (abfd)->line_info))
b34976b6 7229 return FALSE;
dc43ada5 7230 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7231 return TRUE;
d1fad7c6
NC
7232
7233 if (symbols == NULL)
b34976b6 7234 return FALSE;
d1fad7c6
NC
7235
7236 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7237 filename_ptr, functionname_ptr))
b34976b6 7238 return FALSE;
d1fad7c6 7239
252b5132 7240 *line_ptr = 0;
b34976b6 7241 return TRUE;
252b5132
RH
7242}
7243
5420f73d
L
7244/* Find the line for a symbol. */
7245
7246bfd_boolean
7247_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7248 const char **filename_ptr, unsigned int *line_ptr)
7249{
7250 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
7251 filename_ptr, line_ptr, 0,
7252 &elf_tdata (abfd)->dwarf2_find_line_info);
7253}
7254
4ab527b0
FF
7255/* After a call to bfd_find_nearest_line, successive calls to
7256 bfd_find_inliner_info can be used to get source information about
7257 each level of function inlining that terminated at the address
7258 passed to bfd_find_nearest_line. Currently this is only supported
7259 for DWARF2 with appropriate DWARF3 extensions. */
7260
7261bfd_boolean
7262_bfd_elf_find_inliner_info (bfd *abfd,
7263 const char **filename_ptr,
7264 const char **functionname_ptr,
7265 unsigned int *line_ptr)
7266{
7267 bfd_boolean found;
7268 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7269 functionname_ptr, line_ptr,
7270 & elf_tdata (abfd)->dwarf2_find_line_info);
7271 return found;
7272}
7273
252b5132 7274int
a6b96beb 7275_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7276{
8ded5a0f
AM
7277 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7278 int ret = bed->s->sizeof_ehdr;
252b5132 7279
a6b96beb 7280 if (!info->relocatable)
8ded5a0f 7281 {
62d7a5f6 7282 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7283
62d7a5f6
AM
7284 if (phdr_size == (bfd_size_type) -1)
7285 {
7286 struct elf_segment_map *m;
7287
7288 phdr_size = 0;
7289 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7290 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7291
62d7a5f6
AM
7292 if (phdr_size == 0)
7293 phdr_size = get_program_header_size (abfd, info);
7294 }
8ded5a0f
AM
7295
7296 elf_tdata (abfd)->program_header_size = phdr_size;
7297 ret += phdr_size;
7298 }
7299
252b5132
RH
7300 return ret;
7301}
7302
b34976b6 7303bfd_boolean
217aa764
AM
7304_bfd_elf_set_section_contents (bfd *abfd,
7305 sec_ptr section,
0f867abe 7306 const void *location,
217aa764
AM
7307 file_ptr offset,
7308 bfd_size_type count)
252b5132
RH
7309{
7310 Elf_Internal_Shdr *hdr;
dc810e39 7311 bfd_signed_vma pos;
252b5132
RH
7312
7313 if (! abfd->output_has_begun
217aa764 7314 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7315 return FALSE;
252b5132
RH
7316
7317 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7318 pos = hdr->sh_offset + offset;
7319 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7320 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7321 return FALSE;
252b5132 7322
b34976b6 7323 return TRUE;
252b5132
RH
7324}
7325
7326void
217aa764
AM
7327_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7328 arelent *cache_ptr ATTRIBUTE_UNUSED,
7329 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7330{
7331 abort ();
7332}
7333
252b5132
RH
7334/* Try to convert a non-ELF reloc into an ELF one. */
7335
b34976b6 7336bfd_boolean
217aa764 7337_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7338{
c044fabd 7339 /* Check whether we really have an ELF howto. */
252b5132
RH
7340
7341 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7342 {
7343 bfd_reloc_code_real_type code;
7344 reloc_howto_type *howto;
7345
7346 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7347 equivalent ELF reloc. */
252b5132
RH
7348
7349 if (areloc->howto->pc_relative)
7350 {
7351 switch (areloc->howto->bitsize)
7352 {
7353 case 8:
7354 code = BFD_RELOC_8_PCREL;
7355 break;
7356 case 12:
7357 code = BFD_RELOC_12_PCREL;
7358 break;
7359 case 16:
7360 code = BFD_RELOC_16_PCREL;
7361 break;
7362 case 24:
7363 code = BFD_RELOC_24_PCREL;
7364 break;
7365 case 32:
7366 code = BFD_RELOC_32_PCREL;
7367 break;
7368 case 64:
7369 code = BFD_RELOC_64_PCREL;
7370 break;
7371 default:
7372 goto fail;
7373 }
7374
7375 howto = bfd_reloc_type_lookup (abfd, code);
7376
7377 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7378 {
7379 if (howto->pcrel_offset)
7380 areloc->addend += areloc->address;
7381 else
7382 areloc->addend -= areloc->address; /* addend is unsigned!! */
7383 }
7384 }
7385 else
7386 {
7387 switch (areloc->howto->bitsize)
7388 {
7389 case 8:
7390 code = BFD_RELOC_8;
7391 break;
7392 case 14:
7393 code = BFD_RELOC_14;
7394 break;
7395 case 16:
7396 code = BFD_RELOC_16;
7397 break;
7398 case 26:
7399 code = BFD_RELOC_26;
7400 break;
7401 case 32:
7402 code = BFD_RELOC_32;
7403 break;
7404 case 64:
7405 code = BFD_RELOC_64;
7406 break;
7407 default:
7408 goto fail;
7409 }
7410
7411 howto = bfd_reloc_type_lookup (abfd, code);
7412 }
7413
7414 if (howto)
7415 areloc->howto = howto;
7416 else
7417 goto fail;
7418 }
7419
b34976b6 7420 return TRUE;
252b5132
RH
7421
7422 fail:
7423 (*_bfd_error_handler)
d003868e
AM
7424 (_("%B: unsupported relocation type %s"),
7425 abfd, areloc->howto->name);
252b5132 7426 bfd_set_error (bfd_error_bad_value);
b34976b6 7427 return FALSE;
252b5132
RH
7428}
7429
b34976b6 7430bfd_boolean
217aa764 7431_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132
RH
7432{
7433 if (bfd_get_format (abfd) == bfd_object)
7434 {
b25e3d87 7435 if (elf_tdata (abfd) != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 7436 _bfd_elf_strtab_free (elf_shstrtab (abfd));
6f140a15 7437 _bfd_dwarf2_cleanup_debug_info (abfd);
252b5132
RH
7438 }
7439
7440 return _bfd_generic_close_and_cleanup (abfd);
7441}
7442
7443/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7444 in the relocation's offset. Thus we cannot allow any sort of sanity
7445 range-checking to interfere. There is nothing else to do in processing
7446 this reloc. */
7447
7448bfd_reloc_status_type
217aa764
AM
7449_bfd_elf_rel_vtable_reloc_fn
7450 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7451 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7452 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7453 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7454{
7455 return bfd_reloc_ok;
7456}
252b5132
RH
7457\f
7458/* Elf core file support. Much of this only works on native
7459 toolchains, since we rely on knowing the
7460 machine-dependent procfs structure in order to pick
c044fabd 7461 out details about the corefile. */
252b5132
RH
7462
7463#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
7464/* Needed for new procfs interface on sparc-solaris. */
7465# define _STRUCTURED_PROC 1
252b5132
RH
7466# include <sys/procfs.h>
7467#endif
7468
c044fabd 7469/* FIXME: this is kinda wrong, but it's what gdb wants. */
252b5132
RH
7470
7471static int
217aa764 7472elfcore_make_pid (bfd *abfd)
252b5132
RH
7473{
7474 return ((elf_tdata (abfd)->core_lwpid << 16)
7475 + (elf_tdata (abfd)->core_pid));
7476}
7477
252b5132
RH
7478/* If there isn't a section called NAME, make one, using
7479 data from SECT. Note, this function will generate a
7480 reference to NAME, so you shouldn't deallocate or
c044fabd 7481 overwrite it. */
252b5132 7482
b34976b6 7483static bfd_boolean
217aa764 7484elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7485{
c044fabd 7486 asection *sect2;
252b5132
RH
7487
7488 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7489 return TRUE;
252b5132 7490
117ed4f8 7491 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7492 if (sect2 == NULL)
b34976b6 7493 return FALSE;
252b5132 7494
eea6121a 7495 sect2->size = sect->size;
252b5132 7496 sect2->filepos = sect->filepos;
252b5132 7497 sect2->alignment_power = sect->alignment_power;
b34976b6 7498 return TRUE;
252b5132
RH
7499}
7500
bb0082d6
AM
7501/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7502 actually creates up to two pseudosections:
7503 - For the single-threaded case, a section named NAME, unless
7504 such a section already exists.
