]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf.c
daily update
[thirdparty/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91
AC
2
3 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
9f296da3 4 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012
72a80a16 5 Free Software Foundation, Inc.
252b5132 6
5e8d7549 7 This file is part of BFD, the Binary File Descriptor library.
252b5132 8
5e8d7549
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
5e8d7549 12 (at your option) any later version.
252b5132 13
5e8d7549
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
5e8d7549 19 You should have received a copy of the GNU General Public License
b34976b6 20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
23
252b5132 24
1b74d094
BW
25/*
26SECTION
252b5132
RH
27 ELF backends
28
29 BFD support for ELF formats is being worked on.
30 Currently, the best supported back ends are for sparc and i386
31 (running svr4 or Solaris 2).
32
33 Documentation of the internals of the support code still needs
34 to be written. The code is changing quickly enough that we
661a3fd4 35 haven't bothered yet. */
252b5132 36
7ee38065
MS
37/* For sparc64-cross-sparc32. */
38#define _SYSCALL32
252b5132 39#include "sysdep.h"
3db64b00 40#include "bfd.h"
252b5132
RH
41#include "bfdlink.h"
42#include "libbfd.h"
43#define ARCH_SIZE 0
44#include "elf-bfd.h"
e0e8c97f 45#include "libiberty.h"
ff59fc36 46#include "safe-ctype.h"
252b5132 47
8bc7f138
L
48#ifdef CORE_HEADER
49#include CORE_HEADER
50#endif
51
217aa764 52static int elf_sort_sections (const void *, const void *);
c84fca4d 53static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764
AM
54static bfd_boolean prep_headers (bfd *);
55static bfd_boolean swap_out_syms (bfd *, struct bfd_strtab_hash **, int) ;
718175fa
JK
56static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
57static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
58 file_ptr offset);
50b2bdb7 59
252b5132
RH
60/* Swap version information in and out. The version information is
61 currently size independent. If that ever changes, this code will
62 need to move into elfcode.h. */
63
64/* Swap in a Verdef structure. */
65
66void
217aa764
AM
67_bfd_elf_swap_verdef_in (bfd *abfd,
68 const Elf_External_Verdef *src,
69 Elf_Internal_Verdef *dst)
252b5132 70{
dc810e39
AM
71 dst->vd_version = H_GET_16 (abfd, src->vd_version);
72 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
73 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
74 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
75 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
76 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
77 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
78}
79
80/* Swap out a Verdef structure. */
81
82void
217aa764
AM
83_bfd_elf_swap_verdef_out (bfd *abfd,
84 const Elf_Internal_Verdef *src,
85 Elf_External_Verdef *dst)
252b5132 86{
dc810e39
AM
87 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
88 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
89 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
90 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
91 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
92 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
93 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
94}
95
96/* Swap in a Verdaux structure. */
97
98void
217aa764
AM
99_bfd_elf_swap_verdaux_in (bfd *abfd,
100 const Elf_External_Verdaux *src,
101 Elf_Internal_Verdaux *dst)
252b5132 102{
dc810e39
AM
103 dst->vda_name = H_GET_32 (abfd, src->vda_name);
104 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
105}
106
107/* Swap out a Verdaux structure. */
108
109void
217aa764
AM
110_bfd_elf_swap_verdaux_out (bfd *abfd,
111 const Elf_Internal_Verdaux *src,
112 Elf_External_Verdaux *dst)
252b5132 113{
dc810e39
AM
114 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
115 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
116}
117
118/* Swap in a Verneed structure. */
119
120void
217aa764
AM
121_bfd_elf_swap_verneed_in (bfd *abfd,
122 const Elf_External_Verneed *src,
123 Elf_Internal_Verneed *dst)
252b5132 124{
dc810e39
AM
125 dst->vn_version = H_GET_16 (abfd, src->vn_version);
126 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
127 dst->vn_file = H_GET_32 (abfd, src->vn_file);
128 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
129 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
130}
131
132/* Swap out a Verneed structure. */
133
134void
217aa764
AM
135_bfd_elf_swap_verneed_out (bfd *abfd,
136 const Elf_Internal_Verneed *src,
137 Elf_External_Verneed *dst)
252b5132 138{
dc810e39
AM
139 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
140 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
141 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
142 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
143 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
144}
145
146/* Swap in a Vernaux structure. */
147
148void
217aa764
AM
149_bfd_elf_swap_vernaux_in (bfd *abfd,
150 const Elf_External_Vernaux *src,
151 Elf_Internal_Vernaux *dst)
252b5132 152{
dc810e39
AM
153 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
154 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
155 dst->vna_other = H_GET_16 (abfd, src->vna_other);
156 dst->vna_name = H_GET_32 (abfd, src->vna_name);
157 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
158}
159
160/* Swap out a Vernaux structure. */
161
162void
217aa764
AM
163_bfd_elf_swap_vernaux_out (bfd *abfd,
164 const Elf_Internal_Vernaux *src,
165 Elf_External_Vernaux *dst)
252b5132 166{
dc810e39
AM
167 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
168 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
169 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
170 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
171 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
172}
173
174/* Swap in a Versym structure. */
175
176void
217aa764
AM
177_bfd_elf_swap_versym_in (bfd *abfd,
178 const Elf_External_Versym *src,
179 Elf_Internal_Versym *dst)
252b5132 180{
dc810e39 181 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
182}
183
184/* Swap out a Versym structure. */
185
186void
217aa764
AM
187_bfd_elf_swap_versym_out (bfd *abfd,
188 const Elf_Internal_Versym *src,
189 Elf_External_Versym *dst)
252b5132 190{
dc810e39 191 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
192}
193
194/* Standard ELF hash function. Do not change this function; you will
195 cause invalid hash tables to be generated. */
3a99b017 196
252b5132 197unsigned long
217aa764 198bfd_elf_hash (const char *namearg)
252b5132 199{
3a99b017 200 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
201 unsigned long h = 0;
202 unsigned long g;
203 int ch;
204
205 while ((ch = *name++) != '\0')
206 {
207 h = (h << 4) + ch;
208 if ((g = (h & 0xf0000000)) != 0)
209 {
210 h ^= g >> 24;
211 /* The ELF ABI says `h &= ~g', but this is equivalent in
212 this case and on some machines one insn instead of two. */
213 h ^= g;
214 }
215 }
32dfa85d 216 return h & 0xffffffff;
252b5132
RH
217}
218
fdc90cb4
JJ
219/* DT_GNU_HASH hash function. Do not change this function; you will
220 cause invalid hash tables to be generated. */
221
222unsigned long
223bfd_elf_gnu_hash (const char *namearg)
224{
225 const unsigned char *name = (const unsigned char *) namearg;
226 unsigned long h = 5381;
227 unsigned char ch;
228
229 while ((ch = *name++) != '\0')
230 h = (h << 5) + h + ch;
231 return h & 0xffffffff;
232}
233
0c8d6e5c
AM
234/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
235 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 236bfd_boolean
0c8d6e5c 237bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 238 size_t object_size,
4dfe6ac6 239 enum elf_target_id object_id)
252b5132 240{
0ffa91dd
NC
241 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
242 abfd->tdata.any = bfd_zalloc (abfd, object_size);
243 if (abfd->tdata.any == NULL)
244 return FALSE;
252b5132 245
0ffa91dd
NC
246 elf_object_id (abfd) = object_id;
247 elf_program_header_size (abfd) = (bfd_size_type) -1;
b34976b6 248 return TRUE;
252b5132
RH
249}
250
0ffa91dd
NC
251
252bfd_boolean
ae95ffa6 253bfd_elf_make_object (bfd *abfd)
0ffa91dd 254{
ae95ffa6 255 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 256 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 257 bed->target_id);
0ffa91dd
NC
258}
259
b34976b6 260bfd_boolean
217aa764 261bfd_elf_mkcorefile (bfd *abfd)
252b5132 262{
c044fabd 263 /* I think this can be done just like an object file. */
ae95ffa6 264 return abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd);
252b5132
RH
265}
266
72a80a16 267static char *
217aa764 268bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
269{
270 Elf_Internal_Shdr **i_shdrp;
f075ee0c 271 bfd_byte *shstrtab = NULL;
dc810e39
AM
272 file_ptr offset;
273 bfd_size_type shstrtabsize;
252b5132
RH
274
275 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
276 if (i_shdrp == 0
277 || shindex >= elf_numsections (abfd)
278 || i_shdrp[shindex] == 0)
f075ee0c 279 return NULL;
252b5132 280
f075ee0c 281 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
282 if (shstrtab == NULL)
283 {
c044fabd 284 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
285 offset = i_shdrp[shindex]->sh_offset;
286 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
287
288 /* Allocate and clear an extra byte at the end, to prevent crashes
289 in case the string table is not terminated. */
3471d59d 290 if (shstrtabsize + 1 <= 1
a50b1753 291 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL
c6c60d09
JJ
292 || bfd_seek (abfd, offset, SEEK_SET) != 0)
293 shstrtab = NULL;
294 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
295 {
296 if (bfd_get_error () != bfd_error_system_call)
297 bfd_set_error (bfd_error_file_truncated);
298 shstrtab = NULL;
3471d59d
CC
299 /* Once we've failed to read it, make sure we don't keep
300 trying. Otherwise, we'll keep allocating space for
301 the string table over and over. */
302 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
303 }
304 else
305 shstrtab[shstrtabsize] = '\0';
217aa764 306 i_shdrp[shindex]->contents = shstrtab;
252b5132 307 }
f075ee0c 308 return (char *) shstrtab;
252b5132
RH
309}
310
311char *
217aa764
AM
312bfd_elf_string_from_elf_section (bfd *abfd,
313 unsigned int shindex,
314 unsigned int strindex)
252b5132
RH
315{
316 Elf_Internal_Shdr *hdr;
317
318 if (strindex == 0)
319 return "";
320
74f2e02b
AM
321 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
322 return NULL;
323
252b5132
RH
324 hdr = elf_elfsections (abfd)[shindex];
325
326 if (hdr->contents == NULL
327 && bfd_elf_get_str_section (abfd, shindex) == NULL)
328 return NULL;
329
330 if (strindex >= hdr->sh_size)
331 {
1b3a8575 332 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
252b5132 333 (*_bfd_error_handler)
d003868e
AM
334 (_("%B: invalid string offset %u >= %lu for section `%s'"),
335 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 336 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 337 ? ".shstrtab"
1b3a8575 338 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 339 return NULL;
252b5132
RH
340 }
341
342 return ((char *) hdr->contents) + strindex;
343}
344
6cdc0ccc
AM
345/* Read and convert symbols to internal format.
346 SYMCOUNT specifies the number of symbols to read, starting from
347 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
348 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
349 symbols, and symbol section index extensions, respectively.
350 Returns a pointer to the internal symbol buffer (malloced if necessary)
351 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
352
353Elf_Internal_Sym *
217aa764
AM
354bfd_elf_get_elf_syms (bfd *ibfd,
355 Elf_Internal_Shdr *symtab_hdr,
356 size_t symcount,
357 size_t symoffset,
358 Elf_Internal_Sym *intsym_buf,
359 void *extsym_buf,
360 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
361{
362 Elf_Internal_Shdr *shndx_hdr;
217aa764 363 void *alloc_ext;
df622259 364 const bfd_byte *esym;
6cdc0ccc
AM
365 Elf_External_Sym_Shndx *alloc_extshndx;
366 Elf_External_Sym_Shndx *shndx;
4dd07732 367 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
368 Elf_Internal_Sym *isym;
369 Elf_Internal_Sym *isymend;
9c5bfbb7 370 const struct elf_backend_data *bed;
6cdc0ccc
AM
371 size_t extsym_size;
372 bfd_size_type amt;
373 file_ptr pos;
374
e44a2c9c
AM
375 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
376 abort ();
377
6cdc0ccc
AM
378 if (symcount == 0)
379 return intsym_buf;
380
381 /* Normal syms might have section extension entries. */
382 shndx_hdr = NULL;
383 if (symtab_hdr == &elf_tdata (ibfd)->symtab_hdr)
384 shndx_hdr = &elf_tdata (ibfd)->symtab_shndx_hdr;
385
386 /* Read the symbols. */
387 alloc_ext = NULL;
388 alloc_extshndx = NULL;
4dd07732 389 alloc_intsym = NULL;
6cdc0ccc
AM
390 bed = get_elf_backend_data (ibfd);
391 extsym_size = bed->s->sizeof_sym;
392 amt = symcount * extsym_size;
393 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
394 if (extsym_buf == NULL)
395 {
d0fb9a8d 396 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
397 extsym_buf = alloc_ext;
398 }
399 if (extsym_buf == NULL
400 || bfd_seek (ibfd, pos, SEEK_SET) != 0
401 || bfd_bread (extsym_buf, amt, ibfd) != amt)
402 {
403 intsym_buf = NULL;
404 goto out;
405 }
406
407 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
408 extshndx_buf = NULL;
409 else
410 {
411 amt = symcount * sizeof (Elf_External_Sym_Shndx);
412 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
413 if (extshndx_buf == NULL)
414 {
a50b1753
NC
415 alloc_extshndx = (Elf_External_Sym_Shndx *)
416 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
417 extshndx_buf = alloc_extshndx;
418 }
419 if (extshndx_buf == NULL
420 || bfd_seek (ibfd, pos, SEEK_SET) != 0
421 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
422 {
423 intsym_buf = NULL;
424 goto out;
425 }
426 }
427
428 if (intsym_buf == NULL)
429 {
a50b1753
NC
430 alloc_intsym = (Elf_Internal_Sym *)
431 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 432 intsym_buf = alloc_intsym;
6cdc0ccc
AM
433 if (intsym_buf == NULL)
434 goto out;
435 }
436
437 /* Convert the symbols to internal form. */
438 isymend = intsym_buf + symcount;
a50b1753
NC
439 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
440 shndx = extshndx_buf;
6cdc0ccc
AM
441 isym < isymend;
442 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
443 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
444 {
445 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
446 (*_bfd_error_handler) (_("%B symbol number %lu references "
447 "nonexistent SHT_SYMTAB_SHNDX section"),
448 ibfd, (unsigned long) symoffset);
4dd07732
AM
449 if (alloc_intsym != NULL)
450 free (alloc_intsym);
8384fb8f
AM
451 intsym_buf = NULL;
452 goto out;
453 }
6cdc0ccc
AM
454
455 out:
456 if (alloc_ext != NULL)
457 free (alloc_ext);
458 if (alloc_extshndx != NULL)
459 free (alloc_extshndx);
460
461 return intsym_buf;
462}
463
5cab59f6
AM
464/* Look up a symbol name. */
465const char *
be8dd2ca
AM
466bfd_elf_sym_name (bfd *abfd,
467 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
468 Elf_Internal_Sym *isym,
469 asection *sym_sec)
5cab59f6 470{
26c61ae5 471 const char *name;
5cab59f6 472 unsigned int iname = isym->st_name;
be8dd2ca 473 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 474
138f35cc
JJ
475 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
476 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 477 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
478 {
479 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
480 shindex = elf_elfheader (abfd)->e_shstrndx;
481 }
482
26c61ae5
L
483 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
484 if (name == NULL)
485 name = "(null)";
486 else if (sym_sec && *name == '\0')
487 name = bfd_section_name (abfd, sym_sec);
488
489 return name;
5cab59f6
AM
490}
491
dbb410c3
AM
492/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
493 sections. The first element is the flags, the rest are section
494 pointers. */
495
496typedef union elf_internal_group {
497 Elf_Internal_Shdr *shdr;
498 unsigned int flags;
499} Elf_Internal_Group;
500
b885599b
AM
501/* Return the name of the group signature symbol. Why isn't the
502 signature just a string? */
503
504static const char *
217aa764 505group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 506{
9dce4196 507 Elf_Internal_Shdr *hdr;
9dce4196
AM
508 unsigned char esym[sizeof (Elf64_External_Sym)];
509 Elf_External_Sym_Shndx eshndx;
510 Elf_Internal_Sym isym;
b885599b 511
13792e9d
L
512 /* First we need to ensure the symbol table is available. Make sure
513 that it is a symbol table section. */
4fbb74a6
AM
514 if (ghdr->sh_link >= elf_numsections (abfd))
515 return NULL;
13792e9d
L
516 hdr = elf_elfsections (abfd) [ghdr->sh_link];
517 if (hdr->sh_type != SHT_SYMTAB
518 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
519 return NULL;
520
9dce4196
AM
521 /* Go read the symbol. */
522 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
523 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
524 &isym, esym, &eshndx) == NULL)
b885599b 525 return NULL;
9dce4196 526
26c61ae5 527 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
528}
529
dbb410c3
AM
530/* Set next_in_group list pointer, and group name for NEWSECT. */
531
b34976b6 532static bfd_boolean
217aa764 533setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
534{
535 unsigned int num_group = elf_tdata (abfd)->num_group;
536
537 /* If num_group is zero, read in all SHT_GROUP sections. The count
538 is set to -1 if there are no SHT_GROUP sections. */
539 if (num_group == 0)
540 {
541 unsigned int i, shnum;
542
543 /* First count the number of groups. If we have a SHT_GROUP
544 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 545 shnum = elf_numsections (abfd);
dbb410c3 546 num_group = 0;
08a40648 547
44534af3 548#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 549 ( (shdr)->sh_type == SHT_GROUP \
44534af3 550 && (shdr)->sh_size >= minsize \
1783205a
NC
551 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
552 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 553
dbb410c3
AM
554 for (i = 0; i < shnum; i++)
555 {
556 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 557
44534af3 558 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
559 num_group += 1;
560 }
561
562 if (num_group == 0)
20dbb49d
L
563 {
564 num_group = (unsigned) -1;
565 elf_tdata (abfd)->num_group = num_group;
566 }
567 else
dbb410c3
AM
568 {
569 /* We keep a list of elf section headers for group sections,
570 so we can find them quickly. */
20dbb49d 571 bfd_size_type amt;
d0fb9a8d 572
20dbb49d 573 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
574 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
575 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 576 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 577 return FALSE;
dbb410c3
AM
578
579 num_group = 0;
580 for (i = 0; i < shnum; i++)
581 {
582 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 583
44534af3 584 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 585 {
973ffd63 586 unsigned char *src;
dbb410c3
AM
587 Elf_Internal_Group *dest;
588
589 /* Add to list of sections. */
590 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
591 num_group += 1;
592
593 /* Read the raw contents. */
594 BFD_ASSERT (sizeof (*dest) >= 4);
595 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
596 shdr->contents = (unsigned char *)
597 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
598 /* PR binutils/4110: Handle corrupt group headers. */
599 if (shdr->contents == NULL)
600 {
601 _bfd_error_handler
602 (_("%B: Corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
603 bfd_set_error (bfd_error_bad_value);
604 return FALSE;
605 }
606
607 memset (shdr->contents, 0, amt);
608
609 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
610 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
611 != shdr->sh_size))
b34976b6 612 return FALSE;
dbb410c3
AM
613
614 /* Translate raw contents, a flag word followed by an
615 array of elf section indices all in target byte order,
616 to the flag word followed by an array of elf section
617 pointers. */
618 src = shdr->contents + shdr->sh_size;
619 dest = (Elf_Internal_Group *) (shdr->contents + amt);
620 while (1)
621 {
622 unsigned int idx;
623
624 src -= 4;
625 --dest;
626 idx = H_GET_32 (abfd, src);
627 if (src == shdr->contents)
628 {
629 dest->flags = idx;
b885599b
AM
630 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
631 shdr->bfd_section->flags
632 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
633 break;
634 }
635 if (idx >= shnum)
636 {
637 ((*_bfd_error_handler)
d003868e 638 (_("%B: invalid SHT_GROUP entry"), abfd));
dbb410c3
AM
639 idx = 0;
640 }
641 dest->shdr = elf_elfsections (abfd)[idx];
642 }
643 }
644 }
645 }
646 }
647
648 if (num_group != (unsigned) -1)
649 {
650 unsigned int i;
651
652 for (i = 0; i < num_group; i++)
653 {
654 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
655 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
656 unsigned int n_elt = shdr->sh_size / 4;
657
658 /* Look through this group's sections to see if current
659 section is a member. */
660 while (--n_elt != 0)
661 if ((++idx)->shdr == hdr)
662 {
e0e8c97f 663 asection *s = NULL;
dbb410c3
AM
664
665 /* We are a member of this group. Go looking through
666 other members to see if any others are linked via
667 next_in_group. */
668 idx = (Elf_Internal_Group *) shdr->contents;
669 n_elt = shdr->sh_size / 4;
670 while (--n_elt != 0)
671 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 672 && elf_next_in_group (s) != NULL)
dbb410c3
AM
673 break;
674 if (n_elt != 0)
675 {
dbb410c3
AM
676 /* Snarf the group name from other member, and
677 insert current section in circular list. */
945906ff
AM
678 elf_group_name (newsect) = elf_group_name (s);
679 elf_next_in_group (newsect) = elf_next_in_group (s);
680 elf_next_in_group (s) = newsect;
dbb410c3
AM
681 }
682 else
683 {
dbb410c3
AM
684 const char *gname;
685
b885599b
AM
686 gname = group_signature (abfd, shdr);
687 if (gname == NULL)
b34976b6 688 return FALSE;
945906ff 689 elf_group_name (newsect) = gname;
dbb410c3
AM
690
691 /* Start a circular list with one element. */
945906ff 692 elf_next_in_group (newsect) = newsect;
dbb410c3 693 }
b885599b 694
9dce4196
AM
695 /* If the group section has been created, point to the
696 new member. */
dbb410c3 697 if (shdr->bfd_section != NULL)
945906ff 698 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 699
dbb410c3
AM
700 i = num_group - 1;
701 break;
702 }
703 }
704 }
705
945906ff 706 if (elf_group_name (newsect) == NULL)
dbb410c3 707 {
d003868e
AM
708 (*_bfd_error_handler) (_("%B: no group info for section %A"),
709 abfd, newsect);
dbb410c3 710 }
b34976b6 711 return TRUE;
dbb410c3
AM
712}
713
3d7f7666 714bfd_boolean
dd863624 715_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
716{
717 unsigned int i;
718 unsigned int num_group = elf_tdata (abfd)->num_group;
719 bfd_boolean result = TRUE;
dd863624
L
720 asection *s;
721
722 /* Process SHF_LINK_ORDER. */
723 for (s = abfd->sections; s != NULL; s = s->next)
724 {
725 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
726 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
727 {
728 unsigned int elfsec = this_hdr->sh_link;
729 /* FIXME: The old Intel compiler and old strip/objcopy may
730 not set the sh_link or sh_info fields. Hence we could
731 get the situation where elfsec is 0. */
732 if (elfsec == 0)
733 {
4fbb74a6 734 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
735 if (bed->link_order_error_handler)
736 bed->link_order_error_handler
737 (_("%B: warning: sh_link not set for section `%A'"),
738 abfd, s);
739 }
740 else
741 {
91d6fa6a 742 asection *linksec = NULL;
25bbc984 743
4fbb74a6
AM
744 if (elfsec < elf_numsections (abfd))
745 {
746 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 747 linksec = this_hdr->bfd_section;
4fbb74a6 748 }
25bbc984
L
749
750 /* PR 1991, 2008:
751 Some strip/objcopy may leave an incorrect value in
752 sh_link. We don't want to proceed. */
91d6fa6a 753 if (linksec == NULL)
25bbc984
L
754 {
755 (*_bfd_error_handler)
756 (_("%B: sh_link [%d] in section `%A' is incorrect"),
757 s->owner, s, elfsec);
758 result = FALSE;
759 }
760
91d6fa6a 761 elf_linked_to_section (s) = linksec;
dd863624
L
762 }
763 }
764 }
3d7f7666 765
dd863624 766 /* Process section groups. */
3d7f7666
L
767 if (num_group == (unsigned) -1)
768 return result;
769
770 for (i = 0; i < num_group; i++)
771 {
772 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
773 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
774 unsigned int n_elt = shdr->sh_size / 4;
775
776 while (--n_elt != 0)
777 if ((++idx)->shdr->bfd_section)
778 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
779 else if (idx->shdr->sh_type == SHT_RELA
780 || idx->shdr->sh_type == SHT_REL)
781 /* We won't include relocation sections in section groups in
782 output object files. We adjust the group section size here
783 so that relocatable link will work correctly when
784 relocation sections are in section group in input object
785 files. */
786 shdr->bfd_section->size -= 4;
787 else
788 {
789 /* There are some unknown sections in the group. */
790 (*_bfd_error_handler)
d003868e
AM
791 (_("%B: unknown [%d] section `%s' in group [%s]"),
792 abfd,
3d7f7666 793 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
794 bfd_elf_string_from_elf_section (abfd,
795 (elf_elfheader (abfd)
796 ->e_shstrndx),
797 idx->shdr->sh_name),
3d7f7666
L
798 shdr->bfd_section->name);
799 result = FALSE;
800 }
801 }
802 return result;
803}
804
72adc230
AM
805bfd_boolean
806bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
807{
808 return elf_next_in_group (sec) != NULL;
809}
810
252b5132
RH
811/* Make a BFD section from an ELF section. We store a pointer to the
812 BFD section in the bfd_section field of the header. */
813
b34976b6 814bfd_boolean
217aa764
AM
815_bfd_elf_make_section_from_shdr (bfd *abfd,
816 Elf_Internal_Shdr *hdr,
6dc132d9
L
817 const char *name,
818 int shindex)
252b5132
RH
819{
820 asection *newsect;
821 flagword flags;
9c5bfbb7 822 const struct elf_backend_data *bed;
252b5132
RH
823
824 if (hdr->bfd_section != NULL)
4e011fb5 825 return TRUE;
252b5132
RH
826
827 newsect = bfd_make_section_anyway (abfd, name);
828 if (newsect == NULL)
b34976b6 829 return FALSE;
252b5132 830
1829f4b2
AM
831 hdr->bfd_section = newsect;
832 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 833 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 834
2f89ff8d
L
835 /* Always use the real type/flags. */
836 elf_section_type (newsect) = hdr->sh_type;
837 elf_section_flags (newsect) = hdr->sh_flags;
838
252b5132
RH
839 newsect->filepos = hdr->sh_offset;
840
841 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
842 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
843 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 844 bfd_log2 (hdr->sh_addralign)))
b34976b6 845 return FALSE;
252b5132
RH
846
847 flags = SEC_NO_FLAGS;
848 if (hdr->sh_type != SHT_NOBITS)
849 flags |= SEC_HAS_CONTENTS;
dbb410c3 850 if (hdr->sh_type == SHT_GROUP)
b3096250 851 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
852 if ((hdr->sh_flags & SHF_ALLOC) != 0)
853 {
854 flags |= SEC_ALLOC;
855 if (hdr->sh_type != SHT_NOBITS)
856 flags |= SEC_LOAD;
857 }
858 if ((hdr->sh_flags & SHF_WRITE) == 0)
859 flags |= SEC_READONLY;
860 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
861 flags |= SEC_CODE;
862 else if ((flags & SEC_LOAD) != 0)
863 flags |= SEC_DATA;
f5fa8ca2
JJ
864 if ((hdr->sh_flags & SHF_MERGE) != 0)
865 {
866 flags |= SEC_MERGE;
867 newsect->entsize = hdr->sh_entsize;
868 if ((hdr->sh_flags & SHF_STRINGS) != 0)
869 flags |= SEC_STRINGS;
870 }
dbb410c3
AM
871 if (hdr->sh_flags & SHF_GROUP)
872 if (!setup_group (abfd, hdr, newsect))
b34976b6 873 return FALSE;
13ae64f3
JJ
874 if ((hdr->sh_flags & SHF_TLS) != 0)
875 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
876 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
877 flags |= SEC_EXCLUDE;
252b5132 878
3d2b39cf 879 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 880 {
3d2b39cf
L
881 /* The debugging sections appear to be recognized only by name,
882 not any sort of flag. Their SEC_ALLOC bits are cleared. */
883 static const struct
884 {
885 const char *name;
886 int len;
887 } debug_sections [] =
888 {
0112cd26 889 { STRING_COMMA_LEN ("debug") }, /* 'd' */
3d2b39cf
L
890 { NULL, 0 }, /* 'e' */
891 { NULL, 0 }, /* 'f' */
0112cd26 892 { STRING_COMMA_LEN ("gnu.linkonce.wi.") }, /* 'g' */
3d2b39cf
L
893 { NULL, 0 }, /* 'h' */
894 { NULL, 0 }, /* 'i' */
895 { NULL, 0 }, /* 'j' */
896 { NULL, 0 }, /* 'k' */
0112cd26 897 { STRING_COMMA_LEN ("line") }, /* 'l' */
3d2b39cf
L
898 { NULL, 0 }, /* 'm' */
899 { NULL, 0 }, /* 'n' */
900 { NULL, 0 }, /* 'o' */
901 { NULL, 0 }, /* 'p' */
902 { NULL, 0 }, /* 'q' */
903 { NULL, 0 }, /* 'r' */
1b315056
CS
904 { STRING_COMMA_LEN ("stab") }, /* 's' */
905 { NULL, 0 }, /* 't' */
906 { NULL, 0 }, /* 'u' */
907 { NULL, 0 }, /* 'v' */
908 { NULL, 0 }, /* 'w' */
909 { NULL, 0 }, /* 'x' */
910 { NULL, 0 }, /* 'y' */
911 { STRING_COMMA_LEN ("zdebug") } /* 'z' */
3d2b39cf 912 };
08a40648 913
3d2b39cf
L
914 if (name [0] == '.')
915 {
916 int i = name [1] - 'd';
917 if (i >= 0
918 && i < (int) ARRAY_SIZE (debug_sections)
919 && debug_sections [i].name != NULL
920 && strncmp (&name [1], debug_sections [i].name,
921 debug_sections [i].len) == 0)
922 flags |= SEC_DEBUGGING;
923 }
924 }
252b5132
RH
925
926 /* As a GNU extension, if the name begins with .gnu.linkonce, we
927 only link a single copy of the section. This is used to support
928 g++. g++ will emit each template expansion in its own section.
929 The symbols will be defined as weak, so that multiple definitions
930 are permitted. The GNU linker extension is to actually discard
931 all but one of the sections. */
0112cd26 932 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 933 && elf_next_in_group (newsect) == NULL)
252b5132
RH
934 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
935
fa152c49
JW
936 bed = get_elf_backend_data (abfd);
937 if (bed->elf_backend_section_flags)
938 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 939 return FALSE;
fa152c49 940
252b5132 941 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 942 return FALSE;
252b5132 943
718175fa
JK
944 /* We do not parse the PT_NOTE segments as we are interested even in the
945 separate debug info files which may have the segments offsets corrupted.
946 PT_NOTEs from the core files are currently not parsed using BFD. */
947 if (hdr->sh_type == SHT_NOTE)
948 {
baea7ef1 949 bfd_byte *contents;
718175fa 950
baea7ef1 951 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
952 return FALSE;
953
baea7ef1 954 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
955 free (contents);
956 }
957
252b5132
RH
958 if ((flags & SEC_ALLOC) != 0)
959 {
960 Elf_Internal_Phdr *phdr;
6ffd7900
AM
961 unsigned int i, nload;
962
963 /* Some ELF linkers produce binaries with all the program header
964 p_paddr fields zero. If we have such a binary with more than
965 one PT_LOAD header, then leave the section lma equal to vma
966 so that we don't create sections with overlapping lma. */
967 phdr = elf_tdata (abfd)->phdr;
968 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
969 if (phdr->p_paddr != 0)
970 break;
971 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
972 ++nload;
973 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
974 return TRUE;
252b5132 975
252b5132
RH
976 phdr = elf_tdata (abfd)->phdr;
977 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
978 {
86b2281f
AM
979 if (((phdr->p_type == PT_LOAD
980 && (hdr->sh_flags & SHF_TLS) == 0)
981 || phdr->p_type == PT_TLS)
9a83a553 982 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 983 {
88967714
AM
984 if ((flags & SEC_LOAD) == 0)
985 newsect->lma = (phdr->p_paddr
986 + hdr->sh_addr - phdr->p_vaddr);
987 else
988 /* We used to use the same adjustment for SEC_LOAD
989 sections, but that doesn't work if the segment
990 is packed with code from multiple VMAs.
991 Instead we calculate the section LMA based on
992 the segment LMA. It is assumed that the
993 segment will contain sections with contiguous
994 LMAs, even if the VMAs are not. */
995 newsect->lma = (phdr->p_paddr
996 + hdr->sh_offset - phdr->p_offset);
997
998 /* With contiguous segments, we can't tell from file
999 offsets whether a section with zero size should
1000 be placed at the end of one segment or the
1001 beginning of the next. Decide based on vaddr. */
1002 if (hdr->sh_addr >= phdr->p_vaddr
1003 && (hdr->sh_addr + hdr->sh_size
1004 <= phdr->p_vaddr + phdr->p_memsz))
1005 break;
252b5132
RH
1006 }
1007 }
1008 }
1009
4a114e3e
L
1010 /* Compress/decompress DWARF debug sections with names: .debug_* and
1011 .zdebug_*, after the section flags is set. */
1012 if ((flags & SEC_DEBUGGING)
1013 && ((name[1] == 'd' && name[6] == '_')
1014 || (name[1] == 'z' && name[7] == '_')))
1015 {
1016 enum { nothing, compress, decompress } action = nothing;
4e011fb5 1017 char *new_name;
4a114e3e
L
1018
1019 if (bfd_is_section_compressed (abfd, newsect))
1020 {
1021 /* Compressed section. Check if we should decompress. */
1022 if ((abfd->flags & BFD_DECOMPRESS))
1023 action = decompress;
1024 }
1025 else
1026 {
1027 /* Normal section. Check if we should compress. */
5a5ed5b0 1028 if ((abfd->flags & BFD_COMPRESS) && newsect->size != 0)
4a114e3e
L
1029 action = compress;
1030 }
1031
4e011fb5 1032 new_name = NULL;
4a114e3e
L
1033 switch (action)
1034 {
1035 case nothing:
1036 break;
1037 case compress:
1038 if (!bfd_init_section_compress_status (abfd, newsect))
1039 {
1040 (*_bfd_error_handler)
bc823199 1041 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1042 abfd, name);
1043 return FALSE;
1044 }
4e011fb5
AM
1045 if (name[1] != 'z')
1046 {
1047 unsigned int len = strlen (name);
1048
1049 new_name = bfd_alloc (abfd, len + 2);
1050 if (new_name == NULL)
1051 return FALSE;
1052 new_name[0] = '.';
1053 new_name[1] = 'z';
1054 memcpy (new_name + 2, name + 1, len);
1055 }
4a114e3e
L
1056 break;
1057 case decompress:
1058 if (!bfd_init_section_decompress_status (abfd, newsect))
1059 {
1060 (*_bfd_error_handler)
bc823199 1061 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1062 abfd, name);
1063 return FALSE;
1064 }
4e011fb5
AM
1065 if (name[1] == 'z')
1066 {
1067 unsigned int len = strlen (name);
1068
1069 new_name = bfd_alloc (abfd, len);
1070 if (new_name == NULL)
1071 return FALSE;
1072 new_name[0] = '.';
1073 memcpy (new_name + 1, name + 2, len - 1);
1074 }
4a114e3e
L
1075 break;
1076 }
4e011fb5
AM
1077 if (new_name != NULL)
1078 bfd_rename_section (abfd, newsect, new_name);
4a114e3e
L
1079 }
1080
b34976b6 1081 return TRUE;
252b5132
RH
1082}
1083
252b5132
RH
1084const char *const bfd_elf_section_type_names[] = {
1085 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1086 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1087 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1088};
1089
1049f94e 1090/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1091 output, and the reloc is against an external symbol, and nothing
1092 has given us any additional addend, the resulting reloc will also
1093 be against the same symbol. In such a case, we don't want to
1094 change anything about the way the reloc is handled, since it will
1095 all be done at final link time. Rather than put special case code
1096 into bfd_perform_relocation, all the reloc types use this howto
1097 function. It just short circuits the reloc if producing
1049f94e 1098 relocatable output against an external symbol. */
252b5132 1099
252b5132 1100bfd_reloc_status_type
217aa764
AM
1101bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1102 arelent *reloc_entry,
1103 asymbol *symbol,
1104 void *data ATTRIBUTE_UNUSED,
1105 asection *input_section,
1106 bfd *output_bfd,
1107 char **error_message ATTRIBUTE_UNUSED)
1108{
1109 if (output_bfd != NULL
252b5132
RH
1110 && (symbol->flags & BSF_SECTION_SYM) == 0
1111 && (! reloc_entry->howto->partial_inplace
1112 || reloc_entry->addend == 0))
1113 {
1114 reloc_entry->address += input_section->output_offset;
1115 return bfd_reloc_ok;
1116 }
1117
1118 return bfd_reloc_continue;
1119}
1120\f
0ac4564e
L
1121/* Copy the program header and other data from one object module to
1122 another. */
252b5132 1123
b34976b6 1124bfd_boolean
217aa764 1125_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050
L
1126{
1127 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1128 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1129 return TRUE;
2d502050
L
1130
1131 BFD_ASSERT (!elf_flags_init (obfd)
1132 || (elf_elfheader (obfd)->e_flags
1133 == elf_elfheader (ibfd)->e_flags));
1134
0ac4564e 1135 elf_gp (obfd) = elf_gp (ibfd);
2d502050 1136 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
b34976b6 1137 elf_flags_init (obfd) = TRUE;
104d59d1
JM
1138
1139 /* Copy object attributes. */
1140 _bfd_elf_copy_obj_attributes (ibfd, obfd);
b34976b6 1141 return TRUE;
2d502050
L
1142}
1143
cedc298e
L
1144static const char *
1145get_segment_type (unsigned int p_type)
1146{
1147 const char *pt;
1148 switch (p_type)
1149 {
1150 case PT_NULL: pt = "NULL"; break;
1151 case PT_LOAD: pt = "LOAD"; break;
1152 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1153 case PT_INTERP: pt = "INTERP"; break;
1154 case PT_NOTE: pt = "NOTE"; break;
1155 case PT_SHLIB: pt = "SHLIB"; break;
1156 case PT_PHDR: pt = "PHDR"; break;
1157 case PT_TLS: pt = "TLS"; break;
1158 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1159 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1160 case PT_GNU_RELRO: pt = "RELRO"; break;
1161 default: pt = NULL; break;
1162 }
1163 return pt;
1164}
1165
f0b79d91
L
1166/* Print out the program headers. */
1167
b34976b6 1168bfd_boolean
217aa764 1169_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1170{
a50b1753 1171 FILE *f = (FILE *) farg;
252b5132
RH
1172 Elf_Internal_Phdr *p;
1173 asection *s;
1174 bfd_byte *dynbuf = NULL;
1175
1176 p = elf_tdata (abfd)->phdr;
1177 if (p != NULL)
1178 {
1179 unsigned int i, c;
1180
1181 fprintf (f, _("\nProgram Header:\n"));
1182 c = elf_elfheader (abfd)->e_phnum;
1183 for (i = 0; i < c; i++, p++)
1184 {
cedc298e 1185 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1186 char buf[20];
1187
cedc298e 1188 if (pt == NULL)
252b5132 1189 {
cedc298e
L
1190 sprintf (buf, "0x%lx", p->p_type);
1191 pt = buf;
252b5132 1192 }
dc810e39 1193 fprintf (f, "%8s off 0x", pt);
60b89a18 1194 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1195 fprintf (f, " vaddr 0x");
60b89a18 1196 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1197 fprintf (f, " paddr 0x");
60b89a18 1198 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1199 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1200 fprintf (f, " filesz 0x");
60b89a18 1201 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1202 fprintf (f, " memsz 0x");
60b89a18 1203 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1204 fprintf (f, " flags %c%c%c",
1205 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1206 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1207 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1208 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1209 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1210 fprintf (f, "\n");
1211 }
1212 }
1213
1214 s = bfd_get_section_by_name (abfd, ".dynamic");
1215 if (s != NULL)
1216 {
cb33740c 1217 unsigned int elfsec;
dc810e39 1218 unsigned long shlink;
252b5132
RH
1219 bfd_byte *extdyn, *extdynend;
1220 size_t extdynsize;
217aa764 1221 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1222
1223 fprintf (f, _("\nDynamic Section:\n"));
1224
eea6121a 1225 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1226 goto error_return;
1227
1228 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1229 if (elfsec == SHN_BAD)
252b5132 1230 goto error_return;
dc810e39 1231 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1232
1233 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1234 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1235
1236 extdyn = dynbuf;
eea6121a 1237 extdynend = extdyn + s->size;
252b5132
RH
1238 for (; extdyn < extdynend; extdyn += extdynsize)
1239 {
1240 Elf_Internal_Dyn dyn;
ad9563d6 1241 const char *name = "";
252b5132 1242 char ab[20];
b34976b6 1243 bfd_boolean stringp;
ad9563d6 1244 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1245
217aa764 1246 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1247
1248 if (dyn.d_tag == DT_NULL)
1249 break;
1250
b34976b6 1251 stringp = FALSE;
252b5132
RH
1252 switch (dyn.d_tag)
1253 {
1254 default:
ad9563d6
CM
1255 if (bed->elf_backend_get_target_dtag)
1256 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1257
1258 if (!strcmp (name, ""))
1259 {
1260 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1261 name = ab;
1262 }
252b5132
RH
1263 break;
1264
b34976b6 1265 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1266 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1267 case DT_PLTGOT: name = "PLTGOT"; break;
1268 case DT_HASH: name = "HASH"; break;
1269 case DT_STRTAB: name = "STRTAB"; break;
1270 case DT_SYMTAB: name = "SYMTAB"; break;
1271 case DT_RELA: name = "RELA"; break;
1272 case DT_RELASZ: name = "RELASZ"; break;
1273 case DT_RELAENT: name = "RELAENT"; break;
1274 case DT_STRSZ: name = "STRSZ"; break;
1275 case DT_SYMENT: name = "SYMENT"; break;
1276 case DT_INIT: name = "INIT"; break;
1277 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1278 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1279 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1280 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1281 case DT_REL: name = "REL"; break;
1282 case DT_RELSZ: name = "RELSZ"; break;
1283 case DT_RELENT: name = "RELENT"; break;
1284 case DT_PLTREL: name = "PLTREL"; break;
1285 case DT_DEBUG: name = "DEBUG"; break;
1286 case DT_TEXTREL: name = "TEXTREL"; break;
1287 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1288 case DT_BIND_NOW: name = "BIND_NOW"; break;
1289 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1290 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1291 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1292 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1293 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1294 case DT_FLAGS: name = "FLAGS"; break;
1295 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1296 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1297 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1298 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1299 case DT_MOVEENT: name = "MOVEENT"; break;
1300 case DT_MOVESZ: name = "MOVESZ"; break;
1301 case DT_FEATURE: name = "FEATURE"; break;
1302 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1303 case DT_SYMINSZ: name = "SYMINSZ"; break;
1304 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1305 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1306 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1307 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1308 case DT_PLTPAD: name = "PLTPAD"; break;
1309 case DT_MOVETAB: name = "MOVETAB"; break;
1310 case DT_SYMINFO: name = "SYMINFO"; break;
1311 case DT_RELACOUNT: name = "RELACOUNT"; break;
1312 case DT_RELCOUNT: name = "RELCOUNT"; break;
1313 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1314 case DT_VERSYM: name = "VERSYM"; break;
1315 case DT_VERDEF: name = "VERDEF"; break;
1316 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1317 case DT_VERNEED: name = "VERNEED"; break;
1318 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1319 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1320 case DT_USED: name = "USED"; break;
b34976b6 1321 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1322 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1323 }
1324
ad9563d6 1325 fprintf (f, " %-20s ", name);
252b5132 1326 if (! stringp)
a1f3c56e
AN
1327 {
1328 fprintf (f, "0x");
1329 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1330 }
252b5132
RH
1331 else
1332 {
1333 const char *string;
dc810e39 1334 unsigned int tagv = dyn.d_un.d_val;
252b5132 1335
dc810e39 1336 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1337 if (string == NULL)
1338 goto error_return;
1339 fprintf (f, "%s", string);
1340 }
1341 fprintf (f, "\n");
1342 }
1343
1344 free (dynbuf);
1345 dynbuf = NULL;
1346 }
1347
1348 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1349 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1350 {
fc0e6df6 1351 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1352 return FALSE;
252b5132
RH
1353 }
1354
1355 if (elf_dynverdef (abfd) != 0)
1356 {
1357 Elf_Internal_Verdef *t;
1358
1359 fprintf (f, _("\nVersion definitions:\n"));
1360 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1361 {
1362 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1363 t->vd_flags, t->vd_hash,
1364 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1365 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1366 {
1367 Elf_Internal_Verdaux *a;
1368
1369 fprintf (f, "\t");
1370 for (a = t->vd_auxptr->vda_nextptr;
1371 a != NULL;
1372 a = a->vda_nextptr)
d0fb9a8d
JJ
1373 fprintf (f, "%s ",
1374 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1375 fprintf (f, "\n");
1376 }
1377 }
1378 }
1379
1380 if (elf_dynverref (abfd) != 0)
1381 {
1382 Elf_Internal_Verneed *t;
1383
1384 fprintf (f, _("\nVersion References:\n"));
1385 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1386 {
1387 Elf_Internal_Vernaux *a;
1388
d0fb9a8d
JJ
1389 fprintf (f, _(" required from %s:\n"),
1390 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1391 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1392 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1393 a->vna_flags, a->vna_other,
1394 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1395 }
1396 }
1397
b34976b6 1398 return TRUE;
252b5132
RH
1399
1400 error_return:
1401 if (dynbuf != NULL)
1402 free (dynbuf);
b34976b6 1403 return FALSE;
252b5132
RH
1404}
1405
1406/* Display ELF-specific fields of a symbol. */
1407
1408void
217aa764
AM
1409bfd_elf_print_symbol (bfd *abfd,
1410 void *filep,
1411 asymbol *symbol,
1412 bfd_print_symbol_type how)
252b5132 1413{
a50b1753 1414 FILE *file = (FILE *) filep;
252b5132
RH
1415 switch (how)
1416 {
1417 case bfd_print_symbol_name:
1418 fprintf (file, "%s", symbol->name);
1419 break;
1420 case bfd_print_symbol_more:
1421 fprintf (file, "elf ");
60b89a18 1422 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1423 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1424 break;
1425 case bfd_print_symbol_all:
1426 {
4e8a9624
AM
1427 const char *section_name;
1428 const char *name = NULL;
9c5bfbb7 1429 const struct elf_backend_data *bed;
7a13edea 1430 unsigned char st_other;
dbb410c3 1431 bfd_vma val;
c044fabd 1432
252b5132 1433 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1434
1435 bed = get_elf_backend_data (abfd);
1436 if (bed->elf_backend_print_symbol_all)
c044fabd 1437 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1438
1439 if (name == NULL)
1440 {
7ee38065 1441 name = symbol->name;
217aa764 1442 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1443 }
1444
252b5132
RH
1445 fprintf (file, " %s\t", section_name);
1446 /* Print the "other" value for a symbol. For common symbols,
1447 we've already printed the size; now print the alignment.