7505 - For the multi-threaded case, a section named "NAME/PID", where
7506 PID is elfcore_make_pid (abfd).
7507 Both pseudosections have identical contents. */
b34976b6 7508bfd_boolean
217aa764
AM
7509_bfd_elfcore_make_pseudosection (bfd *abfd,
7510 char *name,
7511 size_t size,
7512 ufile_ptr filepos)
bb0082d6
AM
7513{
7514 char buf[100];
7515 char *threaded_name;
d4c88bbb 7516 size_t len;
bb0082d6
AM
7517 asection *sect;
7518
7519 /* Build the section name. */
7520
7521 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7522 len = strlen (buf) + 1;
a50b1753 7523 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 7524 if (threaded_name == NULL)
b34976b6 7525 return FALSE;
d4c88bbb 7526 memcpy (threaded_name, buf, len);
bb0082d6 7527
117ed4f8
AM
7528 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7529 SEC_HAS_CONTENTS);
bb0082d6 7530 if (sect == NULL)
b34976b6 7531 return FALSE;
eea6121a 7532 sect->size = size;
bb0082d6 7533 sect->filepos = filepos;
bb0082d6
AM
7534 sect->alignment_power = 2;
7535
936e320b 7536 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7537}
7538
252b5132 7539/* prstatus_t exists on:
4a938328 7540 solaris 2.5+
252b5132
RH
7541 linux 2.[01] + glibc
7542 unixware 4.2
7543*/
7544
7545#if defined (HAVE_PRSTATUS_T)
a7b97311 7546
b34976b6 7547static bfd_boolean
217aa764 7548elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7549{
eea6121a 7550 size_t size;
7ee38065 7551 int offset;
252b5132 7552
4a938328
MS
7553 if (note->descsz == sizeof (prstatus_t))
7554 {
7555 prstatus_t prstat;
252b5132 7556
eea6121a 7557 size = sizeof (prstat.pr_reg);
7ee38065 7558 offset = offsetof (prstatus_t, pr_reg);
4a938328 7559 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7560
fa49d224
NC
7561 /* Do not overwrite the core signal if it
7562 has already been set by another thread. */
7563 if (elf_tdata (abfd)->core_signal == 0)
7564 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328 7565 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7566
4a938328
MS
7567 /* pr_who exists on:
7568 solaris 2.5+
7569 unixware 4.2
7570 pr_who doesn't exist on:
7571 linux 2.[01]
7572 */
252b5132 7573#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7574 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
252b5132 7575#endif
4a938328 7576 }
7ee38065 7577#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7578 else if (note->descsz == sizeof (prstatus32_t))
7579 {
7580 /* 64-bit host, 32-bit corefile */
7581 prstatus32_t prstat;
7582
eea6121a 7583 size = sizeof (prstat.pr_reg);
7ee38065 7584 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
7585 memcpy (&prstat, note->descdata, sizeof (prstat));
7586
fa49d224
NC
7587 /* Do not overwrite the core signal if it
7588 has already been set by another thread. */
7589 if (elf_tdata (abfd)->core_signal == 0)
7590 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
4a938328
MS
7591 elf_tdata (abfd)->core_pid = prstat.pr_pid;
7592
7593 /* pr_who exists on:
7594 solaris 2.5+
7595 unixware 4.2
7596 pr_who doesn't exist on:
7597 linux 2.[01]
7598 */
7ee38065 7599#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328
MS
7600 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
7601#endif
7602 }
7ee38065 7603#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
7604 else
7605 {
7606 /* Fail - we don't know how to handle any other
7607 note size (ie. data object type). */
b34976b6 7608 return TRUE;
4a938328 7609 }
252b5132 7610
bb0082d6 7611 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 7612 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 7613 size, note->descpos + offset);
252b5132
RH
7614}
7615#endif /* defined (HAVE_PRSTATUS_T) */
7616
bb0082d6 7617/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 7618static bfd_boolean
217aa764
AM
7619elfcore_make_note_pseudosection (bfd *abfd,
7620 char *name,
7621 Elf_Internal_Note *note)
252b5132 7622{
936e320b
AM
7623 return _bfd_elfcore_make_pseudosection (abfd, name,
7624 note->descsz, note->descpos);
252b5132
RH
7625}
7626
ff08c6bb
JB
7627/* There isn't a consistent prfpregset_t across platforms,
7628 but it doesn't matter, because we don't have to pick this
c044fabd
KH
7629 data structure apart. */
7630
b34976b6 7631static bfd_boolean
217aa764 7632elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7633{
7634 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
7635}
7636
ff08c6bb 7637/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 7638 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 7639 literally. */
c044fabd 7640
b34976b6 7641static bfd_boolean
217aa764 7642elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
7643{
7644 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
7645}
7646
4339cae0
L
7647/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
7648 with a note type of NT_X86_XSTATE. Just include the whole note's
7649 contents literally. */
7650
7651static bfd_boolean
7652elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
7653{
7654 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
7655}
7656
97753bd5
AM
7657static bfd_boolean
7658elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
7659{
7660 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
7661}
7662
89eeb0bc
LM
7663static bfd_boolean
7664elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
7665{
7666 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
7667}
97753bd5 7668
0675e188
UW
7669static bfd_boolean
7670elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
7671{
7672 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
7673}
7674
d7eeb400
MS
7675static bfd_boolean
7676elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
7677{
7678 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
7679}
7680
7681static bfd_boolean
7682elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
7683{
7684 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
7685}
7686
7687static bfd_boolean
7688elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
7689{
7690 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
7691}
7692
7693static bfd_boolean
7694elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
7695{
7696 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
7697}
7698
7699static bfd_boolean
7700elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
7701{
7702 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
7703}
7704
252b5132 7705#if defined (HAVE_PRPSINFO_T)
4a938328 7706typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 7707#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7708typedef prpsinfo32_t elfcore_psinfo32_t;
7709#endif
252b5132
RH
7710#endif
7711
7712#if defined (HAVE_PSINFO_T)
4a938328 7713typedef psinfo_t elfcore_psinfo_t;
7ee38065 7714#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
7715typedef psinfo32_t elfcore_psinfo32_t;
7716#endif
252b5132
RH
7717#endif
7718
252b5132
RH
7719/* return a malloc'ed copy of a string at START which is at
7720 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 7721 the copy will always have a terminating '\0'. */
252b5132 7722
936e320b 7723char *
217aa764 7724_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 7725{
dc810e39 7726 char *dups;
a50b1753 7727 char *end = (char *) memchr (start, '\0', max);
dc810e39 7728 size_t len;
252b5132
RH
7729
7730 if (end == NULL)
7731 len = max;
7732 else
7733 len = end - start;
7734
a50b1753 7735 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 7736 if (dups == NULL)
252b5132
RH
7737 return NULL;
7738
dc810e39
AM
7739 memcpy (dups, start, len);
7740 dups[len] = '\0';
252b5132 7741
dc810e39 7742 return dups;
252b5132
RH
7743}
7744
bb0082d6 7745#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 7746static bfd_boolean
217aa764 7747elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 7748{
4a938328
MS
7749 if (note->descsz == sizeof (elfcore_psinfo_t))
7750 {
7751 elfcore_psinfo_t psinfo;
252b5132 7752
7ee38065 7753 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7754
4a938328 7755 elf_tdata (abfd)->core_program
936e320b
AM
7756 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7757 sizeof (psinfo.pr_fname));
252b5132 7758
4a938328 7759 elf_tdata (abfd)->core_command
936e320b
AM
7760 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7761 sizeof (psinfo.pr_psargs));
4a938328 7762 }
7ee38065 7763#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
7764 else if (note->descsz == sizeof (elfcore_psinfo32_t))
7765 {
7766 /* 64-bit host, 32-bit corefile */
7767 elfcore_psinfo32_t psinfo;
7768
7ee38065 7769 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 7770
4a938328 7771 elf_tdata (abfd)->core_program
936e320b
AM
7772 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
7773 sizeof (psinfo.pr_fname));
4a938328
MS
7774
7775 elf_tdata (abfd)->core_command
936e320b
AM
7776 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
7777 sizeof (psinfo.pr_psargs));
4a938328
MS
7778 }
7779#endif
7780
7781 else
7782 {
7783 /* Fail - we don't know how to handle any other
7784 note size (ie. data object type). */
b34976b6 7785 return TRUE;
4a938328 7786 }
252b5132
RH
7787
7788 /* Note that for some reason, a spurious space is tacked
7789 onto the end of the args in some (at least one anyway)
c044fabd 7790 implementations, so strip it off if it exists. */
252b5132
RH
7791
7792 {
c044fabd 7793 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
7794 int n = strlen (command);
7795
7796 if (0 < n && command[n - 1] == ' ')
7797 command[n - 1] = '\0';
7798 }
7799
b34976b6 7800 return TRUE;
252b5132
RH
7801}
7802#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
7803
252b5132 7804#if defined (HAVE_PSTATUS_T)
b34976b6 7805static bfd_boolean
217aa764 7806elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7807{
f572a39d
AM
7808 if (note->descsz == sizeof (pstatus_t)
7809#if defined (HAVE_PXSTATUS_T)
7810 || note->descsz == sizeof (pxstatus_t)
7811#endif
7812 )
4a938328
MS
7813 {
7814 pstatus_t pstat;
252b5132 7815
4a938328 7816 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7817
4a938328
MS
7818 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7819 }
7ee38065 7820#if defined (HAVE_PSTATUS32_T)
4a938328
MS
7821 else if (note->descsz == sizeof (pstatus32_t))
7822 {
7823 /* 64-bit host, 32-bit corefile */
7824 pstatus32_t pstat;
252b5132 7825
4a938328 7826 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 7827
4a938328
MS
7828 elf_tdata (abfd)->core_pid = pstat.pr_pid;
7829 }
7830#endif
252b5132
RH
7831 /* Could grab some more details from the "representative"
7832 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 7833 NT_LWPSTATUS note, presumably. */
252b5132 7834
b34976b6 7835 return TRUE;
252b5132
RH
7836}
7837#endif /* defined (HAVE_PSTATUS_T) */
7838
252b5132 7839#if defined (HAVE_LWPSTATUS_T)
b34976b6 7840static bfd_boolean
217aa764 7841elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
7842{
7843 lwpstatus_t lwpstat;
7844 char buf[100];
c044fabd 7845 char *name;
d4c88bbb 7846 size_t len;
c044fabd 7847 asection *sect;
252b5132 7848
f572a39d
AM
7849 if (note->descsz != sizeof (lwpstat)
7850#if defined (HAVE_LWPXSTATUS_T)
7851 && note->descsz != sizeof (lwpxstatus_t)
7852#endif
7853 )
b34976b6 7854 return TRUE;
252b5132
RH
7855
7856 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
7857
7858 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
a1504221
JB
7859 /* Do not overwrite the core signal if it has already been set by
7860 another thread. */
7861 if (elf_tdata (abfd)->core_signal == 0)
7862 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
252b5132 7863
c044fabd 7864 /* Make a ".reg/999" section. */
252b5132
RH
7865
7866 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 7867 len = strlen (buf) + 1;
217aa764 7868 name = bfd_alloc (abfd, len);
252b5132 7869 if (name == NULL)
b34976b6 7870 return FALSE;
d4c88bbb 7871 memcpy (name, buf, len);
252b5132 7872
117ed4f8 7873 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7874 if (sect == NULL)
b34976b6 7875 return FALSE;
252b5132
RH
7876
7877#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7878 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
7879 sect->filepos = note->descpos
7880 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
7881#endif
7882
7883#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 7884 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
7885 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
7886#endif
7887
252b5132
RH
7888 sect->alignment_power = 2;
7889
7890 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7891 return FALSE;
252b5132
RH
7892
7893 /* Make a ".reg2/999" section */
7894
7895 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 7896 len = strlen (buf) + 1;
217aa764 7897 name = bfd_alloc (abfd, len);
252b5132 7898 if (name == NULL)
b34976b6 7899 return FALSE;
d4c88bbb 7900 memcpy (name, buf, len);
252b5132 7901
117ed4f8 7902 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 7903 if (sect == NULL)
b34976b6 7904 return FALSE;
252b5132
RH
7905
7906#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 7907 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
7908 sect->filepos = note->descpos
7909 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
7910#endif
7911
7912#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 7913 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
7914 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
7915#endif
7916
252b5132
RH
7917 sect->alignment_power = 2;
7918
936e320b 7919 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
7920}
7921#endif /* defined (HAVE_LWPSTATUS_T) */
7922
b34976b6 7923static bfd_boolean
217aa764 7924elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
7925{
7926 char buf[30];
c044fabd 7927 char *name;
d4c88bbb 7928 size_t len;
c044fabd 7929 asection *sect;
4a6636fb
PA
7930 int type;
7931 int is_active_thread;
7932 bfd_vma base_addr;
16e9c715 7933
4a6636fb 7934 if (note->descsz < 728)
b34976b6 7935 return TRUE;
16e9c715 7936
4a6636fb
PA
7937 if (! CONST_STRNEQ (note->namedata, "win32"))
7938 return TRUE;
7939
7940 type = bfd_get_32 (abfd, note->descdata);
c044fabd 7941
4a6636fb 7942 switch (type)
16e9c715 7943 {
4a6636fb 7944 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 7945 /* FIXME: need to add ->core_command. */
4a6636fb
PA
7946 /* process_info.pid */
7947 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
7948 /* process_info.signal */
7949 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 7950 break;
16e9c715 7951
4a6636fb 7952 case 2 /* NOTE_INFO_THREAD */:
16e9c715 7953 /* Make a ".reg/999" section. */
4a6636fb
PA
7954 /* thread_info.tid */
7955 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 7956
d4c88bbb 7957 len = strlen (buf) + 1;
a50b1753 7958 name = (char *) bfd_alloc (abfd, len);
16e9c715 7959 if (name == NULL)
b34976b6 7960 return FALSE;
c044fabd 7961
d4c88bbb 7962 memcpy (name, buf, len);
16e9c715 7963
117ed4f8 7964 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 7965 if (sect == NULL)
b34976b6 7966 return FALSE;
c044fabd 7967
4a6636fb
PA
7968 /* sizeof (thread_info.thread_context) */
7969 sect->size = 716;
7970 /* offsetof (thread_info.thread_context) */
7971 sect->filepos = note->descpos + 12;
16e9c715
NC
7972 sect->alignment_power = 2;
7973
4a6636fb
PA
7974 /* thread_info.is_active_thread */
7975 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
7976
7977 if (is_active_thread)
16e9c715 7978 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 7979 return FALSE;