1448 For other symbols, we have no specified alignment, and
1449 we've printed the address; now print the size. */
dcf6c779 1450 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1451 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1452 else
1453 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1454 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1455
1456 /* If we have version information, print it. */
1457 if (elf_tdata (abfd)->dynversym_section != 0
1458 && (elf_tdata (abfd)->dynverdef_section != 0
1459 || elf_tdata (abfd)->dynverref_section != 0))
1460 {
1461 unsigned int vernum;
1462 const char *version_string;
1463
1464 vernum = ((elf_symbol_type *) symbol)->version & VERSYM_VERSION;
1465
1466 if (vernum == 0)
1467 version_string = "";
1468 else if (vernum == 1)
1469 version_string = "Base";
1470 else if (vernum <= elf_tdata (abfd)->cverdefs)
1471 version_string =
1472 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1473 else
1474 {
1475 Elf_Internal_Verneed *t;
1476
1477 version_string = "";
1478 for (t = elf_tdata (abfd)->verref;
1479 t != NULL;
1480 t = t->vn_nextref)
1481 {
1482 Elf_Internal_Vernaux *a;
1483
1484 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1485 {
1486 if (a->vna_other == vernum)
1487 {
1488 version_string = a->vna_nodename;
1489 break;
1490 }
1491 }
1492 }
1493 }
1494
1495 if ((((elf_symbol_type *) symbol)->version & VERSYM_HIDDEN) == 0)
1496 fprintf (file, " %-11s", version_string);
1497 else
1498 {
1499 int i;
1500
1501 fprintf (file, " (%s)", version_string);
1502 for (i = 10 - strlen (version_string); i > 0; --i)
1503 putc (' ', file);
1504 }
1505 }
1506
1507 /* If the st_other field is not zero, print it. */
7a13edea 1508 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1509
7a13edea
NC
1510 switch (st_other)
1511 {
1512 case 0: break;
1513 case STV_INTERNAL: fprintf (file, " .internal"); break;
1514 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1515 case STV_PROTECTED: fprintf (file, " .protected"); break;
1516 default:
1517 /* Some other non-defined flags are also present, so print
1518 everything hex. */
1519 fprintf (file, " 0x%02x", (unsigned int) st_other);
1520 }
252b5132 1521
587ff49e 1522 fprintf (file, " %s", name);
252b5132
RH
1523 }
1524 break;
1525 }
1526}
252b5132 1527
252b5132
RH
1528/* Allocate an ELF string table--force the first byte to be zero. */
1529
1530struct bfd_strtab_hash *
217aa764 1531_bfd_elf_stringtab_init (void)
252b5132
RH
1532{
1533 struct bfd_strtab_hash *ret;
1534
1535 ret = _bfd_stringtab_init ();
1536 if (ret != NULL)
1537 {
1538 bfd_size_type loc;
1539
b34976b6 1540 loc = _bfd_stringtab_add (ret, "", TRUE, FALSE);
252b5132
RH
1541 BFD_ASSERT (loc == 0 || loc == (bfd_size_type) -1);
1542 if (loc == (bfd_size_type) -1)
1543 {
1544 _bfd_stringtab_free (ret);
1545 ret = NULL;
1546 }
1547 }
1548 return ret;
1549}
1550\f
1551/* ELF .o/exec file reading */
1552
c044fabd 1553/* Create a new bfd section from an ELF section header. */
252b5132 1554
b34976b6 1555bfd_boolean
217aa764 1556bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1557{
4fbb74a6
AM
1558 Elf_Internal_Shdr *hdr;
1559 Elf_Internal_Ehdr *ehdr;
1560 const struct elf_backend_data *bed;
90937f86 1561 const char *name;
252b5132 1562
4fbb74a6
AM
1563 if (shindex >= elf_numsections (abfd))
1564 return FALSE;
1565
1566 hdr = elf_elfsections (abfd)[shindex];
1567 ehdr = elf_elfheader (abfd);
1568 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1569 hdr->sh_name);
933d961a
JJ
1570 if (name == NULL)
1571 return FALSE;
252b5132 1572
4fbb74a6 1573 bed = get_elf_backend_data (abfd);
252b5132
RH
1574 switch (hdr->sh_type)
1575 {
1576 case SHT_NULL:
1577 /* Inactive section. Throw it away. */
b34976b6 1578 return TRUE;
252b5132
RH
1579
1580 case SHT_PROGBITS: /* Normal section with contents. */
252b5132
RH
1581 case SHT_NOBITS: /* .bss section. */
1582 case SHT_HASH: /* .hash section. */
1583 case SHT_NOTE: /* .note section. */
25e27870
L
1584 case SHT_INIT_ARRAY: /* .init_array section. */
1585 case SHT_FINI_ARRAY: /* .fini_array section. */
1586 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1587 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1588 case SHT_GNU_HASH: /* .gnu.hash section. */
6dc132d9 1589 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1590
797fc050 1591 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1592 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1593 return FALSE;
cfcac11d
NC
1594 if (hdr->sh_link > elf_numsections (abfd))
1595 {
caa83f8b 1596 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
1597 field set to SHN_BEFORE or SHN_AFTER. */
1598 switch (bfd_get_arch (abfd))
1599 {
caa83f8b 1600 case bfd_arch_i386:
cfcac11d
NC
1601 case bfd_arch_sparc:
1602 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
1603 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
1604 break;
1605 /* Otherwise fall through. */
1606 default:
1607 return FALSE;
1608 }
1609 }
1610 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
8e0ed13f 1611 return FALSE;
cfcac11d 1612 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
1613 {
1614 Elf_Internal_Shdr *dynsymhdr;
1615
1616 /* The shared libraries distributed with hpux11 have a bogus
1617 sh_link field for the ".dynamic" section. Find the
1618 string table for the ".dynsym" section instead. */
1619 if (elf_dynsymtab (abfd) != 0)
1620 {
1621 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
1622 hdr->sh_link = dynsymhdr->sh_link;
1623 }
1624 else
1625 {
1626 unsigned int i, num_sec;
1627
1628 num_sec = elf_numsections (abfd);
1629 for (i = 1; i < num_sec; i++)
1630 {
1631 dynsymhdr = elf_elfsections (abfd)[i];
1632 if (dynsymhdr->sh_type == SHT_DYNSYM)
1633 {
1634 hdr->sh_link = dynsymhdr->sh_link;
1635 break;
1636 }
1637 }
1638 }
1639 }
1640 break;
1641
252b5132
RH
1642 case SHT_SYMTAB: /* A symbol table */
1643 if (elf_onesymtab (abfd) == shindex)
b34976b6 1644 return TRUE;
252b5132 1645
a50b2160
JJ
1646 if (hdr->sh_entsize != bed->s->sizeof_sym)
1647 return FALSE;
3337c1e5 1648 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
1649 {
1650 if (hdr->sh_size != 0)
1651 return FALSE;
1652 /* Some assemblers erroneously set sh_info to one with a
1653 zero sh_size. ld sees this as a global symbol count
1654 of (unsigned) -1. Fix it here. */
1655 hdr->sh_info = 0;
1656 return TRUE;
1657 }
252b5132
RH
1658 BFD_ASSERT (elf_onesymtab (abfd) == 0);
1659 elf_onesymtab (abfd) = shindex;
1660 elf_tdata (abfd)->symtab_hdr = *hdr;
1661 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->symtab_hdr;
1662 abfd->flags |= HAS_SYMS;
1663
1664 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
1665 SHF_ALLOC is set, and this is a shared object, then we also
1666 treat this section as a BFD section. We can not base the
1667 decision purely on SHF_ALLOC, because that flag is sometimes
1668 set in a relocatable object file, which would confuse the
1669 linker. */
252b5132
RH
1670 if ((hdr->sh_flags & SHF_ALLOC) != 0
1671 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
1672 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1673 shindex))
b34976b6 1674 return FALSE;
252b5132 1675
1b3a8575
AM
1676 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
1677 can't read symbols without that section loaded as well. It
1678 is most likely specified by the next section header. */
1679 if (elf_elfsections (abfd)[elf_symtab_shndx (abfd)]->sh_link != shindex)
1680 {
1681 unsigned int i, num_sec;
1682
1683 num_sec = elf_numsections (abfd);
1684 for (i = shindex + 1; i < num_sec; i++)
1685 {
1686 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1687 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1688 && hdr2->sh_link == shindex)
1689 break;
1690 }
1691 if (i == num_sec)
1692 for (i = 1; i < shindex; i++)
1693 {
1694 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1695 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
1696 && hdr2->sh_link == shindex)
1697 break;
1698 }
1699 if (i != shindex)
1700 return bfd_section_from_shdr (abfd, i);
1701 }
b34976b6 1702 return TRUE;
252b5132
RH
1703
1704 case SHT_DYNSYM: /* A dynamic symbol table */
1705 if (elf_dynsymtab (abfd) == shindex)
b34976b6 1706 return TRUE;
252b5132 1707
a50b2160
JJ
1708 if (hdr->sh_entsize != bed->s->sizeof_sym)
1709 return FALSE;
eee3b786
AM
1710 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
1711 {
1712 if (hdr->sh_size != 0)
1713 return FALSE;
1714 /* Some linkers erroneously set sh_info to one with a
1715 zero sh_size. ld sees this as a global symbol count
1716 of (unsigned) -1. Fix it here. */
1717 hdr->sh_info = 0;
1718 return TRUE;
1719 }
252b5132
RH
1720 BFD_ASSERT (elf_dynsymtab (abfd) == 0);
1721 elf_dynsymtab (abfd) = shindex;
1722 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
1723 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1724 abfd->flags |= HAS_SYMS;
1725
1726 /* Besides being a symbol table, we also treat this as a regular
1727 section, so that objcopy can handle it. */
6dc132d9 1728 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132 1729
9ad5cbcf
AM
1730 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections */
1731 if (elf_symtab_shndx (abfd) == shindex)
b34976b6 1732 return TRUE;
9ad5cbcf 1733
1b3a8575 1734 BFD_ASSERT (elf_symtab_shndx (abfd) == 0);
9ad5cbcf
AM
1735 elf_symtab_shndx (abfd) = shindex;
1736 elf_tdata (abfd)->symtab_shndx_hdr = *hdr;
1737 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_shndx_hdr;
b34976b6 1738 return TRUE;
9ad5cbcf 1739
252b5132
RH
1740 case SHT_STRTAB: /* A string table */
1741 if (hdr->bfd_section != NULL)
b34976b6 1742 return TRUE;
252b5132
RH
1743 if (ehdr->e_shstrndx == shindex)
1744 {
1745 elf_tdata (abfd)->shstrtab_hdr = *hdr;
1746 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
b34976b6 1747 return TRUE;
252b5132 1748 }
1b3a8575
AM
1749 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
1750 {
1751 symtab_strtab:
1752 elf_tdata (abfd)->strtab_hdr = *hdr;
1753 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
1754 return TRUE;
1755 }
1756 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
1757 {
1758 dynsymtab_strtab:
1759 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
1760 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
1761 elf_elfsections (abfd)[shindex] = hdr;
1762 /* We also treat this as a regular section, so that objcopy
1763 can handle it. */
6dc132d9
L
1764 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1765 shindex);
1b3a8575 1766 }
252b5132 1767
1b3a8575
AM
1768 /* If the string table isn't one of the above, then treat it as a
1769 regular section. We need to scan all the headers to be sure,
1770 just in case this strtab section appeared before the above. */
1771 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
1772 {
1773 unsigned int i, num_sec;
252b5132 1774
1b3a8575
AM
1775 num_sec = elf_numsections (abfd);
1776 for (i = 1; i < num_sec; i++)
1777 {
1778 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
1779 if (hdr2->sh_link == shindex)
1780 {
933d961a
JJ
1781 /* Prevent endless recursion on broken objects. */
1782 if (i == shindex)
1783 return FALSE;
1b3a8575
AM
1784 if (! bfd_section_from_shdr (abfd, i))
1785 return FALSE;
1786 if (elf_onesymtab (abfd) == i)
1787 goto symtab_strtab;
1788 if (elf_dynsymtab (abfd) == i)
1789 goto dynsymtab_strtab;
1790 }
1791 }
1792 }
6dc132d9 1793 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1794
1795 case SHT_REL:
1796 case SHT_RELA:
1797 /* *These* do a lot of work -- but build no sections! */
1798 {
1799 asection *target_sect;
d4730f92 1800 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 1801 unsigned int num_sec = elf_numsections (abfd);
d4730f92
BS
1802 struct bfd_elf_section_data *esdt;
1803 bfd_size_type amt;
252b5132 1804
aa2ca951
JJ
1805 if (hdr->sh_entsize
1806 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160
JJ
1807 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
1808 return FALSE;
1809
03ae5f59 1810 /* Check for a bogus link to avoid crashing. */
4fbb74a6 1811 if (hdr->sh_link >= num_sec)
03ae5f59
ILT
1812 {
1813 ((*_bfd_error_handler)
d003868e
AM
1814 (_("%B: invalid link %lu for reloc section %s (index %u)"),
1815 abfd, hdr->sh_link, name, shindex));
6dc132d9
L
1816 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1817 shindex);
03ae5f59
ILT
1818 }
1819
252b5132
RH
1820 /* For some incomprehensible reason Oracle distributes
1821 libraries for Solaris in which some of the objects have
1822 bogus sh_link fields. It would be nice if we could just
1823 reject them, but, unfortunately, some people need to use
1824 them. We scan through the section headers; if we find only
1825 one suitable symbol table, we clobber the sh_link to point
83b89087
L
1826 to it. I hope this doesn't break anything.
1827
1828 Don't do it on executable nor shared library. */
1829 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
1830 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
1831 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
1832 {
9ad5cbcf 1833 unsigned int scan;
252b5132
RH
1834 int found;
1835
1836 found = 0;
9ad5cbcf 1837 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
1838 {
1839 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
1840 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
1841 {
1842 if (found != 0)
1843 {
1844 found = 0;
1845 break;
1846 }
1847 found = scan;
1848 }
1849 }
1850 if (found != 0)
1851 hdr->sh_link = found;
1852 }
1853
1854 /* Get the symbol table. */
1b3a8575
AM
1855 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
1856 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 1857 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
b34976b6 1858 return FALSE;
252b5132
RH
1859
1860 /* If this reloc section does not use the main symbol table we
1861 don't treat it as a reloc section. BFD can't adequately
1862 represent such a section, so at least for now, we don't
c044fabd 1863 try. We just present it as a normal section. We also
60bcf0fa 1864 can't use it as a reloc section if it points to the null
83b89087
L
1865 section, an invalid section, another reloc section, or its
1866 sh_link points to the null section. */
185ef66d 1867 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 1868 || hdr->sh_link == SHN_UNDEF
185ef66d 1869 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
1870 || hdr->sh_info >= num_sec
1871 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
1872 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
6dc132d9
L
1873 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1874 shindex);
252b5132
RH
1875
1876 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
b34976b6 1877 return FALSE;
252b5132
RH
1878 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
1879 if (target_sect == NULL)
b34976b6 1880 return FALSE;
252b5132 1881
d4730f92
BS
1882 esdt = elf_section_data (target_sect);
1883 if (hdr->sh_type == SHT_RELA)
1884 p_hdr = &esdt->rela.hdr;
252b5132 1885 else
d4730f92
BS
1886 p_hdr = &esdt->rel.hdr;
1887
1888 BFD_ASSERT (*p_hdr == NULL);
1889 amt = sizeof (*hdr2);
1890 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
1891 if (hdr2 == NULL)
1892 return FALSE;
252b5132 1893 *hdr2 = *hdr;
d4730f92 1894 *p_hdr = hdr2;
252b5132 1895 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 1896 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
1897 target_sect->flags |= SEC_RELOC;
1898 target_sect->relocation = NULL;
1899 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
1900 /* In the section to which the relocations apply, mark whether
1901 its relocations are of the REL or RELA variety. */
72730e0c 1902 if (hdr->sh_size != 0)
d4730f92
BS
1903 {
1904 if (hdr->sh_type == SHT_RELA)
1905 target_sect->use_rela_p = 1;
1906 }
252b5132 1907 abfd->flags |= HAS_RELOC;
b34976b6 1908 return TRUE;
252b5132 1909 }
252b5132
RH
1910
1911 case SHT_GNU_verdef:
1912 elf_dynverdef (abfd) = shindex;
1913 elf_tdata (abfd)->dynverdef_hdr = *hdr;
6dc132d9 1914 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1915
1916 case SHT_GNU_versym:
a50b2160
JJ
1917 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
1918 return FALSE;
252b5132
RH
1919 elf_dynversym (abfd) = shindex;
1920 elf_tdata (abfd)->dynversym_hdr = *hdr;
6dc132d9 1921 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1922
1923 case SHT_GNU_verneed:
1924 elf_dynverref (abfd) = shindex;
1925 elf_tdata (abfd)->dynverref_hdr = *hdr;
6dc132d9 1926 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
252b5132
RH
1927
1928 case SHT_SHLIB:
b34976b6 1929 return TRUE;
252b5132 1930
dbb410c3 1931 case SHT_GROUP:
44534af3 1932 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
a50b2160 1933 return FALSE;
6dc132d9 1934 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
b34976b6 1935 return FALSE;
dbb410c3
AM
1936 if (hdr->contents != NULL)
1937 {
1938 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
1783205a 1939 unsigned int n_elt = hdr->sh_size / GRP_ENTRY_SIZE;
dbb410c3
AM
1940 asection *s;
1941
b885599b
AM
1942 if (idx->flags & GRP_COMDAT)
1943 hdr->bfd_section->flags
1944 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1945
45c5e9ed
L
1946 /* We try to keep the same section order as it comes in. */
1947 idx += n_elt;
dbb410c3 1948 while (--n_elt != 0)
1783205a
NC
1949 {
1950 --idx;
1951
1952 if (idx->shdr != NULL
1953 && (s = idx->shdr->bfd_section) != NULL
1954 && elf_next_in_group (s) != NULL)
1955 {
1956 elf_next_in_group (hdr->bfd_section) = s;
1957 break;
1958 }
1959 }
dbb410c3
AM
1960 }
1961 break;
1962
252b5132 1963 default:
104d59d1
JM
1964 /* Possibly an attributes section. */
1965 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
1966 || hdr->sh_type == bed->obj_attrs_section_type)
1967 {
1968 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1969 return FALSE;
1970 _bfd_elf_parse_attributes (abfd, hdr);
1971 return TRUE;
1972 }
1973
252b5132 1974 /* Check for any processor-specific section types. */
3eb70a79
L
1975 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
1976 return TRUE;
1977
1978 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
1979 {
1980 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1981 /* FIXME: How to properly handle allocated section reserved
1982 for applications? */
1983 (*_bfd_error_handler)
1984 (_("%B: don't know how to handle allocated, application "
1985 "specific section `%s' [0x%8x]"),
1986 abfd, name, hdr->sh_type);
1987 else
1988 /* Allow sections reserved for applications. */
1989 return _bfd_elf_make_section_from_shdr (abfd, hdr, name,
1990 shindex);
1991 }
1992 else if (hdr->sh_type >= SHT_LOPROC
1993 && hdr->sh_type <= SHT_HIPROC)
1994 /* FIXME: We should handle this section. */
1995 (*_bfd_error_handler)
1996 (_("%B: don't know how to handle processor specific section "
1997 "`%s' [0x%8x]"),
1998 abfd, name, hdr->sh_type);
1999 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2000 {
2001 /* Unrecognised OS-specific sections. */
2002 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2003 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2004 required to correctly process the section and the file should
ff15b240
NC
2005 be rejected with an error message. */
2006 (*_bfd_error_handler)
2007 (_("%B: don't know how to handle OS specific section "
2008 "`%s' [0x%8x]"),
2009 abfd, name, hdr->sh_type);
2010 else
2011 /* Otherwise it should be processed. */
2012 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2013 }
3eb70a79
L
2014 else
2015 /* FIXME: We should handle this section. */
2016 (*_bfd_error_handler)
2017 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2018 abfd, name, hdr->sh_type);
2019
2020 return FALSE;
252b5132
RH
2021 }
2022
b34976b6 2023 return TRUE;
252b5132
RH
2024}
2025
87d72d41 2026/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2027
87d72d41
AM
2028Elf_Internal_Sym *
2029bfd_sym_from_r_symndx (struct sym_cache *cache,
2030 bfd *abfd,
2031 unsigned long r_symndx)
ec338859 2032{
ec338859
AM
2033 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2034
a5d1b3b5
AM
2035 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2036 {
2037 Elf_Internal_Shdr *symtab_hdr;
2038 unsigned char esym[sizeof (Elf64_External_Sym)];
2039 Elf_External_Sym_Shndx eshndx;
ec338859 2040
a5d1b3b5
AM
2041 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2042 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2043 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2044 return NULL;
9ad5cbcf 2045
a5d1b3b5
AM
2046 if (cache->abfd != abfd)
2047 {
2048 memset (cache->indx, -1, sizeof (cache->indx));
2049 cache->abfd = abfd;
2050 }
2051 cache->indx[ent] = r_symndx;
ec338859 2052 }
a5d1b3b5 2053
87d72d41 2054 return &cache->sym[ent];
ec338859
AM
2055}
2056
252b5132
RH
2057/* Given an ELF section number, retrieve the corresponding BFD
2058 section. */
2059
2060asection *
91d6fa6a 2061bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2062{
91d6fa6a 2063 if (sec_index >= elf_numsections (abfd))
252b5132 2064 return NULL;
91d6fa6a 2065 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2066}
2067
b35d266b 2068static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2069{
0112cd26
NC
2070 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2071 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2072};
2073
b35d266b 2074static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2075{
0112cd26
NC
2076 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2077 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2078};
2079
b35d266b 2080static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2081{
0112cd26
NC
2082 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2083 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2084 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2085 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2086 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2087 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2088 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2089 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2090 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2091 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2092 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2093};
2094
b35d266b 2095static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2096{
0112cd26
NC
2097 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2098 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2099 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2100};
2101
b35d266b 2102static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2103{
0112cd26 2104 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2105 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2106 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2107 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2108 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2109 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2110 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2111 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2112 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2113 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2114};
2115
b35d266b 2116static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2117{
0112cd26
NC
2118 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2119 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2120};
2121
b35d266b 2122static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2123{
0112cd26
NC
2124 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2125 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2126 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2127 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2128};
2129
b35d266b 2130static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2131{
0112cd26
NC
2132 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2133 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2134};
2135
b35d266b 2136static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2137{
0112cd26
NC
2138 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2139 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2140 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2141};
2142
b35d266b 2143static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2144{
0112cd26
NC
2145 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2146 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2147 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2148};
2149
b35d266b 2150static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2151{
0112cd26
NC
2152 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2153 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2154 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2155 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2156 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2157};
2158
b35d266b 2159static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2160{
0112cd26
NC
2161 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2162 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2163 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2164 /* See struct bfd_elf_special_section declaration for the semantics of
2165 this special case where .prefix_length != strlen (.prefix). */
2166 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2167 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2168};
2169
b35d266b 2170static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2171{
0112cd26
NC
2172 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2173 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2174 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2175 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2176};
2177
1b315056
CS
2178static const struct bfd_elf_special_section special_sections_z[] =
2179{
2180 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2181 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2182 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2183 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2184 { NULL, 0, 0, 0, 0 }
2185};
2186
e4c93b56 2187static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2188{
7f4d3958 2189 special_sections_b, /* 'b' */
98ece1b3 2190 special_sections_c, /* 'c' */
7f4d3958
L
2191 special_sections_d, /* 'd' */
2192 NULL, /* 'e' */
2193 special_sections_f, /* 'f' */
2194 special_sections_g, /* 'g' */
2195 special_sections_h, /* 'h' */
2196 special_sections_i, /* 'i' */
2197 NULL, /* 'j' */
2198 NULL, /* 'k' */
2199 special_sections_l, /* 'l' */
2200 NULL, /* 'm' */
2201 special_sections_n, /* 'n' */
2202 NULL, /* 'o' */
2203 special_sections_p, /* 'p' */
2204 NULL, /* 'q' */
2205 special_sections_r, /* 'r' */
2206 special_sections_s, /* 's' */
2207 special_sections_t, /* 't' */
1b315056
CS
2208 NULL, /* 'u' */
2209 NULL, /* 'v' */
2210 NULL, /* 'w' */
2211 NULL, /* 'x' */
2212 NULL, /* 'y' */
2213 special_sections_z /* 'z' */
7f4d3958
L
2214};
2215
551b43fd
AM
2216const struct bfd_elf_special_section *
2217_bfd_elf_get_special_section (const char *name,
2218 const struct bfd_elf_special_section *spec,
2219 unsigned int rela)
2f89ff8d
L
2220{
2221 int i;
7f4d3958 2222 int len;
7f4d3958 2223
551b43fd 2224 len = strlen (name);
7f4d3958 2225
551b43fd 2226 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2227 {
2228 int suffix_len;
551b43fd 2229 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2230
2231 if (len < prefix_len)
2232 continue;
551b43fd 2233 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2234 continue;
2235
551b43fd 2236 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2237 if (suffix_len <= 0)
2238 {
2239 if (name[prefix_len] != 0)
2240 {
2241 if (suffix_len == 0)
2242 continue;
2243 if (name[prefix_len] != '.'
2244 && (suffix_len == -2
551b43fd 2245 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2246 continue;
2247 }
2248 }
2249 else
2250 {
2251 if (len < prefix_len + suffix_len)
2252 continue;
2253 if (memcmp (name + len - suffix_len,
551b43fd 2254 spec[i].prefix + prefix_len,
7dcb9820
AM
2255 suffix_len) != 0)
2256 continue;
2257 }
551b43fd 2258 return &spec[i];
7dcb9820 2259 }
2f89ff8d
L
2260
2261 return NULL;
2262}
2263
7dcb9820 2264const struct bfd_elf_special_section *
29ef7005 2265_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2266{
551b43fd
AM
2267 int i;
2268 const struct bfd_elf_special_section *spec;
29ef7005 2269 const struct elf_backend_data *bed;
2f89ff8d
L
2270
2271 /* See if this is one of the special sections. */
551b43fd
AM
2272 if (sec->name == NULL)
2273 return NULL;
2f89ff8d 2274
29ef7005
L
2275 bed = get_elf_backend_data (abfd);
2276 spec = bed->special_sections;
2277 if (spec)
2278 {
2279 spec = _bfd_elf_get_special_section (sec->name,
2280 bed->special_sections,
2281 sec->use_rela_p);
2282 if (spec != NULL)
2283 return spec;
2284 }
2285
551b43fd
AM
2286 if (sec->name[0] != '.')
2287 return NULL;
2f89ff8d 2288
551b43fd 2289 i = sec->name[1] - 'b';
1b315056 2290 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2291 return NULL;
2292
2293 spec = special_sections[i];
2f89ff8d 2294
551b43fd
AM
2295 if (spec == NULL)
2296 return NULL;
2297
2298 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2299}
2300
b34976b6 2301bfd_boolean
217aa764 2302_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2303{
2304 struct bfd_elf_section_data *sdata;
551b43fd 2305 const struct elf_backend_data *bed;
7dcb9820 2306 const struct bfd_elf_special_section *ssect;
252b5132 2307
f0abc2a1
AM
2308 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2309 if (sdata == NULL)
2310 {
a50b1753
NC
2311 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2312 sizeof (*sdata));
f0abc2a1
AM
2313 if (sdata == NULL)
2314 return FALSE;
217aa764 2315 sec->used_by_bfd = sdata;
f0abc2a1 2316 }
bf572ba0 2317
551b43fd
AM
2318 /* Indicate whether or not this section should use RELA relocations. */
2319 bed = get_elf_backend_data (abfd);
2320 sec->use_rela_p = bed->default_use_rela_p;
2321
e843e0f8
L
2322 /* When we read a file, we don't need to set ELF section type and
2323 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2324 anyway. We will set ELF section type and flags for all linker
2325 created sections. If user specifies BFD section flags, we will
2326 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2327 elf_fake_sections. Special handling for .init_array/.fini_array
2328 output sections since they may contain .ctors/.dtors input
2329 sections. We don't want _bfd_elf_init_private_section_data to
2330 copy ELF section type from .ctors/.dtors input sections. */
2331 if (abfd->direction != read_direction
3496cb2a 2332 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2333 {
551b43fd 2334 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2335 if (ssect != NULL
2336 && (!sec->flags
2337 || (sec->flags & SEC_LINKER_CREATED) != 0
2338 || ssect->type == SHT_INIT_ARRAY
2339 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2340 {
2341 elf_section_type (sec) = ssect->type;
2342 elf_section_flags (sec) = ssect->attr;
2343 }
2f89ff8d
L
2344 }
2345
f592407e 2346 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2347}
2348
2349/* Create a new bfd section from an ELF program header.
2350
2351 Since program segments have no names, we generate a synthetic name
2352 of the form segment<NUM>, where NUM is generally the index in the
2353 program header table. For segments that are split (see below) we
2354 generate the names segment<NUM>a and segment<NUM>b.
2355
2356 Note that some program segments may have a file size that is different than
2357 (less than) the memory size. All this means is that at execution the
2358 system must allocate the amount of memory specified by the memory size,
2359 but only initialize it with the first "file size" bytes read from the
2360 file. This would occur for example, with program segments consisting
2361 of combined data+bss.
2362
2363 To handle the above situation, this routine generates TWO bfd sections
2364 for the single program segment. The first has the length specified by
2365 the file size of the segment, and the second has the length specified
2366 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2367 into its initialized and uninitialized parts.