16e9c715
NC
7980 break;
7981
4a6636fb 7982 case 3 /* NOTE_INFO_MODULE */:
16e9c715 7983 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
7984 /* module_info.base_address */
7985 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 7986 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 7987
d4c88bbb 7988 len = strlen (buf) + 1;
a50b1753 7989 name = (char *) bfd_alloc (abfd, len);
16e9c715 7990 if (name == NULL)
b34976b6 7991 return FALSE;
c044fabd 7992
d4c88bbb 7993 memcpy (name, buf, len);
252b5132 7994
117ed4f8 7995 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 7996
16e9c715 7997 if (sect == NULL)
b34976b6 7998 return FALSE;
c044fabd 7999
eea6121a 8000 sect->size = note->descsz;
16e9c715 8001 sect->filepos = note->descpos;
16e9c715
NC
8002 sect->alignment_power = 2;
8003 break;
8004
8005 default:
b34976b6 8006 return TRUE;
16e9c715
NC
8007 }
8008
b34976b6 8009 return TRUE;
16e9c715 8010}
252b5132 8011
b34976b6 8012static bfd_boolean
217aa764 8013elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 8014{
9c5bfbb7 8015 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 8016
252b5132
RH
8017 switch (note->type)
8018 {
8019 default:
b34976b6 8020 return TRUE;
252b5132 8021
252b5132 8022 case NT_PRSTATUS:
bb0082d6
AM
8023 if (bed->elf_backend_grok_prstatus)
8024 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 8025 return TRUE;
bb0082d6 8026#if defined (HAVE_PRSTATUS_T)
252b5132 8027 return elfcore_grok_prstatus (abfd, note);
bb0082d6 8028#else
b34976b6 8029 return TRUE;
252b5132
RH
8030#endif
8031
8032#if defined (HAVE_PSTATUS_T)
8033 case NT_PSTATUS:
8034 return elfcore_grok_pstatus (abfd, note);
8035#endif
8036
8037#if defined (HAVE_LWPSTATUS_T)
8038 case NT_LWPSTATUS:
8039 return elfcore_grok_lwpstatus (abfd, note);
8040#endif
8041
8042 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
8043 return elfcore_grok_prfpreg (abfd, note);
8044
c044fabd 8045 case NT_WIN32PSTATUS:
16e9c715 8046 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 8047
c044fabd 8048 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
8049 if (note->namesz == 6
8050 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
8051 return elfcore_grok_prxfpreg (abfd, note);
8052 else
b34976b6 8053 return TRUE;
ff08c6bb 8054
4339cae0
L
8055 case NT_X86_XSTATE: /* Linux XSAVE extension */
8056 if (note->namesz == 6
8057 && strcmp (note->namedata, "LINUX") == 0)
8058 return elfcore_grok_xstatereg (abfd, note);
8059 else
8060 return TRUE;
8061
97753bd5
AM
8062 case NT_PPC_VMX:
8063 if (note->namesz == 6
8064 && strcmp (note->namedata, "LINUX") == 0)
8065 return elfcore_grok_ppc_vmx (abfd, note);
8066 else
8067 return TRUE;
8068
89eeb0bc
LM
8069 case NT_PPC_VSX:
8070 if (note->namesz == 6
8071 && strcmp (note->namedata, "LINUX") == 0)
8072 return elfcore_grok_ppc_vsx (abfd, note);
8073 else
8074 return TRUE;
8075
0675e188
UW
8076 case NT_S390_HIGH_GPRS:
8077 if (note->namesz == 6
8078 && strcmp (note->namedata, "LINUX") == 0)
8079 return elfcore_grok_s390_high_gprs (abfd, note);
8080 else
8081 return TRUE;
8082
d7eeb400
MS
8083 case NT_S390_TIMER:
8084 if (note->namesz == 6
8085 && strcmp (note->namedata, "LINUX") == 0)
8086 return elfcore_grok_s390_timer (abfd, note);
8087 else
8088 return TRUE;
8089
8090 case NT_S390_TODCMP:
8091 if (note->namesz == 6
8092 && strcmp (note->namedata, "LINUX") == 0)
8093 return elfcore_grok_s390_todcmp (abfd, note);
8094 else
8095 return TRUE;
8096
8097 case NT_S390_TODPREG:
8098 if (note->namesz == 6
8099 && strcmp (note->namedata, "LINUX") == 0)
8100 return elfcore_grok_s390_todpreg (abfd, note);
8101 else
8102 return TRUE;
8103
8104 case NT_S390_CTRS:
8105 if (note->namesz == 6
8106 && strcmp (note->namedata, "LINUX") == 0)
8107 return elfcore_grok_s390_ctrs (abfd, note);
8108 else
8109 return TRUE;
8110
8111 case NT_S390_PREFIX:
8112 if (note->namesz == 6
8113 && strcmp (note->namedata, "LINUX") == 0)
8114 return elfcore_grok_s390_prefix (abfd, note);
8115 else
8116 return TRUE;
8117
252b5132
RH
8118 case NT_PRPSINFO:
8119 case NT_PSINFO:
bb0082d6
AM
8120 if (bed->elf_backend_grok_psinfo)
8121 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8122 return TRUE;
bb0082d6 8123#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8124 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8125#else
b34976b6 8126 return TRUE;
252b5132 8127#endif
3333a7c3
RM
8128
8129 case NT_AUXV:
8130 {
117ed4f8
AM
8131 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8132 SEC_HAS_CONTENTS);
3333a7c3
RM
8133
8134 if (sect == NULL)
8135 return FALSE;
eea6121a 8136 sect->size = note->descsz;
3333a7c3 8137 sect->filepos = note->descpos;
3333a7c3
RM
8138 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8139
8140 return TRUE;
8141 }
252b5132
RH
8142 }
8143}
8144
718175fa
JK
8145static bfd_boolean
8146elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8147{
8148 elf_tdata (abfd)->build_id_size = note->descsz;
a50b1753 8149 elf_tdata (abfd)->build_id = (bfd_byte *) bfd_alloc (abfd, note->descsz);
718175fa
JK
8150 if (elf_tdata (abfd)->build_id == NULL)
8151 return FALSE;
8152
8153 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
8154
8155 return TRUE;
8156}
8157
8158static bfd_boolean
8159elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8160{
8161 switch (note->type)
8162 {
8163 default:
8164 return TRUE;
8165
8166 case NT_GNU_BUILD_ID:
8167 return elfobj_grok_gnu_build_id (abfd, note);
8168 }
8169}
8170
b34976b6 8171static bfd_boolean
217aa764 8172elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8173{
8174 char *cp;
8175
8176 cp = strchr (note->namedata, '@');
8177 if (cp != NULL)
8178 {
d2b64500 8179 *lwpidp = atoi(cp + 1);
b34976b6 8180 return TRUE;
50b2bdb7 8181 }
b34976b6 8182 return FALSE;
50b2bdb7
AM
8183}
8184
b34976b6 8185static bfd_boolean
217aa764 8186elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8187{
50b2bdb7
AM
8188 /* Signal number at offset 0x08. */
8189 elf_tdata (abfd)->core_signal
8190 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8191
8192 /* Process ID at offset 0x50. */
8193 elf_tdata (abfd)->core_pid
8194 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8195
8196 /* Command name at 0x7c (max 32 bytes, including nul). */
8197 elf_tdata (abfd)->core_command
8198 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8199
7720ba9f
MK
8200 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8201 note);
50b2bdb7
AM
8202}
8203
b34976b6 8204static bfd_boolean
217aa764 8205elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8206{
8207 int lwp;
8208
8209 if (elfcore_netbsd_get_lwpid (note, &lwp))
8210 elf_tdata (abfd)->core_lwpid = lwp;
8211
b4db1224 8212 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8213 {
8214 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8215 find this note before any of the others, which is fine,
8216 since the kernel writes this note out first when it
8217 creates a core file. */
47d9a591 8218
50b2bdb7
AM
8219 return elfcore_grok_netbsd_procinfo (abfd, note);
8220 }
8221
b4db1224
JT
8222 /* As of Jan 2002 there are no other machine-independent notes
8223 defined for NetBSD core files. If the note type is less
8224 than the start of the machine-dependent note types, we don't
8225 understand it. */
47d9a591 8226
b4db1224 8227 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8228 return TRUE;
50b2bdb7
AM
8229
8230
8231 switch (bfd_get_arch (abfd))
8232 {
08a40648
AM
8233 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8234 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8235
8236 case bfd_arch_alpha:
8237 case bfd_arch_sparc:
8238 switch (note->type)
08a40648
AM
8239 {
8240 case NT_NETBSDCORE_FIRSTMACH+0:
8241 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8242
08a40648
AM
8243 case NT_NETBSDCORE_FIRSTMACH+2:
8244 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8245
08a40648
AM
8246 default:
8247 return TRUE;
8248 }
50b2bdb7 8249
08a40648
AM
8250 /* On all other arch's, PT_GETREGS == mach+1 and
8251 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8252
8253 default:
8254 switch (note->type)
08a40648
AM
8255 {
8256 case NT_NETBSDCORE_FIRSTMACH+1:
8257 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8258
08a40648
AM
8259 case NT_NETBSDCORE_FIRSTMACH+3:
8260 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8261
08a40648
AM
8262 default:
8263 return TRUE;
8264 }
50b2bdb7
AM
8265 }
8266 /* NOTREACHED */
8267}
8268
67cc5033
MK
8269static bfd_boolean
8270elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8271{
8272 /* Signal number at offset 0x08. */
8273 elf_tdata (abfd)->core_signal
8274 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8275
8276 /* Process ID at offset 0x20. */
8277 elf_tdata (abfd)->core_pid
8278 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8279
8280 /* Command name at 0x48 (max 32 bytes, including nul). */
8281 elf_tdata (abfd)->core_command
8282 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8283
8284 return TRUE;
8285}
8286
8287static bfd_boolean
8288elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8289{
8290 if (note->type == NT_OPENBSD_PROCINFO)
8291 return elfcore_grok_openbsd_procinfo (abfd, note);
8292
8293 if (note->type == NT_OPENBSD_REGS)
8294 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8295
8296 if (note->type == NT_OPENBSD_FPREGS)
8297 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8298
8299 if (note->type == NT_OPENBSD_XFPREGS)
8300 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8301
8302 if (note->type == NT_OPENBSD_AUXV)
8303 {
8304 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8305 SEC_HAS_CONTENTS);
8306
8307 if (sect == NULL)
8308 return FALSE;
8309 sect->size = note->descsz;
8310 sect->filepos = note->descpos;
8311 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8312
8313 return TRUE;
8314 }
8315
8316 if (note->type == NT_OPENBSD_WCOOKIE)
8317 {
8318 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8319 SEC_HAS_CONTENTS);
8320
8321 if (sect == NULL)
8322 return FALSE;
8323 sect->size = note->descsz;
8324 sect->filepos = note->descpos;
8325 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8326
8327 return TRUE;
8328 }
8329
8330 return TRUE;
8331}
8332
07c6e936 8333static bfd_boolean
d3fd4074 8334elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8335{
8336 void *ddata = note->descdata;
8337 char buf[100];
8338 char *name;
8339 asection *sect;
f8843e87
AM
8340 short sig;
8341 unsigned flags;
07c6e936
NC
8342
8343 /* nto_procfs_status 'pid' field is at offset 0. */
8344 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8345
f8843e87
AM
8346 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8347 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8348
8349 /* nto_procfs_status 'flags' field is at offset 8. */
8350 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8351
8352 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8353 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8354 {
8355 elf_tdata (abfd)->core_signal = sig;
8356 elf_tdata (abfd)->core_lwpid = *tid;
8357 }
07c6e936 8358
f8843e87
AM
8359 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8360 do not come from signals so we make sure we set the current
8361 thread just in case. */
8362 if (flags & 0x00000080)
8363 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8364
8365 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8366 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8367
a50b1753 8368 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8369 if (name == NULL)
8370 return FALSE;
8371 strcpy (name, buf);
8372
117ed4f8 8373 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8374 if (sect == NULL)
8375 return FALSE;
8376
eea6121a 8377 sect->size = note->descsz;
07c6e936 8378 sect->filepos = note->descpos;
07c6e936
NC
8379 sect->alignment_power = 2;
8380
8381 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8382}
8383
8384static bfd_boolean
d69f560c
KW
8385elfcore_grok_nto_regs (bfd *abfd,
8386 Elf_Internal_Note *note,
d3fd4074 8387 long tid,
d69f560c 8388 char *base)
07c6e936
NC
8389{
8390 char buf[100];
8391 char *name;
8392 asection *sect;
8393
d69f560c 8394 /* Make a "(base)/%d" section. */
d3fd4074 8395 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8396
a50b1753 8397 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8398 if (name == NULL)
8399 return FALSE;
8400 strcpy (name, buf);
8401
117ed4f8 8402 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8403 if (sect == NULL)
8404 return FALSE;
8405
eea6121a 8406 sect->size = note->descsz;
07c6e936 8407 sect->filepos = note->descpos;
07c6e936
NC
8408 sect->alignment_power = 2;
8409
f8843e87
AM
8410 /* This is the current thread. */
8411 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8412 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8413
8414 return TRUE;
07c6e936
NC
8415}
8416
8417#define BFD_QNT_CORE_INFO 7
8418#define BFD_QNT_CORE_STATUS 8
8419#define BFD_QNT_CORE_GREG 9
8420#define BFD_QNT_CORE_FPREG 10
8421
8422static bfd_boolean
217aa764 8423elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8424{
8425 /* Every GREG section has a STATUS section before it. Store the
811072d8 8426 tid from the previous call to pass down to the next gregs
07c6e936 8427 function. */
d3fd4074 8428 static long tid = 1;
07c6e936
NC
8429
8430 switch (note->type)
8431 {
d69f560c
KW
8432 case BFD_QNT_CORE_INFO:
8433 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8434 case BFD_QNT_CORE_STATUS:
8435 return elfcore_grok_nto_status (abfd, note, &tid);
8436 case BFD_QNT_CORE_GREG:
8437 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8438 case BFD_QNT_CORE_FPREG:
8439 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8440 default:
8441 return TRUE;
07c6e936
NC
8442 }
8443}
8444
b15fa79e
AM
8445static bfd_boolean
8446elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8447{
8448 char *name;
8449 asection *sect;
8450 size_t len;
8451
8452 /* Use note name as section name. */
8453 len = note->namesz;
a50b1753 8454 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
8455 if (name == NULL)
8456 return FALSE;
8457 memcpy (name, note->namedata, len);
8458 name[len - 1] = '\0';
8459
8460 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8461 if (sect == NULL)
8462 return FALSE;
8463
8464 sect->size = note->descsz;
8465 sect->filepos = note->descpos;
8466 sect->alignment_power = 1;
8467
8468 return TRUE;
8469}
8470
7c76fa91
MS
8471/* Function: elfcore_write_note
8472
47d9a591 8473 Inputs:
a39f3346 8474 buffer to hold note, and current size of buffer
7c76fa91
MS
8475 name of note
8476 type of note
8477 data for note
8478 size of data for note
8479
a39f3346
AM
8480 Writes note to end of buffer. ELF64 notes are written exactly as
8481 for ELF32, despite the current (as of 2006) ELF gabi specifying
8482 that they ought to have 8-byte namesz and descsz field, and have
8483 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8484
7c76fa91 8485 Return:
a39f3346 8486 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8487
8488char *
a39f3346 8489elfcore_write_note (bfd *abfd,
217aa764 8490 char *buf,
a39f3346 8491 int *bufsiz,
217aa764 8492 const char *name,
a39f3346 8493 int type,
217aa764 8494 const void *input,
a39f3346 8495 int size)
7c76fa91
MS
8496{
8497 Elf_External_Note *xnp;
d4c88bbb 8498 size_t namesz;
d4c88bbb 8499 size_t newspace;
a39f3346 8500 char *dest;
7c76fa91 8501
d4c88bbb 8502 namesz = 0;