252b5132
RH
2368
2369 */
2370
b34976b6 2371bfd_boolean
217aa764
AM
2372_bfd_elf_make_section_from_phdr (bfd *abfd,
2373 Elf_Internal_Phdr *hdr,
91d6fa6a 2374 int hdr_index,
a50b1753 2375 const char *type_name)
252b5132
RH
2376{
2377 asection *newsect;
2378 char *name;
2379 char namebuf[64];
d4c88bbb 2380 size_t len;
252b5132
RH
2381 int split;
2382
2383 split = ((hdr->p_memsz > 0)
2384 && (hdr->p_filesz > 0)
2385 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2386
2387 if (hdr->p_filesz > 0)
252b5132 2388 {
91d6fa6a 2389 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2390 len = strlen (namebuf) + 1;
a50b1753 2391 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2392 if (!name)
2393 return FALSE;
2394 memcpy (name, namebuf, len);
2395 newsect = bfd_make_section (abfd, name);
2396 if (newsect == NULL)
2397 return FALSE;
2398 newsect->vma = hdr->p_vaddr;
2399 newsect->lma = hdr->p_paddr;
2400 newsect->size = hdr->p_filesz;
2401 newsect->filepos = hdr->p_offset;
2402 newsect->flags |= SEC_HAS_CONTENTS;
2403 newsect->alignment_power = bfd_log2 (hdr->p_align);
2404 if (hdr->p_type == PT_LOAD)
252b5132 2405 {
d5191d0c
AM
2406 newsect->flags |= SEC_ALLOC;
2407 newsect->flags |= SEC_LOAD;
2408 if (hdr->p_flags & PF_X)
2409 {
2410 /* FIXME: all we known is that it has execute PERMISSION,
2411 may be data. */
2412 newsect->flags |= SEC_CODE;
2413 }
2414 }
2415 if (!(hdr->p_flags & PF_W))
2416 {
2417 newsect->flags |= SEC_READONLY;
252b5132 2418 }
252b5132
RH
2419 }
2420
d5191d0c 2421 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2422 {
d5191d0c
AM
2423 bfd_vma align;
2424
91d6fa6a 2425 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2426 len = strlen (namebuf) + 1;
a50b1753 2427 name = (char *) bfd_alloc (abfd, len);
252b5132 2428 if (!name)
b34976b6 2429 return FALSE;
d4c88bbb 2430 memcpy (name, namebuf, len);
252b5132
RH
2431 newsect = bfd_make_section (abfd, name);
2432 if (newsect == NULL)
b34976b6 2433 return FALSE;
252b5132
RH
2434 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2435 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2436 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2437 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2438 align = newsect->vma & -newsect->vma;
2439 if (align == 0 || align > hdr->p_align)
2440 align = hdr->p_align;
2441 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2442 if (hdr->p_type == PT_LOAD)
2443 {
d5191d0c
AM
2444 /* Hack for gdb. Segments that have not been modified do
2445 not have their contents written to a core file, on the
2446 assumption that a debugger can find the contents in the
2447 executable. We flag this case by setting the fake
2448 section size to zero. Note that "real" bss sections will
2449 always have their contents dumped to the core file. */
2450 if (bfd_get_format (abfd) == bfd_core)
2451 newsect->size = 0;
252b5132
RH
2452 newsect->flags |= SEC_ALLOC;
2453 if (hdr->p_flags & PF_X)
2454 newsect->flags |= SEC_CODE;
2455 }
2456 if (!(hdr->p_flags & PF_W))
2457 newsect->flags |= SEC_READONLY;
2458 }
2459
b34976b6 2460 return TRUE;
252b5132
RH
2461}
2462
b34976b6 2463bfd_boolean
91d6fa6a 2464bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2465{
9c5bfbb7 2466 const struct elf_backend_data *bed;
20cfcaae
NC
2467
2468 switch (hdr->p_type)
2469 {
2470 case PT_NULL:
91d6fa6a 2471 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2472
2473 case PT_LOAD:
91d6fa6a 2474 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2475
2476 case PT_DYNAMIC:
91d6fa6a 2477 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2478
2479 case PT_INTERP:
91d6fa6a 2480 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2481
2482 case PT_NOTE:
91d6fa6a 2483 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2484 return FALSE;
718175fa 2485 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2486 return FALSE;
2487 return TRUE;
20cfcaae
NC
2488
2489 case PT_SHLIB:
91d6fa6a 2490 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2491
2492 case PT_PHDR:
91d6fa6a 2493 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2494
811072d8 2495 case PT_GNU_EH_FRAME:
91d6fa6a 2496 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2497 "eh_frame_hdr");
2498
2b05f1b7 2499 case PT_GNU_STACK:
91d6fa6a 2500 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2501
8c37241b 2502 case PT_GNU_RELRO:
91d6fa6a 2503 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2504
20cfcaae 2505 default:
8c1acd09 2506 /* Check for any processor-specific program segment types. */
20cfcaae 2507 bed = get_elf_backend_data (abfd);
91d6fa6a 2508 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
2509 }
2510}
2511
d4730f92
BS
2512/* Return the REL_HDR for SEC, assuming there is only a single one, either
2513 REL or RELA. */
2514
2515Elf_Internal_Shdr *
2516_bfd_elf_single_rel_hdr (asection *sec)
2517{
2518 if (elf_section_data (sec)->rel.hdr)
2519 {
2520 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
2521 return elf_section_data (sec)->rel.hdr;
2522 }
2523 else
2524 return elf_section_data (sec)->rela.hdr;
2525}
2526
2527/* Allocate and initialize a section-header for a new reloc section,
2528 containing relocations against ASECT. It is stored in RELDATA. If
2529 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
2530 relocations. */
23bc299b 2531
b34976b6 2532bfd_boolean
217aa764 2533_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 2534 struct bfd_elf_section_reloc_data *reldata,
217aa764
AM
2535 asection *asect,
2536 bfd_boolean use_rela_p)
23bc299b 2537{
d4730f92 2538 Elf_Internal_Shdr *rel_hdr;
23bc299b 2539 char *name;
9c5bfbb7 2540 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92
BS
2541 bfd_size_type amt;
2542
2543 amt = sizeof (Elf_Internal_Shdr);
2544 BFD_ASSERT (reldata->hdr == NULL);
2545 rel_hdr = bfd_zalloc (abfd, amt);
2546 reldata->hdr = rel_hdr;
23bc299b 2547
d324f6d6 2548 amt = sizeof ".rela" + strlen (asect->name);
a50b1753 2549 name = (char *) bfd_alloc (abfd, amt);
23bc299b 2550 if (name == NULL)
b34976b6 2551 return FALSE;
23bc299b
MM
2552 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", asect->name);
2553 rel_hdr->sh_name =
2b0f7ef9 2554 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
b34976b6 2555 FALSE);
23bc299b 2556 if (rel_hdr->sh_name == (unsigned int) -1)
b34976b6 2557 return FALSE;
23bc299b
MM
2558 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
2559 rel_hdr->sh_entsize = (use_rela_p
2560 ? bed->s->sizeof_rela
2561 : bed->s->sizeof_rel);
72de5009 2562 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
2563 rel_hdr->sh_flags = 0;
2564 rel_hdr->sh_addr = 0;
2565 rel_hdr->sh_size = 0;
2566 rel_hdr->sh_offset = 0;
2567
b34976b6 2568 return TRUE;
23bc299b
MM
2569}
2570
94be91de
JB
2571/* Return the default section type based on the passed in section flags. */
2572
2573int
2574bfd_elf_get_default_section_type (flagword flags)
2575{
2576 if ((flags & SEC_ALLOC) != 0
2e76e85a 2577 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
2578 return SHT_NOBITS;
2579 return SHT_PROGBITS;
2580}
2581
d4730f92
BS
2582struct fake_section_arg
2583{
2584 struct bfd_link_info *link_info;
2585 bfd_boolean failed;
2586};
2587
252b5132
RH
2588/* Set up an ELF internal section header for a section. */
2589
252b5132 2590static void
d4730f92 2591elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 2592{
d4730f92 2593 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 2594 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 2595 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 2596 Elf_Internal_Shdr *this_hdr;
0414f35b 2597 unsigned int sh_type;
252b5132 2598
d4730f92 2599 if (arg->failed)
252b5132
RH
2600 {
2601 /* We already failed; just get out of the bfd_map_over_sections
08a40648 2602 loop. */
252b5132
RH
2603 return;
2604 }
2605
d4730f92 2606 this_hdr = &esd->this_hdr;
252b5132 2607
e57b5356
AM
2608 this_hdr->sh_name = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
2609 asect->name, FALSE);
2610 if (this_hdr->sh_name == (unsigned int) -1)
252b5132 2611 {
d4730f92 2612 arg->failed = TRUE;
252b5132
RH
2613 return;
2614 }
2615
a4d8e49b 2616 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
2617
2618 if ((asect->flags & SEC_ALLOC) != 0
2619 || asect->user_set_vma)
2620 this_hdr->sh_addr = asect->vma;
2621 else
2622 this_hdr->sh_addr = 0;
2623
2624 this_hdr->sh_offset = 0;
eea6121a 2625 this_hdr->sh_size = asect->size;
252b5132 2626 this_hdr->sh_link = 0;
72de5009 2627 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
2628 /* The sh_entsize and sh_info fields may have been set already by
2629 copy_private_section_data. */
2630
2631 this_hdr->bfd_section = asect;
2632 this_hdr->contents = NULL;
2633
3cddba1e
L
2634 /* If the section type is unspecified, we set it based on
2635 asect->flags. */
98ece1b3
AM
2636 if ((asect->flags & SEC_GROUP) != 0)
2637 sh_type = SHT_GROUP;
98ece1b3 2638 else
94be91de 2639 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 2640
3cddba1e 2641 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
2642 this_hdr->sh_type = sh_type;
2643 else if (this_hdr->sh_type == SHT_NOBITS
2644 && sh_type == SHT_PROGBITS
2645 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 2646 {
98ece1b3
AM
2647 /* Warn if we are changing a NOBITS section to PROGBITS, but
2648 allow the link to proceed. This can happen when users link
2649 non-bss input sections to bss output sections, or emit data
2650 to a bss output section via a linker script. */
2651 (*_bfd_error_handler)
58f0869b 2652 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 2653 this_hdr->sh_type = sh_type;
3cddba1e
L
2654 }
2655
2f89ff8d 2656 switch (this_hdr->sh_type)
252b5132 2657 {
2f89ff8d 2658 default:
2f89ff8d
L
2659 break;
2660
2661 case SHT_STRTAB:
2662 case SHT_INIT_ARRAY:
2663 case SHT_FINI_ARRAY:
2664 case SHT_PREINIT_ARRAY:
2665 case SHT_NOTE:
2666 case SHT_NOBITS:
2667 case SHT_PROGBITS:
2668 break;
2669
2670 case SHT_HASH:
c7ac6ff8 2671 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 2672 break;
5de3bf90 2673
2f89ff8d 2674 case SHT_DYNSYM:
252b5132 2675 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
2676 break;
2677
2678 case SHT_DYNAMIC:
252b5132 2679 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
2680 break;
2681
2682 case SHT_RELA:
2683 if (get_elf_backend_data (abfd)->may_use_rela_p)
2684 this_hdr->sh_entsize = bed->s->sizeof_rela;
2685 break;
2686
2687 case SHT_REL:
2688 if (get_elf_backend_data (abfd)->may_use_rel_p)
2689 this_hdr->sh_entsize = bed->s->sizeof_rel;
2690 break;
2691
2692 case SHT_GNU_versym:
252b5132 2693 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
2694 break;
2695
2696 case SHT_GNU_verdef:
252b5132
RH
2697 this_hdr->sh_entsize = 0;
2698 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2699 cverdefs. The linker will set cverdefs, but sh_info will be
2700 zero. */
252b5132
RH
2701 if (this_hdr->sh_info == 0)
2702 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
2703 else
2704 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
2705 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
2706 break;
2707
2708 case SHT_GNU_verneed:
252b5132
RH
2709 this_hdr->sh_entsize = 0;
2710 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
2711 cverrefs. The linker will set cverrefs, but sh_info will be
2712 zero. */
252b5132
RH
2713 if (this_hdr->sh_info == 0)
2714 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
2715 else
2716 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
2717 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
2718 break;
2719
2720 case SHT_GROUP:
1783205a 2721 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 2722 break;
fdc90cb4
JJ
2723
2724 case SHT_GNU_HASH:
2725 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
2726 break;
dbb410c3 2727 }
252b5132
RH
2728
2729 if ((asect->flags & SEC_ALLOC) != 0)
2730 this_hdr->sh_flags |= SHF_ALLOC;
2731 if ((asect->flags & SEC_READONLY) == 0)
2732 this_hdr->sh_flags |= SHF_WRITE;
2733 if ((asect->flags & SEC_CODE) != 0)
2734 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
2735 if ((asect->flags & SEC_MERGE) != 0)
2736 {
2737 this_hdr->sh_flags |= SHF_MERGE;
2738 this_hdr->sh_entsize = asect->entsize;
2739 if ((asect->flags & SEC_STRINGS) != 0)
2740 this_hdr->sh_flags |= SHF_STRINGS;
2741 }
1126897b 2742 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 2743 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 2744 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
2745 {
2746 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
2747 if (asect->size == 0
2748 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 2749 {
3a800eb9 2750 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 2751
704afa60 2752 this_hdr->sh_size = 0;
3a800eb9
AM
2753 if (o != NULL)
2754 {
704afa60 2755 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
2756 if (this_hdr->sh_size != 0)
2757 this_hdr->sh_type = SHT_NOBITS;
2758 }
704afa60
JJ
2759 }
2760 }
18ae9cc1
L
2761 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
2762 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 2763
d4730f92
BS
2764 /* If the section has relocs, set up a section header for the
2765 SHT_REL[A] section. If two relocation sections are required for
2766 this section, it is up to the processor-specific back-end to
2767 create the other. */
2768 if ((asect->flags & SEC_RELOC) != 0)
2769 {
2770 /* When doing a relocatable link, create both REL and RELA sections if
2771 needed. */
2772 if (arg->link_info
2773 /* Do the normal setup if we wouldn't create any sections here. */
2774 && esd->rel.count + esd->rela.count > 0
2775 && (arg->link_info->relocatable || arg->link_info->emitrelocations))
2776 {
2777 if (esd->rel.count && esd->rel.hdr == NULL
2778 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, asect, FALSE))
2779 {
2780 arg->failed = TRUE;
2781 return;
2782 }
2783 if (esd->rela.count && esd->rela.hdr == NULL
2784 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, asect, TRUE))
2785 {
2786 arg->failed = TRUE;
2787 return;
2788 }
2789 }
2790 else if (!_bfd_elf_init_reloc_shdr (abfd,
2791 (asect->use_rela_p
2792 ? &esd->rela : &esd->rel),
2793 asect,
2794 asect->use_rela_p))
2795 arg->failed = TRUE;
2796 }
2797
252b5132 2798 /* Check for processor-specific section types. */
0414f35b 2799 sh_type = this_hdr->sh_type;
e1fddb6b
AO
2800 if (bed->elf_backend_fake_sections
2801 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 2802 arg->failed = TRUE;
252b5132 2803
42bb2e33 2804 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
2805 {
2806 /* Don't change the header type from NOBITS if we are being
42bb2e33 2807 called for objcopy --only-keep-debug. */
0414f35b
AM
2808 this_hdr->sh_type = sh_type;
2809 }
252b5132
RH
2810}
2811
bcacc0f5
AM
2812/* Fill in the contents of a SHT_GROUP section. Called from
2813 _bfd_elf_compute_section_file_positions for gas, objcopy, and
2814 when ELF targets use the generic linker, ld. Called for ld -r
2815 from bfd_elf_final_link. */
dbb410c3 2816
1126897b 2817void
217aa764 2818bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 2819{
a50b1753 2820 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 2821 asection *elt, *first;
dbb410c3 2822 unsigned char *loc;
b34976b6 2823 bfd_boolean gas;
dbb410c3 2824
7e4111ad
L
2825 /* Ignore linker created group section. See elfNN_ia64_object_p in
2826 elfxx-ia64.c. */
2827 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
2828 || *failedptr)
2829 return;
2830
bcacc0f5
AM
2831 if (elf_section_data (sec)->this_hdr.sh_info == 0)
2832 {
2833 unsigned long symindx = 0;
2834
2835 /* elf_group_id will have been set up by objcopy and the
2836 generic linker. */
2837 if (elf_group_id (sec) != NULL)
2838 symindx = elf_group_id (sec)->udata.i;
1126897b 2839
bcacc0f5
AM
2840 if (symindx == 0)
2841 {
2842 /* If called from the assembler, swap_out_syms will have set up
2843 elf_section_syms. */
2844 BFD_ASSERT (elf_section_syms (abfd) != NULL);
2845 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
2846 }
2847 elf_section_data (sec)->this_hdr.sh_info = symindx;
2848 }
2849 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 2850 {
bcacc0f5
AM
2851 /* The ELF backend linker sets sh_info to -2 when the group
2852 signature symbol is global, and thus the index can't be
2853 set until all local symbols are output. */
2854 asection *igroup = elf_sec_group (elf_next_in_group (sec));
2855 struct bfd_elf_section_data *sec_data = elf_section_data (igroup);
2856 unsigned long symndx = sec_data->this_hdr.sh_info;
2857 unsigned long extsymoff = 0;
2858 struct elf_link_hash_entry *h;
2859
2860 if (!elf_bad_symtab (igroup->owner))
2861 {
2862 Elf_Internal_Shdr *symtab_hdr;
2863
2864 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
2865 extsymoff = symtab_hdr->sh_info;
2866 }
2867 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
2868 while (h->root.type == bfd_link_hash_indirect
2869 || h->root.type == bfd_link_hash_warning)
2870 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2871
2872 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 2873 }
dbb410c3 2874
1126897b 2875 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 2876 gas = TRUE;
dbb410c3
AM
2877 if (sec->contents == NULL)
2878 {
b34976b6 2879 gas = FALSE;
a50b1753 2880 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
2881
2882 /* Arrange for the section to be written out. */
2883 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
2884 if (sec->contents == NULL)
2885 {
b34976b6 2886 *failedptr = TRUE;
dbb410c3
AM
2887 return;
2888 }
2889 }
2890
eea6121a 2891 loc = sec->contents + sec->size;
dbb410c3 2892
9dce4196
AM
2893 /* Get the pointer to the first section in the group that gas
2894 squirreled away here. objcopy arranges for this to be set to the
2895 start of the input section group. */
2896 first = elt = elf_next_in_group (sec);
dbb410c3
AM
2897
2898 /* First element is a flag word. Rest of section is elf section
2899 indices for all the sections of the group. Write them backwards
2900 just to keep the group in the same order as given in .section
2901 directives, not that it matters. */
2902 while (elt != NULL)
2903 {
9dce4196 2904 asection *s;
9dce4196 2905
9dce4196 2906 s = elt;
415f38a6
AM
2907 if (!gas)
2908 s = s->output_section;
2909 if (s != NULL
2910 && !bfd_is_abs_section (s))
01e1a5bc 2911 {
415f38a6
AM
2912 unsigned int idx = elf_section_data (s)->this_idx;
2913
01e1a5bc 2914 loc -= 4;
01e1a5bc
NC
2915 H_PUT_32 (abfd, idx, loc);
2916 }
945906ff 2917 elt = elf_next_in_group (elt);
9dce4196
AM
2918 if (elt == first)
2919 break;
dbb410c3
AM
2920 }
2921
3d7f7666 2922 if ((loc -= 4) != sec->contents)
9dce4196 2923 abort ();
dbb410c3 2924
9dce4196 2925 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
2926}
2927
252b5132
RH
2928/* Assign all ELF section numbers. The dummy first section is handled here
2929 too. The link/info pointers for the standard section types are filled
2930 in here too, while we're at it. */
2931
b34976b6 2932static bfd_boolean
da9f89d4 2933assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
2934{
2935 struct elf_obj_tdata *t = elf_tdata (abfd);
2936 asection *sec;
2b0f7ef9 2937 unsigned int section_number, secn;
252b5132 2938 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 2939 struct bfd_elf_section_data *d;
3516e984 2940 bfd_boolean need_symtab;
252b5132
RH
2941
2942 section_number = 1;
2943
2b0f7ef9
JJ
2944 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
2945
da9f89d4
L
2946 /* SHT_GROUP sections are in relocatable files only. */
2947 if (link_info == NULL || link_info->relocatable)
252b5132 2948 {
da9f89d4 2949 /* Put SHT_GROUP sections first. */
04dd1667 2950 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 2951 {
5daa8fe7 2952 d = elf_section_data (sec);
da9f89d4
L
2953
2954 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 2955 {
5daa8fe7 2956 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
2957 {
2958 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 2959 bfd_section_list_remove (abfd, sec);
da9f89d4 2960 abfd->section_count--;
da9f89d4 2961 }
08a40648 2962 else
4fbb74a6 2963 d->this_idx = section_number++;
da9f89d4 2964 }
47cc2cf5
PB
2965 }
2966 }
2967
2968 for (sec = abfd->sections; sec; sec = sec->next)
2969 {
2970 d = elf_section_data (sec);
2971
2972 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 2973 d->this_idx = section_number++;
2b0f7ef9 2974 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 2975 if (d->rel.hdr)
2b0f7ef9 2976 {
d4730f92
BS
2977 d->rel.idx = section_number++;
2978 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 2979 }
d4730f92
BS
2980 else
2981 d->rel.idx = 0;
23bc299b 2982
d4730f92 2983 if (d->rela.hdr)
2b0f7ef9 2984 {
d4730f92
BS
2985 d->rela.idx = section_number++;
2986 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 2987 }
23bc299b 2988 else
d4730f92 2989 d->rela.idx = 0;
252b5132
RH
2990 }
2991
2992 t->shstrtab_section = section_number++;
2b0f7ef9 2993 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
252b5132 2994 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
252b5132 2995
3516e984
L
2996 need_symtab = (bfd_get_symcount (abfd) > 0
2997 || (link_info == NULL
2998 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
2999 == HAS_RELOC)));
3000 if (need_symtab)
252b5132
RH
3001 {
3002 t->symtab_section = section_number++;
2b0f7ef9 3003 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3004 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3005 {
9ad5cbcf
AM
3006 t->symtab_shndx_section = section_number++;
3007 t->symtab_shndx_hdr.sh_name
3008 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3009 ".symtab_shndx", FALSE);
9ad5cbcf 3010 if (t->symtab_shndx_hdr.sh_name == (unsigned int) -1)
b34976b6 3011 return FALSE;
9ad5cbcf 3012 }
252b5132 3013 t->strtab_section = section_number++;
2b0f7ef9 3014 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3015 }
3016
1c52a645
L
3017 if (section_number >= SHN_LORESERVE)
3018 {
3019 _bfd_error_handler (_("%B: too many sections: %u"),
3020 abfd, section_number);
3021 return FALSE;
3022 }
3023
2b0f7ef9
JJ
3024 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
3025 t->shstrtab_hdr.sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
9ad5cbcf
AM
3026
3027 elf_numsections (abfd) = section_number;
252b5132
RH
3028 elf_elfheader (abfd)->e_shnum = section_number;
3029
3030 /* Set up the list of section header pointers, in agreement with the
3031 indices. */
a50b1753
NC
3032 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3033 sizeof (Elf_Internal_Shdr *));
252b5132 3034 if (i_shdrp == NULL)
b34976b6 3035 return FALSE;
252b5132 3036
a50b1753
NC
3037 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3038 sizeof (Elf_Internal_Shdr));
252b5132
RH
3039 if (i_shdrp[0] == NULL)
3040 {
3041 bfd_release (abfd, i_shdrp);
b34976b6 3042 return FALSE;
252b5132 3043 }
252b5132
RH
3044
3045 elf_elfsections (abfd) = i_shdrp;
3046
3047 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
3516e984 3048 if (need_symtab)
252b5132
RH
3049 {
3050 i_shdrp[t->symtab_section] = &t->symtab_hdr;
4fbb74a6 3051 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf
AM
3052 {
3053 i_shdrp[t->symtab_shndx_section] = &t->symtab_shndx_hdr;
3054 t->symtab_shndx_hdr.sh_link = t->symtab_section;
3055 }
252b5132
RH
3056 i_shdrp[t->strtab_section] = &t->strtab_hdr;
3057 t->symtab_hdr.sh_link = t->strtab_section;
3058 }
38ce5b11 3059
252b5132
RH
3060 for (sec = abfd->sections; sec; sec = sec->next)
3061 {
252b5132
RH
3062 asection *s;
3063 const char *name;
3064
91d6fa6a
NC
3065 d = elf_section_data (sec);
3066
252b5132 3067 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3068 if (d->rel.idx != 0)
3069 i_shdrp[d->rel.idx] = d->rel.hdr;
3070 if (d->rela.idx != 0)
3071 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3072
3073 /* Fill in the sh_link and sh_info fields while we're at it. */
3074
3075 /* sh_link of a reloc section is the section index of the symbol
3076 table. sh_info is the section index of the section to which
3077 the relocation entries apply. */
d4730f92 3078 if (d->rel.idx != 0)
252b5132 3079 {
d4730f92
BS
3080 d->rel.hdr->sh_link = t->symtab_section;
3081 d->rel.hdr->sh_info = d->this_idx;
252b5132 3082 }
d4730f92 3083 if (d->rela.idx != 0)
23bc299b 3084 {
d4730f92
BS
3085 d->rela.hdr->sh_link = t->symtab_section;
3086 d->rela.hdr->sh_info = d->this_idx;
23bc299b 3087 }
252b5132 3088
38ce5b11
L
3089 /* We need to set up sh_link for SHF_LINK_ORDER. */
3090 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3091 {
3092 s = elf_linked_to_section (sec);
3093 if (s)
38ce5b11 3094 {
f2876037 3095 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3096 if (link_info != NULL)
38ce5b11 3097 {
f2876037 3098 /* Check discarded linkonce section. */
dbaa2011 3099 if (discarded_section (s))
38ce5b11 3100 {
ccd2ec6a
L
3101 asection *kept;
3102 (*_bfd_error_handler)
3103 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3104 abfd, d->this_hdr.bfd_section,
3105 s, s->owner);
3106 /* Point to the kept section if it has the same
3107 size as the discarded one. */
c0f00686 3108 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3109 if (kept == NULL)
185d09ad 3110 {
ccd2ec6a
L
3111 bfd_set_error (bfd_error_bad_value);
3112 return FALSE;
185d09ad 3113 }
ccd2ec6a 3114 s = kept;
38ce5b11 3115 }
e424ecc8 3116
ccd2ec6a
L
3117 s = s->output_section;
3118 BFD_ASSERT (s != NULL);
38ce5b11 3119 }
f2876037
L
3120 else
3121 {
3122 /* Handle objcopy. */
3123 if (s->output_section == NULL)
3124 {
3125 (*_bfd_error_handler)
3126 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3127 abfd, d->this_hdr.bfd_section, s, s->owner);
3128 bfd_set_error (bfd_error_bad_value);
3129 return FALSE;
3130 }
3131 s = s->output_section;
3132 }
ccd2ec6a
L
3133 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3134 }
3135 else
3136 {
3137 /* PR 290:
3138 The Intel C compiler generates SHT_IA_64_UNWIND with
3139 SHF_LINK_ORDER. But it doesn't set the sh_link or
3140 sh_info fields. Hence we could get the situation
08a40648 3141 where s is NULL. */
ccd2ec6a
L
3142 const struct elf_backend_data *bed
3143 = get_elf_backend_data (abfd);
3144 if (bed->link_order_error_handler)
3145 bed->link_order_error_handler
3146 (_("%B: warning: sh_link not set for section `%A'"),
3147 abfd, sec);
38ce5b11
L
3148 }
3149 }
3150
252b5132
RH
3151 switch (d->this_hdr.sh_type)
3152 {
3153 case SHT_REL:
3154 case SHT_RELA:
3155 /* A reloc section which we are treating as a normal BFD
3156 section. sh_link is the section index of the symbol
3157 table. sh_info is the section index of the section to
3158 which the relocation entries apply. We assume that an
3159 allocated reloc section uses the dynamic symbol table.
3160 FIXME: How can we be sure? */
3161 s = bfd_get_section_by_name (abfd, ".dynsym");
3162 if (s != NULL)
3163 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3164
3165 /* We look up the section the relocs apply to by name. */
3166 name = sec->name;
3167 if (d->this_hdr.sh_type == SHT_REL)
3168 name += 4;
3169 else
3170 name += 5;
3171 s = bfd_get_section_by_name (abfd, name);
3172 if (s != NULL)
3173 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3174 break;
3175
3176 case SHT_STRTAB:
3177 /* We assume that a section named .stab*str is a stabs
3178 string section. We look for a section with the same name
3179 but without the trailing ``str'', and set its sh_link
3180 field to point to this section. */
0112cd26 3181 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3182 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3183 {
3184 size_t len;
3185 char *alc;
3186
3187 len = strlen (sec->name);
a50b1753 3188 alc = (char *) bfd_malloc (len - 2);
252b5132 3189 if (alc == NULL)
b34976b6 3190 return FALSE;
d4c88bbb 3191 memcpy (alc, sec->name, len - 3);
252b5132
RH
3192 alc[len - 3] = '\0';
3193 s = bfd_get_section_by_name (abfd, alc);
3194 free (alc);
3195 if (s != NULL)
3196 {
3197 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3198
3199 /* This is a .stab section. */
0594c12d
AM
3200 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3201 elf_section_data (s)->this_hdr.sh_entsize
3202 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3203 }
3204 }
3205 break;
3206
3207 case SHT_DYNAMIC:
3208 case SHT_DYNSYM:
3209 case SHT_GNU_verneed:
3210 case SHT_GNU_verdef:
3211 /* sh_link is the section header index of the string table
3212 used for the dynamic entries, or the symbol table, or the
3213 version strings. */
3214 s = bfd_get_section_by_name (abfd, ".dynstr");
3215 if (s != NULL)
3216 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3217 break;
3218
7f1204bb
JJ
3219 case SHT_GNU_LIBLIST:
3220 /* sh_link is the section header index of the prelink library
08a40648
AM
3221 list used for the dynamic entries, or the symbol table, or
3222 the version strings. */
7f1204bb
JJ
3223 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3224 ? ".dynstr" : ".gnu.libstr");
3225 if (s != NULL)
3226 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3227 break;
3228
252b5132 3229 case SHT_HASH:
fdc90cb4 3230 case SHT_GNU_HASH:
252b5132
RH
3231 case SHT_GNU_versym:
3232 /* sh_link is the section header index of the symbol table
3233 this hash table or version table is for. */
3234 s = bfd_get_section_by_name (abfd, ".dynsym");
3235 if (s != NULL)
3236 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3237 break;
dbb410c3
AM
3238
3239 case SHT_GROUP:
3240 d->this_hdr.sh_link = t->symtab_section;
252b5132
RH
3241 }
3242 }
3243
2b0f7ef9 3244 for (secn = 1; secn < section_number; ++secn)
9ad5cbcf
AM
3245 if (i_shdrp[secn] == NULL)
3246 i_shdrp[secn] = i_shdrp[0];
3247 else
3248 i_shdrp[secn]->sh_name = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
3249 i_shdrp[secn]->sh_name);
b34976b6 3250 return TRUE;
252b5132
RH
3251}
3252
5372391b 3253static bfd_boolean
217aa764 3254sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3255{
3256 /* If the backend has a special mapping, use it. */
9c5bfbb7 3257 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3258 if (bed->elf_backend_sym_is_global)
3259 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3260
e47bf690 3261 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3262 || bfd_is_und_section (bfd_get_section (sym))
3263 || bfd_is_com_section (bfd_get_section (sym)));
3264}
3265
5372391b 3266/* Don't output section symbols for sections that are not going to be
c6d8cab4 3267 output, that are duplicates or there is no BFD section. */
5372391b
AM
3268
3269static bfd_boolean
3270ignore_section_sym (bfd *abfd, asymbol *sym)
3271{
c6d8cab4
L
3272 elf_symbol_type *type_ptr;
3273
3274 if ((sym->flags & BSF_SECTION_SYM) == 0)
3275 return FALSE;
3276
3277 type_ptr = elf_symbol_from (abfd, sym);
3278 return ((type_ptr != NULL
3279 && type_ptr->internal_elf_sym.st_shndx != 0
3280 && bfd_is_abs_section (sym->section))
3281 || !(sym->section->owner == abfd
0f0a5e58 3282 || (sym->section->output_section->owner == abfd
2633a79c
AM
3283 && sym->section->output_offset == 0)
3284 || bfd_is_abs_section (sym->section)));
5372391b
AM
3285}
3286
2633a79c
AM
3287/* Map symbol from it's internal number to the external number, moving
3288 all local symbols to be at the head of the list. */
3289
b34976b6 3290static bfd_boolean
217aa764 3291elf_map_symbols (bfd *abfd)
252b5132 3292{
dc810e39 3293 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3294 asymbol **syms = bfd_get_outsymbols (abfd);
3295 asymbol **sect_syms;
dc810e39
AM
3296 unsigned int num_locals = 0;
3297 unsigned int num_globals = 0;
3298 unsigned int num_locals2 = 0;
3299 unsigned int num_globals2 = 0;
252b5132 3300 int max_index = 0;
dc810e39 3301 unsigned int idx;
252b5132
RH
3302 asection *asect;
3303 asymbol **new_syms;
252b5132
RH
3304
3305#ifdef DEBUG
3306 fprintf (stderr, "elf_map_symbols\n");
3307 fflush (stderr);
3308#endif
3309
252b5132
RH
3310 for (asect = abfd->sections; asect; asect = asect->next)
3311 {
3312 if (max_index < asect->index)
3313 max_index = asect->index;
3314 }
3315
3316 max_index++;
a50b1753 3317 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 3318 if (sect_syms == NULL)
b34976b6 3319 return FALSE;
252b5132 3320 elf_section_syms (abfd) = sect_syms;
4e89ac30 3321 elf_num_section_syms (abfd) = max_index;
252b5132 3322
079e9a2f
AM
3323 /* Init sect_syms entries for any section symbols we have already
3324 decided to output. */
252b5132
RH
3325 for (idx = 0; idx < symcount; idx++)
3326 {
dc810e39 3327 asymbol *sym = syms[idx];
c044fabd 3328
252b5132 3329 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 3330 && sym->value == 0
2633a79c
AM
3331 && !ignore_section_sym (abfd, sym)
3332 && !bfd_is_abs_section (sym->section))
252b5132 3333 {
5372391b 3334 asection *sec = sym->section;
252b5132 3335
5372391b
AM
3336 if (sec->owner != abfd)
3337 sec = sec->output_section;
252b5132 3338
5372391b 3339 sect_syms[sec->index] = syms[idx];
252b5132
RH
3340 }
3341 }
3342
252b5132
RH
3343 /* Classify all of the symbols. */
3344 for (idx = 0; idx < symcount; idx++)
3345 {
2633a79c 3346 if (sym_is_global (abfd, syms[idx]))
252b5132 3347 num_globals++;
2633a79c
AM
3348 else if (!ignore_section_sym (abfd, syms[idx]))
3349 num_locals++;
252b5132 3350 }
079e9a2f 3351
5372391b 3352 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
3353 sections will already have a section symbol in outsymbols, but
3354 eg. SHT_GROUP sections will not, and we need the section symbol mapped
3355 at least in that case. */
252b5132
RH
3356 for (asect = abfd->sections; asect; asect = asect->next)
3357 {
079e9a2f 3358 if (sect_syms[asect->index] == NULL)
252b5132 3359 {
079e9a2f 3360 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
3361 num_locals++;
3362 else
3363 num_globals++;
252b5132
RH
3364 }
3365 }
3366
3367 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
3368 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
3369 sizeof (asymbol *));
dc810e39 3370
252b5132 3371 if (new_syms == NULL)
b34976b6 3372 return FALSE;
252b5132
RH
3373
3374 for (idx = 0; idx < symcount; idx++)
3375 {
3376 asymbol *sym = syms[idx];
dc810e39 3377 unsigned int i;
252b5132 3378
2633a79c
AM
3379 if (sym_is_global (abfd, sym))
3380 i = num_locals + num_globals2++;
3381 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
3382 i = num_locals2++;
3383 else
2633a79c 3384 continue;
252b5132
RH
3385 new_syms[i] = sym;
3386 sym->udata.i = i + 1;
3387 }
3388 for (asect = abfd->sections; asect; asect = asect->next)
3389 {
079e9a2f 3390 if (sect_syms[asect->index] == NULL)
252b5132 3391 {
079e9a2f 3392 asymbol *sym = asect->symbol;
dc810e39 3393 unsigned int i;
252b5132 3394
079e9a2f 3395 sect_syms[asect->index] = sym;
252b5132
RH
3396 if (!sym_is_global (abfd, sym))
3397 i = num_locals2++;
3398 else
3399 i = num_locals + num_globals2++;
3400 new_syms[i] = sym;
3401 sym->udata.i = i + 1;
3402 }
3403 }
3404
3405 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
3406
3407 elf_num_locals (abfd) = num_locals;
3408 elf_num_globals (abfd) = num_globals;
b34976b6 3409 return TRUE;
252b5132
RH
3410}
3411
3412/* Align to the maximum file alignment that could be required for any
3413 ELF data structure. */
3414
268b6b39 3415static inline file_ptr
217aa764 3416align_file_position (file_ptr off, int align)
252b5132
RH
3417{
3418 return (off + align - 1) & ~(align - 1);
3419}
3420
3421/* Assign a file position to a section, optionally aligning to the
3422 required section alignment. */
3423
217aa764
AM
3424file_ptr
3425_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
3426 file_ptr offset,
3427 bfd_boolean align)
252b5132 3428{
72de5009
AM
3429 if (align && i_shdrp->sh_addralign > 1)
3430 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
3431 i_shdrp->sh_offset = offset;
3432 if (i_shdrp->bfd_section != NULL)
3433 i_shdrp->bfd_section->filepos = offset;
3434 if (i_shdrp->sh_type != SHT_NOBITS)
3435 offset += i_shdrp->sh_size;
3436 return offset;
3437}
3438
3439/* Compute the file positions we are going to put the sections at, and
3440 otherwise prepare to begin writing out the ELF file. If LINK_INFO
3441 is not NULL, this is being called by the ELF backend linker. */
3442
b34976b6 3443bfd_boolean
217aa764
AM
3444_bfd_elf_compute_section_file_positions (bfd *abfd,
3445 struct bfd_link_info *link_info)
252b5132 3446{
9c5bfbb7 3447 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3448 struct fake_section_arg fsargs;
b34976b6 3449 bfd_boolean failed;
4b6c0f2f 3450 struct bfd_strtab_hash *strtab = NULL;
252b5132 3451 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 3452 bfd_boolean need_symtab;
252b5132
RH
3453
3454 if (abfd->output_has_begun)
b34976b6 3455 return TRUE;
252b5132
RH
3456
3457 /* Do any elf backend specific processing first. */
3458 if (bed->elf_backend_begin_write_processing)
3459 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
3460
3461 if (! prep_headers (abfd))
b34976b6 3462 return FALSE;
252b5132 3463
e6c51ed4
NC
3464 /* Post process the headers if necessary. */
3465 if (bed->elf_backend_post_process_headers)
3466 (*bed->elf_backend_post_process_headers) (abfd, link_info);
3467
d4730f92
BS
3468 fsargs.failed = FALSE;
3469 fsargs.link_info = link_info;
3470 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
3471 if (fsargs.failed)
b34976b6 3472 return FALSE;
252b5132 3473
da9f89d4 3474 if (!assign_section_numbers (abfd, link_info))
b34976b6 3475 return FALSE;
252b5132
RH
3476
3477 /* The backend linker builds symbol table information itself. */
3516e984
L
3478 need_symtab = (link_info == NULL
3479 && (bfd_get_symcount (abfd) > 0
3480 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3481 == HAS_RELOC)));
3482 if (need_symtab)
252b5132
RH
3483 {
3484 /* Non-zero if doing a relocatable link. */
3485 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
3486
3487 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 3488 return FALSE;
252b5132
RH
3489 }
3490
d4730f92 3491 failed = FALSE;
1126897b 3492 if (link_info == NULL)
dbb410c3 3493 {
1126897b 3494 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 3495 if (failed)
b34976b6 3496 return FALSE;
dbb410c3
AM
3497 }
3498
252b5132
RH
3499 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
3500 /* sh_name was set in prep_headers. */
3501 shstrtab_hdr->sh_type = SHT_STRTAB;
3502 shstrtab_hdr->sh_flags = 0;
3503 shstrtab_hdr->sh_addr = 0;
2b0f7ef9 3504 shstrtab_hdr->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
252b5132
RH
3505 shstrtab_hdr->sh_entsize = 0;
3506 shstrtab_hdr->sh_link = 0;
3507 shstrtab_hdr->sh_info = 0;
3508 /* sh_offset is set in assign_file_positions_except_relocs. */
3509 shstrtab_hdr->sh_addralign = 1;
3510
c84fca4d 3511 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 3512 return FALSE;
252b5132 3513
3516e984 3514 if (need_symtab)
252b5132
RH
3515 {
3516 file_ptr off;
3517 Elf_Internal_Shdr *hdr;
3518
3519 off = elf_tdata (abfd)->next_file_pos;
3520
3521 hdr = &elf_tdata (abfd)->symtab_hdr;
b34976b6 3522 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 3523
9ad5cbcf
AM
3524 hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
3525 if (hdr->sh_size != 0)
b34976b6 3526 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
9ad5cbcf 3527
252b5132 3528 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 3529 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
3530
3531 elf_tdata (abfd)->next_file_pos = off;
3532
3533 /* Now that we know where the .strtab section goes, write it
08a40648 3534 out. */
252b5132
RH
3535 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
3536 || ! _bfd_stringtab_emit (abfd, strtab))
b34976b6 3537 return FALSE;
252b5132
RH
3538 _bfd_stringtab_free (strtab);
3539 }
3540
b34976b6 3541 abfd->output_has_begun = TRUE;
252b5132 3542
b34976b6 3543 return TRUE;
252b5132
RH
3544}
3545
8ded5a0f
AM
3546/* Make an initial estimate of the size of the program header. If we
3547 get the number wrong here, we'll redo section placement. */
3548
3549static bfd_size_type
3550get_program_header_size (bfd *abfd, struct bfd_link_info *info)
3551{
3552 size_t segs;
3553 asection *s;
2b05f1b7 3554 const struct elf_backend_data *bed;
8ded5a0f
AM
3555
3556 /* Assume we will need exactly two PT_LOAD segments: one for text
3557 and one for data. */
3558 segs = 2;
3559
3560 s = bfd_get_section_by_name (abfd, ".interp");
3561 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3562 {
3563 /* If we have a loadable interpreter section, we need a
3564 PT_INTERP segment. In this case, assume we also need a
3565 PT_PHDR segment, although that may not be true for all
3566 targets. */
3567 segs += 2;
3568 }
3569
3570 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
3571 {
3572 /* We need a PT_DYNAMIC segment. */
3573 ++segs;
f210dcff 3574 }
08a40648 3575
ceae84aa 3576 if (info != NULL && info->relro)
f210dcff
L
3577 {
3578 /* We need a PT_GNU_RELRO segment. */
3579 ++segs;
8ded5a0f
AM
3580 }
3581
3582 if (elf_tdata (abfd)->eh_frame_hdr)
3583 {
3584 /* We need a PT_GNU_EH_FRAME segment. */
3585 ++segs;
3586 }
3587
2b05f1b7 3588 if (elf_tdata (abfd)->stack_flags)
8ded5a0f 3589 {
2b05f1b7
L
3590 /* We need a PT_GNU_STACK segment. */
3591 ++segs;
3592 }
94b11780 3593
2b05f1b7
L
3594 for (s = abfd->sections; s != NULL; s = s->next)
3595 {
8ded5a0f 3596 if ((s->flags & SEC_LOAD) != 0
0112cd26 3597 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
3598 {
3599 /* We need a PT_NOTE segment. */
3600 ++segs;
1c5265b5
JJ
3601 /* Try to create just one PT_NOTE segment
3602 for all adjacent loadable .note* sections.
3603 gABI requires that within a PT_NOTE segment
3604 (and also inside of each SHT_NOTE section)
3605 each note is padded to a multiple of 4 size,
3606 so we check whether the sections are correctly
3607 aligned. */
3608 if (s->alignment_power == 2)
3609 while (s->next != NULL
3610 && s->next->alignment_power == 2
3611 && (s->next->flags & SEC_LOAD) != 0
3612 && CONST_STRNEQ (s->next->name, ".note"))
3613 s = s->next;
8ded5a0f
AM
3614 }
3615 }
3616
3617 for (s = abfd->sections; s != NULL; s = s->next)
3618 {
3619 if (s->flags & SEC_THREAD_LOCAL)
3620 {
3621 /* We need a PT_TLS segment. */
3622 ++segs;
3623 break;
3624 }
3625 }
3626
3627 /* Let the backend count up any program headers it might need. */
2b05f1b7 3628 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
3629 if (bed->elf_backend_additional_program_headers)
3630 {
3631 int a;
3632
3633 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
3634 if (a == -1)
3635 abort ();
3636 segs += a;
3637 }
3638
3639 return segs * bed->s->sizeof_phdr;
3640}
3641
2ea37f1c
NC
3642/* Find the segment that contains the output_section of section. */
3643
3644Elf_Internal_Phdr *
3645_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
3646{
3647 struct elf_segment_map *m;
3648 Elf_Internal_Phdr *p;
3649
3650 for (m = elf_tdata (abfd)->segment_map,
3651 p = elf_tdata (abfd)->phdr;
3652 m != NULL;
3653 m = m->next, p++)
3654 {
3655 int i;
3656
3657 for (i = m->count - 1; i >= 0; i--)
3658 if (m->sections[i] == section)
3659 return p;
3660 }
3661
3662 return NULL;
3663}
3664
252b5132
RH
3665/* Create a mapping from a set of sections to a program segment. */
3666
217aa764
AM
3667static struct elf_segment_map *
3668make_mapping (bfd *abfd,
3669 asection **sections,
3670 unsigned int from,
3671 unsigned int to,
3672 bfd_boolean phdr)
252b5132
RH
3673{
3674 struct elf_segment_map *m;
3675 unsigned int i;
3676 asection **hdrpp;
dc810e39 3677 bfd_size_type amt;
252b5132 3678
dc810e39
AM
3679 amt = sizeof (struct elf_segment_map);
3680 amt += (to - from - 1) * sizeof (asection *);
a50b1753 3681 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
3682 if (m == NULL)
3683 return NULL;
3684 m->next = NULL;
3685 m->p_type = PT_LOAD;
3686 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
3687 m->sections[i - from] = *hdrpp;
3688 m->count = to - from;
3689
3690 if (from == 0 && phdr)
3691 {
3692 /* Include the headers in the first PT_LOAD segment. */
3693 m->includes_filehdr = 1;
3694 m->includes_phdrs = 1;
3695 }
3696
3697 return m;
3698}
3699
229fcec5
MM
3700/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
3701 on failure. */
3702
3703struct elf_segment_map *
3704_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
3705{
3706 struct elf_segment_map *m;
3707
a50b1753
NC
3708 m = (struct elf_segment_map *) bfd_zalloc (abfd,
3709 sizeof (struct elf_segment_map));
229fcec5
MM
3710 if (m == NULL)
3711 return NULL;
3712 m->next = NULL;
3713 m->p_type = PT_DYNAMIC;
3714 m->count = 1;
3715 m->sections[0] = dynsec;
08a40648 3716
229fcec5
MM
3717 return m;
3718}
3719
8ded5a0f 3720/* Possibly add or remove segments from the segment map. */
252b5132 3721
b34976b6 3722static bfd_boolean
3dea8fca
AM
3723elf_modify_segment_map (bfd *abfd,
3724 struct bfd_link_info *info,
3725 bfd_boolean remove_empty_load)
252b5132 3726{
252e386e 3727 struct elf_segment_map **m;
8ded5a0f 3728 const struct elf_backend_data *bed;
252b5132 3729
8ded5a0f
AM
3730 /* The placement algorithm assumes that non allocated sections are
3731 not in PT_LOAD segments. We ensure this here by removing such
3732 sections from the segment map. We also remove excluded
252e386e
AM
3733 sections. Finally, any PT_LOAD segment without sections is
3734 removed. */
3735 m = &elf_tdata (abfd)->segment_map;
3736 while (*m)
8ded5a0f
AM
3737 {
3738 unsigned int i, new_count;
252b5132 3739
252e386e 3740 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 3741 {
252e386e
AM
3742 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
3743 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
3744 || (*m)->p_type != PT_LOAD))
8ded5a0f 3745 {
252e386e
AM
3746 (*m)->sections[new_count] = (*m)->sections[i];
3747 new_count++;
8ded5a0f
AM
3748 }
3749 }
252e386e 3750 (*m)->count = new_count;
252b5132 3751
3dea8fca 3752 if (remove_empty_load && (*m)->p_type == PT_LOAD && (*m)->count == 0)
252e386e
AM
3753 *m = (*m)->next;
3754 else
3755 m = &(*m)->next;
8ded5a0f 3756 }
252b5132 3757
8ded5a0f
AM
3758 bed = get_elf_backend_data (abfd);
3759 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 3760 {
252e386e 3761 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 3762 return FALSE;
252b5132 3763 }
252b5132 3764
8ded5a0f
AM
3765 return TRUE;
3766}
252b5132 3767
8ded5a0f 3768/* Set up a mapping from BFD sections to program segments. */
252b5132 3769
8ded5a0f
AM
3770bfd_boolean
3771_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
3772{
3773 unsigned int count;
3774 struct elf_segment_map *m;
3775 asection **sections = NULL;
3776 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 3777 bfd_boolean no_user_phdrs;
252b5132 3778
3dea8fca 3779 no_user_phdrs = elf_tdata (abfd)->segment_map == NULL;
d324f6d6
RM
3780
3781 if (info != NULL)
3782 info->user_phdrs = !no_user_phdrs;
3783
3dea8fca 3784 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 3785 {
8ded5a0f
AM
3786 asection *s;
3787 unsigned int i;
3788 struct elf_segment_map *mfirst;
3789 struct elf_segment_map **pm;
3790 asection *last_hdr;
3791 bfd_vma last_size;
3792 unsigned int phdr_index;
3793 bfd_vma maxpagesize;
3794 asection **hdrpp;
3795 bfd_boolean phdr_in_segment = TRUE;
3796 bfd_boolean writable;
3797 int tls_count = 0;
3798 asection *first_tls = NULL;
3799 asection *dynsec, *eh_frame_hdr;
3800 bfd_size_type amt;
8d06853e 3801 bfd_vma addr_mask, wrap_to = 0;
252b5132 3802
8ded5a0f 3803 /* Select the allocated sections, and sort them. */
252b5132 3804
a50b1753
NC
3805 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
3806 sizeof (asection *));
8ded5a0f 3807 if (sections == NULL)
252b5132 3808 goto error_return;
252b5132 3809
8d06853e
AM
3810 /* Calculate top address, avoiding undefined behaviour of shift
3811 left operator when shift count is equal to size of type
3812 being shifted. */
3813 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
3814 addr_mask = (addr_mask << 1) + 1;
3815
8ded5a0f
AM
3816 i = 0;
3817 for (s = abfd->sections; s != NULL; s = s->next)
3818 {
3819 if ((s->flags & SEC_ALLOC) != 0)
3820 {
3821 sections[i] = s;
3822 ++i;
8d06853e
AM
3823 /* A wrapping section potentially clashes with header. */
3824 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
3825 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
3826 }
3827 }
3828 BFD_ASSERT (i <= bfd_count_sections (abfd));
3829 count = i;
252b5132 3830
8ded5a0f 3831 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 3832
8ded5a0f 3833 /* Build the mapping. */
252b5132 3834
8ded5a0f
AM
3835 mfirst = NULL;
3836 pm = &mfirst;
252b5132 3837
8ded5a0f
AM
3838 /* If we have a .interp section, then create a PT_PHDR segment for
3839 the program headers and a PT_INTERP segment for the .interp
3840 section. */
3841 s = bfd_get_section_by_name (abfd, ".interp");
3842 if (s != NULL && (s->flags & SEC_LOAD) != 0)
3843 {
3844 amt = sizeof (struct elf_segment_map);
a50b1753 3845 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3846 if (m == NULL)
3847 goto error_return;
3848 m->next = NULL;
3849 m->p_type = PT_PHDR;
3850 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
3851 m->p_flags = PF_R | PF_X;
3852 m->p_flags_valid = 1;
3853 m->includes_phdrs = 1;
252b5132 3854
8ded5a0f
AM
3855 *pm = m;
3856 pm = &m->next;
252b5132 3857
8ded5a0f 3858 amt = sizeof (struct elf_segment_map);
a50b1753 3859 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
3860 if (m == NULL)
3861 goto error_return;
3862 m->next = NULL;
3863 m->p_type = PT_INTERP;
3864 m->count = 1;
3865 m->sections[0] = s;
3866
3867 *pm = m;
3868 pm = &m->next;
252b5132 3869 }
8ded5a0f
AM
3870
3871 /* Look through the sections. We put sections in the same program
3872 segment when the start of the second section can be placed within
3873 a few bytes of the end of the first section. */
3874 last_hdr = NULL;
3875 last_size = 0;
3876 phdr_index = 0;
3877 maxpagesize = bed->maxpagesize;
3878 writable = FALSE;
3879 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
3880 if (dynsec != NULL
3881 && (dynsec->flags & SEC_LOAD) == 0)
3882 dynsec = NULL;
3883
3884 /* Deal with -Ttext or something similar such that the first section
3885 is not adjacent to the program headers. This is an
3886 approximation, since at this point we don't know exactly how many
3887 program headers we will need. */
3888 if (count > 0)
252b5132 3889 {
8ded5a0f
AM
3890 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
3891
62d7a5f6 3892 if (phdr_size == (bfd_size_type) -1)
8ded5a0f
AM
3893 phdr_size = get_program_header_size (abfd, info);
3894 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
3895 || (sections[0]->lma & addr_mask) < phdr_size
3896 || ((sections[0]->lma & addr_mask) % maxpagesize
3897 < phdr_size % maxpagesize)
3898 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
8ded5a0f 3899 phdr_in_segment = FALSE;
252b5132
RH
3900 }
3901
8ded5a0f 3902 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 3903 {
8ded5a0f
AM
3904 asection *hdr;
3905 bfd_boolean new_segment;
3906
3907 hdr = *hdrpp;
3908
3909 /* See if this section and the last one will fit in the same
3910 segment. */
3911
3912 if (last_hdr == NULL)
3913 {
3914 /* If we don't have a segment yet, then we don't need a new
3915 one (we build the last one after this loop). */
3916 new_segment = FALSE;
3917 }
3918 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
3919 {
3920 /* If this section has a different relation between the
3921 virtual address and the load address, then we need a new
3922 segment. */
3923 new_segment = TRUE;
3924 }
b5599592
AM
3925 else if (hdr->lma < last_hdr->lma + last_size
3926 || last_hdr->lma + last_size < last_hdr->lma)
3927 {
3928 /* If this section has a load address that makes it overlap
3929 the previous section, then we need a new segment. */
3930 new_segment = TRUE;
3931 }
39948a60
NC
3932 /* In the next test we have to be careful when last_hdr->lma is close
3933 to the end of the address space. If the aligned address wraps
3934 around to the start of the address space, then there are no more
3935 pages left in memory and it is OK to assume that the current
3936 section can be included in the current segment. */
3937 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
3938 > last_hdr->lma)
3939 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 3940 <= hdr->lma))
8ded5a0f
AM
3941 {
3942 /* If putting this section in this segment would force us to
3943 skip a page in the segment, then we need a new segment. */
3944 new_segment = TRUE;
3945 }
3946 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
3947 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
3948 {
3949 /* We don't want to put a loadable section after a
3950 nonloadable section in the same segment.
3951 Consider .tbss sections as loadable for this purpose. */
3952 new_segment = TRUE;
3953 }
3954 else if ((abfd->flags & D_PAGED) == 0)
3955 {
3956 /* If the file is not demand paged, which means that we
3957 don't require the sections to be correctly aligned in the
3958 file, then there is no other reason for a new segment. */
3959 new_segment = FALSE;
3960 }
3961 else if (! writable
3962 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
3963 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
3964 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
3965 {
3966 /* We don't want to put a writable section in a read only
3967 segment, unless they are on the same page in memory
3968 anyhow. We already know that the last section does not
3969 bring us past the current section on the page, so the
3970 only case in which the new section is not on the same
3971 page as the previous section is when the previous section
3972 ends precisely on a page boundary. */
3973 new_segment = TRUE;
3974 }
3975 else
3976 {
3977 /* Otherwise, we can use the same segment. */
3978 new_segment = FALSE;
3979 }
3980
2889e75b 3981 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
3982 if (last_hdr != NULL
3983 && info != NULL
3984 && info->callbacks->override_segment_assignment != NULL)
3985 new_segment
3986 = info->callbacks->override_segment_assignment (info, abfd, hdr,
3987 last_hdr,
3988 new_segment);
2889e75b 3989
8ded5a0f
AM
3990 if (! new_segment)
3991 {
3992 if ((hdr->flags & SEC_READONLY) == 0)
3993 writable = TRUE;
3994 last_hdr = hdr;
3995 /* .tbss sections effectively have zero size. */
3996 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3997 != SEC_THREAD_LOCAL)
3998 last_size = hdr->size;
3999 else
4000 last_size = 0;
4001 continue;
4002 }
4003
4004 /* We need a new program segment. We must create a new program
4005 header holding all the sections from phdr_index until hdr. */
4006
4007 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4008 if (m == NULL)
4009 goto error_return;
4010
4011 *pm = m;
4012 pm = &m->next;
4013
252b5132 4014 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4015 writable = TRUE;
8ded5a0f
AM
4016 else
4017 writable = FALSE;
4018
baaff79e
JJ
4019 last_hdr = hdr;
4020 /* .tbss sections effectively have zero size. */
e5caec89 4021 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4022 last_size = hdr->size;
baaff79e
JJ
4023 else
4024 last_size = 0;
8ded5a0f
AM
4025 phdr_index = i;
4026 phdr_in_segment = FALSE;
252b5132
RH
4027 }
4028
86b2281f
AM
4029 /* Create a final PT_LOAD program segment, but not if it's just
4030 for .tbss. */
4031 if (last_hdr != NULL
4032 && (i - phdr_index != 1
4033 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4034 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4035 {
4036 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4037 if (m == NULL)
4038 goto error_return;
252b5132 4039
8ded5a0f
AM
4040 *pm = m;
4041 pm = &m->next;
4042 }
252b5132 4043
8ded5a0f
AM
4044 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4045 if (dynsec != NULL)
4046 {
4047 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4048 if (m == NULL)
4049 goto error_return;
4050 *pm = m;
4051 pm = &m->next;
4052 }
252b5132 4053
1c5265b5
JJ
4054 /* For each batch of consecutive loadable .note sections,
4055 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4056 because if we link together nonloadable .note sections and
4057 loadable .note sections, we will generate two .note sections
4058 in the output file. FIXME: Using names for section types is
4059 bogus anyhow. */
8ded5a0f
AM
4060 for (s = abfd->sections; s != NULL; s = s->next)
4061 {
4062 if ((s->flags & SEC_LOAD) != 0
0112cd26 4063 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4064 {
1c5265b5 4065 asection *s2;
91d6fa6a
NC
4066
4067 count = 1;
8ded5a0f 4068 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4069 if (s->alignment_power == 2)
4070 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4071 {
4072 if (s2->next->alignment_power == 2
4073 && (s2->next->flags & SEC_LOAD) != 0
4074 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4075 && align_power (s2->lma + s2->size, 2)
4076 == s2->next->lma)
55b581a6
JJ
4077 count++;
4078 else
4079 break;
4080 }
1c5265b5 4081 amt += (count - 1) * sizeof (asection *);
a50b1753 4082 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4083 if (m == NULL)
4084 goto error_return;
4085 m->next = NULL;
4086 m->p_type = PT_NOTE;
1c5265b5
JJ
4087 m->count = count;
4088 while (count > 1)
4089 {
4090 m->sections[m->count - count--] = s;
4091 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4092 s = s->next;
4093 }
4094 m->sections[m->count - 1] = s;
4095 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4096 *pm = m;
4097 pm = &m->next;
4098 }
4099 if (s->flags & SEC_THREAD_LOCAL)
4100 {
4101 if (! tls_count)
4102 first_tls = s;
4103 tls_count++;
4104 }
4105 }
252b5132 4106
8ded5a0f
AM
4107 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4108 if (tls_count > 0)
4109 {
8ded5a0f
AM
4110 amt = sizeof (struct elf_segment_map);
4111 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4112 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4113 if (m == NULL)
4114 goto error_return;
4115 m->next = NULL;
4116 m->p_type = PT_TLS;
4117 m->count = tls_count;
4118 /* Mandated PF_R. */
4119 m->p_flags = PF_R;
4120 m->p_flags_valid = 1;
91d6fa6a 4121 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f
AM
4122 {
4123 BFD_ASSERT (first_tls->flags & SEC_THREAD_LOCAL);
4124 m->sections[i] = first_tls;
4125 first_tls = first_tls->next;
4126 }
252b5132 4127
8ded5a0f
AM
4128 *pm = m;
4129 pm = &m->next;
4130 }
252b5132 4131
8ded5a0f
AM
4132 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4133 segment. */
4134 eh_frame_hdr = elf_tdata (abfd)->eh_frame_hdr;
4135 if (eh_frame_hdr != NULL
4136 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4137 {
dc810e39 4138 amt = sizeof (struct elf_segment_map);
a50b1753 4139 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4140 if (m == NULL)
4141 goto error_return;
4142 m->next = NULL;
8ded5a0f 4143 m->p_type = PT_GNU_EH_FRAME;
252b5132 4144 m->count = 1;
8ded5a0f 4145 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4146
4147 *pm = m;
4148 pm = &m->next;
4149 }
13ae64f3 4150
8ded5a0f 4151 if (elf_tdata (abfd)->stack_flags)
13ae64f3 4152 {
8ded5a0f 4153 amt = sizeof (struct elf_segment_map);
a50b1753 4154 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4155 if (m == NULL)
4156 goto error_return;
4157 m->next = NULL;
2b05f1b7 4158 m->p_type = PT_GNU_STACK;
8ded5a0f
AM
4159 m->p_flags = elf_tdata (abfd)->stack_flags;
4160 m->p_flags_valid = 1;
252b5132 4161
8ded5a0f
AM
4162 *pm = m;
4163 pm = &m->next;
4164 }
65765700 4165
ceae84aa 4166 if (info != NULL && info->relro)
8ded5a0f 4167 {
f210dcff
L
4168 for (m = mfirst; m != NULL; m = m->next)
4169 {
3832a4d8
AM
4170 if (m->p_type == PT_LOAD
4171 && m->count != 0
4172 && m->sections[0]->vma >= info->relro_start
4173 && m->sections[0]->vma < info->relro_end)
f210dcff 4174 {
3832a4d8
AM
4175 i = m->count;
4176 while (--i != (unsigned) -1)
4177 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
4178 == (SEC_LOAD | SEC_HAS_CONTENTS))
4179 break;
4180
4181 if (i == (unsigned) -1)
4182 continue;
65765700 4183
3832a4d8
AM
4184 if (m->sections[i]->vma + m->sections[i]->size
4185 >= info->relro_end)
f210dcff
L
4186 break;
4187 }
be01b344 4188 }
f210dcff
L
4189
4190 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4191 if (m != NULL)
4192 {
4193 amt = sizeof (struct elf_segment_map);
a50b1753 4194 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4195 if (m == NULL)
4196 goto error_return;
4197 m->next = NULL;
4198 m->p_type = PT_GNU_RELRO;
4199 m->p_flags = PF_R;
4200 m->p_flags_valid = 1;
4201
4202 *pm = m;
4203 pm = &m->next;
4204 }
8ded5a0f 4205 }
9ee5e499 4206
8ded5a0f
AM
4207 free (sections);
4208 elf_tdata (abfd)->segment_map = mfirst;
9ee5e499
JJ
4209 }
4210
3dea8fca 4211 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4212 return FALSE;
8c37241b 4213
8ded5a0f
AM
4214 for (count = 0, m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4215 ++count;
4216 elf_tdata (abfd)->program_header_size = count * bed->s->sizeof_phdr;
252b5132 4217
b34976b6 4218 return TRUE;
252b5132
RH
4219
4220 error_return:
4221 if (sections != NULL)
4222 free (sections);
b34976b6 4223 return FALSE;
252b5132
RH
4224}
4225
4226/* Sort sections by address. */
4227
4228static int
217aa764 4229elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4230{
4231 const asection *sec1 = *(const asection **) arg1;
4232 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4233 bfd_size_type size1, size2;
252b5132
RH
4234
4235 /* Sort by LMA first, since this is the address used to
4236 place the section into a segment. */
4237 if (sec1->lma < sec2->lma)
4238 return -1;
4239 else if (sec1->lma > sec2->lma)
4240 return 1;
4241
4242 /* Then sort by VMA. Normally the LMA and the VMA will be
4243 the same, and this will do nothing. */
4244 if (sec1->vma < sec2->vma)
4245 return -1;
4246 else if (sec1->vma > sec2->vma)
4247 return 1;
4248
4249 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4250
07c6e936 4251#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4252
4253 if (TOEND (sec1))
4254 {
4255 if (TOEND (sec2))
00a7cdc5
NC
4256 {
4257 /* If the indicies are the same, do not return 0
4258 here, but continue to try the next comparison. */
4259 if (sec1->target_index - sec2->target_index != 0)
4260 return sec1->target_index - sec2->target_index;
4261 }
252b5132
RH
4262 else
4263 return 1;
4264 }
00a7cdc5 4265 else if (TOEND (sec2))
252b5132
RH
4266 return -1;
4267
4268#undef TOEND
4269
00a7cdc5
NC
4270 /* Sort by size, to put zero sized sections
4271 before others at the same address. */
252b5132 4272
eea6121a
AM
4273 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
4274 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
4275
4276 if (size1 < size2)
252b5132 4277 return -1;
eecdbe52 4278 if (size1 > size2)
252b5132
RH
4279 return 1;
4280
4281 return sec1->target_index - sec2->target_index;
4282}
4283
340b6d91
AC
4284/* Ian Lance Taylor writes:
4285
4286 We shouldn't be using % with a negative signed number. That's just
4287 not good. We have to make sure either that the number is not
4288 negative, or that the number has an unsigned type. When the types
4289 are all the same size they wind up as unsigned. When file_ptr is a
4290 larger signed type, the arithmetic winds up as signed long long,
4291 which is wrong.
4292
4293 What we're trying to say here is something like ``increase OFF by
4294 the least amount that will cause it to be equal to the VMA modulo
4295 the page size.'' */
4296/* In other words, something like:
4297
4298 vma_offset = m->sections[0]->vma % bed->maxpagesize;
4299 off_offset = off % bed->maxpagesize;
4300 if (vma_offset < off_offset)
4301 adjustment = vma_offset + bed->maxpagesize - off_offset;
4302 else
4303 adjustment = vma_offset - off_offset;
08a40648 4304
340b6d91
AC
4305 which can can be collapsed into the expression below. */
4306
4307static file_ptr
4308vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
4309{
4310 return ((vma - off) % maxpagesize);
4311}
4312
6d33f217
L
4313static void
4314print_segment_map (const struct elf_segment_map *m)
4315{
4316 unsigned int j;
4317 const char *pt = get_segment_type (m->p_type);
4318 char buf[32];
4319
4320 if (pt == NULL)
4321 {
4322 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
4323 sprintf (buf, "LOPROC+%7.7x",
4324 (unsigned int) (m->p_type - PT_LOPROC));
4325 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
4326 sprintf (buf, "LOOS+%7.7x",
4327 (unsigned int) (m->p_type - PT_LOOS));
4328 else
4329 snprintf (buf, sizeof (buf), "%8.8x",
4330 (unsigned int) m->p_type);
4331 pt = buf;
4332 }
4a97a0e5 4333 fflush (stdout);
6d33f217
L
4334 fprintf (stderr, "%s:", pt);
4335 for (j = 0; j < m->count; j++)
4336 fprintf (stderr, " %s", m->sections [j]->name);
4337 putc ('\n',stderr);
4a97a0e5 4338 fflush (stderr);
6d33f217
L
4339}
4340
32812159
AM
4341static bfd_boolean
4342write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
4343{
4344 void *buf;
4345 bfd_boolean ret;
4346
4347 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
4348 return FALSE;
4349 buf = bfd_zmalloc (len);
4350 if (buf == NULL)
4351 return FALSE;
4352 ret = bfd_bwrite (buf, len, abfd) == len;
4353 free (buf);
4354 return ret;
4355}
4356
252b5132
RH
4357/* Assign file positions to the sections based on the mapping from
4358 sections to segments. This function also sets up some fields in
f3520d2f 4359 the file header. */
252b5132 4360
b34976b6 4361static bfd_boolean
f3520d2f
AM
4362assign_file_positions_for_load_sections (bfd *abfd,
4363 struct bfd_link_info *link_info)
252b5132
RH
4364{
4365 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 4366 struct elf_segment_map *m;
252b5132 4367 Elf_Internal_Phdr *phdrs;
252b5132 4368 Elf_Internal_Phdr *p;
02bf8d82 4369 file_ptr off;
3f570048 4370 bfd_size_type maxpagesize;
f3520d2f 4371 unsigned int alloc;
0920dee7 4372 unsigned int i, j;
2b0bc088 4373 bfd_vma header_pad = 0;
252b5132 4374
e36284ab 4375 if (link_info == NULL
ceae84aa 4376 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 4377 return FALSE;
252b5132 4378
8ded5a0f 4379 alloc = 0;
252b5132 4380 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2b0bc088
NC
4381 {
4382 ++alloc;
4383 if (m->header_size)
4384 header_pad = m->header_size;
4385 }
252b5132 4386
82f2dbf7
NC
4387 if (alloc)
4388 {
4389 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
4390 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
4391 }
4392 else
4393 {
4394 /* PR binutils/12467. */
4395 elf_elfheader (abfd)->e_phoff = 0;
4396 elf_elfheader (abfd)->e_phentsize = 0;
4397 }
d324f6d6 4398
8ded5a0f 4399 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 4400
62d7a5f6 4401 if (elf_tdata (abfd)->program_header_size == (bfd_size_type) -1)
8ded5a0f
AM
4402 elf_tdata (abfd)->program_header_size = alloc * bed->s->sizeof_phdr;
4403 else
4404 BFD_ASSERT (elf_tdata (abfd)->program_header_size
59e0647f 4405 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
4406
4407 if (alloc == 0)
f3520d2f 4408 {
8ded5a0f
AM
4409 elf_tdata (abfd)->next_file_pos = bed->s->sizeof_ehdr;
4410 return TRUE;
f3520d2f 4411 }
252b5132 4412
57268894
HPN
4413 /* We're writing the size in elf_tdata (abfd)->program_header_size,
4414 see assign_file_positions_except_relocs, so make sure we have
4415 that amount allocated, with trailing space cleared.
4416 The variable alloc contains the computed need, while elf_tdata
4417 (abfd)->program_header_size contains the size used for the
4418 layout.
4419 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
4420 where the layout is forced to according to a larger size in the
4421 last iterations for the testcase ld-elf/header. */
4422 BFD_ASSERT (elf_tdata (abfd)->program_header_size % bed->s->sizeof_phdr
4423 == 0);
a50b1753
NC
4424 phdrs = (Elf_Internal_Phdr *)
4425 bfd_zalloc2 (abfd,
4426 (elf_tdata (abfd)->program_header_size / bed->s->sizeof_phdr),
4427 sizeof (Elf_Internal_Phdr));
f3520d2f 4428 elf_tdata (abfd)->phdr = phdrs;
252b5132 4429 if (phdrs == NULL)
b34976b6 4430 return FALSE;
252b5132 4431
3f570048
AM
4432 maxpagesize = 1;
4433 if ((abfd->flags & D_PAGED) != 0)
4434 maxpagesize = bed->maxpagesize;
4435
252b5132
RH
4436 off = bed->s->sizeof_ehdr;
4437 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4438 if (header_pad < (bfd_vma) off)
4439 header_pad = 0;
4440 else
4441 header_pad -= off;
4442 off += header_pad;
252b5132 4443
0920dee7 4444 for (m = elf_tdata (abfd)->segment_map, p = phdrs, j = 0;
252b5132 4445 m != NULL;
0920dee7 4446 m = m->next, p++, j++)
252b5132 4447 {
252b5132 4448 asection **secpp;
bf988460
AM
4449 bfd_vma off_adjust;
4450 bfd_boolean no_contents;
252b5132
RH
4451
4452 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 4453 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
4454 not be done to the PT_NOTE section of a corefile, which may
4455 contain several pseudo-sections artificially created by bfd.
4456 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
4457 if (m->count > 1
4458 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 4459 && m->p_type == PT_NOTE))
252b5132
RH
4460 qsort (m->sections, (size_t) m->count, sizeof (asection *),
4461 elf_sort_sections);
4462
b301b248
AM
4463 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
4464 number of sections with contents contributing to both p_filesz
4465 and p_memsz, followed by a number of sections with no contents
4466 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 4467 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 4468 p->p_type = m->p_type;
28a7f3e7 4469 p->p_flags = m->p_flags;
252b5132 4470
3f570048
AM
4471 if (m->count == 0)
4472 p->p_vaddr = 0;
4473 else
3271a814 4474 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
4475
4476 if (m->p_paddr_valid)
4477 p->p_paddr = m->p_paddr;
4478 else if (m->count == 0)
4479 p->p_paddr = 0;
4480 else
08a40648 4481 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
4482
4483 if (p->p_type == PT_LOAD
4484 && (abfd->flags & D_PAGED) != 0)
4485 {
4486 /* p_align in demand paged PT_LOAD segments effectively stores
4487 the maximum page size. When copying an executable with
4488 objcopy, we set m->p_align from the input file. Use this
4489 value for maxpagesize rather than bed->maxpagesize, which
4490 may be different. Note that we use maxpagesize for PT_TLS
4491 segment alignment later in this function, so we are relying
4492 on at least one PT_LOAD segment appearing before a PT_TLS
4493 segment. */
4494 if (m->p_align_valid)
4495 maxpagesize = m->p_align;
4496
4497 p->p_align = maxpagesize;
4498 }
3271a814
NS
4499 else if (m->p_align_valid)
4500 p->p_align = m->p_align;
e970b90a
DJ
4501 else if (m->count == 0)
4502 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
4503 else
4504 p->p_align = 0;
4505
bf988460
AM
4506 no_contents = FALSE;
4507 off_adjust = 0;
252b5132 4508 if (p->p_type == PT_LOAD
b301b248 4509 && m->count > 0)
252b5132 4510 {
b301b248 4511 bfd_size_type align;
a49e53ed 4512 unsigned int align_power = 0;
b301b248 4513
3271a814
NS
4514 if (m->p_align_valid)
4515 align = p->p_align;
4516 else
252b5132 4517 {
3271a814
NS
4518 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4519 {
4520 unsigned int secalign;
08a40648 4521
3271a814
NS
4522 secalign = bfd_get_section_alignment (abfd, *secpp);
4523 if (secalign > align_power)
4524 align_power = secalign;
4525 }
4526 align = (bfd_size_type) 1 << align_power;
4527 if (align < maxpagesize)
4528 align = maxpagesize;
b301b248 4529 }
252b5132 4530
02bf8d82
AM
4531 for (i = 0; i < m->count; i++)
4532 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
4533 /* If we aren't making room for this section, then
4534 it must be SHT_NOBITS regardless of what we've
4535 set via struct bfd_elf_special_section. */
4536 elf_section_type (m->sections[i]) = SHT_NOBITS;
4537
bf988460 4538 /* Find out whether this segment contains any loadable
aea274d3
AM
4539 sections. */
4540 no_contents = TRUE;
4541 for (i = 0; i < m->count; i++)
4542 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
4543 {
4544 no_contents = FALSE;
4545 break;
4546 }
bf988460 4547
85cfcbfb 4548 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
4549 off += off_adjust;
4550 if (no_contents)
4551 {
4552 /* We shouldn't need to align the segment on disk since
4553 the segment doesn't need file space, but the gABI
4554 arguably requires the alignment and glibc ld.so
4555 checks it. So to comply with the alignment
4556 requirement but not waste file space, we adjust
4557 p_offset for just this segment. (OFF_ADJUST is
4558 subtracted from OFF later.) This may put p_offset
4559 past the end of file, but that shouldn't matter. */
4560 }
4561 else
4562 off_adjust = 0;
252b5132 4563 }
b1a6d0b1
NC
4564 /* Make sure the .dynamic section is the first section in the
4565 PT_DYNAMIC segment. */
4566 else if (p->p_type == PT_DYNAMIC
4567 && m->count > 1
4568 && strcmp (m->sections[0]->name, ".dynamic") != 0)
4569 {
4570 _bfd_error_handler
b301b248
AM
4571 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
4572 abfd);
b1a6d0b1
NC
4573 bfd_set_error (bfd_error_bad_value);
4574 return FALSE;
4575 }
3f001e84
JK
4576 /* Set the note section type to SHT_NOTE. */
4577 else if (p->p_type == PT_NOTE)
4578 for (i = 0; i < m->count; i++)
4579 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 4580
252b5132
RH
4581 p->p_offset = 0;
4582 p->p_filesz = 0;
4583 p->p_memsz = 0;
4584
4585 if (m->includes_filehdr)
4586 {
bf988460 4587 if (!m->p_flags_valid)
252b5132 4588 p->p_flags |= PF_R;
252b5132
RH
4589 p->p_filesz = bed->s->sizeof_ehdr;
4590 p->p_memsz = bed->s->sizeof_ehdr;
4591 if (m->count > 0)
4592 {
252b5132
RH
4593 if (p->p_vaddr < (bfd_vma) off)
4594 {
caf47ea6 4595 (*_bfd_error_handler)
b301b248
AM
4596 (_("%B: Not enough room for program headers, try linking with -N"),
4597 abfd);
252b5132 4598 bfd_set_error (bfd_error_bad_value);
b34976b6 4599 return FALSE;
252b5132
RH
4600 }
4601
4602 p->p_vaddr -= off;
bf988460 4603 if (!m->p_paddr_valid)
252b5132
RH
4604 p->p_paddr -= off;
4605 }
252b5132
RH
4606 }
4607
4608 if (m->includes_phdrs)
4609 {
bf988460 4610 if (!m->p_flags_valid)
252b5132
RH
4611 p->p_flags |= PF_R;
4612
f3520d2f 4613 if (!m->includes_filehdr)
252b5132
RH
4614 {
4615 p->p_offset = bed->s->sizeof_ehdr;
4616
4617 if (m->count > 0)
4618 {
252b5132 4619 p->p_vaddr -= off - p->p_offset;
bf988460 4620 if (!m->p_paddr_valid)
252b5132
RH
4621 p->p_paddr -= off - p->p_offset;
4622 }
252b5132
RH
4623 }
4624
4625 p->p_filesz += alloc * bed->s->sizeof_phdr;
4626 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
4627 if (m->count)
4628 {
4629 p->p_filesz += header_pad;
4630 p->p_memsz += header_pad;
4631 }
252b5132
RH
4632 }
4633
4634 if (p->p_type == PT_LOAD
4635 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
4636 {
bf988460 4637 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 4638 p->p_offset = off;
252b5132
RH
4639 else
4640 {
4641 file_ptr adjust;
4642
4643 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
4644 if (!no_contents)
4645 p->p_filesz += adjust;
252b5132
RH
4646 p->p_memsz += adjust;
4647 }
4648 }
4649
1ea63fd2
AM
4650 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
4651 maps. Set filepos for sections in PT_LOAD segments, and in
4652 core files, for sections in PT_NOTE segments.
4653 assign_file_positions_for_non_load_sections will set filepos
4654 for other sections and update p_filesz for other segments. */
252b5132
RH
4655 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
4656 {
4657 asection *sec;
252b5132 4658 bfd_size_type align;
627b32bc 4659 Elf_Internal_Shdr *this_hdr;
252b5132
RH
4660
4661 sec = *secpp;
02bf8d82 4662 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 4663 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 4664
88967714
AM
4665 if ((p->p_type == PT_LOAD
4666 || p->p_type == PT_TLS)
4667 && (this_hdr->sh_type != SHT_NOBITS
4668 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
4669 && ((this_hdr->sh_flags & SHF_TLS) == 0
4670 || p->p_type == PT_TLS))))
252b5132 4671 {
b5599592
AM
4672 bfd_vma p_start = p->p_paddr;
4673 bfd_vma p_end = p_start + p->p_memsz;
4674 bfd_vma s_start = sec->lma;
4675 bfd_vma adjust = s_start - p_end;
252b5132 4676
a2d1e028
L
4677 if (adjust != 0
4678 && (s_start < p_end
4679 || p_end < p_start))
252b5132 4680 {
88967714 4681 (*_bfd_error_handler)
b5599592
AM
4682 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
4683 (unsigned long) s_start, (unsigned long) p_end);
88967714 4684 adjust = 0;
b5599592 4685 sec->lma = p_end;
1cfb7d1e 4686 }
3ac9b6c9 4687 p->p_memsz += adjust;
1cfb7d1e 4688
88967714
AM
4689 if (this_hdr->sh_type != SHT_NOBITS)
4690 {
32812159
AM
4691 if (p->p_filesz + adjust < p->p_memsz)
4692 {
4693 /* We have a PROGBITS section following NOBITS ones.
4694 Allocate file space for the NOBITS section(s) and
4695 zero it. */
4696 adjust = p->p_memsz - p->p_filesz;
4697 if (!write_zeros (abfd, off, adjust))
4698 return FALSE;
4699 }
88967714
AM
4700 off += adjust;
4701 p->p_filesz += adjust;
252b5132 4702 }
252b5132
RH
4703 }
4704
4705 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
4706 {
b301b248
AM
4707 /* The section at i == 0 is the one that actually contains
4708 everything. */
4a938328
MS
4709 if (i == 0)
4710 {
627b32bc 4711 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
4712 off += this_hdr->sh_size;
4713 p->p_filesz = this_hdr->sh_size;
b301b248
AM
4714 p->p_memsz = 0;
4715 p->p_align = 1;
252b5132 4716 }
4a938328 4717 else
252b5132 4718 {
b301b248 4719 /* The rest are fake sections that shouldn't be written. */
252b5132 4720 sec->filepos = 0;
eea6121a 4721 sec->size = 0;
b301b248
AM
4722 sec->flags = 0;
4723 continue;
252b5132 4724 }
252b5132
RH
4725 }
4726 else
4727 {
1e951488 4728 if (p->p_type == PT_LOAD)
b301b248 4729 {
1e951488
AM
4730 this_hdr->sh_offset = sec->filepos = off;
4731 if (this_hdr->sh_type != SHT_NOBITS)
4732 off += this_hdr->sh_size;
4733 }
4734 else if (this_hdr->sh_type == SHT_NOBITS
4735 && (this_hdr->sh_flags & SHF_TLS) != 0
4736 && this_hdr->sh_offset == 0)
4737 {
4738 /* This is a .tbss section that didn't get a PT_LOAD.
4739 (See _bfd_elf_map_sections_to_segments "Create a
4740 final PT_LOAD".) Set sh_offset to the value it
4741 would have if we had created a zero p_filesz and
4742 p_memsz PT_LOAD header for the section. This
4743 also makes the PT_TLS header have the same
4744 p_offset value. */
4745 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
4746 off, align);
4747 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 4748 }
252b5132 4749
02bf8d82 4750 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 4751 {
6a3cd2b4 4752 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
4753 /* A load section without SHF_ALLOC is something like
4754 a note section in a PT_NOTE segment. These take
4755 file space but are not loaded into memory. */
4756 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 4757 p->p_memsz += this_hdr->sh_size;
b301b248 4758 }
6a3cd2b4 4759 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 4760 {
6a3cd2b4
AM
4761 if (p->p_type == PT_TLS)
4762 p->p_memsz += this_hdr->sh_size;
4763
4764 /* .tbss is special. It doesn't contribute to p_memsz of
4765 normal segments. */
4766 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
4767 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
4768 }
4769
b10a8ae0
L
4770 if (align > p->p_align
4771 && !m->p_align_valid
4772 && (p->p_type != PT_LOAD
4773 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
4774 p->p_align = align;
4775 }
4776
bf988460 4777 if (!m->p_flags_valid)
252b5132
RH
4778 {
4779 p->p_flags |= PF_R;
02bf8d82 4780 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 4781 p->p_flags |= PF_X;
02bf8d82 4782 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
4783 p->p_flags |= PF_W;
4784 }
4785 }
bf988460 4786 off -= off_adjust;
0920dee7 4787
7c928300
AM
4788 /* Check that all sections are in a PT_LOAD segment.
4789 Don't check funky gdb generated core files. */
4790 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
4791 {
4792 bfd_boolean check_vma = TRUE;
4793
4794 for (i = 1; i < m->count; i++)
4795 if (m->sections[i]->vma == m->sections[i - 1]->vma
4796 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
4797 ->this_hdr), p) != 0
4798 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
4799 ->this_hdr), p) != 0)
0920dee7 4800 {
9a83a553
AM
4801 /* Looks like we have overlays packed into the segment. */
4802 check_vma = FALSE;
4803 break;
0920dee7 4804 }
9a83a553
AM
4805
4806 for (i = 0; i < m->count; i++)
4807 {
4808 Elf_Internal_Shdr *this_hdr;
4809 asection *sec;
4810
4811 sec = m->sections[i];
4812 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
4813 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
4814 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553
AM
4815 {
4816 (*_bfd_error_handler)
4817 (_("%B: section `%A' can't be allocated in segment %d"),
4818 abfd, sec, j);
4819 print_segment_map (m);
4820 }
4821 }
4822 }
252b5132
RH
4823 }
4824
f3520d2f
AM
4825 elf_tdata (abfd)->next_file_pos = off;
4826 return TRUE;
4827}
4828
4829/* Assign file positions for the other sections. */
4830
4831static bfd_boolean
4832assign_file_positions_for_non_load_sections (bfd *abfd,
4833 struct bfd_link_info *link_info)
4834{
4835 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4836 Elf_Internal_Shdr **i_shdrpp;
4837 Elf_Internal_Shdr **hdrpp;
4838 Elf_Internal_Phdr *phdrs;
4839 Elf_Internal_Phdr *p;
4840 struct elf_segment_map *m;
62655c7b 4841 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
4842 bfd_vma filehdr_vaddr, filehdr_paddr;
4843 bfd_vma phdrs_vaddr, phdrs_paddr;
4844 file_ptr off;
4845 unsigned int num_sec;
4846 unsigned int i;
4847 unsigned int count;
4848
5c182d5f
AM
4849 i_shdrpp = elf_elfsections (abfd);
4850 num_sec = elf_numsections (abfd);
f3520d2f 4851 off = elf_tdata (abfd)->next_file_pos;
5c182d5f
AM
4852 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
4853 {
4854 struct elf_obj_tdata *tdata = elf_tdata (abfd);
4855 Elf_Internal_Shdr *hdr;
4856
4857 hdr = *hdrpp;
4858 if (hdr->bfd_section != NULL
252e386e
AM
4859 && (hdr->bfd_section->filepos != 0
4860 || (hdr->sh_type == SHT_NOBITS
4861 && hdr->contents == NULL)))
627b32bc 4862 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
4863 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
4864 {
e8d2ba53
AM
4865 if (hdr->sh_size != 0)
4866 (*_bfd_error_handler)
4867 (_("%B: warning: allocated section `%s' not in segment"),
4868 abfd,
4869 (hdr->bfd_section == NULL
4870 ? "*unknown*"
4871 : hdr->bfd_section->name));
3ba71138
L
4872 /* We don't need to page align empty sections. */
4873 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
4874 off += vma_page_aligned_bias (hdr->sh_addr, off,
4875 bed->maxpagesize);
4876 else
4877 off += vma_page_aligned_bias (hdr->sh_addr, off,
4878 hdr->sh_addralign);
4879 off = _bfd_elf_assign_file_position_for_section (hdr, off,
4880 FALSE);
4881 }
4882 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
4883 && hdr->bfd_section == NULL)
4884 || hdr == i_shdrpp[tdata->symtab_section]
4885 || hdr == i_shdrpp[tdata->symtab_shndx_section]
4886 || hdr == i_shdrpp[tdata->strtab_section])
4887 hdr->sh_offset = -1;
4888 else
4889 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
4890 }
4891
252b5132
RH
4892 /* Now that we have set the section file positions, we can set up
4893 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
4894 count = 0;
4895 filehdr_vaddr = 0;
4896 filehdr_paddr = 0;
4897 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
4898 phdrs_paddr = 0;
62655c7b 4899 hdrs_segment = NULL;
f3520d2f
AM
4900 phdrs = elf_tdata (abfd)->phdr;
4901 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4902 m != NULL;
4903 m = m->next, p++)
4904 {
4905 ++count;
4906 if (p->p_type != PT_LOAD)
4907 continue;
4908
4909 if (m->includes_filehdr)
4910 {
4911 filehdr_vaddr = p->p_vaddr;
4912 filehdr_paddr = p->p_paddr;
4913 }
4914 if (m->includes_phdrs)
4915 {
4916 phdrs_vaddr = p->p_vaddr;
4917 phdrs_paddr = p->p_paddr;
4918 if (m->includes_filehdr)
4919 {
62655c7b 4920 hdrs_segment = m;
f3520d2f
AM
4921 phdrs_vaddr += bed->s->sizeof_ehdr;
4922 phdrs_paddr += bed->s->sizeof_ehdr;
4923 }
4924 }
4925 }
4926
62655c7b
RM
4927 if (hdrs_segment != NULL && link_info != NULL)
4928 {
4929 /* There is a segment that contains both the file headers and the
4930 program headers, so provide a symbol __ehdr_start pointing there.