d4c88bbb 8503 if (name != NULL)
a39f3346 8504 namesz = strlen (name) + 1;
d4c88bbb 8505
a39f3346 8506 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 8507
a50b1753 8508 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
8509 if (buf == NULL)
8510 return buf;
a39f3346 8511 dest = buf + *bufsiz;
7c76fa91
MS
8512 *bufsiz += newspace;
8513 xnp = (Elf_External_Note *) dest;
8514 H_PUT_32 (abfd, namesz, xnp->namesz);
8515 H_PUT_32 (abfd, size, xnp->descsz);
8516 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
8517 dest = xnp->name;
8518 if (name != NULL)
8519 {
8520 memcpy (dest, name, namesz);
8521 dest += namesz;
a39f3346 8522 while (namesz & 3)
d4c88bbb
AM
8523 {
8524 *dest++ = '\0';
a39f3346 8525 ++namesz;
d4c88bbb
AM
8526 }
8527 }
8528 memcpy (dest, input, size);
a39f3346
AM
8529 dest += size;
8530 while (size & 3)
8531 {
8532 *dest++ = '\0';
8533 ++size;
8534 }
8535 return buf;
7c76fa91
MS
8536}
8537
8538#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
8539char *
217aa764
AM
8540elfcore_write_prpsinfo (bfd *abfd,
8541 char *buf,
8542 int *bufsiz,
8543 const char *fname,
8544 const char *psargs)
7c76fa91 8545{
183e98be
AM
8546 const char *note_name = "CORE";
8547 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8548
8549 if (bed->elf_backend_write_core_note != NULL)
8550 {
8551 char *ret;
8552 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8553 NT_PRPSINFO, fname, psargs);
8554 if (ret != NULL)
8555 return ret;
8556 }
7c76fa91 8557
183e98be
AM
8558#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
8559 if (bed->s->elfclass == ELFCLASS32)
8560 {
8561#if defined (HAVE_PSINFO32_T)
8562 psinfo32_t data;
8563 int note_type = NT_PSINFO;
8564#else
8565 prpsinfo32_t data;
8566 int note_type = NT_PRPSINFO;
8567#endif
8568
8569 memset (&data, 0, sizeof (data));
8570 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8571 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8572 return elfcore_write_note (abfd, buf, bufsiz,
8573 note_name, note_type, &data, sizeof (data));
8574 }
8575 else
8576#endif
8577 {
7c76fa91 8578#if defined (HAVE_PSINFO_T)
183e98be
AM
8579 psinfo_t data;
8580 int note_type = NT_PSINFO;
7c76fa91 8581#else
183e98be
AM
8582 prpsinfo_t data;
8583 int note_type = NT_PRPSINFO;
7c76fa91
MS
8584#endif
8585
183e98be
AM
8586 memset (&data, 0, sizeof (data));
8587 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
8588 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
8589 return elfcore_write_note (abfd, buf, bufsiz,
8590 note_name, note_type, &data, sizeof (data));
8591 }
7c76fa91
MS
8592}
8593#endif /* PSINFO_T or PRPSINFO_T */
8594
8595#if defined (HAVE_PRSTATUS_T)
8596char *
217aa764
AM
8597elfcore_write_prstatus (bfd *abfd,
8598 char *buf,
8599 int *bufsiz,
8600 long pid,
8601 int cursig,
8602 const void *gregs)
7c76fa91 8603{
183e98be
AM
8604 const char *note_name = "CORE";
8605 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8606
183e98be
AM
8607 if (bed->elf_backend_write_core_note != NULL)
8608 {
8609 char *ret;
8610 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
8611 NT_PRSTATUS,
8612 pid, cursig, gregs);
8613 if (ret != NULL)
8614 return ret;
8615 }
8616
8617#if defined (HAVE_PRSTATUS32_T)
8618 if (bed->s->elfclass == ELFCLASS32)
8619 {
8620 prstatus32_t prstat;
8621
8622 memset (&prstat, 0, sizeof (prstat));
8623 prstat.pr_pid = pid;
8624 prstat.pr_cursig = cursig;
8625 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8626 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8627 NT_PRSTATUS, &prstat, sizeof (prstat));
8628 }
8629 else
8630#endif
8631 {
8632 prstatus_t prstat;
8633
8634 memset (&prstat, 0, sizeof (prstat));
8635 prstat.pr_pid = pid;
8636 prstat.pr_cursig = cursig;
8637 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
8638 return elfcore_write_note (abfd, buf, bufsiz, note_name,
8639 NT_PRSTATUS, &prstat, sizeof (prstat));
8640 }
7c76fa91
MS
8641}
8642#endif /* HAVE_PRSTATUS_T */
8643
51316059
MS
8644#if defined (HAVE_LWPSTATUS_T)
8645char *
217aa764
AM
8646elfcore_write_lwpstatus (bfd *abfd,
8647 char *buf,
8648 int *bufsiz,
8649 long pid,
8650 int cursig,
8651 const void *gregs)
51316059
MS
8652{
8653 lwpstatus_t lwpstat;
183e98be 8654 const char *note_name = "CORE";
51316059
MS
8655
8656 memset (&lwpstat, 0, sizeof (lwpstat));
8657 lwpstat.pr_lwpid = pid >> 16;
8658 lwpstat.pr_cursig = cursig;
8659#if defined (HAVE_LWPSTATUS_T_PR_REG)
8660 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
8661#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
8662#if !defined(gregs)
8663 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
8664 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
8665#else
8666 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
8667 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
8668#endif
8669#endif
47d9a591 8670 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
8671 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
8672}
8673#endif /* HAVE_LWPSTATUS_T */
8674
7c76fa91
MS
8675#if defined (HAVE_PSTATUS_T)
8676char *
217aa764
AM
8677elfcore_write_pstatus (bfd *abfd,
8678 char *buf,
8679 int *bufsiz,
8680 long pid,
6c10990d
NC
8681 int cursig ATTRIBUTE_UNUSED,
8682 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 8683{
183e98be
AM
8684 const char *note_name = "CORE";
8685#if defined (HAVE_PSTATUS32_T)
8686 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 8687
183e98be
AM
8688 if (bed->s->elfclass == ELFCLASS32)
8689 {
8690 pstatus32_t pstat;
8691
8692 memset (&pstat, 0, sizeof (pstat));
8693 pstat.pr_pid = pid & 0xffff;
8694 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8695 NT_PSTATUS, &pstat, sizeof (pstat));
8696 return buf;
8697 }
8698 else
8699#endif
8700 {
8701 pstatus_t pstat;
8702
8703 memset (&pstat, 0, sizeof (pstat));
8704 pstat.pr_pid = pid & 0xffff;
8705 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
8706 NT_PSTATUS, &pstat, sizeof (pstat));
8707 return buf;
8708 }
7c76fa91
MS
8709}
8710#endif /* HAVE_PSTATUS_T */
8711
8712char *
217aa764
AM
8713elfcore_write_prfpreg (bfd *abfd,
8714 char *buf,
8715 int *bufsiz,
8716 const void *fpregs,
8717 int size)
7c76fa91 8718{
183e98be 8719 const char *note_name = "CORE";
47d9a591 8720 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8721 note_name, NT_FPREGSET, fpregs, size);
8722}
8723
8724char *
217aa764
AM
8725elfcore_write_prxfpreg (bfd *abfd,
8726 char *buf,
8727 int *bufsiz,
8728 const void *xfpregs,
8729 int size)
7c76fa91
MS
8730{
8731 char *note_name = "LINUX";
47d9a591 8732 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
8733 note_name, NT_PRXFPREG, xfpregs, size);
8734}
8735
4339cae0
L
8736char *
8737elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
8738 const void *xfpregs, int size)
8739{
8740 char *note_name = "LINUX";
8741 return elfcore_write_note (abfd, buf, bufsiz,
8742 note_name, NT_X86_XSTATE, xfpregs, size);
8743}
8744
97753bd5
AM
8745char *
8746elfcore_write_ppc_vmx (bfd *abfd,
8747 char *buf,
8748 int *bufsiz,
8749 const void *ppc_vmx,
8750 int size)
8751{
8752 char *note_name = "LINUX";
8753 return elfcore_write_note (abfd, buf, bufsiz,
8754 note_name, NT_PPC_VMX, ppc_vmx, size);
8755}
8756
89eeb0bc
LM
8757char *
8758elfcore_write_ppc_vsx (bfd *abfd,
8759 char *buf,
8760 int *bufsiz,
8761 const void *ppc_vsx,
8762 int size)
8763{
8764 char *note_name = "LINUX";
8765 return elfcore_write_note (abfd, buf, bufsiz,
8766 note_name, NT_PPC_VSX, ppc_vsx, size);
8767}
8768
0675e188
UW
8769static char *
8770elfcore_write_s390_high_gprs (bfd *abfd,
8771 char *buf,
8772 int *bufsiz,
8773 const void *s390_high_gprs,
8774 int size)
8775{
8776 char *note_name = "LINUX";
8777 return elfcore_write_note (abfd, buf, bufsiz,