4931 A program can use this to examine itself robustly. */
4932
4933 struct elf_link_hash_entry *hash
4934 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
4935 FALSE, FALSE, TRUE);
4936 /* If the symbol was referenced and not defined, define it. */
4937 if (hash != NULL
4938 && (hash->root.type == bfd_link_hash_new
4939 || hash->root.type == bfd_link_hash_undefined
4940 || hash->root.type == bfd_link_hash_undefweak
4941 || hash->root.type == bfd_link_hash_common))
4942 {
4943 asection *s = NULL;
4944 if (hdrs_segment->count != 0)
4945 /* The segment contains sections, so use the first one. */
4946 s = hdrs_segment->sections[0];
4947 else
4948 /* Use the first (i.e. lowest-addressed) section in any segment. */
4949 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
4950 if (m->count != 0)
4951 {
4952 s = m->sections[0];
4953 break;
4954 }
4955
4956 if (s != NULL)
4957 {
4958 hash->root.u.def.value = filehdr_vaddr - s->vma;
4959 hash->root.u.def.section = s;
4960 }
4961 else
4962 {
4963 hash->root.u.def.value = filehdr_vaddr;
4964 hash->root.u.def.section = bfd_abs_section_ptr;
4965 }
4966
4967 hash->root.type = bfd_link_hash_defined;
4968 hash->def_regular = 1;
4969 hash->non_elf = 0;
4970 }
4971 }
4972
252b5132
RH
4973 for (m = elf_tdata (abfd)->segment_map, p = phdrs;
4974 m != NULL;
4975 m = m->next, p++)
4976 {
129af99f 4977 if (p->p_type == PT_GNU_RELRO)
252b5132 4978 {
b84a33b5 4979 const Elf_Internal_Phdr *lp;
3146fac4 4980 struct elf_segment_map *lm;
1ea63fd2 4981
129af99f 4982 if (link_info != NULL)
8c37241b 4983 {
129af99f
AS
4984 /* During linking the range of the RELRO segment is passed
4985 in link_info. */
3146fac4
AM
4986 for (lm = elf_tdata (abfd)->segment_map, lp = phdrs;
4987 lm != NULL;
4988 lm = lm->next, lp++)
8c37241b
JJ
4989 {
4990 if (lp->p_type == PT_LOAD
b84a33b5 4991 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
4992 && lp->p_vaddr + lp->p_filesz >= link_info->relro_end
4993 && lm->count != 0
4994 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
4995 break;
4996 }
8981c88a
L
4997
4998 /* PR ld/14207. If the RELRO segment doesn't fit in the
4999 LOAD segment, it should be removed. */
3146fac4 5000 BFD_ASSERT (lm != NULL);
8c37241b 5001 }
129af99f
AS
5002 else
5003 {
5004 /* Otherwise we are copying an executable or shared
b84a33b5 5005 library, but we need to use the same linker logic. */
129af99f
AS
5006 for (lp = phdrs; lp < phdrs + count; ++lp)
5007 {
5008 if (lp->p_type == PT_LOAD
5009 && lp->p_paddr == p->p_paddr)
5010 break;
5011 }
b84a33b5
AM
5012 }
5013
5014 if (lp < phdrs + count)
5015 {
5016 p->p_vaddr = lp->p_vaddr;
5017 p->p_paddr = lp->p_paddr;
5018 p->p_offset = lp->p_offset;
5019 if (link_info != NULL)
5020 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5021 else if (m->p_size_valid)
5022 p->p_filesz = m->p_size;
129af99f
AS
5023 else
5024 abort ();
b84a33b5 5025 p->p_memsz = p->p_filesz;
f3944f72
L
5026 /* Preserve the alignment and flags if they are valid. The
5027 gold linker generates RW/4 for the PT_GNU_RELRO section.
5028 It is better for objcopy/strip to honor these attributes
5029 otherwise gdb will choke when using separate debug files.
5030 */
5031 if (!m->p_align_valid)
5032 p->p_align = 1;
5033 if (!m->p_flags_valid)
5034 p->p_flags = (lp->p_flags & ~PF_W);
129af99f 5035 }
9433b9b1 5036 else
b84a33b5
AM
5037 {
5038 memset (p, 0, sizeof *p);
5039 p->p_type = PT_NULL;
5040 }
129af99f
AS
5041 }
5042 else if (m->count != 0)
5043 {
5044 if (p->p_type != PT_LOAD
5045 && (p->p_type != PT_NOTE
5046 || bfd_get_format (abfd) != bfd_core))
5047 {
129af99f
AS
5048 BFD_ASSERT (!m->includes_filehdr && !m->includes_phdrs);
5049
86b2281f 5050 p->p_filesz = 0;
129af99f 5051 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5052 for (i = m->count; i-- != 0;)
5053 {
5054 asection *sect = m->sections[i];
5055 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5056 if (hdr->sh_type != SHT_NOBITS)
5057 {
5058 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5059 + hdr->sh_size);
5060 break;
5061 }
5062 }
129af99f
AS
5063 }
5064 }
5065 else if (m->includes_filehdr)
5066 {
5067 p->p_vaddr = filehdr_vaddr;
5068 if (! m->p_paddr_valid)
5069 p->p_paddr = filehdr_paddr;
5070 }
5071 else if (m->includes_phdrs)
5072 {
5073 p->p_vaddr = phdrs_vaddr;
5074 if (! m->p_paddr_valid)
5075 p->p_paddr = phdrs_paddr;
252b5132
RH
5076 }
5077 }
5078
252b5132
RH
5079 elf_tdata (abfd)->next_file_pos = off;
5080
b34976b6 5081 return TRUE;
252b5132
RH
5082}
5083
252b5132
RH
5084/* Work out the file positions of all the sections. This is called by
5085 _bfd_elf_compute_section_file_positions. All the section sizes and
5086 VMAs must be known before this is called.
5087
e0638f70
AM
5088 Reloc sections come in two flavours: Those processed specially as
5089 "side-channel" data attached to a section to which they apply, and
5090 those that bfd doesn't process as relocations. The latter sort are
5091 stored in a normal bfd section by bfd_section_from_shdr. We don't
5092 consider the former sort here, unless they form part of the loadable
5093 image. Reloc sections not assigned here will be handled later by
5094 assign_file_positions_for_relocs.
252b5132
RH
5095
5096 We also don't set the positions of the .symtab and .strtab here. */
5097
b34976b6 5098static bfd_boolean
c84fca4d
AO
5099assign_file_positions_except_relocs (bfd *abfd,
5100 struct bfd_link_info *link_info)
252b5132 5101{
5c182d5f
AM
5102 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5103 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
252b5132 5104 file_ptr off;
9c5bfbb7 5105 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5106
5107 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5108 && bfd_get_format (abfd) != bfd_core)
5109 {
5c182d5f
AM
5110 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5111 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5112 Elf_Internal_Shdr **hdrpp;
5113 unsigned int i;
5114
5115 /* Start after the ELF header. */
5116 off = i_ehdrp->e_ehsize;
5117
5118 /* We are not creating an executable, which means that we are
5119 not creating a program header, and that the actual order of
5120 the sections in the file is unimportant. */
9ad5cbcf 5121 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5122 {
5123 Elf_Internal_Shdr *hdr;
5124
5125 hdr = *hdrpp;
e0638f70
AM
5126 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5127 && hdr->bfd_section == NULL)
9ad5cbcf
AM
5128 || i == tdata->symtab_section
5129 || i == tdata->symtab_shndx_section
252b5132
RH
5130 || i == tdata->strtab_section)
5131 {
5132 hdr->sh_offset = -1;
252b5132 5133 }
9ad5cbcf 5134 else
b34976b6 5135 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132
RH
5136 }
5137 }
5138 else
5139 {
f3520d2f
AM
5140 unsigned int alloc;
5141
252b5132 5142 /* Assign file positions for the loaded sections based on the
08a40648 5143 assignment of sections to segments. */
f3520d2f
AM
5144 if (!assign_file_positions_for_load_sections (abfd, link_info))
5145 return FALSE;
5146
5147 /* And for non-load sections. */
5148 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
5149 return FALSE;
5150
e36284ab
AM
5151 if (bed->elf_backend_modify_program_headers != NULL)
5152 {
5153 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
5154 return FALSE;
5155 }
5156
f3520d2f
AM
5157 /* Write out the program headers. */
5158 alloc = tdata->program_header_size / bed->s->sizeof_phdr;
5159 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
5160 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
b34976b6 5161 return FALSE;
252b5132 5162
5c182d5f 5163 off = tdata->next_file_pos;
252b5132
RH
5164 }
5165
5166 /* Place the section headers. */
45d6a902 5167 off = align_file_position (off, 1 << bed->s->log_file_align);
252b5132
RH
5168 i_ehdrp->e_shoff = off;
5169 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
5170
5c182d5f 5171 tdata->next_file_pos = off;
252b5132 5172
b34976b6 5173 return TRUE;
252b5132
RH
5174}
5175
b34976b6 5176static bfd_boolean
217aa764 5177prep_headers (bfd *abfd)
252b5132 5178{
3d540e93 5179 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 5180 struct elf_strtab_hash *shstrtab;
9c5bfbb7 5181 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5182
5183 i_ehdrp = elf_elfheader (abfd);
252b5132 5184
2b0f7ef9 5185 shstrtab = _bfd_elf_strtab_init ();
252b5132 5186 if (shstrtab == NULL)
b34976b6 5187 return FALSE;
252b5132
RH
5188
5189 elf_shstrtab (abfd) = shstrtab;
5190
5191 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
5192 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
5193 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
5194 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
5195
5196 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
5197 i_ehdrp->e_ident[EI_DATA] =
5198 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
5199 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
5200
252b5132
RH
5201 if ((abfd->flags & DYNAMIC) != 0)
5202 i_ehdrp->e_type = ET_DYN;
5203 else if ((abfd->flags & EXEC_P) != 0)
5204 i_ehdrp->e_type = ET_EXEC;
5205 else if (bfd_get_format (abfd) == bfd_core)
5206 i_ehdrp->e_type = ET_CORE;
5207 else
5208 i_ehdrp->e_type = ET_REL;
5209
5210 switch (bfd_get_arch (abfd))
5211 {
5212 case bfd_arch_unknown:
5213 i_ehdrp->e_machine = EM_NONE;
5214 break;
aa4f99bb
AO
5215
5216 /* There used to be a long list of cases here, each one setting
5217 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
5218 in the corresponding bfd definition. To avoid duplication,
5219 the switch was removed. Machines that need special handling
5220 can generally do it in elf_backend_final_write_processing(),
5221 unless they need the information earlier than the final write.
5222 Such need can generally be supplied by replacing the tests for
5223 e_machine with the conditions used to determine it. */
252b5132 5224 default:
9c5bfbb7
AM
5225 i_ehdrp->e_machine = bed->elf_machine_code;
5226 }
aa4f99bb 5227
252b5132
RH
5228 i_ehdrp->e_version = bed->s->ev_current;
5229 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
5230
c044fabd 5231 /* No program header, for now. */
252b5132
RH
5232 i_ehdrp->e_phoff = 0;
5233 i_ehdrp->e_phentsize = 0;
5234 i_ehdrp->e_phnum = 0;
5235
c044fabd 5236 /* Each bfd section is section header entry. */
252b5132
RH
5237 i_ehdrp->e_entry = bfd_get_start_address (abfd);
5238 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
5239
c044fabd 5240 /* If we're building an executable, we'll need a program header table. */
252b5132 5241 if (abfd->flags & EXEC_P)
0e71e495
BE
5242 /* It all happens later. */
5243 ;
252b5132
RH
5244 else
5245 {
5246 i_ehdrp->e_phentsize = 0;
252b5132
RH
5247 i_ehdrp->e_phoff = 0;
5248 }
5249
5250 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 5251 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 5252 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 5253 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 5254 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 5255 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132
RH
5256 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
5257 || elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
5258 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 5259 return FALSE;
252b5132 5260
b34976b6 5261 return TRUE;
252b5132
RH
5262}
5263
5264/* Assign file positions for all the reloc sections which are not part
5265 of the loadable file image. */
5266
5267void
217aa764 5268_bfd_elf_assign_file_positions_for_relocs (bfd *abfd)
252b5132
RH
5269{
5270 file_ptr off;
9ad5cbcf 5271 unsigned int i, num_sec;
252b5132
RH
5272 Elf_Internal_Shdr **shdrpp;
5273
5274 off = elf_tdata (abfd)->next_file_pos;
5275
9ad5cbcf
AM
5276 num_sec = elf_numsections (abfd);
5277 for (i = 1, shdrpp = elf_elfsections (abfd) + 1; i < num_sec; i++, shdrpp++)
252b5132
RH
5278 {
5279 Elf_Internal_Shdr *shdrp;
5280
5281 shdrp = *shdrpp;
5282 if ((shdrp->sh_type == SHT_REL || shdrp->sh_type == SHT_RELA)
5283 && shdrp->sh_offset == -1)
b34976b6 5284 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
252b5132
RH
5285 }
5286
5287 elf_tdata (abfd)->next_file_pos = off;
5288}
5289
b34976b6 5290bfd_boolean
217aa764 5291_bfd_elf_write_object_contents (bfd *abfd)
252b5132 5292{
9c5bfbb7 5293 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5294 Elf_Internal_Shdr **i_shdrp;
b34976b6 5295 bfd_boolean failed;
9ad5cbcf 5296 unsigned int count, num_sec;
252b5132
RH
5297
5298 if (! abfd->output_has_begun
217aa764 5299 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 5300 return FALSE;
252b5132
RH
5301
5302 i_shdrp = elf_elfsections (abfd);
252b5132 5303
b34976b6 5304 failed = FALSE;
252b5132
RH
5305 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
5306 if (failed)
b34976b6 5307 return FALSE;
252b5132
RH
5308
5309 _bfd_elf_assign_file_positions_for_relocs (abfd);
5310
c044fabd 5311 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
5312 num_sec = elf_numsections (abfd);
5313 for (count = 1; count < num_sec; count++)
252b5132
RH
5314 {
5315 if (bed->elf_backend_section_processing)
5316 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
5317 if (i_shdrp[count]->contents)
5318 {
dc810e39
AM
5319 bfd_size_type amt = i_shdrp[count]->sh_size;
5320
252b5132 5321 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 5322 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 5323 return FALSE;
252b5132
RH
5324 }
5325 }
5326
5327 /* Write out the section header names. */
26ae6d5e
DJ
5328 if (elf_shstrtab (abfd) != NULL
5329 && (bfd_seek (abfd, elf_tdata (abfd)->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 5330 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 5331 return FALSE;
252b5132
RH
5332
5333 if (bed->elf_backend_final_write_processing)
5334 (*bed->elf_backend_final_write_processing) (abfd,
5335 elf_tdata (abfd)->linker);
5336
ff59fc36
RM
5337 if (!bed->s->write_shdrs_and_ehdr (abfd))
5338 return FALSE;
5339
5340 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
bfb53a4f
RM
5341 if (elf_tdata (abfd)->after_write_object_contents)
5342 return (*elf_tdata (abfd)->after_write_object_contents) (abfd);
ff59fc36
RM
5343
5344 return TRUE;
252b5132
RH
5345}
5346
b34976b6 5347bfd_boolean
217aa764 5348_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 5349{
c044fabd 5350 /* Hopefully this can be done just like an object file. */
252b5132
RH
5351 return _bfd_elf_write_object_contents (abfd);
5352}
c044fabd
KH
5353
5354/* Given a section, search the header to find them. */
5355
cb33740c 5356unsigned int
198beae2 5357_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 5358{
9c5bfbb7 5359 const struct elf_backend_data *bed;
91d6fa6a 5360 unsigned int sec_index;
252b5132 5361
9ad5cbcf
AM
5362 if (elf_section_data (asect) != NULL
5363 && elf_section_data (asect)->this_idx != 0)
5364 return elf_section_data (asect)->this_idx;
5365
5366 if (bfd_is_abs_section (asect))
91d6fa6a 5367 sec_index = SHN_ABS;
af746e92 5368 else if (bfd_is_com_section (asect))
91d6fa6a 5369 sec_index = SHN_COMMON;
af746e92 5370 else if (bfd_is_und_section (asect))
91d6fa6a 5371 sec_index = SHN_UNDEF;
af746e92 5372 else
91d6fa6a 5373 sec_index = SHN_BAD;
252b5132 5374
af746e92 5375 bed = get_elf_backend_data (abfd);
252b5132
RH
5376 if (bed->elf_backend_section_from_bfd_section)
5377 {
91d6fa6a 5378 int retval = sec_index;
9ad5cbcf 5379
af746e92
AM
5380 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
5381 return retval;
252b5132
RH
5382 }
5383
91d6fa6a 5384 if (sec_index == SHN_BAD)
af746e92 5385 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 5386
91d6fa6a 5387 return sec_index;
252b5132
RH
5388}
5389
5390/* Given a BFD symbol, return the index in the ELF symbol table, or -1
5391 on error. */
5392
5393int
217aa764 5394_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
5395{
5396 asymbol *asym_ptr = *asym_ptr_ptr;
5397 int idx;
5398 flagword flags = asym_ptr->flags;
5399
5400 /* When gas creates relocations against local labels, it creates its
5401 own symbol for the section, but does put the symbol into the
5402 symbol chain, so udata is 0. When the linker is generating
5403 relocatable output, this section symbol may be for one of the
5404 input sections rather than the output section. */
5405 if (asym_ptr->udata.i == 0
5406 && (flags & BSF_SECTION_SYM)
5407 && asym_ptr->section)
5408 {
5372391b 5409 asection *sec;
252b5132
RH
5410 int indx;
5411
5372391b
AM
5412 sec = asym_ptr->section;
5413 if (sec->owner != abfd && sec->output_section != NULL)
5414 sec = sec->output_section;
5415 if (sec->owner == abfd
5416 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 5417 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
5418 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
5419 }
5420
5421 idx = asym_ptr->udata.i;
5422
5423 if (idx == 0)
5424 {
5425 /* This case can occur when using --strip-symbol on a symbol
08a40648 5426 which is used in a relocation entry. */
252b5132 5427 (*_bfd_error_handler)
d003868e
AM
5428 (_("%B: symbol `%s' required but not present"),
5429 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
5430 bfd_set_error (bfd_error_no_symbols);
5431 return -1;
5432 }
5433
5434#if DEBUG & 4
5435 {
5436 fprintf (stderr,
9ccb8af9
AM
5437 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
5438 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
5439 fflush (stderr);
5440 }
5441#endif
5442
5443 return idx;
5444}
5445
84d1d650 5446/* Rewrite program header information. */
252b5132 5447
b34976b6 5448static bfd_boolean
84d1d650 5449rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 5450{
b34976b6
AM
5451 Elf_Internal_Ehdr *iehdr;
5452 struct elf_segment_map *map;
5453 struct elf_segment_map *map_first;
5454 struct elf_segment_map **pointer_to_map;
5455 Elf_Internal_Phdr *segment;
5456 asection *section;
5457 unsigned int i;
5458 unsigned int num_segments;
5459 bfd_boolean phdr_included = FALSE;
5c44b38e 5460 bfd_boolean p_paddr_valid;
b34976b6
AM
5461 bfd_vma maxpagesize;
5462 struct elf_segment_map *phdr_adjust_seg = NULL;
5463 unsigned int phdr_adjust_num = 0;
9c5bfbb7 5464 const struct elf_backend_data *bed;
bc67d8a6 5465
caf47ea6 5466 bed = get_elf_backend_data (ibfd);
252b5132
RH
5467 iehdr = elf_elfheader (ibfd);
5468
bc67d8a6 5469 map_first = NULL;
c044fabd 5470 pointer_to_map = &map_first;
252b5132
RH
5471
5472 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
5473 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
5474
5475 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
5476#define SEGMENT_END(segment, start) \
5477 (start + (segment->p_memsz > segment->p_filesz \
5478 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 5479
eecdbe52
JJ
5480#define SECTION_SIZE(section, segment) \
5481 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
5482 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 5483 ? section->size : 0)
eecdbe52 5484
b34976b6 5485 /* Returns TRUE if the given section is contained within
bc67d8a6 5486 the given segment. VMA addresses are compared. */
aecc8f8a
AM
5487#define IS_CONTAINED_BY_VMA(section, segment) \
5488 (section->vma >= segment->p_vaddr \
eecdbe52 5489 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 5490 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 5491
b34976b6 5492 /* Returns TRUE if the given section is contained within
bc67d8a6 5493 the given segment. LMA addresses are compared. */
aecc8f8a
AM
5494#define IS_CONTAINED_BY_LMA(section, segment, base) \
5495 (section->lma >= base \
eecdbe52 5496 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 5497 <= SEGMENT_END (segment, base)))
252b5132 5498
0efc80c8
L
5499 /* Handle PT_NOTE segment. */
5500#define IS_NOTE(p, s) \
aecc8f8a 5501 (p->p_type == PT_NOTE \
0efc80c8 5502 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 5503 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5504 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5505 <= p->p_offset + p->p_filesz))
252b5132 5506
0efc80c8
L
5507 /* Special case: corefile "NOTE" section containing regs, prpsinfo
5508 etc. */
5509#define IS_COREFILE_NOTE(p, s) \
5510 (IS_NOTE (p, s) \
5511 && bfd_get_format (ibfd) == bfd_core \
5512 && s->vma == 0 \
5513 && s->lma == 0)
5514
252b5132
RH
5515 /* The complicated case when p_vaddr is 0 is to handle the Solaris
5516 linker, which generates a PT_INTERP section with p_vaddr and
5517 p_memsz set to 0. */
aecc8f8a
AM
5518#define IS_SOLARIS_PT_INTERP(p, s) \
5519 (p->p_vaddr == 0 \
5520 && p->p_paddr == 0 \
5521 && p->p_memsz == 0 \
5522 && p->p_filesz > 0 \
5523 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 5524 && s->size > 0 \
aecc8f8a 5525 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 5526 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 5527 <= p->p_offset + p->p_filesz))
5c440b1e 5528
bc67d8a6
NC
5529 /* Decide if the given section should be included in the given segment.
5530 A section will be included if:
f5ffc919 5531 1. It is within the address space of the segment -- we use the LMA
08a40648 5532 if that is set for the segment and the VMA otherwise,
0efc80c8 5533 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 5534 segment.
bc67d8a6 5535 3. There is an output section associated with it,
eecdbe52 5536 4. The section has not already been allocated to a previous segment.
2b05f1b7 5537 5. PT_GNU_STACK segments do not include any sections.
03394ac9 5538 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
5539 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
5540 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 5541 (with the possible exception of .dynamic). */
9f17e2a6 5542#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
5543 ((((segment->p_paddr \
5544 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
5545 : IS_CONTAINED_BY_VMA (section, segment)) \
5546 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 5547 || IS_NOTE (segment, section)) \
2b05f1b7
L
5548 && segment->p_type != PT_GNU_STACK \
5549 && (segment->p_type != PT_TLS \
5550 || (section->flags & SEC_THREAD_LOCAL)) \
5551 && (segment->p_type == PT_LOAD \
5552 || segment->p_type == PT_TLS \
5553 || (section->flags & SEC_THREAD_LOCAL) == 0) \
5554 && (segment->p_type != PT_DYNAMIC \
5555 || SECTION_SIZE (section, segment) > 0 \
5556 || (segment->p_paddr \
5557 ? segment->p_paddr != section->lma \
5558 : segment->p_vaddr != section->vma) \
5559 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
5560 == 0)) \
0067a569 5561 && !section->segment_mark)
bc67d8a6 5562
9f17e2a6
L
5563/* If the output section of a section in the input segment is NULL,
5564 it is removed from the corresponding output segment. */
5565#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
5566 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
5567 && section->output_section != NULL)
5568
b34976b6 5569 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
5570#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
5571 (seg1->field >= SEGMENT_END (seg2, seg2->field))
5572
5573 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
5574 their VMA address ranges and their LMA address ranges overlap.
5575 It is possible to have overlapping VMA ranges without overlapping LMA
5576 ranges. RedBoot images for example can have both .data and .bss mapped
5577 to the same VMA range, but with the .data section mapped to a different
5578 LMA. */
aecc8f8a 5579#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 5580 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 5581 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 5582 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 5583 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
5584
5585 /* Initialise the segment mark field. */
5586 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 5587 section->segment_mark = FALSE;
bc67d8a6 5588
5c44b38e
AM
5589 /* The Solaris linker creates program headers in which all the
5590 p_paddr fields are zero. When we try to objcopy or strip such a
5591 file, we get confused. Check for this case, and if we find it
5592 don't set the p_paddr_valid fields. */
5593 p_paddr_valid = FALSE;
5594 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5595 i < num_segments;
5596 i++, segment++)
5597 if (segment->p_paddr != 0)
5598 {
5599 p_paddr_valid = TRUE;
5600 break;
5601 }
5602
252b5132 5603 /* Scan through the segments specified in the program header
bc67d8a6 5604 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 5605 in the loadable segments. These can be created by weird
aecc8f8a 5606 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
5607 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5608 i < num_segments;
c044fabd 5609 i++, segment++)
252b5132 5610 {
252b5132 5611 unsigned int j;
c044fabd 5612 Elf_Internal_Phdr *segment2;
252b5132 5613
aecc8f8a
AM
5614 if (segment->p_type == PT_INTERP)
5615 for (section = ibfd->sections; section; section = section->next)
5616 if (IS_SOLARIS_PT_INTERP (segment, section))
5617 {
5618 /* Mininal change so that the normal section to segment
4cc11e76 5619 assignment code will work. */
aecc8f8a
AM
5620 segment->p_vaddr = section->vma;
5621 break;
5622 }
5623
bc67d8a6 5624 if (segment->p_type != PT_LOAD)
b10a8ae0
L
5625 {
5626 /* Remove PT_GNU_RELRO segment. */
5627 if (segment->p_type == PT_GNU_RELRO)
5628 segment->p_type = PT_NULL;
5629 continue;
5630 }
c044fabd 5631
bc67d8a6 5632 /* Determine if this segment overlaps any previous segments. */
0067a569 5633 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
5634 {
5635 bfd_signed_vma extra_length;
c044fabd 5636
bc67d8a6 5637 if (segment2->p_type != PT_LOAD
0067a569 5638 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 5639 continue;
c044fabd 5640
bc67d8a6
NC
5641 /* Merge the two segments together. */
5642 if (segment2->p_vaddr < segment->p_vaddr)
5643 {
c044fabd 5644 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 5645 SEGMENT. */
0067a569
AM
5646 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
5647 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 5648
bc67d8a6
NC
5649 if (extra_length > 0)
5650 {
0067a569 5651 segment2->p_memsz += extra_length;
bc67d8a6
NC
5652 segment2->p_filesz += extra_length;
5653 }
c044fabd 5654
bc67d8a6 5655 segment->p_type = PT_NULL;
c044fabd 5656
bc67d8a6
NC
5657 /* Since we have deleted P we must restart the outer loop. */
5658 i = 0;
5659 segment = elf_tdata (ibfd)->phdr;
5660 break;
5661 }
5662 else
5663 {
c044fabd 5664 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 5665 SEGMENT2. */
0067a569
AM
5666 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
5667 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 5668
bc67d8a6
NC
5669 if (extra_length > 0)
5670 {
0067a569 5671 segment->p_memsz += extra_length;
bc67d8a6
NC
5672 segment->p_filesz += extra_length;
5673 }
c044fabd 5674
bc67d8a6
NC
5675 segment2->p_type = PT_NULL;
5676 }
5677 }
5678 }
c044fabd 5679
bc67d8a6
NC
5680 /* The second scan attempts to assign sections to segments. */
5681 for (i = 0, segment = elf_tdata (ibfd)->phdr;
5682 i < num_segments;
0067a569 5683 i++, segment++)
bc67d8a6 5684 {
0067a569
AM
5685 unsigned int section_count;
5686 asection **sections;
5687 asection *output_section;
5688 unsigned int isec;
5689 bfd_vma matching_lma;
5690 bfd_vma suggested_lma;
5691 unsigned int j;
dc810e39 5692 bfd_size_type amt;
0067a569
AM
5693 asection *first_section;
5694 bfd_boolean first_matching_lma;
5695 bfd_boolean first_suggested_lma;
bc67d8a6
NC
5696
5697 if (segment->p_type == PT_NULL)
5698 continue;
c044fabd 5699
9f17e2a6 5700 first_section = NULL;
bc67d8a6 5701 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
5702 for (section = ibfd->sections, section_count = 0;
5703 section != NULL;
5704 section = section->next)
9f17e2a6
L
5705 {
5706 /* Find the first section in the input segment, which may be
5707 removed from the corresponding output segment. */
5708 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
5709 {
5710 if (first_section == NULL)
5711 first_section = section;
5712 if (section->output_section != NULL)
5713 ++section_count;
5714 }
5715 }
811072d8 5716
b5f852ea
NC
5717 /* Allocate a segment map big enough to contain
5718 all of the sections we have selected. */
dc810e39
AM
5719 amt = sizeof (struct elf_segment_map);
5720 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 5721 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 5722 if (map == NULL)
b34976b6 5723 return FALSE;
252b5132
RH
5724
5725 /* Initialise the fields of the segment map. Default to
5726 using the physical address of the segment in the input BFD. */
0067a569
AM
5727 map->next = NULL;
5728 map->p_type = segment->p_type;
5729 map->p_flags = segment->p_flags;
bc67d8a6 5730 map->p_flags_valid = 1;
55d55ac7 5731
9f17e2a6
L
5732 /* If the first section in the input segment is removed, there is
5733 no need to preserve segment physical address in the corresponding
5734 output segment. */
945c025a 5735 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
5736 {
5737 map->p_paddr = segment->p_paddr;
5c44b38e 5738 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 5739 }
252b5132
RH
5740
5741 /* Determine if this segment contains the ELF file header
5742 and if it contains the program headers themselves. */
bc67d8a6
NC
5743 map->includes_filehdr = (segment->p_offset == 0
5744 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 5745 map->includes_phdrs = 0;
252b5132 5746
0067a569 5747 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 5748 {
bc67d8a6
NC
5749 map->includes_phdrs =
5750 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
5751 && (segment->p_offset + segment->p_filesz
252b5132
RH
5752 >= ((bfd_vma) iehdr->e_phoff
5753 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 5754
bc67d8a6 5755 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 5756 phdr_included = TRUE;
252b5132
RH
5757 }
5758
bc67d8a6 5759 if (section_count == 0)
252b5132
RH
5760 {
5761 /* Special segments, such as the PT_PHDR segment, may contain
5762 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
5763 something. They are allowed by the ELF spec however, so only
5764 a warning is produced. */
bc67d8a6 5765 if (segment->p_type == PT_LOAD)
0067a569
AM
5766 (*_bfd_error_handler) (_("%B: warning: Empty loadable segment"
5767 " detected, is this intentional ?\n"),
5768 ibfd);
252b5132 5769
bc67d8a6 5770 map->count = 0;
c044fabd
KH
5771 *pointer_to_map = map;
5772 pointer_to_map = &map->next;
252b5132
RH
5773
5774 continue;
5775 }
5776
5777 /* Now scan the sections in the input BFD again and attempt
5778 to add their corresponding output sections to the segment map.
5779 The problem here is how to handle an output section which has
5780 been moved (ie had its LMA changed). There are four possibilities:
5781
5782 1. None of the sections have been moved.
5783 In this case we can continue to use the segment LMA from the
5784 input BFD.
5785
5786 2. All of the sections have been moved by the same amount.
5787 In this case we can change the segment's LMA to match the LMA
5788 of the first section.
5789
5790 3. Some of the sections have been moved, others have not.
5791 In this case those sections which have not been moved can be
5792 placed in the current segment which will have to have its size,
5793 and possibly its LMA changed, and a new segment or segments will
5794 have to be created to contain the other sections.
5795
b5f852ea 5796 4. The sections have been moved, but not by the same amount.
252b5132
RH
5797 In this case we can change the segment's LMA to match the LMA
5798 of the first section and we will have to create a new segment
5799 or segments to contain the other sections.
5800
5801 In order to save time, we allocate an array to hold the section
5802 pointers that we are interested in. As these sections get assigned
5803 to a segment, they are removed from this array. */
5804
a50b1753 5805 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 5806 if (sections == NULL)
b34976b6 5807 return FALSE;
252b5132
RH
5808
5809 /* Step One: Scan for segment vs section LMA conflicts.
5810 Also add the sections to the section array allocated above.
5811 Also add the sections to the current segment. In the common
5812 case, where the sections have not been moved, this means that
5813 we have completely filled the segment, and there is nothing
5814 more to do. */
252b5132 5815 isec = 0;
72730e0c 5816 matching_lma = 0;
252b5132 5817 suggested_lma = 0;
0067a569
AM
5818 first_matching_lma = TRUE;
5819 first_suggested_lma = TRUE;
252b5132 5820
147d51c2 5821 for (section = ibfd->sections;
bc67d8a6
NC
5822 section != NULL;
5823 section = section->next)
147d51c2
L
5824 if (section == first_section)
5825 break;
5826
5827 for (j = 0; section != NULL; section = section->next)
252b5132 5828 {
caf47ea6 5829 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 5830 {
bc67d8a6
NC
5831 output_section = section->output_section;
5832
0067a569 5833 sections[j++] = section;
252b5132
RH
5834
5835 /* The Solaris native linker always sets p_paddr to 0.
5836 We try to catch that case here, and set it to the
5e8d7549
NC
5837 correct value. Note - some backends require that
5838 p_paddr be left as zero. */
5c44b38e 5839 if (!p_paddr_valid
4455705d 5840 && segment->p_vaddr != 0
0067a569 5841 && !bed->want_p_paddr_set_to_zero
252b5132 5842 && isec == 0
bc67d8a6 5843 && output_section->lma != 0
0067a569
AM
5844 && output_section->vma == (segment->p_vaddr
5845 + (map->includes_filehdr
5846 ? iehdr->e_ehsize
5847 : 0)
5848 + (map->includes_phdrs
5849 ? (iehdr->e_phnum
5850 * iehdr->e_phentsize)
5851 : 0)))
bc67d8a6 5852 map->p_paddr = segment->p_vaddr;
252b5132
RH
5853
5854 /* Match up the physical address of the segment with the
5855 LMA address of the output section. */
bc67d8a6 5856 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 5857 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
5858 || (bed->want_p_paddr_set_to_zero
5859 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 5860 {
0067a569
AM
5861 if (first_matching_lma || output_section->lma < matching_lma)
5862 {
5863 matching_lma = output_section->lma;
5864 first_matching_lma = FALSE;
5865 }
252b5132
RH
5866
5867 /* We assume that if the section fits within the segment
bc67d8a6 5868 then it does not overlap any other section within that
252b5132 5869 segment. */
0067a569
AM
5870 map->sections[isec++] = output_section;
5871 }
5872 else if (first_suggested_lma)
5873 {
5874 suggested_lma = output_section->lma;
5875 first_suggested_lma = FALSE;
252b5132 5876 }
147d51c2
L
5877
5878 if (j == section_count)
5879 break;
252b5132
RH
5880 }
5881 }
5882
bc67d8a6 5883 BFD_ASSERT (j == section_count);
252b5132
RH
5884
5885 /* Step Two: Adjust the physical address of the current segment,
5886 if necessary. */
bc67d8a6 5887 if (isec == section_count)
252b5132
RH
5888 {
5889 /* All of the sections fitted within the segment as currently
5890 specified. This is the default case. Add the segment to
5891 the list of built segments and carry on to process the next
5892 program header in the input BFD. */
bc67d8a6 5893 map->count = section_count;
c044fabd
KH
5894 *pointer_to_map = map;
5895 pointer_to_map = &map->next;
08a40648 5896
5c44b38e
AM
5897 if (p_paddr_valid
5898 && !bed->want_p_paddr_set_to_zero
147d51c2 5899 && matching_lma != map->p_paddr
5c44b38e
AM
5900 && !map->includes_filehdr
5901 && !map->includes_phdrs)
3271a814
NS
5902 /* There is some padding before the first section in the
5903 segment. So, we must account for that in the output
5904 segment's vma. */
5905 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 5906
252b5132
RH
5907 free (sections);
5908 continue;
5909 }
252b5132
RH
5910 else
5911 {
0067a569 5912 if (!first_matching_lma)
72730e0c
AM
5913 {
5914 /* At least one section fits inside the current segment.
5915 Keep it, but modify its physical address to match the
5916 LMA of the first section that fitted. */
bc67d8a6 5917 map->p_paddr = matching_lma;
72730e0c
AM
5918 }
5919 else
5920 {
5921 /* None of the sections fitted inside the current segment.
5922 Change the current segment's physical address to match
5923 the LMA of the first section. */
bc67d8a6 5924 map->p_paddr = suggested_lma;
72730e0c
AM
5925 }
5926
bc67d8a6
NC
5927 /* Offset the segment physical address from the lma
5928 to allow for space taken up by elf headers. */
5929 if (map->includes_filehdr)
010c8431
AM
5930 {
5931 if (map->p_paddr >= iehdr->e_ehsize)
5932 map->p_paddr -= iehdr->e_ehsize;
5933 else
5934 {
5935 map->includes_filehdr = FALSE;
5936 map->includes_phdrs = FALSE;
5937 }
5938 }
252b5132 5939
bc67d8a6
NC
5940 if (map->includes_phdrs)
5941 {
010c8431
AM
5942 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
5943 {
5944 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
5945
5946 /* iehdr->e_phnum is just an estimate of the number
5947 of program headers that we will need. Make a note
5948 here of the number we used and the segment we chose
5949 to hold these headers, so that we can adjust the
5950 offset when we know the correct value. */
5951 phdr_adjust_num = iehdr->e_phnum;
5952 phdr_adjust_seg = map;
5953 }
5954 else
5955 map->includes_phdrs = FALSE;
bc67d8a6 5956 }
252b5132
RH
5957 }
5958
5959 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 5960 those that fit to the current segment and removing them from the
252b5132
RH
5961 sections array; but making sure not to leave large gaps. Once all
5962 possible sections have been assigned to the current segment it is
5963 added to the list of built segments and if sections still remain
5964 to be assigned, a new segment is constructed before repeating
5965 the loop. */
5966 isec = 0;
5967 do
5968 {
bc67d8a6 5969 map->count = 0;
252b5132 5970 suggested_lma = 0;
0067a569 5971 first_suggested_lma = TRUE;
252b5132
RH
5972
5973 /* Fill the current segment with sections that fit. */
bc67d8a6 5974 for (j = 0; j < section_count; j++)
252b5132 5975 {
bc67d8a6 5976 section = sections[j];
252b5132 5977
bc67d8a6 5978 if (section == NULL)
252b5132
RH
5979 continue;
5980
bc67d8a6 5981 output_section = section->output_section;
252b5132 5982
bc67d8a6 5983 BFD_ASSERT (output_section != NULL);
c044fabd 5984
bc67d8a6
NC
5985 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5986 || IS_COREFILE_NOTE (segment, section))
252b5132 5987 {
bc67d8a6 5988 if (map->count == 0)
252b5132
RH
5989 {
5990 /* If the first section in a segment does not start at
bc67d8a6
NC
5991 the beginning of the segment, then something is
5992 wrong. */
0067a569
AM
5993 if (output_section->lma
5994 != (map->p_paddr
5995 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
5996 + (map->includes_phdrs
5997 ? iehdr->e_phnum * iehdr->e_phentsize
5998 : 0)))
252b5132
RH
5999 abort ();
6000 }
6001 else
6002 {
0067a569 6003 asection *prev_sec;
252b5132 6004
bc67d8a6 6005 prev_sec = map->sections[map->count - 1];
252b5132
RH
6006
6007 /* If the gap between the end of the previous section
bc67d8a6
NC
6008 and the start of this section is more than
6009 maxpagesize then we need to start a new segment. */
eea6121a 6010 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 6011 maxpagesize)
caf47ea6 6012 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 6013 || (prev_sec->lma + prev_sec->size
079e9a2f 6014 > output_section->lma))
252b5132 6015 {
0067a569
AM
6016 if (first_suggested_lma)
6017 {
6018 suggested_lma = output_section->lma;
6019 first_suggested_lma = FALSE;
6020 }
252b5132
RH
6021
6022 continue;
6023 }
6024 }
6025
bc67d8a6 6026 map->sections[map->count++] = output_section;
252b5132
RH
6027 ++isec;
6028 sections[j] = NULL;
b34976b6 6029 section->segment_mark = TRUE;
252b5132 6030 }
0067a569
AM
6031 else if (first_suggested_lma)
6032 {
6033 suggested_lma = output_section->lma;
6034 first_suggested_lma = FALSE;
6035 }
252b5132
RH
6036 }
6037
bc67d8a6 6038 BFD_ASSERT (map->count > 0);
252b5132
RH
6039
6040 /* Add the current segment to the list of built segments. */
c044fabd
KH
6041 *pointer_to_map = map;
6042 pointer_to_map = &map->next;
252b5132 6043
bc67d8a6 6044 if (isec < section_count)
252b5132
RH
6045 {
6046 /* We still have not allocated all of the sections to
6047 segments. Create a new segment here, initialise it
6048 and carry on looping. */
dc810e39
AM
6049 amt = sizeof (struct elf_segment_map);
6050 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6051 map = (struct elf_segment_map *) bfd_alloc (obfd, amt);
bc67d8a6 6052 if (map == NULL)
5ed6aba4
NC
6053 {
6054 free (sections);
6055 return FALSE;
6056 }
252b5132
RH
6057
6058 /* Initialise the fields of the segment map. Set the physical
6059 physical address to the LMA of the first section that has
6060 not yet been assigned. */
0067a569
AM
6061 map->next = NULL;
6062 map->p_type = segment->p_type;
6063 map->p_flags = segment->p_flags;
6064 map->p_flags_valid = 1;
6065 map->p_paddr = suggested_lma;
5c44b38e 6066 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 6067 map->includes_filehdr = 0;
0067a569 6068 map->includes_phdrs = 0;
252b5132
RH
6069 }
6070 }
bc67d8a6 6071 while (isec < section_count);
252b5132
RH
6072
6073 free (sections);
6074 }
6075
bc67d8a6
NC
6076 elf_tdata (obfd)->segment_map = map_first;
6077
6078 /* If we had to estimate the number of program headers that were
9ad5cbcf 6079 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
6080 the offset if necessary. */
6081 if (phdr_adjust_seg != NULL)
6082 {
6083 unsigned int count;
c044fabd 6084
bc67d8a6 6085 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 6086 count++;
252b5132 6087
bc67d8a6
NC
6088 if (count > phdr_adjust_num)
6089 phdr_adjust_seg->p_paddr
6090 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
6091 }
c044fabd 6092
bc67d8a6 6093#undef SEGMENT_END
eecdbe52 6094#undef SECTION_SIZE
bc67d8a6
NC
6095#undef IS_CONTAINED_BY_VMA
6096#undef IS_CONTAINED_BY_LMA
0efc80c8 6097#undef IS_NOTE
252b5132 6098#undef IS_COREFILE_NOTE
bc67d8a6 6099#undef IS_SOLARIS_PT_INTERP
9f17e2a6 6100#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
6101#undef INCLUDE_SECTION_IN_SEGMENT
6102#undef SEGMENT_AFTER_SEGMENT
6103#undef SEGMENT_OVERLAPS
b34976b6 6104 return TRUE;
252b5132
RH
6105}
6106
84d1d650
L
6107/* Copy ELF program header information. */
6108
6109static bfd_boolean
6110copy_elf_program_header (bfd *ibfd, bfd *obfd)
6111{
6112 Elf_Internal_Ehdr *iehdr;
6113 struct elf_segment_map *map;
6114 struct elf_segment_map *map_first;
6115 struct elf_segment_map **pointer_to_map;
6116 Elf_Internal_Phdr *segment;
6117 unsigned int i;
6118 unsigned int num_segments;
6119 bfd_boolean phdr_included = FALSE;
88967714 6120 bfd_boolean p_paddr_valid;
84d1d650
L
6121
6122 iehdr = elf_elfheader (ibfd);
6123
6124 map_first = NULL;
6125 pointer_to_map = &map_first;
6126
88967714
AM
6127 /* If all the segment p_paddr fields are zero, don't set
6128 map->p_paddr_valid. */
6129 p_paddr_valid = FALSE;
84d1d650 6130 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
6131 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6132 i < num_segments;
6133 i++, segment++)
6134 if (segment->p_paddr != 0)
6135 {
6136 p_paddr_valid = TRUE;
6137 break;
6138 }
6139
84d1d650
L
6140 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6141 i < num_segments;
6142 i++, segment++)
6143 {
6144 asection *section;
6145 unsigned int section_count;
6146 bfd_size_type amt;
6147 Elf_Internal_Shdr *this_hdr;
53020534 6148 asection *first_section = NULL;
a76e6f2f 6149 asection *lowest_section;
84d1d650 6150
84d1d650
L
6151 /* Compute how many sections are in this segment. */
6152 for (section = ibfd->sections, section_count = 0;
6153 section != NULL;
6154 section = section->next)
6155 {
6156 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6157 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 6158 {
a76e6f2f
AM
6159 if (first_section == NULL)
6160 first_section = section;
3271a814
NS
6161 section_count++;
6162 }
84d1d650
L
6163 }
6164
6165 /* Allocate a segment map big enough to contain
6166 all of the sections we have selected. */
6167 amt = sizeof (struct elf_segment_map);
6168 if (section_count != 0)
6169 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6170 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
6171 if (map == NULL)
6172 return FALSE;
6173
6174 /* Initialize the fields of the output segment map with the
6175 input segment. */
6176 map->next = NULL;
6177 map->p_type = segment->p_type;
6178 map->p_flags = segment->p_flags;
6179 map->p_flags_valid = 1;
6180 map->p_paddr = segment->p_paddr;
88967714 6181 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
6182 map->p_align = segment->p_align;
6183 map->p_align_valid = 1;
3271a814 6184 map->p_vaddr_offset = 0;
84d1d650 6185
9433b9b1 6186 if (map->p_type == PT_GNU_RELRO)
b10a8ae0
L
6187 {
6188 /* The PT_GNU_RELRO segment may contain the first a few
6189 bytes in the .got.plt section even if the whole .got.plt
6190 section isn't in the PT_GNU_RELRO segment. We won't
6191 change the size of the PT_GNU_RELRO segment. */
9433b9b1 6192 map->p_size = segment->p_memsz;
b10a8ae0
L
6193 map->p_size_valid = 1;
6194 }
6195
84d1d650
L
6196 /* Determine if this segment contains the ELF file header
6197 and if it contains the program headers themselves. */
6198 map->includes_filehdr = (segment->p_offset == 0
6199 && segment->p_filesz >= iehdr->e_ehsize);
6200
6201 map->includes_phdrs = 0;
6202 if (! phdr_included || segment->p_type != PT_LOAD)
6203 {
6204 map->includes_phdrs =
6205 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6206 && (segment->p_offset + segment->p_filesz
6207 >= ((bfd_vma) iehdr->e_phoff
6208 + iehdr->e_phnum * iehdr->e_phentsize)));
6209
6210 if (segment->p_type == PT_LOAD && map->includes_phdrs)
6211 phdr_included = TRUE;
6212 }
6213
a76e6f2f 6214 lowest_section = first_section;
84d1d650
L
6215 if (section_count != 0)
6216 {
6217 unsigned int isec = 0;
6218
53020534 6219 for (section = first_section;
84d1d650
L
6220 section != NULL;
6221 section = section->next)
6222 {
6223 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6224 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
6225 {
6226 map->sections[isec++] = section->output_section;
a76e6f2f
AM
6227 if (section->lma < lowest_section->lma)
6228 lowest_section = section;
6229 if ((section->flags & SEC_ALLOC) != 0)
6230 {
6231 bfd_vma seg_off;
6232
6233 /* Section lmas are set up from PT_LOAD header
6234 p_paddr in _bfd_elf_make_section_from_shdr.
6235 If this header has a p_paddr that disagrees
6236 with the section lma, flag the p_paddr as
6237 invalid. */
6238 if ((section->flags & SEC_LOAD) != 0)
6239 seg_off = this_hdr->sh_offset - segment->p_offset;
6240 else
6241 seg_off = this_hdr->sh_addr - segment->p_vaddr;
6242 if (section->lma - segment->p_paddr != seg_off)
6243 map->p_paddr_valid = FALSE;
6244 }
53020534
L
6245 if (isec == section_count)
6246 break;
6247 }
84d1d650
L
6248 }
6249 }
6250
a76e6f2f
AM
6251 if (map->includes_filehdr && lowest_section != NULL)
6252 /* We need to keep the space used by the headers fixed. */
6253 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 6254
a76e6f2f
AM
6255 if (!map->includes_phdrs
6256 && !map->includes_filehdr
6257 && map->p_paddr_valid)
6258 /* There is some other padding before the first section. */
6259 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
6260 - segment->p_paddr);
6261
84d1d650
L
6262 map->count = section_count;
6263 *pointer_to_map = map;
6264 pointer_to_map = &map->next;
6265 }
6266
6267 elf_tdata (obfd)->segment_map = map_first;
6268 return TRUE;
6269}
6270
6271/* Copy private BFD data. This copies or rewrites ELF program header
6272 information. */
6273
6274static bfd_boolean
6275copy_private_bfd_data (bfd *ibfd, bfd *obfd)
6276{
84d1d650
L
6277 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6278 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6279 return TRUE;
6280
6281 if (elf_tdata (ibfd)->phdr == NULL)
6282 return TRUE;
6283
6284 if (ibfd->xvec == obfd->xvec)
6285 {
cb3ff1e5
NC
6286 /* Check to see if any sections in the input BFD
6287 covered by ELF program header have changed. */
d55ce4e2 6288 Elf_Internal_Phdr *segment;
84d1d650
L
6289 asection *section, *osec;
6290 unsigned int i, num_segments;
6291 Elf_Internal_Shdr *this_hdr;
147d51c2
L
6292 const struct elf_backend_data *bed;
6293
6294 bed = get_elf_backend_data (ibfd);
6295
6296 /* Regenerate the segment map if p_paddr is set to 0. */
6297 if (bed->want_p_paddr_set_to_zero)
6298 goto rewrite;
84d1d650
L
6299
6300 /* Initialize the segment mark field. */
6301 for (section = obfd->sections; section != NULL;
6302 section = section->next)
6303 section->segment_mark = FALSE;
6304
6305 num_segments = elf_elfheader (ibfd)->e_phnum;
6306 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6307 i < num_segments;
6308 i++, segment++)
6309 {
5f6999aa
NC
6310 /* PR binutils/3535. The Solaris linker always sets the p_paddr
6311 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
6312 which severly confuses things, so always regenerate the segment
6313 map in this case. */
6314 if (segment->p_paddr == 0
6315 && segment->p_memsz == 0
6316 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 6317 goto rewrite;
5f6999aa 6318
84d1d650
L
6319 for (section = ibfd->sections;
6320 section != NULL; section = section->next)
6321 {
6322 /* We mark the output section so that we know it comes
6323 from the input BFD. */
6324 osec = section->output_section;
6325 if (osec)
6326 osec->segment_mark = TRUE;
6327
6328 /* Check if this section is covered by the segment. */
6329 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 6330 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
6331 {
6332 /* FIXME: Check if its output section is changed or
6333 removed. What else do we need to check? */
6334 if (osec == NULL
6335 || section->flags != osec->flags
6336 || section->lma != osec->lma
6337 || section->vma != osec->vma
6338 || section->size != osec->size
6339 || section->rawsize != osec->rawsize
6340 || section->alignment_power != osec->alignment_power)
6341 goto rewrite;
6342 }
6343 }
6344 }
6345
cb3ff1e5 6346 /* Check to see if any output section do not come from the
84d1d650
L
6347 input BFD. */
6348 for (section = obfd->sections; section != NULL;
6349 section = section->next)
6350 {
6351 if (section->segment_mark == FALSE)
6352 goto rewrite;
6353 else
6354 section->segment_mark = FALSE;
6355 }
6356
6357 return copy_elf_program_header (ibfd, obfd);
6358 }
6359
6360rewrite:
6361 return rewrite_elf_program_header (ibfd, obfd);
6362}
6363
ccd2ec6a
L
6364/* Initialize private output section information from input section. */
6365
6366bfd_boolean
6367_bfd_elf_init_private_section_data (bfd *ibfd,
6368 asection *isec,
6369 bfd *obfd,
6370 asection *osec,
6371 struct bfd_link_info *link_info)
6372
6373{
6374 Elf_Internal_Shdr *ihdr, *ohdr;
dfa7b0b8 6375 bfd_boolean final_link = link_info != NULL && !link_info->relocatable;
ccd2ec6a
L
6376
6377 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6378 || obfd->xvec->flavour != bfd_target_elf_flavour)
6379 return TRUE;
6380
ba85c43e
NC
6381 BFD_ASSERT (elf_section_data (osec) != NULL);
6382
dfa7b0b8
AM
6383 /* For objcopy and relocatable link, don't copy the output ELF
6384 section type from input if the output BFD section flags have been
6385 set to something different. For a final link allow some flags
6386 that the linker clears to differ. */
42bb2e33 6387 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
6388 && (osec->flags == isec->flags
6389 || (final_link
6390 && ((osec->flags ^ isec->flags)
0814be7d 6391 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 6392 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
6393
6394 /* FIXME: Is this correct for all OS/PROC specific flags? */
6395 elf_section_flags (osec) |= (elf_section_flags (isec)
6396 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
6397
6398 /* Set things up for objcopy and relocatable link. The output
6399 SHT_GROUP section will have its elf_next_in_group pointing back
6400 to the input group members. Ignore linker created group section.
6401 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 6402 if (!final_link)
ccd2ec6a
L
6403 {
6404 if (elf_sec_group (isec) == NULL
6405 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
6406 {
6407 if (elf_section_flags (isec) & SHF_GROUP)
6408 elf_section_flags (osec) |= SHF_GROUP;
6409 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 6410 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a
L
6411 }
6412 }
6413
6414 ihdr = &elf_section_data (isec)->this_hdr;
6415
6416 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
6417 don't use the output section of the linked-to section since it
6418 may be NULL at this point. */
6419 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
6420 {
6421 ohdr = &elf_section_data (osec)->this_hdr;
6422 ohdr->sh_flags |= SHF_LINK_ORDER;
6423 elf_linked_to_section (osec) = elf_linked_to_section (isec);
6424 }
6425
6426 osec->use_rela_p = isec->use_rela_p;
6427
6428 return TRUE;
6429}
6430
252b5132
RH
6431/* Copy private section information. This copies over the entsize
6432 field, and sometimes the info field. */
6433
b34976b6 6434bfd_boolean
217aa764
AM
6435_bfd_elf_copy_private_section_data (bfd *ibfd,
6436 asection *isec,
6437 bfd *obfd,
6438 asection *osec)
252b5132
RH
6439{
6440 Elf_Internal_Shdr *ihdr, *ohdr;
6441
6442 if (ibfd->xvec->flavour != bfd_target_elf_flavour
6443 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 6444 return TRUE;
252b5132 6445
252b5132
RH
6446 ihdr = &elf_section_data (isec)->this_hdr;
6447 ohdr = &elf_section_data (osec)->this_hdr;
6448
6449 ohdr->sh_entsize = ihdr->sh_entsize;
6450
6451 if (ihdr->sh_type == SHT_SYMTAB
6452 || ihdr->sh_type == SHT_DYNSYM
6453 || ihdr->sh_type == SHT_GNU_verneed
6454 || ihdr->sh_type == SHT_GNU_verdef)
6455 ohdr->sh_info = ihdr->sh_info;
6456
ccd2ec6a
L
6457 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
6458 NULL);
252b5132
RH
6459}
6460
d0bf826b
AM
6461/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
6462 necessary if we are removing either the SHT_GROUP section or any of
6463 the group member sections. DISCARDED is the value that a section's
6464 output_section has if the section will be discarded, NULL when this
6465 function is called from objcopy, bfd_abs_section_ptr when called
6466 from the linker. */
80fccad2
BW
6467
6468bfd_boolean
d0bf826b 6469_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 6470{
30288845
AM
6471 asection *isec;
6472
30288845 6473 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 6474 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
6475 {
6476 asection *first = elf_next_in_group (isec);
6477 asection *s = first;
d0bf826b
AM
6478 bfd_size_type removed = 0;
6479
30288845
AM
6480 while (s != NULL)
6481 {
415f38a6
AM
6482 /* If this member section is being output but the
6483 SHT_GROUP section is not, then clear the group info
6484 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
6485 if (s->output_section != discarded
6486 && isec->output_section == discarded)
30288845
AM
6487 {
6488 elf_section_flags (s->output_section) &= ~SHF_GROUP;
6489 elf_group_name (s->output_section) = NULL;
6490 }
415f38a6
AM
6491 /* Conversely, if the member section is not being output
6492 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
6493 else if (s->output_section == discarded
6494 && isec->output_section != discarded)
6495 removed += 4;
30288845
AM
6496 s = elf_next_in_group (s);
6497 if (s == first)
6498 break;
6499 }
d0bf826b
AM
6500 if (removed != 0)
6501 {
6502 if (discarded != NULL)
6503 {
6504 /* If we've been called for ld -r, then we need to
6505 adjust the input section size. This function may
6506 be called multiple times, so save the original
6507 size. */
6508 if (isec->rawsize == 0)
6509 isec->rawsize = isec->size;
6510 isec->size = isec->rawsize - removed;
6511 }
6512 else
6513 {
6514 /* Adjust the output section size when called from
6515 objcopy. */
6516 isec->output_section->size -= removed;
6517 }
6518 }
30288845
AM
6519 }
6520
80fccad2
BW
6521 return TRUE;
6522}
6523
d0bf826b
AM
6524/* Copy private header information. */
6525
6526bfd_boolean
6527_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
6528{
6529 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6530 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
6531 return TRUE;
6532
6533 /* Copy over private BFD data if it has not already been copied.
6534 This must be done here, rather than in the copy_private_bfd_data
6535 entry point, because the latter is called after the section
6536 contents have been set, which means that the program headers have
6537 already been worked out. */
6538 if (elf_tdata (obfd)->segment_map == NULL && elf_tdata (ibfd)->phdr != NULL)
6539 {
6540 if (! copy_private_bfd_data (ibfd, obfd))
6541 return FALSE;
6542 }
6543
6544 return _bfd_elf_fixup_group_sections (ibfd, NULL);
6545}
6546
252b5132
RH
6547/* Copy private symbol information. If this symbol is in a section
6548 which we did not map into a BFD section, try to map the section
6549 index correctly. We use special macro definitions for the mapped
6550 section indices; these definitions are interpreted by the
6551 swap_out_syms function. */
6552
9ad5cbcf
AM
6553#define MAP_ONESYMTAB (SHN_HIOS + 1)
6554#define MAP_DYNSYMTAB (SHN_HIOS + 2)
6555#define MAP_STRTAB (SHN_HIOS + 3)
6556#define MAP_SHSTRTAB (SHN_HIOS + 4)
6557#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 6558
b34976b6 6559bfd_boolean
217aa764
AM
6560_bfd_elf_copy_private_symbol_data (bfd *ibfd,
6561 asymbol *isymarg,
6562 bfd *obfd,
6563 asymbol *osymarg)
252b5132
RH
6564{
6565 elf_symbol_type *isym, *osym;
6566
6567 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
6568 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 6569 return TRUE;
252b5132
RH
6570
6571 isym = elf_symbol_from (ibfd, isymarg);
6572 osym = elf_symbol_from (obfd, osymarg);
6573
6574 if (isym != NULL
8424d8f5 6575 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
6576 && osym != NULL
6577 && bfd_is_abs_section (isym->symbol.section))
6578 {
6579 unsigned int shndx;
6580
6581 shndx = isym->internal_elf_sym.st_shndx;
6582 if (shndx == elf_onesymtab (ibfd))
6583 shndx = MAP_ONESYMTAB;
6584 else if (shndx == elf_dynsymtab (ibfd))
6585 shndx = MAP_DYNSYMTAB;
6586 else if (shndx == elf_tdata (ibfd)->strtab_section)
6587 shndx = MAP_STRTAB;
6588 else if (shndx == elf_tdata (ibfd)->shstrtab_section)
6589 shndx = MAP_SHSTRTAB;
9ad5cbcf
AM
6590 else if (shndx == elf_tdata (ibfd)->symtab_shndx_section)
6591 shndx = MAP_SYM_SHNDX;
252b5132
RH
6592 osym->internal_elf_sym.st_shndx = shndx;
6593 }
6594
b34976b6 6595 return TRUE;
252b5132
RH
6596}
6597
6598/* Swap out the symbols. */
6599
b34976b6 6600static bfd_boolean
217aa764
AM
6601swap_out_syms (bfd *abfd,
6602 struct bfd_strtab_hash **sttp,
6603 int relocatable_p)
252b5132 6604{
9c5bfbb7 6605 const struct elf_backend_data *bed;
079e9a2f
AM
6606 int symcount;
6607 asymbol **syms;
6608 struct bfd_strtab_hash *stt;
6609 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 6610 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 6611 Elf_Internal_Shdr *symstrtab_hdr;
f075ee0c
AM
6612 bfd_byte *outbound_syms;
6613 bfd_byte *outbound_shndx;
079e9a2f
AM
6614 int idx;
6615 bfd_size_type amt;
174fd7f9 6616 bfd_boolean name_local_sections;
252b5132
RH
6617
6618 if (!elf_map_symbols (abfd))
b34976b6 6619 return FALSE;
252b5132 6620
c044fabd 6621 /* Dump out the symtabs. */
079e9a2f
AM
6622 stt = _bfd_elf_stringtab_init ();
6623 if (stt == NULL)
b34976b6 6624 return FALSE;
252b5132 6625
079e9a2f
AM
6626 bed = get_elf_backend_data (abfd);
6627 symcount = bfd_get_symcount (abfd);
6628 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
6629 symtab_hdr->sh_type = SHT_SYMTAB;
6630 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
6631 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
6632 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
72de5009 6633 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
6634
6635 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
6636 symstrtab_hdr->sh_type = SHT_STRTAB;
6637
a50b1753
NC
6638 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
6639 bed->s->sizeof_sym);
079e9a2f 6640 if (outbound_syms == NULL)
5ed6aba4
NC
6641 {
6642 _bfd_stringtab_free (stt);
6643 return FALSE;
6644 }
217aa764 6645 symtab_hdr->contents = outbound_syms;
252b5132 6646
9ad5cbcf
AM
6647 outbound_shndx = NULL;
6648 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
6649 if (symtab_shndx_hdr->sh_name != 0)
6650 {
6651 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
a50b1753
NC
6652 outbound_shndx = (bfd_byte *)
6653 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
9ad5cbcf 6654 if (outbound_shndx == NULL)
5ed6aba4
NC
6655 {
6656 _bfd_stringtab_free (stt);
6657 return FALSE;
6658 }
6659
9ad5cbcf
AM
6660 symtab_shndx_hdr->contents = outbound_shndx;
6661 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
6662 symtab_shndx_hdr->sh_size = amt;
6663 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
6664 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
6665 }
6666
589e6347 6667 /* Now generate the data (for "contents"). */
079e9a2f
AM
6668 {
6669 /* Fill in zeroth symbol and swap it out. */
6670 Elf_Internal_Sym sym;
6671 sym.st_name = 0;
6672 sym.st_value = 0;
6673 sym.st_size = 0;
6674 sym.st_info = 0;
6675 sym.st_other = 0;
6676 sym.st_shndx = SHN_UNDEF;
35fc36a8 6677 sym.st_target_internal = 0;
9ad5cbcf 6678 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6679 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6680 if (outbound_shndx != NULL)
6681 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6682 }
252b5132 6683
174fd7f9
RS
6684 name_local_sections
6685 = (bed->elf_backend_name_local_section_symbols
6686 && bed->elf_backend_name_local_section_symbols (abfd));
6687
079e9a2f
AM
6688 syms = bfd_get_outsymbols (abfd);
6689 for (idx = 0; idx < symcount; idx++)
252b5132 6690 {
252b5132 6691 Elf_Internal_Sym sym;
079e9a2f
AM
6692 bfd_vma value = syms[idx]->value;
6693 elf_symbol_type *type_ptr;
6694 flagword flags = syms[idx]->flags;
6695 int type;
252b5132 6696
174fd7f9
RS
6697 if (!name_local_sections
6698 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
6699 {
6700 /* Local section symbols have no name. */
6701 sym.st_name = 0;
6702 }
6703 else
6704 {
6705 sym.st_name = (unsigned long) _bfd_stringtab_add (stt,
6706 syms[idx]->name,
b34976b6 6707 TRUE, FALSE);
079e9a2f 6708 if (sym.st_name == (unsigned long) -1)
5ed6aba4
NC
6709 {
6710 _bfd_stringtab_free (stt);
6711 return FALSE;
6712 }
079e9a2f 6713 }
252b5132 6714
079e9a2f 6715 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 6716
079e9a2f
AM
6717 if ((flags & BSF_SECTION_SYM) == 0
6718 && bfd_is_com_section (syms[idx]->section))
6719 {
6720 /* ELF common symbols put the alignment into the `value' field,
6721 and the size into the `size' field. This is backwards from
6722 how BFD handles it, so reverse it here. */
6723 sym.st_size = value;
6724 if (type_ptr == NULL
6725 || type_ptr->internal_elf_sym.st_value == 0)
6726 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
6727 else
6728 sym.st_value = type_ptr->internal_elf_sym.st_value;
6729 sym.st_shndx = _bfd_elf_section_from_bfd_section
6730 (abfd, syms[idx]->section);
6731 }
6732 else
6733 {
6734 asection *sec = syms[idx]->section;
cb33740c 6735 unsigned int shndx;
252b5132 6736
079e9a2f
AM
6737 if (sec->output_section)
6738 {
6739 value += sec->output_offset;
6740 sec = sec->output_section;
6741 }
589e6347 6742
079e9a2f
AM
6743 /* Don't add in the section vma for relocatable output. */
6744 if (! relocatable_p)
6745 value += sec->vma;
6746 sym.st_value = value;
6747 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
6748
6749 if (bfd_is_abs_section (sec)
6750 && type_ptr != NULL
6751 && type_ptr->internal_elf_sym.st_shndx != 0)
6752 {
6753 /* This symbol is in a real ELF section which we did
6754 not create as a BFD section. Undo the mapping done
6755 by copy_private_symbol_data. */
6756 shndx = type_ptr->internal_elf_sym.st_shndx;
6757 switch (shndx)
6758 {
6759 case MAP_ONESYMTAB:
6760 shndx = elf_onesymtab (abfd);
6761 break;
6762 case MAP_DYNSYMTAB:
6763 shndx = elf_dynsymtab (abfd);
6764 break;
6765 case MAP_STRTAB:
6766 shndx = elf_tdata (abfd)->strtab_section;
6767 break;
6768 case MAP_SHSTRTAB:
6769 shndx = elf_tdata (abfd)->shstrtab_section;
6770 break;
9ad5cbcf
AM
6771 case MAP_SYM_SHNDX:
6772 shndx = elf_tdata (abfd)->symtab_shndx_section;
6773 break;
079e9a2f
AM
6774 default:
6775 break;
6776 }
6777 }
6778 else
6779 {
6780 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 6781
cb33740c 6782 if (shndx == SHN_BAD)
079e9a2f
AM
6783 {
6784 asection *sec2;
6785
6786 /* Writing this would be a hell of a lot easier if
6787 we had some decent documentation on bfd, and
6788 knew what to expect of the library, and what to
6789 demand of applications. For example, it
6790 appears that `objcopy' might not set the
6791 section of a symbol to be a section that is
6792 actually in the output file. */
6793 sec2 = bfd_get_section_by_name (abfd, sec->name);
589e6347
NC
6794 if (sec2 == NULL)
6795 {
6796 _bfd_error_handler (_("\
6797Unable to find equivalent output section for symbol '%s' from section '%s'"),
6798 syms[idx]->name ? syms[idx]->name : "<Local sym>",
6799 sec->name);
811072d8 6800 bfd_set_error (bfd_error_invalid_operation);
5ed6aba4 6801 _bfd_stringtab_free (stt);
589e6347
NC
6802 return FALSE;
6803 }
811072d8 6804
079e9a2f 6805 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
cb33740c 6806 BFD_ASSERT (shndx != SHN_BAD);
079e9a2f
AM
6807 }
6808 }
252b5132 6809
079e9a2f
AM
6810 sym.st_shndx = shndx;
6811 }
252b5132 6812
13ae64f3
JJ
6813 if ((flags & BSF_THREAD_LOCAL) != 0)
6814 type = STT_TLS;
d8045f23
NC
6815 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
6816 type = STT_GNU_IFUNC;
13ae64f3 6817 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
6818 type = STT_FUNC;
6819 else if ((flags & BSF_OBJECT) != 0)
6820 type = STT_OBJECT;
d9352518
DB
6821 else if ((flags & BSF_RELC) != 0)
6822 type = STT_RELC;
6823 else if ((flags & BSF_SRELC) != 0)
6824 type = STT_SRELC;
079e9a2f
AM
6825 else
6826 type = STT_NOTYPE;
252b5132 6827
13ae64f3
JJ
6828 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
6829 type = STT_TLS;
6830
589e6347 6831 /* Processor-specific types. */
079e9a2f
AM
6832 if (type_ptr != NULL
6833 && bed->elf_backend_get_symbol_type)
6834 type = ((*bed->elf_backend_get_symbol_type)
6835 (&type_ptr->internal_elf_sym, type));
252b5132 6836
079e9a2f
AM
6837 if (flags & BSF_SECTION_SYM)
6838 {
6839 if (flags & BSF_GLOBAL)
6840 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
6841 else
6842 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
6843 }
6844 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 6845 {
504b7d20 6846#ifdef USE_STT_COMMON
0a40daed
MK
6847 if (type == STT_OBJECT)
6848 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_COMMON);
6849 else
504b7d20 6850#endif
c91e322a 6851 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 6852 }
079e9a2f
AM
6853 else if (bfd_is_und_section (syms[idx]->section))
6854 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
6855 ? STB_WEAK
6856 : STB_GLOBAL),
6857 type);
6858 else if (flags & BSF_FILE)
6859 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
6860 else
6861 {
6862 int bind = STB_LOCAL;
252b5132 6863
079e9a2f
AM
6864 if (flags & BSF_LOCAL)
6865 bind = STB_LOCAL;
3e7a7d11
NC
6866 else if (flags & BSF_GNU_UNIQUE)
6867 bind = STB_GNU_UNIQUE;
079e9a2f
AM
6868 else if (flags & BSF_WEAK)
6869 bind = STB_WEAK;
6870 else if (flags & BSF_GLOBAL)
6871 bind = STB_GLOBAL;
252b5132 6872
079e9a2f
AM
6873 sym.st_info = ELF_ST_INFO (bind, type);
6874 }
252b5132 6875
079e9a2f 6876 if (type_ptr != NULL)
35fc36a8
RS
6877 {
6878 sym.st_other = type_ptr->internal_elf_sym.st_other;
6879 sym.st_target_internal
6880 = type_ptr->internal_elf_sym.st_target_internal;
6881 }
079e9a2f 6882 else
35fc36a8
RS
6883 {
6884 sym.st_other = 0;
6885 sym.st_target_internal = 0;
6886 }
252b5132 6887
9ad5cbcf 6888 bed->s->swap_symbol_out (abfd, &sym, outbound_syms, outbound_shndx);
079e9a2f 6889 outbound_syms += bed->s->sizeof_sym;
9ad5cbcf
AM
6890 if (outbound_shndx != NULL)
6891 outbound_shndx += sizeof (Elf_External_Sym_Shndx);
079e9a2f 6892 }
252b5132 6893
079e9a2f
AM
6894 *sttp = stt;
6895 symstrtab_hdr->sh_size = _bfd_stringtab_size (stt);
6896 symstrtab_hdr->sh_type = SHT_STRTAB;
252b5132 6897
079e9a2f
AM
6898 symstrtab_hdr->sh_flags = 0;
6899 symstrtab_hdr->sh_addr = 0;
6900 symstrtab_hdr->sh_entsize = 0;
6901 symstrtab_hdr->sh_link = 0;
6902 symstrtab_hdr->sh_info = 0;
6903 symstrtab_hdr->sh_addralign = 1;
252b5132 6904
b34976b6 6905 return TRUE;
252b5132
RH
6906}
6907
6908/* Return the number of bytes required to hold the symtab vector.
6909
6910 Note that we base it on the count plus 1, since we will null terminate
6911 the vector allocated based on this size. However, the ELF symbol table
6912 always has a dummy entry as symbol #0, so it ends up even. */
6913
6914long
217aa764 6915_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
6916{
6917 long symcount;
6918 long symtab_size;
6919 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
6920
6921 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6922 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6923 if (symcount > 0)
6924 symtab_size -= sizeof (asymbol *);
252b5132
RH
6925
6926 return symtab_size;
6927}
6928
6929long
217aa764 6930_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
6931{
6932 long symcount;
6933 long symtab_size;
6934 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
6935
6936 if (elf_dynsymtab (abfd) == 0)
6937 {
6938 bfd_set_error (bfd_error_invalid_operation);
6939 return -1;
6940 }
6941
6942 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
6943 symtab_size = (symcount + 1) * (sizeof (asymbol *));
6944 if (symcount > 0)
6945 symtab_size -= sizeof (asymbol *);
252b5132
RH
6946
6947 return symtab_size;
6948}
6949
6950long
217aa764
AM
6951_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
6952 sec_ptr asect)
252b5132
RH
6953{
6954 return (asect->reloc_count + 1) * sizeof (arelent *);
6955}
6956
6957/* Canonicalize the relocs. */
6958
6959long
217aa764
AM
6960_bfd_elf_canonicalize_reloc (bfd *abfd,
6961 sec_ptr section,
6962 arelent **relptr,
6963 asymbol **symbols)
252b5132
RH
6964{
6965 arelent *tblptr;
6966 unsigned int i;
9c5bfbb7 6967 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6968
b34976b6 6969 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
6970 return -1;
6971
6972 tblptr = section->relocation;
6973 for (i = 0; i < section->reloc_count; i++)
6974 *relptr++ = tblptr++;
6975
6976 *relptr = NULL;
6977
6978 return section->reloc_count;
6979}
6980
6981long
6cee3f79 6982_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 6983{
9c5bfbb7 6984 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6985 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
6986
6987 if (symcount >= 0)
6988 bfd_get_symcount (abfd) = symcount;
6989 return symcount;
6990}
6991
6992long
217aa764
AM
6993_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
6994 asymbol **allocation)
252b5132 6995{
9c5bfbb7 6996 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 6997 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
6998
6999 if (symcount >= 0)
7000 bfd_get_dynamic_symcount (abfd) = symcount;
7001 return symcount;
252b5132
RH
7002}
7003
8615f3f2
AM
7004/* Return the size required for the dynamic reloc entries. Any loadable
7005 section that was actually installed in the BFD, and has type SHT_REL
7006 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
7007 dynamic reloc section. */
252b5132
RH
7008
7009long
217aa764 7010_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
7011{
7012 long ret;
7013 asection *s;
7014
7015 if (elf_dynsymtab (abfd) == 0)
7016 {
7017 bfd_set_error (bfd_error_invalid_operation);
7018 return -1;
7019 }
7020
7021 ret = sizeof (arelent *);
7022 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 7023 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7024 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7025 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 7026 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
7027 * sizeof (arelent *));
7028
7029 return ret;
7030}
7031
8615f3f2
AM
7032/* Canonicalize the dynamic relocation entries. Note that we return the
7033 dynamic relocations as a single block, although they are actually
7034 associated with particular sections; the interface, which was
7035 designed for SunOS style shared libraries, expects that there is only
7036 one set of dynamic relocs. Any loadable section that was actually
7037 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
7038 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
7039
7040long
217aa764
AM
7041_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
7042 arelent **storage,
7043 asymbol **syms)
252b5132 7044{
217aa764 7045 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
7046 asection *s;
7047 long ret;
7048
7049 if (elf_dynsymtab (abfd) == 0)
7050 {
7051 bfd_set_error (bfd_error_invalid_operation);
7052 return -1;
7053 }
7054
7055 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
7056 ret = 0;
7057 for (s = abfd->sections; s != NULL; s = s->next)
7058 {
266b05cf 7059 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
7060 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
7061 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
7062 {
7063 arelent *p;
7064 long count, i;
7065
b34976b6 7066 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 7067 return -1;
eea6121a 7068 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
7069 p = s->relocation;
7070 for (i = 0; i < count; i++)
7071 *storage++ = p++;
7072 ret += count;
7073 }
7074 }
7075
7076 *storage = NULL;
7077
7078 return ret;
7079}
7080\f
7081/* Read in the version information. */
7082
b34976b6 7083bfd_boolean
fc0e6df6 7084_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
7085{
7086 bfd_byte *contents = NULL;
fc0e6df6
PB
7087 unsigned int freeidx = 0;
7088
7089 if (elf_dynverref (abfd) != 0)
7090 {
7091 Elf_Internal_Shdr *hdr;
7092 Elf_External_Verneed *everneed;
7093 Elf_Internal_Verneed *iverneed;
7094 unsigned int i;
d0fb9a8d 7095 bfd_byte *contents_end;
fc0e6df6
PB
7096
7097 hdr = &elf_tdata (abfd)->dynverref_hdr;
7098
a50b1753
NC
7099 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
7100 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
fc0e6df6
PB
7101 if (elf_tdata (abfd)->verref == NULL)
7102 goto error_return;
7103
7104 elf_tdata (abfd)->cverrefs = hdr->sh_info;
7105
a50b1753 7106 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
fc0e6df6 7107 if (contents == NULL)
d0fb9a8d
JJ
7108 {
7109error_return_verref:
7110 elf_tdata (abfd)->verref = NULL;
7111 elf_tdata (abfd)->cverrefs = 0;
7112 goto error_return;
7113 }
fc0e6df6
PB
7114 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
7115 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 7116 goto error_return_verref;
fc0e6df6 7117
d0fb9a8d
JJ
7118 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verneed))
7119 goto error_return_verref;
7120
7121 BFD_ASSERT (sizeof (Elf_External_Verneed)
7122 == sizeof (Elf_External_Vernaux));
7123 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
7124 everneed = (Elf_External_Verneed *) contents;
7125 iverneed = elf_tdata (abfd)->verref;
7126 for (i = 0; i < hdr->sh_info; i++, iverneed++)
7127 {
7128 Elf_External_Vernaux *evernaux;
7129 Elf_Internal_Vernaux *ivernaux;
7130 unsigned int j;
7131
7132 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
7133
7134 iverneed->vn_bfd = abfd;
7135
7136 iverneed->vn_filename =
7137 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7138 iverneed->vn_file);
7139 if (iverneed->vn_filename == NULL)
d0fb9a8d 7140 goto error_return_verref;
fc0e6df6 7141
d0fb9a8d
JJ
7142 if (iverneed->vn_cnt == 0)
7143 iverneed->vn_auxptr = NULL;
7144 else
7145 {
a50b1753
NC
7146 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
7147 bfd_alloc2 (abfd, iverneed->vn_cnt,
7148 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
7149 if (iverneed->vn_auxptr == NULL)
7150 goto error_return_verref;
7151 }
7152
7153 if (iverneed->vn_aux
7154 > (size_t) (contents_end - (bfd_byte *) everneed))
7155 goto error_return_verref;
fc0e6df6
PB
7156
7157 evernaux = ((Elf_External_Vernaux *)
7158 ((bfd_byte *) everneed + iverneed->vn_aux));
7159 ivernaux = iverneed->vn_auxptr;
7160 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
7161 {
7162 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
7163
7164 ivernaux->vna_nodename =
7165 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7166 ivernaux->vna_name);
7167 if (ivernaux->vna_nodename == NULL)
d0fb9a8d 7168 goto error_return_verref;
fc0e6df6
PB
7169
7170 if (j + 1 < iverneed->vn_cnt)
7171 ivernaux->vna_nextptr = ivernaux + 1;
7172 else
7173 ivernaux->vna_nextptr = NULL;
7174
d0fb9a8d
JJ
7175 if (ivernaux->vna_next
7176 > (size_t) (contents_end - (bfd_byte *) evernaux))
7177 goto error_return_verref;
7178
fc0e6df6
PB
7179 evernaux = ((Elf_External_Vernaux *)
7180 ((bfd_byte *) evernaux + ivernaux->vna_next));
7181
7182 if (ivernaux->vna_other > freeidx)
7183 freeidx = ivernaux->vna_other;
7184 }
7185
7186 if (i + 1 < hdr->sh_info)
7187 iverneed->vn_nextref = iverneed + 1;
7188 else
7189 iverneed->vn_nextref = NULL;
7190
d0fb9a8d
JJ
7191 if (iverneed->vn_next
7192 > (size_t) (contents_end - (bfd_byte *) everneed))
7193 goto error_return_verref;
7194
fc0e6df6
PB
7195 everneed = ((Elf_External_Verneed *)
7196 ((bfd_byte *) everneed + iverneed->vn_next));
7197 }
7198
7199 free (contents);
7200 contents = NULL;
7201 }
252b5132
RH
7202
7203 if (elf_dynverdef (abfd) != 0)
7204 {
7205 Elf_Internal_Shdr *hdr;
7206 Elf_External_Verdef *everdef;
7207 Elf_Internal_Verdef *iverdef;
f631889e
UD
7208 Elf_Internal_Verdef *iverdefarr;
7209 Elf_Internal_Verdef iverdefmem;
252b5132 7210 unsigned int i;
062e2358 7211 unsigned int maxidx;
d0fb9a8d 7212 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
7213
7214 hdr = &elf_tdata (abfd)->dynverdef_hdr;
7215
a50b1753 7216 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132
RH
7217 if (contents == NULL)
7218 goto error_return;
7219 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 7220 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
252b5132
RH
7221 goto error_return;
7222
d0fb9a8d
JJ
7223 if (hdr->sh_info && hdr->sh_size < sizeof (Elf_External_Verdef))
7224 goto error_return;
7225
7226 BFD_ASSERT (sizeof (Elf_External_Verdef)
7227 >= sizeof (Elf_External_Verdaux));
7228 contents_end_def = contents + hdr->sh_size
7229 - sizeof (Elf_External_Verdef);
7230 contents_end_aux = contents + hdr->sh_size
7231 - sizeof (Elf_External_Verdaux);
7232
f631889e
UD
7233 /* We know the number of entries in the section but not the maximum
7234 index. Therefore we have to run through all entries and find
7235 the maximum. */
252b5132 7236 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
7237 maxidx = 0;
7238 for (i = 0; i < hdr->sh_info; ++i)
7239 {
7240 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7241
062e2358
AM
7242 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
7243 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 7244
d0fb9a8d
JJ
7245 if (iverdefmem.vd_next
7246 > (size_t) (contents_end_def - (bfd_byte *) everdef))
7247 goto error_return;
7248
f631889e
UD
7249 everdef = ((Elf_External_Verdef *)
7250 ((bfd_byte *) everdef + iverdefmem.vd_next));
7251 }
7252
fc0e6df6
PB
7253 if (default_imported_symver)
7254 {
7255 if (freeidx > maxidx)
7256 maxidx = ++freeidx;
7257 else
7258 freeidx = ++maxidx;
7259 }
a50b1753
NC
7260 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7261 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e
UD
7262 if (elf_tdata (abfd)->verdef == NULL)
7263 goto error_return;
7264
7265 elf_tdata (abfd)->cverdefs = maxidx;
7266
7267 everdef = (Elf_External_Verdef *) contents;
7268 iverdefarr = elf_tdata (abfd)->verdef;
7269 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
7270 {
7271 Elf_External_Verdaux *everdaux;
7272 Elf_Internal_Verdaux *iverdaux;
7273 unsigned int j;
7274
f631889e
UD
7275 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
7276
d0fb9a8d
JJ
7277 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
7278 {
7279error_return_verdef:
7280 elf_tdata (abfd)->verdef = NULL;
7281 elf_tdata (abfd)->cverdefs = 0;
7282 goto error_return;
7283 }
7284
f631889e
UD
7285 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
7286 memcpy (iverdef, &iverdefmem, sizeof (Elf_Internal_Verdef));
252b5132
RH
7287
7288 iverdef->vd_bfd = abfd;
7289
d0fb9a8d
JJ
7290 if (iverdef->vd_cnt == 0)
7291 iverdef->vd_auxptr = NULL;
7292 else
7293 {
a50b1753
NC
7294 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7295 bfd_alloc2 (abfd, iverdef->vd_cnt,
7296 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7297 if (iverdef->vd_auxptr == NULL)
7298 goto error_return_verdef;
7299 }
7300
7301 if (iverdef->vd_aux
7302 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
7303 goto error_return_verdef;
252b5132
RH
7304
7305 everdaux = ((Elf_External_Verdaux *)
7306 ((bfd_byte *) everdef + iverdef->vd_aux));
7307 iverdaux = iverdef->vd_auxptr;
7308 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
7309 {
7310 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
7311
7312 iverdaux->vda_nodename =
7313 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
7314 iverdaux->vda_name);
7315 if (iverdaux->vda_nodename == NULL)
d0fb9a8d 7316 goto error_return_verdef;
252b5132
RH
7317
7318 if (j + 1 < iverdef->vd_cnt)
7319 iverdaux->vda_nextptr = iverdaux + 1;
7320 else
7321 iverdaux->vda_nextptr = NULL;
7322
d0fb9a8d
JJ
7323 if (iverdaux->vda_next
7324 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
7325 goto error_return_verdef;
7326
252b5132
RH
7327 everdaux = ((Elf_External_Verdaux *)
7328 ((bfd_byte *) everdaux + iverdaux->vda_next));
7329 }
7330
d0fb9a8d
JJ
7331 if (iverdef->vd_cnt)
7332 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 7333
d0fb9a8d 7334 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132
RH
7335 iverdef->vd_nextdef = iverdef + 1;
7336 else
7337 iverdef->vd_nextdef = NULL;
7338
7339 everdef = ((Elf_External_Verdef *)
7340 ((bfd_byte *) everdef + iverdef->vd_next));
7341 }
7342
7343 free (contents);
7344 contents = NULL;
7345 }
fc0e6df6 7346 else if (default_imported_symver)
252b5132 7347 {
fc0e6df6
PB
7348 if (freeidx < 3)
7349 freeidx = 3;
7350 else
7351 freeidx++;
252b5132 7352
a50b1753
NC
7353 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
7354 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 7355 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
7356 goto error_return;
7357
fc0e6df6
PB
7358 elf_tdata (abfd)->cverdefs = freeidx;
7359 }
252b5132 7360
fc0e6df6
PB
7361 /* Create a default version based on the soname. */
7362 if (default_imported_symver)
7363 {
7364 Elf_Internal_Verdef *iverdef;
7365 Elf_Internal_Verdaux *iverdaux;
252b5132 7366
fc0e6df6 7367 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];;
252b5132 7368
fc0e6df6
PB
7369 iverdef->vd_version = VER_DEF_CURRENT;
7370 iverdef->vd_flags = 0;
7371 iverdef->vd_ndx = freeidx;
7372 iverdef->vd_cnt = 1;
252b5132 7373
fc0e6df6 7374 iverdef->vd_bfd = abfd;
252b5132 7375
fc0e6df6
PB
7376 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
7377 if (iverdef->vd_nodename == NULL)
d0fb9a8d 7378 goto error_return_verdef;
fc0e6df6 7379 iverdef->vd_nextdef = NULL;
a50b1753
NC
7380 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
7381 bfd_alloc (abfd, sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
7382 if (iverdef->vd_auxptr == NULL)
7383 goto error_return_verdef;
252b5132 7384
fc0e6df6
PB
7385 iverdaux = iverdef->vd_auxptr;
7386 iverdaux->vda_nodename = iverdef->vd_nodename;
7387 iverdaux->vda_nextptr = NULL;
252b5132
RH
7388 }
7389
b34976b6 7390 return TRUE;
252b5132
RH
7391
7392 error_return:
5ed6aba4 7393 if (contents != NULL)
252b5132 7394 free (contents);
b34976b6 7395 return FALSE;
252b5132
RH
7396}
7397\f
7398asymbol *
217aa764 7399_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
7400{
7401 elf_symbol_type *newsym;
dc810e39 7402 bfd_size_type amt = sizeof (elf_symbol_type);
252b5132 7403
a50b1753 7404 newsym = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132
RH
7405 if (!newsym)
7406 return NULL;
7407 else
7408 {
7409 newsym->symbol.the_bfd = abfd;
7410 return &newsym->symbol;
7411 }
7412}
7413
7414void
217aa764
AM
7415_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
7416 asymbol *symbol,
7417 symbol_info *ret)
252b5132
RH
7418{
7419 bfd_symbol_info (symbol, ret);
7420}
7421
7422/* Return whether a symbol name implies a local symbol. Most targets
7423 use this function for the is_local_label_name entry point, but some
7424 override it. */
7425
b34976b6 7426bfd_boolean
217aa764
AM
7427_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
7428 const char *name)
252b5132
RH
7429{
7430 /* Normal local symbols start with ``.L''. */
7431 if (name[0] == '.' && name[1] == 'L')
b34976b6 7432 return TRUE;
252b5132
RH
7433
7434 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
7435 DWARF debugging symbols starting with ``..''. */
7436 if (name[0] == '.' && name[1] == '.')