8778 note_name, NT_S390_HIGH_GPRS,
8779 s390_high_gprs, size);
8780}
8781
d7eeb400
MS
8782char *
8783elfcore_write_s390_timer (bfd *abfd,
8784 char *buf,
8785 int *bufsiz,
8786 const void *s390_timer,
8787 int size)
8788{
8789 char *note_name = "LINUX";
8790 return elfcore_write_note (abfd, buf, bufsiz,
8791 note_name, NT_S390_TIMER, s390_timer, size);
8792}
8793
8794char *
8795elfcore_write_s390_todcmp (bfd *abfd,
8796 char *buf,
8797 int *bufsiz,
8798 const void *s390_todcmp,
8799 int size)
8800{
8801 char *note_name = "LINUX";
8802 return elfcore_write_note (abfd, buf, bufsiz,
8803 note_name, NT_S390_TODCMP, s390_todcmp, size);
8804}
8805
8806char *
8807elfcore_write_s390_todpreg (bfd *abfd,
8808 char *buf,
8809 int *bufsiz,
8810 const void *s390_todpreg,
8811 int size)
8812{
8813 char *note_name = "LINUX";
8814 return elfcore_write_note (abfd, buf, bufsiz,
8815 note_name, NT_S390_TODPREG, s390_todpreg, size);
8816}
8817
8818char *
8819elfcore_write_s390_ctrs (bfd *abfd,
8820 char *buf,
8821 int *bufsiz,
8822 const void *s390_ctrs,
8823 int size)
8824{
8825 char *note_name = "LINUX";
8826 return elfcore_write_note (abfd, buf, bufsiz,
8827 note_name, NT_S390_CTRS, s390_ctrs, size);
8828}
8829
8830char *
8831elfcore_write_s390_prefix (bfd *abfd,
8832 char *buf,
8833 int *bufsiz,
8834 const void *s390_prefix,
8835 int size)
8836{
8837 char *note_name = "LINUX";
8838 return elfcore_write_note (abfd, buf, bufsiz,
8839 note_name, NT_S390_PREFIX, s390_prefix, size);
8840}
8841
bb864ac1
CES
8842char *
8843elfcore_write_register_note (bfd *abfd,
8844 char *buf,
8845 int *bufsiz,
8846 const char *section,
8847 const void *data,
8848 int size)
8849{
8850 if (strcmp (section, ".reg2") == 0)
8851 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
8852 if (strcmp (section, ".reg-xfp") == 0)
8853 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
8854 if (strcmp (section, ".reg-xstate") == 0)
8855 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
8856 if (strcmp (section, ".reg-ppc-vmx") == 0)
8857 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
8858 if (strcmp (section, ".reg-ppc-vsx") == 0)
8859 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
8860 if (strcmp (section, ".reg-s390-high-gprs") == 0)
8861 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
8862 if (strcmp (section, ".reg-s390-timer") == 0)
8863 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
8864 if (strcmp (section, ".reg-s390-todcmp") == 0)
8865 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
8866 if (strcmp (section, ".reg-s390-todpreg") == 0)
8867 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
8868 if (strcmp (section, ".reg-s390-ctrs") == 0)
8869 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
8870 if (strcmp (section, ".reg-s390-prefix") == 0)
8871 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
bb864ac1
CES
8872 return NULL;
8873}
8874
b34976b6 8875static bfd_boolean
718175fa 8876elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 8877{
c044fabd 8878 char *p;
252b5132 8879
252b5132
RH
8880 p = buf;
8881 while (p < buf + size)
8882 {
c044fabd
KH
8883 /* FIXME: bad alignment assumption. */
8884 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
8885 Elf_Internal_Note in;
8886
baea7ef1
AM
8887 if (offsetof (Elf_External_Note, name) > buf - p + size)
8888 return FALSE;
8889
dc810e39 8890 in.type = H_GET_32 (abfd, xnp->type);
252b5132 8891
dc810e39 8892 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 8893 in.namedata = xnp->name;
baea7ef1
AM
8894 if (in.namesz > buf - in.namedata + size)
8895 return FALSE;
252b5132 8896
dc810e39 8897 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
8898 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
8899 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
8900 if (in.descsz != 0
8901 && (in.descdata >= buf + size
8902 || in.descsz > buf - in.descdata + size))
8903 return FALSE;
252b5132 8904
718175fa
JK
8905 switch (bfd_get_format (abfd))
8906 {
8907 default:
8908 return TRUE;
8909
8910 case bfd_core:
8911 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
8912 {
8913 if (! elfcore_grok_netbsd_note (abfd, &in))
8914 return FALSE;
8915 }
67cc5033
MK
8916 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
8917 {
8918 if (! elfcore_grok_openbsd_note (abfd, &in))
8919 return FALSE;
8920 }
718175fa
JK
8921 else if (CONST_STRNEQ (in.namedata, "QNX"))
8922 {
8923 if (! elfcore_grok_nto_note (abfd, &in))
8924 return FALSE;
8925 }
b15fa79e
AM
8926 else if (CONST_STRNEQ (in.namedata, "SPU/"))
8927 {
8928 if (! elfcore_grok_spu_note (abfd, &in))
8929 return FALSE;
8930 }
718175fa
JK
8931 else
8932 {
8933 if (! elfcore_grok_note (abfd, &in))
8934 return FALSE;
8935 }
8936 break;
8937
8938 case bfd_object:
8939 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
8940 {
8941 if (! elfobj_grok_gnu_note (abfd, &in))
8942 return FALSE;
8943 }
8944 break;
08a40648 8945 }
252b5132
RH
8946
8947 p = in.descdata + BFD_ALIGN (in.descsz, 4);
8948 }
8949
718175fa
JK
8950 return TRUE;
8951}
8952
8953static bfd_boolean
8954elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
8955{
8956 char *buf;
8957
8958 if (size <= 0)
8959 return TRUE;
8960
8961 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
8962 return FALSE;
8963
a50b1753 8964 buf = (char *) bfd_malloc (size);
718175fa
JK
8965 if (buf == NULL)
8966 return FALSE;
8967
8968 if (bfd_bread (buf, size, abfd) != size
8969 || !elf_parse_notes (abfd, buf, size, offset))
8970 {
8971 free (buf);
8972 return FALSE;
8973 }
8974
252b5132 8975 free (buf);
b34976b6 8976 return TRUE;
252b5132 8977}
98d8431c
JB
8978\f
8979/* Providing external access to the ELF program header table. */
8980
8981/* Return an upper bound on the number of bytes required to store a
8982 copy of ABFD's program header table entries. Return -1 if an error
8983 occurs; bfd_get_error will return an appropriate code. */
c044fabd 8984
98d8431c 8985long
217aa764 8986bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
8987{
8988 if (abfd->xvec->flavour != bfd_target_elf_flavour)
8989 {
8990 bfd_set_error (bfd_error_wrong_format);
8991 return -1;
8992 }
8993
936e320b 8994 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
8995}
8996
98d8431c
JB
8997/* Copy ABFD's program header table entries to *PHDRS. The entries
8998 will be stored as an array of Elf_Internal_Phdr structures, as
8999 defined in include/elf/internal.h. To find out how large the
9000 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
9001
9002 Return the number of program header table entries read, or -1 if an
9003 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 9004
98d8431c 9005int
217aa764 9006bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
9007{
9008 int num_phdrs;
9009
9010 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9011 {
9012 bfd_set_error (bfd_error_wrong_format);
9013 return -1;
9014 }
9015
9016 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 9017 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
9018 num_phdrs * sizeof (Elf_Internal_Phdr));
9019
9020 return num_phdrs;
9021}
ae4221d7 9022
db6751f2 9023enum elf_reloc_type_class
217aa764 9024_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
9025{
9026 return reloc_class_normal;
9027}
f8df10f4 9028
47d9a591 9029/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
9030 relocation against a local symbol. */
9031
9032bfd_vma
217aa764
AM
9033_bfd_elf_rela_local_sym (bfd *abfd,
9034 Elf_Internal_Sym *sym,
8517fae7 9035 asection **psec,
217aa764 9036 Elf_Internal_Rela *rel)
f8df10f4 9037{
8517fae7 9038 asection *sec = *psec;
f8df10f4
JJ
9039 bfd_vma relocation;
9040
9041 relocation = (sec->output_section->vma
9042 + sec->output_offset
9043 + sym->st_value);