b34976b6 7437 return TRUE;
252b5132
RH
7438
7439 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
7440 emitting DWARF debugging output. I suspect this is actually a
7441 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
7442 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
7443 underscore to be emitted on some ELF targets). For ease of use,
7444 we treat such symbols as local. */
7445 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 7446 return TRUE;
252b5132 7447
b34976b6 7448 return FALSE;
252b5132
RH
7449}
7450
7451alent *
217aa764
AM
7452_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
7453 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
7454{
7455 abort ();
7456 return NULL;
7457}
7458
b34976b6 7459bfd_boolean
217aa764
AM
7460_bfd_elf_set_arch_mach (bfd *abfd,
7461 enum bfd_architecture arch,
7462 unsigned long machine)
252b5132
RH
7463{
7464 /* If this isn't the right architecture for this backend, and this
7465 isn't the generic backend, fail. */
7466 if (arch != get_elf_backend_data (abfd)->arch
7467 && arch != bfd_arch_unknown
7468 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 7469 return FALSE;
252b5132
RH
7470
7471 return bfd_default_set_arch_mach (abfd, arch, machine);
7472}
7473
d1fad7c6
NC
7474/* Find the function to a particular section and offset,
7475 for error reporting. */
252b5132 7476
b34976b6 7477static bfd_boolean
b9d678e0 7478elf_find_function (bfd *abfd,
217aa764
AM
7479 asection *section,
7480 asymbol **symbols,
7481 bfd_vma offset,
7482 const char **filename_ptr,
7483 const char **functionname_ptr)
252b5132 7484{
aef36ac1
AM
7485 static asection *last_section;
7486 static asymbol *func;
7487 static const char *filename;
7488 static bfd_size_type func_size;
252b5132 7489
a06c7d5a
NC
7490 if (symbols == NULL)
7491 return FALSE;
7492
aef36ac1
AM
7493 if (last_section != section
7494 || func == NULL
7495 || offset < func->value
7496 || offset >= func->value + func_size)
7497 {
7498 asymbol *file;
7499 bfd_vma low_func;
7500 asymbol **p;
7501 /* ??? Given multiple file symbols, it is impossible to reliably
7502 choose the right file name for global symbols. File symbols are
7503 local symbols, and thus all file symbols must sort before any
7504 global symbols. The ELF spec may be interpreted to say that a
7505 file symbol must sort before other local symbols, but currently
7506 ld -r doesn't do this. So, for ld -r output, it is possible to
7507 make a better choice of file name for local symbols by ignoring
7508 file symbols appearing after a given local symbol. */
7509 enum { nothing_seen, symbol_seen, file_after_symbol_seen } state;
7510 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7511
7512 filename = NULL;
7513 func = NULL;
7514 file = NULL;
7515 low_func = 0;
7516 state = nothing_seen;
7517 func_size = 0;
7518 last_section = section;
7519
7520 for (p = symbols; *p != NULL; p++)
7521 {
7522 asymbol *sym = *p;
7523 bfd_vma code_off;
7524 bfd_size_type size;
7525
7526 if ((sym->flags & BSF_FILE) != 0)
7527 {
7528 file = sym;
7529 if (state == symbol_seen)
7530 state = file_after_symbol_seen;
7531 continue;
7532 }
ff9e0f5b 7533
aef36ac1
AM
7534 size = bed->maybe_function_sym (sym, section, &code_off);
7535 if (size != 0
7536 && code_off <= offset
7537 && (code_off > low_func
7538 || (code_off == low_func
7539 && size > func_size)))
7540 {
7541 func = sym;
7542 func_size = size;
7543 low_func = code_off;
7544 filename = NULL;
7545 if (file != NULL
7546 && ((sym->flags & BSF_LOCAL) != 0
7547 || state != file_after_symbol_seen))
7548 filename = bfd_asymbol_name (file);
7549 }
7550 if (state == nothing_seen)
7551 state = symbol_seen;
252b5132
RH
7552 }
7553 }
7554
7555 if (func == NULL)
b34976b6 7556 return FALSE;
252b5132 7557
d1fad7c6
NC
7558 if (filename_ptr)
7559 *filename_ptr = filename;
7560 if (functionname_ptr)
7561 *functionname_ptr = bfd_asymbol_name (func);
7562
b34976b6 7563 return TRUE;
d1fad7c6
NC
7564}
7565
7566/* Find the nearest line to a particular section and offset,
7567 for error reporting. */
7568
b34976b6 7569bfd_boolean
217aa764
AM
7570_bfd_elf_find_nearest_line (bfd *abfd,
7571 asection *section,
7572 asymbol **symbols,
7573 bfd_vma offset,
7574 const char **filename_ptr,
7575 const char **functionname_ptr,
7576 unsigned int *line_ptr)
9b8d1a36
CC
7577{
7578 return _bfd_elf_find_nearest_line_discriminator (abfd, section, symbols,
7579 offset, filename_ptr,
7580 functionname_ptr,
7581 line_ptr,
7582 NULL);
7583}
7584
7585bfd_boolean
7586_bfd_elf_find_nearest_line_discriminator (bfd *abfd,
7587 asection *section,
7588 asymbol **symbols,
7589 bfd_vma offset,
7590 const char **filename_ptr,
7591 const char **functionname_ptr,
7592 unsigned int *line_ptr,
7593 unsigned int *discriminator_ptr)
d1fad7c6 7594{
b34976b6 7595 bfd_boolean found;
d1fad7c6
NC
7596
7597 if (_bfd_dwarf1_find_nearest_line (abfd, section, symbols, offset,
4e8a9624
AM
7598 filename_ptr, functionname_ptr,
7599 line_ptr))
d1fad7c6
NC
7600 {
7601 if (!*functionname_ptr)
4e8a9624
AM
7602 elf_find_function (abfd, section, symbols, offset,
7603 *filename_ptr ? NULL : filename_ptr,
7604 functionname_ptr);
7605
b34976b6 7606 return TRUE;
d1fad7c6
NC
7607 }
7608
fc28f9aa
TG
7609 if (_bfd_dwarf2_find_nearest_line (abfd, dwarf_debug_sections,
7610 section, symbols, offset,
4e8a9624 7611 filename_ptr, functionname_ptr,
9b8d1a36 7612 line_ptr, discriminator_ptr, 0,
4e8a9624 7613 &elf_tdata (abfd)->dwarf2_find_line_info))
d1fad7c6
NC
7614 {
7615 if (!*functionname_ptr)
4e8a9624
AM
7616 elf_find_function (abfd, section, symbols, offset,
7617 *filename_ptr ? NULL : filename_ptr,
7618 functionname_ptr);
7619
b34976b6 7620 return TRUE;
d1fad7c6
NC
7621 }
7622
7623 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
7624 &found, filename_ptr,
7625 functionname_ptr, line_ptr,
7626 &elf_tdata (abfd)->line_info))
b34976b6 7627 return FALSE;
dc43ada5 7628 if (found && (*functionname_ptr || *line_ptr))
b34976b6 7629 return TRUE;
d1fad7c6
NC
7630
7631 if (symbols == NULL)
b34976b6 7632 return FALSE;
d1fad7c6
NC
7633
7634 if (! elf_find_function (abfd, section, symbols, offset,
4e8a9624 7635 filename_ptr, functionname_ptr))
b34976b6 7636 return FALSE;
d1fad7c6 7637
252b5132 7638 *line_ptr = 0;
b34976b6 7639 return TRUE;
252b5132
RH
7640}
7641
5420f73d
L
7642/* Find the line for a symbol. */
7643
7644bfd_boolean
7645_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
7646 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36
CC
7647{
7648 return _bfd_elf_find_line_discriminator (abfd, symbols, symbol,
7649 filename_ptr, line_ptr,
7650 NULL);
7651}
7652
7653bfd_boolean
7654_bfd_elf_find_line_discriminator (bfd *abfd, asymbol **symbols, asymbol *symbol,
7655 const char **filename_ptr,
7656 unsigned int *line_ptr,
7657 unsigned int *discriminator_ptr)
5420f73d
L
7658{
7659 return _bfd_dwarf2_find_line (abfd, symbols, symbol,
9b8d1a36 7660 filename_ptr, line_ptr, discriminator_ptr, 0,
5420f73d
L
7661 &elf_tdata (abfd)->dwarf2_find_line_info);
7662}
7663
4ab527b0
FF
7664/* After a call to bfd_find_nearest_line, successive calls to
7665 bfd_find_inliner_info can be used to get source information about
7666 each level of function inlining that terminated at the address
7667 passed to bfd_find_nearest_line. Currently this is only supported
7668 for DWARF2 with appropriate DWARF3 extensions. */
7669
7670bfd_boolean
7671_bfd_elf_find_inliner_info (bfd *abfd,
7672 const char **filename_ptr,
7673 const char **functionname_ptr,
7674 unsigned int *line_ptr)
7675{
7676 bfd_boolean found;
7677 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
7678 functionname_ptr, line_ptr,
7679 & elf_tdata (abfd)->dwarf2_find_line_info);
7680 return found;
7681}
7682
252b5132 7683int
a6b96beb 7684_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 7685{
8ded5a0f
AM
7686 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7687 int ret = bed->s->sizeof_ehdr;
252b5132 7688
a6b96beb 7689 if (!info->relocatable)
8ded5a0f 7690 {
62d7a5f6 7691 bfd_size_type phdr_size = elf_tdata (abfd)->program_header_size;
8ded5a0f 7692
62d7a5f6
AM
7693 if (phdr_size == (bfd_size_type) -1)
7694 {
7695 struct elf_segment_map *m;
7696
7697 phdr_size = 0;
7698 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
7699 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 7700
62d7a5f6
AM
7701 if (phdr_size == 0)
7702 phdr_size = get_program_header_size (abfd, info);
7703 }
8ded5a0f
AM
7704
7705 elf_tdata (abfd)->program_header_size = phdr_size;
7706 ret += phdr_size;
7707 }
7708
252b5132
RH
7709 return ret;
7710}
7711
b34976b6 7712bfd_boolean
217aa764
AM
7713_bfd_elf_set_section_contents (bfd *abfd,
7714 sec_ptr section,
0f867abe 7715 const void *location,
217aa764
AM
7716 file_ptr offset,
7717 bfd_size_type count)
252b5132
RH
7718{
7719 Elf_Internal_Shdr *hdr;
dc810e39 7720 bfd_signed_vma pos;
252b5132
RH
7721
7722 if (! abfd->output_has_begun
217aa764 7723 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 7724 return FALSE;
252b5132
RH
7725
7726 hdr = &elf_section_data (section)->this_hdr;
dc810e39
AM
7727 pos = hdr->sh_offset + offset;
7728 if (bfd_seek (abfd, pos, SEEK_SET) != 0
7729 || bfd_bwrite (location, count, abfd) != count)
b34976b6 7730 return FALSE;
252b5132 7731
b34976b6 7732 return TRUE;
252b5132
RH
7733}
7734
7735void
217aa764
AM
7736_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
7737 arelent *cache_ptr ATTRIBUTE_UNUSED,
7738 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
7739{
7740 abort ();
7741}
7742
252b5132
RH
7743/* Try to convert a non-ELF reloc into an ELF one. */
7744
b34976b6 7745bfd_boolean
217aa764 7746_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 7747{
c044fabd 7748 /* Check whether we really have an ELF howto. */
252b5132
RH
7749
7750 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
7751 {
7752 bfd_reloc_code_real_type code;
7753 reloc_howto_type *howto;
7754
7755 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 7756 equivalent ELF reloc. */
252b5132
RH
7757
7758 if (areloc->howto->pc_relative)
7759 {
7760 switch (areloc->howto->bitsize)
7761 {
7762 case 8:
7763 code = BFD_RELOC_8_PCREL;
7764 break;
7765 case 12:
7766 code = BFD_RELOC_12_PCREL;
7767 break;
7768 case 16:
7769 code = BFD_RELOC_16_PCREL;
7770 break;
7771 case 24:
7772 code = BFD_RELOC_24_PCREL;
7773 break;
7774 case 32:
7775 code = BFD_RELOC_32_PCREL;
7776 break;
7777 case 64:
7778 code = BFD_RELOC_64_PCREL;
7779 break;
7780 default:
7781 goto fail;
7782 }
7783
7784 howto = bfd_reloc_type_lookup (abfd, code);
7785
7786 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
7787 {
7788 if (howto->pcrel_offset)
7789 areloc->addend += areloc->address;
7790 else
7791 areloc->addend -= areloc->address; /* addend is unsigned!! */
7792 }
7793 }
7794 else
7795 {
7796 switch (areloc->howto->bitsize)
7797 {
7798 case 8:
7799 code = BFD_RELOC_8;
7800 break;
7801 case 14:
7802 code = BFD_RELOC_14;
7803 break;
7804 case 16:
7805 code = BFD_RELOC_16;
7806 break;
7807 case 26:
7808 code = BFD_RELOC_26;
7809 break;
7810 case 32:
7811 code = BFD_RELOC_32;
7812 break;
7813 case 64:
7814 code = BFD_RELOC_64;
7815 break;
7816 default:
7817 goto fail;
7818 }
7819
7820 howto = bfd_reloc_type_lookup (abfd, code);
7821 }
7822
7823 if (howto)
7824 areloc->howto = howto;
7825 else
7826 goto fail;
7827 }
7828
b34976b6 7829 return TRUE;
252b5132
RH
7830
7831 fail:
7832 (*_bfd_error_handler)
d003868e
AM
7833 (_("%B: unsupported relocation type %s"),
7834 abfd, areloc->howto->name);
252b5132 7835 bfd_set_error (bfd_error_bad_value);
b34976b6 7836 return FALSE;
252b5132
RH
7837}
7838
b34976b6 7839bfd_boolean
217aa764 7840_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 7841{
d9071b0c
TG
7842 struct elf_obj_tdata *tdata = elf_tdata (abfd);
7843 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 7844 {
d9071b0c 7845 if (elf_shstrtab (abfd) != NULL)
2b0f7ef9 7846 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 7847 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
7848 }
7849
7850 return _bfd_generic_close_and_cleanup (abfd);
7851}
7852
7853/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
7854 in the relocation's offset. Thus we cannot allow any sort of sanity
7855 range-checking to interfere. There is nothing else to do in processing
7856 this reloc. */
7857
7858bfd_reloc_status_type
217aa764
AM
7859_bfd_elf_rel_vtable_reloc_fn
7860 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 7861 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
7862 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
7863 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
7864{
7865 return bfd_reloc_ok;
7866}
252b5132
RH
7867\f
7868/* Elf core file support. Much of this only works on native
7869 toolchains, since we rely on knowing the
7870 machine-dependent procfs structure in order to pick
c044fabd 7871 out details about the corefile. */
252b5132
RH
7872
7873#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
7874/* Needed for new procfs interface on sparc-solaris. */
7875# define _STRUCTURED_PROC 1
252b5132
RH
7876# include <sys/procfs.h>
7877#endif
7878
261b8d08
PA
7879/* Return a PID that identifies a "thread" for threaded cores, or the
7880 PID of the main process for non-threaded cores. */
252b5132
RH
7881
7882static int
217aa764 7883elfcore_make_pid (bfd *abfd)
252b5132 7884{
261b8d08
PA
7885 int pid;
7886
7887 pid = elf_tdata (abfd)->core_lwpid;
7888 if (pid == 0)
7889 pid = elf_tdata (abfd)->core_pid;
7890
7891 return pid;
252b5132
RH
7892}
7893
252b5132
RH
7894/* If there isn't a section called NAME, make one, using
7895 data from SECT. Note, this function will generate a
7896 reference to NAME, so you shouldn't deallocate or
c044fabd 7897 overwrite it. */
252b5132 7898
b34976b6 7899static bfd_boolean
217aa764 7900elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 7901{
c044fabd 7902 asection *sect2;
252b5132
RH
7903
7904 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 7905 return TRUE;
252b5132 7906
117ed4f8 7907 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 7908 if (sect2 == NULL)
b34976b6 7909 return FALSE;
252b5132 7910
eea6121a 7911 sect2->size = sect->size;
252b5132 7912 sect2->filepos = sect->filepos;
252b5132 7913 sect2->alignment_power = sect->alignment_power;
b34976b6 7914 return TRUE;
252b5132
RH
7915}
7916
bb0082d6
AM
7917/* Create a pseudosection containing SIZE bytes at FILEPOS. This
7918 actually creates up to two pseudosections:
7919 - For the single-threaded case, a section named NAME, unless
7920 such a section already exists.
7921 - For the multi-threaded case, a section named "NAME/PID", where
7922 PID is elfcore_make_pid (abfd).
7923 Both pseudosections have identical contents. */
b34976b6 7924bfd_boolean
217aa764
AM
7925_bfd_elfcore_make_pseudosection (bfd *abfd,
7926 char *name,
7927 size_t size,
7928 ufile_ptr filepos)
bb0082d6
AM
7929{
7930 char buf[100];
7931 char *threaded_name;
d4c88bbb 7932 size_t len;
bb0082d6
AM
7933 asection *sect;
7934
7935 /* Build the section name. */
7936
7937 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 7938 len = strlen (buf) + 1;
a50b1753 7939 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 7940 if (threaded_name == NULL)
b34976b6 7941 return FALSE;
d4c88bbb 7942 memcpy (threaded_name, buf, len);
bb0082d6 7943
117ed4f8
AM
7944 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
7945 SEC_HAS_CONTENTS);
bb0082d6 7946 if (sect == NULL)
b34976b6 7947 return FALSE;
eea6121a 7948 sect->size = size;
bb0082d6 7949 sect->filepos = filepos;
bb0082d6
AM
7950 sect->alignment_power = 2;
7951
936e320b 7952 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
7953}
7954
252b5132 7955/* prstatus_t exists on:
4a938328 7956 solaris 2.5+
252b5132
RH
7957 linux 2.[01] + glibc
7958 unixware 4.2
7959*/
7960
7961#if defined (HAVE_PRSTATUS_T)
a7b97311 7962
b34976b6 7963static bfd_boolean
217aa764 7964elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 7965{
eea6121a 7966 size_t size;
7ee38065 7967 int offset;
252b5132 7968
4a938328
MS
7969 if (note->descsz == sizeof (prstatus_t))
7970 {
7971 prstatus_t prstat;
252b5132 7972
eea6121a 7973 size = sizeof (prstat.pr_reg);
7ee38065 7974 offset = offsetof (prstatus_t, pr_reg);
4a938328 7975 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 7976
fa49d224
NC
7977 /* Do not overwrite the core signal if it
7978 has already been set by another thread. */
7979 if (elf_tdata (abfd)->core_signal == 0)
7980 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
261b8d08
PA
7981 if (elf_tdata (abfd)->core_pid == 0)
7982 elf_tdata (abfd)->core_pid = prstat.pr_pid;
252b5132 7983
4a938328
MS
7984 /* pr_who exists on:
7985 solaris 2.5+
7986 unixware 4.2
7987 pr_who doesn't exist on:
7988 linux 2.[01]
7989 */
252b5132 7990#if defined (HAVE_PRSTATUS_T_PR_WHO)
4a938328 7991 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
261b8d08
PA
7992#else
7993 elf_tdata (abfd)->core_lwpid = prstat.pr_pid;
252b5132 7994#endif
4a938328 7995 }
7ee38065 7996#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
7997 else if (note->descsz == sizeof (prstatus32_t))
7998 {
7999 /* 64-bit host, 32-bit corefile */
8000 prstatus32_t prstat;
8001
eea6121a 8002 size = sizeof (prstat.pr_reg);
7ee38065 8003 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
8004 memcpy (&prstat, note->descdata, sizeof (prstat));
8005
fa49d224
NC
8006 /* Do not overwrite the core signal if it
8007 has already been set by another thread. */
8008 if (elf_tdata (abfd)->core_signal == 0)
8009 elf_tdata (abfd)->core_signal = prstat.pr_cursig;
261b8d08
PA
8010 if (elf_tdata (abfd)->core_pid == 0)
8011 elf_tdata (abfd)->core_pid = prstat.pr_pid;
4a938328
MS
8012
8013 /* pr_who exists on:
8014 solaris 2.5+
8015 unixware 4.2
8016 pr_who doesn't exist on:
8017 linux 2.[01]
8018 */
7ee38065 8019#if defined (HAVE_PRSTATUS32_T_PR_WHO)
4a938328 8020 elf_tdata (abfd)->core_lwpid = prstat.pr_who;
261b8d08
PA
8021#else
8022 elf_tdata (abfd)->core_lwpid = prstat.pr_pid;
4a938328
MS
8023#endif
8024 }
7ee38065 8025#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
8026 else
8027 {
8028 /* Fail - we don't know how to handle any other
8029 note size (ie. data object type). */
b34976b6 8030 return TRUE;
4a938328 8031 }
252b5132 8032
bb0082d6 8033 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 8034 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 8035 size, note->descpos + offset);
252b5132
RH
8036}
8037#endif /* defined (HAVE_PRSTATUS_T) */
8038
bb0082d6 8039/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 8040static bfd_boolean
217aa764
AM
8041elfcore_make_note_pseudosection (bfd *abfd,
8042 char *name,
8043 Elf_Internal_Note *note)
252b5132 8044{
936e320b
AM
8045 return _bfd_elfcore_make_pseudosection (abfd, name,
8046 note->descsz, note->descpos);
252b5132
RH
8047}
8048
ff08c6bb
JB
8049/* There isn't a consistent prfpregset_t across platforms,
8050 but it doesn't matter, because we don't have to pick this
c044fabd
KH
8051 data structure apart. */
8052
b34976b6 8053static bfd_boolean
217aa764 8054elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8055{
8056 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8057}
8058
ff08c6bb 8059/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 8060 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 8061 literally. */
c044fabd 8062
b34976b6 8063static bfd_boolean
217aa764 8064elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8065{
8066 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8067}
8068
4339cae0
L
8069/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
8070 with a note type of NT_X86_XSTATE. Just include the whole note's
8071 contents literally. */
8072
8073static bfd_boolean
8074elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
8075{
8076 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
8077}
8078
97753bd5
AM
8079static bfd_boolean
8080elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
8081{
8082 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
8083}
8084
89eeb0bc
LM
8085static bfd_boolean
8086elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
8087{
8088 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
8089}
97753bd5 8090
0675e188
UW
8091static bfd_boolean
8092elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
8093{
8094 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
8095}
8096
d7eeb400
MS
8097static bfd_boolean
8098elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
8099{
8100 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
8101}
8102
8103static bfd_boolean
8104elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
8105{
8106 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
8107}
8108
8109static bfd_boolean
8110elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
8111{
8112 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
8113}
8114
8115static bfd_boolean
8116elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
8117{
8118 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
8119}
8120
8121static bfd_boolean
8122elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
8123{
8124 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
8125}
8126
355b81d9
UW
8127static bfd_boolean
8128elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
8129{
8130 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
8131}
8132
8133static bfd_boolean
8134elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
8135{
8136 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
8137}
8138
faa9a424
UW
8139static bfd_boolean
8140elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
8141{
8142 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
8143}
8144
252b5132 8145#if defined (HAVE_PRPSINFO_T)
4a938328 8146typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 8147#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8148typedef prpsinfo32_t elfcore_psinfo32_t;
8149#endif
252b5132
RH
8150#endif
8151
8152#if defined (HAVE_PSINFO_T)
4a938328 8153typedef psinfo_t elfcore_psinfo_t;
7ee38065 8154#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
8155typedef psinfo32_t elfcore_psinfo32_t;
8156#endif
252b5132
RH
8157#endif
8158
252b5132
RH
8159/* return a malloc'ed copy of a string at START which is at
8160 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 8161 the copy will always have a terminating '\0'. */
252b5132 8162
936e320b 8163char *
217aa764 8164_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 8165{
dc810e39 8166 char *dups;
a50b1753 8167 char *end = (char *) memchr (start, '\0', max);
dc810e39 8168 size_t len;
252b5132
RH
8169
8170 if (end == NULL)
8171 len = max;
8172 else
8173 len = end - start;
8174
a50b1753 8175 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 8176 if (dups == NULL)
252b5132
RH
8177 return NULL;
8178
dc810e39
AM
8179 memcpy (dups, start, len);
8180 dups[len] = '\0';
252b5132 8181
dc810e39 8182 return dups;
252b5132
RH
8183}
8184
bb0082d6 8185#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 8186static bfd_boolean
217aa764 8187elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 8188{
4a938328
MS
8189 if (note->descsz == sizeof (elfcore_psinfo_t))
8190 {
8191 elfcore_psinfo_t psinfo;
252b5132 8192
7ee38065 8193 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8194
335e41d4 8195#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
bc989cdc 8196 elf_tdata (abfd)->core_pid = psinfo.pr_pid;
335e41d4 8197#endif
4a938328 8198 elf_tdata (abfd)->core_program
936e320b
AM
8199 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8200 sizeof (psinfo.pr_fname));
252b5132 8201
4a938328 8202 elf_tdata (abfd)->core_command
936e320b
AM
8203 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8204 sizeof (psinfo.pr_psargs));
4a938328 8205 }
7ee38065 8206#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
8207 else if (note->descsz == sizeof (elfcore_psinfo32_t))
8208 {
8209 /* 64-bit host, 32-bit corefile */
8210 elfcore_psinfo32_t psinfo;
8211
7ee38065 8212 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 8213
335e41d4 8214#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
bc989cdc 8215 elf_tdata (abfd)->core_pid = psinfo.pr_pid;
335e41d4 8216#endif
4a938328 8217 elf_tdata (abfd)->core_program
936e320b
AM
8218 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
8219 sizeof (psinfo.pr_fname));
4a938328
MS
8220
8221 elf_tdata (abfd)->core_command
936e320b
AM
8222 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
8223 sizeof (psinfo.pr_psargs));
4a938328
MS
8224 }
8225#endif
8226
8227 else
8228 {
8229 /* Fail - we don't know how to handle any other
8230 note size (ie. data object type). */
b34976b6 8231 return TRUE;
4a938328 8232 }
252b5132
RH
8233
8234 /* Note that for some reason, a spurious space is tacked
8235 onto the end of the args in some (at least one anyway)
c044fabd 8236 implementations, so strip it off if it exists. */
252b5132
RH
8237
8238 {
c044fabd 8239 char *command = elf_tdata (abfd)->core_command;
252b5132
RH
8240 int n = strlen (command);
8241
8242 if (0 < n && command[n - 1] == ' ')
8243 command[n - 1] = '\0';
8244 }
8245
b34976b6 8246 return TRUE;
252b5132
RH
8247}
8248#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
8249
252b5132 8250#if defined (HAVE_PSTATUS_T)
b34976b6 8251static bfd_boolean
217aa764 8252elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8253{
f572a39d
AM
8254 if (note->descsz == sizeof (pstatus_t)
8255#if defined (HAVE_PXSTATUS_T)
8256 || note->descsz == sizeof (pxstatus_t)
8257#endif
8258 )
4a938328
MS
8259 {
8260 pstatus_t pstat;
252b5132 8261
4a938328 8262 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8263
4a938328
MS
8264 elf_tdata (abfd)->core_pid = pstat.pr_pid;
8265 }
7ee38065 8266#if defined (HAVE_PSTATUS32_T)
4a938328
MS
8267 else if (note->descsz == sizeof (pstatus32_t))
8268 {
8269 /* 64-bit host, 32-bit corefile */
8270 pstatus32_t pstat;
252b5132 8271
4a938328 8272 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 8273
4a938328
MS
8274 elf_tdata (abfd)->core_pid = pstat.pr_pid;
8275 }
8276#endif
252b5132
RH
8277 /* Could grab some more details from the "representative"
8278 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 8279 NT_LWPSTATUS note, presumably. */
252b5132 8280
b34976b6 8281 return TRUE;
252b5132
RH
8282}
8283#endif /* defined (HAVE_PSTATUS_T) */
8284
252b5132 8285#if defined (HAVE_LWPSTATUS_T)
b34976b6 8286static bfd_boolean
217aa764 8287elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
8288{
8289 lwpstatus_t lwpstat;
8290 char buf[100];
c044fabd 8291 char *name;
d4c88bbb 8292 size_t len;
c044fabd 8293 asection *sect;
252b5132 8294
f572a39d
AM
8295 if (note->descsz != sizeof (lwpstat)
8296#if defined (HAVE_LWPXSTATUS_T)
8297 && note->descsz != sizeof (lwpxstatus_t)
8298#endif
8299 )
b34976b6 8300 return TRUE;
252b5132
RH
8301
8302 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
8303
8304 elf_tdata (abfd)->core_lwpid = lwpstat.pr_lwpid;
a1504221
JB
8305 /* Do not overwrite the core signal if it has already been set by
8306 another thread. */
8307 if (elf_tdata (abfd)->core_signal == 0)
8308 elf_tdata (abfd)->core_signal = lwpstat.pr_cursig;
252b5132 8309
c044fabd 8310 /* Make a ".reg/999" section. */
252b5132
RH
8311
8312 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 8313 len = strlen (buf) + 1;
217aa764 8314 name = bfd_alloc (abfd, len);
252b5132 8315 if (name == NULL)
b34976b6 8316 return FALSE;
d4c88bbb 8317 memcpy (name, buf, len);
252b5132 8318
117ed4f8 8319 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8320 if (sect == NULL)
b34976b6 8321 return FALSE;
252b5132
RH
8322
8323#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8324 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
8325 sect->filepos = note->descpos
8326 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
8327#endif
8328
8329#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 8330 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
8331 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
8332#endif
8333
252b5132
RH
8334 sect->alignment_power = 2;
8335
8336 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8337 return FALSE;
252b5132
RH
8338
8339 /* Make a ".reg2/999" section */
8340
8341 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 8342 len = strlen (buf) + 1;
217aa764 8343 name = bfd_alloc (abfd, len);
252b5132 8344 if (name == NULL)
b34976b6 8345 return FALSE;
d4c88bbb 8346 memcpy (name, buf, len);
252b5132 8347
117ed4f8 8348 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 8349 if (sect == NULL)
b34976b6 8350 return FALSE;
252b5132
RH
8351
8352#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 8353 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
8354 sect->filepos = note->descpos
8355 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
8356#endif
8357
8358#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 8359 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
8360 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
8361#endif
8362
252b5132
RH
8363 sect->alignment_power = 2;
8364
936e320b 8365 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
8366}
8367#endif /* defined (HAVE_LWPSTATUS_T) */
8368
b34976b6 8369static bfd_boolean
217aa764 8370elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
8371{
8372 char buf[30];
c044fabd 8373 char *name;
d4c88bbb 8374 size_t len;
c044fabd 8375 asection *sect;
4a6636fb
PA
8376 int type;
8377 int is_active_thread;
8378 bfd_vma base_addr;
16e9c715 8379
4a6636fb 8380 if (note->descsz < 728)
b34976b6 8381 return TRUE;
16e9c715 8382
4a6636fb
PA
8383 if (! CONST_STRNEQ (note->namedata, "win32"))
8384 return TRUE;
8385
8386 type = bfd_get_32 (abfd, note->descdata);
c044fabd 8387
4a6636fb 8388 switch (type)
16e9c715 8389 {
4a6636fb 8390 case 1 /* NOTE_INFO_PROCESS */:
16e9c715 8391 /* FIXME: need to add ->core_command. */
4a6636fb
PA
8392 /* process_info.pid */
8393 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 8);
8394 /* process_info.signal */
8395 elf_tdata (abfd)->core_signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 8396 break;
16e9c715 8397
4a6636fb 8398 case 2 /* NOTE_INFO_THREAD */:
16e9c715 8399 /* Make a ".reg/999" section. */
4a6636fb
PA
8400 /* thread_info.tid */
8401 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 8402
d4c88bbb 8403 len = strlen (buf) + 1;
a50b1753 8404 name = (char *) bfd_alloc (abfd, len);
16e9c715 8405 if (name == NULL)
b34976b6 8406 return FALSE;
c044fabd 8407
d4c88bbb 8408 memcpy (name, buf, len);
16e9c715 8409
117ed4f8 8410 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 8411 if (sect == NULL)
b34976b6 8412 return FALSE;
c044fabd 8413
4a6636fb
PA
8414 /* sizeof (thread_info.thread_context) */
8415 sect->size = 716;
8416 /* offsetof (thread_info.thread_context) */
8417 sect->filepos = note->descpos + 12;
16e9c715
NC
8418 sect->alignment_power = 2;
8419
4a6636fb
PA
8420 /* thread_info.is_active_thread */
8421 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
8422
8423 if (is_active_thread)
16e9c715 8424 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 8425 return FALSE;
16e9c715
NC
8426 break;
8427
4a6636fb 8428 case 3 /* NOTE_INFO_MODULE */:
16e9c715 8429 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
8430 /* module_info.base_address */
8431 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 8432 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 8433
d4c88bbb 8434 len = strlen (buf) + 1;
a50b1753 8435 name = (char *) bfd_alloc (abfd, len);
16e9c715 8436 if (name == NULL)
b34976b6 8437 return FALSE;
c044fabd 8438
d4c88bbb 8439 memcpy (name, buf, len);
252b5132 8440
117ed4f8 8441 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 8442
16e9c715 8443 if (sect == NULL)
b34976b6 8444 return FALSE;
c044fabd 8445
eea6121a 8446 sect->size = note->descsz;
16e9c715 8447 sect->filepos = note->descpos;
16e9c715
NC
8448 sect->alignment_power = 2;
8449 break;
8450
8451 default:
b34976b6 8452 return TRUE;
16e9c715
NC
8453 }
8454
b34976b6 8455 return TRUE;
16e9c715 8456}
252b5132 8457
b34976b6 8458static bfd_boolean
217aa764 8459elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 8460{
9c5bfbb7 8461 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 8462
252b5132
RH
8463 switch (note->type)
8464 {
8465 default:
b34976b6 8466 return TRUE;
252b5132 8467
252b5132 8468 case NT_PRSTATUS:
bb0082d6
AM
8469 if (bed->elf_backend_grok_prstatus)
8470 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 8471 return TRUE;
bb0082d6 8472#if defined (HAVE_PRSTATUS_T)
252b5132 8473 return elfcore_grok_prstatus (abfd, note);
bb0082d6 8474#else
b34976b6 8475 return TRUE;
252b5132
RH
8476#endif
8477
8478#if defined (HAVE_PSTATUS_T)
8479 case NT_PSTATUS:
8480 return elfcore_grok_pstatus (abfd, note);
8481#endif
8482
8483#if defined (HAVE_LWPSTATUS_T)
8484 case NT_LWPSTATUS:
8485 return elfcore_grok_lwpstatus (abfd, note);
8486#endif
8487
8488 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
8489 return elfcore_grok_prfpreg (abfd, note);
8490
c044fabd 8491 case NT_WIN32PSTATUS:
16e9c715 8492 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 8493
c044fabd 8494 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
8495 if (note->namesz == 6
8496 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
8497 return elfcore_grok_prxfpreg (abfd, note);
8498 else
b34976b6 8499 return TRUE;
ff08c6bb 8500
4339cae0
L
8501 case NT_X86_XSTATE: /* Linux XSAVE extension */
8502 if (note->namesz == 6
8503 && strcmp (note->namedata, "LINUX") == 0)
8504 return elfcore_grok_xstatereg (abfd, note);
8505 else
8506 return TRUE;
8507
97753bd5
AM
8508 case NT_PPC_VMX:
8509 if (note->namesz == 6
8510 && strcmp (note->namedata, "LINUX") == 0)
8511 return elfcore_grok_ppc_vmx (abfd, note);
8512 else
8513 return TRUE;
8514
89eeb0bc
LM
8515 case NT_PPC_VSX:
8516 if (note->namesz == 6
8517 && strcmp (note->namedata, "LINUX") == 0)
8518 return elfcore_grok_ppc_vsx (abfd, note);
8519 else
8520 return TRUE;
8521
0675e188
UW
8522 case NT_S390_HIGH_GPRS:
8523 if (note->namesz == 6
8524 && strcmp (note->namedata, "LINUX") == 0)
8525 return elfcore_grok_s390_high_gprs (abfd, note);
8526 else
8527 return TRUE;
8528
d7eeb400
MS
8529 case NT_S390_TIMER:
8530 if (note->namesz == 6
8531 && strcmp (note->namedata, "LINUX") == 0)
8532 return elfcore_grok_s390_timer (abfd, note);
8533 else
8534 return TRUE;
8535
8536 case NT_S390_TODCMP:
8537 if (note->namesz == 6
8538 && strcmp (note->namedata, "LINUX") == 0)
8539 return elfcore_grok_s390_todcmp (abfd, note);
8540 else
8541 return TRUE;
8542
8543 case NT_S390_TODPREG:
8544 if (note->namesz == 6
8545 && strcmp (note->namedata, "LINUX") == 0)
8546 return elfcore_grok_s390_todpreg (abfd, note);
8547 else
8548 return TRUE;
8549
8550 case NT_S390_CTRS:
8551 if (note->namesz == 6
8552 && strcmp (note->namedata, "LINUX") == 0)
8553 return elfcore_grok_s390_ctrs (abfd, note);
8554 else
8555 return TRUE;
8556
8557 case NT_S390_PREFIX:
8558 if (note->namesz == 6
8559 && strcmp (note->namedata, "LINUX") == 0)
8560 return elfcore_grok_s390_prefix (abfd, note);
8561 else
8562 return TRUE;
8563
355b81d9
UW
8564 case NT_S390_LAST_BREAK:
8565 if (note->namesz == 6
8566 && strcmp (note->namedata, "LINUX") == 0)
8567 return elfcore_grok_s390_last_break (abfd, note);
8568 else
8569 return TRUE;
8570
8571 case NT_S390_SYSTEM_CALL:
8572 if (note->namesz == 6
8573 && strcmp (note->namedata, "LINUX") == 0)
8574 return elfcore_grok_s390_system_call (abfd, note);
8575 else
8576 return TRUE;
8577
faa9a424
UW
8578 case NT_ARM_VFP:
8579 if (note->namesz == 6
8580 && strcmp (note->namedata, "LINUX") == 0)
8581 return elfcore_grok_arm_vfp (abfd, note);
8582 else
8583 return TRUE;
8584
252b5132
RH
8585 case NT_PRPSINFO:
8586 case NT_PSINFO:
bb0082d6
AM
8587 if (bed->elf_backend_grok_psinfo)
8588 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 8589 return TRUE;
bb0082d6 8590#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 8591 return elfcore_grok_psinfo (abfd, note);
bb0082d6 8592#else
b34976b6 8593 return TRUE;
252b5132 8594#endif
3333a7c3
RM
8595
8596 case NT_AUXV:
8597 {
117ed4f8
AM
8598 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8599 SEC_HAS_CONTENTS);
3333a7c3
RM
8600
8601 if (sect == NULL)
8602 return FALSE;
eea6121a 8603 sect->size = note->descsz;
3333a7c3 8604 sect->filepos = note->descpos;
3333a7c3
RM
8605 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8606
8607 return TRUE;
8608 }
252b5132
RH
8609 }
8610}
8611
718175fa
JK
8612static bfd_boolean
8613elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
8614{
8615 elf_tdata (abfd)->build_id_size = note->descsz;
a50b1753 8616 elf_tdata (abfd)->build_id = (bfd_byte *) bfd_alloc (abfd, note->descsz);
718175fa
JK
8617 if (elf_tdata (abfd)->build_id == NULL)
8618 return FALSE;
8619
8620 memcpy (elf_tdata (abfd)->build_id, note->descdata, note->descsz);
8621
8622 return TRUE;
8623}
8624
8625static bfd_boolean
8626elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
8627{
8628 switch (note->type)
8629 {
8630 default:
8631 return TRUE;
8632
8633 case NT_GNU_BUILD_ID:
8634 return elfobj_grok_gnu_build_id (abfd, note);
8635 }
8636}
8637
e21e5835
NC
8638static bfd_boolean
8639elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
8640{
8641 struct sdt_note *cur =
8642 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
8643 + note->descsz);
8644
8645 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
8646 cur->size = (bfd_size_type) note->descsz;
8647 memcpy (cur->data, note->descdata, note->descsz);
8648
8649 elf_tdata (abfd)->sdt_note_head = cur;
8650
8651 return TRUE;
8652}
8653
8654static bfd_boolean
8655elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
8656{
8657 switch (note->type)
8658 {
8659 case NT_STAPSDT:
8660 return elfobj_grok_stapsdt_note_1 (abfd, note);
8661
8662 default:
8663 return TRUE;
8664 }
8665}
8666
b34976b6 8667static bfd_boolean
217aa764 8668elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
8669{
8670 char *cp;
8671
8672 cp = strchr (note->namedata, '@');
8673 if (cp != NULL)
8674 {
d2b64500 8675 *lwpidp = atoi(cp + 1);
b34976b6 8676 return TRUE;
50b2bdb7 8677 }
b34976b6 8678 return FALSE;
50b2bdb7
AM
8679}
8680
b34976b6 8681static bfd_boolean
217aa764 8682elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 8683{
50b2bdb7
AM
8684 /* Signal number at offset 0x08. */
8685 elf_tdata (abfd)->core_signal
8686 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8687
8688 /* Process ID at offset 0x50. */
8689 elf_tdata (abfd)->core_pid
8690 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
8691
8692 /* Command name at 0x7c (max 32 bytes, including nul). */
8693 elf_tdata (abfd)->core_command
8694 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
8695
7720ba9f
MK
8696 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
8697 note);
50b2bdb7
AM
8698}
8699
b34976b6 8700static bfd_boolean
217aa764 8701elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
8702{
8703 int lwp;
8704
8705 if (elfcore_netbsd_get_lwpid (note, &lwp))
8706 elf_tdata (abfd)->core_lwpid = lwp;
8707
b4db1224 8708 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
8709 {
8710 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
8711 find this note before any of the others, which is fine,
8712 since the kernel writes this note out first when it
8713 creates a core file. */
47d9a591 8714
50b2bdb7
AM
8715 return elfcore_grok_netbsd_procinfo (abfd, note);
8716 }
8717
b4db1224
JT
8718 /* As of Jan 2002 there are no other machine-independent notes
8719 defined for NetBSD core files. If the note type is less
8720 than the start of the machine-dependent note types, we don't
8721 understand it. */
47d9a591 8722
b4db1224 8723 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 8724 return TRUE;
50b2bdb7
AM
8725
8726
8727 switch (bfd_get_arch (abfd))
8728 {
08a40648
AM
8729 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
8730 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
8731
8732 case bfd_arch_alpha:
8733 case bfd_arch_sparc:
8734 switch (note->type)
08a40648
AM
8735 {
8736 case NT_NETBSDCORE_FIRSTMACH+0:
8737 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8738
08a40648
AM
8739 case NT_NETBSDCORE_FIRSTMACH+2:
8740 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8741
08a40648
AM
8742 default:
8743 return TRUE;
8744 }
50b2bdb7 8745
08a40648
AM
8746 /* On all other arch's, PT_GETREGS == mach+1 and
8747 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
8748
8749 default:
8750 switch (note->type)
08a40648
AM
8751 {
8752 case NT_NETBSDCORE_FIRSTMACH+1:
8753 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 8754
08a40648
AM
8755 case NT_NETBSDCORE_FIRSTMACH+3:
8756 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 8757
08a40648
AM
8758 default:
8759 return TRUE;
8760 }
50b2bdb7
AM
8761 }
8762 /* NOTREACHED */
8763}
8764
67cc5033
MK
8765static bfd_boolean
8766elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
8767{
8768 /* Signal number at offset 0x08. */
8769 elf_tdata (abfd)->core_signal
8770 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
8771
8772 /* Process ID at offset 0x20. */
8773 elf_tdata (abfd)->core_pid
8774 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
8775
8776 /* Command name at 0x48 (max 32 bytes, including nul). */
8777 elf_tdata (abfd)->core_command
8778 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
8779
8780 return TRUE;
8781}
8782
8783static bfd_boolean
8784elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
8785{
8786 if (note->type == NT_OPENBSD_PROCINFO)
8787 return elfcore_grok_openbsd_procinfo (abfd, note);
8788
8789 if (note->type == NT_OPENBSD_REGS)
8790 return elfcore_make_note_pseudosection (abfd, ".reg", note);
8791
8792 if (note->type == NT_OPENBSD_FPREGS)
8793 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8794
8795 if (note->type == NT_OPENBSD_XFPREGS)
8796 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
8797
8798 if (note->type == NT_OPENBSD_AUXV)
8799 {
8800 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
8801 SEC_HAS_CONTENTS);
8802
8803 if (sect == NULL)
8804 return FALSE;
8805 sect->size = note->descsz;
8806 sect->filepos = note->descpos;
8807 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8808
8809 return TRUE;
8810 }
8811
8812 if (note->type == NT_OPENBSD_WCOOKIE)
8813 {
8814 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
8815 SEC_HAS_CONTENTS);
8816
8817 if (sect == NULL)
8818 return FALSE;
8819 sect->size = note->descsz;
8820 sect->filepos = note->descpos;
8821 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
8822
8823 return TRUE;
8824 }
8825
8826 return TRUE;
8827}
8828
07c6e936 8829static bfd_boolean
d3fd4074 8830elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
8831{
8832 void *ddata = note->descdata;
8833 char buf[100];
8834 char *name;
8835 asection *sect;
f8843e87
AM
8836 short sig;
8837 unsigned flags;
07c6e936
NC
8838
8839 /* nto_procfs_status 'pid' field is at offset 0. */
8840 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
8841
f8843e87
AM
8842 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
8843 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
8844
8845 /* nto_procfs_status 'flags' field is at offset 8. */
8846 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
8847
8848 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
8849 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
8850 {
8851 elf_tdata (abfd)->core_signal = sig;
8852 elf_tdata (abfd)->core_lwpid = *tid;
8853 }
07c6e936 8854
f8843e87
AM
8855 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
8856 do not come from signals so we make sure we set the current
8857 thread just in case. */
8858 if (flags & 0x00000080)
8859 elf_tdata (abfd)->core_lwpid = *tid;
07c6e936
NC
8860
8861 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 8862 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 8863
a50b1753 8864 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8865 if (name == NULL)
8866 return FALSE;
8867 strcpy (name, buf);
8868
117ed4f8 8869 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8870 if (sect == NULL)
8871 return FALSE;
8872
eea6121a 8873 sect->size = note->descsz;
07c6e936 8874 sect->filepos = note->descpos;
07c6e936
NC
8875 sect->alignment_power = 2;
8876
8877 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
8878}
8879
8880static bfd_boolean
d69f560c
KW
8881elfcore_grok_nto_regs (bfd *abfd,
8882 Elf_Internal_Note *note,
d3fd4074 8883 long tid,
d69f560c 8884 char *base)
07c6e936
NC
8885{
8886 char buf[100];
8887 char *name;
8888 asection *sect;
8889
d69f560c 8890 /* Make a "(base)/%d" section. */
d3fd4074 8891 sprintf (buf, "%s/%ld", base, tid);
07c6e936 8892
a50b1753 8893 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
8894 if (name == NULL)
8895 return FALSE;
8896 strcpy (name, buf);
8897
117ed4f8 8898 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
8899 if (sect == NULL)
8900 return FALSE;
8901
eea6121a 8902 sect->size = note->descsz;
07c6e936 8903 sect->filepos = note->descpos;
07c6e936
NC
8904 sect->alignment_power = 2;
8905
f8843e87
AM
8906 /* This is the current thread. */
8907 if (elf_tdata (abfd)->core_lwpid == tid)
d69f560c 8908 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
8909
8910 return TRUE;
07c6e936
NC
8911}
8912
8913#define BFD_QNT_CORE_INFO 7
8914#define BFD_QNT_CORE_STATUS 8
8915#define BFD_QNT_CORE_GREG 9
8916#define BFD_QNT_CORE_FPREG 10
8917
8918static bfd_boolean
217aa764 8919elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
8920{
8921 /* Every GREG section has a STATUS section before it. Store the
811072d8 8922 tid from the previous call to pass down to the next gregs
07c6e936 8923 function. */
d3fd4074 8924 static long tid = 1;
07c6e936
NC
8925
8926 switch (note->type)
8927 {
d69f560c
KW
8928 case BFD_QNT_CORE_INFO:
8929 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
8930 case BFD_QNT_CORE_STATUS:
8931 return elfcore_grok_nto_status (abfd, note, &tid);
8932 case BFD_QNT_CORE_GREG:
8933 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
8934 case BFD_QNT_CORE_FPREG:
8935 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
8936 default:
8937 return TRUE;
07c6e936
NC
8938 }
8939}
8940
b15fa79e
AM
8941static bfd_boolean
8942elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
8943{
8944 char *name;
8945 asection *sect;
8946 size_t len;
8947
8948 /* Use note name as section name. */
8949 len = note->namesz;
a50b1753 8950 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
8951 if (name == NULL)
8952 return FALSE;
8953 memcpy (name, note->namedata, len);
8954 name[len - 1] = '\0';
8955
8956 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
8957 if (sect == NULL)
8958 return FALSE;
8959
8960 sect->size = note->descsz;
8961 sect->filepos = note->descpos;
8962 sect->alignment_power = 1;
8963
8964 return TRUE;
8965}
8966
7c76fa91
MS
8967/* Function: elfcore_write_note
8968
47d9a591 8969 Inputs:
a39f3346 8970 buffer to hold note, and current size of buffer
7c76fa91
MS
8971 name of note
8972 type of note
8973 data for note
8974 size of data for note
8975
a39f3346
AM
8976 Writes note to end of buffer. ELF64 notes are written exactly as
8977 for ELF32, despite the current (as of 2006) ELF gabi specifying
8978 that they ought to have 8-byte namesz and descsz field, and have
8979 8-byte alignment. Other writers, eg. Linux kernel, do the same.
8980
7c76fa91 8981 Return:
a39f3346 8982 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
8983
8984char *
a39f3346 8985elfcore_write_note (bfd *abfd,
217aa764 8986 char *buf,
a39f3346 8987 int *bufsiz,
217aa764 8988 const char *name,
a39f3346 8989 int type,
217aa764 8990 const void *input,
a39f3346 8991 int size)
7c76fa91
MS
8992{
8993 Elf_External_Note *xnp;
d4c88bbb 8994 size_t namesz;
d4c88bbb 8995 size_t newspace;
a39f3346 8996 char *dest;
7c76fa91 8997
d4c88bbb 8998 namesz = 0;
d4c88bbb 8999 if (name != NULL)
a39f3346 9000 namesz = strlen (name) + 1;
d4c88bbb 9001
a39f3346 9002 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 9003
a50b1753 9004 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
9005 if (buf == NULL)
9006 return buf;
a39f3346 9007 dest = buf + *bufsiz;
7c76fa91
MS
9008 *bufsiz += newspace;
9009 xnp = (Elf_External_Note *) dest;
9010 H_PUT_32 (abfd, namesz, xnp->namesz);
9011 H_PUT_32 (abfd, size, xnp->descsz);
9012 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
9013 dest = xnp->name;
9014 if (name != NULL)
9015 {
9016 memcpy (dest, name, namesz);
9017 dest += namesz;
a39f3346 9018 while (namesz & 3)
d4c88bbb
AM
9019 {
9020 *dest++ = '\0';
a39f3346 9021 ++namesz;
d4c88bbb
AM
9022 }
9023 }
9024 memcpy (dest, input, size);
a39f3346
AM
9025 dest += size;
9026 while (size & 3)
9027 {
9028 *dest++ = '\0';
9029 ++size;
9030 }
9031 return buf;
7c76fa91
MS
9032}
9033
7c76fa91 9034char *
217aa764
AM
9035elfcore_write_prpsinfo (bfd *abfd,
9036 char *buf,
9037 int *bufsiz,
9038 const char *fname,
9039 const char *psargs)
7c76fa91 9040{
183e98be
AM
9041 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9042
9043 if (bed->elf_backend_write_core_note != NULL)
9044 {
9045 char *ret;
9046 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9047 NT_PRPSINFO, fname, psargs);
9048 if (ret != NULL)
9049 return ret;
9050 }
7c76fa91 9051
1f20dca5 9052#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
9053#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9054 if (bed->s->elfclass == ELFCLASS32)
9055 {
9056#if defined (HAVE_PSINFO32_T)
9057 psinfo32_t data;
9058 int note_type = NT_PSINFO;
9059#else
9060 prpsinfo32_t data;
9061 int note_type = NT_PRPSINFO;
9062#endif
9063
9064 memset (&data, 0, sizeof (data));
9065 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9066 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9067 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9068 "CORE", note_type, &data, sizeof (data));
183e98be
AM
9069 }
9070 else
9071#endif
9072 {
7c76fa91 9073#if defined (HAVE_PSINFO_T)
183e98be
AM
9074 psinfo_t data;
9075 int note_type = NT_PSINFO;
7c76fa91 9076#else
183e98be
AM
9077 prpsinfo_t data;
9078 int note_type = NT_PRPSINFO;
7c76fa91
MS
9079#endif
9080
183e98be
AM
9081 memset (&data, 0, sizeof (data));
9082 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
9083 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
9084 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 9085 "CORE", note_type, &data, sizeof (data));
183e98be 9086 }
7c76fa91
MS
9087#endif /* PSINFO_T or PRPSINFO_T */
9088
1f20dca5
UW
9089 free (buf);
9090 return NULL;
9091}
9092
7c76fa91 9093char *
217aa764
AM
9094elfcore_write_prstatus (bfd *abfd,
9095 char *buf,
9096 int *bufsiz,
9097 long pid,
9098 int cursig,
9099 const void *gregs)
7c76fa91 9100{
183e98be 9101 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9102
183e98be
AM
9103 if (bed->elf_backend_write_core_note != NULL)
9104 {
9105 char *ret;
9106 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
9107 NT_PRSTATUS,
9108 pid, cursig, gregs);
9109 if (ret != NULL)
9110 return ret;
9111 }
9112
1f20dca5 9113#if defined (HAVE_PRSTATUS_T)
183e98be
AM
9114#if defined (HAVE_PRSTATUS32_T)
9115 if (bed->s->elfclass == ELFCLASS32)
9116 {
9117 prstatus32_t prstat;
9118
9119 memset (&prstat, 0, sizeof (prstat));
9120 prstat.pr_pid = pid;
9121 prstat.pr_cursig = cursig;
9122 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9123 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9124 NT_PRSTATUS, &prstat, sizeof (prstat));
9125 }
9126 else
9127#endif
9128 {
9129 prstatus_t prstat;
9130
9131 memset (&prstat, 0, sizeof (prstat));
9132 prstat.pr_pid = pid;
9133 prstat.pr_cursig = cursig;
9134 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 9135 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
9136 NT_PRSTATUS, &prstat, sizeof (prstat));
9137 }
7c76fa91
MS
9138#endif /* HAVE_PRSTATUS_T */
9139
1f20dca5
UW
9140 free (buf);
9141 return NULL;
9142}
9143
51316059
MS
9144#if defined (HAVE_LWPSTATUS_T)
9145char *
217aa764
AM
9146elfcore_write_lwpstatus (bfd *abfd,
9147 char *buf,
9148 int *bufsiz,
9149 long pid,
9150 int cursig,
9151 const void *gregs)
51316059
MS
9152{
9153 lwpstatus_t lwpstat;
183e98be 9154 const char *note_name = "CORE";
51316059
MS
9155
9156 memset (&lwpstat, 0, sizeof (lwpstat));
9157 lwpstat.pr_lwpid = pid >> 16;
9158 lwpstat.pr_cursig = cursig;
9159#if defined (HAVE_LWPSTATUS_T_PR_REG)
9160 memcpy (lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
9161#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9162#if !defined(gregs)
9163 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
9164 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
9165#else
9166 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
9167 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
9168#endif
9169#endif
47d9a591 9170 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
9171 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
9172}
9173#endif /* HAVE_LWPSTATUS_T */
9174
7c76fa91
MS
9175#if defined (HAVE_PSTATUS_T)
9176char *
217aa764
AM
9177elfcore_write_pstatus (bfd *abfd,
9178 char *buf,
9179 int *bufsiz,
9180 long pid,
6c10990d
NC
9181 int cursig ATTRIBUTE_UNUSED,
9182 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 9183{
183e98be
AM
9184 const char *note_name = "CORE";
9185#if defined (HAVE_PSTATUS32_T)
9186 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 9187
183e98be
AM
9188 if (bed->s->elfclass == ELFCLASS32)
9189 {
9190 pstatus32_t pstat;
9191
9192 memset (&pstat, 0, sizeof (pstat));
9193 pstat.pr_pid = pid & 0xffff;
9194 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9195 NT_PSTATUS, &pstat, sizeof (pstat));
9196 return buf;
9197 }
9198 else
9199#endif
9200 {
9201 pstatus_t pstat;
9202
9203 memset (&pstat, 0, sizeof (pstat));
9204 pstat.pr_pid = pid & 0xffff;
9205 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
9206 NT_PSTATUS, &pstat, sizeof (pstat));
9207 return buf;
9208 }
7c76fa91
MS
9209}
9210#endif /* HAVE_PSTATUS_T */
9211
9212char *
217aa764
AM
9213elfcore_write_prfpreg (bfd *abfd,
9214 char *buf,
9215 int *bufsiz,
9216 const void *fpregs,
9217 int size)
7c76fa91 9218{
183e98be 9219 const char *note_name = "CORE";
47d9a591 9220 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9221 note_name, NT_FPREGSET, fpregs, size);
9222}
9223
9224char *
217aa764
AM
9225elfcore_write_prxfpreg (bfd *abfd,
9226 char *buf,
9227 int *bufsiz,
9228 const void *xfpregs,
9229 int size)
7c76fa91
MS
9230{
9231 char *note_name = "LINUX";
47d9a591 9232 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
9233 note_name, NT_PRXFPREG, xfpregs, size);
9234}
9235
4339cae0
L
9236char *
9237elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
9238 const void *xfpregs, int size)
9239{
9240 char *note_name = "LINUX";
9241 return elfcore_write_note (abfd, buf, bufsiz,
9242 note_name, NT_X86_XSTATE, xfpregs, size);
9243}
9244
97753bd5
AM
9245char *
9246elfcore_write_ppc_vmx (bfd *abfd,
9247 char *buf,
9248 int *bufsiz,
9249 const void *ppc_vmx,
9250 int size)
9251{
9252 char *note_name = "LINUX";
9253 return elfcore_write_note (abfd, buf, bufsiz,
9254 note_name, NT_PPC_VMX, ppc_vmx, size);
9255}
9256
89eeb0bc
LM
9257char *
9258elfcore_write_ppc_vsx (bfd *abfd,
9259 char *buf,
9260 int *bufsiz,
9261 const void *ppc_vsx,
9262 int size)
9263{
9264 char *note_name = "LINUX";
9265 return elfcore_write_note (abfd, buf, bufsiz,
9266 note_name, NT_PPC_VSX, ppc_vsx, size);
9267}
9268
0675e188
UW
9269static char *
9270elfcore_write_s390_high_gprs (bfd *abfd,
9271 char *buf,
9272 int *bufsiz,
9273 const void *s390_high_gprs,
9274 int size)
9275{
9276 char *note_name = "LINUX";
9277 return elfcore_write_note (abfd, buf, bufsiz,
9278 note_name, NT_S390_HIGH_GPRS,
9279 s390_high_gprs, size);
9280}
9281
d7eeb400
MS
9282char *
9283elfcore_write_s390_timer (bfd *abfd,
9284 char *buf,
9285 int *bufsiz,
9286 const void *s390_timer,
9287 int size)
9288{
9289 char *note_name = "LINUX";
9290 return elfcore_write_note (abfd, buf, bufsiz,
9291 note_name, NT_S390_TIMER, s390_timer, size);
9292}
9293
9294char *
9295elfcore_write_s390_todcmp (bfd *abfd,
9296 char *buf,
9297 int *bufsiz,
9298 const void *s390_todcmp,
9299 int size)
9300{
9301 char *note_name = "LINUX";
9302 return elfcore_write_note (abfd, buf, bufsiz,
9303 note_name, NT_S390_TODCMP, s390_todcmp, size);
9304}
9305
9306char *
9307elfcore_write_s390_todpreg (bfd *abfd,
9308 char *buf,
9309 int *bufsiz,
9310 const void *s390_todpreg,
9311 int size)
9312{
9313 char *note_name = "LINUX";
9314 return elfcore_write_note (abfd, buf, bufsiz,
9315 note_name, NT_S390_TODPREG, s390_todpreg, size);
9316}
9317
9318char *
9319elfcore_write_s390_ctrs (bfd *abfd,
9320 char *buf,
9321 int *bufsiz,
9322 const void *s390_ctrs,
9323 int size)
9324{
9325 char *note_name = "LINUX";
9326 return elfcore_write_note (abfd, buf, bufsiz,
9327 note_name, NT_S390_CTRS, s390_ctrs, size);
9328}
9329
9330char *
9331elfcore_write_s390_prefix (bfd *abfd,
9332 char *buf,
9333 int *bufsiz,
9334 const void *s390_prefix,
9335 int size)
9336{
9337 char *note_name = "LINUX";
9338 return elfcore_write_note (abfd, buf, bufsiz,
9339 note_name, NT_S390_PREFIX, s390_prefix, size);
9340}
9341
355b81d9
UW
9342char *
9343elfcore_write_s390_last_break (bfd *abfd,
9344 char *buf,
9345 int *bufsiz,
9346 const void *s390_last_break,
9347 int size)
9348{
9349 char *note_name = "LINUX";
9350 return elfcore_write_note (abfd, buf, bufsiz,
9351 note_name, NT_S390_LAST_BREAK,
9352 s390_last_break, size);
9353}
9354
9355char *
9356elfcore_write_s390_system_call (bfd *abfd,
9357 char *buf,
9358 int *bufsiz,
9359 const void *s390_system_call,
9360 int size)
9361{
9362 char *note_name = "LINUX";
9363 return elfcore_write_note (abfd, buf, bufsiz,
9364 note_name, NT_S390_SYSTEM_CALL,
9365 s390_system_call, size);
9366}
9367
faa9a424
UW
9368char *
9369elfcore_write_arm_vfp (bfd *abfd,
9370 char *buf,
9371 int *bufsiz,
9372 const void *arm_vfp,
9373 int size)
9374{
9375 char *note_name = "LINUX";
9376 return elfcore_write_note (abfd, buf, bufsiz,
9377 note_name, NT_ARM_VFP, arm_vfp, size);
9378}
9379
bb864ac1
CES
9380char *
9381elfcore_write_register_note (bfd *abfd,
9382 char *buf,
9383 int *bufsiz,
9384 const char *section,
9385 const void *data,
9386 int size)
9387{
9388 if (strcmp (section, ".reg2") == 0)
9389 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
9390 if (strcmp (section, ".reg-xfp") == 0)
9391 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
9392 if (strcmp (section, ".reg-xstate") == 0)
9393 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9394 if (strcmp (section, ".reg-ppc-vmx") == 0)
9395 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
9396 if (strcmp (section, ".reg-ppc-vsx") == 0)
9397 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
9398 if (strcmp (section, ".reg-s390-high-gprs") == 0)
9399 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
9400 if (strcmp (section, ".reg-s390-timer") == 0)
9401 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
9402 if (strcmp (section, ".reg-s390-todcmp") == 0)
9403 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
9404 if (strcmp (section, ".reg-s390-todpreg") == 0)
9405 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
9406 if (strcmp (section, ".reg-s390-ctrs") == 0)
9407 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
9408 if (strcmp (section, ".reg-s390-prefix") == 0)
9409 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
9410 if (strcmp (section, ".reg-s390-last-break") == 0)
9411 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
9412 if (strcmp (section, ".reg-s390-system-call") == 0)
9413 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
faa9a424
UW
9414 if (strcmp (section, ".reg-arm-vfp") == 0)
9415 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
bb864ac1
CES
9416 return NULL;
9417}
9418
b34976b6 9419static bfd_boolean
718175fa 9420elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 9421{
c044fabd 9422 char *p;
252b5132 9423
252b5132
RH
9424 p = buf;
9425 while (p < buf + size)
9426 {
c044fabd
KH
9427 /* FIXME: bad alignment assumption. */
9428 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
9429 Elf_Internal_Note in;
9430
baea7ef1
AM
9431 if (offsetof (Elf_External_Note, name) > buf - p + size)
9432 return FALSE;
9433
dc810e39 9434 in.type = H_GET_32 (abfd, xnp->type);
252b5132 9435
dc810e39 9436 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 9437 in.namedata = xnp->name;
baea7ef1
AM
9438 if (in.namesz > buf - in.namedata + size)
9439 return FALSE;
252b5132 9440
dc810e39 9441 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
9442 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
9443 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
9444 if (in.descsz != 0
9445 && (in.descdata >= buf + size
9446 || in.descsz > buf - in.descdata + size))
9447 return FALSE;
252b5132 9448
718175fa
JK
9449 switch (bfd_get_format (abfd))
9450 {
9451 default:
9452 return TRUE;
9453
9454 case bfd_core:
9455 if (CONST_STRNEQ (in.namedata, "NetBSD-CORE"))
9456 {
9457 if (! elfcore_grok_netbsd_note (abfd, &in))
9458 return FALSE;
9459 }
67cc5033
MK
9460 else if (CONST_STRNEQ (in.namedata, "OpenBSD"))
9461 {
9462 if (! elfcore_grok_openbsd_note (abfd, &in))
9463 return FALSE;
9464 }
718175fa
JK
9465 else if (CONST_STRNEQ (in.namedata, "QNX"))
9466 {
9467 if (! elfcore_grok_nto_note (abfd, &in))
9468 return FALSE;
9469 }
b15fa79e
AM
9470 else if (CONST_STRNEQ (in.namedata, "SPU/"))
9471 {
9472 if (! elfcore_grok_spu_note (abfd, &in))
9473 return FALSE;
9474 }
718175fa
JK
9475 else
9476 {
9477 if (! elfcore_grok_note (abfd, &in))
9478 return FALSE;
9479 }
9480 break;
9481
9482 case bfd_object:
9483 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
9484 {
9485 if (! elfobj_grok_gnu_note (abfd, &in))
9486 return FALSE;
9487 }
e21e5835
NC
9488 else if (in.namesz == sizeof "stapsdt"
9489 && strcmp (in.namedata, "stapsdt") == 0)
9490 {
9491 if (! elfobj_grok_stapsdt_note (abfd, &in))
9492 return FALSE;
9493 }
718175fa 9494 break;
08a40648 9495 }
252b5132
RH
9496
9497 p = in.descdata + BFD_ALIGN (in.descsz, 4);
9498 }
9499
718175fa
JK
9500 return TRUE;
9501}
9502
9503static bfd_boolean
9504elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
9505{
9506 char *buf;
9507
9508 if (size <= 0)
9509 return TRUE;
9510
9511 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
9512 return FALSE;
9513
a50b1753 9514 buf = (char *) bfd_malloc (size);
718175fa
JK
9515 if (buf == NULL)
9516 return FALSE;
9517
9518 if (bfd_bread (buf, size, abfd) != size
9519 || !elf_parse_notes (abfd, buf, size, offset))
9520 {
9521 free (buf);
9522 return FALSE;
9523 }
9524
252b5132 9525 free (buf);
b34976b6 9526 return TRUE;
252b5132 9527}
98d8431c
JB
9528\f
9529/* Providing external access to the ELF program header table. */
9530
9531/* Return an upper bound on the number of bytes required to store a
9532 copy of ABFD's program header table entries. Return -1 if an error
9533 occurs; bfd_get_error will return an appropriate code. */
c044fabd 9534
98d8431c 9535long
217aa764 9536bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
9537{
9538 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9539 {
9540 bfd_set_error (bfd_error_wrong_format);
9541 return -1;
9542 }
9543
936e320b 9544 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
9545}
9546
98d8431c
JB
9547/* Copy ABFD's program header table entries to *PHDRS. The entries
9548 will be stored as an array of Elf_Internal_Phdr structures, as
9549 defined in include/elf/internal.h. To find out how large the
9550 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
9551
9552 Return the number of program header table entries read, or -1 if an
9553 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 9554
98d8431c 9555int
217aa764 9556bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
9557{
9558 int num_phdrs;
9559
9560 if (abfd->xvec->flavour != bfd_target_elf_flavour)
9561 {
9562 bfd_set_error (bfd_error_wrong_format);
9563 return -1;
9564 }
9565
9566 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 9567 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
9568 num_phdrs * sizeof (Elf_Internal_Phdr));
9569
9570 return num_phdrs;
9571}
ae4221d7 9572
db6751f2 9573enum elf_reloc_type_class
217aa764 9574_bfd_elf_reloc_type_class (const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
9575{
9576 return reloc_class_normal;
9577}
f8df10f4 9578
47d9a591 9579/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
9580 relocation against a local symbol. */
9581
9582bfd_vma
217aa764
AM
9583_bfd_elf_rela_local_sym (bfd *abfd,
9584 Elf_Internal_Sym *sym,
8517fae7 9585 asection **psec,
217aa764 9586 Elf_Internal_Rela *rel)
f8df10f4 9587{
8517fae7 9588 asection *sec = *psec;
f8df10f4
JJ
9589 bfd_vma relocation;
9590
9591 relocation = (sec->output_section->vma
9592 + sec->output_offset
9593 + sym->st_value);
9594 if ((sec->flags & SEC_MERGE)
c629eae0 9595 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 9596 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 9597 {
f8df10f4 9598 rel->r_addend =
8517fae7 9599 _bfd_merged_section_offset (abfd, psec,
65765700 9600 elf_section_data (sec)->sec_info,
753731ee
AM
9601 sym->st_value + rel->r_addend);
9602 if (sec != *psec)
9603 {
9604 /* If we have changed the section, and our original section is
9605 marked with SEC_EXCLUDE, it means that the original
9606 SEC_MERGE section has been completely subsumed in some
9607 other SEC_MERGE section. In this case, we need to leave
9608 some info around for --emit-relocs. */
9609 if ((sec->flags & SEC_EXCLUDE) != 0)
9610 sec->kept_section = *psec;
9611 sec = *psec;
9612 }
8517fae7
AM
9613 rel->r_addend -= relocation;
9614 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
9615 }
9616 return relocation;
9617}
c629eae0
JJ
9618
9619bfd_vma
217aa764
AM
9620_bfd_elf_rel_local_sym (bfd *abfd,
9621 Elf_Internal_Sym *sym,
9622 asection **psec,
9623 bfd_vma addend)
47d9a591 9624{
c629eae0
JJ
9625 asection *sec = *psec;
9626
dbaa2011 9627 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
9628 return sym->st_value + addend;
9629
9630 return _bfd_merged_section_offset (abfd, psec,
65765700 9631 elf_section_data (sec)->sec_info,
753731ee 9632 sym->st_value + addend);
c629eae0
JJ
9633}
9634
9635bfd_vma
217aa764 9636_bfd_elf_section_offset (bfd *abfd,
92e4ec35 9637 struct bfd_link_info *info,
217aa764
AM
9638 asection *sec,
9639 bfd_vma offset)
c629eae0 9640{
68bfbfcc 9641 switch (sec->sec_info_type)
65765700 9642 {
dbaa2011 9643 case SEC_INFO_TYPE_STABS:
eea6121a
AM
9644 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
9645 offset);
dbaa2011 9646 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 9647 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
65765700 9648 default:
310fd250
L
9649 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
9650 {
9651 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9652 bfd_size_type address_size = bed->s->arch_size / 8;
9653 offset = sec->size - offset - address_size;
9654 }
65765700
JJ
9655 return offset;
9656 }
c629eae0 9657}
3333a7c3
RM
9658\f
9659/* Create a new BFD as if by bfd_openr. Rather than opening a file,
9660 reconstruct an ELF file by reading the segments out of remote memory
9661 based on the ELF file header at EHDR_VMA and the ELF program headers it
9662 points to. If not null, *LOADBASEP is filled in with the difference
9663 between the VMAs from which the segments were read, and the VMAs the
9664 file headers (and hence BFD's idea of each section's VMA) put them at.
9665
9666 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
9667 remote memory at target address VMA into the local buffer at MYADDR; it
9668 should return zero on success or an `errno' code on failure. TEMPL must
9669 be a BFD for an ELF target with the word size and byte order found in
9670 the remote memory. */
9671
9672bfd *
217aa764
AM
9673bfd_elf_bfd_from_remote_memory
9674 (bfd *templ,
9675 bfd_vma ehdr_vma,
9676 bfd_vma *loadbasep,
fe78531d 9677 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
9678{
9679 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
9680 (templ, ehdr_vma, loadbasep, target_read_memory);
9681}
4c45e5c9
JJ
9682\f
9683long
c9727e01
AM
9684_bfd_elf_get_synthetic_symtab (bfd *abfd,
9685 long symcount ATTRIBUTE_UNUSED,
9686 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 9687 long dynsymcount,
c9727e01
AM
9688 asymbol **dynsyms,
9689 asymbol **ret)
4c45e5c9
JJ
9690{
9691 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9692 asection *relplt;
9693 asymbol *s;
9694 const char *relplt_name;
9695 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
9696 arelent *p;
9697 long count, i, n;
9698 size_t size;
9699 Elf_Internal_Shdr *hdr;
9700 char *names;
9701 asection *plt;
9702
8615f3f2
AM
9703 *ret = NULL;
9704
90e3cdf2
JJ
9705 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
9706 return 0;
9707
8615f3f2
AM
9708 if (dynsymcount <= 0)
9709 return 0;
9710
4c45e5c9
JJ
9711 if (!bed->plt_sym_val)
9712 return 0;
9713
9714 relplt_name = bed->relplt_name;
9715 if (relplt_name == NULL)
d35fd659 9716 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
9717 relplt = bfd_get_section_by_name (abfd, relplt_name);
9718 if (relplt == NULL)
9719 return 0;
9720
9721 hdr = &elf_section_data (relplt)->this_hdr;
9722 if (hdr->sh_link != elf_dynsymtab (abfd)
9723 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
9724 return 0;
9725
9726 plt = bfd_get_section_by_name (abfd, ".plt");
9727 if (plt == NULL)
9728 return 0;
9729
9730 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 9731 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
9732 return -1;
9733
eea6121a 9734 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
9735 size = count * sizeof (asymbol);
9736 p = relplt->relocation;
cb53bf42 9737 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
9738 {
9739 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
9740 if (p->addend != 0)
9741 {
9742#ifdef BFD64
9743 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
9744#else
9745 size += sizeof ("+0x") - 1 + 8;
9746#endif
9747 }
9748 }
4c45e5c9 9749
a50b1753 9750 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
9751 if (s == NULL)
9752 return -1;
9753
9754 names = (char *) (s + count);
9755 p = relplt->relocation;
9756 n = 0;
cb53bf42 9757 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
9758 {
9759 size_t len;
9760 bfd_vma addr;
9761
9762 addr = bed->plt_sym_val (i, plt, p);
9763 if (addr == (bfd_vma) -1)
9764 continue;
9765
9766 *s = **p->sym_ptr_ptr;
65a7a66f
AM
9767 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
9768 we are defining a symbol, ensure one of them is set. */
9769 if ((s->flags & BSF_LOCAL) == 0)
9770 s->flags |= BSF_GLOBAL;
6ba2a415 9771 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
9772 s->section = plt;
9773 s->value = addr - plt->vma;
9774 s->name = names;
8f39ba8e 9775 s->udata.p = NULL;
4c45e5c9
JJ
9776 len = strlen ((*p->sym_ptr_ptr)->name);
9777 memcpy (names, (*p->sym_ptr_ptr)->name, len);
9778 names += len;
041de40d
AM
9779 if (p->addend != 0)
9780 {
1d770845 9781 char buf[30], *a;
d324f6d6 9782
041de40d
AM
9783 memcpy (names, "+0x", sizeof ("+0x") - 1);
9784 names += sizeof ("+0x") - 1;
1d770845
L
9785 bfd_sprintf_vma (abfd, buf, p->addend);
9786 for (a = buf; *a == '0'; ++a)
9787 ;
9788 len = strlen (a);
9789 memcpy (names, a, len);
9790 names += len;
041de40d 9791 }
4c45e5c9
JJ
9792 memcpy (names, "@plt", sizeof ("@plt"));
9793 names += sizeof ("@plt");
8f39ba8e 9794 ++s, ++n;
4c45e5c9
JJ
9795 }
9796
9797 return n;
9798}
3d7f7666 9799
3b22753a
L
9800/* It is only used by x86-64 so far. */
9801asection _bfd_elf_large_com_section
9802 = BFD_FAKE_SECTION (_bfd_elf_large_com_section,
f592407e 9803 SEC_IS_COMMON, NULL, "LARGE_COMMON", 0);
ecca9871 9804
d1036acb
L
9805void
9806_bfd_elf_set_osabi (bfd * abfd,
9807 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
9808{
9809 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
9810
9811 i_ehdrp = elf_elfheader (abfd);
9812
9813 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
9814
9815 /* To make things simpler for the loader on Linux systems we set the
9c55345c 9816 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 9817 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 9818 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 9819 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 9820 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 9821}
fcb93ecf
PB
9822
9823
9824/* Return TRUE for ELF symbol types that represent functions.
9825 This is the default version of this function, which is sufficient for
d8045f23 9826 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
9827
9828bfd_boolean
9829_bfd_elf_is_function_type (unsigned int type)
9830{
d8045f23
NC
9831 return (type == STT_FUNC
9832 || type == STT_GNU_IFUNC);
fcb93ecf 9833}
9f296da3 9834
aef36ac1
AM
9835/* If the ELF symbol SYM might be a function in SEC, return the
9836 function size and set *CODE_OFF to the function's entry point,
9837 otherwise return zero. */
9f296da3 9838
aef36ac1
AM
9839bfd_size_type
9840_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
9841 bfd_vma *code_off)
9f296da3 9842{
aef36ac1
AM
9843 bfd_size_type size;
9844
ff9e0f5b 9845 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
9846 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
9847 || sym->section != sec)
9848 return 0;
ff9e0f5b 9849
ff9e0f5b 9850 *code_off = sym->value;
aef36ac1
AM
9851 size = 0;
9852 if (!(sym->flags & BSF_SYNTHETIC))
9853 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
9854 if (size == 0)
9855 size = 1;
9856 return size;
9f296da3 9857}