9044 if ((sec->flags & SEC_MERGE)
c629eae0 9045 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
68bfbfcc 9046 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
f8df10f4 9047 {
f8df10f4 9048 rel->r_addend =
8517fae7 9049 _bfd_merged_section_offset (abfd, psec,
65765700 9050 elf_section_data (sec)->sec_info,
753731ee
AM
9051 sym->st_value + rel->r_addend);
9052 if (sec != *psec)
9053 {
9054 /* If we have changed the section, and our original section is
9055 marked with SEC_EXCLUDE, it means that the original
9056 SEC_MERGE section has been completely subsumed in some
9057 other SEC_MERGE section. In this case, we need to leave
9058 some info around for --emit-relocs. */
9059 if ((sec->flags & SEC_EXCLUDE) != 0)
9060 sec->kept_section = *psec;
9061 sec = *psec;
9062 }
8517fae7
AM
9063 rel->r_addend -= relocation;
9064 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
9065 }
9066 return relocation;
9067}
c629eae0
JJ
9068
9069bfd_vma
217aa764
AM
9070_bfd_elf_rel_local_sym (bfd *abfd,
9071 Elf_Internal_Sym *sym,
9072 asection **psec,
9073 bfd_vma addend)
47d9a591 9074{
c629eae0
JJ
9075 asection *sec = *psec;
9076
68bfbfcc 9077 if (sec->sec_info_type != ELF_INFO_TYPE_MERGE)
c629eae0
JJ
9078 return sym->st_value + addend;
9079
9080 return _bfd_merged_section_offset (abfd, psec,
65765700 9081 elf_section_data (sec)->sec_info,
753731ee 9082 sym->st_value + addend);
c629eae0
JJ
9083}
9084
9085bfd_vma
217aa764 9086_bfd_elf_section_offset (bfd *abfd,
92e4ec35 9087 struct bfd_link_info *info,
217aa764
AM
9088 asection *sec,
9089 bfd_vma offset)
c629eae0 9090{
68bfbfcc 9091 switch (sec->sec_info_type)
65765700
JJ
9092 {
9093 case ELF_INFO_TYPE_STABS:
eea6121a
AM
9094 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
9095 offset);
65765700 9096 case ELF_INFO_TYPE_EH_FRAME:
92e4ec35 9097 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700
JJ
9098 default:
9099 return offset;
9100 }
c629eae0 9101}
3333a7c3
RM
9102\f
9103/* Create a new BFD as if by bfd_openr. Rather than opening a file,
9104 reconstruct an ELF file by reading the segments out of remote memory
9105 based on the ELF file header at EHDR_VMA and the ELF program headers it
9106 points to. If not null, *LOADBASEP is filled in with the difference
9107 between the VMAs from which the segments were read, and the VMAs the
9108 file headers (and hence BFD's idea of each section's VMA) put them at.
9109
9110 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
9111 remote memory at target address VMA into the local buffer at MYADDR; it
9112 should return zero on success or an `errno' code on failure. TEMPL must
9113 be a BFD for an ELF target with the word size and byte order found in
9114 the remote memory. */
9115
9116bfd *
217aa764
AM
9117bfd_elf_bfd_from_remote_memory
9118 (bfd *templ,
9119 bfd_vma ehdr_vma,
9120 bfd_vma *loadbasep,
f075ee0c 9121 int (*target_read_memory) (bfd_vma, bfd_byte *, int))
3333a7c3
RM
9122{
9123 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
9124 (templ, ehdr_vma, loadbasep, target_read_memory);
9125}
4c45e5c9
JJ
9126\f
9127long
c9727e01
AM
9128_bfd_elf_get_synthetic_symtab (bfd *abfd,
9129 long symcount ATTRIBUTE_UNUSED,
9130 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 9131 long dynsymcount,
c9727e01
AM
9132 asymbol **dynsyms,
9133 asymbol **ret)
4c45e5c9
JJ
9134{
9135 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9136 asection *relplt;
9137 asymbol *s;
9138 const char *relplt_name;
9139 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
9140 arelent *p;
9141 long count, i, n;
9142 size_t size;
9143 Elf_Internal_Shdr *hdr;
9144 char *names;
9145 asection *plt;
9146
8615f3f2
AM
9147 *ret = NULL;
9148
90e3cdf2
JJ
9149 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
9150 return 0;
9151
8615f3f2
AM
9152 if (dynsymcount <= 0)
9153 return 0;
9154
4c45e5c9
JJ
9155 if (!bed->plt_sym_val)
9156 return 0;
9157
9158 relplt_name = bed->relplt_name;
9159 if (relplt_name == NULL)
d35fd659 9160 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
9161 relplt = bfd_get_section_by_name (abfd, relplt_name);
9162 if (relplt == NULL)
9163 return 0;
9164
9165 hdr = &elf_section_data (relplt)->this_hdr;
9166 if (hdr->sh_link != elf_dynsymtab (abfd)
9167 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
9168 return 0;
9169
9170 plt = bfd_get_section_by_name (abfd, ".plt");
9171 if (plt == NULL)
9172 return 0;
9173
9174 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 9175 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
9176 return -1;
9177
eea6121a 9178 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
9179 size = count * sizeof (asymbol);
9180 p = relplt->relocation;
cb53bf42 9181 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
9182 {
9183 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
9184 if (p->addend != 0)
9185 {
9186#ifdef BFD64
9187 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
9188#else
9189 size += sizeof ("+0x") - 1 + 8;
9190#endif
9191 }
9192 }
4c45e5c9 9193
a50b1753 9194 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
9195 if (s == NULL)
9196 return -1;
9197
9198 names = (char *) (s + count);
9199 p = relplt->relocation;
9200 n = 0;
cb53bf42 9201 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
9202 {
9203 size_t len;
9204 bfd_vma addr;
9205
9206 addr = bed->plt_sym_val (i, plt, p);
9207 if (addr == (bfd_vma) -1)
9208 continue;
9209
9210 *s = **p->sym_ptr_ptr;
65a7a66f
AM
9211 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
9212 we are defining a symbol, ensure one of them is set. */
9213 if ((s->flags & BSF_LOCAL) == 0)
9214 s->flags |= BSF_GLOBAL;
6ba2a415 9215 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
9216 s->section = plt;
9217 s->value = addr - plt->vma;
9218 s->name = names;
8f39ba8e 9219 s->udata.p = NULL;
4c45e5c9
JJ
9220 len = strlen ((*p->sym_ptr_ptr)->name);
9221 memcpy (names, (*p->sym_ptr_ptr)->name, len);
9222 names += len;
041de40d
AM
9223 if (p->addend != 0)
9224 {
1d770845 9225 char buf[30], *a;
91d6fa6a 9226
041de40d
AM
9227 memcpy (names, "+0x", sizeof ("+0x") - 1);
9228 names += sizeof ("+0x") - 1;
1d770845
L
9229 bfd_sprintf_vma (abfd, buf, p->addend);
9230 for (a = buf; *a == '0'; ++a)
9231 ;
9232 len = strlen (a);
9233 memcpy (names, a, len);
9234 names += len;
041de40d 9235 }
4c45e5c9
JJ
9236 memcpy (names, "@plt", sizeof ("@plt"));
9237 names += sizeof ("@plt");
8f39ba8e 9238 ++s, ++n;
4c45e5c9
JJ
9239 }
9240
9241 return n;
9242}
3d7f7666 9243
3b22753a
L
9244/* It is only used by x86-64 so far. */
9245asection _bfd_elf_large_com_section
9246 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 9247 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 9248
d1036acb
L
9249void
9250_bfd_elf_set_osabi (bfd * abfd,
9251 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
9252{
9253 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
9254
9255 i_ehdrp = elf_elfheader (abfd);
9256
9257 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
9258
9259 /* To make things simpler for the loader on Linux systems we set the
9260 osabi field to ELFOSABI_LINUX if the binary contains symbols of
9261 the STT_GNU_IFUNC type. */
9262 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
9263 && elf_tdata (abfd)->has_ifunc_symbols)
9264 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
d1036acb 9265}
fcb93ecf
PB
9266
9267
9268/* Return TRUE for ELF symbol types that represent functions.
9269 This is the default version of this function, which is sufficient for
d8045f23 9270 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
9271
9272bfd_boolean
9273_bfd_elf_is_function_type (unsigned int type)
9274{
d8045f23
NC
9275 return (type == STT_FUNC
9276 || type == STT_GNU_IFUNC);
fcb93ecf 9277}